batman-adv: Fix kernel-doc for batadv_claim_free_ref
[deliverable/linux.git] / net / batman-adv / routing.c
CommitLineData
9f6446c7 1/* Copyright (C) 2007-2015 B.A.T.M.A.N. contributors:
c6c8fea2
SE
2 *
3 * Marek Lindner, Simon Wunderlich
4 *
5 * This program is free software; you can redistribute it and/or
6 * modify it under the terms of version 2 of the GNU General Public
7 * License as published by the Free Software Foundation.
8 *
9 * This program is distributed in the hope that it will be useful, but
10 * WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
12 * General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
ebf38fb7 15 * along with this program; if not, see <http://www.gnu.org/licenses/>.
c6c8fea2
SE
16 */
17
c6c8fea2 18#include "routing.h"
1e2c2a4f
SE
19#include "main.h"
20
21#include <linux/atomic.h>
22#include <linux/byteorder/generic.h>
23#include <linux/compiler.h>
24#include <linux/errno.h>
25#include <linux/etherdevice.h>
26#include <linux/if_ether.h>
27#include <linux/jiffies.h>
28#include <linux/netdevice.h>
29#include <linux/printk.h>
30#include <linux/rculist.h>
31#include <linux/rcupdate.h>
32#include <linux/skbuff.h>
33#include <linux/spinlock.h>
34#include <linux/stddef.h>
35
36#include "bitarray.h"
23721387 37#include "bridge_loop_avoidance.h"
c384ea3e 38#include "distributed-arp-table.h"
610bfc6b 39#include "fragmentation.h"
1e2c2a4f
SE
40#include "hard-interface.h"
41#include "icmp_socket.h"
42#include "network-coding.h"
43#include "originator.h"
44#include "packet.h"
45#include "send.h"
46#include "soft-interface.h"
47#include "translation-table.h"
c018ad3d 48
63b01037 49static int batadv_route_unicast_packet(struct sk_buff *skb,
56303d34 50 struct batadv_hard_iface *recv_if);
a7f6ee94 51
7351a482
SW
52/**
53 * _batadv_update_route - set the router for this originator
54 * @bat_priv: the bat priv with all the soft interface information
55 * @orig_node: orig node which is to be configured
56 * @recv_if: the receive interface for which this route is set
57 * @neigh_node: neighbor which should be the next router
58 *
59 * This function does not perform any error checks
60 */
56303d34
SE
61static void _batadv_update_route(struct batadv_priv *bat_priv,
62 struct batadv_orig_node *orig_node,
7351a482 63 struct batadv_hard_iface *recv_if,
56303d34 64 struct batadv_neigh_node *neigh_node)
c6c8fea2 65{
7351a482 66 struct batadv_orig_ifinfo *orig_ifinfo;
56303d34 67 struct batadv_neigh_node *curr_router;
e1a5382f 68
7351a482
SW
69 orig_ifinfo = batadv_orig_ifinfo_get(orig_node, recv_if);
70 if (!orig_ifinfo)
71 return;
72
73 rcu_read_lock();
74 curr_router = rcu_dereference(orig_ifinfo->router);
75 if (curr_router && !atomic_inc_not_zero(&curr_router->refcount))
76 curr_router = NULL;
77 rcu_read_unlock();
a8e7f4bc 78
c6c8fea2 79 /* route deleted */
e1a5382f 80 if ((curr_router) && (!neigh_node)) {
39c75a51
SE
81 batadv_dbg(BATADV_DBG_ROUTES, bat_priv,
82 "Deleting route towards: %pM\n", orig_node->orig);
95fb130d 83 batadv_tt_global_del_orig(bat_priv, orig_node, -1,
08c36d3e 84 "Deleted route towards originator");
c6c8fea2 85
e1a5382f
LL
86 /* route added */
87 } else if ((!curr_router) && (neigh_node)) {
39c75a51 88 batadv_dbg(BATADV_DBG_ROUTES, bat_priv,
1eda58bf
SE
89 "Adding route towards: %pM (via %pM)\n",
90 orig_node->orig, neigh_node->addr);
e1a5382f 91 /* route changed */
bb899b89 92 } else if (neigh_node && curr_router) {
39c75a51 93 batadv_dbg(BATADV_DBG_ROUTES, bat_priv,
1eda58bf
SE
94 "Changing route towards: %pM (now via %pM - was via %pM)\n",
95 orig_node->orig, neigh_node->addr,
96 curr_router->addr);
c6c8fea2
SE
97 }
98
e1a5382f 99 if (curr_router)
7d211efc 100 batadv_neigh_node_free_ref(curr_router);
e1a5382f
LL
101
102 /* increase refcount of new best neighbor */
44524fcd
ML
103 if (neigh_node && !atomic_inc_not_zero(&neigh_node->refcount))
104 neigh_node = NULL;
e1a5382f
LL
105
106 spin_lock_bh(&orig_node->neigh_list_lock);
7351a482 107 rcu_assign_pointer(orig_ifinfo->router, neigh_node);
e1a5382f 108 spin_unlock_bh(&orig_node->neigh_list_lock);
7351a482 109 batadv_orig_ifinfo_free_ref(orig_ifinfo);
e1a5382f
LL
110
111 /* decrease refcount of previous best neighbor */
112 if (curr_router)
7d211efc 113 batadv_neigh_node_free_ref(curr_router);
c6c8fea2
SE
114}
115
7351a482
SW
116/**
117 * batadv_update_route - set the router for this originator
118 * @bat_priv: the bat priv with all the soft interface information
119 * @orig_node: orig node which is to be configured
120 * @recv_if: the receive interface for which this route is set
121 * @neigh_node: neighbor which should be the next router
122 */
56303d34
SE
123void batadv_update_route(struct batadv_priv *bat_priv,
124 struct batadv_orig_node *orig_node,
7351a482 125 struct batadv_hard_iface *recv_if,
56303d34 126 struct batadv_neigh_node *neigh_node)
c6c8fea2 127{
56303d34 128 struct batadv_neigh_node *router = NULL;
c6c8fea2
SE
129
130 if (!orig_node)
e1a5382f
LL
131 goto out;
132
7351a482 133 router = batadv_orig_router_get(orig_node, recv_if);
c6c8fea2 134
e1a5382f 135 if (router != neigh_node)
7351a482 136 _batadv_update_route(bat_priv, orig_node, recv_if, neigh_node);
e1a5382f
LL
137
138out:
139 if (router)
7d211efc 140 batadv_neigh_node_free_ref(router);
c6c8fea2
SE
141}
142
62fe710f 143/**
7afcbbef 144 * batadv_window_protected - checks whether the host restarted and is in the
62fe710f 145 * protection time.
