48a2e836ff
This is done for moving packages that are related to secure boot out of LAT and into integ. Use grub version: 2.06-1 . Port grub-efi from LAT and make its build independent from grub2. The patches for code and changes for debian build are ported from layers ( meta-lat and meta-secure-core ) of yocto upstream. Make grub-efi independent from grub2 because some code changes for secure boot can make grub-pc's build fail. This porting of grub-efi customizes grub images and grub.cfg for efi boot. Install those files customized to grub-efi-amd64 package. Test Plan: The tests are done with all the changes for this porting, which involves efitools/shim/grub2/grub-efi/lat-sdk.sh, because they are in a chain for secure boot verification. - PASS: secure boot OK on qemu. - PASS: secure boot OK on PowerEdge R430 lab. - PASS: secure boot NG on qemu/hardware when shim/grub-efi images are without the right signatures. Story: 2009221 Task: 46402 Signed-off-by: Li Zhou <li.zhou@windriver.com> Change-Id: Ia3b482c1959b5e6462fe54f0b0e59a69db1b1ca7
33 lines
1.1 KiB
Diff
33 lines
1.1 KiB
Diff
From 5b7c30a1d5f6a30b60cbed7cedc516a27dba36d9 Mon Sep 17 00:00:00 2001
|
|
From: Lans Zhang <jia.zhang@windriver.com>
|
|
Date: Sun, 24 Apr 2016 15:56:38 +0800
|
|
Subject: [PATCH] chainloader: Don't check empty section in file like .bss
|
|
|
|
Upstream-Status: Pending
|
|
|
|
Because this kind of section always has a zeroed PointerToRawData denoting
|
|
the offset to file and a valid VirtualSize denoting the real size in the
|
|
memory.
|
|
|
|
Signed-off-by: Lans Zhang <jia.zhang@windriver.com>
|
|
---
|
|
grub-core/loader/efi/chainloader.c | 2 +-
|
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
|
|
|
diff --git a/grub-core/loader/efi/chainloader.c b/grub-core/loader/efi/chainloader.c
|
|
index 9ff4faf..f736bee 100644
|
|
--- a/grub-core/loader/efi/chainloader.c
|
|
+++ b/grub-core/loader/efi/chainloader.c
|
|
@@ -530,7 +530,7 @@ grub_shim_load_image(grub_addr_t addr, grub_ssize_t size,
|
|
}
|
|
|
|
if (section->virtual_address < context->header_size
|
|
- || section->raw_data_offset < context->header_size)
|
|
+ || (section->raw_data_offset && section->raw_data_offset < context->header_size))
|
|
{
|
|
grub_printf("Section is inside image headers\n");
|
|
status = GRUB_ERR_BAD_FILE_TYPE;
|
|
--
|
|
2.17.1
|
|
|