Configuring PNIC to perform flow processing offload using virtual port identifiers

Information

  • Patent Grant
  • 11792134
  • Patent Number
    11,792,134
  • Date Filed
    Tuesday, December 8, 2020
    3 years ago
  • Date Issued
    Tuesday, October 17, 2023
    a year ago
Abstract
Some embodiments of the invention provide a method for configuring a physical network card or physical network controller (pNIC) to provide flow processing offload (FPO) for a host computer connected to the pNIC. The host computers host a set of compute nodes in a virtual network. The set of compute nodes are each associated with a set of interfaces that are each assigned a locally-unique virtual port identifier (VPID) by a flow processing and action generator. The pNIC includes a set of interfaces that are assigned physical port identifiers (PPIDs) by the pNIC. The method includes providing the pNIC with a set of mappings between VPIDs and PPIDs. The method also includes sending updates to the mappings as compute nodes migrate, connect to different interfaces of the pNIC, are assigned different VPIDs, etc. In some embodiments, the flow processing and action generator executes on processing units of the host computer, while in other embodiments, the flow processing and action generator executes on a set of processing units of a pNIC that includes flow processing hardware and a set of programmable processing units.
Description
BACKGROUND

More operations normally associated with a server are being pushed to programmable network interface controllers (NICs). Some of the operations pushed to programmable NICs include flow processing for virtualized compute nodes. As these programmable NICs become more prevalent and perform more flow processing on behalf of virtualized networks, optimizations to the flow processing will enhance the functionality of programmable NICs. Accordingly, it is desirable to optimize the flow processing offloaded to a programmable MC.


BRIEF SUMMARY

Some embodiments of the invention provide a method for configuring a physical network card or physical network controller (pNIC) to provide flow processing offload (FPO) for a host computer connected to the pNIC. The host computers host a set of compute nodes (e.g., virtual machines, Pods, containers, etc.) in a virtual network. The set of compute nodes are each associated with a set of interfaces (virtual NICs, ports, etc.) that are each assigned a locally-unique virtual port identifier (VPID) by a virtual network controller. The pNIC includes a set of interfaces (physical ports connected to a physical network, peripheral component interconnect express (PCIe) ports, physical functions (PFs), virtual functions (VFs), etc.) that are assigned physical port identifiers (PPIDs) by the pNIC. The method includes providing the pNIC with a set of mappings between VPIDs and PPIDs. The method also includes sending updates to the mappings as compute nodes migrate, connect to different interfaces of the pNIC, are assigned different VPIDs, etc. The method of some embodiments is performed by a flow processing and action generator. In some embodiments, the flow processing and action generator executes on processing units of the host computer, while in other embodiments, the flow processing and action generator executes on a set of processing units of a pNIC that includes flow processing hardware and a set of programmable processing units.


The method further includes providing the pNIC with a set of flow entries for a set of data message flows associated with the set of compute nodes. The set of flow entries, in some embodiments, define one or both of a set of matching criteria and an action using VPIDs. In some embodiments, the action specifies a destination. Each destination, in some embodiments, is specified in terms of a VPID and the pNIC resolves the VPID into a PPID (i.e., egress interface) using the set of mappings. Each flow entry, in some embodiments, is for a particular data message flow and is generated based on a first data message received in the data message flow. The flow entry is generated, in some embodiments, based on the result of data message processing performed by a virtual (e.g., software) switch and provided to the pNIC to allow the pNIC to process subsequent data messages in the data message flow.


In some embodiments, the pNIC stores the set of flow entries and the mappings in network processing hardware to perform flow processing for the set of compute nodes executing on the connected host computer. The flow entries and mapping tables, in some embodiments, are stored in separate memory caches (e.g., content-addressable memory (CAM), ternary CAM (TCAM), etc.) to perform fast lookups. In some embodiments, the pNIC receives data messages at an interface of the pNIC and performs a lookup in the set of flow entries stored by the network processing hardware to identify an action for the data message based on matching criteria associated with the data message. Flow entries, in some embodiments, include a set of criteria for identifying a data message flow and an action that specifies forwarding the data message to an interface identified by a VPID. If a flow entry specifying a VPID as a destination for a received data message exists, the pNIC performs a lookup in the VPID to PPID mappings to identify an interface of the pNIC associated with the VPID. The pNIC then forwards the data message to an interface of the pNIC identified by the PPID mapped to the specified destination VPID.


The network processing hardware, in some embodiments, is also programmed with a default flow entry that identifies an interface of the pNIC as a destination for data messages not matching with other flow entries. The identified interface, in some embodiments, is an interface used to forward the data message to a virtual (e.g., software) switch of the flow processing and action generator. The virtual switch, in some embodiments, performs first-data-message processing (e.g. slow path processing) and based on the result of the processing returns a flow entry to the network processing hardware for processing subsequent data messages in the data message flow to which the data message belongs.


Some embodiments provide a method for updating VPID to PPID mappings when a compute node connects to a different interface of the pNIC. Connecting to a different interface of the pNIC occurs, in some embodiments, due to a compute node being migrated to a different interface of the pNIC or even a different host computer that is connected to a different interface of the pNIC when the pNIC provides FPO for multiple host computers. In some embodiments, connecting to a different interface of the pNIC is based on a VM transitioning from a passthrough mode (e.g., connected to a VF) to an emulated mode (e.g., connected to a PF) or vice versa. In such cases, flow entries identifying the VPID of the compute-node interface as a destination are still valid even though the compute-node interface is now connected to a different pNIC interface (i.e., with a different PPID). Data messages matching those flow entries are directed to the pNIC interface currently connected to the compute-node interface based on a lookup in the mapping table identifying the updated mapping of the VPID to the PPID of the currently-connected pNIC interface.


The method, in some embodiments, also addresses cases in which the pNIC includes multiple physical ports (PPs) connected to a physical network for which link aggregation (e.g., LACP, trunking, bundling, teaming, etc.) is enabled. A mapping of a first VPID to a first PPID of a first PP connected to the physical network, in some embodiments, is updated to map the first VPID to a second PPID of a second PP connected to the physical network in the event of (1) a failure of the first PP or (2) an updated load balancing decision to direct the traffic associated with the VPID to the second PP instead of the first PP.


In some embodiments, an updated VPID to PPID is required for a compute-node interface that is assigned a new VPID after a change to the configuration of the compute-node interface even if the vNIC is still connected to the same interface of the pNIC. For any of the updated VPID to PPID mappings, the flow processing and action generator, in some embodiments, sends a set of instructions (e.g., two separate instructions or a single instruction to perform two actions) to remove the invalid VPID to PPID mapping and create a new VPID to PPID mapping for the updated association between a VPID and a PPID. Because the configuration of the compute-node interface has changed, some previous data message flows are no longer valid and any data messages matching flow entries for those data message flows are redirected to the virtual switch of the flow processing and action generator to evaluate based on the new configuration of the compute-node interface. In some embodiments, the redirection to the virtual switch is based on a lookup in the VPID to PPID mapping table returning a ‘fault’ (e.g., a null result or other result indicating that there is no entry for the VPID in the mapping table). In some embodiments, data messages that match a flow entry but fail to match a VPID to PPID mapping are forwarded to the flow processing and action generator along with an identifier for the flow entry that the data message matched in order to allow the flow processing and action generator to instruct the pNIC to remove the invalid flow entry (i.e., a flow entry pointing to a VPID that no longer exists) from the set of flow entries stored by the network processing hardware.


The flow processing and action generator, in some embodiments, stores information regarding flow entries generated for each VPID identified as a source destination VPID. When a VPID for a particular compute-node interface is invalidated (e.g., as described above) and a new configuration has taken effect, the flow processing and action generator can identify the flow entries associated with the invalidated VPID and instruct the pNIC to remove the identified flow entries from the set of flow entries stored by the network processing hardware. This process need not be performed before the configuration change can take effect and can be performed as a background process by the flow processing and action generator and the pNIC when processing capacity is available.


Removing the flow entries specifying the invalidated VPID as a destination allows the VPID to be reused without concern for old flows associated with the compute-node interface previously associated with the invalidated VPID being directed to the compute-node interface currently associated with the reused VPID. Additionally, the networking processing hardware, in some embodiments, performs a process for aging out flow entries that have not been used (i.e., no data messages matching the flow entry have been received) for a particular amount of time. Accordingly, in such embodiments, the VPIDs may be reused safely even without the flow processing and action generator instructing the pNIC to remove the invalidated flow entries after an amount of time based on the particular amount of time (e.g., the particular amount of time plus a timeout for previously active flows directed to the invalidated VPID). In some embodiments, the VPIDs are configured to have more bits than the PPIDs such that the VPID to PPID mapping is sparse (i.e., there are at least as many unused VPIDs as the number of possible PPIDs).


The mapping table, in some embodiments, is also used to identify VPIDs associated with PPIDs on which a data message is received. A data message received at a PPID is associated with the VPID to which the PPID maps, and the lookup in the set of flow entries is performed based on the VPID as well as a set of other matching criteria. For PPIDs that are associated with multiple VPIDs, e.g., a physical function (PF) of the pNIC connected to an interface of a virtual switch connected to multiple compute-node interfaces each with a different VPID, a data message received at the PF is already associated with a VPID to distinguish the traffic from different sources. Additionally, for VPIDs that map to the PPID identifying the PF connected to the virtual switch, some embodiments include an indication in the mapping table (e.g., a flag bit associated with the mapping entry) that the VPID should be included with the forwarded data message matching the mapping entry.


In some embodiments, the mapping table is not programmed with mappings for VPIDs that connect to a virtual switch, and the networking processing hardware is programmed to send any data messages that match a flow entry but fail to match an entry in the mapping table to the pNIC interface connected to the virtual switch (i.e., of the flow processing and action generator) along with the destination VPID specified in the matching flow entry. The virtual switch can then forward the data message based on the destination VPID or other matching criteria of the data message. The virtual switch, in some embodiments, includes a fast path processing pipeline based on stored flow entries as well as a slow path processing pipeline based on the configuration of the virtual network and the characteristics of a received data message.


The preceding Summary is intended to serve as a brief introduction to some embodiments of the invention. It is not meant to be an introduction or overview of all inventive subject matter disclosed in this document. The Detailed Description that follows and the Drawings that are referred to in the Detailed Description will further describe the embodiments described in the Summary as well as other embodiments. Accordingly, to understand all of the embodiments described by this document, a full review of the Summary, the Detailed Description, the Drawings, and the Claims is needed. Moreover, the claimed subject matters are not to be limited by the illustrative details in the Summary, the Detailed Description, and the Drawings, but rather are to be defined by the appended claims, because the claimed subject matters can be embodied in other specific forms without departing from the spirit of the subject matters.





BRIEF DESCRIPTION OF THE DRAWINGS

The novel features of the invention are set forth in the appended claims. However, for purposes of explanation, several embodiments of the invention are set forth in the following figures.



FIG. 1 illustrates an exemplary system configured to provide FPO for a host computer at a physical NIC.



FIG. 2 illustrates the pNIC of FIG. 1 along with a flow processing and action generator (FPAG) that populates the mapping table and the flow entry table of FIG. 1.



FIG. 3 illustrates a more detailed view of the FPAG that includes a mapping generator for generating the VPID to PPID mapping entries and a local controller that interacts with a set of SDN controllers and a set of SDN managers.



FIG. 4 illustrates a system in which the FPAG executes on a set of general purpose processors of the pNIC.



FIG. 5 illustrates a system in which the FPAG executes on one of multiple servers on behalf of all the servers connected to the pNIC.



FIG. 6 conceptually illustrates a process performed in some embodiments to provide VPID to PPID mappings to be stored in a mapping table of the pNIC to perform flow processing.



FIG. 7 conceptually illustrates a process for providing flow entries to the FPO hardware from a flow processing and action generator.



FIG. 8 conceptually illustrates a process for processing a data message received at the pNIC.



FIG. 9 illustrates flow processing hardware of a pNIC storing a mapping table, and a flow processing table.



FIG. 10 illustrates a VM migration from one virtual function of the pNIC to another virtual function of the pNIC.



FIG. 11 illustrates a VM migration from one host computer connected to a virtual function of the pNIC to another host computer connected to a virtual function of the pNIC.



FIG. 12 illustrates a system including a VM transitioning at a time “T1” from a passthrough mode to an emulated mode.



FIG. 13 illustrates selected elements of a system in which a change to a configuration of a vNIC of a VM causes the VPID of the vNIC to change.



FIG. 14 conceptually illustrates a process for removing invalid flow entries as a background process that can be performed as resources are available.



FIG. 15 conceptually illustrates a process performed by FPO hardware to remove flow entries specifying invalidated VPIDs.



FIG. 16 illustrates a system in which link aggregation of physical network ports is enabled.



FIG. 17 conceptually illustrates a computer system with which some embodiments of the invention are implemented.





DETAILED DESCRIPTION

In the following detailed description of the invention, numerous details, examples, and embodiments of the invention are set forth and described. However, it will be clear and apparent to one skilled in the art that the invention is not limited to the embodiments set forth and that the invention may be practiced without some of the specific details and examples discussed.


Some embodiments of the invention provide a method for configuring a physical network card or physical network controller (pNIC) to provide flow processing offload (FPO) for a host computer connected to the pNIC. The host computers host a set of compute nodes (e.g., virtual machines (VMs), Pods, containers, etc.) in a virtual or logical network. The set of compute nodes are each associated with a set of interfaces (virtual NICs, ports, etc.) that are each assigned a locally-unique virtual port identifier (VPID) by a flow processing and action generator. The pNIC includes a set of interfaces (physical ports connected to a physical network, peripheral component interconnect express (PCIe) ports including physical functions (PFs) and virtual functions (VFs), etc.) that are assigned physical port identifiers (PPIDs) by the pNIC.


As used in this document, physical functions (PFs) and virtual functions (VFs) refer to ports exposed by a pNIC using a PCIe interface. A PF refers to an interface of the pNIC that is recognized as a unique resource with a separately configurable PCIe interface (e.g., separate from other PFs on a same pNIC). The VF refers to a virtualized interface that is not separately configurable and is not recognized as a unique PCIe resource. VFs are provided, in some embodiments, to provide a passthrough mechanism that allows compute nodes executing on a host computer to receive data messages from the pNIC without traversing a virtual switch of the host computer. The VFs, in some embodiments, are provided by virtualization software executing on the pNIC.


In some embodiments, the virtual network includes one or more logical networks including one or more logical forwarding elements, such as logical switches, routers, gateways, etc. In some embodiments, a logical forwarding element (LFE) is defined by configuring several physical forwarding elements (PFEs), some or all of which execute on host computers along with the deployed compute nodes (e.g., VMs, Pods, containers, etc.). The PFEs, in some embodiments, are configured to implement two or more LFEs to connect two or more different subsets of deployed compute nodes. The virtual network in some embodiments, is a software-defined network (SDN) such as that deployed by NSX-T™ and includes a set of SDN managers and SDN controllers. In some embodiments, the set of SDN managers manage the network elements and instruct the set of SDN controllers to configure the network elements to implement a desired forwarding behavior for the SDN. The set of SDN controllers, in some embodiments, interact with local controllers on host computers to configure the network elements. In some embodiments, these managers and controllers are the NSX-T managers and controllers licensed by VMware, Inc.


As used in this document, data messages refer to a collection of bits in a particular format sent across a network. One of ordinary skill in the art will recognize that the term data message is used in this document to refer to various formatted collections of bits that are sent across a network. The formatting of these bits can be specified by standardized protocols or non-standardized protocols. Examples of data messages following standardized protocols include Ethernet frames, IP packets, TCP segments, UDP datagrams, etc. Also, as used in this document, references to L2, L3, L4, and L7 layers (or layer 2, layer 3, layer 4, and layer 7) are references, respectively, to the second data link layer, the third network layer, the fourth transport layer, and the seventh application layer of the OSI (Open System Interconnection) layer model.



FIG. 1 illustrates an exemplary system 100 configured to provide FPO for a host computer 110 at a physical NIC 120. Host computer 110 includes a first set of hosted virtual machines (VMs) 111a-n that connect to the pNIC 120 in a passthrough mode. In the embodiment illustrated in FIG. 1, each VM 111a-n has a virtual NIC (e.g., vNIC 112a-n) that connects to virtual functions (VFs) 133a-n of a physical function (PF) 134a of the pNIC 120 through a PCIe bus 131. The virtual machines (111a-n and 113a-m) and virtual switch 115 are shown executing within virtualization software 114. The VFs 133a-n are provided by a virtualization software 135. The virtualization software 135, in some embodiments, is a manufacturer virtualization software for providing single root I/O virtualization (SR-IOV) that enables efficient sharing of resources of a PCIe-connected device among compute nodes (e.g., VMs 111a-n). In other embodiments, the virtualization software 135 is a hypervisor program (e.g., ESX™ or ESXio™ that is specifically designed for virtualizing resources of a smart MC).


In some embodiments, connections between the vNICs 112a-n and the VFs 133a-n is enabled by VF drivers 118a-n on the host computer 110. Host computer 110 also includes a second set of VMs 113a-m that connect to a virtual switch 115 of the host computer 110. The virtual switch 115 connects to the pNIC 120 through a PF 134m through the PCIe bus 131. In some embodiments, the PFs 134a-m are also virtualized by virtualization software 135 to appear as separate PCIe connected devices to the host computer 110 or a set of connected host devices. VMs and vNICs are just one example of a compute node and an interface that may be implemented in embodiments of the invention.


The pNIC 120 also includes a physical network port 121 that connects the pNIC 120 and the VMs 111a-n and vNICs 112a-n to a physical network. The PCIe bus 131 and physical network port 121 connect to the flow processing offload (FPO) hardware 140 to perform flow processing for the VMs 111a-n and vNICs 112a-n. The FPO hardware 140 includes a flow entry table 143 that stores a set of flow entries for performing flow processing. The flow entries, in some embodiments, specify a set of matching criteria and an action to take for data messages that match the matching criteria. One or both of the set of matching criteria and the action use VPIDs to identify compute-node interfaces. Additional matching criterion, in some embodiments, includes header values (e.g., header values related to L2, L3, L4, etc.) of the data message. In some embodiments, the possible actions include dropping the data message or forwarding the data message to a VPID.


The FPO hardware 140 also includes a mapping table 142. Mapping table 142 includes a set of VPID to PPID mappings that are used to resolve the VPIDs specified in flow entries into interfaces of the pNIC 120. The mapping table 142 maps VPIDs to PPIDs, and the PPIDs identify interfaces of the pNIC 120. In some embodiments, the PPIDs are assigned by the pNIC 120, and the VPIDs are assigned and associated with particular interfaces of the pNIC 120 by a flow processing and action generator (not shown). As will be discussed in the examples below, specifying the destinations in terms of VPIDs and using a mapping table to identify an interface of the pNIC allows flow entries to remain valid even as an interface of a compute node changes its association between one interface of the pNIC to an association with another interface of the pNIC.



FIG. 2 illustrates the pNIC 120 of FIG. 1 along with a flow processing and action generator (FPAG) 260 that populates the mapping table 142 and the flow entry table 143. In some embodiments, FPAG 260 replaces virtual switch 115 of FIG. 1 (e.g., the virtual switch 261 and local cache 262 are used to forward a data message in host computer 110). The FPAG 260 includes a local cache 262 that stores all of the generated flow entries, and for some data messages received at the FPAG 260 provides an action to the pNIC 120 to perform for the received data message. In some embodiments, the FPAG 260 executes on a host computer (e.g., host computer 110) and the local cache 262 functions as a fast path for data message processing that is not offloaded to the pNIC 120.


The FPAG 260 also includes a virtual switch 261, which in turn includes a slow path processor 263 and a flow generator 264. The slow path processor 263 performs slow path processing for data messages for which the FPO hardware 140 does not store a valid flow entry. The results of the slow path processing are then used by the flow generator 264 to generate a flow entry to offload the flow processing to the FPO hardware 140. For example, the slow path processing may indicate that a particular forwarding rule applies to the data message flow and supplies a set of criteria that uniquely identify the flow to which the data message belongs and an action to take for future data messages belonging to that flow. In some embodiments, for a particular forwarding rule that uses a reduced set of criteria, the generated flow entry includes wildcard values in the set of matching criteria specified by the flow entry for those data message characteristics that are not used by the particular forwarding rule to determine the action. FIG. 9 describes in more detail the types of criteria and actions that may be specified in a flow entry generated by flow generator 264.


In some embodiments, the virtual network is a software-defined network (SDN) that includes a set of SDN managers and a set of SDN controllers. FIG. 3 illustrates a more detailed view of FPAG 260 that includes a mapping generator 368 for generating the VPID to PPID mapping entries and a local controller 365 that interacts with a set of SDN controllers 366 and a set of SDN managers 367. The local controller 365, in some embodiments, receives configuration information for locally-hosted compute nodes and managed switching elements (e.g., virtual switch 261). In some embodiments, the local controller 365 either receives VPIDs for compute-node interfaces from the set of SDN controllers 366, or assigns VPIDs to the compute-node interfaces locally. Additionally, the local controller 365, in some embodiments, interacts with the pNIC 120 to identify the PPIDs of the interfaces of the pNIC 120 and to configure the connections between the compute-node interfaces and the interfaces of the pNIC 120.


The local controller 365, in some embodiments, configures the slow path processor 263 with forwarding rules and additional policies (e.g., firewall policies, encryption policies, etc.) necessary to implement a data message processing pipeline defined for the SDN (or a set of logical forwarding elements of the SDN). The local controller 365, in some embodiments, also provides information received from the pNIC 120 and the SDN controllers 366 to the mapping generator 368 to identify the VPIDs and PPIDs of the different interfaces and the connections between the interfaces to generate VPID to PPID mappings. Additionally, the local controller 365 notifies the mapping generator 368 when a configuration change affects the VPID to PPID mappings to allow the mapping generator 368 to generate a new or updated VPID to PPID mapping and, when applicable, identify a mapping that must be deleted. While FPAG 260 is shown in FIGS. 2 and 3 as being separate from pNIC 120, in some embodiments discussed below, FPAG 260 is implemented on processing units of the pNIC 120.



FIG. 4 illustrates a system 400 in which the FPAG 460 executes on a set of general purpose processors 450 of the pNIC 420. FIG. 4 also illustrates an embodiment in which the pNIC 420 connects, at a set of physical functions 434a-i through a PCIe bus 432, to multiple servers 410a-n each hosting a set of compute nodes (e.g., VMs 411a-x). In some embodiments, PCIe bus 432 is a set of separate PCIe buses for connecting to a set of host computers or peripheral devices, and the PFs 434a-i are physically separate interfaces that may or not be implemented as PFs for the separate PCIe buses. The FPAG 460 generates the flow entries for each of the servers 410a-n and communicates with other elements of the pNIC 420 using a separate internal PCIe bus 431 (in some embodiments through a physical function, not shown).



FIG. 5 illustrates a system 500 in which the FPAG 560 executes on one server 510a of multiple servers 510a-n on behalf of all the servers 510a-n connected to the pNIC 520. FIG. 5 also illustrates that a server (e.g., server 510n) not executing the FPAG 560, in some embodiments, executes a virtual switch 515. Virtual switch 515, in some embodiments, is a lightweight virtual switch that implements forwarding decisions made by FPAG 560 and does not require a full network stack. Virtual switch 515, in some embodiments, connects to a set of emulated VMs 513a-m (e.g., VMs having vNICs not configured in passthrough mode).


The method includes providing the pNIC with a set of mappings between VPIDs and PPIDs. FIG. 6 conceptually illustrates a process 600 performed in some embodiments to provide VPID to PPID mappings to be stored in a mapping table of the pNIC to perform flow processing. Process 600, in some embodiments, is performed by a flow processing and action generator (e.g., by mapping generator 368) and the flow processing offload (FPO) hardware 140. In some embodiments, the flow processing and action generator is implemented on the pNIC while in other embodiments, the flow processing and action generator is implemented on a host computer connected to the pNIC. Process 600 begins by identifying (at 605) a set of VPIDs associated with compute nodes (e.g., VMs, Pods, containers, etc.) that are connected to the pNIC. The flow processing and action generator, in some embodiments, communicates with a set of network management computers that manage the virtual network to identify the set of compute nodes and VPIDs associated with the set of compute nodes.


The process 600 also identifies (at 610) interfaces of the pNIC connected to the identified compute-node interfaces and PPIDs associated with those pNIC interfaces. The PPIDs, in some embodiments, are identified by the flow processing and action generator by querying the pNIC for the PPIDs. In some embodiments, the flow processing and action generator is aware of all the interfaces of the pNIC and their PPIDs and determines the interface of the pNIC to which each compute-node interface connects.


Based on the identified VPIDs for the compute-node interfaces and the PPIDs of the interfaces of the pNIC to which they connect, the flow processing and action generator generates (at 615) a set of mappings between the VPIDs and PPIDs. The generated set of mappings is sent (at 620) to the FPO hardware of the pNIC. In some embodiments, the generated set of mappings is sent to the FPO hardware using a PF of a PCIe connection between the processing units that execute the flow processing and action generator and the FPO hardware. As described above, the processing units executing the flow processing and action generator are processing units of a host computer, while in other embodiments, the pNIC is an integrated MC (e.g., a programmable NIC, smart NIC, etc.) that includes the processing units as well as the FPO hardware.


The FPO hardware receives (at 625) the VPID to PPID mappings sent from the flow processing and action generator. The received VPID to PPID mappings are stored (at 630) in a mapping table of the FPO hardware. In some embodiments, the mapping table is stored in a memory cache (e.g., content-addressable memory (CAM), ternary CAM (TCAM), etc.) that can be used to identify PPIDs based on VPIDs or VPIDs based on PPIDs. One of ordinary skill in the art will appreciate that the process 600 describes an initial mapping of VPIDs to PPIDs and that certain operations represent multiple operations or are performed in different orders (e.g., operation 605 may be preceded by operation 610) in different embodiments and that the description of process 600 is not meant to exclude equivalent processes for achieving the same result.


The method also includes sending updates to the mappings as compute nodes migrate, connect to different interfaces of the pNIC, are assigned different VPIDs, etc. One of ordinary skill in the art will appreciate that a modified process 600 for a particular VPID to PPID mapping, in some embodiments, is performed each time the flow processing and action generator detects a change to either a VPID or an association between a VPID and a PPID. For example, operation 605 identifies a specific set of VPIDs that are added, moved, or invalidated by a particular configuration change of the virtual network, and operation 610 identifies a current association of the added or moved set of VPIDs to a set of PPIDs of the pNIC. Generating (at 615) the mapping entries is performed only for the added or moved set of VPIDs mapped to the identified set of PPIDs. Additionally, sending (at 620) the generated mapping for an updated VPID to PPID mapping, in some embodiments, includes sending an instruction to remove a previously sent VPID to PPID mapping that is invalid based on the detected configuration change (invalidating a VPID or moving the VPID to connect to an interface identified by a different PPID).


The method further includes providing the pNIC with a set of flow entries for a set of data message flows associated with the set of compute nodes. The set of flow entries, in some embodiments, define one or both of a set of matching criteria and an action using VPIDs. In some embodiments, the action specifies a destination. Each destination, in some embodiments, is specified in terms of a VPID and the pNIC resolves the VPID into a PPID (i.e., egress interface) using the set of mappings. Each flow entry, in some embodiments, is for a particular data message flow and is generated based on a first data message received in the data message flow. The flow entry is generated, in some embodiments, based on the result of data message processing performed by a virtual (e.g., software) switch and provided to the pNIC to allow the pNIC to process subsequent data messages in the data message flow.



FIG. 7 conceptually illustrates a process 700 for providing flow entries to the FPO hardware from a flow processing and action generator. Process 700 begins by receiving (at 705) a data message at the FPO hardware that does not match both (1) a flow entry for the data message flow to which the data message belongs and (2) a VPID to PPID mapping stored by the FPO hardware. Alternatively, the data message may match only a default rule that identifies an interface connected to the flow processing and action generator as a destination for data messages that match the default rule. In some embodiments, the received data message is a first data message in a data message flow. The FPO hardware forwards (at 710) the data message to the flow processing and action generator (e.g., for slow path processing).


The flow processing and action generator processes (at 715) the data message through a processing pipeline to determine an action to take for subsequent data messages in the same data message flow. For example, the processing pipeline, in some embodiments, includes a set of logical forwarding operations along with a set of other operations (e.g., firewall, middlebox services, etc.) that result in either a decision to drop the data messages of the data message flow or identify a destination for data messages of the data message flow (possibly with an encapsulation or decapsulation before forwarding). Identifying the destination for data messages of a data message flow, in some embodiments, includes identifying a VPID of a compute-node interface that is a destination of the data messages of the data message flow.


Based on (1) characteristics of the received data message that identify the data message flow to which it belongs and (2) the action determined to be taken based on processing the data message, the flow processing and action generator generates (at 720) a flow entry for the FPO hardware to use to process subsequent data messages of the data message flow. The flow processing and action generator sends (at 725) the generated flow entry to the FPO hardware. As described above, in some embodiments, the generated flow entry is sent to the FPO hardware using a PF of a PCIe connection between the processing units that execute the flow processing and action generator and the FPO hardware.


The FPO hardware receives (at 730) the flow entry sent from the flow processing and action generator. The received flow entries are stored (at 735) in a set of flow entries (e.g., a flow entry table) of the FPO hardware. In some embodiments, the set of flow entries is stored in a memory cache (e.g., content-addressable memory (CAM), ternary CAM (TCAM), etc.) that can be used to identify a flow entry that specifies a set of matching criteria associated with a received data message.


In some embodiments, the pNIC stores the set of flow entries and the mappings in network processing hardware to perform flow processing for the set of compute nodes executing on the connected host computer. The flow entries and mapping tables, in some embodiments, are stored in separate memory caches (e.g., content-addressable memory (CAM), ternary CAM (TCAM), etc.) to perform fast lookup. FIG. 8 conceptually illustrates a process 800 for processing a data message received at the pNIC. Process 800, in some embodiments, is performed by FPO hardware of a pNIC. Process 800 begins by receiving (at 805) a data message at an interface of the pNIC to be processed by the FPO hardware. The data message, in some embodiments, is one of a data message received at a physical port of the pNIC connected to a physical network and a data message received at an interface of the pNIC connected to the host computer.


The process 800 determines (at 810) if the received data message matches a flow entry stored by the FPO hardware. In some embodiments, determining whether the FPO hardware stores a flow entry matching the received data message is based on a lookup in a set of stored flow entries based on characteristics of the received data message (e.g., a 5-tuple, header values at different layers of the OSI model, metadata, etc.). If the received data message is determined (at 810) to not match a flow entry, the process 800 proceeds to forward (at 815) the data message to the flow processing and action generator for slow path processing, receive (at 820) a flow entry for the data message flow to which the received data message belongs, and store (at 825) the flow entry for processing subsequent data messages of the data message flow. Operations 815-825 are described in more detail above with the discussion of operations 710, 730, and 735 of FIG. 7 corresponding to operations 815-825.


If the received data message is determined to match a flow entry, the process 800 proceeds to determine (at 830) whether the matching flow entry specifies that data messages matching the flow entry be forwarded to a destination VPID. If the process 800 determines that the flow entry specifies that the data message be forwarded to a destination VPID, the process 800 determines (at 835) whether a mapping for the VPID exists in the mapping table. In some embodiments, determining whether a mapping for the VPID exists in the mapping table includes searching a content-addressable memory (CAM) based on the VPID. If the process 800 determines (at 830) that the flow entry does not specify a destination VPID (e.g., the flow entry specifies that the data message should be dropped) or the process 800 determines (at 835) that a mapping for the VPID exists in the mapping table, the action specified in the flow entry is performed (at 800) and the process ends.


If the process 800 determines (at 835) that the VPID is not in the mapping table, the process 800 returns to operations 815-825. In some embodiments, determining that the VPID is not in the mapping table 142 is based on the VPID lookup returning a default result that directs the data message to the interface associated with slow path processing (associated with operations 815-825). In other embodiments, instead of including a default entry in the mapping table 142, some embodiments determine that the VPID is not in the mapping table based on a VPID lookup returning a ‘fault’ (e.g., a null result or other result indicating that there is no entry for the VPID in the mapping table). In some embodiments, in which there is no default entry in the mapping table 142, the FPO hardware 140 is configured to direct all data messages for which a fault is returned to the virtual switch. As will be described below in reference to FIGS. 9 and 13 below, a flow entry may identify a VPID that is no longer valid in the case that a compute-node interface associated with the VPID is reconfigured and is assigned a new VPID.



FIG. 9 illustrates flow processing offload hardware 940 of a pNIC storing a mapping table 942, and a flow processing table 943. Flow processing table 943, in some embodiments, is stored in CAM and includes a set of flow entries 951-956 that specify a set of matching criteria 950 and an action 960. The set of matching criteria 950, in the illustrated embodiment, includes a source IP address (SIP), a source MAC (SMAC) address, a source port (SPort), a destination IP address (DIP), a destination MAC (DMAC) address, a destination port (DPort), and metadata. In some embodiments, the metadata is configurable by a user, or a type of metadata and a matching value for that type of metadata is identified in the set of matching criteria.


For example, flow entries 951 and 952 specify a VLAN identifier in the sets of matching criteria 950, while flow entry 954 specifies a VXLAN identifier in the set of matching criteria 950. In some embodiments, additional types of metadata that are added internally are also specified, such as in flow entry 955 which specifies a set of VPIDs (i.e., VPIDs 0001-0003) as a metadata criteria (characteristic) that is associated with a data message after a PPID identifying an interface of the pNIC on which the data message is received is translated into a VPID. VPIDs 0001-0003, in some embodiments, are associated with pNIC interfaces connecting to the physical network, such that flow entry 955 only applies to data messages received from the physical network.


In some embodiments, IP addresses are specified as classless inter-domain routing notation to identify an IP prefix representing a range of IP addresses (e.g., a range of IP addresses assigned to a particular application or user group that should or should not be granted access to a certain other application or user group). For example, flow entry 953 specifies a source IP range IP4/28 indicating an IP address “IP4” and a mask length of 28 bits such that any IP address matching the first 28 bits will be a match. Similarly, flow entry 953 specifies a destination IP range IP5/30 indicating an IP address “IP5” and a mask length of 30 bits such that any IP address matching the first 30 bits will be a match. Additionally, the flow entries, in some embodiments, include at least one criteria using a wildcard value (identified by “*”) that is considered a match for any value of the associated characteristic of a received data message. For example, rules 952-956 all specify at least one criteria (e.g., data message characteristic) using a wildcard value.


In some embodiments, the flow entries are assigned priorities, such that, for a data message that matches multiple flow entries, an action specified in the flow entry with the highest priority is taken for the data message. Priority, in some embodiments, is determined by the specificity of the matching criteria of the flow entries when generating the flow entry during slow path processing and is included in the generated flow entry. A default rule 956 is specified, in some embodiments, that directs data messages that do not match any higher-priority rules to a VPID (e.g., VPID 5000) associated with slow path processing (e.g., to a virtual switch of the flow processing and action generator).


Each flow entry, in some embodiments, includes an action associated with a data message that matches that flow entry. The actions, in some embodiments, include: a forwarding operation (FWD), a DROP for packets that are not to be forwarded, modifying the packet's header and a set of modified headers, replicating the packet (along with a set of associated destinations), a decapsulation (DECAP) for encapsulated packets that require decapsulation before forwarding towards their destination, and an encapsulation (ENCAP) for packets that require encapsulation before forwarding towards their destination. In some embodiments, some actions specify a series of actions. For example, flow entry 954 specifies that a data message with source IP address “IP6,” any source MAC address, a source port “Porth,” a destination IP address “IP7,” a destination MAC address “MAC7,” a source port “4789,” and metadata indicating that the data message is associated with a VXLAN “VXLAN2,” be decapsulated and forwarded to VPID “3189.” In some embodiments, the identified VPID is a VPID associated with a particular interface of a compute node executing on the host computer. The VPID identified by some flow entries that specify a DECAP action is a VPID for a physical function that connects to a virtual switch of the flow processing and action generator for processing the decapsulated data message through the slow path processing. For other flow entries that specify a DECAP action the interface identifier (e.g., VPID or PPID) is an identifier for a loopback interface of the FPO hardware to allow the FPO hardware to process the inner data message (the decapsulated data message). In some embodiments, flow entries specifying a DECAP action also explicitly specify further processing of the decapsulated data message by the FPO hardware.


Mapping table 942, in some embodiments, is stored in CAM and includes a set of VPID to PPID mappings 971-975 that specify a VPID in a “VPID” field 970, a corresponding PPID in a “PPID” field 980, and a flag bit indicating whether a VPID associated with a data message should be appended to a forwarded data message in an a “Append VPID” field 990. The mapping table, as described above in relation to FIGS. 1, 6, 7, and 8, is used to resolve VPIDs specified in flow entries into PPIDs associated with interfaces of the pNIC and, for some data messages received at interfaces of the pNIC, to resolve PPIDs into VPIDs. FIG. 9 illustrates that not every VPID specified in the set of flow entries has an entry in the mapping table. For example, VPID 5472 (specified in flow entry 955) does not have an entry in VPID field 970.


For VPIDs that are not found in the mapping table 942, some embodiments define a default entry 975 specifying a wildcard 976 in the VPID field 970. In the embodiment illustrated in FIG. 9, the default entry 975 is included in the mapping table 942 to direct data messages associated with invalid VPIDs to an interface of the pNIC associated with a particular PPID, in this case the PPID 986 (“1111”) associated with the interface connected to the virtual switch of the flow processing and action generator. In some embodiments, a data message matching the default mapping table entry 975 that matched a non-default flow entry (e.g., 951-955) indicates an invalid VPID and flow entry. In other embodiments, instead of including a default entry in the mapping table 942, some embodiments define an action for VPID lookups returning a ‘fault’ (e.g., a null result or other result indicating that there is no entry for the VPID in the mapping table). For example, the action specifies that all data messages that match a flow entry but return a fault from the VPID lookup will be forwarded to the virtual switch and, in some embodiments, including (e.g., in metadata) an identifier of the matching flow entry specifying the invalid VPID.


In such cases, some embodiments include a flow entry identifier when forwarding the data message to the virtual switch of the flow processing and action generator. The flow entry identifier is stored in a metadata field or is appended to a data message in such a way to allow the flow processing and action generator to identify that the identified flow entry should be removed from the set of flow entries stored by the FPO hardware. The VPID may be invalid because an associated compute-node interface has changed configuration and been assigned a new VPID, or the associated compute node has been shut down. If the compute-node interface has been assigned a new VPID, the mapping table is provided with a mapping entry that maps the newly assigned VPID to a PPID of an associated interface of the pNIC and the flow entries associated with the invalid VPID will eventually be removed as described above and as further described in relation to FIGS. 14 and 15.


In some embodiments, multiple VPIDs are associated with a single PPID. For example mapping table entries 972, 974, and 975 are all associated with PPID 1111. In some embodiments, the append VPID field 990 is used to identify data messages for which the destination VPID should be forwarded along with the data message. As described above, PPID 1111 is associated with an interface of the pNIC connected to the virtual switch of the flow processing and action generator. The virtual switch, in some embodiments, provides a single connection to the pNIC for multiple emulated compute nodes and appending the VPID (e.g., VPID 2225) allows the virtual switch to use a local fast-path processing or other form of minimal processing to forward a data message associated with a VPID to its destination. Additionally, on the return path, the data message, in some embodiments, is associated with a VPID and the append VPID flag indicates that the VPID should not be removed before providing the data message to the FPO hardware 940. In other embodiments, VPIDs associated with data messages (e.g., stored in a metadata field of the data message) are kept by default. Appending (or keeping) the VPID on the return path allows the FPO hardware 940 to distinguish between the different compute nodes connected to the pNIC using the same interface.



FIGS. 10-13 each illustrate a different type of VM configuration change and an update to a mapping table associated with the VM configuration change. Elements with similar numbering (e.g., 1010, 1110, and 1210) represent similar functional elements. FIG. 10 illustrates a VM 1011a ‘migration’ at a time “T1” from one virtual function 1033a of the pNIC 1020 to another virtual function 1033n of the pNIC 1020. In some embodiments, this ‘migration’ occurs because of a failure of the virtual function 1033a or for other reasons determined by a controller of the virtual network. Virtual function 1033a is identified by the PPID 9123 and virtual function 1033n is identified by the PPID 9234. At time T1, the vNIC 1012a of VM 1011a is disconnected from virtual function 1033a and connects to virtual function 1033n. Also at time T1 (or approximately at time T1) the FPAG 1060 sends an updated VPID to PPID mapping for VPID 1000 to associate it with PPID 9234 instead of PPID 9123. In other embodiments, the previous association between VPID 1000 and PPID 9123 is deleted and a new mapping between VPID 1000 and PPID 9234 is added by the FPAG 1060. As shown, flow entry table 1043 is the same at times T0 (before T1) and T1, while the mapping table 1042 is updated between times T0 and T1.



FIG. 11 illustrates a VM 1111a migration at a time “T1” from one host computer 1110a connected to virtual function 1133a of the pNIC 1120 to another host computer 1110n connected to virtual function 1133n of the pNIC 1120. Virtual function 1133a is identified by the PPID 9123 and virtual function 1133n is identified by the PPID 9234. At time T1, VM 1111a is shut down and disconnected from virtual function 1133a and migrates to host computer 1110n and connects to virtual function 1133n. Also at time T1 (or approximately at time T1) the FPAG 1160 sends a set of instructions for (1) deleting the previous VPID to PPID mapping and (2) adding a new VPID to PPID mapping for the new connection. As shown, flow entry table 1143 is the same at times T0 (before T1) and T1, while the mapping table 1142 is updated between times T0 and T1.



FIG. 12 illustrates a system 1200 including a VM 1211a transitioning at a time “T1” from a passthrough mode to an emulated mode. A passthrough mode, in some embodiments, is a mode in which the vNIC 1212a is connected to a virtual function 1233a that allows direct communication between the pNIC 1220 and the VM 1211a, and an emulated mode is a mode in which the communication between the pNIC 1220 and the VM 1211a is through the virtual switch 1215. In some embodiments, virtual switch 1215 is a lightweight virtual switch that does not perform any slow path processing, but instead relies on the flow processing provided by either the FPO hardware or the FPAG 1260. Virtual switch 1215, connects, in the illustrated embodiment, to a physical function 1234. In some embodiments, a virtual switch connects to multiple compute nodes and connects to the pNIC through a physical function that (1) has a greater bandwidth than a virtual function and (2) has a greater configurability than a virtual function. Accordingly, the VPID to PPID mapping associates the PPID 1111 of the physical function 1234 with multiple VPIDs. At time T1, the vNIC 1212a of VM 1211a is disconnected from virtual function 1233a and connects to virtual switch 1215. Also at time T1 (or approximately at time T1) the FPAG 1260 sends an updated VPID to PPID mapping for VPID 1000 to associate it with PPID 1111 instead of PPID 9123. In other embodiments, the previous association between VPID 1000 and PPID 9123 is deleted and a new mapping between VPID 1000 and PPID 1111 is added by the FPAG 1260. Additionally, the VPID to PPID mapping is updated or replaced to change a value in the associated “Append VPID field” from “0” at time T0 to “1” at time T1 to indicate that the VPID associated with the vNIC 1212a should be maintained when forwarding data messages to the PF 1234 identified by PPID 1111. As shown, flow entry table 1243 is the same at times T0 (before T1) and T1, while the mapping table 1242 is updated between times T0 and T1.



FIG. 13 illustrates selected elements of a system 1300 in which a change to a configuration of a vNIC 1312a of VM 1311a at a time “T1” causes the VPID of the vNIC 1312a to change. The vNIC 1312a is connected to virtual function 1333a that is identified by the PPID 9123 both before and after the configuration change. At time T1, vNIC 1312a is reconfigured so that it is effectively a different vNIC and is assigned a new VPID 3000. Also at time T1 (or approximately at time T1) the FPAG 1360 sends a set of instructions for (1) deleting the previous VPID to PPID mapping and (2) adding a new VPID to PPID mapping for the new VPID. As shown, the mapping table 1342 is updated between times T0 and T1 to account for the newly assigned VPID. Mapping table lookups for flow entries specifying the previous VPID (i.e., VPID 1000) as a destination will now produce a fault (or hit a default mapping) and be directed to the FPAG 1360 as described in relation to FIG. 9 above.



FIGS. 10-12 all illustrate scenarios in which the VPID identifying a particular compute-node interface (i.e., vNICs 1012a, 1112a, and 1212a) remains the same throughout the transition or migration. In such cases, flow entries provided to the FPO hardware are still valid and by updating the VPID to PPID mapping table existing data message flows are directed to the current PPID (and the destination compute-node interface) without updating the individual flow entries or having to invalidate the existing flow entries before the change takes effect. However, in the scenario illustrated in FIG. 13, flow entries for existing flows are invalid (specify a destination VPID that no longer exists). The system treats all flow entries as invalid because the configuration change, in some embodiments and for some data message flows, does not allow or support certain existing data message flows and each data message flow must be revalidated. However, as in the scenarios for FIGS. 10-12, the changes to the compute-node interface and the VPID take effect without having to update or remove the flow entries.



FIG. 14 conceptually illustrates a process 1400 for removing invalid flow entries as a background process that can be performed as resources are available. Process 1400, in some embodiments, is performed by an FPAG. In some embodiments, process 1400 is performed based on information stored at the FPAG regarding flow entries generated by the FPAG for each VPID, and additionally or alternatively, based on information received from the FPO hardware. Process 1400 begins by identifying a VPID that has been invalidated (i.e., is no longer associated with a compute-node interface). In some embodiments, identifying the invalidated VPID is based on a notification from the local controller that the VPID is no longer associated with a compute-node interface (e.g., that the compute-node interface formerly associated with the VPID is now associated with a different VPID). In some embodiments, identifying the invalidated VPID includes receiving, from the FPO hardware, a data message that matched a flow entry but failed to match a VPID to PPID mapping. The data message received from the FPO hardware, in some embodiments, includes the invalidated VPID in metadata or sends a control message along with the data message to identify the invalidated VPID.


