On Wed, Dec 04, 2024 at 07:50:28 -0600, Eric Sandeen wrote:
> When large extent counter / NREXT64 support was added to grub, it missed
> a couple of direct reads of nextents which need to be changed to the new
> NREXT64-aware helper as well. Without this, we'll have mis-reads of some
> directories
From: Fedora Ninjas
The usage looks as follows:
# Enable secure launch (required and must come before other slaunch
# commands).
slaunch
# Specify the startup binary for DRTM. This is optional on Intel if
# BIOS has already loaded ACM. There can be multiple such commands
# with th
Signed-off-by: Sergii Dmytruk
---
grub-core/loader/slaunch/slrt.c | 37 -
include/grub/slaunch.h | 10 +
2 files changed, 46 insertions(+), 1 deletion(-)
diff --git a/grub-core/loader/slaunch/slrt.c b/grub-core/loader/slaunch/slrt.c
index b5213bca
From: Ross Philipson
Signed-off-by: Ross Philipson
Signed-off-by: Daniel Kiper
Signed-off-by: Sergii Dmytruk
---
grub-core/loader/slaunch/txt.c | 935 +
include/grub/i386/linux.h | 5 +-
include/grub/i386/memory.h | 5 +
3 files changed, 944 insert
From: Ross Philipson
Signed-off-by: Ross Philipson
Signed-off-by: Sergii Dmytruk
---
grub-core/loader/efi/dltrampoline.S | 94 +
grub-core/loader/slaunch/dlstub.c | 93
2 files changed, 187 insertions(+)
create mode 100644 grub-core/l
From: Ross Philipson
Introduce the Secure Launch Resource Table which forms the formal
interface between the pre and post launch code.
Signed-off-by: Ross Philipson
Signed-off-by: Sergii Dmytruk
---
grub-core/Makefile.am| 3 +
include/grub/slr_table.h | 296 +
From: Ross Philipson
Signed-off-by: Ross Philipson
Signed-off-by: Daniel Kiper
Signed-off-by: Sergii Dmytruk
---
grub-core/loader/slaunch/verify.c | 297 ++
1 file changed, 297 insertions(+)
create mode 100644 grub-core/loader/slaunch/verify.c
diff --git a/grub-c
From: Ross Philipson
Signed-off-by: Ross Philipson
Signed-off-by: Daniel Kiper
Signed-off-by: Sergii Dmytruk
---
grub-core/loader/slaunch/acmod.c | 575 +++
1 file changed, 575 insertions(+)
create mode 100644 grub-core/loader/slaunch/acmod.c
diff --git a/grub-co
From: Daniel Kiper
It will be used by Intel TXT secure launcher introduced
by subsequent patches to query TPM version and relinquish a locality.
It also provides `tpm_type` command that prints TPM version and
interface.
Signed-off-by: Daniel Kiper
Signed-off-by: Krystian Hebel
Signed-off-by:
From: Michał Żygowski
Signed-off-by: Michał Żygowski
Signed-off-by: Krystian Hebel
Signed-off-by: Sergii Dmytruk
---
grub-core/loader/slaunch/txt.c | 68 +-
include/grub/i386/txt.h| 33 +
2 files changed, 100 insertions(+), 1 deletion(-)
GRUB_MULTIBOOT(get_mbi_size) returns an upper bound on MBI's size
instead of the actual size. It could also be used for measurements
after zeroing unused parts of the buffer, but using an actual size seems
like a better option as the same MBI will always have the same hash
regardless of the amount
From: Ross Philipson
Signed-off-by: Ross Philipson
Signed-off-by: Daniel Kiper
Signed-off-by: Sergii Dmytruk
---
include/grub/i386/txt.h | 673
1 file changed, 673 insertions(+)
create mode 100644 include/grub/i386/txt.h
diff --git a/include/grub/i38
From: Aleksandr Burmashev
This avoids naming collision with TPM TIS and CRB driver introduced
by subsequent patch and characterizes the functionality of the module
better.
Signed-off-by: Daniel Kiper
Signed-off-by: Sergii Dmytruk
---
docs/grub.texi| 21 +++---
grub-core/M
From: Ross Philipson
Signed-off-by: Ross Philipson
Signed-off-by: Sergii Dmytruk
---
grub-core/loader/slaunch/slrt.c | 285
1 file changed, 285 insertions(+)
create mode 100644 grub-core/loader/slaunch/slrt.c
diff --git a/grub-core/loader/slaunch/slrt.c b/gru
From: Ross Philipson
The definitions are going to be used by new Secure Launch feature and a
TPM driver.
Control registers and flags:
- CR0 read/write and flags (PE, MP, EM, TS, PG, NE, WP, AM, NW, CD)
- CR4 read/write and flags (VME, PVI, TSD, DE, PSE, PAE, MCE, PGE, PCE,
FXSR, XMM, VMXE,
From: Ross Philipson
Signed-off-by: Ross Philipson
Signed-off-by: Sergii Dmytruk
---
grub-core/Makefile.am | 3 ++
include/grub/slaunch.h | 96 ++
2 files changed, 99 insertions(+)
create mode 100644 include/grub/slaunch.h
diff --git a/grub-core/Make
From: Michał Żygowski
The code makes sure the order of policy entries is correct:
- MBI entry goes first, so the payload can measure it first on launch
- then goes SLRT and other typical entries
- MB2 modules are appended last
Signed-off-by: Michał Żygowski
Signed-off-by: Tomasz Żyjewski
Si
From: Ross Philipson
Replace UEFI tpm measuring command with TPM logging function, allowing the
removal of the tpm command file.
Signed-off-by: Ross Philipson
Signed-off-by: Sergii Dmytruk
---
grub-core/Makefile.core.def | 1 -
grub-core/commands/efi/tpm.c | 2 +-
grub-core/commands/tpm.
Hello,
Continuing upstreaming [TrenchBoot] code changes. More context can be found in
the cover letter for [v1]. This set targets v11 of Linux patches [linux-v11].
How the patches look now:
1. [01-02] Various additions in preparation for later commits
2. [03-05] TPM-related part (`tpm` modul
From: Ross Philipson
Signed-off-by: Ross Philipson
Signed-off-by: Sergii Dmytruk
---
grub-core/Makefile.core.def | 1 +
grub-core/loader/efi/linux.c | 16 ++
grub-core/loader/slaunch/x86_efi_linux.c | 212 +++
include/grub/slaunch.h
From: Daniel Kiper
The functions find the lowest and highest values with regard to the
passed in limit. Passing a low limit of 0 or a high limit of ~0
calculates lowest and highest available RAM addresses respectively.
Signed-off-by: Daniel Kiper
Signed-off-by: Sergii Dmytruk
Reviewed-by: Ros
21 matches
Mail list logo