1 /* 2 * Copyright (C) 2007-2011 B.A.T.M.A.N. contributors: 3 * 4 * Marek Lindner, Simon Wunderlich 5 * 6 * This program is free software; you can redistribute it and/or 7 * modify it under the terms of version 2 of the GNU General Public 8 * License as published by the Free Software Foundation. 9 * 10 * This program is distributed in the hope that it will be useful, but 11 * WITHOUT ANY WARRANTY; without even the implied warranty of 12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 13 * General Public License for more details. 14 * 15 * You should have received a copy of the GNU General Public License 16 * along with this program; if not, write to the Free Software 17 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 18 * 02110-1301, USA 19 * 20 */ 21 22 #include "main.h" 23 #include "routing.h" 24 #include "send.h" 25 #include "soft-interface.h" 26 #include "hard-interface.h" 27 #include "icmp_socket.h" 28 #include "translation-table.h" 29 #include "originator.h" 30 #include "vis.h" 31 #include "unicast.h" 32 #include "bat_ogm.h" 33 34 void slide_own_bcast_window(struct hard_iface *hard_iface) 35 { 36 struct bat_priv *bat_priv = netdev_priv(hard_iface->soft_iface); 37 struct hashtable_t *hash = bat_priv->orig_hash; 38 struct hlist_node *node; 39 struct hlist_head *head; 40 struct orig_node *orig_node; 41 unsigned long *word; 42 uint32_t i; 43 size_t word_index; 44 45 for (i = 0; i < hash->size; i++) { 46 head = &hash->table[i]; 47 48 rcu_read_lock(); 49 hlist_for_each_entry_rcu(orig_node, node, head, hash_entry) { 50 spin_lock_bh(&orig_node->ogm_cnt_lock); 51 word_index = hard_iface->if_num * NUM_WORDS; 52 word = &(orig_node->bcast_own[word_index]); 53 54 bit_get_packet(bat_priv, word, 1, 0); 55 orig_node->bcast_own_sum[hard_iface->if_num] = 56 bit_packet_count(word); 57 spin_unlock_bh(&orig_node->ogm_cnt_lock); 58 } 59 rcu_read_unlock(); 60 } 61 } 62 63 static void _update_route(struct bat_priv *bat_priv, 64 struct orig_node *orig_node, 65 struct neigh_node *neigh_node) 66 { 67 struct neigh_node *curr_router; 68 69 curr_router = orig_node_get_router(orig_node); 70 71 /* route deleted */ 72 if ((curr_router) && (!neigh_node)) { 73 bat_dbg(DBG_ROUTES, bat_priv, "Deleting route towards: %pM\n", 74 orig_node->orig); 75 tt_global_del_orig(bat_priv, orig_node, 76 "Deleted route towards originator"); 77 78 /* route added */ 79 } else if ((!curr_router) && (neigh_node)) { 80 81 bat_dbg(DBG_ROUTES, bat_priv, 82 "Adding route towards: %pM (via %pM)\n", 83 orig_node->orig, neigh_node->addr); 84 /* route changed */ 85 } else if (neigh_node && curr_router) { 86 bat_dbg(DBG_ROUTES, bat_priv, 87 "Changing route towards: %pM " 88 "(now via %pM - was via %pM)\n", 89 orig_node->orig, neigh_node->addr, 90 curr_router->addr); 91 } 92 93 if (curr_router) 94 neigh_node_free_ref(curr_router); 95 96 /* increase refcount of new best neighbor */ 97 if (neigh_node && !atomic_inc_not_zero(&neigh_node->refcount)) 98 neigh_node = NULL; 99 100 spin_lock_bh(&orig_node->neigh_list_lock); 101 rcu_assign_pointer(orig_node->router, neigh_node); 102 spin_unlock_bh(&orig_node->neigh_list_lock); 103 104 /* decrease refcount of previous best neighbor */ 105 if (curr_router) 106 neigh_node_free_ref(curr_router); 107 } 108 109 void update_route(struct bat_priv *bat_priv, struct orig_node *orig_node, 110 struct neigh_node *neigh_node) 111 { 112 struct neigh_node *router = NULL; 113 114 if (!orig_node) 115 goto out; 116 117 router = orig_node_get_router(orig_node); 118 119 if (router != neigh_node) 120 _update_route(bat_priv, orig_node, neigh_node); 121 122 out: 123 if (router) 124 neigh_node_free_ref(router); 125 } 126 127 /* caller must hold the neigh_list_lock */ 128 void bonding_candidate_del(struct orig_node *orig_node, 129 struct neigh_node *neigh_node) 130 { 131 /* this neighbor is not part of our candidate list */ 132 if (list_empty(&neigh_node->bonding_list)) 133 goto out; 134 135 list_del_rcu(&neigh_node->bonding_list); 136 INIT_LIST_HEAD(&neigh_node->bonding_list); 137 neigh_node_free_ref(neigh_node); 138 atomic_dec(&orig_node->bond_candidates); 139 140 out: 141 return; 142 } 143 144 void bonding_candidate_add(struct orig_node *orig_node, 145 struct neigh_node *neigh_node) 146 { 147 struct hlist_node *node; 148 struct neigh_node *tmp_neigh_node, *router = NULL; 149 uint8_t interference_candidate = 0; 150 151 spin_lock_bh(&orig_node->neigh_list_lock); 152 153 /* only consider if it has the same primary address ... */ 154 if (!compare_eth(orig_node->orig, 155 neigh_node->orig_node->primary_addr)) 156 goto candidate_del; 157 158 router = orig_node_get_router(orig_node); 159 if (!router) 160 goto candidate_del; 161 162 /* ... and is good enough to be considered */ 163 if (neigh_node->tq_avg < router->tq_avg - BONDING_TQ_THRESHOLD) 164 goto candidate_del; 165 166 /** 167 * check if we have another candidate with the same mac address or 168 * interface. If we do, we won't select this candidate because of 169 * possible interference. 170 */ 171 hlist_for_each_entry_rcu(tmp_neigh_node, node, 172 &orig_node->neigh_list, list) { 173 174 if (tmp_neigh_node == neigh_node) 175 continue; 176 177 /* we only care if the other candidate is even 178 * considered as candidate. */ 179 if (list_empty(&tmp_neigh_node->bonding_list)) 180 continue; 181 182 if ((neigh_node->if_incoming == tmp_neigh_node->if_incoming) || 183 (compare_eth(neigh_node->addr, tmp_neigh_node->addr))) { 184 interference_candidate = 1; 185 break; 186 } 187 } 188 189 /* don't care further if it is an interference candidate */ 190 if (interference_candidate) 191 goto candidate_del; 192 193 /* this neighbor already is part of our candidate list */ 194 if (!list_empty(&neigh_node->bonding_list)) 195 goto out; 196 197 if (!atomic_inc_not_zero(&neigh_node->refcount)) 198 goto out; 199 200 list_add_rcu(&neigh_node->bonding_list, &orig_node->bond_list); 201 atomic_inc(&orig_node->bond_candidates); 202 goto out; 203 204 candidate_del: 205 bonding_candidate_del(orig_node, neigh_node); 206 207 out: 208 spin_unlock_bh(&orig_node->neigh_list_lock); 209 210 if (router) 211 neigh_node_free_ref(router); 212 } 213 214 /* copy primary address for bonding */ 215 void bonding_save_primary(const struct orig_node *orig_node, 216 struct orig_node *orig_neigh_node, 217 const struct batman_ogm_packet *batman_ogm_packet) 218 { 219 if (!(batman_ogm_packet->flags & PRIMARIES_FIRST_HOP)) 220 return; 221 222 memcpy(orig_neigh_node->primary_addr, orig_node->orig, ETH_ALEN); 223 } 224 225 /* checks whether the host restarted and is in the protection time. 226 * returns: 227 * 0 if the packet is to be accepted 228 * 1 if the packet is to be ignored. 229 */ 230 int window_protected(struct bat_priv *bat_priv, int32_t seq_num_diff, 231 unsigned long *last_reset) 232 { 233 if ((seq_num_diff <= -TQ_LOCAL_WINDOW_SIZE) 234 || (seq_num_diff >= EXPECTED_SEQNO_RANGE)) { 235 if (time_after(jiffies, *last_reset + 236 msecs_to_jiffies(RESET_PROTECTION_MS))) { 237 238 *last_reset = jiffies; 239 bat_dbg(DBG_BATMAN, bat_priv, 240 "old packet received, start protection\n"); 241 242 return 0; 243 } else 244 return 1; 245 } 246 return 0; 247 } 248 249 int recv_bat_ogm_packet(struct sk_buff *skb, struct hard_iface *hard_iface) 250 { 251 struct ethhdr *ethhdr; 252 253 /* drop packet if it has not necessary minimum size */ 254 if (unlikely(!pskb_may_pull(skb, BATMAN_OGM_LEN))) 255 return NET_RX_DROP; 256 257 ethhdr = (struct ethhdr *)skb_mac_header(skb); 258 259 /* packet with broadcast indication but unicast recipient */ 260 if (!is_broadcast_ether_addr(ethhdr->h_dest)) 261 return NET_RX_DROP; 262 263 /* packet with broadcast sender address */ 264 if (is_broadcast_ether_addr(ethhdr->h_source)) 265 return NET_RX_DROP; 266 267 /* create a copy of the skb, if needed, to modify it. */ 268 if (skb_cow(skb, 0) < 0) 269 return NET_RX_DROP; 270 271 /* keep skb linear */ 272 if (skb_linearize(skb) < 0) 273 return NET_RX_DROP; 274 275 ethhdr = (struct ethhdr *)skb_mac_header(skb); 276 277 bat_ogm_receive(ethhdr, skb->data, skb_headlen(skb), hard_iface); 278 279 kfree_skb(skb); 280 return NET_RX_SUCCESS; 281 } 282 283 static int recv_my_icmp_packet(struct bat_priv *bat_priv, 284 struct sk_buff *skb, size_t