lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 27 Feb 2007 10:10:26 -0800 (PST)
From:	David Miller <>
Subject: Re: [PATCH 1/2] [TCP]: Add two new spurious RTO responses to FRTO

From: "Ilpo_Järvinen" <>
Date: Tue, 27 Feb 2007 17:50:06 +0200 (EET)

> New sysctl tcp_frto_response is added to select amongst these
> responses:
> 	- Rate halving based; reuses CA_CWR state (default)
> 	- Very conservative; used to be the only one available (=1)
> 	- Undo cwr; undoes ssthresh and cwnd reductions (=2)
> The response with rate halving requires a new parameter to
> tcp_enter_cwr because FRTO has already reduced ssthresh and
> doing a second reduction there has to be prevented. In addition,
> to keep things nice on 80 cols screen, a local variable was
> added.
> Signed-off-by: Ilpo Järvinen <>

Applied to tcp-2.6, thanks!

I tidied up the coding style of the switch statement slightly.
So that it reads like this:

		switch (sysctl_tcp_frto_response) {
		case 2:
		case 1:

Thanks again.
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to
More majordomo info at

Powered by blists - more mailing lists