routing.c 29.4 KB
Newer Older
1
/*
2
 * Copyright (C) 2007-2012 B.A.T.M.A.N. contributors:
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
 *
 * Marek Lindner, Simon Wunderlich
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of version 2 of the GNU General Public
 * License as published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
 * General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
 * 02110-1301, USA
 *
 */

#include "main.h"
#include "routing.h"
#include "send.h"
#include "soft-interface.h"
#include "hard-interface.h"
#include "icmp_socket.h"
#include "translation-table.h"
#include "originator.h"
#include "vis.h"
#include "unicast.h"

33 34 35
static int route_unicast_packet(struct sk_buff *skb,
				struct hard_iface *recv_if);

36
void slide_own_bcast_window(struct hard_iface *hard_iface)
37
{
38
	struct bat_priv *bat_priv = netdev_priv(hard_iface->soft_iface);
39
	struct hashtable_t *hash = bat_priv->orig_hash;
40
	struct hlist_node *node;
41 42 43
	struct hlist_head *head;
	struct orig_node *orig_node;
	unsigned long *word;
44
	uint32_t i;
45 46 47 48 49
	size_t word_index;

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

50
		rcu_read_lock();
51
		hlist_for_each_entry_rcu(orig_node, node, head, hash_entry) {
52
			spin_lock_bh(&orig_node->ogm_cnt_lock);
53
			word_index = hard_iface->if_num * NUM_WORDS;
54 55 56
			word = &(orig_node->bcast_own[word_index]);

			bit_get_packet(bat_priv, word, 1, 0);
57
			orig_node->bcast_own_sum[hard_iface->if_num] =
58
				bitmap_weight(word, TQ_LOCAL_WINDOW_SIZE);
59
			spin_unlock_bh(&orig_node->ogm_cnt_lock);
60
		}
61
		rcu_read_unlock();
62 63 64
	}
}

65 66 67
static void _update_route(struct bat_priv *bat_priv,
			  struct orig_node *orig_node,
			  struct neigh_node *neigh_node)
68
{
69 70 71
	struct neigh_node *curr_router;

	curr_router = orig_node_get_router(orig_node);
72

73
	/* route deleted */
74
	if ((curr_router) && (!neigh_node)) {
75 76
		bat_dbg(DBG_ROUTES, bat_priv, "Deleting route towards: %pM\n",
			orig_node->orig);
77
		tt_global_del_orig(bat_priv, orig_node,
78
				   "Deleted route towards originator");
79

80 81
	/* route added */
	} else if ((!curr_router) && (neigh_node)) {
82 83 84 85

		bat_dbg(DBG_ROUTES, bat_priv,
			"Adding route towards: %pM (via %pM)\n",
			orig_node->orig, neigh_node->addr);
86
	/* route changed */
87
	} else if (neigh_node && curr_router) {
88
		bat_dbg(DBG_ROUTES, bat_priv,
89
			"Changing route towards: %pM (now via %pM - was via %pM)\n",
90
			orig_node->orig, neigh_node->addr,
91
			curr_router->addr);
92 93
	}

94 95 96 97
	if (curr_router)
		neigh_node_free_ref(curr_router);

	/* increase refcount of new best neighbor */
98 99
	if (neigh_node && !atomic_inc_not_zero(&neigh_node->refcount))
		neigh_node = NULL;
100 101 102 103 104 105 106 107

	spin_lock_bh(&orig_node->neigh_list_lock);
	rcu_assign_pointer(orig_node->router, neigh_node);
	spin_unlock_bh(&orig_node->neigh_list_lock);

	/* decrease refcount of previous best neighbor */
	if (curr_router)
		neigh_node_free_ref(curr_router);
108 109
}

110 111
void update_route(struct bat_priv *bat_priv, struct orig_node *orig_node,
		  struct neigh_node *neigh_node)
112
{
113
	struct neigh_node *router = NULL;
114 115

	if (!orig_node)
116 117 118
		goto out;

	router = orig_node_get_router(orig_node);
119

120
	if (router != neigh_node)
121
		_update_route(bat_priv, orig_node, neigh_node);
122 123 124 125

out:
	if (router)
		neigh_node_free_ref(router);
126 127
}

128 129 130 131 132 133 134 135 136 137
/* caller must hold the neigh_list_lock */
void bonding_candidate_del(struct orig_node *orig_node,
			   struct neigh_node *neigh_node)
{
	/* this neighbor is not part of our candidate list */
	if (list_empty(&neigh_node->bonding_list))
		goto out;

	list_del_rcu(&neigh_node->bonding_list);
	INIT_LIST_HEAD(&neigh_node->bonding_list);
138
	neigh_node_free_ref(neigh_node);
139 140 141 142 143 144
	atomic_dec(&orig_node->bond_candidates);

out:
	return;
}

145 146
void bonding_candidate_add(struct orig_node *orig_node,
			   struct neigh_node *neigh_node)
147 148
{
	struct hlist_node *node;
149 150
	struct neigh_node *tmp_neigh_node, *router = NULL;
	uint8_t interference_candidate = 0;
151 152 153 154

	spin_lock_bh(&orig_node->neigh_list_lock);