7afcbbef
SE
146 * @bat_priv: the bat priv with all the soft interface information
147 * @seq_num_diff: difference between the current/received sequence number and
148 * the last sequence number
149 * @last_reset: jiffies timestamp of the last reset, will be updated when reset
150 * is detected
62fe710f
SE
151 *
152 * Return:
153 * 0 if the packet is to be accepted.
c6c8fea2
SE
154 * 1 if the packet is to be ignored.
155 */
6b5e971a 156int batadv_window_protected(struct batadv_priv *bat_priv, s32 seq_num_diff,
30d3c511 157 unsigned long *last_reset)
c6c8fea2 158{
42d0b044
SE
159 if (seq_num_diff <= -BATADV_TQ_LOCAL_WINDOW_SIZE ||
160 seq_num_diff >= BATADV_EXPECTED_SEQNO_RANGE) {
161 if (!batadv_has_timed_out(*last_reset,
162 BATADV_RESET_PROTECTION_MS))
c6c8fea2 163 return 1;
8c7bf248
ML
164
165 *last_reset = jiffies;
39c75a51 166 batadv_dbg(BATADV_DBG_BATMAN, bat_priv,
1eda58bf 167 "old packet received, start protection\n");
c6c8fea2 168 }
8c7bf248 169
c6c8fea2
SE
170 return 0;
171}
172
30d3c511 173bool batadv_check_management_packet(struct sk_buff *skb,
56303d34 174 struct batadv_hard_iface *hard_iface,
30d3c511 175 int header_len)
c6c8fea2 176{
c6c8fea2
SE
177 struct ethhdr *ethhdr;
178
179 /* drop packet if it has not necessary minimum size */
c3e29312
ML
180 if (unlikely(!pskb_may_pull(skb, header_len)))
181 return false;
c6c8fea2 182
7ed4be95 183 ethhdr = eth_hdr(skb);
c6c8fea2
SE
184
185 /* packet with broadcast indication but unicast recipient */
186 if (!is_broadcast_ether_addr(ethhdr->h_dest))
c3e29312 187 return false;
c6c8fea2
SE
188
189 /* packet with broadcast sender address */
190 if (is_broadcast_ether_addr(ethhdr->h_source))
c3e29312 191 return false;
c6c8fea2
SE
192
193 /* create a copy of the skb, if needed, to modify it. */
194 if (skb_cow(skb, 0) < 0)
c3e29312 195 return false;
c6c8fea2
SE
196
197 /* keep skb linear */
198 if (skb_linearize(skb) < 0)
c3e29312 199 return false;
c6c8fea2 200
c3e29312 201 return true;
c6c8fea2
SE
202}
203
da6b8c20
SW
204/**
205 * batadv_recv_my_icmp_packet - receive an icmp packet locally
206 * @bat_priv: the bat priv with all the soft interface information
207 * @skb: icmp packet to process
208 *
62fe710f 209 * Return: NET_RX_SUCCESS if the packet has been consumed or NET_RX_DROP
da6b8c20
SW
210 * otherwise.
211 */
56303d34 212static int batadv_recv_my_icmp_packet(struct batadv_priv *bat_priv,
da6b8c20 213 struct sk_buff *skb)
c6c8fea2 214{
56303d34
SE
215 struct batadv_hard_iface *primary_if = NULL;
216 struct batadv_orig_node *orig_node = NULL;
da6b8c20
SW
217 struct batadv_icmp_header *icmph;
218 int res, ret = NET_RX_DROP;
c6c8fea2 219
da6b8c20 220 icmph = (struct batadv_icmp_header *)skb->data;
c6c8fea2 221
da6b8c20
SW
222 switch (icmph->msg_type) {
223 case BATADV_ECHO_REPLY:
224 case BATADV_DESTINATION_UNREACHABLE:
225 case BATADV_TTL_EXCEEDED:
226 /* receive the packet */
227 if (skb_linearize(skb) < 0)
228 break;
c6c8fea2 229
da6b8c20
SW
230 batadv_socket_receive_packet(icmph, skb->len);
231 break;
232 case BATADV_ECHO_REQUEST:
233 /* answer echo request (ping) */
234 primary_if = batadv_primary_if_get_selected(bat_priv);
235 if (!primary_if)
236 goto out;
237
238 /* get routing information */
239 orig_node = batadv_orig_hash_find(bat_priv, icmph->orig);
240 if (!orig_node)
241 goto out;
242
243 /* create a copy of the skb, if needed, to modify it. */
244 if (skb_cow(skb, ETH_HLEN) < 0)
245 goto out;
246
247 icmph = (struct batadv_icmp_header *)skb->data;
248
8fdd0153
AQ
249 ether_addr_copy(icmph->dst, icmph->orig);
250 ether_addr_copy(icmph->orig, primary_if->net_dev->dev_addr);
da6b8c20 251 icmph->msg_type = BATADV_ECHO_REPLY;
a40d9b07 252 icmph->ttl = BATADV_TTL;
da6b8c20
SW
253
254 res = batadv_send_skb_to_orig(skb, orig_node, NULL);
255 if (res != NET_XMIT_DROP)
256 ret = NET_RX_SUCCESS;
257
258 break;
259 default:
260 /* drop unknown type */
44524fcd 261 goto out;
da6b8c20 262 }
44524fcd 263out:
32ae9b22 264 if (primary_if)
e5d89254 265 batadv_hardif_free_ref(primary_if);
44524fcd 266 if (orig_node)
7d211efc 267 batadv_orig_node_free_ref(orig_node);
c6c8fea2
SE
268 return ret;
269}
270
56303d34 271static int batadv_recv_icmp_ttl_exceeded(struct batadv_priv *bat_priv,
63b01037 272 struct sk_buff *skb)
c6c8fea2 273{
56303d34
SE
274 struct batadv_hard_iface *primary_if = NULL;
275 struct batadv_orig_node *orig_node = NULL;
96412690 276 struct batadv_icmp_packet *icmp_packet;
44524fcd 277 int ret = NET_RX_DROP;
c6c8fea2 278
96412690 279 icmp_packet = (struct batadv_icmp_packet *)skb->data;
c6c8fea2
SE
280
281 /* send TTL exceeded if packet is an echo request (traceroute) */
27a417e6 282 if (icmp_packet->msg_type != BATADV_ECHO_REQUEST) {
86ceb360 283 pr_debug("Warning - can't forward icmp packet from %pM to %pM: ttl exceeded\n",
27a417e6 284 icmp_packet->orig, icmp_packet->dst);
44524fcd 285 goto out;
c6c8fea2
SE
286 }
287
e5d89254 288 primary_if = batadv_primary_if_get_selected(bat_priv);
32ae9b22 289 if (!primary_if)
44524fcd 290 goto out;
c6c8fea2
SE
291
292 /* get routing information */
27a417e6 293 orig_node = batadv_orig_hash_find(bat_priv, icmp_packet->orig);
44524fcd 294 if (!orig_node)
e1a5382f 295 goto out;
c6c8fea2 296
44524fcd 297 /* create a copy of the skb, if needed, to modify it. */
0d125074 298 if (skb_cow(skb, ETH_HLEN) < 0)
44524fcd 299 goto out;
c6c8fea2 300
96412690 301 icmp_packet = (struct batadv_icmp_packet *)skb->data;
c6c8fea2 302
8fdd0153
AQ
303 ether_addr_copy(icmp_packet->dst, icmp_packet->orig);
304 ether_addr_copy(icmp_packet->orig, primary_if->net_dev->dev_addr);
27a417e6
AQ
305 icmp_packet->msg_type = BATADV_TTL_EXCEEDED;
306 icmp_packet->ttl = BATADV_TTL;
44524fcd 307
e91ecfc6 308 if (batadv_send_skb_to_orig(skb, orig_node, NULL) != NET_XMIT_DROP)
bb351ba0 309 ret = NET_RX_SUCCESS;
c6c8fea2 310
44524fcd 311out:
32ae9b22 312 if (primary_if)
e5d89254 313 batadv_hardif_free_ref(primary_if);
44524fcd 314 if (orig_node)
7d211efc 315 batadv_orig_node_free_ref(orig_node);
c6c8fea2
SE
316 return ret;
317}
318
56303d34
SE
319int batadv_recv_icmp_packet(struct sk_buff *skb,
320 struct batadv_hard_iface *recv_if)
c6c8fea2 321{
56303d34 322 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
da6b8c20
SW
323 struct batadv_icmp_header *icmph;
324 struct batadv_icmp_packet_rr *icmp_packet_rr;
c6c8fea2 325 struct ethhdr *ethhdr;
56303d34 326 struct batadv_orig_node *orig_node = NULL;
da6b8c20 327 int hdr_size = sizeof(struct batadv_icmp_header);
44524fcd 328 int ret = NET_RX_DROP;
c6c8fea2 329
c6c8fea2
SE
330 /* drop packet if it has not necessary minimum size */
331 if (unlikely(!pskb_may_pull(skb, hdr_size)))
44524fcd 332 goto out;
c6c8fea2 333
7ed4be95 334 ethhdr = eth_hdr(skb);
c6c8fea2
SE
335
336 /* packet with unicast indication but broadcast recipient */
337 if (is_broadcast_ether_addr(ethhdr->h_dest))
44524fcd 338 goto out;
c6c8fea2
SE
339
340 /* packet with broadcast sender address */
341 if (is_broadcast_ether_addr(ethhdr->h_source))
44524fcd 342 goto out;
c6c8fea2
SE
343
344 /* not for me */
fe8a93b9 345 if (!batadv_is_my_mac(bat_priv, ethhdr->h_dest))
44524fcd 346 goto out;
c6c8fea2 347
da6b8c20 348 icmph = (struct batadv_icmp_header *)skb->data;
c6c8fea2
SE
349
350 /* add record route information if not full */
da6b8c20
SW
351 if ((icmph->msg_type == BATADV_ECHO_REPLY ||
352 icmph->msg_type == BATADV_ECHO_REQUEST) &&
353 (skb->len >= sizeof(struct batadv_icmp_packet_rr))) {
354 if (skb_linearize(skb) < 0)
355 goto out;
356
357 /* create a copy of the skb, if needed, to modify it. */
358 if (skb_cow(skb, ETH_HLEN) < 0)
359 goto out;
360
361 icmph = (struct batadv_icmp_header *)skb->data;
362 icmp_packet_rr = (struct batadv_icmp_packet_rr *)icmph;
363 if (icmp_packet_rr->rr_cur >= BATADV_RR_LEN)
364 goto out;
365
8fdd0153
AQ
366 ether_addr_copy(icmp_packet_rr->rr[icmp_packet_rr->rr_cur],
367 ethhdr->h_dest);
da6b8c20 368 icmp_packet_rr->rr_cur++;
c6c8fea2
SE
369 }
370
371 /* packet for me */
da6b8c20
SW
372 if (batadv_is_my_mac(bat_priv, icmph->dst))
373 return batadv_recv_my_icmp_packet(bat_priv, skb);
c6c8fea2
SE
374
375 /* TTL exceeded */
a40d9b07 376 if (icmph->ttl < 2)
63b01037 377 return batadv_recv_icmp_ttl_exceeded(bat_priv, skb);
c6c8fea2 378
c6c8fea2 379 /* get routing information */
da6b8c20 380 orig_node = batadv_orig_hash_find(bat_priv, icmph->dst);
44524fcd 381 if (!orig_node)
e1a5382f 382 goto out;
c6c8fea2 383
44524fcd 384 /* create a copy of the skb, if needed, to modify it. */
0d125074 385 if (skb_cow(skb, ETH_HLEN) < 0)
44524fcd 386 goto out;
c6c8fea2 387
da6b8c20 388 icmph = (struct batadv_icmp_header *)skb->data;
c6c8fea2 389
44524fcd 390 /* decrement ttl */
a40d9b07 391 icmph->ttl--;
44524fcd
ML
392
393 /* route it */
e91ecfc6 394 if (batadv_send_skb_to_orig(skb, orig_node, recv_if) != NET_XMIT_DROP)
bb351ba0 395 ret = NET_RX_SUCCESS;
c6c8fea2 396
44524fcd 397out:
44524fcd 398 if (orig_node)
7d211efc 399 batadv_orig_node_free_ref(orig_node);
c6c8fea2
SE
400 return ret;
401}
402
f86ce0ad
MH
403/**
404 * batadv_check_unicast_packet - Check for malformed unicast packets
6e0895c2 405 * @bat_priv: the bat priv with all the soft interface information
f86ce0ad
MH
406 * @skb: packet to check
407 * @hdr_size: size of header to pull
408 *
62fe710f
SE
409 * Check for short header and bad addresses in given packet.
410 *
411 * Return: negative value when check fails and 0 otherwise. The negative value
412 * depends on the reason: -ENODATA for bad header, -EBADR for broadcast
413 * destination or source, and -EREMOTE for non-local (other host) destination.
f86ce0ad 414 */
fe8a93b9
AQ
415static int batadv_check_unicast_packet(struct batadv_priv *bat_priv,
416 struct sk_buff *skb, int hdr_size)
ff51fd70
MH
417{
418 struct ethhdr *ethhdr;
419
420 /* drop packet if it has not necessary minimum size */
421 if (unlikely(!pskb_may_pull(skb, hdr_size)))
f86ce0ad 422 return -ENODATA;
ff51fd70 423
7ed4be95 424 ethhdr = eth_hdr(skb);
ff51fd70
MH
425
426 /* packet with unicast indication but broadcast recipient */
427 if (is_broadcast_ether_addr(ethhdr->h_dest))
f86ce0ad 428 return -EBADR;
ff51fd70
MH
429
430 /* packet with broadcast sender address */
431 if (is_broadcast_ether_addr(ethhdr->h_source))
f86ce0ad 432 return -EBADR;
ff51fd70
MH
433
434 /* not for me */
fe8a93b9 435 if (!batadv_is_my_mac(bat_priv, ethhdr->h_dest))
f86ce0ad 436 return -EREMOTE;
ff51fd70
MH
437
438 return 0;
439}
440
f6c8b711
SW
441/**
442 * batadv_find_router - find a suitable router for this originator
443 * @bat_priv: the bat priv with all the soft interface information
444 * @orig_node: the destination node
445 * @recv_if: pointer to interface this packet was received on
446 *
62fe710f 447 * Return: the router which should be used for this orig_node on
f6c8b711 448 * this interface, or NULL if not available.
9cfc7bd6 449 */
56303d34
SE
450struct batadv_neigh_node *
451batadv_find_router(struct batadv_priv *bat_priv,
452 struct batadv_orig_node *orig_node,
f3b3d901 453 struct batadv_hard_iface *recv_if)
c6c8fea2 454{
f3b3d901
SW
455 struct batadv_algo_ops *bao = bat_priv->bat_algo_ops;
456 struct batadv_neigh_node *first_candidate_router = NULL;
457 struct batadv_neigh_node *next_candidate_router = NULL;
458 struct batadv_neigh_node *router, *cand_router = NULL;
459 struct batadv_neigh_node *last_cand_router = NULL;
460 struct batadv_orig_ifinfo *cand, *first_candidate = NULL;
461 struct batadv_orig_ifinfo *next_candidate = NULL;
462 struct batadv_orig_ifinfo *last_candidate;
463 bool last_candidate_found = false;
c6c8fea2
SE
464
465 if (!orig_node)
466 return NULL;
467
7351a482 468 router = batadv_orig_router_get(orig_node, recv_if);
c6c8fea2 469
329887ad
SW
470 if (!router)
471 return router;
472
f3b3d901
SW
473 /* only consider bonding for recv_if == BATADV_IF_DEFAULT (first hop)
474 * and if activated.
475 */
329887ad 476 if (!(recv_if == BATADV_IF_DEFAULT && atomic_read(&bat_priv->bonding)))
f3b3d901
SW
477 return router;
478
479 /* bonding: loop through the list of possible routers found
480 * for the various outgoing interfaces and find a candidate after
481 * the last chosen bonding candidate (next_candidate). If no such
482 * router is found, use the first candidate found (the previously
483 * chosen bonding candidate might have been the last one in the list).
3f68785e 484 * If this can't be found either, return the previously chosen
f3b3d901
SW
485 * router - obviously there are no other candidates.
486 */
487 rcu_read_lock();
488 last_candidate = orig_node->last_bonding_candidate;
489 if (last_candidate)
490 last_cand_router = rcu_dereference(last_candidate->router);
491
492 hlist_for_each_entry_rcu(cand, &orig_node->ifinfo_list, list) {
493 /* acquire some structures and references ... */
494 if (!atomic_inc_not_zero(&cand->refcount))
495 continue;
496
497 cand_router = rcu_dereference(cand->router);
498 if (!cand_router)
499 goto next;
500
501 if (!atomic_inc_not_zero(&cand_router->refcount)) {
502 cand_router = NULL;
503 goto next;
504 }
505
506 /* alternative candidate should be good enough to be
507 * considered
508 */
18165f6f
SW
509 if (!bao->bat_neigh_is_similar_or_better(cand_router,
510 cand->if_outgoing,
511 router, recv_if))
f3b3d901
SW
512 goto next;
513
514 /* don't use the same router twice */
515 if (last_cand_router == cand_router)
516 goto next;
517
518 /* mark the first possible candidate */
519 if (!first_candidate) {
520 atomic_inc(&cand_router->refcount);
521 atomic_inc(&cand->refcount);
522 first_candidate = cand;
523 first_candidate_router = cand_router;
524 }
525
526 /* check if the loop has already passed the previously selected
527 * candidate ... this function should select the next candidate
528 * AFTER the previously used bonding candidate.
529 */
530 if (!last_candidate || last_candidate_found) {
531 next_candidate = cand;
532 next_candidate_router = cand_router;
533 break;
534 }
535
536 if (last_candidate == cand)
537 last_candidate_found = true;
538next:
539 /* free references */
540 if (cand_router) {
541 batadv_neigh_node_free_ref(cand_router);
542 cand_router = NULL;
543 }
544 batadv_orig_ifinfo_free_ref(cand);
545 }
546 rcu_read_unlock();
547
548 /* last_bonding_candidate is reset below, remove the old reference. */
549 if (orig_node->last_bonding_candidate)
550 batadv_orig_ifinfo_free_ref(orig_node->last_bonding_candidate);
551
552 /* After finding candidates, handle the three cases:
553 * 1) there is a next candidate, use that
554 * 2) there is no next candidate, use the first of the list
555 * 3) there is no candidate at all, return the default router
556 */
557 if (next_candidate) {
558 batadv_neigh_node_free_ref(router);
559
560 /* remove references to first candidate, we don't need it. */
561 if (first_candidate) {
562 batadv_neigh_node_free_ref(first_candidate_router);
563 batadv_orig_ifinfo_free_ref(first_candidate);
564 }
565 router = next_candidate_router;
566 orig_node->last_bonding_candidate = next_candidate;
567 } else if (first_candidate) {
568 batadv_neigh_node_free_ref(router);
569
570 /* refcounting has already been done in the loop above. */
571 router = first_candidate_router;
572 orig_node->last_bonding_candidate = first_candidate;
573 } else {
574 orig_node->last_bonding_candidate = NULL;
575 }
f6c8b711 576
c6c8fea2
SE
577 return router;
578}
579
63b01037 580static int batadv_route_unicast_packet(struct sk_buff *skb,
56303d34 581 struct batadv_hard_iface *recv_if)
c6c8fea2 582{
56303d34
SE
583 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
584 struct batadv_orig_node *orig_node = NULL;
96412690 585 struct batadv_unicast_packet *unicast_packet;
7ed4be95 586 struct ethhdr *ethhdr = eth_hdr(skb);
c54f38c9 587 int res, hdr_len, ret = NET_RX_DROP;
c6c8fea2 588
96412690 589 unicast_packet = (struct batadv_unicast_packet *)skb->data;
c6c8fea2
SE
590
591 /* TTL exceeded */
a40d9b07 592 if (unicast_packet->ttl < 2) {
86ceb360
SE
593 pr_debug("Warning - can't forward unicast packet from %pM to %pM: ttl exceeded\n",
594 ethhdr->h_source, unicast_packet->dest);
44524fcd 595 goto out;
c6c8fea2
SE
596 }
597
598 /* get routing information */
da641193 599 orig_node = batadv_orig_hash_find(bat_priv, unicast_packet->dest);
7aadf889 600
44524fcd 601 if (!orig_node)
b5a6f69c 602 goto out;
c6c8fea2 603
c6c8fea2 604 /* create a copy of the skb, if needed, to modify it. */
0d125074 605 if (skb_cow(skb, ETH_HLEN) < 0)
44524fcd 606 goto out;
c6c8fea2 607
c6c8fea2 608 /* decrement ttl */
f097e25d 609 unicast_packet = (struct batadv_unicast_packet *)skb->data;
a40d9b07 610 unicast_packet->ttl--;
c6c8fea2 611
a40d9b07 612 switch (unicast_packet->packet_type) {
c54f38c9
SW
613 case BATADV_UNICAST_4ADDR:
614 hdr_len = sizeof(struct batadv_unicast_4addr_packet);
615 break;
616 case BATADV_UNICAST:
617 hdr_len = sizeof(struct batadv_unicast_packet);
618 break;
619 default:
620 /* other packet types not supported - yet */
621 hdr_len = -1;
622 break;
623 }
624
625 if (hdr_len > 0)
626 batadv_skb_set_priority(skb, hdr_len);
627
e91ecfc6 628 res = batadv_send_skb_to_orig(skb, orig_node, recv_if);
95332477 629
e91ecfc6
MH
630 /* translate transmit result into receive result */
631 if (res == NET_XMIT_SUCCESS) {
632 /* skb was transmitted and consumed */
95332477
MH
633 batadv_inc_counter(bat_priv, BATADV_CNT_FORWARD);
634 batadv_add_counter(bat_priv, BATADV_CNT_FORWARD_BYTES,
635 skb->len + ETH_HLEN);
e91ecfc6
MH
636
637 ret = NET_RX_SUCCESS;
638 } else if (res == NET_XMIT_POLICED) {
639 /* skb was buffered and consumed */
640 ret = NET_RX_SUCCESS;
95332477 641 }
c6c8fea2 642
44524fcd 643out:
44524fcd 644 if (orig_node)
7d211efc 645 batadv_orig_node_free_ref(orig_node);
44524fcd 646 return ret;
c6c8fea2
SE
647}
648
7c1fd91d
AQ
649/**
650 * batadv_reroute_unicast_packet - update the unicast header for re-routing
651 * @bat_priv: the bat priv with all the soft interface information
652 * @unicast_packet: the unicast header to be updated
653 * @dst_addr: the payload destination
c018ad3d 654 * @vid: VLAN identifier
7c1fd91d
AQ
655 *
656 * Search the translation table for dst_addr and update the unicast header with
657 * the new corresponding information (originator address where the destination
658 * client currently is and its known TTVN)
659 *
62fe710f 660 * Return: true if the packet header has been updated, false otherwise
7c1fd91d
AQ
661 */
662static bool
663batadv_reroute_unicast_packet(struct batadv_priv *bat_priv,
664 struct batadv_unicast_packet *unicast_packet,
6b5e971a 665 u8 *dst_addr, unsigned short vid)
7c1fd91d
AQ
666{
667 struct batadv_orig_node *orig_node = NULL;
668 struct batadv_hard_iface *primary_if = NULL;
669 bool ret = false;
6b5e971a 670 u8 *orig_addr, orig_ttvn;
7c1fd91d 671
c018ad3d 672 if (batadv_is_my_client(bat_priv, dst_addr, vid)) {
7c1fd91d
AQ
673 primary_if = batadv_primary_if_get_selected(bat_priv);
674 if (!primary_if)
675 goto out;
676 orig_addr = primary_if->net_dev->dev_addr;
6b5e971a 677 orig_ttvn = (u8)atomic_read(&bat_priv->tt.vn);
7c1fd91d 678 } else {
c018ad3d
AQ
