batman-adv: upgrade package to latest release 2012.3.0
authorMarek Lindner <lindner_marek@yahoo.de>
Tue, 21 Aug 2012 00:59:11 +0000 (00:59 +0000)
committerMarek Lindner <lindner_marek@yahoo.de>
Tue, 21 Aug 2012 00:59:11 +0000 (00:59 +0000)
Signed-off-by: Marek Lindner <lindner_marek@yahoo.de>
SVN-Revision: 33213

net/batman-adv/Makefile
net/batman-adv/patches/0001-batman-adv-fix-skb-data-assignment.patch [deleted file]
net/batman-adv/patches/0002-batman-adv-only-drop-packets-of-known-wifi-clients.patch [deleted file]
net/batman-adv/patches/0003-batman-adv-fix-race-condition-in-TT-full-table-repla.patch [deleted file]
net/batman-adv/patches/0004-batman-adv-select-an-internet-gateway-if-none-was-ch.patch [deleted file]
net/batman-adv/patches/0005-batman-adv-check-incoming-packet-type-for-bla.patch [deleted file]

index 40e8a51ee5a43d2615345aee9b8b659be7ed5eef..2416c4221291ab19ddceed474f82effce37e495c 100644 (file)
@@ -10,11 +10,11 @@ include $(TOPDIR)/rules.mk
 
 PKG_NAME:=batman-adv
 
-PKG_VERSION:=2012.2.0
-BATCTL_VERSION:=2012.2.0
-PKG_RELEASE:=4
-PKG_MD5SUM:=68967ed1df709de18ab795722dde9341
-BATCTL_MD5SUM:=7abd284098c514d3f2858e8a956c495e
+PKG_VERSION:=2012.3.0
+BATCTL_VERSION:=2012.3.0
+PKG_RELEASE:=1
+PKG_MD5SUM:=9f2d0bb2792fe0db012203d502e2085c
+BATCTL_MD5SUM:=fe9e6a3994539037b48afc5e3d31628c
 
 PKG_SOURCE:=$(PKG_NAME)-$(PKG_VERSION).tar.gz
 PKG_SOURCE_URL:=http://downloads.open-mesh.org/batman/releases/batman-adv-$(PKG_VERSION)
diff --git a/net/batman-adv/patches/0001-batman-adv-fix-skb-data-assignment.patch b/net/batman-adv/patches/0001-batman-adv-fix-skb-data-assignment.patch
deleted file mode 100644 (file)
index e30f229..0000000
+++ /dev/null
@@ -1,35 +0,0 @@
-From c7d05ee2b60370392d9c7bb1b764fd36b5aec81b Mon Sep 17 00:00:00 2001
-From: Antonio Quartulli <ordex@autistici.org>
-Date: Thu, 14 Jun 2012 22:21:28 +0200
-Subject: [PATCH] batman-adv: fix skb->data assignment
-
-skb_linearize(skb) possibly rearranges the skb internal data and then changes
-the skb->data pointer value. For this reason any other pointer in the code that
-was assigned skb->data before invoking skb_linearise(skb) must be re-assigned.
-
-In the current tt_query message handling code this is not done and therefore, in
-case of skb linearization, the pointer used to handle the packet header ends up
-in pointing to poisoned memory. The packet is then dropped but the
-translation-table mechanism is corrupted.
-
-Signed-off-by: Antonio Quartulli <ordex@autistici.org>
----
- routing.c |    2 ++
- 1 files changed, 2 insertions(+), 0 deletions(-)
-
-diff --git a/routing.c b/routing.c
-index 840e2c6..015471d 100644
---- a/routing.c
-+++ b/routing.c
-@@ -617,6 +617,8 @@ int recv_tt_query(struct sk_buff *skb, struct hard_iface *recv_if)
-                        * changes */
-                       if (skb_linearize(skb) < 0)
-                               goto out;
-+                      /* skb_linearize() possibly changed skb->data */
-+                      tt_query = (struct tt_query_packet *)skb->data;
-                       tt_len = tt_query->tt_data * sizeof(struct tt_change);
--- 
-1.7.9.1
-
diff --git a/net/batman-adv/patches/0002-batman-adv-only-drop-packets-of-known-wifi-clients.patch b/net/batman-adv/patches/0002-batman-adv-only-drop-packets-of-known-wifi-clients.patch
deleted file mode 100644 (file)
index adb7958..0000000
+++ /dev/null
@@ -1,50 +0,0 @@
-From 7c6c6db94848497178cc246585b59fad4368c3e2 Mon Sep 17 00:00:00 2001
-From: Marek Lindner <lindner_marek@yahoo.de>
-Date: Wed, 20 Jun 2012 16:56:04 +0200
-Subject: [PATCH] batman-adv: only drop packets of known wifi clients
-
-If the source or destination mac address of an ethernet packet
-could not be found in the translation table the packet was
-dropped if AP isolation was turned on. This behavior would
-make it impossible to send broadcast packets over the mesh
-as the broadcast address will never enter the translation
-table.
