summaryrefslogtreecommitdiffstats
path: root/meta/recipes-bsp/grub
Commit message (Collapse)AuthorAgeFilesLines
* meta: set S from UNPACKDIR in recipes that use only local filesAlexander Kanavin2025-06-201-2/+1
| | | | | | | | | | | | | | | There is no need to have two assignments; also setting S from UNPACKDIR (and not vice versa) is more logical as unpack task comes first, and tasks that come after unpack use S to access unpack results. Also adjust reference test data in selftest/recipeutils to reflect changes in test recipes. (From OE-Core rev: f64b7e5fb3181734c8dde87b27e872a026261a74) Signed-off-by: Alexander Kanavin <alex@linutronix.de> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* meta: set S to be in UNPACKDIR in recipes that explicitly set SAlexander Kanavin2025-06-201-1/+1
| | | | | | | | (From OE-Core rev: 7321cc17ae5483f17fe9cdffea7b62acd9d9c3a2) Signed-off-by: Alexander Kanavin <alex@linutronix.de> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub,grub-efi: Pin to using gcc on aarch64Khem Raj2025-05-221-0/+4
| | | | | | | | | | It needs porting to work with clang (From OE-Core rev: 18ebddf859c9baa4048601ebd968f6b8b02881ed) Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub2: Add GRUB_MKIMAGE_OPTS for configurable grub-mkimage optionsValeria Petrov2025-03-241-1/+4
| | | | | | | | | | | | | | | Introduce the GRUB_MKIMAGE_OPTS variable to allow additional options to be passed to grub-mkimage, making its behavior more configurable. (for example, this allows disabling shim lock when necessary). Update do_mkimage to use ${GRUB_MKIMAGE_OPTS}. This change reduce the need for hardcoded modifications and makes future adjustments easier. (From OE-Core rev: a6147adefcba7aae3f4eb8ed76d6a94315cafe61) Signed-off-by: Valeria Petrov <valeria.petrov@spinetix.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: patch CVE-2025-0678 and CVE-2025-1125Peter Marko2025-03-132-0/+88
| | | | | | | | | | Cherry-pick patch mentioning these CVEs. (From OE-Core rev: 9d0422bfb97c01e4326dcad59a1fe8842d4cec90) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: patch CVE-2025-0677, CVE-2025-0684, CVE-2025-0685, CVE-2025-0686 and ↵Peter Marko2025-03-132-0/+378
| | | | | | | | | | | | CVE-2025-0689 Cherry-pick patch mentioning these CVEs. (From OE-Core rev: 0fa593382a01d1dbeb6c697d422c1a186027f573) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: patch CVE-2024-45778 and CVE-2024-45779Peter Marko2025-03-132-0/+56
| | | | | | | | | | Cherry-pick patch mentioning these CVEs. (From OE-Core rev: 4e624e4737510f65a1dbbf31676eb6a4326aca72) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: patch CVE-2025-1118Peter Marko2025-03-132-0/+38
| | | | | | | | | | Cherry-pick patch mentioning this CVE. (From OE-Core rev: 16739e8eb936ba1ed9f48cffca848691f258bcd5) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: patch CVE-2025-0690Peter Marko2025-03-132-0/+74
| | | | | | | | | | Cherry-pick patch mentioning this CVE. (From OE-Core rev: e4c372c5078f60a980e8161ea88cee2e3b7f9626) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: patch CVE-2024-45777Peter Marko2025-03-132-0/+58
| | | | | | | | | | Cherry-pick patch mentioning this CVE. (From OE-Core rev: c08e2e4e8b04107723702e0e97124642fb82f92f) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: patch CVE-2024-45776Peter Marko2025-03-132-0/+40
| | | | | | | | | | Cherry-pick patch mentioning this CVE. (From OE-Core rev: f2cd97d9312f233a604d62a662a93a2d7d8ab3f3) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: patch CVE-2025-0622Peter Marko2025-03-134-0/+117
