@@ -111,6 +111,9 @@ int batadv_mesh_init(struct net_device *soft_iface)
spin_lock_init(&bat_priv->tt.last_changeset_lock);
spin_lock_init(&bat_priv->tt.commit_lock);
spin_lock_init(&bat_priv->gw.list_lock);
+#ifdef CONFIG_BATMAN_ADV_MCAST
+ spin_lock_init(&bat_priv->mcast.want_lists_lock);
+#endif
spin_lock_init(&bat_priv->tvlv.container_list_lock);
spin_lock_init(&bat_priv->tvlv.handler_list_lock);
spin_lock_init(&bat_priv->softif_vlan_list_lock);
@@ -118,6 +121,9 @@ int batadv_mesh_init(struct net_device *soft_iface)
INIT_HLIST_HEAD(&bat_priv->forw_bat_list);
INIT_HLIST_HEAD(&bat_priv->forw_bcast_list);
INIT_HLIST_HEAD(&bat_priv->gw.list);
+#ifdef CONFIG_BATMAN_ADV_MCAST
+ INIT_HLIST_HEAD(&bat_priv->mcast.want_all_unsnoopables_list);
+#endif
INIT_LIST_HEAD(&bat_priv->tt.changes_list);
INIT_LIST_HEAD(&bat_priv->tt.req_list);
INIT_LIST_HEAD(&bat_priv->tt.roam_list);
@@ -177,6 +177,7 @@ enum batadv_uev_type {
#include <linux/slab.h>
#include <net/sock.h> /* struct sock */
#include <net/addrconf.h> /* ipv6 address stuff */
+#include <linux/ip.h>
#include <net/rtnetlink.h>
#include <linux/jiffies.h>
#include <linux/seq_file.h>
@@ -272,9 +272,48 @@ out:
}
/**
+ * batadv_mcast_forw_mode_check_ipv4 - check for optimized forwarding potential
+ * @bat_priv: the bat priv with all the soft interface information
+ * @skb: the IPv4 packet to check
+ * @is_unsnoopable: stores whether the destination is snoopable
+ *
+ * Check whether the given IPv4 packet has the potential to
+ * be forwarded with a mode more optimal than classic flooding.
+ *
+ * If so then return 0. Otherwise -EINVAL is returned or -ENOMEM if we are
+ * out of memory.
+ */
+static int batadv_mcast_forw_mode_check_ipv4(struct batadv_priv *bat_priv,
+ struct sk_buff *skb,
+ bool *is_unsnoopable)
+{
+ struct iphdr *iphdr;
+
+ /* We might fail due to out-of-memory -> drop it */
+ if (!pskb_may_pull(skb, sizeof(struct ethhdr) + sizeof(*iphdr)))
+ return -ENOMEM;
+
+ iphdr = ip_hdr(skb);
+
+ /* TODO: Implement Multicast Router Discovery (RFC4286),
+ * then allow scope > link local, too
+ */
+ if (!ipv4_is_local_multicast(iphdr->daddr))
+ return -EINVAL;
+
+ /* link-local multicast listeners behind a bridge are
+ * not snoopable (see RFC4541, section 2.1.2.2)
+ */
+ *is_unsnoopable = true;
+
+ return 0;
+}
+
+/**
* batadv_mcast_forw_mode_check_ipv6 - check for optimized forwarding potential
* @bat_priv: the bat priv with all the soft interface information
* @skb: the IPv6 packet to check
+ * @is_unsnoopable: stores whether the destination is snoopable
*
* Check whether the given IPv6 packet has the potential to
* be forwarded with a mode more optimal than classic flooding.
@@ -283,7 +322,8 @@ out:
* out of memory.
