prevent the boot process from continuing.
Fixes: e0fa7dc84 (bli: Add a module for the Boot Loader Interface)
Signed-off-by: Michael Chang
Reviewed-By: Oliver Steffen
---
grub-core/commands/bli.c | 20 +++-
1 file changed, 19 insertions(+), 1 deletion(-)
diff --git a/grub-core/comma
On Tue, Jul 16, 2024 at 05:45:10AM GMT, Oliver Steffen wrote:
> Quoting Michael Chang via Grub-devel (2024-07-16 08:55:00)
> > The get_part_uuid() function made an assumption that the target grub
> > device is a partition device and accessed device->disk->partition
> >
On Tue, Jul 16, 2024 at 10:47:57AM GMT, Pascal Hambourg wrote:
> On 16/07/2024 at 08:55, Michael Chang via Grub-devel wrote:
> >
> > 4. When booting from an ISO, the ESP is treated as an El Torito image in
> > the boot catalog. It is therefore presented by firmware and
&
from continuing.
Fixes: e0fa7dc84 (bli: Add a module for the Boot Loader Interface)
Signed-off-by: Michael Chang
---
grub-core/commands/bli.c | 20 +++-
1 file changed, 19 insertions(+), 1 deletion(-)
diff --git a/grub-core/commands/bli.c b/grub-core/commands/bli.c
index e0d8
On Thu, Jun 06, 2024 at 06:07:24PM GMT, Avnish Chouhan wrote:
> This patch enables the fcp-targets and fcp-luns methods which are
> responsible to get WWPNs and LUNs for fibre channel devices.
>
> Those methods are specially necessary if the boot directory and grub
> installation are in different
On Thu, Jun 06, 2024 at 06:07:22PM GMT, Avnish Chouhan wrote:
> grub-ofpathname doesn't work with fibre channel because there is no
> function currently implemented for it.
> This patch enables it by prividing a function that looks for the port
> name, building the entire path for OF devices.
>
>
On Thu, Jun 20, 2024 at 03:14:59PM GMT, avnish wrote:
> Hi Vladimir,
>
> We have implemented this code to enable the ieee1275 hint for grub. We had
> scenarios (in SLES) like the disk had PReP partition followed by an LVM and,
> inside this LVM , the boot partition. So, we implemented this code to
On Thu, Jun 20, 2024 at 02:48:55PM GMT, Michael Chang wrote:
> A regression in grub 2.12 causes the grub screen to become cluttered
> with artifacts from the previous screen, whether it's the UEFI post ui,
> UEFI shell, or any graphical UI running before grub. this issue occurs
&
utput.
The issue is fixed by ensuring grub_console_cls() to work through lazy
mode-setting, while also avoiding screen clearing for the hidden menu,
which the flicker-free patch aims to improve.
Fixes: 2d7c3abd8 (efi/console: Do not set text-mode until we actually need it)
Signed-off-by: Michael
allocate just what’s needed for the raw
metadata.
This change effectively reduces the buffer size while still working
correctly. In my test system on openSUSE, the buffer size for LVM
metadata dropped from 2,088,960 bytes to 1,119 bytes, which is a big
improvement.
Signed-off-by: Michael Chang
our internal
lab and QA.
Thanks,
Michael
On Mon, May 06, 2024 at 10:34:22AM GMT, Michael Chang wrote:
> When grub image is netbooted on ppc64le, the keyboard input exhibits
> significant latency, reports even say that characters are processed
> about once per second. This issue makes inte
On Thu, May 16, 2024 at 12:04:21PM GMT, Michael Chang wrote:
> On Wed, May 08, 2024 at 05:48:15PM GMT, Daniel Kiper via Grub-devel wrote:
> > Adding Marta...
> >
> > On Mon, May 06, 2024 at 03:18:45PM -0500, Glenn Washburn wrote:
> > > From: Rogier
> > >
&
the
metadata area, how many LVs and VGs are connected to the PV and
whichever would take part in the size of active raw metadata block
within the area.
I managed to use the attached shell script to prepare a LVM disk where
the metadata area is in wrapped state. It took about 100 cycles for me.
With that,
On Wed, Apr 17, 2024 at 01:27:02AM GMT, Sudhakar Kuppusamy wrote:
> This patch set contains the v0 for Secure Boot Advanced Targeting (SBAT)
> support on powerpc secure boot.
