Skip to content

Commit 137935b

Browse files
committed
Don't reduce output request size on non-Unix-socket connections.
Traditionally, libpq's pqPutMsgEnd has rounded down the amount-to-send to be a multiple of 8K when it is eagerly writing some data. This still seems like a good idea when sending through a Unix socket, as pipes typically have a buffer size of 8K or some fraction/multiple of that. But there's not much argument for it on a TCP connection, since (a) standard MTU values are not commensurate with that, and (b) the kernel typically applies its own packet splitting/merging logic. Worse, our SSL and GSSAPI code paths both have API stipulations that if they fail to send all the data that was offered in the previous write attempt, we mustn't offer less data in the next attempt; else we may get "SSL error: bad length" or "GSSAPI caller failed to retransmit all data needing to be retried". The previous write attempt might've been pqFlush attempting to send everything in the buffer, so pqPutMsgEnd can't safely write less than the full buffer contents. (Well, we could add some more state to track exactly how much the previous write attempt was, but there's little value evident in such extra complication.) Hence, apply the round-down only on AF_UNIX sockets, where we never use SSL or GSSAPI. Interestingly, we had a very closely related bug report before, which I attempted to fix in commit d053a87. But the test case we had then seemingly didn't trigger this pqFlush-then-pqPutMsgEnd scenario, or at least we failed to recognize this variant of the bug. Bug: #18907 Reported-by: Dorjpalam Batbaatar <htgn.dbat.95@gmail.com> Author: Tom Lane <tgl@sss.pgh.pa.us> Discussion: https://postgr.es/m/18907-d41b9bcf6f29edda@postgresql.org Backpatch-through: 13
1 parent 8898082 commit 137935b

File tree

3 files changed

+33
-7
lines changed

3 files changed

+33
-7
lines changed

src/backend/libpq/be-secure-gssapi.c

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -121,9 +121,9 @@ be_gssapi_write(Port *port, const void *ptr, size_t len)
121121
* again, so if it offers a len less than that, something is wrong.
122122
*
123123
* Note: it may seem attractive to report partial write completion once
124-
* we've successfully sent any encrypted packets. However, that can cause
125-
* problems for callers; notably, pqPutMsgEnd's heuristic to send only
126-
* full 8K blocks interacts badly with such a hack. We won't save much,
124+
* we've successfully sent any encrypted packets. However, doing that
125+
* expands the state space of this processing and has been responsible for
126+
* bugs in the past (cf. commit d053a879b). We won't save much,
127127
* typically, by letting callers discard data early, so don't risk it.
128128
*/
129129
if (len < PqGSSSendConsumed)

src/interfaces/libpq/fe-misc.c

Lines changed: 27 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -553,9 +553,35 @@ pqPutMsgEnd(PGconn *conn)
553553
/* Make message eligible to send */
554554
conn->outCount = conn->outMsgEnd;
555555

556+
/* If appropriate, try to push out some data */
556557
if (conn->outCount >= 8192)
557558
{
558-
int toSend = conn->outCount - (conn->outCount % 8192);
559+
int toSend = conn->outCount;
560+
561+
/*
562+
* On Unix-pipe connections, it seems profitable to prefer sending
563+
* pipe-buffer-sized packets not randomly-sized ones, so retain the
564+
* last partial-8K chunk in our buffer for now. On TCP connections,
565+
* the advantage of that is far less clear. Moreover, it flat out
566+
* isn't safe when using SSL or GSSAPI, because those code paths have
567+
* API stipulations that if they fail to send all the data that was
568+
* offered in the previous write attempt, we mustn't offer less data
569+
* in this write attempt. The previous write attempt might've been
570+
* pqFlush attempting to send everything in the buffer, so we mustn't
571+
* offer less now. (Presently, we won't try to use SSL or GSSAPI on
572+
* Unix connections, so those checks are just Asserts. They'll have
573+
* to become part of the regular if-test if we ever change that.)
574+
*/
575+
if (conn->raddr.addr.ss_family == AF_UNIX)
576+
{
577+
#ifdef USE_SSL
578+
Assert(!conn->ssl_in_use);
579+
#endif
580+
#ifdef ENABLE_GSS
581+
Assert(!conn->gssenc);
582+
#endif
583+
toSend -= toSend % 8192;
584+
}
559585

560586
if (pqSendSome(conn, toSend) < 0)
561587
return EOF;

src/interfaces/libpq/fe-secure-gssapi.c

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -112,9 +112,9 @@ pg_GSS_write(PGconn *conn, const void *ptr, size_t len)
112112
* again, so if it offers a len less than that, something is wrong.
113113
*
114114
* Note: it may seem attractive to report partial write completion once
115-
* we've successfully sent any encrypted packets. However, that can cause
116-
* problems for callers; notably, pqPutMsgEnd's heuristic to send only
117-
* full 8K blocks interacts badly with such a hack. We won't save much,
115+
* we've successfully sent any encrypted packets. However, doing that
116+
* expands the state space of this processing and has been responsible for
117+
* bugs in the past (cf. commit d053a879b). We won't save much,
118118
* typically, by letting callers discard data early, so don't risk it.
119119
*/
120120
if (len < PqGSSSendConsumed)

0 commit comments

Comments
 (0)