1. 27 2月, 2018 1 次提交
  2. 22 12月, 2017 1 次提交
  3. 16 12月, 2017 3 次提交
  4. 01 12月, 2017 1 次提交
  5. 16 6月, 2017 1 次提交
    • J
      networking: introduce and use skb_put_data() · 59ae1d12
      Johannes Berg 提交于
      A common pattern with skb_put() is to just want to memcpy()
      some data into the new space, introduce skb_put_data() for
      this.
      
      An spatch similar to the one for skb_put_zero() converts many
      of the places using it:
      
          @@
          identifier p, p2;
          expression len, skb, data;
          type t, t2;
          @@
          (
          -p = skb_put(skb, len);
          +p = skb_put_data(skb, data, len);
          |
          -p = (t)skb_put(skb, len);
          +p = skb_put_data(skb, data, len);
          )
          (
          p2 = (t2)p;
          -memcpy(p2, data, len);
          |
          -memcpy(p, data, len);
          )
      
          @@
          type t, t2;
          identifier p, p2;
          expression skb, data;
          @@
          t *p;
          ...
          (
          -p = skb_put(skb, sizeof(t));
          +p = skb_put_data(skb, data, sizeof(t));
          |
          -p = (t *)skb_put(skb, sizeof(t));
          +p = skb_put_data(skb, data, sizeof(t));
          )
          (
          p2 = (t2)p;
          -memcpy(p2, data, sizeof(*p));
          |
          -memcpy(p, data, sizeof(*p));
          )
      
          @@
          expression skb, len, data;
          @@
          -memcpy(skb_put(skb, len), data, len);
          +skb_put_data(skb, data, len);
      
      (again, manually post-processed to retain some comments)
      Reviewed-by: NStephen Hemminger <stephen@networkplumber.org>
      Signed-off-by: NJohannes Berg <johannes.berg@intel.com>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      59ae1d12
  6. 05 3月, 2017 1 次提交
    • S
      batman-adv: Keep fragments equally sized · 1c2bcc76
      Sven Eckelmann 提交于
      The batman-adv fragmentation packets have the design problem that they
      cannot be refragmented and cannot handle padding by the underlying link.
      The latter often leads to problems when networks are incorrectly configured
      and don't use a common MTU.
      
      The sender could for example fragment a 1271 byte frame (plus external
      ethernet header (14) and batadv unicast header (10)) to fit in a 1280 bytes
      large MTU of the underlying link (max. 1294 byte frames). This would create
      a 1294 bytes large frame (fragment 2) and a 55 bytes large frame
      (fragment 1). The extra 54 bytes are the fragment header (20) added to each
      fragment and the external ethernet header (14) for the second fragment.
      
      Let us assume that the next hop is then not able to transport 1294 bytes to
      its next hop. The 1294 byte large frame will be dropped but the 55 bytes
      large fragment will still be forwarded to its destination.
      
      Or let us assume that the underlying hardware requires that each frame has
      a minimum size (e.g. 60 bytes). Then it will pad the 55 bytes frame to 60
      bytes. The receiver of the 60 bytes frame will no longer be able to
      correctly assemble the two frames together because it is not aware that 5
      bytes of the 60 bytes frame are padding and don't belong to the reassembled
      frame.
      
      This can partly be avoided by splitting frames more equally. In this
      example, the 675 and 674 bytes large fragment frames could both potentially
      reach its destination without being too large or too small.
      Reported-by: NMartin Weinelt <martin@darmstadt.freifunk.net>
      Fixes: ee75ed88 ("batman-adv: Fragment and send skbs larger than mtu")
      Signed-off-by: NSven Eckelmann <sven@narfation.org>
      Acked-by: NLinus Lüssing <linus.luessing@c0d3.blue>
      Signed-off-by: NSimon Wunderlich <sw@simonwunderlich.de>
      1c2bcc76
  7. 22 2月, 2017 2 次提交
    • L
      batman-adv: Fix transmission of final, 16th fragment · 51c6b429
      Linus Lüssing 提交于
      Trying to split and transmit a unicast packet in 16 parts will fail for
      the final fragment: After having sent the 15th one with a frag_packet.no
      index of 14, we will increase the the index to 15 - and return with an
      error code immediately, even though one more fragment is due for
      transmission and allowed.
      
      Fixing this issue by moving the check before incrementing the index.
      
      While at it, adding an unlikely(), because the check is actually more of
      an assertion.
      
      Fixes: ee75ed88 ("batman-adv: Fragment and send skbs larger than mtu")
      Signed-off-by: NLinus Lüssing <linus.luessing@c0d3.blue>
      Signed-off-by: NSven Eckelmann <sven@narfation.org>
      Signed-off-by: NSimon Wunderlich <sw@simonwunderlich.de>
      51c6b429
    • S
      batman-adv: Fix double free during fragment merge error · 248e23b5
      Sven Eckelmann 提交于
      The function batadv_frag_skb_buffer was supposed not to consume the skbuff
      on errors. This was followed in the helper function
      batadv_frag_insert_packet when the skb would potentially be inserted in the
      fragment queue. But it could happen that the next helper function
      batadv_frag_merge_packets would try to merge the fragments and fail. This
      results in a kfree_skb of all the enqueued fragments (including the just
      inserted one). batadv_recv_frag_packet would detect the error in
      batadv_frag_skb_buffer and try to free the skb again.
      
