diff options
| author | Linus Torvalds <torvalds@linux-foundation.org> | 2013-05-01 14:08:52 -0700 | 
|---|---|---|
| committer | Linus Torvalds <torvalds@linux-foundation.org> | 2013-05-01 14:08:52 -0700 | 
| commit | 73287a43cc79ca06629a88d1a199cd283f42456a (patch) | |
| tree | acf4456e260115bea77ee31a29f10ce17f0db45c /net/batman-adv/routing.c | |
| parent | 251df49db3327c64bf917bfdba94491fde2b4ee0 (diff) | |
| parent | 20074f357da4a637430aec2879c9d864c5d2c23c (diff) | |
| download | olio-linux-3.10-73287a43cc79ca06629a88d1a199cd283f42456a.tar.xz olio-linux-3.10-73287a43cc79ca06629a88d1a199cd283f42456a.zip  | |
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next
Pull networking updates from David Miller:
 "Highlights (1721 non-merge commits, this has to be a record of some
  sort):
   1) Add 'random' mode to team driver, from Jiri Pirko and Eric
      Dumazet.
   2) Make it so that any driver that supports configuration of multiple
      MAC addresses can provide the forwarding database add and del
      calls by providing a default implementation and hooking that up if
      the driver doesn't have an explicit set of handlers.  From Vlad
      Yasevich.
   3) Support GSO segmentation over tunnels and other encapsulating
      devices such as VXLAN, from Pravin B Shelar.
   4) Support L2 GRE tunnels in the flow dissector, from Michael Dalton.
   5) Implement Tail Loss Probe (TLP) detection in TCP, from Nandita
      Dukkipati.
   6) In the PHY layer, allow supporting wake-on-lan in situations where
      the PHY registers have to be written for it to be configured.
      Use it to support wake-on-lan in mv643xx_eth.
      From Michael Stapelberg.
   7) Significantly improve firewire IPV6 support, from YOSHIFUJI
      Hideaki.
   8) Allow multiple packets to be sent in a single transmission using
      network coding in batman-adv, from Martin Hundebøll.
   9) Add support for T5 cxgb4 chips, from Santosh Rastapur.
  10) Generalize the VXLAN forwarding tables so that there is more
      flexibility in configurating various aspects of the endpoints.
      From David Stevens.
  11) Support RSS and TSO in hardware over GRE tunnels in bxn2x driver,
      from Dmitry Kravkov.
  12) Zero copy support in nfnelink_queue, from Eric Dumazet and Pablo
      Neira Ayuso.
  13) Start adding networking selftests.
  14) In situations of overload on the same AF_PACKET fanout socket, or
      per-cpu packet receive queue, minimize drop by distributing the
      load to other cpus/fanouts.  From Willem de Bruijn and Eric
      Dumazet.
  15) Add support for new payload offset BPF instruction, from Daniel
      Borkmann.
  16) Convert several drivers over to mdoule_platform_driver(), from
      Sachin Kamat.
  17) Provide a minimal BPF JIT image disassembler userspace tool, from
      Daniel Borkmann.
  18) Rewrite F-RTO implementation in TCP to match the final
      specification of it in RFC4138 and RFC5682.  From Yuchung Cheng.
  19) Provide netlink socket diag of netlink sockets ("Yo dawg, I hear
      you like netlink, so I implemented netlink dumping of netlink
      sockets.") From Andrey Vagin.
  20) Remove ugly passing of rtnetlink attributes into rtnl_doit
      functions, from Thomas Graf.
  21) Allow userspace to be able to see if a configuration change occurs
      in the middle of an address or device list dump, from Nicolas
      Dichtel.
  22) Support RFC3168 ECN protection for ipv6 fragments, from Hannes
      Frederic Sowa.
  23) Increase accuracy of packet length used by packet scheduler, from
      Jason Wang.
  24) Beginning set of changes to make ipv4/ipv6 fragment handling more
      scalable and less susceptible to overload and locking contention,
      from Jesper Dangaard Brouer.
  25) Get rid of using non-type-safe NLMSG_* macros and use nlmsg_*()
      instead.  From Hong Zhiguo.
  26) Optimize route usage in IPVS by avoiding reference counting where
      possible, from Julian Anastasov.
  27) Convert IPVS schedulers to RCU, also from Julian Anastasov.
  28) Support cpu fanouts in xt_NFQUEUE netfilter target, from Holger
      Eitzenberger.
  29) Network namespace support for nf_log, ebt_log, xt_LOG, ipt_ULOG,
      nfnetlink_log, and nfnetlink_queue.  From Gao feng.
  30) Implement RFC3168 ECN protection, from Hannes Frederic Sowa.
  31) Support several new r8169 chips, from Hayes Wang.
  32) Support tokenized interface identifiers in ipv6, from Daniel
      Borkmann.
  33) Use usbnet_link_change() helper in USB net driver, from Ming Lei.
  34) Add 802.1ad vlan offload support, from Patrick McHardy.
  35) Support mmap() based netlink communication, also from Patrick
      McHardy.
  36) Support HW timestamping in mlx4 driver, from Amir Vadai.
  37) Rationalize AF_PACKET packet timestamping when transmitting, from
      Willem de Bruijn and Daniel Borkmann.
  38) Bring parity to what's provided by /proc/net/packet socket dumping
      and the info provided by netlink socket dumping of AF_PACKET
      sockets.  From Nicolas Dichtel.
  39) Fix peeking beyond zero sized SKBs in AF_UNIX, from Benjamin
      Poirier"
* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next: (1722 commits)
  filter: fix va_list build error
  af_unix: fix a fatal race with bit fields
  bnx2x: Prevent memory leak when cnic is absent
  bnx2x: correct reading of speed capabilities
  net: sctp: attribute printl with __printf for gcc fmt checks
  netlink: kconfig: move mmap i/o into netlink kconfig
  netpoll: convert mutex into a semaphore
  netlink: Fix skb ref counting.
  net_sched: act_ipt forward compat with xtables
  mlx4_en: fix a build error on 32bit arches
  Revert "bnx2x: allow nvram test to run when device is down"
  bridge: avoid OOPS if root port not found
  drivers: net: cpsw: fix kernel warn on cpsw irq enable
  sh_eth: use random MAC address if no valid one supplied
  3c509.c: call SET_NETDEV_DEV for all device types (ISA/ISAPnP/EISA)
  tg3: fix to append hardware time stamping flags
  unix/stream: fix peeking with an offset larger than data in queue
  unix/dgram: fix peeking with an offset larger than data in queue
  unix/dgram: peek beyond 0-sized skbs
  openvswitch: Remove unneeded ovs_netdev_get_ifindex()
  ...
Diffstat (limited to 'net/batman-adv/routing.c')
| -rw-r--r-- | net/batman-adv/routing.c | 61 | 
1 files changed, 42 insertions, 19 deletions
diff --git a/net/batman-adv/routing.c b/net/batman-adv/routing.c index 319f2906c71..b27a4d792d1 100644 --- a/net/batman-adv/routing.c +++ b/net/batman-adv/routing.c @@ -29,6 +29,7 @@  #include "unicast.h"  #include "bridge_loop_avoidance.h"  #include "distributed-arp-table.h" +#include "network-coding.h"  static int batadv_route_unicast_packet(struct sk_buff *skb,  				       struct batadv_hard_iface *recv_if); @@ -548,6 +549,17 @@ batadv_find_ifalter_router(struct batadv_orig_node *primary_orig,  	return router;  } +/** + * batadv_check_unicast_packet - Check for malformed unicast packets + * @bat_priv: the bat priv with all the soft interface information + * @skb: packet to check + * @hdr_size: size of header to pull + * + * Check for short header and bad addresses in given packet. Returns negative + * value when check fails and 0 otherwise. The negative value depends on the + * reason: -ENODATA for bad header, -EBADR for broadcast destination or source, + * and -EREMOTE for non-local (other host) destination. + */  static int batadv_check_unicast_packet(struct batadv_priv *bat_priv,  				       struct sk_buff *skb, int hdr_size)  { @@ -555,21 +567,21 @@ static int batadv_check_unicast_packet(struct batadv_priv *bat_priv,  	/* drop packet if it has not necessary minimum size */  	if (unlikely(!pskb_may_pull(skb, hdr_size))) -		return -1; +		return -ENODATA;  	ethhdr = (struct ethhdr *)skb_mac_header(skb);  	/* packet with unicast indication but