1 // SPDX-License-Identifier: GPL-2.0 2 /* Copyright (C) 2007-2017 B.A.T.M.A.N. contributors: 3 * 4 * Marek Lindner, Simon Wunderlich 5 * 6 * This program is free software; you can redistribute it and/or 7 * modify it under the terms of version 2 of the GNU General Public 8 * License as published by the Free Software Foundation. 9 * 10 * This program is distributed in the hope that it will be useful, but 11 * WITHOUT ANY WARRANTY; without even the implied warranty of 12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 13 * General Public License for more details. 14 * 15 * You should have received a copy of the GNU General Public License 16 * along with this program; if not, see <http://www.gnu.org/licenses/>. 17 */ 18 19 #include "send.h" 20 #include "main.h" 21 22 #include <linux/atomic.h> 23 #include <linux/bug.h> 24 #include <linux/byteorder/generic.h> 25 #include <linux/errno.h> 26 #include <linux/etherdevice.h> 27 #include <linux/fs.h> 28 #include <linux/if.h> 29 #include <linux/if_ether.h> 30 #include <linux/jiffies.h> 31 #include <linux/kernel.h> 32 #include <linux/kref.h> 33 #include <linux/list.h> 34 #include <linux/netdevice.h> 35 #include <linux/printk.h> 36 #include <linux/rculist.h> 37 #include <linux/rcupdate.h> 38 #include <linux/skbuff.h> 39 #include <linux/slab.h> 40 #include <linux/spinlock.h> 41 #include <linux/stddef.h> 42 #include <linux/workqueue.h> 43 44 #include "distributed-arp-table.h" 45 #include "fragmentation.h" 46 #include "gateway_client.h" 47 #include "hard-interface.h" 48 #include "log.h" 49 #include "network-coding.h" 50 #include "originator.h" 51 #include "routing.h" 52 #include "soft-interface.h" 53 #include "translation-table.h" 54 55 static void batadv_send_outstanding_bcast_packet(struct work_struct *work); 56 57 /** 58 * batadv_send_skb_packet - send an already prepared packet 59 * @skb: the packet to send 60 * @hard_iface: the interface to use to send the broadcast packet 61 * @dst_addr: the payload destination 62 * 63 * Send out an already prepared packet to the given neighbor or broadcast it 64 * using the specified interface. Either hard_iface or neigh_node must be not 65 * NULL. 66 * If neigh_node is NULL, then the packet is broadcasted using hard_iface, 67 * otherwise it is sent as unicast to the given neighbor. 68 * 69 * Regardless of the return value, the skb is consumed. 70 * 71 * Return: A negative errno code is returned on a failure. A success does not 72 * guarantee the frame will be transmitted as it may be dropped due 73 * to congestion or traffic shaping. 74 */ 75 int batadv_send_skb_packet(struct sk_buff *skb, 76 struct batadv_hard_iface *hard_iface, 77 const u8 *dst_addr) 78 { 79 struct batadv_priv *bat_priv; 80 struct ethhdr *ethhdr; 81 int ret; 82 83 bat_priv = netdev_priv(hard_iface->soft_iface); 84 85 if (hard_iface->if_status != BATADV_IF_ACTIVE) 86 goto send_skb_err; 87 88 if (unlikely(!hard_iface->net_dev)) 89 goto send_skb_err; 90 91 if (!(hard_iface->net_dev->flags & IFF_UP)) { 92 pr_warn("Interface %s is not up - can't send packet via that interface!\n", 93 hard_iface->net_dev->name); 94 goto send_skb_err; 95 } 96 97 /* push to the ethernet header. */ 98 if (batadv_skb_head_push(skb, ETH_HLEN) < 0) 99 goto send_skb_err; 100 101 skb_reset_mac_header(skb); 102 103 ethhdr = eth_hdr(skb); 104 ether_addr_copy(ethhdr->h_source, hard_iface->net_dev->dev_addr); 105 ether_addr_copy(ethhdr->h_dest, dst_addr); 106 ethhdr->h_proto = htons(ETH_P_BATMAN); 107 108 skb_set_network_header(skb, ETH_HLEN); 109 skb->protocol = htons(ETH_P_BATMAN); 110 111 skb->dev = hard_iface->net_dev; 112 113 /* Save a clone of the skb to use when decoding coded packets */ 114 batadv_nc_skb_store_for_decoding(bat_priv, skb); 115 116 /* dev_queue_xmit() returns a negative result on error. However on 117 * congestion and traffic shaping, it drops and returns NET_XMIT_DROP 118 * (which is > 0). This will not be treated as an error. 119 */ 120 ret = dev_queue_xmit(skb); 121 return net_xmit_eval(ret); 122 send_skb_err: 123 kfree_skb(skb); 124 return NET_XMIT_DROP; 125 } 126 127 int batadv_send_broadcast_skb(struct sk_buff *skb, 128 struct batadv_hard_iface *hard_iface) 129 { 130 return batadv_send_skb_packet(skb, hard_iface, batadv_broadcast_addr); 131 } 132 133 int batadv_send_unicast_skb(struct sk_buff *skb, 134 struct batadv_neigh_node *neigh) 135 { 136 #ifdef CONFIG_BATMAN_ADV_BATMAN_V 137 struct batadv_hardif_neigh_node *hardif_neigh; 138 #endif 139 int ret; 140 141 ret = batadv_send_skb_packet(skb, neigh->if_incoming, neigh->addr); 142 143 #ifdef CONFIG_BATMAN_ADV_BATMAN_V 144 hardif_neigh = batadv_hardif_neigh_get(neigh->if_incoming, neigh->addr); 145 146 if (hardif_neigh && ret != NET_XMIT_DROP) 147 hardif_neigh->bat_v.last_unicast_tx = jiffies; 148 149 if (hardif_neigh) 150 batadv_hardif_neigh_put(hardif_neigh); 151 #endif 152 153 return ret; 154 } 155 156 /** 157 * batadv_send_skb_to_orig - Lookup next-hop and transmit skb. 158 * @skb: Packet to be transmitted. 159 * @orig_node: Final destination of the packet. 160 * @recv_if: Interface used when receiving the packet (can be NULL). 161 * 162 * Looks up the best next-hop towards the passed originator and passes the 163 * skb on for preparation of MAC header. If the packet originated from this 164 * host, NULL can be passed as recv_if and no interface alternating is 165 * attempted. 166 * 167 * Return: negative errno code on a failure, -EINPROGRESS if the skb is 168 * buffered for later transmit or the NET_XMIT status returned by the 169 * lower routine if the packet has been passed down. 170 */ 171 int batadv_send_skb_to_orig(struct sk_buff *skb, 172 struct batadv_orig_node *orig_node, 173 struct batadv_hard_iface *recv_if) 174 { 175 struct batadv_priv *bat_priv = orig_node->bat_priv; 176 struct batadv_neigh_node *neigh_node; 177 int ret; 178 179 /* batadv_find_router() increases neigh_nodes refcount if found. */ 180 neigh_node = batadv_find_router(bat_priv, orig_node, recv_if); 181 if (!neigh_node) { 182 ret = -EINVAL; 183 goto free_skb; 184 } 185 186 /* Check if the skb is too large to send in one piece and fragment 187 * it if needed. 188 */ 189 if (atomic_read(&bat_priv->fragmentation) && 190 skb->len > neigh_node->if_incoming->net_dev->mtu) { 191 /* Fragment and send packet. */ 192 ret = batadv_frag_send_packet(skb, orig_node, neigh_node); 193 /* skb was consumed */ 194 skb = NULL; 195 196 goto put_neigh_node; 197 } 198 199 /* try to network code the packet, if it is received on an interface 200 * (i.e. being forwarded). If the packet originates from this node or if 201 * network coding fails, then send the packet as usual. 202 */ 203 if (recv_if && batadv_nc_skb_forward(skb, neigh_node)) 204 ret = -EINPROGRESS; 205 else 206 ret = batadv_send_unicast_skb(skb, neigh_node); 207 208 /* skb was consumed */ 209 skb = NULL; 210 211 put_neigh_node: 212 batadv_neigh_node_put(neigh_node); 213 free_skb: 214 kfree_skb(skb); 215 216 return ret; 217 } 218 219 /** 220 * batadv_send_skb_push_fill_unicast - extend the buffer and initialize the 221 * common fields for unicast packets 222 * @skb: the skb carrying the unicast header to initialize 223 * @hdr_size: amount of bytes to push at the beginning of the skb 224 * @orig_node: the destination node 225 * 226 * Return: false if the buffer extension was not possible or true otherwise. 227 */ 228 static bool 229 batadv_send_skb_push_fill_unicast(struct sk_buff *skb, int hdr_size, 230 struct batadv_orig_node *orig_node) 231 { 232 struct batadv_unicast_packet *unicast_packet; 233 u8 ttvn = (u8)atomic_read(&orig_node->last_ttvn); 234 235 if (batadv_skb_head_push(skb, hdr_size) < 0) 236 return false; 237 238 unicast_packet = (struct batadv_unicast_packet *)skb->data; 239 unicast_packet->version = BATADV_COMPAT_VERSION; 240 /* batman packet type: unicast */ 241 unicast_packet->packet_type = BATADV_UNICAST; 242 /* set unicast ttl */ 243 unicast_packet->ttl = BATADV_TTL; 244 /* copy the destination for faster routing */ 245 ether_addr_copy(unicast_packet->dest, orig_node->orig); 246 /* set the destination tt version number */ 247 unicast_packet->ttvn = ttvn; 248 249 return true; 250 } 251 252 /** 253 * batadv_send_skb_prepare_unicast - encapsulate an skb with a unicast header 254 * @skb: the skb containing the payload to encapsulate 255 * @orig_node: the destination node 256 * 257 * Return: false if the payload could not be encapsulated or true otherwise. 