]>
Commit | Line | Data |
---|---|---|
7db7d9f3 | 1 | // SPDX-License-Identifier: GPL-2.0 |
6b1aea8c | 2 | /* Copyright (C) 2013-2018 B.A.T.M.A.N. contributors: |
610bfc6b MH |
3 | * |
4 | * Martin Hundebøll <[email protected]> | |
5 | * | |
6 | * This program is free software; you can redistribute it and/or | |
7 | * modify it under the terms of version 2 of the GNU General Public | |
8 | * License as published by the Free Software Foundation. | |
9 | * | |
10 | * This program is distributed in the hope that it will be useful, but | |
11 | * WITHOUT ANY WARRANTY; without even the implied warranty of | |
12 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
13 | * General Public License for more details. | |
14 | * | |
15 | * You should have received a copy of the GNU General Public License | |
ebf38fb7 | 16 | * along with this program; if not, see <http://www.gnu.org/licenses/>. |
610bfc6b MH |
17 | */ |
18 | ||
610bfc6b | 19 | #include "fragmentation.h" |
1e2c2a4f SE |
20 | #include "main.h" |
21 | ||
22 | #include <linux/atomic.h> | |
23 | #include <linux/byteorder/generic.h> | |
8def0be8 | 24 | #include <linux/errno.h> |
1e2c2a4f | 25 | #include <linux/etherdevice.h> |
b92b94ac | 26 | #include <linux/gfp.h> |
1e2c2a4f SE |
27 | #include <linux/if_ether.h> |
28 | #include <linux/jiffies.h> | |
29 | #include <linux/kernel.h> | |
5274cd68 | 30 | #include <linux/lockdep.h> |
1e2c2a4f | 31 | #include <linux/netdevice.h> |
1e2c2a4f SE |
32 | #include <linux/skbuff.h> |
33 | #include <linux/slab.h> | |
34 | #include <linux/spinlock.h> | |
35 | #include <linux/string.h> | |
fec149f5 | 36 | #include <uapi/linux/batadv_packet.h> |
1e2c2a4f SE |
37 | |
38 | #include "hard-interface.h" | |
610bfc6b MH |
39 | #include "originator.h" |
40 | #include "routing.h" | |
1e2c2a4f | 41 | #include "send.h" |
610bfc6b MH |
42 | #include "soft-interface.h" |
43 | ||
610bfc6b | 44 | /** |
7e9a8c2c | 45 | * batadv_frag_clear_chain() - delete entries in the fragment buffer chain |
610bfc6b | 46 | * @head: head of chain with entries. |
bd687fe4 | 47 | * @dropped: whether the chain is cleared because all fragments are dropped |
610bfc6b MH |
48 | * |
49 | * Free fragments in the passed hlist. Should be called with appropriate lock. | |
50 | */ | |
bd687fe4 | 51 | static void batadv_frag_clear_chain(struct hlist_head *head, bool dropped) |
610bfc6b MH |
52 | { |
53 | struct batadv_frag_list_entry *entry; | |
54 | struct hlist_node *node; | |
55 | ||
56 | hlist_for_each_entry_safe(entry, node, head, list) { | |
57 | hlist_del(&entry->list); | |
bd687fe4 SE |
58 | |
59 | if (dropped) | |
60 | kfree_skb(entry->skb); | |
61 | else | |
62 | consume_skb(entry->skb); | |
63 | ||
610bfc6b MH |
64 | kfree(entry); |
65 | } | |
66 | } | |
67 | ||
68 | /** | |
7e9a8c2c | 69 | * batadv_frag_purge_orig() - free fragments associated to an orig |
610bfc6b MH |
70 | * @orig_node: originator to free fragments from |
71 | * @check_cb: optional function to tell if an entry should be purged | |
72 | */ | |
73 | void batadv_frag_purge_orig(struct batadv_orig_node *orig_node, | |
74 | bool (*check_cb)(struct batadv_frag_table_entry *)) | |
75 | { | |
76 | struct batadv_frag_table_entry *chain; | |
6b5e971a | 77 | u8 i; |
610bfc6b MH |
78 | |
79 | for (i = 0; i < BATADV_FRAG_BUFFER_COUNT; i++) { | |
80 | chain = &orig_node->fragments[i]; | |
01f6b5c7 | 81 | spin_lock_bh(&chain->lock); |
610bfc6b MH |
82 | |
83 | if (!check_cb || check_cb(chain)) { | |
bd687fe4 | 84 | batadv_frag_clear_chain(&chain->fragment_list, true); |
01f6b5c7 | 85 | chain->size = 0; |
610bfc6b MH |
86 | } |
87 | ||
01f6b5c7 | 88 | spin_unlock_bh(&chain->lock); |
610bfc6b MH |
89 | } |
90 | } | |
91 | ||
92 | /** | |
7e9a8c2c | 93 | * batadv_frag_size_limit() - maximum possible size of packet to be fragmented |
610bfc6b | 94 | * |
62fe710f | 95 | * Return: the maximum size of payload that can be fragmented. |
610bfc6b MH |
96 | */ |
97 | static int batadv_frag_size_limit(void) | |
98 | { | |
99 | int limit = BATADV_FRAG_MAX_FRAG_SIZE; | |
100 | ||
101 | limit -= sizeof(struct batadv_frag_packet); | |
102 | limit *= BATADV_FRAG_MAX_FRAGMENTS; | |
103 | ||
104 | return limit; | |
105 | } | |
106 | ||
107 | /** | |
7e9a8c2c | 108 | * batadv_frag_init_chain() - check and prepare fragment chain for new fragment |
610bfc6b MH |
109 | * @chain: chain in fragments table to init |
110 | * @seqno: sequence number of the received fragment | |
111 | * | |
112 | * Make chain ready for a fragment with sequence number "seqno". Delete existing | |
113 | * entries if they have an "old" sequence number. | |
114 | * | |
115 | * Caller must hold chain->lock. | |
116 | * | |
62fe710f | 117 | * Return: true if chain is empty and caller can just insert the new fragment |
610bfc6b MH |
118 | * without searching for the right position. |
119 | */ | |
120 | static bool batadv_frag_init_chain(struct batadv_frag_table_entry *chain, | |
6b5e971a | 121 | u16 seqno) |
610bfc6b | 122 | { |
5274cd68 SE |
123 | lockdep_assert_held(&chain->lock); |
124 | ||
610bfc6b MH |
125 | if (chain->seqno == seqno) |
126 | return false; | |
127 | ||
176e5b77 | 128 | if (!hlist_empty(&chain->fragment_list)) |
bd687fe4 | 129 | batadv_frag_clear_chain(&chain->fragment_list, true); |
610bfc6b MH |
130 | |
131 | chain->size = 0; | |
132 | chain->seqno = seqno; | |
133 | ||
134 | return true; | |
135 | } | |
136 | ||
137 | /** | |
7e9a8c2c | 138 | * batadv_frag_insert_packet() - insert a fragment into a fragment chain |
610bfc6b MH |
139 | * @orig_node: originator that the fragment was received from |
140 | * @skb: skb to insert | |
141 | * @chain_out: list head to attach complete chains of fragments to | |
142 | * | |
143 | * Insert a new fragment into the reverse ordered chain in the right table | |
144 | * entry. The hash table entry is cleared if "old" fragments exist in it. | |
145 | * | |
62fe710f | 146 | * Return: true if skb is buffered, false on error. If the chain has all the |
610bfc6b MH |
147 | * fragments needed to merge the packet, the chain is moved to the passed head |
148 | * to avoid locking the chain in the table. | |
149 | */ | |
150 | static bool batadv_frag_insert_packet(struct batadv_orig_node *orig_node, | |
151 | struct sk_buff *skb, | |
152 | struct hlist_head *chain_out) | |
153 | { | |
154 | struct batadv_frag_table_entry *chain; | |
155 | struct batadv_frag_list_entry *frag_entry_new = NULL, *frag_entry_curr; | |
d9124268 | 156 | struct batadv_frag_list_entry *frag_entry_last = NULL; |
610bfc6b | 157 | struct batadv_frag_packet *frag_packet; |
6b5e971a SE |
158 | u8 bucket; |
159 | u16 seqno, hdr_size = sizeof(struct batadv_frag_packet); | |
610bfc6b MH |
160 | bool ret = false; |
