8ee92f5194
- Implement NV index mode for TPM 2.0 key protector 0001-protectors-Implement-NV-index.patch - Fall back to passphrase mode when the key protector fails to unlock the disk 0002-cryptodisk-Fallback-to-passphrase.patch - Wipe out the cached key cleanly 0003-cryptodisk-wipe-out-the-cached-keys-from-protectors.patch - Make diskfiler to look up cryptodisk devices first 0004-diskfilter-look-up-cryptodisk-devices-first.patch - Version bump to 2.12~rc1 * Added: - grub-2.12~rc1.tar.xz * Removed: - grub-2.06.tar.xz * Patch dropped merged by new version: - grub2-GRUB_CMDLINE_LINUX_RECOVERY-for-recovery-mode.patch - grub2-s390x-02-kexec-module-added-to-emu.patch - grub2-efi-chainloader-root.patch - grub2-Fix-incorrect-netmask-on-ppc64.patch - 0001-osdep-Introduce-include-grub-osdep-major.h-and-use-i.patch - 0002-osdep-linux-hostdisk-Use-stat-instead-of-udevadm-for.patch - 0002-net-read-bracketed-ipv6-addrs-and-port-numbers.patch - grub2-s390x-10-keep-network-at-kexec.patch - 0001-Fix-build-error-in-binutils-2.36.patch - 0001-emu-fix-executable-stack-marking.patch - 0046-squash-verifiers-Move-verifiers-API-to-kernel-image.patch - 0001-30_uefi-firmware-fix-printf-format-with-null-byte.patch - 0001-tpm-Pass-unknown-error-as-non-fatal-but-debug-print-.patch - 0001-Filter-out-POSIX-locale-for-translation.patch OBS-URL: https://build.opensuse.org/request/show/1105405 OBS-URL: https://build.opensuse.org/package/show/Base:System/grub2?expand=0&rev=458
165 lines
4.1 KiB
Diff
165 lines
4.1 KiB
Diff
From 496b6b20cbce3fc27228d1d8290089fb7107b8de Mon Sep 17 00:00:00 2001
|
|
From: Michael Chang <mchang@suse.com>
|
|
Date: Fri, 18 Feb 2022 21:51:16 +0800
|
|
Subject: [PATCH 5/5] export environment at start up
|
|
|
|
If the prep_loadenv module is built into the core image, it will read
|
|
the environment block automatically during start up and export all
|
|
variables. The will ease integration with those without early scripts to
|
|
running the command.
|
|
|
|
Signed-off-by: Michael Chang <mchang@suse.com>
|
|
---
|
|
grub-core/Makefile.core.def | 2 +
|
|
grub-core/commands/prep_loadenv.c | 77 +++++++++++++++++++++++++++++++
|
|
grub-core/kern/env.c | 2 +
|
|
grub-core/kern/main.c | 3 ++
|
|
include/grub/env.h | 1 +
|
|
5 files changed, 85 insertions(+)
|
|
|
|
--- a/grub-core/Makefile.core.def
|
|
+++ b/grub-core/Makefile.core.def
|
|
@@ -2678,4 +2678,6 @@
|
|
name = prep_loadenv;
|
|
common = commands/prep_loadenv.c;
|
|
enable = powerpc_ieee1275;
|
|
+ cflags = '$(CFLAGS_POSIX) $(CFLAGS_GNULIB)';
|
|
+ cppflags = '$(CPPFLAGS_POSIX) $(CPPFLAGS_GNULIB)';
|
|
};
|
|
--- a/grub-core/commands/prep_loadenv.c
|
|
+++ b/grub-core/commands/prep_loadenv.c
|
|
@@ -10,6 +10,7 @@
|
|
#include <grub/extcmd.h>
|
|
#include <grub/i18n.h>
|
|
#include <grub/gpt_partition.h>
|
|
+#include <regex.h>
|
|
|
|
GRUB_MOD_LICENSE ("GPLv3+");
|
|
|
|
@@ -185,6 +186,65 @@
|
|
}
|
|
|
|
static grub_err_t
|
|
+boot_disk_prep_partname (char **name)
|
|
+{
|
|
+ regex_t regex;
|
|
+ int ret;
|
|
+ grub_size_t s;
