1
0
Fork 0
mirror of https://gitlab.com/sortix/sortix.git synced 2023-02-13 20:55:38 -05:00
Commit graph

18 commits

Author SHA1 Message Date
Dennis Wölfing
1b3dcad03c Add German keyboard layout. 2016-11-14 20:35:54 +01:00
Jonas 'Sortie' Termansen
5585303365 Add following-development(7). 2016-11-05 23:39:26 +01:00
Jonas 'Sortie' Termansen
b70ffb70af Add /boot partition support to sysinstall(8). 2016-10-04 00:34:50 +02:00
Jonas 'Sortie' Termansen
3f86ec6544 Default to installing GRUB if an existing installation uses GRUB. 2016-10-04 00:34:50 +02:00
Jonas 'Sortie' Termansen
84c0844f56 Seed kernel entropy with randomness from the previous boot.
The bootloader will now load the /boot/random.seed file if it exists, in
which case the kernel will use it as the initial kernel entropy. The kernel
warns if no random seed was loaded, unless the --no-random-seed option was
given. This option is used for live environments that inherently have no
prior secret state. The kernel initializes its entropy pool from the random
seed as of the first things, so randomness is available very early on.

init(8) will emit a fresh /boot/random.seed file on boot to avoid the same
entropy being used twice. init(8) also writes out /boot/random.seed on
system shutdown where the system has the most entropy. init(8) will warn if
writing the file fails, except if /boot is a real-only filesystem, and
keeping such state is impossible. The system administrator is then
responsible for ensuring the bootloader somehow passes a fresh random seed
on the next boot.

/boot/random.seed must be owned by the root user and root group and must
have file permissions 600 to avoid unprivileged users can read it. The file
is passed to the kernel by the bootloader as a multiboot module with the
command line --random-seed.

If no random seed is loaded, the kernel attempts a poor quality fallback
where it seeds the kernel arc4random(3) continuously with the current time.
The timing variance may provide some effective entropy. There is no real
kernel entropy gathering yet. The read of the CMOS real time clock is moved
to an early point in the kernel boot, so the current time is available as
fallback entropy.

The kernel access of the random seed module is supposed to be infallible
and happens before the kernel log is set up, but there is not yet a failsafe
API for mapping single pages in the early kernel.

sysupgrade(8) creates /boot/random.seed if it's absent as a temporary
compatibility measure for people upgrading from the 1.0 release. The GRUB
port will need to be upgraded with support for /boot/random.seed in the
10_sortix script. Installation with manual bootloader configuration will
need to load the random seed with the --random-seed command line. With GRUB,
this can be done with: module /boot/random.seed --random-seed
2016-10-04 00:34:50 +02:00
Jonas 'Sortie' Termansen
9f82d3951e Guide cross-development(7) users to development(7). 2016-10-03 20:02:11 +02:00
Jonas 'Sortie' Termansen
b54e09ebaf Improve cross-development(7). 2016-07-23 23:30:33 +02:00
Jonas 'Sortie' Termansen
1fde4430fb Fix missing punctuation in hier(7). 2016-05-15 19:30:51 +02:00
Jonas 'Sortie' Termansen
cadef6fedb Rename i486-sortix platform to i686-sortix. 2016-03-06 18:59:10 +01:00
Jonas 'Sortie' Termansen
f52fb3202c Add sysinstall(8), sysmerge(8), and sysupgrade(8). 2016-02-21 18:41:11 +01:00
Jonas 'Sortie' Termansen
3648fce015 Add git repository to /src if applicable. 2016-02-07 22:46:23 +01:00
Jonas 'Sortie' Termansen
5ee7ff4e67 Add iso compression support. 2016-02-07 22:46:22 +01:00
Jonas 'Sortie' Termansen
391680a468 Add update-initrd(8). 2016-02-07 00:51:16 +01:00
Jonas 'Sortie' Termansen
9fe234d4d8 Rewrite init(8). 2016-02-06 17:29:42 +01:00
Jonas 'Sortie' Termansen
9a1786f688 Add login(8). 2016-02-06 00:52:52 +01:00
Jonas 'Sortie' Termansen
02d5dddc5b Fix minor mistakes in new manual pages. 2016-02-04 02:08:12 +01:00
Jonas 'Sortie' Termansen
cbe969ba32 Add sf(1). 2016-02-04 01:29:40 +01:00
Jonas 'Sortie' Termansen
b24103d458 Add manual pages. 2016-02-03 21:50:32 +01:00