161 | ||
162 | /* Linearize packet to avoid linearizing 16 packets in a row when doing | |
163 | * the later merge. Non-linear merge should be added to remove this | |
164 | * linearization. | |
165 | */ | |
166 | if (skb_linearize(skb) < 0) | |
167 | goto err; | |
168 | ||
169 | frag_packet = (struct batadv_frag_packet *)skb->data; | |
170 | seqno = ntohs(frag_packet->seqno); | |
171 | bucket = seqno % BATADV_FRAG_BUFFER_COUNT; | |
172 | ||
173 | frag_entry_new = kmalloc(sizeof(*frag_entry_new), GFP_ATOMIC); | |
174 | if (!frag_entry_new) | |
175 | goto err; | |
176 | ||
177 | frag_entry_new->skb = skb; | |
178 | frag_entry_new->no = frag_packet->no; | |
179 | ||
180 | /* Select entry in the "chain table" and delete any prior fragments | |
181 | * with another sequence number. batadv_frag_init_chain() returns true, | |
182 | * if the list is empty at return. | |
183 | */ | |
184 | chain = &orig_node->fragments[bucket]; | |
185 | spin_lock_bh(&chain->lock); | |
186 | if (batadv_frag_init_chain(chain, seqno)) { | |
176e5b77 | 187 | hlist_add_head(&frag_entry_new->list, &chain->fragment_list); |
610bfc6b MH |
188 | chain->size = skb->len - hdr_size; |
189 | chain->timestamp = jiffies; | |
53e77145 | 190 | chain->total_size = ntohs(frag_packet->total_size); |
610bfc6b MH |
191 | ret = true; |
192 | goto out; | |
193 | } | |
194 | ||
195 | /* Find the position for the new fragment. */ | |
176e5b77 | 196 | hlist_for_each_entry(frag_entry_curr, &chain->fragment_list, list) { |
610bfc6b MH |
197 | /* Drop packet if fragment already exists. */ |
198 | if (frag_entry_curr->no == frag_entry_new->no) | |
199 | goto err_unlock; | |
200 | ||
201 | /* Order fragments from highest to lowest. */ | |
202 | if (frag_entry_curr->no < frag_entry_new->no) { | |
203 | hlist_add_before(&frag_entry_new->list, | |
204 | &frag_entry_curr->list); | |
205 | chain->size += skb->len - hdr_size; | |
206 | chain->timestamp = jiffies; | |
207 | ret = true; | |
208 | goto out; | |
209 | } | |
d9124268 SE |
210 | |
211 | /* store current entry because it could be the last in list */ | |
212 | frag_entry_last = frag_entry_curr; | |
610bfc6b MH |
213 | } |
214 | ||
d9124268 SE |
215 | /* Reached the end of the list, so insert after 'frag_entry_last'. */ |
216 | if (likely(frag_entry_last)) { | |
e050dbeb | 217 | hlist_add_behind(&frag_entry_new->list, &frag_entry_last->list); |
610bfc6b MH |
218 | chain->size += skb->len - hdr_size; |
219 | chain->timestamp = jiffies; | |
220 | ret = true; | |
221 | } | |
222 | ||
223 | out: | |
224 | if (chain->size > batadv_frag_size_limit() || | |
53e77145 SE |
225 | chain->total_size != ntohs(frag_packet->total_size) || |
226 | chain->total_size > batadv_frag_size_limit()) { | |
610bfc6b | 227 | /* Clear chain if total size of either the list or the packet |
53e77145 SE |
228 | * exceeds the maximum size of one merged packet. Don't allow |
229 | * packets to have different total_size. | |
610bfc6b | 230 | */ |
bd687fe4 | 231 | batadv_frag_clear_chain(&chain->fragment_list, true); |
610bfc6b MH |
232 | chain->size = 0; |
233 | } else if (ntohs(frag_packet->total_size) == chain->size) { | |
234 | /* All fragments received. Hand over chain to caller. */ | |
176e5b77 | 235 | hlist_move_list(&chain->fragment_list, chain_out); |
610bfc6b MH |
236 | chain->size = 0; |
237 | } | |
238 | ||
