[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20141007.114341.1417644866461362364.davem@davemloft.net>
Date: Tue, 07 Oct 2014 11:43:41 -0400 (EDT)
From: David Miller <davem@...emloft.net>
To: David.Laight@...LAB.COM
Cc: willemb@...gle.com, john.fastabend@...il.com, dborkman@...hat.com,
fw@...len.de, gerlitz.or@...il.com, hannes@...essinduktion.org,
netdev@...r.kernel.org, john.ronciak@...el.com, amirv@...lanox.com,
eric.dumazet@...il.com, danny.zhou@...el.com
Subject: Re: [net-next PATCH v1 1/3] net: sched: af_packet support for
direct ring access
From: David Laight <David.Laight@...LAB.COM>
Date: Tue, 7 Oct 2014 09:27:03 +0000
> That is (probably) the only scheme that stops the application
> accessing random parts of physical memory.
I don't know where this claim keeps coming from, it's false.
The application has to attach memory to the ring, and then the
ring can only refer to that memory for the duration of the
session.
There is no way that the user can program the address field of the
descriptors to point at arbitrary physical memory locations.
There is protection and control.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists