xref: /openbmc/linux/net/batman-adv/send.c (revision 7db7d9f369a47e1a46f93c320b45cb89e81723e7)
1 // SPDX-License-Identifier: GPL-2.0
2 /* Copyright (C) 2007-2017  B.A.T.M.A.N. contributors:
3  *
4  * Marek Lindner, Simon Wunderlich
5  *
6  * This program is free software; you can redistribute it and/or
7  * modify it under the terms of version 2 of the GNU General Public
8  * License as published by the Free Software Foundation.
9  *
10  * This program is distributed in the hope that it will be useful, but
11  * WITHOUT ANY WARRANTY; without even the implied warranty of
12  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13  * General Public License for more details.
14  *
15  * You should have received a copy of the GNU General Public License
16  * along with this program; if not, see <http://www.gnu.org/licenses/>.
17  */
18 
19 #include "send.h"
20 #include "main.h"
21 
22 #include <linux/atomic.h>
23 #include <linux/bug.h>
24 #include <linux/byteorder/generic.h>
25 #include <linux/errno.h>
26 #include <linux/etherdevice.h>
27 #include <linux/fs.h>
28 #include <linux/if.h>
29 #include <linux/if_ether.h>
30 #include <linux/jiffies.h>
31 #include <linux/kernel.h>
32 #include <linux/kref.h>
33 #include <linux/list.h>
34 #include <linux/netdevice.h>
35 #include <linux/printk.h>
36 #include <linux/rculist.h>
37 #include <linux/rcupdate.h>
38 #include <linux/skbuff.h>
39 #include <linux/slab.h>
40 #include <linux/spinlock.h>
41 #include <linux/stddef.h>
42 #include <linux/workqueue.h>
43 
44 #include "distributed-arp-table.h"
45 #include "fragmentation.h"
46 #include "gateway_client.h"
47 #include "hard-interface.h"
48 #include "log.h"
49 #include "network-coding.h"
50 #include "originator.h"
51 #include "routing.h"
52 #include "soft-interface.h"
53 #include "translation-table.h"
54 
55 static void batadv_send_outstanding_bcast_packet(struct work_struct *work);
56 
57 /**
58  * batadv_send_skb_packet - send an already prepared packet
59  * @skb: the packet to send
60  * @hard_iface: the interface to use to send the broadcast packet
61  * @dst_addr: the payload destination
62  *
63  * Send out an already prepared packet to the given neighbor or broadcast it
64  * using the specified interface. Either hard_iface or neigh_node must be not
65  * NULL.
66  * If neigh_node is NULL, then the packet is broadcasted using hard_iface,
67  * otherwise it is sent as unicast to the given neighbor.
68  *
69  * Regardless of the return value, the skb is consumed.
70  *
71  * Return: A negative errno code is returned on a failure. A success does not
72  * guarantee the frame will be transmitted as it may be dropped due
73  * to congestion or traffic shaping.
74  */
75 int batadv_send_skb_packet(struct sk_buff *skb,
76 			   struct batadv_hard_iface *hard_iface,
77 			   const u8 *dst_addr)
78 {
79 	struct batadv_priv *bat_priv;
80 	struct ethhdr *ethhdr;
81 	int ret;
82 
83 	bat_priv = netdev_priv(hard_iface->soft_iface);
84 
85 	if (hard_iface->if_status != BATADV_IF_ACTIVE)
86 		goto send_skb_err;
87 
88 	if (unlikely(!hard_iface->net_dev))
89 		goto send_skb_err;
90 
91 	if (!(hard_iface->net_dev->flags & IFF_UP)) {
92 		pr_warn("Interface %s is not up - can't send packet via that interface!\n",
93 			hard_iface->net_dev->name);
94 		goto send_skb_err;
95 	}
96 
97 	/* push to the ethernet header. */
98 	if (batadv_skb_head_push(skb, ETH_HLEN) < 0)
99 		goto send_skb_err;
100 
101 	skb_reset_mac_header(skb);
102 
103 	ethhdr = eth_hdr(skb);
104 	ether_addr_copy(ethhdr->h_source, hard_iface->net_dev->dev_addr);
105 	ether_addr_copy(ethhdr->h_dest, dst_addr);
106 	ethhdr->h_proto = htons(ETH_P_BATMAN);
107 
108 	skb_set_network_header(skb, ETH_HLEN);
109 	skb->protocol = htons(ETH_P_BATMAN);
110 
111 	skb->dev = hard_iface->net_dev;
112 
113 	/* Save a clone of the skb to use when decoding coded packets */
114 	batadv_nc_skb_store_for_decoding(bat_priv, skb);
115 
116 	/* dev_queue_xmit() returns a negative result on error.	 However on
117 	 * congestion and traffic shaping, it drops and returns NET_XMIT_DROP
118 	 * (which is > 0). This will not be treated as an error.
119 	 */
120 	ret = dev_queue_xmit(skb);
121 	return net_xmit_eval(ret);
122 send_skb_err:
123 	kfree_skb(skb);
124 	return NET_XMIT_DROP;
125 }
126 
127 int batadv_send_broadcast_skb(struct sk_buff *skb,
128 			      struct batadv_hard_iface *hard_iface)
129 {
130 	return batadv_send_skb_packet(skb, hard_iface, batadv_broadcast_addr);
131 }
132 
133 int batadv_send_unicast_skb(struct sk_buff *skb,
134 			    struct batadv_neigh_node *neigh)
135 {
136 #ifdef CONFIG_BATMAN_ADV_BATMAN_V
137 	struct batadv_hardif_neigh_node *hardif_neigh;
138 #endif
139 	int ret;
140 
141 	ret = batadv_send_skb_packet(skb, neigh->if_incoming, neigh->addr);
142 
143 #ifdef CONFIG_BATMAN_ADV_BATMAN_V
144 	hardif_neigh = batadv_hardif_neigh_get(neigh->if_incoming, neigh->addr);
145 
146 	if (hardif_neigh && ret != NET_XMIT_DROP)
147 		hardif_neigh->bat_v.last_unicast_tx = jiffies;
148 
149 	if (hardif_neigh)
150 		batadv_hardif_neigh_put(hardif_neigh);
151 #endif
152 
153 	return ret;
154 }
155 
156 /**
157  * batadv_send_skb_to_orig - Lookup next-hop and transmit skb.
158  * @skb: Packet to be transmitted.
159  * @orig_node: Final destination of the packet.
160  * @recv_if: Interface used when receiving the packet (can be NULL).
161  *
162  * Looks up the best next-hop towards the passed originator and passes the
163  * skb on for preparation of MAC header. If the packet originated from this
164  * host, NULL can be passed as recv_if and no interface alternating is
165  * attempted.
166  *
167  * Return: negative errno code on a failure, -EINPROGRESS if the skb is
168  * buffered for later transmit or the NET_XMIT status returned by the
169  * lower routine if the packet has been passed down.
170  */
171 int batadv_send_skb_to_orig(struct sk_buff *skb,
172 			    struct batadv_orig_node *orig_node,
173 			    struct batadv_hard_iface *recv_if)
174 {
175 	struct batadv_priv *bat_priv = orig_node->bat_priv;
176 	struct batadv_neigh_node *neigh_node;
177 	int ret;
178 
179 	/* batadv_find_router() increases neigh_nodes refcount if found. */
180 	neigh_node = batadv_find_router(bat_priv, orig_node, recv_if);
181 	if (!neigh_node) {
182 		ret = -EINVAL;
183 		goto free_skb;
184 	}
185 
186 	/* Check if the skb is too large to send in one piece and fragment
187 	 * it if needed.
188 	 */
189 	if (atomic_read(&bat_priv->fragmentation) &&
190 	    skb->len > neigh_node->if_incoming->net_dev->mtu) {
191 		/* Fragment and send packet. */
192 		ret = batadv_frag_send_packet(skb, orig_node, neigh_node);
193 		/* skb was consumed */
194 		skb = NULL;
195 
196 		goto put_neigh_node;
197 	}
198 
199 	/* try to network code the packet, if it is received on an interface
200 	 * (i.e. being forwarded). If the packet originates from this node or if
201 	 * network coding fails, then send the packet as usual.
202 	 */
203 	if (recv_if && batadv_nc_skb_forward(skb, neigh_node))
204 		ret = -EINPROGRESS;
205 	else
206 		ret = batadv_send_unicast_skb(skb, neigh_node);
207 
208 	/* skb was consumed */
209 	skb = NULL;
210 
211 put_neigh_node:
212 	batadv_neigh_node_put(neigh_node);
213 free_skb:
214 	kfree_skb(skb);
215 
216 	return ret;
217 }
218 
219 /**
220  * batadv_send_skb_push_fill_unicast - extend the buffer and initialize the
221  *  common fields for unicast packets
222  * @skb: the skb carrying the unicast header to initialize
223  * @hdr_size: amount of bytes to push at the beginning of the skb
224  * @orig_node: the destination node
225  *
226  * Return: false if the buffer extension was not possible or true otherwise.
227  */
228 static bool
229 batadv_send_skb_push_fill_unicast(struct sk_buff *skb, int hdr_size,
230 				  struct batadv_orig_node *orig_node)
231 {
232 	struct batadv_unicast_packet *unicast_packet;
233 	u8 ttvn = (u8)atomic_read(&orig_node->last_ttvn);
234 
235 	if (batadv_skb_head_push(skb, hdr_size) < 0)
236 		return false;
237 
238 	unicast_packet = (struct batadv_unicast_packet *)skb->data;
239 	unicast_packet->version = BATADV_COMPAT_VERSION;
240 	/* batman packet type: unicast */
241 	unicast_packet->packet_type = BATADV_UNICAST;
242 	/* set unicast ttl */
243 	unicast_packet->ttl = BATADV_TTL;
244 	/* copy the destination for faster routing */
245 	ether_addr_copy(unicast_packet->dest, orig_node->orig);
246 	/* set the destination tt version number */
247 	unicast_packet->ttvn = ttvn;
248 
249 	return true;
250 }
251 
252 /**
253  * batadv_send_skb_prepare_unicast - encapsulate an skb with a unicast header
254  * @skb: the skb containing the payload to encapsulate
255  * @orig_node: the destination node
256  *
257  * Return: false if the payload could not be encapsulated or true otherwise.
258  */
259 static bool batadv_send_skb_prepare_unicast(struct sk_buff *skb,
260 					    struct batadv_orig_node *orig_node)
261 {
262 	size_t uni_size = sizeof(struct batadv_unicast_packet);
263 
264 	return batadv_send_skb_push_fill_unicast(skb, uni_size, orig_node);
265 }
266 
267 /**
268  * batadv_send_skb_prepare_unicast_4addr - encapsulate an skb with a
269  *  unicast 4addr header
270  * @bat_priv: the bat priv with all the soft interface information
271  * @skb: the skb containing the payload to encapsulate
272  * @orig: the destination node
273  * @packet_subtype: the unicast 4addr packet subtype to use
274  *
275  * Return: false if the payload could not be encapsulated or true otherwise.
276  */
277 bool batadv_send_skb_prepare_unicast_4addr(struct batadv_priv *bat_priv,
278 					   struct sk_buff *skb,
279 					   struct batadv_orig_node *orig,
280 					   int packet_subtype)
281 {
282 	struct batadv_hard_iface *primary_if;
283 	struct batadv_unicast_4addr_packet *uc_4addr_packet;
284 	bool ret = false;
285 
286 	primary_if = batadv_primary_if_get_selected(bat_priv);
287 	if (!primary_if)
288 		goto out;
289 
290 	/* Pull the header space and fill the unicast_packet substructure.
291 	 * We can do that because the first member of the uc_4addr_packet
292 	 * is of type struct unicast_packet
293 	 */
294 	if (!batadv_send_skb_push_fill_unicast(skb, sizeof(*uc_4addr_packet),
295 					       orig))
296 		goto out;
297 
298 	uc_4addr_packet = (struct batadv_unicast_4addr_packet *)skb->data;
299 	uc_4addr_packet->u.packet_type = BATADV_UNICAST_4ADDR;
300 	ether_addr_copy(uc_4addr_packet->src, primary_if->net_dev->dev_addr);
301 	uc_4addr_packet->subtype = packet_subtype;
302 	uc_4addr_packet->reserved = 0;
303 
304 	ret = true;
305 out:
306 	if (primary_if)
307 		batadv_hardif_put(primary_if);
308 	return ret;
309 }
310 
311 /**
312  * batadv_send_skb_unicast - encapsulate and send an skb via unicast
313  * @bat_priv: the bat priv with all the soft interface information
314  * @skb: payload to send
315  * @packet_type: the batman unicast packet type to use
316  * @packet_subtype: the unicast 4addr packet subtype (only relevant for unicast
317  *  4addr packets)
318  * @orig_node: the originator to send the packet to
319  * @vid: the vid to be used to search the translation table
320  *
321  * Wrap the given skb into a batman-adv unicast or unicast-4addr header
322  * depending on whether BATADV_UNICAST or BATADV_UNICAST_4ADDR was supplied
323  * as packet_type. Then send this frame to the given orig_node.
324  *
325  * Return: NET_XMIT_DROP in case of error or NET_XMIT_SUCCESS otherwise.
326  */
327 int batadv_send_skb_unicast(struct batadv_priv *bat_priv,
328 			    struct sk_buff *skb, int packet_type,
329 			    int packet_subtype,
330 			    struct batadv_orig_node *orig_node,
331 			    unsigned short vid)
332 {
333 	struct batadv_unicast_packet *unicast_packet;
334 	struct ethhdr *ethhdr;
335 	int ret = NET_XMIT_DROP;
336 
337 	if (!orig_node)
338 		goto out;
339 
340 	switch (packet_type) {
341 	case BATADV_UNICAST:
342 		if (!batadv_send_skb_prepare_unicast(skb, orig_node))
343 			goto out;
344 		break;
345 	case BATADV_UNICAST_4ADDR:
346 		if (!batadv_send_skb_prepare_unicast_4addr(bat_priv, skb,
347 							   orig_node,
348 							   packet_subtype))
349 			goto out;
350 		break;
351 	default:
352 		/* this function supports UNICAST and UNICAST_4ADDR only. It
353 		 * should never be invoked with any other packet type
354 		 */
355 		goto out;
356 	}
357 
358 	/* skb->data might have been reallocated by
359 	 * batadv_send_skb_prepare_unicast{,_4addr}()
360 	 */
361 	ethhdr = eth_hdr(skb);
362 	unicast_packet = (struct batadv_unicast_packet *)skb->data;
363 
364 	/* inform the destination node that we are still missing a correct route
365 	 * for this client. The destination will receive this packet and will
366 	 * try to reroute it because the ttvn contained in the header is less
367 	 * than the current one
368 	 */
369 	if (batadv_tt_global_client_is_roaming(bat_priv, ethhdr->h_dest, vid))
370 		unicast_packet->ttvn = unicast_packet->ttvn - 1;
371 
372 	ret = batadv_send_skb_to_orig(skb, orig_node, NULL);
373 	 /* skb was consumed */
374 	skb = NULL;
375 
376 out:
377 	kfree_skb(skb);
378 	return ret;
379 }
380 
381 /**
382  * batadv_send_skb_via_tt_generic - send an skb via TT lookup
383  * @bat_priv: the bat priv with all the soft interface information
384  * @skb: payload to send
385  * @packet_type: the batman unicast packet type to use
386  * @packet_subtype: the unicast 4addr packet subtype (only relevant for unicast
387  *  4addr packets)
388  * @dst_hint: can be used to override the destination contained in the skb
389  * @vid: the vid to be used to search the translation table
390  *
391  * Look up the recipient node for the destination address in the ethernet
392  * header via the translation table. Wrap the given skb into a batman-adv
393  * unicast or unicast-4addr header depending on whether BATADV_UNICAST or
394  * BATADV_UNICAST_4ADDR was supplied as packet_type. Then send this frame
395  * to the according destination node.
396  *
397  * Return: NET_XMIT_DROP in case of error or NET_XMIT_SUCCESS otherwise.
398  */
399 int batadv_send_skb_via_tt_generic(struct batadv_priv *bat_priv,
400 				   struct sk_buff *skb, int packet_type,
401 				   int packet_subtype, u8 *dst_hint,
402 				   unsigned short vid)
403 {
404 	struct ethhdr *ethhdr = (struct ethhdr *)skb->data;
405 	struct batadv_orig_node *orig_node;
406 	u8 *src, *dst;
407 	int ret;
408 
409 	src = ethhdr->h_source;
410 	dst = ethhdr->h_dest;
411 
412 	/* if we got an hint! let's send the packet to this client (if any) */
413 	if (dst_hint) {
414 		src = NULL;
415 		dst = dst_hint;
416 	}
417 	orig_node = batadv_transtable_search(bat_priv, src, dst, vid);
418 
419 	ret = batadv_send_skb_unicast(bat_priv, skb, packet_type,
420 				      packet_subtype, orig_node, vid);
421 
422 	if (orig_node)
423 		batadv_orig_node_put(orig_node);
424 
425 	return ret;
426 }
427 
428 /**
429  * batadv_send_skb_via_gw - send an skb via gateway lookup
430  * @bat_priv: the bat priv with all the soft interface information
431  * @skb: payload to send
432  * @vid: the vid to be used to search the translation table
433  *
434  * Look up the currently selected gateway. Wrap the given skb into a batman-adv
435  * unicast header and send this frame to this gateway node.
436  *
437  * Return: NET_XMIT_DROP in case of error or NET_XMIT_SUCCESS otherwise.
438  */
439 int batadv_send_skb_via_gw(struct batadv_priv *bat_priv, struct sk_buff *skb,
440 			   unsigned short vid)
441 {
442 	struct batadv_orig_node *orig_node;
443 	int ret;
444 
445 	orig_node = batadv_gw_get_selected_orig(bat_priv);
446 	ret = batadv_send_skb_unicast(bat_priv, skb, BATADV_UNICAST_4ADDR,
447 				      BATADV_P_DATA, orig_node, vid);
448 
449 	if (orig_node)
450 		batadv_orig_node_put(orig_node);
451 
452 	return ret;
453 }
454 
455 /**
456  * batadv_forw_packet_free - free a forwarding packet
457  * @forw_packet: The packet to free
458  * @dropped: whether the packet is freed because is is dropped
459  *
460  * This frees a forwarding packet and releases any resources it might
461  * have claimed.
462  */
463 void batadv_forw_packet_free(struct batadv_forw_packet *forw_packet,
464 			     bool dropped)
465 {
466 	if (dropped)
467 		kfree_skb(forw_packet->skb);
468 	else
469 		consume_skb(forw_packet->skb);
470 
471 	if (forw_packet->if_incoming)
472 		batadv_hardif_put(forw_packet->if_incoming);
473 	if (forw_packet->if_outgoing)
474 		batadv_hardif_put(forw_packet->if_outgoing);
475 	if (forw_packet->queue_left)
476 		atomic_inc(forw_packet->queue_left);
477 	kfree(forw_packet);
478 }
479 
480 /**
481  * batadv_forw_packet_alloc - allocate a forwarding packet
482  * @if_incoming: The (optional) if_incoming to be grabbed
483  * @if_outgoing: The (optional) if_outgoing to be grabbed
484  * @queue_left: The (optional) queue counter to decrease
485  * @bat_priv: The bat_priv for the mesh of this forw_packet
486  * @skb: The raw packet this forwarding packet shall contain
487  *
488  * Allocates a forwarding packet and tries to get a reference to the
489  * (optional) if_incoming, if_outgoing and queue_left. If queue_left
490  * is NULL then bat_priv is optional, too.
491  *
492  * Return: An allocated forwarding packet on success, NULL otherwise.
493  */
494 struct batadv_forw_packet *
495 batadv_forw_packet_alloc(struct batadv_hard_iface *if_incoming,
496 			 struct batadv_hard_iface *if_outgoing,
497 			 atomic_t *queue_left,
498 			 struct batadv_priv *bat_priv,
499 			 struct sk_buff *skb)
500 {
501 	struct batadv_forw_packet *forw_packet;
502 	const char *qname;
503 
504 	if (queue_left && !batadv_atomic_dec_not_zero(queue_left)) {
505 		qname = "unknown";
506 
507 		if (queue_left == &bat_priv->bcast_queue_left)
508 			qname = "bcast";
509 
510 		if (queue_left == &bat_priv->batman_queue_left)
511 			qname = "batman";
512 
513 		batadv_dbg(BATADV_DBG_BATMAN, bat_priv,
514 			   "%s queue is full\n", qname);
515 
516 		return NULL;
517 	}
518 
519 	forw_packet = kmalloc(sizeof(*forw_packet), GFP_ATOMIC);
520 	if (!forw_packet)
521 		goto err;
522 
523 	if (if_incoming)
524 		kref_get(&if_incoming->refcount);
525 
526 	if (if_outgoing)
527 		kref_get(&if_outgoing->refcount);
528 
529 	INIT_HLIST_NODE(&forw_packet->list);
530 	INIT_HLIST_NODE(&forw_packet->cleanup_list);
531 	forw_packet->skb = skb;
532 	forw_packet->queue_left = queue_left;
533 	forw_packet->if_incoming = if_incoming;
534 	forw_packet->if_outgoing = if_outgoing;
535 	forw_packet->num_packets = 0;
536 
537 	return forw_packet;
538 
539 err:
540 	if (queue_left)
541 		atomic_inc(queue_left);
542 
543 	return NULL;
544 }
545 
546 /**
547  * batadv_forw_packet_was_stolen - check whether someone stole this packet
548  * @forw_packet: the forwarding packet to check
549  *
550  * This function checks whether the given forwarding packet was claimed by
551  * someone else for free().
552  *
553  * Return: True if someone stole it, false otherwise.
554  */
555 static bool
556 batadv_forw_packet_was_stolen(struct batadv_forw_packet *forw_packet)
557 {
558 	return !hlist_unhashed(&forw_packet->cleanup_list);
559 }
560 
561 /**
562  * batadv_forw_packet_steal - claim a forw_packet for free()
563  * @forw_packet: the forwarding packet to steal
564  * @lock: a key to the store to steal from (e.g. forw_{bat,bcast}_list_lock)
565  *
566  * This function tries to steal a specific forw_packet from global
567  * visibility for the purpose of getting it for free(). That means
568  * the caller is *not* allowed to requeue it afterwards.
569  *
570  * Return: True if stealing was successful. False if someone else stole it
571  * before us.
572  */
573 bool batadv_forw_packet_steal(struct batadv_forw_packet *forw_packet,
574 			      spinlock_t *lock)
575 {
576 	/* did purging routine steal it earlier? */
577 	spin_lock_bh(lock);
578 	if (batadv_forw_packet_was_stolen(forw_packet)) {
579 		spin_unlock_bh(lock);
580 		return false;
581 	}
582 
583 	hlist_del_init(&forw_packet->list);
584 
585 	/* Just to spot misuse of this function */
586 	hlist_add_fake(&forw_packet->cleanup_list);
587 
588 	spin_unlock_bh(lock);
589 	return true;
590 }
591 
592 /**
593  * batadv_forw_packet_list_steal - claim a list of forward packets for free()
594  * @forw_list: the to be stolen forward packets
595  * @cleanup_list: a backup pointer, to be able to dispose the packet later
596  * @hard_iface: the interface to steal forward packets from
597  *
598  * This function claims responsibility to free any forw_packet queued on the
599  * given hard_iface. If hard_iface is NULL forwarding packets on all hard
600  * interfaces will be claimed.
601  *
602  * The packets are being moved from the forw_list to the cleanup_list and
603  * by that allows already running threads to notice the claiming.
604  */
605 static void
606 batadv_forw_packet_list_steal(struct hlist_head *forw_list,
607 			      struct hlist_head *cleanup_list,
608 			      const struct batadv_hard_iface *hard_iface)
609 {
610 	struct batadv_forw_packet *forw_packet;
611 	struct hlist_node *safe_tmp_node;
612 
613 	hlist_for_each_entry_safe(forw_packet, safe_tmp_node,
614 				  forw_list, list) {
615 		/* if purge_outstanding_packets() was called with an argument
616 		 * we delete only packets belonging to the given interface
617 		 */
618 		if (hard_iface &&
619 		    forw_packet->if_incoming != hard_iface &&
620 		    forw_packet->if_outgoing != hard_iface)
621 			continue;
622 
623 		hlist_del(&forw_packet->list);
624 		hlist_add_head(&forw_packet->cleanup_list, cleanup_list);
625 	}
626 }
627 
628 /**
629  * batadv_forw_packet_list_free - free a list of forward packets
630  * @head: a list of to be freed forw_packets
631  *
632  * This function cancels the scheduling of any packet in the provided list,
633  * waits for any possibly running packet forwarding thread to finish and
634  * finally, safely frees this forward packet.
635  *
636  * This function might sleep.
637  */
638 static void batadv_forw_packet_list_free(struct hlist_head *head)
639 {
640 	struct batadv_forw_packet *forw_packet;
641 	struct hlist_node *safe_tmp_node;
642 
643 	hlist_for_each_entry_safe(forw_packet, safe_tmp_node, head,
644 				  cleanup_list) {
645 		cancel_delayed_work_sync(&forw_packet->delayed_work);
646 
647 		hlist_del(&forw_packet->cleanup_list);
648 		batadv_forw_packet_free(forw_packet, true);
649 	}
650 }
651 
652 /**
653  * batadv_forw_packet_queue - try to queue a forwarding packet
654  * @forw_packet: the forwarding packet to queue
655  * @lock: a key to the store (e.g. forw_{bat,bcast}_list_lock)
656  * @head: the shelve to queue it on (e.g. forw_{bat,bcast}_list)
657  * @send_time: timestamp (jiffies) when the packet is to be sent
658  *
659  * This function tries to (re)queue a forwarding packet. Requeuing
660  * is prevented if the according interface is shutting down
661  * (e.g. if batadv_forw_packet_list_steal() was called for this
662  * packet earlier).
663  *
664  * Calling batadv_forw_packet_queue() after a call to
665  * batadv_forw_packet_steal() is forbidden!
666  *
667  * Caller needs to ensure that forw_packet->delayed_work was initialized.
668  */
669 static void batadv_forw_packet_queue(struct batadv_forw_packet *forw_packet,
670 				     spinlock_t *lock, struct hlist_head *head,
671 				     unsigned long send_time)
672 {
673 	spin_lock_bh(lock);
674 
675 	/* did purging routine steal it from us? */
676 	if (batadv_forw_packet_was_stolen(forw_packet)) {
677 		/* If you got it for free() without trouble, then
678 		 * don't get back into the queue after stealing...
679 		 */
680 		WARN_ONCE(hlist_fake(&forw_packet->cleanup_list),
681 			  "Requeuing after batadv_forw_packet_steal() not allowed!\n");
682 
683 		spin_unlock_bh(lock);
684 		return;
685 	}
686 
687 	hlist_del_init(&forw_packet->list);
688 	hlist_add_head(&forw_packet->list, head);
689 
690 	queue_delayed_work(batadv_event_workqueue,
691 			   &forw_packet->delayed_work,
692 			   send_time - jiffies);
693 	spin_unlock_bh(lock);
694 }
695 
696 /**
697  * batadv_forw_packet_bcast_queue - try to queue a broadcast packet
698  * @bat_priv: the bat priv with all the soft interface information
699  * @forw_packet: the forwarding packet to queue
700  * @send_time: timestamp (jiffies) when the packet is to be sent
701  *
702  * This function tries to (re)queue a broadcast packet.
703  *
704  * Caller needs to ensure that forw_packet->delayed_work was initialized.
705  */
706 static void
707 batadv_forw_packet_bcast_queue(struct batadv_priv *bat_priv,
708 			       struct batadv_forw_packet *forw_packet,
709 			       unsigned long send_time)
710 {
711 	batadv_forw_packet_queue(forw_packet, &bat_priv->forw_bcast_list_lock,
712 				 &bat_priv->forw_bcast_list, send_time);
713 }
714 
715 /**
716  * batadv_forw_packet_ogmv1_queue - try to queue an OGMv1 packet
717  * @bat_priv: the bat priv with all the soft interface information
718  * @forw_packet: the forwarding packet to queue
719  * @send_time: timestamp (jiffies) when the packet is to be sent
720  *
721  * This function tries to (re)queue an OGMv1 packet.
722  *
723  * Caller needs to ensure that forw_packet->delayed_work was initialized.
724  */
725 void batadv_forw_packet_ogmv1_queue(struct batadv_priv *bat_priv,
726 				    struct batadv_forw_packet *forw_packet,
727 				    unsigned long send_time)
728 {
729 	batadv_forw_packet_queue(forw_packet, &bat_priv->forw_bat_list_lock,
730 				 &bat_priv->forw_bat_list, send_time);
731 }
732 
733 /**
734  * batadv_add_bcast_packet_to_list - queue broadcast packet for multiple sends
735  * @bat_priv: the bat priv with all the soft interface information
736  * @skb: broadcast packet to add
737  * @delay: number of jiffies to wait before sending
738  * @own_packet: true if it is a self-generated broadcast packet
739  *
740  * add a broadcast packet to the queue and setup timers. broadcast packets
741  * are sent multiple times to increase probability for being received.
742  *
743  * The skb is not consumed, so the caller should make sure that the
744  * skb is freed.
745  *
746  * Return: NETDEV_TX_OK on success and NETDEV_TX_BUSY on errors.
747  */
748 int batadv_add_bcast_packet_to_list(struct batadv_priv *bat_priv,
749 				    const struct sk_buff *skb,
750 				    unsigned long delay,
751 				    bool own_packet)
752 {
753 	struct batadv_hard_iface *primary_if;
754 	struct batadv_forw_packet *forw_packet;
755 	struct batadv_bcast_packet *bcast_packet;
756 	struct sk_buff *newskb;
757 
758 	primary_if = batadv_primary_if_get_selected(bat_priv);
759 	if (!primary_if)
760 		goto err;
761 
762 	newskb = skb_copy(skb, GFP_ATOMIC);
763 	if (!newskb) {
764 		batadv_hardif_put(primary_if);
765 		goto err;
766 	}
767 
768 	forw_packet = batadv_forw_packet_alloc(primary_if, NULL,
769 					       &bat_priv->bcast_queue_left,
770 					       bat_priv, newskb);
771 	batadv_hardif_put(primary_if);
772 	if (!forw_packet)
773 		goto err_packet_free;
774 
775 	/* as we have a copy now, it is safe to decrease the TTL */
776 	bcast_packet = (struct batadv_bcast_packet *)newskb->data;
777 	bcast_packet->ttl--;
778 
779 	forw_packet->own = own_packet;
780 
781 	INIT_DELAYED_WORK(&forw_packet->delayed_work,
782 			  batadv_send_outstanding_bcast_packet);
783 
784 	batadv_forw_packet_bcast_queue(bat_priv, forw_packet, jiffies + delay);
785 	return NETDEV_TX_OK;
786 
787 err_packet_free:
788 	kfree_skb(newskb);
789 err:
790 	return NETDEV_TX_BUSY;
791 }
792 
793 /**
794  * batadv_forw_packet_bcasts_left - check if a retransmission is necessary
795  * @forw_packet: the forwarding packet to check
796  * @hard_iface: the interface to check on
797  *
798  * Checks whether a given packet has any (re)transmissions left on the provided
799  * interface.
800  *
801  * hard_iface may be NULL: In that case the number of transmissions this skb had
802  * so far is compared with the maximum amount of retransmissions independent of
803  * any interface instead.
804  *
805  * Return: True if (re)transmissions are left, false otherwise.
806  */
807 static bool
808 batadv_forw_packet_bcasts_left(struct batadv_forw_packet *forw_packet,
809 			       struct batadv_hard_iface *hard_iface)
810 {
811 	unsigned int max;
812 
813 	if (hard_iface)
814 		max = hard_iface->num_bcasts;
815 	else
816 		max = BATADV_NUM_BCASTS_MAX;
817 
818 	return BATADV_SKB_CB(forw_packet->skb)->num_bcasts < max;
819 }
820 
821 /**
822  * batadv_forw_packet_bcasts_inc - increment retransmission counter of a packet
823  * @forw_packet: the packet to increase the counter for
824  */
825 static void
826 batadv_forw_packet_bcasts_inc(struct batadv_forw_packet *forw_packet)
827 {
828 	BATADV_SKB_CB(forw_packet->skb)->num_bcasts++;
829 }
830 
831 /**
832  * batadv_forw_packet_is_rebroadcast - check packet for previous transmissions
833  * @forw_packet: the packet to check
834  *
835  * Return: True if this packet was transmitted before, false otherwise.
836  */
837 bool batadv_forw_packet_is_rebroadcast(struct batadv_forw_packet *forw_packet)
838 {
839 	return BATADV_SKB_CB(forw_packet->skb)->num_bcasts > 0;
840 }
841 
842 static void batadv_send_outstanding_bcast_packet(struct work_struct *work)
843 {
844 	struct batadv_hard_iface *hard_iface;
845 	struct batadv_hardif_neigh_node *neigh_node;
846 	struct delayed_work *delayed_work;
847 	struct batadv_forw_packet *forw_packet;
848 	struct batadv_bcast_packet *bcast_packet;
849 	struct sk_buff *skb1;
850 	struct net_device *soft_iface;
851 	struct batadv_priv *bat_priv;
852 	unsigned long send_time = jiffies + msecs_to_jiffies(5);
853 	bool dropped = false;
854 	u8 *neigh_addr;
855 	u8 *orig_neigh;
856 	int ret = 0;
857 
858 	delayed_work = to_delayed_work(work);
859 	forw_packet = container_of(delayed_work, struct batadv_forw_packet,
860 				   delayed_work);
861 	soft_iface = forw_packet->if_incoming->soft_iface;
862 	bat_priv = netdev_priv(soft_iface);
863 
864 	if (atomic_read(&bat_priv->mesh_state) == BATADV_MESH_DEACTIVATING) {
865 		dropped = true;
866 		goto out;
867 	}
868 
869 	if (batadv_dat_drop_broadcast_packet(bat_priv, forw_packet)) {
870 		dropped = true;
871 		goto out;
872 	}
873 
874 	bcast_packet = (struct batadv_bcast_packet *)forw_packet->skb->data;
875 
876 	/* rebroadcast packet */
877 	rcu_read_lock();
878 	list_for_each_entry_rcu(hard_iface, &batadv_hardif_list, list) {
879 		if (hard_iface->soft_iface != soft_iface)
880 			continue;
881 
882 		if (!batadv_forw_packet_bcasts_left(forw_packet, hard_iface))
883 			continue;
884 
885 		if (forw_packet->own) {
886 			neigh_node = NULL;
887 		} else {
888 			neigh_addr = eth_hdr(forw_packet->skb)->h_source;
889 			neigh_node = batadv_hardif_neigh_get(hard_iface,
890 							     neigh_addr);
891 		}
892 
893 		orig_neigh = neigh_node ? neigh_node->orig : NULL;
894 
895 		ret = batadv_hardif_no_broadcast(hard_iface, bcast_packet->orig,
896 						 orig_neigh);
897 
898 		if (ret) {
899 			char *type;
900 
901 			switch (ret) {
902 			case BATADV_HARDIF_BCAST_NORECIPIENT:
903 				type = "no neighbor";
904 				break;
905 			case BATADV_HARDIF_BCAST_DUPFWD:
906 				type = "single neighbor is source";
907 				break;
908 			case BATADV_HARDIF_BCAST_DUPORIG:
909 				type = "single neighbor is originator";
910 				break;
911 			default:
912 				type = "unknown";
913 			}
914 
915 			batadv_dbg(BATADV_DBG_BATMAN, bat_priv, "BCAST packet from orig %pM on %s suppressed: %s\n",
916 				   bcast_packet->orig,
917 				   hard_iface->net_dev->name, type);
918 
919 			if (neigh_node)
920 				batadv_hardif_neigh_put(neigh_node);
921 
922 			continue;
923 		}
924 
925 		if (neigh_node)
926 			batadv_hardif_neigh_put(neigh_node);
927 
928 		if (!kref_get_unless_zero(&hard_iface->refcount))
929 			continue;
930 
931 		/* send a copy of the saved skb */
932 		skb1 = skb_clone(forw_packet->skb, GFP_ATOMIC);
933 		if (skb1)
934 			batadv_send_broadcast_skb(skb1, hard_iface);
935 
936 		batadv_hardif_put(hard_iface);
937 	}
938 	rcu_read_unlock();
939 
940 	batadv_forw_packet_bcasts_inc(forw_packet);
941 
942 	/* if we still have some more bcasts to send */
943 	if (batadv_forw_packet_bcasts_left(forw_packet, NULL)) {
944 		batadv_forw_packet_bcast_queue(bat_priv, forw_packet,
945 					       send_time);
946 		return;
947 	}
948 
949 out:
950 	/* do we get something for free()? */
951 	if (batadv_forw_packet_steal(forw_packet,
952 				     &bat_priv->forw_bcast_list_lock))
953 		batadv_forw_packet_free(forw_packet, dropped);
954 }
955 
956 /**
957  * batadv_purge_outstanding_packets - stop/purge scheduled bcast/OGMv1 packets
958  * @bat_priv: the bat priv with all the soft interface information
959  * @hard_iface: the hard interface to cancel and purge bcast/ogm packets on
960  *
961  * This method cancels and purges any broadcast and OGMv1 packet on the given
962  * hard_iface. If hard_iface is NULL, broadcast and OGMv1 packets on all hard
963  * interfaces will be canceled and purged.
964  *
965  * This function might sleep.
966  */
967 void
968 batadv_purge_outstanding_packets(struct batadv_priv *bat_priv,
969 				 const struct batadv_hard_iface *hard_iface)
970 {
971 	struct hlist_head head = HLIST_HEAD_INIT;
972 
973 	if (hard_iface)
974 		batadv_dbg(BATADV_DBG_BATMAN, bat_priv,
975 			   "%s(): %s\n",
976 			   __func__, hard_iface->net_dev->name);
977 	else
978 		batadv_dbg(BATADV_DBG_BATMAN, bat_priv,
979 			   "%s()\n", __func__);
980 
981 	/* claim bcast list for free() */
982 	spin_lock_bh(&bat_priv->forw_bcast_list_lock);
983 	batadv_forw_packet_list_steal(&bat_priv->forw_bcast_list, &head,
984 				      hard_iface);
985 	spin_unlock_bh(&bat_priv->forw_bcast_list_lock);
986 
987 	/* claim batman packet list for free() */
988 	spin_lock_bh(&bat_priv->forw_bat_list_lock);
989 	batadv_forw_packet_list_steal(&bat_priv->forw_bat_list, &head,
990 				      hard_iface);
991 	spin_unlock_bh(&bat_priv->forw_bat_list_lock);
992 
993 	/* then cancel or wait for packet workers to finish and free */
994 	batadv_forw_packet_list_free(&head);
995 }
996