| | | | | | | | | | Cherry-pick patch mentioning this CVE. (From OE-Core rev: 13fafdaa6958bd4cf1ff350caf355c8c41a80e47) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: patch CVE-2024-45775Peter Marko2025-03-132-0/+39
| | | | | | | | | | Cherry-pick patch mentioning this CVE. (From OE-Core rev: a9a8ed1b41336913978c6300fac1deed83708ac4) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: patch CVE-2024-45774Peter Marko2025-03-132-0/+38
| | | | | | | | | | Cherry-pick patch mentioning this CVE. (From OE-Core rev: a9a28975b3674f027369fbf40a979bc77ea71d23) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: patch CVE-2025-0624Peter Marko2025-03-132-0/+85
| | | | | | | | | | Cherry-pick patch mentioning this CVE. (From OE-Core rev: 51d7f122bd8154fed3e261003d4accfbd085aad2) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: patch CVE-2024-45783Peter Marko2025-03-132-0/+40
| | | | | | | | | | Cherry-pick patch mentioning this CVE. (From OE-Core rev: 662d705f0f947eef2eab5f72764d421698ca0588) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: patch CVE-2024-45780Peter Marko2025-03-132-0/+94
| | | | | | | | | | Cherry-pick patch mentioning this CVE. (From OE-Core rev: 1b6bc19cb1fbc909f52296f1d82ab8255535a01c) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: patch CVE-2024-45782 and CVE-2024-56737Peter Marko2025-03-132-0/+37
| | | | | | | | | | Cherry-pick patch mentioning these CVEs. (From OE-Core rev: c408aaee0aa6fed6f2b0f14a06f91ef5e91cff9b) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grup: patch CVE-2024-45781Peter Marko2025-03-132-0/+36
| | | | | | | | | | Cherry-pick patch mentioning this CVE. (From OE-Core rev: c9caf81174284969d8f71086f9dc1bb3e3910143) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: backport strlcpy functionPeter Marko2025-03-132-0/+69
| | | | | | | | | | It is used to fix multiple CVEs. (From OE-Core rev: 05791100fe67fd36ef24f98323890a4f3d6c3524) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: drop obsolete CVE statusesPeter Marko2025-03-131-3/+0
| | | | | | | | | | | CVE-2021-46705 was needed only with 2.06 CVE-2023-4692 and CVE-2023-4693 were fixed in NVD DB meanwhile (From OE-Core rev: d4a6b7b559465c2af5c016dd39475df6492c719f) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub2: Add loongarch64 as grub targetXiaotian Wu2025-03-072-1/+4
| | | | | | | (From OE-Core rev: 40b75e0559ccfea533eba1beeec2d73954672f83) Signed-off-by: Xiaotian Wu <wuxiaotian@loongson.cn> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub-efi-cfg: Add GRUB_TITLE for custom GRUB titlesSimon A. Eugster2025-01-201-1/+1
| | | | | | | | | | | | | | Until now, the default title of a boot entry is its label. The label is a variable which determines the script to run during an early boot stage and is not necessarily human readable. This patch allows to provide a human-readable title for each boot entry. (From OE-Core rev: a5a7f6ada786b7f2c1a317f20b7e642f1e978de9) Signed-off-by: Simon A. Eugster <simon.eu@gmail.com> Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub,grub-efi: Remove -mfpmath=sse on x86Khem Raj2024-06-101-0/+4
| | | | | | | | | | | | | | | | | This option fails with clang compiler when testing for soft-float because OE enforces this option via CCARGS however, gtub's makefile/configure does disable all sse options when checking for soft-float support, but it can not disable -mfpmath=sse as its inserted by OE, therefore remove it in recipe Fixes build errors seen with clang/musl like on x86 error: the 'sse' unit is not supported with this instruction set (From OE-Core rev: ad76da4ff6d7110747b620621ae3728de9905465) Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: remove unneeded ↵Alexander Kanavin2024-05-282-45/+0
