linux-efi.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2016-12-07 13:26:59 to 2017-01-15 09:53:11 UTC [more...]

[GIT PULL] EFI fixes
 2017-01-15  9:53 UTC 

[PATCH 0/4] efi/x86: move efi bgrt init code to early init
 2017-01-13 12:21 UTC  (22+ messages)
` [PATCH 1/4] efi/x86: make efi_memmap_reserve only insert into boot mem areas
` [PATCH 2/4] efi/x86: move efi bgrt init code to early init code
` [PATCH 3/4] efi/x86: move efi_print_memmap to drivers/firmware/efi/memmap.c
` [PATCH 4/4] efi/x86: add debug code to print cooked memmap

[PATCH V7 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
 2017-01-12 18:15 UTC  (11+ messages)
` [PATCH V7 01/10] acpi: apei: read ack upon ghes record consumption
` [PATCH V7 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
` [PATCH V7 03/10] efi: parse ARM processor error
` [PATCH V7 04/10] arm64: exception: handle Synchronous External Abort
` [PATCH V7 05/10] acpi: apei: handle SEA notification type for ARMv8
` [PATCH V7 06/10] acpi: apei: panic OS with fatal error status block
` [PATCH V7 07/10] efi: print unrecognized CPER section
` [PATCH V7 08/10] ras: acpi / apei: generate trace event for "
` [PATCH V7 09/10] trace, ras: add ARM processor error trace event
` [PATCH V7 10/10] arm/arm64: KVM: add guest SEA support

Напишу контент
 2017-01-11 18:04 UTC 

[PATCH 0/8] efi: Pass secure boot mode to kernel [ver #6]
 2017-01-11 15:29 UTC  (15+ messages)
` [PATCH 1/8] efi: use typed function pointers for runtime services table "
` [PATCH 2/8] x86/efi: Allow invocation of arbitrary runtime services "
` [PATCH 3/8] arm/efi: "
` [PATCH 4/8] efi: Add SHIM and image security database GUID definitions "
` [PATCH 5/8] efi: Get the secure boot status "
  ` [PATCH 6/8] efi: Disable secure boot if shim is in insecure mode "
` [PATCH 7/8] efi: Handle secure boot from UEFI-2.6 "
` [PATCH 8/8] efi: Add EFI_SECURE_BOOT bit "

[PATCH v2 1/2] x86/efi: don't allocate memmap through memblock after mm_init()
 2017-01-11  8:04 UTC  (18+ messages)
` [PATCH v2 2/2] efi: efi_mem_reserve(): don't reserve "

[PATCH V6 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
 2017-01-10 17:50 UTC  (19+ messages)
` [PATCH V6 01/10] acpi: apei: read ack upon ghes record consumption
` [PATCH V6 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
` [PATCH V6 03/10] efi: parse ARM processor error
` [PATCH V6 04/10] arm64: exception: handle Synchronous External Abort
` [PATCH V6 05/10] acpi: apei: handle SEA notification type for ARMv8
` [PATCH V6 06/10] acpi: apei: panic OS with fatal error status block
` [PATCH V6 07/10] efi: print unrecognized CPER section
` [PATCH V6 08/10] ras: acpi / apei: generate trace event for "
` [PATCH V6 09/10] trace, ras: add ARM processor error trace event
` [PATCH V6 10/10] arm/arm64: KVM: add guest SEA support

[PATCH 4.9 099/206] efi/efivar_ssdt_load: Dont return success on allocation failure
 2017-01-10 13:36 UTC 

[PATCH v3 1/2] x86/efi: don't allocate memmap through memblock after mm_init()
 2017-01-09 13:07 UTC  (11+ messages)
  ` [PATCH v3 2/2] efi: efi_mem_reserve(): don't reserve "

[GIT PULL] efi: Pass secure boot mode to kernel
 2017-01-09 10:40 UTC  (5+ messages)

[PATCH 00/10] efi: Constify all the things
 2017-01-06 20:13 UTC  (22+ messages)
  ` [PATCH 09/10] efi: Constify efi_guidcmp() arguments
  ` [PATCH 08/10] efi: Constify EFI_SIMPLE_TEXT_OUTPUT_PROTOCOL.OutputString()
  ` [PATCH 03/10] efi: Constify GetVariable() / SetVariable() arguments
  ` [PATCH 07/10] efi: Constify EFI_RNG_PROTOCOL.GetRNG()
  ` [PATCH 01/10] efi: use typed function pointers for runtime services table
  ` [PATCH 04/10] efi: Constify HandleProtocol() / LocateHandle() / LocateProtocol()
  ` [PATCH 05/10] efi: Constify InstallConfigurationTable()
  ` [PATCH 06/10] efi: Constify EFI_FILE_PROTOCOL.GetInfo()
  ` [PATCH 02/10] efi: Constify GetVariable() / SetVariable() signatures
  ` [PATCH 10/10] uuid: Constify UUID compound literals

[GIT PULL 00/29] EFI changes for v4.9
 2017-01-04 18:40 UTC  (7+ messages)
` [PATCH 08/29] efi: Allow drivers to reserve boot services forever

[PATCH] efi: use typed function pointers for runtime services table
 2017-01-04 18:16 UTC  (4+ messages)

[efi:urgent 1/1] drivers/firmware/efi/libstub/fdt.c:303:9: warning: cast from pointer to integer of different size
 2017-01-04 13:37 UTC  (7+ messages)
      ` [PATCH] efi/libstub: arm*: double cast memory_map to hide compiler warning

Urgent Please;;
 2017-01-02 17:34 UTC 

Клиентскую базу? Mail: prodawez392@gmail.com Skype: prodawez390 т +79139230330 (whats\viber\telegr) Подробнее!
 2016-12-30 14:23 UTC 

[PATCH 00/16] Kernel lockdown
 2016-12-25 21:44 UTC  (4+ messages)
` [PATCH 01/16] Add the ability to lock down access to the running kernel image

[PATCH v3] efi: prune invalid memory map entries
 2016-12-24 14:10 UTC  (3+ messages)

[GIT PULL] efi: urgent fix for v4.10 with cc to stable
 2016-12-24 13:59 UTC  (2+ messages)
  ` [PATCH] efi/libstub: arm*: Pass latest memory map to the kernel

[PATCH 1/2] x86/efi: don't allocate memmap through memblock after mm_init()
 2016-12-22 10:26 UTC  (4+ messages)
  ` [PATCH 2/2] efi: efi_mem_reserve(): don't reserve "

[PATCH] x86/efi Fix regression in efi_arch_mem_reserve
 2016-12-22 10:21 UTC  (3+ messages)

[PATCH v2] efi/libstub: arm*: Pass latest memory map to the kernel
 2016-12-20 22:33 UTC  (4+ messages)

[PATCH v1 2/2] firmware: dmi_scan: Pass dmi_entry_point to kexec'ed kernel
 2016-12-17 10:57 UTC 

Клиентские базы Skype: prodawez390 Email: prodawez391@gmail.com т +79139230330 (Viber\Whatsapp\Telegram) Тематические, таргетинговые, направленные, поставщиков, покупателей и люб� =?utf-8?Q?=8B=D0=B5_=D
 2016-12-16 13:30 UTC 

[PATCH 1/4] efi: efi_print_memmap(): Call out invalid entries in the memory map early
 2016-12-13 15:09 UTC  (12+ messages)
  ` [PATCH 2/4] efi: efi_map_region(): traceback if we try to map invalid sized regions
  ` [PATCH 3/4] efi: efi_memmap_insert(): don't insert a region more than once
  ` [PATCH 4/4] efi: efi_memmap_insert(): don't split regions with invalid sizes
          ` [PATCH 1/4] efi: prune invalid memory map entries

[PATCH 0/4] UEFI: EFI_MEMORY_ATTRIBUTES_TABLE support for x86
 2016-12-13  6:47 UTC  (11+ messages)
` [PATCH 1/4] efi: Make EFI_MEMORY_ATTRIBUTES_TABLE initialization common across all architectures
` [PATCH 4/4] efi: Skip parsing of EFI_PROPERTIES_TABLE if EFI_MEMORY_ATTRIBUTES_TABLE is detected

[PATCH] efi/libstub: arm*: Pass latest memory map to the kernel
 2016-12-12 17:00 UTC  (3+ messages)

[GIT PULL] EFI changes for v4.10
 2016-12-12  8:07 UTC 

Sat, 10 Dec 2016 02:11:06 -0000.Dear linux-efi Your Electricity Bill.2982942931496$$$!!!363189130210890
 2016-12-10  2:11 UTC 

[BUG/RFC] efi/libstub: Preserve the memory map pointed to by the FDT
 2016-12-09 17:51 UTC  (2+ messages)

[PATCH] efi/esrt: fix spelling mistake "doen't"
 2016-12-09 16:03 UTC  (2+ messages)

[RFC PATCH v3 00/20] x86: Secure Memory Encryption (AMD)
 2016-12-09 14:26 UTC  (4+ messages)
` [RFC PATCH v3 10/20] Add support to access boot related data in the clear

[PATCH 0/8] efi: Pass secure boot mode to kernel [ver #5]
 2016-12-09  0:35 UTC  (7+ messages)
` [PATCH 5/8] efi: Get the secure boot status "

Does anything ever enter through startup_64 in head_64.S?
 2016-12-07 16:47 UTC  (3+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).