	/* only consider if it has the same primary address ...  */
155 156
	if (!compare_eth(orig_node->orig,
			 neigh_node->orig_node->primary_addr))
157 158
		goto candidate_del;

159 160
	router = orig_node_get_router(orig_node);
	if (!router)
161 162 163
		goto candidate_del;

	/* ... and is good enough to be considered */
164
	if (neigh_node->tq_avg < router->tq_avg - BONDING_TQ_THRESHOLD)
165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183
		goto candidate_del;

	/**
	 * check if we have another candidate with the same mac address or
	 * interface. If we do, we won't select this candidate because of
	 * possible interference.
	 */
	hlist_for_each_entry_rcu(tmp_neigh_node, node,
				 &orig_node->neigh_list, list) {

		if (tmp_neigh_node == neigh_node)
			continue;

		/* we only care if the other candidate is even
		* considered as candidate. */
		if (list_empty(&tmp_neigh_node->bonding_list))
			continue;

		if ((neigh_node->if_incoming == tmp_neigh_node->if_incoming) ||
184
		    (compare_eth(neigh_node->addr, tmp_neigh_node->addr))) {
185 186 187 188 189 190 191 192 193 194 195 196 197
			interference_candidate = 1;
			break;
		}
	}

	/* don't care further if it is an interference candidate */
	if (interference_candidate)
		goto candidate_del;

	/* this neighbor already is part of our candidate list */
	if (!list_empty(&neigh_node->bonding_list))
		goto out;

198 199 200
	if (!atomic_inc_not_zero(&neigh_node->refcount))
		goto out;

201 202 203 204 205 206 207 208 209
	list_add_rcu(&neigh_node->bonding_list, &orig_node->bond_list);
	atomic_inc(&orig_node->bond_candidates);
	goto out;

candidate_del:
	bonding_candidate_del(orig_node, neigh_node);

out:
	spin_unlock_bh(&orig_node->neigh_list_lock);
210 211 212

	if (router)
		neigh_node_free_ref(router);
213 214 215
}

/* copy primary address for bonding */
216 217 218
void bonding_save_primary(const struct orig_node *orig_node,
			  struct orig_node *orig_neigh_node,
			  const struct batman_ogm_packet *batman_ogm_packet)
219
{
220
	if (!(batman_ogm_packet->flags & PRIMARIES_FIRST_HOP))
221 222 223 224 225
		return;

	memcpy(orig_neigh_node->primary_addr, orig_node->orig, ETH_ALEN);
}

226 227 228 229 230
/* checks whether the host restarted and is in the protection time.
 * returns:
 *  0 if the packet is to be accepted
 *  1 if the packet is to be ignored.
 */
231 232
int window_protected(struct bat_priv *bat_priv, int32_t seq_num_diff,
		     unsigned long *last_reset)
233
{
234 235
	if ((seq_num_diff <= -TQ_LOCAL_WINDOW_SIZE) ||
	    (seq_num_diff >= EXPECTED_SEQNO_RANGE)) {
236
		if (has_timed_out(*last_reset, RESET_PROTECTION_MS)) {
237 238 239 240 241 242

			*last_reset = jiffies;
			bat_dbg(DBG_BATMAN, bat_priv,
				"old packet received, start protection\n");

			return 0;
243
		} else {
244
			return 1;
245
		}
246 247 248 249
	}
	return 0;
}

250
int recv_bat_ogm_packet(struct sk_buff *skb, struct hard_iface *hard_iface)
251
{
252
	struct bat_priv *bat_priv = netdev_priv(hard_iface->soft_iface);
253 254 255
	struct ethhdr *ethhdr;

	/* drop packet if it has not necessary minimum size */
256
	if (unlikely(!pskb_may_pull(skb, BATMAN_OGM_LEN)))
257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276
		return NET_RX_DROP;

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with broadcast indication but unicast recipient */
	if (!is_broadcast_ether_addr(ethhdr->h_dest))
		return NET_RX_DROP;

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
		return NET_RX_DROP;

	/* create a copy of the skb, if needed, to modify it. */
	if (skb_cow(skb, 0) < 0)
		return NET_RX_DROP;

	/* keep skb linear */
	if (skb_linearize(skb) < 0)
		return NET_RX_DROP;

277
	bat_priv->bat_algo_ops->bat_ogm_receive(hard_iface, skb);
278 279 280 281 282 283 284 285

	kfree_skb(skb);
	return NET_RX_SUCCESS;
}

static int recv_my_icmp_packet(struct bat_priv *bat_priv,
			       struct sk_buff *skb, size_t icmp_len)
{
286
	struct hard_iface *primary_if = NULL;
287
	struct orig_node *orig_node = NULL;
288
	struct neigh_node *router = NULL;
289
	struct icmp_packet_rr *icmp_packet;
290
	int ret = NET_RX_DROP;
291 292 293 294 295 296

	icmp_packet = (struct icmp_packet_rr *)skb->data;

	/* add data to device queue */
	if (icmp_packet->msg_type != ECHO_REQUEST) {
		bat_socket_receive_packet(icmp_packet, icmp_len);
297
		goto out;
298 299
	}

300 301
	primary_if = primary_if_get_selected(bat_priv);
	if (!primary_if)
302
		goto out;
303 304 305

	/* answer echo request (ping) */
	/* get routing information */
306
	orig_node = orig_hash_find(bat_priv, icmp_packet->orig);
307
	if (!orig_node)
308
		goto out;
309

310 311 312
	router = orig_node_get_router(orig_node);
	if (!router)
		goto out;
313

314 315 316 317 318 319 320
	/* create a copy of the skb, if needed, to modify it. */
	if (skb_cow(skb, sizeof(struct ethhdr)) < 0)
		goto out;

	icmp_packet = (struct icmp_packet_rr *)skb->data;

	memcpy(icmp_packet->dst, icmp_packet->orig, ETH_ALEN);
321
	memcpy(icmp_packet->orig, primary_if->net_dev->dev_addr, ETH_ALEN);
322
	icmp_packet->msg_type = ECHO_REPLY;
323
	icmp_packet->header.ttl = TTL;
324

325
	send_skb_packet(skb, router->if_incoming, router->addr);
326
	ret = NET_RX_SUCCESS;
327

328
out:
329 330
	if (primary_if)
		hardif_free_ref(primary_if);
331 332
	if (router)
		neigh_node_free_ref(router);
333
	if (orig_node)
334
		orig_node_free_ref(orig_node);
335 336 337 338
	return ret;
}

static int recv_icmp_ttl_exceeded(struct bat_priv *bat_priv,
339
				  struct sk_buff *skb)
340
{
341
	struct hard_iface *primary_if = NULL;
342
	struct orig_node *orig_node = NULL;
343
	struct neigh_node *router = NULL;
344
	struct icmp_packet *icmp_packet;
345
	int ret = NET_RX_DROP;
346 347 348 349 350

	icmp_packet = (struct icmp_packet *)skb->data;

	/* send TTL exceeded if packet is an echo request (traceroute) */
	if (icmp_packet->msg_type != ECHO_REQUEST) {
351 352
		pr_debug("Warning - can't forward icmp packet from %pM to %pM: ttl exceeded\n",
			 icmp_packet->orig, icmp_packet->dst);
353
		goto out;
354 355
	}

356 357
	primary_if = primary_if_get_selected(bat_priv);
	if (!primary_if)
358
		goto out;
359 360

	/* get routing information */
361
	orig_node = orig_hash_find(bat_priv, icmp_packet->orig);
362
	if (!orig_node)
363
		goto out;
364

365 366 367
	router = orig_node_get_router(orig_node);
	if (!router)
		goto out;
368

369 370 371
	/* create a copy of the skb, if needed, to modify it. */
	if (skb_cow(skb, sizeof(struct ethhdr)) < 0)
		goto out;
372

373
	icmp_packet = (struct icmp_packet *)skb->data;
374

375
	memcpy(icmp_packet->dst, icmp_packet->orig, ETH_ALEN);
376
	memcpy(icmp_packet->orig, primary_if->net_dev->dev_addr, ETH_ALEN);
377
	icmp_packet->msg_type = TTL_EXCEEDED;
378
	icmp_packet->header.ttl = TTL;
379

380
	send_skb_packet(skb, router->if_incoming, router->addr);
381
	ret = NET_RX_SUCCESS;
382

383
out:
384 385
	if (primary_if)
		hardif_free_ref(primary_if);
386 387
	if (router)
		neigh_node_free_ref(router);
388
	if (orig_node)
389
		orig_node_free_ref(orig_node);
390 391 392 393
	return ret;
}


394
int recv_icmp_packet(struct sk_buff *skb, struct hard_iface *recv_if)
395 396 397 398
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
	struct icmp_packet_rr *icmp_packet;
	struct ethhdr *ethhdr;
399
	struct orig_node *orig_node = NULL;
400
	struct neigh_node *router = NULL;
401
	int hdr_size = sizeof(struct icmp_packet);
402
	int ret = NET_RX_DROP;
403 404 405 406 407 408 409 410 411

	/**
	 * we truncate all incoming icmp packets if they don't match our size
	 */
	if (skb->len >= sizeof(struct icmp_packet_rr))
		hdr_size = sizeof(struct icmp_packet_rr);

	/* drop packet if it has not necessary minimum size */
	if (unlikely(!pskb_may_pull(skb, hdr_size)))
412
		goto out;
413 414 415 416 417

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with unicast indication but broadcast recipient */
	if (is_broadcast_ether_addr(ethhdr->h_dest))
418
		goto out;
419 420 421

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
422
		goto out;
423 424 425

	/* not for me */
	if (!is_my_mac(ethhdr->h_dest))
426
		goto out;
427 428 429 430 431 432 433

	icmp_packet = (struct icmp_packet_rr *)skb->data;

	/* add record route information if not full */
	if ((hdr_size == sizeof(struct icmp_packet_rr)) &&
	    (icmp_packet->rr_cur < BAT_RR_LEN)) {
		memcpy(&(icmp_packet->rr[icmp_packet->rr_cur]),
434
		       ethhdr->h_dest, ETH_ALEN);
435 436 437 438 439 440 441 442
		icmp_packet->rr_cur++;
	}

	/* packet for me */
	if (is_my_mac(icmp_packet->dst))
		return recv_my_icmp_packet(bat_priv, skb, hdr_size);

	/* TTL exceeded */
443
	if (icmp_packet->header.ttl < 2)
444
		return recv_icmp_ttl_exceeded(bat_priv, skb);
445 446

	/* get routing information */
447
	orig_node = orig_hash_find(bat_priv, icmp_packet->dst);
448
	if (!orig_node)
449
		goto out;
450

451 452 453
	router = orig_node_get_router(orig_node);
	if (!router)
		goto out;
454

455 456 457
	/* create a copy of the skb, if needed, to modify it. */
	if (skb_cow(skb, sizeof(struct ethhdr)) < 0)
		goto out;
458

459
	icmp_packet = (struct icmp_packet_rr *)skb->data;
460

461
	/* decrement ttl */
462
	icmp_packet->header.ttl--;
463 464

	/* route it */
465
	send_skb_packet(skb, router->if_incoming, router->addr);
466
	ret = NET_RX_SUCCESS;
467

468
out:
469 470
	if (router)
		neigh_node_free_ref(router);
471
	if (orig_node)
472
		orig_node_free_ref(orig_node);
473 474 475
	return ret;
}

476 477 478 479 480 481
/* In the bonding case, send the packets in a round
 * robin fashion over the remaining interfaces.
 *
 * This method rotates the bonding list and increases the
 * returned router's refcount. */
static struct neigh_node *find_bond_router(struct orig_node *primary_orig,
482
					   const struct hard_iface *recv_if)
483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532
{
	struct neigh_node *tmp_neigh_node;
	struct neigh_node *router = NULL, *first_candidate = NULL;

	rcu_read_lock();
	list_for_each_entry_rcu(tmp_neigh_node, &primary_orig->bond_list,
				bonding_list) {
		if (!first_candidate)
			first_candidate = tmp_neigh_node;

		/* recv_if == NULL on the first node. */
		if (tmp_neigh_node->if_incoming == recv_if)
			continue;

		if (!atomic_inc_not_zero(&tmp_neigh_node->refcount))
			continue;

		router = tmp_neigh_node;
		break;
	}

	/* use the first candidate if nothing was found. */
	if (!router && first_candidate &&
	    atomic_inc_not_zero(&first_candidate->refcount))
		router = first_candidate;

	if (!router)
		goto out;

	/* selected should point to the next element
	 * after the current router */
	spin_lock_bh(&primary_orig->neigh_list_lock);
	/* this is a list_move(), which unfortunately
	 * does not exist as rcu version */
	list_del_rcu(&primary_orig->bond_list);
	list_add_rcu(&primary_orig->bond_list,
		     &router->bonding_list);
	spin_unlock_bh(&primary_orig->neigh_list_lock);

out:
	rcu_read_unlock();
	return router;
}

/* Interface Alternating: Use the best of the
 * remaining candidates which are not using
 * this interface.
 *
 * Increases the returned router's refcount */
static struct neigh_node *find_ifalter_router(struct orig_node *primary_orig,
533
					      const struct hard_iface *recv_if)
534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575
{
	struct neigh_node *tmp_neigh_node;
	struct neigh_node *router = NULL, *first_candidate = NULL;

	rcu_read_lock();
	list_for_each_entry_rcu(tmp_neigh_node, &primary_orig->bond_list,
				bonding_list) {
		if (!first_candidate)
			first_candidate = tmp_neigh_node;

		/* recv_if == NULL on the first node. */
		if (tmp_neigh_node->if_incoming == recv_if)
			continue;

		if (!atomic_inc_not_zero(&tmp_neigh_node->refcount))
			continue;

		/* if we don't have a router yet
		 * or this one is better, choose it. */
		if ((!router) ||
		    (tmp_neigh_node->tq_avg > router->tq_avg)) {
			/* decrement refcount of
			 * previously selected router */
			if (router)
				neigh_node_free_ref(router);

			router = tmp_neigh_node;
			atomic_inc_not_zero(&router->refcount);
		}

		neigh_node_free_ref(tmp_neigh_node);
	}

	/* use the first candidate if nothing was found. */
	if (!router && first_candidate &&
	    atomic_inc_not_zero(&first_candidate->refcount))
		router = first_candidate;

	rcu_read_unlock();
	return router;
}

576 577 578 579
int recv_tt_query(struct sk_buff *skb, struct hard_iface *recv_if)
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
	struct tt_query_packet *tt_query;
580
	uint16_t tt_len;
581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618
	struct ethhdr *ethhdr;

	/* drop packet if it has not necessary minimum size */
	if (unlikely(!pskb_may_pull(skb, sizeof(struct tt_query_packet))))
		goto out;

	/* I could need to modify it */
	if (skb_cow(skb, sizeof(struct tt_query_packet)) < 0)
		goto out;

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with unicast indication but broadcast recipient */
	if (is_broadcast_ether_addr(ethhdr->h_dest))
		goto out;

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
		goto out;

	tt_query = (struct tt_query_packet *)skb->data;

	tt_query->tt_data = ntohs(tt_query->tt_data);

	switch (tt_query->flags & TT_QUERY_TYPE_MASK) {
	case TT_REQUEST:
		/* If we cannot provide an answer the tt_request is
		 * forwarded */
		if (!send_tt_response(bat_priv, tt_query)) {
			bat_dbg(DBG_TT, bat_priv,
				"Routing TT_REQUEST to %pM [%c]\n",
				tt_query->dst,
				(tt_query->flags & TT_FULL_TABLE ? 'F' : '.'));
			tt_query->tt_data = htons(tt_query->tt_data);
			return route_unicast_packet(skb, recv_if);
		}
		break;
	case TT_RESPONSE:
619 620 621 622 623
		if (is_my_mac(tt_query->dst)) {
			/* packet needs to be linearized to access the TT
			 * changes */
			if (skb_linearize(skb) < 0)
				goto out;
624

625 626 627 628
			tt_len = tt_query->tt_data * sizeof(struct tt_change);

			/* Ensure we have all the claimed data */
			if (unlikely(skb_headlen(skb) <
629
				     sizeof(struct tt_query_packet) + tt_len))
630 631
				goto out;

632
			handle_tt_response(bat_priv, tt_query);
633
		} else {
634 635 636 637 638 639 640 641 642 643 644 645 646 647 648
			bat_dbg(DBG_TT, bat_priv,
				"Routing TT_RESPONSE to %pM [%c]\n",
				tt_query->dst,
				(tt_query->flags & TT_FULL_TABLE ? 'F' : '.'));
			tt_query->tt_data = htons(tt_query->tt_data);
			return route_unicast_packet(skb, recv_if);
		}
		break;
	}

out:
	/* returning NET_RX_DROP will make the caller function kfree the skb */
	return NET_RX_DROP;
}

649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678
int recv_roam_adv(struct sk_buff *skb, struct hard_iface *recv_if)
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
	struct roam_adv_packet *roam_adv_packet;
	struct orig_node *orig_node;
	struct ethhdr *ethhdr;

	/* drop packet if it has not necessary minimum size */
	if (unlikely(!pskb_may_pull(skb, sizeof(struct roam_adv_packet))))
		goto out;

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with unicast indication but broadcast recipient */
	if (is_broadcast_ether_addr(ethhdr->h_dest))
		goto out;

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
		goto out;

	roam_adv_packet = (struct roam_adv_packet *)skb->data;

	if (!is_my_mac(roam_adv_packet->dst))
		return route_unicast_packet(skb, recv_if);

	orig_node = orig_hash_find(bat_priv, roam_adv_packet->src);
	if (!orig_node)
		goto out;

679 680 681
	bat_dbg(DBG_TT, bat_priv,
		"Received ROAMING_ADV from %pM (client %pM)\n",
		roam_adv_packet->src, roam_adv_packet->client);
682 683

	tt_global_add(bat_priv, orig_node, roam_adv_packet->client,
684
		      atomic_read(&orig_node->last_ttvn) + 1, true, false);
685 686 687 688 689 690 691 692 693 694 695 696

	/* Roaming phase starts: I have new information but the ttvn has not
	 * been incremented yet. This flag will make me check all the incoming
	 * packets for the correct destination. */
	bat_priv->tt_poss_change = true;

	orig_node_free_ref(orig_node);
out:
	/* returning NET_RX_DROP will make the caller function kfree the skb */
	return NET_RX_DROP;
}

697
/* find a suitable router for this originator, and use
698 699
 * bonding if possible. increases the found neighbors
 * refcount.*/
700 701
struct neigh_node *find_router(struct bat_priv *bat_priv,
			       struct orig_node *orig_node,
702
			       const struct hard_iface *recv_if)
703 704 705
{
	struct orig_node *primary_orig_node;
	struct orig_node *router_orig;
706
	struct neigh_node *router;
707 708 709 710 711 712
	static uint8_t zero_mac[ETH_ALEN] = {0, 0, 0, 0, 0, 0};
	int bonding_enabled;

	if (!orig_node)
		return NULL;

