routing.c 29.3 KB
Newer Older
1
/*
2
 * Copyright (C) 2007-2012 B.A.T.M.A.N. contributors:
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
 *
 * Marek Lindner, Simon Wunderlich
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of version 2 of the GNU General Public
 * License as published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
 * General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
 * 02110-1301, USA
 *
 */

#include "main.h"
#include "routing.h"
#include "send.h"
#include "soft-interface.h"
#include "hard-interface.h"
#include "icmp_socket.h"
#include "translation-table.h"
#include "originator.h"
#include "vis.h"
#include "unicast.h"

33
void slide_own_bcast_window(struct hard_iface *hard_iface)
34
{
35
	struct bat_priv *bat_priv = netdev_priv(hard_iface->soft_iface);
36
	struct hashtable_t *hash = bat_priv->orig_hash;
37
	struct hlist_node *node;
38 39 40
	struct hlist_head *head;
	struct orig_node *orig_node;
	unsigned long *word;
41
	uint32_t i;
42 43 44 45 46
	size_t word_index;

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

47
		rcu_read_lock();
48
		hlist_for_each_entry_rcu(orig_node, node, head, hash_entry) {
49
			spin_lock_bh(&orig_node->ogm_cnt_lock);
50
			word_index = hard_iface->if_num * NUM_WORDS;
51 52 53
			word = &(orig_node->bcast_own[word_index]);

			bit_get_packet(bat_priv, word, 1, 0);
54
			orig_node->bcast_own_sum[hard_iface->if_num] =
55
				bit_packet_count(word);
56
			spin_unlock_bh(&orig_node->ogm_cnt_lock);
57
		}
58
		rcu_read_unlock();
59 60 61
	}
}

62 63 64
static void _update_route(struct bat_priv *bat_priv,
			  struct orig_node *orig_node,
			  struct neigh_node *neigh_node)
65
{
66 67 68
	struct neigh_node *curr_router;

	curr_router = orig_node_get_router(orig_node);
69

70
	/* route deleted */
71
	if ((curr_router) && (!neigh_node)) {
72 73
		bat_dbg(DBG_ROUTES, bat_priv, "Deleting route towards: %pM\n",
			orig_node->orig);
74
		tt_global_del_orig(bat_priv, orig_node,
75
				   "Deleted route towards originator");
76

77 78
	/* route added */
	} else if ((!curr_router) && (neigh_node)) {
79 80 81 82

		bat_dbg(DBG_ROUTES, bat_priv,
			"Adding route towards: %pM (via %pM)\n",
			orig_node->orig, neigh_node->addr);
83
	/* route changed */
84
	} else if (neigh_node && curr_router) {
85
		bat_dbg(DBG_ROUTES, bat_priv,
86
			"Changing route towards: %pM (now via %pM - was via %pM)\n",
87
			orig_node->orig, neigh_node->addr,
88
			curr_router->addr);
89 90
	}

91 92 93 94
	if (curr_router)
		neigh_node_free_ref(curr_router);

	/* increase refcount of new best neighbor */
95 96
	if (neigh_node && !atomic_inc_not_zero(&neigh_node->refcount))
		neigh_node = NULL;
97 98 99 100 101 102 103 104

	spin_lock_bh(&orig_node->neigh_list_lock);
	rcu_assign_pointer(orig_node->router, neigh_node);
	spin_unlock_bh(&orig_node->neigh_list_lock);

	/* decrease refcount of previous best neighbor */
	if (curr_router)
		neigh_node_free_ref(curr_router);
105 106
}

107 108
void update_route(struct bat_priv *bat_priv, struct orig_node *orig_node,
		  struct neigh_node *neigh_node)
109
{
110
	struct neigh_node *router = NULL;
111 112

	if (!orig_node)
113 114 115
		goto out;

	router = orig_node_get_router(orig_node);
116

117
	if (router != neigh_node)
118
		_update_route(bat_priv, orig_node, neigh_node);
119 120 121 122

out:
	if (router)
		neigh_node_free_ref(router);
123 124
}

125 126 127 128 129 130 131 132 133 134
/* caller must hold the neigh_list_lock */
void bonding_candidate_del(struct orig_node *orig_node,
			   struct neigh_node *neigh_node)
{
	/* this neighbor is not part of our candidate list */
	if (list_empty(&neigh_node->bonding_list))
		goto out;

	list_del_rcu(&neigh_node->bonding_list);
	INIT_LIST_HEAD(&neigh_node->bonding_list);
135
	neigh_node_free_ref(neigh_node);
136 137 138 139 140 141
	atomic_dec(&orig_node->bond_candidates);

out:
	return;
}

142 143
void bonding_candidate_add(struct orig_node *orig_node,
			   struct neigh_node *neigh_node)
144 145
{
	struct hlist_node *node;
146 147
	struct neigh_node *tmp_neigh_node, *router = NULL;
	uint8_t interference_candidate = 0;
148 149 150 151

	spin_lock_bh(&orig_node->neigh_list_lock);

	/* only consider if it has the same primary address ...  */
152 153
	if (!compare_eth(orig_node->orig,
			 neigh_node->orig_node->primary_addr))
154 155
		goto candidate_del;

156 157
	router = orig_node_get_router(orig_node);
	if (!router)
158 159 160
		goto candidate_del;

	/* ... and is good enough to be considered */
161
	if (neigh_node->tq_avg < router->tq_avg - BONDING_TQ_THRESHOLD)
162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180
		goto candidate_del;

	/**
	 * check if we have another candidate with the same mac address or
	 * interface. If we do, we won't select this candidate because of
	 * possible interference.
	 */
	hlist_for_each_entry_rcu(tmp_neigh_node, node,
				 &orig_node->neigh_list, list) {

		if (tmp_neigh_node == neigh_node)
			continue;

		/* we only care if the other candidate is even
		* considered as candidate. */
		if (list_empty(&tmp_neigh_node->bonding_list))
			continue;

		if ((neigh_node->if_incoming == tmp_neigh_node->if_incoming) ||
181
		    (compare_eth(neigh_node->addr, tmp_neigh_node->addr))) {
182 183 184 185 186 187 188 189 190 191 192 193 194
			interference_candidate = 1;
			break;
		}
	}

	/* don't care further if it is an interference candidate */
	if (interference_candidate)
		goto candidate_del;

	/* this neighbor already is part of our candidate list */
	if (!list_empty(&neigh_node->bonding_list))
		goto out;

195 196 197
	if (!atomic_inc_not_zero(&neigh_node->refcount))
		goto out;

198 199 200 201 202 203 204 205 206
	list_add_rcu(&neigh_node->bonding_list, &orig_node->bond_list);
	atomic_inc(&orig_node->bond_candidates);
	goto out;

candidate_del:
	bonding_candidate_del(orig_node, neigh_node);

out:
	spin_unlock_bh(&orig_node->neigh_list_lock);
207 208 209

	if (router)
		neigh_node_free_ref(router);
210 211 212
}

/* copy primary address for bonding */
213 214 215
void bonding_save_primary(const struct orig_node *orig_node,
			  struct orig_node *orig_neigh_node,
			  const struct batman_ogm_packet *batman_ogm_packet)
216
{
217
	if (!(batman_ogm_packet->flags & PRIMARIES_FIRST_HOP))
218 219 220 221 222
		return;

	memcpy(orig_neigh_node->primary_addr, orig_node->orig, ETH_ALEN);
}

223 224 225 226 227
/* checks whether the host restarted and is in the protection time.
 * returns:
 *  0 if the packet is to be accepted
 *  1 if the packet is to be ignored.
 */
228 229
int window_protected(struct bat_priv *bat_priv, int32_t seq_num_diff,
		     unsigned long *last_reset)
230
{
231 232
	if ((seq_num_diff <= -TQ_LOCAL_WINDOW_SIZE) ||
	    (seq_num_diff >= EXPECTED_SEQNO_RANGE)) {
233
		if (has_timed_out(*last_reset, RESET_PROTECTION_MS)) {
234 235 236 237 238 239

			*last_reset = jiffies;
			bat_dbg(DBG_BATMAN, bat_priv,
				"old packet received, start protection\n");

			return 0;
240
		} else {
241
			return 1;
242
		}
243 244 245 246
	}
	return 0;
}

247
int recv_bat_ogm_packet(struct sk_buff *skb, struct hard_iface *hard_iface)
248
{
249
	struct bat_priv *bat_priv = netdev_priv(hard_iface->soft_iface);
250 251 252
	struct ethhdr *ethhdr;

	/* drop packet if it has not necessary minimum size */
253
	if (unlikely(!pskb_may_pull(skb, BATMAN_OGM_LEN)))
254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273
		return NET_RX_DROP;

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with broadcast indication but unicast recipient */
	if (!is_broadcast_ether_addr(ethhdr->h_dest))
		return NET_RX_DROP;

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
		return NET_RX_DROP;

	/* create a copy of the skb, if needed, to modify it. */
	if (skb_cow(skb, 0) < 0)
		return NET_RX_DROP;

	/* keep skb linear */
	if (skb_linearize(skb) < 0)
		return NET_RX_DROP;

274
	bat_priv->bat_algo_ops->bat_ogm_receive(hard_iface, skb);
275 276 277 278 279 280 281 282

	kfree_skb(skb);
	return NET_RX_SUCCESS;
}

static int recv_my_icmp_packet(struct bat_priv *bat_priv,
			       struct sk_buff *skb, size_t icmp_len)
{
283
	struct hard_iface *primary_if = NULL;
284
	struct orig_node *orig_node = NULL;
285
	struct neigh_node *router = NULL;
286
	struct icmp_packet_rr *icmp_packet;
287
	int ret = NET_RX_DROP;
288 289 290 291 292 293

	icmp_packet = (struct icmp_packet_rr *)skb->data;

	/* add data to device queue */
	if (icmp_packet->msg_type != ECHO_REQUEST) {
		bat_socket_receive_packet(icmp_packet, icmp_len);
294
		goto out;
295 296
	}

297 298
	primary_if = primary_if_get_selected(bat_priv);
	if (!primary_if)
299
		goto out;
300 301 302

	/* answer echo request (ping) */
	/* get routing information */
303
	orig_node = orig_hash_find(bat_priv, icmp_packet->orig);
304
	if (!orig_node)
305
		goto out;
306

307 308 309
	router = orig_node_get_router(orig_node);
	if (!router)
		goto out;
310

311 312 313 314 315 316 317
	/* create a copy of the skb, if needed, to modify it. */
	if (skb_cow(skb, sizeof(struct ethhdr)) < 0)
		goto out;

	icmp_packet = (struct icmp_packet_rr *)skb->data;

	memcpy(icmp_packet->dst, icmp_packet->orig, ETH_ALEN);
318
	memcpy(icmp_packet->orig, primary_if->net_dev->dev_addr, ETH_ALEN);
319
	icmp_packet->msg_type = ECHO_REPLY;
320
	icmp_packet->header.ttl = TTL;
321

322
	send_skb_packet(skb, router->if_incoming, router->addr);
323
	ret = NET_RX_SUCCESS;
324

325
out:
326 327
	if (primary_if)
		hardif_free_ref(primary_if);
328 329
	if (router)
		neigh_node_free_ref(router);
330
	if (orig_node)
331
		orig_node_free_ref(orig_node);
332 333 334 335
	return ret;
}

static int recv_icmp_ttl_exceeded(struct bat_priv *bat_priv,
336
				  struct sk_buff *skb)
337
{
338
	struct hard_iface *primary_if = NULL;
339
	struct orig_node *orig_node = NULL;
340
	struct neigh_node *router = NULL;
341
	struct icmp_packet *icmp_packet;
342
	int ret = NET_RX_DROP;
343 344 345 346 347

	icmp_packet = (struct icmp_packet *)skb->data;

	/* send TTL exceeded if packet is an echo request (traceroute) */
	if (icmp_packet->msg_type != ECHO_REQUEST) {
348 349
		pr_debug("Warning - can't forward icmp packet from %pM to %pM: ttl exceeded\n",
			 icmp_packet->orig, icmp_packet->dst);
350
		goto out;
351 352
	}

353 354
	primary_if = primary_if_get_selected(bat_priv);
	if (!primary_if)
355
		goto out;
356 357

	/* get routing information */
358
	orig_node = orig_hash_find(bat_priv, icmp_packet->orig);
359
	if (!orig_node)
360
		goto out;
361

362 363 364
	router = orig_node_get_router(orig_node);
	if (!router)
		goto out;
365

366 367 368
	/* create a copy of the skb, if needed, to modify it. */
	if (skb_cow(skb, sizeof(struct ethhdr)) < 0)
		goto out;
369

370
	icmp_packet = (struct icmp_packet *)skb->data;
371

372
	memcpy(icmp_packet->dst, icmp_packet->orig, ETH_ALEN);
373
	memcpy(icmp_packet->orig, primary_if->net_dev->dev_addr, ETH_ALEN);
374
	icmp_packet->msg_type = TTL_EXCEEDED;
375
	icmp_packet->header.ttl = TTL;
376

377
	send_skb_packet(skb, router->if_incoming, router->addr);
378
	ret = NET_RX_SUCCESS;
379

380
out:
381 382
	if (primary_if)
		hardif_free_ref(primary_if);
383 384
	if (router)
		neigh_node_free_ref(router);
385
	if (orig_node)
386
		orig_node_free_ref(orig_node);
387 388 389 390
	return ret;
}


391
int recv_icmp_packet(struct sk_buff *skb, struct hard_iface *recv_if)
392 393 394 395
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
	struct icmp_packet_rr *icmp_packet;
	struct ethhdr *ethhdr;
396
	struct orig_node *orig_node = NULL;
397
	struct neigh_node *router = NULL;
398
	int hdr_size = sizeof(struct icmp_packet);
399
	int ret = NET_RX_DROP;
400 401 402 403 404 405 406 407 408

	/**
	 * we truncate all incoming icmp packets if they don't match our size
	 */
	if (skb->len >= sizeof(struct icmp_packet_rr))
		hdr_size = sizeof(struct icmp_packet_rr);

	/* drop packet if it has not necessary minimum size */
	if (unlikely(!pskb_may_pull(skb, hdr_size)))
409
		goto out;
410 411 412 413 414

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with unicast indication but broadcast recipient */
	if (is_broadcast_ether_addr(ethhdr->h_dest))
415
		goto out;
416 417 418

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
419
		goto out;
420 421 422

	/* not for me */
	if (!is_my_mac(ethhdr->h_dest))
423
		goto out;
424 425 426 427 428 429 430

	icmp_packet = (struct icmp_packet_rr *)skb->data;

	/* add record route information if not full */
	if ((hdr_size == sizeof(struct icmp_packet_rr)) &&
	    (icmp_packet->rr_cur < BAT_RR_LEN)) {
		memcpy(&(icmp_packet->rr[icmp_packet->rr_cur]),
431
		       ethhdr->h_dest, ETH_ALEN);
432 433 434 435 436 437 438 439
		icmp_packet->rr_cur++;
	}

	/* packet for me */
	if (is_my_mac(icmp_packet->dst))
		return recv_my_icmp_packet(bat_priv, skb, hdr_size);

	/* TTL exceeded */
440
	if (icmp_packet->header.ttl < 2)
441
		return recv_icmp_ttl_exceeded(bat_priv, skb);
442 443

	/* get routing information */
444
	orig_node = orig_hash_find(bat_priv, icmp_packet->dst);
445
	if (!orig_node)
446
		goto out;
447

448 449 450
	router = orig_node_get_router(orig_node);
	if (!router)
		goto out;
451

452 453 454
	/* create a copy of the skb, if needed, to modify it. */
	if (skb_cow(skb, sizeof(struct ethhdr)) < 0)
		goto out;
455

456
	icmp_packet = (struct icmp_packet_rr *)skb->data;
457

458
	/* decrement ttl */
459
	icmp_packet->header.ttl--;
460 461

	/* route it */
462
	send_skb_packet(skb, router->if_incoming, router->addr);
463
	ret = NET_RX_SUCCESS;
464

465
out:
466 467
	if (router)
		neigh_node_free_ref(router);
468
	if (orig_node)
469
		orig_node_free_ref(orig_node);
470 471 472
	return ret;
}

473 474 475 476 477 478
/* In the bonding case, send the packets in a round
 * robin fashion over the remaining interfaces.
 *
 * This method rotates the bonding list and increases the
 * returned router's refcount. */
static struct neigh_node *find_bond_router(struct orig_node *primary_orig,
479
					   const struct hard_iface *recv_if)
480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529
{
	struct neigh_node *tmp_neigh_node;
	struct neigh_node *router = NULL, *first_candidate = NULL;

	rcu_read_lock();
	list_for_each_entry_rcu(tmp_neigh_node, &primary_orig->bond_list,
				bonding_list) {
		if (!first_candidate)
			first_candidate = tmp_neigh_node;

		/* recv_if == NULL on the first node. */
		if (tmp_neigh_node->if_incoming == recv_if)
			continue;

		if (!atomic_inc_not_zero(&tmp_neigh_node->refcount))
			continue;

		router = tmp_neigh_node;
		break;
	}

	/* use the first candidate if nothing was found. */
	if (!router && first_candidate &&
	    atomic_inc_not_zero(&first_candidate->refcount))
		router = first_candidate;

	if (!router)
		goto out;

	/* selected should point to the next element
	 * after the current router */
	spin_lock_bh(&primary_orig->neigh_list_lock);
	/* this is a list_move(), which unfortunately
	 * does not exist as rcu version */
	list_del_rcu(&primary_orig->bond_list);
	list_add_rcu(&primary_orig->bond_list,
		     &router->bonding_list);
	spin_unlock_bh(&primary_orig->neigh_list_lock);

out:
	rcu_read_unlock();
	return router;
}

/* Interface Alternating: Use the best of the
 * remaining candidates which are not using
 * this interface.
 *
 * Increases the returned router's refcount */
static struct neigh_node *find_ifalter_router(struct orig_node *primary_orig,
530
					      const struct hard_iface *recv_if)
531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572
{
	struct neigh_node *tmp_neigh_node;
	struct neigh_node *router = NULL, *first_candidate = NULL;

	rcu_read_lock();
	list_for_each_entry_rcu(tmp_neigh_node, &primary_orig->bond_list,
				bonding_list) {
		if (!first_candidate)
			first_candidate = tmp_neigh_node;

		/* recv_if == NULL on the first node. */
		if (tmp_neigh_node->if_incoming == recv_if)
			continue;

		if (!atomic_inc_not_zero(&tmp_neigh_node->refcount))
			continue;

		/* if we don't have a router yet
		 * or this one is better, choose it. */
		if ((!router) ||
		    (tmp_neigh_node->tq_avg > router->tq_avg)) {
			/* decrement refcount of
			 * previously selected router */
			if (router)
				neigh_node_free_ref(router);

			router = tmp_neigh_node;
			atomic_inc_not_zero(&router->refcount);
		}

		neigh_node_free_ref(tmp_neigh_node);
	}

	/* use the first candidate if nothing was found. */
	if (!router && first_candidate &&
	    atomic_inc_not_zero(&first_candidate->refcount))
		router = first_candidate;

	rcu_read_unlock();
	return router;
}

573 574 575 576
int recv_tt_query(struct sk_buff *skb, struct hard_iface *recv_if)
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
	struct tt_query_packet *tt_query;
577
	uint16_t tt_len;
578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615
	struct ethhdr *ethhdr;

	/* drop packet if it has not necessary minimum size */
	if (unlikely(!pskb_may_pull(skb, sizeof(struct tt_query_packet))))
		goto out;

	/* I could need to modify it */
	if (skb_cow(skb, sizeof(struct tt_query_packet)) < 0)
		goto out;

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with unicast indication but broadcast recipient */
	if (is_broadcast_ether_addr(ethhdr->h_dest))
		goto out;

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
		goto out;

	tt_query = (struct tt_query_packet *)skb->data;

	tt_query->tt_data = ntohs(tt_query->tt_data);

	switch (tt_query->flags & TT_QUERY_TYPE_MASK) {
	case TT_REQUEST:
		/* If we cannot provide an answer the tt_request is
		 * forwarded */
		if (!send_tt_response(bat_priv, tt_query)) {
			bat_dbg(DBG_TT, bat_priv,
				"Routing TT_REQUEST to %pM [%c]\n",
				tt_query->dst,
				(tt_query->flags & TT_FULL_TABLE ? 'F' : '.'));
			tt_query->tt_data = htons(tt_query->tt_data);
			return route_unicast_packet(skb, recv_if);
		}
		break;
	case TT_RESPONSE:
616 617 618 619 620
		if (is_my_mac(tt_query->dst)) {
			/* packet needs to be linearized to access the TT
			 * changes */
			if (skb_linearize(skb) < 0)
				goto out;
621

622 623 624 625
			tt_len = tt_query->tt_data * sizeof(struct tt_change);

			/* Ensure we have all the claimed data */
			if (unlikely(skb_headlen(skb) <
626
				     sizeof(struct tt_query_packet) + tt_len))
627 628
				goto out;

629
			handle_tt_response(bat_priv, tt_query);
630
		} else {
631 632 633 634 635 636 637 638 639 640 641 642 643 644 645
			bat_dbg(DBG_TT, bat_priv,
				"Routing TT_RESPONSE to %pM [%c]\n",
				tt_query->dst,
				(tt_query->flags & TT_FULL_TABLE ? 'F' : '.'));
			tt_query->tt_data = htons(tt_query->tt_data);
			return route_unicast_packet(skb, recv_if);
		}
		break;
	}

out:
	/* returning NET_RX_DROP will make the caller function kfree the skb */
	return NET_RX_DROP;
}

646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675
int recv_roam_adv(struct sk_buff *skb, struct hard_iface *recv_if)
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
	struct roam_adv_packet *roam_adv_packet;
	struct orig_node *orig_node;
	struct ethhdr *ethhdr;

	/* drop packet if it has not necessary minimum size */
	if (unlikely(!pskb_may_pull(skb, sizeof(struct roam_adv_packet))))
		goto out;

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with unicast indication but broadcast recipient */
	if (is_broadcast_ether_addr(ethhdr->h_dest))
		goto out;

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
		goto out;

	roam_adv_packet = (struct roam_adv_packet *)skb->data;

	if (!is_my_mac(roam_adv_packet->dst))
		return route_unicast_packet(skb, recv_if);

	orig_node = orig_hash_find(bat_priv, roam_adv_packet->src);
	if (!orig_node)
		goto out;

676 677 678
	bat_dbg(DBG_TT, bat_priv,
		"Received ROAMING_ADV from %pM (client %pM)\n",
		roam_adv_packet->src, roam_adv_packet->client);
679 680

	tt_global_add(bat_priv, orig_node, roam_adv_packet->client,
681
		      atomic_read(&orig_node->last_ttvn) + 1, true, false);
682 683 684 685 686 687 688 689 690 691 692 693

	/* Roaming phase starts: I have new information but the ttvn has not
	 * been incremented yet. This flag will make me check all the incoming
	 * packets for the correct destination. */
	bat_priv->tt_poss_change = true;

	orig_node_free_ref(orig_node);
out:
	/* returning NET_RX_DROP will make the caller function kfree the skb */
	return NET_RX_DROP;
}

694
/* find a suitable router for this originator, and use
695 696
 * bonding if possible. increases the found neighbors
 * refcount.*/
697 698
struct neigh_node *find_router(struct bat_priv *bat_priv,
			       struct orig_node *orig_node,
699
			       const struct hard_iface *recv_if)
700 701 702
{
	struct orig_node *primary_orig_node;
	struct orig_node *router_orig;
703
	struct neigh_node *router;
704 705 706 707 708 709
	static uint8_t zero_mac[ETH_ALEN] = {0, 0, 0, 0, 0, 0};
	int bonding_enabled;

	if (!orig_node)
		return NULL;

710 711
	router = orig_node_get_router(orig_node);
	if (!router)
712
		goto err;
713 714 715 716 717

	/* without bonding, the first node should
	 * always choose the default router. */
	bonding_enabled = atomic_read(&bat_priv->bonding);

718 719
	rcu_read_lock();
	/* select default router to output */
720
	router_orig = router->orig_node;
721 722
	if (!router_orig)
		goto err_unlock;
723 724 725

	if ((!recv_if) && (!bonding_enabled))
		goto return_router;
726 727 728

	/* if we have something in the primary_addr, we can search
	 * for a potential bonding candidate. */
729
	if (compare_eth(router_orig->primary_addr, zero_mac))
730
		goto return_router;
731 732 733 734

	/* find the orig_node which has the primary interface. might
	 * even be the same as our router_orig in many cases */

735
	if (compare_eth(router_orig->primary_addr, router_orig->orig)) {
736 737
		primary_orig_node = router_orig;
	} else {
738 739
		primary_orig_node = orig_hash_find(bat_priv,
						   router_orig->primary_addr);
740
		if (!primary_orig_node)
741
			goto return_router;
742

743
		orig_node_free_ref(primary_orig_node);
744 745 746 747
	}

	/* with less than 2 candidates, we can't do any
	 * bonding and prefer the original router. */
748 749
	if (atomic_read(&primary_orig_node->bond_candidates) < 2)
		goto return_router;
750 751 752 753

	/* all nodes between should choose a candidate which
	 * is is not on the interface where the packet came
	 * in. */
754

755
	neigh_node_free_ref(router);
756

757 758 759 760
	if (bonding_enabled)
		router = find_bond_router(primary_orig_node, recv_if);
	else
		router = find_ifalter_router(primary_orig_node, recv_if);
761

762
return_router:
763 764 765
	if (router && router->if_incoming->if_status != IF_ACTIVE)
		goto err_unlock;

766
	rcu_read_unlock();
767
	return router;
768 769 770 771 772 773
err_unlock:
	rcu_read_unlock();
err:
	if (router)
		neigh_node_free_ref(router);
	return NULL;
774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800
}

static int check_unicast_packet(struct sk_buff *skb, int hdr_size)
{
	struct ethhdr *ethhdr;

	/* drop packet if it has not necessary minimum size */
	if (unlikely(!pskb_may_pull(skb, hdr_size)))
		return -1;

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with unicast indication but broadcast recipient */
	if (is_broadcast_ether_addr(ethhdr->h_dest))
		return -1;

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
		return -1;

	/* not for me */
	if (!is_my_mac(ethhdr->h_dest))
		return -1;

	return 0;
}

801
int route_unicast_packet(struct sk_buff *skb, struct hard_iface *recv_if)
802 803
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
804 805
	struct orig_node *orig_node = NULL;
	struct neigh_node *neigh_node = NULL;
806 807
	struct unicast_packet *unicast_packet;
	struct ethhdr *ethhdr = (struct ethhdr *)skb_mac_header(skb);
808
	int ret = NET_RX_DROP;
809 810 811 812 813
	struct sk_buff *new_skb;

	unicast_packet = (struct unicast_packet *)skb->data;

	/* TTL exceeded */
814
	if (unicast_packet->header.ttl < 2) {
815 816
		pr_debug("Warning - can't forward unicast packet from %pM to %pM: ttl exceeded\n",
			 ethhdr->h_source, unicast_packet->dest);
817
		goto out;
818 819 820
	}

	/* get routing information */
821 822
	orig_node = orig_hash_find(bat_priv, unicast_packet->dest);

823
	if (!orig_node)
824
		goto out;
825

826
	/* find_router() increases neigh_nodes refcount if found. */
827
	neigh_node = find_router(bat_priv, orig_node, recv_if);
828

829
	if (!neigh_node)
830
		goto out;
831 832 833

	/* create a copy of the skb, if needed, to modify it. */
	if (skb_cow(skb, sizeof(struct ethhdr)) < 0)
834
		goto out;
835 836 837

	unicast_packet = (struct unicast_packet *)skb->data;

838
	if (unicast_packet->header.packet_type == BAT_UNICAST &&
839
	    atomic_read(&bat_priv->fragmentation) &&
840 841 842 843 844
	    skb->len > neigh_node->if_incoming->net_dev->mtu) {
		ret = frag_send_skb(skb, bat_priv,
				    neigh_node->if_incoming, neigh_node->addr);
		goto out;
	}
845

846
	if (unicast_packet->header.packet_type == BAT_UNICAST_FRAG &&
847
	    frag_can_reassemble(skb, neigh_node->if_incoming->net_dev->mtu)) {
848 849 850 851

		ret = frag_reassemble_skb(skb, bat_priv, &new_skb);

		if (ret == NET_RX_DROP)
852
			goto out;
853 854

		/* packet was buffered for late merge */
855 856 857 858
		if (!new_skb) {
			ret = NET_RX_SUCCESS;
			goto out;
		}
859 860 861 862 863 864

		skb = new_skb;
		unicast_packet = (struct unicast_packet *)skb->data;
	}

	/* decrement ttl */
865
	unicast_packet->header.ttl--;
866 867

	/* route it */
868
	send_skb_packet(skb, neigh_node->if_incoming, neigh_node->addr);
869
	ret = NET_RX_SUCCESS;
870

871 872 873 874
out:
	if (neigh_node)
		neigh_node_free_ref(neigh_node);
	if (orig_node)
875
		orig_node_free_ref(orig_node);
876
	return ret;
877 878
}

879 880 881 882 883 884 885
static int check_unicast_ttvn(struct bat_priv *bat_priv,
			       struct sk_buff *skb) {
	uint8_t curr_ttvn;
	struct orig_node *orig_node;
	struct ethhdr *ethhdr;
	struct hard_iface *primary_if;
	struct unicast_packet *unicast_packet;
886
	bool tt_poss_change;
887 888 889 890 891 892 893

	/* I could need to modify it */
	if (skb_cow(skb, sizeof(struct unicast_packet)) < 0)
		return 0;

	unicast_packet = (struct unicast_packet *)skb->data;

894 895
	if (is_my_mac(unicast_packet->dest)) {
		tt_poss_change = bat_priv->tt_poss_change;
896
		curr_ttvn = (uint8_t)atomic_read(&bat_priv->ttvn);
897
	} else {
898 899 900 901 902 903
		orig_node = orig_hash_find(bat_priv, unicast_packet->dest);

		if (!orig_node)
			return 0;

		curr_ttvn = (uint8_t)atomic_read(&orig_node->last_ttvn);
904
		tt_poss_change = orig_node->tt_poss_change;
905 906 907 908
		orig_node_free_ref(orig_node);
	}

	/* Check whether I have to reroute the packet */
909
	if (seq_before(unicast_packet->ttvn, curr_ttvn) || tt_poss_change) {
910 911 912 913 914 915
		/* Linearize the skb before accessing it */
		if (skb_linearize(skb) < 0)
			return 0;

		ethhdr = (struct ethhdr *)(skb->data +
			sizeof(struct unicast_packet));
916
		orig_node = transtable_search(bat_priv, NULL, ethhdr->h_dest);
917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934

		if (!orig_node) {
			if (!is_my_client(bat_priv, ethhdr->h_dest))
				return 0;
			primary_if = primary_if_get_selected(bat_priv);
			if (!primary_if)
				return 0;
			memcpy(unicast_packet->dest,
			       primary_if->net_dev->dev_addr, ETH_ALEN);
			hardif_free_ref(primary_if);
		} else {
			memcpy(unicast_packet->dest, orig_node->orig,
			       ETH_ALEN);
			curr_ttvn = (uint8_t)
				atomic_read(&orig_node->last_ttvn);
			orig_node_free_ref(orig_node);
		}

935 936 937 938
		bat_dbg(DBG_ROUTES, bat_priv,
			"TTVN mismatch (old_ttvn %u new_ttvn %u)! Rerouting unicast packet (for %pM) to %pM\n",
			unicast_packet->ttvn, curr_ttvn, ethhdr->h_dest,
			unicast_packet->dest);
939 940 941 942 943 944

		unicast_packet->ttvn = curr_ttvn;
	}
	return 1;
}

945
int recv_unicast_packet(struct sk_buff *skb, struct hard_iface *recv_if)
946
{
947
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
948
	struct unicast_packet *unicast_packet;
949
	int hdr_size = sizeof(*unicast_packet);
950 951 952 953

	if (check_unicast_packet(skb, hdr_size) < 0)
		return NET_RX_DROP;

954 955 956
	if (!check_unicast_ttvn(bat_priv, skb))
		return NET_RX_DROP;

957 958 959 960 961 962 963 964
	unicast_packet = (struct unicast_packet *)skb->data;

	/* packet for me */
	if (is_my_mac(unicast_packet->dest)) {
		interface_rx(recv_if->soft_iface, skb, recv_if, hdr_size);
		return NET_RX_SUCCESS;
	}

965
	return route_unicast_packet(skb, recv_if);
966 967
}

968
int recv_ucast_frag_packet(struct sk_buff *skb, struct hard_iface *recv_if)
969 970 971
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
	struct unicast_frag_packet *unicast_packet;
972
	int hdr_size = sizeof(*unicast_packet);
973 974 975 976 977 978
	struct sk_buff *new_skb = NULL;
	int ret;

	if (check_unicast_packet(skb, hdr_size) < 0)
		return NET_RX_DROP;

979 980 981
	if (!check_unicast_ttvn(bat_priv, skb))
		return NET_RX_DROP;

982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000
	unicast_packet = (struct unicast_frag_packet *)skb->data;

	/* packet for me */
	if (is_my_mac(unicast_packet->dest)) {

		ret = frag_reassemble_skb(skb, bat_priv, &new_skb);

		if (ret == NET_RX_DROP)
			return NET_RX_DROP;

		/* packet was buffered for late merge */
		if (!new_skb)
			return NET_RX_SUCCESS;

		interface_rx(recv_if->soft_iface, new_skb, recv_if,
			     sizeof(struct unicast_packet));
		return NET_RX_SUCCESS;
	}

1001
	return route_unicast_packet(skb, recv_if);
1002 1003 1004
}


1005
int recv_bcast_packet(struct sk_buff *skb, struct hard_iface *recv_if)
1006 1007
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1008
	struct orig_node *orig_node = NULL;
1009 1010
	struct bcast_packet *bcast_packet;
	struct ethhdr *ethhdr;
1011
	int hdr_size = sizeof(*bcast_packet);
1012
	int ret = NET_RX_DROP;
1013 1014 1015 1016
	int32_t seq_diff;

	/* drop packet if it has not necessary minimum size */
	if (unlikely(!pskb_may_pull(skb, hdr_size)))
1017
		goto out;
1018 1019 1020 1021 1022

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with broadcast indication but unicast recipient */
	if (!is_broadcast_ether_addr(ethhdr->h_dest))
1023
		goto out;
1024 1025 1026

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
1027
		goto out;
1028 1029 1030

	/* ignore broadcasts sent by myself */
	if (is_my_mac(ethhdr->h_source))
1031
		goto out;
1032 1033 1034 1035 1036

	bcast_packet = (struct bcast_packet *)skb->data;

	/* ignore broadcasts originated by myself */
	if (is_my_mac(bcast_packet->orig))
1037
		goto out;
1038

1039
	if (bcast_packet->header.ttl < 2)
1040
		goto out;
1041

1042
	orig_node = orig_hash_find(bat_priv, bcast_packet->orig);
1043 1044

	if (!orig_node)
1045
		goto out;
1046

1047
	spin_lock_bh(&orig_node->bcast_seqno_lock);
1048 1049

	/* check whether the packet is a duplicate */
1050 1051 1052
	if (get_bit_status(orig_node->bcast_bits, orig_node->last_bcast_seqno,
			   ntohl(bcast_packet->seqno)))
		goto spin_unlock;
1053 1054 1055 1056 1057

	seq_diff = ntohl(bcast_packet->seqno) - orig_node->last_bcast_seqno;

	/* check whether the packet is old and the host just restarted. */
	if (window_protected(bat_priv, seq_diff,
1058 1059
			     &orig_node->bcast_seqno_reset))
		goto spin_unlock;
1060 1061 1062 1063 1064 1065

	/* mark broadcast in flood history, update window position
	 * if required. */
	if (bit_get_packet(bat_priv, orig_node->bcast_bits, seq_diff, 1))
		orig_node->last_bcast_seqno = ntohl(bcast_packet->seqno);

1066 1067
	spin_unlock_bh(&orig_node->bcast_seqno_lock);

1068
	/* rebroadcast packet */
1069
	add_bcast_packet_to_list(bat_priv, skb, 1);
1070 1071 1072

	/* broadcast for me */
	interface_rx(recv_if->soft_iface, skb, recv_if, hdr_size);
1073 1074
	ret = NET_RX_SUCCESS;
	goto out;
1075

1076 1077 1078 1079
spin_unlock:
	spin_unlock_bh(&orig_node->bcast_seqno_lock);
out:
	if (orig_node)
1080
		orig_node_free_ref(orig_node);
1081
	return ret;
1082 1083
}

1084
int recv_vis_packet(struct sk_buff *skb, struct hard_iface *recv_if)
1085 1086 1087 1088
{
	struct vis_packet *vis_packet;
	struct ethhdr *ethhdr;
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1089
	int hdr_size = sizeof(*vis_packet);
1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130

	/* keep skb linear */
	if (skb_linearize(skb) < 0)
		return NET_RX_DROP;

	if (unlikely(!pskb_may_pull(skb, hdr_size)))
		return NET_RX_DROP;

	vis_packet = (struct vis_packet *)skb->data;
	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* not for me */
	if (!is_my_mac(ethhdr->h_dest))
		return NET_RX_DROP;

	/* ignore own packets */
	if (is_my_mac(vis_packet->vis_orig))
		return NET_RX_DROP;

	if (is_my_mac(vis_packet->sender_orig))
		return NET_RX_DROP;

	switch (vis_packet->vis_type) {
	case VIS_TYPE_SERVER_SYNC:
		receive_server_sync_packet(bat_priv, vis_packet,
					   skb_headlen(skb));
		break;

	case VIS_TYPE_CLIENT_UPDATE:
		receive_client_update_packet(bat_priv, vis_packet,
					     skb_headlen(skb));
		break;

	default:	/* ignore unknown packet */
		break;
	}

	/* We take a copy of the data in the packet, so we should
	   always free the skbuf. */
	return NET_RX_DROP;
}