send.c 11.3 KB
Newer Older
1
/*
2
 * Copyright (C) 2007-2011 B.A.T.M.A.N. contributors:
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30
 *
 * Marek Lindner, Simon Wunderlich
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of version 2 of the GNU General Public
 * License as published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
 * General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
 * 02110-1301, USA
 *
 */

#include "main.h"
#include "send.h"
#include "routing.h"
#include "translation-table.h"
#include "soft-interface.h"
#include "hard-interface.h"
#include "vis.h"
#include "gateway_common.h"
#include "originator.h"
31
#include "bat_ogm.h"
32 33 34 35 36

static void send_outstanding_bcast_packet(struct work_struct *work);

/* send out an already prepared packet to the given address via the
 * specified batman interface */
37 38
int send_skb_packet(struct sk_buff *skb, struct hard_iface *hard_iface,
		    const uint8_t *dst_addr)
39 40 41
{
	struct ethhdr *ethhdr;

42
	if (hard_iface->if_status != IF_ACTIVE)
43 44
		goto send_skb_err;

45
	if (unlikely(!hard_iface->net_dev))
46 47
		goto send_skb_err;

48
	if (!(hard_iface->net_dev->flags & IFF_UP)) {
49
		pr_warning("Interface %s is not up - can't send packet via "
50
			   "that interface!\n", hard_iface->net_dev->name);
51 52 53 54
		goto send_skb_err;
	}

	/* push to the ethernet header. */
55
	if (my_skb_head_push(skb, sizeof(*ethhdr)) < 0)
56 57 58 59 60
		goto send_skb_err;

	skb_reset_mac_header(skb);

	ethhdr = (struct ethhdr *) skb_mac_header(skb);
61
	memcpy(ethhdr->h_source, hard_iface->net_dev->dev_addr, ETH_ALEN);
62 63 64 65 66 67 68
	memcpy(ethhdr->h_dest, dst_addr, ETH_ALEN);
	ethhdr->h_proto = __constant_htons(ETH_P_BATMAN);

	skb_set_network_header(skb, ETH_HLEN);
	skb->priority = TC_PRIO_CONTROL;
	skb->protocol = __constant_htons(ETH_P_BATMAN);

69
	skb->dev = hard_iface->net_dev;
70 71 72 73 74 75 76 77 78 79 80

	/* dev_queue_xmit() returns a negative result on error.	 However on
	 * congestion and traffic shaping, it drops and returns NET_XMIT_DROP
	 * (which is > 0). This will not be treated as an error. */

	return dev_queue_xmit(skb);
send_skb_err:
	kfree_skb(skb);
	return NET_XMIT_DROP;
}

81
static void realloc_packet_buffer(struct hard_iface *hard_iface,
82
				  int new_len)
83 84 85 86 87 88 89
{
	unsigned char *new_buff;

	new_buff = kmalloc(new_len, GFP_ATOMIC);

	/* keep old buffer if kmalloc should fail */
	if (new_buff) {
90
		memcpy(new_buff, hard_iface->packet_buff,
91
		       BATMAN_OGM_LEN);
92

93 94 95
		kfree(hard_iface->packet_buff);
		hard_iface->packet_buff = new_buff;
		hard_iface->packet_len = new_len;
96 97 98
	}
}

99
/* when calling this function (hard_iface == primary_if) has to be true */
100
static int prepare_packet_buffer(struct bat_priv *bat_priv,
101 102 103 104
				  struct hard_iface *hard_iface)
{
	int new_len;

105
	new_len = BATMAN_OGM_LEN +
106 107 108 109 110
		  tt_len((uint8_t)atomic_read(&bat_priv->tt_local_changes));

	/* if we have too many changes for one packet don't send any
	 * and wait for the tt table request which will be fragmented */
	if (new_len > hard_iface->soft_iface->mtu)
111
		new_len = BATMAN_OGM_LEN;
112 113 114 115 116 117 118 119

	realloc_packet_buffer(hard_iface, new_len);

	atomic_set(&bat_priv->tt_crc, tt_local_crc(bat_priv));

