lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20070725.233808.41635535.davem@davemloft.net>
Date:	Wed, 25 Jul 2007 23:38:08 -0700 (PDT)
From:	David Miller <davem@...emloft.net>
To:	mchan@...adcom.com
Cc:	netdev@...r.kernel.org, shemminger@...ux-foundation.org,
	jgarzik@...ox.com, hadi@...erus.ca, rusty@...tcorp.com.au
Subject: Re: [PATCH RFC]: napi_struct V4

From: "Michael Chan" <mchan@...adcom.com>
Date: Wed, 25 Jul 2007 23:33:03 -0700

> This will lead to more and longer lock contentions between
> ->hard_start_xmit() and ->poll() in the normal fast path.  Why
> do we need to widen the scope of netif_tx_lock() in this case?

So that ->poll_controller() can process TX acks by just having
the TX lock and interrupts disabled.

Can you think of another way to process TX acks from absolutely
any execution context whatsoever?  That's what we need and
preferably in some generic way, and the above is what I came
up with.

To be honest I don't think the TX lock contention will matter, and
even if there were a small cost, the simplicity of the netpoll
implementation is worth it given how problematic and hard to debug
netpoll has been in the past.
-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