On Wed, 2003-02-19 at 01:48, José Fonseca wrote:
> I think our case is one of the exceptions: we are copying from the user
> and verifying the data at the same time (to avoid the user sending
> malicious commands to the card's DMA engine which could potentialy
> compromise the system integrity and security). The alternative would be
> copy the whole thing and the verify but it was agreed that this would
> make better use of the cache and so on...

Small here is bytes, caches are 64byte lines nowdays, sometimes up to 256
or so to the L2 cache. Time it and see 8)



-------------------------------------------------------
This SF.net email is sponsored by: SlickEdit Inc. Develop an edge.
The most comprehensive and flexible code editor you can use.
Code faster. C/C++, C#, Java, HTML, XML, many more. FREE 30-Day Trial.
www.slickedit.com/sourceforge
_______________________________________________
Dri-devel mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/dri-devel

Reply via email to