]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/blob - net/batman-adv/routing.c
Merge tag 'for-linus-3.5-20120601' of git://git.infradead.org/linux-mtd
[mirror_ubuntu-zesty-kernel.git] / net / batman-adv / routing.c
1 /*
2 * Copyright (C) 2007-2012 B.A.T.M.A.N. contributors:
3 *
4 * Marek Lindner, Simon Wunderlich
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of version 2 of the GNU General Public
8 * License as published by the Free Software Foundation.
9 *
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * General Public License for more details.
14 *
15 * You should have received a copy of the GNU General Public License
16 * along with this program; if not, write to the Free Software
17 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
18 * 02110-1301, USA
19 *
20 */
21
22 #include "main.h"
23 #include "routing.h"
24 #include "send.h"
25 #include "soft-interface.h"
26 #include "hard-interface.h"
27 #include "icmp_socket.h"
28 #include "translation-table.h"
29 #include "originator.h"
30 #include "vis.h"
31 #include "unicast.h"
32 #include "bridge_loop_avoidance.h"
33
34 static int route_unicast_packet(struct sk_buff *skb,
35 struct hard_iface *recv_if);
36
37 void slide_own_bcast_window(struct hard_iface *hard_iface)
38 {
39 struct bat_priv *bat_priv = netdev_priv(hard_iface->soft_iface);
40 struct hashtable_t *hash = bat_priv->orig_hash;
41 struct hlist_node *node;
42 struct hlist_head *head;
43 struct orig_node *orig_node;
44 unsigned long *word;
45 uint32_t i;
46 size_t word_index;
47
48 for (i = 0; i < hash->size; i++) {
49 head = &hash->table[i];
50
51 rcu_read_lock();
52 hlist_for_each_entry_rcu(orig_node, node, head, hash_entry) {
53 spin_lock_bh(&orig_node->ogm_cnt_lock);
54 word_index = hard_iface->if_num * NUM_WORDS;
55 word = &(orig_node->bcast_own[word_index]);
56
57 bit_get_packet(bat_priv, word, 1, 0);
58 orig_node->bcast_own_sum[hard_iface->if_num] =
59 bitmap_weight(word, TQ_LOCAL_WINDOW_SIZE);
60 spin_unlock_bh(&orig_node->ogm_cnt_lock);
61 }
62 rcu_read_unlock();
63 }
64 }
65
66 static void _update_route(struct bat_priv *bat_priv,
67 struct orig_node *orig_node,
68 struct neigh_node *neigh_node)
69 {
70 struct neigh_node *curr_router;
71
72 curr_router = orig_node_get_router(orig_node);
73
74 /* route deleted */
75 if ((curr_router) && (!neigh_node)) {
76 bat_dbg(DBG_ROUTES, bat_priv, "Deleting route towards: %pM\n",
77 orig_node->orig);
78 tt_global_del_orig(bat_priv, orig_node,
79 "Deleted route towards originator");
80
81 /* route added */
82 } else if ((!curr_router) && (neigh_node)) {
83
84 bat_dbg(DBG_ROUTES, bat_priv,
85 "Adding route towards: %pM (via %pM)\n",
86 orig_node->orig, neigh_node->addr);
87 /* route changed */
88 } else if (neigh_node && curr_router) {
89 bat_dbg(DBG_ROUTES, bat_priv,
90 "Changing route towards: %pM (now via %pM - was via %pM)\n",
91 orig_node->orig, neigh_node->addr,
92 curr_router->addr);
93 }
94
95 if (curr_router)
96 neigh_node_free_ref(curr_router);
97
98 /* increase refcount of new best neighbor */
99 if (neigh_node && !atomic_inc_not_zero(&neigh_node->refcount))
100 neigh_node = NULL;
101
102 spin_lock_bh(&orig_node->neigh_list_lock);
103 rcu_assign_pointer(orig_node->router, neigh_node);
104 spin_unlock_bh(&orig_node->neigh_list_lock);
105
106 /* decrease refcount of previous best neighbor */
107 if (curr_router)
108 neigh_node_free_ref(curr_router);
109 }
110
111 void update_route(struct bat_priv *bat_priv, struct orig_node *orig_node,
112 struct neigh_node *neigh_node)
113 {
114 struct neigh_node *router = NULL;
115
116 if (!orig_node)
117 goto out;
118
119 router = orig_node_get_router(orig_node);
120
121 if (router != neigh_node)
122 _update_route(bat_priv, orig_node, neigh_node);
123
124 out:
125 if (router)
126 neigh_node_free_ref(router);
127 }
128
129 /* caller must hold the neigh_list_lock */
130 void bonding_candidate_del(struct orig_node *orig_node,
131 struct neigh_node *neigh_node)
132 {
133 /* this neighbor is not part of our candidate list */
134 if (list_empty(&neigh_node->bonding_list))
135 goto out;
136
137 list_del_rcu(&neigh_node->bonding_list);
138 INIT_LIST_HEAD(&neigh_node->bonding_list);
139 neigh_node_free_ref(neigh_node);
140 atomic_dec(&orig_node->bond_candidates);
141
142 out:
143 return;
144 }
145
146 void bonding_candidate_add(struct orig_node *orig_node,
147 struct neigh_node *neigh_node)
148 {
149 struct hlist_node *node;
150 struct neigh_node *tmp_neigh_node, *router = NULL;
151 uint8_t interference_candidate = 0;
152
153 spin_lock_bh(&orig_node->neigh_list_lock);
154
155 /* only consider if it has the same primary address ... */
156 if (!compare_eth(orig_node->orig,
157 neigh_node->orig_node->primary_addr))
158 goto candidate_del;
159
160 router = orig_node_get_router(orig_node);
161 if (!router)
162 goto candidate_del;
163
164 /* ... and is good enough to be considered */
165 if (neigh_node->tq_avg < router->tq_avg - BONDING_TQ_THRESHOLD)
166 goto candidate_del;
167
168 /**
169 * check if we have another candidate with the same mac address or
170 * interface. If we do, we won't select this candidate because of
171 * possible interference.
