Commit | Line | Data |
---|---|---|
c6c8fea2 | 1 | /* |
567db7b0 | 2 | * Copyright (C) 2007-2012 B.A.T.M.A.N. contributors: |
c6c8fea2 SE |
3 | * |
4 | * Marek Lindner, Simon Wunderlich | |
5 | * | |
6 | * This program is free software; you can redistribute it and/or | |
7 | * modify it under the terms of version 2 of the GNU General Public | |
8 | * License as published by the Free Software Foundation. | |
9 | * | |
10 | * This program is distributed in the hope that it will be useful, but | |
11 | * WITHOUT ANY WARRANTY; without even the implied warranty of | |
12 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
13 | * General Public License for more details. | |
14 | * | |
15 | * You should have received a copy of the GNU General Public License | |
16 | * along with this program; if not, write to the Free Software | |
17 | * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA | |
18 | * 02110-1301, USA | |
19 | * | |
20 | */ | |
21 | ||
22 | #include "main.h" | |
23 | #include "routing.h" | |
24 | #include "send.h" | |
c6c8fea2 SE |
25 | #include "soft-interface.h" |
26 | #include "hard-interface.h" | |
27 | #include "icmp_socket.h" | |
28 | #include "translation-table.h" | |
29 | #include "originator.h" | |
c6c8fea2 | 30 | #include "vis.h" |
c6c8fea2 | 31 | #include "unicast.h" |
23721387 | 32 | #include "bridge_loop_avoidance.h" |
c6c8fea2 | 33 | |
a7f6ee94 SW |
34 | static int route_unicast_packet(struct sk_buff *skb, |
35 | struct hard_iface *recv_if); | |
36 | ||
e6c10f43 | 37 | void slide_own_bcast_window(struct hard_iface *hard_iface) |
c6c8fea2 | 38 | { |
e6c10f43 | 39 | struct bat_priv *bat_priv = netdev_priv(hard_iface->soft_iface); |
c6c8fea2 | 40 | struct hashtable_t *hash = bat_priv->orig_hash; |
7aadf889 | 41 | struct hlist_node *node; |
c6c8fea2 | 42 | struct hlist_head *head; |
c6c8fea2 SE |
43 | struct orig_node *orig_node; |
44 | unsigned long *word; | |
c90681b8 | 45 | uint32_t i; |
c6c8fea2 SE |
46 | size_t word_index; |
47 | ||
c6c8fea2 SE |
48 | for (i = 0; i < hash->size; i++) { |
49 | head = &hash->table[i]; | |
50 | ||
fb778ea1 | 51 | rcu_read_lock(); |
7aadf889 | 52 | hlist_for_each_entry_rcu(orig_node, node, head, hash_entry) { |
2ae2daf6 | 53 | spin_lock_bh(&orig_node->ogm_cnt_lock); |
e6c10f43 | 54 | word_index = hard_iface->if_num * NUM_WORDS; |
c6c8fea2 SE |
55 | word = &(orig_node->bcast_own[word_index]); |
56 | ||
0f5f9322 | 57 | batadv_bit_get_packet(bat_priv, word, 1, 0); |
e6c10f43 | 58 | orig_node->bcast_own_sum[hard_iface->if_num] = |
0079d2ce | 59 | bitmap_weight(word, TQ_LOCAL_WINDOW_SIZE); |
2ae2daf6 | 60 | spin_unlock_bh(&orig_node->ogm_cnt_lock); |
c6c8fea2 | 61 | } |
fb778ea1 | 62 | rcu_read_unlock(); |
c6c8fea2 | 63 | } |
c6c8fea2 SE |
64 | } |
65 | ||
fc957275 ML |
66 | static void _update_route(struct bat_priv *bat_priv, |
67 | struct orig_node *orig_node, | |
68 | struct neigh_node *neigh_node) | |
c6c8fea2 | 69 | { |
e1a5382f LL |
70 | struct neigh_node *curr_router; |
71 | ||
7d211efc | 72 | curr_router = batadv_orig_node_get_router(orig_node); |
a8e7f4bc | 73 | |
c6c8fea2 | 74 | /* route deleted */ |
e1a5382f | 75 | if ((curr_router) && (!neigh_node)) { |
c6c8fea2 SE |
76 | bat_dbg(DBG_ROUTES, bat_priv, "Deleting route towards: %pM\n", |
77 | orig_node->orig); | |
2dafb49d | 78 | tt_global_del_orig(bat_priv, orig_node, |
7c64fd98 | 79 | "Deleted route towards originator"); |
c6c8fea2 | 80 | |
e1a5382f LL |
81 | /* route added */ |
82 | } else if ((!curr_router) && (neigh_node)) { | |
c6c8fea2 SE |
83 | |
84 | bat_dbg(DBG_ROUTES, bat_priv, | |
85 | "Adding route towards: %pM (via %pM)\n", | |
86 | orig_node->orig, neigh_node->addr); | |
e1a5382f | 87 | /* route changed */ |
bb899b89 | 88 | } else if (neigh_node && curr_router) { |
c6c8fea2 | 89 | bat_dbg(DBG_ROUTES, bat_priv, |
86ceb360 | 90 | "Changing route towards: %pM (now via %pM - was via %pM)\n", |
c6c8fea2 | 91 | orig_node->orig, neigh_node->addr, |
e1a5382f | 92 | curr_router->addr); |
c6c8fea2 SE |
93 | } |
94 | ||
e1a5382f | 95 | if (curr_router) |
7d211efc | 96 | batadv_neigh_node_free_ref(curr_router); |
e1a5382f LL |
97 | |
98 | /* increase refcount of new best neighbor */ | |
44524fcd ML |
99 | if (neigh_node && !atomic_inc_not_zero(&neigh_node->refcount)) |
100 | neigh_node = NULL; | |
e1a5382f LL |
101 | |
102 | spin_lock_bh(&orig_node->neigh_list_lock); | |
103 | rcu_assign_pointer(orig_node->router, neigh_node); | |
104 | spin_unlock_bh(&orig_node->neigh_list_lock); | |
105 | ||
106 | /* decrease refcount of previous best neighbor */ | |
107 | if (curr_router) | |
7d211efc | 108 | batadv_neigh_node_free_ref(curr_router); |
c6c8fea2 SE |
109 | } |
110 | ||
fc957275 ML |
111 | void update_route(struct bat_priv *bat_priv, struct orig_node *orig_node, |
112 | struct neigh_node *neigh_node) | |
c6c8fea2 | 113 | { |
e1a5382f | 114 | struct neigh_node *router = NULL; |
c6c8fea2 SE |
115 | |
116 | if (!orig_node) | |
e1a5382f LL |
117 | goto out; |
118 | ||
7d211efc | 119 | router = batadv_orig_node_get_router(orig_node); |
c6c8fea2 | 120 | |
e1a5382f | 121 | if (router != neigh_node) |
fc957275 | 122 | _update_route(bat_priv, orig_node, neigh_node); |
e1a5382f LL |
123 | |
124 | out: | |
125 | if (router) | |
7d211efc | 126 | batadv_neigh_node_free_ref(router); |
c6c8fea2 SE |
127 | } |
128 | ||
a4c135c5 SW |
129 | /* caller must hold the neigh_list_lock */ |
130 | void bonding_candidate_del(struct orig_node *orig_node, | |
131 | struct neigh_node *neigh_node) | |
132 | { | |
133 | /* this neighbor is not part of our candidate list */ | |
134 | if (list_empty(&neigh_node->bonding_list)) | |
135 | goto out; | |
136 | ||
137 | list_del_rcu(&neigh_node->bonding_list); | |
a4c135c5 | 138 | INIT_LIST_HEAD(&neigh_node->bonding_list); |
7d211efc | 139 | batadv_neigh_node_free_ref(neigh_node); |
a4c135c5 SW |
140 | atomic_dec(&orig_node->bond_candidates); |
141 | ||
142 | out: | |
143 | return; | |
144 | } | |
145 | ||
fc957275 ML |
146 | void bonding_candidate_add(struct orig_node *orig_node, |
147 | struct neigh_node *neigh_node) | |
a4c135c5 SW |
148 | { |
149 | struct hlist_node *node; | |
e1a5382f LL |
150 | struct neigh_node *tmp_neigh_node, *router = NULL; |
151 | uint8_t interference_candidate = 0; | |
a4c135c5 SW |
152 | |
153 | spin_lock_bh(&orig_node->neigh_list_lock); | |
154 | ||
155 | /* only consider if it has the same primary address ... */ | |
39901e71 ML |
156 | if (!compare_eth(orig_node->orig, |
157 | neigh_node->orig_node->primary_addr)) | |
a4c135c5 SW |
158 | goto candidate_del; |
159 | ||
7d211efc | 160 | router = batadv_orig_node_get_router(orig_node); |
e1a5382f | 161 | if (!router) |
a4c135c5 SW |
162 | goto candidate_del; |
163 | ||
a4c135c5 | 164 | /* ... and is good enough to be considered */ |
e1a5382f | 165 | if (neigh_node->tq_avg < router->tq_avg - BONDING_TQ_THRESHOLD) |
a4c135c5 SW |
166 | goto candidate_del; |
167 | ||
168 | /** | |
169 | * check if we have another candidate with the same mac address or | |
170 | * interface. If we do, we won't select this candidate because of | |
171 | * possible interference. | |
172 | */ | |
173 | hlist_for_each_entry_rcu(tmp_neigh_node, node, | |
174 | &orig_node->neigh_list, list) { | |
175 | ||
176 | if (tmp_neigh_node == neigh_node) | |
177 | continue; | |
178 | ||
179 | /* we only care if the other candidate is even | |
180 | * considered as candidate. */ | |
181 | if (list_empty(&tmp_neigh_node->bonding_list)) | |
182 | continue; | |
183 | ||
184 | if ((neigh_node->if_incoming == tmp_neigh_node->if_incoming) || | |
39901e71 | 185 | (compare_eth(neigh_node->addr, tmp_neigh_node->addr))) { |
a4c135c5 SW |
186 | interference_candidate = 1; |
187 | break; | |
188 | } | |
189 | } | |
190 | ||
191 | /* don't care further if it is an interference candidate */ | |
192 | if (interference_candidate) | |
193 | goto candidate_del; | |
194 | ||
195 | /* this neighbor already is part of our candidate list */ | |
196 | if (!list_empty(&neigh_node->bonding_list)) | |
197 | goto out; | |
198 | ||
44524fcd ML |
199 | if (!atomic_inc_not_zero(&neigh_node->refcount)) |
200 | goto out; | |
201 | ||
a4c135c5 | 202 | list_add_rcu(&neigh_node->bonding_list, &orig_node->bond_list); |
a4c135c5 SW |
203 | atomic_inc(&orig_node->bond_candidates); |
204 | goto out; | |
205 | ||
206 | candidate_del: | |
207 | bonding_candidate_del(orig_node, neigh_node); | |
208 | ||
209 | out: | |
210 | spin_unlock_bh(&orig_node->neigh_list_lock); | |
e1a5382f LL |
211 | |
212 | if (router) | |
7d211efc | 213 | batadv_neigh_node_free_ref(router); |
a4c135c5 SW |
214 | } |
215 | ||
216 | /* copy primary address for bonding */ | |
fc957275 ML |
217 | void bonding_save_primary(const struct orig_node *orig_node, |
218 | struct orig_node *orig_neigh_node, | |
219 | const struct batman_ogm_packet *batman_ogm_packet) | |
a4c135c5 | 220 | { |
b6da4bf5 | 221 | if (!(batman_ogm_packet->flags & PRIMARIES_FIRST_HOP)) |
a4c135c5 SW |
222 | return; |
223 | ||
224 | memcpy(orig_neigh_node->primary_addr, orig_node->orig, ETH_ALEN); | |
225 | } | |
226 | ||
c6c8fea2 SE |
227 | /* checks whether the host restarted and is in the protection time. |
228 | * returns: | |
229 | * 0 if the packet is to be accepted | |
230 | * 1 if the packet is to be ignored. | |
231 | */ | |
fc957275 ML |
232 | int window_protected(struct bat_priv *bat_priv, int32_t seq_num_diff, |
233 | unsigned long *last_reset) | |
c6c8fea2 | 234 | { |
7c64fd98 SE |
235 | if ((seq_num_diff <= -TQ_LOCAL_WINDOW_SIZE) || |
236 | (seq_num_diff >= EXPECTED_SEQNO_RANGE)) { | |
8c7bf248 | 237 | if (!has_timed_out(*last_reset, RESET_PROTECTION_MS)) |
c6c8fea2 | 238 | return 1; |
8c7bf248 ML |
239 | |
240 | *last_reset = jiffies; | |
241 | bat_dbg(DBG_BATMAN, bat_priv, | |
242 | "old packet received, start protection\n"); | |
c6c8fea2 | 243 | } |
8c7bf248 | 244 | |
c6c8fea2 SE |
245 | return 0; |
246 | } | |
247 | ||
c3e29312 ML |
248 | bool check_management_packet(struct sk_buff *skb, |
249 | struct hard_iface *hard_iface, | |
250 | int header_len) | |
c6c8fea2 | 251 | { |
c6c8fea2 SE |
252 | struct ethhdr *ethhdr; |
253 | ||
254 | /* drop packet if it has not necessary minimum size */ | |
c3e29312 ML |
255 | if (unlikely(!pskb_may_pull(skb, header_len))) |
256 | return false; | |
c6c8fea2 SE |
257 | |
258 | ethhdr = (struct ethhdr *)skb_mac_header(skb); | |
259 | ||
260 | /* packet with broadcast indication but unicast recipient */ | |
261 | if (!is_broadcast_ether_addr(ethhdr->h_dest)) | |
c3e29312 | 262 | return false; |
c6c8fea2 SE |
263 | |
264 | /* packet with broadcast sender address */ | |
265 | if (is_broadcast_ether_addr(ethhdr->h_source)) | |
c3e29312 | 266 | return false; |
c6c8fea2 SE |
267 | |
268 | /* create a copy of the skb, if needed, to modify it. */ | |
269 | if (skb_cow(skb, 0) < 0) | |
c3e29312 | 270 | return false; |
c6c8fea2 SE |
271 | |
272 | /* keep skb linear */ | |
273 | if (skb_linearize(skb) < 0) | |
c3e29312 | 274 | return false; |
c6c8fea2 | 275 | |
c3e29312 | 276 | return true; |
c6c8fea2 SE |
277 | } |
278 | ||
279 | static int recv_my_icmp_packet(struct bat_priv *bat_priv, | |
280 | struct sk_buff *skb, size_t icmp_len) | |
281 | { | |
32ae9b22 | 282 | struct hard_iface *primary_if = NULL; |
44524fcd | 283 | struct orig_node *orig_node = NULL; |
e1a5382f | 284 | struct neigh_node *router = NULL; |
c6c8fea2 | 285 | struct icmp_packet_rr *icmp_packet; |
44524fcd | 286 | int ret = NET_RX_DROP; |
c6c8fea2 SE |
287 | |
288 | icmp_packet = (struct icmp_packet_rr *)skb->data; | |
c6c8fea2 SE |
289 | |
290 | /* add data to device queue */ | |
291 | if (icmp_packet->msg_type != ECHO_REQUEST) { | |
9039dc7e | 292 | batadv_socket_receive_packet(icmp_packet, icmp_len); |
44524fcd | 293 | goto out; |
c6c8fea2 SE |
294 | } |
295 | ||
32ae9b22 ML |
296 | primary_if = primary_if_get_selected(bat_priv); |
297 | if (!primary_if) | |
44524fcd | 298 | goto out; |
c6c8fea2 SE |
299 | |
300 | /* answer echo request (ping) */ | |
301 | /* get routing information */ | |
7aadf889 | 302 | orig_node = orig_hash_find(bat_priv, icmp_packet->orig); |
44524fcd | 303 | if (!orig_node) |
e1a5382f | 304 | goto out; |
c6c8fea2 | 305 | |
7d211efc | 306 | router = batadv_orig_node_get_router(orig_node); |
e1a5382f LL |
307 | if (!router) |
308 | goto out; | |
c6c8fea2 | 309 | |
44524fcd | 310 | /* create a copy of the skb, if needed, to modify it. */ |
0d125074 | 311 | if (skb_cow(skb, ETH_HLEN) < 0) |
44524fcd ML |
312 | goto out; |
313 | ||
314 | icmp_packet = (struct icmp_packet_rr *)skb->data; | |
315 | ||
316 | memcpy(icmp_packet->dst, icmp_packet->orig, ETH_ALEN); | |
32ae9b22 | 317 | memcpy(icmp_packet->orig, primary_if->net_dev->dev_addr, ETH_ALEN); |
44524fcd | 318 | icmp_packet->msg_type = ECHO_REPLY; |
76543d14 | 319 | icmp_packet->header.ttl = TTL; |
44524fcd | 320 | |
e1a5382f | 321 | send_skb_packet(skb, router->if_incoming, router->addr); |
44524fcd | 322 | ret = NET_RX_SUCCESS; |
c6c8fea2 | 323 | |
44524fcd | 324 | out: |
32ae9b22 ML |
325 | if (primary_if) |
326 | hardif_free_ref(primary_if); | |
e1a5382f | 327 | if (router) |
7d211efc | 328 | batadv_neigh_node_free_ref(router); |
44524fcd | 329 | if (orig_node) |
7d211efc | 330 | batadv_orig_node_free_ref(orig_node); |
c6c8fea2 SE |
331 | return ret; |
332 | } | |
333 | ||
334 | static int recv_icmp_ttl_exceeded(struct bat_priv *bat_priv, | |
74ef1153 | 335 | struct sk_buff *skb) |
c6c8fea2 | 336 | { |
32ae9b22 | 337 | struct hard_iface *primary_if = NULL; |
44524fcd | 338 | struct orig_node *orig_node = NULL; |
e1a5382f | 339 | struct neigh_node *router = NULL; |
c6c8fea2 | 340 | struct icmp_packet *icmp_packet; |
44524fcd | 341 | int ret = NET_RX_DROP; |
c6c8fea2 SE |
342 | |
343 | icmp_packet = (struct icmp_packet *)skb->data; | |
c6c8fea2 SE |
344 | |
345 | /* send TTL exceeded if packet is an echo request (traceroute) */ | |
346 | if (icmp_packet->msg_type != ECHO_REQUEST) { | |
86ceb360 SE |
347 | pr_debug("Warning - can't forward icmp packet from %pM to %pM: ttl exceeded\n", |
348 | icmp_packet->orig, icmp_packet->dst); | |
44524fcd | 349 | goto out; |
c6c8fea2 SE |
350 | } |
351 | ||
32ae9b22 ML |
352 | primary_if = primary_if_get_selected(bat_priv); |
353 | if (!primary_if) | |
44524fcd | 354 | goto out; |
c6c8fea2 SE |
355 | |
356 | /* get routing information */ | |
7aadf889 | 357 | orig_node = orig_hash_find(bat_priv, icmp_packet->orig); |
44524fcd | 358 | if (!orig_node) |
e1a5382f | 359 | goto out; |
c6c8fea2 | 360 | |
7d211efc | 361 | router = batadv_orig_node_get_router(orig_node); |
e1a5382f LL |
362 | if (!router) |
363 | goto out; | |
c6c8fea2 | 364 | |
44524fcd | 365 | /* create a copy of the skb, if needed, to modify it. */ |
0d125074 | 366 | if (skb_cow(skb, ETH_HLEN) < 0) |
44524fcd | 367 | goto out; |
c6c8fea2 | 368 | |
44524fcd | 369 | icmp_packet = (struct icmp_packet *)skb->data; |
c6c8fea2 | 370 | |
44524fcd | 371 | memcpy(icmp_packet->dst, icmp_packet->orig, ETH_ALEN); |
32ae9b22 | 372 | memcpy(icmp_packet->orig, primary_if->net_dev->dev_addr, ETH_ALEN); |
44524fcd | 373 | icmp_packet->msg_type = TTL_EXCEEDED; |
76543d14 | 374 | icmp_packet->header.ttl = TTL; |
44524fcd | 375 | |
e1a5382f | 376 | send_skb_packet(skb, router->if_incoming, router->addr); |
44524fcd | 377 | ret = NET_RX_SUCCESS; |
c6c8fea2 | 378 | |
44524fcd | 379 | out: |
32ae9b22 ML |
380 | if (primary_if) |
381 | hardif_free_ref(primary_if); | |
e1a5382f | 382 | if (router) |
7d211efc | 383 | batadv_neigh_node_free_ref(router); |
44524fcd | 384 | if (orig_node) |
7d211efc | 385 | batadv_orig_node_free_ref(orig_node); |
c6c8fea2 SE |
386 | return ret; |
387 | } | |
388 | ||
389 | ||
e6c10f43 | 390 | int recv_icmp_packet(struct sk_buff *skb, struct hard_iface *recv_if) |
c6c8fea2 SE |
391 | { |
392 | struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface); | |
393 | struct icmp_packet_rr *icmp_packet; | |
394 | struct ethhdr *ethhdr; | |
44524fcd | 395 | struct orig_node *orig_node = NULL; |
e1a5382f | 396 | struct neigh_node *router = NULL; |
c6c8fea2 | 397 | int hdr_size = sizeof(struct icmp_packet); |
44524fcd | 398 | int ret = NET_RX_DROP; |
c6c8fea2 SE |
399 | |
400 | /** | |
401 | * we truncate all incoming icmp packets if they don't match our size | |
402 | */ | |
403 | if (skb->len >= sizeof(struct icmp_packet_rr)) | |
404 | hdr_size = sizeof(struct icmp_packet_rr); | |
405 | ||
406 | /* drop packet if it has not necessary minimum size */ | |
407 | if (unlikely(!pskb_may_pull(skb, hdr_size))) | |
44524fcd | 408 | goto out; |
c6c8fea2 SE |
409 | |
410 | ethhdr = (struct ethhdr *)skb_mac_header(skb); | |
411 | ||
412 | /* packet with unicast indication but broadcast recipient */ | |
413 | if (is_broadcast_ether_addr(ethhdr->h_dest)) | |
44524fcd | 414 | goto out; |
c6c8fea2 SE |
415 | |
416 | /* packet with broadcast sender address */ | |
417 | if (is_broadcast_ether_addr(ethhdr->h_source)) | |
44524fcd | 418 | goto out; |
c6c8fea2 SE |
419 | |
420 | /* not for me */ | |
421 | if (!is_my_mac(ethhdr->h_dest)) | |
44524fcd | 422 | goto out; |
c6c8fea2 SE |
423 | |
424 | icmp_packet = (struct icmp_packet_rr *)skb->data; | |
425 | ||
426 | /* add record route information if not full */ | |
427 | if ((hdr_size == sizeof(struct icmp_packet_rr)) && | |
428 | (icmp_packet->rr_cur < BAT_RR_LEN)) { | |
429 | memcpy(&(icmp_packet->rr[icmp_packet->rr_cur]), | |
7c64fd98 | 430 | ethhdr->h_dest, ETH_ALEN); |
c6c8fea2 SE |
431 | icmp_packet->rr_cur++; |
432 | } | |
433 | ||
434 | /* packet for me */ | |
435 | if (is_my_mac(icmp_packet->dst)) | |
436 | return recv_my_icmp_packet(bat_priv, skb, hdr_size); | |
437 | ||
438 | /* TTL exceeded */ | |
76543d14 | 439 | if (icmp_packet->header.ttl < 2) |
74ef1153 | 440 | return recv_icmp_ttl_exceeded(bat_priv, skb); |
c6c8fea2 | 441 | |
c6c8fea2 | 442 | /* get routing information */ |
7aadf889 | 443 | orig_node = orig_hash_find(bat_priv, icmp_packet->dst); |
44524fcd | 444 | if (!orig_node) |
e1a5382f | 445 | goto out; |
c6c8fea2 | 446 | |
7d211efc | 447 | router = batadv_orig_node_get_router(orig_node); |
e1a5382f LL |
448 | if (!router) |
449 | goto out; | |
c6c8fea2 | 450 | |
44524fcd | 451 | /* create a copy of the skb, if needed, to modify it. */ |
0d125074 | 452 | if (skb_cow(skb, ETH_HLEN) < 0) |
44524fcd | 453 | goto out; |
c6c8fea2 | 454 | |
44524fcd | 455 | icmp_packet = (struct icmp_packet_rr *)skb->data; |
c6c8fea2 | 456 | |
44524fcd | 457 | /* decrement ttl */ |
76543d14 | 458 | icmp_packet->header.ttl--; |
44524fcd ML |
459 | |
460 | /* route it */ | |
e1a5382f | 461 | send_skb_packet(skb, router->if_incoming, router->addr); |
44524fcd | 462 | ret = NET_RX_SUCCESS; |
c6c8fea2 | 463 | |
44524fcd | 464 | out: |
e1a5382f | 465 | if (router) |
7d211efc | 466 | batadv_neigh_node_free_ref(router); |
44524fcd | 467 | if (orig_node) |
7d211efc | 468 | batadv_orig_node_free_ref(orig_node); |
c6c8fea2 SE |
469 | return ret; |
470 | } | |
471 | ||
55158629 LL |
472 | /* In the bonding case, send the packets in a round |
473 | * robin fashion over the remaining interfaces. | |
474 | * | |
475 | * This method rotates the bonding list and increases the | |
476 | * returned router's refcount. */ | |
477 | static struct neigh_node *find_bond_router(struct orig_node *primary_orig, | |
747e4221 | 478 | const struct hard_iface *recv_if) |
55158629 LL |
479 | { |
480 | struct neigh_node *tmp_neigh_node; | |
481 | struct neigh_node *router = NULL, *first_candidate = NULL; | |
482 | ||
483 | rcu_read_lock(); | |
484 | list_for_each_entry_rcu(tmp_neigh_node, &primary_orig->bond_list, | |
485 | bonding_list) { | |
486 | if (!first_candidate) | |
487 | first_candidate = tmp_neigh_node; | |
488 | ||
489 | /* recv_if == NULL on the first node. */ | |
490 | if (tmp_neigh_node->if_incoming == recv_if) | |
491 | continue; | |
492 | ||
493 | if (!atomic_inc_not_zero(&tmp_neigh_node->refcount)) | |
494 | continue; | |
495 | ||
496 | router = tmp_neigh_node; | |
497 | break; | |
498 | } | |
499 | ||
500 | /* use the first candidate if nothing was found. */ | |
501 | if (!router && first_candidate && | |
502 | atomic_inc_not_zero(&first_candidate->refcount)) | |
503 | router = first_candidate; | |
504 | ||
505 | if (!router) | |
506 | goto out; | |
507 | ||
508 | /* selected should point to the next element | |
509 | * after the current router */ | |
510 | spin_lock_bh(&primary_orig->neigh_list_lock); | |
511 | /* this is a list_move(), which unfortunately | |
512 | * does not exist as rcu version */ | |
513 | list_del_rcu(&primary_orig->bond_list); | |
514 | list_add_rcu(&primary_orig->bond_list, | |
515 | &router->bonding_list); | |
516 | spin_unlock_bh(&primary_orig->neigh_list_lock); | |
517 | ||
518 | out: | |
519 | rcu_read_unlock(); | |
520 | return router; | |
521 | } | |
522 | ||
523 | /* Interface Alternating: Use the best of the | |
524 | * remaining candidates which are not using | |
525 | * this interface. | |
526 | * | |
527 | * Increases the returned router's refcount */ | |
528 | static struct neigh_node *find_ifalter_router(struct orig_node *primary_orig, | |
747e4221 | 529 | const struct hard_iface *recv_if) |
55158629 LL |
530 | { |
531 | struct neigh_node *tmp_neigh_node; | |
532 | struct neigh_node *router = NULL, *first_candidate = NULL; | |
533 | ||
534 | rcu_read_lock(); | |
535 | list_for_each_entry_rcu(tmp_neigh_node, &primary_orig->bond_list, | |
536 | bonding_list) { | |
537 | if (!first_candidate) | |
538 | first_candidate = tmp_neigh_node; | |
539 | ||
540 | /* recv_if == NULL on the first node. */ | |
541 | if (tmp_neigh_node->if_incoming == recv_if) | |
542 | continue; | |
543 | ||
544 | if (!atomic_inc_not_zero(&tmp_neigh_node->refcount)) | |
545 | continue; | |
546 | ||
547 | /* if we don't have a router yet | |
548 | * or this one is better, choose it. */ | |
549 | if ((!router) || | |
550 | (tmp_neigh_node->tq_avg > router->tq_avg)) { | |
551 | /* decrement refcount of | |
552 | * previously selected router */ | |
553 | if (router) | |
7d211efc | 554 | batadv_neigh_node_free_ref(router); |
55158629 LL |
555 | |
556 | router = tmp_neigh_node; | |
557 | atomic_inc_not_zero(&router->refcount); | |
558 | } | |
559 | ||
7d211efc | 560 | batadv_neigh_node_free_ref(tmp_neigh_node); |
55158629 LL |
561 | } |
562 | ||
563 | /* use the first candidate if nothing was found. */ | |
564 | if (!router && first_candidate && | |
565 | atomic_inc_not_zero(&first_candidate->refcount)) | |
566 | router = first_candidate; | |
567 | ||
568 | rcu_read_unlock(); | |
569 | return router; | |
570 | } | |
571 | ||
a73105b8 AQ |
572 | int recv_tt_query(struct sk_buff *skb, struct hard_iface *recv_if) |
573 | { | |
574 | struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface); | |
575 | struct tt_query_packet *tt_query; | |
f25bd58a | 576 | uint16_t tt_size; |
a73105b8 AQ |
577 | struct ethhdr *ethhdr; |
578 | ||
579 | /* drop packet if it has not necessary minimum size */ | |
580 | if (unlikely(!pskb_may_pull(skb, sizeof(struct tt_query_packet)))) | |
581 | goto out; | |
582 | ||
583 | /* I could need to modify it */ | |
584 | if (skb_cow(skb, sizeof(struct tt_query_packet)) < 0) | |
585 | goto out; | |
586 | ||
587 | ethhdr = (struct ethhdr *)skb_mac_header(skb); | |
588 | ||
589 | /* packet with unicast indication but broadcast recipient */ | |
590 | if (is_broadcast_ether_addr(ethhdr->h_dest)) | |
591 | goto out; | |
592 | ||
593 | /* packet with broadcast sender address */ | |
594 | if (is_broadcast_ether_addr(ethhdr->h_source)) | |
595 | goto out; | |
596 | ||
597 | tt_query = (struct tt_query_packet *)skb->data; | |
598 | ||
a73105b8 AQ |
599 | switch (tt_query->flags & TT_QUERY_TYPE_MASK) { |
600 | case TT_REQUEST: | |
f8214865 MH |
601 | batadv_inc_counter(bat_priv, BAT_CNT_TT_REQUEST_RX); |
602 | ||
a73105b8 AQ |
603 | /* If we cannot provide an answer the tt_request is |
604 | * forwarded */ | |
605 | if (!send_tt_response(bat_priv, tt_query)) { | |
606 | bat_dbg(DBG_TT, bat_priv, | |
607 | "Routing TT_REQUEST to %pM [%c]\n", | |
608 | tt_query->dst, | |
609 | (tt_query->flags & TT_FULL_TABLE ? 'F' : '.')); | |
a73105b8 AQ |
610 | return route_unicast_packet(skb, recv_if); |
611 | } | |
612 | break; | |
613 | case TT_RESPONSE: | |
f8214865 MH |
614 | batadv_inc_counter(bat_priv, BAT_CNT_TT_RESPONSE_RX); |
615 | ||
dc58fe32 AQ |
616 | if (is_my_mac(tt_query->dst)) { |
617 | /* packet needs to be linearized to access the TT | |
618 | * changes */ | |
619 | if (skb_linearize(skb) < 0) | |
620 | goto out; | |
d2b6cc8e AQ |
621 | /* skb_linearize() possibly changed skb->data */ |
622 | tt_query = (struct tt_query_packet *)skb->data; | |
a73105b8 | 623 | |
f25bd58a | 624 | tt_size = tt_len(ntohs(tt_query->tt_data)); |
8b7342d6 AQ |
625 | |
626 | /* Ensure we have all the claimed data */ | |
627 | if (unlikely(skb_headlen(skb) < | |
f25bd58a | 628 | sizeof(struct tt_query_packet) + tt_size)) |
8b7342d6 AQ |
629 | goto out; |
630 | ||
a73105b8 | 631 | handle_tt_response(bat_priv, tt_query); |
dc58fe32 | 632 | } else { |
a73105b8 AQ |
633 | bat_dbg(DBG_TT, bat_priv, |
634 | "Routing TT_RESPONSE to %pM [%c]\n", | |
635 | tt_query->dst, | |
636 | (tt_query->flags & TT_FULL_TABLE ? 'F' : '.')); | |
a73105b8 AQ |
637 | return route_unicast_packet(skb, recv_if); |
638 | } | |
639 | break; | |
640 | } | |
641 | ||
642 | out: | |
643 | /* returning NET_RX_DROP will make the caller function kfree the skb */ | |
644 | return NET_RX_DROP; | |
645 | } | |
646 | ||
cc47f66e AQ |
647 | int recv_roam_adv(struct sk_buff *skb, struct hard_iface *recv_if) |
648 | { | |
649 | struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface); | |
650 | struct roam_adv_packet *roam_adv_packet; | |
651 | struct orig_node *orig_node; | |
652 | struct ethhdr *ethhdr; | |
653 | ||
654 | /* drop packet if it has not necessary minimum size */ | |
655 | if (unlikely(!pskb_may_pull(skb, sizeof(struct roam_adv_packet)))) | |
656 | goto out; | |
657 | ||
658 | ethhdr = (struct ethhdr *)skb_mac_header(skb); | |
659 | ||
660 | /* packet with unicast indication but broadcast recipient */ | |
661 | if (is_broadcast_ether_addr(ethhdr->h_dest)) | |
662 | goto out; | |
663 | ||
664 | /* packet with broadcast sender address */ | |
665 | if (is_broadcast_ether_addr(ethhdr->h_source)) | |
666 | goto out; | |
667 | ||
f8214865 MH |
668 | batadv_inc_counter(bat_priv, BAT_CNT_TT_ROAM_ADV_RX); |
669 | ||
cc47f66e AQ |
670 | roam_adv_packet = (struct roam_adv_packet *)skb->data; |
671 | ||
672 | if (!is_my_mac(roam_adv_packet->dst)) | |
673 | return route_unicast_packet(skb, recv_if); | |
674 | ||
20ff9d59 SW |
675 | /* check if it is a backbone gateway. we don't accept |
676 | * roaming advertisement from it, as it has the same | |
677 | * entries as we have. | |
678 | */ | |
08adf151 | 679 | if (batadv_bla_is_backbone_gw_orig(bat_priv, roam_adv_packet->src)) |
20ff9d59 SW |
680 | goto out; |
681 | ||
cc47f66e AQ |
682 | orig_node = orig_hash_find(bat_priv, roam_adv_packet->src); |
683 | if (!orig_node) | |
684 | goto out; | |
685 | ||
86ceb360 SE |
686 | bat_dbg(DBG_TT, bat_priv, |
687 | "Received ROAMING_ADV from %pM (client %pM)\n", | |
688 | roam_adv_packet->src, roam_adv_packet->client); | |
cc47f66e AQ |
689 | |
690 | tt_global_add(bat_priv, orig_node, roam_adv_packet->client, | |
bc279080 | 691 | atomic_read(&orig_node->last_ttvn) + 1, true, false); |
cc47f66e AQ |
692 | |
693 | /* Roaming phase starts: I have new information but the ttvn has not | |
694 | * been incremented yet. This flag will make me check all the incoming | |
695 | * packets for the correct destination. */ | |
696 | bat_priv->tt_poss_change = true; | |
697 | ||
7d211efc | 698 | batadv_orig_node_free_ref(orig_node); |
cc47f66e AQ |
699 | out: |
700 | /* returning NET_RX_DROP will make the caller function kfree the skb */ | |
701 | return NET_RX_DROP; | |
702 | } | |
703 | ||
c6c8fea2 | 704 | /* find a suitable router for this originator, and use |
a4c135c5 SW |
705 | * bonding if possible. increases the found neighbors |
706 | * refcount.*/ | |
c6c8fea2 SE |
707 | struct neigh_node *find_router(struct bat_priv *bat_priv, |
708 | struct orig_node *orig_node, | |
747e4221 | 709 | const struct hard_iface *recv_if) |
c6c8fea2 SE |
710 | { |
711 | struct orig_node *primary_orig_node; | |
712 | struct orig_node *router_orig; | |
55158629 | 713 | struct neigh_node *router; |
c6c8fea2 SE |
714 | static uint8_t zero_mac[ETH_ALEN] = {0, 0, 0, 0, 0, 0}; |
715 | int bonding_enabled; | |
716 | ||
717 | if (!orig_node) | |
718 | return NULL; | |
719 | ||
7d211efc | 720 | router = batadv_orig_node_get_router(orig_node); |
e1a5382f | 721 | if (!router) |
01df2b65 | 722 | goto err; |
c6c8fea2 SE |
723 | |
724 | /* without bonding, the first node should | |
725 | * always choose the default router. */ | |
c6c8fea2 SE |
726 | bonding_enabled = atomic_read(&bat_priv->bonding); |
727 | ||
a4c135c5 SW |
728 | rcu_read_lock(); |
729 | /* select default router to output */ | |
e1a5382f | 730 | router_orig = router->orig_node; |
01df2b65 ML |
731 | if (!router_orig) |
732 | goto err_unlock; | |
a4c135c5 | 733 | |
a4c135c5 SW |
734 | if ((!recv_if) && (!bonding_enabled)) |
735 | goto return_router; | |
c6c8fea2 SE |
736 | |
737 | /* if we have something in the primary_addr, we can search | |
738 | * for a potential bonding candidate. */ | |
39901e71 | 739 | if (compare_eth(router_orig->primary_addr, zero_mac)) |
a4c135c5 | 740 | goto return_router; |
c6c8fea2 SE |
741 | |
742 | /* find the orig_node which has the primary interface. might | |
743 | * even be the same as our router_orig in many cases */ | |
744 | ||
39901e71 | 745 | if (compare_eth(router_orig->primary_addr, router_orig->orig)) { |
c6c8fea2 SE |
746 | primary_orig_node = router_orig; |
747 | } else { | |
7aadf889 ML |
748 | primary_orig_node = orig_hash_find(bat_priv, |
749 | router_orig->primary_addr); | |
c6c8fea2 | 750 | if (!primary_orig_node) |
a4c135c5 | 751 | goto return_router; |
7aadf889 | 752 | |
7d211efc | 753 | batadv_orig_node_free_ref(primary_orig_node); |
c6c8fea2 SE |
754 | } |
755 | ||
756 | /* with less than 2 candidates, we can't do any | |
757 | * bonding and prefer the original router. */ | |
a4c135c5 SW |
758 | if (atomic_read(&primary_orig_node->bond_candidates) < 2) |
759 | goto return_router; | |
c6c8fea2 | 760 | |
c6c8fea2 SE |
761 | /* all nodes between should choose a candidate which |
762 | * is is not on the interface where the packet came | |
763 | * in. */ | |
a4c135c5 | 764 | |
7d211efc | 765 | batadv_neigh_node_free_ref(router); |
c6c8fea2 | 766 | |
55158629 LL |
767 | if (bonding_enabled) |
768 | router = find_bond_router(primary_orig_node, recv_if); | |
769 | else | |
770 | router = find_ifalter_router(primary_orig_node, recv_if); | |
c6c8fea2 | 771 | |
a4c135c5 | 772 | return_router: |
e2cbc11c AQ |
773 | if (router && router->if_incoming->if_status != IF_ACTIVE) |
774 | goto err_unlock; | |
775 | ||
a4c135c5 | 776 | rcu_read_unlock(); |
c6c8fea2 | 777 | return router; |
01df2b65 ML |
778 | err_unlock: |
779 | rcu_read_unlock(); | |
780 | err: | |
781 | if (router) | |
7d211efc | 782 | batadv_neigh_node_free_ref(router); |
01df2b65 | 783 | return NULL; |
c6c8fea2 SE |
784 | } |
785 | ||
786 | static int check_unicast_packet(struct sk_buff *skb, int hdr_size) | |
787 | { | |
788 | struct ethhdr *ethhdr; | |
789 | ||
790 | /* drop packet if it has not necessary minimum size */ | |
791 | if (unlikely(!pskb_may_pull(skb, hdr_size))) | |
792 | return -1; | |
793 | ||
794 | ethhdr = (struct ethhdr *)skb_mac_header(skb); | |
795 | ||
796 | /* packet with unicast indication but broadcast recipient */ | |
797 | if (is_broadcast_ether_addr(ethhdr->h_dest)) | |
798 | return -1; | |
799 | ||
800 | /* packet with broadcast sender address */ | |
801 | if (is_broadcast_ether_addr(ethhdr->h_source)) | |
802 | return -1; | |
803 | ||
804 | /* not for me */ | |
805 | if (!is_my_mac(ethhdr->h_dest)) | |
806 | return -1; | |
807 | ||
808 | return 0; | |
809 | } | |
810 | ||
a7f6ee94 | 811 | static int route_unicast_packet(struct sk_buff *skb, struct hard_iface *recv_if) |
c6c8fea2 SE |
812 | { |
813 | struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface); | |
44524fcd ML |
814 | struct orig_node *orig_node = NULL; |
815 | struct neigh_node *neigh_node = NULL; | |
c6c8fea2 SE |
816 | struct unicast_packet *unicast_packet; |
817 | struct ethhdr *ethhdr = (struct ethhdr *)skb_mac_header(skb); | |
44524fcd | 818 | int ret = NET_RX_DROP; |
c6c8fea2 SE |
819 | struct sk_buff *new_skb; |
820 | ||
821 | unicast_packet = (struct unicast_packet *)skb->data; | |
822 | ||
823 | /* TTL exceeded */ | |
76543d14 | 824 | if (unicast_packet->header.ttl < 2) { |
86ceb360 SE |
825 | pr_debug("Warning - can't forward unicast packet from %pM to %pM: ttl exceeded\n", |
826 | ethhdr->h_source, unicast_packet->dest); | |
44524fcd | 827 | goto out; |
c6c8fea2 SE |
828 | } |
829 | ||
830 | /* get routing information */ | |
7aadf889 ML |
831 | orig_node = orig_hash_find(bat_priv, unicast_packet->dest); |
832 | ||
44524fcd | 833 | if (!orig_node) |
b5a6f69c | 834 | goto out; |
c6c8fea2 | 835 | |
a4c135c5 | 836 | /* find_router() increases neigh_nodes refcount if found. */ |
44524fcd | 837 | neigh_node = find_router(bat_priv, orig_node, recv_if); |
c6c8fea2 | 838 | |
d0072609 | 839 | if (!neigh_node) |
44524fcd | 840 | goto out; |
c6c8fea2 SE |
841 | |
842 | /* create a copy of the skb, if needed, to modify it. */ | |
0d125074 | 843 | if (skb_cow(skb, ETH_HLEN) < 0) |
44524fcd | 844 | goto out; |
c6c8fea2 SE |
845 | |
846 | unicast_packet = (struct unicast_packet *)skb->data; | |
847 | ||
76543d14 | 848 | if (unicast_packet->header.packet_type == BAT_UNICAST && |
c6c8fea2 | 849 | atomic_read(&bat_priv->fragmentation) && |
d0072609 ML |
850 | skb->len > neigh_node->if_incoming->net_dev->mtu) { |
851 | ret = frag_send_skb(skb, bat_priv, | |
852 | neigh_node->if_incoming, neigh_node->addr); | |
853 | goto out; | |
854 | } | |
c6c8fea2 | 855 | |
76543d14 | 856 | if (unicast_packet->header.packet_type == BAT_UNICAST_FRAG && |
d0072609 | 857 | frag_can_reassemble(skb, neigh_node->if_incoming->net_dev->mtu)) { |
c6c8fea2 SE |
858 | |
859 | ret = frag_reassemble_skb(skb, bat_priv, &new_skb); | |
860 | ||
861 | if (ret == NET_RX_DROP) | |
44524fcd | 862 | goto out; |
c6c8fea2 SE |
863 | |
864 | /* packet was buffered for late merge */ | |
44524fcd ML |
865 | if (!new_skb) { |
866 | ret = NET_RX_SUCCESS; | |
867 | goto out; | |
