[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCHv1 net-next] xen-netback: remove unconditional pull_skb_tail in guest Tx path
On 03/11/14 17:39, Ian Campbell wrote: > On Mon, 2014-11-03 at 17:23 +0000, David Vrabel wrote: >> From: Malcolm Crossley <malcolm.crossley@xxxxxxxxxx> >> >> Unconditionally pulling 128 bytes into the linear buffer is not >> required. Netback has already grant copied up-to 128 bytes from the >> first slot of a packet into the linear buffer. The first slot normally >> contain all the IPv4/IPv6 and TCP/UDP headers. > > What about when it doesn't? It sounds as if we now won't pull up, which > would be bad. The network stack will always pull any headers it needs to inspect (the frag may be a userspace page which has the same security issues as a frag with a foreign page). e.g., see skb_checksum_setup() called slightly later on in netback. > To avoid the pull up the code would need to grant copy up-to 128 bytes > from as many slots as needed, not only the first. > > Also, if the grant copy has already placed 128 bytes in the linear area, > why is the pull up touching anything in the first place? Shouldn't it be > a nop in that case? The grant copy only copies from the first frag which may be less than 128 bytes in length. David _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |