routing.c 45.5 KB
Newer Older
1
/*
2
 * Copyright (C) 2007-2011 B.A.T.M.A.N. contributors:
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37
 *
 * Marek Lindner, Simon Wunderlich
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of version 2 of the GNU General Public
 * License as published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
 * General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
 * 02110-1301, USA
 *
 */

#include "main.h"
#include "routing.h"
#include "send.h"
#include "hash.h"
#include "soft-interface.h"
#include "hard-interface.h"
#include "icmp_socket.h"
#include "translation-table.h"
#include "originator.h"
#include "ring_buffer.h"
#include "vis.h"
#include "aggregation.h"
#include "gateway_common.h"
#include "gateway_client.h"
#include "unicast.h"

38
void slide_own_bcast_window(struct hard_iface *hard_iface)
39
{
40
	struct bat_priv *bat_priv = netdev_priv(hard_iface->soft_iface);
41
	struct hashtable_t *hash = bat_priv->orig_hash;
42
	struct hlist_node *node;
43 44 45 46 47 48 49 50 51
	struct hlist_head *head;
	struct orig_node *orig_node;
	unsigned long *word;
	int i;
	size_t word_index;

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

52
		rcu_read_lock();
53
		hlist_for_each_entry_rcu(orig_node, node, head, hash_entry) {
54
			spin_lock_bh(&orig_node->ogm_cnt_lock);
55
			word_index = hard_iface->if_num * NUM_WORDS;
56 57 58
			word = &(orig_node->bcast_own[word_index]);

			bit_get_packet(bat_priv, word, 1, 0);
59
			orig_node->bcast_own_sum[hard_iface->if_num] =
60
				bit_packet_count(word);
61
			spin_unlock_bh(&orig_node->ogm_cnt_lock);
62
		}
63
		rcu_read_unlock();
64 65 66
	}
}

67 68 69 70 71
static void update_transtable(struct bat_priv *bat_priv,
			      struct orig_node *orig_node,
			      const unsigned char *tt_buff,
			      uint8_t tt_num_changes, uint8_t ttvn,
			      uint16_t tt_crc)
72
{
73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110
	uint8_t orig_ttvn = (uint8_t)atomic_read(&orig_node->last_ttvn);
	bool full_table = true;

	/* the ttvn increased by one -> we can apply the attached changes */
	if (ttvn - orig_ttvn == 1) {
		/* the OGM could not contain the changes because they were too
		 * many to fit in one frame or because they have already been
		 * sent TT_OGM_APPEND_MAX times. In this case send a tt
		 * request */
		if (!tt_num_changes) {
			full_table = false;
			goto request_table;
		}

		tt_update_changes(bat_priv, orig_node, tt_num_changes, ttvn,
				  (struct tt_change *)tt_buff);

		/* Even if we received the crc into the OGM, we prefer
		 * to recompute it to spot any possible inconsistency
		 * in the global table */
		spin_lock_bh(&bat_priv->tt_ghash_lock);
		orig_node->tt_crc = tt_global_crc(bat_priv, orig_node);
		spin_unlock_bh(&bat_priv->tt_ghash_lock);
	} else {
		/* if we missed more than one change or our tables are not
		 * in sync anymore -> request fresh tt data */
		if (ttvn != orig_ttvn || orig_node->tt_crc != tt_crc) {
request_table:
			bat_dbg(DBG_TT, bat_priv, "TT inconsistency for %pM. "
				"Need to retrieve the correct information "
				"(ttvn: %u last_ttvn: %u crc: %u last_crc: "
				"%u num_changes: %u)\n", orig_node->orig, ttvn,
				orig_ttvn, tt_crc, orig_node->tt_crc,
				tt_num_changes);
			send_tt_request(bat_priv, orig_node, ttvn, tt_crc,
					full_table);
			return;
		}
111 112 113
	}
}

114 115 116
static void update_route(struct bat_priv *bat_priv,
			 struct orig_node *orig_node,
			 struct neigh_node *neigh_node)
117
{
118 119 120
	struct neigh_node *curr_router;

	curr_router = orig_node_get_router(orig_node);
121

122
	/* route deleted */
123
	if ((curr_router) && (!neigh_node)) {
124 125
		bat_dbg(DBG_ROUTES, bat_priv, "Deleting route towards: %pM\n",
			orig_node->orig);
126
		tt_global_del_orig(bat_priv, orig_node,
127
				    "Deleted route towards originator");
128

129 130
	/* route added */
	} else if ((!curr_router) && (neigh_node)) {
131 132 133 134

		bat_dbg(DBG_ROUTES, bat_priv,
			"Adding route towards: %pM (via %pM)\n",
			orig_node->orig, neigh_node->addr);
135
	/* route changed */
136
	} else if (neigh_node && curr_router) {
137 138 139 140
		bat_dbg(DBG_ROUTES, bat_priv,
			"Changing route towards: %pM "
			"(now via %pM - was via %pM)\n",
			orig_node->orig, neigh_node->addr,
141
			curr_router->addr);
142 143
	}

144 145 146 147
	if (curr_router)
		neigh_node_free_ref(curr_router);

	/* increase refcount of new best neighbor */
148 149
	if (neigh_node && !atomic_inc_not_zero(&neigh_node->refcount))
		neigh_node = NULL;
150 151 152 153 154 155 156 157

	spin_lock_bh(&orig_node->neigh_list_lock);
	rcu_assign_pointer(orig_node->router, neigh_node);
	spin_unlock_bh(&orig_node->neigh_list_lock);

	/* decrease refcount of previous best neighbor */
	if (curr_router)
		neigh_node_free_ref(curr_router);
158 159 160
}

void update_routes(struct bat_priv *bat_priv, struct orig_node *orig_node,
161
		   struct neigh_node *neigh_node)
162
{
163
	struct neigh_node *router = NULL;
164 165

	if (!orig_node)
166 167 168
		goto out;

	router = orig_node_get_router(orig_node);
169

170
	if (router != neigh_node)
171
		update_route(bat_priv, orig_node, neigh_node);
172 173 174 175

out:
	if (router)
		neigh_node_free_ref(router);
176 177 178 179 180
}

static int is_bidirectional_neigh(struct orig_node *orig_node,
				struct orig_node *orig_neigh_node,
				struct batman_packet *batman_packet,
181
				struct hard_iface *if_incoming)
182 183
{
	struct bat_priv *bat_priv = netdev_priv(if_incoming->soft_iface);
184
	struct neigh_node *neigh_node = NULL, *tmp_neigh_node;
185
	struct hlist_node *node;
186
	uint8_t total_count;
187 188
	uint8_t orig_eq_count, neigh_rq_count, tq_own;
	int tq_asym_penalty, ret = 0;
189

190 191 192 193
	/* find corresponding one hop neighbor */
	rcu_read_lock();
	hlist_for_each_entry_rcu(tmp_neigh_node, node,
				 &orig_neigh_node->neigh_list, list) {
194

195 196
		if (!compare_eth(tmp_neigh_node->addr, orig_neigh_node->orig))
			continue;
197

198 199
		if (tmp_neigh_node->if_incoming != if_incoming)
			continue;
200

201 202
		if (!atomic_inc_not_zero(&tmp_neigh_node->refcount))
			continue;
203

204 205 206 207
		neigh_node = tmp_neigh_node;
		break;
	}
	rcu_read_unlock();
208

209 210 211 212 213
	if (!neigh_node)
		neigh_node = create_neighbor(orig_neigh_node,
					     orig_neigh_node,
					     orig_neigh_node->orig,
					     if_incoming);
214

215 216
	if (!neigh_node)
		goto out;
217

218 219 220
	/* if orig_node is direct neighbour update neigh_node last_valid */
	if (orig_node == orig_neigh_node)
		neigh_node->last_valid = jiffies;
221 222 223

	orig_node->last_valid = jiffies;