	/* reset the sending counter */
	atomic_set(&bat_priv->tt_ogm_append_cnt, TT_OGM_APPEND_MAX);

120 121 122
	return tt_changes_fill_buffer(bat_priv,
				      hard_iface->packet_buff + BATMAN_OGM_LEN,
				      hard_iface->packet_len - BATMAN_OGM_LEN);
123 124
}

125
static int reset_packet_buffer(struct bat_priv *bat_priv,
126
				struct hard_iface *hard_iface)
127
{
128
	realloc_packet_buffer(hard_iface, BATMAN_OGM_LEN);
129
	return 0;
130 131
}

132
void schedule_bat_ogm(struct hard_iface *hard_iface)
133
{
134
	struct bat_priv *bat_priv = netdev_priv(hard_iface->soft_iface);
135
	struct hard_iface *primary_if;
136
	int tt_num_changes = -1;
137

138 139
	if ((hard_iface->if_status == IF_NOT_IN_USE) ||
	    (hard_iface->if_status == IF_TO_BE_REMOVED))
140 141 142 143 144 145 146 147 148
		return;

	/**
	 * the interface gets activated here to avoid race conditions between
	 * the moment of activating the interface in
	 * hardif_activate_interface() where the originator mac is set and
	 * outdated packets (especially uninitialized mac addresses) in the
	 * packet queue
	 */
149 150
	if (hard_iface->if_status == IF_TO_BE_ACTIVATED)
		hard_iface->if_status = IF_ACTIVE;
151

152 153
	primary_if = primary_if_get_selected(bat_priv);

154 155 156
	if (hard_iface == primary_if) {
		/* if at least one change happened */
		if (atomic_read(&bat_priv->tt_local_changes) > 0) {
157
			tt_commit_changes(bat_priv);
158 159
			tt_num_changes = prepare_packet_buffer(bat_priv,
							       hard_iface);
160 161
		}

162
		/* if the changes have been sent often enough */
163
		if (!atomic_dec_not_zero(&bat_priv->tt_ogm_append_cnt))
164 165
			tt_num_changes = reset_packet_buffer(bat_priv,
							     hard_iface);
166
	}
167

168 169
	if (primary_if)
		hardif_free_ref(primary_if);
170

171
	bat_ogm_schedule(hard_iface, tt_num_changes);
172 173 174 175 176 177
}

static void forw_packet_free(struct forw_packet *forw_packet)
{
	if (forw_packet->skb)
		kfree_skb(forw_packet->skb);
178 179
	if (forw_packet->if_incoming)
		hardif_free_ref(forw_packet->if_incoming);
180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201
	kfree(forw_packet);
}

static void _add_bcast_packet_to_list(struct bat_priv *bat_priv,
				      struct forw_packet *forw_packet,
				      unsigned long send_time)
{
	INIT_HLIST_NODE(&forw_packet->list);

	/* add new packet to packet list */
	spin_lock_bh(&bat_priv->forw_bcast_list_lock);
	hlist_add_head(&forw_packet->list, &bat_priv->forw_bcast_list);
	spin_unlock_bh(&bat_priv->forw_bcast_list_lock);

	/* start timer for this packet */
	INIT_DELAYED_WORK(&forw_packet->delayed_work,
			  send_outstanding_bcast_packet);
	queue_delayed_work(bat_event_workqueue, &forw_packet->delayed_work,
			   send_time);
}

/* add a broadcast packet to the queue and setup timers. broadcast packets
202
 * are sent multiple times to increase probability for being received.
203 204 205 206 207 208
 *
 * This function returns NETDEV_TX_OK on success and NETDEV_TX_BUSY on
 * errors.
 *
 * The skb is not consumed, so the caller should make sure that the
 * skb is freed. */
209
int add_bcast_packet_to_list(struct bat_priv *bat_priv,
210
			     const struct sk_buff *skb, unsigned long delay)
211
{
212
	struct hard_iface *primary_if = NULL;
213 214
	struct forw_packet *forw_packet;
	struct bcast_packet *bcast_packet;
215
	struct sk_buff *newskb;
216 217 218 219 220 221

	if (!atomic_dec_not_zero(&bat_priv->bcast_queue_left)) {
		bat_dbg(DBG_BATMAN, bat_priv, "bcast packet queue full\n");
		goto out;
	}

222 223
	primary_if = primary_if_get_selected(bat_priv);
	if (!primary_if)
224
		goto out_and_inc;
225

226
	forw_packet = kmalloc(sizeof(*forw_packet), GFP_ATOMIC);
227 228 229 230

	if (!forw_packet)
		goto out_and_inc;

231 232
	newskb = skb_copy(skb, GFP_ATOMIC);
	if (!newskb)
233 234 235
		goto packet_free;

	/* as we have a copy now, it is safe to decrease the TTL */
236
	bcast_packet = (struct bcast_packet *)newskb->data;
237 238
	bcast_packet->ttl--;

239
	skb_reset_mac_header(newskb);
240

241
	forw_packet->skb = newskb;
242
	forw_packet->if_incoming = primary_if;
243 244 245 246

	/* how often did we send the bcast packet ? */
	forw_packet->num_packets = 0;

247
	_add_bcast_packet_to_list(bat_priv, forw_packet, delay);
248 249 250 251 252 253 254
	return NETDEV_TX_OK;

packet_free:
	kfree(forw_packet);
out_and_inc:
	atomic_inc(&bat_priv->bcast_queue_left);
out:
255 256
	if (primary_if)
		hardif_free_ref(primary_if);
257 258 259 260 261
	return NETDEV_TX_BUSY;
}

static void send_outstanding_bcast_packet(struct work_struct *work)
{
262
	struct hard_iface *hard_iface;
263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279
	struct delayed_work *delayed_work =
		container_of(work, struct delayed_work, work);
	struct forw_packet *forw_packet =
		container_of(delayed_work, struct forw_packet, delayed_work);
	struct sk_buff *skb1;
	struct net_device *soft_iface = forw_packet->if_incoming->soft_iface;
	struct bat_priv *bat_priv = netdev_priv(soft_iface);

	spin_lock_bh(&bat_priv->forw_bcast_list_lock);
	hlist_del(&forw_packet->list);
	spin_unlock_bh(&bat_priv->forw_bcast_list_lock);

	if (atomic_read(&bat_priv->mesh_state) == MESH_DEACTIVATING)
		goto out;

	/* rebroadcast packet */
	rcu_read_lock();
280 281
	list_for_each_entry_rcu(hard_iface, &hardif_list, list) {
		if (hard_iface->soft_iface != soft_iface)
282 283 284 285 286
			continue;

		/* send a copy of the saved skb */
		skb1 = skb_clone(forw_packet->skb, GFP_ATOMIC);
		if (skb1)
287
			send_skb_packet(skb1, hard_iface, broadcast_addr);
288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304
	}
	rcu_read_unlock();

	forw_packet->num_packets++;

	/* if we still have some more bcasts to send */
	if (forw_packet->num_packets < 3) {
		_add_bcast_packet_to_list(bat_priv, forw_packet,
					  ((5 * HZ) / 1000));
		return;
	}

out:
	forw_packet_free(forw_packet);
	atomic_inc(&bat_priv->bcast_queue_left);
}

305
void send_outstanding_bat_ogm_packet(struct work_struct *work)
306 307 308 309 310 311 312 313 314 315 316 317 318 319 320
{
	struct delayed_work *delayed_work =
		container_of(work, struct delayed_work, work);
	struct forw_packet *forw_packet =
		container_of(delayed_work, struct forw_packet, delayed_work);
	struct bat_priv *bat_priv;

	bat_priv = netdev_priv(forw_packet->if_incoming->soft_iface);
	spin_lock_bh(&bat_priv->forw_bat_list_lock);
	hlist_del(&forw_packet->list);
	spin_unlock_bh(&bat_priv->forw_bat_list_lock);

	if (atomic_read(&bat_priv->mesh_state) == MESH_DEACTIVATING)
		goto out;

321
	bat_ogm_emit(forw_packet);
322 323 324 325 326 327 328

	/**
	 * we have to have at least one packet in the queue
	 * to determine the queues wake up time unless we are
	 * shutting down
	 */
	if (forw_packet->own)
329
		schedule_bat_ogm(forw_packet->if_incoming);
330 331 332 333 334 335 336 337 338 339

out:
	/* don't count own packet */
	if (!forw_packet->own)
		atomic_inc(&bat_priv->batman_queue_left);

	forw_packet_free(forw_packet);
}

void purge_outstanding_packets(struct bat_priv *bat_priv,
340
			       const struct hard_iface *hard_iface)
341 342 343
{
	struct forw_packet *forw_packet;
	struct hlist_node *tmp_node, *safe_tmp_node;
344
	bool pending;
345

346
	if (hard_iface)
347 348
		bat_dbg(DBG_BATMAN, bat_priv,
			"purge_outstanding_packets(): %s\n",
349
			hard_iface->net_dev->name);
350 351 352 353 354 355 356 357 358 359
	else
		bat_dbg(DBG_BATMAN, bat_priv,
			"purge_outstanding_packets()\n");

	/* free bcast list */
	spin_lock_bh(&bat_priv->forw_bcast_list_lock);
	hlist_for_each_entry_safe(forw_packet, tmp_node, safe_tmp_node,
				  &bat_priv->forw_bcast_list, list) {

		/**
360
		 * if purge_outstanding_packets() was called with an argument
361 362
		 * we delete only packets belonging to the given interface
		 */
363 364
		if ((hard_iface) &&
		    (forw_packet->if_incoming != hard_iface))
365 366 367 368 369 370 371 372
			continue;

		spin_unlock_bh(&bat_priv->forw_bcast_list_lock);

		/**
		 * send_outstanding_bcast_packet() will lock the list to
		 * delete the item from the list
		 */
373
		pending = cancel_delayed_work_sync(&forw_packet->delayed_work);
374
		spin_lock_bh(&bat_priv->forw_bcast_list_lock);
375 376 377 378 379

		if (pending) {
			hlist_del(&forw_packet->list);
			forw_packet_free(forw_packet);
		}
380 381 382 383 384 385 386 387 388
	}
	spin_unlock_bh(&bat_priv->forw_bcast_list_lock);

	/* free batman packet list */
	spin_lock_bh(&bat_priv->forw_bat_list_lock);
	hlist_for_each_entry_safe(forw_packet, tmp_node, safe_tmp_node,
				  &bat_priv->forw_bat_list, list) {

		/**
389
		 * if purge_outstanding_packets() was called with an argument
390 391
		 * we delete only packets belonging to the given interface
		 */
392 393
		if ((hard_iface) &&
		    (forw_packet->if_incoming != hard_iface))
394 395 396 397 398 399 400 401
			continue;

		spin_unlock_bh(&bat_priv->forw_bat_list_lock);

		/**
		 * send_outstanding_bat_packet() will lock the list to
		 * delete the item from the list
		 */
402
		pending = cancel_delayed_work_sync(&forw_packet->delayed_work);
403
		spin_lock_bh(&bat_priv->forw_bat_list_lock);
404 405 406 407 408

		if (pending) {
			hlist_del(&forw_packet->list);
			forw_packet_free(forw_packet);
		}
409 410 411
	}
	spin_unlock_bh(&bat_priv->forw_bat_list_lock);
}