1 /* 2 * net/tipc/msg.c: TIPC message header routines 3 * 4 * Copyright (c) 2000-2006, 2014-2015, Ericsson AB 5 * Copyright (c) 2005, 2010-2011, Wind River Systems 6 * All rights reserved. 7 * 8 * Redistribution and use in source and binary forms, with or without 9 * modification, are permitted provided that the following conditions are met: 10 * 11 * 1. Redistributions of source code must retain the above copyright 12 * notice, this list of conditions and the following disclaimer. 13 * 2. Redistributions in binary form must reproduce the above copyright 14 * notice, this list of conditions and the following disclaimer in the 15 * documentation and/or other materials provided with the distribution. 16 * 3. Neither the names of the copyright holders nor the names of its 17 * contributors may be used to endorse or promote products derived from 18 * this software without specific prior written permission. 19 * 20 * Alternatively, this software may be distributed under the terms of the 21 * GNU General Public License ("GPL") version 2 as published by the Free 22 * Software Foundation. 23 * 24 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 25 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 27 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE 28 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 29 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 30 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 31 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 32 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 33 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 34 * POSSIBILITY OF SUCH DAMAGE. 35 */ 36 37 #include <net/sock.h> 38 #include "core.h" 39 #include "msg.h" 40 #include "addr.h" 41 #include "name_table.h" 42 #include "crypto.h" 43 44 #define MAX_FORWARD_SIZE 1024 45 #ifdef CONFIG_TIPC_CRYPTO 46 #define BUF_HEADROOM ALIGN(((LL_MAX_HEADER + 48) + EHDR_MAX_SIZE), 16) 47 #define BUF_TAILROOM (TIPC_AES_GCM_TAG_SIZE) 48 #else 49 #define BUF_HEADROOM (LL_MAX_HEADER + 48) 50 #define BUF_TAILROOM 16 51 #endif 52 53 static unsigned int align(unsigned int i) 54 { 55 return (i + 3) & ~3u; 56 } 57 58 /** 59 * tipc_buf_acquire - creates a TIPC message buffer 60 * @size: message size (including TIPC header) 61 * @gfp: memory allocation flags 62 * 63 * Return: a new buffer with data pointers set to the specified size. 64 * 65 * NOTE: 66 * Headroom is reserved to allow prepending of a data link header. 67 * There may also be unrequested tailroom present at the buffer's end. 68 */ 69 struct sk_buff *tipc_buf_acquire(u32 size, gfp_t gfp) 70 { 71 struct sk_buff *skb; 72 #ifdef CONFIG_TIPC_CRYPTO 73 unsigned int buf_size = (BUF_HEADROOM + size + BUF_TAILROOM + 3) & ~3u; 74 #else 75 unsigned int buf_size = (BUF_HEADROOM + size + 3) & ~3u; 76 #endif 77 78 skb = alloc_skb_fclone(buf_size, gfp); 79 if (skb) { 80 skb_reserve(skb, BUF_HEADROOM); 81 skb_put(skb, size); 82 skb->next = NULL; 83 } 84 return skb; 85 } 86 87 void tipc_msg_init(u32 own_node, struct tipc_msg *m, u32 user, u32 type, 88 u32 hsize, u32 dnode) 89 { 90 memset(m, 0, hsize); 91 msg_set_version(m); 92 msg_set_user(m, user); 93 msg_set_hdr_sz(m, hsize); 94 msg_set_size(m, hsize); 95 msg_set_prevnode(m, own_node); 96 msg_set_type(m, type); 97 if (hsize > SHORT_H_SIZE) { 98 msg_set_orignode(m, own_node); 99 msg_set_destnode(m, dnode); 100 } 101 } 102 103 struct sk_buff *tipc_msg_create(uint user, uint type, 104 uint hdr_sz, uint data_sz, u32 dnode, 105 u32 onode, u32 dport, u32 oport, int errcode) 106 { 107 struct tipc_msg *msg; 108 struct sk_buff *buf; 109 110 buf = tipc_buf_acquire(hdr_sz + data_sz, GFP_ATOMIC); 111 if (unlikely(!buf)) 112 return NULL; 113 114 msg = buf_msg(buf); 115 tipc_msg_init(onode, msg, user, type, hdr_sz, dnode); 116 msg_set_size(msg, hdr_sz + data_sz); 117 msg_set_origport(msg, oport); 118 msg_set_destport(msg, dport); 119 msg_set_errcode(msg, errcode); 120 return buf; 121 } 122 123 /* tipc_buf_append(): Append a buffer to the fragment list of another buffer 124 * @*headbuf: in: NULL for first frag, otherwise value returned from prev call 125 * out: set when successful non-complete reassembly, otherwise NULL 126 * @*buf: in: the buffer to append. Always defined 127 * out: head buf after successful complete reassembly, otherwise NULL 128 * Returns 1 when reassembly complete, otherwise 0 129 */ 130 int tipc_buf_append(struct sk_buff **headbuf, struct sk_buff **buf) 131 { 132 struct sk_buff *head = *headbuf; 133 struct sk_buff *frag = *buf; 134 struct sk_buff *tail = NULL; 135 struct tipc_msg *msg; 136 u32 fragid; 137 int delta; 138 bool headstolen; 139 140 if (!frag) 141 goto err; 142 143 msg = buf_msg(frag); 144 fragid = msg_type(msg); 145 frag->next = NULL; 146 skb_pull(frag, msg_hdr_sz(msg)); 147 148 if (fragid == FIRST_FRAGMENT) { 149 if (unlikely(head)) 150 goto err; 151 *buf = NULL; 152 frag = skb_unshare(frag, GFP_ATOMIC); 153 if (unlikely(!frag)) 154 goto err; 155 head = *headbuf = frag; 156 TIPC_SKB_CB(head)->tail = NULL; 157 if (skb_is_nonlinear(head)) { 158 skb_walk_frags(head, tail) { 159 TIPC_SKB_CB(head)->tail = tail; 160 } 161 } else { 162 skb_frag_list_init(head); 163 } 164 return 0; 165 } 166 167 if (!head) 168 goto err; 169 170 if (skb_try_coalesce(head, frag, &headstolen, &delta)) { 171 kfree_skb_partial(frag, headstolen); 172 } else { 173 tail = TIPC_SKB_CB(head)->tail; 174 if (!skb_has_frag_list(head)) 175 skb_shinfo(head)->frag_list = frag; 176 else 177 tail->next = frag; 178 head->truesize += frag->truesize; 179 head->data_len += frag->len; 180 head->len += frag->len; 181 TIPC_SKB_CB(head)->tail = frag; 182 } 183 184 if (fragid == LAST_FRAGMENT) { 185 TIPC_SKB_CB(head)->validated = 0; 186 if (unlikely(!tipc_msg_validate(&head))) 187 goto err; 188 *buf = head; 189 TIPC_SKB_CB(head)->tail = NULL; 190 *headbuf = NULL; 191 return 1; 192 } 193 *buf = NULL; 194 return 0; 195 err: 196 kfree_skb(*buf); 197 kfree_skb(*headbuf); 198 *buf = *headbuf = NULL; 199 return 0; 200 } 201 202 /** 203 * tipc_msg_append(): Append data to tail of an existing buffer queue 204 * @_hdr: header to be used 205 * @m: the data to be appended 206 * @mss: max allowable size of buffer 207 * @dlen: size of data to be appended 