[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <7c7986329901730416b1505535ec3d36@kapio-technology.com>
Date: Thu, 08 Dec 2022 17:03:59 +0100
From: netdev@...io-technology.com
To: Vladimir Oltean <olteanv@...il.com>
Cc: Ido Schimmel <idosch@...sch.org>, davem@...emloft.net,
kuba@...nel.org, netdev@...r.kernel.org,
Andrew Lunn <andrew@...n.ch>,
Florian Fainelli <f.fainelli@...il.com>,
Eric Dumazet <edumazet@...gle.com>,
Paolo Abeni <pabeni@...hat.com>,
open list <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH net-next 3/3] net: dsa: mv88e6xxx: mac-auth/MAB
implementation
On 2022-12-08 14:35, Vladimir Oltean wrote:
>
> So it appears that frames which get a VTU miss will still also cause an
> ATU miss, and that's what you're seeing.
>
> The solution would be to acknowledge this fact, and not print any error
> message from the ATU IRQ handler for unknown FID/VID, which would just
> alarm the user.
Thanks for clearing that up!
At leisure, do you have an idea why it will encounter a VTU miss
violation at random?
I guess I must check if FID != FID_STANDALONE instead then...
Powered by blists - more mailing lists