fragmentation.c 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561
  1. // SPDX-License-Identifier: GPL-2.0
  2. /* Copyright (C) 2013-2018 B.A.T.M.A.N. contributors:
  3. *
  4. * Martin Hundebøll <martin@hundeboll.net>
  5. *
  6. * This program is free software; you can redistribute it and/or
  7. * modify it under the terms of version 2 of the GNU General Public
  8. * License as published by the Free Software Foundation.
  9. *
  10. * This program is distributed in the hope that it will be useful, but
  11. * WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  13. * General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program; if not, see <http://www.gnu.org/licenses/>.
  17. */
  18. #include "fragmentation.h"
  19. #include "main.h"
  20. #include <linux/atomic.h>
  21. #include <linux/byteorder/generic.h>
  22. #include <linux/errno.h>
  23. #include <linux/etherdevice.h>
  24. #include <linux/gfp.h>
  25. #include <linux/if_ether.h>
  26. #include <linux/jiffies.h>
  27. #include <linux/kernel.h>
  28. #include <linux/lockdep.h>
  29. #include <linux/netdevice.h>
  30. #include <linux/skbuff.h>
  31. #include <linux/slab.h>
  32. #include <linux/spinlock.h>
  33. #include <linux/string.h>
  34. #include <uapi/linux/batadv_packet.h>
  35. #include "hard-interface.h"
  36. #include "originator.h"
  37. #include "routing.h"
  38. #include "send.h"
  39. #include "soft-interface.h"
  40. /**
  41. * batadv_frag_clear_chain() - delete entries in the fragment buffer chain
  42. * @head: head of chain with entries.
  43. * @dropped: whether the chain is cleared because all fragments are dropped
  44. *
  45. * Free fragments in the passed hlist. Should be called with appropriate lock.
  46. */
  47. static void batadv_frag_clear_chain(struct hlist_head *head, bool dropped)
  48. {
  49. struct batadv_frag_list_entry *entry;
  50. struct hlist_node *node;
  51. hlist_for_each_entry_safe(entry, node, head, list) {
  52. hlist_del(&entry->list);
  53. if (dropped)
  54. kfree_skb(entry->skb);
  55. else
  56. consume_skb(entry->skb);
  57. kfree(entry);
  58. }
  59. }
  60. /**
  61. * batadv_frag_purge_orig() - free fragments associated to an orig
  62. * @orig_node: originator to free fragments from
  63. * @check_cb: optional function to tell if an entry should be purged
  64. */
  65. void batadv_frag_purge_orig(struct batadv_orig_node *orig_node,
  66. bool (*check_cb)(struct batadv_frag_table_entry *))
  67. {
  68. struct batadv_frag_table_entry *chain;
  69. u8 i;
  70. for (i = 0; i < BATADV_FRAG_BUFFER_COUNT; i++) {
  71. chain = &orig_node->fragments[i];
  72. spin_lock_bh(&chain->lock);
  73. if (!check_cb || check_cb(chain)) {
  74. batadv_frag_clear_chain(&chain->fragment_list, true);
  75. chain->size = 0;
  76. }
  77. spin_unlock_bh(&chain->lock);
  78. }
  79. }
  80. /**
  81. * batadv_frag_size_limit() - maximum possible size of packet to be fragmented
  82. *
  83. * Return: the maximum size of payload that can be fragmented.
  84. */
  85. static int batadv_frag_size_limit(void)
  86. {
  87. int limit = BATADV_FRAG_MAX_FRAG_SIZE;
  88. limit -= sizeof(struct batadv_frag_packet);
  89. limit *= BATADV_FRAG_MAX_FRAGMENTS;
  90. return limit;
  91. }
  92. /**
  93. * batadv_frag_init_chain() - check and prepare fragment chain for new fragment
  94. * @chain: chain in fragments table to init
  95. * @seqno: sequence number of the received fragment
  96. *
  97. * Make chain ready for a fragment with sequence number "seqno". Delete existing
  98. * entries if they have an "old" sequence number.
  99. *
  100. * Caller must hold chain->lock.
  101. *
  102. * Return: true if chain is empty and caller can just insert the new fragment
  103. * without searching for the right position.
  104. */
  105. static bool batadv_frag_init_chain(struct batadv_frag_table_entry *chain,
  106. u16 seqno)
  107. {
  108. lockdep_assert_held(&chain->lock);
  109. if (chain->seqno == seqno)
  110. return false;
  111. if (!hlist_empty(&chain->fragment_list))
  112. batadv_frag_clear_chain(&chain->fragment_list, true);
  113. chain->size = 0;
  114. chain->seqno = seqno;
  115. return true;
  116. }
  117. /**
  118. * batadv_frag_insert_packet() - insert a fragment into a fragment chain
  119. * @orig_node: originator that the fragment was received from
  120. * @skb: skb to insert
  121. * @chain_out: list head to attach complete chains of fragments to
  122. *
  123. * Insert a new fragment into the reverse ordered chain in the right table
  124. * entry. The hash table entry is cleared if "old" fragments exist in it.
  125. *
  126. * Return: true if skb is buffered, false on error. If the chain has all the
  127. * fragments needed to merge the packet, the chain is moved to the passed head
  128. * to avoid locking the chain in the table.
  129. */
  130. static bool batadv_frag_insert_packet(struct batadv_orig_node *orig_node,
  131. struct sk_buff *skb,
  132. struct hlist_head *chain_out)
  133. {
  134. struct batadv_frag_table_entry *chain;
  135. struct batadv_frag_list_entry *frag_entry_new = NULL, *frag_entry_curr;
  136. struct batadv_frag_list_entry *frag_entry_last = NULL;
  137. struct batadv_frag_packet *frag_packet;
  138. u8 bucket;
  139. u16 seqno, hdr_size = sizeof(struct batadv_frag_packet);
  140. bool ret = false;
  141. /* Linearize packet to avoid linearizing 16 packets in a row when doing
  142. * the later merge. Non-linear merge should be added to remove this
  143. * linearization.
  144. */
  145. if (skb_linearize(skb) < 0)
  146. goto err;
  147. frag_packet = (struct batadv_frag_packet *)skb->data;
  148. seqno = ntohs(frag_packet->seqno);
  149. bucket = seqno % BATADV_FRAG_BUFFER_COUNT;
  150. frag_entry_new = kmalloc(sizeof(*frag_entry_new), GFP_ATOMIC);
  151. if (!frag_entry_new)
  152. goto err;
  153. frag_entry_new->skb = skb;
  154. frag_entry_new->no = frag_packet->no;
  155. /* Select entry in the "chain table" and delete any prior fragments
  156. * with another sequence number. batadv_frag_init_chain() returns true,
  157. * if the list is empty at return.
  158. */
  159. chain = &orig_node->fragments[bucket];
  160. spin_lock_bh(&chain->lock);
  161. if (batadv_frag_init_chain(chain, seqno)) {
  162. hlist_add_head(&frag_entry_new->list, &chain->fragment_list);
  163. chain->size = skb->len - hdr_size;
  164. chain->timestamp = jiffies;
  165. chain->total_size = ntohs(frag_packet->total_size);
  166. ret = true;
  167. goto out;
  168. }
  169. /* Find the position for the new fragment. */
  170. hlist_for_each_entry(frag_entry_curr, &chain->fragment_list, list) {
  171. /* Drop packet if fragment already exists. */
  172. if (frag_entry_curr->no == frag_entry_new->no)
  173. goto err_unlock;
  174. /* Order fragments from highest to lowest. */
  175. if (frag_entry_curr->no < frag_entry_new->no) {
  176. hlist_add_before(&frag_entry_new->list,
  177. &frag_entry_curr->list);
  178. chain->size += skb->len - hdr_size;
  179. chain->timestamp = jiffies;
  180. ret = true;
  181. goto out;
  182. }
  183. /* store current entry because it could be the last in list */
  184. frag_entry_last = frag_entry_curr;
  185. }
  186. /* Reached the end of the list, so insert after 'frag_entry_last'. */
  187. if (likely(frag_entry_last)) {
  188. hlist_add_behind(&frag_entry_new->list, &frag_entry_last->list);
  189. chain->size += skb->len - hdr_size;
  190. chain->timestamp = jiffies;
  191. ret = true;
  192. }
  193. out:
  194. if (chain->size > batadv_frag_size_limit() ||
  195. chain->total_size != ntohs(frag_packet->total_size) ||
  196. chain->total_size > batadv_frag_size_limit()) {
  197. /* Clear chain if total size of either the list or the packet
  198. * exceeds the maximum size of one merged packet. Don't allow
  199. * packets to have different total_size.
  200. */
  201. batadv_frag_clear_chain(&chain->fragment_list, true);
  202. chain->size = 0;
  203. } else if (ntohs(frag_packet->total_size) == chain->size) {
  204. /* All fragments received. Hand over chain to caller. */
  205. hlist_move_list(&chain->fragment_list, chain_out);
  206. chain->size = 0;
  207. }
  208. err_unlock:
  209. spin_unlock_bh(&chain->lock);
  210. err:
  211. if (!ret) {
  212. kfree(frag_entry_new);
  213. kfree_skb(skb);
  214. }
  215. return ret;
  216. }
  217. /**
  218. * batadv_frag_merge_packets() - merge a chain of fragments
  219. * @chain: head of chain with fragments
  220. *
  221. * Expand the first skb in the chain and copy the content of the remaining
  222. * skb's into the expanded one. After doing so, clear the chain.
  223. *
  224. * Return: the merged skb or NULL on error.
  225. */
  226. static struct sk_buff *
  227. batadv_frag_merge_packets(struct hlist_head *chain)
  228. {
  229. struct batadv_frag_packet *packet;
  230. struct batadv_frag_list_entry *entry;
  231. struct sk_buff *skb_out;
  232. int size, hdr_size = sizeof(struct batadv_frag_packet);
  233. bool dropped = false;
  234. /* Remove first entry, as this is the destination for the rest of the
  235. * fragments.
  236. */
  237. entry = hlist_entry(chain->first, struct batadv_frag_list_entry, list);
  238. hlist_del(&entry->list);
  239. skb_out = entry->skb;
  240. kfree(entry);
  241. packet = (struct batadv_frag_packet *)skb_out->data;
  242. size = ntohs(packet->total_size) + hdr_size;
  243. /* Make room for the rest of the fragments. */
  244. if (pskb_expand_head(skb_out, 0, size - skb_out->len, GFP_ATOMIC) < 0) {
  245. kfree_skb(skb_out);
  246. skb_out = NULL;
  247. dropped = true;
  248. goto free;
  249. }
  250. /* Move the existing MAC header to just before the payload. (Override
  251. * the fragment header.)
  252. */
  253. skb_pull(skb_out, hdr_size);
  254. skb_out->ip_summed = CHECKSUM_NONE;
  255. memmove(skb_out->data - ETH_HLEN, skb_mac_header(skb_out), ETH_HLEN);
  256. skb_set_mac_header(skb_out, -ETH_HLEN);
  257. skb_reset_network_header(skb_out);
  258. skb_reset_transport_header(skb_out);
  259. /* Copy the payload of the each fragment into the last skb */
  260. hlist_for_each_entry(entry, chain, list) {
  261. size = entry->skb->len - hdr_size;
  262. skb_put_data(skb_out, entry->skb->data + hdr_size, size);
  263. }
  264. free:
  265. /* Locking is not needed, because 'chain' is not part of any orig. */
  266. batadv_frag_clear_chain(chain, dropped);
  267. return skb_out;
  268. }
  269. /**
  270. * batadv_frag_skb_buffer() - buffer fragment for later merge
  271. * @skb: skb to buffer
  272. * @orig_node_src: originator that the skb is received from
  273. *
  274. * Add fragment to buffer and merge fragments if possible.
  275. *
  276. * There are three possible outcomes: 1) Packet is merged: Return true and
  277. * set *skb to merged packet; 2) Packet is buffered: Return true and set *skb
  278. * to NULL; 3) Error: Return false and free skb.
  279. *
  280. * Return: true when packet is merged or buffered, false when skb is not not
  281. * used.
  282. */
  283. bool batadv_frag_skb_buffer(struct sk_buff **skb,
  284. struct batadv_orig_node *orig_node_src)
  285. {
  286. struct sk_buff *skb_out = NULL;
  287. struct hlist_head head = HLIST_HEAD_INIT;
  288. bool ret = false;
  289. /* Add packet to buffer and table entry if merge is possible. */
  290. if (!batadv_frag_insert_packet(orig_node_src, *skb, &head))
  291. goto out_err;
  292. /* Leave if more fragments are needed to merge. */
  293. if (hlist_empty(&head))
  294. goto out;
  295. skb_out = batadv_frag_merge_packets(&head);
  296. if (!skb_out)
  297. goto out_err;
  298. out:
  299. ret = true;
  300. out_err:
  301. *skb = skb_out;
  302. return ret;
  303. }
  304. /**
  305. * batadv_frag_skb_fwd() - forward fragments that would exceed MTU when merged
  306. * @skb: skb to forward
  307. * @recv_if: interface that the skb is received on
  308. * @orig_node_src: originator that the skb is received from
  309. *
  310. * Look up the next-hop of the fragments payload and check if the merged packet
  311. * will exceed the MTU towards the next-hop. If so, the fragment is forwarded
  312. * without merging it.
  313. *
  314. * Return: true if the fragment is consumed/forwarded, false otherwise.
  315. */
  316. bool batadv_frag_skb_fwd(struct sk_buff *skb,
  317. struct batadv_hard_iface *recv_if,
  318. struct batadv_orig_node *orig_node_src)
  319. {
  320. struct batadv_priv *bat_priv = netdev_priv(recv_if->soft_iface);
  321. struct batadv_orig_node *orig_node_dst;
  322. struct batadv_neigh_node *neigh_node = NULL;
  323. struct batadv_frag_packet *packet;
  324. u16 total_size;
  325. bool ret = false;
  326. packet = (struct batadv_frag_packet *)skb->data;
  327. orig_node_dst = batadv_orig_hash_find(bat_priv, packet->dest);
  328. if (!orig_node_dst)
  329. goto out;
  330. neigh_node = batadv_find_router(bat_priv, orig_node_dst, recv_if);
  331. if (!neigh_node)
  332. goto out;
  333. /* Forward the fragment, if the merged packet would be too big to
  334. * be assembled.
  335. */
  336. total_size = ntohs(packet->total_size);
  337. if (total_size > neigh_node->if_incoming->net_dev->mtu) {
  338. batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_FWD);
  339. batadv_add_counter(bat_priv, BATADV_CNT_FRAG_FWD_BYTES,
  340. skb->len + ETH_HLEN);
  341. packet->ttl--;
  342. batadv_send_unicast_skb(skb, neigh_node);
  343. ret = true;
  344. }
  345. out:
  346. if (orig_node_dst)
  347. batadv_orig_node_put(orig_node_dst);
  348. if (neigh_node)
  349. batadv_neigh_node_put(neigh_node);
  350. return ret;
  351. }
  352. /**
  353. * batadv_frag_create() - create a fragment from skb
  354. * @skb: skb to create fragment from
  355. * @frag_head: header to use in new fragment
  356. * @fragment_size: size of new fragment
  357. *
  358. * Split the passed skb into two fragments: A new one with size matching the
  359. * passed mtu and the old one with the rest. The new skb contains data from the
  360. * tail of the old skb.
  361. *
  362. * Return: the new fragment, NULL on error.
  363. */
  364. static struct sk_buff *batadv_frag_create(struct sk_buff *skb,
  365. struct batadv_frag_packet *frag_head,
  366. unsigned int fragment_size)
  367. {
  368. struct sk_buff *skb_fragment;
  369. unsigned int header_size = sizeof(*frag_head);
  370. unsigned int mtu = fragment_size + header_size;
  371. skb_fragment = netdev_alloc_skb(NULL, mtu + ETH_HLEN);
  372. if (!skb_fragment)
  373. goto err;
  374. skb_fragment->priority = skb->priority;
  375. /* Eat the last mtu-bytes of the skb */
  376. skb_reserve(skb_fragment, header_size + ETH_HLEN);
  377. skb_split(skb, skb_fragment, skb->len - fragment_size);
  378. /* Add the header */
  379. skb_push(skb_fragment, header_size);
  380. memcpy(skb_fragment->data, frag_head, header_size);
  381. err:
  382. return skb_fragment;
  383. }
  384. /**
  385. * batadv_frag_send_packet() - create up to 16 fragments from the passed skb
  386. * @skb: skb to create fragments from
  387. * @orig_node: final destination of the created fragments
  388. * @neigh_node: next-hop of the created fragments
  389. *
  390. * Return: the netdev tx status or a negative errno code on a failure
  391. */
  392. int batadv_frag_send_packet(struct sk_buff *skb,
  393. struct batadv_orig_node *orig_node,
  394. struct batadv_neigh_node *neigh_node)
  395. {
  396. struct batadv_priv *bat_priv;
  397. struct batadv_hard_iface *primary_if = NULL;
  398. struct batadv_frag_packet frag_header;
  399. struct sk_buff *skb_fragment;
  400. unsigned int mtu = neigh_node->if_incoming->net_dev->mtu;
  401. unsigned int header_size = sizeof(frag_header);
  402. unsigned int max_fragment_size, num_fragments;
  403. int ret;
  404. /* To avoid merge and refragmentation at next-hops we never send
  405. * fragments larger than BATADV_FRAG_MAX_FRAG_SIZE
  406. */
  407. mtu = min_t(unsigned int, mtu, BATADV_FRAG_MAX_FRAG_SIZE);
  408. max_fragment_size = mtu - header_size;
  409. if (skb->len == 0 || max_fragment_size == 0)
  410. return -EINVAL;
  411. num_fragments = (skb->len - 1) / max_fragment_size + 1;
  412. max_fragment_size = (skb->len - 1) / num_fragments + 1;
  413. /* Don't even try to fragment, if we need more than 16 fragments */
  414. if (num_fragments > BATADV_FRAG_MAX_FRAGMENTS) {
  415. ret = -EAGAIN;
  416. goto free_skb;
  417. }
  418. bat_priv = orig_node->bat_priv;
  419. primary_if = batadv_primary_if_get_selected(bat_priv);
  420. if (!primary_if) {
  421. ret = -EINVAL;
  422. goto free_skb;
  423. }
  424. /* Create one header to be copied to all fragments */
  425. frag_header.packet_type = BATADV_UNICAST_FRAG;
  426. frag_header.version = BATADV_COMPAT_VERSION;
  427. frag_header.ttl = BATADV_TTL;
  428. frag_header.seqno = htons(atomic_inc_return(&bat_priv->frag_seqno));
  429. frag_header.reserved = 0;
  430. frag_header.no = 0;
  431. frag_header.total_size = htons(skb->len);
  432. /* skb->priority values from 256->263 are magic values to
  433. * directly indicate a specific 802.1d priority. This is used
  434. * to allow 802.1d priority to be passed directly in from VLAN
  435. * tags, etc.
  436. */
  437. if (skb->priority >= 256 && skb->priority <= 263)
  438. frag_header.priority = skb->priority - 256;
  439. else
  440. frag_header.priority = 0;
  441. ether_addr_copy(frag_header.orig, primary_if->net_dev->dev_addr);
  442. ether_addr_copy(frag_header.dest, orig_node->orig);
  443. /* Eat and send fragments from the tail of skb */
  444. while (skb->len > max_fragment_size) {
  445. /* The initial check in this function should cover this case */
  446. if (unlikely(frag_header.no == BATADV_FRAG_MAX_FRAGMENTS - 1)) {
  447. ret = -EINVAL;
  448. goto put_primary_if;
  449. }
  450. skb_fragment = batadv_frag_create(skb, &frag_header,
  451. max_fragment_size);
  452. if (!skb_fragment) {
  453. ret = -ENOMEM;
  454. goto put_primary_if;
  455. }
  456. batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_TX);
  457. batadv_add_counter(bat_priv, BATADV_CNT_FRAG_TX_BYTES,
  458. skb_fragment->len + ETH_HLEN);
  459. ret = batadv_send_unicast_skb(skb_fragment, neigh_node);
  460. if (ret != NET_XMIT_SUCCESS) {
  461. ret = NET_XMIT_DROP;
  462. goto put_primary_if;
  463. }
  464. frag_header.no++;
  465. }
  466. /* Make room for the fragment header. */
  467. if (batadv_skb_head_push(skb, header_size) < 0 ||
  468. pskb_expand_head(skb, header_size + ETH_HLEN, 0, GFP_ATOMIC) < 0) {
  469. ret = -ENOMEM;
  470. goto put_primary_if;
  471. }
  472. memcpy(skb->data, &frag_header, header_size);
  473. /* Send the last fragment */
  474. batadv_inc_counter(bat_priv, BATADV_CNT_FRAG_TX);
  475. batadv_add_counter(bat_priv, BATADV_CNT_FRAG_TX_BYTES,
  476. skb->len + ETH_HLEN);
  477. ret = batadv_send_unicast_skb(skb, neigh_node);
  478. /* skb was consumed */
  479. skb = NULL;
  480. put_primary_if:
  481. batadv_hardif_put(primary_if);
  482. free_skb:
  483. kfree_skb(skb);
  484. return ret;
  485. }