]> Git Repo - linux.git/blame - net/batman-adv/routing.c
batman-adv: fix uninit-value in batadv_interface_tx()
[linux.git] / net / batman-adv / routing.c
CommitLineData
7db7d9f3 1// SPDX-License-Identifier: GPL-2.0
6b1aea8c 2/* Copyright (C) 2007-2018 B.A.T.M.A.N. contributors:
c6c8fea2
SE
3 *
4 * Marek Lindner, Simon Wunderlich
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of version 2 of the GNU General Public
8 * License as published by the Free Software Foundation.
9 *
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * General Public License for more details.
14 *
15 * You should have received a copy of the GNU General Public License
ebf38fb7 16 * along with this program; if not, see <http://www.gnu.org/licenses/>.
c6c8fea2
SE
17 */
18
c6c8fea2 19#include "routing.h"
1e2c2a4f
SE
20#include "main.h"
21
22#include <linux/atomic.h>
23#include <linux/byteorder/generic.h>
24#include <linux/compiler.h>
25#include <linux/errno.h>
26#include <linux/etherdevice.h>
27#include <linux/if_ether.h>
28#include <linux/jiffies.h>
a6ba0d34 29#include <linux/kref.h>
1e2c2a4f
SE
30#include <linux/netdevice.h>
31#include <linux/printk.h>
32#include <linux/rculist.h>
33#include <linux/rcupdate.h>
34#include <linux/skbuff.h>
35#include <linux/spinlock.h>
36#include <linux/stddef.h>
fec149f5 37#include <uapi/linux/batadv_packet.h>
1e2c2a4f
SE
38
39#include "bitarray.h"
23721387 40#include "bridge_loop_avoidance.h"
c384ea3e 41#include "distributed-arp-table.h"
610bfc6b 42#include "fragmentation.h"
1e2c2a4f
SE
43#include "hard-interface.h"
44#include "icmp_socket.h"
ba412080 45#include "log.h"
1e2c2a4f
SE
46#include "network-coding.h"
47#include "originator.h"
1e2c2a4f
SE
48#include "send.h"
49#include "soft-interface.h"
33a3bb4a 50#include "tp_meter.h"
1e2c2a4f 51#include "translation-table.h"
1f8dce49 52#include "tvlv.h"
c018ad3d 53
63b01037 54static int batadv_route_unicast_packet(struct sk_buff *skb,
56303d34 55 struct batadv_hard_iface *recv_if);
a7f6ee94 56
7351a482 57/**
7e9a8c2c 58 * _batadv_update_route() - set the router for this originator
7351a482
SW
59 * @bat_priv: the bat priv with all the soft interface information
60 * @orig_node: orig node which is to be configured
61 * @recv_if: the receive interface for which this route is set
62 * @neigh_node: neighbor which should be the next router
63 *
64 * This function does not perform any error checks
65 */
56303d34
SE
66static void _batadv_update_route(struct batadv_priv *bat_priv,
67 struct batadv_orig_node *orig_node,
7351a482 68 struct batadv_hard_iface *recv_if,
56303d34 69 struct batadv_neigh_node *neigh_node)
c6c8fea2 70{
7351a482 71 struct batadv_orig_ifinfo *orig_ifinfo;
56303d34 72 struct batadv_neigh_node *curr_router;
e1a5382f 73
7351a482
SW
74 orig_ifinfo = batadv_orig_ifinfo_get(orig_node, recv_if);
75 if (!orig_ifinfo)
76 return;
77
b5dcbad2
SE
78 spin_lock_bh(&orig_node->neigh_list_lock);
79 /* curr_router used earlier may not be the current orig_ifinfo->router
80 * anymore because it was dereferenced outside of the neigh_list_lock
81 * protected region. After the new best neighbor has replace the current
82 * best neighbor the reference counter needs to decrease. Consequently,
83 * the code needs to ensure the curr_router variable contains a pointer
84 * to the replaced best neighbor.
85 */
86 curr_router = rcu_dereference_protected(orig_ifinfo->router, true);
87
88 /* increase refcount of new best neighbor */
89 if (neigh_node)
90 kref_get(&neigh_node->refcount);
91
92 rcu_assign_pointer(orig_ifinfo->router, neigh_node);
93 spin_unlock_bh(&orig_node->neigh_list_lock);
94 batadv_orig_ifinfo_put(orig_ifinfo);
a8e7f4bc 95
c6c8fea2 96 /* route deleted */
825ffe1f 97 if (curr_router && !neigh_node) {
39c75a51
SE
98 batadv_dbg(BATADV_DBG_ROUTES, bat_priv,
99 "Deleting route towards: %pM\n", orig_node->orig);
95fb130d 100 batadv_tt_global_del_orig(bat_priv, orig_node, -1,
08c36d3e 101 "Deleted route towards originator");
c6c8fea2 102
e1a5382f 103 /* route added */
825ffe1f 104 } else if (!curr_router && neigh_node) {
39c75a51 105 batadv_dbg(BATADV_DBG_ROUTES, bat_priv,
1eda58bf
SE
106 "Adding route towards: %pM (via %pM)\n",
107 orig_node->orig, neigh_node->addr);
e1a5382f 108 /* route changed */
bb899b89 109 } else if (neigh_node && curr_router) {
39c75a51 110 batadv_dbg(BATADV_DBG_ROUTES, bat_priv,
1eda58bf
SE
111 "Changing route towards: %pM (now via %pM - was via %pM)\n",
112 orig_node->orig, neigh_node->addr,
113 curr_router->addr);
c6c8fea2
SE
114 }
115
e1a5382f
LL
116 /* decrease refcount of previous best neighbor */
117 if (curr_router)
25bb2509 118 batadv_neigh_node_put(curr_router);
c6c8fea2
SE
119}
120
7351a482 121/**
7e9a8c2c 122 * batadv_update_route() - set the router for this originator
7351a482
SW
123 * @bat_priv: the bat priv with all the soft interface information
124 * @orig_node: orig node which is to be configured
125 * @recv_if: the receive interface for which this route is set
126 * @neigh_node: neighbor which should be the next router
127 */
56303d34
SE
128void batadv_update_route(struct batadv_priv *bat_priv,
129 struct batadv_orig_node *orig_node,
7351a482 130 struct batadv_hard_iface *recv_if,
56303d34 131 struct batadv_neigh_node *neigh_node)
c6c8fea2 132{
56303d34 133 struct batadv_neigh_node *router = NULL;
c6c8fea2
SE
134
135 if (!orig_node)
e1a5382f
LL
136 goto out;
137
7351a482 138 router = batadv_orig_router_get(orig_node, recv_if);
c6c8fea2 139
e1a5382f 140 if (router != neigh_node)
7351a482 141 _batadv_update_route(bat_priv, orig_node, recv_if, neigh_node);
e1a5382f
LL
142
143out:
144 if (router)
25bb2509 145 batadv_neigh_node_put(router);
c6c8fea2
SE
146}
147
62fe710f 148/**
7e9a8c2c 149 * batadv_window_protected() - checks whether the host restarted and is in the
62fe710f 150 * protection time.
7afcbbef
SE
151 * @bat_priv: the bat priv with all the soft interface information
152 * @seq_num_diff: difference between the current/received sequence number and
153 * the last sequence number
81f02683 154 * @seq_old_max_diff: maximum age of sequence number not considered as restart
7afcbbef
SE
155 * @last_reset: jiffies timestamp of the last reset, will be updated when reset
156 * is detected
81f02683
SW
157 * @protection_started: is set to true if the protection window was started,
158 * doesn't change otherwise.
62fe710f
SE
159 *
160 * Return:
4b426b10
SE
161 * false if the packet is to be accepted.
162 * true if the packet is to be ignored.
c6c8fea2 163 */
4b426b10
SE
164bool batadv_window_protected(struct batadv_priv *bat_priv, s32 seq_num_diff,
165 s32 seq_old_max_diff, unsigned long *last_reset,
166 bool *protection_started)
c6c8fea2 167{
81f02683 168 if (seq_num_diff <= -seq_old_max_diff ||
42d0b044
SE
169 seq_num_diff >= BATADV_EXPECTED_SEQNO_RANGE) {
170 if (!batadv_has_timed_out(*last_reset,
171 BATADV_RESET_PROTECTION_MS))
4b426b10 172 return true;
8c7bf248
ML
173
174 *last_reset = jiffies;
81f02683
SW
175 if (protection_started)
176 *protection_started = true;
39c75a51 177 batadv_dbg(BATADV_DBG_BATMAN, bat_priv,
1eda58bf 178 "old packet received, start protection\n");
c6c8fea2 179 }
8c7bf248 180
4b426b10 181 return false;
c6c8fea2
SE
182}
183
ff15c27c
SE
184/**
185 * batadv_check_management_packet() - Check preconditions for management packets
186 * @skb: incoming packet buffer
187 * @hard_iface: incoming hard interface
188 * @header_len: minimal header length of packet type
189 *
190 * Return: true when management preconditions are met, false otherwise
191 */
30d3c511 192bool batadv_check_management_packet(struct sk_buff *skb,
56303d34 193 struct batadv_hard_iface *hard_iface,
30d3c511 194 int header_len)
c6c8fea2 195{
c6c8fea2
SE
196 struct ethhdr *ethhdr;
197
198 /* drop packet if it has not necessary minimum size */
c3e29312
ML
199 if (unlikely(!pskb_may_pull(skb, header_len)))
200 return false;
c6c8fea2 201
7ed4be95 202 ethhdr = eth_hdr(skb);
c6c8fea2
SE
203
204 /* packet with broadcast indication but unicast recipient */
205 if (!is_broadcast_ether_addr(ethhdr->h_dest))
c3e29312 206 return false;
c6c8fea2 207
92eef520
SE
208 /* packet with invalid sender address */
209 if (!is_valid_ether_addr(ethhdr->h_source))
c3e29312 210 return false;
c6c8fea2
SE
211
212 /* create a copy of the skb, if needed, to modify it. */
213 if (skb_cow(skb, 0) < 0)
c3e29312 214 return false;
c6c8fea2
SE
215
216 /* keep skb linear */
217 if (skb_linearize(skb) < 0)
c3e29312 218 return false;
c6c8fea2 219
c3e29312 220 return true;
c6c8fea2
SE
221}
222
da6b8c20 223/**
7e9a8c2c 224 * batadv_recv_my_icmp_packet() - receive an icmp packet locally
da6b8c20
SW
225 * @bat_priv: the bat priv with all the soft interface information
226 * @skb: icmp packet to process
227 *
62fe710f 228 * Return: NET_RX_SUCCESS if the packet has been consumed or NET_RX_DROP
da6b8c20
SW
229 * otherwise.
230 */
56303d34 231static int batadv_recv_my_icmp_packet(struct batadv_priv *bat_priv,
da6b8c20 232 struct sk_buff *skb)
c6c8fea2 233{
56303d34
SE
234 struct batadv_hard_iface *primary_if = NULL;
235 struct batadv_orig_node *orig_node = NULL;
da6b8c20
SW
236 struct batadv_icmp_header *icmph;
237 int res, ret = NET_RX_DROP;
c6c8fea2 238
da6b8c20 239 icmph = (struct batadv_icmp_header *)skb->data;
c6c8fea2 240
da6b8c20
SW
241 switch (icmph->msg_type) {
242 case BATADV_ECHO_REPLY:
243 case BATADV_DESTINATION_UNREACHABLE:
244 case BATADV_TTL_EXCEEDED:
245 /* receive the packet */
246 if (skb_linearize(skb) < 0)
247 break;
c6c8fea2 248
da6b8c20
SW
249 batadv_socket_receive_packet(icmph, skb->len);
250 break;
251 case BATADV_ECHO_REQUEST:
252 /* answer echo request (ping) */
253 primary_if = batadv_primary_if_get_selected(bat_priv);
254 if (!primary_if)
255 goto out;
256
257 /* get routing information */
258 orig_node = batadv_orig_hash_find(bat_priv, icmph->orig);
259 if (!orig_node)
260 goto out;
261
262 /* create a copy of the skb, if needed, to modify it. */
263 if (skb_cow(skb, ETH_HLEN) < 0)
264 goto out;
265
266 icmph = (struct batadv_icmp_header *)skb->data;
267
8fdd0153
AQ
268 ether_addr_copy(icmph->dst, icmph->orig);
269 ether_addr_copy(icmph->orig, primary_if->net_dev->dev_addr);
da6b8c20 270 icmph->msg_type = BATADV_ECHO_REPLY;
a40d9b07 271 icmph->ttl = BATADV_TTL;
da6b8c20
SW
272
273 res = batadv_send_skb_to_orig(skb, orig_node, NULL);
b91a2543
SE
274 if (res == NET_XMIT_SUCCESS)
275 ret = NET_RX_SUCCESS;
da6b8c20 276
b91a2543
SE
277 /* skb was consumed */
278 skb = NULL;
da6b8c20 279 break;
33a3bb4a
AQ
280 case BATADV_TP:
281 if (!pskb_may_pull(skb, sizeof(struct batadv_icmp_tp_packet)))
282 goto out;
283
284 batadv_tp_meter_recv(bat_priv, skb);
285 ret = NET_RX_SUCCESS;
b91a2543
SE
286 /* skb was consumed */
287 skb = NULL;
33a3bb4a 288 goto out;
da6b8c20
SW
289 default:
290 /* drop unknown type */
44524fcd 291 goto out;
da6b8c20 292 }
44524fcd 293out:
32ae9b22 294 if (primary_if)
82047ad7 295 batadv_hardif_put(primary_if);
44524fcd 296 if (orig_node)
5d967310 297 batadv_orig_node_put(orig_node);
b91a2543
SE
298
299 kfree_skb(skb);
300
c6c8fea2
SE
301 return ret;
302}
303
56303d34 304static int batadv_recv_icmp_ttl_exceeded(struct batadv_priv *bat_priv,
63b01037 305 struct sk_buff *skb)
c6c8fea2 306{
56303d34
SE
307 struct batadv_hard_iface *primary_if = NULL;
308 struct batadv_orig_node *orig_node = NULL;
96412690 309 struct batadv_icmp_packet *icmp_packet;
f50ca95a 310 int res, ret = NET_RX_DROP;
c6c8fea2 311
96412690 312 icmp_packet = (struct batadv_icmp_packet *)skb->data;
c6c8fea2
SE
313
314 /* send TTL exceeded if packet is an echo request (traceroute) */
27a417e6 315 if (icmp_packet->msg_type != BATADV_ECHO_REQUEST) {
86ceb360 316 pr_debug("Warning - can't forward icmp packet from %pM to %pM: ttl exceeded\n",
27a417e6 317 icmp_packet->orig, icmp_packet->dst);
44524fcd 318 goto out;
c6c8fea2
SE
319 }
320
e5d89254 321 primary_if = batadv_primary_if_get_selected(bat_priv);
32ae9b22 322 if (!primary_if)
44524fcd 323 goto out;
c6c8fea2
SE
324
325 /* get routing information */
27a417e6 326 orig_node = batadv_orig_hash_find(bat_priv, icmp_packet->orig);
44524fcd 327 if (!orig_node)
e1a5382f 328 goto out;
c6c8fea2 329
44524fcd 330 /* create a copy of the skb, if needed, to modify it. */
0d125074 331 if (skb_cow(skb, ETH_HLEN) < 0)
44524fcd 332 goto out;
c6c8fea2 333
96412690 334 icmp_packet = (struct batadv_icmp_packet *)skb->data;
c6c8fea2 335
8fdd0153
AQ
336 ether_addr_copy(icmp_packet->dst, icmp_packet->orig);
337 ether_addr_copy(icmp_packet->orig, primary_if->net_dev->dev_addr);
27a417e6
AQ
338 icmp_packet->msg_type = BATADV_TTL_EXCEEDED;
339 icmp_packet->ttl = BATADV_TTL;
44524fcd 340
f50ca95a 341 res = batadv_send_skb_to_orig(skb, orig_node, NULL);
b91a2543
SE
342 if (res == NET_RX_SUCCESS)
343 ret = NET_XMIT_SUCCESS;
344
345 /* skb was consumed */
346 skb = NULL;
c6c8fea2 347
44524fcd 348out:
32ae9b22 349 if (primary_if)
82047ad7 350 batadv_hardif_put(primary_if);
44524fcd 351 if (orig_node)
5d967310 352 batadv_orig_node_put(orig_node);
b91a2543
SE
353
354 kfree_skb(skb);
355
c6c8fea2
SE
356 return ret;
357}
358
ff15c27c
SE
359/**
360 * batadv_recv_icmp_packet() - Process incoming icmp packet
361 * @skb: incoming packet buffer
362 * @recv_if: incoming hard interface
363 *
364 * Return: NET_RX_SUCCESS on success or NET_RX_DROP in case of failure
365 */
56303d34
SE
366int batadv_recv_icmp_packet(struct sk_buff *skb,
367 struct batadv_hard_iface *recv_if)
c6c8fea2 368{
56303d34 369 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
da6b8c20
SW
370 struct batadv_icmp_header *icmph;
371 struct batadv_icmp_packet_rr *icmp_packet_rr;
c6c8fea2 372 struct ethhdr *ethhdr;
56303d34 373 struct batadv_orig_node *orig_node = NULL;
da6b8c20 374 int hdr_size = sizeof(struct batadv_icmp_header);
f50ca95a 375 int res, ret = NET_RX_DROP;
c6c8fea2 376
c6c8fea2
SE
377 /* drop packet if it has not necessary minimum size */
378 if (unlikely(!pskb_may_pull(skb, hdr_size)))
b91a2543 379 goto free_skb;
c6c8fea2 380
7ed4be95 381 ethhdr = eth_hdr(skb);
c6c8fea2 382
93bbaab4
SE
383 /* packet with unicast indication but non-unicast recipient */
384 if (!is_valid_ether_addr(ethhdr->h_dest))
b91a2543 385 goto free_skb;
c6c8fea2 386
9f75c8e1
SE
387 /* packet with broadcast/multicast sender address */
388 if (is_multicast_ether_addr(ethhdr->h_source))
b91a2543 389 goto free_skb;
c6c8fea2
SE
390
391 /* not for me */
fe8a93b9 392 if (!batadv_is_my_mac(bat_priv, ethhdr->h_dest))
b91a2543 393 goto free_skb;
c6c8fea2 394
da6b8c20 395 icmph = (struct batadv_icmp_header *)skb->data;
c6c8fea2
SE
396
397 /* add record route information if not full */
da6b8c20
SW
398 if ((icmph->msg_type == BATADV_ECHO_REPLY ||
399 icmph->msg_type == BATADV_ECHO_REQUEST) &&
825ffe1f 400 skb->len >= sizeof(struct batadv_icmp_packet_rr)) {
da6b8c20 401 if (skb_linearize(skb) < 0)
b91a2543 402 goto free_skb;
da6b8c20
SW
403
404 /* create a copy of the skb, if needed, to modify it. */
405 if (skb_cow(skb, ETH_HLEN) < 0)
b91a2543 406 goto free_skb;
da6b8c20 407
3b55e442 408 ethhdr = eth_hdr(skb);
da6b8c20
SW
409 icmph = (struct batadv_icmp_header *)skb->data;
410 icmp_packet_rr = (struct batadv_icmp_packet_rr *)icmph;
411 if (icmp_packet_rr->rr_cur >= BATADV_RR_LEN)
b91a2543 412 goto free_skb;
da6b8c20 413
8fdd0153
AQ
414 ether_addr_copy(icmp_packet_rr->rr[icmp_packet_rr->rr_cur],
415 ethhdr->h_dest);
da6b8c20 416 icmp_packet_rr->rr_cur++;
c6c8fea2
SE
417 }
418
419 /* packet for me */
da6b8c20
SW
420 if (batadv_is_my_mac(bat_priv, icmph->dst))
421 return batadv_recv_my_icmp_packet(bat_priv, skb);
c6c8fea2
SE
422
423 /* TTL exceeded */
a40d9b07 424 if (icmph->ttl < 2)
63b01037 425 return batadv_recv_icmp_ttl_exceeded(bat_priv, skb);
c6c8fea2 426
c6c8fea2 427 /* get routing information */
da6b8c20 428 orig_node = batadv_orig_hash_find(bat_priv, icmph->dst);
44524fcd 429 if (!orig_node)
b91a2543 430 goto free_skb;
c6c8fea2 431
44524fcd 432 /* create a copy of the skb, if needed, to modify it. */
0d125074 433 if (skb_cow(skb, ETH_HLEN) < 0)
b91a2543 434 goto put_orig_node;
c6c8fea2 435
da6b8c20 436 icmph = (struct batadv_icmp_header *)skb->data;
c6c8fea2 437
44524fcd 438 /* decrement ttl */
a40d9b07 439 icmph->ttl--;
44524fcd
ML
440
441 /* route it */
f50ca95a 442 res = batadv_send_skb_to_orig(skb, orig_node, recv_if);
b91a2543
SE
443 if (res == NET_XMIT_SUCCESS)
444 ret = NET_RX_SUCCESS;
c6c8fea2 445
b91a2543
SE
446 /* skb was consumed */
447 skb = NULL;
448
449put_orig_node:
44524fcd 450 if (orig_node)
5d967310 451 batadv_orig_node_put(orig_node);
b91a2543
SE
452free_skb:
453 kfree_skb(skb);
454
c6c8fea2
SE
455 return ret;
456}
457
f86ce0ad 458/**
7e9a8c2c 459 * batadv_check_unicast_packet() - Check for malformed unicast packets
6e0895c2 460 * @bat_priv: the bat priv with all the soft interface information
f86ce0ad
MH
461 * @skb: packet to check
462 * @hdr_size: size of header to pull
463 *
62fe710f
SE
464 * Check for short header and bad addresses in given packet.
465 *
466 * Return: negative value when check fails and 0 otherwise. The negative value
467 * depends on the reason: -ENODATA for bad header, -EBADR for broadcast
468 * destination or source, and -EREMOTE for non-local (other host) destination.
f86ce0ad 469 */
fe8a93b9
AQ
470static int batadv_check_unicast_packet(struct batadv_priv *bat_priv,
471 struct sk_buff *skb, int hdr_size)
ff51fd70
MH
472{
473 struct ethhdr *ethhdr;
474
475 /* drop packet if it has not necessary minimum size */
476 if (unlikely(!pskb_may_pull(skb, hdr_size)))
f86ce0ad 477 return -ENODATA;
ff51fd70 478
7ed4be95 479 ethhdr = eth_hdr(skb);
ff51fd70 480
93bbaab4
SE
481 /* packet with unicast indication but non-unicast recipient */
482 if (!is_valid_ether_addr(ethhdr->h_dest))
f86ce0ad 483 return -EBADR;
ff51fd70 484
9f75c8e1
SE
485 /* packet with broadcast/multicast sender address */
486 if (is_multicast_ether_addr(ethhdr->h_source))
f86ce0ad 487 return -EBADR;
ff51fd70
MH
488
489 /* not for me */
fe8a93b9 490 if (!batadv_is_my_mac(bat_priv, ethhdr->h_dest))
f86ce0ad 491 return -EREMOTE;
ff51fd70
MH
492
493 return 0;
494}
495
93652344 496/**
7e9a8c2c 497 * batadv_last_bonding_get() - Get last_bonding_candidate of orig_node
93652344
SE
498 * @orig_node: originator node whose last bonding candidate should be retrieved
499 *
500 * Return: last bonding candidate of router or NULL if not found
501 *
502 * The object is returned with refcounter increased by 1.
503 */
504static struct batadv_orig_ifinfo *
505batadv_last_bonding_get(struct batadv_orig_node *orig_node)
506{
507 struct batadv_orig_ifinfo *last_bonding_candidate;
508
509 spin_lock_bh(&orig_node->neigh_list_lock);
510 last_bonding_candidate = orig_node->last_bonding_candidate;
511
512 if (last_bonding_candidate)
513 kref_get(&last_bonding_candidate->refcount);
514 spin_unlock_bh(&orig_node->neigh_list_lock);
515
516 return last_bonding_candidate;
517}
518
15c2ed75 519/**
7e9a8c2c 520 * batadv_last_bonding_replace() - Replace last_bonding_candidate of orig_node
15c2ed75
SE
521 * @orig_node: originator node whose bonding candidates should be replaced
522 * @new_candidate: new bonding candidate or NULL
523 */
524static void
525batadv_last_bonding_replace(struct batadv_orig_node *orig_node,
526 struct batadv_orig_ifinfo *new_candidate)
527{
528 struct batadv_orig_ifinfo *old_candidate;
529
530 spin_lock_bh(&orig_node->neigh_list_lock);
531 old_candidate = orig_node->last_bonding_candidate;
532
533 if (new_candidate)
534 kref_get(&new_candidate->refcount);
535 orig_node->last_bonding_candidate = new_candidate;
536 spin_unlock_bh(&orig_node->neigh_list_lock);
537
538 if (old_candidate)
539 batadv_orig_ifinfo_put(old_candidate);
540}
541
f6c8b711 542/**
7e9a8c2c 543 * batadv_find_router() - find a suitable router for this originator
f6c8b711
SW
544 * @bat_priv: the bat priv with all the soft interface information
545 * @orig_node: the destination node
546 * @recv_if: pointer to interface this packet was received on
547 *
62fe710f 548 * Return: the router which should be used for this orig_node on
f6c8b711 549 * this interface, or NULL if not available.
9cfc7bd6 550 */
56303d34
SE
551struct batadv_neigh_node *
552batadv_find_router(struct batadv_priv *bat_priv,
553 struct batadv_orig_node *orig_node,
f3b3d901 554 struct batadv_hard_iface *recv_if)
c6c8fea2 555{
29824a55 556 struct batadv_algo_ops *bao = bat_priv->algo_ops;
f3b3d901
SW
557 struct batadv_neigh_node *first_candidate_router = NULL;
558 struct batadv_neigh_node *next_candidate_router = NULL;
559 struct batadv_neigh_node *router, *cand_router = NULL;
560 struct batadv_neigh_node *last_cand_router = NULL;
561 struct batadv_orig_ifinfo *cand, *first_candidate = NULL;
562 struct batadv_orig_ifinfo *next_candidate = NULL;
563 struct batadv_orig_ifinfo *last_candidate;
564 bool last_candidate_found = false;
c6c8fea2
SE
565
566 if (!orig_node)
567 return NULL;
568
7351a482 569 router = batadv_orig_router_get(orig_node, recv_if);
c6c8fea2 570
329887ad
SW
571 if (!router)
572 return router;
573
f3b3d901
SW
574 /* only consider bonding for recv_if == BATADV_IF_DEFAULT (first hop)
575 * and if activated.
576 */
329887ad 577 if (!(recv_if == BATADV_IF_DEFAULT && atomic_read(&bat_priv->bonding)))
f3b3d901
SW
578 return router;
579
580 /* bonding: loop through the list of possible routers found
581 * for the various outgoing interfaces and find a candidate after
582 * the last chosen bonding candidate (next_candidate). If no such
583 * router is found, use the first candidate found (the previously
584 * chosen bonding candidate might have been the last one in the list).
3f68785e 585 * If this can't be found either, return the previously chosen
f3b3d901
SW
586 * router - obviously there are no other candidates.
587 */
588 rcu_read_lock();
93652344 589 last_candidate = batadv_last_bonding_get(orig_node);
f3b3d901
SW
590 if (last_candidate)
591 last_cand_router = rcu_dereference(last_candidate->router);
592
593 hlist_for_each_entry_rcu(cand, &orig_node->ifinfo_list, list) {
594 /* acquire some structures and references ... */
a6ba0d34 595 if (!kref_get_unless_zero(&cand->refcount))
f3b3d901
SW
596 continue;
597
598 cand_router = rcu_dereference(cand->router);
599 if (!cand_router)
600 goto next;
601
77ae32e8 602 if (!kref_get_unless_zero(&cand_router->refcount)) {
f3b3d901
SW
603 cand_router = NULL;
604 goto next;
605 }
606
607 /* alternative candidate should be good enough to be
608 * considered
609 */
29824a55
AQ
610 if (!bao->neigh.is_similar_or_better(cand_router,
611 cand->if_outgoing, router,
612 recv_if))
f3b3d901
SW
613 goto next;
614
615 /* don't use the same router twice */
616 if (last_cand_router == cand_router)
617 goto next;
618
619 /* mark the first possible candidate */
620 if (!first_candidate) {
77ae32e8 621 kref_get(&cand_router->refcount);
a6ba0d34 622 kref_get(&cand->refcount);
f3b3d901
SW
623 first_candidate = cand;
624 first_candidate_router = cand_router;
625 }
626
627 /* check if the loop has already passed the previously selected
628 * candidate ... this function should select the next candidate
629 * AFTER the previously used bonding candidate.
630 */
631 if (!last_candidate || last_candidate_found) {
632 next_candidate = cand;
633 next_candidate_router = cand_router;
634 break;
635 }
636
637 if (last_candidate == cand)
638 last_candidate_found = true;
639next:
640 /* free references */
641 if (cand_router) {
25bb2509 642 batadv_neigh_node_put(cand_router);
f3b3d901
SW
643 cand_router = NULL;
644 }
35f94779 645 batadv_orig_ifinfo_put(cand);
f3b3d901
SW
646 }
647 rcu_read_unlock();
648
f3b3d901
SW
649 /* After finding candidates, handle the three cases:
650 * 1) there is a next candidate, use that
651 * 2) there is no next candidate, use the first of the list
652 * 3) there is no candidate at all, return the default router
653 */
654 if (next_candidate) {
25bb2509 655 batadv_neigh_node_put(router);
f3b3d901 656
15c2ed75 657 kref_get(&next_candidate_router->refcount);
f3b3d901 658 router = next_candidate_router;
15c2ed75 659 batadv_last_bonding_replace(orig_node, next_candidate);
f3b3d901 660 } else if (first_candidate) {
25bb2509 661 batadv_neigh_node_put(router);
f3b3d901 662
15c2ed75 663 kref_get(&first_candidate_router->refcount);
f3b3d901 664 router = first_candidate_router;
15c2ed75 665 batadv_last_bonding_replace(orig_node, first_candidate);
f3b3d901 666 } else {
15c2ed75
SE
667 batadv_last_bonding_replace(orig_node, NULL);
668 }
669
670 /* cleanup of candidates */
671 if (first_candidate) {
672 batadv_neigh_node_put(first_candidate_router);
673 batadv_orig_ifinfo_put(first_candidate);
674 }
675
676 if (next_candidate) {
677 batadv_neigh_node_put(next_candidate_router);
678 batadv_orig_ifinfo_put(next_candidate);
f3b3d901 679 }
f6c8b711 680
93652344
SE
681 if (last_candidate)
682 batadv_orig_ifinfo_put(last_candidate);
683
c6c8fea2
SE
684 return router;
685}
686
63b01037 687static int batadv_route_unicast_packet(struct sk_buff *skb,
56303d34 688 struct batadv_hard_iface *recv_if)
c6c8fea2 689{
56303d34
SE
690 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
691 struct batadv_orig_node *orig_node = NULL;
96412690 692 struct batadv_unicast_packet *unicast_packet;
7ed4be95 693 struct ethhdr *ethhdr = eth_hdr(skb);
c54f38c9 694 int res, hdr_len, ret = NET_RX_DROP;
63d443ef 695 unsigned int len;
c6c8fea2 696
96412690 697 unicast_packet = (struct batadv_unicast_packet *)skb->data;
c6c8fea2
SE
698
699 /* TTL exceeded */
a40d9b07 700 if (unicast_packet->ttl < 2) {
86ceb360
SE
701 pr_debug("Warning - can't forward unicast packet from %pM to %pM: ttl exceeded\n",
702 ethhdr->h_source, unicast_packet->dest);
b91a2543 703 goto free_skb;
c6c8fea2
SE
704 }
705
706 /* get routing information */
da641193 707 orig_node = batadv_orig_hash_find(bat_priv, unicast_packet->dest);
7aadf889 708
44524fcd 709 if (!orig_node)
b91a2543 710 goto free_skb;
c6c8fea2 711
c6c8fea2 712 /* create a copy of the skb, if needed, to modify it. */
0d125074 713 if (skb_cow(skb, ETH_HLEN) < 0)
b91a2543 714 goto put_orig_node;
c6c8fea2 715
c6c8fea2 716 /* decrement ttl */
f097e25d 717 unicast_packet = (struct batadv_unicast_packet *)skb->data;
a40d9b07 718 unicast_packet->ttl--;
c6c8fea2 719
a40d9b07 720 switch (unicast_packet->packet_type) {
c54f38c9
SW
721 case BATADV_UNICAST_4ADDR:
722 hdr_len = sizeof(struct batadv_unicast_4addr_packet);
723 break;
724 case BATADV_UNICAST:
725 hdr_len = sizeof(struct batadv_unicast_packet);
726 break;
727 default:
728 /* other packet types not supported - yet */
729 hdr_len = -1;
730 break;
731 }
732
733 if (hdr_len > 0)
734 batadv_skb_set_priority(skb, hdr_len);
735
63d443ef 736 len = skb->len;
e91ecfc6 737 res = batadv_send_skb_to_orig(skb, orig_node, recv_if);
95332477 738
e91ecfc6
MH
739 /* translate transmit result into receive result */
740 if (res == NET_XMIT_SUCCESS) {
0843f197 741 ret = NET_RX_SUCCESS;
e91ecfc6 742 /* skb was transmitted and consumed */
95332477
MH
743 batadv_inc_counter(bat_priv, BATADV_CNT_FORWARD);
744 batadv_add_counter(bat_priv, BATADV_CNT_FORWARD_BYTES,
63d443ef 745 len + ETH_HLEN);
95332477 746 }
c6c8fea2 747
0843f197
GF
748 /* skb was consumed */
749 skb = NULL;
750
b91a2543
SE
751put_orig_node:
752 batadv_orig_node_put(orig_node);
753free_skb:
754 kfree_skb(skb);
f50ca95a 755
44524fcd 756 return ret;
c6c8fea2
SE
757}
758
7c1fd91d 759/**
7e9a8c2c 760 * batadv_reroute_unicast_packet() - update the unicast header for re-routing
7c1fd91d 761 * @bat_priv: the bat priv with all the soft interface information
fc04fdb2 762 * @skb: unicast packet to process
7c1fd91d
AQ
763 * @unicast_packet: the unicast header to be updated
764 * @dst_addr: the payload destination
c018ad3d 765 * @vid: VLAN identifier
7c1fd91d
AQ
766 *
767 * Search the translation table for dst_addr and update the unicast header with
768 * the new corresponding information (originator address where the destination
769 * client currently is and its known TTVN)
770 *
62fe710f 771 * Return: true if the packet header has been updated, false otherwise
7c1fd91d
AQ
772 */
773static bool
fc04fdb2 774batadv_reroute_unicast_packet(struct batadv_priv *bat_priv, struct sk_buff *skb,
7c1fd91d 775 struct batadv_unicast_packet *unicast_packet,
6b5e971a 776 u8 *dst_addr, unsigned short vid)
7c1fd91d
AQ
777{
778 struct batadv_orig_node *orig_node = NULL;
779 struct batadv_hard_iface *primary_if = NULL;
780 bool ret = false;
6b5e971a 781 u8 *orig_addr, orig_ttvn;
7c1fd91d 782
c018ad3d 783 if (batadv_is_my_client(bat_priv, dst_addr, vid)) {
7c1fd91d
AQ
784 primary_if = batadv_primary_if_get_selected(bat_priv);
785 if (!primary_if)
786 goto out;
787 orig_addr = primary_if->net_dev->dev_addr;
6b5e971a 788 orig_ttvn = (u8)atomic_read(&bat_priv->tt.vn);
7c1fd91d 789 } else {
c018ad3d
AQ
790 orig_node = batadv_transtable_search(bat_priv, NULL, dst_addr,
791 vid);
7c1fd91d
AQ
792 if (!orig_node)
793 goto out;
794
795 if (batadv_compare_eth(orig_node->orig, unicast_packet->dest))
796 goto out;
797
798 orig_addr = orig_node->orig;
6b5e971a 799 orig_ttvn = (u8)atomic_read(&orig_node->last_ttvn);
7c1fd91d
AQ
800 }
801
802 /* update the packet header */
fc04fdb2 803 skb_postpull_rcsum(skb, unicast_packet, sizeof(*unicast_packet));
8fdd0153 804 ether_addr_copy(unicast_packet->dest, orig_addr);
7c1fd91d 805 unicast_packet->ttvn = orig_ttvn;
fc04fdb2 806 skb_postpush_rcsum(skb, unicast_packet, sizeof(*unicast_packet));
7c1fd91d
AQ
807
808 ret = true;
809out:
810 if (primary_if)
82047ad7 811 batadv_hardif_put(primary_if);
7c1fd91d 812 if (orig_node)
5d967310 813 batadv_orig_node_put(orig_node);
7c1fd91d
AQ
814
815 return ret;
816}
817
4b426b10
SE
818static bool batadv_check_unicast_ttvn(struct batadv_priv *bat_priv,
819 struct sk_buff *skb, int hdr_len)
820{
c018ad3d
AQ
821 struct batadv_unicast_packet *unicast_packet;
822 struct batadv_hard_iface *primary_if;
56303d34 823 struct batadv_orig_node *orig_node;
6b5e971a 824 u8 curr_ttvn, old_ttvn;
a73105b8 825 struct ethhdr *ethhdr;
c018ad3d 826 unsigned short vid;
3e34819e 827 int is_old_ttvn;
a73105b8 828
b8fcfa42 829 /* check if there is enough data before accessing it */
f1791425 830 if (!pskb_may_pull(skb, hdr_len + ETH_HLEN))
4b426b10 831 return false;
b8fcfa42
AQ
832
833 /* create a copy of the skb (in case of for re-routing) to modify it. */
834 if (skb_cow(skb, sizeof(*unicast_packet)) < 0)
4b426b10 835 return false;
a73105b8 836
96412690 837 unicast_packet = (struct batadv_unicast_packet *)skb->data;
c018ad3d 838 vid = batadv_get_vid(skb, hdr_len);
dd981ab0 839 ethhdr = (struct ethhdr *)(skb->data + hdr_len);
a73105b8 840
7c1fd91d
AQ
841 /* check if the destination client was served by this node and it is now
842 * roaming. In this case, it means that the node has got a ROAM_ADV
843 * message and that it knows the new destination in the mesh to re-route
844 * the packet to
845 */
c018ad3d 846 if (batadv_tt_local_client_is_roaming(bat_priv, ethhdr->h_dest, vid)) {
fc04fdb2 847 if (batadv_reroute_unicast_packet(bat_priv, skb, unicast_packet,
c018ad3d 848 ethhdr->h_dest, vid))
23c4ec10
AG
849 batadv_dbg_ratelimited(BATADV_DBG_TT,
850 bat_priv,
851 "Rerouting unicast packet to %pM (dst=%pM): Local Roaming\n",
852 unicast_packet->dest,
853 ethhdr->h_dest);
7c1fd91d
AQ
854 /* at this point the mesh destination should have been
855 * substituted with the originator address found in the global
856 * table. If not, let the packet go untouched anyway because
857 * there is nothing the node can do
858 */
4b426b10 859 return true;
7c1fd91d
AQ
860 }
861
862 /* retrieve the TTVN known by this node for the packet destination. This
863 * value is used later to check if the node which sent (or re-routed
864 * last time) the packet had an updated information or not
865 */
6b5e971a 866 curr_ttvn = (u8)atomic_read(&bat_priv->tt.vn);
fe8a93b9 867 if (!batadv_is_my_mac(bat_priv, unicast_packet->dest)) {
da641193
SE
868 orig_node = batadv_orig_hash_find(bat_priv,
869 unicast_packet->dest);
7c1fd91d
AQ
870 /* if it is not possible to find the orig_node representing the
871 * destination, the packet can immediately be dropped as it will
872 * not be possible to deliver it
873 */
a73105b8 874 if (!orig_node)
4b426b10 875 return false;
a73105b8 876
6b5e971a 877 curr_ttvn = (u8)atomic_read(&orig_node->last_ttvn);
5d967310 878 batadv_orig_node_put(orig_node);
a73105b8
AQ
879 }
880
7c1fd91d
AQ
881 /* check if the TTVN contained in the packet is fresher than what the
882 * node knows
883 */
3e34819e 884 is_old_ttvn = batadv_seq_before(unicast_packet->ttvn, curr_ttvn);
7c1fd91d 885 if (!is_old_ttvn)
4b426b10 886 return true;
a73105b8 887
7c1fd91d
AQ
888 old_ttvn = unicast_packet->ttvn;
889 /* the packet was forged based on outdated network information. Its
890 * destination can possibly be updated and forwarded towards the new
891 * target host
892 */
fc04fdb2 893 if (batadv_reroute_unicast_packet(bat_priv, skb, unicast_packet,
c018ad3d 894 ethhdr->h_dest, vid)) {
23c4ec10
AG
895 batadv_dbg_ratelimited(BATADV_DBG_TT, bat_priv,
896 "Rerouting unicast packet to %pM (dst=%pM): TTVN mismatch old_ttvn=%u new_ttvn=%u\n",
897 unicast_packet->dest, ethhdr->h_dest,
898 old_ttvn, curr_ttvn);
4b426b10 899 return true;
7c1fd91d 900 }
3275e7cc 901
7c1fd91d
AQ
902 /* the packet has not been re-routed: either the destination is
903 * currently served by this node or there is no destination at all and
904 * it is possible to drop the packet
905 */
c018ad3d 906 if (!batadv_is_my_client(bat_priv, ethhdr->h_dest, vid))
4b426b10 907 return false;
3275e7cc 908
7c1fd91d
AQ
909 /* update the header in order to let the packet be delivered to this
910 * node's soft interface
911 */
912 primary_if = batadv_primary_if_get_selected(bat_priv);
913 if (!primary_if)
4b426b10 914 return false;
a73105b8 915
fc04fdb2
SE
916 /* update the packet header */
917 skb_postpull_rcsum(skb, unicast_packet, sizeof(*unicast_packet));
8fdd0153 918 ether_addr_copy(unicast_packet->dest, primary_if->net_dev->dev_addr);
fc04fdb2
SE
919 unicast_packet->ttvn = curr_ttvn;
920 skb_postpush_rcsum(skb, unicast_packet, sizeof(*unicast_packet));
7c1fd91d 921
82047ad7 922 batadv_hardif_put(primary_if);
7c1fd91d 923
4b426b10 924 return true;
a73105b8
AQ
925}
926
a1f1ac5c 927/**
7e9a8c2c 928 * batadv_recv_unhandled_unicast_packet() - receive and process packets which
a1f1ac5c
SW
929 * are in the unicast number space but not yet known to the implementation
930 * @skb: unicast tvlv packet to process
931 * @recv_if: pointer to interface this packet was received on
932 *
62fe710f 933 * Return: NET_RX_SUCCESS if the packet has been consumed or NET_RX_DROP
a1f1ac5c
SW
934 * otherwise.
935 */
936int batadv_recv_unhandled_unicast_packet(struct sk_buff *skb,
937 struct batadv_hard_iface *recv_if)
938{
939 struct batadv_unicast_packet *unicast_packet;
940 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
941 int check, hdr_size = sizeof(*unicast_packet);
942
943 check = batadv_check_unicast_packet(bat_priv, skb, hdr_size);
944 if (check < 0)
b91a2543 945 goto free_skb;
a1f1ac5c
SW
946
947 /* we don't know about this type, drop it. */
948 unicast_packet = (struct batadv_unicast_packet *)skb->data;
949 if (batadv_is_my_mac(bat_priv, unicast_packet->dest))
b91a2543 950 goto free_skb;
a1f1ac5c
SW
951
952 return batadv_route_unicast_packet(skb, recv_if);
b91a2543
SE
953
954free_skb:
955 kfree_skb(skb);
956 return NET_RX_DROP;
a1f1ac5c
SW
957}
958
ff15c27c
SE
959/**
960 * batadv_recv_unicast_packet() - Process incoming unicast packet
961 * @skb: incoming packet buffer
962 * @recv_if: incoming hard interface
963 *
964 * Return: NET_RX_SUCCESS on success or NET_RX_DROP in case of failure
965 */
56303d34
SE
966int batadv_recv_unicast_packet(struct sk_buff *skb,
967 struct batadv_hard_iface *recv_if)
c6c8fea2 968{
56303d34 969 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
96412690 970 struct batadv_unicast_packet *unicast_packet;
4046b24a 971 struct batadv_unicast_4addr_packet *unicast_4addr_packet;
9e794b6b
AP
972 u8 *orig_addr, *orig_addr_gw;
973 struct batadv_orig_node *orig_node = NULL, *orig_node_gw = NULL;
612d2b4f 974 int check, hdr_size = sizeof(*unicast_packet);
437bb0e6 975 enum batadv_subtype subtype;
b91a2543 976 int ret = NET_RX_DROP;
9e794b6b 977 bool is4addr, is_gw;
c6c8fea2 978
7cdcf6dd 979 unicast_packet = (struct batadv_unicast_packet *)skb->data;
a40d9b07 980 is4addr = unicast_packet->packet_type == BATADV_UNICAST_4ADDR;
7cdcf6dd 981 /* the caller function should have already pulled 2 bytes */
c384ea3e 982 if (is4addr)
4046b24a 983 hdr_size = sizeof(*unicast_4addr_packet);
7cdcf6dd 984
612d2b4f 985 /* function returns -EREMOTE for promiscuous packets */
6e0895c2 986 check = batadv_check_unicast_packet(bat_priv, skb, hdr_size);
612d2b4f
MH
987
988 /* Even though the packet is not for us, we might save it to use for
989 * decoding a later received coded packet
990 */
991 if (check == -EREMOTE)
992 batadv_nc_skb_store_sniffed_unicast(bat_priv, skb);
993
994 if (check < 0)
b91a2543 995 goto free_skb;
dd981ab0 996 if (!batadv_check_unicast_ttvn(bat_priv, skb, hdr_size))
b91a2543 997 goto free_skb;
a73105b8 998
bc44b781
MS
999 unicast_packet = (struct batadv_unicast_packet *)skb->data;
1000
c6c8fea2 1001 /* packet for me */
fe8a93b9 1002 if (batadv_is_my_mac(bat_priv, unicast_packet->dest)) {
9e794b6b
AP
1003 /* If this is a unicast packet from another backgone gw,
1004 * drop it.
1005 */
bc44b781 1006 orig_addr_gw = eth_hdr(skb)->h_source;
9e794b6b
AP
1007 orig_node_gw = batadv_orig_hash_find(bat_priv, orig_addr_gw);
1008 if (orig_node_gw) {
1009 is_gw = batadv_bla_is_backbone_gw(skb, orig_node_gw,
1010 hdr_size);
1011 batadv_orig_node_put(orig_node_gw);
1012 if (is_gw) {
1013 batadv_dbg(BATADV_DBG_BLA, bat_priv,
22f0502e
SE
1014 "%s(): Dropped unicast pkt received from another backbone gw %pM.\n",
1015 __func__, orig_addr_gw);
a1a745ef 1016 goto free_skb;
9e794b6b
AP
1017 }
1018 }
1019
9affec6b 1020 if (is4addr) {
bc44b781
MS
1021 unicast_4addr_packet =
1022 (struct batadv_unicast_4addr_packet *)skb->data;
437bb0e6
SW
1023 subtype = unicast_4addr_packet->subtype;
1024 batadv_dat_inc_counter(bat_priv, subtype);
1025
1026 /* Only payload data should be considered for speedy
1027 * join. For example, DAT also uses unicast 4addr
1028 * types, but those packets should not be considered
1029 * for speedy join, since the clients do not actually
1030 * reside at the sending originator.
1031 */
1032 if (subtype == BATADV_P_DATA) {
1033 orig_addr = unicast_4addr_packet->src;
1034 orig_node = batadv_orig_hash_find(bat_priv,
1035 orig_addr);
1036 }
9affec6b 1037 }
4046b24a 1038
c384ea3e
AQ
1039 if (batadv_dat_snoop_incoming_arp_request(bat_priv, skb,
1040 hdr_size))
1041 goto rx_success;
1042 if (batadv_dat_snoop_incoming_arp_reply(bat_priv, skb,
1043 hdr_size))
1044 goto rx_success;
1045
6535db56 1046 batadv_interface_rx(recv_if->soft_iface, skb, hdr_size,
9affec6b 1047 orig_node);
37135173 1048
c384ea3e 1049rx_success:
9affec6b 1050 if (orig_node)
5d967310 1051 batadv_orig_node_put(orig_node);
9affec6b 1052
c6c8fea2
SE
1053 return NET_RX_SUCCESS;
1054 }
1055
b91a2543
SE
1056 ret = batadv_route_unicast_packet(skb, recv_if);
1057 /* skb was consumed */
1058 skb = NULL;
1059
1060free_skb:
1061 kfree_skb(skb);
1062
1063 return ret;
c6c8fea2
SE
1064}
1065
ef261577 1066/**
7e9a8c2c 1067 * batadv_recv_unicast_tvlv() - receive and process unicast tvlv packets
ef261577
ML
1068 * @skb: unicast tvlv packet to process
1069 * @recv_if: pointer to interface this packet was received on
ef261577 1070 *
62fe710f 1071 * Return: NET_RX_SUCCESS if the packet has been consumed or NET_RX_DROP
ef261577
ML
1072 * otherwise.
1073 */
1074int batadv_recv_unicast_tvlv(struct sk_buff *skb,
1075 struct batadv_hard_iface *recv_if)
1076{
1077 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1078 struct batadv_unicast_tvlv_packet *unicast_tvlv_packet;
1079 unsigned char *tvlv_buff;
6b5e971a 1080 u16 tvlv_buff_len;
ef261577
ML
1081 int hdr_size = sizeof(*unicast_tvlv_packet);
1082 int ret = NET_RX_DROP;
1083
1084 if (batadv_check_unicast_packet(bat_priv, skb, hdr_size) < 0)
b91a2543 1085 goto free_skb;
ef261577
ML
1086
1087 /* the header is likely to be modified while forwarding */
1088 if (skb_cow(skb, hdr_size) < 0)
b91a2543 1089 goto free_skb;
ef261577
ML
1090
1091 /* packet needs to be linearized to access the tvlv content */
1092 if (skb_linearize(skb) < 0)
b91a2543 1093 goto free_skb;
ef261577
ML
1094
1095 unicast_tvlv_packet = (struct batadv_unicast_tvlv_packet *)skb->data;
1096
1097 tvlv_buff = (unsigned char *)(skb->data + hdr_size);
1098 tvlv_buff_len = ntohs(unicast_tvlv_packet->tvlv_len);
1099
1100 if (tvlv_buff_len > skb->len - hdr_size)
b91a2543 1101 goto free_skb;
ef261577
ML
1102
1103 ret = batadv_tvlv_containers_process(bat_priv, false, NULL,
1104 unicast_tvlv_packet->src,
1105 unicast_tvlv_packet->dst,
1106 tvlv_buff, tvlv_buff_len);
1107
b91a2543 1108 if (ret != NET_RX_SUCCESS) {
ef261577 1109 ret = batadv_route_unicast_packet(skb, recv_if);
b91a2543
SE
1110 /* skb was consumed */
1111 skb = NULL;
1112 }
1113
1114free_skb:
1115 kfree_skb(skb);
ef261577
ML
1116
1117 return ret;
1118}
c6c8fea2 1119
610bfc6b 1120/**
7e9a8c2c 1121 * batadv_recv_frag_packet() - process received fragment
610bfc6b
MH
1122 * @skb: the received fragment
1123 * @recv_if: interface that the skb is received on
1124 *
1125 * This function does one of the three following things: 1) Forward fragment, if
1126 * the assembled packet will exceed our MTU; 2) Buffer fragment, if we till
1127 * lack further fragments; 3) Merge fragments, if we have all needed parts.
1128 *
62fe710f 1129 * Return: NET_RX_DROP if the skb is not consumed, NET_RX_SUCCESS otherwise.
610bfc6b
MH
1130 */
1131int batadv_recv_frag_packet(struct sk_buff *skb,
1132 struct batadv_hard_iface *recv_if)
1133{
1134 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1135 struct batadv_orig_node *orig_node_src = NULL;
1136 struct batadv_frag_packet *frag_packet;
1137 int ret = NET_RX_DROP;
1138
1139 if (batadv_check_unicast_packet(bat_priv, skb,
1140 sizeof(*frag_packet)) < 0)
b91a2543 1141 goto free_skb;
610bfc6b
MH
1142
1143 frag_packet = (struct batadv_frag_packet *)skb->data;
1144 orig_node_src = batadv_orig_hash_find(bat_priv, frag_packet->orig);
1145 if (!orig_node_src)
b91a2543 1146 goto free_skb;
610bfc6b 1147
c0f25c80
AL
1148 skb->priority = frag_packet->priority + 256;
1149
610bfc6b
MH
1150 /* Route the fragment if it is not for us and too big to be merged. */
1151 if (!batadv_is_my_mac(bat_priv, frag_packet->dest) &&
1152 batadv_frag_skb_fwd(skb, recv_if, orig_node_src)) {
b91a2543
SE
1153 /* skb was consumed */
1154 skb = NULL;
610bfc6b 1155 ret = NET_RX_SUCCESS;
b91a2543 1156 goto put_orig_node;
610bfc6b
MH
1157 }
1158
1159 batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_RX);
1160 batadv_add_counter(bat_priv, BATADV_CNT_FRAG_RX_BYTES, skb->len);
1161
1162 /* Add fragment to buffer and merge if possible. */
1163 if (!batadv_frag_skb_buffer(&skb, orig_node_src))
b91a2543 1164 goto put_orig_node;
610bfc6b
MH
1165
1166 /* Deliver merged packet to the appropriate handler, if it was
1167 * merged
1168 */
b91a2543 1169 if (skb) {
610bfc6b
MH
1170 batadv_batman_skb_recv(skb, recv_if->net_dev,
1171 &recv_if->batman_adv_ptype, NULL);
b91a2543
SE
1172 /* skb was consumed */
1173 skb = NULL;
1174 }
610bfc6b
MH
1175
1176 ret = NET_RX_SUCCESS;
1177
b91a2543
SE
1178put_orig_node:
1179 batadv_orig_node_put(orig_node_src);
1180free_skb:
1181 kfree_skb(skb);
610bfc6b
MH
1182
1183 return ret;
1184}
1185
ff15c27c
SE
1186/**
1187 * batadv_recv_bcast_packet() - Process incoming broadcast packet
1188 * @skb: incoming packet buffer
1189 * @recv_if: incoming hard interface
1190 *
1191 * Return: NET_RX_SUCCESS on success or NET_RX_DROP in case of failure
1192 */
56303d34
SE
1193int batadv_recv_bcast_packet(struct sk_buff *skb,
1194 struct batadv_hard_iface *recv_if)
c6c8fea2 1195{
56303d34
SE
1196 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1197 struct batadv_orig_node *orig_node = NULL;
96412690 1198 struct batadv_bcast_packet *bcast_packet;
c6c8fea2 1199 struct ethhdr *ethhdr;
704509b8 1200 int hdr_size = sizeof(*bcast_packet);
f3e0008f 1201 int ret = NET_RX_DROP;
6b5e971a
SE
1202 s32 seq_diff;
1203 u32 seqno;
c6c8fea2
SE
1204
1205 /* drop packet if it has not necessary minimum size */
1206 if (unlikely(!pskb_may_pull(skb, hdr_size)))
b91a2543 1207 goto free_skb;
c6c8fea2 1208
7ed4be95 1209 ethhdr = eth_hdr(skb);
c6c8fea2
SE
1210
1211 /* packet with broadcast indication but unicast recipient */
1212 if (!is_broadcast_ether_addr(ethhdr->h_dest))
b91a2543 1213 goto free_skb;
c6c8fea2 1214
9f75c8e1
SE
1215 /* packet with broadcast/multicast sender address */
1216 if (is_multicast_ether_addr(ethhdr->h_source))
b91a2543 1217 goto free_skb;
c6c8fea2
SE
1218
1219 /* ignore broadcasts sent by myself */
fe8a93b9 1220 if (batadv_is_my_mac(bat_priv, ethhdr->h_source))
b91a2543 1221 goto free_skb;
c6c8fea2 1222
96412690 1223 bcast_packet = (struct batadv_bcast_packet *)skb->data;
c6c8fea2
SE
1224
1225 /* ignore broadcasts originated by myself */
fe8a93b9 1226 if (batadv_is_my_mac(bat_priv, bcast_packet->orig))
b91a2543 1227 goto free_skb;
c6c8fea2 1228
a40d9b07 1229 if (bcast_packet->ttl < 2)
b91a2543 1230 goto free_skb;
c6c8fea2 1231
da641193 1232 orig_node = batadv_orig_hash_find(bat_priv, bcast_packet->orig);
f3e0008f
ML
1233
1234 if (!orig_node)
b91a2543 1235 goto free_skb;
c6c8fea2 1236
f3e0008f 1237 spin_lock_bh(&orig_node->bcast_seqno_lock);
c6c8fea2 1238
3fba7325 1239 seqno = ntohl(bcast_packet->seqno);
c6c8fea2 1240 /* check whether the packet is a duplicate */
9b4a1159 1241 if (batadv_test_bit(orig_node->bcast_bits, orig_node->last_bcast_seqno,
3fba7325 1242 seqno))
f3e0008f 1243 goto spin_unlock;
c6c8fea2 1244
3fba7325 1245 seq_diff = seqno - orig_node->last_bcast_seqno;
c6c8fea2
SE
1246
1247 /* check whether the packet is old and the host just restarted. */
30d3c511 1248 if (batadv_window_protected(bat_priv, seq_diff,
81f02683
SW
1249 BATADV_BCAST_MAX_AGE,
1250 &orig_node->bcast_seqno_reset, NULL))
f3e0008f 1251 goto spin_unlock;
c6c8fea2
SE
1252
1253 /* mark broadcast in flood history, update window position
9cfc7bd6
SE
1254 * if required.
1255 */
0f5f9322 1256 if (batadv_bit_get_packet(bat_priv, orig_node->bcast_bits, seq_diff, 1))
3fba7325 1257 orig_node->last_bcast_seqno = seqno;
c6c8fea2 1258
f3e0008f 1259 spin_unlock_bh(&orig_node->bcast_seqno_lock);
f3e0008f 1260
fe2da6ff 1261 /* check whether this has been sent by another originator before */
004e86fc 1262 if (batadv_bla_check_bcast_duplist(bat_priv, skb))
b91a2543 1263 goto free_skb;
fe2da6ff 1264
c54f38c9
SW
1265 batadv_skb_set_priority(skb, sizeof(struct batadv_bcast_packet));
1266
c6c8fea2 1267 /* rebroadcast packet */
3111beed 1268 batadv_add_bcast_packet_to_list(bat_priv, skb, 1, false);
c6c8fea2 1269
23721387
SW
1270 /* don't hand the broadcast up if it is from an originator
1271 * from the same backbone.
1272 */
08adf151 1273 if (batadv_bla_is_backbone_gw(skb, orig_node, hdr_size))
b91a2543 1274 goto free_skb;
23721387 1275
c384ea3e
AQ
1276 if (batadv_dat_snoop_incoming_arp_request(bat_priv, skb, hdr_size))
1277 goto rx_success;
1278 if (batadv_dat_snoop_incoming_arp_reply(bat_priv, skb, hdr_size))
1279 goto rx_success;
1280
c6c8fea2 1281 /* broadcast for me */
6535db56 1282 batadv_interface_rx(recv_if->soft_iface, skb, hdr_size, orig_node);
c384ea3e
AQ
1283
1284rx_success:
f3e0008f
ML
1285 ret = NET_RX_SUCCESS;
1286 goto out;
c6c8fea2 1287
f3e0008f
ML
1288spin_unlock:
1289 spin_unlock_bh(&orig_node->bcast_seqno_lock);
b91a2543
SE
1290free_skb:
1291 kfree_skb(skb);
f3e0008f
ML
1292out:
1293 if (orig_node)
5d967310 1294 batadv_orig_node_put(orig_node);
f3e0008f 1295 return ret;
c6c8fea2 1296}
This page took 0.707177 seconds and 4 git commands to generate.