messages from 2023-01-06 17:47:46 to 2023-02-01 13:25:55 UTC [more...]
[PATCH 0/2] efi: Enable BTI for EFI runtimes services
2023-02-01 13:25 UTC (3+ messages)
` [PATCH 1/2] efi: Discover BTI support in runtime services regions
` [PATCH 2/2] efi: arm64: Wire up BTI annotation in memory attributes table
Faktoring
2023-02-01 9:01 UTC
[PATCH v3 0/6] RISC-V kasan rework
2023-02-01 0:15 UTC (9+ messages)
` [PATCH v3 1/6] riscv: Split early and final KASAN population functions
` [PATCH v3 2/6] riscv: Rework kasan "
` [PATCH v3 3/6] riscv: Move DTB_EARLY_BASE_VA to the kernel address space
` [PATCH v3 4/6] riscv: Fix EFI stub usage of KASAN instrumented strcmp function
` [PATCH v3 5/6] riscv: Fix ptdump when KASAN is enabled
` [PATCH v3 6/6] riscv: Unconditionnally select KASAN_VMALLOC if KASAN
[PATCH 0/2] Fix boot hang issue on Ampere Emag server
2023-01-31 18:23 UTC (10+ messages)
` [PATCH 1/2] efi: libstub: Fix the retriving of supported rutime services
` [PATCH 2/2] efi: Introduce efi_get_supported_rt_services() to get the runtime services mask
[PATCH v2, RESEND] x86/efi: Safely enable unaccepted memory in UEFI
2023-01-31 16:33 UTC (4+ messages)
[PATCH] efi: Use standard format for printing the EFI revision
2023-01-31 13:10 UTC
[PATCH v3 00/24] x86_64: Improvements at compressed kernel stage
2023-01-31 10:01 UTC (5+ messages)
` [PATCH v3 22/24] efi/libstub: Add memory attribute protocol definitions
[efi:next] BUILD SUCCESS 3b7221033c0ed624029157045956a472bb582a44
2023-01-31 1:27 UTC
[PATCH] efi: zboot: Use EFI protocol to remap code/data with the right attributes
2023-01-30 17:28 UTC
general protection fault in efivar_lock
2023-01-28 16:02 UTC (2+ messages)
[efi:next] BUILD SUCCESS 240645b94108b30043095694c49fe3ee013ffbcc
2023-01-28 14:24 UTC
[PATCH] efivarfs: fix NULL-deref on mount when no efivars
2023-01-27 8:38 UTC (4+ messages)
[PATCH] arm64: head: Switch endianness before populating the ID map
2023-01-26 18:48 UTC (4+ messages)
[RFC PATCH 1/2] efi: expose efivar generic ops register function
2023-01-26 13:21 UTC (2+ messages)
` [RFC PATCH 2/2] tee: Add op-tee helper functions for variable access
[PATCH v7 0/6] arm64: Permit EFI boot with MMU and caches on
2023-01-25 16:42 UTC (11+ messages)
` [PATCH v7 1/6] arm64: head: Move all finalise_el2 calls to after __enable_mmu
` [PATCH v7 2/6] arm64: kernel: move identity map out of .text mapping
` [PATCH v7 3/6] arm64: head: record the MMU state at primary entry
` [PATCH v7 4/6] arm64: head: avoid cache invalidation when entering with the MMU on
` [PATCH v7 5/6] arm64: head: Clean the ID map and the HYP text to the PoC if needed
` [PATCH v7 6/6] efi: arm64: enter with MMU and caches enabled
please backport EFI patches to v6.1
2023-01-24 22:57 UTC (2+ messages)
[PATCH 0/8] generic command line v5
2023-01-24 16:30 UTC (2+ messages)
[PATCH v2 0/6] RISC-V kasan rework
2023-01-24 8:00 UTC (10+ messages)
` [PATCH v2 1/6] riscv: Split early and final KASAN population functions
` [PATCH v2 2/6] riscv: Rework kasan "
` [PATCH v2 3/6] riscv: Move DTB_EARLY_BASE_VA to the kernel address space
` [PATCH v2 4/6] riscv: Fix EFI stub usage of KASAN instrumented strcmp function
` [PATCH v2 5/6] riscv: Fix ptdump when KASAN is enabled
` [PATCH v2 6/6] riscv: Unconditionnally select KASAN_VMALLOC if KASAN
[efi:next] BUILD SUCCESS 8b30ec8d5eb17bf60bbd0fa8c45d03ad0b9d8a15
2023-01-24 1:33 UTC
[GIT PULL] EFI fixes for v6.2 #2
2023-01-23 19:58 UTC (3+ messages)
[PATCH 0/4] efi: verify that variable services are supported
2023-01-23 12:06 UTC (9+ messages)
` [PATCH 1/4] efi: efivars: add efivars printk prefix
` [PATCH 2/4] efivarfs: always register filesystem
` [PATCH 3/4] efi: verify that variable services are supported
` [PATCH 4/4] efi: efivars: prevent double registration
[PATCH v2] efi: drop obsolete efivars sysfs documentation
2023-01-23 9:29 UTC (4+ messages)
Prezentacja
2023-01-23 8:42 UTC
[PATCH v2 0/6] efi/x86: Avoid corrupted config tables under Xen
2023-01-23 7:30 UTC (17+ messages)
` [PATCH v2 5/6] efi: xen: Implement memory descriptor lookup based on hypercall
` [PATCH v3 0/5] efi: Support ESRT under Xen
` [PATCH v3 1/5] efi: memmap: Disregard bogus entries instead of returning them
` [PATCH v3 2/5] efi: xen: Implement memory descriptor lookup based on hypercall
` [PATCH v3 3/5] efi: Apply allowlist to EFI configuration tables when running under Xen
` [PATCH v3 4/5] efi: Actually enable the ESRT "
` [PATCH v3 5/5] efi: Warn if trying to reserve memory "
[PATCH 0/2] arm64: efi: Robustify EFI runtime wrapper code
2023-01-22 13:48 UTC (11+ messages)
` [PATCH 1/2] arm64: efi: Execute runtime services from a dedicated stack
Is there a known boot failure with 6.2-rc and the Intel SDV EFI systems?
2023-01-21 14:04 UTC (5+ messages)
[PATCH] efi: tpm: Avoid READ_ONCE() for accessing the event log
2023-01-20 23:22 UTC (8+ messages)
[PATCH] efi: drop obsolete efivars sysfs documentation
2023-01-20 19:08 UTC (2+ messages)
[PATCH 0/4] firmware: Add support for Qualcomm UEFI Secure Application
2023-01-19 17:19 UTC (9+ messages)
` [PATCH 3/4] "
[efi:urgent] BUILD SUCCESS e1fabbc83cb1dd4ba63932faa86c9cacb8bf791e
2023-01-18 21:26 UTC
[PATCH v2] ACPI: PRM: Check whether EFI runtime is available
2023-01-18 19:36 UTC (4+ messages)
[PATCH v2] x86/efi: Safely enable unaccepted memory in UEFI
2023-01-18 15:46 UTC (17+ messages)
` [edk2-devel] "
[RFT PATCH 0/2] arm64: efi: Call SetVaMap() with a 1:1 mapping
2023-01-18 15:33 UTC (8+ messages)
` [RFT PATCH 1/2] arm64: efi: Prefer a flat virtual mapping of the runtime services
` [RFT PATCH 2/2] arm64: efi: Force use of SetVirtualAddressMap() on MS Surface
[efi:next] BUILD SUCCESS 2cf9e278efeff8f8bbb9580e2d6760e19795e310
2023-01-18 5:27 UTC
[PATCH] efi: Remove Matthew Garrett as efivarfs maintainer
2023-01-17 17:14 UTC (2+ messages)
[PATCH 0/2] efi: efivars: drop kobject from efivars_register()
2023-01-17 16:11 UTC (4+ messages)
` [PATCH 1/2] "
` [PATCH 2/2] efi: efivars: make efivar_supports_writes() return bool
Report Use-After-Free in capsule-loader.c
2023-01-16 19:34 UTC
[PATCHv8 00/14] mm, x86/cc: Implement support for unaccepted memory
2023-01-16 13:04 UTC (8+ messages)
` [PATCHv8 02/14] mm: Add "
[efi:urgent] BUILD SUCCESS 8118d6171a5f68caa56b3f4af6f49cf7ad481f41
2023-01-14 5:26 UTC
[PATCH] x86/efi: Safely enable unaccepted memory in UEFI
2023-01-13 18:17 UTC
[GIT PULL] EFI fixes for v6.2 #1
2023-01-13 16:41 UTC (2+ messages)
linker problem with Ubuntu 18.04 tool chain: unknown architecture of input file `arch/arm64/boot/vmlinuz.o' is incompatible with aarch64 output
2023-01-13 14:54 UTC (5+ messages)
[PATCH] ACPI: PRM: Check whether EFI runtime is available
2023-01-12 12:52 UTC (5+ messages)
[efi:urgent] BUILD SUCCESS 608509b15a311df6a5b9cf1dbe034a4f52784315
2023-01-12 11:54 UTC
Silikonmischungen
2023-01-12 8:31 UTC
[PATCH v3 0/2] efi: Follow-up fixes for EFI runtime stack
2023-01-11 22:53 UTC (10+ messages)
` [PATCH v3 1/2] arm64: efi: Avoid workqueue to check whether EFI runtime is live
` [PATCH v3 2/2] arm64: efi: Account for the EFI runtime stack in stack unwinder
[efi:urgent] BUILD SUCCESS 2084037b838d2ab5c97e66704b8cf397c5f43805
2023-01-11 11:56 UTC
Słowa kluczowe do wypozycjonowania
2023-01-11 8:40 UTC
[efi:next] BUILD SUCCESS 2a5b4ccf0de17e47e9ad13ee0fda9436d5de0a35
2023-01-11 3:02 UTC
[PATCH v1 1/2] efi/earlycon: Replace open coded strnchrnul()
2023-01-10 14:56 UTC (4+ messages)
[PATCH v3 0/3] Add generic framebuffer support to EFI earlycon driver
2023-01-10 14:32 UTC (6+ messages)
[efi:urgent] BUILD SUCCESS 7b817a99509125ee1337888ec453a76ce5937ae8
2023-01-10 6:29 UTC
[PATCH v2] rtc: efi: Enable SET/GET WAKEUP services as optional
2023-01-09 21:06 UTC (2+ messages)
[PATCH] efi: rt-wrapper: Add missing include
2023-01-09 13:44 UTC
[PATCH v3 1/1] mm: Always release pages to the buddy allocator in memblock_free_late()
2023-01-08 16:50 UTC (2+ messages)
[PATCH] x86/boot: Check if the input parameter (buffer) of the function is a null pointer
2023-01-07 10:40 UTC (2+ messages)
[PATCH v3 0/1] Pages not released from memblock to the buddy allocator
2023-01-06 22:22 UTC
page: next (older) | prev (newer) | latest
- recent:[subjects (threaded)|topics (new)|topics (active)]
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).