icmp_len) 285 { 286 struct hard_iface *primary_if = NULL; 287 struct orig_node *orig_node = NULL; 288 struct neigh_node *router = NULL; 289 struct icmp_packet_rr *icmp_packet; 290 int ret = NET_RX_DROP; 291 292 icmp_packet = (struct icmp_packet_rr *)skb->data; 293 294 /* add data to device queue */ 295 if (icmp_packet->msg_type != ECHO_REQUEST) { 296 bat_socket_receive_packet(icmp_packet, icmp_len); 297 goto out; 298 } 299 300 primary_if = primary_if_get_selected(bat_priv); 301 if (!primary_if) 302 goto out; 303 304 /* answer echo request (ping) */ 305 /* get routing information */ 306 orig_node = orig_hash_find(bat_priv, icmp_packet->orig); 307 if (!orig_node) 308 goto out; 309 310 router = orig_node_get_router(orig_node); 311 if (!router) 312 goto out; 313 314 /* create a copy of the skb, if needed, to modify it. */ 315 if (skb_cow(skb, sizeof(struct ethhdr)) < 0) 316 goto out; 317 318 icmp_packet = (struct icmp_packet_rr *)skb->data; 319 320 memcpy(icmp_packet->dst, icmp_packet->orig, ETH_ALEN); 321 memcpy(icmp_packet->orig, primary_if->net_dev->dev_addr, ETH_ALEN); 322 icmp_packet->msg_type = ECHO_REPLY; 323 icmp_packet->ttl = TTL; 324 325 send_skb_packet(skb, router->if_incoming, router->addr); 326 ret = NET_RX_SUCCESS; 327 328 out: 329 if (primary_if) 330 hardif_free_ref(primary_if); 331 if (router) 332 neigh_node_free_ref(router); 333 if (orig_node) 334 orig_node_free_ref(orig_node); 335 return ret; 336 } 337 338 static int recv_icmp_ttl_exceeded(struct bat_priv *bat_priv, 339 struct sk_buff *skb) 340 { 341 struct hard_iface *primary_if = NULL; 342 struct orig_node *orig_node = NULL; 343 struct neigh_node *router = NULL; 344 struct icmp_packet *icmp_packet; 345 int ret = NET_RX_DROP; 346 347 icmp_packet = (struct icmp_packet *)skb->data; 348 349 /* send TTL exceeded if packet is an echo request (traceroute) */ 350 if (icmp_packet->msg_type != ECHO_REQUEST) { 351 pr_debug("Warning - can't forward icmp packet from %pM to " 352 "%pM: ttl exceeded\n", icmp_packet->orig, 353 icmp_packet->dst); 354 goto out; 355 } 356 357 primary_if = primary_if_get_selected(bat_priv); 358 if (!primary_if) 359 goto out; 360 361 /* get routing information */ 362 orig_node = orig_hash_find(bat_priv, icmp_packet->orig); 363 if (!orig_node) 364 goto out; 365 366 router = orig_node_get_router(orig_node); 367 if (!router) 368 goto out; 369 370 /* create a copy of the skb, if needed, to modify it. */ 371 if (skb_cow(skb, sizeof(struct ethhdr)) < 0) 372 goto out; 373 374 icmp_packet = (struct icmp_packet *)skb->data; 375 376 memcpy(icmp_packet->dst, icmp_packet->orig, ETH_ALEN); 377 memcpy(icmp_packet->orig, primary_if->net_dev->dev_addr, ETH_ALEN); 378 icmp_packet->msg_type = TTL_EXCEEDED; 379 icmp_packet->ttl = TTL; 380 381 send_skb_packet(skb, router->if_incoming, router->addr); 382 ret = NET_RX_SUCCESS; 383 384 out: 385 if (primary_if) 386 hardif_free_ref(primary_if); 387 if (router) 388 neigh_node_free_ref(router); 389 if (orig_node) 390 orig_node_free_ref(orig_node); 391 return ret; 392 } 393 394 395 int recv_icmp_packet(struct sk_buff *skb, struct hard_iface *recv_if) 396 { 397 struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface); 398 struct icmp_packet_rr *icmp_packet; 399 struct ethhdr *ethhdr; 400 struct orig_node *orig_node = NULL; 401 struct neigh_node *router = NULL; 402 int hdr_size = sizeof(struct icmp_packet); 403 int ret = NET_RX_DROP; 404 405 /** 406 * we truncate all incoming icmp packets if they don't match our size 407 */ 408 if (skb->len >= sizeof(struct icmp_packet_rr)) 409 hdr_size = sizeof(struct icmp_packet_rr); 410 411 /* drop packet if it has not necessary minimum size */ 412 if (unlikely(!pskb_may_pull(skb, hdr_size))) 413 goto out; 414 415 ethhdr = (struct ethhdr *)skb_mac_header(skb); 416 417 /* packet with unicast indication but broadcast recipient */ 418 if (is_broadcast_ether_addr(ethhdr->h_dest)) 419 goto out; 420 421 /* packet with broadcast sender address */ 422 if (is_broadcast_ether_addr(ethhdr->h_source)) 423 goto out; 424 425 /* not for me */ 426 if (!is_my_mac(ethhdr->h_dest)) 427 goto out; 428 429 icmp_packet = (struct icmp_packet_rr *)skb->data; 430 431 /* add record route information if not full */ 432 if ((hdr_size == sizeof(struct icmp_packet_rr)) && 433 (icmp_packet->rr_cur < BAT_RR_LEN)) { 434 memcpy(&(icmp_packet->rr[icmp_packet->rr_cur]), 435 ethhdr->h_dest, ETH_ALEN); 436 icmp_packet->rr_cur++; 437 } 438 439 /* packet for me */ 440 if (is_my_mac(icmp_packet->dst)) 441 return recv_my_icmp_packet(bat_priv, skb, hdr_size); 442 443 /* TTL exceeded */ 444 if (icmp_packet->ttl < 2) 445 return recv_icmp_ttl_exceeded(bat_priv, skb); 446 447 /* get routing information */ 448 orig_node = orig_hash_find(bat_priv, icmp_packet->dst); 449 if (!orig_node) 450 goto out; 451 452 router = orig_node_get_router(orig_node); 453 if (!router) 454 goto out; 455 456 /* create a copy of the skb, if needed, to modify it. */ 457 if (skb_cow(skb, sizeof(struct ethhdr)) < 0) 458 goto out; 459 460 icmp_packet = (struct icmp_packet_rr *)skb->data; 461 462 /* decrement ttl */ 463 icmp_packet->ttl--; 464 465 /* route it */ 466 send_skb_packet(skb, router->if_incoming, router->addr); 467 ret = NET_RX_SUCCESS; 468 469 out: 470 if (router) 471 neigh_node_free_ref(router); 472 if (orig_node) 473 orig_node_free_ref(orig_node); 474 return ret; 475 } 476 477 /* In the bonding case, send the packets in a round 478 * robin fashion over the remaining interfaces. 479 * 480 * This method rotates the bonding list and increases the 481 * returned router's refcount. */ 482 static struct neigh_node *find_bond_router(struct orig_node *primary_orig, 483 const struct hard_iface *recv_if) 484 { 485 struct neigh_node *tmp_neigh_node; 486 struct neigh_node *router = NULL, *first_candidate = NULL; 487 488 rcu_read_lock(); 489 list_for_each_entry_rcu(tmp_neigh_node, &primary_orig->bond_list, 490 bonding_list) { 491 if (!first_candidate) 492 first_candidate = tmp_neigh_node; 493 494 /* recv_if == NULL on the first node. */ 495 if (tmp_neigh_node->if_incoming == recv_if) 496 continue; 497 498 if (!atomic_inc_not_zero(&tmp_neigh_node->refcount)) 499 continue; 500 501 router = tmp_neigh_node; 502 break; 503 } 504 505 /* use the first candidate if nothing was found. */ 506 if (!router && first_candidate && 507 atomic_inc_not_zero(&first_candidate->refcount)) 508 router = first_candidate; 509 510 if (!router) 511 goto out; 512 513 /* selected should point to the next element 514 * after the current router */ 515 spin_lock_bh(&primary_orig->neigh_list_lock); 516 /* this is a list_move(), which unfortunately 517 * does not exist as rcu version */ 518 list_del_rcu(&primary_orig->bond_list); 519 list_add_rcu(&primary_orig->bond_list, 520 &router->bonding_list); 521 spin_unlock_bh(&primary_orig->neigh_list_lock); 522 523 out: 524 rcu_read_unlock(); 525 return router; 526 } 527 528 /* Interface Alternating: Use the best of the 529 * remaining candidates which are not using 530 * this interface. 531 * 532 * Increases the returned router's refcount */ 533 static struct neigh_node *find_ifalter_router(struct orig_node *primary_orig, 534 const struct hard_iface *recv_if) 535 { 536 struct neigh_node *tmp_neigh_node; 537 struct neigh_node *router = NULL, *first_candidate = NULL; 538 539 rcu_read_lock(); 540 list_for_each_entry_rcu(tmp_neigh_node, &primary_orig->bond_list, 541 bonding_list) { 542 if (!first_candidate) 543 first_candidate = tmp_neigh_node; 544 545 /* recv_if == NULL on the first node. */ 546 if (tmp_neigh_node->if_incoming == recv_if) 547 continue; 548 549 if (!atomic_inc_not_zero(&tmp_neigh_node->refcount)) 550 continue; 551 552 /* if we don't have a router yet 553 * or this one is better, choose it. */ 554 if ((!router) || 555 (tmp_neigh_node->tq_avg > router->tq_avg)) { 556 /* decrement refcount of 557 * previously selected router */ 558 if (router) 559 neigh_node_free_ref(router); 560 561 router = tmp_neigh_node; 562 atomic_inc_not_zero(&router->refcount); 563 } 564 565 neigh_node_free_ref(tmp_neigh_node); 566 } 567 568 /* use the first candidate if nothing was found. */ 569 if (!router && first_candidate && 570 atomic_inc_not_zero(&first_candidate->refcount)) 571 router = first_candidate; 