| | | | | | | | | | | | 0001-Disable-mfpmath-sse-as-well-when-SSE-is-disabled.patch Verified on qemux86 and qemux86-64 with grub and grub-efi. (From OE-Core rev: d06ee594e1bbe15b3a45c9efaaddb1e869a69cb3) Signed-off-by: Alexander Kanavin <alex@linutronix.de> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: mark grub-module-explicitly-keeps-symbole-.module_license.patch as a ↵Alexander Kanavin2024-05-281-1/+1
| | | | | | | | | | workaround (From OE-Core rev: 6307adb5b0644845f4062c21ac5717eb62a61dd3) Signed-off-by: Alexander Kanavin <alex@linutronix.de> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* recipes: Switch away from S = WORKDIRRichard Purdie2024-05-211-1/+2
| | | | | | | | | | | | | Where recipes use S = ${WORKDIR}, change them to set UNPACKDIR to a subdir of WORKDIR and make S point at this instead. I've chosen not to force S into any standard UNPACKDIR we may pick in future just so the S = UNPACKDIR case is clearly visible by the directory naming under WORKDIR as that should aid usability. (From OE-Core rev: d9328e3b0b062f0621de3d114584b44f384a1c02) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* recipes: Start WORKDIR -> UNPACKDIR transitionRichard Purdie2024-05-211-1/+1
| | | | | | | | | Replace references of WORKDIR with UNPACKDIR where it makes sense to do so in preparation for changing the default value of UNPACKDIR. (From OE-Core rev: 1f18b9a512800860d5153d89eb82b56388efad6f) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* meta: Update CVE_STATUS for incorrect cpesSimone Weiß2024-02-241-0/+2
| | | | | | | | | | Set CVE_STATUS as none of the issues apply against the versions used in the recipes. (From OE-Core rev: cea8c8bf73e84133f566d1c2ca0637494f2d7afe) Signed-off-by: Simone Weiß <simone.p.weiss@posteo.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub2: ignore CVE-2024-1048, Redhat only issueSimone Weiß2024-02-181-0/+1
| | | | | | | | | | Redhat/Fedora specific as it affects the grub2-set-bootflag extension added by Redhat to grub. (From OE-Core rev: 40cd768368167f81de5bb55e9ff0584035f4c1b4) Signed-off-by: Simone Weiß <simone.p.weiss@posteo.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub2: ignore CVE-2023-4001, this is Red Hat-specificRoss Burton2024-02-021-0/+1
| | | | | | | | (From OE-Core rev: f99b25355133fe8f65a55737270e67ea10b79d52) Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub2: upgrade 2.06 -> 2.12Anuj Mittal2024-01-2434-2956/+28
| | | | | | | | | | | | | | Drop patches that have been upstreamed. Refresh others. This version dropped extra_deps.lst from the tarball [1] and that leads to build failures. Restore it in do_configure for now. [1] https://git.savannah.gnu.org/cgit/grub.git/commit/?id=b835601c7639ed1890f2d3db91900a8506011a8e (From OE-Core rev: 7c8e1e48075f7f54aec9d295605c982f440be5d5) Signed-off-by: Anuj Mittal <anuj.mittal@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: fs/fat: Don't error when mtime is 0Ming Liu2024-01-032-0/+71
| | | | | | | | | | | A issue was found when I run "runqemu genericx86-64 ovmf", grub failed to boot, it's a known issue has been fixed in grub upstream, backport the fix. (From OE-Core rev: 51eab4bb0cae46c9c32d28986eb97badf47594b7) Signed-off-by: Ming Liu <liu.ming50@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: Fix for CVE-2023-4692 and CVE-2023-4693Xiangyu Chen2023-11-103-0/+163
