blob: 2a78aa70157281f1e9771f0bcc426fa73d862cb3 [file] [log] [blame]
Per Lidenb97bf3f2006-01-02 19:04:38 +01001/*
2 * net/tipc/msg.c: TIPC message header routines
YOSHIFUJI Hideakic4307282007-02-09 23:25:21 +09003 *
Jon Paul Maloycf2157f2015-03-13 16:08:06 -04004 * Copyright (c) 2000-2006, 2014-2015, Ericsson AB
Allan Stephens741de3e2011-01-25 13:33:31 -05005 * Copyright (c) 2005, 2010-2011, Wind River Systems
Per Lidenb97bf3f2006-01-02 19:04:38 +01006 * All rights reserved.
7 *
Per Liden9ea1fd32006-01-11 13:30:43 +01008 * Redistribution and use in source and binary forms, with or without
Per Lidenb97bf3f2006-01-02 19:04:38 +01009 * modification, are permitted provided that the following conditions are met:
10 *
Per Liden9ea1fd32006-01-11 13:30:43 +010011 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the names of the copyright holders nor the names of its
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
Per Lidenb97bf3f2006-01-02 19:04:38 +010019 *
Per Liden9ea1fd32006-01-11 13:30:43 +010020 * Alternatively, this software may be distributed under the terms of the
21 * GNU General Public License ("GPL") version 2 as published by the Free
22 * Software Foundation.
23 *
24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
25 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
28 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
29 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
30 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
31 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
32 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
33 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
Per Lidenb97bf3f2006-01-02 19:04:38 +010034 * POSSIBILITY OF SUCH DAMAGE.
35 */
36
Ying Xuec93d3ba2015-01-09 15:27:04 +080037#include <net/sock.h>
Per Lidenb97bf3f2006-01-02 19:04:38 +010038#include "core.h"
Per Lidenb97bf3f2006-01-02 19:04:38 +010039#include "msg.h"
Jon Paul Maloy5a379072014-06-25 20:41:36 -050040#include "addr.h"
41#include "name_table.h"
Tuong Lienfc1b6d62019-11-08 12:05:11 +070042#include "crypto.h"
Per Lidenb97bf3f2006-01-02 19:04:38 +010043
Jon Paul Maloy8db1bae2014-06-25 20:41:35 -050044#define MAX_FORWARD_SIZE 1024
Tuong Lienfc1b6d62019-11-08 12:05:11 +070045#ifdef CONFIG_TIPC_CRYPTO
46#define BUF_HEADROOM ALIGN(((LL_MAX_HEADER + 48) + EHDR_MAX_SIZE), 16)
47#define BUF_TAILROOM (TIPC_AES_GCM_TAG_SIZE)
48#else
Jon Paul Maloy27777da2016-06-20 09:20:46 -040049#define BUF_HEADROOM (LL_MAX_HEADER + 48)
50#define BUF_TAILROOM 16
Tuong Lienfc1b6d62019-11-08 12:05:11 +070051#endif
Jon Paul Maloy8db1bae2014-06-25 20:41:35 -050052
Jon Paul Maloy4f1688b2014-06-25 20:41:32 -050053static unsigned int align(unsigned int i)
Allan Stephens23461e82010-05-11 14:30:18 +000054{
Jon Paul Maloy4f1688b2014-06-25 20:41:32 -050055 return (i + 3) & ~3u;
Allan Stephens23461e82010-05-11 14:30:18 +000056}
57
Ying Xue859fc7c2015-01-09 15:27:01 +080058/**
59 * tipc_buf_acquire - creates a TIPC message buffer
60 * @size: message size (including TIPC header)
61 *
62 * Returns a new buffer with data pointers set to the specified size.
63 *
64 * NOTE: Headroom is reserved to allow prepending of a data link header.
65 * There may also be unrequested tailroom present at the buffer's end.
66 */
Parthasarathy Bhuvaragan57d5f642017-01-13 15:46:25 +010067struct sk_buff *tipc_buf_acquire(u32 size, gfp_t gfp)
Ying Xue859fc7c2015-01-09 15:27:01 +080068{
69 struct sk_buff *skb;
Tuong Lienfc1b6d62019-11-08 12:05:11 +070070#ifdef CONFIG_TIPC_CRYPTO
71 unsigned int buf_size = (BUF_HEADROOM + size + BUF_TAILROOM + 3) & ~3u;
72#else
Ying Xue859fc7c2015-01-09 15:27:01 +080073 unsigned int buf_size = (BUF_HEADROOM + size + 3) & ~3u;
Tuong Lienfc1b6d62019-11-08 12:05:11 +070074#endif
Ying Xue859fc7c2015-01-09 15:27:01 +080075
Parthasarathy Bhuvaragan57d5f642017-01-13 15:46:25 +010076 skb = alloc_skb_fclone(buf_size, gfp);
Ying Xue859fc7c2015-01-09 15:27:01 +080077 if (skb) {
78 skb_reserve(skb, BUF_HEADROOM);
79 skb_put(skb, size);
80 skb->next = NULL;
81 }
82 return skb;
83}
84
Jon Paul Maloyc5898632015-02-05 08:36:36 -050085void tipc_msg_init(u32 own_node, struct tipc_msg *m, u32 user, u32 type,
86 u32 hsize, u32 dnode)
Allan Stephens23461e82010-05-11 14:30:18 +000087{
88 memset(m, 0, hsize);
89 msg_set_version(m);
90 msg_set_user(m, user);
91 msg_set_hdr_sz(m, hsize);
92 msg_set_size(m, hsize);
Jon Paul Maloyc5898632015-02-05 08:36:36 -050093 msg_set_prevnode(m, own_node);
Allan Stephens23461e82010-05-11 14:30:18 +000094 msg_set_type(m, type);
Jon Paul Maloy1dd0bd22014-08-22 18:09:06 -040095 if (hsize > SHORT_H_SIZE) {
Jon Paul Maloyc5898632015-02-05 08:36:36 -050096 msg_set_orignode(m, own_node);
97 msg_set_destnode(m, dnode);
Jon Paul Maloy1dd0bd22014-08-22 18:09:06 -040098 }
99}
100
Jon Paul Maloyc5898632015-02-05 08:36:36 -0500101struct sk_buff *tipc_msg_create(uint user, uint type,
Ying Xue34747532015-01-09 15:27:10 +0800102 uint hdr_sz, uint data_sz, u32 dnode,
103 u32 onode, u32 dport, u32 oport, int errcode)
Jon Paul Maloy1dd0bd22014-08-22 18:09:06 -0400104{
105 struct tipc_msg *msg;
106 struct sk_buff *buf;
107
