diff options
author | Eric Dumazet <edumazet@google.com> | 2013-01-06 18:21:49 +0000 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2013-01-11 09:07:14 -0800 |
commit | c87b45599a4e0d8741abeb85d1d8d5f0c1fb13be (patch) | |
tree | dc87094b0a76abb86f6856d824bd50bb3a26a138 /fs/cifs | |
parent | c7078c2c5da80e387420795a5a0857b1cd711fc9 (diff) | |
download | linux-3.10-c87b45599a4e0d8741abeb85d1d8d5f0c1fb13be.tar.gz linux-3.10-c87b45599a4e0d8741abeb85d1d8d5f0c1fb13be.tar.bz2 linux-3.10-c87b45599a4e0d8741abeb85d1d8d5f0c1fb13be.zip |
tcp: fix MSG_SENDPAGE_NOTLAST logic
[ Upstream commit ae62ca7b03217be5e74759dc6d7698c95df498b3 ]
commit 35f9c09fe9c72e (tcp: tcp_sendpages() should call tcp_push() once)
added an internal flag : MSG_SENDPAGE_NOTLAST meant to be set on all
frags but the last one for a splice() call.
The condition used to set the flag in pipe_to_sendpage() relied on
splice() user passing the exact number of bytes present in the pipe,
or a smaller one.
But some programs pass an arbitrary high value, and the test fails.
The effect of this bug is a lack of tcp_push() at the end of a
splice(pipe -> socket) call, and possibly very slow or erratic TCP
sessions.
We should both test sd->total_len and fact that another fragment
is in the pipe (pipe->nrbufs > 1)
Many thanks to Willy for providing very clear bug report, bisection
and test programs.
Reported-by: Willy Tarreau <w@1wt.eu>
Bisected-by: Willy Tarreau <w@1wt.eu>
Tested-by: Willy Tarreau <w@1wt.eu>
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'fs/cifs')
0 files changed, 0 insertions, 0 deletions