public inbox for virtio-dev@lists.linux.dev
 help / color / mirror / Atom feed
From: Heng Qi <hengqi@linux.alibaba.com>
To: "Michael S . Tsirkin" <mst@redhat.com>,
	Cornelia Huck <cohuck@redhat.com>
Cc: Parav Pandit <parav@nvidia.com>, Jason Wang <jasowang@redhat.com>,
	Yuri Benditovich <yuri.benditovich@daynix.com>,
	Xuan Zhuo <xuanzhuo@linux.alibaba.com>,
	virtio-comment@lists.oasis-open.org,
	virtio-dev@lists.oasis-open.org
Subject: Re: [virtio-dev] [PATCH v17] virtio-net: support inner header hash
Date: Tue, 20 Jun 2023 18:52:22 +0800	[thread overview]
Message-ID: <e1bd6857-916e-7198-fe5e-2f80a729e5d9@linux.alibaba.com> (raw)
In-Reply-To: <e642198c-a75c-f68a-641b-304b9f6b59ba@linux.alibaba.com>



在 2023/6/15 下午5:29, Heng Qi 写道:
>
> Hi all!
>
> If after reviewing it you feel this version meets the 
> necessaryrequirements,
> I kindly request a vote.
>
> Fixes: https://github.com/oasis-tcs/virtio-spec/issues/173

I would like to make a humble request that if there are no questions to 
this version,
I sincerely ask the chairs to open the voting channel!

Thanks!

>
>
>
> 在 2023/6/12 下午4:09, Heng Qi 写道:
>> 1. Currently, a received encapsulated packet has an outer and an 
>> inner header, but
>> the virtio device is unable to calculate the hash for the inner 
>> header. The same
>> flow can traverse through different tunnels, resulting in the 
>> encapsulated
>> packets being spread across multiple receive queues (refer to the 
>> figure below).
>> However, in certain scenarios, we may need to direct these 
>> encapsulated packets of
>> the same flow to a single receive queue. This facilitates the processing
>> of the flow by the same CPU to improve performance (warm caches, less 
>> locking, etc.).
>>
>>                 client1                    client2
>>                    |        +-------+         |
>>                    +------->|tunnels|<--------+
>>                             +-------+
>>                                |  |
>>                                v  v
>>                        +-----------------+
>>                        | monitoring host |
>>                        +-----------------+
>>
>> To achieve this, the device can calculate a symmetric hash based on 
>> the inner headers
>> of the same flow.
>>
>> 2. For legacy systems, they may lack entropy fields which modern 
>> protocols have in
>> the outer header, resulting in multiple flows with the same outer 
>> header but
>> different inner headers being directed to the same receive queue. 
>> This results in
>> poor receive performance.
>>
>> To address this limitation, inner header hash can be used to enable 
>> the device to advertise
>> the capability to calculate the hash for the inner packet, regaining 
>> better receive performance.
>>
>> Fixes: https://github.com/oasis-tcs/virtio-spec/issues/173
>>
>> Signed-off-by: Heng Qi <hengqi@linux.alibaba.com>
>> Reviewed-by: Xuan Zhuo <xuanzhuo@linux.alibaba.com>
>> Reviewed-by: Parav Pandit <parav@nvidia.com>
>> ---
>> v16->v17:
>>     1. Some small rewrites. @Parav Pandit
>>     2. Add Parav's Reviewed-by tag (Thanks!).
>>
>> v15->v16:
>>     1. Remove the hash_option. In order to delimit the inner header 
>> hash and RSS
>>        configuration, the ability to configure the outer src udp port 
>> hash is given
>>        to RSS. This is orthogonal to inner header hash, which will be 
>> done in the
>>        RSS capability extension topic (considered as an RSS extension 
>> together
>>        with the symmetric toeplitz hash algorithm, etc.). @Parav 
>> Pandit @Michael S . Tsirkin
>>     2. Fix a 'field' typo. @Parav Pandit
>>
>> v14->v15:
>>     1. Add tunnel hash option suggested by @Michael S . Tsirkin
>>     2. Adjust some descriptions.
>>
>> v13->v14:
>>     1. Move supported_hash_tunnel_types from config space into cvq 
>> command. @Parav Pandit
>>     2. Rebase to master branch.
>>     3. Some minor modifications.
