]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - net/tipc/msg.c
ipv6/addrconf: fix a null-ptr-deref bug for ip6_ptr
[mirror_ubuntu-jammy-kernel.git] / net / tipc / msg.c
CommitLineData
b97bf3fd
PL
1/*
2 * net/tipc/msg.c: TIPC message header routines
c4307285 3 *
cf2157f8 4 * Copyright (c) 2000-2006, 2014-2015, Ericsson AB
741de3e9 5 * Copyright (c) 2005, 2010-2011, Wind River Systems
b97bf3fd
PL
6 * All rights reserved.
7 *
9ea1fd3c 8 * Redistribution and use in source and binary forms, with or without
b97bf3fd
PL
9 * modification, are permitted provided that the following conditions are met:
10 *
9ea1fd3c
PL
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the names of the copyright holders nor the names of its
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
b97bf3fd 19 *
9ea1fd3c
PL
20 * Alternatively, this software may be distributed under the terms of the
21 * GNU General Public License ("GPL") version 2 as published by the Free
22 * Software Foundation.
23 *
24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
25 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
28 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
29 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
30 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
31 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
32 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
33 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
b97bf3fd
PL
34 * POSSIBILITY OF SUCH DAMAGE.
35 */
36
c93d3baa 37#include <net/sock.h>
b97bf3fd 38#include "core.h"
b97bf3fd 39#include "msg.h"
5a379074
JPM
40#include "addr.h"
41#include "name_table.h"
fc1b6d6d 42#include "crypto.h"
b97bf3fd 43
d4cfb7fe 44#define BUF_ALIGN(x) ALIGN(x, 4)
8db1bae3 45#define MAX_FORWARD_SIZE 1024
fc1b6d6d
TL
46#ifdef CONFIG_TIPC_CRYPTO
47#define BUF_HEADROOM ALIGN(((LL_MAX_HEADER + 48) + EHDR_MAX_SIZE), 16)
0c6de0c9 48#define BUF_OVERHEAD (BUF_HEADROOM + TIPC_AES_GCM_TAG_SIZE)
fc1b6d6d 49#else
27777daa 50#define BUF_HEADROOM (LL_MAX_HEADER + 48)
0c6de0c9 51#define BUF_OVERHEAD BUF_HEADROOM
fc1b6d6d 52#endif
8db1bae3 53
0c6de0c9
MD
54const int one_page_mtu = PAGE_SIZE - SKB_DATA_ALIGN(BUF_OVERHEAD) -
55 SKB_DATA_ALIGN(sizeof(struct skb_shared_info));
56
859fc7c0
YX
57/**
58 * tipc_buf_acquire - creates a TIPC message buffer
59 * @size: message size (including TIPC header)
5fcb7d47 60 * @gfp: memory allocation flags
859fc7c0 61 *
637b77fd 62 * Return: a new buffer with data pointers set to the specified size.
859fc7c0 63 *
5fcb7d47
RD
64 * NOTE:
65 * Headroom is reserved to allow prepending of a data link header.
66 * There may also be unrequested tailroom present at the buffer's end.
859fc7c0 67 */
57d5f64d 68struct sk_buff *tipc_buf_acquire(u32 size, gfp_t gfp)
859fc7c0
YX
69{
70 struct sk_buff *skb;
859fc7c0 71
0c6de0c9 72 skb = alloc_skb_fclone(BUF_OVERHEAD + size, gfp);
859fc7c0
YX
73 if (skb) {
74 skb_reserve(skb, BUF_HEADROOM);
75 skb_put(skb, size);
76 skb->next = NULL;
77 }
78 return skb;
79}
80
c5898636
JPM
81void tipc_msg_init(u32 own_node, struct tipc_msg *m, u32 user, u32 type,
82 u32 hsize, u32 dnode)
23461e83
AS
83{
84 memset(m, 0, hsize);
85 msg_set_version(m);
86 msg_set_user(m, user);
87 msg_set_hdr_sz(m, hsize);
88 msg_set_size(m, hsize);
c5898636 89 msg_set_prevnode(m, own_node);
23461e83 90 msg_set_type(m, type);
1dd0bd2b 91 if (hsize > SHORT_H_SIZE) {
c5898636
JPM
92 msg_set_orignode(m, own_node);
93 msg_set_destnode(m, dnode);
