[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20240813182747.1770032-1-manojvishy@google.com>
Date: Tue, 13 Aug 2024 18:27:42 +0000
From: Manoj Vishwanathan <manojvishy@...gle.com>
To: Tony Nguyen <anthony.l.nguyen@...el.com>,
Przemek Kitszel <przemyslaw.kitszel@...el.com>, "David S. Miller" <davem@...emloft.net>,
Eric Dumazet <edumazet@...gle.com>, intel-wired-lan@...ts.osuosl.org
Cc: netdev@...r.kernel.org, linux-kernel@...r.kernel.org,
google-lan-reviews@...glegroups.com,
Manoj Vishwanathan <manojvishy@...gle.com>
Subject: [PATCH v1 0/5] IDPF Virtchnl fixes
This patch series is to enhance IDPF virtchnl error reporting and some
minor fixes to the locking sequence in virtchnl message handling
we encountered while testing.
Also includes a minor clean up with regards to warning we encountered
in controlq section of IDPF.
The issue we had here was a virtchnl processing delay leading to the
"xn->salt" mismatch, transaction timeout and connection not recovering.
This was due to default CPU bounded kworker workqueue for virtchnl message
processing being starved by aggressive userspace load causing the
virtchnl processing to be delayed and causing a transaction timeout.
The reason the virtchnl process kworker was stalled as it
was bound to CPU0 by default and there was immense IRQ traffic to CPU0.
All of the above with an aggressive user space process on the same core
lead to the change from Marco Leogrande to convert the idpf workqueues
to unbound.
Manoj Vishwanathan (3):
idpf: address an rtnl lock splat in tx timeout recovery path
idpf: Acquire the lock before accessing the xn->salt
idpf: more info during virtchnl transaction time out
Marco Leogrande (1):
idpf: convert workqueues to unbound
Willem de Bruijn (1):
idpf: warn on possible ctlq overflow
drivers/net/ethernet/intel/idpf/idpf_main.c | 15 ++++++++-----
drivers/net/ethernet/intel/idpf/idpf_txrx.c | 14 ++++++++++++-
.../net/ethernet/intel/idpf/idpf_virtchnl.c | 21 ++++++++++++++-----
3 files changed, 39 insertions(+), 11 deletions(-)
--
2.46.0.76.ge559c4bf1a-goog
Powered by blists - more mailing lists