search for: br_dev_queue_push_xmit

Displaying 15 results from an estimated 15 matches for "br_dev_queue_push_xmit".

2007 Apr 18
2
[Bridge] Re: [PATCH] TSO fix in br_dev_queue_push_xmit
...lad@storewiz.com> --- net/bridge/br_forward.c | 3 ++- 1 files changed, 2 insertions(+), 1 deletions(-) diff --git a/net/bridge/br_forward.c b/net/bridge/br_forward.c --- a/net/bridge/br_forward.c +++ b/net/bridge/br_forward.c @@ -31,7 +31,8 @@ static inline int should_deliver(const s int br_dev_queue_push_xmit(struct sk_buff *skb) { - if (skb->len > skb->dev->mtu) + /* drop mtu oversized packets except tso */ + if (skb->len > skb->dev->mtu && !skb_shinfo(skb)->tso_size) kfree_skb(skb); else { #ifdef CONFIG_BRIDGE_NETFILTER
2006 Jul 06
12
kernel BUG at net/core/dev.c:1133!
...cf8e3000 00000000 cd9e32e0 cf8e3000 c04ec07e cd9e32e0 cf8e3000 c0895140 Call Trace: [<c04dcfb0>] dev_gso_segment+0x30/0xb0 [<c04dd07e>] dev_hard_start_xmit+0x4e/0x110 [<c04ec07e>] __qdisc_run+0xbe/0x280 [<c04dd4b9>] dev_queue_xmit+0x379/0x380 [<c05bbe44>] br_dev_queue_push_xmit+0xa4/0x140 [<c05c2402>] br_nf_post_routing+0x102/0x1d0 [<c05c22b0>] br_nf_dev_queue_xmit+0x0/0x50 [<c05bbda0>] br_dev_queue_push_xmit+0x0/0x140 [<c04f0eab>] nf_iterate+0x6b/0xa0 [<c05bbda0>] br_dev_queue_push_xmit+0x0/0x140 [<c05bbda0>] br_dev_queue_push_xm...
2007 Apr 18
6
[Bridge] No UDP NFS over bridges in Linux 2.6.16.x?
Hi, I have 2 servers which are connected to a gateway machine. The gateway and one server are running Linux 2.6.16.2, while the third machine is running 2.6.16.5. The two ethernet ports on the gateway which are connected to the servers are combined into a single ethernet bridge device. Ever since 2.6.16, I have noticed that I can no longer cross-mount the two servers' /home directories via
2007 Apr 18
4
[Bridge] [PATCH/RFC] Let {ip, arp}tables "see" bridged VLAN tagged {I, AR}P packets
...header_size = 18; +#endif + memcpy(skb->nf_bridge->hh, skb->data - header_size, header_size); } struct bridge_skb_cb { --- linux-2.6.0-test6/net/bridge/br_forward.c Sun Sep 28 02:50:15 2003 +++ linux-2.6.0-test6-new/net/bridge/br_forward.c Mon Oct 6 20:19:32 2003 @@ -35,8 +35,7 @@ int br_dev_queue_push_xmit(struct sk_buf { #ifdef CONFIG_BRIDGE_NETFILTER /* ip_refrag calls ip_fragment, which doesn't copy the MAC header. */ - if (skb->nf_bridge) - memcpy(skb->data - 16, skb->nf_bridge->hh, 16); + nf_bridge_maybe_copy_header(skb); #endif skb_push(skb, ETH_HLEN); --- linux-2.6.0-...
2007 Apr 18
7
[Bridge] Passing vlan tagged packets through linux bridge
> Use an Intel pro/100 or pro/1000 driver..they are known to > work with VLANs. > > I guess it's also possible that it's a problem in the > bridging code, so try the latest kernel > as well... I compiled the latest 2.6.19 kernel and tested it with two 3COM 3c905c fast ethernet interfaces which work fine with vlan 802.1q tagging, but when I have added the eth0 and eth1
2023 May 19
2
[Bridge] [PATCH net-next 1/5] skbuff: bridge: Add layer 2 miss indication
...Then copy it to skb->l2_miss at the very end where the cache line containing this field is already written to: diff --git a/net/bridge/br_forward.c b/net/bridge/br_forward.c index 84d6dd5e5b1a..89f65564e338 100644 --- a/net/bridge/br_forward.c +++ b/net/bridge/br_forward.c @@ -50,6 +50,8 @@ int br_dev_queue_push_xmit(struct net *net, struct sock *sk, struct sk_buff *skb br_switchdev_frame_set_offload_fwd_mark(skb); + skb->l2_miss = BR_INPUT_SKB_CB(skb)->miss; + dev_queue_xmit(skb); return 0; Also for locally received packets: diff --git a/net/bridge/br_input.c b/net/b...