Parthasarathy Bhuvaragan57d5f642017-01-13 15:46:25 +0100108 buf = tipc_buf_acquire(hdr_sz + data_sz, GFP_ATOMIC);
Jon Paul Maloy1dd0bd22014-08-22 18:09:06 -0400109 if (unlikely(!buf))
110 return NULL;
111
112 msg = buf_msg(buf);
Jon Paul Maloyc5898632015-02-05 08:36:36 -0500113 tipc_msg_init(onode, msg, user, type, hdr_sz, dnode);
Jon Paul Maloy1dd0bd22014-08-22 18:09:06 -0400114 msg_set_size(msg, hdr_sz + data_sz);
Jon Paul Maloy1dd0bd22014-08-22 18:09:06 -0400115 msg_set_origport(msg, oport);
116 msg_set_destport(msg, dport);
117 msg_set_errcode(msg, errcode);
118 if (hdr_sz > SHORT_H_SIZE) {
119 msg_set_orignode(msg, onode);
120 msg_set_destnode(msg, dnode);
121 }
122 return buf;
Allan Stephens23461e82010-05-11 14:30:18 +0000123}
124
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400125/* tipc_buf_append(): Append a buffer to the fragment list of another buffer
Jon Paul Maloy29322d02014-07-05 13:44:13 -0400126 * @*headbuf: in: NULL for first frag, otherwise value returned from prev call
127 * out: set when successful non-complete reassembly, otherwise NULL
128 * @*buf: in: the buffer to append. Always defined
stephen hemmingerb2ad5e52014-10-29 22:58:51 -0700129 * out: head buf after successful complete reassembly, otherwise NULL
Jon Paul Maloy29322d02014-07-05 13:44:13 -0400130 * Returns 1 when reassembly complete, otherwise 0
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400131 */
132int tipc_buf_append(struct sk_buff **headbuf, struct sk_buff **buf)
133{
134 struct sk_buff *head = *headbuf;
135 struct sk_buff *frag = *buf;
Jon Paul Maloy45c8b7b2015-10-19 11:33:00 -0400136 struct sk_buff *tail = NULL;
Jon Paul Maloy13e9b992014-07-25 14:48:09 -0400137 struct tipc_msg *msg;
138 u32 fragid;
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400139 int delta;
Jon Paul Maloy13e9b992014-07-25 14:48:09 -0400140 bool headstolen;
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400141
Jon Paul Maloy13e9b992014-07-25 14:48:09 -0400142 if (!frag)
143 goto err;
144
145 msg = buf_msg(frag);
146 fragid = msg_type(msg);
147 frag->next = NULL;
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400148 skb_pull(frag, msg_hdr_sz(msg));
149
150 if (fragid == FIRST_FRAGMENT) {
Jon Paul Maloy13e9b992014-07-25 14:48:09 -0400151 if (unlikely(head))
152 goto err;
Cong Wanged429892020-10-07 21:12:50 -0700153 if (skb_cloned(frag))
154 frag = skb_copy(frag, GFP_ATOMIC);
Xin Longff48b622020-09-13 19:37:31 +0800155 if (unlikely(!frag))
Jon Paul Maloy13e9b992014-07-25 14:48:09 -0400156 goto err;
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400157 head = *headbuf = frag;
Jon Paul Maloy29322d02014-07-05 13:44:13 -0400158 *buf = NULL;
Jon Paul Maloy45c8b7b2015-10-19 11:33:00 -0400159 TIPC_SKB_CB(head)->tail = NULL;
160 if (skb_is_nonlinear(head)) {
161 skb_walk_frags(head, tail) {
162 TIPC_SKB_CB(head)->tail = tail;
163 }
164 } else {
165 skb_frag_list_init(head);
166 }
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400167 return 0;
168 }
Jon Paul Maloy13e9b992014-07-25 14:48:09 -0400169
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400170 if (!head)
Jon Paul Maloy13e9b992014-07-25 14:48:09 -0400171 goto err;
172
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400173 if (skb_try_coalesce(head, frag, &headstolen, &delta)) {
174 kfree_skb_partial(frag, headstolen);
175 } else {
Jon Paul Maloy13e9b992014-07-25 14:48:09 -0400176 tail = TIPC_SKB_CB(head)->tail;
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400177 if (!skb_has_frag_list(head))
178 skb_shinfo(head)->frag_list = frag;
179 else
180 tail->next = frag;
181 head->truesize += frag->truesize;
182 head->data_len += frag->len;
183 head->len += frag->len;
184 TIPC_SKB_CB(head)->tail = frag;
185 }
Jon Paul Maloy13e9b992014-07-25 14:48:09 -0400186
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400187 if (fragid == LAST_FRAGMENT) {
Tuong Lienfc1b6d62019-11-08 12:05:11 +0700188 TIPC_SKB_CB(head)->validated = 0;
Jon Maloyd618d092017-11-15 21:23:56 +0100189 if (unlikely(!tipc_msg_validate(&head)))
Jon Paul Maloy11495572015-03-13 16:08:07 -0400190 goto err;
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400191 *buf = head;
192 TIPC_SKB_CB(head)->tail = NULL;
193 *headbuf = NULL;
194 return 1;
195 }
196 *buf = NULL;
197 return 0;
Jon Paul Maloy13e9b992014-07-25 14:48:09 -0400198err:
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400199 kfree_skb(*buf);
Jon Paul Maloy29322d02014-07-05 13:44:13 -0400200 kfree_skb(*headbuf);
201 *buf = *headbuf = NULL;
Jon Paul Maloy37e22162014-05-14 05:39:12 -0400202 return 0;
203}
Jon Paul Maloy4f1688b2014-06-25 20:41:32 -0500204
Jon Maloyc0bceb92019-10-30 14:00:41 +0100205/**
206 * tipc_msg_append(): Append data to tail of an existing buffer queue
Andrew Lunnd8141202020-07-13 01:15:14 +0200207 * @_hdr: header to be used
Jon Maloyc0bceb92019-10-30 14:00:41 +0100208 * @m: the data to be appended
209 * @mss: max allowable size of buffer
210 * @dlen: size of data to be appended
211 * @txq: queue to appand to
212 * Returns the number og 1k blocks appended or errno value
213 */
214int tipc_msg_append(struct tipc_msg *_hdr, struct msghdr *m, int dlen,
215 int mss, struct sk_buff_head *txq)
216{
