CONFIG_GOOGLE_SMI and efivars

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hey Mike,

I'm taking a look at the google/gsmi.c code and wondering whether the
CONFIG_GOOGLE_SMI machines are expecting to use both the EFI variable
ops in google/gsmi.c and efivars.c simultaneously? If not, why do we
hang so much state off of "struct efivars"? If these two backends *are*
meant to work at the same time, what happens with things like the pstore
code, which will only work with the first EFI variable backend to be
registered? I think it's the coupling/duplication all this sysfs glue
that is confusing me.

The reason I'm looking at this is because the new efivarfs filesystem
hard-codes access to the __efivars symbol as it just wants to access the
variable ops and serialising lock. It doesn't need any of the sysfs
glue. But it seems rather mean that efivarfs doesn't work with gsmi.c,
since there's no reason it shouldn't work. So I'm trying to understand
your usecases and arrive at a solution that doesn't break your machines,
before I start chainsawing things to kingdom come.

-- 
Matt Fleming, Intel Open Source Technology Center

--
To unsubscribe from this list: send the line "unsubscribe linux-efi" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux