lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20070325.183522.15263841.davem@davemloft.net>
Date:	Sun, 25 Mar 2007 18:35:22 -0700 (PDT)
From:	David Miller <davem@...emloft.net>
To:	ilpo.jarvinen@...sinki.fi
Cc:	netdev@...r.kernel.org
Subject: Re: [RFC PATCHv5 1/5] [TCP]: Add highest_sack seqno, points to
 globally highest SACK

From: "Ilpo_Järvinen" <ilpo.jarvinen@...sinki.fi>
Date: Mon, 26 Mar 2007 00:55:57 +0300 (EEST)

> On Sat, 24 Mar 2007, David Miller wrote:
> 
> > From: "Ilpo_Järvinen" <ilpo.jarvinen@...sinki.fi>
> > Date: Fri, 16 Mar 2007 20:41:02 +0200
> > 
> > > It is guaranteed to be valid only when !tp->sacked_out. In most
> > > cases this seqno is available in the last ACK but there is no
> > > guarantee for that. The new fast recovery loss marking algorithm
> > > needs this as entry point.
> > 
> > It's a shame we keep around multiple values which represent very
> > related values.  For example, this new seqno could be computed
> > using "fackets_out" if we knew also how many holes there were.
> 
> It would then be an estimate which is 100% accurate in most cases (when 
> all related skbs are full sized). I think it must never underestimate 
> highest_sack though, it would be quite ok to use fackets_out * mss but any 
> > mss skb would obviously be a problem (if they ever occur)... Are all 
> paths ok with that (this is beoynd the codepaths I'm quite sure of...)?!

Right, I understand that we really can't even use such an estimate
because of the "full mss size" assumption.

In any event, maybe we can find another way to "integrate" other
values we maintain in tcp_sock we can be computed from other ones
cheaply.
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