>>
>> v12->v13:
>>     1. Add a GET command for hash_tunnel_types. @Parav Pandit
>>     2. Add tunneling protocol explanation. @Jason Wang
>>     3. Add comments on some usage scenarios for inner hash.
>>
>> v11->v12:
>>     1. Add a command VIRTIO_NET_CTRL_MQ_TUNNEL_CONFIG.
>>     2. Refine the commit log. @Michael S . Tsirkin
>>     3. Add some tunnel types.
>>
>> v10->v11:
>>     1. Revise commit log for clarity for readers.
>>     2. Some modifications to avoid undefined terms. @Parav Pandit
>>     3. Change VIRTIO_NET_F_HASH_TUNNEL dependency. @Parav Pandit
>>     4. Add the normative statements. @Parav Pandit
>>
>> v9->v10:
>>     1. Removed hash_report_tunnel related information. @Parav Pandit
>>     2. Re-describe the limitations of QoS for tunneling.
>>     3. Some clarification.
>>
>> v8->v9:
>>     1. Merge hash_report_tunnel_types into hash_report. @Parav Pandit
>>     2. Add tunnel security section. @Michael S . Tsirkin
>>     3. Add VIRTIO_NET_F_HASH_REPORT_TUNNEL.
>>     4. Fix some typos.
>>     5. Add more tunnel types. @Michael S . Tsirkin
>>
>> v7->v8:
>>     1. Add supported_hash_tunnel_types. @Jason Wang, @Parav Pandit
>>     2. Change hash_report_tunnel to hash_report_tunnel_types. @Parav 
>> Pandit
>>     3. Removed re-definition for inner packet hashing. @Parav Pandit
>>     4. Fix some typos. @Michael S . Tsirkin
>>     5. Clarify some sentences. @Michael S . Tsirkin
>>
>> v6->v7:
>>     1. Modify the wording of some sentences for clarity. @Michael S. 
>> Tsirkin
>>     2. Fix some syntax issues. @Michael S. Tsirkin
>>
>> v5->v6:
>>     1. Fix some syntax and capitalization issues. @Michael S. Tsirkin
>>     2. Use encapsulated/encaptulation uniformly. @Michael S. Tsirkin
>>     3. Move the links to introduction section. @Michael S. Tsirkin
>>     4. Clarify some sentences. @Michael S. Tsirkin
>>
>> v4->v5:
>>     1. Clarify some paragraphs. @Cornelia Huck
>>     2. Fix the u8 type. @Cornelia Huck
>>
>> v3->v4:
>>     1. Rename VIRTIO_NET_F_HASH_GRE_VXLAN_GENEVE_INNER to 
>> VIRTIO_NET_F_HASH_TUNNEL. @Jason Wang
>>     2. Make things clearer. @Jason Wang @Michael S. Tsirkin
>>     3. Keep the possibility to use inner hash for automatic receive 
>> steering. @Jason Wang
>>     4. Add the "Tunnel packet" paragraph to avoid repeating the GRE 
>> etc. many times. @Michael S. Tsirkin
>>
>> v2->v3:
>>     1. Add a feature bit for GRE/VXLAN/GENEVE inner hash. @Jason Wang
>>     2. Chang \field{hash_tunnel} to \field{hash_report_tunnel}. 
>> @Jason Wang, @Michael S. Tsirkin
>>
>> v1->v2:
>>     1. Remove the patch for the bitmask fix. @Michael S. Tsirkin
>>     2. Clarify some paragraphs. @Jason Wang
>>     3. Add \field{hash_tunnel} and VIRTIO_NET_HASH_REPORT_GRE. @Yuri 
>> Benditovich
>>
>>   device-types/net/description.tex        | 161 ++++++++++++++++++++++++
>>   device-types/net/device-conformance.tex |   1 +
>>   device-types/net/driver-conformance.tex |   1 +
>>   introduction.tex                        |  40 ++++++
>>   4 files changed, 203 insertions(+)
>>
>> diff --git a/device-types/net/description.tex 
>> b/device-types/net/description.tex
>> index 3030222..6bf65ff 100644
>> --- a/device-types/net/description.tex
>> +++ b/device-types/net/description.tex
>> @@ -88,6 +88,8 @@ \subsection{Feature bits}\label{sec:Device Types / 
>> Network Device / Feature bits
>>   \item[VIRTIO_NET_F_CTRL_MAC_ADDR(23)] Set MAC address through control
>>       channel.
