1 /* Copyright (C) 2011-2013 B.A.T.M.A.N. contributors: 2 * 3 * Simon Wunderlich 4 * 5 * This program is free software; you can redistribute it and/or 6 * modify it under the terms of version 2 of the GNU General Public 7 * License as published by the Free Software Foundation. 8 * 9 * This program is distributed in the hope that it will be useful, but 10 * WITHOUT ANY WARRANTY; without even the implied warranty of 11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 12 * General Public License for more details. 13 * 14 * You should have received a copy of the GNU General Public License 15 * along with this program; if not, write to the Free Software 16 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 17 * 02110-1301, USA 18 */ 19 20 #include "main.h" 21 #include "hash.h" 22 #include "hard-interface.h" 23 #include "originator.h" 24 #include "bridge_loop_avoidance.h" 25 #include "translation-table.h" 26 #include "send.h" 27 28 #include <linux/etherdevice.h> 29 #include <linux/crc16.h> 30 #include <linux/if_arp.h> 31 #include <net/arp.h> 32 #include <linux/if_vlan.h> 33 34 static const uint8_t batadv_announce_mac[4] = {0x43, 0x05, 0x43, 0x05}; 35 36 static void batadv_bla_periodic_work(struct work_struct *work); 37 static void 38 batadv_bla_send_announce(struct batadv_priv *bat_priv, 39 struct batadv_bla_backbone_gw *backbone_gw); 40 41 /* return the index of the claim */ 42 static inline uint32_t batadv_choose_claim(const void *data, uint32_t size) 43 { 44 struct batadv_bla_claim *claim = (struct batadv_bla_claim *)data; 45 uint32_t hash = 0; 46 47 hash = batadv_hash_bytes(hash, &claim->addr, sizeof(claim->addr)); 48 hash = batadv_hash_bytes(hash, &claim->vid, sizeof(claim->vid)); 49 50 hash += (hash << 3); 51 hash ^= (hash >> 11); 52 hash += (hash << 15); 53 54 return hash % size; 55 } 56 57 /* return the index of the backbone gateway */ 58 static inline uint32_t batadv_choose_backbone_gw(const void *data, 59 uint32_t size) 60 { 61 const struct batadv_bla_claim *claim = (struct batadv_bla_claim *)data; 62 uint32_t hash = 0; 63 64 hash = batadv_hash_bytes(hash, &claim->addr, sizeof(claim->addr)); 65 hash = batadv_hash_bytes(hash, &claim->vid, sizeof(claim->vid)); 66 67 hash += (hash << 3); 68 hash ^= (hash >> 11); 69 hash += (hash << 15); 70 71 return hash % size; 72 } 73 74 75 /* compares address and vid of two backbone gws */ 76 static int batadv_compare_backbone_gw(const struct hlist_node *node, 77 const void *data2) 78 { 79 const void *data1 = container_of(node, struct batadv_bla_backbone_gw, 80 hash_entry); 81 const struct batadv_bla_backbone_gw *gw1 = data1, *gw2 = data2; 82 83 if (!batadv_compare_eth(gw1->orig, gw2->orig)) 84 return 0; 85 86 if (gw1->vid != gw2->vid) 87 return 0; 88 89 return 1; 90 } 91 92 /* compares address and vid of two claims */ 93 static int batadv_compare_claim(const struct hlist_node *node, 94 const void *data2) 95 { 96 const void *data1 = container_of(node, struct batadv_bla_claim, 97 hash_entry); 98 const struct batadv_bla_claim *cl1 = data1, *cl2 = data2; 99 100 if (!batadv_compare_eth(cl1->addr, cl2->addr)) 101 return 0; 102 103 if (cl1->vid != cl2->vid) 104 return 0; 105 106 return 1; 107 } 108 109 /* free a backbone gw */ 110 static void 111 batadv_backbone_gw_free_ref(struct batadv_bla_backbone_gw *backbone_gw) 112 { 113 if (atomic_dec_and_test(&backbone_gw->refcount)) 114 kfree_rcu(backbone_gw, rcu); 115 } 116 117 /* finally deinitialize the claim */ 118 static void batadv_claim_free_rcu(struct rcu_head *rcu) 119 { 120 struct batadv_bla_claim *claim; 121 122 claim = container_of(rcu, struct batadv_bla_claim, rcu); 123 124 batadv_backbone_gw_free_ref(claim->backbone_gw); 125 kfree(claim); 126 } 127 128 /* free a claim, call claim_free_rcu if its the last reference */ 129 static void batadv_claim_free_ref(struct batadv_bla_claim *claim) 130 { 131 if (atomic_dec_and_test(&claim->refcount)) 132 call_rcu(&claim->rcu, batadv_claim_free_rcu); 133 } 134 135 /* @bat_priv: the bat priv with all the soft interface information 136 * @data: search data (may be local/static data) 137 * 138 * looks for a claim in the hash, and returns it if found 139 * or NULL otherwise. 140 */ 141 static struct batadv_bla_claim 142 *batadv_claim_hash_find(struct batadv_priv *bat_priv, 143 struct batadv_bla_claim *data) 144 { 145 struct batadv_hashtable *hash = bat_priv->bla.claim_hash; 146 struct hlist_head *head; 147 struct batadv_bla_claim *claim; 148 struct batadv_bla_claim *claim_tmp = NULL; 149 int index; 150 151 if (!hash) 152 return NULL; 153 154 index = batadv_choose_claim(data, hash->size); 155 head = &hash->table[index]; 156 157 rcu_read_lock(); 158 hlist_for_each_entry_rcu(claim, head, hash_entry) { 159 if (!batadv_compare_claim(&claim->hash_entry, data)) 160 continue; 161 162 if (!atomic_inc_not_zero(&claim->refcount)) 163 continue; 164 165 claim_tmp = claim; 166 break; 167 } 168 rcu_read_unlock(); 169 170 return claim_tmp; 171 } 172 173 /** 174 * batadv_backbone_hash_find - looks for a claim in the hash 175 * @bat_priv: the bat priv with all the soft interface information 176 * @addr: the address of the originator 177 * @vid: the VLAN ID 178 * 179 * Returns claim if found or NULL otherwise. 180 */ 181 static struct batadv_bla_backbone_gw * 182 batadv_backbone_hash_find(struct batadv_priv *bat_priv, 183 uint8_t *addr, unsigned short vid) 184 { 185 struct batadv_hashtable *hash = bat_priv->bla.backbone_hash; 186 struct hlist_head *head; 187 struct batadv_bla_backbone_gw search_entry, *backbone_gw; 188 struct batadv_bla_backbone_gw *backbone_gw_tmp = NULL; 189 int index; 190 191 if (!hash) 192 return NULL; 193 194 memcpy(search_entry.orig, addr, ETH_ALEN); 195 search_entry.vid = vid; 196 197 index = batadv_choose_backbone_gw(&search_entry, hash->size); 198 head = &hash->table[index]; 199 200 rcu_read_lock(); 201 hlist_for_each_entry_rcu(backbone_gw, head, hash_entry) { 202 if (!batadv_compare_backbone_gw(&backbone_gw->hash_entry, 203 &search_entry)) 204 continue; 205 206 if (!atomic_inc_not_zero(&backbone_gw->refcount)) 207 continue; 208 209 backbone_gw_tmp = backbone_gw; 210 break; 211 } 212 rcu_read_unlock(); 213 214 return backbone_gw_tmp; 215 } 216 217 /* delete all claims for a backbone */ 218 static void 219 batadv_bla_del_backbone_claims(struct batadv_bla_backbone_gw *backbone_gw) 220 { 221 struct batadv_hashtable *hash; 222 struct hlist_node *node_tmp; 223 struct hlist_head *head; 224 struct batadv_bla_claim *claim; 225 int i; 226 spinlock_t *list_lock; /* protects write access to the hash lists */ 227 228 hash = backbone_gw->bat_priv->bla.claim_hash; 229 if (!hash) 230 return; 231 232 for (i = 0; i < hash->size; i++) { 233 head = &hash->table[i]; 234 list_lock = &hash->list_locks[i]; 235 236 spin_lock_bh(list_lock); 237 hlist_for_each_entry_safe(claim, node_tmp, 238 head, hash_entry) { 239 if (claim->backbone_gw != backbone_gw) 240 continue; 241 242 batadv_claim_free_ref(claim); 243 hlist_del_rcu(&claim->hash_entry); 244 } 245 spin_unlock_bh(list_lock); 246 } 247 248 /* all claims gone, intialize CRC */ 249 backbone_gw->crc = BATADV_BLA_CRC_INIT; 250 } 251 252 /** 253 * batadv_bla_send_claim - sends a claim frame according to the provided info 254 * @bat_priv: the bat priv with all the soft interface information 255 * @orig: the mac address to be announced within the claim 256 * @vid: the VLAN ID 257 * @claimtype: the type of the claim (CLAIM, UNCLAIM, ANNOUNCE, ...) 258 */ 259 static void batadv_bla_send_claim(struct batadv_priv *bat_priv, uint8_t *mac, 260 unsigned short vid, int claimtype) 261 { 262 struct sk_buff *skb; 263 struct ethhdr *ethhdr; 264 struct batadv_hard_iface *primary_if; 265 struct net_device *soft_iface; 266 uint8_t *hw_src; 267 struct batadv_bla_claim_dst local_claim_dest; 268 __be32 zeroip = 0; 269 270 primary_if = batadv_primary_if_get_selected(bat_priv); 271 if (!primary_if) 272 return; 273 274 memcpy(&local_claim_dest, &bat_priv->bla.claim_dest, 275 sizeof(local_claim_dest)); 276 local_claim_dest.type = claimtype; 277 278 soft_iface = primary_if->soft_iface; 279 280 skb = arp_create(ARPOP_REPLY, ETH_P_ARP, 281 /* IP DST: 0.0.0.0 */ 282 zeroip, 283 primary_if->soft_iface, 284 /* IP SRC: 0.0.0.0 */ 285 zeroip, 286 /* Ethernet DST: Broadcast */ 287 NULL, 288 /* Ethernet SRC/HW SRC: originator mac */ 289 primary_if->net_dev->dev_addr, 290 /* HW DST: FF:43:05:XX:YY:YY 291 * with XX = claim type 292 * and YY:YY = group id 293 */ 294 (uint8_t *)&local_claim_dest); 295 296 if (!skb) 297 goto out; 298 299 ethhdr = (struct ethhdr *)skb->data; 300 hw_src = (uint8_t *)ethhdr + ETH_HLEN + sizeof(struct arphdr); 301 302 /* now we pretend that the client would have sent this ... */ 303 switch (claimtype) { 304 case BATADV_CLAIM_TYPE_CLAIM: 305 /* normal claim frame 306 * set Ethernet SRC to the clients mac 307 */ 308 memcpy(ethhdr->h_source, mac, ETH_ALEN); 309 batadv_dbg(BATADV_DBG_BLA, bat_priv, 310 "bla_send_claim(): CLAIM %pM on vid %d\n", mac, 311 BATADV_PRINT_VID(vid)); 312 break; 313 case BATADV_CLAIM_TYPE_UNCLAIM: 314 /* unclaim frame 315 * set HW SRC to the clients mac 316 */ 317 memcpy(hw_src, mac, ETH_ALEN); 318 batadv_dbg(BATADV_DBG_BLA, bat_priv, 319 "bla_send_claim(): UNCLAIM %pM on vid %d\n", mac, 320 BATADV_PRINT_VID(vid)); 321 break; 322 case BATADV_CLAIM_TYPE_ANNOUNCE: 323 /* announcement frame 324 * set HW SRC to the special mac containg the crc 325 */ 326 memcpy(hw_src, mac, ETH_ALEN); 327 batadv_dbg(BATADV_DBG_BLA, bat_priv, 328 "bla_send_claim(): ANNOUNCE of %pM on vid %d\n", 329 ethhdr->h_source, BATADV_PRINT_VID(vid)); 330 break; 331 case BATADV_CLAIM_TYPE_REQUEST: 332 /* request frame 333 * set HW SRC and header destination to the receiving backbone 334 * gws mac 335 */ 336 memcpy(hw_src, mac, ETH_ALEN); 337 memcpy(ethhdr->h_dest, mac, ETH_ALEN); 338 batadv_dbg(BATADV_DBG_BLA, bat_priv, 339 "bla_send_claim(): REQUEST of %pM to %pM on vid %d\n", 340 ethhdr->h_source, ethhdr->h_dest, 341 BATADV_PRINT_VID(vid)); 342 break; 343 } 344 345 if (vid & BATADV_VLAN_HAS_TAG) 346 skb = vlan_insert_tag(skb, htons(ETH_P_8021Q), 347 vid & VLAN_VID_MASK); 348 349 skb_reset_mac_header(skb); 350 skb->protocol = eth_type_trans(skb, soft_iface); 351 batadv_inc_counter(bat_priv, BATADV_CNT_RX); 352 batadv_add_counter(bat_priv, BATADV_CNT_RX_BYTES, 353 skb->len + ETH_HLEN); 354 soft_iface->last_rx = jiffies; 355 356 netif_rx(skb); 357 out: 358 if (primary_if) 359 batadv_hardif_free_ref(primary_if); 360 } 361 362 /** 363 * batadv_bla_get_backbone_gw 364 * @bat_priv: the bat priv with all the soft interface information 365 * @orig: the mac address of the originator 366 * @vid: the VLAN ID 367 * 368 * searches for the backbone gw or creates a new one if it could not 369 * be found. 370 */ 371 static struct batadv_bla_backbone_gw * 372 batadv_bla_get_backbone_gw(struct batadv_priv *bat_priv, uint8_t *orig, 373 unsigned short vid, bool own_backbone) 374 { 375 struct batadv_bla_backbone_gw *entry; 376 struct batadv_orig_node *orig_node; 377 int hash_added; 378 379 entry = batadv_backbone_hash_find(bat_priv, orig, vid); 380 381 if (entry) 382 return entry; 383 384 batadv_dbg(BATADV_DBG_BLA, bat_priv, 385 "bla_get_backbone_gw(): not found (%pM, %d), creating new entry\n", 386 orig, BATADV_PRINT_VID(vid)); 387 388 entry = kzalloc(sizeof(*entry), GFP_ATOMIC); 389 if (!entry) 390 return NULL; 391 392 entry->vid = vid; 393 entry->lasttime = jiffies; 394 entry->crc = BATADV_BLA_CRC_INIT; 395 entry->bat_priv = bat_priv; 396 atomic_set(&entry->request_sent, 0); 397 atomic_set(&entry->wait_periods, 0); 398 memcpy(entry->orig, orig, ETH_ALEN); 399 400 /* one for the hash, one for returning */ 401 atomic_set(&entry->refcount, 2); 402 403 hash_added = batadv_hash_add(bat_priv->bla.backbone_hash, 404 batadv_compare_backbone_gw, 405 batadv_choose_backbone_gw, entry, 406 &entry->hash_entry); 407 408 if (unlikely(hash_added != 0)) { 409 /* hash failed, free the structure */ 410 kfree(entry); 411 return NULL; 412 } 413 414 /* this is a gateway now, remove any TT entry on this VLAN */ 415 orig_node = batadv_orig_hash_find(bat_priv, orig); 416 if (orig_node) { 417 batadv_tt_global_del_orig(bat_priv, orig_node, vid, 418 "became a backbone gateway"); 419 batadv_orig_node_free_ref(orig_node); 420 } 421 422 if (own_backbone) { 423 batadv_bla_send_announce(bat_priv, entry); 424 425 /* this will be decreased in the worker thread */ 426 atomic_inc(&entry->request_sent); 427 atomic_set(&entry->wait_periods, BATADV_BLA_WAIT_PERIODS); 428 atomic_inc(&bat_priv->bla.num_requests); 429 } 430 431 return entry; 432 } 433 434 /* update or add the own backbone gw to make sure we announce 435 * where we receive other backbone gws 436 */ 437 static void 438 batadv_bla_update_own_backbone_gw(struct batadv_priv *bat_priv, 439 struct batadv_hard_iface *primary_if, 440 unsigned short vid) 441 { 442 struct batadv_bla_backbone_gw *backbone_gw; 443 444 backbone_gw = batadv_bla_get_backbone_gw(bat_priv, 445 primary_if->net_dev->dev_addr, 446 vid, true); 447 if (unlikely(!backbone_gw)) 448 return; 449 450 backbone_gw->lasttime = jiffies; 451 batadv_backbone_gw_free_ref(backbone_gw); 452 } 453 454 /* @bat_priv: the bat priv with all the soft interface information 455 * @vid: the vid where the request came on 456 * 457 * Repeat all of our own claims, and finally send an ANNOUNCE frame 458 * to allow the requester another check if the CRC is correct now. 459 */ 460 static void batadv_bla_answer_request(struct batadv_priv *bat_priv, 461 struct batadv_hard_iface *primary_if, 462 unsigned short vid) 463 { 464 struct hlist_head *head; 465 struct batadv_hashtable *hash; 466 struct batadv_bla_claim *claim; 467 struct batadv_bla_backbone_gw *backbone_gw; 468 int i; 469 470 batadv_dbg(BATADV_DBG_BLA, bat_priv, 471 "bla_answer_request(): received a claim request, send all of our own claims again\n"); 472 473 backbone_gw = batadv_backbone_hash_find(bat_priv, 474 primary_if->net_dev->dev_addr, 475 vid); 476 if (!backbone_gw) 477 return; 478 479 hash = bat_priv->bla.claim_hash; 480 for (i = 0; i < hash->size; i++) { 481 head = &hash->table[i]; 482 483 rcu_read_lock(); 484 hlist_for_each_entry_rcu(claim, head, hash_entry) { 485 /* only own claims are interesting */ 486 if (claim->backbone_gw != backbone_gw) 487 continue; 488 489 batadv_bla_send_claim(bat_priv, claim->addr, claim->vid, 490 BATADV_CLAIM_TYPE_CLAIM); 491 } 492 rcu_read_unlock(); 493 } 494 495 /* finally, send an announcement frame */ 496 batadv_bla_send_announce(bat_priv, backbone_gw); 497 batadv_backbone_gw_free_ref(backbone_gw); 498 } 499 500 /* @backbone_gw: the backbone gateway from whom we are out of sync 501 * 502 * When the crc is wrong, ask the backbone gateway for a full table update. 503 * After the request, it will repeat all of his own claims and finally 504 * send an announcement claim with which we can check again. 505 */ 506 static void batadv_bla_send_request(struct batadv_bla_backbone_gw *backbone_gw) 507 { 508 /* first, remove all old entries */ 509 batadv_bla_del_backbone_claims(backbone_gw); 510 511 batadv_dbg(BATADV_DBG_BLA, backbone_gw->bat_priv, 512 "Sending REQUEST to %pM\n", backbone_gw->orig); 513 514 /* send request */ 515 batadv_bla_send_claim(backbone_gw->bat_priv, backbone_gw->orig, 516 backbone_gw->vid, BATADV_CLAIM_TYPE_REQUEST); 517 518 /* no local broadcasts should be sent or received, for now. */ 519 if (!atomic_read(&backbone_gw->request_sent)) { 520 atomic_inc(&backbone_gw->bat_priv->bla.num_requests); 521 atomic_set(&backbone_gw->request_sent, 1); 522 } 523 } 524 525 /* @bat_priv: the bat priv with all the soft interface information 526 * @backbone_gw: our backbone gateway which should be announced 527 * 528 * This function sends an announcement. It is called from multiple 529 * places. 530 */ 531 static void batadv_bla_send_announce(struct batadv_priv *bat_priv, 532 struct batadv_bla_backbone_gw *backbone_gw) 533 { 534 uint8_t mac[ETH_ALEN]; 535 __be16 crc; 536 537 memcpy(mac, batadv_announce_mac, 4); 538 crc = htons(backbone_gw->crc); 539 memcpy(&mac[4], &crc, 2); 540 541 batadv_bla_send_claim(bat_priv, mac, backbone_gw->vid, 542 BATADV_CLAIM_TYPE_ANNOUNCE); 543 } 544 545 /** 546 * batadv_bla_add_claim - Adds a claim in the claim hash 547 * @bat_priv: the bat priv with all the soft interface information 548 * @mac: the mac address of the claim 549 * @vid: the VLAN ID of the frame 550 * @backbone_gw: the backbone gateway which claims it 551 */ 552 static void batadv_bla_add_claim(struct batadv_priv *bat_priv, 553 const uint8_t *mac, const unsigned short vid, 554 struct batadv_bla_backbone_gw *backbone_gw) 555 { 556 struct batadv_bla_claim *claim; 557 struct batadv_bla_claim search_claim; 558 int hash_added; 559 560 memcpy(search_claim.addr, mac, ETH_ALEN); 561 search_claim.vid = vid; 562 claim = batadv_claim_hash_find(bat_priv, &search_claim); 563 564 /* create a new claim entry if it does not exist yet. */ 565 if (!claim) { 566 claim = kzalloc(sizeof(*claim), GFP_ATOMIC); 567 if (!claim) 568 return; 569 570 memcpy(claim->addr, mac, ETH_ALEN); 571 claim->vid = vid; 572 claim->lasttime = jiffies; 573 claim->backbone_gw = backbone_gw; 574 575 atomic_set(&claim->refcount, 2); 576 batadv_dbg(BATADV_DBG_BLA, bat_priv, 577 "bla_add_claim(): adding new entry %pM, vid %d to hash ...\n", 578 mac, BATADV_PRINT_VID(vid)); 579 hash_added = batadv_hash_add(bat_priv->bla.claim_hash, 580 batadv_compare_claim, 581 batadv_choose_claim, claim, 582 &claim->hash_entry); 583 584 if (unlikely(hash_added != 0)) { 585 /* only local changes happened. */ 586 kfree(claim); 587 return; 588 } 589 } else { 590 claim->lasttime = jiffies; 591 if (claim->backbone_gw == backbone_gw) 592 /* no need to register a new backbone */ 593 goto claim_free_ref; 594 595 batadv_dbg(BATADV_DBG_BLA, bat_priv, 596 "bla_add_claim(): changing ownership for %pM, vid %d\n", 597 mac, BATADV_PRINT_VID(vid)); 598 599 claim->backbone_gw->crc ^= crc16(0, claim->addr, ETH_ALEN); 600 batadv_backbone_gw_free_ref(claim->backbone_gw); 601 } 602 /* set (new) backbone gw */ 603 atomic_inc(&backbone_gw->refcount); 604 claim->backbone_gw = backbone_gw; 605 606 backbone_gw->crc ^= crc16(0, claim->addr, ETH_ALEN); 607 backbone_gw->lasttime = jiffies; 608 609 claim_free_ref: 610 batadv_claim_free_ref(claim); 611 } 612 613 /* Delete a claim from the claim hash which has the 614 * given mac address and vid. 615 */ 616 static void batadv_bla_del_claim(struct batadv_priv *bat_priv, 617 const uint8_t *mac, const unsigned short vid) 618 { 619 struct batadv_bla_claim search_claim, *claim; 620 621 memcpy(search_claim.addr, mac, ETH_ALEN); 622 search_claim.vid = vid; 623 claim = batadv_claim_hash_find(bat_priv, &search_claim); 624 if (!claim) 625 return; 626 627 batadv_dbg(BATADV_DBG_BLA, bat_priv, "bla_del_claim(): %pM, vid %d\n", 628 mac, BATADV_PRINT_VID(vid)); 629 630 batadv_hash_remove(bat_priv->bla.claim_hash, batadv_compare_claim, 631 batadv_choose_claim, claim); 632 batadv_claim_free_ref(claim); /* reference from the hash is gone */ 633 634 claim->backbone_gw->crc ^= crc16(0, claim->addr, ETH_ALEN); 635 636 /* don't need the reference from hash_find() anymore */ 637 batadv_claim_free_ref(claim); 638 } 639 640 /* check for ANNOUNCE frame, return 1 if handled */ 641 static int batadv_handle_announce(struct batadv_priv *bat_priv, 642 uint8_t *an_addr, uint8_t *backbone_addr, 643 unsigned short vid) 644 { 645 struct batadv_bla_backbone_gw *backbone_gw; 646 uint16_t crc; 647 648 if (memcmp(an_addr, batadv_announce_mac, 4) != 0) 649 return 0; 650 651 backbone_gw = batadv_bla_get_backbone_gw(bat_priv, backbone_addr, vid, 652 false); 653 654 if (unlikely(!backbone_gw)) 655 return 1; 656 657 658 /* handle as ANNOUNCE frame */ 659 backbone_gw->lasttime = jiffies; 660 crc = ntohs(*((__be16 *)(&an_addr[4]))); 661 662 batadv_dbg(BATADV_DBG_BLA, bat_priv, 663 "handle_announce(): ANNOUNCE vid %d (sent by %pM)... CRC = %#.4x\n", 664 BATADV_PRINT_VID(vid), backbone_gw->orig, crc); 665 666 if (backbone_gw->crc != crc) { 667 batadv_dbg(BATADV_DBG_BLA, backbone_gw->bat_priv, 668 "handle_announce(): CRC FAILED for %pM/%d (my = %#.4x, sent = %#.4x)\n", 669 backbone_gw->orig, 670 BATADV_PRINT_VID(backbone_gw->vid), 671 backbone_gw->crc, crc); 672 673 batadv_bla_send_request(backbone_gw); 674 } else { 675 /* if we have sent a request and the crc was OK, 676 * we can allow traffic again. 677 */ 678 if (atomic_read(&backbone_gw->request_sent)) { 679 atomic_dec(&backbone_gw->bat_priv->bla.num_requests); 680 atomic_set(&backbone_gw->request_sent, 0); 681 } 682 } 683 684 batadv_backbone_gw_free_ref(backbone_gw); 685 return 1; 686 } 687 688 /* check for REQUEST frame, return 1 if handled */ 689 static int batadv_handle_request(struct batadv_priv *bat_priv, 690 struct batadv_hard_iface *primary_if, 691 uint8_t *backbone_addr, 692 struct ethhdr *ethhdr, unsigned short vid) 693 { 694 /* check for REQUEST frame */ 695 if (!batadv_compare_eth(backbone_addr, ethhdr->h_dest)) 696 return 0; 697 698 /* sanity check, this should not happen on a normal switch, 699 * we ignore it in this case. 700 */ 701 if (!batadv_compare_eth(ethhdr->h_dest, primary_if->net_dev->dev_addr)) 702 return 1; 703 704 batadv_dbg(BATADV_DBG_BLA, bat_priv, 705 "handle_request(): REQUEST vid %d (sent by %pM)...\n", 706 BATADV_PRINT_VID(vid), ethhdr->h_source); 707 708 batadv_bla_answer_request(bat_priv, primary_if, vid); 709 return 1; 710 } 711 712 /* check for UNCLAIM frame, return 1 if handled */ 713 static int batadv_handle_unclaim(struct batadv_priv *bat_priv, 714 struct batadv_hard_iface *primary_if, 715 uint8_t *backbone_addr, 716 uint8_t *claim_addr, unsigned short vid) 717 { 718 struct batadv_bla_backbone_gw *backbone_gw; 719 720 /* unclaim in any case if it is our own */ 721 if (primary_if && batadv_compare_eth(backbone_addr, 722 primary_if->net_dev->dev_addr)) 723 batadv_bla_send_claim(bat_priv, claim_addr, vid, 724 BATADV_CLAIM_TYPE_UNCLAIM); 725 726 backbone_gw = batadv_backbone_hash_find(bat_priv, backbone_addr, vid); 727 728 if (!backbone_gw) 729 return 1; 730 731 /* this must be an UNCLAIM frame */ 732 batadv_dbg(BATADV_DBG_BLA, bat_priv, 733 "handle_unclaim(): UNCLAIM %pM on vid %d (sent by %pM)...\n", 734 claim_addr, BATADV_PRINT_VID(vid), backbone_gw->orig); 735 736 batadv_bla_del_claim(bat_priv, claim_addr, vid); 737 batadv_backbone_gw_free_ref(backbone_gw); 738 return 1; 739 } 740 741 /* check for CLAIM frame, return 1 if handled */ 742 static int batadv_handle_claim(struct batadv_priv *bat_priv, 743 struct batadv_hard_iface *primary_if, 744 uint8_t *backbone_addr, uint8_t *claim_addr, 745 unsigned short vid) 746 { 747 struct batadv_bla_backbone_gw *backbone_gw; 748 749 /* register the gateway if not yet available, and add the claim. */ 750 751 backbone_gw = batadv_bla_get_backbone_gw(bat_priv, backbone_addr, vid, 752 false); 753 754 if (unlikely(!backbone_gw)) 755 return 1; 756 757 /* this must be a CLAIM frame */ 758 batadv_bla_add_claim(bat_priv, claim_addr, vid, backbone_gw); 759 if (batadv_compare_eth(backbone_addr, primary_if->net_dev->dev_addr)) 760 batadv_bla_send_claim(bat_priv, claim_addr, vid, 761 BATADV_CLAIM_TYPE_CLAIM); 762 763 /* TODO: we could call something like tt_local_del() here. */ 764 765 batadv_backbone_gw_free_ref(backbone_gw); 766 return 1; 767 } 768 769 /** 770 * batadv_check_claim_group 771 * @bat_priv: the bat priv with all the soft interface information 772 * @hw_src: the Hardware source in the ARP Header 773 * @hw_dst: the Hardware destination in the ARP Header 774 * @ethhdr: pointer to the Ethernet header of the claim frame 775 * 776 * checks if it is a claim packet and if its on the same group. 777 * This function also applies the group ID of the sender 778 * if it is in the same mesh. 779 * 780 * returns: 781 * 2 - if it is a claim packet and on the same group 782 * 1 - if is a claim packet from another group 783 * 0 - if it is not a claim packet 784 */ 785 static int batadv_check_claim_group(struct batadv_priv *bat_priv, 786 struct batadv_hard_iface *primary_if, 787 uint8_t *hw_src, uint8_t *hw_dst, 788 struct ethhdr *ethhdr) 789 { 790 uint8_t *backbone_addr; 791 struct batadv_orig_node *orig_node; 792 struct batadv_bla_claim_dst *bla_dst, *bla_dst_own; 793 794 bla_dst = (struct batadv_bla_claim_dst *)hw_dst; 795 bla_dst_own = &bat_priv->bla.claim_dest; 796 797 /* check if it is a claim packet in general */ 798 if (memcmp(bla_dst->magic, bla_dst_own->magic, 799 sizeof(bla_dst->magic)) != 0) 800 return 0; 801 802 /* if announcement packet, use the source, 803 * otherwise assume it is in the hw_src 804 */ 805 switch (bla_dst->type) { 806 case BATADV_CLAIM_TYPE_CLAIM: 807 backbone_addr = hw_src; 808 break; 809 case BATADV_CLAIM_TYPE_REQUEST: 810 case BATADV_CLAIM_TYPE_ANNOUNCE: 811 case BATADV_CLAIM_TYPE_UNCLAIM: 812 backbone_addr = ethhdr->h_source; 813 break; 814 default: 815 return 0; 816 } 817 818 /* don't accept claim frames from ourselves */ 819 if (batadv_compare_eth(backbone_addr, primary_if->net_dev->dev_addr)) 820 return 0; 821 822 /* if its already the same group, it is fine. */ 823 if (bla_dst->group == bla_dst_own->group) 824 return 2; 825 826 /* lets see if this originator is in our mesh */ 827 orig_node = batadv_orig_hash_find(bat_priv, backbone_addr); 828 829 /* dont accept claims from gateways which are not in 830 * the same mesh or group. 831 */ 832 if (!orig_node) 833 return 1; 834 835 /* if our mesh friends mac is bigger, use it for ourselves. */ 836 if (ntohs(bla_dst->group) > ntohs(bla_dst_own->group)) { 837 batadv_dbg(BATADV_DBG_BLA, bat_priv, 838 "taking other backbones claim group: %#.4x\n", 839 ntohs(bla_dst->group)); 840 bla_dst_own->group = bla_dst->group; 841 } 842 843 batadv_orig_node_free_ref(orig_node); 844 845 return 2; 846 } 847 848 849 /* @bat_priv: the bat priv with all the soft interface information 850 * @skb: the frame to be checked 851 * 852 * Check if this is a claim frame, and process it accordingly. 853 * 854 * returns 1 if it was a claim frame, otherwise return 0 to 855 * tell the callee that it can use the frame on its own. 856 */ 857 static int batadv_bla_process_claim(struct batadv_priv *bat_priv, 858 struct batadv_hard_iface *primary_if, 859 struct sk_buff *skb) 860 { 861 struct batadv_bla_claim_dst *bla_dst; 862 uint8_t *hw_src, *hw_dst; 863 struct vlan_ethhdr *vhdr; 864 struct ethhdr *ethhdr; 865 struct arphdr *arphdr; 866 unsigned short vid; 867 __be16 proto; 868 int headlen; 869 int ret; 870 871 vid = batadv_get_vid(skb, 0); 872 ethhdr = eth_hdr(skb); 873 874 proto = ethhdr->h_proto; 875 headlen = ETH_HLEN; 876 if (vid & BATADV_VLAN_HAS_TAG) { 877 vhdr = (struct vlan_ethhdr *)ethhdr; 878 proto = vhdr->h_vlan_encapsulated_proto; 879 headlen += VLAN_HLEN; 880 } 881 882 if (proto != htons(ETH_P_ARP)) 883 return 0; /* not a claim frame */ 884 885 /* this must be a ARP frame. check if it is a claim. */ 886 887 if (unlikely(!pskb_may_pull(skb, headlen + arp_hdr_len(skb->dev)))) 888 return 0; 889 890 /* pskb_may_pull() may have modified the pointers, get ethhdr again */ 891 ethhdr = eth_hdr(skb); 892 arphdr = (struct arphdr *)((uint8_t *)ethhdr + headlen); 893 894 /* Check whether the ARP frame carries a valid 895 * IP information 896 */ 897 if (arphdr->ar_hrd != htons(ARPHRD_ETHER)) 898 return 0; 899 if (arphdr->ar_pro != htons(ETH_P_IP)) 900 return 0; 901 if (arphdr->ar_hln != ETH_ALEN) 902 return 0; 903 if (arphdr->ar_pln != 4) 904 return 0; 905 906 hw_src = (uint8_t *)arphdr + sizeof(struct arphdr); 907 hw_dst = hw_src + ETH_ALEN + 4; 908 bla_dst = (struct batadv_bla_claim_dst *)hw_dst; 909 910 /* check if it is a claim frame. */ 911 ret = batadv_check_claim_group(bat_priv, primary_if, hw_src, hw_dst, 912 ethhdr); 913 if (ret == 1) 914 batadv_dbg(BATADV_DBG_BLA, bat_priv, 915 "bla_process_claim(): received a claim frame from another group. From: %pM on vid %d ...(hw_src %pM, hw_dst %pM)\n", 916 ethhdr->h_source, BATADV_PRINT_VID(vid), hw_src, 917 hw_dst); 918 919 if (ret < 2) 920 return ret; 921 922 /* become a backbone gw ourselves on this vlan if not happened yet */ 923 batadv_bla_update_own_backbone_gw(bat_priv, primary_if, vid); 924 925 /* check for the different types of claim frames ... */ 926 switch (bla_dst->type) { 927 case BATADV_CLAIM_TYPE_CLAIM: 928 if (batadv_handle_claim(bat_priv, primary_if, hw_src, 929 ethhdr->h_source, vid)) 930 return 1; 931 break; 932 case BATADV_CLAIM_TYPE_UNCLAIM: 933 if (batadv_handle_unclaim(bat_priv, primary_if, 934 ethhdr->h_source, hw_src, vid)) 935 return 1; 936 break; 937 938 case BATADV_CLAIM_TYPE_ANNOUNCE: 939 if (batadv_handle_announce(bat_priv, hw_src, ethhdr->h_source, 940 vid)) 941 return 1; 942 break; 943 case BATADV_CLAIM_TYPE_REQUEST: 944 if (batadv_handle_request(bat_priv, primary_if, hw_src, ethhdr, 945 vid)) 946 return 1; 947 break; 948 } 949 950 batadv_dbg(BATADV_DBG_BLA, bat_priv, 951 "bla_process_claim(): ERROR - this looks like a claim frame, but is useless. eth src %pM on vid %d ...(hw_src %pM, hw_dst %pM)\n", 952 ethhdr->h_source, BATADV_PRINT_VID(vid), hw_src, hw_dst); 953 return 1; 954 } 955 956 /* Check when we last heard from other nodes, and remove them in case of 957 * a time out, or clean all backbone gws if now is set. 958 */ 959 static void batadv_bla_purge_backbone_gw(struct batadv_priv *bat_priv, int now) 960 { 961 struct batadv_bla_backbone_gw *backbone_gw; 962 struct hlist_node *node_tmp; 963 struct hlist_head *head; 964 struct batadv_hashtable *hash; 965 spinlock_t *list_lock; /* protects write access to the hash lists */ 966 int i; 967 968 hash = bat_priv->bla.backbone_hash; 969 if (!hash) 970 return; 971 972 for (i = 0; i < hash->size; i++) { 973 head = &hash->table[i]; 974 list_lock = &hash->list_locks[i]; 975 976 spin_lock_bh(list_lock); 977 hlist_for_each_entry_safe(backbone_gw, node_tmp, 978 head, hash_entry) { 979 if (now) 980 goto purge_now; 981 if (!batadv_has_timed_out(backbone_gw->lasttime, 982 BATADV_BLA_BACKBONE_TIMEOUT)) 983 continue; 984 985 batadv_dbg(BATADV_DBG_BLA, backbone_gw->bat_priv, 986 "bla_purge_backbone_gw(): backbone gw %pM timed out\n", 987 backbone_gw->orig); 988 989 purge_now: 990 /* don't wait for the pending request anymore */ 991 if (atomic_read(&backbone_gw->request_sent)) 992 atomic_dec(&bat_priv->bla.num_requests); 993 994 batadv_bla_del_backbone_claims(backbone_gw); 995 996 hlist_del_rcu(&backbone_gw->hash_entry); 997 batadv_backbone_gw_free_ref(backbone_gw); 998 } 999 spin_unlock_bh(list_lock); 1000 } 1001 } 1002 1003 /** 1004 * batadv_bla_purge_claims 1005 * @bat_priv: the bat priv with all the soft interface information 1006 * @primary_if: the selected primary interface, may be NULL if now is set 1007 * @now: whether the whole hash shall be wiped now 1008 * 1009 * Check when we heard last time from our own claims, and remove them in case of 1010 * a time out, or clean all claims if now is set 1011 */ 1012 static void batadv_bla_purge_claims(struct batadv_priv *bat_priv, 1013 struct batadv_hard_iface *primary_if, 1014 int now) 1015 { 1016 struct batadv_bla_claim *claim; 1017 struct hlist_head *head; 1018 struct batadv_hashtable *hash; 1019 int i; 1020 1021 hash = bat_priv->bla.claim_hash; 1022 if (!hash) 1023 return; 1024 1025 for (i = 0; i < hash->size; i++) { 1026 head = &hash->table[i]; 1027 1028 rcu_read_lock(); 1029 hlist_for_each_entry_rcu(claim, head, hash_entry) { 1030 if (now) 1031 goto purge_now; 1032 if (!batadv_compare_eth(claim->backbone_gw->orig, 1033 primary_if->net_dev->dev_addr)) 1034 continue; 1035 if (!batadv_has_timed_out(claim->lasttime, 1036 BATADV_BLA_CLAIM_TIMEOUT)) 1037 continue; 1038 1039 batadv_dbg(BATADV_DBG_BLA, bat_priv, 1040 "bla_purge_claims(): %pM, vid %d, time out\n", 1041 claim->addr, claim->vid); 1042 1043 purge_now: 1044 batadv_handle_unclaim(bat_priv, primary_if, 1045 claim->backbone_gw->orig, 1046 claim->addr, claim->vid); 1047 } 1048 rcu_read_unlock(); 1049 } 1050 } 1051 1052 /** 1053 * batadv_bla_update_orig_address 1054 * @bat_priv: the bat priv with all the soft interface information 1055 * @primary_if: the new selected primary_if 1056 * @oldif: the old primary interface, may be NULL 1057 * 1058 * Update the backbone gateways when the own orig address changes. 