Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp4633186ybl; Wed, 22 Jan 2020 01:40:55 -0800 (PST) X-Google-Smtp-Source: APXvYqwrwP9HQbWVa8lyL10SwDAIF6urNvzVqI5AlMHmeqhGStS5L6FgbTa3wusL4ppK4JIuNumd X-Received: by 2002:aca:758a:: with SMTP id q132mr6409171oic.162.1579686055433; Wed, 22 Jan 2020 01:40:55 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579686055; cv=none; d=google.com; s=arc-20160816; b=ZuQ4MKFRhCaQrVrJjkPOS++VphjGPVcPeJm1761qiyJcWJx84cJMW49JsGW/3cs1jn 53e/rBjcd1Z6UNXxq/TjJefAdEwQkFEqBMvhQ4TqtnfdVunY4nKMxYXTl35Gt3jI+Zlc O34hhYoN4pFCpNuuYQfDZHkJf7cXkoghD1igZvn9jdQal7axibjKXDrrJ5OTrT+toq1H tMLSLSxUmmqvIAcGg9ACbSnuXsmUCpJhmr0QP/M69AxUGdN7tONeQm4H2lixhVpOFSWx O/SVBDwLdi85dKubMLZuio/lBnTRv3FHvmYV4LcEBI+mGmlic2HJrpEZvuvXe+DWo8ML lOMQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=nlHDYQB6HdIpZOwtookR+lO1AkhMgpD2vveRlyPPEVY=; b=R1MJer4X7yK5RfUdaCBOwHHXeD+asmDjZua5PjNb54FVc7QymPnEO2g4o4J7j8JWyH rn3nLSmNCLOTTe55TnIa8y0mIoroHanyStjSuVEiKNcssaHT14t+CHJhvu+ubSju66wY NUMuz93ojXDE0GlUE0i8dkIOhRwExKbjluVimhOMrB0RihWBOlJIF39SR0Qh1E4v1kpF R9kJbLdLLlyFE3jibOOWfrV8kOQ+3iO8TFMzy6pD6TLmEP2rdHlI3SAVIfDAgtcNECvH JjjLzwFjOkj4pkpkKadfodprAEQh77rhiDd4zpJ4BfzqrQvJ31wAlp8w9B93B/4Wl8G1 xPhg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=labauBqJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id j9si23841475otn.294.2020.01.22.01.40.44; Wed, 22 Jan 2020 01:40:55 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=labauBqJ; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1733127AbgAVJiz (ORCPT + 99 others); Wed, 22 Jan 2020 04:38:55 -0500 Received: from mail.kernel.org ([198.145.29.99]:55918 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1733111AbgAVJit (ORCPT ); Wed, 22 Jan 2020 04:38:49 -0500 Received: from localhost (83-86-89-107.cable.dynamic.v4.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 839EC2467B; Wed, 22 Jan 2020 09:38:48 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1579685929; bh=VDbWkC6uBBEeg/HWkCoBcE5qjljz8RrZQ0zWHQnLLnE=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=labauBqJBY8iP350DZdxpD0GGwGZArQ9ppCc++eR1gH/Q/za0wrH4Tp1eS2Cb/414 d1hjngQsY03SAOxMn/LiKlz4Pcpg8S5d3b6ADEV3uIXf3FUyXa0suEy/N9NXIl67rF u59PIuhxiXURXpKlePG3OFfU64P1GuwZhH0FImeQ= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sven Eckelmann , Simon Wunderlich Subject: [PATCH 4.14 40/65] batman-adv: Fix DAT candidate selection on little endian systems Date: Wed, 22 Jan 2020 10:29:25 +0100 Message-Id: <20200122092756.698323689@linuxfoundation.org> X-Mailer: git-send-email 2.25.0 In-Reply-To: <20200122092750.976732974@linuxfoundation.org> References: <20200122092750.976732974@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sven Eckelmann commit 4cc4a1708903f404d2ca0dfde30e71e052c6cbc9 upstream. The distributed arp table is using a DHT to store and retrieve MAC address information for an IP address. This is done using unicast messages to selected peers. The potential peers are looked up using the IP address and the VID. While the IP address is always stored in big endian byte order, this is not the case of the VID. It can (depending on the host system) either be big endian or little endian. The host must therefore always convert it to big endian to ensure that all devices calculate the same peers for the same lookup data. Fixes: be1db4f6615b ("batman-adv: make the Distributed ARP Table vlan aware") Signed-off-by: Sven Eckelmann Signed-off-by: Simon Wunderlich Signed-off-by: Greg Kroah-Hartman --- net/batman-adv/distributed-arp-table.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) --- a/net/batman-adv/distributed-arp-table.c +++ b/net/batman-adv/distributed-arp-table.c @@ -243,6 +243,7 @@ static u32 batadv_hash_dat(const void *d u32 hash = 0; const struct batadv_dat_entry *dat = data; const unsigned char *key; + __be16 vid; u32 i; key = (const unsigned char *)&dat->ip; @@ -252,7 +253,8 @@ static u32 batadv_hash_dat(const void *d hash ^= (hash >> 6); } - key = (const unsigned char *)&dat->vid; + vid = htons(dat->vid); + key = (__force const unsigned char *)&vid; for (i = 0; i < sizeof(dat->vid); i++) { hash += key[i]; hash += (hash << 10);