fragmentation.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549
  1. /* Copyright (C) 2013-2016 B.A.T.M.A.N. contributors:
  2. *
  3. * Martin Hundebøll <martin@hundeboll.net>
  4. *
  5. * This program is free software; you can redistribute it and/or
  6. * modify it under the terms of version 2 of the GNU General Public
  7. * License as published by the Free Software Foundation.
  8. *
  9. * This program is distributed in the hope that it will be useful, but
  10. * WITHOUT ANY WARRANTY; without even the implied warranty of
  11. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  12. * General Public License for more details.
  13. *
  14. * You should have received a copy of the GNU General Public License
  15. * along with this program; if not, see <http://www.gnu.org/licenses/>.
  16. */
  17. #include "fragmentation.h"
  18. #include "main.h"
  19. #include <linux/atomic.h>
  20. #include <linux/byteorder/generic.h>
  21. #include <linux/errno.h>
  22. #include <linux/etherdevice.h>
  23. #include <linux/fs.h>
  24. #include <linux/if_ether.h>
  25. #include <linux/jiffies.h>
  26. #include <linux/kernel.h>
  27. #include <linux/lockdep.h>
  28. #include <linux/netdevice.h>
  29. #include <linux/skbuff.h>
  30. #include <linux/slab.h>
  31. #include <linux/spinlock.h>
  32. #include <linux/string.h>
  33. #include "hard-interface.h"
  34. #include "originator.h"
  35. #include "packet.h"
  36. #include "routing.h"
  37. #include "send.h"
  38. #include "soft-interface.h"
  39. /**
  40. * batadv_frag_clear_chain - delete entries in the fragment buffer chain
  41. * @head: head of chain with entries.
  42. * @dropped: whether the chain is cleared because all fragments are dropped
  43. *
  44. * Free fragments in the passed hlist. Should be called with appropriate lock.
  45. */
  46. static void batadv_frag_clear_chain(struct hlist_head *head, bool dropped)
  47. {
  48. struct batadv_frag_list_entry *entry;
  49. struct hlist_node *node;
  50. hlist_for_each_entry_safe(entry, node, head, list) {
  51. hlist_del(&entry->list);
  52. if (dropped)
  53. kfree_skb(entry->skb);
  54. else
  55. consume_skb(entry->skb);
  56. kfree(entry);
  57. }
  58. }
  59. /**
  60. * batadv_frag_purge_orig - free fragments associated to an orig
  61. * @orig_node: originator to free fragments from
  62. * @check_cb: optional function to tell if an entry should be purged
  63. */
  64. void batadv_frag_purge_orig(struct batadv_orig_node *orig_node,
  65. bool (*check_cb)(struct batadv_frag_table_entry *))
  66. {
  67. struct batadv_frag_table_entry *chain;
  68. u8 i;
  69. for (i = 0; i < BATADV_FRAG_BUFFER_COUNT; i++) {
  70. chain = &orig_node->fragments[i];
  71. spin_lock_bh(&chain->lock);
  72. if (!check_cb || check_cb(chain)) {
  73. batadv_frag_clear_chain(&chain->fragment_list, true);
  74. chain->size = 0;
  75. }
  76. spin_unlock_bh(&chain->lock);
  77. }
  78. }
  79. /**
  80. * batadv_frag_size_limit - maximum possible size of packet to be fragmented
  81. *
  82. * Return: the maximum size of payload that can be fragmented.
  83. */
  84. static int batadv_frag_size_limit(void)
  85. {
  86. int limit = BATADV_FRAG_MAX_FRAG_SIZE;
  87. limit -= sizeof(struct batadv_frag_packet);
  88. limit *= BATADV_FRAG_MAX_FRAGMENTS;
  89. return limit;
  90. }
  91. /**
  92. * batadv_frag_init_chain - check and prepare fragment chain for new fragment
  93. * @chain: chain in fragments table to init
  94. * @seqno: sequence number of the received fragment
  95. *
  96. * Make chain ready for a fragment with sequence number "seqno". Delete existing
  97. * entries if they have an "old" sequence number.
  98. *
  99. * Caller must hold chain->lock.
  100. *
  101. * Return: true if chain is empty and caller can just insert the new fragment
  102. * without searching for the right position.
  103. */
  104. static bool batadv_frag_init_chain(struct batadv_frag_table_entry *chain,
  105. u16 seqno)
  106. {
  107. lockdep_assert_held(&chain->lock);
  108. if (chain->seqno == seqno)
  109. return false;
  110. if (!hlist_empty(&chain->fragment_list))
  111. batadv_frag_clear_chain(&chain->fragment_list, true);
  112. chain->size = 0;
  113. chain->seqno = seqno;
  114. return true;
  115. }
  116. /**
  117. * batadv_frag_insert_packet - insert a fragment into a fragment chain
  118. * @orig_node: originator that the fragment was received from
  119. * @skb: skb to insert
  120. * @chain_out: list head to attach complete chains of fragments to
  121. *
  122. * Insert a new fragment into the reverse ordered chain in the right table
  123. * entry. The hash table entry is cleared if "old" fragments exist in it.
  124. *
  125. * Return: true if skb is buffered, false on error. If the chain has all the
  126. * fragments needed to merge the packet, the chain is moved to the passed head
  127. * to avoid locking the chain in the table.
  128. */
  129. static bool batadv_frag_insert_packet(struct batadv_orig_node *orig_node,
  130. struct sk_buff *skb,
  131. struct hlist_head *chain_out)
  132. {
  133. struct batadv_frag_table_entry *chain;
  134. struct batadv_frag_list_entry *frag_entry_new = NULL, *frag_entry_curr;
  135. struct batadv_frag_list_entry *frag_entry_last = NULL;
  136. struct batadv_frag_packet *frag_packet;
  137. u8 bucket;
  138. u16 seqno, hdr_size = sizeof(struct batadv_frag_packet);
  139. bool ret = false;
  140. /* Linearize packet to avoid linearizing 16 packets in a row when doing
  141. * the later merge. Non-linear merge should be added to remove this
  142. * linearization.
  143. */
  144. if (skb_linearize(skb) < 0)
  145. goto err;
  146. frag_packet = (struct batadv_frag_packet *)skb->data;
  147. seqno = ntohs(frag_packet->seqno);
  148. bucket = seqno % BATADV_FRAG_BUFFER_COUNT;
  149. frag_entry_new = kmalloc(sizeof(*frag_entry_new), GFP_ATOMIC);
  150. if (!frag_entry_new)
  151. goto err;
  152. frag_entry_new->skb = skb;
  153. frag_entry_new->no = frag_packet->no;
  154. /* Select entry in the "chain table" and delete any prior fragments
  155. * with another sequence number. batadv_frag_init_chain() returns true,
  156. * if the list is empty at return.
  157. */
  158. chain = &orig_node->fragments[bucket];
  159. spin_lock_bh(&chain->lock);
  160. if (batadv_frag_init_chain(chain, seqno)) {
  161. hlist_add_head(&frag_entry_new->list, &chain->fragment_list);
  162. chain->size = skb->len - hdr_size;
  163. chain->timestamp = jiffies;
  164. chain->total_size = ntohs(frag_packet->total_size);
  165. ret = true;
  166. goto out;
  167. }
  168. /* Find the position for the new fragment. */
  169. hlist_for_each_entry(frag_entry_curr, &chain->fragment_list, list) {
  170. /* Drop packet if fragment already exists. */
  171. if (frag_entry_curr->no == frag_entry_new->no)
  172. goto err_unlock;
  173. /* Order fragments from highest to lowest. */
  174. if (frag_entry_curr->no < frag_entry_new->no) {
  175. hlist_add_before(&frag_entry_new->list,
  176. &frag_entry_curr->list);
  177. chain->size += skb->len - hdr_size;
  178. chain->timestamp = jiffies;
  179. ret = true;
  180. goto out;
  181. }
  182. /* store current entry because it could be the last in list */
  183. frag_entry_last = frag_entry_curr;
  184. }
  185. /* Reached the end of the list, so insert after 'frag_entry_last'. */
  186. if (likely(frag_entry_last)) {
  187. hlist_add_behind(&frag_entry_new->list, &frag_entry_last->list);
  188. chain->size += skb->len - hdr_size;
  189. chain->timestamp = jiffies;
  190. ret = true;
  191. }
  192. out:
  193. if (chain->size > batadv_frag_size_limit() ||
  194. chain->total_size != ntohs(frag_packet->total_size) ||
  195. chain->total_size > batadv_frag_size_limit()) {
  196. /* Clear chain if total size of either the list or the packet
  197. * exceeds the maximum size of one merged packet. Don't allow
  198. * packets to have different total_size.
  199. */
  200. batadv_frag_clear_chain(&chain->fragment_list, true);
  201. chain->size = 0;
  202. } else if (ntohs(frag_packet->total_size) == chain->size) {
  203. /* All fragments received. Hand over chain to caller. */
  204. hlist_move_list(&chain->fragment_list, chain_out);
  205. chain->size = 0;
  206. }
  207. err_unlock:
  208. spin_unlock_bh(&chain->lock);
  209. err:
  210. if (!ret)
  211. kfree(frag_entry_new);
  212. return ret;
  213. }
  214. /**
  215. * batadv_frag_merge_packets - merge a chain of fragments
  216. * @chain: head of chain with fragments
  217. *
  218. * Expand the first skb in the chain and copy the content of the remaining
  219. * skb's into the expanded one. After doing so, clear the chain.
  220. *
  221. * Return: the merged skb or NULL on error.
  222. */
  223. static struct sk_buff *
  224. batadv_frag_merge_packets(struct hlist_head *chain)
  225. {
  226. struct batadv_frag_packet *packet;
  227. struct batadv_frag_list_entry *entry;
  228. struct sk_buff *skb_out;
  229. int size, hdr_size = sizeof(struct batadv_frag_packet);
  230. bool dropped = false;
  231. /* Remove first entry, as this is the destination for the rest of the
  232. * fragments.
  233. */
  234. entry = hlist_entry(chain->first, struct batadv_frag_list_entry, list);
  235. hlist_del(&entry->list);
  236. skb_out = entry->skb;
  237. kfree(entry);
  238. packet = (struct batadv_frag_packet *)skb_out->data;
  239. size = ntohs(packet->total_size);
  240. /* Make room for the rest of the fragments. */
  241. if (pskb_expand_head(skb_out, 0, size - skb_out->len, GFP_ATOMIC) < 0) {
  242. kfree_skb(skb_out);
  243. skb_out = NULL;
  244. dropped = true;
  245. goto free;
  246. }
  247. /* Move the existing MAC header to just before the payload. (Override
  248. * the fragment header.)
  249. */
  250. skb_pull_rcsum(skb_out, hdr_size);
  251. memmove(skb_out->data - ETH_HLEN, skb_mac_header(skb_out), ETH_HLEN);
  252. skb_set_mac_header(skb_out, -ETH_HLEN);
  253. skb_reset_network_header(skb_out);
  254. skb_reset_transport_header(skb_out);
  255. /* Copy the payload of the each fragment into the last skb */
  256. hlist_for_each_entry(entry, chain, list) {
  257. size = entry->skb->len - hdr_size;
  258. memcpy(skb_put(skb_out, size), entry->skb->data + hdr_size,
  259. size);
  260. }
  261. free:
  262. /* Locking is not needed, because 'chain' is not part of any orig. */
  263. batadv_frag_clear_chain(chain, dropped);
  264. return skb_out;
  265. }
  266. /**
  267. * batadv_frag_skb_buffer - buffer fragment for later merge
  268. * @skb: skb to buffer
  269. * @orig_node_src: originator that the skb is received from
  270. *
  271. * Add fragment to buffer and merge fragments if possible.
  272. *
  273. * There are three possible outcomes: 1) Packet is merged: Return true and
  274. * set *skb to merged packet; 2) Packet is buffered: Return true and set *skb
  275. * to NULL; 3) Error: Return false and leave skb as is.
  276. *
  277. * Return: true when packet is merged or buffered, false when skb is not not
  278. * used.