      The behavior of batadv_frag_skb_buffer (and its helper
      batadv_frag_insert_packet) must therefore be changed to always consume the
      skbuff to have a common behavior and avoid the double kfree_skb.
      
      Fixes: 610bfc6b ("batman-adv: Receive fragmented packets and merge")
      Signed-off-by: NSven Eckelmann <sven@narfation.org>
      Signed-off-by: NSimon Wunderlich <sw@simonwunderlich.de>
      248e23b5
  8. 26 1月, 2017 1 次提交
  9. 04 1月, 2017 1 次提交
  10. 30 10月, 2016 2 次提交
  11. 19 10月, 2016 2 次提交
  12. 04 7月, 2016 1 次提交
  13. 30 6月, 2016 2 次提交
  14. 04 5月, 2016 1 次提交
  15. 29 2月, 2016 1 次提交
    • A
      batman-adv: keep track of when unicast packets are sent · 95d39278
      Antonio Quartulli 提交于
      To enable ELP to send probing packets over wireless links
      only if needed, batman-adv must keep track of the last time
      it sent a unicast packet towards every neighbour.
      
      For this purpose a 2 main changes are introduced:
      1) a new member of the elp_neigh_node structure stores the
         last time a unicast packet was sent towards this neighbour;
      2) a wrapper function for sending unicast packets is
         implemented. This function will simply update the member
         describe din point 1) and then forward the packet to the
         real sending routine.
      
      Point 2) implies that any code-path leading to a unicast
      sending now has to use the new wrapper.
      Signed-off-by: NAntonio Quartulli <antonio@open-mesh.com>
      Signed-off-by: NMarek Lindner <mareklindner@neomailbox.ch>
      95d39278
  16. 23 2月, 2016 3 次提交
  17. 02 2月, 2016 3 次提交
  18. 16 12月, 2015 1 次提交
  19. 25 8月, 2015 2 次提交
  20. 07 6月, 2015 1 次提交
    • S
      batman-adv: Add required includes to all files · 1e2c2a4f
      Sven Eckelmann 提交于
      The header files could not be build indepdent from each other. This is
      happened because headers didn't include the files for things they've used.
      This was problematic because the success of a build depended on the
      knowledge about the right order of local includes.
      
      Also source files were not including everything they've used explicitly.
      Instead they required that transitive includes are always stable. This is
      problematic because some transitive includes are not obvious, depend on
      config settings and may not be stable in the future.
      
      The order for include blocks are:
      
       * primary headers (main.h and the *.h file of a *.c file)
       * global linux headers
       * required local headers
       * extra forward declarations for pointers in function/struct declarations
      
      The only exceptions are linux/bitops.h and linux/if_ether.h in packet.h.
      This header file is shared with userspace applications like batctl and must
      therefore build together with userspace applications. The header
      linux/bitops.h is not part of the uapi headers and linux/if_ether.h
      conflicts with the musl implementation of netinet/if_ether.h. The
      maintainers rejected the use of __KERNEL__ preprocessor checks and thus
      these two headers are only in main.h. All files using packet.h first have
      to include main.h to work correctly.
      Reported-by: NMarkus Pargmann <mpa@pengutronix.de>
      Signed-off-by: NSven Eckelmann <sven@narfation.org>
      Signed-off-by: NMarek Lindner <mareklindner@neomailbox.ch>
      1e2c2a4f
  21. 29 5月, 2015 3 次提交
  22. 08 1月, 2015 1 次提交
  23. 24 12月, 2014 2 次提交
    • S
      batman-adv: Unify fragment size calculation · 0402e444
      Sven Eckelmann 提交于
      The fragmentation code was replaced in 610bfc6b
      ("batman-adv: Receive fragmented packets and merge") by an implementation which
      can handle up to 16 fragments of a packet. The packet is prepared for the split
      in fragments by the function batadv_frag_send_packet and the actual split is
      done by batadv_frag_create.
      
      Both functions calculate the size of a fragment themself. But their calculation
      differs because batadv_frag_send_packet also subtracts ETH_HLEN. Therefore,
      the check in batadv_frag_send_packet "can a full fragment can be created?" may
      return true even when batadv_frag_create cannot create a full fragment.
      
      The function batadv_frag_create doesn't check the size of the skb before
      splitting it and therefore might try to create a larger fragment than the
      remaining buffer. This creates an integer underflow and an invalid len is given
      to skb_split.
      Signed-off-by: NSven Eckelmann <sven@narfation.org>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      0402e444
    • S
      batman-adv: Calculate extra tail size based on queued fragments · 5b6698b0
      Sven Eckelmann 提交于
      The fragmentation code was replaced in 610bfc6b
      ("batman-adv: Receive fragmented packets and merge"). The new code provided a
      mostly unused parameter skb for the merging function. It is used inside the
      function to calculate the additionally needed skb tailroom. But instead of
      increasing its own tailroom, it is only increasing the tailroom of the first
      queued skb. This is not correct in some situations because the first queued
      entry can be a different one than the parameter.
      
      An observed problem was:
      
      1. packet with size 104, total_size 1464, fragno 1 was received
         - packet is queued
      2. packet with size 1400, total_size 1464, fragno 0 was received
         - packet is queued at the end of the list
      3. enough data was received and can be given to the merge function
         (1464 == (1400 - 20) + (104 - 20))
         - merge functions gets 1400 byte large packet as skb argument
      4. merge function gets first entry in queue (104 byte)
         - stored as skb_out
      5. merge function calculates the required extra tail as total_size - skb->len
         - pskb_expand_head tail of skb_out with 64 bytes
      6. merge function tries to squeeze the extra 1380 bytes from the second queued
         skb (1400 byte aka skb parameter) in the 64 extra tail bytes of skb_out
      
      Instead calculate the extra required tail bytes for skb_out also using skb_out
      instead of using the parameter skb. The skb parameter is only used to get the
      total_size from the last received packet. This is also the total_size used to
      decide that all fragments were received.
      Reported-by: NPhilipp Psurek <philipp.psurek@gmail.com>
      Signed-off-by: NSven Eckelmann <sven@narfation.org>
      Acked-by: NMartin Hundebøll <martin@hundeboll.net>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      5b6698b0
  24. 17 8月, 2014 1 次提交
    • S
      batman-adv: Fix parameter order of hlist_add_behind · e050dbeb
      Sven Eckelmann 提交于
      1d023284 ("list: fix order of arguments for
      hlist_add_after(_rcu)") was incorrectly rebased on top of
      d9124268 ("batman-adv: Fix out-of-order
      fragmentation support"). The parameter order change of the rebased patch was
      not re-applied as expected. This causes a memory leak and can cause crashes
      when out-of-order packets are received. hlist_add_behind will try to access the
      uninitalized list pointers of frag_entry_new to find the previous/next entry
      and may modify/read random memory locations.
      Signed-off-by: NSven Eckelmann <sven@narfation.org>
      Cc: Andrew Morton <akpm@linux-foundation.org>
      Signed-off-by: NDavid S. Miller <davem@davemloft.net>
      e050dbeb
  25. 07 8月, 2014 1 次提交
    • K
      list: fix order of arguments for hlist_add_after(_rcu) · 1d023284
      Ken Helias 提交于
      All other add functions for lists have the new item as first argument
      and the position where it is added as second argument.  This was changed
      for no good reason in this function and makes using it unnecessary
      confusing.
      
      The name was changed to hlist_add_behind() to cause unconverted code to
      generate a compile error instead of using the wrong parameter order.
      
      [akpm@linux-foundation.org: coding-style fixes]
      Signed-off-by: NKen Helias <kenhelias@firemail.de>
      Cc: "Paul E. McKenney" <paulmck@linux.vnet.ibm.com>
      Acked-by: Jeff Kirsher <jeffrey.t.kirsher@intel.com>	[intel driver bits]
      Cc: Hugh Dickins <hughd@google.com>
      Cc: Christoph Hellwig <hch@infradead.org>
      Signed-off-by: NAndrew Morton <akpm@linux-foundation.org>
      Signed-off-by: NLinus Torvalds <torvalds@linux-foundation.org>
      1d023284
  26. 05 8月, 2014 1 次提交
    • S
      batman-adv: Fix out-of-order fragmentation support · d9124268
      Sven Eckelmann 提交于
      batadv_frag_insert_packet was unable to handle out-of-order packets because it
      dropped them directly. This is caused by the way the fragmentation lists is
      checked for the correct place to insert a fragmentation entry.
      
      The fragmentation code keeps the fragments in lists. The fragmentation entries
      are kept in descending order of sequence number. The list is traversed and each
      entry is compared with the new fragment. If the current entry has a smaller
      sequence number than the new fragment then the new one has to be inserted
      before the current entry. This ensures that the list is still in descending
      order.
      
      An out-of-order packet with a smaller sequence number than all entries in the
      list still has to be added to the end of the list. The used hlist has no
      information about the last entry in the list inside hlist_head and thus the
      last entry has to be calculated differently. Currently the code assumes that
      the iterator variable of hlist_for_each_entry can be used for this purpose
      after the hlist_for_each_entry finished. This is obviously wrong because the
      iterator variable is always NULL when the list was completely traversed.
      
      Instead the information about the last entry has to be stored in a different
      variable.
      
      This problem was introduced in 610bfc6b
      ("batman-adv: Receive fragmented packets and merge").
      Signed-off-by: NSven Eckelmann <sven@narfation.org>
      Signed-off-by: NMarek Lindner <mareklindner@neomailbox.ch>
      Signed-off-by: NAntonio Quartulli <antonio@meshcoding.com>
      d9124268