summaryrefslogtreecommitdiffstats
path: root/meta/recipes-bsp/grub/files
Commit message (Collapse)AuthorAgeFilesLines
* grub: patch CVE-2025-0678 and CVE-2025-1125Peter Marko2025-03-151-0/+87
| | | | | | | | | Cherry-pick patch mentioning these CVEs. (From OE-Core rev: d0283e421e41b6775f40a51de6018c2c5cfda61f) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
* grub: patch CVE-2025-0677, CVE-2025-0684, CVE-2025-0685, CVE-2025-0686 and ↵Peter Marko2025-03-151-0/+377
| | | | | | | | | | | CVE-2025-0689 Cherry-pick patch mentioning these CVEs. (From OE-Core rev: 0a2cb15d6953a809135bea69609673d068f46df1) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
* grub: patch CVE-2024-45778 and CVE-2024-45779Peter Marko2025-03-151-0/+55
| | | | | | | | | Cherry-pick patch mentioning these CVEs. (From OE-Core rev: 9ecee5f950f249d982b307bbdbe0e13e55f27b24) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
* grub: patch CVE-2025-1118Peter Marko2025-03-151-0/+37
| | | | | | | | | Cherry-pick patch mentioning this CVE. (From OE-Core rev: def610a1298ad7b8c98185a2b4c46f2c7173a950) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
* grub: patch CVE-2025-0690Peter Marko2025-03-151-0/+73
| | | | | | | | | Cherry-pick patch mentioning this CVE. (From OE-Core rev: ab56d0eb79b40f5e60af20dadcda1b0239fe020e) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
* grub: patch CVE-2024-45777Peter Marko2025-03-151-0/+57
| | | | | | | | | Cherry-pick patch mentioning this CVE. (From OE-Core rev: bfebaeb1705d072eb6b42a6dfe9bff4829a49a33) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
* grub: patch CVE-2024-45776Peter Marko2025-03-151-0/+39
| | | | | | | | | Cherry-pick patch mentioning this CVE. (From OE-Core rev: ba19a6126d315c964214e7ca89895ea1ba8b4a15) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
* grub: patch CVE-2025-0622Peter Marko2025-03-153-0/+114
| | | | | | | | | Cherry-pick patch mentioning this CVE. (From OE-Core rev: aeefadfda0e98d0b3369c4abc98485774e1fe562) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
* grub: patch CVE-2024-45775Peter Marko2025-03-151-0/+38
| | | | | | | | | Cherry-pick patch mentioning this CVE. (From OE-Core rev: 0ae686de6aefb10d961cd8965dba8a02d1c977c6) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
* grub: patch CVE-2024-45774Peter Marko2025-03-151-0/+37
| | | | | | | | | Cherry-pick patch mentioning this CVE. (From OE-Core rev: e956e7437aa95e006547c3a92271b64c25252a50) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
* grub: patch CVE-2025-0624Peter Marko2025-03-151-0/+84
| | | | | | | | | Cherry-pick patch mentioning this CVE. (From OE-Core rev: 29778ceddd775c47d722ecf1cc587c6526202d0b) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
* grub: patch CVE-2024-45783Peter Marko2025-03-151-0/+39
| | | | | | | | | Cherry-pick patch mentioning this CVE. (From OE-Core rev: 7c18697372444ef9e4df03b7c9de7b8da7f4f600) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
* grub: patch CVE-2024-45780Peter Marko2025-03-151-0/+93
| | | | | | | | | Cherry-pick patch mentioning this CVE. (From OE-Core rev: 3c33dbc32859ce45743c507120317a562b1a897d) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
* grub: patch CVE-2024-45782 and CVE-2024-56737Peter Marko2025-03-151-0/+36
| | | | | | | | | Cherry-pick patch mentioning these CVEs. (From OE-Core rev: 3b497db0bff69c8e7a4f5466b155d1c84051cc59) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
* grup: patch CVE-2024-45781Peter Marko2025-03-151-0/+35
| | | | | | | | | Cherry-pick patch mentioning this CVE. (From OE-Core rev: ef41ef5730d08371d1eb03f94fa9357edf26889f) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
* grub: backport strlcpy functionPeter Marko2025-03-151-0/+68
| | | | | | | | | It is used to fix multiple CVEs. (From OE-Core rev: 48cf877397b82449f171190a33a8e723512b8227) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
* grub: remove unneeded ↵Alexander Kanavin2024-05-281-44/+0
| | | | | | | | | | | | 0001-Disable-mfpmath-sse-as-well-when-SSE-is-disabled.patch Verified on qemux86 and qemux86-64 with grub and grub-efi. (From OE-Core rev: d06ee594e1bbe15b3a45c9efaaddb1e869a69cb3) Signed-off-by: Alexander Kanavin <alex@linutronix.de> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: mark grub-module-explicitly-keeps-symbole-.module_license.patch as a ↵Alexander Kanavin2024-05-281-1/+1
| | | | | | | | | | workaround (From OE-Core rev: 6307adb5b0644845f4062c21ac5717eb62a61dd3) Signed-off-by: Alexander Kanavin <alex@linutronix.de> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub2: upgrade 2.06 -> 2.12Anuj Mittal2024-01-2431-2929/+22
| | | | | | | | | | | | | | Drop patches that have been upstreamed. Refresh others. This version dropped extra_deps.lst from the tarball [1] and that leads to build failures. Restore it in do_configure for now. [1] https://git.savannah.gnu.org/cgit/grub.git/commit/?id=b835601c7639ed1890f2d3db91900a8506011a8e (From OE-Core rev: 7c8e1e48075f7f54aec9d295605c982f440be5d5) Signed-off-by: Anuj Mittal <anuj.mittal@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: fs/fat: Don't error when mtime is 0Ming Liu2024-01-031-0/+70
| | | | | | | | | | | A issue was found when I run "runqemu genericx86-64 ovmf", grub failed to boot, it's a known issue has been fixed in grub upstream, backport the fix. (From OE-Core rev: 51eab4bb0cae46c9c32d28986eb97badf47594b7) Signed-off-by: Ming Liu <liu.ming50@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: Fix for CVE-2023-4692 and CVE-2023-4693Xiangyu Chen2023-11-102-0/+161
| | | | | | | | | | | | | | | | | | | | | | | | | | | CVE: CVE-2023-4692 Crafted file system images can cause heap-based buffer overflow and may allow arbitrary code execution and secure boot bypass. Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=43651027d24e62a7a463254165e1e46e42aecdea] CVE: CVE-2023-4693 There an out-of-bounds read at fs/ntfs.c, a physically present attacker may leverage that by presenting a specially crafted NTFS file system image to read arbitrary memory locations. A successful attack may allow sensitive data cached in memory or EFI variables values to be leaked presenting a high Confidentiality risk. Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=0ed2458cc4eff6d9a9199527e2a0b6d445802f94] (From OE-Core rev: a8bc6f041599ce8da275c163c87f155a2f09369c) Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: submit determinism.patch upstreamAlexander Kanavin2023-06-151-1/+1
| | | | | | | (From OE-Core rev: 61947762e410c685f667e0af6440fb8a33cd6777) Signed-off-by: Alexander Kanavin <alex@linutronix.de> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub2: support metadata_csum_seed featureKai Kang2023-03-071-0/+66
| | | | | | | | | | | | It enable the metadata_csum_seed feature by default in e2fsprogs 1.47.0 and causes grub doesn't work. Backport patch to make grub support this feature. (From OE-Core rev: ae3b4588d69e534ac8aff136ed44f3975f5a2d4f) Signed-off-by: Kai Kang <kai.kang@windriver.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: Handle R_RISCV_CALL_PLT relocKhem Raj2023-02-241-0/+48
| | | | | | | | | These are new in binutils 2.40+ (From OE-Core rev: f2883fb1d7302087479940b422ba836d2fe35fc4) Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub2: backport patch to fix CVE-2022-2601 CVE-2022-3775Xiangyu Chen2022-12-263-0/+295
| | | | | | | | | | | | | | | | | | | Backport patch from upstream to solve CVE-2022-2601 CVE-2022-3775 dependency: font: Fix size overflow in grub_font_get_glyph_internal() (https://git.savannah.gnu.org/cgit/grub.git/commit/?id=9c76ec09ae08155df27cd237eaea150b4f02f532) Backport patch from upstream to fix following CVEs: CVE-2022-2601: font: Fix several integer overflows in grub_font_construct_glyph() (https://git.savannah.gnu.org/cgit/grub.git/commit/?id=768e1ef2fc159f6e14e7246e4be09363708ac39e) CVE-2022-3775: font: Fix an integer underflow in blit_comb() (https://git.savannah.gnu.org/cgit/grub.git/commit/?id=992c06191babc1e109caf40d6a07ec6fdef427af) (From OE-Core rev: fa5a42150098be892246146456faed778e28ef94) Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com> Signed-off-by: Liwei Song <liwei.song@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: backport patches to fix CVE-2022-28736Xiangyu Chen2022-12-083-0/+383
| | | | | | | | (From OE-Core rev: 278e1a0f679be813553b014544314041502a586a) Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: Apply backports to fix build with clang on x86Khem Raj2022-09-202-0/+107
| | | | | | | (From OE-Core rev: 2213b6ce1ec944228d7bb3c95f2e02ac0995b5be) Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub2: fix several CVEsYongxin Liu2022-08-2110-0/+1611
| | | | | | | | | | | | | | | | | | | | Backport CVE patches from upstream to fix: CVE-2021-3695 CVE-2021-3696 CVE-2021-3697 CVE-2022-28733 CVE-2022-28734 CVE-2022-28735 Backport the following 5 patches to make CVE patches be applied smoothly. video-Remove-trailing-whitespaces.patch video-readers-jpeg-Abort-sooner-if-a-read-operation-.patch video-readers-jpeg-Refuse-to-handle-multiple-start-o.patch (From OE-Core rev: db43401a3a4c201f02f4128fa4bac8ce993bfec0) Signed-off-by: Yongxin Liu <yongxin.liu@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: Fix build with bintutils 2.38 on riscvKhem Raj2022-02-201-0/+47
| | | | | | | (From OE-Core rev: d42596457628f41baa5729545e2932c6692f73ee) Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub2: fix CVE-2021-3981Yongxin Liu2022-01-041-0/+49
| | | | | | | (From OE-Core rev: bb554d14142f93c39fd1516a31757006531c348f) Signed-off-by: Yongxin Liu <yongxin.liu@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub2: Enable on riscv32Khem Raj2021-03-311-6/+16
| | | | | | | | | Update the patch as submitted upstream to grub2 (From OE-Core rev: a1ce702bb5317712083ae32332051c36923c4a50) Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub-efi: Re-introduce lost cast to longKhem Raj2021-03-281-0/+29
| | | | | | | | | | | This cast was accidentally dropped in https://git.savannah.gnu.org/cgit/grub.git/commit/?id=2bf40e9e5be9808b17852e688eead87acff14420 (From OE-Core rev: c032297695e9e4bb4d0fb12dc883044bdfa870f2) Signed-off-by: Khem Raj <raj.khem@gmail.com> Cc: Alistair Francis <alistair.francis@wdc.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: upgrade 2.04 -> 2.06~rc1Naveen Saini2021-03-2012-4301/+43
| | | | | | | | | | | | | | | | | | | | | | | | | | | 2.06 RC1 release have a number of CVEs fixed: CVE-2020-15705 CVE-2021-3418 CVE-2020-27749 CVE-2021-20233 CVE-2021-20225 CVE-2020-25647 CVE-2020-25632 CVE-2020-27779 CVE-2020-14372 CVE-2020-15707 CVE-2020-15706 CVE-2020-14309 CVE-2020-14310 CVE-2020-14311 CVE-2020-14308 CVE-2020-10713 CVE-2014-4607 Dropped backported patches. (From OE-Core rev: 36a59d63619c2225fe48aa1d8fb1cdabedfffc03) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: Backport fix to work with new binutilsRichard Purdie2021-02-031-0/+47
| | | | | | | | | | New versions of binutils caused object files to be 128MB in size, backporting this fix reduced them back to a sensible size, e.g. 1024 bytes. This avoids initramfix size issues! (From OE-Core rev: b72b9e81268719436e4bad5062cb0e1781da0395) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: Further reproducibility fixRichard Purdie2021-01-011-0/+16
| | | | | | | | | | Fix the ordering in the generated unidata.c file to aid reproducibility. [YOCTO #14167] (From OE-Core rev: 6d9c9f7604fd32ef926726a46ae053bbab6ccb4f) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: fix "CVE:" line in one of the patchesScott Murray2021-01-011-1/+1
| | | | | | | | | | | | The "CVE:" line in the patch for CVEs 2020-14309, CVE-2020-14310, and CVE-2020-14311 had commas between the CVE numbers, which resulted in CVE-2020-14310 not being picked up as patched by cve-check.bbclass's parsing. Remove the commas to match cve-check.bbclass's expectations. (From OE-Core rev: 396d5c0f9cffa4b54ae94738b1ef2b6fb545f082) Signed-off-by: Scott Murray <scott.murray@konsulko.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: Add second fix for determinism issueRichard Purdie2020-12-211-0/+16
| | | | | | | | | There is a second list sorting problem in a generator script within grub, add a sort() of a list to resolve this. (From OE-Core rev: cb5e96e05930eaff4d679166416d6c84d6e3236b) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: Fix build reproducibility issueRichard Purdie2020-12-201-0/+24
| | | | | | | | | We're seeing reproducibility issue on the autobuilder due to changing module dependency ordering. Add some sorting to an awk script to fix this. (From OE-Core rev: 925ddd5edccbfec52ff45c1b54ab2ae1bfe0d57c) Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: clean up CVE patchesYongxin Liu2020-11-088-12/+28
| | | | | | | | | | | | | | Clean up several patches introduced in commit 6732918498 ("grub:fix several CVEs in grub 2.04"). 1) Add CVE tags to individual patches. 2) Rename upstream patches and prefix them with CVE tags. 3) Add description of reference to upstream patch. (From OE-Core rev: bcb8b6719beaf6625e6b703e91958fe8afba5819) Signed-off-by: Yongxin Liu <yongxin.liu@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: fix several CVEs in grub 2.04Yongxin Liu2020-10-308-0/+4135
| | | | | | | | | | | | | | | | | | | | | | | | | | Backport patches from https://git.savannah.gnu.org/git/grub.git to fix some CVEs. Here is the list. CVE-2020-14308: 0001-calloc-Make-sure-we-always-have-an-overflow-checking.patch 0002-lvm-Add-LVM-cache-logical-volume-handling.patch 0003-calloc-Use-calloc-at-most-places.patch CVE-2020-14309, CVE-2020-14310, CVE-2020-14311: 0004-safemath-Add-some-arithmetic-primitives-that-check-f.patch 0005-malloc-Use-overflow-checking-primitives-where-we-do-.patch CVE-2020-15706: 0006-script-Remove-unused-fields-from-grub_script_functio.patch 0007-script-Avoid-a-use-after-free-when-redefining-a-func.patch CVE-2020-15707: 0008-linux-Fix-integer-overflows-in-initrd-size-handling.patch (From OE-Core rev: 67329184985a03534f11f95e9df5f9fb2305a261) Signed-off-by: Yongxin Liu <yongxin.liu@windriver.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub2: fix CVE-2020-10713Lee Chee Yang2020-10-201-0/+73
| | | | | | | (From OE-Core rev: ec6a2258ca27d5709df4fe18d94841332395bcb2) Signed-off-by: Lee Chee Yang <chee.yang.lee@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: upgrade 2.02 -> 2.04Anuj Mittal2019-07-318-248/+31
| | | | | | | | | | | | | | | | * For changes in this version, see: http://git.savannah.gnu.org/cgit/grub.git/tree/NEWS?h=grub-2.04 * Remove backported patches and refresh others. * Remove the musl patch as it's no longer needed. * Use configure option --disable-werror instead of passing through CFLAGS. (From OE-Core rev: 07222d213d1da0ccade1c61ed19a7ecdc4966edd) Signed-off-by: Anuj Mittal <anuj.mittal@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: Use -Wno-error instead of doing this on a per-warning basisAdrian Bunk2019-05-083-325/+0
| | | | | | | | | | In practice the warnings were disabled individually instead of fixes added, so just make all warnings non-fatal to achieve the same. (From OE-Core rev: 330fc83d4519da3c13eb55e8c060ba3e191c9906) Signed-off-by: Adrian Bunk <bunk@stusta.de> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: fix build with squashfs support enabledMartin Jansa2019-03-111-0/+24
| | | | | | | (From OE-Core rev: 342f7cc6b07559238274ff2fe281afa4ea742052) Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: Enhance Waddress-of-packed-member patch to cover x86_64 testcaseKhem Raj2019-03-041-0/+13
| | | | | | | | | | This was not compiled for x86_64 when previously testing aarch64 so some tests were missed. (From OE-Core rev: c2cb8827dc5bdeadd78f462398630c05e5a9ebb7) Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub2: Fix build with gcc9Khem Raj2019-02-151-0/+249
| | | | | | | | | Disable -Waddress-of-packed-member being treated as error (From OE-Core rev: cd2b008acb9b46e00a34c0fc23188c3f73d3c74e) Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub2: Fix passing null to printf formatsKhem Raj2018-12-271-0/+34
| | | | | | | | | | Backport a patch that helps with this error which is found by gcc9 (From OE-Core rev: 93419fb569b827056a422614d3dc29cd41b2b6bb) Signed-off-by: Khem Raj <raj.khem@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: fix build with new binutilsRoss Burton2018-07-261-0/+76
| | | | Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub2: fix build with gcc8Martin Jansa2018-05-111-0/+74
| | | | | | | (From OE-Core rev: 3eca7aa8196ef8ed682659ff47f3f1e3b2c6867d) Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
* grub: refresh patchesRoss Burton2018-03-091-10/+7
| | | | | | | | | | | | | | | | | | | | | The patch tool will apply patches by default with "fuzz", which is where if the hunk context isn't present but what is there is close enough, it will force the patch in. Whilst this is useful when there's just whitespace changes, when applied to source it is possible for a patch applied with fuzz to produce broken code which still compiles (see #10450). This is obviously bad. We'd like to eventually have do_patch() rejecting any fuzz on these grounds. For that to be realistic the existing patches with fuzz need to be rebased and reviewed. (From OE-Core rev: 856a70cf6ca9137d5c07c2aa9ef447032589504d) Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Alexander Kanavin <alexander.kanavin@linux.intel.com> Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>