Message ID | 20170129051428.12179-1-linus.luessing@c0d3.blue (mailing list archive) |
---|---|
State | Superseded, archived |
Delegated to: | Sven Eckelmann |
Headers |
Return-Path: <b.a.t.m.a.n-bounces@lists.open-mesh.org> X-Original-To: patchwork@open-mesh.org Delivered-To: patchwork@open-mesh.org Received: from open-mesh.org (localhost [IPv6:::1]) by open-mesh.org (Postfix) with ESMTP id 7403E8351C; Sun, 29 Jan 2017 06:15:41 +0100 (CET) Authentication-Results: open-mesh.org; dmarc=none header.from=c0d3.blue Received-SPF: None (no SPF record) identity=mailfrom; client-ip=2a01:4f8:171:314c::100:a1; helo=mail.aperture-lab.de; envelope-from=linus.luessing@c0d3.blue; receiver=b.a.t.m.a.n@lists.open-mesh.org Authentication-Results: open-mesh.org; dmarc=none header.from=c0d3.blue Received: from mail.aperture-lab.de (mail.aperture-lab.de [IPv6:2a01:4f8:171:314c::100:a1]) by open-mesh.org (Postfix) with ESMTPS id 7C50C81AC5 for <b.a.t.m.a.n@lists.open-mesh.org>; Sun, 29 Jan 2017 06:15:40 +0100 (CET) Received: from localhost (localhost [127.0.0.1]) by mail.aperture-lab.de (Postfix) with ESMTP id 97D1DE05D2; Sun, 29 Jan 2017 06:15:40 +0100 (CET) X-Virus-Scanned: Debian amavisd-new at aperture-lab.de Received: from mail.aperture-lab.de ([127.0.0.1]) by localhost (mail.aperture-lab.de [127.0.0.1]) (amavisd-new, port 10025) with ESMTP id CNwt1-CHnEmW; Sun, 29 Jan 2017 06:15:40 +0100 (CET) Received: from localhost (unknown [IPv6:2a01:170:1112:0:c85:8cff:fe0f:63fe]) (Authenticated sender: linus.luessing@c0d3.blue) by mail.aperture-lab.de (Postfix) with ESMTPSA; Sun, 29 Jan 2017 06:15:40 +0100 (CET) From: =?utf-8?q?Linus_L=C3=BCssing?= <linus.luessing@c0d3.blue> To: b.a.t.m.a.n@lists.open-mesh.org Date: Sun, 29 Jan 2017 06:14:28 +0100 Message-Id: <20170129051428.12179-1-linus.luessing@c0d3.blue> X-Mailer: git-send-email 2.11.0 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Subject: [B.A.T.M.A.N.] [PATCH] batman-adv: decrease maximum fragment size X-BeenThere: b.a.t.m.a.n@lists.open-mesh.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: The list for a Better Approach To Mobile Ad-hoc Networking <b.a.t.m.a.n.lists.open-mesh.org> List-Unsubscribe: <https://lists.open-mesh.org/mm/options/b.a.t.m.a.n>, <mailto:b.a.t.m.a.n-request@lists.open-mesh.org?subject=unsubscribe> List-Archive: <http://lists.open-mesh.org/pipermail/b.a.t.m.a.n/> List-Post: <mailto:b.a.t.m.a.n@lists.open-mesh.org> List-Help: <mailto:b.a.t.m.a.n-request@lists.open-mesh.org?subject=help> List-Subscribe: <https://lists.open-mesh.org/mm/listinfo/b.a.t.m.a.n>, <mailto:b.a.t.m.a.n-request@lists.open-mesh.org?subject=subscribe> Reply-To: The list for a Better Approach To Mobile Ad-hoc Networking <b.a.t.m.a.n@lists.open-mesh.org> Errors-To: b.a.t.m.a.n-bounces@lists.open-mesh.org Sender: "B.A.T.M.A.N" <b.a.t.m.a.n-bounces@lists.open-mesh.org> |
Commit Message
Linus Lüssing
Jan. 29, 2017, 5:14 a.m. UTC
From: Matthias Schiffer <mschiffer@universe-factory.net> With this patch the maximum fragment size is reduced from 1400 to 1280 bytes. Fragmentation v2 correctly uses the smaller of 1400 and the interface MTU, thus generally supporting interfaces with an MTU < 1400 bytes, too. However, currently "Fragmentation v2" does not support re-fragmentation. Which means that once a packet is split into two packets of 1400 + x bytes for instance and the next hop provides an interface with an even smaller MTU of 1280 bytes, then the larger fragment is lost. A maximum fragment size of 1280 bytes is a safer option as this is the minimum MTU required by IPv6, making interfaces with an MTU < 1280 rather exotic. Regarding performance, this should have no negative impact on unicast traffic: Having some more bytes in the smaller and some less in the larger does