From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id B7933C7618E for ; Thu, 16 Mar 2023 14:27:53 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231208AbjCPO1v (ORCPT ); Thu, 16 Mar 2023 10:27:51 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59430 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230446AbjCPO1u (ORCPT ); Thu, 16 Mar 2023 10:27:50 -0400 Received: from smtp-fw-80007.amazon.com (smtp-fw-80007.amazon.com [99.78.197.218]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 45986BE5CA for ; Thu, 16 Mar 2023 07:27:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amazon.com; i=@amazon.com; q=dns/txt; s=amazon201209; t=1678976869; x=1710512869; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=Uz8xY4s8GgretQ0mpNIZ/d4fcKhyNiOsBecYYTaPk0U=; b=sgnY3RsOKhu5oQSvy9JLDJo0ZAfqpqX5rZQ5QXrggfzqBrZoKNC2xpvz 4XrFJFRJqTuissrv1SrNyerchS7+jIYHSZ03+onue9xqLT9w/DM2hVK6a Hp9Q5ParT6Me4IHHOsR8sejgxC1ZUhuNR2CEVhu6HL/PXEuDbI41QYbY8 4=; X-IronPort-AV: E=Sophos;i="5.98,265,1673913600"; d="scan'208";a="194090735" Received: from pdx4-co-svc-p1-lb2-vlan3.amazon.com (HELO email-inbound-relay-iad-1e-m6i4x-3e1fab07.us-east-1.amazon.com) ([10.25.36.214]) by smtp-border-fw-80007.pdx80.corp.amazon.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Mar 2023 14:27:41 +0000 Received: from EX19D017EUA001.ant.amazon.com (iad12-ws-svc-p26-lb9-vlan3.iad.amazon.com [10.40.163.38]) by email-inbound-relay-iad-1e-m6i4x-3e1fab07.us-east-1.amazon.com (Postfix) with ESMTPS id 3D36180BEB; Thu, 16 Mar 2023 14:27:38 +0000 (UTC) Received: from EX19D028EUB003.ant.amazon.com (10.252.61.31) by EX19D017EUA001.ant.amazon.com (10.252.50.71) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.24; Thu, 16 Mar 2023 14:27:37 +0000 Received: from u570694869fb251.ant.amazon.com (10.85.143.176) by EX19D028EUB003.ant.amazon.com (10.252.61.31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.24; Thu, 16 Mar 2023 14:27:30 +0000 From: Shay Agroskin To: David Miller , Jakub Kicinski , CC: Shay Agroskin , "Woodhouse, David" , "Machulsky, Zorik" , "Matushevsky, Alexander" , Saeed Bshara , "Wilson, Matt" , "Liguori, Anthony" , "Bshara, Nafea" , "Belgazal, Netanel" , "Saidi, Ali" , "Herrenschmidt, Benjamin" , "Kiyanovski, Arthur" , "Dagan, Noam" , "Arinzon, David" , "Itzko, Shahar" , "Abboud, Osama" Subject: [PATCH v5 net-next 0/6] Add tx push buf len param to ethtool Date: Thu, 16 Mar 2023 16:27:00 +0200 Message-ID: <20230316142706.4046263-1-shayagr@amazon.com> X-Mailer: git-send-email 2.30.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Originating-IP: [10.85.143.176] X-ClientProxiedBy: EX19D042UWA003.ant.amazon.com (10.13.139.44) To EX19D028EUB003.ant.amazon.com (10.252.61.31) Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org Changed since v4: - Added advertisement for tx-push-mode in ENA driver - Modified the documentation to make the distinction from tx-copybreak clearer Changes since v3: - Removed RFC tag and added a Jakub's signoff on one of the first patch Changes since v2: - Added a check that the driver advertises support for TX push buffer instead of defaulting the response to 0. - Moved cosmetic changes to their own commits - Removed usage of gotos which goes against Linux coding style - Make ENA driver reject an attempt to configure TX push buffer when it's not supported (no LLQ is used) Changes since v1: - Added the new ethtool param to generic netlink specs - Dropped dynamic advertisement of tx push buff support in ENA. The driver will advertise it for all platforms This patchset adds a new sub-configuration to ethtool get/set queue params (ethtool -g) called 'tx-push-buf-len'. This configuration specifies the maximum number of bytes of a transmitted packet a driver can push directly to the underlying device ('push' mode). The motivation for pushing some of the bytes to the device has the advantages of - Allowing a smart device to take fast actions based on the packet's header - Reducing latency for small packets that can be copied completely into the device This new param is practically similar to tx-copybreak value that can be set using ethtool's tunable but conceptually serves a different purpose. While tx-copybreak is used to reduce the overhead of DMA mapping and makes no sense to use if less than the whole segment gets copied, tx-push-buf-len allows to improve performance by analyzing the packet's data (usually headers) before performing the DMA operation. The configuration can be queried and set using the commands: $ ethtool -g [interface] # ethtool -G [interface] tx-push-buf-len [number of bytes] This patchset also adds support for the new configuration in ENA driver for which this parameter ensures efficient resources management on the device side. David Arinzon (1): net: ena: Add an option to configure large LLQ headers Shay Agroskin (5): ethtool: Add support for configuring tx_push_buf_len net: ena: Make few cosmetic preparations to support large LLQ net: ena: Recalculate TX state variables every device reset net: ena: Add support to changing tx_push_buf_len net: ena: Advertise TX push support Documentation/netlink/specs/ethtool.yaml | 8 + Documentation/networking/ethtool-netlink.rst | 47 ++-- drivers/net/ethernet/amazon/ena/ena_eth_com.h | 4 + drivers/net/ethernet/amazon/ena/ena_ethtool.c | 66 ++++- drivers/net/ethernet/amazon/ena/ena_netdev.c | 259 +++++++++++------- drivers/net/ethernet/amazon/ena/ena_netdev.h | 15 +- include/linux/ethtool.h | 14 +- include/uapi/linux/ethtool_netlink.h | 2 + net/ethtool/netlink.h | 2 +- net/ethtool/rings.c | 33 ++- 10 files changed, 326 insertions(+), 124 deletions(-) -- 2.25.1