224
	/* find packet count of corresponding one hop neighbor */
225 226 227 228 229
	spin_lock_bh(&orig_node->ogm_cnt_lock);
	orig_eq_count = orig_neigh_node->bcast_own_sum[if_incoming->if_num];
	neigh_rq_count = neigh_node->real_packet_count;
	spin_unlock_bh(&orig_node->ogm_cnt_lock);

230
	/* pay attention to not get a value bigger than 100 % */
231 232
	total_count = (orig_eq_count > neigh_rq_count ?
		       neigh_rq_count : orig_eq_count);
233 234 235 236

	/* if we have too few packets (too less data) we set tq_own to zero */
	/* if we receive too few packets it is not considered bidirectional */
	if ((total_count < TQ_LOCAL_BIDRECT_SEND_MINIMUM) ||
237 238
	    (neigh_rq_count < TQ_LOCAL_BIDRECT_RECV_MINIMUM))
		tq_own = 0;
239 240 241 242
	else
		/* neigh_node->real_packet_count is never zero as we
		 * only purge old information when getting new
		 * information */
243
		tq_own = (TQ_MAX_VALUE * total_count) /	neigh_rq_count;
244 245 246 247 248 249 250

	/*
	 * 1 - ((1-x) ** 3), normalized to TQ_MAX_VALUE this does
	 * affect the nearly-symmetric links only a little, but
	 * punishes asymmetric links more.  This will give a value
	 * between 0 and TQ_MAX_VALUE
	 */
251 252 253 254 255 256 257 258 259 260
	tq_asym_penalty = TQ_MAX_VALUE - (TQ_MAX_VALUE *
				(TQ_LOCAL_WINDOW_SIZE - neigh_rq_count) *
				(TQ_LOCAL_WINDOW_SIZE - neigh_rq_count) *
				(TQ_LOCAL_WINDOW_SIZE - neigh_rq_count)) /
					(TQ_LOCAL_WINDOW_SIZE *
					 TQ_LOCAL_WINDOW_SIZE *
					 TQ_LOCAL_WINDOW_SIZE);

	batman_packet->tq = ((batman_packet->tq * tq_own * tq_asym_penalty) /
						(TQ_MAX_VALUE * TQ_MAX_VALUE));
261 262 263 264 265 266 267

	bat_dbg(DBG_BATMAN, bat_priv,
		"bidirectional: "
		"orig = %-15pM neigh = %-15pM => own_bcast = %2i, "
		"real recv = %2i, local tq: %3i, asym_penalty: %3i, "
		"total tq: %3i\n",
		orig_node->orig, orig_neigh_node->orig, total_count,
268
		neigh_rq_count, tq_own,	tq_asym_penalty, batman_packet->tq);
269 270 271 272

	/* if link has the minimum required transmission quality
	 * consider it bidirectional */
	if (batman_packet->tq >= TQ_TOTAL_BIDRECT_LIMIT)
273 274 275 276
		ret = 1;

out:
	if (neigh_node)
277
		neigh_node_free_ref(neigh_node);
278
	return ret;
279 280
}

281 282 283 284 285 286 287 288 289 290
/* caller must hold the neigh_list_lock */
void bonding_candidate_del(struct orig_node *orig_node,
			   struct neigh_node *neigh_node)
{
	/* this neighbor is not part of our candidate list */
	if (list_empty(&neigh_node->bonding_list))
		goto out;

	list_del_rcu(&neigh_node->bonding_list);
	INIT_LIST_HEAD(&neigh_node->bonding_list);
291
	neigh_node_free_ref(neigh_node);
292 293 294 295 296 297 298 299 300 301
	atomic_dec(&orig_node->bond_candidates);

out:
	return;
}

static void bonding_candidate_add(struct orig_node *orig_node,
				  struct neigh_node *neigh_node)
{
	struct hlist_node *node;
302 303
	struct neigh_node *tmp_neigh_node, *router = NULL;
	uint8_t interference_candidate = 0;
304 305 306 307

	spin_lock_bh(&orig_node->neigh_list_lock);

	/* only consider if it has the same primary address ...  */
308 309
	if (!compare_eth(orig_node->orig,
			 neigh_node->orig_node->primary_addr))
310 311
		goto candidate_del;

312 313
	router = orig_node_get_router(orig_node);
	if (!router)
314 315 316
		goto candidate_del;

	/* ... and is good enough to be considered */
317
	if (neigh_node->tq_avg < router->tq_avg - BONDING_TQ_THRESHOLD)
318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336
		goto candidate_del;

	/**
	 * check if we have another candidate with the same mac address or
	 * interface. If we do, we won't select this candidate because of
	 * possible interference.
	 */
	hlist_for_each_entry_rcu(tmp_neigh_node, node,
				 &orig_node->neigh_list, list) {

		if (tmp_neigh_node == neigh_node)
			continue;

		/* we only care if the other candidate is even
		* considered as candidate. */
		if (list_empty(&tmp_neigh_node->bonding_list))
			continue;

		if ((neigh_node->if_incoming == tmp_neigh_node->if_incoming) ||
337
		    (compare_eth(neigh_node->addr, tmp_neigh_node->addr))) {
338 339 340 341 342 343 344 345 346 347 348 349 350
			interference_candidate = 1;
			break;
		}
	}

	/* don't care further if it is an interference candidate */
	if (interference_candidate)
		goto candidate_del;

	/* this neighbor already is part of our candidate list */
	if (!list_empty(&neigh_node->bonding_list))
		goto out;

351 352 353
	if (!atomic_inc_not_zero(&neigh_node->refcount))
		goto out;

354 355 356 357 358 359 360 361 362
	list_add_rcu(&neigh_node->bonding_list, &orig_node->bond_list);
	atomic_inc(&orig_node->bond_candidates);
	goto out;

candidate_del:
	bonding_candidate_del(orig_node, neigh_node);

out:
	spin_unlock_bh(&orig_node->neigh_list_lock);
363 364 365

	if (router)
		neigh_node_free_ref(router);
366 367 368
}

/* copy primary address for bonding */
369
static void bonding_save_primary(const struct orig_node *orig_node,
370
				 struct orig_node *orig_neigh_node,
371
				 const struct batman_packet *batman_packet)
372 373 374 375 376 377 378
{
	if (!(batman_packet->flags & PRIMARIES_FIRST_HOP))
		return;

	memcpy(orig_neigh_node->primary_addr, orig_node->orig, ETH_ALEN);
}

379 380 381
static void update_orig(struct bat_priv *bat_priv, struct orig_node *orig_node,
			const struct ethhdr *ethhdr,
			const struct batman_packet *batman_packet,
382
			struct hard_iface *if_incoming,
383
			const unsigned char *tt_buff, int is_duplicate)
384 385
{
	struct neigh_node *neigh_node = NULL, *tmp_neigh_node = NULL;
386
	struct neigh_node *router = NULL;
387
	struct orig_node *orig_node_tmp;
388
	struct hlist_node *node;
389
	uint8_t bcast_own_sum_orig, bcast_own_sum_neigh;
390 391 392 393

	bat_dbg(DBG_BATMAN, bat_priv, "update_originator(): "
		"Searching and updating originator entry of received packet\n");

394 395 396
	rcu_read_lock();
	hlist_for_each_entry_rcu(tmp_neigh_node, node,
				 &orig_node->neigh_list, list) {
397
		if (compare_eth(tmp_neigh_node->addr, ethhdr->h_source) &&
398 399 400 401
		    (tmp_neigh_node->if_incoming == if_incoming) &&
		     atomic_inc_not_zero(&tmp_neigh_node->refcount)) {
			if (neigh_node)
				neigh_node_free_ref(neigh_node);
402 403 404 405 406 407 408
			neigh_node = tmp_neigh_node;
			continue;
		}

		if (is_duplicate)
			continue;

409
		spin_lock_bh(&tmp_neigh_node->tq_lock);
410 411 412 413
		ring_buffer_set(tmp_neigh_node->tq_recv,
				&tmp_neigh_node->tq_index, 0);
		tmp_neigh_node->tq_avg =
			ring_buffer_avg(tmp_neigh_node->tq_recv);
414
		spin_unlock_bh(&tmp_neigh_node->tq_lock);
415 416 417 418 419 420 421
	}

	if (!neigh_node) {
		struct orig_node *orig_tmp;

		orig_tmp = get_orig_node(bat_priv, ethhdr->h_source);
		if (!orig_tmp)
422
			goto unlock;
423 424 425

		neigh_node = create_neighbor(orig_node, orig_tmp,
					     ethhdr->h_source, if_incoming);
426

427
		orig_node_free_ref(orig_tmp);
428
		if (!neigh_node)
429
			goto unlock;
430 431 432 433
	} else
		bat_dbg(DBG_BATMAN, bat_priv,
			"Updating existing last-hop neighbor of originator\n");

434 435
	rcu_read_unlock();

436 437 438
	orig_node->flags = batman_packet->flags;
	neigh_node->last_valid = jiffies;

439
	spin_lock_bh(&neigh_node->tq_lock);
440 441 442 443
	ring_buffer_set(neigh_node->tq_recv,
			&neigh_node->tq_index,
			batman_packet->tq);
	neigh_node->tq_avg = ring_buffer_avg(neigh_node->tq_recv);
444
	spin_unlock_bh(&neigh_node->tq_lock);
445 446 447 448 449 450

	if (!is_duplicate) {
		orig_node->last_ttl = batman_packet->ttl;
		neigh_node->last_ttl = batman_packet->ttl;
	}

451 452
	bonding_candidate_add(orig_node, neigh_node);

453 454
	/* if this neighbor already is our next hop there is nothing
	 * to change */
455 456
	router = orig_node_get_router(orig_node);
	if (router == neigh_node)
457
		goto update_tt;
458 459

	/* if this neighbor does not offer a better TQ we won't consider it */
460
	if (router && (router->tq_avg > neigh_node->tq_avg))
461
		goto update_tt;
462 463 464

	/* if the TQ is the same and the link not more symetric we
	 * won't consider it either */
465 466
	if (router && (neigh_node->tq_avg == router->tq_avg)) {
		orig_node_tmp = router->orig_node;
467 468 469 470 471 472 473 474 475 476 477 478
		spin_lock_bh(&orig_node_tmp->ogm_cnt_lock);
		bcast_own_sum_orig =
			orig_node_tmp->bcast_own_sum[if_incoming->if_num];
		spin_unlock_bh(&orig_node_tmp->ogm_cnt_lock);

		orig_node_tmp = neigh_node->orig_node;
		spin_lock_bh(&orig_node_tmp->ogm_cnt_lock);
		bcast_own_sum_neigh =
			orig_node_tmp->bcast_own_sum[if_incoming->if_num];
		spin_unlock_bh(&orig_node_tmp->ogm_cnt_lock);

		if (bcast_own_sum_orig >= bcast_own_sum_neigh)
479
			goto update_tt;
480
	}
481

482
	update_routes(bat_priv, orig_node, neigh_node);
483

484
update_tt:
485 486 487 488 489 490 491 492 493
	/* I have to check for transtable changes only if the OGM has been
	 * sent through a primary interface */
	if (((batman_packet->orig != ethhdr->h_source) &&
				(batman_packet->ttl > 2)) ||
				(batman_packet->flags & PRIMARIES_FIRST_HOP))
		update_transtable(bat_priv, orig_node, tt_buff,
				  batman_packet->tt_num_changes,
				  batman_packet->ttvn,
				  batman_packet->tt_crc);
494 495 496 497 498 499 500 501 502 503 504

	if (orig_node->gw_flags != batman_packet->gw_flags)
		gw_node_update(bat_priv, orig_node, batman_packet->gw_flags);

	orig_node->gw_flags = batman_packet->gw_flags;

	/* restart gateway selection if fast or late switching was enabled */
	if ((orig_node->gw_flags) &&
	    (atomic_read(&bat_priv->gw_mode) == GW_MODE_CLIENT) &&
	    (atomic_read(&bat_priv->gw_sel_class) > 2))
		gw_check_election(bat_priv, orig_node);
505 506 507 508 509 510 511

	goto out;

unlock:
	rcu_read_unlock();
out:
	if (neigh_node)
512
		neigh_node_free_ref(neigh_node);
513 514
	if (router)
		neigh_node_free_ref(router);
515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549
}

/* checks whether the host restarted and is in the protection time.
 * returns:
 *  0 if the packet is to be accepted
 *  1 if the packet is to be ignored.
 */
static int window_protected(struct bat_priv *bat_priv,
			    int32_t seq_num_diff,
			    unsigned long *last_reset)
{
	if ((seq_num_diff <= -TQ_LOCAL_WINDOW_SIZE)
		|| (seq_num_diff >= EXPECTED_SEQNO_RANGE)) {
		if (time_after(jiffies, *last_reset +
			msecs_to_jiffies(RESET_PROTECTION_MS))) {

			*last_reset = jiffies;
			bat_dbg(DBG_BATMAN, bat_priv,
				"old packet received, start protection\n");

			return 0;
		} else
			return 1;
	}
	return 0;
}

/* processes a batman packet for all interfaces, adjusts the sequence number and
 * finds out whether it is a duplicate.
 * returns:
 *   1 the packet is a duplicate
 *   0 the packet has not yet been received
 *  -1 the packet is old and has been received while the seqno window
 *     was protected. Caller should drop it.
 */
550
static int count_real_packets(const struct ethhdr *ethhdr,
551 552
			       const struct batman_packet *batman_packet,
			       const struct hard_iface *if_incoming)
553 554 555 556
{
	struct bat_priv *bat_priv = netdev_priv(if_incoming->soft_iface);
	struct orig_node *orig_node;
	struct neigh_node *tmp_neigh_node;
557
	struct hlist_node *node;
558
	int is_duplicate = 0;
559 560
	int32_t seq_diff;
	int need_update = 0;
561
	int set_mark, ret = -1;
562 563 564 565 566

	orig_node = get_orig_node(bat_priv, batman_packet->orig);
	if (!orig_node)
		return 0;

567
	spin_lock_bh(&orig_node->ogm_cnt_lock);
568 569 570 571 572
	seq_diff = batman_packet->seqno - orig_node->last_real_seqno;

	/* signalize caller that the packet is to be dropped. */
	if (window_protected(bat_priv, seq_diff,
			     &orig_node->batman_seqno_reset))
573
		goto out;
574

575 576 577
	rcu_read_lock();
	hlist_for_each_entry_rcu(tmp_neigh_node, node,
				 &orig_node->neigh_list, list) {
578 579 580 581 582

		is_duplicate |= get_bit_status(tmp_neigh_node->real_bits,
					       orig_node->last_real_seqno,
					       batman_packet->seqno);

583
		if (compare_eth(tmp_neigh_node->addr, ethhdr->h_source) &&
584 585 586 587 588 589 590 591 592 593 594 595 596
		    (tmp_neigh_node->if_incoming == if_incoming))
			set_mark = 1;
		else
			set_mark = 0;

		/* if the window moved, set the update flag. */
		need_update |= bit_get_packet(bat_priv,
					      tmp_neigh_node->real_bits,
					      seq_diff, set_mark);

		tmp_neigh_node->real_packet_count =
			bit_packet_count(tmp_neigh_node->real_bits);
	}
597
	rcu_read_unlock();
598 599 600 601 602 603 604 605

	if (need_update) {
		bat_dbg(DBG_BATMAN, bat_priv,
			"updating last_seqno: old %d, new %d\n",
			orig_node->last_real_seqno, batman_packet->seqno);
		orig_node->last_real_seqno = batman_packet->seqno;
	}

606
	ret = is_duplicate;
607

608 609
out:
	spin_unlock_bh(&orig_node->ogm_cnt_lock);
610
	orig_node_free_ref(orig_node);
611
	return ret;
612 613
}

614
void receive_bat_packet(const struct ethhdr *ethhdr,
615
			struct batman_packet *batman_packet,
616
			const unsigned char *tt_buff,
617
			struct hard_iface *if_incoming)
618 619
{
	struct bat_priv *bat_priv = netdev_priv(if_incoming->soft_iface);
620
	struct hard_iface *hard_iface;
621
	struct orig_node *orig_neigh_node, *orig_node;
622 623
	struct neigh_node *router = NULL, *router_router = NULL;
	struct neigh_node *orig_neigh_router = NULL;
624 625 626
	int has_directlink_flag;
	int is_my_addr = 0, is_my_orig = 0, is_my_oldorig = 0;
	int is_broadcast = 0, is_bidirectional, is_single_hop_neigh;
627
	int is_duplicate;
628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649
	uint32_t if_incoming_seqno;

	/* Silently drop when the batman packet is actually not a
	 * correct packet.
	 *
	 * This might happen if a packet is padded (e.g. Ethernet has a
	 * minimum frame length of 64 byte) and the aggregation interprets
	 * it as an additional length.
	 *
	 * TODO: A more sane solution would be to have a bit in the
	 * batman_packet to detect whether the packet is the last
	 * packet in an aggregation.  Here we expect that the padding
	 * is always zero (or not 0x01)
	 */
	if (batman_packet->packet_type != BAT_PACKET)
		return;

	/* could be changed by schedule_own_packet() */
	if_incoming_seqno = atomic_read(&if_incoming->seqno);

	has_directlink_flag = (batman_packet->flags & DIRECTLINK ? 1 : 0);

650 651
	is_single_hop_neigh = (compare_eth(ethhdr->h_source,
					   batman_packet->orig) ? 1 : 0);
652 653 654

	bat_dbg(DBG_BATMAN, bat_priv,
		"Received BATMAN packet via NB: %pM, IF: %s [%pM] "
655 656
		"(from OG: %pM, via prev OG: %pM, seqno %d, ttvn %u, "
		"crc %u, changes %u, td %d, TTL %d, V %d, IDF %d)\n",
657 658 659
		ethhdr->h_source, if_incoming->net_dev->name,
		if_incoming->net_dev->dev_addr, batman_packet->orig,
		batman_packet->prev_sender, batman_packet->seqno,
660 661 662
		batman_packet->ttvn, batman_packet->tt_crc,
		batman_packet->tt_num_changes, batman_packet->tq,
		batman_packet->ttl, batman_packet->version,
663 664 665
		has_directlink_flag);

	rcu_read_lock();
666 667
	list_for_each_entry_rcu(hard_iface, &hardif_list, list) {
		if (hard_iface->if_status != IF_ACTIVE)
668 669
			continue;

670
		if (hard_iface->soft_iface != if_incoming->soft_iface)
671 672
			continue;

673
		if (compare_eth(ethhdr->h_source,
674
				hard_iface->net_dev->dev_addr))
675 676
			is_my_addr = 1;

677
		if (compare_eth(batman_packet->orig,
678
				hard_iface->net_dev->dev_addr))
679 680
			is_my_orig = 1;

681
		if (compare_eth(batman_packet->prev_sender,
682
				hard_iface->net_dev->dev_addr))
683 684
			is_my_oldorig = 1;

685
		if (is_broadcast_ether_addr(ethhdr->h_source))
686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721
			is_broadcast = 1;
	}
	rcu_read_unlock();

	if (batman_packet->version != COMPAT_VERSION) {
		bat_dbg(DBG_BATMAN, bat_priv,
			"Drop packet: incompatible batman version (%i)\n",
			batman_packet->version);
		return;
	}

	if (is_my_addr) {
		bat_dbg(DBG_BATMAN, bat_priv,
			"Drop packet: received my own broadcast (sender: %pM"
			")\n",
			ethhdr->h_source);
		return;
	}

	if (is_broadcast) {
		bat_dbg(DBG_BATMAN, bat_priv, "Drop packet: "
		"ignoring all packets with broadcast source addr (sender: %pM"
		")\n", ethhdr->h_source);
		return;
	}

	if (is_my_orig) {
		unsigned long *word;
		int offset;

		orig_neigh_node = get_orig_node(bat_priv, ethhdr->h_source);
		if (!orig_neigh_node)
			return;

		/* neighbor has to indicate direct link and it has to
		 * come via the corresponding interface */
722
		/* save packet seqno for bidirectional check */
723
		if (has_directlink_flag &&
724
		    compare_eth(if_incoming->net_dev->dev_addr,
725
				batman_packet->orig)) {
726
			offset = if_incoming->if_num * NUM_WORDS;
727 728

			spin_lock_bh(&orig_neigh_node->ogm_cnt_lock);
729
			word = &(orig_neigh_node->bcast_own[offset]);
730 731
			bit_mark(word,
				 if_incoming_seqno - batman_packet->seqno - 2);
732 733
			orig_neigh_node->bcast_own_sum[if_incoming->if_num] =
				bit_packet_count(word);
734
			spin_unlock_bh(&orig_neigh_node->ogm_cnt_lock);
735 736 737 738
		}

		bat_dbg(DBG_BATMAN, bat_priv, "Drop packet: "
			"originator packet from myself (via neighbor)\n");
739
		orig_node_free_ref(orig_neigh_node);
740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759
		return;
	}

	if (is_my_oldorig) {
		bat_dbg(DBG_BATMAN, bat_priv,
			"Drop packet: ignoring all rebroadcast echos (sender: "
			"%pM)\n", ethhdr->h_source);
		return;
	}

	orig_node = get_orig_node(bat_priv, batman_packet->orig);
	if (!orig_node)
		return;

	is_duplicate = count_real_packets(ethhdr, batman_packet, if_incoming);

	if (is_duplicate == -1) {
		bat_dbg(DBG_BATMAN, bat_priv,
			"Drop packet: packet within seqno protection time "
			"(sender: %pM)\n", ethhdr->h_source);
760
		goto out;
761 762 763 764 765
	}

	if (batman_packet->tq == 0) {
		bat_dbg(DBG_BATMAN, bat_priv,
			"Drop packet: originator packet with tq equal 0\n");
766
		goto out;
767 768
	}

769 770 771 772
	router = orig_node_get_router(orig_node);
	if (router)
		router_router = orig_node_get_router(router->orig_node);

773
	/* avoid temporary routing loops */
774 775
	if (router && router_router &&
	    (compare_eth(router->addr, batman_packet->prev_sender)) &&
776
	    !(compare_eth(batman_packet->orig, batman_packet->prev_sender)) &&
777
	    (compare_eth(router->addr, router_router->addr))) {
778 779 780
		bat_dbg(DBG_BATMAN, bat_priv,
			"Drop packet: ignoring all rebroadcast packets that "
			"may make me loop (sender: %pM)\n", ethhdr->h_source);
781
		goto out;
782 783 784 785 786 787 788 789
	}

	/* if sender is a direct neighbor the sender mac equals
	 * originator mac */
	orig_neigh_node = (is_single_hop_neigh ?
			   orig_node :
			   get_orig_node(bat_priv, ethhdr->h_source));
	if (!orig_neigh_node)
790
		goto out;
791

792 793
	orig_neigh_router = orig_node_get_router(orig_neigh_node);

794 795
	/* drop packet if sender is not a direct neighbor and if we
	 * don't route towards it */
796
	if (!is_single_hop_neigh && (!orig_neigh_router)) {
797 798
		bat_dbg(DBG_BATMAN, bat_priv,
			"Drop packet: OGM via unknown neighbor!\n");
799
		goto out_neigh;
800 801 802 803 804
	}

	is_bidirectional = is_bidirectional_neigh(orig_node, orig_neigh_node,
						batman_packet, if_incoming);

805 806
	bonding_save_primary(orig_node, orig_neigh_node, batman_packet);

807 808 809 810 811 812 813
	/* update ranking if it is not a duplicate or has the same
	 * seqno and similar ttl as the non-duplicate */
	if (is_bidirectional &&
	    (!is_duplicate ||
	     ((orig_node->last_real_seqno == batman_packet->seqno) &&
	      (orig_node->last_ttl - 3 <= batman_packet->ttl))))
		update_orig(bat_priv, orig_node, ethhdr, batman_packet,
814
			    if_incoming, tt_buff, is_duplicate);
815 816 817 818 819 820

	/* is single hop (direct) neighbor */
	if (is_single_hop_neigh) {

		/* mark direct link on incoming interface */
		schedule_forward_packet(orig_node, ethhdr, batman_packet,
821
					1, if_incoming);
822 823 824

		bat_dbg(DBG_BATMAN, bat_priv, "Forwarding packet: "
			"rebroadcast neighbor packet with direct link flag\n");
825
		goto out_neigh;
826 827 828 829 830 831
	}

	/* multihop originator */
	if (!is_bidirectional) {
		bat_dbg(DBG_BATMAN, bat_priv,
			"Drop packet: not received via bidirectional link\n");
832
		goto out_neigh;
833 834 835 836 837
	}

	if (is_duplicate) {
		bat_dbg(DBG_BATMAN, bat_priv,
			"Drop packet: duplicate packet received\n");
838
		goto out_neigh;
839 840 841 842 843
	}

	bat_dbg(DBG_BATMAN, bat_priv,
		"Forwarding packet: rebroadcast originator packet\n");
	schedule_forward_packet(orig_node, ethhdr, batman_packet,
844
				0, if_incoming);
845 846

out_neigh:
847 848
	if ((orig_neigh_node) && (!is_single_hop_neigh))
		orig_node_free_ref(orig_neigh_node);
849
out:
850 851 852 853 854 855 856
	if (router)
		neigh_node_free_ref(router);
	if (router_router)
		neigh_node_free_ref(router_router);
	if (orig_neigh_router)
		neigh_node_free_ref(orig_neigh_router);

857
	orig_node_free_ref(orig_node);
858 859
}

860
int recv_bat_packet(struct sk_buff *skb, struct hard_iface *hard_iface)
861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890
{
	struct ethhdr *ethhdr;

	/* drop packet if it has not necessary minimum size */
	if (unlikely(!pskb_may_pull(skb, sizeof(struct batman_packet))))
		return NET_RX_DROP;

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with broadcast indication but unicast recipient */
	if (!is_broadcast_ether_addr(ethhdr->h_dest))
		return NET_RX_DROP;

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
		return NET_RX_DROP;

	/* create a copy of the skb, if needed, to modify it. */
	if (skb_cow(skb, 0) < 0)
		return NET_RX_DROP;

	/* keep skb linear */
	if (skb_linearize(skb) < 0)
		return NET_RX_DROP;

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	receive_aggr_bat_packet(ethhdr,
				skb->data,
				skb_headlen(skb),
891
				hard_iface);
892 893 894 895 896 897 898 899

	kfree_skb(skb);
	return NET_RX_SUCCESS;
}

static int recv_my_icmp_packet(struct bat_priv *bat_priv,
			       struct sk_buff *skb, size_t icmp_len)
{
900
	struct hard_iface *primary_if = NULL;
901
	struct orig_node *orig_node = NULL;
902
	struct neigh_node *router = NULL;
903
	struct icmp_packet_rr *icmp_packet;
904
	int ret = NET_RX_DROP;
905 906 907 908 909 910

	icmp_packet = (struct icmp_packet_rr *)skb->data;

	/* add data to device queue */
	if (icmp_packet->msg_type != ECHO_REQUEST) {
		bat_socket_receive_packet(icmp_packet, icmp_len);
911
		goto out;
912 913
	}

914 915
	primary_if = primary_if_get_selected(bat_priv);
	if (!primary_if)
916
		goto out;
917 918 919

	/* answer echo request (ping) */
	/* get routing information */
920
	orig_node = orig_hash_find(bat_priv, icmp_packet->orig);
921
	if (!orig_node)
922
		goto out;
923

924 925 926
	router = orig_node_get_router(orig_node);
	if (!router)
		goto out;
927

928 929 930 931 932 933 934
	/* create a copy of the skb, if needed, to modify it. */
	if (skb_cow(skb, sizeof(struct ethhdr)) < 0)
		goto out;

	icmp_packet = (struct icmp_packet_rr *)skb->data;

	memcpy(icmp_packet->dst, icmp_packet->orig, ETH_ALEN);
935
	memcpy(icmp_packet->orig, primary_if->net_dev->dev_addr, ETH_ALEN);
936 937 938
	icmp_packet->msg_type = ECHO_REPLY;
	icmp_packet->ttl = TTL;

939
	send_skb_packet(skb, router->if_incoming, router->addr);
940
	ret = NET_RX_SUCCESS;
941

942
out:
943 944
	if (primary_if)
		hardif_free_ref(primary_if);
945 946
	if (router)
		neigh_node_free_ref(router);
947
	if (orig_node)
948
		orig_node_free_ref(orig_node);
949 950 951 952
	return ret;
}

static int recv_icmp_ttl_exceeded(struct bat_priv *bat_priv,
953
				  struct sk_buff *skb)
954
{
955
	struct hard_iface *primary_if = NULL;
956
	struct orig_node *orig_node = NULL;
957
	struct neigh_node *router = NULL;
958
	struct icmp_packet *icmp_packet;
959
	int ret = NET_RX_DROP;
960 961 962 963 964 965 966 967

	icmp_packet = (struct icmp_packet *)skb->data;

	/* send TTL exceeded if packet is an echo request (traceroute) */
	if (icmp_packet->msg_type != ECHO_REQUEST) {
		pr_debug("Warning - can't forward icmp packet from %pM to "
			 "%pM: ttl exceeded\n", icmp_packet->orig,
			 icmp_packet->dst);
968
		goto out;
969 970
	}

971 972
	primary_if = primary_if_get_selected(bat_priv);
	if (!primary_if)
973
		goto out;
974 975

	/* get routing information */
976
	orig_node = orig_hash_find(bat_priv, icmp_packet->orig);
977
	if (!orig_node)
978
		goto out;
979

980 981 982
	router = orig_node_get_router(orig_node);
	if (!router)
		goto out;
983

984 985 986
	/* create a copy of the skb, if needed, to modify it. */
	if (skb_cow(skb, sizeof(struct ethhdr)) < 0)
		goto out;
987

988
	icmp_packet = (struct icmp_packet *)skb->data;
989

990
	memcpy(icmp_packet->dst, icmp_packet->orig, ETH_ALEN);
991
	memcpy(icmp_packet->orig, primary_if->net_dev->dev_addr, ETH_ALEN);
992 993 994
	icmp_packet->msg_type = TTL_EXCEEDED;
	icmp_packet->ttl = TTL;

995
	send_skb_packet(skb, router->if_incoming, router->addr);
996
	ret = NET_RX_SUCCESS;
997

998
out:
999 1000
	if (primary_if)
		hardif_free_ref(primary_if);
1001 1002
	if (router)
		neigh_node_free_ref(router);
1003
	if (orig_node)
1004
		orig_node_free_ref(orig_node);
1005 1006 1007 1008
	return ret;
}


