Linux 5.7.7
[linux/fpc-iii.git] / net / batman-adv / fragmentation.c
blob7cad97644d05845b4752836ccb35b0b57c00e22b
1 // SPDX-License-Identifier: GPL-2.0
2 /* Copyright (C) 2013-2020 B.A.T.M.A.N. contributors:
4 * Martin Hundebøll <martin@hundeboll.net>
5 */
7 #include "fragmentation.h"
8 #include "main.h"
10 #include <linux/atomic.h>
11 #include <linux/byteorder/generic.h>
12 #include <linux/errno.h>
13 #include <linux/etherdevice.h>
14 #include <linux/gfp.h>
15 #include <linux/if_ether.h>
16 #include <linux/jiffies.h>
17 #include <linux/kernel.h>
18 #include <linux/lockdep.h>
19 #include <linux/netdevice.h>
20 #include <linux/skbuff.h>
21 #include <linux/slab.h>
22 #include <linux/spinlock.h>
23 #include <linux/string.h>
24 #include <uapi/linux/batadv_packet.h>
26 #include "hard-interface.h"
27 #include "originator.h"
28 #include "routing.h"
29 #include "send.h"
30 #include "soft-interface.h"
32 /**
33 * batadv_frag_clear_chain() - delete entries in the fragment buffer chain
34 * @head: head of chain with entries.
35 * @dropped: whether the chain is cleared because all fragments are dropped
37 * Free fragments in the passed hlist. Should be called with appropriate lock.
39 static void batadv_frag_clear_chain(struct hlist_head *head, bool dropped)
41 struct batadv_frag_list_entry *entry;
42 struct hlist_node *node;
44 hlist_for_each_entry_safe(entry, node, head, list) {
45 hlist_del(&entry->list);
47 if (dropped)
48 kfree_skb(entry->skb);
49 else
50 consume_skb(entry->skb);
52 kfree(entry);
56 /**
57 * batadv_frag_purge_orig() - free fragments associated to an orig
58 * @orig_node: originator to free fragments from
59 * @check_cb: optional function to tell if an entry should be purged
61 void batadv_frag_purge_orig(struct batadv_orig_node *orig_node,
62 bool (*check_cb)(struct batadv_frag_table_entry *))
64 struct batadv_frag_table_entry *chain;
65 u8 i;
67 for (i = 0; i < BATADV_FRAG_BUFFER_COUNT; i++) {
68 chain = &orig_node->fragments[i];
69 spin_lock_bh(&chain->lock);
71 if (!check_cb || check_cb(chain)) {
72 batadv_frag_clear_chain(&chain->fragment_list, true);
73 chain->size = 0;
76 spin_unlock_bh(&chain->lock);
80 /**
81 * batadv_frag_size_limit() - maximum possible size of packet to be fragmented
83 * Return: the maximum size of payload that can be fragmented.
85 static int batadv_frag_size_limit(void)
87 int limit = BATADV_FRAG_MAX_FRAG_SIZE;
89 limit -= sizeof(struct batadv_frag_packet);
90 limit *= BATADV_FRAG_MAX_FRAGMENTS;
92 return limit;
95 /**
96 * batadv_frag_init_chain() - check and prepare fragment chain for new fragment
97 * @chain: chain in fragments table to init
98 * @seqno: sequence number of the received fragment
100 * Make chain ready for a fragment with sequence number "seqno". Delete existing
101 * entries if they have an "old" sequence number.
103 * Caller must hold chain->lock.
105 * Return: true if chain is empty and caller can just insert the new fragment
106 * without searching for the right position.