-
-Signed-off-by: Marek Lindner <lindner_marek@yahoo.de>
----
- translation-table.c |    8 ++++----
- 1 files changed, 4 insertions(+), 4 deletions(-)
-
-diff --git a/translation-table.c b/translation-table.c
-index a66c2dc..660c40f 100644
---- a/translation-table.c
-+++ b/translation-table.c
-@@ -2031,10 +2031,10 @@ bool is_ap_isolated(struct bat_priv *bat_priv, uint8_t *src, uint8_t *dst)
- {
-       struct tt_local_entry *tt_local_entry = NULL;
-       struct tt_global_entry *tt_global_entry = NULL;
--      bool ret = true;
-+      bool ret = false;
-       if (!atomic_read(&bat_priv->ap_isolation))
--              return false;
-+              goto out;
-       tt_local_entry = tt_local_hash_find(bat_priv, dst);
-       if (!tt_local_entry)
-@@ -2044,10 +2044,10 @@ bool is_ap_isolated(struct bat_priv *bat_priv, uint8_t *src, uint8_t *dst)
-       if (!tt_global_entry)
-               goto out;
--      if (_is_ap_isolated(tt_local_entry, tt_global_entry))
-+      if (!_is_ap_isolated(tt_local_entry, tt_global_entry))
-               goto out;
--      ret = false;
-+      ret = true;
- out:
-       if (tt_global_entry)
--- 
-1.7.9.1
-
diff --git a/net/batman-adv/patches/0003-batman-adv-fix-race-condition-in-TT-full-table-repla.patch b/net/batman-adv/patches/0003-batman-adv-fix-race-condition-in-TT-full-table-repla.patch
deleted file mode 100644 (file)
index 170ce2f..0000000
+++ /dev/null
@@ -1,65 +0,0 @@
-From d1f13e24ec3ebdadc2bc08c9d4708197279096fa Mon Sep 17 00:00:00 2001
-From: Antonio Quartulli <ordex@autistici.org>
-Date: Wed, 20 Jun 2012 14:12:56 +0200
-Subject: [PATCH] batman-adv: fix race condition in TT full-table replacement
-
-bug introduced with cea194d90b11aff7fc289149e4c7f305fad3535a
-
-In the current TT code, when a TT_Response containing a full table is received
-from an originator, first the node purges all the clients for that originator in
-the global translation-table and then merges the newly received table.
-During the purging phase each client deletion is done by means of a call_rcu()
-invocation and at the end of this phase the global entry counter for that
-originator is set to 0. However the invoked rcu function decreases the global
-entry counter for that originator by one too and since the rcu invocation is
-likely to be postponed, the node will end up in first setting the counter to 0
-and then decreasing it one by one for each deleted client.
-
-This bug leads to having a wrong global entry counter for the related node, say
-X. Then when the node with the broken counter will answer to a TT_REQUEST on
-behalf of node X, it will create faulty TT_RESPONSE that will generate an
-unrecoverable situation on the node that asked for the full table recover.
-
-The non-recoverability is given by the fact that the node with the broken
-counter will keep answering on behalf of X because its knowledge about X's state
-(ttvn + tt_crc) is correct.
-
-To solve this problem the counter is not explicitly set to 0 anymore and the
-counter decrement is performed right before the invocation of call_rcu().
-
-Signed-off-by: Antonio Quartulli <ordex@autistici.org>
----
- translation-table.c |    4 ++--
- 1 files changed, 2 insertions(+), 2 deletions(-)
-
-diff --git a/translation-table.c b/translation-table.c
-index 660c40f..2ab83d7 100644
---- a/translation-table.c
-+++ b/translation-table.c
-@@ -141,13 +141,14 @@ static void tt_orig_list_entry_free_rcu(struct rcu_head *rcu)
-       struct tt_orig_list_entry *orig_entry;
-       orig_entry = container_of(rcu, struct tt_orig_list_entry, rcu);
--      atomic_dec(&orig_entry->orig_node->tt_size);
-       orig_node_free_ref(orig_entry->orig_node);
-       kfree(orig_entry);
- }
- static void tt_orig_list_entry_free_ref(struct tt_orig_list_entry *orig_entry)
- {
-+      /* to avoid race conditions, immediately decrease the tt counter */
-+      atomic_dec(&orig_entry->orig_node->tt_size);
-       call_rcu(&orig_entry->rcu, tt_orig_list_entry_free_rcu);
- }
-@@ -910,7 +911,6 @@ void tt_global_del_orig(struct bat_priv *bat_priv,
-               }
-               spin_unlock_bh(list_lock);
-       }
--      atomic_set(&orig_node->tt_size, 0);
-       orig_node->tt_initialised = false;
- }
--- 
-1.7.9.1
-
diff --git a/net/batman-adv/patches/0004-batman-adv-select-an-internet-gateway-if-none-was-ch.patch b/net/batman-adv/patches/0004-batman-adv-select-an-internet-gateway-if-none-was-ch.patch
deleted file mode 100644 (file)
index fae2ec4..0000000
+++ /dev/null
@@ -1,38 +0,0 @@
-From 0a29f3a348c68f375585e25153da0f0a061fd71d Mon Sep 17 00:00:00 2001
-From: Marek Lindner <lindner_marek@yahoo.de>
-Date: Sun, 22 Jul 2012 13:04:48 +0200
-Subject: [PATCH] batman-adv: select an internet gateway if none was chosen
-MIME-Version: 1.0
-Content-Type: text/plain; charset=UTF-8
-Content-Transfer-Encoding: 8bit
-
-This is a regression introduced by: 6a17ecc4603be7f065c38b288d038a0082bbf21d
-
-Reported-by: Nicolás Echániz <nicoechaniz@codigosur.org>
-Signed-off-by: Marek Lindner <lindner_marek@yahoo.de>
----
- gateway_client.c |    6 +++---
- 1 files changed, 3 insertions(+), 3 deletions(-)
-
-diff --git a/gateway_client.c b/gateway_client.c
-index 47f7186..dace001 100644
---- a/gateway_client.c
-+++ b/gateway_client.c
-@@ -197,11 +197,11 @@ void gw_election(struct bat_priv *bat_priv)
-       if (atomic_read(&bat_priv->gw_mode) != GW_MODE_CLIENT)
-               goto out;
--      if (!atomic_dec_not_zero(&bat_priv->gw_reselect))
--              goto out;
--
-       curr_gw = gw_get_selected_gw_node(bat_priv);
-+      if (!atomic_dec_not_zero(&bat_priv->gw_reselect) && curr_gw)
-+              goto out;
-+
-       next_gw = gw_get_best_gw_node(bat_priv);
-       if (curr_gw == next_gw)
--- 
-1.7.9.1
-
diff --git a/net/batman-adv/patches/0005-batman-adv-check-incoming-packet-type-for-bla.patch b/net/batman-adv/patches/0005-batman-adv-check-incoming-packet-type-for-bla.patch
deleted file mode 100644 (file)
index bc42dd1..0000000
+++ /dev/null
@@ -1,121 +0,0 @@
-From e32470167379db2ca7713108f1e917c531426eee Mon Sep 17 00:00:00 2001
-From: Simon Wunderlich <simon.wunderlich@s2003.tu-chemnitz.de>
-Date: Wed, 4 Jul 2012 20:38:19 +0200
-Subject: [PATCH] batman-adv: check incoming packet type for bla
-
-If the gateway functionality is used, some broadcast packets (DHCP
-requests) may be transmitted as unicast packets. As the bridge loop
-avoidance code now only considers the payload Ethernet destination,
-it may drop the DHCP request for clients which are claimed by other
-backbone gateways, because it falsely infers from the broadcast address
-that the right backbone gateway should havehandled the broadcast.
-
-Fix this by checking and delegating the batman-adv packet type used
-for transmission.
-
-Reported-by: Guido Iribarren <guidoiribarren@buenosaireslibre.org>
-Signed-off-by: Simon Wunderlich <siwu@hrz.tu-chemnitz.de>
----
- bridge_loop_avoidance.c |   15 +++++++++++----
- bridge_loop_avoidance.h |    5 +++--
- soft-interface.c        |    6 +++++-
- 3 files changed, 19 insertions(+), 7 deletions(-)
-
-diff --git a/bridge_loop_avoidance.c b/bridge_loop_avoidance.c
-index 8bf9751..c5863f4 100644
---- a/bridge_loop_avoidance.c
-+++ b/bridge_loop_avoidance.c
-@@ -1351,6 +1351,7 @@ void bla_free(struct bat_priv *bat_priv)
-  * @bat_priv: the bat priv with all the soft interface information
-  * @skb: the frame to be checked
-  * @vid: the VLAN ID of the frame
-+ * @is_bcast: the packet came in a broadcast packet type.