208 * @txq: queue to append to 209 * 210 * Return: the number of 1k blocks appended or errno value 211 */ 212 int tipc_msg_append(struct tipc_msg *_hdr, struct msghdr *m, int dlen, 213 int mss, struct sk_buff_head *txq) 214 { 215 struct sk_buff *skb; 216 int accounted, total, curr; 217 int mlen, cpy, rem = dlen; 218 struct tipc_msg *hdr; 219 220 skb = skb_peek_tail(txq); 221 accounted = skb ? msg_blocks(buf_msg(skb)) : 0; 222 total = accounted; 223 224 do { 225 if (!skb || skb->len >= mss) { 226 skb = tipc_buf_acquire(mss, GFP_KERNEL); 227 if (unlikely(!skb)) 228 return -ENOMEM; 229 skb_orphan(skb); 230 skb_trim(skb, MIN_H_SIZE); 231 hdr = buf_msg(skb); 232 skb_copy_to_linear_data(skb, _hdr, MIN_H_SIZE); 233 msg_set_hdr_sz(hdr, MIN_H_SIZE); 234 msg_set_size(hdr, MIN_H_SIZE); 235 __skb_queue_tail(txq, skb); 236 total += 1; 237 } 238 hdr = buf_msg(skb); 239 curr = msg_blocks(hdr); 240 mlen = msg_size(hdr); 241 cpy = min_t(size_t, rem, mss - mlen); 242 if (cpy != copy_from_iter(skb->data + mlen, cpy, &m->msg_iter)) 243 return -EFAULT; 244 msg_set_size(hdr, mlen + cpy); 245 skb_put(skb, cpy); 246 rem -= cpy; 247 total += msg_blocks(hdr) - curr; 248 } while (rem > 0); 249 return total - accounted; 250 } 251 252 /* tipc_msg_validate - validate basic format of received message 253 * 254 * This routine ensures a TIPC message has an acceptable header, and at least 255 * as much data as the header indicates it should. The routine also ensures 256 * that the entire message header is stored in the main fragment of the message 257 * buffer, to simplify future access to message header fields. 258 * 259 * Note: Having extra info present in the message header or data areas is OK. 260 * TIPC will ignore the excess, under the assumption that it is optional info 261 * introduced by a later release of the protocol. 262 */ 263 bool tipc_msg_validate(struct sk_buff **_skb) 264 { 265 struct sk_buff *skb = *_skb; 266 struct tipc_msg *hdr; 267 int msz, hsz; 268 269 /* Ensure that flow control ratio condition is satisfied */ 270 if (unlikely(skb->truesize / buf_roundup_len(skb) >= 4)) { 271 skb = skb_copy_expand(skb, BUF_HEADROOM, 0, GFP_ATOMIC); 272 if (!skb) 273 return false; 274 kfree_skb(*_skb); 275 *_skb = skb; 276 } 277 278 if (unlikely(TIPC_SKB_CB(skb)->validated)) 279 return true; 280 281 if (unlikely(!pskb_may_pull(skb, MIN_H_SIZE))) 282 return false; 283 284 hsz = msg_hdr_sz(buf_msg(skb)); 285 if (unlikely(hsz < MIN_H_SIZE) || (hsz > MAX_H_SIZE)) 286 return false; 287 if (unlikely(!pskb_may_pull(skb, hsz))) 288 return false; 289 290 hdr = buf_msg(skb); 291 if (unlikely(msg_version(hdr) != TIPC_VERSION)) 292 return false; 293 294 msz = msg_size(hdr); 295 if (unlikely(msz < hsz)) 296 return false; 297 if (unlikely((msz - hsz) > TIPC_MAX_USER_MSG_SIZE)) 298 return false; 299 if (unlikely(skb->len < msz)) 300 return false; 301 302 TIPC_SKB_CB(skb)->validated = 1; 303 return true; 304 } 305 306 /** 307 * tipc_msg_fragment - build a fragment skb list for TIPC message 308 * 309 * @skb: TIPC message skb 310 * @hdr: internal msg header to be put on the top of the fragments 311 * @pktmax: max size of a fragment incl. the header 312 * @frags: returned fragment skb list 313 * 314 * Return: 0 if the fragmentation is successful, otherwise: -EINVAL 315 * or -ENOMEM 316 */ 317 int tipc_msg_fragment(struct sk_buff *skb, const struct tipc_msg *hdr, 318 int pktmax, struct sk_buff_head *frags) 319 { 320 int pktno, nof_fragms, dsz, dmax, eat; 321 struct tipc_msg *_hdr; 322 struct sk_buff *_skb; 323 u8 *data; 324 325 /* Non-linear buffer? */ 326 if (skb_linearize(skb)) 327 return -ENOMEM; 328 329 data = (u8 *)skb->data; 330 dsz = msg_size(buf_msg(skb)); 331 dmax = pktmax - INT_H_SIZE; 332 if (dsz <= dmax || !dmax) 333 return -EINVAL; 334 335 nof_fragms = dsz / dmax + 1; 336 for (pktno = 1; pktno <= nof_fragms; pktno++) { 337 if (pktno < nof_fragms) 338 eat = dmax; 339 else 340 eat = dsz % dmax; 341 /* Allocate a new fragment */ 342 _skb = tipc_buf_acquire(INT_H_SIZE + eat, GFP_ATOMIC); 343 if (!_skb) 344 goto error; 345 skb_orphan(_skb); 346 __skb_queue_tail(frags, _skb); 347 /* Copy header & data to the fragment */ 348 skb_copy_to_linear_data(_skb, hdr, INT_H_SIZE); 349 skb_copy_to_linear_data_offset(_skb, INT_H_SIZE, data, eat); 350 data += eat; 351 /* Update the fragment's header */ 352 _hdr = buf_msg(_skb); 353 msg_set_fragm_no(_hdr, pktno); 354 msg_set_nof_fragms(_hdr, nof_fragms); 355 msg_set_size(_hdr, INT_H_SIZE + eat); 356 } 357 return 0; 358 359 error: 360 __skb_queue_purge(frags); 361 __skb_queue_head_init(frags); 362 return -ENOMEM; 363 } 364 365 /** 366 * tipc_msg_build - create buffer chain containing specified header and data 367 * @mhdr: Message header, to be prepended to data 368 * @m: User message 369 * @offset: buffer offset for fragmented messages (FIXME) 370 * @dsz: Total length of user data 371 * @pktmax: Max packet size that can be used 372 * @list: Buffer or chain of buffers to be returned to caller 373 * 374 * Note that the recursive call we are making here is safe, since it can 375 * logically go only one further level down. 376 * 377 * Return: message data size or errno: -ENOMEM, -EFAULT 378 */ 379 int tipc_msg_build(struct tipc_msg *mhdr, struct msghdr *m, int offset, 380 int dsz, int pktmax, struct sk_buff_head *list) 381 { 382 int mhsz = msg_hdr_sz(mhdr); 383 struct tipc_msg pkthdr; 384 int msz = mhsz + dsz; 385 int pktrem = pktmax; 386 struct sk_buff *skb; 387 int drem = dsz; 388 int pktno = 1; 389 char *pktpos; 390 int pktsz; 391 int rc; 392 393 msg_set_size(mhdr, msz); 394 395 /* No fragmentation needed? */ 396 if (likely(msz <= pktmax)) { 397 skb = tipc_buf_acquire(msz, GFP_KERNEL); 398 399 /* Fall back to smaller MTU if node local message */ 400 if (unlikely(!skb)) { 401 if (pktmax != MAX_MSG_SIZE) 402 return -ENOMEM; 403 rc = tipc_msg_build(mhdr, m, offset, dsz, FB_MTU, list); 404 if (rc != dsz) 405 return rc; 406 if (tipc_msg_assemble(list)) 407 return dsz; 408 return -ENOMEM; 409 } 410 skb_orphan(skb); 411 __skb_queue_tail(list, skb); 412 skb_copy_to_linear_data(skb, mhdr, mhsz); 413 pktpos = skb->data + mhsz; 414 if (copy_from_iter_full(pktpos, dsz, &m->msg_iter)) 415 return dsz; 416 rc = -EFAULT; 417 goto error; 418 } 419 420 /* Prepare reusable fragment header */ 421 tipc_msg_init(msg_prevnode(mhdr), &pkthdr, MSG_FRAGMENTER, 422 FIRST_FRAGMENT, INT_H_SIZE, msg_destnode(mhdr)); 423 msg_set_size(&pkthdr, pktmax); 424 msg_set_fragm_no(&pkthdr, pktno); 425 msg_set_importance(&pkthdr, msg_importance(mhdr)); 426 427 /* Prepare first fragment */ 428 skb = tipc_buf_acquire(pktmax, GFP_KERNEL); 429 if (!skb) 430 return -ENOMEM; 431 skb_orphan(skb); 432 __skb_queue_tail(list, skb); 433 pktpos = skb->data; 434 skb_copy_to_linear_data(skb, &pkthdr, INT_H_SIZE); 435 pktpos += INT_H_SIZE; 436 pktrem -= INT_H_SIZE; 437 skb_copy_to_linear_data_offset(skb, INT_H_SIZE, mhdr, mhsz); 438 pktpos += mhsz; 439 pktrem -= mhsz; 440 441 do { 442 if (drem < pktrem) 443 pktrem = drem; 444 445 if (!copy_from_iter_full(pktpos, pktrem, &m->msg_iter)) { 446 rc = -EFAULT; 447 goto error; 448 } 449 drem -= pktrem; 450 451 if (!drem) 452 break; 453 454 /* Prepare new fragment: */ 455 if (drem < (pktmax - INT_H_SIZE)) 456 pktsz = drem + INT_H_SIZE; 457 else 458 pktsz = pktmax; 459 skb = tipc_buf_acquire(pktsz, GFP_KERNEL); 460 if (!skb) { 461 rc = -ENOMEM; 462 goto error; 463 } 464 skb_orphan(skb); 465 __skb_queue_tail(list, skb); 466 msg_set_type(&pkthdr, FRAGMENT); 467 msg_set_size(&pkthdr, pktsz); 468 msg_set_fragm_no(&pkthdr, ++pktno); 469 skb_copy_to_linear_data(skb, &pkthdr, INT_H_SIZE); 470 pktpos = skb->data + INT_H_SIZE; 471 pktrem = pktsz - INT_H_SIZE; 472 473 } while (1); 474 msg_set_type(buf_msg(skb), LAST_FRAGMENT); 475 return dsz; 476 error: 477 __skb_queue_purge(list); 478 __skb_queue_head_init(list); 479 return rc; 480 } 481 482 /** 483 * tipc_msg_bundle - Append contents of a buffer to tail of an existing one 484 * @bskb: the bundle buffer to append to 485 * @msg: message to be appended 486 * @max: max allowable size for the bundle buffer 487 * 488 * Return: "true" if bundling has been performed, otherwise "false" 489 */ 490 static bool tipc_msg_bundle(struct sk_buff *bskb, struct tipc_msg *msg, 491 u32 max) 492 { 493 struct tipc_msg *bmsg = buf_msg(bskb); 494 u32 msz, bsz, offset, pad; 495 496 msz = msg_size(msg); 497 bsz = msg_size(bmsg); 498 offset = align(bsz); 499 pad = offset - bsz; 500 501 if (unlikely(skb_tailroom(bskb) < (pad + msz))) 502 return false; 503 if (unlikely(max < (offset + msz))) 504 return false; 505 506 skb_put(bskb, pad + msz); 507 skb_copy_to_linear_data_offset(bskb, offset, msg, msz); 508 msg_set_size(bmsg, offset + msz); 509 msg_set_msgcnt(bmsg, msg_msgcnt(bmsg) + 1); 510 return true; 511 } 512 513 /** 514 * tipc_msg_try_bundle - Try to bundle a new message to the last one 515 * @tskb: the last/target message to which the new one will be appended 516 * @skb: the new message skb pointer 517 * @mss: max message size (header inclusive) 518 * @dnode: destination node for the message 519 * @new_bundle: if this call made a new bundle or not 520 * 521 * Return: "true" if the new message skb is potential for bundling this time or 522 * later, in the case a bundling has been done this time, the skb is consumed 523 * (the skb pointer = NULL). 524 * Otherwise, "false" if the skb cannot be bundled at all. 525 */ 526 bool tipc_msg_try_bundle(struct sk_buff *tskb, struct sk_buff **skb, u32 mss, 527 u32 dnode, bool *new_bundle) 528 { 529 struct tipc_msg *msg, *inner, *outer; 530 u32 tsz; 531 532 /* First, check if the new buffer is suitable for bundling */ 533 msg = buf_msg(*skb); 534 if (msg_user(msg) == MSG_FRAGMENTER) 535 return false; 536 if (msg_user(msg) == TUNNEL_PROTOCOL) 537 return false; 538 if (msg_user(msg) == BCAST_PROTOCOL) 539 return false; 540 if (mss <= INT_H_SIZE + msg_size(msg)) 541 return false; 542 543 /* Ok, but the last/target buffer can be empty? */ 544 if (unlikely(!tskb)) 545 return true; 546 547 /* Is it a bundle already? Try to bundle the new message to it */ 548 if (msg_user(buf_msg(tskb)) == MSG_BUNDLER) { 549 *new_bundle = false; 550 goto bundle; 551 } 552 553 /* Make a new bundle of the two messages if possible */ 554 tsz = msg_size(buf_msg(tskb)); 555 if (unlikely(mss < align(INT_H_SIZE + tsz) + msg_size(msg))) 556 return true; 557 if (unlikely(pskb_expand_head(tskb, INT_H_SIZE, mss - tsz - INT_H_SIZE, 558 GFP_ATOMIC))) 559 return true; 560 inner = buf_msg(tskb); 561 skb_push(tskb, INT_H_SIZE); 562 outer = buf_msg(tskb); 563 tipc_msg_init(msg_prevnode(inner), outer, MSG_BUNDLER, 0, INT_H_SIZE, 564 dnode); 565 msg_set_importance(outer, msg_importance(inner)); 566 msg_set_size(outer, INT_H_SIZE + tsz); 567 msg_set_msgcnt(outer, 1); 568 *new_bundle = true; 569 570 bundle: 571 if (likely(tipc_msg_bundle(tskb, msg, mss))) { 572 consume_skb(*skb); 573 *skb = NULL; 574 } 575 return true; 576 } 577 578 /** 579 * tipc_msg_extract(): extract bundled inner packet from buffer 580 * @skb: buffer to be extracted from. 581 * @iskb: extracted inner buffer, to be returned 582 * @pos: position in outer message of msg to be extracted. 583 * Returns position of next msg. 584 * Consumes outer buffer when last packet extracted 585 * Return: true when there is an extracted buffer, otherwise false 586 */ 587 bool tipc_msg_extract(struct sk_buff *skb, struct sk_buff **iskb, int *pos) 588 { 589 struct tipc_msg *hdr, *ihdr; 590 int imsz; 591 592 *iskb = NULL; 593 if (unlikely(skb_linearize(skb))) 594 goto none; 595 596 hdr = buf_msg(skb); 597 if (unlikely(*pos > (msg_data_sz(hdr) - MIN_H_SIZE))) 598 goto none; 599 600 ihdr = (struct tipc_msg *)(msg_data(hdr) + *pos); 601 imsz = msg_size(ihdr); 602 603 if ((*pos + imsz) > msg_data_sz(hdr)) 604 goto none; 605 606 *iskb = tipc_buf_acquire(imsz, GFP_ATOMIC); 607 if (!*iskb) 608 goto none; 609 610 skb_copy_to_linear_data(*iskb, ihdr, imsz); 611 if (unlikely(!tipc_msg_validate(iskb))) 612 goto none; 613 614 *pos += align(imsz); 615 return true; 616 none: 617 kfree_skb(skb); 618 kfree_skb(*iskb); 619 *iskb = NULL; 620 return false; 621 } 622 623 /** 624 * tipc_msg_reverse(): swap source and destination addresses and add error code 625 * @own_node: originating node id for reversed message 626 * @skb: buffer containing message to be reversed; will be consumed 627 * @err: error code to be set in message, if any 628 * Replaces consumed buffer with new one when successful 629 * Return: true if success, otherwise false 630 */ 631 bool tipc_msg_reverse(u32 own_node, struct sk_buff **skb, int err) 632 { 633 struct sk_buff *_skb = *skb; 634 struct tipc_msg *_hdr, *hdr; 635 int hlen, dlen; 636 637 if (skb_linearize(_skb)) 638 goto exit; 639 _hdr = buf_msg(_skb); 640 dlen = min_t(uint, msg_data_sz(_hdr), MAX_FORWARD_SIZE); 641 hlen = msg_hdr_sz(_hdr); 642 643 if (msg_dest_droppable(_hdr)) 644 goto exit; 645 if (msg_errcode(_hdr)) 646 goto exit; 647 648 /* Never return SHORT header */ 649 if (hlen == SHORT_H_SIZE) 650 hlen = BASIC_H_SIZE; 651 652 /* Don't return data along with SYN+, - sender has a clone */ 653 if (msg_is_syn(_hdr) && err == TIPC_ERR_OVERLOAD) 654 dlen = 0; 655 656 /* Allocate new buffer to return */ 657 *skb = tipc_buf_acquire(hlen + dlen, GFP_ATOMIC); 658 if (!*skb) 659 goto exit; 660 memcpy((*skb)->data, _skb->data, msg_hdr_sz(_hdr)); 661 memcpy((*skb)->data + hlen, msg_data(_hdr), dlen); 662 663 /* Build reverse header in new buffer */ 664 hdr = buf_msg(*skb); 665 msg_set_hdr_sz(hdr, hlen); 666 msg_set_errcode(hdr, err); 667 msg_set_non_seq(hdr, 0); 668 msg_set_origport(hdr, msg_destport(_hdr)); 669 msg_set_destport(hdr, msg_origport(_hdr)); 670 msg_set_destnode(hdr, msg_prevnode(_hdr)); 671 msg_set_prevnode(hdr, own_node); 672 msg_set_orignode(hdr, own_node); 673 msg_set_size(hdr, hlen + dlen); 674 skb_orphan(_skb); 675 kfree_skb(_skb); 676 return true; 677 exit: 678 kfree_skb(_skb); 679 *skb = NULL; 680 return false; 681 } 682 683 bool tipc_msg_skb_clone(struct sk_buff_head *msg, struct sk_buff_head *cpy) 684 { 685 struct sk_buff *skb, *_skb; 686 687 skb_queue_walk(msg, skb) { 688 _skb = skb_clone(skb, GFP_ATOMIC); 689 if (!_skb) { 690 __skb_queue_purge(cpy); 691 pr_err_ratelimited("Failed to clone buffer chain\n"); 692 return false; 693 } 694 __skb_queue_tail(cpy, _skb); 695 } 696 return true; 697 } 698 699 /** 700 * tipc_msg_lookup_dest(): try to find new destination for named message 701 * @net: pointer to associated network namespace 702 * @skb: the buffer containing the message. 703 * @err: error code to be used by caller if lookup fails 704 * Does not consume buffer 705 * Return: true if a destination is found, false otherwise 706 */ 707 bool tipc_msg_lookup_dest(struct net *net, struct sk_buff *skb, int *err) 708 { 709 struct tipc_msg *msg = buf_msg(skb); 710 u32 scope = msg_lookup_scope(msg); 711 u32 self = tipc_own_addr(net); 712 u32 inst = msg_nameinst(msg); 713 struct tipc_socket_addr sk; 714 struct tipc_uaddr ua; 715 716 if (!msg_isdata(msg)) 717 return false; 718 if (!msg_named(msg)) 719 return false; 720 if (msg_errcode(msg)) 721 return false; 722 *err = TIPC_ERR_NO_NAME; 723 if (skb_linearize(skb)) 724 return false; 725 msg = buf_msg(skb); 726 if (msg_reroute_cnt(msg)) 727 return false; 728 tipc_uaddr(&ua, TIPC_SERVICE_RANGE, scope, 729 msg_nametype(msg), inst, inst); 730 sk.node = tipc_scope2node(net, scope); 731 if (!tipc_nametbl_lookup_anycast(net, &ua, &sk)) 732 return false; 733 msg_incr_reroute_cnt(msg); 734 if (sk.node != self) 735 msg_set_prevnode(msg, self); 736 msg_set_destnode(msg, sk.node); 737 