public inbox for linux-efi@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2018-03-08 04:00:22 to 2018-04-03 18:07:11 UTC [more...]

[PATCH 1/2] efi: Export boot-services code and data as debugfs-blobs
 2018-04-03 18:07 UTC  (11+ messages)
` [PATCH 2/2] efi: Add embedded peripheral firmware support
` [RFC PATCH] efi: debugfs_blob[] can be static

[GIT PULL] Kernel lockdown for secure boot
 2018-04-03 17:16 UTC  (10+ messages)

[PATCH v2] x86/xen/efi: Initialize UEFI secure boot state during dom0 boot
 2018-04-03 17:00 UTC  (4+ messages)

[GIT PULL] EFI updates for v4.17
 2018-04-03  1:49 UTC  (2+ messages)

[PATCH v4 0/8] Decode IA32/X64 CPER
 2018-04-02 15:06 UTC  (9+ messages)
` [PATCH v4 1/8] efi: Fix IA32/X64 Processor Error Record definition
` [PATCH v4 2/8] efi: Decode IA32/X64 Processor Error Section
` [PATCH v4 3/8] efi: Decode IA32/X64 Processor Error Info Structure
` [PATCH v4 4/8] efi: Decode UEFI-defined IA32/X64 Error Structure GUIDs
` [PATCH v4 5/8] efi: Decode IA32/X64 Cache, TLB, and Bus Check structures
` [PATCH v4 6/8] efi: Decode additional IA32/X64 Bus Check fields
` [PATCH v4 7/8] efi: Decode IA32/X64 MS Check structure
` [PATCH v4 8/8] efi: Decode IA32/X64 Context Info structure

[PATCH v3 0/8] Decode IA32/X64 CPER
 2018-04-02 13:22 UTC  (16+ messages)
` [PATCH v3 1/8] efi: Fix IA32/X64 Processor Error Record definition
` [PATCH v3 2/8] efi: Decode IA32/X64 Processor Error Section
` [PATCH v3 3/8] efi: Decode IA32/X64 Processor Error Info Structure
` [PATCH v3 4/8] efi: Decode UEFI-defined IA32/X64 Error Structure GUIDs
` [PATCH v3 5/8] efi: Decode IA32/X64 Cache, TLB, and Bus Check structures
` [PATCH v3 6/8] efi: Decode additional IA32/X64 Bus Check fields
` [PATCH v3 7/8] efi: Decode IA32/X64 MS Check structure
` [PATCH v3 8/8] efi: Decode IA32/X64 Context Info structure

[RFC] arm64: extra entries in /proc/iomem for kexec
 2018-04-02  1:53 UTC  (8+ messages)

[PATCH] Patch to replace DEFINE_SEMAPHORE with DEFINE_BINARY_SEMAPHORE
 2018-03-31 14:08 UTC 

[PATCH] efi/cper: Remove the INDENT_SP silliness
 2018-03-29 15:21 UTC  (2+ messages)

[PATCH 4.15 086/105] x86/efi: Free efi_pgd with free_pages()
 2018-03-27 16:28 UTC 

[PATCH 4.14 081/101] x86/efi: Free efi_pgd with free_pages()
 2018-03-27 16:27 UTC 

[PATCH 0/9] KEYS: Blacklisting & UEFI database load
 2018-03-27 11:08 UTC  (7+ messages)

efisubsys_init takes more than a few milliseconds
 2018-03-26  9:23 UTC  (5+ messages)

[PATCH v2 0/8] Decode IA32/X64 CPER
 2018-03-23 15:29 UTC  (8+ messages)

[PATCH] x86/efi: Free efi_pgd with free_pages()
 2018-03-22 19:18 UTC 

[PATCH 4.9 052/241] x86/boot/32: Defer resyncing initial_page_table until per-cpu is set up
 2018-03-19 18:07 UTC  (2+ messages)
` [PATCH 4.9 211/241] x86/boot/32: Fix UP boot on Quark and possibly other platforms

[PATCH AUTOSEL for 4.9 153/281] x86/efi: Disable runtime services on kexec kernel if booted with efi=old_map
 2018-03-19 16:00 UTC 

[GIT PULL 0/1] EFI fix for v4.16
 2018-03-16 13:02 UTC  (4+ messages)
` [PATCH 1/1] efi/libstub: tpm: zero initialize pointer variables for mixed mode

Regression from efi: call get_event_log before ExitBootServices
 2018-03-16 13:01 UTC  (37+ messages)

[PATCH 0/5 v2] Using the hash in MOKx to blacklist kernel module
 2018-03-16  7:32 UTC  (14+ messages)
` [PATCH 1/5] MODSIGN: do not load mok when secure boot disabled
` [PATCH 2/5] MODSIGN: print appropriate status message when getting UEFI certificates list
` [PATCH 3/5] MODSIGN: load blacklist from MOKx
` [PATCH 4/5] MODSIGN: checking the blacklisted hash before loading a kernel module
` [PATCH 5/5] MODSIGN: check the attributes of db and mok

[PATCH V2 0/3] Use efi_rts_workqueue to invoke EFI Runtime Services
 2018-03-14 17:40 UTC  (26+ messages)
` [PATCH V2 1/3] x86/efi: Call efi_delete_dummy_variable() during efi subsystem initialization
` [PATCH V2 2/3] efi: Introduce efi_rts_workqueue and some infrastructure to invoke all efi_runtime_services()
` [PATCH V2 3/3] efi: Use efi_rts_workqueue to invoke EFI Runtime Services

[PATCH 0/5 v2] Using the hash in MOKx to blacklist kernel module
 2018-03-14  4:40 UTC  (5+ messages)
` [PATCH 1/5] MODSIGN: do not load mok when secure boot disabled
` [PATCH 2/5] MODSIGN: print appropriate status message when getting UEFI certificates list

[GIT PULL 0/5] more EFI changes for v4.17
 2018-03-12  9:48 UTC  (10+ messages)
` [PATCH 1/5] efi: Use efi_mm in x86 as well as ARM
` [PATCH 2/5] x86/efi: Replace efi_pgd with efi_mm.pgd
` [PATCH 3/5] x86/efi: Use efi_switch_mm() rather than manually twiddling with %cr3
` [PATCH 4/5] efi/esrt: fix handling of early ESRT table mapping
` [PATCH 5/5] efi: use string literals for efi_char16_t variable initializers

Regression from efi: call get_event_log before ExitBootServices
 2018-03-09 10:50 UTC 

[GIT PULL 00/12] first batch of EFI changes for v4.17
 2018-03-09  9:56 UTC  (29+ messages)
` [PATCH 01/12] efi/arm*: Only register page tables when they exist
` [PATCH 02/12] efi/apple-properties: Device core takes care of empty properties
` [PATCH 03/12] efi/arm*: Stop printing addresses of virtual mappings
` [PATCH 04/12] efi/x86: Fix trailing semicolons
` [PATCH 05/12] efi: arm64: Check whether x18 is preserved by runtime services calls
` [PATCH 06/12] x86: efi: Replace GFP_ATOMIC with GFP_KERNEL in efi_query_variable_store
` [PATCH 07/12] efi: Use efi_mm in x86 as well as ARM
` [PATCH 08/12] x86/efi: Replace efi_pgd with efi_mm.pgd
` [PATCH 09/12] x86/efi: Use efi_switch_mm() rather than manually twiddling with %cr3
` [PATCH 10/12] efi: reorder pr_notice() with add_device_randomness() call
` [PATCH 11/12] efi/apple-properties: Use memremap() instead of ioremap()
` [PATCH 12/12] efi: make const array 'apple' static

[PATCH 0/2] ESRT fixes for relocatable kexec'd kernel
 2018-03-08 18:34 UTC  (13+ messages)
    ` [PATCH 1/2] efi/esrt: fix unsupported version initialization failure

Regression from efi: call get_event_log before ExitBootServices
 2018-03-08 10:03 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox