On Tue, Mar 29, 2022 at 3:06 PM Han Zhou <[email protected]> wrote:
>
>
>
> On Tue, Mar 29, 2022 at 2:20 PM Numan Siddique <[email protected]> wrote:
> >
> > On Mon, Mar 28, 2022 at 1:40 AM Han Zhou <[email protected]> wrote:
> > >
> > > Some NICs support HW offloading for datapath flows, but masked access
to
> > > the 128-bit ct_label field may prevent a flow being offloaded due to
HW
> > > limitations. OVN's use of ct_label currently includes:
> > > - ct_label.blocked (1 bit)
> > > - ct_label.natted (1 bit)
> > > - ct_label.ecmp_reply_port (16 bits)
> > > - ct_label.ecmp_reply_eth (48 bits)
> > > - ct_label.label (32 bits)
> > >
> > > This patch moves the bits blocked, natted and ecmp_reply_port to use
> > > ct_mark (18 bits in total among the 32-bit ct_mark), and keep the rest
> > > of the fields in ct_label:
> > > - ct_mark.blocked (1 bit)
> > > - ct_mark.natted (1 bit)
> > > - ct_mark.ecmp_reply_port (16 bits)
> > > - ct_label.ecmp_reply_eth (48 bits)
> > > - ct_label.label (32 bits)
> > >
> > > This would allow HW offloading to work for most of the cases.
> > >
> > > For ct_label.ecmp_reply_eth, the flow matching it still uses masked
> > > access, but it doesn't matter because the flow is for new connections
> > > and requires ct_commit in its actions, so it wouldn't be offloaded
> > > anyway for those NICs. There is a flow for established connections
that
> > > would access the masked field in the actions, while in this patch it
> > > avoids masked access by using a register xxreg1 to temporarily read
the
> > > whole ct_label, and then use masked access to xxreg1 to read the
actual
> > > value.
> > >
> > > The only exception is for ct_label.label, there is a flow that matches
> > > the masked field for ACL logging of reply direction. This patch cannot
> > > avoid the masked access to ct_label in this case. This flow is enabled
> > > only for the feature "log-related". So offloading may still not work
for
> > > some NICs when an ACL is configured with a label and with
"log-related"
> > > enabled.
> > >
> > > There are no other flows relying on masked ct_label match, but it's
> > > worth noting that the LB hairpin related flows using ct_label.natted
> > > which were hardcoded directly in ovn-controller are still kept to
avoid
> > > traffic breaking during upgrading. It relies on the
> > > northd-internal-version to internally determine if it is currently
> > > upgrading from a version that requires the ct_label flows being
> > > kept, and automatically removes the flows when northd-internal-version
> > > is up-to-date.
> > >
> > > Reported-at: https://bugzilla.redhat.com/show_bug.cgi?id=1957786
> >
> >
> > Thanks for the patch series.
> >
> > For the entire series:
> >
> > Acked-by: Numan Siddique <[email protected]>
> >
> > Numan
> >
> Thanks Numan! I applied the series to main.
>

As discussed in the last OVN meetings, I backported this series to
branch-22.03.
It was also requested to backport to 21.12, but @Dumitru Ceara
<[email protected]> volunteered to work on that branch. Please note that
there will be conflict primarily because "log-related" was not supported in
21.12.

Thanks,
Han

> Han
>
> > >
> > > v1 -> v2: Fixed two system test cases.
> > > v2 -> v3:
> > >     - Addressed Numan's comment regarding hairpin flow upgrading
problem by
> > >       keeping ct_label flows together with ct_mark flows for hairpin,
and
> > >       provided an option to disable ct_label after upgrading.
> > >     - Moved a misplaced chunk from patch2 to patch5 to fix related
system tests.
> > > v3 -> v4:
> > >     - Avoid the extra option to disable ct_label after upgrading for
hairpin
> > >       flows. Instead, reuse the north-internal-ver to determine
automatically.
> > >       For this to work, a new patch is added to handle SB_Global
changes in I-P
> > >       engine of ovn-controller.
> > >
> > > Han Zhou (6):
> > >   ovn-sb.xml: Fix ct_lb documentation.
> > >   actions: Add action ct_lb_mark.
> > >   actions: Add stack push and pop actions.
> > >   ovn-northd: Improve the doc and tests for ecmp-symmetric-reply.
> > >   ovn-controller: Handle SB_Global:options:northd_internal_version in
> > >     I-P engine.
> > >   Use ct_mark for masked access to make flows HW-offloading friendly.
> > >
> > >  NEWS                         |   2 +
> > >  controller/lflow.c           |  33 ++-
> > >  controller/lflow.h           |   1 +
> > >  controller/ovn-controller.c  |  79 ++++++
> > >  include/ovn/actions.h        |  11 +-
> > >  include/ovn/logical-fields.h |   3 +
> > >  lib/actions.c                | 128 ++++++++-
> > >  lib/logical-fields.c         |  17 +-
> > >  lib/ovn-util.c               |  25 +-
> > >  lib/ovn-util.h               |   4 +
> > >  northd/northd.c              | 107 ++++---
> > >  northd/ovn-northd.8.xml      |  59 ++--
> > >  ovn-sb.xml                   |  54 +++-
> > >  tests/ovn-controller.at      |  46 +++
> > >  tests/ovn-northd.at          | 526
++++++++++++++++++-----------------
> > >  tests/ovn.at                 | 208 +++++++-------
> > >  tests/system-ovn.at          | 178 ++++++------
> > >  utilities/ovn-trace.c        |  72 ++++-
> > >  18 files changed, 1017 insertions(+), 536 deletions(-)
> > >
> > > --
> > > 2.30.2
> > >
> > > _______________________________________________
> > > dev mailing list
> > > [email protected]
> > > https://mail.openvswitch.org/mailman/listinfo/ovs-dev
> > >
_______________________________________________
dev mailing list
[email protected]
https://mail.openvswitch.org/mailman/listinfo/ovs-dev

Reply via email to