Commit | Line | Data |
---|---|---|
0046b040 | 1 | /* Copyright (C) 2007-2016 B.A.T.M.A.N. contributors: |
c6c8fea2 SE |
2 | * |
3 | * Marek Lindner, Simon Wunderlich | |
4 | * | |
5 | * This program is free software; you can redistribute it and/or | |
6 | * modify it under the terms of version 2 of the GNU General Public | |
7 | * License as published by the Free Software Foundation. | |
8 | * | |
9 | * This program is distributed in the hope that it will be useful, but | |
10 | * WITHOUT ANY WARRANTY; without even the implied warranty of | |
11 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
12 | * General Public License for more details. | |
13 | * | |
14 | * You should have received a copy of the GNU General Public License | |
ebf38fb7 | 15 | * along with this program; if not, see <http://www.gnu.org/licenses/>. |
c6c8fea2 SE |
16 | */ |
17 | ||
c6c8fea2 | 18 | #include "routing.h" |
1e2c2a4f SE |
19 | #include "main.h" |
20 | ||
21 | #include <linux/atomic.h> | |
22 | #include <linux/byteorder/generic.h> | |
23 | #include <linux/compiler.h> | |
24 | #include <linux/errno.h> | |
25 | #include <linux/etherdevice.h> | |
26 | #include <linux/if_ether.h> | |
27 | #include <linux/jiffies.h> | |
a6ba0d34 | 28 | #include <linux/kref.h> |
1e2c2a4f SE |
29 | #include <linux/netdevice.h> |
30 | #include <linux/printk.h> | |
31 | #include <linux/rculist.h> | |
32 | #include <linux/rcupdate.h> | |
33 | #include <linux/skbuff.h> | |
34 | #include <linux/spinlock.h> | |
35 | #include <linux/stddef.h> | |
36 | ||
37 | #include "bitarray.h" | |
23721387 | 38 | #include "bridge_loop_avoidance.h" |
c384ea3e | 39 | #include "distributed-arp-table.h" |
610bfc6b | 40 | #include "fragmentation.h" |
1e2c2a4f SE |
41 | #include "hard-interface.h" |
42 | #include "icmp_socket.h" | |
ba412080 | 43 | #include "log.h" |
1e2c2a4f SE |
44 | #include "network-coding.h" |
45 | #include "originator.h" | |
46 | #include "packet.h" | |
47 | #include "send.h" | |
48 | #include "soft-interface.h" | |
33a3bb4a | 49 | #include "tp_meter.h" |
1e2c2a4f | 50 | #include "translation-table.h" |
1f8dce49 | 51 | #include "tvlv.h" |
c018ad3d | 52 | |
63b01037 | 53 | static int batadv_route_unicast_packet(struct sk_buff *skb, |
56303d34 | 54 | struct batadv_hard_iface *recv_if); |
a7f6ee94 | 55 | |
7351a482 SW |
56 | /** |
57 | * _batadv_update_route - set the router for this originator | |
58 | * @bat_priv: the bat priv with all the soft interface information | |
59 | * @orig_node: orig node which is to be configured | |
60 | * @recv_if: the receive interface for which this route is set | |
61 | * @neigh_node: neighbor which should be the next router | |
62 | * | |
63 | * This function does not perform any error checks | |
64 | */ | |
56303d34 SE |
65 | static void _batadv_update_route(struct batadv_priv *bat_priv, |
66 | struct batadv_orig_node *orig_node, | |
7351a482 | 67 | struct batadv_hard_iface *recv_if, |
56303d34 | 68 | struct batadv_neigh_node *neigh_node) |
c6c8fea2 | 69 | { |
7351a482 | 70 | struct batadv_orig_ifinfo *orig_ifinfo; |
56303d34 | 71 | struct batadv_neigh_node *curr_router; |
e1a5382f | 72 | |
7351a482 SW |
73 | orig_ifinfo = batadv_orig_ifinfo_get(orig_node, recv_if); |
74 | if (!orig_ifinfo) | |
75 | return; | |
76 | ||
b5dcbad2 SE |
77 | spin_lock_bh(&orig_node->neigh_list_lock); |
78 | /* curr_router used earlier may not be the current orig_ifinfo->router | |
79 | * anymore because it was dereferenced outside of the neigh_list_lock | |
80 | * protected region. After the new best neighbor has replace the current | |
81 | * best neighbor the reference counter needs to decrease. Consequently, | |
82 | * the code needs to ensure the curr_router variable contains a pointer | |
83 | * to the replaced best neighbor. | |
84 | */ | |
85 | curr_router = rcu_dereference_protected(orig_ifinfo->router, true); | |
86 | ||
87 | /* increase refcount of new best neighbor */ | |
88 | if (neigh_node) | |
89 | kref_get(&neigh_node->refcount); | |
90 | ||
91 | rcu_assign_pointer(orig_ifinfo->router, neigh_node); | |
92 | spin_unlock_bh(&orig_node->neigh_list_lock); | |
93 | batadv_orig_ifinfo_put(orig_ifinfo); | |
a8e7f4bc | 94 | |
c6c8fea2 | 95 | /* route deleted */ |
e1a5382f | 96 | if ((curr_router) && (!neigh_node)) { |
39c75a51 SE |
97 | batadv_dbg(BATADV_DBG_ROUTES, bat_priv, |
98 | "Deleting route towards: %pM\n", orig_node->orig); | |
95fb130d | 99 | batadv_tt_global_del_orig(bat_priv, orig_node, -1, |
08c36d3e | 100 | "Deleted route towards originator"); |
c6c8fea2 | 101 | |
e1a5382f LL |
102 | /* route added */ |
103 | } else if ((!curr_router) && (neigh_node)) { | |
39c75a51 | 104 | batadv_dbg(BATADV_DBG_ROUTES, bat_priv, |
1eda58bf SE |
105 | "Adding route towards: %pM (via %pM)\n", |
106 | orig_node->orig, neigh_node->addr); | |
e1a5382f | 107 | /* route changed */ |
bb899b89 | 108 | } else if (neigh_node && curr_router) { |
39c75a51 | 109 | batadv_dbg(BATADV_DBG_ROUTES, bat_priv, |
1eda58bf SE |
110 | "Changing route towards: %pM (now via %pM - was via %pM)\n", |
111 | orig_node->orig, neigh_node->addr, | |
112 | curr_router->addr); | |
c6c8fea2 SE |
113 | } |
114 | ||
e1a5382f LL |
115 | /* decrease refcount of previous best neighbor */ |
116 | if (curr_router) | |
25bb2509 | 117 | batadv_neigh_node_put(curr_router); |
c6c8fea2 SE |
118 | } |
119 | ||
7351a482 SW |
120 | /** |
121 | * batadv_update_route - set the router for this originator | |
122 | * @bat_priv: the bat priv with all the soft interface information | |
123 | * @orig_node: orig node which is to be configured | |
124 | * @recv_if: the receive interface for which this route is set | |
125 | * @neigh_node: neighbor which should be the next router | |
126 | */ | |
56303d34 SE |
127 | void batadv_update_route(struct batadv_priv *bat_priv, |
128 | struct batadv_orig_node *orig_node, | |
7351a482 | 129 | struct batadv_hard_iface *recv_if, |
56303d34 | 130 | struct batadv_neigh_node *neigh_node) |
c6c8fea2 | 131 | { |
56303d34 | 132 | struct batadv_neigh_node *router = NULL; |
c6c8fea2 SE |
133 | |
134 | if (!orig_node) | |
e1a5382f LL |
135 | goto out; |
136 | ||
7351a482 | 137 | router = batadv_orig_router_get(orig_node, recv_if); |
c6c8fea2 | 138 | |
e1a5382f | 139 | if (router != neigh_node) |
7351a482 | 140 | _batadv_update_route(bat_priv, orig_node, recv_if, neigh_node); |
e1a5382f LL |
141 | |
142 | out: | |
143 | if (router) | |
25bb2509 | 144 | batadv_neigh_node_put(router); |
c6c8fea2 SE |
145 | } |
146 | ||
62fe710f | 147 | /** |
7afcbbef | 148 | * batadv_window_protected - checks whether the host restarted and is in the |
62fe710f | 149 | * protection time. |
7afcbbef SE |
150 | * @bat_priv: the bat priv with all the soft interface information |
151 | * @seq_num_diff: difference between the current/received sequence number and | |
152 | * the last sequence number | |
81f02683 | 153 | * @seq_old_max_diff: maximum age of sequence number not considered as restart |
7afcbbef SE |
154 | * @last_reset: jiffies timestamp of the last reset, will be updated when reset |
155 | * is detected | |
81f02683 SW |
156 | * @protection_started: is set to true if the protection window was started, |
157 | * doesn't change otherwise. | |
62fe710f SE |
158 | * |
159 | * Return: | |
4b426b10 SE |
160 | * false if the packet is to be accepted. |
161 | * true if the packet is to be ignored. | |
c6c8fea2 | 162 | */ |
4b426b10 SE |
163 | bool batadv_window_protected(struct batadv_priv *bat_priv, s32 seq_num_diff, |
164 | s32 seq_old_max_diff, unsigned long *last_reset, | |
165 | bool *protection_started) | |
c6c8fea2 | 166 | { |
81f02683 | 167 | if (seq_num_diff <= -seq_old_max_diff || |
42d0b044 SE |
168 | seq_num_diff >= BATADV_EXPECTED_SEQNO_RANGE) { |
169 | if (!batadv_has_timed_out(*last_reset, | |
170 | BATADV_RESET_PROTECTION_MS)) | |
4b426b10 | 171 | return true; |
8c7bf248 ML |
172 | |
173 | *last_reset = jiffies; | |
81f02683 SW |
174 | if (protection_started) |
175 | *protection_started = true; | |
39c75a51 | 176 | batadv_dbg(BATADV_DBG_BATMAN, bat_priv, |
1eda58bf | 177 | "old packet received, start protection\n"); |
c6c8fea2 | 178 | } |
8c7bf248 | 179 | |
4b426b10 | 180 | return false; |
c6c8fea2 SE |
181 | } |
182 | ||
30d3c511 | 183 | bool batadv_check_management_packet(struct sk_buff *skb, |
56303d34 | 184 | struct batadv_hard_iface *hard_iface, |
30d3c511 | 185 | int header_len) |
c6c8fea2 | 186 | { |
c6c8fea2 SE |
187 | struct ethhdr *ethhdr; |
188 | ||
189 | /* drop packet if it has not necessary minimum size */ | |
c3e29312 ML |
190 | if (unlikely(!pskb_may_pull(skb, header_len))) |
191 | return false; | |
c6c8fea2 | 192 | |
7ed4be95 | 193 | ethhdr = eth_hdr(skb); |
c6c8fea2 SE |
194 | |
195 | /* packet with broadcast indication but unicast recipient */ | |
196 | if (!is_broadcast_ether_addr(ethhdr->h_dest)) | |
c3e29312 | 197 | return false; |
c6c8fea2 SE |
198 | |
199 | /* packet with broadcast sender address */ | |
200 | if (is_broadcast_ether_addr(ethhdr->h_source)) | |
c3e29312 | 201 | return false; |
c6c8fea2 SE |
202 | |
203 | /* create a copy of the skb, if needed, to modify it. */ | |
204 | if (skb_cow(skb, 0) < 0) | |
c3e29312 | 205 | return false; |
c6c8fea2 SE |
206 | |
207 | /* keep skb linear */ | |
208 | if (skb_linearize(skb) < 0) | |
c3e29312 | 209 | return false; |
c6c8fea2 | 210 | |
c3e29312 | 211 | return true; |
c6c8fea2 SE |
212 | } |
213 | ||
da6b8c20 SW |
214 | /** |
215 | * batadv_recv_my_icmp_packet - receive an icmp packet locally | |
216 | * @bat_priv: the bat priv with all the soft interface information | |
217 | * @skb: icmp packet to process | |
218 | * | |
62fe710f | 219 | * Return: NET_RX_SUCCESS if the packet has been consumed or NET_RX_DROP |
da6b8c20 SW |
220 | * otherwise. |
221 | */ | |
56303d34 | 222 | static int batadv_recv_my_icmp_packet(struct batadv_priv *bat_priv, |
da6b8c20 | 223 | struct sk_buff *skb) |
c6c8fea2 | 224 | { |
56303d34 SE |
225 | struct batadv_hard_iface *primary_if = NULL; |
226 | struct batadv_orig_node *orig_node = NULL; | |
da6b8c20 SW |
227 | struct batadv_icmp_header *icmph; |
228 | int res, ret = NET_RX_DROP; | |
c6c8fea2 | 229 | |
da6b8c20 | 230 | icmph = (struct batadv_icmp_header *)skb->data; |
c6c8fea2 | 231 | |
da6b8c20 SW |
232 | switch (icmph->msg_type) { |
233 | case BATADV_ECHO_REPLY: | |
234 | case BATADV_DESTINATION_UNREACHABLE: | |
235 | case BATADV_TTL_EXCEEDED: | |
236 | /* receive the packet */ | |
237 | if (skb_linearize(skb) < 0) | |
238 | break; | |
c6c8fea2 | 239 | |
da6b8c20 SW |
240 | batadv_socket_receive_packet(icmph, skb->len); |
241 | break; | |
242 | case BATADV_ECHO_REQUEST: | |
243 | /* answer echo request (ping) */ | |
244 | primary_if = batadv_primary_if_get_selected(bat_priv); | |
245 | if (!primary_if) | |
246 | goto out; | |
247 | ||
248 | /* get routing information */ | |
249 | orig_node = batadv_orig_hash_find(bat_priv, icmph->orig); | |
250 | if (!orig_node) | |
251 | goto out; | |
252 | ||
253 | /* create a copy of the skb, if needed, to modify it. */ | |
254 | if (skb_cow(skb, ETH_HLEN) < 0) | |
255 | goto out; | |
256 | ||
257 | icmph = (struct batadv_icmp_header *)skb->data; | |
258 | ||
8fdd0153 AQ |
259 | ether_addr_copy(icmph->dst, icmph->orig); |
260 | ether_addr_copy(icmph->orig, primary_if->net_dev->dev_addr); | |
da6b8c20 | 261 | icmph->msg_type = BATADV_ECHO_REPLY; |
a40d9b07 | 262 | icmph->ttl = BATADV_TTL; |
da6b8c20 SW |
263 | |
264 | res = batadv_send_skb_to_orig(skb, orig_node, NULL); | |
f50ca95a AQ |
265 | if (res == -1) |
266 | goto out; | |
267 | ||
268 | ret = NET_RX_SUCCESS; | |
da6b8c20 SW |
269 | |
270 | break; | |
33a3bb4a AQ |
271 | case BATADV_TP: |
272 | if (!pskb_may_pull(skb, sizeof(struct batadv_icmp_tp_packet))) | |
273 | goto out; | |
274 | ||
275 | batadv_tp_meter_recv(bat_priv, skb); | |
276 | ret = NET_RX_SUCCESS; | |
277 | goto out; | |
da6b8c20 SW |
278 | default: |
279 | /* drop unknown type */ | |
44524fcd | 280 | goto out; |
da6b8c20 | 281 | } |
44524fcd | 282 | out: |
32ae9b22 | 283 | if (primary_if) |
82047ad7 | 284 | batadv_hardif_put(primary_if); |
44524fcd | 285 | if (orig_node) |
5d967310 | 286 | batadv_orig_node_put(orig_node); |
c6c8fea2 SE |
287 | return ret; |
288 | } | |
289 | ||
56303d34 | 290 | static int batadv_recv_icmp_ttl_exceeded(struct batadv_priv *bat_priv, |
63b01037 | 291 | struct sk_buff *skb) |
c6c8fea2 | 292 | { |
56303d34 SE |
293 | struct batadv_hard_iface *primary_if = NULL; |
294 | struct batadv_orig_node *orig_node = NULL; | |
96412690 | 295 | struct batadv_icmp_packet *icmp_packet; |
f50ca95a | 296 | int res, ret = NET_RX_DROP; |
c6c8fea2 | 297 | |
96412690 | 298 | icmp_packet = (struct batadv_icmp_packet *)skb->data; |
c6c8fea2 SE |
299 | |
300 | /* send TTL exceeded if packet is an echo request (traceroute) */ | |
27a417e6 | 301 | if (icmp_packet->msg_type != BATADV_ECHO_REQUEST) { |
86ceb360 | 302 | pr_debug("Warning - can't forward icmp packet from %pM to %pM: ttl exceeded\n", |
27a417e6 | 303 | icmp_packet->orig, icmp_packet->dst); |
44524fcd | 304 | goto out; |
c6c8fea2 SE |
305 | } |
306 | ||
e5d89254 | 307 | primary_if = batadv_primary_if_get_selected(bat_priv); |
32ae9b22 | 308 | if (!primary_if) |
44524fcd | 309 | goto out; |
c6c8fea2 SE |
310 | |
311 | /* get routing information */ | |
27a417e6 | 312 | orig_node = batadv_orig_hash_find(bat_priv, icmp_packet->orig); |
44524fcd | 313 | if (!orig_node) |
e1a5382f | 314 | goto out; |
c6c8fea2 | 315 | |
44524fcd | 316 | /* create a copy of the skb, if needed, to modify it. */ |
0d125074 | 317 | if (skb_cow(skb, ETH_HLEN) < 0) |
44524fcd | 318 | goto out; |
c6c8fea2 | 319 | |
96412690 | 320 | icmp_packet = (struct batadv_icmp_packet *)skb->data; |
c6c8fea2 | 321 | |
8fdd0153 AQ |
322 | ether_addr_copy(icmp_packet->dst, icmp_packet->orig); |
323 | ether_addr_copy(icmp_packet->orig, primary_if->net_dev->dev_addr); | |
27a417e6 AQ |
324 | icmp_packet->msg_type = BATADV_TTL_EXCEEDED; |
325 | icmp_packet->ttl = BATADV_TTL; | |
44524fcd | 326 | |
f50ca95a AQ |
327 | res = batadv_send_skb_to_orig(skb, orig_node, NULL); |
328 | if (res != -1) | |
bb351ba0 | 329 | ret = NET_RX_SUCCESS; |
c6c8fea2 | 330 | |
44524fcd | 331 | out: |
32ae9b22 | 332 | if (primary_if) |
82047ad7 | 333 | batadv_hardif_put(primary_if); |
44524fcd | 334 | if (orig_node) |
5d967310 | 335 | batadv_orig_node_put(orig_node); |
c6c8fea2 SE |
336 | return ret; |
337 | } | |
338 | ||
56303d34 SE |
339 | int batadv_recv_icmp_packet(struct sk_buff *skb, |
340 | struct batadv_hard_iface *recv_if) | |
c6c8fea2 | 341 | { |
56303d34 | 342 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); |
da6b8c20 SW |
343 | struct batadv_icmp_header *icmph; |
344 | struct batadv_icmp_packet_rr *icmp_packet_rr; | |
c6c8fea2 | 345 | struct ethhdr *ethhdr; |
56303d34 | 346 | struct batadv_orig_node *orig_node = NULL; |
da6b8c20 | 347 | int hdr_size = sizeof(struct batadv_icmp_header); |
f50ca95a | 348 | int res, ret = NET_RX_DROP; |
c6c8fea2 | 349 | |
c6c8fea2 SE |
350 | /* drop packet if it has not necessary minimum size */ |
351 | if (unlikely(!pskb_may_pull(skb, hdr_size))) | |
44524fcd | 352 | goto out; |
c6c8fea2 | 353 | |
7ed4be95 | 354 | ethhdr = eth_hdr(skb); |
c6c8fea2 SE |
355 | |
356 | /* packet with unicast indication but broadcast recipient */ | |
357 | if (is_broadcast_ether_addr(ethhdr->h_dest)) | |
44524fcd | 358 | goto out; |
c6c8fea2 SE |
359 | |
360 | /* packet with broadcast sender address */ | |
361 | if (is_broadcast_ether_addr(ethhdr->h_source)) | |
44524fcd | 362 | goto out; |
c6c8fea2 SE |
363 | |
364 | /* not for me */ | |
fe8a93b9 | 365 | if (!batadv_is_my_mac(bat_priv, ethhdr->h_dest)) |
44524fcd | 366 | goto out; |
c6c8fea2 | 367 | |
da6b8c20 | 368 | icmph = (struct batadv_icmp_header *)skb->data; |
c6c8fea2 SE |
369 | |
370 | /* add record route information if not full */ | |
da6b8c20 SW |
371 | if ((icmph->msg_type == BATADV_ECHO_REPLY || |
372 | icmph->msg_type == BATADV_ECHO_REQUEST) && | |
373 | (skb->len >= sizeof(struct batadv_icmp_packet_rr))) { | |
374 | if (skb_linearize(skb) < 0) | |
375 | goto out; | |
376 | ||
377 | /* create a copy of the skb, if needed, to modify it. */ | |
378 | if (skb_cow(skb, ETH_HLEN) < 0) | |
379 | goto out; | |
380 | ||
3b55e442 | 381 | ethhdr = eth_hdr(skb); |
da6b8c20 SW |
382 | icmph = (struct batadv_icmp_header *)skb->data; |
383 | icmp_packet_rr = (struct batadv_icmp_packet_rr *)icmph; | |
384 | if (icmp_packet_rr->rr_cur >= BATADV_RR_LEN) | |
385 | goto out; | |
386 | ||
8fdd0153 AQ |
387 | ether_addr_copy(icmp_packet_rr->rr[icmp_packet_rr->rr_cur], |
388 | ethhdr->h_dest); | |
da6b8c20 | 389 | icmp_packet_rr->rr_cur++; |
c6c8fea2 SE |
390 | } |
391 | ||
392 | /* packet for me */ | |
da6b8c20 SW |
393 | if (batadv_is_my_mac(bat_priv, icmph->dst)) |
394 | return batadv_recv_my_icmp_packet(bat_priv, skb); | |
c6c8fea2 SE |
395 | |
396 | /* TTL exceeded */ | |
a40d9b07 | 397 | if (icmph->ttl < 2) |
63b01037 | 398 | return batadv_recv_icmp_ttl_exceeded(bat_priv, skb); |
c6c8fea2 | 399 | |
c6c8fea2 | 400 | /* get routing information */ |
da6b8c20 | 401 | orig_node = batadv_orig_hash_find(bat_priv, icmph->dst); |
44524fcd | 402 | if (!orig_node) |
e1a5382f | 403 | goto out; |
c6c8fea2 | 404 | |
44524fcd | 405 | /* create a copy of the skb, if needed, to modify it. */ |
0d125074 | 406 | if (skb_cow(skb, ETH_HLEN) < 0) |
44524fcd | 407 | goto out; |
c6c8fea2 | 408 | |
da6b8c20 | 409 | icmph = (struct batadv_icmp_header *)skb->data; |
c6c8fea2 | 410 | |
44524fcd | 411 | /* decrement ttl */ |
a40d9b07 | 412 | icmph->ttl--; |
44524fcd ML |
413 | |
414 | /* route it */ | |
f50ca95a AQ |
415 | res = batadv_send_skb_to_orig(skb, orig_node, recv_if); |
416 | if (res != -1) | |
bb351ba0 | 417 | ret = NET_RX_SUCCESS; |
c6c8fea2 | 418 | |
44524fcd | 419 | out: |
44524fcd | 420 | if (orig_node) |
5d967310 | 421 | batadv_orig_node_put(orig_node); |
c6c8fea2 SE |
422 | return ret; |
423 | } | |
424 | ||
f86ce0ad MH |
425 | /** |
426 | * batadv_check_unicast_packet - Check for malformed unicast packets | |
6e0895c2 | 427 | * @bat_priv: the bat priv with all the soft interface information |
f86ce0ad MH |
428 | * @skb: packet to check |
429 | * @hdr_size: size of header to pull | |
430 | * | |
62fe710f SE |
431 | * Check for short header and bad addresses in given packet. |
432 | * | |
433 | * Return: negative value when check fails and 0 otherwise. The negative value | |
434 | * depends on the reason: -ENODATA for bad header, -EBADR for broadcast | |
435 | * destination or source, and -EREMOTE for non-local (other host) destination. | |
f86ce0ad | 436 | */ |
fe8a93b9 AQ |
437 | static int batadv_check_unicast_packet(struct batadv_priv *bat_priv, |
