Received: by 2002:a05:6a10:eb17:0:0:0:0 with SMTP id hx23csp444071pxb; Thu, 9 Sep 2021 04:44:23 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyvGUGzA9uNwoxqTZYWynTl8kzeUHdJQa6wrVIFrhZVXvwD0k+PL/knPfPCIhf0oSiZOZ0+ X-Received: by 2002:a02:ab87:: with SMTP id t7mr2407244jan.127.1631187863496; Thu, 09 Sep 2021 04:44:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1631187863; cv=none; d=google.com; s=arc-20160816; b=zAH+Bl1QHtzsqOtmq1oxSFRzClCnMg5msMf953Y7qMijhyt4VpxP+z9CsKLMdpcgSD WxE8JiLErZfABEAwvo/fwthLTscYiUvVuvsrqunKPs42Mwc5Y6t0A7k3wKEcYvVj0L8Q H3RnPW7CPBFPxsXzht8u6jYqAHqU/xSoCIqL8dl0ClZSgZW3wOul0JU+rXKUdR0PbXn7 j6jMVpul69wz5KyiPhmoOWx85O30d8cxLABbS5+FbLZj6jm0+Wzfw0RR8zhXy1NtKFqH NhregvRwvvOHNJuxtkLSAJOQoh50ibEzQNlrUZe0y6InOReOBrUyWC2VAKTNvHQVfo9Y A5vQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=p7SlbbSfdc5ltFZCFigPp+DWeoKZcKIa0igFS48WYRI=; b=oTv3VnkYEp/l1RbknScV1I7jpXuSoBh+UMnJ8dqqVD7JaufowtTxpL/tJGmKPTnAyw vcCiHJuTEDrQzA5IIwi6QAGr/EylhpNcSSr24Lp7VAZPsSd1n6BOiao5Bk6unYI0Ag6L MIsmJRKfiCSRpA2/fdLLbT5jzFv6VQjOgPvDWlu9fGDru5HBLYFKwZ8TNP/ynoUCHFCl ozACjHCoHq0zZ0Mt/BBQoNR075KDb6tz4BCTmClWw3k1Yfhe/h+bdFFBdTuEYDoRC+kC huNlNyb7C33gFodulHHMYvSNlajb9Et+agO9q3YgkXQsEYc8Y8euvKelC45gnAYGFt6L KrqQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=KPwdHumv; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z26si1298895ioc.55.2021.09.09.04.44.11; Thu, 09 Sep 2021 04:44:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=KPwdHumv; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238974AbhIILny (ORCPT + 99 others); Thu, 9 Sep 2021 07:43:54 -0400 Received: from mail.kernel.org ([198.145.29.99]:45714 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237000AbhIILmo (ORCPT ); Thu, 9 Sep 2021 07:42:44 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id DA0F16113A; Thu, 9 Sep 2021 11:41:34 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1631187695; bh=h/J+lRErKmMj5N1ByHUQ1j907SmpW/jRj4xMf1urAno=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=KPwdHumvyMSpBEP5/y0Ga3c+00n7iazmKLsaEdYw82SrWCof78BgcIlzV4eH1bfTW mgUtk4v2KGmmg44tnoi8yP/DsDMUsuleqgUpVHGMHG4mcobZ+/GRYf5oi9oqDOSpfm aw7Xxszy1ShSm7iq4RA73QlAkj+lH1eUxJzZtOjPm9hs0vQp5A1B45JkhSFA1LAGoc CH2xVzD5WpX5bSE/rVOp4IMrA3VY4hzYlwscHR/afWAB0gnvNPYbVW1XrCUoDg/sSZ nSsDoe60kaUHDTL2p+E6esagGq0+BjWp7RAR1gx4RaBbOE/5gxgpb2D3hMGd4tk1ZC Y/HiGRsUwsNhg== From: Sasha Levin To: linux-kernel@vger.kernel.org, stable@vger.kernel.org Cc: Xin Long , Jon Maloy , "David S . Miller" , Sasha Levin , netdev@vger.kernel.org, tipc-discussion@lists.sourceforge.net Subject: [PATCH AUTOSEL 5.14 022/252] tipc: keep the skb in rcv queue until the whole data is read Date: Thu, 9 Sep 2021 07:37:16 -0400 Message-Id: <20210909114106.141462-22-sashal@kernel.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210909114106.141462-1-sashal@kernel.org> References: <20210909114106.141462-1-sashal@kernel.org> MIME-Version: 1.0 X-stable: review X-Patchwork-Hint: Ignore Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Xin Long [ Upstream commit f4919ff59c2828064b4156e3c3600a169909bcf4 ] Currently, when userspace reads a datagram with a buffer that is smaller than this datagram, the data will be truncated and only part of it can be received by users. It doesn't seem right that users don't know the datagram size and have to use a huge buffer to read it to avoid the truncation. This patch to fix it by keeping the skb in rcv queue until the whole data is read by users. Only the last msg of the datagram will be marked with MSG_EOR, just as TCP/SCTP does. Note that this will work as above only when MSG_EOR is set in the flags parameter of recvmsg(), so that it won't break any old user applications. Signed-off-by: Xin Long Acked-by: Jon Maloy Signed-off-by: David S. Miller Signed-off-by: Sasha Levin --- net/tipc/socket.c | 36 +++++++++++++++++++++++++++--------- 1 file changed, 27 insertions(+), 9 deletions(-) diff --git a/net/tipc/socket.c b/net/tipc/socket.c index 8754bd885169..a155cfaf01f2 100644 --- a/net/tipc/socket.c +++ b/net/tipc/socket.c @@ -1886,6 +1886,7 @@ static int tipc_recvmsg(struct socket *sock, struct msghdr *m, bool connected = !tipc_sk_type_connectionless(sk); struct tipc_sock *tsk = tipc_sk(sk); int rc, err, hlen, dlen, copy; + struct tipc_skb_cb *skb_cb; struct sk_buff_head xmitq; struct tipc_msg *hdr; struct sk_buff *skb; @@ -1909,6 +1910,7 @@ static int tipc_recvmsg(struct socket *sock, struct msghdr *m, if (unlikely(rc)) goto exit; skb = skb_peek(&sk->sk_receive_queue); + skb_cb = TIPC_SKB_CB(skb); hdr = buf_msg(skb); dlen = msg_data_sz(hdr); hlen = msg_hdr_sz(hdr); @@ -1928,18 +1930,33 @@ static int tipc_recvmsg(struct socket *sock, struct msghdr *m, /* Capture data if non-error msg, otherwise just set return value */ if (likely(!err)) { - copy = min_t(int, dlen, buflen); - if (unlikely(copy != dlen)) - m->msg_flags |= MSG_TRUNC; - rc = skb_copy_datagram_msg(skb, hlen, m, copy); + int offset = skb_cb->bytes_read; + + copy = min_t(int, dlen - offset, buflen); + rc = skb_copy_datagram_msg(skb, hlen + offset, m, copy); + if (unlikely(rc)) + goto exit; + if (unlikely(offset + copy < dlen)) { + if (flags & MSG_EOR) { + if (!(flags & MSG_PEEK)) + skb_cb->bytes_read = offset + copy; + } else { + m->msg_flags |= MSG_TRUNC; + skb_cb->bytes_read = 0; + } + } else { + if (flags & MSG_EOR) + m->msg_flags |= MSG_EOR; + skb_cb->bytes_read = 0; + } } else { copy = 0; rc = 0; - if (err != TIPC_CONN_SHUTDOWN && connected && !m->msg_control) + if (err != TIPC_CONN_SHUTDOWN && connected && !m->msg_control) { rc = -ECONNRESET; + goto exit; + } } - if (unlikely(rc)) - goto exit; /* Mark message as group event if applicable */ if (unlikely(grp_evt)) { @@ -1962,9 +1979,10 @@ static int tipc_recvmsg(struct socket *sock, struct msghdr *m, tipc_node_distr_xmit(sock_net(sk), &xmitq); } - tsk_advance_rx_queue(sk); + if (!skb_cb->bytes_read) + tsk_advance_rx_queue(sk); - if (likely(!connected)) + if (likely(!connected) || skb_cb->bytes_read) goto exit; /* Send connection flow control advertisement when applicable */ -- 2.30.2