Skip to content

Commit 30e0d9e

Browse files
committed
Don't reduce output request size on non-Unix-socket connections.
Traditionally, libpq's pqPutMsgEnd has rounded down the amount-to-send to be a multiple of 8K when it is eagerly writing some data. This still seems like a good idea when sending through a Unix socket, as pipes typically have a buffer size of 8K or some fraction/multiple of that. But there's not much argument for it on a TCP connection, since (a) standard MTU values are not commensurate with that, and (b) the kernel typically applies its own packet splitting/merging logic. Worse, our SSL and GSSAPI code paths both have API stipulations that if they fail to send all the data that was offered in the previous write attempt, we mustn't offer less data in the next attempt; else we may get "SSL error: bad length" or "GSSAPI caller failed to retransmit all data needing to be retried". The previous write attempt might've been pqFlush attempting to send everything in the buffer, so pqPutMsgEnd can't safely write less than the full buffer contents. (Well, we could add some more state to track exactly how much the previous write attempt was, but there's little value evident in such extra complication.) Hence, apply the round-down only on AF_UNIX sockets, where we never use SSL or GSSAPI. Interestingly, we had a very closely related bug report before, which I attempted to fix in commit d053a87. But the test case we had then seemingly didn't trigger this pqFlush-then-pqPutMsgEnd scenario, or at least we failed to recognize this variant of the bug. Bug: #18907 Reported-by: Dorjpalam Batbaatar <htgn.dbat.95@gmail.com> Author: Tom Lane <tgl@sss.pgh.pa.us> Discussion: https://postgr.es/m/18907-d41b9bcf6f29edda@postgresql.org Backpatch-through: 13
1 parent 8398027 commit 30e0d9e

File tree

3 files changed

+33
-7
lines changed

3 files changed

+33
-7
lines changed

src/backend/libpq/be-secure-gssapi.c

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -120,9 +120,9 @@ be_gssapi_write(Port *port, void *ptr, size_t len)
120120
* again, so if it offers a len less than that, something is wrong.
121121
*
122122
* Note: it may seem attractive to report partial write completion once
123-
* we've successfully sent any encrypted packets. However, that can cause
124-
* problems for callers; notably, pqPutMsgEnd's heuristic to send only
125-
* full 8K blocks interacts badly with such a hack. We won't save much,
123+
* we've successfully sent any encrypted packets. However, doing that
124+
* expands the state space of this processing and has been responsible for
125+
* bugs in the past (cf. commit d053a879b). We won't save much,
126126
* typically, by letting callers discard data early, so don't risk it.
127127
*/
128128
if (len < PqGSSSendConsumed)

src/interfaces/libpq/fe-misc.c

Lines changed: 27 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -538,9 +538,35 @@ pqPutMsgEnd(PGconn *conn)
538538
/* Make message eligible to send */
539539
conn->outCount = conn->outMsgEnd;
540540

541+
/* If appropriate, try to push out some data */
541542
if (conn->outCount >= 8192)
542543
{
543-
int toSend = conn->outCount - (conn->outCount % 8192);
544+
int toSend = conn->outCount;
545+
546+
/*
547+
* On Unix-pipe connections, it seems profitable to prefer sending
548+
* pipe-buffer-sized packets not randomly-sized ones, so retain the
549+
* last partial-8K chunk in our buffer for now. On TCP connections,
550+
* the advantage of that is far less clear. Moreover, it flat out
551+
* isn't safe when using SSL or GSSAPI, because those code paths have
552+
* API stipulations that if they fail to send all the data that was
553+
* offered in the previous write attempt, we mustn't offer less data
554+
* in this write attempt. The previous write attempt might've been
555+
* pqFlush attempting to send everything in the buffer, so we mustn't
556+
* offer less now. (Presently, we won't try to use SSL or GSSAPI on
557+
* Unix connections, so those checks are just Asserts. They'll have
558+
* to become part of the regular if-test if we ever change that.)
559+
*/
560+
if (conn->raddr.addr.ss_family == AF_UNIX)
561+
{
562+
#ifdef USE_SSL
563+
Assert(!conn->ssl_in_use);
564+
#endif
565+
#ifdef ENABLE_GSS
566+
Assert(!conn->gssenc);
567+
#endif
568+
toSend -= toSend % 8192;
569+
}
544570

545571
if (pqSendSome(conn, toSend) < 0)
546572
return EOF;

src/interfaces/libpq/fe-secure-gssapi.c

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -112,9 +112,9 @@ pg_GSS_write(PGconn *conn, const void *ptr, size_t len)
112112
* again, so if it offers a len less than that, something is wrong.
113113
*
114114
* Note: it may seem attractive to report partial write completion once
115-
* we've successfully sent any encrypted packets. However, that can cause
116-
* problems for callers; notably, pqPutMsgEnd's heuristic to send only
117-
* full 8K blocks interacts badly with such a hack. We won't save much,
115+
* we've successfully sent any encrypted packets. However, doing that
116+
* expands the state space of this processing and has been responsible for
117+
* bugs in the past (cf. commit d053a879b). We won't save much,
118118
* typically, by letting callers discard data early, so don't risk it.
119119
*/
120120
if (len < PqGSSSendConsumed)

0 commit comments

Comments
 (0)
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy