Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751462AbdISTlH (ORCPT ); Tue, 19 Sep 2017 15:41:07 -0400 Received: from mx2.suse.de ([195.135.220.15]:58089 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1751074AbdISTlG (ORCPT ); Tue, 19 Sep 2017 15:41:06 -0400 Date: Tue, 19 Sep 2017 21:41:02 +0200 From: Benjamin Poirier To: Philip Prindeville Cc: Jeff Kirsher , netdev@vger.kernel.org, intel-wired-lan@lists.osuosl.org, linux-kernel@vger.kernel.org, Lennart Sorensen Subject: Re: [5/5] e1000e: Avoid receiver overrun interrupt bursts Message-ID: <20170919194102.h2nu72evbqhpu765@f1.synalogic.ca> References: <20170721183627.13373-5-bpoirier@suse.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: User-Agent: NeoMutt/20170421 (1.8.2) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 634 Lines: 15 On 2017/09/19 12:38, Philip Prindeville wrote: > Hi. > > We’ve been running this patchset (all 5) for about as long as they’ve been under review… about 2 months. And in a burn-in lab with heavy traffic. > > We’ve not seen a single link-flap in hundreds of ours of saturated traffic. > > Would love to see some resolution soon on this as we don’t want to ship a release with unsanctioned patches. > > Is there an estimate on when that might be? The patches have been added to Jeff Kirsher's next-queue tree. I guess they will be submitted for v4.15 which might be released in early 2018... http://phb-crystal-ball.org/