Hi.
This patch adds fingerprint reader and ati video, found on my girlfriend's hp
pavillion dv6.
OK?
Index: pci/pcidevs
===
RCS file: /cvs/src/sys/dev/pci/pcidevs,v
retrieving revision 1.1661
diff -u -r1.1661 pcidevs
--- pci/pcidevs 1
On Thu, Nov 22, 2012 at 11:41 PM, Marc Espie wrote:
>
> On Thu, Nov 22, 2012 at 01:27:46PM -0430, Andres Perera wrote:
> > why would the runtime be attractive for rop? what configuration vm
> > needs syscalls that would be attractive to an attacker that can change
> > the address of a jump? does t
On Thu, Nov 22, 2012 at 01:27:46PM -0430, Andres Perera wrote:
> why would the runtime be attractive for rop? what configuration vm
> needs syscalls that would be attractive to an attacker that can change
> the address of a jump? does the runtime really need to open sockets,
> or spawn processes? (
On Thu, Nov 22, 2012 at 5:28 PM, Alexander Hall wrote:
> The corresponding part in yubikey_hex_decode is for consistency and,
> IMO, sanity, allowing mixed case hex strings, e.g. /var/db/yubikey/*.
>
> Comments? OK? (Don't mess with the from-upstream-derived yubikey.c?)
...
> - if ((
Cheers,
SHIFT or CAPS LOCK (on any keyboard) screws up the parsing of the
yubikey OTP. So make that parsing case-insensitive.
The corresponding part in yubikey_hex_decode is for consistency and,
IMO, sanity, allowing mixed case hex strings, e.g. /var/db/yubikey/*.
Comments? OK? (Don't mess with
On Thu, 22 Nov 2012 15:58:12 -0430
Andres Perera wrote:
> On Thu, Nov 22, 2012 at 2:53 PM, Kevin Chadwick
> wrote:
> > On Thu, 22 Nov 2012 14:18:59 -0430
> > Andres Perera wrote:
> >
> >> there's still no tie-in to the privileges of the process,
> >
> > It still lets a process do something unint
On Thu, Nov 22, 2012 at 2:53 PM, Kevin Chadwick wrote:
> On Thu, 22 Nov 2012 14:18:59 -0430
> Andres Perera wrote:
>
>> there's still no tie-in to the privileges of the process,
>
> It still lets a process do something unintended. In fact getting a
> browser to execute an external javascript progr
On Thu, 22 Nov 2012 14:18:59 -0430
Andres Perera wrote:
> there's still no tie-in to the privileges of the process,
It still lets a process do something unintended. In fact getting a
browser to execute an external javascript program is a threat in itself
that could have no end of custom instructi
On Thu, Nov 22, 2012 at 16:05 +0100, Mike Belopuhov wrote:
> re pf bug on bugs@:
>
> apparently the crash is caused by the stack corruption that happens
> in pf_map_addr as it expects to get an array of struct pf_src_node
> pointers, not just one pointer. the bug was introduced about four
> years
On Thu, Nov 22, 2012 at 7:34 PM, mxb wrote:
> Hey tech@,
>
> I'll more than gladly test any diffs for .
>
> Regards,
> Maxim
>
both have rx checksums enabled.
tx checksums can't be enabled on i350 right now.
tx checksums on ix will need henning's diff to go in first.
On Thu, Nov 22, 2012 at 1:52 PM, Kevin Chadwick wrote:
> On Thu, 22 Nov 2012 13:27:46 -0430
> Andres Perera wrote:
>
>> but jit isn't irreparably interleaved with js
>>
>
> The latest polkit actually depends on the javascript package.
specifically, js185, aka spidermonkey, aka:
MOZ_ARG_DISABLE_B
Hey tech@,
I'll more than gladly test any diffs for .
Regards,
Maxim
On Thu, 22 Nov 2012 13:27:46 -0430
Andres Perera wrote:
> but jit isn't irreparably interleaved with js
>
The latest polkit actually depends on the javascript package.
> am i compromising by running luajit in interpreter mode instead of the
> reference implementation, moreover, would that imply
On Thu, Nov 22, 2012 at 11:58 AM, Kevin Chadwick wrote:
> On Thu, 22 Nov 2012 09:30:41 -0430
> Andres Perera wrote:
>
>> i'm not sure how using js for configuration files, as opposed to using
>> a language commonly deployed for the same purpose, such as lua,
>> presents an innate constraint on sec
On Thu, 22 Nov 2012 09:30:41 -0430
Andres Perera wrote:
> i'm not sure how using js for configuration files, as opposed to using
> a language commonly deployed for the same purpose, such as lua,
> presents an innate constraint on security.
Firstly the article mentioned JIT preventing true randomi
Mike Belopuhov schreef op 2012-11-22 16:05:
i've verified that this fixes the issue for me and arjan is going
to verify as well.
I've verified that this patch has fixed the issue for me.
Many thanks to Mike!
Kind regards,
Arjan
re pf bug on bugs@:
apparently the crash is caused by the stack corruption that happens
in pf_map_addr as it expects to get an array of struct pf_src_node
pointers, not just one pointer. the bug was introduced about four
years ago, but somehow (stack layout?) went unnoticed.
the proper fix is to
i'm not sure how using js for configuration files, as opposed to using
a language commonly deployed for the same purpose, such as lua,
presents an innate constraint on security.
if i'm somehow expected to ignore how unlikely it is for the
configuration vm to:
a. intentionally have the ability of
> Follow-up interview, much better to say what you want instead of having people
> interpret your email.
Do you know polkit (which I believe is cross platform but I prefer to
remove it, primarily because it gives little indication of what is
allowed and requires constant review, unlike sudo) now u
Follow-up interview, much better to say what you want instead of having people
interpret your email.
http://www.itwire.com/business-it-news/open-source/57589-upstream-vendors-can-harm-small-projects-openbsd-dev
At least this has some visibility, which is a good thing...
20 matches
Mail list logo