1. 23 5月, 2017 1 次提交
  2. 26 3月, 2017 2 次提交
  3. 28 1月, 2017 1 次提交
  4. 26 1月, 2017 2 次提交
  5. 09 11月, 2016 2 次提交
    • L
      batman-adv: fix rare race conditions on interface removal · 9b4aec64
      Linus Lüssing 提交于
      In rare cases during shutdown the following general protection fault can
      happen:
      
        general protection fault: 0000 [#1] SMP
        Modules linked in: batman_adv(O-) [...]
        CPU: 3 PID: 1714 Comm: rmmod Tainted: G           O    4.6.0-rc6+ #1
        [...]
        Call Trace:
         [<ffffffffa0363294>] batadv_hardif_disable_interface+0x29a/0x3a6 [batman_adv]
         [<ffffffffa0373db4>] batadv_softif_destroy_netlink+0x4b/0xa4 [batman_adv]
         [<ffffffff813b52f3>] __rtnl_link_unregister+0x48/0x92
         [<ffffffff813b9240>] rtnl_link_unregister+0xc1/0xdb
         [<ffffffff8108547c>] ? bit_waitqueue+0x87/0x87
         [<ffffffffa03850d2>] batadv_exit+0x1a/0xf48 [batman_adv]
         [<ffffffff810c26f9>] SyS_delete_module+0x136/0x1b0
         [<ffffffff8144dc65>] entry_SYSCALL_64_fastpath+0x18/0xa8
         [<ffffffff8108aaca>] ? trace_hardirqs_off_caller+0x37/0xa6
        Code: 89 f7 e8 21 bd 0d e1 4d 85 e4 75 0e 31 f6 48 c7 c7 50 d7 3b a0 e8 50 16 f2 e0 49 8b 9c 24 28 01 00 00 48 85 db 0f 84 b2 00 00 00 <48> 8b 03 4d 85 ed 48 89 45 c8 74 09 4c 39 ab f8 00 00 00 75 1c
        RIP  [<ffffffffa0371852>] batadv_purge_outstanding_packets+0x1c8/0x291 [batman_adv]
         RSP <ffff88001da5fd78>
        ---[ end trace 803b9bdc6a4a952b ]---
        Kernel panic - not syncing: Fatal exception in interrupt
        Kernel Offset: disabled
        ---[ end Kernel panic - not syncing: Fatal exception in interrupt
      
      It does not happen often, but may potentially happen when frequently
      shutting down and reinitializing an interface. With some carefully
      placed msleep()s/mdelay()s it can be reproduced easily.
      
      The issue is, that on interface removal, any still running worker thread
      of a forwarding packet will race with the interface purging routine to
      free a forwarding packet. Temporarily giving up a spin-lock to be able
      to sleep in the purging routine is not safe.
      
      Furthermore, there is a potential general protection fault not just for
      the purging side shown above, but also on the worker side: Temporarily
      removing a forw_packet from the according forw_{bcast,bat}_list will make
      it impossible for the purging routine to catch and cancel it.
      
       # How this patch tries to fix it:
      
      With this patch we split the queue purging into three steps: Step 1),
      removing forward packets from the queue of an interface and by that
      claim it as our responsibility to free.
      
      Step 2), we are either lucky to cancel a pending worker before it starts
      to run. Or if it is already running, we wait and let it do its thing,
      except two things:
      
      Through the claiming in step 1) we prevent workers from a) re-arming
      themselves. And b) prevent workers from freeing packets which we still
      hold in the interface purging routine.
      
      Finally, step 3, we are sure that no forwarding packets are pending or
      even running anymore on the interface to remove. We can then safely free
      the claimed forwarding packets.
      Signed-off-by: NLinus Lüssing <linus.luessing@c0d3.blue>
      Signed-off-by: NSven Eckelmann <sven@narfation.org>
      Signed-off-by: NSimon Wunderlich <sw@simonwunderlich.de>
      9b4aec64
    • S
      batman-adv: Remove dev_queue_xmit return code exception · 7d72d174
      Sven Eckelmann 提交于
      No caller of batadv_send_skb_to_orig is expecting the results to be -1
      (-EPERM) anymore when the skbuff was not consumed. They will instead expect
      that the skbuff is always consumed. Having such return code filter is
      therefore not needed anymore.
      Signed-off-by: NSven Eckelmann <sven@narfation.org>
      Signed-off-by: NSimon Wunderlich <sw@simonwunderlich.de>
      7d72d174
  6. 30 10月, 2016 4 次提交
  7. 19 10月, 2016 1 次提交
  8. 09 8月, 2016 2 次提交
  9. 06 7月, 2016 1 次提交
  10. 04 7月, 2016 1 次提交
  11. 30 6月, 2016 3 次提交
  12. 13 6月, 2016 1 次提交
  13. 10 5月, 2016 1 次提交
    • S
      batman-adv: Check hard_iface refcnt before calling function · 27353446
      Sven Eckelmann 提交于
      The batadv_hardif_list list is checked in many situations and the items
      in this list are given to specialized functions to modify the routing
      behavior. At the moment each of these called functions has to check
      itself whether the received batadv_hard_iface has a refcount > 0 before
      it can increase the reference counter and use it in other objects.
      
      This can easily lead to problems because it is not easily visible where
      all callers of a function got the batadv_hard_iface object from and
      whether they already hold a valid reference.
      
      Checking the reference counter directly before calling a subfunction
      with a pointer from the batadv_hardif_list avoids this problem.
      Signed-off-by: NSven Eckelmann <sven@narfation.org>
      Signed-off-by: NMarek Lindner <mareklindner@neomailbox.ch>
      Signed-off-by: NAntonio Quartulli <a@unstable.cc>
      27353446
  14. 04 5月, 2016 1 次提交
  15. 24 4月, 2016 1 次提交
  16. 29 2月, 2016 1 次提交
    • A
      batman-adv: keep track of when unicast packets are sent · 95d39278
      Antonio Quartulli 提交于
      To enable ELP to send probing packets over wireless links
      only if needed, batman-adv must keep track of the last time
      it sent a unicast packet towards every neighbour.
      
      For this purpose a 2 main changes are introduced:
      1) a new member of the elp_neigh_node structure stores the
         last time a unicast packet was sent towards this neighbour;
      2) a wrapper function for sending unicast packets is
         implemented. This function will simply update the member
         describe din point 1) and then forward the packet to the
         real sending routine.
      
      Point 2) implies that any code-path leading to a unicast
      sending now has to use the new wrapper.
      Signed-off-by: NAntonio Quartulli <antonio@open-mesh.com>
      Signed-off-by: NMarek Lindner <mareklindner@neomailbox.ch>
      95d39278
  17. 23 2月, 2016 3 次提交
  18. 02 2月, 2016 4 次提交
  19. 09 1月, 2016 1 次提交
  20. 25 8月, 2015 1 次提交
  21. 15 8月, 2015 1 次提交
  22. 07 6月, 2015 1 次提交
    • S
      batman-adv: Add required includes to all files · 1e2c2a4f
      Sven Eckelmann 提交于
      The header files could not be build indepdent from each other. This is
      happened because headers didn't include the files for things they've used.
      This was problematic because the success of a build depended on the
      knowledge about the right order of local includes.
      
      Also source files were not including everything they've used explicitly.
      Instead they required that transitive includes are always stable. This is
      problematic because some transitive includes are not obvious, depend on
      config settings and may not be stable in the future.
      
      The order for include blocks are:
      
       * primary headers (main.h and the *.h file of a *.c file)
       * global linux headers
       * required local headers
       * extra forward declarations for pointers in function/struct declarations
      
      The only exceptions are linux/bitops.h and linux/if_ether.h in packet.h.
      This header file is shared with userspace applications like batctl and must
      therefore build together with userspace applications. The header
      linux/bitops.h is not part of the uapi headers and linux/if_ether.h
      conflicts with the musl implementation of netinet/if_ether.h. The
      maintainers rejected the use of __KERNEL__ preprocessor checks and thus
      these two headers are only in main.h. All files using packet.h first have
      to include main.h to work correctly.
      Reported-by: NMarkus Pargmann <mpa@pengutronix.de>
      Signed-off-by: NSven Eckelmann <sven@narfation.org>
      Signed-off-by: NMarek Lindner <mareklindner@neomailbox.ch>
      1e2c2a4f
  23. 29 5月, 2015 2 次提交
  24. 22 3月, 2014 2 次提交
    • L
      batman-adv: Send multicast packets to nodes with a WANT_ALL flag · 4c8755d6
      Linus Lüssing 提交于
      With this patch a node sends IPv4 multicast packets to nodes which
      have a BATADV_MCAST_WANT_ALL_IPV4 flag set and IPv6 multicast packets
      to nodes which have a BATADV_MCAST_WANT_ALL_IPV6 flag set, too.
      
      Why is this needed? There are scenarios involving bridges where
      multicast report snooping and multicast TT announcements are not
      sufficient, which would lead to packet loss for some nodes otherwise:
      
      MLDv1 and IGMPv1/IGMPv2 have a suppression mechanism
      for multicast listener reports. When we have an MLDv1/IGMPv1/IGMPv2
      querier behind a bridge then our snooping bridge is potentially not
      going to see any reports even though listeners exist because according
      to RFC4541 such reports are only forwarded to multicast routers:
      
      -----------------------------------------------------------
                  ---------------
      {Querier}---|Snoop. Switch|----{Listener}
                  ---------------
                             \           ^
                            -------
                            | br0 |  <  ???
                            -------
                                \
                           _-~---~_
                       _-~/        ~-_
                      ~   batman-adv  \-----{Sender}
                      \~_   cloud    ~/
                         -~~__-__-~_/
      
      I)  MLDv1 Query:  {Querier}  -> flooded
      II) MLDv1 Report: {Listener} -> {Querier}
      
      -> br0 cannot detect the {Listener}
      => Packets from {Sender} need to be forwarded to all
         detected listeners and MLDv1/IGMPv1/IGMPv2 queriers.
      
      -----------------------------------------------------------
      
      Note that we do not need to explicitly forward to MLDv2/IGMPv3 queriers,
      because these protocols have no report suppression: A bridge has no
      trouble detecting MLDv2/IGMPv3 listeners.
      
      Even though we do not support bridges yet we need to provide the
      according infrastructure already to not break compatibility later.
      Signed-off-by: NLinus Lüssing <linus.luessing@web.de>
      Signed-off-by: NMarek Lindner <mareklindner@neomailbox.ch>
      Signed-off-by: NAntonio Quartulli <antonio@meshcoding.com>
      4c8755d6
    • L
      batman-adv: Modified forwarding behaviour for multicast packets · 1d8ab8d3
      Linus Lüssing 提交于
      With this patch a multicast packet is not always simply flooded anymore,
      the behaviour for the following cases is changed to reduce
      unnecessary overhead:
      
      If all nodes within the horizon of a certain node have signalized
      multicast listener announcement capability then an IPv6 multicast packet
      with a destination of IPv6 link-local scope (excluding ff02::1) coming
      from the upstream of this node...
      
      * ...is dropped if there is no according multicast listener in the
        translation table,
      * ...is forwarded via unicast if there is a single node with interested
        multicast listeners
      * ...and otherwise still gets flooded.
      Signed-off-by: NLinus Lüssing <linus.luessing@web.de>
      Signed-off-by: NMarek Lindner <mareklindner@neomailbox.ch>
      Signed-off-by: NAntonio Quartulli <antonio@meshcoding.com>
      1d8ab8d3