blob: 7f8ade04e08e48e261a86fe6d9b7f6b9a7c2a398 [file] [log] [blame]
Sven Eckelmann7db7d9f2017-11-19 15:05:11 +01001// SPDX-License-Identifier: GPL-2.0
Sven Eckelmann68e039f2020-01-01 00:00:01 +01002/* Copyright (C) 2007-2020 B.A.T.M.A.N. contributors:
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +00003 *
4 * Marek Lindner, Simon Wunderlich
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +00005 */
6
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +00007#include "send.h"
Sven Eckelmann1e2c2a42015-04-17 19:40:28 +02008#include "main.h"
9
10#include <linux/atomic.h>
Linus Lüssing9b4aec62016-11-01 09:44:44 +010011#include <linux/bug.h>
Sven Eckelmann1e2c2a42015-04-17 19:40:28 +020012#include <linux/byteorder/generic.h>
Antonio Quartullif50ca952016-05-18 11:38:48 +020013#include <linux/errno.h>
Sven Eckelmann1e2c2a42015-04-17 19:40:28 +020014#include <linux/etherdevice.h>
Sven Eckelmannb92b94a2017-11-19 17:12:02 +010015#include <linux/gfp.h>
Sven Eckelmann1e2c2a42015-04-17 19:40:28 +020016#include <linux/if.h>
Sven Eckelmannfcafa5e2016-05-15 11:07:42 +020017#include <linux/if_ether.h>
Sven Eckelmann1e2c2a42015-04-17 19:40:28 +020018#include <linux/jiffies.h>
19#include <linux/kernel.h>
Sven Eckelmann27353442016-03-05 16:09:16 +010020#include <linux/kref.h>
Sven Eckelmann1e2c2a42015-04-17 19:40:28 +020021#include <linux/list.h>
22#include <linux/netdevice.h>
23#include <linux/printk.h>
24#include <linux/rculist.h>
25#include <linux/rcupdate.h>
26#include <linux/skbuff.h>
27#include <linux/slab.h>
28#include <linux/spinlock.h>
29#include <linux/stddef.h>
30#include <linux/workqueue.h>
31
32#include "distributed-arp-table.h"
Martin Hundebøllee75ed82013-05-23 16:53:03 +020033#include "fragmentation.h"
Sven Eckelmann1e2c2a42015-04-17 19:40:28 +020034#include "gateway_client.h"
35#include "hard-interface.h"
Sven Eckelmannba412082016-05-15 23:48:31 +020036#include "log.h"
Sven Eckelmann1e2c2a42015-04-17 19:40:28 +020037#include "network-coding.h"
38#include "originator.h"
39#include "routing.h"
40#include "soft-interface.h"
41#include "translation-table.h"
Antonio Quartulliaf5d4f72012-11-26 00:38:50 +010042
Sven Eckelmannbb079c82012-05-16 20:23:14 +020043static void batadv_send_outstanding_bcast_packet(struct work_struct *work);
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +000044
Antonio Quartulli95d39272016-01-16 16:40:15 +080045/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +010046 * batadv_send_skb_packet() - send an already prepared packet
Antonio Quartulli95d39272016-01-16 16:40:15 +080047 * @skb: the packet to send
48 * @hard_iface: the interface to use to send the broadcast packet
49 * @dst_addr: the payload destination
50 *
51 * Send out an already prepared packet to the given neighbor or broadcast it
52 * using the specified interface. Either hard_iface or neigh_node must be not
53 * NULL.
54 * If neigh_node is NULL, then the packet is broadcasted using hard_iface,
55 * otherwise it is sent as unicast to the given neighbor.
56 *
Sven Eckelmann7d72d172016-07-17 21:04:05 +020057 * Regardless of the return value, the skb is consumed.
58 *
59 * Return: A negative errno code is returned on a failure. A success does not
60 * guarantee the frame will be transmitted as it may be dropped due
61 * to congestion or traffic shaping.
Sven Eckelmann9cfc7bd2012-05-12 02:09:43 +020062 */
Sven Eckelmann56303d32012-06-05 22:31:31 +020063int batadv_send_skb_packet(struct sk_buff *skb,
64 struct batadv_hard_iface *hard_iface,
Sven Eckelmann6b5e9712015-05-26 18:34:26 +020065 const u8 *dst_addr)
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +000066{
Antonio Quartulli95d39272016-01-16 16:40:15 +080067 struct batadv_priv *bat_priv;
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +000068 struct ethhdr *ethhdr;
Sven Eckelmann7c946062017-01-28 10:12:39 +010069 int ret;
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +000070
Antonio Quartulli95d39272016-01-16 16:40:15 +080071 bat_priv = netdev_priv(hard_iface->soft_iface);
72
Sven Eckelmanne9a4f292012-06-03 22:19:19 +020073 if (hard_iface->if_status != BATADV_IF_ACTIVE)
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +000074 goto send_skb_err;
75
Marek Lindnere6c10f42011-02-18 12:33:20 +000076 if (unlikely(!hard_iface->net_dev))
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +000077 goto send_skb_err;
78
Marek Lindnere6c10f42011-02-18 12:33:20 +000079 if (!(hard_iface->net_dev->flags & IFF_UP)) {
Sven Eckelmann67969582012-03-26 16:22:45 +020080 pr_warn("Interface %s is not up - can't send packet via that interface!\n",
81 hard_iface->net_dev->name);
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +000082 goto send_skb_err;
83 }
84
85 /* push to the ethernet header. */
Sven Eckelmann04b482a2012-05-12 02:09:38 +020086 if (batadv_skb_head_push(skb, ETH_HLEN) < 0)
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +000087 goto send_skb_err;
88
89 skb_reset_mac_header(skb);
90
Antonio Quartulli7ed4be92013-04-08 15:08:18 +020091 ethhdr = eth_hdr(skb);
Antonio Quartulli8fdd0152014-01-22 00:42:11 +010092 ether_addr_copy(ethhdr->h_source, hard_iface->net_dev->dev_addr);
93 ether_addr_copy(ethhdr->h_dest, dst_addr);
Antonio Quartulli293e9332013-05-19 12:55:16 +020094 ethhdr->h_proto = htons(ETH_P_BATMAN);
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +000095
96 skb_set_network_header(skb, ETH_HLEN);
Antonio Quartulli293e9332013-05-19 12:55:16 +020097 skb->protocol = htons(ETH_P_BATMAN);
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +000098
Marek Lindnere6c10f42011-02-18 12:33:20 +000099 skb->dev = hard_iface->net_dev;
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000100
Martin Hundebøll612d2b42013-01-25 11:12:42 +0100101 /* Save a clone of the skb to use when decoding coded packets */
102 batadv_nc_skb_store_for_decoding(bat_priv, skb);
103
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000104 /* dev_queue_xmit() returns a negative result on error. However on
105 * congestion and traffic shaping, it drops and returns NET_XMIT_DROP
Sven Eckelmann9cfc7bd2012-05-12 02:09:43 +0200106 * (which is > 0). This will not be treated as an error.
107 */
Sven Eckelmann7c946062017-01-28 10:12:39 +0100108 ret = dev_queue_xmit(skb);
109 return net_xmit_eval(ret);
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000110send_skb_err:
111 kfree_skb(skb);
112 return NET_XMIT_DROP;
113}
114
Sven Eckelmannff15c272017-12-02 19:51:53 +0100115/**
116 * batadv_send_broadcast_skb() - Send broadcast packet via hard interface
117 * @skb: packet to be transmitted (with batadv header and no outer eth header)
118 * @hard_iface: outgoing interface
119 *
120 * Return: A negative errno code is returned on a failure. A success does not
121 * guarantee the frame will be transmitted as it may be dropped due
122 * to congestion or traffic shaping.
123 */
Antonio Quartulli95d39272016-01-16 16:40:15 +0800124int batadv_send_broadcast_skb(struct sk_buff *skb,
125 struct batadv_hard_iface *hard_iface)
126{
127 return batadv_send_skb_packet(skb, hard_iface, batadv_broadcast_addr);
128}
129
Sven Eckelmannff15c272017-12-02 19:51:53 +0100130/**
131 * batadv_send_unicast_skb() - Send unicast packet to neighbor
132 * @skb: packet to be transmitted (with batadv header and no outer eth header)
133 * @neigh: neighbor which is used as next hop to destination
134 *
135 * Return: A negative errno code is returned on a failure. A success does not
136 * guarantee the frame will be transmitted as it may be dropped due
137 * to congestion or traffic shaping.
138 */
Antonio Quartulli95d39272016-01-16 16:40:15 +0800139int batadv_send_unicast_skb(struct sk_buff *skb,
140 struct batadv_neigh_node *neigh)
141{
142#ifdef CONFIG_BATMAN_ADV_BATMAN_V
143 struct batadv_hardif_neigh_node *hardif_neigh;
144#endif
145 int ret;
146
147 ret = batadv_send_skb_packet(skb, neigh->if_incoming, neigh->addr);
148
149#ifdef CONFIG_BATMAN_ADV_BATMAN_V
150 hardif_neigh = batadv_hardif_neigh_get(neigh->if_incoming, neigh->addr);
151
Sven Eckelmann825ffe12017-08-23 21:52:13 +0200152 if (hardif_neigh && ret != NET_XMIT_DROP)
Antonio Quartulli95d39272016-01-16 16:40:15 +0800153 hardif_neigh->bat_v.last_unicast_tx = jiffies;
154
155 if (hardif_neigh)
156 batadv_hardif_neigh_put(hardif_neigh);
157#endif
158
159 return ret;
160}
161
Martin Hundebøllbb351ba2012-10-16 16:13:48 +0200162/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100163 * batadv_send_skb_to_orig() - Lookup next-hop and transmit skb.
Martin Hundebøllbb351ba2012-10-16 16:13:48 +0200164 * @skb: Packet to be transmitted.
165 * @orig_node: Final destination of the packet.
166 * @recv_if: Interface used when receiving the packet (can be NULL).
167 *
168 * Looks up the best next-hop towards the passed originator and passes the
169 * skb on for preparation of MAC header. If the packet originated from this
170 * host, NULL can be passed as recv_if and no interface alternating is
171 * attempted.
172 *
Sven Eckelmann1ad5bcb2016-07-17 21:04:03 +0200173 * Return: negative errno code on a failure, -EINPROGRESS if the skb is
174 * buffered for later transmit or the NET_XMIT status returned by the
Antonio Quartullif50ca952016-05-18 11:38:48 +0200175 * lower routine if the packet has been passed down.
Martin Hundebøllbb351ba2012-10-16 16:13:48 +0200176 */
Martin Hundebølle91ecfc2013-04-20 13:54:39 +0200177int batadv_send_skb_to_orig(struct sk_buff *skb,
178 struct batadv_orig_node *orig_node,
179 struct batadv_hard_iface *recv_if)
Martin Hundebøllbb351ba2012-10-16 16:13:48 +0200180{
181 struct batadv_priv *bat_priv = orig_node->bat_priv;
182 struct batadv_neigh_node *neigh_node;
Sven Eckelmann1ad5bcb2016-07-17 21:04:03 +0200183 int ret;
Martin Hundebøllbb351ba2012-10-16 16:13:48 +0200184
185 /* batadv_find_router() increases neigh_nodes refcount if found. */
186 neigh_node = batadv_find_router(bat_priv, orig_node, recv_if);
Sven Eckelmann1ad5bcb2016-07-17 21:04:03 +0200187 if (!neigh_node) {
188 ret = -EINVAL;
189 goto free_skb;
190 }
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200191
192 /* Check if the skb is too large to send in one piece and fragment
193 * it if needed.
194 */
195 if (atomic_read(&bat_priv->fragmentation) &&
196 skb->len > neigh_node->if_incoming->net_dev->mtu) {
197 /* Fragment and send packet. */
Antonio Quartullif50ca952016-05-18 11:38:48 +0200198 ret = batadv_frag_send_packet(skb, orig_node, neigh_node);
Sven Eckelmann1ad5bcb2016-07-17 21:04:03 +0200199 /* skb was consumed */
200 skb = NULL;
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200201
Sven Eckelmann1ad5bcb2016-07-17 21:04:03 +0200202 goto put_neigh_node;
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200203 }
Martin Hundebøllbb351ba2012-10-16 16:13:48 +0200204
Martin Hundebølle91ecfc2013-04-20 13:54:39 +0200205 /* try to network code the packet, if it is received on an interface
206 * (i.e. being forwarded). If the packet originates from this node or if
207 * network coding fails, then send the packet as usual.
208 */
Antonio Quartullif50ca952016-05-18 11:38:48 +0200209 if (recv_if && batadv_nc_skb_forward(skb, neigh_node))
Florian Westphal99860202016-06-11 12:46:04 +0200210 ret = -EINPROGRESS;
Antonio Quartullif50ca952016-05-18 11:38:48 +0200211 else
212 ret = batadv_send_unicast_skb(skb, neigh_node);
Martin Hundebøllbb351ba2012-10-16 16:13:48 +0200213
Sven Eckelmann1ad5bcb2016-07-17 21:04:03 +0200214 /* skb was consumed */
215 skb = NULL;
216
217put_neigh_node:
218 batadv_neigh_node_put(neigh_node);
219free_skb:
220 kfree_skb(skb);
Martin Hundebøllbb351ba2012-10-16 16:13:48 +0200221
Martin Hundebølle91ecfc2013-04-20 13:54:39 +0200222 return ret;
Martin Hundebøllbb351ba2012-10-16 16:13:48 +0200223}
224
Martin Hundebøllf097e252013-05-23 16:53:01 +0200225/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100226 * batadv_send_skb_push_fill_unicast() - extend the buffer and initialize the
Martin Hundebøllf097e252013-05-23 16:53:01 +0200227 * common fields for unicast packets
228 * @skb: the skb carrying the unicast header to initialize
229 * @hdr_size: amount of bytes to push at the beginning of the skb
230 * @orig_node: the destination node
231 *
Sven Eckelmann62fe7102015-09-15 19:00:48 +0200232 * Return: false if the buffer extension was not possible or true otherwise.
