xref: /linux/net/batman-adv/routing.c (revision 26b0d14106954ae46d2f4f7eec3481828a210f7d)
1 /*
2  * Copyright (C) 2007-2012 B.A.T.M.A.N. contributors:
3  *
4  * Marek Lindner, Simon Wunderlich
5  *
6  * This program is free software; you can redistribute it and/or
7  * modify it under the terms of version 2 of the GNU General Public
8  * License as published by the Free Software Foundation.
9  *
10  * This program is distributed in the hope that it will be useful, but
11  * WITHOUT ANY WARRANTY; without even the implied warranty of
12  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13  * General Public License for more details.
14  *
15  * You should have received a copy of the GNU General Public License
16  * along with this program; if not, write to the Free Software
17  * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
18  * 02110-1301, USA
19  *
20  */
21 
22 #include "main.h"
23 #include "routing.h"
24 #include "send.h"
25 #include "soft-interface.h"
26 #include "hard-interface.h"
27 #include "icmp_socket.h"
28 #include "translation-table.h"
29 #include "originator.h"
30 #include "vis.h"
31 #include "unicast.h"
32 #include "bridge_loop_avoidance.h"
33 
34 static int route_unicast_packet(struct sk_buff *skb,
35 				struct hard_iface *recv_if);
36 
37 void slide_own_bcast_window(struct hard_iface *hard_iface)
38 {
39 	struct bat_priv *bat_priv = netdev_priv(hard_iface->soft_iface);
40 	struct hashtable_t *hash = bat_priv->orig_hash;
41 	struct hlist_node *node;
42 	struct hlist_head *head;
43 	struct orig_node *orig_node;
44 	unsigned long *word;
45 	uint32_t i;
46 	size_t word_index;
47 
48 	for (i = 0; i < hash->size; i++) {
49 		head = &hash->table[i];
50 
51 		rcu_read_lock();
52 		hlist_for_each_entry_rcu(orig_node, node, head, hash_entry) {
53 			spin_lock_bh(&orig_node->ogm_cnt_lock);
54 			word_index = hard_iface->if_num * NUM_WORDS;
55 			word = &(orig_node->bcast_own[word_index]);
56 
57 			bit_get_packet(bat_priv, word, 1, 0);
58 			orig_node->bcast_own_sum[hard_iface->if_num] =
59 				bitmap_weight(word, TQ_LOCAL_WINDOW_SIZE);
60 			spin_unlock_bh(&orig_node->ogm_cnt_lock);
61 		}
62 		rcu_read_unlock();
63 	}
64 }
65 
66 static void _update_route(struct bat_priv *bat_priv,
67 			  struct orig_node *orig_node,
68 			  struct neigh_node *neigh_node)
69 {
70 	struct neigh_node *curr_router;
71 
72 	curr_router = orig_node_get_router(orig_node);
73 
74 	/* route deleted */
75 	if ((curr_router) && (!neigh_node)) {
76 		bat_dbg(DBG_ROUTES, bat_priv, "Deleting route towards: %pM\n",
77 			orig_node->orig);
78 		tt_global_del_orig(bat_priv, orig_node,
79 				   "Deleted route towards originator");
80 
81 	/* route added */
82 	} else if ((!curr_router) && (neigh_node)) {
83 
84 		bat_dbg(DBG_ROUTES, bat_priv,
85 			"Adding route towards: %pM (via %pM)\n",
86 			orig_node->orig, neigh_node->addr);
87 	/* route changed */
88 	} else if (neigh_node && curr_router) {
89 		bat_dbg(DBG_ROUTES, bat_priv,
90 			"Changing route towards: %pM (now via %pM - was via %pM)\n",
91 			orig_node->orig, neigh_node->addr,
92 			curr_router->addr);
93 	}
94 
95 	if (curr_router)
96 		neigh_node_free_ref(curr_router);
97 
98 	/* increase refcount of new best neighbor */
99 	if (neigh_node && !atomic_inc_not_zero(&neigh_node->refcount))
100 		neigh_node = NULL;
101 
102 	spin_lock_bh(&orig_node->neigh_list_lock);
103 	rcu_assign_pointer(orig_node->router, neigh_node);
104 	spin_unlock_bh(&orig_node->neigh_list_lock);
105 
106 	/* decrease refcount of previous best neighbor */
107 	if (curr_router)
108 		neigh_node_free_ref(curr_router);
109 }
110 
111 void update_route(struct bat_priv *bat_priv, struct orig_node *orig_node,
112 		  struct neigh_node *neigh_node)
113 {
114 	struct neigh_node *router = NULL;
115 
116 	if (!orig_node)
117 		goto out;
118 
119 	router = orig_node_get_router(orig_node);
120 
121 	if (router != neigh_node)
122 		_update_route(bat_priv, orig_node, neigh_node);
123 
124 out:
125 	if (router)
126 		neigh_node_free_ref(router);
127 }
128 
129 /* caller must hold the neigh_list_lock */
130 void bonding_candidate_del(struct orig_node *orig_node,
131 			   struct neigh_node *neigh_node)
132 {
133 	/* this neighbor is not part of our candidate list */
134 	if (list_empty(&neigh_node->bonding_list))
135 		goto out;
136 
137 	list_del_rcu(&neigh_node->bonding_list);
138 	INIT_LIST_HEAD(&neigh_node->bonding_list);
139 	neigh_node_free_ref(neigh_node);
140 	atomic_dec(&orig_node->bond_candidates);
141 
142 out:
143 	return;
144 }
145 
146 void bonding_candidate_add(struct orig_node *orig_node,
147 			   struct neigh_node *neigh_node)
148 {
149 	struct hlist_node *node;
150 	struct neigh_node *tmp_neigh_node, *router = NULL;
151 	uint8_t interference_candidate = 0;
152 
153 	spin_lock_bh(&orig_node->neigh_list_lock);
154 
155 	/* only consider if it has the same primary address ...  */
156 	if (!compare_eth(orig_node->orig,
157 			 neigh_node->orig_node->primary_addr))
158 		goto candidate_del;
159 
160 	router = orig_node_get_router(orig_node);
161 	if (!router)
162 		goto candidate_del;
163 
164 	/* ... and is good enough to be considered */
165 	if (neigh_node->tq_avg < router->tq_avg - BONDING_TQ_THRESHOLD)
166 		goto candidate_del;
167 
168 	/**
169 	 * check if we have another candidate with the same mac address or
170 	 * interface. If we do, we won't select this candidate because of
171 	 * possible interference.
172 	 */
173 	hlist_for_each_entry_rcu(tmp_neigh_node, node,
174 				 &orig_node->neigh_list, list) {
175 
176 		if (tmp_neigh_node == neigh_node)
177 			continue;
178 
179 		/* we only care if the other candidate is even
180 		* considered as candidate. */
181 		if (list_empty(&tmp_neigh_node->bonding_list))
182 			continue;
183 
184 		if ((neigh_node->if_incoming == tmp_neigh_node->if_incoming) ||
185 		    (compare_eth(neigh_node->addr, tmp_neigh_node->addr))) {
186 			interference_candidate = 1;
187 			break;
188 		}
189 	}
190 
191 	/* don't care further if it is an interference candidate */
192 	if (interference_candidate)
193 		goto candidate_del;
194 
195 	/* this neighbor already is part of our candidate list */
196 	if (!list_empty(&neigh_node->bonding_list))
197 		goto out;
198 
199 	if (!atomic_inc_not_zero(&neigh_node->refcount))
200 		goto out;
201 
202 	list_add_rcu(&neigh_node->bonding_list, &orig_node->bond_list);
203 	atomic_inc(&orig_node->bond_candidates);
204 	goto out;
205 
206 candidate_del:
207 	bonding_candidate_del(orig_node, neigh_node);
208 
209 out:
210 	spin_unlock_bh(&orig_node->neigh_list_lock);
211 
212 	if (router)
213 		neigh_node_free_ref(router);
214 }
215 
216 /* copy primary address for bonding */
217 void bonding_save_primary(const struct orig_node *orig_node,
218 			  struct orig_node *orig_neigh_node,
219 			  const struct batman_ogm_packet *batman_ogm_packet)
220 {
221 	if (!(batman_ogm_packet->flags & PRIMARIES_FIRST_HOP))
222 		return;
223 
224 	memcpy(orig_neigh_node->primary_addr, orig_node->orig, ETH_ALEN);
225 }
226 
227 /* checks whether the host restarted and is in the protection time.
228  * returns:
229  *  0 if the packet is to be accepted
230  *  1 if the packet is to be ignored.
231  */
232 int window_protected(struct bat_priv *bat_priv, int32_t seq_num_diff,
233 		     unsigned long *last_reset)
234 {
235 	if ((seq_num_diff <= -TQ_LOCAL_WINDOW_SIZE) ||
236 	    (seq_num_diff >= EXPECTED_SEQNO_RANGE)) {
237 		if (!has_timed_out(*last_reset, RESET_PROTECTION_MS))
238 			return 1;
239 
240 		*last_reset = jiffies;
241 		bat_dbg(DBG_BATMAN, bat_priv,
242 			"old packet received, start protection\n");
243 	}
244 
245 	return 0;
246 }
247 
248 bool check_management_packet(struct sk_buff *skb,
249 			     struct hard_iface *hard_iface,
250 			     int header_len)
251 {
252 	struct ethhdr *ethhdr;
253 
254 	/* drop packet if it has not necessary minimum size */
255 	if (unlikely(!pskb_may_pull(skb, header_len)))
256 		return false;
257 
258 	ethhdr = (struct ethhdr *)skb_mac_header(skb);
259 
260 	/* packet with broadcast indication but unicast recipient */
261 	if (!is_broadcast_ether_addr(ethhdr->h_dest))
262 		return false;
263 
264 	/* packet with broadcast sender address */
265 	if (is_broadcast_ether_addr(ethhdr->h_source))
266 		return false;
267 
268 	/* create a copy of the skb, if needed, to modify it. */
269 	if (skb_cow(skb, 0) < 0)
270 		return false;
271 
272 	/* keep skb linear */
273 	if (skb_linearize(skb) < 0)
274 		return false;
275 
276 	return true;
277 }
278 
279 static int recv_my_icmp_packet(struct bat_priv *bat_priv,
280 			       struct sk_buff *skb, size_t icmp_len)
281 {
282 	struct hard_iface *primary_if = NULL;
283 	struct orig_node *orig_node = NULL;
284 	struct neigh_node *router = NULL;
285 	struct icmp_packet_rr *icmp_packet;
286 	int ret = NET_RX_DROP;
287 
288 	icmp_packet = (struct icmp_packet_rr *)skb->data;
289 
290 	/* add data to device queue */
291 	if (icmp_packet->msg_type != ECHO_REQUEST) {
292 		bat_socket_receive_packet(icmp_packet, icmp_len);
293 		goto out;
294 	}
295 
296 	primary_if = primary_if_get_selected(bat_priv);
297 	if (!primary_if)
298 		goto out;
299 
300 	/* answer echo request (ping) */
301 	/* get routing information */
302 	orig_node = orig_hash_find(bat_priv, icmp_packet->orig);
303 	if (!orig_node)
304 		goto out;
305 
306 	router = orig_node_get_router(orig_node);
307 	if (!router)
308 		goto out;
309 
310 	/* create a copy of the skb, if needed, to modify it. */
311 	if (skb_cow(skb, ETH_HLEN) < 0)
312 		goto out;
313 
314 	icmp_packet = (struct icmp_packet_rr *)skb->data;
315 
316 	memcpy(icmp_packet->dst, icmp_packet->orig, ETH_ALEN);
317 	memcpy(icmp_packet->orig, primary_if->net_dev->dev_addr, ETH_ALEN);
318 	icmp_packet->msg_type = ECHO_REPLY;
319 	icmp_packet->header.ttl = TTL;
320 
321 	send_skb_packet(skb, router->if_incoming, router->addr);
322 	ret = NET_RX_SUCCESS;
323 
324 out:
325 	if (primary_if)
326 		hardif_free_ref(primary_if);
327 	if (router)
328 		neigh_node_free_ref(router);
329 	if (orig_node)
330 		orig_node_free_ref(orig_node);
331 	return ret;
332 }
333 
334 static int recv_icmp_ttl_exceeded(struct bat_priv *bat_priv,
335 				  struct sk_buff *skb)
336 {
337 	struct hard_iface *primary_if = NULL;
338 	struct orig_node *orig_node = NULL;
339 	struct neigh_node *router = NULL;
340 	struct icmp_packet *icmp_packet;
341 	int ret = NET_RX_DROP;
342 
343 	icmp_packet = (struct icmp_packet *)skb->data;
344 
345 	/* send TTL exceeded if packet is an echo request (traceroute) */
346 	if (icmp_packet->msg_type != ECHO_REQUEST) {
347 		pr_debug("Warning - can't forward icmp packet from %pM to %pM: ttl exceeded\n",
348 			 icmp_packet->orig, icmp_packet->dst);
349 		goto out;
350 	}
351 
352 	primary_if = primary_if_get_selected(bat_priv);
353 	if (!primary_if)
354 		goto out;
355 
356 	/* get routing information */
357 	orig_node = orig_hash_find(bat_priv, icmp_packet->orig);
358 	if (!orig_node)
359 		goto out;
360 
361 	router = orig_node_get_router(orig_node);
362 	if (!router)
363 		goto out;
364 
365 	/* create a copy of the skb, if needed, to modify it. */
366 	if (skb_cow(skb, ETH_HLEN) < 0)
367 		goto out;
368 
369 	icmp_packet = (struct icmp_packet *)skb->data;
370 
371 	memcpy(icmp_packet->dst, icmp_packet->orig, ETH_ALEN);
372 	memcpy(icmp_packet->orig, primary_if->net_dev->dev_addr, ETH_ALEN);
373 	icmp_packet->msg_type = TTL_EXCEEDED;
374 	icmp_packet->header.ttl = TTL;
375 
376 	send_skb_packet(skb, router->if_incoming, router->addr);
377 	ret = NET_RX_SUCCESS;
378 
379 out:
380 	if (primary_if)
381 		hardif_free_ref(primary_if);
382 	if (router)
383 		neigh_node_free_ref(router);
384 	if (orig_node)
385 		orig_node_free_ref(orig_node);
386 	return ret;
387 }
388 
389 
390 int recv_icmp_packet(struct sk_buff *skb, struct hard_iface *recv_if)
391 {
392 	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
393 	struct icmp_packet_rr *icmp_packet;
394 	struct ethhdr *ethhdr;
395 	struct orig_node *orig_node = NULL;
396 	struct neigh_node *router = NULL;
397 	int hdr_size = sizeof(struct icmp_packet);
398 	int ret = NET_RX_DROP;
399 
400 	/**
401 	 * we truncate all incoming icmp packets if they don't match our size
402 	 */
403 	if (skb->len >= sizeof(struct icmp_packet_rr))
404 		hdr_size = sizeof(struct icmp_packet_rr);
405 
406 	/* drop packet if it has not necessary minimum size */
407 	if (unlikely(!pskb_may_pull(skb, hdr_size)))
408 		goto out;
409 
410 	ethhdr = (struct ethhdr *)skb_mac_header(skb);
411 
412 	/* packet with unicast indication but broadcast recipient */
413 	if (is_broadcast_ether_addr(ethhdr->h_dest))
414 		goto out;
415 
416 	/* packet with broadcast sender address */
417 	if (is_broadcast_ether_addr(ethhdr->h_source))
418 		goto out;
419 
420 	/* not for me */
421 	if (!is_my_mac(ethhdr->h_dest))
422 		goto out;
423 
424 	icmp_packet = (struct icmp_packet_rr *)skb->data;
425 
426 	/* add record route information if not full */
427 	if ((hdr_size == sizeof(struct icmp_packet_rr)) &&
428 	    (icmp_packet->rr_cur < BAT_RR_LEN)) {
429 		memcpy(&(icmp_packet->rr[icmp_packet->rr_cur]),
430 		       ethhdr->h_dest, ETH_ALEN);
431 		icmp_packet->rr_cur++;
432 	}
433 
434 	/* packet for me */
435 	if (is_my_mac(icmp_packet->dst))
436 		return recv_my_icmp_packet(bat_priv, skb, hdr_size);
437 
438 	/* TTL exceeded */
439 	if (icmp_packet->header.ttl < 2)
440 		return recv_icmp_ttl_exceeded(bat_priv, skb);
441 
442 	/* get routing information */
443 	orig_node = orig_hash_find(bat_priv, icmp_packet->dst);
444 	if (!orig_node)
445 		goto out;
446 
447 	router = orig_node_get_router(orig_node);
448 	if (!router)
449 		goto out;
450 
451 	/* create a copy of the skb, if needed, to modify it. */
452 	if (skb_cow(skb, ETH_HLEN) < 0)
453 		goto out;
454 
455 	icmp_packet = (struct icmp_packet_rr *)skb->data;
456 
457 	/* decrement ttl */
458 	icmp_packet->header.ttl--;
459 
460 	/* route it */
461 	send_skb_packet(skb, router->if_incoming, router->addr);
462 	ret = NET_RX_SUCCESS;
463 
464 out:
465 	if (router)
466 		neigh_node_free_ref(router);
467 	if (orig_node)
468 		orig_node_free_ref(orig_node);
469 	return ret;
470 }
471 
472 /* In the bonding case, send the packets in a round
473  * robin fashion over the remaining interfaces.
474  *
475  * This method rotates the bonding list and increases the
476  * returned router's refcount. */
477 static struct neigh_node *find_bond_router(struct orig_node *primary_orig,
478 					   const struct hard_iface *recv_if)
479 {
480 	struct neigh_node *tmp_neigh_node;
481 	struct neigh_node *router = NULL, *first_candidate = NULL;
482 
483 	rcu_read_lock();
484 	list_for_each_entry_rcu(tmp_neigh_node, &primary_orig->bond_list,
485 				bonding_list) {
486 		if (!first_candidate)
487 			first_candidate = tmp_neigh_node;
488 
489 		/* recv_if == NULL on the first node. */
490 		if (tmp_neigh_node->if_incoming == recv_if)
491 			continue;
492 
493 		if (!atomic_inc_not_zero(&tmp_neigh_node->refcount))
494 			continue;
495 
496 		router = tmp_neigh_node;
497 		break;
498 	}
499 
500 	/* use the first candidate if nothing was found. */
501 	if (!router && first_candidate &&
502 	    atomic_inc_not_zero(&first_candidate->refcount))
503 		router = first_candidate;
504 
505 	if (!router)
506 		goto out;
507 
508 	/* selected should point to the next element
509 	 * after the current router */
510 	spin_lock_bh(&primary_orig->neigh_list_lock);
511 	/* this is a list_move(), which unfortunately
512 	 * does not exist as rcu version */
513 	list_del_rcu(&primary_orig->bond_list);
514 	list_add_rcu(&primary_orig->bond_list,
515 		     &router->bonding_list);
516 	spin_unlock_bh(&primary_orig->neigh_list_lock);
517 
518 out:
519 	rcu_read_unlock();
520 	return router;
521 }
522 
523 /* Interface Alternating: Use the best of the
524  * remaining candidates which are not using
525  * this interface.
526  *
527  * Increases the returned router's refcount */
528 static struct neigh_node *find_ifalter_router(struct orig_node *primary_orig,
529 					      const struct hard_iface *recv_if)
530 {
531 	struct neigh_node *tmp_neigh_node;
532 	struct neigh_node *router = NULL, *first_candidate = NULL;
533 
534 	rcu_read_lock();
535 	list_for_each_entry_rcu(tmp_neigh_node, &primary_orig->bond_list,
536 				bonding_list) {
537 		if (!first_candidate)
538 			first_candidate = tmp_neigh_node;
539 
540 		/* recv_if == NULL on the first node. */
541 		if (tmp_neigh_node->if_incoming == recv_if)
542 			continue;
543 
544 		if (!atomic_inc_not_zero(&tmp_neigh_node->refcount))
545 			continue;
546 
547 		/* if we don't have a router yet
548 		 * or this one is better, choose it. */
549 		if ((!router) ||
550 		    (tmp_neigh_node->tq_avg > router->tq_avg)) {
551 			/* decrement refcount of
552 			 * previously selected router */
553 			if (router)
554 				neigh_node_free_ref(router);
555 
556 			router = tmp_neigh_node;
557 			atomic_inc_not_zero(&router->refcount);
558 		}
559 
560 		neigh_node_free_ref(tmp_neigh_node);
561 	}
562 
563 	/* use the first candidate if nothing was found. */
564 	if (!router && first_candidate &&
565 	    atomic_inc_not_zero(&first_candidate->refcount))
566 		router = first_candidate;
567 
568 	rcu_read_unlock();
569 	return router;
570 }
571 
572 int recv_tt_query(struct sk_buff *skb, struct hard_iface *recv_if)
573 {
574 	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
575 	struct tt_query_packet *tt_query;
576 	uint16_t tt_len;
577 	struct ethhdr *ethhdr;
578 
579 	/* drop packet if it has not necessary minimum size */
580 	if (unlikely(!pskb_may_pull(skb, sizeof(struct tt_query_packet))))
581 		goto out;
582 
583 	/* I could need to modify it */
584 	if (skb_cow(skb, sizeof(struct tt_query_packet)) < 0)
585 		goto out;
586 
587 	ethhdr = (struct ethhdr *)skb_mac_header(skb);
588 
589 	/* packet with unicast indication but broadcast recipient */
590 	if (is_broadcast_ether_addr(ethhdr->h_dest))
591 		goto out;
592 
593 	/* packet with broadcast sender address */
594 	if (is_broadcast_ether_addr(ethhdr->h_source))
595 		goto out;
596 
597 	tt_query = (struct tt_query_packet *)skb->data;
598 
599 	tt_query->tt_data = ntohs(tt_query->tt_data);
600 
601 	switch (tt_query->flags & TT_QUERY_TYPE_MASK) {
602 	case TT_REQUEST:
603 		/* If we cannot provide an answer the tt_request is
604 		 * forwarded */
605 		if (!send_tt_response(bat_priv, tt_query)) {
606 			bat_dbg(DBG_TT, bat_priv,
607 				"Routing TT_REQUEST to %pM [%c]\n",
608 				tt_query->dst,
609 				(tt_query->flags & TT_FULL_TABLE ? 'F' : '.'));
610 			tt_query->tt_data = htons(tt_query->tt_data);
611 			return route_unicast_packet(skb, recv_if);
612 		}
613 		break;
614 	case TT_RESPONSE:
615 		if (is_my_mac(tt_query->dst)) {
616 			/* packet needs to be linearized to access the TT
617 			 * changes */
618 			if (skb_linearize(skb) < 0)
619 				goto out;
620 			/* skb_linearize() possibly changed skb->data */
621 			tt_query = (struct tt_query_packet *)skb->data;
622 
623 			tt_len = tt_query->tt_data * sizeof(struct tt_change);
624 
625 			/* Ensure we have all the claimed data */
626 			if (unlikely(skb_headlen(skb) <
627 				     sizeof(struct tt_query_packet) + tt_len))
628 				goto out;
629 
630 			handle_tt_response(bat_priv, tt_query);
631 		} else {
632 			bat_dbg(DBG_TT, bat_priv,
633 				"Routing TT_RESPONSE to %pM [%c]\n",
634 				tt_query->dst,
635 				(tt_query->flags & TT_FULL_TABLE ? 'F' : '.'));
636 			tt_query->tt_data = htons(tt_query->tt_data);
637 			return route_unicast_packet(skb, recv_if);
638 		}
639 		break;
640 	}
641 
642 out:
643 	/* returning NET_RX_DROP will make the caller function kfree the skb */
644 	return NET_RX_DROP;
645 }
646 
647 int recv_roam_adv(struct sk_buff *skb, struct hard_iface *recv_if)
648 {
649 	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
650 	struct roam_adv_packet *roam_adv_packet;
651 	struct orig_node *orig_node;
652 	struct ethhdr *ethhdr;
653 
654 	/* drop packet if it has not necessary minimum size */
655 	if (unlikely(!pskb_may_pull(skb, sizeof(struct roam_adv_packet))))
656 		goto out;
657 
658 	ethhdr = (struct ethhdr *)skb_mac_header(skb);
659 
660 	/* packet with unicast indication but broadcast recipient */
661 	if (is_broadcast_ether_addr(ethhdr->h_dest))
662 		goto out;
663 
664 	/* packet with broadcast sender address */
665 	if (is_broadcast_ether_addr(ethhdr->h_source))
666 		goto out;
667 
668 	roam_adv_packet = (struct roam_adv_packet *)skb->data;
669 
670 	if (!is_my_mac(roam_adv_packet->dst))
671 		return route_unicast_packet(skb, recv_if);
672 
673 	/* check if it is a backbone gateway. we don't accept
674 	 * roaming advertisement from it, as it has the same
675 	 * entries as we have.
676 	 */
677 	if (bla_is_backbone_gw_orig(bat_priv, roam_adv_packet->src))
678 		goto out;
679 
680 	orig_node = orig_hash_find(bat_priv, roam_adv_packet->src);
681 	if (!orig_node)
682 		goto out;
683 
684 	bat_dbg(DBG_TT, bat_priv,
685 		"Received ROAMING_ADV from %pM (client %pM)\n",
686 		roam_adv_packet->src, roam_adv_packet->client);
687 
688 	tt_global_add(bat_priv, orig_node, roam_adv_packet->client,
689 		      atomic_read(&orig_node->last_ttvn) + 1, true, false);
690 
691 	/* Roaming phase starts: I have new information but the ttvn has not
692 	 * been incremented yet. This flag will make me check all the incoming
693 	 * packets for the correct destination. */
694 	bat_priv->tt_poss_change = true;
695 
696 	orig_node_free_ref(orig_node);
697 out:
698 	/* returning NET_RX_DROP will make the caller function kfree the skb */
699 	return NET_RX_DROP;
700 }
701 
702 /* find a suitable router for this originator, and use
703  * bonding if possible. increases the found neighbors
704  * refcount.*/
705 struct neigh_node *find_router(struct bat_priv *bat_priv,
706 			       struct orig_node *orig_node,
707 			       const struct hard_iface *recv_if)
708 {
709 	struct orig_node *primary_orig_node;
710 	struct orig_node *router_orig;
711 	struct neigh_node *router;
712 	static uint8_t zero_mac[ETH_ALEN] = {0, 0, 0, 0, 0, 0};
713 	int bonding_enabled;
714 
715 	if (!orig_node)
716 		return NULL;
717 
718 	router = orig_node_get_router(orig_node);
719 	if (!router)
720 		goto err;
721 
722 	/* without bonding, the first node should
723 	 * always choose the default router. */
724 	bonding_enabled = atomic_read(&bat_priv->bonding);
725 
726 	rcu_read_lock();
727 	/* select default router to output */
728 	router_orig = router->orig_node;
729 	if (!router_orig)
730 		goto err_unlock;
731 
732 	if ((!recv_if) && (!bonding_enabled))
733 		goto return_router;
734 
735 	/* if we have something in the primary_addr, we can search
736 	 * for a potential bonding candidate. */
