History log of /openbsd/sys/arch/amd64/stand/cdboot/Makefile (Results 1 – 25 of 45)
Revision Date Author Comments
# a9e16124 30-Jun-2024 deraadt <deraadt@openbsd.org>

we don't need the NOBYFOUR space-savings option anymore, that codepath
was replaced a while ago.
ok tb


# 0036605b 17-Apr-2023 deraadt <deraadt@openbsd.org>

The bootblocks are 32-bit binaries which use the ENTRY() macros which now
include endbr64 macros. That's not going to work, so use the simple method
of -Dendbr64= to remove them from the instruction

The bootblocks are 32-bit binaries which use the ENTRY() macros which now
include endbr64 macros. That's not going to work, so use the simple method
of -Dendbr64= to remove them from the instruction stream.
ok kettenis guenther

show more ...


# b7dd453d 08-Jul-2021 deraadt <deraadt@openbsd.org>

sys/lib/libz isn't configured for lazy optimizations to save space because
those options are incompatible with the kernel anymore. Set DYNAMIC_CRC_TABLE
and BUILDFIXED for these bootblocks, to save

sys/lib/libz isn't configured for lazy optimizations to save space because
those options are incompatible with the kernel anymore. Set DYNAMIC_CRC_TABLE
and BUILDFIXED for these bootblocks, to save space on the media
ok tb mlarkin

show more ...


# 102a0797 02-Aug-2020 deraadt <deraadt@openbsd.org>

additional files from libkern will be needed by clang10
from mortimer


# 55f8664c 14-Jun-2020 deraadt <deraadt@openbsd.org>

rewrite mdrandom() in C. previously this XOR'd against rdrand if available,
and alternatively XOR'd against TSC. now always run both sequences, and
also support rdseed as a third procedure.
ok kett

rewrite mdrandom() in C. previously this XOR'd against rdrand if available,
and alternatively XOR'd against TSC. now always run both sequences, and
also support rdseed as a third procedure.
ok kettenis naddy

show more ...


# 17a1c5d6 05-Mar-2020 otto <otto@openbsd.org>

Allow amd64 boot(8) and friends to read from an ffs2 filesystem.
Also enable ffs2 for floppy, so that its kernel kan access ffs2. ok deraadt@


# 3fbdbb31 28-Nov-2019 bluhm <bluhm@openbsd.org>

Implement a hexdump command in the boot loader. This helps to
inspect the memory layout that the firmware has created. It is
especially useful for UEFI debugging.
OK deraadt@ kettenis@


# f65494e6 29-Oct-2019 deraadt <deraadt@openbsd.org>

Use arc4 to bit-spread the 512-byte random buffer over the .openbsd.randomdata
section, which has grown a fair bit with the introduction of retguard.
Mortimer discovered the repeated 512-byte sequenc

Use arc4 to bit-spread the 512-byte random buffer over the .openbsd.randomdata
section, which has grown a fair bit with the introduction of retguard.
Mortimer discovered the repeated 512-byte sequence as retguard keys, and
this resolves the issue. (Chacha does not fit on the media, so 1.5K early
drop RC4 is hopefully sufficient in our KARL link universe)
Version crank the bootblocks. sysupgrade -s will install new bootblocks.
ok djm mortimer

show more ...


# 044dcf88 03-Aug-2019 deraadt <deraadt@openbsd.org>

In the bootblocks, after discovering and opening /bsd.upgrade, fchmod -x
so the file cannot be re-executed upon the next boot. This provides a
stronger one-shot-upgrade model than the upgrade script

In the bootblocks, after discovering and opening /bsd.upgrade, fchmod -x
so the file cannot be re-executed upon the next boot. This provides a
stronger one-shot-upgrade model than the upgrade script's rm /bsd.upgrade.
Now various forms of upgrade failure will reboot into /bsd, which is probably
more recoverable. Performing fchmod -x depends on (1) use of MI boot.c
(not alpha/macppc/sparc64/sgi/octeon) and (2) "can write blocks" functionality
in the IO layer. Most architectures have this support now.

Two diagnostics "fchmod a-x %s: failed" and "/bsd.upgrade is not u+x" will
remain in the tree while refinements happen for some of the laggard
architectures.

based upon a discussion florian
tested in snapshots for more than a week without any complaints

show more ...


# fcd2aafa 15-May-2019 mlarkin <mlarkin@openbsd.org>

Add support to the BIOS bootloader for random kernel base VA

This diff adds support to be able to load a randomly linked kernel VA
(subject to some range restrictions). This change has been in snaps

Add support to the BIOS bootloader for random kernel base VA

This diff adds support to be able to load a randomly linked kernel VA
(subject to some range restrictions). This change has been in snaps for
a few days without any fallout.

ok deraadt@

show more ...


# 7a2189da 20-Apr-2019 deraadt <deraadt@openbsd.org>

libsa's memcpy() is actually memmove(). make a proper memmove(), and give
memcpy() correct behaviour. This also brings the bcopy() macro into line.


# d96a07ce 17-Oct-2017 naddy <naddy@openbsd.org>

remove the remaining references to .depend files since nothing creates them
any longer; ok espie@ deraadt@


# e466b42f 30-May-2017 naddy <naddy@openbsd.org>

Allow building the bootstrap with clang:
* skip the integrated assembler for assym.h
* use as(1) to build biosboot.S and the various versions of srt0.S
ok deraadt@


# df1890a2 18-Sep-2016 jsing <jsing@openbsd.org>

Add bcrypt pbkdf support to the softraid crypto boot loader code.

Based on a diff from djm@


# e876def9 11-Sep-2016 jsing <jsing@openbsd.org>

Switch amd64 to libsa MI softraid.


# 65f4a3c7 11-Sep-2016 jsing <jsing@openbsd.org>

Rename softraid boot files, which are currently in an MD location. This
will allow us to bring in a MI softraid.{c,h} in lib/libsa.


# 4fea228d 10-Sep-2016 jsing <jsing@openbsd.org>

Rename libsa pbkdf2.c to pkcs5_pbkdf2.c so that we match libutil.


# 5a5a41c0 30-Jul-2016 guenther <guenther@openbsd.org>

Prep for relro: make sure it's off for any non-PIE stand/ program

ok millert@ kettenis@


# 7b5f1cbe 02-Sep-2015 yasuoka <yasuoka@openbsd.org>

Initial commit of uefi boot loader of OpenBSD.

ok deraadt yuo


# 87e9071a 15-Jul-2014 deraadt <deraadt@openbsd.org>

mode 644 for installing these files


# 29e0bc2c 13-Jul-2014 jasper <jasper@openbsd.org>

fix even more trailing tabs


# 3052da24 13-Jul-2014 jasper <jasper@openbsd.org>

move putchar() into libsa

"sure" miod@


# 825dcd8d 12-Jul-2014 jasper <jasper@openbsd.org>

move getchar() into libsa where applicable

ok miod@


# 2afebeae 28-Dec-2013 deraadt <deraadt@openbsd.org>

Try to load entropy data from disk:/etc/random.seed, and additionally
use a MD-supplied random function. Then, insert this into the ELF
openbsd.randomdata of the kernel, so that it has entropy right

Try to load entropy data from disk:/etc/random.seed, and additionally
use a MD-supplied random function. Then, insert this into the ELF
openbsd.randomdata of the kernel, so that it has entropy right from
the start. Some help from jsing for the softraid aspects.
Also tested by phessler

show more ...


# 641cfe2b 02-Jun-2013 guenther <guenther@openbsd.org>

Revert previous: libsa/ufs.c was fixed to not use big types when not
necessary. If something crawls in again that needs these we want to know

ok deraadt@


12