not change the sum of both fragments. Concerning TT, choosing 1280 bytes fragments might result in more TT messages than necessary when a large network is bridged into batman-adv. However, the TT overhead in general is marginal due to its reactive nature, therefore such a performance impact on TT should not be noticeable for a user. Cc: Matthias Schiffer <mschiffer@universe-factory.net> [linus.luessing@c0d3.blue: Added commit message] Signed-off-by: Linus Lüssing <linus.luessing@c0d3.blue> --- This patch is currently used in Gluon [1] because we stumbled over this issue in setups where batman-adv first fragmented to 1400 bytes for a wired, 1500B MTU connection and the larger fragment then being lost on the next hop's VPN interface with an MTU of 1280 bytes. [1]: https://github.com/freifunk-gluon/gluon/tree/master/patches/packages/routing net/batman-adv/main.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)
Comments
On Sonntag, 29. Januar 2017 06:14:28 CET Linus Lüssing wrote: [...] > However, currently "Fragmentation v2" does not support re-fragmentation. > Which means that once a packet is split into two packets of 1400 + x > bytes for instance and the next hop provides an interface with an even > smaller MTU of 1280 bytes, then the larger fragment is lost. [...] Beside this change, did you try to make the fragments more equally sized? Here is just some really ugly and untested pseudo code: @@ -454,7 +454,7 @@ int batadv_frag_send_packet(struct sk_buff *skb, struct sk_buff *skb_fragment; unsigned int mtu = neigh_node->if_incoming->net_dev->mtu; unsigned int header_size = sizeof(frag_header); - unsigned int max_fragment_size, max_packet_size; + unsigned int max_fragment_size, num_fragments; int ret; /* To avoid merge and refragmentation at next-hops we never send @@ -462,10 +462,17 @@ int batadv_frag_send_packet(struct sk_buff *skb, */ mtu = min_t(unsigned int, mtu, BATADV_FRAG_MAX_FRAG_SIZE); max_fragment_size = mtu - header_size; - max_packet_size = max_fragment_size * BATADV_FRAG_MAX_FRAGMENTS; + + if (skb->len == 0) + return -EINVAL; + +#define ceil_div(x, y) (1 + ((x - 1) / y)) + num_fragments = ceil_div(skb->len, max_fragment_size); + max_fragment_size = ceil_div(skb->len, num_fragments); +#undef ceil_div /* Don't even try to fragment, if we need more than 16 fragments */ - if (skb->len > max_packet_size) { + if (num_fragments > BATADV_FRAG_MAX_FRAGMENTS) { ret = -EAGAIN; goto free_skb; } Kind regards, Sven
On Tue, Jan 31, 2017 at 12:07:24PM +0100, Sven Eckelmann wrote: > On Sonntag, 29. Januar 2017 06:14:28 CET Linus Lüssing wrote: > [...] > > However, currently "Fragmentation v2" does not support re-fragmentation. > > Which means that once a packet is split into two packets of 1400 + x > > bytes for instance and the next hop provides an interface with an even > > smaller MTU of 1280 bytes, then the larger fragment is lost. > [...] > > Beside this change, did you try to make the fragments more equally sized? > Here is just some really ugly and untested pseudo code: Have thought about it initially but pushed it asided when I noticed it would only help regarding the initial issue for the unicast packets but not potentially large TTs. But generally, I like the idea of making fragments more equally sized :-).
diff --git a/net/batman-adv/main.h b/net/batman-adv/main.h index 57a8103..81c6a38 100644 --- a/net/batman-adv/main.h +++ b/net/batman-adv/main.h @@ -168,7 +168,7 @@ enum batadv_uev_type { /* Maximum number of fragments for one packet */ #define BATADV_FRAG_MAX_FRAGMENTS 16 /* Maxumim size of each fragment */ -#define BATADV_FRAG_MAX_FRAG_SIZE 1400 +#define BATADV_FRAG_MAX_FRAG_SIZE 1280 /* Time to keep fragments while waiting for rest of the fragments */ #define BATADV_FRAG_TIMEOUT 10000