lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 5 Oct 2006 16:01:19 +0200
From:	Hans Henrik Happe <hhh@...da.sdu.dk>
To:	Evgeniy Polyakov <johnpol@....mipt.ru>
Cc:	Eric Dumazet <dada1@...mosbay.com>,
	Ulrich Drepper <drepper@...il.com>,
	lkml <linux-kernel@...r.kernel.org>,
	David Miller <davem@...emloft.net>,
	Ulrich Drepper <drepper@...hat.com>,
	Andrew Morton <akpm@...l.org>, netdev <netdev@...r.kernel.org>,
	Zach Brown <zach.brown@...cle.com>,
	Christoph Hellwig <hch@...radead.org>,
	Chase Venters <chase.venters@...entec.com>,
	Johann Borck <johann.borck@...sedata.com>
Subject: Re: [take19 1/4] kevent: Core files.

On Thursday 05 October 2006 12:21, Evgeniy Polyakov wrote:
> On Thu, Oct 05, 2006 at 11:56:24AM +0200, Eric Dumazet (dada1@...mosbay.com) 
wrote:
> > On Thursday 05 October 2006 10:57, Evgeniy Polyakov wrote:
> > 
> > > Well, it is possible to create /sys/proc entry for that, and even now
> > > userspace can grow mapping ring until it is forbiden by kernel, which
> > > means limit is reached.
> > 
> > No need for yet another /sys/proc entry.
> > 
> > Right now, I (for example) may have a use for Generic event handling, but 
for 
> > a program that needs XXX.XXX handles, and about XX.XXX events per second.
> > 
> > Right now, this program uses epoll, and reaches no limit at all, once you 
pass 
> > the "ulimit -n", and other kernel wide tunes of course, not related to 
epoll.
> > 
> > With your current kevent, I cannot switch to it, because of hardcoded 
limits.
> > 
> > I may be wrong, but what is currently missing for me is :
> > 
> > - No hardcoded limit on the max number of events. (A process that can open 
> > XXX.XXX files should be allowed to open a kevent queue with at least 
XXX.XXX 
> > events). Right now thats not clear what happens IF the current limit is 
> > reached.
> 
> This forces to overflows in fixed sized memory mapped buffer.
> If we remove memory mapped buffer or will allow to have overflows (and
> thus skipped entries) keven can easily scale to that limits (tested with
> xx.xxx events though).
> 
> > - In order to avoid touching the whole ring buffer, it might be good to be 
> > able to reset the indexes to the beginning when ring buffer is empty. (So 
if 
> > the user land is responsive enough to consume events, only first pages of 
the 
> > mapping would be used : that saves L1/L2 cpu caches)
> 
> And what happens when there are 3 empty at the beginning and \we need to
> put there 4 ready events?

Couldn't there be 3 areas in the mmap buffer:

- Unused: entries that the kernel can alloc from.
- Alloced: entries alloced by kernel but not yet used by user. Kernel can 
update these if new events requires that.
- Consumed: entries that the user are processing.

The user takes a set of alloced entries and make them consumed. Then it 
processes the events after which it makes them unused. 

If there are no unused entries and the kernel needs some, it has wait for free 
entries. The user has to notify when unused entries becomes available. It 
could set a flag in the mmap'ed area to avoid unnessesary wakeups.

The are some details with indexing and wakeup notification that I have left 
out, but I hope my idea is clear. I could give a more detailed description if 
requested. Also, I'm a user-level programmer so I might not get the whole 
picture.

Hans Henrik Happe
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