search for: stp_enabled

Displaying 14 results from an estimated 14 matches for "stp_enabled".

Did you mean: retp_enabled
2007 Aug 14
3
[Bridge] Re: BUG: when using 'brctl stp'
Bridge locking for /sys/class/net/br0/bridge/stp_enabled was wrong. Another bug in bridge utilities makes it such that this interface, meant it wasn't being used. The locking needs to be removed from set_stp_state(), the lock is already acquired down in br_stp_start()/br_stp_stop. Signed-off-by: Stephen Hemminger <shemminger@linux-foundation.or...
2007 Aug 09
1
[Bridge] [PATCH] Fix typo in net/bridge/br_stp_if.c
Fixes a typo in net/bridge/br_stp_if.c --- a/net/bridge/br_stp_if.c +++ b/net/bridge/br_stp_if.c @@ -132,7 +132,7 @@ static void br_stp_start(struct net_bridge *br) } else { br->stp_enabled = BR_KERNEL_STP; printk(KERN_INFO "%s: starting userspace STP failed, " - "staring kernel STP\n", br->dev->name); + "starting kernel STP\n", br->dev->name); /* To...
2009 Aug 13
4
[Bridge] [PATCH] net/bridge: Add 'hairpin' port forwarding mode
This patch adds a 'hairpin' (also called 'reflective relay') mode port configuration to the Linux Ethernet bridge kernel module. A bridge supporting hairpin forwarding mode can send frames back out through the port the frame was received on. Hairpin mode is required to support basic VEPA (Virtual Ethernet Port Aggregator) capabilities. You can find additional information on VEPA
2009 Aug 13
4
[Bridge] [PATCH] net/bridge: Add 'hairpin' port forwarding mode
This patch adds a 'hairpin' (also called 'reflective relay') mode port configuration to the Linux Ethernet bridge kernel module. A bridge supporting hairpin forwarding mode can send frames back out through the port the frame was received on. Hairpin mode is required to support basic VEPA (Virtual Ethernet Port Aggregator) capabilities. You can find additional information on VEPA
2009 Aug 13
4
[Bridge] [PATCH] net/bridge: Add 'hairpin' port forwarding mode
This patch adds a 'hairpin' (also called 'reflective relay') mode port configuration to the Linux Ethernet bridge kernel module. A bridge supporting hairpin forwarding mode can send frames back out through the port the frame was received on. Hairpin mode is required to support basic VEPA (Virtual Ethernet Port Aggregator) capabilities. You can find additional information on VEPA
2023 Jun 19
2
[Bridge] [PATCH net-next v2 2/3] bridge: Add a limit on learned FDB entries
...LEARNED_ENTRIES */ #ifdef CONFIG_BRIDGE_IGMP_SNOOPING nla_total_size(sizeof(u8)) + /* IFLA_BR_MCAST_ROUTER */ nla_total_size(sizeof(u8)) + /* IFLA_BR_MCAST_SNOOPING */ @@ -1620,6 +1628,7 @@ static int br_fill_info(struct sk_buff *skb, const struct net_device *brdev) u32 stp_enabled = br->stp_enabled; u16 priority = (br->bridge_id.prio[0] << 8) | br->bridge_id.prio[1]; u8 vlan_enabled = br_vlan_enabled(br->dev); + u32 fdb_cur_learned_entries = br_fdb_get_cur_learned_entries(br); struct br_boolopt_multi bm; u64 clockval; @@ -1656,7 +1665,9 @@ static...
2007 Apr 18
0
[Bridge] [PATCH] (4/11) bridge - ioctl cleanup and consolidation
...return -EINVAL; } @@ -181,7 +210,7 @@ rcu_read_unlock(); - if (copy_to_user((void *)arg0, &p, sizeof(p))) + if (copy_to_user((void *)args[1], &p, sizeof(p))) return -EFAULT; return 0; @@ -191,7 +220,7 @@ if (!capable(CAP_NET_ADMIN)) return -EPERM; - br->stp_enabled = arg0?1:0; + br->stp_enabled = args[1]?1:0; return 0; case BRCTL_SET_BRIDGE_PRIORITY: @@ -199,7 +228,7 @@ return -EPERM; spin_lock_bh(&br->lock); - br_stp_set_bridge_priority(br, arg0); + br_stp_set_bridge_priority(br, args[1]); spin_unlock_bh(&br->lock);...
2007 Apr 18
0
[Bridge] Bridging with STP seems to learn mac-address on wrong ports
...g port. This is tested with kernel 2.6.11.12 and 2.6.13.2, and both exhibit this problem. The following fix solved it for me on 2.6.11.12: In net/bridge/br_stp_bpdu.c, in function br_stp_handle_bpdu i changed br_fdb_insert(p->br, p, eth_hdr(skb)->h_source,0); to if (!br->stp_enabled || p->state == BR_STATE_LEARNING || p->state == BR_STATE_FORWARDING) br_fdb_insert(p->br, p, eth_hdr(skb)->h_source, 0); /B
2007 Apr 18
0
[Bridge] [PATCH] (4/6) bridge: prevent bad forwarding table updates
...frame(struct net_bridge_po if (!is_valid_ether_addr(eth_hdr(skb)->h_source)) goto err; - if (p->state == BR_STATE_LEARNING || - p->state == BR_STATE_FORWARDING) + if (p->state == BR_STATE_LEARNING) br_fdb_update(p->br, p, eth_hdr(skb)->h_source); if (p->br->stp_enabled && Index: bridge/net/bridge/br_stp_bpdu.c =================================================================== --- bridge.orig/net/bridge/br_stp_bpdu.c +++ bridge/net/bridge/br_stp_bpdu.c @@ -140,6 +140,9 @@ int br_stp_handle_bpdu(struct sk_buff *s struct net_bridge *br = p->br; unsig...
2007 Apr 18
0
[Bridge] Bridge code enhancement (link state detection) and bugfix. (patches included).
Adding an STP state seems like a bad idea. Aren't br->stp_enabled and (dev->flags & IFF_UP) sufficient to determine whether check_link() should reenable a port? > -----Original Message----- > From: bridge-bounces@lists.osdl.org > [mailto:bridge-bounces@lists.osdl.org] On Behalf Of Mark Ruijter > Sent: Tuesday, July 20, 2004 7:25 AM > To: S...
2023 Jun 19
4
[Bridge] [PATCH net-next v2 0/3, iproute2-next 0/1] bridge: Add a limit on learned FDB entries
Introduce a limit on the amount of learned FDB entries on a bridge, configured by netlink with a build time default on bridge creation in the kernel config. For backwards compatibility the kernel config default is disabling the limit (0). Without any limit a malicious actor may OOM a kernel by spamming packets with changing MAC addresses on their bridge port, so allow the bridge creator to limit
2009 Jun 15
0
[Bridge] [PATCH][RFC] bridge-utils: add basic VEPA support
..., i.topology_change_timer_value); __jiffies_to_tv(&info->gc_timer_value, i.gc_timer_value); - + info->vepa_mode = 0; + sprintf(info->uplink_port, "-"); return 0; } @@ -209,7 +240,13 @@ int br_get_bridge_info(const char *bridge, struct bridge_info *info) info->stp_enabled = fetch_int(path, "stp_state"); info->topology_change = fetch_int(path, "topology_change"); info->topology_change_detected = fetch_int(path, "topology_change_detected"); - + if (feature_supported(path, "vepa_mode")) { + info->vepa_mode = fetch_i...
2009 Jun 15
0
[Bridge] [PATCH][RFC] bridge-utils: add basic VEPA support
..., i.topology_change_timer_value); __jiffies_to_tv(&info->gc_timer_value, i.gc_timer_value); - + info->vepa_mode = 0; + sprintf(info->uplink_port, "-"); return 0; } @@ -209,7 +240,13 @@ int br_get_bridge_info(const char *bridge, struct bridge_info *info) info->stp_enabled = fetch_int(path, "stp_state"); info->topology_change = fetch_int(path, "topology_change"); info->topology_change_detected = fetch_int(path, "topology_change_detected"); - + if (feature_supported(path, "vepa_mode")) { + info->vepa_mode = fetch_i...
2009 Jun 15
0
[Bridge] [PATCH][RFC] bridge-utils: add basic VEPA support
..., i.topology_change_timer_value); __jiffies_to_tv(&info->gc_timer_value, i.gc_timer_value); - + info->vepa_mode = 0; + sprintf(info->uplink_port, "-"); return 0; } @@ -209,7 +240,13 @@ int br_get_bridge_info(const char *bridge, struct bridge_info *info) info->stp_enabled = fetch_int(path, "stp_state"); info->topology_change = fetch_int(path, "topology_change"); info->topology_change_detected = fetch_int(path, "topology_change_detected"); - + if (feature_supported(path, "vepa_mode")) { + info->vepa_mode = fetch_i...