|
|
+ char *comperr;
|
|
+ const char *cmdpath;
|
|
+ regmatch_t *matches = NULL;
|
|
+ grub_err_t err = GRUB_ERR_NONE;
|
|
+
|
|
+ *name = NULL;
|
|
+
|
|
+ cmdpath = grub_env_get ("cmdpath");
|
|
+ if (!cmdpath)
|
|
+ return GRUB_ERR_NONE;
|
|
+
|
|
+ ret = regcomp (®ex, "\\(([^,]+)(,?.*)?\\)(.*)", REG_EXTENDED);
|
|
+ if (ret)
|
|
+ goto fail;
|
|
+
|
|
+ matches = grub_calloc (regex.re_nsub + 1, sizeof (*matches));
|
|
+ if (! matches)
|
|
+ goto fail;
|
|
+
|
|
+ ret = regexec (®ex, cmdpath, regex.re_nsub + 1, matches, 0);
|
|
+ if (!ret)
|
|
+ {
|
|
+ char *devname = devname = match_substr (matches + 1, cmdpath);
|
|
+ if (!devname)
|
|
+ {
|
|
+ err = grub_error (GRUB_ERR_FILE_NOT_FOUND, "%s contains no disk name", cmdpath);
|
|
+ goto out;
|
|
+ }
|
|
+
|
|
+ err = prep_partname (devname, name);
|
|
+ out:
|
|
+ grub_free (devname);
|
|
+ regfree (®ex);
|
|
+ grub_free (matches);
|
|
+ return err;
|
|
+ }
|
|
+
|
|
+ fail:
|
|
+ grub_free (matches);
|
|
+ s = regerror (ret, ®ex, 0, 0);
|
|
+ comperr = grub_malloc (s);
|
|
+ if (!comperr)
|
|
+ {
|
|
+ regfree (®ex);
|
|
+ return grub_errno;
|
|
+ }
|
|
+ regerror (ret, ®ex, comperr, s);
|
|
+ err = grub_error (GRUB_ERR_TEST_FAILURE, "%s", comperr);
|
|
+ regfree (®ex);
|
|
+ grub_free (comperr);
|
|
+ return err;
|
|
+}
|
|
+
|
|
+static grub_err_t
|
|
grub_cmd_prep_loadenv (grub_command_t cmd __attribute__ ((unused)),
|
|
int argc,
|
|
char **argv)
|
|
@@ -214,10 +274,27 @@
|
|
return GRUB_ERR_NONE;
|
|
}
|
|
|
|
+static void
|
|
+early_prep_loadenv (void)
|
|
+{
|
|
+ grub_err_t err;
|
|
+ char *prep;
|
|
+
|
|
+ err = boot_disk_prep_partname (&prep);
|
|
+ if (err == GRUB_ERR_NONE && prep)
|
|
+ err = prep_read_envblk (prep);
|
|
+ if (err == GRUB_ERR_BAD_FILE_TYPE || err == GRUB_ERR_FILE_NOT_FOUND)
|
|
+ grub_error_pop ();
|
|
+ if (err != GRUB_ERR_NONE)
|
|
+ grub_print_error ();
|
|
+ grub_free (prep);
|
|
+}
|
|
+
|
|
static grub_command_t cmd_prep_load;
|
|
|
|
GRUB_MOD_INIT(prep_loadenv)
|
|
{
|
|
+ early_env_hook = early_prep_loadenv;
|
|
cmd_prep_load =
|
|
grub_register_command("prep_load_env", grub_cmd_prep_loadenv,
|
|
"DEVICE",
|
|
--- a/grub-core/kern/env.c
|
|
+++ b/grub-core/kern/env.c
|
|
@@ -28,6 +28,8 @@
|
|
/* The current context. */
|
|
struct grub_env_context *grub_current_context = &initial_context;
|
|
|
|
+void (*early_env_hook) (void) = NULL;
|
|
+
|
|
/* Return the hash representation of the string S. */
|
|
static unsigned int
|
|
grub_env_hashval (const char *s)
|
|
--- a/grub-core/kern/main.c
|
|
+++ b/grub-core/kern/main.c
|
|
@@ -309,6 +309,9 @@
|
|
|
|
grub_boot_time ("Before execution of embedded config.");
|
|
|
|
+ if (early_env_hook != NULL)
|
|
+ early_env_hook ();
|
|
+
|
|
if (load_config)
|
|
grub_parser_execute (load_config);
|
|
|
|
--- a/include/grub/env.h
|
|
+++ b/include/grub/env.h
|
|
@@ -69,5 +69,6 @@
|
|
grub_err_t
|
|
grub_env_extractor_close (int source);
|
|
|
|
+extern void (*EXPORT_VAR (early_env_hook)) (void);
|
|
|
|
#endif /* ! GRUB_ENV_HEADER */
|