| | | | | | | | | | | | | | | | | | | | | | | | | | | CVE: CVE-2023-4692 Crafted file system images can cause heap-based buffer overflow and may allow arbitrary code execution and secure boot bypass. Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=43651027d24e62a7a463254165e1e46e42aecdea] CVE: CVE-2023-4693 There an out-of-bounds read at fs/ntfs.c, a physically present attacker may leverage that by presenting a specially crafted NTFS file system image to read arbitrary memory locations. A successful attack may allow sensitive data cached in memory or EFI variables values to be leaked presenting a high Confidentiality risk. Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=0ed2458cc4eff6d9a9199527e2a0b6d445802f94] (From OE-Core rev: a8bc6f041599ce8da275c163c87f155a2f09369c) Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* cve_check: convert CVE_CHECK_IGNORE to CVE_STATUSAndrej Valek2023-07-211-4/+2
| | | | | | | | | | | | | - Try to add convert and apply statuses for old CVEs - Drop some obsolete ignores, while they are not relevant for current version (From OE-Core rev: 1634ed4048cf56788cd5c2c1bdc979b70afcdcd7) Signed-off-by: Andrej Valek <andrej.valek@siemens.com> Reviewed-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: submit determinism.patch upstreamAlexander Kanavin2023-06-151-1/+1
| | | | | | | (From OE-Core rev: 61947762e410c685f667e0af6440fb8a33cd6777) Signed-off-by: Alexander Kanavin <alex@linutronix.de> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub2: support metadata_csum_seed featureKai Kang2023-03-072-0/+67
| | | | | | | | | | | | It enable the metadata_csum_seed feature by default in e2fsprogs 1.47.0 and causes grub doesn't work. Backport patch to make grub support this feature. (From OE-Core rev: ae3b4588d69e534ac8aff136ed44f3975f5a2d4f) Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: Handle R_RISCV_CALL_PLT relocKhem Raj2023-02-242-0/+49
| | | | | | | | | These are new in binutils 2.40+ (From OE-Core rev: f2883fb1d7302087479940b422ba836d2fe35fc4) Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub2: backport patch to fix CVE-2022-2601 CVE-2022-3775Xiangyu Chen2022-12-264-0/+298
| | | | | | | | | | | | | | | | | | | Backport patch from upstream to solve CVE-2022-2601 CVE-2022-3775 dependency: font: Fix size overflow in grub_font_get_glyph_internal() (https://git.savannah.gnu.org/cgit/grub.git/commit/?id=9c76ec09ae08155df27cd237eaea150b4f02f532) Backport patch from upstream to fix following CVEs: CVE-2022-2601: font: Fix several integer overflows in grub_font_construct_glyph() (https://git.savannah.gnu.org/cgit/grub.git/commit/?id=768e1ef2fc159f6e14e7246e4be09363708ac39e) CVE-2022-3775: font: Fix an integer underflow in blit_comb() (https://git.savannah.gnu.org/cgit/grub.git/commit/?id=992c06191babc1e109caf40d6a07ec6fdef427af) (From OE-Core rev: fa5a42150098be892246146456faed778e28ef94) Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Liwei Song <liwei.song@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: backport patches to fix CVE-2022-28736Xiangyu Chen2022-12-084-0/+386
| | | | | | | | (From OE-Core rev: 278e1a0f679be813553b014544314041502a586a) Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: disable build on armv7ve/a with hardfpMingli Yu2022-10-261-2/+2
| | | | | | | | | | | | | | | | | | | | The commit(75dbdea940 grub: Allow build on armv7ve/a with softfp) enable build on armv7ve/a with softfp, but it acutally enable build on armv7ve/a with hardfp altogether and result in below build failure: | checking for compile options to get strict alignment... -mno-unaligned-access | checking if compiler generates unaligned accesses... no | checking if C symbols get an underscore after compilation... no | checking whether target compiler is working... no | configure: error: cannot compile for the target So update the check to disable build on armv7ve/a with hardfp. (From OE-Core rev: f67b2880fc2cfb21f51216c63b5f24d0524b4278) Signed-off-by: Mingli Yu <mingli.yu@windriver.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: Allow build on armv7ve/a with softfpAndrei Gherzan2022-09-211-3/+7
