#
a9e16124 |
| 30-Jun-2024 |
deraadt <deraadt@openbsd.org> |
we don't need the NOBYFOUR space-savings option anymore, that codepath was replaced a while ago. ok tb
|
#
0036605b |
| 17-Apr-2023 |
deraadt <deraadt@openbsd.org> |
The bootblocks are 32-bit binaries which use the ENTRY() macros which now include endbr64 macros. That's not going to work, so use the simple method of -Dendbr64= to remove them from the instruction
The bootblocks are 32-bit binaries which use the ENTRY() macros which now include endbr64 macros. That's not going to work, so use the simple method of -Dendbr64= to remove them from the instruction stream. ok kettenis guenther
show more ...
|
#
b7dd453d |
| 08-Jul-2021 |
deraadt <deraadt@openbsd.org> |
sys/lib/libz isn't configured for lazy optimizations to save space because those options are incompatible with the kernel anymore. Set DYNAMIC_CRC_TABLE and BUILDFIXED for these bootblocks, to save
sys/lib/libz isn't configured for lazy optimizations to save space because those options are incompatible with the kernel anymore. Set DYNAMIC_CRC_TABLE and BUILDFIXED for these bootblocks, to save space on the media ok tb mlarkin
show more ...
|
#
102a0797 |
| 02-Aug-2020 |
deraadt <deraadt@openbsd.org> |
additional files from libkern will be needed by clang10 from mortimer
|
#
55f8664c |
| 14-Jun-2020 |
deraadt <deraadt@openbsd.org> |
rewrite mdrandom() in C. previously this XOR'd against rdrand if available, and alternatively XOR'd against TSC. now always run both sequences, and also support rdseed as a third procedure. ok kett
rewrite mdrandom() in C. previously this XOR'd against rdrand if available, and alternatively XOR'd against TSC. now always run both sequences, and also support rdseed as a third procedure. ok kettenis naddy
show more ...
|
#
17a1c5d6 |
| 05-Mar-2020 |
otto <otto@openbsd.org> |
Allow amd64 boot(8) and friends to read from an ffs2 filesystem. Also enable ffs2 for floppy, so that its kernel kan access ffs2. ok deraadt@
|
#
3fbdbb31 |
| 28-Nov-2019 |
bluhm <bluhm@openbsd.org> |
Implement a hexdump command in the boot loader. This helps to inspect the memory layout that the firmware has created. It is especially useful for UEFI debugging. OK deraadt@ kettenis@
|
#
f65494e6 |
| 29-Oct-2019 |
deraadt <deraadt@openbsd.org> |
Use arc4 to bit-spread the 512-byte random buffer over the .openbsd.randomdata section, which has grown a fair bit with the introduction of retguard. Mortimer discovered the repeated 512-byte sequenc
Use arc4 to bit-spread the 512-byte random buffer over the .openbsd.randomdata section, which has grown a fair bit with the introduction of retguard. Mortimer discovered the repeated 512-byte sequence as retguard keys, and this resolves the issue. (Chacha does not fit on the media, so 1.5K early drop RC4 is hopefully sufficient in our KARL link universe) Version crank the bootblocks. sysupgrade -s will install new bootblocks. ok djm mortimer
show more ...
|
#
044dcf88 |
| 03-Aug-2019 |
deraadt <deraadt@openbsd.org> |
In the bootblocks, after discovering and opening /bsd.upgrade, fchmod -x so the file cannot be re-executed upon the next boot. This provides a stronger one-shot-upgrade model than the upgrade script
In the bootblocks, after discovering and opening /bsd.upgrade, fchmod -x so the file cannot be re-executed upon the next boot. This provides a stronger one-shot-upgrade model than the upgrade script's rm /bsd.upgrade. Now various forms of upgrade failure will reboot into /bsd, which is probably more recoverable. Performing fchmod -x depends on (1) use of MI boot.c (not alpha/macppc/sparc64/sgi/octeon) and (2) "can write blocks" functionality in the IO layer. Most architectures have this support now.