572 573 rcu_read_unlock(); 574 return router; 575 } 576 577 int recv_tt_query(struct sk_buff *skb, struct hard_iface *recv_if) 578 { 579 struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface); 580 struct tt_query_packet *tt_query; 581 uint16_t tt_len; 582 struct ethhdr *ethhdr; 583 584 /* drop packet if it has not necessary minimum size */ 585 if (unlikely(!pskb_may_pull(skb, sizeof(struct tt_query_packet)))) 586 goto out; 587 588 /* I could need to modify it */ 589 if (skb_cow(skb, sizeof(struct tt_query_packet)) < 0) 590 goto out; 591 592 ethhdr = (struct ethhdr *)skb_mac_header(skb); 593 594 /* packet with unicast indication but broadcast recipient */ 595 if (is_broadcast_ether_addr(ethhdr->h_dest)) 596 goto out; 597 598 /* packet with broadcast sender address */ 599 if (is_broadcast_ether_addr(ethhdr->h_source)) 600 goto out; 601 602 tt_query = (struct tt_query_packet *)skb->data; 603 604 tt_query->tt_data = ntohs(tt_query->tt_data); 605 606 switch (tt_query->flags & TT_QUERY_TYPE_MASK) { 607 case TT_REQUEST: 608 /* If we cannot provide an answer the tt_request is 609 * forwarded */ 610 if (!send_tt_response(bat_priv, tt_query)) { 611 bat_dbg(DBG_TT, bat_priv, 612 "Routing TT_REQUEST to %pM [%c]\n", 613 tt_query->dst, 614 (tt_query->flags & TT_FULL_TABLE ? 'F' : '.')); 615 tt_query->tt_data = htons(tt_query->tt_data); 616 return route_unicast_packet(skb, recv_if); 617 } 618 break; 619 case TT_RESPONSE: 620 if (is_my_mac(tt_query->dst)) { 621 /* packet needs to be linearized to access the TT 622 * changes */ 623 if (skb_linearize(skb) < 0) 624 goto out; 625 626 tt_len = tt_query->tt_data * sizeof(struct tt_change); 627 628 /* Ensure we have all the claimed data */ 629 if (unlikely(skb_headlen(skb) < 630 sizeof(struct tt_query_packet) + tt_len)) 631 goto out; 632 633 handle_tt_response(bat_priv, tt_query); 634 } else { 635 bat_dbg(DBG_TT, bat_priv, 636 "Routing TT_RESPONSE to %pM [%c]\n", 637 tt_query->dst, 638 (tt_query->flags & TT_FULL_TABLE ? 'F' : '.')); 639 tt_query->tt_data = htons(tt_query->tt_data); 640 return route_unicast_packet(skb, recv_if); 641 } 642 break; 643 } 644 645 out: 646 /* returning NET_RX_DROP will make the caller function kfree the skb */ 647 return NET_RX_DROP; 648 } 649 650 int recv_roam_adv(struct sk_buff *skb, struct hard_iface *recv_if) 651 { 652 struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface); 653 struct roam_adv_packet *roam_adv_packet; 654 struct orig_node *orig_node; 655 struct ethhdr *ethhdr; 656 657 /* drop packet if it has not necessary minimum size */ 658 if (unlikely(!pskb_may_pull(skb, sizeof(struct roam_adv_packet)))) 659 goto out; 660 661 ethhdr = (struct ethhdr *)skb_mac_header(skb); 662 663 /* packet with unicast indication but broadcast recipient */ 664 if (is_broadcast_ether_addr(ethhdr->h_dest)) 665 goto out; 666 667 /* packet with broadcast sender address */ 668 if (is_broadcast_ether_addr(ethhdr->h_source)) 669 goto out; 670 671 roam_adv_packet = (struct roam_adv_packet *)skb->data; 672 673 if (!is_my_mac(roam_adv_packet->dst)) 674 return route_unicast_packet(skb, recv_if); 675 676 orig_node = orig_hash_find(bat_priv, roam_adv_packet->src); 677 if (!orig_node) 678 goto out; 679 680 bat_dbg(DBG_TT, bat_priv, "Received ROAMING_ADV from %pM " 681 "(client %pM)\n", roam_adv_packet->src, 682 roam_adv_packet->client); 683 684 tt_global_add(bat_priv, orig_node, roam_adv_packet->client, 685 atomic_read(&orig_node->last_ttvn) + 1, true, false); 686 687 /* Roaming phase starts: I have new information but the ttvn has not 688 * been incremented yet. This flag will make me check all the incoming 689 * packets for the correct destination. */ 690 bat_priv->tt_poss_change = true; 691 692 orig_node_free_ref(orig_node); 693 out: 694 /* returning NET_RX_DROP will make the caller function kfree the skb */ 695 return NET_RX_DROP; 696 } 697 698 /* find a suitable router for this originator, and use 699 * bonding if possible. increases the found neighbors 700 * refcount.*/ 701 struct neigh_node *find_router(struct bat_priv *bat_priv, 702 struct orig_node *orig_node, 703 const struct hard_iface *recv_if) 704 { 705 struct orig_node *primary_orig_node; 706 struct orig_node *router_orig; 707 struct neigh_node *router; 708 static uint8_t zero_mac[ETH_ALEN] = {0, 0, 0, 0, 0, 0}; 709 int bonding_enabled; 710 711 if (!orig_node) 712 return NULL; 713 714 router = orig_node_get_router(orig_node); 715 if (!router) 716 goto err; 717 718 /* without bonding, the first node should 719 * always choose the default router. */ 720 bonding_enabled = atomic_read(&bat_priv->bonding); 721 722 rcu_read_lock(); 723 /* select default router to output */ 724 router_orig = router->orig_node; 725 if (!router_orig) 726 goto err_unlock; 727 728 if ((!recv_if) && (!bonding_enabled)) 729 goto return_router; 730 731 /* if we have something in the primary_addr, we can search 732 * for a potential bonding candidate. */ 733 if (compare_eth(router_orig->primary_addr, zero_mac)) 734 goto return_router; 735 736 /* find the orig_node which has the primary interface. might 737 * even be the same as our router_orig in many cases */ 738 739 if (compare_eth(router_orig->primary_addr, router_orig->orig)) { 740 primary_orig_node = router_orig; 741 } else { 742 primary_orig_node = orig_hash_find(bat_priv, 743 router_orig->primary_addr); 744 if (!primary_orig_node) 745 goto return_router; 746 747 orig_node_free_ref(primary_orig_node); 748 } 749 750 /* with less than 2 candidates, we can't do any 751 * bonding and prefer the original router. */ 752 if (atomic_read(&primary_orig_node->bond_candidates) < 2) 753 goto return_router; 754 755 /* all nodes between should choose a candidate which 756 * is is not on the interface where the packet came 757 * in. */ 758 759 neigh_node_free_ref(router); 760 761 if (bonding_enabled) 762 router = find_bond_router(primary_orig_node, recv_if); 763 else 764 router = find_ifalter_router(primary_orig_node, recv_if); 765 766 return_router: 767 if (router && router->if_incoming->if_status != IF_ACTIVE) 768 goto err_unlock; 769 770 rcu_read_unlock(); 771 return router; 772 err_unlock: 773 rcu_read_unlock(); 774 err: 775 if (router) 776 neigh_node_free_ref(router); 777 return NULL; 778 } 779 780 static int check_unicast_packet(struct sk_buff *skb, int hdr_size) 781 { 782 struct ethhdr *ethhdr; 783 784 /* drop packet if it has not necessary minimum size */ 785 if (unlikely(!pskb_may_pull(skb, hdr_size))) 786 return -1; 787 788 ethhdr = (struct ethhdr *)skb_mac_header(skb); 789 790 /* packet with unicast indication but broadcast recipient */ 791 if (is_broadcast_ether_addr(ethhdr->h_dest)) 792 return -1; 793 794 /* packet with broadcast sender address */ 795 if (is_broadcast_ether_addr(ethhdr->h_source)) 796 return -1; 797 798 /* not for me */ 799 if (!is_my_mac(ethhdr->h_dest)) 800 return -1; 801 802 return 0; 803 } 804 805 int route_unicast_packet(struct sk_buff *skb, struct hard_iface *recv_if) 806 { 807 struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface); 808 struct orig_node *orig_node = NULL; 809 struct neigh_node *neigh_node = NULL; 810 struct unicast_packet *unicast_packet; 811 struct ethhdr *ethhdr = (struct ethhdr *)skb_mac_header(skb); 812 int ret = NET_RX_DROP; 813 struct sk_buff *new_skb; 814 815 unicast_packet = (struct unicast_packet *)skb->data; 816 817 /* TTL exceeded */ 818 if (unicast_packet->ttl < 2) { 819 pr_debug("Warning - can't forward unicast packet from %pM to " 820 "%pM: ttl exceeded\n", ethhdr->h_source, 821 unicast_packet->dest); 822 goto out; 823 } 824 825 /* get routing information */ 826 orig_node = orig_hash_find(bat_priv, unicast_packet->dest); 827 828 if (!orig_node) 829 goto out; 830 831 /* find_router() increases neigh_nodes refcount if found. */ 832 neigh_node = find_router(bat_priv, orig_node, recv_if); 833 834 if (!neigh_node) 835 goto out; 836 837 /* create a copy of the skb, if needed, to modify it. */ 838 if (skb_cow(skb, sizeof(struct ethhdr)) < 0) 839 goto out; 840 841 unicast_packet = (struct unicast_packet *)skb->data; 842 843 if (unicast_packet->packet_type == BAT_UNICAST && 844 atomic_read(&bat_priv->fragmentation) && 845 skb->len > neigh_node->if_incoming->net_dev->mtu) { 846 ret = frag_send_skb(skb, bat_priv, 847 neigh_node->if_incoming, neigh_node->addr); 848 goto out; 849 } 850 851 if (unicast_packet->packet_type == BAT_UNICAST_FRAG && 852 frag_can_reassemble(skb, neigh_node->if_incoming->net_dev->mtu)) { 853 854 ret = frag_reassemble_skb(skb, bat_priv, &new_skb); 855 856 if (ret == NET_RX_DROP) 857 goto out; 858 859 /* packet was buffered for late merge */ 860 if (!new_skb) { 861 ret = NET_RX_SUCCESS; 862 goto out; 863 } 864 865 skb = new_skb; 866 unicast_packet = (struct unicast_packet *)skb->data; 867 } 868 869 /* decrement ttl */ 870 unicast_packet->ttl--; 871 872 /* route it */ 873 send_skb_packet(skb, neigh_node->if_incoming, neigh_node->addr); 874 ret = NET_RX_SUCCESS; 875 876 out: 877 if (neigh_node) 878 neigh_node_free_ref(neigh_node); 879 if (orig_node) 880 orig_node_free_ref(orig_node); 881 return ret; 882 } 883 884 static int check_unicast_ttvn(struct bat_priv *bat_priv, 885 struct sk_buff *skb) { 886 uint8_t curr_ttvn; 887 struct orig_node *orig_node; 888 struct ethhdr *ethhdr; 889 struct hard_iface *primary_if; 890 struct unicast_packet *unicast_packet; 891 bool tt_poss_change; 892 893 /* I could need to modify it */ 894 if (skb_cow(skb, sizeof(struct unicast_packet)) < 0) 895 return 0; 896 897 unicast_packet = (struct unicast_packet *)skb->data; 898 899 if (is_my_mac(unicast_packet->dest)) { 900 tt_poss_change = bat_priv->tt_poss_change; 901 curr_ttvn = (uint8_t)atomic_read(&bat_priv->ttvn); 902 } else { 903 orig_node = orig_hash_find(bat_priv, unicast_packet->dest); 904 905 if (!orig_node) 906 return 0; 907 908 curr_ttvn = (uint8_t)atomic_read(&orig_node->last_ttvn); 909 tt_poss_change = orig_node->tt_poss_change; 910 orig_node_free_ref(orig_node); 911 } 912 913 /* Check whether I have to reroute the packet */ 914 if (seq_before(unicast_packet->ttvn, curr_ttvn) || tt_poss_change) { 915 /* Linearize the skb before accessing it */ 916 if (skb_linearize(skb) < 0) 917 return 0; 918 919 ethhdr = (struct ethhdr *)(skb->data + 920 sizeof(struct unicast_packet)); 921 orig_node = transtable_search(bat_priv, NULL, ethhdr->h_dest); 922 923 if (!orig_node) { 924 if (!is_my_client(bat_priv, ethhdr->h_dest)) 925 return 0; 926 primary_if = primary_if_get_selected(bat_priv); 927 if (!primary_if) 928 return 0; 929 memcpy(unicast_packet->dest, 930 primary_if->net_dev->dev_addr, ETH_ALEN); 931 hardif_free_ref(primary_if); 932 } else { 933 memcpy(unicast_packet->dest, orig_node->orig, 934 ETH_ALEN); 935 curr_ttvn = (uint8_t) 936 atomic_read(&orig_node->last_ttvn); 937 orig_node_free_ref(orig_node); 938 } 939 940 bat_dbg(DBG_ROUTES, bat_priv, "TTVN mismatch (old_ttvn %u " 941 "new_ttvn %u)! Rerouting unicast packet (for %pM) to " 942 "%pM\n", unicast_packet->ttvn, curr_ttvn, 943 ethhdr->h_dest, unicast_packet->dest); 944 945 unicast_packet->ttvn = curr_ttvn; 946 } 947 return 1; 948 } 949 950 int recv_unicast_packet(struct sk_buff *skb, struct hard_iface *recv_if) 951 { 952 struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface); 953 struct unicast_packet *unicast_packet; 954 int hdr_size = sizeof(*unicast_packet); 955 956 if (check_unicast_packet(skb, hdr_size) < 0) 957 return NET_RX_DROP; 958 959 if (!check_unicast_ttvn(bat_priv, skb)) 960 return NET_RX_DROP; 961 962 unicast_packet = (struct unicast_packet *)skb->data; 963 964 /* packet for me */ 965 if (is_my_mac(unicast_packet->dest)) { 966 interface_rx(recv_if->soft_iface, skb, recv_if, hdr_size); 967 return NET_RX_SUCCESS; 968 } 969 970 return route_unicast_packet(skb, recv_if); 971 } 972 973 int recv_ucast_frag_packet(struct sk_buff *skb, struct hard_iface *recv_if) 974 { 975 struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface); 976 struct unicast_frag_packet *unicast_packet; 977 int hdr_size = sizeof(*unicast_packet); 978 struct sk_buff *new_skb = NULL; 979 int ret; 980 981 if (check_unicast_packet(skb, hdr_size) < 0) 982 return NET_RX_DROP; 983 984 if (!check_unicast_ttvn(bat_priv, skb)) 985 return NET_RX_DROP; 986 987 unicast_packet = (struct unicast_frag_packet *)skb->data; 988 989 /* packet for me */ 990 if (is_my_mac(unicast_packet->dest)) { 991 992 ret = frag_reassemble_skb(skb, bat_priv, &new_skb); 993 994 if (ret == NET_RX_DROP) 995 return NET_RX_DROP; 996 997 /* packet was buffered for late merge */ 998 if (!new_skb) 999 return NET_RX_SUCCESS; 1000 1001 interface_rx(recv_if->soft_iface, new_skb, recv_if, 1002 sizeof(struct unicast_packet)); 1003 return NET_RX_SUCCESS; 1004 } 1005 1006 return route_unicast_packet(skb, recv_if); 1007 } 1008 1009 1010 int recv_bcast_packet(struct sk_buff *skb, struct hard_iface *recv_if) 1011 { 1012 struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface); 1013 struct orig_node *orig_node = NULL; 1014 struct bcast_packet *bcast_packet; 1015 struct ethhdr *ethhdr; 1016 int hdr_size = sizeof(*bcast_packet); 1017 int ret = NET_RX_DROP; 1018 int32_t seq_diff; 1019 1020 /* drop packet if it has not necessary minimum size */ 1021 if (unlikely(!pskb_may_pull(skb, hdr_size))) 1022 goto out; 1023 1024 ethhdr = (struct ethhdr *)skb_mac_header(skb); 1025 1026 /* packet with broadcast indication but unicast recipient */ 1027 if (!is_broadcast_ether_addr(ethhdr->h_dest)) 1028 goto out; 1029 1030 /* packet with broadcast sender address */ 1031 if (is_broadcast_ether_addr(ethhdr->h_source)) 1032 goto out; 1033 1034 /* ignore broadcasts sent by myself */ 1035 if (is_my_mac(ethhdr->h_source)) 1036 goto out; 1037 1038 bcast_packet = (struct bcast_packet *)skb->data; 1039 1040 /* ignore broadcasts originated by myself */ 1041 if (is_my_mac(bcast_packet->orig)) 1042 goto out; 1043 1044 if (bcast_packet->ttl < 2) 1045 goto out; 1046 1047 orig_node = orig_hash_find(bat_priv, bcast_packet->orig); 1048 1049 if (!orig_node) 1050 goto out; 1051 1052 spin_lock_bh(&orig_node->bcast_seqno_lock); 1053 1054 /* check whether the packet is a duplicate */ 1055 if (get_bit_status(orig_node->bcast_bits, orig_node->last_bcast_seqno, 1056 ntohl(bcast_packet->seqno))) 1057 goto spin_unlock; 1058 1059 seq_diff = ntohl(bcast_packet->seqno) - orig_node->last_bcast_seqno; 1060 1061 /* check whether the packet is old and the host just restarted. */ 1062 if (window_protected(bat_priv, seq_diff, 1063 &orig_node->bcast_seqno_reset)) 1064 goto spin_unlock; 1065 1066 /* mark broadcast in flood history, update window position 1067 * if required. */ 1068 if (bit_get_packet(bat_priv, orig_node->bcast_bits, seq_diff, 1)) 1069 orig_node->last_bcast_seqno = ntohl(bcast_packet->seqno); 1070 1071 spin_unlock_bh(&orig_node->bcast_seqno_lock); 1072 1073 /* rebroadcast packet */ 1074 add_bcast_packet_to_list(bat_priv, skb, 1); 1075 1076 /* broadcast for me */ 1077 interface_rx(recv_if->soft_iface, skb, recv_if, hdr_size); 1078 ret = NET_RX_SUCCESS; 1079 goto out; 1080 1081 spin_unlock: 1082 spin_unlock_bh(&orig_node->bcast_seqno_lock); 1083 out: 1084 if (orig_node) 1085 orig_node_free_ref(orig_node); 1086 return ret; 1087 } 1088 1089 int recv_vis_packet(struct sk_buff *skb, struct hard_iface *recv_if) 1090 { 1091 struct vis_packet *vis_packet; 1092 struct ethhdr *ethhdr; 1093 struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface); 1094 int hdr_size = sizeof(*vis_packet); 1095 1096 /* keep skb linear */ 1097 if (skb_linearize(skb) < 0) 1098 return NET_RX_DROP; 1099 1100 if (unlikely(!pskb_may_pull(skb, hdr_size))) 1101 return NET_RX_DROP; 1102 1103 vis_packet = (struct vis_packet *)skb->data; 1104 ethhdr = (struct ethhdr *)skb_mac_header(skb); 1105 1106 /* not for me */ 1107 if (!is_my_mac(ethhdr->h_dest)) 1108 return NET_RX_DROP; 1109 1110 /* ignore own packets */ 1111 if (is_my_mac(vis_packet->vis_orig)) 1112 return NET_RX_DROP; 1113 1114 if (is_my_mac(vis_packet->sender_orig)) 1115 return NET_RX_DROP; 1116 1117 switch (vis_packet->vis_type) { 1118 case VIS_TYPE_SERVER_SYNC: 1119 receive_server_sync_packet(bat_priv, vis_packet, 1120 skb_headlen(skb)); 1121 break; 1122 1123 case VIS_TYPE_CLIENT_UPDATE: 1124 receive_client_update_packet(bat_priv, vis_packet, 1125 skb_headlen(skb)); 1126 break; 1127 1128 default: /* ignore unknown packet */ 1129 break; 1130 } 1131 1132 /* We take a copy of the data in the packet, so we should 1133 always free the skbuf. */ 1134 return NET_RX_DROP; 1135 } 1136