438 | struct sk_buff *skb, int hdr_size) | |
ff51fd70 MH |
439 | { |
440 | struct ethhdr *ethhdr; | |
441 | ||
442 | /* drop packet if it has not necessary minimum size */ | |
443 | if (unlikely(!pskb_may_pull(skb, hdr_size))) | |
f86ce0ad | 444 | return -ENODATA; |
ff51fd70 | 445 | |
7ed4be95 | 446 | ethhdr = eth_hdr(skb); |
ff51fd70 MH |
447 | |
448 | /* packet with unicast indication but broadcast recipient */ | |
449 | if (is_broadcast_ether_addr(ethhdr->h_dest)) | |
f86ce0ad | 450 | return -EBADR; |
ff51fd70 MH |
451 | |
452 | /* packet with broadcast sender address */ | |
453 | if (is_broadcast_ether_addr(ethhdr->h_source)) | |
f86ce0ad | 454 | return -EBADR; |
ff51fd70 MH |
455 | |
456 | /* not for me */ | |
fe8a93b9 | 457 | if (!batadv_is_my_mac(bat_priv, ethhdr->h_dest)) |
f86ce0ad | 458 | return -EREMOTE; |
ff51fd70 MH |
459 | |
460 | return 0; | |
461 | } | |
462 | ||
15c2ed75 SE |
463 | /** |
464 | * batadv_last_bonding_replace - Replace last_bonding_candidate of orig_node | |
465 | * @orig_node: originator node whose bonding candidates should be replaced | |
466 | * @new_candidate: new bonding candidate or NULL | |
467 | */ | |
468 | static void | |
469 | batadv_last_bonding_replace(struct batadv_orig_node *orig_node, | |
470 | struct batadv_orig_ifinfo *new_candidate) | |
471 | { | |
472 | struct batadv_orig_ifinfo *old_candidate; | |
473 | ||
474 | spin_lock_bh(&orig_node->neigh_list_lock); | |
475 | old_candidate = orig_node->last_bonding_candidate; | |
476 | ||
477 | if (new_candidate) | |
478 | kref_get(&new_candidate->refcount); | |
479 | orig_node->last_bonding_candidate = new_candidate; | |
480 | spin_unlock_bh(&orig_node->neigh_list_lock); | |
481 | ||
482 | if (old_candidate) | |
483 | batadv_orig_ifinfo_put(old_candidate); | |
484 | } | |
485 | ||
f6c8b711 SW |
486 | /** |
487 | * batadv_find_router - find a suitable router for this originator | |
488 | * @bat_priv: the bat priv with all the soft interface information | |
489 | * @orig_node: the destination node | |
490 | * @recv_if: pointer to interface this packet was received on | |
491 | * | |
62fe710f | 492 | * Return: the router which should be used for this orig_node on |
f6c8b711 | 493 | * this interface, or NULL if not available. |
9cfc7bd6 | 494 | */ |
56303d34 SE |
495 | struct batadv_neigh_node * |
496 | batadv_find_router(struct batadv_priv *bat_priv, | |
497 | struct batadv_orig_node *orig_node, | |
f3b3d901 | 498 | struct batadv_hard_iface *recv_if) |
c6c8fea2 | 499 | { |
29824a55 | 500 | struct batadv_algo_ops *bao = bat_priv->algo_ops; |
f3b3d901 SW |
501 | struct batadv_neigh_node *first_candidate_router = NULL; |
502 | struct batadv_neigh_node *next_candidate_router = NULL; | |
503 | struct batadv_neigh_node *router, *cand_router = NULL; | |
504 | struct batadv_neigh_node *last_cand_router = NULL; | |
505 | struct batadv_orig_ifinfo *cand, *first_candidate = NULL; | |
506 | struct batadv_orig_ifinfo *next_candidate = NULL; | |
507 | struct batadv_orig_ifinfo *last_candidate; | |
508 | bool last_candidate_found = false; | |
c6c8fea2 SE |
509 | |
510 | if (!orig_node) | |
511 | return NULL; | |
512 | ||
7351a482 | 513 | router = batadv_orig_router_get(orig_node, recv_if); |
c6c8fea2 | 514 | |
329887ad SW |
515 | if (!router) |
516 | return router; | |
517 | ||
f3b3d901 SW |
518 | /* only consider bonding for recv_if == BATADV_IF_DEFAULT (first hop) |
519 | * and if activated. | |
520 | */ | |
329887ad | 521 | if (!(recv_if == BATADV_IF_DEFAULT && atomic_read(&bat_priv->bonding))) |
f3b3d901 SW |
522 | return router; |
523 | ||
524 | /* bonding: loop through the list of possible routers found | |
525 | * for the various outgoing interfaces and find a candidate after | |
526 | * the last chosen bonding candidate (next_candidate). If no such | |
527 | * router is found, use the first candidate found (the previously | |
528 | * chosen bonding candidate might have been the last one in the list). | |
3f68785e | 529 | * If this can't be found either, return the previously chosen |
f3b3d901 SW |
530 | * router - obviously there are no other candidates. |
531 | */ | |
532 | rcu_read_lock(); | |
533 | last_candidate = orig_node->last_bonding_candidate; | |
534 | if (last_candidate) | |
535 | last_cand_router = rcu_dereference(last_candidate->router); | |
536 | ||
537 | hlist_for_each_entry_rcu(cand, &orig_node->ifinfo_list, list) { | |
538 | /* acquire some structures and references ... */ | |
a6ba0d34 | 539 | if (!kref_get_unless_zero(&cand->refcount)) |
f3b3d901 SW |
540 | continue; |
541 | ||
542 | cand_router = rcu_dereference(cand->router); | |
543 | if (!cand_router) | |
544 | goto next; | |
545 | ||
77ae32e8 | 546 | if (!kref_get_unless_zero(&cand_router->refcount)) { |
f3b3d901 SW |
547 | cand_router = NULL; |
548 | goto next; | |
549 | } | |
550 | ||
551 | /* alternative candidate should be good enough to be | |
552 | * considered | |
553 | */ | |
29824a55 AQ |
554 | if (!bao->neigh.is_similar_or_better(cand_router, |
555 | cand->if_outgoing, router, | |
556 | recv_if)) | |
f3b3d901 SW |
557 | goto next; |
558 | ||
559 | /* don't use the same router twice */ | |
560 | if (last_cand_router == cand_router) | |
561 | goto next; | |
562 | ||
563 | /* mark the first possible candidate */ | |
564 | if (!first_candidate) { | |
77ae32e8 | 565 | kref_get(&cand_router->refcount); |
a6ba0d34 | 566 | kref_get(&cand->refcount); |
f3b3d901 SW |
567 | first_candidate = cand; |
568 | first_candidate_router = cand_router; | |
569 | } | |
570 | ||
571 | /* check if the loop has already passed the previously selected | |
572 | * candidate ... this function should select the next candidate | |
573 | * AFTER the previously used bonding candidate. | |
574 | */ | |
575 | if (!last_candidate || last_candidate_found) { | |
576 | next_candidate = cand; | |
577 | next_candidate_router = cand_router; | |
578 | break; | |
579 | } | |
580 | ||
581 | if (last_candidate == cand) | |
582 | last_candidate_found = true; | |
583 | next: | |
584 | /* free references */ | |
585 | if (cand_router) { | |
25bb2509 | 586 | batadv_neigh_node_put(cand_router); |
f3b3d901 SW |
587 | cand_router = NULL; |
588 | } | |
35f94779 | 589 | batadv_orig_ifinfo_put(cand); |
f3b3d901 SW |
590 | } |
591 | rcu_read_unlock(); | |
592 | ||
f3b3d901 SW |
593 | /* After finding candidates, handle the three cases: |
594 | * 1) there is a next candidate, use that | |
595 | * 2) there is no next candidate, use the first of the list | |
596 | * 3) there is no candidate at all, return the default router | |
597 | */ | |
598 | if (next_candidate) { | |
25bb2509 | 599 | batadv_neigh_node_put(router); |
f3b3d901 | 600 | |
15c2ed75 | 601 | kref_get(&next_candidate_router->refcount); |
f3b3d901 | 602 | router = next_candidate_router; |
15c2ed75 | 603 | batadv_last_bonding_replace(orig_node, next_candidate); |
f3b3d901 | 604 | } else if (first_candidate) { |
25bb2509 | 605 | batadv_neigh_node_put(router); |
f3b3d901 | 606 | |
15c2ed75 | 607 | kref_get(&first_candidate_router->refcount); |
f3b3d901 | 608 | router = first_candidate_router; |
15c2ed75 | 609 | batadv_last_bonding_replace(orig_node, first_candidate); |
f3b3d901 | 610 | } else { |
15c2ed75 SE |
611 | batadv_last_bonding_replace(orig_node, NULL); |
612 | } | |
613 | ||
614 | /* cleanup of candidates */ | |
615 | if (first_candidate) { | |
616 | batadv_neigh_node_put(first_candidate_router); | |
617 | batadv_orig_ifinfo_put(first_candidate); | |
618 | } | |
619 | ||
620 | if (next_candidate) { | |
621 | batadv_neigh_node_put(next_candidate_router); | |
622 | batadv_orig_ifinfo_put(next_candidate); | |
f3b3d901 | 623 | } |
f6c8b711 | 624 | |
c6c8fea2 SE |
625 | return router; |
626 | } | |
627 | ||
63b01037 | 628 | static int batadv_route_unicast_packet(struct sk_buff *skb, |
56303d34 | 629 | struct batadv_hard_iface *recv_if) |
c6c8fea2 | 630 | { |
56303d34 SE |
631 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); |
632 | struct batadv_orig_node *orig_node = NULL; | |
96412690 | 633 | struct batadv_unicast_packet *unicast_packet; |
7ed4be95 | 634 | struct ethhdr *ethhdr = eth_hdr(skb); |
c54f38c9 | 635 | int res, hdr_len, ret = NET_RX_DROP; |
63d443ef | 636 | unsigned int len; |
c6c8fea2 | 637 | |
96412690 | 638 | unicast_packet = (struct batadv_unicast_packet *)skb->data; |
c6c8fea2 SE |
639 | |
640 | /* TTL exceeded */ | |
a40d9b07 | 641 | if (unicast_packet->ttl < 2) { |
86ceb360 SE |
642 | pr_debug("Warning - can't forward unicast packet from %pM to %pM: ttl exceeded\n", |
643 | ethhdr->h_source, unicast_packet->dest); | |
44524fcd | 644 | goto out; |
c6c8fea2 SE |
645 | } |
646 | ||
647 | /* get routing information */ | |
da641193 | 648 | orig_node = batadv_orig_hash_find(bat_priv, unicast_packet->dest); |
7aadf889 | 649 | |
44524fcd | 650 | if (!orig_node) |
b5a6f69c | 651 | goto out; |
c6c8fea2 | 652 | |
c6c8fea2 | 653 | /* create a copy of the skb, if needed, to modify it. */ |
0d125074 | 654 | if (skb_cow(skb, ETH_HLEN) < 0) |
44524fcd | 655 | goto out; |
c6c8fea2 | 656 | |
c6c8fea2 | 657 | /* decrement ttl */ |
f097e25d | 658 | unicast_packet = (struct batadv_unicast_packet *)skb->data; |
a40d9b07 | 659 | unicast_packet->ttl--; |
c6c8fea2 | 660 | |
a40d9b07 | 661 | switch (unicast_packet->packet_type) { |
c54f38c9 SW |
662 | case BATADV_UNICAST_4ADDR: |
663 | hdr_len = sizeof(struct batadv_unicast_4addr_packet); | |
664 | break; | |
665 | case BATADV_UNICAST: | |
666 | hdr_len = sizeof(struct batadv_unicast_packet); | |
667 | break; | |
668 | default: | |
669 | /* other packet types not supported - yet */ | |
670 | hdr_len = -1; | |
671 | break; | |
672 | } | |
673 | ||
674 | if (hdr_len > 0) | |
675 | batadv_skb_set_priority(skb, hdr_len); | |
676 | ||
63d443ef | 677 | len = skb->len; |
e91ecfc6 | 678 | res = batadv_send_skb_to_orig(skb, orig_node, recv_if); |
f50ca95a AQ |
679 | if (res == -1) |
680 | goto out; | |
95332477 | 681 | |
e91ecfc6 MH |
682 | /* translate transmit result into receive result */ |
683 | if (res == NET_XMIT_SUCCESS) { | |
684 | /* skb was transmitted and consumed */ | |
95332477 MH |
685 | batadv_inc_counter(bat_priv, BATADV_CNT_FORWARD); |
686 | batadv_add_counter(bat_priv, BATADV_CNT_FORWARD_BYTES, | |
63d443ef | 687 | len + ETH_HLEN); |
95332477 | 688 | } |
c6c8fea2 | 689 | |
f50ca95a AQ |
690 | ret = NET_RX_SUCCESS; |
691 | ||
44524fcd | 692 | out: |
44524fcd | 693 | if (orig_node) |
5d967310 | 694 | batadv_orig_node_put(orig_node); |
44524fcd | 695 | return ret; |
c6c8fea2 SE |
696 | } |
697 | ||
7c1fd91d AQ |
698 | /** |
699 | * batadv_reroute_unicast_packet - update the unicast header for re-routing | |
700 | * @bat_priv: the bat priv with all the soft interface information | |
701 | * @unicast_packet: the unicast header to be updated | |
702 | * @dst_addr: the payload destination | |
c018ad3d | 703 | * @vid: VLAN identifier |
7c1fd91d AQ |
704 | * |
705 | * Search the translation table for dst_addr and update the unicast header with | |
706 | * the new corresponding information (originator address where the destination | |
707 | * client currently is and its known TTVN) | |
708 | * | |
62fe710f | 709 | * Return: true if the packet header has been updated, false otherwise |
7c1fd91d AQ |
710 | */ |
711 | static bool | |
712 | batadv_reroute_unicast_packet(struct batadv_priv *bat_priv, | |
713 | struct batadv_unicast_packet *unicast_packet, | |
6b5e971a | 714 | u8 *dst_addr, unsigned short vid) |
7c1fd91d AQ |
715 | { |
716 | struct batadv_orig_node *orig_node = NULL; | |
717 | struct batadv_hard_iface *primary_if = NULL; | |
718 | bool ret = false; | |
6b5e971a | 719 | u8 *orig_addr, orig_ttvn; |
7c1fd91d | 720 | |
c018ad3d | 721 | if (batadv_is_my_client(bat_priv, dst_addr, vid)) { |
7c1fd91d AQ |
722 | primary_if = batadv_primary_if_get_selected(bat_priv); |
723 | if (!primary_if) | |
724 | goto out; | |
725 | orig_addr = primary_if->net_dev->dev_addr; | |
6b5e971a | 726 | orig_ttvn = (u8)atomic_read(&bat_priv->tt.vn); |
7c1fd91d | 727 | } else { |
c018ad3d AQ |
728 | orig_node = batadv_transtable_search(bat_priv, NULL, dst_addr, |
729 | vid); | |
7c1fd91d AQ |
730 | if (!orig_node) |
731 | goto out; | |
732 | ||
733 | if (batadv_compare_eth(orig_node->orig, unicast_packet->dest)) | |
734 | goto out; | |
735 | ||
736 | orig_addr = orig_node->orig; | |
6b5e971a | 737 | orig_ttvn = (u8)atomic_read(&orig_node->last_ttvn); |
7c1fd91d AQ |
738 | } |
739 | ||
740 | /* update the packet header */ | |
8fdd0153 | 741 | ether_addr_copy(unicast_packet->dest, orig_addr); |
7c1fd91d AQ |
742 | unicast_packet->ttvn = orig_ttvn; |
743 | ||
744 | ret = true; | |
745 | out: | |
746 | if (primary_if) | |
82047ad7 | 747 | batadv_hardif_put(primary_if); |
7c1fd91d | 748 | if (orig_node) |
5d967310 | 749 | batadv_orig_node_put(orig_node); |
7c1fd91d AQ |
750 | |
751 | return ret; | |
752 | } | |
753 | ||
4b426b10 SE |
754 | static bool batadv_check_unicast_ttvn(struct batadv_priv *bat_priv, |
755 | struct sk_buff *skb, int hdr_len) | |
756 | { | |
c018ad3d AQ |
757 | struct batadv_unicast_packet *unicast_packet; |
758 | struct batadv_hard_iface *primary_if; | |
56303d34 | 759 | struct batadv_orig_node *orig_node; |
6b5e971a | 760 | u8 curr_ttvn, old_ttvn; |
a73105b8 | 761 | struct ethhdr *ethhdr; |
c018ad3d | 762 | unsigned short vid; |
3e34819e | 763 | int is_old_ttvn; |
a73105b8 | 764 | |
b8fcfa42 | 765 | /* check if there is enough data before accessing it */ |
f1791425 | 766 | if (!pskb_may_pull(skb, hdr_len + ETH_HLEN)) |
4b426b10 | 767 | return false; |
b8fcfa42 AQ |
768 | |
769 | /* create a copy of the skb (in case of for re-routing) to modify it. */ | |
770 | if (skb_cow(skb, sizeof(*unicast_packet)) < 0) | |
4b426b10 | 771 | return false; |
a73105b8 | 772 | |
96412690 | 773 | unicast_packet = (struct batadv_unicast_packet *)skb->data; |
c018ad3d | 774 | vid = batadv_get_vid(skb, hdr_len); |
dd981ab0 | 775 | ethhdr = (struct ethhdr *)(skb->data + hdr_len); |
a73105b8 | 776 | |
7c1fd91d AQ |
777 | /* check if the destination client was served by this node and it is now |
778 | * roaming. In this case, it means that the node has got a ROAM_ADV | |
779 | * message and that it knows the new destination in the mesh to re-route | |
780 | * the packet to | |
781 | */ | |
c018ad3d | 782 | if (batadv_tt_local_client_is_roaming(bat_priv, ethhdr->h_dest, vid)) { |
7c1fd91d | 783 | if (batadv_reroute_unicast_packet(bat_priv, unicast_packet, |
c018ad3d | 784 | ethhdr->h_dest, vid)) |
23c4ec10 AG |
785 | batadv_dbg_ratelimited(BATADV_DBG_TT, |
786 | bat_priv, | |
787 | "Rerouting unicast packet to %pM (dst=%pM): Local Roaming\n", | |
788 | unicast_packet->dest, | |
789 | ethhdr->h_dest); | |
7c1fd91d AQ |
790 | /* at this point the mesh destination should have been |
791 | * substituted with the originator address found in the global | |
792 | * table. If not, let the packet go untouched anyway because | |
793 | * there is nothing the node can do | |
794 | */ | |
4b426b10 | 795 | return true; |
7c1fd91d AQ |
796 | } |
797 | ||
798 | /* retrieve the TTVN known by this node for the packet destination. This | |
799 | * value is used later to check if the node which sent (or re-routed | |
800 | * last time) the packet had an updated information or not | |
801 | */ | |
6b5e971a | 802 | curr_ttvn = (u8)atomic_read(&bat_priv->tt.vn); |
fe8a93b9 | 803 | if (!batadv_is_my_mac(bat_priv, unicast_packet->dest)) { |
da641193 SE |
804 | orig_node = batadv_orig_hash_find(bat_priv, |
805 | unicast_packet->dest); | |
7c1fd91d AQ |
806 | /* if it is not possible to find the orig_node representing the |
807 | * destination, the packet can immediately be dropped as it will | |
808 | * not be possible to deliver it | |
809 | */ | |
a73105b8 | 810 | if (!orig_node) |
4b426b10 | 811 | return false; |
a73105b8 | 812 | |
6b5e971a | 813 | curr_ttvn = (u8)atomic_read(&orig_node->last_ttvn); |
5d967310 | 814 | batadv_orig_node_put(orig_node); |
a73105b8 AQ |
815 | } |
816 | ||
7c1fd91d AQ |
817 | /* check if the TTVN contained in the packet is fresher than what the |
818 | * node knows | |
819 | */ | |
3e34819e | 820 | is_old_ttvn = batadv_seq_before(unicast_packet->ttvn, curr_ttvn); |
7c1fd91d | 821 | if (!is_old_ttvn) |
4b426b10 | 822 | return true; |
a73105b8 | 823 | |
7c1fd91d AQ |
824 | old_ttvn = unicast_packet->ttvn; |
825 | /* the packet was forged based on outdated network information. Its | |
826 | * destination can possibly be updated and forwarded towards the new | |
827 | * target host | |
828 | */ | |
829 | if (batadv_reroute_unicast_packet(bat_priv, unicast_packet, | |
c018ad3d | 830 | ethhdr->h_dest, vid)) { |
23c4ec10 AG |
831 | batadv_dbg_ratelimited(BATADV_DBG_TT, bat_priv, |
832 | "Rerouting unicast packet to %pM (dst=%pM): TTVN mismatch old_ttvn=%u new_ttvn=%u\n", | |
833 | unicast_packet->dest, ethhdr->h_dest, | |
834 | old_ttvn, curr_ttvn); | |
4b426b10 | 835 | return true; |
7c1fd91d | 836 | } |
3275e7cc | 837 | |
7c1fd91d AQ |
838 | /* the packet has not been re-routed: either the destination is |
839 | * currently served by this node or there is no destination at all and | |
840 | * it is possible to drop the packet | |
841 | */ | |
c018ad3d | 842 | if (!batadv_is_my_client(bat_priv, ethhdr->h_dest, vid)) |
4b426b10 | 843 | return false; |
3275e7cc | 844 | |
7c1fd91d AQ |
845 | /* update the header in order to let the packet be delivered to this |
846 | * node's soft interface | |
847 | */ | |
848 | primary_if = batadv_primary_if_get_selected(bat_priv); | |
849 | if (!primary_if) | |
4b426b10 | 850 | return false; |
a73105b8 | 851 | |
8fdd0153 | 852 | ether_addr_copy(unicast_packet->dest, primary_if->net_dev->dev_addr); |
7c1fd91d | 853 | |
82047ad7 | 854 | batadv_hardif_put(primary_if); |
7c1fd91d AQ |
855 | |
856 | unicast_packet->ttvn = curr_ttvn; | |
a73105b8 | 857 | |
4b426b10 | 858 | return true; |
a73105b8 AQ |
859 | } |
860 | ||
a1f1ac5c SW |
861 | /** |
862 | * batadv_recv_unhandled_unicast_packet - receive and process packets which | |
863 | * are in the unicast number space but not yet known to the implementation | |
864 | * @skb: unicast tvlv packet to process | |
865 | * @recv_if: pointer to interface this packet was received on | |
866 | * | |
62fe710f | 867 | * Return: NET_RX_SUCCESS if the packet has been consumed or NET_RX_DROP |
a1f1ac5c SW |
868 | * otherwise. |
869 | */ | |
870 | int batadv_recv_unhandled_unicast_packet(struct sk_buff *skb, | |
871 | struct batadv_hard_iface *recv_if) | |
872 | { | |
873 | struct batadv_unicast_packet *unicast_packet; | |
874 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); | |
875 | int check, hdr_size = sizeof(*unicast_packet); | |
876 | ||
877 | check = batadv_check_unicast_packet(bat_priv, skb, hdr_size); | |
878 | if (check < 0) | |
879 | return NET_RX_DROP; | |
880 | ||
881 | /* we don't know about this type, drop it. */ | |
882 | unicast_packet = (struct batadv_unicast_packet *)skb->data; | |
883 | if (batadv_is_my_mac(bat_priv, unicast_packet->dest)) | |
884 | return NET_RX_DROP; | |
885 | ||
886 | return batadv_route_unicast_packet(skb, recv_if); | |
887 | } | |
888 | ||
56303d34 SE |
889 | int batadv_recv_unicast_packet(struct sk_buff *skb, |
890 | struct batadv_hard_iface *recv_if) | |
c6c8fea2 | 891 | { |
56303d34 | 892 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); |
96412690 | 893 | struct batadv_unicast_packet *unicast_packet; |
4046b24a | 894 | struct batadv_unicast_4addr_packet *unicast_4addr_packet; |
6b5e971a | 895 | u8 *orig_addr; |
9affec6b | 896 | struct batadv_orig_node *orig_node = NULL; |
612d2b4f | 897 | int check, hdr_size = sizeof(*unicast_packet); |
437bb0e6 | 898 | enum batadv_subtype subtype; |
c384ea3e | 899 | bool is4addr; |
c6c8fea2 | 900 | |
7cdcf6dd | 901 | unicast_packet = (struct batadv_unicast_packet *)skb->data; |
4046b24a | 902 | unicast_4addr_packet = (struct batadv_unicast_4addr_packet *)skb->data; |
7cdcf6dd | 903 | |
a40d9b07 | 904 | is4addr = unicast_packet->packet_type == BATADV_UNICAST_4ADDR; |
7cdcf6dd | 905 | /* the caller function should have already pulled 2 bytes */ |
c384ea3e | 906 | if (is4addr) |
4046b24a | 907 | hdr_size = sizeof(*unicast_4addr_packet); |
7cdcf6dd | 908 | |
612d2b4f | 909 | /* function returns -EREMOTE for promiscuous packets */ |
6e0895c2 | 910 | check = batadv_check_unicast_packet(bat_priv, skb, hdr_size); |
612d2b4f MH |
911 | |
912 | /* Even though the packet is not for us, we might save it to use for | |
913 | * decoding a later received coded packet | |
914 | */ | |
915 | if (check == -EREMOTE) | |
916 | batadv_nc_skb_store_sniffed_unicast(bat_priv, skb); | |
917 | ||
918 | if (check < 0) | |
c6c8fea2 | 919 | return NET_RX_DROP; |
dd981ab0 | 920 | if (!batadv_check_unicast_ttvn(bat_priv, skb, hdr_size)) |
a73105b8 AQ |
921 | return NET_RX_DROP; |
922 | ||
c6c8fea2 | 923 | /* packet for me */ |
fe8a93b9 | 924 | if (batadv_is_my_mac(bat_priv, unicast_packet->dest)) { |
9affec6b | 925 | if (is4addr) { |
437bb0e6 SW |
926 | subtype = unicast_4addr_packet->subtype; |
927 | batadv_dat_inc_counter(bat_priv, subtype); | |
928 | ||
929 | /* Only payload data should be considered for speedy | |
930 | * join. For example, DAT also uses unicast 4addr | |
931 | * types, but those packets should not be considered | |
932 | * for speedy join, since the clients do not actually | |
933 | * reside at the sending originator. | |
934 | */ | |
935 | if (subtype == BATADV_P_DATA) { | |
936 | orig_addr = unicast_4addr_packet->src; | |
937 | orig_node = batadv_orig_hash_find(bat_priv, | |
938 | orig_addr); | |
939 | } | |
9affec6b | 940 | } |
4046b24a | 941 | |
c384ea3e AQ |
942 | if (batadv_dat_snoop_incoming_arp_request(bat_priv, skb, |
943 | hdr_size)) | |
944 | goto rx_success; | |
945 | if (batadv_dat_snoop_incoming_arp_reply(bat_priv, skb, | |
946 | hdr_size)) | |
947 | goto rx_success; | |
948 | ||
6535db56 | 949 | batadv_interface_rx(recv_if->soft_iface, skb, hdr_size, |
9affec6b | 950 | orig_node); |
37135173 | 951 | |
c384ea3e | 952 | rx_success: |
9affec6b | 953 | if (orig_node) |
5d967310 | 954 | batadv_orig_node_put(orig_node); |
9affec6b | 955 | |
c6c8fea2 SE |
956 | return NET_RX_SUCCESS; |
957 | } | |
958 | ||
63b01037 | 959 | return batadv_route_unicast_packet(skb, recv_if); |
c6c8fea2 SE |
960 | } |
961 | ||
ef261577 ML |
962 | /** |
963 | * batadv_recv_unicast_tvlv - receive and process unicast tvlv packets | |
964 | * @skb: unicast tvlv packet to process | |
965 | * @recv_if: pointer to interface this packet was received on | |
ef261577 | 966 | * |
62fe710f | 967 | * Return: NET_RX_SUCCESS if the packet has been consumed or NET_RX_DROP |
ef261577 ML |
968 | * otherwise. |
969 | */ | |
970 | int batadv_recv_unicast_tvlv(struct sk_buff *skb, | |
971 | struct batadv_hard_iface *recv_if) | |
972 | { | |
973 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); | |
974 | struct batadv_unicast_tvlv_packet *unicast_tvlv_packet; | |
975 | unsigned char *tvlv_buff; | |
6b5e971a | 976 | u16 tvlv_buff_len; |
ef261577 ML |
977 | int hdr_size = sizeof(*unicast_tvlv_packet); |
978 | int ret = NET_RX_DROP; | |
979 | ||
980 | if (batadv_check_unicast_packet(bat_priv, skb, hdr_size) < 0) | |
981 | return NET_RX_DROP; | |
982 | ||
983 | /* the header is likely to be modified while forwarding */ | |
984 | if (skb_cow(skb, hdr_size) < 0) | |
985 | return NET_RX_DROP; | |
986 | ||
987 | /* packet needs to be linearized to access the tvlv content */ | |
988 | if (skb_linearize(skb) < 0) | |
989 | return NET_RX_DROP; | |
990 | ||
991 | unicast_tvlv_packet = (struct batadv_unicast_tvlv_packet *)skb->data; | |
992 | ||
993 | tvlv_buff = (unsigned char *)(skb->data + hdr_size); | |
994 | tvlv_buff_len = ntohs(unicast_tvlv_packet->tvlv_len); | |
995 | ||
996 | if (tvlv_buff_len > skb->len - hdr_size) | |
997 | return NET_RX_DROP; | |
998 | ||
999 | ret = batadv_tvlv_containers_process(bat_priv, false, NULL, | |
1000 | unicast_tvlv_packet->src, | |
1001 | unicast_tvlv_packet->dst, | |
1002 | tvlv_buff, tvlv_buff_len); | |
1003 | ||
1004 | if (ret != NET_RX_SUCCESS) | |
1005 | ret = batadv_route_unicast_packet(skb, recv_if); | |
05c3c8a6 AQ |
1006 | else |
1007 | consume_skb(skb); | |
ef261577 ML |
1008 | |
1009 | return ret; | |
1010 | } | |
c6c8fea2 | 1011 | |
610bfc6b MH |
1012 | /** |
1013 | * batadv_recv_frag_packet - process received fragment | |
1014 | * @skb: the received fragment | |
1015 | * @recv_if: interface that the skb is received on | |
1016 | * | |
1017 | * This function does one of the three following things: 1) Forward fragment, if | |
1018 | * the assembled packet will exceed our MTU; 2) Buffer fragment, if we till | |
1019 | * lack further fragments; 3) Merge fragments, if we have all needed parts. | |
1020 | * | |
62fe710f | 1021 | * Return: NET_RX_DROP if the skb is not consumed, NET_RX_SUCCESS otherwise. |
610bfc6b MH |
1022 | */ |
1023 | int batadv_recv_frag_packet(struct sk_buff *skb, | |
