From patchwork Sun Feb 27 23:52:54 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Sven Eckelmann X-Patchwork-Id: 18460 X-Patchwork-Delegate: sw@simonwunderlich.de Return-Path: X-Original-To: patchwork@open-mesh.org Delivered-To: patchwork@open-mesh.org Received: from diktynna.open-mesh.org (localhost [IPv6:::1]) by diktynna.open-mesh.org (Postfix) with ESMTP id 1210481CC6; Mon, 28 Feb 2022 00:53:13 +0100 (CET) Received: from dvalin.narfation.org (dvalin.narfation.org [IPv6:2a00:17d8:100::8b1]) by diktynna.open-mesh.org (Postfix) with ESMTPS id CDD498073E for ; Mon, 28 Feb 2022 00:53:09 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=narfation.org; s=20121; t=1646005989; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=68B4uCg0jgF4vh/DBlT6MDT+JLmCPlWhaTKMCs2/zwQ=; b=Dj9XYRn7Bm+cmDhtFG/dRe+xFE7sjEVX3nato4LHhQnt3fs8JKz3hQfNw7akmUpKkFPUit lNy2+wuamol+4iTpT7NVRUYZ7Y5lAi5L+RvWL7vBKwHGIDm11WHpn51y9bHzaQMqvGpRst k6Bftejm06BGnjeeDWPS+oiGrMp76Pg= From: Sven Eckelmann To: b.a.t.m.a.n@lists.open-mesh.org Cc: Sven Eckelmann Subject: [RFC PATCH 1/4] batman-adv: Request iflink once in batadv-on-batadv check Date: Mon, 28 Feb 2022 00:52:54 +0100 Message-Id: <20220227235257.1324636-1-sven@narfation.org> X-Mailer: git-send-email 2.30.2 MIME-Version: 1.0 ARC-Authentication-Results: i=1; diktynna.open-mesh.org; dkim=pass header.d=narfation.org header.s=20121 header.b=Dj9XYRn7; dmarc=pass (policy=none) header.from=narfation.org; spf=pass (diktynna.open-mesh.org: domain of sven@narfation.org designates 2a00:17d8:100::8b1 as permitted sender) smtp.mailfrom=sven@narfation.org ARC-Seal: i=1; s=20121; d=open-mesh.org; t=1646005989; a=rsa-sha256; cv=none; b=RdyGn8CaaZs/M5t5L4yrhz0Vy2RAP4I4w/sSe8dbSJJBPISZKiha3BZautVqSKxJynM5Rx IkDyxQSH0p1Ub4tFsuTN8WU0t9c/4lF6NOnm4f1fBEM2MtodzC96RbZ7Mgng2WuAMCsSCf DKoKJNXnwAHK+9bySE9v99WntRdIaEw= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=open-mesh.org; s=20121; t=1646005989; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding:dkim-signature; bh=68B4uCg0jgF4vh/DBlT6MDT+JLmCPlWhaTKMCs2/zwQ=; b=z/yhoy4vVMzhixzkpB4ILnaRq2Evdzhg5AzEo/sqZKZWrIvjaNUGDsb31ZUo1bXq/tNcFz OLNaoT9nXaR0YRbrG5xascmzPuTgygXPNvo9DSxRSGOdBwEkWDouLErrekoyI6G7mV+sGu lGi1C4NAteSXLHQoNZVrF+Gg5etgzKw= Message-ID-Hash: DHIUQTJZIM5IAO7UZ24VEVRDW54FPGVZ X-Message-ID-Hash: DHIUQTJZIM5IAO7UZ24VEVRDW54FPGVZ X-MailFrom: sven@narfation.org X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-b.a.t.m.a.n.lists.open-mesh.org-0; header-match-b.a.t.m.a.n.lists.open-mesh.org-1; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; suspicious-header X-Mailman-Version: 3.2.1 Precedence: list Reply-To: The list for a Better Approach To Mobile Ad-hoc Networking List-Id: The list for a Better Approach To Mobile Ad-hoc Networking Archived-At: List-Archive: List-Help: List-Post: List-Subscribe: List-Unsubscribe: There is no need to call dev_get_iflink multiple times for the same net_device in batadv_is_on_batman_iface. And since some of the .ndo_get_iflink callbacks are dynamic (for example via RCUs like in vxcan_get_iflink), it could easily happen that the returned values are not stable. The pre-checks before __dev_get_by_index are then of course bogus. Fixes: 3d48811b27f5 ("batman-adv: prevent using any virtual device created on batman-adv as hard-interface") Signed-off-by: Sven Eckelmann --- net/batman-adv/hard-interface.c | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/net/batman-adv/hard-interface.c b/net/batman-adv/hard-interface.c index 59d19097..774a26c5 100644 --- a/net/batman-adv/hard-interface.c +++ b/net/batman-adv/hard-interface.c @@ -149,22 +149,23 @@ static bool batadv_is_on_batman_iface(const struct net_device *net_dev) struct net *net = dev_net(net_dev); struct net_device *parent_dev; struct net *parent_net; + int iflink; bool ret; /* check if this is a batman-adv mesh interface */ if (batadv_softif_is_valid(net_dev)) return true; + iflink = dev_get_iflink(net_dev); + /* no more parents..stop recursion */ - if (dev_get_iflink(net_dev) == 0 || - dev_get_iflink(net_dev) == net_dev->ifindex) + if (iflink == 0 || iflink == net_dev->ifindex) return false; parent_net = batadv_getlink_net(net_dev, net); /* recurse over the parent device */ - parent_dev = __dev_get_by_index((struct net *)parent_net, - dev_get_iflink(net_dev)); + parent_dev = __dev_get_by_index((struct net *)parent_net, iflink); /* if we got a NULL parent_dev there is something broken.. */ if (!parent_dev) { pr_err("Cannot find parent device\n"); From patchwork Sun Feb 27 23:52:55 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Sven Eckelmann X-Patchwork-Id: 18461 X-Patchwork-Delegate: sw@simonwunderlich.de Return-Path: X-Original-To: patchwork@open-mesh.org Delivered-To: patchwork@open-mesh.org Received: from diktynna.open-mesh.org (localhost [IPv6:::1]) by diktynna.open-mesh.org (Postfix) with ESMTP id 7107A82FEE; Mon, 28 Feb 2022 00:53:17 +0100 (CET) Received: from dvalin.narfation.org (dvalin.narfation.org [IPv6:2a00:17d8:100::8b1]) by diktynna.open-mesh.org (Postfix) with ESMTPS id BFAA682816 for ; Mon, 28 Feb 2022 00:53:14 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=narfation.org; s=20121; t=1646005994; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=KBQwZptHVfZnzZbN2CasZMUlvQIKWSZ+4EEur87U1VY=; b=fR806fCMnV73rJKnkMDgYGjTISAy31cjV5u5U3NFTN5qpb8heqkcKq1WywRAffUo6BNCqy qQ77eOlsOjCQgmLBjvIFg7BpthjRhfDExxxuqqUgtaspoF927Og3y3dTR5SZnX2q6VTtNG 4CukQ0XE+0k7Zm0Hz5oheTJDi6G1Z34= From: Sven Eckelmann To: b.a.t.m.a.n@lists.open-mesh.org Cc: Sven Eckelmann Subject: [RFC PATCH 2/4] batman-adv: Request iflink once in batadv_get_real_netdevice Date: Mon, 28 Feb 2022 00:52:55 +0100 Message-Id: <20220227235257.1324636-2-sven@narfation.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20220227235257.1324636-1-sven@narfation.org> References: <20220227235257.1324636-1-sven@narfation.org> MIME-Version: 1.0 ARC-Authentication-Results: i=1; diktynna.open-mesh.org; dkim=pass header.d=narfation.org header.s=20121 header.b=fR806fCM; dmarc=pass (policy=none) header.from=narfation.org; spf=pass (diktynna.open-mesh.org: domain of sven@narfation.org designates 2a00:17d8:100::8b1 as permitted sender) smtp.mailfrom=sven@narfation.org ARC-Seal: i=1; s=20121; d=open-mesh.org; t=1646005994; a=rsa-sha256; cv=none; b=ezjCINvdwokzKiZ7eXbR1Qh9aivP9UNpgnRvtYC1FjBRcWeOsImNfddP+Q8k42YZOTI7dy bh35GBz8T9dN9wRjIkThsQd8GAFLYB26/m+U6rqYX7YqThM2xGIkb6Ia8kjwukv2AEQOpd PdtjqP0n1oK2IwHfy/a7pwgFZR32sLM= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=open-mesh.org; s=20121; t=1646005994; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=KBQwZptHVfZnzZbN2CasZMUlvQIKWSZ+4EEur87U1VY=; b=x02PKBaWiDOBV2kHR2jczwHM3Jx5q3SeFjo1B1/ky8m6pLOF/wescfsw0eXRiPPQkGSWNT ieZQl+g846ufu2mgj2wAi/V3Oe4k0eEJCmApHdub+Qywv6F05Ajl3v8T2LRnPoWtt05iiH UCH0sJUuvodeMT/NWuwWkLLTf0w8CCY= Message-ID-Hash: D4QFETVGBAKJMGMCSBFBLG5LQ5VAI7KR X-Message-ID-Hash: D4QFETVGBAKJMGMCSBFBLG5LQ5VAI7KR X-MailFrom: sven@narfation.org X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-b.a.t.m.a.n.lists.open-mesh.org-0; header-match-b.a.t.m.a.n.lists.open-mesh.org-1; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; suspicious-header X-Mailman-Version: 3.2.1 Precedence: list Reply-To: The list for a Better Approach To Mobile Ad-hoc Networking List-Id: The list for a Better Approach To Mobile Ad-hoc Networking Archived-At: List-Archive: List-Help: List-Post: List-Subscribe: List-Unsubscribe: There is no need to call dev_get_iflink multiple times for the same net_device in batadv_get_real_netdevice. And since some of the ndo_get_iflink callbacks are dynamic (for example via RCUs like in vxcan_get_iflink), it could easily happen that the returned values are not stable. The pre-checks before __dev_get_by_index are then of course bogus. Fixes: 2b45bb6c3aad ("batman-adv: additional checks for virtual interfaces on top of WiFi") Signed-off-by: Sven Eckelmann --- net/batman-adv/hard-interface.c | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/net/batman-adv/hard-interface.c b/net/batman-adv/hard-interface.c index 774a26c5..8ed128bb 100644 --- a/net/batman-adv/hard-interface.c +++ b/net/batman-adv/hard-interface.c @@ -215,14 +215,16 @@ static struct net_device *batadv_get_real_netdevice(struct net_device *netdev) struct net_device *real_netdev = NULL; struct net *real_net; struct net *net; - int ifindex; + int iflink; ASSERT_RTNL(); if (!netdev) return NULL; - if (netdev->ifindex == dev_get_iflink(netdev)) { + iflink = dev_get_iflink(netdev); + + if (netdev->ifindex == iflink) { dev_hold(netdev); return netdev; } @@ -232,9 +234,8 @@ static struct net_device *batadv_get_real_netdevice(struct net_device *netdev) goto out; net = dev_net(hard_iface->soft_iface); - ifindex = dev_get_iflink(netdev); real_net = batadv_getlink_net(netdev, net); - real_netdev = dev_get_by_index(real_net, ifindex); + real_netdev = dev_get_by_index(real_net, iflink); out: batadv_hardif_put(hard_iface); From patchwork Sun Feb 27 23:52:56 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Sven Eckelmann X-Patchwork-Id: 18462 X-Patchwork-Delegate: sw@simonwunderlich.de Return-Path: X-Original-To: patchwork@open-mesh.org Delivered-To: patchwork@open-mesh.org Received: from diktynna.open-mesh.org (localhost [IPv6:::1]) by diktynna.open-mesh.org (Postfix) with ESMTP id 92ECC842F2; Mon, 28 Feb 2022 00:53:22 +0100 (CET) Received: from dvalin.narfation.org (dvalin.narfation.org [213.160.73.56]) by diktynna.open-mesh.org (Postfix) with ESMTPS id 1D8A884264 for ; Mon, 28 Feb 2022 00:53:20 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=narfation.org; s=20121; t=1646005999; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=t0uHVlbNGevCMIC6Crrz5bYotHCXjwjX+/1e+QLHV/k=; b=A5PIPpUs8t5w0QfcI0ziMPEeHNfhReYLK7qfolFrmT7jXHHwp2vq1xT26I6R7/ekyOBR0I O0EfKbXh5/fwY1W7acs6q+baVfXU3rJQr/h0hjx61HCrs4EdW+idkTjKChCtgFUW68KWaV R2NAxjOhdnWvhP69KY2oJuhuH8ZQD+c= From: Sven Eckelmann To: b.a.t.m.a.n@lists.open-mesh.org Subject: [RFC PATCH 3/4] batman-adv: Don't expect inter-netns unique iflink indices Date: Mon, 28 Feb 2022 00:52:56 +0100 Message-Id: <20220227235257.1324636-3-sven@narfation.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20220227235257.1324636-1-sven@narfation.org> References: <20220227235257.1324636-1-sven@narfation.org> MIME-Version: 1.0 ARC-Authentication-Results: i=1; diktynna.open-mesh.org; dkim=pass header.d=narfation.org header.s=20121 header.b=A5PIPpUs; dmarc=pass (policy=none) header.from=narfation.org; spf=pass (diktynna.open-mesh.org: domain of sven@narfation.org designates 213.160.73.56 as permitted sender) smtp.mailfrom=sven@narfation.org ARC-Seal: i=1; s=20121; d=open-mesh.org; t=1646006000; a=rsa-sha256; cv=none; b=bmN4MzCRm1Ig7vCT6BtMtb4ZWZ5iqo9ZLOG+6K+D00P0iRc1d16gYCacMmY+YoiAr/BYef OyDsNZRqSplV6GkErC3w6MB5ufpAUK4bZNqsMZxa8gpvy9aUtJIsrjUSH97bKidwJhft7v VFs9nycanH5Z0RhOYaZQYG9qSfhUiLg= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=open-mesh.org; s=20121; t=1646006000; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=t0uHVlbNGevCMIC6Crrz5bYotHCXjwjX+/1e+QLHV/k=; b=eyDUeS/PGRe1uhtqQaD18TDcXGXCY2dSTEeQbih0DtxG8T4FFgqJojBlmfzqq3Q8o3GNjM upGg28YQwTHu+158s4uy/TS/tXRGJHgdfkvBwViPzGSrrU/fPXlg9fS3pA42dNjS2VWv/1 1kfRzpXiNSF41VXSRcYjL/wKnD3c7GI= Message-ID-Hash: HZMHGK6S7TOTFS7MTFWGZYIWLYC5VR2C X-Message-ID-Hash: HZMHGK6S7TOTFS7MTFWGZYIWLYC5VR2C X-MailFrom: sven@narfation.org X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-b.a.t.m.a.n.lists.open-mesh.org-0; header-match-b.a.t.m.a.n.lists.open-mesh.org-1; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; suspicious-header CC: Sabrina Dubroca X-Mailman-Version: 3.2.1 Precedence: list Reply-To: The list for a Better Approach To Mobile Ad-hoc Networking List-Id: The list for a Better Approach To Mobile Ad-hoc Networking Archived-At: List-Archive: List-Help: List-Post: List-Subscribe: List-Unsubscribe: The ifindex doesn't have to be unique for multiple network namespaces on the same machine. $ ip netns add test1 $ ip -net test1 link add dummy1 type dummy $ ip netns add test2 $ ip -net test2 link add dummy2 type dummy $ ip -net test1 link show dev dummy1 6: dummy1: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 96:81:55:1e:dd:85 brd ff:ff:ff:ff:ff:ff $ ip -net test2 link show dev dummy2 6: dummy2: mtu 1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 5a:3c:af:35:07:c3 brd ff:ff:ff:ff:ff:ff But the batman-adv code to walk through the various layers of virtual interfaces uses this assumption because dev_get_iflink handles it internally and doesn't return the actual netns of the iflink. And dev_get_iflink only documents the situation where ifindex == iflink for physical devices. But only checking for dev->netdev_ops->ndo_get_iflink is also not an option because ipoib_get_iflink implements it even when it sometimes returns an iflink != ifindex and sometimes iflink == ifindex. The caller must therefore make sure itself to check both netns' and iflink + ifindex for equality. Only when they are equal, an "physical" interface was detected which should stop the traversal. On the other hand, vxcan_get_iflink can also return 0 in case there was currently no valid peer. Fixes: 3d48811b27f5 ("batman-adv: prevent using any virtual device created on batman-adv as hard-interface") Fixes: 2b45bb6c3aad ("batman-adv: additional checks for virtual interfaces on top of WiFi") Reported-by: Sabrina Dubroca Signed-off-by: Sven Eckelmann --- net/batman-adv/hard-interface.c | 19 ++++++++++++++----- 1 file changed, 14 insertions(+), 5 deletions(-) diff --git a/net/batman-adv/hard-interface.c b/net/batman-adv/hard-interface.c index 8ed128bb..cdb6e542 100644 --- a/net/batman-adv/hard-interface.c +++ b/net/batman-adv/hard-interface.c @@ -157,13 +157,15 @@ static bool batadv_is_on_batman_iface(const struct net_device *net_dev) return true; iflink = dev_get_iflink(net_dev); - - /* no more parents..stop recursion */ - if (iflink == 0 || iflink == net_dev->ifindex) + if (iflink == 0) return false; parent_net = batadv_getlink_net(net_dev, net); + /* iflink to itself, most likely physical device */ + if (net == parent_net && iflink == net_dev->ifindex) + return false; + /* recurse over the parent device */ parent_dev = __dev_get_by_index((struct net *)parent_net, iflink); /* if we got a NULL parent_dev there is something broken.. */ @@ -223,8 +225,7 @@ static struct net_device *batadv_get_real_netdevice(struct net_device *netdev) return NULL; iflink = dev_get_iflink(netdev); - - if (netdev->ifindex == iflink) { + if (iflink == 0) { dev_hold(netdev); return netdev; } @@ -235,6 +236,14 @@ static struct net_device *batadv_get_real_netdevice(struct net_device *netdev) net = dev_net(hard_iface->soft_iface); real_net = batadv_getlink_net(netdev, net); + + /* iflink to itself, most likely physical device */ + if (net == real_net && netdev->ifindex == iflink) { + real_netdev = netdev; + dev_hold(real_netdev); + goto out; + } + real_netdev = dev_get_by_index(real_net, iflink); out: From patchwork Sun Feb 27 23:52:57 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Sven Eckelmann X-Patchwork-Id: 18463 X-Patchwork-Delegate: sw@simonwunderlich.de Return-Path: X-Original-To: patchwork@open-mesh.org Delivered-To: patchwork@open-mesh.org Received: from diktynna.open-mesh.org (localhost [IPv6:::1]) by diktynna.open-mesh.org (Postfix) with ESMTP id 6A9908280E; Mon, 28 Feb 2022 00:53:27 +0100 (CET) Received: from dvalin.narfation.org (dvalin.narfation.org [IPv6:2a00:17d8:100::8b1]) by diktynna.open-mesh.org (Postfix) with ESMTPS id 973DC842FD for ; Mon, 28 Feb 2022 00:53:24 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=narfation.org; s=20121; t=1646006004; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=Kw7GMUrARsKZBnQwrOjfkpxLMUfqWOVA0PPyp4upERw=; b=EnFiXToCJ1YRW+xT+zs7sJFvrTjP/mvlemonAK7yicepSQFsOJ6J3CoET5PJNwOCuWAwOw GVbxmH9IbScn3WzOKphkaTJoBZnA0Z9O4lYyhjGVKsMDeADtykcdnHoNqnIKRe5JCx7+Qh 7JJS1AKz56FXh4DBmsstKJV9QN4xzuY= From: Sven Eckelmann To: b.a.t.m.a.n@lists.open-mesh.org Subject: [RFC PATCH 4/4] batman-adv: Demote batadv-on-batadv skip error message Date: Mon, 28 Feb 2022 00:52:57 +0100 Message-Id: <20220227235257.1324636-4-sven@narfation.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20220227235257.1324636-1-sven@narfation.org> References: <20220227235257.1324636-1-sven@narfation.org> MIME-Version: 1.0 ARC-Authentication-Results: i=1; diktynna.open-mesh.org; dkim=pass header.d=narfation.org header.s=20121 header.b=EnFiXToC; dmarc=pass (policy=none) header.from=narfation.org; spf=pass (diktynna.open-mesh.org: domain of sven@narfation.org designates 2a00:17d8:100::8b1 as permitted sender) smtp.mailfrom=sven@narfation.org ARC-Seal: i=1; s=20121; d=open-mesh.org; t=1646006004; a=rsa-sha256; cv=none; b=HpnQbQ5HP6PSAs60539DLB1zJmC9Jq36WsqOH9ES39p9uIIPS2FkVp6+m+guqtY4Ma7Ht8 BZRaEhKI1lIiOBgg50xhNsr1IYYEJVgoKhSg1NRtddfxrUv2YihfebiP3RZNVV4tCqlAZn EegxEN9YM3mLbu4t4JaDfnhRv4agZy0= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=open-mesh.org; s=20121; t=1646006004; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=Kw7GMUrARsKZBnQwrOjfkpxLMUfqWOVA0PPyp4upERw=; b=Zg8T5Mq32tXNQzQ3rCu4jugKD/xcI17o8wGKcBLULs99HmDX1FpuNiddKplMcCpP5RzUr6 9A+oMvEnWbl6Oz49aLxy4lqREFAULEdXX4yrxPrdregE6emZzaof3MJn6la2O+p585Pi6g 37RYNO5mjOV8xt/cbUR9eSKFKvEFsCQ= Message-ID-Hash: COW6YVZMVRPRZFOTCZQIVMP73SGYECPO X-Message-ID-Hash: COW6YVZMVRPRZFOTCZQIVMP73SGYECPO X-MailFrom: sven@narfation.org X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-b.a.t.m.a.n.lists.open-mesh.org-0; header-match-b.a.t.m.a.n.lists.open-mesh.org-1; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; suspicious-header CC: =?utf-8?q?Leonardo_M=C3=B6rlein?= X-Mailman-Version: 3.2.1 Precedence: list Reply-To: The list for a Better Approach To Mobile Ad-hoc Networking List-Id: The list for a Better Approach To Mobile Ad-hoc Networking Archived-At: List-Archive: List-Help: List-Post: List-Subscribe: List-Unsubscribe: The error message "Cannot find parent device" was shown for users of macvtap (on batadv devices) whenever the macvtap was moved to a different netns. This happens because macvtap doesn't provide The situation for which this message is printed is actually not an error but just a warning that the optional sanity check was skipped. So demote the message from error to warning and adjust the text to better explain what happened. Reported-by: Leonardo Mörlein Signed-off-by: Sven Eckelmann --- net/batman-adv/hard-interface.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/net/batman-adv/hard-interface.c b/net/batman-adv/hard-interface.c index cdb6e542..83fb51b6 100644 --- a/net/batman-adv/hard-interface.c +++ b/net/batman-adv/hard-interface.c @@ -168,9 +168,9 @@ static bool batadv_is_on_batman_iface(const struct net_device *net_dev) /* recurse over the parent device */ parent_dev = __dev_get_by_index((struct net *)parent_net, iflink); - /* if we got a NULL parent_dev there is something broken.. */ if (!parent_dev) { - pr_err("Cannot find parent device\n"); + pr_warn("Cannot find parent device. Skipping batadv-on-batadv check for %s\n", + net_dev->name); return false; }