868 | } | |
c6c8fea2 SE |
869 | |
870 | skb = new_skb; | |
871 | unicast_packet = (struct unicast_packet *)skb->data; | |
872 | } | |
873 | ||
874 | /* decrement ttl */ | |
76543d14 | 875 | unicast_packet->header.ttl--; |
c6c8fea2 | 876 | |
f8214865 MH |
877 | /* Update stats counter */ |
878 | batadv_inc_counter(bat_priv, BAT_CNT_FORWARD); | |
879 | batadv_add_counter(bat_priv, BAT_CNT_FORWARD_BYTES, | |
880 | skb->len + ETH_HLEN); | |
881 | ||
c6c8fea2 | 882 | /* route it */ |
d0072609 | 883 | send_skb_packet(skb, neigh_node->if_incoming, neigh_node->addr); |
44524fcd | 884 | ret = NET_RX_SUCCESS; |
c6c8fea2 | 885 | |
44524fcd ML |
886 | out: |
887 | if (neigh_node) | |
7d211efc | 888 | batadv_neigh_node_free_ref(neigh_node); |
44524fcd | 889 | if (orig_node) |
7d211efc | 890 | batadv_orig_node_free_ref(orig_node); |
44524fcd | 891 | return ret; |
c6c8fea2 SE |
892 | } |
893 | ||
a73105b8 AQ |
894 | static int check_unicast_ttvn(struct bat_priv *bat_priv, |
895 | struct sk_buff *skb) { | |
896 | uint8_t curr_ttvn; | |
897 | struct orig_node *orig_node; | |
898 | struct ethhdr *ethhdr; | |
899 | struct hard_iface *primary_if; | |
900 | struct unicast_packet *unicast_packet; | |
cc47f66e | 901 | bool tt_poss_change; |
a73105b8 AQ |
902 | |
903 | /* I could need to modify it */ | |
904 | if (skb_cow(skb, sizeof(struct unicast_packet)) < 0) | |
905 | return 0; | |
906 | ||
907 | unicast_packet = (struct unicast_packet *)skb->data; | |
908 | ||
cc47f66e AQ |
909 | if (is_my_mac(unicast_packet->dest)) { |
910 | tt_poss_change = bat_priv->tt_poss_change; | |
a73105b8 | 911 | curr_ttvn = (uint8_t)atomic_read(&bat_priv->ttvn); |
cc47f66e | 912 | } else { |
a73105b8 AQ |
913 | orig_node = orig_hash_find(bat_priv, unicast_packet->dest); |
914 | ||
915 | if (!orig_node) | |
916 | return 0; | |
917 | ||
918 | curr_ttvn = (uint8_t)atomic_read(&orig_node->last_ttvn); | |
cc47f66e | 919 | tt_poss_change = orig_node->tt_poss_change; |
7d211efc | 920 | batadv_orig_node_free_ref(orig_node); |
a73105b8 AQ |
921 | } |
922 | ||
923 | /* Check whether I have to reroute the packet */ | |
cc47f66e | 924 | if (seq_before(unicast_packet->ttvn, curr_ttvn) || tt_poss_change) { |
8710e261 AQ |
925 | /* check if there is enough data before accessing it */ |
926 | if (pskb_may_pull(skb, sizeof(struct unicast_packet) + | |
927 | ETH_HLEN) < 0) | |
a73105b8 AQ |
928 | return 0; |
929 | ||
930 | ethhdr = (struct ethhdr *)(skb->data + | |
931 | sizeof(struct unicast_packet)); | |
3275e7cc AQ |
932 | |
933 | /* we don't have an updated route for this client, so we should | |
934 | * not try to reroute the packet!! | |
935 | */ | |
936 | if (tt_global_client_is_roaming(bat_priv, ethhdr->h_dest)) | |
937 | return 1; | |
938 | ||
3d393e47 | 939 | orig_node = transtable_search(bat_priv, NULL, ethhdr->h_dest); |
a73105b8 AQ |
940 | |
941 | if (!orig_node) { | |
942 | if (!is_my_client(bat_priv, ethhdr->h_dest)) | |
943 | return 0; | |
944 | primary_if = primary_if_get_selected(bat_priv); | |
945 | if (!primary_if) | |
946 | return 0; | |
947 | memcpy(unicast_packet->dest, | |
948 | primary_if->net_dev->dev_addr, ETH_ALEN); | |
949 | hardif_free_ref(primary_if); | |
950 | } else { | |
951 | memcpy(unicast_packet->dest, orig_node->orig, | |
952 | ETH_ALEN); | |
953 | curr_ttvn = (uint8_t) | |
954 | atomic_read(&orig_node->last_ttvn); | |
7d211efc | 955 | batadv_orig_node_free_ref(orig_node); |
a73105b8 AQ |
956 | } |
957 | ||
86ceb360 SE |
958 | bat_dbg(DBG_ROUTES, bat_priv, |
959 | "TTVN mismatch (old_ttvn %u new_ttvn %u)! Rerouting unicast packet (for %pM) to %pM\n", | |
960 | unicast_packet->ttvn, curr_ttvn, ethhdr->h_dest, | |
961 | unicast_packet->dest); | |
a73105b8 AQ |
962 | |
963 | unicast_packet->ttvn = curr_ttvn; | |
964 | } | |
965 | return 1; | |
966 | } | |
967 | ||
e6c10f43 | 968 | int recv_unicast_packet(struct sk_buff *skb, struct hard_iface *recv_if) |
c6c8fea2 | 969 | { |
a73105b8 | 970 | struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface); |
c6c8fea2 | 971 | struct unicast_packet *unicast_packet; |
704509b8 | 972 | int hdr_size = sizeof(*unicast_packet); |
c6c8fea2 SE |
973 | |
974 | if (check_unicast_packet(skb, hdr_size) < 0) | |
975 | return NET_RX_DROP; | |
976 | ||
a73105b8 AQ |
977 | if (!check_unicast_ttvn(bat_priv, skb)) |
978 | return NET_RX_DROP; | |
979 | ||
c6c8fea2 SE |
980 | unicast_packet = (struct unicast_packet *)skb->data; |
981 | ||
982 | /* packet for me */ | |
983 | if (is_my_mac(unicast_packet->dest)) { | |
984 | interface_rx(recv_if->soft_iface, skb, recv_if, hdr_size); | |
985 | return NET_RX_SUCCESS; | |
986 | } | |
987 | ||
7cefb149 | 988 | return route_unicast_packet(skb, recv_if); |
c6c8fea2 SE |
989 | } |
990 | ||
e6c10f43 | 991 | int recv_ucast_frag_packet(struct sk_buff *skb, struct hard_iface *recv_if) |
c6c8fea2 SE |
992 | { |
993 | struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface); | |
994 | struct unicast_frag_packet *unicast_packet; | |
704509b8 | 995 | int hdr_size = sizeof(*unicast_packet); |
c6c8fea2 SE |
996 | struct sk_buff *new_skb = NULL; |
997 | int ret; | |
998 | ||
999 | if (check_unicast_packet(skb, hdr_size) < 0) | |
1000 | return NET_RX_DROP; | |
1001 | ||
a73105b8 AQ |
1002 | if (!check_unicast_ttvn(bat_priv, skb)) |
1003 | return NET_RX_DROP; | |
1004 | ||
c6c8fea2 SE |
1005 | unicast_packet = (struct unicast_frag_packet *)skb->data; |
1006 | ||
1007 | /* packet for me */ | |
1008 | if (is_my_mac(unicast_packet->dest)) { | |
1009 | ||
1010 | ret = frag_reassemble_skb(skb, bat_priv, &new_skb); | |
1011 | ||
1012 | if (ret == NET_RX_DROP) | |
1013 | return NET_RX_DROP; | |
1014 | ||
1015 | /* packet was buffered for late merge */ | |
1016 | if (!new_skb) | |
1017 | return NET_RX_SUCCESS; | |
1018 | ||
1019 | interface_rx(recv_if->soft_iface, new_skb, recv_if, | |
1020 | sizeof(struct unicast_packet)); | |
1021 | return NET_RX_SUCCESS; | |
1022 | } | |
1023 | ||
7cefb149 | 1024 | return route_unicast_packet(skb, recv_if); |
c6c8fea2 SE |
1025 | } |
1026 | ||
1027 | ||
e6c10f43 | 1028 | int recv_bcast_packet(struct sk_buff *skb, struct hard_iface *recv_if) |
c6c8fea2 SE |
1029 | { |
1030 | struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface); | |
f3e0008f | 1031 | struct orig_node *orig_node = NULL; |
c6c8fea2 SE |
1032 | struct bcast_packet *bcast_packet; |
1033 | struct ethhdr *ethhdr; | |
704509b8 | 1034 | int hdr_size = sizeof(*bcast_packet); |
f3e0008f | 1035 | int ret = NET_RX_DROP; |
c6c8fea2 SE |
1036 | int32_t seq_diff; |
1037 | ||
1038 | /* drop packet if it has not necessary minimum size */ | |
1039 | if (unlikely(!pskb_may_pull(skb, hdr_size))) | |
f3e0008f | 1040 | goto out; |
c6c8fea2 SE |
1041 | |
1042 | ethhdr = (struct ethhdr *)skb_mac_header(skb); | |
1043 | ||
1044 | /* packet with broadcast indication but unicast recipient */ | |
1045 | if (!is_broadcast_ether_addr(ethhdr->h_dest)) | |
f3e0008f | 1046 | goto out; |
c6c8fea2 SE |
1047 | |
1048 | /* packet with broadcast sender address */ | |
1049 | if (is_broadcast_ether_addr(ethhdr->h_source)) | |
f3e0008f | 1050 | goto out; |
c6c8fea2 SE |
1051 | |
1052 | /* ignore broadcasts sent by myself */ | |
1053 | if (is_my_mac(ethhdr->h_source)) | |
f3e0008f | 1054 | goto out; |
c6c8fea2 SE |
1055 | |
1056 | bcast_packet = (struct bcast_packet *)skb->data; | |
1057 | ||
1058 | /* ignore broadcasts originated by myself */ | |
1059 | if (is_my_mac(bcast_packet->orig)) | |
f3e0008f | 1060 | goto out; |
c6c8fea2 | 1061 | |
76543d14 | 1062 | if (bcast_packet->header.ttl < 2) |
f3e0008f | 1063 | goto out; |
c6c8fea2 | 1064 | |
7aadf889 | 1065 | orig_node = orig_hash_find(bat_priv, bcast_packet->orig); |
f3e0008f ML |
1066 | |
1067 | if (!orig_node) | |
b5a6f69c | 1068 | goto out; |
c6c8fea2 | 1069 | |
f3e0008f | 1070 | spin_lock_bh(&orig_node->bcast_seqno_lock); |
c6c8fea2 SE |
1071 | |
1072 | /* check whether the packet is a duplicate */ | |
0079d2ce SE |
1073 | if (bat_test_bit(orig_node->bcast_bits, orig_node->last_bcast_seqno, |
1074 | ntohl(bcast_packet->seqno))) | |
f3e0008f | 1075 | goto spin_unlock; |
c6c8fea2 SE |
1076 | |
1077 | seq_diff = ntohl(bcast_packet->seqno) - orig_node->last_bcast_seqno; | |
1078 | ||
1079 | /* check whether the packet is old and the host just restarted. */ | |
1080 | if (window_protected(bat_priv, seq_diff, | |
f3e0008f ML |
1081 | &orig_node->bcast_seqno_reset)) |
1082 | goto spin_unlock; | |
c6c8fea2 SE |
1083 | |
1084 | /* mark broadcast in flood history, update window position | |
1085 | * if required. */ | |
0f5f9322 | 1086 | if (batadv_bit_get_packet(bat_priv, orig_node->bcast_bits, seq_diff, 1)) |
c6c8fea2 SE |
1087 | orig_node->last_bcast_seqno = ntohl(bcast_packet->seqno); |
1088 | ||
f3e0008f | 1089 | spin_unlock_bh(&orig_node->bcast_seqno_lock); |
f3e0008f | 1090 | |
fe2da6ff | 1091 | /* check whether this has been sent by another originator before */ |
08adf151 | 1092 | if (batadv_bla_check_bcast_duplist(bat_priv, bcast_packet, hdr_size)) |
fe2da6ff SW |
1093 | goto out; |
1094 | ||
c6c8fea2 | 1095 | /* rebroadcast packet */ |
8698529d | 1096 | add_bcast_packet_to_list(bat_priv, skb, 1); |
c6c8fea2 | 1097 | |
23721387 SW |
1098 | /* don't hand the broadcast up if it is from an originator |
1099 | * from the same backbone. | |
1100 | */ | |
08adf151 | 1101 | if (batadv_bla_is_backbone_gw(skb, orig_node, hdr_size)) |
23721387 SW |
1102 | goto out; |
1103 | ||
c6c8fea2 SE |
1104 | /* broadcast for me */ |
1105 | interface_rx(recv_if->soft_iface, skb, recv_if, hdr_size); | |
f3e0008f ML |
1106 | ret = NET_RX_SUCCESS; |
1107 | goto out; | |
c6c8fea2 | 1108 | |
f3e0008f ML |
1109 | spin_unlock: |
1110 | spin_unlock_bh(&orig_node->bcast_seqno_lock); | |
f3e0008f ML |
1111 | out: |
1112 | if (orig_node) | |
7d211efc | 1113 | batadv_orig_node_free_ref(orig_node); |
f3e0008f | 1114 | return ret; |
c6c8fea2 SE |
1115 | } |
1116 | ||
e6c10f43 | 1117 | int recv_vis_packet(struct sk_buff *skb, struct hard_iface *recv_if) |
c6c8fea2 SE |
1118 | { |
1119 | struct vis_packet *vis_packet; | |
1120 | struct ethhdr *ethhdr; | |
1121 | struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface); | |
704509b8 | 1122 | int hdr_size = sizeof(*vis_packet); |
c6c8fea2 SE |
1123 | |
1124 | /* keep skb linear */ | |
1125 | if (skb_linearize(skb) < 0) | |
1126 | return NET_RX_DROP; | |
1127 | ||
1128 | if (unlikely(!pskb_may_pull(skb, hdr_size))) | |
1129 | return NET_RX_DROP; | |
1130 | ||
1131 | vis_packet = (struct vis_packet *)skb->data; | |
1132 | ethhdr = (struct ethhdr *)skb_mac_header(skb); | |
1133 | ||
1134 | /* not for me */ | |
1135 | if (!is_my_mac(ethhdr->h_dest)) | |
1136 | return NET_RX_DROP; | |
1137 | ||
1138 | /* ignore own packets */ | |
1139 | if (is_my_mac(vis_packet->vis_orig)) | |
1140 | return NET_RX_DROP; | |
1141 | ||
1142 | if (is_my_mac(vis_packet->sender_orig)) | |
1143 | return NET_RX_DROP; | |
1144 | ||
1145 | switch (vis_packet->vis_type) { | |
1146 | case VIS_TYPE_SERVER_SYNC: | |
1147 | receive_server_sync_packet(bat_priv, vis_packet, | |
1148 | skb_headlen(skb)); | |
1149 | break; | |
1150 | ||
1151 | case VIS_TYPE_CLIENT_UPDATE: | |
1152 | receive_client_update_packet(bat_priv, vis_packet, | |
1153 | skb_headlen(skb)); | |
1154 | break; | |
1155 | ||
1156 | default: /* ignore unknown packet */ | |
1157 | break; | |
1158 | } | |
1159 | ||
1160 | /* We take a copy of the data in the packet, so we should | |
1161 | always free the skbuf. */ | |
1162 | return NET_RX_DROP; | |
1163 | } |