1024 | struct batadv_hard_iface *recv_if) | |
1025 | { | |
1026 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); | |
1027 | struct batadv_orig_node *orig_node_src = NULL; | |
1028 | struct batadv_frag_packet *frag_packet; | |
1029 | int ret = NET_RX_DROP; | |
1030 | ||
1031 | if (batadv_check_unicast_packet(bat_priv, skb, | |
1032 | sizeof(*frag_packet)) < 0) | |
1033 | goto out; | |
1034 | ||
1035 | frag_packet = (struct batadv_frag_packet *)skb->data; | |
1036 | orig_node_src = batadv_orig_hash_find(bat_priv, frag_packet->orig); | |
1037 | if (!orig_node_src) | |
1038 | goto out; | |
1039 | ||
c0f25c80 AL |
1040 | skb->priority = frag_packet->priority + 256; |
1041 | ||
610bfc6b MH |
1042 | /* Route the fragment if it is not for us and too big to be merged. */ |
1043 | if (!batadv_is_my_mac(bat_priv, frag_packet->dest) && | |
1044 | batadv_frag_skb_fwd(skb, recv_if, orig_node_src)) { | |
1045 | ret = NET_RX_SUCCESS; | |
1046 | goto out; | |
1047 | } | |
1048 | ||
1049 | batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_RX); | |
1050 | batadv_add_counter(bat_priv, BATADV_CNT_FRAG_RX_BYTES, skb->len); | |
1051 | ||
1052 | /* Add fragment to buffer and merge if possible. */ | |
1053 | if (!batadv_frag_skb_buffer(&skb, orig_node_src)) | |
1054 | goto out; | |
1055 | ||
1056 | /* Deliver merged packet to the appropriate handler, if it was | |
1057 | * merged | |
1058 | */ | |
1059 | if (skb) | |
1060 | batadv_batman_skb_recv(skb, recv_if->net_dev, | |
1061 | &recv_if->batman_adv_ptype, NULL); | |
1062 | ||
1063 | ret = NET_RX_SUCCESS; | |
1064 | ||
1065 | out: | |
1066 | if (orig_node_src) | |
5d967310 | 1067 | batadv_orig_node_put(orig_node_src); |
610bfc6b MH |
1068 | |
1069 | return ret; | |
1070 | } | |
1071 | ||
56303d34 SE |
1072 | int batadv_recv_bcast_packet(struct sk_buff *skb, |
1073 | struct batadv_hard_iface *recv_if) | |
c6c8fea2 | 1074 | { |
56303d34 SE |
1075 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); |
1076 | struct batadv_orig_node *orig_node = NULL; | |
96412690 | 1077 | struct batadv_bcast_packet *bcast_packet; |
c6c8fea2 | 1078 | struct ethhdr *ethhdr; |
704509b8 | 1079 | int hdr_size = sizeof(*bcast_packet); |
f3e0008f | 1080 | int ret = NET_RX_DROP; |
6b5e971a SE |
1081 | s32 seq_diff; |
1082 | u32 seqno; | |
c6c8fea2 SE |
1083 | |
1084 | /* drop packet if it has not necessary minimum size */ | |
1085 | if (unlikely(!pskb_may_pull(skb, hdr_size))) | |
f3e0008f | 1086 | goto out; |
c6c8fea2 | 1087 | |
7ed4be95 | 1088 | ethhdr = eth_hdr(skb); |
c6c8fea2 SE |
1089 | |
1090 | /* packet with broadcast indication but unicast recipient */ | |
1091 | if (!is_broadcast_ether_addr(ethhdr->h_dest)) | |
f3e0008f | 1092 | goto out; |
c6c8fea2 SE |
1093 | |
1094 | /* packet with broadcast sender address */ | |
1095 | if (is_broadcast_ether_addr(ethhdr->h_source)) | |
f3e0008f | 1096 | goto out; |
c6c8fea2 SE |
1097 | |
1098 | /* ignore broadcasts sent by myself */ | |
fe8a93b9 | 1099 | if (batadv_is_my_mac(bat_priv, ethhdr->h_source)) |
f3e0008f | 1100 | goto out; |
c6c8fea2 | 1101 | |
96412690 | 1102 | bcast_packet = (struct batadv_bcast_packet *)skb->data; |
c6c8fea2 SE |
1103 | |
1104 | /* ignore broadcasts originated by myself */ | |
fe8a93b9 | 1105 | if (batadv_is_my_mac(bat_priv, bcast_packet->orig)) |
f3e0008f | 1106 | goto out; |
c6c8fea2 | 1107 | |
a40d9b07 | 1108 | if (bcast_packet->ttl < 2) |
f3e0008f | 1109 | goto out; |
c6c8fea2 | 1110 | |
da641193 | 1111 | orig_node = batadv_orig_hash_find(bat_priv, bcast_packet->orig); |
f3e0008f ML |
1112 | |
1113 | if (!orig_node) | |
b5a6f69c | 1114 | goto out; |
c6c8fea2 | 1115 | |
f3e0008f | 1116 | spin_lock_bh(&orig_node->bcast_seqno_lock); |
c6c8fea2 | 1117 | |
3fba7325 | 1118 | seqno = ntohl(bcast_packet->seqno); |
c6c8fea2 | 1119 | /* check whether the packet is a duplicate */ |
9b4a1159 | 1120 | if (batadv_test_bit(orig_node->bcast_bits, orig_node->last_bcast_seqno, |
3fba7325 | 1121 | seqno)) |
f3e0008f | 1122 | goto spin_unlock; |
c6c8fea2 | 1123 | |
3fba7325 | 1124 | seq_diff = seqno - orig_node->last_bcast_seqno; |
c6c8fea2 SE |
1125 | |
1126 | /* check whether the packet is old and the host just restarted. */ | |
30d3c511 | 1127 | if (batadv_window_protected(bat_priv, seq_diff, |
81f02683 SW |
1128 | BATADV_BCAST_MAX_AGE, |
1129 | &orig_node->bcast_seqno_reset, NULL)) | |
f3e0008f | 1130 | goto spin_unlock; |
c6c8fea2 SE |
1131 | |
1132 | /* mark broadcast in flood history, update window position | |
9cfc7bd6 SE |
1133 | * if required. |
1134 | */ | |
0f5f9322 | 1135 | if (batadv_bit_get_packet(bat_priv, orig_node->bcast_bits, seq_diff, 1)) |
3fba7325 | 1136 | orig_node->last_bcast_seqno = seqno; |
c6c8fea2 | 1137 | |
f3e0008f | 1138 | spin_unlock_bh(&orig_node->bcast_seqno_lock); |
f3e0008f | 1139 | |
fe2da6ff | 1140 | /* check whether this has been sent by another originator before */ |
004e86fc | 1141 | if (batadv_bla_check_bcast_duplist(bat_priv, skb)) |
fe2da6ff SW |
1142 | goto out; |
1143 | ||
c54f38c9 SW |
1144 | batadv_skb_set_priority(skb, sizeof(struct batadv_bcast_packet)); |
1145 | ||
c6c8fea2 | 1146 | /* rebroadcast packet */ |
9455e34c | 1147 | batadv_add_bcast_packet_to_list(bat_priv, skb, 1); |
c6c8fea2 | 1148 | |
23721387 SW |
1149 | /* don't hand the broadcast up if it is from an originator |
1150 | * from the same backbone. | |
1151 | */ | |
08adf151 | 1152 | if (batadv_bla_is_backbone_gw(skb, orig_node, hdr_size)) |
23721387 SW |
1153 | goto out; |
1154 | ||
c384ea3e AQ |
1155 | if (batadv_dat_snoop_incoming_arp_request(bat_priv, skb, hdr_size)) |
1156 | goto rx_success; | |
1157 | if (batadv_dat_snoop_incoming_arp_reply(bat_priv, skb, hdr_size)) | |
1158 | goto rx_success; | |
1159 | ||
c6c8fea2 | 1160 | /* broadcast for me */ |
6535db56 | 1161 | batadv_interface_rx(recv_if->soft_iface, skb, hdr_size, orig_node); |
c384ea3e AQ |
1162 | |
1163 | rx_success: | |
f3e0008f ML |
1164 | ret = NET_RX_SUCCESS; |
1165 | goto out; | |
c6c8fea2 | 1166 | |
f3e0008f ML |
1167 | spin_unlock: |
1168 | spin_unlock_bh(&orig_node->bcast_seqno_lock); | |
f3e0008f ML |
1169 | out: |
1170 | if (orig_node) | |
5d967310 | 1171 | batadv_orig_node_put(orig_node); |
f3e0008f | 1172 | return ret; |
c6c8fea2 | 1173 | } |