]>
Commit | Line | Data |
---|---|---|
7db7d9f3 | 1 | // SPDX-License-Identifier: GPL-2.0 |
7a79d717 | 2 | /* Copyright (C) 2007-2019 B.A.T.M.A.N. contributors: |
c6c8fea2 SE |
3 | * |
4 | * Marek Lindner, Simon Wunderlich | |
c6c8fea2 SE |
5 | */ |
6 | ||
1e2c2a4f | 7 | #include "send.h" |
c6c8fea2 | 8 | #include "main.h" |
1e2c2a4f SE |
9 | |
10 | #include <linux/atomic.h> | |
9b4aec64 | 11 | #include <linux/bug.h> |
1e2c2a4f | 12 | #include <linux/byteorder/generic.h> |
f50ca95a | 13 | #include <linux/errno.h> |
1e2c2a4f | 14 | #include <linux/etherdevice.h> |
b92b94ac | 15 | #include <linux/gfp.h> |
1e2c2a4f | 16 | #include <linux/if.h> |
fcafa5e7 | 17 | #include <linux/if_ether.h> |
1e2c2a4f SE |
18 | #include <linux/jiffies.h> |
19 | #include <linux/kernel.h> | |
27353446 | 20 | #include <linux/kref.h> |
1e2c2a4f SE |
21 | #include <linux/list.h> |
22 | #include <linux/netdevice.h> | |
23 | #include <linux/printk.h> | |
24 | #include <linux/rculist.h> | |
25 | #include <linux/rcupdate.h> | |
26 | #include <linux/skbuff.h> | |
27 | #include <linux/slab.h> | |
28 | #include <linux/spinlock.h> | |
29 | #include <linux/stddef.h> | |
30 | #include <linux/workqueue.h> | |
31 | ||
c384ea3e | 32 | #include "distributed-arp-table.h" |
1e2c2a4f | 33 | #include "fragmentation.h" |
f097e25d | 34 | #include "gateway_client.h" |
1e2c2a4f | 35 | #include "hard-interface.h" |
ba412080 | 36 | #include "log.h" |
612d2b4f | 37 | #include "network-coding.h" |
1e2c2a4f SE |
38 | #include "originator.h" |
39 | #include "routing.h" | |
40 | #include "soft-interface.h" | |
41 | #include "translation-table.h" | |
af5d4f77 | 42 | |
bb079c82 | 43 | static void batadv_send_outstanding_bcast_packet(struct work_struct *work); |
c6c8fea2 | 44 | |
95d39278 | 45 | /** |
7e9a8c2c | 46 | * batadv_send_skb_packet() - send an already prepared packet |
95d39278 AQ |
47 | * @skb: the packet to send |
48 | * @hard_iface: the interface to use to send the broadcast packet | |
49 | * @dst_addr: the payload destination | |
50 | * | |
51 | * Send out an already prepared packet to the given neighbor or broadcast it | |
52 | * using the specified interface. Either hard_iface or neigh_node must be not | |
53 | * NULL. | |
54 | * If neigh_node is NULL, then the packet is broadcasted using hard_iface, | |
55 | * otherwise it is sent as unicast to the given neighbor. | |
56 | * | |
7d72d174 SE |
57 | * Regardless of the return value, the skb is consumed. |
58 | * | |
59 | * Return: A negative errno code is returned on a failure. A success does not | |
60 | * guarantee the frame will be transmitted as it may be dropped due | |
61 | * to congestion or traffic shaping. | |
9cfc7bd6 | 62 | */ |
56303d34 SE |
63 | int batadv_send_skb_packet(struct sk_buff *skb, |
64 | struct batadv_hard_iface *hard_iface, | |
6b5e971a | 65 | const u8 *dst_addr) |
c6c8fea2 | 66 | { |
95d39278 | 67 | struct batadv_priv *bat_priv; |
c6c8fea2 | 68 | struct ethhdr *ethhdr; |
7c946062 | 69 | int ret; |
c6c8fea2 | 70 | |
95d39278 AQ |
71 | bat_priv = netdev_priv(hard_iface->soft_iface); |
72 | ||
e9a4f295 | 73 | if (hard_iface->if_status != BATADV_IF_ACTIVE) |
c6c8fea2 SE |
74 | goto send_skb_err; |
75 | ||
e6c10f43 | 76 | if (unlikely(!hard_iface->net_dev)) |
c6c8fea2 SE |
77 | goto send_skb_err; |
78 | ||
e6c10f43 | 79 | if (!(hard_iface->net_dev->flags & IFF_UP)) { |
67969581 SE |
80 | pr_warn("Interface %s is not up - can't send packet via that interface!\n", |
81 | hard_iface->net_dev->name); | |
c6c8fea2 SE |
82 | goto send_skb_err; |
83 | } | |
84 | ||
85 | /* push to the ethernet header. */ | |
04b482a2 | 86 | if (batadv_skb_head_push(skb, ETH_HLEN) < 0) |
c6c8fea2 SE |
87 | goto send_skb_err; |
88 | ||
89 | skb_reset_mac_header(skb); | |
90 | ||
7ed4be95 | 91 | ethhdr = eth_hdr(skb); |
8fdd0153 AQ |
92 | ether_addr_copy(ethhdr->h_source, hard_iface->net_dev->dev_addr); |
93 | ether_addr_copy(ethhdr->h_dest, dst_addr); | |
293e9338 | 94 | ethhdr->h_proto = htons(ETH_P_BATMAN); |
c6c8fea2 SE |
95 | |
96 | skb_set_network_header(skb, ETH_HLEN); | |
293e9338 | 97 | skb->protocol = htons(ETH_P_BATMAN); |
c6c8fea2 | 98 | |
e6c10f43 | 99 | skb->dev = hard_iface->net_dev; |
c6c8fea2 | 100 | |
612d2b4f MH |
101 | /* Save a clone of the skb to use when decoding coded packets */ |
102 | batadv_nc_skb_store_for_decoding(bat_priv, skb); | |
103 | ||
c6c8fea2 SE |
104 | /* dev_queue_xmit() returns a negative result on error. However on |
105 | * congestion and traffic shaping, it drops and returns NET_XMIT_DROP | |
9cfc7bd6 SE |
106 | * (which is > 0). This will not be treated as an error. |
107 | */ | |
7c946062 SE |
108 | ret = dev_queue_xmit(skb); |
109 | return net_xmit_eval(ret); | |
c6c8fea2 SE |
110 | send_skb_err: |
111 | kfree_skb(skb); | |
112 | return NET_XMIT_DROP; | |
113 | } | |
114 | ||
ff15c27c SE |
115 | /** |
116 | * batadv_send_broadcast_skb() - Send broadcast packet via hard interface | |
117 | * @skb: packet to be transmitted (with batadv header and no outer eth header) | |
118 | * @hard_iface: outgoing interface | |
119 | * | |
120 | * Return: A negative errno code is returned on a failure. A success does not | |
121 | * guarantee the frame will be transmitted as it may be dropped due | |
122 | * to congestion or traffic shaping. | |
