messages from 2017-01-16 20:14:06 to 2017-02-07 08:07:26 UTC [more...]
[GIT PULL 0/7] EFI updates for v4.11 part 2
2017-02-07 8:07 UTC (10+ messages)
` [PATCH 1/7] x86/efi: Allow invocation of arbitrary runtime services
` [PATCH 3/7] efi: Add SHIM and image security database GUID definitions
` [PATCH 2/7] arm/efi: Allow invocation of arbitrary runtime services
` [PATCH 4/7] efi: Get the secure boot status
` [PATCH 7/7] efi: libstub: Make file I/O chunking x86-specific
` [PATCH 5/7] efi: Disable secure boot if shim is in insecure mode
` [PATCH 6/7] efi: Print the secure boot status in x86 setup_arch()
[PATCH v2 1/3] x86/mm: Adapt MODULES_END based on Fixmap section size
2017-02-06 22:10 UTC (10+ messages)
` [PATCH v2 2/3] x86: Remap GDT tables in the Fixmap section
` [PATCH v2 3/3] x86: Make the GDT remapping read-only on 64 bit
[PATCH V8 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
2017-02-03 20:38 UTC (20+ messages)
` [PATCH V8 01/10] acpi: apei: read ack upon ghes record consumption
` [PATCH V8 02/10] ras: acpi/apei: cper: generic error data entry v3 per ACPI 6.1
` [PATCH V8 03/10] efi: parse ARM processor error
` [PATCH V8 04/10] arm64: exception: handle Synchronous External Abort
` [PATCH V8 05/10] acpi: apei: handle SEA notification type for ARMv8
` [PATCH V8 06/10] acpi: apei: panic OS with fatal error status block
` [PATCH V8 07/10] efi: print unrecognized CPER section
` [PATCH V8 08/10] ras: acpi / apei: generate trace event for "
` [PATCH V8 09/10] trace, ras: add ARM processor error trace event
` [PATCH V8 10/10] arm/arm64: KVM: add guest SEA support
[PATCH 0/7] efi: Pass secure boot mode to kernel [ver #7]
2017-02-03 17:19 UTC (37+ messages)
` [PATCH 2/7] arm/efi: Allow invocation of arbitrary runtime services "
` [PATCH 1/7] x86/efi: "
` [PATCH 3/7] efi: Add SHIM and image security database GUID definitions "
` [PATCH 5/7] efi: Disable secure boot if shim is in insecure mode "
` [PATCH 4/7] efi: Get the secure boot status "
` [PATCH 6/7] efi: Handle secure boot from UEFI-2.6 "
` [PATCH 7/7] efi: Print the secure boot status in x86 setup_arch() "
[REGRESSION][v4.9.y][v4.10.y] x86/efi: Only map RAM into EFI page tables if in mixed-mode
2017-02-03 16:35 UTC (6+ messages)
[PATCH v4] efi: arm64: Add vmlinux debug link to the Image binary
2017-02-03 15:20 UTC (6+ messages)
[PATCH V2 0/4] efi/x86: move efi bgrt init code to early init
2017-02-03 7:12 UTC (25+ messages)
` [PATCH V2 1/4] efi/x86: move efi bgrt init code to early init code
` [PATCH V3 "
` [PATCH V2 2/4] efi/x86: move efi_print_memmap to drivers/firmware/efi/memmap.c
` [PATCH V2 3/4] efi/x86: add debug code to print cooked memmap
` [PATCH V2 4/4] efi/x86: make efi_memmap_reserve only insert into boot mem areas
[PATCH] efi: libstub: Make file I/O chunking x86-specific
2017-02-02 21:44 UTC (3+ messages)
[GIT PULL] EFI fixes
2017-02-02 20:54 UTC
[GIT PULL] EFI urgent fix for v4.10
2017-02-02 16:14 UTC (9+ messages)
` [PATCH] efi: fdt: avoid FDT manipulation after ExitBootServices()
[REGRESSION] EFI mixed mode patch triggers boot failure
2017-02-01 17:35 UTC (8+ messages)
[PATCH] efi: fdt: avoid FDT manipulation after ExitBootServices()
2017-02-01 14:46 UTC (5+ messages)
[PATCH] efi: arm: remove pointless dummy .reloc section
2017-02-01 11:52 UTC
Bitte kontaktieren Sie mich für weitere Details!
2017-02-01 8:13 UTC
[PATCH 5/8] efi: Get the secure boot status [ver #6]
2017-01-31 14:02 UTC (19+ messages)
` [PATCH 0/8] efi: Pass secure boot mode to kernel "
` What should the default lockdown mode be if the bootloader sentinel triggers sanitization?
[GIT PULL 00/10] EFI updates for v4.11
2017-01-31 13:21 UTC (11+ messages)
` [PATCH 01/10] efi: Deduplicate efi_file_size() / _read() / _close()
` [PATCH 02/10] x86/efi: Deduplicate efi_char16_printk()
` [PATCH 03/10] efi: Make EFI_MEMORY_ATTRIBUTES_TABLE initialization common across all architectures
` [PATCH 04/10] efi: Introduce EFI_MEM_ATTR bit and set it from memory attributes table
` [PATCH 07/10] efi: Use typed function pointers for runtime services table
` [PATCH 05/10] x86/efi: Add support for EFI_MEMORY_ATTRIBUTES_TABLE
` [PATCH 06/10] efi/esrt: Fix spelling mistake "doen't"
` [PATCH 08/10] efi/x86: Move EFI BGRT init code to early init code
` [PATCH 09/10] efi/x86: Add debug code to print cooked memmap
` [PATCH 10/10] efi: libstub: Preserve .debug sections after absolute relocation check
[GIT PULL] EFI urgent fix
2017-01-27 22:25 UTC (2+ messages)
` [PATCH] x86/efi: Always map first physical page into EFI pagetables
[PATCH 0/4] efi/x86: move efi bgrt init code to early init
2017-01-27 22:15 UTC (13+ messages)
` [PATCH 1/4] efi/x86: make efi_memmap_reserve only insert into boot mem areas
` [PATCH 2/4] efi/x86: move efi bgrt init code to early init code
[PATCH] x86/efi: always map first physical page into EFI pagetables
2017-01-27 16:23 UTC (5+ messages)
` [PATCH v2] "
[PATCH v3 0/2] efi/arm64: add vmlinux link to PE/COFF debug table
2017-01-26 19:24 UTC (3+ messages)
` [PATCH v3 1/2] efi: libstub: Preserve .debug sections after absolute relocation check
` [PATCH v3 2/2] efi: arm64: Add vmlinux debug link to the Image binary
[PATCH v2 0/2] efi/arm64: add vmlinux link to PE/COFF debug table
2017-01-26 18:44 UTC (9+ messages)
` [PATCH v2 1/2] efi: libstub: Preserve .debug sections after absolute relocation check
` [PATCH v2 2/2] arm64: efi: add vmlinux debug link to the Image binary
[PATCH V7 00/10] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64
2017-01-24 18:43 UTC (24+ messages)
` [PATCH V7 04/10] arm64: exception: handle Synchronous External Abort
` [PATCH V7 05/10] acpi: apei: handle SEA notification type for ARMv8
` [PATCH V7 10/10] arm/arm64: KVM: add guest SEA support
Urgent Please,,
2017-01-23 14:07 UTC
[PATCH 4.9 032/120] efi/libstub/arm*: Pass latest memory map to the kernel
2017-01-18 10:45 UTC
[PATCH] partitions/efi: Fix integer overflow in GPT size calculation
2017-01-17 16:03 UTC (3+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).