lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAMEtUuw0UjJuDqSDrK9L-CUWaVdKni1p9cib+VGCOYtBbrCY4Q@mail.gmail.com>
Date:	Mon, 29 Sep 2014 10:46:00 -0700
From:	Alexei Starovoitov <ast@...mgrid.com>
To:	Eric Dumazet <eric.dumazet@...il.com>
Cc:	Or Gerlitz <gerlitz.or@...il.com>,
	"David S. Miller" <davem@...emloft.net>,
	Jesper Dangaard Brouer <brouer@...hat.com>,
	Eric Dumazet <edumazet@...gle.com>,
	John Fastabend <john.r.fastabend@...el.com>,
	Linux Netdev List <netdev@...r.kernel.org>,
	Amir Vadai <amirv@...lanox.com>,
	Or Gerlitz <or.gerlitz@...il.com>
Subject: Re: [PATCH v2 net-next] mlx4: optimize xmit path

On Sun, Sep 28, 2014 at 9:19 PM, Eric Dumazet <eric.dumazet@...il.com> wrote:
>         send_doorbell = !skb->xmit_more || netif_xmit_stopped(ring->tx_queue);
>
>         if (ring->bf_enabled && desc_size <= MAX_BF && !bounce &&
>             !vlan_tx_tag_present(skb) && send_doorbell) {

This patch is good,

but I've been thinking more about bf+xmit_more and want
to double check my understanding in that scenario:
xmit_more=true will queue descriptors normally and
the last xmit_more=false packet will write into BF.
I guess BF suppose to pick up the earlier ones from
the queue, otherwise the whole thing is broken.
So if indeed BF can pick up the whole chain, then
it should be the faster way than doing iowrite32(), right?
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