258 */ 259 static bool batadv_send_skb_prepare_unicast(struct sk_buff *skb, 260 struct batadv_orig_node *orig_node) 261 { 262 size_t uni_size = sizeof(struct batadv_unicast_packet); 263 264 return batadv_send_skb_push_fill_unicast(skb, uni_size, orig_node); 265 } 266 267 /** 268 * batadv_send_skb_prepare_unicast_4addr - encapsulate an skb with a 269 * unicast 4addr header 270 * @bat_priv: the bat priv with all the soft interface information 271 * @skb: the skb containing the payload to encapsulate 272 * @orig: the destination node 273 * @packet_subtype: the unicast 4addr packet subtype to use 274 * 275 * Return: false if the payload could not be encapsulated or true otherwise. 276 */ 277 bool batadv_send_skb_prepare_unicast_4addr(struct batadv_priv *bat_priv, 278 struct sk_buff *skb, 279 struct batadv_orig_node *orig, 280 int packet_subtype) 281 { 282 struct batadv_hard_iface *primary_if; 283 struct batadv_unicast_4addr_packet *uc_4addr_packet; 284 bool ret = false; 285 286 primary_if = batadv_primary_if_get_selected(bat_priv); 287 if (!primary_if) 288 goto out; 289 290 /* Pull the header space and fill the unicast_packet substructure. 291 * We can do that because the first member of the uc_4addr_packet 292 * is of type struct unicast_packet 293 */ 294 if (!batadv_send_skb_push_fill_unicast(skb, sizeof(*uc_4addr_packet), 295 orig)) 296 goto out; 297 298 uc_4addr_packet = (struct batadv_unicast_4addr_packet *)skb->data; 299 uc_4addr_packet->u.packet_type = BATADV_UNICAST_4ADDR; 300 ether_addr_copy(uc_4addr_packet->src, primary_if->net_dev->dev_addr); 301 uc_4addr_packet->subtype = packet_subtype; 302 uc_4addr_packet->reserved = 0; 303 304 ret = true; 305 out: 306 if (primary_if) 307 batadv_hardif_put(primary_if); 308 return ret; 309 } 310 311 /** 312 * batadv_send_skb_unicast - encapsulate and send an skb via unicast 313 * @bat_priv: the bat priv with all the soft interface information 314 * @skb: payload to send 315 * @packet_type: the batman unicast packet type to use 316 * @packet_subtype: the unicast 4addr packet subtype (only relevant for unicast 317 * 4addr packets) 318 * @orig_node: the originator to send the packet to 319 * @vid: the vid to be used to search the translation table 320 * 321 * Wrap the given skb into a batman-adv unicast or unicast-4addr header 322 * depending on whether BATADV_UNICAST or BATADV_UNICAST_4ADDR was supplied 323 * as packet_type. Then send this frame to the given orig_node. 324 * 325 * Return: NET_XMIT_DROP in case of error or NET_XMIT_SUCCESS otherwise. 326 */ 327 int batadv_send_skb_unicast(struct batadv_priv *bat_priv, 328 struct sk_buff *skb, int packet_type, 329 int packet_subtype, 330 struct batadv_orig_node *orig_node, 331 unsigned short vid) 332 { 333 struct batadv_unicast_packet *unicast_packet; 334 struct ethhdr *ethhdr; 335 int ret = NET_XMIT_DROP; 336 337 if (!orig_node) 338 goto out; 339 340 switch (packet_type) { 341 case BATADV_UNICAST: 342 if (!batadv_send_skb_prepare_unicast(skb, orig_node)) 343 goto out; 344 break; 345 case BATADV_UNICAST_4ADDR: 346 if (!batadv_send_skb_prepare_unicast_4addr(bat_priv, skb, 347 orig_node, 348 packet_subtype)) 349 goto out; 350 break; 351 default: 352 /* this function supports UNICAST and UNICAST_4ADDR only. It 353 * should never be invoked with any other packet type 354 */ 355 goto out; 356 } 357 358 /* skb->data might have been reallocated by 359 * batadv_send_skb_prepare_unicast{,_4addr}() 360 */ 361 ethhdr = eth_hdr(skb); 362 unicast_packet = (struct batadv_unicast_packet *)skb->data; 363 364 /* inform the destination node that we are still missing a correct route 365 * for this client. The destination will receive this packet and will 366 * try to reroute it because the ttvn contained in the header is less 367 * than the current one 368 */ 369 if (batadv_tt_global_client_is_roaming(bat_priv, ethhdr->h_dest, vid)) 370 unicast_packet->ttvn = unicast_packet->ttvn - 1; 371 372 ret = batadv_send_skb_to_orig(skb, orig_node, NULL); 373 /* skb was consumed */ 374 skb = NULL; 375 376 out: 377 kfree_skb(skb); 378 return ret; 379 } 380 381 /** 382 * batadv_send_skb_via_tt_generic - send an skb via TT lookup 383 * @bat_priv: the bat priv with all the soft interface information 384 * @skb: payload to send 385 * @packet_type: the batman unicast packet type to use 386 * @packet_subtype: the unicast 4addr packet subtype (only relevant for unicast 387 * 4addr packets) 388 * @dst_hint: can be used to override the destination contained in the skb 389 * @vid: the vid to be used to search the translation table 390 * 391 * Look up the recipient node for the destination address in the ethernet 392 * header via the translation table. Wrap the given skb into a batman-adv 393 * unicast or unicast-4addr header depending on whether BATADV_UNICAST or 394 * BATADV_UNICAST_4ADDR was supplied as packet_type. Then send this frame 395 * to the according destination node. 396 * 397 * Return: NET_XMIT_DROP in case of error or NET_XMIT_SUCCESS otherwise. 398 */ 399 int batadv_send_skb_via_tt_generic(struct batadv_priv *bat_priv, 400 struct sk_buff *skb, int packet_type, 401 int packet_subtype, u8 *dst_hint, 402 unsigned short vid) 403 { 404 struct ethhdr *ethhdr = (struct ethhdr *)skb->data; 405 struct batadv_orig_node *orig_node; 406 u8 *src, *dst; 407 int ret; 408 409 src = ethhdr->h_source; 410 dst = ethhdr->h_dest; 411 412 /* if we got an hint! let's send the packet to this client (if any) */ 413 if (dst_hint) { 414 src = NULL; 415 dst = dst_hint; 416 } 417 orig_node = batadv_transtable_search(bat_priv, src, dst, vid); 418 419 ret = batadv_send_skb_unicast(bat_priv, skb, packet_type, 420 packet_subtype, orig_node, vid); 421 422 if (orig_node) 423 batadv_orig_node_put(orig_node); 424 425 return ret; 426 } 427 428 /** 429 * batadv_send_skb_via_gw - send an skb via gateway lookup 430 * @bat_priv: the bat priv with all the soft interface information 431 * @skb: payload to send 432 * @vid: the vid to be used to search the translation table 433 * 434 * Look up the currently selected gateway. Wrap the given skb into a batman-adv 435 * unicast header and send this frame to this gateway node. 436 * 437 * Return: NET_XMIT_DROP in case of error or NET_XMIT_SUCCESS otherwise. 438 */ 439 int batadv_send_skb_via_gw(struct batadv_priv *bat_priv, struct sk_buff *skb, 440 unsigned short vid) 441 { 442 struct batadv_orig_node *orig_node; 443 int ret; 444 445 orig_node = batadv_gw_get_selected_orig(bat_priv); 446 ret = batadv_send_skb_unicast(bat_priv, skb, BATADV_UNICAST_4ADDR, 447 BATADV_P_DATA, orig_node, vid); 448 449 if (orig_node) 450 batadv_orig_node_put(orig_node); 451 452 return ret; 453 } 454 455 /** 456 * batadv_forw_packet_free - free a forwarding packet 457 * @forw_packet: The packet to free 458 * @dropped: whether the packet is freed because is is dropped 459 * 460 * This frees a forwarding packet and releases any resources it might 461 * have claimed. 462 */ 463 void batadv_forw_packet_free(struct batadv_forw_packet *forw_packet, 464 bool dropped) 465 { 466 if (dropped) 467 kfree_skb(forw_packet->skb); 468 else 469 consume_skb(forw_packet->skb); 470 471 if (forw_packet->if_incoming) 472 batadv_hardif_put(forw_packet->if_incoming); 473 if (forw_packet->if_outgoing) 474 batadv_hardif_put(forw_packet->if_outgoing); 475 if (forw_packet->queue_left) 476 atomic_inc(forw_packet->queue_left); 477 kfree(forw_packet); 478 } 479 480 /** 481 * batadv_forw_packet_alloc - allocate a forwarding packet 482 * @if_incoming: The (optional) if_incoming to be grabbed 483 * @if_outgoing: The (optional) if_outgoing to be grabbed 484 * @queue_left: The (optional) queue counter to decrease 485 * @bat_priv: The bat_priv for the mesh of this forw_packet 486 * @skb: The raw packet this forwarding packet shall contain 487 * 488 * Allocates a forwarding packet and tries to get a reference to the 489 * (optional) if_incoming, if_outgoing and queue_left. If queue_left 490 * is NULL then bat_priv is optional, too. 491 * 492 * Return: An allocated forwarding packet on success, NULL otherwise. 