grub-devel
Thread
Date
Earlier messages
Later messages
Messages by Thread
Re: [PATCH v2] bsd: Fix type passed for the kernel
Daniel Kiper
[PATCH v2] powerpc: increase MIN RMA size for CAS negotiation
Avnish Chouhan
Re: [PATCH v2] powerpc: increase MIN RMA size for CAS negotiation
Daniel Kiper
Re: [PATCH v2] powerpc: increase MIN RMA size for CAS negotiation
Avnish Chouhan
Re: [PATCH v2] powerpc: increase MIN RMA size for CAS negotiation
Daniel Kiper
Re: [PATCH v2] powerpc: increase MIN RMA size for CAS negotiation
Avnish Chouhan
Re: [PATCH v2] powerpc: increase MIN RMA size for CAS negotiation
Daniel Kiper
Re: [PATCH v2] powerpc: increase MIN RMA size for CAS negotiation
Avnish Chouhan
GRUB Error: Couldn't Find Suitable Memory Target for 210MB Initramfs
Zhang, Wentao via Grub-devel
Re: GRUB Error: Couldn't Find Suitable Memory Target for 210MB Initramfs
Daniel Kiper
[PATCH v2 0/6] Various test fixes proposed by Thomas Schmitt
Glenn Washburn
[PATCH v2 6/6] tests/util/grub-shell: Remove the work directory on successful run and debug is not on
Glenn Washburn
[PATCH v2 1/6] tests/util/grub-shell-luks-tester: Add missing line to create RET variable in cleanup
Glenn Washburn
[PATCH v2 4/6] tests/grub_cmd_cryptomount: Default TMPDIR to /tmp
Glenn Washburn
[PATCH v2 2/6] tests: Cleanup generated files on expected failure in grub_cmd_cryptomount
Glenn Washburn
[PATCH v2 5/6] tests/grub_cmd_cryptomount: Remove temporary directories if successful and debug is not on
Glenn Washburn
[PATCH v2 3/6] tests/grub_cmd_cryptomount: Cleanup the cryptsetup script unless debug is enabled
Glenn Washburn
Re: [PATCH v2 0/6] Various test fixes proposed by Thomas Schmitt
Thomas Schmitt via Grub-devel
Re: [PATCH v2 0/6] Various test fixes proposed by Thomas Schmitt
Glenn Washburn
Re: [PATCH v2 0/6] Various test fixes proposed by Thomas Schmitt
Daniel Kiper
[PATCH] bsd: Fix type passed for the kernel
Vladimir Serbinenko
Re: [PATCH] bsd: Fix type passed for the kernel
Daniel Kiper
Re: [PATCH] bsd: Fix type passed for the kernel
Vladimir 'phcoder' Serbinenko
Re: [PATCH] bsd: Fix type passed for the kernel
Daniel Kiper
[PATCH] kern: Unbreak support for nested partitions
Vladimir Serbinenko
Re: [PATCH] kern: Unbreak support for nested partitions
Daniel Kiper
[PATCH 0/1] lib: Fix clang Build
Andrew Hamilton
[PATCH 1/1] lib: Fix clang Build - Remove Duplicate Typedef in TSS
Andrew Hamilton
Re: [PATCH 1/1] lib: Fix clang Build - Remove Duplicate Typedef in TSS
Ross Philipson via Grub-devel
Re: [PATCH 1/1] lib: Fix clang Build - Remove Duplicate Typedef in TSS
Gary Lin via Grub-devel
Re: [PATCH 1/1] lib: Fix clang Build - Remove Duplicate Typedef in TSS
Daniel Kiper
[PATCH v6 0/6] More ls improvements
Glenn Washburn
[PATCH v6 1/6] commands/ls: Return proper GRUB_ERR_* for functions returning type grub_err_t
Glenn Washburn
[PATCH v6 5/6] commands/ls: Print full paths for file args
Glenn Washburn
[PATCH v6 2/6] commands/ls: Merge print_files_long and print_files into print_file
Glenn Washburn
[PATCH v6 4/6] commands/ls: Output path for single file arguments given with path
Glenn Washburn
[PATCH v6 6/6] commands/ls: Add directory header for dir args
Glenn Washburn
[PATCH v6 3/6] commands/ls: Show modification time for file paths
Glenn Washburn
Re: [PATCH v6 0/6] More ls improvements
Daniel Kiper
[PATCH v3] acpi: Use options enum to index command options
Glenn Washburn
Re: [PATCH v3] acpi: Use options enum to index command options
Daniel Kiper
[PATCH v5 0/6] More ls improvements
Glenn Washburn
[PATCH v5 1/6] commands/ls: Return proper GRUB_ERR_* for functions returning type grub_err_t
Glenn Washburn
[PATCH v5 6/6] commands/ls: Add directory header for dir args
Glenn Washburn
[PATCH v5 2/6] commands/ls: Merge print_files_long and print_files into print_file
Glenn Washburn
[PATCH v5 3/6] commands/ls: Show modification time for file paths
Glenn Washburn
[PATCH v5 4/6] commands/ls: Output path for single file arguments given with path
Glenn Washburn
[PATCH v5 5/6] commands/ls: Print full paths for file args
Glenn Washburn
[PATCH 0/2] docs: Update Documentation for Lockdown Changes
Andrew Hamilton
[PATCH 2/2] docs: Capture Additional Commands Restricted by Lockdown
Andrew Hamilton
[PATCH 1/2] docs: Document Restricted Filesystems in Lockdown
Andrew Hamilton
Re: [PATCH 0/2] docs: Update Documentation for Lockdown Changes
Daniel Kiper via Grub-devel
[PATCH] i386: Check for cpuid family when flush cache only on VIA CPUs
Tony W Wang-oc
[PATCH] fs/ntfs: Check at->attr_cur after calling next_attribute()
B Horn
Re: [PATCH] fs/ntfs: Check at->attr_cur after calling next_attribute()
Andreas Klauer
Re: [PATCH] fs/ntfs: Check at->attr_cur after calling next_attribute()
Vladimir 'phcoder' Serbinenko
Re: [PATCH] fs/ntfs: Check at->attr_cur after calling next_attribute()
B Horn
Re: [PATCH] fs/ntfs: Check at->attr_cur after calling next_attribute()
Marta Lewandowska
Re: [PATCH] fs/ntfs: Check at->attr_cur after calling next_attribute()
Andrew Hamilton
Re: [PATCH] fs/ntfs: Check at->attr_cur after calling next_attribute()
Andrew Hamilton
Re: [PATCH] fs/ntfs: Check at->attr_cur after calling next_attribute()
Daniel Kiper
Re: [PATCH] fs/ntfs: Check at->attr_cur after calling next_attribute()
Andrew Hamilton
Feedback Request: Implement Fuzzers and Add to OSS-Fuzz
Andrew Hamilton
Re: Feedback Request: Implement Fuzzers and Add to OSS-Fuzz
Daniel Kiper via Grub-devel
Re: Feedback Request: Implement Fuzzers and Add to OSS-Fuzz
Andrew Hamilton
Re: Feedback Request: Implement Fuzzers and Add to OSS-Fuzz
Lidong Chen via Grub-devel
[PATCH v2 RESEND] util/grub.d/30_os-prober.in: Conditionally show or hide chain and efi menu entries
Pascal Hambourg
Re: [PATCH v2 RESEND] util/grub.d/30_os-prober.in: Conditionally show or hide chain and efi menu entries
Daniel Kiper
[PATCH v2 RESEND] util/grub.d/30_os-prober.in: Fix GRUB_OS_PROBER_SKIP_LIST for non-EFI
Pascal Hambourg
Re: [PATCH v2 RESEND] util/grub.d/30_os-prober.in: Fix GRUB_OS_PROBER_SKIP_LIST for non-EFI
Daniel Kiper
[PATCH] fs/ext2: Rework out-of-bounds read for inline and external extents
Michael Chang via Grub-devel
Re: [PATCH] fs/ext2: Rework out-of-bounds read for inline and external extents
Christian Hesse
Re: [PATCH] fs/ext2: Rework out-of-bounds read for inline and external extents
Daniel Kiper
Arch Linux latest git snapshot has too many issues to be a new release base
Tobias Powalowski via Grub-devel
Re: Arch Linux latest git snapshot has too many issues to be a new release base
Glenn Washburn
Re: Arch Linux latest git snapshot has too many issues to be a new release base
Christian Hesse
Re: Arch Linux latest git snapshot has too many issues to be a new release base
Michael Chang via Grub-devel
Re: Arch Linux latest git snapshot has too many issues to be a new release base
Christian Hesse
Re: Arch Linux latest git snapshot has too many issues to be a new release base
Michael Chang via Grub-devel
Re: Arch Linux latest git snapshot has too many issues to be a new release base
Christian Hesse
[SECURITY PATCH 00/73] GRUB2 vulnerabilities - 2025/02/18
Daniel Kiper via Grub-devel
[SECURITY PATCH 02/73] fs/ufs: Fix a heap OOB write
Daniel Kiper via Grub-devel
[SECURITY PATCH 01/73] misc: Implement grub_strlcpy()
Daniel Kiper via Grub-devel
[SECURITY PATCH 03/73] fs/hfs: Fix stack OOB write with grub_strcpy()
Daniel Kiper via Grub-devel
[SECURITY PATCH 04/73] fs/tar: Initialize name in grub_cpio_find_file()
Daniel Kiper via Grub-devel
[SECURITY PATCH 05/73] fs/tar: Integer overflow leads to heap OOB write
Daniel Kiper via Grub-devel
[SECURITY PATCH 06/73] fs/f2fs: Set a grub_errno if mount fails
Daniel Kiper via Grub-devel
[SECURITY PATCH 07/73] fs/hfsplus: Set a grub_errno if mount fails
Daniel Kiper via Grub-devel
[SECURITY PATCH 11/73] fs/jfs: Fix OOB read caused by invalid dir slot index
Daniel Kiper via Grub-devel
[SECURITY PATCH 12/73] fs/jfs: Use full 40 bits offset and address for a data extent
Daniel Kiper via Grub-devel
[SECURITY PATCH 15/73] fs/ntfs: Fix out-of-bounds read
Daniel Kiper via Grub-devel
[SECURITY PATCH 23/73] disk/cryptodisk: Require authentication after TPM unlock for CLI access
Daniel Kiper via Grub-devel
[SECURITY PATCH 14/73] fs/ext2: Fix out-of-bounds read for inline extents
Daniel Kiper via Grub-devel
Re: [SECURITY PATCH 14/73] fs/ext2: Fix out-of-bounds read for inline extents
Michael Chang via Grub-devel
[SECURITY PATCH 19/73] fs/xfs: Fix out-of-bounds read
Daniel Kiper via Grub-devel
[SECURITY PATCH 16/73] fs/ntfs: Track the end of the MFT attribute buffer
Daniel Kiper via Grub-devel
[SECURITY PATCH 10/73] fs/jfs: Fix OOB read in jfs_getent()
Daniel Kiper via Grub-devel
[SECURITY PATCH 17/73] fs/ntfs: Use a helper function to access attributes
Daniel Kiper via Grub-devel
[SECURITY PATCH 29/73] net: Remove variables hooks when interface is unregisted
Daniel Kiper via Grub-devel
[SECURITY PATCH 24/73] disk/loopback: Reference tracking for the loopback
Daniel Kiper via Grub-devel
[SECURITY PATCH 31/73] net/tftp: Fix stack buffer overflow in tftp_open()
Daniel Kiper via Grub-devel
[SECURITY PATCH 27/73] script/execute: Limit the recursion depth
Daniel Kiper via Grub-devel
[SECURITY PATCH 30/73] net: Fix OOB write in grub_net_search_config_file()
Daniel Kiper via Grub-devel
[SECURITY PATCH 33/73] kern/dl: Fix for an integer overflow in grub_dl_ref()
Daniel Kiper via Grub-devel
[SECURITY PATCH 28/73] net: Unregister net_default_ip and net_default_mac variables hooks on unload
Daniel Kiper via Grub-devel
[SECURITY PATCH 36/73] commands/extcmd: Missing check for failed allocation
Daniel Kiper via Grub-devel
[SECURITY PATCH 35/73] kern/dl: Check for the SHF_INFO_LINK flag in grub_dl_relocate_symbols()
Daniel Kiper via Grub-devel
[SECURITY PATCH 22/73] kern/file: Implement filesystem reference counting
Daniel Kiper via Grub-devel
[SECURITY PATCH 34/73] kern/dl: Use correct segment in grub_dl_set_mem_attrs()
Daniel Kiper via Grub-devel
[SECURITY PATCH 40/73] gettext: Remove variables hooks on module unload
Daniel Kiper via Grub-devel
[SECURITY PATCH 52/73] disk: Check if returned pointer for allocated memory is NULL
Daniel Kiper via Grub-devel
[SECURITY PATCH 50/73] disk: Use safe math macros to prevent overflows
Daniel Kiper via Grub-devel
[SECURITY PATCH 53/73] disk/ieee1275/ofdisk: Call grub_ieee1275_close() when grub_malloc() fails
Daniel Kiper via Grub-devel
[SECURITY PATCH 37/73] commands/ls: Fix NULL dereference
Daniel Kiper via Grub-devel
[SECURITY PATCH 43/73] commands/read: Fix an integer overflow when supplying more than 2^31 characters
Daniel Kiper via Grub-devel
[SECURITY PATCH 32/73] video/readers/jpeg: Do not permit duplicate SOF0 markers in JPEG
Daniel Kiper via Grub-devel
[SECURITY PATCH 38/73] commands/pgp: Unregister the "check_signatures" hooks on module unload
Daniel Kiper via Grub-devel
[SECURITY PATCH 51/73] disk: Prevent overflows when allocating memory for arrays
Daniel Kiper via Grub-devel
[SECURITY PATCH 54/73] fs: Use safe math macros to prevent overflows
Daniel Kiper via Grub-devel
[SECURITY PATCH 49/73] fs: Disable many filesystems under lockdown
Daniel Kiper via Grub-devel
Re: [SECURITY PATCH 49/73] fs: Disable many filesystems under lockdown
Petr Řehák
Re: [SECURITY PATCH 49/73] fs: Disable many filesystems under lockdown
Daniel Kiper
Re: [SECURITY PATCH 49/73] fs: Disable many filesystems under lockdown
Pascal Hambourg
Re: [SECURITY PATCH 49/73] fs: Disable many filesystems under lockdown
Daniel Kiper
Re: [SECURITY PATCH 49/73] fs: Disable many filesystems under lockdown
Andrew Hamilton
Re: [SECURITY PATCH 49/73] fs: Disable many filesystems under lockdown
Andrew Hamilton
Re: [SECURITY PATCH 49/73] fs: Disable many filesystems under lockdown
Daniel Kiper via Grub-devel
Re: [SECURITY PATCH 49/73] fs: Disable many filesystems under lockdown
Andrew Hamilton
[SECURITY PATCH 55/73] fs: Prevent overflows when allocating memory for arrays
Daniel Kiper via Grub-devel
[SECURITY PATCH 60/73] fs/zfs: Add missing NULL check after grub_strdup() call
Daniel Kiper via Grub-devel
[SECURITY PATCH 64/73] fs/sfs: Check if allocated memory is NULL
Daniel Kiper via Grub-devel
[SECURITY PATCH 58/73] fs/zfs: Prevent overflows when allocating memory for arrays
Daniel Kiper via Grub-devel
[SECURITY PATCH 67/73] misc: Ensure consistent overflow error messages
Daniel Kiper via Grub-devel
[SECURITY PATCH 41/73] gettext: Integer overflow leads to heap OOB write or read
Daniel Kiper via Grub-devel
[SECURITY PATCH 44/73] commands/test: Stack overflow due to unlimited recursion depth
Daniel Kiper via Grub-devel
[SECURITY PATCH 26/73] kern/partition: Limit recursion in part_iterate()
Daniel Kiper via Grub-devel
[SECURITY PATCH 68/73] bus/usb/ehci: Define GRUB_EHCI_TOGGLE as grub_uint32_t
Daniel Kiper via Grub-devel
[SECURITY PATCH 48/73] fs/bfs: Disable under lockdown
Daniel Kiper via Grub-devel
[SECURITY PATCH 57/73] fs/zfs: Use safe math macros to prevent overflows
Daniel Kiper via Grub-devel
[SECURITY PATCH 45/73] commands/minicmd: Block the dump command in lockdown mode
Daniel Kiper via Grub-devel
[SECURITY PATCH 69/73] normal/menu: Use safe math to avoid an integer overflow
Daniel Kiper via Grub-devel
[SECURITY PATCH 70/73] kern/partition: Add sanity check after grub_strtoul() call
Daniel Kiper via Grub-devel
[SECURITY PATCH 71/73] kern/misc: Add sanity check after grub_strtoul() call
Daniel Kiper via Grub-devel
[SECURITY PATCH 73/73] loader/i386/bsd: Use safe math to avoid underflow
Daniel Kiper via Grub-devel
[SECURITY PATCH 65/73] script/execute: Fix potential underflow and NULL dereference
Daniel Kiper via Grub-devel
[SECURITY PATCH 63/73] net: Check if returned pointer for allocated memory is NULL
Daniel Kiper via Grub-devel
[SECURITY PATCH 47/73] commands/hexdump: Disable memory reading in lockdown mode
Daniel Kiper via Grub-devel
[SECURITY PATCH 42/73] gettext: Integer overflow leads to heap OOB write
Daniel Kiper via Grub-devel
[SECURITY PATCH 56/73] fs: Prevent overflows when assigning returned values from read_number()
Daniel Kiper via Grub-devel
[SECURITY PATCH 61/73] net: Use safe math macros to prevent overflows
Daniel Kiper via Grub-devel
[SECURITY PATCH 13/73] fs/jfs: Inconsistent signed/unsigned types usage in return values
Daniel Kiper via Grub-devel
[SECURITY PATCH 39/73] normal: Remove variables hooks on module unload
Daniel Kiper via Grub-devel
[SECURITY PATCH 09/73] fs/iso9660: Fix invalid free
Daniel Kiper via Grub-devel
[SECURITY PATCH 21/73] kern/file: Ensure file->data is set
Daniel Kiper via Grub-devel
[SECURITY PATCH 20/73] fs/xfs: Ensuring failing to mount sets a grub_errno
Daniel Kiper via Grub-devel
[SECURITY PATCH 18/73] fs/ntfs: Implement attribute verification
Daniel Kiper via Grub-devel
Re: [SECURITY PATCH 18/73] fs/ntfs: Implement attribute verification
Andreas Klauer
Re: [SECURITY PATCH 18/73] fs/ntfs: Implement attribute verification
Daniel Kiper via Grub-devel
Re: [SECURITY PATCH 18/73] fs/ntfs: Implement attribute verification
Glenn Washburn
Re: [SECURITY PATCH 18/73] fs/ntfs: Implement attribute verification
Thomas Schmitt via Grub-devel
Re: [SECURITY PATCH 18/73] fs/ntfs: Implement attribute verification
Thomas Schmitt via Grub-devel
Re: [SECURITY PATCH 18/73] fs/ntfs: Implement attribute verification
Glenn Washburn
Re: [SECURITY PATCH 18/73] fs/ntfs: Implement attribute verification
Thomas Schmitt via Grub-devel
[SECURITY PATCH 08/73] fs/iso9660: Set a grub_errno if mount fails
Daniel Kiper via Grub-devel
[SECURITY PATCH 59/73] fs/zfs: Check if returned pointer for allocated memory is NULL
Daniel Kiper via Grub-devel
[SECURITY PATCH 25/73] kern/disk: Limit recursion depth
Daniel Kiper via Grub-devel
[SECURITY PATCH 46/73] commands/memrw: Disable memory reading in lockdown mode
Daniel Kiper via Grub-devel
Re: [SECURITY PATCH 00/73] GRUB2 vulnerabilities - 2025/02/18
Tobias Powalowski via Grub-devel
Re: [SECURITY PATCH 00/73] GRUB2 vulnerabilities - 2025/02/18
Daniel Kiper
[SECURITY PATCH 66/73] osdep/unix/getroot: Fix potential underflow
Daniel Kiper via Grub-devel
Re: [SECURITY PATCH 00/73] GRUB2 vulnerabilities - 2025/02/18
Didier Spaier via Grub-devel
Re: [SECURITY PATCH 00/73] GRUB2 vulnerabilities - 2025/02/18
Daniel Kiper via Grub-devel
Re: [SECURITY PATCH 00/73] GRUB2 vulnerabilities - 2025/02/18
Didier Spaier via Grub-devel
[SECURITY PATCH 62/73] net: Prevent overflows when allocating memory for arrays
Daniel Kiper via Grub-devel
[SECURITY PATCH 72/73] loader/i386/linux: Cast left shift to grub_uint32_t
Daniel Kiper via Grub-devel
Re: [SECURITY PATCH 00/73] GRUB2 vulnerabilities - 2025/02/18
Christian Hesse
Re: [SECURITY PATCH 00/73] GRUB2 vulnerabilities - 2025/02/18
Daniel Kiper via Grub-devel
Re: [SECURITY PATCH 00/73] GRUB2 vulnerabilities - 2025/02/18
Christian Hesse
Re: [SECURITY PATCH 00/73] GRUB2 vulnerabilities - 2025/02/18
Daniel Kiper via Grub-devel
Re: [SECURITY PATCH 00/73] GRUB2 vulnerabilities - 2025/02/18
Christian Hesse
Re: [SECURITY PATCH 00/73] GRUB2 vulnerabilities - 2025/02/18
Daniel Kiper via Grub-devel
i386-pc version of Grub with setup_var
Guillaume Rattin
[PATCH 0/3] Add commands to load BLS and UKI files
Alec Brown via Grub-devel
[PATCH 1/3] blsuki: Add blscfg command to parse Boot Loader Specification snippets
Alec Brown via Grub-devel
Re: [PATCH 1/3] blsuki: Add blscfg command to parse Boot Loader Specification snippets
Ross Philipson via Grub-devel
[PATCH 2/3] blsuki: Check for mounted /boot in emu
Alec Brown via Grub-devel
Re: [PATCH 2/3] blsuki: Check for mounted /boot in emu
Ross Philipson via Grub-devel
[PATCH 3/3] blsuki: Add uki command to load Unified Kernel Image entries
Alec Brown via Grub-devel
Re: [PATCH 3/3] blsuki: Add uki command to load Unified Kernel Image entries
Ross Philipson via Grub-devel
Re: [PATCH 3/3] blsuki: Add uki command to load Unified Kernel Image entries
Gerd Hoffmann
Re: [PATCH 3/3] blsuki: Add uki command to load Unified Kernel Image entries
Ross Philipson via Grub-devel
[PATCH] fs/xfs: add new superblock features added in Linux 6.12/6.13
Darrick J. Wong via Grub-devel
Re: [PATCH] fs/xfs: add new superblock features added in Linux 6.12/6.13
Daniel Kiper
Re: [PATCH] fs/xfs: add new superblock features added in Linux 6.12/6.13
Darrick J. Wong via Grub-devel
[PATCH 0/3] XFS error handling fixes
Egor Ignatov
[PATCH 2/3] fs/xfs: Fix grub_xfs_iterate_dir return value in case of failure
Egor Ignatov
Re: [PATCH 2/3] fs/xfs: Fix grub_xfs_iterate_dir return value in case of failure
Daniel Kiper
[PATCH 3/3] fs/xfs: Propagate incorrect inode error from grub_xfs_read_inode
Egor Ignatov
Re: [PATCH 3/3] fs/xfs: Propagate incorrect inode error from grub_xfs_read_inode
Daniel Kiper
[PATCH 1/3] fs/xfs: Handle root inode read failure in grub_xfs_mount
Egor Ignatov
Earlier messages
Later messages