xref: /linux/net/batman-adv/routing.c (revision b43ab901d671e3e3cad425ea5e9a3c74e266dcdd)
1 /*
2  * Copyright (C) 2007-2011 B.A.T.M.A.N. contributors:
3  *
4  * Marek Lindner, Simon Wunderlich
5  *
6  * This program is free software; you can redistribute it and/or
7  * modify it under the terms of version 2 of the GNU General Public
8  * License as published by the Free Software Foundation.
9  *
10  * This program is distributed in the hope that it will be useful, but
11  * WITHOUT ANY WARRANTY; without even the implied warranty of
12  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13  * General Public License for more details.
14  *
15  * You should have received a copy of the GNU General Public License
16  * along with this program; if not, write to the Free Software
17  * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
18  * 02110-1301, USA
19  *
20  */
21 
22 #include "main.h"
23 #include "routing.h"
24 #include "send.h"
25 #include "soft-interface.h"
26 #include "hard-interface.h"
27 #include "icmp_socket.h"
28 #include "translation-table.h"
29 #include "originator.h"
30 #include "vis.h"
31 #include "unicast.h"
32 #include "bat_ogm.h"
33 
34 void slide_own_bcast_window(struct hard_iface *hard_iface)
35 {
36 	struct bat_priv *bat_priv = netdev_priv(hard_iface->soft_iface);
37 	struct hashtable_t *hash = bat_priv->orig_hash;
38 	struct hlist_node *node;
39 	struct hlist_head *head;
40 	struct orig_node *orig_node;
41 	unsigned long *word;
42 	uint32_t i;
43 	size_t word_index;
44 
45 	for (i = 0; i < hash->size; i++) {
46 		head = &hash->table[i];
47 
48 		rcu_read_lock();
49 		hlist_for_each_entry_rcu(orig_node, node, head, hash_entry) {
50 			spin_lock_bh(&orig_node->ogm_cnt_lock);
51 			word_index = hard_iface->if_num * NUM_WORDS;
52 			word = &(orig_node->bcast_own[word_index]);
53 
54 			bit_get_packet(bat_priv, word, 1, 0);
55 			orig_node->bcast_own_sum[hard_iface->if_num] =
56 				bit_packet_count(word);
57 			spin_unlock_bh(&orig_node->ogm_cnt_lock);
58 		}
59 		rcu_read_unlock();
60 	}
61 }
62 
63 static void _update_route(struct bat_priv *bat_priv,
64 			  struct orig_node *orig_node,
65 			  struct neigh_node *neigh_node)
66 {
67 	struct neigh_node *curr_router;
68 
69 	curr_router = orig_node_get_router(orig_node);
70 
71 	/* route deleted */
72 	if ((curr_router) && (!neigh_node)) {
73 		bat_dbg(DBG_ROUTES, bat_priv, "Deleting route towards: %pM\n",
74 			orig_node->orig);
75 		tt_global_del_orig(bat_priv, orig_node,
76 				    "Deleted route towards originator");
77 
78 	/* route added */
79 	} else if ((!curr_router) && (neigh_node)) {
80 
81 		bat_dbg(DBG_ROUTES, bat_priv,
82 			"Adding route towards: %pM (via %pM)\n",
83 			orig_node->orig, neigh_node->addr);
84 	/* route changed */
85 	} else if (neigh_node && curr_router) {
86 		bat_dbg(DBG_ROUTES, bat_priv,
87 			"Changing route towards: %pM "
88 			"(now via %pM - was via %pM)\n",
89 			orig_node->orig, neigh_node->addr,
90 			curr_router->addr);
91 	}
92 
93 	if (curr_router)
94 		neigh_node_free_ref(curr_router);
95 
96 	/* increase refcount of new best neighbor */
97 	if (neigh_node && !atomic_inc_not_zero(&neigh_node->refcount))
98 		neigh_node = NULL;
99 
100 	spin_lock_bh(&orig_node->neigh_list_lock);
101 	rcu_assign_pointer(orig_node->router, neigh_node);
102 	spin_unlock_bh(&orig_node->neigh_list_lock);
103 
104 	/* decrease refcount of previous best neighbor */
105 	if (curr_router)
106 		neigh_node_free_ref(curr_router);
107 }
108 
109 void update_route(struct bat_priv *bat_priv, struct orig_node *orig_node,
110 		  struct neigh_node *neigh_node)
111 {
112 	struct neigh_node *router = NULL;
113 
114 	if (!orig_node)
115 		goto out;
116 
117 	router = orig_node_get_router(orig_node);
118 
119 	if (router != neigh_node)
120 		_update_route(bat_priv, orig_node, neigh_node);
121 
122 out:
123 	if (router)
124 		neigh_node_free_ref(router);
125 }
126 
127 /* caller must hold the neigh_list_lock */
128 void bonding_candidate_del(struct orig_node *orig_node,
129 			   struct neigh_node *neigh_node)
130 {
131 	/* this neighbor is not part of our candidate list */
132 	if (list_empty(&neigh_node->bonding_list))
133 		goto out;
134 
135 	list_del_rcu(&neigh_node->bonding_list);
136 	INIT_LIST_HEAD(&neigh_node->bonding_list);
137 	neigh_node_free_ref(neigh_node);
138 	atomic_dec(&orig_node->bond_candidates);
139 
140 out:
141 	return;
142 }
143 
144 void bonding_candidate_add(struct orig_node *orig_node,
145 			   struct neigh_node *neigh_node)
146 {
147 	struct hlist_node *node;
148 	struct neigh_node *tmp_neigh_node, *router = NULL;
149 	uint8_t interference_candidate = 0;
150 
151 	spin_lock_bh(&orig_node->neigh_list_lock);
152 
153 	/* only consider if it has the same primary address ...  */
154 	if (!compare_eth(orig_node->orig,
155 			 neigh_node->orig_node->primary_addr))
156 		goto candidate_del;
157 
158 	router = orig_node_get_router(orig_node);
159 	if (!router)
160 		goto candidate_del;
161 
162 	/* ... and is good enough to be considered */
163 	if (neigh_node->tq_avg < router->tq_avg - BONDING_TQ_THRESHOLD)
164 		goto candidate_del;
165 
166 	/**
167 	 * check if we have another candidate with the same mac address or
168 	 * interface. If we do, we won't select this candidate because of
169 	 * possible interference.
170 	 */
171 	hlist_for_each_entry_rcu(tmp_neigh_node, node,
172 				 &orig_node->neigh_list, list) {
173 
174 		if (tmp_neigh_node == neigh_node)
175 			continue;
176 
177 		/* we only care if the other candidate is even
178 		* considered as candidate. */
179 		if (list_empty(&tmp_neigh_node->bonding_list))
180 			continue;
181 
182 		if ((neigh_node->if_incoming == tmp_neigh_node->if_incoming) ||
183 		    (compare_eth(neigh_node->addr, tmp_neigh_node->addr))) {
184 			interference_candidate = 1;
185 			break;
186 		}
187 	}
188 
189 	/* don't care further if it is an interference candidate */
190 	if (interference_candidate)
191 		goto candidate_del;
192 
193 	/* this neighbor already is part of our candidate list */
194 	if (!list_empty(&neigh_node->bonding_list))
195 		goto out;
196 
197 	if (!atomic_inc_not_zero(&neigh_node->refcount))
198 		goto out;
199 
200 	list_add_rcu(&neigh_node->bonding_list, &orig_node->bond_list);
201 	atomic_inc(&orig_node->bond_candidates);
202 	goto out;
203 
204 candidate_del:
205 	bonding_candidate_del(orig_node, neigh_node);
206 
207 out:
208 	spin_unlock_bh(&orig_node->neigh_list_lock);
209 
210 	if (router)
211 		neigh_node_free_ref(router);
212 }
213 
214 /* copy primary address for bonding */
215 void bonding_save_primary(const struct orig_node *orig_node,
216 			  struct orig_node *orig_neigh_node,
217 			  const struct batman_ogm_packet *batman_ogm_packet)
218 {
219 	if (!(batman_ogm_packet->flags & PRIMARIES_FIRST_HOP))
220 		return;
221 
222 	memcpy(orig_neigh_node->primary_addr, orig_node->orig, ETH_ALEN);
223 }
224 
225 /* checks whether the host restarted and is in the protection time.
226  * returns:
227  *  0 if the packet is to be accepted
228  *  1 if the packet is to be ignored.
229  */
230 int window_protected(struct bat_priv *bat_priv, int32_t seq_num_diff,
231 		     unsigned long *last_reset)
232 {
233 	if ((seq_num_diff <= -TQ_LOCAL_WINDOW_SIZE)
234 		|| (seq_num_diff >= EXPECTED_SEQNO_RANGE)) {
235 		if (time_after(jiffies, *last_reset +
236 			msecs_to_jiffies(RESET_PROTECTION_MS))) {
237 
238 			*last_reset = jiffies;
239 			bat_dbg(DBG_BATMAN, bat_priv,
240 				"old packet received, start protection\n");
241 
242 			return 0;
243 		} else
244 			return 1;
245 	}
246 	return 0;
247 }
248 
249 int recv_bat_ogm_packet(struct sk_buff *skb, struct hard_iface *hard_iface)
250 {
251 	struct ethhdr *ethhdr;
252 
253 	/* drop packet if it has not necessary minimum size */
254 	if (unlikely(!pskb_may_pull(skb, BATMAN_OGM_LEN)))
255 		return NET_RX_DROP;
256 
257 	ethhdr = (struct ethhdr *)skb_mac_header(skb);
258 
259 	/* packet with broadcast indication but unicast recipient */
260 	if (!is_broadcast_ether_addr(ethhdr->h_dest))
261 		return NET_RX_DROP;
262 
263 	/* packet with broadcast sender address */
264 	if (is_broadcast_ether_addr(ethhdr->h_source))
265 		return NET_RX_DROP;
266 
267 	/* create a copy of the skb, if needed, to modify it. */
268 	if (skb_cow(skb, 0) < 0)
269 		return NET_RX_DROP;
270 
271 	/* keep skb linear */
272 	if (skb_linearize(skb) < 0)
273 		return NET_RX_DROP;
274 
275 	ethhdr = (struct ethhdr *)skb_mac_header(skb);
276 
277 	bat_ogm_receive(ethhdr, skb->data, skb_headlen(skb), hard_iface);
278 
279 	kfree_skb(skb);
280 	return NET_RX_SUCCESS;
281 }
282 
283 static int recv_my_icmp_packet(struct bat_priv *bat_priv,
284 			       struct sk_buff *skb, size_t icmp_len)
285 {
286 	struct hard_iface *primary_if = NULL;
287 	struct orig_node *orig_node = NULL;
288 	struct neigh_node *router = NULL;
289 	struct icmp_packet_rr *icmp_packet;
290 	int ret = NET_RX_DROP;
291 
292 	icmp_packet = (struct icmp_packet_rr *)skb->data;
293 
294 	/* add data to device queue */
295 	if (icmp_packet->msg_type != ECHO_REQUEST) {
296 		bat_socket_receive_packet(icmp_packet, icmp_len);
297 		goto out;
298 	}
299 
300 	primary_if = primary_if_get_selected(bat_priv);
301 	if (!primary_if)
302 		goto out;
303 
304 	/* answer echo request (ping) */
305 	/* get routing information */
306 	orig_node = orig_hash_find(bat_priv, icmp_packet->orig);
307 	if (!orig_node)
308 		goto out;
309 
310 	router = orig_node_get_router(orig_node);
311 	if (!router)
312 		goto out;
313 
314 	/* create a copy of the skb, if needed, to modify it. */
315 	if (skb_cow(skb, sizeof(struct ethhdr)) < 0)
316 		goto out;
317 
318 	icmp_packet = (struct icmp_packet_rr *)skb->data;
319 
320 	memcpy(icmp_packet->dst, icmp_packet->orig, ETH_ALEN);
321 	memcpy(icmp_packet->orig, primary_if->net_dev->dev_addr, ETH_ALEN);
322 	icmp_packet->msg_type = ECHO_REPLY;
323 	icmp_packet->ttl = TTL;
324 
325 	send_skb_packet(skb, router->if_incoming, router->addr);
326 	ret = NET_RX_SUCCESS;
327 
328 out:
329 	if (primary_if)
330 		hardif_free_ref(primary_if);
331 	if (router)
332 		neigh_node_free_ref(router);
333 	if (orig_node)
334 		orig_node_free_ref(orig_node);
335 	return ret;
336 }
337 
338 static int recv_icmp_ttl_exceeded(struct bat_priv *bat_priv,
339 				  struct sk_buff *skb)
340 {
341 	struct hard_iface *primary_if = NULL;
342 	struct orig_node *orig_node = NULL;
343 	struct neigh_node *router = NULL;
344 	struct icmp_packet *icmp_packet;
345 	int ret = NET_RX_DROP;
346 
347 	icmp_packet = (struct icmp_packet *)skb->data;
348 
349 	/* send TTL exceeded if packet is an echo request (traceroute) */
350 	if (icmp_packet->msg_type != ECHO_REQUEST) {
351 		pr_debug("Warning - can't forward icmp packet from %pM to "
352 			 "%pM: ttl exceeded\n", icmp_packet->orig,
353 			 icmp_packet->dst);
354 		goto out;
355 	}
356 
357 	primary_if = primary_if_get_selected(bat_priv);
358 	if (!primary_if)
359 		goto out;
360 
361 	/* get routing information */
362 	orig_node = orig_hash_find(bat_priv, icmp_packet->orig);
363 	if (!orig_node)
364 		goto out;
365 
366 	router = orig_node_get_router(orig_node);
367 	if (!router)
368 		goto out;
369 
370 	/* create a copy of the skb, if needed, to modify it. */
371 	if (skb_cow(skb, sizeof(struct ethhdr)) < 0)
372 		goto out;
373 
374 	icmp_packet = (struct icmp_packet *)skb->data;
375 
376 	memcpy(icmp_packet->dst, icmp_packet->orig, ETH_ALEN);
377 	memcpy(icmp_packet->orig, primary_if->net_dev->dev_addr, ETH_ALEN);
378 	icmp_packet->msg_type = TTL_EXCEEDED;
379 	icmp_packet->ttl = TTL;
380 
381 	send_skb_packet(skb, router->if_incoming, router->addr);
382 	ret = NET_RX_SUCCESS;
383 
384 out:
385 	if (primary_if)
386 		hardif_free_ref(primary_if);
387 	if (router)
388 		neigh_node_free_ref(router);
389 	if (orig_node)
390 		orig_node_free_ref(orig_node);
391 	return ret;
392 }
393 
394 
395 int recv_icmp_packet(struct sk_buff *skb, struct hard_iface *recv_if)
396 {
397 	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
398 	struct icmp_packet_rr *icmp_packet;
399 	struct ethhdr *ethhdr;
400 	struct orig_node *orig_node = NULL;
401 	struct neigh_node *router = NULL;
402 	int hdr_size = sizeof(struct icmp_packet);
403 	int ret = NET_RX_DROP;
404 
405 	/**
406 	 * we truncate all incoming icmp packets if they don't match our size
407 	 */
408 	if (skb->len >= sizeof(struct icmp_packet_rr))
409 		hdr_size = sizeof(struct icmp_packet_rr);
410 
411 	/* drop packet if it has not necessary minimum size */
412 	if (unlikely(!pskb_may_pull(skb, hdr_size)))
413 		goto out;
414 
415 	ethhdr = (struct ethhdr *)skb_mac_header(skb);
416 
417 	/* packet with unicast indication but broadcast recipient */
418 	if (is_broadcast_ether_addr(ethhdr->h_dest))
419 		goto out;
420 
421 	/* packet with broadcast sender address */
422 	if (is_broadcast_ether_addr(ethhdr->h_source))
423 		goto out;
424 
425 	/* not for me */
426 	if (!is_my_mac(ethhdr->h_dest))
427 		goto out;
428 
429 	icmp_packet = (struct icmp_packet_rr *)skb->data;
430 
431 	/* add record route information if not full */
432 	if ((hdr_size == sizeof(struct icmp_packet_rr)) &&
433 	    (icmp_packet->rr_cur < BAT_RR_LEN)) {
434 		memcpy(&(icmp_packet->rr[icmp_packet->rr_cur]),
435 			ethhdr->h_dest, ETH_ALEN);
436 		icmp_packet->rr_cur++;
437 	}
438 
439 	/* packet for me */
440 	if (is_my_mac(icmp_packet->dst))
441 		return recv_my_icmp_packet(bat_priv, skb, hdr_size);
442 
443 	/* TTL exceeded */
444 	if (icmp_packet->ttl < 2)
445 		return recv_icmp_ttl_exceeded(bat_priv, skb);
446 
447 	/* get routing information */
448 	orig_node = orig_hash_find(bat_priv, icmp_packet->dst);
449 	if (!orig_node)
450 		goto out;
451 
452 	router = orig_node_get_router(orig_node);
453 	if (!router)
454 		goto out;
455 
456 	/* create a copy of the skb, if needed, to modify it. */
457 	if (skb_cow(skb, sizeof(struct ethhdr)) < 0)
458 		goto out;
459 
460 	icmp_packet = (struct icmp_packet_rr *)skb->data;
461 
462 	/* decrement ttl */
463 	icmp_packet->ttl--;
464 
465 	/* route it */
466 	send_skb_packet(skb, router->if_incoming, router->addr);
467 	ret = NET_RX_SUCCESS;
468 
469 out:
470 	if (router)
471 		neigh_node_free_ref(router);
472 	if (orig_node)
473 		orig_node_free_ref(orig_node);
474 	return ret;
475 }
476 
477 /* In the bonding case, send the packets in a round
478  * robin fashion over the remaining interfaces.
479  *
480  * This method rotates the bonding list and increases the
481  * returned router's refcount. */
482 static struct neigh_node *find_bond_router(struct orig_node *primary_orig,
483 					   const struct hard_iface *recv_if)
484 {
485 	struct neigh_node *tmp_neigh_node;
486 	struct neigh_node *router = NULL, *first_candidate = NULL;
487 
488 	rcu_read_lock();
489 	list_for_each_entry_rcu(tmp_neigh_node, &primary_orig->bond_list,
490 				bonding_list) {
491 		if (!first_candidate)
492 			first_candidate = tmp_neigh_node;
493 
494 		/* recv_if == NULL on the first node. */
495 		if (tmp_neigh_node->if_incoming == recv_if)
496 			continue;
497 
498 		if (!atomic_inc_not_zero(&tmp_neigh_node->refcount))
499 			continue;
500 
501 		router = tmp_neigh_node;
502 		break;
503 	}
504 
505 	/* use the first candidate if nothing was found. */
506 	if (!router && first_candidate &&
507 	    atomic_inc_not_zero(&first_candidate->refcount))
508 		router = first_candidate;
509 
510 	if (!router)
511 		goto out;
512 
513 	/* selected should point to the next element
514 	 * after the current router */
515 	spin_lock_bh(&primary_orig->neigh_list_lock);
516 	/* this is a list_move(), which unfortunately
517 	 * does not exist as rcu version */
518 	list_del_rcu(&primary_orig->bond_list);
519 	list_add_rcu(&primary_orig->bond_list,
520 		     &router->bonding_list);
521 	spin_unlock_bh(&primary_orig->neigh_list_lock);
522 
523 out:
524 	rcu_read_unlock();
525 	return router;
526 }
527 
528 /* Interface Alternating: Use the best of the
529  * remaining candidates which are not using
530  * this interface.
531  *
532  * Increases the returned router's refcount */
533 static struct neigh_node *find_ifalter_router(struct orig_node *primary_orig,
534 					      const struct hard_iface *recv_if)
535 {
536 	struct neigh_node *tmp_neigh_node;
537 	struct neigh_node *router = NULL, *first_candidate = NULL;
538 
539 	rcu_read_lock();
540 	list_for_each_entry_rcu(tmp_neigh_node, &primary_orig->bond_list,
541 				bonding_list) {
542 		if (!first_candidate)
543 			first_candidate = tmp_neigh_node;
544 
545 		/* recv_if == NULL on the first node. */
546 		if (tmp_neigh_node->if_incoming == recv_if)
547 			continue;
548 
549 		if (!atomic_inc_not_zero(&tmp_neigh_node->refcount))
550 			continue;
551 
552 		/* if we don't have a router yet
553 		 * or this one is better, choose it. */
554 		if ((!router) ||
555 		    (tmp_neigh_node->tq_avg > router->tq_avg)) {
556 			/* decrement refcount of
557 			 * previously selected router */
558 			if (router)
559 				neigh_node_free_ref(router);
560 
561 			router = tmp_neigh_node;
562 			atomic_inc_not_zero(&router->refcount);
563 		}
564 
565 		neigh_node_free_ref(tmp_neigh_node);
566 	}
567 
568 	/* use the first candidate if nothing was found. */
569 	if (!router && first_candidate &&
570 	    atomic_inc_not_zero(&first_candidate->refcount))
571 		router = first_candidate;
572 
573 	rcu_read_unlock();
574 	return router;
575 }
576 
577 int recv_tt_query(struct sk_buff *skb, struct hard_iface *recv_if)
578 {
579 	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
580 	struct tt_query_packet *tt_query;
581 	uint16_t tt_len;
582 	struct ethhdr *ethhdr;
583 
584 	/* drop packet if it has not necessary minimum size */
585 	if (unlikely(!pskb_may_pull(skb, sizeof(struct tt_query_packet))))
586 		goto out;
587 
588 	/* I could need to modify it */
589 	if (skb_cow(skb, sizeof(struct tt_query_packet)) < 0)
590 		goto out;
591 
592 	ethhdr = (struct ethhdr *)skb_mac_header(skb);
593 
594 	/* packet with unicast indication but broadcast recipient */
595 	if (is_broadcast_ether_addr(ethhdr->h_dest))
596 		goto out;
597 
598 	/* packet with broadcast sender address */
599 	if (is_broadcast_ether_addr(ethhdr->h_source))
600 		goto out;
601 
602 	tt_query = (struct tt_query_packet *)skb->data;
603 
604 	tt_query->tt_data = ntohs(tt_query->tt_data);
605 
606 	switch (tt_query->flags & TT_QUERY_TYPE_MASK) {
607 	case TT_REQUEST:
608 		/* If we cannot provide an answer the tt_request is
609 		 * forwarded */
610 		if (!send_tt_response(bat_priv, tt_query)) {
611 			bat_dbg(DBG_TT, bat_priv,
612 				"Routing TT_REQUEST to %pM [%c]\n",
613 				tt_query->dst,
614 				(tt_query->flags & TT_FULL_TABLE ? 'F' : '.'));
615 			tt_query->tt_data = htons(tt_query->tt_data);
616 			return route_unicast_packet(skb, recv_if);
617 		}
618 		break;
619 	case TT_RESPONSE:
620 		if (is_my_mac(tt_query->dst)) {
621 			/* packet needs to be linearized to access the TT
622 			 * changes */
623 			if (skb_linearize(skb) < 0)
624 				goto out;
625 
626 			tt_len = tt_query->tt_data * sizeof(struct tt_change);
627 
628 			/* Ensure we have all the claimed data */
629 			if (unlikely(skb_headlen(skb) <
630 				     sizeof(struct tt_query_packet) + tt_len))
631 				goto out;
632 
633 			handle_tt_response(bat_priv, tt_query);
634 		} else {
635 			bat_dbg(DBG_TT, bat_priv,
636 				"Routing TT_RESPONSE to %pM [%c]\n",
637 				tt_query->dst,
638 				(tt_query->flags & TT_FULL_TABLE ? 'F' : '.'));
639 			tt_query->tt_data = htons(tt_query->tt_data);
640 			return route_unicast_packet(skb, recv_if);
641 		}
642 		break;
643 	}
644 
645 out:
646 	/* returning NET_RX_DROP will make the caller function kfree the skb */
647 	return NET_RX_DROP;
648 }
649 
650 int recv_roam_adv(struct sk_buff *skb, struct hard_iface *recv_if)
651 {
652 	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
653 	struct roam_adv_packet *roam_adv_packet;
654 	struct orig_node *orig_node;
655 	struct ethhdr *ethhdr;
656 
657 	/* drop packet if it has not necessary minimum size */
658 	if (unlikely(!pskb_may_pull(skb, sizeof(struct roam_adv_packet))))
659 		goto out;
660 
661 	ethhdr = (struct ethhdr *)skb_mac_header(skb);
662 
663 	/* packet with unicast indication but broadcast recipient */
664 	if (is_broadcast_ether_addr(ethhdr->h_dest))
665 		goto out;
666 
667 	/* packet with broadcast sender address */
668 	if (is_broadcast_ether_addr(ethhdr->h_source))
669 		goto out;
670 
671 	roam_adv_packet = (struct roam_adv_packet *)skb->data;
672 
673 	if (!is_my_mac(roam_adv_packet->dst))
674 		return route_unicast_packet(skb, recv_if);
675 
676 	orig_node = orig_hash_find(bat_priv, roam_adv_packet->src);
677 	if (!orig_node)
678 		goto out;
679 
680 	bat_dbg(DBG_TT, bat_priv, "Received ROAMING_ADV from %pM "
681 		"(client %pM)\n", roam_adv_packet->src,
682 		roam_adv_packet->client);
683 
684 	tt_global_add(bat_priv, orig_node, roam_adv_packet->client,
685 		      atomic_read(&orig_node->last_ttvn) + 1, true, false);
686 
687 	/* Roaming phase starts: I have new information but the ttvn has not
688 	 * been incremented yet. This flag will make me check all the incoming
689 	 * packets for the correct destination. */
690 	bat_priv->tt_poss_change = true;
691 
692 	orig_node_free_ref(orig_node);
693 out:
694 	/* returning NET_RX_DROP will make the caller function kfree the skb */
695 	return NET_RX_DROP;
696 }
697 
698 /* find a suitable router for this originator, and use
699  * bonding if possible. increases the found neighbors
700  * refcount.*/
701 struct neigh_node *find_router(struct bat_priv *bat_priv,
702 			       struct orig_node *orig_node,
703 			       const struct hard_iface *recv_if)
704 {
705 	struct orig_node *primary_orig_node;
706 	struct orig_node *router_orig;
707 	struct neigh_node *router;
708 	static uint8_t zero_mac[ETH_ALEN] = {0, 0, 0, 0, 0, 0};
709 	int bonding_enabled;
710 
711 	if (!orig_node)
712 		return NULL;
713 
714 	router = orig_node_get_router(orig_node);
715 	if (!router)
716 		goto err;
717 
718 	/* without bonding, the first node should
719 	 * always choose the default router. */
720 	bonding_enabled = atomic_read(&bat_priv->bonding);
721 
722 	rcu_read_lock();
723 	/* select default router to output */
724 	router_orig = router->orig_node;
725 	if (!router_orig)
726 		goto err_unlock;
727 
728 	if ((!recv_if) && (!bonding_enabled))
729 		goto return_router;
730 
731 	/* if we have something in the primary_addr, we can search
732 	 * for a potential bonding candidate. */
733 	if (compare_eth(router_orig->primary_addr, zero_mac))
734 		goto return_router;
735 
736 	/* find the orig_node which has the primary interface. might
737 	 * even be the same as our router_orig in many cases */
738 
739 	if (compare_eth(router_orig->primary_addr, router_orig->orig)) {
740 		primary_orig_node = router_orig;
741 	} else {
742 		primary_orig_node = orig_hash_find(bat_priv,
743 						   router_orig->primary_addr);
744 		if (!primary_orig_node)
745 			goto return_router;
746 
747 		orig_node_free_ref(primary_orig_node);
748 	}
749 
750 	/* with less than 2 candidates, we can't do any
751 	 * bonding and prefer the original router. */
752 	if (atomic_read(&primary_orig_node->bond_candidates) < 2)
753 		goto return_router;
754 
755 	/* all nodes between should choose a candidate which
756 	 * is is not on the interface where the packet came
757 	 * in. */
758 
759 	neigh_node_free_ref(router);
760 
761 	if (bonding_enabled)
762 		router = find_bond_router(primary_orig_node, recv_if);
763 	else
764 		router = find_ifalter_router(primary_orig_node, recv_if);
765 
766 return_router:
767 	if (router && router->if_incoming->if_status != IF_ACTIVE)
768 		goto err_unlock;
769 
770 	rcu_read_unlock();
771 	return router;
772 err_unlock:
773 	rcu_read_unlock();
774 err:
775 	if (router)
776 		neigh_node_free_ref(router);
777 	return NULL;
778 }
779 
780 static int check_unicast_packet(struct sk_buff *skb, int hdr_size)
781 {
782 	struct ethhdr *ethhdr;
783 
784 	/* drop packet if it has not necessary minimum size */
785 	if (unlikely(!pskb_may_pull(skb, hdr_size)))
786 		return -1;
787 
788 	ethhdr = (struct ethhdr *)skb_mac_header(skb);
789 
790 	/* packet with unicast indication but broadcast recipient */
791 	if (is_broadcast_ether_addr(ethhdr->h_dest))
792 		return -1;
793 
794 	/* packet with broadcast sender address */
795 	if (is_broadcast_ether_addr(ethhdr->h_source))
796 		return -1;
797 
798 	/* not for me */
799 	if (!is_my_mac(ethhdr->h_dest))
800 		return -1;
801 
802 	return 0;
803 }
804 
805 int route_unicast_packet(struct sk_buff *skb, struct hard_iface *recv_if)
806 {
807 	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
808 	struct orig_node *orig_node = NULL;
809 	struct neigh_node *neigh_node = NULL;
810 	struct unicast_packet *unicast_packet;
811 	struct ethhdr *ethhdr = (struct ethhdr *)skb_mac_header(skb);
812 	int ret = NET_RX_DROP;
813 	struct sk_buff *new_skb;
814 
815 	unicast_packet = (struct unicast_packet *)skb->data;
816 
817 	/* TTL exceeded */
818 	if (unicast_packet->ttl < 2) {
819 		pr_debug("Warning - can't forward unicast packet from %pM to "
820 			 "%pM: ttl exceeded\n", ethhdr->h_source,
821 			 unicast_packet->dest);
822 		goto out;
823 	}
824 
825 	/* get routing information */
826 	orig_node = orig_hash_find(bat_priv, unicast_packet->dest);
827 
828 	if (!orig_node)
829 		goto out;
830 
831 	/* find_router() increases neigh_nodes refcount if found. */
832 	neigh_node = find_router(bat_priv, orig_node, recv_if);
833 
834 	if (!neigh_node)
835 		goto out;
836 
837 	/* create a copy of the skb, if needed, to modify it. */
838 	if (skb_cow(skb, sizeof(struct ethhdr)) < 0)
839 		goto out;
840 
841 	unicast_packet = (struct unicast_packet *)skb->data;
842 
843 	if (unicast_packet->packet_type == BAT_UNICAST &&
844 	    atomic_read(&bat_priv->fragmentation) &&
845 	    skb->len > neigh_node->if_incoming->net_dev->mtu) {
846 		ret = frag_send_skb(skb, bat_priv,
847 				    neigh_node->if_incoming, neigh_node->addr);
848 		goto out;
849 	}
850 
851 	if (unicast_packet->packet_type == BAT_UNICAST_FRAG &&
852 	    frag_can_reassemble(skb, neigh_node->if_incoming->net_dev->mtu)) {
853 
