Hi!
I have started to collect test results for GRUB 2.06 here:
> https://people.debian.org/~glaubitz/grub2.06-test-results/
The results are for 635ef55ed1252f92fe3bf70caefd185dcc507c43.
If there is a testsuite result, it also obviously means the build
passed without any problems.
I have also a
On Thu, 2020-12-31 at 21:42 +0300, Dmitry wrote:
[...]
> > --- a/grub-core/disk/luks2.c
> > +++ b/grub-core/disk/luks2.c
> > @@ -542,7 +542,8 @@ luks2_decrypt_key (grub_uint8_t *out_key,
> >
> > static grub_err_t
> > luks2_recover_key (grub_disk_t source,
> > - grub_cryptodisk_t
When booted in UEFI mode, Grub would fail to load a ramdisk of size larger than
"(total_pages >> 2)" with
"error: out of memory"
(https://git.savannah.gnu.org/cgit/grub.git/tree/grub-core/kern/efi/mm.c#n616)
This proposed patch adds a new option that can be used to specify the "EFI min
hea
As an example, passing a password as a cryptomount argument is implemented.
However, the backends are not implemented, so testing this will return a not
implemented error.
Signed-off-by: Glenn Washburn
---
This is a proof of concept of how I think the data passing from cryptomount
to the crypto
On Sat, 2021-01-02 at 19:45 -0600, Glenn Washburn wrote:
> James,
>
> I like the improvements here. However, I've been thinking more about
> this and other improvements that deal with passing parameters to
> modules used by cryptomount. I have some ideas that I've not had the
> time to fully inves