]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/blame - net/tipc/msg.c
tcp: up initial rmem to 128KB and SYN rwin to around 64KB
[mirror_ubuntu-jammy-kernel.git] / net / tipc / msg.c
CommitLineData
b97bf3fd
PL
1/*
2 * net/tipc/msg.c: TIPC message header routines
c4307285 3 *
cf2157f8 4 * Copyright (c) 2000-2006, 2014-2015, Ericsson AB
741de3e9 5 * Copyright (c) 2005, 2010-2011, Wind River Systems
b97bf3fd
PL
6 * All rights reserved.
7 *
9ea1fd3c 8 * Redistribution and use in source and binary forms, with or without
b97bf3fd
PL
9 * modification, are permitted provided that the following conditions are met:
10 *
9ea1fd3c
PL
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the names of the copyright holders nor the names of its
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
b97bf3fd 19 *
9ea1fd3c
PL
20 * Alternatively, this software may be distributed under the terms of the
21 * GNU General Public License ("GPL") version 2 as published by the Free
22 * Software Foundation.
23 *
24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
25 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
28 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
29 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
30 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
31 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
32 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
33 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
b97bf3fd
PL
34 * POSSIBILITY OF SUCH DAMAGE.
35 */
36
c93d3baa 37#include <net/sock.h>
b97bf3fd 38#include "core.h"
b97bf3fd 39#include "msg.h"
5a379074
JPM
40#include "addr.h"
41#include "name_table.h"
b97bf3fd 42
8db1bae3 43#define MAX_FORWARD_SIZE 1024
27777daa
JPM
44#define BUF_HEADROOM (LL_MAX_HEADER + 48)
45#define BUF_TAILROOM 16
8db1bae3 46
4f1688b2 47static unsigned int align(unsigned int i)
23461e83 48{
4f1688b2 49 return (i + 3) & ~3u;
23461e83
AS
50}
51
859fc7c0
YX
52/**
53 * tipc_buf_acquire - creates a TIPC message buffer
54 * @size: message size (including TIPC header)
55 *
56 * Returns a new buffer with data pointers set to the specified size.
57 *
58 * NOTE: Headroom is reserved to allow prepending of a data link header.
59 * There may also be unrequested tailroom present at the buffer's end.
60 */
57d5f64d 61struct sk_buff *tipc_buf_acquire(u32 size, gfp_t gfp)
859fc7c0
YX
62{
63 struct sk_buff *skb;
64 unsigned int buf_size = (BUF_HEADROOM + size + 3) & ~3u;
65
57d5f64d 66 skb = alloc_skb_fclone(buf_size, gfp);
859fc7c0
YX
67 if (skb) {
68 skb_reserve(skb, BUF_HEADROOM);
69 skb_put(skb, size);
70 skb->next = NULL;
71 }
72 return skb;
73}
74
c5898636
JPM
75void tipc_msg_init(u32 own_node, struct tipc_msg *m, u32 user, u32 type,
76 u32 hsize, u32 dnode)
23461e83
AS
77{
78 memset(m, 0, hsize);
79 msg_set_version(m);
80 msg_set_user(m, user);
81 msg_set_hdr_sz(m, hsize);
82 msg_set_size(m, hsize);
c5898636 83 msg_set_prevnode(m, own_node);
23461e83 84 msg_set_type(m, type);
1dd0bd2b 85 if (hsize > SHORT_H_SIZE) {
c5898636
JPM
86 msg_set_orignode(m, own_node);
87 msg_set_destnode(m, dnode);
1dd0bd2b
JPM
88 }
89}
90
c5898636 91struct sk_buff *tipc_msg_create(uint user, uint type,
34747539
YX
92 uint hdr_sz, uint data_sz, u32 dnode,
93 u32 onode, u32 dport, u32 oport, int errcode)
1dd0bd2b
JPM
94{
95 struct tipc_msg *msg;
96 struct sk_buff *buf;
97
57d5f64d 98 buf = tipc_buf_acquire(hdr_sz + data_sz, GFP_ATOMIC);
1dd0bd2b
JPM
99 if (unlikely(!buf))
100 return NULL;
101
102 msg = buf_msg(buf);
c5898636 103 tipc_msg_init(onode, msg, user, type, hdr_sz, dnode);
1dd0bd2b 104 msg_set_size(msg, hdr_sz + data_sz);
1dd0bd2b
JPM
105 msg_set_origport(msg, oport);
106 msg_set_destport(msg, dport);
107 msg_set_errcode(msg, errcode);
108 if (hdr_sz > SHORT_H_SIZE) {
109 msg_set_orignode(msg, onode);
110 msg_set_destnode(msg, dnode);
111 }
112 return buf;
23461e83
AS
113}
114
37e22164 115/* tipc_buf_append(): Append a buffer to the fragment list of another buffer
29322d0d
JPM
116 * @*headbuf: in: NULL for first frag, otherwise value returned from prev call
117 * out: set when successful non-complete reassembly, otherwise NULL
118 * @*buf: in: the buffer to append. Always defined
b2ad5e5f 119 * out: head buf after successful complete reassembly, otherwise NULL
29322d0d 120 * Returns 1 when reassembly complete, otherwise 0
37e22164
JPM
121 */
122int tipc_buf_append(struct sk_buff **headbuf, struct sk_buff **buf)
123{
124 struct sk_buff *head = *headbuf;
125 struct sk_buff *frag = *buf;
45c8b7b1 126 struct sk_buff *tail = NULL;
13e9b997
JPM
127 struct tipc_msg *msg;
128 u32 fragid;
37e22164 129 int delta;
13e9b997 130 bool headstolen;
37e22164 131
13e9b997
JPM
132 if (!frag)
133 goto err;
134
135 msg = buf_msg(frag);
136 fragid = msg_type(msg);
137 frag->next = NULL;
37e22164
JPM
138 skb_pull(frag, msg_hdr_sz(msg));
139
140 if (fragid == FIRST_FRAGMENT) {
13e9b997
JPM
141 if (unlikely(head))
142 goto err;
143 if (unlikely(skb_unclone(frag, GFP_ATOMIC)))
144 goto err;
37e22164 145 head = *headbuf = frag;
29322d0d 146 *buf = NULL;
45c8b7b1
JPM
147 TIPC_SKB_CB(head)->tail = NULL;
148 if (skb_is_nonlinear(head)) {
149 skb_walk_frags(head, tail) {
150 TIPC_SKB_CB(head)->tail = tail;
151 }
152 } else {
153 skb_frag_list_init(head);
154 }
37e22164
JPM
155 return 0;
156 }
13e9b997 157
37e22164 158 if (!head)
13e9b997
JPM
159 goto err;
160
37e22164
JPM
161 if (skb_try_coalesce(head, frag, &headstolen, &delta)) {
162 kfree_skb_partial(frag, headstolen);
163 } else {
13e9b997 164 tail = TIPC_SKB_CB(head)->tail;
37e22164
JPM
165 if (!skb_has_frag_list(head))
166 skb_shinfo(head)->frag_list = frag;
167 else
168 tail->next = frag;
169 head->truesize += frag->truesize;
170 head->data_len += frag->len;
171 head->len += frag->len;
172 TIPC_SKB_CB(head)->tail = frag;
173 }
13e9b997 174
37e22164 175 if (fragid == LAST_FRAGMENT) {
1149557d 176 TIPC_SKB_CB(head)->validated = false;
d618d09a 177 if (unlikely(!tipc_msg_validate(&head)))
1149557d 178 goto err;
37e22164
JPM
179 *buf = head;
180 TIPC_SKB_CB(head)->tail = NULL;
181 *headbuf = NULL;
182 return 1;
183 }
184 *buf = NULL;
185 return 0;
13e9b997 186err:
37e22164 187 kfree_skb(*buf);
29322d0d
JPM
188 kfree_skb(*headbuf);
189 *buf = *headbuf = NULL;
37e22164
JPM
190 return 0;
191}
4f1688b2 192
cf2157f8
JPM
193/* tipc_msg_validate - validate basic format of received message
194 *
195 * This routine ensures a TIPC message has an acceptable header, and at least
196 * as much data as the header indicates it should. The routine also ensures
197 * that the entire message header is stored in the main fragment of the message
198 * buffer, to simplify future access to message header fields.
199 *
200 * Note: Having extra info present in the message header or data areas is OK.
201 * TIPC will ignore the excess, under the assumption that it is optional info
202 * introduced by a later release of the protocol.
203 */
d618d09a 204bool tipc_msg_validate(struct sk_buff **_skb)
cf2157f8 205{
d618d09a
JM
206 struct sk_buff *skb = *_skb;
207 struct tipc_msg *hdr;
cf2157f8
JPM
208 int msz, hsz;
209
d618d09a 210 /* Ensure that flow control ratio condition is satisfied */
55b3280d
HL
211 if (unlikely(skb->truesize / buf_roundup_len(skb) >= 4)) {
212 skb = skb_copy_expand(skb, BUF_HEADROOM, 0, GFP_ATOMIC);
d618d09a
JM
213 if (!skb)
214 return false;
215 kfree_skb(*_skb);
216 *_skb = skb;
217 }
218
cf2157f8
JPM
219 if (unlikely(TIPC_SKB_CB(skb)->validated))
220 return true;
221 if (unlikely(!pskb_may_pull(skb, MIN_H_SIZE)))
222 return false;
223
224 hsz = msg_hdr_sz(buf_msg(skb));
225 if (unlikely(hsz < MIN_H_SIZE) || (hsz > MAX_H_SIZE))
226 return false;
227 if (unlikely(!pskb_may_pull(skb, hsz)))
228 return false;
229
d618d09a
JM
230 hdr = buf_msg(skb);
231 if (unlikely(msg_version(hdr) != TIPC_VERSION))
cf2157f8
JPM
232 return false;
233
d618d09a 234 msz = msg_size(hdr);
cf2157f8
JPM
235 if (unlikely(msz < hsz))
236 return false;
237 if (unlikely((msz - hsz) > TIPC_MAX_USER_MSG_SIZE))
238 return false;
239 if (unlikely(skb->len < msz))
240 return false;
241
242 TIPC_SKB_CB(skb)->validated = true;
243 return true;
244}
067608e9
JPM
245
246/**
9fbfb8b1 247 * tipc_msg_build - create buffer chain containing specified header and data
067608e9 248 * @mhdr: Message header, to be prepended to data
45dcc687 249 * @m: User message
067608e9
JPM
250 * @dsz: Total length of user data
251 * @pktmax: Max packet size that can be used
a6ca1094
YX
252 * @list: Buffer or chain of buffers to be returned to caller
253 *
4c94cc2d
JM
254 * Note that the recursive call we are making here is safe, since it can
255 * logically go only one further level down.
256 *
067608e9
JPM
257 * Returns message data size or errno: -ENOMEM, -EFAULT
258 */
4c94cc2d
JM
259int tipc_msg_build(struct tipc_msg *mhdr, struct msghdr *m, int offset,
260 int dsz, int pktmax, struct sk_buff_head *list)
067608e9
JPM
261{
262 int mhsz = msg_hdr_sz(mhdr);
4c94cc2d 263 struct tipc_msg pkthdr;
067608e9 264 int msz = mhsz + dsz;
067608e9 265 int pktrem = pktmax;
a6ca1094 266 struct sk_buff *skb;
4c94cc2d
JM
267 int drem = dsz;
268 int pktno = 1;
067608e9 269 char *pktpos;
4c94cc2d 270 int pktsz;
067608e9 271 int rc;
a6ca1094 272
067608e9
JPM
273 msg_set_size(mhdr, msz);
274
275 /* No fragmentation needed? */
276 if (likely(msz <= pktmax)) {
57d5f64d 277 skb = tipc_buf_acquire(msz, GFP_KERNEL);
4c94cc2d
JM
278
279 /* Fall back to smaller MTU if node local message */
280 if (unlikely(!skb)) {
281 if (pktmax != MAX_MSG_SIZE)
282 return -ENOMEM;
283 rc = tipc_msg_build(mhdr, m, offset, dsz, FB_MTU, list);
284 if (rc != dsz)
285 return rc;
286 if (tipc_msg_assemble(list))
287 return dsz;
067608e9 288 return -ENOMEM;
4c94cc2d 289 }
c93d3baa 290 skb_orphan(skb);
a6ca1094
YX
291 __skb_queue_tail(list, skb);
292 skb_copy_to_linear_data(skb, mhdr, mhsz);
293 pktpos = skb->data + mhsz;
cbbd26b8 294 if (copy_from_iter_full(pktpos, dsz, &m->msg_iter))
067608e9
JPM
295 return dsz;
296 rc = -EFAULT;
297 goto error;
298 }
299
300 /* Prepare reusable fragment header */
c5898636
JPM
301 tipc_msg_init(msg_prevnode(mhdr), &pkthdr, MSG_FRAGMENTER,
302 FIRST_FRAGMENT, INT_H_SIZE, msg_destnode(mhdr));
067608e9
JPM
303 msg_set_size(&pkthdr, pktmax);
304 msg_set_fragm_no(&pkthdr, pktno);
e3eea1eb 305 msg_set_importance(&pkthdr, msg_importance(mhdr));
067608e9
JPM
306
307 /* Prepare first fragment */
57d5f64d 308 skb = tipc_buf_acquire(pktmax, GFP_KERNEL);
a6ca1094 309 if (!skb)
067608e9 310 return -ENOMEM;
c93d3baa 311 skb_orphan(skb);
a6ca1094
YX
312 __skb_queue_tail(list, skb);
313 pktpos = skb->data;
314 skb_copy_to_linear_data(skb, &pkthdr, INT_H_SIZE);
067608e9
JPM
315 pktpos += INT_H_SIZE;
316 pktrem -= INT_H_SIZE;
a6ca1094 317 skb_copy_to_linear_data_offset(skb, INT_H_SIZE, mhdr, mhsz);
067608e9
JPM
318 pktpos += mhsz;
319 pktrem -= mhsz;
320
321 do {
322 if (drem < pktrem)
323 pktrem = drem;
324
cbbd26b8 325 if (!copy_from_iter_full(pktpos, pktrem, &m->msg_iter)) {
067608e9
JPM
326 rc = -EFAULT;
327 goto error;
328 }
329 drem -= pktrem;
067608e9
JPM
330
331 if (!drem)
332 break;
333
334 /* Prepare new fragment: */
335 if (drem < (pktmax - INT_H_SIZE))
336 pktsz = drem + INT_H_SIZE;
337 else
338 pktsz = pktmax;
57d5f64d 339 skb = tipc_buf_acquire(pktsz, GFP_KERNEL);
a6ca1094 340 if (!skb) {
067608e9
JPM
341 rc = -ENOMEM;
342 goto error;
343 }
c93d3baa 344 skb_orphan(skb);
a6ca1094 345 __skb_queue_tail(list, skb);
067608e9
JPM
346 msg_set_type(&pkthdr, FRAGMENT);
347 msg_set_size(&pkthdr, pktsz);
348 msg_set_fragm_no(&pkthdr, ++pktno);
a6ca1094
YX
349 skb_copy_to_linear_data(skb, &pkthdr, INT_H_SIZE);
350 pktpos = skb->data + INT_H_SIZE;
067608e9
JPM
351 pktrem = pktsz - INT_H_SIZE;
352
353 } while (1);
a6ca1094 354 msg_set_type(buf_msg(skb), LAST_FRAGMENT);
067608e9
JPM
355 return dsz;
356error:
a6ca1094
YX
357 __skb_queue_purge(list);
