lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 29 Mar 2013 08:01:20 -0700 From: Eric Dumazet <eric.dumazet@...il.com> To: Vijay Subramanian <subramanian.vijay@...il.com> Cc: netdev@...r.kernel.org, davem@...emloft.net Subject: Re: [PATCH net] net: fq_codel: Fix off-by-one error On Thu, 2013-03-28 at 16:52 -0700, Vijay Subramanian wrote: > Currently, we hold a max of sch->limit -1 number of packets instead of > sch->limit packets. Fix this off-by-one error. > > Signed-off-by: Vijay Subramanian <subramanian.vijay@...il.com> > --- > net/sched/sch_fq_codel.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/net/sched/sch_fq_codel.c b/net/sched/sch_fq_codel.c > index 4e606fc..5578628 100644 > --- a/net/sched/sch_fq_codel.c > +++ b/net/sched/sch_fq_codel.c > @@ -195,7 +195,7 @@ static int fq_codel_enqueue(struct sk_buff *skb, struct Qdisc *sch) > flow->deficit = q->quantum; > flow->dropped = 0; > } > - if (++sch->q.qlen < sch->limit) > + if (++sch->q.qlen <= sch->limit) > return NET_XMIT_SUCCESS; > > q->drop_overlimit++; Just curious, did you play changing the default limit (10240 packets) ? Acked-by: Eric Dumazet <edumazet@...gle.com> Thanks ! -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists