Received: by 2002:a05:7412:3784:b0:e2:908c:2ebd with SMTP id jk4csp2860065rdb; Wed, 4 Oct 2023 13:53:41 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFu5Q5+HpXjOeNzGfzcUAIg+i5zzg31UxZeXEZUp0KnCA5+vBP5n9nue6LTPJrkaJGRhkKK X-Received: by 2002:a05:6a00:3118:b0:691:2d4:2389 with SMTP id bi24-20020a056a00311800b0069102d42389mr2664933pfb.21.1696452821046; Wed, 04 Oct 2023 13:53:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696452821; cv=none; d=google.com; s=arc-20160816; b=PNrnsFiw6kyQATj6DA+Fx3jedvBWuN5oi+w8SG6uDeNwfKSHmjzM6QCKJjKQuT0pLK 8R2bqqB+NG4eIUyRob98b7YiyTW6T4wa7UXXUPKSB8HFuuIjzs5JRTAqDXt6+GkX7tUg mi3iU2m+BVmQIgDEA4Fwj8+XorirXbf1yq0RI6Vdrvsj1tAxK61nTQTc7GC+v91QlQeY yj1i4rcpuVM7gNaVc40CPQ5BmtqycVxamWPRXzmC03XLn+I1kg+Wpy//ZJcRVIngljlR +GIPego9QpwESryDn/CvFDq+Vzy68b4dLQ/491KGoJqcpbnsBL25fgJkKEzQ0IdQXyC1 EnmA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=5M+QJrXuWFwf51lRMu2wd7EUAKd9NCfv46SxUDCQ1ow=; fh=3YisugCbaR5FbIa7/5vUPnY8ia5Gr010T4+eafhIfBo=; b=GcvM6GDB5bVaMWxDNoGqUTktez4ik27OfS/hD0BjDH7ngjs5iKBwsN/m2hg0De1Y6a qtEJcTd9rxEGMgJTxuZet+SEjdcwPf1BxWDI45WBHbg6gaLdBBhGIcflkgpX43Szo9+V 9kXHD+VMfdM3xhDY87ro677i/RcQQmYGUgFCbVnI6Vy41O8Z/VfTLv/6XDOkhLVW84HH 45IzkFu448Bk7B9wjqSUcuAMkqwfX3S8iplhXKVFce0q3dqjAaXhsxI59sXtwW6aUQta aPL4124weJXpPPsxy4etx6BMHN1bu+PtZd7xZYi0roPFeauh00r2C9n1MiUpkwCEdTjO wdqQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Hfk00tkN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from pete.vger.email (pete.vger.email. [23.128.96.36]) by mx.google.com with ESMTPS id cp26-20020a056a00349a00b00690c0051dcdsi4330674pfb.143.2023.10.04.13.53.40 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 04 Oct 2023 13:53:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) client-ip=23.128.96.36; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=Hfk00tkN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id 2A35581F37BA; Wed, 4 Oct 2023 13:53:38 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233577AbjJDUxX (ORCPT + 99 others); Wed, 4 Oct 2023 16:53:23 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38768 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233286AbjJDUxW (ORCPT ); Wed, 4 Oct 2023 16:53:22 -0400 Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 609289B for ; Wed, 4 Oct 2023 13:53:19 -0700 (PDT) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 409C1C433C8; Wed, 4 Oct 2023 20:53:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1696452798; bh=SoHIhhbfpAcP8a5d3STruOfrx3p2ZDfFO2aTb7XYjXI=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=Hfk00tkNAPp49k1bEyCIZIs4Dhg12Fl6W2IrA0xMGgC5GPoJ5hUVeFcWa8Ihz8f3Z 0k30Uq8Mw75v6yNrORxKW+lVq3Zsuenn/tZPnE+NYbkUG9JK4g/5EIGwcCXbigc9CI zO0NMjVU+tnst/3bLiZLSyxvOU+as6U53w4d4n4c05julqEWtO6eMyYbOhE/VacFH3 yqyEHohoHpsX09LEI0gjqLFfimmcnZcnsrCLoT8P5kNVre9fHpEE2z8BLJ1i+0oZKd e4KVT2cPqm8opVhmpE3ByVyedHOut4vZDuRycMEPp8+Y6Pw8bsoyVfu+/rVV3tO+eJ MSL2cE8ZZS8Ew== Date: Wed, 4 Oct 2023 13:53:17 -0700 From: Jakub Kicinski To: Radhey Shyam Pandey Cc: , , , , , , , , , , , , , Subject: Re: [PATCH net-next v7 3/3] net: axienet: Introduce dmaengine support Message-ID: <20231004135317.2b460acf@kernel.org> In-Reply-To: <1695843151-1919509-4-git-send-email-radhey.shyam.pandey@amd.com> References: <1695843151-1919509-1-git-send-email-radhey.shyam.pandey@amd.com> <1695843151-1919509-4-git-send-email-radhey.shyam.pandey@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=2.4 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, RCVD_IN_SBL_CSS,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Wed, 04 Oct 2023 13:53:38 -0700 (PDT) X-Spam-Level: ** On Thu, 28 Sep 2023 01:02:31 +0530 Radhey Shyam Pandey wrote: > +static int axienet_rx_submit_desc(struct net_device *ndev); can the forward declaration be avoided? > +/** > + * axienet_dma_tx_cb - DMA engine callback for TX channel. > + * @data: Pointer to the axienet_local structure. > + * @result: error reporting through dmaengine_result. > + * This function is called by dmaengine driver for TX channel to notify > + * that the transmit is done. > + */ > +static void axienet_dma_tx_cb(void *data, const struct dmaengine_result *result) > +{ > + struct axienet_local *lp = data; > + struct skbuf_dma_descriptor *skbuf_dma; > + > + skbuf_dma = axienet_get_tx_desc(lp, lp->tx_ring_tail++); > + u64_stats_update_begin(&lp->tx_stat_sync); > + u64_stats_add(&lp->tx_bytes, skbuf_dma->skb->len); > + u64_stats_add(&lp->tx_packets, 1); > + u64_stats_update_end(&lp->tx_stat_sync); > + dma_unmap_sg(lp->dev, skbuf_dma->sgl, skbuf_dma->sg_len, DMA_TO_DEVICE); > + dev_kfree_skb_any(skbuf_dma->skb); dev_consume_skb_any(), kfree is for drops > +/** > + * axienet_start_xmit_dmaengine - Starts the transmission. > + * @skb: sk_buff pointer that contains data to be Txed. > + * @ndev: Pointer to net_device structure. > + * > + * Return: NETDEV_TX_OK on success or any non space errors. > + * NETDEV_TX_BUSY when free element in TX skb ring buffer > + * is not available. > + * > + * This function is invoked from xmit to initiate transmission. The > + * function sets the skbs, register dma call back API and submit > + * the dma transaction. > + * Additionally if checksum offloading is supported, > + * it populates AXI Stream Control fields with appropriate values. > + */ > +static netdev_tx_t > +axienet_start_xmit_dmaengine(struct sk_buff *skb, struct net_device *ndev) > +{ > + struct dma_async_tx_descriptor *dma_tx_desc = NULL; > + struct axienet_local *lp = netdev_priv(ndev); > + struct skbuf_dma_descriptor *skbuf_dma; > + u32 app_metadata[DMA_NUM_APP_WORDS] = {0}; > + u32 csum_start_off; > + u32 csum_index_off; > + int sg_len; > + int ret; > + > + sg_len = skb_shinfo(skb)->nr_frags + 1; > + if (!CIRC_SPACE(lp->tx_ring_head, lp->tx_ring_tail, TX_BD_NUM_MAX)) { > + netif_stop_queue(ndev); > + if (net_ratelimit()) > + netdev_warn(ndev, "TX ring unexpectedly full\n"); I don't see you stopping the queue when the ring gets full, am I not looking into the right place? Otherwise this is sort of expected to occasionally hapen > + return NETDEV_TX_BUSY; > + } > + > + skbuf_dma = axienet_get_tx_desc(lp, lp->tx_ring_head); > + if (!skbuf_dma) > + return NETDEV_TX_OK; Leaks the skb? > + lp->tx_ring_head++; > + sg_init_table(skbuf_dma->sgl, sg_len); > + ret = skb_to_sgvec(skb, skbuf_dma->sgl, 0, skb->len); > + if (ret < 0) > + return NETDEV_TX_OK; > + > + ret = dma_map_sg(lp->dev, skbuf_dma->sgl, sg_len, DMA_TO_DEVICE); > + if (!ret) > + return NETDEV_TX_OK; > + > + /* Fill up app fields for checksum */ > + if (skb->ip_summed == CHECKSUM_PARTIAL) { > + if (lp->features & XAE_FEATURE_FULL_TX_CSUM) { > + /* Tx Full Checksum Offload Enabled */ > + app_metadata[0] |= 2; > + } else if (lp->features & XAE_FEATURE_PARTIAL_TX_CSUM) { > + csum_start_off = skb_transport_offset(skb); > + csum_index_off = csum_start_off + skb->csum_offset; > + /* Tx Partial Checksum Offload Enabled */ > + app_metadata[0] |= 1; > + app_metadata[1] = (csum_start_off << 16) | csum_index_off; > + } > + } else if (skb->ip_summed == CHECKSUM_UNNECESSARY) { > + app_metadata[0] |= 2; /* Tx Full Checksum Offload Enabled */ > + } > + > + dma_tx_desc = lp->tx_chan->device->device_prep_slave_sg(lp->tx_chan, skbuf_dma->sgl, Possibly store the device_prep_slave_sg pointer to a temporary variable to make this line less painfully long? > + skbuf_dma = axienet_get_rx_desc(lp, lp->rx_ring_head); > + if (!skbuf_dma) > + return -ENOMEM; > + lp->rx_ring_head++; > + skb = netdev_alloc_skb(ndev, lp->max_frm_size); > + if (!skb) > + return -ENOMEM; > + > + sg_init_table(skbuf_dma->sgl, 1); > + addr = dma_map_single(lp->dev, skb->data, lp->max_frm_size, DMA_FROM_DEVICE); > + if (unlikely(dma_mapping_error(lp->dev, addr))) { > + netdev_err(ndev, "DMA mapping error\n"); needs rate limiting > + ret = -ENOMEM; > + goto rx_submit_err_free_skb; is it legal to unmap dma error ? > + } > + sg_dma_address(skbuf_dma->sgl) = addr; > + sg_dma_len(skbuf_dma->sgl) = lp->max_frm_size; > + dma_rx_desc = dmaengine_prep_slave_sg(lp->rx_chan, skbuf_dma->sgl, > + 1, DMA_DEV_TO_MEM, > + DMA_PREP_INTERRUPT); > +/** > + * axienet_init_dmaengine - init the dmaengine code. > + * @ndev: Pointer to net_device structure > + * > + * Return: 0, on success. > + * non-zero error value on failure > + * > + * This is the dmaengine initialization code. > + */ > +static int axienet_init_dmaengine(struct net_device *ndev) > +{ > + struct axienet_local *lp = netdev_priv(ndev); > + struct skbuf_dma_descriptor *skbuf_dma; > + int i, ret; > + > + lp->tx_chan = dma_request_chan(lp->dev, "tx_chan0"); > + if (IS_ERR(lp->tx_chan)) { > + ret = PTR_ERR(lp->tx_chan); > + return dev_err_probe(lp->dev, ret, "No Ethernet DMA (TX) channel found\n"); Why use dev_err_probe()? This is not on the probe path. If ndo_open fails it fails, it won't get retried later by itself, right? > @@ -1238,7 +1540,24 @@ static int axienet_open(struct net_device *ndev) > > phylink_start(lp->phylink); > > - if (!lp->use_dmaengine) { > + if (lp->use_dmaengine) { > + /* Enable interrupts for Axi Ethernet core (if defined) */ > + if (lp->eth_irq > 0) { > + ret = request_irq(lp->eth_irq, axienet_eth_irq, IRQF_SHARED, > + ndev->name, ndev); > + if (ret) > + goto error_code; > + } > + > + ret = axienet_init_dmaengine(ndev); > + pointless new line > + if (ret < 0) { > + if (lp->eth_irq > 0) > + free_irq(lp->eth_irq, ndev); can't this be on the error path? > + goto error_code; > + } > + pointless new line > + } else { -- pw-bot: cr