-  *
-  * bla_rx avoidance checks if:
-  *  * we have to race for a claim
-@@ -1361,7 +1362,8 @@ void bla_free(struct bat_priv *bat_priv)
-  * process the skb.
-  *
-  */
--int bla_rx(struct bat_priv *bat_priv, struct sk_buff *skb, short vid)
-+int bla_rx(struct bat_priv *bat_priv, struct sk_buff *skb, short vid,
-+         bool is_bcast)
- {
-       struct ethhdr *ethhdr;
-       struct claim search_claim, *claim = NULL;
-@@ -1380,7 +1382,7 @@ int bla_rx(struct bat_priv *bat_priv, struct sk_buff *skb, short vid)
-       if (unlikely(atomic_read(&bat_priv->bla_num_requests)))
-               /* don't allow broadcasts while requests are in flight */
--              if (is_multicast_ether_addr(ethhdr->h_dest))
-+              if (is_multicast_ether_addr(ethhdr->h_dest) && is_bcast)
-                       goto handled;
-       memcpy(search_claim.addr, ethhdr->h_source, ETH_ALEN);
-@@ -1406,8 +1408,13 @@ int bla_rx(struct bat_priv *bat_priv, struct sk_buff *skb, short vid)
-       }
-       /* if it is a broadcast ... */
--      if (is_multicast_ether_addr(ethhdr->h_dest)) {
--              /* ... drop it. the responsible gateway is in charge. */
-+      if (is_multicast_ether_addr(ethhdr->h_dest) && is_bcast) {
-+              /* ... drop it. the responsible gateway is in charge.
-+               *
-+               * We need to check is_bcast because with the gateway
-+               * feature, broadcasts (like DHCP requests) may be sent
-+               * using a unicast packet type.
-+               */
-               goto handled;
-       } else {
-               /* seems the client considers us as its best gateway.
-diff --git a/bridge_loop_avoidance.h b/bridge_loop_avoidance.h
-index e39f93a..dc5227b 100644
---- a/bridge_loop_avoidance.h
-+++ b/bridge_loop_avoidance.h
-@@ -23,7 +23,8 @@
- #define _NET_BATMAN_ADV_BLA_H_
- #ifdef CONFIG_BATMAN_ADV_BLA
--int bla_rx(struct bat_priv *bat_priv, struct sk_buff *skb, short vid);
-+int bla_rx(struct bat_priv *bat_priv, struct sk_buff *skb, short vid,
-+         bool is_bcast);
- int bla_tx(struct bat_priv *bat_priv, struct sk_buff *skb, short vid);
- int bla_is_backbone_gw(struct sk_buff *skb,
-                      struct orig_node *orig_node, int hdr_size);
-@@ -41,7 +42,7 @@ void bla_free(struct bat_priv *bat_priv);
- #else /* ifdef CONFIG_BATMAN_ADV_BLA */
- static inline int bla_rx(struct bat_priv *bat_priv, struct sk_buff *skb,
--                       short vid)
-+                       short vid, bool is_bcast)
- {
-       return 0;
- }
-diff --git a/soft-interface.c b/soft-interface.c
-index 6e2530b..a0ec0e4 100644
---- a/soft-interface.c
-+++ b/soft-interface.c
-@@ -256,7 +256,11 @@ void interface_rx(struct net_device *soft_iface,
-       struct bat_priv *bat_priv = netdev_priv(soft_iface);
-       struct ethhdr *ethhdr;
-       struct vlan_ethhdr *vhdr;
-+      struct batman_header *batadv_header = (struct batman_header *)skb->data;
-       short vid __maybe_unused = -1;
-+      bool is_bcast;
-+
-+      is_bcast = (batadv_header->packet_type == BAT_BCAST);
-       /* check if enough space is available for pulling, and pull */
-       if (!pskb_may_pull(skb, hdr_size))
-@@ -302,7 +306,7 @@ void interface_rx(struct net_device *soft_iface,
-       /* Let the bridge loop avoidance check the packet. If will
-        * not handle it, we can safely push it up.
-        */
--      if (bla_rx(bat_priv, skb, vid))
-+      if (bla_rx(bat_priv, skb, vid, is_bcast))
-               goto out;
-       netif_rx(skb);
--- 
-1.7.9.1
-