routing.c 45.8 KB
Newer Older
1
/*
2
 * Copyright (C) 2007-2011 B.A.T.M.A.N. contributors:
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37
 *
 * Marek Lindner, Simon Wunderlich
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of version 2 of the GNU General Public
 * License as published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
 * General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
 * 02110-1301, USA
 *
 */

#include "main.h"
#include "routing.h"
#include "send.h"
#include "hash.h"
#include "soft-interface.h"
#include "hard-interface.h"
#include "icmp_socket.h"
#include "translation-table.h"
#include "originator.h"
#include "ring_buffer.h"
#include "vis.h"
#include "aggregation.h"
#include "gateway_common.h"
#include "gateway_client.h"
#include "unicast.h"

38
void slide_own_bcast_window(struct hard_iface *hard_iface)
39
{
40
	struct bat_priv *bat_priv = netdev_priv(hard_iface->soft_iface);
41
	struct hashtable_t *hash = bat_priv->orig_hash;
42
	struct hlist_node *node;
43 44 45 46 47 48 49 50 51
	struct hlist_head *head;
	struct orig_node *orig_node;
	unsigned long *word;
	int i;
	size_t word_index;

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

52
		rcu_read_lock();
53
		hlist_for_each_entry_rcu(orig_node, node, head, hash_entry) {
54
			spin_lock_bh(&orig_node->ogm_cnt_lock);
55
			word_index = hard_iface->if_num * NUM_WORDS;
56 57 58
			word = &(orig_node->bcast_own[word_index]);

			bit_get_packet(bat_priv, word, 1, 0);
59
			orig_node->bcast_own_sum[hard_iface->if_num] =
60
				bit_packet_count(word);
61
			spin_unlock_bh(&orig_node->ogm_cnt_lock);
62
		}
63
		rcu_read_unlock();
64 65 66
	}
}

67 68 69
static void update_route(struct bat_priv *bat_priv,
			 struct orig_node *orig_node,
			 struct neigh_node *neigh_node)
70
{
71 72 73
	struct neigh_node *curr_router;

	curr_router = orig_node_get_router(orig_node);
74

75
	/* route deleted */
76
	if ((curr_router) && (!neigh_node)) {
77 78
		bat_dbg(DBG_ROUTES, bat_priv, "Deleting route towards: %pM\n",
			orig_node->orig);
79
		tt_global_del_orig(bat_priv, orig_node,
80
				    "Deleted route towards originator");
81

82 83
	/* route added */
	} else if ((!curr_router) && (neigh_node)) {
84 85 86 87

		bat_dbg(DBG_ROUTES, bat_priv,
			"Adding route towards: %pM (via %pM)\n",
			orig_node->orig, neigh_node->addr);
88
	/* route changed */
89
	} else if (neigh_node && curr_router) {
90 91 92 93
		bat_dbg(DBG_ROUTES, bat_priv,
			"Changing route towards: %pM "
			"(now via %pM - was via %pM)\n",
			orig_node->orig, neigh_node->addr,
94
			curr_router->addr);
95 96
	}

97 98 99 100
	if (curr_router)
		neigh_node_free_ref(curr_router);

	/* increase refcount of new best neighbor */
101 102
	if (neigh_node && !atomic_inc_not_zero(&neigh_node->refcount))
		neigh_node = NULL;
103 104 105 106 107 108 109 110

	spin_lock_bh(&orig_node->neigh_list_lock);
	rcu_assign_pointer(orig_node->router, neigh_node);
	spin_unlock_bh(&orig_node->neigh_list_lock);

	/* decrease refcount of previous best neighbor */
	if (curr_router)
		neigh_node_free_ref(curr_router);
111 112 113
}

void update_routes(struct bat_priv *bat_priv, struct orig_node *orig_node,
114
		   struct neigh_node *neigh_node)
115
{
116
	struct neigh_node *router = NULL;
117 118

	if (!orig_node)
119 120 121
		goto out;

	router = orig_node_get_router(orig_node);
122

123
	if (router != neigh_node)
124
		update_route(bat_priv, orig_node, neigh_node);
125 126 127 128

out:
	if (router)
		neigh_node_free_ref(router);
129 130 131 132
}

static int is_bidirectional_neigh(struct orig_node *orig_node,
				struct orig_node *orig_neigh_node,
133
				struct batman_ogm_packet *batman_ogm_packet,
134
				struct hard_iface *if_incoming)
135 136
{
	struct bat_priv *bat_priv = netdev_priv(if_incoming->soft_iface);
137
	struct neigh_node *neigh_node = NULL, *tmp_neigh_node;
138
	struct hlist_node *node;
139
	uint8_t total_count;
140 141
	uint8_t orig_eq_count, neigh_rq_count, tq_own;
	int tq_asym_penalty, ret = 0;
142

143 144 145 146
	/* find corresponding one hop neighbor */
	rcu_read_lock();
	hlist_for_each_entry_rcu(tmp_neigh_node, node,
				 &orig_neigh_node->neigh_list, list) {
147

148 149
		if (!compare_eth(tmp_neigh_node->addr, orig_neigh_node->orig))
			continue;
150

151 152
		if (tmp_neigh_node->if_incoming != if_incoming)
			continue;
153

154 155
		if (!atomic_inc_not_zero(&tmp_neigh_node->refcount))
			continue;
156

157 158 159 160
		neigh_node = tmp_neigh_node;
		break;
	}
	rcu_read_unlock();
161

162 163 164 165 166
	if (!neigh_node)
		neigh_node = create_neighbor(orig_neigh_node,
					     orig_neigh_node,
					     orig_neigh_node->orig,
					     if_incoming);
167

168 169
	if (!neigh_node)
		goto out;
170

171
	/* if orig_node is direct neighbor update neigh_node last_valid */
172 173
	if (orig_node == orig_neigh_node)
		neigh_node->last_valid = jiffies;
174 175 176

	orig_node->last_valid = jiffies;

177
	/* find packet count of corresponding one hop neighbor */
178 179 180 181 182
	spin_lock_bh(&orig_node->ogm_cnt_lock);
	orig_eq_count = orig_neigh_node->bcast_own_sum[if_incoming->if_num];
	neigh_rq_count = neigh_node->real_packet_count;
	spin_unlock_bh(&orig_node->ogm_cnt_lock);

183
	/* pay attention to not get a value bigger than 100 % */
184 185
	total_count = (orig_eq_count > neigh_rq_count ?
		       neigh_rq_count : orig_eq_count);
186 187 188 189

	/* if we have too few packets (too less data) we set tq_own to zero */
	/* if we receive too few packets it is not considered bidirectional */
	if ((total_count < TQ_LOCAL_BIDRECT_SEND_MINIMUM) ||
190 191
	    (neigh_rq_count < TQ_LOCAL_BIDRECT_RECV_MINIMUM))
		tq_own = 0;
192 193 194 195
	else
		/* neigh_node->real_packet_count is never zero as we
		 * only purge old information when getting new
		 * information */
196
		tq_own = (TQ_MAX_VALUE * total_count) /	neigh_rq_count;
197 198 199 200 201 202 203

	/*
	 * 1 - ((1-x) ** 3), normalized to TQ_MAX_VALUE this does
	 * affect the nearly-symmetric links only a little, but
	 * punishes asymmetric links more.  This will give a value
	 * between 0 and TQ_MAX_VALUE
	 */
204 205 206 207 208 209 210 211
	tq_asym_penalty = TQ_MAX_VALUE - (TQ_MAX_VALUE *
				(TQ_LOCAL_WINDOW_SIZE - neigh_rq_count) *
				(TQ_LOCAL_WINDOW_SIZE - neigh_rq_count) *
				(TQ_LOCAL_WINDOW_SIZE - neigh_rq_count)) /
					(TQ_LOCAL_WINDOW_SIZE *
					 TQ_LOCAL_WINDOW_SIZE *
					 TQ_LOCAL_WINDOW_SIZE);

212 213
	batman_ogm_packet->tq = ((batman_ogm_packet->tq * tq_own
							* tq_asym_penalty) /
214
						(TQ_MAX_VALUE * TQ_MAX_VALUE));
215 216 217 218 219 220 221

	bat_dbg(DBG_BATMAN, bat_priv,
		"bidirectional: "
		"orig = %-15pM neigh = %-15pM => own_bcast = %2i, "
		"real recv = %2i, local tq: %3i, asym_penalty: %3i, "
		"total tq: %3i\n",
		orig_node->orig, orig_neigh_node->orig, total_count,
222
		neigh_rq_count, tq_own,	tq_asym_penalty, batman_ogm_packet->tq);
223 224 225

	/* if link has the minimum required transmission quality
	 * consider it bidirectional */
226
	if (batman_ogm_packet->tq >= TQ_TOTAL_BIDRECT_LIMIT)
227 228 229 230
		ret = 1;

out:
	if (neigh_node)
231
		neigh_node_free_ref(neigh_node);
232
	return ret;
233 234
}

235 236 237 238 239 240 241 242 243 244
/* caller must hold the neigh_list_lock */
void bonding_candidate_del(struct orig_node *orig_node,
			   struct neigh_node *neigh_node)
{
	/* this neighbor is not part of our candidate list */
	if (list_empty(&neigh_node->bonding_list))
		goto out;

	list_del_rcu(&neigh_node->bonding_list);
	INIT_LIST_HEAD(&neigh_node->bonding_list);
245
	neigh_node_free_ref(neigh_node);
246 247 248 249 250 251 252 253 254 255
	atomic_dec(&orig_node->bond_candidates);

out:
	return;
}

static void bonding_candidate_add(struct orig_node *orig_node,
				  struct neigh_node *neigh_node)
{
	struct hlist_node *node;
256 257
	struct neigh_node *tmp_neigh_node, *router = NULL;
	uint8_t interference_candidate = 0;
258 259 260 261

	spin_lock_bh(&orig_node->neigh_list_lock);

	/* only consider if it has the same primary address ...  */
262 263
	if (!compare_eth(orig_node->orig,
			 neigh_node->orig_node->primary_addr))
264 265
		goto candidate_del;

266 267
	router = orig_node_get_router(orig_node);
	if (!router)
268 269 270
		goto candidate_del;

	/* ... and is good enough to be considered */
271
	if (neigh_node->tq_avg < router->tq_avg - BONDING_TQ_THRESHOLD)
272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290
		goto candidate_del;

	/**
	 * check if we have another candidate with the same mac address or
	 * interface. If we do, we won't select this candidate because of
	 * possible interference.
	 */
	hlist_for_each_entry_rcu(tmp_neigh_node, node,
				 &orig_node->neigh_list, list) {

		if (tmp_neigh_node == neigh_node)
			continue;

		/* we only care if the other candidate is even
		* considered as candidate. */
		if (list_empty(&tmp_neigh_node->bonding_list))
			continue;

		if ((neigh_node->if_incoming == tmp_neigh_node->if_incoming) ||
291
		    (compare_eth(neigh_node->addr, tmp_neigh_node->addr))) {
292 293 294 295 296 297 298 299 300 301 302 303 304
			interference_candidate = 1;
			break;
		}
	}

	/* don't care further if it is an interference candidate */
	if (interference_candidate)
		goto candidate_del;

	/* this neighbor already is part of our candidate list */
	if (!list_empty(&neigh_node->bonding_list))
		goto out;

305 306 307
	if (!atomic_inc_not_zero(&neigh_node->refcount))
		goto out;

308 309 310 311 312 313 314 315 316
	list_add_rcu(&neigh_node->bonding_list, &orig_node->bond_list);
	atomic_inc(&orig_node->bond_candidates);
	goto out;

candidate_del:
	bonding_candidate_del(orig_node, neigh_node);

out:
	spin_unlock_bh(&orig_node->neigh_list_lock);
317 318 319

	if (router)
		neigh_node_free_ref(router);
320 321 322
}

/* copy primary address for bonding */
323
static void bonding_save_primary(const struct orig_node *orig_node,
324
				 struct orig_node *orig_neigh_node,
325 326
				 const struct batman_ogm_packet
							*batman_ogm_packet)
327
{
328
	if (!(batman_ogm_packet->flags & PRIMARIES_FIRST_HOP))
329 330 331 332 333
		return;

	memcpy(orig_neigh_node->primary_addr, orig_node->orig, ETH_ALEN);
}

334 335
static void update_orig(struct bat_priv *bat_priv, struct orig_node *orig_node,
			const struct ethhdr *ethhdr,
336
			const struct batman_ogm_packet *batman_ogm_packet,
337
			struct hard_iface *if_incoming,
338
			const unsigned char *tt_buff, int is_duplicate)
339 340
{
	struct neigh_node *neigh_node = NULL, *tmp_neigh_node = NULL;
341
	struct neigh_node *router = NULL;
342
	struct orig_node *orig_node_tmp;
343
	struct hlist_node *node;
344
	uint8_t bcast_own_sum_orig, bcast_own_sum_neigh;
345 346 347 348

	bat_dbg(DBG_BATMAN, bat_priv, "update_originator(): "
		"Searching and updating originator entry of received packet\n");

349 350 351
	rcu_read_lock();
	hlist_for_each_entry_rcu(tmp_neigh_node, node,
				 &orig_node->neigh_list, list) {
352
		if (compare_eth(tmp_neigh_node->addr, ethhdr->h_source) &&
353 354 355 356
		    (tmp_neigh_node->if_incoming == if_incoming) &&
		     atomic_inc_not_zero(&tmp_neigh_node->refcount)) {
			if (neigh_node)
				neigh_node_free_ref(neigh_node);
357 358 359 360 361 362 363
			neigh_node = tmp_neigh_node;
			continue;
		}

		if (is_duplicate)
			continue;

364
		spin_lock_bh(&tmp_neigh_node->tq_lock);
365 366 367 368
		ring_buffer_set(tmp_neigh_node->tq_recv,
				&tmp_neigh_node->tq_index, 0);
		tmp_neigh_node->tq_avg =
			ring_buffer_avg(tmp_neigh_node->tq_recv);
369
		spin_unlock_bh(&tmp_neigh_node->tq_lock);
370 371 372 373 374 375 376
	}

	if (!neigh_node) {
		struct orig_node *orig_tmp;

		orig_tmp = get_orig_node(bat_priv, ethhdr->h_source);
		if (!orig_tmp)
377
			goto unlock;
378 379 380

		neigh_node = create_neighbor(orig_node, orig_tmp,
					     ethhdr->h_source, if_incoming);
381

382
		orig_node_free_ref(orig_tmp);
383
		if (!neigh_node)
384
			goto unlock;
385 386 387 388
	} else
		bat_dbg(DBG_BATMAN, bat_priv,
			"Updating existing last-hop neighbor of originator\n");

389 390
	rcu_read_unlock();

391
	orig_node->flags = batman_ogm_packet->flags;
392 393
	neigh_node->last_valid = jiffies;

394
	spin_lock_bh(&neigh_node->tq_lock);
395 396
	ring_buffer_set(neigh_node->tq_recv,
			&neigh_node->tq_index,
397
			batman_ogm_packet->tq);
398
	neigh_node->tq_avg = ring_buffer_avg(neigh_node->tq_recv);
399
	spin_unlock_bh(&neigh_node->tq_lock);
400 401

	if (!is_duplicate) {
402 403
		orig_node->last_ttl = batman_ogm_packet->ttl;
		neigh_node->last_ttl = batman_ogm_packet->ttl;
404 405
	}

406 407
	bonding_candidate_add(orig_node, neigh_node);

408 409
	/* if this neighbor already is our next hop there is nothing
	 * to change */
410 411
	router = orig_node_get_router(orig_node);
	if (router == neigh_node)
412
		goto update_tt;
413 414

	/* if this neighbor does not offer a better TQ we won't consider it */
415
	if (router && (router->tq_avg > neigh_node->tq_avg))
416
		goto update_tt;
417

418
	/* if the TQ is the same and the link not more symmetric we
419
	 * won't consider it either */
420 421
	if (router && (neigh_node->tq_avg == router->tq_avg)) {
		orig_node_tmp = router->orig_node;
422 423 424 425 426 427 428 429 430 431 432 433
		spin_lock_bh(&orig_node_tmp->ogm_cnt_lock);
		bcast_own_sum_orig =
			orig_node_tmp->bcast_own_sum[if_incoming->if_num];
		spin_unlock_bh(&orig_node_tmp->ogm_cnt_lock);

		orig_node_tmp = neigh_node->orig_node;
		spin_lock_bh(&orig_node_tmp->ogm_cnt_lock);
		bcast_own_sum_neigh =
			orig_node_tmp->bcast_own_sum[if_incoming->if_num];
		spin_unlock_bh(&orig_node_tmp->ogm_cnt_lock);

		if (bcast_own_sum_orig >= bcast_own_sum_neigh)
434
			goto update_tt;
435
	}
436

437
	update_routes(bat_priv, orig_node, neigh_node);
438

439
update_tt:
440 441
	/* I have to check for transtable changes only if the OGM has been
	 * sent through a primary interface */
442 443 444
	if (((batman_ogm_packet->orig != ethhdr->h_source) &&
	     (batman_ogm_packet->ttl > 2)) ||
	    (batman_ogm_packet->flags & PRIMARIES_FIRST_HOP))
445
		tt_update_orig(bat_priv, orig_node, tt_buff,
446 447 448
			       batman_ogm_packet->tt_num_changes,
			       batman_ogm_packet->ttvn,
			       batman_ogm_packet->tt_crc);
449

450 451 452
	if (orig_node->gw_flags != batman_ogm_packet->gw_flags)
		gw_node_update(bat_priv, orig_node,
			       batman_ogm_packet->gw_flags);
453

454
	orig_node->gw_flags = batman_ogm_packet->gw_flags;
455 456 457 458 459 460

	/* restart gateway selection if fast or late switching was enabled */
	if ((orig_node->gw_flags) &&
	    (atomic_read(&bat_priv->gw_mode) == GW_MODE_CLIENT) &&
	    (atomic_read(&bat_priv->gw_sel_class) > 2))
		gw_check_election(bat_priv, orig_node);
461 462 463 464 465 466 467

	goto out;

unlock:
	rcu_read_unlock();
out:
	if (neigh_node)
468
		neigh_node_free_ref(neigh_node);
469 470
	if (router)
		neigh_node_free_ref(router);
471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505
}

/* checks whether the host restarted and is in the protection time.
 * returns:
 *  0 if the packet is to be accepted
 *  1 if the packet is to be ignored.
 */
static int window_protected(struct bat_priv *bat_priv,
			    int32_t seq_num_diff,
			    unsigned long *last_reset)
{
	if ((seq_num_diff <= -TQ_LOCAL_WINDOW_SIZE)
		|| (seq_num_diff >= EXPECTED_SEQNO_RANGE)) {
		if (time_after(jiffies, *last_reset +
			msecs_to_jiffies(RESET_PROTECTION_MS))) {

			*last_reset = jiffies;
			bat_dbg(DBG_BATMAN, bat_priv,
				"old packet received, start protection\n");

			return 0;
		} else
			return 1;
	}
	return 0;
}

/* processes a batman packet for all interfaces, adjusts the sequence number and
 * finds out whether it is a duplicate.
 * returns:
 *   1 the packet is a duplicate
 *   0 the packet has not yet been received
 *  -1 the packet is old and has been received while the seqno window
 *     was protected. Caller should drop it.
 */
506
static int count_real_packets(const struct ethhdr *ethhdr,
507 508
			      const struct batman_ogm_packet *batman_ogm_packet,
			      const struct hard_iface *if_incoming)
509 510 511 512
{
	struct bat_priv *bat_priv = netdev_priv(if_incoming->soft_iface);
	struct orig_node *orig_node;
	struct neigh_node *tmp_neigh_node;
513
	struct hlist_node *node;
514
	int is_duplicate = 0;
515 516
	int32_t seq_diff;
	int need_update = 0;
517
	int set_mark, ret = -1;
518

519
	orig_node = get_orig_node(bat_priv, batman_ogm_packet->orig);
520 521 522
	if (!orig_node)
		return 0;

523
	spin_lock_bh(&orig_node->ogm_cnt_lock);
524
	seq_diff = batman_ogm_packet->seqno - orig_node->last_real_seqno;
525 526 527 528

	/* signalize caller that the packet is to be dropped. */
	if (window_protected(bat_priv, seq_diff,
			     &orig_node->batman_seqno_reset))
529
		goto out;
530

531 532 533
	rcu_read_lock();
	hlist_for_each_entry_rcu(tmp_neigh_node, node,
				 &orig_node->neigh_list, list) {
534 535 536

		is_duplicate |= get_bit_status(tmp_neigh_node->real_bits,
					       orig_node->last_real_seqno,
537
					       batman_ogm_packet->seqno);
538

539
		if (compare_eth(tmp_neigh_node->addr, ethhdr->h_source) &&
540 541 542 543 544 545 546 547 548 549 550 551 552
		    (tmp_neigh_node->if_incoming == if_incoming))
			set_mark = 1;
		else
			set_mark = 0;

		/* if the window moved, set the update flag. */
		need_update |= bit_get_packet(bat_priv,
					      tmp_neigh_node->real_bits,
					      seq_diff, set_mark);

		tmp_neigh_node->real_packet_count =
			bit_packet_count(tmp_neigh_node->real_bits);
	}
553
	rcu_read_unlock();
554 555 556 557

	if (need_update) {
		bat_dbg(DBG_BATMAN, bat_priv,
			"updating last_seqno: old %d, new %d\n",
558 559
			orig_node->last_real_seqno, batman_ogm_packet->seqno);
		orig_node->last_real_seqno = batman_ogm_packet->seqno;
560 561
	}

562
	ret = is_duplicate;
563

564 565
out:
	spin_unlock_bh(&orig_node->ogm_cnt_lock);
566
	orig_node_free_ref(orig_node);
567
	return ret;
568 569
}

570
void receive_bat_packet(const struct ethhdr *ethhdr,
571
			struct batman_ogm_packet *batman_ogm_packet,
572
			const unsigned char *tt_buff,
573
			struct hard_iface *if_incoming)
574 575
{
	struct bat_priv *bat_priv = netdev_priv(if_incoming->soft_iface);
576
	struct hard_iface *hard_iface;
577
	struct orig_node *orig_neigh_node, *orig_node;
578 579
	struct neigh_node *router = NULL, *router_router = NULL;
	struct neigh_node *orig_neigh_router = NULL;
580 581 582
	int has_directlink_flag;
	int is_my_addr = 0, is_my_orig = 0, is_my_oldorig = 0;
	int is_broadcast = 0, is_bidirectional, is_single_hop_neigh;
583
	int is_duplicate;
584 585 586 587 588 589 590 591 592 593
	uint32_t if_incoming_seqno;

	/* Silently drop when the batman packet is actually not a
	 * correct packet.
	 *
	 * This might happen if a packet is padded (e.g. Ethernet has a
	 * minimum frame length of 64 byte) and the aggregation interprets
	 * it as an additional length.
	 *
	 * TODO: A more sane solution would be to have a bit in the
594
	 * batman_ogm_packet to detect whether the packet is the last
595 596 597
	 * packet in an aggregation.  Here we expect that the padding
	 * is always zero (or not 0x01)
	 */
598
	if (batman_ogm_packet->packet_type != BAT_OGM)
599 600 601 602 603
		return;

	/* could be changed by schedule_own_packet() */
	if_incoming_seqno = atomic_read(&if_incoming->seqno);

604
	has_directlink_flag = (batman_ogm_packet->flags & DIRECTLINK ? 1 : 0);
605

606
	is_single_hop_neigh = (compare_eth(ethhdr->h_source,
607
					   batman_ogm_packet->orig) ? 1 : 0);
608 609 610

	bat_dbg(DBG_BATMAN, bat_priv,
		"Received BATMAN packet via NB: %pM, IF: %s [%pM] "
611 612
		"(from OG: %pM, via prev OG: %pM, seqno %d, ttvn %u, "
		"crc %u, changes %u, td %d, TTL %d, V %d, IDF %d)\n",
613
		ethhdr->h_source, if_incoming->net_dev->name,
614 615 616 617 618
		if_incoming->net_dev->dev_addr, batman_ogm_packet->orig,
		batman_ogm_packet->prev_sender, batman_ogm_packet->seqno,
		batman_ogm_packet->ttvn, batman_ogm_packet->tt_crc,
		batman_ogm_packet->tt_num_changes, batman_ogm_packet->tq,
		batman_ogm_packet->ttl, batman_ogm_packet->version,
619 620 621
		has_directlink_flag);

	rcu_read_lock();
622 623
	list_for_each_entry_rcu(hard_iface, &hardif_list, list) {
		if (hard_iface->if_status != IF_ACTIVE)
624 625
			continue;

626
		if (hard_iface->soft_iface != if_incoming->soft_iface)
627 628
			continue;

629
		if (compare_eth(ethhdr->h_source,
630
				hard_iface->net_dev->dev_addr))
631 632
			is_my_addr = 1;

633
		if (compare_eth(batman_ogm_packet->orig,
634
				hard_iface->net_dev->dev_addr))
635 636
			is_my_orig = 1;

637
		if (compare_eth(batman_ogm_packet->prev_sender,
638
				hard_iface->net_dev->dev_addr))
639 640
			is_my_oldorig = 1;

641
		if (is_broadcast_ether_addr(ethhdr->h_source))
642 643 644 645
			is_broadcast = 1;
	}
	rcu_read_unlock();

646
	if (batman_ogm_packet->version != COMPAT_VERSION) {
647 648
		bat_dbg(DBG_BATMAN, bat_priv,
			"Drop packet: incompatible batman version (%i)\n",
649
			batman_ogm_packet->version);
650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677
		return;
	}

	if (is_my_addr) {
		bat_dbg(DBG_BATMAN, bat_priv,
			"Drop packet: received my own broadcast (sender: %pM"
			")\n",
			ethhdr->h_source);
		return;
	}

	if (is_broadcast) {
		bat_dbg(DBG_BATMAN, bat_priv, "Drop packet: "
		"ignoring all packets with broadcast source addr (sender: %pM"
		")\n", ethhdr->h_source);
		return;
	}

	if (is_my_orig) {
		unsigned long *word;
		int offset;

		orig_neigh_node = get_orig_node(bat_priv, ethhdr->h_source);
		if (!orig_neigh_node)
			return;

		/* neighbor has to indicate direct link and it has to
		 * come via the corresponding interface */
678
		/* save packet seqno for bidirectional check */
679
		if (has_directlink_flag &&
680
		    compare_eth(if_incoming->net_dev->dev_addr,
681
				batman_ogm_packet->orig)) {
682
			offset = if_incoming->if_num * NUM_WORDS;
683 684

			spin_lock_bh(&orig_neigh_node->ogm_cnt_lock);
685
			word = &(orig_neigh_node->bcast_own[offset]);
686
			bit_mark(word,
687 688
				 if_incoming_seqno -
						batman_ogm_packet->seqno - 2);
689 690
			orig_neigh_node->bcast_own_sum[if_incoming->if_num] =
				bit_packet_count(word);
691
			spin_unlock_bh(&orig_neigh_node->ogm_cnt_lock);
692 693 694 695
		}

		bat_dbg(DBG_BATMAN, bat_priv, "Drop packet: "
			"originator packet from myself (via neighbor)\n");
696
		orig_node_free_ref(orig_neigh_node);
697 698 699 700 701 702 703 704 705 706
		return;
	}

	if (is_my_oldorig) {
		bat_dbg(DBG_BATMAN, bat_priv,
			"Drop packet: ignoring all rebroadcast echos (sender: "
			"%pM)\n", ethhdr->h_source);
		return;
	}

707
	orig_node = get_orig_node(bat_priv, batman_ogm_packet->orig);
708 709 710
	if (!orig_node)
		return;

711 712
	is_duplicate = count_real_packets(ethhdr, batman_ogm_packet,
					  if_incoming);
713 714 715 716 717

	if (is_duplicate == -1) {
		bat_dbg(DBG_BATMAN, bat_priv,
			"Drop packet: packet within seqno protection time "
			"(sender: %pM)\n", ethhdr->h_source);
718
		goto out;
719 720
	}

721
	if (batman_ogm_packet->tq == 0) {
722 723
		bat_dbg(DBG_BATMAN, bat_priv,
			"Drop packet: originator packet with tq equal 0\n");
724
		goto out;
725 726
	}

727 728 729 730
	router = orig_node_get_router(orig_node);
	if (router)
		router_router = orig_node_get_router(router->orig_node);

731
	/* avoid temporary routing loops */
732
	if (router && router_router &&
733 734 735
	    (compare_eth(router->addr, batman_ogm_packet->prev_sender)) &&
	    !(compare_eth(batman_ogm_packet->orig,
			  batman_ogm_packet->prev_sender)) &&
736
	    (compare_eth(router->addr, router_router->addr))) {
737 738 739
		bat_dbg(DBG_BATMAN, bat_priv,
			"Drop packet: ignoring all rebroadcast packets that "
			"may make me loop (sender: %pM)\n", ethhdr->h_source);
740
		goto out;
741 742 743 744 745 746 747 748
	}

	/* if sender is a direct neighbor the sender mac equals
	 * originator mac */
	orig_neigh_node = (is_single_hop_neigh ?
			   orig_node :
			   get_orig_node(bat_priv, ethhdr->h_source));
	if (!orig_neigh_node)
749
		goto out;
750

751 752
	orig_neigh_router = orig_node_get_router(orig_neigh_node);

753 754
	/* drop packet if sender is not a direct neighbor and if we
	 * don't route towards it */
755
	if (!is_single_hop_neigh && (!orig_neigh_router)) {
756 757
		bat_dbg(DBG_BATMAN, bat_priv,
			"Drop packet: OGM via unknown neighbor!\n");
758
		goto out_neigh;
759 760 761
	}

	is_bidirectional = is_bidirectional_neigh(orig_node, orig_neigh_node,
762 763
						  batman_ogm_packet,
						  if_incoming);
764

765
	bonding_save_primary(orig_node, orig_neigh_node, batman_ogm_packet);
766

767 768 769 770
	/* update ranking if it is not a duplicate or has the same
	 * seqno and similar ttl as the non-duplicate */
	if (is_bidirectional &&
	    (!is_duplicate ||
771 772 773
	     ((orig_node->last_real_seqno == batman_ogm_packet->seqno) &&
	      (orig_node->last_ttl - 3 <= batman_ogm_packet->ttl))))
		update_orig(bat_priv, orig_node, ethhdr, batman_ogm_packet,
774
			    if_incoming, tt_buff, is_duplicate);
775 776 777 778 779

	/* is single hop (direct) neighbor */
	if (is_single_hop_neigh) {

		/* mark direct link on incoming interface */
780
		schedule_forward_packet(orig_node, ethhdr, batman_ogm_packet,
781
					1, if_incoming);
782 783 784

		bat_dbg(DBG_BATMAN, bat_priv, "Forwarding packet: "
			"rebroadcast neighbor packet with direct link flag\n");
785
		goto out_neigh;
786 787 788 789 790 791
	}

	/* multihop originator */
	if (!is_bidirectional) {
		bat_dbg(DBG_BATMAN, bat_priv,
			"Drop packet: not received via bidirectional link\n");
792
		goto out_neigh;
793 794 795 796 797
	}

	if (is_duplicate) {
		bat_dbg(DBG_BATMAN, bat_priv,
			"Drop packet: duplicate packet received\n");
798
		goto out_neigh;
799 800 801 802
	}

	bat_dbg(DBG_BATMAN, bat_priv,
		"Forwarding packet: rebroadcast originator packet\n");
803
	schedule_forward_packet(orig_node, ethhdr, batman_ogm_packet,
804
				0, if_incoming);
805 806

out_neigh:
807 808
	if ((orig_neigh_node) && (!is_single_hop_neigh))
		orig_node_free_ref(orig_neigh_node);
809
out:
810 811 812 813 814 815 816
	if (router)
		neigh_node_free_ref(router);
	if (router_router)
		neigh_node_free_ref(router_router);
	if (orig_neigh_router)
		neigh_node_free_ref(orig_neigh_router);

817
	orig_node_free_ref(orig_node);
818 819
}

820
int recv_bat_packet(struct sk_buff *skb, struct hard_iface *hard_iface)
821 822 823 824
{
	struct ethhdr *ethhdr;

	/* drop packet if it has not necessary minimum size */
825
	if (unlikely(!pskb_may_pull(skb, BATMAN_OGM_LEN)))
826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850
		return NET_RX_DROP;

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with broadcast indication but unicast recipient */
	if (!is_broadcast_ether_addr(ethhdr->h_dest))
		return NET_RX_DROP;

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
		return NET_RX_DROP;

	/* create a copy of the skb, if needed, to modify it. */
	if (skb_cow(skb, 0) < 0)
		return NET_RX_DROP;

	/* keep skb linear */
	if (skb_linearize(skb) < 0)
		return NET_RX_DROP;

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	receive_aggr_bat_packet(ethhdr,
				skb->data,
				skb_headlen(skb),
851
				hard_iface);
852 853 854 855 856 857 858 859

	kfree_skb(skb);
	return NET_RX_SUCCESS;
}

static int recv_my_icmp_packet(struct bat_priv *bat_priv,
			       struct sk_buff *skb, size_t icmp_len)
{
860
	struct hard_iface *primary_if = NULL;
861
	struct orig_node *orig_node = NULL;
862
	struct neigh_node *router = NULL;
863
	struct icmp_packet_rr *icmp_packet;
864
	int ret = NET_RX_DROP;
865 866 867 868 869 870

	icmp_packet = (struct icmp_packet_rr *)skb->data;

	/* add data to device queue */
	if (icmp_packet->msg_type != ECHO_REQUEST) {
		bat_socket_receive_packet(icmp_packet, icmp_len);
871
		goto out;
872 873
	}

874 875
	primary_if = primary_if_get_selected(bat_priv);
	if (!primary_if)
876
		goto out;
877 878 879

	/* answer echo request (ping) */
	/* get routing information */
880
	orig_node = orig_hash_find(bat_priv, icmp_packet->orig);
881
	if (!orig_node)
882
		goto out;
883

884 885 886
	router = orig_node_get_router(orig_node);
	if (!router)
		goto out;
887

888 889 890 891 892 893 894
	/* create a copy of the skb, if needed, to modify it. */
	if (skb_cow(skb, sizeof(struct ethhdr)) < 0)
		goto out;

	icmp_packet = (struct icmp_packet_rr *)skb->data;

	memcpy(icmp_packet->dst, icmp_packet->orig, ETH_ALEN);
895
	memcpy(icmp_packet->orig, primary_if->net_dev->dev_addr, ETH_ALEN);
896 897 898
	icmp_packet->msg_type = ECHO_REPLY;
	icmp_packet->ttl = TTL;

899
	send_skb_packet(skb, router->if_incoming, router->addr);
900
	ret = NET_RX_SUCCESS;
901

902
out:
903 904
	if (primary_if)
		hardif_free_ref(primary_if);
905 906
	if (router)
		neigh_node_free_ref(router);
907
	if (orig_node)
908
		orig_node_free_ref(orig_node);
909 910 911 912
	return ret;
}

static int recv_icmp_ttl_exceeded(struct bat_priv *bat_priv,
913
				  struct sk_buff *skb)
914
{
915
	struct hard_iface *primary_if = NULL;
916
	struct orig_node *orig_node = NULL;
917
	struct neigh_node *router = NULL;
918
	struct icmp_packet *icmp_packet;
919
	int ret = NET_RX_DROP;
920 921 922 923 924 925 926 927

	icmp_packet = (struct icmp_packet *)skb->data;

	/* send TTL exceeded if packet is an echo request (traceroute) */
	if (icmp_packet->msg_type != ECHO_REQUEST) {
		pr_debug("Warning - can't forward icmp packet from %pM to "
			 "%pM: ttl exceeded\n", icmp_packet->orig,
			 icmp_packet->dst);
928
		goto out;
929 930
	}

931 932
	primary_if = primary_if_get_selected(bat_priv);
	if (!primary_if)
933
		goto out;
934 935

	/* get routing information */
936
	orig_node = orig_hash_find(bat_priv, icmp_packet->orig);
937
	if (!orig_node)
938
		goto out;
939

940 941 942
	router = orig_node_get_router(orig_node);
	if (!router)
		goto out;
943

944 945 946
	/* create a copy of the skb, if needed, to modify it. */
	if (skb_cow(skb, sizeof(struct ethhdr)) < 0)
		goto out;
947

948
	icmp_packet = (struct icmp_packet *)skb->data;
949

950
	memcpy(icmp_packet->dst, icmp_packet->orig, ETH_ALEN);
951
	memcpy(icmp_packet->orig, primary_if->net_dev->dev_addr, ETH_ALEN);
952 953 954
	icmp_packet->msg_type = TTL_EXCEEDED;
	icmp_packet->ttl = TTL;

955
	send_skb_packet(skb, router->if_incoming, router->addr);
956
	ret = NET_RX_SUCCESS;
957

958
out:
959 960
	if (primary_if)
		hardif_free_ref(primary_if);
961 962
	if (router)
		neigh_node_free_ref(router);
963
	if (orig_node)
964
		orig_node_free_ref(orig_node);
965 966 967 968
	return ret;
}


969
int recv_icmp_packet(struct sk_buff *skb, struct hard_iface *recv_if)
970 971 972 973
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
	struct icmp_packet_rr *icmp_packet;
	struct ethhdr *ethhdr;
974
	struct orig_node *orig_node = NULL;
975
	struct neigh_node *router = NULL;
976
	int hdr_size = sizeof(struct icmp_packet);
977
	int ret = NET_RX_DROP;
978 979 980 981 982 983 984 985 986

	/**
	 * we truncate all incoming icmp packets if they don't match our size
	 */
	if (skb->len >= sizeof(struct icmp_packet_rr))
		hdr_size = sizeof(struct icmp_packet_rr);

	/* drop packet if it has not necessary minimum size */
	if (unlikely(!pskb_may_pull(skb, hdr_size)))
987
		goto out;
988 989 990 991 992

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with unicast indication but broadcast recipient */
	if (is_broadcast_ether_addr(ethhdr->h_dest))
993
		goto out;
994 995 996

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
997
		goto out;
998 999 1000

	/* not for me */
	if (!is_my_mac(ethhdr->h_dest))
1001
		goto out;
1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018

	icmp_packet = (struct icmp_packet_rr *)skb->data;

	/* add record route information if not full */
	if ((hdr_size == sizeof(struct icmp_packet_rr)) &&
	    (icmp_packet->rr_cur < BAT_RR_LEN)) {
		memcpy(&(icmp_packet->rr[icmp_packet->rr_cur]),
			ethhdr->h_dest, ETH_ALEN);
		icmp_packet->rr_cur++;
	}

	/* packet for me */
	if (is_my_mac(icmp_packet->dst))
		return recv_my_icmp_packet(bat_priv, skb, hdr_size);

	/* TTL exceeded */
	if (icmp_packet->ttl < 2)
1019
		return recv_icmp_ttl_exceeded(bat_priv, skb);
1020 1021

	/* get routing information */
1022
	orig_node = orig_hash_find(bat_priv, icmp_packet->dst);
1023
	if (!orig_node)
1024
		goto out;
1025

1026 1027 1028
	router = orig_node_get_router(orig_node);
	if (!router)
		goto out;
1029

1030 1031 1032
	/* create a copy of the skb, if needed, to modify it. */
	if (skb_cow(skb, sizeof(struct ethhdr)) < 0)
		goto out;
1033

1034
	icmp_packet = (struct icmp_packet_rr *)skb->data;
1035

1036 1037 1038 1039
	/* decrement ttl */
	icmp_packet->ttl--;

	/* route it */
1040
	send_skb_packet(skb, router->if_incoming, router->addr);
1041
	ret = NET_RX_SUCCESS;
1042

1043
out:
1044 1045
	if (router)
		neigh_node_free_ref(router);
1046
	if (orig_node)
1047
		orig_node_free_ref(orig_node);
1048 1049 1050
	return ret;
}

1051 1052 1053 1054 1055 1056
/* In the bonding case, send the packets in a round
 * robin fashion over the remaining interfaces.
 *
 * This method rotates the bonding list and increases the
 * returned router's refcount. */
static struct neigh_node *find_bond_router(struct orig_node *primary_orig,
1057
					   const struct hard_iface *recv_if)
1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107
{
	struct neigh_node *tmp_neigh_node;
	struct neigh_node *router = NULL, *first_candidate = NULL;

	rcu_read_lock();
	list_for_each_entry_rcu(tmp_neigh_node, &primary_orig->bond_list,
				bonding_list) {
		if (!first_candidate)
			first_candidate = tmp_neigh_node;

		/* recv_if == NULL on the first node. */
		if (tmp_neigh_node->if_incoming == recv_if)
			continue;

		if (!atomic_inc_not_zero(&tmp_neigh_node->refcount))
			continue;

		router = tmp_neigh_node;
		break;
	}

	/* use the first candidate if nothing was found. */
	if (!router && first_candidate &&
	    atomic_inc_not_zero(&first_candidate->refcount))
		router = first_candidate;

	if (!router)
		goto out;

	/* selected should point to the next element
	 * after the current router */
	spin_lock_bh(&primary_orig->neigh_list_lock);
	/* this is a list_move(), which unfortunately
	 * does not exist as rcu version */
	list_del_rcu(&primary_orig->bond_list);
	list_add_rcu(&primary_orig->bond_list,
		     &router->bonding_list);
	spin_unlock_bh(&primary_orig->neigh_list_lock);

out:
	rcu_read_unlock();
	return router;
}

/* Interface Alternating: Use the best of the
 * remaining candidates which are not using
 * this interface.
 *
 * Increases the returned router's refcount */
static struct neigh_node *find_ifalter_router(struct orig_node *primary_orig,
1108
					      const struct hard_iface *recv_if)
1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150
{
	struct neigh_node *tmp_neigh_node;
	struct neigh_node *router = NULL, *first_candidate = NULL;

	rcu_read_lock();
	list_for_each_entry_rcu(tmp_neigh_node, &primary_orig->bond_list,
				bonding_list) {
		if (!first_candidate)
			first_candidate = tmp_neigh_node;

		/* recv_if == NULL on the first node. */
		if (tmp_neigh_node->if_incoming == recv_if)
			continue;

		if (!atomic_inc_not_zero(&tmp_neigh_node->refcount))
			continue;

		/* if we don't have a router yet
		 * or this one is better, choose it. */
		if ((!router) ||
		    (tmp_neigh_node->tq_avg > router->tq_avg)) {
			/* decrement refcount of
			 * previously selected router */
			if (router)
				neigh_node_free_ref(router);

			router = tmp_neigh_node;
			atomic_inc_not_zero(&router->refcount);
		}

		neigh_node_free_ref(tmp_neigh_node);
	}

	/* use the first candidate if nothing was found. */
	if (!router && first_candidate &&
	    atomic_inc_not_zero(&first_candidate->refcount))
		router = first_candidate;

	rcu_read_unlock();
	return router;
}

1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192
int recv_tt_query(struct sk_buff *skb, struct hard_iface *recv_if)
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
	struct tt_query_packet *tt_query;
	struct ethhdr *ethhdr;

	/* drop packet if it has not necessary minimum size */
	if (unlikely(!pskb_may_pull(skb, sizeof(struct tt_query_packet))))
		goto out;

	/* I could need to modify it */
	if (skb_cow(skb, sizeof(struct tt_query_packet)) < 0)
		goto out;

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with unicast indication but broadcast recipient */
	if (is_broadcast_ether_addr(ethhdr->h_dest))
		goto out;

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
		goto out;

	tt_query = (struct tt_query_packet *)skb->data;

	tt_query->tt_data = ntohs(tt_query->tt_data);

	switch (tt_query->flags & TT_QUERY_TYPE_MASK) {
	case TT_REQUEST:
		/* If we cannot provide an answer the tt_request is
		 * forwarded */
		if (!send_tt_response(bat_priv, tt_query)) {
			bat_dbg(DBG_TT, bat_priv,
				"Routing TT_REQUEST to %pM [%c]\n",
				tt_query->dst,
				(tt_query->flags & TT_FULL_TABLE ? 'F' : '.'));
			tt_query->tt_data = htons(tt_query->tt_data);
			return route_unicast_packet(skb, recv_if);
		}
		break;
	case TT_RESPONSE:
1193
		/* packet needs to be linearized to access the TT changes */
1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214
		if (skb_linearize(skb) < 0)
			goto out;

		if (is_my_mac(tt_query->dst))
			handle_tt_response(bat_priv, tt_query);
		else {
			bat_dbg(DBG_TT, bat_priv,
				"Routing TT_RESPONSE to %pM [%c]\n",
				tt_query->dst,
				(tt_query->flags & TT_FULL_TABLE ? 'F' : '.'));
			tt_query->tt_data = htons(tt_query->tt_data);
			return route_unicast_packet(skb, recv_if);
		}
		break;
	}

out:
	/* returning NET_RX_DROP will make the caller function kfree the skb */
	return NET_RX_DROP;
}

1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249
int recv_roam_adv(struct sk_buff *skb, struct hard_iface *recv_if)
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
	struct roam_adv_packet *roam_adv_packet;
	struct orig_node *orig_node;
	struct ethhdr *ethhdr;

	/* drop packet if it has not necessary minimum size */
	if (unlikely(!pskb_may_pull(skb, sizeof(struct roam_adv_packet))))
		goto out;

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with unicast indication but broadcast recipient */
	if (is_broadcast_ether_addr(ethhdr->h_dest))
		goto out;

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
		goto out;

	roam_adv_packet = (struct roam_adv_packet *)skb->data;

	if (!is_my_mac(roam_adv_packet->dst))
		return route_unicast_packet(skb, recv_if);

	orig_node = orig_hash_find(bat_priv, roam_adv_packet->src);
	if (!orig_node)
		goto out;

	bat_dbg(DBG_TT, bat_priv, "Received ROAMING_ADV from %pM "
		"(client %pM)\n", roam_adv_packet->src,
		roam_adv_packet->client);

	tt_global_add(bat_priv, orig_node, roam_adv_packet->client,
1250
		      atomic_read(&orig_node->last_ttvn) + 1, true, false);
1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262

	/* Roaming phase starts: I have new information but the ttvn has not
	 * been incremented yet. This flag will make me check all the incoming
	 * packets for the correct destination. */
	bat_priv->tt_poss_change = true;

	orig_node_free_ref(orig_node);
out:
	/* returning NET_RX_DROP will make the caller function kfree the skb */
	return NET_RX_DROP;
}

1263
/* find a suitable router for this originator, and use
1264 1265
 * bonding if possible. increases the found neighbors
 * refcount.*/
1266 1267
struct neigh_node *find_router(struct bat_priv *bat_priv,
			       struct orig_node *orig_node,
1268
			       const struct hard_iface *recv_if)
1269 1270 1271
{
	struct orig_node *primary_orig_node;
	struct orig_node *router_orig;
1272
	struct neigh_node *router;
1273 1274 1275 1276 1277 1278
	static uint8_t zero_mac[ETH_ALEN] = {0, 0, 0, 0, 0, 0};
	int bonding_enabled;

	if (!orig_node)
		return NULL;

1279 1280
	router = orig_node_get_router(orig_node);
	if (!router)
1281
		goto err;
1282 1283 1284 1285 1286

	/* without bonding, the first node should
	 * always choose the default router. */
	bonding_enabled = atomic_read(&bat_priv->bonding);

1287 1288
	rcu_read_lock();
	/* select default router to output */
1289
	router_orig = router->orig_node;
1290 1291
	if (!router_orig)
		goto err_unlock;
1292 1293 1294

	if ((!recv_if) && (!bonding_enabled))
		goto return_router;
1295 1296 1297

	/* if we have something in the primary_addr, we can search
	 * for a potential bonding candidate. */
1298
	if (compare_eth(router_orig->primary_addr, zero_mac))
1299
		goto return_router;
1300 1301 1302 1303

	/* find the orig_node which has the primary interface. might
	 * even be the same as our router_orig in many cases */

1304
	if (compare_eth(router_orig->primary_addr, router_orig->orig)) {
1305 1306
		primary_orig_node = router_orig;
	} else {
1307 1308
		primary_orig_node = orig_hash_find(bat_priv,
						   router_orig->primary_addr);
1309
		if (!primary_orig_node)
1310
			goto return_router;
1311

1312
		orig_node_free_ref(primary_orig_node);
1313 1314 1315 1316
	}

	/* with less than 2 candidates, we can't do any
	 * bonding and prefer the original router. */
1317 1318
	if (atomic_read(&primary_orig_node->bond_candidates) < 2)
		goto return_router;
1319 1320 1321 1322

	/* all nodes between should choose a candidate which
	 * is is not on the interface where the packet came
	 * in. */
1323

1324
	neigh_node_free_ref(router);
1325

1326 1327 1328 1329
	if (bonding_enabled)
		router = find_bond_router(primary_orig_node, recv_if);
	else
		router = find_ifalter_router(primary_orig_node, recv_if);
1330

1331
return_router:
1332 1333 1334
	if (router && router->if_incoming->if_status != IF_ACTIVE)
		goto err_unlock;

1335
	rcu_read_unlock();
1336
	return router;
1337 1338 1339 1340 1341 1342
err_unlock:
	rcu_read_unlock();
err:
	if (router)
		neigh_node_free_ref(router);
	return NULL;
1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369
}

static int check_unicast_packet(struct sk_buff *skb, int hdr_size)
{
	struct ethhdr *ethhdr;

	/* drop packet if it has not necessary minimum size */
	if (unlikely(!pskb_may_pull(skb, hdr_size)))
		return -1;

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with unicast indication but broadcast recipient */
	if (is_broadcast_ether_addr(ethhdr->h_dest))
		return -1;

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
		return -1;

	/* not for me */
	if (!is_my_mac(ethhdr->h_dest))
		return -1;

	return 0;
}

1370
int route_unicast_packet(struct sk_buff *skb, struct hard_iface *recv_if)
1371 1372
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1373 1374
	struct orig_node *orig_node = NULL;
	struct neigh_node *neigh_node = NULL;
1375 1376
	struct unicast_packet *unicast_packet;
	struct ethhdr *ethhdr = (struct ethhdr *)skb_mac_header(skb);
1377
	int ret = NET_RX_DROP;
1378 1379 1380 1381 1382 1383 1384 1385 1386
	struct sk_buff *new_skb;

	unicast_packet = (struct unicast_packet *)skb->data;

	/* TTL exceeded */
	if (unicast_packet->ttl < 2) {
		pr_debug("Warning - can't forward unicast packet from %pM to "
			 "%pM: ttl exceeded\n", ethhdr->h_source,
			 unicast_packet->dest);
1387
		goto out;
1388 1389 1390
	}

	/* get routing information */
1391 1392
	orig_node = orig_hash_find(bat_priv, unicast_packet->dest);

1393
	if (!orig_node)
1394
		goto out;
1395

1396
	/* find_router() increases neigh_nodes refcount if found. */
1397
	neigh_node = find_router(bat_priv, orig_node, recv_if);
1398

1399
	if (!neigh_node)
1400
		goto out;
1401 1402 1403

	/* create a copy of the skb, if needed, to modify it. */
	if (skb_cow(skb, sizeof(struct ethhdr)) < 0)
1404
		goto out;
1405 1406 1407 1408 1409

	unicast_packet = (struct unicast_packet *)skb->data;

	if (unicast_packet->packet_type == BAT_UNICAST &&
	    atomic_read(&bat_priv->fragmentation) &&
1410 1411 1412 1413 1414
	    skb->len > neigh_node->if_incoming->net_dev->mtu) {
		ret = frag_send_skb(skb, bat_priv,
				    neigh_node->if_incoming, neigh_node->addr);
		goto out;
	}
1415 1416

	if (unicast_packet->packet_type == BAT_UNICAST_FRAG &&
1417
	    frag_can_reassemble(skb, neigh_node->if_incoming->net_dev->mtu)) {
1418 1419 1420 1421

		ret = frag_reassemble_skb(skb, bat_priv, &new_skb);

		if (ret == NET_RX_DROP)
1422
			goto out;
1423 1424

		/* packet was buffered for late merge */
1425 1426 1427 1428
		if (!new_skb) {
			ret = NET_RX_SUCCESS;
			goto out;
		}
1429 1430 1431 1432 1433 1434 1435 1436 1437

		skb = new_skb;
		unicast_packet = (struct unicast_packet *)skb->data;
	}

	/* decrement ttl */
	unicast_packet->ttl--;

	/* route it */
1438
	send_skb_packet(skb, neigh_node->if_incoming, neigh_node->addr);
1439
	ret = NET_RX_SUCCESS;
1440

1441 1442 1443 1444
out:
	if (neigh_node)
		neigh_node_free_ref(neigh_node);
	if (orig_node)
1445
		orig_node_free_ref(orig_node);
1446
	return ret;
1447 1448
}

1449 1450 1451 1452 1453 1454 1455
static int check_unicast_ttvn(struct bat_priv *bat_priv,
			       struct sk_buff *skb) {
	uint8_t curr_ttvn;
	struct orig_node *orig_node;
	struct ethhdr *ethhdr;
	struct hard_iface *primary_if;
	struct unicast_packet *unicast_packet;
1456
	bool tt_poss_change;
1457 1458 1459 1460 1461 1462 1463

	/* I could need to modify it */
	if (skb_cow(skb, sizeof(struct unicast_packet)) < 0)
		return 0;

	unicast_packet = (struct unicast_packet *)skb->data;

1464 1465
	if (is_my_mac(unicast_packet->dest)) {
		tt_poss_change = bat_priv->tt_poss_change;
1466
		curr_ttvn = (uint8_t)atomic_read(&bat_priv->ttvn);
1467
	} else {
1468 1469 1470 1471 1472 1473
		orig_node = orig_hash_find(bat_priv, unicast_packet->dest);

		if (!orig_node)
			return 0;

		curr_ttvn = (uint8_t)atomic_read(&orig_node->last_ttvn);
1474
		tt_poss_change = orig_node->tt_poss_change;
1475 1476 1477 1478
		orig_node_free_ref(orig_node);
	}

	/* Check whether I have to reroute the packet */
1479
	if (seq_before(unicast_packet->ttvn, curr_ttvn) || tt_poss_change) {
1480 1481 1482 1483 1484 1485
		/* Linearize the skb before accessing it */
		if (skb_linearize(skb) < 0)
			return 0;

		ethhdr = (struct ethhdr *)(skb->data +
			sizeof(struct unicast_packet));
1486
		orig_node = transtable_search(bat_priv, NULL, ethhdr->h_dest);
1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514

		if (!orig_node) {
			if (!is_my_client(bat_priv, ethhdr->h_dest))
				return 0;
			primary_if = primary_if_get_selected(bat_priv);
			if (!primary_if)
				return 0;
			memcpy(unicast_packet->dest,
			       primary_if->net_dev->dev_addr, ETH_ALEN);
			hardif_free_ref(primary_if);
		} else {
			memcpy(unicast_packet->dest, orig_node->orig,
			       ETH_ALEN);
			curr_ttvn = (uint8_t)
				atomic_read(&orig_node->last_ttvn);
			orig_node_free_ref(orig_node);
		}

		bat_dbg(DBG_ROUTES, bat_priv, "TTVN mismatch (old_ttvn %u "
			"new_ttvn %u)! Rerouting unicast packet (for %pM) to "
			"%pM\n", unicast_packet->ttvn, curr_ttvn,
			ethhdr->h_dest, unicast_packet->dest);

		unicast_packet->ttvn = curr_ttvn;
	}
	return 1;
}

1515
int recv_unicast_packet(struct sk_buff *skb, struct hard_iface *recv_if)
1516
{
1517
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1518
	struct unicast_packet *unicast_packet;
1519
	int hdr_size = sizeof(*unicast_packet);
1520 1521 1522 1523

	if (check_unicast_packet(skb, hdr_size) < 0)
		return NET_RX_DROP;

1524 1525 1526
	if (!check_unicast_ttvn(bat_priv, skb))
		return NET_RX_DROP;

1527 1528 1529 1530 1531 1532 1533 1534
	unicast_packet = (struct unicast_packet *)skb->data;

	/* packet for me */
	if (is_my_mac(unicast_packet->dest)) {
		interface_rx(recv_if->soft_iface, skb, recv_if, hdr_size);
		return NET_RX_SUCCESS;
	}

1535
	return route_unicast_packet(skb, recv_if);
1536 1537
}

1538
int recv_ucast_frag_packet(struct sk_buff *skb, struct hard_iface *recv_if)
1539 1540 1541
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
	struct unicast_frag_packet *unicast_packet;
1542
	int hdr_size = sizeof(*unicast_packet);
1543 1544 1545 1546 1547 1548
	struct sk_buff *new_skb = NULL;
	int ret;

	if (check_unicast_packet(skb, hdr_size) < 0)
		return NET_RX_DROP;

1549 1550 1551
	if (!check_unicast_ttvn(bat_priv, skb))
		return NET_RX_DROP;

1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570
	unicast_packet = (struct unicast_frag_packet *)skb->data;

	/* packet for me */
	if (is_my_mac(unicast_packet->dest)) {

		ret = frag_reassemble_skb(skb, bat_priv, &new_skb);

		if (ret == NET_RX_DROP)
			return NET_RX_DROP;

		/* packet was buffered for late merge */
		if (!new_skb)
			return NET_RX_SUCCESS;

		interface_rx(recv_if->soft_iface, new_skb, recv_if,
			     sizeof(struct unicast_packet));
		return NET_RX_SUCCESS;
	}

1571
	return route_unicast_packet(skb, recv_if);
1572 1573 1574
}


1575
int recv_bcast_packet(struct sk_buff *skb, struct hard_iface *recv_if)
1576 1577
{
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1578
	struct orig_node *orig_node = NULL;
1579 1580
	struct bcast_packet *bcast_packet;
	struct ethhdr *ethhdr;
1581
	int hdr_size = sizeof(*bcast_packet);
1582
	int ret = NET_RX_DROP;
1583 1584 1585 1586
	int32_t seq_diff;

	/* drop packet if it has not necessary minimum size */
	if (unlikely(!pskb_may_pull(skb, hdr_size)))
1587
		goto out;
1588 1589 1590 1591 1592

	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* packet with broadcast indication but unicast recipient */
	if (!is_broadcast_ether_addr(ethhdr->h_dest))
1593
		goto out;
1594 1595 1596

	/* packet with broadcast sender address */
	if (is_broadcast_ether_addr(ethhdr->h_source))
1597
		goto out;
1598 1599 1600

	/* ignore broadcasts sent by myself */
	if (is_my_mac(ethhdr->h_source))
1601
		goto out;
1602 1603 1604 1605 1606

	bcast_packet = (struct bcast_packet *)skb->data;

	/* ignore broadcasts originated by myself */
	if (is_my_mac(bcast_packet->orig))
1607
		goto out;
1608 1609

	if (bcast_packet->ttl < 2)
1610
		goto out;
1611

1612
	orig_node = orig_hash_find(bat_priv, bcast_packet->orig);
1613 1614

	if (!orig_node)
1615
		goto out;
1616

1617
	spin_lock_bh(&orig_node->bcast_seqno_lock);
1618 1619

	/* check whether the packet is a duplicate */
1620 1621 1622
	if (get_bit_status(orig_node->bcast_bits, orig_node->last_bcast_seqno,
			   ntohl(bcast_packet->seqno)))
		goto spin_unlock;
1623 1624 1625 1626 1627

	seq_diff = ntohl(bcast_packet->seqno) - orig_node->last_bcast_seqno;

	/* check whether the packet is old and the host just restarted. */
	if (window_protected(bat_priv, seq_diff,
1628 1629
			     &orig_node->bcast_seqno_reset))
		goto spin_unlock;
1630 1631 1632 1633 1634 1635

	/* mark broadcast in flood history, update window position
	 * if required. */
	if (bit_get_packet(bat_priv, orig_node->bcast_bits, seq_diff, 1))
		orig_node->last_bcast_seqno = ntohl(bcast_packet->seqno);

1636 1637
	spin_unlock_bh(&orig_node->bcast_seqno_lock);

1638
	/* rebroadcast packet */
1639
	add_bcast_packet_to_list(bat_priv, skb, 1);
1640 1641 1642

	/* broadcast for me */
	interface_rx(recv_if->soft_iface, skb, recv_if, hdr_size);
1643 1644
	ret = NET_RX_SUCCESS;
	goto out;
1645

1646 1647 1648 1649
spin_unlock:
	spin_unlock_bh(&orig_node->bcast_seqno_lock);
out:
	if (orig_node)
1650
		orig_node_free_ref(orig_node);
1651
	return ret;
1652 1653
}

1654
int recv_vis_packet(struct sk_buff *skb, struct hard_iface *recv_if)
1655 1656 1657 1658
{
	struct vis_packet *vis_packet;
	struct ethhdr *ethhdr;
	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1659
	int hdr_size = sizeof(*vis_packet);
1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700

	/* keep skb linear */
	if (skb_linearize(skb) < 0)
		return NET_RX_DROP;

	if (unlikely(!pskb_may_pull(skb, hdr_size)))
		return NET_RX_DROP;

	vis_packet = (struct vis_packet *)skb->data;
	ethhdr = (struct ethhdr *)skb_mac_header(skb);

	/* not for me */
	if (!is_my_mac(ethhdr->h_dest))
		return NET_RX_DROP;

	/* ignore own packets */
	if (is_my_mac(vis_packet->vis_orig))
		return NET_RX_DROP;

	if (is_my_mac(vis_packet->sender_orig))
		return NET_RX_DROP;

	switch (vis_packet->vis_type) {
	case VIS_TYPE_SERVER_SYNC:
		receive_server_sync_packet(bat_priv, vis_packet,
					   skb_headlen(skb));
		break;

	case VIS_TYPE_CLIENT_UPDATE:
		receive_client_update_packet(bat_priv, vis_packet,
					     skb_headlen(skb));
		break;

	default:	/* ignore unknown packet */
		break;
	}

	/* We take a copy of the data in the packet, so we should
	   always free the skbuf. */
	return NET_RX_DROP;
}