From nobody Sun May 24 20:34:46 2026 Received: from mail-pl1-f180.google.com (mail-pl1-f180.google.com [209.85.214.180]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 988723E9F9E for ; Thu, 21 May 2026 13:37:26 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.180 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1779370648; cv=none; b=YXuZRlgp3IfC5m3N6sHKWbeQ4y4aecZiU8xxUhjNMCeOshLsr8+LPdr6rgR9mBL5pZ+f3jaAdeX+lM/lmeEt4/HNZP4+xPhDhRCtM6msjj9Ny2WBa+EqIq7FUcer5QWq0RZGDbv7jqvBxiOrh9ppLnpS72BI4MLQFb9Q9Ppa+mw= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1779370648; c=relaxed/simple; bh=P51n2b/oFOVHnt949lfmT4I5HHmggRmwYe9UnF0MG5c=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=fVaOYlMZPh2G7QoCGdIO2PuTqtO9H1CdQwT3Y2NQCzQZay8DOiSz9JJNCh8Dp7bHTwmzMQJnOGzEnv00+R3luPDAFZlv9Tkj3wDcS8Z6KOSJmutHJA6rd4LHhzESUyLLX1CSIFUhBBJeq7s2a/gtcAARvKbbkEX5OvWnXKXkeYE= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=NV5P6n/d; arc=none smtp.client-ip=209.85.214.180 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="NV5P6n/d" Received: by mail-pl1-f180.google.com with SMTP id d9443c01a7336-2be1dd4af34so45286955ad.1 for ; Thu, 21 May 2026 06:37:26 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20251104; t=1779370646; x=1779975446; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=d7ug8LaXoNWnHgEv+PMJRrHpbPnUV9xOZWAilo2/lYQ=; b=NV5P6n/dQztEwkLd3dZXRGD0cdBUbj+wQQUBaWXBe5il/ouWgiEDpRA3cUwuSDoRf8 otKROzlkWUT8tMHRddZVBkY0zFwX0ErTMwDV9DEbSi4nbDQub4IqOeMdEHrQTnlMr/ZE pvrBH4PfjJiUc40GF1rHrsG5z7I5aJJMc5f+riFpMLJ43fEOjKN9ttpO1g9VRzrfwHoB wx8JG5DanA7NMu+CcW2rtsFSW/db/5hNKNZzoAhoiDyJB1rDICQgRK2TTcmOukJxu/vc W7gcS8LxVlVWEBd3fL/t87WTGivCzzzfsN+Tbl+BoX1mUl9A/vtr2LsSCml/7dbOddI0 QfWA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20251104; t=1779370646; x=1779975446; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-gg:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=d7ug8LaXoNWnHgEv+PMJRrHpbPnUV9xOZWAilo2/lYQ=; b=ge/BT6wDDGeLnbBngUidSqND2/0zMSwrEUZmtf58uUSyu6rEBsjiByeGXjy2ewczJK Cz3pT9XFGntGLfYgoC0MDZsM2M4k74mtYeJnvITVyfkp5GxOcyUu1wWnzmd9nEDr0GY+ d8Pez5agcmjQohdEvdoOBQtDoskdzb8PafLKJFnO2Q0g/AcmmjE+EcmAG0U79erVsHmG iCnyGocW/wWeS8kJ0RXkQvdNeEU5Cn6xEJ1IfASMeT6ajuW36L7OtMCvYtkqajMUo7xI eKPt6uUVFbMUPOnpRTQftXlZTj8gh8wMUrElWKCl9S0Y9IyY+avxajNCjTjQ1J1tKbLo JuLA== X-Forwarded-Encrypted: i=1; AFNElJ/SB1haHXEAI5yHm30YNqT0pTlS93AtOn/bFngjWaIryuEqwYiiO3y1EM6h/UQEkjy4izzIcSQCSpMVzEg=@vger.kernel.org X-Gm-Message-State: AOJu0YwZp/Tmq+IEnCS3/ts+NPDDxwQer20ZhrOB9w5EzXGJaVUjKkHh QwNBcvoz4SOQh+I0MZlgyFtvAcs1DhAHy+MawOm9Dcil6LI5f1toNOnjGoAiCl2hRJYGdw== X-Gm-Gg: Acq92OFkz8kyBY7v4p+Wmd9ubeQwpeIKy5LSmScWPwD3DuCTjKYGAkh38hwPE1wx+5G ZDDCWDB1tmrj2XKz09esQiT5oe0TCxrppUtUh3F+3z/Ij6JRLst/0bS3KMhoTk0AGB1KwDJGuos n2moZ8n0TVZzlbMa6Ia41t6Cmm556kiwcNzZv5RfOWOdCUHd7+Wu+BoqqiORtdDJcL7RdAj0i7U klvvL2NvPzpDaje+GCAtArm2UuCTmdbRXF0nZaKACt3NYaoAvHtkAxMKihQuPXBzLYE0KtvMdt1 hxLbbiiJ7u8UqOAPpqreyjx0frc8TEdV8QiflwQhs5SjI09/SFTfSccSjU9P0ZBEYCWFLD8hVWk p8SYcxGgelOgojG61p4RmfdQZrBqNVKE4I69D69tzrmdVl5/4eFttJAcuqoUJ5e9xeWB4dwD4hp fx9VApKOz2ZiB50t0C8nm6/IrDj2IAjZgLTCFUtsQXuBl9w+khY3xc5nwxsNsqfBc= X-Received: by 2002:a17:903:1aeb:b0:2bc:8beb:525b with SMTP id d9443c01a7336-2bea3344109mr34103615ad.18.1779370645828; Thu, 21 May 2026 06:37:25 -0700 (PDT) Received: from localhost.localdomain ([2409:891f:1d81:e6e8:5473:a79:5c76:810d]) by smtp.gmail.com with ESMTPSA id d9443c01a7336-2bea9a2ab27sm10781445ad.72.2026.05.21.06.37.21 (version=TLS1_3 cipher=TLS_CHACHA20_POLY1305_SHA256 bits=256/256); Thu, 21 May 2026 06:37:25 -0700 (PDT) From: Chuang Wang To: Cc: Chuang Wang , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Simon Horman , Kuniyuki Iwashima , Willem de Bruijn , Stanislav Fomichev , Samiullah Khawaja , Hangbin Liu , Krishna Kumar , Neal Cardwell , Roman Gushchin , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH net-next v4] net: reduce RFS/ARFS flow updates by checking LLC affinity Date: Thu, 21 May 2026 21:37:01 +0800 Message-ID: <20260521133711.20725-1-nashuiliang@gmail.com> X-Mailer: git-send-email 2.50.1 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The current implementation of rps_record_sock_flow() updates the flow table every time a socket is processed on a different CPU. In high-load scenarios, especially with Accelerated RFS (ARFS), this triggers frequent flow steering updates via ndo_rx_flow_steer. For drivers like mlx5 that implement hardware flow steering, these constant updates lead to significant contention on internal driver locks (e.g., arfs_lock). This contention often becomes a performance bottleneck that outweighs the steering benefits. This patch introduces a cache-aware update strategy: the flow record is only updated if the flow migrates across Last Level Cache (LLC) boundaries. This minimizes expensive hardware reconfigurations while preserving cache locality for the application. A new sysctl, net.core.rps_feat_llc_affinity, is added to toggle this feature. Additionally, export sock_rps_record_flow_hash(). This resolves a symbol visibility compilation error triggered by 'tun' using sock_rps_record_flow_hash() in tun_flow_update() when CONFIG_TUN is built as a module. Performance Test Results: The patch was tested in a K8s environment (AMD CPU 128*2, 16-core Pod with CPU pinning, mlx5 NIC) using brpc[1] echo_server and rpc_press. rpc_press Commands: for i in {1..8}; do ./rpc_press -proto=3D./echo.proto -method=3Dexample.EchoService.Echo -server=3D:8000 -input=3D'{"message":"hello"}' -qps=3D0 -thread_num=3D512 -connection_type=3Dpooled & done Monitor mlx5e_rx_flow_steer frequency: /usr/share/bcc/tools/funccount -i 1 mlx5e_rx_flow_steer Frequency of mlx5e_rx_flow_steer (via funccount[2]): Before: ~335,000 counts/sec After: ~23,000 counts/sec (reduced by ~93%) System Metrics (after enabling rps_feat_llc_affinity): CPU Utilization: 38% -> 32% CPU PSI (Pressure Stall Information): 20% -> 10% These results demonstrate that filtering updates by LLC affinity significantly reduces driver lock contention and improves overall CPU efficiency under heavy network