-
Notifications
You must be signed in to change notification settings - Fork 376
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
More API updates for 2.0 #10317
base: main
Are you sure you want to change the base?
More API updates for 2.0 #10317
Commits on Sep 30, 2024
-
core: Move flags only used for memory registration calls to fi_domain.h
Signed-off-by: Jianxin Xiong <jianxin.xiong@intel.com>
Configuration menu - View commit details
-
Copy full SHA for f9f492f - Browse repository at this point
Copy the full SHA f9f492fView commit details
Commits on Oct 10, 2024
-
core: Define flag for single use MR
Signed-off-by: Jianxin Xiong <jianxin.xiong@intel.com>
Configuration menu - View commit details
-
Copy full SHA for 378fb6d - Browse repository at this point
Copy the full SHA 378fb6dView commit details -
core: Define capability bit for tagged multi receive
Currently FI_MULTI_RECV is effectively only defined for untagged message only. Simply expanding the definition to tagged message would cause difficulties in either provider support or discovery. Define FI_TAGGED_MULTI_RECV to indicate that multi recv is supported in tagged message as well. This is only used as a capability bit. The op flag and cq flag continues to use FI_MULTI_RECV. Signed-off-by: Jianxin Xiong <jianxin.xiong@intel.com>
Configuration menu - View commit details
-
Copy full SHA for 7fe4c25 - Browse repository at this point
Copy the full SHA 7fe4c25View commit details -
core: Define capability for tagged message only directed recv
FI_DIRECTED_RECV covers both untagged and tagged message. However, the most often used case is for tagged message. Having a saparate bit for tagged message allows the provider to optimize non-tagged messsage implementation while maintain support directed recv over tagged message. Signed-off-by: Jianxin Xiong <jianxin.xiong@intel.com>
Configuration menu - View commit details
-
Copy full SHA for de8e302 - Browse repository at this point
Copy the full SHA de8e302View commit details -
core: Define capbility for directed receive without wildcard src_addr
The new bit FI_EXACT_DIRECTED_RECV is similar to FI_DIRECTED_RECV, but requires exact source address. I.e., the wildcard address FI_ADDR_UNSPEC is not allowed. It can be used alone, or be used together with FI_DIRECTED_RECV or FI_TAGGED_DIRECTED_RECV as a modifier. Not allowing wildcard source address allows the provider to better optmize the receive handling. Signed-off-by: Jianxin Xiong <jianxin.xiong@intel.com>
Configuration menu - View commit details
-
Copy full SHA for 5bb1fab - Browse repository at this point
Copy the full SHA 5bb1fabView commit details -
Memory registration consists of two parts: map/pin the memory for local access and export with a key for remote access. The first part is usually heavyweight and requries kernel involvement. The second part is less expensive and can be further separated into key allocation and key assignment. Key allocation may needs kernel involvement, but key assignment can be done in user space. Here sub-MR is introduced as a way to allow separattion of the forementioned two parts, and key reservation is added to further optimize sub-MR creation. A sub-MR is created from an existing MR (the base MR). It inherits the memory mapping/pinning of the base MR but has its own access key. The address range exposed can be same as the the base MR or a subpart of that. The access rights can be different, too. Now the base MR can be created with a few extra keys reserved. These reserved keys will be automatically used for sub-MR registration. This only applies to FI_MR_PROV_KEY mode. Signed-off-by: Jianxin Xiong <jianxin.xiong@intel.com>
Configuration menu - View commit details
-
Copy full SHA for 36851db - Browse repository at this point
Copy the full SHA 36851dbView commit details -
man: Clarify FI_HMEM support of inject calls
Add text to clarify that only FI_HMEM_SYSTEM is allowed for inject calls if FI_MR_HMEM is required. Signed-off-by: Jianxin Xiong <jianxin.xiong@intel.com>
Configuration menu - View commit details
-
Copy full SHA for 14269c8 - Browse repository at this point
Copy the full SHA 14269c8View commit details