Re: Question about tcp hash function tcp_hashfn()

2006-06-01 Thread Evgeniy Polyakov
On Wed, May 31, 2006 at 11:41:27AM -0700, David Miller ([EMAIL PROTECTED]) wrote: Worse: he folded the jenkins algorith result with h ^= h 16; h ^= h 8; Destroying the coverage of the function. It was done to simulate socket code which uses the same folding.

Re: Question about tcp hash function tcp_hashfn()

2006-06-01 Thread Evgeniy Polyakov
On Wed, May 31, 2006 at 12:29:55PM -0600, Brian F. G. Bidulock ([EMAIL PROTECTED]) wrote: Evgeniy, On Wed, 31 May 2006, Evgeniy Polyakov wrote: Worse: he folded the jenkins algorith result with h ^= h 16; h ^= h 8; Destroying the coverage of the

Re: Question about tcp hash function tcp_hashfn()

2006-06-01 Thread David Miller
From: Evgeniy Polyakov [EMAIL PROTECTED] Date: Thu, 1 Jun 2006 10:12:36 +0400 I've present the new simple code and test results which show that folded and not folded Jenkins hashes _do_ produce _exactly_ the same distribution. Ok I believe you now :) I think I've already said that fairly

Re: Question about tcp hash function tcp_hashfn()

2006-06-01 Thread Brian F. G. Bidulock
Evgeniy, On Thu, 01 Jun 2006, Evgeniy Polyakov wrote: for (i=0; ihash_size*iter_num; ++i) { saddr = num2ip(get_random_byte(), get_random_byte(), get_random_byte(), get_random_byte()); sport = get_random_word(); You still have a problem: you cannot

Re: Question about tcp hash function tcp_hashfn()

2006-06-01 Thread Brian F. G. Bidulock
David, On Wed, 31 May 2006, David Miller wrote: Ok I believe you now :) I'll believe it if he interates through a subset and gets the same results instead of using a pseudo-random number generator. I thought you said you were considering jenkins_3word(), not jenkins_2word()? - To

Re: Question about tcp hash function tcp_hashfn()

2006-06-01 Thread David Miller
From: Brian F. G. Bidulock [EMAIL PROTECTED] Date: Thu, 1 Jun 2006 00:22:21 -0600 I thought you said you were considering jenkins_3word(), not jenkins_2word()? We could xor some of the inputs in order to use jenkins_2word(). - To unsubscribe from this list: send the line unsubscribe netdev in

Re: Question about tcp hash function tcp_hashfn()

2006-06-01 Thread Evgeniy Polyakov
On Thu, Jun 01, 2006 at 12:18:25AM -0600, Brian F. G. Bidulock ([EMAIL PROTECTED]) wrote: Evgeniy, On Thu, 01 Jun 2006, Evgeniy Polyakov wrote: for (i=0; ihash_size*iter_num; ++i) { saddr = num2ip(get_random_byte(), get_random_byte(), get_random_byte(),

Re: 2.6.17-rc5-mm1 lockdep output

2006-06-01 Thread Arjan van de Ven
On Wed, 2006-05-31 at 17:04 -0700, Jesse Brandeburg wrote: well, when running e1000 through some code paths on FC4 + 2.6.17-rc5-mm1 + ingo's latest rollup patch, with this lockdep debug option enabled I got this: e1000: eth1: e1000_watchdog_task: NIC Link is Up 1000 Mbps Full Duplex

[patch, -rc5-mm1] lock validator: special locking: net/ipv4/igmp.c #2

2006-06-01 Thread Ingo Molnar
* Jesse Brandeburg [EMAIL PROTECTED] wrote: well, when running e1000 through some code paths on FC4 + 2.6.17-rc5-mm1 + ingo's latest rollup patch, with this lockdep debug option enabled I got this: e1000: eth1: e1000_watchdog_task: NIC Link is Up 1000 Mbps Full Duplex

Re: Question about tcp hash function tcp_hashfn()

