grub2/grub-core/loader/i386
Colin Watson e022bb4a1a If running under UEFI secure boot, attempt to use linuxefi loader
Author: Steve Langasek <steve.langasek@canonical.com>
Forwarded: no
Last-Update: 2013-12-20

Patch-Name: linuxefi_non_sb_fallback.patch
2016-09-19 13:35:18 +01:00
..
coreboot * grub-core/loader/i386/coreboot/chainloader.c (load_segment): Use 2013-11-11 00:06:52 +01:00
efi If running under UEFI secure boot, attempt to use linuxefi loader 2016-09-19 13:35:18 +01:00
pc truecrypt: fix memory leak 2016-01-12 21:52:51 +03:00
bsd32.c automake commit without merge history 2010-05-06 11:34:04 +05:30
bsd64.c automake commit without merge history 2010-05-06 11:34:04 +05:30
bsd_pagetable.c * grub-core/commands/legacycfg.c (grub_cmd_legacy_kernel): 2010-10-16 22:16:52 +02:00
bsd.c bsd: Ensure that kernel is loaded before loading module. 2016-02-27 13:35:36 +01:00
bsdXX.c loader/bsd: Fix signed/unsigned comparison 2016-01-16 20:40:55 +00:00
linux.c If running under UEFI secure boot, attempt to use linuxefi loader 2016-09-19 13:35:18 +01:00
multiboot_mbi.c multiboot_mbi: Fix handling of --quirk-bad-kludge. 2015-11-12 11:54:13 +01:00
xen_file32.c Add new ports: i386-xen and x86_64-xen. This allows running GRUB in 2013-11-09 21:29:11 +01:00
xen_file64.c Add new ports: i386-xen and x86_64-xen. This allows running GRUB in 2013-11-09 21:29:11 +01:00
xen_file.c cleanup: grub_cpu_to_XXX_compile_time for constants 2014-09-22 20:47:10 +04:00
xen_fileXX.c grub-core/loader/i386/xen_fileXX.c: memory leak in grub_xen_get_infoXX 2014-12-01 21:23:54 +03:00
xen.c grub-core/loader/i386/xen.c: Initialized initrd_ctx so we don't free a random pointer from the stack. 2015-03-28 07:14:17 +03:00
xnu.c xnu: Supply random seed. 2016-02-12 12:40:10 +01:00