--
You received this message because you are subscribed to the Google Groups "rtpengine" group.
To unsubscribe from this group and stop receiving emails from it, send an email to rtpengine+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/rtpengine/8d6b01d4-8f90-45dd-8b13-12fac8df05f3n%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Tests are run on bare metal, same server.
Kernel versions:debian 9 = 4.9.0-16-amd64debian 10 = 4.19.0-18-amd64
Yes, I can run some tests with separate kernels. I can try a bisect approach on debian 10 and see if I can pinpoint a specific kernel version that introduces the CPU spike... unless you had a specific version you wanted to test.
As for the CPU usage, I attached a capture. It looks like the CPU is accounted to the parent process with equal distribution to children procs.
Yeah it appears that htop tries to sum the child procs... and it doesn't show the kernel module procs which I wasn't aware of.I took your advice and ran Deb9 with the backported kernel 4.19 and observed the ~2X CPU increase. Attached are snapshots via top -H of load during the tests. What's odd is in the backported kernel, there are 2 kernel procs but in the base kernel just 1. I'm not sure if the /# references the table id used by the kernel module, but in both tests this was set to id=0.
That is related to how incoming packets are distributed to soft IRQ handlers on different CPU cores by the kernel and the NIC driver. There's one ksoftirq thread per CPU core. Look at how many RX queues your NIC provides, how they're distributed to different cores, and how packets are assigned to queues (all of which can be done through ethtool).
Cheers
--
You received this message because you are subscribed to the Google Groups "rtpengine" group.
To unsubscribe from this group and stop receiving emails from it, send an email to rtpengine+...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/rtpengine/5c1416a9-c38b-4a58-8bef-74883d030c16n%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.