2007 Apr 18
3
[Bridge] My configuration in Bridge, 802.1Q VLAN, and hotmail login, Thanks to all
Hi All, For my issue, first thanks to ALL, I have some idea of it. Also Thank Peter for his kind remind, I would become one good guy in this list. Most mentioned MTU, but how I assure that the problem is just MTU, how I debug it? Here is my bridge configuration: Internet | | Gateway | | eth0 Ethernet Bridge | eth1 | H u b ( one normal hub
2007 Apr 18
2
[Bridge] large packet size doesn't work
Hi, I have just configured a Linux box with kernel 2.6.16.7 and configured two ethernet interfaces (with MTU 1500) in bridge mode. CONFIG_BRIDGE_NETFILTER is enabled. The problem is that ping -s 1500 192.168.0.2 doesn't work from 192.168.0.1 if the systems are separated by the bridge. Normal ping with smaller packet size works ok. What is wrong? Best Regards Fulvio Ricciardi
2009 Jan 26
2
system crashing while testing GPLPV drivers
I am rewriting the TX path in the GPLPV drivers and in its current form I am readily able to crash the system (eg Dom0 and everything else running) from DomU. xen is 3.3.1, linux is at most a week behind the 3.3.1 release date. My Windows DomU boots up, fails to get an IP address (yes, the TX path is broken), and then a short time later the system has rebooted. I don''t know exactly
2006 Jan 26
0
Profiling hotspots in my tc filter ruleset
...fdb_cleanup 1425 sky2.ko sky2_put_idx 1766 ipt_physdev.ko .text 2113 bridge.ko br_nf_pre_routing_finish 2133 bridge.ko br_nf_forward_ip 2314 bridge.ko br_handle_frame_finish 2454 bridge.ko br_dev_queue_push_xmit 2515 bridge.ko ip_sabotage_out 2718 sky2.ko sky2_rx_add 2858 sch_htb.ko htb_enqueue 3983 bridge.ko br_handle_frame 4796 bridge.ko br_nf_pre_routing 7047 bridge.ko br_nf_post_routing 81...
2006 Dec 08
2
Lots of "swapper: page allocation failure" and other memory related messages - 2.6.16-xen0
.../0x5c Dec 8 12:19:26 server kernel: [netif_be_start_xmit+166/431] netif_be_start_xmit+0xa6/0x1af Dec 8 12:19:26 server kernel: [dev_queue_xmit+520/679] dev_queue_xmit+0x208/0x2a7 Dec 8 12:19:26 server kernel: [br_forward_finish+0/65] br_forward_finish+0x0/0x41 Dec 8 12:19:26 server kernel: [br_dev_queue_push_xmit+216/223] br_dev_queue_push_xmit+0xd8/0xdf Dec 8 12:19:26 server kernel: [br_forward_finish+61/65] br_forward_finish+0x3d/0x41 Dec 8 12:19:26 server kernel: [br_nf_forward_finish+199/204] br_nf_forward_finish+0xc7/0xcc Dec 8 12:19:26 server kernel: [br_nf_forward_arp+274/285] br_nf_forward_arp...
2023 Apr 06
2
[Bridge] [PATCH net-next] net/bridge: add drop reasons for bridge forwarding
...son = SKB_DROP_REASON_BRIDGE_SWDEV_NOT_ALLOWED_EGRESS; + goto undeliverable; + } + if (br_skb_isolated(p, skb)) { + reason = SKB_DROP_REASON_BRIDGE_BOTH_PORT_ISOLATED; + goto undeliverable; + } + return true; + +undeliverable: + if (need_reason) + *need_reason = reason; + return false; } int br_dev_queue_push_xmit(struct net *net, struct sock *sk, struct sk_buff *skb) @@ -144,6 +167,8 @@ static int deliver_clone(const struct net_bridge_port *prev, void br_forward(const struct net_bridge_port *to, struct sk_buff *skb, bool local_rcv, bool local_orig) { + enum skb_drop_reason reason = SKB_DROP_REASON_NOT_...
2007 Apr 18
5
[Bridge] RFC: [PATCH] bridge vlan integration
...dev == p->dev || + p->state != BR_STATE_FORWARDING) + return 0; + +#ifdef CONFIG_BRIDGE_VLAN + if (skb->vlan && br_vlan_filter(skb, &p->vlan)) + return 0; +#endif + + return 1; } static inline unsigned packet_length(const struct sk_buff *skb) @@ -47,6 +56,10 @@ int br_dev_queue_push_xmit(struct sk_buf { skb_push(skb, ETH_HLEN); + if (br_vlan_output_frame(&skb, + skb->dev->br_port->vlan.untagged)) + return 0; + dev_queue_xmit(skb); } } Index: wireless-dev/net/bridge/br_if.c =================================================================...
2013 Apr 30
6
[Bridge] [PATCHv4 net-next 0/2] Add two new flags to bridge.
The following series adds 2 new flags to bridge. One flag allows the user to control whether mac learning is performed on the interface or not. By default mac learning is on. The other flag allows the user to control whether unicast traffic is flooded (send without an fdb) to a given unicast port. Default is on. Changes since v4: - Implemented Stephen's suggestions. Changes since v2: -
2007 Apr 18
5
[Bridge] Any way of knowing a packet's been defragmented
Hello, Due to a recent change in the bridge code, we now need a way of knowing if a packet has been defragmented. The bridge code now checks on the packet size and drops packets that are too big for the output port. Defragmented packets will get refragmented later, so they shouldn't be dropped. I've been reading the defragmentation code and can't find an easy way of knowing if a