openbsd-ports/emulators/vmware
aaron 0eb7a63083 Workaround a new security restriction in the kernel that won't allow the
/dev/fd/# mechanism to be used by setugid processes.  The vmmon and vmnet
kernel modules have hacks which use this feature to implement "poor man's
device cloning".  Since vmware setgid's itself (even when run as root),
this broke.  Deal with this in {vmmon,hub}_fake_clonedev() by fooling
dupfdopen() into thinking vmware is a setuid script.

Now vmware will work again in -current.  Tested by myself.  Diff was
eyeballed by deraadt@ and tedu@.
2006-01-08 01:44:38 +00:00
..
3 Workaround a new security restriction in the kernel that won't allow the 2006-01-08 01:44:38 +00:00