messages from 2020-01-13 17:23:07 to 2020-02-12 16:01:26 UTC [more...]
[PATCH 0/2] arch-agnostic initrd loading method for EFI systems
2020-02-12 16:01 UTC (39+ messages)
` [PATCH 1/2] efi/libstub: add support for loading the initrd from a device path
` [PATCH 2/2] efi/libstub: take noinitrd cmdline argument into account for devpath initrd
New EFI thunk alignment WARN_ON in 5.6 triggers multiple times
2020-02-12 15:00 UTC (3+ messages)
[PATCH] efi/apple-properties: Replace zero-length array with flexible-array member
2020-02-12 7:21 UTC (2+ messages)
[PATCH v2] efi/libstub/arm64: Use 1:1 mapping of RT services if property table exists
2020-02-10 18:29 UTC
[PATCH 00/19] EFI stub early spring cleaning part 2
2020-02-10 16:02 UTC (20+ messages)
` [PATCH 01/19] efi/libstub/x86: Remove pointless zeroing of apm_bios_info
` [PATCH 02/19] efi/libstub/x86: Avoid overflowing code32_start on PE entry
` [PATCH 03/19] efi/libstub: Use hidden visiblity for all source files
` [PATCH 04/19] efi/libstub/arm: Relax FDT alignment requirement
` [PATCH 05/19] efi/libstub: Move memory map handling and allocation routines to mem.c
` [PATCH 06/19] efi/libstub: Simplify efi_high_alloc() and rename to efi_allocate_pages()
` [PATCH 07/19] efi/libstub/x86: Incorporate eboot.c into libstub
` [PATCH 08/19] efi/libstub: Use consistent type names for file I/O protocols
` [PATCH 09/19] efi/libstub: Move stub specific declarations into efistub.h
` [PATCH 10/19] efi/libstub/x86: Permit bootparams struct to be allocated above 4 GB
` [PATCH 11/19] efi/libstub/x86: Permit cmdline data "
` [PATCH 12/19] efi/libstub: Move efi_random_alloc() into separate source file
` [PATCH 13/19] efi/libstub: Move get_dram_base() into arm-stub.c
` [PATCH 14/19] efi/libstub: Move file I/O support code into separate file
` [PATCH 15/19] efi/libstub: Rewrite file I/O routine
` [PATCH 16/19] efi/libstub: Take soft and hard memory limits into account for initrd loading
` [PATCH 17/19] efi/libstub: Clean up command line parsing routine
` [PATCH 18/19] efi/libstub: Expose LocateDevicePath boot service
` [PATCH 19/19] efi/libstub: Make the LoadFile EFI protocol accessible
[PATCH v2 00/21] efi/x86: confine type unsafe casting to mixed mode
2020-02-06 14:35 UTC (4+ messages)
` [PATCH v2 21/21] efi: Allow disabling PCI busmastering on bridges during boot
[efi:next] BUILD SUCCESS 09e179646916f8bbca74e6fdd625269b3e2a4848
2020-02-04 21:42 UTC
[PATCH 0/8] Remove 64-bit GDT setup in efi_main + doc fixes
2020-02-02 18:18 UTC (24+ messages)
` [PATCH 1/8] efi/x86: Use C wrapper instead of inline assembly
` [PATCH 2/8] efi/x86: Allocate the GDT pointer on the stack
` [PATCH 3/8] efi/x86: Factor GDT setup code into a function
` [PATCH 4/8] efi/x86: Only setup the GDT for 32-bit kernel
` [PATCH 5/8] efi/x86: Allocate only the required 32 bytes for the GDT
` [PATCH 6/8] efi/x86: Change __KERNEL_{CS,DS} to __BOOT_{CS,DS}
` [PATCH 7/8] Documentation/x86/boot: Clarify segment requirements for EFI handover
` [PATCH 8/8] Documentation/x86/boot: Correct segment requirements for 64-bit boot
` [PATCH v2 0/7] x86/efi,boot: GDT handling cleanup/fixes
` [PATCH v2 1/7] x86/boot: Remove KEEP_SEGMENTS support
` [PATCH v2 2/7] efi/x86: Don't depend on firmware GDT layout
` [PATCH v2 3/7] x86/boot: Reload GDTR after copying to the end of the buffer
` [PATCH v2 4/7] x86/boot: Clear direction and interrupt flags in startup_64
` [PATCH v2 5/7] efi/x86: Remove GDT setup from efi_main
` [PATCH v2 6/7] x86/boot: GDT limit value should be size - 1
` [PATCH v2 7/7] x86/boot: Micro-optimize GDT loading instructions
[PATCH] efi/x86: fix boot regression on systems with invalid memmap entries
2020-02-02 9:50 UTC (4+ messages)
` [tip: efi/urgent] efi/x86: Fix "
[PATCH v2] efi/bgrt: Accept BGRT tables with a version of 0
2020-01-31 13:06 UTC
[PATCH] efi/bgrt: Accept BGRT tables with a version of 0 on Lenovo laptops
2020-01-31 12:47 UTC (3+ messages)
[PATCH] efi/x86: Mark setup_graphics static
2020-01-30 22:20 UTC
mmotm 2020-01-23-21-12 uploaded (efi)
2020-01-28 9:17 UTC (6+ messages)
[PATCH -next] x86/efi_64: fix a user-memory-access in runtime
2020-01-27 23:29 UTC (7+ messages)
[efi:next] BUILD SUCCESS ee45b8ddb29733b7c68825b9ab0a9685adb9ffe4
2020-01-26 4:38 UTC
[PATCH -next] efi/libstub/x86: fix an EFI server boot failure
2020-01-25 9:12 UTC (5+ messages)
[RFC PATCH] efi/libstub/x86: look for bootparams when booting via PE entry point
2020-01-24 15:20 UTC (5+ messages)
` [EXTERNAL] "
[PATCH AUTOSEL 5.4 021/107] efi/earlycon: Fix write-combine mapping on x86
2020-01-24 14:16 UTC
[PATCH 4.19 001/639] Revert "efi: Fix debugobjects warning on efi_rts_work"
2020-01-24 9:22 UTC
[PATCH v12 00/10] efi/firmware/platform-x86: Add EFI embedded fw support
2020-01-24 9:16 UTC (15+ messages)
` [PATCH v12 01/10] efi: Export boot-services code and data as debugfs-blobs
` [PATCH v12 02/10] efi: Add embedded peripheral firmware support
` [PATCH v12 03/10] firmware: Rename FW_OPT_NOFALLBACK to FW_OPT_NOFALLBACK_SYSFS
` [PATCH v12 04/10] firmware: Add new platform fallback mechanism and firmware_request_platform()
` [PATCH v12 05/10] test_firmware: add support for firmware_request_platform
` [PATCH v12 06/10] selftests: firmware: Add firmware_request_platform tests
` [PATCH v12 07/10] Input: silead - Switch to firmware_request_platform for retreiving the fw
` [PATCH v12 08/10] Input: icn8505 "
` [PATCH v12 09/10] platform/x86: touchscreen_dmi: Add EFI embedded firmware info support
` [PATCH v12 10/10] platform/x86: touchscreen_dmi: Add info for the Chuwi Vi8 Plus tablet
[efi:next 21/25] include/linux/efi.h:1187:20: error: redefinition of 'efi_rt_services_supported'
2020-01-23 14:37 UTC
[PATCH 5.4 066/222] x86/efistub: Disable paging at mixed mode entry
2020-01-22 9:27 UTC (2+ messages)
` [PATCH 5.4 072/222] efi/earlycon: Fix write-combine mapping on x86
[PATCH 4.4 51/76] x86/efistub: Disable paging at mixed mode entry
2020-01-22 9:29 UTC
[PATCH 4.14 23/65] x86/efistub: Disable paging at mixed mode entry
2020-01-22 9:29 UTC
[PATCH 4.19 035/103] x86/efistub: Disable paging at mixed mode entry
2020-01-22 9:28 UTC
[PATCH 4.9 65/97] x86/efistub: Disable paging at mixed mode entry
2020-01-22 9:29 UTC
[GIT PULL 00/13] More EFI updates for v5.6
2020-01-22 7:03 UTC (17+ messages)
` [PATCH 01/13] efi/libstub/x86: use const attribute for efi_is_64bit()
` [PATCH 02/13] efi/libstub/x86: use mandatory 16-byte stack alignment in mixed mode
` [PATCH 03/13] efi/libstub/x86: fix unused-variable warning
` [PATCH 04/13] x86/mm: fix NX bit clearing issue in kernel_map_pages_in_pgd
` [PATCH 05/13] efi/x86: don't map the entire kernel text RW for mixed mode
` [PATCH 06/13] efi/x86: avoid RWX mappings for all of DRAM
` [PATCH 07/13] efi/x86: limit EFI old memory map to SGI UV machines
` [PATCH 08/13] efi/arm: defer probe of PCIe backed efifb on DT systems
` [PATCH 09/13] efi: Fix comment for efi_mem_type() wrt absent physical addresses
` [PATCH 10/13] efi: Add a flags parameter to efi_memory_map
` [PATCH 11/13] efi: Add tracking for dynamically allocated memmaps
` [PATCH 12/13] efi: Fix efi_memmap_alloc() leaks
` [PATCH 13/13] efi: Fix handling of multiple efi_fake_mem= entries
[PATCH 0/3] EFI fixes for -next
2020-01-21 22:24 UTC (7+ messages)
` [PATCH 1/3] efi/x86: avoid KASAN false positives when accessing the 1:1 mapping
` [PATCH 2/3] x86/boot/compressed: relax sed symbol type regex for LLVM ld.lld
` [PATCH 3/3] efi/x86: disallow efi=old_map in mixed mode
[PATCH v1 2/2] firmware: dmi_scan: Pass dmi_entry_point to kexec'ed kernel
2020-01-21 17:24 UTC (12+ messages)
[PATCH v11 00/10] efi/firmware/platform-x86: Add EFI embedded fw support
2020-01-21 11:10 UTC (7+ messages)
` [PATCH v11 02/10] efi: Add embedded peripheral firmware support
[PATCH] efi/x86: disable instrumentation in EFI runtime handling code
2020-01-21 9:39 UTC
[GIT PULL] EFI fixes
2020-01-18 21:05 UTC (2+ messages)
[efi:next] BUILD SUCCESS 743c5dd59f7e4b9e7a28be6a8f0e8d03271a98ab
2020-01-16 21:54 UTC
[efi:next] BUILD INCOMPLETE 6e4ecdb3931ca2cd14737330966ca70b76bcf29b
2020-01-15 8:55 UTC
[PATCH v4 01/10] kcsan: Add Kernel Concurrency Sanitizer infrastructure
2020-01-14 22:09 UTC (8+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).