#
f1bfbdc7 |
| 09-Nov-2019 |
guenther <guenther@openbsd.org> |
Retguard will start using sections named ".openbsd.randomdata.retguard.*" and not just ".openbsd.randomdata.retguard". Accept both in the kernel ldscripts so that they're placed together between the
Retguard will start using sections named ".openbsd.randomdata.retguard.*" and not just ".openbsd.randomdata.retguard". Accept both in the kernel ldscripts so that they're placed together between the __retguard_{start,end} symbols.
Similarly, match not just ".openbsd.randomdata" but also ".openbsd.randomdata.*" to pick up other random (pun intended) items.
While here, stub in those retguard bits into all the ldscripts.
ok deraadt@
show more ...
|
#
ce43b317 |
| 27-May-2017 |
kettenis <kettenis@openbsd.org> |
Make room for another 4GB of .text.
|
#
a91acc2a |
| 04-Sep-2016 |
guenther <guenther@openbsd.org> |
ld also knows about PT_OPENBSD_BOOTDATA
|
#
baedc112 |
| 03-Sep-2016 |
deraadt <deraadt@openbsd.org> |
ld knows PT_OPENBSD_RANDOMIZE now
|
#
0e938257 |
| 03-Sep-2016 |
deraadt <deraadt@openbsd.org> |
sparc64 kernel still lacks a true RODATA segment. However we can make the SSP read-only by moving the randomdata section into RX text, rather than leaving it in RW data. ok kettenis, tested by claud
sparc64 kernel still lacks a true RODATA segment. However we can make the SSP read-only by moving the randomdata section into RX text, rather than leaving it in RW data. ok kettenis, tested by claudio
show more ...
|
#
237fd37f |
| 26-Nov-2014 |
stsp <stsp@openbsd.org> |
Add a new ELF segment .openbsd.bootdata to the sparc64 kernel. This can be used to pass boot parameters to the kernel which can't be passed safely via the Open Firmware interface, such as softraid vo
Add a new ELF segment .openbsd.bootdata to the sparc64 kernel. This can be used to pass boot parameters to the kernel which can't be passed safely via the Open Firmware interface, such as softraid volume IDs and keys. The kernel already reads the arguments if available but ofwboot won't provide them until further changes are committed there.
With support from deraadt, kettenis and matthew. ok deraadt@
show more ...
|
#
5f3d193e |
| 06-Jan-2014 |
tobiasu <tobiasu@openbsd.org> |
Fix sparc64 kernel profiling, add the etext symbol back.
ok miod@
|
#
e43c9d16 |
| 28-Dec-2013 |
kettenis <kettenis@openbsd.org> |
Make sure the PT_OPENBSD_RANDOMIZE program header actually covers the data we want to initialize with randomness. It covered exactly nothing before!
|
#
a002a24b |
| 28-Dec-2013 |
kettenis <kettenis@openbsd.org> |
Back out the previous commit; rodata gets merged with text by the linker. Having a seperate rodata segment won't work anyway without significant pmap changes.
|
#
96a97253 |
| 28-Dec-2013 |
deraadt <deraadt@openbsd.org> |
create rodata PHDR; ok kettenis
|
#
eba22f4d |
| 28-Dec-2013 |
miod <miod@openbsd.org> |
Require an explicit PT_OPENBSD_RANDOMIZE program header in the kernel linker script (note that the amd64 linker script is currently not used). Discussed with deraadt@
|
#
946cbdfd |
| 16-Aug-2013 |
kettenis <kettenis@openbsd.org> |
Moving the .data section causes problems on some machines (blade100, tadpole). Move it back and add a linker script to convince the linker that it shouldn't merge .text and .data.
tested by naddy@ o
Moving the .data section causes problems on some machines (blade100, tadpole). Move it back and add a linker script to convince the linker that it shouldn't merge .text and .data.
tested by naddy@ ok millert@, deraadt@
show more ...
|