>>   +\item[VIRTIO_NET_F_HASH_TUNNEL(51)] Device supports inner header 
>> hash for tunnel-encapsulated packets.
>> +
>>   \item[VIRTIO_NET_F_VQ_NOTF_COAL(52)] Device supports virtqueue 
>> notification coalescing.
>>     \item[VIRTIO_NET_F_NOTF_COAL(53)] Device supports notifications 
>> coalescing.
>> @@ -147,6 +149,7 @@ \subsubsection{Feature bit 
>> requirements}\label{sec:Device Types / Network Device
>>   \item[VIRTIO_NET_F_RSC_EXT] Requires VIRTIO_NET_F_HOST_TSO4 or 
>> VIRTIO_NET_F_HOST_TSO6.
>>   \item[VIRTIO_NET_F_RSS] Requires VIRTIO_NET_F_CTRL_VQ.
>>   \item[VIRTIO_NET_F_VQ_NOTF_COAL] Requires VIRTIO_NET_F_CTRL_VQ.
>> +\item[VIRTIO_NET_F_HASH_TUNNEL] Requires VIRTIO_NET_F_CTRL_VQ along 
>> with VIRTIO_NET_F_RSS and/or VIRTIO_NET_F_HASH_REPORT.
>>   \end{description}
>>     \subsubsection{Legacy Interface: Feature bits}\label{sec:Device 
>> Types / Network Device / Feature bits / Legacy Interface: Feature bits}
>> @@ -869,6 +872,7 @@ \subsubsection{Processing of Incoming 
>> Packets}\label{sec:Device Types / Network
>>   If the feature VIRTIO_NET_F_RSS was negotiated:
>>   \begin{itemize}
>>   \item The device uses \field{hash_types} of the 
>> virtio_net_rss_config structure as 'Enabled hash types' bitmask.
>> +\item The device uses \field{hash_tunnel_types} of the 
>> virtnet_hash_tunnel_config_get structure as 'Enabled encapsulation 
>> hash types' bitmask if VIRTIO_NET_F_HASH_TUNNEL was negotiated.
>>   \item The device uses a key as defined in \field{hash_key_data} and 
>> \field{hash_key_length} of the virtio_net_rss_config structure (see
>>   \ref{sec:Device Types / Network Device / Device Operation / Control 
>> Virtqueue / Receive-side scaling (RSS) / Setting RSS parameters}).
>>   \end{itemize}
>> @@ -876,6 +880,7 @@ \subsubsection{Processing of Incoming 
>> Packets}\label{sec:Device Types / Network
>>   If the feature VIRTIO_NET_F_RSS was not negotiated:
>>   \begin{itemize}
>>   \item The device uses \field{hash_types} of the 
>> virtio_net_hash_config structure as 'Enabled hash types' bitmask.
>> +\item The device uses \field{hash_tunnel_types} of the 
>> virtnet_hash_tunnel_config_get structure as 'Enabled encapsulation 
>> hash types' bitmask if VIRTIO_NET_F_HASH_TUNNEL was negotiated.
>>   \item The device uses a key as defined in \field{hash_key_data} and 
>> \field{hash_key_length} of the virtio_net_hash_config structure (see
>>   \ref{sec:Device Types / Network Device / Device Operation / Control 
>> Virtqueue / Automatic receive steering in multiqueue mode / Hash 
>> calculation}).
>>   \end{itemize}
>> @@ -891,6 +896,7 @@ \subsubsection{Processing of Incoming 
>> Packets}\label{sec:Device Types / Network
>>     \subparagraph{Supported/enabled hash types}
>>   \label{sec:Device Types / Network Device / Device Operation / 
>> Processing of Incoming Packets / Hash calculation for incoming 
>> packets / Supported/enabled hash types}
>> +This paragraph relies on definitions from \hyperref[intro:IP]{[IP]}, 
>> \hyperref[intro:UDP]{[UDP]} and \hyperref[intro:TCP]{[TCP]}.
>>   Hash types applicable for IPv4 packets:
>>   \begin{lstlisting}
>>   #define VIRTIO_NET_HASH_TYPE_IPv4              (1 << 0)
>> @@ -1001,6 +1007,161 @@ \subsubsection{Processing of Incoming 
>> Packets}\label{sec:Device Types / Network
>>   (see \ref{sec:Device Types / Network Device / Device Operation / 
>> Processing of Incoming Packets / Hash calculation for incoming 
>> packets / IPv6 packets without extension header}).
>>   \end{itemize}
>>   +\paragraph{Inner Header Hash}
>> +\label{sec:Device Types / Network Device / Device Operation / 
>> Processing of Incoming Packets / Inner Header Hash}
>> +
>> +If VIRTIO_NET_F_HASH_TUNNEL has been negotiated, the driver can send 
>> commands VIRTIO_NET_CTRL_HASH_TUNNEL_SET
>> +and VIRTIO_NET_CTRL_HASH_TUNNEL_GET for the inner header hash 
>> configuration.
>> +
>> +struct virtnet_hash_tunnel_config_set {
>> +    le32 hash_tunnel_types;
>> +};
>> +
>> +struct virtnet_hash_tunnel_config_get {
>> +    le32 supported_hash_tunnel_types;
>> +    le32 hash_tunnel_types;
>> +};
>> +
>> +#define VIRTIO_NET_CTRL_HASH_TUNNEL 7
>> + #define VIRTIO_NET_CTRL_HASH_TUNNEL_SET 0
>> + #define VIRTIO_NET_CTRL_HASH_TUNNEL_GET 1
>> +
>> +Field \field{supported_hash_tunnel_types} provided by the device 
>> indicates that the device supports inner header hash for these 
>> encapsulation types.
>> +\field{supported_hash_tunnel_types} contains the bitmask of 
>> supported tunnel hash types. See \ref{sec:Device Types / Network 
>> Device / Device Operation / Processing
>> +of Incoming Packets / Hash calculation for incoming packets / 
>> Supported/enabled encapsulation hash types}.
>> +
>> +Field \field{hash_tunnel_types} contains the bitmask of configured 
>> tunnel hash types.
>> +See \ref{sec:Device Types / Network Device / Device Operation / 
>> Processing of Incoming Packets / Hash calculation for incoming 
>> packets / Supported/enabled encapsulation hash types}.
>> +
>> +The class VIRTIO_NET_CTRL_HASH_TUNNEL has the following commands:
>> +\begin{itemize}
>> +\item VIRTIO_NET_CTRL_HASH_TUNNEL_SET: set \field{hash_tunnel_types} 
>> for the device using the virtnet_hash_tunnel_config_set structure, 
>> which is read-only for the device.
>> +\item VIRTIO_NET_CTRL_HASH_TUNNEL_GET: get \field{hash_tunnel_types} 
>> and \field{supported_hash_tunnel_types} from the device using the 
>> virtnet_hash_tunnel_config_get
>> +      structure, which is write-only for the device.
>> +\end{itemize}
>> +
>> +\subparagraph{Tunnel/Encapsulated packet}
>> +\label{sec:Device Types / Network Device / Device Operation / 
>> Processing of Incoming Packets / Hash calculation for incoming 
>> packets / Tunnel/Encapsulated packet}
>> +
>> +A tunnel packet is encapsulated from the original packet based on 
>> the tunneling protocol (only a single level of
>> +encapsulation is currently supported). The encapsulated packet 
>> contains an outer header and an inner header, and
>> +the device calculates the hash over either the inner header or the 
>> outer header.
>> +
>> +If VIRTIO_NET_F_HASH_TUNNEL is negotiated and a received 
>> encapsulated packet's outer header matches one of the
>> +configured \field{hash_tunnel_types}, the hash of the inner header 
>> is calculated.
>> +
>> +Supported encapsulated packet types:
>> +\begin{itemize}
>> +\item The outer header of the following encapsulation types does not 
>> contain the transport protocol:
>> +\begin{itemize}
>> +\item \hyperref[intro:ipip]{[IPIP]}: the outer header is over IPv4 
>> and the inner header is over IPv4.
>> +\item \hyperref[intro:nvgre]{[NVGRE]}: the outer header is over 
>> IPv4/IPv6 and the inner header is over IPv4/IPv6.
>> +\item \hyperref[intro:gre_rfc2784]{[GRE_rfc2784]}: the outer header 
>> is over IPv4 and the inner header is over IPv4.
>> +\item \hyperref[intro:gre_rfc2890]{[GRE_rfc2890]}: the outer header 
>> is over IPv4 and the inner header is over IPv4.
>> +\item \hyperref[intro:gre_rfc7676]{[GRE_rfc7676]}: the outer header 
>> is over IPv4/IPv6 and the inner header is over IPv4/IPv6.
>> +\end{itemize}
>> +\item The outer header of the following encapsulation types uses UDP 
>> as the transport protocol:
>> +\begin{itemize}
>> +\item \hyperref[intro:vxlan]{[VXLAN]}: the outer header is over 
>> IPv4/IPv6 and the inner header is over IPv4/IPv6.
>> +\item \hyperref[intro:geneve]{[GENEVE]}: the outer header is over 
>> IPv4/IPv6 and the inner header is over IPv4/IPv6.
>> +\item \hyperref[intro:vxlan_gpe]{[VXLAN-GPE]}: the outer header is 
>> over IPv4/IPv6 and the inner header is over IPv4/IPv6.
>> +\item \hyperref[intro:gre_in_udp_rfc8086]{[GRE-in-UDP]}: the outer 
>> header is over IPv4/IPv6 and the inner header is over IPv4/IPv6.
>> +\end{itemize}
>> +\end{itemize}
>> +
>> +If VIRTIO_NET_HASH_TUNNEL_TYPE_NONE is set or the encapsulation type 
>> is not included in the configured \field{hash_tunnel_types},
>> +the hash of the outer header is calculated for the received 
>> encapsulated packet.
>> +
>> +The hash is calculated for the received non-encapsulated packet as 
>> if VIRTIO_NET_F_HASH_TUNNEL was not negotiated.
>> +
>> +\subparagraph{Supported/enabled encapsulation hash types}
>> +\label{sec:Device Types / Network Device / Device Operation / 
>> Processing of Incoming Packets / Hash calculation for incoming 
>> packets / Supported/enabled encapsulation hash types}
>> +
>> +\begin{lstlisting}
>> +#define VIRTIO_NET_HASH_TUNNEL_TYPE_NONE        (1 << 0)
>> +\end{lstlisting}
>> +
>> +Supported encapsulation hash types:
>> +Hash type applicable for inner payload of the 
>> \hyperref[intro:gre_rfc2784]{[GRE_rfc2784]} packet:
>> +\begin{lstlisting}
>> +#define VIRTIO_NET_HASH_TUNNEL_TYPE_GRE_2784    (1 << 1)
>> +\end{lstlisting}
>> +Hash type applicable for inner payload of the 
>> \hyperref[intro:gre_rfc2890]{[GRE_rfc2890]} packet:
>> +\begin{lstlisting}
>> +#define VIRTIO_NET_HASH_TUNNEL_TYPE_GRE_2890    (1 << 2)
>> +\end{lstlisting}
>> +Hash type applicable for inner payload of the 
>> \hyperref[intro:gre_rfc7676]{[GRE_rfc7676]} packet:
>> +\begin{lstlisting}
>> +#define VIRTIO_NET_HASH_TUNNEL_TYPE_GRE_7676    (1 << 3)
>> +\end{lstlisting}
>> +Hash type applicable for inner payload of the 
>> \hyperref[intro:gre_in_udp_rfc8086]{[GRE-in-UDP]} packet:
>> +\begin{lstlisting}
>> +#define VIRTIO_NET_HASH_TUNNEL_TYPE_GRE_UDP     (1 << 4)
>> +\end{lstlisting}
>> +Hash type applicable for inner payload of the 
>> \hyperref[intro:vxlan]{[VXLAN]} packet:
>> +\begin{lstlisting}
>> +#define VIRTIO_NET_HASH_TUNNEL_TYPE_VXLAN       (1 << 5)
>> +\end{lstlisting}
>> +Hash type applicable for inner payload of the 
>> \hyperref[intro:vxlan_gpe]{[VXLAN-GPE]} packet:
>> +\begin{lstlisting}
>> +#define VIRTIO_NET_HASH_TUNNEL_TYPE_VXLAN_GPE   (1 << 6)
>> +\end{lstlisting}
>> +Hash type applicable for inner payload of the 
>> \hyperref[intro:geneve]{[GENEVE]} packet:
>> +\begin{lstlisting}
>> +#define VIRTIO_NET_HASH_TUNNEL_TYPE_GENEVE      (1 << 7)
>> +\end{lstlisting}
>> +Hash type applicable for inner payload of the 
>> \hyperref[intro:ipip]{[IPIP]} packet:
>> +\begin{lstlisting}
>> +#define VIRTIO_NET_HASH_TUNNEL_TYPE_IPIP        (1 << 8)
>> +\end{lstlisting}
>> +Hash type applicable for inner payload of the 
>> \hyperref[intro:nvgre]{[NVGRE]} packet:
>> +\begin{lstlisting}
>> +#define VIRTIO_NET_HASH_TUNNEL_TYPE_NVGRE       (1 << 9)
>> +\end{lstlisting}
>> +
>> +\subparagraph{Advice}
>> +Usage scenarios of inner header hash (but not limited to):
>> +\begin{itemize}
>> +\item Legacy tunneling protocols that lack entropy in the outer 
>> header use inner header hash to hash flows
>> +      with the same outer header but different inner headers to 
>> different queues for better-receiving performance.
>> +\item In scenarios where the same flow passing through different 
>> tunnels is expected to be received in the same queue,
>> +      to utilize warm caches, to have less locking etc. are 
>> optimized to obtain receiving performance.
>> +\end{itemize}
>> +
>> +For scenarios with sufficient outer entropy or no inner header hash 
>> requirements, inner header hash may not be needed:
>> +A tunnel is often expected to isolate the external network from the 
>> internal one. By completely ignoring entropy
>> +in the outer header and replacing it with entropy from the inner 
>> header, for hash calculations, this expectation
>> +might be violated to a certain extent, depending on how the hash is 
>> used. When the hash use is limited to RSS queue
>> +selection, inner header hash may have quality of service (QoS) 
>> limitations.
>> +
>> +Possible mitigations:
>> +\begin{itemize}
>> +\item Use a tool with good forwarding performance to keep the 
>> receive queue from dropping packets.
>> +\item If the QoS is unavailable, the driver can set 
>> \field{hash_tunnel_types} to VIRTIO_NET_HASH_TUNNEL_TYPE_NONE
>> +      to disable inner header hash for encapsulated packets.
>> +\item Perform appropriate QoS before packets consume the receive 
>> buffers of the receive queues.
>> +\end{itemize}
>> +
>> +\devicenormative{\subparagraph}{Inner Header Hash}{Device Types / 
>> Network Device / Device Operation / Control Virtqueue / Inner Header 
>> Hash}
>> +
>> +The device MUST calculate the hash on the outer header if the type 
>> of the received encapsulated packet does not match
>> +any value of the configured \field{hash_tunnel_types}.
>> +
>> +The device MUST respond to the VIRTIO_NET_CTRL_HASH_TUNNEL_SET 
>> command with VIRTIO_NET_ERR if the device receives
>> +an unsupported or unrecognized VIRTIO_NET_HASH_TUNNEL_TYPE_ flag.
>> +
>> +The device MUST provide the values of 
>> \field{supported_hash_tunnel_types} if it offers the 
>> VIRTIO_NET_F_HASH_TUNNEL feature.
>> +
>> +Upon reset, the device MUST initialize \field{hash_tunnel_type} to 0.
>> +
>> +\drivernormative{\subparagraph}{Inner Header Hash}{Device Types / 
>> Network Device / Device Operation / Control Virtqueue / Inner Header 
>> Hash}
>> +
>> +The driver MUST have negotiated the VIRTIO_NET_F_HASH_TUNNEL feature 
>> when issuing commands VIRTIO_NET_CTRL_HASH_TUNNEL_SET and 
>> VIRTIO_NET_CTRL_HASH_TUNNEL_GET.
>> +
>> +The driver MUST ignore the values received from the 
>> VIRTIO_NET_CTRL_HASH_TUNNEL_GET command if the device responds with 
>> VIRTIO_NET_ERR.
>> +
>> +The driver MUST NOT set any VIRTIO_NET_HASH_TUNNEL_TYPE_ flags which 
>> are not supported by the device.
