search for: u_long

Displaying 20 results from an estimated 83 matches for "u_long".

2008 Dec 15
1
bce reporting fantom input errors?
Hi, After changing cables,switches,ports, I came to the conclusion that bce is reporting input errors that are not there, or creating them. I checked this with 3 different boxes, all Dell-2950/Broadcom NetXtreme II BCM5708 1000Base-T (B2), and one of them, while running Solaris, reported 0 errors after a week, and freebsd after a few minutes its count was > 100. The errors appear under
2004 Apr 23
1
Proposed RST patch
...case TCPS_FIN_WAIT_1: case TCPS_FIN_WAIT_2: case TCPS_CLOSE_WAIT: diff -u -r /usr/src/sys.old/netinet/tcp_var.h /usr/src/sys/netinet/tcp_var.h --- /usr/src/sys.old/netinet/tcp_var.h Thu Apr 22 01:15:16 2004 +++ /usr/src/sys/netinet/tcp_var.h Fri Apr 23 22:12:49 2004 @@ -414,6 +414,7 @@ u_long tcps_badsyn; /* bogus SYN, e.g. premature ACK */ u_long tcps_mturesent; /* resends due to MTU discovery */ u_long tcps_listendrop; /* listen queue overflows */ + u_long tcps_badrst; /* ignored RSTs in the window */ u_long tcps_sc_added; /* entry added to syncache */ u_long tcps_sc_ret...
1997 Nov 14
0
Linux IP fragment overlap bug (fwd)
...for first packet */ #define MAGIC 0x3 /* Magic Fragment Constant (tm). Should be 2 or 3 */ #define COUNT 0x1 /* Linux dies with 1, NT is more stalwart and can * withstand maybe 5 or 10 sometimes... Experiment. */ void usage(u_char *); u_long name_resolve(u_char *); u_short in_cksum(u_short *, int); void send_frags(int, u_long, u_long, u_short, u_short); int main(int argc, char **argv) { int one = 1, count = 0, i, rip_sock; u_long src_ip = 0, dst_ip = 0; u_short src_prt = 0, dst_prt = 0; struct in_addr addr; fprin...
2004 Aug 06
2
ices2 + pid-file (was: ices2 + stdin + metadata)
Ok, so i have to know the PID of ices to send the update-signal. I've added this to my ices.xml: <pidfile>/home/www/bin/ices.pid</pidfile> (directly under the node <ices>) I thought i've seen this somewhere in the manual. However, when i start ices, no pid-file is created :-/ Is this the right way? <p>----- Original Message ----- From: "Karl Heyes"
2002 Jul 27
1
Patch to OpenSSH-3.4p1/monitor_mm.c for Linux 2.0
...EV_ZERO + { + int fh; + + fh = open("/dev/zero",O_RDWR); + if (fh == -1) + fatal("mmap(`/dev/zero'): %s",strerror(errno)); + + address = mmap(NULL,size,PROT_WRITE|PROT_READ,MAP_PRIVATE,fh,0); + if (address == MAP_FAILED) + fatal("mmap(%lu,%d): %s",(u_long)size,fh,strerror(errno)); + } +# else address = mmap(NULL, size, PROT_WRITE|PROT_READ, MAP_ANON|MAP_SHARED, -1, 0); if (address == MAP_FAILED) fatal("mmap(%lu): %s", (u_long)size, strerror(errno)); +# endif #else fatal("%s: UsePrivilegeSeparation=yes and Compression...
2002 Jun 25
3
3.3p1 patch for Solaris 2.6
...#endif if (mmalloc == NULL) mm = xmalloc(sizeof(struct mm_master)); @@ -87,6 +90,13 @@ #if defined(HAVE_MMAP) && defined(MAP_ANON) address = mmap(NULL, size, PROT_WRITE|PROT_READ, MAP_ANON|MAP_SHARED, -1, 0); + if (address == MAP_FAILED) + fatal("mmap(%lu): %s", (u_long)size, strerror(errno)); +#elif defined(HAVE_MMAP) && !defined(MAP_ANON) + fd = open("/dev/zero", O_RDWR); + address = mmap(NULL, size, PROT_WRITE|PROT_READ, MAP_ANON|MAP_SHARED, + fd, 0); + close(fd); if (address == MAP_FAILED) fatal("mmap(%lu): %s", (u_long)siz...
2005 Apr 21
1
Fwd: (KAME-snap 9012) racoon in the kame project
FYI, looks like support for Racoon is ending. Does anyone have any experience with the version in ipsec-tools ? ---Mike >Racoon users, > >This is the announcement that the kame project will quit providing >a key management daemon, the racoon, and that "ipsec-tools" will become >the formal team to release the racoon. >The final release of the racoon in the
2014 Mar 20
2
[Bug 2212] New: openssl version check should ignore status nibble
...Hardware: All OS: All Status: NEW Severity: enhancement Priority: P5 Component: Miscellaneous Assignee: unassigned-bugs at mindrot.org Reporter: vapier at gentoo.org the current version check in entropy.c looks like: u_long version_mask = SSLeay() >= 0x1000000f ? ~0xffff0L : ~0xff0L; if (((SSLeay() ^ OPENSSL_VERSION_NUMBER) & version_mask) || this causes it to pay attention to the last nibble in the version field which makes no sense. the only thing that part does is track whether the openssl in use is a...
2004 Oct 27
1
Problems installing GRASS package
...om auto_mask.c:18: include/rpc/types.h:87: redefinition of `caddr_t' /usr/include/sys/types.h:69: `caddr_t' previously declared here include/rpc/types.h:89: redefinition of `u_int' /usr/include/sys/types.h:54: `u_int' previously declared here include/rpc/types.h:90: redefinition of `u_long' /usr/include/sys/types.h:55: `u_long' previously declared here include/rpc/types.h:91: redefinition of `u_short' /usr/include/sys/types.h:53: `u_short' previously declared here *** Error code 1 Stop in /tmp/R.INSTALL.35187/GRASS/src. ERROR: compilation failed for package 'GRAS...
2002 Aug 20
2
Solaris 7 w/ current CVS.
Not sure about any other version, but I know sol7 lacks SIZE_T_MAX which we are now using in -current. OpenBSD defines it as ULONG_MAX. Pawing through the Solaris /usr/include it stated it could be 'u_int' or 'u_long'. Depends on if your are compiling legacy stuff. I'm sure other OSes may encounter this issue (not tried Linux, but Redhat 7.x does not define it), but what is the collective suggestion in regards to detectin what size_t is. For a work around locally I'm just defining SIZE_T_MAX to U...
2004 Apr 20
1
[patch] Raw sockets in jails
...Mon Apr 19 17:55:08 2004 @@ -40,6 +40,7 @@ #include "opt_random_ip_id.h" #include <sys/param.h> +#include <sys/jail.h> #include <sys/kernel.h> #include <sys/lock.h> #include <sys/mac.h> @@ -505,6 +506,7 @@ } } +extern int jail_allow_raw_sockets; u_long rip_sendspace = RIPSNDQ; u_long rip_recvspace = RIPRCVQ; @@ -527,7 +529,11 @@ INP_INFO_WUNLOCK(&ripcbinfo); return EINVAL; } - if (td && (error = suser(td)) != 0) { + if (td && jailed(td->td_ucred) && !jail_allow_raw_sockets) { + INP_INFO_WUNLOCK(&ripc...
2012 Mar 15
11
[Bug 1991] New: openssl version checking needs updating
...We match major, minor, fix and status (not patch) + * We match major, minor, fix and status (not patch) for <1.0.0. + * After that, we acceptable compatible minor versions (so we + * allow 1.0.1 to work with 1.0.0). */ - if ((SSLeay() ^ OPENSSL_VERSION_NUMBER) & ~0xff0L) + u_long bldver = OPENSSL_VERSION_NUMBER & ~0xff0L; + u_long runver = SSLeay() & ~0xff0L; + if ((bldver >> 12) < 0x10000 && bldver != runver) || + (bldver >> 12) >= 0x10000 && (runver >> 12) < (bldver >> 12))) fatal("OpenSSL ver...
2006 Aug 10
2
Patch for openssh server
Hi openssh devs. We submit for your review a patch we have made for sshd, regarding traffic accounting. The native version of openssh does not support traffic accounting, making it quite hard to monitor traffic usage on a per-user basis. The patch in question - Does not log anything except the total amount of data transmitted, when the connection is closed. - Is very simple, only a
2013 Jun 09
1
[PATCH] fix mac_computer
...t m_buf[(EVP_MAX_MD_SIZE + sizeof (u_int64_t) - 1) + / sizeof (u_int64_t)]; + u_char *m = (u_char *)m_buf; u_char b[4], nonce[8]; - if (mac->mac_len > sizeof(m)) + if (mac->mac_len > EVP_MAX_MD_SIZE) fatal("mac_compute: mac too long %u %lu", - mac->mac_len, (u_long)sizeof(m)); + mac->mac_len, (u_long)EVP_MAX_MD_SIZE); switch (mac->type) { case SSH_EVP:
2013 Jul 12
1
stable/9 fails to compile: kmem_alloc_contig bad definition
...nt flags, vm_paddr_t low, vm_paddr_t high, unsigned long alignment, unsigned long boundary, vm_memattr_t memattr); Why boundary is unsigned long and not vm_paddr_t? vm_contig.c: vm_offset_t kmem_alloc_contig(vm_map_t map, vm_size_t size, int flags, vm_paddr_t low, vm_paddr_t high, u_long alignment, vm_paddr_t boundary, vm_memattr_t memattr) -- Sphinx of black quartz judge my vow.
2014 May 22
0
[PATCH] openssh - loginrec.c - Non-atomic file operations.
...log_dir); + } + if (*fd < 0) { debug("%s: Couldn't open %s: %s", __func__, - lastlog_file, strerror(errno)); + lastlog_file, strerror(errno)); return (0); } - if (S_ISREG(st.st_mode)) { - /* find this uid's offset in the lastlog file */ - offset = (off_t) ((u_long)li->uid * sizeof(struct lastlog)); + if (fstat(*fd, &st) != 0) { + close(*fd); + logit("%s: Couldn't stat %s: %s", __func__, + LASTLOG_FILE, strerror(errno)); + return (0); + } - if (lseek(*fd, offset, SEEK_SET) != offset) { - logit("%s: %s->lseek(): %s",...
2007 Sep 07
0
Public key reading abstraction (to allow future work)
...Inverse Path Ltd, 63 Park Road, Peterborough, PE1 2TN, UK Registered in England: 5555973 -------------- next part -------------- === modified file 'auth-rsa.c' --- auth-rsa.c 2007-07-30 09:54:36 +0000 +++ auth-rsa.c 2007-08-02 12:17:32 +0000 @@ -173,7 +173,6 @@ u_int bits; FILE *f; u_long linenum = 0; - struct stat st; Key *key; /* Temporarily use the user's uid. */ @@ -183,26 +182,9 @@ file = authorized_keys_file(pw); debug("trying public RSA key file %s", file); - /* Fail quietly if file does not exist */ - if (stat(file, &st) < 0) { - /* Restore...
2006 Mar 17
1
acquiring duplicate lock of same type: "vnode interlock"
I think I've read somewhere about panic during early root mount, fsck etc.. Perhaps this might be related: Full dmesg: http://people.freebsd.org/~ariff/misc/dmesg.boot.amd64 [....] acquiring duplicate lock of same type: "vnode interlock" 1st vnode interlock @ kern/vfs_vnops.c:791 2nd vnode interlock @ kern/vfs_subr.c:2018 KDB: stack backtrace: witness_checkorder() at
2002 Jun 26
0
IRIX 6.5 patch for Compression with UsePrivilegeSeparation
...ned(HAVE_MMAP_DEV_ZERO) + fd_zero = open ("/dev/zero", O_RDWR); + if (!fd_zero) + fatal("open(/dev/zero): %s", strerror(errno)); + address = mmap(NULL, size, PROT_WRITE|PROT_READ, MAP_SHARED, + fd_zero, 0); + if (address == MAP_FAILED) + fatal("mmap(%lu): %s", (u_long)size, strerror(errno)); + close (fd_zero); +#elif defined(HAVE_MMAP_ANON_SHARED) address = mmap(NULL, size, PROT_WRITE|PROT_READ, MAP_ANON|MAP_SHARED, -1, 0); if (address == MAP_FAILED) @@ -130,7 +142,7 @@ mm_freelist(mm->mmalloc, &mm->rb_free); mm_freelist(mm->mmalloc, &...
2002 Apr 10
1
openssh-3.1p1 on GNU/Hurd
...tialize configuration options to their default values. */ initialize_server_options(&options); diff -urN openssh-3.1p1.old/sshlogin.c openssh-3.1p1/sshlogin.c --- openssh-3.1p1.old/sshlogin.c Sun Feb 24 20:56:47 2002 +++ openssh-3.1p1/sshlogin.c Tue Apr 9 20:57:38 2002 @@ -51,12 +51,12 @@ u_long get_last_login_time(uid_t uid, const char *logname, - char *buf, u_int bufsize) + char **buf) { struct logininfo li; login_get_lastlog(&li, uid); - strlcpy(buf, li.hostname, bufsize); + *buf = xstrdup(li.hostname); return li.tv_sec; } diff -urN openssh-3.1p1.old/sshl...