From patchwork Fri Jul 27 18:26:37 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Vishal Deep Ajmera X-Patchwork-Id: 950126 X-Patchwork-Delegate: ian.stokes@intel.com Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Authentication-Results: ozlabs.org; spf=pass (mailfrom) smtp.mailfrom=openvswitch.org (client-ip=140.211.169.12; helo=mail.linuxfoundation.org; envelope-from=ovs-dev-bounces@openvswitch.org; receiver=) Authentication-Results: ozlabs.org; dmarc=fail (p=none dis=none) header.from=ericsson.com Authentication-Results: ozlabs.org; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=ericsson.com header.i=@ericsson.com header.b="WevgzQS8"; dkim=fail reason="signature verification failed" (1024-bit key; unprotected) header.d=ericsson.com header.i=@ericsson.com header.b="dCp+OlWl"; dkim-atps=neutral Received: from mail.linuxfoundation.org (mail.linuxfoundation.org [140.211.169.12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 41cQ9R4YsCz9s0w for ; Fri, 27 Jul 2018 20:26:19 +1000 (AEST) Received: from mail.linux-foundation.org (localhost [127.0.0.1]) by mail.linuxfoundation.org (Postfix) with ESMTP id D4D26CC3; Fri, 27 Jul 2018 10:26:16 +0000 (UTC) X-Original-To: dev@openvswitch.org Delivered-To: ovs-dev@mail.linuxfoundation.org Received: from smtp1.linuxfoundation.org (smtp1.linux-foundation.org [172.17.192.35]) by mail.linuxfoundation.org (Postfix) with ESMTPS id BBBB3CB5 for ; Fri, 27 Jul 2018 10:26:15 +0000 (UTC) X-Greylist: domain auto-whitelisted by SQLgrey-1.7.6 Received: from sessmg22.ericsson.net (sessmg22.ericsson.net [193.180.251.58]) by smtp1.linuxfoundation.org (Postfix) with ESMTPS id 3EB82708 for ; Fri, 27 Jul 2018 10:26:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/simple; q=dns/txt; i=@ericsson.com; t=1532687172; h=From:Sender:Reply-To:Subject:Date:Message-Id:To:CC:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=E6as4LgOYup2UpB9YfRehfbCnltFocI0uktqQ4fPqHk=; b=WevgzQS8yxPBOpZGbyPJcpLUVmxF4vtX8DyESc1gQjS5nA9iEMJggMZQN+vyGUhU bcibCTmMKXfWwtXkUGb931tnRiVkmw+1lvjp9NIeORklRKGfJPYc+qqbU9b3RhKC TZ49izHDBIJBMqH4+VyefzRKXbJnL9MIZv5gStsep8M=; X-AuditID: c1b4fb3a-dcb6e9c0000079c1-d3-5b5af344fb9d Received: from ESESBMB503.ericsson.se (Unknown_Domain [153.88.183.116]) by sessmg22.ericsson.net (Symantec Mail Security) with SMTP id AB.37.31169.443FA5B5; Fri, 27 Jul 2018 12:26:12 +0200 (CEST) Received: from ESESSMB501.ericsson.se (153.88.183.162) by ESESBMB503.ericsson.se (153.88.183.170) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3; Fri, 27 Jul 2018 12:25:43 +0200 Received: from EUR02-HE1-obe.outbound.protection.outlook.com (153.88.183.157) by ESESSMB501.ericsson.se (153.88.183.162) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1466.3 via Frontend Transport; Fri, 27 Jul 2018 12:25:43 +0200 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NiOjVDaC37A3xnuRc9b1wU+YESCtroyJcUiUfMHMM2g=; b=dCp+OlWlHMhOcicG29H7z3+VKJkP9fyieWqn5Hn4Z506RjLzT6CEsw6oAaize8DZYwQTj0mOL6KZc7YPoePJXpop9xsxPm+tmSLG6lChDHfuJ7/dwrPlqH8nKdutccb5taRpE+wev8SOP6uc/7wMmD9dLtU9W+EQ93IHvtU59AA= Authentication-Results: spf=none (sender IP is ) smtp.mailfrom=vishal.deep.ajmera@ericsson.com; Received: from localhost.localdomain (125.16.128.122) by AM5PR0701MB2689.eurprd07.prod.outlook.com (2603:10a6:203:75::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.995.14; Fri, 27 Jul 2018 10:25:41 +0000 From: Vishal Deep Ajmera To: Date: Fri, 27 Jul 2018 23:56:37 +0530 Message-Id: <1532715997-26089-1-git-send-email-vishal.deep.ajmera@ericsson.com> X-Mailer: git-send-email 1.9.1 MIME-Version: 1.0 X-Originating-IP: [125.16.128.122] X-ClientProxiedBy: BM1PR0101CA0065.INDPRD01.PROD.OUTLOOK.COM (2603:1096:b00:19::27) To AM5PR0701MB2689.eurprd07.prod.outlook.com (2603:10a6:203:75::15) X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: ed5366a9-2384-47ca-07fb-08d5f3ab4e72 X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(4534165)(7168020)(4627221)(201703031133081)(201702281549075)(8990107)(5600074)(711020)(2017052603328)(7153060)(7193020); SRVR:AM5PR0701MB2689; X-Microsoft-Exchange-Diagnostics: 1; AM5PR0701MB2689; 3:IeOOxfbMgdiE2R52PBeRQoh/18QQIgAZtuorfH9WjwxyML6a9FRBFJoSngG1ZaoqARojuEv7YWgVH00ZtF2MFGEKlEKneEYNYqkq4GZtZz0OrLCdh0yMz82zq/ZxI3oSTVNJcK0yLBx6p0X3xQhhxG+bROM8ZrJwoKXZxmxL7TC0eo3osG14s2VjndzYD9xjA3xN+Ksgdh2BWS6kjX+yPaauzDLGrWHyDULTAhYQYF0gyhnDTE2s22HOxG2xYis2; 25:VbeOEV/b0WGxDsgl+bN3FuaoxJJNtZ4G2V254ZzfTgojdpCYZcKD35afV7Go0YQdYAfOeOwwUF5v+QfLBt9u0dfb+BdU+suOI5hwsVUbyegwWm22EgMUDnY1uQAqE9G5Gm6d9dHi4bJrIed5JthXJuUpVa9ZchCDD3ntUQb95Go48lb7ag8DT8QahgexHx7HCZ6+c9XsM7zrphiFGDAq8Z/pwWVQwJ5q2sZ03R5oodYHM3QgrzEXscrNoWLKz6ib2Pnp/LIm+dEvtewm/6GCNDujda37s7gT8/JVDZNBJHDdKoFTqZtgX2X/nAZsVytIg+ypFJlAXVxycYAdvLpOVw==; 31:jfa5J1HEa/kTDgveCXkNhxieQdOW3aGWoYt8qG7wLt8CWtu6oQYwWqQf9rf9PZ8gzHhcEZRkXOv2dM8itV69dBKzicdrupo/n3ybNyd6iYKA92AgdOQ+lGXR9PATs6ORiSqkAlZbN+k9oYpZRzCDCDoI/uJEzRh3K0u8k2fGFHfSfzZLW4vLxG+KhW3Vg0wBfZylg0e2WEhMAgKqRlqkozRtuuvDxCnuwgTZhRo7Ito= X-MS-TrafficTypeDiagnostic: AM5PR0701MB2689: X-Microsoft-Exchange-Diagnostics: 1; AM5PR0701MB2689; 20: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; 4:q9wuWjPp3uIz00O7LpjmT7/AAr9Mvxfy0rXgMg8SIN5ewra70nT0DR3ZNFwj4XrWDG8GywNeWbb0EyIRZZ96EwaBh7OZQAKlKDzZjpZho/mTAt8HuB2oxhyu/SPjoa76A4rL6/CJCDOMXQ80VlZMHmuy+lqgKNd+hhzKspX5MLnHD/WNZ/1KJ6kMTZj1mcZ+yM81lj0XYulXPt3/a5kJaRnR4ID1tYoFdtJ2ZfRzZtflp5WmDy8mAUr9EMDQCfDqwD4FjrjwwHX4elzS3SQDDcPNy9dW5yCB4x/4eWK2nfzEj21kyaJpjOEPt+DrX/E8pPrD5Ep9F2MhJLuOmUSZLtMwWnNK70yuq7EQY1yMfG8= X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:(37575265505322)(248295561703944); X-MS-Exchange-SenderADCheck: 1 X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(3231311)(944501410)(52105095)(93006095)(93001095)(10201501046)(3002001)(149027)(150027)(6041310)(20161123560045)(20161123558120)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(6072148)(201708071742011)(7699016); SRVR:AM5PR0701MB2689; BCL:0; PCL:0; RULEID:; SRVR:AM5PR0701MB2689; X-Forefront-PRVS: 07467C4D33 X-Forefront-Antispam-Report: SFV:NSPM; SFS:(10009020)(6069001)(39860400002)(366004)(376002)(346002)(136003)(396003)(189003)(199004)(478600001)(105586002)(2361001)(6666003)(81156014)(8676002)(6486002)(23676004)(106356001)(81166006)(6116002)(2351001)(97736004)(6512007)(3846002)(8936002)(50226002)(486006)(2616005)(36756003)(2870700001)(476003)(2906002)(5660300001)(7736002)(186003)(4326008)(16526019)(25786009)(26005)(956004)(68736007)(50466002)(66066001)(305945005)(47776003)(6506007)(386003)(55236004)(53936002)(86362001)(6916009)(316002)(14444005)(107886003)(52116002); DIR:OUT; SFP:1101; SCL:1; SRVR:AM5PR0701MB2689; H:localhost.localdomain; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; Received-SPF: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts) X-Microsoft-Exchange-Diagnostics: =?utf-8?q?1=3BAM5PR0701MB2689=3B23=3AeI?= =?utf-8?q?UOaxybUX0a4hWLqtEhkXH5OosZ2DPYF2t+RAa6a7nOM1OLqX4CRg60jq?= =?utf-8?q?jKwgO6FYV1Z0VbEeQbOf8Nd6Nndqpf5bQiTQ89ZyWx2iLVzWxtJmue/+?= =?utf-8?q?Fto07Xd4LSMMjMI6WAWT2SO3dZlE2XBXRIHQuGF92iazyxzvJMDR2id2?= =?utf-8?q?VgLJjDT3RYF9w2/vCxEQFw5S8nCTsduwyCT/i55ydAAK+XeZrW4Qkb2q?= =?utf-8?q?pRnA4D7/9QXyYr8F7fGmGOv/QLscbNhTRrAg96BpkBdv4MG7YPr7BPr6?= =?utf-8?q?IvtN8UG0SyGLCybH0Kx5VcP9CBaI6Fb08cqqWRgjFqI8GHZD9E80ZkIl?= =?utf-8?q?i9WGBdRXpfLUw/FHzmRHxOGfZPvjQHVz1TiZ+N9PKDBXNDjAcPhLHcWU?= =?utf-8?q?HI/H53BfknWiODRBFPr8verSV1u9UQSQaFtFHraB3mhiDkWQxOB1Hvyr?= =?utf-8?q?tym/UTHedFudVEOQoQC8dU+55oNlp159UE7rwq8ylNahM0bDF3rIa1rP?= =?utf-8?q?HE3QcvTnOBg8K1GaDBpSn0f02v3UsiF9IRFDmb/ViDF/Aqfh0w5i9ZWn?= =?utf-8?q?NEwjKKE2FEVVGwzua7ycyk2PzCNL1rfL26gd/Aix2TLrdxm3ujEmB+8y?= =?utf-8?q?8JrmMZRvqcx5LfFQiUbWt2WRKVWuc/pnZmlVElig9Gu4q0gBVQ88dU9q?= =?utf-8?q?9U7TYf3S5ijKowY2BinK7KBa/I6ueLgNwPmlQNHzVYrnz94ElCDx2aaV?= =?utf-8?q?BLGCvp6wvwIQEOI7f4Z3qYt/nrSBX+/iXGZf3fNiltDqpLE7mQrBCBr7?= =?utf-8?q?q5JrQxYfKFGCHEGPJP1WlR71uZfND/k6Hm89P4ReXoxhd4+erZriErtj?= =?utf-8?q?/apZ+SokD/oi8+kibGHkHN/NlPmV/GKqlq4mRcLPZ1UnpL7lwdz1Y6ep?= =?utf-8?q?EIiHTY3d9Dq5tH9vVTf+jK1+Qqku0MPAcoK1GVrxHqZb2rglozenakQB?= =?utf-8?q?CqWD2dOzzAsoopR+i909vjMIShqe5R95U1tuP8/2hPsshiFlzbDM1iTi?= =?utf-8?q?tpDXo3MEffDk9sOOSqVvdvfj5yrMM6XFl2zuiGYPpDgIy/wlQC23Kb/4?= =?utf-8?q?sm2Iul4VayaGWU/AdcCJaOR47RFXsjTfVB2iVw4yL3k1b59/t/vVmVmb?= =?utf-8?q?i0Bt4bmFG334tg76n5NwA1IMy+b9/gee+DwIycJOe3fgpIoNhZk/sTUw?= =?utf-8?q?BEvcoAm7jW7RVHqkBSVapbOvnwWxT8lX3vJSca?= X-Microsoft-Antispam-Message-Info: mf2dAql+EAQWVdThkmxB5UdbMePRrcIG5YNdVllCyEpxwzEmUeGt2fz/F5F95fgPvz6SOQb0RkJI81D7BckwIF7EN7ZYiUHKUSIqIzJlAco5idM49lvf19QtTq30zF8K9i7zXS+PESqCjlIyhW+PF+yhKYGZ6BhPU2gDvDfbWKNQ9rOfPVwPM7td7/39oQbCazzLY8F0ijk4v51G89A14EZk+X3tJgU+KCuuw5De9X8CAQ0j4Yqwn6wKZCTjBL4O6tV12YZtp2Tl0/nib8Cvx/aprQG9llT+fDGsI1Kdm8eE+ezhmytUN9iJJbfeRdq3NdtjmUJDmU8Ph/p2VtdDkIiKcAeHW2GpqBt2e70Tq9E= X-Microsoft-Exchange-Diagnostics: 1; AM5PR0701MB2689; 6:V0l443CDtUPk34ZioA83Mb/Pk1Nsadblm73Gh0jF4lCk89I5te87Ux7bs3M6L+f3SCq4s62gGVHAKepQwSmafxAOt+f3UoRIaMKRSM2ZttTWHM2YggNZuJeB6N+qVV4LgW+YvhC3HydmbrN9nFuGVp6NM3WKsZlqvZU4wgjvJ3knr9BdNMjb/VidWgFRjOP2llfsJKqRpWmLSMNxnY4+tgzbJA/Jgh7eQho/vRy+NO3gzfqjjY+FOhIpVQ01MsxOKy3CKpFF75g7DgOE6Z22KbhpOta6MvGbUqvLW/VwFempTCqIGXGjb9SdMzViVRDua9vpeDoAfYloNWAsHZsok+KNtHkeyDphw9HilcuDmjdfVIwU0Ir/Td9DnKjk6TwpGbLAhBkearGN8JkytqEeFPJJLSdLZrzhKNkCb6gD3pSSCNmNYT/xzGxnPRGtB19CadwGvfKQCIGzmyS8diMP2Q==; 5:RkzG3DMfMTVjiL1vbFp5yNCsqkbEKORaOhjOTddZg8tAo1Wrdnn5c7uKimyJNSgG5e0hb4eXENnCerAx6o/9BbEZZ0Bo1UKpALaQIBC4gprs/GY+XsfJpgjNtnxpRtl7f9c2rSzE0B+W96AovKf9ODMJlPvCP/wu4F/9e6fsbbA=; 7:G6lnep1+JIqmPWTuS1C8HvSdBlUTKeefSqHWYKqcL9bOvvyC+kNgFlLKm4t7vaSVkx/gE2Qy+AcjwOUiudQl0kQnoNhrJECO3JToeQs2dkgCwD73hYTOESxjBPh/drrL3kPc0g9GOscVhKhNVfpvsUPW2xJHEwQ8a3RaOkXbKCMg5Zx4mZCNDnqCnBk+f9l7DJc+x1cwihIYkC/Wk3GuKO7/t6SpM2CCgEsO0sqpDelorFNWS2KxeTIuxU4H8eRa SpamDiagnosticOutput: 1:99 SpamDiagnosticMetadata: NSPM X-MS-Exchange-CrossTenant-OriginalArrivalTime: 27 Jul 2018 10:25:41.4784 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: ed5366a9-2384-47ca-07fb-08d5f3ab4e72 X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 92e84ceb-fbfd-47ab-be52-080c6b87953f X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0701MB2689 X-OriginatorOrg: ericsson.com X-Brightmail-Tracker: H4sIAAAAAAAAA01Sa0hTYRj22znbzkaL09Ha29KESQU2p0nQWCJdpIQQg0Jq+2FLT26om+ws y4QwCzQr04zZZojiEhJFsEkS3ZxNvKCliSIG2sUbIkJjM++5fUn+e573ed7nex/4KIJZImWU wWhhzUZdllwgJm2XXluiEjwabcznyQiVu/ctoRoqWhKe4CVOjW6gxFJnAzrP04jj0tksQy5r jo6/ItbXbDiFOXX5N5udNrIA2VNKkIgC+ii45x6QfszQbgRNX8NLkHgT+xC0FE8KMHHwYNjq 4/kJSZcR4B2+t0koCtFXYWJWhU0PeeAsrSf8UQJaDctPHwdiQ+i9sF7nFPgxQd+AiYk/gXkw rYHRxdqAn6QPQEXvAPJjCZ0Mgy87ET5vP3R3VvDxfBd0236R/ncJ+hA0VzM4MhzutlYR2C6H N6/GCf89QFchsC47EK6mgJ7pET42hYG773kgB+gk6Bg4jP2DCNZc90lMCoUwtv6FxAsKWFss F2ChXghNXV4BFkzg6ZwXYnwO+tvG+FtX9zzq5+EFFwEfv3/6ZwqF4spWPhaa+eB7/0RYhhT2 bfXs/+vZt9WrQUQD2s2xHJedERurZM2GNI4zGZVG1tKCNj9Eu3NF3Ybap0+6EE0h+Q7J6XmN luHrcrm8bBcCipCHSBpHLmsZSbou7xZrNqWar2exnAvto0i5VHLqmkrD0Bk6C5vJsjmseUvl USJZAdLPDCtclc+U+oSaaJHI6r1Y9q0r7pi7PJjzje9hFJ449U/bzNyQSt6h7WPenelbvSOS pqT95s42RV7Iz+xoj4hvja0vVN9Wrs3KYpLEybKoHw6J1eRJ3Qg15excSGo8uEIJiiyr1bVB 1hceqb16yvsh7Lh0IUhhkAhTvAVyktPrjkQSZk73F8/srpoMAwAA X-Spam-Status: No, score=-2.4 required=5.0 tests=BAYES_00, DATE_IN_FUTURE_06_12, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, RCVD_IN_DNSWL_MED autolearn=ham version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on smtp1.linux-foundation.org Cc: i.maximets@samsung.com Subject: [ovs-dev] [PATCH v6] dpif-netdev: Avoid reordering of packets in a batch with same megaflow X-BeenThere: ovs-dev@openvswitch.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: ovs-dev-bounces@openvswitch.org Errors-To: ovs-dev-bounces@openvswitch.org OVS reads packets in batches from a given port and packets in the batch are subjected to potentially 3 levels of lookups to identify the datapath megaflow entry (or flow) associated with the packet. Each megaflow entry has a dedicated buffer in which packets that match the flow classification criteria are collected. This buffer helps OVS perform batch processing for all packets associated with a given flow. Each packet in the received batch is first subjected to lookup in the Exact Match Cache (EMC). Each EMC entry will point to a flow. If the EMC lookup is successful, the packet is moved from the rx batch to the per-flow buffer. Packets that did not match any EMC entry are rearranged in the rx batch at the beginning and are now subjected to a lookup in the megaflow cache. Packets that match a megaflow cache entry are *appended* to the per-flow buffer. Packets that do not match any megaflow entry are subjected to slow-path processing through the upcall mechanism. This cannot change the order of packets as by definition upcall processing is only done for packets without matching megaflow entry. The EMC entry match fields encompass all potentially significant header fields, typically more than specified in the associated flow's match criteria. Hence, multiple EMC entries can point to the same flow. Given that per-flow batching happens at each lookup stage, packets belonging to the same megaflow can get re-ordered because some packets match EMC entries while others do not. The following example can illustrate the issue better. Consider following batch of packets (labelled P1 to P8) associated with a single TCP connection and associated with a single flow. Let us assume that packets with just the ACK bit set in TCP flags have been received in a prior batch also and a corresponding EMC entry exists. 1. P1 (TCP Flag: ACK) 2. P2 (TCP Flag: ACK) 3. P3 (TCP Flag: ACK) 4. P4 (TCP Flag: ACK, PSH) 5. P5 (TCP Flag: ACK) 6. P6 (TCP Flag: ACK) 7. P7 (TCP Flag: ACK) 8. P8 (TCP Flag: ACK) The megaflow classification criteria does not include TCP flags while the EMC match criteria does. Thus, all packets other than P4 match the existing EMC entry and are moved to the per-flow packet batch. Subsequently, packet P4 is moved to the same per-flow packet batch as a result of the megaflow lookup. Though the packets have all been correctly classified as being associated with the same flow, the packet order has not been preserved because of the per-flow batching performed during the EMC lookup stage. This packet re-ordering has performance implications for TCP applications. This patch preserves the packet ordering by performing the per-flow batching after both the EMC and megaflow lookups are complete. As an optimization, packets are flow-batched in emc processing till any packet in the batch has an EMC miss. A new flow map is maintained to keep the original order of packet along with flow information. Post fastpath processing, packets from flow map are *appended* to per-flow buffer. Signed-off-by: Vishal Deep Ajmera Co-authored-by: Venkatesan Pradeep Signed-off-by: Venkatesan Pradeep --- lib/dpif-netdev.c | 125 +++++++++++++++++++++++++++++++++++++++++++++--------- 1 file changed, 106 insertions(+), 19 deletions(-) diff --git a/lib/dpif-netdev.c b/lib/dpif-netdev.c index 13a20f0..3ea25e2 100644 --- a/lib/dpif-netdev.c +++ b/lib/dpif-netdev.c @@ -244,6 +244,13 @@ struct dpcls_rule { /* 'flow' must be the last field, additional space is allocated here. */ }; +/* Data structure to keep packet order till fastpath processing. */ +struct dp_packet_flow_map { + struct dp_packet *packet; + struct dp_netdev_flow *flow; + uint16_t tcp_flags; +}; + static void dpcls_init(struct dpcls *); static void dpcls_destroy(struct dpcls *); static void dpcls_sort_subtable_vector(struct dpcls *); @@ -5774,6 +5781,19 @@ dp_netdev_queue_batches(struct dp_packet *pkt, packet_batch_per_flow_update(batch, pkt, tcp_flags); } +static inline void +packet_enqueue_to_flow_map(struct dp_packet *packet, + struct dp_netdev_flow *flow, + uint16_t tcp_flags, + struct dp_packet_flow_map *flow_map, + size_t index) +{ + struct dp_packet_flow_map *map = &flow_map[index]; + map->flow = flow; + map->packet = packet; + map->tcp_flags = tcp_flags; +} + /* SMC lookup function for a batch of packets. * By doing batching SMC lookup, we can use prefetch * to hide memory access latency. @@ -5783,8 +5803,9 @@ smc_lookup_batch(struct dp_netdev_pmd_thread *pmd, struct netdev_flow_key *keys, struct netdev_flow_key **missed_keys, struct dp_packet_batch *packets_, - struct packet_batch_per_flow batches[], - size_t *n_batches, const int cnt) + const int cnt, + struct dp_packet_flow_map *flow_map, + uint8_t *index_map) { int i; struct dp_packet *packet; @@ -5792,6 +5813,8 @@ smc_lookup_batch(struct dp_netdev_pmd_thread *pmd, struct dfc_cache *cache = &pmd->flow_cache; struct smc_cache *smc_cache = &cache->smc_cache; const struct cmap_node *flow_node; + int recv_idx; + uint16_t tcp_flags; /* Prefetch buckets for all packets */ for (i = 0; i < cnt; i++) { @@ -5802,6 +5825,8 @@ smc_lookup_batch(struct dp_netdev_pmd_thread *pmd, struct dp_netdev_flow *flow = NULL; flow_node = smc_entry_get(pmd, keys[i].hash); bool hit = false; + /* Get the original order of this packet in received batch. */ + recv_idx = index_map[i]; if (OVS_LIKELY(flow_node != NULL)) { CMAP_NODE_FOR_EACH (flow, node, flow_node) { @@ -5809,12 +5834,17 @@ smc_lookup_batch(struct dp_netdev_pmd_thread *pmd, * number, we need to verify that the input ports match. */ if (OVS_LIKELY(dpcls_rule_matches_key(&flow->cr, &keys[i]) && flow->flow.in_port.odp_port == packet->md.in_port.odp_port)) { + tcp_flags = miniflow_get_tcp_flags(&keys[i].mf); + /* SMC hit and emc miss, we insert into EMC */ emc_probabilistic_insert(pmd, &keys[i], flow); keys[i].len = netdev_flow_key_size(miniflow_n_values(&keys[i].mf)); - dp_netdev_queue_batches(packet, flow, - miniflow_get_tcp_flags(&keys[i].mf), batches, n_batches); + /* Add these packets into the flow map in the same order + * as received. + */ + packet_enqueue_to_flow_map(packet, flow, tcp_flags, + flow_map, recv_idx); n_smc_hit++; hit = true; break; @@ -5828,6 +5858,10 @@ smc_lookup_batch(struct dp_netdev_pmd_thread *pmd, /* SMC missed. Group missed packets together at * the beginning of the 'packets' array. */ dp_packet_batch_refill(packets_, packet, i); + + /* Preserve the order of packet for flow batching. */ + index_map[n_missed] = recv_idx; + /* Put missed keys to the pointer arrays return to the caller */ missed_keys[n_missed++] = &keys[i]; } @@ -5856,6 +5890,8 @@ dfc_processing(struct dp_netdev_pmd_thread *pmd, struct netdev_flow_key *keys, struct netdev_flow_key **missed_keys, struct packet_batch_per_flow batches[], size_t *n_batches, + struct dp_packet_flow_map *flow_map, + size_t *n_flows, uint8_t *index_map, bool md_is_valid, odp_port_t port_no) { struct netdev_flow_key *key = &keys[0]; @@ -5867,6 +5903,8 @@ dfc_processing(struct dp_netdev_pmd_thread *pmd, int i; uint16_t tcp_flags; bool smc_enable_db; + size_t map_cnt = 0; + bool batch_enable = true; atomic_read_relaxed(&pmd->dp->smc_enable_db, &smc_enable_db); atomic_read_relaxed(&pmd->dp->emc_insert_min, &cur_min); @@ -5897,10 +5935,19 @@ dfc_processing(struct dp_netdev_pmd_thread *pmd, if ((*recirc_depth_get() == 0) && dp_packet_has_flow_mark(packet, &mark)) { flow = mark_to_flow_find(pmd, mark); - if (flow) { + if (OVS_LIKELY(flow)) { tcp_flags = parse_tcp_flags(packet); - dp_netdev_queue_batches(packet, flow, tcp_flags, batches, - n_batches); + if (OVS_LIKELY(batch_enable)) { + dp_netdev_queue_batches(packet, flow, tcp_flags, batches, + n_batches); + } else { + /* Flow batching should be performed only after fast-path + * processing is also completed for packets with emc miss + * or else it will result in reordering of packets with + * same datapath flows. */ + packet_enqueue_to_flow_map(packet, flow, tcp_flags, + flow_map, map_cnt++); + } continue; } } @@ -5923,13 +5970,27 @@ dfc_processing(struct dp_netdev_pmd_thread *pmd, } if (OVS_LIKELY(flow)) { tcp_flags = miniflow_get_tcp_flags(&key->mf); - dp_netdev_queue_batches(packet, flow, tcp_flags, batches, - n_batches); n_emc_hit++; + if (OVS_LIKELY(batch_enable)) { + dp_netdev_queue_batches(packet, flow, tcp_flags, batches, + n_batches); + } else { + /* Flow batching should be performed only after fast-path + * processing is also completed for packets with emc miss + * or else it will result in reordering of packets with + * same datapath flows. */ + packet_enqueue_to_flow_map(packet, flow, tcp_flags, + flow_map, map_cnt++); + } } else { /* Exact match cache missed. Group missed packets together at * the beginning of the 'packets' array. */ dp_packet_batch_refill(packets_, packet, i); + + /* Preserve the order of packet for flow batching. */ + index_map[n_missed] = map_cnt; + flow_map[map_cnt++].flow = NULL; + /* 'key[n_missed]' contains the key of the current packet and it * will be passed to SMC lookup. The next key should be extracted * to 'keys[n_missed + 1]'. @@ -5937,8 +5998,13 @@ dfc_processing(struct dp_netdev_pmd_thread *pmd, * which will be returned to the caller for future processing. */ missed_keys[n_missed] = key; key = &keys[++n_missed]; + + /* Skip batching for subsequent packets to avoid reordering. */ + batch_enable = false; } } + /* Count of packets which are not flow batched. */ + *n_flows = map_cnt; pmd_perf_update_counter(&pmd->perf_stats, PMD_STAT_EXACT_HIT, n_emc_hit); @@ -5947,8 +6013,8 @@ dfc_processing(struct dp_netdev_pmd_thread *pmd, } /* Packets miss EMC will do a batch lookup in SMC if