172 */
173 hlist_for_each_entry_rcu(tmp_neigh_node, node,
174 &orig_node->neigh_list, list) {
175
176 if (tmp_neigh_node == neigh_node)
177 continue;
178
179 /* we only care if the other candidate is even
180 * considered as candidate. */
181 if (list_empty(&tmp_neigh_node->bonding_list))
182 continue;
183
184 if ((neigh_node->if_incoming == tmp_neigh_node->if_incoming) ||
185 (compare_eth(neigh_node->addr, tmp_neigh_node->addr))) {
186 interference_candidate = 1;
187 break;
188 }
189 }
190
191 /* don't care further if it is an interference candidate */
192 if (interference_candidate)
193 goto candidate_del;
194
195 /* this neighbor already is part of our candidate list */
196 if (!list_empty(&neigh_node->bonding_list))
197 goto out;
198
199 if (!atomic_inc_not_zero(&neigh_node->refcount))
200 goto out;
201
202 list_add_rcu(&neigh_node->bonding_list, &orig_node->bond_list);
203 atomic_inc(&orig_node->bond_candidates);
204 goto out;
205
206 candidate_del:
207 bonding_candidate_del(orig_node, neigh_node);
208
209 out:
210 spin_unlock_bh(&orig_node->neigh_list_lock);
211
212 if (router)
213 neigh_node_free_ref(router);
214 }
215
216 /* copy primary address for bonding */
217 void bonding_save_primary(const struct orig_node *orig_node,
218 struct orig_node *orig_neigh_node,
219 const struct batman_ogm_packet *batman_ogm_packet)
220 {
221 if (!(batman_ogm_packet->flags & PRIMARIES_FIRST_HOP))
222 return;
223
224 memcpy(orig_neigh_node->primary_addr, orig_node->orig, ETH_ALEN);
225 }
226
227 /* checks whether the host restarted and is in the protection time.
228 * returns:
229 * 0 if the packet is to be accepted
230 * 1 if the packet is to be ignored.
231 */
232 int window_protected(struct bat_priv *bat_priv, int32_t seq_num_diff,
233 unsigned long *last_reset)
234 {
235 if ((seq_num_diff <= -TQ_LOCAL_WINDOW_SIZE) ||
236 (seq_num_diff >= EXPECTED_SEQNO_RANGE)) {
237 if (!has_timed_out(*last_reset, RESET_PROTECTION_MS))
238 return 1;
239
240 *last_reset = jiffies;
241 bat_dbg(DBG_BATMAN, bat_priv,
242 "old packet received, start protection\n");
243 }
244
245 return 0;
246 }
247
248 bool check_management_packet(struct sk_buff *skb,
249 struct hard_iface *hard_iface,
250 int header_len)
251 {
252 struct ethhdr *ethhdr;
253
254 /* drop packet if it has not necessary minimum size */
255 if (unlikely(!pskb_may_pull(skb, header_len)))
256 return false;
257
258 ethhdr = (struct ethhdr *)skb_mac_header(skb);
259
260 /* packet with broadcast indication but unicast recipient */
261 if (!is_broadcast_ether_addr(ethhdr->h_dest))
262 return false;
263
264 /* packet with broadcast sender address */
265 if (is_broadcast_ether_addr(ethhdr->h_source))
266 return false;
267
268 /* create a copy of the skb, if needed, to modify it. */
269 if (skb_cow(skb, 0) < 0)
270 return false;
271
272 /* keep skb linear */
273 if (skb_linearize(skb) < 0)
274 return false;
275
276 return true;
277 }
278
279 static int recv_my_icmp_packet(struct bat_priv *bat_priv,
280 struct sk_buff *skb, size_t icmp_len)
281 {
282 struct hard_iface *primary_if = NULL;
283 struct orig_node *orig_node = NULL;
284 struct neigh_node *router = NULL;
285 struct icmp_packet_rr *icmp_packet;
286 int ret = NET_RX_DROP;
287
288 icmp_packet = (struct icmp_packet_rr *)skb->data;
289
290 /* add data to device queue */
291 if (icmp_packet->msg_type != ECHO_REQUEST) {
292 bat_socket_receive_packet(icmp_packet, icmp_len);
293 goto out;
294 }
295
296 primary_if = primary_if_get_selected(bat_priv);
297 if (!primary_if)
298 goto out;
299
300 /* answer echo request (ping) */
301 /* get routing information */
302 orig_node = orig_hash_find(bat_priv, icmp_packet->orig);
303 if (!orig_node)
304 goto out;
305
306 router = orig_node_get_router(orig_node);
307 if (!router)
308 goto out;
309
310 /* create a copy of the skb, if needed, to modify it. */
311 if (skb_cow(skb, ETH_HLEN) < 0)
312 goto out;
313
314 icmp_packet = (struct icmp_packet_rr *)skb->data;
315
316 memcpy(icmp_packet->dst, icmp_packet->orig, ETH_ALEN);
317 memcpy(icmp_packet->orig, primary_if->net_dev->dev_addr, ETH_ALEN);
318 icmp_packet->msg_type = ECHO_REPLY;
319 icmp_packet->header.ttl = TTL;
320
321 send_skb_packet(skb, router->if_incoming, router->addr);
322 ret = NET_RX_SUCCESS;
323
324 out:
325 if (primary_if)
326 hardif_free_ref(primary_if);
327 if (router)
328 neigh_node_free_ref(router);
329 if (orig_node)
330 orig_node_free_ref(orig_node);
331 return ret;
332 }
333
334 static int recv_icmp_ttl_exceeded(struct bat_priv *bat_priv,
335 struct sk_buff *skb)
336 {
337 struct hard_iface *primary_if = NULL;
338 struct orig_node *orig_node = NULL;
339 struct neigh_node *router = NULL;
340 struct icmp_packet *icmp_packet;
341 int ret = NET_RX_DROP;
342
343 icmp_packet = (struct icmp_packet *)skb->data;
344
345 /* send TTL exceeded if packet is an echo request (traceroute) */
346 if (icmp_packet->msg_type != ECHO_REQUEST) {
347 pr_debug("Warning - can't forward icmp packet from %pM to %pM: ttl exceeded\n",
348 icmp_packet->orig, icmp_packet->dst);
349 goto out;
350 }
351
352 primary_if = primary_if_get_selected(bat_priv);
353 if (!primary_if)
354 goto out;
355
356 /* get routing information */
357 orig_node = orig_hash_find(bat_priv, icmp_packet->orig);
358 if (!orig_node)
359 goto out;
360
361 router = orig_node_get_router(orig_node);
362 if (!router)
363 goto out;
364
365 /* create a copy of the skb, if needed, to modify it. */
366 if (skb_cow(skb, ETH_HLEN) < 0)
367 goto out;
368
369 icmp_packet = (struct icmp_packet *)skb->data;
370
371 memcpy(icmp_packet->dst, icmp_packet->orig, ETH_ALEN);
372 memcpy(icmp_packet->orig, primary_if->net_dev->dev_addr, ETH_ALEN);
373 icmp_packet->msg_type = TTL_EXCEEDED;
374 icmp_packet->header.ttl = TTL;
375
376 send_skb_packet(skb, router->if_incoming, router->addr);
377 ret = NET_RX_SUCCESS;
378
379 out:
380 if (primary_if)
381 hardif_free_ref(primary_if);
382 if (router)
383 neigh_node_free_ref(router);
384 if (orig_node)
385 orig_node_free_ref(orig_node);
386 return ret;
387 }
388
389
390 int recv_icmp_packet(struct sk_buff *skb, struct hard_iface *recv_if)
391 {
392 struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
393 struct icmp_packet_rr *icmp_packet;
394 struct ethhdr *ethhdr;
395 struct orig_node *orig_node = NULL;
396 struct neigh_node *router = NULL;
397 int hdr_size = sizeof(struct icmp_packet);
398 int ret = NET_RX_DROP;
399
400 /**
401 * we truncate all incoming icmp packets if they don't match our size
402 */
403 if (skb->len >= sizeof(struct icmp_packet_rr))
404 hdr_size = sizeof(struct icmp_packet_rr);
405
406 /* drop packet if it has not necessary minimum size */
407 if (unlikely(!pskb_may_pull(skb, hdr_size)))
408 goto out;
409
410 ethhdr = (struct ethhdr *)skb_mac_header(skb);
411
412 /* packet with unicast indication but broadcast recipient */
413 if (is_broadcast_ether_addr(ethhdr->h_dest))
414 goto out;
415
416 /* packet with broadcast sender address */
417 if (is_broadcast_ether_addr(ethhdr->h_source))
418 goto out;
419
420 /* not for me */
421 if (!is_my_mac(ethhdr->h_dest))
422 goto out;
423
424 icmp_packet = (struct icmp_packet_rr *)skb->data;
425
426 /* add record route information if not full */
427 if ((hdr_size == sizeof(struct icmp_packet_rr)) &&
428 (icmp_packet->rr_cur < BAT_RR_LEN)) {
429 memcpy(&(icmp_packet->rr[icmp_packet->rr_cur]),
430 ethhdr->h_dest, ETH_ALEN);
431 icmp_packet->rr_cur++;
432 }
433
434 /* packet for me */
435 if (is_my_mac(icmp_packet->dst))
436 return recv_my_icmp_packet(bat_priv, skb, hdr_size);
437
438 /* TTL exceeded */
439 if (icmp_packet->header.ttl < 2)
440 return recv_icmp_ttl_exceeded(bat_priv, skb);
441
442 /* get routing information */
443 orig_node = orig_hash_find(bat_priv, icmp_packet->dst);
444 if (!orig_node)
445 goto out;
446
447 router = orig_node_get_router(orig_node);
448 if (!router)
449 goto out;
450
451 /* create a copy of the skb, if needed, to modify it. */
452 if (skb_cow(skb, ETH_HLEN) < 0)
453 goto out;
454
455 icmp_packet = (struct icmp_packet_rr *)skb->data;
456
457 /* decrement ttl */
458 icmp_packet->header.ttl--;
459
460 /* route it */
461 send_skb_packet(skb, router->if_incoming, router->addr);
462 ret = NET_RX_SUCCESS;
463
464 out:
465 if (router)
466 neigh_node_free_ref(router);
467 if (orig_node)
468 orig_node_free_ref(orig_node);
469 return ret;
470 }
471
472 /* In the bonding case, send the packets in a round
473 * robin fashion over the remaining interfaces.
474 *
475 * This method rotates the bonding list and increases the
476 * returned router's refcount. */
477 static struct neigh_node *find_bond_router(struct orig_node *primary_orig,
478 const struct hard_iface *recv_if)
479 {
480 struct neigh_node *tmp_neigh_node;
481 struct neigh_node *router = NULL, *first_candidate = NULL;
482
483 rcu_read_lock();
484 list_for_each_entry_rcu(tmp_neigh_node, &primary_orig->bond_list,
485 bonding_list) {
486 if (!first_candidate)
487 first_candidate = tmp_neigh_node;
488
489 /* recv_if == NULL on the first node. */
490 if (tmp_neigh_node->if_incoming == recv_if)
491 continue;
492
493 if (!atomic_inc_not_zero(&tmp_neigh_node->refcount))
494 continue;
495
496 router = tmp_neigh_node;
497 break;
498 }
499
500 /* use the first candidate if nothing was found. */
501 if (!router && first_candidate &&
502 atomic_inc_not_zero(&first_candidate->refcount))
503 router = first_candidate;
504
505 if (!router)
506 goto out;
507
508 /* selected should point to the next element
509 * after the current router */
510 spin_lock_bh(&primary_orig->neigh_list_lock);
511 /* this is a list_move(), which unfortunately
512 * does not exist as rcu version */
513 list_del_rcu(&primary_orig->bond_list);
514 list_add_rcu(&primary_orig->bond_list,
515 &router->bonding_list);
516 spin_unlock_bh(&primary_orig->neigh_list_lock);
517
518 out:
519 rcu_read_unlock();
520 return router;
521 }
522
523 /* Interface Alternating: Use the best of the
524 * remaining candidates which are not using
525 * this interface.
526 *
527 * Increases the returned router's refcount */
528 static struct neigh_node *find_ifalter_router(struct orig_node *primary_orig,
529 const struct hard_iface *recv_if)
530 {
531 struct neigh_node *tmp_neigh_node;
532 struct neigh_node *router = NULL, *first_candidate = NULL;
533
534 rcu_read_lock();
535 list_for_each_entry_rcu(tmp_neigh_node, &primary_orig->bond_list,
536 bonding_list) {
537 if (!first_candidate)
538 first_candidate = tmp_neigh_node;
539
540 /* recv_if == NULL on the first node. */
541 if (tmp_neigh_node->if_incoming == recv_if)
542 continue;
543
544 if (!atomic_inc_not_zero(&tmp_neigh_node->refcount))
545 continue;
546
547 /* if we don't have a router yet
548 * or this one is better, choose it. */
549 if ((!router) ||
550 (tmp_neigh_node->tq_avg > router->tq_avg)) {
551 /* decrement refcount of
552 * previously selected router */
553 if (router)
554 neigh_node_free_ref(router);
555
556 router = tmp_neigh_node;
557 atomic_inc_not_zero(&router->refcount);
558 }
559
560 neigh_node_free_ref(tmp_neigh_node);
561 }
562
563 /* use the first candidate if nothing was found. */
564 if (!router && first_candidate &&
565 atomic_inc_not_zero(&first_candidate->refcount))
566 router = first_candidate;
567
568 rcu_read_unlock();
569 return router;
570 }
571
572 int recv_tt_query(struct sk_buff *skb, struct hard_iface *recv_if)
573 {
574 struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
575 struct tt_query_packet *tt_query;
576 uint16_t tt_len;
577 struct ethhdr *ethhdr;
578
579 /* drop packet if it has not necessary minimum size */
580 if (unlikely(!pskb_may_pull(skb, sizeof(struct tt_query_packet))))
581 goto out;
582
583 /* I could need to modify it */
584 if (skb_cow(skb, sizeof(struct tt_query_packet)) < 0)
585 goto out;
586
587 ethhdr = (struct ethhdr *)skb_mac_header(skb);
588
589 /* packet with unicast indication but broadcast recipient */
590 if (is_broadcast_ether_addr(ethhdr->h_dest))
591 goto out;
592
593 /* packet with broadcast sender address */
594 if (is_broadcast_ether_addr(ethhdr->h_source))
595 goto out;
596
597 tt_query = (struct tt_query_packet *)skb->data;
598
599 tt_query->tt_data = ntohs(tt_query->tt_data);
600
601 switch (tt_query->flags & TT_QUERY_TYPE_MASK) {
602 case TT_REQUEST:
603 /* If we cannot provide an answer the tt_request is
604 * forwarded */
605 if (!send_tt_response(bat_priv, tt_query)) {
606 bat_dbg(DBG_TT, bat_priv,
607 "Routing TT_REQUEST to %pM [%c]\n",
608 tt_query->dst,
609 (tt_query->flags & TT_FULL_TABLE ? 'F' : '.'));
610 tt_query->tt_data = htons(tt_query->tt_data);
611 return route_unicast_packet(skb, recv_if);
612 }
613 break;
614 case TT_RESPONSE:
615 if (is_my_mac(tt_query->dst)) {
616 /* packet needs to be linearized to access the TT
617 * changes */
618 if (skb_linearize(skb) < 0)
619 goto out;
620
621 tt_len = tt_query->tt_data * sizeof(struct tt_change);
622
623 /* Ensure we have all the claimed data */
624 if (unlikely(skb_headlen(skb) <
625 sizeof(struct tt_query_packet) + tt_len))
626 goto out;
627
628 handle_tt_response(bat_priv, tt_query);
629 } else {
630 bat_dbg(DBG_TT, bat_priv,
631 "Routing TT_RESPONSE to %pM [%c]\n",
632 tt_query->dst,
633 (tt_query->flags & TT_FULL_TABLE ? 'F' : '.'));
634 tt_query->tt_data = htons(tt_query->tt_data);
635 return route_unicast_packet(skb, recv_if);
636 }
637 break;
638 }
639
640 out:
641 /* returning NET_RX_DROP will make the caller function kfree the skb */
642 return NET_RX_DROP;
643 }
644
645 int recv_roam_adv(struct sk_buff *skb, struct hard_iface *recv_if)
646 {
647 struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
648 struct roam_adv_packet *roam_adv_packet;
649 struct orig_node *orig_node;
650 struct ethhdr *ethhdr;
651
652 /* drop packet if it has not necessary minimum size */
653 if (unlikely(!pskb_may_pull(skb, sizeof(struct roam_adv_packet))))
654 goto out;
655
656 ethhdr = (struct ethhdr *)skb_mac_header(skb);
657
658 /* packet with unicast indication but broadcast recipient */
659 if (is_broadcast_ether_addr(ethhdr->h_dest))
660 goto out;
661
662 /* packet with broadcast sender address */
663 if (is_broadcast_ether_addr(ethhdr->h_source))
664 goto out;
665
666 roam_adv_packet = (struct roam_adv_packet *)skb->data;
667
668 if (!is_my_mac(roam_adv_packet->dst))
669 return route_unicast_packet(skb, recv_if);
670
671 /* check if it is a backbone gateway. we don't accept
672 * roaming advertisement from it, as it has the same
673 * entries as we have.
674 */
675 if (bla_is_backbone_gw_orig(bat_priv, roam_adv_packet->src))
676 goto out;
677
678 orig_node = orig_hash_find(bat_priv, roam_adv_packet->src);
679 if (!orig_node)
680 goto out;
681
682 bat_dbg(DBG_TT, bat_priv,
683 "Received ROAMING_ADV from %pM (client %pM)\n",
684 roam_adv_packet->src, roam_adv_packet->client);
685
686 tt_global_add(bat_priv, orig_node, roam_adv_packet->client,
687 atomic_read(&orig_node->last_ttvn) + 1, true, false);
688
689 /* Roaming phase starts: I have new information but the ttvn has not
690 * been incremented yet. This flag will make me check all the incoming
691 * packets for the correct destination. */
692 bat_priv->tt_poss_change = true;
693
694 orig_node_free_ref(orig_node);
695 out:
696 /* returning NET_RX_DROP will make the caller function kfree the skb */
697 return NET_RX_DROP;
698 }
699
700 /* find a suitable router for this originator, and use
701 * bonding if possible. increases the found neighbors
702 * refcount.*/
703 struct neigh_node *find_router(struct bat_priv *bat_priv,
704 struct orig_node *orig_node,
705 const struct hard_iface *recv_if)
706 {
707 struct orig_node *primary_orig_node;
708 struct orig_node *router_orig;
709 struct neigh_node *router;
710 static uint8_t zero_mac[ETH_ALEN] = {0, 0, 0, 0, 0, 0};
711 int bonding_enabled;
712
713 if (!orig_node)
714 return NULL;
715
716 router = orig_node_get_router(orig_node);
717 if (!router)
718 goto err;
719
720 /* without bonding, the first node should
721 * always choose the default router. */
722 bonding_enabled = atomic_read(&bat_priv->bonding);
723
724 rcu_read_lock();
725 /* select default router to output */
726 router_orig = router->orig_node;
727 if (!router_orig)
728 goto err_unlock;
729
730 if ((!recv_if) && (!bonding_enabled))
731 goto return_router;
732
733 /* if we have something in the primary_addr, we can search
734 * for a potential bonding candidate. */
735 if (compare_eth(router_orig->primary_addr, zero_mac))
736 goto return_router;
737
738 /* find the orig_node which has the primary interface. might
739 * even be the same as our router_orig in many cases */
740
741 if (compare_eth(router_orig->primary_addr, router_orig->orig)) {
742 primary_orig_node = router_orig;
743 } else {
744 primary_orig_node = orig_hash_find(bat_priv,
745 router_orig->primary_addr);
746 if (!primary_orig_node)
747 goto return_router;
748
749 orig_node_free_ref(primary_orig_node);
750 }
751
752 /* with less than 2 candidates, we can't do any
753 * bonding and prefer the original router. */
754 if (atomic_read(&primary_orig_node->bond_candidates) < 2)
755 goto return_router;
756
757 /* all nodes between should choose a candidate which
758 * is is not on the interface where the packet came
759 * in. */
760
761 neigh_node_free_ref(router);
762
763 if (bonding_enabled)
764 router = find_bond_router(primary_orig_node, recv_if);
765 else
766 router = find_ifalter_router(primary_orig_node, recv_if);
767
768 return_router:
769 if (router && router->if_incoming->if_status != IF_ACTIVE)
770 goto err_unlock;
771
772 rcu_read_unlock();
773 return router;
774 err_unlock:
775 rcu_read_unlock();
776 err:
777 if (router)
778 neigh_node_free_ref(router);
779 return NULL;
780 }
781
782 static int check_unicast_packet(struct sk_buff *skb, int hdr_size)
783 {
784 struct ethhdr *ethhdr;
785
786 /* drop packet if it has not necessary minimum size */
787 if (unlikely(!pskb_may_pull(skb, hdr_size)))
788 return -1;
789
790 ethhdr = (struct ethhdr *)skb_mac_header(skb);
791
792 /* packet with unicast indication but broadcast recipient */
793 if (is_broadcast_ether_addr(ethhdr->h_dest))
794 return -1;
795
796 /* packet with broadcast sender address */
797 if (is_broadcast_ether_addr(ethhdr->h_source))
798 return -1;
799
800 /* not for me */
801 if (!is_my_mac(ethhdr->h_dest))
802 return -1;
803
804 return 0;
805 }
806
807 static int route_unicast_packet(struct sk_buff *skb, struct hard_iface *recv_if)
808 {
809 struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
810 struct orig_node *orig_node = NULL;
811 struct neigh_node *neigh_node = NULL;
812 struct unicast_packet *unicast_packet;
813 struct ethhdr *ethhdr = (struct ethhdr *)skb_mac_header(skb);
814 int ret = NET_RX_DROP;
815 struct sk_buff *new_skb;
816
817 unicast_packet = (struct unicast_packet *)skb->data;
818
819 /* TTL exceeded */
820 if (unicast_packet->header.ttl < 2) {
821 pr_debug("Warning - can't forward unicast packet from %pM to %pM: ttl exceeded\n",
822 ethhdr->h_source, unicast_packet->dest);
823 goto out;
824 }
825
826 /* get routing information */
827 orig_node = orig_hash_find(bat_priv, unicast_packet->dest);
828
829 if (!orig_node)
830 goto out;
831
832 /* find_router() increases neigh_nodes refcount if found. */
833 neigh_node = find_router(bat_priv, orig_node, recv_if);
834
835 if (!neigh_node)
836 goto out;
837
838 /* create a copy of the skb, if needed, to modify it. */
839 if (skb_cow(skb, ETH_HLEN) < 0)
840 goto out;
841
842 unicast_packet = (struct unicast_packet *)skb->data;
843
844 if (unicast_packet->header.packet_type == BAT_UNICAST &&
845 atomic_read(&bat_priv->fragmentation) &&
846 skb->len > neigh_node->if_incoming->net_dev->mtu) {
847 ret = frag_send_skb(skb, bat_priv,
848 neigh_node->if_incoming, neigh_node->addr);
849 goto out;
850 }
851
852 if (unicast_packet->header.packet_type == BAT_UNICAST_FRAG &&
853 frag_can_reassemble(skb, neigh_node->if_incoming->net_dev->mtu)) {
854
855 ret = frag_reassemble_skb(skb, bat_priv, &new_skb);
856
857 if (ret == NET_RX_DROP)
858 goto out;
859
860 /* packet was buffered for late merge */
861 if (!new_skb) {
862 ret = NET_RX_SUCCESS;
863 goto out;
864 }
865
866 skb = new_skb;
867 unicast_packet = (struct unicast_packet *)skb->data;
868 }
869
870 /* decrement ttl */
871 unicast_packet->header.ttl--;
872
873 /* route it */
874 send_skb_packet(skb, neigh_node->if_incoming, neigh_node->addr);
875 ret = NET_RX_SUCCESS;
876
877 out:
878 if (neigh_node)
879 neigh_node_free_ref(neigh_node);
880 if (orig_node)
881 orig_node_free_ref(orig_node);
882 return ret;
883 }
884
885 static int check_unicast_ttvn(struct bat_priv *bat_priv,
886 struct sk_buff *skb) {
887 uint8_t curr_ttvn;
888 struct orig_node *orig_node;
889 struct ethhdr *ethhdr;
890 struct hard_iface *primary_if;
891 struct unicast_packet *unicast_packet;
892 bool tt_poss_change;
893
894 /* I could need to modify it */
895 if (skb_cow(skb, sizeof(struct unicast_packet)) < 0)
896 return 0;
897
898 unicast_packet = (struct unicast_packet *)skb->data;
899
900 if (is_my_mac(unicast_packet->dest)) {
901 tt_poss_change = bat_priv->tt_poss_change;
902 curr_ttvn = (uint8_t)atomic_read(&bat_priv->ttvn);
903 } else {
904 orig_node = orig_hash_find(bat_priv, unicast_packet->dest);
905
906 if (!orig_node)
907 return 0;
908
909 curr_ttvn = (uint8_t)atomic_read(&orig_node->last_ttvn);
910 tt_poss_change = orig_node->tt_poss_change;
911 orig_node_free_ref(orig_node);
912 }
913
914 /* Check whether I have to reroute the packet */
915 if (seq_before(unicast_packet->ttvn, curr_ttvn) || tt_poss_change) {
916 /* check if there is enough data before accessing it */
917 if (pskb_may_pull(skb, sizeof(struct unicast_packet) +
918 ETH_HLEN) < 0)
919 return 0;
920
921 ethhdr = (struct ethhdr *)(skb->data +
922 sizeof(struct unicast_packet));
923
924 /* we don't have an updated route for this client, so we should
925 * not try to reroute the packet!!
926 */
927 if (tt_global_client_is_roaming(bat_priv, ethhdr->h_dest))
928 return 1;
929
930 orig_node = transtable_search(bat_priv, NULL, ethhdr->h_dest);
931
932 if (!orig_node) {
933 if (!is_my_client(bat_priv, ethhdr->h_dest))
934 return 0;
935 primary_if = primary_if_get_selected(bat_priv);
936 if (!primary_if)
937 return 0;
938 memcpy(unicast_packet->dest,
939 primary_if->net_dev->dev_addr, ETH_ALEN);
940 hardif_free_ref(primary_if);
941 } else {
942 memcpy(unicast_packet->dest, orig_node->orig,
943 ETH_ALEN);
944 curr_ttvn = (uint8_t)
945 atomic_read(&orig_node->last_ttvn);
946 orig_node_free_ref(orig_node);
947 }
948
949 bat_dbg(DBG_ROUTES, bat_priv,
950 "TTVN mismatch (old_ttvn %u new_ttvn %u)! Rerouting unicast packet (for %pM) to %pM\n",
951 unicast_packet->ttvn, curr_ttvn, ethhdr->h_dest,
952 unicast_packet->dest);
953
954 unicast_packet->ttvn = curr_ttvn;
955 }
956 return 1;
957 }
958
959 int recv_unicast_packet(struct sk_buff *skb, struct hard_iface *recv_if)
960 {
961 struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
962 struct unicast_packet *unicast_packet;
963 int hdr_size = sizeof(*unicast_packet);
964
965 if (check_unicast_packet(skb, hdr_size) < 0)
966 return NET_RX_DROP;
967
968 if (!check_unicast_ttvn(bat_priv, skb))
969 return NET_RX_DROP;
970
971 unicast_packet = (struct unicast_packet *)skb->data;
972
973 /* packet for me */
974 if (is_my_mac(unicast_packet->dest)) {
975 interface_rx(recv_if->soft_iface, skb, recv_if, hdr_size);
976 return NET_RX_SUCCESS;
977 }
978
979 return route_unicast_packet(skb, recv_if);
980 }
981
982 int recv_ucast_frag_packet(struct sk_buff *skb, struct hard_iface *recv_if)
983 {
984 struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
985 struct unicast_frag_packet *unicast_packet;
986 int hdr_size = sizeof(*unicast_packet);
987 struct sk_buff *new_skb = NULL;
988 int ret;
989
990 if (check_unicast_packet(skb, hdr_size) < 0)
991 return NET_RX_DROP;
992
993 if (!check_unicast_ttvn(bat_priv, skb))
994 return NET_RX_DROP;
995
996 unicast_packet = (struct unicast_frag_packet *)skb->data;
997
998 /* packet for me */
999 if (is_my_mac(unicast_packet->dest)) {
1000
1001 ret = frag_reassemble_skb(skb, bat_priv, &new_skb);
1002
1003 if (ret == NET_RX_DROP)
1004 return NET_RX_DROP;
1005
1006 /* packet was buffered for late merge */
1007 if (!new_skb)
1008 return NET_RX_SUCCESS;
1009
1010 interface_rx(recv_if->soft_iface, new_skb, recv_if,
1011 sizeof(struct unicast_packet));
1012 return NET_RX_SUCCESS;
1013 }
1014
1015 return route_unicast_packet(skb, recv_if);
1016 }
1017
1018
1019 int recv_bcast_packet(struct sk_buff *skb, struct hard_iface *recv_if)
1020 {
1021 struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1022 struct orig_node *orig_node = NULL;
1023 struct bcast_packet *bcast_packet;
1024 struct ethhdr *ethhdr;
1025 int hdr_size = sizeof(*bcast_packet);
1026 int ret = NET_RX_DROP;
1027 int32_t seq_diff;
1028
1029 /* drop packet if it has not necessary minimum size */
1030 if (unlikely(!pskb_may_pull(skb, hdr_size)))
1031 goto out;
1032
1033 ethhdr = (struct ethhdr *)skb_mac_header(skb);
1034
1035 /* packet with broadcast indication but unicast recipient */
1036 if (!is_broadcast_ether_addr(ethhdr->h_dest))
1037 goto out;
1038
1039 /* packet with broadcast sender address */
1040 if (is_broadcast_ether_addr(ethhdr->h_source))
1041 goto out;
1042
1043 /* ignore broadcasts sent by myself */
1044 if (is_my_mac(ethhdr->h_source))
1045 goto out;
1046
1047 bcast_packet = (struct bcast_packet *)skb->data;
1048
1049 /* ignore broadcasts originated by myself */
1050 if (is_my_mac(bcast_packet->orig))
1051 goto out;
1052
1053 if (bcast_packet->header.ttl < 2)
1054 goto out;
1055
1056 orig_node = orig_hash_find(bat_priv, bcast_packet->orig);
1057
1058 if (!orig_node)
1059 goto out;
1060
1061 spin_lock_bh(&orig_node->bcast_seqno_lock);
1062
1063 /* check whether the packet is a duplicate */
1064 if (bat_test_bit(orig_node->bcast_bits, orig_node->last_bcast_seqno,
1065 ntohl(bcast_packet->seqno)))
1066 goto spin_unlock;
1067
1068 seq_diff = ntohl(bcast_packet->seqno) - orig_node->last_bcast_seqno;
1069
1070 /* check whether the packet is old and the host just restarted. */
1071 if (window_protected(bat_priv, seq_diff,
1072 &orig_node->bcast_seqno_reset))
1073 goto spin_unlock;
1074
1075 /* mark broadcast in flood history, update window position
1076 * if required. */
1077 if (bit_get_packet(bat_priv, orig_node->bcast_bits, seq_diff, 1))
1078 orig_node->last_bcast_seqno = ntohl(bcast_packet->seqno);
1079
1080 spin_unlock_bh(&orig_node->bcast_seqno_lock);
1081
1082 /* check whether this has been sent by another originator before */
1083 if (bla_check_bcast_duplist(bat_priv, bcast_packet, hdr_size))
1084 goto out;
1085
1086 /* rebroadcast packet */
1087 add_bcast_packet_to_list(bat_priv, skb, 1);
1088
1089 /* don't hand the broadcast up if it is from an originator
1090 * from the same backbone.
1091 */
1092 if (bla_is_backbone_gw(skb, orig_node, hdr_size))
1093 goto out;
1094
1095 /* broadcast for me */
1096 interface_rx(recv_if->soft_iface, skb, recv_if, hdr_size);
1097 ret = NET_RX_SUCCESS;
1098 goto out;
1099
1100 spin_unlock:
1101 spin_unlock_bh(&orig_node->bcast_seqno_lock);
1102 out:
1103 if (orig_node)
1104 orig_node_free_ref(orig_node);
1105 return ret;
1106 }
1107
1108 int recv_vis_packet(struct sk_buff *skb, struct hard_iface *recv_if)
1109 {
1110 struct vis_packet *vis_packet;
1111 struct ethhdr *ethhdr;
1112 struct bat_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1113 int hdr_size = sizeof(*vis_packet);
1114
1115 /* keep skb linear */
1116 if (skb_linearize(skb) < 0)
1117 return NET_RX_DROP;
1118
1119 if (unlikely(!pskb_may_pull(skb, hdr_size)))
1120 return NET_RX_DROP;
1121
1122 vis_packet = (struct vis_packet *)skb->data;
1123 ethhdr = (struct ethhdr *)skb_mac_header(skb);
1124
1125 /* not for me */
1126 if (!is_my_mac(ethhdr->h_dest))
1127 return NET_RX_DROP;
1128
1129 /* ignore own packets */
1130 if (is_my_mac(vis_packet->vis_orig))
1131 return NET_RX_DROP;
1132
1133 if (is_my_mac(vis_packet->sender_orig))
1134 return NET_RX_DROP;
1135
1136 switch (vis_packet->vis_type) {
1137 case VIS_TYPE_SERVER_SYNC:
1138 receive_server_sync_packet(bat_priv, vis_packet,
1139 skb_headlen(skb));
1140 break;
1141
1142 case VIS_TYPE_CLIENT_UPDATE:
1143 receive_client_update_packet(bat_priv, vis_packet,
1144 skb_headlen(skb));
1145 break;
1146
1147 default: /* ignore unknown packet */
1148 break;
1149 }
1150
1151 /* We take a copy of the data in the packet, so we should
1152 always free the skbuf. */
1153 return NET_RX_DROP;
1154 }