blob: 0899a729a23f474c313e2a9e6f98f1ba875a6ada [file] [log] [blame]
Sven Eckelmann7db7d9f2017-11-19 15:05:11 +01001// SPDX-License-Identifier: GPL-2.0
Sven Eckelmanncfa55c62021-01-01 00:00:01 +01002/* Copyright (C) B.A.T.M.A.N. contributors:
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +02003 *
4 * Martin Hundebøll <martin@hundeboll.net>
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +02005 */
6
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +02007#include "fragmentation.h"
Sven Eckelmann1e2c2a42015-04-17 19:40:28 +02008#include "main.h"
9
10#include <linux/atomic.h>
11#include <linux/byteorder/generic.h>
Sven Eckelmann8def0be2016-07-17 21:04:02 +020012#include <linux/errno.h>
Sven Eckelmann1e2c2a42015-04-17 19:40:28 +020013#include <linux/etherdevice.h>
Sven Eckelmannb92b94a2017-11-19 17:12:02 +010014#include <linux/gfp.h>
Sven Eckelmann1e2c2a42015-04-17 19:40:28 +020015#include <linux/if_ether.h>
16#include <linux/jiffies.h>
Sven Eckelmann5274cd62015-06-21 14:45:15 +020017#include <linux/lockdep.h>
Sven Eckelmannfcd193e2020-10-26 21:01:59 +010018#include <linux/minmax.h>
Sven Eckelmann1e2c2a42015-04-17 19:40:28 +020019#include <linux/netdevice.h>
Sven Eckelmann1e2c2a42015-04-17 19:40:28 +020020#include <linux/skbuff.h>
21#include <linux/slab.h>
22#include <linux/spinlock.h>
23#include <linux/string.h>
Sven Eckelmannfec149f2017-12-21 10:17:41 +010024#include <uapi/linux/batadv_packet.h>
Sven Eckelmann1e2c2a42015-04-17 19:40:28 +020025
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +020026#include "hard-interface.h"
Sven Eckelmann1e2c2a42015-04-17 19:40:28 +020027#include "originator.h"
Sven Eckelmann1e2c2a42015-04-17 19:40:28 +020028#include "routing.h"
29#include "send.h"
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +020030
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +020031/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +010032 * batadv_frag_clear_chain() - delete entries in the fragment buffer chain
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +020033 * @head: head of chain with entries.
Sven Eckelmannbd687fe2016-07-17 21:04:00 +020034 * @dropped: whether the chain is cleared because all fragments are dropped
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +020035 *
36 * Free fragments in the passed hlist. Should be called with appropriate lock.
37 */
Sven Eckelmannbd687fe2016-07-17 21:04:00 +020038static void batadv_frag_clear_chain(struct hlist_head *head, bool dropped)
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +020039{
40 struct batadv_frag_list_entry *entry;
41 struct hlist_node *node;
42
43 hlist_for_each_entry_safe(entry, node, head, list) {
44 hlist_del(&entry->list);
Sven Eckelmannbd687fe2016-07-17 21:04:00 +020045
46 if (dropped)
47 kfree_skb(entry->skb);
48 else
49 consume_skb(entry->skb);
50
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +020051 kfree(entry);
52 }
53}
54
55/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +010056 * batadv_frag_purge_orig() - free fragments associated to an orig
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +020057 * @orig_node: originator to free fragments from
58 * @check_cb: optional function to tell if an entry should be purged
59 */
60void batadv_frag_purge_orig(struct batadv_orig_node *orig_node,
61 bool (*check_cb)(struct batadv_frag_table_entry *))
62{
63 struct batadv_frag_table_entry *chain;
Sven Eckelmann6b5e9712015-05-26 18:34:26 +020064 u8 i;
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +020065
66 for (i = 0; i < BATADV_FRAG_BUFFER_COUNT; i++) {
67 chain = &orig_node->fragments[i];
Sven Eckelmann01f6b5c2015-08-26 10:31:50 +020068 spin_lock_bh(&chain->lock);
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +020069
70 if (!check_cb || check_cb(chain)) {
Sven Eckelmannbd687fe2016-07-17 21:04:00 +020071 batadv_frag_clear_chain(&chain->fragment_list, true);
Sven Eckelmann01f6b5c2015-08-26 10:31:50 +020072 chain->size = 0;
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +020073 }
74
Sven Eckelmann01f6b5c2015-08-26 10:31:50 +020075 spin_unlock_bh(&chain->lock);
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +020076 }
77}
78
79/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +010080 * batadv_frag_size_limit() - maximum possible size of packet to be fragmented
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +020081 *
Sven Eckelmann62fe7102015-09-15 19:00:48 +020082 * Return: the maximum size of payload that can be fragmented.
