From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 7A31320B80D for ; Tue, 4 Feb 2025 12:15:45 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=170.10.133.124 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1738671348; cv=none; b=FXIwOlazEnNInJ6FESt0IiWPcQDuq/AoA7qsb0s3gRrRYPHTd0zuH6c35Ajke9xVEWM4cVNMp11bSLwcANtBcmPmuWRbrHo2Pxs04upxPsyYeUn9S8TvS4yaO8U+hvKCDsBI3pJcjXcWkj67rFzRRlchqEOAv8IRTxUApYNqOhI= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1738671348; c=relaxed/simple; bh=XhIT+5be0aQXVhwv9QulCCNPuCzXKuKQuv2PR3ezl7U=; h=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From: In-Reply-To:Content-Type; b=ibc0cx7nXLJIs50l6xR5NvC6fDi71GrXcCNWPPUbEJ1QPgfftDNNYLeAbUH1/nZ/pXZIxyFSZCu5dhkCRWJWjio2Qn5G71y93gKgqrrBLGTwcI+ZHXM8gZSc69qNmqMZCpH0rL2NFPEyS9nGiUtu9cTWxOJDUkyIRWLX4yFTXXA= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com; spf=pass smtp.mailfrom=redhat.com; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b=QE75jh3Q; arc=none smtp.client-ip=170.10.133.124 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="QE75jh3Q" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1738671344; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=VUvkUC7Qb2mF5GiMgDLACey09zZYlr7i7/mTZlGsGks=; b=QE75jh3Q5eWgElEPWQ6oTG9lZOCOdbZg0Yv1JpVTYegsfL/ZxLlEAuXlJUYIYgZE4ezBdb RwBLFfb/ATLvoKRiziHDjgT/Qo6cKQTvn0KgZsyBxg9Gfb0Psm8f38IUj/Iw0eaAr//i6k JesCX4haJGJl5KNpqh7P9H2HhVi5oYs= Received: from mail-wm1-f72.google.com (mail-wm1-f72.google.com [209.85.128.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-60-t4zUFmrWP4mJvjH2eAZXBg-1; Tue, 04 Feb 2025 07:15:43 -0500 X-MC-Unique: t4zUFmrWP4mJvjH2eAZXBg-1 X-Mimecast-MFC-AGG-ID: t4zUFmrWP4mJvjH2eAZXBg Received: by mail-wm1-f72.google.com with SMTP id 5b1f17b1804b1-436248d1240so27593135e9.0 for ; Tue, 04 Feb 2025 04:15:43 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1738671342; x=1739276142; h=content-transfer-encoding:in-reply-to:from:content-language :references:cc:to:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=VUvkUC7Qb2mF5GiMgDLACey09zZYlr7i7/mTZlGsGks=; b=XIaUZhBvP8tYm7zS6DGNaI1VIMdCL5Eet5Om/Khnk+HTU5RJsdkT3ph5ehcH/7H8If sK3Orhp0Ixa82z/5Ogwbnp6Yw5RPkLfWPZZT/owgNbgfb8MLH7m19/GL2MeRghUriqke uo8SMlrlM0hc/IkUaXWzh/4om0EjIeEhS1nPuiDi3wn7LpOKrmAWdIw2QN8XDidASpN/ wDOQJOfBlZY6mLBL8qEhWV2ikH/FrocU/Hm0n9sLvx7+1i0RoTBdiM5xpDdTL/mSb7w8 DS4WnwZboyZla3xcUntIENM1GMNULwQcrfNTYVn+bYZPJ3se/dkSSw3LphDJfZZ02tA4 dm7A== X-Forwarded-Encrypted: i=1; AJvYcCWRvu0G9L+fHWVnjprGNjnta36YS1A15CV9jmwoGgCA7plcIYsmwIGwO0E8W/9UypeuIf/j1CdK56u75/KxEg==@lists.linux.dev X-Gm-Message-State: AOJu0YyVPNN6nnBQEsfy5ZAkYGRZpuMwkCxBu47sNXcdjnbUvejo4vqi cFpTEe0bINmgrC6cGEA9ul+4WVDeXxDBDp9Kz0cTdbNI9Dly1TJ3D6GXAiqF0UGFiIzp9AMK97N royjt0VdAWkR5XMR5VtNf1fpvdmI7X86cEbGzcSju+xzEzX5ZEY00n7SQqgy22rJX X-Gm-Gg: ASbGncsbAwNYdvuHrmhxK4cbr90BnYSMS95caOUS3idNo2an4YMhdVOZe/V76KOpwo/ m+RITSWGOl4H38rglpQXRt7aR2HlpbN0wUfNPaqRRBVfNgO4aVIIpmpIdTa2HwTZKv7n/FXDAPe AqnHtgUD7eSN/J5Leh0VN9U1RP3fw6vj1z2ELe8GzWqwFUOC99HnehCvemNS0hOKTGIV4CiN8/e LlLQ/1T7RfJ8fptwIvTSbFW8tvG5ltgVEKIwmqfGu/fE0QBamOA0yKNamuuXiErqNIo6OkBcDoe Ozt9wLpNc+QZ2E2D5WoxacV4lqvWadZPIGM= X-Received: by 2002:a05:600c:4f55:b0:436:51bb:7a43 with SMTP id 5b1f17b1804b1-438dc3ab675mr242755135e9.5.1738671342060; Tue, 04 Feb 2025 04:15:42 -0800 (PST) X-Google-Smtp-Source: AGHT+IH4tQ5q9E6Yxu+JN4mWimlvj7yjOo3f8Z7rh6yaBUL8ZjGCY5yo/S+gH10TnPYvFIU94EeRnw== X-Received: by 2002:a05:600c:4f55:b0:436:51bb:7a43 with SMTP id 5b1f17b1804b1-438dc3ab675mr242754885e9.5.1738671341707; Tue, 04 Feb 2025 04:15:41 -0800 (PST) Received: from [192.168.88.253] (146-241-41-201.dyn.eolo.it. [146.241.41.201]) by smtp.gmail.com with ESMTPSA id 5b1f17b1804b1-438e23d48b3sm197508285e9.5.2025.02.04.04.15.39 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 04 Feb 2025 04:15:41 -0800 (PST) Message-ID: <09a0caba-db29-4100-a46d-b104b282ea0a@redhat.com> Date: Tue, 4 Feb 2025 13:15:38 +0100 Precedence: bulk X-Mailing-List: virtualization@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH net-next v3 5/6] net: devmem: Implement TX path To: Mina Almasry , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, kvm@vger.kernel.org, virtualization@lists.linux.dev, linux-kselftest@vger.kernel.org Cc: Donald Hunter , Jakub Kicinski , "David S. Miller" , Eric Dumazet , Simon Horman , Jonathan Corbet , Andrew Lunn , Neal Cardwell , David Ahern , "Michael S. Tsirkin" , Jason Wang , Xuan Zhuo , =?UTF-8?Q?Eugenio_P=C3=A9rez?= , Stefan Hajnoczi , Stefano Garzarella , Shuah Khan , sdf@fomichev.me, asml.silence@gmail.com, dw@davidwei.uk, Jamal Hadi Salim , Victor Nogueira , Pedro Tammela , Samiullah Khawaja , Kaiyuan Zhang References: <20250203223916.1064540-1-almasrymina@google.com> <20250203223916.1064540-6-almasrymina@google.com> From: Paolo Abeni In-Reply-To: <20250203223916.1064540-6-almasrymina@google.com> X-Mimecast-Spam-Score: 0 X-Mimecast-MFC-PROC-ID: gNqdaYGu-iJ4p1SIHuswMOsT7HGPX60E9thHmkV7hWQ_1738671342 X-Mimecast-Originator: redhat.com Content-Language: en-US Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit On 2/3/25 11:39 PM, Mina Almasry wrote: > Augment dmabuf binding to be able to handle TX. Additional to all the RX > binding, we also create tx_vec needed for the TX path. > > Provide API for sendmsg to be able to send dmabufs bound to this device: > > - Provide a new dmabuf_tx_cmsg which includes the dmabuf to send from. > - MSG_ZEROCOPY with SCM_DEVMEM_DMABUF cmsg indicates send from dma-buf. > > Devmem is uncopyable, so piggyback off the existing MSG_ZEROCOPY > implementation, while disabling instances where MSG_ZEROCOPY falls back > to copying. > > We additionally pipe the binding down to the new > zerocopy_fill_skb_from_devmem which fills a TX skb with net_iov netmems > instead of the traditional page netmems. > > We also special case skb_frag_dma_map to return the dma-address of these > dmabuf net_iovs instead of attempting to map pages. > > Based on work by Stanislav Fomichev . A lot of the meat > of the implementation came from devmem TCP RFC v1[1], which included the > TX path, but Stan did all the rebasing on top of netmem/net_iov. > > Cc: Stanislav Fomichev > Signed-off-by: Kaiyuan Zhang > Signed-off-by: Mina Almasry Very minor nit: you unexpectedly leaved a lot of empty lines after the SoB. [...] @@ -240,13 +249,23 @@ net_devmem_bind_dmabuf(struct net_device *dev, unsigned int dmabuf_fd, > * binding can be much more flexible than that. We may be able to > * allocate MTU sized chunks here. Leave that for future work... > */ > - binding->chunk_pool = > - gen_pool_create(PAGE_SHIFT, dev_to_node(&dev->dev)); > + binding->chunk_pool = gen_pool_create(PAGE_SHIFT, > + dev_to_node(&dev->dev)); > if (!binding->chunk_pool) { > err = -ENOMEM; > goto err_unmap; > } > > + if (direction == DMA_TO_DEVICE) { > + binding->tx_vec = kvmalloc_array(dmabuf->size / PAGE_SIZE, > + sizeof(struct net_iov *), > + GFP_KERNEL); > + if (!binding->tx_vec) { > + err = -ENOMEM; > + goto err_free_chunks; It looks like the later error paths (in the for_each_sgtable_dma_sg() loop) could happen even for 'direction == DMA_TO_DEVICE', so I guess an additional error label is needed to clean tx_vec on such paths. /P