[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <26282.1479826648@warthog.procyon.org.uk>
Date: Tue, 22 Nov 2016 14:57:28 +0000
From: David Howells <dhowells@...hat.com>
To: unlisted-recipients:; (no To-header on input)
Cc: dhowells@...hat.com, Lukas Wunner <lukas@...ner.de>,
Matthew Garrett <matthew.garrett@...ula.com>,
linux-efi@...r.kernel.org, linux-kernel@...r.kernel.org,
linux-security-module@...r.kernel.org, keyrings@...r.kernel.org
Subject: Re: [PATCH 4/6] efi: Get the secure boot status
David Howells <dhowells@...hat.com> wrote:
> That makes it less clear. I think something like this makes it much more
> obvious:
>
> static efi_status_t get_efi_var(const efi_char16_t *name,
> const efi_guid_t *vendor,
> u32 *attr,
> unsigned long *data_size, void *data)
> {
> return efi_call_runtime(get_variable,
> (efi_char16_t *)name, (efi_guid_t *)vendor,
> attr, data_size, data);
> }
>
> And then doing:
>
> status = get_efi_var(efi_SecureBoot_name, &efi_variable_guid,
> NULL, &size, &val);
>
> which the compiler will inline.
Of course, it has to be a macro because efi_call_runtime() has an undeclared
argument on ARM...
David
Powered by blists - more mailing lists