lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20231219004609.12656-1-kuniyu@amazon.com> Date: Tue, 19 Dec 2023 09:46:09 +0900 From: Kuniyuki Iwashima <kuniyu@...zon.com> To: <kuniyu@...zon.com> CC: <davem@...emloft.net>, <edumazet@...gle.com>, <ivan@...udflare.com>, <kuba@...nel.org>, <kuni1840@...il.com>, <netdev@...r.kernel.org>, <pabeni@...hat.com> Subject: [PATCH v3 net-next 0/4] af_unix: Random improvements for GC. From: Kuniyuki Iwashima <kuniyu@...zon.com> Date: Mon, 18 Dec 2023 16:50:16 +0900 > If more than 16000 inflight AF_UNIX sockets exist on a host, each > sendmsg() will be forced to wait for unix_gc() even if a process > is not sending any FD. > > This series tries not to impose such a penalty on sane users who > do not send AF_UNIX FDs or do not have inflight sockets more than > SCM_MAX_FD * 8. > > > Changes: > v3: Just noticed the patch 4 needs --3way to apply, probably due to the recent io_uring commit. I'll rebase on the latest and repost v4 to make patchwork happy. Sorry for the noise. --- pw-bot: cr
Powered by blists - more mailing lists