1009
int recv_icmp_packet(struct sk_buff *skb, struct hard_iface *recv_if)
1010 1011 1012 1013
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
	struct icmp_packet_rr *icmp_packet;
	struct ethhdr *ethhdr;
1014
	struct orig_node *orig_node = NULL;
1015
	struct neigh_node *router = NULL;
1016
	int hdr_size = sizeof(struct icmp_packet);
1017
	int ret = NET_RX_DROP;
1018 1019 1020 1021 1022 1023 1024 1025 1026

	/**
	 * we truncate all incoming icmp packets if they don't match our size
	 */
	if (skb->len >= sizeof(struct icmp_packet_rr))
		hdr_size = sizeof(struct icmp_packet_rr);

	/* drop packet if it has not necessary minimum size */
	if (unlikely(!pskb_may_pull(skb, hdr_size)))
1027
		goto out;
1028 1029 1030 1031 1032

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with unicast indication but broadcast recipient */
	if (is_broadcast_ether_addr(ethhdr->h_dest))
1033
		goto out;
1034 1035 1036

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
1037
		goto out;
1038 1039 1040

	/* not for me */
	if (!is_my_mac(ethhdr->h_dest))
1041
		goto out;
1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058

	icmp_packet = (struct icmp_packet_rr *)skb->data;

	/* add record route information if not full */
	if ((hdr_size == sizeof(struct icmp_packet_rr)) &&
	    (icmp_packet->rr_cur < BAT_RR_LEN)) {
		memcpy(&(icmp_packet->rr[icmp_packet->rr_cur]),
			ethhdr->h_dest, ETH_ALEN);
		icmp_packet->rr_cur++;
	}

	/* packet for me */
	if (is_my_mac(icmp_packet->dst))
		return recv_my_icmp_packet(bat_priv, skb, hdr_size);

	/* TTL exceeded */
	if (icmp_packet->ttl < 2)
1059
		return recv_icmp_ttl_exceeded(bat_priv, skb);
1060 1061

	/* get routing information */
1062
	orig_node = orig_hash_find(bat_priv, icmp_packet->dst);
1063
	if (!orig_node)
1064
		goto out;
1065

1066 1067 1068
	router = orig_node_get_router(orig_node);
	if (!router)
		goto out;
1069

1070 1071 1072
	/* create a copy of the skb, if needed, to modify it. */
	if (skb_cow(skb, sizeof(struct ethhdr)) < 0)
		goto out;
1073

1074
	icmp_packet = (struct icmp_packet_rr *)skb->data;
1075

1076 1077 1078 1079
	/* decrement ttl */
	icmp_packet->ttl--;

	/* route it */
1080
	send_skb_packet(skb, router->if_incoming, router->addr);
1081
	ret = NET_RX_SUCCESS;
1082

1083
out:
1084 1085
	if (router)
		neigh_node_free_ref(router);
1086
	if (orig_node)
1087
		orig_node_free_ref(orig_node);
1088 1089 1090
	return ret;
}

1091 1092 1093 1094 1095 1096
/* In the bonding case, send the packets in a round
 * robin fashion over the remaining interfaces.
 *
 * This method rotates the bonding list and increases the
 * returned router's refcount. */
static struct neigh_node *find_bond_router(struct orig_node *primary_orig,
1097
					   const struct hard_iface *recv_if)
1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147
{
	struct neigh_node *tmp_neigh_node;
	struct neigh_node *router = NULL, *first_candidate = NULL;

	rcu_read_lock();
	list_for_each_entry_rcu(tmp_neigh_node, &primary_orig->bond_list,
				bonding_list) {
		if (!first_candidate)
			first_candidate = tmp_neigh_node;

		/* recv_if == NULL on the first node. */
		if (tmp_neigh_node->if_incoming == recv_if)
			continue;

		if (!atomic_inc_not_zero(&tmp_neigh_node->refcount))
			continue;

		router = tmp_neigh_node;
		break;
	}

	/* use the first candidate if nothing was found. */
	if (!router && first_candidate &&
	    atomic_inc_not_zero(&first_candidate->refcount))
		router = first_candidate;

	if (!router)
		goto out;

	/* selected should point to the next element
	 * after the current router */
	spin_lock_bh(&primary_orig->neigh_list_lock);
	/* this is a list_move(), which unfortunately
	 * does not exist as rcu version */
	list_del_rcu(&primary_orig->bond_list);
	list_add_rcu(&primary_orig->bond_list,
		     &router->bonding_list);
	spin_unlock_bh(&primary_orig->neigh_list_lock);

out:
	rcu_read_unlock();
	return router;
}

/* Interface Alternating: Use the best of the
 * remaining candidates which are not using
 * this interface.
 *
 * Increases the returned router's refcount */
static struct neigh_node *find_ifalter_router(struct orig_node *primary_orig,
1148
					      const struct hard_iface *recv_if)
1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190
{
	struct neigh_node *tmp_neigh_node;
	struct neigh_node *router = NULL, *first_candidate = NULL;

	rcu_read_lock();
	list_for_each_entry_rcu(tmp_neigh_node, &primary_orig->bond_list,
				bonding_list) {
		if (!first_candidate)
			first_candidate = tmp_neigh_node;

		/* recv_if == NULL on the first node. */
		if (tmp_neigh_node->if_incoming == recv_if)
			continue;

		if (!atomic_inc_not_zero(&tmp_neigh_node->refcount))
			continue;

		/* if we don't have a router yet
		 * or this one is better, choose it. */
		if ((!router) ||
		    (tmp_neigh_node->tq_avg > router->tq_avg)) {
			/* decrement refcount of
			 * previously selected router */
			if (router)
				neigh_node_free_ref(router);

			router = tmp_neigh_node;
			atomic_inc_not_zero(&router->refcount);
		}

		neigh_node_free_ref(tmp_neigh_node);
	}

	/* use the first candidate if nothing was found. */
	if (!router && first_candidate &&
	    atomic_inc_not_zero(&first_candidate->refcount))
		router = first_candidate;

	rcu_read_unlock();
	return router;
}

1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254
int recv_tt_query(struct sk_buff *skb, struct hard_iface *recv_if)
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
	struct tt_query_packet *tt_query;
	struct ethhdr *ethhdr;

	/* drop packet if it has not necessary minimum size */
	if (unlikely(!pskb_may_pull(skb, sizeof(struct tt_query_packet))))
		goto out;

	/* I could need to modify it */
	if (skb_cow(skb, sizeof(struct tt_query_packet)) < 0)
		goto out;

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with unicast indication but broadcast recipient */
	if (is_broadcast_ether_addr(ethhdr->h_dest))
		goto out;

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
		goto out;

	tt_query = (struct tt_query_packet *)skb->data;

	tt_query->tt_data = ntohs(tt_query->tt_data);

	switch (tt_query->flags & TT_QUERY_TYPE_MASK) {
	case TT_REQUEST:
		/* If we cannot provide an answer the tt_request is
		 * forwarded */
		if (!send_tt_response(bat_priv, tt_query)) {
			bat_dbg(DBG_TT, bat_priv,
				"Routing TT_REQUEST to %pM [%c]\n",
				tt_query->dst,
				(tt_query->flags & TT_FULL_TABLE ? 'F' : '.'));
			tt_query->tt_data = htons(tt_query->tt_data);
			return route_unicast_packet(skb, recv_if);
		}
		break;
	case TT_RESPONSE:
		/* packet needs to be linearised to access the TT changes */
		if (skb_linearize(skb) < 0)
			goto out;

		if (is_my_mac(tt_query->dst))
			handle_tt_response(bat_priv, tt_query);
		else {
			bat_dbg(DBG_TT, bat_priv,
				"Routing TT_RESPONSE to %pM [%c]\n",
				tt_query->dst,
				(tt_query->flags & TT_FULL_TABLE ? 'F' : '.'));
			tt_query->tt_data = htons(tt_query->tt_data);
			return route_unicast_packet(skb, recv_if);
		}
		break;
	}

out:
	/* returning NET_RX_DROP will make the caller function kfree the skb */
	return NET_RX_DROP;
}

1255
/* find a suitable router for this originator, and use
1256 1257
 * bonding if possible. increases the found neighbors
 * refcount.*/
1258 1259
struct neigh_node *find_router(struct bat_priv *bat_priv,
			       struct orig_node *orig_node,
1260
			       const struct hard_iface *recv_if)
1261 1262 1263
{
	struct orig_node *primary_orig_node;
	struct orig_node *router_orig;
1264
	struct neigh_node *router;
1265 1266 1267 1268 1269 1270
	static uint8_t zero_mac[ETH_ALEN] = {0, 0, 0, 0, 0, 0};
	int bonding_enabled;

	if (!orig_node)
		return NULL;

1271 1272
	router = orig_node_get_router(orig_node);
	if (!router)
1273
		goto err;
1274 1275 1276 1277 1278

	/* without bonding, the first node should
	 * always choose the default router. */
	bonding_enabled = atomic_read(&bat_priv->bonding);

1279 1280
	rcu_read_lock();
	/* select default router to output */
1281
	router_orig = router->orig_node;
1282 1283
	if (!router_orig)
		goto err_unlock;
1284 1285 1286

	if ((!recv_if) && (!bonding_enabled))
		goto return_router;
1287 1288 1289

	/* if we have something in the primary_addr, we can search
	 * for a potential bonding candidate. */
1290
	if (compare_eth(router_orig->primary_addr, zero_mac))
1291
		goto return_router;
1292 1293 1294 1295

	/* find the orig_node which has the primary interface. might
	 * even be the same as our router_orig in many cases */

1296
	if (compare_eth(router_orig->primary_addr, router_orig->orig)) {
1297 1298
		primary_orig_node = router_orig;
	} else {
1299 1300
		primary_orig_node = orig_hash_find(bat_priv,
						   router_orig->primary_addr);
1301
		if (!primary_orig_node)
1302
			goto return_router;
1303

1304
		orig_node_free_ref(primary_orig_node);
1305 1306 1307 1308
	}

	/* with less than 2 candidates, we can't do any
	 * bonding and prefer the original router. */
1309 1310
	if (atomic_read(&primary_orig_node->bond_candidates) < 2)
		goto return_router;
1311 1312 1313 1314

	/* all nodes between should choose a candidate which
	 * is is not on the interface where the packet came
	 * in. */
1315

1316
	neigh_node_free_ref(router);
1317

1318 1319 1320 1321
	if (bonding_enabled)
		router = find_bond_router(primary_orig_node, recv_if);
	else
		router = find_ifalter_router(primary_orig_node, recv_if);
1322

1323
return_router:
1324 1325 1326
	if (router && router->if_incoming->if_status != IF_ACTIVE)
		goto err_unlock;

1327
	rcu_read_unlock();
1328
	return router;
1329 1330 1331 1332 1333 1334
err_unlock:
	rcu_read_unlock();
err:
	if (router)
		neigh_node_free_ref(router);
	return NULL;
1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361
}

static int check_unicast_packet(struct sk_buff *skb, int hdr_size)
{
	struct ethhdr *ethhdr;

	/* drop packet if it has not necessary minimum size */
	if (unlikely(!pskb_may_pull(skb, hdr_size)))
		return -1;

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with unicast indication but broadcast recipient */
	if (is_broadcast_ether_addr(ethhdr->h_dest))
		return -1;

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
		return -1;

	/* not for me */
	if (!is_my_mac(ethhdr->h_dest))
		return -1;

	return 0;
}

1362
int route_unicast_packet(struct sk_buff *skb, struct hard_iface *recv_if)
1363 1364
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1365 1366
	struct orig_node *orig_node = NULL;
	struct neigh_node *neigh_node = NULL;
1367 1368
	struct unicast_packet *unicast_packet;
	struct ethhdr *ethhdr = (struct ethhdr *)skb_mac_header(skb);
1369
	int ret = NET_RX_DROP;
1370 1371 1372 1373 1374 1375 1376 1377 1378
	struct sk_buff *new_skb;

	unicast_packet = (struct unicast_packet *)skb->data;

	/* TTL exceeded */
	if (unicast_packet->ttl < 2) {
		pr_debug("Warning - can't forward unicast packet from %pM to "
			 "%pM: ttl exceeded\n", ethhdr->h_source,
			 unicast_packet->dest);
1379
		goto out;
1380 1381 1382
	}

	/* get routing information */
1383 1384
	orig_node = orig_hash_find(bat_priv, unicast_packet->dest);

1385
	if (!orig_node)
1386
		goto out;
1387

1388
	/* find_router() increases neigh_nodes refcount if found. */
1389
	neigh_node = find_router(bat_priv, orig_node, recv_if);
1390

1391
	if (!neigh_node)
1392
		goto out;
1393 1394 1395

	/* create a copy of the skb, if needed, to modify it. */
	if (skb_cow(skb, sizeof(struct ethhdr)) < 0)
1396
		goto out;
1397 1398 1399 1400 1401

	unicast_packet = (struct unicast_packet *)skb->data;

	if (unicast_packet->packet_type == BAT_UNICAST &&
	    atomic_read(&bat_priv->fragmentation) &&
1402 1403 1404 1405 1406
	    skb->len > neigh_node->if_incoming->net_dev->mtu) {
		ret = frag_send_skb(skb, bat_priv,
				    neigh_node->if_incoming, neigh_node->addr);
		goto out;
	}
1407 1408

	if (unicast_packet->packet_type == BAT_UNICAST_FRAG &&
1409
	    frag_can_reassemble(skb, neigh_node->if_incoming->net_dev->mtu)) {
1410 1411 1412 1413

		ret = frag_reassemble_skb(skb, bat_priv, &new_skb);

		if (ret == NET_RX_DROP)
1414
			goto out;
1415 1416

		/* packet was buffered for late merge */
1417 1418 1419 1420
		if (!new_skb) {
			ret = NET_RX_SUCCESS;
			goto out;
		}
1421 1422 1423 1424 1425 1426 1427 1428 1429

		skb = new_skb;
		unicast_packet = (struct unicast_packet *)skb->data;
	}

	/* decrement ttl */
	unicast_packet->ttl--;

	/* route it */
1430
	send_skb_packet(skb, neigh_node->if_incoming, neigh_node->addr);
1431
	ret = NET_RX_SUCCESS;
1432

1433 1434 1435 1436
out:
	if (neigh_node)
		neigh_node_free_ref(neigh_node);
	if (orig_node)
1437
		orig_node_free_ref(orig_node);
1438
	return ret;
1439 1440
}

1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504
static int check_unicast_ttvn(struct bat_priv *bat_priv,
			       struct sk_buff *skb) {
	uint8_t curr_ttvn;
	struct orig_node *orig_node;
	struct ethhdr *ethhdr;
	struct hard_iface *primary_if;
	struct unicast_packet *unicast_packet;

	/* I could need to modify it */
	if (skb_cow(skb, sizeof(struct unicast_packet)) < 0)
		return 0;

	unicast_packet = (struct unicast_packet *)skb->data;

	if (is_my_mac(unicast_packet->dest))
		curr_ttvn = (uint8_t)atomic_read(&bat_priv->ttvn);
	else {
		orig_node = orig_hash_find(bat_priv, unicast_packet->dest);

		if (!orig_node)
			return 0;

		curr_ttvn = (uint8_t)atomic_read(&orig_node->last_ttvn);
		orig_node_free_ref(orig_node);
	}