239 | err_unlock: | |
240 | spin_unlock_bh(&chain->lock); | |
241 | ||
242 | err: | |
248e23b5 | 243 | if (!ret) { |
610bfc6b | 244 | kfree(frag_entry_new); |
248e23b5 SE |
245 | kfree_skb(skb); |
246 | } | |
610bfc6b MH |
247 | |
248 | return ret; | |
249 | } | |
250 | ||
251 | /** | |
7e9a8c2c | 252 | * batadv_frag_merge_packets() - merge a chain of fragments |
610bfc6b | 253 | * @chain: head of chain with fragments |
610bfc6b MH |
254 | * |
255 | * Expand the first skb in the chain and copy the content of the remaining | |
256 | * skb's into the expanded one. After doing so, clear the chain. | |
257 | * | |
62fe710f | 258 | * Return: the merged skb or NULL on error. |
610bfc6b MH |
259 | */ |
260 | static struct sk_buff * | |
83e8b877 | 261 | batadv_frag_merge_packets(struct hlist_head *chain) |
610bfc6b MH |
262 | { |
263 | struct batadv_frag_packet *packet; | |
264 | struct batadv_frag_list_entry *entry; | |
422d2f77 | 265 | struct sk_buff *skb_out; |
610bfc6b | 266 | int size, hdr_size = sizeof(struct batadv_frag_packet); |
bd687fe4 | 267 | bool dropped = false; |
610bfc6b | 268 | |
610bfc6b MH |
269 | /* Remove first entry, as this is the destination for the rest of the |
270 | * fragments. | |
271 | */ | |
272 | entry = hlist_entry(chain->first, struct batadv_frag_list_entry, list); | |
273 | hlist_del(&entry->list); | |
274 | skb_out = entry->skb; | |
275 | kfree(entry); | |
276 | ||
83e8b877 | 277 | packet = (struct batadv_frag_packet *)skb_out->data; |
d7d8bbb4 | 278 | size = ntohs(packet->total_size) + hdr_size; |
83e8b877 | 279 | |
610bfc6b | 280 | /* Make room for the rest of the fragments. */ |
5b6698b0 | 281 | if (pskb_expand_head(skb_out, 0, size - skb_out->len, GFP_ATOMIC) < 0) { |
610bfc6b MH |
282 | kfree_skb(skb_out); |
283 | skb_out = NULL; | |
bd687fe4 | 284 | dropped = true; |
610bfc6b MH |
285 | goto free; |
286 | } | |
287 | ||
288 | /* Move the existing MAC header to just before the payload. (Override | |
289 | * the fragment header.) | |
290 | */ | |
3bf2a09d MS |
291 | skb_pull(skb_out, hdr_size); |
292 | skb_out->ip_summed = CHECKSUM_NONE; | |
610bfc6b MH |
293 | memmove(skb_out->data - ETH_HLEN, skb_mac_header(skb_out), ETH_HLEN); |
294 | skb_set_mac_header(skb_out, -ETH_HLEN); | |
295 | skb_reset_network_header(skb_out); | |
296 | skb_reset_transport_header(skb_out); | |
297 | ||
298 | /* Copy the payload of the each fragment into the last skb */ | |
299 | hlist_for_each_entry(entry, chain, list) { | |
300 | size = entry->skb->len - hdr_size; | |
59ae1d12 | 301 | skb_put_data(skb_out, entry->skb->data + hdr_size, size); |
610bfc6b MH |
302 | } |
303 | ||
304 | free: | |
305 | /* Locking is not needed, because 'chain' is not part of any orig. */ | |
bd687fe4 | 306 | batadv_frag_clear_chain(chain, dropped); |
610bfc6b MH |
307 | return skb_out; |
308 | } | |
309 | ||
310 | /** | |
7e9a8c2c | 311 | * batadv_frag_skb_buffer() - buffer fragment for later merge |
610bfc6b MH |
312 | * @skb: skb to buffer |
313 | * @orig_node_src: originator that the skb is received from | |
314 | * | |
315 | * Add fragment to buffer and merge fragments if possible. | |
316 | * | |
317 | * There are three possible outcomes: 1) Packet is merged: Return true and | |
318 | * set *skb to merged packet; 2) Packet is buffered: Return true and set *skb | |
248e23b5 | 319 | * to NULL; 3) Error: Return false and free skb. |
