Re: [PATCH net-next] bridge: multicast to unicast

2017-01-09 Thread michael-dev

Am 09.01.2017 13:15, schrieb Johannes Berg:

That is bridge fdb entries (need to) expire so the bridge might
"forget" a still-connected station not sending but only consuming
broadcast traffic.


Ok, that I don't know. Somehow if you address a unicast packet there
the bridge has to make a decision - so it really should know?


If the bridge has not learned the unicast destination mac address on any 
port, it will flood the packet on all ports except the port it received 
the packet on.


Regards,
M. Braun


Re: [PATCH net-next] bridge: multicast to unicast

2017-01-09 Thread michael-dev

Am 09.01.2017 13:15, schrieb Johannes Berg:

That is bridge fdb entries (need to) expire so the bridge might
"forget" a still-connected station not sending but only consuming
broadcast traffic.


Ok, that I don't know. Somehow if you address a unicast packet there
the bridge has to make a decision - so it really should know?


If the bridge has not learned the unicast destination mac address on any 
port, it will flood the packet on all ports except the port it received 
the packet on.


Regards,
M. Braun


Re: [Projekt-wlan] Regression in 3735ba8db8e6ea22ad3ff524328926d8d780a884 with Freescale P1020

2013-04-18 Thread michael-dev

Hi,

thanks for the quick reply.


Please review the patch http://patchwork.ozlabs.org/patch/237201/

I applied it, but it does not make any difference on my platform.

Regards,
 M. Braun

Am 17.04.2013 12:53, schrieb Liu Shengzhou-B36685:

Hi Braun,

It seems the duplicated tdi_reset caused the PHY_CLK_VALID bit 
unstable,

introduced by patch "EHCI: centralize controller initialization".
I submitted a patch to fix it.
Please review the patch http://patchwork.ozlabs.org/patch/237201/

Regards,
Shengzhou



-Original Message-
From: Michael Braun [mailto:michael-...@fami-braun.de]
Sent: Wednesday, April 17, 2013 6:08 PM
To: Liu Shengzhou-B36685
Cc: Alan Stern; projekt-w...@fem.tu-ilmenau.de; Greg Kroah-Hartman;
linux-...@vger.kernel.org; linux-kernel@vger.kernel.org
Subject: Regression in 3735ba8db8e6ea22ad3ff524328926d8d780a884 with
Freescale P1020

Hi,

I'm running OpenWRT Kernel 3.8.3 (which already has
f66dea709cd9309b2ee9f715697818001fb518de and
5ed338778f917a035f0f0a52327fc4f72e36f7a1 applied) on a P1020WLAN 
(QorlQ,

PPC) device.
Before updating the kernel from 3.3.0, USB host support was working 
fine.

Now I get "fsl-ehci: USB PHY clock invalid" messages in dmesg and the
lsusb output is empty, so USB host support is not working. When I 
apply
the following patch, USB host support starts working again, so I 
guess

3735ba8db8e6ea22ad3ff524328926d8d780a884 is the cause.
Do you have an idea how to fix it more appropriately?

Thanks,
  M. Braun

--- a/drivers/usb/host/ehci-fsl.c   2013-04-15 21:13:52.924403077
+0200
+++ b/drivers/usb/host/ehci-fsl.c   2013-04-15 21:13:57.572410838
+0200
@@ -273,7 +273,6 @@ static int ehci_fsl_setup_phy(struct usb
 if (!spin_event_timeout(in_be32(non_ehci +
FSL_SOC_USB_CTRL) &
 PHY_CLK_VALID, 
FSL_USB_PHY_CLK_TIMEOUT,

0)) {
 printk(KERN_WARNING "fsl-ehci: USB PHY clock
invalid\n");
-   return -EINVAL;
 }
 }


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


Re: [Projekt-wlan] Regression in 3735ba8db8e6ea22ad3ff524328926d8d780a884 with Freescale P1020

2013-04-18 Thread michael-dev

Hi,

thanks for the quick reply.


Please review the patch http://patchwork.ozlabs.org/patch/237201/

I applied it, but it does not make any difference on my platform.

Regards,
 M. Braun

Am 17.04.2013 12:53, schrieb Liu Shengzhou-B36685:

Hi Braun,

It seems the duplicated tdi_reset caused the PHY_CLK_VALID bit 
unstable,

introduced by patch EHCI: centralize controller initialization.
I submitted a patch to fix it.
Please review the patch http://patchwork.ozlabs.org/patch/237201/

Regards,
Shengzhou



-Original Message-
From: Michael Braun [mailto:michael-...@fami-braun.de]
Sent: Wednesday, April 17, 2013 6:08 PM
To: Liu Shengzhou-B36685
Cc: Alan Stern; projekt-w...@fem.tu-ilmenau.de; Greg Kroah-Hartman;
linux-...@vger.kernel.org; linux-kernel@vger.kernel.org
Subject: Regression in 3735ba8db8e6ea22ad3ff524328926d8d780a884 with
Freescale P1020

Hi,

I'm running OpenWRT Kernel 3.8.3 (which already has
f66dea709cd9309b2ee9f715697818001fb518de and
5ed338778f917a035f0f0a52327fc4f72e36f7a1 applied) on a P1020WLAN 
(QorlQ,

PPC) device.
Before updating the kernel from 3.3.0, USB host support was working 
fine.

