On Wed, 11 Sep 2024 12:37:35 +0300
Vladimir Serbinenko wrote:
> Signed-off-by: Vladimir Serbinenko
> ---
> tests/util/grub-shell.in | 6 ++
> 1 file changed, 6 insertions(+)
>
> diff --git a/tests/util/grub-shell.in b/tests/util/grub-shell.in
> index 4b0900a32..de1eba83e 100644
> --- a/tes
Sent 0-7 and part of 11 separately taking all the comments into account:
https://lists.gnu.org/archive/html/grub-devel/2024-09/msg00194.html
Regards,
Sergii
On Tue, Sep 17, 2024 at 11:06:51AM -0700, Ross Philipson via Grub-devel wrote:
> On 8/26/24 5:44 AM, Sergii Dmytruk wrote:
> > From: Da
On 9/19/24 3:23 PM, Sergii Dmytruk wrote:
Sent 0-7 and part of 11 separately taking all the comments into account:
https://lists.gnu.org/archive/html/grub-devel/2024-09/msg00194.html
Great thanks. I will look them over, thanks for doing that. This should
make them easy to get in.
Ross
On Wed, 11 Sep 2024 12:37:27 +0300
Vladimir Serbinenko wrote:
> Signed-off-by: Vladimir Serbinenko
> ---
> tests/util/grub-shell.in | 43 +++-
> 1 file changed, 42 insertions(+), 1 deletion(-)
>
> diff --git a/tests/util/grub-shell.in b/tests/util/grub-shell
On Wed, 11 Sep 2024 12:37:32 +0300
Vladimir Serbinenko wrote:
> Fedora arm-efi and riscv64-efi are verbose and add a garbage line
> when shutting down. Ignore it
Shouldn't the trim_tail modifications in patch 1 and 5 obviate the need
for this? And why is the text being tested changed? I presume
From: Daniel Kiper
Currently rdmsr and wrmsr commands have own MSR support detection code.
This code is the same. So, it is duplicated. Additionally, this code
cannot be reused by others. Hence, extract this code to a function and
make it public. By the way, improve a code a bit.
Additionally, u
From: Daniel Kiper
Use more obvious names which match corresponding instructions:
* grub_msr_read() => grub_rdmsr()
* grub_msr_write() => grub_wrmsr()
Signed-off-by: Daniel Kiper
Signed-off-by: Sergii Dmytruk
---
grub-core/commands/i386/rdmsr.c | 2 +-
grub-core/commands/i386/wrmsr.c | 2 +
From: Ross Philipson
Signed-off-by: Ross Philipson
Signed-off-by: Daniel Kiper
Signed-off-by: Krystian Hebel
Signed-off-by: Sergii Dmytruk
---
include/grub/i386/cpuid.h | 11
include/grub/i386/crfr.h | 127 ++
include/grub/i386/mmio.h | 72 +++
From: Daniel Kiper
This fixes naming inconsistency that goes against coding style as well
as helps to avoid potential conflicts and confusion.
Signed-off-by: Daniel Kiper
Signed-off-by: Sergii Dmytruk
---
grub-core/lib/i386/xen/relocator.S | 6 +++---
grub-core/lib/x86_64/xen/relocator.S |
From: Daniel Kiper
Subsequent patches will use that constant.
Signed-off-by: Daniel Kiper
Signed-off-by: Sergii Dmytruk
---
grub-core/loader/i386/xen.c | 35 +--
include/grub/i386/memory.h | 1 +
2 files changed, 18 insertions(+), 18 deletions(-)
diff --git
From: Daniel Kiper
It does not make sense to have separate headers for individual static
functions. Additionally, we have to add some constants with MSR
addresses in subsequent patches. So, make one common place to store
them.
Signed-off-by: Daniel Kiper
Signed-off-by: Sergii Dmytruk
---
grub
Hi,
These are generally useful x86-related changes which were originally posted as
part of DRTM patchset [0]. This version took comments there into account,
hence v2. The changes can also be viewed on GitHub [1].
Best regards,
Sergii
[0]: https://lists.gnu.org/archive/html/grub-devel/2024-08/m
From: Krystian Hebel
Subsequent patches will use those macros and constant.
Signed-off-by: Krystian Hebel
Signed-off-by: Sergii Dmytruk
---
include/grub/i386/memory.h | 5 +
1 file changed, 5 insertions(+)
diff --git a/include/grub/i386/memory.h b/include/grub/i386/memory.h
index c645296
From: Daniel Kiper
The functions calculate lowest and highest available RAM
addresses respectively.
Signed-off-by: Daniel Kiper
Signed-off-by: Sergii Dmytruk
---
grub-core/mmap/mmap.c | 83 +++
include/grub/memory.h | 3 ++
2 files changed, 86 insertio
On Thu, Sep 19, 2024 at 11:05:13AM -0400, Stefan Berger wrote:
>
>
> On 9/19/24 3:45 AM, Gary Lin wrote:
> > On Wed, Sep 18, 2024 at 11:22:16AM -0400, Stefan Berger wrote:
> > >
> > >
>
> > > *handle = (TPM_HANDLE_t) num;
> > >
> > How about this change?
> >
> > - return grub_error (GRUB
On Mon, Sep 16, 2024 at 01:42:18PM -0400, Stefan Berger wrote:
>
>
> On 9/15/24 11:35 PM, Gary Lin wrote:
> > On Mon, Sep 16, 2024 at 10:24:03AM +0800, Gary Lin wrote:
> > > On Fri, Sep 13, 2024 at 10:32:39AM -0400, Stefan Berger wrote:
> > > >
> > > >
> > > > On 9/6/24 5:10 AM, Gary Lin wrote:
On Wed, Sep 18, 2024 at 11:22:16AM -0400, Stefan Berger wrote:
>
>
> On 9/6/24 5:11 AM, Gary Lin via Grub-devel wrote:
> > From: Hernan Gatta
> >
> > The TPM2 key protector is a module that enables the automatic retrieval
> > of a fully-encrypted disk's unlocking key from a TPM 2.0.
> >
> > Th
On 9/19/24 3:45 AM, Gary Lin wrote:
On Wed, Sep 18, 2024 at 11:22:16AM -0400, Stefan Berger wrote:
*handle = (TPM_HANDLE_t) num;
How about this change?
- return grub_error (GRUB_ERR_OUT_OF_RANGE, "Value %lu is too large to be a TPM
handle, TPM handles are unsigned 32-bit integers"
From: Peter Jones
Currently grub modules built with clang or gcc have several sections
which we don't actually need or support.
We already have a list of section to skip in genmod.sh, and this patch
adds the following sections to that list (as well as a few newlines):
.note.gnu.property
.llvm*
Currently we load module sections at whatever alignment gcc+ld happened
to dump into the ELF section header, which is often less then the page
size. Since NX protections are page based, this alignment must be
rounded up to page size on platforms supporting NX protections.
This patch switches most
From: Peter Jones
Currently when loading grub modules, we allocate space for all sections,
including those without SHF_ALLOC set. We then copy the sections that
/do/ have SHF_ALLOC set into the allocated memory, leaving some of our
allocation untouched forever. Additionally, on platforms with G
For NX, we need to set write and executable permissions on the sections
of grub modules when we load them.
On sections with SHF_ALLOC set, which is typically everything except
.modname and the symbol and string tables, this patch clears the Read
Only flag on sections that have the ELF flag SHF_WRI
Signed-off-by: Mate Kukri
---
grub-core/kern/efi/sb.c | 39 +---
grub-core/loader/efi/linux.c | 16 ---
include/grub/efi/api.h | 5 +
include/grub/efi/efi.h | 19 +++---
include/grub/efi/sb.h| 3 ---
5 files ch
From: Julian Andres Klode
These can be used to register a different implementation later,
for example, when shim provides a protocol with those functions.
Signed-off-by: Mate Kukri
---
grub-core/kern/efi/efi.c | 57 ++
grub-core/loader/efi/chainloader.c |
For NX, we need the GRUB binary to announce that it is compatible with
the NX feature. This implies that when loading the executable GRUB
image, several attributes are true:
- the binary doesn't need an executable stack
- the binary doesn't need sections to be both executable and writable
- the b
From: Peter Jones
Currently .module_license is set writable (that is, the section has the
SHF_WRITE flag set) in the module's ELF headers. This probably never
actually matters, but it can't possibly be correct.
This patch sets that data as "const", which causes that flag not to be
set.
Signed-
For NX, we need to set the page access permission attributes for write
and execute permissions.
This patch adds two new primitives, grub_set_mem_attrs() and
grub_clear_mem_attrs(), and associated constant definitions, to be used
for that purpose.
For most platforms, it adds a dummy implementation
This consists of:
- Derivative of Fedora NX patches to make GRUB itself work under NX.
- Julian Andres Klode's loader framework patch (used in Debian and Ubuntu for
the downstream loader).
- Shim loader protocol integration using the above loader framework.
- Check to disallow using the legacy Lin
Signed-off-by: Mate Kukri
---
grub-core/kern/efi/sb.c | 28
grub-core/loader/efi/linux.c | 12 +++-
include/grub/efi/api.h | 2 ++
include/grub/efi/sb.h| 2 ++
4 files changed, 39 insertions(+), 5 deletions(-)
diff --git a/grub-core/kern/
29 matches
Mail list logo