Received: by 2002:a25:8b12:0:0:0:0:0 with SMTP id i18csp1394974ybl; Wed, 28 Aug 2019 14:06:42 -0700 (PDT) X-Google-Smtp-Source: APXvYqw1UCaLe7eF1KSuyahVBnRy9SFyOTMsNZhVGFSHvSbEOQG4ci76rxZNNGFcwKyZUrwwZLC0 X-Received: by 2002:a63:ff0c:: with SMTP id k12mr4968869pgi.186.1567026402477; Wed, 28 Aug 2019 14:06:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1567026402; cv=none; d=google.com; s=arc-20160816; b=M40EiJl65McmZR5ScmpatEiqEYS/Tknrk9cz6Ks7lkJkbjFni+aRyX7NJv4omT2jc+ gmz30caoCLiHgG6IThKGsylZJvyEBfIcfyMPe3mrY14yUimVWlUhr6xTpg4NqgH3G9XK GhcoMsEo2YGOdBnJUV6pn0ikW6LM3UXJscNFbEWgUSoOyxyPZOPRaZcK1Fen57UN0GhM 45V3vTlPc3qfx8LtW5cjHDsg2I2eX484G+mHreSxmdcCpq6vfb8KboixuJheMfAqjTWJ I3coe12sit6jVbiLk6gaf980bYT1Ik6pHevqHBoxyXMSqSTwt+VklPU6Fueox4ZbSptY cicw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=yvU8BgqEPOuNlB4rUdQG2X+5ICXbABxUDsZCV9q3TQg=; b=x/Df9n3x678MoEemNBn77I1xdU1t7rOwZe2jRnkAGiWXKttUOr/VxLYlI4V7fAkA0a qXdT7wPDttM8frHd1gUk69clfB08Dng7fEHbA2eaCbyZTe3fLuN1XBCCNgDlkVtWpN82 qVXY6l3woCDBf+KjHtoLtPwfPzZEc+BygYuxq/pffmGC/z6QtDMrltBXL35K1bJkAazW 2E//X+iwealy8MxdR7Sz3UuhjydM6tcZHWDFEv5ODuz7MOJzaVw8kIW8JFt0bV5ZywnS ZVBoH49PgJReWQbifwyk3hk9/gLa8TlJzKED66lw/iM9pNGkpwEyZenCttIgDqCrfzQS L9tg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i1si292401pfc.227.2019.08.28.14.06.16; Wed, 28 Aug 2019 14:06:42 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726663AbfH1VGQ (ORCPT + 99 others); Wed, 28 Aug 2019 17:06:16 -0400 Received: from fieldses.org ([173.255.197.46]:49470 "EHLO fieldses.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726583AbfH1VGP (ORCPT ); Wed, 28 Aug 2019 17:06:15 -0400 Received: by fieldses.org (Postfix, from userid 2815) id 6B0831C97; Wed, 28 Aug 2019 17:06:15 -0400 (EDT) Date: Wed, 28 Aug 2019 17:06:15 -0400 From: "bfields@fieldses.org" To: Trond Myklebust Cc: "aglo@umich.edu" , "linux-nfs@vger.kernel.org" , "louis.devandiere@atos.net" Subject: Re: Maximum Number of ACL on NFSv4 Message-ID: <20190828210615.GA32010@fieldses.org> References: <85fc5336-416f-2668-c9e2-8474e6e40c33@math.utexas.edu> <20190826164600.GD28580@ndevos-x270> <20190828180541.GC29148@fieldses.org> <20190828192931.GA30217@fieldses.org> <848b2abbedb5147e7a7e527111018fb04ec9ed7d.camel@hammerspace.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <848b2abbedb5147e7a7e527111018fb04ec9ed7d.camel@hammerspace.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Wed, Aug 28, 2019 at 08:25:16PM +0000, Trond Myklebust wrote: > Umm... Don't forget that NFSv4 ACL aces are typically much larger than > POSIX ACL aces because the user/group names are encoded as strings, not > binary uids and gids. > > IOW: The size of the RPC message is likely to be a lot larger than the > resulting POSIX ACL... Actually this limit is post-idmapping, but, yes, before NFSv4->Posix mapping (complicated in itself), which is why I talked about having to estimate. More interested to hear what you think about whether we need a limit at all. Do we have any ideas how big is too big a number to pass to kmalloc? Or is it OK to just let anything through and let kmalloc fail? --b.