CVS: cvs.openbsd.org: src

2019-08-05 Thread Philip Guenther
CVSROOT:/cvs
Module name:src
Changes by: guent...@cvs.openbsd.org2019/08/05 22:01:42

Modified files:
libexec/ld.so  : loader.c 
libexec/ld.so/aarch64: rtld_machine.c 
libexec/ld.so/alpha: rtld_machine.c 
libexec/ld.so/amd64: rtld_machine.c 
libexec/ld.so/arm: rtld_machine.c 
libexec/ld.so/hppa: rtld_machine.c 
libexec/ld.so/i386: rtld_machine.c 
libexec/ld.so/m88k: rtld_machine.c 
libexec/ld.so/mips64: rtld_machine.c 
libexec/ld.so/powerpc: rtld_machine.c 
libexec/ld.so/sh: rtld_machine.c 
libexec/ld.so/sparc64: rtld_machine.c 

Log message:
Factor out TEXTREL mprotecting from the per-arch files into _dl_rtld(),
hiding the actual grotty bits in inline functions

ok mpi@



CVS: cvs.openbsd.org: src

2019-08-05 Thread Theo de Raadt
CVSROOT:/cvs
Module name:src
Changes by: dera...@cvs.openbsd.org 2019/08/05 19:42:50

Modified files:
etc/signify: openbsd-67-base.pub 

Log message:
oops, 6.7, spotted by tedu well in advance of it becoming an issue



Re: CVS: cvs.openbsd.org: src

2019-08-05 Thread Ted Unangst
Theo de Raadt wrote:
> CVSROOT:  /cvs
> Module name:  src
> Changes by:   dera...@cvs.openbsd.org 2019/08/03 17:16:08
> 
> Added files:
>   etc/signify: openbsd-67-base.pub 
> 
> Log message:
> good idea to make next-generation keys available well before heading into 
> release.

maybe too soon? :)

untrusted comment: openbsd 6.6 base public key
RWRmkIA877Io3oCILSZoJGhAswifJbFK4r18ICoia+3c0PfwANueolNj

can it say 6.7 please?



CVS: cvs.openbsd.org: src

2019-08-05 Thread Theo de Raadt
CVSROOT:/cvs
Module name:src
Changes by: dera...@cvs.openbsd.org 2019/08/05 18:57:54

Modified files:
distrib/sets/lists/comp: md.arm64 

Log message:
sync



CVS: cvs.openbsd.org: src

2019-08-05 Thread Theo de Raadt
CVSROOT:/cvs
Module name:src
Changes by: dera...@cvs.openbsd.org 2019/08/05 18:57:04

Modified files:
distrib/sets/lists/base: mi 

Log message:
sync



CVS: cvs.openbsd.org: src

2019-08-05 Thread Alexander Bluhm
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org   2019/08/05 17:32:04

Modified files:
regress/sys/kern/realpath: realpathtest.c 
regress/sys/kern/unveil-unmount: Makefile 

Log message:
Test realpath and unveil if the root directory is written as "//".



CVS: cvs.openbsd.org: src

2019-08-05 Thread Alexander Bluhm
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org   2019/08/05 17:28:55

Modified files:
sys/kern   : vfs_syscalls.c 

Log message:
Kernel realpath(3) and unveil(2) did not work correctly if the root
directory was written as "//".  If there is no non-slash character
in the path name, use the spacial case for root.
found by gmake regression tests; OK naddy@ benno@



CVS: cvs.openbsd.org: src

2019-08-05 Thread Christian Weisgerber
CVSROOT:/cvs
Module name:src
Changes by: na...@cvs.openbsd.org   2019/08/05 15:45:27

Modified files:
usr.bin/ssh: ssh-keygen.c 

Log message:
Many key types are supported now, so take care to check the size
restrictions and apply the default size only to the matching key
type.
tweak and ok dtucker@



CVS: cvs.openbsd.org: src

2019-08-05 Thread Christian Weisgerber
CVSROOT:/cvs
Module name:src
Changes by: na...@cvs.openbsd.org   2019/08/05 15:16:48

Added files:
etc/signify: openbsd-67-pkg.pub 

Log message:
6.7 packages key



CVS: cvs.openbsd.org: src

2019-08-05 Thread Mark Kettenis
CVSROOT:/cvs
Module name:src
Changes by: kette...@cvs.openbsd.org2019/08/05 13:27:47

Modified files:
usr.sbin/ldomctl: config.c ldom.conf.5 ldomctl.h parse.y 

Log message:
Allow an optional stride in the vcpu specification.  This makes it possible
to allocate virtual CPUs but not assign them to domains.  This way you
can give domains exclusive access to a core without assigning all threads
of that core to the domain.



CVS: cvs.openbsd.org: src

2019-08-05 Thread Kenneth R Westerback
CVSROOT:/cvs
Module name:src
Changes by: k...@cvs.openbsd.org2019/08/05 10:22:00

Modified files:
sbin/dhclient  : dhclient.c 

Log message:
dhclient.leases(5) is not required for dhclient(8) to work, so just
carry on if it can't be accessed. e.g. if /var/db is not present in
single user mode.



CVS: cvs.openbsd.org: src

2019-08-05 Thread Kenneth R Westerback
CVSROOT:/cvs
Module name:src
Changes by: k...@cvs.openbsd.org2019/08/05 09:20:29

Modified files:
sbin/dhclient  : dhclient.c 

Log message:
If the leases file cannot be opened for writing, just issue a warning
and carry-on. Similar to treatment of /etc/resolv.conf[.tail].

Lets /var/db/dhclient.leases.if be on RO filesystem.



CVS: cvs.openbsd.org: src

2019-08-05 Thread Alexander Bluhm
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org   2019/08/05 09:18:34

Modified files:
regress/sys/kern: Makefile 

Log message:
Link regress realpath-unmount to build.



CVS: cvs.openbsd.org: src

2019-08-05 Thread Alexander Bluhm
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org   2019/08/05 09:16:39

Log message:
Call realpath(3) in combination with chroot(2) and chdir(2).
Use umount(8) to check that the mountpoint leaks no vnode.
from Moritz Buhl

Status:

Vendor Tag: bluhm
Release Tags:   bluhm_20190805

N src/regress/sys/kern/realpath-unmount/Makefile
N src/regress/sys/kern/realpath-unmount/realpath-chdir.c
N src/regress/sys/kern/realpath-unmount/realpath-chroot.c

No conflicts created by this import



CVS: cvs.openbsd.org: src

2019-08-05 Thread Alexander Bluhm
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org   2019/08/05 09:13:44

Modified files:
sys/kern   : vfs_syscalls.c 

Log message:
Kernel realpath(3) had the same vnode leakage bug like unveil(2).
If parent and lookup vnode are equal, namei(9) locks them once but
reference counts twice.
from Moritz Buhl



CVS: cvs.openbsd.org: src

2019-08-05 Thread Alexander Bluhm
CVSROOT:/cvs
Module name:src
Changes by: bl...@cvs.openbsd.org   2019/08/05 07:31:07

Modified files:
sys/kern   : kern_unveil.c 

Log message:
Remove the unused function parameter rootvnode from unveil_add_vnode().



CVS: cvs.openbsd.org: src

2019-08-05 Thread Claudio Jeker
CVSROOT:/cvs
Module name:src
Changes by: clau...@cvs.openbsd.org 2019/08/05 06:51:32

Modified files:
usr.sbin/bgpctl: bgpctl.c 

Log message:
Add a comment why network_bulk() is not using send_filterset(). Using
send_filterset() would result in a use after free because send_filterset()
frees the set after sending but network_bulk() runs in a loop.



CVS: cvs.openbsd.org: src

2019-08-05 Thread Martijn van Duren
CVSROOT:/cvs
Module name:src
Changes by: mart...@cvs.openbsd.org 2019/08/05 06:38:14

Modified files:
lib/libutil: ber.c 

Log message:
Don't use a 0 element to determine the end of an OID when comparing two
OIDS. This can result in false equality matches.

OK claudio@



Re: Host Header Redirection on openbsd.org

2019-08-05 Thread Marc Espie
Well, the main issue I've seen so far is you flooding my mailboxen with
lots of copies of the same useless mp4 video.

What a douche.



CVS: cvs.openbsd.org: src

2019-08-05 Thread Martijn van Duren
CVSROOT:/cvs
Module name:src
Changes by: mart...@cvs.openbsd.org 2019/08/05 06:30:50

Modified files:
lib/libutil: ber.c 

Log message:
There's no reason why the first digit of an OID can't be 0.

OK claudio@
"Good find" deraadt@



CVS: cvs.openbsd.org: src

2019-08-05 Thread Inoguchi Kinichiro
CVSROOT:/cvs
Module name:src
Changes by: inogu...@cvs.openbsd.org2019/08/05 06:01:51

Modified files:
usr.bin/openssl: openssl.1 

Log message:
Remove -port option from s_server since it is same as -accept

ok schwarze@



CVS: cvs.openbsd.org: src

2019-08-05 Thread Darren Tucker
CVSROOT:/cvs
Module name:src
Changes by: dtuc...@cvs.openbsd.org 2019/08/05 05:50:33

Modified files:
usr.bin/ssh: authfile.c authfile.h sshconnect2.c 

Log message:
Remove now-redundant perm_ok arg since sshkey_load_private_type will
now return SSH_ERR_KEY_BAD_PERMISSIONS in that case.  Patch from
jitendra.sharma at intel.com, ok djm@



CVS: cvs.openbsd.org: www

2019-08-05 Thread Brent Cook
CVSROOT:/cvs
Module name:www
Changes by: bc...@cvs.openbsd.org   2019/08/05 05:43:25

Modified files:
libressl   : index.html releases.html 

Log message:
LibreSSL 3.0.0



CVS: cvs.openbsd.org: src

2019-08-05 Thread David Gwynne
CVSROOT:/cvs
Module name:src
Changes by: d...@cvs.openbsd.org2019/08/05 04:42:51

Modified files:
sys/net: if_aggr.c 

Log message:
try to be more compliant with the spec by implementing marker responses.

i hope, i didn't test this that hard.



CVS: cvs.openbsd.org: src

2019-08-05 Thread Claudio Jeker
CVSROOT:/cvs
Module name:src
Changes by: clau...@cvs.openbsd.org 2019/08/05 02:46:55

Modified files:
usr.sbin/bgpd  : bgpd.c bgpd.h config.c parse.y printconf.c 
 rde.c rde_sets.c 

Log message:
Cleanup config reload in the RDE. Use the bgpd_conf struct to store sets
and l3vpns instead of temporary globals. Also rework rde_reload_done to
free filters and sets earlier. The soft-reconfiguration process no longer
needs the previous filters / sets to do its work since there is a full
Adj-RIB-Out.
OK benno@



CVS: cvs.openbsd.org: src

2019-08-05 Thread Anton Lindqvist
CVSROOT:/cvs
Module name:src
Changes by: an...@cvs.openbsd.org   2019/08/05 02:46:46

Modified files:
sys/dev: diskmap.c 

Log message:
Favor vn_close() in the error path of diskmapioctl() since side-effects
caused by calling vn_open() with write permissions must be reverted.
Otherwise, the vfs subsystem could panic while releasing the last vnode
reference if the writecount is still positive.

ok visa@

Reported-by: syzbot+4724df09d9ab0fdca...@syzkaller.appspotmail.com
Reported-by: syzbot+a430606fd52864555...@syzkaller.appspotmail.com



CVS: cvs.openbsd.org: src

2019-08-05 Thread Claudio Jeker
CVSROOT:/cvs
Module name:src
Changes by: clau...@cvs.openbsd.org 2019/08/05 02:36:19

Modified files:
usr.sbin/bgpd  : bgpd.c rde.c 

Log message:
Change the order how filtersets are passed during config reloads. Instead
of sending them after e.g. the filter rule send them before. The benefit
is that the filterset is present when a rule is added and so the filter
rule is complete at that moment.
OK benno@



CVS: cvs.openbsd.org: src

2019-08-05 Thread Anton Lindqvist
CVSROOT:/cvs
Module name:src
Changes by: an...@cvs.openbsd.org   2019/08/05 02:35:59

Modified files:
sys/dev/pci/drm: drm_linux.c 
sys/isofs/cd9660: cd9660_vnops.c 
sys/kern   : kern_descrip.c kern_sysctl.c vfs_syscalls.c 
 vfs_vnops.c 
sys/miscfs/fuse: fuse_vnops.c 
sys/msdosfs: msdosfs_vnops.c 
sys/nfs: nfs_kq.c 
sys/sys: file.h 
sys/tmpfs  : tmpfs_vnops.c 
sys/ufs/ufs: ufs_vnops.c 

Log message:
Allow concurrent reads of the f_offset field of struct file by
serializing both read/write operations using the existing file mutex.
The vnode lock still grants exclusive write access to the offset; the
mutex is only used to make the actual write atomic and prevent any
concurrent reader from observing intermediate values.

ok mpi@ visa@



CVS: cvs.openbsd.org: src

2019-08-05 Thread Stefan Sperling
CVSROOT:/cvs
Module name:src
Changes by: s...@cvs.openbsd.org2019/08/05 02:33:38

Modified files:
sys/dev/pci: files.pci 

Log message:
sis(4) calls mii_phy_reset(); add explicit dependency on mii_phy in config
from grunk@



CVS: cvs.openbsd.org: src

2019-08-05 Thread Jonathan Gray
CVSROOT:/cvs
Module name:src
Changes by: j...@cvs.openbsd.org2019/08/05 01:08:57

Modified files:
share/man/man4/man4.arm64: Makefile 
Added files:
share/man/man4/man4.arm64: smbios.4 

Log message:
add a manual page for smbios

ok kettenis@



CVS: cvs.openbsd.org: src

2019-08-05 Thread Nicholas Marriott
CVSROOT:/cvs
Module name:src
Changes by: n...@cvs.openbsd.org2019/08/05 00:42:02

Modified files:
usr.bin/tmux   : input.c screen-write.c tmux.h tty-term.c tty.c 

Log message:
Add support for the SD (scroll down) escape sequence, GitHub issue 1861.