[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20240826181032.3042222-1-manojvishy@google.com>
Date: Mon, 26 Aug 2024 18:10:28 +0000
From: Manoj Vishwanathan <manojvishy@...gle.com>
To: Tony Nguyen <anthony.l.nguyen@...el.com>,
Przemek Kitszel <przemyslaw.kitszel@...el.com>, "David S. Miller" <davem@...emloft.net>,
Eric Dumazet <edumazet@...gle.com>, intel-wired-lan@...ts.osuosl.org
Cc: netdev@...r.kernel.org, linux-kernel@...r.kernel.org,
google-lan-reviews@...glegroups.com,
Manoj Vishwanathan <manojvishy@...gle.com>
Subject: [[PATCH v2 iwl-next] v2 0/4]
IDPF Virtchnl: Enhance error reporting & fix locking/workqueue issues
This patch series addresses several IDPF virtchnl issues:
* Improved error reporting for better diagnostics.
* Fixed locking sequence in virtchnl message handling to avoid potential race conditions.
* Converted idpf workqueues to unbound to prevent virtchnl processing delays under heavy load.
Previously, CPU-bound kworkers for virtchnl processing could be starved,
leading to transaction timeouts and connection failures.
This was particularly problematic when IRQ traffic and user space processes contended for the same CPU.
By making the workqueues unbound, we ensure virtchnl processing is not tied to a specific CPU,
improving responsiveness even under high system load.
---
V2:
- Dropped patch from Willem
- RCS/RCT variable naming
- Improved commit message on feddback
v1: https://lore.kernel.org/netdev/20240813182747.1770032-2-manojvishy@google.com/T/
David Decotigny (1):
idpf: address an rtnl lock splat in tx timeout recovery path
Manoj Vishwanathan (2):
idpf: Acquire the lock before accessing the xn->salt
idpf: add more info during virtchnl transaction time out
Marco Leogrande (1):
idpf: convert workqueues to unbound
drivers/net/ethernet/intel/idpf/idpf_main.c | 15 ++++++++++-----
drivers/net/ethernet/intel/idpf/idpf_txrx.c | 14 +++++++++++++-
drivers/net/ethernet/intel/idpf/idpf_virtchnl.c | 12 +++++++-----
3 files changed, 30 insertions(+), 11 deletions(-)
--
2.46.0.295.g3b9ea8a38a-goog
Powered by blists - more mailing lists