679 orig_node = batadv_transtable_search(bat_priv, NULL, dst_addr,
680 vid);
7c1fd91d
AQ
681 if (!orig_node)
682 goto out;
683
684 if (batadv_compare_eth(orig_node->orig, unicast_packet->dest))
685 goto out;
686
687 orig_addr = orig_node->orig;
6b5e971a 688 orig_ttvn = (u8)atomic_read(&orig_node->last_ttvn);
7c1fd91d
AQ
689 }
690
691 /* update the packet header */
8fdd0153 692 ether_addr_copy(unicast_packet->dest, orig_addr);
7c1fd91d
AQ
693 unicast_packet->ttvn = orig_ttvn;
694
695 ret = true;
696out:
697 if (primary_if)
698 batadv_hardif_free_ref(primary_if);
699 if (orig_node)
700 batadv_orig_node_free_ref(orig_node);
701
702 return ret;
703}
704
56303d34 705static int batadv_check_unicast_ttvn(struct batadv_priv *bat_priv,
dd981ab0 706 struct sk_buff *skb, int hdr_len) {
c018ad3d
AQ
707 struct batadv_unicast_packet *unicast_packet;
708 struct batadv_hard_iface *primary_if;
56303d34 709 struct batadv_orig_node *orig_node;
6b5e971a 710 u8 curr_ttvn, old_ttvn;
a73105b8 711 struct ethhdr *ethhdr;
c018ad3d 712 unsigned short vid;
3e34819e 713 int is_old_ttvn;
a73105b8 714
b8fcfa42 715 /* check if there is enough data before accessing it */
f1791425 716 if (!pskb_may_pull(skb, hdr_len + ETH_HLEN))
b8fcfa42
AQ
717 return 0;
718
719 /* create a copy of the skb (in case of for re-routing) to modify it. */
720 if (skb_cow(skb, sizeof(*unicast_packet)) < 0)
a73105b8
AQ
721 return 0;
722
96412690 723 unicast_packet = (struct batadv_unicast_packet *)skb->data;
c018ad3d 724 vid = batadv_get_vid(skb, hdr_len);
dd981ab0 725 ethhdr = (struct ethhdr *)(skb->data + hdr_len);
a73105b8 726
7c1fd91d
AQ
727 /* check if the destination client was served by this node and it is now
728 * roaming. In this case, it means that the node has got a ROAM_ADV
729 * message and that it knows the new destination in the mesh to re-route
730 * the packet to
731 */
c018ad3d 732 if (batadv_tt_local_client_is_roaming(bat_priv, ethhdr->h_dest, vid)) {
7c1fd91d 733 if (batadv_reroute_unicast_packet(bat_priv, unicast_packet,
c018ad3d 734 ethhdr->h_dest, vid))
23c4ec10
AG
735 batadv_dbg_ratelimited(BATADV_DBG_TT,
736 bat_priv,
737 "Rerouting unicast packet to %pM (dst=%pM): Local Roaming\n",
738 unicast_packet->dest,
739 ethhdr->h_dest);
7c1fd91d
AQ
740 /* at this point the mesh destination should have been
741 * substituted with the originator address found in the global
742 * table. If not, let the packet go untouched anyway because
743 * there is nothing the node can do
744 */
745 return 1;
746 }
747
748 /* retrieve the TTVN known by this node for the packet destination. This
749 * value is used later to check if the node which sent (or re-routed
750 * last time) the packet had an updated information or not
751 */
6b5e971a 752 curr_ttvn = (u8)atomic_read(&bat_priv->tt.vn);
fe8a93b9 753 if (!batadv_is_my_mac(bat_priv, unicast_packet->dest)) {
da641193
SE
754 orig_node = batadv_orig_hash_find(bat_priv,
755 unicast_packet->dest);
7c1fd91d
AQ
756 /* if it is not possible to find the orig_node representing the
757 * destination, the packet can immediately be dropped as it will
758 * not be possible to deliver it
759 */
a73105b8
AQ
760 if (!orig_node)
761 return 0;
762
6b5e971a 763 curr_ttvn = (u8)atomic_read(&orig_node->last_ttvn);
7d211efc 764 batadv_orig_node_free_ref(orig_node);
a73105b8
AQ
765 }
766
7c1fd91d
AQ
767 /* check if the TTVN contained in the packet is fresher than what the
768 * node knows
769 */
3e34819e 770 is_old_ttvn = batadv_seq_before(unicast_packet->ttvn, curr_ttvn);
7c1fd91d
AQ
771 if (!is_old_ttvn)
772 return 1;
a73105b8 773
7c1fd91d
AQ
774 old_ttvn = unicast_packet->ttvn;
775 /* the packet was forged based on outdated network information. Its
776 * destination can possibly be updated and forwarded towards the new
777 * target host
778 */
779 if (batadv_reroute_unicast_packet(bat_priv, unicast_packet,
c018ad3d 780 ethhdr->h_dest, vid)) {
23c4ec10
AG
781 batadv_dbg_ratelimited(BATADV_DBG_TT, bat_priv,
782 "Rerouting unicast packet to %pM (dst=%pM): TTVN mismatch old_ttvn=%u new_ttvn=%u\n",
783 unicast_packet->dest, ethhdr->h_dest,
784 old_ttvn, curr_ttvn);
7c1fd91d
AQ
785 return 1;
786 }
3275e7cc 787
7c1fd91d
AQ
788 /* the packet has not been re-routed: either the destination is
789 * currently served by this node or there is no destination at all and
790 * it is possible to drop the packet
791 */
c018ad3d 792 if (!batadv_is_my_client(bat_priv, ethhdr->h_dest, vid))
7c1fd91d 793 return 0;
3275e7cc 794
7c1fd91d
AQ
795 /* update the header in order to let the packet be delivered to this
796 * node's soft interface
797 */
798 primary_if = batadv_primary_if_get_selected(bat_priv);
799 if (!primary_if)
800 return 0;
a73105b8 801
8fdd0153 802 ether_addr_copy(unicast_packet->dest, primary_if->net_dev->dev_addr);
7c1fd91d
AQ
803
804 batadv_hardif_free_ref(primary_if);
805
806 unicast_packet->ttvn = curr_ttvn;
a73105b8 807
a73105b8
AQ
808 return 1;
809}
810
a1f1ac5c
SW
811/**
812 * batadv_recv_unhandled_unicast_packet - receive and process packets which
813 * are in the unicast number space but not yet known to the implementation
814 * @skb: unicast tvlv packet to process
815 * @recv_if: pointer to interface this packet was received on
816 *
62fe710f 817 * Return: NET_RX_SUCCESS if the packet has been consumed or NET_RX_DROP
a1f1ac5c
SW
818 * otherwise.
819 */
820int batadv_recv_unhandled_unicast_packet(struct sk_buff *skb,
821 struct batadv_hard_iface *recv_if)
822{
823 struct batadv_unicast_packet *unicast_packet;
824 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
825 int check, hdr_size = sizeof(*unicast_packet);
826
827 check = batadv_check_unicast_packet(bat_priv, skb, hdr_size);
828 if (check < 0)
829 return NET_RX_DROP;
830
831 /* we don't know about this type, drop it. */
832 unicast_packet = (struct batadv_unicast_packet *)skb->data;
833 if (batadv_is_my_mac(bat_priv, unicast_packet->dest))
834 return NET_RX_DROP;
835
836 return batadv_route_unicast_packet(skb, recv_if);
837}
838
56303d34
SE
839int batadv_recv_unicast_packet(struct sk_buff *skb,
840 struct batadv_hard_iface *recv_if)
c6c8fea2 841{
56303d34 842 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
96412690 843 struct batadv_unicast_packet *unicast_packet;
4046b24a 844 struct batadv_unicast_4addr_packet *unicast_4addr_packet;
6b5e971a 845 u8 *orig_addr;
9affec6b 846 struct batadv_orig_node *orig_node = NULL;
612d2b4f 847 int check, hdr_size = sizeof(*unicast_packet);
437bb0e6 848 enum batadv_subtype subtype;
c384ea3e 849 bool is4addr;
c6c8fea2 850
7cdcf6dd 851 unicast_packet = (struct batadv_unicast_packet *)skb->data;
4046b24a 852 unicast_4addr_packet = (struct batadv_unicast_4addr_packet *)skb->data;
7cdcf6dd 853
a40d9b07 854 is4addr = unicast_packet->packet_type == BATADV_UNICAST_4ADDR;
7cdcf6dd 855 /* the caller function should have already pulled 2 bytes */
c384ea3e 856 if (is4addr)
4046b24a 857 hdr_size = sizeof(*unicast_4addr_packet);
7cdcf6dd 858
612d2b4f 859 /* function returns -EREMOTE for promiscuous packets */
6e0895c2 860 check = batadv_check_unicast_packet(bat_priv, skb, hdr_size);
612d2b4f
MH
861
862 /* Even though the packet is not for us, we might save it to use for
863 * decoding a later received coded packet
864 */
865 if (check == -EREMOTE)
866 batadv_nc_skb_store_sniffed_unicast(bat_priv, skb);
867
868 if (check < 0)
c6c8fea2 869 return NET_RX_DROP;
dd981ab0 870 if (!batadv_check_unicast_ttvn(bat_priv, skb, hdr_size))
a73105b8
AQ
871 return NET_RX_DROP;
872
c6c8fea2 873 /* packet for me */
fe8a93b9 874 if (batadv_is_my_mac(bat_priv, unicast_packet->dest)) {
9affec6b 875 if (is4addr) {
437bb0e6
SW
876 subtype = unicast_4addr_packet->subtype;
877 batadv_dat_inc_counter(bat_priv, subtype);
878
879 /* Only payload data should be considered for speedy
880 * join. For example, DAT also uses unicast 4addr
881 * types, but those packets should not be considered
882 * for speedy join, since the clients do not actually
883 * reside at the sending originator.
884 */
885 if (subtype == BATADV_P_DATA) {
886 orig_addr = unicast_4addr_packet->src;
887 orig_node = batadv_orig_hash_find(bat_priv,
888 orig_addr);
889 }
9affec6b 890 }
4046b24a 891
c384ea3e
AQ
892 if (batadv_dat_snoop_incoming_arp_request(bat_priv, skb,
893 hdr_size))
894 goto rx_success;
895 if (batadv_dat_snoop_incoming_arp_reply(bat_priv, skb,
896 hdr_size))
897 goto rx_success;
898
37135173 899 batadv_interface_rx(recv_if->soft_iface, skb, recv_if, hdr_size,
9affec6b 900 orig_node);
37135173 901
c384ea3e 902rx_success:
9affec6b
AQ
903 if (orig_node)
904 batadv_orig_node_free_ref(orig_node);
905
c6c8fea2
SE
906 return NET_RX_SUCCESS;
907 }
908
63b01037 909 return batadv_route_unicast_packet(skb, recv_if);
c6c8fea2
SE
910}
911
ef261577
ML
912/**
913 * batadv_recv_unicast_tvlv - receive and process unicast tvlv packets
914 * @skb: unicast tvlv packet to process
915 * @recv_if: pointer to interface this packet was received on
ef261577 916 *
62fe710f 917 * Return: NET_RX_SUCCESS if the packet has been consumed or NET_RX_DROP
ef261577
ML
918 * otherwise.
919 */
920int batadv_recv_unicast_tvlv(struct sk_buff *skb,
921 struct batadv_hard_iface *recv_if)
922{
923 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
924 struct batadv_unicast_tvlv_packet *unicast_tvlv_packet;
925 unsigned char *tvlv_buff;
6b5e971a 926 u16 tvlv_buff_len;
ef261577
ML
927 int hdr_size = sizeof(*unicast_tvlv_packet);
928 int ret = NET_RX_DROP;
929
930 if (batadv_check_unicast_packet(bat_priv, skb, hdr_size) < 0)
931 return NET_RX_DROP;
932
933 /* the header is likely to be modified while forwarding */
934 if (skb_cow(skb, hdr_size) < 0)
935 return NET_RX_DROP;
936
937 /* packet needs to be linearized to access the tvlv content */
938 if (skb_linearize(skb) < 0)
939 return NET_RX_DROP;
940
941 unicast_tvlv_packet = (struct batadv_unicast_tvlv_packet *)skb->data;
942
943 tvlv_buff = (unsigned char *)(skb->data + hdr_size);
944 tvlv_buff_len = ntohs(unicast_tvlv_packet->tvlv_len);
945
946 if (tvlv_buff_len > skb->len - hdr_size)
947 return NET_RX_DROP;
948
949 ret = batadv_tvlv_containers_process(bat_priv, false, NULL,
950 unicast_tvlv_packet->src,
951 unicast_tvlv_packet->dst,
952 tvlv_buff, tvlv_buff_len);
953
954 if (ret != NET_RX_SUCCESS)
955 ret = batadv_route_unicast_packet(skb, recv_if);
05c3c8a6
AQ
956 else
957 consume_skb(skb);
ef261577
ML
958
959 return ret;
960}
c6c8fea2 961
610bfc6b
MH
962/**
963 * batadv_recv_frag_packet - process received fragment
964 * @skb: the received fragment
965 * @recv_if: interface that the skb is received on
966 *
967 * This function does one of the three following things: 1) Forward fragment, if
968 * the assembled packet will exceed our MTU; 2) Buffer fragment, if we till
969 * lack further fragments; 3) Merge fragments, if we have all needed parts.
970 *
62fe710f 971 * Return: NET_RX_DROP if the skb is not consumed, NET_RX_SUCCESS otherwise.
610bfc6b
MH
972 */
973int batadv_recv_frag_packet(struct sk_buff *skb,
974 struct batadv_hard_iface *recv_if)
975{
976 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
977 struct batadv_orig_node *orig_node_src = NULL;
978 struct batadv_frag_packet *frag_packet;
979 int ret = NET_RX_DROP;
980
981 if (batadv_check_unicast_packet(bat_priv, skb,
982 sizeof(*frag_packet)) < 0)
983 goto out;
984
985 frag_packet = (struct batadv_frag_packet *)skb->data;
986 orig_node_src = batadv_orig_hash_find(bat_priv, frag_packet->orig);
987 if (!orig_node_src)
988 goto out;
989
990 /* Route the fragment if it is not for us and too big to be merged. */
991 if (!batadv_is_my_mac(bat_priv, frag_packet->dest) &&
992 batadv_frag_skb_fwd(skb, recv_if, orig_node_src)) {
993 ret = NET_RX_SUCCESS;
994 goto out;
995 }
996
997 batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_RX);
998 batadv_add_counter(bat_priv, BATADV_CNT_FRAG_RX_BYTES, skb->len);
999
1000 /* Add fragment to buffer and merge if possible. */
1001 if (!batadv_frag_skb_buffer(&skb, orig_node_src))
1002 goto out;
1003
1004 /* Deliver merged packet to the appropriate handler, if it was
1005 * merged
1006 */
1007 if (skb)
1008 batadv_batman_skb_recv(skb, recv_if->net_dev,
1009 &recv_if->batman_adv_ptype, NULL);
1010
1011 ret = NET_RX_SUCCESS;
1012
1013out:
1014 if (orig_node_src)
1015 batadv_orig_node_free_ref(orig_node_src);
1016
1017 return ret;
1018}
1019
56303d34
SE
1020int batadv_recv_bcast_packet(struct sk_buff *skb,
1021 struct batadv_hard_iface *recv_if)
c6c8fea2 1022{
56303d34
SE
1023 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
1024 struct batadv_orig_node *orig_node = NULL;
96412690 1025 struct batadv_bcast_packet *bcast_packet;
c6c8fea2 1026 struct ethhdr *ethhdr;
704509b8 1027 int hdr_size = sizeof(*bcast_packet);
f3e0008f 1028 int ret = NET_RX_DROP;
6b5e971a
SE
1029 s32 seq_diff;
1030 u32 seqno;
c6c8fea2
SE
1031
1032 /* drop packet if it has not necessary minimum size */
1033 if (unlikely(!pskb_may_pull(skb, hdr_size)))
f3e0008f 1034 goto out;
c6c8fea2 1035
7ed4be95 1036 ethhdr = eth_hdr(skb);
c6c8fea2
SE
1037
1038 /* packet with broadcast indication but unicast recipient */
1039 if (!is_broadcast_ether_addr(ethhdr->h_dest))
f3e0008f 1040 goto out;
c6c8fea2
SE
1041
1042 /* packet with broadcast sender address */
1043 if (is_broadcast_ether_addr(ethhdr->h_source))
f3e0008f 1044 goto out;
c6c8fea2
SE
1045
1046 /* ignore broadcasts sent by myself */
fe8a93b9 1047 if (batadv_is_my_mac(bat_priv, ethhdr->h_source))
f3e0008f 1048 goto out;
c6c8fea2 1049
96412690 1050 bcast_packet = (struct batadv_bcast_packet *)skb->data;
c6c8fea2
SE
1051
1052 /* ignore broadcasts originated by myself */
fe8a93b9 1053 if (batadv_is_my_mac(bat_priv, bcast_packet->orig))
f3e0008f 1054 goto out;
c6c8fea2 1055
a40d9b07 1056 if (bcast_packet->ttl < 2)
f3e0008f 1057 goto out;
c6c8fea2 1058
da641193 1059 orig_node = batadv_orig_hash_find(bat_priv, bcast_packet->orig);
f3e0008f
ML
1060
1061 if (!orig_node)
b5a6f69c 1062 goto out;
c6c8fea2 1063
f3e0008f 1064 spin_lock_bh(&orig_node->bcast_seqno_lock);
c6c8fea2 1065
3fba7325 1066 seqno = ntohl(bcast_packet->seqno);
c6c8fea2 1067 /* check whether the packet is a duplicate */
9b4a1159 1068 if (batadv_test_bit(orig_node->bcast_bits, orig_node->last_bcast_seqno,
3fba7325 1069 seqno))
f3e0008f 1070 goto spin_unlock;
c6c8fea2 1071
3fba7325 1072 seq_diff = seqno - orig_node->last_bcast_seqno;
c6c8fea2
SE
1073
1074 /* check whether the packet is old and the host just restarted. */
30d3c511
SE
1075 if (batadv_window_protected(bat_priv, seq_diff,
1076 &orig_node->bcast_seqno_reset))
f3e0008f 1077 goto spin_unlock;
c6c8fea2
SE
1078
1079 /* mark broadcast in flood history, update window position
9cfc7bd6
SE
1080 * if required.
1081 */
0f5f9322 1082 if (batadv_bit_get_packet(bat_priv, orig_node->bcast_bits, seq_diff, 1))
3fba7325 1083 orig_node->last_bcast_seqno = seqno;
c6c8fea2 1084
f3e0008f 1085 spin_unlock_bh(&orig_node->bcast_seqno_lock);
f3e0008f 1086
fe2da6ff 1087 /* check whether this has been sent by another originator before */
004e86fc 1088 if (batadv_bla_check_bcast_duplist(bat_priv, skb))
fe2da6ff
SW
1089 goto out;
1090
c54f38c9
SW
1091 batadv_skb_set_priority(skb, sizeof(struct batadv_bcast_packet));
1092
c6c8fea2 1093 /* rebroadcast packet */
9455e34c 1094 batadv_add_bcast_packet_to_list(bat_priv, skb, 1);
c6c8fea2 1095
23721387
SW
1096 /* don't hand the broadcast up if it is from an originator
1097 * from the same backbone.
1098 */
08adf151 1099 if (batadv_bla_is_backbone_gw(skb, orig_node, hdr_size))
23721387
SW
1100 goto out;
1101
c384ea3e
AQ
1102 if (batadv_dat_snoop_incoming_arp_request(bat_priv, skb, hdr_size))
1103 goto rx_success;
1104 if (batadv_dat_snoop_incoming_arp_reply(bat_priv, skb, hdr_size))
1105 goto rx_success;
1106
c6c8fea2 1107 /* broadcast for me */
37135173
AQ
1108 batadv_interface_rx(recv_if->soft_iface, skb, recv_if, hdr_size,
1109 orig_node);
c384ea3e
AQ
1110
1111rx_success:
f3e0008f
ML
1112 ret = NET_RX_SUCCESS;
1113 goto out;
c6c8fea2 1114
f3e0008f
ML
1115spin_unlock:
1116 spin_unlock_bh(&orig_node->bcast_seqno_lock);
f3e0008f
ML
1117out:
1118 if (orig_node)
7d211efc 1119 batadv_orig_node_free_ref(orig_node);
f3e0008f 1120 return ret;
c6c8fea2 1121}
This page took 0.589895 seconds and 5 git commands to generate.