]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blob - net/batman-adv/send.c
Merge branch 'rcu/urgent' of git://git.kernel.org/pub/scm/linux/kernel/git/paulmck...
[mirror_ubuntu-artful-kernel.git] / net / batman-adv / send.c
1 /* Copyright (C) 2007-2016 B.A.T.M.A.N. contributors:
2 *
3 * Marek Lindner, Simon Wunderlich
4 *
5 * This program is free software; you can redistribute it and/or
6 * modify it under the terms of version 2 of the GNU General Public
7 * License as published by the Free Software Foundation.
8 *
9 * This program is distributed in the hope that it will be useful, but
10 * WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
12 * General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, see <http://www.gnu.org/licenses/>.
16 */
17
18 #include "send.h"
19 #include "main.h"
20
21 #include <linux/atomic.h>
22 #include <linux/bug.h>
23 #include <linux/byteorder/generic.h>
24 #include <linux/errno.h>
25 #include <linux/etherdevice.h>
26 #include <linux/fs.h>
27 #include <linux/if.h>
28 #include <linux/if_ether.h>
29 #include <linux/jiffies.h>
30 #include <linux/kernel.h>
31 #include <linux/kref.h>
32 #include <linux/list.h>
33 #include <linux/netdevice.h>
34 #include <linux/printk.h>
35 #include <linux/rculist.h>
36 #include <linux/rcupdate.h>
37 #include <linux/skbuff.h>
38 #include <linux/slab.h>
39 #include <linux/spinlock.h>
40 #include <linux/stddef.h>
41 #include <linux/workqueue.h>
42
43 #include "distributed-arp-table.h"
44 #include "fragmentation.h"
45 #include "gateway_client.h"
46 #include "hard-interface.h"
47 #include "log.h"
48 #include "network-coding.h"
49 #include "originator.h"
50 #include "routing.h"
51 #include "soft-interface.h"
52 #include "translation-table.h"
53
54 static void batadv_send_outstanding_bcast_packet(struct work_struct *work);
55
56 /**
57 * batadv_send_skb_packet - send an already prepared packet
58 * @skb: the packet to send
59 * @hard_iface: the interface to use to send the broadcast packet
60 * @dst_addr: the payload destination
61 *
62 * Send out an already prepared packet to the given neighbor or broadcast it
63 * using the specified interface. Either hard_iface or neigh_node must be not
64 * NULL.
65 * If neigh_node is NULL, then the packet is broadcasted using hard_iface,
66 * otherwise it is sent as unicast to the given neighbor.
67 *
68 * Regardless of the return value, the skb is consumed.
69 *
70 * Return: A negative errno code is returned on a failure. A success does not
71 * guarantee the frame will be transmitted as it may be dropped due
72 * to congestion or traffic shaping.
73 */
74 int batadv_send_skb_packet(struct sk_buff *skb,
75 struct batadv_hard_iface *hard_iface,
76 const u8 *dst_addr)
77 {
78 struct batadv_priv *bat_priv;
79 struct ethhdr *ethhdr;
80
81 bat_priv = netdev_priv(hard_iface->soft_iface);
82
83 if (hard_iface->if_status != BATADV_IF_ACTIVE)
84 goto send_skb_err;
85
86 if (unlikely(!hard_iface->net_dev))
87 goto send_skb_err;
88
89 if (!(hard_iface->net_dev->flags & IFF_UP)) {
90 pr_warn("Interface %s is not up - can't send packet via that interface!\n",
91 hard_iface->net_dev->name);
92 goto send_skb_err;
93 }
94
95 /* push to the ethernet header. */
96 if (batadv_skb_head_push(skb, ETH_HLEN) < 0)
97 goto send_skb_err;
98
99 skb_reset_mac_header(skb);
100
101 ethhdr = eth_hdr(skb);
102 ether_addr_copy(ethhdr->h_source, hard_iface->net_dev->dev_addr);
103 ether_addr_copy(ethhdr->h_dest, dst_addr);
104 ethhdr->h_proto = htons(ETH_P_BATMAN);
105
106 skb_set_network_header(skb, ETH_HLEN);
107 skb->protocol = htons(ETH_P_BATMAN);
108
109 skb->dev = hard_iface->net_dev;
110
111 /* Save a clone of the skb to use when decoding coded packets */
112 batadv_nc_skb_store_for_decoding(bat_priv, skb);
113
114 /* dev_queue_xmit() returns a negative result on error. However on
115 * congestion and traffic shaping, it drops and returns NET_XMIT_DROP
116 * (which is > 0). This will not be treated as an error.
