1 /* Copyright (C) 2007-2013 B.A.T.M.A.N. contributors:
5 * This program is free software; you can redistribute it and/or
6 * modify it under the terms of version 2 of the GNU General Public
7 * License as published by the Free Software Foundation.
9 * This program is distributed in the hope that it will be useful, but
10 * WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
12 * General Public License for more details.
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, write to the Free Software
16 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
21 #include <linux/debugfs.h>
22 #include <linux/slab.h>
23 #include "icmp_socket.h"
26 #include "originator.h"
27 #include "hard-interface.h"
29 static struct batadv_socket_client
*batadv_socket_client_hash
[256];
31 static void batadv_socket_add_packet(struct batadv_socket_client
*socket_client
,
32 struct batadv_icmp_header
*icmph
,
35 void batadv_socket_init(void)
37 memset(batadv_socket_client_hash
, 0, sizeof(batadv_socket_client_hash
));
40 static int batadv_socket_open(struct inode
*inode
, struct file
*file
)
43 struct batadv_socket_client
*socket_client
;
45 if (!try_module_get(THIS_MODULE
))
48 nonseekable_open(inode
, file
);
50 socket_client
= kmalloc(sizeof(*socket_client
), GFP_KERNEL
);
52 module_put(THIS_MODULE
);
56 for (i
= 0; i
< ARRAY_SIZE(batadv_socket_client_hash
); i
++) {
57 if (!batadv_socket_client_hash
[i
]) {
58 batadv_socket_client_hash
[i
] = socket_client
;
63 if (i
== ARRAY_SIZE(batadv_socket_client_hash
)) {
64 pr_err("Error - can't add another packet client: maximum number of clients reached\n");
66 module_put(THIS_MODULE
);
70 INIT_LIST_HEAD(&socket_client
->queue_list
);
71 socket_client
->queue_len
= 0;
72 socket_client
->index
= i
;
73 socket_client
->bat_priv
= inode
->i_private
;
74 spin_lock_init(&socket_client
->lock
);
75 init_waitqueue_head(&socket_client
->queue_wait
);
77 file
->private_data
= socket_client
;
82 static int batadv_socket_release(struct inode
*inode
, struct file
*file
)
84 struct batadv_socket_client
*socket_client
= file
->private_data
;
85 struct batadv_socket_packet
*socket_packet
;
86 struct list_head
*list_pos
, *list_pos_tmp
;
88 spin_lock_bh(&socket_client
->lock
);
90 /* for all packets in the queue ... */
91 list_for_each_safe(list_pos
, list_pos_tmp
, &socket_client
->queue_list
) {
92 socket_packet
= list_entry(list_pos
,
93 struct batadv_socket_packet
, list
);
99 batadv_socket_client_hash
[socket_client
->index
] = NULL
;
100 spin_unlock_bh(&socket_client
->lock
);
102 kfree(socket_client
);
103 module_put(THIS_MODULE
);
108 static ssize_t
batadv_socket_read(struct file
*file
, char __user
*buf
,
109 size_t count
, loff_t
*ppos
)
111 struct batadv_socket_client
*socket_client
= file
->private_data
;
112 struct batadv_socket_packet
*socket_packet
;
116 if ((file
->f_flags
& O_NONBLOCK
) && (socket_client
->queue_len
== 0))
119 if ((!buf
) || (count
< sizeof(struct batadv_icmp_packet
)))
122 if (!access_ok(VERIFY_WRITE
, buf
, count
))
125 error
= wait_event_interruptible(socket_client
->queue_wait
,
126 socket_client
->queue_len
);
131 spin_lock_bh(&socket_client
->lock
);
133 socket_packet
= list_first_entry(&socket_client
->queue_list
,
134 struct batadv_socket_packet
, list
);
135 list_del(&socket_packet
->list
);
136 socket_client
->queue_len
--;
138 spin_unlock_bh(&socket_client
->lock
);
140 packet_len
= min(count
, socket_packet
->icmp_len
);
141 error
= copy_to_user(buf
, &socket_packet
->icmp_packet
, packet_len
);
143 kfree(socket_packet
);
151 static ssize_t
batadv_socket_write(struct file
*file
, const char __user
*buff
,
152 size_t len
, loff_t
*off
)
154 struct batadv_socket_client
*socket_client
= file
->private_data
;
155 struct batadv_priv
*bat_priv
= socket_client
->bat_priv
;
156 struct batadv_hard_iface
*primary_if
= NULL
;
158 struct batadv_icmp_packet_rr
*icmp_packet_rr
;
159 struct batadv_icmp_header
*icmp_header
;
160 struct batadv_orig_node
*orig_node
= NULL
;
161 struct batadv_neigh_node
*neigh_node
= NULL
;
162 size_t packet_len
= sizeof(struct batadv_icmp_packet
);
164 if (len
< sizeof(struct batadv_icmp_header
)) {
165 batadv_dbg(BATADV_DBG_BATMAN
, bat_priv
,
166 "Error - can't send packet from char device: invalid packet size\n");
170 primary_if
= batadv_primary_if_get_selected(bat_priv
);
177 if (len
>= BATADV_ICMP_MAX_PACKET_SIZE
)
178 packet_len
= BATADV_ICMP_MAX_PACKET_SIZE
;
182 skb
= netdev_alloc_skb_ip_align(NULL
, packet_len
+ ETH_HLEN
);
188 skb
->priority
= TC_PRIO_CONTROL
;
189 skb_reserve(skb
, ETH_HLEN
);
190 icmp_header
= (struct batadv_icmp_header
*)skb_put(skb
, packet_len
);
192 if (copy_from_user(icmp_header
, buff
, packet_len
)) {
197 if (icmp_header
->header
.packet_type
!= BATADV_ICMP
) {
198 batadv_dbg(BATADV_DBG_BATMAN
, bat_priv
,
199 "Error - can't send packet from char device: got bogus packet type (expected: BAT_ICMP)\n");
204 switch (icmp_header
->msg_type
) {
205 case BATADV_ECHO_REQUEST
:
206 if (len
< sizeof(struct batadv_icmp_packet
)) {
207 batadv_dbg(BATADV_DBG_BATMAN
, bat_priv
,
208 "Error - can't send packet from char device: invalid packet size\n");
213 if (atomic_read(&bat_priv
->mesh_state
) != BATADV_MESH_ACTIVE
)
216 orig_node
= batadv_orig_hash_find(bat_priv
, icmp_header
->dst
);
220 neigh_node
= batadv_orig_node_get_router(orig_node
);
224 if (!neigh_node
->if_incoming
)
227 if (neigh_node
->if_incoming
->if_status
!= BATADV_IF_ACTIVE
)
230 icmp_packet_rr
= (struct batadv_icmp_packet_rr
*)icmp_header
;
231 if (packet_len
== sizeof(*icmp_packet_rr
))
232 memcpy(icmp_packet_rr
->rr
,
233 neigh_node
->if_incoming
->net_dev
->dev_addr
,
238 batadv_dbg(BATADV_DBG_BATMAN
, bat_priv
,
239 "Error - can't send packet from char device: got unknown message type\n");
244 icmp_header
->uid
= socket_client
->index
;
246 if (icmp_header
->header
.version
!= BATADV_COMPAT_VERSION
) {
247 icmp_header
->msg_type
= BATADV_PARAMETER_PROBLEM
;
248 icmp_header
->header
.version
= BATADV_COMPAT_VERSION
;
249 batadv_socket_add_packet(socket_client
, icmp_header
,
254 memcpy(icmp_header
->orig
, primary_if
->net_dev
->dev_addr
, ETH_ALEN
);
256 batadv_send_skb_packet(skb
, neigh_node
->if_incoming
, neigh_node
->addr
);
260 icmp_header
->msg_type
= BATADV_DESTINATION_UNREACHABLE
;
261 batadv_socket_add_packet(socket_client
, icmp_header
, packet_len
);
266 batadv_hardif_free_ref(primary_if
);
268 batadv_neigh_node_free_ref(neigh_node
);
270 batadv_orig_node_free_ref(orig_node
);
274 static unsigned int batadv_socket_poll(struct file
*file
, poll_table
*wait
)
276 struct batadv_socket_client
*socket_client
= file
->private_data
;
278 poll_wait(file
, &socket_client
->queue_wait
, wait
);
280 if (socket_client
->queue_len
> 0)
281 return POLLIN
| POLLRDNORM
;
286 static const struct file_operations batadv_fops
= {
287 .owner
= THIS_MODULE
,
288 .open
= batadv_socket_open
,
289 .release
= batadv_socket_release
,
290 .read
= batadv_socket_read
,
291 .write
= batadv_socket_write
,
292 .poll
= batadv_socket_poll
,
296 int batadv_socket_setup(struct batadv_priv
*bat_priv
)
300 if (!bat_priv
->debug_dir
)
303 d
= debugfs_create_file(BATADV_ICMP_SOCKET
, S_IFREG
| S_IWUSR
| S_IRUSR
,
304 bat_priv
->debug_dir
, bat_priv
, &batadv_fops
);
315 * batadv_socket_receive_packet - schedule an icmp packet to be sent to userspace
317 * @socket_client: the socket this packet belongs to
318 * @icmph: pointer to the header of the icmp packet
319 * @icmp_len: total length of the icmp packet
321 static void batadv_socket_add_packet(struct batadv_socket_client
*socket_client
,
322 struct batadv_icmp_header
*icmph
,
325 struct batadv_socket_packet
*socket_packet
;
328 socket_packet
= kmalloc(sizeof(*socket_packet
), GFP_ATOMIC
);
334 /* check the maximum length before filling the buffer */
335 if (len
> sizeof(socket_packet
->icmp_packet
))
336 len
= sizeof(socket_packet
->icmp_packet
);
338 INIT_LIST_HEAD(&socket_packet
->list
);
339 memcpy(&socket_packet
->icmp_packet
, icmph
, len
);
340 socket_packet
->icmp_len
= len
;
342 spin_lock_bh(&socket_client
->lock
);
344 /* while waiting for the lock the socket_client could have been
347 if (!batadv_socket_client_hash
[icmph
->uid
]) {
348 spin_unlock_bh(&socket_client
->lock
);
349 kfree(socket_packet
);
353 list_add_tail(&socket_packet
->list
, &socket_client
->queue_list
);
354 socket_client
->queue_len
++;
356 if (socket_client
->queue_len
> 100) {
357 socket_packet
= list_first_entry(&socket_client
->queue_list
,
358 struct batadv_socket_packet
,
361 list_del(&socket_packet
->list
);
362 kfree(socket_packet
);
363 socket_client
->queue_len
--;
366 spin_unlock_bh(&socket_client
->lock
);
368 wake_up(&socket_client
->queue_wait
);
372 * batadv_socket_receive_packet - schedule an icmp packet to be received
373 * locally and sent to userspace.
374 * @icmph: pointer to the header of the icmp packet
375 * @icmp_len: total length of the icmp packet
377 void batadv_socket_receive_packet(struct batadv_icmp_header
*icmph
,
380 struct batadv_socket_client
*hash
;
382 hash
= batadv_socket_client_hash
[icmph
->uid
];
384 batadv_socket_add_packet(hash
, icmph
, icmp_len
);