larsxschneider@xxxxxxxxx wrote: > +static off_t multi_packet_read(struct strbuf *sb, const int fd, const size_t size) I'm no expert in C, but this might be const-correctness taken too far. I think basing this on the read(2) prototype is less surprising: static ssize_t multi_packet_read(int fd, struct strbuf *sb, size_t size) Also what Jeff said about off_t vs size_t, but my previous emails may have confused you w.r.t. off_t usage... > +static int multi_packet_write(const char *src, size_t len, const int in, const int out) Same comment about over const ints above. len can probably be off_t based on what is below; but you need to process the loop in ssize_t-friendly chunks. > +{ > + int ret = 1; > + char header[4]; > + char buffer[8192]; > + off_t bytes_to_write; What Jeff said, this should be ssize_t to match read(2) and xread > + while (ret) { > + if (in >= 0) { > + bytes_to_write = xread(in, buffer, sizeof(buffer)); > + if (bytes_to_write < 0) > + ret &= 0; > + src = buffer; > + } else { > + bytes_to_write = len > LARGE_PACKET_MAX - 4 ? LARGE_PACKET_MAX - 4 : len; > + len -= bytes_to_write; > + } > + if (!bytes_to_write) > + break; The whole ret &= .. style error handling is hard-to-follow and here, a source of bugs. I think the expected convention on hitting errors is: 1) stop whatever you're doing 2) cleanup 3) propagate the error to callers "goto" is an acceptable way of accomplishing this. For example, byte_to_write may still be negative at this point (and interpreted as a really big number when cast to unsigned size_t) and src/buffer could be stack garbage. > + set_packet_header(header, bytes_to_write + 4); > + ret &= write_in_full(out, &header, sizeof(header)) == sizeof(header); > + ret &= write_in_full(out, src, bytes_to_write) == bytes_to_write; > + } > + ret &= write_in_full(out, "0000", 4) == 4; > + return ret; > +} > + > +static int apply_protocol_filter(const char *path, const char *src, size_t len, > + int fd, struct strbuf *dst, const char *cmd, > + const char *filter_type) > +{ <snip> > + if (fd >= 0 && !src) { > + ret &= fstat(fd, &file_stat) != -1; > + len = file_stat.st_size; Same truncation bug I noticed earlier; what I originally meant is the `len' arg probably ought to be off_t, here, not size_t. 32-bit x86 Linux systems have 32-bit size_t (unsigned), but large file support means off_t is 64-bits (signed). Also, is it worth continuing this function if fstat fails? > + } > + > + sigchain_push(SIGPIPE, SIG_IGN); > + > + packet_write(process->in, "%s\n", filter_type); > + packet_write(process->in, "%s\n", path); > + packet_write(process->in, "%zu\n", len); I'm not sure if "%zu" is portable since we don't do C99 (yet?) For 64-bit signed off_t, you can probably do: packet_write(process->in, "%"PRIuMAX"\n", (uintmax_t)len); Since we don't have PRIiMAX or intmax_t, here, and a negative len would be a bug (probably from failed fstat) anyways. > + ret &= multi_packet_write(src, len, fd, process->in); multi_packet_write will probably fail if fstat failed above... > + strbuf = packet_read_line(process->out, NULL); And this may just block or timeout if multi_packet_write failed. Naptime, I may look at the rest another day. -- To unsubscribe from this list: send the line "unsubscribe git" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html