From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-wm1-f51.google.com (mail-wm1-f51.google.com [209.85.128.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0834D37E30B for ; Wed, 29 Apr 2026 15:26:19 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.51 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1777476384; cv=none; b=NC1VWsTjEnTZfIdqF+L0LBXRoL3EnPQAcPEWcOePazKwGe+kWQeH5ZHCxP2BwKXWscGO2JzkzHD3Q81Fxe0wFqSNDQLuDXPxIAwa9+YbjVGpPWmFTtY4mvLvIhRz+XRVxSMkTkTnr2csSIWEgFLbRSwlfl1LOlLwkku4nuIzPAc= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1777476384; c=relaxed/simple; bh=hELMxdIqirWfZE9lS3jphk/Hs00RokLAMWOkF4lalT0=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=qP51ntkOfh2qYQi3UOU2bPflTfWbWlX0thiYseOidIAWInnjMtpV3Bn8x8HaFbk71sYk5613eJAkx3X0VJPQiT96hUJQwpbKN/mHvgNpG2WPlRLc4lNXazWGKSZY6eU9H3oIbYcVuuNlvUhU1zRsC5g3v6zCcftmpv3DYsJgNm0= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=XWB8xc98; arc=none smtp.client-ip=209.85.128.51 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="XWB8xc98" Received: by mail-wm1-f51.google.com with SMTP id 5b1f17b1804b1-4896c22fcbaso97493545e9.0 for ; Wed, 29 Apr 2026 08:26:19 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1777476378; x=1778081178; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=G9kqbgnidQC23bEvrBAVDYa4e7L0vOouqvUY0ysfe8Y=; b=XWB8xc98up29GzY7kFjywBjNyG9lgycOlMLs1dHgrQ32RQEWjh6cxO4yMt8G/UntSC 4kksswLeJ03wupTCWEvdS7ZG2if40crUlus2GT8pR5xWNiEWI/uiK7N0mIrzbrNFKnOL PySlG5myV9tLCrrkUmRq49nU7xHF8nIgRKHwlG1Qw6DzKvYg+kl+vYewodjHeZ/fQUEU HY93XBkBemETwZXXuPpu1nm9a0NV/vd06xGE571ZmDtPeca3KlAnQ65PZTTkTqnPOBbw REGD+nzd0M52LFRdTDuoc0l8KZasOYu1p3bNIERwFJvAJXQABZDlS0H/3MO75ARW9ztW V5ug== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1777476378; x=1778081178; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=G9kqbgnidQC23bEvrBAVDYa4e7L0vOouqvUY0ysfe8Y=; b=Id43ri05M9NEZSNEO50FG1P06yuEj/NFVIwwzbH6zBkeJbstbNNBMEG13+m+qCjmv+ ytrPxV+VIoDSEEPKMuIrKQMBe2tAn071Sw0ghkuxAmT7ypT9MbCFkzDZ+4mGsK/SUbvd 3YcV7z8ZX1V5gN3SEmQbF5Ysh1jrHCwFHIOIRx8Oq96V/YaJ2LdSv6L618X8zG04PK41 QOUH/0wRJ5sZu5bA9XZqbQKfqRAm24990DRNmndEBwHGUf1/bkJDasrowp3bCI8JoHpx BoM2WiSRivDew6ciDLbNzY6bX7nLSfrPwTL6FzSJogMDmV4VTNKhsWnXJT8CeWnlXk8y Qvng== X-Forwarded-Encrypted: i=1; AFNElJ+MdOxxlSB7oH8ty6jcs+AE6GEuq6x05uyhAU9VgwpO+QXfGJPVy70n+NXL2HJFVNuInqiWGUklcjHd++Q=@vger.kernel.org X-Gm-Message-State: AOJu0Yz+UD7wVa/2aPXgvme+PKCFXhWnwZXqppxkios6uKcX+mhoxHOO T+jJMvcTAiBf9nsIQgxmMzyCM/EGsSTOwS2xgVmS3sr+cnKOMSp4Syd4 X-Gm-Gg: AeBDiese+QkrDPsVOV7Lvwr6v9kboYbftbD3agtsAdYRwUzw1Z3cnKrFr3BPH8MpRmC N3agQCD4znNS78p8yN27ucx5lAVrnSoKEbIhkqJv8kVxJmMYkzTAYFq0o4iRCzbu0kzbw1wvAvZ EjnbgwDJ7jw0sIsRvvYUy3JbiE3iTtLsma3MFVI65q2ISOMh9SXygDdIOBgJaKeed9QO/oYirB1 rqy6YebCHqQOUhIGKZQK4k7RspSqJnHG1l6yroqYjXoSGJB5gjd8SIv4OUHAz4Eclb01i8OP1e4 oEsFqlAx4XzB+E9BbKA6SLfkn32kcGViLFZesitQtUetakHAMqA7OI9r66vybEyKzGDAtRODRCR aZ/Zu61THahQQfI3/DxhWTPVUNK8xZJw8l7VzlxL8lPMX3P2bCRRvUEJiQaUJHf0vXvZlPMtVL5 ALCyZWMLsS5mU/NZz/lp5xPcNl+ysCRWArQlj2OCjxpQ3tNRSjl1lvWcJt/CHJx2p8HwU+IOBc/ Prs2Y2E2vvY9+dzcw9sEVSrj6KTx7Og1CtiXRlW8up7 X-Received: by 2002:a05:600c:4f92:b0:489:1ff1:74df with SMTP id 5b1f17b1804b1-48a77ae5430mr125646225e9.1.1777476377153; Wed, 29 Apr 2026 08:26:17 -0700 (PDT) Received: from 127.0.0.1localhost ([82.132.184.31]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-447b76e5c22sm6382951f8f.28.2026.04.29.08.26.13 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 29 Apr 2026 08:26:16 -0700 (PDT) From: Pavel Begunkov To: Jens Axboe , Keith Busch , Christoph Hellwig , Sagi Grimberg , Alexander Viro , Christian Brauner , Andrew Morton , Sumit Semwal , =?UTF-8?q?Christian=20K=C3=B6nig?= , linux-block@vger.kernel.org, linux-kernel@vger.kernel.org, linux-nvme@lists.infradead.org, linux-fsdevel@vger.kernel.org, io-uring@vger.kernel.org, linux-media@vger.kernel.org, dri-devel@lists.freedesktop.org, linaro-mm-sig@lists.linaro.org Cc: asml.silence@gmail.com, Nitesh Shetty , Kanchan Joshi , Anuj Gupta , Tushar Gohad , William Power , Phil Cayton , Jason Gunthorpe Subject: [PATCH v3 00/10] Add dmabuf read/write via io_uring Date: Wed, 29 Apr 2026 16:25:46 +0100 Message-ID: X-Mailer: git-send-email 2.53.0 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit The patch set allows to register a dmabuf to an io_uring instance for a specified file and use it with io_uring read / write requests. The infrastructure is not tied to io_uring and there could be more users in the future. A similar idea was attempted some years ago by Keith [1], from where I borrowed a good number of changes, and later was brough up by Tushar and Vishal from Intel. It's an opt-in feature for files, and they need to implement a new file operation to use it. Only NVMe block devices are supported in this series. The user API is built on top of io_uring's "registered buffers", where a dmabuf is registered in a special way, but after it can be used as any other "registered buffer" with IORING_OP_{READ,WRITE}_FIXED requests. It's created via a new file operation and the resulted map is then passed through the I/O stack in a new iterator type. There is some additional infrastructure to bind it all, which also counts requests using a dmabuf map and managing lifetimes, which is used to implement map invalidation. It was tested for GPU <-> NVMe transfers. Also, as it maintains a long-term dma mapping, it helps with the IOMMU cost. The numbers below are for udmabuf reads previously run by Anuj for different IOMMU modes: - STRICT: before = 570 KIOPS, after = 5.01 MIOPS - LAZY: before = 1.93 MIOPS, after = 5.01 MIOPS - PASSTHROUGH: before = 5.01 MIOPS, after = 5.01 MIOPS There are some liburing tests that can serve as an example: git: https://github.com/isilence/liburing.git rw-dmabuf-tests-v3 url: https://github.com/isilence/liburing/tree/rw-dmabuf-tests-v3 [1] https://lore.kernel.org/io-uring/20220805162444.3985535-1-kbusch@fb.com/ v3: - Rework io_uring registration - Move token/map infrastructure code out of blk-mq - Simplify callbacks: remove a separate blk-mq table, which was mostly just forwarding calls (to nvme). - Don't skip dma sync depending on request direction - Fix a couple of hangs - Rename s/dma/dmabuf/ - Other small changes v2: - Don't pass raw dma addresses, wrap it into a driver specific object - Split into two objects: token and map - Implement move_notify Pavel Begunkov (10): file: add callback for creating long-term dmabuf maps iov_iter: add iterator type for dmabuf maps block: move bvec init into __bio_clone block: introduce dma map backed bio type lib: add dmabuf token infrastructure block: forward create_dmabuf_token to drivers nvme-pci: implement dma_token backed requests io_uring/rsrc: introduce buf registration structure io_uring/rsrc: extend buffer update io_uring/rsrc: add dmabuf backed registered buffers block/bio.c | 28 +++- block/blk-merge.c | 14 ++ block/blk.h | 3 +- block/fops.c | 16 ++ drivers/nvme/host/pci.c | 282 ++++++++++++++++++++++++++++++++ include/linux/bio.h | 19 ++- include/linux/blk-mq.h | 9 + include/linux/blk_types.h | 8 +- include/linux/fs.h | 2 + include/linux/io_dmabuf_token.h | 92 +++++++++++ include/linux/io_uring_types.h | 5 + include/linux/uio.h | 11 ++ include/uapi/linux/io_uring.h | 31 +++- io_uring/io_uring.c | 3 +- io_uring/rsrc.c | 266 +++++++++++++++++++++++++----- io_uring/rsrc.h | 30 +++- io_uring/rw.c | 4 +- lib/Kconfig | 4 + lib/Makefile | 2 + lib/io_dmabuf_token.c | 272 ++++++++++++++++++++++++++++++ lib/iov_iter.c | 29 +++- 21 files changed, 1071 insertions(+), 59 deletions(-) create mode 100644 include/linux/io_dmabuf_token.h create mode 100644 lib/io_dmabuf_token.c -- 2.53.0