]> git.ipfire.org Git - thirdparty/kernel/stable.git/commitdiff
ipv4, ipv6: Use splice_eof() to flush
authorDavid Howells <dhowells@redhat.com>
Wed, 7 Jun 2023 18:19:13 +0000 (19:19 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Wed, 10 Jan 2024 16:10:27 +0000 (17:10 +0100)
[ Upstream commit 1d7e4538a5463faa0b0e26a7a7b6bd68c7dfdd78 ]

Allow splice to undo the effects of MSG_MORE after prematurely ending a
splice/sendfile due to getting an EOF condition (->splice_read() returned
0) after splice had called sendmsg() with MSG_MORE set when the user didn't
set MSG_MORE.

For UDP, a pending packet will not be emitted if the socket is closed
before it is flushed; with this change, it be flushed by ->splice_eof().

For TCP, it's not clear that MSG_MORE is actually effective.

Suggested-by: Linus Torvalds <torvalds@linux-foundation.org>
Link: https://lore.kernel.org/r/CAHk-=wh=V579PDYvkpnTobCLGczbgxpMgGmmhqiTyE34Cpi5Gg@mail.gmail.com/
Signed-off-by: David Howells <dhowells@redhat.com>
cc: Kuniyuki Iwashima <kuniyu@amazon.com>
cc: Willem de Bruijn <willemdebruijn.kernel@gmail.com>
cc: David Ahern <dsahern@kernel.org>
cc: Jens Axboe <axboe@kernel.dk>
cc: Matthew Wilcox <willy@infradead.org>
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Stable-dep-of: a0002127cd74 ("udp: move udp->no_check6_tx to udp->udp_flags")
Signed-off-by: Sasha Levin <sashal@kernel.org>
include/net/inet_common.h
include/net/tcp.h
include/net/udp.h
net/ipv4/af_inet.c
net/ipv4/tcp.c
net/ipv4/tcp_ipv4.c
net/ipv4/udp.c
net/ipv6/af_inet6.c
net/ipv6/tcp_ipv6.c
net/ipv6/udp.c

index cec453c18f1d6f79198f1a186ae26d9f4be199da..4673bbfd2811fc75c496217a73eec622617b2f5f 100644 (file)
@@ -33,6 +33,7 @@ int inet_accept(struct socket *sock, struct socket *newsock, int flags,
                bool kern);
 int inet_send_prepare(struct sock *sk);
 int inet_sendmsg(struct socket *sock, struct msghdr *msg, size_t size);
+void inet_splice_eof(struct socket *sock);
 ssize_t inet_sendpage(struct socket *sock, struct page *page, int offset,
                      size_t size, int flags);
 int inet_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
index c3d56b337f358c4856cf2bb813fd5032e3d3b8fd..4c838f7290dd97ab0ea810732f7841437148ab8b 100644 (file)
@@ -332,6 +332,7 @@ int tcp_sendmsg(struct sock *sk, struct msghdr *msg, size_t size);
 int tcp_sendmsg_locked(struct sock *sk, struct msghdr *msg, size_t size);
 int tcp_sendmsg_fastopen(struct sock *sk, struct msghdr *msg, int *copied,
                         size_t size, struct ubuf_info *uarg);
+void tcp_splice_eof(struct socket *sock);
 int tcp_sendpage(struct sock *sk, struct page *page, int offset, size_t size,
                 int flags);
 int tcp_sendpage_locked(struct sock *sk, struct page *page, int offset,
index fee053bcd17c6ddc7cea6c055e587f4321e800e0..fa4cdbe55552cf5eaea8017a5d4df1a1bfe77b51 100644 (file)
@@ -269,6 +269,7 @@ int udp_get_port(struct sock *sk, unsigned short snum,
 int udp_err(struct sk_buff *, u32);
 int udp_abort(struct sock *sk, int err);
 int udp_sendmsg(struct sock *sk, struct msghdr *msg, size_t len);
+void udp_splice_eof(struct socket *sock);
 int udp_push_pending_frames(struct sock *sk);
 void udp_flush_pending_frames(struct sock *sk);
 int udp_cmsg_send(struct sock *sk, struct msghdr *msg, u16 *gso_size);
index 5d379df90c82624dcf52ff191c16734fb693768f..347c3768df6e8550b207989b5043087e9d5a117a 100644 (file)
@@ -838,6 +838,21 @@ int inet_sendmsg(struct socket *sock, struct msghdr *msg, size_t size)
 }
 EXPORT_SYMBOL(inet_sendmsg);
 
+void inet_splice_eof(struct socket *sock)
+{
+       const struct proto *prot;
+       struct sock *sk = sock->sk;
+
+       if (unlikely(inet_send_prepare(sk)))
+               return;
+
+       /* IPV6_ADDRFORM can change sk->sk_prot under us. */
+       prot = READ_ONCE(sk->sk_prot);
+       if (prot->splice_eof)
+               prot->splice_eof(sock);
+}
+EXPORT_SYMBOL_GPL(inet_splice_eof);
+
 ssize_t inet_sendpage(struct socket *sock, struct page *page, int offset,
                      size_t size, int flags)
 {
@@ -1057,6 +1072,7 @@ const struct proto_ops inet_stream_ops = {
 #ifdef CONFIG_MMU
        .mmap              = tcp_mmap,
 #endif
+       .splice_eof        = inet_splice_eof,
        .sendpage          = inet_sendpage,
        .splice_read       = tcp_splice_read,
        .read_sock         = tcp_read_sock,
@@ -1091,6 +1107,7 @@ const struct proto_ops inet_dgram_ops = {
        .read_skb          = udp_read_skb,
        .recvmsg           = inet_recvmsg,
        .mmap              = sock_no_mmap,
+       .splice_eof        = inet_splice_eof,
        .sendpage          = inet_sendpage,
        .set_peek_off      = sk_set_peek_off,
 #ifdef CONFIG_COMPAT
@@ -1122,6 +1139,7 @@ static const struct proto_ops inet_sockraw_ops = {
        .sendmsg           = inet_sendmsg,
        .recvmsg           = inet_recvmsg,
        .mmap              = sock_no_mmap,
+       .splice_eof        = inet_splice_eof,
        .sendpage          = inet_sendpage,
 #ifdef CONFIG_COMPAT
        .compat_ioctl      = inet_compat_ioctl,
index 3935451ad061ed7d01f7992c5d4d958b63519363..0b7844a8d571121a042dfc609829d64ac239fbce 100644 (file)
@@ -1492,6 +1492,22 @@ int tcp_sendmsg(struct sock *sk, struct msghdr *msg, size_t size)
 }
 EXPORT_SYMBOL(tcp_sendmsg);
 
+void tcp_splice_eof(struct socket *sock)
+{
+       struct sock *sk = sock->sk;
+       struct tcp_sock *tp = tcp_sk(sk);
+       int mss_now, size_goal;
+
+       if (!tcp_write_queue_tail(sk))
+               return;
+
+       lock_sock(sk);
+       mss_now = tcp_send_mss(sk, &size_goal, 0);
+       tcp_push(sk, 0, mss_now, tp->nonagle, size_goal);
+       release_sock(sk);
+}
+EXPORT_SYMBOL_GPL(tcp_splice_eof);
+
 /*
  *     Handle reading urgent data. BSD has very simple semantics for
  *     this, no blocking and very strange errors 8)
index 7ebbbe561e4022de8619dd2cd45c6131b02fa1ca..be2c807eed15d8e5b0a7a223a465f191ca7cd637 100644 (file)
@@ -3067,6 +3067,7 @@ struct proto tcp_prot = {
        .keepalive              = tcp_set_keepalive,
        .recvmsg                = tcp_recvmsg,
        .sendmsg                = tcp_sendmsg,
+       .splice_eof             = tcp_splice_eof,
        .sendpage               = tcp_sendpage,
        .backlog_rcv            = tcp_v4_do_rcv,
        .release_cb             = tcp_release_cb,
index b49cb3df01bb44fe95fa47f364446fcf1fa95308..e8dd2880ac9aadccb6673de0450957753e51b8a8 100644 (file)
@@ -1332,6 +1332,21 @@ do_confirm:
 }
 EXPORT_SYMBOL(udp_sendmsg);
 
+void udp_splice_eof(struct socket *sock)
+{
+       struct sock *sk = sock->sk;
+       struct udp_sock *up = udp_sk(sk);
+
+       if (!up->pending || READ_ONCE(up->corkflag))
+               return;
+
+       lock_sock(sk);
+       if (up->pending && !READ_ONCE(up->corkflag))
+               udp_push_pending_frames(sk);
+       release_sock(sk);
+}
+EXPORT_SYMBOL_GPL(udp_splice_eof);
+
 int udp_sendpage(struct sock *sk, struct page *page, int offset,
                 size_t size, int flags)
 {
@@ -2907,6 +2922,7 @@ struct proto udp_prot = {
        .getsockopt             = udp_getsockopt,
        .sendmsg                = udp_sendmsg,
        .recvmsg                = udp_recvmsg,
+       .splice_eof             = udp_splice_eof,
        .sendpage               = udp_sendpage,
        .release_cb             = ip4_datagram_release_cb,
        .hash                   = udp_lib_hash,
index b5309ae87fd79b144eb5ba31f64f94329f9e3b48..a2f29ca516000958a6c454071fac7c088fa31901 100644 (file)
@@ -711,6 +711,7 @@ const struct proto_ops inet6_stream_ops = {
 #ifdef CONFIG_MMU
        .mmap              = tcp_mmap,
 #endif
+       .splice_eof        = inet_splice_eof,
        .sendpage          = inet_sendpage,
        .sendmsg_locked    = tcp_sendmsg_locked,
        .sendpage_locked   = tcp_sendpage_locked,
index 7be89dcfd5fc5204bf13c62ac39a913ffae2a51c..ba9a22db5805c93f084d1a8af9918899bb0d37c0 100644 (file)
@@ -2158,6 +2158,7 @@ struct proto tcpv6_prot = {
        .keepalive              = tcp_set_keepalive,
        .recvmsg                = tcp_recvmsg,
        .sendmsg                = tcp_sendmsg,
+       .splice_eof             = tcp_splice_eof,
        .sendpage               = tcp_sendpage,
        .backlog_rcv            = tcp_v6_do_rcv,
        .release_cb             = tcp_release_cb,
index 7f49f69226a21bd5198164d6c461b85c87ce8fa8..2a65136dca773bdf286ec6eed4c00364d684e922 100644 (file)
@@ -1657,6 +1657,20 @@ do_confirm:
        goto out;
 }
 
+static void udpv6_splice_eof(struct socket *sock)
+{
+       struct sock *sk = sock->sk;
+       struct udp_sock *up = udp_sk(sk);
+
+       if (!up->pending || READ_ONCE(up->corkflag))
+               return;
+
+       lock_sock(sk);
+       if (up->pending && !READ_ONCE(up->corkflag))
+               udp_v6_push_pending_frames(sk);
+       release_sock(sk);
+}
+
 void udpv6_destroy_sock(struct sock *sk)
 {
        struct udp_sock *up = udp_sk(sk);
@@ -1768,6 +1782,7 @@ struct proto udpv6_prot = {
        .getsockopt             = udpv6_getsockopt,
        .sendmsg                = udpv6_sendmsg,
        .recvmsg                = udpv6_recvmsg,
+       .splice_eof             = udpv6_splice_eof,
        .release_cb             = ip6_datagram_release_cb,
        .hash                   = udp_lib_hash,
        .unhash                 = udp_lib_unhash,