Thank you Daniel.
> On 11 Aug 2025, at 9:24 PM, Daniel Kiper wrote:
>
> On Tue, Jul 29, 2025 at 08:21:46PM +0530, Sudhakar Kuppusamy wrote:
>> Building on the parsers and the ability to embed X.509 certificates, as
>> well as the existing gcrypt functionality, add a module for verifying
>> appen
A Unified Kernel Image is a single UEFI PE file that combines a UEFI boot stub,
a Linux kernel image, an initrd, and further resources. The uki command will
locate where the UKI file is and create a GRUB menu entry to load it.
The Unified Kernel Image Specification:
https://uapi-group.org/specific
Add the functions grub_strtok() and grub_strtok_r() to help parse strings into
tokens separated by characters in the 'delim' parameter. These functions are
present in gnulib but calling them directly from the gnulib code is quite
challenging since the call "#include " would include the header file
v6:
- Documented blsuki_save_default environmental variable.
- Commented on artificial limits.
- Added additional ifdefs for the EFI platforms.
- Fixed various nits.
This patch set is introducing BootLoaderSpec support to upstream GRUB from
Fedora GRUB. I've also added a uki command to load Unifie
From: Robbie Harwood
Irritatingly, BLS defines paths relative to the mountpoint of the
filesystem which contains its snippets, not / or any other fixed
location. So grub2-emu needs to know whether /boot is a separate
filesystem from / and conditionally prepend a path.
Signed-off-by: Robbie Harwo
Adding filevercmp support to grub-core/commands/blsuki.c from gnulib will cause
issues with the type of the offset parameter for grub_util_write_image_at() for
EMU builds. To fix this issue, we can change the type from off_t to grub_off_t.
Signed-off-by: Alec Brown
---
include/grub/util/misc.h |
From: Peter Jones
The BootLoaderSpec (BLS) defines a scheme where different bootloaders can
share a format for boot items and a configuration directory that accepts
these common configurations as drop-in files.
The BLS Specification:
https://uapi-group.org/specifications/specs/boot_loader_specif
> On 11. Aug 2025, at 16:23, Neal Gompa wrote:
>
> On Fri, Aug 1, 2025 at 7:37 AM Vladimir Serbinenko wrote:
>>
>> With these patches I'm able to read my ZFS partition with encrypted datasets
>> and a big-endian volume even with mixed endianness contents
>>
>
> Well, I certainly didn't expe
Differences from previous version:
* Replaced litterals with defines
* Added comments
* removed empty lines
___
Grub-devel mailing list
Grub-devel@gnu.org
https://lists.gnu.org/mailman/listinfo/grub-devel
We need to avoid clobering existing table between starting of chunk movers
and the moment we install target page table. Generate temporary table for
this rather than hoping that we don't clober existing one.
Fixes 64-bit GhostBSD on 64-bit EFI
Signed-off-by: Vladimir Serbinenko
---
grub-core/li
Thank you Daniel.
> On 11 Aug 2025, at 10:51 PM, Daniel Kiper wrote:
>
> On Tue, Jul 29, 2025 at 08:21:48PM +0530, Sudhakar Kuppusamy wrote:
>> If secure boot is enabled with static key management mode, the trusted
>> certificates will be extracted from the GRUB ELF Note and added to db list.
>>
On Tue, Jul 29, 2025 at 08:21:48PM +0530, Sudhakar Kuppusamy wrote:
> If secure boot is enabled with static key management mode, the trusted
> certificates will be extracted from the GRUB ELF Note and added to db list.
> This is introduced by a subsequent patch.
>
> If secure boot is enabled with d
Thank you Daniel.
> On 11 Aug 2025, at 9:54 PM, Daniel Kiper wrote:
>
> On Tue, Jul 29, 2025 at 08:21:47PM +0530, Sudhakar Kuppusamy wrote:
>> Enhancing the infrastructure to enable the Platform Keystore (PKS) feature,
>> which provides access to the SB_VERSION, db, and dbx secure boot variables
On Tue, Jul 29, 2025 at 08:21:47PM +0530, Sudhakar Kuppusamy wrote:
> Enhancing the infrastructure to enable the Platform Keystore (PKS) feature,
> which provides access to the SB_VERSION, db, and dbx secure boot variables
> from PKS.
>
> If secure boot is enabled with dynamic key management mode,
On Tue, Jul 29, 2025 at 08:21:46PM +0530, Sudhakar Kuppusamy wrote:
> Building on the parsers and the ability to embed X.509 certificates, as
> well as the existing gcrypt functionality, add a module for verifying
> appended signatures.
>
> This includes a verifier that requires that Linux kernels
On Fri, May 17, 2024 at 10:46:28AM +0300, Vladimir Serbinenko wrote:
> We need to avoid clobering existing table between starting of chunk movers
> and the moment we install target page table. Generate temporary table for
> this rather than hoping that we don't clober existing one.
>
> Fixes 64-bit
On Fri, Aug 1, 2025 at 7:37 AM Vladimir Serbinenko wrote:
>
> With these patches I'm able to read my ZFS partition with encrypted datasets
> and a big-endian volume even with mixed endianness contents
>
Well, I certainly didn't expect to see this crop up all these years later. :)
(I used to work
On Fri, Aug 1, 2025 at 7:41 AM Vladimir Serbinenko wrote:
>
> Signed-off-by: Vladimir Serbinenko
> ---
> grub-core/fs/zfs/zfs.c | 502
> grub-core/fs/zfs/zfscrypt.c | 335 +---
> include/grub/zfs/zfs.h | 54 +++-
> 3 files chang
Le lun. 11 août 2025, 16:49, Neal Gompa a écrit :
> On Fri, Aug 1, 2025 at 7:41 AM Vladimir Serbinenko
> wrote:
> >
> > Signed-off-by: Vladimir Serbinenko
> > ---
> > grub-core/fs/zfs/zfs.c | 502
> > grub-core/fs/zfs/zfscrypt.c | 335 +
19 matches
Mail list logo