358 __skb_queue_head_init(list);
067608e9
JPM
359 return rc;
360}
361
4f1688b2
JPM
362/**
363 * tipc_msg_bundle(): Append contents of a buffer to tail of an existing one
dd3f9e70
JPM
364 * @skb: the buffer to append to ("bundle")
365 * @msg: message to be appended
4f1688b2
JPM
366 * @mtu: max allowable size for the bundle buffer
367 * Consumes buffer if successful
368 * Returns true if bundling could be performed, otherwise false
369 */
dd3f9e70 370bool tipc_msg_bundle(struct sk_buff *skb, struct tipc_msg *msg, u32 mtu)
4f1688b2 371{
05dcc5aa 372 struct tipc_msg *bmsg;
05dcc5aa 373 unsigned int bsz;
4f1688b2 374 unsigned int msz = msg_size(msg);
05dcc5aa 375 u32 start, pad;
4f1688b2 376 u32 max = mtu - INT_H_SIZE;
4f1688b2
JPM
377
378 if (likely(msg_user(msg) == MSG_FRAGMENTER))
379 return false;
dd3f9e70 380 if (!skb)
05dcc5aa 381 return false;
dd3f9e70 382 bmsg = buf_msg(skb);
05dcc5aa
JPM
383 bsz = msg_size(bmsg);
384 start = align(bsz);
385 pad = start - bsz;
386
dff29b1a 387 if (unlikely(msg_user(msg) == TUNNEL_PROTOCOL))
4f1688b2
JPM
388 return false;
389 if (unlikely(msg_user(msg) == BCAST_PROTOCOL))
390 return false;
dd3f9e70 391 if (unlikely(msg_user(bmsg) != MSG_BUNDLER))
4f1688b2 392 return false;
dd3f9e70 393 if (unlikely(skb_tailroom(skb) < (pad + msz)))
4f1688b2
JPM
394 return false;
395 if (unlikely(max < (start + msz)))
396 return false;
f21e897e
JPM
397 if ((msg_importance(msg) < TIPC_SYSTEM_IMPORTANCE) &&
398 (msg_importance(bmsg) == TIPC_SYSTEM_IMPORTANCE))
399 return false;
4f1688b2 400
dd3f9e70
JPM
401 skb_put(skb, pad + msz);
402 skb_copy_to_linear_data_offset(skb, start, msg, msz);
4f1688b2
JPM
403 msg_set_size(bmsg, start + msz);
404 msg_set_msgcnt(bmsg, msg_msgcnt(bmsg) + 1);
4f1688b2
JPM
405 return true;
406}
407
c637c103
JPM
408/**
409 * tipc_msg_extract(): extract bundled inner packet from buffer
c1336ee4 410 * @skb: buffer to be extracted from.
c637c103 411 * @iskb: extracted inner buffer, to be returned
c1336ee4
JPM
412 * @pos: position in outer message of msg to be extracted.
413 * Returns position of next msg
c637c103
JPM
414 * Consumes outer buffer when last packet extracted
415 * Returns true when when there is an extracted buffer, otherwise false
416 */
417bool tipc_msg_extract(struct sk_buff *skb, struct sk_buff **iskb, int *pos)
418{
ef9be755
TN
419 struct tipc_msg *hdr, *ihdr;
420 int imsz;
c637c103 421
c1336ee4 422 *iskb = NULL;
1149557d 423 if (unlikely(skb_linearize(skb)))
c1336ee4
JPM
424 goto none;
425
ef9be755
TN
426 hdr = buf_msg(skb);
427 if (unlikely(*pos > (msg_data_sz(hdr) - MIN_H_SIZE)))
c637c103 428 goto none;
c637c103 429
ef9be755
TN
430 ihdr = (struct tipc_msg *)(msg_data(hdr) + *pos);
431 imsz = msg_size(ihdr);
432
433 if ((*pos + imsz) > msg_data_sz(hdr))
c637c103 434 goto none;
ef9be755
TN
435
436 *iskb = tipc_buf_acquire(imsz, GFP_ATOMIC);
437 if (!*iskb)
438 goto none;
439
440 skb_copy_to_linear_data(*iskb, ihdr, imsz);
d618d09a 441 if (unlikely(!tipc_msg_validate(iskb)))
c637c103 442 goto none;
ef9be755 443
c637c103
JPM
444 *pos += align(imsz);
445 return true;
446none:
447 kfree_skb(skb);
c1336ee4 448 kfree_skb(*iskb);
c637c103
JPM
449 *iskb = NULL;
450 return false;
451}
452
4f1688b2
JPM
453/**
454 * tipc_msg_make_bundle(): Create bundle buf and append message to its tail
dd3f9e70
JPM
455 * @list: the buffer chain, where head is the buffer to replace/append
456 * @skb: buffer to be created, appended to and returned in case of success
457 * @msg: message to be appended
58dc55f2 458 * @mtu: max allowable size for the bundle buffer, inclusive header
4f1688b2 459 * @dnode: destination node for message. (Not always present in header)
b2ad5e5f 460 * Returns true if success, otherwise false
4f1688b2 461 */
dd3f9e70
JPM
462bool tipc_msg_make_bundle(struct sk_buff **skb, struct tipc_msg *msg,
463 u32 mtu, u32 dnode)
4f1688b2 464{
dd3f9e70 465 struct sk_buff *_skb;
4f1688b2 466 struct tipc_msg *bmsg;
4f1688b2
JPM
467 u32 msz = msg_size(msg);
468 u32 max = mtu - INT_H_SIZE;
469
470 if (msg_user(msg) == MSG_FRAGMENTER)
471 return false;
dff29b1a 472 if (msg_user(msg) == TUNNEL_PROTOCOL)
4f1688b2
JPM
473 return false;
474 if (msg_user(msg) == BCAST_PROTOCOL)
475 return false;
476 if (msz > (max / 2))
477 return false;
478
57d5f64d 479 _skb = tipc_buf_acquire(max, GFP_ATOMIC);
dd3f9e70 480 if (!_skb)
4f1688b2
JPM
481 return false;
482
dd3f9e70
JPM
483 skb_trim(_skb, INT_H_SIZE);
484 bmsg = buf_msg(_skb);
c5898636
JPM
485 tipc_msg_init(msg_prevnode(msg), bmsg, MSG_BUNDLER, 0,
486 INT_H_SIZE, dnode);
f21e897e
JPM
487 if (msg_isdata(msg))
488 msg_set_importance(bmsg, TIPC_CRITICAL_IMPORTANCE);
489 else
490 msg_set_importance(bmsg, TIPC_SYSTEM_IMPORTANCE);
4f1688b2
JPM
491 msg_set_seqno(bmsg, msg_seqno(msg));
492 msg_set_ack(bmsg, msg_ack(msg));
493 msg_set_bcast_ack(bmsg, msg_bcast_ack(msg));
dd3f9e70
JPM
494 tipc_msg_bundle(_skb, msg, mtu);
495 *skb = _skb;
05dcc5aa 496 return true;
4f1688b2 497}
8db1bae3
JPM
498
499/**
500 * tipc_msg_reverse(): swap source and destination addresses and add error code
29042e19
JPM
501 * @own_node: originating node id for reversed message
502 * @skb: buffer containing message to be reversed; may be replaced.
503 * @err: error code to be set in message, if any
504 * Consumes buffer at failure
8db1bae3
JPM
505 * Returns true if success, otherwise false
506 */
bcd3ffd4 507bool tipc_msg_reverse(u32 own_node, struct sk_buff **skb, int err)
8db1bae3 508{
29042e19 509 struct sk_buff *_skb = *skb;
60d1d936 510 struct tipc_msg *hdr;
8db1bae3 511 struct tipc_msg ohdr;
60d1d936 512 int dlen;
8db1bae3 513
29042e19 514 if (skb_linearize(_skb))
8db1bae3 515 goto exit;
29042e19 516 hdr = buf_msg(_skb);
60d1d936 517 dlen = min_t(uint, msg_data_sz(hdr), MAX_FORWARD_SIZE);
29042e19 518 if (msg_dest_droppable(hdr))
ac0074ee 519 goto exit;
29042e19 520 if (msg_errcode(hdr))
8db1bae3 521 goto exit;
29042e19
JPM
522
523 /* Take a copy of original header before altering message */
524 memcpy(&ohdr, hdr, msg_hdr_sz(hdr));
525
526 /* Never return SHORT header; expand by replacing buffer if necessary */
527 if (msg_short(hdr)) {
57d5f64d 528 *skb = tipc_buf_acquire(BASIC_H_SIZE + dlen, GFP_ATOMIC);
29042e19
JPM
529 if (!*skb)
530 goto exit;
531 memcpy((*skb)->data + BASIC_H_SIZE, msg_data(hdr), dlen);
532 kfree_skb(_skb);
533 _skb = *skb;
534 hdr = buf_msg(_skb);
535 memcpy(hdr, &ohdr, BASIC_H_SIZE);
536 msg_set_hdr_sz(hdr, BASIC_H_SIZE);
8db1bae3 537 }
29042e19
JPM
538
539 /* Now reverse the concerned fields */
540 msg_set_errcode(hdr, err);
59a361bc 541 msg_set_non_seq(hdr, 0);
29042e19
JPM
542 msg_set_origport(hdr, msg_destport(&ohdr));
543 msg_set_destport(hdr, msg_origport(&ohdr));
544 msg_set_destnode(hdr, msg_prevnode(&ohdr));
545 msg_set_prevnode(hdr, own_node);
546 msg_set_orignode(hdr, own_node);
547 msg_set_size(hdr, msg_hdr_sz(hdr) + dlen);
29042e19
JPM
548 skb_trim(_skb, msg_size(hdr));
549 skb_orphan(_skb);
8db1bae3
JPM
550 return true;
551exit:
29042e19
JPM
552 kfree_skb(_skb);
553 *skb = NULL;
8db1bae3
JPM
554 return false;
555}
5a379074
JPM
556
557/**
e3a77561
JPM
558 * tipc_msg_lookup_dest(): try to find new destination for named message
559 * @skb: the buffer containing the message.
cda3696d 560 * @err: error code to be used by caller if lookup fails
5a379074 561 * Does not consume buffer
e3a77561 562 * Returns true if a destination is found, false otherwise
5a379074 563 */
cda3696d 564bool tipc_msg_lookup_dest(struct net *net, struct sk_buff *skb, int *err)
5a379074 565{
e3a77561 566 struct tipc_msg *msg = buf_msg(skb);
cda3696d
JPM
567 u32 dport, dnode;
568 u32 onode = tipc_own_addr(net);
5a379074 569
e3a77561
JPM
570 if (!msg_isdata(msg))
571 return false;
572 if (!msg_named(msg))
573 return false;
d482994f
JPM
574 if (msg_errcode(msg))
575 return false;
aad06212 576 *err = TIPC_ERR_NO_NAME;
e3a77561
JPM
577 if (skb_linearize(skb))
578 return false;
4e3ae001 579 msg = buf_msg(skb);
d482994f 580 if (msg_reroute_cnt(msg))
e3a77561 581 return false;
928df188 582 dnode = tipc_scope2node(net, msg_lookup_scope(msg));
4ac1c8d0 583 dport = tipc_nametbl_translate(net, msg_nametype(msg),
cda3696d 584 msg_nameinst(msg), &dnode);
5a379074 585 if (!dport)
e3a77561 586 return false;
5a379074 587 msg_incr_reroute_cnt(msg);
cda3696d
JPM
588 if (dnode != onode)
589 msg_set_prevnode(msg, onode);
590 msg_set_destnode(msg, dnode);
5a379074 591 msg_set_destport(msg, dport);
e3a77561 592 *err = TIPC_OK;
a9e2971b
JM
593
594 if (!skb_cloned(skb))
595 return true;
596
e3a77561 597 return true;
5a379074 598}
078bec82 599
4c94cc2d
JM
600/* tipc_msg_assemble() - assemble chain of fragments into one message
601 */
602bool tipc_msg_assemble(struct sk_buff_head *list)
603{
604 struct sk_buff *skb, *tmp = NULL;
605
606 if (skb_queue_len(list) == 1)
607 return true;
608
609 while ((skb = __skb_dequeue(list))) {
610 skb->next = NULL;
611 if (tipc_buf_append(&tmp, &skb)) {
612 __skb_queue_tail(list, skb);
613 return true;
614 }
615 if (!tmp)
616 break;
617 }
618 __skb_queue_purge(list);
619 __skb_queue_head_init(list);
620 pr_warn("Failed do assemble buffer\n");
621 return false;
622}
623
078bec82
JPM
624/* tipc_msg_reassemble() - clone a buffer chain of fragments and
625 * reassemble the clones into one message
626 */
2f566124 627bool tipc_msg_reassemble(struct sk_buff_head *list, struct sk_buff_head *rcvq)
078bec82 628{
2f566124 629 struct sk_buff *skb, *_skb;
a6ca1094 630 struct sk_buff *frag = NULL;
078bec82 631 struct sk_buff *head = NULL;
2f566124 632 int hdr_len;
078bec82
JPM
633
634 /* Copy header if single buffer */
a6ca1094
YX
635 if (skb_queue_len(list) == 1) {
636 skb = skb_peek(list);
2f566124
JPM
637 hdr_len = skb_headroom(skb) + msg_hdr_sz(buf_msg(skb));
638 _skb = __pskb_copy(skb, hdr_len, GFP_ATOMIC);
639 if (!_skb)
640 return false;
641 __skb_queue_tail(rcvq, _skb);
642 return true;
078bec82
JPM
643 }
644
645 /* Clone all fragments and reassemble */
a6ca1094
YX
646 skb_queue_walk(list, skb) {
647 frag = skb_clone(skb, GFP_ATOMIC);
078bec82
JPM
648 if (!frag)
649 goto error;
650 frag->next = NULL;
651 if (tipc_buf_append(&head, &frag))
652 break;
653 if (!head)
654 goto error;
078bec82 655 }
2f566124
JPM
656 __skb_queue_tail(rcvq, frag);
657 return true;
078bec82
JPM
658error:
659 pr_warn("Failed do clone local mcast rcv buffer\n");
660 kfree_skb(head);
2f566124 661 return false;
078bec82 662}
8306f99a 663
a853e4c6
JPM
664bool tipc_msg_pskb_copy(u32 dst, struct sk_buff_head *msg,
665 struct sk_buff_head *cpy)
666{
667 struct sk_buff *skb, *_skb;
668
669 skb_queue_walk(msg, skb) {
670 _skb = pskb_copy(skb, GFP_ATOMIC);
671 if (!_skb) {
672 __skb_queue_purge(cpy);
673 return false;
674 }
675 msg_set_destnode(buf_msg(_skb), dst);
676 __skb_queue_tail(cpy, _skb);
677 }
678 return true;
679}
680
8306f99a
JPM
681/* tipc_skb_queue_sorted(); sort pkt into list according to sequence number
682 * @list: list to be appended to
683 * @seqno: sequence number of buffer to add
684 * @skb: buffer to add
685 */
686void __tipc_skb_queue_sorted(struct sk_buff_head *list, u16 seqno,
687 struct sk_buff *skb)
688{
689 struct sk_buff *_skb, *tmp;
690
691 if (skb_queue_empty(list) || less(seqno, buf_seqno(skb_peek(list)))) {
692 __skb_queue_head(list, skb);
693 return;
694 }
695
696 if (more(seqno, buf_seqno(skb_peek_tail(list)))) {
697 __skb_queue_tail(list, skb);
698 return;
699 }
700
701 skb_queue_walk_safe(list, _skb, tmp) {
702 if (more(seqno, buf_seqno(_skb)))
703 continue;
704 if (seqno == buf_seqno(_skb))
705 break;
706 __skb_queue_before(list, _skb, skb);
707 return;
708 }
709 kfree_skb(skb);
710}
64ac5f59
JM
711
712void tipc_skb_reject(struct net *net, int err, struct sk_buff *skb,
713 struct sk_buff_head *xmitq)
714{
715 if (tipc_msg_reverse(tipc_own_addr(net), &skb, err))
716 __skb_queue_tail(xmitq, skb);
717}