[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Ys6ei46QxeqvqOSe@codewreck.org>
Date: Wed, 13 Jul 2022 19:29:31 +0900
From: Dominique Martinet <asmadeus@...ewreck.org>
To: Christian Schoenebeck <linux_oss@...debyte.com>
Cc: v9fs-developer@...ts.sourceforge.net, linux-kernel@...r.kernel.org,
netdev@...r.kernel.org, Eric Van Hensbergen <ericvh@...il.com>,
Latchesar Ionkov <lucho@...kov.net>,
Nikolay Kichukov <nikolay@...um.net>
Subject: Re: [PATCH v5 10/11] net/9p: add p9_msg_buf_size()
Christian Schoenebeck wrote on Tue, Jul 12, 2022 at 04:31:33PM +0200:
> This new function calculates a buffer size suitable for holding the
> intended 9p request or response. For rather small message types (which
> applies to almost all 9p message types actually) simply use hard coded
> values. For some variable-length and potentially large message types
> calculate a more precise value according to what data is actually
> transmitted to avoid unnecessarily huge buffers.
>
> Signed-off-by: Christian Schoenebeck <linux_oss@...debyte.com>
Overally already had checked a few times but I just went through
client.c va argument lists as well this time, just a few nitpicks.
> ---
> net/9p/protocol.c | 154 ++++++++++++++++++++++++++++++++++++++++++++++
> net/9p/protocol.h | 2 +
> 2 files changed, 156 insertions(+)
>
> diff --git a/net/9p/protocol.c b/net/9p/protocol.c
> index 3754c33e2974..49939e8cde2a 100644
> --- a/net/9p/protocol.c
> +++ b/net/9p/protocol.c
> @@ -23,6 +23,160 @@
>
> #include <trace/events/9p.h>
>
> +/* len[2] text[len] */
> +#define P9_STRLEN(s) \
> + (2 + min_t(size_t, s ? strlen(s) : 0, USHRT_MAX))
> +
> +/**
> + * p9_msg_buf_size - Returns a buffer size sufficiently large to hold the
> + * intended 9p message.
> + * @c: client
> + * @type: message type
> + * @fmt: format template for assembling request message
> + * (see p9pdu_vwritef)
> + * @ap: variable arguments to be fed to passed format template
> + * (see p9pdu_vwritef)
> + *
> + * Note: Even for response types (P9_R*) the format template and variable
> + * arguments must always be for the originating request type (P9_T*).
> + */
> +size_t p9_msg_buf_size(struct p9_client *c, enum p9_msg_t type,
> + const char *fmt, va_list ap)
> +{
> + /* size[4] type[1] tag[2] */
> + const int hdr = 4 + 1 + 2;
> + /* ename[s] errno[4] */
> + const int rerror_size = hdr + P9_ERRMAX + 4;
> + /* ecode[4] */
> + const int rlerror_size = hdr + 4;
> + const int err_size =
> + c->proto_version == p9_proto_2000L ? rlerror_size : rerror_size;
> +
> + switch (type) {
> +
> + /* message types not used at all */
> + case P9_TERROR:
> + case P9_TLERROR:
> + case P9_TAUTH:
> + case P9_RAUTH:
> + BUG();
> +
> + /* variable length & potentially large message types */
> + case P9_TATTACH:
> + BUG_ON(strcmp("ddss?u", fmt));
> + va_arg(ap, int32_t);
> + va_arg(ap, int32_t);
> + {
> + const char *uname = va_arg(ap, const char *);
> + const char *aname = va_arg(ap, const char *);
> + /* fid[4] afid[4] uname[s] aname[s] n_uname[4] */
> + return hdr + 4 + 4 + P9_STRLEN(uname) + P9_STRLEN(aname) + 4;
> + }
> + case P9_TWALK:
> + BUG_ON(strcmp("ddT", fmt));
> + va_arg(ap, int32_t);
> + va_arg(ap, int32_t);
> + {
> + uint i, nwname = max(va_arg(ap, int), 0);
I was about to say that the max is useless as for loop would be cut
short, but these are unsigned... So the code in protocol.c p9pdu_vwritef
'T' has a bug (int cast directly to uint16): do you want to fix it or
shall I go ahead?