Hi Sudhakar,
This patch series cannot be applied to the upstream master because the
prerequisites patch series for power
polling interval, rather than needing a timeout for receiving a
response.
For these reasons, we believe the timeout in get_card_packet should be
effectively removed. According to test results, the delay has
disappeared, and it is now much easier to use interactively.
Signed-Off-by: Michael Chang
On Mon, Mar 18, 2024 at 12:34:37PM +0100, Daniel Kiper wrote:
> On Mon, Mar 18, 2024 at 02:21:36PM +0800, Michael Chang wrote:
> > On Fri, Mar 15, 2024 at 04:09:02PM +0100, Daniel Kiper wrote:
> > > On Fri, Mar 15, 2024 at 05:00:28PM +0800, Michael Chang via Grub-devel
> >
On Fri, Mar 15, 2024 at 04:09:02PM +0100, Daniel Kiper wrote:
> On Fri, Mar 15, 2024 at 05:00:28PM +0800, Michael Chang via Grub-devel wrote:
> > Refine iteration to prioritize returning system disk devices over
> > memdisk and procfs. This adjustment brings about a modest
searches where memdisk may mistakenly
take precedence over system disks.
Signed-off-by: Michael Chang
---
include/grub/disk.h | 7 ++-
1 file changed, 6 insertions(+), 1 deletion(-)
diff --git a/include/grub/disk.h b/include/grub/disk.h
index fbf23df7f..b3e4f1c8b 100644
--- a/include/grub
On Mon, May 08, 2023 at 01:58:36PM +, Avnish Chouhan wrote:
> From: Diego Domingos
>
> This patch enables the device mapper discovery on ofpath.c. Currently,
> when we are dealing with a device like /dev/dm-* the ofpath returns null
> since there is no function implemented to handle this case
On Wed, Mar 13, 2024 at 03:07:48PM +, Ross Lagerwall via Grub-devel wrote:
> It is convenient and common to have binaries stored in gzip archives
> (e.g. xen.gz). Verification should be run after decompression rather
> than before so reorder the file filter list as appropriate.
The proposed ch
not be always chosen.
grub_video_bitmap_load (&box->raw_pixmaps[i], path);
grub_free (path);
/* Ignore missing pixmaps. */
grub_errno = GRUB_ERR_NONE;
In any case, we cannot account on such random behavior and should only
return grub_errno if it is justified.
Signed
On Wed, Jan 24, 2024 at 11:42:30AM +0530, Mukesh Kumar Chaurasiya wrote:
> Sometimes, when booting from a very busy SAN, the access to the
> disk can fail and then GRUB will eventually drop to GRUB prompt.
> This scenario is more frequent when deploying many machines at
> the same time using the sa
On Fri, Jan 12, 2024 at 05:58:02PM +0100, Itxaka serrano wrote:
> Hey all,
>
> I opened a bug because this behaviour doesnt seem correct to me:
>
> https://savannah.gnu.org/bugs/?65154
>
>
> Example:
>
> grub> hello
> error: ../../grub-core/script/function.c:119:can't find command `hello'.
> g
rocessing.
Furthermore, both patches were developed to address the aforementioned
issues individually. We hope to contribute them to upstream if the
enhancement sounds appealing to others as well.
Thanks.
Michael Chang (2):
mkstandalone: ensure stable timestamps for generated images
mkstandalon
. The
list retrieved by readdir() is now sorted alphabetically before
incorporation into the tar archive, ensuring consistent and predictable
file ordering within the archive.
Signed-off-by: Michael Chang
Signed-off-by: Bernhard Wiedemann
---
util/grub-mkstandalone.c | 26 +++-
,
ensuring consistency and stability in timestamps across all generated
binaries.
[1] 85a7be241 util/mkimage: Use stable timestamp when generating
binaries.
Signed-off-by: Michael Chang
Signed-off-by: Bernhard Wiedemann
---
util/grub-mkstandalone.c | 10 +-
1 file changed, 5 insertions
ACPI SPCR table when available to configure
serial
[2] 0f929fbf0 ACPICA: Tables: Add new mechanism to skip NULL entries in RSDT
and XSDT.
Signed-off-by: Michael Chang
---
grub-core/kern/acpi.c | 8
1 file changed, 8 insertions(+)
diff --git a/grub-core/kern/acpi.c b/grub-core/kern/ac
On Thu, Aug 17, 2023 at 10:52:58AM +0200, Olaf Hering wrote:
> Prior commit 3cf2e848bc03 ("disk/cryptodisk: Allows UUIDs to be compared
> in a dash-insensitive manner") the grub.cfg below worked as expected:
> create a menu, which if selected tries to open the specified partition
> and does further
On Tue, Mar 28, 2023 at 11:00:01AM +0530, Mukesh Kumar Chaurasiya wrote:
> Sometimes, when booting from a very busy SAN, the access to the
> disk can fail and then grub will eventually drop to grub prompt.
> This scenario is more frequent when deploying many machines at
> the same time using the sa
On Tue, Mar 21, 2023 at 03:35:33PM +0100, Daniel Kiper wrote:
> On Mon, Mar 20, 2023 at 06:18:26PM +0800, Michael Chang via Grub-devel wrote:
> > When the TPM module is loaded, the verifier reads the entire file into
> > memory, measures and extends the hash, and uses the verified c
e not necessary.
Signed-off-by: Michael Chang
Signed-off-by: Stefan Berger
---
grub-core/commands/efi/tpm.c | 37 +++
grub-core/commands/ieee1275/ibmvtpm.c | 20 +++
grub-core/commands/tpm.c | 11
include/grub/tpm.h
en no real measure boot functionality is performed. This patch
also provides users with the option to disable the TPM device to free up
memory in scenarios where the system can't afford the high memory
utilization cost.
Signed-off-by: Michael Chang
Signed-off-by: Stefan Berger
---
grub-core/co
On Mon, Mar 13, 2023 at 02:29:41PM +0100, Daniel Kiper wrote:
> On Mon, Feb 20, 2023 at 02:36:18PM +0800, Michael Chang via Grub-devel wrote:
> > This helps to prevent out of memory error when reading large files via
> > disabling tpm device as verifier has to read all content
On Fri, Mar 10, 2023 at 01:15:40PM +0800, Michael Chang via Grub-devel wrote:
> On Thu, Mar 09, 2023 at 02:10:54AM -0800, Atish Patra wrote:
> > On Mon, Mar 6, 2023 at 7:21 PM Michael Chang wrote:
[snip]
> > I have a small favor to ask. Is it possible for you to test out the
&g
On Thu, Mar 09, 2023 at 02:10:54AM -0800, Atish Patra wrote:
> On Mon, Mar 6, 2023 at 7:21 PM Michael Chang wrote:
> >
> > On Mon, Mar 06, 2023 at 04:22:53PM -0800, Atish Patra wrote:
> > > On Mon, Mar 6, 2023 at 1:25 PM Fabian Vogt wrote:
> > > >
> >
On Mon, Mar 06, 2023 at 04:22:53PM -0800, Atish Patra wrote:
> On Mon, Mar 6, 2023 at 1:25 PM Fabian Vogt wrote:
> >
> > Hi,
> >
> > Am Montag, 6. März 2023, 21:59:23 CET schrieb Daniel Kiper:
> > > Adding Gary and Michael...
> > >
> > > Gary, Michael, could you help with this? Or at least forward
On Fri, Mar 03, 2023 at 07:19:56PM +0100, Daniel Kiper wrote:
> On Fri, Mar 03, 2023 at 12:18:19PM +0800, Michael Chang wrote:
> > On Thu, Mar 02, 2023 at 07:59:00PM +0100, Daniel Kiper wrote:
> > > On Tue, Feb 28, 2023 at 11:22:14AM +0800, Michael Chang via Grub-devel
> >
On Thu, Mar 02, 2023 at 07:59:00PM +0100, Daniel Kiper wrote:
> On Tue, Feb 28, 2023 at 11:22:14AM +0800, Michael Chang via Grub-devel wrote:
> > On Thu, Feb 23, 2023 at 02:22:27PM +0100, Daniel Kiper wrote:
> > > Adding James, Stefan and Robbie...
> > >
> > >
rmat=]
This patch fixes the problem by casting the type of calculated offset to
grub_size_t and use platform PRIuGRUB_SIZE as format specifier.
Signed-off-by: Michael Chang
---
grub-core/osdep/devmapper/getroot.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/grub-core/
On Thu, Feb 23, 2023 at 02:22:27PM +0100, Daniel Kiper wrote:
> Adding James, Stefan and Robbie...
>
> On Mon, Feb 20, 2023 at 12:57:01PM +0800, Michael Chang via Grub-devel wrote:
> > On Tue, Nov 29, 2022 at 04:11:48PM +0100, Daniel Kiper wrote:
> > > On Fri, Nov 25,
tpm subsystem from being activated when no
vtpm device present.
Signed-off-by: Michael Chang
Signed-off-by: Stefan Berger
---
grub-core/commands/efi/tpm.c | 37 +++
grub-core/commands/ieee1275/ibmvtpm.c | 20 +++
grub-core/commands/tpm.c
On Tue, Nov 29, 2022 at 04:11:48PM +0100, Daniel Kiper wrote:
> On Fri, Nov 25, 2022 at 03:00:48PM +0800, Michael Chang via Grub-devel wrote:
> > On Thu, Nov 24, 2022 at 05:04:48PM +0100, Daniel Kiper wrote:
> > > On Mon, Oct 17, 2022 at 01:19:08PM +0800, Michael Chang via Grub-
On Thu, Feb 16, 2023 at 01:02:00PM -0500, Stefan Berger wrote:
>
>
> On 10/7/22 01:37, Michael Chang via Grub-devel wrote:
> > This helps to prevent out of memory error when reading large files via
> > disabling
> > tpm device as verifier has to read all content
On Tue, Dec 06, 2022 at 11:09:57AM -0500, Robbie Harwood wrote:
> Zhang Boyang writes:
>
> > Since font files can be wrapped as PE images by grub-wrap, use shim to
> > verify font files if Secure Boot is enabled. To prevent other PE files
> > (e.g. kernel images) used as wrappers, it only allows
On Tue, Nov 29, 2022 at 03:24:51PM -0500, Robbie Harwood wrote:
> Steve McIntyre writes:
>
> > Hey folks!
> >
> > So, with the latest set of GRUB CVE patches we've fixed up a bunch of
> > potential crashes in font-handling code that could lead to Secure Boot
> > holes. These are good and useful f
On Thu, Nov 24, 2022 at 05:04:48PM +0100, Daniel Kiper wrote:
> On Mon, Oct 17, 2022 at 01:19:08PM +0800, Michael Chang via Grub-devel wrote:
> > On Fri, Oct 14, 2022 at 11:40:01AM +0200, Daniel Kiper wrote:
> > > On Fri, Oct 07, 2022 at 01:37:10PM +0800, Michael Chang via Grub-
Dear Daniel,
On Wed, Oct 26, 2022 at 04:52:09PM +0200, Daniel Kiper wrote:
> Hi,
>
> We are getting closer to the 2.12 release. Sadly we still do not have
> many of important patch sets in the tree. So, I am going to spend more
> time on reviews in the following weeks. Below you can find my list
On Tue, Oct 18, 2022 at 04:18:21PM +0200, Olaf Hering wrote:
> Tue, 18 Oct 2022 06:57:36 -0700 Denton Liu :
>
> > If I'm understanding correctly, what you're proposing is a mechanism for
> > setting the default entry. If I'm not mistaken, this seems like an
> > orthogonal discussion to me. My patc
On Fri, Oct 14, 2022 at 11:40:01AM +0200, Daniel Kiper wrote:
> On Fri, Oct 07, 2022 at 01:37:10PM +0800, Michael Chang via Grub-devel wrote:
> > This helps to prevent out of memory error when reading large files via
> > disabling
> > tpm device as verifier has to read all c
On Thu, Oct 06, 2022 at 03:40:36PM -0400, Stefan Berger wrote:
>
>
> On 9/8/22 00:23, Michael Chang via Grub-devel wrote:
> > This helps to prevent out of memory error when reading large files via
> > disablig
> > tpm device as verifier has to read all content
This helps to prevent out of memory error when reading large files via disabling
tpm device as verifier has to read all content into memory in one chunk to
measure the hash and extend to tpm.
