tipc: improve link congestion algorithm
[deliverable/linux.git] / net / tipc / msg.c
CommitLineData
b97bf3fd
PL
1/*
2 * net/tipc/msg.c: TIPC message header routines
c4307285 3 *
cf2157f8 4 * Copyright (c) 2000-2006, 2014-2015, Ericsson AB
741de3e9 5 * Copyright (c) 2005, 2010-2011, Wind River Systems
b97bf3fd
PL
6 * All rights reserved.
7 *
9ea1fd3c 8 * Redistribution and use in source and binary forms, with or without
b97bf3fd
PL
9 * modification, are permitted provided that the following conditions are met:
10 *
9ea1fd3c
PL
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the names of the copyright holders nor the names of its
17 * contributors may be used to endorse or promote products derived from
18 * this software without specific prior written permission.
b97bf3fd 19 *
9ea1fd3c
PL
20 * Alternatively, this software may be distributed under the terms of the
21 * GNU General Public License ("GPL") version 2 as published by the Free
22 * Software Foundation.
23 *
24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
25 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
28 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
29 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
30 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
31 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
32 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
33 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
b97bf3fd
PL
34 * POSSIBILITY OF SUCH DAMAGE.
35 */
36
c93d3baa 37#include <net/sock.h>
b97bf3fd 38#include "core.h"
b97bf3fd 39#include "msg.h"
5a379074
JPM
40#include "addr.h"
41#include "name_table.h"
b97bf3fd 42
8db1bae3
JPM
43#define MAX_FORWARD_SIZE 1024
44
4f1688b2 45static unsigned int align(unsigned int i)
23461e83 46{
4f1688b2 47 return (i + 3) & ~3u;
23461e83
AS
48}
49
859fc7c0
YX
50/**
51 * tipc_buf_acquire - creates a TIPC message buffer
52 * @size: message size (including TIPC header)
53 *
54 * Returns a new buffer with data pointers set to the specified size.
55 *
56 * NOTE: Headroom is reserved to allow prepending of a data link header.
57 * There may also be unrequested tailroom present at the buffer's end.
58 */
59struct sk_buff *tipc_buf_acquire(u32 size)
60{
61 struct sk_buff *skb;
62 unsigned int buf_size = (BUF_HEADROOM + size + 3) & ~3u;
63
64 skb = alloc_skb_fclone(buf_size, GFP_ATOMIC);
65 if (skb) {
66 skb_reserve(skb, BUF_HEADROOM);
67 skb_put(skb, size);
68 skb->next = NULL;
69 }
70 return skb;
71}
72
c5898636
JPM
73void tipc_msg_init(u32 own_node, struct tipc_msg *m, u32 user, u32 type,
74 u32 hsize, u32 dnode)
23461e83
AS
75{
76 memset(m, 0, hsize);
77 msg_set_version(m);
78 msg_set_user(m, user);
79 msg_set_hdr_sz(m, hsize);
80 msg_set_size(m, hsize);
c5898636 81 msg_set_prevnode(m, own_node);
23461e83 82 msg_set_type(m, type);
1dd0bd2b 83 if (hsize > SHORT_H_SIZE) {
c5898636
JPM
84 msg_set_orignode(m, own_node);
85 msg_set_destnode(m, dnode);
1dd0bd2b
JPM
86 }
87}
88
c5898636 89struct sk_buff *tipc_msg_create(uint user, uint type,
34747539
YX
90 uint hdr_sz, uint data_sz, u32 dnode,
91 u32 onode, u32 dport, u32 oport, int errcode)
1dd0bd2b
JPM
92{
93 struct tipc_msg *msg;
94 struct sk_buff *buf;
95
96 buf = tipc_buf_acquire(hdr_sz + data_sz);
97 if (unlikely(!buf))
98 return NULL;
99
100 msg = buf_msg(buf);
c5898636 101 tipc_msg_init(onode, msg, user, type, hdr_sz, dnode);
1dd0bd2b 102 msg_set_size(msg, hdr_sz + data_sz);
1dd0bd2b
JPM
103 msg_set_origport(msg, oport);
104 msg_set_destport(msg, dport);
105 msg_set_errcode(msg, errcode);
106 if (hdr_sz > SHORT_H_SIZE) {
107 msg_set_orignode(msg, onode);
108 msg_set_destnode(msg, dnode);
109 }
110 return buf;
23461e83
AS
111}
112
37e22164 113/* tipc_buf_append(): Append a buffer to the fragment list of another buffer
29322d0d
JPM
114 * @*headbuf: in: NULL for first frag, otherwise value returned from prev call
115 * out: set when successful non-complete reassembly, otherwise NULL
116 * @*buf: in: the buffer to append. Always defined
b2ad5e5f 117 * out: head buf after successful complete reassembly, otherwise NULL
29322d0d 118 * Returns 1 when reassembly complete, otherwise 0
37e22164
JPM
119 */
120int tipc_buf_append(struct sk_buff **headbuf, struct sk_buff **buf)
121{
122 struct sk_buff *head = *headbuf;
123 struct sk_buff *frag = *buf;
124 struct sk_buff *tail;
13e9b997
JPM
125 struct tipc_msg *msg;
126 u32 fragid;
37e22164 127 int delta;
13e9b997 128 bool headstolen;
37e22164 129
13e9b997
JPM
130 if (!frag)
131 goto err;
132
133 msg = buf_msg(frag);
134 fragid = msg_type(msg);
135 frag->next = NULL;
37e22164
JPM
136 skb_pull(frag, msg_hdr_sz(msg));
137
138 if (fragid == FIRST_FRAGMENT) {
13e9b997
JPM
139 if (unlikely(head))
140 goto err;
141 if (unlikely(skb_unclone(frag, GFP_ATOMIC)))
142 goto err;
37e22164
JPM
143 head = *headbuf = frag;
144 skb_frag_list_init(head);
13e9b997 145 TIPC_SKB_CB(head)->tail = NULL;
29322d0d 146 *buf = NULL;
37e22164
JPM
147 return 0;
148 }
13e9b997 149
37e22164 150 if (!head)
13e9b997
JPM
151 goto err;
152
37e22164
JPM
153 if (skb_try_coalesce(head, frag, &headstolen, &delta)) {
154 kfree_skb_partial(frag, headstolen);
155 } else {
13e9b997 156 tail = TIPC_SKB_CB(head)->tail;
37e22164
JPM
157 if (!skb_has_frag_list(head))
158 skb_shinfo(head)->frag_list = frag;
159 else
160 tail->next = frag;
161 head->truesize += frag->truesize;
162 head->data_len += frag->len;
163 head->len += frag->len;
164 TIPC_SKB_CB(head)->tail = frag;
165 }
13e9b997 166
37e22164 167 if (fragid == LAST_FRAGMENT) {
1149557d
JPM
168 TIPC_SKB_CB(head)->validated = false;
169 if (unlikely(!tipc_msg_validate(head)))
170 goto err;
37e22164
JPM
171 *buf = head;
172 TIPC_SKB_CB(head)->tail = NULL;
173 *headbuf = NULL;
174 return 1;
175 }
176 *buf = NULL;
177 return 0;
13e9b997 178err:
37e22164
JPM
179 pr_warn_ratelimited("Unable to build fragment list\n");
180 kfree_skb(*buf);
29322d0d
JPM
181 kfree_skb(*headbuf);
182 *buf = *headbuf = NULL;
37e22164
JPM
183 return 0;
184}
4f1688b2 185
cf2157f8
JPM
186/* tipc_msg_validate - validate basic format of received message
187 *
188 * This routine ensures a TIPC message has an acceptable header, and at least
189 * as much data as the header indicates it should. The routine also ensures
190 * that the entire message header is stored in the main fragment of the message
191 * buffer, to simplify future access to message header fields.
192 *
193 * Note: Having extra info present in the message header or data areas is OK.
194 * TIPC will ignore the excess, under the assumption that it is optional info
195 * introduced by a later release of the protocol.
196 */
197bool tipc_msg_validate(struct sk_buff *skb)
198{
199 struct tipc_msg *msg;
200 int msz, hsz;
201
202 if (unlikely(TIPC_SKB_CB(skb)->validated))
203 return true;
204 if (unlikely(!pskb_may_pull(skb, MIN_H_SIZE)))
205 return false;
206
207 hsz = msg_hdr_sz(buf_msg(skb));
208 if (unlikely(hsz < MIN_H_SIZE) || (hsz > MAX_H_SIZE))
209 return false;
210 if (unlikely(!pskb_may_pull(skb, hsz)))
211 return false;
212
213 msg = buf_msg(skb);
214 if (unlikely(msg_version(msg) != TIPC_VERSION))
215 return false;
216
217 msz = msg_size(msg);
218 if (unlikely(msz < hsz))
219 return false;
220 if (unlikely((msz - hsz) > TIPC_MAX_USER_MSG_SIZE))
221 return false;
222 if (unlikely(skb->len < msz))
223 return false;
224
225 TIPC_SKB_CB(skb)->validated = true;
226 return true;
227}
067608e9
JPM
228
229/**
9fbfb8b1 230 * tipc_msg_build - create buffer chain containing specified header and data
067608e9 231 * @mhdr: Message header, to be prepended to data
45dcc687 232 * @m: User message
067608e9
JPM
233 * @dsz: Total length of user data
234 * @pktmax: Max packet size that can be used
a6ca1094
YX
235 * @list: Buffer or chain of buffers to be returned to caller
236 *
067608e9
JPM
237 * Returns message data size or errno: -ENOMEM, -EFAULT
238 */
c5898636 239int tipc_msg_build(struct tipc_msg *mhdr, struct msghdr *m,
34747539 240 int offset, int dsz, int pktmax, struct sk_buff_head *list)
067608e9
JPM
241{
242 int mhsz = msg_hdr_sz(mhdr);
243 int msz = mhsz + dsz;
244 int pktno = 1;
245 int pktsz;
246 int pktrem = pktmax;
247 int drem = dsz;
248 struct tipc_msg pkthdr;
a6ca1094 249 struct sk_buff *skb;
067608e9
JPM
250 char *pktpos;
251 int rc;
a6ca1094 252
067608e9
JPM
253 msg_set_size(mhdr, msz);
254
255 /* No fragmentation needed? */
256 if (likely(msz <= pktmax)) {
a6ca1094
YX
257 skb = tipc_buf_acquire(msz);
258 if (unlikely(!skb))
067608e9 259 return -ENOMEM;
c93d3baa 260 skb_orphan(skb);
a6ca1094
YX
261 __skb_queue_tail(list, skb);
262 skb_copy_to_linear_data(skb, mhdr, mhsz);
263 pktpos = skb->data + mhsz;
f25dcc76 264 if (copy_from_iter(pktpos, dsz, &m->msg_iter) == dsz)
067608e9
JPM
265 return dsz;
266 rc = -EFAULT;
267 goto error;
268 }
269
270 /* Prepare reusable fragment header */
c5898636
JPM
271 tipc_msg_init(msg_prevnode(mhdr), &pkthdr, MSG_FRAGMENTER,
272 FIRST_FRAGMENT, INT_H_SIZE, msg_destnode(mhdr));
067608e9
JPM
273 msg_set_size(&pkthdr, pktmax);
274 msg_set_fragm_no(&pkthdr, pktno);
e3eea1eb 275 msg_set_importance(&pkthdr, msg_importance(mhdr));
067608e9
JPM
276
277 /* Prepare first fragment */
a6ca1094
YX
278 skb = tipc_buf_acquire(pktmax);
279 if (!skb)
067608e9 280 return -ENOMEM;
c93d3baa 281 skb_orphan(skb);
a6ca1094
YX
282 __skb_queue_tail(list, skb);
283 pktpos = skb->data;
284 skb_copy_to_linear_data(skb, &pkthdr, INT_H_SIZE);
067608e9
JPM
285 pktpos += INT_H_SIZE;
286 pktrem -= INT_H_SIZE;
a6ca1094 287 skb_copy_to_linear_data_offset(skb, INT_H_SIZE, mhdr, mhsz);
067608e9
JPM
288 pktpos += mhsz;
289 pktrem -= mhsz;
290
291 do {
292 if (drem < pktrem)
293 pktrem = drem;
294
f25dcc76 295 if (copy_from_iter(pktpos, pktrem, &m->msg_iter) != pktrem) {
067608e9
JPM
296 rc = -EFAULT;
297 goto error;
298 }
299 drem -= pktrem;
067608e9
JPM
300
301 if (!drem)
302 break;
303
304 /* Prepare new fragment: */
305 if (drem < (pktmax - INT_H_SIZE))
306 pktsz = drem + INT_H_SIZE;
307 else
308 pktsz = pktmax;
a6ca1094
YX
309 skb = tipc_buf_acquire(pktsz);
310 if (!skb) {
067608e9
JPM
311 rc = -ENOMEM;
312 goto error;
313 }
c93d3baa 314 skb_orphan(skb);
a6ca1094 315 __skb_queue_tail(list, skb);
067608e9
JPM
316 msg_set_type(&pkthdr, FRAGMENT);
317 msg_set_size(&pkthdr, pktsz);
318 msg_set_fragm_no(&pkthdr, ++pktno);
a6ca1094
YX
319 skb_copy_to_linear_data(skb, &pkthdr, INT_H_SIZE);
320 pktpos = skb->data + INT_H_SIZE;
067608e9
JPM
321 pktrem = pktsz - INT_H_SIZE;
322
323 } while (1);
a6ca1094 324 msg_set_type(buf_msg(skb), LAST_FRAGMENT);
067608e9
JPM
325 return dsz;
326error:
a6ca1094
YX
327 __skb_queue_purge(list);
328 __skb_queue_head_init(list);
067608e9
JPM
329 return rc;
330}
331
4f1688b2
JPM
332/**
333 * tipc_msg_bundle(): Append contents of a buffer to tail of an existing one
05dcc5aa 334 * @bskb: the buffer to append to ("bundle")
58dc55f2 335 * @skb: buffer to be appended
4f1688b2
JPM
336 * @mtu: max allowable size for the bundle buffer
337 * Consumes buffer if successful
338 * Returns true if bundling could be performed, otherwise false
339 */
05dcc5aa 340bool tipc_msg_bundle(struct sk_buff *bskb, struct sk_buff *skb, u32 mtu)
4f1688b2 341{
05dcc5aa 342 struct tipc_msg *bmsg;
58dc55f2 343 struct tipc_msg *msg = buf_msg(skb);
05dcc5aa 344 unsigned int bsz;
4f1688b2 345 unsigned int msz = msg_size(msg);
05dcc5aa 346 u32 start, pad;
4f1688b2 347 u32 max = mtu - INT_H_SIZE;
4f1688b2
JPM
348
349 if (likely(msg_user(msg) == MSG_FRAGMENTER))
350 return false;
05dcc5aa
JPM
351 if (!bskb)
352 return false;
353 bmsg = buf_msg(bskb);
354 bsz = msg_size(bmsg);
355 start = align(bsz);
356 pad = start - bsz;
357
dff29b1a 358 if (unlikely(msg_user(msg) == TUNNEL_PROTOCOL))
4f1688b2
JPM
359 return false;
360 if (unlikely(msg_user(msg) == BCAST_PROTOCOL))
361 return false;
362 if (likely(msg_user(bmsg) != MSG_BUNDLER))
363 return false;
58dc55f2 364 if (unlikely(skb_tailroom(bskb) < (pad + msz)))
4f1688b2
JPM
365 return false;
366 if (unlikely(max < (start + msz)))
367 return false;
f21e897e
JPM
368 if ((msg_importance(msg) < TIPC_SYSTEM_IMPORTANCE) &&
369 (msg_importance(bmsg) == TIPC_SYSTEM_IMPORTANCE))
370 return false;
4f1688b2 371
58dc55f2
YX
372 skb_put(bskb, pad + msz);
373 skb_copy_to_linear_data_offset(bskb, start, skb->data, msz);
4f1688b2
JPM
374 msg_set_size(bmsg, start + msz);
375 msg_set_msgcnt(bmsg, msg_msgcnt(bmsg) + 1);
58dc55f2 376 kfree_skb(skb);
4f1688b2
JPM
377 return true;
378}
379
c637c103
JPM
380/**
381 * tipc_msg_extract(): extract bundled inner packet from buffer
c1336ee4 382 * @skb: buffer to be extracted from.
c637c103 383 * @iskb: extracted inner buffer, to be returned
c1336ee4
JPM
384 * @pos: position in outer message of msg to be extracted.
385 * Returns position of next msg
c637c103
JPM
386 * Consumes outer buffer when last packet extracted
387 * Returns true when when there is an extracted buffer, otherwise false
388 */
389bool tipc_msg_extract(struct sk_buff *skb, struct sk_buff **iskb, int *pos)
390{
1149557d 391 struct tipc_msg *msg;
c1336ee4 392 int imsz, offset;
c637c103 393
c1336ee4 394 *iskb = NULL;
1149557d 395 if (unlikely(skb_linearize(skb)))
c1336ee4
JPM
396 goto none;
397
1149557d 398 msg = buf_msg(skb);
c1336ee4
JPM
399 offset = msg_hdr_sz(msg) + *pos;
400 if (unlikely(offset > (msg_size(msg) - MIN_H_SIZE)))
c637c103 401 goto none;
c637c103 402
c1336ee4
JPM
403 *iskb = skb_clone(skb, GFP_ATOMIC);
404 if (unlikely(!*iskb))
c637c103 405 goto none;
c1336ee4
JPM
406 skb_pull(*iskb, offset);
407 imsz = msg_size(buf_msg(*iskb));
408 skb_trim(*iskb, imsz);
409 if (unlikely(!tipc_msg_validate(*iskb)))
c637c103 410 goto none;
c637c103
JPM
411 *pos += align(imsz);
412 return true;
413none:
414 kfree_skb(skb);
c1336ee4 415 kfree_skb(*iskb);
c637c103
JPM
416 *iskb = NULL;
417 return false;
418}
419
4f1688b2
JPM
420/**
421 * tipc_msg_make_bundle(): Create bundle buf and append message to its tail
58dc55f2
YX
422 * @list: the buffer chain
423 * @skb: buffer to be appended and replaced
424 * @mtu: max allowable size for the bundle buffer, inclusive header
4f1688b2
JPM
425 * @dnode: destination node for message. (Not always present in header)
426 * Replaces buffer if successful
b2ad5e5f 427 * Returns true if success, otherwise false
4f1688b2 428 */
05dcc5aa 429bool tipc_msg_make_bundle(struct sk_buff **skb, u32 mtu, u32 dnode)
4f1688b2 430{
58dc55f2 431 struct sk_buff *bskb;
4f1688b2 432 struct tipc_msg *bmsg;
05dcc5aa 433 struct tipc_msg *msg = buf_msg(*skb);
4f1688b2
JPM
434 u32 msz = msg_size(msg);
435 u32 max = mtu - INT_H_SIZE;
436
437 if (msg_user(msg) == MSG_FRAGMENTER)
438 return false;
dff29b1a 439 if (msg_user(msg) == TUNNEL_PROTOCOL)
4f1688b2
JPM
440 return false;
441 if (msg_user(msg) == BCAST_PROTOCOL)
442 return false;
443 if (msz > (max / 2))
444 return false;
445
58dc55f2
YX
446 bskb = tipc_buf_acquire(max);
447 if (!bskb)
4f1688b2
JPM
448 return false;
449
58dc55f2
YX
450 skb_trim(bskb, INT_H_SIZE);
451 bmsg = buf_msg(bskb);
c5898636
JPM
452 tipc_msg_init(msg_prevnode(msg), bmsg, MSG_BUNDLER, 0,
453 INT_H_SIZE, dnode);
f21e897e
JPM
454 if (msg_isdata(msg))
455 msg_set_importance(bmsg, TIPC_CRITICAL_IMPORTANCE);
456 else
457 msg_set_importance(bmsg, TIPC_SYSTEM_IMPORTANCE);
4f1688b2
JPM
458 msg_set_seqno(bmsg, msg_seqno(msg));
459 msg_set_ack(bmsg, msg_ack(msg));
460 msg_set_bcast_ack(bmsg, msg_bcast_ack(msg));
05dcc5aa
JPM
461 tipc_msg_bundle(bskb, *skb, mtu);
462 *skb = bskb;
463 return true;
4f1688b2 464}
8db1bae3
JPM
465
466/**
467 * tipc_msg_reverse(): swap source and destination addresses and add error code
468 * @buf: buffer containing message to be reversed
469 * @dnode: return value: node where to send message after reversal
470 * @err: error code to be set in message
471 * Consumes buffer if failure
472 * Returns true if success, otherwise false
473 */
c5898636 474bool tipc_msg_reverse(u32 own_addr, struct sk_buff *buf, u32 *dnode,
34747539 475 int err)
8db1bae3
JPM
476{
477 struct tipc_msg *msg = buf_msg(buf);
8db1bae3
JPM
478 struct tipc_msg ohdr;
479 uint rdsz = min_t(uint, msg_data_sz(msg), MAX_FORWARD_SIZE);
480
ac0074ee 481 if (skb_linearize(buf))
8db1bae3 482 goto exit;
1149557d 483 msg = buf_msg(buf);
ac0074ee
JPM
484 if (msg_dest_droppable(msg))
485 goto exit;
486 if (msg_errcode(msg))
8db1bae3 487 goto exit;
8db1bae3 488 memcpy(&ohdr, msg, msg_hdr_sz(msg));
8db1bae3
JPM
489 msg_set_errcode(msg, err);
490 msg_set_origport(msg, msg_destport(&ohdr));
491 msg_set_destport(msg, msg_origport(&ohdr));
c5898636 492 msg_set_prevnode(msg, own_addr);
8db1bae3
JPM
493 if (!msg_short(msg)) {
494 msg_set_orignode(msg, msg_destnode(&ohdr));
495 msg_set_destnode(msg, msg_orignode(&ohdr));
496 }
497 msg_set_size(msg, msg_hdr_sz(msg) + rdsz);
498 skb_trim(buf, msg_size(msg));
499 skb_orphan(buf);
500 *dnode = msg_orignode(&ohdr);
501 return true;
502exit:
503 kfree_skb(buf);
e3a77561 504 *dnode = 0;
8db1bae3
JPM
505 return false;
506}
5a379074
JPM
507
508/**
e3a77561
JPM
509 * tipc_msg_lookup_dest(): try to find new destination for named message
510 * @skb: the buffer containing the message.
511 * @dnode: return value: next-hop node, if destination found
512 * @err: return value: error code to use, if message to be rejected
5a379074 513 * Does not consume buffer
e3a77561 514 * Returns true if a destination is found, false otherwise
5a379074 515 */
e3a77561
JPM
516bool tipc_msg_lookup_dest(struct net *net, struct sk_buff *skb,
517 u32 *dnode, int *err)
5a379074 518{
e3a77561 519 struct tipc_msg *msg = buf_msg(skb);
5a379074 520 u32 dport;
d482994f 521 u32 own_addr = tipc_own_addr(net);
5a379074 522
e3a77561
JPM
523 if (!msg_isdata(msg))
524 return false;
525 if (!msg_named(msg))
526 return false;
d482994f
JPM
527 if (msg_errcode(msg))
528 return false;
e3a77561
JPM
529 *err = -TIPC_ERR_NO_NAME;
530 if (skb_linearize(skb))
531 return false;
d482994f 532 if (msg_reroute_cnt(msg))
e3a77561 533 return false;
34747539 534 *dnode = addr_domain(net, msg_lookup_scope(msg));
4ac1c8d0 535 dport = tipc_nametbl_translate(net, msg_nametype(msg),
e3a77561 536 msg_nameinst(msg), dnode);
5a379074 537 if (!dport)
e3a77561 538 return false;
5a379074 539 msg_incr_reroute_cnt(msg);
d482994f
JPM
540 if (*dnode != own_addr)
541 msg_set_prevnode(msg, own_addr);
5a379074
JPM
542 msg_set_destnode(msg, *dnode);
543 msg_set_destport(msg, dport);
e3a77561
JPM
544 *err = TIPC_OK;
545 return true;
5a379074 546}
078bec82
JPM
547
548/* tipc_msg_reassemble() - clone a buffer chain of fragments and
549 * reassemble the clones into one message
550 */
a6ca1094 551struct sk_buff *tipc_msg_reassemble(struct sk_buff_head *list)
078bec82 552{
a6ca1094
YX
553 struct sk_buff *skb;
554 struct sk_buff *frag = NULL;
078bec82
JPM
555 struct sk_buff *head = NULL;
556 int hdr_sz;
557
558 /* Copy header if single buffer */
a6ca1094
YX
559 if (skb_queue_len(list) == 1) {
560 skb = skb_peek(list);
561 hdr_sz = skb_headroom(skb) + msg_hdr_sz(buf_msg(skb));
562 return __pskb_copy(skb, hdr_sz, GFP_ATOMIC);
078bec82
JPM
563 }
564
565 /* Clone all fragments and reassemble */
a6ca1094
YX
566 skb_queue_walk(list, skb) {
567 frag = skb_clone(skb, GFP_ATOMIC);
078bec82
JPM
568 if (!frag)
569 goto error;
570 frag->next = NULL;
571 if (tipc_buf_append(&head, &frag))
572 break;
573 if (!head)
574 goto error;
078bec82
JPM
575 }
576 return frag;
577error:
578 pr_warn("Failed do clone local mcast rcv buffer\n");
579 kfree_skb(head);
580 return NULL;
581}
This page took 0.663931 seconds and 5 git commands to generate.