YueHaibing8298a412020-05-28 07:43:59 +0000217 struct sk_buff *skb;
Jon Maloyc0bceb92019-10-30 14:00:41 +0100218 int accounted, total, curr;
219 int mlen, cpy, rem = dlen;
220 struct tipc_msg *hdr;
221
222 skb = skb_peek_tail(txq);
223 accounted = skb ? msg_blocks(buf_msg(skb)) : 0;
224 total = accounted;
225
Tuong Lien5e9eeccc2020-06-03 12:06:01 +0700226 do {
Jon Maloyc0bceb92019-10-30 14:00:41 +0100227 if (!skb || skb->len >= mss) {
Jon Maloyc0bceb92019-10-30 14:00:41 +0100228 skb = tipc_buf_acquire(mss, GFP_KERNEL);
229 if (unlikely(!skb))
230 return -ENOMEM;
231 skb_orphan(skb);
232 skb_trim(skb, MIN_H_SIZE);
233 hdr = buf_msg(skb);
234 skb_copy_to_linear_data(skb, _hdr, MIN_H_SIZE);
235 msg_set_hdr_sz(hdr, MIN_H_SIZE);
236 msg_set_size(hdr, MIN_H_SIZE);
237 __skb_queue_tail(txq, skb);
238 total += 1;
Jon Maloyc0bceb92019-10-30 14:00:41 +0100239 }
240 hdr = buf_msg(skb);
241 curr = msg_blocks(hdr);
242 mlen = msg_size(hdr);
Tuong Lienc9aa81f2020-06-11 17:07:35 +0700243 cpy = min_t(size_t, rem, mss - mlen);
Jon Maloyc0bceb92019-10-30 14:00:41 +0100244 if (cpy != copy_from_iter(skb->data + mlen, cpy, &m->msg_iter))
245 return -EFAULT;
246 msg_set_size(hdr, mlen + cpy);
247 skb_put(skb, cpy);
248 rem -= cpy;
249 total += msg_blocks(hdr) - curr;
Tuong Lienc9aa81f2020-06-11 17:07:35 +0700250 } while (rem > 0);
Jon Maloyc0bceb92019-10-30 14:00:41 +0100251 return total - accounted;
252}
253
Jon Paul Maloycf2157f2015-03-13 16:08:06 -0400254/* tipc_msg_validate - validate basic format of received message
255 *
256 * This routine ensures a TIPC message has an acceptable header, and at least
257 * as much data as the header indicates it should. The routine also ensures
258 * that the entire message header is stored in the main fragment of the message
259 * buffer, to simplify future access to message header fields.
260 *
261 * Note: Having extra info present in the message header or data areas is OK.
262 * TIPC will ignore the excess, under the assumption that it is optional info
263 * introduced by a later release of the protocol.
264 */
Jon Maloyd618d092017-11-15 21:23:56 +0100265bool tipc_msg_validate(struct sk_buff **_skb)
Jon Paul Maloycf2157f2015-03-13 16:08:06 -0400266{
Jon Maloyd618d092017-11-15 21:23:56 +0100267 struct sk_buff *skb = *_skb;
268 struct tipc_msg *hdr;
Jon Paul Maloycf2157f2015-03-13 16:08:06 -0400269 int msz, hsz;
270
Jon Maloyd618d092017-11-15 21:23:56 +0100271 /* Ensure that flow control ratio condition is satisfied */
Hoang Le55b32802018-02-08 17:16:25 +0100272 if (unlikely(skb->truesize / buf_roundup_len(skb) >= 4)) {
273 skb = skb_copy_expand(skb, BUF_HEADROOM, 0, GFP_ATOMIC);
Jon Maloyd618d092017-11-15 21:23:56 +0100274 if (!skb)
275 return false;
276 kfree_skb(*_skb);
277 *_skb = skb;
278 }
279
Jon Paul Maloycf2157f2015-03-13 16:08:06 -0400280 if (unlikely(TIPC_SKB_CB(skb)->validated))
281 return true;
Tuong Lienfc1b6d62019-11-08 12:05:11 +0700282
Jon Paul Maloycf2157f2015-03-13 16:08:06 -0400283 if (unlikely(!pskb_may_pull(skb, MIN_H_SIZE)))
284 return false;
285
286 hsz = msg_hdr_sz(buf_msg(skb));
287 if (unlikely(hsz < MIN_H_SIZE) || (hsz > MAX_H_SIZE))
288 return false;
289 if (unlikely(!pskb_may_pull(skb, hsz)))
290 return false;
291
Jon Maloyd618d092017-11-15 21:23:56 +0100292 hdr = buf_msg(skb);
293 if (unlikely(msg_version(hdr) != TIPC_VERSION))
Jon Paul Maloycf2157f2015-03-13 16:08:06 -0400294 return false;
295
Jon Maloyd618d092017-11-15 21:23:56 +0100296 msz = msg_size(hdr);
Jon Paul Maloycf2157f2015-03-13 16:08:06 -0400297 if (unlikely(msz < hsz))
298 return false;
299 if (unlikely((msz - hsz) > TIPC_MAX_USER_MSG_SIZE))
300 return false;
301 if (unlikely(skb->len < msz))
302 return false;
303
Tuong Lienfc1b6d62019-11-08 12:05:11 +0700304 TIPC_SKB_CB(skb)->validated = 1;
Jon Paul Maloycf2157f2015-03-13 16:08:06 -0400305 return true;
306}
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500307
308/**
Tuong Lien2320bcd2019-07-24 08:56:12 +0700309 * tipc_msg_fragment - build a fragment skb list for TIPC message
310 *
311 * @skb: TIPC message skb
312 * @hdr: internal msg header to be put on the top of the fragments
313 * @pktmax: max size of a fragment incl. the header
314 * @frags: returned fragment skb list
315 *
316 * Returns 0 if the fragmentation is successful, otherwise: -EINVAL
317 * or -ENOMEM
318 */
319int tipc_msg_fragment(struct sk_buff *skb, const struct tipc_msg *hdr,
320 int pktmax, struct sk_buff_head *frags)
321{
322 int pktno, nof_fragms, dsz, dmax, eat;
323 struct tipc_msg *_hdr;
324 struct sk_buff *_skb;
325 u8 *data;
326
327 /* Non-linear buffer? */
328 if (skb_linearize(skb))
329 return -ENOMEM;
330
331 data = (u8 *)skb->data;
332 dsz = msg_size(buf_msg(skb));
333 dmax = pktmax - INT_H_SIZE;
334 if (dsz <= dmax || !dmax)
335 return -EINVAL;
336
337 nof_fragms = dsz / dmax + 1;
338 for (pktno = 1; pktno <= nof_fragms; pktno++) {
339 if (pktno < nof_fragms)
340 eat = dmax;
341 else
342 eat = dsz % dmax;
343 /* Allocate a new fragment */
344 _skb = tipc_buf_acquire(INT_H_SIZE + eat, GFP_ATOMIC);
345 if (!_skb)
346 goto error;
347 skb_orphan(_skb);
348 __skb_queue_tail(frags, _skb);
349 /* Copy header & data to the fragment */
350 skb_copy_to_linear_data(_skb, hdr, INT_H_SIZE);
351 skb_copy_to_linear_data_offset(_skb, INT_H_SIZE, data, eat);
352 data += eat;
353 /* Update the fragment's header */
354 _hdr = buf_msg(_skb);
355 msg_set_fragm_no(_hdr, pktno);
356 msg_set_nof_fragms(_hdr, nof_fragms);
357 msg_set_size(_hdr, INT_H_SIZE + eat);
358 }
359 return 0;
360
361error:
362 __skb_queue_purge(frags);
363 __skb_queue_head_init(frags);
364 return -ENOMEM;
365}
366
367/**
Jon Paul Maloy9fbfb8b2014-07-16 20:41:03 -0400368 * tipc_msg_build - create buffer chain containing specified header and data
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500369 * @mhdr: Message header, to be prepended to data
Al Viro45dcc682014-11-15 01:16:27 -0500370 * @m: User message
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500371 * @dsz: Total length of user data
372 * @pktmax: Max packet size that can be used
Ying Xuea6ca1092014-11-26 11:41:55 +0800373 * @list: Buffer or chain of buffers to be returned to caller
374 *
Jon Maloy4c94cc22017-11-30 16:47:25 +0100375 * Note that the recursive call we are making here is safe, since it can
376 * logically go only one further level down.
377 *
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500378 * Returns message data size or errno: -ENOMEM, -EFAULT
379 */
Jon Maloy4c94cc22017-11-30 16:47:25 +0100380int tipc_msg_build(struct tipc_msg *mhdr, struct msghdr *m, int offset,
381 int dsz, int pktmax, struct sk_buff_head *list)
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500382{
383 int mhsz = msg_hdr_sz(mhdr);
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500384 struct tipc_msg pkthdr;
Jon Maloy4c94cc22017-11-30 16:47:25 +0100385 int msz = mhsz + dsz;
386 int pktrem = pktmax;
Ying Xuea6ca1092014-11-26 11:41:55 +0800387 struct sk_buff *skb;
Jon Maloy4c94cc22017-11-30 16:47:25 +0100388 int drem = dsz;
389 int pktno = 1;
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500390 char *pktpos;
Jon Maloy4c94cc22017-11-30 16:47:25 +0100391 int pktsz;
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500392 int rc;
Ying Xuea6ca1092014-11-26 11:41:55 +0800393
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500394 msg_set_size(mhdr, msz);
395
396 /* No fragmentation needed? */
397 if (likely(msz <= pktmax)) {
Parthasarathy Bhuvaragan57d5f642017-01-13 15:46:25 +0100398 skb = tipc_buf_acquire(msz, GFP_KERNEL);
Jon Maloy4c94cc22017-11-30 16:47:25 +0100399
400 /* Fall back to smaller MTU if node local message */
401 if (unlikely(!skb)) {
402 if (pktmax != MAX_MSG_SIZE)
403 return -ENOMEM;
404 rc = tipc_msg_build(mhdr, m, offset, dsz, FB_MTU, list);
405 if (rc != dsz)
406 return rc;
407 if (tipc_msg_assemble(list))
408 return dsz;
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500409 return -ENOMEM;
Jon Maloy4c94cc22017-11-30 16:47:25 +0100410 }
Ying Xuec93d3ba2015-01-09 15:27:04 +0800411 skb_orphan(skb);
Ying Xuea6ca1092014-11-26 11:41:55 +0800412 __skb_queue_tail(list, skb);
413 skb_copy_to_linear_data(skb, mhdr, mhsz);
414 pktpos = skb->data + mhsz;
Al Virocbbd26b2016-11-01 22:09:04 -0400415 if (copy_from_iter_full(pktpos, dsz, &m->msg_iter))
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500416 return dsz;
417 rc = -EFAULT;
418 goto error;
419 }
420
421 /* Prepare reusable fragment header */
Jon Paul Maloyc5898632015-02-05 08:36:36 -0500422 tipc_msg_init(msg_prevnode(mhdr), &pkthdr, MSG_FRAGMENTER,
423 FIRST_FRAGMENT, INT_H_SIZE, msg_destnode(mhdr));
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500424 msg_set_size(&pkthdr, pktmax);
425 msg_set_fragm_no(&pkthdr, pktno);
Jon Paul Maloye3eea1e2015-03-13 16:08:11 -0400426 msg_set_importance(&pkthdr, msg_importance(mhdr));
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500427
428 /* Prepare first fragment */
Parthasarathy Bhuvaragan57d5f642017-01-13 15:46:25 +0100429 skb = tipc_buf_acquire(pktmax, GFP_KERNEL);
Ying Xuea6ca1092014-11-26 11:41:55 +0800430 if (!skb)
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500431 return -ENOMEM;
Ying Xuec93d3ba2015-01-09 15:27:04 +0800432 skb_orphan(skb);
Ying Xuea6ca1092014-11-26 11:41:55 +0800433 __skb_queue_tail(list, skb);
434 pktpos = skb->data;
435 skb_copy_to_linear_data(skb, &pkthdr, INT_H_SIZE);
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500436 pktpos += INT_H_SIZE;
437 pktrem -= INT_H_SIZE;
Ying Xuea6ca1092014-11-26 11:41:55 +0800438 skb_copy_to_linear_data_offset(skb, INT_H_SIZE, mhdr, mhsz);
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500439 pktpos += mhsz;
440 pktrem -= mhsz;
441
442 do {
443 if (drem < pktrem)
444 pktrem = drem;
445
Al Virocbbd26b2016-11-01 22:09:04 -0400446 if (!copy_from_iter_full(pktpos, pktrem, &m->msg_iter)) {
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500447 rc = -EFAULT;
448 goto error;
449 }
450 drem -= pktrem;
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500451
452 if (!drem)
453 break;
454
455 /* Prepare new fragment: */
456 if (drem < (pktmax - INT_H_SIZE))
457 pktsz = drem + INT_H_SIZE;
458 else
459 pktsz = pktmax;
Parthasarathy Bhuvaragan57d5f642017-01-13 15:46:25 +0100460 skb = tipc_buf_acquire(pktsz, GFP_KERNEL);
Ying Xuea6ca1092014-11-26 11:41:55 +0800461 if (!skb) {
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500462 rc = -ENOMEM;
463 goto error;
464 }
Ying Xuec93d3ba2015-01-09 15:27:04 +0800465 skb_orphan(skb);
Ying Xuea6ca1092014-11-26 11:41:55 +0800466 __skb_queue_tail(list, skb);
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500467 msg_set_type(&pkthdr, FRAGMENT);
468 msg_set_size(&pkthdr, pktsz);
469 msg_set_fragm_no(&pkthdr, ++pktno);
Ying Xuea6ca1092014-11-26 11:41:55 +0800470 skb_copy_to_linear_data(skb, &pkthdr, INT_H_SIZE);
471 pktpos = skb->data + INT_H_SIZE;
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500472 pktrem = pktsz - INT_H_SIZE;
473
474 } while (1);
Ying Xuea6ca1092014-11-26 11:41:55 +0800475 msg_set_type(buf_msg(skb), LAST_FRAGMENT);
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500476 return dsz;
477error:
Ying Xuea6ca1092014-11-26 11:41:55 +0800478 __skb_queue_purge(list);
479 __skb_queue_head_init(list);
Jon Paul Maloy067608e2014-06-25 20:41:34 -0500480 return rc;
481}
482
Jon Paul Maloy4f1688b2014-06-25 20:41:32 -0500483/**
Tuong Lien06e7c702019-11-01 09:58:57 +0700484 * tipc_msg_bundle - Append contents of a buffer to tail of an existing one
485 * @bskb: the bundle buffer to append to
486 * @msg: message to be appended
487 * @max: max allowable size for the bundle buffer
488 *
489 * Returns "true" if bundling has been performed, otherwise "false"
Jon Paul Maloy4f1688b2014-06-25 20:41:32 -0500490 */
Tuong Lien06e7c702019-11-01 09:58:57 +0700491static bool tipc_msg_bundle(struct sk_buff *bskb, struct tipc_msg *msg,
492 u32 max)
Jon Paul Maloy4f1688b2014-06-25 20:41:32 -0500493{
Tuong Lien06e7c702019-11-01 09:58:57 +0700494 struct tipc_msg *bmsg = buf_msg(bskb);
495 u32 msz, bsz, offset, pad;
Jon Paul Maloy4f1688b2014-06-25 20:41:32 -0500496
Tuong Lien06e7c702019-11-01 09:58:57 +0700497 msz = msg_size(msg);
Jon Paul Maloy05dcc5a2015-03-13 16:08:10 -0400498 bsz = msg_size(bmsg);
Tuong Lien06e7c702019-11-01 09:58:57 +0700499 offset = align(bsz);
500 pad = offset - bsz;
Jon Paul Maloy05dcc5a2015-03-13 16:08:10 -0400501
Tuong Lien06e7c702019-11-01 09:58:57 +0700502 if (unlikely(skb_tailroom(bskb) < (pad + msz)))
Jon Paul Maloy4f1688b2014-06-25 20:41:32 -0500503 return false;
Tuong Lien06e7c702019-11-01 09:58:57 +0700504 if (unlikely(max < (offset + msz)))
Jon Paul Maloyf21e8972015-05-14 10:46:17 -0400505 return false;
Jon Paul Maloy4f1688b2014-06-25 20:41:32 -0500506
Tuong Lien06e7c702019-11-01 09:58:57 +0700507 skb_put(bskb, pad + msz);
508 skb_copy_to_linear_data_offset(bskb, offset, msg, msz);
509 msg_set_size(bmsg, offset + msz);
Jon Paul Maloy4f1688b2014-06-25 20:41:32 -0500510 msg_set_msgcnt(bmsg, msg_msgcnt(bmsg) + 1);
Jon Paul Maloy4f1688b2014-06-25 20:41:32 -0500511 return true;
512}
513
514/**
Tuong Lien06e7c702019-11-01 09:58:57 +0700515 * tipc_msg_try_bundle - Try to bundle a new message to the last one
516 * @tskb: the last/target message to which the new one will be appended
517 * @skb: the new message skb pointer
518 * @mss: max message size (header inclusive)
519 * @dnode: destination node for the message
520 * @new_bundle: if this call made a new bundle or not
521 *
522 * Return: "true" if the new message skb is potential for bundling this time or
523 * later, in the case a bundling has been done this time, the skb is consumed
524 * (the skb pointer = NULL).
525 * Otherwise, "false" if the skb cannot be bundled at all.
526 */
527bool tipc_msg_try_bundle(struct sk_buff *tskb, struct sk_buff **skb, u32 mss,
528 u32 dnode, bool *new_bundle)
529{
530 struct tipc_msg *msg, *inner, *outer;
531 u32 tsz;
532
533 /* First, check if the new buffer is suitable for bundling */
534 msg = buf_msg(*skb);
535 if (msg_user(msg) == MSG_FRAGMENTER)
536 return false;
537 if (msg_user(msg) == TUNNEL_PROTOCOL)
538 return false;
539 if (msg_user(msg) == BCAST_PROTOCOL)
540 return false;
541 if (mss <= INT_H_SIZE + msg_size(msg))
542 return false;
543
544 /* Ok, but the last/target buffer can be empty? */
545 if (unlikely(!tskb))
546 return true;
547
548 /* Is it a bundle already? Try to bundle the new message to it */
549 if (msg_user(buf_msg(tskb)) == MSG_BUNDLER) {
550 *new_bundle = false;
551 goto bundle;
552 }
553
554 /* Make a new bundle of the two messages if possible */
555 tsz = msg_size(buf_msg(tskb));
556 if (unlikely(mss < align(INT_H_SIZE + tsz) + msg_size(msg)))
557 return true;
558 if (unlikely(pskb_expand_head(tskb, INT_H_SIZE, mss - tsz - INT_H_SIZE,
559 GFP_ATOMIC)))
560 return true;
561 inner = buf_msg(tskb);
562 skb_push(tskb, INT_H_SIZE);
563 outer = buf_msg(tskb);
564 tipc_msg_init(msg_prevnode(inner), outer, MSG_BUNDLER, 0, INT_H_SIZE,
565 dnode);
566 msg_set_importance(outer, msg_importance(inner));
567 msg_set_size(outer, INT_H_SIZE + tsz);
568 msg_set_msgcnt(outer, 1);
569 *new_bundle = true;
570
571bundle:
572 if (likely(tipc_msg_bundle(tskb, msg, mss))) {
573 consume_skb(*skb);
574 *skb = NULL;
575 }
576 return true;
577}
578
579/**
Jon Paul Maloyc637c102015-02-05 08:36:41 -0500580 * tipc_msg_extract(): extract bundled inner packet from buffer
Jon Paul Maloyc1336ee2015-03-13 16:08:08 -0400581 * @skb: buffer to be extracted from.
Jon Paul Maloyc637c102015-02-05 08:36:41 -0500582 * @iskb: extracted inner buffer, to be returned
Jon Paul Maloyc1336ee2015-03-13 16:08:08 -0400583 * @pos: position in outer message of msg to be extracted.
584 * Returns position of next msg
Jon Paul Maloyc637c102015-02-05 08:36:41 -0500585 * Consumes outer buffer when last packet extracted
Randy Dunlap60462192020-09-17 21:35:19 -0700586 * Returns true when there is an extracted buffer, otherwise false
Jon Paul Maloyc637c102015-02-05 08:36:41 -0500587 */
588bool tipc_msg_extract(struct sk_buff *skb, struct sk_buff **iskb, int *pos)
589{
Tung Nguyenef9be752018-06-28 22:25:04 +0200590 struct tipc_msg *hdr, *ihdr;
591 int imsz;
Jon Paul Maloyc637c102015-02-05 08:36:41 -0500592
Jon Paul Maloyc1336ee2015-03-13 16:08:08 -0400593 *iskb = NULL;
Jon Paul Maloy11495572015-03-13 16:08:07 -0400594 if (unlikely(skb_linearize(skb)))
Jon Paul Maloyc637c102015-02-05 08:36:41 -0500595 goto none;
Jon Paul Maloyc637c102015-02-05 08:36:41 -0500596
Tung Nguyenef9be752018-06-28 22:25:04 +0200597 hdr = buf_msg(skb);
598 if (unlikely(*pos > (msg_data_sz(hdr) - MIN_H_SIZE)))
Jon Paul Maloyc637c102015-02-05 08:36:41 -0500599 goto none;
Jon Paul Maloyc1336ee2015-03-13 16:08:08 -0400600
Tung Nguyenef9be752018-06-28 22:25:04 +0200601 ihdr = (struct tipc_msg *)(msg_data(hdr) + *pos);
602 imsz = msg_size(ihdr);
603
604 if ((*pos + imsz) > msg_data_sz(hdr))
Jon Paul Maloyc637c102015-02-05 08:36:41 -0500605 goto none;
Tung Nguyenef9be752018-06-28 22:25:04 +0200606
607 *iskb = tipc_buf_acquire(imsz, GFP_ATOMIC);
608 if (!*iskb)
609 goto none;
610
611 skb_copy_to_linear_data(*iskb, ihdr, imsz);
Jon Maloyd618d092017-11-15 21:23:56 +0100612 if (unlikely(!tipc_msg_validate(iskb)))
Jon Paul Maloyc1336ee2015-03-13 16:08:08 -0400613 goto none;
Tung Nguyenef9be752018-06-28 22:25:04 +0200614
Jon Paul Maloyc637c102015-02-05 08:36:41 -0500615 *pos += align(imsz);
616 return true;
617none:
618 kfree_skb(skb);
Jon Paul Maloyc1336ee2015-03-13 16:08:08 -0400619 kfree_skb(*iskb);
Jon Paul Maloyc637c102015-02-05 08:36:41 -0500620 *iskb = NULL;
621 return false;
622}
623
624/**
Jon Paul Maloy8db1bae2014-06-25 20:41:35 -0500625 * tipc_msg_reverse(): swap source and destination addresses and add error code
Jon Paul Maloy29042e12015-07-22 10:11:18 -0400626 * @own_node: originating node id for reversed message
Jon Maloy5cbdbd12018-09-28 20:23:18 +0200627 * @skb: buffer containing message to be reversed; will be consumed
Jon Paul Maloy29042e12015-07-22 10:11:18 -0400628 * @err: error code to be set in message, if any
Jon Maloy5cbdbd12018-09-28 20:23:18 +0200629 * Replaces consumed buffer with new one when successful
Jon Paul Maloy8db1bae2014-06-25 20:41:35 -0500630 * Returns true if success, otherwise false
631 */
Jon Paul Maloybcd3ffd2015-07-22 10:11:19 -0400632bool tipc_msg_reverse(u32 own_node, struct sk_buff **skb, int err)
Jon Paul Maloy8db1bae2014-06-25 20:41:35 -0500633{
Jon Paul Maloy29042e12015-07-22 10:11:18 -0400634 struct sk_buff *_skb = *skb;
Jon Maloy5cbdbd12018-09-28 20:23:18 +0200635 struct tipc_msg *_hdr, *hdr;
636 int hlen, dlen;
Jon Paul Maloy8db1bae2014-06-25 20:41:35 -0500637
Jon Paul Maloy29042e12015-07-22 10:11:18 -0400638 if (skb_linearize(_skb))
Jon Paul Maloy8db1bae2014-06-25 20:41:35 -0500639 goto exit;
Jon Maloy5cbdbd12018-09-28 20:23:18 +0200640 _hdr = buf_msg(_skb);
641 dlen = min_t(uint, msg_data_sz(_hdr), MAX_FORWARD_SIZE);
642 hlen = msg_hdr_sz(_hdr);
643
644 if (msg_dest_droppable(_hdr))
Jon Paul Maloyac0074e2014-06-25 20:41:41 -0500645 goto exit;
Jon Maloy5cbdbd12018-09-28 20:23:18 +0200646 if (msg_errcode(_hdr))
Jon Paul Maloy8db1bae2014-06-25 20:41:35 -0500647 goto exit;
Jon Paul Maloy29042e12015-07-22 10:11:18 -0400648
Jon Maloy5cbdbd12018-09-28 20:23:18 +0200649 /* Never return SHORT header */
650 if (hlen == SHORT_H_SIZE)
651 hlen = BASIC_H_SIZE;
Jon Paul Maloy29042e12015-07-22 10:11:18 -0400652
Tung Nguyen67879272018-09-28 20:23:22 +0200653 /* Don't return data along with SYN+, - sender has a clone */
654 if (msg_is_syn(_hdr) && err == TIPC_ERR_OVERLOAD)
655 dlen = 0;
656
Jon Maloy5cbdbd12018-09-28 20:23:18 +0200657 /* Allocate new buffer to return */
658 *skb = tipc_buf_acquire(hlen + dlen, GFP_ATOMIC);
659 if (!*skb)
660 goto exit;
661 memcpy((*skb)->data, _skb->data, msg_hdr_sz(_hdr));
662 memcpy((*skb)->data + hlen, msg_data(_hdr), dlen);
Jon Paul Maloy29042e12015-07-22 10:11:18 -0400663
Jon Maloy5cbdbd12018-09-28 20:23:18 +0200664 /* Build reverse header in new buffer */
665 hdr = buf_msg(*skb);
666 msg_set_hdr_sz(hdr, hlen);
Jon Paul Maloy29042e12015-07-22 10:11:18 -0400667 msg_set_errcode(hdr, err);
Jon Paul Maloy59a361b2017-08-14 18:28:49 +0200668 msg_set_non_seq(hdr, 0);
Jon Maloy5cbdbd12018-09-28 20:23:18 +0200669 msg_set_origport(hdr, msg_destport(_hdr));
670 msg_set_destport(hdr, msg_origport(_hdr));
671 msg_set_destnode(hdr, msg_prevnode(_hdr));
Jon Paul Maloy29042e12015-07-22 10:11:18 -0400672 msg_set_prevnode(hdr, own_node);
673 msg_set_orignode(hdr, own_node);
Jon Maloy5cbdbd12018-09-28 20:23:18 +0200674 msg_set_size(hdr, hlen + dlen);
Jon Paul Maloy29042e12015-07-22 10:11:18 -0400675 skb_orphan(_skb);
Jon Maloy5cbdbd12018-09-28 20:23:18 +0200676 kfree_skb(_skb);
Jon Paul Maloy8db1bae2014-06-25 20:41:35 -0500677 return true;
678exit:
Jon Paul Maloy29042e12015-07-22 10:11:18 -0400679 kfree_skb(_skb);
680 *skb = NULL;
Jon Paul Maloy8db1bae2014-06-25 20:41:35 -0500681 return false;
682}
Jon Paul Maloy5a379072014-06-25 20:41:36 -0500683
Tung Nguyen67879272018-09-28 20:23:22 +0200684bool tipc_msg_skb_clone(struct sk_buff_head *msg, struct sk_buff_head *cpy)
685{
686 struct sk_buff *skb, *_skb;
687
688 skb_queue_walk(msg, skb) {
689 _skb = skb_clone(skb, GFP_ATOMIC);
690 if (!_skb) {
691 __skb_queue_purge(cpy);
692 pr_err_ratelimited("Failed to clone buffer chain\n");
693 return false;
694 }
695 __skb_queue_tail(cpy, _skb);
696 }
697 return true;
698}
699
Jon Paul Maloy5a379072014-06-25 20:41:36 -0500700/**
Jon Paul Maloye3a77562015-02-05 08:36:39 -0500701 * tipc_msg_lookup_dest(): try to find new destination for named message
702 * @skb: the buffer containing the message.
Jon Paul Maloycda36962015-07-22 10:11:20 -0400703 * @err: error code to be used by caller if lookup fails
Jon Paul Maloy5a379072014-06-25 20:41:36 -0500704 * Does not consume buffer
Jon Paul Maloye3a77562015-02-05 08:36:39 -0500705 * Returns true if a destination is found, false otherwise
Jon Paul Maloy5a379072014-06-25 20:41:36 -0500706 */
Jon Paul Maloycda36962015-07-22 10:11:20 -0400707bool tipc_msg_lookup_dest(struct net *net, struct sk_buff *skb, int *err)
Jon Paul Maloy5a379072014-06-25 20:41:36 -0500708{
Jon Paul Maloye3a77562015-02-05 08:36:39 -0500709 struct tipc_msg *msg = buf_msg(skb);
Jon Paul Maloycda36962015-07-22 10:11:20 -0400710 u32 dport, dnode;
711 u32 onode = tipc_own_addr(net);
Jon Paul Maloy5a379072014-06-25 20:41:36 -0500712
Jon Paul Maloye3a77562015-02-05 08:36:39 -0500713 if (!msg_isdata(msg))
714 return false;
715 if (!msg_named(msg))
716 return false;
Jon Paul Maloyd4829942015-03-27 10:19:19 -0400717 if (msg_errcode(msg))
718 return false;
Parthasarathy Bhuvaraganaad06212017-09-29 10:02:54 +0200719 *err = TIPC_ERR_NO_NAME;
Jon Paul Maloye3a77562015-02-05 08:36:39 -0500720 if (skb_linearize(skb))
721 return false;
Erik Hugne4e3ae002015-09-18 10:46:31 +0200722 msg = buf_msg(skb);
Jon Paul Maloyd4829942015-03-27 10:19:19 -0400723 if (msg_reroute_cnt(msg))
Jon Paul Maloye3a77562015-02-05 08:36:39 -0500724 return false;
Jon Maloy928df182018-03-15 16:48:51 +0100725 dnode = tipc_scope2node(net, msg_lookup_scope(msg));
Ying Xue4ac1c8d2015-01-09 15:27:09 +0800726 dport = tipc_nametbl_translate(net, msg_nametype(msg),
Jon Paul Maloycda36962015-07-22 10:11:20 -0400727 msg_nameinst(msg), &dnode);
Jon Paul Maloy5a379072014-06-25 20:41:36 -0500728 if (!dport)
Jon Paul Maloye3a77562015-02-05 08:36:39 -0500729 return false;
Jon Paul Maloy5a379072014-06-25 20:41:36 -0500730 msg_incr_reroute_cnt(msg);
Jon Paul Maloycda36962015-07-22 10:11:20 -0400731 if (dnode != onode)
732 msg_set_prevnode(msg, onode);
733 msg_set_destnode(msg, dnode);
Jon Paul Maloy5a379072014-06-25 20:41:36 -0500734 msg_set_destport(msg, dport);
Jon Paul Maloye3a77562015-02-05 08:36:39 -0500735 *err = TIPC_OK;
Jon Maloya9e29712017-10-07 15:07:20 +0200736
Jon Paul Maloye3a77562015-02-05 08:36:39 -0500737 return true;
Jon Paul Maloy5a379072014-06-25 20:41:36 -0500738}
Jon Paul Maloy078bec82014-07-16 20:41:00 -0400739
Jon Maloy4c94cc22017-11-30 16:47:25 +0100740/* tipc_msg_assemble() - assemble chain of fragments into one message
741 */
742bool tipc_msg_assemble(struct sk_buff_head *list)
743{
744 struct sk_buff *skb, *tmp = NULL;
745
746 if (skb_queue_len(list) == 1)
747 return true;
748
749 while ((skb = __skb_dequeue(list))) {
750 skb->next = NULL;
751 if (tipc_buf_append(&tmp, &skb)) {
752 __skb_queue_tail(list, skb);
753 return true;
754 }
755 if (!tmp)
756 break;
757 }
758 __skb_queue_purge(list);
759 __skb_queue_head_init(list);
760 pr_warn("Failed do assemble buffer\n");
761 return false;
762}
763
Jon Paul Maloy078bec82014-07-16 20:41:00 -0400764/* tipc_msg_reassemble() - clone a buffer chain of fragments and
765 * reassemble the clones into one message
766 */
Jon Paul Maloy2f566122015-10-22 08:51:39 -0400767bool tipc_msg_reassemble(struct sk_buff_head *list, struct sk_buff_head *rcvq)
Jon Paul Maloy078bec82014-07-16 20:41:00 -0400768{
Jon Paul Maloy2f566122015-10-22 08:51:39 -0400769 struct sk_buff *skb, *_skb;
Ying Xuea6ca1092014-11-26 11:41:55 +0800770 struct sk_buff *frag = NULL;
Jon Paul Maloy078bec82014-07-16 20:41:00 -0400771 struct sk_buff *head = NULL;
Jon Paul Maloy2f566122015-10-22 08:51:39 -0400772 int hdr_len;
Jon Paul Maloy078bec82014-07-16 20:41:00 -0400773
774 /* Copy header if single buffer */
Ying Xuea6ca1092014-11-26 11:41:55 +0800775 if (skb_queue_len(list) == 1) {
776 skb = skb_peek(list);
Jon Paul Maloy2f566122015-10-22 08:51:39 -0400777 hdr_len = skb_headroom(skb) + msg_hdr_sz(buf_msg(skb));
778 _skb = __pskb_copy(skb, hdr_len, GFP_ATOMIC);
779 if (!_skb)
780 return false;
781 __skb_queue_tail(rcvq, _skb);
782 return true;
Jon Paul Maloy078bec82014-07-16 20:41:00 -0400783 }
784
785 /* Clone all fragments and reassemble */
Ying Xuea6ca1092014-11-26 11:41:55 +0800786 skb_queue_walk(list, skb) {
787 frag = skb_clone(skb, GFP_ATOMIC);
Jon Paul Maloy078bec82014-07-16 20:41:00 -0400788 if (!frag)
789 goto error;
790 frag->next = NULL;
791 if (tipc_buf_append(&head, &frag))
792 break;
793 if (!head)
794 goto error;
Jon Paul Maloy078bec82014-07-16 20:41:00 -0400795 }
Jon Paul Maloy2f566122015-10-22 08:51:39 -0400796 __skb_queue_tail(rcvq, frag);
797 return true;
Jon Paul Maloy078bec82014-07-16 20:41:00 -0400798error:
799 pr_warn("Failed do clone local mcast rcv buffer\n");
800 kfree_skb(head);
Jon Paul Maloy2f566122015-10-22 08:51:39 -0400801 return false;
Jon Paul Maloy078bec82014-07-16 20:41:00 -0400802}
Jon Paul Maloy8306f992015-10-15 14:52:43 -0400803
Jon Paul Maloya853e4c2017-01-18 13:50:52 -0500804bool tipc_msg_pskb_copy(u32 dst, struct sk_buff_head *msg,
805 struct sk_buff_head *cpy)
806{
807 struct sk_buff *skb, *_skb;
808
809 skb_queue_walk(msg, skb) {
810 _skb = pskb_copy(skb, GFP_ATOMIC);
811 if (!_skb) {
812 __skb_queue_purge(cpy);
813 return false;
814 }
815 msg_set_destnode(buf_msg(_skb), dst);
816 __skb_queue_tail(cpy, _skb);
817 }
818 return true;
819}
820
Jon Paul Maloy8306f992015-10-15 14:52:43 -0400821/* tipc_skb_queue_sorted(); sort pkt into list according to sequence number
822 * @list: list to be appended to
823 * @seqno: sequence number of buffer to add
824 * @skb: buffer to add
825 */
Tuong Lien03b6fef2020-05-26 16:38:37 +0700826bool __tipc_skb_queue_sorted(struct sk_buff_head *list, u16 seqno,
Jon Paul Maloy8306f992015-10-15 14:52:43 -0400827 struct sk_buff *skb)
828{
829 struct sk_buff *_skb, *tmp;
830
831 if (skb_queue_empty(list) || less(seqno, buf_seqno(skb_peek(list)))) {
832 __skb_queue_head(list, skb);
Tuong Lien03b6fef2020-05-26 16:38:37 +0700833 return true;
Jon Paul Maloy8306f992015-10-15 14:52:43 -0400834 }
835
836 if (more(seqno, buf_seqno(skb_peek_tail(list)))) {
837 __skb_queue_tail(list, skb);
Tuong Lien03b6fef2020-05-26 16:38:37 +0700838 return true;
Jon Paul Maloy8306f992015-10-15 14:52:43 -0400839 }
840
841 skb_queue_walk_safe(list, _skb, tmp) {
842 if (more(seqno, buf_seqno(_skb)))
843 continue;
844 if (seqno == buf_seqno(_skb))
845 break;
846 __skb_queue_before(list, _skb, skb);
Tuong Lien03b6fef2020-05-26 16:38:37 +0700847 return true;
Jon Paul Maloy8306f992015-10-15 14:52:43 -0400848 }
849 kfree_skb(skb);
Tuong Lien03b6fef2020-05-26 16:38:37 +0700850 return false;
Jon Paul Maloy8306f992015-10-15 14:52:43 -0400851}
Jon Maloy64ac5f52017-10-13 11:04:20 +0200852
853void tipc_skb_reject(struct net *net, int err, struct sk_buff *skb,
854 struct sk_buff_head *xmitq)
855{
856 if (tipc_msg_reverse(tipc_own_addr(net), &skb, err))
857 __skb_queue_tail(xmitq, skb);
858}