]>
Commit | Line | Data |
---|---|---|
0046b040 | 1 | /* Copyright (C) 2007-2016 B.A.T.M.A.N. contributors: |
c6c8fea2 SE |
2 | * |
3 | * Marek Lindner, Simon Wunderlich | |
4 | * | |
5 | * This program is free software; you can redistribute it and/or | |
6 | * modify it under the terms of version 2 of the GNU General Public | |
7 | * License as published by the Free Software Foundation. | |
8 | * | |
9 | * This program is distributed in the hope that it will be useful, but | |
10 | * WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
12 | * General Public License for more details. | |
13 | * | |
14 | * You should have received a copy of the GNU General Public License | |
ebf38fb7 | 15 | * along with this program; if not, see <http://www.gnu.org/licenses/>. |
c6c8fea2 SE |
16 | */ |
17 | ||
c6c8fea2 | 18 | #include "routing.h" |
1e2c2a4f SE |
19 | #include "main.h" |
20 | ||
21 | #include <linux/atomic.h> | |
22 | #include <linux/byteorder/generic.h> | |
23 | #include <linux/compiler.h> | |
24 | #include <linux/errno.h> | |
25 | #include <linux/etherdevice.h> | |
26 | #include <linux/if_ether.h> | |
27 | #include <linux/jiffies.h> | |
a6ba0d34 | 28 | #include <linux/kref.h> |
1e2c2a4f SE |
29 | #include <linux/netdevice.h> |
30 | #include <linux/printk.h> | |
31 | #include <linux/rculist.h> | |
32 | #include <linux/rcupdate.h> | |
33 | #include <linux/skbuff.h> | |
34 | #include <linux/spinlock.h> | |
35 | #include <linux/stddef.h> | |
36 | ||
37 | #include "bitarray.h" | |
23721387 | 38 | #include "bridge_loop_avoidance.h" |
c384ea3e | 39 | #include "distributed-arp-table.h" |
610bfc6b | 40 | #include "fragmentation.h" |
1e2c2a4f SE |
41 | #include "hard-interface.h" |
42 | #include "icmp_socket.h" | |
ba412080 | 43 | #include "log.h" |
1e2c2a4f SE |
44 | #include "network-coding.h" |
45 | #include "originator.h" | |
46 | #include "packet.h" | |
47 | #include "send.h" | |
48 | #include "soft-interface.h" | |
49 | #include "translation-table.h" | |
1f8dce49 | 50 | #include "tvlv.h" |
c018ad3d | 51 | |
63b01037 | 52 | static int batadv_route_unicast_packet(struct sk_buff *skb, |
56303d34 | 53 | struct batadv_hard_iface *recv_if); |
a7f6ee94 | 54 | |
7351a482 SW |
55 | /** |
56 | * _batadv_update_route - set the router for this originator | |
57 | * @bat_priv: the bat priv with all the soft interface information | |
58 | * @orig_node: orig node which is to be configured | |
59 | * @recv_if: the receive interface for which this route is set | |
60 | * @neigh_node: neighbor which should be the next router | |
61 | * | |
62 | * This function does not perform any error checks | |
63 | */ | |
56303d34 SE |
64 | static void _batadv_update_route(struct batadv_priv *bat_priv, |
65 | struct batadv_orig_node *orig_node, | |
7351a482 | 66 | struct batadv_hard_iface *recv_if, |
56303d34 | 67 | struct batadv_neigh_node *neigh_node) |
c6c8fea2 | 68 | { |
7351a482 | 69 | struct batadv_orig_ifinfo *orig_ifinfo; |
56303d34 | 70 | struct batadv_neigh_node *curr_router; |
e1a5382f | 71 | |
7351a482 SW |
72 | orig_ifinfo = batadv_orig_ifinfo_get(orig_node, recv_if); |
73 | if (!orig_ifinfo) | |
74 | return; | |
75 | ||
76 | rcu_read_lock(); | |
77 | curr_router = rcu_dereference(orig_ifinfo->router); | |
77ae32e8 | 78 | if (curr_router && !kref_get_unless_zero(&curr_router->refcount)) |
7351a482 SW |
79 | curr_router = NULL; |
80 | rcu_read_unlock(); | |
a8e7f4bc | 81 | |
c6c8fea2 | 82 | /* route deleted */ |
e1a5382f | 83 | if ((curr_router) && (!neigh_node)) { |
39c75a51 SE |
84 | batadv_dbg(BATADV_DBG_ROUTES, bat_priv, |
85 | "Deleting route towards: %pM\n", orig_node->orig); | |
95fb130d | 86 | batadv_tt_global_del_orig(bat_priv, orig_node, -1, |
08c36d3e | 87 | "Deleted route towards originator"); |
c6c8fea2 | 88 | |
e1a5382f LL |
89 | /* route added */ |
90 | } else if ((!curr_router) && (neigh_node)) { | |
39c75a51 | 91 | batadv_dbg(BATADV_DBG_ROUTES, bat_priv, |
1eda58bf SE |
92 | "Adding route towards: %pM (via %pM)\n", |
93 | orig_node->orig, neigh_node->addr); | |
e1a5382f | 94 | /* route changed */ |
bb899b89 | 95 | } else if (neigh_node && curr_router) { |
39c75a51 | 96 | batadv_dbg(BATADV_DBG_ROUTES, bat_priv, |
1eda58bf SE |
97 | "Changing route towards: %pM (now via %pM - was via %pM)\n", |
98 | orig_node->orig, neigh_node->addr, | |
99 | curr_router->addr); | |
c6c8fea2 SE |
100 | } |
101 | ||
e1a5382f | 102 | if (curr_router) |
25bb2509 | 103 | batadv_neigh_node_put(curr_router); |
e1a5382f | 104 | |
e1a5382f | 105 | spin_lock_bh(&orig_node->neigh_list_lock); |
d1a65f17 SE |
106 | /* curr_router used earlier may not be the current orig_ifinfo->router |
107 | * anymore because it was dereferenced outside of the neigh_list_lock | |
108 | * protected region. After the new best neighbor has replace the current | |
109 | * best neighbor the reference counter needs to decrease. Consequently, | |
110 | * the code needs to ensure the curr_router variable contains a pointer | |
111 | * to the replaced best neighbor. | |
112 | */ | |
113 | curr_router = rcu_dereference_protected(orig_ifinfo->router, true); | |
114 | ||
f0b94ebc SE |
115 | /* increase refcount of new best neighbor */ |
116 | if (neigh_node) | |
117 | kref_get(&neigh_node->refcount); | |
118 | ||
7351a482 | 119 | rcu_assign_pointer(orig_ifinfo->router, neigh_node); |
e1a5382f | 120 | spin_unlock_bh(&orig_node->neigh_list_lock); |
35f94779 | 121 | batadv_orig_ifinfo_put(orig_ifinfo); |
e1a5382f LL |
122 | |
123 | /* decrease refcount of previous best neighbor */ | |
124 | if (curr_router) | |
25bb2509 | 125 | batadv_neigh_node_put(curr_router); |
c6c8fea2 SE |
126 | } |
127 | ||
7351a482 SW |
128 | /** |
129 | * batadv_update_route - set the router for this originator | |
130 | * @bat_priv: the bat priv with all the soft interface information | |
131 | * @orig_node: orig node which is to be configured | |
132 | * @recv_if: the receive interface for which this route is set | |
133 | * @neigh_node: neighbor which should be the next router | |
134 | */ | |
56303d34 SE |
135 | void batadv_update_route(struct batadv_priv *bat_priv, |
136 | struct batadv_orig_node *orig_node, | |
7351a482 | 137 | struct batadv_hard_iface *recv_if, |
56303d34 | 138 | struct batadv_neigh_node *neigh_node) |
c6c8fea2 | 139 | { |
56303d34 | 140 | struct batadv_neigh_node *router = NULL; |
c6c8fea2 SE |
141 | |
142 | if (!orig_node) | |
e1a5382f LL |
143 | goto out; |
144 | ||
7351a482 | 145 | router = batadv_orig_router_get(orig_node, recv_if); |
c6c8fea2 | 146 | |
e1a5382f | 147 | if (router != neigh_node) |
7351a482 | 148 | _batadv_update_route(bat_priv, orig_node, recv_if, neigh_node); |
e1a5382f LL |
149 | |
150 | out: | |
151 | if (router) | |
25bb2509 | 152 | batadv_neigh_node_put(router); |
c6c8fea2 SE |
153 | } |
154 | ||
62fe710f | 155 | /** |
7afcbbef | 156 | * batadv_window_protected - checks whether the host restarted and is in the |
62fe710f | 157 | * protection time. |
7afcbbef SE |
158 | * @bat_priv: the bat priv with all the soft interface information |
159 | * @seq_num_diff: difference between the current/received sequence number and | |
160 | * the last sequence number | |
81f02683 | 161 | * @seq_old_max_diff: maximum age of sequence number not considered as restart |
7afcbbef SE |
162 | * @last_reset: jiffies timestamp of the last reset, will be updated when reset |
163 | * is detected | |
81f02683 SW |
164 | * @protection_started: is set to true if the protection window was started, |
165 | * doesn't change otherwise. | |
62fe710f SE |
166 | * |
167 | * Return: | |
4b426b10 SE |
168 | * false if the packet is to be accepted. |
169 | * true if the packet is to be ignored. | |
c6c8fea2 | 170 | */ |
4b426b10 SE |
171 | bool batadv_window_protected(struct batadv_priv *bat_priv, s32 seq_num_diff, |
172 | s32 seq_old_max_diff, unsigned long *last_reset, | |
173 | bool *protection_started) | |
c6c8fea2 | 174 | { |
81f02683 | 175 | if (seq_num_diff <= -seq_old_max_diff || |
42d0b044 SE |
176 | seq_num_diff >= BATADV_EXPECTED_SEQNO_RANGE) { |
177 | if (!batadv_has_timed_out(*last_reset, | |
178 | BATADV_RESET_PROTECTION_MS)) | |
4b426b10 | 179 | return true; |
8c7bf248 ML |
180 | |
181 | *last_reset = jiffies; | |
81f02683 SW |
182 | if (protection_started) |
183 | *protection_started = true; | |
39c75a51 | 184 | batadv_dbg(BATADV_DBG_BATMAN, bat_priv, |
1eda58bf | 185 | "old packet received, start protection\n"); |
c6c8fea2 | 186 | } |
8c7bf248 | 187 | |
4b426b10 | 188 | return false; |
c6c8fea2 SE |
189 | } |
190 | ||
30d3c511 | 191 | bool batadv_check_management_packet(struct sk_buff *skb, |
56303d34 | 192 | struct batadv_hard_iface *hard_iface, |
30d3c511 | 193 | int header_len) |
c6c8fea2 | 194 | { |
c6c8fea2 SE |
195 | struct ethhdr *ethhdr; |
196 | ||
197 | /* drop packet if it has not necessary minimum size */ | |
c3e29312 ML |
198 | if (unlikely(!pskb_may_pull(skb, header_len))) |
199 | return false; | |
c6c8fea2 | 200 | |
7ed4be95 | 201 | ethhdr = eth_hdr(skb); |
c6c8fea2 SE |
202 | |
203 | /* packet with broadcast indication but unicast recipient */ | |
204 | if (!is_broadcast_ether_addr(ethhdr->h_dest)) | |
c3e29312 | 205 | return false; |
c6c8fea2 SE |
206 | |
207 | /* packet with broadcast sender address */ | |
208 | if (is_broadcast_ether_addr(ethhdr->h_source)) | |
c3e29312 | 209 | return false; |
c6c8fea2 SE |
210 | |
211 | /* create a copy of the skb, if needed, to modify it. */ | |
212 | if (skb_cow(skb, 0) < 0) | |
c3e29312 | 213 | return false; |
c6c8fea2 SE |
214 | |
215 | /* keep skb linear */ | |
216 | if (skb_linearize(skb) < 0) | |
c3e29312 | 217 | return false; |
c6c8fea2 | 218 | |
c3e29312 | 219 | return true; |
c6c8fea2 SE |
220 | } |
221 | ||
da6b8c20 SW |
222 | /** |
223 | * batadv_recv_my_icmp_packet - receive an icmp packet locally | |
224 | * @bat_priv: the bat priv with all the soft interface information | |
225 | * @skb: icmp packet to process | |
226 | * | |
62fe710f | 227 | * Return: NET_RX_SUCCESS if the packet has been consumed or NET_RX_DROP |
da6b8c20 SW |
228 | * otherwise. |
229 | */ | |
56303d34 | 230 | static int batadv_recv_my_icmp_packet(struct batadv_priv *bat_priv, |
da6b8c20 | 231 | struct sk_buff *skb) |
c6c8fea2 | 232 | { |
56303d34 SE |
233 | struct batadv_hard_iface *primary_if = NULL; |
234 | struct batadv_orig_node *orig_node = NULL; | |
da6b8c20 SW |
235 | struct batadv_icmp_header *icmph; |
236 | int res, ret = NET_RX_DROP; | |
c6c8fea2 | 237 | |
da6b8c20 | 238 | icmph = (struct batadv_icmp_header *)skb->data; |
c6c8fea2 | 239 | |
da6b8c20 SW |
240 | switch (icmph->msg_type) { |
241 | case BATADV_ECHO_REPLY: | |
242 | case BATADV_DESTINATION_UNREACHABLE: | |
243 | case BATADV_TTL_EXCEEDED: | |
244 | /* receive the packet */ | |
245 | if (skb_linearize(skb) < 0) | |
246 | break; | |
c6c8fea2 | 247 | |
da6b8c20 SW |
248 | batadv_socket_receive_packet(icmph, skb->len); |
249 | break; | |
250 | case BATADV_ECHO_REQUEST: | |
251 | /* answer echo request (ping) */ | |
252 | primary_if = batadv_primary_if_get_selected(bat_priv); | |
253 | if (!primary_if) | |
254 | goto out; | |
255 | ||
256 | /* get routing information */ | |
257 | orig_node = batadv_orig_hash_find(bat_priv, icmph->orig); | |
258 | if (!orig_node) | |
259 | goto out; | |
260 | ||
261 | /* create a copy of the skb, if needed, to modify it. */ | |
262 | if (skb_cow(skb, ETH_HLEN) < 0) | |
263 | goto out; | |
264 | ||
265 | icmph = (struct batadv_icmp_header *)skb->data; | |
266 | ||
8fdd0153 AQ |
267 | ether_addr_copy(icmph->dst, icmph->orig); |
268 | ether_addr_copy(icmph->orig, primary_if->net_dev->dev_addr); | |
da6b8c20 | 269 | icmph->msg_type = BATADV_ECHO_REPLY; |
a40d9b07 | 270 | icmph->ttl = BATADV_TTL; |
da6b8c20 SW |
271 | |
272 | res = batadv_send_skb_to_orig(skb, orig_node, NULL); | |
f50ca95a AQ |
273 | if (res == -1) |
274 | goto out; | |
275 | ||
276 | ret = NET_RX_SUCCESS; | |
da6b8c20 SW |
277 | |
278 | break; | |
279 | default: | |
280 | /* drop unknown type */ | |
44524fcd | 281 | goto out; |
da6b8c20 | 282 | } |
44524fcd | 283 | out: |
32ae9b22 | 284 | if (primary_if) |
82047ad7 | 285 | batadv_hardif_put(primary_if); |
44524fcd | 286 | if (orig_node) |
5d967310 | 287 | batadv_orig_node_put(orig_node); |
c6c8fea2 SE |
288 | return ret; |
289 | } | |
290 | ||
56303d34 | 291 | static int batadv_recv_icmp_ttl_exceeded(struct batadv_priv *bat_priv, |
63b01037 | 292 | struct sk_buff *skb) |
c6c8fea2 | 293 | { |
56303d34 SE |
294 | struct batadv_hard_iface *primary_if = NULL; |
295 | struct batadv_orig_node *orig_node = NULL; | |
96412690 | 296 | struct batadv_icmp_packet *icmp_packet; |
f50ca95a | 297 | int res, ret = NET_RX_DROP; |
c6c8fea2 | 298 | |
96412690 | 299 | icmp_packet = (struct batadv_icmp_packet *)skb->data; |
c6c8fea2 SE |
300 | |
301 | /* send TTL exceeded if packet is an echo request (traceroute) */ | |
27a417e6 | 302 | if (icmp_packet->msg_type != BATADV_ECHO_REQUEST) { |
86ceb360 | 303 | pr_debug("Warning - can't forward icmp packet from %pM to %pM: ttl exceeded\n", |
27a417e6 | 304 | icmp_packet->orig, icmp_packet->dst); |
44524fcd | 305 | goto out; |
c6c8fea2 SE |
306 | } |
307 | ||
e5d89254 | 308 | primary_if = batadv_primary_if_get_selected(bat_priv); |
32ae9b22 | 309 | if (!primary_if) |
44524fcd | 310 | goto out; |
c6c8fea2 SE |
311 | |
312 | /* get routing information */ | |
27a417e6 | 313 | orig_node = batadv_orig_hash_find(bat_priv, icmp_packet->orig); |
44524fcd | 314 | if (!orig_node) |
e1a5382f | 315 | goto out; |
c6c8fea2 | 316 | |
44524fcd | 317 | /* create a copy of the skb, if needed, to modify it. */ |
0d125074 | 318 | if (skb_cow(skb, ETH_HLEN) < 0) |
44524fcd | 319 | goto out; |
c6c8fea2 | 320 | |
96412690 | 321 | icmp_packet = (struct batadv_icmp_packet *)skb->data; |
c6c8fea2 | 322 | |
8fdd0153 AQ |
323 | ether_addr_copy(icmp_packet->dst, icmp_packet->orig); |
324 | ether_addr_copy(icmp_packet->orig, primary_if->net_dev->dev_addr); | |
27a417e6 AQ |
325 | icmp_packet->msg_type = BATADV_TTL_EXCEEDED; |
326 | icmp_packet->ttl = BATADV_TTL; | |
44524fcd | 327 | |
f50ca95a AQ |
328 | res = batadv_send_skb_to_orig(skb, orig_node, NULL); |
329 | if (res != -1) | |
bb351ba0 | 330 | ret = NET_RX_SUCCESS; |
c6c8fea2 | 331 | |
44524fcd | 332 | out: |
32ae9b22 | 333 | if (primary_if) |
82047ad7 | 334 | batadv_hardif_put(primary_if); |
44524fcd | 335 | if (orig_node) |
5d967310 | 336 | batadv_orig_node_put(orig_node); |
c6c8fea2 SE |
337 | return ret; |
338 | } | |
339 | ||
56303d34 SE |
340 | int batadv_recv_icmp_packet(struct sk_buff *skb, |
341 | struct batadv_hard_iface *recv_if) | |
c6c8fea2 | 342 | { |
56303d34 | 343 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); |
da6b8c20 SW |
344 | struct batadv_icmp_header *icmph; |
345 | struct batadv_icmp_packet_rr *icmp_packet_rr; | |
c6c8fea2 | 346 | struct ethhdr *ethhdr; |
56303d34 | 347 | struct batadv_orig_node *orig_node = NULL; |
da6b8c20 | 348 | int hdr_size = sizeof(struct batadv_icmp_header); |
f50ca95a | 349 | int res, ret = NET_RX_DROP; |
c6c8fea2 | 350 | |
c6c8fea2 SE |
351 | /* drop packet if it has not necessary minimum size */ |
352 | if (unlikely(!pskb_may_pull(skb, hdr_size))) | |
44524fcd | 353 | goto out; |
c6c8fea2 | 354 | |
7ed4be95 | 355 | ethhdr = eth_hdr(skb); |
c6c8fea2 SE |
356 | |
357 | /* packet with unicast indication but broadcast recipient */ | |
358 | if (is_broadcast_ether_addr(ethhdr->h_dest)) | |
44524fcd | 359 | goto out; |
c6c8fea2 SE |
360 | |
361 | /* packet with broadcast sender address */ | |
362 | if (is_broadcast_ether_addr(ethhdr->h_source)) | |
44524fcd | 363 | goto out; |
c6c8fea2 SE |
364 | |
365 | /* not for me */ | |
fe8a93b9 | 366 | if (!batadv_is_my_mac(bat_priv, ethhdr->h_dest)) |
44524fcd | 367 | goto out; |
c6c8fea2 | 368 | |
da6b8c20 | 369 | icmph = (struct batadv_icmp_header *)skb->data; |
c6c8fea2 SE |
370 | |
371 | /* add record route information if not full */ | |
da6b8c20 SW |
372 | if ((icmph->msg_type == BATADV_ECHO_REPLY || |
373 | icmph->msg_type == BATADV_ECHO_REQUEST) && | |
374 | (skb->len >= sizeof(struct batadv_icmp_packet_rr))) { | |
375 | if (skb_linearize(skb) < 0) | |
376 | goto out; | |
377 | ||
378 | /* create a copy of the skb, if needed, to modify it. */ | |
379 | if (skb_cow(skb, ETH_HLEN) < 0) | |
380 | goto out; | |
381 | ||
382 | icmph = (struct batadv_icmp_header *)skb->data; | |
383 | icmp_packet_rr = (struct batadv_icmp_packet_rr *)icmph; | |
384 | if (icmp_packet_rr->rr_cur >= BATADV_RR_LEN) | |
385 | goto out; | |
386 | ||
8fdd0153 AQ |
387 | ether_addr_copy(icmp_packet_rr->rr[icmp_packet_rr->rr_cur], |
388 | ethhdr->h_dest); | |
da6b8c20 | 389 | icmp_packet_rr->rr_cur++; |
c6c8fea2 SE |
390 | } |
391 | ||
392 | /* packet for me */ | |
da6b8c20 SW |
393 | if (batadv_is_my_mac(bat_priv, icmph->dst)) |
394 | return batadv_recv_my_icmp_packet(bat_priv, skb); | |
c6c8fea2 SE |
395 | |
396 | /* TTL exceeded */ | |
a40d9b07 | 397 | if (icmph->ttl < 2) |
63b01037 | 398 | return batadv_recv_icmp_ttl_exceeded(bat_priv, skb); |
c6c8fea2 | 399 | |
c6c8fea2 | 400 | /* get routing information */ |
da6b8c20 | 401 | orig_node = batadv_orig_hash_find(bat_priv, icmph->dst); |
44524fcd | 402 | if (!orig_node) |
e1a5382f | 403 | goto out; |
c6c8fea2 | 404 | |
44524fcd | 405 | /* create a copy of the skb, if needed, to modify it. */ |
0d125074 | 406 | if (skb_cow(skb, ETH_HLEN) < 0) |
44524fcd | 407 | goto out; |
c6c8fea2 | 408 | |
da6b8c20 | 409 | icmph = (struct batadv_icmp_header *)skb->data; |
c6c8fea2 | 410 | |
44524fcd | 411 | /* decrement ttl */ |
a40d9b07 | 412 | icmph->ttl--; |
44524fcd ML |
413 | |
414 | /* route it */ | |
f50ca95a AQ |
415 | res = batadv_send_skb_to_orig(skb, orig_node, recv_if); |
416 | if (res != -1) | |
bb351ba0 | 417 | ret = NET_RX_SUCCESS; |
c6c8fea2 | 418 | |
44524fcd | 419 | out: |
44524fcd | 420 | if (orig_node) |
5d967310 | 421 | batadv_orig_node_put(orig_node); |
c6c8fea2 SE |
422 | return ret; |
423 | } | |
424 | ||
f86ce0ad MH |
425 | /** |
426 | * batadv_check_unicast_packet - Check for malformed unicast packets | |
6e0895c2 | 427 | * @bat_priv: the bat priv with all the soft interface information |
f86ce0ad MH |
428 | * @skb: packet to check |
429 | * @hdr_size: size of header to pull | |
430 | * | |
62fe710f SE |
431 | * Check for short header and bad addresses in given packet. |
432 | * | |
