KEYS: add missing permission check for request_key() destination
[linux/fpc-iii.git] / net / batman-adv / fragmentation.c
blobaf97752b52aaa8ea3a6c10913a94f42da58edc01
1 /* Copyright (C) 2013-2014 B.A.T.M.A.N. contributors:
3 * Martin Hundebøll <martin@hundeboll.net>
5 * This program is free software; you can redistribute it and/or
6 * modify it under the terms of version 2 of the GNU General Public
7 * License as published by the Free Software Foundation.
9 * This program is distributed in the hope that it will be useful, but
10 * WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
12 * General Public License for more details.
14 * You should have received a copy of the GNU General Public License
15 * along with this program; if not, see <http://www.gnu.org/licenses/>.
18 #include "main.h"
19 #include "fragmentation.h"
20 #include "send.h"
21 #include "originator.h"
22 #include "routing.h"
23 #include "hard-interface.h"
24 #include "soft-interface.h"
27 /**
28 * batadv_frag_clear_chain - delete entries in the fragment buffer chain
29 * @head: head of chain with entries.
31 * Free fragments in the passed hlist. Should be called with appropriate lock.
33 static void batadv_frag_clear_chain(struct hlist_head *head)
35 struct batadv_frag_list_entry *entry;
36 struct hlist_node *node;
38 hlist_for_each_entry_safe(entry, node, head, list) {
39 hlist_del(&entry->list);
40 kfree_skb(entry->skb);
41 kfree(entry);
45 /**
46 * batadv_frag_purge_orig - free fragments associated to an orig
47 * @orig_node: originator to free fragments from
48 * @check_cb: optional function to tell if an entry should be purged
50 void batadv_frag_purge_orig(struct batadv_orig_node *orig_node,
51 bool (*check_cb)(struct batadv_frag_table_entry *))
53 struct batadv_frag_table_entry *chain;
54 uint8_t i;
56 for (i = 0; i < BATADV_FRAG_BUFFER_COUNT; i++) {
57 chain = &orig_node->fragments[i];
58 spin_lock_bh(&orig_node->fragments[i].lock);
60 if (!check_cb || check_cb(chain)) {
61 batadv_frag_clear_chain(&orig_node->fragments[i].head);
62 orig_node->fragments[i].size = 0;
65 spin_unlock_bh(&orig_node->fragments[i].lock);
69 /**
70 * batadv_frag_size_limit - maximum possible size of packet to be fragmented
72 * Returns the maximum size of payload that can be fragmented.
74 static int batadv_frag_size_limit(void)
76 int limit = BATADV_FRAG_MAX_FRAG_SIZE;
78 limit -= sizeof(struct batadv_frag_packet);
79 limit *= BATADV_FRAG_MAX_FRAGMENTS;
81 return limit;
84 /**
85 * batadv_frag_init_chain - check and prepare fragment chain for new fragment
86 * @chain: chain in fragments table to init
87 * @seqno: sequence number of the received fragment
89 * Make chain ready for a fragment with sequence number "seqno". Delete existing
90 * entries if they have an "old" sequence number.
92 * Caller must hold chain->lock.
94 * Returns true if chain is empty and caller can just insert the new fragment
95 * without searching for the right position.
97 static bool batadv_frag_init_chain(struct batadv_frag_table_entry *chain,
98 uint16_t seqno)
100 if (chain->seqno == seqno)
101 return false;
103 if (!hlist_empty(&chain->head))
104 batadv_frag_clear_chain(&chain->head);
106 chain->size = 0;
107 chain->seqno = seqno;
109 return true;
113 * batadv_frag_insert_packet - insert a fragment into a fragment chain
114 * @orig_node: originator that the fragment was received from
115 * @skb: skb to insert
116 * @chain_out: list head to attach complete chains of fragments to
118 * Insert a new fragment into the reverse ordered chain in the right table
119 * entry. The hash table entry is cleared if "old" fragments exist in it.
121 * Returns true if skb is buffered, false on error. If the chain has all the
122 * fragments needed to merge the packet, the chain is moved to the passed head
123 * to avoid locking the chain in the table.
125 static bool batadv_frag_insert_packet(struct batadv_orig_node *orig_node,
126 struct sk_buff *skb,
127 struct hlist_head *chain_out)
129 struct batadv_frag_table_entry *chain;
130 struct batadv_frag_list_entry *frag_entry_new = NULL, *frag_entry_curr;
131 struct batadv_frag_list_entry *frag_entry_last = NULL;
132 struct batadv_frag_packet *frag_packet;
133 uint8_t bucket;
134 uint16_t seqno, hdr_size = sizeof(struct batadv_frag_packet);
135 bool ret = false;
137 /* Linearize packet to avoid linearizing 16 packets in a row when doing
138 * the later merge. Non-linear merge should be added to remove this
139 * linearization.
141 if (skb_linearize(skb) < 0)
142 goto err;
144 frag_packet = (struct batadv_frag_packet *)skb->data;
145 seqno = ntohs(frag_packet->seqno);
146 bucket = seqno % BATADV_FRAG_BUFFER_COUNT;
148 frag_entry_new = kmalloc(sizeof(*frag_entry_new), GFP_ATOMIC);
149 if (!frag_entry_new)
150 goto err;
152 frag_entry_new->skb = skb;
153 frag_entry_new->no = frag_packet->no;
155 /* Select entry in the "chain table" and delete any prior fragments
156 * with another sequence number. batadv_frag_init_chain() returns true,
157 * if the list is empty at return.
159 chain = &orig_node->fragments[bucket];
160 spin_lock_bh(&chain->lock);
161 if (batadv_frag_init_chain(chain, seqno)) {
162 hlist_add_head(&frag_entry_new->list, &chain->head);
163 chain->size = skb->len - hdr_size;
164 chain->timestamp = jiffies;
165 ret = true;
166 goto out;
169 /* Find the position for the new fragment. */
170 hlist_for_each_entry(frag_entry_curr, &chain->head, list) {
171 /* Drop packet if fragment already exists. */
172 if (frag_entry_curr->no == frag_entry_new->no)
173 goto err_unlock;
175 /* Order fragments from highest to lowest. */
176 if (frag_entry_curr->no < frag_entry_new->no) {
177 hlist_add_before(&frag_entry_new->list,
178 &frag_entry_curr->list);
179 chain->size += skb->len - hdr_size;
180 chain->timestamp = jiffies;
181 ret = true;
182 goto out;
185 /* store current entry because it could be the last in list */
186 frag_entry_last = frag_entry_curr;
189 /* Reached the end of the list, so insert after 'frag_entry_last'. */
190 if (likely(frag_entry_last)) {
191 hlist_add_after(&frag_entry_last->list, &frag_entry_new->list);
192 chain->size += skb->len - hdr_size;
193 chain->timestamp = jiffies;
194 ret = true;
197 out:
198 if (chain->size > batadv_frag_size_limit() ||
199 ntohs(frag_packet->total_size) > batadv_frag_size_limit()) {
200 /* Clear chain if total size of either the list or the packet
201 * exceeds the maximum size of one merged packet.
203 batadv_frag_clear_chain(&chain->head);
204 chain->size = 0;
205 } else if (ntohs(frag_packet->total_size) == chain->size) {
206 /* All fragments received. Hand over chain to caller. */
207 hlist_move_list(&chain->head, chain_out);
208 chain->size = 0;
211 err_unlock:
212 spin_unlock_bh(&chain->lock);
214 err:
215 if (!ret) {
216 kfree(frag_entry_new);
217 kfree_skb(skb);
220 return ret;
224 * batadv_frag_merge_packets - merge a chain of fragments
225 * @chain: head of chain with fragments
226 * @skb: packet with total size of skb after merging
228 * Expand the first skb in the chain and copy the content of the remaining
229 * skb's into the expanded one. After doing so, clear the chain.
231 * Returns the merged skb or NULL on error.
233 static struct sk_buff *
234 batadv_frag_merge_packets(struct hlist_head *chain, struct sk_buff *skb)
236 struct batadv_frag_packet *packet;
237 struct batadv_frag_list_entry *entry;
238 struct sk_buff *skb_out = NULL;
239 int size, hdr_size = sizeof(struct batadv_frag_packet);
241 /* Make sure incoming skb has non-bogus data. */
242 packet = (struct batadv_frag_packet *)skb->data;
243 size = ntohs(packet->total_size);
244 if (size > batadv_frag_size_limit())
245 goto free;
247 /* Remove first entry, as this is the destination for the rest of the
248 * fragments.
250 entry = hlist_entry(chain->first, struct batadv_frag_list_entry, list);
251 hlist_del(&entry->list);
252 skb_out = entry->skb;
253 kfree(entry);
255 /* Make room for the rest of the fragments. */
256 if (pskb_expand_head(skb_out, 0, size - skb_out->len, GFP_ATOMIC) < 0) {
257 kfree_skb(skb_out);
258 skb_out = NULL;
259 goto free;
262 /* Move the existing MAC header to just before the payload. (Override
263 * the fragment header.)
265 skb_pull_rcsum(skb_out, hdr_size);
266 memmove(skb_out->data - ETH_HLEN, skb_mac_header(skb_out), ETH_HLEN);
267 skb_set_mac_header(skb_out, -ETH_HLEN);
268 skb_reset_network_header(skb_out);
269 skb_reset_transport_header(skb_out);
271 /* Copy the payload of the each fragment into the last skb */
272 hlist_for_each_entry(entry, chain, list) {
273 size = entry->skb->len - hdr_size;
274 memcpy(skb_put(skb_out, size), entry->skb->data + hdr_size,
275 size);
278 free:
279 /* Locking is not needed, because 'chain' is not part of any orig. */
280 batadv_frag_clear_chain(chain);
281 return skb_out;
285 * batadv_frag_skb_buffer - buffer fragment for later merge
286 * @skb: skb to buffer
287 * @orig_node_src: originator that the skb is received from
289 * Add fragment to buffer and merge fragments if possible.
291 * There are three possible outcomes: 1) Packet is merged: Return true and
292 * set *skb to merged packet; 2) Packet is buffered: Return true and set *skb
293 * to NULL; 3) Error: Return false and free skb.
295 bool batadv_frag_skb_buffer(struct sk_buff **skb,
296 struct batadv_orig_node *orig_node_src)
298 struct sk_buff *skb_out = NULL;
299 struct hlist_head head = HLIST_HEAD_INIT;
300 bool ret = false;
302 /* Add packet to buffer and table entry if merge is possible. */
303 if (!batadv_frag_insert_packet(orig_node_src, *skb, &head))
304 goto out_err;
306 /* Leave if more fragments are needed to merge. */
307 if (hlist_empty(&head))
308 goto out;
310 skb_out = batadv_frag_merge_packets(&head, *skb);
311 if (!skb_out)
312 goto out_err;
314 out:
315 ret = true;
316 out_err:
317 *skb = skb_out;
318 return ret;
322 * batadv_frag_skb_fwd - forward fragments that would exceed MTU when merged
323 * @skb: skb to forward
324 * @recv_if: interface that the skb is received on
325 * @orig_node_src: originator that the skb is received from
327 * Look up the next-hop of the fragments payload and check if the merged packet
328 * will exceed the MTU towards the next-hop. If so, the fragment is forwarded
329 * without merging it.
331 * Returns true if the fragment is consumed/forwarded, false otherwise.
333 bool batadv_frag_skb_fwd(struct sk_buff *skb,
334 struct batadv_hard_iface *recv_if,
335 struct batadv_orig_node *orig_node_src)
337 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
338 struct batadv_orig_node *orig_node_dst = NULL;
339 struct batadv_neigh_node *neigh_node = NULL;
340 struct batadv_frag_packet *packet;
341 uint16_t total_size;
342 bool ret = false;
344 packet = (struct batadv_frag_packet *)skb->data;
345 orig_node_dst = batadv_orig_hash_find(bat_priv, packet->dest);
346 if (!orig_node_dst)
347 goto out;
349 neigh_node = batadv_find_router(bat_priv, orig_node_dst, recv_if);
350 if (!neigh_node)
351 goto out;
353 /* Forward the fragment, if the merged packet would be too big to
354 * be assembled.
356 total_size = ntohs(packet->total_size);
357 if (total_size > neigh_node->if_incoming->net_dev->mtu) {
358 batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_FWD);
359 batadv_add_counter(bat_priv, BATADV_CNT_FRAG_FWD_BYTES,
360 skb->len + ETH_HLEN);
362 packet->ttl--;
363 batadv_send_skb_packet(skb, neigh_node->if_incoming,
364 neigh_node->addr);
365 ret = true;
368 out:
369 if (orig_node_dst)
370 batadv_orig_node_free_ref(orig_node_dst);
371 if (neigh_node)
372 batadv_neigh_node_free_ref(neigh_node);
373 return ret;
377 * batadv_frag_create - create a fragment from skb
378 * @skb: skb to create fragment from
379 * @frag_head: header to use in new fragment
380 * @fragment_size: size of new fragment
382 * Split the passed skb into two fragments: A new one with size matching the
383 * passed mtu and the old one with the rest. The new skb contains data from the
384 * tail of the old skb.
386 * Returns the new fragment, NULL on error.
388 static struct sk_buff *batadv_frag_create(struct sk_buff *skb,
389 struct batadv_frag_packet *frag_head,
390 unsigned int fragment_size)
392 struct sk_buff *skb_fragment;
393 unsigned header_size = sizeof(*frag_head);
394 unsigned int mtu = fragment_size + header_size;
396 skb_fragment = netdev_alloc_skb(NULL, mtu + ETH_HLEN);
397 if (!skb_fragment)
398 goto err;
400 skb->priority = TC_PRIO_CONTROL;
402 /* Eat the last mtu-bytes of the skb */
403 skb_reserve(skb_fragment, header_size + ETH_HLEN);
404 skb_split(skb, skb_fragment, skb->len - fragment_size);
406 /* Add the header */
407 skb_push(skb_fragment, header_size);
408 memcpy(skb_fragment->data, frag_head, header_size);
410 err:
411 return skb_fragment;
415 * batadv_frag_send_packet - create up to 16 fragments from the passed skb
416 * @skb: skb to create fragments from
417 * @orig_node: final destination of the created fragments
418 * @neigh_node: next-hop of the created fragments
420 * Returns true on success, false otherwise.
422 bool batadv_frag_send_packet(struct sk_buff *skb,
423 struct batadv_orig_node *orig_node,
424 struct batadv_neigh_node *neigh_node)
426 struct batadv_priv *bat_priv;
427 struct batadv_hard_iface *primary_if = NULL;
428 struct batadv_frag_packet frag_header;
429 struct sk_buff *skb_fragment;
430 unsigned mtu = neigh_node->if_incoming->net_dev->mtu;
431 unsigned header_size = sizeof(frag_header);
432 unsigned int max_fragment_size, num_fragments;
433 bool ret = false;
435 /* To avoid merge and refragmentation at next-hops we never send
436 * fragments larger than BATADV_FRAG_MAX_FRAG_SIZE
438 mtu = min_t(unsigned, mtu, BATADV_FRAG_MAX_FRAG_SIZE);
439 max_fragment_size = mtu - header_size;
441 if (skb->len == 0 || max_fragment_size == 0)
442 return -EINVAL;
444 num_fragments = (skb->len - 1) / max_fragment_size + 1;
445 max_fragment_size = (skb->len - 1) / num_fragments + 1;
447 /* Don't even try to fragment, if we need more than 16 fragments */
448 if (num_fragments > BATADV_FRAG_MAX_FRAGMENTS)
449 goto out_err;
451 bat_priv = orig_node->bat_priv;
452 primary_if = batadv_primary_if_get_selected(bat_priv);
453 if (!primary_if)
454 goto out_err;
456 /* Create one header to be copied to all fragments */
457 frag_header.packet_type = BATADV_UNICAST_FRAG;
458 frag_header.version = BATADV_COMPAT_VERSION;
459 frag_header.ttl = BATADV_TTL;
460 frag_header.seqno = htons(atomic_inc_return(&bat_priv->frag_seqno));
461 frag_header.reserved = 0;
462 frag_header.no = 0;
463 frag_header.total_size = htons(skb->len);
464 ether_addr_copy(frag_header.orig, primary_if->net_dev->dev_addr);
465 ether_addr_copy(frag_header.dest, orig_node->orig);
467 /* Eat and send fragments from the tail of skb */
468 while (skb->len > max_fragment_size) {
469 /* The initial check in this function should cover this case */
470 if (unlikely(frag_header.no == BATADV_FRAG_MAX_FRAGMENTS - 1))
471 goto out_err;
473 skb_fragment = batadv_frag_create(skb, &frag_header,
474 max_fragment_size);
475 if (!skb_fragment)
476 goto out_err;
478 batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_TX);
479 batadv_add_counter(bat_priv, BATADV_CNT_FRAG_TX_BYTES,
480 skb_fragment->len + ETH_HLEN);
481 batadv_send_skb_packet(skb_fragment, neigh_node->if_incoming,
482 neigh_node->addr);
483 frag_header.no++;
486 /* Make room for the fragment header. */
487 if (batadv_skb_head_push(skb, header_size) < 0 ||
488 pskb_expand_head(skb, header_size + ETH_HLEN, 0, GFP_ATOMIC) < 0)
489 goto out_err;
491 memcpy(skb->data, &frag_header, header_size);
493 /* Send the last fragment */
494 batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_TX);
495 batadv_add_counter(bat_priv, BATADV_CNT_FRAG_TX_BYTES,
496 skb->len + ETH_HLEN);
497 batadv_send_skb_packet(skb, neigh_node->if_incoming, neigh_node->addr);
499 ret = true;
501 out_err:
502 if (primary_if)
503 batadv_hardif_free_ref(primary_if);
505 return ret;