*/
static int batadv_mcast_forw_mode_check_ipv6(struct batadv_priv *bat_priv,
- struct sk_buff *skb)
+ struct sk_buff *skb,
+ bool *is_unsnoopable)
{
struct ipv6hdr *ip6hdr;
@@ -304,7 +344,7 @@ static int batadv_mcast_forw_mode_check_ipv6(struct batadv_priv *bat_priv,
* not snoopable (see RFC4541, section 3, paragraph 3)
*/
if (ipv6_addr_is_ll_all_nodes(&ip6hdr->daddr))
- return -EINVAL;
+ *is_unsnoopable = true;
return 0;
}
@@ -313,6 +353,7 @@ static int batadv_mcast_forw_mode_check_ipv6(struct batadv_priv *bat_priv,
* batadv_mcast_forw_mode_check - check for optimized forwarding potential
* @bat_priv: the bat priv with all the soft interface information
* @skb: the multicast frame to check
+ * @is_unsnoopable: stores whether the destination is snoopable
*
* Check whether the given multicast ethernet frame has the potential to
* be forwarded with a mode more optimal than classic flooding.
@@ -321,7 +362,8 @@ static int batadv_mcast_forw_mode_check_ipv6(struct batadv_priv *bat_priv,
* out of memory.
*/
static int batadv_mcast_forw_mode_check(struct batadv_priv *bat_priv,
- struct sk_buff *skb)
+ struct sk_buff *skb,
+ bool *is_unsnoopable)
{
struct ethhdr *ethhdr = eth_hdr(skb);
@@ -332,8 +374,12 @@ static int batadv_mcast_forw_mode_check(struct batadv_priv *bat_priv,
return -EINVAL;
switch (ntohs(ethhdr->h_proto)) {
+ case ETH_P_IP:
+ return batadv_mcast_forw_mode_check_ipv4(bat_priv, skb,
+ is_unsnoopable);
case ETH_P_IPV6:
- return batadv_mcast_forw_mode_check_ipv6(bat_priv, skb);
+ return batadv_mcast_forw_mode_check_ipv6(bat_priv, skb,
+ is_unsnoopable);
default:
return -EINVAL;
}
@@ -370,6 +416,42 @@ out:
}
/**
+ * batadv_mcast_want_unsnoop_count - count the number of WANT_ALL_UNSNOOPABLES
+ * @bat_priv: the bat priv with all the soft interface information
+ * @orig_node: a pointer to set to a node with a WANT_ALL_UNSNOOPABLES flag
+ *
+ * Set an orig_node with a BATADV_MCAST_WANT_ALL_UNSNOOPABLES flag and
+ * increase its refcount if *orig_node was not set yet. Or keep it unchanged
+ * if none with such a flag was found. Finally return the total number of
+ * orig_nodes with this flag.
+ */
+static int
+batadv_mcast_want_unsnoop_count(struct batadv_priv *bat_priv,
+ struct batadv_orig_node **orig_node)
+{
+ int ret = atomic_read(&bat_priv->mcast.num_want_all_unsnoopables);
+
+ if (!ret || *orig_node)
+ goto out;
+
+ rcu_read_lock();
+ hlist_for_each_entry_rcu(*orig_node,
+ &bat_priv->mcast.want_all_unsnoopables_list,
+ mcast_want_all_unsnoopables_node) {
+ if (atomic_inc_not_zero(&(*orig_node)->refcount))
+ goto unlock;
+ }
+
+ *orig_node = NULL;
+ ret = 0;
+
+unlock:
+ rcu_read_unlock();
+out:
+ return ret;
+}
+
+/**
* batadv_mcast_forw_mode - check on how to forward a multicast packet
* @bat_priv: the bat priv with all the soft interface information
* @skb: The multicast packet to check
@@ -384,9 +466,10 @@ batadv_mcast_forw_mode(struct batadv_priv *bat_priv, struct sk_buff *skb,
struct batadv_orig_node **mcast_single_orig)
{
struct ethhdr *ethhdr = eth_hdr(skb);
+ bool is_unsnoopable = false;
int ret;
- ret = batadv_mcast_forw_mode_check(bat_priv, skb);
+ ret = batadv_mcast_forw_mode_check(bat_priv, skb, &is_unsnoopable);
if (ret == -ENOMEM)
return BATADV_FORW_NONE;
else if (ret < 0)
@@ -394,17 +477,75 @@ batadv_mcast_forw_mode(struct batadv_priv *bat_priv, struct sk_buff *skb,
ret = batadv_mcast_tt_count(bat_priv, ethhdr, mcast_single_orig);
+ if (is_unsnoopable)
+ ret += batadv_mcast_want_unsnoop_count(bat_priv,
+ mcast_single_orig);
+
switch (ret) {
case 0:
return BATADV_FORW_NONE;
case 1:
return BATADV_FORW_SINGLE;
default:
+ batadv_orig_node_free_ref(*mcast_single_orig);
+ *mcast_single_orig = NULL;
return BATADV_FORW_ALL;
}
}
/**
+ * batadv_mcast_list_add - grab a lock and add a node to a head
+ * @node: the node to add
+ * @head: the head to add the node to
+ * @lock: the lock to grab while adding the node to the head
+ */
+static void batadv_mcast_list_add(struct hlist_node *node,
+ struct hlist_head *head,
+ spinlock_t *lock)
+{
+ spin_lock_bh(lock);
+ hlist_add_head_rcu(node, head);
+ spin_unlock_bh(lock);
+}
+
+/**
+ * batadv_mcast_list_del - grab a lock and delete a node from its list
+ * @node: the node to delete from its list
+ * @lock: the lock to grab while deleting the node from its list
+ */
+static void batadv_mcast_list_del(struct hlist_node *node, spinlock_t *lock)
+{
+ spin_lock_bh(lock);
+ hlist_del_rcu(node);
+ spin_unlock_bh(lock);
+}
+
+/**
+ * batadv_mcast_list_update - update the list of a flag
+ * @flag: the flag we want to update the list for
+ * @node: a list node of an originator
+ * @head: the list head the node might be added to
+ * @lock: the lock that synchronizes list modifications
+ * @new_flags: the new capability bitset of a node
+ * @old_flags: the current, to be updated bitset of a node
+ *
+ * Update the list of the given node/head with the help of the new flag
+ * information of an originator to contain the nodes which have the given
+ * flag set.
+ */
+static void batadv_mcast_list_update(uint8_t flag,
+ struct hlist_node *node,
+ struct hlist_head *head,
+ spinlock_t *lock,
+ uint8_t new_flags, int old_flags)
+{
+ if (new_flags & flag && !(old_flags & flag))
+ batadv_mcast_list_add(node, head, lock);
+ else if (!(new_flags & flag) && old_flags & flag)
+ batadv_mcast_list_del(node, lock);
+}
+
+/**
* batadv_mcast_tvlv_ogm_handler_v1 - process incoming multicast tvlv container
* @bat_priv: the bat priv with all the soft interface information
* @orig: the orig_node of the ogm
@@ -448,6 +589,19 @@ static void batadv_mcast_tvlv_ogm_handler_v1(struct batadv_priv *bat_priv,
(tvlv_value_len >= sizeof(mcast_flags)))
mcast_flags = *(uint8_t *)tvlv_value;
+ if (mcast_flags & BATADV_MCAST_WANT_ALL_UNSNOOPABLES &&
+ !(orig->mcast_flags & BATADV_MCAST_WANT_ALL_UNSNOOPABLES))
+ atomic_inc(&bat_priv->mcast.num_want_all_unsnoopables);
+ else if (!(mcast_flags & BATADV_MCAST_WANT_ALL_UNSNOOPABLES) &&
+ orig->mcast_flags & BATADV_MCAST_WANT_ALL_UNSNOOPABLES)
+ atomic_dec(&bat_priv->mcast.num_want_all_unsnoopables);
+
+ batadv_mcast_list_update(BATADV_MCAST_WANT_ALL_UNSNOOPABLES,
+ &orig->mcast_want_all_unsnoopables_node,
+ &bat_priv->mcast.want_all_unsnoopables_list,
+ &bat_priv->mcast.want_lists_lock,
+ mcast_flags, orig->mcast_flags);
+
orig->mcast_flags = mcast_flags;
}
@@ -484,4 +638,12 @@ void batadv_mcast_purge_orig(struct batadv_orig_node *orig)
if (!(orig->capabilities & BATADV_ORIG_CAPA_HAS_MCAST))
atomic_dec(&bat_priv->mcast.num_disabled);
+ if (orig->mcast_flags & BATADV_MCAST_WANT_ALL_UNSNOOPABLES)
+ atomic_dec(&bat_priv->mcast.num_want_all_unsnoopables);
+
+ batadv_mcast_list_update(BATADV_MCAST_WANT_ALL_UNSNOOPABLES,
+ &orig->mcast_want_all_unsnoopables_node,
+ &bat_priv->mcast.want_all_unsnoopables_list,
+ &bat_priv->mcast.want_lists_lock,
+ BATADV_NO_FLAGS, orig->mcast_flags);
}
@@ -89,6 +89,15 @@ enum batadv_icmp_packettype {
BATADV_PARAMETER_PROBLEM = 12,
};
+/**
+ * enum batadv_mcast_flags - flags for multicast capabilities and settings
+ * @BATADV_MCAST_WANT_ALL_UNSNOOPABLES: we want all packets destined for
+ * 224.0.0.0/24 or ff02::1
+ */
+enum batadv_mcast_flags {
+ BATADV_MCAST_WANT_ALL_UNSNOOPABLES = BIT(0),
+};
+
/* tt data subtypes */
#define BATADV_TT_DATA_TYPE_MASK 0x0F
@@ -713,6 +713,7 @@ static int batadv_softif_init_late(struct net_device *dev)
bat_priv->mcast.flags = BATADV_NO_FLAGS;
atomic_set(&bat_priv->multicast_mode, 1);
atomic_set(&bat_priv->mcast.num_disabled, 0);
+ atomic_set(&bat_priv->mcast.num_want_all_unsnoopables, 0);
#endif
atomic_set(&bat_priv->gw_mode, BATADV_GW_MODE_OFF);
atomic_set(&bat_priv->gw_sel_class, 20);
@@ -205,6 +205,8 @@ struct batadv_orig_bat_iv {
* @last_seen: time when last packet from this node was received
* @bcast_seqno_reset: time when the broadcast seqno window was reset
* @mcast_flags: multicast flags announced by the orig node
+ * @mcast_want_all_unsnoop_node: a list node for the
+ * mcast.want_all_unsnoopables list
* @capabilities: announced capabilities of this originator
* @capa_initialized: bitfield to remember whether a capability was initialized
* @last_ttvn: last seen translation table version number
@@ -249,6 +251,7 @@ struct batadv_orig_node {
unsigned long bcast_seqno_reset;
#ifdef CONFIG_BATMAN_ADV_MCAST
uint8_t mcast_flags;
+ struct hlist_node mcast_want_all_unsnoopables_node;
#endif
uint8_t capabilities;
uint8_t capa_initialized;
@@ -619,15 +622,24 @@ struct batadv_priv_dat {
/**
* struct batadv_priv_mcast - per mesh interface mcast data
* @mla_list: list of multicast addresses we are currently announcing via TT
+ * @want_all_unsnoopables_list: a list of orig_nodes wanting all unsnoopable
+ * multicast traffic
* @flags: the flags we have last sent in our mcast tvlv
* @enabled: whether the multicast tvlv is currently enabled
* @num_disabled: number of nodes that have no mcast tvlv
+ * @num_want_all_unsnoopables: number of nodes wanting unsnoopable IP traffic
+ * @want_lists_lock: lock for protecting modifications to mcast want lists
+ * (traversals are rcu-locked)
*/
struct batadv_priv_mcast {
struct hlist_head mla_list;
+ struct hlist_head want_all_unsnoopables_list;
uint8_t flags;
bool enabled;
atomic_t num_disabled;
+ atomic_t num_want_all_unsnoopables;
+ /* protects want_all_unsnoopables_list */
+ spinlock_t want_lists_lock;
};
#endif