1 .. SPDX-License-Identifier: GPL-2.0+
2 .. Copyright (c) 2018 Heinrich Schuchardt
4 iSCSI booting with U-Boot and iPXE
5 ==================================
10 U-Boot has only a reduced set of supported network protocols. The focus for
11 network booting has been on UDP based protocols. A TCP stack and HTTP support
12 are expected to be integrated in 2018 together with a wget command.
14 For booting a diskless computer this leaves us with BOOTP or DHCP to get the
15 address of a boot script. TFTP or NFS can be used to load the boot script, the
16 operating system kernel and the initial file system (initrd).
18 These protocols are insecure. The client cannot validate the authenticity
19 of the contacted servers. And the server cannot verify the identity of the
22 Furthermore the services providing the operating system loader or kernel are
23 not the ones that the operating system typically will use. Especially in a SAN
24 environment this makes updating the operating system a hassle. After installing
25 a new kernel version the boot files have to be copied to the TFTP server
28 The HTTPS protocol provides certificate based validation of servers. Sensitive
29 data like passwords can be securely transmitted.
31 The iSCSI protocol is used for connecting storage attached networks. It
32 provides mutual authentication using the CHAP protocol. It typically runs on
35 Thus a better solution than DHCP/TFTP/NFS boot would be to load a boot script
36 via HTTPS and to download any other files needed for booting via iSCSI from the
37 same target where the operating system is installed.
39 An alternative to implementing these protocols in U-Boot is to use an existing
40 software that can run on top of U-Boot. iPXE[1] is the "swiss army knife" of
41 network booting. It supports both HTTPS and iSCSI. It has a scripting engine for
42 fine grained control of the boot process and can provide a command shell.
44 iPXE can be built as an EFI application (named snp.efi) which can be loaded and
50 U-Boot loads the EFI application iPXE snp.efi using the bootefi command. This
51 application has network access via the simple network protocol offered by
54 iPXE executes its internal script. This script may optionally chain load a
55 secondary boot script via HTTPS or open a shell.
57 For the further boot process iPXE connects to the iSCSI server. This includes
58 the mutual authentication using the CHAP protocol. After the authentication iPXE
59 has access to the iSCSI targets.
61 For a selected iSCSI target iPXE sets up a handle with the block IO protocol. It
62 uses the ConnectController boot service of U-Boot to request U-Boot to connect a
63 file system driver. U-Boot reads from the iSCSI drive via the block IO protocol
64 offered by iPXE. It creates the partition handles and installs the simple file
65 protocol. Now iPXE can call the simple file protocol to load GRUB[2]. U-Boot
66 uses the block IO protocol offered by iPXE to fulfill the request.
68 Once GRUB is started it uses the same block IO protocol to load Linux. Via
69 the EFI stub Linux is called as an EFI application::
73 | U-Boot |========>| iPXE |
75 +--------+ | | DHCP | |
76 | |<===|********|<========| |
77 | DHCP | | | Get IP | |
78 | Server | | | Address | |
79 | |===>|********|========>| |
80 +--------+ | | Response| |
83 +--------+ | | HTTPS | |
84 | |<===|********|<========| |
85 | HTTPS | | | Load | |
86 | Server | | | Script | |
87 | |===>|********|========>| |
91 +--------+ | | iSCSI | |
92 | |<===|********|<========| |
93 | iSCSI | | | Auth | |
94 | Server |===>|********|========>| |
97 | |<===|********|<========| | +--------+
98 | | | | GRUB | | Runs | |
99 | |===>|********|========>| |======>| GRUB |
102 | | | | | | Loads | |
103 | |<===|********|<========|********|<======| | +--------+
104 | | | | | | Linux | | Runs | |
105 | |===>|********|========>|********|======>| |=====>| Linux |
107 +--------+ +--------+ +--------+ +--------+ | |
115 The iSCSI protocol is not encrypted. The traffic could be secured using IPsec
116 but neither U-Boot nor iPXE does support this. So we should at least separate
117 the iSCSI traffic from all other network traffic. This can be achieved using a
118 virtual local area network (VLAN).
126 For running iPXE on arm64 the bin-arm64-efi/snp.efi build target is needed::
128 git clone http://git.ipxe.org/ipxe.git
130 make bin-arm64-efi/snp.efi -j6 EMBED=myscript.ipxe
132 The available commands for the boot script are documented at:
136 Credentials are managed as environment variables. These are described here:
140 iPXE by default will put the CPU to rest when waiting for input. U-Boot does
141 not wake it up due to missing interrupt support. To avoid this behavior create
142 file src/config/local/nap.h:
151 The supported commands in iPXE are controlled by an include, too. Putting the
152 following into src/config/local/general.h is sufficient for most use cases:
157 #define NSLOOKUP_CMD /* Name resolution command */
158 #define PING_CMD /* Ping command */
159 #define NTP_CMD /* NTP commands */
160 #define VLAN_CMD /* VLAN commands */
161 #define IMAGE_EFI /* EFI image support */
162 #define DOWNLOAD_PROTO_HTTPS /* Secure Hypertext Transfer Protocol */
163 #define DOWNLOAD_PROTO_FTP /* File Transfer Protocol */
164 #define DOWNLOAD_PROTO_NFS /* Network File System Protocol */
165 #define DOWNLOAD_PROTO_FILE /* Local file system access */
170 When the root file system is on an iSCSI drive you should disable pings and set
171 the replacement timer to a high value in the configuration file [3]::
173 node.conn[0].timeo.noop_out_interval = 0
174 node.conn[0].timeo.noop_out_timeout = 0
175 node.session.timeo.replacement_timeout = 86400
180 * [1] https://ipxe.org - iPXE open source boot firmware
181 * [2] https://www.gnu.org/software/grub/ -
182 GNU GRUB (Grand Unified Bootloader)
183 * [3] https://github.com/open-iscsi/open-iscsi/blob/master/README -