lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CAF=yD-+rFQBER8A=P216Bgbtxq+zHgAERoZaGdp=dvo=_otMXA@mail.gmail.com> Date: Tue, 16 May 2017 18:34:38 -0400 From: Willem de Bruijn <willemdebruijn.kernel@...il.com> To: Miroslav Lichvar <mlichvar@...hat.com> Cc: Network Development <netdev@...r.kernel.org>, Richard Cochran <richardcochran@...il.com>, Willem de Bruijn <willemb@...gle.com> Subject: Re: [PATCH v3 net-next 5/7] net: don't make false software transmit timestamps On Tue, May 16, 2017 at 8:44 AM, Miroslav Lichvar <mlichvar@...hat.com> wrote: > If software timestamping is enabled by the SO_TIMESTAMP(NS) option > when a message without timestamp is already waiting in the queue, the > __sock_recv_timestamp() function will read the current time to make a > timestamp in order to always have something for the application. > > However, this applies also to outgoing packets looped back to the error > queue when hardware timestamping is enabled by the SO_TIMESTAMPING > option. This is already the case for sockets that have both software receive timestamps and hardware tx timestamps enabled, independent from the new option SOF_TIMESTAMPING_OPT_TX_SWHW, right? If so, then this behavior must remain.
Powered by blists - more mailing lists