Martin Hundebøllf097e252013-05-23 16:53:01 +0200233 */
234static bool
235batadv_send_skb_push_fill_unicast(struct sk_buff *skb, int hdr_size,
236 struct batadv_orig_node *orig_node)
237{
238 struct batadv_unicast_packet *unicast_packet;
Sven Eckelmann6b5e9712015-05-26 18:34:26 +0200239 u8 ttvn = (u8)atomic_read(&orig_node->last_ttvn);
Martin Hundebøllf097e252013-05-23 16:53:01 +0200240
241 if (batadv_skb_head_push(skb, hdr_size) < 0)
242 return false;
243
244 unicast_packet = (struct batadv_unicast_packet *)skb->data;
Simon Wunderlicha40d9b02013-12-02 20:38:31 +0100245 unicast_packet->version = BATADV_COMPAT_VERSION;
Martin Hundebøllf097e252013-05-23 16:53:01 +0200246 /* batman packet type: unicast */
Simon Wunderlicha40d9b02013-12-02 20:38:31 +0100247 unicast_packet->packet_type = BATADV_UNICAST;
Martin Hundebøllf097e252013-05-23 16:53:01 +0200248 /* set unicast ttl */
Simon Wunderlicha40d9b02013-12-02 20:38:31 +0100249 unicast_packet->ttl = BATADV_TTL;
Martin Hundebøllf097e252013-05-23 16:53:01 +0200250 /* copy the destination for faster routing */
Antonio Quartulli8fdd0152014-01-22 00:42:11 +0100251 ether_addr_copy(unicast_packet->dest, orig_node->orig);
Martin Hundebøllf097e252013-05-23 16:53:01 +0200252 /* set the destination tt version number */
253 unicast_packet->ttvn = ttvn;
254
255 return true;
256}
257
258/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100259 * batadv_send_skb_prepare_unicast() - encapsulate an skb with a unicast header
Martin Hundebøllf097e252013-05-23 16:53:01 +0200260 * @skb: the skb containing the payload to encapsulate
261 * @orig_node: the destination node
262 *
Sven Eckelmann62fe7102015-09-15 19:00:48 +0200263 * Return: false if the payload could not be encapsulated or true otherwise.
Martin Hundebøllf097e252013-05-23 16:53:01 +0200264 */
265static bool batadv_send_skb_prepare_unicast(struct sk_buff *skb,
266 struct batadv_orig_node *orig_node)
267{
268 size_t uni_size = sizeof(struct batadv_unicast_packet);
269
270 return batadv_send_skb_push_fill_unicast(skb, uni_size, orig_node);
271}
272
273/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100274 * batadv_send_skb_prepare_unicast_4addr() - encapsulate an skb with a
Martin Hundebøllf097e252013-05-23 16:53:01 +0200275 * unicast 4addr header
276 * @bat_priv: the bat priv with all the soft interface information
277 * @skb: the skb containing the payload to encapsulate
Sven Eckelmanne51f0392015-09-06 21:38:51 +0200278 * @orig: the destination node
Martin Hundebøllf097e252013-05-23 16:53:01 +0200279 * @packet_subtype: the unicast 4addr packet subtype to use
280 *
Sven Eckelmann62fe7102015-09-15 19:00:48 +0200281 * Return: false if the payload could not be encapsulated or true otherwise.
Martin Hundebøllf097e252013-05-23 16:53:01 +0200282 */
283bool batadv_send_skb_prepare_unicast_4addr(struct batadv_priv *bat_priv,
284 struct sk_buff *skb,
285 struct batadv_orig_node *orig,
286 int packet_subtype)
287{
288 struct batadv_hard_iface *primary_if;
289 struct batadv_unicast_4addr_packet *uc_4addr_packet;
290 bool ret = false;
291
292 primary_if = batadv_primary_if_get_selected(bat_priv);
293 if (!primary_if)
294 goto out;
295
296 /* Pull the header space and fill the unicast_packet substructure.
297 * We can do that because the first member of the uc_4addr_packet
298 * is of type struct unicast_packet
299 */
300 if (!batadv_send_skb_push_fill_unicast(skb, sizeof(*uc_4addr_packet),
301 orig))
302 goto out;
303
304 uc_4addr_packet = (struct batadv_unicast_4addr_packet *)skb->data;
Simon Wunderlicha40d9b02013-12-02 20:38:31 +0100305 uc_4addr_packet->u.packet_type = BATADV_UNICAST_4ADDR;
Antonio Quartulli8fdd0152014-01-22 00:42:11 +0100306 ether_addr_copy(uc_4addr_packet->src, primary_if->net_dev->dev_addr);
Martin Hundebøllf097e252013-05-23 16:53:01 +0200307 uc_4addr_packet->subtype = packet_subtype;
308 uc_4addr_packet->reserved = 0;
309
310 ret = true;
311out:
312 if (primary_if)
Sven Eckelmann82047ad2016-01-17 11:01:10 +0100313 batadv_hardif_put(primary_if);
Martin Hundebøllf097e252013-05-23 16:53:01 +0200314 return ret;
315}
316
317/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100318 * batadv_send_skb_unicast() - encapsulate and send an skb via unicast
Martin Hundebøllf097e252013-05-23 16:53:01 +0200319 * @bat_priv: the bat priv with all the soft interface information
320 * @skb: payload to send
321 * @packet_type: the batman unicast packet type to use
322 * @packet_subtype: the unicast 4addr packet subtype (only relevant for unicast
323 * 4addr packets)
Linus Lüssinge300d312013-07-03 10:40:00 +0200324 * @orig_node: the originator to send the packet to
Antonio Quartullic018ad32013-06-04 12:11:39 +0200325 * @vid: the vid to be used to search the translation table
Martin Hundebøllf097e252013-05-23 16:53:01 +0200326 *
Linus Lüssinge300d312013-07-03 10:40:00 +0200327 * Wrap the given skb into a batman-adv unicast or unicast-4addr header
328 * depending on whether BATADV_UNICAST or BATADV_UNICAST_4ADDR was supplied
Sven Eckelmannf19dc772016-06-27 08:15:42 +0200329 * as packet_type. Then send this frame to the given orig_node.
Linus Lüssinge300d312013-07-03 10:40:00 +0200330 *
Sven Eckelmann62fe7102015-09-15 19:00:48 +0200331 * Return: NET_XMIT_DROP in case of error or NET_XMIT_SUCCESS otherwise.
Martin Hundebøllf097e252013-05-23 16:53:01 +0200332 */
Linus Lüssing1d8ab8d2014-02-15 17:47:52 +0100333int batadv_send_skb_unicast(struct batadv_priv *bat_priv,
334 struct sk_buff *skb, int packet_type,
335 int packet_subtype,
336 struct batadv_orig_node *orig_node,
337 unsigned short vid)
Martin Hundebøllf097e252013-05-23 16:53:01 +0200338{
Martin Hundebøllf097e252013-05-23 16:53:01 +0200339 struct batadv_unicast_packet *unicast_packet;
Antonio Quartulli8ea64e22015-05-11 20:34:52 +0200340 struct ethhdr *ethhdr;
Sven Eckelmann1ad5bcb2016-07-17 21:04:03 +0200341 int ret = NET_XMIT_DROP;
Martin Hundebøllf097e252013-05-23 16:53:01 +0200342
Simon Wunderlich56a5ca82013-05-28 11:49:47 +0200343 if (!orig_node)
Martin Hundebøllf097e252013-05-23 16:53:01 +0200344 goto out;
345
346 switch (packet_type) {
347 case BATADV_UNICAST:
Antonio Quartulli33faa042013-10-19 14:06:05 +0200348 if (!batadv_send_skb_prepare_unicast(skb, orig_node))
349 goto out;
Martin Hundebøllf097e252013-05-23 16:53:01 +0200350 break;
351 case BATADV_UNICAST_4ADDR:
Antonio Quartulli33faa042013-10-19 14:06:05 +0200352 if (!batadv_send_skb_prepare_unicast_4addr(bat_priv, skb,
353 orig_node,
354 packet_subtype))
355 goto out;
Martin Hundebøllf097e252013-05-23 16:53:01 +0200356 break;
357 default:
358 /* this function supports UNICAST and UNICAST_4ADDR only. It
359 * should never be invoked with any other packet type
360 */
361 goto out;
362 }
363
Linus Lüssing927c2ed2014-01-19 22:22:45 +0100364 /* skb->data might have been reallocated by
365 * batadv_send_skb_prepare_unicast{,_4addr}()
366 */
367 ethhdr = eth_hdr(skb);
Martin Hundebøllf097e252013-05-23 16:53:01 +0200368 unicast_packet = (struct batadv_unicast_packet *)skb->data;
369
370 /* inform the destination node that we are still missing a correct route
371 * for this client. The destination will receive this packet and will
372 * try to reroute it because the ttvn contained in the header is less
373 * than the current one
374 */
Antonio Quartullic018ad32013-06-04 12:11:39 +0200375 if (batadv_tt_global_client_is_roaming(bat_priv, ethhdr->h_dest, vid))
Martin Hundebøllf097e252013-05-23 16:53:01 +0200376 unicast_packet->ttvn = unicast_packet->ttvn - 1;
377
Sven Eckelmann1ad5bcb2016-07-17 21:04:03 +0200378 ret = batadv_send_skb_to_orig(skb, orig_node, NULL);
379 /* skb was consumed */
380 skb = NULL;
Martin Hundebøllf097e252013-05-23 16:53:01 +0200381
382out:
Sven Eckelmann1ad5bcb2016-07-17 21:04:03 +0200383 kfree_skb(skb);
Martin Hundebøllf097e252013-05-23 16:53:01 +0200384 return ret;
385}
386
Linus Lüssinge300d312013-07-03 10:40:00 +0200387/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100388 * batadv_send_skb_via_tt_generic() - send an skb via TT lookup
Linus Lüssinge300d312013-07-03 10:40:00 +0200389 * @bat_priv: the bat priv with all the soft interface information
390 * @skb: payload to send
391 * @packet_type: the batman unicast packet type to use
392 * @packet_subtype: the unicast 4addr packet subtype (only relevant for unicast
393 * 4addr packets)
Antonio Quartullic5d3a652014-02-15 11:58:01 +0100394 * @dst_hint: can be used to override the destination contained in the skb
Linus Lüssinge300d312013-07-03 10:40:00 +0200395 * @vid: the vid to be used to search the translation table
396 *
397 * Look up the recipient node for the destination address in the ethernet
398 * header via the translation table. Wrap the given skb into a batman-adv
399 * unicast or unicast-4addr header depending on whether BATADV_UNICAST or
400 * BATADV_UNICAST_4ADDR was supplied as packet_type. Then send this frame
401 * to the according destination node.
402 *
Sven Eckelmann62fe7102015-09-15 19:00:48 +0200403 * Return: NET_XMIT_DROP in case of error or NET_XMIT_SUCCESS otherwise.
Linus Lüssinge300d312013-07-03 10:40:00 +0200404 */
405int batadv_send_skb_via_tt_generic(struct batadv_priv *bat_priv,
406 struct sk_buff *skb, int packet_type,
Sven Eckelmann6b5e9712015-05-26 18:34:26 +0200407 int packet_subtype, u8 *dst_hint,
Antonio Quartulli6c413b12013-11-05 19:31:08 +0100408 unsigned short vid)
Linus Lüssinge300d312013-07-03 10:40:00 +0200409{
410 struct ethhdr *ethhdr = (struct ethhdr *)skb->data;
411 struct batadv_orig_node *orig_node;
Sven Eckelmann6b5e9712015-05-26 18:34:26 +0200412 u8 *src, *dst;
Sven Eckelmannf19dc772016-06-27 08:15:42 +0200413 int ret;
Linus Lüssinge300d312013-07-03 10:40:00 +0200414
Antonio Quartulli6c413b12013-11-05 19:31:08 +0100415 src = ethhdr->h_source;
416 dst = ethhdr->h_dest;
417
418 /* if we got an hint! let's send the packet to this client (if any) */
419 if (dst_hint) {
420 src = NULL;
421 dst = dst_hint;
422 }
423 orig_node = batadv_transtable_search(bat_priv, src, dst, vid);
424
Sven Eckelmannf19dc772016-06-27 08:15:42 +0200425 ret = batadv_send_skb_unicast(bat_priv, skb, packet_type,
426 packet_subtype, orig_node, vid);
427
428 if (orig_node)
429 batadv_orig_node_put(orig_node);
430
431 return ret;
Linus Lüssinge300d312013-07-03 10:40:00 +0200432}
433
434/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100435 * batadv_send_skb_via_gw() - send an skb via gateway lookup
Linus Lüssinge300d312013-07-03 10:40:00 +0200436 * @bat_priv: the bat priv with all the soft interface information
437 * @skb: payload to send
438 * @vid: the vid to be used to search the translation table
439 *
440 * Look up the currently selected gateway. Wrap the given skb into a batman-adv
441 * unicast header and send this frame to this gateway node.
442 *
Sven Eckelmann62fe7102015-09-15 19:00:48 +0200443 * Return: NET_XMIT_DROP in case of error or NET_XMIT_SUCCESS otherwise.
Linus Lüssinge300d312013-07-03 10:40:00 +0200444 */
445int batadv_send_skb_via_gw(struct batadv_priv *bat_priv, struct sk_buff *skb,
446 unsigned short vid)
447{
448 struct batadv_orig_node *orig_node;
Sven Eckelmannf19dc772016-06-27 08:15:42 +0200449 int ret;
Linus Lüssinge300d312013-07-03 10:40:00 +0200450
451 orig_node = batadv_gw_get_selected_orig(bat_priv);
Sven Eckelmannf19dc772016-06-27 08:15:42 +0200452 ret = batadv_send_skb_unicast(bat_priv, skb, BATADV_UNICAST_4ADDR,
453 BATADV_P_DATA, orig_node, vid);
454
455 if (orig_node)
456 batadv_orig_node_put(orig_node);
457
458 return ret;
Linus Lüssinge300d312013-07-03 10:40:00 +0200459}
460
Linus Lüssinga65e5482016-06-20 21:39:54 +0200461/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100462 * batadv_forw_packet_free() - free a forwarding packet
Linus Lüssinga65e5482016-06-20 21:39:54 +0200463 * @forw_packet: The packet to free
Sven Eckelmannbd687fe2016-07-17 21:04:00 +0200464 * @dropped: whether the packet is freed because is is dropped
Linus Lüssinga65e5482016-06-20 21:39:54 +0200465 *
466 * This frees a forwarding packet and releases any resources it might
467 * have claimed.
468 */
Sven Eckelmannbd687fe2016-07-17 21:04:00 +0200469void batadv_forw_packet_free(struct batadv_forw_packet *forw_packet,
470 bool dropped)
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000471{
Sven Eckelmannbd687fe2016-07-17 21:04:00 +0200472 if (dropped)
473 kfree_skb(forw_packet->skb);
474 else
475 consume_skb(forw_packet->skb);
476
Sven Eckelmann6d5808d2011-05-11 20:59:06 +0200477 if (forw_packet->if_incoming)
Sven Eckelmann82047ad2016-01-17 11:01:10 +0100478 batadv_hardif_put(forw_packet->if_incoming);
Simon Wunderlichef0a9372013-11-13 19:14:49 +0100479 if (forw_packet->if_outgoing)
Sven Eckelmann82047ad2016-01-17 11:01:10 +0100480 batadv_hardif_put(forw_packet->if_outgoing);
Linus Lüssinga65e5482016-06-20 21:39:54 +0200481 if (forw_packet->queue_left)
482 atomic_inc(forw_packet->queue_left);
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000483 kfree(forw_packet);
484}
485
Linus Lüssinga65e5482016-06-20 21:39:54 +0200486/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100487 * batadv_forw_packet_alloc() - allocate a forwarding packet
Linus Lüssinga65e5482016-06-20 21:39:54 +0200488 * @if_incoming: The (optional) if_incoming to be grabbed
489 * @if_outgoing: The (optional) if_outgoing to be grabbed
490 * @queue_left: The (optional) queue counter to decrease
491 * @bat_priv: The bat_priv for the mesh of this forw_packet
Linus Lüssing99ba18e2017-02-17 11:17:06 +0100492 * @skb: The raw packet this forwarding packet shall contain
Linus Lüssinga65e5482016-06-20 21:39:54 +0200493 *
494 * Allocates a forwarding packet and tries to get a reference to the
495 * (optional) if_incoming, if_outgoing and queue_left. If queue_left
496 * is NULL then bat_priv is optional, too.
497 *
498 * Return: An allocated forwarding packet on success, NULL otherwise.
499 */
500struct batadv_forw_packet *
501batadv_forw_packet_alloc(struct batadv_hard_iface *if_incoming,
502 struct batadv_hard_iface *if_outgoing,
503 atomic_t *queue_left,
Linus Lüssing99ba18e2017-02-17 11:17:06 +0100504 struct batadv_priv *bat_priv,
505 struct sk_buff *skb)
Linus Lüssinga65e5482016-06-20 21:39:54 +0200506{
507 struct batadv_forw_packet *forw_packet;
508 const char *qname;
509
510 if (queue_left && !batadv_atomic_dec_not_zero(queue_left)) {
511 qname = "unknown";
512
513 if (queue_left == &bat_priv->bcast_queue_left)
514 qname = "bcast";
515
516 if (queue_left == &bat_priv->batman_queue_left)
517 qname = "batman";
518
519 batadv_dbg(BATADV_DBG_BATMAN, bat_priv,
520 "%s queue is full\n", qname);
521
522 return NULL;
523 }
524
525 forw_packet = kmalloc(sizeof(*forw_packet), GFP_ATOMIC);
526 if (!forw_packet)
527 goto err;
528
529 if (if_incoming)
530 kref_get(&if_incoming->refcount);
531
532 if (if_outgoing)
533 kref_get(&if_outgoing->refcount);
534
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100535 INIT_HLIST_NODE(&forw_packet->list);
536 INIT_HLIST_NODE(&forw_packet->cleanup_list);
Linus Lüssing99ba18e2017-02-17 11:17:06 +0100537 forw_packet->skb = skb;
Linus Lüssinga65e5482016-06-20 21:39:54 +0200538 forw_packet->queue_left = queue_left;
539 forw_packet->if_incoming = if_incoming;
540 forw_packet->if_outgoing = if_outgoing;
541 forw_packet->num_packets = 0;
542
543 return forw_packet;
544
545err:
546 if (queue_left)
547 atomic_inc(queue_left);
548
549 return NULL;
550}
551
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100552/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100553 * batadv_forw_packet_was_stolen() - check whether someone stole this packet
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100554 * @forw_packet: the forwarding packet to check
555 *
556 * This function checks whether the given forwarding packet was claimed by
557 * someone else for free().
558 *
559 * Return: True if someone stole it, false otherwise.
560 */
561static bool
562batadv_forw_packet_was_stolen(struct batadv_forw_packet *forw_packet)
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000563{
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100564 return !hlist_unhashed(&forw_packet->cleanup_list);
565}
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000566
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100567/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100568 * batadv_forw_packet_steal() - claim a forw_packet for free()
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100569 * @forw_packet: the forwarding packet to steal
570 * @lock: a key to the store to steal from (e.g. forw_{bat,bcast}_list_lock)
571 *
572 * This function tries to steal a specific forw_packet from global
573 * visibility for the purpose of getting it for free(). That means
574 * the caller is *not* allowed to requeue it afterwards.
575 *
576 * Return: True if stealing was successful. False if someone else stole it
577 * before us.
578 */
579bool batadv_forw_packet_steal(struct batadv_forw_packet *forw_packet,
580 spinlock_t *lock)
581{
582 /* did purging routine steal it earlier? */
583 spin_lock_bh(lock);
584 if (batadv_forw_packet_was_stolen(forw_packet)) {
585 spin_unlock_bh(lock);
586 return false;
587 }
588
589 hlist_del_init(&forw_packet->list);
590
591 /* Just to spot misuse of this function */
592 hlist_add_fake(&forw_packet->cleanup_list);
593
594 spin_unlock_bh(lock);
595 return true;
596}
597
598/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100599 * batadv_forw_packet_list_steal() - claim a list of forward packets for free()
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100600 * @forw_list: the to be stolen forward packets
601 * @cleanup_list: a backup pointer, to be able to dispose the packet later
602 * @hard_iface: the interface to steal forward packets from
603 *
604 * This function claims responsibility to free any forw_packet queued on the
605 * given hard_iface. If hard_iface is NULL forwarding packets on all hard
606 * interfaces will be claimed.
