blob: 0d515d20b0568d3c2683ee6143163fada8bc0866 [file] [log] [blame]
Per Lidenb97bf3f2006-01-02 19:04:38 +01001/*
2 * net/tipc/msg.c: TIPC message header routines
YOSHIFUJI Hideakic4307282007-02-09 23:25:21 +09003 *
Jon Paul Maloycf2157f2015-03-13 16:08:06 -04004 * Copyright (c) 2000-2006, 2014-2015, Ericsson AB
Allan Stephens741de3e2011-01-25 13:33:31 -05005 * Copyright (c) 2005, 2010-2011, Wind River Systems
Per Lidenb97bf3f2006-01-02 19:04:38 +01006 * All rights reserved.
7 *
Per Liden9ea1fd32006-01-11 13:30:43 +01008 * Redistribution and use in source and binary forms, with or without
Per Lidenb97bf3f2006-01-02 19:04:38 +01009 * modification, are permitted provided that the following conditions are met:
10 *
Per Liden9ea1fd32006-01-11 13:30:43 +010011 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the names of the copyright holders nor the names of its
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
Per Lidenb97bf3f2006-01-02 19:04:38 +010019 *
Per Liden9ea1fd32006-01-11 13:30:43 +010020 * Alternatively, this software may be distributed under the terms of the
21 * GNU General Public License ("GPL") version 2 as published by the Free
22 * Software Foundation.
23 *
24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
25 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
28 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
29 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
30 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
31 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
32 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
33 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
Per Lidenb97bf3f2006-01-02 19:04:38 +010034 * POSSIBILITY OF SUCH DAMAGE.
35 */
36
Ying Xuec93d3ba2015-01-09 15:27:04 +080037#include <net/sock.h>
Per Lidenb97bf3f2006-01-02 19:04:38 +010038#include "core.h"
Per Lidenb97bf3f2006-01-02 19:04:38 +010039#include "msg.h"
Jon Paul Maloy5a379072014-06-25 20:41:36 -050040#include "addr.h"
41#include "name_table.h"
Tuong Lienfc1b6d62019-11-08 12:05:11 +070042#include "crypto.h"
Per Lidenb97bf3f2006-01-02 19:04:38 +010043
Jon Paul Maloy8db1bae2014-06-25 20:41:35 -050044#define MAX_FORWARD_SIZE 1024
Tuong Lienfc1b6d62019-11-08 12:05:11 +070045#ifdef CONFIG_TIPC_CRYPTO
46#define BUF_HEADROOM ALIGN(((LL_MAX_HEADER + 48) + EHDR_MAX_SIZE), 16)
47#define BUF_TAILROOM (TIPC_AES_GCM_TAG_SIZE)
48#else
Jon Paul Maloy27777da2016-06-20 09:20:46 -040049#define BUF_HEADROOM (LL_MAX_HEADER + 48)
50#define BUF_TAILROOM 16
Tuong Lienfc1b6d62019-11-08 12:05:11 +070051#endif
Jon Paul Maloy8db1bae2014-06-25 20:41:35 -050052
Jon Paul Maloy4f1688b2014-06-25 20:41:32 -050053static unsigned int align(unsigned int i)
Allan Stephens23461e82010-05-11 14:30:18 +000054{
Jon Paul Maloy4f1688b2014-06-25 20:41:32 -050055 return (i + 3) & ~3u;
Allan Stephens23461e82010-05-11 14:30:18 +000056}
57
Ying Xue859fc7c2015-01-09 15:27:01 +080058/**
59 * tipc_buf_acquire - creates a TIPC message buffer
60 * @size: message size (including TIPC header)
61 *
62 * Returns a new buffer with data pointers set to the specified size.
63 *
64 * NOTE: Headroom is reserved to allow prepending of a data link header.
65 * There may also be unrequested tailroom present at the buffer's end.
66 */
Parthasarathy Bhuvaragan57d5f642017-01-13 15:46:25 +010067struct sk_buff *tipc_buf_acquire(u32 size, gfp_t gfp)
Ying Xue859fc7c2015-01-09 15:27:01 +080068{
69 struct sk_buff *skb;
Tuong Lienfc1b6d62019-11-08 12:05:11 +070070#ifdef CONFIG_TIPC_CRYPTO
71 unsigned int buf_size = (BUF_HEADROOM + size + BUF_TAILROOM + 3) & ~3u;
72#else
Ying Xue859fc7c2015-01-09 15:27:01 +080073 unsigned int buf_size = (BUF_HEADROOM + size + 3) & ~3u;
Tuong Lienfc1b6d62019-11-08 12:05:11 +070074#endif
Ying Xue859fc7c2015-01-09 15:27:01 +080075
Parthasarathy Bhuvaragan57d5f642017-01-13 15:46:25 +010076 skb = alloc_skb_fclone(buf_size, gfp);
Ying Xue859fc7c2015-01-09 15:27:01 +080077 if (skb) {
78 skb_reserve(skb, BUF_HEADROOM);
79 skb_put(skb, size);
80 skb->next = NULL;
81 }
82 return skb;
83}
84
Jon Paul Maloyc5898632015-02-05 08:36:36 -050085void tipc_msg_init(u32 own_node, struct tipc_msg *m, u32 user, u32 type,
86 u32 hsize, u32 dnode)
Allan Stephens23461e82010-05-11 14:30:18 +000087{
88 memset(m, 0, hsize);
89 msg_set_version(m);
90 msg_set_user(m, user);
91 msg_set_hdr_sz(m, hsize);
92 msg_set_size(m, hsize);
Jon Paul Maloyc5898632015-02-05 08:36:36 -050093 msg_set_prevnode(m, own_node);
Allan Stephens23461e82010-05-11 14:30:18 +000094 msg_set_type(m, type);
Jon Paul Maloy1dd0bd22014-08-22 18:09:06 -040095 if (hsize > SHORT_H_SIZE) {
Jon Paul Maloyc5898632015-02-05 08:36:36 -050096 msg_set_orignode(m, own_node);
97 msg_set_destnode(m, dnode);
Jon Paul Maloy1dd0bd22014-08-22 18:09:06 -040098 }
99}
100
Jon Paul Maloyc5898632015-02-05 08:36:36 -0500101struct sk_buff *tipc_msg_create(uint user, uint type,
Ying Xue34747532015-01-09 15:27:10 +0800102 uint hdr_sz, uint data_sz, u32 dnode,
103 u32 onode, u32 dport, u32 oport, int errcode)
Jon Paul Maloy1dd0bd22014-08-22 18:09:06 -0400104{
105 struct tipc_msg *msg;
106 struct sk_buff *buf;
107
Parthasarathy Bhuvaragan57d5f642017-01-13 15:46:25 +0100108 buf = tipc_buf_acquire(hdr_sz + data_sz, GFP_ATOMIC);
Jon Paul Maloy1dd0bd22014-08-22 18:09:06 -0400109 if (unlikely(!buf))
110 return NULL;
111
112 msg = buf_msg(buf);
