[ANNOUNCE] EFI Boot Guard 0.20 released

6 views
Skip to first unread message

Jan Kiszka

unread,
May 23, 2025, 11:58:28 AMMay 23
to efibootguard-dev
Hi,

this release of EFI Boot Guard fixes rare startup problems on devices
that have problems with accepting the LoaderDevicePartUUID EFI variable.
This not only affects EFI Boot Guard, also systemd-boot, but we were
failing the boot so far which was too strict. We furthermore addressed
potential unaligned memory accesses which can fail on ARM. And there is
now accelerated rollback in case already loading if a try-out EFI
payload fails. See below for the full list of changes.

Thanks to all contributors!

Jan

Christian Storm (2):
clang-format: Fix language setting
Rollback in TESTING state when kernel image cannot load

Christopher Obbard (1):
configure: allow tools/tests build to be disabled

Felix Moessbauer (2):
kernel-stub: only warn if device part uuid variable cannot be set
kernel-stub: fix nullptr deref on error getting boot part UUID

Jan Kiszka (12):
lib: Make parameter of ebg_env_getglobalstate obsolete
Enable make dist
uservars: Avoid alignment errors while accessing uservar structures
drivers: w83627hf_wdt: Remove return code from non-failing functions
drivers: Resolve constParameterPointer and configVariablePointer suggestions of ccpcheck
kernel-stub: Follow constVariablePointer suggestions of ccpcheck
utils: Follow constParameterPointer and constVariablePointer suggestions of ccpcheck
env: Follow constParameterPointer and constVariablePointer suggestions of ccpcheck
tools: Follow const*Pointer and variableScope suggestions of ccpcheck
ci: Update to Ubuntu 24.04
scripts: Update cppcheck invocation
Bump version number

--
Siemens AG, Foundational Technologies
Linux Expert Center
Reply all
Reply to author
Forward
0 new messages