2006-06-01 Thread Brian F. G. Bidulock
Evgeniy, On Thu, 01 Jun 2006, Evgeniy Polyakov wrote: Since pseudo-randomness affects both folded and not folded hash distribution, it can not end up in different results. Yes it would, so to rule out pseudo-random effects the pseudo- random number generator must be removed. You are

Re: Question about tcp hash function tcp_hashfn()

2006-06-01 Thread Evgeniy Polyakov
On Thu, Jun 01, 2006 at 12:46:08AM -0600, Brian F. G. Bidulock ([EMAIL PROTECTED]) wrote: Since pseudo-randomness affects both folded and not folded hash distribution, it can not end up in different results. Yes it would, so to rule out pseudo-random effects the pseudo- random number

Re: [Bugme-new] [Bug 6613] New: iptables broken on 32-bit PReP (ARCH=ppc)

2006-06-01 Thread Meelis Roos
modprobe iptable_filter (errors out with Invalid Argument) iptables -t nat -A POSTROUTING -s 10.0.0.0/8 -j SNAT --to 192.168.1.1 (usually errors out with Invalid Argument, sometimes succeeds, when succeeds then the rule works fine) Meelis, it would really help if you could try 2.6.16 and in

Re: Question about tcp hash function tcp_hashfn()

2006-06-01 Thread Brian F. G. Bidulock
Evgeniy, On Thu, 01 Jun 2006, Evgeniy Polyakov wrote: On Thu, Jun 01, 2006 at 12:46:08AM -0600, Brian F. G. Bidulock ([EMAIL PROTECTED]) wrote: Since pseudo-randomness affects both folded and not folded hash distribution, it can not end up in different results. Yes it would, so to

[PATCH netdev-2.6#upstream] net: au1000_eth: PHY framework conversion

2006-06-01 Thread Herbert Valerio Riedel
convert au1000_eth driver to use PHY framework and garbage collected functions and identifiers that became unused/obsolete in the process Signed-off-by: Herbert Valerio Riedel [EMAIL PROTECTED] --- this is a resend of http://marc.theaimsgroup.com/?l=linux-netdevm=114746547301867w=2

Re: Question about tcp hash function tcp_hashfn()

2006-06-01 Thread Evgeniy Polyakov
On Thu, Jun 01, 2006 at 01:11:25AM -0600, Brian F. G. Bidulock ([EMAIL PROTECTED]) wrote: Evgeniy, On Thu, 01 Jun 2006, Evgeniy Polyakov wrote: On Thu, Jun 01, 2006 at 12:46:08AM -0600, Brian F. G. Bidulock ([EMAIL PROTECTED]) wrote: Since pseudo-randomness affects both folded and

Re: 2.6.17-rc4: netfilter LOG messages truncated via NETCONSOLE

2006-06-01 Thread Frank van Maarseveen
On Wed, May 31, 2006 at 07:46:20PM +0200, Patrick McHardy wrote: [...] ip -s link doesn't show any dropped packets so far with any patch and I don't use traffic control that I'm aware of. But I'm not sure what to make of tc output, maybe because CONFIG_SHAPER is not set: # tc -s

Re: Question about tcp hash function tcp_hashfn()

2006-06-01 Thread Brian F. G. Bidulock
Evgeniy, On Thu, 01 Jun 2006, Evgeniy Polyakov wrote: For purely random numbers you could amplify thermal noise off an open transitor junction (the audiofile's white noise generator) and feed it into an analog to digital converter. I've run it with following source ip/port selection algo:

Re: Refactor Netlink connector?