1dd0bd2b
JPM
94 }
95}
96
c5898636 97struct sk_buff *tipc_msg_create(uint user, uint type,
34747539
YX
98 uint hdr_sz, uint data_sz, u32 dnode,
99 u32 onode, u32 dport, u32 oport, int errcode)
1dd0bd2b
JPM
100{
101 struct tipc_msg *msg;
102 struct sk_buff *buf;
103
57d5f64d 104 buf = tipc_buf_acquire(hdr_sz + data_sz, GFP_ATOMIC);
1dd0bd2b
JPM
105 if (unlikely(!buf))
106 return NULL;
107
108 msg = buf_msg(buf);
c5898636 109 tipc_msg_init(onode, msg, user, type, hdr_sz, dnode);
1dd0bd2b 110 msg_set_size(msg, hdr_sz + data_sz);
1dd0bd2b
JPM
111 msg_set_origport(msg, oport);
112 msg_set_destport(msg, dport);
113 msg_set_errcode(msg, errcode);
1dd0bd2b 114 return buf;
23461e83
AS
115}
116
37e22164 117/* tipc_buf_append(): Append a buffer to the fragment list of another buffer
29322d0d
JPM
118 * @*headbuf: in: NULL for first frag, otherwise value returned from prev call
119 * out: set when successful non-complete reassembly, otherwise NULL
120 * @*buf: in: the buffer to append. Always defined
b2ad5e5f 121 * out: head buf after successful complete reassembly, otherwise NULL
29322d0d 122 * Returns 1 when reassembly complete, otherwise 0
37e22164
JPM
123 */
124int tipc_buf_append(struct sk_buff **headbuf, struct sk_buff **buf)
125{
126 struct sk_buff *head = *headbuf;
127 struct sk_buff *frag = *buf;
45c8b7b1 128 struct sk_buff *tail = NULL;
13e9b997
JPM
129 struct tipc_msg *msg;
130 u32 fragid;
37e22164 131 int delta;
13e9b997 132 bool headstolen;
37e22164 133
13e9b997
JPM
134 if (!frag)
135 goto err;
136
137 msg = buf_msg(frag);
138 fragid = msg_type(msg);
139 frag->next = NULL;
37e22164
JPM
140 skb_pull(frag, msg_hdr_sz(msg));
141
142 if (fragid == FIRST_FRAGMENT) {
13e9b997
JPM
143 if (unlikely(head))
144 goto err;
ceb1eb2f 145 *buf = NULL;
b7df21cf
XL
146 if (skb_has_frag_list(frag) && __skb_linearize(frag))
147 goto err;
ceb1eb2f 148 frag = skb_unshare(frag, GFP_ATOMIC);
ff48b622 149 if (unlikely(!frag))
13e9b997 150 goto err;
37e22164 151 head = *headbuf = frag;
45c8b7b1 152 TIPC_SKB_CB(head)->tail = NULL;
37e22164
JPM
153 return 0;
154 }
13e9b997 155
37e22164 156 if (!head)
13e9b997
JPM
157 goto err;
158
37e22164
JPM
159 if (skb_try_coalesce(head, frag, &headstolen, &delta)) {
160 kfree_skb_partial(frag, headstolen);
161 } else {
13e9b997 162 tail = TIPC_SKB_CB(head)->tail;
37e22164
JPM
163 if (!skb_has_frag_list(head))
164 skb_shinfo(head)->frag_list = frag;
165 else
166 tail->next = frag;
167 head->truesize += frag->truesize;
168 head->data_len += frag->len;
169 head->len += frag->len;
170 TIPC_SKB_CB(head)->tail = frag;
171 }
13e9b997 172
37e22164 173 if (fragid == LAST_FRAGMENT) {
fc1b6d6d 174 TIPC_SKB_CB(head)->validated = 0;
d618d09a 175 if (unlikely(!tipc_msg_validate(&head)))
1149557d 176 goto err;
37e22164
JPM
177 *buf = head;
178 TIPC_SKB_CB(head)->tail = NULL;
179 *headbuf = NULL;
180 return 1;
181 }
182 *buf = NULL;
183 return 0;
13e9b997 184err:
37e22164 185 kfree_skb(*buf);
29322d0d
JPM
186 kfree_skb(*headbuf);
187 *buf = *headbuf = NULL;
37e22164
JPM
188 return 0;
189}
4f1688b2 190
c0bceb97
JM
191/**
192 * tipc_msg_append(): Append data to tail of an existing buffer queue
d8141208 193 * @_hdr: header to be used
c0bceb97
JM
194 * @m: the data to be appended
195 * @mss: max allowable size of buffer
196 * @dlen: size of data to be appended
637b77fd
RD
197 * @txq: queue to append to
198 *
199 * Return: the number of 1k blocks appended or errno value
c0bceb97
JM
200 */
201int tipc_msg_append(struct tipc_msg *_hdr, struct msghdr *m, int dlen,
202 int mss, struct sk_buff_head *txq)
203{
8298a419 204 struct sk_buff *skb;
c0bceb97
JM
205 int accounted, total, curr;
206 int mlen, cpy, rem = dlen;
207 struct tipc_msg *hdr;
208
209 skb = skb_peek_tail(txq);
210 accounted = skb ? msg_blocks(buf_msg(skb)) : 0;
211 total = accounted;
212
5e9eeccc 213 do {
c0bceb97 214 if (!skb || skb->len >= mss) {
c0bceb97
JM
215 skb = tipc_buf_acquire(mss, GFP_KERNEL);
216 if (unlikely(!skb))
217 return -ENOMEM;
218 skb_orphan(skb);
219 skb_trim(skb, MIN_H_SIZE);
220 hdr = buf_msg(skb);
221 skb_copy_to_linear_data(skb, _hdr, MIN_H_SIZE);
222 msg_set_hdr_sz(hdr, MIN_H_SIZE);
223 msg_set_size(hdr, MIN_H_SIZE);
224 __skb_queue_tail(txq, skb);
225 total += 1;
c0bceb97
JM
226 }
227 hdr = buf_msg(skb);
228 curr = msg_blocks(hdr);
229 mlen = msg_size(hdr);
c9aa81fa 230 cpy = min_t(size_t, rem, mss - mlen);
c0bceb97
JM
231 if (cpy != copy_from_iter(skb->data + mlen, cpy, &m->msg_iter))
232 return -EFAULT;
233 msg_set_size(hdr, mlen + cpy);
234 skb_put(skb, cpy);
235 rem -= cpy;
236 total += msg_blocks(hdr) - curr;
c9aa81fa 237 } while (rem > 0);
c0bceb97
JM
238 return total - accounted;
239}
240
cf2157f8
JPM
241/* tipc_msg_validate - validate basic format of received message
242 *
243 * This routine ensures a TIPC message has an acceptable header, and at least
244 * as much data as the header indicates it should. The routine also ensures
245 * that the entire message header is stored in the main fragment of the message
246 * buffer, to simplify future access to message header fields.
247 *
248 * Note: Having extra info present in the message header or data areas is OK.
249 * TIPC will ignore the excess, under the assumption that it is optional info
250 * introduced by a later release of the protocol.
251 */
d618d09a 252bool tipc_msg_validate(struct sk_buff **_skb)
cf2157f8 253{
d618d09a
JM
254 struct sk_buff *skb = *_skb;
255 struct tipc_msg *hdr;
cf2157f8
JPM
256 int msz, hsz;
257
d618d09a 258 /* Ensure that flow control ratio condition is satisfied */
55b3280d
HL
259 if (unlikely(skb->truesize / buf_roundup_len(skb) >= 4)) {
260 skb = skb_copy_expand(skb, BUF_HEADROOM, 0, GFP_ATOMIC);
d618d09a
JM
261 if (!skb)
262 return false;
263 kfree_skb(*_skb);
264 *_skb = skb;
265 }
266
cf2157f8
JPM
267 if (unlikely(TIPC_SKB_CB(skb)->validated))
268 return true;
fc1b6d6d 269
cf2157f8
JPM
270 if (unlikely(!pskb_may_pull(skb, MIN_H_SIZE)))
271 return false;
272
273 hsz = msg_hdr_sz(buf_msg(skb));
274 if (unlikely(hsz < MIN_H_SIZE) || (hsz > MAX_H_SIZE))
275 return false;
276 if (unlikely(!pskb_may_pull(skb, hsz)))
277 return false;
278
d618d09a
JM
279 hdr = buf_msg(skb);
280 if (unlikely(msg_version(hdr) != TIPC_VERSION))
cf2157f8
JPM
281 return false;
282
d618d09a 283 msz = msg_size(hdr);
cf2157f8
JPM
284 if (unlikely(msz < hsz))
285 return false;
286 if (unlikely((msz - hsz) > TIPC_MAX_USER_MSG_SIZE))
287 return false;
288 if (unlikely(skb->len < msz))
289 return false;
290
fc1b6d6d 291 TIPC_SKB_CB(skb)->validated = 1;
cf2157f8
JPM
292 return true;
293}
067608e9 294
2320bcda
TL
295/**
296 * tipc_msg_fragment - build a fragment skb list for TIPC message
297 *
298 * @skb: TIPC message skb
299 * @hdr: internal msg header to be put on the top of the fragments
300 * @pktmax: max size of a fragment incl. the header
301 * @frags: returned fragment skb list
302 *
637b77fd 303 * Return: 0 if the fragmentation is successful, otherwise: -EINVAL
2320bcda
TL
304 * or -ENOMEM
305 */
306int tipc_msg_fragment(struct sk_buff *skb, const struct tipc_msg *hdr,
307 int pktmax, struct sk_buff_head *frags)
308{
309 int pktno, nof_fragms, dsz, dmax, eat;
310 struct tipc_msg *_hdr;
311 struct sk_buff *_skb;
312 u8 *data;
313
314 /* Non-linear buffer? */
315 if (skb_linearize(skb))
316 return -ENOMEM;
317
318 data = (u8 *)skb->data;
319 dsz = msg_size(buf_msg(skb));
320 dmax = pktmax - INT_H_SIZE;
321 if (dsz <= dmax || !dmax)
322 return -EINVAL;
323
324 nof_fragms = dsz / dmax + 1;
325 for (pktno = 1; pktno <= nof_fragms; pktno++) {
326 if (pktno < nof_fragms)
327 eat = dmax;
328 else
329 eat = dsz % dmax;
330 /* Allocate a new fragment */
331 _skb = tipc_buf_acquire(INT_H_SIZE + eat, GFP_ATOMIC);
332 if (!_skb)
333 goto error;
334 skb_orphan(_skb);
335 __skb_queue_tail(frags, _skb);
336 /* Copy header & data to the fragment */
337 skb_copy_to_linear_data(_skb, hdr, INT_H_SIZE);
338 skb_copy_to_linear_data_offset(_skb, INT_H_SIZE, data, eat);
339 data += eat;
340 /* Update the fragment's header */
341 _hdr = buf_msg(_skb);
342 msg_set_fragm_no(_hdr, pktno);
343 msg_set_nof_fragms(_hdr, nof_fragms);
344 msg_set_size(_hdr, INT_H_SIZE + eat);
345 }
346 return 0;
347
348error:
349 __skb_queue_purge(frags);
350 __skb_queue_head_init(frags);
351 return -ENOMEM;
352}
353
067608e9 354/**
9fbfb8b1 355 * tipc_msg_build - create buffer chain containing specified header and data
067608e9 356 * @mhdr: Message header, to be prepended to data
45dcc687 357 * @m: User message
5fcb7d47 358 * @offset: buffer offset for fragmented messages (FIXME)
067608e9
JPM
359 * @dsz: Total length of user data
360 * @pktmax: Max packet size that can be used
a6ca1094
YX
361 * @list: Buffer or chain of buffers to be returned to caller
362 *
4c94cc2d
JM
363 * Note that the recursive call we are making here is safe, since it can
364 * logically go only one further level down.
365 *
637b77fd 366 * Return: message data size or errno: -ENOMEM, -EFAULT
067608e9 367 */
4c94cc2d
JM
368int tipc_msg_build(struct tipc_msg *mhdr, struct msghdr *m, int offset,
369 int dsz, int pktmax, struct sk_buff_head *list)
067608e9
JPM
370{
371 int mhsz = msg_hdr_sz(mhdr);
4c94cc2d 372 struct tipc_msg pkthdr;
067608e9 373 int msz = mhsz + dsz;
067608e9 374 int pktrem = pktmax;
a6ca1094 375 struct sk_buff *skb;
4c94cc2d
JM
376 int drem = dsz;
377 int pktno = 1;
067608e9 378 char *pktpos;
4c94cc2d 379 int pktsz;
067608e9 380 int rc;
a6ca1094 381
067608e9
JPM
382 msg_set_size(mhdr, msz);
383
384 /* No fragmentation needed? */
385 if (likely(msz <= pktmax)) {
57d5f64d 386 skb = tipc_buf_acquire(msz, GFP_KERNEL);
4c94cc2d
JM
387
388 /* Fall back to smaller MTU if node local message */
389 if (unlikely(!skb)) {
390 if (pktmax != MAX_MSG_SIZE)
391 return -ENOMEM;
0c6de0c9
MD
392 rc = tipc_msg_build(mhdr, m, offset, dsz,
393 one_page_mtu, list);
4c94cc2d
JM
394 if (rc != dsz)
395 return rc;
396 if (tipc_msg_assemble(list))
397 return dsz;
067608e9 398 return -ENOMEM;
4c94cc2d 399 }
c93d3baa 400 skb_orphan(skb);
a6ca1094
YX
401 __skb_queue_tail(list, skb);
402 skb_copy_to_linear_data(skb, mhdr, mhsz);
403 pktpos = skb->data + mhsz;
cbbd26b8 404 if (copy_from_iter_full(pktpos, dsz, &m->msg_iter))
067608e9
JPM
405 return dsz;
406 rc = -EFAULT;
407 goto error;
408 }
409
410 /* Prepare reusable fragment header */
c5898636
JPM
411 tipc_msg_init(msg_prevnode(mhdr), &pkthdr, MSG_FRAGMENTER,
412 FIRST_FRAGMENT, INT_H_SIZE, msg_destnode(mhdr));
067608e9
JPM
413 msg_set_size(&pkthdr, pktmax);
414 msg_set_fragm_no(&pkthdr, pktno);
e3eea1eb 415 msg_set_importance(&pkthdr, msg_importance(mhdr));
067608e9
JPM
416
417 /* Prepare first fragment */
57d5f64d 418 skb = tipc_buf_acquire(pktmax, GFP_KERNEL);
a6ca1094 419 if (!skb)
067608e9 420 return -ENOMEM;
c93d3baa 421 skb_orphan(skb);
a6ca1094
YX
422 __skb_queue_tail(list, skb);
423 pktpos = skb->data;
424 skb_copy_to_linear_data(skb, &pkthdr, INT_H_SIZE);
067608e9
JPM
425 pktpos += INT_H_SIZE;
426 pktrem -= INT_H_SIZE;
a6ca1094 427 skb_copy_to_linear_data_offset(skb, INT_H_SIZE, mhdr, mhsz);
067608e9
JPM
428 pktpos += mhsz;
429 pktrem -= mhsz;
430
431 do {
432 if (drem < pktrem)
433 pktrem = drem;
434
cbbd26b8 435 if (!copy_from_iter_full(pktpos, pktrem, &m->msg_iter)) {
067608e9
JPM
436 rc = -EFAULT;
437 goto error;
438 }
439 drem -= pktrem;
067608e9
JPM
440
441 if (!drem)
442 break;
443
444 /* Prepare new fragment: */
445 if (drem < (pktmax - INT_H_SIZE))
446 pktsz = drem + INT_H_SIZE;
447 else
448 pktsz = pktmax;
57d5f64d 449 skb = tipc_buf_acquire(pktsz, GFP_KERNEL);
a6ca1094 450 if (!skb) {
067608e9
JPM
451 rc = -ENOMEM;
452 goto error;
453 }
c93d3baa 454 skb_orphan(skb);
a6ca1094 455 __skb_queue_tail(list, skb);
067608e9
JPM
456 msg_set_type(&pkthdr, FRAGMENT);
457 msg_set_size(&pkthdr, pktsz);
458 msg_set_fragm_no(&pkthdr, ++pktno);
a6ca1094
YX
459 skb_copy_to_linear_data(skb, &pkthdr, INT_H_SIZE);
460 pktpos = skb->data + INT_H_SIZE;
067608e9
JPM
461 pktrem = pktsz - INT_H_SIZE;
462
463 } while (1);
a6ca1094 464 msg_set_type(buf_msg(skb), LAST_FRAGMENT);
067608e9
JPM
465 return dsz;
466error:
a6ca1094
YX
467 __skb_queue_purge(list);
468 __skb_queue_head_init(list);
067608e9
JPM
469 return rc;
470}
471
4f1688b2 472/**
06e7c70c
TL
473 * tipc_msg_bundle - Append contents of a buffer to tail of an existing one
474 * @bskb: the bundle buffer to append to
475 * @msg: message to be appended
476 * @max: max allowable size for the bundle buffer
477 *
637b77fd 478 * Return: "true" if bundling has been performed, otherwise "false"
4f1688b2 479 */
06e7c70c
TL
480static bool tipc_msg_bundle(struct sk_buff *bskb, struct tipc_msg *msg,
481 u32 max)
4f1688b2 482{
06e7c70c
TL
483 struct tipc_msg *bmsg = buf_msg(bskb);
484 u32 msz, bsz, offset, pad;
4f1688b2 485
06e7c70c 486 msz = msg_size(msg);
05dcc5aa 487 bsz = msg_size(bmsg);
d4cfb7fe 488 offset = BUF_ALIGN(bsz);
06e7c70c 489 pad = offset - bsz;
05dcc5aa 490
06e7c70c 491 if (unlikely(skb_tailroom(bskb) < (pad + msz)))
4f1688b2 492 return false;
06e7c70c 493 if (unlikely(max < (offset + msz)))
4f1688b2 494 return false;
06e7c70c
TL
495
496 skb_put(bskb, pad + msz);
497 skb_copy_to_linear_data_offset(bskb, offset, msg, msz);
498 msg_set_size(bmsg, offset + msz);
499 msg_set_msgcnt(bmsg, msg_msgcnt(bmsg) + 1);
500 return true;
501}
502
503/**
504 * tipc_msg_try_bundle - Try to bundle a new message to the last one
505 * @tskb: the last/target message to which the new one will be appended
506 * @skb: the new message skb pointer
507 * @mss: max message size (header inclusive)
508 * @dnode: destination node for the message
509 * @new_bundle: if this call made a new bundle or not
510 *
511 * Return: "true" if the new message skb is potential for bundling this time or
512 * later, in the case a bundling has been done this time, the skb is consumed
513 * (the skb pointer = NULL).
514 * Otherwise, "false" if the skb cannot be bundled at all.
515 */
516bool tipc_msg_try_bundle(struct sk_buff *tskb, struct sk_buff **skb, u32 mss,
517 u32 dnode, bool *new_bundle)
518{
519 struct tipc_msg *msg, *inner, *outer;
520 u32 tsz;
521
522 /* First, check if the new buffer is suitable for bundling */
523 msg = buf_msg(*skb);
524 if (msg_user(msg) == MSG_FRAGMENTER)
4f1688b2 525 return false;
06e7c70c 526 if (msg_user(msg) == TUNNEL_PROTOCOL)
4f1688b2 527 return false;
06e7c70c 528 if (msg_user(msg) == BCAST_PROTOCOL)
4f1688b2 529 return false;
06e7c70c 530 if (mss <= INT_H_SIZE + msg_size(msg))
f21e897e 531 return false;
4f1688b2 532
06e7c70c
TL
533 /* Ok, but the last/target buffer can be empty? */
534 if (unlikely(!tskb))
535 return true;
536
537 /* Is it a bundle already? Try to bundle the new message to it */
538 if (msg_user(buf_msg(tskb)) == MSG_BUNDLER) {
539 *new_bundle = false;
540 goto bundle;
541 }
542
543 /* Make a new bundle of the two messages if possible */
544 tsz = msg_size(buf_msg(tskb));
d4cfb7fe 545 if (unlikely(mss < BUF_ALIGN(INT_H_SIZE + tsz) + msg_size(msg)))
06e7c70c
TL
546 return true;
547 if (unlikely(pskb_expand_head(tskb, INT_H_SIZE, mss - tsz - INT_H_SIZE,
548 GFP_ATOMIC)))
549 return true;
550 inner = buf_msg(tskb);
551 skb_push(tskb, INT_H_SIZE);
552 outer = buf_msg(tskb);
553 tipc_msg_init(msg_prevnode(inner), outer, MSG_BUNDLER, 0, INT_H_SIZE,
554 dnode);
555 msg_set_importance(outer, msg_importance(inner));
556 msg_set_size(outer, INT_H_SIZE + tsz);
557 msg_set_msgcnt(outer, 1);
558 *new_bundle = true;
559
560bundle:
561 if (likely(tipc_msg_bundle(tskb, msg, mss))) {
562 consume_skb(*skb);
563 *skb = NULL;
564 }
4f1688b2
JPM
565 return true;
566}
567
c637c103
JPM
568/**
569 * tipc_msg_extract(): extract bundled inner packet from buffer
c1336ee4 570 * @skb: buffer to be extracted from.
c637c103 571 * @iskb: extracted inner buffer, to be returned
c1336ee4 572 * @pos: position in outer message of msg to be extracted.
5fcb7d47 573 * Returns position of next msg.
c637c103 574 * Consumes outer buffer when last packet extracted
637b77fd 575 * Return: true when there is an extracted buffer, otherwise false
c637c103
JPM
576 */
577bool tipc_msg_extract(struct sk_buff *skb, struct sk_buff **iskb, int *pos)
578{
ef9be755
TN
579 struct tipc_msg *hdr, *ihdr;
580 int imsz;
c637c103 581
c1336ee4 582 *iskb = NULL;
1149557d 583 if (unlikely(skb_linearize(skb)))
c1336ee4
JPM
584 goto none;
585
ef9be755
TN
586 hdr = buf_msg(skb);
587 if (unlikely(*pos > (msg_data_sz(hdr) - MIN_H_SIZE)))
c637c103 588 goto none;
c637c103 589
ef9be755
TN
590 ihdr = (struct tipc_msg *)(msg_data(hdr) + *pos);
591 imsz = msg_size(ihdr);
592
593 if ((*pos + imsz) > msg_data_sz(hdr))
c637c103 594 goto none;
ef9be755
TN
595
596 *iskb = tipc_buf_acquire(imsz, GFP_ATOMIC);
597 if (!*iskb)
598 goto none;
599
600 skb_copy_to_linear_data(*iskb, ihdr, imsz);
d618d09a 601 if (unlikely(!tipc_msg_validate(iskb)))
c637c103 602 goto none;
ef9be755 603
d4cfb7fe 604 *pos += BUF_ALIGN(imsz);
c637c103
JPM
605 return true;
606none:
607 kfree_skb(skb);
c1336ee4 608 kfree_skb(*iskb);
c637c103
JPM
609 *iskb = NULL;
610 return false;
611}
612
8db1bae3
JPM
613/**
614 * tipc_msg_reverse(): swap source and destination addresses and add error code
29042e19 615 * @own_node: originating node id for reversed message
5cbdbd1a 616 * @skb: buffer containing message to be reversed; will be consumed
29042e19 617 * @err: error code to be set in message, if any
5cbdbd1a 618 * Replaces consumed buffer with new one when successful
637b77fd 619 * Return: true if success, otherwise false
8db1bae3 620 */
bcd3ffd4 621bool tipc_msg_reverse(u32 own_node, struct sk_buff **skb, int err)
8db1bae3 622{
29042e19 623 struct sk_buff *_skb = *skb;
5cbdbd1a
JM
624 struct tipc_msg *_hdr, *hdr;
625 int hlen, dlen;
8db1bae3 626
29042e19 627 if (skb_linearize(_skb))
8db1bae3 628 goto exit;
5cbdbd1a
JM
629 _hdr = buf_msg(_skb);
630 dlen = min_t(uint, msg_data_sz(_hdr), MAX_FORWARD_SIZE);
631 hlen = msg_hdr_sz(_hdr);
632
633 if (msg_dest_droppable(_hdr))
ac0074ee 634 goto exit;
5cbdbd1a 635 if (msg_errcode(_hdr))
8db1bae3 636 goto exit;
29042e19 637
5cbdbd1a
JM
638 /* Never return SHORT header */
639 if (hlen == SHORT_H_SIZE)
640 hlen = BASIC_H_SIZE;
29042e19 641
67879274
TN
642 /* Don't return data along with SYN+, - sender has a clone */
643 if (msg_is_syn(_hdr) && err == TIPC_ERR_OVERLOAD)
644 dlen = 0;
645
5cbdbd1a
JM
646 /* Allocate new buffer to return */
647 *skb = tipc_buf_acquire(hlen + dlen, GFP_ATOMIC);
648 if (!*skb)
649 goto exit;
650 memcpy((*skb)->data, _skb->data, msg_hdr_sz(_hdr));
651 memcpy((*skb)->data + hlen, msg_data(_hdr), dlen);
652
653 /* Build reverse header in new buffer */
654 hdr = buf_msg(*skb);
655 msg_set_hdr_sz(hdr, hlen);
29042e19 656 msg_set_errcode(hdr, err);
59a361bc 657 msg_set_non_seq(hdr, 0);
5cbdbd1a
JM
658 msg_set_origport(hdr, msg_destport(_hdr));
659 msg_set_destport(hdr, msg_origport(_hdr));
660 msg_set_destnode(hdr, msg_prevnode(_hdr));
29042e19
JPM
661 msg_set_prevnode(hdr, own_node);
662 msg_set_orignode(hdr, own_node);
5cbdbd1a 663 msg_set_size(hdr, hlen + dlen);
29042e19 664 skb_orphan(_skb);
5cbdbd1a 665 kfree_skb(_skb);
8db1bae3
JPM
666 return true;
667exit:
29042e19
JPM
668 kfree_skb(_skb);
669 *skb = NULL;
8db1bae3
JPM
670 return false;
671}
5a379074 672
67879274
TN
673bool tipc_msg_skb_clone(struct sk_buff_head *msg, struct sk_buff_head *cpy)
674{
675 struct sk_buff *skb, *_skb;
676
677 skb_queue_walk(msg, skb) {
678 _skb = skb_clone(skb, GFP_ATOMIC);
679 if (!_skb) {
680 __skb_queue_purge(cpy);
681 pr_err_ratelimited("Failed to clone buffer chain\n");
682 return false;
683 }
684 __skb_queue_tail(cpy, _skb);
685 }
686 return true;
687}
688
5a379074 689/**
e3a77561 690 * tipc_msg_lookup_dest(): try to find new destination for named message
5fcb7d47 691 * @net: pointer to associated network namespace
e3a77561 692 * @skb: the buffer containing the message.
cda3696d 693 * @err: error code to be used by caller if lookup fails
5a379074 694 * Does not consume buffer
637b77fd 695 * Return: true if a destination is found, false otherwise
5a379074 696 */
cda3696d 697bool tipc_msg_lookup_dest(struct net *net, struct sk_buff *skb, int *err)
5a379074 698{
e3a77561 699 struct tipc_msg *msg = buf_msg(skb);
908148bc
JM
700 u32 scope = msg_lookup_scope(msg);
701 u32 self = tipc_own_addr(net);
702 u32 inst = msg_nameinst(msg);
703 struct tipc_socket_addr sk;
704 struct tipc_uaddr ua;
5a379074 705
e3a77561
JPM
706 if (!msg_isdata(msg))
707 return false;
708 if (!msg_named(msg))
709 return false;
d482994f
JPM
710 if (msg_errcode(msg))
711 return false;
aad06212 712 *err = TIPC_ERR_NO_NAME;
e3a77561
JPM
713 if (skb_linearize(skb))
714 return false;
4e3ae001 715 msg = buf_msg(skb);
d482994f 716 if (msg_reroute_cnt(msg))
e3a77561 717 return false;
908148bc
JM
718 tipc_uaddr(&ua, TIPC_SERVICE_RANGE, scope,
719 msg_nametype(msg), inst, inst);
720 sk.node = tipc_scope2node(net, scope);
721 if (!tipc_nametbl_lookup_anycast(net, &ua, &sk))
e3a77561 722 return false;
5a379074 723 msg_incr_reroute_cnt(msg);
908148bc
JM
724 if (sk.node != self)
725 msg_set_prevnode(msg, self);
726 msg_set_destnode(msg, sk.node);
727 msg_set_destport(msg, sk.ref);
e3a77561 728 *err = TIPC_OK;
a9e2971b 729
e3a77561 730 return true;
5a379074 731}
078bec82 732
4c94cc2d
JM
733/* tipc_msg_assemble() - assemble chain of fragments into one message
734 */
735bool tipc_msg_assemble(struct sk_buff_head *list)
736{
737 struct sk_buff *skb, *tmp = NULL;
738
739 if (skb_queue_len(list) == 1)
740 return true;
741
742 while ((skb = __skb_dequeue(list))) {
743 skb->next = NULL;
744 if (tipc_buf_append(&tmp, &skb)) {
745 __skb_queue_tail(list, skb);
746 return true;
747 }
748 if (!tmp)
749 break;
750 }
751 __skb_queue_purge(list);
752 __skb_queue_head_init(list);
753 pr_warn("Failed do assemble buffer\n");
754 return false;
755}
756
078bec82
JPM
757/* tipc_msg_reassemble() - clone a buffer chain of fragments and
758 * reassemble the clones into one message
759 */
2f566124 760bool tipc_msg_reassemble(struct sk_buff_head *list, struct sk_buff_head *rcvq)
078bec82 761{
2f566124 762 struct sk_buff *skb, *_skb;
a6ca1094 763 struct sk_buff *frag = NULL;
078bec82 764 struct sk_buff *head = NULL;
2f566124 765 int hdr_len;
078bec82
JPM
766
767 /* Copy header if single buffer */
a6ca1094
YX
768 if (skb_queue_len(list) == 1) {
769 skb = skb_peek(list);
2f566124
JPM
770 hdr_len = skb_headroom(skb) + msg_hdr_sz(buf_msg(skb));
771 _skb = __pskb_copy(skb, hdr_len, GFP_ATOMIC);
772 if (!_skb)
773 return false;
774 __skb_queue_tail(rcvq, _skb);
775 return true;
078bec82
JPM
776 }
777
778 /* Clone all fragments and reassemble */
a6ca1094
YX
779 skb_queue_walk(list, skb) {
780 frag = skb_clone(skb, GFP_ATOMIC);
078bec82
JPM
781 if (!frag)
782 goto error;
783 frag->next = NULL;
784 if (tipc_buf_append(&head, &frag))
785 break;
786 if (!head)
787 goto error;
078bec82 788 }
2f566124
JPM
789 __skb_queue_tail(rcvq, frag);
790 return true;
078bec82
JPM
791error:
792 pr_warn("Failed do clone local mcast rcv buffer\n");
793 kfree_skb(head);
2f566124 794 return false;
078bec82 795}
8306f99a 796
a853e4c6
JPM
797bool tipc_msg_pskb_copy(u32 dst, struct sk_buff_head *msg,
798 struct sk_buff_head *cpy)
799{
800 struct sk_buff *skb, *_skb;
801
802 skb_queue_walk(msg, skb) {
803 _skb = pskb_copy(skb, GFP_ATOMIC);
804 if (!_skb) {
805 __skb_queue_purge(cpy);
806 return false;
807 }
808 msg_set_destnode(buf_msg(_skb), dst);
809 __skb_queue_tail(cpy, _skb);
810 }
811 return true;
812}
813
8306f99a
JPM
814/* tipc_skb_queue_sorted(); sort pkt into list according to sequence number
815 * @list: list to be appended to
816 * @seqno: sequence number of buffer to add
817 * @skb: buffer to add
818 */
03b6fefd 819bool __tipc_skb_queue_sorted(struct sk_buff_head *list, u16 seqno,
8306f99a
JPM
820 struct sk_buff *skb)
821{
822 struct sk_buff *_skb, *tmp;
823
824 if (skb_queue_empty(list) || less(seqno, buf_seqno(skb_peek(list)))) {
825 __skb_queue_head(list, skb);
03b6fefd 826 return true;
8306f99a
JPM
827 }
828
829 if (more(seqno, buf_seqno(skb_peek_tail(list)))) {
830 __skb_queue_tail(list, skb);
03b6fefd 831 return true;
8306f99a
JPM
832 }
833
834 skb_queue_walk_safe(list, _skb, tmp) {
835 if (more(seqno, buf_seqno(_skb)))
836 continue;
837 if (seqno == buf_seqno(_skb))
838 break;
839 __skb_queue_before(list, _skb, skb);
03b6fefd 840 return true;
8306f99a
JPM
841 }
842 kfree_skb(skb);
03b6fefd 843 return false;
8306f99a 844}
64ac5f59
JM
845
846void tipc_skb_reject(struct net *net, int err, struct sk_buff *skb,
847 struct sk_buff_head *xmitq)
848{
849 if (tipc_msg_reverse(tipc_own_addr(net), &skb, err))
850 __skb_queue_tail(xmitq, skb);
851}