Two diagnostics "fchmod a-x %s: failed" and "/bsd.upgrade is not u+x" will remain in the tree while refinements happen for some of the laggard architectures.
based upon a discussion florian tested in snapshots for more than a week without any complaints
show more ...
|
#
fcd2aafa |
| 15-May-2019 |
mlarkin <mlarkin@openbsd.org> |
Add support to the BIOS bootloader for random kernel base VA
This diff adds support to be able to load a randomly linked kernel VA (subject to some range restrictions). This change has been in snaps
Add support to the BIOS bootloader for random kernel base VA
This diff adds support to be able to load a randomly linked kernel VA (subject to some range restrictions). This change has been in snaps for a few days without any fallout.
ok deraadt@
show more ...
|
#
7a2189da |
| 20-Apr-2019 |
deraadt <deraadt@openbsd.org> |
libsa's memcpy() is actually memmove(). make a proper memmove(), and give memcpy() correct behaviour. This also brings the bcopy() macro into line.
|
#
d96a07ce |
| 17-Oct-2017 |
naddy <naddy@openbsd.org> |
remove the remaining references to .depend files since nothing creates them any longer; ok espie@ deraadt@
|
#
e466b42f |
| 30-May-2017 |
naddy <naddy@openbsd.org> |
Allow building the bootstrap with clang: * skip the integrated assembler for assym.h * use as(1) to build biosboot.S and the various versions of srt0.S ok deraadt@
|
#
df1890a2 |
| 18-Sep-2016 |
jsing <jsing@openbsd.org> |
Add bcrypt pbkdf support to the softraid crypto boot loader code.
Based on a diff from djm@
|
#
e876def9 |
| 11-Sep-2016 |
jsing <jsing@openbsd.org> |
Switch amd64 to libsa MI softraid.
|
#
65f4a3c7 |
| 11-Sep-2016 |
jsing <jsing@openbsd.org> |
Rename softraid boot files, which are currently in an MD location. This will allow us to bring in a MI softraid.{c,h} in lib/libsa.
|
#
4fea228d |
| 10-Sep-2016 |
jsing <jsing@openbsd.org> |
Rename libsa pbkdf2.c to pkcs5_pbkdf2.c so that we match libutil.
|
#
5a5a41c0 |
| 30-Jul-2016 |
guenther <guenther@openbsd.org> |
Prep for relro: make sure it's off for any non-PIE stand/ program
ok millert@ kettenis@
|
#
7b5f1cbe |
| 02-Sep-2015 |
yasuoka <yasuoka@openbsd.org> |
Initial commit of uefi boot loader of OpenBSD.
ok deraadt yuo
|
#
87e9071a |
| 15-Jul-2014 |
deraadt <deraadt@openbsd.org> |
mode 644 for installing these files
|
#
29e0bc2c |
| 13-Jul-2014 |
jasper <jasper@openbsd.org> |
fix even more trailing tabs
|
#
3052da24 |
| 13-Jul-2014 |
jasper <jasper@openbsd.org> |
move putchar() into libsa
"sure" miod@
|
#
825dcd8d |
| 12-Jul-2014 |
jasper <jasper@openbsd.org> |
move getchar() into libsa where applicable
ok miod@
|
#
2afebeae |
| 28-Dec-2013 |
deraadt <deraadt@openbsd.org> |
Try to load entropy data from disk:/etc/random.seed, and additionally use a MD-supplied random function. Then, insert this into the ELF openbsd.randomdata of the kernel, so that it has entropy right
Try to load entropy data from disk:/etc/random.seed, and additionally use a MD-supplied random function. Then, insert this into the ELF openbsd.randomdata of the kernel, so that it has entropy right from the start. Some help from jsing for the softraid aspects. Also tested by phessler
show more ...
|
#
641cfe2b |
| 02-Jun-2013 |
guenther <guenther@openbsd.org> |
Revert previous: libsa/ufs.c was fixed to not use big types when not necessary. If something crawls in again that needs these we want to know
ok deraadt@
|