2014-02-19 20:10:18 +01:00
|
|
|
################################################################################
|
|
|
|
#
|
|
|
|
# grub2
|
|
|
|
#
|
|
|
|
################################################################################
|
|
|
|
|
2023-12-22 21:38:10 +01:00
|
|
|
GRUB2_VERSION = 2.12
|
2017-04-26 23:39:46 +02:00
|
|
|
GRUB2_SITE = http://ftp.gnu.org/gnu/grub
|
2014-02-19 20:10:18 +01:00
|
|
|
GRUB2_SOURCE = grub-$(GRUB2_VERSION).tar.xz
|
2017-03-30 15:43:33 +02:00
|
|
|
GRUB2_LICENSE = GPL-3.0+
|
2014-02-19 20:10:18 +01:00
|
|
|
GRUB2_LICENSE_FILES = COPYING
|
2023-12-23 21:30:32 +01:00
|
|
|
GRUB2_DEPENDENCIES = host-bison host-flex host-gawk host-grub2
|
|
|
|
HOST_GRUB2_DEPENDENCIES = host-bison host-flex host-gawk
|
2018-09-27 00:37:15 +02:00
|
|
|
GRUB2_INSTALL_IMAGES = YES
|
2018-09-27 00:37:16 +02:00
|
|
|
|
2021-04-05 20:52:30 +02:00
|
|
|
# CVE-2019-14865 is about a flaw in the grub2-set-bootflag tool, which
|
|
|
|
# doesn't exist upstream, but is added by the Redhat/Fedora
|
|
|
|
# packaging. Not applicable to Buildroot.
|
|
|
|
GRUB2_IGNORE_CVES += CVE-2019-14865
|
|
|
|
# CVE-2020-15705 is related to a flaw in the use of the
|
|
|
|
# grub_linuxefi_secure_validate(), which was added by Debian/Ubuntu
|
|
|
|
# patches. The issue doesn't affect upstream Grub, and
|
|
|
|
# grub_linuxefi_secure_validate() is not implemented in the grub2
|
|
|
|
# version available in Buildroot.
|
|
|
|
GRUB2_IGNORE_CVES += CVE-2020-15705
|
2022-09-20 23:29:20 +02:00
|
|
|
# vulnerability is specific to the SUSE distribution
|
|
|
|
GRUB2_IGNORE_CVES += CVE-2021-46705
|
boot/grub2: Backport Boothole securify fixes
Details: https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html
Fixes the following security issues:
* CVE-2020-10713
A flaw was found in grub2, prior to version 2.06. An attacker may
use the GRUB 2 flaw to hijack and tamper the GRUB verification
process. This flaw also allows the bypass of Secure Boot
protections. In order to load an untrusted or modified kernel, an
attacker would first need to establish access to the system such as
gaining physical access, obtain the ability to alter a pxe-boot
network, or have remote access to a networked system with root
access. With this access, an attacker could then craft a string to
cause a buffer overflow by injecting a malicious payload that leads
to arbitrary code execution within GRUB. The highest threat from
this vulnerability is to data confidentiality and integrity as well
as system availability.
* CVE-2020-14308
In grub2 versions before 2.06 the grub memory allocator doesn't
check for possible arithmetic overflows on the requested allocation
size. This leads the function to return invalid memory allocations
which can be further used to cause possible integrity,
confidentiality and availability impacts during the boot process.
* CVE-2020-14309
There's an issue with grub2 in all versions before 2.06 when
handling squashfs filesystems containing a symbolic link with name
length of UINT32 bytes in size. The name size leads to an
arithmetic overflow leading to a zero-size allocation further
causing a heap-based buffer overflow with attacker controlled data.
* CVE-2020-14310
An integer overflow in read_section_from_string may lead to a heap
based buffer overflow.
* CVE-2020-14311
An integer overflow in grub_ext2_read_link may lead to a heap-based
buffer overflow.
* CVE-2020-15706
GRUB2 contains a race condition in grub_script_function_create()
leading to a use-after-free vulnerability which can be triggered by
redefining a function whilst the same function is already
executing, leading to arbitrary code execution and secure boot
restriction bypass
* CVE-2020-15707
Integer overflows were discovered in the functions grub_cmd_initrd
and grub_initrd_init in the efilinux component of GRUB2, as shipped
in Debian, Red Hat, and Ubuntu (the functionality is not included
in GRUB2 upstream), leading to a heap-based buffer overflow. These
could be triggered by an extremely large number of arguments to the
initrd command on 32-bit architectures, or a crafted filesystem
with very large files on any architecture. An attacker could use
this to execute arbitrary code and bypass UEFI Secure Boot
restrictions. This issue affects GRUB2 version 2.04 and prior
versions.
Signed-off-by: Stefan Sørensen <stefan.sorensen@spectralink.com>
Signed-off-by: Peter Korsgaard <peter@korsgaard.com>
2020-08-03 10:00:25 +02:00
|
|
|
|
2018-09-27 00:37:16 +02:00
|
|
|
ifeq ($(BR2_TARGET_GRUB2_INSTALL_TOOLS),y)
|
|
|
|
GRUB2_INSTALL_TARGET = YES
|
|
|
|
else
|
2018-09-27 00:37:15 +02:00
|
|
|
GRUB2_INSTALL_TARGET = NO
|
2018-09-27 00:37:16 +02:00
|
|
|
endif
|
2020-12-04 16:46:01 +01:00
|
|
|
GRUB2_CPE_ID_VENDOR = gnu
|
2014-02-19 20:10:18 +01:00
|
|
|
|
2021-09-23 17:57:21 +02:00
|
|
|
GRUB2_BUILTIN_MODULES_PC = $(call qstrip,$(BR2_TARGET_GRUB2_BUILTIN_MODULES_PC))
|
|
|
|
GRUB2_BUILTIN_MODULES_EFI = $(call qstrip,$(BR2_TARGET_GRUB2_BUILTIN_MODULES_EFI))
|
|
|
|
GRUB2_BUILTIN_CONFIG_PC = $(call qstrip,$(BR2_TARGET_GRUB2_BUILTIN_CONFIG_PC))
|
|
|
|
GRUB2_BUILTIN_CONFIG_EFI = $(call qstrip,$(BR2_TARGET_GRUB2_BUILTIN_CONFIG_EFI))
|
2014-07-01 19:49:47 +02:00
|
|
|
GRUB2_BOOT_PARTITION = $(call qstrip,$(BR2_TARGET_GRUB2_BOOT_PARTITION))
|
|
|
|
|
2021-09-23 17:57:21 +02:00
|
|
|
GRUB2_IMAGE_i386-pc = $(BINARIES_DIR)/grub.img
|
|
|
|
GRUB2_CFG_i386-pc = $(TARGET_DIR)/boot/grub/grub.cfg
|
|
|
|
GRUB2_PREFIX_i386-pc = ($(GRUB2_BOOT_PARTITION))/boot/grub
|
|
|
|
GRUB2_TARGET_i386-pc = i386
|
|
|
|
GRUB2_PLATFORM_i386-pc = pc
|
|
|
|
GRUB2_BUILTIN_CONFIG_i386-pc = $(GRUB2_BUILTIN_CONFIG_PC)
|
|
|
|
GRUB2_BUILTIN_MODULES_i386-pc = $(GRUB2_BUILTIN_MODULES_PC)
|
|
|
|
GRUB2_TUPLES-$(BR2_TARGET_GRUB2_I386_PC) += i386-pc
|
|
|
|
|
|
|
|
GRUB2_IMAGE_i386-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/bootia32.efi
|
|
|
|
GRUB2_CFG_i386-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/grub.cfg
|
|
|
|
GRUB2_PREFIX_i386-efi = /EFI/BOOT
|
|
|
|
GRUB2_TARGET_i386-efi = i386
|
|
|
|
GRUB2_PLATFORM_i386-efi = efi
|
|
|
|
GRUB2_BUILTIN_CONFIG_i386-efi = $(GRUB2_BUILTIN_CONFIG_EFI)
|
|
|
|
GRUB2_BUILTIN_MODULES_i386-efi = $(GRUB2_BUILTIN_MODULES_EFI)
|
|
|
|
GRUB2_TUPLES-$(BR2_TARGET_GRUB2_I386_EFI) += i386-efi
|
|
|
|
|
|
|
|
GRUB2_IMAGE_x86_64-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/bootx64.efi
|
|
|
|
GRUB2_CFG_x86_64-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/grub.cfg
|
|
|
|
GRUB2_PREFIX_x86_64-efi = /EFI/BOOT
|
|
|
|
GRUB2_TARGET_x86_64-efi = x86_64
|
|
|
|
GRUB2_PLATFORM_x86_64-efi = efi
|
|
|
|
GRUB2_BUILTIN_CONFIG_x86_64-efi = $(GRUB2_BUILTIN_CONFIG_EFI)
|
|
|
|
GRUB2_BUILTIN_MODULES_x86_64-efi = $(GRUB2_BUILTIN_MODULES_EFI)
|
|
|
|
GRUB2_TUPLES-$(BR2_TARGET_GRUB2_X86_64_EFI) += x86_64-efi
|
|
|
|
|
|
|
|
GRUB2_IMAGE_arm-uboot = $(BINARIES_DIR)/boot-part/grub/grub.img
|
|
|
|
GRUB2_CFG_arm-uboot = $(BINARIES_DIR)/boot-part/grub/grub.cfg
|
|
|
|
GRUB2_PREFIX_arm-uboot = ($(GRUB2_BOOT_PARTITION))/boot/grub
|
|
|
|
GRUB2_TARGET_arm-uboot = arm
|
|
|
|
GRUB2_PLATFORM_arm-uboot = uboot
|
|
|
|
GRUB2_BUILTIN_CONFIG_arm-uboot = $(GRUB2_BUILTIN_CONFIG_PC)
|
|
|
|
GRUB2_BUILTIN_MODULES_arm-uboot = $(GRUB2_BUILTIN_MODULES_PC)
|
|
|
|
GRUB2_TUPLES-$(BR2_TARGET_GRUB2_ARM_UBOOT) += arm-uboot
|
|
|
|
|
|
|
|
GRUB2_IMAGE_arm-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/bootarm.efi
|
|
|
|
GRUB2_CFG_arm-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/grub.cfg
|
|
|
|
GRUB2_PREFIX_arm-efi = /EFI/BOOT
|
|
|
|
GRUB2_TARGET_arm-efi = arm
|
|
|
|
GRUB2_PLATFORM_arm-efi = efi
|
|
|
|
GRUB2_BUILTIN_CONFIG_arm-efi = $(GRUB2_BUILTIN_CONFIG_EFI)
|
|
|
|
GRUB2_BUILTIN_MODULES_arm-efi = $(GRUB2_BUILTIN_MODULES_EFI)
|
|
|
|
GRUB2_TUPLES-$(BR2_TARGET_GRUB2_ARM_EFI) += arm-efi
|
|
|
|
|
|
|
|
GRUB2_IMAGE_arm64-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/bootaa64.efi
|
|
|
|
GRUB2_CFG_arm64-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/grub.cfg
|
|
|
|
GRUB2_PREFIX_arm64-efi = /EFI/BOOT
|
|
|
|
GRUB2_TARGET_arm64-efi = aarch64
|
|
|
|
GRUB2_PLATFORM_arm64-efi = efi
|
|
|
|
GRUB2_BUILTIN_CONFIG_arm64-efi = $(GRUB2_BUILTIN_CONFIG_EFI)
|
|
|
|
GRUB2_BUILTIN_MODULES_arm64-efi = $(GRUB2_BUILTIN_MODULES_EFI)
|
|
|
|
GRUB2_TUPLES-$(BR2_TARGET_GRUB2_ARM64_EFI) += arm64-efi
|
2014-02-19 20:10:18 +01:00
|
|
|
|
2023-12-23 22:29:47 +01:00
|
|
|
GRUB2_IMAGE_riscv64-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/bootriscv64.efi
|
|
|
|
GRUB2_CFG_riscv64-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/grub.cfg
|
|
|
|
GRUB2_PREFIX_riscv64-efi = /EFI/BOOT
|
|
|
|
GRUB2_TARGET_riscv64-efi = riscv64
|
|
|
|
GRUB2_PLATFORM_riscv64-efi = efi
|
|
|
|
GRUB2_BUILTIN_CONFIG_riscv64-efi = $(GRUB2_BUILTIN_CONFIG_EFI)
|
|
|
|
GRUB2_BUILTIN_MODULES_riscv64-efi = $(GRUB2_BUILTIN_MODULES_EFI)
|
|
|
|
GRUB2_TUPLES-$(BR2_TARGET_GRUB2_RISCV64_EFI) += riscv64-efi
|
|
|
|
|
2014-02-19 20:10:18 +01:00
|
|
|
# Grub2 is kind of special: it considers CC, LD and so on to be the
|
2018-09-27 00:37:15 +02:00
|
|
|
# tools to build the host programs and uses TARGET_CC, TARGET_CFLAGS,
|
|
|
|
# TARGET_CPPFLAGS, TARGET_LDFLAGS to build the bootloader itself.
|
2016-05-21 22:11:09 +02:00
|
|
|
#
|
2017-07-01 14:51:21 +02:00
|
|
|
# NOTE: TARGET_STRIP is overridden by !BR2_STRIP_strip, so always
|
2016-05-21 22:11:09 +02:00
|
|
|
# use the cross compile variant to ensure grub2 builds
|
2014-02-19 20:10:18 +01:00
|
|
|
|
2018-09-27 00:37:15 +02:00
|
|
|
HOST_GRUB2_CONF_ENV = \
|
|
|
|
CPP="$(HOSTCC) -E"
|
|
|
|
|
2014-02-19 20:10:18 +01:00
|
|
|
GRUB2_CONF_ENV = \
|
2018-09-27 00:37:15 +02:00
|
|
|
CPP="$(TARGET_CC) -E" \
|
2014-02-19 20:10:18 +01:00
|
|
|
TARGET_CC="$(TARGET_CC)" \
|
2021-06-25 13:42:51 +02:00
|
|
|
CFLAGS="$(TARGET_CFLAGS) -Os" \
|
|
|
|
TARGET_CFLAGS="$(TARGET_CFLAGS) -Os" \
|
|
|
|
CPPFLAGS="$(TARGET_CPPFLAGS) -Os -fno-stack-protector" \
|
|
|
|
TARGET_CPPFLAGS="$(TARGET_CPPFLAGS) -Os -fno-stack-protector" \
|
|
|
|
TARGET_LDFLAGS="$(TARGET_LDFLAGS) -Os" \
|
2018-09-27 00:37:15 +02:00
|
|
|
TARGET_NM="$(TARGET_NM)" \
|
|
|
|
TARGET_OBJCOPY="$(TARGET_OBJCOPY)" \
|
|
|
|
TARGET_STRIP="$(TARGET_CROSS)strip"
|
2014-02-19 20:10:18 +01:00
|
|
|
|
2018-09-27 00:37:15 +02:00
|
|
|
HOST_GRUB2_CONF_OPTS = \
|
2021-10-22 13:51:34 +02:00
|
|
|
--with-platform=none \
|
2018-09-27 00:37:15 +02:00
|
|
|
--disable-grub-mkfont \
|
|
|
|
--enable-efiemu=no \
|
|
|
|
ac_cv_lib_lzma_lzma_code=no \
|
|
|
|
--enable-device-mapper=no \
|
|
|
|
--enable-libzfs=no \
|
|
|
|
--disable-werror
|
2014-02-19 20:10:18 +01:00
|
|
|
|
2021-09-23 17:57:21 +02:00
|
|
|
define GRUB2_CONFIGURE_CMDS
|
|
|
|
$(foreach tuple, $(GRUB2_TUPLES-y), \
|
2021-10-22 13:51:32 +02:00
|
|
|
@$(call MESSAGE,Configuring $(tuple))
|
2021-10-22 13:51:31 +02:00
|
|
|
mkdir -p $(@D)/build-$(tuple)
|
|
|
|
cd $(@D)/build-$(tuple) && \
|
2021-09-23 17:57:21 +02:00
|
|
|
$(TARGET_CONFIGURE_OPTS) \
|
|
|
|
$(TARGET_CONFIGURE_ARGS) \
|
|
|
|
$(GRUB2_CONF_ENV) \
|
|
|
|
../configure \
|
|
|
|
--target=$(GRUB2_TARGET_$(tuple)) \
|
|
|
|
--with-platform=$(GRUB2_PLATFORM_$(tuple)) \
|
|
|
|
--host=$(GNU_TARGET_NAME) \
|
|
|
|
--build=$(GNU_HOST_NAME) \
|
|
|
|
--prefix=/ \
|
|
|
|
--exec-prefix=/ \
|
|
|
|
--disable-grub-mkfont \
|
|
|
|
--enable-efiemu=no \
|
|
|
|
ac_cv_lib_lzma_lzma_code=no \
|
|
|
|
--enable-device-mapper=no \
|
|
|
|
--enable-libzfs=no \
|
|
|
|
--disable-werror
|
|
|
|
)
|
|
|
|
endef
|
|
|
|
|
|
|
|
define GRUB2_BUILD_CMDS
|
|
|
|
$(foreach tuple, $(GRUB2_TUPLES-y), \
|
2021-10-22 13:51:32 +02:00
|
|
|
@$(call MESSAGE,Building $(tuple))
|
2021-09-23 17:57:21 +02:00
|
|
|
$(TARGET_MAKE_ENV) $(MAKE) -C $(@D)/build-$(tuple)
|
|
|
|
)
|
2015-07-29 13:52:14 +02:00
|
|
|
endef
|
|
|
|
|
2018-09-27 00:37:15 +02:00
|
|
|
define GRUB2_INSTALL_IMAGES_CMDS
|
2021-09-23 17:57:21 +02:00
|
|
|
$(foreach tuple, $(GRUB2_TUPLES-y), \
|
2021-10-22 13:51:32 +02:00
|
|
|
@$(call MESSAGE,Installing $(tuple) to images directory)
|
2021-10-22 13:51:31 +02:00
|
|
|
mkdir -p $(dir $(GRUB2_IMAGE_$(tuple)))
|
2022-07-16 23:04:49 +02:00
|
|
|
$(HOST_DIR)/bin/grub-mkimage \
|
2021-09-23 17:57:21 +02:00
|
|
|
-d $(@D)/build-$(tuple)/grub-core/ \
|
|
|
|
-O $(tuple) \
|
|
|
|
-o $(GRUB2_IMAGE_$(tuple)) \
|
|
|
|
-p "$(GRUB2_PREFIX_$(tuple))" \
|
|
|
|
$(if $(GRUB2_BUILTIN_CONFIG_$(tuple)), \
|
|
|
|
-c $(GRUB2_BUILTIN_CONFIG_$(tuple))) \
|
2021-10-22 13:51:31 +02:00
|
|
|
$(GRUB2_BUILTIN_MODULES_$(tuple))
|
|
|
|
$(INSTALL) -D -m 0644 boot/grub2/grub.cfg $(GRUB2_CFG_$(tuple))
|
2021-09-23 17:57:21 +02:00
|
|
|
$(if $(findstring $(GRUB2_PLATFORM_$(tuple)), pc), \
|
2021-10-22 13:51:33 +02:00
|
|
|
cat $(@D)/build-$(tuple)/grub-core/cdboot.img $(GRUB2_IMAGE_$(tuple)) > \
|
2021-10-22 13:51:31 +02:00
|
|
|
$(BINARIES_DIR)/grub-eltorito.img
|
2021-09-23 17:57:21 +02:00
|
|
|
) \
|
|
|
|
)
|
2014-02-19 20:10:18 +01:00
|
|
|
endef
|
|
|
|
|
2021-10-22 13:51:30 +02:00
|
|
|
ifeq ($(BR2_TARGET_GRUB2_INSTALL_TOOLS),y)
|
|
|
|
define GRUB2_INSTALL_TARGET_CMDS
|
|
|
|
$(foreach tuple, $(GRUB2_TUPLES-y), \
|
2021-10-22 13:51:32 +02:00
|
|
|
@$(call MESSAGE,Installing $(tuple) to target directory)
|
2021-10-22 13:51:30 +02:00
|
|
|
$(TARGET_MAKE_ENV) $(MAKE) -C $(@D)/build-$(tuple) DESTDIR=$(TARGET_DIR) install
|
|
|
|
)
|
|
|
|
endef
|
|
|
|
endif
|
|
|
|
|
2021-09-23 17:57:21 +02:00
|
|
|
$(eval $(generic-package))
|
2018-09-27 00:37:15 +02:00
|
|
|
$(eval $(host-autotools-package))
|