Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 1 | // SPDX-License-Identifier: GPL-2.0 |
| 2 | /* Copyright (C) 2013-2019 B.A.T.M.A.N. contributors: |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 3 | * |
| 4 | * Martin Hundebøll <martin@hundeboll.net> |
| 5 | */ |
| 6 | |
| 7 | #include "fragmentation.h" |
| 8 | #include "main.h" |
| 9 | |
| 10 | #include <linux/atomic.h> |
| 11 | #include <linux/byteorder/generic.h> |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 12 | #include <linux/errno.h> |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 13 | #include <linux/etherdevice.h> |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 14 | #include <linux/gfp.h> |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 15 | #include <linux/if_ether.h> |
| 16 | #include <linux/jiffies.h> |
| 17 | #include <linux/kernel.h> |
| 18 | #include <linux/lockdep.h> |
| 19 | #include <linux/netdevice.h> |
| 20 | #include <linux/skbuff.h> |
| 21 | #include <linux/slab.h> |
| 22 | #include <linux/spinlock.h> |
| 23 | #include <linux/string.h> |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 24 | #include <uapi/linux/batadv_packet.h> |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 25 | |
| 26 | #include "hard-interface.h" |
| 27 | #include "originator.h" |
| 28 | #include "routing.h" |
| 29 | #include "send.h" |
| 30 | #include "soft-interface.h" |
| 31 | |
| 32 | /** |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 33 | * batadv_frag_clear_chain() - delete entries in the fragment buffer chain |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 34 | * @head: head of chain with entries. |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 35 | * @dropped: whether the chain is cleared because all fragments are dropped |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 36 | * |
| 37 | * Free fragments in the passed hlist. Should be called with appropriate lock. |
| 38 | */ |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 39 | static void batadv_frag_clear_chain(struct hlist_head *head, bool dropped) |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 40 | { |
| 41 | struct batadv_frag_list_entry *entry; |
| 42 | struct hlist_node *node; |
| 43 | |
| 44 | hlist_for_each_entry_safe(entry, node, head, list) { |
| 45 | hlist_del(&entry->list); |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 46 | |
| 47 | if (dropped) |
| 48 | kfree_skb(entry->skb); |
| 49 | else |
| 50 | consume_skb(entry->skb); |
| 51 | |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 52 | kfree(entry); |
| 53 | } |
| 54 | } |
| 55 | |
| 56 | /** |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 57 | * batadv_frag_purge_orig() - free fragments associated to an orig |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 58 | * @orig_node: originator to free fragments from |
| 59 | * @check_cb: optional function to tell if an entry should be purged |
| 60 | */ |
| 61 | void batadv_frag_purge_orig(struct batadv_orig_node *orig_node, |
| 62 | bool (*check_cb)(struct batadv_frag_table_entry *)) |
| 63 | { |
| 64 | struct batadv_frag_table_entry *chain; |
| 65 | u8 i; |
| 66 | |
| 67 | for (i = 0; i < BATADV_FRAG_BUFFER_COUNT; i++) { |
| 68 | chain = &orig_node->fragments[i]; |
| 69 | spin_lock_bh(&chain->lock); |
| 70 | |
| 71 | if (!check_cb || check_cb(chain)) { |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 72 | batadv_frag_clear_chain(&chain->fragment_list, true); |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 73 | chain->size = 0; |
| 74 | } |
| 75 | |
| 76 | spin_unlock_bh(&chain->lock); |
| 77 | } |
| 78 | } |
| 79 | |
| 80 | /** |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 81 | * batadv_frag_size_limit() - maximum possible size of packet to be fragmented |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 82 | * |
| 83 | * Return: the maximum size of payload that can be fragmented. |
| 84 | */ |
| 85 | static int batadv_frag_size_limit(void) |
| 86 | { |
| 87 | int limit = BATADV_FRAG_MAX_FRAG_SIZE; |
| 88 | |
| 89 | limit -= sizeof(struct batadv_frag_packet); |
| 90 | limit *= BATADV_FRAG_MAX_FRAGMENTS; |
| 91 | |
| 92 | return limit; |
| 93 | } |
| 94 | |
| 95 | /** |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 96 | * batadv_frag_init_chain() - check and prepare fragment chain for new fragment |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 97 | * @chain: chain in fragments table to init |
| 98 | * @seqno: sequence number of the received fragment |
| 99 | * |
| 100 | * Make chain ready for a fragment with sequence number "seqno". Delete existing |
| 101 | * entries if they have an "old" sequence number. |
| 102 | * |
| 103 | * Caller must hold chain->lock. |
| 104 | * |
| 105 | * Return: true if chain is empty and caller can just insert the new fragment |
| 106 | * without searching for the right position. |
| 107 | */ |
| 108 | static bool batadv_frag_init_chain(struct batadv_frag_table_entry *chain, |
| 109 | u16 seqno) |
| 110 | { |
| 111 | lockdep_assert_held(&chain->lock); |
| 112 | |
| 113 | if (chain->seqno == seqno) |
| 114 | return false; |
| 115 | |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 116 | if (!hlist_empty(&chain->fragment_list)) |
| 117 | batadv_frag_clear_chain(&chain->fragment_list, true); |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 118 | |
| 119 | chain->size = 0; |
| 120 | chain->seqno = seqno; |
| 121 | |
| 122 | return true; |
| 123 | } |
| 124 | |
| 125 | /** |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 126 | * batadv_frag_insert_packet() - insert a fragment into a fragment chain |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 127 | * @orig_node: originator that the fragment was received from |
| 128 | * @skb: skb to insert |
| 129 | * @chain_out: list head to attach complete chains of fragments to |
| 130 | * |
| 131 | * Insert a new fragment into the reverse ordered chain in the right table |
| 132 | * entry. The hash table entry is cleared if "old" fragments exist in it. |
| 133 | * |
| 134 | * Return: true if skb is buffered, false on error. If the chain has all the |
| 135 | * fragments needed to merge the packet, the chain is moved to the passed head |
| 136 | * to avoid locking the chain in the table. |
| 137 | */ |
| 138 | static bool batadv_frag_insert_packet(struct batadv_orig_node *orig_node, |
| 139 | struct sk_buff *skb, |
| 140 | struct hlist_head *chain_out) |
| 141 | { |
| 142 | struct batadv_frag_table_entry *chain; |
| 143 | struct batadv_frag_list_entry *frag_entry_new = NULL, *frag_entry_curr; |
| 144 | struct batadv_frag_list_entry *frag_entry_last = NULL; |
| 145 | struct batadv_frag_packet *frag_packet; |
| 146 | u8 bucket; |
| 147 | u16 seqno, hdr_size = sizeof(struct batadv_frag_packet); |
| 148 | bool ret = false; |
| 149 | |
| 150 | /* Linearize packet to avoid linearizing 16 packets in a row when doing |
| 151 | * the later merge. Non-linear merge should be added to remove this |
| 152 | * linearization. |
| 153 | */ |
| 154 | if (skb_linearize(skb) < 0) |
| 155 | goto err; |
| 156 | |
| 157 | frag_packet = (struct batadv_frag_packet *)skb->data; |
| 158 | seqno = ntohs(frag_packet->seqno); |
| 159 | bucket = seqno % BATADV_FRAG_BUFFER_COUNT; |
| 160 | |
| 161 | frag_entry_new = kmalloc(sizeof(*frag_entry_new), GFP_ATOMIC); |
| 162 | if (!frag_entry_new) |
| 163 | goto err; |
| 164 | |
| 165 | frag_entry_new->skb = skb; |
| 166 | frag_entry_new->no = frag_packet->no; |
| 167 | |
| 168 | /* Select entry in the "chain table" and delete any prior fragments |
| 169 | * with another sequence number. batadv_frag_init_chain() returns true, |
| 170 | * if the list is empty at return. |
| 171 | */ |
| 172 | chain = &orig_node->fragments[bucket]; |
| 173 | spin_lock_bh(&chain->lock); |
| 174 | if (batadv_frag_init_chain(chain, seqno)) { |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 175 | hlist_add_head(&frag_entry_new->list, &chain->fragment_list); |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 176 | chain->size = skb->len - hdr_size; |
| 177 | chain->timestamp = jiffies; |
| 178 | chain->total_size = ntohs(frag_packet->total_size); |
| 179 | ret = true; |
| 180 | goto out; |
| 181 | } |
| 182 | |
| 183 | /* Find the position for the new fragment. */ |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 184 | hlist_for_each_entry(frag_entry_curr, &chain->fragment_list, list) { |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 185 | /* Drop packet if fragment already exists. */ |
| 186 | if (frag_entry_curr->no == frag_entry_new->no) |
| 187 | goto err_unlock; |
| 188 | |
| 189 | /* Order fragments from highest to lowest. */ |
| 190 | if (frag_entry_curr->no < frag_entry_new->no) { |
| 191 | hlist_add_before(&frag_entry_new->list, |
| 192 | &frag_entry_curr->list); |
| 193 | chain->size += skb->len - hdr_size; |
| 194 | chain->timestamp = jiffies; |
| 195 | ret = true; |
| 196 | goto out; |
| 197 | } |
| 198 | |
| 199 | /* store current entry because it could be the last in list */ |
| 200 | frag_entry_last = frag_entry_curr; |
| 201 | } |
| 202 | |
| 203 | /* Reached the end of the list, so insert after 'frag_entry_last'. */ |
| 204 | if (likely(frag_entry_last)) { |
| 205 | hlist_add_behind(&frag_entry_new->list, &frag_entry_last->list); |
| 206 | chain->size += skb->len - hdr_size; |
| 207 | chain->timestamp = jiffies; |
| 208 | ret = true; |
| 209 | } |
| 210 | |
| 211 | out: |
| 212 | if (chain->size > batadv_frag_size_limit() || |
| 213 | chain->total_size != ntohs(frag_packet->total_size) || |
| 214 | chain->total_size > batadv_frag_size_limit()) { |
| 215 | /* Clear chain if total size of either the list or the packet |
| 216 | * exceeds the maximum size of one merged packet. Don't allow |
| 217 | * packets to have different total_size. |
| 218 | */ |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 219 | batadv_frag_clear_chain(&chain->fragment_list, true); |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 220 | chain->size = 0; |
| 221 | } else if (ntohs(frag_packet->total_size) == chain->size) { |
| 222 | /* All fragments received. Hand over chain to caller. */ |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 223 | hlist_move_list(&chain->fragment_list, chain_out); |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 224 | chain->size = 0; |
| 225 | } |
| 226 | |
| 227 | err_unlock: |
| 228 | spin_unlock_bh(&chain->lock); |
| 229 | |
| 230 | err: |
| 231 | if (!ret) { |
| 232 | kfree(frag_entry_new); |
| 233 | kfree_skb(skb); |
| 234 | } |
| 235 | |
| 236 | return ret; |
| 237 | } |
| 238 | |
| 239 | /** |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 240 | * batadv_frag_merge_packets() - merge a chain of fragments |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 241 | * @chain: head of chain with fragments |
| 242 | * |
| 243 | * Expand the first skb in the chain and copy the content of the remaining |
| 244 | * skb's into the expanded one. After doing so, clear the chain. |
| 245 | * |
| 246 | * Return: the merged skb or NULL on error. |
| 247 | */ |
| 248 | static struct sk_buff * |
| 249 | batadv_frag_merge_packets(struct hlist_head *chain) |
| 250 | { |
| 251 | struct batadv_frag_packet *packet; |
| 252 | struct batadv_frag_list_entry *entry; |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 253 | struct sk_buff *skb_out; |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 254 | int size, hdr_size = sizeof(struct batadv_frag_packet); |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 255 | bool dropped = false; |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 256 | |
| 257 | /* Remove first entry, as this is the destination for the rest of the |
| 258 | * fragments. |
| 259 | */ |
| 260 | entry = hlist_entry(chain->first, struct batadv_frag_list_entry, list); |
| 261 | hlist_del(&entry->list); |
| 262 | skb_out = entry->skb; |
| 263 | kfree(entry); |
| 264 | |
| 265 | packet = (struct batadv_frag_packet *)skb_out->data; |
| 266 | size = ntohs(packet->total_size) + hdr_size; |
| 267 | |
| 268 | /* Make room for the rest of the fragments. */ |
| 269 | if (pskb_expand_head(skb_out, 0, size - skb_out->len, GFP_ATOMIC) < 0) { |
| 270 | kfree_skb(skb_out); |
| 271 | skb_out = NULL; |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 272 | dropped = true; |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 273 | goto free; |
| 274 | } |
| 275 | |
| 276 | /* Move the existing MAC header to just before the payload. (Override |
| 277 | * the fragment header.) |
| 278 | */ |
| 279 | skb_pull(skb_out, hdr_size); |
| 280 | skb_out->ip_summed = CHECKSUM_NONE; |
| 281 | memmove(skb_out->data - ETH_HLEN, skb_mac_header(skb_out), ETH_HLEN); |
| 282 | skb_set_mac_header(skb_out, -ETH_HLEN); |
| 283 | skb_reset_network_header(skb_out); |
| 284 | skb_reset_transport_header(skb_out); |
| 285 | |
| 286 | /* Copy the payload of the each fragment into the last skb */ |
| 287 | hlist_for_each_entry(entry, chain, list) { |
| 288 | size = entry->skb->len - hdr_size; |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 289 | skb_put_data(skb_out, entry->skb->data + hdr_size, size); |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 290 | } |
| 291 | |
| 292 | free: |
| 293 | /* Locking is not needed, because 'chain' is not part of any orig. */ |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 294 | batadv_frag_clear_chain(chain, dropped); |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 295 | return skb_out; |
| 296 | } |
| 297 | |
| 298 | /** |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 299 | * batadv_frag_skb_buffer() - buffer fragment for later merge |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 300 | * @skb: skb to buffer |
| 301 | * @orig_node_src: originator that the skb is received from |
| 302 | * |
| 303 | * Add fragment to buffer and merge fragments if possible. |
| 304 | * |
| 305 | * There are three possible outcomes: 1) Packet is merged: Return true and |
| 306 | * set *skb to merged packet; 2) Packet is buffered: Return true and set *skb |
| 307 | * to NULL; 3) Error: Return false and free skb. |
| 308 | * |
| 309 | * Return: true when packet is merged or buffered, false when skb is not not |
| 310 | * used. |
| 311 | */ |
| 312 | bool batadv_frag_skb_buffer(struct sk_buff **skb, |
| 313 | struct batadv_orig_node *orig_node_src) |
| 314 | { |
| 315 | struct sk_buff *skb_out = NULL; |
| 316 | struct hlist_head head = HLIST_HEAD_INIT; |
| 317 | bool ret = false; |
| 318 | |
| 319 | /* Add packet to buffer and table entry if merge is possible. */ |
| 320 | if (!batadv_frag_insert_packet(orig_node_src, *skb, &head)) |
| 321 | goto out_err; |
| 322 | |
| 323 | /* Leave if more fragments are needed to merge. */ |
| 324 | if (hlist_empty(&head)) |
| 325 | goto out; |
| 326 | |
| 327 | skb_out = batadv_frag_merge_packets(&head); |
| 328 | if (!skb_out) |
| 329 | goto out_err; |
| 330 | |
| 331 | out: |
| 332 | ret = true; |
| 333 | out_err: |
| 334 | *skb = skb_out; |
| 335 | return ret; |
| 336 | } |
| 337 | |
| 338 | /** |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 339 | * batadv_frag_skb_fwd() - forward fragments that would exceed MTU when merged |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 340 | * @skb: skb to forward |
| 341 | * @recv_if: interface that the skb is received on |
| 342 | * @orig_node_src: originator that the skb is received from |
| 343 | * |
| 344 | * Look up the next-hop of the fragments payload and check if the merged packet |
| 345 | * will exceed the MTU towards the next-hop. If so, the fragment is forwarded |
| 346 | * without merging it. |
| 347 | * |
| 348 | * Return: true if the fragment is consumed/forwarded, false otherwise. |
| 349 | */ |
| 350 | bool batadv_frag_skb_fwd(struct sk_buff *skb, |
| 351 | struct batadv_hard_iface *recv_if, |
| 352 | struct batadv_orig_node *orig_node_src) |
| 353 | { |
| 354 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 355 | struct batadv_orig_node *orig_node_dst; |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 356 | struct batadv_neigh_node *neigh_node = NULL; |
| 357 | struct batadv_frag_packet *packet; |
| 358 | u16 total_size; |
| 359 | bool ret = false; |
| 360 | |
| 361 | packet = (struct batadv_frag_packet *)skb->data; |
| 362 | orig_node_dst = batadv_orig_hash_find(bat_priv, packet->dest); |
| 363 | if (!orig_node_dst) |
| 364 | goto out; |
| 365 | |
| 366 | neigh_node = batadv_find_router(bat_priv, orig_node_dst, recv_if); |
| 367 | if (!neigh_node) |
| 368 | goto out; |
| 369 | |
| 370 | /* Forward the fragment, if the merged packet would be too big to |
| 371 | * be assembled. |
| 372 | */ |
| 373 | total_size = ntohs(packet->total_size); |
| 374 | if (total_size > neigh_node->if_incoming->net_dev->mtu) { |
| 375 | batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_FWD); |
| 376 | batadv_add_counter(bat_priv, BATADV_CNT_FRAG_FWD_BYTES, |
| 377 | skb->len + ETH_HLEN); |
| 378 | |
| 379 | packet->ttl--; |
| 380 | batadv_send_unicast_skb(skb, neigh_node); |
| 381 | ret = true; |
| 382 | } |
| 383 | |
| 384 | out: |
| 385 | if (orig_node_dst) |
| 386 | batadv_orig_node_put(orig_node_dst); |
| 387 | if (neigh_node) |
| 388 | batadv_neigh_node_put(neigh_node); |
| 389 | return ret; |
| 390 | } |
| 391 | |
| 392 | /** |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 393 | * batadv_frag_create() - create a fragment from skb |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 394 | * @skb: skb to create fragment from |
| 395 | * @frag_head: header to use in new fragment |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 396 | * @fragment_size: size of new fragment |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 397 | * |
| 398 | * Split the passed skb into two fragments: A new one with size matching the |
| 399 | * passed mtu and the old one with the rest. The new skb contains data from the |
| 400 | * tail of the old skb. |
| 401 | * |
| 402 | * Return: the new fragment, NULL on error. |
| 403 | */ |
Googler | b48fa91 | 2023-03-17 12:40:29 +0530 | [diff] [blame^] | 404 | static struct sk_buff *batadv_frag_create(struct sk_buff *skb, |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 405 | struct batadv_frag_packet *frag_head, |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 406 | unsigned int fragment_size) |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 407 | { |
| 408 | struct sk_buff *skb_fragment; |
| 409 | unsigned int header_size = sizeof(*frag_head); |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 410 | unsigned int mtu = fragment_size + header_size; |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 411 | |
Googler | b48fa91 | 2023-03-17 12:40:29 +0530 | [diff] [blame^] | 412 | skb_fragment = netdev_alloc_skb(NULL, mtu + ETH_HLEN); |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 413 | if (!skb_fragment) |
| 414 | goto err; |
| 415 | |
| 416 | skb_fragment->priority = skb->priority; |
| 417 | |
| 418 | /* Eat the last mtu-bytes of the skb */ |
Googler | b48fa91 | 2023-03-17 12:40:29 +0530 | [diff] [blame^] | 419 | skb_reserve(skb_fragment, header_size + ETH_HLEN); |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 420 | skb_split(skb, skb_fragment, skb->len - fragment_size); |
| 421 | |
| 422 | /* Add the header */ |
| 423 | skb_push(skb_fragment, header_size); |
| 424 | memcpy(skb_fragment->data, frag_head, header_size); |
| 425 | |
| 426 | err: |
| 427 | return skb_fragment; |
| 428 | } |
| 429 | |
| 430 | /** |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 431 | * batadv_frag_send_packet() - create up to 16 fragments from the passed skb |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 432 | * @skb: skb to create fragments from |
| 433 | * @orig_node: final destination of the created fragments |
| 434 | * @neigh_node: next-hop of the created fragments |
| 435 | * |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 436 | * Return: the netdev tx status or a negative errno code on a failure |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 437 | */ |
| 438 | int batadv_frag_send_packet(struct sk_buff *skb, |
| 439 | struct batadv_orig_node *orig_node, |
| 440 | struct batadv_neigh_node *neigh_node) |
| 441 | { |
| 442 | struct batadv_priv *bat_priv; |
| 443 | struct batadv_hard_iface *primary_if = NULL; |
| 444 | struct batadv_frag_packet frag_header; |
| 445 | struct sk_buff *skb_fragment; |
Googler | b48fa91 | 2023-03-17 12:40:29 +0530 | [diff] [blame^] | 446 | unsigned int mtu = neigh_node->if_incoming->net_dev->mtu; |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 447 | unsigned int header_size = sizeof(frag_header); |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 448 | unsigned int max_fragment_size, num_fragments; |
| 449 | int ret; |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 450 | |
| 451 | /* To avoid merge and refragmentation at next-hops we never send |
| 452 | * fragments larger than BATADV_FRAG_MAX_FRAG_SIZE |
| 453 | */ |
| 454 | mtu = min_t(unsigned int, mtu, BATADV_FRAG_MAX_FRAG_SIZE); |
| 455 | max_fragment_size = mtu - header_size; |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 456 | |
| 457 | if (skb->len == 0 || max_fragment_size == 0) |
| 458 | return -EINVAL; |
| 459 | |
| 460 | num_fragments = (skb->len - 1) / max_fragment_size + 1; |
| 461 | max_fragment_size = (skb->len - 1) / num_fragments + 1; |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 462 | |
| 463 | /* Don't even try to fragment, if we need more than 16 fragments */ |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 464 | if (num_fragments > BATADV_FRAG_MAX_FRAGMENTS) { |
| 465 | ret = -EAGAIN; |
| 466 | goto free_skb; |
| 467 | } |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 468 | |
| 469 | bat_priv = orig_node->bat_priv; |
| 470 | primary_if = batadv_primary_if_get_selected(bat_priv); |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 471 | if (!primary_if) { |
| 472 | ret = -EINVAL; |
| 473 | goto free_skb; |
| 474 | } |
| 475 | |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 476 | /* Create one header to be copied to all fragments */ |
| 477 | frag_header.packet_type = BATADV_UNICAST_FRAG; |
| 478 | frag_header.version = BATADV_COMPAT_VERSION; |
| 479 | frag_header.ttl = BATADV_TTL; |
| 480 | frag_header.seqno = htons(atomic_inc_return(&bat_priv->frag_seqno)); |
| 481 | frag_header.reserved = 0; |
| 482 | frag_header.no = 0; |
| 483 | frag_header.total_size = htons(skb->len); |
| 484 | |
| 485 | /* skb->priority values from 256->263 are magic values to |
| 486 | * directly indicate a specific 802.1d priority. This is used |
| 487 | * to allow 802.1d priority to be passed directly in from VLAN |
| 488 | * tags, etc. |
| 489 | */ |
| 490 | if (skb->priority >= 256 && skb->priority <= 263) |
| 491 | frag_header.priority = skb->priority - 256; |
| 492 | else |
| 493 | frag_header.priority = 0; |
| 494 | |
| 495 | ether_addr_copy(frag_header.orig, primary_if->net_dev->dev_addr); |
| 496 | ether_addr_copy(frag_header.dest, orig_node->orig); |
| 497 | |
| 498 | /* Eat and send fragments from the tail of skb */ |
| 499 | while (skb->len > max_fragment_size) { |
| 500 | /* The initial check in this function should cover this case */ |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 501 | if (unlikely(frag_header.no == BATADV_FRAG_MAX_FRAGMENTS - 1)) { |
| 502 | ret = -EINVAL; |
| 503 | goto put_primary_if; |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 504 | } |
| 505 | |
Googler | b48fa91 | 2023-03-17 12:40:29 +0530 | [diff] [blame^] | 506 | skb_fragment = batadv_frag_create(skb, &frag_header, |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 507 | max_fragment_size); |
| 508 | if (!skb_fragment) { |
| 509 | ret = -ENOMEM; |
| 510 | goto put_primary_if; |
| 511 | } |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 512 | |
| 513 | batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_TX); |
| 514 | batadv_add_counter(bat_priv, BATADV_CNT_FRAG_TX_BYTES, |
| 515 | skb_fragment->len + ETH_HLEN); |
| 516 | ret = batadv_send_unicast_skb(skb_fragment, neigh_node); |
| 517 | if (ret != NET_XMIT_SUCCESS) { |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 518 | ret = NET_XMIT_DROP; |
| 519 | goto put_primary_if; |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 520 | } |
| 521 | |
| 522 | frag_header.no++; |
| 523 | } |
| 524 | |
Googler | b48fa91 | 2023-03-17 12:40:29 +0530 | [diff] [blame^] | 525 | /* Make room for the fragment header. */ |
| 526 | if (batadv_skb_head_push(skb, header_size) < 0 || |
| 527 | pskb_expand_head(skb, header_size + ETH_HLEN, 0, GFP_ATOMIC) < 0) { |
| 528 | ret = -ENOMEM; |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 529 | goto put_primary_if; |
Googler | b48fa91 | 2023-03-17 12:40:29 +0530 | [diff] [blame^] | 530 | } |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 531 | |
| 532 | memcpy(skb->data, &frag_header, header_size); |
| 533 | |
| 534 | /* Send the last fragment */ |
| 535 | batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_TX); |
| 536 | batadv_add_counter(bat_priv, BATADV_CNT_FRAG_TX_BYTES, |
| 537 | skb->len + ETH_HLEN); |
| 538 | ret = batadv_send_unicast_skb(skb, neigh_node); |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 539 | /* skb was consumed */ |
| 540 | skb = NULL; |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 541 | |
Googler | 9398cc3 | 2022-12-02 17:21:52 +0800 | [diff] [blame] | 542 | put_primary_if: |
| 543 | batadv_hardif_put(primary_if); |
| 544 | free_skb: |
| 545 | kfree_skb(skb); |
Googler | af606d2 | 2022-10-26 21:40:12 -0700 | [diff] [blame] | 546 | |
| 547 | return ret; |
| 548 | } |