Date: Sat, 11 Sep 2021 14:40:56 -0400 From: Mark Johnston <markj@freebsd.org> To: Andriy Gapon <avg@freebsd.org> Cc: "net@FreeBSD.org" <net@freebsd.org>, hackers@freebsd.org Subject: Re: recvmsg() "short receive" after FIONREAD Message-ID: <YTz4OJEsBRcuVSaN@nuc> In-Reply-To: <82143b59-a0e6-c23e-8b47-29d8d41eb5b4@FreeBSD.org> References: <500a2272-c1b3-3f97-0096-9fe8117c4b95@FreeBSD.org> <6f455869-cbdd-ee20-f2f8-f633e22071e9@FreeBSD.org> <YTuznrhho4qGXqu8@nuc> <cdd2328e-e6aa-f0fc-a77a-adae03759f18@FreeBSD.org> <4a2165c5-b97b-8fb7-9ada-0acae3197824@FreeBSD.org> <b309f8a5-c550-905b-4340-0b7005ea6fe3@FreeBSD.org> <YTy5kRl0kDl495Po@nuc> <fcf10f8a-1672-4a21-c64b-55044cac81c5@FreeBSD.org> <4499e2b0-d1e7-5bee-519c-783fb930fc06@FreeBSD.org> <82143b59-a0e6-c23e-8b47-29d8d41eb5b4@FreeBSD.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sat, Sep 11, 2021 at 09:25:42PM +0300, Andriy Gapon wrote: > On 11/09/2021 17:28, Andriy Gapon wrote: > > On 11/09/2021 17:16, Andriy Gapon wrote: > >> On 11/09/2021 17:13, Mark Johnston wrote: > >>> I think the semantic change is ok. Did you change FIONREAD to lock the > >>> sockbuf? I think it would be necessary to avoid races with pulseaudio: > >>> sb_acc is modified before sb_ctl, so there could be windows where > >>> sbavail(sb) - sb->sb_ctl gives a larger. > >>> > >>> And, it is not really safe to lock the sockbuf itself, since it may be > >>> overwritten by a listen(2) call. SOCK_RECVBUF_LOCK(so) should be used > >>> instead. > >> > >> I didn't think about the locking, so I didn't add it. > >> My current patch is trivial: > >> @@ -210,7 +210,7 @@ soo_ioctl(struct file *fp, u_long cmd, void *data, struct > >> ucred *active_cred, > >> if (SOLISTENING(so)) { > >> error = EINVAL; > >> } else { > >> - *(int *)data = sbavail(&so->so_rcv); > >> + *(int *)data = sbavail(&so->so_rcv) - so->so_rcv.sb_ctl; > >> } > >> break; > >> > >> Let me try adding the lock. > > > > By the way, soo_stat() seems to be another good example to follow. > > So, this is what I've got: > diff --git a/sys/kern/sys_socket.c b/sys/kern/sys_socket.c > index e53b0367960b..11ee03703407 100644 > --- a/sys/kern/sys_socket.c > +++ b/sys/kern/sys_socket.c > @@ -210,7 +210,12 @@ soo_ioctl(struct file *fp, u_long cmd, void *data, struct > ucred *active_cred, > if (SOLISTENING(so)) { > error = EINVAL; > } else { > - *(int *)data = sbavail(&so->so_rcv); > + struct sockbuf *sb; > + > + sb = &so->so_rcv; > + SOCKBUF_LOCK(sb); > + *(int *)data = sbavail(sb) - sb->sb_ctl; > + SOCKBUF_UNLOCK(sb); > } > break; It should use SOCK_RECVBUF_LOCK() (see https://cgit.freebsd.org/src/commit/?id=74a68313b503940158a2e8e8f02626d7cdbdaff9 ): sb = &so->so_rcv; SOCK_RECVBUF_LOCK(so); if (SOLISTENING(so)) error = EINVAL; else *(int *)data = sbavail(sb) - sb->sb_ctl; SOCK_RECVBUF_UNLOCK(so); Otherwise a concurrent listen(2) will clobber the pointer used by SOCKBUF_LOCK().
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?YTz4OJEsBRcuVSaN>