117 */
118 return dev_queue_xmit(skb);
119 send_skb_err:
120 kfree_skb(skb);
121 return NET_XMIT_DROP;
122 }
123
124 int batadv_send_broadcast_skb(struct sk_buff *skb,
125 struct batadv_hard_iface *hard_iface)
126 {
127 return batadv_send_skb_packet(skb, hard_iface, batadv_broadcast_addr);
128 }
129
130 int batadv_send_unicast_skb(struct sk_buff *skb,
131 struct batadv_neigh_node *neigh)
132 {
133 #ifdef CONFIG_BATMAN_ADV_BATMAN_V
134 struct batadv_hardif_neigh_node *hardif_neigh;
135 #endif
136 int ret;
137
138 ret = batadv_send_skb_packet(skb, neigh->if_incoming, neigh->addr);
139
140 #ifdef CONFIG_BATMAN_ADV_BATMAN_V
141 hardif_neigh = batadv_hardif_neigh_get(neigh->if_incoming, neigh->addr);
142
143 if ((hardif_neigh) && (ret != NET_XMIT_DROP))
144 hardif_neigh->bat_v.last_unicast_tx = jiffies;
145
146 if (hardif_neigh)
147 batadv_hardif_neigh_put(hardif_neigh);
148 #endif
149
150 return ret;
151 }
152
153 /**
154 * batadv_send_skb_to_orig - Lookup next-hop and transmit skb.
155 * @skb: Packet to be transmitted.
156 * @orig_node: Final destination of the packet.
157 * @recv_if: Interface used when receiving the packet (can be NULL).
158 *
159 * Looks up the best next-hop towards the passed originator and passes the
160 * skb on for preparation of MAC header. If the packet originated from this
161 * host, NULL can be passed as recv_if and no interface alternating is
162 * attempted.
163 *
164 * Return: negative errno code on a failure, -EINPROGRESS if the skb is
165 * buffered for later transmit or the NET_XMIT status returned by the
166 * lower routine if the packet has been passed down.
167 */
168 int batadv_send_skb_to_orig(struct sk_buff *skb,
169 struct batadv_orig_node *orig_node,
170 struct batadv_hard_iface *recv_if)
171 {
172 struct batadv_priv *bat_priv = orig_node->bat_priv;
173 struct batadv_neigh_node *neigh_node;
174 int ret;
175
176 /* batadv_find_router() increases neigh_nodes refcount if found. */
177 neigh_node = batadv_find_router(bat_priv, orig_node, recv_if);
178 if (!neigh_node) {
179 ret = -EINVAL;
180 goto free_skb;
181 }
182
183 /* Check if the skb is too large to send in one piece and fragment
184 * it if needed.
185 */
186 if (atomic_read(&bat_priv->fragmentation) &&
187 skb->len > neigh_node->if_incoming->net_dev->mtu) {
188 /* Fragment and send packet. */
189 ret = batadv_frag_send_packet(skb, orig_node, neigh_node);
190 /* skb was consumed */
191 skb = NULL;
192
193 goto put_neigh_node;
194 }
195
196 /* try to network code the packet, if it is received on an interface
197 * (i.e. being forwarded). If the packet originates from this node or if
198 * network coding fails, then send the packet as usual.
199 */
200 if (recv_if && batadv_nc_skb_forward(skb, neigh_node))
201 ret = -EINPROGRESS;
202 else
203 ret = batadv_send_unicast_skb(skb, neigh_node);
204
205 /* skb was consumed */
206 skb = NULL;
207
208 put_neigh_node:
209 batadv_neigh_node_put(neigh_node);
210 free_skb:
211 kfree_skb(skb);
212
213 return ret;
214 }
215
216 /**
217 * batadv_send_skb_push_fill_unicast - extend the buffer and initialize the
218 * common fields for unicast packets
219 * @skb: the skb carrying the unicast header to initialize
220 * @hdr_size: amount of bytes to push at the beginning of the skb
221 * @orig_node: the destination node
222 *
223 * Return: false if the buffer extension was not possible or true otherwise.
224 */
225 static bool
226 batadv_send_skb_push_fill_unicast(struct sk_buff *skb, int hdr_size,
227 struct batadv_orig_node *orig_node)
228 {
229 struct batadv_unicast_packet *unicast_packet;
230 u8 ttvn = (u8)atomic_read(&orig_node->last_ttvn);
231
232 if (batadv_skb_head_push(skb, hdr_size) < 0)
233 return false;
234
235 unicast_packet = (struct batadv_unicast_packet *)skb->data;
236 unicast_packet->version = BATADV_COMPAT_VERSION;
237 /* batman packet type: unicast */
238 unicast_packet->packet_type = BATADV_UNICAST;
239 /* set unicast ttl */
240 unicast_packet->ttl = BATADV_TTL;
241 /* copy the destination for faster routing */
242 ether_addr_copy(unicast_packet->dest, orig_node->orig);
243 /* set the destination tt version number */
244 unicast_packet->ttvn = ttvn;
245
246 return true;
247 }
248
249 /**
250 * batadv_send_skb_prepare_unicast - encapsulate an skb with a unicast header
251 * @skb: the skb containing the payload to encapsulate
252 * @orig_node: the destination node
253 *
254 * Return: false if the payload could not be encapsulated or true otherwise.
255 */
256 static bool batadv_send_skb_prepare_unicast(struct sk_buff *skb,
257 struct batadv_orig_node *orig_node)
258 {
259 size_t uni_size = sizeof(struct batadv_unicast_packet);
260
261 return batadv_send_skb_push_fill_unicast(skb, uni_size, orig_node);
262 }
263
264 /**
265 * batadv_send_skb_prepare_unicast_4addr - encapsulate an skb with a
266 * unicast 4addr header
267 * @bat_priv: the bat priv with all the soft interface information
268 * @skb: the skb containing the payload to encapsulate
269 * @orig: the destination node
270 * @packet_subtype: the unicast 4addr packet subtype to use
271 *
272 * Return: false if the payload could not be encapsulated or true otherwise.
273 */
274 bool batadv_send_skb_prepare_unicast_4addr(struct batadv_priv *bat_priv,
275 struct sk_buff *skb,
276 struct batadv_orig_node *orig,
277 int packet_subtype)
278 {
279 struct batadv_hard_iface *primary_if;
280 struct batadv_unicast_4addr_packet *uc_4addr_packet;
281 bool ret = false;
282
283 primary_if = batadv_primary_if_get_selected(bat_priv);
284 if (!primary_if)
285 goto out;
286
287 /* Pull the header space and fill the unicast_packet substructure.
288 * We can do that because the first member of the uc_4addr_packet
289 * is of type struct unicast_packet
290 */
291 if (!batadv_send_skb_push_fill_unicast(skb, sizeof(*uc_4addr_packet),
292 orig))
293 goto out;
294
295 uc_4addr_packet = (struct batadv_unicast_4addr_packet *)skb->data;
296 uc_4addr_packet->u.packet_type = BATADV_UNICAST_4ADDR;
297 ether_addr_copy(uc_4addr_packet->src, primary_if->net_dev->dev_addr);
298 uc_4addr_packet->subtype = packet_subtype;
299 uc_4addr_packet->reserved = 0;
300
301 ret = true;
302 out:
303 if (primary_if)
304 batadv_hardif_put(primary_if);
305 return ret;
306 }
307
308 /**
309 * batadv_send_skb_unicast - encapsulate and send an skb via unicast
310 * @bat_priv: the bat priv with all the soft interface information
311 * @skb: payload to send
312 * @packet_type: the batman unicast packet type to use
313 * @packet_subtype: the unicast 4addr packet subtype (only relevant for unicast
314 * 4addr packets)
315 * @orig_node: the originator to send the packet to
316 * @vid: the vid to be used to search the translation table
317 *
318 * Wrap the given skb into a batman-adv unicast or unicast-4addr header
319 * depending on whether BATADV_UNICAST or BATADV_UNICAST_4ADDR was supplied
320 * as packet_type. Then send this frame to the given orig_node.
321 *
322 * Return: NET_XMIT_DROP in case of error or NET_XMIT_SUCCESS otherwise.
323 */
324 int batadv_send_skb_unicast(struct batadv_priv *bat_priv,
325 struct sk_buff *skb, int packet_type,
326 int packet_subtype,
327 struct batadv_orig_node *orig_node,
328 unsigned short vid)
329 {
330 struct batadv_unicast_packet *unicast_packet;
331 struct ethhdr *ethhdr;
332 int ret = NET_XMIT_DROP;
333
334 if (!orig_node)
335 goto out;
336
337 switch (packet_type) {
338 case BATADV_UNICAST:
339 if (!batadv_send_skb_prepare_unicast(skb, orig_node))
340 goto out;
341 break;
342 case BATADV_UNICAST_4ADDR:
343 if (!batadv_send_skb_prepare_unicast_4addr(bat_priv, skb,
344 orig_node,
345 packet_subtype))
346 goto out;
347 break;
348 default:
349 /* this function supports UNICAST and UNICAST_4ADDR only. It
350 * should never be invoked with any other packet type
351 */
352 goto out;
353 }
354
355 /* skb->data might have been reallocated by
356 * batadv_send_skb_prepare_unicast{,_4addr}()
357 */
358 ethhdr = eth_hdr(skb);
359 unicast_packet = (struct batadv_unicast_packet *)skb->data;
360
361 /* inform the destination node that we are still missing a correct route
362 * for this client. The destination will receive this packet and will
363 * try to reroute it because the ttvn contained in the header is less
364 * than the current one
365 */
366 if (batadv_tt_global_client_is_roaming(bat_priv, ethhdr->h_dest, vid))
367 unicast_packet->ttvn = unicast_packet->ttvn - 1;
368
369 ret = batadv_send_skb_to_orig(skb, orig_node, NULL);
370 /* skb was consumed */
371 skb = NULL;
372
373 out:
374 kfree_skb(skb);
375 return ret;
376 }
377
378 /**
379 * batadv_send_skb_via_tt_generic - send an skb via TT lookup
380 * @bat_priv: the bat priv with all the soft interface information
381 * @skb: payload to send
382 * @packet_type: the batman unicast packet type to use
383 * @packet_subtype: the unicast 4addr packet subtype (only relevant for unicast
384 * 4addr packets)
385 * @dst_hint: can be used to override the destination contained in the skb
386 * @vid: the vid to be used to search the translation table
387 *
388 * Look up the recipient node for the destination address in the ethernet
389 * header via the translation table. Wrap the given skb into a batman-adv
390 * unicast or unicast-4addr header depending on whether BATADV_UNICAST or
391 * BATADV_UNICAST_4ADDR was supplied as packet_type. Then send this frame
392 * to the according destination node.
393 *
394 * Return: NET_XMIT_DROP in case of error or NET_XMIT_SUCCESS otherwise.
395 */
396 int batadv_send_skb_via_tt_generic(struct batadv_priv *bat_priv,
397 struct sk_buff *skb, int packet_type,
398 int packet_subtype, u8 *dst_hint,
399 unsigned short vid)
400 {
401 struct ethhdr *ethhdr = (struct ethhdr *)skb->data;
402 struct batadv_orig_node *orig_node;
403 u8 *src, *dst;
404 int ret;
405
406 src = ethhdr->h_source;
407 dst = ethhdr->h_dest;
408
409 /* if we got an hint! let's send the packet to this client (if any) */
410 if (dst_hint) {
411 src = NULL;
412 dst = dst_hint;
413 }
414 orig_node = batadv_transtable_search(bat_priv, src, dst, vid);
415
416 ret = batadv_send_skb_unicast(bat_priv, skb, packet_type,
417 packet_subtype, orig_node, vid);
418
419 if (orig_node)
420 batadv_orig_node_put(orig_node);
421
422 return ret;
423 }
424
425 /**
426 * batadv_send_skb_via_gw - send an skb via gateway lookup
427 * @bat_priv: the bat priv with all the soft interface information
428 * @skb: payload to send
429 * @vid: the vid to be used to search the translation table
430 *
431 * Look up the currently selected gateway. Wrap the given skb into a batman-adv
432 * unicast header and send this frame to this gateway node.
433 *
434 * Return: NET_XMIT_DROP in case of error or NET_XMIT_SUCCESS otherwise.
435 */
436 int batadv_send_skb_via_gw(struct batadv_priv *bat_priv, struct sk_buff *skb,
437 unsigned short vid)
438 {
439 struct batadv_orig_node *orig_node;
440 int ret;
441
442 orig_node = batadv_gw_get_selected_orig(bat_priv);
443 ret = batadv_send_skb_unicast(bat_priv, skb, BATADV_UNICAST_4ADDR,
444 BATADV_P_DATA, orig_node, vid);
445
446 if (orig_node)
447 batadv_orig_node_put(orig_node);
448
449 return ret;
450 }
451
452 /**
453 * batadv_forw_packet_free - free a forwarding packet
454 * @forw_packet: The packet to free
455 * @dropped: whether the packet is freed because is is dropped
456 *
457 * This frees a forwarding packet and releases any resources it might
458 * have claimed.
459 */
460 void batadv_forw_packet_free(struct batadv_forw_packet *forw_packet,
461 bool dropped)
462 {
463 if (dropped)
464 kfree_skb(forw_packet->skb);
465 else
466 consume_skb(forw_packet->skb);
467
468 if (forw_packet->if_incoming)
469 batadv_hardif_put(forw_packet->if_incoming);
470 if (forw_packet->if_outgoing)
471 batadv_hardif_put(forw_packet->if_outgoing);
472 if (forw_packet->queue_left)
473 atomic_inc(forw_packet->queue_left);
474 kfree(forw_packet);
475 }
476
477 /**
478 * batadv_forw_packet_alloc - allocate a forwarding packet
479 * @if_incoming: The (optional) if_incoming to be grabbed
480 * @if_outgoing: The (optional) if_outgoing to be grabbed
481 * @queue_left: The (optional) queue counter to decrease
482 * @bat_priv: The bat_priv for the mesh of this forw_packet
483 *
484 * Allocates a forwarding packet and tries to get a reference to the
485 * (optional) if_incoming, if_outgoing and queue_left. If queue_left
486 * is NULL then bat_priv is optional, too.
487 *
488 * Return: An allocated forwarding packet on success, NULL otherwise.
489 */
490 struct batadv_forw_packet *
491 batadv_forw_packet_alloc(struct batadv_hard_iface *if_incoming,
492 struct batadv_hard_iface *if_outgoing,
493 atomic_t *queue_left,
494 struct batadv_priv *bat_priv)
495 {
496 struct batadv_forw_packet *forw_packet;
497 const char *qname;
498
499 if (queue_left && !batadv_atomic_dec_not_zero(queue_left)) {
500 qname = "unknown";
501
502 if (queue_left == &bat_priv->bcast_queue_left)
503 qname = "bcast";
504
505 if (queue_left == &bat_priv->batman_queue_left)
506 qname = "batman";
507
508 batadv_dbg(BATADV_DBG_BATMAN, bat_priv,
509 "%s queue is full\n", qname);
510
511 return NULL;
512 }
513
514 forw_packet = kmalloc(sizeof(*forw_packet), GFP_ATOMIC);
515 if (!forw_packet)
516 goto err;
517
518 if (if_incoming)
519 kref_get(&if_incoming->refcount);
520
521 if (if_outgoing)
522 kref_get(&if_outgoing->refcount);
523
524 INIT_HLIST_NODE(&forw_packet->list);
525 INIT_HLIST_NODE(&forw_packet->cleanup_list);
526 forw_packet->skb = NULL;
527 forw_packet->queue_left = queue_left;
528 forw_packet->if_incoming = if_incoming;
529 forw_packet->if_outgoing = if_outgoing;
530 forw_packet->num_packets = 0;
531
532 return forw_packet;
533
534 err:
535 if (queue_left)
536 atomic_inc(queue_left);
537
538 return NULL;
539 }
540
541 /**
542 * batadv_forw_packet_was_stolen - check whether someone stole this packet
543 * @forw_packet: the forwarding packet to check
544 *
545 * This function checks whether the given forwarding packet was claimed by
546 * someone else for free().
547 *
548 * Return: True if someone stole it, false otherwise.
549 */
550 static bool
551 batadv_forw_packet_was_stolen(struct batadv_forw_packet *forw_packet)
552 {
553 return !hlist_unhashed(&forw_packet->cleanup_list);
554 }
555
556 /**
557 * batadv_forw_packet_steal - claim a forw_packet for free()
558 * @forw_packet: the forwarding packet to steal
559 * @lock: a key to the store to steal from (e.g. forw_{bat,bcast}_list_lock)
560 *
561 * This function tries to steal a specific forw_packet from global
562 * visibility for the purpose of getting it for free(). That means
563 * the caller is *not* allowed to requeue it afterwards.
564 *
565 * Return: True if stealing was successful. False if someone else stole it
566 * before us.
567 */
568 bool batadv_forw_packet_steal(struct batadv_forw_packet *forw_packet,
569 spinlock_t *lock)
570 {
571 /* did purging routine steal it earlier? */
572 spin_lock_bh(lock);
573 if (batadv_forw_packet_was_stolen(forw_packet)) {
574 spin_unlock_bh(lock);
575 return false;
576 }
577
578 hlist_del_init(&forw_packet->list);
579
580 /* Just to spot misuse of this function */
581 hlist_add_fake(&forw_packet->cleanup_list);
582
583 spin_unlock_bh(lock);
584 return true;
585 }
586
587 /**
588 * batadv_forw_packet_list_steal - claim a list of forward packets for free()
589 * @forw_list: the to be stolen forward packets
590 * @cleanup_list: a backup pointer, to be able to dispose the packet later
591 * @hard_iface: the interface to steal forward packets from
592 *
593 * This function claims responsibility to free any forw_packet queued on the
594 * given hard_iface. If hard_iface is NULL forwarding packets on all hard
595 * interfaces will be claimed.
596 *
597 * The packets are being moved from the forw_list to the cleanup_list and
598 * by that allows already running threads to notice the claiming.
599 */
600 static void
601 batadv_forw_packet_list_steal(struct hlist_head *forw_list,
602 struct hlist_head *cleanup_list,
603 const struct batadv_hard_iface *hard_iface)
604 {
605 struct batadv_forw_packet *forw_packet;
606 struct hlist_node *safe_tmp_node;
607
608 hlist_for_each_entry_safe(forw_packet, safe_tmp_node,
609 forw_list, list) {
610 /* if purge_outstanding_packets() was called with an argument
611 * we delete only packets belonging to the given interface
612 */
613 if (hard_iface &&
614 (forw_packet->if_incoming != hard_iface) &&
615 (forw_packet->if_outgoing != hard_iface))
616 continue;
617
618 hlist_del(&forw_packet->list);
619 hlist_add_head(&forw_packet->cleanup_list, cleanup_list);
620 }
621 }
622
623 /**
624 * batadv_forw_packet_list_free - free a list of forward packets
625 * @head: a list of to be freed forw_packets
626 *
627 * This function cancels the scheduling of any packet in the provided list,
628 * waits for any possibly running packet forwarding thread to finish and
629 * finally, safely frees this forward packet.
630 *
631 * This function might sleep.
632 */
633 static void batadv_forw_packet_list_free(struct hlist_head *head)
634 {
635 struct batadv_forw_packet *forw_packet;
636 struct hlist_node *safe_tmp_node;
637
638 hlist_for_each_entry_safe(forw_packet, safe_tmp_node, head,
639 cleanup_list) {
640 cancel_delayed_work_sync(&forw_packet->delayed_work);
641
642 hlist_del(&forw_packet->cleanup_list);
643 batadv_forw_packet_free(forw_packet, true);
644 }
645 }
646
647 /**
648 * batadv_forw_packet_queue - try to queue a forwarding packet
649 * @forw_packet: the forwarding packet to queue
650 * @lock: a key to the store (e.g. forw_{bat,bcast}_list_lock)
651 * @head: the shelve to queue it on (e.g. forw_{bat,bcast}_list)
652 * @send_time: timestamp (jiffies) when the packet is to be sent
653 *
654 * This function tries to (re)queue a forwarding packet. Requeuing
655 * is prevented if the according interface is shutting down
656 * (e.g. if batadv_forw_packet_list_steal() was called for this
657 * packet earlier).
658 *
659 * Calling batadv_forw_packet_queue() after a call to
660 * batadv_forw_packet_steal() is forbidden!
661 *
662 * Caller needs to ensure that forw_packet->delayed_work was initialized.
663 */
664 static void batadv_forw_packet_queue(struct batadv_forw_packet *forw_packet,
665 spinlock_t *lock, struct hlist_head *head,
666 unsigned long send_time)
667 {
668 spin_lock_bh(lock);
669
670 /* did purging routine steal it from us? */
671 if (batadv_forw_packet_was_stolen(forw_packet)) {
672 /* If you got it for free() without trouble, then
673 * don't get back into the queue after stealing...
674 */
675 WARN_ONCE(hlist_fake(&forw_packet->cleanup_list),
676 "Requeuing after batadv_forw_packet_steal() not allowed!\n");
677
678 spin_unlock_bh(lock);
679 return;
680 }
681
682 hlist_del_init(&forw_packet->list);
683 hlist_add_head(&forw_packet->list, head);
684
685 queue_delayed_work(batadv_event_workqueue,
686 &forw_packet->delayed_work,
687 send_time - jiffies);
688 spin_unlock_bh(lock);
689 }
690
691 /**
692 * batadv_forw_packet_bcast_queue - try to queue a broadcast packet
693 * @bat_priv: the bat priv with all the soft interface information
694 * @forw_packet: the forwarding packet to queue
695 * @send_time: timestamp (jiffies) when the packet is to be sent
696 *
697 * This function tries to (re)queue a broadcast packet.
698 *
699 * Caller needs to ensure that forw_packet->delayed_work was initialized.
700 */
701 static void
702 batadv_forw_packet_bcast_queue(struct batadv_priv *bat_priv,
703 struct batadv_forw_packet *forw_packet,
704 unsigned long send_time)
705 {
706 batadv_forw_packet_queue(forw_packet, &bat_priv->forw_bcast_list_lock,
707 &bat_priv->forw_bcast_list, send_time);
708 }
709
710 /**
711 * batadv_forw_packet_ogmv1_queue - try to queue an OGMv1 packet
712 * @bat_priv: the bat priv with all the soft interface information
713 * @forw_packet: the forwarding packet to queue
714 * @send_time: timestamp (jiffies) when the packet is to be sent
715 *
716 * This function tries to (re)queue an OGMv1 packet.
717 *
718 * Caller needs to ensure that forw_packet->delayed_work was initialized.
719 */
720 void batadv_forw_packet_ogmv1_queue(struct batadv_priv *bat_priv,
721 struct batadv_forw_packet *forw_packet,
722 unsigned long send_time)
723 {
724 batadv_forw_packet_queue(forw_packet, &bat_priv->forw_bat_list_lock,
725 &bat_priv->forw_bat_list, send_time);
726 }
727
728 /**
729 * batadv_add_bcast_packet_to_list - queue broadcast packet for multiple sends
730 * @bat_priv: the bat priv with all the soft interface information
731 * @skb: broadcast packet to add
732 * @delay: number of jiffies to wait before sending
733 * @own_packet: true if it is a self-generated broadcast packet
734 *
735 * add a broadcast packet to the queue and setup timers. broadcast packets
736 * are sent multiple times to increase probability for being received.
737 *
738 * The skb is not consumed, so the caller should make sure that the
739 * skb is freed.
740 *
741 * Return: NETDEV_TX_OK on success and NETDEV_TX_BUSY on errors.
742 */
743 int batadv_add_bcast_packet_to_list(struct batadv_priv *bat_priv,
744 const struct sk_buff *skb,
745 unsigned long delay,
746 bool own_packet)
747 {
748 struct batadv_hard_iface *primary_if;
749 struct batadv_forw_packet *forw_packet;
750 struct batadv_bcast_packet *bcast_packet;
751 struct sk_buff *newskb;
752
753 primary_if = batadv_primary_if_get_selected(bat_priv);
754 if (!primary_if)
755 goto err;
756
757 forw_packet = batadv_forw_packet_alloc(primary_if, NULL,
758 &bat_priv->bcast_queue_left,
759 bat_priv);
760 batadv_hardif_put(primary_if);
761 if (!forw_packet)
762 goto err;
763
764 newskb = skb_copy(skb, GFP_ATOMIC);
765 if (!newskb)
766 goto err_packet_free;
767
768 /* as we have a copy now, it is safe to decrease the TTL */
769 bcast_packet = (struct batadv_bcast_packet *)newskb->data;
770 bcast_packet->ttl--;
771
772 forw_packet->skb = newskb;
773 forw_packet->own = own_packet;
774
775 INIT_DELAYED_WORK(&forw_packet->delayed_work,
776 batadv_send_outstanding_bcast_packet);
777
778 batadv_forw_packet_bcast_queue(bat_priv, forw_packet, jiffies + delay);
779 return NETDEV_TX_OK;
780
781 err_packet_free:
782 batadv_forw_packet_free(forw_packet, true);
783 err:
784 return NETDEV_TX_BUSY;
785 }
786
787 static void batadv_send_outstanding_bcast_packet(struct work_struct *work)
788 {
789 struct batadv_hard_iface *hard_iface;
790 struct batadv_hardif_neigh_node *neigh_node;
791 struct delayed_work *delayed_work;
792 struct batadv_forw_packet *forw_packet;
793 struct batadv_bcast_packet *bcast_packet;
794 struct sk_buff *skb1;
795 struct net_device *soft_iface;
796 struct batadv_priv *bat_priv;
797 unsigned long send_time = jiffies + msecs_to_jiffies(5);
798 bool dropped = false;
799 u8 *neigh_addr;
800 u8 *orig_neigh;
801 int ret = 0;
802
803 delayed_work = to_delayed_work(work);
804 forw_packet = container_of(delayed_work, struct batadv_forw_packet,
805 delayed_work);
806 soft_iface = forw_packet->if_incoming->soft_iface;
807 bat_priv = netdev_priv(soft_iface);
808
809 if (atomic_read(&bat_priv->mesh_state) == BATADV_MESH_DEACTIVATING) {
810 dropped = true;
811 goto out;
812 }
813
814 if (batadv_dat_drop_broadcast_packet(bat_priv, forw_packet)) {
815 dropped = true;
816 goto out;
817 }
818
819 bcast_packet = (struct batadv_bcast_packet *)forw_packet->skb->data;
820
821 /* rebroadcast packet */
822 rcu_read_lock();
823 list_for_each_entry_rcu(hard_iface, &batadv_hardif_list, list) {
824 if (hard_iface->soft_iface != soft_iface)
825 continue;
826
827 if (forw_packet->num_packets >= hard_iface->num_bcasts)
828 continue;
829
830 if (forw_packet->own) {
831 neigh_node = NULL;
832 } else {
833 neigh_addr = eth_hdr(forw_packet->skb)->h_source;
834 neigh_node = batadv_hardif_neigh_get(hard_iface,
835 neigh_addr);
836 }
837
838 orig_neigh = neigh_node ? neigh_node->orig : NULL;
839
840 ret = batadv_hardif_no_broadcast(hard_iface, bcast_packet->orig,
841 orig_neigh);
842
843 if (ret) {
844 char *type;
845
846 switch (ret) {
847 case BATADV_HARDIF_BCAST_NORECIPIENT:
848 type = "no neighbor";
849 break;
850 case BATADV_HARDIF_BCAST_DUPFWD:
851 type = "single neighbor is source";
852 break;
853 case BATADV_HARDIF_BCAST_DUPORIG:
854 type = "single neighbor is originator";
855 break;
856 default:
857 type = "unknown";
858 }
859
860 batadv_dbg(BATADV_DBG_BATMAN, bat_priv, "BCAST packet from orig %pM on %s surpressed: %s\n",
861 bcast_packet->orig,
862 hard_iface->net_dev->name, type);
863
864 if (neigh_node)
865 batadv_hardif_neigh_put(neigh_node);
866
867 continue;
868 }
869
870 if (neigh_node)
871 batadv_hardif_neigh_put(neigh_node);
872
873 if (!kref_get_unless_zero(&hard_iface->refcount))
874 continue;
875
876 /* send a copy of the saved skb */
877 skb1 = skb_clone(forw_packet->skb, GFP_ATOMIC);
878 if (skb1)
879 batadv_send_broadcast_skb(skb1, hard_iface);
880
881 batadv_hardif_put(hard_iface);
882 }
883 rcu_read_unlock();
884
885 forw_packet->num_packets++;
886
887 /* if we still have some more bcasts to send */
888 if (forw_packet->num_packets < BATADV_NUM_BCASTS_MAX) {
889 batadv_forw_packet_bcast_queue(bat_priv, forw_packet,
890 send_time);
891 return;
892 }
893
894 out:
895 /* do we get something for free()? */
896 if (batadv_forw_packet_steal(forw_packet,
897 &bat_priv->forw_bcast_list_lock))
898 batadv_forw_packet_free(forw_packet, dropped);
899 }
900
901 /**
902 * batadv_purge_outstanding_packets - stop/purge scheduled bcast/OGMv1 packets
903 * @bat_priv: the bat priv with all the soft interface information
904 * @hard_iface: the hard interface to cancel and purge bcast/ogm packets on
905 *
906 * This method cancels and purges any broadcast and OGMv1 packet on the given
907 * hard_iface. If hard_iface is NULL, broadcast and OGMv1 packets on all hard
908 * interfaces will be canceled and purged.
909 *
910 * This function might sleep.
911 */
912 void
913 batadv_purge_outstanding_packets(struct batadv_priv *bat_priv,
914 const struct batadv_hard_iface *hard_iface)
915 {
916 struct hlist_head head = HLIST_HEAD_INIT;
917
918 if (hard_iface)
919 batadv_dbg(BATADV_DBG_BATMAN, bat_priv,
920 "purge_outstanding_packets(): %s\n",
921 hard_iface->net_dev->name);
922 else
923 batadv_dbg(BATADV_DBG_BATMAN, bat_priv,
924 "purge_outstanding_packets()\n");
925
926 /* claim bcast list for free() */
927 spin_lock_bh(&bat_priv->forw_bcast_list_lock);
928 batadv_forw_packet_list_steal(&bat_priv->forw_bcast_list, &head,
929 hard_iface);
930 spin_unlock_bh(&bat_priv->forw_bcast_list_lock);
931
932 /* claim batman packet list for free() */
933 spin_lock_bh(&bat_priv->forw_bat_list_lock);
934 batadv_forw_packet_list_steal(&bat_priv->forw_bat_list, &head,
935 hard_iface);
936 spin_unlock_bh(&bat_priv->forw_bat_list_lock);
937
938 /* then cancel or wait for packet workers to finish and free */
939 batadv_forw_packet_list_free(&head);
940 }