Scott, 

this should move to misc@ i suppose.

smaccal...@protonmail.com (Scott C. MacCallum), 2020.01.29 (Wed) 16:03 (CET):
>> "Since your $HOME is now on softraid(4) CRYPTO, you need a way do
>> unlock your encrypted device before log in. What's you plan for that?"
> That's a good question!

options i know of:
a) use "bioctl(8) -k" and have your usb-stick or sd-card ready.
b) abuse a tty and enter your passphrase there:

$ grep ttyC5 /etc/ttys 
ttyC5   "/etc/ttymenu.getty"            vt220   on
$ cat /etc/ttymenu.getty 
#!/bin/sh -e
TERM=vt220 /etc/ttymenu < /dev/$1 > /dev/$1
$ cat /etc/ttymenu
#!/bin/sh -e
print "read user input, unlock softraid(4) device."

Marcus

> ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
> On Wednesday, January 29, 2020 6:20 AM, <owner-...@openbsd.org> wrote:
> 
> > The pre-dawn daily digest
> > Volume 1 : Issue 1155 : "text" Format
> >
> > Messages in this Issue:
> > Full disk encryption Titanium PowerBook G4
> > Re: Full disk encryption Titanium PowerBook G4
> > Re: Full disk encryption Titanium PowerBook G4
> > Re: Full disk encryption Titanium PowerBook G4
> > Re: clang build kernel traps
> >
> > --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
> >
> > Date: Tue, 28 Jan 2020 14:57:21 +0000
> > From: "Scott C. MacCallum" smaccal...@protonmail.com
> > To: "ppc@openbsd.org" ppc@openbsd.org
> > Subject: Full disk encryption Titanium PowerBook G4
> > Message-ID: 
> > B4NGALWloS_NdA33UCsAU9b42-5ZfUhKw4SP0lA72OA3ZGaCT1a1w1c5RaMZCRKKrkxwP64FQKtuWoyxfw-lP26UuSK9DKN8XfJhQakkzkw=@protonmail.com
> >
> > Good morning,
> >
> > I have a Titanium PowerBook G4 and I'd like to do full disk encryption 
> > before the installation of 6.6. I've referenced: 
> > https://www.openbsd.org/faq/faq14.html#softraidFDE and 
> > https://ftp.openbsd.org/pub/OpenBSD/6.6/macppc/INSTALL.macppc, making 
> > device changes where I think it's appropriate, but after installation I got 
> > the infamous blinking Mac folder.
> >
> > I've since successfully installed 6.6 without full disk encryption, so I 
> > suspect my failure is a result of picking a correct Open Firmware 
> > device-specifier.
> >
> > Has anyone had success with this?
> >
> > Scott
> >
> > --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
> >
> > Date: Tue, 28 Jan 2020 10:38:05 -0500
> > From: Gao-Mi Baohao thrirhraf...@gmail.com
> > To: "Scott C. MacCallum" smaccal...@protonmail.com
> > Cc: ppc@openbsd.org
> > Subject: Re: Full disk encryption Titanium PowerBook G4
> > Message-ID: 
> > cacoth1k7t2cwuyafcapvb4jzgq_qv01fhwfrt5jou7dpluw...@mail.gmail.com
> >
> > Scott:
> >
> > The last time I messed with it, booting from crypto softraid was not
> > supported on macppc (only i386, amd64, and sparc64). The man page for
> > softraid ( https://man.openbsd.org/softraid.4 ) seems to confirm that this
> > is still the case.
> >
> > It looks like the openbsd macppc loader simply does not support softraid
> > volumes at this time.
> >
> > Most recently, when I was looking for something similar on an aluminum g4
> > powerbook, I ended up just doing an encrypted home slice, unlocked at boot
> > from rc.local (for example, see http://astro-gr.org/openbsd-encrypt-home/ ).
> >
> > On Tue, Jan 28, 2020, 9:57 AM Scott C. MacCallum smaccal...@protonmail.com
> > wrote:
> >
> > > Good morning,
> > > I have a Titanium PowerBook G4 and I'd like to do full disk encryption
> > > before the installation of 6.6. I've referenced:
> > > https://www.openbsd.org/faq/faq14.html#softraidFDE and
> > > https://ftp.openbsd.org/pub/OpenBSD/6.6/macppc/INSTALL.macppc, making
> > > device changes where I think it's appropriate, but after installation I 
> > > got
> > > the infamous blinking Mac folder.
> > > I've since successfully installed 6.6 without full disk encryption, so I
> > > suspect my failure is a result of picking a correct Open Firmware
> > > device-specifier.
> > > Has anyone had success with this?
> > > Scott
> >
> > --
> >
> > Date: Tue, 28 Jan 2020 17:52:10 +0000
> > From: "Scott C. MacCallum" smaccal...@protonmail.com
> > To: Gao-Mi Baohao thrirhraf...@gmail.com
> > Cc: "ppc@openbsd.org" ppc@openbsd.org
