From: Wedson Almeida Filho <wedsonaf@gmail.com>
To: Alexander Viro <viro@zeniv.linux.org.uk>,
Christian Brauner <brauner@kernel.org>,
Matthew Wilcox <willy@infradead.org>
Cc: Kent Overstreet <kent.overstreet@gmail.com>,
Greg Kroah-Hartman <gregkh@linuxfoundation.org>,
linux-fsdevel@vger.kernel.org, rust-for-linux@vger.kernel.org,
Wedson Almeida Filho <walmeida@microsoft.com>
Subject: [RFC PATCH 17/19] rust: fs: allow per-inode data
Date: Wed, 18 Oct 2023 09:25:16 -0300 [thread overview]
Message-ID: <20231018122518.128049-18-wedsonaf@gmail.com> (raw)
In-Reply-To: <20231018122518.128049-1-wedsonaf@gmail.com>
From: Wedson Almeida Filho <walmeida@microsoft.com>
Allow Rust file systems to attach extra [typed] data to each inode. If
no data is needed, use the regular inode kmem_cache, otherwise we create
a new one.
Signed-off-by: Wedson Almeida Filho <walmeida@microsoft.com>
---
rust/helpers.c | 7 +++
rust/kernel/fs.rs | 128 +++++++++++++++++++++++++++++++++++---
rust/kernel/mem_cache.rs | 2 -
samples/rust/rust_rofs.rs | 9 ++-
4 files changed, 131 insertions(+), 15 deletions(-)
diff --git a/rust/helpers.c b/rust/helpers.c
index bc19f3b7b93e..7b12a6d4cf5c 100644
--- a/rust/helpers.c
+++ b/rust/helpers.c
@@ -222,6 +222,13 @@ void rust_helper_kunmap_local(const void *vaddr)
}
EXPORT_SYMBOL_GPL(rust_helper_kunmap_local);
+void *rust_helper_alloc_inode_sb(struct super_block *sb,
+ struct kmem_cache *cache, gfp_t gfp)
+{
+ return alloc_inode_sb(sb, cache, gfp);
+}
+EXPORT_SYMBOL_GPL(rust_helper_alloc_inode_sb);
+
void rust_helper_i_uid_write(struct inode *inode, uid_t uid)
{
i_uid_write(inode, uid);
diff --git a/rust/kernel/fs.rs b/rust/kernel/fs.rs
index b1ad5c110dbb..b07203758674 100644
--- a/rust/kernel/fs.rs
+++ b/rust/kernel/fs.rs
@@ -9,8 +9,12 @@
use crate::error::{code::*, from_result, to_result, Error, Result};
use crate::folio::{LockedFolio, UniqueFolio};
use crate::types::{ARef, AlwaysRefCounted, Either, ForeignOwnable, Opaque, ScopeGuard};
-use crate::{bindings, init::PinInit, str::CStr, time::Timespec, try_pin_init, ThisModule};
-use core::{marker::PhantomData, marker::PhantomPinned, mem::ManuallyDrop, pin::Pin, ptr};
+use crate::{
+ bindings, container_of, init::PinInit, mem_cache::MemCache, str::CStr, time::Timespec,
+ try_pin_init, ThisModule,
+};
+use core::mem::{size_of, ManuallyDrop, MaybeUninit};
+use core::{marker::PhantomData, marker::PhantomPinned, pin::Pin, ptr};
use macros::{pin_data, pinned_drop};
#[cfg(CONFIG_BUFFER_HEAD)]
@@ -35,6 +39,9 @@ pub trait FileSystem {
/// Data associated with each file system instance (super-block).
type Data: ForeignOwnable + Send + Sync;
+ /// Type of data associated with each inode.
+ type INodeData: Send + Sync;
+
/// The name of the file system type.
const NAME: &'static CStr;
@@ -165,6 +172,7 @@ fn try_from(v: u32) -> Result<Self> {
pub struct Registration {
#[pin]
fs: Opaque<bindings::file_system_type>,
+ inode_cache: Option<MemCache>,
#[pin]
_pin: PhantomPinned,
}
@@ -182,6 +190,14 @@ impl Registration {
pub fn new<T: FileSystem + ?Sized>(module: &'static ThisModule) -> impl PinInit<Self, Error> {
try_pin_init!(Self {
_pin: PhantomPinned,
+ inode_cache: if size_of::<T::INodeData>() == 0 {
+ None
+ } else {
+ Some(MemCache::try_new::<INodeWithData<T::INodeData>>(
+ T::NAME,
+ Some(Self::inode_init_once_callback::<T>),
+ )?)
+ },
fs <- Opaque::try_ffi_init(|fs_ptr: *mut bindings::file_system_type| {
// SAFETY: `try_ffi_init` guarantees that `fs_ptr` is valid for write.
unsafe { fs_ptr.write(bindings::file_system_type::default()) };
@@ -239,6 +255,16 @@ pub fn new<T: FileSystem + ?Sized>(module: &'static ThisModule) -> impl PinInit<
unsafe { T::Data::from_foreign(ptr) };
}
}
+
+ unsafe extern "C" fn inode_init_once_callback<T: FileSystem + ?Sized>(
+ outer_inode: *mut core::ffi::c_void,
+ ) {
+ let ptr = outer_inode.cast::<INodeWithData<T::INodeData>>();
+
+ // SAFETY: This is only used in `new`, so we know that we have a valid `INodeWithData`
+ // instance whose inode part can be initialised.
+ unsafe { bindings::inode_init_once(ptr::addr_of_mut!((*ptr).inode)) };
+ }
}
#[pinned_drop]
@@ -280,6 +306,15 @@ pub fn super_block(&self) -> &SuperBlock<T> {
unsafe { &*(*self.0.get()).i_sb.cast() }
}
+ /// Returns the data associated with the inode.
+ pub fn data(&self) -> &T::INodeData {
+ let outerp = container_of!(self.0.get(), INodeWithData<T::INodeData>, inode);
+ // SAFETY: `self` is guaranteed to be valid by the existence of a shared reference
+ // (`&self`) to it. Additionally, we know `T::INodeData` is always initialised in an
+ // `INode`.
+ unsafe { &*(*outerp).data.as_ptr() }
+ }
+
/// Returns the size of the inode contents.
pub fn size(&self) -> i64 {
// SAFETY: `self` is guaranteed to be valid by the existence of a shared reference.
@@ -300,15 +335,29 @@ unsafe fn dec_ref(obj: ptr::NonNull<Self>) {
}
}
+struct INodeWithData<T> {
+ data: MaybeUninit<T>,
+ inode: bindings::inode,
+}
+
/// An inode that is locked and hasn't been initialised yet.
#[repr(transparent)]
pub struct NewINode<T: FileSystem + ?Sized>(ARef<INode<T>>);
impl<T: FileSystem + ?Sized> NewINode<T> {
/// Initialises the new inode with the given parameters.
- pub fn init(self, params: INodeParams) -> Result<ARef<INode<T>>> {
- // SAFETY: This is a new inode, so it's safe to manipulate it mutably.
- let inode = unsafe { &mut *self.0 .0.get() };
+ pub fn init(self, params: INodeParams<T::INodeData>) -> Result<ARef<INode<T>>> {
+ let outerp = container_of!(self.0 .0.get(), INodeWithData<T::INodeData>, inode);
+
+ // SAFETY: This is a newly-created inode. No other references to it exist, so it is
+ // safe to mutably dereference it.
+ let outer = unsafe { &mut *outerp.cast_mut() };
+
+ // N.B. We must always write this to a newly allocated inode because the free callback
+ // expects the data to be initialised and drops it.
+ outer.data.write(params.value);
+
+ let inode = &mut outer.inode;
let mode = match params.typ {
INodeType::Dir => {
@@ -424,7 +473,7 @@ pub enum INodeType {
/// Required inode parameters.
///
/// This is used when creating new inodes.
-pub struct INodeParams {
+pub struct INodeParams<T> {
/// The access mode. It's a mask that grants execute (1), write (2) and read (4) access to
/// everyone, the owner group, and the owner.
pub mode: u16,
@@ -459,6 +508,9 @@ pub struct INodeParams {
/// Last access time.
pub atime: Timespec,
+
+ /// Value to attach to this node.
+ pub value: T,
}
/// A file system super block.
@@ -735,8 +787,12 @@ impl<T: FileSystem + ?Sized> Tables<T> {
}
const SUPER_BLOCK: bindings::super_operations = bindings::super_operations {
- alloc_inode: None,
- destroy_inode: None,
+ alloc_inode: if size_of::<T::INodeData>() != 0 {
+ Some(Self::alloc_inode_callback)
+ } else {
+ None
+ },
+ destroy_inode: Some(Self::destroy_inode_callback),
free_inode: None,
dirty_inode: None,
write_inode: None,
@@ -766,6 +822,61 @@ impl<T: FileSystem + ?Sized> Tables<T> {
shutdown: None,
};
+ unsafe extern "C" fn alloc_inode_callback(
+ sb: *mut bindings::super_block,
+ ) -> *mut bindings::inode {
+ // SAFETY: The callback contract guarantees that `sb` is valid for read.
+ let super_type = unsafe { (*sb).s_type };
+
+ // SAFETY: This callback is only used in `Registration`, so `super_type` is necessarily
+ // embedded in a `Registration`, which is guaranteed to be valid because it has a
+ // superblock associated to it.
+ let reg = unsafe { &*container_of!(super_type, Registration, fs) };
+
+ // SAFETY: `sb` and `cache` are guaranteed to be valid by the callback contract and by
+ // the existence of a superblock respectively.
+ let ptr = unsafe {
+ bindings::alloc_inode_sb(sb, MemCache::ptr(®.inode_cache), bindings::GFP_KERNEL)
+ }
+ .cast::<INodeWithData<T::INodeData>>();
+ if ptr.is_null() {
+ return ptr::null_mut();
+ }
+ ptr::addr_of_mut!((*ptr).inode)
+ }
+
+ unsafe extern "C" fn destroy_inode_callback(inode: *mut bindings::inode) {
+ // SAFETY: By the C contract, `inode` is a valid pointer.
+ let is_bad = unsafe { bindings::is_bad_inode(inode) };
+
+ // SAFETY: The inode is guaranteed to be valid by the callback contract. Additionally, the
+ // superblock is also guaranteed to still be valid by the inode existence.
+ let super_type = unsafe { (*(*inode).i_sb).s_type };
+
+ // SAFETY: This callback is only used in `Registration`, so `super_type` is necessarily
+ // embedded in a `Registration`, which is guaranteed to be valid because it has a
+ // superblock associated to it.
+ let reg = unsafe { &*container_of!(super_type, Registration, fs) };
+ let ptr = container_of!(inode, INodeWithData<T::INodeData>, inode).cast_mut();
+
+ if !is_bad {
+ // SAFETY: The code either initialises the data or marks the inode as bad. Since the
+ // inode is not bad, the data is initialised, and thus safe to drop.
+ unsafe { ptr::drop_in_place((*ptr).data.as_mut_ptr()) };
+ }
+
+ if size_of::<T::INodeData>() == 0 {
+ // SAFETY: When the size of `INodeData` is zero, we don't use a separate mem_cache, so
+ // it is allocated from the regular mem_cache, which is what `free_inode_nonrcu` uses
+ // to free the inode.
+ unsafe { bindings::free_inode_nonrcu(inode) };
+ } else {
+ // The callback contract guarantees that the inode was previously allocated via the
+ // `alloc_inode_callback` callback, so it is safe to free it back to the cache.
+ unsafe { bindings::kmem_cache_free(MemCache::ptr(®.inode_cache), ptr.cast()) };
+ }
+ }
+
unsafe extern "C" fn statfs_callback(
dentry: *mut bindings::dentry,
buf: *mut bindings::kstatfs,
@@ -1120,6 +1231,7 @@ fn init(module: &'static ThisModule) -> impl PinInit<Self, Error> {
/// struct MyFs;
/// impl fs::FileSystem for MyFs {
/// type Data = ();
+/// type INodeData =();
/// const NAME: &'static CStr = c_str!("myfs");
/// fn super_params(_: &NewSuperBlock<Self>) -> Result<SuperParams<Self::Data>> {
/// todo!()
diff --git a/rust/kernel/mem_cache.rs b/rust/kernel/mem_cache.rs
index 05e5f2bc9781..bf6ce2d2d3e1 100644
--- a/rust/kernel/mem_cache.rs
+++ b/rust/kernel/mem_cache.rs
@@ -20,7 +20,6 @@ impl MemCache {
/// Allocates a new `kmem_cache` for type `T`.
