|
|
39700a |
From e396fd48c78901459f39926fe28c9fbc38ffdddb Mon Sep 17 00:00:00 2001
|
|
|
39700a |
From: Peter Jones <pjones@redhat.com>
|
|
|
39700a |
Date: Thu, 18 Sep 2014 11:26:14 -0400
|
|
|
39700a |
Subject: [PATCH] Load arm with SB enabled.
|
|
|
39700a |
|
|
|
39700a |
Make sure we actually try to validate secure boot on this platform (even
|
|
|
39700a |
though we're not shipping it enabled by default.)
|
|
|
39700a |
|
|
|
39700a |
This means giving the kernel grub's loaded image as the vehicle for the
|
|
|
39700a |
kernel command line, because we can't call systab->bs->LoadImage() if SB
|
|
|
39700a |
is enabled.
|
|
|
39700a |
---
|
|
|
39700a |
grub-core/Makefile.core.def | 2 +
|
|
|
39700a |
grub-core/loader/arm64/linux.c | 108 ++++++++++++++++++++------------------
|
|
|
39700a |
grub-core/loader/efi/linux.c | 65 +++++++++++++++++++++++
|
|
|
39700a |
grub-core/loader/i386/efi/linux.c | 39 ++------------
|
|
|
39700a |
include/grub/arm64/linux.h | 8 +++
|
|
|
39700a |
include/grub/efi/linux.h | 31 +++++++++++
|
|
|
39700a |
6 files changed, 166 insertions(+), 87 deletions(-)
|
|
|
39700a |
create mode 100644 grub-core/loader/efi/linux.c
|
|
|
39700a |
create mode 100644 include/grub/efi/linux.h
|
|
|
39700a |
|
|
|
39700a |
diff --git a/grub-core/Makefile.core.def b/grub-core/Makefile.core.def
|
|
|
39700a |
index 9ff9ae5..9378c73 100644
|
|
|
39700a |
--- a/grub-core/Makefile.core.def
|
|
|
39700a |
+++ b/grub-core/Makefile.core.def
|
|
|
39700a |
@@ -1682,6 +1682,7 @@ module = {
|
|
|
39700a |
ia64_efi = loader/ia64/efi/linux.c;
|
|
|
39700a |
arm = loader/arm/linux.c;
|
|
|
39700a |
arm64 = loader/arm64/linux.c;
|
|
|
39700a |
+ arm64 = loader/efi/linux.c;
|
|
|
39700a |
fdt = lib/fdt.c;
|
|
|
39700a |
common = loader/linux.c;
|
|
|
39700a |
common = lib/cmdline.c;
|
|
|
39700a |
@@ -1718,6 +1719,7 @@ module = {
|
|
|
39700a |
name = linuxefi;
|
|
|
39700a |
efi = loader/i386/efi/linux.c;
|
|
|
39700a |
efi = lib/cmdline.c;
|
|
|
39700a |
+ efi = loader/efi/linux.c;
|
|
|
39700a |
enable = i386_efi;
|
|
|
39700a |
enable = x86_64_efi;
|
|
|
39700a |
};
|
|
|
39700a |
diff --git a/grub-core/loader/arm64/linux.c b/grub-core/loader/arm64/linux.c
|
|
|
39700a |
index 0dc144e..bdd9c9b 100644
|
|
|
39700a |
--- a/grub-core/loader/arm64/linux.c
|
|
|
39700a |
+++ b/grub-core/loader/arm64/linux.c
|
|
|
39700a |
@@ -27,6 +27,7 @@
|
|
|
39700a |
#include <grub/types.h>
|
|
|
39700a |
#include <grub/cpu/linux.h>
|
|
|
39700a |
#include <grub/efi/efi.h>
|
|
|
39700a |
+#include <grub/efi/linux.h>
|
|
|
39700a |
#include <grub/efi/pe32.h>
|
|
|
39700a |
#include <grub/i18n.h>
|
|
|
39700a |
#include <grub/lib/cmdline.h>
|
|
|
39700a |
@@ -44,6 +45,7 @@ static int loaded;
|
|
|
39700a |
|
|
|
39700a |
static void *kernel_addr;
|
|
|
39700a |
static grub_uint64_t kernel_size;
|
|
|
39700a |
+static grub_uint32_t handover_offset;
|
|
|
39700a |
|
|
|
39700a |
static char *linux_args;
|
|
|
39700a |
static grub_uint32_t cmdline_size;
|
|
|
39700a |
@@ -135,7 +137,9 @@ finalize_params (void)
|
|
|
39700a |
{
|
|
|
39700a |
grub_efi_boot_services_t *b;
|
|
|
39700a |
grub_efi_status_t status;
|
|
|
39700a |
+ grub_efi_loaded_image_t *loaded_image = NULL;
|
|
|
39700a |
int node, retval;
|
|
|
39700a |
+ int len;
|
|
|
39700a |
|
|
|
39700a |
get_fdt ();
|
|
|
39700a |
if (!fdt)
|
|
|
39700a |
@@ -172,6 +176,23 @@ finalize_params (void)
|
|
|
39700a |
grub_dprintf ("linux", "Installed/updated FDT configuration table @ %p\n",
|
|
|
39700a |
fdt);
|
|
|
39700a |
|
|
|
39700a |
+ /* Convert command line to UCS-2 */
|
|
|
39700a |
+ loaded_image = grub_efi_get_loaded_image (grub_efi_image_handle);
|
|
|
39700a |
+ if (!loaded_image)
|
|
|
39700a |
+ goto failure;
|
|
|
39700a |
+
|
|
|
39700a |
+ loaded_image->load_options_size = len =
|
|
|
39700a |
+ (grub_strlen (linux_args) + 1) * sizeof (grub_efi_char16_t);
|
|
|
39700a |
+ loaded_image->load_options =
|
|
|
39700a |
+ grub_efi_allocate_pages (0,
|
|
|
39700a |
+ BYTES_TO_PAGES (loaded_image->load_options_size));
|
|
|
39700a |
+ if (!loaded_image->load_options)
|
|
|
39700a |
+ return grub_error(GRUB_ERR_BAD_OS, "failed to create kernel parameters");
|
|
|
39700a |
+
|
|
|
39700a |
+ loaded_image->load_options_size =
|
|
|
39700a |
+ 2 * grub_utf8_to_utf16 (loaded_image->load_options, len,
|
|
|
39700a |
+ (grub_uint8_t *) linux_args, len, NULL);
|
|
|
39700a |
+
|
|
|
39700a |
return GRUB_ERR_NONE;
|
|
|
39700a |
|
|
|
39700a |
failure:
|
|
|
39700a |
@@ -181,6 +202,23 @@ failure:
|
|
|
39700a |
return grub_error(GRUB_ERR_BAD_OS, "failed to install/update FDT");
|
|
|
39700a |
}
|
|
|
39700a |
|
|
|
39700a |
+static void
|
|
|
39700a |
+free_params (void)
|
|
|
39700a |
+{
|
|
|
39700a |
+ grub_efi_loaded_image_t *loaded_image = NULL;
|
|
|
39700a |
+
|
|
|
39700a |
+ loaded_image = grub_efi_get_loaded_image (grub_efi_image_handle);
|
|
|
39700a |
+ if (loaded_image)
|
|
|
39700a |
+ {
|
|
|
39700a |
+ if (loaded_image->load_options)
|
|
|
39700a |
+ grub_efi_free_pages ((grub_efi_physical_address_t)
|
|
|
39700a |
+ loaded_image->load_options,
|
|
|
39700a |
+ BYTES_TO_PAGES (loaded_image->load_options_size));
|
|
|
39700a |
+ loaded_image->load_options = NULL;
|
|
|
39700a |
+ loaded_image->load_options_size = 0;
|
|
|
39700a |
+ }
|
|
|
39700a |
+}
|
|
|
39700a |
+
|
|
|
39700a |
static grub_err_t
|
|
|
39700a |
grub_cmd_devicetree (grub_command_t cmd __attribute__ ((unused)),
|
|
|
39700a |
int argc, char *argv[])
|
|
|
39700a |
@@ -199,6 +237,10 @@ grub_cmd_devicetree (grub_command_t cmd __attribute__ ((unused)),
|
|
|
39700a |
if (argc != 1)
|
|
|
39700a |
return grub_error (GRUB_ERR_BAD_ARGUMENT, N_("filename expected"));
|
|
|
39700a |
|
|
|
39700a |
+ if (grub_efi_secure_boot ())
|
|
|
39700a |
+ return grub_error (GRUB_ERR_INVALID_COMMAND,
|
|
|
39700a |
+ N_("Not loading devicetree - Secure Boot is enabled"));
|
|
|
39700a |
+
|
|
|
39700a |
if (loaded_fdt)
|
|
|
39700a |
grub_free (loaded_fdt);
|
|
|
39700a |
loaded_fdt = NULL;
|
|
|
39700a |
@@ -243,65 +285,20 @@ out:
|
|
|
39700a |
static grub_err_t
|
|
|
39700a |
grub_linux_boot (void)
|
|
|
39700a |
{
|
|
|
39700a |
- grub_efi_memory_mapped_device_path_t *mempath;
|
|
|
39700a |
- grub_efi_handle_t image_handle;
|
|
|
39700a |
- grub_efi_boot_services_t *b;
|
|
|
39700a |
- grub_efi_status_t status;
|
|
|
39700a |
grub_err_t retval;
|
|
|
39700a |
- grub_efi_loaded_image_t *loaded_image;
|
|
|
39700a |
- int len;
|
|
|
39700a |
|
|
|
39700a |
retval = finalize_params();
|
|
|
39700a |
if (retval != GRUB_ERR_NONE)
|
|
|
39700a |
return retval;
|
|
|
39700a |
|
|
|
39700a |
- mempath = grub_malloc (2 * sizeof (grub_efi_memory_mapped_device_path_t));
|
|
|
39700a |
- if (!mempath)
|
|
|
39700a |
- return grub_errno;
|
|
|
39700a |
-
|
|
|
39700a |
- mempath[0].header.type = GRUB_EFI_HARDWARE_DEVICE_PATH_TYPE;
|
|
|
39700a |
- mempath[0].header.subtype = GRUB_EFI_MEMORY_MAPPED_DEVICE_PATH_SUBTYPE;
|
|
|
39700a |
- mempath[0].header.length = grub_cpu_to_le16_compile_time (sizeof (*mempath));
|
|
|
39700a |
- mempath[0].memory_type = GRUB_EFI_LOADER_DATA;
|
|
|
39700a |
- mempath[0].start_address = (grub_addr_t) kernel_addr;
|
|
|
39700a |
- mempath[0].end_address = (grub_addr_t) kernel_addr + kernel_size;
|
|
|
39700a |
-
|
|
|
39700a |
- mempath[1].header.type = GRUB_EFI_END_DEVICE_PATH_TYPE;
|
|
|
39700a |
- mempath[1].header.subtype = GRUB_EFI_END_ENTIRE_DEVICE_PATH_SUBTYPE;
|
|
|
39700a |
- mempath[1].header.length = sizeof (grub_efi_device_path_t);
|
|
|
39700a |
-
|
|
|
39700a |
- b = grub_efi_system_table->boot_services;
|
|
|
39700a |
- status = b->load_image (0, grub_efi_image_handle,
|
|
|
39700a |
- (grub_efi_device_path_t *) mempath,
|
|
|
39700a |
- kernel_addr, kernel_size, &image_handle);
|
|
|
39700a |
- if (status != GRUB_EFI_SUCCESS)
|
|
|
39700a |
- return grub_error (GRUB_ERR_BAD_OS, "cannot load image");
|
|
|
39700a |
-
|
|
|
39700a |
grub_dprintf ("linux", "linux command line: '%s'\n", linux_args);
|
|
|
39700a |
|
|
|
39700a |
- /* Convert command line to UCS-2 */
|
|
|
39700a |
- loaded_image = grub_efi_get_loaded_image (image_handle);
|
|
|
39700a |
- loaded_image->load_options_size = len =
|
|
|
39700a |
- (grub_strlen (linux_args) + 1) * sizeof (grub_efi_char16_t);
|
|
|
39700a |
- loaded_image->load_options =
|
|
|
39700a |
- grub_efi_allocate_pages (0,
|
|
|
39700a |
- BYTES_TO_PAGES (loaded_image->load_options_size));
|
|
|
39700a |
- if (!loaded_image->load_options)
|
|
|
39700a |
- return grub_errno;
|
|
|
39700a |
+ retval = grub_efi_linux_boot ((char *)kernel_addr, handover_offset,
|
|
|
39700a |
+ kernel_addr);
|
|
|
39700a |
|
|
|
39700a |
- loaded_image->load_options_size =
|
|
|
39700a |
- 2 * grub_utf8_to_utf16 (loaded_image->load_options, len,
|
|
|
39700a |
- (grub_uint8_t *) linux_args, len, NULL);
|
|
|
39700a |
-
|
|
|
39700a |
- grub_dprintf("linux", "starting image %p\n", image_handle);
|
|
|
39700a |
- status = b->start_image (image_handle, 0, NULL);
|
|
|
39700a |
-
|
|
|
39700a |
- /* When successful, not reached */
|
|
|
39700a |
- b->unload_image (image_handle);
|
|
|
39700a |
- grub_efi_free_pages ((grub_efi_physical_address_t) loaded_image->load_options,
|
|
|
39700a |
- BYTES_TO_PAGES (loaded_image->load_options_size));
|
|
|
39700a |
-
|
|
|
39700a |
- return grub_errno;
|
|
|
39700a |
+ /* Never reached... */
|
|
|
39700a |
+ free_params();
|
|
|
39700a |
+ return retval;
|
|
|
39700a |
}
|
|
|
39700a |
|
|
|
39700a |
static grub_err_t
|
|
|
39700a |
@@ -382,6 +379,7 @@ grub_cmd_linux (grub_command_t cmd __attribute__ ((unused)),
|
|
|
39700a |
{
|
|
|
39700a |
grub_file_t file = 0;
|
|
|
39700a |
struct grub_arm64_linux_kernel_header lh;
|
|
|
39700a |
+ struct grub_arm64_linux_pe_header *pe;
|
|
|
39700a |
|
|
|
39700a |
grub_dl_ref (my_mod);
|
|
|
39700a |
|
|
|
39700a |
@@ -426,6 +424,15 @@ grub_cmd_linux (grub_command_t cmd __attribute__ ((unused)),
|
|
|
39700a |
|
|
|
39700a |
grub_dprintf ("linux", "kernel @ %p\n", kernel_addr);
|
|
|
39700a |
|
|
|
39700a |
+ if (!grub_linuxefi_secure_validate (kernel_addr, kernel_size))
|
|
|
39700a |
+ {
|
|
|
39700a |
+ grub_error (GRUB_ERR_INVALID_COMMAND, N_("%s has invalid signature"), argv[0]);
|
|
|
39700a |
+ goto fail;
|
|
|
39700a |
+ }
|
|
|
39700a |
+
|
|
|
39700a |
+ pe = (void *)((unsigned long)kernel_addr + lh.hdr_offset);
|
|
|
39700a |
+ handover_offset = pe->opt.entry_addr;
|
|
|
39700a |
+
|
|
|
39700a |
cmdline_size = grub_loader_cmdline_size (argc, argv) + sizeof (LINUX_IMAGE);
|
|
|
39700a |
linux_args = grub_malloc (cmdline_size);
|
|
|
39700a |
if (!linux_args)
|
|
|
39700a |
@@ -464,7 +471,6 @@ fail:
|
|
|
39700a |
return grub_errno;
|
|
|
39700a |
}
|
|
|
39700a |
|
|
|
39700a |
-
|
|
|
39700a |
static grub_command_t cmd_linux, cmd_initrd, cmd_devicetree;
|
|
|
39700a |
|
|
|
39700a |
GRUB_MOD_INIT (linux)
|
|
|
39700a |
diff --git a/grub-core/loader/efi/linux.c b/grub-core/loader/efi/linux.c
|
|
|
39700a |
new file mode 100644
|
|
|
39700a |
index 0000000..aea378a
|
|
|
39700a |
--- /dev/null
|
|
|
39700a |
+++ b/grub-core/loader/efi/linux.c
|
|
|
39700a |
@@ -0,0 +1,65 @@
|
|
|
39700a |
+/*
|
|
|
39700a |
+ * GRUB -- GRand Unified Bootloader
|
|
|
39700a |
+ * Copyright (C) 2014 Free Software Foundation, Inc.
|
|
|
39700a |
+ *
|
|
|
39700a |
+ * GRUB is free software: you can redistribute it and/or modify
|
|
|
39700a |
+ * it under the terms of the GNU General Public License as published by
|
|
|
39700a |
+ * the Free Software Foundation, either version 3 of the License, or
|
|
|
39700a |
+ * (at your option) any later version.
|
|
|
39700a |
+ *
|
|
|
39700a |
+ * GRUB is distributed in the hope that it will be useful,
|
|
|
39700a |
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
39700a |
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
39700a |
+ * GNU General Public License for more details.
|
|
|
39700a |
+ *
|
|
|
39700a |
+ * You should have received a copy of the GNU General Public License
|
|
|
39700a |
+ * along with GRUB. If not, see <http://www.gnu.org/licenses/>.
|
|
|
39700a |
+ */
|
|
|
39700a |
+
|
|
|
39700a |
+#include <grub/err.h>
|
|
|
39700a |
+#include <grub/mm.h>
|
|
|
39700a |
+#include <grub/types.h>
|
|
|
39700a |
+#include <grub/cpu/linux.h>
|
|
|
39700a |
+#include <grub/efi/efi.h>
|
|
|
39700a |
+#include <grub/efi/pe32.h>
|
|
|
39700a |
+#include <grub/efi/linux.h>
|
|
|
39700a |
+
|
|
|
39700a |
+#define SHIM_LOCK_GUID \
|
|
|
39700a |
+ { 0x605dab50, 0xe046, 0x4300, {0xab, 0xb6, 0x3d, 0xd8, 0x10, 0xdd, 0x8b, 0x23} }
|
|
|
39700a |
+
|
|
|
39700a |
+struct grub_efi_shim_lock
|
|
|
39700a |
+{
|
|
|
39700a |
+ grub_efi_status_t (*verify) (void *buffer, grub_uint32_t size);
|
|
|
39700a |
+};
|
|
|
39700a |
+typedef struct grub_efi_shim_lock grub_efi_shim_lock_t;
|
|
|
39700a |
+
|
|
|
39700a |
+grub_efi_boolean_t
|
|
|
39700a |
+grub_linuxefi_secure_validate (void *data, grub_uint32_t size)
|
|
|
39700a |
+{
|
|
|
39700a |
+ grub_efi_guid_t guid = SHIM_LOCK_GUID;
|
|
|
39700a |
+ grub_efi_shim_lock_t *shim_lock;
|
|
|
39700a |
+
|
|
|
39700a |
+ shim_lock = grub_efi_locate_protocol(&guid, NULL);
|
|
|
39700a |
+
|
|
|
39700a |
+ if (!shim_lock)
|
|
|
39700a |
+ return 1;
|
|
|
39700a |
+
|
|
|
39700a |
+ if (shim_lock->verify(data, size) == GRUB_EFI_SUCCESS)
|
|
|
39700a |
+ return 1;
|
|
|
39700a |
+
|
|
|
39700a |
+ return 0;
|
|
|
39700a |
+}
|
|
|
39700a |
+
|
|
|
39700a |
+typedef void (*handover_func) (void *, grub_efi_system_table_t *, void *);
|
|
|
39700a |
+
|
|
|
39700a |
+grub_err_t
|
|
|
39700a |
+grub_efi_linux_boot (void *kernel_addr, grub_off_t offset,
|
|
|
39700a |
+ void *kernel_params)
|
|
|
39700a |
+{
|
|
|
39700a |
+ handover_func hf;
|
|
|
39700a |
+
|
|
|
39700a |
+ hf = (handover_func)((char *)kernel_addr + offset);
|
|
|
39700a |
+ hf (grub_efi_image_handle, grub_efi_system_table, kernel_params);
|
|
|
39700a |
+
|
|
|
39700a |
+ return GRUB_ERR_BUG;
|
|
|
39700a |
+}
|
|
|
39700a |
diff --git a/grub-core/loader/i386/efi/linux.c b/grub-core/loader/i386/efi/linux.c
|
|
|
39700a |
index b79e632..e5b7785 100644
|
|
|
39700a |
--- a/grub-core/loader/i386/efi/linux.c
|
|
|
39700a |
+++ b/grub-core/loader/i386/efi/linux.c
|
|
|
39700a |
@@ -26,6 +26,7 @@
|
|
|
39700a |
#include <grub/i18n.h>
|
|
|
39700a |
#include <grub/lib/cmdline.h>
|
|
|
39700a |
#include <grub/efi/efi.h>
|
|
|
39700a |
+#include <grub/efi/linux.h>
|
|
|
39700a |
|
|
|
39700a |
GRUB_MOD_LICENSE ("GPLv3+");
|
|
|
39700a |
|
|
|
39700a |
@@ -40,52 +41,18 @@ static char *linux_cmdline;
|
|
|
39700a |
|
|
|
39700a |
#define BYTES_TO_PAGES(bytes) (((bytes) + 0xfff) >> 12)
|
|
|
39700a |
|
|
|
39700a |
-#define SHIM_LOCK_GUID \
|
|
|
39700a |
- { 0x605dab50, 0xe046, 0x4300, {0xab, 0xb6, 0x3d, 0xd8, 0x10, 0xdd, 0x8b, 0x23} }
|
|
|
39700a |
-
|
|
|
39700a |
-struct grub_efi_shim_lock
|
|
|
39700a |
-{
|
|
|
39700a |
- grub_efi_status_t (*verify) (void *buffer, grub_uint32_t size);
|
|
|
39700a |
-};
|
|
|
39700a |
-typedef struct grub_efi_shim_lock grub_efi_shim_lock_t;
|
|
|
39700a |
-
|
|
|
39700a |
-static grub_efi_boolean_t
|
|
|
39700a |
-grub_linuxefi_secure_validate (void *data, grub_uint32_t size)
|
|
|
39700a |
-{
|
|
|
39700a |
- grub_efi_guid_t guid = SHIM_LOCK_GUID;
|
|
|
39700a |
- grub_efi_shim_lock_t *shim_lock;
|
|
|
39700a |
-
|
|
|
39700a |
- shim_lock = grub_efi_locate_protocol(&guid, NULL);
|
|
|
39700a |
-
|
|
|
39700a |
- if (!shim_lock)
|
|
|
39700a |
- return 1;
|
|
|
39700a |
-
|
|
|
39700a |
- if (shim_lock->verify(data, size) == GRUB_EFI_SUCCESS)
|
|
|
39700a |
- return 1;
|
|
|
39700a |
-
|
|
|
39700a |
- return 0;
|
|
|
39700a |
-}
|
|
|
39700a |
-
|
|
|
39700a |
-typedef void(*handover_func)(void *, grub_efi_system_table_t *, struct linux_kernel_params *);
|
|
|
39700a |
-
|
|
|
39700a |
static grub_err_t
|
|
|
39700a |
grub_linuxefi_boot (void)
|
|
|
39700a |
{
|
|
|
39700a |
- handover_func hf;
|
|
|
39700a |
int offset = 0;
|
|
|
39700a |
|
|
|
39700a |
#ifdef __x86_64__
|
|
|
39700a |
offset = 512;
|
|
|
39700a |
#endif
|
|
|
39700a |
-
|
|
|
39700a |
- hf = (handover_func)((char *)kernel_mem + handover_offset + offset);
|
|
|
39700a |
-
|
|
|
39700a |
asm volatile ("cli");
|
|
|
39700a |
|
|
|
39700a |
- hf (grub_efi_image_handle, grub_efi_system_table, params);
|
|
|
39700a |
-
|
|
|
39700a |
- /* Not reached */
|
|
|
39700a |
- return GRUB_ERR_NONE;
|
|
|
39700a |
+ return grub_efi_linux_boot ((char *)kernel_mem, handover_offset + offset,
|
|
|
39700a |
+ params);
|
|
|
39700a |
}
|
|
|
39700a |
|
|
|
39700a |
static grub_err_t
|
|
|
39700a |
diff --git a/include/grub/arm64/linux.h b/include/grub/arm64/linux.h
|
|
|
39700a |
index 864e5dc..2cbd64f 100644
|
|
|
39700a |
--- a/include/grub/arm64/linux.h
|
|
|
39700a |
+++ b/include/grub/arm64/linux.h
|
|
|
39700a |
@@ -20,6 +20,7 @@
|
|
|
39700a |
#define GRUB_LINUX_CPU_HEADER 1
|
|
|
39700a |
|
|
|
39700a |
#include <grub/efi/efi.h>
|
|
|
39700a |
+#include <grub/efi/pe32.h>
|
|
|
39700a |
|
|
|
39700a |
#define GRUB_ARM64_LINUX_MAGIC 0x644d5241 /* 'ARM\x64' */
|
|
|
39700a |
|
|
|
39700a |
@@ -38,4 +39,11 @@ struct grub_arm64_linux_kernel_header
|
|
|
39700a |
grub_uint32_t hdr_offset; /* Offset of PE/COFF header */
|
|
|
39700a |
};
|
|
|
39700a |
|
|
|
39700a |
+struct grub_arm64_linux_pe_header
|
|
|
39700a |
+{
|
|
|
39700a |
+ grub_uint32_t magic;
|
|
|
39700a |
+ struct grub_pe32_coff_header coff;
|
|
|
39700a |
+ struct grub_pe64_optional_header opt;
|
|
|
39700a |
+};
|
|
|
39700a |
+
|
|
|
39700a |
#endif /* ! GRUB_LINUX_CPU_HEADER */
|
|
|
39700a |
diff --git a/include/grub/efi/linux.h b/include/grub/efi/linux.h
|
|
|
39700a |
new file mode 100644
|
|
|
39700a |
index 0000000..d9ede36
|
|
|
39700a |
--- /dev/null
|
|
|
39700a |
+++ b/include/grub/efi/linux.h
|
|
|
39700a |
@@ -0,0 +1,31 @@
|
|
|
39700a |
+/*
|
|
|
39700a |
+ * GRUB -- GRand Unified Bootloader
|
|
|
39700a |
+ * Copyright (C) 2014 Free Software Foundation, Inc.
|
|
|
39700a |
+ *
|
|
|
39700a |
+ * GRUB is free software: you can redistribute it and/or modify
|
|
|
39700a |
+ * it under the terms of the GNU General Public License as published by
|
|
|
39700a |
+ * the Free Software Foundation, either version 3 of the License, or
|
|
|
39700a |
+ * (at your option) any later version.
|
|
|
39700a |
+ *
|
|
|
39700a |
+ * GRUB is distributed in the hope that it will be useful,
|
|
|
39700a |
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
39700a |
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
39700a |
+ * GNU General Public License for more details.
|
|
|
39700a |
+ *
|
|
|
39700a |
+ * You should have received a copy of the GNU General Public License
|
|
|
39700a |
+ * along with GRUB. If not, see <http://www.gnu.org/licenses/>.
|
|
|
39700a |
+ */
|
|
|
39700a |
+#ifndef GRUB_EFI_LINUX_HEADER
|
|
|
39700a |
+#define GRUB_EFI_LINUX_HEADER 1
|
|
|
39700a |
+
|
|
|
39700a |
+#include <grub/efi/api.h>
|
|
|
39700a |
+#include <grub/err.h>
|
|
|
39700a |
+#include <grub/symbol.h>
|
|
|
39700a |
+
|
|
|
39700a |
+grub_efi_boolean_t
|
|
|
39700a |
+EXPORT_FUNC(grub_linuxefi_secure_validate) (void *data, grub_uint32_t size);
|
|
|
39700a |
+grub_err_t
|
|
|
39700a |
+EXPORT_FUNC(grub_efi_linux_boot) (void *kernel_address, grub_off_t offset,
|
|
|
39700a |
+ void *kernel_param);
|
|
|
39700a |
+
|
|
|
39700a |
+#endif /* ! GRUB_EFI_LINUX_HEADER */
|
|
|
39700a |
--
|
|
|
39700a |
1.9.3
|
|
|
39700a |
|