> > Subject: Re: Full disk encryption Titanium PowerBook G4
> > Message-ID: 
> > Z6FnlR0WYd6Btkubuscj0SCkBw-WaLZBgUZ7GG_ZEB1Ki0jJVXLsfQ9lGAAAs36Fkw1rqKOkhBIaLWEaIUcID5C6i34zN0X_nqWEj84U-6A=@protonmail.com
> >
> > Gao-Mi:
> >
> > Thanks for your response. It makes me feel better to know that the failure 
> > wasn't my doing. Thank you for sharing the encrypted home slice resource. 
> > I'm looking forward to giving that a shot.
> >
> > Scott
> >
> > Sent with ProtonMail Secure Email.
> >
> > ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
> > On Tuesday, January 28, 2020 10:38 AM, Gao-Mi Baohao thrirhraf...@gmail.com 
> > wrote:
> >
> > > Scott:
> > > The last time I messed with it, booting from crypto softraid was not 
> > > supported on macppc (only i386, amd64, and sparc64). The man page for 
> > > softraid ( https://man.openbsd.org/softraid.4 ) seems to confirm that 
> > > this is still the case.
> > > It looks like the openbsd macppc loader simply does not support softraid 
> > > volumes at this time.
> > > Most recently, when I was looking for something similar on an aluminum g4 
> > > powerbook, I ended up just doing an encrypted home slice, unlocked at 
> > > boot from rc.local (for example, see 
> > > http://astro-gr.org/openbsd-encrypt-home/ ).
> > > On Tue, Jan 28, 2020, 9:57 AM Scott C. MacCallum 
> > > smaccal...@protonmail.com wrote:
> > >
> > > > Good morning,
> > > > I have a Titanium PowerBook G4 and I'd like to do full disk encryption 
> > > > before the installation of 6.6. I've referenced: 
> > > > https://www.openbsd.org/faq/faq14.html#softraidFDE and 
> > > > https://ftp.openbsd.org/pub/OpenBSD/6.6/macppc/INSTALL.macppc, making 
> > > > device changes where I think it's appropriate, but after installation I 
> > > > got the infamous blinking Mac folder.
> > > > I've since successfully installed 6.6 without full disk encryption, so 
> > > > I suspect my failure is a result of picking a correct Open Firmware 
> > > > device-specifier.
> > > > Has anyone had success with this?
> > > > Scott
> >
> > Date: Wed, 29 Jan 2020 11:18:17 +0100
> > From: Marcus MERIGHI mcmer-open...@tor.at
> > To: "Scott C. MacCallum" smaccal...@protonmail.com
> > Cc: ppc@openbsd.org
> > Subject: Re: Full disk encryption Titanium PowerBook G4
> > Message-ID: 20200129101817.gj8...@tor.at
> >
> > Hello,
> >
> > smaccal...@protonmail.com (Scott C. MacCallum), 2020.01.28 (Tue) 18:52 
> > (CET):
> >
> > > Thank you for sharing the encrypted home slice resource. I'm looking
> > > forward to giving that a shot.
> >
> > I'd recommend two slices on the encrypted device. One small one (5GB)
> > and a large one (in my case 850GB). Make the small one the "a" slice and
> > the large one the "d" slice. Mount the small one as $HOME, the large one
> > as $HOME/data (or whatever you like).
> >
> > This way, if you crash your system and fsck(8) needs to be run, you get
> > to access your $HOME fast and not only after fsck has finished on the
> > large slice.
> >
> > Since your $HOME is now on softraid(4) CRYPTO, you need a way do unlock
> > your encrypted device before log in. What's you plan for that?
> >
> > Marcus
> >
> > > ‐‐‐‐‐‐‐ Original Message ‐‐‐‐‐‐‐
> > > On Tuesday, January 28, 2020 10:38 AM, Gao-Mi Baohao 
> > > thrirhraf...@gmail.com wrote:
> > >
> > > > Scott:
> > > > The last time I messed with it, booting from crypto softraid was not
> > > > supported on macppc (only i386, amd64, and sparc64). The man page
> > > > for softraid ( https://man.openbsd.org/softraid.4 ) seems to confirm
> > > > that this is still the case.
> > > > It looks like the openbsd macppc loader simply does not support
> > > > softraid volumes at this time.
> > > > Most recently, when I was looking for something similar on an
> > > > aluminum g4 powerbook, I ended up just doing an encrypted home
> > > > slice, unlocked at boot from rc.local (for example, see
> > > > http://astro-gr.org/openbsd-encrypt-home/ ).
> > > > On Tue, Jan 28, 2020, 9:57 AM Scott C. MacCallum 
> > > > smaccal...@protonmail.com wrote:
> > > >
> > > > > Good morning,
> > > > > I have a Titanium PowerBook G4 and I'd like to do full disk
