Removing duplicate code.
Signed-off-by: Linus Lüssing
---
Changes in RFC -> non-RFC:
* Added kerneldoc
* Added Signed-off-by
net/batman-adv/distributed-arp-table.c | 61 ++
1 file changed, 40 insertions(+), 21 deletions(-)
diff --git
In a typical mesh network, when a new client connects then it will
usually first try to grab an IPv4 address via DHCP. Afterwards in
public mesh networks a client will try to contact the internet over
the server.
While the IPv4 address of the DHCP-Server is usually well propagated
in the DHT, the
From: Simon Wunderlich
Date: Fri, 1 Jul 2016 15:08:52 +0200
> we are a bit late to submit our feature patches, but I hope we make it in
> time.
> Antonio is taking a pause in his upstream work, so I'll be submitting our
> batman-adv patches for now. It is my first
On Fri, 2016-07-01 at 15:08 +0200, Simon Wunderlich wrote:
> To make it easier to search through the code it is better to print static
> strings directly instead of using format strings printing constants.
It's also generally smaller object code and faster at runtime.
$ size
On Monday 13 June 2016 11:01:54 Sven Eckelmann wrote:
> On Monday 13 June 2016 10:06:55 Andreas Pape wrote:
> > > Btw. there seems to be an "a" missing in "enabled" of the Subject
> > > of the first patch :)
> >
> > Will be corrected as there's another version obviously necessary ...;-)
>
>
On Friday 10 June 2016 13:11:01 Andreas Pape wrote:
> If none of the backbone gateways in a bla setup has already knowledge of
> the mac address searched for in an incoming ARP request from the backbone
> an address resolution via the DHT of DAT is started. The gateway can send
> several ARP
On Friday 01 July 2016 15:49:43 Sven Eckelmann wrote:
> The pointer batadv_bla_claim::backbone_gw can be changed at any time.
> Therefore, access to it must be protected to ensure that two function
> accessing the same backbone_gw are actually accessing the same. This is
> especially important
On Friday 10 June 2016 13:10:59 Andreas Pape wrote:
> If dat is enabled it must be made sure that only the backbone gw which has
> claimed the remote destination for the ARP request answers the ARP request
> directly if the MAC address is known due to the local dat table. This
> prevents multiple
The pointer batadv_bla_claim::backbone_gw can be changed at any time.
Therefore, access to it must be protected to ensure that two function
accessing the same backbone_gw are actually accessing the same. This is
especially important when the crc_lock is used or when the backbone_gw of a
claim is
Hi Andreas,
as suggested by yourself and according to the discussion, please drop this
patch from the patchset on the next resend. It may be better to resend it
separately when the concerns are cleared.
Thanks!
Simon
On Friday 10 June 2016 13:11:00 Andreas Pape wrote:
> Speeding up dat
On Friday 10 June 2016 13:11:02 Andreas Pape wrote:
> Additional dropping of unicast packets received from another backbone gw of
> the same backbone network before being forwarded to the same backbone again
> is necessary. It was observed in a test setup that in rare cases these
> frames lead to
On Thursday 30 June 2016 20:11:33 Sven Eckelmann wrote:
> The pointer batadv_bla_claim::backbone_gw can be changed at any time.
> Therefore, access to it must be protected to ensure that two function
> accessing the same backbone_gw are actually accessing the same. This is
> especially important
From: Antonio Quartulli
The ogm_emit and ogm_schedule API calls were rather tight to the
B.A.T.M.A.N. IV logic and therefore rather difficult to use
with other algorithm implementations.
Remove such calls and move the surrounding logic into the
B.A.T.M.A.N. IV specific code.
From: Linus Lüssing
With this patch changes relevant to a node's own multicast flags are
printed to the 'mcast' log level.
Tested-by: Simon Wunderlich
Signed-off-by: Linus Lüssing
Signed-off-by: Marek Lindner
From: Linus Lüssing
With this patch we are finally able to support multicast optimizations
in bridged setups, too. So far, if a bridge was added on top of a
soft-interface (e.g. bat0) the batman-adv multicast optimizations
needed to be disabled to avoid packetloss.
From: Linus Lüssing
With this patch IGMP or MLD reports are always flooded. This is
necessary for the upcoming bridge integration to function without
multicast packet loss.
With the report handling so far bridges might miss interested multicast
listeners, leading to
From: Andrew Lunn
Unfragmented frames which traverse a node have their skb->priority set
by looking at the IP ToS byte, or the 802.1p header. However for
fragments this is not possible, only one of the fragments will contain
the headers. Instead, place the priority into the
From: Andrew Lunn
BATMAN will set the skb->priority based on the IP precedence or 802.1q
tag. However, if it needs to fragment the frame, it currently leaves
the fragment skb with the default priority and actually overwrites the
priority in the unfragmented frame. Fix this.
From: Marek Lindner
The ELP interval and throughput override interface settings are initialized
with default settings on every time an interface is added to a mesh.
This patch prevents this behavior by moving the configuration init to the
interface detection routine
From: Antonio Quartulli
the compiler can optimize functions within the same C file and therefore
there is no need to make it explicit.
Remove the useless inline attribute for __batadv_store_uint_attr()
Signed-off-by: Antonio Quartulli
Signed-off-by: Marek
From: Antonio Quartulli
To reduce the field pollution in our main batadv_priv data structure
we've already created some substructures so that we could group fields
in a convenient manner.
However gw_mode and gw_sel_class are still part of the main object.
More both fields to
From: Marek Lindner
Signed-off-by: Marek Lindner
Signed-off-by: Sven Eckelmann
Signed-off-by: Simon Wunderlich
---
net/batman-adv/originator.c | 5 -
net/batman-adv/types.h | 3 ---
From: Marek Lindner
Signed-off-by: Marek Lindner
Signed-off-by: Sven Eckelmann
Signed-off-by: Simon Wunderlich
---
net/batman-adv/bat_iv_ogm.c | 3 ++-
net/batman-adv/bat_v_elp.c | 3 ++-
From: Marek Lindner
Also update obsolete email address.
Signed-off-by: Marek Lindner
Acked-by: Antonio Quartulli
Signed-off-by: Sven Eckelmann
Signed-off-by: Simon Wunderlich
From: Marek Lindner
Signed-off-by: Marek Lindner
Acked-by: Antonio Quartulli
Signed-off-by: Sven Eckelmann
Signed-off-by: Simon Wunderlich
---
Signed-off-by: Simon Wunderlich
Signed-off-by: Sven Eckelmann
Signed-off-by: Marek Lindner
---
net/batman-adv/translation-table.c | 2 --
1 file changed, 2 deletions(-)
diff --git a/net/batman-adv/translation-table.c
From: Antonio Quartulli
To make it easier to search through the code it is better to print static
strings directly instead of using format strings printing constants.
This was addressed in a previous patch, but the Gateway table header
was not updated accordingly.
Signed-off-by: Simon Wunderlich
Signed-off-by: Sven Eckelmann
---
net/batman-adv/main.h | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/net/batman-adv/main.h b/net/batman-adv/main.h
index 76925266..c356d91 100644
---
,
Simon
The following changes since commit 99860208bc62d8ebd5c57495b84856506fe075bc:
sched: remove NET_XMIT_POLICED (2016-06-12 22:02:11 -0400)
are available in the git repository at:
git://git.open-mesh.org/linux-merge.git tags/batadv-next-for-davem-20160701
for you to fetch changes up
[]
> Hm, I'm wondering what kind of overhead implications this could
> have in larger mesh networks.
>
> Didn't TT support temporary entries? Could the gateway server
> inject them into its global translation table after parsing an
> incoming DHCP packet?
Right now we have the problem that
On Sat, Jun 11, 2016 at 10:27:53PM +0200, Sven Eckelmann wrote:
> The replies from gateway server to gateway client are usually sent via
> unicast packets. This only works when the destination address for the reply
> is already known to the translation table. But usually the gateway replies
> are
In a typical mesh network, when a new client connects then it will
usually first try to grab an IPv4 address via DHCP. Afterwards in
public mesh networks a client will try to contact the internet over
the server.
While the IPv4 address of the DHCP-Server is usually well propagated
in the DHT, the
Hi,
Just a little RFC patchset. Still some work to do, but works
as a proof-of-concept for now. With two VMs, I was able to see
the DAT Cache filling up with sane entries even when ARP was
disabled on the bat0 interfaces.
Will need to check in a larger setup though, whether it has
the desired
---
net/batman-adv/distributed-arp-table.c | 47 +++---
1 file changed, 26 insertions(+), 21 deletions(-)
diff --git a/net/batman-adv/distributed-arp-table.c
b/net/batman-adv/distributed-arp-table.c
index fa76465..fa36196 100644
---
34 matches
Mail list logo