108 static bool batadv_frag_init_chain(struct batadv_frag_table_entry *chain,
109 u16 seqno)
111 lockdep_assert_held(&chain->lock);
113 if (chain->seqno == seqno)
114 return false;
116 if (!hlist_empty(&chain->fragment_list))
117 batadv_frag_clear_chain(&chain->fragment_list, true);
119 chain->size = 0;
120 chain->seqno = seqno;
122 return true;
126 * batadv_frag_insert_packet() - insert a fragment into a fragment chain
127 * @orig_node: originator that the fragment was received from
128 * @skb: skb to insert
129 * @chain_out: list head to attach complete chains of fragments to
131 * Insert a new fragment into the reverse ordered chain in the right table
132 * entry. The hash table entry is cleared if "old" fragments exist in it.
134 * Return: true if skb is buffered, false on error. If the chain has all the
135 * fragments needed to merge the packet, the chain is moved to the passed head
136 * to avoid locking the chain in the table.
138 static bool batadv_frag_insert_packet(struct batadv_orig_node *orig_node,
139 struct sk_buff *skb,
140 struct hlist_head *chain_out)
142 struct batadv_frag_table_entry *chain;
143 struct batadv_frag_list_entry *frag_entry_new = NULL, *frag_entry_curr;
144 struct batadv_frag_list_entry *frag_entry_last = NULL;
145 struct batadv_frag_packet *frag_packet;
146 u8 bucket;
147 u16 seqno, hdr_size = sizeof(struct batadv_frag_packet);
148 bool ret = false;
150 /* Linearize packet to avoid linearizing 16 packets in a row when doing
151 * the later merge. Non-linear merge should be added to remove this
152 * linearization.
154 if (skb_linearize(skb) < 0)
155 goto err;
157 frag_packet = (struct batadv_frag_packet *)skb->data;
158 seqno = ntohs(frag_packet->seqno);
159 bucket = seqno % BATADV_FRAG_BUFFER_COUNT;
161 frag_entry_new = kmalloc(sizeof(*frag_entry_new), GFP_ATOMIC);
162 if (!frag_entry_new)
163 goto err;
165 frag_entry_new->skb = skb;
166 frag_entry_new->no = frag_packet->no;
168 /* Select entry in the "chain table" and delete any prior fragments
169 * with another sequence number. batadv_frag_init_chain() returns true,
170 * if the list is empty at return.
172 chain = &orig_node->fragments[bucket];
173 spin_lock_bh(&chain->lock);
174 if (batadv_frag_init_chain(chain, seqno)) {
175 hlist_add_head(&frag_entry_new->list, &chain->fragment_list);
176 chain->size = skb->len - hdr_size;
177 chain->timestamp = jiffies;
178 chain->total_size = ntohs(frag_packet->total_size);
179 ret = true;
180 goto out;
183 /* Find the position for the new fragment. */
184 hlist_for_each_entry(frag_entry_curr, &chain->fragment_list, list) {
185 /* Drop packet if fragment already exists. */
186 if (frag_entry_curr->no == frag_entry_new->no)
187 goto err_unlock;
189 /* Order fragments from highest to lowest. */
190 if (frag_entry_curr->no < frag_entry_new->no) {
191 hlist_add_before(&frag_entry_new->list,
192 &frag_entry_curr->list);
193 chain->size += skb->len - hdr_size;
194 chain->timestamp = jiffies;
195 ret = true;
196 goto out;
199 /* store current entry because it could be the last in list */
200 frag_entry_last = frag_entry_curr;
203 /* Reached the end of the list, so insert after 'frag_entry_last'. */
204 if (likely(frag_entry_last)) {
205 hlist_add_behind(&frag_entry_new->list, &frag_entry_last->list);
206 chain->size += skb->len - hdr_size;
207 chain->timestamp = jiffies;
208 ret = true;
211 out:
212 if (chain->size > batadv_frag_size_limit() ||
213 chain->total_size != ntohs(frag_packet->total_size) ||
214 chain->total_size > batadv_frag_size_limit()) {
215 /* Clear chain if total size of either the list or the packet
216 * exceeds the maximum size of one merged packet. Don't allow
217 * packets to have different total_size.