493 */ 494 struct batadv_forw_packet * 495 batadv_forw_packet_alloc(struct batadv_hard_iface *if_incoming, 496 struct batadv_hard_iface *if_outgoing, 497 atomic_t *queue_left, 498 struct batadv_priv *bat_priv, 499 struct sk_buff *skb) 500 { 501 struct batadv_forw_packet *forw_packet; 502 const char *qname; 503 504 if (queue_left && !batadv_atomic_dec_not_zero(queue_left)) { 505 qname = "unknown"; 506 507 if (queue_left == &bat_priv->bcast_queue_left) 508 qname = "bcast"; 509 510 if (queue_left == &bat_priv->batman_queue_left) 511 qname = "batman"; 512 513 batadv_dbg(BATADV_DBG_BATMAN, bat_priv, 514 "%s queue is full\n", qname); 515 516 return NULL; 517 } 518 519 forw_packet = kmalloc(sizeof(*forw_packet), GFP_ATOMIC); 520 if (!forw_packet) 521 goto err; 522 523 if (if_incoming) 524 kref_get(&if_incoming->refcount); 525 526 if (if_outgoing) 527 kref_get(&if_outgoing->refcount); 528 529 INIT_HLIST_NODE(&forw_packet->list); 530 INIT_HLIST_NODE(&forw_packet->cleanup_list); 531 forw_packet->skb = skb; 532 forw_packet->queue_left = queue_left; 533 forw_packet->if_incoming = if_incoming; 534 forw_packet->if_outgoing = if_outgoing; 535 forw_packet->num_packets = 0; 536 537 return forw_packet; 538 539 err: 540 if (queue_left) 541 atomic_inc(queue_left); 542 543 return NULL; 544 } 545 546 /** 547 * batadv_forw_packet_was_stolen - check whether someone stole this packet 548 * @forw_packet: the forwarding packet to check 549 * 550 * This function checks whether the given forwarding packet was claimed by 551 * someone else for free(). 552 * 553 * Return: True if someone stole it, false otherwise. 554 */ 555 static bool 556 batadv_forw_packet_was_stolen(struct batadv_forw_packet *forw_packet) 557 { 558 return !hlist_unhashed(&forw_packet->cleanup_list); 559 } 560 561 /** 562 * batadv_forw_packet_steal - claim a forw_packet for free() 563 * @forw_packet: the forwarding packet to steal 564 * @lock: a key to the store to steal from (e.g. forw_{bat,bcast}_list_lock) 565 * 566 * This function tries to steal a specific forw_packet from global 567 * visibility for the purpose of getting it for free(). That means 568 * the caller is *not* allowed to requeue it afterwards. 569 * 570 * Return: True if stealing was successful. False if someone else stole it 571 * before us. 572 */ 573 bool batadv_forw_packet_steal(struct batadv_forw_packet *forw_packet, 574 spinlock_t *lock) 575 { 576 /* did purging routine steal it earlier? */ 577 spin_lock_bh(lock); 578 if (batadv_forw_packet_was_stolen(forw_packet)) { 579 spin_unlock_bh(lock); 580 return false; 581 } 582 583 hlist_del_init(&forw_packet->list); 584 585 /* Just to spot misuse of this function */ 586 hlist_add_fake(&forw_packet->cleanup_list); 587 588 spin_unlock_bh(lock); 589 return true; 590 } 591 592 /** 593 * batadv_forw_packet_list_steal - claim a list of forward packets for free() 594 * @forw_list: the to be stolen forward packets 595 * @cleanup_list: a backup pointer, to be able to dispose the packet later 596 * @hard_iface: the interface to steal forward packets from 597 * 598 * This function claims responsibility to free any forw_packet queued on the 599 * given hard_iface. If hard_iface is NULL forwarding packets on all hard 600 * interfaces will be claimed. 601 * 602 * The packets are being moved from the forw_list to the cleanup_list and 603 * by that allows already running threads to notice the claiming. 604 */ 605 static void 606 batadv_forw_packet_list_steal(struct hlist_head *forw_list, 607 struct hlist_head *cleanup_list, 608 const struct batadv_hard_iface *hard_iface) 609 { 610 struct batadv_forw_packet *forw_packet; 611 struct hlist_node *safe_tmp_node; 612 613 hlist_for_each_entry_safe(forw_packet, safe_tmp_node, 614 forw_list, list) { 615 /* if purge_outstanding_packets() was called with an argument 616 * we delete only packets belonging to the given interface 617 */ 618 if (hard_iface && 619 forw_packet->if_incoming != hard_iface && 620 forw_packet->if_outgoing != hard_iface) 621 continue; 622 623 hlist_del(&forw_packet->list); 624 hlist_add_head(&forw_packet->cleanup_list, cleanup_list); 625 } 626 } 627 628 /** 629 * batadv_forw_packet_list_free - free a list of forward packets 630 * @head: a list of to be freed forw_packets 631 * 632 * This function cancels the scheduling of any packet in the provided list, 633 * waits for any possibly running packet forwarding thread to finish and 634 * finally, safely frees this forward packet. 635 * 636 * This function might sleep. 637 */ 638 static void batadv_forw_packet_list_free(struct hlist_head *head) 639 { 640 struct batadv_forw_packet *forw_packet; 641 struct hlist_node *safe_tmp_node; 642 643 hlist_for_each_entry_safe(forw_packet, safe_tmp_node, head, 644 cleanup_list) { 645 cancel_delayed_work_sync(&forw_packet->delayed_work); 646 647 hlist_del(&forw_packet->cleanup_list); 648 batadv_forw_packet_free(forw_packet, true); 649 } 650 } 651 652 /** 653 * batadv_forw_packet_queue - try to queue a forwarding packet 654 * @forw_packet: the forwarding packet to queue 655 * @lock: a key to the store (e.g. forw_{bat,bcast}_list_lock) 656 * @head: the shelve to queue it on (e.g. forw_{bat,bcast}_list) 657 * @send_time: timestamp (jiffies) when the packet is to be sent 658 * 659 * This function tries to (re)queue a forwarding packet. Requeuing 660 * is prevented if the according interface is shutting down 661 * (e.g. if batadv_forw_packet_list_steal() was called for this 662 * packet earlier). 663 * 664 * Calling batadv_forw_packet_queue() after a call to 665 * batadv_forw_packet_steal() is forbidden! 666 * 667 * Caller needs to ensure that forw_packet->delayed_work was initialized. 668 */ 669 static void batadv_forw_packet_queue(struct batadv_forw_packet *forw_packet, 670 spinlock_t *lock, struct hlist_head *head, 671 unsigned long send_time) 672 { 673 spin_lock_bh(lock); 674 675 /* did purging routine steal it from us? */ 676 if (batadv_forw_packet_was_stolen(forw_packet)) { 677 /* If you got it for free() without trouble, then 678 * don't get back into the queue after stealing... 679 */ 680 WARN_ONCE(hlist_fake(&forw_packet->cleanup_list), 681 "Requeuing after batadv_forw_packet_steal() not allowed!\n"); 682 683 spin_unlock_bh(lock); 684 return; 685 } 686 687 hlist_del_init(&forw_packet->list); 688 hlist_add_head(&forw_packet->list, head); 689 690 queue_delayed_work(batadv_event_workqueue, 691 &forw_packet->delayed_work, 692 send_time - jiffies); 693 spin_unlock_bh(lock); 694 } 695 696 /** 697 * batadv_forw_packet_bcast_queue - try to queue a broadcast packet 698 * @bat_priv: the bat priv with all the soft interface information 699 * @forw_packet: the forwarding packet to queue 700 * @send_time: timestamp (jiffies) when the packet is to be sent 701 * 702 * This function tries to (re)queue a broadcast packet. 703 * 704 * Caller needs to ensure that forw_packet->delayed_work was initialized. 705 */ 706 static void 707 batadv_forw_packet_bcast_queue(struct batadv_priv *bat_priv, 708 struct batadv_forw_packet *forw_packet, 709 unsigned long send_time) 710 { 711 batadv_forw_packet_queue(forw_packet, &bat_priv->forw_bcast_list_lock, 712 &bat_priv->forw_bcast_list, send_time); 713 } 714 715 /** 716 * batadv_forw_packet_ogmv1_queue - try to queue an OGMv1 packet 717 * @bat_priv: the bat priv with all the soft interface information 718 * @forw_packet: the forwarding packet to queue 719 * @send_time: timestamp (jiffies) when the packet is to be sent 720 * 721 * This function tries to (re)queue an OGMv1 packet. 722 * 723 * Caller needs to ensure that forw_packet->delayed_work was initialized. 724 */ 725 void batadv_forw_packet_ogmv1_queue(struct batadv_priv *bat_priv, 726 struct batadv_forw_packet *forw_packet, 727 unsigned long send_time) 728 { 729 batadv_forw_packet_queue(forw_packet, &bat_priv->forw_bat_list_lock, 730 &bat_priv->forw_bat_list, send_time); 731 } 732 733 /** 734 * batadv_add_bcast_packet_to_list - queue broadcast packet for multiple sends 735 * @bat_priv: the bat priv with all the soft interface information 736 * @skb: broadcast packet to add 737 * @delay: number of jiffies to wait before sending 738 * @own_packet: true if it is a self-generated broadcast packet 739 * 740 * add a broadcast packet to the queue and setup timers. broadcast packets 741 * are sent multiple times to increase probability for being received. 742 * 743 * The skb is not consumed, so the caller should make sure that the 744 * skb is freed. 745 * 746 * Return: NETDEV_TX_OK on success and NETDEV_TX_BUSY on errors. 747 */ 748 int batadv_add_bcast_packet_to_list(struct batadv_priv *bat_priv, 749 const struct sk_buff *skb, 750 unsigned long delay, 751 bool own_packet) 752 { 753 struct batadv_hard_iface *primary_if; 754 struct batadv_forw_packet *forw_packet; 755 struct batadv_bcast_packet *bcast_packet; 756 struct sk_buff *newskb; 757 758 primary_if = batadv_primary_if_get_selected(bat_priv); 759 if (!primary_if) 760 goto err; 761 762 newskb = skb_copy(skb, GFP_ATOMIC); 763 if (!newskb) { 764 batadv_hardif_put(primary_if); 765 goto err; 766 } 767 768 forw_packet = batadv_forw_packet_alloc(primary_if, NULL, 769 &bat_priv->bcast_queue_left, 770 bat_priv, newskb); 771 batadv_hardif_put(primary_if); 772 if (!forw_packet) 773 goto err_packet_free; 774 775 /* as we have a copy now, it is safe to decrease the TTL */ 776 bcast_packet = (struct batadv_bcast_packet *)newskb->data; 777 bcast_packet->ttl--; 778 779 forw_packet->own = own_packet; 780 781 INIT_DELAYED_WORK(&forw_packet->delayed_work, 782 batadv_send_outstanding_bcast_packet); 783 784 batadv_forw_packet_bcast_queue(bat_priv, forw_packet, jiffies + delay); 785 return NETDEV_TX_OK; 786 787 err_packet_free: 788 kfree_skb(newskb); 789 err: 790 return NETDEV_TX_BUSY; 791 } 792 793 /** 794 * batadv_forw_packet_bcasts_left - check if a retransmission is necessary 795 * @forw_packet: the forwarding packet to check 796 * @hard_iface: the interface to check on 797 * 798 * Checks whether a given packet has any (re)transmissions left on the provided 799 * interface. 800 * 801 * hard_iface may be NULL: In that case the number of transmissions this skb had 802 * so far is compared with the maximum amount of retransmissions independent of 803 * any interface instead. 804 * 805 * Return: True if (re)transmissions are left, false otherwise. 806 */ 807 static bool 808 batadv_forw_packet_bcasts_left(struct batadv_forw_packet *forw_packet, 809 struct batadv_hard_iface *hard_iface) 810 { 811 unsigned int max; 812 813 if (hard_iface) 814 max = hard_iface->num_bcasts; 815 else 816 max = BATADV_NUM_BCASTS_MAX; 817 818 return BATADV_SKB_CB(forw_packet->skb)->num_bcasts < max; 819 } 820 821 /** 822 * batadv_forw_packet_bcasts_inc - increment retransmission counter of a packet 823 * @forw_packet: the packet to increase the counter for 824 */ 825 static void 826 batadv_forw_packet_bcasts_inc(struct batadv_forw_packet *forw_packet) 827 { 828 BATADV_SKB_CB(forw_packet->skb)->num_bcasts++; 829 } 830 831 /** 832 * batadv_forw_packet_is_rebroadcast - check packet for previous transmissions 833 * @forw_packet: the packet to check 834 * 835 * Return: True if this packet was transmitted before, false otherwise. 836 */ 837 bool batadv_forw_packet_is_rebroadcast(struct batadv_forw_packet *forw_packet) 838 { 839 return BATADV_SKB_CB(forw_packet->skb)->num_bcasts > 0; 840 } 841 842 static void batadv_send_outstanding_bcast_packet(struct work_struct *work) 843 { 844 struct batadv_hard_iface *hard_iface; 845 struct batadv_hardif_neigh_node *neigh_node; 846 struct delayed_work *delayed_work; 847 struct batadv_forw_packet *forw_packet; 848 struct batadv_bcast_packet *bcast_packet; 849 struct sk_buff *skb1; 850 struct net_device *soft_iface; 851 struct batadv_priv *bat_priv; 852 unsigned long send_time = jiffies + msecs_to_jiffies(5); 853 bool dropped = false; 854 u8 *neigh_addr; 855 u8 *orig_neigh; 856 int ret = 0; 857 858 delayed_work = to_delayed_work(work); 859 forw_packet = container_of(delayed_work, struct batadv_forw_packet, 860 delayed_work); 861 soft_iface = forw_packet->if_incoming->soft_iface; 862 bat_priv = netdev_priv(soft_iface); 863 864 if (atomic_read(&bat_priv->mesh_state) == BATADV_MESH_DEACTIVATING) { 865 dropped = true; 866 goto out; 867 } 868 869 if (batadv_dat_drop_broadcast_packet(bat_priv, forw_packet)) { 870 dropped = true; 871 goto out; 872 } 873 874 bcast_packet = (struct batadv_bcast_packet *)forw_packet->skb->data; 875 876 /* rebroadcast packet */ 877 rcu_read_lock(); 878 list_for_each_entry_rcu(hard_iface, &batadv_hardif_list, list) { 879 if (hard_iface->soft_iface != soft_iface) 880 continue; 881 882 if (!batadv_forw_packet_bcasts_left(forw_packet, hard_iface)) 883 continue; 884 885 if (forw_packet->own) { 886 neigh_node = NULL; 887 } else { 888 neigh_addr = eth_hdr(forw_packet->skb)->h_source; 889 neigh_node = batadv_hardif_neigh_get(hard_iface, 890 neigh_addr); 891 } 892 893 orig_neigh = neigh_node ? neigh_node->orig : NULL; 894 895 ret = batadv_hardif_no_broadcast(hard_iface, bcast_packet->orig, 896 orig_neigh); 897 898 if (ret) { 899 char *type; 900 901 switch (ret) { 902 case BATADV_HARDIF_BCAST_NORECIPIENT: 903 type = "no neighbor"; 904 break; 905 case BATADV_HARDIF_BCAST_DUPFWD: 906 type = "single neighbor is source"; 907 break; 908 case BATADV_HARDIF_BCAST_DUPORIG: 909 type = "single neighbor is originator"; 910 break; 911 default: 912 type = "unknown"; 913 } 914 915 batadv_dbg(BATADV_DBG_BATMAN, bat_priv, "BCAST packet from orig %pM on %s suppressed: %s\n", 916 bcast_packet->orig, 917 hard_iface->net_dev->name, type); 918 919 if (neigh_node) 920 batadv_hardif_neigh_put(neigh_node); 921 922 continue; 923 } 924 925 if (neigh_node) 926 batadv_hardif_neigh_put(neigh_node); 927 928 if (!kref_get_unless_zero(&hard_iface->refcount)) 929 continue; 930 931 /* send a copy of the saved skb */ 932 skb1 = skb_clone(forw_packet->skb, GFP_ATOMIC); 933 if (skb1) 934 batadv_send_broadcast_skb(skb1, hard_iface); 935 936 batadv_hardif_put(hard_iface); 937 } 938 rcu_read_unlock(); 939 940 batadv_forw_packet_bcasts_inc(forw_packet); 941 942 /* if we still have some more bcasts to send */ 943 if (batadv_forw_packet_bcasts_left(forw_packet, NULL)) { 944 batadv_forw_packet_bcast_queue(bat_priv, forw_packet, 945 send_time); 946 return; 947 } 948 949 out: 950 /* do we get something for free()? */ 951 if (batadv_forw_packet_steal(forw_packet, 952 &bat_priv->forw_bcast_list_lock)) 953 batadv_forw_packet_free(forw_packet, dropped); 954 } 955 956 /** 957 * batadv_purge_outstanding_packets - stop/purge scheduled bcast/OGMv1 packets 958 * @bat_priv: the bat priv with all the soft interface information 959 * @hard_iface: the hard interface to cancel and purge bcast/ogm packets on 960 * 961 * This method cancels and purges any broadcast and OGMv1 packet on the given 962 * hard_iface. If hard_iface is NULL, broadcast and OGMv1 packets on all hard 963 * interfaces will be canceled and purged. 964 * 965 * This function might sleep. 966 */ 967 void 968 batadv_purge_outstanding_packets(struct batadv_priv *bat_priv, 969 const struct batadv_hard_iface *hard_iface) 970 { 971 struct hlist_head head = HLIST_HEAD_INIT; 972 973 if (hard_iface) 974 batadv_dbg(BATADV_DBG_BATMAN, bat_priv, 975 "%s(): %s\n", 976 __func__, hard_iface->net_dev->name); 977 else 978 batadv_dbg(BATADV_DBG_BATMAN, bat_priv, 979 "%s()\n", __func__); 980 981 /* claim bcast list for free() */ 982 spin_lock_bh(&bat_priv->forw_bcast_list_lock); 983 batadv_forw_packet_list_steal(&bat_priv->forw_bcast_list, &head, 984 hard_iface); 985 spin_unlock_bh(&bat_priv->forw_bcast_list_lock); 986 987 /* claim batman packet list for free() */ 988 spin_lock_bh(&bat_priv->forw_bat_list_lock); 989 batadv_forw_packet_list_steal(&bat_priv->forw_bat_list, &head, 990 hard_iface); 991 spin_unlock_bh(&bat_priv->forw_bat_list_lock); 992 993 /* then cancel or wait for packet workers to finish and free */ 994 batadv_forw_packet_list_free(&head); 995 } 996