From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from www62.your-server.de (www62.your-server.de [213.133.104.62]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E67002D24B7; Thu, 15 Jan 2026 08:26:26 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=213.133.104.62 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1768465590; cv=none; b=ENd7P565w9JFqnjPO+K69mjx3l9k9+tD9bgdxnCNgeBOVYly0PuVzmLLgEhBIry88pPGQaZPH/a9v1r9m63ZfrBqx2IbKiyQBk1CStFb93CiezzMmSutIH/FICmL4XDLCSN4JVVYO4XPhAuGOUe5TdQ1pN33Y/Yaz5vE23S26mo= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1768465590; c=relaxed/simple; bh=hjRK7S2yHOJWgvJDDW/5DKmLFZ1dyZcklQuWpWEJMsQ=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=MQoxSrTzqGXwJ/Ih+YYfAEN8hd3lz9Aj29wr4tQVy2zqx2IheDI36ecyAD+9FLPSyj245CWPY0kvRv22V238upmWcf419YUwq0IoO07u0mAaThJzIJi/sDCUddI8uE6e0J9dw02difCaRi3P7P+0C6IX8bY5Az6qIvPpDijNNss= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=iogearbox.net; spf=pass smtp.mailfrom=iogearbox.net; dkim=pass (2048-bit key) header.d=iogearbox.net header.i=@iogearbox.net header.b=o6Q3gPNK; arc=none smtp.client-ip=213.133.104.62 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=iogearbox.net Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=iogearbox.net Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=iogearbox.net header.i=@iogearbox.net header.b="o6Q3gPNK" DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=iogearbox.net; s=default2302; h=Content-Transfer-Encoding:MIME-Version: Message-ID:Date:Subject:Cc:To:From:Sender:Reply-To:Content-Type:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:In-Reply-To:References; bh=coeHE8IRePhJggmjMKT9z8lYs1HyViWzWxocUnEa7Gs=; b=o6Q3gPNK0x/+qjgXzrxJM0mNQR HSmYNm3/XZk4GfhKfw0ilv1hauvziUf5/NR6ghGujYkhXrBMxelEz0bxJW9A33gPsGPS8rUl/vmS5 PTkwb2ZkthBsyl6OXBvVAGTcYibkL9QLJ+xFUK84xGY1AKAjuQgN2jm/yq9zUJmmEKgu7Rb6Lqs2d lukyhT3ofbvrtJCvoLJgzAuCQcLtl6qEjcqIZSlJM0iudCq51dPuoOpwc7s/QkgVD8rhHIo7lyD9e +kj0PHggzfJ3VMYIrNKvGH7QkvD8iFzoZDQFL6ejoHDDHmxdEc0evmwydKEizFHZgcVsP3lz5Mqbs R3FsiWTw==; Received: from localhost ([127.0.0.1]) by www62.your-server.de with esmtpsa (TLS1.3) tls TLS_AES_256_GCM_SHA384 (Exim 4.96.2) (envelope-from ) id 1vgIg8-000Nov-1N; Thu, 15 Jan 2026 09:26:04 +0100 From: Daniel Borkmann To: netdev@vger.kernel.org Cc: bpf@vger.kernel.org, kuba@kernel.org, davem@davemloft.net, razor@blackwall.org, pabeni@redhat.com, willemb@google.com, sdf@fomichev.me, john.fastabend@gmail.com, martin.lau@kernel.org, jordan@jrife.io, maciej.fijalkowski@intel.com, magnus.karlsson@intel.com, dw@davidwei.uk, toke@redhat.com, yangzhenze@bytedance.com, wangdongdong.6@bytedance.com Subject: [PATCH net-next v7 00/16] netkit: Support for io_uring zero-copy and AF_XDP Date: Thu, 15 Jan 2026 09:25:47 +0100 Message-ID: <20260115082603.219152-1-daniel@iogearbox.net> X-Mailer: git-send-email 2.43.0 Precedence: bulk X-Mailing-List: netdev@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Virus-Scanned: Clear (ClamAV 1.4.3/27881/Thu Jan 15 08:25:08 2026) Containers use virtual netdevs to route traffic from a physical netdev in the host namespace. They do not have access to the physical netdev in the host and thus can't use memory providers or AF_XDP that require reconfiguring/restarting queues in the physical netdev. This patchset adds the concept of queue leasing to virtual netdevs that allow containers to use memory providers and AF_XDP at native speed. Leased queues are bound to a real queue in a physical netdev and act as a proxy. Memory providers and AF_XDP operations take an ifindex and queue id, so containers would pass in an ifindex for a virtual netdev and a queue id of a leased queue, which then gets proxied to the underlying real queue. We have implemented support for this concept in netkit and tested the latter against Nvidia ConnectX-6 (mlx5) as well as Broadcom BCM957504 (bnxt_en) 100G NICs. For more details see the individual patches. v6->v7: - Add xsk_dev_queue_valid real_num_rx_queues check given bound xs->queue_id could be from a TX queue (AI review bot) - Fix up exception path in queue leasing selftest (AI review bot) - Rebase and retested everything with mlx5 + bnxt_en v5->v6: - Fix nest_queue test in netdev_nl_queue_fill_one (Jakub/AI review bot) - Fix netdev notifier locking leak (Jakub/AI review bot) - Drop NETREG_UNREGISTERING WARN_ON_ONCE to avoid confusion (Stan) - Remove slipped-in .gitignore cruft in net selftest (Stan) - Fix Pylint warnings in net selftest (Jakub) - Rebase and retested everything with mlx5 + bnxt_en v4->v5: - Rework of the core API into queue-create op (Jakub) - Rename from queue peering to queue leasing (Jakub) - Add net selftests for queue leasing (Stan, Jakub) - Move netkit_queue_get_dma_dev into core (Jakub) - Dropped netkit_get_channels (Jakub) - Moved ndo_queue_create back to return index or error (Jakub) - Inline __netdev_rx_queue_{peer,unpeer} helpers (Jakub) - Adding helpers in patches where they are used (Jakub) - Undo inline for netdev_put_lock (Jakub) - Factoring out checks whether device can lease (Jakub) - Fix up return codes in netdev_nl_bind_queue_doit (Jakub) - Reject when AF_XDP or mp already bound (Jakub) - Switch some error cases to NL_SET_BAD_ATTR() (Jakub) - Rebase and retested everything with mlx5 + bnxt_en v3->v4: - ndo_queue_create store dst queue via arg (Nikolay) - Small nits like a spelling issue + rev xmas (Nikolay) - admin-perm flag in bind-queue spec (Jakub) - Fix potential ABBA deadlock situation in bind (Jakub, Paolo, Stan) - Add a peer dev_tracker to not reuse the sysfs one (Jakub) - New patch (12/14) to handle the underlying device going away (Jakub) - Improve commit message on queue-get (Jakub) - Do not expose phys dev info from container on queue-get (Jakub) - Add netif_put_rx_queue_peer_locked to simplify code (Stan) - Rework xsk handling to simplify the code and drop a few patches - Rebase and retested everything with mlx5 + bnxt_en v2->v3: - Use netdev_ops_assert_locked instead of netdev_assert_locked (syzbot) - Add missing netdev_lockdep_set_classes in netkit v1->v2: - Removed bind sample ynl code (Stan) - Reworked netdev locking to have consistent order (Stan, Kuba) - Return 'not supported' in API patch (Stan) - Improved ynl documentation (Kuba) - Added 'max: s32-max' in ynl spec for ifindex (Kuba) - Added also queue type in ynl to have user specify rx to make it obvious (Kuba) - Use of netdev_hold (Kuba) - Avoid static inlines from another header (Kuba) - Squashed some commits (Kuba, Stan) - Removed ndo_{peer,unpeer}_queues callback and simplified code (Kuba) - Improved commit messages (Toke, Kuba, Stan, zf) - Got rid of locking genl_sk_priv_get (Stan) - Removed af_xdp cleanup churn (Maciej) - Added netdev locking asserts (Stan) - Reject ethtool ioctl path queue resizing (Kuba) - Added kdoc for ndo_queue_create (Stan) - Uninvert logic in netkit single dev mode (Jordan) - Added binding support for multiple queues Daniel Borkmann (9): net: Add queue-create operation net: Implement netdev_nl_queue_create_doit net: Add lease info to queue-get response net, ethtool: Disallow leased real rxqs to be resized xsk: Extend xsk_rcv_check validation xsk: Proxy pool management for leased queues netkit: Add single device mode for netkit netkit: Add netkit notifier to check for unregistering devices netkit: Add xsk support for af_xdp applications David Wei (7): net: Proxy net_mp_{open,close}_rxq for leased queues net: Proxy netdev_queue_get_dma_dev for leased queues netkit: Implement rtnl_link_ops->alloc and ndo_queue_create selftests/net: Add bpf skb forwarding program selftests/net: Add env for container based tests selftests/net: Make NetDrvContEnv support queue leasing selftests/net: Add netkit container tests Documentation/netlink/specs/netdev.yaml | 44 +++ drivers/net/netkit.c | 360 +++++++++++++++--- include/linux/netdevice.h | 6 + include/net/netdev_queues.h | 19 +- include/net/netdev_rx_queue.h | 21 +- include/net/page_pool/memory_provider.h | 4 +- include/net/xdp_sock_drv.h | 2 +- include/uapi/linux/if_link.h | 6 + include/uapi/linux/netdev.h | 11 + net/core/dev.c | 7 + net/core/dev.h | 2 + net/core/netdev-genl-gen.c | 20 + net/core/netdev-genl-gen.h | 2 + net/core/netdev-genl.c | 185 +++++++++ net/core/netdev_queues.c | 74 +++- net/core/netdev_rx_queue.c | 169 ++++++-- net/ethtool/channels.c | 12 +- net/ethtool/ioctl.c | 9 +- net/xdp/xsk.c | 79 +++- tools/include/uapi/linux/netdev.h | 11 + .../testing/selftests/drivers/net/README.rst | 7 + .../testing/selftests/drivers/net/hw/Makefile | 2 + .../drivers/net/hw/lib/py/__init__.py | 7 +- .../selftests/drivers/net/hw/nk_forward.bpf.c | 49 +++ .../selftests/drivers/net/hw/nk_netns.py | 23 ++ .../selftests/drivers/net/hw/nk_qlease.py | 55 +++ .../selftests/drivers/net/lib/py/__init__.py | 7 +- .../selftests/drivers/net/lib/py/env.py | 157 ++++++++ 28 files changed, 1233 insertions(+), 117 deletions(-) create mode 100644 tools/testing/selftests/drivers/net/hw/nk_forward.bpf.c create mode 100755 tools/testing/selftests/drivers/net/hw/nk_netns.py create mode 100755 tools/testing/selftests/drivers/net/hw/nk_qlease.py -- 2.43.0