lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 25 Apr 2022 10:30:12 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Alex Elder <elder@...aro.org> Cc: davem@...emloft.net, kuba@...nel.org, mka@...omium.org, evgreen@...omium.org, bjorn.andersson@...aro.org, cpratapa@...eaurora.org, avuyyuru@...eaurora.org, jponduru@...eaurora.org, subashab@...eaurora.org, elder@...nel.org, netdev@...r.kernel.org, linux-arm-msm@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH net-next] net: ipa: compute proper aggregation limit Hello: This patch was applied to netdev/net-next.git (master) by David S. Miller <davem@...emloft.net>: On Thu, 21 Apr 2022 13:53:33 -0500 you wrote: > The aggregation byte limit for an endpoint is currently computed > based on the endpoint's receive buffer size. > > However, some bytes at the front of each receive buffer are reserved > on the assumption that--as with SKBs--it might be useful to insert > data (such as headers) before what lands in the buffer. > > [...] Here is the summary with links: - [net-next] net: ipa: compute proper aggregation limit https://git.kernel.org/netdev/net-next/c/c5794097b269 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists