lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 19 Dec 2008 20:37:09 +0300 From: Vladislav Bolkhovitin <vst@...b.net> To: "David M. Lloyd" <dmlloyd@...rg.com> CC: linux-mm@...ck.org, Christoph Hellwig <hch@...radead.org>, James Bottomley <James.Bottomley@...senPartnership.com>, linux-scsi@...r.kernel.org, linux-kernel@...r.kernel.org, scst-devel@...ts.sourceforge.net, Bart Van Assche <bart.vanassche@...il.com>, netdev@...r.kernel.org Subject: Re: [RFC]: Support for zero-copy TCP transmit of user space data David M. Lloyd, on 12/18/2008 09:43 PM wrote: > On 12/18/2008 12:35 PM, Vladislav Bolkhovitin wrote: >> An iSCSI target driver iSCSI-SCST was a part of the patchset >> (http://lkml.org/lkml/2008/12/10/293). For it a nice optimization to >> have TCP zero-copy transmit of user space data was implemented. Patch, >> implementing this optimization was also sent in the patchset, see >> http://lkml.org/lkml/2008/12/10/296. > > I'm probably ignorant of about 90% of the context here, but isn't this the > sort of problem that was supposed to have been solved by vmsplice(2)? No, vmsplice can't help here. ISCSI-SCST is a kernel space driver. But, even if it was a user space driver, vmsplice wouldn't change anything much. It doesn't have a possibility for a user to know, when transmission of the data finished. So, it is intended to be used as: vmsplice() buffer -> munmap() the buffer -> mmap() new buffer -> vmsplice() it. But on the mmap() stage kernel has to zero all the newly mapped pages and zeroing memory isn't much faster, than copying it. Hence, there would be no considerable performance increase. Thanks, Vlad -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists