OpenBSD src changes summary for 2016-10-29 ==========================================
distrib/miniroot share/man sys/arch/amd64/amd64 sys/arch/i386/i386 sys/arch/octeon/dev sys/arch/octeon/include usr.sbin/vmd == distrib =========================================================== 01/04 == http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/distrib miniroot ~ install.sub > Fix an issue found by naddy@ where the installer was not able > to fetch local sets without a SHA256.sig file in a directory > unreachable by the unprivileged users. The missing SHA256.sig > file caused an early exit from the for-loop where the _unpriv > variable is unset in case of local sets. > - Move the check of the set location (local/net) to the top > - Set the ftp command title based on the _srclocal variable > - Remove the now unnecessary second _unpriv= > OK naddy@ (rpe@) == share ============================================================= 02/04 == http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/share man ~ man5/port-modules.5 > Update the man page after the addition of MODPY_ABI_TAG > From sthen@ (danj@) == sys =============================================================== 03/04 == http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/sys arch/amd64/amd64 ~ vmm.c > Further improve vmm's security model by restricting pledged vmm > processes to only do VMM_IOC_ ioctls on their associated VM (these > ioctls are _RUN, _RESETCPU, _INTR, _READREGS, or _WRITEREGS at > present). The vmm monitor (parent) process or any non-pledged > processes can still do ioctls on any VM. For example, a VM can only > terminate itself but vmctl or the monitor can terminate any VM. > This prevents reachover into other VMs: while escaping from a VM to > the host side (eg. through a bug in virtio etc.) pledge already kept > the attacker in a pledged and privsep'ed process, but now it also > prevents vmm ioctls on "other VMs". > OK mlarkin@ (reyk@) arch/i386/i386 ~ vmm.c > sync with -r1.95 of amd64/vmm.c: > Further improve vmm's security model by restricting pledged vmm > processes to only do VMM_IOC_ ioctls on their associated VM (these > ioctls are _RUN, _RESETCPU, _INTR, _READREGS, or _WRITEREGS at > present). The vmm monitor (parent) process or any non-pledged > processes can still do ioctls on any VM. For example, a VM can only > terminate itself but vmctl or the monitor can terminate any VM. > This prevents reachover into other VMs: while escaping from a VM to > the host side (eg. through a bug in virtio etc.) pledge already kept > the attacker in a pledged and privsep'ed process, but now it also > prevents vmm ioctls on "other VMs". > OK mlarkin@ (reyk@) arch/octeon/dev ~ cn30xxgmx.c > Make PHY address lookups fail instead of using CAM-0100 entries > when the system board is unhandled. (visa@) ~ cn30xxgmx.c > If the system has fdt, use it for locating network PHYs. > Skip a network port if its PHY cannot be found. > Tested on Lanner MR-326B (has fdt) by pirofti@, and > on EdgeRouter Pro (has fdt) and on EdgeRouter Lite (no fdt) by me. (visa@) arch/octeon/include ~ octeonvar.h > Make PHY address lookups fail instead of using CAM-0100 entries > when the system board is unhandled. (visa@) == usr.sbin ========================================================== 04/04 == http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin vmd ~ config.c ~ parse.y ~ priv.c ~ vmd.c ~ vmd.h ~ vmm.c > Separate parsing vms and switches from starting them in vmd(8). > Brings us one step closer to having disabled by default vms is vm.conf(5), > which can be started with vmctl(8). > Input, testing and OK reyk@. Thanks. (edd@) ~ parse.y > Simple grammar tweak: allow to specify interface options in a single line. > (reyk@) =============================================================================== _______________________________________________ odc mailing list [email protected] http://www.squish.net/mailman/listinfo/odc