enabled */ - smc_lookup_batch(pmd, keys, missed_keys, packets_, batches, - n_batches, n_missed); + smc_lookup_batch(pmd, keys, missed_keys, packets_, + n_missed, flow_map, index_map); return dp_packet_batch_size(packets_); } @@ -6035,8 +6101,8 @@ static inline void fast_path_processing(struct dp_netdev_pmd_thread *pmd, struct dp_packet_batch *packets_, struct netdev_flow_key **keys, - struct packet_batch_per_flow batches[], - size_t *n_batches, + struct dp_packet_flow_map *flow_map, + uint8_t *index_map, odp_port_t in_port) { const size_t cnt = dp_packet_batch_size(packets_); @@ -6116,6 +6182,9 @@ fast_path_processing(struct dp_netdev_pmd_thread *pmd, DP_PACKET_BATCH_FOR_EACH (i, packet, packets_) { struct dp_netdev_flow *flow; + /* Get the original order of this packet in received batch. */ + int recv_idx = index_map[i]; + uint16_t tcp_flags; if (OVS_UNLIKELY(!rules[i])) { continue; @@ -6126,9 +6195,12 @@ fast_path_processing(struct dp_netdev_pmd_thread *pmd, smc_insert(pmd, keys[i], hash); emc_probabilistic_insert(pmd, keys[i], flow); - dp_netdev_queue_batches(packet, flow, - miniflow_get_tcp_flags(&keys[i]->mf), - batches, n_batches); + /* Add these packets into the flow map in the same order + * as received. + */ + tcp_flags = miniflow_get_tcp_flags(&keys[i]->mf); + packet_enqueue_to_flow_map(packet, flow, tcp_flags, + flow_map, recv_idx); } pmd_perf_update_counter(&pmd->perf_stats, PMD_STAT_MASKED_HIT, @@ -6161,18 +6233,34 @@ dp_netdev_input__(struct dp_netdev_pmd_thread *pmd, struct netdev_flow_key *missed_keys[PKT_ARRAY_SIZE]; struct packet_batch_per_flow batches[PKT_ARRAY_SIZE]; size_t n_batches; + struct dp_packet_flow_map flow_map[PKT_ARRAY_SIZE]; + uint8_t index_map[PKT_ARRAY_SIZE]; + size_t n_flows, i; + odp_port_t in_port; n_batches = 0; dfc_processing(pmd, packets, keys, missed_keys, batches, &n_batches, - md_is_valid, port_no); + flow_map, &n_flows, index_map, md_is_valid, port_no); + if (!dp_packet_batch_is_empty(packets)) { /* Get ingress port from first packet's metadata. */ in_port = packets->packets[0]->md.in_port.odp_port; fast_path_processing(pmd, packets, missed_keys, - batches, &n_batches, in_port); + flow_map, index_map, in_port); } + /* Batch rest of packets which are in flow map. */ + for (i = 0; i < n_flows; i++) { + struct dp_packet_flow_map *map = &flow_map[i]; + + if (OVS_UNLIKELY(!map->flow)) { + continue; + } + dp_netdev_queue_batches(map->packet, map->flow, map->tcp_flags, + batches, &n_batches); + } + /* All the flow batches need to be reset before any call to * packet_batch_per_flow_execute() as it could potentially trigger * recirculation. When a packet matching flow ‘j’ happens to be @@ -6182,7 +6270,6 @@ dp_netdev_input__(struct dp_netdev_pmd_thread *pmd, * already its own batches[k] still waiting to be served. So if its * ‘batch’ member is not reset, the recirculated packet would be wrongly * appended to batches[k] of the 1st call to dp_netdev_input__(). */ - size_t i; for (i = 0; i < n_batches; i++) { batches[i].flow->batch = NULL; }