607 *
608 * The packets are being moved from the forw_list to the cleanup_list and
609 * by that allows already running threads to notice the claiming.
610 */
611static void
612batadv_forw_packet_list_steal(struct hlist_head *forw_list,
613 struct hlist_head *cleanup_list,
614 const struct batadv_hard_iface *hard_iface)
615{
616 struct batadv_forw_packet *forw_packet;
617 struct hlist_node *safe_tmp_node;
618
619 hlist_for_each_entry_safe(forw_packet, safe_tmp_node,
620 forw_list, list) {
621 /* if purge_outstanding_packets() was called with an argument
622 * we delete only packets belonging to the given interface
623 */
624 if (hard_iface &&
Sven Eckelmann825ffe12017-08-23 21:52:13 +0200625 forw_packet->if_incoming != hard_iface &&
626 forw_packet->if_outgoing != hard_iface)
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100627 continue;
628
629 hlist_del(&forw_packet->list);
630 hlist_add_head(&forw_packet->cleanup_list, cleanup_list);
631 }
632}
633
634/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100635 * batadv_forw_packet_list_free() - free a list of forward packets
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100636 * @head: a list of to be freed forw_packets
637 *
638 * This function cancels the scheduling of any packet in the provided list,
639 * waits for any possibly running packet forwarding thread to finish and
640 * finally, safely frees this forward packet.
641 *
642 * This function might sleep.
643 */
644static void batadv_forw_packet_list_free(struct hlist_head *head)
645{
646 struct batadv_forw_packet *forw_packet;
647 struct hlist_node *safe_tmp_node;
648
649 hlist_for_each_entry_safe(forw_packet, safe_tmp_node, head,
650 cleanup_list) {
651 cancel_delayed_work_sync(&forw_packet->delayed_work);
652
653 hlist_del(&forw_packet->cleanup_list);
654 batadv_forw_packet_free(forw_packet, true);
655 }
656}
657
658/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100659 * batadv_forw_packet_queue() - try to queue a forwarding packet
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100660 * @forw_packet: the forwarding packet to queue
661 * @lock: a key to the store (e.g. forw_{bat,bcast}_list_lock)
662 * @head: the shelve to queue it on (e.g. forw_{bat,bcast}_list)
663 * @send_time: timestamp (jiffies) when the packet is to be sent
664 *
665 * This function tries to (re)queue a forwarding packet. Requeuing
666 * is prevented if the according interface is shutting down
667 * (e.g. if batadv_forw_packet_list_steal() was called for this
668 * packet earlier).
669 *
670 * Calling batadv_forw_packet_queue() after a call to
671 * batadv_forw_packet_steal() is forbidden!
672 *
673 * Caller needs to ensure that forw_packet->delayed_work was initialized.
674 */
675static void batadv_forw_packet_queue(struct batadv_forw_packet *forw_packet,
676 spinlock_t *lock, struct hlist_head *head,
677 unsigned long send_time)
678{
679 spin_lock_bh(lock);
680
681 /* did purging routine steal it from us? */
682 if (batadv_forw_packet_was_stolen(forw_packet)) {
683 /* If you got it for free() without trouble, then
684 * don't get back into the queue after stealing...
685 */
686 WARN_ONCE(hlist_fake(&forw_packet->cleanup_list),
687 "Requeuing after batadv_forw_packet_steal() not allowed!\n");
688
689 spin_unlock_bh(lock);
690 return;
691 }
692
693 hlist_del_init(&forw_packet->list);
694 hlist_add_head(&forw_packet->list, head);
695
696 queue_delayed_work(batadv_event_workqueue,
697 &forw_packet->delayed_work,
698 send_time - jiffies);
699 spin_unlock_bh(lock);
700}
701
702/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100703 * batadv_forw_packet_bcast_queue() - try to queue a broadcast packet
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100704 * @bat_priv: the bat priv with all the soft interface information
705 * @forw_packet: the forwarding packet to queue
706 * @send_time: timestamp (jiffies) when the packet is to be sent
707 *
708 * This function tries to (re)queue a broadcast packet.
709 *
710 * Caller needs to ensure that forw_packet->delayed_work was initialized.
711 */
712static void
713batadv_forw_packet_bcast_queue(struct batadv_priv *bat_priv,
714 struct batadv_forw_packet *forw_packet,
715 unsigned long send_time)
716{
717 batadv_forw_packet_queue(forw_packet, &bat_priv->forw_bcast_list_lock,
718 &bat_priv->forw_bcast_list, send_time);
719}
720
721/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100722 * batadv_forw_packet_ogmv1_queue() - try to queue an OGMv1 packet
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100723 * @bat_priv: the bat priv with all the soft interface information
724 * @forw_packet: the forwarding packet to queue
725 * @send_time: timestamp (jiffies) when the packet is to be sent
726 *
727 * This function tries to (re)queue an OGMv1 packet.
728 *
729 * Caller needs to ensure that forw_packet->delayed_work was initialized.
730 */
731void batadv_forw_packet_ogmv1_queue(struct batadv_priv *bat_priv,
732 struct batadv_forw_packet *forw_packet,
733 unsigned long send_time)
734{
735 batadv_forw_packet_queue(forw_packet, &bat_priv->forw_bat_list_lock,
736 &bat_priv->forw_bat_list, send_time);
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000737}
738
Sven Eckelmann62fe7102015-09-15 19:00:48 +0200739/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100740 * batadv_add_bcast_packet_to_list() - queue broadcast packet for multiple sends
Sven Eckelmann7afcbbe2015-10-31 12:29:29 +0100741 * @bat_priv: the bat priv with all the soft interface information
742 * @skb: broadcast packet to add
743 * @delay: number of jiffies to wait before sending
Linus Lüssing3111bee2016-08-07 12:34:19 +0200744 * @own_packet: true if it is a self-generated broadcast packet
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000745 *
Sven Eckelmann62fe7102015-09-15 19:00:48 +0200746 * add a broadcast packet to the queue and setup timers. broadcast packets
747 * are sent multiple times to increase probability for being received.
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000748 *
749 * The skb is not consumed, so the caller should make sure that the
Sven Eckelmann9cfc7bd2012-05-12 02:09:43 +0200750 * skb is freed.
Sven Eckelmann62fe7102015-09-15 19:00:48 +0200751 *
752 * Return: NETDEV_TX_OK on success and NETDEV_TX_BUSY on errors.
Sven Eckelmann9cfc7bd2012-05-12 02:09:43 +0200753 */
Sven Eckelmann56303d32012-06-05 22:31:31 +0200754int batadv_add_bcast_packet_to_list(struct batadv_priv *bat_priv,
Sven Eckelmann9455e342012-05-12 02:09:37 +0200755 const struct sk_buff *skb,
Linus Lüssing3111bee2016-08-07 12:34:19 +0200756 unsigned long delay,
757 bool own_packet)
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000758{
Sven Eckelmann422d2f72016-07-25 00:42:44 +0200759 struct batadv_hard_iface *primary_if;
Sven Eckelmann56303d32012-06-05 22:31:31 +0200760 struct batadv_forw_packet *forw_packet;
Sven Eckelmann96412692012-06-05 22:31:30 +0200761 struct batadv_bcast_packet *bcast_packet;
Sven Eckelmann747e4222011-05-14 23:14:50 +0200762 struct sk_buff *newskb;
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000763
Sven Eckelmanne5d89252012-05-12 13:48:54 +0200764 primary_if = batadv_primary_if_get_selected(bat_priv);
Marek Lindner32ae9b22011-04-20 15:40:58 +0200765 if (!primary_if)
Linus Lüssinga65e5482016-06-20 21:39:54 +0200766 goto err;
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000767
Linus Lüssing99ba18e2017-02-17 11:17:06 +0100768 newskb = skb_copy(skb, GFP_ATOMIC);
769 if (!newskb) {
770 batadv_hardif_put(primary_if);
771 goto err;
772 }
773
Linus Lüssinga65e5482016-06-20 21:39:54 +0200774 forw_packet = batadv_forw_packet_alloc(primary_if, NULL,
775 &bat_priv->bcast_queue_left,
Linus Lüssing99ba18e2017-02-17 11:17:06 +0100776 bat_priv, newskb);
Linus Lüssinga65e5482016-06-20 21:39:54 +0200777 batadv_hardif_put(primary_if);
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000778 if (!forw_packet)
Linus Lüssinga65e5482016-06-20 21:39:54 +0200779 goto err_packet_free;
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000780
781 /* as we have a copy now, it is safe to decrease the TTL */
Sven Eckelmann96412692012-06-05 22:31:30 +0200782 bcast_packet = (struct batadv_bcast_packet *)newskb->data;
Simon Wunderlicha40d9b02013-12-02 20:38:31 +0100783 bcast_packet->ttl--;
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000784
Linus Lüssing3111bee2016-08-07 12:34:19 +0200785 forw_packet->own = own_packet;
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000786
Antonio Quartulli72414442012-12-25 13:14:37 +0100787 INIT_DELAYED_WORK(&forw_packet->delayed_work,
788 batadv_send_outstanding_bcast_packet);
789
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100790 batadv_forw_packet_bcast_queue(bat_priv, forw_packet, jiffies + delay);
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000791 return NETDEV_TX_OK;
792
Linus Lüssinga65e5482016-06-20 21:39:54 +0200793err_packet_free:
Linus Lüssing99ba18e2017-02-17 11:17:06 +0100794 kfree_skb(newskb);
Linus Lüssinga65e5482016-06-20 21:39:54 +0200795err:
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000796 return NETDEV_TX_BUSY;
797}
798
Linus Lüssinge2d9ba42017-02-17 11:17:07 +0100799/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100800 * batadv_forw_packet_bcasts_left() - check if a retransmission is necessary
Linus Lüssinge2d9ba42017-02-17 11:17:07 +0100801 * @forw_packet: the forwarding packet to check
802 * @hard_iface: the interface to check on
803 *
804 * Checks whether a given packet has any (re)transmissions left on the provided
805 * interface.
806 *
807 * hard_iface may be NULL: In that case the number of transmissions this skb had
808 * so far is compared with the maximum amount of retransmissions independent of
809 * any interface instead.
810 *
811 * Return: True if (re)transmissions are left, false otherwise.
812 */
813static bool
814batadv_forw_packet_bcasts_left(struct batadv_forw_packet *forw_packet,
815 struct batadv_hard_iface *hard_iface)
816{
817 unsigned int max;
818
819 if (hard_iface)
820 max = hard_iface->num_bcasts;
821 else
822 max = BATADV_NUM_BCASTS_MAX;
823
824 return BATADV_SKB_CB(forw_packet->skb)->num_bcasts < max;
825}
826
827/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100828 * batadv_forw_packet_bcasts_inc() - increment retransmission counter of a
829 * packet
Linus Lüssinge2d9ba42017-02-17 11:17:07 +0100830 * @forw_packet: the packet to increase the counter for
831 */
832static void
833batadv_forw_packet_bcasts_inc(struct batadv_forw_packet *forw_packet)
834{
835 BATADV_SKB_CB(forw_packet->skb)->num_bcasts++;
836}
837
838/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100839 * batadv_forw_packet_is_rebroadcast() - check packet for previous transmissions
Linus Lüssinge2d9ba42017-02-17 11:17:07 +0100840 * @forw_packet: the packet to check
841 *
842 * Return: True if this packet was transmitted before, false otherwise.
843 */
844bool batadv_forw_packet_is_rebroadcast(struct batadv_forw_packet *forw_packet)
845{
846 return BATADV_SKB_CB(forw_packet->skb)->num_bcasts > 0;
847}
848
Sven Eckelmannbb079c82012-05-16 20:23:14 +0200849static void batadv_send_outstanding_bcast_packet(struct work_struct *work)
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000850{
Sven Eckelmann56303d32012-06-05 22:31:31 +0200851 struct batadv_hard_iface *hard_iface;
Linus Lüssing3111bee2016-08-07 12:34:19 +0200852 struct batadv_hardif_neigh_node *neigh_node;
Sven Eckelmannbbb1f902012-07-08 17:13:15 +0200853 struct delayed_work *delayed_work;
Sven Eckelmann56303d32012-06-05 22:31:31 +0200854 struct batadv_forw_packet *forw_packet;
Linus Lüssing3111bee2016-08-07 12:34:19 +0200855 struct batadv_bcast_packet *bcast_packet;
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000856 struct sk_buff *skb1;
Sven Eckelmann56303d32012-06-05 22:31:31 +0200857 struct net_device *soft_iface;
858 struct batadv_priv *bat_priv;
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100859 unsigned long send_time = jiffies + msecs_to_jiffies(5);
Sven Eckelmannbd687fe2016-07-17 21:04:00 +0200860 bool dropped = false;
Linus Lüssing3111bee2016-08-07 12:34:19 +0200861 u8 *neigh_addr;
862 u8 *orig_neigh;
863 int ret = 0;
Sven Eckelmann56303d32012-06-05 22:31:31 +0200864
Geliang Tang4ba4bc02015-12-28 23:43:37 +0800865 delayed_work = to_delayed_work(work);
Sven Eckelmann56303d32012-06-05 22:31:31 +0200866 forw_packet = container_of(delayed_work, struct batadv_forw_packet,
867 delayed_work);
868 soft_iface = forw_packet->if_incoming->soft_iface;
869 bat_priv = netdev_priv(soft_iface);
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000870
Sven Eckelmannbd687fe2016-07-17 21:04:00 +0200871 if (atomic_read(&bat_priv->mesh_state) == BATADV_MESH_DEACTIVATING) {
872 dropped = true;
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000873 goto out;
Sven Eckelmannbd687fe2016-07-17 21:04:00 +0200874 }
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000875
Sven Eckelmannbd687fe2016-07-17 21:04:00 +0200876 if (batadv_dat_drop_broadcast_packet(bat_priv, forw_packet)) {
877 dropped = true;
Antonio Quartullic384ea32011-06-26 03:37:18 +0200878 goto out;
Sven Eckelmannbd687fe2016-07-17 21:04:00 +0200879 }
Antonio Quartullic384ea32011-06-26 03:37:18 +0200880
Linus Lüssing3111bee2016-08-07 12:34:19 +0200881 bcast_packet = (struct batadv_bcast_packet *)forw_packet->skb->data;
882
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000883 /* rebroadcast packet */
884 rcu_read_lock();
Sven Eckelmann3193e8f2012-05-12 02:09:42 +0200885 list_for_each_entry_rcu(hard_iface, &batadv_hardif_list, list) {
Marek Lindnere6c10f42011-02-18 12:33:20 +0000886 if (hard_iface->soft_iface != soft_iface)
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000887 continue;
888
Linus Lüssinge2d9ba42017-02-17 11:17:07 +0100889 if (!batadv_forw_packet_bcasts_left(forw_packet, hard_iface))
Matthias Schiffercaf65bf2013-03-09 23:14:23 +0100890 continue;
891
Linus Lüssing3111bee2016-08-07 12:34:19 +0200892 if (forw_packet->own) {
893 neigh_node = NULL;
894 } else {
895 neigh_addr = eth_hdr(forw_packet->skb)->h_source;
896 neigh_node = batadv_hardif_neigh_get(hard_iface,
897 neigh_addr);
898 }
899
900 orig_neigh = neigh_node ? neigh_node->orig : NULL;
901
902 ret = batadv_hardif_no_broadcast(hard_iface, bcast_packet->orig,
903 orig_neigh);
904
905 if (ret) {
906 char *type;
907
908 switch (ret) {
909 case BATADV_HARDIF_BCAST_NORECIPIENT:
910 type = "no neighbor";
911 break;
912 case BATADV_HARDIF_BCAST_DUPFWD:
913 type = "single neighbor is source";
914 break;
915 case BATADV_HARDIF_BCAST_DUPORIG:
916 type = "single neighbor is originator";
917 break;
918 default:
919 type = "unknown";
920 }
921
Colin Ian Kingf25cbb22017-06-26 11:26:44 +0100922 batadv_dbg(BATADV_DBG_BATMAN, bat_priv, "BCAST packet from orig %pM on %s suppressed: %s\n",
Linus Lüssing3111bee2016-08-07 12:34:19 +0200923 bcast_packet->orig,
924 hard_iface->net_dev->name, type);
925
926 if (neigh_node)
927 batadv_hardif_neigh_put(neigh_node);
928
929 continue;
930 }
931
932 if (neigh_node)
933 batadv_hardif_neigh_put(neigh_node);
934
Sven Eckelmann27353442016-03-05 16:09:16 +0100935 if (!kref_get_unless_zero(&hard_iface->refcount))
936 continue;
937
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000938 /* send a copy of the saved skb */
939 skb1 = skb_clone(forw_packet->skb, GFP_ATOMIC);
940 if (skb1)
Antonio Quartulli95d39272016-01-16 16:40:15 +0800941 batadv_send_broadcast_skb(skb1, hard_iface);
Sven Eckelmann27353442016-03-05 16:09:16 +0100942
943 batadv_hardif_put(hard_iface);
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000944 }
945 rcu_read_unlock();
946
Linus Lüssinge2d9ba42017-02-17 11:17:07 +0100947 batadv_forw_packet_bcasts_inc(forw_packet);
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000948
949 /* if we still have some more bcasts to send */
Linus Lüssinge2d9ba42017-02-17 11:17:07 +0100950 if (batadv_forw_packet_bcasts_left(forw_packet, NULL)) {
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100951 batadv_forw_packet_bcast_queue(bat_priv, forw_packet,
952 send_time);
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000953 return;
954 }
955
956out:
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100957 /* do we get something for free()? */
958 if (batadv_forw_packet_steal(forw_packet,
959 &bat_priv->forw_bcast_list_lock))
960 batadv_forw_packet_free(forw_packet, dropped);
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000961}
962
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100963/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100964 * batadv_purge_outstanding_packets() - stop/purge scheduled bcast/OGMv1 packets
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100965 * @bat_priv: the bat priv with all the soft interface information
966 * @hard_iface: the hard interface to cancel and purge bcast/ogm packets on
967 *
968 * This method cancels and purges any broadcast and OGMv1 packet on the given
969 * hard_iface. If hard_iface is NULL, broadcast and OGMv1 packets on all hard
970 * interfaces will be canceled and purged.
971 *
972 * This function might sleep.
973 */
Sven Eckelmann56303d32012-06-05 22:31:31 +0200974void
975batadv_purge_outstanding_packets(struct batadv_priv *bat_priv,
976 const struct batadv_hard_iface *hard_iface)
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000977{
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100978 struct hlist_head head = HLIST_HEAD_INIT;
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000979
Marek Lindnere6c10f42011-02-18 12:33:20 +0000980 if (hard_iface)
Sven Eckelmann39c75a52012-06-03 22:19:22 +0200981 batadv_dbg(BATADV_DBG_BATMAN, bat_priv,
Sven Eckelmann22f05022017-05-19 13:02:00 +0200982 "%s(): %s\n",
983 __func__, hard_iface->net_dev->name);
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000984 else
Sven Eckelmann39c75a52012-06-03 22:19:22 +0200985 batadv_dbg(BATADV_DBG_BATMAN, bat_priv,
Sven Eckelmann22f05022017-05-19 13:02:00 +0200986 "%s()\n", __func__);
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000987
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100988 /* claim bcast list for free() */
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000989 spin_lock_bh(&bat_priv->forw_bcast_list_lock);
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100990 batadv_forw_packet_list_steal(&bat_priv->forw_bcast_list, &head,
991 hard_iface);
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000992 spin_unlock_bh(&bat_priv->forw_bcast_list_lock);
993
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100994 /* claim batman packet list for free() */
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000995 spin_lock_bh(&bat_priv->forw_bat_list_lock);
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100996 batadv_forw_packet_list_steal(&bat_priv->forw_bat_list, &head,
997 hard_iface);
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +0000998 spin_unlock_bh(&bat_priv->forw_bat_list_lock);
Linus Lüssing9b4aec62016-11-01 09:44:44 +0100999
1000 /* then cancel or wait for packet workers to finish and free */
1001 batadv_forw_packet_list_free(&head);
Sven Eckelmannc6c8fea2010-12-13 11:19:28 +00001002}