737 	if (compare_eth(router_orig->primary_addr, zero_mac))
738 		goto return_router;
739 
740 	/* find the orig_node which has the primary interface. might
741 	 * even be the same as our router_orig in many cases */
742 
743 	if (compare_eth(router_orig->primary_addr, router_orig->orig)) {
744 		primary_orig_node = router_orig;
745 	} else {
746 		primary_orig_node = orig_hash_find(bat_priv,
747 						   router_orig->primary_addr);
748 		if (!primary_orig_node)
749 			goto return_router;
750 
751 		orig_node_free_ref(primary_orig_node);
752 	}
753 
754 	/* with less than 2 candidates, we can't do any
755 	 * bonding and prefer the original router. */
756 	if (atomic_read(&primary_orig_node->bond_candidates) < 2)
757 		goto return_router;
758 
759 	/* all nodes between should choose a candidate which
760 	 * is is not on the interface where the packet came
761 	 * in. */
762 
763 	neigh_node_free_ref(router);
764 
765 	if (bonding_enabled)
766 		router = find_bond_router(primary_orig_node, recv_if);
767 	else
768 		router = find_ifalter_router(primary_orig_node, recv_if);
769 
770 return_router:
771 	if (router && router->if_incoming->if_status != IF_ACTIVE)
772 		goto err_unlock;
773 
774 	rcu_read_unlock();
775 	return router;
776 err_unlock:
777 	rcu_read_unlock();
778 err:
779 	if (router)
780 		neigh_node_free_ref(router);
781 	return NULL;
782 }
783 
784 static int check_unicast_packet(struct sk_buff *skb, int hdr_size)
785 {
786 	struct ethhdr *ethhdr;
787 
788 	/* drop packet if it has not necessary minimum size */
789 	if (unlikely(!pskb_may_pull(skb, hdr_size)))
790 		return -1;
791 
792 	ethhdr = (struct ethhdr *)skb_mac_header(skb);
793 
794 	/* packet with unicast indication but broadcast recipient */
795 	if (is_broadcast_ether_addr(ethhdr->h_dest))
796 		return -1;
797 
798 	/* packet with broadcast sender address */
799 	if (is_broadcast_ether_addr(ethhdr->h_source))
800 		return -1;
801 
802 	/* not for me */
803 	if (!is_my_mac(ethhdr->h_dest))
804 		return -1;
805 
806 	return 0;
807 }
808 
809 static int route_unicast_packet(struct sk_buff *skb, struct hard_iface *recv_if)
810 {
811 	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
812 	struct orig_node *orig_node = NULL;
813 	struct neigh_node *neigh_node = NULL;
814 	struct unicast_packet *unicast_packet;
815 	struct ethhdr *ethhdr = (struct ethhdr *)skb_mac_header(skb);
816 	int ret = NET_RX_DROP;
817 	struct sk_buff *new_skb;
818 
819 	unicast_packet = (struct unicast_packet *)skb->data;
820 
821 	/* TTL exceeded */
822 	if (unicast_packet->header.ttl < 2) {
823 		pr_debug("Warning - can't forward unicast packet from %pM to %pM: ttl exceeded\n",
824 			 ethhdr->h_source, unicast_packet->dest);
825 		goto out;
826 	}
827 
828 	/* get routing information */
829 	orig_node = orig_hash_find(bat_priv, unicast_packet->dest);
830 
831 	if (!orig_node)
832 		goto out;
833 
834 	/* find_router() increases neigh_nodes refcount if found. */
835 	neigh_node = find_router(bat_priv, orig_node, recv_if);
836 
837 	if (!neigh_node)
838 		goto out;
839 
840 	/* create a copy of the skb, if needed, to modify it. */
841 	if (skb_cow(skb, ETH_HLEN) < 0)
842 		goto out;
843 
844 	unicast_packet = (struct unicast_packet *)skb->data;
845 
846 	if (unicast_packet->header.packet_type == BAT_UNICAST &&
847 	    atomic_read(&bat_priv->fragmentation) &&
848 	    skb->len > neigh_node->if_incoming->net_dev->mtu) {
849 		ret = frag_send_skb(skb, bat_priv,
850 				    neigh_node->if_incoming, neigh_node->addr);
851 		goto out;
852 	}
853 
854 	if (unicast_packet->header.packet_type == BAT_UNICAST_FRAG &&
855 	    frag_can_reassemble(skb, neigh_node->if_incoming->net_dev->mtu)) {
856 
857 		ret = frag_reassemble_skb(skb, bat_priv, &new_skb);
858 
859 		if (ret == NET_RX_DROP)
860 			goto out;
861 
862 		/* packet was buffered for late merge */
863 		if (!new_skb) {
864 			ret = NET_RX_SUCCESS;
865 			goto out;
866 		}
867 
868 		skb = new_skb;
869 		unicast_packet = (struct unicast_packet *)skb->data;
870 	}
871 
872 	/* decrement ttl */
873 	unicast_packet->header.ttl--;
874 
875 	/* route it */
876 	send_skb_packet(skb, neigh_node->if_incoming, neigh_node->addr);
877 	ret = NET_RX_SUCCESS;
878 
879 out:
880 	if (neigh_node)
881 		neigh_node_free_ref(neigh_node);
882 	if (orig_node)
883 		orig_node_free_ref(orig_node);
884 	return ret;
885 }
886 
887 static int check_unicast_ttvn(struct bat_priv *bat_priv,
888 			       struct sk_buff *skb) {
889 	uint8_t curr_ttvn;
890 	struct orig_node *orig_node;
891 	struct ethhdr *ethhdr;
892 	struct hard_iface *primary_if;
893 	struct unicast_packet *unicast_packet;
894 	bool tt_poss_change;
895 
896 	/* I could need to modify it */
897 	if (skb_cow(skb, sizeof(struct unicast_packet)) < 0)
898 		return 0;
899 
900 	unicast_packet = (struct unicast_packet *)skb->data;
901 
902 	if (is_my_mac(unicast_packet->dest)) {
903 		tt_poss_change = bat_priv->tt_poss_change;
904 		curr_ttvn = (uint8_t)atomic_read(&bat_priv->ttvn);
905 	} else {
906 		orig_node = orig_hash_find(bat_priv, unicast_packet->dest);
907 
908 		if (!orig_node)
909 			return 0;
910 
911 		curr_ttvn = (uint8_t)atomic_read(&orig_node->last_ttvn);
912 		tt_poss_change = orig_node->tt_poss_change;
913 		orig_node_free_ref(orig_node);
914 	}
915 
916 	/* Check whether I have to reroute the packet */
917 	if (seq_before(unicast_packet->ttvn, curr_ttvn) || tt_poss_change) {
918 		/* check if there is enough data before accessing it */
919 		if (pskb_may_pull(skb, sizeof(struct unicast_packet) +
920 				  ETH_HLEN) < 0)
921 			return 0;
922 
923 		ethhdr = (struct ethhdr *)(skb->data +
924 			sizeof(struct unicast_packet));
925 
926 		/* we don't have an updated route for this client, so we should
927 		 * not try to reroute the packet!!
928 		 */
929 		if (tt_global_client_is_roaming(bat_priv, ethhdr->h_dest))
930 			return 1;
931 
932 		orig_node = transtable_search(bat_priv, NULL, ethhdr->h_dest);
933 
934 		if (!orig_node) {
935 			if (!is_my_client(bat_priv, ethhdr->h_dest))
936 				return 0;
937 			primary_if = primary_if_get_selected(bat_priv);
938 			if (!primary_if)
939 				return 0;
940 			memcpy(unicast_packet->dest,
941 			       primary_if->net_dev->dev_addr, ETH_ALEN);
942 			hardif_free_ref(primary_if);
943 		} else {
944 			memcpy(unicast_packet->dest, orig_node->orig,
945 			       ETH_ALEN);
946 			curr_ttvn = (uint8_t)
947 				atomic_read(&orig_node->last_ttvn);
948 			orig_node_free_ref(orig_node);
949 		}
950 
951 		bat_dbg(DBG_ROUTES, bat_priv,
952 			"TTVN mismatch (old_ttvn %u new_ttvn %u)! Rerouting unicast packet (for %pM) to %pM\n",
953 			unicast_packet->ttvn, curr_ttvn, ethhdr->h_dest,
954 			unicast_packet->dest);
955 
956 		unicast_packet->ttvn = curr_ttvn;
957 	}
958 	return 1;
959 }
960 
961 int recv_unicast_packet(struct sk_buff *skb, struct hard_iface *recv_if)
962 {
963 	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
964 	struct unicast_packet *unicast_packet;
965 	int hdr_size = sizeof(*unicast_packet);
966 
967 	if (check_unicast_packet(skb, hdr_size) < 0)
968 		return NET_RX_DROP;
969 
970 	if (!check_unicast_ttvn(bat_priv, skb))
971 		return NET_RX_DROP;
972 
973 	unicast_packet = (struct unicast_packet *)skb->data;
974 
975 	/* packet for me */
976 	if (is_my_mac(unicast_packet->dest)) {
977 		interface_rx(recv_if->soft_iface, skb, recv_if, hdr_size);
978 		return NET_RX_SUCCESS;
979 	}
980 
981 	return route_unicast_packet(skb, recv_if);
982 }
983 
984 int recv_ucast_frag_packet(struct sk_buff *skb, struct hard_iface *recv_if)
985 {
986 	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
987 	struct unicast_frag_packet *unicast_packet;
988 	int hdr_size = sizeof(*unicast_packet);
989 	struct sk_buff *new_skb = NULL;
990 	int ret;
991 
992 	if (check_unicast_packet(skb, hdr_size) < 0)
993 		return NET_RX_DROP;
994 
995 	if (!check_unicast_ttvn(bat_priv, skb))
996 		return NET_RX_DROP;
997 
998 	unicast_packet = (struct unicast_frag_packet *)skb->data;
999 
1000 	/* packet for me */
1001 	if (is_my_mac(unicast_packet->dest)) {
1002 
1003 		ret = frag_reassemble_skb(skb, bat_priv, &new_skb);
1004 
1005 		if (ret == NET_RX_DROP)
1006 			return NET_RX_DROP;
1007 
1008 		/* packet was buffered for late merge */
1009 		if (!new_skb)
1010 			return NET_RX_SUCCESS;
1011 
1012 		interface_rx(recv_if->soft_iface, new_skb, recv_if,
1013 			     sizeof(struct unicast_packet));
1014 		return NET_RX_SUCCESS;
1015 	}
1016 
1017 	return route_unicast_packet(skb, recv_if);
1018 }
1019 
1020 
1021 int recv_bcast_packet(struct sk_buff *skb, struct hard_iface *recv_if)
1022 {
1023 	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1024 	struct orig_node *orig_node = NULL;
1025 	struct bcast_packet *bcast_packet;
1026 	struct ethhdr *ethhdr;
1027 	int hdr_size = sizeof(*bcast_packet);
1028 	int ret = NET_RX_DROP;
1029 	int32_t seq_diff;
1030 
1031 	/* drop packet if it has not necessary minimum size */
1032 	if (unlikely(!pskb_may_pull(skb, hdr_size)))
1033 		goto out;
1034 
1035 	ethhdr = (struct ethhdr *)skb_mac_header(skb);
1036 
1037 	/* packet with broadcast indication but unicast recipient */
1038 	if (!is_broadcast_ether_addr(ethhdr->h_dest))
1039 		goto out;
1040 
1041 	/* packet with broadcast sender address */
1042 	if (is_broadcast_ether_addr(ethhdr->h_source))
1043 		goto out;
1044 
1045 	/* ignore broadcasts sent by myself */
1046 	if (is_my_mac(ethhdr->h_source))
1047 		goto out;
1048 
1049 	bcast_packet = (struct bcast_packet *)skb->data;
1050 
1051 	/* ignore broadcasts originated by myself */
1052 	if (is_my_mac(bcast_packet->orig))
1053 		goto out;
1054 
1055 	if (bcast_packet->header.ttl < 2)
1056 		goto out;
1057 
1058 	orig_node = orig_hash_find(bat_priv, bcast_packet->orig);
1059 
1060 	if (!orig_node)
1061 		goto out;
1062 
1063 	spin_lock_bh(&orig_node->bcast_seqno_lock);
1064 
1065 	/* check whether the packet is a duplicate */
1066 	if (bat_test_bit(orig_node->bcast_bits, orig_node->last_bcast_seqno,
1067 			 ntohl(bcast_packet->seqno)))
1068 		goto spin_unlock;
1069 
1070 	seq_diff = ntohl(bcast_packet->seqno) - orig_node->last_bcast_seqno;
1071 
1072 	/* check whether the packet is old and the host just restarted. */
1073 	if (window_protected(bat_priv, seq_diff,
1074 			     &orig_node->bcast_seqno_reset))
1075 		goto spin_unlock;
1076 
1077 	/* mark broadcast in flood history, update window position
1078 	 * if required. */
1079 	if (bit_get_packet(bat_priv, orig_node->bcast_bits, seq_diff, 1))
1080 		orig_node->last_bcast_seqno = ntohl(bcast_packet->seqno);
1081 
1082 	spin_unlock_bh(&orig_node->bcast_seqno_lock);
1083 
1084 	/* check whether this has been sent by another originator before */
1085 	if (bla_check_bcast_duplist(bat_priv, bcast_packet, hdr_size))
1086 		goto out;
1087 
1088 	/* rebroadcast packet */
1089 	add_bcast_packet_to_list(bat_priv, skb, 1);
1090 
1091 	/* don't hand the broadcast up if it is from an originator
1092 	 * from the same backbone.
1093 	 */
1094 	if (bla_is_backbone_gw(skb, orig_node, hdr_size))
1095 		goto out;
1096 
1097 	/* broadcast for me */
1098 	interface_rx(recv_if->soft_iface, skb, recv_if, hdr_size);
1099 	ret = NET_RX_SUCCESS;
1100 	goto out;
1101 
1102 spin_unlock:
1103 	spin_unlock_bh(&orig_node->bcast_seqno_lock);
1104 out:
1105 	if (orig_node)
1106 		orig_node_free_ref(orig_node);
1107 	return ret;
1108 }
1109 
1110 int recv_vis_packet(struct sk_buff *skb, struct hard_iface *recv_if)
1111 {
1112 	struct vis_packet *vis_packet;
1113 	struct ethhdr *ethhdr;
1114 	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1115 	int hdr_size = sizeof(*vis_packet);
1116 
1117 	/* keep skb linear */
1118 	if (skb_linearize(skb) < 0)
1119 		return NET_RX_DROP;
1120 
1121 	if (unlikely(!pskb_may_pull(skb, hdr_size)))
1122 		return NET_RX_DROP;
1123 
1124 	vis_packet = (struct vis_packet *)skb->data;
1125 	ethhdr = (struct ethhdr *)skb_mac_header(skb);
1126 
1127 	/* not for me */
1128 	if (!is_my_mac(ethhdr->h_dest))
1129 		return NET_RX_DROP;
1130 
1131 	/* ignore own packets */
1132 	if (is_my_mac(vis_packet->vis_orig))
1133 		return NET_RX_DROP;
1134 
1135 	if (is_my_mac(vis_packet->sender_orig))
1136 		return NET_RX_DROP;
1137 
1138 	switch (vis_packet->vis_type) {
1139 	case VIS_TYPE_SERVER_SYNC:
1140 		receive_server_sync_packet(bat_priv, vis_packet,
1141 					   skb_headlen(skb));
1142 		break;
1143 
1144 	case VIS_TYPE_CLIENT_UPDATE:
1145 		receive_client_update_packet(bat_priv, vis_packet,
1146 					     skb_headlen(skb));
1147 		break;
1148 
1149 	default:	/* ignore unknown packet */
1150 		break;
1151 	}
1152 
1153 	/* We take a copy of the data in the packet, so we should
1154 	   always free the skbuf. */
1155 	return NET_RX_DROP;
1156 }
1157