433 | * Return: negative value when check fails and 0 otherwise. The negative value | |
434 | * depends on the reason: -ENODATA for bad header, -EBADR for broadcast | |
435 | * destination or source, and -EREMOTE for non-local (other host) destination. | |
f86ce0ad | 436 | */ |
fe8a93b9 AQ |
437 | static int batadv_check_unicast_packet(struct batadv_priv *bat_priv, |
438 | struct sk_buff *skb, int hdr_size) | |
ff51fd70 MH |
439 | { |
440 | struct ethhdr *ethhdr; | |
441 | ||
442 | /* drop packet if it has not necessary minimum size */ | |
443 | if (unlikely(!pskb_may_pull(skb, hdr_size))) | |
f86ce0ad | 444 | return -ENODATA; |
ff51fd70 | 445 | |
7ed4be95 | 446 | ethhdr = eth_hdr(skb); |
ff51fd70 MH |
447 | |
448 | /* packet with unicast indication but broadcast recipient */ | |
449 | if (is_broadcast_ether_addr(ethhdr->h_dest)) | |
f86ce0ad | 450 | return -EBADR; |
ff51fd70 MH |
451 | |
452 | /* packet with broadcast sender address */ | |
453 | if (is_broadcast_ether_addr(ethhdr->h_source)) | |
f86ce0ad | 454 | return -EBADR; |
ff51fd70 MH |
455 | |
456 | /* not for me */ | |
fe8a93b9 | 457 | if (!batadv_is_my_mac(bat_priv, ethhdr->h_dest)) |
f86ce0ad | 458 | return -EREMOTE; |
ff51fd70 MH |
459 | |
460 | return 0; | |
461 | } | |
462 | ||
f6c8b711 SW |
463 | /** |
464 | * batadv_find_router - find a suitable router for this originator | |
465 | * @bat_priv: the bat priv with all the soft interface information | |
466 | * @orig_node: the destination node | |
467 | * @recv_if: pointer to interface this packet was received on | |
468 | * | |
62fe710f | 469 | * Return: the router which should be used for this orig_node on |
f6c8b711 | 470 | * this interface, or NULL if not available. |
9cfc7bd6 | 471 | */ |
56303d34 SE |
472 | struct batadv_neigh_node * |
473 | batadv_find_router(struct batadv_priv *bat_priv, | |
474 | struct batadv_orig_node *orig_node, | |
f3b3d901 | 475 | struct batadv_hard_iface *recv_if) |
c6c8fea2 | 476 | { |
f3b3d901 SW |
477 | struct batadv_algo_ops *bao = bat_priv->bat_algo_ops; |
478 | struct batadv_neigh_node *first_candidate_router = NULL; | |
479 | struct batadv_neigh_node *next_candidate_router = NULL; | |
480 | struct batadv_neigh_node *router, *cand_router = NULL; | |
481 | struct batadv_neigh_node *last_cand_router = NULL; | |
482 | struct batadv_orig_ifinfo *cand, *first_candidate = NULL; | |
483 | struct batadv_orig_ifinfo *next_candidate = NULL; | |
484 | struct batadv_orig_ifinfo *last_candidate; | |
485 | bool last_candidate_found = false; | |
c6c8fea2 SE |
486 | |
487 | if (!orig_node) | |
488 | return NULL; | |
489 | ||
7351a482 | 490 | router = batadv_orig_router_get(orig_node, recv_if); |
c6c8fea2 | 491 | |
329887ad SW |
492 | if (!router) |
493 | return router; | |
494 | ||
f3b3d901 SW |
495 | /* only consider bonding for recv_if == BATADV_IF_DEFAULT (first hop) |
496 | * and if activated. | |
497 | */ | |
329887ad | 498 | if (!(recv_if == BATADV_IF_DEFAULT && atomic_read(&bat_priv->bonding))) |
f3b3d901 SW |
499 | return router; |
500 | ||
501 | /* bonding: loop through the list of possible routers found | |
502 | * for the various outgoing interfaces and find a candidate after | |
503 | * the last chosen bonding candidate (next_candidate). If no such | |
504 | * router is found, use the first candidate found (the previously | |
505 | * chosen bonding candidate might have been the last one in the list). | |
3f68785e | 506 | * If this can't be found either, return the previously chosen |
f3b3d901 SW |
507 | * router - obviously there are no other candidates. |
508 | */ | |
509 | rcu_read_lock(); | |
510 | last_candidate = orig_node->last_bonding_candidate; | |
511 | if (last_candidate) | |
512 | last_cand_router = rcu_dereference(last_candidate->router); | |
513 | ||
514 | hlist_for_each_entry_rcu(cand, &orig_node->ifinfo_list, list) { | |
515 | /* acquire some structures and references ... */ | |
a6ba0d34 | 516 | if (!kref_get_unless_zero(&cand->refcount)) |
f3b3d901 SW |
517 | continue; |
518 | ||
519 | cand_router = rcu_dereference(cand->router); | |
520 | if (!cand_router) | |
521 | goto next; | |
522 | ||
77ae32e8 | 523 | if (!kref_get_unless_zero(&cand_router->refcount)) { |
f3b3d901 SW |
524 | cand_router = NULL; |
525 | goto next; | |
526 | } | |
527 | ||
528 | /* alternative candidate should be good enough to be | |
529 | * considered | |
530 | */ | |
18165f6f SW |
531 | if (!bao->bat_neigh_is_similar_or_better(cand_router, |
532 | cand->if_outgoing, | |
533 | router, recv_if)) | |
f3b3d901 SW |
534 | goto next; |
535 | ||
536 | /* don't use the same router twice */ | |
537 | if (last_cand_router == cand_router) | |
538 | goto next; | |
539 | ||
540 | /* mark the first possible candidate */ | |
541 | if (!first_candidate) { | |
77ae32e8 | 542 | kref_get(&cand_router->refcount); |
a6ba0d34 | 543 | kref_get(&cand->refcount); |
f3b3d901 SW |
544 | first_candidate = cand; |
545 | first_candidate_router = cand_router; | |
546 | } | |
547 | ||
548 | /* check if the loop has already passed the previously selected | |
549 | * candidate ... this function should select the next candidate | |
550 | * AFTER the previously used bonding candidate. | |
551 | */ | |
552 | if (!last_candidate || last_candidate_found) { | |
553 | next_candidate = cand; | |
554 | next_candidate_router = cand_router; | |
555 | break; | |
556 | } | |
557 | ||
558 | if (last_candidate == cand) | |
559 | last_candidate_found = true; | |
560 | next: | |
561 | /* free references */ | |
562 | if (cand_router) { | |
25bb2509 | 563 | batadv_neigh_node_put(cand_router); |
f3b3d901 SW |
564 | cand_router = NULL; |
565 | } | |
35f94779 | 566 | batadv_orig_ifinfo_put(cand); |
f3b3d901 SW |
567 | } |
568 | rcu_read_unlock(); | |
569 | ||
570 | /* last_bonding_candidate is reset below, remove the old reference. */ | |
571 | if (orig_node->last_bonding_candidate) | |
35f94779 | 572 | batadv_orig_ifinfo_put(orig_node->last_bonding_candidate); |
f3b3d901 SW |
573 | |
574 | /* After finding candidates, handle the three cases: | |
575 | * 1) there is a next candidate, use that | |
576 | * 2) there is no next candidate, use the first of the list | |
577 | * 3) there is no candidate at all, return the default router | |
578 | */ | |
579 | if (next_candidate) { | |
25bb2509 | 580 | batadv_neigh_node_put(router); |
f3b3d901 SW |
581 | |
582 | /* remove references to first candidate, we don't need it. */ | |
583 | if (first_candidate) { | |
25bb2509 | 584 | batadv_neigh_node_put(first_candidate_router); |
35f94779 | 585 | batadv_orig_ifinfo_put(first_candidate); |
f3b3d901 SW |
586 | } |
587 | router = next_candidate_router; | |
588 | orig_node->last_bonding_candidate = next_candidate; | |
589 | } else if (first_candidate) { | |
25bb2509 | 590 | batadv_neigh_node_put(router); |
f3b3d901 SW |
591 | |
592 | /* refcounting has already been done in the loop above. */ | |
593 | router = first_candidate_router; | |
594 | orig_node->last_bonding_candidate = first_candidate; | |
595 | } else { | |
596 | orig_node->last_bonding_candidate = NULL; | |
597 | } | |
f6c8b711 | 598 | |
c6c8fea2 SE |
599 | return router; |
600 | } | |
601 | ||
63b01037 | 602 | static int batadv_route_unicast_packet(struct sk_buff *skb, |
56303d34 | 603 | struct batadv_hard_iface *recv_if) |
c6c8fea2 | 604 | { |
56303d34 SE |
605 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); |
606 | struct batadv_orig_node *orig_node = NULL; | |
96412690 | 607 | struct batadv_unicast_packet *unicast_packet; |
7ed4be95 | 608 | struct ethhdr *ethhdr = eth_hdr(skb); |
c54f38c9 | 609 | int res, hdr_len, ret = NET_RX_DROP; |
63d443ef | 610 | unsigned int len; |
c6c8fea2 | 611 | |
96412690 | 612 | unicast_packet = (struct batadv_unicast_packet *)skb->data; |
c6c8fea2 SE |
613 | |
614 | /* TTL exceeded */ | |
a40d9b07 | 615 | if (unicast_packet->ttl < 2) { |
86ceb360 SE |
616 | pr_debug("Warning - can't forward unicast packet from %pM to %pM: ttl exceeded\n", |
617 | ethhdr->h_source, unicast_packet->dest); | |
44524fcd | 618 | goto out; |
c6c8fea2 SE |
619 | } |
620 | ||
621 | /* get routing information */ | |
da641193 | 622 | orig_node = batadv_orig_hash_find(bat_priv, unicast_packet->dest); |
7aadf889 | 623 | |
44524fcd | 624 | if (!orig_node) |
b5a6f69c | 625 | goto out; |
c6c8fea2 | 626 | |
c6c8fea2 | 627 | /* create a copy of the skb, if needed, to modify it. */ |
0d125074 | 628 | if (skb_cow(skb, ETH_HLEN) < 0) |
44524fcd | 629 | goto out; |
c6c8fea2 | 630 | |
c6c8fea2 | 631 | /* decrement ttl */ |
f097e25d | 632 | unicast_packet = (struct batadv_unicast_packet *)skb->data; |
a40d9b07 | 633 | unicast_packet->ttl--; |
c6c8fea2 | 634 | |
a40d9b07 | 635 | switch (unicast_packet->packet_type) { |
c54f38c9 SW |
636 | case BATADV_UNICAST_4ADDR: |
637 | hdr_len = sizeof(struct batadv_unicast_4addr_packet); | |
638 | break; | |
639 | case BATADV_UNICAST: | |
640 | hdr_len = sizeof(struct batadv_unicast_packet); | |
641 | break; | |
642 | default: | |
643 | /* other packet types not supported - yet */ | |
644 | hdr_len = -1; | |
645 | break; | |
646 | } | |
647 | ||
648 | if (hdr_len > 0) | |
649 | batadv_skb_set_priority(skb, hdr_len); | |
650 | ||
63d443ef | 651 | len = skb->len; |
e91ecfc6 | 652 | res = batadv_send_skb_to_orig(skb, orig_node, recv_if); |
f50ca95a AQ |
653 | if (res == -1) |
654 | goto out; | |
95332477 | 655 | |
e91ecfc6 MH |
656 | /* translate transmit result into receive result */ |
657 | if (res == NET_XMIT_SUCCESS) { | |
658 | /* skb was transmitted and consumed */ | |
95332477 MH |
659 | batadv_inc_counter(bat_priv, BATADV_CNT_FORWARD); |
660 | batadv_add_counter(bat_priv, BATADV_CNT_FORWARD_BYTES, | |
63d443ef | 661 | len + ETH_HLEN); |
95332477 | 662 | } |
c6c8fea2 | 663 | |
f50ca95a AQ |
664 | ret = NET_RX_SUCCESS; |
665 | ||
44524fcd | 666 | out: |
44524fcd | 667 | if (orig_node) |
5d967310 | 668 | batadv_orig_node_put(orig_node); |
44524fcd | 669 | return ret; |
c6c8fea2 SE |
670 | } |
671 | ||
7c1fd91d AQ |
672 | /** |
673 | * batadv_reroute_unicast_packet - update the unicast header for re-routing | |
674 | * @bat_priv: the bat priv with all the soft interface information | |
675 | * @unicast_packet: the unicast header to be updated | |
676 | * @dst_addr: the payload destination | |
c018ad3d | 677 | * @vid: VLAN identifier |
7c1fd91d AQ |
678 | * |
679 | * Search the translation table for dst_addr and update the unicast header with | |
680 | * the new corresponding information (originator address where the destination | |
681 | * client currently is and its known TTVN) | |
682 | * | |
62fe710f | 683 | * Return: true if the packet header has been updated, false otherwise |
7c1fd91d AQ |
684 | */ |
685 | static bool | |
686 | batadv_reroute_unicast_packet(struct batadv_priv *bat_priv, | |
687 | struct batadv_unicast_packet *unicast_packet, | |
6b5e971a | 688 | u8 *dst_addr, unsigned short vid) |
7c1fd91d AQ |
689 | { |
690 | struct batadv_orig_node *orig_node = NULL; | |
691 | struct batadv_hard_iface *primary_if = NULL; | |
692 | bool ret = false; | |
6b5e971a | 693 | u8 *orig_addr, orig_ttvn; |
7c1fd91d | 694 | |
c018ad3d | 695 | if (batadv_is_my_client(bat_priv, dst_addr, vid)) { |
7c1fd91d AQ |
696 | primary_if = batadv_primary_if_get_selected(bat_priv); |
697 | if (!primary_if) | |
698 | goto out; | |
699 | orig_addr = primary_if->net_dev->dev_addr; | |
6b5e971a | 700 | orig_ttvn = (u8)atomic_read(&bat_priv->tt.vn); |
7c1fd91d | 701 | } else { |
c018ad3d AQ |
702 | orig_node = batadv_transtable_search(bat_priv, NULL, dst_addr, |
703 | vid); | |
7c1fd91d AQ |
704 | if (!orig_node) |
705 | goto out; | |
706 | ||
707 | if (batadv_compare_eth(orig_node->orig, unicast_packet->dest)) | |
708 | goto out; | |
709 | ||
710 | orig_addr = orig_node->orig; | |
6b5e971a | 711 | orig_ttvn = (u8)atomic_read(&orig_node->last_ttvn); |
7c1fd91d AQ |
712 | } |
713 | ||
714 | /* update the packet header */ | |
8fdd0153 | 715 | ether_addr_copy(unicast_packet->dest, orig_addr); |
7c1fd91d AQ |
716 | unicast_packet->ttvn = orig_ttvn; |
717 | ||
718 | ret = true; | |
719 | out: | |
720 | if (primary_if) | |
82047ad7 | 721 | batadv_hardif_put(primary_if); |
7c1fd91d | 722 | if (orig_node) |
5d967310 | 723 | batadv_orig_node_put(orig_node); |
7c1fd91d AQ |
724 | |
725 | return ret; | |
726 | } | |
727 | ||
4b426b10 SE |
728 | static bool batadv_check_unicast_ttvn(struct batadv_priv *bat_priv, |
729 | struct sk_buff *skb, int hdr_len) | |
730 | { | |
c018ad3d AQ |
731 | struct batadv_unicast_packet *unicast_packet; |
732 | struct batadv_hard_iface *primary_if; | |
56303d34 | 733 | struct batadv_orig_node *orig_node; |
6b5e971a | 734 | u8 curr_ttvn, old_ttvn; |
a73105b8 | 735 | struct ethhdr *ethhdr; |
c018ad3d | 736 | unsigned short vid; |
3e34819e | 737 | int is_old_ttvn; |
a73105b8 | 738 | |
b8fcfa42 | 739 | /* check if there is enough data before accessing it */ |
f1791425 | 740 | if (!pskb_may_pull(skb, hdr_len + ETH_HLEN)) |
4b426b10 | 741 | return false; |
b8fcfa42 AQ |
742 | |
743 | /* create a copy of the skb (in case of for re-routing) to modify it. */ | |
744 | if (skb_cow(skb, sizeof(*unicast_packet)) < 0) | |
4b426b10 | 745 | return false; |
a73105b8 | 746 | |
96412690 | 747 | unicast_packet = (struct batadv_unicast_packet *)skb->data; |
c018ad3d | 748 | vid = batadv_get_vid(skb, hdr_len); |
dd981ab0 | 749 | ethhdr = (struct ethhdr *)(skb->data + hdr_len); |
a73105b8 | 750 | |
7c1fd91d AQ |
751 | /* check if the destination client was served by this node and it is now |
752 | * roaming. In this case, it means that the node has got a ROAM_ADV | |
753 | * message and that it knows the new destination in the mesh to re-route | |
754 | * the packet to | |
755 | */ | |
c018ad3d | 756 | if (batadv_tt_local_client_is_roaming(bat_priv, ethhdr->h_dest, vid)) { |
7c1fd91d | 757 | if (batadv_reroute_unicast_packet(bat_priv, unicast_packet, |
c018ad3d | 758 | ethhdr->h_dest, vid)) |
23c4ec10 AG |
759 | batadv_dbg_ratelimited(BATADV_DBG_TT, |
760 | bat_priv, | |
761 | "Rerouting unicast packet to %pM (dst=%pM): Local Roaming\n", | |
762 | unicast_packet->dest, | |
763 | ethhdr->h_dest); | |
7c1fd91d AQ |
764 | /* at this point the mesh destination should have been |
765 | * substituted with the originator address found in the global | |
766 | * table. If not, let the packet go untouched anyway because | |
767 | * there is nothing the node can do | |
768 | */ | |
4b426b10 | 769 | return true; |
7c1fd91d AQ |
770 | } |
771 | ||
772 | /* retrieve the TTVN known by this node for the packet destination. This | |
773 | * value is used later to check if the node which sent (or re-routed | |
774 | * last time) the packet had an updated information or not | |
775 | */ | |
6b5e971a | 776 | curr_ttvn = (u8)atomic_read(&bat_priv->tt.vn); |
fe8a93b9 | 777 | if (!batadv_is_my_mac(bat_priv, unicast_packet->dest)) { |
da641193 SE |
778 | orig_node = batadv_orig_hash_find(bat_priv, |
779 | unicast_packet->dest); | |
7c1fd91d AQ |
780 | /* if it is not possible to find the orig_node representing the |
781 | * destination, the packet can immediately be dropped as it will | |
782 | * not be possible to deliver it | |
783 | */ | |
a73105b8 | 784 | if (!orig_node) |
4b426b10 | 785 | return false; |
a73105b8 | 786 | |
6b5e971a | 787 | curr_ttvn = (u8)atomic_read(&orig_node->last_ttvn); |
5d967310 | 788 | batadv_orig_node_put(orig_node); |
a73105b8 AQ |
789 | } |
790 | ||
7c1fd91d AQ |
791 | /* check if the TTVN contained in the packet is fresher than what the |
792 | * node knows | |
793 | */ | |
3e34819e | 794 | is_old_ttvn = batadv_seq_before(unicast_packet->ttvn, curr_ttvn); |
7c1fd91d | 795 | if (!is_old_ttvn) |
4b426b10 | 796 | return true; |
a73105b8 | 797 | |
7c1fd91d AQ |
798 | old_ttvn = unicast_packet->ttvn; |
799 | /* the packet was forged based on outdated network information. Its | |
800 | * destination can possibly be updated and forwarded towards the new | |
801 | * target host | |
802 | */ | |
803 | if (batadv_reroute_unicast_packet(bat_priv, unicast_packet, | |
c018ad3d | 804 | ethhdr->h_dest, vid)) { |
23c4ec10 AG |
805 | batadv_dbg_ratelimited(BATADV_DBG_TT, bat_priv, |
806 | "Rerouting unicast packet to %pM (dst=%pM): TTVN mismatch old_ttvn=%u new_ttvn=%u\n", | |
807 | unicast_packet->dest, ethhdr->h_dest, | |
808 | old_ttvn, curr_ttvn); | |
4b426b10 | 809 | return true; |
7c1fd91d | 810 | } |
3275e7cc | 811 | |
7c1fd91d AQ |
812 | /* the packet has not been re-routed: either the destination is |
813 | * currently served by this node or there is no destination at all and | |
814 | * it is possible to drop the packet | |
815 | */ | |
c018ad3d | 816 | if (!batadv_is_my_client(bat_priv, ethhdr->h_dest, vid)) |
4b426b10 | 817 | return false; |
3275e7cc | 818 | |
7c1fd91d AQ |
819 | /* update the header in order to let the packet be delivered to this |
820 | * node's soft interface | |
821 | */ | |
822 | primary_if = batadv_primary_if_get_selected(bat_priv); | |
823 | if (!primary_if) | |
4b426b10 | 824 | return false; |
a73105b8 | 825 | |
8fdd0153 | 826 | ether_addr_copy(unicast_packet->dest, primary_if->net_dev->dev_addr); |
7c1fd91d | 827 | |
82047ad7 | 828 | batadv_hardif_put(primary_if); |
7c1fd91d AQ |
829 | |
830 | unicast_packet->ttvn = curr_ttvn; | |
a73105b8 | 831 | |
4b426b10 | 832 | return true; |
a73105b8 AQ |
833 | } |
834 | ||
a1f1ac5c SW |
835 | /** |
836 | * batadv_recv_unhandled_unicast_packet - receive and process packets which | |
837 | * are in the unicast number space but not yet known to the implementation | |
838 | * @skb: unicast tvlv packet to process | |
839 | * @recv_if: pointer to interface this packet was received on | |
840 | * | |
62fe710f | 841 | * Return: NET_RX_SUCCESS if the packet has been consumed or NET_RX_DROP |
a1f1ac5c SW |
842 | * otherwise. |
843 | */ | |
844 | int batadv_recv_unhandled_unicast_packet(struct sk_buff *skb, | |
845 | struct batadv_hard_iface *recv_if) | |
846 | { | |
847 | struct batadv_unicast_packet *unicast_packet; | |
848 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); | |
849 | int check, hdr_size = sizeof(*unicast_packet); | |
850 | ||
851 | check = batadv_check_unicast_packet(bat_priv, skb, hdr_size); | |
852 | if (check < 0) | |
853 | return NET_RX_DROP; | |
854 | ||
855 | /* we don't know about this type, drop it. */ | |
856 | unicast_packet = (struct batadv_unicast_packet *)skb->data; | |
857 | if (batadv_is_my_mac(bat_priv, unicast_packet->dest)) | |
858 | return NET_RX_DROP; | |
859 | ||
860 | return batadv_route_unicast_packet(skb, recv_if); | |
861 | } | |
862 | ||
56303d34 SE |
863 | int batadv_recv_unicast_packet(struct sk_buff *skb, |
864 | struct batadv_hard_iface *recv_if) | |
c6c8fea2 | 865 | { |
56303d34 | 866 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); |
96412690 | 867 | struct batadv_unicast_packet *unicast_packet; |
4046b24a | 868 | struct batadv_unicast_4addr_packet *unicast_4addr_packet; |
6b5e971a | 869 | u8 *orig_addr; |
9affec6b | 870 | struct batadv_orig_node *orig_node = NULL; |
612d2b4f | 871 | int check, hdr_size = sizeof(*unicast_packet); |
437bb0e6 | 872 | enum batadv_subtype subtype; |
c384ea3e | 873 | bool is4addr; |
c6c8fea2 | 874 | |
7cdcf6dd | 875 | unicast_packet = (struct batadv_unicast_packet *)skb->data; |
4046b24a | 876 | unicast_4addr_packet = (struct batadv_unicast_4addr_packet *)skb->data; |
7cdcf6dd | 877 | |
a40d9b07 | 878 | is4addr = unicast_packet->packet_type == BATADV_UNICAST_4ADDR; |
7cdcf6dd | 879 | /* the caller function should have already pulled 2 bytes */ |
c384ea3e | 880 | if (is4addr) |
4046b24a | 881 | hdr_size = sizeof(*unicast_4addr_packet); |
7cdcf6dd | 882 | |
612d2b4f | 883 | /* function returns -EREMOTE for promiscuous packets */ |
6e0895c2 | 884 | check = batadv_check_unicast_packet(bat_priv, skb, hdr_size); |
612d2b4f MH |
885 | |
886 | /* Even though the packet is not for us, we might save it to use for | |
887 | * decoding a later received coded packet | |
888 | */ | |
889 | if (check == -EREMOTE) | |
890 | batadv_nc_skb_store_sniffed_unicast(bat_priv, skb); | |
891 | ||
892 | if (check < 0) | |
c6c8fea2 | 893 | return NET_RX_DROP; |
dd981ab0 | 894 | if (!batadv_check_unicast_ttvn(bat_priv, skb, hdr_size)) |
a73105b8 AQ |
895 | return NET_RX_DROP; |
896 | ||
c6c8fea2 | 897 | /* packet for me */ |
fe8a93b9 | 898 | if (batadv_is_my_mac(bat_priv, unicast_packet->dest)) { |
9affec6b | 899 | if (is4addr) { |
437bb0e6 SW |
900 | subtype = unicast_4addr_packet->subtype; |
901 | batadv_dat_inc_counter(bat_priv, subtype); | |
902 | ||
903 | /* Only payload data should be considered for speedy | |
904 | * join. For example, DAT also uses unicast 4addr | |
905 | * types, but those packets should not be considered | |
906 | * for speedy join, since the clients do not actually | |
907 | * reside at the sending originator. | |
908 | */ | |
909 | if (subtype == BATADV_P_DATA) { | |
910 | orig_addr = unicast_4addr_packet->src; | |
911 | orig_node = batadv_orig_hash_find(bat_priv, | |
912 | orig_addr); | |
913 | } | |
9affec6b | 914 | } |
4046b24a | 915 | |
c384ea3e AQ |
916 | if (batadv_dat_snoop_incoming_arp_request(bat_priv, skb, |
917 | hdr_size)) | |
918 | goto rx_success; | |
919 | if (batadv_dat_snoop_incoming_arp_reply(bat_priv, skb, | |
920 | hdr_size)) | |
921 | goto rx_success; | |
922 | ||
6535db56 | 923 | batadv_interface_rx(recv_if->soft_iface, skb, hdr_size, |
9affec6b | 924 | orig_node); |
37135173 | 925 | |
c384ea3e | 926 | rx_success: |
9affec6b | 927 | if (orig_node) |
5d967310 | 928 | batadv_orig_node_put(orig_node); |
9affec6b | 929 | |
c6c8fea2 SE |
930 | return NET_RX_SUCCESS; |
931 | } | |
932 | ||
63b01037 | 933 | return batadv_route_unicast_packet(skb, recv_if); |
c6c8fea2 SE |
934 | } |
935 | ||
ef261577 ML |
936 | /** |
937 | * batadv_recv_unicast_tvlv - receive and process unicast tvlv packets | |
938 | * @skb: unicast tvlv packet to process | |
939 | * @recv_if: pointer to interface this packet was received on | |
ef261577 | 940 | * |
62fe710f | 941 | * Return: NET_RX_SUCCESS if the packet has been consumed or NET_RX_DROP |
ef261577 ML |
942 | * otherwise. |
943 | */ | |
944 | int batadv_recv_unicast_tvlv(struct sk_buff *skb, | |
945 | struct batadv_hard_iface *recv_if) | |
946 | { | |
947 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); | |
948 | struct batadv_unicast_tvlv_packet *unicast_tvlv_packet; | |
949 | unsigned char *tvlv_buff; | |
6b5e971a | 950 | u16 tvlv_buff_len; |
ef261577 ML |
951 | int hdr_size = sizeof(*unicast_tvlv_packet); |
952 | int ret = NET_RX_DROP; | |
953 | ||
954 | if (batadv_check_unicast_packet(bat_priv, skb, hdr_size) < 0) | |
955 | return NET_RX_DROP; | |
956 | ||
957 | /* the header is likely to be modified while forwarding */ | |
958 | if (skb_cow(skb, hdr_size) < 0) | |
959 | return NET_RX_DROP; | |
960 | ||
961 | /* packet needs to be linearized to access the tvlv content */ | |
962 | if (skb_linearize(skb) < 0) | |
963 | return NET_RX_DROP; | |
964 | ||
965 | unicast_tvlv_packet = (struct batadv_unicast_tvlv_packet *)skb->data; | |
966 | ||
967 | tvlv_buff = (unsigned char *)(skb->data + hdr_size); | |
968 | tvlv_buff_len = ntohs(unicast_tvlv_packet->tvlv_len); | |
969 | ||
970 | if (tvlv_buff_len > skb->len - hdr_size) | |
971 | return NET_RX_DROP; | |
972 | ||
973 | ret = batadv_tvlv_containers_process(bat_priv, false, NULL, | |
974 | unicast_tvlv_packet->src, | |
975 | unicast_tvlv_packet->dst, | |
976 | tvlv_buff, tvlv_buff_len); | |
977 | ||
978 | if (ret != NET_RX_SUCCESS) | |
979 | ret = batadv_route_unicast_packet(skb, recv_if); | |
05c3c8a6 AQ |
980 | else |
981 | consume_skb(skb); | |
ef261577 ML |
982 | |
983 | return ret; | |
984 | } | |
c6c8fea2 | 985 | |
610bfc6b MH |
986 | /** |
987 | * batadv_recv_frag_packet - process received fragment | |
988 | * @skb: the received fragment | |
989 | * @recv_if: interface that the skb is received on | |
990 | * | |
991 | * This function does one of the three following things: 1) Forward fragment, if | |
992 | * the assembled packet will exceed our MTU; 2) Buffer fragment, if we till | |
993 | * lack further fragments; 3) Merge fragments, if we have all needed parts. | |
994 | * | |
62fe710f | 995 | * Return: NET_RX_DROP if the skb is not consumed, NET_RX_SUCCESS otherwise. |
610bfc6b MH |
996 | */ |
997 | int batadv_recv_frag_packet(struct sk_buff *skb, | |
998 | struct batadv_hard_iface *recv_if) | |
999 | { | |
1000 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); | |
1001 | struct batadv_orig_node *orig_node_src = NULL; | |
1002 | struct batadv_frag_packet *frag_packet; | |
1003 | int ret = NET_RX_DROP; | |
1004 | ||
1005 | if (batadv_check_unicast_packet(bat_priv, skb, | |
1006 | sizeof(*frag_packet)) < 0) | |
1007 | goto out; | |
1008 | ||
1009 | frag_packet = (struct batadv_frag_packet *)skb->data; | |
1010 | orig_node_src = batadv_orig_hash_find(bat_priv, frag_packet->orig); | |
1011 | if (!orig_node_src) | |
1012 | goto out; | |
1013 | ||
c0f25c80 AL |
1014 | skb->priority = frag_packet->priority + 256; |
1015 | ||
610bfc6b MH |
1016 | /* Route the fragment if it is not for us and too big to be merged. */ |
1017 | if (!batadv_is_my_mac(bat_priv, frag_packet->dest) && | |
1018 | batadv_frag_skb_fwd(skb, recv_if, orig_node_src)) { | |
1019 | ret = NET_RX_SUCCESS; | |
1020 | goto out; | |
1021 | } | |
1022 | ||
1023 | batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_RX); | |
1024 | batadv_add_counter(bat_priv, BATADV_CNT_FRAG_RX_BYTES, skb->len); | |
1025 | ||
1026 | /* Add fragment to buffer and merge if possible. */ | |
1027 | if (!batadv_frag_skb_buffer(&skb, orig_node_src)) | |
1028 | goto out; | |
1029 | ||
1030 | /* Deliver merged packet to the appropriate handler, if it was | |
1031 | * merged | |
1032 | */ | |
1033 | if (skb) | |
1034 | batadv_batman_skb_recv(skb, recv_if->net_dev, | |
1035 | &recv_if->batman_adv_ptype, NULL); | |
1036 | ||
1037 | ret = NET_RX_SUCCESS; | |
1038 | ||
1039 | out: | |
1040 | if (orig_node_src) | |
5d967310 | 1041 | batadv_orig_node_put(orig_node_src); |
610bfc6b MH |
1042 | |
1043 | return ret; | |
1044 | } | |
1045 | ||
56303d34 SE |
1046 | int batadv_recv_bcast_packet(struct sk_buff *skb, |
1047 | struct batadv_hard_iface *recv_if) | |
c6c8fea2 | 1048 | { |
56303d34 SE |
1049 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); |
1050 | struct batadv_orig_node *orig_node = NULL; | |
96412690 | 1051 | struct batadv_bcast_packet *bcast_packet; |
c6c8fea2 | 1052 | struct ethhdr *ethhdr; |
704509b8 | 1053 | int hdr_size = sizeof(*bcast_packet); |
f3e0008f | 1054 | int ret = NET_RX_DROP; |
6b5e971a SE |
1055 | s32 seq_diff; |
1056 | u32 seqno; | |
c6c8fea2 SE |
1057 | |
1058 | /* drop packet if it has not necessary minimum size */ | |
1059 | if (unlikely(!pskb_may_pull(skb, hdr_size))) | |
f3e0008f | 1060 | goto out; |
c6c8fea2 | 1061 | |
7ed4be95 | 1062 | ethhdr = eth_hdr(skb); |
c6c8fea2 SE |
1063 | |
1064 | /* packet with broadcast indication but unicast recipient */ | |
1065 | if (!is_broadcast_ether_addr(ethhdr->h_dest)) | |
f3e0008f | 1066 | goto out; |
c6c8fea2 SE |
1067 | |
1068 | /* packet with broadcast sender address */ | |
1069 | if (is_broadcast_ether_addr(ethhdr->h_source)) | |
f3e0008f | 1070 | goto out; |
c6c8fea2 SE |
1071 | |
1072 | /* ignore broadcasts sent by myself */ | |
fe8a93b9 | 1073 | if (batadv_is_my_mac(bat_priv, ethhdr->h_source)) |
f3e0008f | 1074 | goto out; |
c6c8fea2 | 1075 | |
96412690 | 1076 | bcast_packet = (struct batadv_bcast_packet *)skb->data; |
c6c8fea2 SE |
1077 | |
1078 | /* ignore broadcasts originated by myself */ | |
fe8a93b9 | 1079 | if (batadv_is_my_mac(bat_priv, bcast_packet->orig)) |
f3e0008f | 1080 | goto out; |
c6c8fea2 | 1081 | |
a40d9b07 | 1082 | if (bcast_packet->ttl < 2) |
f3e0008f | 1083 | goto out; |
c6c8fea2 | 1084 | |
da641193 | 1085 | orig_node = batadv_orig_hash_find(bat_priv, bcast_packet->orig); |
f3e0008f ML |
1086 | |
1087 | if (!orig_node) | |
b5a6f69c | 1088 | goto out; |
c6c8fea2 | 1089 | |
f3e0008f | 1090 | spin_lock_bh(&orig_node->bcast_seqno_lock); |
c6c8fea2 | 1091 | |
3fba7325 | 1092 | seqno = ntohl(bcast_packet->seqno); |
c6c8fea2 | 1093 | /* check whether the packet is a duplicate */ |
9b4a1159 | 1094 | if (batadv_test_bit(orig_node->bcast_bits, orig_node->last_bcast_seqno, |
3fba7325 | 1095 | seqno)) |
f3e0008f | 1096 | goto spin_unlock; |
c6c8fea2 | 1097 | |
3fba7325 | 1098 | seq_diff = seqno - orig_node->last_bcast_seqno; |
c6c8fea2 SE |
1099 | |
1100 | /* check whether the packet is old and the host just restarted. */ | |
30d3c511 | 1101 | if (batadv_window_protected(bat_priv, seq_diff, |
81f02683 SW |
1102 | BATADV_BCAST_MAX_AGE, |
1103 | &orig_node->bcast_seqno_reset, NULL)) | |
f3e0008f | 1104 | goto spin_unlock; |
c6c8fea2 SE |
1105 | |
1106 | /* mark broadcast in flood history, update window position | |
9cfc7bd6 SE |
1107 | * if required. |
1108 | */ | |
0f5f9322 | 1109 | if (batadv_bit_get_packet(bat_priv, orig_node->bcast_bits, seq_diff, 1)) |
3fba7325 | 1110 | orig_node->last_bcast_seqno = seqno; |
c6c8fea2 | 1111 | |
f3e0008f | 1112 | spin_unlock_bh(&orig_node->bcast_seqno_lock); |
f3e0008f | 1113 | |
fe2da6ff | 1114 | /* check whether this has been sent by another originator before */ |
004e86fc | 1115 | if (batadv_bla_check_bcast_duplist(bat_priv, skb)) |
fe2da6ff SW |
1116 | goto out; |
1117 | ||
c54f38c9 SW |
1118 | batadv_skb_set_priority(skb, sizeof(struct batadv_bcast_packet)); |
1119 | ||
c6c8fea2 | 1120 | /* rebroadcast packet */ |
9455e34c | 1121 | batadv_add_bcast_packet_to_list(bat_priv, skb, 1); |
c6c8fea2 | 1122 | |
23721387 SW |
1123 | /* don't hand the broadcast up if it is from an originator |
1124 | * from the same backbone. | |
1125 | */ | |
08adf151 | 1126 | if (batadv_bla_is_backbone_gw(skb, orig_node, hdr_size)) |
23721387 SW |
1127 | goto out; |
1128 | ||
c384ea3e AQ |
1129 | if (batadv_dat_snoop_incoming_arp_request(bat_priv, skb, hdr_size)) |
1130 | goto rx_success; | |
1131 | if (batadv_dat_snoop_incoming_arp_reply(bat_priv, skb, hdr_size)) | |
1132 | goto rx_success; | |
1133 | ||
c6c8fea2 | 1134 | /* broadcast for me */ |
6535db56 | 1135 | batadv_interface_rx(recv_if->soft_iface, skb, hdr_size, orig_node); |
c384ea3e AQ |
1136 | |
1137 | rx_success: | |
f3e0008f ML |
1138 | ret = NET_RX_SUCCESS; |
1139 | goto out; | |
c6c8fea2 | 1140 | |
f3e0008f ML |
1141 | spin_unlock: |
1142 | spin_unlock_bh(&orig_node->bcast_seqno_lock); | |
f3e0008f ML |
1143 | out: |
1144 | if (orig_node) | |
5d967310 | 1145 | batadv_orig_node_put(orig_node); |
f3e0008f | 1146 | return ret; |
c6c8fea2 | 1147 | } |