msg_set_destport(msg, sk.ref); 738 *err = TIPC_OK; 739 740 return true; 741 } 742 743 /* tipc_msg_assemble() - assemble chain of fragments into one message 744 */ 745 bool tipc_msg_assemble(struct sk_buff_head *list) 746 { 747 struct sk_buff *skb, *tmp = NULL; 748 749 if (skb_queue_len(list) == 1) 750 return true; 751 752 while ((skb = __skb_dequeue(list))) { 753 skb->next = NULL; 754 if (tipc_buf_append(&tmp, &skb)) { 755 __skb_queue_tail(list, skb); 756 return true; 757 } 758 if (!tmp) 759 break; 760 } 761 __skb_queue_purge(list); 762 __skb_queue_head_init(list); 763 pr_warn("Failed do assemble buffer\n"); 764 return false; 765 } 766 767 /* tipc_msg_reassemble() - clone a buffer chain of fragments and 768 * reassemble the clones into one message 769 */ 770 bool tipc_msg_reassemble(struct sk_buff_head *list, struct sk_buff_head *rcvq) 771 { 772 struct sk_buff *skb, *_skb; 773 struct sk_buff *frag = NULL; 774 struct sk_buff *head = NULL; 775 int hdr_len; 776 777 /* Copy header if single buffer */ 778 if (skb_queue_len(list) == 1) { 779 skb = skb_peek(list); 780 hdr_len = skb_headroom(skb) + msg_hdr_sz(buf_msg(skb)); 781 _skb = __pskb_copy(skb, hdr_len, GFP_ATOMIC); 782 if (!_skb) 783 return false; 784 __skb_queue_tail(rcvq, _skb); 785 return true; 786 } 787 788 /* Clone all fragments and reassemble */ 789 skb_queue_walk(list, skb) { 790 frag = skb_clone(skb, GFP_ATOMIC); 791 if (!frag) 792 goto error; 793 frag->next = NULL; 794 if (tipc_buf_append(&head, &frag)) 795 break; 796 if (!head) 797 goto error; 798 } 799 __skb_queue_tail(rcvq, frag); 800 return true; 801 error: 802 pr_warn("Failed do clone local mcast rcv buffer\n"); 803 kfree_skb(head); 804 return false; 805 } 806 807 bool tipc_msg_pskb_copy(u32 dst, struct sk_buff_head *msg, 808 struct sk_buff_head *cpy) 809 { 810 struct sk_buff *skb, *_skb; 811 812 skb_queue_walk(msg, skb) { 813 _skb = pskb_copy(skb, GFP_ATOMIC); 814 if (!_skb) { 815 __skb_queue_purge(cpy); 816 return false; 817 } 818 msg_set_destnode(buf_msg(_skb), dst); 819 __skb_queue_tail(cpy, _skb); 820 } 821 return true; 822 } 823 824 /* tipc_skb_queue_sorted(); sort pkt into list according to sequence number 825 * @list: list to be appended to 826 * @seqno: sequence number of buffer to add 827 * @skb: buffer to add 828 */ 829 bool __tipc_skb_queue_sorted(struct sk_buff_head *list, u16 seqno, 830 struct sk_buff *skb) 831 { 832 struct sk_buff *_skb, *tmp; 833 834 if (skb_queue_empty(list) || less(seqno, buf_seqno(skb_peek(list)))) { 835 __skb_queue_head(list, skb); 836 return true; 837 } 838 839 if (more(seqno, buf_seqno(skb_peek_tail(list)))) { 840 __skb_queue_tail(list, skb); 841 return true; 842 } 843 844 skb_queue_walk_safe(list, _skb, tmp) { 845 if (more(seqno, buf_seqno(_skb))) 846 continue; 847 if (seqno == buf_seqno(_skb)) 848 break; 849 __skb_queue_before(list, _skb, skb); 850 return true; 851 } 852 kfree_skb(skb); 853 return false; 854 } 855 856 void tipc_skb_reject(struct net *net, int err, struct sk_buff *skb, 857 struct sk_buff_head *xmitq) 858 { 859 if (tipc_msg_reverse(tipc_own_addr(net), &skb, err)) 860 __skb_queue_tail(xmitq, skb); 861 } 862