messages from 2016-11-22 16:25:39 to 2016-12-17 10:57:21 UTC [more...]
[PATCH v1 2/2] firmware: dmi_scan: Pass dmi_entry_point to kexec'ed kernel
2016-12-17 10:57 UTC
Клиентские базы Skype: prodawez390 Email: prodawez391@gmail.com т +79139230330 (Viber\Whatsapp\Telegram) Тематические, таргетинговые, направленные, поставщиков, покупателей и люб� =?utf-8?Q?=8B=D0=B5_=D
2016-12-16 13:30 UTC
[PATCH V6 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
2016-12-15 14:08 UTC (12+ messages)
` [PATCH V6 01/10] acpi: apei: read ack upon ghes record consumption
` [PATCH V6 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
` [PATCH V6 03/10] efi: parse ARM processor error
` [PATCH V6 04/10] arm64: exception: handle Synchronous External Abort
` [PATCH V6 05/10] acpi: apei: handle SEA notification type for ARMv8
` [PATCH V6 06/10] acpi: apei: panic OS with fatal error status block
` [PATCH V6 07/10] efi: print unrecognized CPER section
` [PATCH V6 08/10] ras: acpi / apei: generate trace event for "
` [PATCH V6 09/10] trace, ras: add ARM processor error trace event
` [PATCH V6 10/10] arm/arm64: KVM: add guest SEA support
[PATCH 1/4] efi: efi_print_memmap(): Call out invalid entries in the memory map early
2016-12-13 15:09 UTC (12+ messages)
` [PATCH 2/4] efi: efi_map_region(): traceback if we try to map invalid sized regions
` [PATCH 3/4] efi: efi_memmap_insert(): don't insert a region more than once
` [PATCH 4/4] efi: efi_memmap_insert(): don't split regions with invalid sizes
` [PATCH 1/4] efi: prune invalid memory map entries
[PATCH v3] efi: prune invalid memory map entries
2016-12-13 10:25 UTC
[PATCH 0/4] UEFI: EFI_MEMORY_ATTRIBUTES_TABLE support for x86
2016-12-13 6:47 UTC (13+ messages)
` [PATCH 1/4] efi: Make EFI_MEMORY_ATTRIBUTES_TABLE initialization common across all architectures
` [PATCH 2/4] efi: Introduce EFI_MEM_ATTR bit and set it from memory attributes table
` [PATCH 3/4] x86/efi: Add support for EFI_MEMORY_ATTRIBUTES_TABLE
` [PATCH 4/4] efi: Skip parsing of EFI_PROPERTIES_TABLE if EFI_MEMORY_ATTRIBUTES_TABLE is detected
[PATCH] efi/libstub: arm*: Pass latest memory map to the kernel
2016-12-12 17:00 UTC (3+ messages)
[GIT PULL] EFI changes for v4.10
2016-12-12 8:07 UTC
Sat, 10 Dec 2016 02:11:06 -0000.Dear linux-efi Your Electricity Bill.2982942931496$$$!!!363189130210890
2016-12-10 2:11 UTC
[BUG/RFC] efi/libstub: Preserve the memory map pointed to by the FDT
2016-12-09 17:51 UTC (2+ messages)
[PATCH] efi/esrt: fix spelling mistake "doen't"
2016-12-09 16:03 UTC (2+ messages)
[RFC PATCH v3 00/20] x86: Secure Memory Encryption (AMD)
2016-12-09 14:26 UTC (22+ messages)
` [RFC PATCH v3 10/20] Add support to access boot related data in the clear
` [RFC PATCH v3 13/20] x86: DMA support for memory encryption
` [RFC PATCH v3 15/20] x86: Check for memory encryption on the APs
` [RFC PATCH v3 19/20] x86: Add support to make use of Secure Memory Encryption
` [RFC PATCH v3 20/20] "
[PATCH 0/8] efi: Pass secure boot mode to kernel [ver #5]
2016-12-09 0:35 UTC (14+ messages)
` [PATCH 1/8] efi: use typed function pointers for runtime services table "
` [PATCH 2/8] x86/efi: Allow invocation of arbitrary runtime services "
` [PATCH 3/8] arm/efi: "
` [PATCH 4/8] efi: Add SHIM and image security database GUID definitions "
` [PATCH 5/8] efi: Get the secure boot status "
` [PATCH 6/8] efi: Disable secure boot if shim is in insecure mode "
` [PATCH 7/8] efi: Add EFI_SECURE_BOOT bit "
` [PATCH 8/8] efi: Handle secure boot from UEFI-2.6 "
[PATCH 0/8] efi: Pass secure boot mode to kernel [ver #6]
2016-12-08 12:31 UTC (9+ messages)
` [PATCH 1/8] efi: use typed function pointers for runtime services table "
` [PATCH 2/8] x86/efi: Allow invocation of arbitrary runtime services "
` [PATCH 3/8] arm/efi: "
` [PATCH 4/8] efi: Add SHIM and image security database GUID definitions "
` [PATCH 5/8] efi: Get the secure boot status "
` [PATCH 6/8] efi: Disable secure boot if shim is in insecure mode "
` [PATCH 7/8] efi: Handle secure boot from UEFI-2.6 "
` [PATCH 8/8] efi: Add EFI_SECURE_BOOT bit "
[GIT PULL] efi: Pass secure boot mode to kernel
2016-12-08 11:56 UTC (2+ messages)
Does anything ever enter through startup_64 in head_64.S?
2016-12-07 16:47 UTC (3+ messages)
[PATCH 0/8] efi: Pass secure boot mode to kernel [ver #4]
2016-12-07 11:49 UTC (10+ messages)
` [PATCH 1/8] efi: use typed function pointers for runtime services table "
` [PATCH 2/8] x86/efi: Allow invocation of arbitrary runtime services "
` [PATCH 3/8] arm/efi: "
` [PATCH 4/8] efi: Add SHIM and image security database GUID definitions "
` [PATCH 5/8] efi: Get the secure boot status "
` [PATCH 6/8] efi: Disable secure boot if shim is in insecure mode "
` [PATCH 7/8] efi: Add EFI_SECURE_BOOT bit "
` [PATCH 8/8] efi: Handle secure boot from UEFI-2.6 "
[PATCH 0/2] Honey, I shrunk the EFI stub
2016-12-04 14:13 UTC (5+ messages)
[PATCH 0/9] KEYS: Blacklisting & UEFI database load
2016-12-02 20:18 UTC (8+ messages)
` [PATCH 8/9] MODSIGN: Import certificates from UEFI Secure Boot
linux kernel support for logitech g502 proteus
2016-12-01 15:57 UTC
[PATCH 0/6] efi: Pass secure boot mode to kernel [ver #2]
2016-11-30 16:51 UTC (28+ messages)
` [PATCH 1/6] x86/efi: Allow invocation of arbitrary runtime services "
` [PATCH 2/6] arm/efi: "
` [PATCH 3/6] efi: Add SHIM and image security database GUID definitions "
` [PATCH 4/6] efi: Get the secure boot status "
` [PATCH 5/6] efi: Disable secure boot if shim is in insecure mode "
` [PATCH 6/6] efi: Add EFI_SECURE_BOOT bit "
[PATCH] Lock down drivers that can have io ports, io mem, irqs and dma changed
2016-11-30 16:25 UTC (19+ messages)
` [PATCH 00/16] Kernel lockdown
[PATCH V5 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
2016-11-29 15:37 UTC (12+ messages)
` [PATCH V5 01/10] acpi: apei: read ack upon ghes record consumption
` [PATCH V5 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
` [PATCH V5 03/10] efi: parse ARMv8 processor error
[PATCH] arm64: mm: Fix memmap to be initialized for the entire section
2016-11-25 17:01 UTC (24+ messages)
[PATCH 0/7] efi: Pass secure boot mode to kernel [ver #3]
2016-11-25 16:57 UTC (23+ messages)
` [PATCH 1/7] efi: use typed function pointers for runtime services table "
` [PATCH 4/7] efi: Add SHIM and image security database GUID definitions "
` [PATCH 2/7] x86/efi: Allow invocation of arbitrary runtime services "
` [PATCH 3/7] arm/efi: "
` [PATCH 5/7] efi: Get the secure boot status "
` [PATCH 6/7] efi: Disable secure boot if shim is in insecure mode "
` [PATCH 7/7] efi: Add EFI_SECURE_BOOT bit "
[PATCH] efi: use typed function pointers for runtime services table
2016-11-24 21:34 UTC (2+ messages)
[GIT PULL] one more EFI patch for v4.10
2016-11-24 18:02 UTC (2+ messages)
` [PATCH] efi/libstub: Make efi_random_alloc() allocate below 4 GB on 32-bit
[PATCH 1/6] x86/efi: Allow invocation of arbitrary runtime services
2016-11-23 0:02 UTC (16+ messages)
` [PATCH 02/16] efi: Get the secure boot status
` [PATCH 4/6] "
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).