aboutgitcodebugslistschat
path: root/tcp_buf.c
diff options
context:
space:
mode:
authorLaurent Vivier <lvivier@redhat.com>2024-10-24 10:50:58 +0200
committerStefano Brivio <sbrivio@redhat.com>2024-10-25 14:29:51 +0200
commitf43f7d5e89b51b44a03de5a1eb566e14604bb08d (patch)
tree5e457425b0582fbc1ac74fb868178fcd5c5ab132 /tcp_buf.c
parente7fcd0c3481f15395ea4060eadfac0b6a8f69b29 (diff)
downloadpasst-f43f7d5e89b51b44a03de5a1eb566e14604bb08d.tar
passt-f43f7d5e89b51b44a03de5a1eb566e14604bb08d.tar.gz
passt-f43f7d5e89b51b44a03de5a1eb566e14604bb08d.tar.bz2
passt-f43f7d5e89b51b44a03de5a1eb566e14604bb08d.tar.lz
passt-f43f7d5e89b51b44a03de5a1eb566e14604bb08d.tar.xz
passt-f43f7d5e89b51b44a03de5a1eb566e14604bb08d.tar.zst
passt-f43f7d5e89b51b44a03de5a1eb566e14604bb08d.zip
tcp: cleanup tcp_buf_data_from_sock()
Remove the err label as there is only one caller, and move code to the caller position. ret is not needed here anymore as it is always 0. Remove sendlen as we can user directly len. Signed-off-by: Laurent Vivier <lvivier@redhat.com> Reviewed-by: David Gibson <david@gibson.dropbear.id.au> Signed-off-by: Stefano Brivio <sbrivio@redhat.com>
Diffstat (limited to 'tcp_buf.c')
-rw-r--r--tcp_buf.c34
1 files changed, 16 insertions, 18 deletions
diff --git a/tcp_buf.c b/tcp_buf.c
index 44df0e4..cb6742c 100644
--- a/tcp_buf.c
+++ b/tcp_buf.c
@@ -382,8 +382,8 @@ int tcp_buf_data_from_sock(const struct ctx *c, struct tcp_tap_conn *conn)
{
uint32_t wnd_scaled = conn->wnd_from_tap << conn->ws_from_tap;
int fill_bufs, send_bufs = 0, last_len, iov_rem = 0;
- int sendlen, len, dlen, v4 = CONN_V4(conn);
- int s = conn->sock, i, ret = 0;
+ int len, dlen, v4 = CONN_V4(conn);
+ int s = conn->sock, i;
struct msghdr mh_sock = { 0 };
uint16_t mss = MSS_GET(conn);
uint32_t already_sent, seq;
@@ -453,12 +453,19 @@ int tcp_buf_data_from_sock(const struct ctx *c, struct tcp_tap_conn *conn)
len = recvmsg(s, &mh_sock, MSG_PEEK);
while (len < 0 && errno == EINTR);
- if (len < 0)
- goto err;
+ if (len < 0) {
+ if (errno != EAGAIN && errno != EWOULDBLOCK) {
+ tcp_rst(c, conn);
+ return -errno;
+ }
+
+ return 0;
+ }
if (!len) {
if ((conn->events & (SOCK_FIN_RCVD | TAP_FIN_SENT)) == SOCK_FIN_RCVD) {
- if ((ret = tcp_buf_send_flag(c, conn, FIN | ACK))) {
+ int ret = tcp_buf_send_flag(c, conn, FIN | ACK);
+ if (ret) {
tcp_rst(c, conn);
return ret;
}
@@ -469,19 +476,18 @@ int tcp_buf_data_from_sock(const struct ctx *c, struct tcp_tap_conn *conn)
return 0;
}
- sendlen = len;
if (!peek_offset_cap)
- sendlen -= already_sent;
+ len -= already_sent;
- if (sendlen <= 0) {
+ if (len <= 0) {
conn_flag(c, conn, STALLED);
return 0;
}
conn_flag(c, conn, ~STALLED);
- send_bufs = DIV_ROUND_UP(sendlen, mss);
- last_len = sendlen - (send_bufs - 1) * mss;
+ send_bufs = DIV_ROUND_UP(len, mss);
+ last_len = len - (send_bufs - 1) * mss;
/* Likely, some new data was acked too. */
tcp_update_seqack_wnd(c, conn, false, NULL);
@@ -502,12 +508,4 @@ int tcp_buf_data_from_sock(const struct ctx *c, struct tcp_tap_conn *conn)
conn_flag(c, conn, ACK_FROM_TAP_DUE);
return 0;
-
-err:
- if (errno != EAGAIN && errno != EWOULDBLOCK) {
- ret = -errno;
- tcp_rst(c, conn);
- }
-
- return ret;
}