Signed-off-by: Michael Chang
Reviewed-by: Stefan Berger
---
grub-core/commands/efi/tpm.c | 37
This helps to prevent out of memory error when reading large files via disablig
tpm device as verifier has to read all content into memory in one chunk to
measure the hash and extend to tpm.
Signed-off-by: Michael Chang
---
grub-core/commands/efi/tpm.c | 37
On Mon, Aug 29, 2022 at 04:36:25PM +0200, Ismael Luceno wrote:
> This enables an early failure; for i386-ieee1275 and powerpc-ieee1275 on
> Linux, without /dev/nvram the system may be left in an unbootable state.
>
> Signed-off-by: Ismael Luceno
> ---
> util/grub-install.c | 23 +
On Mon, Aug 29, 2022 at 04:36:24PM +0200, Ismael Luceno wrote:
> Signed-off-by: Ismael Luceno
> ---
> util/grub-install.c | 2 ++
> 1 file changed, 2 insertions(+)
>
> diff --git a/util/grub-install.c b/util/grub-install.c
> index 7b04bd3c534b..527b85e27aa7 100644
> --- a/util/grub-install.c
> +
successful image embedding so that boot failure is
incurred due to inconsistent state.
Signed-off-by: Michael Chang
---
util/grub-install.c | 1 +
1 file changed, 1 insertion(+)
diff --git a/util/grub-install.c b/util/grub-install.c
index 7b04bd3c53..1c0ece7f19 100644
--- a/util/grub-install.c
On Wed, Aug 24, 2022 at 06:03:11PM +0200, Ismael Luceno wrote:
> Otherwise the installation will fail, and the system will be left in an
> unbootable state.
>
> On ppc64le, the boot process shows:
>
> Welcome to GRUB!
>
> error: ../../grub-core/kern/dl.c:380:symbol `grub_disk_get_siz
On Tue, Jun 14, 2022 at 03:47:30PM +0200, The development of GNU GRUB wrote:
> This lets a LUKS2 cryptodisk have its cipher and hash filled out,
> otherwise they wouldn't be initialized if cheat mounted.
> ---
> grub-core/osdep/devmapper/getroot.c | 91 -
> 1 file chang
On Fri, Jun 03, 2022 at 03:56:10PM +0530, sinfinity 85 wrote:
> Hi
> We need to unseal TPM keys in GRUB2 (2.0.4) in order to decrypt the kernel
> and load it. But, I see that there's no support for unsealing keys in GRUB2.
> However, support for unsealing keys is present in TrustedGrub.Has anyone
On Thu, May 26, 2022 at 05:07:11PM -0400, Robbie Harwood wrote:
> Mathieu Desnoyers writes:
>
> > There are no users left of version_find_latest(), version_test_gt(), and
> > version_test_numeric(). Remove those unused helper functions. Using
> > those helper functions is what caused the quadrati
On Thu, Apr 21, 2022 at 09:32:41PM +1000, Daniel Axtens wrote:
> Hi,
>
> >> This code allows us to parse:
> >>
> >> - PKCS#7 signedData messages. Only a single signerInfo is supported,
> >>which is all that the Linux sign-file utility supports creating
> >>out-of-the-box. Only RSA, SHA-2
2]
https://elixir.bootlin.com/linux/v5.16.14/source/include/linux/compiler.h#L180
[3]
https://elixir.bootlin.com/linux/v5.16.14/source/include/linux/compiler-gcc.h#L31
Signed-off-by: Michael Chang
---
grub-core/bus/cs5536.c| 4 ++--
grub-core/commands/acpi.c | 4 ++--
pointer type in grub_absolute_pointer
5. Use asm keyword instead of __asm__
6. Mention RELOC_HIDE() macro in the comment of grub_absolute_pointer
Thanks,
Michael
Michael Chang (3):
mkimage: Fix dangling pointer may be used error
Fix -Werror=array-bounds array subscript 0 is outside arra
* const gf_powx ATTRIBUTE_TEXT = (void *) 0x10;
For the reason given above, use gcc diagnostic pragmas to suppress the
array-bounds warning.