854 		ret = frag_reassemble_skb(skb, bat_priv, &new_skb);
855 
856 		if (ret == NET_RX_DROP)
857 			goto out;
858 
859 		/* packet was buffered for late merge */
860 		if (!new_skb) {
861 			ret = NET_RX_SUCCESS;
862 			goto out;
863 		}
864 
865 		skb = new_skb;
866 		unicast_packet = (struct unicast_packet *)skb->data;
867 	}
868 
869 	/* decrement ttl */
870 	unicast_packet->ttl--;
871 
872 	/* route it */
873 	send_skb_packet(skb, neigh_node->if_incoming, neigh_node->addr);
874 	ret = NET_RX_SUCCESS;
875 
876 out:
877 	if (neigh_node)
878 		neigh_node_free_ref(neigh_node);
879 	if (orig_node)
880 		orig_node_free_ref(orig_node);
881 	return ret;
882 }
883 
884 static int check_unicast_ttvn(struct bat_priv *bat_priv,
885 			       struct sk_buff *skb) {
886 	uint8_t curr_ttvn;
887 	struct orig_node *orig_node;
888 	struct ethhdr *ethhdr;
889 	struct hard_iface *primary_if;
890 	struct unicast_packet *unicast_packet;
891 	bool tt_poss_change;
892 
893 	/* I could need to modify it */
894 	if (skb_cow(skb, sizeof(struct unicast_packet)) < 0)
895 		return 0;
896 
897 	unicast_packet = (struct unicast_packet *)skb->data;
898 
899 	if (is_my_mac(unicast_packet->dest)) {
900 		tt_poss_change = bat_priv->tt_poss_change;
901 		curr_ttvn = (uint8_t)atomic_read(&bat_priv->ttvn);
902 	} else {
903 		orig_node = orig_hash_find(bat_priv, unicast_packet->dest);
904 
905 		if (!orig_node)
906 			return 0;
907 
908 		curr_ttvn = (uint8_t)atomic_read(&orig_node->last_ttvn);
909 		tt_poss_change = orig_node->tt_poss_change;
910 		orig_node_free_ref(orig_node);
911 	}
912 
913 	/* Check whether I have to reroute the packet */
914 	if (seq_before(unicast_packet->ttvn, curr_ttvn) || tt_poss_change) {
915 		/* Linearize the skb before accessing it */
916 		if (skb_linearize(skb) < 0)
917 			return 0;
918 
919 		ethhdr = (struct ethhdr *)(skb->data +
920 			sizeof(struct unicast_packet));
921 		orig_node = transtable_search(bat_priv, NULL, ethhdr->h_dest);
922 
923 		if (!orig_node) {
924 			if (!is_my_client(bat_priv, ethhdr->h_dest))
925 				return 0;
926 			primary_if = primary_if_get_selected(bat_priv);
927 			if (!primary_if)
928 				return 0;
929 			memcpy(unicast_packet->dest,
930 			       primary_if->net_dev->dev_addr, ETH_ALEN);
931 			hardif_free_ref(primary_if);
932 		} else {
933 			memcpy(unicast_packet->dest, orig_node->orig,
934 			       ETH_ALEN);
935 			curr_ttvn = (uint8_t)
936 				atomic_read(&orig_node->last_ttvn);
937 			orig_node_free_ref(orig_node);
938 		}
939 
940 		bat_dbg(DBG_ROUTES, bat_priv, "TTVN mismatch (old_ttvn %u "
941 			"new_ttvn %u)! Rerouting unicast packet (for %pM) to "
942 			"%pM\n", unicast_packet->ttvn, curr_ttvn,
943 			ethhdr->h_dest, unicast_packet->dest);
944 
945 		unicast_packet->ttvn = curr_ttvn;
946 	}
947 	return 1;
948 }
949 
950 int recv_unicast_packet(struct sk_buff *skb, struct hard_iface *recv_if)
951 {
952 	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
953 	struct unicast_packet *unicast_packet;
954 	int hdr_size = sizeof(*unicast_packet);
955 
956 	if (check_unicast_packet(skb, hdr_size) < 0)
957 		return NET_RX_DROP;
958 
959 	if (!check_unicast_ttvn(bat_priv, skb))
960 		return NET_RX_DROP;
961 
962 	unicast_packet = (struct unicast_packet *)skb->data;
963 
964 	/* packet for me */
965 	if (is_my_mac(unicast_packet->dest)) {
966 		interface_rx(recv_if->soft_iface, skb, recv_if, hdr_size);
967 		return NET_RX_SUCCESS;
968 	}
969 
970 	return route_unicast_packet(skb, recv_if);
971 }
972 
973 int recv_ucast_frag_packet(struct sk_buff *skb, struct hard_iface *recv_if)
974 {
975 	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
976 	struct unicast_frag_packet *unicast_packet;
977 	int hdr_size = sizeof(*unicast_packet);
978 	struct sk_buff *new_skb = NULL;
979 	int ret;
980 
981 	if (check_unicast_packet(skb, hdr_size) < 0)
982 		return NET_RX_DROP;
983 
984 	if (!check_unicast_ttvn(bat_priv, skb))
985 		return NET_RX_DROP;
986 
987 	unicast_packet = (struct unicast_frag_packet *)skb->data;
988 
989 	/* packet for me */
990 	if (is_my_mac(unicast_packet->dest)) {
991 
992 		ret = frag_reassemble_skb(skb, bat_priv, &new_skb);
993 
994 		if (ret == NET_RX_DROP)
995 			return NET_RX_DROP;