1059 */ 1060 void batadv_bla_update_orig_address(struct batadv_priv *bat_priv, 1061 struct batadv_hard_iface *primary_if, 1062 struct batadv_hard_iface *oldif) 1063 { 1064 struct batadv_bla_backbone_gw *backbone_gw; 1065 struct hlist_head *head; 1066 struct batadv_hashtable *hash; 1067 __be16 group; 1068 int i; 1069 1070 /* reset bridge loop avoidance group id */ 1071 group = htons(crc16(0, primary_if->net_dev->dev_addr, ETH_ALEN)); 1072 bat_priv->bla.claim_dest.group = group; 1073 1074 /* purge everything when bridge loop avoidance is turned off */ 1075 if (!atomic_read(&bat_priv->bridge_loop_avoidance)) 1076 oldif = NULL; 1077 1078 if (!oldif) { 1079 batadv_bla_purge_claims(bat_priv, NULL, 1); 1080 batadv_bla_purge_backbone_gw(bat_priv, 1); 1081 return; 1082 } 1083 1084 hash = bat_priv->bla.backbone_hash; 1085 if (!hash) 1086 return; 1087 1088 for (i = 0; i < hash->size; i++) { 1089 head = &hash->table[i]; 1090 1091 rcu_read_lock(); 1092 hlist_for_each_entry_rcu(backbone_gw, head, hash_entry) { 1093 /* own orig still holds the old value. */ 1094 if (!batadv_compare_eth(backbone_gw->orig, 1095 oldif->net_dev->dev_addr)) 1096 continue; 1097 1098 memcpy(backbone_gw->orig, 1099 primary_if->net_dev->dev_addr, ETH_ALEN); 1100 /* send an announce frame so others will ask for our 1101 * claims and update their tables. 1102 */ 1103 batadv_bla_send_announce(bat_priv, backbone_gw); 1104 } 1105 rcu_read_unlock(); 1106 } 1107 } 1108 1109 /* periodic work to do: 1110 * * purge structures when they are too old 1111 * * send announcements 1112 */ 1113 static void batadv_bla_periodic_work(struct work_struct *work) 1114 { 1115 struct delayed_work *delayed_work; 1116 struct batadv_priv *bat_priv; 1117 struct batadv_priv_bla *priv_bla; 1118 struct hlist_head *head; 1119 struct batadv_bla_backbone_gw *backbone_gw; 1120 struct batadv_hashtable *hash; 1121 struct batadv_hard_iface *primary_if; 1122 int i; 1123 1124 delayed_work = container_of(work, struct delayed_work, work); 1125 priv_bla = container_of(delayed_work, struct batadv_priv_bla, work); 1126 bat_priv = container_of(priv_bla, struct batadv_priv, bla); 1127 primary_if = batadv_primary_if_get_selected(bat_priv); 1128 if (!primary_if) 1129 goto out; 1130 1131 batadv_bla_purge_claims(bat_priv, primary_if, 0); 1132 batadv_bla_purge_backbone_gw(bat_priv, 0); 1133 1134 if (!atomic_read(&bat_priv->bridge_loop_avoidance)) 1135 goto out; 1136 1137 hash = bat_priv->bla.backbone_hash; 1138 if (!hash) 1139 goto out; 1140 1141 for (i = 0; i < hash->size; i++) { 1142 head = &hash->table[i]; 1143 1144 rcu_read_lock(); 1145 hlist_for_each_entry_rcu(backbone_gw, head, hash_entry) { 1146 if (!batadv_compare_eth(backbone_gw->orig, 1147 primary_if->net_dev->dev_addr)) 1148 continue; 1149 1150 backbone_gw->lasttime = jiffies; 1151 1152 batadv_bla_send_announce(bat_priv, backbone_gw); 1153 1154 /* request_sent is only set after creation to avoid 1155 * problems when we are not yet known as backbone gw 1156 * in the backbone. 1157 * 1158 * We can reset this now after we waited some periods 1159 * to give bridge forward delays and bla group forming 1160 * some grace time. 1161 */ 1162 1163 if (atomic_read(&backbone_gw->request_sent) == 0) 1164 continue; 1165 1166 if (!atomic_dec_and_test(&backbone_gw->wait_periods)) 1167 continue; 1168 1169 atomic_dec(&backbone_gw->bat_priv->bla.num_requests); 1170 atomic_set(&backbone_gw->request_sent, 0); 1171 } 1172 rcu_read_unlock(); 1173 } 1174 out: 1175 if (primary_if) 1176 batadv_hardif_free_ref(primary_if); 1177 1178 queue_delayed_work(batadv_event_workqueue, &bat_priv->bla.work, 1179 msecs_to_jiffies(BATADV_BLA_PERIOD_LENGTH)); 1180 } 1181 1182 /* The hash for claim and backbone hash receive the same key because they 1183 * are getting initialized by hash_new with the same key. Reinitializing 1184 * them with to different keys to allow nested locking without generating 1185 * lockdep warnings 1186 */ 1187 static struct lock_class_key batadv_claim_hash_lock_class_key; 1188 static struct lock_class_key batadv_backbone_hash_lock_class_key; 1189 1190 /* initialize all bla structures */ 1191 int batadv_bla_init(struct batadv_priv *bat_priv) 1192 { 1193 int i; 1194 uint8_t claim_dest[ETH_ALEN] = {0xff, 0x43, 0x05, 0x00, 0x00, 0x00}; 1195 struct batadv_hard_iface *primary_if; 1196 uint16_t crc; 1197 unsigned long entrytime; 1198 1199 spin_lock_init(&bat_priv->bla.bcast_duplist_lock); 1200 1201 batadv_dbg(BATADV_DBG_BLA, bat_priv, "bla hash registering\n"); 1202 1203 /* setting claim destination address */ 1204 memcpy(&bat_priv->bla.claim_dest.magic, claim_dest, 3); 1205 bat_priv->bla.claim_dest.type = 0; 1206 primary_if = batadv_primary_if_get_selected(bat_priv); 1207 if (primary_if) { 1208 crc = crc16(0, primary_if->net_dev->dev_addr, ETH_ALEN); 1209 bat_priv->bla.claim_dest.group = htons(crc); 1210 batadv_hardif_free_ref(primary_if); 1211 } else { 1212 bat_priv->bla.claim_dest.group = 0; /* will be set later */ 1213 } 1214 1215 /* initialize the duplicate list */ 1216 entrytime = jiffies - msecs_to_jiffies(BATADV_DUPLIST_TIMEOUT); 1217 for (i = 0; i < BATADV_DUPLIST_SIZE; i++) 1218 bat_priv->bla.bcast_duplist[i].entrytime = entrytime; 1219 bat_priv->bla.bcast_duplist_curr = 0; 1220 1221 if (bat_priv->bla.claim_hash) 1222 return 0; 1223 1224 bat_priv->bla.claim_hash = batadv_hash_new(128); 1225 bat_priv->bla.backbone_hash = batadv_hash_new(32); 1226 1227 if (!bat_priv->bla.claim_hash || !bat_priv->bla.backbone_hash) 1228 return -ENOMEM; 1229 1230 batadv_hash_set_lock_class(bat_priv->bla.claim_hash, 1231 &batadv_claim_hash_lock_class_key); 1232 batadv_hash_set_lock_class(bat_priv->bla.backbone_hash, 1233 &batadv_backbone_hash_lock_class_key); 1234 1235 batadv_dbg(BATADV_DBG_BLA, bat_priv, "bla hashes initialized\n"); 1236 1237 INIT_DELAYED_WORK(&bat_priv->bla.work, batadv_bla_periodic_work); 1238 1239 queue_delayed_work(batadv_event_workqueue, &bat_priv->bla.work, 1240 msecs_to_jiffies(BATADV_BLA_PERIOD_LENGTH)); 1241 return 0; 1242 } 1243 1244 /** 1245 * batadv_bla_check_bcast_duplist 1246 * @bat_priv: the bat priv with all the soft interface information 1247 * @skb: contains the bcast_packet to be checked 1248 * 1249 * check if it is on our broadcast list. Another gateway might 1250 * have sent the same packet because it is connected to the same backbone, 1251 * so we have to remove this duplicate. 1252 * 1253 * This is performed by checking the CRC, which will tell us 1254 * with a good chance that it is the same packet. If it is furthermore 1255 * sent by another host, drop it. We allow equal packets from 1256 * the same host however as this might be intended. 1257 */ 1258 int batadv_bla_check_bcast_duplist(struct batadv_priv *bat_priv, 1259 struct sk_buff *skb) 1260 { 1261 int i, curr, ret = 0; 1262 __be32 crc; 1263 struct batadv_bcast_packet *bcast_packet; 1264 struct batadv_bcast_duplist_entry *entry; 1265 1266 bcast_packet = (struct batadv_bcast_packet *)skb->data; 1267 1268 /* calculate the crc ... */ 1269 crc = batadv_skb_crc32(skb, (u8 *)(bcast_packet + 1)); 1270 1271 spin_lock_bh(&bat_priv->bla.bcast_duplist_lock); 1272 1273 for (i = 0; i < BATADV_DUPLIST_SIZE; i++) { 1274 curr = (bat_priv->bla.bcast_duplist_curr + i); 1275 curr %= BATADV_DUPLIST_SIZE; 1276 entry = &bat_priv->bla.bcast_duplist[curr]; 1277 1278 /* we can stop searching if the entry is too old ; 1279 * later entries will be even older 1280 */ 1281 if (batadv_has_timed_out(entry->entrytime, 1282 BATADV_DUPLIST_TIMEOUT)) 1283 break; 1284 1285 if (entry->crc != crc) 1286 continue; 1287 1288 if (batadv_compare_eth(entry->orig, bcast_packet->orig)) 1289 continue; 1290 1291 /* this entry seems to match: same crc, not too old, 1292 * and from another gw. therefore return 1 to forbid it. 1293 */ 1294 ret = 1; 1295 goto out; 1296 } 1297 /* not found, add a new entry (overwrite the oldest entry) 1298 * and allow it, its the first occurence. 1299 */ 1300 curr = (bat_priv->bla.bcast_duplist_curr + BATADV_DUPLIST_SIZE - 1); 1301 curr %= BATADV_DUPLIST_SIZE; 1302 entry = &bat_priv->bla.bcast_duplist[curr]; 1303 entry->crc = crc; 1304 entry->entrytime = jiffies; 1305 memcpy(entry->orig, bcast_packet->orig, ETH_ALEN); 1306 bat_priv->bla.bcast_duplist_curr = curr; 1307 1308 out: 1309 spin_unlock_bh(&bat_priv->bla.bcast_duplist_lock); 1310 1311 return ret; 1312 } 1313 1314 1315 1316 /* @bat_priv: the bat priv with all the soft interface information 1317 * @orig: originator mac address 1318 * @vid: VLAN identifier 1319 * 1320 * Check if the originator is a gateway for the VLAN identified by vid. 1321 * 1322 * Returns true if orig is a backbone for this vid, false otherwise. 1323 */ 1324 bool batadv_bla_is_backbone_gw_orig(struct batadv_priv *bat_priv, uint8_t *orig, 1325 unsigned short vid) 1326 { 1327 struct batadv_hashtable *hash = bat_priv->bla.backbone_hash; 1328 struct hlist_head *head; 1329 struct batadv_bla_backbone_gw *backbone_gw; 1330 int i; 1331 1332 if (!atomic_read(&bat_priv->bridge_loop_avoidance)) 1333 return false; 1334 1335 if (!hash) 1336 return false; 1337 1338 for (i = 0; i < hash->size; i++) { 1339 head = &hash->table[i]; 1340 1341 rcu_read_lock(); 1342 hlist_for_each_entry_rcu(backbone_gw, head, hash_entry) { 1343 if (batadv_compare_eth(backbone_gw->orig, orig) && 1344 backbone_gw->vid == vid) { 1345 rcu_read_unlock(); 1346 return true; 1347 } 1348 } 1349 rcu_read_unlock(); 1350 } 1351 1352 return false; 1353 } 1354 1355 1356 /** 1357 * batadv_bla_is_backbone_gw 1358 * @skb: the frame to be checked 1359 * @orig_node: the orig_node of the frame 1360 * @hdr_size: maximum length of the frame 1361 * 1362 * bla_is_backbone_gw inspects the skb for the VLAN ID and returns 1 1363 * if the orig_node is also a gateway on the soft interface, otherwise it 1364 * returns 0. 1365 */ 1366 int batadv_bla_is_backbone_gw(struct sk_buff *skb, 1367 struct batadv_orig_node *orig_node, int hdr_size) 1368 { 1369 struct batadv_bla_backbone_gw *backbone_gw; 1370 unsigned short vid; 1371 1372 if (!atomic_read(&orig_node->bat_priv->bridge_loop_avoidance)) 1373 return 0; 1374 1375 /* first, find out the vid. */ 1376 if (!pskb_may_pull(skb, hdr_size + ETH_HLEN)) 1377 return 0; 1378 1379 vid = batadv_get_vid(skb, hdr_size); 1380 1381 /* see if this originator is a backbone gw for this VLAN */ 1382 backbone_gw = batadv_backbone_hash_find(orig_node->bat_priv, 1383 orig_node->orig, vid); 1384 if (!backbone_gw) 1385 return 0; 1386 1387 batadv_backbone_gw_free_ref(backbone_gw); 1388 return 1; 1389 } 1390 1391 /* free all bla structures (for softinterface free or module unload) */ 1392 void batadv_bla_free(struct batadv_priv *bat_priv) 1393 { 1394 struct batadv_hard_iface *primary_if; 1395 1396 cancel_delayed_work_sync(&bat_priv->bla.work); 1397 primary_if = batadv_primary_if_get_selected(bat_priv); 1398 1399 if (bat_priv->bla.claim_hash) { 1400 batadv_bla_purge_claims(bat_priv, primary_if, 1); 1401 batadv_hash_destroy(bat_priv->bla.claim_hash); 1402 bat_priv->bla.claim_hash = NULL; 1403 } 1404 if (bat_priv->bla.backbone_hash) { 1405 batadv_bla_purge_backbone_gw(bat_priv, 1); 1406 batadv_hash_destroy(bat_priv->bla.backbone_hash); 1407 bat_priv->bla.backbone_hash = NULL; 1408 } 1409 if (primary_if) 1410 batadv_hardif_free_ref(primary_if); 1411 } 1412 1413 /** 1414 * batadv_bla_rx 1415 * @bat_priv: the bat priv with all the soft interface information 1416 * @skb: the frame to be checked 1417 * @vid: the VLAN ID of the frame 1418 * @is_bcast: the packet came in a broadcast packet type. 1419 * 1420 * bla_rx avoidance checks if: 1421 * * we have to race for a claim 1422 * * if the frame is allowed on the LAN 1423 * 1424 * in these cases, the skb is further handled by this function and 1425 * returns 1, otherwise it returns 0 and the caller shall further 1426 * process the skb. 1427 */ 1428 int batadv_bla_rx(struct batadv_priv *bat_priv, struct sk_buff *skb, 1429 unsigned short vid, bool is_bcast) 1430 { 1431 struct ethhdr *ethhdr; 1432 struct batadv_bla_claim search_claim, *claim = NULL; 1433 struct batadv_hard_iface *primary_if; 1434 int ret; 1435 1436 ethhdr = eth_hdr(skb); 1437 1438 primary_if = batadv_primary_if_get_selected(bat_priv); 1439 if (!primary_if) 1440 goto handled; 1441 1442 if (!atomic_read(&bat_priv->bridge_loop_avoidance)) 1443 goto allow; 1444 1445 1446 if (unlikely(atomic_read(&bat_priv->bla.num_requests))) 1447 /* don't allow broadcasts while requests are in flight */ 1448 if (is_multicast_ether_addr(ethhdr->h_dest) && is_bcast) 1449 goto handled; 1450 1451 memcpy(search_claim.addr, ethhdr->h_source, ETH_ALEN); 1452 search_claim.vid = vid; 1453 claim = batadv_claim_hash_find(bat_priv, &search_claim); 1454 1455 if (!claim) { 1456 /* possible optimization: race for a claim */ 1457 /* No claim exists yet, claim it for us! 1458 */ 1459 batadv_handle_claim(bat_priv, primary_if, 1460 primary_if->net_dev->dev_addr, 1461 ethhdr->h_source, vid); 1462 goto allow; 1463 } 1464 1465 /* if it is our own claim ... */ 1466 if (batadv_compare_eth(claim->backbone_gw->orig, 1467 primary_if->net_dev->dev_addr)) { 1468 /* ... allow it in any case */ 1469 claim->lasttime = jiffies; 1470 goto allow; 1471 } 1472 1473 /* if it is a broadcast ... */ 1474 if (is_multicast_ether_addr(ethhdr->h_dest) && is_bcast) { 1475 /* ... drop it. the responsible gateway is in charge. 