Re: [PATCH] core: linkwatch should use jiffies64

2006-05-07 Thread David S. Miller
From: Stefan Rompf <[EMAIL PROTECTED]> Date: Sun, 7 May 2006 12:13:56 +0200 > the linkwatch code can overflow on a jiffies wrap, scheduling > work with a too large delay. If the delay is >0x8000, > internal_add_timer() seems to overflow too, hiding the bug, so > this isn't triggered too easily

Re: [PATCH]ip_options_fragment() has no effect on fragmentation

2006-05-07 Thread David S. Miller
From: [EMAIL PROTECTED] Date: Fri, 5 May 2006 13:50:02 -0400 > Does this patch will be used? > > This patch resolved the following problem: When I send IPv4 packet(contain > Record Route Option) which need to be fragmented to the router, the router > can not fragment it correctly. After fragme

Re: [PATCH]ip_options_fragment() has no effect on fragmentation

2006-05-07 Thread David S. Miller
From: [EMAIL PROTECTED] Date: Fri, 5 May 2006 13:50:02 -0400 > Does this patch will be used? Your patch is in the tree already. - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordo

Re: dBm cutoff at -1dBm is too low

2006-05-07 Thread Pavel Roskin
On Fri, 2006-05-05 at 10:28 -0700, Jean Tourrilhes wrote: > I tried to use 'signed' in the struct a long while ago, and > for some reason it broke left and right, I don't remember the > details. So, whatever we do, it would not be straightforward. Then let's keep the structure as is and chan

Re: [rfc][patch] ipvs: use proper timeout instead of fixed value

2006-05-07 Thread Andy Gospodarek
On Sun, May 07, 2006 at 11:32:00PM +0800, Wensong Zhang wrote: > > Hi Andy, > > Yes, the original sychronziation design is a sort of arbitary or > compromised solution. We don't want to synchronize every state change from > master to backup load balancer, because we were afraid that there were

Re: [rfc][patch] ipvs: use proper timeout instead of fixed value

2006-05-07 Thread Andy Gospodarek
On Sun, May 07, 2006 at 01:38:40PM +0900, Horms wrote: > On Fri, May 05, 2006 at 02:57:26PM -0400, Andy Gospodarek wrote: > > On Fri, May 05, 2006 at 12:20:54PM +0900, Horms wrote: > > > > > > Sorry, I missunderstood your patch completely the first time around. > > > Yes I think this is an excelle

Re: [PATCH]ip_options_fragment() has no effect on fragmentation

2006-05-07 Thread weiyj
Hello Mr. David: Does this patch will be used? This patch resolved the following problem: When I send IPv4 packet(contain Record Route Option) which need to be fragmented to the router, the router can not fragment it correctly. After fragmented by router, the second fragmentation still contai

Re: [PATCH] phy: new SMSC LAN83C185 PHY driver

2006-05-07 Thread Francois Romieu
Herbert Valerio Riedel <[EMAIL PROTECTED]> : > new SMSC LAN83C185 10BaseT/100BaseTX PHY driver for the PHY subsystem > > Signed-off-by: Herbert Valerio Riedel <[EMAIL PROTECTED]> Fine-with-me: Francois Romieu <[EMAIL PROTECTED]> -- Ueimor - To unsubscribe from this list: send the line "unsubscr

[PATCH] phy: new SMSC LAN83C185 PHY driver

2006-05-07 Thread Herbert Valerio Riedel
new SMSC LAN83C185 10BaseT/100BaseTX PHY driver for the PHY subsystem Signed-off-by: Herbert Valerio Riedel <[EMAIL PROTECTED]> --- 2nd attempt drivers/net/phy/Kconfig |6 +++ drivers/net/phy/Makefile |1 drivers/net/phy/smsc.c | 101 ++

Re: [PATCH] phy: new SMSC LAN83C185 PHY driver

2006-05-07 Thread Francois Romieu
> diff --git a/drivers/net/phy/smsc.c b/drivers/net/phy/smsc.c > new file mode 100644 > index 000..b96eb52 > --- /dev/null > +++ b/drivers/net/phy/smsc.c [...] > +/* prototypes */ > +static int lan83c185_config_init(struct phy_device *); > +static int lan83c185_config_intr(struct phy_device *);

Re: [RFC] SECMARK 1.0

2006-05-07 Thread James Morris
(note: an old, incorrect address for netfilter-devel was used in the initial mail, please update to the correct one as above if replying to this thread). -- James Morris <[EMAIL PROTECTED]> - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL P

Re: [RFC] SECMARK 1.0

2006-05-07 Thread James Morris
On Sun, 7 May 2006, Joshua Brindle wrote: > It looks like you are labeling all packets on an established connection as > tracked_packet_t. What is the rationale for not labeling all ftp traffic as > ftpd_packet_t? Granted that its very unlikely for established connections to > go to the wrong proc

Re: [RFC] SECMARK 1.0

2006-05-07 Thread Joshua Brindle
James Morris wrote: For example, SELinux will now be able to utilize connection tracking, so that only packets which are known to be valid for a specific connection will be allowed to reach the subject. Sample iptables rules for labeling packets are at: http://people.redhat.com/jmorris/selinux

[RFC][SECMARK userland 03/03] Add libip6t_SECMARK

2006-05-07 Thread James Morris
This patch adds the shared library module for the SECMARK target (IPv6). Signed-off-by: James Morris <[EMAIL PROTECTED]> --- diff -purN -X dontdiff iptables.p/extensions/libip6t_SECMARK.c iptables.w/extensions/libip6t_SECMARK.c --- iptables.p/extensions/libip6t_SECMARK.c 1969-12-31 19:00:0

[RFC][SECMARK userland 02/03] Add libipt_SECMARK

2006-05-07 Thread James Morris
This patch adds the shared library module for the SECMARK target (IPv4). Signed-off-by: James Morris <[EMAIL PROTECTED]> --- extensions/Makefile |2 extensions/libipt_SECMARK.c | 125 ++ extensions/libipt_SECMARK.man |7 ++ 3 files

[RFC][SECMARK userland 01/03] Add libselinux support

2006-05-07 Thread James Morris
This patch adds the infrastructure for linking iptables against libselinux, for use with the SECMARK target. This is enabled by setting DO_SELINUX=1 in the build environment. Signed-off-by: James Morris <[EMAIL PROTECTED]> --- Makefile| 14 +- Rules.make |

[RFC][SECMARK 08/08] Add selinux_relabel_packet_permission() check to xt_SECMARK

2006-05-07 Thread James Morris
This patch adds the selinux_relabel_packet_permission() check to the SECMARK target, so that SELinux policy is consulted to ensure that the labeling operation is permitted by the current task. Signed-off-by: James Morris <[EMAIL PROTECTED]> --- net/netfilter/xt_SECMARK.c |6 ++ 1 fil

[RFC][SECMARK 07/08] Add selinux_relabel_packet_permission() to SELinux API

2006-05-07 Thread James Morris
This patch adds a new function to the SELinux kernel API, selinux_relabel_packet_permission(), which is to be invoked when labeling packets via SECMARK. The security policy must allow the specified label to be set by the current task for the permission to be granted. It is implicit that packet

[RFC][SECMARK 06/08] Define a relabelto permission in the SELinux packet class

2006-05-07 Thread James Morris
This patch defines a new permission ('relabelto') in the new SELinux packet object class, to be used when setting SECMARK rules for labeling packets. Signed-off-by: James Morris <[EMAIL PROTECTED]> --- security/selinux/include/av_perm_to_string.h |1 + security/selinux/include/av_permissi

[RFC][SECMARK 05/08] Add new packet controls to SELinux

2006-05-07 Thread James Morris
This patch adds new per-packet access controls to SELinux, replacing the old packet controls. Packets are labeled with the iptables SECMARK target then security policy for the packets is enforced with these controls. To allow for a smooth transition to the new controls, the old code is still p

[RFC][SECMARK 04/08] Add new flask definitions to SELinux

2006-05-07 Thread James Morris
This patch adds support for a new object class ('packet'), and two associated permissions ('send', 'recv'). These are used to enforce security policy for network packets labeled with SECMARK. Signed-off-by: James Morris <[EMAIL PROTECTED]> --- diff -purN -X dontdiff linux-2.6.17-rc2-mm1.p/sec

[RFC][SECMARK 03/08] Add xtables SECMARK target

2006-05-07 Thread James Morris
This patch adds a SECMARK target to xtables, allowing the admin to apply security marks to packets via both iptables and ip6tables. The target currently handles SELinux security marking, but can be extended for other purposes as needed. Signed-off-by: James Morris <[EMAIL PROTECTED]> --- incl

[RFC][SECMARK 02/08] Export selinux_string_to_sid from SELinux

2006-05-07 Thread James Morris
This patch exports adds a new function to the in-kernel SELinux API: selinux_string_to_sid(). It maps a text security context to an SELiux security ID (SID). Signed-off-by: James Morris <[EMAIL PROTECTED]> --- include/linux/selinux.h| 16 security/selinux/exports.c |

[RFC] [SECMARK 01/08] Add secmark support to core networking

2006-05-07 Thread James Morris
This patch adds a secmark field to the skbuff structure, to allow security subsystems to place security markings on network packets. This is similar to the nfmark field, except is intended for implementing security policy, rather than than networking policy. This patch was already acked in pri

Re: [rfc][patch] ipvs: use proper timeout instead of fixed value

2006-05-07 Thread Wensong Zhang
Hi Andy, Yes, the original sychronziation design is a sort of arbitary or compromised solution. We don't want to synchronize every state change from master to backup load balancer, because we were afraid that there were too much state change synchronization messages and there would be some p

[RFC] SECMARK 1.0

2006-05-07 Thread James Morris
The following patchsets implement a new scheme for adding security markings to packets via iptables, as well as changes to SELinux to use these markings for security policy enforcement. Along with these patches, assorted files including policy examples and patches for SELinux userland may be fo

[PATCH] phy: new SMSC LAN83C185 PHY driver

2006-05-07 Thread Herbert Valerio Riedel
new SMSC LAN83C185 10BaseT/100BaseTX PHY driver for the PHY subsystem Signed-off-by: Herbert Valerio Riedel <[EMAIL PROTECTED]> --- drivers/net/phy/Kconfig |6 ++ drivers/net/phy/Makefile |1 drivers/net/phy/smsc.c | 134 ++ 3 files chan

Re: Associate on 'ifconfig up'

2006-05-07 Thread Michael Buesch
On Saturday 06 May 2006 20:24, David Woodhouse wrote: > On Fri, 2006-05-05 at 17:38 +0100, David Woodhouse wrote: > > I still need this hack to work around the fact that softmac doesn't > > attempt to associate when we bring the device up... > > It'd be quite good to get this fixed in 2.6.17 too.

when to use ip_route_input() and not ip_route_output_key

2006-05-07 Thread benzi vizman
Hi, Can one summerize what's the cases calling each of these routing queries? What are the differences? Benzi. - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

[PATCH] Documentation: add missing operstates.txt

2006-05-07 Thread Stefan Rompf
Hi, seems documentation got lost when the RFC2863-patch was applied. Having documentation is good, so I resend it ;-) Signed-off-by: Stefan Rompf <[EMAIL PROTECTED]> --- /dev/null 2005-03-19 20:36:14.0 +0100 +++ linux-2.6.17-rc3/Documentation/networking/operstates.txt2006-04-27 22

[PATCH] core: linkwatch should use jiffies64

2006-05-07 Thread Stefan Rompf
Hi, the linkwatch code can overflow on a jiffies wrap, scheduling work with a too large delay. If the delay is >0x8000, internal_add_timer() seems to overflow too, hiding the bug, so this isn't triggered too easily. Best solution is to use jiffies64 for calculation as these events happen with