send.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584
  1. /*
  2. * Copyright (C) 2007-2011 B.A.T.M.A.N. contributors:
  3. *
  4. * Marek Lindner, Simon Wunderlich
  5. *
  6. * This program is free software; you can redistribute it and/or
  7. * modify it under the terms of version 2 of the GNU General Public
  8. * License as published by the Free Software Foundation.
  9. *
  10. * This program is distributed in the hope that it will be useful, but
  11. * WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  13. * General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program; if not, write to the Free Software
  17. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
  18. * 02110-1301, USA
  19. *
  20. */
  21. #include "main.h"
  22. #include "send.h"
  23. #include "routing.h"
  24. #include "translation-table.h"
  25. #include "soft-interface.h"
  26. #include "hard-interface.h"
  27. #include "vis.h"
  28. #include "aggregation.h"
  29. #include "gateway_common.h"
  30. #include "originator.h"
  31. static void send_outstanding_bcast_packet(struct work_struct *work);
  32. /* apply hop penalty for a normal link */
  33. static uint8_t hop_penalty(const uint8_t tq, struct bat_priv *bat_priv)
  34. {
  35. int hop_penalty = atomic_read(&bat_priv->hop_penalty);
  36. return (tq * (TQ_MAX_VALUE - hop_penalty)) / (TQ_MAX_VALUE);
  37. }
  38. /* when do we schedule our own packet to be sent */
  39. static unsigned long own_send_time(struct bat_priv *bat_priv)
  40. {
  41. return jiffies + msecs_to_jiffies(
  42. atomic_read(&bat_priv->orig_interval) -
  43. JITTER + (random32() % 2*JITTER));
  44. }
  45. /* when do we schedule a forwarded packet to be sent */
  46. static unsigned long forward_send_time(void)
  47. {
  48. return jiffies + msecs_to_jiffies(random32() % (JITTER/2));
  49. }
  50. /* send out an already prepared packet to the given address via the
  51. * specified batman interface */
  52. int send_skb_packet(struct sk_buff *skb,
  53. struct batman_if *batman_if,
  54. uint8_t *dst_addr)
  55. {
  56. struct ethhdr *ethhdr;
  57. if (batman_if->if_status != IF_ACTIVE)
  58. goto send_skb_err;
  59. if (unlikely(!batman_if->net_dev))
  60. goto send_skb_err;
  61. if (!(batman_if->net_dev->flags & IFF_UP)) {
  62. pr_warning("Interface %s is not up - can't send packet via "
  63. "that interface!\n", batman_if->net_dev->name);
  64. goto send_skb_err;
  65. }
  66. /* push to the ethernet header. */
  67. if (my_skb_head_push(skb, sizeof(struct ethhdr)) < 0)
  68. goto send_skb_err;
  69. skb_reset_mac_header(skb);
  70. ethhdr = (struct ethhdr *) skb_mac_header(skb);
  71. memcpy(ethhdr->h_source, batman_if->net_dev->dev_addr, ETH_ALEN);
  72. memcpy(ethhdr->h_dest, dst_addr, ETH_ALEN);
  73. ethhdr->h_proto = __constant_htons(ETH_P_BATMAN);
  74. skb_set_network_header(skb, ETH_HLEN);
  75. skb->priority = TC_PRIO_CONTROL;
  76. skb->protocol = __constant_htons(ETH_P_BATMAN);
  77. skb->dev = batman_if->net_dev;
  78. /* dev_queue_xmit() returns a negative result on error. However on
  79. * congestion and traffic shaping, it drops and returns NET_XMIT_DROP
  80. * (which is > 0). This will not be treated as an error. */
  81. return dev_queue_xmit(skb);
  82. send_skb_err:
  83. kfree_skb(skb);
  84. return NET_XMIT_DROP;
  85. }
  86. /* Send a packet to a given interface */
  87. static void send_packet_to_if(struct forw_packet *forw_packet,
  88. struct batman_if *batman_if)
  89. {
  90. struct bat_priv *bat_priv = netdev_priv(batman_if->soft_iface);
  91. char *fwd_str;
  92. uint8_t packet_num;
  93. int16_t buff_pos;
  94. struct batman_packet *batman_packet;
  95. struct sk_buff *skb;
  96. if (batman_if->if_status != IF_ACTIVE)
  97. return;
  98. packet_num = 0;
  99. buff_pos = 0;
  100. batman_packet = (struct batman_packet *)forw_packet->skb->data;
  101. /* adjust all flags and log packets */
  102. while (aggregated_packet(buff_pos,
  103. forw_packet->packet_len,
  104. batman_packet->num_hna)) {
  105. /* we might have aggregated direct link packets with an
  106. * ordinary base packet */
  107. if ((forw_packet->direct_link_flags & (1 << packet_num)) &&
  108. (forw_packet->if_incoming == batman_if))
  109. batman_packet->flags |= DIRECTLINK;
  110. else
  111. batman_packet->flags &= ~DIRECTLINK;
  112. fwd_str = (packet_num > 0 ? "Forwarding" : (forw_packet->own ?
  113. "Sending own" :
  114. "Forwarding"));
  115. bat_dbg(DBG_BATMAN, bat_priv,
  116. "%s %spacket (originator %pM, seqno %d, TQ %d, TTL %d,"
  117. " IDF %s) on interface %s [%pM]\n",
  118. fwd_str, (packet_num > 0 ? "aggregated " : ""),
  119. batman_packet->orig, ntohl(batman_packet->seqno),
  120. batman_packet->tq, batman_packet->ttl,
  121. (batman_packet->flags & DIRECTLINK ?
  122. "on" : "off"),
  123. batman_if->net_dev->name, batman_if->net_dev->dev_addr);
  124. buff_pos += sizeof(struct batman_packet) +
  125. (batman_packet->num_hna * ETH_ALEN);
  126. packet_num++;
  127. batman_packet = (struct batman_packet *)
  128. (forw_packet->skb->data + buff_pos);
  129. }
  130. /* create clone because function is called more than once */
  131. skb = skb_clone(forw_packet->skb, GFP_ATOMIC);
  132. if (skb)
  133. send_skb_packet(skb, batman_if, broadcast_addr);
  134. }
  135. /* send a batman packet */
  136. static void send_packet(struct forw_packet *forw_packet)
  137. {
  138. struct batman_if *batman_if;
  139. struct net_device *soft_iface;
  140. struct bat_priv *bat_priv;
  141. struct batman_packet *batman_packet =
  142. (struct batman_packet *)(forw_packet->skb->data);
  143. unsigned char directlink = (batman_packet->flags & DIRECTLINK ? 1 : 0);
  144. if (!forw_packet->if_incoming) {
  145. pr_err("Error - can't forward packet: incoming iface not "
  146. "specified\n");
  147. return;
  148. }
  149. soft_iface = forw_packet->if_incoming->soft_iface;
  150. bat_priv = netdev_priv(soft_iface);
  151. if (forw_packet->if_incoming->if_status != IF_ACTIVE)
  152. return;
  153. /* multihomed peer assumed */
  154. /* non-primary OGMs are only broadcasted on their interface */
  155. if ((directlink && (batman_packet->ttl == 1)) ||
  156. (forw_packet->own && (forw_packet->if_incoming->if_num > 0))) {
  157. /* FIXME: what about aggregated packets ? */
  158. bat_dbg(DBG_BATMAN, bat_priv,
  159. "%s packet (originator %pM, seqno %d, TTL %d) "
  160. "on interface %s [%pM]\n",
  161. (forw_packet->own ? "Sending own" : "Forwarding"),
  162. batman_packet->orig, ntohl(batman_packet->seqno),
  163. batman_packet->ttl,
  164. forw_packet->if_incoming->net_dev->name,
  165. forw_packet->if_incoming->net_dev->dev_addr);
  166. /* skb is only used once and than forw_packet is free'd */
  167. send_skb_packet(forw_packet->skb, forw_packet->if_incoming,
  168. broadcast_addr);
  169. forw_packet->skb = NULL;
  170. return;
  171. }
  172. /* broadcast on every interface */
  173. rcu_read_lock();
  174. list_for_each_entry_rcu(batman_if, &if_list, list) {
  175. if (batman_if->soft_iface != soft_iface)
  176. continue;
  177. send_packet_to_if(forw_packet, batman_if);
  178. }
  179. rcu_read_unlock();
  180. }
  181. static void rebuild_batman_packet(struct bat_priv *bat_priv,
  182. struct batman_if *batman_if)
  183. {
  184. int new_len;
  185. unsigned char *new_buff;
  186. struct batman_packet *batman_packet;
  187. new_len = sizeof(struct batman_packet) +
  188. (bat_priv->num_local_hna * ETH_ALEN);
  189. new_buff = kmalloc(new_len, GFP_ATOMIC);
  190. /* keep old buffer if kmalloc should fail */
  191. if (new_buff) {
  192. memcpy(new_buff, batman_if->packet_buff,
  193. sizeof(struct batman_packet));
  194. batman_packet = (struct batman_packet *)new_buff;
  195. batman_packet->num_hna = hna_local_fill_buffer(bat_priv,
  196. new_buff + sizeof(struct batman_packet),
  197. new_len - sizeof(struct batman_packet));
  198. kfree(batman_if->packet_buff);
  199. batman_if->packet_buff = new_buff;
  200. batman_if->packet_len = new_len;
  201. }
  202. }
  203. void schedule_own_packet(struct batman_if *batman_if)
  204. {
  205. struct bat_priv *bat_priv = netdev_priv(batman_if->soft_iface);
  206. unsigned long send_time;
  207. struct batman_packet *batman_packet;
  208. int vis_server;
  209. if ((batman_if->if_status == IF_NOT_IN_USE) ||
  210. (batman_if->if_status == IF_TO_BE_REMOVED))
  211. return;
  212. vis_server = atomic_read(&bat_priv->vis_mode);
  213. /**
  214. * the interface gets activated here to avoid race conditions between
  215. * the moment of activating the interface in
  216. * hardif_activate_interface() where the originator mac is set and
  217. * outdated packets (especially uninitialized mac addresses) in the
  218. * packet queue
  219. */
  220. if (batman_if->if_status == IF_TO_BE_ACTIVATED)
  221. batman_if->if_status = IF_ACTIVE;
  222. /* if local hna has changed and interface is a primary interface */
  223. if ((atomic_read(&bat_priv->hna_local_changed)) &&
  224. (batman_if == bat_priv->primary_if))
  225. rebuild_batman_packet(bat_priv, batman_if);
  226. /**
  227. * NOTE: packet_buff might just have been re-allocated in
  228. * rebuild_batman_packet()
  229. */
  230. batman_packet = (struct batman_packet *)batman_if->packet_buff;
  231. /* change sequence number to network order */
  232. batman_packet->seqno =
  233. htonl((uint32_t)atomic_read(&batman_if->seqno));
  234. if (vis_server == VIS_TYPE_SERVER_SYNC)
  235. batman_packet->flags |= VIS_SERVER;
  236. else
  237. batman_packet->flags &= ~VIS_SERVER;
  238. if ((batman_if == bat_priv->primary_if) &&
  239. (atomic_read(&bat_priv->gw_mode) == GW_MODE_SERVER))
  240. batman_packet->gw_flags =
  241. (uint8_t)atomic_read(&bat_priv->gw_bandwidth);
  242. else
  243. batman_packet->gw_flags = 0;
  244. atomic_inc(&batman_if->seqno);
  245. slide_own_bcast_window(batman_if);
  246. send_time = own_send_time(bat_priv);
  247. add_bat_packet_to_list(bat_priv,
  248. batman_if->packet_buff,
  249. batman_if->packet_len,
  250. batman_if, 1, send_time);
  251. }
  252. void schedule_forward_packet(struct orig_node *orig_node,
  253. struct ethhdr *ethhdr,
  254. struct batman_packet *batman_packet,
  255. uint8_t directlink, int hna_buff_len,
  256. struct batman_if *if_incoming)
  257. {
  258. struct bat_priv *bat_priv = netdev_priv(if_incoming->soft_iface);
  259. unsigned char in_tq, in_ttl, tq_avg = 0;
  260. unsigned long send_time;
  261. if (batman_packet->ttl <= 1) {
  262. bat_dbg(DBG_BATMAN, bat_priv, "ttl exceeded\n");
  263. return;
  264. }
  265. in_tq = batman_packet->tq;
  266. in_ttl = batman_packet->ttl;
  267. batman_packet->ttl--;
  268. memcpy(batman_packet->prev_sender, ethhdr->h_source, ETH_ALEN);
  269. /* rebroadcast tq of our best ranking neighbor to ensure the rebroadcast
  270. * of our best tq value */
  271. if ((orig_node->router) && (orig_node->router->tq_avg != 0)) {
  272. /* rebroadcast ogm of best ranking neighbor as is */
  273. if (!compare_orig(orig_node->router->addr, ethhdr->h_source)) {
  274. batman_packet->tq = orig_node->router->tq_avg;
  275. if (orig_node->router->last_ttl)
  276. batman_packet->ttl = orig_node->router->last_ttl
  277. - 1;
  278. }
  279. tq_avg = orig_node->router->tq_avg;
  280. }
  281. /* apply hop penalty */
  282. batman_packet->tq = hop_penalty(batman_packet->tq, bat_priv);
  283. bat_dbg(DBG_BATMAN, bat_priv,
  284. "Forwarding packet: tq_orig: %i, tq_avg: %i, "
  285. "tq_forw: %i, ttl_orig: %i, ttl_forw: %i\n",
  286. in_tq, tq_avg, batman_packet->tq, in_ttl - 1,
  287. batman_packet->ttl);
  288. batman_packet->seqno = htonl(batman_packet->seqno);
  289. /* switch of primaries first hop flag when forwarding */
  290. batman_packet->flags &= ~PRIMARIES_FIRST_HOP;
  291. if (directlink)
  292. batman_packet->flags |= DIRECTLINK;
  293. else
  294. batman_packet->flags &= ~DIRECTLINK;
  295. send_time = forward_send_time();
  296. add_bat_packet_to_list(bat_priv,
  297. (unsigned char *)batman_packet,
  298. sizeof(struct batman_packet) + hna_buff_len,
  299. if_incoming, 0, send_time);
  300. }
  301. static void forw_packet_free(struct forw_packet *forw_packet)
  302. {
  303. if (forw_packet->skb)
  304. kfree_skb(forw_packet->skb);
  305. kfree(forw_packet);
  306. }
  307. static void _add_bcast_packet_to_list(struct bat_priv *bat_priv,
  308. struct forw_packet *forw_packet,
  309. unsigned long send_time)
  310. {
  311. INIT_HLIST_NODE(&forw_packet->list);
  312. /* add new packet to packet list */
  313. spin_lock_bh(&bat_priv->forw_bcast_list_lock);
  314. hlist_add_head(&forw_packet->list, &bat_priv->forw_bcast_list);
  315. spin_unlock_bh(&bat_priv->forw_bcast_list_lock);
  316. /* start timer for this packet */
  317. INIT_DELAYED_WORK(&forw_packet->delayed_work,
  318. send_outstanding_bcast_packet);
  319. queue_delayed_work(bat_event_workqueue, &forw_packet->delayed_work,
  320. send_time);
  321. }
  322. #define atomic_dec_not_zero(v) atomic_add_unless((v), -1, 0)
  323. /* add a broadcast packet to the queue and setup timers. broadcast packets
  324. * are sent multiple times to increase probability for beeing received.
  325. *
  326. * This function returns NETDEV_TX_OK on success and NETDEV_TX_BUSY on
  327. * errors.
  328. *
  329. * The skb is not consumed, so the caller should make sure that the
  330. * skb is freed. */
  331. int add_bcast_packet_to_list(struct bat_priv *bat_priv, struct sk_buff *skb)
  332. {
  333. struct forw_packet *forw_packet;
  334. struct bcast_packet *bcast_packet;
  335. if (!atomic_dec_not_zero(&bat_priv->bcast_queue_left)) {
  336. bat_dbg(DBG_BATMAN, bat_priv, "bcast packet queue full\n");
  337. goto out;
  338. }
  339. if (!bat_priv->primary_if)
  340. goto out;
  341. forw_packet = kmalloc(sizeof(struct forw_packet), GFP_ATOMIC);
  342. if (!forw_packet)
  343. goto out_and_inc;
  344. skb = skb_copy(skb, GFP_ATOMIC);
  345. if (!skb)
  346. goto packet_free;
  347. /* as we have a copy now, it is safe to decrease the TTL */
  348. bcast_packet = (struct bcast_packet *)skb->data;
  349. bcast_packet->ttl--;
  350. skb_reset_mac_header(skb);
  351. forw_packet->skb = skb;
  352. forw_packet->if_incoming = bat_priv->primary_if;
  353. /* how often did we send the bcast packet ? */
  354. forw_packet->num_packets = 0;
  355. _add_bcast_packet_to_list(bat_priv, forw_packet, 1);
  356. return NETDEV_TX_OK;
  357. packet_free:
  358. kfree(forw_packet);
  359. out_and_inc:
  360. atomic_inc(&bat_priv->bcast_queue_left);
  361. out:
  362. return NETDEV_TX_BUSY;
  363. }
  364. static void send_outstanding_bcast_packet(struct work_struct *work)
  365. {
  366. struct batman_if *batman_if;
  367. struct delayed_work *delayed_work =
  368. container_of(work, struct delayed_work, work);
  369. struct forw_packet *forw_packet =
  370. container_of(delayed_work, struct forw_packet, delayed_work);
  371. struct sk_buff *skb1;
  372. struct net_device *soft_iface = forw_packet->if_incoming->soft_iface;
  373. struct bat_priv *bat_priv = netdev_priv(soft_iface);
  374. spin_lock_bh(&bat_priv->forw_bcast_list_lock);
  375. hlist_del(&forw_packet->list);
  376. spin_unlock_bh(&bat_priv->forw_bcast_list_lock);
  377. if (atomic_read(&bat_priv->mesh_state) == MESH_DEACTIVATING)
  378. goto out;
  379. /* rebroadcast packet */
  380. rcu_read_lock();
  381. list_for_each_entry_rcu(batman_if, &if_list, list) {
  382. if (batman_if->soft_iface != soft_iface)
  383. continue;
  384. /* send a copy of the saved skb */
  385. skb1 = skb_clone(forw_packet->skb, GFP_ATOMIC);
  386. if (skb1)
  387. send_skb_packet(skb1, batman_if, broadcast_addr);
  388. }
  389. rcu_read_unlock();
  390. forw_packet->num_packets++;
  391. /* if we still have some more bcasts to send */
  392. if (forw_packet->num_packets < 3) {
  393. _add_bcast_packet_to_list(bat_priv, forw_packet,
  394. ((5 * HZ) / 1000));
  395. return;
  396. }
  397. out:
  398. forw_packet_free(forw_packet);
  399. atomic_inc(&bat_priv->bcast_queue_left);
  400. }
  401. void send_outstanding_bat_packet(struct work_struct *work)
  402. {
  403. struct delayed_work *delayed_work =
  404. container_of(work, struct delayed_work, work);
  405. struct forw_packet *forw_packet =
  406. container_of(delayed_work, struct forw_packet, delayed_work);
  407. struct bat_priv *bat_priv;
  408. bat_priv = netdev_priv(forw_packet->if_incoming->soft_iface);
  409. spin_lock_bh(&bat_priv->forw_bat_list_lock);
  410. hlist_del(&forw_packet->list);
  411. spin_unlock_bh(&bat_priv->forw_bat_list_lock);
  412. if (atomic_read(&bat_priv->mesh_state) == MESH_DEACTIVATING)
  413. goto out;
  414. send_packet(forw_packet);
  415. /**
  416. * we have to have at least one packet in the queue
  417. * to determine the queues wake up time unless we are
  418. * shutting down
  419. */
  420. if (forw_packet->own)
  421. schedule_own_packet(forw_packet->if_incoming);
  422. out:
  423. /* don't count own packet */
  424. if (!forw_packet->own)
  425. atomic_inc(&bat_priv->batman_queue_left);
  426. forw_packet_free(forw_packet);
  427. }
  428. void purge_outstanding_packets(struct bat_priv *bat_priv,
  429. struct batman_if *batman_if)
  430. {
  431. struct forw_packet *forw_packet;
  432. struct hlist_node *tmp_node, *safe_tmp_node;
  433. if (batman_if)
  434. bat_dbg(DBG_BATMAN, bat_priv,
  435. "purge_outstanding_packets(): %s\n",
  436. batman_if->net_dev->name);
  437. else
  438. bat_dbg(DBG_BATMAN, bat_priv,
  439. "purge_outstanding_packets()\n");
  440. /* free bcast list */
  441. spin_lock_bh(&bat_priv->forw_bcast_list_lock);
  442. hlist_for_each_entry_safe(forw_packet, tmp_node, safe_tmp_node,
  443. &bat_priv->forw_bcast_list, list) {
  444. /**
  445. * if purge_outstanding_packets() was called with an argmument
  446. * we delete only packets belonging to the given interface
  447. */
  448. if ((batman_if) &&
  449. (forw_packet->if_incoming != batman_if))
  450. continue;
  451. spin_unlock_bh(&bat_priv->forw_bcast_list_lock);
  452. /**
  453. * send_outstanding_bcast_packet() will lock the list to
  454. * delete the item from the list
  455. */
  456. cancel_delayed_work_sync(&forw_packet->delayed_work);
  457. spin_lock_bh(&bat_priv->forw_bcast_list_lock);
  458. }
  459. spin_unlock_bh(&bat_priv->forw_bcast_list_lock);
  460. /* free batman packet list */
  461. spin_lock_bh(&bat_priv->forw_bat_list_lock);
  462. hlist_for_each_entry_safe(forw_packet, tmp_node, safe_tmp_node,
  463. &bat_priv->forw_bat_list, list) {
  464. /**
  465. * if purge_outstanding_packets() was called with an argmument
  466. * we delete only packets belonging to the given interface
  467. */
  468. if ((batman_if) &&
  469. (forw_packet->if_incoming != batman_if))
  470. continue;
  471. spin_unlock_bh(&bat_priv->forw_bat_list_lock);
  472. /**
  473. * send_outstanding_bat_packet() will lock the list to
  474. * delete the item from the list
  475. */
  476. cancel_delayed_work_sync(&forw_packet->delayed_work);
  477. spin_lock_bh(&bat_priv->forw_bat_list_lock);
  478. }
  479. spin_unlock_bh(&bat_priv->forw_bat_list_lock);
  480. }