Commit | Line | Data |
---|---|---|
0046b040 | 1 | /* Copyright (C) 2007-2016 B.A.T.M.A.N. contributors: |
c6c8fea2 SE |
2 | * |
3 | * Marek Lindner, Simon Wunderlich | |
4 | * | |
5 | * This program is free software; you can redistribute it and/or | |
6 | * modify it under the terms of version 2 of the GNU General Public | |
7 | * License as published by the Free Software Foundation. | |
8 | * | |
9 | * This program is distributed in the hope that it will be useful, but | |
10 | * WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
12 | * General Public License for more details. | |
13 | * | |
14 | * You should have received a copy of the GNU General Public License | |
ebf38fb7 | 15 | * along with this program; if not, see <http://www.gnu.org/licenses/>. |
c6c8fea2 SE |
16 | */ |
17 | ||
c6c8fea2 | 18 | #include "routing.h" |
1e2c2a4f SE |
19 | #include "main.h" |
20 | ||
21 | #include <linux/atomic.h> | |
22 | #include <linux/byteorder/generic.h> | |
23 | #include <linux/compiler.h> | |
24 | #include <linux/errno.h> | |
25 | #include <linux/etherdevice.h> | |
26 | #include <linux/if_ether.h> | |
27 | #include <linux/jiffies.h> | |
a6ba0d34 | 28 | #include <linux/kref.h> |
1e2c2a4f SE |
29 | #include <linux/netdevice.h> |
30 | #include <linux/printk.h> | |
31 | #include <linux/rculist.h> | |
32 | #include <linux/rcupdate.h> | |
33 | #include <linux/skbuff.h> | |
34 | #include <linux/spinlock.h> | |
35 | #include <linux/stddef.h> | |
36 | ||
37 | #include "bitarray.h" | |
23721387 | 38 | #include "bridge_loop_avoidance.h" |
c384ea3e | 39 | #include "distributed-arp-table.h" |
610bfc6b | 40 | #include "fragmentation.h" |
1e2c2a4f SE |
41 | #include "hard-interface.h" |
42 | #include "icmp_socket.h" | |
43 | #include "network-coding.h" | |
44 | #include "originator.h" | |
45 | #include "packet.h" | |
46 | #include "send.h" | |
47 | #include "soft-interface.h" | |
48 | #include "translation-table.h" | |
c018ad3d | 49 | |
63b01037 | 50 | static int batadv_route_unicast_packet(struct sk_buff *skb, |
56303d34 | 51 | struct batadv_hard_iface *recv_if); |
a7f6ee94 | 52 | |
7351a482 SW |
53 | /** |
54 | * _batadv_update_route - set the router for this originator | |
55 | * @bat_priv: the bat priv with all the soft interface information | |
56 | * @orig_node: orig node which is to be configured | |
57 | * @recv_if: the receive interface for which this route is set | |
58 | * @neigh_node: neighbor which should be the next router | |
59 | * | |
60 | * This function does not perform any error checks | |
61 | */ | |
56303d34 SE |
62 | static void _batadv_update_route(struct batadv_priv *bat_priv, |
63 | struct batadv_orig_node *orig_node, | |
7351a482 | 64 | struct batadv_hard_iface *recv_if, |
56303d34 | 65 | struct batadv_neigh_node *neigh_node) |
c6c8fea2 | 66 | { |
7351a482 | 67 | struct batadv_orig_ifinfo *orig_ifinfo; |
56303d34 | 68 | struct batadv_neigh_node *curr_router; |
e1a5382f | 69 | |
7351a482 SW |
70 | orig_ifinfo = batadv_orig_ifinfo_get(orig_node, recv_if); |
71 | if (!orig_ifinfo) | |
72 | return; | |
73 | ||
74 | rcu_read_lock(); | |
75 | curr_router = rcu_dereference(orig_ifinfo->router); | |
77ae32e8 | 76 | if (curr_router && !kref_get_unless_zero(&curr_router->refcount)) |
7351a482 SW |
77 | curr_router = NULL; |
78 | rcu_read_unlock(); | |
a8e7f4bc | 79 | |
c6c8fea2 | 80 | /* route deleted */ |
e1a5382f | 81 | if ((curr_router) && (!neigh_node)) { |
39c75a51 SE |
82 | batadv_dbg(BATADV_DBG_ROUTES, bat_priv, |
83 | "Deleting route towards: %pM\n", orig_node->orig); | |
95fb130d | 84 | batadv_tt_global_del_orig(bat_priv, orig_node, -1, |
08c36d3e | 85 | "Deleted route towards originator"); |
c6c8fea2 | 86 | |
e1a5382f LL |
87 | /* route added */ |
88 | } else if ((!curr_router) && (neigh_node)) { | |
39c75a51 | 89 | batadv_dbg(BATADV_DBG_ROUTES, bat_priv, |
1eda58bf SE |
90 | "Adding route towards: %pM (via %pM)\n", |
91 | orig_node->orig, neigh_node->addr); | |
e1a5382f | 92 | /* route changed */ |
bb899b89 | 93 | } else if (neigh_node && curr_router) { |
39c75a51 | 94 | batadv_dbg(BATADV_DBG_ROUTES, bat_priv, |
1eda58bf SE |
95 | "Changing route towards: %pM (now via %pM - was via %pM)\n", |
96 | orig_node->orig, neigh_node->addr, | |
97 | curr_router->addr); | |
c6c8fea2 SE |
98 | } |
99 | ||
e1a5382f | 100 | if (curr_router) |
25bb2509 | 101 | batadv_neigh_node_put(curr_router); |
e1a5382f | 102 | |
e1a5382f | 103 | spin_lock_bh(&orig_node->neigh_list_lock); |
d1a65f17 SE |
104 | /* curr_router used earlier may not be the current orig_ifinfo->router |
105 | * anymore because it was dereferenced outside of the neigh_list_lock | |
106 | * protected region. After the new best neighbor has replace the current | |
107 | * best neighbor the reference counter needs to decrease. Consequently, | |
108 | * the code needs to ensure the curr_router variable contains a pointer | |
109 | * to the replaced best neighbor. | |
110 | */ | |
111 | curr_router = rcu_dereference_protected(orig_ifinfo->router, true); | |
112 | ||
f0b94ebc SE |
113 | /* increase refcount of new best neighbor */ |
114 | if (neigh_node) | |
115 | kref_get(&neigh_node->refcount); | |
116 | ||
7351a482 | 117 | rcu_assign_pointer(orig_ifinfo->router, neigh_node); |
e1a5382f | 118 | spin_unlock_bh(&orig_node->neigh_list_lock); |
35f94779 | 119 | batadv_orig_ifinfo_put(orig_ifinfo); |
e1a5382f LL |
120 | |
121 | /* decrease refcount of previous best neighbor */ | |
122 | if (curr_router) | |
25bb2509 | 123 | batadv_neigh_node_put(curr_router); |
c6c8fea2 SE |
124 | } |
125 | ||
7351a482 SW |
126 | /** |
127 | * batadv_update_route - set the router for this originator | |
128 | * @bat_priv: the bat priv with all the soft interface information | |
129 | * @orig_node: orig node which is to be configured | |
130 | * @recv_if: the receive interface for which this route is set | |
131 | * @neigh_node: neighbor which should be the next router | |
132 | */ | |
56303d34 SE |
133 | void batadv_update_route(struct batadv_priv *bat_priv, |
134 | struct batadv_orig_node *orig_node, | |
7351a482 | 135 | struct batadv_hard_iface *recv_if, |
56303d34 | 136 | struct batadv_neigh_node *neigh_node) |
c6c8fea2 | 137 | { |
56303d34 | 138 | struct batadv_neigh_node *router = NULL; |
c6c8fea2 SE |
139 | |
140 | if (!orig_node) | |
e1a5382f LL |
141 | goto out; |
142 | ||
7351a482 | 143 | router = batadv_orig_router_get(orig_node, recv_if); |
c6c8fea2 | 144 | |
e1a5382f | 145 | if (router != neigh_node) |
7351a482 | 146 | _batadv_update_route(bat_priv, orig_node, recv_if, neigh_node); |
e1a5382f LL |
147 | |
148 | out: | |
149 | if (router) | |
25bb2509 | 150 | batadv_neigh_node_put(router); |
c6c8fea2 SE |
151 | } |
152 | ||
62fe710f | 153 | /** |
7afcbbef | 154 | * batadv_window_protected - checks whether the host restarted and is in the |
62fe710f | 155 | * protection time. |
7afcbbef SE |
156 | * @bat_priv: the bat priv with all the soft interface information |
157 | * @seq_num_diff: difference between the current/received sequence number and | |
158 | * the last sequence number | |
81f02683 | 159 | * @seq_old_max_diff: maximum age of sequence number not considered as restart |
7afcbbef SE |
160 | * @last_reset: jiffies timestamp of the last reset, will be updated when reset |
161 | * is detected | |
81f02683 SW |
162 | * @protection_started: is set to true if the protection window was started, |
163 | * doesn't change otherwise. | |
62fe710f SE |
164 | * |
165 | * Return: | |
4b426b10 SE |
166 | * false if the packet is to be accepted. |
167 | * true if the packet is to be ignored. | |
c6c8fea2 | 168 | */ |
4b426b10 SE |
169 | bool batadv_window_protected(struct batadv_priv *bat_priv, s32 seq_num_diff, |
170 | s32 seq_old_max_diff, unsigned long *last_reset, | |
171 | bool *protection_started) | |
c6c8fea2 | 172 | { |
81f02683 | 173 | if (seq_num_diff <= -seq_old_max_diff || |
42d0b044 SE |
174 | seq_num_diff >= BATADV_EXPECTED_SEQNO_RANGE) { |
175 | if (!batadv_has_timed_out(*last_reset, | |
176 | BATADV_RESET_PROTECTION_MS)) | |
4b426b10 | 177 | return true; |
8c7bf248 ML |
178 | |
179 | *last_reset = jiffies; | |
81f02683 SW |
180 | if (protection_started) |
181 | *protection_started = true; | |
39c75a51 | 182 | batadv_dbg(BATADV_DBG_BATMAN, bat_priv, |
1eda58bf | 183 | "old packet received, start protection\n"); |
c6c8fea2 | 184 | } |
8c7bf248 | 185 | |
4b426b10 | 186 | return false; |
c6c8fea2 SE |
187 | } |
188 | ||
30d3c511 | 189 | bool batadv_check_management_packet(struct sk_buff *skb, |
56303d34 | 190 | struct batadv_hard_iface *hard_iface, |
30d3c511 | 191 | int header_len) |
c6c8fea2 | 192 | { |
c6c8fea2 SE |
193 | struct ethhdr *ethhdr; |
194 | ||
195 | /* drop packet if it has not necessary minimum size */ | |
c3e29312 ML |
196 | if (unlikely(!pskb_may_pull(skb, header_len))) |
197 | return false; | |
c6c8fea2 | 198 | |
7ed4be95 | 199 | ethhdr = eth_hdr(skb); |
c6c8fea2 SE |
200 | |
201 | /* packet with broadcast indication but unicast recipient */ | |
202 | if (!is_broadcast_ether_addr(ethhdr->h_dest)) | |
c3e29312 | 203 | return false; |
c6c8fea2 SE |
204 | |
205 | /* packet with broadcast sender address */ | |
206 | if (is_broadcast_ether_addr(ethhdr->h_source)) | |
c3e29312 | 207 | return false; |
c6c8fea2 SE |
208 | |
209 | /* create a copy of the skb, if needed, to modify it. */ | |
210 | if (skb_cow(skb, 0) < 0) | |
c3e29312 | 211 | return false; |
c6c8fea2 SE |
212 | |
213 | /* keep skb linear */ | |
214 | if (skb_linearize(skb) < 0) | |
c3e29312 | 215 | return false; |
c6c8fea2 | 216 | |
c3e29312 | 217 | return true; |
c6c8fea2 SE |
218 | } |
219 | ||
da6b8c20 SW |
220 | /** |
221 | * batadv_recv_my_icmp_packet - receive an icmp packet locally | |
222 | * @bat_priv: the bat priv with all the soft interface information | |
223 | * @skb: icmp packet to process | |
224 | * | |
62fe710f | 225 | * Return: NET_RX_SUCCESS if the packet has been consumed or NET_RX_DROP |
da6b8c20 SW |
226 | * otherwise. |
227 | */ | |
56303d34 | 228 | static int batadv_recv_my_icmp_packet(struct batadv_priv *bat_priv, |
da6b8c20 | 229 | struct sk_buff *skb) |
c6c8fea2 | 230 | { |
56303d34 SE |
231 | struct batadv_hard_iface *primary_if = NULL; |
232 | struct batadv_orig_node *orig_node = NULL; | |
da6b8c20 SW |
233 | struct batadv_icmp_header *icmph; |
234 | int res, ret = NET_RX_DROP; | |
c6c8fea2 | 235 | |
da6b8c20 | 236 | icmph = (struct batadv_icmp_header *)skb->data; |
c6c8fea2 | 237 | |
da6b8c20 SW |
238 | switch (icmph->msg_type) { |
239 | case BATADV_ECHO_REPLY: | |
240 | case BATADV_DESTINATION_UNREACHABLE: | |
241 | case BATADV_TTL_EXCEEDED: | |
242 | /* receive the packet */ | |
243 | if (skb_linearize(skb) < 0) | |
244 | break; | |
c6c8fea2 | 245 | |
da6b8c20 SW |
246 | batadv_socket_receive_packet(icmph, skb->len); |
247 | break; | |
248 | case BATADV_ECHO_REQUEST: | |
249 | /* answer echo request (ping) */ | |
250 | primary_if = batadv_primary_if_get_selected(bat_priv); | |
251 | if (!primary_if) | |
252 | goto out; | |
253 | ||
254 | /* get routing information */ | |
255 | orig_node = batadv_orig_hash_find(bat_priv, icmph->orig); | |
256 | if (!orig_node) | |
257 | goto out; | |
258 | ||
259 | /* create a copy of the skb, if needed, to modify it. */ | |
260 | if (skb_cow(skb, ETH_HLEN) < 0) | |
261 | goto out; | |
262 | ||
263 | icmph = (struct batadv_icmp_header *)skb->data; | |
264 | ||
8fdd0153 AQ |
265 | ether_addr_copy(icmph->dst, icmph->orig); |
266 | ether_addr_copy(icmph->orig, primary_if->net_dev->dev_addr); | |
da6b8c20 | 267 | icmph->msg_type = BATADV_ECHO_REPLY; |
a40d9b07 | 268 | icmph->ttl = BATADV_TTL; |
da6b8c20 SW |
269 | |
270 | res = batadv_send_skb_to_orig(skb, orig_node, NULL); | |
271 | if (res != NET_XMIT_DROP) | |
272 | ret = NET_RX_SUCCESS; | |
273 | ||
274 | break; | |
275 | default: | |
276 | /* drop unknown type */ | |
44524fcd | 277 | goto out; |
da6b8c20 | 278 | } |
44524fcd | 279 | out: |
32ae9b22 | 280 | if (primary_if) |
82047ad7 | 281 | batadv_hardif_put(primary_if); |
44524fcd | 282 | if (orig_node) |
5d967310 | 283 | batadv_orig_node_put(orig_node); |
c6c8fea2 SE |
284 | return ret; |
285 | } | |
286 | ||
56303d34 | 287 | static int batadv_recv_icmp_ttl_exceeded(struct batadv_priv *bat_priv, |
63b01037 | 288 | struct sk_buff *skb) |
c6c8fea2 | 289 | { |
56303d34 SE |
290 | struct batadv_hard_iface *primary_if = NULL; |
291 | struct batadv_orig_node *orig_node = NULL; | |
96412690 | 292 | struct batadv_icmp_packet *icmp_packet; |
44524fcd | 293 | int ret = NET_RX_DROP; |
c6c8fea2 | 294 | |
96412690 | 295 | icmp_packet = (struct batadv_icmp_packet *)skb->data; |
c6c8fea2 SE |
296 | |
297 | /* send TTL exceeded if packet is an echo request (traceroute) */ | |
27a417e6 | 298 | if (icmp_packet->msg_type != BATADV_ECHO_REQUEST) { |
86ceb360 | 299 | pr_debug("Warning - can't forward icmp packet from %pM to %pM: ttl exceeded\n", |
27a417e6 | 300 | icmp_packet->orig, icmp_packet->dst); |
44524fcd | 301 | goto out; |
c6c8fea2 SE |
302 | } |
303 | ||
e5d89254 | 304 | primary_if = batadv_primary_if_get_selected(bat_priv); |
32ae9b22 | 305 | if (!primary_if) |
44524fcd | 306 | goto out; |
c6c8fea2 SE |
307 | |
308 | /* get routing information */ | |
27a417e6 | 309 | orig_node = batadv_orig_hash_find(bat_priv, icmp_packet->orig); |
44524fcd | 310 | if (!orig_node) |
e1a5382f | 311 | goto out; |
c6c8fea2 | 312 | |
44524fcd | 313 | /* create a copy of the skb, if needed, to modify it. */ |
0d125074 | 314 | if (skb_cow(skb, ETH_HLEN) < 0) |
44524fcd | 315 | goto out; |
c6c8fea2 | 316 | |
96412690 | 317 | icmp_packet = (struct batadv_icmp_packet *)skb->data; |
c6c8fea2 | 318 | |
8fdd0153 AQ |
319 | ether_addr_copy(icmp_packet->dst, icmp_packet->orig); |
320 | ether_addr_copy(icmp_packet->orig, primary_if->net_dev->dev_addr); | |
27a417e6 AQ |
321 | icmp_packet->msg_type = BATADV_TTL_EXCEEDED; |
322 | icmp_packet->ttl = BATADV_TTL; | |
44524fcd | 323 | |
e91ecfc6 | 324 | if (batadv_send_skb_to_orig(skb, orig_node, NULL) != NET_XMIT_DROP) |
bb351ba0 | 325 | ret = NET_RX_SUCCESS; |
c6c8fea2 | 326 | |
44524fcd | 327 | out: |
32ae9b22 | 328 | if (primary_if) |
82047ad7 | 329 | batadv_hardif_put(primary_if); |
44524fcd | 330 | if (orig_node) |
5d967310 | 331 | batadv_orig_node_put(orig_node); |
c6c8fea2 SE |
332 | return ret; |
333 | } | |
334 | ||
56303d34 SE |
335 | int batadv_recv_icmp_packet(struct sk_buff *skb, |
336 | struct batadv_hard_iface *recv_if) | |
c6c8fea2 | 337 | { |
56303d34 | 338 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); |
da6b8c20 SW |
339 | struct batadv_icmp_header *icmph; |
340 | struct batadv_icmp_packet_rr *icmp_packet_rr; | |
c6c8fea2 | 341 | struct ethhdr *ethhdr; |
56303d34 | 342 | struct batadv_orig_node *orig_node = NULL; |
da6b8c20 | 343 | int hdr_size = sizeof(struct batadv_icmp_header); |
44524fcd | 344 | int ret = NET_RX_DROP; |
c6c8fea2 | 345 | |
c6c8fea2 SE |
346 | /* drop packet if it has not necessary minimum size */ |
347 | if (unlikely(!pskb_may_pull(skb, hdr_size))) | |
44524fcd | 348 | goto out; |
c6c8fea2 | 349 | |
7ed4be95 | 350 | ethhdr = eth_hdr(skb); |
c6c8fea2 SE |
351 | |
352 | /* packet with unicast indication but broadcast recipient */ | |
353 | if (is_broadcast_ether_addr(ethhdr->h_dest)) | |
44524fcd | 354 | goto out; |
c6c8fea2 SE |
355 | |
356 | /* packet with broadcast sender address */ | |
357 | if (is_broadcast_ether_addr(ethhdr->h_source)) | |
44524fcd | 358 | goto out; |
c6c8fea2 SE |
359 | |
360 | /* not for me */ | |
fe8a93b9 | 361 | if (!batadv_is_my_mac(bat_priv, ethhdr->h_dest)) |
44524fcd | 362 | goto out; |
c6c8fea2 | 363 | |
da6b8c20 | 364 | icmph = (struct batadv_icmp_header *)skb->data; |
c6c8fea2 SE |
365 | |
366 | /* add record route information if not full */ | |
da6b8c20 SW |
367 | if ((icmph->msg_type == BATADV_ECHO_REPLY || |
368 | icmph->msg_type == BATADV_ECHO_REQUEST) && | |
369 | (skb->len >= sizeof(struct batadv_icmp_packet_rr))) { | |
370 | if (skb_linearize(skb) < 0) | |
371 | goto out; | |
372 | ||
373 | /* create a copy of the skb, if needed, to modify it. */ | |
374 | if (skb_cow(skb, ETH_HLEN) < 0) | |
375 | goto out; | |
376 | ||
3b55e442 | 377 | ethhdr = eth_hdr(skb); |
da6b8c20 SW |
378 | icmph = (struct batadv_icmp_header *)skb->data; |
379 | icmp_packet_rr = (struct batadv_icmp_packet_rr *)icmph; | |
380 | if (icmp_packet_rr->rr_cur >= BATADV_RR_LEN) | |
381 | goto out; | |
382 | ||
8fdd0153 AQ |
383 | ether_addr_copy(icmp_packet_rr->rr[icmp_packet_rr->rr_cur], |
384 | ethhdr->h_dest); | |
da6b8c20 | 385 | icmp_packet_rr->rr_cur++; |
c6c8fea2 SE |
386 | } |
387 | ||
388 | /* packet for me */ | |
da6b8c20 SW |
389 | if (batadv_is_my_mac(bat_priv, icmph->dst)) |
390 | return batadv_recv_my_icmp_packet(bat_priv, skb); | |
c6c8fea2 SE |
391 | |
392 | /* TTL exceeded */ | |
a40d9b07 | 393 | if (icmph->ttl < 2) |
63b01037 | 394 | return batadv_recv_icmp_ttl_exceeded(bat_priv, skb); |
c6c8fea2 | 395 | |
c6c8fea2 | 396 | /* get routing information */ |
da6b8c20 | 397 | orig_node = batadv_orig_hash_find(bat_priv, icmph->dst); |
44524fcd | 398 | if (!orig_node) |
e1a5382f | 399 | goto out; |
c6c8fea2 | 400 | |
44524fcd | 401 | /* create a copy of the skb, if needed, to modify it. */ |
0d125074 | 402 | if (skb_cow(skb, ETH_HLEN) < 0) |
44524fcd | 403 | goto out; |
c6c8fea2 | 404 | |
da6b8c20 | 405 | icmph = (struct batadv_icmp_header *)skb->data; |
c6c8fea2 | 406 | |
44524fcd | 407 | /* decrement ttl */ |
a40d9b07 | 408 | icmph->ttl--; |
44524fcd ML |
409 | |
410 | /* route it */ | |
e91ecfc6 | 411 | if (batadv_send_skb_to_orig(skb, orig_node, recv_if) != NET_XMIT_DROP) |
bb351ba0 | 412 | ret = NET_RX_SUCCESS; |
c6c8fea2 | 413 | |
44524fcd | 414 | out: |
44524fcd | 415 | if (orig_node) |
5d967310 | 416 | batadv_orig_node_put(orig_node); |
c6c8fea2 SE |
417 | return ret; |
418 | } | |
419 | ||
f86ce0ad MH |
420 | /** |
421 | * batadv_check_unicast_packet - Check for malformed unicast packets | |
6e0895c2 | 422 | * @bat_priv: the bat priv with all the soft interface information |
f86ce0ad MH |
423 | * @skb: packet to check |
424 | * @hdr_size: size of header to pull | |
425 | * | |
62fe710f SE |
426 | * Check for short header and bad addresses in given packet. |
427 | * | |
428 | * Return: negative value when check fails and 0 otherwise. The negative value | |
429 | * depends on the reason: -ENODATA for bad header, -EBADR for broadcast | |
430 | * destination or source, and -EREMOTE for non-local (other host) destination. | |
f86ce0ad | 431 | */ |
fe8a93b9 AQ |
432 | static int batadv_check_unicast_packet(struct batadv_priv *bat_priv, |
433 | struct sk_buff *skb, int hdr_size) | |
ff51fd70 MH |
434 | { |
435 | struct ethhdr *ethhdr; | |
436 | ||
437 | /* drop packet if it has not necessary minimum size */ | |
438 | if (unlikely(!pskb_may_pull(skb, hdr_size))) | |
f86ce0ad | 439 | return -ENODATA; |
ff51fd70 | 440 | |
7ed4be95 | 441 | ethhdr = eth_hdr(skb); |
ff51fd70 MH |
442 | |
443 | /* packet with unicast indication but broadcast recipient */ | |
444 | if (is_broadcast_ether_addr(ethhdr->h_dest)) | |
f86ce0ad | 445 | return -EBADR; |
ff51fd70 MH |
446 | |
447 | /* packet with broadcast sender address */ | |
448 | if (is_broadcast_ether_addr(ethhdr->h_source)) | |
f86ce0ad | 449 | return -EBADR; |
ff51fd70 MH |
450 | |
451 | /* not for me */ | |
fe8a93b9 | 452 | if (!batadv_is_my_mac(bat_priv, ethhdr->h_dest)) |
f86ce0ad | 453 | return -EREMOTE; |
ff51fd70 MH |
454 | |
455 | return 0; | |
456 | } | |
457 | ||
15c2ed75 SE |
458 | /** |
459 | * batadv_last_bonding_replace - Replace last_bonding_candidate of orig_node | |
460 | * @orig_node: originator node whose bonding candidates should be replaced | |
461 | * @new_candidate: new bonding candidate or NULL | |
462 | */ | |
463 | static void | |
464 | batadv_last_bonding_replace(struct batadv_orig_node *orig_node, | |
465 | struct batadv_orig_ifinfo *new_candidate) | |
466 | { | |
467 | struct batadv_orig_ifinfo *old_candidate; | |
468 | ||
469 | spin_lock_bh(&orig_node->neigh_list_lock); | |
470 | old_candidate = orig_node->last_bonding_candidate; | |
471 | ||
472 | if (new_candidate) | |
473 | kref_get(&new_candidate->refcount); | |
474 | orig_node->last_bonding_candidate = new_candidate; | |
475 | spin_unlock_bh(&orig_node->neigh_list_lock); | |
476 | ||
477 | if (old_candidate) | |
478 | batadv_orig_ifinfo_put(old_candidate); | |
479 | } | |
480 | ||
f6c8b711 SW |
481 | /** |
482 | * batadv_find_router - find a suitable router for this originator | |
483 | * @bat_priv: the bat priv with all the soft interface information | |
484 | * @orig_node: the destination node | |
485 | * @recv_if: pointer to interface this packet was received on | |
486 | * | |
62fe710f | 487 | * Return: the router which should be used for this orig_node on |
f6c8b711 | 488 | * this interface, or NULL if not available. |
9cfc7bd6 | 489 | */ |
56303d34 SE |
490 | struct batadv_neigh_node * |
491 | batadv_find_router(struct batadv_priv *bat_priv, | |
492 | struct batadv_orig_node *orig_node, | |
f3b3d901 | 493 | struct batadv_hard_iface *recv_if) |
c6c8fea2 | 494 | { |
f3b3d901 SW |
495 | struct batadv_algo_ops *bao = bat_priv->bat_algo_ops; |
496 | struct batadv_neigh_node *first_candidate_router = NULL; | |
497 | struct batadv_neigh_node *next_candidate_router = NULL; | |
498 | struct batadv_neigh_node *router, *cand_router = NULL; | |
499 | struct batadv_neigh_node *last_cand_router = NULL; | |
500 | struct batadv_orig_ifinfo *cand, *first_candidate = NULL; | |
501 | struct batadv_orig_ifinfo *next_candidate = NULL; | |
502 | struct batadv_orig_ifinfo *last_candidate; | |
503 | bool last_candidate_found = false; | |
c6c8fea2 SE |
504 | |
505 | if (!orig_node) | |
506 | return NULL; | |
507 | ||
7351a482 | 508 | router = batadv_orig_router_get(orig_node, recv_if); |
c6c8fea2 | 509 | |
329887ad SW |
510 | if (!router) |
511 | return router; | |
512 | ||
f3b3d901 SW |
513 | /* only consider bonding for recv_if == BATADV_IF_DEFAULT (first hop) |
514 | * and if activated. | |
515 | */ | |
329887ad | 516 | if (!(recv_if == BATADV_IF_DEFAULT && atomic_read(&bat_priv->bonding))) |
f3b3d901 SW |
517 | return router; |
518 | ||
519 | /* bonding: loop through the list of possible routers found | |
520 | * for the various outgoing interfaces and find a candidate after | |
521 | * the last chosen bonding candidate (next_candidate). If no such | |
522 | * router is found, use the first candidate found (the previously | |
523 | * chosen bonding candidate might have been the last one in the list). | |
3f68785e | 524 | * If this can't be found either, return the previously chosen |
f3b3d901 SW |
525 | * router - obviously there are no other candidates. |
526 | */ | |
527 | rcu_read_lock(); | |
528 | last_candidate = orig_node->last_bonding_candidate; | |
529 | if (last_candidate) | |
530 | last_cand_router = rcu_dereference(last_candidate->router); | |
531 | ||
532 | hlist_for_each_entry_rcu(cand, &orig_node->ifinfo_list, list) { | |
533 | /* acquire some structures and references ... */ | |
a6ba0d34 | 534 | if (!kref_get_unless_zero(&cand->refcount)) |
f3b3d901 SW |
535 | continue; |
536 | ||
537 | cand_router = rcu_dereference(cand->router); | |
538 | if (!cand_router) | |
539 | goto next; | |
540 | ||
77ae32e8 | 541 | if (!kref_get_unless_zero(&cand_router->refcount)) { |
f3b3d901 SW |
542 | cand_router = NULL; |
543 | goto next; | |
544 | } | |
545 | ||
546 | /* alternative candidate should be good enough to be | |
547 | * considered | |
548 | */ | |
18165f6f SW |
549 | if (!bao->bat_neigh_is_similar_or_better(cand_router, |
550 | cand->if_outgoing, | |
551 | router, recv_if)) | |
f3b3d901 SW |
552 | goto next; |
553 | ||
554 | /* don't use the same router twice */ | |
555 | if (last_cand_router == cand_router) | |
556 | goto next; | |
557 | ||
558 | /* mark the first possible candidate */ | |
559 | if (!first_candidate) { | |
77ae32e8 | 560 | kref_get(&cand_router->refcount); |
a6ba0d34 | 561 | kref_get(&cand->refcount); |
f3b3d901 SW |
562 | first_candidate = cand; |
563 | first_candidate_router = cand_router; | |
564 | } | |
565 | ||
566 | /* check if the loop has already passed the previously selected | |
567 | * candidate ... this function should select the next candidate | |
568 | * AFTER the previously used bonding candidate. | |
569 | */ | |
570 | if (!last_candidate || last_candidate_found) { | |
571 | next_candidate = cand; | |
572 | next_candidate_router = cand_router; | |
573 | break; | |
574 | } | |
575 | ||
576 | if (last_candidate == cand) | |
577 | last_candidate_found = true; | |
578 | next: | |
579 | /* free references */ | |
580 | if (cand_router) { | |
25bb2509 | 581 | batadv_neigh_node_put(cand_router); |
f3b3d901 SW |
582 | cand_router = NULL; |
583 | } | |
35f94779 | 584 | batadv_orig_ifinfo_put(cand); |
f3b3d901 SW |
585 | } |
586 | rcu_read_unlock(); | |
587 | ||
f3b3d901 SW |
588 | /* After finding candidates, handle the three cases: |
589 | * 1) there is a next candidate, use that | |
590 | * 2) there is no next candidate, use the first of the list | |
591 | * 3) there is no candidate at all, return the default router | |
592 | */ | |
593 | if (next_candidate) { | |
25bb2509 | 594 | batadv_neigh_node_put(router); |
f3b3d901 | 595 | |
15c2ed75 | 596 | kref_get(&next_candidate_router->refcount); |
f3b3d901 | 597 | router = next_candidate_router; |
15c2ed75 | 598 | batadv_last_bonding_replace(orig_node, next_candidate); |
f3b3d901 | 599 | } else if (first_candidate) { |
25bb2509 | 600 | batadv_neigh_node_put(router); |
f3b3d901 | 601 | |
15c2ed75 | 602 | kref_get(&first_candidate_router->refcount); |
f3b3d901 | 603 | router = first_candidate_router; |
15c2ed75 | 604 | batadv_last_bonding_replace(orig_node, first_candidate); |
f3b3d901 | 605 | } else { |
15c2ed75 SE |
606 | batadv_last_bonding_replace(orig_node, NULL); |
607 | } | |
608 | ||
609 | /* cleanup of candidates */ | |
610 | if (first_candidate) { | |
611 | batadv_neigh_node_put(first_candidate_router); | |
612 | batadv_orig_ifinfo_put(first_candidate); | |
613 | } | |
614 | ||
615 | if (next_candidate) { | |
616 | batadv_neigh_node_put(next_candidate_router); | |
617 | batadv_orig_ifinfo_put(next_candidate); | |
f3b3d901 | 618 | } |
f6c8b711 | 619 | |
c6c8fea2 SE |
620 | return router; |
621 | } | |
622 | ||
63b01037 | 623 | static int batadv_route_unicast_packet(struct sk_buff *skb, |
56303d34 | 624 | struct batadv_hard_iface *recv_if) |
c6c8fea2 | 625 | { |
56303d34 SE |
626 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); |
627 | struct batadv_orig_node *orig_node = NULL; | |
96412690 | 628 | struct batadv_unicast_packet *unicast_packet; |
7ed4be95 | 629 | struct ethhdr *ethhdr = eth_hdr(skb); |
c54f38c9 | 630 | int res, hdr_len, ret = NET_RX_DROP; |
63d443ef | 631 | unsigned int len; |
c6c8fea2 | 632 | |
96412690 | 633 | unicast_packet = (struct batadv_unicast_packet *)skb->data; |
c6c8fea2 SE |
634 | |
635 | /* TTL exceeded */ | |
a40d9b07 | 636 | if (unicast_packet->ttl < 2) { |
86ceb360 SE |
637 | pr_debug("Warning - can't forward unicast packet from %pM to %pM: ttl exceeded\n", |
638 | ethhdr->h_source, unicast_packet->dest); | |
44524fcd | 639 | goto out; |
c6c8fea2 SE |
640 | } |
641 | ||
642 | /* get routing information */ | |
da641193 | 643 | orig_node = batadv_orig_hash_find(bat_priv, unicast_packet->dest); |
7aadf889 | 644 | |
44524fcd | 645 | if (!orig_node) |
b5a6f69c | 646 | goto out; |
c6c8fea2 | 647 | |
c6c8fea2 | 648 | /* create a copy of the skb, if needed, to modify it. */ |
0d125074 | 649 | if (skb_cow(skb, ETH_HLEN) < 0) |
44524fcd | 650 | goto out; |
c6c8fea2 | 651 | |
c6c8fea2 | 652 | /* decrement ttl */ |
f097e25d | 653 | unicast_packet = (struct batadv_unicast_packet *)skb->data; |
a40d9b07 | 654 | unicast_packet->ttl--; |
c6c8fea2 | 655 | |
a40d9b07 | 656 | switch (unicast_packet->packet_type) { |
c54f38c9 SW |
657 | case BATADV_UNICAST_4ADDR: |
658 | hdr_len = sizeof(struct batadv_unicast_4addr_packet); | |
659 | break; | |
660 | case BATADV_UNICAST: | |
661 | hdr_len = sizeof(struct batadv_unicast_packet); | |
662 | break; | |
663 | default: | |
664 | /* other packet types not supported - yet */ | |
665 | hdr_len = -1; | |
666 | break; | |
667 | } | |
668 | ||
669 | if (hdr_len > 0) | |
670 | batadv_skb_set_priority(skb, hdr_len); | |
671 | ||
63d443ef | 672 | len = skb->len; |
e91ecfc6 | 673 | res = batadv_send_skb_to_orig(skb, orig_node, recv_if); |
95332477 | 674 | |
e91ecfc6 MH |
675 | /* translate transmit result into receive result */ |
676 | if (res == NET_XMIT_SUCCESS) { | |
677 | /* skb was transmitted and consumed */ | |
95332477 MH |
678 | batadv_inc_counter(bat_priv, BATADV_CNT_FORWARD); |
679 | batadv_add_counter(bat_priv, BATADV_CNT_FORWARD_BYTES, | |
63d443ef | 680 | len + ETH_HLEN); |
e91ecfc6 MH |
681 | |
682 | ret = NET_RX_SUCCESS; | |
683 | } else if (res == NET_XMIT_POLICED) { | |
684 | /* skb was buffered and consumed */ | |
685 | ret = NET_RX_SUCCESS; | |
95332477 | 686 | } |
c6c8fea2 | 687 | |
44524fcd | 688 | out: |
44524fcd | 689 | if (orig_node) |
5d967310 | 690 | batadv_orig_node_put(orig_node); |
44524fcd | 691 | return ret; |
c6c8fea2 SE |
692 | } |
693 | ||
7c1fd91d AQ |
694 | /** |
695 | * batadv_reroute_unicast_packet - update the unicast header for re-routing | |
696 | * @bat_priv: the bat priv with all the soft interface information | |
697 | * @unicast_packet: the unicast header to be updated | |
698 | * @dst_addr: the payload destination | |
c018ad3d | 699 | * @vid: VLAN identifier |
7c1fd91d AQ |
700 | * |
701 | * Search the translation table for dst_addr and update the unicast header with | |
702 | * the new corresponding information (originator address where the destination | |
703 | * client currently is and its known TTVN) | |
704 | * | |
62fe710f | 705 | * Return: true if the packet header has been updated, false otherwise |
7c1fd91d AQ |
706 | */ |
707 | static bool | |
708 | batadv_reroute_unicast_packet(struct batadv_priv *bat_priv, | |
709 | struct batadv_unicast_packet *unicast_packet, | |
6b5e971a | 710 | u8 *dst_addr, unsigned short vid) |
7c1fd91d AQ |
711 | { |
712 | struct batadv_orig_node *orig_node = NULL; | |
713 | struct batadv_hard_iface *primary_if = NULL; | |
714 | bool ret = false; | |
6b5e971a | 715 | u8 *orig_addr, orig_ttvn; |
7c1fd91d | 716 | |
c018ad3d | 717 | if (batadv_is_my_client(bat_priv, dst_addr, vid)) { |
7c1fd91d AQ |
718 | primary_if = batadv_primary_if_get_selected(bat_priv); |
719 | if (!primary_if) | |
720 | goto out; | |
721 | orig_addr = primary_if->net_dev->dev_addr; | |
6b5e971a | 722 | orig_ttvn = (u8)atomic_read(&bat_priv->tt.vn); |
7c1fd91d | 723 | } else { |
c018ad3d AQ |
724 | orig_node = batadv_transtable_search(bat_priv, NULL, dst_addr, |
725 | vid); | |
7c1fd91d AQ |
726 | if (!orig_node) |
727 | goto out; | |
728 | ||
729 | if (batadv_compare_eth(orig_node->orig, unicast_packet->dest)) | |
730 | goto out; | |
731 | ||
732 | orig_addr = orig_node->orig; | |
6b5e971a | 733 | orig_ttvn = (u8)atomic_read(&orig_node->last_ttvn); |
7c1fd91d AQ |
734 | } |
735 | ||
736 | /* update the packet header */ | |
8fdd0153 | 737 | ether_addr_copy(unicast_packet->dest, orig_addr); |
7c1fd91d AQ |
738 | unicast_packet->ttvn = orig_ttvn; |
739 | ||
740 | ret = true; | |
741 | out: | |
742 | if (primary_if) | |
82047ad7 | 743 | batadv_hardif_put(primary_if); |
7c1fd91d | 744 | if (orig_node) |
5d967310 | 745 | batadv_orig_node_put(orig_node); |
7c1fd91d AQ |
746 | |
747 | return ret; | |
748 | } | |
749 | ||
4b426b10 SE |
750 | static bool batadv_check_unicast_ttvn(struct batadv_priv *bat_priv, |
751 | struct sk_buff *skb, int hdr_len) | |
752 | { | |
c018ad3d AQ |
753 | struct batadv_unicast_packet *unicast_packet; |
754 | struct batadv_hard_iface *primary_if; | |
56303d34 | 755 | struct batadv_orig_node *orig_node; |
6b5e971a | 756 | u8 curr_ttvn, old_ttvn; |
a73105b8 | 757 | struct ethhdr *ethhdr; |
c018ad3d | 758 | unsigned short vid; |
3e34819e | 759 | int is_old_ttvn; |
a73105b8 | 760 | |
b8fcfa42 | 761 | /* check if there is enough data before accessing it */ |
f1791425 | 762 | if (!pskb_may_pull(skb, hdr_len + ETH_HLEN)) |
4b426b10 | 763 | return false; |
b8fcfa42 AQ |
764 | |
765 | /* create a copy of the skb (in case of for re-routing) to modify it. */ | |
766 | if (skb_cow(skb, sizeof(*unicast_packet)) < 0) | |
4b426b10 | 767 | return false; |
a73105b8 | 768 | |
96412690 | 769 | unicast_packet = (struct batadv_unicast_packet *)skb->data; |
c018ad3d | 770 | vid = batadv_get_vid(skb, hdr_len); |
dd981ab0 | 771 | ethhdr = (struct ethhdr *)(skb->data + hdr_len); |
a73105b8 | 772 | |
7c1fd91d AQ |
773 | /* check if the destination client was served by this node and it is now |
774 | * roaming. In this case, it means that the node has got a ROAM_ADV | |
775 | * message and that it knows the new destination in the mesh to re-route | |
776 | * the packet to | |
777 | */ | |
c018ad3d | 778 | if (batadv_tt_local_client_is_roaming(bat_priv, ethhdr->h_dest, vid)) { |
7c1fd91d | 779 | if (batadv_reroute_unicast_packet(bat_priv, unicast_packet, |
c018ad3d | 780 | ethhdr->h_dest, vid)) |
23c4ec10 AG |
781 | batadv_dbg_ratelimited(BATADV_DBG_TT, |
782 | bat_priv, | |
783 | "Rerouting unicast packet to %pM (dst=%pM): Local Roaming\n", | |
784 | unicast_packet->dest, | |
785 | ethhdr->h_dest); | |
7c1fd91d AQ |
786 | /* at this point the mesh destination should have been |
787 | * substituted with the originator address found in the global | |
788 | * table. If not, let the packet go untouched anyway because | |
789 | * there is nothing the node can do | |
790 | */ | |
4b426b10 | 791 | return true; |
7c1fd91d AQ |
792 | } |
793 | ||
794 | /* retrieve the TTVN known by this node for the packet destination. This | |
795 | * value is used later to check if the node which sent (or re-routed | |
796 | * last time) the packet had an updated information or not | |
797 | */ | |
6b5e971a | 798 | curr_ttvn = (u8)atomic_read(&bat_priv->tt.vn); |
fe8a93b9 | 799 | if (!batadv_is_my_mac(bat_priv, unicast_packet->dest)) { |
da641193 SE |
800 | orig_node = batadv_orig_hash_find(bat_priv, |
801 | unicast_packet->dest); | |
7c1fd91d AQ |
802 | /* if it is not possible to find the orig_node representing the |
803 | * destination, the packet can immediately be dropped as it will | |
804 | * not be possible to deliver it | |
805 | */ | |
a73105b8 | 806 | if (!orig_node) |
4b426b10 | 807 | return false; |
a73105b8 | 808 | |
6b5e971a | 809 | curr_ttvn = (u8)atomic_read(&orig_node->last_ttvn); |
5d967310 | 810 | batadv_orig_node_put(orig_node); |
a73105b8 AQ |
811 | } |
812 | ||
7c1fd91d AQ |
813 | /* check if the TTVN contained in the packet is fresher than what the |
814 | * node knows | |
815 | */ | |
3e34819e | 816 | is_old_ttvn = batadv_seq_before(unicast_packet->ttvn, curr_ttvn); |
7c1fd91d | 817 | if (!is_old_ttvn) |
4b426b10 | 818 | return true; |
a73105b8 | 819 | |
7c1fd91d AQ |
820 | old_ttvn = unicast_packet->ttvn; |
821 | /* the packet was forged based on outdated network information. Its | |
822 | * destination can possibly be updated and forwarded towards the new | |
823 | * target host | |
824 | */ | |
825 | if (batadv_reroute_unicast_packet(bat_priv, unicast_packet, | |
c018ad3d | 826 | ethhdr->h_dest, vid)) { |
23c4ec10 AG |
827 | batadv_dbg_ratelimited(BATADV_DBG_TT, bat_priv, |
828 | "Rerouting unicast packet to %pM (dst=%pM): TTVN mismatch old_ttvn=%u new_ttvn=%u\n", | |
829 | unicast_packet->dest, ethhdr->h_dest, | |
830 | old_ttvn, curr_ttvn); | |
4b426b10 | 831 | return true; |
7c1fd91d | 832 | } |
3275e7cc | 833 | |
7c1fd91d AQ |
834 | /* the packet has not been re-routed: either the destination is |
835 | * currently served by this node or there is no destination at all and | |
836 | * it is possible to drop the packet | |
837 | */ | |
c018ad3d | 838 | if (!batadv_is_my_client(bat_priv, ethhdr->h_dest, vid)) |
4b426b10 | 839 | return false; |
3275e7cc | 840 | |
7c1fd91d AQ |
841 | /* update the header in order to let the packet be delivered to this |
842 | * node's soft interface | |
843 | */ | |
844 | primary_if = batadv_primary_if_get_selected(bat_priv); | |
845 | if (!primary_if) | |
4b426b10 | 846 | return false; |
a73105b8 | 847 | |
8fdd0153 | 848 | ether_addr_copy(unicast_packet->dest, primary_if->net_dev->dev_addr); |
7c1fd91d | 849 | |
82047ad7 | 850 | batadv_hardif_put(primary_if); |
7c1fd91d AQ |
851 | |
852 | unicast_packet->ttvn = curr_ttvn; | |
a73105b8 | 853 | |
4b426b10 | 854 | return true; |
a73105b8 AQ |
855 | } |
856 | ||
a1f1ac5c SW |
857 | /** |
858 | * batadv_recv_unhandled_unicast_packet - receive and process packets which | |
859 | * are in the unicast number space but not yet known to the implementation | |
860 | * @skb: unicast tvlv packet to process | |
861 | * @recv_if: pointer to interface this packet was received on | |
862 | * | |
62fe710f | 863 | * Return: NET_RX_SUCCESS if the packet has been consumed or NET_RX_DROP |
a1f1ac5c SW |
864 | * otherwise. |
865 | */ | |
866 | int batadv_recv_unhandled_unicast_packet(struct sk_buff *skb, | |
867 | struct batadv_hard_iface *recv_if) | |
868 | { | |
869 | struct batadv_unicast_packet *unicast_packet; | |
870 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); | |
871 | int check, hdr_size = sizeof(*unicast_packet); | |