load. [1] https://github.com/apache/brpc/ [2] https://github.com/iovisor/bcc/blob/master/tools/funccount.py Signed-off-by: Chuang Wang --- v3 -> v4: add rps_llc_check by Eric Dumazet v2 -> v3: patch net -> net-next by Jakub Kicinski v1 -> v2: add rps_feat_llc_affinity; add brpc tests include/net/rps.h | 17 ++++------ net/core/dev.c | 65 ++++++++++++++++++++++++++++++++++++++ net/core/sysctl_net_core.c | 35 ++++++++++++++++++++ 3 files changed, 107 insertions(+), 10 deletions(-) diff --git a/include/net/rps.h b/include/net/rps.h index e33c6a2fa8bb..65543354f6e6 100644 --- a/include/net/rps.h +++ b/include/net/rps.h @@ -12,6 +12,7 @@ =20 extern struct static_key_false rps_needed; extern struct static_key_false rfs_needed; +extern struct static_key_false rps_feat_llc_affinity; =20 /* * This structure holds an RPS map which can be of variable length. The @@ -55,11 +56,14 @@ struct rps_sock_flow_table { =20 #define RPS_NO_CPU 0xffff =20 +bool rps_llc_check(u32 old_val, u32 new_val); + static inline void rps_record_sock_flow(rps_tag_ptr tag_ptr, u32 hash) { unsigned int index =3D hash & rps_tag_to_mask(tag_ptr); u32 val =3D hash & ~net_hotdata.rps_cpu_mask; struct rps_sock_flow_table *table; + u32 old_val; =20 /* We only give a hint, preemption can change CPU under us */ val |=3D raw_smp_processor_id(); @@ -68,7 +72,8 @@ static inline void rps_record_sock_flow(rps_tag_ptr tag_p= tr, u32 hash) /* The following WRITE_ONCE() is paired with the READ_ONCE() * here, and another one in get_rps_cpu(). */ - if (READ_ONCE(table[index].ent) !=3D val) + old_val =3D READ_ONCE(table[index].ent); + if (old_val !=3D val && rps_llc_check(old_val, val)) WRITE_ONCE(table[index].ent, val); } =20 @@ -136,15 +141,7 @@ static inline bool rfs_is_needed(void) #endif } =20 -static inline void sock_rps_record_flow_hash(__u32 hash) -{ -#ifdef CONFIG_RPS - if (!rfs_is_needed()) - return; - - _sock_rps_record_flow_hash(hash); -#endif -} +void sock_rps_record_flow_hash(__u32 hash); =20 static inline void sock_rps_record_flow(const struct sock *sk) { diff --git a/net/core/dev.c b/net/core/dev.c index 26ac8eb9b259..df8d328447bd 100644 --- a/net/core/dev.c +++ b/net/core/dev.c @@ -4997,6 +4997,8 @@ struct static_key_false rps_needed __read_mostly; EXPORT_SYMBOL(rps_needed); struct static_key_false rfs_needed __read_mostly; EXPORT_SYMBOL(rfs_needed); +struct static_key_false rps_feat_llc_affinity __read_mostly; +EXPORT_SYMBOL(rps_feat_llc_affinity); =20 static u32 rfs_slot(u32 hash, rps_tag_ptr tag_ptr) { @@ -5208,6 +5210,58 @@ static int get_rps_cpu(struct net_device *dev, struc= t sk_buff *skb, return cpu; } =20 +/** + * rps_llc_check - Determine if RPS flow table should be updated + * @old_val: Previous flow record value + * @new_val: Target flow record value + * + * Returns true if the record needs an update. + */ +bool rps_llc_check(u32 old_val, u32 new_val) +{ + u32 old_cpu =3D old_val & ~net_hotdata.rps_cpu_mask; + u32 new_cpu =3D new_val & ~net_hotdata.rps_cpu_mask; + + if (old_val =3D=3D new_val) + return false; + + /* + * RPS LLC Affinity Feature: + * Reduce RFS/ARFS flow updates by checking LLC affinity. + * + * Frequent flow table updates can trigger constant hardware steering + * reconfigurations (e.g., ndo_rx_flow_steer), leading to significant + * contention on driver internal locks (like mlx5's arfs_lock). + * + * This strategy only updates the flow record if it migrates across LLC + * boundaries. This minimizes expensive hardware updates while preserving + * cache locality for the application. + */ + if (static_branch_unlikely(&rps_feat_llc_affinity)) { + /* Force update if the recorded CPU is invalid or has gone offline */ + if (old_cpu >=3D nr_cpu_ids || !cpu_active(old_cpu)) + return true; + + /* + * Force an update if the current task is no longer permitted + * to run on the old_cpu. + */ + if (!cpumask_test_cpu(old_cpu, current->cpus_ptr)) + return true; + + /* + * If CPUs do not share a cache, allow the update to prevent + * expensive remote memory accesses and cache misses. + */ + if (!cpus_share_cache(old_cpu, new_cpu)) + return true; + + return false; + } + + return true; +} + #ifdef CONFIG_RFS_ACCEL =20 /** @@ -5249,6 +5303,17 @@ bool rps_may_expire_flow(struct net_device *dev, u16= rxq_index, } EXPORT_SYMBOL(rps_may_expire_flow); =20 +void sock_rps_record_flow_hash(__u32 hash) +{ +#ifdef CONFIG_RPS + if (!rfs_is_needed()) + return; + + _sock_rps_record_flow_hash(hash); +#endif +} +EXPORT_SYMBOL(sock_rps_record_flow_hash); + #endif /* CONFIG_RFS_ACCEL */ =20 /* Called from hardirq (IPI) context */ diff --git a/net/core/sysctl_net_core.c b/net/core/sysctl_net_core.c index b508618bfc12..b6d4ebcbb6a6 100644 --- a/net/core/sysctl_net_core.c +++ b/net/core/sysctl_net_core.c @@ -210,6 +210,33 @@ static int rps_sock_flow_sysctl(const struct ctl_table= *table, int write, kvfree_rcu_mightsleep(tofree); return ret; } + +static int rps_feat_llc_affinity_sysctl(const struct ctl_table *table, int= write, + void *buffer, size_t *lenp, loff_t *ppos) +{ + u8 curr_state; + int ret; + const struct ctl_table tmp =3D { + .data =3D &curr_state, + .maxlen =3D sizeof(curr_state), + .mode =3D table->mode, + .extra1 =3D table->extra1, + .extra2 =3D table->extra2 + }; + + curr_state =3D static_branch_unlikely(&rps_feat_llc_affinity) ? 1 : 0; + + ret =3D proc_dou8vec_minmax(&tmp, write, buffer, lenp, ppos); + if (write && ret =3D=3D 0) { + if (curr_state && !static_branch_unlikely(&rps_feat_llc_affinity)) + static_branch_enable(&rps_feat_llc_affinity); + else if (!curr_state && static_branch_unlikely(&rps_feat_llc_affinity)) + static_branch_disable(&rps_feat_llc_affinity); + } + + return ret; +} + #endif /* CONFIG_RPS */ =20 #ifdef CONFIG_NET_FLOW_LIMIT @@ -554,6 +581,14 @@ static struct ctl_table net_core_table[] =3D { .mode =3D 0644, .proc_handler =3D rps_sock_flow_sysctl }, + { + .procname =3D "rps_feat_llc_affinity", + .maxlen =3D sizeof(u8), + .mode =3D 0644, + .proc_handler =3D rps_feat_llc_affinity_sysctl, + .extra1 =3D SYSCTL_ZERO, + .extra2 =3D SYSCTL_ONE + }, #endif #ifdef CONFIG_NET_FLOW_LIMIT { --=20 2.47.3