2006-06-01 Thread Thomas Graf
* James Morris [EMAIL PROTECTED] 2006-05-31 11:42 On Wed, 31 May 2006, jamal wrote: To also answer your other email: Look at security/selinux/nlmsgtab.c for example for NETLINK_ROUTE and compare with NETLINK_GENERIC to see the hole. I was suggesting if we started by just adding checks

Re: Question about tcp hash function tcp_hashfn()

2006-06-01 Thread Evgeniy Polyakov
On Thu, Jun 01, 2006 at 04:24:57AM -0600, Brian F. G. Bidulock ([EMAIL PROTECTED]) wrote: For purely random numbers you could amplify thermal noise off an open transitor junction (the audiofile's white noise generator) and feed it into an analog to digital converter. It is also possible to

[NET]: Add netif_tx_lock

2006-06-01 Thread Herbert Xu
On Thu, Jun 01, 2006 at 10:25:25AM +1000, herbert wrote: I think this netpoll wrinkle means we also have to make sure to set the xmit_lock_owner across the board. You're right. In fact this can deadlock today for those drivers that already make use of xmit_lock without setting the

[RFT] r8169: MAC address change support

2006-06-01 Thread Francois Romieu
It works fine here (x86 so far) but I would welcome more testers. The patch applies against 2.6.17-rcX. diff --git a/drivers/net/r8169.c b/drivers/net/r8169.c index 0ad3310..4208d9a 100644 --- a/drivers/net/r8169.c +++ b/drivers/net/r8169.c @@ -1381,6 +1381,41 @@ static void

monitor_during_oper on rt*pci (or any other pcmcia card)?

2006-06-01 Thread Johannes Berg
Hey, Florian approached me with a project where you need a pcmcia card that can have monitor_during_oper. I'd use bcm43xx but unfortunately the signal strength calculations are way off right now, and that's another requirement. Can the rt family of cards be made to support this with reliable

[PATCH 3/7] AMSO1100 WR / Event Definitions.

2006-06-01 Thread Steve Wise
Sorry for this, but patch 3 is apparently getting eaten by the list servers for linux-kernel and netdev. Here is patch 3 as a tarball to see if it goes through... Steve. [PATCH 3/7] AMSO1100 WR / Event Definitions. amso1100_wr.tgz Description: application/compressed-tar

Re: Refactor Netlink connector?

2006-06-01 Thread James Morris
On Thu, 1 Jun 2006, Thomas Graf wrote: It shouldn't be hard to split what is implemented in nlmsg_route_perms[] for NETLINK_ROUTE into the definitions of the generic netlink operations, could look like this: struct genl_ops some_op = { [...] .perm=

[PATCH] softmac: complete shared key authentication

2006-06-01 Thread Daniel Drake
This patch finishes of the partially-complete shared key authentication implementation in softmac. The complication here is that we need to encrypt a management frame during the authentication process. I don't think there are any other scenarios where this would have to happen. To get around

[PATCH] softmac: Fix handling of authentication failure

2006-06-01 Thread Daniel Drake
My router blew up earlier, but exhibited some interesting behaviour during its dying moments. It was broadcasting beacons but wouldn't respond to any authentication requests. I noticed that softmac wasn't playing nice with this, as I couldn't make it try to connect to other networks after it had

[PATCH] softmac: unified capabilities computation

2006-06-01 Thread Daniel Drake
From: Joseph Jezak [EMAIL PROTECTED] This patch moves the capabilities field computation to a function for clarity and adds some previously unimplemented bits. Signed off by Joseph Jezak [EMAIL PROTECTED] Signed-off-by: Daniel Drake [EMAIL PROTECTED] Acked-By: Johannes Berg [EMAIL PROTECTED] ---

Re: [PATCH 1/2] iWARP Connection Manager.

2006-06-01 Thread Steve Wise
On Wed, 2006-05-31 at 15:22 -0700, Sean Hefty wrote: Steve Wise wrote: +/* + * Release a reference on cm_id. If the last reference is being removed + * and iw_destroy_cm_id is waiting, wake up the waiting thread. + */ +static int iwcm_deref_id(struct iwcm_id_private *cm_id_priv) +{

Re: 2.6.17-rc4: netfilter LOG messages truncated via NETCONSOLE

2006-06-01 Thread Patrick McHardy
Frank van Maarseveen wrote: ok, now tc -s -d qdisc show says (after noticing missing netconsole packets): qdisc pfifo_fast 0: dev eth0 bands 3 priomap 1 2 2 2 1 2 0 0 1 1 1 1 1 1 1 1 Sent 155031 bytes 2067 pkt (dropped 0, overlimits 0 requeues 0) backlog 0b 0p requeues 0 Mhh no

Re: [Bugme-new] [Bug 6613] New: iptables broken on 32-bit PReP (ARCH=ppc)

2006-06-01 Thread Patrick McHardy
Meelis Roos wrote: Meelis, it would really help if you could try 2.6.16 and in case that doesn't work 2.6.15 to give an idea about whether this is a recent regression or an old problem. We had a number of changes in this area in the last two kernel versions that could be related. Have not

Re: monitor_during_oper on rt*pci (or any other pcmcia card)?

2006-06-01 Thread Ivo van Doorn
Hi, Florian approached me with a project where you need a pcmcia card that can have monitor_during_oper. I'd use bcm43xx but unfortunately the signal strength calculations are way off right now, and that's another requirement. Can the rt family of cards be made to support this with

Re: [openib-general] Re: [PATCH 1/2] iWARP Connection Manager.

2006-06-01 Thread Tom Tucker
On Wed, 2006-05-31 at 15:22 -0700, Sean Hefty wrote: Steve Wise wrote: +/* + * Release a reference on cm_id. If the last reference is being removed + * and iw_destroy_cm_id is waiting, wake up the waiting thread. + */ +static int iwcm_deref_id(struct iwcm_id_private *cm_id_priv) +{

Re: Question about tcp hash function tcp_hashfn()

2006-06-01 Thread Brian F. G. Bidulock
Evgeniy, On Thu, 01 Jun 2006, Evgeniy Polyakov wrote: I think the sun shines more in Moscow than in Edmonton, so it is not so random. ;) Specially for you :) Thank you for being so gracious and patient with me. It does not have artifacts, but it's dispersion is wider than XOR one. _Much_

RE: pci_enable_msix throws up error

2006-06-01 Thread Ravinandan Arakali
I have submitted a proposed fix for the below issue. Will wait for comments. Ravi -Original Message- From: Andi Kleen [mailto:[EMAIL PROTECTED] Sent: Friday, May 05, 2006 1:44 AM To: Ayaz Abdulla Cc: [EMAIL PROTECTED]; linux-kernel@vger.kernel.org; Ananda. Raju; netdev@vger.kernel.org;

[RFT] Realtek 8168 ethernet support

2006-06-01 Thread Daniel Drake
I've produced this patch which should allow the r8169 driver to work with the new Realtek 8168 chips. These are found in PCI-Express form and onboard some newer motherboards. Does anyone own this hardware? I'm looking for someone to test it before I send it on. Signed-off-by: Daniel Drake [EMAIL

Re: Question about tcp hash function tcp_hashfn()

2006-06-01 Thread David Miller
From: Brian F. G. Bidulock [EMAIL PROTECTED] Date: Thu, 1 Jun 2006 12:40:10 -0600 I think the sun shines more in Moscow than in Edmonton, so it is not so random. ;) Go Oilers :) - To unsubscribe from this list: send the line unsubscribe netdev in the body of a message to [EMAIL PROTECTED] More

Re: [Bugme-new] [Bug 6613] New: iptables broken on 32-bit PReP (ARCH=ppc)

2006-06-01 Thread Meelis Roos
Then lets try something different. Please enable the DEBUG_IP_FIREWALL_USER define in net/ipv4/netfilter/ip_tables.c and post the results, if any. On bootup I get this in dmesg (one Bad offset has been added): ip_tables: (C) 2000-2006 Netfilter Core Team Netfilter messages via NETLINK v0.30.

Re: [PATCH 1/2] iWARP Connection Manager.

2006-06-01 Thread Sean Hefty
Steve Wise wrote: +int iw_cm_disconnect(struct iw_cm_id *cm_id, int abrupt) +{ + struct iwcm_id_private *cm_id_priv; + unsigned long flags; + int ret = 0; + + cm_id_priv = container_of(cm_id, struct iwcm_id_private, id); + /* Wait if we're currently in a connect or

[RFC] new qla3xxx NIC Driver v2.02.00k30

2006-06-01 Thread Ron Mercer
All, Forth submission for the upstream inclusion of the qla3xxx Ethernet driver. This is a complementary network driver for our ISP4XXX parts. There is a concurrent effort underway to get the iSCSI driver (qla4xxx) integrated upstream as well. This submission is contained in a patch file that

Re: DPRINTKs in e1000 code (2.6.x kernels)

2006-06-01 Thread Amit Arora
On Wed, 2006-05-31 at 16:30, Auke Kok wrote: On Wed, 31 May 2006 14:31:05 +0530, Amit K Arora [EMAIL PROTECTED] wrote: Should these DPRINTKs be removed from the 2.6.x e1000 code as well ? they already are. the patch was merged in 7.0.38-k2 or so which is over a month ago. I do not

Re: DPRINTKs in e1000 code (2.6.x kernels)

2006-06-01 Thread Auke Kok
Amit Arora wrote: On Wed, 2006-05-31 at 16:30, Auke Kok wrote: On Wed, 31 May 2006 14:31:05 +0530, Amit K Arora [EMAIL PROTECTED] wrote: Should these DPRINTKs be removed from the 2.6.x e1000 code as well ? they already are. the patch was merged in 7.0.38-k2 or so which is over a month ago.

Re: [RFT] Realtek 8168 ethernet support

2006-06-01 Thread Francois Romieu
Daniel Drake [EMAIL PROTECTED] : [...] @@ -1442,20 +1444,24 @@ rtl8169_init_board(struct pci_dev *pdev, } } - /* make sure PCI base addr 1 is MMIO */ - if (!(pci_resource_flags(pdev, 1) IORESOURCE_MEM)) { - if (netif_msg_probe(tp)) { -

Re: DPRINTKs in e1000 code (2.6.x kernels)

2006-06-01 Thread Auke Kok
Auke Kok wrote: Amit Arora wrote: On Wed, 2006-05-31 at 16:30, Auke Kok wrote: On Wed, 31 May 2006 14:31:05 +0530, Amit K Arora [EMAIL PROTECTED] wrote: Should these DPRINTKs be removed from the 2.6.x e1000 code as well ? they already are. the patch was merged in 7.0.38-k2 or so which is

Re: DPRINTKs in e1000 code (2.6.x kernels)

2006-06-01 Thread Amit K Arora
Auke Kok wrote: I'm in need of coffee - these changes got queued for 2.6.18. They're in jgarziks netdev-2.6.git, but not anywhere in 2.6.17rcX Auke Thanks for the clarification ! Regards, Amit Arora - To unsubscribe from this list: send the line unsubscribe netdev in the body of a

Re: [openib-general] Re: [PATCH 1/2] iWARP Connection Manager.

2006-06-01 Thread Tom Tucker
On Thu, 2006-06-01 at 14:09 -0700, Sean Hefty wrote: Steve Wise wrote: +int iw_cm_disconnect(struct iw_cm_id *cm_id, int abrupt) +{ + struct iwcm_id_private *cm_id_priv; + unsigned long flags; + int ret = 0; + + cm_id_priv = container_of(cm_id, struct iwcm_id_private, id); + /* Wait

RE: [openib-general] Re: [PATCH 1/2] iWARP Connection Manager.

2006-06-01 Thread Caitlin Bestler
There's a difference between trying to handle the user calling disconnect/destroy at the same time a call to accept/connect is active, versus the user calling disconnect/destroy after accept/connect have returned. In the latter case, I think you're fine. In the first case, this is

e1000 fails to load sometimes: The EEPROM Checksum Is Not Valid

2006-06-01 Thread Jeremy Fitzhardinge
With 2.6.17-rc5-mm2 (and other kernels), the e1000 fails to load sometimes, with the message: Intel(R) PRO/1000 Network Driver - version 7.0.38-k4-NAPI Copyright (c) 1999-2006 Intel Corporation. ACPI: PCI Interrupt :02:00.0[A] - GSI 16 (level, low) - IRQ 20 PCI: Setting latency timer of

Re: [RFT] Realtek 8168 ethernet support

2006-06-01 Thread Jeff Garzik
On Fri, Jun 02, 2006 at 12:24:37AM +0200, Francois Romieu wrote: I'd rather use pci_device_id-driver_data but it's an option. I would prefer this, too. Jeff - To unsubscribe from this list: send the line unsubscribe netdev in the body of a message to [EMAIL PROTECTED] More majordomo

Re: [PATCH] softmac: Fix handling of authentication failure

2006-06-01 Thread Larry Finger
Daniel Drake wrote: My router blew up earlier, but exhibited some interesting behaviour during its dying moments. It was broadcasting beacons but wouldn't respond to any authentication requests. I noticed that softmac wasn't playing nice with this, as I couldn't make it try to connect to other

Re: netif_tx_disable and lockless TX

2006-06-01 Thread Stephen Hemminger
Robert Olsson wrote: jamal writes: Latency-wise: TX completion interrupt provides the best latency. Processing in the poll() -aka softirq- was almost close to the hardirq variant. So if you can make things run in a softirq such as transmit one, then the numbers will likely stay the

[patch 01/17] clean up initcall warning for netconsole

2006-06-01 Thread akpm
From: Matt Mackall [EMAIL PROTECTED] netconsole is being wrong here. If it wasn't enabled there's no error. Signed-off-by: Andrew Morton [EMAIL PROTECTED] --- drivers/net/netconsole.c |2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff -puN

[patch 04/17] ppp_async hang fix

2006-06-01 Thread akpm
From: [EMAIL PROTECTED] Adapted from http://bugzilla.kernel.org/show_bug.cgi?id=6530 Reschedule the async Tx tasklet if the transmit queue was full. Cc: Paul Mackerras [EMAIL PROTECTED] Signed-off-by: Andrew Morton [EMAIL PROTECTED] --- drivers/net/ppp_async.c |2 ++ 1 file changed, 2

[patch 10/17] secmark: Add xtables SECMARK target

2006-06-01 Thread akpm
From: James Morris [EMAIL PROTECTED] Add a SECMARK target to xtables, allowing the admin to apply security marks to packets via both iptables and ip6tables. The target currently handles SELinux security marking, but can be extended for other purposes as needed. Signed-off-by: James Morris

[patch 02/17] remove dead entry in net wan Kconfig

2006-06-01 Thread akpm
From: Paul Fulghum [EMAIL PROTECTED] Remove dead entry from net wan Kconfig. This entry is left over from 2.4 where synclink used syncppp driver directly. synclink drivers now use generic HDLC Signed-off-by: Paul Fulghum [EMAIL PROTECTED] Signed-off-by: Andrew Morton [EMAIL PROTECTED] ---

[patch 06/17] neighbour.c, pneigh_get_next() skips published entry

2006-06-01 Thread akpm
From: Jari Takkala [EMAIL PROTECTED] Fix a problem where output from /proc/net/arp skips a record when the full output does not fit into the users read() buffer. To reproduce: publish a large number of ARP entries (more than 10 required on my system). Run 'dd if=/proc/net/arp of=arp-1024.out

[patch 12/17] secmark: Add CONNSECMARK xtables target

2006-06-01 Thread akpm
From: James Morris [EMAIL PROTECTED] Add a new xtables target, CONNSECMARK, which is used to specify rules for copying security marks from packets to connections, and for copyying security marks back from connections to packets. This is similar to the CONNMARK target, but is more limited in

[patch 14/17] irda: missing allocation result check in irlap_change_speed()

2006-06-01 Thread akpm
From: Florin Malita [EMAIL PROTECTED] The skb allocation may fail, which can result in a NULL pointer dereference in irlap_queue_xmit(). Coverity CID: 434. davem: If the allocation fails we should probably do something more interesting here, such as schedule a timer to try again later.

