lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CACGkMEvAEu1TaPEj6x2A2J0EdrJj_CkHM5-qBM9_OHo2O5uKzA@mail.gmail.com>
Date: Tue, 7 May 2024 14:29:10 +0800
From: Jason Wang <jasowang@...hat.com>
To: Heng Qi <hengqi@...ux.alibaba.com>
Cc: Daniel Jurgens <danielj@...dia.com>, mst@...hat.com, xuanzhuo@...ux.alibaba.com, 
	virtualization@...ts.linux.dev, davem@...emloft.net, edumazet@...gle.com, 
	kuba@...nel.org, pabeni@...hat.com, jiri@...dia.com, netdev@...r.kernel.org
Subject: Re: [PATCH net-next v6 0/6] Remove RTNL lock protection of CVQ

On Mon, May 6, 2024 at 2:20 PM Heng Qi <hengqi@...ux.alibaba.com> wrote:
>
> On Fri, 3 May 2024 23:24:39 +0300, Daniel Jurgens <danielj@...dia.com> wrote:
> > Currently the buffer used for control VQ commands is protected by the
> > RTNL lock. Previously this wasn't a major concern because the control VQ
> > was only used during device setup and user interaction. With the recent
> > addition of dynamic interrupt moderation the control VQ may be used
> > frequently during normal operation.
> >
> > This series removes the RNTL lock dependency by introducing a mutex
> > to protect the control buffer and writing SGs to the control VQ.
> >
>
> For the series, keep tags:
>
> Reviewed-by: Heng Qi <hengqi@...ux.alibaba.com>
> Tested-by: Heng Qi <hengqi@...ux.alibaba.com>
>

Acked-by: Jason Wang <jasowang@...hat.com>

Thanks


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