62fe710f SE |
320 | * |
321 | * Return: true when packet is merged or buffered, false when skb is not not | |
322 | * used. | |
610bfc6b MH |
323 | */ |
324 | bool batadv_frag_skb_buffer(struct sk_buff **skb, | |
325 | struct batadv_orig_node *orig_node_src) | |
326 | { | |
327 | struct sk_buff *skb_out = NULL; | |
328 | struct hlist_head head = HLIST_HEAD_INIT; | |
329 | bool ret = false; | |
330 | ||
331 | /* Add packet to buffer and table entry if merge is possible. */ | |
332 | if (!batadv_frag_insert_packet(orig_node_src, *skb, &head)) | |
333 | goto out_err; | |
334 | ||
335 | /* Leave if more fragments are needed to merge. */ | |
336 | if (hlist_empty(&head)) | |
337 | goto out; | |
338 | ||
83e8b877 | 339 | skb_out = batadv_frag_merge_packets(&head); |
610bfc6b MH |
340 | if (!skb_out) |
341 | goto out_err; | |
342 | ||
343 | out: | |
610bfc6b MH |
344 | ret = true; |
345 | out_err: | |
248e23b5 | 346 | *skb = skb_out; |
610bfc6b MH |
347 | return ret; |
348 | } | |
349 | ||
350 | /** | |
7e9a8c2c | 351 | * batadv_frag_skb_fwd() - forward fragments that would exceed MTU when merged |
610bfc6b MH |
352 | * @skb: skb to forward |
353 | * @recv_if: interface that the skb is received on | |
354 | * @orig_node_src: originator that the skb is received from | |
355 | * | |
356 | * Look up the next-hop of the fragments payload and check if the merged packet | |
357 | * will exceed the MTU towards the next-hop. If so, the fragment is forwarded | |
358 | * without merging it. | |
359 | * | |
62fe710f | 360 | * Return: true if the fragment is consumed/forwarded, false otherwise. |
610bfc6b MH |
361 | */ |
362 | bool batadv_frag_skb_fwd(struct sk_buff *skb, | |
363 | struct batadv_hard_iface *recv_if, | |
364 | struct batadv_orig_node *orig_node_src) | |
365 | { | |
366 | struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface); | |
422d2f77 | 367 | struct batadv_orig_node *orig_node_dst; |
610bfc6b MH |
368 | struct batadv_neigh_node *neigh_node = NULL; |
369 | struct batadv_frag_packet *packet; | |
6b5e971a | 370 | u16 total_size; |
610bfc6b MH |
371 | bool ret = false; |
372 | ||
373 | packet = (struct batadv_frag_packet *)skb->data; | |
374 | orig_node_dst = batadv_orig_hash_find(bat_priv, packet->dest); | |
375 | if (!orig_node_dst) | |
376 | goto out; | |
377 | ||
378 | neigh_node = batadv_find_router(bat_priv, orig_node_dst, recv_if); | |
379 | if (!neigh_node) | |
380 | goto out; | |
381 | ||
382 | /* Forward the fragment, if the merged packet would be too big to | |
383 | * be assembled. | |
384 | */ | |
385 | total_size = ntohs(packet->total_size); | |
386 | if (total_size > neigh_node->if_incoming->net_dev->mtu) { | |
387 | batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_FWD); | |
388 | batadv_add_counter(bat_priv, BATADV_CNT_FRAG_FWD_BYTES, | |
389 | skb->len + ETH_HLEN); | |
390 | ||
a40d9b07 | 391 | packet->ttl--; |
95d39278 | 392 | batadv_send_unicast_skb(skb, neigh_node); |
610bfc6b MH |
393 | ret = true; |
394 | } | |
395 | ||
396 | out: | |
397 | if (orig_node_dst) | |
5d967310 | 398 | batadv_orig_node_put(orig_node_dst); |
610bfc6b | 399 | if (neigh_node) |
25bb2509 | 400 | batadv_neigh_node_put(neigh_node); |
610bfc6b MH |
401 | return ret; |
402 | } | |
ee75ed88 MH |
403 | |
404 | /** | |
7e9a8c2c | 405 | * batadv_frag_create() - create a fragment from skb |
ee75ed88 MH |
406 | * @skb: skb to create fragment from |
407 | * @frag_head: header to use in new fragment | |
1c2bcc76 | 408 | * @fragment_size: size of new fragment |
ee75ed88 MH |
409 | * |
410 | * Split the passed skb into two fragments: A new one with size matching the | |
411 | * passed mtu and the old one with the rest. The new skb contains data from the | |
412 | * tail of the old skb. | |
413 | * | |
62fe710f | 414 | * Return: the new fragment, NULL on error. |
ee75ed88 MH |
415 | */ |
416 | static struct sk_buff *batadv_frag_create(struct sk_buff *skb, | |
417 | struct batadv_frag_packet *frag_head, | |
1c2bcc76 | 418 | unsigned int fragment_size) |
ee75ed88 MH |
419 | { |
420 | struct sk_buff *skb_fragment; | |
d3abce78 | 421 | unsigned int header_size = sizeof(*frag_head); |
1c2bcc76 | 422 | unsigned int mtu = fragment_size + header_size; |
ee75ed88 MH |
423 | |
424 | skb_fragment = netdev_alloc_skb(NULL, mtu + ETH_HLEN); | |
425 | if (!skb_fragment) | |
426 | goto err; | |
427 | ||
1914848e | 428 | skb_fragment->priority = skb->priority; |
ee75ed88 MH |
429 | |
430 | /* Eat the last mtu-bytes of the skb */ | |
431 | skb_reserve(skb_fragment, header_size + ETH_HLEN); | |
432 | skb_split(skb, skb_fragment, skb->len - fragment_size); | |
433 | ||
434 | /* Add the header */ | |
435 | skb_push(skb_fragment, header_size); | |
436 | memcpy(skb_fragment->data, frag_head, header_size); | |
437 | ||
438 | err: | |
439 | return skb_fragment; | |
440 | } | |
441 | ||
442 | /** | |
7e9a8c2c | 443 | * batadv_frag_send_packet() - create up to 16 fragments from the passed skb |
ee75ed88 MH |
444 | * @skb: skb to create fragments from |
445 | * @orig_node: final destination of the created fragments | |
446 | * @neigh_node: next-hop of the created fragments | |
447 | * | |
8def0be8 | 448 | * Return: the netdev tx status or a negative errno code on a failure |
ee75ed88 | 449 | */ |
f50ca95a AQ |
450 | int batadv_frag_send_packet(struct sk_buff *skb, |
451 | struct batadv_orig_node *orig_node, | |
452 | struct batadv_neigh_node *neigh_node) | |
ee75ed88 MH |
453 | { |
454 | struct batadv_priv *bat_priv; | |
be181015 | 455 | struct batadv_hard_iface *primary_if = NULL; |
ee75ed88 MH |
456 | struct batadv_frag_packet frag_header; |
457 | struct sk_buff *skb_fragment; | |
d3abce78 SE |
458 | unsigned int mtu = neigh_node->if_incoming->net_dev->mtu; |
459 | unsigned int header_size = sizeof(frag_header); | |
1c2bcc76 | 460 | unsigned int max_fragment_size, num_fragments; |
8def0be8 | 461 | int ret; |
ee75ed88 MH |
462 | |
463 | /* To avoid merge and refragmentation at next-hops we never send | |
464 | * fragments larger than BATADV_FRAG_MAX_FRAG_SIZE | |
465 | */ | |
d3abce78 | 466 | mtu = min_t(unsigned int, mtu, BATADV_FRAG_MAX_FRAG_SIZE); |
0402e444 | 467 | max_fragment_size = mtu - header_size; |
1c2bcc76 SE |
468 | |
469 | if (skb->len == 0 || max_fragment_size == 0) | |
470 | return -EINVAL; | |
471 | ||
472 | num_fragments = (skb->len - 1) / max_fragment_size + 1; | |
473 | max_fragment_size = (skb->len - 1) / num_fragments + 1; | |
ee75ed88 MH |
474 | |
475 | /* Don't even try to fragment, if we need more than 16 fragments */ | |
1c2bcc76 | 476 | if (num_fragments > BATADV_FRAG_MAX_FRAGMENTS) { |
8def0be8 SE |
477 | ret = -EAGAIN; |
478 | goto free_skb; | |
479 | } | |
ee75ed88 MH |
480 | |
481 | bat_priv = orig_node->bat_priv; | |
482 | primary_if = batadv_primary_if_get_selected(bat_priv); | |
8def0be8 SE |
483 | if (!primary_if) { |
484 | ret = -EINVAL; | |
4ea33ef0 | 485 | goto free_skb; |
8def0be8 | 486 | } |
ee75ed88 MH |
487 | |
488 | /* Create one header to be copied to all fragments */ | |
a40d9b07 SW |
489 | frag_header.packet_type = BATADV_UNICAST_FRAG; |
490 | frag_header.version = BATADV_COMPAT_VERSION; | |
491 | frag_header.ttl = BATADV_TTL; | |
ee75ed88 MH |
492 | frag_header.seqno = htons(atomic_inc_return(&bat_priv->frag_seqno)); |
493 | frag_header.reserved = 0; | |
494 | frag_header.no = 0; | |
495 | frag_header.total_size = htons(skb->len); | |
c0f25c80 AL |
496 | |
497 | /* skb->priority values from 256->263 are magic values to | |
498 | * directly indicate a specific 802.1d priority. This is used | |
499 | * to allow 802.1d priority to be passed directly in from VLAN | |
500 | * tags, etc. | |
501 | */ | |
502 | if (skb->priority >= 256 && skb->priority <= 263) | |
503 | frag_header.priority = skb->priority - 256; | |
fe77d825 SE |
504 | else |
505 | frag_header.priority = 0; | |
c0f25c80 | 506 | |
8fdd0153 AQ |
507 | ether_addr_copy(frag_header.orig, primary_if->net_dev->dev_addr); |
508 | ether_addr_copy(frag_header.dest, orig_node->orig); | |
ee75ed88 MH |
509 | |
510 | /* Eat and send fragments from the tail of skb */ | |
511 | while (skb->len > max_fragment_size) { | |
51c6b429 LL |
512 | /* The initial check in this function should cover this case */ |
513 | if (unlikely(frag_header.no == BATADV_FRAG_MAX_FRAGMENTS - 1)) { | |
514 | ret = -EINVAL; | |
515 | goto put_primary_if; | |
516 | } | |
517 | ||
1c2bcc76 SE |
518 | skb_fragment = batadv_frag_create(skb, &frag_header, |
519 | max_fragment_size); | |
8def0be8 SE |
520 | if (!skb_fragment) { |
521 | ret = -ENOMEM; | |
4ea33ef0 | 522 | goto put_primary_if; |
8def0be8 | 523 | } |
ee75ed88 MH |
524 | |
525 | batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_TX); | |
526 | batadv_add_counter(bat_priv, BATADV_CNT_FRAG_TX_BYTES, | |
527 | skb_fragment->len + ETH_HLEN); | |
f50ca95a AQ |
528 | ret = batadv_send_unicast_skb(skb_fragment, neigh_node); |
529 | if (ret != NET_XMIT_SUCCESS) { | |
8def0be8 | 530 | ret = NET_XMIT_DROP; |
4ea33ef0 | 531 | goto put_primary_if; |
f50ca95a AQ |
532 | } |
533 | ||
ee75ed88 | 534 | frag_header.no++; |
ee75ed88 MH |
535 | } |
536 | ||
537 | /* Make room for the fragment header. */ | |
538 | if (batadv_skb_head_push(skb, header_size) < 0 || | |
8def0be8 SE |
539 | pskb_expand_head(skb, header_size + ETH_HLEN, 0, GFP_ATOMIC) < 0) { |
540 | ret = -ENOMEM; | |
4ea33ef0 | 541 | goto put_primary_if; |
8def0be8 | 542 | } |
ee75ed88 MH |
543 | |
544 | memcpy(skb->data, &frag_header, header_size); | |
545 | ||
546 | /* Send the last fragment */ | |
547 | batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_TX); | |
548 | batadv_add_counter(bat_priv, BATADV_CNT_FRAG_TX_BYTES, | |
549 | skb->len + ETH_HLEN); | |
f50ca95a | 550 | ret = batadv_send_unicast_skb(skb, neigh_node); |
8def0be8 SE |
551 | /* skb was consumed */ |
552 | skb = NULL; | |
ee75ed88 | 553 | |
8def0be8 SE |
554 | put_primary_if: |
555 | batadv_hardif_put(primary_if); | |
556 | free_skb: | |
557 | kfree_skb(skb); | |
be181015 AQ |
558 | |
559 | return ret; | |
ee75ed88 | 560 | } |