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +020083 */
84static int batadv_frag_size_limit(void)
85{
86 int limit = BATADV_FRAG_MAX_FRAG_SIZE;
87
88 limit -= sizeof(struct batadv_frag_packet);
89 limit *= BATADV_FRAG_MAX_FRAGMENTS;
90
91 return limit;
92}
93
94/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +010095 * batadv_frag_init_chain() - check and prepare fragment chain for new fragment
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +020096 * @chain: chain in fragments table to init
97 * @seqno: sequence number of the received fragment
98 *
99 * Make chain ready for a fragment with sequence number "seqno". Delete existing
100 * entries if they have an "old" sequence number.
101 *
102 * Caller must hold chain->lock.
103 *
Sven Eckelmannbccb48c2020-06-01 20:13:21 +0200104 * Return: true if chain is empty and the caller can just insert the new
105 * fragment without searching for the right position.
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200106 */
107static bool batadv_frag_init_chain(struct batadv_frag_table_entry *chain,
Sven Eckelmann6b5e9712015-05-26 18:34:26 +0200108 u16 seqno)
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200109{
Sven Eckelmann5274cd62015-06-21 14:45:15 +0200110 lockdep_assert_held(&chain->lock);
111
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200112 if (chain->seqno == seqno)
113 return false;
114
Sven Eckelmann176e5b72016-07-27 12:31:07 +0200115 if (!hlist_empty(&chain->fragment_list))
Sven Eckelmannbd687fe2016-07-17 21:04:00 +0200116 batadv_frag_clear_chain(&chain->fragment_list, true);
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200117
118 chain->size = 0;
119 chain->seqno = seqno;
120
121 return true;
122}
123
124/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100125 * batadv_frag_insert_packet() - insert a fragment into a fragment chain
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200126 * @orig_node: originator that the fragment was received from
127 * @skb: skb to insert
128 * @chain_out: list head to attach complete chains of fragments to
129 *
130 * Insert a new fragment into the reverse ordered chain in the right table
131 * entry. The hash table entry is cleared if "old" fragments exist in it.
132 *
Sven Eckelmann62fe7102015-09-15 19:00:48 +0200133 * Return: true if skb is buffered, false on error. If the chain has all the
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200134 * fragments needed to merge the packet, the chain is moved to the passed head
135 * to avoid locking the chain in the table.
136 */
137static bool batadv_frag_insert_packet(struct batadv_orig_node *orig_node,
138 struct sk_buff *skb,
139 struct hlist_head *chain_out)
140{
141 struct batadv_frag_table_entry *chain;
142 struct batadv_frag_list_entry *frag_entry_new = NULL, *frag_entry_curr;
Sven Eckelmannd9124262014-05-26 17:21:39 +0200143 struct batadv_frag_list_entry *frag_entry_last = NULL;
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200144 struct batadv_frag_packet *frag_packet;
Sven Eckelmann6b5e9712015-05-26 18:34:26 +0200145 u8 bucket;
146 u16 seqno, hdr_size = sizeof(struct batadv_frag_packet);
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200147 bool ret = false;
148
149 /* Linearize packet to avoid linearizing 16 packets in a row when doing
150 * the later merge. Non-linear merge should be added to remove this
151 * linearization.
152 */
153 if (skb_linearize(skb) < 0)
154 goto err;
155
156 frag_packet = (struct batadv_frag_packet *)skb->data;
157 seqno = ntohs(frag_packet->seqno);
158 bucket = seqno % BATADV_FRAG_BUFFER_COUNT;
159
160 frag_entry_new = kmalloc(sizeof(*frag_entry_new), GFP_ATOMIC);
161 if (!frag_entry_new)
162 goto err;
163
164 frag_entry_new->skb = skb;
165 frag_entry_new->no = frag_packet->no;
166
167 /* Select entry in the "chain table" and delete any prior fragments
168 * with another sequence number. batadv_frag_init_chain() returns true,
169 * if the list is empty at return.
170 */
171 chain = &orig_node->fragments[bucket];
172 spin_lock_bh(&chain->lock);
173 if (batadv_frag_init_chain(chain, seqno)) {
Sven Eckelmann176e5b72016-07-27 12:31:07 +0200174 hlist_add_head(&frag_entry_new->list, &chain->fragment_list);
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200175 chain->size = skb->len - hdr_size;
176 chain->timestamp = jiffies;
Sven Eckelmann53e77142014-12-01 10:37:27 +0100177 chain->total_size = ntohs(frag_packet->total_size);
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200178 ret = true;
179 goto out;
180 }
181
182 /* Find the position for the new fragment. */
Sven Eckelmann176e5b72016-07-27 12:31:07 +0200183 hlist_for_each_entry(frag_entry_curr, &chain->fragment_list, list) {
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200184 /* Drop packet if fragment already exists. */
185 if (frag_entry_curr->no == frag_entry_new->no)
186 goto err_unlock;
187
188 /* Order fragments from highest to lowest. */
189 if (frag_entry_curr->no < frag_entry_new->no) {
190 hlist_add_before(&frag_entry_new->list,
191 &frag_entry_curr->list);
192 chain->size += skb->len - hdr_size;
193 chain->timestamp = jiffies;
194 ret = true;
195 goto out;
196 }
Sven Eckelmannd9124262014-05-26 17:21:39 +0200197
198 /* store current entry because it could be the last in list */
199 frag_entry_last = frag_entry_curr;
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200200 }
201
Sven Eckelmannd9124262014-05-26 17:21:39 +0200202 /* Reached the end of the list, so insert after 'frag_entry_last'. */
203 if (likely(frag_entry_last)) {
Sven Eckelmanne050dbe2014-08-15 10:19:39 +0200204 hlist_add_behind(&frag_entry_new->list, &frag_entry_last->list);
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200205 chain->size += skb->len - hdr_size;
206 chain->timestamp = jiffies;
207 ret = true;
208 }
209
210out:
211 if (chain->size > batadv_frag_size_limit() ||
Sven Eckelmann53e77142014-12-01 10:37:27 +0100212 chain->total_size != ntohs(frag_packet->total_size) ||
213 chain->total_size > batadv_frag_size_limit()) {
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200214 /* Clear chain if total size of either the list or the packet
Sven Eckelmann53e77142014-12-01 10:37:27 +0100215 * exceeds the maximum size of one merged packet. Don't allow
216 * packets to have different total_size.
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200217 */
Sven Eckelmannbd687fe2016-07-17 21:04:00 +0200218 batadv_frag_clear_chain(&chain->fragment_list, true);
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200219 chain->size = 0;
220 } else if (ntohs(frag_packet->total_size) == chain->size) {
221 /* All fragments received. Hand over chain to caller. */
Sven Eckelmann176e5b72016-07-27 12:31:07 +0200222 hlist_move_list(&chain->fragment_list, chain_out);
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200223 chain->size = 0;
224 }
225
226err_unlock:
227 spin_unlock_bh(&chain->lock);
228
229err:
Sven Eckelmann248e23b2017-02-12 11:26:33 +0100230 if (!ret) {
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200231 kfree(frag_entry_new);
Sven Eckelmann248e23b2017-02-12 11:26:33 +0100232 kfree_skb(skb);
233 }
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200234
235 return ret;
236}
237
238/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100239 * batadv_frag_merge_packets() - merge a chain of fragments
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200240 * @chain: head of chain with fragments
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200241 *
242 * Expand the first skb in the chain and copy the content of the remaining
243 * skb's into the expanded one. After doing so, clear the chain.
244 *
Sven Eckelmann62fe7102015-09-15 19:00:48 +0200245 * Return: the merged skb or NULL on error.
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200246 */
247static struct sk_buff *
Sven Eckelmann83e8b872014-12-01 10:37:28 +0100248batadv_frag_merge_packets(struct hlist_head *chain)
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200249{
250 struct batadv_frag_packet *packet;
251 struct batadv_frag_list_entry *entry;
Sven Eckelmann422d2f72016-07-25 00:42:44 +0200252 struct sk_buff *skb_out;
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200253 int size, hdr_size = sizeof(struct batadv_frag_packet);
Sven Eckelmannbd687fe2016-07-17 21:04:00 +0200254 bool dropped = false;
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200255
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200256 /* Remove first entry, as this is the destination for the rest of the
257 * fragments.
