fragmentation.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491
  1. /* Copyright (C) 2013 B.A.T.M.A.N. contributors:
  2. *
  3. * Martin Hundebøll <martin@hundeboll.net>
  4. *
  5. * This program is free software; you can redistribute it and/or
  6. * modify it under the terms of version 2 of the GNU General Public
  7. * License as published by the Free Software Foundation.
  8. *
  9. * This program is distributed in the hope that it will be useful, but
  10. * WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  12. * General Public License for more details.
  13. *
  14. * You should have received a copy of the GNU General Public License
  15. * along with this program; if not, write to the Free Software
  16. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
  17. * 02110-1301, USA
  18. */
  19. #include "main.h"
  20. #include "fragmentation.h"
  21. #include "send.h"
  22. #include "originator.h"
  23. #include "routing.h"
  24. #include "hard-interface.h"
  25. #include "soft-interface.h"
  26. /**
  27. * batadv_frag_clear_chain - delete entries in the fragment buffer chain
  28. * @head: head of chain with entries.
  29. *
  30. * Free fragments in the passed hlist. Should be called with appropriate lock.
  31. */
  32. static void batadv_frag_clear_chain(struct hlist_head *head)
  33. {
  34. struct batadv_frag_list_entry *entry;
  35. struct hlist_node *node;
  36. hlist_for_each_entry_safe(entry, node, head, list) {
  37. hlist_del(&entry->list);
  38. kfree_skb(entry->skb);
  39. kfree(entry);
  40. }
  41. }
  42. /**
  43. * batadv_frag_purge_orig - free fragments associated to an orig
  44. * @orig_node: originator to free fragments from
  45. * @check_cb: optional function to tell if an entry should be purged
  46. */
  47. void batadv_frag_purge_orig(struct batadv_orig_node *orig_node,
  48. bool (*check_cb)(struct batadv_frag_table_entry *))
  49. {
  50. struct batadv_frag_table_entry *chain;
  51. uint8_t i;
  52. for (i = 0; i < BATADV_FRAG_BUFFER_COUNT; i++) {
  53. chain = &orig_node->fragments[i];
  54. spin_lock_bh(&orig_node->fragments[i].lock);
  55. if (!check_cb || check_cb(chain)) {
  56. batadv_frag_clear_chain(&orig_node->fragments[i].head);
  57. orig_node->fragments[i].size = 0;
  58. }
  59. spin_unlock_bh(&orig_node->fragments[i].lock);
  60. }
  61. }
  62. /**
  63. * batadv_frag_size_limit - maximum possible size of packet to be fragmented
  64. *
  65. * Returns the maximum size of payload that can be fragmented.
  66. */
  67. static int batadv_frag_size_limit(void)
  68. {
  69. int limit = BATADV_FRAG_MAX_FRAG_SIZE;
  70. limit -= sizeof(struct batadv_frag_packet);
  71. limit *= BATADV_FRAG_MAX_FRAGMENTS;
  72. return limit;
  73. }
  74. /**
  75. * batadv_frag_init_chain - check and prepare fragment chain for new fragment
  76. * @chain: chain in fragments table to init
  77. * @seqno: sequence number of the received fragment
  78. *
  79. * Make chain ready for a fragment with sequence number "seqno". Delete existing
  80. * entries if they have an "old" sequence number.
  81. *
  82. * Caller must hold chain->lock.
  83. *
  84. * Returns true if chain is empty and caller can just insert the new fragment
  85. * without searching for the right position.
  86. */
  87. static bool batadv_frag_init_chain(struct batadv_frag_table_entry *chain,
  88. uint16_t seqno)
  89. {
  90. if (chain->seqno == seqno)
  91. return false;
  92. if (!hlist_empty(&chain->head))
  93. batadv_frag_clear_chain(&chain->head);
  94. chain->size = 0;
  95. chain->seqno = seqno;
  96. return true;
  97. }
  98. /**
  99. * batadv_frag_insert_packet - insert a fragment into a fragment chain
  100. * @orig_node: originator that the fragment was received from
  101. * @skb: skb to insert
  102. * @chain_out: list head to attach complete chains of fragments to
  103. *
  104. * Insert a new fragment into the reverse ordered chain in the right table
  105. * entry. The hash table entry is cleared if "old" fragments exist in it.
  106. *
  107. * Returns true if skb is buffered, false on error. If the chain has all the
  108. * fragments needed to merge the packet, the chain is moved to the passed head
  109. * to avoid locking the chain in the table.
  110. */
  111. static bool batadv_frag_insert_packet(struct batadv_orig_node *orig_node,
  112. struct sk_buff *skb,
  113. struct hlist_head *chain_out)
  114. {
  115. struct batadv_frag_table_entry *chain;
  116. struct batadv_frag_list_entry *frag_entry_new = NULL, *frag_entry_curr;
  117. struct batadv_frag_packet *frag_packet;
  118. uint8_t bucket;
  119. uint16_t seqno, hdr_size = sizeof(struct batadv_frag_packet);
  120. bool ret = false;
  121. /* Linearize packet to avoid linearizing 16 packets in a row when doing
  122. * the later merge. Non-linear merge should be added to remove this
  123. * linearization.
  124. */
  125. if (skb_linearize(skb) < 0)
  126. goto err;
  127. frag_packet = (struct batadv_frag_packet *)skb->data;
  128. seqno = ntohs(frag_packet->seqno);
  129. bucket = seqno % BATADV_FRAG_BUFFER_COUNT;
  130. frag_entry_new = kmalloc(sizeof(*frag_entry_new), GFP_ATOMIC);
  131. if (!frag_entry_new)
  132. goto err;
  133. frag_entry_new->skb = skb;
  134. frag_entry_new->no = frag_packet->no;
  135. /* Select entry in the "chain table" and delete any prior fragments
  136. * with another sequence number. batadv_frag_init_chain() returns true,
  137. * if the list is empty at return.
  138. */
  139. chain = &orig_node->fragments[bucket];
  140. spin_lock_bh(&chain->lock);
  141. if (batadv_frag_init_chain(chain, seqno)) {
  142. hlist_add_head(&frag_entry_new->list, &chain->head);
  143. chain->size = skb->len - hdr_size;
  144. chain->timestamp = jiffies;
  145. ret = true;
  146. goto out;
  147. }
  148. /* Find the position for the new fragment. */
  149. hlist_for_each_entry(frag_entry_curr, &chain->head, list) {
  150. /* Drop packet if fragment already exists. */
  151. if (frag_entry_curr->no == frag_entry_new->no)
  152. goto err_unlock;
  153. /* Order fragments from highest to lowest. */
  154. if (frag_entry_curr->no < frag_entry_new->no) {
  155. hlist_add_before(&frag_entry_new->list,
  156. &frag_entry_curr->list);
  157. chain->size += skb->len - hdr_size;
  158. chain->timestamp = jiffies;
  159. ret = true;
  160. goto out;
  161. }
  162. }
  163. /* Reached the end of the list, so insert after 'frag_entry_curr'. */
  164. if (likely(frag_entry_curr)) {
  165. hlist_add_after(&frag_entry_curr->list, &frag_entry_new->list);
  166. chain->size += skb->len - hdr_size;
  167. chain->timestamp = jiffies;
  168. ret = true;
  169. }
  170. out:
  171. if (chain->size > batadv_frag_size_limit() ||
  172. ntohs(frag_packet->total_size) > batadv_frag_size_limit()) {
  173. /* Clear chain if total size of either the list or the packet
  174. * exceeds the maximum size of one merged packet.
