lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1284490143.13351.82.camel@localhost.localdomain> Date: Tue, 14 Sep 2010 11:49:03 -0700 From: Shirley Ma <mashirle@...ibm.com> To: "Michael S. Tsirkin" <mst@...hat.com> Cc: Arnd Bergmann <arnd@...db.de>, Avi Kivity <avi@...hat.com>, "Xin, Xiaohui" <xiaohui.xin@...el.com>, David Miller <davem@...emloft.net>, netdev@...r.kernel.org, kvm@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [RFC PATCH 2/2] macvtap: TX zero copy between guest and host kernel On Tue, 2010-09-14 at 20:27 +0200, Michael S. Tsirkin wrote: > As others said, the harder issues for TX are in determining that it's > safe > to unpin the memory, and how much memory is it safe to pin to beging > with. For RX we have some more complexity. I think unpin the memory is in kfree_skb() whenever the last reference is gone for TX. What we discussed about here is when/how vhost get notified to update ring buffer descriptors. Do I misunderstand something here? > Well it's up to you of course, but this is not what I would try: > if you look at the > patchset vhost changes is not the largest part of it, > so this sounds a bit like effort duplication. > > TX only is also much less interesting than full zero copy. It's not true. From the performance, TX only has gained big improvement. We need to identify how much gain from TX zero copy, and how much gain from RX zero copy. > I think that you should be able to simply combine > the two drivers together, add an ioctl to > enable/disable zero copy mode of operation. That could work. But what's the purpose to have two drivers if one driver can handle it? Thanks Shirley -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists