CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: guent...@cvs.openbsd.org2019/08/05 22:01:42 Modified files: libexec/ld.so : loader.c libexec/ld.so/aarch64: rtld_machine.c libexec/ld.so/alpha: rtld_machine.c libexec/ld.so/amd64: rtld_machine.c libexec/ld.so/arm: rtld_machine.c libexec/ld.so/hppa: rtld_machine.c libexec/ld.so/i386: rtld_machine.c libexec/ld.so/m88k: rtld_machine.c libexec/ld.so/mips64: rtld_machine.c libexec/ld.so/powerpc: rtld_machine.c libexec/ld.so/sh: rtld_machine.c libexec/ld.so/sparc64: rtld_machine.c Log message: Factor out TEXTREL mprotecting from the per-arch files into _dl_rtld(), hiding the actual grotty bits in inline functions ok mpi@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: dera...@cvs.openbsd.org 2019/08/05 19:42:50 Modified files: etc/signify: openbsd-67-base.pub Log message: oops, 6.7, spotted by tedu well in advance of it becoming an issue
Re: CVS: cvs.openbsd.org: src
Theo de Raadt wrote: > CVSROOT: /cvs > Module name: src > Changes by: dera...@cvs.openbsd.org 2019/08/03 17:16:08 > > Added files: > etc/signify: openbsd-67-base.pub > > Log message: > good idea to make next-generation keys available well before heading into > release. maybe too soon? :) untrusted comment: openbsd 6.6 base public key RWRmkIA877Io3oCILSZoJGhAswifJbFK4r18ICoia+3c0PfwANueolNj can it say 6.7 please?
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: dera...@cvs.openbsd.org 2019/08/05 18:57:54 Modified files: distrib/sets/lists/comp: md.arm64 Log message: sync
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: dera...@cvs.openbsd.org 2019/08/05 18:57:04 Modified files: distrib/sets/lists/base: mi Log message: sync
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2019/08/05 17:32:04 Modified files: regress/sys/kern/realpath: realpathtest.c regress/sys/kern/unveil-unmount: Makefile Log message: Test realpath and unveil if the root directory is written as "//".
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2019/08/05 17:28:55 Modified files: sys/kern : vfs_syscalls.c Log message: Kernel realpath(3) and unveil(2) did not work correctly if the root directory was written as "//". If there is no non-slash character in the path name, use the spacial case for root. found by gmake regression tests; OK naddy@ benno@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: na...@cvs.openbsd.org 2019/08/05 15:45:27 Modified files: usr.bin/ssh: ssh-keygen.c Log message: Many key types are supported now, so take care to check the size restrictions and apply the default size only to the matching key type. tweak and ok dtucker@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: na...@cvs.openbsd.org 2019/08/05 15:16:48 Added files: etc/signify: openbsd-67-pkg.pub Log message: 6.7 packages key
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: kette...@cvs.openbsd.org2019/08/05 13:27:47 Modified files: usr.sbin/ldomctl: config.c ldom.conf.5 ldomctl.h parse.y Log message: Allow an optional stride in the vcpu specification. This makes it possible to allocate virtual CPUs but not assign them to domains. This way you can give domains exclusive access to a core without assigning all threads of that core to the domain.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: k...@cvs.openbsd.org2019/08/05 10:22:00 Modified files: sbin/dhclient : dhclient.c Log message: dhclient.leases(5) is not required for dhclient(8) to work, so just carry on if it can't be accessed. e.g. if /var/db is not present in single user mode.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: k...@cvs.openbsd.org2019/08/05 09:20:29 Modified files: sbin/dhclient : dhclient.c Log message: If the leases file cannot be opened for writing, just issue a warning and carry-on. Similar to treatment of /etc/resolv.conf[.tail]. Lets /var/db/dhclient.leases.if be on RO filesystem.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2019/08/05 09:18:34 Modified files: regress/sys/kern: Makefile Log message: Link regress realpath-unmount to build.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2019/08/05 09:16:39 Log message: Call realpath(3) in combination with chroot(2) and chdir(2). Use umount(8) to check that the mountpoint leaks no vnode. from Moritz Buhl Status: Vendor Tag: bluhm Release Tags: bluhm_20190805 N src/regress/sys/kern/realpath-unmount/Makefile N src/regress/sys/kern/realpath-unmount/realpath-chdir.c N src/regress/sys/kern/realpath-unmount/realpath-chroot.c No conflicts created by this import
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2019/08/05 09:13:44 Modified files: sys/kern : vfs_syscalls.c Log message: Kernel realpath(3) had the same vnode leakage bug like unveil(2). If parent and lookup vnode are equal, namei(9) locks them once but reference counts twice. from Moritz Buhl
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: bl...@cvs.openbsd.org 2019/08/05 07:31:07 Modified files: sys/kern : kern_unveil.c Log message: Remove the unused function parameter rootvnode from unveil_add_vnode().
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: clau...@cvs.openbsd.org 2019/08/05 06:51:32 Modified files: usr.sbin/bgpctl: bgpctl.c Log message: Add a comment why network_bulk() is not using send_filterset(). Using send_filterset() would result in a use after free because send_filterset() frees the set after sending but network_bulk() runs in a loop.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: mart...@cvs.openbsd.org 2019/08/05 06:38:14 Modified files: lib/libutil: ber.c Log message: Don't use a 0 element to determine the end of an OID when comparing two OIDS. This can result in false equality matches. OK claudio@
Re: Host Header Redirection on openbsd.org
Well, the main issue I've seen so far is you flooding my mailboxen with lots of copies of the same useless mp4 video. What a douche.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: mart...@cvs.openbsd.org 2019/08/05 06:30:50 Modified files: lib/libutil: ber.c Log message: There's no reason why the first digit of an OID can't be 0. OK claudio@ "Good find" deraadt@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: inogu...@cvs.openbsd.org2019/08/05 06:01:51 Modified files: usr.bin/openssl: openssl.1 Log message: Remove -port option from s_server since it is same as -accept ok schwarze@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: dtuc...@cvs.openbsd.org 2019/08/05 05:50:33 Modified files: usr.bin/ssh: authfile.c authfile.h sshconnect2.c Log message: Remove now-redundant perm_ok arg since sshkey_load_private_type will now return SSH_ERR_KEY_BAD_PERMISSIONS in that case. Patch from jitendra.sharma at intel.com, ok djm@
CVS: cvs.openbsd.org: www
CVSROOT:/cvs Module name:www Changes by: bc...@cvs.openbsd.org 2019/08/05 05:43:25 Modified files: libressl : index.html releases.html Log message: LibreSSL 3.0.0
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: d...@cvs.openbsd.org2019/08/05 04:42:51 Modified files: sys/net: if_aggr.c Log message: try to be more compliant with the spec by implementing marker responses. i hope, i didn't test this that hard.
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: clau...@cvs.openbsd.org 2019/08/05 02:46:55 Modified files: usr.sbin/bgpd : bgpd.c bgpd.h config.c parse.y printconf.c rde.c rde_sets.c Log message: Cleanup config reload in the RDE. Use the bgpd_conf struct to store sets and l3vpns instead of temporary globals. Also rework rde_reload_done to free filters and sets earlier. The soft-reconfiguration process no longer needs the previous filters / sets to do its work since there is a full Adj-RIB-Out. OK benno@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: an...@cvs.openbsd.org 2019/08/05 02:46:46 Modified files: sys/dev: diskmap.c Log message: Favor vn_close() in the error path of diskmapioctl() since side-effects caused by calling vn_open() with write permissions must be reverted. Otherwise, the vfs subsystem could panic while releasing the last vnode reference if the writecount is still positive. ok visa@ Reported-by: syzbot+4724df09d9ab0fdca...@syzkaller.appspotmail.com Reported-by: syzbot+a430606fd52864555...@syzkaller.appspotmail.com
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: clau...@cvs.openbsd.org 2019/08/05 02:36:19 Modified files: usr.sbin/bgpd : bgpd.c rde.c Log message: Change the order how filtersets are passed during config reloads. Instead of sending them after e.g. the filter rule send them before. The benefit is that the filterset is present when a rule is added and so the filter rule is complete at that moment. OK benno@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: an...@cvs.openbsd.org 2019/08/05 02:35:59 Modified files: sys/dev/pci/drm: drm_linux.c sys/isofs/cd9660: cd9660_vnops.c sys/kern : kern_descrip.c kern_sysctl.c vfs_syscalls.c vfs_vnops.c sys/miscfs/fuse: fuse_vnops.c sys/msdosfs: msdosfs_vnops.c sys/nfs: nfs_kq.c sys/sys: file.h sys/tmpfs : tmpfs_vnops.c sys/ufs/ufs: ufs_vnops.c Log message: Allow concurrent reads of the f_offset field of struct file by serializing both read/write operations using the existing file mutex. The vnode lock still grants exclusive write access to the offset; the mutex is only used to make the actual write atomic and prevent any concurrent reader from observing intermediate values. ok mpi@ visa@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: s...@cvs.openbsd.org2019/08/05 02:33:38 Modified files: sys/dev/pci: files.pci Log message: sis(4) calls mii_phy_reset(); add explicit dependency on mii_phy in config from grunk@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: j...@cvs.openbsd.org2019/08/05 01:08:57 Modified files: share/man/man4/man4.arm64: Makefile Added files: share/man/man4/man4.arm64: smbios.4 Log message: add a manual page for smbios ok kettenis@
CVS: cvs.openbsd.org: src
CVSROOT:/cvs Module name:src Changes by: n...@cvs.openbsd.org2019/08/05 00:42:02 Modified files: usr.bin/tmux : input.c screen-write.c tmux.h tty-term.c tty.c Log message: Add support for the SD (scroll down) escape sequence, GitHub issue 1861.