From patchwork Thu Apr 25 13:47:17 2013 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Benjamin Poirier X-Patchwork-Id: 239512 X-Patchwork-Delegate: davem@davemloft.net Return-Path: X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 773542C00F1 for ; Thu, 25 Apr 2013 23:48:43 +1000 (EST) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932381Ab3DYNsH (ORCPT ); Thu, 25 Apr 2013 09:48:07 -0400 Received: from mail-qc0-f178.google.com ([209.85.216.178]:63547 "EHLO mail-qc0-f178.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932319Ab3DYNrb (ORCPT ); Thu, 25 Apr 2013 09:47:31 -0400 Received: by mail-qc0-f178.google.com with SMTP id d10so1515934qca.23 for ; Thu, 25 Apr 2013 06:47:30 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:sender:from:to:cc:subject:date:message-id:x-mailer :in-reply-to:references; bh=ByRLwqZJnEL45w/PQj5YO0EE/K+HVfEcnuAs6qVMyIE=; b=h9ca/ZRuhe16Dc49SzeDV4+6XRv+E2QlHZ/2WCtnrX7YyH9W7M3RFeNDGlsZy3d6Pp BvHwBuD5pZT6KWdNGTv28iNZcxwTuuDV+qcGJPyHKBzhSgBjQGnWx9crmjOu7i1u9CC4 5+jiYafkdqsWnnkxEx1a5GtERV8t05YP5Ymgc0fwmkLSPovQklFyN0T3b5TMippMZ6Zj iA7gKd52aTj0zy/IA43vehYdfVBsZW7k1KS90gDXo+vZJw6Jbo3l0DTJVaUhHxDaKmE6 Az17EKXJldMGyOstAeYieqJ1gtWeFMI4yUioe36BjWN0MakMMpM0LWQblN2burXy1iEQ JaWg== X-Received: by 10.229.128.90 with SMTP id j26mr1257391qcs.116.1366897650428; Thu, 25 Apr 2013 06:47:30 -0700 (PDT) Received: from d2.synalogic.ca (modemcable062.27-82-70.mc.videotron.ca. [70.82.27.62]) by mx.google.com with ESMTPSA id kf2sm9973066qeb.4.2013.04.25.06.47.29 for (version=TLSv1.2 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 25 Apr 2013 06:47:29 -0700 (PDT) From: Benjamin Poirier To: "David S. Miller" , Eric Dumazet , Pavel Emelyanov Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH net 2/3] unix/dgram: fix peeking with an offset larger than data in queue Date: Thu, 25 Apr 2013 09:47:17 -0400 Message-Id: <1366897638-21882-2-git-send-email-bpoirier@suse.de> X-Mailer: git-send-email 1.7.10.4 In-Reply-To: <1366897638-21882-1-git-send-email-bpoirier@suse.de> References: <1366897638-21882-1-git-send-email-bpoirier@suse.de> Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Currently, peeking on a unix datagram socket with an offset larger than len of the data in the sk receive queue returns immediately with bogus data. That's because *off is not reset between each skb_queue_walk(). This patch fixes this so that the behavior is the same as peeking with no offset on an empty queue: the caller blocks. Signed-off-by: Benjamin Poirier --- net/core/datagram.c | 25 +++++++++++++++---------- 1 file changed, 15 insertions(+), 10 deletions(-) diff --git a/net/core/datagram.c b/net/core/datagram.c index 02398ae..6c502b5 100644 --- a/net/core/datagram.c +++ b/net/core/datagram.c @@ -78,9 +78,10 @@ static int receiver_wake_function(wait_queue_t *wait, unsigned int mode, int syn return autoremove_wake_function(wait, mode, sync, key); } /* - * Wait for a packet.. + * Wait for the last received packet to be different from skb */ -static int wait_for_packet(struct sock *sk, int *err, long *timeo_p) +static int wait_for_more_packets(struct sock *sk, int *err, long *timeo_p, + struct sk_buff *skb) { int error; DEFINE_WAIT_FUNC(wait, receiver_wake_function); @@ -92,7 +93,7 @@ static int wait_for_packet(struct sock *sk, int *err, long *timeo_p) if (error) goto out_err; - if (!skb_queue_empty(&sk->sk_receive_queue)) + if ((struct sk_buff *)sk->sk_receive_queue.prev != skb) goto out; /* Socket shut down? */ @@ -131,9 +132,9 @@ out_noerr: * __skb_recv_datagram - Receive a datagram skbuff * @sk: socket * @flags: MSG_ flags - * @off: an offset in bytes to peek skb from. Returns an offset - * within an skb where data actually starts * @peeked: returns non-zero if this packet has been seen before + * @_off: an offset in bytes to peek skb from. Returns an offset + * within an skb where data actually starts * @err: error code returned * * Get a datagram skbuff, understands the peeking, nonblocking wakeups @@ -159,9 +160,9 @@ out_noerr: * the standard around please. */ struct sk_buff *__skb_recv_datagram(struct sock *sk, unsigned int flags, - int *peeked, int *off, int *err) + int *peeked, int *_off, int *err) { - struct sk_buff *skb; + struct sk_buff *skb, *last; long timeo; /* * Caller is allowed not to check sk->sk_err before skb_recv_datagram() @@ -182,13 +183,16 @@ struct sk_buff *__skb_recv_datagram(struct sock *sk, unsigned int flags, */ unsigned long cpu_flags; struct sk_buff_head *queue = &sk->sk_receive_queue; + int off = *_off; spin_lock_irqsave(&queue->lock, cpu_flags); + last = (struct sk_buff *)queue; skb_queue_walk(queue, skb) { + last = skb; *peeked = skb->peeked; if (flags & MSG_PEEK) { - if (*off >= skb->len && (skb->len || *off)) { - *off -= skb->len; + if (off >= skb->len && (skb->len || off)) { + off -= skb->len; continue; } skb->peeked = 1; @@ -197,6 +201,7 @@ struct sk_buff *__skb_recv_datagram(struct sock *sk, unsigned int flags, __skb_unlink(skb, queue); spin_unlock_irqrestore(&queue->lock, cpu_flags); + *_off = off; return skb; } spin_unlock_irqrestore(&queue->lock, cpu_flags); @@ -206,7 +211,7 @@ struct sk_buff *__skb_recv_datagram(struct sock *sk, unsigned int flags, if (!timeo) goto no_packet; - } while (!wait_for_packet(sk, err, &timeo)); + } while (!wait_for_more_packets(sk, err, &timeo, last)); return NULL;