]> git.proxmox.com Git - mirror_ubuntu-eoan-kernel.git/commitdiff
tipc: same receive code path for connection protocol and data messages
authorJon Paul Maloy <jon.maloy@ericsson.com>
Thu, 26 Jun 2014 01:41:40 +0000 (20:41 -0500)
committerDavid S. Miller <davem@davemloft.net>
Fri, 27 Jun 2014 19:50:56 +0000 (12:50 -0700)
As a preparation to eliminate port_lock we need to bring reception
of connection protocol messages under proper protection of bh_lock_sock
or socket owner.

We fix this by letting those messages follow the same code path as
incoming data messages.

As a side effect of this change, the last reference to the function
net_route_msg() disappears, and we can eliminate that function.

Signed-off-by: Jon Maloy <jon.maloy@ericsson.com>
Reviewed-by: Erik Hugne <erik.hugne@ericsson.com>
Reviewed-by: Ying Xue <ying.xue@windriver.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
net/tipc/link.c
net/tipc/net.c
net/tipc/net.h
net/tipc/port.c
net/tipc/port.h
net/tipc/socket.c

index 93a8033263c04f6fb6d943bdf3513e1769240bfa..96a8072f73cccb078c200fd01990ed8bfcbaf843 100644 (file)
@@ -1479,6 +1479,7 @@ void tipc_rcv(struct sk_buff *head, struct tipc_bearer *b_ptr)
                case TIPC_MEDIUM_IMPORTANCE:
                case TIPC_HIGH_IMPORTANCE:
                case TIPC_CRITICAL_IMPORTANCE:
+               case CONN_MANAGER:
                        tipc_node_unlock(n_ptr);
                        tipc_sk_rcv(buf);
                        continue;
@@ -1493,10 +1494,6 @@ void tipc_rcv(struct sk_buff *head, struct tipc_bearer *b_ptr)
                        tipc_node_unlock(n_ptr);
                        tipc_named_rcv(buf);
                        continue;
-               case CONN_MANAGER:
-                       tipc_node_unlock(n_ptr);
-                       tipc_port_proto_rcv(buf);
-                       continue;
                case BCAST_PROTOCOL:
                        tipc_link_sync_rcv(n_ptr, buf);
                        break;
@@ -2106,6 +2103,7 @@ void tipc_link_bundle_rcv(struct sk_buff *buf)
        u32 msgcount = msg_msgcnt(buf_msg(buf));
        u32 pos = INT_H_SIZE;
        struct sk_buff *obuf;
+       struct tipc_msg *omsg;
 
        while (msgcount--) {
                obuf = buf_extract(buf, pos);
@@ -2113,8 +2111,16 @@ void tipc_link_bundle_rcv(struct sk_buff *buf)
                        pr_warn("Link unable to unbundle message(s)\n");
                        break;
                }
-               pos += align(msg_size(buf_msg(obuf)));
-               tipc_net_route_msg(obuf);
+               omsg = buf_msg(obuf);
+               pos += align(msg_size(omsg));
+               if (msg_isdata(omsg) || (msg_user(omsg) == CONN_MANAGER)) {
+                       tipc_sk_rcv(obuf);
+               } else if (msg_user(omsg) == NAME_DISTRIBUTOR) {
+                       tipc_named_rcv(obuf);
+               } else {
+                       pr_warn("Illegal bundled msg: %u\n", msg_user(omsg));
+                       kfree_skb(obuf);
+               }
        }
        kfree_skb(buf);
 }
index 5f7d6ffb5465d30fe719b05ebb35e514723d703b..7fcc94998feae6eb1427dd25ac965fece340227a 100644 (file)
  *       This is always used within the scope of a tipc_nametbl_lock(read).
  *     - A local spin_lock protecting the queue of subscriber events.
 */
-void tipc_net_route_msg(struct sk_buff *buf)
-{
-       struct tipc_msg *msg;
-       u32 dnode;
-
-       if (!buf)
-               return;
-       msg = buf_msg(buf);
-
-       /* Handle message for this node */
-       dnode = msg_short(msg) ? tipc_own_addr : msg_destnode(msg);
-       if (tipc_in_scope(dnode, tipc_own_addr)) {
-               if (msg_isdata(msg)) {
-                       if (msg_mcast(msg))
-                               tipc_port_mcast_rcv(buf, NULL);
-                       else if (msg_destport(msg)) {
-                               tipc_sk_rcv(buf);
-                       } else {
-                               pr_warn("Cannot route msg; no destination\n");
-                               kfree_skb(buf);
-                       }
-                       return;
-               }
-               switch (msg_user(msg)) {
-               case NAME_DISTRIBUTOR:
-                       tipc_named_rcv(buf);
-                       break;
-               case CONN_MANAGER:
-                       tipc_port_proto_rcv(buf);
-                       break;
-               default:
-                       kfree_skb(buf);
-               }
-               return;
-       }
-
-       /* Handle message for another node */
-       skb_trim(buf, msg_size(msg));
-       tipc_link_xmit(buf, dnode, msg_link_selector(msg));
-}
 
 int tipc_net_start(u32 addr)
 {
index c6c2b46f7c283095c4e29c7e0b11c5cdea2bcc01..59ef3388be2ce151320503d46a3f6f766375acee 100644 (file)
@@ -37,8 +37,6 @@
 #ifndef _TIPC_NET_H
 #define _TIPC_NET_H
 
-void tipc_net_route_msg(struct sk_buff *buf);
-
 int tipc_net_start(u32 addr);
 void tipc_net_stop(void);
 
index 60aede075b52963101d8c776e74d77d4fa80452d..dcc630948e04e6aa0c86808343af8f94fefe7485 100644 (file)
@@ -365,16 +365,14 @@ static struct sk_buff *port_build_peer_abort_msg(struct tipc_port *p_ptr, u32 er
        return buf;
 }
 
-void tipc_port_proto_rcv(struct sk_buff *buf)
+void tipc_port_proto_rcv(struct tipc_port *p_ptr, struct sk_buff *buf)
 {
        struct tipc_msg *msg = buf_msg(buf);
-       struct tipc_port *p_ptr;
        struct sk_buff *r_buf = NULL;
        u32 destport = msg_destport(msg);
        int wakeable;
 
        /* Validate connection */
-       p_ptr = tipc_port_lock(destport);
        if (!p_ptr || !p_ptr->connected || !tipc_port_peer_msg(p_ptr, msg)) {
                r_buf = tipc_buf_acquire(BASIC_H_SIZE);
                if (r_buf) {
@@ -385,8 +383,6 @@ void tipc_port_proto_rcv(struct sk_buff *buf)
                        msg_set_origport(msg, destport);
                        msg_set_destport(msg, msg_origport(msg));
                }
-               if (p_ptr)
-                       tipc_port_unlock(p_ptr);
                goto exit;
        }
 
@@ -409,7 +405,6 @@ void tipc_port_proto_rcv(struct sk_buff *buf)
                break;
        }
        p_ptr->probing_state = CONFIRMED;
-       tipc_port_unlock(p_ptr);
 exit:
        tipc_link_xmit2(r_buf, msg_destnode(msg), msg_link_selector(msg));
        kfree_skb(buf);
index 231d9488189cf03514bed50db653819281720bd9..3f28fd420ff9cc3eef7d36fa9576b4565119bde0 100644 (file)
@@ -140,7 +140,7 @@ int tipc_port_mcast_xmit(struct tipc_port *port,
                         unsigned int len);
 
 struct sk_buff *tipc_port_get_ports(void);
-void tipc_port_proto_rcv(struct sk_buff *buf);
+void tipc_port_proto_rcv(struct tipc_port *port, struct sk_buff *buf);
 void tipc_port_mcast_rcv(struct sk_buff *buf, struct tipc_port_list *dp);
 void tipc_port_reinit(void);
 
index bfe79bbd83a1899598998869902161c1518db91d..d838a4b66d3aed2eb2ef503405b4a20cd2809d42 100644 (file)
@@ -1416,6 +1416,11 @@ static int filter_rcv(struct sock *sk, struct sk_buff *buf)
        unsigned int limit = rcvbuf_limit(sk, buf);
        int rc = TIPC_OK;
 
+       if (unlikely(msg_user(msg) == CONN_MANAGER)) {
+               tipc_port_proto_rcv(&tsk->port, buf);
+               return TIPC_OK;
+       }
+
        /* Reject message if it is wrong sort of message for socket */
        if (msg_type(msg) > TIPC_DIRECT_MSG)
                return -TIPC_ERR_NO_PORT;