  279. */
  280. bool batadv_frag_skb_buffer(struct sk_buff **skb,
  281. struct batadv_orig_node *orig_node_src)
  282. {
  283. struct sk_buff *skb_out = NULL;
  284. struct hlist_head head = HLIST_HEAD_INIT;
  285. bool ret = false;
  286. /* Add packet to buffer and table entry if merge is possible. */
  287. if (!batadv_frag_insert_packet(orig_node_src, *skb, &head))
  288. goto out_err;
  289. /* Leave if more fragments are needed to merge. */
  290. if (hlist_empty(&head))
  291. goto out;
  292. skb_out = batadv_frag_merge_packets(&head);
  293. if (!skb_out)
  294. goto out_err;
  295. out:
  296. *skb = skb_out;
  297. ret = true;
  298. out_err:
  299. return ret;
  300. }
  301. /**
  302. * batadv_frag_skb_fwd - forward fragments that would exceed MTU when merged
  303. * @skb: skb to forward
  304. * @recv_if: interface that the skb is received on
  305. * @orig_node_src: originator that the skb is received from
  306. *
  307. * Look up the next-hop of the fragments payload and check if the merged packet
  308. * will exceed the MTU towards the next-hop. If so, the fragment is forwarded
  309. * without merging it.
  310. *
  311. * Return: true if the fragment is consumed/forwarded, false otherwise.
  312. */
  313. bool batadv_frag_skb_fwd(struct sk_buff *skb,
  314. struct batadv_hard_iface *recv_if,
  315. struct batadv_orig_node *orig_node_src)
  316. {
  317. struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
  318. struct batadv_orig_node *orig_node_dst;
  319. struct batadv_neigh_node *neigh_node = NULL;
  320. struct batadv_frag_packet *packet;
  321. u16 total_size;
  322. bool ret = false;
  323. packet = (struct batadv_frag_packet *)skb->data;
  324. orig_node_dst = batadv_orig_hash_find(bat_priv, packet->dest);
  325. if (!orig_node_dst)
  326. goto out;
  327. neigh_node = batadv_find_router(bat_priv, orig_node_dst, recv_if);
  328. if (!neigh_node)
  329. goto out;
  330. /* Forward the fragment, if the merged packet would be too big to
  331. * be assembled.
  332. */
  333. total_size = ntohs(packet->total_size);
  334. if (total_size > neigh_node->if_incoming->net_dev->mtu) {
  335. batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_FWD);
  336. batadv_add_counter(bat_priv, BATADV_CNT_FRAG_FWD_BYTES,
  337. skb->len + ETH_HLEN);
  338. packet->ttl--;
  339. batadv_send_unicast_skb(skb, neigh_node);
  340. ret = true;
  341. }
  342. out:
  343. if (orig_node_dst)
  344. batadv_orig_node_put(orig_node_dst);
  345. if (neigh_node)
  346. batadv_neigh_node_put(neigh_node);
  347. return ret;
  348. }
  349. /**
  350. * batadv_frag_create - create a fragment from skb
  351. * @skb: skb to create fragment from
  352. * @frag_head: header to use in new fragment
  353. * @mtu: size of new fragment
  354. *
  355. * Split the passed skb into two fragments: A new one with size matching the
  356. * passed mtu and the old one with the rest. The new skb contains data from the
  357. * tail of the old skb.
  358. *
  359. * Return: the new fragment, NULL on error.
  360. */
  361. static struct sk_buff *batadv_frag_create(struct sk_buff *skb,
  362. struct batadv_frag_packet *frag_head,
  363. unsigned int mtu)
  364. {
  365. struct sk_buff *skb_fragment;
  366. unsigned int header_size = sizeof(*frag_head);
  367. unsigned int fragment_size = mtu - header_size;
  368. skb_fragment = netdev_alloc_skb(NULL, mtu + ETH_HLEN);
  369. if (!skb_fragment)
  370. goto err;
  371. skb_fragment->priority = skb->priority;
  372. /* Eat the last mtu-bytes of the skb */
  373. skb_reserve(skb_fragment, header_size + ETH_HLEN);
  374. skb_split(skb, skb_fragment, skb->len - fragment_size);
  375. /* Add the header */
  376. skb_push(skb_fragment, header_size);
  377. memcpy(skb_fragment->data, frag_head, header_size);
  378. err:
  379. return skb_fragment;
  380. }
  381. /**
  382. * batadv_frag_send_packet - create up to 16 fragments from the passed skb
  383. * @skb: skb to create fragments from
  384. * @orig_node: final destination of the created fragments
  385. * @neigh_node: next-hop of the created fragments
  386. *
  387. * Return: the netdev tx status or a negative errno code on a failure
  388. */
  389. int batadv_frag_send_packet(struct sk_buff *skb,
  390. struct batadv_orig_node *orig_node,
  391. struct batadv_neigh_node *neigh_node)
  392. {
  393. struct batadv_priv *bat_priv;
  394. struct batadv_hard_iface *primary_if = NULL;
  395. struct batadv_frag_packet frag_header;
  396. struct sk_buff *skb_fragment;
  397. unsigned int mtu = neigh_node->if_incoming->net_dev->mtu;
  398. unsigned int header_size = sizeof(frag_header);
  399. unsigned int max_fragment_size, max_packet_size;
  400. int ret;
  401. /* To avoid merge and refragmentation at next-hops we never send
  402. * fragments larger than BATADV_FRAG_MAX_FRAG_SIZE
  403. */
  404. mtu = min_t(unsigned int, mtu, BATADV_FRAG_MAX_FRAG_SIZE);
  405. max_fragment_size = mtu - header_size;
  406. max_packet_size = max_fragment_size * BATADV_FRAG_MAX_FRAGMENTS;
  407. /* Don't even try to fragment, if we need more than 16 fragments */
  408. if (skb->len > max_packet_size) {
  409. ret = -EAGAIN;
  410. goto free_skb;
  411. }
  412. bat_priv = orig_node->bat_priv;
  413. primary_if = batadv_primary_if_get_selected(bat_priv);
  414. if (!primary_if) {
  415. ret = -EINVAL;
  416. goto put_primary_if;
  417. }
  418. /* Create one header to be copied to all fragments */
  419. frag_header.packet_type = BATADV_UNICAST_FRAG;
  420. frag_header.version = BATADV_COMPAT_VERSION;
  421. frag_header.ttl = BATADV_TTL;
  422. frag_header.seqno = htons(atomic_inc_return(&bat_priv->frag_seqno));
  423. frag_header.reserved = 0;
  424. frag_header.no = 0;
  425. frag_header.total_size = htons(skb->len);
  426. /* skb->priority values from 256->263 are magic values to
  427. * directly indicate a specific 802.1d priority. This is used
  428. * to allow 802.1d priority to be passed directly in from VLAN
  429. * tags, etc.
  430. */
  431. if (skb->priority >= 256 && skb->priority <= 263)
  432. frag_header.priority = skb->priority - 256;
  433. ether_addr_copy(frag_header.orig, primary_if->net_dev->dev_addr);
  434. ether_addr_copy(frag_header.dest, orig_node->orig);
  435. /* Eat and send fragments from the tail of skb */
  436. while (skb->len > max_fragment_size) {
  437. skb_fragment = batadv_frag_create(skb, &frag_header, mtu);
  438. if (!skb_fragment) {
  439. ret = -ENOMEM;
  440. goto free_skb;
  441. }
  442. batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_TX);
  443. batadv_add_counter(bat_priv, BATADV_CNT_FRAG_TX_BYTES,
  444. skb_fragment->len + ETH_HLEN);
  445. ret = batadv_send_unicast_skb(skb_fragment, neigh_node);
  446. if (ret != NET_XMIT_SUCCESS) {
  447. ret = NET_XMIT_DROP;
  448. goto free_skb;
  449. }
  450. frag_header.no++;
  451. /* The initial check in this function should cover this case */
  452. if (frag_header.no == BATADV_FRAG_MAX_FRAGMENTS - 1) {
  453. ret = -EINVAL;
  454. goto free_skb;
  455. }
  456. }
  457. /* Make room for the fragment header. */
  458. if (batadv_skb_head_push(skb, header_size) < 0 ||
  459. pskb_expand_head(skb, header_size + ETH_HLEN, 0, GFP_ATOMIC) < 0) {
  460. ret = -ENOMEM;
  461. goto free_skb;
  462. }
  463. memcpy(skb->data, &frag_header, header_size);
  464. /* Send the last fragment */
  465. batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_TX);
  466. batadv_add_counter(bat_priv, BATADV_CNT_FRAG_TX_BYTES,
  467. skb->len + ETH_HLEN);
  468. ret = batadv_send_unicast_skb(skb, neigh_node);
  469. /* skb was consumed */
  470. skb = NULL;
  471. put_primary_if:
  472. batadv_hardif_put(primary_if);
  473. free_skb:
  474. kfree_skb(skb);
  475. return ret;
  476. }