Received: by 2002:ac0:a5b6:0:0:0:0:0 with SMTP id m51-v6csp2219502imm; Thu, 7 Jun 2018 07:15:26 -0700 (PDT) X-Google-Smtp-Source: ADUXVKIrWRkNgqUMfYwe2gmC0KisfowpH6Gk8W6bCSSe1IUvF2dsWv/mkp6wyL9SPyt01NHeSKeZ X-Received: by 2002:a17:902:aa8f:: with SMTP id d15-v6mr2167831plr.359.1528380926770; Thu, 07 Jun 2018 07:15:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1528380926; cv=none; d=google.com; s=arc-20160816; b=M6Z6zkXxF54PgIVX8oQI76NG+ucIF95YGjQuvy05gRYOe636VqZJ79SSNCa5FEkAoW L+1VuXru05qBIzSIe8QSiX36z9hSm1goO/sW+vqGuxznw5hKwUVZCrz5vxWHIM+AZEhv ibSFftMoxtARXAhmONUzTZMx81Lo8XqQnBuQS1IcBWqn5jObGILxJSKLn87MqxQJCFrD sk2Nb7Zd4V45h9jLoWJOLxL2NCOG0daGLpuAy31h45hajvI+j1YVSPS6SqB0BoqAFAnm EYploYf+JDF6g3ZJX5J9M1hTRsExdjsuWgu6kJ64EOCjyj7kg5JhPfT4z7+k3JS79IQj fhQg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:subject:message-id:date:cc:to :from:mime-version:content-transfer-encoding:content-disposition :arc-authentication-results; bh=SRBHEpQHIhWxHTD1md6CHcE9wg1vdiGczALYG9y4fq8=; b=ABuyvXbmZSpTlaBvlUfZ5LCvlRbuUCYGGqrDqimg43p3ya1OyCb3MSnxUjy5rncQz/ jGqgD2MpeMSSuGOqV6lt66dN/JhmU8esSwvXAMddBTXEw5DhyHlt6yMyHotlMkCpCF54 JY4K7asXU9WUy9ySjo7ZDBFiGp9NkyJxed1FsjsNHx5sWI76W8AZPuRAeuQZ0FSp/yY4 ZlQVJp1Zvp6N5qJfrsbUNTVAm441nd5hKfzV6G/eoB3OrtDbuyZOMFP2RFBYgacOw1KZ 3HNWRl/B5qDnF/aN1J7kLm5wY1Rdyn3J1ZuxbI1Dc0x6z8V4liASrY3OhLHrC/7cMEiA VLHQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id bi1-v6si25182986plb.126.2018.06.07.07.15.11; Thu, 07 Jun 2018 07:15:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933382AbeFGOOB (ORCPT + 99 others); Thu, 7 Jun 2018 10:14:01 -0400 Received: from shadbolt.e.decadent.org.uk ([88.96.1.126]:39516 "EHLO shadbolt.e.decadent.org.uk" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933156AbeFGOJi (ORCPT ); Thu, 7 Jun 2018 10:09:38 -0400 Received: from [148.252.241.226] (helo=deadeye) by shadbolt.decadent.org.uk with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.84_2) (envelope-from ) id 1fQvbJ-0005Zw-7K; Thu, 07 Jun 2018 15:09:17 +0100 Received: from ben by deadeye with local (Exim 4.91) (envelope-from ) id 1fQvbF-0003Ic-1j; Thu, 07 Jun 2018 15:09:13 +0100 Content-Type: text/plain; charset="UTF-8" Content-Disposition: inline Content-Transfer-Encoding: 8bit MIME-Version: 1.0 From: Ben Hutchings To: linux-kernel@vger.kernel.org, stable@vger.kernel.org CC: akpm@linux-foundation.org, "Simon Wunderlich" , "Sven Eckelmann" , "=?UTF-8?q?Linus=20L=C3=BCssing?=" Date: Thu, 07 Jun 2018 15:05:21 +0100 Message-ID: X-Mailer: LinuxStableQueue (scripts by bwh) Subject: [PATCH 3.16 394/410] batman-adv: fix multicast-via-unicast transmission with AP isolation In-Reply-To: X-SA-Exim-Connect-IP: 148.252.241.226 X-SA-Exim-Mail-From: ben@decadent.org.uk X-SA-Exim-Scanned: No (on shadbolt.decadent.org.uk); SAEximRunCond expanded to false Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 3.16.57-rc1 review patch. If anyone has any objections, please let me know. ------------------ From: Linus Lüssing commit f8fb3419ead44f9a3136995acd24e35da4525177 upstream. For multicast frames AP isolation is only supposed to be checked on the receiving nodes and never on the originating one. Furthermore, the isolation or wifi flag bits should only be intepreted as such for unicast and never multicast TT entries. By injecting flags to the multicast TT entry claimed by a single target node it was verified in tests that this multicast address becomes unreachable, leading to packet loss. Omitting the "src" parameter to the batadv_transtable_search() call successfully skipped the AP isolation check and made the target reachable again. Fixes: 1d8ab8d3c176 ("batman-adv: Modified forwarding behaviour for multicast packets") Signed-off-by: Linus Lüssing Signed-off-by: Sven Eckelmann Signed-off-by: Simon Wunderlich Signed-off-by: Ben Hutchings --- net/batman-adv/multicast.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/net/batman-adv/multicast.c +++ b/net/batman-adv/multicast.c @@ -398,8 +398,8 @@ static struct batadv_orig_node * batadv_mcast_forw_tt_node_get(struct batadv_priv *bat_priv, struct ethhdr *ethhdr) { - return batadv_transtable_search(bat_priv, ethhdr->h_source, - ethhdr->h_dest, BATADV_NO_FLAGS); + return batadv_transtable_search(bat_priv, NULL, ethhdr->h_dest, + BATADV_NO_FLAGS); } /**