[dpdk-dev] Windows Draft Build

2020-02-08 Thread Dmitry Kozlyuk
Hi,

I'm having trouble building "dpdk.sln" from "windpdk-v18.08-clang" branch of
"dpdk-draft-windows" repository using Visual Studio 2019 Community Edition.
All projects are set up to use some "llvm" toolset. If I install LLVM Build
Tools and switch toolset to Clang-cl, build fails because Platform SDK is not
accessible. I tried to add Platform SDK include paths to Additional Include
Directories, but ended up with multiple errors, indicating incompatibilities
between Windows headers and Clang. Please find screenshots and logs attached.

"Netuio.sln" builds OK.

-- 
Dmitry Kozlyuk
1>-- Rebuild All started: Project: librte_kvargs, Configuration: Debug x64 
--
1>In file included from :1:
1>Z:\mk\exec-env\windows\..\..\..\lib\librte_eal\windows\rte_override\rte_windows.h(26,10):
 warning : non-portable path to file ''; specified path differs in 
case from file name on disk [-Wnonportable-include-path]
1>In file included from :1:
1>In file included from 
Z:\mk\exec-env\windows\..\..\..\lib\librte_eal\windows\rte_override\rte_windows.h:26:
1>In file included from C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\um\windows.h:171:
1>In file included from C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\shared\windef.h:24:
1>In file included from C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\shared\minwindef.h:182:
1>In file included from C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\um\winnt.h:105:
1>C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\shared\kernelspecs.h(36,10): warning : 
non-portable path to file '"driverspecs.h"'; specified path differs in case 
from file name on disk [-Wnonportable-include-path]
1>In file included from :1:
1>In file included from 
Z:\mk\exec-env\windows\..\..\..\lib\librte_eal\windows\rte_override\rte_windows.h:26:
1>In file included from C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\um\windows.h:171:
1>In file included from C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\shared\windef.h:24:
1>In file included from C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\shared\minwindef.h:182:
1>In file included from C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\um\winnt.h:198:
1>C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\shared\basetsd.h(322,12): warning : cast to 'void 
* __ptr32' from smaller integer type 'unsigned long' 
[-Wint-to-void-pointer-cast]
1>In file included from :1:
1>In file included from 
Z:\mk\exec-env\windows\..\..\..\lib\librte_eal\windows\rte_override\rte_windows.h:26:
1>In file included from C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\um\windows.h:171:
1>In file included from C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\shared\windef.h:24:
1>In file included from C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\shared\minwindef.h:182:
1>C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\um\winnt.h(2487,1): error : '__C_ASSERT__' 
declared as an array with a negative size
1>C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\um\winnt.h(193,47): message : expanded from macro 
'C_ASSERT'
1>C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\um\winnt.h(3245,19): warning : '__cpuidex' is not 
a recognized builtin; consider including  to access non-builtin 
intrinsics [-Wignored-pragma-intrinsic]
1>C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\um\winnt.h(3350,19): warning : '_m_prefetchw' is 
not a recognized builtin; consider including  to access non-builtin 
intrinsics [-Wignored-pragma-intrinsic]
1>C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\um\winnt.h(3398,19): warning : 
'__getcallerseflags' is not a recognized builtin; consider including  
to access non-builtin intrinsics [-Wignored-pragma-intrinsic]
1>C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\um\winnt.h(3411,19): warning : '__segmentlimit' is 
not a recognized builtin; consider including  to access non-builtin 
intrinsics [-Wignored-pragma-intrinsic]
1>C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\um\winnt.h(3424,19): warning : '__readpmc' is not 
a recognized builtin; consider including  to access non-builtin 
intrinsics [-Wignored-pragma-intrinsic]
1>C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\um\winnt.h(3471,19): warning : '__movsb' is not a 
recognized builtin; consider including  to access non-builtin 
intrinsics [-Wignored-pragma-intrinsic]
1>C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\um\winnt.h(3472,19): warning : '__movsw' is not a 
recognized builtin; consider including  to access non-builtin 
intrinsics [-Wignored-pragma-intrinsic]
1>C:\Program Files (x86)\Windows 
Kits\10\Include\10.0.18362.0\um\winnt.h(3473,19): warning : '__movsd' is not a 
recognized builtin; consider including  to access non-builtin 
intrinsics [-Wignored-pragma-intrinsic]
1>C:\Program Files (x86)\Windows 
Kits\10\I

[dpdk-dev] [PATCH v3] net/i40e: relaxed barrier in the tx fastpath

2020-02-08 Thread Gavin Hu
To keep ordering of mixed accesses, rte_cio is sufficient.
The rte_io barrier is overkill.[1]

[1] http://inbox.dpdk.org/dev/CALBAE1M-ezVWCjqCZDBw+MMDEC4O9
qf0kpn89emdgdajepk...@mail.gmail.com

Signed-off-by: Gavin Hu 
---
V3:
- optimize the barriers in the fast path only, leave as it is for the
  barriers in the slow path and control path 
- drop the virtio patches from the list as they are in the control path
- it makes more sense to relax the barrier in the fast path, at the PMD level.
  relaxing the fundamental rte_io_x barriers APIs requires scrutinizations for
  each PMDs which use the barriers directly or indirectly.
V2:
- remove virtio_pci_read/write64 APIs definitions, they are not needed and 
generate compiling errors like " error: unused function 'virtio_pci_write64' 
[-Werror,-Wunused-function]"
- update the reference link to kernel source code
---
 drivers/net/i40e/i40e_rxtx.c | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/drivers/net/i40e/i40e_rxtx.c b/drivers/net/i40e/i40e_rxtx.c
index fd1ae80da..8c0f7cc67 100644
--- a/drivers/net/i40e/i40e_rxtx.c
+++ b/drivers/net/i40e/i40e_rxtx.c
@@ -1248,7 +1248,8 @@ i40e_xmit_pkts(void *tx_queue, struct rte_mbuf **tx_pkts, 
uint16_t nb_pkts)
   (unsigned) txq->port_id, (unsigned) txq->queue_id,
   (unsigned) tx_id, (unsigned) nb_tx);
 
-   I40E_PCI_REG_WRITE(txq->qtx_tail, tx_id);
+   rte_cio_wmb();
+   I40E_PCI_REG_WRITE_RELAXED(txq->qtx_tail, tx_id);
txq->tx_tail = tx_id;
 
return nb_tx;
-- 
2.17.1



Re: [dpdk-dev] Windows Support Plan

2020-02-08 Thread Dmitry Kozlyuk
> The main reason DPDK memory management works the way it does is because 
> of need to support multiprocess. In order to map memory in all 
> processes, we need that space reserved (otherwise there's no guarantee 
> that the newly mapped memory segment will be mapped in all processes, 
> and it'll cause runtime failure). If it wasn't for that, we could 
> allocate memory arbitrarily and as needed. Windows should either follow 
> this model, or drop secondary support and go its own way - the internals 
> are OS-specific anyway.

I think Windows should support multi-process, because there is a demand and
an ongoing design effort for multi-tenancy and resource arbitration [0].
Until Windows kernel implements "secure API" for the architecture proposed by
[0] (if it does at all), DPDK multi-process model can to some point support
the features desired. For example, a primary process may be a service
performing resource arbitration for applications being secondary processes.

> Bear in mind that DPDK also supports external memory, you might 
> need to make some allowances for that too.

I haven't considered external memory yet. Does it need anything beyond
mapping VA to IOVA?

> As for IOMMU - we don't support IOVA as VA addressing on FreeBSD, so if 
> Windows port can only work with IOVA as PA, that's fine too. The 
> question of IOVA mode really boils down to, do we control the DMA 
> addresses (IOVA as VA mode), or does the system (IOVA as PA). I'm not 
> familiar with how IOMMU works on Windows, but as long as it fits into 
> that model and we keep the API, it should also be OK :)

AFAIK, Windows doesn't expose IOMMU either to applications or drivers. Do I
understand correctly that implies only IOVA as PA can be supported, because
mappings can't be set up?

The trouble is, PA cannot generally be used if IOMMU is present, but there
is no way to tell if it is. Windows kernel offers API to allocate buffers for
DMA [1], but MM doesn't know if it allocates memory for DMA or not, even if
that kernel API would be exposed. If I got it right, DPDK just can't be used
on Windows with IOMMU enabled (can't tell for VMs that don't see IOMMU).

[0]:
https://www.dpdk.org/wp-content/uploads/sites/35/2018/12/RMenonOCardona_Improving-Security-in-Windows-DPDK.pdf
[1]:
https://docs.microsoft.com/en-us/windows-hardware/drivers/ddi/wdm/nc-wdm-pallocate_common_buffer_ex

-- 
Dmitry Kozlyuk