From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752665AbcBZASt (ORCPT ); Thu, 25 Feb 2016 19:18:49 -0500 Received: from g9t5008.houston.hp.com ([15.240.92.66]:54108 "EHLO g9t5008.houston.hp.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752223AbcBZASs (ORCPT ); Thu, 25 Feb 2016 19:18:48 -0500 From: Linn Crosetto To: matt@codeblueprint.co.uk, ard.biesheuvel@linaro.org, roy.franz@linaro.org, mingo@kernel.org, mark.rutland@arm.com Cc: linux-kernel@vger.kernel.org, Linn Crosetto Subject: [PATCH v2 0/2] arm64/efi: query Secure Boot status according to UEFI spec Date: Thu, 25 Feb 2016 17:18:13 -0700 Message-Id: <1456445895-97647-1-git-send-email-linn@hpe.com> X-Mailer: git-send-email 2.1.4 In-Reply-To: <1456273509-25249-1-git-send-email-linn@hpe.com> References: <1456273509-25249-1-git-send-email-linn@hpe.com> Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This series modifies the function that queries the status of UEFI Secure Boot in the EFI stub to match the UEFI specification, and allow the caller to determine if it is enabled, disabled, or in an unknown state due to an unexpected error from GetVariable(). v2: - Add return values for unexpected errors - Split changes into two patches Linn Crosetto (2): arm64/efi: report unexpected errors when determining Secure Boot status arm64/efi: check SetupMode when determining Secure Boot status drivers/firmware/efi/libstub/arm-stub.c | 49 +++++++++++++++++++++++++-------- 1 file changed, 37 insertions(+), 12 deletions(-) -- 2.1.4