996 
997 		/* packet was buffered for late merge */
998 		if (!new_skb)
999 			return NET_RX_SUCCESS;
1000 
1001 		interface_rx(recv_if->soft_iface, new_skb, recv_if,
1002 			     sizeof(struct unicast_packet));
1003 		return NET_RX_SUCCESS;
1004 	}
1005 
1006 	return route_unicast_packet(skb, recv_if);
1007 }
1008 
1009 
1010 int recv_bcast_packet(struct sk_buff *skb, struct hard_iface *recv_if)
1011 {
1012 	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1013 	struct orig_node *orig_node = NULL;
1014 	struct bcast_packet *bcast_packet;
1015 	struct ethhdr *ethhdr;
1016 	int hdr_size = sizeof(*bcast_packet);
1017 	int ret = NET_RX_DROP;
1018 	int32_t seq_diff;
1019 
1020 	/* drop packet if it has not necessary minimum size */
1021 	if (unlikely(!pskb_may_pull(skb, hdr_size)))
1022 		goto out;
1023 
1024 	ethhdr = (struct ethhdr *)skb_mac_header(skb);
1025 
1026 	/* packet with broadcast indication but unicast recipient */
1027 	if (!is_broadcast_ether_addr(ethhdr->h_dest))
1028 		goto out;
1029 
1030 	/* packet with broadcast sender address */
1031 	if (is_broadcast_ether_addr(ethhdr->h_source))
1032 		goto out;
1033 
1034 	/* ignore broadcasts sent by myself */
1035 	if (is_my_mac(ethhdr->h_source))
1036 		goto out;
1037 
1038 	bcast_packet = (struct bcast_packet *)skb->data;
1039 
1040 	/* ignore broadcasts originated by myself */
1041 	if (is_my_mac(bcast_packet->orig))
1042 		goto out;
1043 
1044 	if (bcast_packet->ttl < 2)
1045 		goto out;
1046 
1047 	orig_node = orig_hash_find(bat_priv, bcast_packet->orig);
1048 
1049 	if (!orig_node)
1050 		goto out;
1051 
1052 	spin_lock_bh(&orig_node->bcast_seqno_lock);
1053 
1054 	/* check whether the packet is a duplicate */
1055 	if (get_bit_status(orig_node->bcast_bits, orig_node->last_bcast_seqno,
1056 			   ntohl(bcast_packet->seqno)))
1057 		goto spin_unlock;
1058 
1059 	seq_diff = ntohl(bcast_packet->seqno) - orig_node->last_bcast_seqno;
1060 
1061 	/* check whether the packet is old and the host just restarted. */
1062 	if (window_protected(bat_priv, seq_diff,
1063 			     &orig_node->bcast_seqno_reset))
1064 		goto spin_unlock;
1065 
1066 	/* mark broadcast in flood history, update window position
1067 	 * if required. */
1068 	if (bit_get_packet(bat_priv, orig_node->bcast_bits, seq_diff, 1))
1069 		orig_node->last_bcast_seqno = ntohl(bcast_packet->seqno);
1070 
1071 	spin_unlock_bh(&orig_node->bcast_seqno_lock);
1072 
1073 	/* rebroadcast packet */
1074 	add_bcast_packet_to_list(bat_priv, skb, 1);
1075 
1076 	/* broadcast for me */
1077 	interface_rx(recv_if->soft_iface, skb, recv_if, hdr_size);
1078 	ret = NET_RX_SUCCESS;
1079 	goto out;
1080 
1081 spin_unlock:
1082 	spin_unlock_bh(&orig_node->bcast_seqno_lock);
1083 out:
1084 	if (orig_node)
1085 		orig_node_free_ref(orig_node);
1086 	return ret;
1087 }
1088 
1089 int recv_vis_packet(struct sk_buff *skb, struct hard_iface *recv_if)
1090 {
1091 	struct vis_packet *vis_packet;
1092 	struct ethhdr *ethhdr;
1093 	struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1094 	int hdr_size = sizeof(*vis_packet);
1095 
1096 	/* keep skb linear */
1097 	if (skb_linearize(skb) < 0)
1098 		return NET_RX_DROP;
1099 
1100 	if (unlikely(!pskb_may_pull(skb, hdr_size)))
1101 		return NET_RX_DROP;
1102 
1103 	vis_packet = (struct vis_packet *)skb->data;
1104 	ethhdr = (struct ethhdr *)skb_mac_header(skb);
1105 
1106 	/* not for me */
1107 	if (!is_my_mac(ethhdr->h_dest))
1108 		return NET_RX_DROP;
1109 
1110 	/* ignore own packets */
1111 	if (is_my_mac(vis_packet->vis_orig))
1112 		return NET_RX_DROP;
1113 
1114 	if (is_my_mac(vis_packet->sender_orig))
1115 		return NET_RX_DROP;
1116 
1117 	switch (vis_packet->vis_type) {
1118 	case VIS_TYPE_SERVER_SYNC:
1119 		receive_server_sync_packet(bat_priv, vis_packet,
1120 					   skb_headlen(skb));
1121 		break;
1122 
1123 	case VIS_TYPE_CLIENT_UPDATE:
1124 		receive_client_update_packet(bat_priv, vis_packet,
1125 					     skb_headlen(skb));
1126 		break;
1127 
1128 	default:	/* ignore unknown packet */
1129 		break;
1130 	}
1131 
1132 	/* We take a copy of the data in the packet, so we should
1133 	   always free the skbuf. */
1134 	return NET_RX_DROP;
1135 }
1136