broadcast recipient */  	if (is_broadcast_ether_addr(ethhdr->h_dest)) -		return -1; +		return -EBADR;  	/* packet with broadcast sender address */  	if (is_broadcast_ether_addr(ethhdr->h_source)) -		return -1; +		return -EBADR;  	/* not for me */  	if (!batadv_is_my_mac(bat_priv, ethhdr->h_dest)) -		return -1; +		return -EREMOTE;  	return 0;  } @@ -852,15 +864,18 @@ static int batadv_route_unicast_packet(struct sk_buff *skb,  	/* decrement ttl */  	unicast_packet->header.ttl--; -	/* Update stats counter */ -	batadv_inc_counter(bat_priv, BATADV_CNT_FORWARD); -	batadv_add_counter(bat_priv, BATADV_CNT_FORWARD_BYTES, -			   skb->len + ETH_HLEN); - -	/* route it */ -	if (batadv_send_skb_to_orig(skb, orig_node, recv_if)) +	/* network code packet if possible */ +	if (batadv_nc_skb_forward(skb, neigh_node, ethhdr)) { +		ret = NET_RX_SUCCESS; +	} else if (batadv_send_skb_to_orig(skb, orig_node, recv_if)) {  		ret = NET_RX_SUCCESS; +		/* Update stats counter */ +		batadv_inc_counter(bat_priv, BATADV_CNT_FORWARD); +		batadv_add_counter(bat_priv, BATADV_CNT_FORWARD_BYTES, +				   skb->len + ETH_HLEN); +	} +  out:  	if (neigh_node)  		batadv_neigh_node_free_ref(neigh_node); @@ -924,7 +939,7 @@ out:  }  static int batadv_check_unicast_ttvn(struct batadv_priv *bat_priv, -				     struct sk_buff *skb) { +				     struct sk_buff *skb, int hdr_len) {  	uint8_t curr_ttvn, old_ttvn;  	struct batadv_orig_node *orig_node;  	struct ethhdr *ethhdr; @@ -933,7 +948,7 @@ static int batadv_check_unicast_ttvn(struct batadv_priv *bat_priv,  	int is_old_ttvn;  	/* check if there is enough data before accessing it */ -	if (pskb_may_pull(skb, sizeof(*unicast_packet) + ETH_HLEN) < 0) +	if (pskb_may_pull(skb, hdr_len + ETH_HLEN) < 0)  		return 0;  	/* create a copy of the skb (in case of for re-routing) to modify it. */ @@ -941,7 +956,7 @@ static int batadv_check_unicast_ttvn(struct batadv_priv *bat_priv,  		return 0;  	unicast_packet = (struct batadv_unicast_packet *)skb->data; -	ethhdr = (struct ethhdr *)(skb->data + sizeof(*unicast_packet)); +	ethhdr = (struct ethhdr *)(skb->data + hdr_len);  	/* check if the destination client was served by this node and it is now  	 * roaming. In this case, it means that the node has got a ROAM_ADV @@ -1035,7 +1050,7 @@ int batadv_recv_unicast_packet(struct sk_buff *skb,  	struct batadv_unicast_4addr_packet *unicast_4addr_packet;  	uint8_t *orig_addr;  	struct batadv_orig_node *orig_node = NULL; -	int hdr_size = sizeof(*unicast_packet); +	int check, hdr_size = sizeof(*unicast_packet);  	bool is4addr;  	unicast_packet = (struct batadv_unicast_packet *)skb->data; @@ -1046,10 +1061,18 @@ int batadv_recv_unicast_packet(struct sk_buff *skb,  	if (is4addr)  		hdr_size = sizeof(*unicast_4addr_packet); -	if (batadv_check_unicast_packet(bat_priv, skb, hdr_size) < 0) -		return NET_RX_DROP; +	/* function returns -EREMOTE for promiscuous packets */ +	check = batadv_check_unicast_packet(bat_priv, skb, hdr_size); + +	/* Even though the packet is not for us, we might save it to use for +	 * decoding a later received coded packet +	 */ +	if (check == -EREMOTE) +		batadv_nc_skb_store_sniffed_unicast(bat_priv, skb); -	if (!batadv_check_unicast_ttvn(bat_priv, skb)) +	if (check < 0) +		return NET_RX_DROP; +	if (!batadv_check_unicast_ttvn(bat_priv, skb, hdr_size))  		return NET_RX_DROP;  	/* packet for me */ @@ -1093,7 +1116,7 @@ int batadv_recv_ucast_frag_packet(struct sk_buff *skb,  	if (batadv_check_unicast_packet(bat_priv, skb, hdr_size) < 0)  		return NET_RX_DROP; -	if (!batadv_check_unicast_ttvn(bat_priv, skb)) +	if (!batadv_check_unicast_ttvn(bat_priv, skb, hdr_size))  		return NET_RX_DROP;  	unicast_packet = (struct batadv_unicast_frag_packet *)skb->data;  |