>> +
>>   \paragraph{Hash reporting for incoming packets}
>>   \label{sec:Device Types / Network Device / Device Operation / 
>> Processing of Incoming Packets / Hash reporting for incoming packets}
>>   diff --git a/device-types/net/device-conformance.tex 
>> b/device-types/net/device-conformance.tex
>> index 54f6783..f88f48b 100644
>> --- a/device-types/net/device-conformance.tex
>> +++ b/device-types/net/device-conformance.tex
>> @@ -14,4 +14,5 @@
>>   \item \ref{devicenormative:Device Types / Network Device / Device 
>> Operation / Control Virtqueue / Automatic receive steering in 
>> multiqueue mode}
>>   \item \ref{devicenormative:Device Types / Network Device / Device 
>> Operation / Control Virtqueue / Receive-side scaling (RSS) / RSS 
>> processing}
>>   \item \ref{devicenormative:Device Types / Network Device / Device 
>> Operation / Control Virtqueue / Notifications Coalescing}
>> +\item \ref{devicenormative:Device Types / Network Device / Device 
>> Operation / Control Virtqueue / Inner Header Hash}
>>   \end{itemize}
>> diff --git a/device-types/net/driver-conformance.tex 
>> b/device-types/net/driver-conformance.tex
>> index 97d0cc1..9d853d9 100644
>> --- a/device-types/net/driver-conformance.tex
>> +++ b/device-types/net/driver-conformance.tex
>> @@ -14,4 +14,5 @@
>>   \item \ref{drivernormative:Device Types / Network Device / Device 
>> Operation / Control Virtqueue / Offloads State Configuration / 
>> Setting Offloads State}
>>   \item \ref{drivernormative:Device Types / Network Device / Device 
>> Operation / Control Virtqueue / Receive-side scaling (RSS) }
>>   \item \ref{drivernormative:Device Types / Network Device / Device 
>> Operation / Control Virtqueue / Notifications Coalescing}
>> +\item \ref{drivernormative:Device Types / Network Device / Device 
>> Operation / Control Virtqueue / Inner Header Hash}
>>   \end{itemize}
>> diff --git a/introduction.tex b/introduction.tex
>> index b7155bf..3f34950 100644
>> --- a/introduction.tex
>> +++ b/introduction.tex
>> @@ -102,6 +102,46 @@ \section{Normative 
>> References}\label{sec:Normative References}
>>       Standards for Efficient Cryptography Group(SECG), ``SEC1: 
>> Elliptic Cureve Cryptography'', Version 1.0, September 2000.
>>       \newline\url{https://www.secg.org/sec1-v2.pdf}\\
>>   + \phantomsection\label{intro:gre_rfc2784}\textbf{[GRE_rfc2784]} &
>> +    Generic Routing Encapsulation. This protocol is only specified 
>> for IPv4 and used as either the payload or delivery protocol.
>> +    \newline\url{https://datatracker.ietf.org/doc/rfc2784/}\\
>> + \phantomsection\label{intro:gre_rfc2890}\textbf{[GRE_rfc2890]} &
>> +    Key and Sequence Number Extensions to GRE 
>> \ref{intro:gre_rfc2784}. This protocol describes extensions by which 
>> two fields, Key and
>> +    Sequence Number, can be optionally carried in the GRE Header 
>> \ref{intro:gre_rfc2784}.
>> +    \newline\url{https://www.rfc-editor.org/rfc/rfc2890}\\
>> + \phantomsection\label{intro:gre_rfc7676}\textbf{[GRE_rfc7676]} &
>> +    IPv6 Support for Generic Routing Encapsulation (GRE). This 
>> protocol is specified for IPv6 and used as either the payload or
>> +    delivery protocol. Note that this does not change the GRE header 
>> format or any behaviors specified by RFC 2784 or RFC 2890.
>> +    \newline\url{https://datatracker.ietf.org/doc/rfc7676/}\\
>> + \phantomsection\label{intro:gre_in_udp_rfc8086}\textbf{[GRE-in-UDP]} &
>> +    GRE-in-UDP Encapsulation. This specifies a method of 
>> encapsulating network protocol packets within GRE and UDP headers.
>> +    This GRE-in-UDP encapsulation allows the UDP source port field 
>> to be used as an entropy field. This protocol is specified for IPv4 
>> and IPv6,
>> +    and used as either the payload or delivery protocol.
>> +    \newline\url{https://www.rfc-editor.org/rfc/rfc8086}\\
>> +    \phantomsection\label{intro:vxlan}\textbf{[VXLAN]} &
>> +    Virtual eXtensible Local Area Network.
>> +    \newline\url{https://datatracker.ietf.org/doc/rfc7348/}\\
>> +    \phantomsection\label{intro:vxlan-gpe}\textbf{[VXLAN-GPE]} &
>> +    Generic Protocol Extension for VXLAN. This protocol describes 
>> extending Virtual eXtensible Local Area Network (VXLAN) via changes 
>> to the VXLAN header.
>> + 
>> \newline\url{https://www.ietf.org/archive/id/draft-ietf-nvo3-vxlan-gpe-12.txt}\\
>> +    \phantomsection\label{intro:geneve}\textbf{[GENEVE]} &
>> +    Generic Network Virtualization Encapsulation.
>> +    \newline\url{https://datatracker.ietf.org/doc/rfc8926/}\\
>> +    \phantomsection\label{intro:ipip}\textbf{[IPIP]} &
>> +    IP Encapsulation within IP.
>> +    \newline\url{https://www.rfc-editor.org/rfc/rfc2003}\\
>> +    \phantomsection\label{intro:nvgre}\textbf{[NVGRE]} &
>> +    NVGRE: Network Virtualization Using Generic Routing Encapsulation
>> +    \newline\url{https://www.rfc-editor.org/rfc/rfc7637.html}\\
>> +    \phantomsection\label{intro:IP}\textbf{[IP]} &
>> +    INTERNET PROTOCOL
>> +    \newline\url{https://www.rfc-editor.org/rfc/rfc791}\\
>> +    \phantomsection\label{intro:UDP}\textbf{[UDP]} &
>> +    User Datagram Protocol
>> +    \newline\url{https://www.rfc-editor.org/rfc/rfc768}\\
>> +    \phantomsection\label{intro:TCP}\textbf{[TCP]} &
>> +    TRANSMISSION CONTROL PROTOCOL
>> +    \newline\url{https://www.rfc-editor.org/rfc/rfc793}\\
>>   \end{longtable}
>>     \section{Non-Normative References}
>
>
> This publicly archived list offers a means to provide input to the
> OASIS Virtual I/O Device (VIRTIO) TC.
>
> In order to verify user consent to the Feedback License terms and
> to minimize spam in the list archive, subscription is required
> before posting.
>
> Subscribe: virtio-comment-subscribe@lists.oasis-open.org
> Unsubscribe: virtio-comment-unsubscribe@lists.oasis-open.org
> List help: virtio-comment-help@lists.oasis-open.org
> List archive: https://lists.oasis-open.org/archives/virtio-comment/
> Feedback License: https://www.oasis-open.org/who/ipr/feedback_license.pdf
> List Guidelines: 
> https://www.oasis-open.org/policies-guidelines/mailing-lists
> Committee: https://www.oasis-open.org/committees/virtio/
> Join OASIS: https://www.oasis-open.org/join/


---------------------------------------------------------------------
To unsubscribe, e-mail: virtio-dev-unsubscribe@lists.oasis-open.org
For additional commands, e-mail: virtio-dev-help@lists.oasis-open.org


  reply	other threads:[~2023-06-20 10:52 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2023-06-12  8:09 [virtio-dev] [PATCH v17] virtio-net: support inner header hash Heng Qi
2023-06-15  9:29 ` Heng Qi
2023-06-20 10:52   ` Heng Qi [this message]
2023-06-20 11:00     ` Michael S. Tsirkin
2023-06-21 15:46   ` [virtio-dev] Re: [virtio-comment] " Michael S. Tsirkin
2023-06-20 12:06 ` [virtio-dev] Re: [virtio-comment] " Michael S. Tsirkin
2023-06-20 13:48   ` Heng Qi
2023-06-20 14:03     ` Michael S. Tsirkin
2023-06-20 14:29       ` Heng Qi

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=e1bd6857-916e-7198-fe5e-2f80a729e5d9@linux.alibaba.com \
    --to=hengqi@linux.alibaba.com \
    --cc=cohuck@redhat.com \
    --cc=jasowang@redhat.com \
    --cc=mst@redhat.com \
    --cc=parav@nvidia.com \
    --cc=virtio-comment@lists.oasis-open.org \
    --cc=virtio-dev@lists.oasis-open.org \
    --cc=xuanzhuo@linux.alibaba.com \
    --cc=yuri.benditovich@daynix.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox