lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 08 Jun 2007 01:06:29 -0700 (PDT) From: David Miller <davem@...emloft.net> To: jens.axboe@...cle.com Cc: johnpol@....mipt.ru, netdev@...r.kernel.org Subject: Re: [PATCH][RFC] network splice receive From: Jens Axboe <jens.axboe@...cle.com> Date: Fri, 8 Jun 2007 09:48:24 +0200 > Perhaps it's possible to solve this at a different level - can we hang > on to the skb until the pipe buffer has been consumed, and prevent reuse > that way? Then we don't have to care what backing the skb has, as long > as it (and its data) isn't being reused until we drop the reference to > it in sock_pipe_buf_release(). Depending upon whether the pipe buffer consumption is bounded of not, this will jam up the TCP sender because the SKB data allocation is charged against the socket send buffer allocation. - To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists