Merge branch 'irq-urgent-for-linus' of git://git.kernel.org/pub/scm/linux/kernel...
[linux-2.6-block.git] / net / batman-adv / routing.c
CommitLineData
7db7d9f3 1// SPDX-License-Identifier: GPL-2.0
ac79cbb9 2/* Copyright (C) 2007-2017 B.A.T.M.A.N. contributors:
c6c8fea2
SE
3 *
4 * Marek Lindner, Simon Wunderlich
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of version 2 of the GNU General Public
8 * License as published by the Free Software Foundation.
9 *
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * General Public License for more details.
14 *
15 * You should have received a copy of the GNU General Public License
ebf38fb7 16 * along with this program; if not, see <http://www.gnu.org/licenses/>.
c6c8fea2
SE
17 */
18
c6c8fea2 19#include "routing.h"
1e2c2a4f
SE
20#include "main.h"
21
22#include <linux/atomic.h>
23#include <linux/byteorder/generic.h>
24#include <linux/compiler.h>
25#include <linux/errno.h>
26#include <linux/etherdevice.h>
27#include <linux/if_ether.h>
28#include <linux/jiffies.h>
a6ba0d34 29#include <linux/kref.h>
1e2c2a4f
SE
30#include <linux/netdevice.h>
31#include <linux/printk.h>
32#include <linux/rculist.h>
33#include <linux/rcupdate.h>
34#include <linux/skbuff.h>
35#include <linux/spinlock.h>
36#include <linux/stddef.h>
fec149f5 37#include <uapi/linux/batadv_packet.h>
1e2c2a4f
SE
38
39#include "bitarray.h"
23721387 40#include "bridge_loop_avoidance.h"
c384ea3e 41#include "distributed-arp-table.h"
610bfc6b 42#include "fragmentation.h"
1e2c2a4f
SE
43#include "hard-interface.h"
44#include "icmp_socket.h"
ba412080 45#include "log.h"
1e2c2a4f
SE
46#include "network-coding.h"
47#include "originator.h"
1e2c2a4f
SE
48#include "send.h"
49#include "soft-interface.h"
33a3bb4a 50#include "tp_meter.h"
1e2c2a4f 51#include "translation-table.h"
1f8dce49 52#include "tvlv.h"
c018ad3d 53
63b01037 54static int batadv_route_unicast_packet(struct sk_buff *skb,
56303d34 55 struct batadv_hard_iface *recv_if);
a7f6ee94 56
7351a482 57/**
7e9a8c2c 58 * _batadv_update_route() - set the router for this originator
7351a482
SW
59 * @bat_priv: the bat priv with all the soft interface information
60 * @orig_node: orig node which is to be configured
61 * @recv_if: the receive interface for which this route is set
62 * @neigh_node: neighbor which should be the next router
63 *
64 * This function does not perform any error checks
65 */
56303d34
SE
66static void _batadv_update_route(struct batadv_priv *bat_priv,
67 struct batadv_orig_node *orig_node,
7351a482 68 struct batadv_hard_iface *recv_if,
56303d34 69 struct batadv_neigh_node *neigh_node)
c6c8fea2 70{
7351a482 71 struct batadv_orig_ifinfo *orig_ifinfo;
56303d34 72 struct batadv_neigh_node *curr_router;
e1a5382f 73
7351a482
SW
74 orig_ifinfo = batadv_orig_ifinfo_get(orig_node, recv_if);
75 if (!orig_ifinfo)
76 return;
77
b5dcbad2
SE
78 spin_lock_bh(&orig_node->neigh_list_lock);
79 /* curr_router used earlier may not be the current orig_ifinfo->router
80 * anymore because it was dereferenced outside of the neigh_list_lock
81 * protected region. After the new best neighbor has replace the current
82 * best neighbor the reference counter needs to decrease. Consequently,
83 * the code needs to ensure the curr_router variable contains a pointer
84 * to the replaced best neighbor.
85 */
86 curr_router = rcu_dereference_protected(orig_ifinfo->router, true);
87
88 /* increase refcount of new best neighbor */
89 if (neigh_node)
90 kref_get(&neigh_node->refcount);
91
92 rcu_assign_pointer(orig_ifinfo->router, neigh_node);
93 spin_unlock_bh(&orig_node->neigh_list_lock);
94 batadv_orig_ifinfo_put(orig_ifinfo);
a8e7f4bc 95
c6c8fea2 96 /* route deleted */
825ffe1f 97 if (curr_router && !neigh_node) {
39c75a51
SE
98 batadv_dbg(BATADV_DBG_ROUTES, bat_priv,
99 "Deleting route towards: %pM\n", orig_node->orig);
95fb130d 100 batadv_tt_global_del_orig(bat_priv, orig_node, -1,
08c36d3e 101 "Deleted route towards originator");
c6c8fea2 102
e1a5382f 103 /* route added */
825ffe1f 104 } else if (!curr_router && neigh_node) {
39c75a51 105 batadv_dbg(BATADV_DBG_ROUTES, bat_priv,
1eda58bf
SE
106 "Adding route towards: %pM (via %pM)\n",
107 orig_node->orig, neigh_node->addr);
e1a5382f 108 /* route changed */
bb899b89 109 } else if (neigh_node && curr_router) {
39c75a51 110 batadv_dbg(BATADV_DBG_ROUTES, bat_priv,
1eda58bf
SE
111 "Changing route towards: %pM (now via %pM - was via %pM)\n",
112 orig_node->orig, neigh_node->addr,
113 curr_router->addr);
c6c8fea2
SE
114 }
115
e1a5382f
LL
116 /* decrease refcount of previous best neighbor */
117 if (curr_router)
25bb2509 118 batadv_neigh_node_put(curr_router);
c6c8fea2
SE
119}
120
7351a482 121/**
7e9a8c2c 122 * batadv_update_route() - set the router for this originator
7351a482
SW
123 * @bat_priv: the bat priv with all the soft interface information
124 * @orig_node: orig node which is to be configured
125 * @recv_if: the receive interface for which this route is set
126 * @neigh_node: neighbor which should be the next router
127 */
56303d34
SE
128void batadv_update_route(struct batadv_priv *bat_priv,
129 struct batadv_orig_node *orig_node,
7351a482 130 struct batadv_hard_iface *recv_if,
56303d34 131 struct batadv_neigh_node *neigh_node)
c6c8fea2 132{
56303d34 133 struct batadv_neigh_node *router = NULL;
c6c8fea2
SE
134
135 if (!orig_node)
e1a5382f
LL
136 goto out;
137
7351a482 138 router = batadv_orig_router_get(orig_node, recv_if);
c6c8fea2 139
e1a5382f 140 if (router != neigh_node)
7351a482 141 _batadv_update_route(bat_priv, orig_node, recv_if, neigh_node);
e1a5382f
LL
142
143out:
144 if (router)
25bb2509 145 batadv_neigh_node_put(router);
c6c8fea2
SE
146}
147
62fe710f 148/**
7e9a8c2c 149 * batadv_window_protected() - checks whether the host restarted and is in the
62fe710f 150 * protection time.
7afcbbef
SE
151 * @bat_priv: the bat priv with all the soft interface information
152 * @seq_num_diff: difference between the current/received sequence number and
153 * the last sequence number
81f02683 154 * @seq_old_max_diff: maximum age of sequence number not considered as restart
7afcbbef
SE
155 * @last_reset: jiffies timestamp of the last reset, will be updated when reset
156 * is detected
81f02683
SW
157 * @protection_started: is set to true if the protection window was started,
158 * doesn't change otherwise.
62fe710f
SE
159 *
160 * Return:
4b426b10
SE
161 * false if the packet is to be accepted.
162 * true if the packet is to be ignored.
c6c8fea2 163 */
4b426b10
SE
164bool batadv_window_protected(struct batadv_priv *bat_priv, s32 seq_num_diff,
165 s32 seq_old_max_diff, unsigned long *last_reset,
166 bool *protection_started)
c6c8fea2 167{
81f02683 168 if (seq_num_diff <= -seq_old_max_diff ||
42d0b044
SE
169 seq_num_diff >= BATADV_EXPECTED_SEQNO_RANGE) {
170 if (!batadv_has_timed_out(*last_reset,
171 BATADV_RESET_PROTECTION_MS))
4b426b10 172 return true;
8c7bf248
ML
173
174 *last_reset = jiffies;
81f02683
SW
175 if (protection_started)
176 *protection_started = true;
39c75a51 177 batadv_dbg(BATADV_DBG_BATMAN, bat_priv,
1eda58bf 178 "old packet received, start protection\n");
c6c8fea2 179 }
8c7bf248 180
4b426b10 181 return false;
c6c8fea2
SE
182}
183
ff15c27c
SE
184/**
185 * batadv_check_management_packet() - Check preconditions for management packets
186 * @skb: incoming packet buffer
187 * @hard_iface: incoming hard interface
188 * @header_len: minimal header length of packet type
189 *
190 * Return: true when management preconditions are met, false otherwise
191 */
30d3c511 192bool batadv_check_management_packet(struct sk_buff *skb,
56303d34 193 struct batadv_hard_iface *hard_iface,
30d3c511 194 int header_len)
c6c8fea2 195{
c6c8fea2
SE
196 struct ethhdr *ethhdr;
197
198 /* drop packet if it has not necessary minimum size */
c3e29312
ML
199 if (unlikely(!pskb_may_pull(skb, header_len)))
200 return false;
c6c8fea2 201
7ed4be95 202 ethhdr = eth_hdr(skb);
c6c8fea2
SE
203
204 /* packet with broadcast indication but unicast recipient */
205 if (!is_broadcast_ether_addr(ethhdr->h_dest))
c3e29312 206 return false;
c6c8fea2 207
92eef520
SE
208 /* packet with invalid sender address */
209 if (!is_valid_ether_addr(ethhdr->h_source))
c3e29312 210 return false;
c6c8fea2
SE
211
212 /* create a copy of the skb, if needed, to modify it. */
213 if (skb_cow(skb, 0) < 0)
c3e29312 214 return false;
c6c8fea2
SE
215
216 /* keep skb linear */
217 if (skb_linearize(skb) < 0)
c3e29312 218 return false;
c6c8fea2 219
c3e29312 220 return true;
c6c8fea2
SE
221}
222
da6b8c20 223/**
7e9a8c2c 224 * batadv_recv_my_icmp_packet() - receive an icmp packet locally
da6b8c20
SW
225 * @bat_priv: the bat priv with all the soft interface information
226 * @skb: icmp packet to process
227 *
62fe710f 228 * Return: NET_RX_SUCCESS if the packet has been consumed or NET_RX_DROP
da6b8c20
SW
229 * otherwise.
230 */
56303d34 231static int batadv_recv_my_icmp_packet(struct batadv_priv *bat_priv,
da6b8c20 232 struct sk_buff *skb)
c6c8fea2 233{
56303d34
SE
234 struct batadv_hard_iface *primary_if = NULL;
235 struct batadv_orig_node *orig_node = NULL;
da6b8c20
SW
236 struct batadv_icmp_header *icmph;
237 int res, ret = NET_RX_DROP;
c6c8fea2 238
da6b8c20 239 icmph = (struct batadv_icmp_header *)skb->data;
c6c8fea2 240
da6b8c20
SW
241 switch (icmph->msg_type) {
242 case BATADV_ECHO_REPLY:
243 case BATADV_DESTINATION_UNREACHABLE:
244 case BATADV_TTL_EXCEEDED:
245 /* receive the packet */
246 if (skb_linearize(skb) < 0)
247 break;
c6c8fea2 248
da6b8c20
SW
249 batadv_socket_receive_packet(icmph, skb->len);
250 break;
251 case BATADV_ECHO_REQUEST:
252 /* answer echo request (ping) */
253 primary_if = batadv_primary_if_get_selected(bat_priv);
254 if (!primary_if)
255 goto out;
256
257 /* get routing information */
258 orig_node = batadv_orig_hash_find(bat_priv, icmph->orig);
259 if (!orig_node)
260 goto out;
261
262 /* create a copy of the skb, if needed, to modify it. */
263 if (skb_cow(skb, ETH_HLEN) < 0)
264 goto out;
265
266 icmph = (struct batadv_icmp_header *)skb->data;
267
8fdd0153
AQ
268 ether_addr_copy(icmph->dst, icmph->orig);
269 ether_addr_copy(icmph->orig, primary_if->net_dev->dev_addr);
da6b8c20 270 icmph->msg_type = BATADV_ECHO_REPLY;
a40d9b07 271 icmph->ttl = BATADV_TTL;
da6b8c20
SW
272
273 res = batadv_send_skb_to_orig(skb, orig_node, NULL);
b91a2543
SE
274 if (res == NET_XMIT_SUCCESS)
275 ret = NET_RX_SUCCESS;
da6b8c20 276
b91a2543
SE
277 /* skb was consumed */
278 skb = NULL;
da6b8c20 279 break;
33a3bb4a
AQ
280 case BATADV_TP:
281 if (!pskb_may_pull(skb, sizeof(struct batadv_icmp_tp_packet)))
282 goto out;
283
284 batadv_tp_meter_recv(bat_priv, skb);
285 ret = NET_RX_SUCCESS;
b91a2543
SE
286 /* skb was consumed */
287 skb = NULL;
33a3bb4a 288 goto out;
da6b8c20
SW
289 default:
290 /* drop unknown type */
44524fcd 291 goto out;
da6b8c20 292 }
44524fcd 293out:
32ae9b22 294 if (primary_if)
82047ad7 295 batadv_hardif_put(primary_if);
44524fcd 296 if (orig_node)
5d967310 297 batadv_orig_node_put(orig_node);
b91a2543
SE
298
299 kfree_skb(skb);
300
c6c8fea2
SE
301 return ret;
302}
303
56303d34 304static int batadv_recv_icmp_ttl_exceeded(struct batadv_priv *bat_priv,
63b01037 305 struct sk_buff *skb)
c6c8fea2 306{
56303d34
SE
307 struct batadv_hard_iface *primary_if = NULL;
308 struct batadv_orig_node *orig_node = NULL;
96412690 309 struct batadv_icmp_packet *icmp_packet;
f50ca95a 310 int res, ret = NET_RX_DROP;
c6c8fea2 311
96412690 312 icmp_packet = (struct batadv_icmp_packet *)skb->data;
c6c8fea2
SE
313
314 /* send TTL exceeded if packet is an echo request (traceroute) */
27a417e6 315 if (icmp_packet->msg_type != BATADV_ECHO_REQUEST) {
86ceb360 316 pr_debug("Warning - can't forward icmp packet from %pM to %pM: ttl exceeded\n",
27a417e6 317 icmp_packet->orig, icmp_packet->dst);
44524fcd 318 goto out;
c6c8fea2
SE
319 }
320
e5d89254 321 primary_if = batadv_primary_if_get_selected(bat_priv);
32ae9b22 322 if (!primary_if)
44524fcd 323 goto out;
c6c8fea2
SE
324
325 /* get routing information */
27a417e6 326 orig_node = batadv_orig_hash_find(bat_priv, icmp_packet->orig);
44524fcd 327 if (!orig_node)
e1a5382f 328 goto out;
c6c8fea2 329
44524fcd 330 /* create a copy of the skb, if needed, to modify it. */
0d125074 331 if (skb_cow(skb, ETH_HLEN) < 0)
44524fcd 332 goto out;
c6c8fea2 333
96412690 334 icmp_packet = (struct batadv_icmp_packet *)skb->data;
c6c8fea2 335
8fdd0153
AQ
336 ether_addr_copy(icmp_packet->dst, icmp_packet->orig);
337 ether_addr_copy(icmp_packet->orig, primary_if->net_dev->dev_addr);
27a417e6
AQ
338 icmp_packet->msg_type = BATADV_TTL_EXCEEDED;
339 icmp_packet->ttl = BATADV_TTL;
44524fcd 340
f50ca95a 341 res = batadv_send_skb_to_orig(skb, orig_node, NULL);
b91a2543
SE
342 if (res == NET_RX_SUCCESS)
343 ret = NET_XMIT_SUCCESS;
344
345 /* skb was consumed */
346 skb = NULL;
c6c8fea2 347
44524fcd 348out:
32ae9b22 349 if (primary_if)
82047ad7 350 batadv_hardif_put(primary_if);
44524fcd 351 if (orig_node)
5d967310 352 batadv_orig_node_put(orig_node);
b91a2543
SE
353
354 kfree_skb(skb);
355
c6c8fea2
SE
356 return ret;
357}
358
ff15c27c
SE
359/**
360 * batadv_recv_icmp_packet() - Process incoming icmp packet
361 * @skb: incoming packet buffer
362 * @recv_if: incoming hard interface
363 *
364 * Return: NET_RX_SUCCESS on success or NET_RX_DROP in case of failure
365 */
56303d34
SE
366int batadv_recv_icmp_packet(struct sk_buff *skb,
367 struct batadv_hard_iface *recv_if)
c6c8fea2 368{
56303d34 369 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
da6b8c20
SW
370 struct batadv_icmp_header *icmph;
371 struct batadv_icmp_packet_rr *icmp_packet_rr;
c6c8fea2 372 struct ethhdr *ethhdr;
56303d34 373 struct batadv_orig_node *orig_node = NULL;
da6b8c20 374 int hdr_size = sizeof(struct batadv_icmp_header);
f50ca95a 375 int res, ret = NET_RX_DROP;
c6c8fea2 376
c6c8fea2
SE
377 /* drop packet if it has not necessary minimum size */
378 if (unlikely(!pskb_may_pull(skb, hdr_size)))
b91a2543 379 goto free_skb;
c6c8fea2 380
7ed4be95 381 ethhdr = eth_hdr(skb);
c6c8fea2 382
93bbaab4
SE
383 /* packet with unicast indication but non-unicast recipient */
384 if (!is_valid_ether_addr(ethhdr->h_dest))
b91a2543 385 goto free_skb;
c6c8fea2 386
9f75c8e1
SE
387 /* packet with broadcast/multicast sender address */
388 if (is_multicast_ether_addr(ethhdr->h_source))
b91a2543 389 goto free_skb;
c6c8fea2
SE
390
391 /* not for me */
fe8a93b9 392 if (!batadv_is_my_mac(bat_priv, ethhdr->h_dest))
b91a2543 393 goto free_skb;
c6c8fea2 394
da6b8c20 395 icmph = (struct batadv_icmp_header *)skb->data;
c6c8fea2
SE
396
397 /* add record route information if not full */
da6b8c20
SW
398 if ((icmph->msg_type == BATADV_ECHO_REPLY ||
399 icmph->msg_type == BATADV_ECHO_REQUEST) &&
825ffe1f 400 skb->len >= sizeof(struct batadv_icmp_packet_rr)) {
da6b8c20 401 if (skb_linearize(skb) < 0)
b91a2543 402 goto free_skb;
da6b8c20
SW
403
404 /* create a copy of the skb, if needed, to modify it. */
405 if (skb_cow(skb, ETH_HLEN) < 0)
b91a2543 406 goto free_skb;
da6b8c20 407
3b55e442 408 ethhdr = eth_hdr(skb);
da6b8c20
SW
409 icmph = (struct batadv_icmp_header *)skb->data;
410 icmp_packet_rr = (struct batadv_icmp_packet_rr *)icmph;
411 if (icmp_packet_rr->rr_cur >= BATADV_RR_LEN)
b91a2543 412 goto free_skb;
da6b8c20 413
8fdd0153
AQ
414 ether_addr_copy(icmp_packet_rr->rr[icmp_packet_rr->rr_cur],
415 ethhdr->h_dest);
da6b8c20 416 icmp_packet_rr->rr_cur++;
c6c8fea2
SE
417 }
418
419 /* packet for me */
da6b8c20
SW
420 if (batadv_is_my_mac(bat_priv, icmph->dst))
421 return batadv_recv_my_icmp_packet(bat_priv, skb);
c6c8fea2
SE
422
423 /* TTL exceeded */
a40d9b07 424 if (icmph->ttl < 2)
63b01037 425 return batadv_recv_icmp_ttl_exceeded(bat_priv, skb);
c6c8fea2 426
c6c8fea2 427 /* get routing information */
da6b8c20 428 orig_node = batadv_orig_hash_find(bat_priv, icmph->dst);
44524fcd 429 if (!orig_node)
b91a2543 430 goto free_skb;
c6c8fea2 431
44524fcd 432 /* create a copy of the skb, if needed, to modify it. */
0d125074 433 if (skb_cow(skb, ETH_HLEN) < 0)
b91a2543 434 goto put_orig_node;
c6c8fea2 435
da6b8c20 436 icmph = (struct batadv_icmp_header *)skb->data;
c6c8fea2 437
44524fcd 438 /* decrement ttl */
a40d9b07 439 icmph->ttl--;
44524fcd
ML
440
441 /* route it */
f50ca95a 442 res = batadv_send_skb_to_orig(skb, orig_node, recv_if);
b91a2543
SE
443 if (res == NET_XMIT_SUCCESS)
444 ret = NET_RX_SUCCESS;
c6c8fea2 445
b91a2543
SE
446 /* skb was consumed */
447 skb = NULL;
448
449put_orig_node:
44524fcd 450 if (orig_node)
5d967310 451 batadv_orig_node_put(orig_node);
b91a2543
SE
452free_skb:
453 kfree_skb(skb);
454
c6c8fea2
SE
455 return ret;
456}
457
f86ce0ad 458/**
7e9a8c2c 459 * batadv_check_unicast_packet() - Check for malformed unicast packets
6e0895c2 460 * @bat_priv: the bat priv with all the soft interface information
f86ce0ad
MH
461 * @skb: packet to check
462 * @hdr_size: size of header to pull
463 *
62fe710f
SE
464 * Check for short header and bad addresses in given packet.
465 *
466 * Return: negative value when check fails and 0 otherwise. The negative value
467 * depends on the reason: -ENODATA for bad header, -EBADR for broadcast
468 * destination or source, and -EREMOTE for non-local (other host) destination.
f86ce0ad 469 */
fe8a93b9
AQ
470static int batadv_check_unicast_packet(struct batadv_priv *bat_priv,
471 struct sk_buff *skb, int hdr_size)
ff51fd70
MH
472{
473 struct ethhdr *ethhdr;
474
475 /* drop packet if it has not necessary minimum size */
476 if (unlikely(!pskb_may_pull(skb, hdr_size)))
f86ce0ad 477 return -ENODATA;
ff51fd70 478
7ed4be95 479 ethhdr = eth_hdr(skb);
ff51fd70 480
93bbaab4
SE
481 /* packet with unicast indication but non-unicast recipient */
482 if (!is_valid_ether_addr(ethhdr->h_dest))
f86ce0ad 483 return -EBADR;
ff51fd70 484
9f75c8e1
SE
485 /* packet with broadcast/multicast sender address */
486 if (is_multicast_ether_addr(ethhdr->h_source))
f86ce0ad 487 return -EBADR;
ff51fd70
MH
488
489 /* not for me */
fe8a93b9 490 if (!batadv_is_my_mac(bat_priv, ethhdr->h_dest))
f86ce0ad 491 return -EREMOTE;
ff51fd70
MH
492
493 return 0;
494}
495
93652344 496/**
7e9a8c2c 497 * batadv_last_bonding_get() - Get last_bonding_candidate of orig_node
93652344
SE
498 * @orig_node: originator node whose last bonding candidate should be retrieved
499 *
500 * Return: last bonding candidate of router or NULL if not found
501 *
502 * The object is returned with refcounter increased by 1.
503 */
504static struct batadv_orig_ifinfo *
505batadv_last_bonding_get(struct batadv_orig_node *orig_node)
506{
507 struct batadv_orig_ifinfo *last_bonding_candidate;
508
509 spin_lock_bh(&orig_node->neigh_list_lock);
510 last_bonding_candidate = orig_node->last_bonding_candidate;
511
512 if (last_bonding_candidate)
513 kref_get(&last_bonding_candidate->refcount);
514 spin_unlock_bh(&orig_node->neigh_list_lock);
515
516 return last_bonding_candidate;
517}
518
15c2ed75 519/**
7e9a8c2c 520 * batadv_last_bonding_replace() - Replace last_bonding_candidate of orig_node
15c2ed75
SE
521 * @orig_node: originator node whose bonding candidates should be replaced
522 * @new_candidate: new bonding candidate or NULL
523 */
524static void
525batadv_last_bonding_replace(struct batadv_orig_node *orig_node,
526 struct batadv_orig_ifinfo *new_candidate)
527{
528 struct batadv_orig_ifinfo *old_candidate;
529
530 spin_lock_bh(&orig_node->neigh_list_lock);
531 old_candidate = orig_node->last_bonding_candidate;
532
533 if (new_candidate)
534 kref_get(&new_candidate->refcount);
535 orig_node->last_bonding_candidate = new_candidate;
536 spin_unlock_bh(&orig_node->neigh_list_lock);
537
538 if (old_candidate)
539 batadv_orig_ifinfo_put(old_candidate);
540}
541
f6c8b711 542/**
7e9a8c2c 543 * batadv_find_router() - find a suitable router for this originator
f6c8b711
SW
544 * @bat_priv: the bat priv with all the soft interface information
545 * @orig_node: the destination node
546 * @recv_if: pointer to interface this packet was received on
547 *
62fe710f 548 * Return: the router which should be used for this orig_node on
f6c8b711 549 * this interface, or NULL if not available.
9cfc7bd6 550 */
56303d34
SE
551struct batadv_neigh_node *
552batadv_find_router(struct batadv_priv *bat_priv,
553 struct batadv_orig_node *orig_node,
f3b3d901 554 struct batadv_hard_iface *recv_if)
c6c8fea2 555{
29824a55 556 struct batadv_algo_ops *bao = bat_priv->algo_ops;
f3b3d901
SW
557 struct batadv_neigh_node *first_candidate_router = NULL;
558 struct batadv_neigh_node *next_candidate_router = NULL;
559 struct batadv_neigh_node *router, *cand_router = NULL;
560 struct batadv_neigh_node *last_cand_router = NULL;
561 struct batadv_orig_ifinfo *cand, *first_candidate = NULL;
562 struct batadv_orig_ifinfo *next_candidate = NULL;
563 struct batadv_orig_ifinfo *last_candidate;
564 bool last_candidate_found = false;
c6c8fea2
SE
565
566 if (!orig_node)
567 return NULL;
568
7351a482 569 router = batadv_orig_router_get(orig_node, recv_if);
c6c8fea2 570
329887ad
SW
571 if (!router)
572 return router;
573
f3b3d901
SW
574 /* only consider bonding for recv_if == BATADV_IF_DEFAULT (first hop)
575 * and if activated.
576 */
329887ad 577 if (!(recv_if == BATADV_IF_DEFAULT && atomic_read(&bat_priv->bonding)))
f3b3d901
SW
578 return router;
579
580 /* bonding: loop through the list of possible routers found
581 * for the various outgoing interfaces and find a candidate after
582 * the last chosen bonding candidate (next_candidate). If no such
583 * router is found, use the first candidate found (the previously
584 * chosen bonding candidate might have been the last one in the list).
3f68785e 585 * If this can't be found either, return the previously chosen
f3b3d901
SW
586 * router - obviously there are no other candidates.
587 */
588 rcu_read_lock();
93652344 589 last_candidate = batadv_last_bonding_get(orig_node);
f3b3d901
SW
590 if (last_candidate)
591 last_cand_router = rcu_dereference(last_candidate->router);
592
593 hlist_for_each_entry_rcu(cand, &orig_node->ifinfo_list, list) {
594 /* acquire some structures and references ... */
a6ba0d34 595 if (!kref_get_unless_zero(&cand->refcount))
f3b3d901
SW
596 continue;
597
598 cand_router = rcu_dereference(cand->router);
599 if (!cand_router)
600 goto next;
601
77ae32e8 602 if (!kref_get_unless_zero(&cand_router->refcount)) {
f3b3d901
SW
603 cand_router = NULL;
604 goto next;
605 }
606
607 /* alternative candidate should be good enough to be
608 * considered
609 */
29824a55
AQ
610 if (!bao->neigh.is_similar_or_better(cand_router,
611 cand->if_outgoing, router,
612 recv_if))
f3b3d901
SW
613 goto next;
614
615 /* don't use the same router twice */
616 if (last_cand_router == cand_router)
617 goto next;
618
619 /* mark the first possible candidate */
620 if (!first_candidate) {
77ae32e8 621 kref_get(&cand_router->refcount);
a6ba0d34 622 kref_get(&cand->refcount);
f3b3d901
SW
623 first_candidate = cand;
624 first_candidate_router = cand_router;
625 }
626
627 /* check if the loop has already passed the previously selected
628 * candidate ... this function should select the next candidate
629 * AFTER the previously used bonding candidate.
630 */
631 if (!last_candidate || last_candidate_found) {
632 next_candidate = cand;
633 next_candidate_router = cand_router;
634 break;
635 }
636
637 if (last_candidate == cand)
638 last_candidate_found = true;
639next:
640 /* free references */
641 if (cand_router) {
25bb2509 642 batadv_neigh_node_put(cand_router);
f3b3d901
SW
643 cand_router = NULL;
644 }
35f94779 645 batadv_orig_ifinfo_put(cand);
f3b3d901
SW
646 }
647 rcu_read_unlock();
648
f3b3d901
SW
649 /* After finding candidates, handle the three cases:
650 * 1) there is a next candidate, use that
651 * 2) there is no next candidate, use the first of the list
652 * 3) there is no candidate at all, return the default router
653 */
654 if (next_candidate) {
25bb2509 655 batadv_neigh_node_put(router);
f3b3d901 656
15c2ed75 657 kref_get(&next_candidate_router->refcount);
f3b3d901 658 router = next_candidate_router;
15c2ed75 659 batadv_last_bonding_replace(orig_node, next_candidate);
f3b3d901 660 } else if (first_candidate) {
25bb2509 661 batadv_neigh_node_put(router);
f3b3d901 662
15c2ed75 663 kref_get(&first_candidate_router->refcount);
f3b3d901 664 router = first_candidate_router;
15c2ed75 665 batadv_last_bonding_replace(orig_node, first_candidate);
f3b3d901 666 } else {
15c2ed75
SE
667 batadv_last_bonding_replace(orig_node, NULL);
668 }
669
670 /* cleanup of candidates */
671 if (first_candidate) {
672 batadv_neigh_node_put(first_candidate_router);
673 batadv_orig_ifinfo_put(first_candidate);
674 }
675
676 if (next_candidate) {
677 batadv_neigh_node_put(next_candidate_router);
678 batadv_orig_ifinfo_put(next_candidate);
f3b3d901 679 }
f6c8b711 680
93652344
SE
681 if (last_candidate)
682 batadv_orig_ifinfo_put(last_candidate);
683
c6c8fea2
SE
684 return router;
685}
686
63b01037 687static int batadv_route_unicast_packet(struct sk_buff *skb,
56303d34 688 struct batadv_hard_iface *recv_if)
c6c8fea2 689{
56303d34
SE
690 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
691 struct batadv_orig_node *orig_node = NULL;
96412690 692 struct batadv_unicast_packet *unicast_packet;
7ed4be95 693 struct ethhdr *ethhdr = eth_hdr(skb);
c54f38c9 694 int res, hdr_len, ret = NET_RX_DROP;
63d443ef 695 unsigned int len;
c6c8fea2 696
96412690 697 unicast_packet = (struct batadv_unicast_packet *)skb->data;
c6c8fea2
SE
698
699 /* TTL exceeded */
a40d9b07 700 if (unicast_packet->ttl < 2) {
86ceb360
SE
701 pr_debug("Warning - can't forward unicast packet from %pM to %pM: ttl exceeded\n",
702 ethhdr->h_source, unicast_packet->dest);
b91a2543 703 goto free_skb;
c6c8fea2
SE
704 }
705
706 /* get routing information */
da641193 707 orig_node = batadv_orig_hash_find(bat_priv, unicast_packet->dest);
7aadf889 708
44524fcd 709 if (!orig_node)
b91a2543 710 goto free_skb;
c6c8fea2 711
c6c8fea2 712 /* create a copy of the skb, if needed, to modify it. */
0d125074 713 if (skb_cow(skb, ETH_HLEN) < 0)
b91a2543 714 goto put_orig_node;
c6c8fea2 715
c6c8fea2 716 /* decrement ttl */
f097e25d 717 unicast_packet = (struct batadv_unicast_packet *)skb->data;
a40d9b07 718 unicast_packet->ttl--;
c6c8fea2 719
a40d9b07 720 switch (unicast_packet->packet_type) {
c54f38c9
SW
721 case BATADV_UNICAST_4ADDR:
722 hdr_len = sizeof(struct batadv_unicast_4addr_packet);
723 break;
724 case BATADV_UNICAST:
725 hdr_len = sizeof(struct batadv_unicast_packet);
726 break;
727 default:
728 /* other packet types not supported - yet */
729 hdr_len = -1;
730 break;
731 }
732
733 if (hdr_len > 0)
734 batadv_skb_set_priority(skb, hdr_len);
735
63d443ef 736 len = skb->len;
e91ecfc6 737 res = batadv_send_skb_to_orig(skb, orig_node, recv_if);
95332477 738
e91ecfc6
MH
739 /* translate transmit result into receive result */
740 if (res == NET_XMIT_SUCCESS) {
0843f197 741 ret = NET_RX_SUCCESS;
e91ecfc6 742 /* skb was transmitted and consumed */
95332477
MH
743 batadv_inc_counter(bat_priv, BATADV_CNT_FORWARD);
744 batadv_add_counter(bat_priv, BATADV_CNT_FORWARD_BYTES,
63d443ef 745 len + ETH_HLEN);
95332477 746 }
c6c8fea2 747
0843f197
GF
748 /* skb was consumed */
749 skb = NULL;
750
b91a2543
SE
751put_orig_node:
752 batadv_orig_node_put(orig_node);
753free_skb:
754 kfree_skb(skb);
f50ca95a 755
44524fcd 756 return ret;
c6c8fea2
SE
757}
758
7c1fd91d 759/**
7e9a8c2c 760 * batadv_reroute_unicast_packet() - update the unicast header for re-routing
7c1fd91d
AQ
761 * @bat_priv: the bat priv with all the soft interface information
762 * @unicast_packet: the unicast header to be updated
763 * @dst_addr: the payload destination
c018ad3d 764 * @vid: VLAN identifier
7c1fd91d
AQ
765 *
766 * Search the translation table for dst_addr and update the unicast header with
767 * the new corresponding information (originator address where the destination
768 * client currently is and its known TTVN)
769 *
62fe710f 770 * Return: true if the packet header has been updated, false otherwise
7c1fd91d
AQ
771 */
772static bool
773batadv_reroute_unicast_packet(struct batadv_priv *bat_priv,
774 struct batadv_unicast_packet *unicast_packet,
6b5e971a 775 u8 *dst_addr, unsigned short vid)
7c1fd91d
AQ
776{
777 struct batadv_orig_node *orig_node = NULL;
778 struct batadv_hard_iface *primary_if = NULL;
779 bool ret = false;
6b5e971a 780 u8 *orig_addr, orig_ttvn;
7c1fd91d 781
c018ad3d 782 if (batadv_is_my_client(bat_priv, dst_addr, vid)) {
7c1fd91d
AQ
783 primary_if = batadv_primary_if_get_selected(bat_priv);
784 if (!primary_if)
785 goto out;
786 orig_addr = primary_if->net_dev->dev_addr;
6b5e971a 787 orig_ttvn = (u8)atomic_read(&bat_priv->tt.vn);
7c1fd91d 788 } else {
c018ad3d
AQ
789 orig_node = batadv_transtable_search(bat_priv, NULL, dst_addr,
790 vid);
7c1fd91d
AQ
791 if (!orig_node)
792 goto out;
793
794 if (batadv_compare_eth(orig_node->orig, unicast_packet->dest))
795 goto out;
796
797 orig_addr = orig_node->orig;
6b5e971a 798 orig_ttvn = (u8)atomic_read(&orig_node->last_ttvn);
7c1fd91d
AQ
799 }
800
801 /* update the packet header */
8fdd0153 802 ether_addr_copy(unicast_packet->dest, orig_addr);
7c1fd91d
AQ
803 unicast_packet->ttvn = orig_ttvn;
804
805 ret = true;
806out:
807 if (primary_if)
82047ad7 808 batadv_hardif_put(primary_if);
7c1fd91d 809 if (orig_node)
5d967310 810 batadv_orig_node_put(orig_node);
7c1fd91d
AQ
811
812 return ret;
813}
814
4b426b10
SE
815static bool batadv_check_unicast_ttvn(struct batadv_priv *bat_priv,
816 struct sk_buff *skb, int hdr_len)
817{
c018ad3d
AQ
818 struct batadv_unicast_packet *unicast_packet;
819 struct batadv_hard_iface *primary_if;
56303d34 820 struct batadv_orig_node *orig_node;
6b5e971a 821 u8 curr_ttvn, old_ttvn;
a73105b8 822 struct ethhdr *ethhdr;
c018ad3d 823 unsigned short vid;
3e34819e 824 int is_old_ttvn;
a73105b8 825
b8fcfa42 826 /* check if there is enough data before accessing it */
f1791425 827 if (!pskb_may_pull(skb, hdr_len + ETH_HLEN))
4b426b10 828 return false;
b8fcfa42
AQ
829
830 /* create a copy of the skb (in case of for re-routing) to modify it. */
831 if (skb_cow(skb, sizeof(*unicast_packet)) < 0)
4b426b10 832 return false;
a73105b8 833
96412690 834 unicast_packet = (struct batadv_unicast_packet *)skb->data;
c018ad3d 835 vid = batadv_get_vid(skb, hdr_len);
dd981ab0 836 ethhdr = (struct ethhdr *)(skb->data + hdr_len);
a73105b8 837
7c1fd91d
AQ
838 /* check if the destination client was served by this node and it is now
839 * roaming. In this case, it means that the node has got a ROAM_ADV
840 * message and that it knows the new destination in the mesh to re-route
841 * the packet to
842 */
c018ad3d 843 if (batadv_tt_local_client_is_roaming(bat_priv, ethhdr->h_dest, vid)) {
7c1fd91d 844 if (batadv_reroute_unicast_packet(bat_priv, unicast_packet,
c018ad3d 845 ethhdr->h_dest, vid))
23c4ec10
AG
846 batadv_dbg_ratelimited(BATADV_DBG_TT,
847 bat_priv,
848 "Rerouting unicast packet to %pM (dst=%pM): Local Roaming\n",
849 unicast_packet->dest,
850 ethhdr->h_dest);
7c1fd91d
AQ
851 /* at this point the mesh destination should have been
852 * substituted with the originator address found in the global
853 * table. If not, let the packet go untouched anyway because
854 * there is nothing the node can do
855 */
4b426b10 856 return true;
7c1fd91d
AQ
857 }
858
859 /* retrieve the TTVN known by this node for the packet destination. This
860 * value is used later to check if the node which sent (or re-routed
861 * last time) the packet had an updated information or not
862 */
6b5e971a 863 curr_ttvn = (u8)atomic_read(&bat_priv->tt.vn);
fe8a93b9 864 if (!batadv_is_my_mac(bat_priv, unicast_packet->dest)) {
da641193
SE
865 orig_node = batadv_orig_hash_find(bat_priv,
866 unicast_packet->dest);
7c1fd91d
AQ
867 /* if it is not possible to find the orig_node representing the
868 * destination, the packet can immediately be dropped as it will
869 * not be possible to deliver it
870 */
a73105b8 871 if (!orig_node)
4b426b10 872 return false;
a73105b8 873
6b5e971a 874 curr_ttvn = (u8)atomic_read(&orig_node->last_ttvn);
5d967310 875 batadv_orig_node_put(orig_node);
a73105b8
AQ
876 }
877
7c1fd91d
AQ
878 /* check if the TTVN contained in the packet is fresher than what the
879 * node knows
880 */
3e34819e 881 is_old_ttvn = batadv_seq_before(unicast_packet->ttvn, curr_ttvn);
7c1fd91d 882 if (!is_old_ttvn)
4b426b10 883 return true;
a73105b8 884
7c1fd91d
AQ
885 old_ttvn = unicast_packet->ttvn;
886 /* the packet was forged based on outdated network information. Its
887 * destination can possibly be updated and forwarded towards the new
888 * target host
889 */
890 if (batadv_reroute_unicast_packet(bat_priv, unicast_packet,
c018ad3d 891 ethhdr->h_dest, vid)) {
23c4ec10
AG
892 batadv_dbg_ratelimited(BATADV_DBG_TT, bat_priv,
893 "Rerouting unicast packet to %pM (dst=%pM): TTVN mismatch old_ttvn=%u new_ttvn=%u\n",
894 unicast_packet->dest, ethhdr->h_dest,
895 old_ttvn, curr_ttvn);
4b426b10 896 return true;
7c1fd91d 897 }
3275e7cc 898
7c1fd91d
AQ
899 /* the packet has not been re-routed: either the destination is
900 * currently served by this node or there is no destination at all and
901 * it is possible to drop the packet
902 */
c018ad3d 903 if (!batadv_is_my_client(bat_priv, ethhdr->h_dest, vid))
4b426b10 904 return false;
3275e7cc 905
7c1fd91d
AQ
906 /* update the header in order to let the packet be delivered to this
907 * node's soft interface
908 */
909 primary_if = batadv_primary_if_get_selected(bat_priv);
910 if (!primary_if)
4b426b10 911 return false;
a73105b8 912
8fdd0153 913 ether_addr_copy(unicast_packet->dest, primary_if->net_dev->dev_addr);
7c1fd91d 914
82047ad7 915 batadv_hardif_put(primary_if);
7c1fd91d
AQ
916
917 unicast_packet->ttvn = curr_ttvn;
a73105b8 918
4b426b10 919 return true;
a73105b8
AQ
920}
921
a1f1ac5c 922/**
7e9a8c2c 923 * batadv_recv_unhandled_unicast_packet() - receive and process packets which
a1f1ac5c
SW
924 * are in the unicast number space but not yet known to the implementation
925 * @skb: unicast tvlv packet to process
926 * @recv_if: pointer to interface this packet was received on
927 *
62fe710f 928 * Return: NET_RX_SUCCESS if the packet has been consumed or NET_RX_DROP
a1f1ac5c
SW
929 * otherwise.
930 */
931int batadv_recv_unhandled_unicast_packet(struct sk_buff *skb,
932 struct batadv_hard_iface *recv_if)
933{
934 struct batadv_unicast_packet *unicast_packet;
935 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
936 int check, hdr_size = sizeof(*unicast_packet);
937
938 check = batadv_check_unicast_packet(bat_priv, skb, hdr_size);
939 if (check < 0)
b91a2543 940 goto free_skb;
a1f1ac5c
SW
941
942 /* we don't know about this type, drop it. */
943 unicast_packet = (struct batadv_unicast_packet *)skb->data;
944 if (batadv_is_my_mac(bat_priv, unicast_packet->dest))
b91a2543 945 goto free_skb;
a1f1ac5c
SW
946
947 return batadv_route_unicast_packet(skb, recv_if);
b91a2543
SE
948
949free_skb:
950 kfree_skb(skb);
951 return NET_RX_DROP;
a1f1ac5c
SW
952}
953
ff15c27c
SE
954/**
955 * batadv_recv_unicast_packet() - Process incoming unicast packet
956 * @skb: incoming packet buffer
957 * @recv_if: incoming hard interface
958 *
959 * Return: NET_RX_SUCCESS on success or NET_RX_DROP in case of failure
960 */
56303d34
SE
961int batadv_recv_unicast_packet(struct sk_buff *skb,
962 struct batadv_hard_iface *recv_if)
c6c8fea2 963{
56303d34 964 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
96412690 965 struct batadv_unicast_packet *unicast_packet;
4046b24a 966 struct batadv_unicast_4addr_packet *unicast_4addr_packet;
9e794b6b
AP
967 u8 *orig_addr, *orig_addr_gw;
968 struct batadv_orig_node *orig_node = NULL, *orig_node_gw = NULL;
612d2b4f 969 int check, hdr_size = sizeof(*unicast_packet);
437bb0e6 970 enum batadv_subtype subtype;
9e794b6b 971 struct ethhdr *ethhdr;
b91a2543 972 int ret = NET_RX_DROP;
9e794b6b 973 bool is4addr, is_gw;
c6c8fea2 974
7cdcf6dd 975 unicast_packet = (struct batadv_unicast_packet *)skb->data;
4046b24a 976 unicast_4addr_packet = (struct batadv_unicast_4addr_packet *)skb->data;
9e794b6b 977 ethhdr = eth_hdr(skb);
7cdcf6dd 978
a40d9b07 979 is4addr = unicast_packet->packet_type == BATADV_UNICAST_4ADDR;
7cdcf6dd 980 /* the caller function should have already pulled 2 bytes */
c384ea3e 981 if (is4addr)
4046b24a 982 hdr_size = sizeof(*unicast_4addr_packet);
7cdcf6dd 983
612d2b4f 984 /* function returns -EREMOTE for promiscuous packets */
6e0895c2 985 check = batadv_check_unicast_packet(bat_priv, skb, hdr_size);
612d2b4f
MH
986
987 /* Even though the packet is not for us, we might save it to use for
988 * decoding a later received coded packet
989 */
990 if (check == -EREMOTE)
991 batadv_nc_skb_store_sniffed_unicast(bat_priv, skb);
992
993 if (check < 0)
b91a2543 994 goto free_skb;
dd981ab0 995 if (!batadv_check_unicast_ttvn(bat_priv, skb, hdr_size))
b91a2543 996 goto free_skb;
a73105b8 997
c6c8fea2 998 /* packet for me */
fe8a93b9 999 if (batadv_is_my_mac(bat_priv, unicast_packet->dest)) {
9e794b6b
AP
1000 /* If this is a unicast packet from another backgone gw,
1001 * drop it.
1002 */
1003 orig_addr_gw = ethhdr->h_source;
1004 orig_node_gw = batadv_orig_hash_find(bat_priv, orig_addr_gw);
1005 if (orig_node_gw) {
1006 is_gw = batadv_bla_is_backbone_gw(skb, orig_node_gw,
1007 hdr_size);
1008 batadv_orig_node_put(orig_node_gw);
1009 if (is_gw) {
1010 batadv_dbg(BATADV_DBG_BLA, bat_priv,
22f0502e
SE
1011 "%s(): Dropped unicast pkt received from another backbone gw %pM.\n",
1012 __func__, orig_addr_gw);
a1a745ef 1013 goto free_skb;
9e794b6b
AP
1014 }
1015 }
1016
9affec6b 1017 if (is4addr) {
437bb0e6
SW
1018 subtype = unicast_4addr_packet->subtype;
1019 batadv_dat_inc_counter(bat_priv, subtype);
1020
1021 /* Only payload data should be considered for speedy
1022 * join. For example, DAT also uses unicast 4addr
1023 * types, but those packets should not be considered
1024 * for speedy join, since the clients do not actually
1025 * reside at the sending originator.
1026 */
1027 if (subtype == BATADV_P_DATA) {
1028 orig_addr = unicast_4addr_packet->src;
1029 orig_node = batadv_orig_hash_find(bat_priv,
1030 orig_addr);
1031 }
9affec6b 1032 }
4046b24a 1033
c384ea3e
AQ
1034 if (batadv_dat_snoop_incoming_arp_request(bat_priv, skb,
1035 hdr_size))
1036 goto rx_success;
1037 if (batadv_dat_snoop_incoming_arp_reply(bat_priv, skb,
1038 hdr_size))
1039 goto rx_success;
1040
6535db56 1041 batadv_interface_rx(recv_if->soft_iface, skb, hdr_size,
9affec6b 1042 orig_node);
37135173 1043
c384ea3e 1044rx_success:
9affec6b 1045 if (orig_node)
5d967310 1046 batadv_orig_node_put(orig_node);
9affec6b 1047
c6c8fea2
SE
1048 return NET_RX_SUCCESS;
1049 }
1050
b91a2543
SE
1051 ret = batadv_route_unicast_packet(skb, recv_if);
1052 /* skb was consumed */
1053 skb = NULL;
1054
1055free_skb:
1056 kfree_skb(skb);
1057
1058 return ret;
c6c8fea2
SE
1059}
1060
ef261577 1061/**
7e9a8c2c 1062 * batadv_recv_unicast_tvlv() - receive and process unicast tvlv packets
ef261577
ML
1063 * @skb: unicast tvlv packet to process
1064 * @recv_if: pointer to interface this packet was received on
ef261577 1065 *
62fe710f 1066 * Return: NET_RX_SUCCESS if the packet has been consumed or NET_RX_DROP
ef261577
ML
1067 * otherwise.
1068 */
1069int batadv_recv_unicast_tvlv(struct sk_buff *skb,
1070 struct batadv_hard_iface *recv_if)
1071{
1072 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1073 struct batadv_unicast_tvlv_packet *unicast_tvlv_packet;
1074 unsigned char *tvlv_buff;
6b5e971a 1075 u16 tvlv_buff_len;
ef261577
ML
1076 int hdr_size = sizeof(*unicast_tvlv_packet);
1077 int ret = NET_RX_DROP;
1078
1079 if (batadv_check_unicast_packet(bat_priv, skb, hdr_size) < 0)
b91a2543 1080 goto free_skb;
ef261577
ML
1081
1082 /* the header is likely to be modified while forwarding */
1083 if (skb_cow(skb, hdr_size) < 0)
b91a2543 1084 goto free_skb;
ef261577
ML
1085
1086 /* packet needs to be linearized to access the tvlv content */
1087 if (skb_linearize(skb) < 0)
b91a2543 1088 goto free_skb;
ef261577
ML
1089
1090 unicast_tvlv_packet = (struct batadv_unicast_tvlv_packet *)skb->data;
1091
1092 tvlv_buff = (unsigned char *)(skb->data + hdr_size);
1093 tvlv_buff_len = ntohs(unicast_tvlv_packet->tvlv_len);
1094
1095 if (tvlv_buff_len > skb->len - hdr_size)
b91a2543 1096 goto free_skb;
ef261577
ML
1097
1098 ret = batadv_tvlv_containers_process(bat_priv, false, NULL,
1099 unicast_tvlv_packet->src,
1100 unicast_tvlv_packet->dst,
1101 tvlv_buff, tvlv_buff_len);
1102
b91a2543 1103 if (ret != NET_RX_SUCCESS) {
ef261577 1104 ret = batadv_route_unicast_packet(skb, recv_if);
b91a2543
SE
1105 /* skb was consumed */
1106 skb = NULL;
1107 }
1108
1109free_skb:
1110 kfree_skb(skb);
ef261577
ML
1111
1112 return ret;
1113}
c6c8fea2 1114
610bfc6b 1115/**
7e9a8c2c 1116 * batadv_recv_frag_packet() - process received fragment
610bfc6b
MH
1117 * @skb: the received fragment
1118 * @recv_if: interface that the skb is received on
1119 *
1120 * This function does one of the three following things: 1) Forward fragment, if
1121 * the assembled packet will exceed our MTU; 2) Buffer fragment, if we till
1122 * lack further fragments; 3) Merge fragments, if we have all needed parts.
1123 *
62fe710f 1124 * Return: NET_RX_DROP if the skb is not consumed, NET_RX_SUCCESS otherwise.
