lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <169153562203.6878.1667103889649969774.git-patchwork-notify@kernel.org> Date: Tue, 08 Aug 2023 23:00:22 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Hannes Reinecke <hare@...e.de> Cc: hch@....de, sagi@...mberg.me, kbusch@...nel.org, linux-nvme@...ts.infradead.org, kuba@...nel.org, edumazet@...gle.com, pabeni@...hat.com, netdev@...r.kernel.org Subject: Re: [PATCHv2] net/tls: avoid TCP window full during ->read_sock() Hello: This patch was applied to netdev/net-next.git (main) by Jakub Kicinski <kuba@...nel.org>: On Mon, 7 Aug 2023 09:10:22 +0200 you wrote: > When flushing the backlog after decoding a record we don't really > know how much data the caller want us to evaluate, so use INT_MAX > and 0 as arguments to tls_read_flush_backlog() to ensure we flush > at 128k of data. Otherwise we might be reading too much data and > trigger a TCP window full. > > Suggested-by: Jakub Kicinski <kuba@...nel.org> > Signed-off-by: Hannes Reinecke <hare@...e.de> > > [...] Here is the summary with links: - [PATCHv2] net/tls: avoid TCP window full during ->read_sock() https://git.kernel.org/netdev/net-next/c/ba4a734e1aa0 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists