Displaying 4 results from an estimated 4 matches for "m_ext".
Did you mean:
_ext
2006 Mar 09
1
FreeBSD netfront.c / problem
...fset_t)) >> PAGE_SHIFT;
The above call fails gives -1 (i.e., an invalid virtual -> machine
translation) time since some mbufs are placed on the same page.
71
72 /* Remove this page from pseudo phys map before passing back to Xen. */
73 xen_phys_machine[((unsigned long)m_new->m_ext.ext_args >> PAGE_SHIFT)]
74 = INVALID_P2M_ENTRY;
... because this invalidates that mapping. I therefore get every
second entry in rx_pfn_array set to -1.
75
76 rx_mcl[i].op = __HYPERVISOR_update_va_mapping;
77 rx_mcl[i].args[0] = (unsigned long)mtod(m_new,vm_offset_t);
78...
2007 Mar 14
2
OpenBSD IPv6 remote kernel buffer overflow. FreeBSD has this too?
Good day.
Just spotted the new advisory from CORE:
http://www.securityfocus.com/archive/1/462728/30/0/threaded
Not an expert, but FreeBSD's src/sys/kern/uipc_mbuf2.c has the very
simular code.
Robert, anyone, could you please check?
Thank you.
--
Eygene
2005 Jan 13
4
Manager API !!!!!!!!!
Hello all
Has anyone had any success with the Manager API ?
I am trying to check an extension status without too much luck I have
the following
<?php
$fp = fsockopen("127.0.0.1", 5038, $errno, $errstr, 30);
if (!$fp) {
echo "$errstr ($errno)<br />\n";
} else {
$out = "Action: Login\r\n";
$out .=
2007 Mar 16
0
freebsd-security Digest, Vol 201, Issue 2
...> from Tokyo
> in the last day and am significantly behind in e-mail from the trip.
>
> According to a source analysis by Jinmei, we are not vulnerable,
> but I will
> continue tracking the thread. Apparently this vulnerability
> involved an issue
> in the handling of M_EXT, and our implementation of clusters differs
> significantly from OpenBSD, so it seems likely we are not
> affected. If we
> discover any information to the contrary, you can be sure that we
> will get it
> fixed and release an advisory!
>
> Robert N M Watson
> Computer...