lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Wed, 2 Jul 2014 21:42:22 +0200
From:	Peter Stuge <peter@...ge.se>
To:	Alan Stern <stern@...land.harvard.edu>
Cc:	Stefan Klug <stefan.klug@...lerweb.com>, linux-usb@...r.kernel.org,
	linux-kernel@...r.kernel.org
Subject: Re: [PATCH][RFC] USB: zerocopy support for usbfs

Alan Stern wrote:
> > > Also, many host controllers cannot handle arbitrary alignment.  
> > > It would be best to require that the buffer start at a page boundary.
> > 
> > This requires a bit of negotiation with userspace, maybe per-URB but
> 
> I don't follow.  What negotiation is needed?  All that needs to happen 
> is the user program submits a transfer where the buffer is aligned on a 
> page boundary.

The negotiation needed would be for userspace to learn what alignment
is required, so that it can make sure to provide only such buffers.
But see below on mmap..


> > it seems better to negotiate per-claim or even per-open. What about
> > large control transfers?
> 
> The kernel doesn't support scatter-gather for control transfers, only 
> bulk.

That could possibly change, right, and then it would be nice to have
zerocopy for free there as well?


> > It's important that the kernel gives userspace enough information
> > about the constraints, if userspace wants zerocopy.
> 
> I don't know of any way for the kernel to give userspace any
> information about constraints of this sort.  Do you?

I don't know of any at the moment, no. It might be done through an
ioctl into usbfs, but if sysfs already has all neccessary information
then no ioctl is needed. Anyway...


> > Indeed I think userspace wants to be involved in choosing memory also
> > with bulk, in order to ensure that zerocopy will always work when
> > userspace cares about that.
> > 
> > Is it enough to expose the DMA mask of the host controller?
> 
> It doesn't need to be exposed, since the mmap(2) call would be handled
> by the kernel's USB stack (and besides, the user program can't request
> that the mapped memory be located in any particular physical address
> region).

Since alignment isn't the only issue I don't think there's a way to
avoid it. I was just hoping to be able to avoid allocating zerocopy
buffers with mmap().


> Furthermore, the DMA mask already is exposed in sysfs.
> For example, the DMA mask for the host controller on bus 2 is
> given in /sys/bus/usb/devices/usb2/../dma_mask_bits.

I realize that this doesn't help much, since userspace can't get the
physical address for its virtual addresses anyway.


//Peter
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