lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <063D6719AE5E284EB5DD2968C1650D6DB01E6F0F@AcuExch.aculab.com> Date: Wed, 12 Oct 2016 16:03:39 +0000 From: David Laight <David.Laight@...LAB.COM> To: 'Alexander Duyck' <alexander.duyck@...il.com>, Nikita Yushchenko <nikita.yoush@...entembedded.com> CC: Eric Dumazet <edumazet@...gle.com>, David Miller <davem@...emloft.net>, Jeff Kirsher <jeffrey.t.kirsher@...el.com>, intel-wired-lan <intel-wired-lan@...ts.osuosl.org>, Netdev <netdev@...r.kernel.org>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, Chris Healy <cphealy@...il.com> Subject: RE: igb driver can cause cache invalidation of non-owned memory? From: Alexander Duyck > Sent: 12 October 2016 16:33 ... > > To get some throughput improvement, I propose removal of that > > sync_for_device() before reusing buffer. Will you accept such a patch ;) > > Not one that gets rid of sync_for_device() in the driver. From what I > can tell there are some DMA APIs that use that to perform the > invalidation on the region of memory so that it can be DMAed into. > Without that we run the risk of having a race between something the > CPU might have placed in the cache and something the device wrote into > memory. The sync_for_device() call is meant to invalidate the cache > for the region so that when the device writes into memory there is no > risk of that race. I'm not expert, but some thought... Just remember that the cpu can do speculative memory and cache line reads. So you need to ensure there are no dirty cache lines when the receive buffer is setup and no cache lines at all at before looking at the frame. So unless you know the exact rules for these speculative cache line reads you have to invalidate the cache after the buffer is written to by the hardware even it was invalidated when the buffer was set up. If you can 100% guarantee the cpu hasn't dirtied the cache then I think the invalidate prior to reusing the buffer can be skipped. But I wouldn't want to debug that going wrong. Might be provable safe in the 'copybreak' path. David
Powered by blists - more mailing lists