219 batadv_frag_clear_chain(&chain->fragment_list, true);
220 chain->size = 0;
221 } else if (ntohs(frag_packet->total_size) == chain->size) {
222 /* All fragments received. Hand over chain to caller. */
223 hlist_move_list(&chain->fragment_list, chain_out);
224 chain->size = 0;
227 err_unlock:
228 spin_unlock_bh(&chain->lock);
230 err:
231 if (!ret) {
232 kfree(frag_entry_new);
233 kfree_skb(skb);
236 return ret;
240 * batadv_frag_merge_packets() - merge a chain of fragments
241 * @chain: head of chain with fragments
243 * Expand the first skb in the chain and copy the content of the remaining
244 * skb's into the expanded one. After doing so, clear the chain.
246 * Return: the merged skb or NULL on error.
248 static struct sk_buff *
249 batadv_frag_merge_packets(struct hlist_head *chain)
251 struct batadv_frag_packet *packet;
252 struct batadv_frag_list_entry *entry;
253 struct sk_buff *skb_out;
254 int size, hdr_size = sizeof(struct batadv_frag_packet);
255 bool dropped = false;
257 /* Remove first entry, as this is the destination for the rest of the
258 * fragments.
260 entry = hlist_entry(chain->first, struct batadv_frag_list_entry, list);
261 hlist_del(&entry->list);
262 skb_out = entry->skb;
263 kfree(entry);
265 packet = (struct batadv_frag_packet *)skb_out->data;
266 size = ntohs(packet->total_size) + hdr_size;
268 /* Make room for the rest of the fragments. */
269 if (pskb_expand_head(skb_out, 0, size - skb_out->len, GFP_ATOMIC) < 0) {
270 kfree_skb(skb_out);
271 skb_out = NULL;
272 dropped = true;
273 goto free;
276 /* Move the existing MAC header to just before the payload. (Override
277 * the fragment header.)
279 skb_pull(skb_out, hdr_size);
280 skb_out->ip_summed = CHECKSUM_NONE;
281 memmove(skb_out->data - ETH_HLEN, skb_mac_header(skb_out), ETH_HLEN);
282 skb_set_mac_header(skb_out, -ETH_HLEN);
283 skb_reset_network_header(skb_out);
284 skb_reset_transport_header(skb_out);
286 /* Copy the payload of the each fragment into the last skb */
287 hlist_for_each_entry(entry, chain, list) {
288 size = entry->skb->len - hdr_size;
289 skb_put_data(skb_out, entry->skb->data + hdr_size, size);
292 free:
293 /* Locking is not needed, because 'chain' is not part of any orig. */
294 batadv_frag_clear_chain(chain, dropped);
295 return skb_out;
299 * batadv_frag_skb_buffer() - buffer fragment for later merge
300 * @skb: skb to buffer
301 * @orig_node_src: originator that the skb is received from
303 * Add fragment to buffer and merge fragments if possible.
305 * There are three possible outcomes: 1) Packet is merged: Return true and
306 * set *skb to merged packet; 2) Packet is buffered: Return true and set *skb
307 * to NULL; 3) Error: Return false and free skb.
309 * Return: true when packet is merged or buffered, false when skb is not not
310 * used.
312 bool batadv_frag_skb_buffer(struct sk_buff **skb,
313 struct batadv_orig_node *orig_node_src)
315 struct sk_buff *skb_out = NULL;
316 struct hlist_head head = HLIST_HEAD_INIT;
317 bool ret = false;
319 /* Add packet to buffer and table entry if merge is possible. */
320 if (!batadv_frag_insert_packet(orig_node_src, *skb, &head))
321 goto out_err;
323 /* Leave if more fragments are needed to merge. */
324 if (hlist_empty(&head))
325 goto out;
327 skb_out = batadv_frag_merge_packets(&head);
328 if (!skb_out)
329 goto out_err;
331 out:
332 ret = true;
333 out_err:
334 *skb = skb_out;
335 return ret;
339 * batadv_frag_skb_fwd() - forward fragments that would exceed MTU when merged
340 * @skb: skb to forward
341 * @recv_if: interface that the skb is received on
342 * @orig_node_src: originator that the skb is received from
344 * Look up the next-hop of the fragments payload and check if the merged packet
345 * will exceed the MTU towards the next-hop. If so, the fragment is forwarded
346 * without merging it.
348 * Return: true if the fragment is consumed/forwarded, false otherwise.
350 bool batadv_frag_skb_fwd(struct sk_buff *skb,
351 struct batadv_hard_iface *recv_if,
352 struct batadv_orig_node *orig_node_src)
354 struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
355 struct batadv_orig_node *orig_node_dst;
356 struct batadv_neigh_node *neigh_node = NULL;
357 struct batadv_frag_packet *packet;
358 u16 total_size;
359 bool ret = false;
361 packet = (struct batadv_frag_packet *)skb->data;
362 orig_node_dst = batadv_orig_hash_find(bat_priv, packet->dest);
363 if (!orig_node_dst)
364 goto out;
366 neigh_node = batadv_find_router(bat_priv, orig_node_dst, recv_if);
367 if (!neigh_node)
368 goto out;
370 /* Forward the fragment, if the merged packet would be too big to
371 * be assembled.
373 total_size = ntohs(packet->total_size);
374 if (total_size > neigh_node->if_incoming->net_dev->mtu) {
375 batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_FWD);
376 batadv_add_counter(bat_priv, BATADV_CNT_FRAG_FWD_BYTES,
377 skb->len + ETH_HLEN);
379 packet->ttl--;
380 batadv_send_unicast_skb(skb, neigh_node);
381 ret = true;
384 out:
385 if (orig_node_dst)
386 batadv_orig_node_put(orig_node_dst);
387 if (neigh_node)
388 batadv_neigh_node_put(neigh_node);
389 return ret;
393 * batadv_frag_create() - create a fragment from skb
394 * @skb: skb to create fragment from
395 * @frag_head: header to use in new fragment
396 * @fragment_size: size of new fragment
398 * Split the passed skb into two fragments: A new one with size matching the
399 * passed mtu and the old one with the rest. The new skb contains data from the
400 * tail of the old skb.
402 * Return: the new fragment, NULL on error.
404 static struct sk_buff *batadv_frag_create(struct sk_buff *skb,
405 struct batadv_frag_packet *frag_head,
406 unsigned int fragment_size)
408 struct sk_buff *skb_fragment;
409 unsigned int header_size = sizeof(*frag_head);
410 unsigned int mtu = fragment_size + header_size;
412 skb_fragment = netdev_alloc_skb(NULL, mtu + ETH_HLEN);
413 if (!skb_fragment)
414 goto err;
416 skb_fragment->priority = skb->priority;
418 /* Eat the last mtu-bytes of the skb */
419 skb_reserve(skb_fragment, header_size + ETH_HLEN);
420 skb_split(skb, skb_fragment, skb->len - fragment_size);
422 /* Add the header */
423 skb_push(skb_fragment, header_size);
424 memcpy(skb_fragment->data, frag_head, header_size);
426 err:
427 return skb_fragment;
431 * batadv_frag_send_packet() - create up to 16 fragments from the passed skb
432 * @skb: skb to create fragments from
433 * @orig_node: final destination of the created fragments
434 * @neigh_node: next-hop of the created fragments
436 * Return: the netdev tx status or a negative errno code on a failure
438 int batadv_frag_send_packet(struct sk_buff *skb,
439 struct batadv_orig_node *orig_node,
440 struct batadv_neigh_node *neigh_node)
442 struct batadv_priv *bat_priv;
443 struct batadv_hard_iface *primary_if = NULL;
444 struct batadv_frag_packet frag_header;
445 struct sk_buff *skb_fragment;
446 unsigned int mtu = neigh_node->if_incoming->net_dev->mtu;
447 unsigned int header_size = sizeof(frag_header);
448 unsigned int max_fragment_size, num_fragments;
449 int ret;
451 /* To avoid merge and refragmentation at next-hops we never send
452 * fragments larger than BATADV_FRAG_MAX_FRAG_SIZE
454 mtu = min_t(unsigned int, mtu, BATADV_FRAG_MAX_FRAG_SIZE);
455 max_fragment_size = mtu - header_size;
457 if (skb->len == 0 || max_fragment_size == 0)
458 return -EINVAL;
460 num_fragments = (skb->len - 1) / max_fragment_size + 1;
461 max_fragment_size = (skb->len - 1) / num_fragments + 1;
463 /* Don't even try to fragment, if we need more than 16 fragments */
464 if (num_fragments > BATADV_FRAG_MAX_FRAGMENTS) {
465 ret = -EAGAIN;
466 goto free_skb;
469 bat_priv = orig_node->bat_priv;
470 primary_if = batadv_primary_if_get_selected(bat_priv);
471 if (!primary_if) {
472 ret = -EINVAL;
473 goto free_skb;
476 /* Create one header to be copied to all fragments */
477 frag_header.packet_type = BATADV_UNICAST_FRAG;
478 frag_header.version = BATADV_COMPAT_VERSION;
479 frag_header.ttl = BATADV_TTL;
480 frag_header.seqno = htons(atomic_inc_return(&bat_priv->frag_seqno));
481 frag_header.reserved = 0;
482 frag_header.no = 0;
483 frag_header.total_size = htons(skb->len);
485 /* skb->priority values from 256->263 are magic values to
486 * directly indicate a specific 802.1d priority. This is used
487 * to allow 802.1d priority to be passed directly in from VLAN
488 * tags, etc.
490 if (skb->priority >= 256 && skb->priority <= 263)
491 frag_header.priority = skb->priority - 256;
492 else
493 frag_header.priority = 0;
495 ether_addr_copy(frag_header.orig, primary_if->net_dev->dev_addr);
496 ether_addr_copy(frag_header.dest, orig_node->orig);
498 /* Eat and send fragments from the tail of skb */
499 while (skb->len > max_fragment_size) {
500 /* The initial check in this function should cover this case */
501 if (unlikely(frag_header.no == BATADV_FRAG_MAX_FRAGMENTS - 1)) {
502 ret = -EINVAL;
503 goto put_primary_if;
506 skb_fragment = batadv_frag_create(skb, &frag_header,
507 max_fragment_size);
508 if (!skb_fragment) {
509 ret = -ENOMEM;
510 goto put_primary_if;
513 batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_TX);
514 batadv_add_counter(bat_priv, BATADV_CNT_FRAG_TX_BYTES,
515 skb_fragment->len + ETH_HLEN);
516 ret = batadv_send_unicast_skb(skb_fragment, neigh_node);
517 if (ret != NET_XMIT_SUCCESS) {
518 ret = NET_XMIT_DROP;
519 goto put_primary_if;
522 frag_header.no++;
525 /* Make room for the fragment header. */
526 if (batadv_skb_head_push(skb, header_size) < 0 ||
527 pskb_expand_head(skb, header_size + ETH_HLEN, 0, GFP_ATOMIC) < 0) {
528 ret = -ENOMEM;
529 goto put_primary_if;
532 memcpy(skb->data, &frag_header, header_size);
534 /* Send the last fragment */
535 batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_TX);
536 batadv_add_counter(bat_priv, BATADV_CNT_FRAG_TX_BYTES,
537 skb->len + ETH_HLEN);
538 ret = batadv_send_unicast_skb(skb, neigh_node);
539 /* skb was consumed */
540 skb = NULL;
542 put_primary_if:
543 batadv_hardif_put(primary_if);
544 free_skb:
545 kfree_skb(skb);
547 return ret;