Message ID | 20180625195348.8917-1-vkommadi@redhat.com |
---|---|
Headers | show
Return-Path: <ovs-dev-bounces@openvswitch.org> X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (mailfrom) smtp.mailfrom=openvswitch.org (client-ip=140.211.169.12; helo=mail.linuxfoundation.org; envelope-from=ovs-dev-bounces@openvswitch.org; receiver=<UNKNOWN>) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=redhat.com Received: from mail.linuxfoundation.org (mail.linuxfoundation.org [140.211.169.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 41F0HG3wy7z9ry1 for <incoming@patchwork.ozlabs.org>; Tue, 26 Jun 2018 05:54:02 +1000 (AEST) Received: from mail.linux-foundation.org (localhost [127.0.0.1]) by mail.linuxfoundation.org (Postfix) with ESMTP id 10D73CFC; Mon, 25 Jun 2018 19:54:00 +0000 (UTC) X-Original-To: dev@openvswitch.org Delivered-To: ovs-dev@mail.linuxfoundation.org Received: from smtp1.linuxfoundation.org (smtp1.linux-foundation.org [172.17.192.35]) by mail.linuxfoundation.org (Postfix) with ESMTPS id 3B363CC7 for <dev@openvswitch.org>; Mon, 25 Jun 2018 19:53:59 +0000 (UTC) X-Greylist: domain auto-whitelisted by SQLgrey-1.7.6 Received: from mx1.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by smtp1.linuxfoundation.org (Postfix) with ESMTPS id 9141D772 for <dev@openvswitch.org>; Mon, 25 Jun 2018 19:53:58 +0000 (UTC) Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 5702C81663D1 for <dev@openvswitch.org>; Mon, 25 Jun 2018 19:53:57 +0000 (UTC) Received: from vkommadi.redhat.com (ovpn-116-82.sin2.redhat.com [10.67.116.82]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 03CC62166B5D; Mon, 25 Jun 2018 19:53:55 +0000 (UTC) From: vkommadi@redhat.com To: dev@openvswitch.org Date: Tue, 26 Jun 2018 01:23:45 +0530 Message-Id: <20180625195348.8917-1-vkommadi@redhat.com> X-Scanned-By: MIMEDefang 2.78 on 10.11.54.6 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Mon, 25 Jun 2018 19:53:57 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Mon, 25 Jun 2018 19:53:57 +0000 (UTC) for IP:'10.11.54.6' DOMAIN:'int-mx06.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'vkommadi@redhat.com' RCPT:'' X-Spam-Status: No, score=-4.2 required=5.0 tests=BAYES_00, RCVD_IN_DNSWL_MED autolearn=ham version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on smtp1.linux-foundation.org Subject: [ovs-dev] [PATCH v6 0/3] Use VLANs for VLAN packets redirected to a gateway chassis X-BeenThere: ovs-dev@openvswitch.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: <ovs-dev.openvswitch.org> List-Unsubscribe: <https://mail.openvswitch.org/mailman/options/ovs-dev>, <mailto:ovs-dev-request@openvswitch.org?subject=unsubscribe> List-Archive: <http://mail.openvswitch.org/pipermail/ovs-dev/> List-Post: <mailto:ovs-dev@openvswitch.org> List-Help: <mailto:ovs-dev-request@openvswitch.org?subject=help> List-Subscribe: <https://mail.openvswitch.org/mailman/listinfo/ovs-dev>, <mailto:ovs-dev-request@openvswitch.org?subject=subscribe> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: ovs-dev-bounces@openvswitch.org Errors-To: ovs-dev-bounces@openvswitch.org |
Series |
Use VLANs for VLAN packets redirected to a gateway chassis
|
expand
|
From: venkata anil <vkommadi@redhat.com> This patch avoids tunneling and instead uses source tenant vlan network across hypervisors for traffic from vlan network on local hypervisor towards gateway hypervisor hosting redirect chassiss port. On the local hypervisor, when the packet enters logical router ingress pipeline from tenant vlan network, router will set REGBIT_NAT_REDIRECT and redirect the packet to gateway hypervisor, which is hosting the chassis redirect port, using tenant vlan network. Packet travelling across hypervisors will have source vlan tag and distributed gateway port MAC as destination MAC (other packet data unchanged). Gateway hypervisor will check the vlan tag and destination MAC and resubmit it to router logical ingress pipeline for routing and finding the logical output port(i.e it treats this packet as coming from the local patch port connected to tenant vlan network for routing). No changes done for return path as return path to source hypervisor always uses tenant vlan networks. v5->v6: * Rebased v4->v5 * Rebased * New patch 3 for Documentation(no changes in other patches) v3->v4: * Rebased * Splitting patch into patch series. Entire patch of v3 became patch 1 of this series. * Updated flow in gateway chassis to check gateway port MAC address (in patch 1) * New patch 2 for ARP/gARP of gateway port through router internal ports venkata anil (3): Avoid tunneling for VLAN packets redirected to a gateway chassis Send gateway port ARP through router internal ports Document the flows for redirecting VLAN packets ovn/controller/bfd.c | 3 +- ovn/controller/binding.c | 10 +- ovn/controller/ovn-controller.c | 3 + ovn/controller/ovn-controller.h | 17 ++- ovn/controller/physical.c | 121 ++++++++++++++++- ovn/controller/pinctrl.c | 57 +++++++- ovn/lib/logical-fields.c | 4 + ovn/lib/logical-fields.h | 2 + ovn/northd/ovn-northd.8.xml | 46 +++++++ ovn/northd/ovn-northd.c | 92 +++++++++++++ ovn/ovn-architecture.7.xml | 26 +++- tests/ovn.at | 284 ++++++++++++++++++++++++++++++++++++++++ 12 files changed, 650 insertions(+), 15 deletions(-)