| | | | | | | | | | | | | | | | | | | | Grub tries to force the compilation in softfp mode for some known target CPU. That is because it doesn't use floats or doubles and there are known limitations of using a configuration with hardfp. There are though target CPUs that grub won't know how to configure failing with something similar to: | checking for options to get soft-float... no | configure: error: could not force soft-float This change relaxes a bit the COMPATIBLE_HOST restriction to only apply for hardfp configuration even for arm7ve/a. (From OE-Core rev: 75dbdea94057b6977a20fb738c00c226ca694243) Signed-off-by: Andrei Gherzan <andrei.gherzan@huawei.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: Apply backports to fix build with clang on x86Khem Raj2022-09-203-0/+109
| | | | | | | (From OE-Core rev: 2213b6ce1ec944228d7bb3c95f2e02ac0995b5be) Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub2: fix several CVEsYongxin Liu2022-08-2111-0/+1621
| | | | | | | | | | | | | | | | | | | | Backport CVE patches from upstream to fix: CVE-2021-3695 CVE-2021-3696 CVE-2021-3697 CVE-2022-28733 CVE-2022-28734 CVE-2022-28735 Backport the following 5 patches to make CVE patches be applied smoothly. video-Remove-trailing-whitespaces.patch video-readers-jpeg-Abort-sooner-if-a-read-operation-.patch video-readers-jpeg-Refuse-to-handle-multiple-start-o.patch (From OE-Core rev: db43401a3a4c201f02f4128fa4bac8ce993bfec0) Signed-off-by: Yongxin Liu <yongxin.liu@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: ignore CVE-2021-46705Ross Burton2022-03-291-0/+2
| | | | | | | | | | This is specific to SUSE Linux. (From OE-Core rev: 594baef3b08d40fbbf1899f4cadeb9931c035c1a) Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub-efi: Add option to include all available modulesDiego Sueiro2022-03-121-2/+13
| | | | | | | | | | | | | Include all available modules If 'all' is present in GRUB_BUILDIN variable. To achieve this we need to search for all .mod files in ${B}/grub-core/ and pass them to grub-mkimage command. Also, add the verbose option to grub-mkimage. (From OE-Core rev: ed1bf9aa0af8c12905cf8332bbbb212ab158fe3c) Signed-off-by: Diego Sueiro <diego.sueiro@arm.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* meta/scripts: Automated conversion of OE renamed variablesRichard Purdie2022-02-211-1/+1
| | | | | | (From OE-Core rev: aa52af4518604b5bf13f3c5e885113bf868d6c81) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: Fix build with bintutils 2.38 on riscvKhem Raj2022-02-202-0/+48
| | | | | | | (From OE-Core rev: d42596457628f41baa5729545e2932c6692f73ee) Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* meta/meta-selftest/meta-skeleton: Update LICENSE variable to use SPDX ↵Richard Purdie2022-02-201-1/+1
| | | | | | | | | | | | | license identifiers An automated conversion using scripts/contrib/convert-spdx-licenses.py to convert to use the standard SPDX license identifiers. Two recipes in meta-selftest were not converted as they're that way specifically for testing. A change in linux-firmware was also skipped and may need a more manual tweak. (From OE-Core rev: ceda3238cdbf1beb216ae9ddb242470d5dfc25e0) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub-efi: Add xen_boot support when 'xen' is in DISTRO_FEATURES for aarch64Kamil Dziezyk2022-01-141-0/+3
| | | | | | | | | 'xen-boot' module is available only for aarch64. (From OE-Core rev: bfabc6d4f8742cc1fdeb49c180b0f78faf5739a2) Signed-off-by: Kamil Dziezyk <kamil.dziezyk@arm.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>