[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <alpine.DEB.2.20.1612141342080.23516@east.gentwo.org>
Date: Wed, 14 Dec 2016 13:43:43 -0600 (CST)
From: Christoph Lameter <cl@...ux.com>
To: David Laight <David.Laight@...LAB.COM>
cc: Hannes Frederic Sowa <hannes@...essinduktion.org>,
Jesper Dangaard Brouer <brouer@...hat.com>,
John Fastabend <john.fastabend@...il.com>,
Mike Rapoport <rppt@...ux.vnet.ibm.com>,
"netdev@...r.kernel.org" <netdev@...r.kernel.org>,
linux-mm <linux-mm@...ck.org>,
Willem de Bruijn <willemdebruijn.kernel@...il.com>,
Björn Töpel <bjorn.topel@...el.com>,
"Karlsson, Magnus" <magnus.karlsson@...el.com>,
Alexander Duyck <alexander.duyck@...il.com>,
Mel Gorman <mgorman@...hsingularity.net>,
Tom Herbert <tom@...bertland.com>,
Brenden Blanco <bblanco@...mgrid.com>,
Tariq Toukan <tariqt@...lanox.com>,
Saeed Mahameed <saeedm@...lanox.com>,
Jesse Brandeburg <jesse.brandeburg@...el.com>,
Kalman Meth <METH@...ibm.com>,
Vladislav Yasevich <vyasevich@...il.com>
Subject: RE: Designing a safe RX-zero-copy Memory Model for Networking
On Wed, 14 Dec 2016, David Laight wrote:
> If the kernel is doing ANY validation on the frames it must copy the
> data to memory the application cannot modify before doing the validation.
> Otherwise the application could change the data afterwards.
The application is not allowed to change the data after a work request has
been submitted to send the frame. Changes are possible after the
completion request has been received.
The kernel can enforce that by making the frame(s) readonly and thus
getting a page fault if the app would do such a thing.
Powered by blists - more mailing lists