Received: by 2002:a05:6602:18e:0:0:0:0 with SMTP id m14csp2432798ioo; Sat, 28 May 2022 13:30:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzEmiX902NzdiKbv5rMDXV7ILeMRMtRHzgvbwJkvnuLf+7sXtdx56g/zN+yxi6t0FLbxl65 X-Received: by 2002:a63:d34f:0:b0:3fa:8a90:f395 with SMTP id u15-20020a63d34f000000b003fa8a90f395mr23995405pgi.107.1653769826652; Sat, 28 May 2022 13:30:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1653769826; cv=none; d=google.com; s=arc-20160816; b=cAoG3mUPeV3xWzKogc3/Affh3RNrIcHpe2VVOAl/wZC+vX7IIVLN86v4e3XjYnzBh8 /Q5xTmRhNDPsF3zmxqgJ0teiPifnx6puFF0+qxqHQ+Zs93+4MsGr6Vwo/Hqve6Cv/Hp7 DT+FsfsTmohtcxHgUeemVbM2U0n8tUGbChdm478wfcUY8B4fXUSM6QrKkqw/imlR0Rxk fzauRdMojq9Y1BiyG2HE/nVllBuvuzA4EV9yb6aCidegHQNi7OQk/Iem88ioBoHTdl+m DPrqACyZL2GcyF/jR74nKq3dInB7tycXYuhjexxxHLvgailfzJkPBllfzYmJL1cXkRd1 2dIQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:message-id:date:subject:cc:to:from :dkim-signature; bh=0QdeZQpzPFKxooAPc4/wcd9vahVJt/ODCSvM5mr14K4=; b=moqDvqWUOL06dZdUJWU/U/CMS+39JcoQdC6XZ+tyftQwE41setA0/3FtB7txCLJQ8/ t3oV/Cj+z8+qsxa1XTWS2UBvbAyQID1lw/310z+HXv7vjLn8cJY8BC8r9LeIKxWKU0Re +gnt0ztl8IA4hxqTeS/1ufUjnx+01rQlI+XhMe+YIKrpX9bpPWaGVBsLw6ySOODBoJbq P9cIDzNGKndy0YjaoDPEECkkQTD3H1NY8561ziIclwCd8ruECSgWPZTNkyPgzIQ2lpz3 aTuHwqPeopDwznjjgsgvVSQGnjaQmvZtHjIFxEsbUNc/8gIYTcEqcLQv29iWSfTLkGNz xkqw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@vmware.com header.s=s1024 header.b=nJ+jrEWu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=vmware.com Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [2620:137:e000::1:18]) by mx.google.com with ESMTPS id o4-20020a170902d4c400b0016178ad9a19si11983500plg.75.2022.05.28.13.30.26 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 28 May 2022 13:30:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) client-ip=2620:137:e000::1:18; Authentication-Results: mx.google.com; dkim=pass header.i=@vmware.com header.s=s1024 header.b=nJ+jrEWu; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=vmware.com Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 5458E1248DB; Sat, 28 May 2022 12:40:00 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1355468AbiE1Bdb (ORCPT + 99 others); Fri, 27 May 2022 21:33:31 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:33592 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233464AbiE1BdY (ORCPT ); Fri, 27 May 2022 21:33:24 -0400 X-Greylist: delayed 902 seconds by postgrey-1.37 at lindbergh.monkeyblade.net; Fri, 27 May 2022 18:33:22 PDT Received: from EX-PRD-EDGE02.vmware.com (EX-PRD-EDGE02.vmware.com [208.91.3.34]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 006B3132A00; Fri, 27 May 2022 18:33:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; s=s1024; d=vmware.com; h=from:to:cc:subject:date:message-id:mime-version:content-type; bh=0QdeZQpzPFKxooAPc4/wcd9vahVJt/ODCSvM5mr14K4=; b=nJ+jrEWuMu5pX+ni7svuEwXM+GJLnKF/F4i5WQ9SCQAr/pQOJuAWvgk2bytj7O 8Ms/qWeiERmN5W99FxPGhWMWhbdTSQlX4UgNz7dqxE1NY+wVrv08ob4pV7Nsow dZtidINfIUam+kpSn5G+Yt4a9jgt16TtQ66NfTJvA4JXdGk= Received: from sc9-mailhost3.vmware.com (10.113.161.73) by EX-PRD-EDGE02.vmware.com (10.188.245.7) with Microsoft SMTP Server id 15.1.2308.14; Fri, 27 May 2022 18:18:09 -0700 Received: from htb-1n-eng-dhcp122.eng.vmware.com (unknown [10.20.114.216]) by sc9-mailhost3.vmware.com (Postfix) with ESMTP id 10AB32027C; Fri, 27 May 2022 18:18:13 -0700 (PDT) Received: by htb-1n-eng-dhcp122.eng.vmware.com (Postfix, from userid 0) id 00197AA2B9; Fri, 27 May 2022 18:18:12 -0700 (PDT) From: Ronak Doshi To: CC: Ronak Doshi , VMware PV-Drivers Reviewers , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , open list Subject: [PATCH net-next 0/8] vmxnet3: upgrade to version 7 Date: Fri, 27 May 2022 18:17:50 -0700 Message-ID: <20220528011758.7024-1-doshir@vmware.com> X-Mailer: git-send-email 2.11.0 MIME-Version: 1.0 Content-Type: text/plain Received-SPF: None (EX-PRD-EDGE02.vmware.com: doshir@vmware.com does not designate permitted sender hosts) X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org vmxnet3 emulation has recently added several new features including support for uniform passthrough(UPT). To make UPT work vmxnet3 has to be enhanced as per the new specification. This patch series extends the vmxnet3 driver to leverage these new features. Compatibility is maintained using existing vmxnet3 versioning mechanism as follows: - new features added to vmxnet3 emulation are associated with new vmxnet3 version viz. vmxnet3 version 7. - emulation advertises all the versions it supports to the driver. - during initialization, vmxnet3 driver picks the highest version number supported by both the emulation and the driver and configures emulation to run at that version. In particular, following changes are introduced: Patch 1: This patch introduces utility macros for vmxnet3 version 7 comparison and updates Copyright information. Patch 2: This patch adds new capability registers to fine control enablement of individual features based on emulation and passthrough. Patch 3: This patch adds support for large passthrough BAR register. Patch 4: This patch adds support for out of order rx completion processing. Patch 5: This patch introduces new command to set ring buffer sizes to pass this information to the hardware. Patch 6: For better performance, hardware has a requirement to limit number of TSO descriptors. This patch adds that support. Patch 7: With vmxnet3 version 7, new descriptor fields are used to indicate encapsulation offload. Patch 8: With all vmxnet3 version 7 changes incorporated in the vmxnet3 driver, with this patch, the driver can configure emulation to run at vmxnet3 version 7. Ronak Doshi (8): vmxnet3: prepare for version 7 changes vmxnet3: add support for capability registers vmxnet3: add support for large passthrough BAR register vmxnet3: add support for out of order rx completion vmxnet3: add command to set ring buffer sizes vmxnet3: limit number of TXDs used for TSO packet vmxnet3: use ext1 field to indicate encapsulated packet vmxnet3: update to version 7 drivers/net/vmxnet3/Makefile | 2 +- drivers/net/vmxnet3/upt1_defs.h | 2 +- drivers/net/vmxnet3/vmxnet3_defs.h | 80 ++++++++-- drivers/net/vmxnet3/vmxnet3_drv.c | 291 ++++++++++++++++++++++++++++++---- drivers/net/vmxnet3/vmxnet3_ethtool.c | 116 ++++++++++++-- drivers/net/vmxnet3/vmxnet3_int.h | 24 ++- 6 files changed, 457 insertions(+), 58 deletions(-) -- 2.11.0