[patch 05/17] selinux: add security class for appletalk sockets

2006-06-01 Thread akpm
From: Christopher J. PeBenito [EMAIL PROTECTED] Add a security class for appletalk sockets so that they can be distinguished in SELinux policy. Please apply. Signed-off-by: Stephen Smalley [EMAIL PROTECTED] Acked-by: James Morris [EMAIL PROTECTED] Cc: David S. Miller [EMAIL PROTECTED]

[patch 16/17] recent match: fix sleeping function called from invalid context

2006-06-01 Thread akpm
From: Patrick McHardy [EMAIL PROTECTED] create_proc_entry must not be called with locks held. Use a mutex instead to protect data only changed in user context. Signed-off-by: Patrick McHardy [EMAIL PROTECTED] Signed-off-by: Andrew Morton [EMAIL PROTECTED] --- net/ipv4/netfilter/ipt_recent.c

Re: [patch 16/17] recent match: fix sleeping function called from invalid context

2006-06-01 Thread Andrew Morton
oops, sorry, I didn't mean to send 16 and 17. - To unsubscribe from this list: send the line unsubscribe netdev in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html

[patch 07/17] secmark: Add new flask definitions to SELinux

2006-06-01 Thread akpm
From: James Morris [EMAIL PROTECTED] Secmark implements a new scheme for adding security markings to packets via iptables, as well as changes to SELinux to use these markings for security policy enforcement. The rationale for this scheme is explained and discussed in detail in the original

[patch 13/17] secmark: Add new packet controls to SELinux

2006-06-01 Thread akpm
From: James Morris [EMAIL PROTECTED] Add new per-packet access controls to SELinux, replacing the old packet controls. Packets are labeled with the iptables SECMARK and CONNSECMARK targets, then security policy for the packets is enforced with these controls. To allow for a smooth transition

[patch 11/17] secmark: Add secmark support to conntrack

2006-06-01 Thread akpm
From: James Morris [EMAIL PROTECTED] Add a secmark field to IP and NF conntracks, so that security markings on packets can be copied to their associated connections, and also copied back to packets as required. This is similar to the network mark field currently used with conntrack, although it

[patch 15/17] pppoe: missing result check in __pppoe_xmit()

2006-06-01 Thread akpm
From: Florin Malita [EMAIL PROTECTED] skb_clone() may fail, we should check the result. Coverity CID: 1215. Signed-off-by: Florin Malita [EMAIL PROTECTED] Cc: David S. Miller [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Signed-off-by: Andrew Morton [EMAIL PROTECTED] --- drivers/net/pppoe.c |3

[patch 03/17] eliminate unused /proc/sys/net/ethernet

2006-06-01 Thread akpm
From: Jes Sorensen [EMAIL PROTECTED] The /proc/sys/net/ethernet directory has been sitting empty for more than 10 years! Time to eliminate it! Signed-off-by: Jes Sorensen [EMAIL PROTECTED] Cc: Jeff Garzik [EMAIL PROTECTED] Cc: David S. Miller [EMAIL PROTECTED] Signed-off-by: Andrew Morton

Re: orinoco encodeext + auth patch on lkml

2006-06-01 Thread Pavel Roskin
Hello, Dan! On Wed, 2006-05-31 at 08:03 -0400, Dan Williams wrote: Pavel, Unsure if you saw this. Slightly annoying he didn't send to netdev, but would be good to take a look at and possibly integrate. Looks sane to me from 10,000ft. http://lkml.org/lkml/2006/5/30/433 Thanks for heads