Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TS-4309: Simplify read/write loops to address upload/download speed p… #629

Closed
wants to merge 1 commit into from

Conversation

shinrich
Copy link
Member

…roblems.

May also help with ASAN crash reported in TS-4424.

Warning("Cannot add new block");
break;
}
}
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I believe these code will read SSL data until meet EAGAIN. How to handle a SSL flood attack ? a fast socket keeps sending and keeps call SSLReadBuffer and add_block() there no chance to return to NetHandler::manNetEvent() to processing next NetVC.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good point. Looking at the non-ssl version, it is tracking a max to read. We should do something similar in the ssl-case.

oknet added a commit to oknet/trafficserver that referenced this pull request May 31, 2016
ogoodman pushed a commit to ogoodman/trafficserver that referenced this pull request Aug 20, 2016
shinrich added a commit to shinrich/trafficserver that referenced this pull request Jan 9, 2018
ywkaras pushed a commit to ywkaras/trafficserver that referenced this pull request Jul 7, 2022
In TsSharedMutex.h, make error reporting thread-safe. (apache#8636)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants