created | 2018-11-30T01:38:45Z |
---|---|
begin | 2018-08-10T00:00:00Z |
end | 2018-08-11T00:00:00Z |
path | src/sys |
commits | 4 |
date | 2018-08-10T15:53:49Z | |||
---|---|---|---|---|
author | jsing | |||
files | src/sys/kern/kern_descrip.c | log | diff | annotate |
message |
Update fd_freefile when filtering/closing kqueue descriptors in fdcopy(). Prior to r1.153 of kern_descrip.c, the kqueue descriptors were removed using fdremove(), which reset fd_freefile as appropriate. The new code simply avoids adding the descriptor to the new table, however this means that fd_freefile can be left with an incorrect value, resulting in a file descriptor allocation "hole". Restore the previous behavour by lowering fd_freefile as appropriate when dropping descriptors. Issue found via golang regress tests. ok deraadt@ mpi@ visa@ |
date | 2018-08-10T16:41:35Z | |||
---|---|---|---|---|
author | jsing | |||
files | src/sys/arch/amd64/stand/efiboot/efidev.c | log | diff | annotate |
src/sys/arch/amd64/stand/libsa/biosdev.c | log | diff | annotate | |
src/sys/arch/i386/stand/libsa/biosdev.c | log | diff | annotate | |
src/sys/arch/sparc64/stand/ofwboot/boot.c | log | diff | annotate | |
src/sys/lib/libsa/softraid.c | log | diff | annotate | |
src/sys/lib/libsa/softraid.h | log | diff | annotate | |
message |
Retry on incorrect passphrase for softraid crypto boot. Historically, the softraid crypto support in the boot loaders has only given one attempt to provide the correct passphrase. There were a few reasons for this, including the fact that pkcs5_pbkdf2() allows an empty passphrase and that returning EPERM allowed for another attempt. With the event of KARL and the need for bsd.booted with hibernate resumption, this becomes much more of an issue - if you get the passphrase wrong you fail to resume. There are also other situations like using /etc/boot.conf to switch serial console, but an incorrect passphrase results in the config not being read. Also, bcrypt_pbkdf() does not permit empty passphrases. This reworks the softraid crypto support in the boot loaders so that it loops requesting a valid passphrase until one is provided, or an empty passphrase is entered (at which point it will abort). ok mortimer@ tb@ |
date | 2018-08-10T16:43:54Z | |||
---|---|---|---|---|
author | jsing | |||
files | src/sys/arch/amd64/stand/boot/conf.c | log | diff | annotate |
src/sys/arch/amd64/stand/efiboot/conf.c | log | diff | annotate | |
src/sys/arch/i386/stand/boot/conf.c | log | diff | annotate | |
src/sys/arch/sparc64/stand/ofwboot/vers.c | log | diff | annotate | |
message | Bump boot loader versions for softraid passphrase handling change. |
date | 2018-08-10T20:27:01Z | |||
---|---|---|---|---|
author | deraadt | |||
files | src/sys/arch/macppc/stand/tbxidata/bsd.tbxi | log | diff | annotate |
src/sys/conf/newvers.sh | log | diff | annotate | |
src/sys/sys/param.h | log | diff | annotate | |
message | crank to 6.4-beta |