search for: m_ext

Displaying 4 results from an estimated 4 matches for "m_ext".

Did you mean: _ext
2006 Mar 09
1
FreeBSD netfront.c / problem
...fset_t)) >> PAGE_SHIFT; The above call fails gives -1 (i.e., an invalid virtual -> machine translation) time since some mbufs are placed on the same page. 71 72 /* Remove this page from pseudo phys map before passing back to Xen. */ 73 xen_phys_machine[((unsigned long)m_new->m_ext.ext_args >> PAGE_SHIFT)] 74 = INVALID_P2M_ENTRY; ... because this invalidates that mapping. I therefore get every second entry in rx_pfn_array set to -1. 75 76 rx_mcl[i].op = __HYPERVISOR_update_va_mapping; 77 rx_mcl[i].args[0] = (unsigned long)mtod(m_new,vm_offset_t); 78...
2007 Mar 14
2
OpenBSD IPv6 remote kernel buffer overflow. FreeBSD has this too?
Good day. Just spotted the new advisory from CORE: http://www.securityfocus.com/archive/1/462728/30/0/threaded Not an expert, but FreeBSD's src/sys/kern/uipc_mbuf2.c has the very simular code. Robert, anyone, could you please check? Thank you. -- Eygene
2005 Jan 13
4
Manager API !!!!!!!!!
Hello all Has anyone had any success with the Manager API ? I am trying to check an extension status without too much luck I have the following <?php $fp = fsockopen("127.0.0.1", 5038, $errno, $errstr, 30); if (!$fp) { echo "$errstr ($errno)<br />\n"; } else { $out = "Action: Login\r\n"; $out .=
2007 Mar 16
0
freebsd-security Digest, Vol 201, Issue 2
...> from Tokyo > in the last day and am significantly behind in e-mail from the trip. > > According to a source analysis by Jinmei, we are not vulnerable, > but I will > continue tracking the thread. Apparently this vulnerability > involved an issue > in the handling of M_EXT, and our implementation of clusters differs > significantly from OpenBSD, so it seems likely we are not > affected. If we > discover any information to the contrary, you can be sure that we > will get it > fixed and release an advisory! > > Robert N M Watson > Computer...