713 714
	router = orig_node_get_router(orig_node);
	if (!router)
715
		goto err;
716 717 718 719 720

	/* without bonding, the first node should
	 * always choose the default router. */
	bonding_enabled = atomic_read(&bat_priv->bonding);

721 722
	rcu_read_lock();
	/* select default router to output */
723
	router_orig = router->orig_node;
724 725
	if (!router_orig)
		goto err_unlock;
726 727 728

	if ((!recv_if) && (!bonding_enabled))
		goto return_router;
729 730 731

	/* if we have something in the primary_addr, we can search
	 * for a potential bonding candidate. */
732
	if (compare_eth(router_orig->primary_addr, zero_mac))
733
		goto return_router;
734 735 736 737

	/* find the orig_node which has the primary interface. might
	 * even be the same as our router_orig in many cases */

738
	if (compare_eth(router_orig->primary_addr, router_orig->orig)) {
739 740
		primary_orig_node = router_orig;
	} else {
741 742
		primary_orig_node = orig_hash_find(bat_priv,
						   router_orig->primary_addr);
743
		if (!primary_orig_node)
744
			goto return_router;
745

746
		orig_node_free_ref(primary_orig_node);
747 748 749 750
	}

	/* with less than 2 candidates, we can't do any
	 * bonding and prefer the original router. */
751 752
	if (atomic_read(&primary_orig_node->bond_candidates) < 2)
		goto return_router;
753 754 755 756

	/* all nodes between should choose a candidate which
	 * is is not on the interface where the packet came
	 * in. */
757

758
	neigh_node_free_ref(router);
759

760 761 762 763
	if (bonding_enabled)
		router = find_bond_router(primary_orig_node, recv_if);
	else
		router = find_ifalter_router(primary_orig_node, recv_if);
764

765
return_router:
766 767 768
	if (router && router->if_incoming->if_status != IF_ACTIVE)
		goto err_unlock;

769
	rcu_read_unlock();
770
	return router;
771 772 773 774 775 776
err_unlock:
	rcu_read_unlock();
err:
	if (router)
		neigh_node_free_ref(router);
	return NULL;
777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803
}

static int check_unicast_packet(struct sk_buff *skb, int hdr_size)
{
	struct ethhdr *ethhdr;

	/* drop packet if it has not necessary minimum size */
	if (unlikely(!pskb_may_pull(skb, hdr_size)))
		return -1;

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with unicast indication but broadcast recipient */
	if (is_broadcast_ether_addr(ethhdr->h_dest))
		return -1;

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
		return -1;

	/* not for me */
	if (!is_my_mac(ethhdr->h_dest))
		return -1;

	return 0;
}

804
static int route_unicast_packet(struct sk_buff *skb, struct hard_iface *recv_if)
805 806
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
807 808
	struct orig_node *orig_node = NULL;
	struct neigh_node *neigh_node = NULL;
809 810
	struct unicast_packet *unicast_packet;
	struct ethhdr *ethhdr = (struct ethhdr *)skb_mac_header(skb);
811
	int ret = NET_RX_DROP;
812 813 814 815 816
	struct sk_buff *new_skb;

	unicast_packet = (struct unicast_packet *)skb->data;

	/* TTL exceeded */
817
	if (unicast_packet->header.ttl < 2) {
818 819
		pr_debug("Warning - can't forward unicast packet from %pM to %pM: ttl exceeded\n",
			 ethhdr->h_source, unicast_packet->dest);
820
		goto out;
821 822 823
	}

	/* get routing information */
824 825
	orig_node = orig_hash_find(bat_priv, unicast_packet->dest);

826
	if (!orig_node)
827
		goto out;
828

829
	/* find_router() increases neigh_nodes refcount if found. */
830
	neigh_node = find_router(bat_priv, orig_node, recv_if);
831

832
	if (!neigh_node)
833
		goto out;
834 835 836

	/* create a copy of the skb, if needed, to modify it. */
	if (skb_cow(skb, sizeof(struct ethhdr)) < 0)
837
		goto out;
838 839 840

	unicast_packet = (struct unicast_packet *)skb->data;

841
	if (unicast_packet->header.packet_type == BAT_UNICAST &&
842
	    atomic_read(&bat_priv->fragmentation) &&
843 844 845 846 847
	    skb->len > neigh_node->if_incoming->net_dev->mtu) {
		ret = frag_send_skb(skb, bat_priv,
				    neigh_node->if_incoming, neigh_node->addr);
		goto out;
	}
848

849
	if (unicast_packet->header.packet_type == BAT_UNICAST_FRAG &&
850
	    frag_can_reassemble(skb, neigh_node->if_incoming->net_dev->mtu)) {
851 852 853 854

		ret = frag_reassemble_skb(skb, bat_priv, &new_skb);

		if (ret == NET_RX_DROP)
855
			goto out;
856 857

		/* packet was buffered for late merge */
858 859 860 861
		if (!new_skb) {
			ret = NET_RX_SUCCESS;
			goto out;
		}
862 863 864 865 866 867

		skb = new_skb;
		unicast_packet = (struct unicast_packet *)skb->data;
	}

	/* decrement ttl */
868
	unicast_packet->header.ttl--;
869 870

	/* route it */
871
	send_skb_packet(skb, neigh_node->if_incoming, neigh_node->addr);
872
	ret = NET_RX_SUCCESS;
873

874 875 876 877
out:
	if (neigh_node)
		neigh_node_free_ref(neigh_node);
	if (orig_node)
878
		orig_node_free_ref(orig_node);
879
	return ret;
880 881
}

882 883 884 885 886 887 888
static int check_unicast_ttvn(struct bat_priv *bat_priv,
			       struct sk_buff *skb) {
	uint8_t curr_ttvn;
	struct orig_node *orig_node;
	struct ethhdr *ethhdr;
	struct hard_iface *primary_if;
	struct unicast_packet *unicast_packet;
889
	bool tt_poss_change;
890 891 892 893 894 895 896

	/* I could need to modify it */
	if (skb_cow(skb, sizeof(struct unicast_packet)) < 0)
		return 0;

	unicast_packet = (struct unicast_packet *)skb->data;

897 898
	if (is_my_mac(unicast_packet->dest)) {
		tt_poss_change = bat_priv->tt_poss_change;
899
		curr_ttvn = (uint8_t)atomic_read(&bat_priv->ttvn);
900
	} else {
901 902 903 904 905 906
		orig_node = orig_hash_find(bat_priv, unicast_packet->dest);

		if (!orig_node)
			return 0;

		curr_ttvn = (uint8_t)atomic_read(&orig_node->last_ttvn);
907
		tt_poss_change = orig_node->tt_poss_change;
908 909 910 911
		orig_node_free_ref(orig_node);
	}

	/* Check whether I have to reroute the packet */
912
	if (seq_before(unicast_packet->ttvn, curr_ttvn) || tt_poss_change) {
913 914 915 916 917 918
		/* Linearize the skb before accessing it */
		if (skb_linearize(skb) < 0)
			return 0;

		ethhdr = (struct ethhdr *)(skb->data +
			sizeof(struct unicast_packet));
919
		orig_node = transtable_search(bat_priv, NULL, ethhdr->h_dest);
920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937

		if (!orig_node) {
			if (!is_my_client(bat_priv, ethhdr->h_dest))
				return 0;
			primary_if = primary_if_get_selected(bat_priv);
			if (!primary_if)
				return 0;
			memcpy(unicast_packet->dest,
			       primary_if->net_dev->dev_addr, ETH_ALEN);
			hardif_free_ref(primary_if);
		} else {
			memcpy(unicast_packet->dest, orig_node->orig,
			       ETH_ALEN);
			curr_ttvn = (uint8_t)
				atomic_read(&orig_node->last_ttvn);
			orig_node_free_ref(orig_node);
		}

938 939 940 941
		bat_dbg(DBG_ROUTES, bat_priv,
			"TTVN mismatch (old_ttvn %u new_ttvn %u)! Rerouting unicast packet (for %pM) to %pM\n",
			unicast_packet->ttvn, curr_ttvn, ethhdr->h_dest,
			unicast_packet->dest);
942 943 944 945 946 947

		unicast_packet->ttvn = curr_ttvn;
	}
	return 1;
}

948
int recv_unicast_packet(struct sk_buff *skb, struct hard_iface *recv_if)
949
{
950
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
951
	struct unicast_packet *unicast_packet;
952
	int hdr_size = sizeof(*unicast_packet);
953 954 955 956

	if (check_unicast_packet(skb, hdr_size) < 0)
		return NET_RX_DROP;

957 958 959
	if (!check_unicast_ttvn(bat_priv, skb))
		return NET_RX_DROP;

960 961 962 963 964 965 966 967
	unicast_packet = (struct unicast_packet *)skb->data;

	/* packet for me */
	if (is_my_mac(unicast_packet->dest)) {
		interface_rx(recv_if->soft_iface, skb, recv_if, hdr_size);
		return NET_RX_SUCCESS;
	}

968
	return route_unicast_packet(skb, recv_if);
969 970
}

971
int recv_ucast_frag_packet(struct sk_buff *skb, struct hard_iface *recv_if)
972 973 974
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
	struct unicast_frag_packet *unicast_packet;
975
	int hdr_size = sizeof(*unicast_packet);
976 977 978 979 980 981
	struct sk_buff *new_skb = NULL;
	int ret;

	if (check_unicast_packet(skb, hdr_size) < 0)
		return NET_RX_DROP;

982 983 984
	if (!check_unicast_ttvn(bat_priv, skb))
		return NET_RX_DROP;

985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003
	unicast_packet = (struct unicast_frag_packet *)skb->data;

	/* packet for me */
	if (is_my_mac(unicast_packet->dest)) {

		ret = frag_reassemble_skb(skb, bat_priv, &new_skb);

		if (ret == NET_RX_DROP)
			return NET_RX_DROP;

		/* packet was buffered for late merge */
		if (!new_skb)
			return NET_RX_SUCCESS;

		interface_rx(recv_if->soft_iface, new_skb, recv_if,
			     sizeof(struct unicast_packet));
		return NET_RX_SUCCESS;
	}

1004
	return route_unicast_packet(skb, recv_if);
1005 1006 1007
}


1008
int recv_bcast_packet(struct sk_buff *skb, struct hard_iface *recv_if)
1009 1010
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1011
	struct orig_node *orig_node = NULL;
1012 1013
	struct bcast_packet *bcast_packet;
	struct ethhdr *ethhdr;
1014
	int hdr_size = sizeof(*bcast_packet);
1015
	int ret = NET_RX_DROP;
1016 1017 1018 1019
	int32_t seq_diff;

	/* drop packet if it has not necessary minimum size */
	if (unlikely(!pskb_may_pull(skb, hdr_size)))
1020
		goto out;
1021 1022 1023 1024 1025

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with broadcast indication but unicast recipient */
	if (!is_broadcast_ether_addr(ethhdr->h_dest))
1026
		goto out;
1027 1028 1029

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
1030
		goto out;
1031 1032 1033

	/* ignore broadcasts sent by myself */
	if (is_my_mac(ethhdr->h_source))
1034
		goto out;
1035 1036 1037 1038 1039

	bcast_packet = (struct bcast_packet *)skb->data;

	/* ignore broadcasts originated by myself */
	if (is_my_mac(bcast_packet->orig))
1040
		goto out;
1041

1042
	if (bcast_packet->header.ttl < 2)
1043
		goto out;
1044

1045
	orig_node = orig_hash_find(bat_priv, bcast_packet->orig);
1046 1047

	if (!orig_node)
1048
		goto out;
1049

1050
	spin_lock_bh(&orig_node->bcast_seqno_lock);
1051 1052

	/* check whether the packet is a duplicate */
1053 1054
	if (bat_test_bit(orig_node->bcast_bits, orig_node->last_bcast_seqno,
			 ntohl(bcast_packet->seqno)))
1055
		goto spin_unlock;
1056 1057 1058 1059 1060

	seq_diff = ntohl(bcast_packet->seqno) - orig_node->last_bcast_seqno;

	/* check whether the packet is old and the host just restarted. */
	if (window_protected(bat_priv, seq_diff,
1061 1062
			     &orig_node->bcast_seqno_reset))
		goto spin_unlock;
1063 1064 1065 1066 1067 1068

	/* mark broadcast in flood history, update window position
	 * if required. */
	if (bit_get_packet(bat_priv, orig_node->bcast_bits, seq_diff, 1))
		orig_node->last_bcast_seqno = ntohl(bcast_packet->seqno);

1069 1070
	spin_unlock_bh(&orig_node->bcast_seqno_lock);

1071
	/* rebroadcast packet */
1072
	add_bcast_packet_to_list(bat_priv, skb, 1);
1073 1074 1075

	/* broadcast for me */
	interface_rx(recv_if->soft_iface, skb, recv_if, hdr_size);
1076 1077
	ret = NET_RX_SUCCESS;
	goto out;
1078

1079 1080 1081 1082
spin_unlock:
	spin_unlock_bh(&orig_node->bcast_seqno_lock);
out:
	if (orig_node)
1083
		orig_node_free_ref(orig_node);
1084
	return ret;
1085 1086
}

1087
int recv_vis_packet(struct sk_buff *skb, struct hard_iface *recv_if)
1088 1089 1090 1091
{
	struct vis_packet *vis_packet;
	struct ethhdr *ethhdr;
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1092
	int hdr_size = sizeof(*vis_packet);
1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133

	/* keep skb linear */
	if (skb_linearize(skb) < 0)
		return NET_RX_DROP;

	if (unlikely(!pskb_may_pull(skb, hdr_size)))
		return NET_RX_DROP;

	vis_packet = (struct vis_packet *)skb->data;
	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* not for me */
	if (!is_my_mac(ethhdr->h_dest))
		return NET_RX_DROP;

	/* ignore own packets */
	if (is_my_mac(vis_packet->vis_orig))
		return NET_RX_DROP;

	if (is_my_mac(vis_packet->sender_orig))
		return NET_RX_DROP;

	switch (vis_packet->vis_type) {
	case VIS_TYPE_SERVER_SYNC:
		receive_server_sync_packet(bat_priv, vis_packet,
					   skb_headlen(skb));
		break;

	case VIS_TYPE_CLIENT_UPDATE:
		receive_client_update_packet(bat_priv, vis_packet,
					     skb_headlen(skb));
		break;

	default:	/* ignore unknown packet */
		break;
	}

	/* We take a copy of the data in the packet, so we should
	   always free the skbuf. */
	return NET_RX_DROP;
}