lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 28 May 2019 13:11:24 -0400 From: Willem de Bruijn <willemdebruijn.kernel@...il.com> To: Fred Klassen <fklassen@...neta.com> Cc: "David S. Miller" <davem@...emloft.net>, Alexey Kuznetsov <kuznet@....inr.ac.ru>, Hideaki YOSHIFUJI <yoshfuji@...ux-ipv6.org>, Shuah Khan <shuah@...nel.org>, Network Development <netdev@...r.kernel.org>, LKML <linux-kernel@...r.kernel.org>, linux-kselftest@...r.kernel.org, Willem de Bruijn <willemb@...gle.com> Subject: Re: [PATCH net 4/4] net/udpgso_bench_tx: audit error queue > Now that I know the issue is only in TCP, I can speculate that all bytes are > > being reported, but done with fewer messages. It may warrant some > > investigation in case there is some kind of bug. > > This would definitely still be a bug and should not happen. We have > quite a bit of experience with TCP zerocopy and I have not run into > this in practice, so I do think that it is somehow a test artifact. To be clear, I'm not saying that it is an artifact of your extensions. It's quite likely that the zerocopy benchmark was a bit flaky in that regard all along. No need to spend further time on that for this patchset.
Powered by blists - more mailing lists