258 */
259 entry = hlist_entry(chain->first, struct batadv_frag_list_entry, list);
260 hlist_del(&entry->list);
261 skb_out = entry->skb;
262 kfree(entry);
263
Sven Eckelmann83e8b872014-12-01 10:37:28 +0100264 packet = (struct batadv_frag_packet *)skb_out->data;
Sven Eckelmannd7d8bbb2018-11-07 23:09:12 +0100265 size = ntohs(packet->total_size) + hdr_size;
Sven Eckelmann83e8b872014-12-01 10:37:28 +0100266
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200267 /* Make room for the rest of the fragments. */
Sven Eckelmann5b6698b2014-12-20 13:48:55 +0100268 if (pskb_expand_head(skb_out, 0, size - skb_out->len, GFP_ATOMIC) < 0) {
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200269 kfree_skb(skb_out);
270 skb_out = NULL;
Sven Eckelmannbd687fe2016-07-17 21:04:00 +0200271 dropped = true;
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200272 goto free;
273 }
274
275 /* Move the existing MAC header to just before the payload. (Override
276 * the fragment header.)
277 */
Matthias Schiffer3bf2a092018-01-23 10:59:50 +0100278 skb_pull(skb_out, hdr_size);
279 skb_out->ip_summed = CHECKSUM_NONE;
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200280 memmove(skb_out->data - ETH_HLEN, skb_mac_header(skb_out), ETH_HLEN);
281 skb_set_mac_header(skb_out, -ETH_HLEN);
282 skb_reset_network_header(skb_out);
283 skb_reset_transport_header(skb_out);
284
285 /* Copy the payload of the each fragment into the last skb */
286 hlist_for_each_entry(entry, chain, list) {
287 size = entry->skb->len - hdr_size;
Johannes Berg59ae1d12017-06-16 14:29:20 +0200288 skb_put_data(skb_out, entry->skb->data + hdr_size, size);
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200289 }
290
291free:
292 /* Locking is not needed, because 'chain' is not part of any orig. */
Sven Eckelmannbd687fe2016-07-17 21:04:00 +0200293 batadv_frag_clear_chain(chain, dropped);
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200294 return skb_out;
295}
296
297/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100298 * batadv_frag_skb_buffer() - buffer fragment for later merge
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200299 * @skb: skb to buffer
300 * @orig_node_src: originator that the skb is received from
301 *
302 * Add fragment to buffer and merge fragments if possible.
303 *
304 * There are three possible outcomes: 1) Packet is merged: Return true and
305 * set *skb to merged packet; 2) Packet is buffered: Return true and set *skb
Sven Eckelmann248e23b2017-02-12 11:26:33 +0100306 * to NULL; 3) Error: Return false and free skb.
Sven Eckelmann62fe7102015-09-15 19:00:48 +0200307 *
Sven Eckelmann21ba5ab2020-07-31 20:33:00 +0200308 * Return: true when the packet is merged or buffered, false when skb is not
Sven Eckelmann62fe7102015-09-15 19:00:48 +0200309 * used.
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200310 */
311bool batadv_frag_skb_buffer(struct sk_buff **skb,
312 struct batadv_orig_node *orig_node_src)
313{
314 struct sk_buff *skb_out = NULL;
315 struct hlist_head head = HLIST_HEAD_INIT;
316 bool ret = false;
317
318 /* Add packet to buffer and table entry if merge is possible. */
319 if (!batadv_frag_insert_packet(orig_node_src, *skb, &head))
320 goto out_err;
321
322 /* Leave if more fragments are needed to merge. */
323 if (hlist_empty(&head))
324 goto out;
325
Sven Eckelmann83e8b872014-12-01 10:37:28 +0100326 skb_out = batadv_frag_merge_packets(&head);
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200327 if (!skb_out)
328 goto out_err;
329
330out:
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200331 ret = true;
332out_err:
Sven Eckelmann248e23b2017-02-12 11:26:33 +0100333 *skb = skb_out;
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200334 return ret;
335}
336
337/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100338 * batadv_frag_skb_fwd() - forward fragments that would exceed MTU when merged
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200339 * @skb: skb to forward
340 * @recv_if: interface that the skb is received on
341 * @orig_node_src: originator that the skb is received from
342 *
343 * Look up the next-hop of the fragments payload and check if the merged packet
344 * will exceed the MTU towards the next-hop. If so, the fragment is forwarded
345 * without merging it.
346 *
Sven Eckelmann62fe7102015-09-15 19:00:48 +0200347 * Return: true if the fragment is consumed/forwarded, false otherwise.
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200348 */
349bool batadv_frag_skb_fwd(struct sk_buff *skb,
350 struct batadv_hard_iface *recv_if,
351 struct batadv_orig_node *orig_node_src)
352{
353 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
Sven Eckelmann422d2f72016-07-25 00:42:44 +0200354 struct batadv_orig_node *orig_node_dst;
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200355 struct batadv_neigh_node *neigh_node = NULL;
356 struct batadv_frag_packet *packet;
Sven Eckelmann6b5e9712015-05-26 18:34:26 +0200357 u16 total_size;
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200358 bool ret = false;
359
360 packet = (struct batadv_frag_packet *)skb->data;
361 orig_node_dst = batadv_orig_hash_find(bat_priv, packet->dest);
362 if (!orig_node_dst)
363 goto out;
364
365 neigh_node = batadv_find_router(bat_priv, orig_node_dst, recv_if);
366 if (!neigh_node)
367 goto out;
368
369 /* Forward the fragment, if the merged packet would be too big to
370 * be assembled.
371 */
372 total_size = ntohs(packet->total_size);
373 if (total_size > neigh_node->if_incoming->net_dev->mtu) {
374 batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_FWD);
375 batadv_add_counter(bat_priv, BATADV_CNT_FRAG_FWD_BYTES,
376 skb->len + ETH_HLEN);
377
Simon Wunderlicha40d9b02013-12-02 20:38:31 +0100378 packet->ttl--;
Antonio Quartulli95d39272016-01-16 16:40:15 +0800379 batadv_send_unicast_skb(skb, neigh_node);
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200380 ret = true;
381 }
382
383out:
Sven Eckelmann79a0bff2021-08-08 19:11:08 +0200384 batadv_orig_node_put(orig_node_dst);
385 batadv_neigh_node_put(neigh_node);
Martin Hundebøll610bfc6bc2013-05-23 16:53:02 +0200386 return ret;
387}
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200388
389/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100390 * batadv_frag_create() - create a fragment from skb
Sven Eckelmannc5cbfc82020-11-25 13:16:43 +0100391 * @net_dev: outgoing device for fragment
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200392 * @skb: skb to create fragment from
393 * @frag_head: header to use in new fragment
Sven Eckelmann1c2bcc72017-02-22 17:25:42 +0100394 * @fragment_size: size of new fragment
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200395 *
396 * Split the passed skb into two fragments: A new one with size matching the
397 * passed mtu and the old one with the rest. The new skb contains data from the
398 * tail of the old skb.
399 *
Sven Eckelmann62fe7102015-09-15 19:00:48 +0200400 * Return: the new fragment, NULL on error.
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200401 */
Sven Eckelmannc5cbfc82020-11-25 13:16:43 +0100402static struct sk_buff *batadv_frag_create(struct net_device *net_dev,
403 struct sk_buff *skb,
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200404 struct batadv_frag_packet *frag_head,
Sven Eckelmann1c2bcc72017-02-22 17:25:42 +0100405 unsigned int fragment_size)
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200406{
Sven Eckelmannc5cbfc82020-11-25 13:16:43 +0100407 unsigned int ll_reserved = LL_RESERVED_SPACE(net_dev);
408 unsigned int tailroom = net_dev->needed_tailroom;
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200409 struct sk_buff *skb_fragment;
Sven Eckelmannd3abce72016-03-09 22:22:51 +0100410 unsigned int header_size = sizeof(*frag_head);
Sven Eckelmann1c2bcc72017-02-22 17:25:42 +0100411 unsigned int mtu = fragment_size + header_size;
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200412
Sven Eckelmannc5cbfc82020-11-25 13:16:43 +0100413 skb_fragment = dev_alloc_skb(ll_reserved + mtu + tailroom);
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200414 if (!skb_fragment)
415 goto err;
416
Andrew Lunn19148482016-05-09 20:03:35 +0200417 skb_fragment->priority = skb->priority;
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200418
419 /* Eat the last mtu-bytes of the skb */
Sven Eckelmannc5cbfc82020-11-25 13:16:43 +0100420 skb_reserve(skb_fragment, ll_reserved + header_size);
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200421 skb_split(skb, skb_fragment, skb->len - fragment_size);
422
423 /* Add the header */
424 skb_push(skb_fragment, header_size);
425 memcpy(skb_fragment->data, frag_head, header_size);
426
427err:
428 return skb_fragment;
429}
430
431/**
Sven Eckelmann7e9a8c22017-12-02 19:51:47 +0100432 * batadv_frag_send_packet() - create up to 16 fragments from the passed skb
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200433 * @skb: skb to create fragments from
434 * @orig_node: final destination of the created fragments
435 * @neigh_node: next-hop of the created fragments
436 *
Sven Eckelmann8def0be2016-07-17 21:04:02 +0200437 * Return: the netdev tx status or a negative errno code on a failure
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200438 */
Antonio Quartullif50ca952016-05-18 11:38:48 +0200439int batadv_frag_send_packet(struct sk_buff *skb,
440 struct batadv_orig_node *orig_node,
441 struct batadv_neigh_node *neigh_node)
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200442{
Sven Eckelmannc5cbfc82020-11-25 13:16:43 +0100443 struct net_device *net_dev = neigh_node->if_incoming->net_dev;
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200444 struct batadv_priv *bat_priv;
Antonio Quartullibe181012014-04-23 14:05:16 +0200445 struct batadv_hard_iface *primary_if = NULL;
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200446 struct batadv_frag_packet frag_header;
447 struct sk_buff *skb_fragment;
Sven Eckelmannc5cbfc82020-11-25 13:16:43 +0100448 unsigned int mtu = net_dev->mtu;
Sven Eckelmannd3abce72016-03-09 22:22:51 +0100449 unsigned int header_size = sizeof(frag_header);
Sven Eckelmann1c2bcc72017-02-22 17:25:42 +0100450 unsigned int max_fragment_size, num_fragments;
Sven Eckelmann8def0be2016-07-17 21:04:02 +0200451 int ret;
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200452
453 /* To avoid merge and refragmentation at next-hops we never send
454 * fragments larger than BATADV_FRAG_MAX_FRAG_SIZE
455 */
Sven Eckelmannd3abce72016-03-09 22:22:51 +0100456 mtu = min_t(unsigned int, mtu, BATADV_FRAG_MAX_FRAG_SIZE);
Sven Eckelmann0402e442014-12-20 13:48:56 +0100457 max_fragment_size = mtu - header_size;
Sven Eckelmann1c2bcc72017-02-22 17:25:42 +0100458
459 if (skb->len == 0 || max_fragment_size == 0)
460 return -EINVAL;
461
462 num_fragments = (skb->len - 1) / max_fragment_size + 1;
463 max_fragment_size = (skb->len - 1) / num_fragments + 1;
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200464
465 /* Don't even try to fragment, if we need more than 16 fragments */
Sven Eckelmann1c2bcc72017-02-22 17:25:42 +0100466 if (num_fragments > BATADV_FRAG_MAX_FRAGMENTS) {
Sven Eckelmann8def0be2016-07-17 21:04:02 +0200467 ret = -EAGAIN;
468 goto free_skb;
469 }
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200470
471 bat_priv = orig_node->bat_priv;
472 primary_if = batadv_primary_if_get_selected(bat_priv);
Sven Eckelmann8def0be2016-07-17 21:04:02 +0200473 if (!primary_if) {
474 ret = -EINVAL;
Sven Eckelmann4ea33ef2016-12-27 08:51:17 +0100475 goto free_skb;
Sven Eckelmann8def0be2016-07-17 21:04:02 +0200476 }
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200477
478 /* Create one header to be copied to all fragments */
Simon Wunderlicha40d9b02013-12-02 20:38:31 +0100479 frag_header.packet_type = BATADV_UNICAST_FRAG;
480 frag_header.version = BATADV_COMPAT_VERSION;
481 frag_header.ttl = BATADV_TTL;
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200482 frag_header.seqno = htons(atomic_inc_return(&bat_priv->frag_seqno));
483 frag_header.reserved = 0;
484 frag_header.no = 0;
485 frag_header.total_size = htons(skb->len);
Andrew Lunnc0f25c802016-05-09 20:03:36 +0200486
487 /* skb->priority values from 256->263 are magic values to
488 * directly indicate a specific 802.1d priority. This is used
489 * to allow 802.1d priority to be passed directly in from VLAN
490 * tags, etc.
491 */
492 if (skb->priority >= 256 && skb->priority <= 263)
493 frag_header.priority = skb->priority - 256;
Sven Eckelmannfe77d822017-11-29 10:25:02 +0100494 else
495 frag_header.priority = 0;
Andrew Lunnc0f25c802016-05-09 20:03:36 +0200496
Antonio Quartulli8fdd0152014-01-22 00:42:11 +0100497 ether_addr_copy(frag_header.orig, primary_if->net_dev->dev_addr);
498 ether_addr_copy(frag_header.dest, orig_node->orig);
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200499
500 /* Eat and send fragments from the tail of skb */
501 while (skb->len > max_fragment_size) {
Linus Lüssing51c6b422017-02-13 20:44:31 +0100502 /* The initial check in this function should cover this case */
503 if (unlikely(frag_header.no == BATADV_FRAG_MAX_FRAGMENTS - 1)) {
504 ret = -EINVAL;
505 goto put_primary_if;
506 }
507
Sven Eckelmannc5cbfc82020-11-25 13:16:43 +0100508 skb_fragment = batadv_frag_create(net_dev, skb, &frag_header,
Sven Eckelmann1c2bcc72017-02-22 17:25:42 +0100509 max_fragment_size);
Sven Eckelmann8def0be2016-07-17 21:04:02 +0200510 if (!skb_fragment) {
511 ret = -ENOMEM;
Sven Eckelmann4ea33ef2016-12-27 08:51:17 +0100512 goto put_primary_if;
Sven Eckelmann8def0be2016-07-17 21:04:02 +0200513 }
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200514
515 batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_TX);
516 batadv_add_counter(bat_priv, BATADV_CNT_FRAG_TX_BYTES,
517 skb_fragment->len + ETH_HLEN);
Antonio Quartullif50ca952016-05-18 11:38:48 +0200518 ret = batadv_send_unicast_skb(skb_fragment, neigh_node);
519 if (ret != NET_XMIT_SUCCESS) {
Sven Eckelmann8def0be2016-07-17 21:04:02 +0200520 ret = NET_XMIT_DROP;
Sven Eckelmann4ea33ef2016-12-27 08:51:17 +0100521 goto put_primary_if;
Antonio Quartullif50ca952016-05-18 11:38:48 +0200522 }
523
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200524 frag_header.no++;
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200525 }
526
Sven Eckelmann992b03b2020-11-26 18:24:49 +0100527 /* make sure that there is at least enough head for the fragmentation
528 * and ethernet headers
529 */
530 ret = skb_cow_head(skb, ETH_HLEN + header_size);
531 if (ret < 0)
Sven Eckelmann4ea33ef2016-12-27 08:51:17 +0100532 goto put_primary_if;
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200533
Sven Eckelmann992b03b2020-11-26 18:24:49 +0100534 skb_push(skb, header_size);
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200535 memcpy(skb->data, &frag_header, header_size);
536
537 /* Send the last fragment */
538 batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_TX);
539 batadv_add_counter(bat_priv, BATADV_CNT_FRAG_TX_BYTES,
540 skb->len + ETH_HLEN);
Antonio Quartullif50ca952016-05-18 11:38:48 +0200541 ret = batadv_send_unicast_skb(skb, neigh_node);
Sven Eckelmann8def0be2016-07-17 21:04:02 +0200542 /* skb was consumed */
543 skb = NULL;
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200544
Sven Eckelmann8def0be2016-07-17 21:04:02 +0200545put_primary_if:
546 batadv_hardif_put(primary_if);
547free_skb:
548 kfree_skb(skb);
Antonio Quartullibe181012014-04-23 14:05:16 +0200549
550 return ret;
Martin Hundebøllee75ed82013-05-23 16:53:03 +0200551}