lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20151130.112500.293198684175670933.davem@redhat.com>
Date:	Mon, 30 Nov 2015 11:25:00 -0500 (EST)
From:	David Miller <davem@...hat.com>
To:	mw@...ihalf.com
Cc:	f.fainelli@...il.com, linux-kernel@...r.kernel.org,
	linux-arm-kernel@...ts.infradead.org, netdev@...r.kernel.org,
	thomas.petazzoni@...e-electrons.com, andrew@...n.ch,
	linux@....linux.org.uk, jason@...edaemon.net, myair@...vell.com,
	jaz@...ihalf.com, simon.guinot@...uanux.org, xswang@...vell.com,
	nadavh@...vell.com, alior@...vell.com, tn@...ihalf.com,
	gregory.clement@...e-electrons.com, nitroshift@...oo.com,
	sebastian.hesselbarth@...il.com
Subject: Re: [PATCH 00/13] mvneta Buffer Management and enhancements

From: Marcin Wojtas <mw@...ihalf.com>
Date: Mon, 30 Nov 2015 15:13:22 +0100

> What kind of abstraction and helpers do you mean? Some kind of API
> (e.g. bm_alloc_buffer, bm_initialize_ring bm_put_buffer,
> bm_get_buffer), which would be used by platform drivers (and specific
> aplications if one wants to develop on top of the kernel)?
> 
> In general, what is your top-view of such solution and its cooperation
> with the drivers?

The tricky parts involved have to do with allocating pages for the
buffer pools and minimizing the number of atomic refcounting
operations on those pages for for the puts and gets, particularly
around buffer replenish runs.

For example, if you're allocating a page for a buffer pool the device
will chop into N (for any N < PAGE_SIZE) byte pieces, you can
eliminate many atomic operations.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