123 | */ | |
95d39278 AQ |
124 | int batadv_send_broadcast_skb(struct sk_buff *skb, |
125 | struct batadv_hard_iface *hard_iface) | |
126 | { | |
127 | return batadv_send_skb_packet(skb, hard_iface, batadv_broadcast_addr); | |
128 | } | |
129 | ||
ff15c27c SE |
130 | /** |
131 | * batadv_send_unicast_skb() - Send unicast packet to neighbor | |
132 | * @skb: packet to be transmitted (with batadv header and no outer eth header) | |
133 | * @neigh: neighbor which is used as next hop to destination | |
134 | * | |
135 | * Return: A negative errno code is returned on a failure. A success does not | |
136 | * guarantee the frame will be transmitted as it may be dropped due | |
137 | * to congestion or traffic shaping. | |
138 | */ | |
95d39278 AQ |
139 | int batadv_send_unicast_skb(struct sk_buff *skb, |
140 | struct batadv_neigh_node *neigh) | |
141 | { | |
142 | #ifdef CONFIG_BATMAN_ADV_BATMAN_V | |
143 | struct batadv_hardif_neigh_node *hardif_neigh; | |
144 | #endif | |
145 | int ret; | |
146 | ||
147 | ret = batadv_send_skb_packet(skb, neigh->if_incoming, neigh->addr); | |
148 | ||
149 | #ifdef CONFIG_BATMAN_ADV_BATMAN_V | |
150 | hardif_neigh = batadv_hardif_neigh_get(neigh->if_incoming, neigh->addr); | |
151 | ||
825ffe1f | 152 | if (hardif_neigh && ret != NET_XMIT_DROP) |
95d39278 AQ |
153 | hardif_neigh->bat_v.last_unicast_tx = jiffies; |
154 | ||
155 | if (hardif_neigh) | |
156 | batadv_hardif_neigh_put(hardif_neigh); | |
157 | #endif | |
158 | ||
159 | return ret; | |
160 | } | |
161 | ||
bb351ba0 | 162 | /** |
7e9a8c2c | 163 | * batadv_send_skb_to_orig() - Lookup next-hop and transmit skb. |
bb351ba0 MH |
164 | * @skb: Packet to be transmitted. |
165 | * @orig_node: Final destination of the packet. | |
166 | * @recv_if: Interface used when receiving the packet (can be NULL). | |
167 | * | |
168 | * Looks up the best next-hop towards the passed originator and passes the | |
169 | * skb on for preparation of MAC header. If the packet originated from this | |
170 | * host, NULL can be passed as recv_if and no interface alternating is | |
171 | * attempted. | |
172 | * | |
1ad5bcb2 SE |
173 | * Return: negative errno code on a failure, -EINPROGRESS if the skb is |
174 | * buffered for later transmit or the NET_XMIT status returned by the | |
f50ca95a | 175 | * lower routine if the packet has been passed down. |
bb351ba0 | 176 | */ |
e91ecfc6 MH |
177 | int batadv_send_skb_to_orig(struct sk_buff *skb, |
178 | struct batadv_orig_node *orig_node, | |
179 | struct batadv_hard_iface *recv_if) | |
bb351ba0 MH |
180 | { |
181 | struct batadv_priv *bat_priv = orig_node->bat_priv; | |
182 | struct batadv_neigh_node *neigh_node; | |
1ad5bcb2 | 183 | int ret; |
bb351ba0 MH |
184 | |
185 | /* batadv_find_router() increases neigh_nodes refcount if found. */ | |
186 | neigh_node = batadv_find_router(bat_priv, orig_node, recv_if); | |
1ad5bcb2 SE |
187 | if (!neigh_node) { |
188 | ret = -EINVAL; | |
189 | goto free_skb; | |
190 | } | |
ee75ed88 MH |
191 | |
192 | /* Check if the skb is too large to send in one piece and fragment | |
193 | * it if needed. | |
194 | */ | |
195 | if (atomic_read(&bat_priv->fragmentation) && | |
196 | skb->len > neigh_node->if_incoming->net_dev->mtu) { | |
197 | /* Fragment and send packet. */ | |
f50ca95a | 198 | ret = batadv_frag_send_packet(skb, orig_node, neigh_node); |
1ad5bcb2 SE |
199 | /* skb was consumed */ |
200 | skb = NULL; | |
ee75ed88 | 201 | |
1ad5bcb2 | 202 | goto put_neigh_node; |
ee75ed88 | 203 | } |
bb351ba0 | 204 | |
e91ecfc6 MH |
205 | /* try to network code the packet, if it is received on an interface |
206 | * (i.e. being forwarded). If the packet originates from this node or if | |
207 | * network coding fails, then send the packet as usual. | |
208 | */ | |
f50ca95a | 209 | if (recv_if && batadv_nc_skb_forward(skb, neigh_node)) |
99860208 | 210 | ret = -EINPROGRESS; |
f50ca95a AQ |
211 | else |
212 | ret = batadv_send_unicast_skb(skb, neigh_node); | |
bb351ba0 | 213 | |
1ad5bcb2 SE |
214 | /* skb was consumed */ |
215 | skb = NULL; | |
216 | ||
217 | put_neigh_node: | |
218 | batadv_neigh_node_put(neigh_node); | |
219 | free_skb: | |
220 | kfree_skb(skb); | |
bb351ba0 | 221 | |
e91ecfc6 | 222 | return ret; |
bb351ba0 MH |
223 | } |
224 | ||
f097e25d | 225 | /** |
7e9a8c2c | 226 | * batadv_send_skb_push_fill_unicast() - extend the buffer and initialize the |
f097e25d MH |
227 | * common fields for unicast packets |
228 | * @skb: the skb carrying the unicast header to initialize | |
229 | * @hdr_size: amount of bytes to push at the beginning of the skb | |
230 | * @orig_node: the destination node | |
231 | * | |
62fe710f | 232 | * Return: false if the buffer extension was not possible or true otherwise. |
f097e25d MH |
233 | */ |
234 | static bool | |
235 | batadv_send_skb_push_fill_unicast(struct sk_buff *skb, int hdr_size, | |
236 | struct batadv_orig_node *orig_node) | |
237 | { | |
238 | struct batadv_unicast_packet *unicast_packet; | |
6b5e971a | 239 | u8 ttvn = (u8)atomic_read(&orig_node->last_ttvn); |
f097e25d MH |
240 | |
241 | if (batadv_skb_head_push(skb, hdr_size) < 0) | |
242 | return false; | |
243 | ||
244 | unicast_packet = (struct batadv_unicast_packet *)skb->data; | |
a40d9b07 | 245 | unicast_packet->version = BATADV_COMPAT_VERSION; |
f097e25d | 246 | /* batman packet type: unicast */ |
a40d9b07 | 247 | unicast_packet->packet_type = BATADV_UNICAST; |
f097e25d | 248 | /* set unicast ttl */ |
a40d9b07 | 249 | unicast_packet->ttl = BATADV_TTL; |
f097e25d | 250 | /* copy the destination for faster routing */ |
8fdd0153 | 251 | ether_addr_copy(unicast_packet->dest, orig_node->orig); |
f097e25d MH |
252 | /* set the destination tt version number */ |
253 | unicast_packet->ttvn = ttvn; | |
254 | ||
255 | return true; | |
256 | } | |
257 | ||
258 | /** | |
7e9a8c2c | 259 | * batadv_send_skb_prepare_unicast() - encapsulate an skb with a unicast header |
f097e25d MH |
260 | * @skb: the skb containing the payload to encapsulate |
261 | * @orig_node: the destination node | |
262 | * | |
62fe710f | 263 | * Return: false if the payload could not be encapsulated or true otherwise. |
f097e25d MH |
264 | */ |
265 | static bool batadv_send_skb_prepare_unicast(struct sk_buff *skb, | |
266 | struct batadv_orig_node *orig_node) | |
267 | { | |
268 | size_t uni_size = sizeof(struct batadv_unicast_packet); | |
269 | ||
270 | return batadv_send_skb_push_fill_unicast(skb, uni_size, orig_node); | |
271 | } | |
272 | ||
273 | /** | |
7e9a8c2c | 274 | * batadv_send_skb_prepare_unicast_4addr() - encapsulate an skb with a |
f097e25d MH |
275 | * unicast 4addr header |
276 | * @bat_priv: the bat priv with all the soft interface information | |
277 | * @skb: the skb containing the payload to encapsulate | |
e51f0397 | 278 | * @orig: the destination node |
f097e25d MH |
279 | * @packet_subtype: the unicast 4addr packet subtype to use |
280 | * | |
62fe710f | 281 | * Return: false if the payload could not be encapsulated or true otherwise. |
f097e25d MH |
282 | */ |
283 | bool batadv_send_skb_prepare_unicast_4addr(struct batadv_priv *bat_priv, | |
284 | struct sk_buff *skb, | |
285 | struct batadv_orig_node *orig, | |
286 | int packet_subtype) | |
287 | { | |
288 | struct batadv_hard_iface *primary_if; | |
289 | struct batadv_unicast_4addr_packet *uc_4addr_packet; | |
290 | bool ret = false; | |
291 | ||
292 | primary_if = batadv_primary_if_get_selected(bat_priv); | |
293 | if (!primary_if) | |
294 | goto out; | |
295 | ||
296 | /* Pull the header space and fill the unicast_packet substructure. | |
297 | * We can do that because the first member of the uc_4addr_packet | |
298 | * is of type struct unicast_packet | |
299 | */ | |
300 | if (!batadv_send_skb_push_fill_unicast(skb, sizeof(*uc_4addr_packet), | |
301 | orig)) | |
302 | goto out; | |
303 | ||
304 | uc_4addr_packet = (struct batadv_unicast_4addr_packet *)skb->data; | |
a40d9b07 | 305 | uc_4addr_packet->u.packet_type = BATADV_UNICAST_4ADDR; |
8fdd0153 | 306 | ether_addr_copy(uc_4addr_packet->src, primary_if->net_dev->dev_addr); |
f097e25d MH |
307 | uc_4addr_packet->subtype = packet_subtype; |
308 | uc_4addr_packet->reserved = 0; | |
309 | ||
310 | ret = true; | |
311 | out: | |
312 | if (primary_if) | |
82047ad7 | 313 | batadv_hardif_put(primary_if); |
f097e25d MH |
314 | return ret; |
315 | } | |
316 | ||
317 | /** | |
7e9a8c2c | 318 | * batadv_send_skb_unicast() - encapsulate and send an skb via unicast |
f097e25d MH |
319 | * @bat_priv: the bat priv with all the soft interface information |
320 | * @skb: payload to send | |
321 | * @packet_type: the batman unicast packet type to use | |
322 | * @packet_subtype: the unicast 4addr packet subtype (only relevant for unicast | |
323 | * 4addr packets) | |
e300d314 | 324 | * @orig_node: the originator to send the packet to |
c018ad3d | 325 | * @vid: the vid to be used to search the translation table |
f097e25d | 326 | * |
e300d314 LL |
327 | * Wrap the given skb into a batman-adv unicast or unicast-4addr header |
328 | * depending on whether BATADV_UNICAST or BATADV_UNICAST_4ADDR was supplied | |
f19dc777 | 329 | * as packet_type. Then send this frame to the given orig_node. |
e300d314 | 330 | * |
62fe710f | 331 | * Return: NET_XMIT_DROP in case of error or NET_XMIT_SUCCESS otherwise. |
f097e25d | 332 | */ |
1d8ab8d3 LL |
333 | int batadv_send_skb_unicast(struct batadv_priv *bat_priv, |
334 | struct sk_buff *skb, int packet_type, | |
335 | int packet_subtype, | |
336 | struct batadv_orig_node *orig_node, | |
337 | unsigned short vid) | |
f097e25d | 338 | { |
f097e25d | 339 | struct batadv_unicast_packet *unicast_packet; |
8ea64e27 | 340 | struct ethhdr *ethhdr; |
1ad5bcb2 | 341 | int ret = NET_XMIT_DROP; |
f097e25d | 342 | |
56a5ca84 | 343 | if (!orig_node) |
f097e25d MH |
344 | goto out; |
345 | ||
346 | switch (packet_type) { | |
347 | case BATADV_UNICAST: | |
33faa045 AQ |
348 | if (!batadv_send_skb_prepare_unicast(skb, orig_node)) |
349 | goto out; | |
f097e25d MH |
350 | break; |
351 | case BATADV_UNICAST_4ADDR: | |
33faa045 AQ |
352 | if (!batadv_send_skb_prepare_unicast_4addr(bat_priv, skb, |
353 | orig_node, | |
354 | packet_subtype)) | |
355 | goto out; | |
f097e25d MH |
356 | break; |
357 | default: | |
358 | /* this function supports UNICAST and UNICAST_4ADDR only. It | |
359 | * should never be invoked with any other packet type | |
360 | */ | |
361 | goto out; | |
362 | } | |
363 | ||
927c2ed7 LL |
364 | /* skb->data might have been reallocated by |
365 | * batadv_send_skb_prepare_unicast{,_4addr}() | |
366 | */ | |
367 | ethhdr = eth_hdr(skb); | |
f097e25d MH |
368 | unicast_packet = (struct batadv_unicast_packet *)skb->data; |
369 | ||
370 | /* inform the destination node that we are still missing a correct route | |
371 | * for this client. The destination will receive this packet and will | |
372 | * try to reroute it because the ttvn contained in the header is less | |
373 | * than the current one | |
374 | */ | |
c018ad3d | 375 | if (batadv_tt_global_client_is_roaming(bat_priv, ethhdr->h_dest, vid)) |
f097e25d MH |
376 | unicast_packet->ttvn = unicast_packet->ttvn - 1; |
377 | ||
1ad5bcb2 SE |
378 | ret = batadv_send_skb_to_orig(skb, orig_node, NULL); |
379 | /* skb was consumed */ | |
380 | skb = NULL; | |
f097e25d MH |
381 | |
382 | out: | |
1ad5bcb2 | 383 | kfree_skb(skb); |
f097e25d MH |
384 | return ret; |
385 | } | |
386 | ||
e300d314 | 387 | /** |
7e9a8c2c | 388 | * batadv_send_skb_via_tt_generic() - send an skb via TT lookup |
e300d314 LL |
389 | * @bat_priv: the bat priv with all the soft interface information |
390 | * @skb: payload to send | |
391 | * @packet_type: the batman unicast packet type to use | |
392 | * @packet_subtype: the unicast 4addr packet subtype (only relevant for unicast | |
393 | * 4addr packets) | |
c5d3a652 | 394 | * @dst_hint: can be used to override the destination contained in the skb |
e300d314 LL |
395 | * @vid: the vid to be used to search the translation table |
396 | * | |
397 | * Look up the recipient node for the destination address in the ethernet | |
398 | * header via the translation table. Wrap the given skb into a batman-adv | |
399 | * unicast or unicast-4addr header depending on whether BATADV_UNICAST or | |
400 | * BATADV_UNICAST_4ADDR was supplied as packet_type. Then send this frame | |
401 | * to the according destination node. | |
402 | * | |
62fe710f | 403 | * Return: NET_XMIT_DROP in case of error or NET_XMIT_SUCCESS otherwise. |
e300d314 LL |
404 | */ |
405 | int batadv_send_skb_via_tt_generic(struct batadv_priv *bat_priv, | |
406 | struct sk_buff *skb, int packet_type, | |
6b5e971a | 407 | int packet_subtype, u8 *dst_hint, |
6c413b1c | 408 | unsigned short vid) |
e300d314 LL |
409 | { |
410 | struct ethhdr *ethhdr = (struct ethhdr *)skb->data; | |
411 | struct batadv_orig_node *orig_node; | |
6b5e971a | 412 | u8 *src, *dst; |
f19dc777 | 413 | int ret; |
6c413b1c AQ |
414 | |
415 | src = ethhdr->h_source; | |
416 | dst = ethhdr->h_dest; | |
417 | ||
418 | /* if we got an hint! let's send the packet to this client (if any) */ | |
419 | if (dst_hint) { | |
420 | src = NULL; | |
421 | dst = dst_hint; | |
422 | } | |
423 | orig_node = batadv_transtable_search(bat_priv, src, dst, vid); | |
e300d314 | 424 | |
f19dc777 SE |
425 | ret = batadv_send_skb_unicast(bat_priv, skb, packet_type, |
426 | packet_subtype, orig_node, vid); | |
427 | ||
428 | if (orig_node) | |
429 | batadv_orig_node_put(orig_node); | |
430 | ||
431 | return ret; | |
e300d314 LL |
432 | } |
433 | ||
434 | /** | |
7e9a8c2c | 435 | * batadv_send_skb_via_gw() - send an skb via gateway lookup |
e300d314 LL |
436 | * @bat_priv: the bat priv with all the soft interface information |
437 | * @skb: payload to send | |
438 | * @vid: the vid to be used to search the translation table | |
439 | * | |
440 | * Look up the currently selected gateway. Wrap the given skb into a batman-adv | |
441 | * unicast header and send this frame to this gateway node. | |
442 | * | |
62fe710f | 443 | * Return: NET_XMIT_DROP in case of error or NET_XMIT_SUCCESS otherwise. |
e300d314 LL |
444 | */ |
445 | int batadv_send_skb_via_gw(struct batadv_priv *bat_priv, struct sk_buff *skb, | |
446 | unsigned short vid) | |
447 | { | |
448 | struct batadv_orig_node *orig_node; | |
f19dc777 | 449 | int ret; |
e300d314 LL |
450 | |
451 | orig_node = batadv_gw_get_selected_orig(bat_priv); | |
f19dc777 SE |
452 | ret = batadv_send_skb_unicast(bat_priv, skb, BATADV_UNICAST_4ADDR, |
453 | BATADV_P_DATA, orig_node, vid); | |
454 | ||
455 | if (orig_node) | |
456 | batadv_orig_node_put(orig_node); | |
457 | ||
458 | return ret; | |
e300d314 LL |
459 | } |
460 | ||
a65e5481 | 461 | /** |
7e9a8c2c | 462 | * batadv_forw_packet_free() - free a forwarding packet |
a65e5481 | 463 | * @forw_packet: The packet to free |
bd687fe4 | 464 | * @dropped: whether the packet is freed because is is dropped |
a65e5481 LL |
465 | * |
466 | * This frees a forwarding packet and releases any resources it might | |
467 | * have claimed. | |
468 | */ | |
bd687fe4 SE |
469 | void batadv_forw_packet_free(struct batadv_forw_packet *forw_packet, |
470 | bool dropped) | |
c6c8fea2 | 471 | { |
bd687fe4 SE |
472 | if (dropped) |
473 | kfree_skb(forw_packet->skb); | |
474 | else | |
475 | consume_skb(forw_packet->skb); | |
476 | ||
6d5808d4 | 477 | if (forw_packet->if_incoming) |
82047ad7 | 478 | batadv_hardif_put(forw_packet->if_incoming); |
ef0a937f | 479 | if (forw_packet->if_outgoing) |
82047ad7 | 480 | batadv_hardif_put(forw_packet->if_outgoing); |
a65e5481 LL |
481 | if (forw_packet->queue_left) |
482 | atomic_inc(forw_packet->queue_left); | |
c6c8fea2 SE |
483 | kfree(forw_packet); |
484 | } | |
485 | ||
a65e5481 | 486 | /** |
7e9a8c2c | 487 | * batadv_forw_packet_alloc() - allocate a forwarding packet |
a65e5481 LL |
488 | * @if_incoming: The (optional) if_incoming to be grabbed |
489 | * @if_outgoing: The (optional) if_outgoing to be grabbed | |
490 | * @queue_left: The (optional) queue counter to decrease | |
491 | * @bat_priv: The bat_priv for the mesh of this forw_packet | |
99ba18ef | 492 | * @skb: The raw packet this forwarding packet shall contain |
a65e5481 LL |
493 | * |
494 | * Allocates a forwarding packet and tries to get a reference to the | |
495 | * (optional) if_incoming, if_outgoing and queue_left. If queue_left | |
496 | * is NULL then bat_priv is optional, too. | |
497 | * | |
498 | * Return: An allocated forwarding packet on success, NULL otherwise. | |
499 | */ | |
500 | struct batadv_forw_packet * | |
501 | batadv_forw_packet_alloc(struct batadv_hard_iface *if_incoming, | |
502 | struct batadv_hard_iface *if_outgoing, | |
503 | atomic_t *queue_left, | |
99ba18ef LL |
504 | struct batadv_priv *bat_priv, |
505 | struct sk_buff *skb) | |
a65e5481 LL |
506 | { |
507 | struct batadv_forw_packet *forw_packet; | |
508 | const char *qname; | |
509 | ||
510 | if (queue_left && !batadv_atomic_dec_not_zero(queue_left)) { | |
511 | qname = "unknown"; | |
512 | ||
513 | if (queue_left == &bat_priv->bcast_queue_left) | |
514 | qname = "bcast"; | |
515 | ||
516 | if (queue_left == &bat_priv->batman_queue_left) | |
517 | qname = "batman"; | |
518 | ||
519 | batadv_dbg(BATADV_DBG_BATMAN, bat_priv, | |
520 | "%s queue is full\n", qname); | |
521 | ||
522 | return NULL; | |
523 | } | |
524 | ||
525 | forw_packet = kmalloc(sizeof(*forw_packet), GFP_ATOMIC); | |
526 | if (!forw_packet) | |
527 | goto err; | |
528 | ||
529 | if (if_incoming) | |
530 | kref_get(&if_incoming->refcount); | |
531 | ||
532 | if (if_outgoing) | |
533 | kref_get(&if_outgoing->refcount); | |
534 | ||
9b4aec64 LL |
535 | INIT_HLIST_NODE(&forw_packet->list); |
536 | INIT_HLIST_NODE(&forw_packet->cleanup_list); | |
99ba18ef | 537 | forw_packet->skb = skb; |
a65e5481 LL |
538 | forw_packet->queue_left = queue_left; |
539 | forw_packet->if_incoming = if_incoming; | |
540 | forw_packet->if_outgoing = if_outgoing; | |
541 | forw_packet->num_packets = 0; | |
542 | ||
543 | return forw_packet; | |
544 | ||
545 | err: | |
546 | if (queue_left) | |
547 | atomic_inc(queue_left); | |
548 | ||
549 | return NULL; | |
550 | } | |
551 | ||
9b4aec64 | 552 | /** |
7e9a8c2c | 553 | * batadv_forw_packet_was_stolen() - check whether someone stole this packet |
9b4aec64 LL |
554 | * @forw_packet: the forwarding packet to check |
555 | * | |
556 | * This function checks whether the given forwarding packet was claimed by | |
557 | * someone else for free(). | |
558 | * | |
559 | * Return: True if someone stole it, false otherwise. | |
560 | */ | |
561 | static bool | |
562 | batadv_forw_packet_was_stolen(struct batadv_forw_packet *forw_packet) | |
563 | { | |
564 | return !hlist_unhashed(&forw_packet->cleanup_list); | |
565 | } | |
566 | ||
567 | /** | |
7e9a8c2c | 568 | * batadv_forw_packet_steal() - claim a forw_packet for free() |
9b4aec64 LL |
569 | * @forw_packet: the forwarding packet to steal |
570 | * @lock: a key to the store to steal from (e.g. forw_{bat,bcast}_list_lock) | |
571 | * | |
572 | * This function tries to steal a specific forw_packet from global | |
573 | * visibility for the purpose of getting it for free(). That means | |
574 | * the caller is *not* allowed to requeue it afterwards. | |
575 | * | |
576 | * Return: True if stealing was successful. False if someone else stole it | |
577 | * before us. | |
578 | */ | |
579 | bool batadv_forw_packet_steal(struct batadv_forw_packet *forw_packet, | |
580 | spinlock_t *lock) | |
581 | { | |
582 | /* did purging routine steal it earlier? */ | |
583 | spin_lock_bh(lock); | |
584 | if (batadv_forw_packet_was_stolen(forw_packet)) { | |
585 | spin_unlock_bh(lock); | |
586 | return false; | |
587 | } | |
588 | ||
589 | hlist_del_init(&forw_packet->list); | |
590 | ||
591 | /* Just to spot misuse of this function */ | |
592 | hlist_add_fake(&forw_packet->cleanup_list); | |
593 | ||
594 | spin_unlock_bh(lock); | |
595 | return true; | |
596 | } | |
597 | ||
598 | /** | |
7e9a8c2c | 599 | * batadv_forw_packet_list_steal() - claim a list of forward packets for free() |
9b4aec64 LL |
600 | * @forw_list: the to be stolen forward packets |
601 | * @cleanup_list: a backup pointer, to be able to dispose the packet later | |
602 | * @hard_iface: the interface to steal forward packets from | |
603 | * | |
604 | * This function claims responsibility to free any forw_packet queued on the | |
605 | * given hard_iface. If hard_iface is NULL forwarding packets on all hard | |
606 | * interfaces will be claimed. | |
607 | * | |
608 | * The packets are being moved from the forw_list to the cleanup_list and | |
609 | * by that allows already running threads to notice the claiming. | |
610 | */ | |
56303d34 | 611 | static void |
9b4aec64 LL |
612 | batadv_forw_packet_list_steal(struct hlist_head *forw_list, |
613 | struct hlist_head *cleanup_list, | |
614 | const struct batadv_hard_iface *hard_iface) | |
c6c8fea2 | 615 | { |
9b4aec64 LL |
616 | struct batadv_forw_packet *forw_packet; |
617 | struct hlist_node *safe_tmp_node; | |
618 | ||
619 | hlist_for_each_entry_safe(forw_packet, safe_tmp_node, | |
620 | forw_list, list) { | |
621 | /* if purge_outstanding_packets() was called with an argument | |
622 | * we delete only packets belonging to the given interface | |
623 | */ | |
624 | if (hard_iface && | |
825ffe1f SE |
625 | forw_packet->if_incoming != hard_iface && |
626 | forw_packet->if_outgoing != hard_iface) | |
9b4aec64 LL |
627 | continue; |
628 | ||
629 | hlist_del(&forw_packet->list); | |
630 | hlist_add_head(&forw_packet->cleanup_list, cleanup_list); | |
631 | } | |
632 | } | |
633 | ||
634 | /** | |
7e9a8c2c | 635 | * batadv_forw_packet_list_free() - free a list of forward packets |
9b4aec64 LL |
636 | * @head: a list of to be freed forw_packets |
637 | * | |
638 | * This function cancels the scheduling of any packet in the provided list, | |
639 | * waits for any possibly running packet forwarding thread to finish and | |
640 | * finally, safely frees this forward packet. | |
641 | * | |
642 | * This function might sleep. | |
643 | */ | |
644 | static void batadv_forw_packet_list_free(struct hlist_head *head) | |
645 | { | |
646 | struct batadv_forw_packet *forw_packet; | |
647 | struct hlist_node *safe_tmp_node; | |
648 | ||
649 | hlist_for_each_entry_safe(forw_packet, safe_tmp_node, head, | |
650 | cleanup_list) { | |
651 | cancel_delayed_work_sync(&forw_packet->delayed_work); | |
c6c8fea2 | 652 | |
9b4aec64 LL |
653 | hlist_del(&forw_packet->cleanup_list); |
654 | batadv_forw_packet_free(forw_packet, true); | |
655 | } | |
656 | } | |
657 | ||
658 | /** | |
7e9a8c2c | 659 | * batadv_forw_packet_queue() - try to queue a forwarding packet |
9b4aec64 LL |
660 | * @forw_packet: the forwarding packet to queue |
661 | * @lock: a key to the store (e.g. forw_{bat,bcast}_list_lock) | |
662 | * @head: the shelve to queue it on (e.g. forw_{bat,bcast}_list) | |
663 | * @send_time: timestamp (jiffies) when the packet is to be sent | |
664 | * | |
665 | * This function tries to (re)queue a forwarding packet. Requeuing | |
666 | * is prevented if the according interface is shutting down | |
667 | * (e.g. if batadv_forw_packet_list_steal() was called for this | |
668 | * packet earlier). | |
669 | * | |
670 | * Calling batadv_forw_packet_queue() after a call to | |
671 | * batadv_forw_packet_steal() is forbidden! | |
672 | * | |
673 | * Caller needs to ensure that forw_packet->delayed_work was initialized. | |
674 | */ | |
675 | static void batadv_forw_packet_queue(struct batadv_forw_packet *forw_packet, | |
676 | spinlock_t *lock, struct hlist_head *head, | |
677 | unsigned long send_time) | |
678 | { | |
679 | spin_lock_bh(lock); | |
680 | ||
681 | /* did purging routine steal it from us? */ | |
682 | if (batadv_forw_packet_was_stolen(forw_packet)) { | |
683 | /* If you got it for free() without trouble, then | |
684 | * don't get back into the queue after stealing... | |
685 | */ | |
686 | WARN_ONCE(hlist_fake(&forw_packet->cleanup_list), | |
687 | "Requeuing after batadv_forw_packet_steal() not allowed!\n"); | |
688 | ||
689 | spin_unlock_bh(lock); | |
690 | return; | |
691 | } | |
692 | ||
693 | hlist_del_init(&forw_packet->list); | |
694 | hlist_add_head(&forw_packet->list, head); | |
695 | ||
696 | queue_delayed_work(batadv_event_workqueue, | |
697 | &forw_packet->delayed_work, | |
698 | send_time - jiffies); | |
699 | spin_unlock_bh(lock); | |
700 | } | |
701 | ||
702 | /** | |
7e9a8c2c | 703 | * batadv_forw_packet_bcast_queue() - try to queue a broadcast packet |
9b4aec64 LL |
704 | * @bat_priv: the bat priv with all the soft interface information |
705 | * @forw_packet: the forwarding packet to queue | |
706 | * @send_time: timestamp (jiffies) when the packet is to be sent | |
707 | * | |
708 | * This function tries to (re)queue a broadcast packet. | |
709 | * | |
710 | * Caller needs to ensure that forw_packet->delayed_work was initialized. | |
711 | */ | |
712 | static void | |
713 | batadv_forw_packet_bcast_queue(struct batadv_priv *bat_priv, | |
714 | struct batadv_forw_packet *forw_packet, | |
715 | unsigned long send_time) | |
716 | { | |
717 | batadv_forw_packet_queue(forw_packet, &bat_priv->forw_bcast_list_lock, | |
718 | &bat_priv->forw_bcast_list, send_time); | |
719 | } | |
720 | ||
721 | /** | |
7e9a8c2c | 722 | * batadv_forw_packet_ogmv1_queue() - try to queue an OGMv1 packet |
9b4aec64 LL |
723 | * @bat_priv: the bat priv with all the soft interface information |
724 | * @forw_packet: the forwarding packet to queue | |
725 | * @send_time: timestamp (jiffies) when the packet is to be sent | |
726 | * | |
727 | * This function tries to (re)queue an OGMv1 packet. | |
728 | * | |
729 | * Caller needs to ensure that forw_packet->delayed_work was initialized. | |
730 | */ | |
731 | void batadv_forw_packet_ogmv1_queue(struct batadv_priv *bat_priv, | |
732 | struct batadv_forw_packet *forw_packet, | |
733 | unsigned long send_time) | |
734 | { | |
735 | batadv_forw_packet_queue(forw_packet, &bat_priv->forw_bat_list_lock, | |
736 | &bat_priv->forw_bat_list, send_time); | |
c6c8fea2 SE |
737 | } |
738 | ||
62fe710f | 739 | /** |
7e9a8c2c | 740 | * batadv_add_bcast_packet_to_list() - queue broadcast packet for multiple sends |
7afcbbef SE |
741 | * @bat_priv: the bat priv with all the soft interface information |
742 | * @skb: broadcast packet to add | |
743 | * @delay: number of jiffies to wait before sending | |
3111beed | 744 | * @own_packet: true if it is a self-generated broadcast packet |
c6c8fea2 | 745 | * |
62fe710f SE |
746 | * add a broadcast packet to the queue and setup timers. broadcast packets |
747 | * are sent multiple times to increase probability for being received. | |
c6c8fea2 SE |
748 | * |
749 | * The skb is not consumed, so the caller should make sure that the | |
9cfc7bd6 | 750 | * skb is freed. |
62fe710f SE |
751 | * |
752 | * Return: NETDEV_TX_OK on success and NETDEV_TX_BUSY on errors. | |
9cfc7bd6 | 753 | */ |
56303d34 | 754 | int batadv_add_bcast_packet_to_list(struct batadv_priv *bat_priv, |
9455e34c | 755 | const struct sk_buff *skb, |
3111beed LL |
756 | unsigned long delay, |
757 | bool own_packet) | |
c6c8fea2 | 758 | { |
422d2f77 | 759 | struct batadv_hard_iface *primary_if; |
56303d34 | 760 | struct batadv_forw_packet *forw_packet; |
96412690 | 761 | struct batadv_bcast_packet *bcast_packet; |
747e4221 | 762 | struct sk_buff *newskb; |
c6c8fea2 | 763 | |
e5d89254 | 764 | primary_if = batadv_primary_if_get_selected(bat_priv); |
32ae9b22 | 765 | if (!primary_if) |
a65e5481 | 766 | goto err; |
c6c8fea2 | 767 | |
99ba18ef LL |
768 | newskb = skb_copy(skb, GFP_ATOMIC); |
769 | if (!newskb) { | |
770 | batadv_hardif_put(primary_if); | |
771 | goto err; | |
772 | } | |
773 | ||
a65e5481 LL |
774 | forw_packet = batadv_forw_packet_alloc(primary_if, NULL, |
775 | &bat_priv->bcast_queue_left, | |
99ba18ef | 776 | bat_priv, newskb); |
a65e5481 | 777 | batadv_hardif_put(primary_if); |
c6c8fea2 | 778 | if (!forw_packet) |
a65e5481 | 779 | goto err_packet_free; |
c6c8fea2 SE |
780 | |
781 | /* as we have a copy now, it is safe to decrease the TTL */ | |
96412690 | 782 | bcast_packet = (struct batadv_bcast_packet *)newskb->data; |
a40d9b07 | 783 | bcast_packet->ttl--; |
c6c8fea2 | 784 | |
3111beed | 785 | forw_packet->own = own_packet; |
c6c8fea2 | 786 | |
72414442 AQ |
787 | INIT_DELAYED_WORK(&forw_packet->delayed_work, |
788 | batadv_send_outstanding_bcast_packet); | |
789 | ||
9b4aec64 | 790 | batadv_forw_packet_bcast_queue(bat_priv, forw_packet, jiffies + delay); |
c6c8fea2 SE |
791 | return NETDEV_TX_OK; |
792 | ||
a65e5481 | 793 | err_packet_free: |
99ba18ef | 794 | kfree_skb(newskb); |
a65e5481 | 795 | err: |
c6c8fea2 SE |
796 | return NETDEV_TX_BUSY; |
797 | } | |
798 | ||
e2d9ba43 | 799 | /** |
7e9a8c2c | 800 | * batadv_forw_packet_bcasts_left() - check if a retransmission is necessary |
e2d9ba43 LL |
801 | * @forw_packet: the forwarding packet to check |
802 | * @hard_iface: the interface to check on | |
803 | * | |
804 | * Checks whether a given packet has any (re)transmissions left on the provided | |
805 | * interface. | |
806 | * | |
807 | * hard_iface may be NULL: In that case the number of transmissions this skb had | |
808 | * so far is compared with the maximum amount of retransmissions independent of | |
809 | * any interface instead. | |
810 | * | |
811 | * Return: True if (re)transmissions are left, false otherwise. | |
812 | */ | |
813 | static bool | |
814 | batadv_forw_packet_bcasts_left(struct batadv_forw_packet *forw_packet, | |
815 | struct batadv_hard_iface *hard_iface) | |
816 | { | |
817 | unsigned int max; | |
818 | ||
819 | if (hard_iface) | |
820 | max = hard_iface->num_bcasts; | |
821 | else | |
822 | max = BATADV_NUM_BCASTS_MAX; | |
823 | ||
824 | return BATADV_SKB_CB(forw_packet->skb)->num_bcasts < max; | |
825 | } | |
826 | ||
827 | /** | |
7e9a8c2c SE |
828 | * batadv_forw_packet_bcasts_inc() - increment retransmission counter of a |
829 | * packet | |
e2d9ba43 LL |
830 | * @forw_packet: the packet to increase the counter for |
831 | */ | |
832 | static void | |
833 | batadv_forw_packet_bcasts_inc(struct batadv_forw_packet *forw_packet) | |
834 | { | |
835 | BATADV_SKB_CB(forw_packet->skb)->num_bcasts++; | |
836 | } | |
837 | ||
838 | /** | |
7e9a8c2c | 839 | * batadv_forw_packet_is_rebroadcast() - check packet for previous transmissions |
e2d9ba43 LL |
840 | * @forw_packet: the packet to check |
841 | * | |
842 | * Return: True if this packet was transmitted before, false otherwise. | |
843 | */ | |
844 | bool batadv_forw_packet_is_rebroadcast(struct batadv_forw_packet *forw_packet) | |
845 | { | |
846 | return BATADV_SKB_CB(forw_packet->skb)->num_bcasts > 0; | |
847 | } | |
848 | ||
bb079c82 | 849 | static void batadv_send_outstanding_bcast_packet(struct work_struct *work) |
c6c8fea2 | 850 | { |
56303d34 | 851 | struct batadv_hard_iface *hard_iface; |
3111beed | 852 | struct batadv_hardif_neigh_node *neigh_node; |
bbb1f90e | 853 | struct delayed_work *delayed_work; |
56303d34 | 854 | struct batadv_forw_packet *forw_packet; |
3111beed | 855 | struct batadv_bcast_packet *bcast_packet; |
c6c8fea2 | 856 | struct sk_buff *skb1; |
56303d34 SE |
857 | struct net_device *soft_iface; |
858 | struct batadv_priv *bat_priv; | |
9b4aec64 | 859 | unsigned long send_time = jiffies + msecs_to_jiffies(5); |
bd687fe4 | 860 | bool dropped = false; |
3111beed LL |
861 | u8 *neigh_addr; |
862 | u8 *orig_neigh; | |
863 | int ret = 0; | |
56303d34 | 864 | |
4ba4bc0f | 865 | delayed_work = to_delayed_work(work); |
56303d34 SE |
866 | forw_packet = container_of(delayed_work, struct batadv_forw_packet, |
867 | delayed_work); | |
868 | soft_iface = forw_packet->if_incoming->soft_iface; | |
869 | bat_priv = netdev_priv(soft_iface); | |
c6c8fea2 | 870 | |
bd687fe4 SE |
871 | if (atomic_read(&bat_priv->mesh_state) == BATADV_MESH_DEACTIVATING) { |
872 | dropped = true; | |
c6c8fea2 | 873 | goto out; |
bd687fe4 | 874 | } |
c6c8fea2 | 875 | |
bd687fe4 SE |
876 | if (batadv_dat_drop_broadcast_packet(bat_priv, forw_packet)) { |
877 | dropped = true; | |
c384ea3e | 878 | goto out; |
bd687fe4 | 879 | } |
c384ea3e | 880 | |
3111beed LL |
881 | bcast_packet = (struct batadv_bcast_packet *)forw_packet->skb->data; |
882 | ||
c6c8fea2 SE |
883 | /* rebroadcast packet */ |
884 | rcu_read_lock(); | |
3193e8fd | 885 | list_for_each_entry_rcu(hard_iface, &batadv_hardif_list, list) { |
e6c10f43 | 886 | if (hard_iface->soft_iface != soft_iface) |
c6c8fea2 SE |
887 | continue; |
888 | ||
e2d9ba43 | 889 | if (!batadv_forw_packet_bcasts_left(forw_packet, hard_iface)) |
caf65bfc MS |
890 | continue; |
891 | ||
3111beed LL |
892 | if (forw_packet->own) { |
893 | neigh_node = NULL; | |
894 | } else { | |
895 | neigh_addr = eth_hdr(forw_packet->skb)->h_source; | |
896 | neigh_node = batadv_hardif_neigh_get(hard_iface, | |
897 | neigh_addr); | |
898 | } | |
899 | ||
900 | orig_neigh = neigh_node ? neigh_node->orig : NULL; | |
901 | ||
902 | ret = batadv_hardif_no_broadcast(hard_iface, bcast_packet->orig, | |
903 | orig_neigh); | |
904 | ||
905 | if (ret) { | |
906 | char *type; | |
907 | ||
908 | switch (ret) { | |
909 | case BATADV_HARDIF_BCAST_NORECIPIENT: | |
910 | type = "no neighbor"; | |
911 | break; | |
912 | case BATADV_HARDIF_BCAST_DUPFWD: | |
913 | type = "single neighbor is source"; | |
914 | break; | |
915 | case BATADV_HARDIF_BCAST_DUPORIG: | |
916 | type = "single neighbor is originator"; | |
917 | break; | |
918 | default: | |
919 | type = "unknown"; | |
920 | } | |
921 | ||
f25cbb2a | 922 | batadv_dbg(BATADV_DBG_BATMAN, bat_priv, "BCAST packet from orig %pM on %s suppressed: %s\n", |
3111beed LL |
923 | bcast_packet->orig, |
924 | hard_iface->net_dev->name, type); | |
925 | ||
926 | if (neigh_node) | |
927 | batadv_hardif_neigh_put(neigh_node); | |
928 | ||
929 | continue; | |
930 | } | |
931 | ||
932 | if (neigh_node) | |
933 | batadv_hardif_neigh_put(neigh_node); | |
934 | ||
27353446 SE |
935 | if (!kref_get_unless_zero(&hard_iface->refcount)) |
936 | continue; | |
937 | ||
c6c8fea2 SE |
938 | /* send a copy of the saved skb */ |
939 | skb1 = skb_clone(forw_packet->skb, GFP_ATOMIC); | |
940 | if (skb1) | |
95d39278 | 941 | batadv_send_broadcast_skb(skb1, hard_iface); |
27353446 SE |
942 | |
943 | batadv_hardif_put(hard_iface); | |
c6c8fea2 SE |
944 | } |
945 | rcu_read_unlock(); | |
946 | ||
e2d9ba43 | 947 | batadv_forw_packet_bcasts_inc(forw_packet); |
c6c8fea2 SE |
948 | |
949 | /* if we still have some more bcasts to send */ | |
e2d9ba43 | 950 | if (batadv_forw_packet_bcasts_left(forw_packet, NULL)) { |
9b4aec64 LL |
951 | batadv_forw_packet_bcast_queue(bat_priv, forw_packet, |
952 | send_time); | |
c6c8fea2 SE |
953 | return; |
954 | } | |
955 | ||
956 | out: | |
9b4aec64 LL |
957 | /* do we get something for free()? */ |
958 | if (batadv_forw_packet_steal(forw_packet, | |
959 | &bat_priv->forw_bcast_list_lock)) | |
960 | batadv_forw_packet_free(forw_packet, dropped); | |
c6c8fea2 SE |
961 | } |
962 | ||
9b4aec64 | 963 | /** |
7e9a8c2c | 964 | * batadv_purge_outstanding_packets() - stop/purge scheduled bcast/OGMv1 packets |
9b4aec64 LL |
965 | * @bat_priv: the bat priv with all the soft interface information |
966 | * @hard_iface: the hard interface to cancel and purge bcast/ogm packets on | |
967 | * | |
968 | * This method cancels and purges any broadcast and OGMv1 packet on the given | |
969 | * hard_iface. If hard_iface is NULL, broadcast and OGMv1 packets on all hard | |
970 | * interfaces will be canceled and purged. | |
971 | * | |
972 | * This function might sleep. | |
973 | */ | |
56303d34 SE |
974 | void |
975 | batadv_purge_outstanding_packets(struct batadv_priv *bat_priv, | |
976 | const struct batadv_hard_iface *hard_iface) | |
c6c8fea2 | 977 | { |
9b4aec64 | 978 | struct hlist_head head = HLIST_HEAD_INIT; |
c6c8fea2 | 979 | |
e6c10f43 | 980 | if (hard_iface) |
39c75a51 | 981 | batadv_dbg(BATADV_DBG_BATMAN, bat_priv, |
22f0502e SE |
982 | "%s(): %s\n", |
983 | __func__, hard_iface->net_dev->name); | |
c6c8fea2 | 984 | else |
39c75a51 | 985 | batadv_dbg(BATADV_DBG_BATMAN, bat_priv, |
22f0502e | 986 | "%s()\n", __func__); |
c6c8fea2 | 987 | |
9b4aec64 | 988 | /* claim bcast list for free() */ |
c6c8fea2 | 989 | spin_lock_bh(&bat_priv->forw_bcast_list_lock); |
9b4aec64 LL |
990 | batadv_forw_packet_list_steal(&bat_priv->forw_bcast_list, &head, |
991 | hard_iface); | |
c6c8fea2 SE |
992 | spin_unlock_bh(&bat_priv->forw_bcast_list_lock); |
993 | ||
9b4aec64 | 994 | /* claim batman packet list for free() */ |
c6c8fea2 | 995 | spin_lock_bh(&bat_priv->forw_bat_list_lock); |
9b4aec64 LL |
996 | batadv_forw_packet_list_steal(&bat_priv->forw_bat_list, &head, |
997 | hard_iface); | |
c6c8fea2 | 998 | spin_unlock_bh(&bat_priv->forw_bat_list_lock); |
9b4aec64 LL |
999 | |
1000 | /* then cancel or wait for packet workers to finish and free */ | |
1001 | batadv_forw_packet_list_free(&head); | |
c6c8fea2 | 1002 | } |