OpenBSD src changes summary for 2016-10-29
==========================================

distrib/miniroot                        share/man
sys/arch/amd64/amd64                    sys/arch/i386/i386
sys/arch/octeon/dev                     sys/arch/octeon/include
usr.sbin/vmd                            

== distrib =========================================================== 01/04 ==

  http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/distrib

miniroot

  ~ install.sub                           

  > Fix an issue found by naddy@ where the installer was not able
  > to fetch local sets without a SHA256.sig file in a directory
  > unreachable by the unprivileged users. The missing SHA256.sig
  > file caused an early exit from the for-loop where the _unpriv
  > variable is unset in case of local sets.
  > - Move the check of the set location (local/net) to the top
  > - Set the ftp command title based on the _srclocal variable
  > - Remove the now unnecessary second _unpriv=
  > OK naddy@ (rpe@)

== share ============================================================= 02/04 ==

  http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/share

man

  ~ man5/port-modules.5                   

  > Update the man page after the addition of MODPY_ABI_TAG
  > From sthen@ (danj@)

== sys =============================================================== 03/04 ==

  http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/sys

arch/amd64/amd64

  ~ vmm.c                                 

  > Further improve vmm's security model by restricting pledged vmm
  > processes to only do VMM_IOC_ ioctls on their associated VM (these
  > ioctls are _RUN, _RESETCPU, _INTR, _READREGS, or _WRITEREGS at
  > present).  The vmm monitor (parent) process or any non-pledged
  > processes can still do ioctls on any VM.  For example, a VM can only
  > terminate itself but vmctl or the monitor can terminate any VM.
  > This prevents reachover into other VMs: while escaping from a VM to
  > the host side (eg. through a bug in virtio etc.) pledge already kept
  > the attacker in a pledged and privsep'ed process, but now it also
  > prevents vmm ioctls on "other VMs".
  > OK mlarkin@ (reyk@)

arch/i386/i386

  ~ vmm.c                                 

  > sync with -r1.95 of amd64/vmm.c:
  > Further improve vmm's security model by restricting pledged vmm
  > processes to only do VMM_IOC_ ioctls on their associated VM (these
  > ioctls are _RUN, _RESETCPU, _INTR, _READREGS, or _WRITEREGS at
  > present).  The vmm monitor (parent) process or any non-pledged
  > processes can still do ioctls on any VM.  For example, a VM can only
  > terminate itself but vmctl or the monitor can terminate any VM.
  > This prevents reachover into other VMs: while escaping from a VM to
  > the host side (eg. through a bug in virtio etc.) pledge already kept
  > the attacker in a pledged and privsep'ed process, but now it also
  > prevents vmm ioctls on "other VMs".
  > OK mlarkin@ (reyk@)

arch/octeon/dev

  ~ cn30xxgmx.c                           

  > Make PHY address lookups fail instead of using CAM-0100 entries
  > when the system board is unhandled. (visa@)

  ~ cn30xxgmx.c                           

  > If the system has fdt, use it for locating network PHYs.
  > Skip a network port if its PHY cannot be found.
  > Tested on Lanner MR-326B (has fdt) by pirofti@, and
  > on EdgeRouter Pro (has fdt) and on EdgeRouter Lite (no fdt) by me. (visa@)

arch/octeon/include

  ~ octeonvar.h                           

  > Make PHY address lookups fail instead of using CAM-0100 entries
  > when the system board is unhandled. (visa@)

== usr.sbin ========================================================== 04/04 ==

  http://cvsweb.openbsd.org/cgi-bin/cvsweb/src/usr.sbin

vmd

  ~ config.c                              ~ parse.y
  ~ priv.c                                ~ vmd.c
  ~ vmd.h                                 ~ vmm.c

  > Separate parsing vms and switches from starting them in vmd(8).
  > Brings us one step closer to having disabled by default vms is vm.conf(5),
  > which can be started with vmctl(8).
  > Input, testing and OK reyk@. Thanks. (edd@)

  ~ parse.y                               

  > Simple grammar tweak: allow to specify interface options in a single line.
  > (reyk@)

===============================================================================
_______________________________________________
odc mailing list
[email protected]
http://www.squish.net/mailman/listinfo/odc

Reply via email to