Displaying 15 results from an estimated 15 matches for "br_dev_queue_push_xmit".
2007 Apr 18
2
[Bridge] Re: [PATCH] TSO fix in br_dev_queue_push_xmit
...lad@storewiz.com>
---
net/bridge/br_forward.c | 3 ++-
1 files changed, 2 insertions(+), 1 deletions(-)
diff --git a/net/bridge/br_forward.c b/net/bridge/br_forward.c
--- a/net/bridge/br_forward.c
+++ b/net/bridge/br_forward.c
@@ -31,7 +31,8 @@ static inline int should_deliver(const s
int br_dev_queue_push_xmit(struct sk_buff *skb)
{
- if (skb->len > skb->dev->mtu)
+ /* drop mtu oversized packets except tso */
+ if (skb->len > skb->dev->mtu && !skb_shinfo(skb)->tso_size)
kfree_skb(skb);
else {
#ifdef CONFIG_BRIDGE_NETFILTER
2006 Jul 06
12
kernel BUG at net/core/dev.c:1133!
...cf8e3000 00000000 cd9e32e0 cf8e3000 c04ec07e cd9e32e0 cf8e3000
c0895140
Call Trace:
[<c04dcfb0>] dev_gso_segment+0x30/0xb0
[<c04dd07e>] dev_hard_start_xmit+0x4e/0x110
[<c04ec07e>] __qdisc_run+0xbe/0x280
[<c04dd4b9>] dev_queue_xmit+0x379/0x380
[<c05bbe44>] br_dev_queue_push_xmit+0xa4/0x140
[<c05c2402>] br_nf_post_routing+0x102/0x1d0
[<c05c22b0>] br_nf_dev_queue_xmit+0x0/0x50
[<c05bbda0>] br_dev_queue_push_xmit+0x0/0x140
[<c04f0eab>] nf_iterate+0x6b/0xa0
[<c05bbda0>] br_dev_queue_push_xmit+0x0/0x140
[<c05bbda0>] br_dev_queue_push_xm...
2007 Apr 18
6
[Bridge] No UDP NFS over bridges in Linux 2.6.16.x?
Hi,
I have 2 servers which are connected to a gateway machine. The gateway and one server are running
Linux 2.6.16.2, while the third machine is running 2.6.16.5. The two ethernet ports on the gateway
which are connected to the servers are combined into a single ethernet bridge device.
Ever since 2.6.16, I have noticed that I can no longer cross-mount the two servers' /home
directories via
2007 Apr 18
4
[Bridge] [PATCH/RFC] Let {ip, arp}tables "see" bridged VLAN tagged {I, AR}P packets
...header_size = 18;
+#endif
+ memcpy(skb->nf_bridge->hh, skb->data - header_size, header_size);
}
struct bridge_skb_cb {
--- linux-2.6.0-test6/net/bridge/br_forward.c Sun Sep 28 02:50:15 2003
+++ linux-2.6.0-test6-new/net/bridge/br_forward.c Mon Oct 6 20:19:32 2003
@@ -35,8 +35,7 @@ int br_dev_queue_push_xmit(struct sk_buf
{
#ifdef CONFIG_BRIDGE_NETFILTER
/* ip_refrag calls ip_fragment, which doesn't copy the MAC header. */
- if (skb->nf_bridge)
- memcpy(skb->data - 16, skb->nf_bridge->hh, 16);
+ nf_bridge_maybe_copy_header(skb);
#endif
skb_push(skb, ETH_HLEN);
--- linux-2.6.0-...
2007 Apr 18
7
[Bridge] Passing vlan tagged packets through linux bridge
> Use an Intel pro/100 or pro/1000 driver..they are known to
> work with VLANs.
>
> I guess it's also possible that it's a problem in the
> bridging code, so try the latest kernel
> as well...
I compiled the latest 2.6.19 kernel and tested it with two
3COM 3c905c fast ethernet interfaces which work fine with
vlan 802.1q tagging, but when I have added the eth0 and eth1
2023 May 19
2
[Bridge] [PATCH net-next 1/5] skbuff: bridge: Add layer 2 miss indication
...Then copy it to skb->l2_miss at the very end where the cache line
containing this field is already written to:
diff --git a/net/bridge/br_forward.c b/net/bridge/br_forward.c
index 84d6dd5e5b1a..89f65564e338 100644
--- a/net/bridge/br_forward.c
+++ b/net/bridge/br_forward.c
@@ -50,6 +50,8 @@ int br_dev_queue_push_xmit(struct net *net, struct sock *sk, struct sk_buff *skb
br_switchdev_frame_set_offload_fwd_mark(skb);
+ skb->l2_miss = BR_INPUT_SKB_CB(skb)->miss;
+
dev_queue_xmit(skb);
return 0;
Also for locally received packets:
diff --git a/net/bridge/br_input.c b/net/b...
2007 Apr 18
3
[Bridge] My configuration in Bridge, 802.1Q VLAN, and hotmail login, Thanks to all
Hi All,
For my issue, first thanks to ALL, I have some idea of it.
Also Thank Peter for his kind remind, I would become one good guy in
this list.
Most mentioned MTU, but how I assure that the problem is just MTU, how I
debug it?
Here is my bridge configuration:
Internet
|
|
Gateway
|
| eth0
Ethernet Bridge
| eth1
|
H u b ( one normal hub
2007 Apr 18
2
[Bridge] large packet size doesn't work
Hi,
I have just configured a Linux box with kernel 2.6.16.7 and configured two
ethernet interfaces (with MTU 1500) in bridge mode. CONFIG_BRIDGE_NETFILTER
is enabled.
The problem is that ping -s 1500 192.168.0.2 doesn't work from 192.168.0.1
if the systems are separated by the bridge. Normal ping with smaller packet
size works ok.
What is wrong?
Best Regards
Fulvio Ricciardi
2009 Jan 26
2
system crashing while testing GPLPV drivers
I am rewriting the TX path in the GPLPV drivers and in its current form
I am readily able to crash the system (eg Dom0 and everything else
running) from DomU.
xen is 3.3.1, linux is at most a week behind the 3.3.1 release date.
My Windows DomU boots up, fails to get an IP address (yes, the TX path
is broken), and then a short time later the system has rebooted.
I don''t know exactly
2006 Jan 26
0
Profiling hotspots in my tc filter ruleset
...fdb_cleanup
1425 sky2.ko sky2_put_idx
1766 ipt_physdev.ko .text
2113 bridge.ko br_nf_pre_routing_finish
2133 bridge.ko br_nf_forward_ip
2314 bridge.ko br_handle_frame_finish
2454 bridge.ko br_dev_queue_push_xmit
2515 bridge.ko ip_sabotage_out
2718 sky2.ko sky2_rx_add
2858 sch_htb.ko htb_enqueue
3983 bridge.ko br_handle_frame
4796 bridge.ko br_nf_pre_routing
7047 bridge.ko br_nf_post_routing
81...
2006 Dec 08
2
Lots of "swapper: page allocation failure" and other memory related messages - 2.6.16-xen0
.../0x5c
Dec 8 12:19:26 server kernel: [netif_be_start_xmit+166/431] netif_be_start_xmit+0xa6/0x1af
Dec 8 12:19:26 server kernel: [dev_queue_xmit+520/679] dev_queue_xmit+0x208/0x2a7
Dec 8 12:19:26 server kernel: [br_forward_finish+0/65] br_forward_finish+0x0/0x41
Dec 8 12:19:26 server kernel: [br_dev_queue_push_xmit+216/223] br_dev_queue_push_xmit+0xd8/0xdf
Dec 8 12:19:26 server kernel: [br_forward_finish+61/65] br_forward_finish+0x3d/0x41
Dec 8 12:19:26 server kernel: [br_nf_forward_finish+199/204] br_nf_forward_finish+0xc7/0xcc
Dec 8 12:19:26 server kernel: [br_nf_forward_arp+274/285] br_nf_forward_arp...
2023 Apr 06
2
[Bridge] [PATCH net-next] net/bridge: add drop reasons for bridge forwarding
...son = SKB_DROP_REASON_BRIDGE_SWDEV_NOT_ALLOWED_EGRESS;
+ goto undeliverable;
+ }
+ if (br_skb_isolated(p, skb)) {
+ reason = SKB_DROP_REASON_BRIDGE_BOTH_PORT_ISOLATED;
+ goto undeliverable;
+ }
+ return true;
+
+undeliverable:
+ if (need_reason)
+ *need_reason = reason;
+ return false;
}
int br_dev_queue_push_xmit(struct net *net, struct sock *sk, struct sk_buff *skb)
@@ -144,6 +167,8 @@ static int deliver_clone(const struct net_bridge_port *prev,
void br_forward(const struct net_bridge_port *to,
struct sk_buff *skb, bool local_rcv, bool local_orig)
{
+ enum skb_drop_reason reason = SKB_DROP_REASON_NOT_...
2007 Apr 18
5
[Bridge] RFC: [PATCH] bridge vlan integration
...dev == p->dev ||
+ p->state != BR_STATE_FORWARDING)
+ return 0;
+
+#ifdef CONFIG_BRIDGE_VLAN
+ if (skb->vlan && br_vlan_filter(skb, &p->vlan))
+ return 0;
+#endif
+
+ return 1;
}
static inline unsigned packet_length(const struct sk_buff *skb)
@@ -47,6 +56,10 @@ int br_dev_queue_push_xmit(struct sk_buf
{
skb_push(skb, ETH_HLEN);
+ if (br_vlan_output_frame(&skb,
+ skb->dev->br_port->vlan.untagged))
+ return 0;
+
dev_queue_xmit(skb);
}
}
Index: wireless-dev/net/bridge/br_if.c
=================================================================...
2013 Apr 30
6
[Bridge] [PATCHv4 net-next 0/2] Add two new flags to bridge.
The following series adds 2 new flags to bridge. One flag allows
the user to control whether mac learning is performed on the interface
or not. By default mac learning is on.
The other flag allows the user to control whether unicast traffic
is flooded (send without an fdb) to a given unicast port. Default is
on.
Changes since v4:
- Implemented Stephen's suggestions.
Changes since v2:
-
2007 Apr 18
5
[Bridge] Any way of knowing a packet's been defragmented
Hello,
Due to a recent change in the bridge code, we now need a way of knowing if
a packet has been defragmented. The bridge code now checks on the packet
size and drops packets that are too big for the output port. Defragmented
packets will get refragmented later, so they shouldn't be dropped.
I've been reading the defragmentation code and can't find an easy way of
knowing if a