1476 * 1477 * We need to check is_bcast because with the gateway 1478 * feature, broadcasts (like DHCP requests) may be sent 1479 * using a unicast packet type. 1480 */ 1481 goto handled; 1482 } else { 1483 /* seems the client considers us as its best gateway. 1484 * send a claim and update the claim table 1485 * immediately. 1486 */ 1487 batadv_handle_claim(bat_priv, primary_if, 1488 primary_if->net_dev->dev_addr, 1489 ethhdr->h_source, vid); 1490 goto allow; 1491 } 1492 allow: 1493 batadv_bla_update_own_backbone_gw(bat_priv, primary_if, vid); 1494 ret = 0; 1495 goto out; 1496 1497 handled: 1498 kfree_skb(skb); 1499 ret = 1; 1500 1501 out: 1502 if (primary_if) 1503 batadv_hardif_free_ref(primary_if); 1504 if (claim) 1505 batadv_claim_free_ref(claim); 1506 return ret; 1507 } 1508 1509 /** 1510 * batadv_bla_tx 1511 * @bat_priv: the bat priv with all the soft interface information 1512 * @skb: the frame to be checked 1513 * @vid: the VLAN ID of the frame 1514 * 1515 * bla_tx checks if: 1516 * * a claim was received which has to be processed 1517 * * the frame is allowed on the mesh 1518 * 1519 * in these cases, the skb is further handled by this function and 1520 * returns 1, otherwise it returns 0 and the caller shall further 1521 * process the skb. 1522 * 1523 * This call might reallocate skb data. 1524 */ 1525 int batadv_bla_tx(struct batadv_priv *bat_priv, struct sk_buff *skb, 1526 unsigned short vid) 1527 { 1528 struct ethhdr *ethhdr; 1529 struct batadv_bla_claim search_claim, *claim = NULL; 1530 struct batadv_hard_iface *primary_if; 1531 int ret = 0; 1532 1533 primary_if = batadv_primary_if_get_selected(bat_priv); 1534 if (!primary_if) 1535 goto out; 1536 1537 if (!atomic_read(&bat_priv->bridge_loop_avoidance)) 1538 goto allow; 1539 1540 /* in VLAN case, the mac header might not be set. */ 1541 skb_reset_mac_header(skb); 1542 1543 if (batadv_bla_process_claim(bat_priv, primary_if, skb)) 1544 goto handled; 1545 1546 ethhdr = eth_hdr(skb); 1547 1548 if (unlikely(atomic_read(&bat_priv->bla.num_requests))) 1549 /* don't allow broadcasts while requests are in flight */ 1550 if (is_multicast_ether_addr(ethhdr->h_dest)) 1551 goto handled; 1552 1553 memcpy(search_claim.addr, ethhdr->h_source, ETH_ALEN); 1554 search_claim.vid = vid; 1555 1556 claim = batadv_claim_hash_find(bat_priv, &search_claim); 1557 1558 /* if no claim exists, allow it. */ 1559 if (!claim) 1560 goto allow; 1561 1562 /* check if we are responsible. */ 1563 if (batadv_compare_eth(claim->backbone_gw->orig, 1564 primary_if->net_dev->dev_addr)) { 1565 /* if yes, the client has roamed and we have 1566 * to unclaim it. 1567 */ 1568 batadv_handle_unclaim(bat_priv, primary_if, 1569 primary_if->net_dev->dev_addr, 1570 ethhdr->h_source, vid); 1571 goto allow; 1572 } 1573 1574 /* check if it is a multicast/broadcast frame */ 1575 if (is_multicast_ether_addr(ethhdr->h_dest)) { 1576 /* drop it. the responsible gateway has forwarded it into 1577 * the backbone network. 1578 */ 1579 goto handled; 1580 } else { 1581 /* we must allow it. at least if we are 1582 * responsible for the DESTINATION. 1583 */ 1584 goto allow; 1585 } 1586 allow: 1587 batadv_bla_update_own_backbone_gw(bat_priv, primary_if, vid); 1588 ret = 0; 1589 goto out; 1590 handled: 1591 ret = 1; 1592 out: 1593 if (primary_if) 1594 batadv_hardif_free_ref(primary_if); 1595 if (claim) 1596 batadv_claim_free_ref(claim); 1597 return ret; 1598 } 1599 1600 int batadv_bla_claim_table_seq_print_text(struct seq_file *seq, void *offset) 1601 { 1602 struct net_device *net_dev = (struct net_device *)seq->private; 1603 struct batadv_priv *bat_priv = netdev_priv(net_dev); 1604 struct batadv_hashtable *hash = bat_priv->bla.claim_hash; 1605 struct batadv_bla_claim *claim; 1606 struct batadv_hard_iface *primary_if; 1607 struct hlist_head *head; 1608 uint32_t i; 1609 bool is_own; 1610 uint8_t *primary_addr; 1611 1612 primary_if = batadv_seq_print_text_primary_if_get(seq); 1613 if (!primary_if) 1614 goto out; 1615 1616 primary_addr = primary_if->net_dev->dev_addr; 1617 seq_printf(seq, 1618 "Claims announced for the mesh %s (orig %pM, group id %#.4x)\n", 1619 net_dev->name, primary_addr, 1620 ntohs(bat_priv->bla.claim_dest.group)); 1621 seq_printf(seq, " %-17s %-5s %-17s [o] (%-6s)\n", 1622 "Client", "VID", "Originator", "CRC"); 1623 for (i = 0; i < hash->size; i++) { 1624 head = &hash->table[i]; 1625 1626 rcu_read_lock(); 1627 hlist_for_each_entry_rcu(claim, head, hash_entry) { 1628 is_own = batadv_compare_eth(claim->backbone_gw->orig, 1629 primary_addr); 1630 seq_printf(seq, " * %pM on %5d by %pM [%c] (%#.4x)\n", 1631 claim->addr, BATADV_PRINT_VID(claim->vid), 1632 claim->backbone_gw->orig, 1633 (is_own ? 'x' : ' '), 1634 claim->backbone_gw->crc); 1635 } 1636 rcu_read_unlock(); 1637 } 1638 out: 1639 if (primary_if) 1640 batadv_hardif_free_ref(primary_if); 1641 return 0; 1642 } 1643 1644 int batadv_bla_backbone_table_seq_print_text(struct seq_file *seq, void *offset) 1645 { 1646 struct net_device *net_dev = (struct net_device *)seq->private; 1647 struct batadv_priv *bat_priv = netdev_priv(net_dev); 1648 struct batadv_hashtable *hash = bat_priv->bla.backbone_hash; 1649 struct batadv_bla_backbone_gw *backbone_gw; 1650 struct batadv_hard_iface *primary_if; 1651 struct hlist_head *head; 1652 int secs, msecs; 1653 uint32_t i; 1654 bool is_own; 1655 uint8_t *primary_addr; 1656 1657 primary_if = batadv_seq_print_text_primary_if_get(seq); 1658 if (!primary_if) 1659 goto out; 1660 1661 primary_addr = primary_if->net_dev->dev_addr; 1662 seq_printf(seq, 1663 "Backbones announced for the mesh %s (orig %pM, group id %#.4x)\n", 1664 net_dev->name, primary_addr, 1665 ntohs(bat_priv->bla.claim_dest.group)); 1666 seq_printf(seq, " %-17s %-5s %-9s (%-6s)\n", 1667 "Originator", "VID", "last seen", "CRC"); 1668 for (i = 0; i < hash->size; i++) { 1669 head = &hash->table[i]; 1670 1671 rcu_read_lock(); 1672 hlist_for_each_entry_rcu(backbone_gw, head, hash_entry) { 1673 msecs = jiffies_to_msecs(jiffies - 1674 backbone_gw->lasttime); 1675 secs = msecs / 1000; 1676 msecs = msecs % 1000; 1677 1678 is_own = batadv_compare_eth(backbone_gw->orig, 1679 primary_addr); 1680 if (is_own) 1681 continue; 1682 1683 seq_printf(seq, " * %pM on %5d %4i.%03is (%#.4x)\n", 1684 backbone_gw->orig, 1685 BATADV_PRINT_VID(backbone_gw->vid), secs, 1686 msecs, backbone_gw->crc); 1687 } 1688 rcu_read_unlock(); 1689 } 1690 out: 1691 if (primary_if) 1692 batadv_hardif_free_ref(primary_if); 1693 return 0; 1694 } 1695