Date: Mon, 30 Jul 2018 13:59:23 -0400 From: Shawn Webb <shawn.webb@hardenedbsd.org> To: Kyle Evans <kevans@FreeBSD.org> Cc: src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org Subject: Re: svn commit: r336919 - head/sys/dev/efidev Message-ID: <20180730175923.vtha72pcvzilsspu@mutt-hbsd> In-Reply-To: <201807301740.w6UHeRM0077138@repo.freebsd.org> References: <201807301740.w6UHeRM0077138@repo.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
--bmsssuyu4hjjv3su Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Mon, Jul 30, 2018 at 05:40:27PM +0000, Kyle Evans wrote: > Author: kevans > Date: Mon Jul 30 17:40:27 2018 > New Revision: 336919 > URL: https://svnweb.freebsd.org/changeset/base/336919 >=20 > Log: > efirt: Add tunable to allow disabling EFI Runtime Services > =20 > Leading up to enabling EFIRT in GENERIC, allow runtime services to be > disabled with a new tunable: efi.rt_disabled. This makes it so that EFI= RT > can be disabled easily in case we run into some buggy UEFI implementati= on > and fail to boot. > =20 > Discussed with: imp, kib > MFC after: 1 week >=20 > Modified: > head/sys/dev/efidev/efirt.c >=20 > Modified: head/sys/dev/efidev/efirt.c > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D > --- head/sys/dev/efidev/efirt.c Mon Jul 30 17:03:15 2018 (r336918) > +++ head/sys/dev/efidev/efirt.c Mon Jul 30 17:40:27 2018 (r336919) > @@ -133,7 +133,12 @@ efi_init(void) > struct efi_md *map; > caddr_t kmdp; > size_t efisz; > + int rt_disabled; > =20 > + rt_disabled =3D 0; > + TUNABLE_INT_FETCH("efi.rt_disabled", &rt_disabled); Would it be a good idea to document this tunable in loader(8)? Thanks, --=20 Shawn Webb Cofounder and Security Engineer HardenedBSD Tor-ified Signal: +1 443-546-8752 Tor+XMPP+OTR: lattera@is.a.hacker.sx GPG Key ID: 0x6A84658F52456EEE GPG Key Fingerprint: 2ABA B6BD EF6A F486 BE89 3D9E 6A84 658F 5245 6EEE --bmsssuyu4hjjv3su Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEKrq2ve9q9Ia+iT2eaoRlj1JFbu4FAltfUfcACgkQaoRlj1JF bu77uRAAsvnFbf1X+VPWde3niomyp8HY2jF5a8LUuIbbcmjvTDOogVnZa8yFi1iE snTspDZFMqBuLrVhM943qFuG+rYQ6E60tNpngC9rvxvZHcQVarJVtYyi5Qnnbh2H bwklLkrmazLwGTe9sf3ncPdYiNnTtYOfRz9LcATZg88+d6Qmb+cz+wGD0S87SZxm dFVSA//2YnvNqvBVQBwAGU5vRIx0AfIGVxQwnBygL0dzGa/uUyXj8KFoX7Mdrq5o ZGPWb6MQIQdL1hvyIGuM9oDc01yevT1CoxIFzpzUDD95o8eOaGdkoDTFCevcPlGU cW0WTMmz1j/IWRKBxwygPJsMeashzQrlSwRnHDDqpXvwoW54uLZ+IuuHPOsGBVEP pJnSER8Sc/lJW+L2Tu/4Gs1LZFyyiFbhAKZ0AxbXb/iM7tkRiy3FqxAadVjpgbqP E8BmrFHsEsVVIUSx6eUKxNEPnTGNSTCruktL4kWkpppcc7rgM8lsIwWRJ+D7Dq5V zr1ANPxutobFZo4RAhISlrfkrZXJQo7wFwW1AQbky4F2pi51jTkq7bvDkO3bzIxY khx9ZiQCtKsbAfMHPwZVMrN2Jdt3UaTwTtl4S/kmIi8AEtNOg3Ch7y5YypzuzZN7 NITN5vm6NBlZGPdIiqWErQj9yFYrp9iFNVkB3yLGi2mPxiURbjw= =qAeG -----END PGP SIGNATURE----- --bmsssuyu4hjjv3su--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20180730175923.vtha72pcvzilsspu>