	/* Check whether I have to reroute the packet */
	if (seq_before(unicast_packet->ttvn, curr_ttvn)) {
		/* Linearize the skb before accessing it */
		if (skb_linearize(skb) < 0)
			return 0;

		ethhdr = (struct ethhdr *)(skb->data +
			sizeof(struct unicast_packet));

		orig_node = transtable_search(bat_priv, ethhdr->h_dest);

		if (!orig_node) {
			if (!is_my_client(bat_priv, ethhdr->h_dest))
				return 0;
			primary_if = primary_if_get_selected(bat_priv);
			if (!primary_if)
				return 0;
			memcpy(unicast_packet->dest,
			       primary_if->net_dev->dev_addr, ETH_ALEN);
			hardif_free_ref(primary_if);
		} else {
			memcpy(unicast_packet->dest, orig_node->orig,
			       ETH_ALEN);
			curr_ttvn = (uint8_t)
				atomic_read(&orig_node->last_ttvn);
			orig_node_free_ref(orig_node);
		}

		bat_dbg(DBG_ROUTES, bat_priv, "TTVN mismatch (old_ttvn %u "
			"new_ttvn %u)! Rerouting unicast packet (for %pM) to "
			"%pM\n", unicast_packet->ttvn, curr_ttvn,
			ethhdr->h_dest, unicast_packet->dest);

		unicast_packet->ttvn = curr_ttvn;
	}
	return 1;
}

1505
int recv_unicast_packet(struct sk_buff *skb, struct hard_iface *recv_if)
1506
{
1507
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1508
	struct unicast_packet *unicast_packet;
1509
	int hdr_size = sizeof(*unicast_packet);
1510 1511 1512 1513

	if (check_unicast_packet(skb, hdr_size) < 0)
		return NET_RX_DROP;

1514 1515 1516
	if (!check_unicast_ttvn(bat_priv, skb))
		return NET_RX_DROP;

1517 1518 1519 1520 1521 1522 1523 1524
	unicast_packet = (struct unicast_packet *)skb->data;

	/* packet for me */
	if (is_my_mac(unicast_packet->dest)) {
		interface_rx(recv_if->soft_iface, skb, recv_if, hdr_size);
		return NET_RX_SUCCESS;
	}

1525
	return route_unicast_packet(skb, recv_if);
1526 1527
}

1528
int recv_ucast_frag_packet(struct sk_buff *skb, struct hard_iface *recv_if)
1529 1530 1531
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
	struct unicast_frag_packet *unicast_packet;
1532
	int hdr_size = sizeof(*unicast_packet);
1533 1534 1535 1536 1537 1538
	struct sk_buff *new_skb = NULL;
	int ret;

	if (check_unicast_packet(skb, hdr_size) < 0)
		return NET_RX_DROP;

1539 1540 1541
	if (!check_unicast_ttvn(bat_priv, skb))
		return NET_RX_DROP;

1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560
	unicast_packet = (struct unicast_frag_packet *)skb->data;

	/* packet for me */
	if (is_my_mac(unicast_packet->dest)) {

		ret = frag_reassemble_skb(skb, bat_priv, &new_skb);

		if (ret == NET_RX_DROP)
			return NET_RX_DROP;

		/* packet was buffered for late merge */
		if (!new_skb)
			return NET_RX_SUCCESS;

		interface_rx(recv_if->soft_iface, new_skb, recv_if,
			     sizeof(struct unicast_packet));
		return NET_RX_SUCCESS;
	}

1561
	return route_unicast_packet(skb, recv_if);
1562 1563 1564
}


1565
int recv_bcast_packet(struct sk_buff *skb, struct hard_iface *recv_if)
1566 1567
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1568
	struct orig_node *orig_node = NULL;
1569 1570
	struct bcast_packet *bcast_packet;
	struct ethhdr *ethhdr;
1571
	int hdr_size = sizeof(*bcast_packet);
1572
	int ret = NET_RX_DROP;
1573 1574 1575 1576
	int32_t seq_diff;

	/* drop packet if it has not necessary minimum size */
	if (unlikely(!pskb_may_pull(skb, hdr_size)))
1577
		goto out;
1578 1579 1580 1581 1582

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with broadcast indication but unicast recipient */
	if (!is_broadcast_ether_addr(ethhdr->h_dest))
1583
		goto out;
1584 1585 1586

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
1587
		goto out;
1588 1589 1590

	/* ignore broadcasts sent by myself */
	if (is_my_mac(ethhdr->h_source))
1591
		goto out;
1592 1593 1594 1595 1596

	bcast_packet = (struct bcast_packet *)skb->data;

	/* ignore broadcasts originated by myself */
	if (is_my_mac(bcast_packet->orig))
1597
		goto out;
1598 1599

	if (bcast_packet->ttl < 2)
1600
		goto out;
1601

1602
	orig_node = orig_hash_find(bat_priv, bcast_packet->orig);
1603 1604

	if (!orig_node)
1605
		goto out;
1606

1607
	spin_lock_bh(&orig_node->bcast_seqno_lock);
1608 1609

	/* check whether the packet is a duplicate */
1610 1611 1612
	if (get_bit_status(orig_node->bcast_bits, orig_node->last_bcast_seqno,
			   ntohl(bcast_packet->seqno)))
		goto spin_unlock;
1613 1614 1615 1616 1617

	seq_diff = ntohl(bcast_packet->seqno) - orig_node->last_bcast_seqno;

	/* check whether the packet is old and the host just restarted. */
	if (window_protected(bat_priv, seq_diff,
1618 1619
			     &orig_node->bcast_seqno_reset))
		goto spin_unlock;
1620 1621 1622 1623 1624 1625

	/* mark broadcast in flood history, update window position
	 * if required. */
	if (bit_get_packet(bat_priv, orig_node->bcast_bits, seq_diff, 1))
		orig_node->last_bcast_seqno = ntohl(bcast_packet->seqno);

1626 1627
	spin_unlock_bh(&orig_node->bcast_seqno_lock);

1628 1629 1630 1631 1632
	/* rebroadcast packet */
	add_bcast_packet_to_list(bat_priv, skb);

	/* broadcast for me */
	interface_rx(recv_if->soft_iface, skb, recv_if, hdr_size);
1633 1634
	ret = NET_RX_SUCCESS;
	goto out;
1635

1636 1637 1638 1639
spin_unlock:
	spin_unlock_bh(&orig_node->bcast_seqno_lock);
out:
	if (orig_node)
1640
		orig_node_free_ref(orig_node);
1641
	return ret;
1642 1643
}

1644
int recv_vis_packet(struct sk_buff *skb, struct hard_iface *recv_if)
1645 1646 1647 1648
{
	struct vis_packet *vis_packet;
	struct ethhdr *ethhdr;
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1649
	int hdr_size = sizeof(*vis_packet);
1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690

	/* keep skb linear */
	if (skb_linearize(skb) < 0)
		return NET_RX_DROP;

	if (unlikely(!pskb_may_pull(skb, hdr_size)))
		return NET_RX_DROP;

	vis_packet = (struct vis_packet *)skb->data;
	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* not for me */
	if (!is_my_mac(ethhdr->h_dest))
		return NET_RX_DROP;

	/* ignore own packets */
	if (is_my_mac(vis_packet->vis_orig))
		return NET_RX_DROP;

	if (is_my_mac(vis_packet->sender_orig))
		return NET_RX_DROP;

	switch (vis_packet->vis_type) {
	case VIS_TYPE_SERVER_SYNC:
		receive_server_sync_packet(bat_priv, vis_packet,
					   skb_headlen(skb));
		break;

	case VIS_TYPE_CLIENT_UPDATE:
		receive_client_update_packet(bat_priv, vis_packet,
					     skb_headlen(skb));
		break;

	default:	/* ignore unknown packet */
		break;
	}

	/* We take a copy of the data in the packet, so we should
	   always free the skbuf. */
	return NET_RX_DROP;
}