Now I get fsl-ehci: USB PHY clock invalid messages in dmesg and the
lsusb output is empty, so USB host support is not working. When I 
apply
the following patch, USB host support starts working again, so I 
guess

3735ba8db8e6ea22ad3ff524328926d8d780a884 is the cause.
Do you have an idea how to fix it more appropriately?

Thanks,
  M. Braun

--- a/drivers/usb/host/ehci-fsl.c   2013-04-15 21:13:52.924403077
+0200
+++ b/drivers/usb/host/ehci-fsl.c   2013-04-15 21:13:57.572410838
+0200
@@ -273,7 +273,6 @@ static int ehci_fsl_setup_phy(struct usb
 if (!spin_event_timeout(in_be32(non_ehci +
FSL_SOC_USB_CTRL) 
 PHY_CLK_VALID, 
FSL_USB_PHY_CLK_TIMEOUT,

0)) {
 printk(KERN_WARNING fsl-ehci: USB PHY clock
invalid\n);
-   return -EINVAL;
 }
 }


--
To unsubscribe from this list: send the line unsubscribe linux-kernel in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/


[PATCH] Notify userspace about bridge learning MAC on new port

2013-04-15 Thread michael-dev

Hi,

currently, the userspace is informed about the port the MAC is learned 
on a bridge and about the bridge removing the MAC from its forwarding 
table, but not when the MAC is learned on a different port. This is 
inconsistent and makes it difficult for applications to keep track of 
all MACs learned by a bridge on a subset of its ports.


Please find attached a patch that fixes this by sending an RTM_NEWNEIGH 
message when the forwarding destination port changes.


Regards,
 M. BraunNotify userspace about bridge learning MAC on new port

Currently, the userspace is informed about the port the MAC is learned on a
bridge and about the bridge removing the MAC from its forwarding table, but not
when the MAC is learned on a different port.
This is inconsistent and makes it difficult for applications to keep track
of all MACs learned by a bridge on a subset of its ports.

Signed-off-by: Michael Braun 

--- a/net/bridge/br_fdb.c   2013-04-15 11:21:51.638963668 +0200
+++ b/net/bridge/br_fdb.c   2013-04-15 11:23:55.941166319 +0200
@@ -408,6 +408,7 @@ static int fdb_insert(struct net_bridge
 {
struct hlist_head *head = >hash[br_mac_hash(addr, vid)];
struct net_bridge_fdb_entry *fdb;
+   struct net_bridge_port *origsrc;
 
if (!is_valid_ether_addr(addr))
return -EINVAL;
@@ -471,8 +472,12 @@ void br_fdb_update(struct net_bridge *br
source->dev->name);
} else {
/* fastpath: update of existing entry */
+   origsrc = fdb->dst;
fdb->dst = source;
fdb->updated = jiffies;
+   /* notify applications of modified slave device */
+   if (origsrc != source)
+   fdb_notify(br, fdb, RTM_NEWNEIGH);
}
} else {
spin_lock(>hash_lock);


[PATCH] Notify userspace about bridge learning MAC on new port

2013-04-15 Thread michael-dev

Hi,

currently, the userspace is informed about the port the MAC is learned 
on a bridge and about the bridge removing the MAC from its forwarding 
table, but not when the MAC is learned on a different port. This is 
inconsistent and makes it difficult for applications to keep track of 
all MACs learned by a bridge on a subset of its ports.


Please find attached a patch that fixes this by sending an RTM_NEWNEIGH 
message when the forwarding destination port changes.


Regards,
 M. BraunNotify userspace about bridge learning MAC on new port

Currently, the userspace is informed about the port the MAC is learned on a
bridge and about the bridge removing the MAC from its forwarding table, but not
when the MAC is learned on a different port.
This is inconsistent and makes it difficult for applications to keep track
of all MACs learned by a bridge on a subset of its ports.

Signed-off-by: Michael Braun michael-...@fami-braun.de

--- a/net/bridge/br_fdb.c   2013-04-15 11:21:51.638963668 +0200
+++ b/net/bridge/br_fdb.c   2013-04-15 11:23:55.941166319 +0200
@@ -408,6 +408,7 @@ static int fdb_insert(struct net_bridge
 {
struct hlist_head *head = br-hash[br_mac_hash(addr, vid)];
struct net_bridge_fdb_entry *fdb;
+   struct net_bridge_port *origsrc;
 
if (!is_valid_ether_addr(addr))
return -EINVAL;
@@ -471,8 +472,12 @@ void br_fdb_update(struct net_bridge *br
source-dev-name);
} else {
/* fastpath: update of existing entry */
+   origsrc = fdb-dst;
fdb-dst = source;
fdb-updated = jiffies;
+   /* notify applications of modified slave device */
+   if (origsrc != source)
+   fdb_notify(br, fdb, RTM_NEWNEIGH);
}
} else {
spin_lock(br-hash_lock);