  175. */
  176. batadv_frag_clear_chain(&chain->head);
  177. chain->size = 0;
  178. } else if (ntohs(frag_packet->total_size) == chain->size) {
  179. /* All fragments received. Hand over chain to caller. */
  180. hlist_move_list(&chain->head, chain_out);
  181. chain->size = 0;
  182. }
  183. err_unlock:
  184. spin_unlock_bh(&chain->lock);
  185. err:
  186. if (!ret)
  187. kfree(frag_entry_new);
  188. return ret;
  189. }
  190. /**
  191. * batadv_frag_merge_packets - merge a chain of fragments
  192. * @chain: head of chain with fragments
  193. * @skb: packet with total size of skb after merging
  194. *
  195. * Expand the first skb in the chain and copy the content of the remaining
  196. * skb's into the expanded one. After doing so, clear the chain.
  197. *
  198. * Returns the merged skb or NULL on error.
  199. */
  200. static struct sk_buff *
  201. batadv_frag_merge_packets(struct hlist_head *chain, struct sk_buff *skb)
  202. {
  203. struct batadv_frag_packet *packet;
  204. struct batadv_frag_list_entry *entry;
  205. struct sk_buff *skb_out = NULL;
  206. int size, hdr_size = sizeof(struct batadv_frag_packet);
  207. /* Make sure incoming skb has non-bogus data. */
  208. packet = (struct batadv_frag_packet *)skb->data;
  209. size = ntohs(packet->total_size);
  210. if (size > batadv_frag_size_limit())
  211. goto free;
  212. /* Remove first entry, as this is the destination for the rest of the
  213. * fragments.
  214. */
  215. entry = hlist_entry(chain->first, struct batadv_frag_list_entry, list);
  216. hlist_del(&entry->list);
  217. skb_out = entry->skb;
  218. kfree(entry);
  219. /* Make room for the rest of the fragments. */
  220. if (pskb_expand_head(skb_out, 0, size - skb->len, GFP_ATOMIC) < 0) {
  221. kfree_skb(skb_out);
  222. skb_out = NULL;
  223. goto free;
  224. }
  225. /* Move the existing MAC header to just before the payload. (Override
  226. * the fragment header.)
  227. */
  228. skb_pull_rcsum(skb_out, hdr_size);
  229. memmove(skb_out->data - ETH_HLEN, skb_mac_header(skb_out), ETH_HLEN);
  230. skb_set_mac_header(skb_out, -ETH_HLEN);
  231. skb_reset_network_header(skb_out);
  232. skb_reset_transport_header(skb_out);
  233. /* Copy the payload of the each fragment into the last skb */
  234. hlist_for_each_entry(entry, chain, list) {
  235. size = entry->skb->len - hdr_size;
  236. memcpy(skb_put(skb_out, size), entry->skb->data + hdr_size,
  237. size);
  238. }
  239. free:
  240. /* Locking is not needed, because 'chain' is not part of any orig. */
  241. batadv_frag_clear_chain(chain);
  242. return skb_out;
  243. }
  244. /**
  245. * batadv_frag_skb_buffer - buffer fragment for later merge
  246. * @skb: skb to buffer
  247. * @orig_node_src: originator that the skb is received from
  248. *
  249. * Add fragment to buffer and merge fragments if possible.
  250. *
  251. * There are three possible outcomes: 1) Packet is merged: Return true and
  252. * set *skb to merged packet; 2) Packet is buffered: Return true and set *skb
  253. * to NULL; 3) Error: Return false and leave skb as is.
  254. */
  255. bool batadv_frag_skb_buffer(struct sk_buff **skb,
  256. struct batadv_orig_node *orig_node_src)
  257. {
  258. struct sk_buff *skb_out = NULL;
  259. struct hlist_head head = HLIST_HEAD_INIT;
  260. bool ret = false;
  261. /* Add packet to buffer and table entry if merge is possible. */
  262. if (!batadv_frag_insert_packet(orig_node_src, *skb, &head))
  263. goto out_err;
  264. /* Leave if more fragments are needed to merge. */
  265. if (hlist_empty(&head))
  266. goto out;
  267. skb_out = batadv_frag_merge_packets(&head, *skb);
  268. if (!skb_out)
  269. goto out_err;
  270. out:
  271. *skb = skb_out;
  272. ret = true;
  273. out_err:
  274. return ret;
  275. }
  276. /**
  277. * batadv_frag_skb_fwd - forward fragments that would exceed MTU when merged
  278. * @skb: skb to forward
  279. * @recv_if: interface that the skb is received on
  280. * @orig_node_src: originator that the skb is received from
  281. *
  282. * Look up the next-hop of the fragments payload and check if the merged packet
  283. * will exceed the MTU towards the next-hop. If so, the fragment is forwarded
  284. * without merging it.
  285. *
  286. * Returns true if the fragment is consumed/forwarded, false otherwise.
  287. */
  288. bool batadv_frag_skb_fwd(struct sk_buff *skb,
  289. struct batadv_hard_iface *recv_if,
  290. struct batadv_orig_node *orig_node_src)
  291. {
  292. struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
  293. struct batadv_orig_node *orig_node_dst = NULL;
  294. struct batadv_neigh_node *neigh_node = NULL;
  295. struct batadv_frag_packet *packet;
  296. uint16_t total_size;
  297. bool ret = false;
  298. packet = (struct batadv_frag_packet *)skb->data;
  299. orig_node_dst = batadv_orig_hash_find(bat_priv, packet->dest);
  300. if (!orig_node_dst)
  301. goto out;
  302. neigh_node = batadv_find_router(bat_priv, orig_node_dst, recv_if);
  303. if (!neigh_node)
  304. goto out;
  305. /* Forward the fragment, if the merged packet would be too big to
  306. * be assembled.
  307. */
  308. total_size = ntohs(packet->total_size);
  309. if (total_size > neigh_node->if_incoming->net_dev->mtu) {
  310. batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_FWD);
  311. batadv_add_counter(bat_priv, BATADV_CNT_FRAG_FWD_BYTES,
  312. skb->len + ETH_HLEN);
  313. packet->header.ttl--;
  314. batadv_send_skb_packet(skb, neigh_node->if_incoming,
  315. neigh_node->addr);
  316. ret = true;
  317. }
  318. out:
  319. if (orig_node_dst)
  320. batadv_orig_node_free_ref(orig_node_dst);
  321. if (neigh_node)
  322. batadv_neigh_node_free_ref(neigh_node);
  323. return ret;
  324. }
  325. /**
  326. * batadv_frag_create - create a fragment from skb
  327. * @skb: skb to create fragment from
  328. * @frag_head: header to use in new fragment
  329. * @mtu: size of new fragment
  330. *
  331. * Split the passed skb into two fragments: A new one with size matching the
  332. * passed mtu and the old one with the rest. The new skb contains data from the
  333. * tail of the old skb.
  334. *
  335. * Returns the new fragment, NULL on error.
  336. */
  337. static struct sk_buff *batadv_frag_create(struct sk_buff *skb,
  338. struct batadv_frag_packet *frag_head,
  339. unsigned int mtu)
  340. {
  341. struct sk_buff *skb_fragment;
  342. unsigned header_size = sizeof(*frag_head);
  343. unsigned fragment_size = mtu - header_size;
  344. skb_fragment = netdev_alloc_skb(NULL, mtu + ETH_HLEN);
  345. if (!skb_fragment)
  346. goto err;
  347. skb->priority = TC_PRIO_CONTROL;
  348. /* Eat the last mtu-bytes of the skb */
  349. skb_reserve(skb_fragment, header_size + ETH_HLEN);
  350. skb_split(skb, skb_fragment, skb->len - fragment_size);
  351. /* Add the header */
  352. skb_push(skb_fragment, header_size);
  353. memcpy(skb_fragment->data, frag_head, header_size);
  354. err:
  355. return skb_fragment;
  356. }
  357. /**
  358. * batadv_frag_send_packet - create up to 16 fragments from the passed skb
  359. * @skb: skb to create fragments from
  360. * @orig_node: final destination of the created fragments
  361. * @neigh_node: next-hop of the created fragments
  362. *
  363. * Returns true on success, false otherwise.
  364. */
  365. bool batadv_frag_send_packet(struct sk_buff *skb,
  366. struct batadv_orig_node *orig_node,
  367. struct batadv_neigh_node *neigh_node)
  368. {
  369. struct batadv_priv *bat_priv;
  370. struct batadv_hard_iface *primary_if;
  371. struct batadv_frag_packet frag_header;
  372. struct sk_buff *skb_fragment;
  373. unsigned mtu = neigh_node->if_incoming->net_dev->mtu;
  374. unsigned header_size = sizeof(frag_header);
  375. unsigned max_fragment_size, max_packet_size;
  376. /* To avoid merge and refragmentation at next-hops we never send
  377. * fragments larger than BATADV_FRAG_MAX_FRAG_SIZE
  378. */
  379. mtu = min_t(unsigned, mtu, BATADV_FRAG_MAX_FRAG_SIZE);
  380. max_fragment_size = (mtu - header_size - ETH_HLEN);
  381. max_packet_size = max_fragment_size * BATADV_FRAG_MAX_FRAGMENTS;
  382. /* Don't even try to fragment, if we need more than 16 fragments */
  383. if (skb->len > max_packet_size)
  384. goto out_err;
  385. bat_priv = orig_node->bat_priv;
  386. primary_if = batadv_primary_if_get_selected(bat_priv);
  387. if (!primary_if)
  388. goto out_err;
  389. /* Create one header to be copied to all fragments */
  390. frag_header.header.packet_type = BATADV_UNICAST_FRAG;
  391. frag_header.header.version = BATADV_COMPAT_VERSION;
  392. frag_header.header.ttl = BATADV_TTL;
  393. frag_header.seqno = htons(atomic_inc_return(&bat_priv->frag_seqno));
  394. frag_header.reserved = 0;
  395. frag_header.no = 0;
  396. frag_header.total_size = htons(skb->len);
  397. memcpy(frag_header.orig, primary_if->net_dev->dev_addr, ETH_ALEN);
  398. memcpy(frag_header.dest, orig_node->orig, ETH_ALEN);
  399. /* Eat and send fragments from the tail of skb */
  400. while (skb->len > max_fragment_size) {
  401. skb_fragment = batadv_frag_create(skb, &frag_header, mtu);
  402. if (!skb_fragment)
  403. goto out_err;
  404. batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_TX);
  405. batadv_add_counter(bat_priv, BATADV_CNT_FRAG_TX_BYTES,
  406. skb_fragment->len + ETH_HLEN);
  407. batadv_send_skb_packet(skb_fragment, neigh_node->if_incoming,
  408. neigh_node->addr);
  409. frag_header.no++;
  410. /* The initial check in this function should cover this case */
  411. if (frag_header.no == BATADV_FRAG_MAX_FRAGMENTS - 1)
  412. goto out_err;
  413. }
  414. /* Make room for the fragment header. */
  415. if (batadv_skb_head_push(skb, header_size) < 0 ||
  416. pskb_expand_head(skb, header_size + ETH_HLEN, 0, GFP_ATOMIC) < 0)
  417. goto out_err;
  418. memcpy(skb->data, &frag_header, header_size);
  419. /* Send the last fragment */
  420. batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_TX);
  421. batadv_add_counter(bat_priv, BATADV_CNT_FRAG_TX_BYTES,
  422. skb->len + ETH_HLEN);
  423. batadv_send_skb_packet(skb, neigh_node->if_incoming, neigh_node->addr);
  424. return true;
  425. out_err:
  426. return false;
  427. }