610bfc6b
MH
1125 */
1126int batadv_recv_frag_packet(struct sk_buff *skb,
1127 struct batadv_hard_iface *recv_if)
1128{
1129 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1130 struct batadv_orig_node *orig_node_src = NULL;
1131 struct batadv_frag_packet *frag_packet;
1132 int ret = NET_RX_DROP;
1133
1134 if (batadv_check_unicast_packet(bat_priv, skb,
1135 sizeof(*frag_packet)) < 0)
b91a2543 1136 goto free_skb;
610bfc6b
MH
1137
1138 frag_packet = (struct batadv_frag_packet *)skb->data;
1139 orig_node_src = batadv_orig_hash_find(bat_priv, frag_packet->orig);
1140 if (!orig_node_src)
b91a2543 1141 goto free_skb;
610bfc6b 1142
c0f25c80
AL
1143 skb->priority = frag_packet->priority + 256;
1144
610bfc6b
MH
1145 /* Route the fragment if it is not for us and too big to be merged. */
1146 if (!batadv_is_my_mac(bat_priv, frag_packet->dest) &&
1147 batadv_frag_skb_fwd(skb, recv_if, orig_node_src)) {
b91a2543
SE
1148 /* skb was consumed */
1149 skb = NULL;
610bfc6b 1150 ret = NET_RX_SUCCESS;
b91a2543 1151 goto put_orig_node;
610bfc6b
MH
1152 }
1153
1154 batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_RX);
1155 batadv_add_counter(bat_priv, BATADV_CNT_FRAG_RX_BYTES, skb->len);
1156
1157 /* Add fragment to buffer and merge if possible. */
1158 if (!batadv_frag_skb_buffer(&skb, orig_node_src))
b91a2543 1159 goto put_orig_node;
610bfc6b
MH
1160
1161 /* Deliver merged packet to the appropriate handler, if it was
1162 * merged
1163 */
b91a2543 1164 if (skb) {
610bfc6b
MH
1165 batadv_batman_skb_recv(skb, recv_if->net_dev,
1166 &recv_if->batman_adv_ptype, NULL);
b91a2543
SE
1167 /* skb was consumed */
1168 skb = NULL;
1169 }
610bfc6b
MH
1170
1171 ret = NET_RX_SUCCESS;
1172
b91a2543
SE
1173put_orig_node:
1174 batadv_orig_node_put(orig_node_src);
1175free_skb:
1176 kfree_skb(skb);
610bfc6b
MH
1177
1178 return ret;
1179}
1180
ff15c27c
SE
1181/**
1182 * batadv_recv_bcast_packet() - Process incoming broadcast packet
1183 * @skb: incoming packet buffer
1184 * @recv_if: incoming hard interface
1185 *
1186 * Return: NET_RX_SUCCESS on success or NET_RX_DROP in case of failure
1187 */
56303d34
SE
1188int batadv_recv_bcast_packet(struct sk_buff *skb,
1189 struct batadv_hard_iface *recv_if)
c6c8fea2 1190{
56303d34
SE
1191 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1192 struct batadv_orig_node *orig_node = NULL;
96412690 1193 struct batadv_bcast_packet *bcast_packet;
c6c8fea2 1194 struct ethhdr *ethhdr;
704509b8 1195 int hdr_size = sizeof(*bcast_packet);
f3e0008f 1196 int ret = NET_RX_DROP;
6b5e971a
SE
1197 s32 seq_diff;
1198 u32 seqno;
c6c8fea2
SE
1199
1200 /* drop packet if it has not necessary minimum size */
1201 if (unlikely(!pskb_may_pull(skb, hdr_size)))
b91a2543 1202 goto free_skb;
c6c8fea2 1203
7ed4be95 1204 ethhdr = eth_hdr(skb);
c6c8fea2
SE
1205
1206 /* packet with broadcast indication but unicast recipient */
1207 if (!is_broadcast_ether_addr(ethhdr->h_dest))
b91a2543 1208 goto free_skb;
c6c8fea2 1209
9f75c8e1
SE
1210 /* packet with broadcast/multicast sender address */
1211 if (is_multicast_ether_addr(ethhdr->h_source))
b91a2543 1212 goto free_skb;
c6c8fea2
SE
1213
1214 /* ignore broadcasts sent by myself */
fe8a93b9 1215 if (batadv_is_my_mac(bat_priv, ethhdr->h_source))
b91a2543 1216 goto free_skb;
c6c8fea2 1217
96412690 1218 bcast_packet = (struct batadv_bcast_packet *)skb->data;
c6c8fea2
SE
1219
1220 /* ignore broadcasts originated by myself */
fe8a93b9 1221 if (batadv_is_my_mac(bat_priv, bcast_packet->orig))
b91a2543 1222 goto free_skb;
c6c8fea2 1223
a40d9b07 1224 if (bcast_packet->ttl < 2)
b91a2543 1225 goto free_skb;
c6c8fea2 1226
da641193 1227 orig_node = batadv_orig_hash_find(bat_priv, bcast_packet->orig);
f3e0008f
ML
1228
1229 if (!orig_node)
b91a2543 1230 goto free_skb;
c6c8fea2 1231
f3e0008f 1232 spin_lock_bh(&orig_node->bcast_seqno_lock);
c6c8fea2 1233
3fba7325 1234 seqno = ntohl(bcast_packet->seqno);
c6c8fea2 1235 /* check whether the packet is a duplicate */
9b4a1159 1236 if (batadv_test_bit(orig_node->bcast_bits, orig_node->last_bcast_seqno,
3fba7325 1237 seqno))
f3e0008f 1238 goto spin_unlock;
c6c8fea2 1239
3fba7325 1240 seq_diff = seqno - orig_node->last_bcast_seqno;
c6c8fea2
SE
1241
1242 /* check whether the packet is old and the host just restarted. */
30d3c511 1243 if (batadv_window_protected(bat_priv, seq_diff,
81f02683
SW
1244 BATADV_BCAST_MAX_AGE,
1245 &orig_node->bcast_seqno_reset, NULL))
f3e0008f 1246 goto spin_unlock;
c6c8fea2
SE
1247
1248 /* mark broadcast in flood history, update window position
9cfc7bd6
SE
1249 * if required.
1250 */
0f5f9322 1251 if (batadv_bit_get_packet(bat_priv, orig_node->bcast_bits, seq_diff, 1))
3fba7325 1252 orig_node->last_bcast_seqno = seqno;
c6c8fea2 1253
f3e0008f 1254 spin_unlock_bh(&orig_node->bcast_seqno_lock);
f3e0008f 1255
fe2da6ff 1256 /* check whether this has been sent by another originator before */
004e86fc 1257 if (batadv_bla_check_bcast_duplist(bat_priv, skb))
b91a2543 1258 goto free_skb;
fe2da6ff 1259
c54f38c9
SW
1260 batadv_skb_set_priority(skb, sizeof(struct batadv_bcast_packet));
1261
c6c8fea2 1262 /* rebroadcast packet */
3111beed 1263 batadv_add_bcast_packet_to_list(bat_priv, skb, 1, false);
c6c8fea2 1264
23721387
SW
1265 /* don't hand the broadcast up if it is from an originator
1266 * from the same backbone.
1267 */
08adf151 1268 if (batadv_bla_is_backbone_gw(skb, orig_node, hdr_size))
b91a2543 1269 goto free_skb;
23721387 1270
c384ea3e
AQ
1271 if (batadv_dat_snoop_incoming_arp_request(bat_priv, skb, hdr_size))
1272 goto rx_success;
1273 if (batadv_dat_snoop_incoming_arp_reply(bat_priv, skb, hdr_size))
1274 goto rx_success;
1275
c6c8fea2 1276 /* broadcast for me */
6535db56 1277 batadv_interface_rx(recv_if->soft_iface, skb, hdr_size, orig_node);
c384ea3e
AQ
1278
1279rx_success:
f3e0008f
ML
1280 ret = NET_RX_SUCCESS;
1281 goto out;
c6c8fea2 1282
f3e0008f
ML
1283spin_unlock:
1284 spin_unlock_bh(&orig_node->bcast_seqno_lock);
b91a2543
SE
1285free_skb:
1286 kfree_skb(skb);
f3e0008f
ML
1287out:
1288 if (orig_node)
5d967310 1289 batadv_orig_node_put(orig_node);
f3e0008f 1290 return ret;
c6c8fea2 1291}