Jon Paul Maloyc5898632015-02-05 08:36:36 -0500113 tipc_msg_init(onode, msg, user, type, hdr_sz, dnode);
Jon Paul Maloy1dd0bd22014-08-22 18:09:06 -0400114 msg_set_size(msg, hdr_sz + data_sz);
Jon Paul Maloy1dd0bd22014-08-22 18:09:06 -0400115 msg_set_origport(msg, oport);
116 msg_set_destport(msg, dport);
117 msg_set_errcode(msg, errcode);
118 if (hdr_sz > SHORT_H_SIZE) {
119 msg_set_orignode(msg, onode);
120 msg_set_destnode(msg, dnode);
121 }
122 return buf;
Allan Stephens23461e82010-05-11 14:30:18 +0000123}
124
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400125/* tipc_buf_append(): Append a buffer to the fragment list of another buffer
Jon Paul Maloy29322d02014-07-05 13:44:13 -0400126 * @*headbuf: in: NULL for first frag, otherwise value returned from prev call
127 * out: set when successful non-complete reassembly, otherwise NULL
128 * @*buf: in: the buffer to append. Always defined
stephen hemmingerb2ad5e52014-10-29 22:58:51 -0700129 * out: head buf after successful complete reassembly, otherwise NULL
Jon Paul Maloy29322d02014-07-05 13:44:13 -0400130 * Returns 1 when reassembly complete, otherwise 0
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400131 */
132int tipc_buf_append(struct sk_buff **headbuf, struct sk_buff **buf)
133{
134 struct sk_buff *head = *headbuf;
135 struct sk_buff *frag = *buf;
Jon Paul Maloy45c8b7b2015-10-19 11:33:00 -0400136 struct sk_buff *tail = NULL;
Jon Paul Maloy13e9b992014-07-25 14:48:09 -0400137 struct tipc_msg *msg;
138 u32 fragid;
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400139 int delta;
Jon Paul Maloy13e9b992014-07-25 14:48:09 -0400140 bool headstolen;
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400141
Jon Paul Maloy13e9b992014-07-25 14:48:09 -0400142 if (!frag)
143 goto err;
144
145 msg = buf_msg(frag);
146 fragid = msg_type(msg);
147 frag->next = NULL;
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400148 skb_pull(frag, msg_hdr_sz(msg));
149
150 if (fragid == FIRST_FRAGMENT) {
Jon Paul Maloy13e9b992014-07-25 14:48:09 -0400151 if (unlikely(head))
152 goto err;
153 if (unlikely(skb_unclone(frag, GFP_ATOMIC)))
154 goto err;
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400155 head = *headbuf = frag;
Jon Paul Maloy29322d02014-07-05 13:44:13 -0400156 *buf = NULL;
Jon Paul Maloy45c8b7b2015-10-19 11:33:00 -0400157 TIPC_SKB_CB(head)->tail = NULL;
158 if (skb_is_nonlinear(head)) {
159 skb_walk_frags(head, tail) {
160 TIPC_SKB_CB(head)->tail = tail;
161 }
162 } else {
163 skb_frag_list_init(head);
164 }
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400165 return 0;
166 }
Jon Paul Maloy13e9b992014-07-25 14:48:09 -0400167
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400168 if (!head)
Jon Paul Maloy13e9b992014-07-25 14:48:09 -0400169 goto err;
170
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400171 if (skb_try_coalesce(head, frag, &headstolen, &delta)) {
172 kfree_skb_partial(frag, headstolen);
173 } else {
Jon Paul Maloy13e9b992014-07-25 14:48:09 -0400174 tail = TIPC_SKB_CB(head)->tail;
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400175 if (!skb_has_frag_list(head))
176 skb_shinfo(head)->frag_list = frag;
177 else
178 tail->next = frag;
179 head->truesize += frag->truesize;
180 head->data_len += frag->len;
181 head->len += frag->len;
182 TIPC_SKB_CB(head)->tail = frag;
183 }
Jon Paul Maloy13e9b992014-07-25 14:48:09 -0400184
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400185 if (fragid == LAST_FRAGMENT) {
Tuong Lienfc1b6d62019-11-08 12:05:11 +0700186 TIPC_SKB_CB(head)->validated = 0;
Jon Maloyd618d092017-11-15 21:23:56 +0100187 if (unlikely(!tipc_msg_validate(&head)))
Jon Paul Maloy11495572015-03-13 16:08:07 -0400188 goto err;
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400189 *buf = head;
190 TIPC_SKB_CB(head)->tail = NULL;
191 *headbuf = NULL;
192 return 1;
193 }
194 *buf = NULL;
195 return 0;
Jon Paul Maloy13e9b992014-07-25 14:48:09 -0400196err:
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400197 kfree_skb(*buf);
Jon Paul Maloy29322d02014-07-05 13:44:13 -0400198 kfree_skb(*headbuf);
199 *buf = *headbuf = NULL;
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400200 return 0;
201}
Jon Paul Maloy4f1688b2014-06-25 20:41:32 -0500202
Jon Maloyc0bceb92019-10-30 14:00:41 +0100203/**
204 * tipc_msg_append(): Append data to tail of an existing buffer queue
205 * @hdr: header to be used
206 * @m: the data to be appended
207 * @mss: max allowable size of buffer
208 * @dlen: size of data to be appended
209 * @txq: queue to appand to
210 * Returns the number og 1k blocks appended or errno value
211 */
212int tipc_msg_append(struct tipc_msg *_hdr, struct msghdr *m, int dlen,
213 int mss, struct sk_buff_head *txq)
214{
215 struct sk_buff *skb, *prev;
216 int accounted, total, curr;
217 int mlen, cpy, rem = dlen;
218 struct tipc_msg *hdr;
219
220 skb = skb_peek_tail(txq);
221 accounted = skb ? msg_blocks(buf_msg(skb)) : 0;
222 total = accounted;
223
224 while (rem) {
225 if (!skb || skb->len >= mss) {
226 prev = skb;
227 skb = tipc_buf_acquire(mss, GFP_KERNEL);
228 if (unlikely(!skb))
229 return -ENOMEM;
230 skb_orphan(skb);
231 skb_trim(skb, MIN_H_SIZE);
232 hdr = buf_msg(skb);
233 skb_copy_to_linear_data(skb, _hdr, MIN_H_SIZE);
234 msg_set_hdr_sz(hdr, MIN_H_SIZE);
235 msg_set_size(hdr, MIN_H_SIZE);
236 __skb_queue_tail(txq, skb);
237 total += 1;
238 if (prev)
239 msg_set_ack_required(buf_msg(prev), 0);
240 msg_set_ack_required(hdr, 1);
241 }
242 hdr = buf_msg(skb);
243 curr = msg_blocks(hdr);
244 mlen = msg_size(hdr);
245 cpy = min_t(int, rem, mss - mlen);
246 if (cpy != copy_from_iter(skb->data + mlen, cpy, &m->msg_iter))
247 return -EFAULT;
248 msg_set_size(hdr, mlen + cpy);
249 skb_put(skb, cpy);
250 rem -= cpy;
251 total += msg_blocks(hdr) - curr;
252 }
253 return total - accounted;
254}
255
Jon Paul Maloycf2157f2015-03-13 16:08:06 -0400256/* tipc_msg_validate - validate basic format of received message
257 *
258 * This routine ensures a TIPC message has an acceptable header, and at least
259 * as much data as the header indicates it should. The routine also ensures
260 * that the entire message header is stored in the main fragment of the message
261 * buffer, to simplify future access to message header fields.
262 *
263 * Note: Having extra info present in the message header or data areas is OK.
264 * TIPC will ignore the excess, under the assumption that it is optional info
265 * introduced by a later release of the protocol.
266 */
Jon Maloyd618d092017-11-15 21:23:56 +0100267bool tipc_msg_validate(struct sk_buff **_skb)
Jon Paul Maloycf2157f2015-03-13 16:08:06 -0400268{
Jon Maloyd618d092017-11-15 21:23:56 +0100269 struct sk_buff *skb = *_skb;
270 struct tipc_msg *hdr;
Jon Paul Maloycf2157f2015-03-13 16:08:06 -0400271 int msz, hsz;
272
Jon Maloyd618d092017-11-15 21:23:56 +0100273 /* Ensure that flow control ratio condition is satisfied */
Hoang Le55b32802018-02-08 17:16:25 +0100274 if (unlikely(skb->truesize / buf_roundup_len(skb) >= 4)) {
275 skb = skb_copy_expand(skb, BUF_HEADROOM, 0, GFP_ATOMIC);
Jon Maloyd618d092017-11-15 21:23:56 +0100276 if (!skb)
277 return false;
278 kfree_skb(*_skb);
279 *_skb = skb;
280 }
281
Jon Paul Maloycf2157f2015-03-13 16:08:06 -0400282 if (unlikely(TIPC_SKB_CB(skb)->validated))
283 return true;
Tuong Lienfc1b6d62019-11-08 12:05:11 +0700284
Jon Paul Maloycf2157f2015-03-13 16:08:06 -0400285 if (unlikely(!pskb_may_pull(skb, MIN_H_SIZE)))
286 return false;
287
288 hsz = msg_hdr_sz(buf_msg(skb));
289 if (unlikely(hsz < MIN_H_SIZE) || (hsz > MAX_H_SIZE))
290 return false;
291 if (unlikely(!pskb_may_pull(skb, hsz)))
292 return false;
293
Jon Maloyd618d092017-11-15 21:23:56 +0100294 hdr = buf_msg(skb);
295 if (unlikely(msg_version(hdr) != TIPC_VERSION))
Jon Paul Maloycf2157f2015-03-13 16:08:06 -0400296 return false;
297
Jon Maloyd618d092017-11-15 21:23:56 +0100298 msz = msg_size(hdr);
Jon Paul Maloycf2157f2015-03-13 16:08:06 -0400299 if (unlikely(msz < hsz))
300 return false;
301 if (unlikely((msz - hsz) > TIPC_MAX_USER_MSG_SIZE))
302 return false;
303 if (unlikely(skb->len < msz))
304 return false;
305
Tuong Lienfc1b6d62019-11-08 12:05:11 +0700306 TIPC_SKB_CB(skb)->validated = 1;
Jon Paul Maloycf2157f2015-03-13 16:08:06 -0400307 return true;
308}
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500309
310/**
Tuong Lien2320bcd2019-07-24 08:56:12 +0700311 * tipc_msg_fragment - build a fragment skb list for TIPC message
312 *
313 * @skb: TIPC message skb
314 * @hdr: internal msg header to be put on the top of the fragments
315 * @pktmax: max size of a fragment incl. the header
316 * @frags: returned fragment skb list
317 *
318 * Returns 0 if the fragmentation is successful, otherwise: -EINVAL
319 * or -ENOMEM
320 */
321int tipc_msg_fragment(struct sk_buff *skb, const struct tipc_msg *hdr,
322 int pktmax, struct sk_buff_head *frags)
323{
324 int pktno, nof_fragms, dsz, dmax, eat;
325 struct tipc_msg *_hdr;
326 struct sk_buff *_skb;
327 u8 *data;
328
329 /* Non-linear buffer? */
330 if (skb_linearize(skb))
331 return -ENOMEM;
332
333 data = (u8 *)skb->data;
334 dsz = msg_size(buf_msg(skb));
335 dmax = pktmax - INT_H_SIZE;
336 if (dsz <= dmax || !dmax)
337 return -EINVAL;
338
339 nof_fragms = dsz / dmax + 1;
340 for (pktno = 1; pktno <= nof_fragms; pktno++) {
341 if (pktno < nof_fragms)
342 eat = dmax;
343 else
344 eat = dsz % dmax;
345 /* Allocate a new fragment */
346 _skb = tipc_buf_acquire(INT_H_SIZE + eat, GFP_ATOMIC);
347 if (!_skb)
348 goto error;
349 skb_orphan(_skb);
350 __skb_queue_tail(frags, _skb);
351 /* Copy header & data to the fragment */
352 skb_copy_to_linear_data(_skb, hdr, INT_H_SIZE);
353 skb_copy_to_linear_data_offset(_skb, INT_H_SIZE, data, eat);
354 data += eat;
355 /* Update the fragment's header */
356 _hdr = buf_msg(_skb);
357 msg_set_fragm_no(_hdr, pktno);
358 msg_set_nof_fragms(_hdr, nof_fragms);
359 msg_set_size(_hdr, INT_H_SIZE + eat);
360 }
361 return 0;
362
363error:
364 __skb_queue_purge(frags);
365 __skb_queue_head_init(frags);
366 return -ENOMEM;
367}
368
369/**
Jon Paul Maloy9fbfb8b2014-07-16 20:41:03 -0400370 * tipc_msg_build - create buffer chain containing specified header and data
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500371 * @mhdr: Message header, to be prepended to data
Al Viro45dcc682014-11-15 01:16:27 -0500372 * @m: User message
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500373 * @dsz: Total length of user data
374 * @pktmax: Max packet size that can be used
Ying Xuea6ca1092014-11-26 11:41:55 +0800375 * @list: Buffer or chain of buffers to be returned to caller
376 *
Jon Maloy4c94cc22017-11-30 16:47:25 +0100377 * Note that the recursive call we are making here is safe, since it can
378 * logically go only one further level down.