Signed-off-by: Michael Chang
Reviewed-by: Daniel Kiper
---
grub-core/lib/reed_solomon.c | 9 +
1 file changed, 9 insertions(+)
diff --git a
PE_OHDR (o32, o64, header_size) = grub_host_to_target32
(header_size);
../util/mkimage.c:857:28: note: 'tmp_' declared here
857 | __typeof__((o64)->field) tmp_;\
| ^~~~
Signed-off-by: Michael Chang
Reviewed-by: Daniel Kiper
---
util/m
On Tue, Mar 22, 2022 at 10:19:26PM +0100, Daniel Kiper wrote:
> On Thu, Mar 17, 2022 at 02:43:41PM +0800, Michael Chang via Grub-devel wrote:
> > The grub is failing to build with gcc-12 in many places like this:
> >
> > In function 'init_cbfsdisk',
> >
On Tue, Feb 01, 2022 at 05:02:57AM -0800, Hernan Gatta wrote:
[snip]
> +static grub_err_t
> +grub_protect_tpm2_get_policy_digest (struct grub_protect_args *args,
> + TPM2B_DIGEST *digest)
> +{
[snip]
> + for (i = 0; i < args->tpm2_pcr_count; i++)
> +{
>
On Tue, Feb 01, 2022 at 05:02:55AM -0800, Hernan Gatta wrote:
Sorry forgot to mention another build related issue in previous reply.
> +static grub_err_t
> +grub_tpm2_protector_srk_unmarshal_keyfile (void *sealed_key,
> + grub_size_t sealed_key_size,
> +
On Tue, Feb 01, 2022 at 05:02:55AM -0800, Hernan Gatta wrote:
> The TPM2 key protector is a module that enables the automatic retrieval of a
> fully-encrypted disk's unlocking key from a TPM 2.0.
>
> The theory of operation is such that the module accepts various arguments,
> most
> of which are
On Thu, Mar 17, 2022 at 08:41:32AM +0100, Paul Menzel wrote:
> Dear Michael,
>
>
> Thank you for working on that.
>
>
> Am 17.03.22 um 07:43 schrieb Michael Chang via Grub-devel:
> > The grub_absolute_pointer() is a compound expression that can only work
> >
* const gf_powx ATTRIBUTE_TEXT = (void *) 0x10;
For the reason given above, use gcc diagnostic pragmas to suppress the
array-bounds warning.
Signed-off-by: Michael Chang
---
grub-core/lib/reed_solomon.c | 9 +
1 file changed, 9 insertions(+)
diff --git a/grub-core/lib/reed_solomon.c
]
https://elixir.bootlin.com/linux/v5.16.14/source/include/linux/compiler-gcc.h#L31
Signed-off-by: Michael Chang
---
grub-core/bus/cs5536.c| 4 ++--
grub-core/commands/acpi.c | 4 ++--
grub-core/commands/efi/loadbios.c | 9 +
grub-core/commands/i386/pc/dri
PE_OHDR (o32, o64, header_size) = grub_host_to_target32
(header_size);
../util/mkimage.c:857:28: note: 'tmp_' declared here
857 | __typeof__((o64)->field) tmp_;\
| ^~~~
Signed-off-by: Michael Chang
---
util/mkimage.c | 21 +
running into similar problems.
Thanks,
Michael
Michael Chang (3):
mkimage: Fix dangling pointer may be used error
Fix -Werror=array-bounds array subscript 0 is outside array bounds
reed_solomon: Fix array subscript 0 is outside array bounds
grub-core/bus/cs5536.c| 4 ++
On Fri, Mar 11, 2022 at 12:35:57AM +0100, Daniel Kiper wrote:
> Latest GCC may complain in that way:
>
> commands/i386/pc/sendkey.c: In function ‘grub_sendkey_postboot’:
> commands/i386/pc/sendkey.c:223:21: error: writing 1 byte into a region of
> size 0 [-Werror=stringop-overflow=]
> 223
ER_SUPPORT
Signed-off-by: Michael Chang
---
grub-core/fs/btrfs.c | 91 +---
include/grub/disk.h | 2 +
2 files changed, 80 insertions(+), 13 deletions(-)
diff --git a/grub-core/fs/btrfs.c b/grub-core/fs/btrfs.c
index c908b460f..e58dcf242 100644
--- a/grub-core/
file content. This
presents a low confidentiality risk as grub.cfg may contain non-secured
plain-text passwords.
This patch restores the missing umask and set the file mode of creation
to 0600 preventing unprivileged access.
Fixes: CVE-2021-3981
Signed-off-by: Michael Chang
---
util/grub-mkconf
On Wed, Dec 01, 2021 at 05:16:56PM +0100, Daniel Kiper wrote:
> On Tue, Nov 02, 2021 at 04:11:06PM +0800, Michael Chang via Grub-devel wrote:
> > Up to now grub can only embed to the first 64 KiB before primary
>
> s/grub/GRUB/
>
> > superblock of btrfs, effectively limi
On Tue, Nov 16, 2021 at 02:42:05PM +1100, Daniel Axtens wrote:
> Background
> --
>
> Figuring out how to lay out memory in powerpc OpenFirmware is a bit
> of a complicate dance.
>
> Firstly, firmware needs to reserve a little bit of space for things
> like interrupt vectors that live at a
and
> it does solve the mentioned issues.
>
> Tested-by: Javier Martinez Canillas
Same with SUSE/openSUSE.
Tested-by: Michael Chang
Thanks,
Michael
>
> Best regards,
> --
> Javier Martinez Canillas
> Linux Engineering
> Red Hat
>
>
> _
f overflow and it's tracing.
This patch has been tested to provide out of the box support to btrfs
zstd compression with which grub has been installed to the partition.
[1] https://btrfs.wiki.kernel.org/index.php/Manpage/btrfs(5)#BOOTLOADER_SUPPORT
Signed-off-by: Michael Chang
---
grub-
On Thu, Oct 28, 2021 at 03:36:10PM +0800, The development of GNU GRUB wrote:
> Gentle ping?
>
> Without this patch, the new mkfs.btrfs NO_HOLES feature would break any
> kernel/initramfs with hole in it.
>
> And considering the modification is already small, I believe this patch is
> definitely w
On Tue, Oct 26, 2021 at 02:55:21PM +0200, Daniel Kiper wrote:
> On Fri, Sep 10, 2021 at 05:22:22PM +0800, Michael Chang via Grub-devel wrote:
> > On Wed, Sep 08, 2021 at 09:37:52PM +0200, Daniel Kiper wrote:
> > > On Fri, Sep 03, 2021 at 09:21:39AM +0800, Michael Chang via Grub-
essage
catalogs that will consequently result in the unpleasant message.
error: file `/boot/grub/locale/POSIX.gmo' not found
Signed-off-by: Michael Chang
---
util/grub.d/00_header.in | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/util/grub.d/00_header.in b/util/grub.
t-segment", 0x40));
. = SEGMENT_START("text-segment", 0x40) + SIZEOF_HEADERS;
[2] Ref: https://sourceware.org/bugzilla/show_bug.cgi?id=27377
[3] Ref: https://bugs.gentoo.org/787221
Signed-off-by: Michael Chang
---
configure.ac | 14 ++
1 file changed, 14 i
On Mon, Sep 27, 2021 at 10:18:49AM -0400, Mike Gilbert wrote:
> On Mon, Sep 27, 2021 at 5:41 AM Michael Chang via Grub-devel
> wrote:
> > It is also worth mentioning that binutils upstream apparently doesn't
> > seem to consider this as a bug [2] and proposed to use
&
t-segment", 0x40));
. = SEGMENT_START("text-segment", 0x40) + SIZEOF_HEADERS;
[2] Ref: https://bugs.gentoo.org/787221
[3] Ref: https://sourceware.org/bugzilla/show_bug.cgi?id=27377
Signed-off-by: Michael Chang
---
configure.ac | 14 ++
1 file changed, 14 i
tem-root from the example above, thus
grub-install will not error out because the excessive encrypted device
to boot the root device is not configured.
Signed-off-by: Michael Chang
Tested-by: Olav Reinert
---
grub-core/disk/diskfilter.c | 61 ++---
1 file change
On Thu, Sep 16, 2021 at 11:47:57PM +0200, Daniel Kiper wrote:
> On Mon, Aug 09, 2021 at 12:37:59PM +0800, Michael Chang via Grub-devel wrote:
> > On Thu, Aug 05, 2021 at 03:07:21PM +0200, Daniel Kiper wrote:
> > > On Mon, Aug 02, 2021 at 05:41:15PM +0800, Michael Chang via Grub-
On Wed, Sep 15, 2021 at 06:00:09PM +0200, Daniel Kiper wrote:
> On Thu, Sep 09, 2021 at 09:02:29PM +0800, Michael Chang via Grub-devel wrote:
> > Currently the grub_diskfilter_memberlist function returns all physical
> > volumes added to a volume group to which a logical volu
On Tue, Sep 14, 2021 at 10:13:36AM -0400, Mike Gilbert wrote:
> On Mon, Aug 9, 2021 at 12:37 AM Michael Chang via Grub-devel
> wrote:
[snip]
> Just wondering if there has been any progress on this issue.
>
> A few people have commented on the related bug [1] for Gentoo Linux
On Wed, Sep 08, 2021 at 09:37:52PM +0200, Daniel Kiper wrote:
> On Fri, Sep 03, 2021 at 09:21:39AM +0800, Michael Chang via Grub-devel wrote:
> > On Thu, Sep 02, 2021 at 02:12:52PM +0200, Daniel Kiper wrote:
> > > On Thu, Sep 02, 2021 at 01:48:30PM +0800, Michael Chang via Grub-
tem-root from the example above, thus
grub-install will not error out because the excessive encrypted device
to boot the root device is not configured.
Signed-off-by: Michael Chang
Tested-by: Olav Reinert
---
grub-core/disk/diskfilter.c | 60 ++---
1 file change
On Thu, Sep 02, 2021 at 06:50:35PM +0200, Erwan Velu wrote:
> This patch got written by Arthur Mesh from Juniper (now at Apple Sec team).
> It was extracted from
> https://lists.gnu.org/archive/html/grub-devel/2015-09/msg00065.html
>
> Since this email, the this patch was :
> - rebased against th
On Thu, Sep 02, 2021 at 02:12:52PM +0200, Daniel Kiper wrote:
> On Thu, Sep 02, 2021 at 01:48:30PM +0800, Michael Chang via Grub-devel wrote:
> > On Wed, Sep 01, 2021 at 06:38:22PM +0200, Daniel Kiper wrote:
> > > On Tue, Aug 31, 2021 at 03:12:28PM +0800, Michael Chang via Grub-
On Wed, Sep 01, 2021 at 06:38:22PM +0200, Daniel Kiper wrote:
> On Tue, Aug 31, 2021 at 03:12:28PM +0800, Michael Chang via Grub-devel wrote:
> > The zstd support in btrfs brings significant size increment to the
> > on-disk image that it can no longer fit into btrfs bootloader are
ocess of
running grub-install through inserting btrfs_zstd module to the on-disk
image, otherwise a warning will be logged on screen to indicate user
that zstd support for btrfs is disabled due to the size limit.
Signed-off-by: Michael Chang
---
Makefile.util.def | 1 +
grub
On Mon, Aug 09, 2021 at 05:34:41PM +0200, Daniel Kiper wrote:
> On Mon, Aug 02, 2021 at 05:40:20PM +0800, Michael Chang via Grub-devel wrote:
> > Currently the grub_diskfilter_memberlist function returns all physical
> > volumes added to a volume group to which a logical volu
On Thu, Aug 05, 2021 at 05:05:05PM +0200, Daniel Kiper wrote:
> On Mon, Aug 02, 2021 at 05:40:57PM +0800, Michael Chang via Grub-devel wrote:
> > The gcc by default assumes executable stack is required if the source
> > object file doesn't have .note.GNU-stack section in
On Thu, Aug 05, 2021 at 03:07:21PM +0200, Daniel Kiper wrote:
> On Mon, Aug 02, 2021 at 05:41:15PM +0800, Michael Chang via Grub-devel wrote:
> > The xen build fails on binutils 2.36 with the following error.
> >
> > /usr/lib64/gcc/x86_64-suse-linux/10/../../../../x86
Hi,
Enclosed herewith please find the revised patch from openSUSE that could
also fix this very same problem.
According to Fabian, the author of this patch, the reason for having
this patch is that he found some problem in the posted one. I have added
him to the CC list so that he could provide m
1 - 100 of 392 matches
Mail list logo