From patchwork Wed Feb 17 11:58:26 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: gayathri.manepalli@wipro.com X-Patchwork-Id: 584080 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from archives.nicira.com (unknown [IPv6:2600:3c00::f03c:91ff:fe6e:bdf7]) by ozlabs.org (Postfix) with ESMTP id 614711402BC for ; Wed, 17 Feb 2016 22:59:26 +1100 (AEDT) Received: from archives.nicira.com (localhost [127.0.0.1]) by archives.nicira.com (Postfix) with ESMTP id AE489106F9; Wed, 17 Feb 2016 03:59:24 -0800 (PST) X-Original-To: dev@openvswitch.org Delivered-To: dev@openvswitch.org Received: from mx3v3.cudamail.com (mx3.cudamail.com [64.34.241.5]) by archives.nicira.com (Postfix) with ESMTPS id 085D5106DC for ; Wed, 17 Feb 2016 03:59:24 -0800 (PST) Received: from bar4.cudamail.com (localhost [127.0.0.1]) by mx3v3.cudamail.com (Postfix) with ESMTPS id 2D0AA161E2E for ; Wed, 17 Feb 2016 04:59:23 -0700 (MST) X-ASG-Debug-ID: 1455710359-03dc215700218370001-byXFYA Received: from mx1-pf2.cudamail.com ([192.168.24.2]) by bar4.cudamail.com with ESMTP id DyPKM0yDS8SlnZe0 (version=TLSv1 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for ; Wed, 17 Feb 2016 04:59:19 -0700 (MST) X-Barracuda-Envelope-From: gayathri.manepalli@wipro.com X-Barracuda-RBL-Trusted-Forwarder: 192.168.24.2 Received: from unknown (HELO wipro-blr-out01.wipro.com) (203.91.198.74) by mx1-pf2.cudamail.com with ESMTPS (DHE-RSA-AES256-SHA encrypted); 17 Feb 2016 11:59:18 -0000 Received-SPF: pass (mx1-pf2.cudamail.com: SPF record at wipro.com designates 203.91.198.74 as permitted sender) X-Barracuda-Apparent-Source-IP: 203.91.198.74 X-Barracuda-RBL-IP: 203.91.198.74 X-AuditID: cb5bdd57-f79556d0000048bc-15-56c46092f85b X-Invalid-Recipients: Received: from CHN-OUT-EDG01.wipro.com ( [203.91.193.61]) by wipro-blr-out01.wipro.com (Symantec Mail Security) with SMTP id 3E.C3.18620.29064C65; Wed, 17 Feb 2016 17:29:14 +0530 (IST) Received: from CHN-SNR-MBX-24.wipro.com (10.142.51.125) by CHN-OUT-EDG01.wipro.com (203.91.201.38) with Microsoft SMTP Server (TLS) id 14.3.266.1; Wed, 17 Feb 2016 17:28:28 +0530 Received: from wipro-blr-tls01.wipro.com (203.91.201.116) by CHN-SNR-MBX-24.wipro.com (10.142.51.125) with Microsoft SMTP Server (TLS) id 14.3.266.1; Wed, 17 Feb 2016 17:28:29 +0530 Received: from APC01-SG2-obe.outbound.protection.outlook.com (65.55.88.246) by wipro-blr-tls01.wipro.com (203.91.201.116) with Microsoft SMTP Server (TLS) id 15.0.1104.5; Wed, 17 Feb 2016 17:28:27 +0530 Received: from TY1PR0301MB1056.apcprd03.prod.outlook.com (10.164.96.139) by TY1PR0301MB1055.apcprd03.prod.outlook.com (10.164.96.13) with Microsoft SMTP Server (TLS) id 15.1.409.15; Wed, 17 Feb 2016 11:58:27 +0000 Received: from TY1PR0301MB1056.apcprd03.prod.outlook.com ([10.164.96.139]) by TY1PR0301MB1056.apcprd03.prod.outlook.com ([10.164.96.139]) with mapi id 15.01.0409.017; Wed, 17 Feb 2016 11:58:26 +0000 X-CudaMail-Envelope-Sender: gayathri.manepalli@wipro.com From: To: X-CudaMail-MID: CM-E2-216008392 X-CudaMail-DTE: 021716 X-CudaMail-Originating-IP: 203.91.198.74 Thread-Topic: [ovs-dev][PATCH 2/2] : 802.1ad support in OVS & OVS-DPDK X-ASG-Orig-Subj: [##CM-E2-216008392##][ovs-dev][PATCH 2/2] : 802.1ad support in OVS & OVS-DPDK Thread-Index: AdFpelZQ27uFUNP3T/u1cJlk8m5g5w== Date: Wed, 17 Feb 2016 11:58:26 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: openvswitch.org; dkim=none (message not signed) header.d=none; openvswitch.org; dmarc=none action=none header.from=wipro.com; x-originating-ip: [203.91.215.216] x-microsoft-exchange-diagnostics: 1; TY1PR0301MB1055; 5:Sst/KUKPjDeMjSyguNZlkfjOHjmjFWBdWBd/Oh4IedV/lOy7ED9U3lu6S2hYb9gq4AyDAh0AvkHyCMRh4OQElSdcfAiv/rAgahU2ZDASMSJbQisHb/vHlMZeURHhQKvZiYx0AwK9LnxviP+sZPynNA==; 24:pUtBH15svA2UjOhv3qyytjR7nhwsTVD2LWWNxyb5GiNNWM5R+prqCVxxXlxh4afT302tqQ0AoGGA5ZGFVtRhOH2hnlN2LlizkChkkVcUeNk= x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:TY1PR0301MB1055; x-ms-office365-filtering-correlation-id: 2a9cefd0-a1a2-4071-c2d0-08d33791a50c x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(62627912741753); x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(61425038)(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046)(61426038)(61427038); SRVR:TY1PR0301MB1055; BCL:0; PCL:0; RULEID:; SRVR:TY1PR0301MB1055; x-forefront-prvs: 085551F5A8 x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(53754006)(377424004)(229853001)(10400500002)(2351001)(86362001)(1730700002)(189998001)(19580395003)(66066001)(19580405001)(40100003)(3660700001)(19617315012)(50986999)(87936001)(54356999)(450100001)(102836003)(15975445007)(790700001)(76576001)(5008740100001)(1096002)(6116002)(122556002)(3846002)(5004730100002)(110136002)(107886002)(5002640100001)(33656002)(2900100001)(92566002)(16236675004)(3280700002)(5003600100002)(2906002)(586003)(19625215002)(5001960100002)(77096005)(1220700001)(74316001)(4001150100001)(19300405004); DIR:OUT; SFP:1101; SCL:1; SRVR:TY1PR0301MB1055; H:TY1PR0301MB1056.apcprd03.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en; spamdiagnosticoutput: 1:23 spamdiagnosticmetadata: NSPM MIME-Version: 1.0 X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Feb 2016 11:58:26.6046 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 258ac4e4-146a-411e-9dc8-79a9e12fd6da X-MS-Exchange-Transport-CrossTenantHeadersStamped: TY1PR0301MB1055 X-OrganizationHeadersPreserved: TY1PR0301MB1055.apcprd03.prod.outlook.com X-CrossPremisesHeadersPromoted: CHN-HES-EDG03.wipro.com X-CrossPremisesHeadersFiltered: CHN-HES-EDG03.wipro.com X-CFilter-Loop: Reflected X-GBUdb-Analysis: 0, 203.91.198.74, Ugly c=0.357145 p=-0.25 Source Normal X-MessageSniffer-Rules: 0-0-0-17541-c X-Barracuda-Connect: UNKNOWN[192.168.24.2] X-Barracuda-Start-Time: 1455710359 X-Barracuda-Encrypted: DHE-RSA-AES256-SHA X-Barracuda-URL: https://web.cudamail.com:443/cgi-mod/mark.cgi X-Virus-Scanned: by bsmtpd at cudamail.com X-Barracuda-BRTS-Status: 1 X-Barracuda-Spam-Score: 0.60 X-Barracuda-Spam-Status: No, SCORE=0.60 using per-user scores of TAG_LEVEL=3.5 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=4.0 tests=BSF_SC5_MJ1963, HTML_MESSAGE, NO_REAL_NAME, RDNS_NONE X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.27101 Rule breakdown below pts rule name description ---- ---------------------- -------------------------------------------------- 0.00 NO_REAL_NAME From: does not include a real name 0.00 HTML_MESSAGE BODY: HTML included in message 0.10 RDNS_NONE Delivered to trusted network by a host with no rDNS 0.50 BSF_SC5_MJ1963 Custom Rule MJ1963 X-Content-Filtered-By: Mailman/MimeDel 2.1.16 Subject: [ovs-dev] [PATCH 2/2] : 802.1ad support in OVS & OVS-DPDK X-BeenThere: dev@openvswitch.org X-Mailman-Version: 2.1.16 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@openvswitch.org Sender: "dev" Hi All, Below is the patch for 802.1ad support in OVS-DPDK which is extension to below patch, https://patchwork.ozlabs.org/patch/584074/ // Patch for plain OVS Signed-off-by: Manepalli S Gayathri > --- For configuration details, please refer first part of patch (https://patchwork.ozlabs.org/patch/584074/) cycles_count_start(pmd); error = netdev_rxq_recv(rxq, packets, &cnt); cycles_count_end(pmd, PMD_CYCLES_POLLING); - if (!error) { + if (!error) + { int i; *recirc_depth_get() = 0; Thanks & Regards, Gayathri The information contained in this electronic message and any attachments to this message are intended for the exclusive use of the addressee(s) and may contain proprietary, confidential or privileged information. If you are not the intended recipient, you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately and destroy all copies of this message and any attachments. WARNING: Computer viruses can be transmitted via email. The recipient should check this email and any attachments for the presence of viruses. The company accepts no liability for any damage caused by any virus transmitted by this email. www.wipro.com --- openvswitch-2.4.0-1ad-3.18/lib/odp-execute.c 2015-11-25 17:05:17.204045591 +0530 +++ openvswitch-2.4.0-1ad-3.18-new/lib/odp-execute.c 2015-11-24 17:38:02.871908927 +0530 @@ -561,9 +561,14 @@ break; } - case OVS_ACTION_ATTR_PUSH_1ADVLAN: //to be handled for DPDK mode - break; + case OVS_ACTION_ATTR_PUSH_1ADVLAN: {//to be handled for DPDK mode + const struct ovs_action_push_vlan *vlan1 = nl_attr_get(a); + for (i = 0; i < cnt; i++) { + eth_push_vlan(packets[i], vlan1->vlan_tpid, vlan1->vlan_tci); + } + break; + } case OVS_ACTION_ATTR_POP_VLAN: for (i = 0; i < cnt; i++) { eth_pop_vlan(packets[i]); --- openvswitch-2.4.0-1ad-3.18/lib/dpif-netdev.c 2015-11-03 17:18:53.000000000 +0530 +++ openvswitch-2.4.0-1ad-3.18-new/lib/dpif-netdev.c 2015-11-21 00:05:50.042204761 +0530 @@ -2519,7 +2519,8 @@