Updating src tree:
P src/share/man/man9/do_setresuid.9
P src/sys/arch/amd64/amd64/amd64_trap.S
P src/sys/arch/amd64/amd64/copy.S
P src/sys/arch/amd64/amd64/locore.S
P src/sys/arch/amd64/amd64/machdep.c
P src/sys/arch/amd64/amd64/trap.c
P src/sys/arch/amd64/include/frameasm.h
P
Not at the moment - on the end, I committed the version with flag.
Thanks for report and testing!
Jaromir
2017-10-16 21:12 GMT+02:00 Chavdar Ivanov :
> Well, that was a good one. Running just fine now:
>
> ~ uname -a
> NetBSD nt61p.lorien.lan 8.99.4 NetBSD 8.99.4 (GENERIC)
On 16/10/2017 20:40, m...@netbsd.org wrote:
On Mon, Oct 16, 2017 at 06:26:09PM +0200, Dmitry Salychev wrote:
Hi, guys.
Are there patches for these WPA2 vulnerabilities? Are there affected ports?
I haven't seen any message regarding the subject. Thanks.
Regards,
- Dmitry
Hi,
We rely on
Well, that was a good one. Running just fine now:
~ uname -a
NetBSD nt61p.lorien.lan 8.99.4 NetBSD 8.99.4 (GENERIC) #1: Mon Oct 16
20:01:05 BST 2017
sysbu...@nt61p.lorien.lan:/home/sysbuild/src/sys/arch/amd64/compile/GENERIC
amd64
~ dmesg | grep wd0
wd0 at atabus0 drive 0
wd0:
wd0: drive
Okay, can you try following patch? It puts puts back a flag for IRQ
handling. If it works, I might have an idea what's happening. I think there
is some rogue interrupt disturbing the state.
If it doesn't work, can you please try to compile kernel with ATADEBUG, and
set atadebug_mask (possibly via
Hi, guys.
Are there patches for these WPA2 vulnerabilities? Are there affected ports?
I haven't seen any message regarding the subject. Thanks.
Regards,
- Dmitry