* Re: [PATCH net-next v3 3/8] virtio-net: xsk zero copy xmit setup [not found] <1617780476.5300975-1-xuanzhuo@linux.alibaba.com> @ 2021-04-07 9:00 ` Jason Wang 0 siblings, 0 replies; 4+ messages in thread From: Jason Wang @ 2021-04-07 9:00 UTC (permalink / raw) To: Xuan Zhuo Cc: Michael S. Tsirkin, David S. Miller, Jakub Kicinski, Björn Töpel, Magnus Karlsson, Jonathan Lemon, Alexei Starovoitov, Daniel Borkmann, Jesper Dangaard Brouer, John Fastabend, Andrii Nakryiko, Martin KaFai Lau, Song Liu, Yonghong Song, KP Singh, virtualization, bpf, Dust Li, netdev 在 2021/4/7 下午3:27, Xuan Zhuo 写道: > On Tue, 6 Apr 2021 12:27:14 +0800, Jason Wang <jasowang@redhat.com> wrote: >> 在 2021/3/31 下午3:11, Xuan Zhuo 写道: >>> xsk is a high-performance packet receiving and sending technology. >>> >>> This patch implements the binding and unbinding operations of xsk and >>> the virtio-net queue for xsk zero copy xmit. >>> >>> The xsk zero copy xmit depends on tx napi. So if tx napi is not opened, >>> an error will be reported. And the entire operation is under the >>> protection of rtnl_lock >>> >>> Signed-off-by: Xuan Zhuo <xuanzhuo@linux.alibaba.com> >>> Reviewed-by: Dust Li <dust.li@linux.alibaba.com> >>> --- >>> drivers/net/virtio_net.c | 66 ++++++++++++++++++++++++++++++++++++++++ >>> 1 file changed, 66 insertions(+) >>> >>> diff --git a/drivers/net/virtio_net.c b/drivers/net/virtio_net.c >>> index bb4ea9dbc16b..4e25408a2b37 100644 >>> --- a/drivers/net/virtio_net.c >>> +++ b/drivers/net/virtio_net.c >>> @@ -22,6 +22,7 @@ >>> #include <net/route.h> >>> #include <net/xdp.h> >>> #include <net/net_failover.h> >>> +#include <net/xdp_sock_drv.h> >>> >>> static int napi_weight = NAPI_POLL_WEIGHT; >>> module_param(napi_weight, int, 0444); >>> @@ -133,6 +134,11 @@ struct send_queue { >>> struct virtnet_sq_stats stats; >>> >>> struct napi_struct napi; >>> + >>> + struct { >>> + /* xsk pool */ >>> + struct xsk_buff_pool __rcu *pool; >>> + } xsk; >>> }; >>> >>> /* Internal representation of a receive virtqueue */ >>> @@ -2526,11 +2532,71 @@ static int virtnet_xdp_set(struct net_device *dev, struct bpf_prog *prog, >>> return err; >>> } >>> >>> +static int virtnet_xsk_pool_enable(struct net_device *dev, >>> + struct xsk_buff_pool *pool, >>> + u16 qid) >>> +{ >>> + struct virtnet_info *vi = netdev_priv(dev); >>> + struct send_queue *sq; >>> + int ret = -EBUSY; >> >> I'd rather move this under the check of xsk.pool. >> >> >>> + >>> + if (qid >= vi->curr_queue_pairs) >>> + return -EINVAL; >>> + >>> + sq = &vi->sq[qid]; >>> + >>> + /* xsk zerocopy depend on the tx napi */ >> >> Need more comments to explain why tx NAPI is required here. >> >> And what's more important, tx NAPI could be enabled/disable via ethtool, >> what if the NAPI is disabled after xsk is enabled? >> > If napi_tx is turned off, then the xmit will be affected. Please document what kind of effect that prevents xsk from working. > Maybe I > should restrict that tx NAPI be disable via ethtool after xsk is enabled. It can work. > >>> + if (!sq->napi.weight) >>> + return -EPERM; >>> + >>> + rcu_read_lock(); >>> + if (rcu_dereference(sq->xsk.pool)) >>> + goto end; >> >> Under what condition can we reach here? > When the user tries to bind repeatedly. Ok, I am a little suprised that it was not checked by xsk_bind(). > >> >>> + >>> + /* Here is already protected by rtnl_lock, so rcu_assign_pointer is >>> + * safe. >>> + */ >>> + rcu_assign_pointer(sq->xsk.pool, pool); >>> + ret = 0; >>> +end: >>> + rcu_read_unlock(); >>> + >>> + return ret; >>> +} >>> + >>> +static int virtnet_xsk_pool_disable(struct net_device *dev, u16 qid) >>> +{ >>> + struct virtnet_info *vi = netdev_priv(dev); >>> + struct send_queue *sq; >>> + >>> + if (qid >= vi->curr_queue_pairs) >>> + return -EINVAL; >>> + >>> + sq = &vi->sq[qid]; >>> + >>> + /* Here is already protected by rtnl_lock, so rcu_assign_pointer is >>> + * safe. >>> + */ >>> + rcu_assign_pointer(sq->xsk.pool, NULL); >>> + >>> + synchronize_rcu(); /* Sync with the XSK wakeup and with NAPI. */ >> >> Since rtnl is held here, I guess it's better to use synchornize_net(). >> >> >>> + >>> + return 0; >>> +} >>> + >>> static int virtnet_xdp(struct net_device *dev, struct netdev_bpf *xdp) >>> { >>> switch (xdp->command) { >>> case XDP_SETUP_PROG: >>> return virtnet_xdp_set(dev, xdp->prog, xdp->extack); >>> + case XDP_SETUP_XSK_POOL: >>> + /* virtio net not use dma before call vring api */ >>> + xdp->xsk.check_dma = false; >> >> I think it's better not open code things like this. How about introduce >> new parameters in xp_assign_dev()? > xp_assign_dev is called by the user, we should let xsk perceive that the current > dev does not directly use dma. Is it possible to use dev->priv_flags? I only > know that this is the case with virtio-net!! Ok, then it should be fine, but we need a better name other than "check_dma". Maybe "use_dma_addr" instead. Thanks > > Thanks very much. > >> >>> + if (xdp->xsk.pool) >>> + return virtnet_xsk_pool_enable(dev, xdp->xsk.pool, >>> + xdp->xsk.queue_id); >>> + else >>> + return virtnet_xsk_pool_disable(dev, xdp->xsk.queue_id); >>> default: >>> return -EINVAL; >>> } >> >> Thanks >> ^ permalink raw reply [flat|nested] 4+ messages in thread
* [PATCH net-next v3 0/8] virtio-net support xdp socket zero copy xmit @ 2021-03-31 7:11 Xuan Zhuo 2021-03-31 7:11 ` [PATCH net-next v3 3/8] virtio-net: xsk zero copy xmit setup Xuan Zhuo 0 siblings, 1 reply; 4+ messages in thread From: Xuan Zhuo @ 2021-03-31 7:11 UTC (permalink / raw) To: netdev Cc: Michael S. Tsirkin, Jason Wang, David S. Miller, Jakub Kicinski, Björn Töpel, Magnus Karlsson, Jonathan Lemon, Alexei Starovoitov, Daniel Borkmann, Jesper Dangaard Brouer, John Fastabend, Andrii Nakryiko, Martin KaFai Lau, Song Liu, Yonghong Song, KP Singh, virtualization, bpf XDP socket is an excellent by pass kernel network transmission framework. The zero copy feature of xsk (XDP socket) needs to be supported by the driver. The performance of zero copy is very good. mlx5 and intel ixgbe already support this feature, This patch set allows virtio-net to support xsk's zerocopy xmit feature. And xsk's zerocopy rx has made major changes to virtio-net, and I hope to submit it after this patch set are received. Compared with other drivers, virtio-net does not directly obtain the dma address, so I first obtain the xsk page, and then pass the page to virtio. When recycling the sent packets, we have to distinguish between skb and xdp. Now we have to distinguish between skb, xdp, xsk. #0 #1 made some adjustments to xsk. ---------------- Performance Testing ------------ The udp package tool implemented by the interface of xsk vs sockperf(kernel udp) for performance testing: xsk zero copy xmit in virtio-net: CPU PPS MSGSIZE vhost-cpu 7.9% 511804 64 100% 13.3%% 484373 1500 100% sockperf: CPU PPS MSGSIZE vhost-cpu 100% 375227 64 89.1% 100% 307322 1500 81.5% Xuan Zhuo (8): xsk: XDP_SETUP_XSK_POOL support option check_dma xsk: support get page by addr virtio-net: xsk zero copy xmit setup virtio-net: xsk zero copy xmit implement wakeup and xmit virtio-net: xsk zero copy xmit support xsk unaligned mode virtio-net: xsk zero copy xmit kick by threshold virtio-net: poll tx call xsk zerocopy xmit virtio-net: free old xmit handle xsk drivers/net/virtio_net.c | 449 +++++++++++++++++++++++++++++++++---- include/linux/netdevice.h | 1 + include/net/xdp_sock_drv.h | 11 + net/xdp/xsk_buff_pool.c | 3 +- 4 files changed, 415 insertions(+), 49 deletions(-) -- 2.31.0 ^ permalink raw reply [flat|nested] 4+ messages in thread
* [PATCH net-next v3 3/8] virtio-net: xsk zero copy xmit setup 2021-03-31 7:11 [PATCH net-next v3 0/8] virtio-net support xdp socket zero copy xmit Xuan Zhuo @ 2021-03-31 7:11 ` Xuan Zhuo 2021-04-06 4:27 ` Jason Wang 0 siblings, 1 reply; 4+ messages in thread From: Xuan Zhuo @ 2021-03-31 7:11 UTC (permalink / raw) To: netdev Cc: Michael S. Tsirkin, Jason Wang, David S. Miller, Jakub Kicinski, Björn Töpel, Magnus Karlsson, Jonathan Lemon, Alexei Starovoitov, Daniel Borkmann, Jesper Dangaard Brouer, John Fastabend, Andrii Nakryiko, Martin KaFai Lau, Song Liu, Yonghong Song, KP Singh, virtualization, bpf, Dust Li xsk is a high-performance packet receiving and sending technology. This patch implements the binding and unbinding operations of xsk and the virtio-net queue for xsk zero copy xmit. The xsk zero copy xmit depends on tx napi. So if tx napi is not opened, an error will be reported. And the entire operation is under the protection of rtnl_lock Signed-off-by: Xuan Zhuo <xuanzhuo@linux.alibaba.com> Reviewed-by: Dust Li <dust.li@linux.alibaba.com> --- drivers/net/virtio_net.c | 66 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 66 insertions(+) diff --git a/drivers/net/virtio_net.c b/drivers/net/virtio_net.c index bb4ea9dbc16b..4e25408a2b37 100644 --- a/drivers/net/virtio_net.c +++ b/drivers/net/virtio_net.c @@ -22,6 +22,7 @@ #include <net/route.h> #include <net/xdp.h> #include <net/net_failover.h> +#include <net/xdp_sock_drv.h> static int napi_weight = NAPI_POLL_WEIGHT; module_param(napi_weight, int, 0444); @@ -133,6 +134,11 @@ struct send_queue { struct virtnet_sq_stats stats; struct napi_struct napi; + + struct { + /* xsk pool */ + struct xsk_buff_pool __rcu *pool; + } xsk; }; /* Internal representation of a receive virtqueue */ @@ -2526,11 +2532,71 @@ static int virtnet_xdp_set(struct net_device *dev, struct bpf_prog *prog, return err; } +static int virtnet_xsk_pool_enable(struct net_device *dev, + struct xsk_buff_pool *pool, + u16 qid) +{ + struct virtnet_info *vi = netdev_priv(dev); + struct send_queue *sq; + int ret = -EBUSY; + + if (qid >= vi->curr_queue_pairs) + return -EINVAL; + + sq = &vi->sq[qid]; + + /* xsk zerocopy depend on the tx napi */ + if (!sq->napi.weight) + return -EPERM; + + rcu_read_lock(); + if (rcu_dereference(sq->xsk.pool)) + goto end; + + /* Here is already protected by rtnl_lock, so rcu_assign_pointer is + * safe. + */ + rcu_assign_pointer(sq->xsk.pool, pool); + ret = 0; +end: + rcu_read_unlock(); + + return ret; +} + +static int virtnet_xsk_pool_disable(struct net_device *dev, u16 qid) +{ + struct virtnet_info *vi = netdev_priv(dev); + struct send_queue *sq; + + if (qid >= vi->curr_queue_pairs) + return -EINVAL; + + sq = &vi->sq[qid]; + + /* Here is already protected by rtnl_lock, so rcu_assign_pointer is + * safe. + */ + rcu_assign_pointer(sq->xsk.pool, NULL); + + synchronize_rcu(); /* Sync with the XSK wakeup and with NAPI. */ + + return 0; +} + static int virtnet_xdp(struct net_device *dev, struct netdev_bpf *xdp) { switch (xdp->command) { case XDP_SETUP_PROG: return virtnet_xdp_set(dev, xdp->prog, xdp->extack); + case XDP_SETUP_XSK_POOL: + /* virtio net not use dma before call vring api */ + xdp->xsk.check_dma = false; + if (xdp->xsk.pool) + return virtnet_xsk_pool_enable(dev, xdp->xsk.pool, + xdp->xsk.queue_id); + else + return virtnet_xsk_pool_disable(dev, xdp->xsk.queue_id); default: return -EINVAL; } -- 2.31.0 ^ permalink raw reply related [flat|nested] 4+ messages in thread
* Re: [PATCH net-next v3 3/8] virtio-net: xsk zero copy xmit setup 2021-03-31 7:11 ` [PATCH net-next v3 3/8] virtio-net: xsk zero copy xmit setup Xuan Zhuo @ 2021-04-06 4:27 ` Jason Wang 2021-04-07 10:02 ` Magnus Karlsson 0 siblings, 1 reply; 4+ messages in thread From: Jason Wang @ 2021-04-06 4:27 UTC (permalink / raw) To: Xuan Zhuo, netdev Cc: Michael S. Tsirkin, David S. Miller, Jakub Kicinski, Björn Töpel, Magnus Karlsson, Jonathan Lemon, Alexei Starovoitov, Daniel Borkmann, Jesper Dangaard Brouer, John Fastabend, Andrii Nakryiko, Martin KaFai Lau, Song Liu, Yonghong Song, KP Singh, virtualization, bpf, Dust Li 在 2021/3/31 下午3:11, Xuan Zhuo 写道: > xsk is a high-performance packet receiving and sending technology. > > This patch implements the binding and unbinding operations of xsk and > the virtio-net queue for xsk zero copy xmit. > > The xsk zero copy xmit depends on tx napi. So if tx napi is not opened, > an error will be reported. And the entire operation is under the > protection of rtnl_lock > > Signed-off-by: Xuan Zhuo <xuanzhuo@linux.alibaba.com> > Reviewed-by: Dust Li <dust.li@linux.alibaba.com> > --- > drivers/net/virtio_net.c | 66 ++++++++++++++++++++++++++++++++++++++++ > 1 file changed, 66 insertions(+) > > diff --git a/drivers/net/virtio_net.c b/drivers/net/virtio_net.c > index bb4ea9dbc16b..4e25408a2b37 100644 > --- a/drivers/net/virtio_net.c > +++ b/drivers/net/virtio_net.c > @@ -22,6 +22,7 @@ > #include <net/route.h> > #include <net/xdp.h> > #include <net/net_failover.h> > +#include <net/xdp_sock_drv.h> > > static int napi_weight = NAPI_POLL_WEIGHT; > module_param(napi_weight, int, 0444); > @@ -133,6 +134,11 @@ struct send_queue { > struct virtnet_sq_stats stats; > > struct napi_struct napi; > + > + struct { > + /* xsk pool */ > + struct xsk_buff_pool __rcu *pool; > + } xsk; > }; > > /* Internal representation of a receive virtqueue */ > @@ -2526,11 +2532,71 @@ static int virtnet_xdp_set(struct net_device *dev, struct bpf_prog *prog, > return err; > } > > +static int virtnet_xsk_pool_enable(struct net_device *dev, > + struct xsk_buff_pool *pool, > + u16 qid) > +{ > + struct virtnet_info *vi = netdev_priv(dev); > + struct send_queue *sq; > + int ret = -EBUSY; I'd rather move this under the check of xsk.pool. > + > + if (qid >= vi->curr_queue_pairs) > + return -EINVAL; > + > + sq = &vi->sq[qid]; > + > + /* xsk zerocopy depend on the tx napi */ Need more comments to explain why tx NAPI is required here. And what's more important, tx NAPI could be enabled/disable via ethtool, what if the NAPI is disabled after xsk is enabled? > + if (!sq->napi.weight) > + return -EPERM; > + > + rcu_read_lock(); > + if (rcu_dereference(sq->xsk.pool)) > + goto end; Under what condition can we reach here? > + > + /* Here is already protected by rtnl_lock, so rcu_assign_pointer is > + * safe. > + */ > + rcu_assign_pointer(sq->xsk.pool, pool); > + ret = 0; > +end: > + rcu_read_unlock(); > + > + return ret; > +} > + > +static int virtnet_xsk_pool_disable(struct net_device *dev, u16 qid) > +{ > + struct virtnet_info *vi = netdev_priv(dev); > + struct send_queue *sq; > + > + if (qid >= vi->curr_queue_pairs) > + return -EINVAL; > + > + sq = &vi->sq[qid]; > + > + /* Here is already protected by rtnl_lock, so rcu_assign_pointer is > + * safe. > + */ > + rcu_assign_pointer(sq->xsk.pool, NULL); > + > + synchronize_rcu(); /* Sync with the XSK wakeup and with NAPI. */ Since rtnl is held here, I guess it's better to use synchornize_net(). > + > + return 0; > +} > + > static int virtnet_xdp(struct net_device *dev, struct netdev_bpf *xdp) > { > switch (xdp->command) { > case XDP_SETUP_PROG: > return virtnet_xdp_set(dev, xdp->prog, xdp->extack); > + case XDP_SETUP_XSK_POOL: > + /* virtio net not use dma before call vring api */ > + xdp->xsk.check_dma = false; I think it's better not open code things like this. How about introduce new parameters in xp_assign_dev()? > + if (xdp->xsk.pool) > + return virtnet_xsk_pool_enable(dev, xdp->xsk.pool, > + xdp->xsk.queue_id); > + else > + return virtnet_xsk_pool_disable(dev, xdp->xsk.queue_id); > default: > return -EINVAL; > } Thanks ^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [PATCH net-next v3 3/8] virtio-net: xsk zero copy xmit setup 2021-04-06 4:27 ` Jason Wang @ 2021-04-07 10:02 ` Magnus Karlsson 0 siblings, 0 replies; 4+ messages in thread From: Magnus Karlsson @ 2021-04-07 10:02 UTC (permalink / raw) To: Jason Wang Cc: Xuan Zhuo, Network Development, Michael S. Tsirkin, David S. Miller, Jakub Kicinski, Björn Töpel, Magnus Karlsson, Jonathan Lemon, Alexei Starovoitov, Daniel Borkmann, Jesper Dangaard Brouer, John Fastabend, Andrii Nakryiko, Martin KaFai Lau, Song Liu, Yonghong Song, KP Singh, virtualization, bpf, Dust Li On Tue, Apr 6, 2021 at 3:13 PM Jason Wang <jasowang@redhat.com> wrote: > > > 在 2021/3/31 下午3:11, Xuan Zhuo 写道: > > xsk is a high-performance packet receiving and sending technology. > > > > This patch implements the binding and unbinding operations of xsk and > > the virtio-net queue for xsk zero copy xmit. > > > > The xsk zero copy xmit depends on tx napi. So if tx napi is not opened, > > an error will be reported. And the entire operation is under the > > protection of rtnl_lock > > > > Signed-off-by: Xuan Zhuo <xuanzhuo@linux.alibaba.com> > > Reviewed-by: Dust Li <dust.li@linux.alibaba.com> > > --- > > drivers/net/virtio_net.c | 66 ++++++++++++++++++++++++++++++++++++++++ > > 1 file changed, 66 insertions(+) > > > > diff --git a/drivers/net/virtio_net.c b/drivers/net/virtio_net.c > > index bb4ea9dbc16b..4e25408a2b37 100644 > > --- a/drivers/net/virtio_net.c > > +++ b/drivers/net/virtio_net.c > > @@ -22,6 +22,7 @@ > > #include <net/route.h> > > #include <net/xdp.h> > > #include <net/net_failover.h> > > +#include <net/xdp_sock_drv.h> > > > > static int napi_weight = NAPI_POLL_WEIGHT; > > module_param(napi_weight, int, 0444); > > @@ -133,6 +134,11 @@ struct send_queue { > > struct virtnet_sq_stats stats; > > > > struct napi_struct napi; > > + > > + struct { > > + /* xsk pool */ > > + struct xsk_buff_pool __rcu *pool; > > + } xsk; > > }; > > > > /* Internal representation of a receive virtqueue */ > > @@ -2526,11 +2532,71 @@ static int virtnet_xdp_set(struct net_device *dev, struct bpf_prog *prog, > > return err; > > } > > > > +static int virtnet_xsk_pool_enable(struct net_device *dev, > > + struct xsk_buff_pool *pool, > > + u16 qid) > > +{ > > + struct virtnet_info *vi = netdev_priv(dev); > > + struct send_queue *sq; > > + int ret = -EBUSY; > > > I'd rather move this under the check of xsk.pool. > > > > + > > + if (qid >= vi->curr_queue_pairs) > > + return -EINVAL; > > + > > + sq = &vi->sq[qid]; > > + > > + /* xsk zerocopy depend on the tx napi */ > > > Need more comments to explain why tx NAPI is required here. > > And what's more important, tx NAPI could be enabled/disable via ethtool, > what if the NAPI is disabled after xsk is enabled? > > > > + if (!sq->napi.weight) > > + return -EPERM; > > + > > + rcu_read_lock(); > > + if (rcu_dereference(sq->xsk.pool)) > > + goto end; > > > Under what condition can we reach here? There is already code in the common xsk part that tests for binding multiple sockets to the same netdev and queue id (in an illegal way that is). Does this code not work for you? If so, we should fix that and not introduce a separate check down in the driver. Or maybe I misunderstand your problem. The code is here: struct xsk_buff_pool *xsk_get_pool_from_qid(struct net_device *dev, u16 queue_id) { if (queue_id < dev->real_num_rx_queues) return dev->_rx[queue_id].pool; if (queue_id < dev->real_num_tx_queues) return dev->_tx[queue_id].pool; return NULL; } int xp_assign_dev(struct xsk_buff_pool *pool, struct net_device *netdev, u16 queue_id, u16 flags) { : : if (xsk_get_pool_from_qid(netdev, queue_id)) return -EBUSY; > > > + > > + /* Here is already protected by rtnl_lock, so rcu_assign_pointer is > > + * safe. > > + */ > > + rcu_assign_pointer(sq->xsk.pool, pool); > > + ret = 0; > > +end: > > + rcu_read_unlock(); > > + > > + return ret; > > +} > > + > > +static int virtnet_xsk_pool_disable(struct net_device *dev, u16 qid) > > +{ > > + struct virtnet_info *vi = netdev_priv(dev); > > + struct send_queue *sq; > > + > > + if (qid >= vi->curr_queue_pairs) > > + return -EINVAL; > > + > > + sq = &vi->sq[qid]; > > + > > + /* Here is already protected by rtnl_lock, so rcu_assign_pointer is > > + * safe. > > + */ > > + rcu_assign_pointer(sq->xsk.pool, NULL); > > + > > + synchronize_rcu(); /* Sync with the XSK wakeup and with NAPI. */ > > > Since rtnl is held here, I guess it's better to use synchornize_net(). > > > > + > > + return 0; > > +} > > + > > static int virtnet_xdp(struct net_device *dev, struct netdev_bpf *xdp) > > { > > switch (xdp->command) { > > case XDP_SETUP_PROG: > > return virtnet_xdp_set(dev, xdp->prog, xdp->extack); > > + case XDP_SETUP_XSK_POOL: > > + /* virtio net not use dma before call vring api */ > > + xdp->xsk.check_dma = false; > > > I think it's better not open code things like this. How about introduce > new parameters in xp_assign_dev()? > > > > + if (xdp->xsk.pool) > > + return virtnet_xsk_pool_enable(dev, xdp->xsk.pool, > > + xdp->xsk.queue_id); > > + else > > + return virtnet_xsk_pool_disable(dev, xdp->xsk.queue_id); > > default: > > return -EINVAL; > > } > > > Thanks > ^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2021-04-07 10:03 UTC | newest] Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- [not found] <1617780476.5300975-1-xuanzhuo@linux.alibaba.com> 2021-04-07 9:00 ` [PATCH net-next v3 3/8] virtio-net: xsk zero copy xmit setup Jason Wang 2021-03-31 7:11 [PATCH net-next v3 0/8] virtio-net support xdp socket zero copy xmit Xuan Zhuo 2021-03-31 7:11 ` [PATCH net-next v3 3/8] virtio-net: xsk zero copy xmit setup Xuan Zhuo 2021-04-06 4:27 ` Jason Wang 2021-04-07 10:02 ` Magnus Karlsson
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).