///
/// `init` is called by the C code when entries are allocated.
- #[allow(dead_code)]
pub(crate) fn try_new<T>(
name: &'static CStr,
init: Option<unsafe extern "C" fn(*mut core::ffi::c_void)>,
@@ -43,7 +42,6 @@ pub(crate) fn try_new<T>(
/// Returns the pointer to the `kmem_cache` instance, or null if it's `None`.
///
/// This is a helper for functions like `alloc_inode_sb` where the cache is optional.
- #[allow(dead_code)]
pub(crate) fn ptr(c: &Option<Self>) -> *mut bindings::kmem_cache {
match c {
Some(m) => m.ptr.as_ptr(),
diff --git a/samples/rust/rust_rofs.rs b/samples/rust/rust_rofs.rs
index 093425650f26..dfe745439842 100644
--- a/samples/rust/rust_rofs.rs
+++ b/samples/rust/rust_rofs.rs
@@ -53,6 +53,7 @@ struct Entry {
struct RoFs;
impl fs::FileSystem for RoFs {
type Data = ();
+ type INodeData = &'static Entry;
const NAME: &'static CStr = c_str!("rust-fs");
fn super_params(_sb: &NewSuperBlock<Self>) -> Result<SuperParams<Self::Data>> {
@@ -79,6 +80,7 @@ fn init_root(sb: &SuperBlock<Self>) -> Result<ARef<INode<Self>>> {
atime: UNIX_EPOCH,
ctime: UNIX_EPOCH,
mtime: UNIX_EPOCH,
+ value: &ENTRIES[0],
}),
}
}
@@ -122,6 +124,7 @@ fn lookup(parent: &INode<Self>, name: &[u8]) -> Result<ARef<INode<Self>>> {
atime: UNIX_EPOCH,
ctime: UNIX_EPOCH,
mtime: UNIX_EPOCH,
+ value: e,
}),
};
}
@@ -131,11 +134,7 @@ fn lookup(parent: &INode<Self>, name: &[u8]) -> Result<ARef<INode<Self>>> {
}
fn read_folio(inode: &INode<Self>, mut folio: LockedFolio<'_>) -> Result {
- let data = match inode.ino() {
- 2 => ENTRIES[2].contents,
- 3 => ENTRIES[3].contents,
- _ => return Err(EINVAL),
- };
+ let data = inode.data().contents;
let pos = usize::try_from(folio.pos()).unwrap_or(usize::MAX);
let copied = if pos >= data.len() {
--
2.34.1
next prev parent reply other threads:[~2023-10-18 12:26 UTC|newest]
Thread overview: 125+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-10-18 12:24 [RFC PATCH 00/19] Rust abstractions for VFS Wedson Almeida Filho
2023-10-18 12:25 ` [RFC PATCH 01/19] rust: fs: add registration/unregistration of file systems Wedson Almeida Filho
2023-10-18 15:38 ` Benno Lossin
2024-01-10 18:32 ` Wedson Almeida Filho
2024-01-25 9:15 ` Benno Lossin
2023-10-18 12:25 ` [RFC PATCH 02/19] rust: fs: introduce the `module_fs` macro Wedson Almeida Filho
2023-10-18 12:25 ` [RFC PATCH 03/19] samples: rust: add initial ro file system sample Wedson Almeida Filho
2023-10-28 16:18 ` Alice Ryhl
2024-01-10 18:25 ` Wedson Almeida Filho
2023-10-18 12:25 ` [RFC PATCH 04/19] rust: fs: introduce `FileSystem::super_params` Wedson Almeida Filho
2023-10-18 16:34 ` Benno Lossin
2023-10-28 16:39 ` Alice Ryhl
2023-10-30 8:21 ` Benno Lossin
2023-10-30 21:36 ` Alice Ryhl
2023-10-20 15:04 ` Ariel Miculas (amiculas)
2024-01-03 12:25 ` Andreas Hindborg (Samsung)
2023-10-18 12:25 ` [RFC PATCH 05/19] rust: fs: introduce `INode<T>` Wedson Almeida Filho
2023-10-28 18:00 ` Alice Ryhl
2024-01-03 12:45 ` Andreas Hindborg (Samsung)
2024-01-03 12:54 ` Andreas Hindborg (Samsung)
2024-01-04 5:20 ` Darrick J. Wong
2024-01-04 9:57 ` Andreas Hindborg (Samsung)
2024-01-10 9:45 ` Benno Lossin
2024-01-04 5:14 ` Darrick J. Wong
2024-01-24 18:17 ` Wedson Almeida Filho
2023-10-18 12:25 ` [RFC PATCH 06/19] rust: fs: introduce `FileSystem::init_root` Wedson Almeida Filho
2023-10-19 14:30 ` Benno Lossin
2023-10-20 0:52 ` Boqun Feng
2023-10-21 13:48 ` Benno Lossin
2023-10-21 15:57 ` Boqun Feng
2023-10-21 17:01 ` Matthew Wilcox
2023-10-21 19:33 ` Boqun Feng
2023-10-23 5:29 ` Dave Chinner
2023-10-23 12:55 ` Wedson Almeida Filho
2023-10-30 2:29 ` Dave Chinner
2023-10-31 20:49 ` Wedson Almeida Filho
2023-11-08 4:54 ` Dave Chinner
2023-11-08 6:15 ` Wedson Almeida Filho
2023-10-20 0:30 ` Boqun Feng
2023-10-23 12:36 ` Wedson Almeida Filho
2024-01-03 13:29 ` Andreas Hindborg (Samsung)
2024-01-24 4:07 ` Wedson Almeida Filho
2023-10-18 12:25 ` [RFC PATCH 07/19] rust: fs: introduce `FileSystem::read_dir` Wedson Almeida Filho
2023-10-21 8:33 ` Benno Lossin
2024-01-03 14:09 ` Andreas Hindborg (Samsung)
2024-01-21 21:00 ` Askar Safin
2024-01-21 21:51 ` Dave Chinner
2023-10-18 12:25 ` [RFC PATCH 08/19] rust: fs: introduce `FileSystem::lookup` Wedson Almeida Filho
2023-10-18 12:25 ` [RFC PATCH 09/19] rust: folio: introduce basic support for folios Wedson Almeida Filho
2023-10-18 17:17 ` Matthew Wilcox
2023-10-18 18:32 ` Wedson Almeida Filho
2023-10-18 19:21 ` Matthew Wilcox
2023-10-19 13:25 ` Wedson Almeida Filho
2023-10-20 4:11 ` Matthew Wilcox
2023-10-20 15:17 ` Matthew Wilcox
2023-10-23 12:32 ` Wedson Almeida Filho
2023-10-23 10:48 ` Andreas Hindborg (Samsung)
2023-10-23 14:28 ` Matthew Wilcox
2023-10-24 15:04 ` Ariel Miculas (amiculas)
2023-10-23 12:29 ` Wedson Almeida Filho
2023-10-21 9:21 ` Benno Lossin
2023-10-18 12:25 ` [RFC PATCH 10/19] rust: fs: introduce `FileSystem::read_folio` Wedson Almeida Filho
2023-11-07 22:18 ` Matthew Wilcox
2023-11-07 22:22 ` Al Viro
2023-11-08 0:35 ` Wedson Almeida Filho
2023-11-08 0:56 ` Al Viro
2023-11-08 2:39 ` Wedson Almeida Filho
2023-10-18 12:25 ` [RFC PATCH 11/19] rust: fs: introduce `FileSystem::read_xattr` Wedson Almeida Filho
2023-10-18 13:06 ` Ariel Miculas (amiculas)
2023-10-19 13:35 ` Wedson Almeida Filho
2023-10-18 12:25 ` [RFC PATCH 12/19] rust: fs: introduce `FileSystem::statfs` Wedson Almeida Filho
2024-01-03 14:13 ` Andreas Hindborg (Samsung)
2024-01-04 5:33 ` Darrick J. Wong
2024-01-24 4:24 ` Wedson Almeida Filho
2023-10-18 12:25 ` [RFC PATCH 13/19] rust: fs: introduce more inode types Wedson Almeida Filho
2023-10-18 12:25 ` [RFC PATCH 14/19] rust: fs: add per-superblock data Wedson Almeida Filho
2023-10-25 15:51 ` Ariel Miculas (amiculas)
2023-10-26 13:46 ` Ariel Miculas (amiculas)
2024-01-03 14:16 ` Andreas Hindborg (Samsung)
2023-10-18 12:25 ` [RFC PATCH 15/19] rust: fs: add basic support for fs buffer heads Wedson Almeida Filho
2024-01-03 14:17 ` Andreas Hindborg (Samsung)
2023-10-18 12:25 ` [RFC PATCH 16/19] rust: fs: allow file systems backed by a block device Wedson Almeida Filho
2023-10-21 13:39 ` Benno Lossin
2024-01-24 4:14 ` Wedson Almeida Filho
2024-01-03 14:38 ` Andreas Hindborg (Samsung)
2023-10-18 12:25 ` Wedson Almeida Filho [this message]
2023-10-21 13:57 ` [RFC PATCH 17/19] rust: fs: allow per-inode data Benno Lossin
2024-01-03 14:39 ` Andreas Hindborg (Samsung)
2023-10-18 12:25 ` [RFC PATCH 18/19] rust: fs: export file type from mode constants Wedson Almeida Filho
2023-10-18 12:25 ` [RFC PATCH 19/19] tarfs: introduce tar fs Wedson Almeida Filho
2023-10-18 16:57 ` Matthew Wilcox
2023-10-18 17:05 ` Wedson Almeida Filho
2023-10-18 17:20 ` Matthew Wilcox
2023-10-18 18:07 ` Wedson Almeida Filho
2024-01-24 5:05 ` Matthew Wilcox
2024-01-24 5:23 ` Matthew Wilcox
2024-01-24 18:26 ` Wedson Almeida Filho
2024-01-24 21:05 ` Dave Chinner
2024-01-24 21:28 ` Matthew Wilcox
2024-01-24 5:34 ` Gao Xiang
2023-10-18 13:40 ` [RFC PATCH 00/19] Rust abstractions for VFS Ariel Miculas (amiculas)
2023-10-18 17:12 ` Wedson Almeida Filho
2023-10-29 20:31 ` Matthew Wilcox
2023-10-31 20:14 ` Wedson Almeida Filho
2024-01-03 18:02 ` Matthew Wilcox
2024-01-03 19:04 ` Wedson Almeida Filho
2024-01-03 19:53 ` Al Viro
2024-01-03 20:38 ` Kent Overstreet
2024-01-04 1:49 ` Matthew Wilcox
2024-01-09 18:25 ` Wedson Almeida Filho
2024-01-09 19:30 ` Matthew Wilcox
2024-01-03 19:14 ` Kent Overstreet
2024-01-03 20:41 ` Al Viro
2024-01-09 19:13 ` Wedson Almeida Filho
2024-01-09 19:25 ` Matthew Wilcox
2024-01-09 19:32 ` Greg Kroah-Hartman
2024-01-10 7:49 ` Wedson Almeida Filho
2024-01-10 7:57 ` Greg Kroah-Hartman
2024-01-10 12:56 ` Matthew Wilcox
2024-01-09 22:19 ` Dave Chinner
2024-01-10 19:19 ` Kent Overstreet
2024-01-24 13:08 ` FUJITA Tomonori
2024-01-24 19:49 ` Kent Overstreet
2024-01-05 0:04 ` David Howells
2024-01-05 15:54 ` Jarkko Sakkinen
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20231018122518.128049-18-wedsonaf@gmail.com \
--to=wedsonaf@gmail.com \
--cc=brauner@kernel.org \
--cc=gregkh@linuxfoundation.org \
--cc=kent.overstreet@gmail.com \
--cc=linux-fsdevel@vger.kernel.org \
--cc=rust-for-linux@vger.kernel.org \
--cc=viro@zeniv.linux.org.uk \
--cc=walmeida@microsoft.com \
--cc=willy@infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).