svn commit: r358808 - in head/sys: kern net netinet

Andrew Gallatin gallatin at cs.duke.edu
Mon Mar 9 13:46:27 UTC 2020


On 2020-03-09 09:44, Andrew Gallatin wrote:
> Author: gallatin
> Date: Mon Mar  9 13:44:51 2020
> New Revision: 358808
> URL: https://urldefense.com/v3/__https://svnweb.freebsd.org/changeset/base/358808__;!!OToaGQ!5mmRl2ROq7G4c4x2Xe2uHppYyETGlCRsREj-jHw0ZWcNqt3GhQju3BHBkM_vsrVvkQ$
> 
> Log:
>    make lacp's use_numa hashing aware of send tags
>    
>    When I did the use_numa support, I missed the fact that there is
>    a separate hash function for send tag nic selection. So when
>    use_numa is enabled, ktls offload does not work properly, as it
>    does not reliably allocate a send tag on the proper egress nic
>    since different egress nics are selected for send-tag allocation
>    and packet transmit. To fix this, this change:
>    
>    - refectors lacp_select_tx_port_by_hash() and
>         lacp_select_tx_port() to make lacp_select_tx_port_by_hash()
>         always called by lacp_select_tx_port()
>    
>    -   pre-shifts flowids to convert them to hashes when calling lacp_select_tx_port_by_hash()
>    
>    -   adds a numa_domain field to if_snd_tag_alloc_params
>    
>    -   plumbs the numa domain into places where we allocate send tags
>    
>    In testing with NIC TLS setup on a NUMA machine, I see thousands
>    of output errors before the change when enabling
>    kern.ipc.tls.ifnet.permitted=1. After the change, I see no
>    errors, and I see the NIC sysctl counters showing active TLS
>    offload sessions.
>    
>    Reviewed by:	rrs, hselasky, jhb
>    Sponsored by:	Netflix

Forgot: Differential: https://reviews.freebsd.org/D23811



More information about the svn-src-head mailing list