> + size_t wname_all;
> + const char **wnames = va_arg(ap, const char **);
> + for (i = 0, wname_all = 0; i < nwname; ++i) {
> + wname_all += P9_STRLEN(wnames[i]);
> + }
> + /* fid[4] newfid[4] nwname[2] nwname*(wname[s]) */
> + return hdr + 4 + 4 + 2 + wname_all;
> + }
> + case P9_RWALK:
> + BUG_ON(strcmp("ddT", fmt));
> + va_arg(ap, int32_t);
> + va_arg(ap, int32_t);
> + {
> + uint nwname = va_arg(ap, int);
> + /* nwqid[2] nwqid*(wqid[13]) */
> + return max_t(size_t, hdr + 2 + nwname * 13, err_size);
> + }
> + case P9_TCREATE:
> + BUG_ON(strcmp("dsdb?s", fmt));
> + va_arg(ap, int32_t);
> + {
> + const char *name = va_arg(ap, const char *);
> + if ((c->proto_version != p9_proto_2000u) &&
> + (c->proto_version != p9_proto_2000L))
(I don't think 9p2000.L can call TCREATE, but it doesn't really hurt
either)
> + /* fid[4] name[s] perm[4] mode[1] */
> + return hdr + 4 + P9_STRLEN(name) + 4 + 1;
> + {
> + va_arg(ap, int32_t);
> + va_arg(ap, int);
> + {
> + const char *ext = va_arg(ap, const char *);
> + /* fid[4] name[s] perm[4] mode[1] extension[s] */
> + return hdr + 4 + P9_STRLEN(name) + 4 + 1 + P9_STRLEN(ext);
> + }
> + }
> + }
> + case P9_TLCREATE:
> + BUG_ON(strcmp("dsddg", fmt));
> + va_arg(ap, int32_t);
> + {
> + const char *name = va_arg(ap, const char *);
> + /* fid[4] name[s] flags[4] mode[4] gid[4] */
> + return hdr + 4 + P9_STRLEN(name) + 4 + 4 + 4;
> + }
> + case P9_RREAD:
> + case P9_RREADDIR:
> + BUG_ON(strcmp("dqd", fmt));
> + va_arg(ap, int32_t);
> + va_arg(ap, int64_t);
> + {
> + const int32_t count = va_arg(ap, int32_t);
> + /* count[4] data[count] */
> + return max_t(size_t, hdr + 4 + count, err_size);
> + }
> + case P9_TWRITE:
> + BUG_ON(strcmp("dqV", fmt));
> + va_arg(ap, int32_t);
> + va_arg(ap, int64_t);
> + {
> + const int32_t count = va_arg(ap, int32_t);
> + /* fid[4] offset[8] count[4] data[count] */
> + return hdr + 4 + 8 + 4 + count;
> + }
> + case P9_TRENAMEAT:
if we have trenameat we probably want trename, tunlinkat as well?
What's your criteria for counting individually vs slapping 8k at it?
In this particular case, oldname/newname are single component names
within a directory so this is capped at 2*(4+256), that could easily fit
in 4k without bothering.
> + BUG_ON(strcmp("dsds", fmt));
> + va_arg(ap, int32_t);
> + {
> + const char *oldname = va_arg(ap, const char *);
> + va_arg(ap, int32_t);
> + {
> + const char *newname = va_arg(ap, const char *);
(style nitpick) I don't see the point of nesting another level of
indentation here, it feels cleaner to declare oldname/newname at the
start of the block and be done with it.
Doesn't really matter but it was a bit confusing with the if for TCREATE
earlier.
> + /* olddirfid[4] oldname[s] newdirfid[4] newname[s] */
> + return hdr + 4 + P9_STRLEN(oldname) + 4 + P9_STRLEN(newname);
> + }
> + }
> + case P9_RERROR:
> + return rerror_size;
> + case P9_RLERROR:
> + return rlerror_size;
> +
> + /* small message types */
ditto: what's your criteria for 4k vs 8k?
> + case P9_TSTAT:
this is just fid[4], so 4k is more than enough
> + case P9_RSTAT:
also fixed size 4+4+8+8+8+8+8+8+4 -- fits in 4k.
> + case P9_TSYMLINK:
that one has symlink target which can be arbitrarily long (filesystem
specific, 4k is the usual limit for linux but some filesystem I don't
know might handle more -- it might be worth going through the trouble of
going through it.
Ah, we can't support an arbitrary length as we won't know the size for
rreadlink before the reply comes, so we have to set some arbitrary
max. Okay for 8k.
> + case P9_RREADLINK:
Ok as above.
> + case P9_TXATTRWALK:
xattr names seem capped at 256, could fit 4k but ok for 8.
> + case P9_TXATTRCREATE:
same, ok for either 4 or 8.
> + case P9_TLINK:
name is component name inside directory so capped at 256, but ok.
> + case P9_TMKDIR:
same
> + case P9_TUNLINKAT:
same
> + return 8 * 1024;
> +
> + /* tiny message types */
> + default:
I went through things we didn't list:
mknod has a name but it's also component within directory, so should be
consistent with mkdir/unlinkat
trename, same.
tlock contains client_id which comes from hostname.. I think that's
capped at 256 as well? so ok for 4k.
rest all looks ok to me.
--
Dominique
> + return 4 * 1024;
> +
> + }
> +}
> +
> static int
> p9pdu_writef(struct p9_fcall *pdu, int proto_version, const char *fmt, ...);
>
> diff --git a/net/9p/protocol.h b/net/9p/protocol.h
> index 6d719c30331a..ad2283d1f96b 100644
> --- a/net/9p/protocol.h
> +++ b/net/9p/protocol.h
> @@ -8,6 +8,8 @@
> * Copyright (C) 2008 by IBM, Corp.
> */
>
> +size_t p9_msg_buf_size(struct p9_client *c, enum p9_msg_t type,
> + const char *fmt, va_list ap);
> int p9pdu_vwritef(struct p9_fcall *pdu, int proto_version, const char *fmt,
> va_list ap);
> int p9pdu_readf(struct p9_fcall *pdu, int proto_version, const char *fmt, ...);
OA
Powered by blists - more mailing lists