379 *
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500380 * Returns message data size or errno: -ENOMEM, -EFAULT
381 */
Jon Maloy4c94cc22017-11-30 16:47:25 +0100382int tipc_msg_build(struct tipc_msg *mhdr, struct msghdr *m, int offset,
383 int dsz, int pktmax, struct sk_buff_head *list)
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500384{
385 int mhsz = msg_hdr_sz(mhdr);
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500386 struct tipc_msg pkthdr;
Jon Maloy4c94cc22017-11-30 16:47:25 +0100387 int msz = mhsz + dsz;
388 int pktrem = pktmax;
Ying Xuea6ca1092014-11-26 11:41:55 +0800389 struct sk_buff *skb;
Jon Maloy4c94cc22017-11-30 16:47:25 +0100390 int drem = dsz;
391 int pktno = 1;
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500392 char *pktpos;
Jon Maloy4c94cc22017-11-30 16:47:25 +0100393 int pktsz;
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500394 int rc;
Ying Xuea6ca1092014-11-26 11:41:55 +0800395
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500396 msg_set_size(mhdr, msz);
397
398 /* No fragmentation needed? */
399 if (likely(msz <= pktmax)) {
Parthasarathy Bhuvaragan57d5f642017-01-13 15:46:25 +0100400 skb = tipc_buf_acquire(msz, GFP_KERNEL);
Jon Maloy4c94cc22017-11-30 16:47:25 +0100401
402 /* Fall back to smaller MTU if node local message */
403 if (unlikely(!skb)) {
404 if (pktmax != MAX_MSG_SIZE)
405 return -ENOMEM;
406 rc = tipc_msg_build(mhdr, m, offset, dsz, FB_MTU, list);
407 if (rc != dsz)
408 return rc;
409 if (tipc_msg_assemble(list))
410 return dsz;
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500411 return -ENOMEM;
Jon Maloy4c94cc22017-11-30 16:47:25 +0100412 }
Ying Xuec93d3ba2015-01-09 15:27:04 +0800413 skb_orphan(skb);
Ying Xuea6ca1092014-11-26 11:41:55 +0800414 __skb_queue_tail(list, skb);
415 skb_copy_to_linear_data(skb, mhdr, mhsz);
416 pktpos = skb->data + mhsz;
Al Virocbbd26b2016-11-01 22:09:04 -0400417 if (copy_from_iter_full(pktpos, dsz, &m->msg_iter))
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500418 return dsz;
419 rc = -EFAULT;
420 goto error;
421 }
422
423 /* Prepare reusable fragment header */
Jon Paul Maloyc5898632015-02-05 08:36:36 -0500424 tipc_msg_init(msg_prevnode(mhdr), &pkthdr, MSG_FRAGMENTER,
425 FIRST_FRAGMENT, INT_H_SIZE, msg_destnode(mhdr));
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500426 msg_set_size(&pkthdr, pktmax);
427 msg_set_fragm_no(&pkthdr, pktno);
Jon Paul Maloye3eea1e2015-03-13 16:08:11 -0400428 msg_set_importance(&pkthdr, msg_importance(mhdr));
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500429
430 /* Prepare first fragment */
Parthasarathy Bhuvaragan57d5f642017-01-13 15:46:25 +0100431 skb = tipc_buf_acquire(pktmax, GFP_KERNEL);
Ying Xuea6ca1092014-11-26 11:41:55 +0800432 if (!skb)
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500433 return -ENOMEM;
Ying Xuec93d3ba2015-01-09 15:27:04 +0800434 skb_orphan(skb);
Ying Xuea6ca1092014-11-26 11:41:55 +0800435 __skb_queue_tail(list, skb);
436 pktpos = skb->data;
437 skb_copy_to_linear_data(skb, &pkthdr, INT_H_SIZE);
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500438 pktpos += INT_H_SIZE;
439 pktrem -= INT_H_SIZE;
Ying Xuea6ca1092014-11-26 11:41:55 +0800440 skb_copy_to_linear_data_offset(skb, INT_H_SIZE, mhdr, mhsz);
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500441 pktpos += mhsz;
442 pktrem -= mhsz;
443
444 do {
445 if (drem < pktrem)
446 pktrem = drem;
447
Al Virocbbd26b2016-11-01 22:09:04 -0400448 if (!copy_from_iter_full(pktpos, pktrem, &m->msg_iter)) {
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500449 rc = -EFAULT;
450 goto error;
451 }
452 drem -= pktrem;
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500453
454 if (!drem)
455 break;
456
457 /* Prepare new fragment: */
458 if (drem < (pktmax - INT_H_SIZE))
459 pktsz = drem + INT_H_SIZE;
460 else
461 pktsz = pktmax;
Parthasarathy Bhuvaragan57d5f642017-01-13 15:46:25 +0100462 skb = tipc_buf_acquire(pktsz, GFP_KERNEL);
Ying Xuea6ca1092014-11-26 11:41:55 +0800463 if (!skb) {
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500464 rc = -ENOMEM;
465 goto error;
466 }
Ying Xuec93d3ba2015-01-09 15:27:04 +0800467 skb_orphan(skb);
Ying Xuea6ca1092014-11-26 11:41:55 +0800468 __skb_queue_tail(list, skb);
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500469 msg_set_type(&pkthdr, FRAGMENT);
470 msg_set_size(&pkthdr, pktsz);
471 msg_set_fragm_no(&pkthdr, ++pktno);
Ying Xuea6ca1092014-11-26 11:41:55 +0800472 skb_copy_to_linear_data(skb, &pkthdr, INT_H_SIZE);
473 pktpos = skb->data + INT_H_SIZE;
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500474 pktrem = pktsz - INT_H_SIZE;
475
476 } while (1);
Ying Xuea6ca1092014-11-26 11:41:55 +0800477 msg_set_type(buf_msg(skb), LAST_FRAGMENT);
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500478 return dsz;
479error:
Ying Xuea6ca1092014-11-26 11:41:55 +0800480 __skb_queue_purge(list);
481 __skb_queue_head_init(list);
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500482 return rc;
483}
484
Jon Paul Maloy4f1688b2014-06-25 20:41:32 -0500485/**
Tuong Lien06e7c702019-11-01 09:58:57 +0700486 * tipc_msg_bundle - Append contents of a buffer to tail of an existing one
487 * @bskb: the bundle buffer to append to
488 * @msg: message to be appended
489 * @max: max allowable size for the bundle buffer
490 *
491 * Returns "true" if bundling has been performed, otherwise "false"
Jon Paul Maloy4f1688b2014-06-25 20:41:32 -0500492 */
Tuong Lien06e7c702019-11-01 09:58:57 +0700493static bool tipc_msg_bundle(struct sk_buff *bskb, struct tipc_msg *msg,
494 u32 max)
Jon Paul Maloy4f1688b2014-06-25 20:41:32 -0500495{
Tuong Lien06e7c702019-11-01 09:58:57 +0700496 struct tipc_msg *bmsg = buf_msg(bskb);
497 u32 msz, bsz, offset, pad;
Jon Paul Maloy4f1688b2014-06-25 20:41:32 -0500498
Tuong Lien06e7c702019-11-01 09:58:57 +0700499 msz = msg_size(msg);
Jon Paul Maloy05dcc5a2015-03-13 16:08:10 -0400500 bsz = msg_size(bmsg);
Tuong Lien06e7c702019-11-01 09:58:57 +0700501 offset = align(bsz);
502 pad = offset - bsz;
Jon Paul Maloy05dcc5a2015-03-13 16:08:10 -0400503
Tuong Lien06e7c702019-11-01 09:58:57 +0700504 if (unlikely(skb_tailroom(bskb) < (pad + msz)))
Jon Paul Maloy4f1688b2014-06-25 20:41:32 -0500505 return false;
Tuong Lien06e7c702019-11-01 09:58:57 +0700506 if (unlikely(max < (offset + msz)))
Jon Paul Maloyf21e8972015-05-14 10:46:17 -0400507 return false;
Jon Paul Maloy4f1688b2014-06-25 20:41:32 -0500508
Tuong Lien06e7c702019-11-01 09:58:57 +0700509 skb_put(bskb, pad + msz);
510 skb_copy_to_linear_data_offset(bskb, offset, msg, msz);
511 msg_set_size(bmsg, offset + msz);
Jon Paul Maloy4f1688b2014-06-25 20:41:32 -0500512 msg_set_msgcnt(bmsg, msg_msgcnt(bmsg) + 1);
Jon Paul Maloy4f1688b2014-06-25 20:41:32 -0500513 return true;
514}
515
516/**
Tuong Lien06e7c702019-11-01 09:58:57 +0700517 * tipc_msg_try_bundle - Try to bundle a new message to the last one
518 * @tskb: the last/target message to which the new one will be appended
519 * @skb: the new message skb pointer
520 * @mss: max message size (header inclusive)
521 * @dnode: destination node for the message
522 * @new_bundle: if this call made a new bundle or not
523 *
524 * Return: "true" if the new message skb is potential for bundling this time or
525 * later, in the case a bundling has been done this time, the skb is consumed
526 * (the skb pointer = NULL).
527 * Otherwise, "false" if the skb cannot be bundled at all.
528 */
529bool tipc_msg_try_bundle(struct sk_buff *tskb, struct sk_buff **skb, u32 mss,
530 u32 dnode, bool *new_bundle)
531{
532 struct tipc_msg *msg, *inner, *outer;
533 u32 tsz;
534
535 /* First, check if the new buffer is suitable for bundling */
536 msg = buf_msg(*skb);
537 if (msg_user(msg) == MSG_FRAGMENTER)
538 return false;
539 if (msg_user(msg) == TUNNEL_PROTOCOL)
540 return false;
541 if (msg_user(msg) == BCAST_PROTOCOL)
542 return false;
543 if (mss <= INT_H_SIZE + msg_size(msg))
544 return false;
545
546 /* Ok, but the last/target buffer can be empty? */
547 if (unlikely(!tskb))
548 return true;
549
550 /* Is it a bundle already? Try to bundle the new message to it */
551 if (msg_user(buf_msg(tskb)) == MSG_BUNDLER) {
552 *new_bundle = false;
553 goto bundle;
554 }
555
556 /* Make a new bundle of the two messages if possible */
557 tsz = msg_size(buf_msg(tskb));
558 if (unlikely(mss < align(INT_H_SIZE + tsz) + msg_size(msg)))
559 return true;
560 if (unlikely(pskb_expand_head(tskb, INT_H_SIZE, mss - tsz - INT_H_SIZE,
561 GFP_ATOMIC)))
562 return true;
563 inner = buf_msg(tskb);
564 skb_push(tskb, INT_H_SIZE);
565 outer = buf_msg(tskb);
566 tipc_msg_init(msg_prevnode(inner), outer, MSG_BUNDLER, 0, INT_H_SIZE,
567 dnode);
568 msg_set_importance(outer, msg_importance(inner));
569 msg_set_size(outer, INT_H_SIZE + tsz);
570 msg_set_msgcnt(outer, 1);
571 *new_bundle = true;
572
573bundle:
574 if (likely(tipc_msg_bundle(tskb, msg, mss))) {
575 consume_skb(*skb);
576 *skb = NULL;
577 }
578 return true;
579}
580
581/**
Jon Paul Maloyc637c102015-02-05 08:36:41 -0500582 * tipc_msg_extract(): extract bundled inner packet from buffer
Jon Paul Maloyc1336ee2015-03-13 16:08:08 -0400583 * @skb: buffer to be extracted from.
Jon Paul Maloyc637c102015-02-05 08:36:41 -0500584 * @iskb: extracted inner buffer, to be returned
Jon Paul Maloyc1336ee2015-03-13 16:08:08 -0400585 * @pos: position in outer message of msg to be extracted.
586 * Returns position of next msg
Jon Paul Maloyc637c102015-02-05 08:36:41 -0500587 * Consumes outer buffer when last packet extracted
588 * Returns true when when there is an extracted buffer, otherwise false
589 */
590bool tipc_msg_extract(struct sk_buff *skb, struct sk_buff **iskb, int *pos)
591{
Tung Nguyenef9be752018-06-28 22:25:04 +0200592 struct tipc_msg *hdr, *ihdr;
593 int imsz;
Jon Paul Maloyc637c102015-02-05 08:36:41 -0500594
Jon Paul Maloyc1336ee2015-03-13 16:08:08 -0400595 *iskb = NULL;
Jon Paul Maloy11495572015-03-13 16:08:07 -0400596 if (unlikely(skb_linearize(skb)))
Jon Paul Maloyc637c102015-02-05 08:36:41 -0500597 goto none;
Jon Paul Maloyc637c102015-02-05 08:36:41 -0500598
Tung Nguyenef9be752018-06-28 22:25:04 +0200599 hdr = buf_msg(skb);
600 if (unlikely(*pos > (msg_data_sz(hdr) - MIN_H_SIZE)))
Jon Paul Maloyc637c102015-02-05 08:36:41 -0500601 goto none;
Jon Paul Maloyc1336ee2015-03-13 16:08:08 -0400602
Tung Nguyenef9be752018-06-28 22:25:04 +0200603 ihdr = (struct tipc_msg *)(msg_data(hdr) + *pos);
604 imsz = msg_size(ihdr);
605
606 if ((*pos + imsz) > msg_data_sz(hdr))
Jon Paul Maloyc637c102015-02-05 08:36:41 -0500607 goto none;
Tung Nguyenef9be752018-06-28 22:25:04 +0200608
609 *iskb = tipc_buf_acquire(imsz, GFP_ATOMIC);
610 if (!*iskb)
611 goto none;
612
613 skb_copy_to_linear_data(*iskb, ihdr, imsz);
Jon Maloyd618d092017-11-15 21:23:56 +0100614 if (unlikely(!tipc_msg_validate(iskb)))
Jon Paul Maloyc1336ee2015-03-13 16:08:08 -0400615 goto none;
Tung Nguyenef9be752018-06-28 22:25:04 +0200616
Jon Paul Maloyc637c102015-02-05 08:36:41 -0500617 *pos += align(imsz);
618 return true;
619none:
620 kfree_skb(skb);
Jon Paul Maloyc1336ee2015-03-13 16:08:08 -0400621 kfree_skb(*iskb);
Jon Paul Maloyc637c102015-02-05 08:36:41 -0500622 *iskb = NULL;
623 return false;
624}
625
626/**
Jon Paul Maloy8db1bae2014-06-25 20:41:35 -0500627 * tipc_msg_reverse(): swap source and destination addresses and add error code
Jon Paul Maloy29042e12015-07-22 10:11:18 -0400628 * @own_node: originating node id for reversed message
Jon Maloy5cbdbd12018-09-28 20:23:18 +0200629 * @skb: buffer containing message to be reversed; will be consumed
Jon Paul Maloy29042e12015-07-22 10:11:18 -0400630 * @err: error code to be set in message, if any
Jon Maloy5cbdbd12018-09-28 20:23:18 +0200631 * Replaces consumed buffer with new one when successful
Jon Paul Maloy8db1bae2014-06-25 20:41:35 -0500632 * Returns true if success, otherwise false
633 */
Jon Paul Maloybcd3ffd2015-07-22 10:11:19 -0400634bool tipc_msg_reverse(u32 own_node, struct sk_buff **skb, int err)
Jon Paul Maloy8db1bae2014-06-25 20:41:35 -0500635{
Jon Paul Maloy29042e12015-07-22 10:11:18 -0400636 struct sk_buff *_skb = *skb;
Jon Maloy5cbdbd12018-09-28 20:23:18 +0200637 struct tipc_msg *_hdr, *hdr;
638 int hlen, dlen;
Jon Paul Maloy8db1bae2014-06-25 20:41:35 -0500639
Jon Paul Maloy29042e12015-07-22 10:11:18 -0400640 if (skb_linearize(_skb))
Jon Paul Maloy8db1bae2014-06-25 20:41:35 -0500641 goto exit;
Jon Maloy5cbdbd12018-09-28 20:23:18 +0200642 _hdr = buf_msg(_skb);
643 dlen = min_t(uint, msg_data_sz(_hdr), MAX_FORWARD_SIZE);
644 hlen = msg_hdr_sz(_hdr);
645
646 if (msg_dest_droppable(_hdr))
Jon Paul Maloyac0074e2014-06-25 20:41:41 -0500647 goto exit;
Jon Maloy5cbdbd12018-09-28 20:23:18 +0200648 if (msg_errcode(_hdr))
Jon Paul Maloy8db1bae2014-06-25 20:41:35 -0500649 goto exit;
Jon Paul Maloy29042e12015-07-22 10:11:18 -0400650
Jon Maloy5cbdbd12018-09-28 20:23:18 +0200651 /* Never return SHORT header */
652 if (hlen == SHORT_H_SIZE)
653 hlen = BASIC_H_SIZE;
Jon Paul Maloy29042e12015-07-22 10:11:18 -0400654
Tung Nguyen67879272018-09-28 20:23:22 +0200655 /* Don't return data along with SYN+, - sender has a clone */
656 if (msg_is_syn(_hdr) && err == TIPC_ERR_OVERLOAD)
657 dlen = 0;
658
Jon Maloy5cbdbd12018-09-28 20:23:18 +0200659 /* Allocate new buffer to return */
660 *skb = tipc_buf_acquire(hlen + dlen, GFP_ATOMIC);
661 if (!*skb)
662 goto exit;
663 memcpy((*skb)->data, _skb->data, msg_hdr_sz(_hdr));
664 memcpy((*skb)->data + hlen, msg_data(_hdr), dlen);
Jon Paul Maloy29042e12015-07-22 10:11:18 -0400665
Jon Maloy5cbdbd12018-09-28 20:23:18 +0200666 /* Build reverse header in new buffer */
667 hdr = buf_msg(*skb);
668 msg_set_hdr_sz(hdr, hlen);
Jon Paul Maloy29042e12015-07-22 10:11:18 -0400669 msg_set_errcode(hdr, err);
Jon Paul Maloy59a361b2017-08-14 18:28:49 +0200670 msg_set_non_seq(hdr, 0);
Jon Maloy5cbdbd12018-09-28 20:23:18 +0200671 msg_set_origport(hdr, msg_destport(_hdr));
672 msg_set_destport(hdr, msg_origport(_hdr));
673 msg_set_destnode(hdr, msg_prevnode(_hdr));
Jon Paul Maloy29042e12015-07-22 10:11:18 -0400674 msg_set_prevnode(hdr, own_node);
675 msg_set_orignode(hdr, own_node);
Jon Maloy5cbdbd12018-09-28 20:23:18 +0200676 msg_set_size(hdr, hlen + dlen);
Jon Paul Maloy29042e12015-07-22 10:11:18 -0400677 skb_orphan(_skb);
Jon Maloy5cbdbd12018-09-28 20:23:18 +0200678 kfree_skb(_skb);
Jon Paul Maloy8db1bae2014-06-25 20:41:35 -0500679 return true;
680exit:
Jon Paul Maloy29042e12015-07-22 10:11:18 -0400681 kfree_skb(_skb);
682 *skb = NULL;
Jon Paul Maloy8db1bae2014-06-25 20:41:35 -0500683 return false;
684}
Jon Paul Maloy5a379072014-06-25 20:41:36 -0500685
Tung Nguyen67879272018-09-28 20:23:22 +0200686bool tipc_msg_skb_clone(struct sk_buff_head *msg, struct sk_buff_head *cpy)
687{
688 struct sk_buff *skb, *_skb;
689
690 skb_queue_walk(msg, skb) {
691 _skb = skb_clone(skb, GFP_ATOMIC);
692 if (!_skb) {
693 __skb_queue_purge(cpy);
694 pr_err_ratelimited("Failed to clone buffer chain\n");
695 return false;
696 }
697 __skb_queue_tail(cpy, _skb);
698 }
699 return true;
700}
701
Jon Paul Maloy5a379072014-06-25 20:41:36 -0500702/**
Jon Paul Maloye3a77562015-02-05 08:36:39 -0500703 * tipc_msg_lookup_dest(): try to find new destination for named message
704 * @skb: the buffer containing the message.
Jon Paul Maloycda36962015-07-22 10:11:20 -0400705 * @err: error code to be used by caller if lookup fails
Jon Paul Maloy5a379072014-06-25 20:41:36 -0500706 * Does not consume buffer
Jon Paul Maloye3a77562015-02-05 08:36:39 -0500707 * Returns true if a destination is found, false otherwise
Jon Paul Maloy5a379072014-06-25 20:41:36 -0500708 */
Jon Paul Maloycda36962015-07-22 10:11:20 -0400709bool tipc_msg_lookup_dest(struct net *net, struct sk_buff *skb, int *err)
Jon Paul Maloy5a379072014-06-25 20:41:36 -0500710{
Jon Paul Maloye3a77562015-02-05 08:36:39 -0500711 struct tipc_msg *msg = buf_msg(skb);
Jon Paul Maloycda36962015-07-22 10:11:20 -0400712 u32 dport, dnode;
713 u32 onode = tipc_own_addr(net);
Jon Paul Maloy5a379072014-06-25 20:41:36 -0500714
Jon Paul Maloye3a77562015-02-05 08:36:39 -0500715 if (!msg_isdata(msg))
716 return false;
717 if (!msg_named(msg))
718 return false;
Jon Paul Maloyd4829942015-03-27 10:19:19 -0400719 if (msg_errcode(msg))
720 return false;
Parthasarathy Bhuvaraganaad06212017-09-29 10:02:54 +0200721 *err = TIPC_ERR_NO_NAME;
Jon Paul Maloye3a77562015-02-05 08:36:39 -0500722 if (skb_linearize(skb))
723 return false;
Erik Hugne4e3ae002015-09-18 10:46:31 +0200724 msg = buf_msg(skb);
Jon Paul Maloyd4829942015-03-27 10:19:19 -0400725 if (msg_reroute_cnt(msg))
Jon Paul Maloye3a77562015-02-05 08:36:39 -0500726 return false;
Jon Maloy928df182018-03-15 16:48:51 +0100727 dnode = tipc_scope2node(net, msg_lookup_scope(msg));
Ying Xue4ac1c8d2015-01-09 15:27:09 +0800728 dport = tipc_nametbl_translate(net, msg_nametype(msg),
Jon Paul Maloycda36962015-07-22 10:11:20 -0400729 msg_nameinst(msg), &dnode);
Jon Paul Maloy5a379072014-06-25 20:41:36 -0500730 if (!dport)
Jon Paul Maloye3a77562015-02-05 08:36:39 -0500731 return false;
Jon Paul Maloy5a379072014-06-25 20:41:36 -0500732 msg_incr_reroute_cnt(msg);
Jon Paul Maloycda36962015-07-22 10:11:20 -0400733 if (dnode != onode)
734 msg_set_prevnode(msg, onode);
735 msg_set_destnode(msg, dnode);
Jon Paul Maloy5a379072014-06-25 20:41:36 -0500736 msg_set_destport(msg, dport);
Jon Paul Maloye3a77562015-02-05 08:36:39 -0500737 *err = TIPC_OK;
Jon Maloya9e29712017-10-07 15:07:20 +0200738
739 if (!skb_cloned(skb))
740 return true;
741
Jon Paul Maloye3a77562015-02-05 08:36:39 -0500742 return true;
Jon Paul Maloy5a379072014-06-25 20:41:36 -0500743}
Jon Paul Maloy078bec82014-07-16 20:41:00 -0400744
Jon Maloy4c94cc22017-11-30 16:47:25 +0100745/* tipc_msg_assemble() - assemble chain of fragments into one message
746 */
747bool tipc_msg_assemble(struct sk_buff_head *list)
748{
749 struct sk_buff *skb, *tmp = NULL;
750
751 if (skb_queue_len(list) == 1)
752 return true;
753
754 while ((skb = __skb_dequeue(list))) {
755 skb->next = NULL;
756 if (tipc_buf_append(&tmp, &skb)) {
757 __skb_queue_tail(list, skb);
758 return true;
759 }
760 if (!tmp)
761 break;
762 }
763 __skb_queue_purge(list);
764 __skb_queue_head_init(list);
765 pr_warn("Failed do assemble buffer\n");
766 return false;
767}
768
Jon Paul Maloy078bec82014-07-16 20:41:00 -0400769/* tipc_msg_reassemble() - clone a buffer chain of fragments and
770 * reassemble the clones into one message
771 */
Jon Paul Maloy2f566122015-10-22 08:51:39 -0400772bool tipc_msg_reassemble(struct sk_buff_head *list, struct sk_buff_head *rcvq)
Jon Paul Maloy078bec82014-07-16 20:41:00 -0400773{
Jon Paul Maloy2f566122015-10-22 08:51:39 -0400774 struct sk_buff *skb, *_skb;
Ying Xuea6ca1092014-11-26 11:41:55 +0800775 struct sk_buff *frag = NULL;
Jon Paul Maloy078bec82014-07-16 20:41:00 -0400776 struct sk_buff *head = NULL;
Jon Paul Maloy2f566122015-10-22 08:51:39 -0400777 int hdr_len;
Jon Paul Maloy078bec82014-07-16 20:41:00 -0400778
779 /* Copy header if single buffer */
Ying Xuea6ca1092014-11-26 11:41:55 +0800780 if (skb_queue_len(list) == 1) {
781 skb = skb_peek(list);
Jon Paul Maloy2f566122015-10-22 08:51:39 -0400782 hdr_len = skb_headroom(skb) + msg_hdr_sz(buf_msg(skb));
783 _skb = __pskb_copy(skb, hdr_len, GFP_ATOMIC);
784 if (!_skb)
785 return false;
786 __skb_queue_tail(rcvq, _skb);
787 return true;
Jon Paul Maloy078bec82014-07-16 20:41:00 -0400788 }
789
790 /* Clone all fragments and reassemble */
Ying Xuea6ca1092014-11-26 11:41:55 +0800791 skb_queue_walk(list, skb) {
792 frag = skb_clone(skb, GFP_ATOMIC);
Jon Paul Maloy078bec82014-07-16 20:41:00 -0400793 if (!frag)
794 goto error;
795 frag->next = NULL;
796 if (tipc_buf_append(&head, &frag))
797 break;
798 if (!head)
799 goto error;
Jon Paul Maloy078bec82014-07-16 20:41:00 -0400800 }
Jon Paul Maloy2f566122015-10-22 08:51:39 -0400801 __skb_queue_tail(rcvq, frag);
802 return true;
Jon Paul Maloy078bec82014-07-16 20:41:00 -0400803error:
804 pr_warn("Failed do clone local mcast rcv buffer\n");
805 kfree_skb(head);
Jon Paul Maloy2f566122015-10-22 08:51:39 -0400806 return false;
Jon Paul Maloy078bec82014-07-16 20:41:00 -0400807}
Jon Paul Maloy8306f992015-10-15 14:52:43 -0400808
Jon Paul Maloya853e4c2017-01-18 13:50:52 -0500809bool tipc_msg_pskb_copy(u32 dst, struct sk_buff_head *msg,
810 struct sk_buff_head *cpy)
811{
812 struct sk_buff *skb, *_skb;
813
814 skb_queue_walk(msg, skb) {
815 _skb = pskb_copy(skb, GFP_ATOMIC);
816 if (!_skb) {
817 __skb_queue_purge(cpy);
818 return false;
819 }
820 msg_set_destnode(buf_msg(_skb), dst);
821 __skb_queue_tail(cpy, _skb);
822 }
823 return true;
824}
825
Jon Paul Maloy8306f992015-10-15 14:52:43 -0400826/* tipc_skb_queue_sorted(); sort pkt into list according to sequence number
827 * @list: list to be appended to
828 * @seqno: sequence number of buffer to add
829 * @skb: buffer to add
830 */
831void __tipc_skb_queue_sorted(struct sk_buff_head *list, u16 seqno,
832 struct sk_buff *skb)
833{
834 struct sk_buff *_skb, *tmp;
835
836 if (skb_queue_empty(list) || less(seqno, buf_seqno(skb_peek(list)))) {
837 __skb_queue_head(list, skb);
838 return;
839 }
840
841 if (more(seqno, buf_seqno(skb_peek_tail(list)))) {
842 __skb_queue_tail(list, skb);
843 return;
844 }
845
846 skb_queue_walk_safe(list, _skb, tmp) {
847 if (more(seqno, buf_seqno(_skb)))
848 continue;
849 if (seqno == buf_seqno(_skb))
850 break;
851 __skb_queue_before(list, _skb, skb);
852 return;
853 }
854 kfree_skb(skb);
855}
Jon Maloy64ac5f52017-10-13 11:04:20 +0200856
857void tipc_skb_reject(struct net *net, int err, struct sk_buff *skb,
858 struct sk_buff_head *xmitq)
859{
860 if (tipc_msg_reverse(tipc_own_addr(net), &skb, err))
861 __skb_queue_tail(xmitq, skb);
862}