872 | ||
873 | check = batadv_check_unicast_packet(bat_priv, skb, hdr_size); | |
874 | if (check < 0) | |
875 | return NET_RX_DROP; | |
876 | ||
877 | /* we don't know about this type, drop it. */ | |
878 | unicast_packet = (struct batadv_unicast_packet *)skb->data; | |
879 | if (batadv_is_my_mac(bat_priv, unicast_packet->dest)) | |
880 | return NET_RX_DROP; | |
881 | ||
882 | return batadv_route_unicast_packet(skb, recv_if); | |
883 | } | |
884 | ||
56303d34 SE |
885 | int batadv_recv_unicast_packet(struct sk_buff *skb, |
886 | struct batadv_hard_iface *recv_if) | |
c6c8fea2 | 887 | { |
56303d34 | 888 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); |
96412690 | 889 | struct batadv_unicast_packet *unicast_packet; |
4046b24a | 890 | struct batadv_unicast_4addr_packet *unicast_4addr_packet; |
6b5e971a | 891 | u8 *orig_addr; |
9affec6b | 892 | struct batadv_orig_node *orig_node = NULL; |
612d2b4f | 893 | int check, hdr_size = sizeof(*unicast_packet); |
437bb0e6 | 894 | enum batadv_subtype subtype; |
c384ea3e | 895 | bool is4addr; |
c6c8fea2 | 896 | |
7cdcf6dd | 897 | unicast_packet = (struct batadv_unicast_packet *)skb->data; |
4046b24a | 898 | unicast_4addr_packet = (struct batadv_unicast_4addr_packet *)skb->data; |
7cdcf6dd | 899 | |
a40d9b07 | 900 | is4addr = unicast_packet->packet_type == BATADV_UNICAST_4ADDR; |
7cdcf6dd | 901 | /* the caller function should have already pulled 2 bytes */ |
c384ea3e | 902 | if (is4addr) |
4046b24a | 903 | hdr_size = sizeof(*unicast_4addr_packet); |
7cdcf6dd | 904 | |
612d2b4f | 905 | /* function returns -EREMOTE for promiscuous packets */ |
6e0895c2 | 906 | check = batadv_check_unicast_packet(bat_priv, skb, hdr_size); |
612d2b4f MH |
907 | |
908 | /* Even though the packet is not for us, we might save it to use for | |
909 | * decoding a later received coded packet | |
910 | */ | |
911 | if (check == -EREMOTE) | |
912 | batadv_nc_skb_store_sniffed_unicast(bat_priv, skb); | |
913 | ||
914 | if (check < 0) | |
c6c8fea2 | 915 | return NET_RX_DROP; |
dd981ab0 | 916 | if (!batadv_check_unicast_ttvn(bat_priv, skb, hdr_size)) |
a73105b8 AQ |
917 | return NET_RX_DROP; |
918 | ||
c6c8fea2 | 919 | /* packet for me */ |
fe8a93b9 | 920 | if (batadv_is_my_mac(bat_priv, unicast_packet->dest)) { |
9affec6b | 921 | if (is4addr) { |
437bb0e6 SW |
922 | subtype = unicast_4addr_packet->subtype; |
923 | batadv_dat_inc_counter(bat_priv, subtype); | |
924 | ||
925 | /* Only payload data should be considered for speedy | |
926 | * join. For example, DAT also uses unicast 4addr | |
927 | * types, but those packets should not be considered | |
928 | * for speedy join, since the clients do not actually | |
929 | * reside at the sending originator. | |
930 | */ | |
931 | if (subtype == BATADV_P_DATA) { | |
932 | orig_addr = unicast_4addr_packet->src; | |
933 | orig_node = batadv_orig_hash_find(bat_priv, | |
934 | orig_addr); | |
935 | } | |
9affec6b | 936 | } |
4046b24a | 937 | |
c384ea3e AQ |
938 | if (batadv_dat_snoop_incoming_arp_request(bat_priv, skb, |
939 | hdr_size)) | |
940 | goto rx_success; | |
941 | if (batadv_dat_snoop_incoming_arp_reply(bat_priv, skb, | |
942 | hdr_size)) | |
943 | goto rx_success; | |
944 | ||
6535db56 | 945 | batadv_interface_rx(recv_if->soft_iface, skb, hdr_size, |
9affec6b | 946 | orig_node); |
37135173 | 947 | |
c384ea3e | 948 | rx_success: |
9affec6b | 949 | if (orig_node) |
5d967310 | 950 | batadv_orig_node_put(orig_node); |
9affec6b | 951 | |
c6c8fea2 SE |
952 | return NET_RX_SUCCESS; |
953 | } | |
954 | ||
63b01037 | 955 | return batadv_route_unicast_packet(skb, recv_if); |
c6c8fea2 SE |
956 | } |
957 | ||
ef261577 ML |
958 | /** |
959 | * batadv_recv_unicast_tvlv - receive and process unicast tvlv packets | |
960 | * @skb: unicast tvlv packet to process | |
961 | * @recv_if: pointer to interface this packet was received on | |
ef261577 | 962 | * |
62fe710f | 963 | * Return: NET_RX_SUCCESS if the packet has been consumed or NET_RX_DROP |
ef261577 ML |
964 | * otherwise. |
965 | */ | |
966 | int batadv_recv_unicast_tvlv(struct sk_buff *skb, | |
967 | struct batadv_hard_iface *recv_if) | |
968 | { | |
969 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); | |
970 | struct batadv_unicast_tvlv_packet *unicast_tvlv_packet; | |
971 | unsigned char *tvlv_buff; | |
6b5e971a | 972 | u16 tvlv_buff_len; |
ef261577 ML |
973 | int hdr_size = sizeof(*unicast_tvlv_packet); |
974 | int ret = NET_RX_DROP; | |
975 | ||
976 | if (batadv_check_unicast_packet(bat_priv, skb, hdr_size) < 0) | |
977 | return NET_RX_DROP; | |
978 | ||
979 | /* the header is likely to be modified while forwarding */ | |
980 | if (skb_cow(skb, hdr_size) < 0) | |
981 | return NET_RX_DROP; | |
982 | ||
983 | /* packet needs to be linearized to access the tvlv content */ | |
984 | if (skb_linearize(skb) < 0) | |
985 | return NET_RX_DROP; | |
986 | ||
987 | unicast_tvlv_packet = (struct batadv_unicast_tvlv_packet *)skb->data; | |
988 | ||
989 | tvlv_buff = (unsigned char *)(skb->data + hdr_size); | |
990 | tvlv_buff_len = ntohs(unicast_tvlv_packet->tvlv_len); | |
991 | ||
992 | if (tvlv_buff_len > skb->len - hdr_size) | |
993 | return NET_RX_DROP; | |
994 | ||
995 | ret = batadv_tvlv_containers_process(bat_priv, false, NULL, | |
996 | unicast_tvlv_packet->src, | |
997 | unicast_tvlv_packet->dst, | |
998 | tvlv_buff, tvlv_buff_len); | |
999 | ||
1000 | if (ret != NET_RX_SUCCESS) | |
1001 | ret = batadv_route_unicast_packet(skb, recv_if); | |
05c3c8a6 AQ |
1002 | else |
1003 | consume_skb(skb); | |
ef261577 ML |
1004 | |
1005 | return ret; | |
1006 | } | |
c6c8fea2 | 1007 | |
610bfc6b MH |
1008 | /** |
1009 | * batadv_recv_frag_packet - process received fragment | |
1010 | * @skb: the received fragment | |
1011 | * @recv_if: interface that the skb is received on | |
1012 | * | |
1013 | * This function does one of the three following things: 1) Forward fragment, if | |
1014 | * the assembled packet will exceed our MTU; 2) Buffer fragment, if we till | |
1015 | * lack further fragments; 3) Merge fragments, if we have all needed parts. | |
1016 | * | |
62fe710f | 1017 | * Return: NET_RX_DROP if the skb is not consumed, NET_RX_SUCCESS otherwise. |
610bfc6b MH |
1018 | */ |
1019 | int batadv_recv_frag_packet(struct sk_buff *skb, | |
1020 | struct batadv_hard_iface *recv_if) | |
1021 | { | |
1022 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); | |
1023 | struct batadv_orig_node *orig_node_src = NULL; | |
1024 | struct batadv_frag_packet *frag_packet; | |
1025 | int ret = NET_RX_DROP; | |
1026 | ||
1027 | if (batadv_check_unicast_packet(bat_priv, skb, | |
1028 | sizeof(*frag_packet)) < 0) | |
1029 | goto out; | |
1030 | ||
1031 | frag_packet = (struct batadv_frag_packet *)skb->data; | |
1032 | orig_node_src = batadv_orig_hash_find(bat_priv, frag_packet->orig); | |
1033 | if (!orig_node_src) | |
1034 | goto out; | |
1035 | ||
1036 | /* Route the fragment if it is not for us and too big to be merged. */ | |
1037 | if (!batadv_is_my_mac(bat_priv, frag_packet->dest) && | |
1038 | batadv_frag_skb_fwd(skb, recv_if, orig_node_src)) { | |
1039 | ret = NET_RX_SUCCESS; | |
1040 | goto out; | |
1041 | } | |
1042 | ||
1043 | batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_RX); | |
1044 | batadv_add_counter(bat_priv, BATADV_CNT_FRAG_RX_BYTES, skb->len); | |
1045 | ||
1046 | /* Add fragment to buffer and merge if possible. */ | |
1047 | if (!batadv_frag_skb_buffer(&skb, orig_node_src)) | |
1048 | goto out; | |
1049 | ||
1050 | /* Deliver merged packet to the appropriate handler, if it was | |
1051 | * merged | |
1052 | */ | |
1053 | if (skb) | |
1054 | batadv_batman_skb_recv(skb, recv_if->net_dev, | |
1055 | &recv_if->batman_adv_ptype, NULL); | |
1056 | ||
1057 | ret = NET_RX_SUCCESS; | |
1058 | ||
1059 | out: | |
1060 | if (orig_node_src) | |
5d967310 | 1061 | batadv_orig_node_put(orig_node_src); |
610bfc6b MH |
1062 | |
1063 | return ret; | |
1064 | } | |
1065 | ||
56303d34 SE |
1066 | int batadv_recv_bcast_packet(struct sk_buff *skb, |
1067 | struct batadv_hard_iface *recv_if) | |
c6c8fea2 | 1068 | { |
56303d34 SE |
1069 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); |
1070 | struct batadv_orig_node *orig_node = NULL; | |
96412690 | 1071 | struct batadv_bcast_packet *bcast_packet; |
c6c8fea2 | 1072 | struct ethhdr *ethhdr; |
704509b8 | 1073 | int hdr_size = sizeof(*bcast_packet); |
f3e0008f | 1074 | int ret = NET_RX_DROP; |
6b5e971a SE |
1075 | s32 seq_diff; |
1076 | u32 seqno; | |
c6c8fea2 SE |
1077 | |
1078 | /* drop packet if it has not necessary minimum size */ | |
1079 | if (unlikely(!pskb_may_pull(skb, hdr_size))) | |
f3e0008f | 1080 | goto out; |
c6c8fea2 | 1081 | |
7ed4be95 | 1082 | ethhdr = eth_hdr(skb); |
c6c8fea2 SE |
1083 | |
1084 | /* packet with broadcast indication but unicast recipient */ | |
1085 | if (!is_broadcast_ether_addr(ethhdr->h_dest)) | |
f3e0008f | 1086 | goto out; |
c6c8fea2 SE |
1087 | |
1088 | /* packet with broadcast sender address */ | |
1089 | if (is_broadcast_ether_addr(ethhdr->h_source)) | |
f3e0008f | 1090 | goto out; |
c6c8fea2 SE |
1091 | |
1092 | /* ignore broadcasts sent by myself */ | |
fe8a93b9 | 1093 | if (batadv_is_my_mac(bat_priv, ethhdr->h_source)) |
f3e0008f | 1094 | goto out; |
c6c8fea2 | 1095 | |
96412690 | 1096 | bcast_packet = (struct batadv_bcast_packet *)skb->data; |
c6c8fea2 SE |
1097 | |
1098 | /* ignore broadcasts originated by myself */ | |
fe8a93b9 | 1099 | if (batadv_is_my_mac(bat_priv, bcast_packet->orig)) |
f3e0008f | 1100 | goto out; |
c6c8fea2 | 1101 | |
a40d9b07 | 1102 | if (bcast_packet->ttl < 2) |
f3e0008f | 1103 | goto out; |
c6c8fea2 | 1104 | |
da641193 | 1105 | orig_node = batadv_orig_hash_find(bat_priv, bcast_packet->orig); |
f3e0008f ML |
1106 | |
1107 | if (!orig_node) | |
b5a6f69c | 1108 | goto out; |
c6c8fea2 | 1109 | |
f3e0008f | 1110 | spin_lock_bh(&orig_node->bcast_seqno_lock); |
c6c8fea2 | 1111 | |
3fba7325 | 1112 | seqno = ntohl(bcast_packet->seqno); |
c6c8fea2 | 1113 | /* check whether the packet is a duplicate */ |
9b4a1159 | 1114 | if (batadv_test_bit(orig_node->bcast_bits, orig_node->last_bcast_seqno, |
3fba7325 | 1115 | seqno)) |
f3e0008f | 1116 | goto spin_unlock; |
c6c8fea2 | 1117 | |
3fba7325 | 1118 | seq_diff = seqno - orig_node->last_bcast_seqno; |
c6c8fea2 SE |
1119 | |
1120 | /* check whether the packet is old and the host just restarted. */ | |
30d3c511 | 1121 | if (batadv_window_protected(bat_priv, seq_diff, |
81f02683 SW |
1122 | BATADV_BCAST_MAX_AGE, |
1123 | &orig_node->bcast_seqno_reset, NULL)) | |
f3e0008f | 1124 | goto spin_unlock; |
c6c8fea2 SE |
1125 | |
1126 | /* mark broadcast in flood history, update window position | |
9cfc7bd6 SE |
1127 | * if required. |
1128 | */ | |
0f5f9322 | 1129 | if (batadv_bit_get_packet(bat_priv, orig_node->bcast_bits, seq_diff, 1)) |
3fba7325 | 1130 | orig_node->last_bcast_seqno = seqno; |
c6c8fea2 | 1131 | |
f3e0008f | 1132 | spin_unlock_bh(&orig_node->bcast_seqno_lock); |
f3e0008f | 1133 | |
fe2da6ff | 1134 | /* check whether this has been sent by another originator before */ |
004e86fc | 1135 | if (batadv_bla_check_bcast_duplist(bat_priv, skb)) |
fe2da6ff SW |
1136 | goto out; |
1137 | ||
c54f38c9 SW |
1138 | batadv_skb_set_priority(skb, sizeof(struct batadv_bcast_packet)); |
1139 | ||
c6c8fea2 | 1140 | /* rebroadcast packet */ |
9455e34c | 1141 | batadv_add_bcast_packet_to_list(bat_priv, skb, 1); |
c6c8fea2 | 1142 | |
23721387 SW |
1143 | /* don't hand the broadcast up if it is from an originator |
1144 | * from the same backbone. | |
1145 | */ | |
08adf151 | 1146 | if (batadv_bla_is_backbone_gw(skb, orig_node, hdr_size)) |
23721387 SW |
1147 | goto out; |
1148 | ||
c384ea3e AQ |
1149 | if (batadv_dat_snoop_incoming_arp_request(bat_priv, skb, hdr_size)) |
1150 | goto rx_success; | |
1151 | if (batadv_dat_snoop_incoming_arp_reply(bat_priv, skb, hdr_size)) | |
1152 | goto rx_success; | |
1153 | ||
c6c8fea2 | 1154 | /* broadcast for me */ |
6535db56 | 1155 | batadv_interface_rx(recv_if->soft_iface, skb, hdr_size, orig_node); |
c384ea3e AQ |
1156 | |
1157 | rx_success: | |
f3e0008f ML |
1158 | ret = NET_RX_SUCCESS; |
1159 | goto out; | |
c6c8fea2 | 1160 | |
f3e0008f ML |
1161 | spin_unlock: |
1162 | spin_unlock_bh(&orig_node->bcast_seqno_lock); | |
f3e0008f ML |
1163 | out: |
1164 | if (orig_node) | |
5d967310 | 1165 | batadv_orig_node_put(orig_node); |
f3e0008f | 1166 | return ret; |
c6c8fea2 | 1167 | } |