> > > > > encryption before the installation of 6.6. I've referenced:
> > > > > https://www.openbsd.org/faq/faq14.html#softraidFDE and
> > > > > https://ftp.openbsd.org/pub/OpenBSD/6.6/macppc/INSTALL.macppc,
> > > > > making device changes where I think it's appropriate, but after
> > > > > installation I got the infamous blinking Mac folder.
> > > > > I've since successfully installed 6.6 without full disk encryption,
> > > > > so I suspect my failure is a result of picking a correct Open
> > > > > Firmware device-specifier.
> > > > > Has anyone had success with this?
> > > > > Scott
> >
> > --
> >
> > Date: Wed, 29 Jan 2020 00:11:40 -0500
> > From: George Koehler kern...@gmail.com
> > To: rgc rgci...@disroot.org
> > Cc: ppc@openbsd.org
> > Subject: Re: clang build kernel traps
> > Message-ID: 20200129001140.74459e170bf61d215b8c6...@gmail.com
> >
> > On Wed, 22 Jan 2020 06:36:17 +0900
> > rgc rgci...@disroot.org wrote:
> >
> > > --- gcc4-obj/locore.s Wed Jan 22 04:29:10 2020
> > > +++ clang-obj/locore.s Wed Jan 22 04:29:05 2020
> > > ...
> >
> > You might have found a problem with mftb (move from time base) in
> > clang's assembler. Some of the other differences in your disassembly
> > might not cause problems.
> >
> > This is a sample of the differences:
> >
> > $ cat sample.s
> > lwz %r31,battable+4@l(%r31)
> > mftb %r28
> > bla s_dsitrap
> > bc 4,17,s_trap
> > addi %r30,%r30,idledone@l
> > nop
> > s_dsitrap:
> > nop
> > cpu_switchto_asm:
> > nop
> > idledone:
> > nop
> > $ gcc -c sample.s
> > $ clang -c -o sample-clang.o sample.s
> > $ objdump -d sample.o > sample.ds
> > $ objdump -d sample-clang.o > sample-clang.ds
> > fishport$ diff -u sample.ds sample-clang.ds
> > ...
> > 00000000 <s_dsitrap-0x18>:
> >
> > -   0: 83 ff 00 04 lwz r31,4(r31)
> > -   4: 7f 8c 42 e6 mftb r28
> > -   8: 48 00 00 1b bla 18 <s_dsitrap>
> >
> > -   0: 83 ff 00 00 lwz r31,0(r31)
> >
> > -   4: 7f 8c 42 a6 mfspr r28,268
> >
> > -   8: 48 00 00 03 bla 0 <s_dsitrap-0x18>
> >     c: 40 91 00 10 ble- cr4,1c <s_trap>
> >
> >
> > -   10: 3b de 00 20 addi r30,r30,32
> >
> > -   10: 3b de 00 00 addi r30,r30,0
> >     14: 60 00 00 00 nop
> >     ...
> >
> >     The change from 4 to 0 in 'lwz r31,4(r31)' is not significant if the
> >     relocation for 'battable+4@l' overwrites the 4 or 0 with a different
> >     value. I see that gcc and clang use the same relocations:
> >
> >     =begin
> >     $ readelf -r sample.o sample-clang.o
> >
> >     File: sample.o
> >
> >     Relocation section '.rela.text' at offset 0x270 contains 3 entries:
> >     Offset Info Type Sym.Value Sym. Name + Addend
> >     00000002 00000704 R_PPC_ADDR16_LO 00000000 battable + 4
> >     00000008 00000102 R_PPC_ADDR24 00000000 .text + 18
> >     00000012 00000104 R_PPC_ADDR16_LO 00000000 .text + 20
> >
> >     File: sample-clang.o
> >
> >     Relocation section '.rela.text' at offset 0xc8 contains 3 entries:
> >     Offset Info Type Sym.Value Sym. Name + Addend
> >     00000002 00000604 R_PPC_ADDR16_LO 00000000 battable + 4
> >     00000008 00000502 R_PPC_ADDR24 00000000 .text + 18
> >     00000012 00000504 R_PPC_ADDR16_LO 00000000 .text + 20
> >     =end
> >
> >     Both gcc and clang use 'battable + 4' as the relocation for the
> >     'battable+4@l' in the source code, so the 4 is not lost. Each
> >     relocation has a different symbol index (Info >> 8, see ELF32_R_SYM in
> >
> >
> > <sys/exec_elf.h>) because gcc and clang wrote the symbols in a
> >
> > different order (readelf -s *.o), but the symbols 'battable' and
> > '.text' are the same.
> >
> > Branches with predictions like bge- beq+ bne- might differ, because
> > newer versions of the Power ISA changed how to set the branch
> > prediction bits (but tried to be backward-compatible).
> >
> > I recall that mftb (move from time base) is different between 32-bit
> > and 64-bit PowerPC, and suspect that clang might be using the wrong
> > mftb for our 32-bit target, but I won't know until I check the ISA
> > manual.
> >
> > --George
> >
> >
> > -----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
> >
> > End of [ppc] Daily digest, Issue 1155 (5 messages)

Reply via email to