The process 1400 then identifies (at 1410) a set of flow entries related to the invalidated VPID. In some embodiments, the FPAG stores each flow entry generated specifying a VPID as either a source or destination. Based on the identified, invalidated VPID, the FPAG can identify each entry specifying the invalidated VPID as either a source or destination. In some embodiments, the FPAG does not identify all of the flow entries associated with the invalidated VPID, but instead identifies a flow entry related to the invalid VPID based on a data message received from the FPO hardware. The data message received from the FPO hardware, in some embodiments, includes (e.g., in metadata or as the content of a control message) a flow entry identifier for a flow entry matching a data message received at the FPO hardware that produced a fault (or hit a default rule) from a lookup in the mapping table. One of ordinary skill in the art will appreciate that operations 715-725 (of FIG. 7) are also performed, in some embodiments, to generate a new flow entry for the received data message that produced a fault from the VPID lookup.


The process 1400 then generates (at 1415) a set of instructions to remove the identified flow entries from the FPO hardware. The set of instructions, in some embodiments, are generated as a single instruction to remove multiple flow entries, while in other embodiments, the set of instructions includes a separate instruction to remove each identified flow entry. In some embodiments, the set of instructions are generated as a background process when resources are available.


The set of instructions are sent (at 1420) to the FPO hardware to have the FPO hardware remove the flow entries from its storage. The FPO hardware then removes the invalidated flow entries and the process 1400 ends. In some embodiments, the FPO hardware also only processes the instructions as a background process that does not consume resources needed for other higher-priority processes. In some embodiments, the FPO hardware sends a confirmation that the identified set of flow entries have been removed to allow the FPAG to reuse the invalidated VPID. Process 1400 and processing the instructions at the FPO hardware are able to be performed as background processes because the configuration change can take effect based on the updated VPID to PPID mapping before the invalid flow entries are removed. The flow entries are removed to conserve resources of the FPO hardware and to enable invalidated VPIDs to be reused after flow entries previously generated for the VPID are removed.



FIG. 15 conceptually illustrates a process 1500 performed by FPO hardware to remove flow entries specifying invalidated VPIDs. Process 1500 begins by receiving (at 1505) a data message that matches a flow entry specifying an invalidated VPID as a destination. The data message may be a data message of an existing flow or of a new flow that matches the criteria of a flow entry that specifies wildcard values or ranges of values as matching criteria.


The process 1500 then determines (at 1510) that no VPID to PPID mapping exists for the VPID specified as a destination in the matching flow entry. The determination, in some embodiments, is based on a lookup in the mapping table producing a fault or a default mapping being the only match returned. In some embodiments, an identifier of the flow entry that matched the data message is maintained (e.g., forwarded along with the data message) until a non-default destination is identified.


The process 1500 then removes (at 1515) the flow entry from the FPO hardware. In some embodiments, the FPO hardware stores the flow entries along with a bit that indicates whether the flow entry should be automatically invalidated (e.g., deleted) if no non-default match is found in the mapping table. The FPO hardware, in some embodiments, automatically invalidates the flow entry that matched the data message either based on the bit stored along with the flow entry or as a default behavior that is not based on storing a flag bit along with the flow entry, and the process 1500 ends. In some embodiments, invalidating (at 1515) the flow entry includes sending a data message to the FPAG identifying the flow entry as being a flow entry that did not resolve into a destination PPID (i.e., did not produce a non-default match from a lookup in the mapping table). The FPGA then performs process 1400 to generate an instruction that is received by the FPO hardware to invalidate (or remove) the flow entry. Based on the received instruction, the FPO hardware invalidates (or removes) the flow entry and the process 1500 ends.


In some embodiments, the FPO also has an internal process for invalidating (e.g., aging out) flow entries based on the flow entry not having been used for a particular amount of time. The FPO hardware, in some such embodiments, stores data regarding the last time a flow entry matched a data message. If the time elapsed from the last time the flow entry matched a data message is greater than an aging-out threshold time, the flow entry is removed (or invalidated). Accordingly, after a reuse threshold time that is at least as great as the aging-out threshold time, an invalidated VPID can be reused. In some embodiments, the reuse threshold time is set to be equal to or greater than a time an average data message flow would timeout plus the aging-out time to ensure that the aging-out threshold has been met on the FPO hardware. To further facilitate the reuse of VPIDs, in some embodiments, the VPIDs are defined to have more bits than the PPIDs. The number of bits of the PPID, in some embodiments, is based on how many PFs the pNIC has and how many VFs each PF supports. Assuming a 16 bit PPID, a VPID, in some embodiments, is 18 or 20 bits depending on the desired sparsity of VPID to PPID mappings.


In some embodiments, the mapping table includes a set of reverse mappings to identify a VPID associated with a PPID on which a data message is received. The reverse mappings, in some embodiments, are generated using a process similar to process 600 but generates (at 615) mappings of PPIDs to VPIDs as well as VPIDs to PPIDs. The reverse mappings are stored in a separate reverse mapping table, in some embodiments. As discussed above, a particular PPID may be associated with multiple VPIDs. For data messages received from a compute node executing on a host computer, a VPID is appended (or maintained), when providing the data message to the FPO hardware.



FIG. 16 illustrates a system 1600 in which link aggregation of physical network ports 1621a-n is enabled. In some embodiments, each physical network port 1621a-n is associated with a different VPID. As illustrated all the physical ports 1621a-n are included in link aggregation group 1690. In the case of a physical port failure, a VPID to PPID mapping can be updated so that the VPID associated with the failed physical port is associated to a functional physical port. FIG. 16 illustrates a mapping table 1642 before and after the failure of the physical port 1621n. The original mapping table 1642 at time T0 includes a mapping between VPID 00000n and PPID 000n after the failure of the physical port 1621n, the mapping table 1642 is updated at time T1 to include a new mapping of VPID 00000n to PPID 0001. This will allow data messages directed out of the pNIC 1620 to be sent out of the physical port 1621a without invalidating and rewriting any flow entries specifying VPID 00000n as a destination. As shown at T1 of FIG. 16, at least one physical port is associated with multiple VPIDs. In order to resolve the PPID to a particular VPID, some embodiments associate a priority with a set of VPID to PPID mappings such that the reverse mapping (from PPID to VPID) produces consistent results.


In addition to quickly failing over in the case of link failure without the need to rewrite flow entries associated with the failed link, the use of the mapping table also allows load balancing decisions made to distribute data messages over multiple physical ports to be updated without rewriting the associated flow entries. For example, if the bandwidth of a particular physical port in a link aggregation group changes, a set of data messages that was previously sent to the particular physical port, in some embodiments, is redirected to a different physical port by updating a VPID to PPID mapping so that a VPID associated with the particular physical port now maps to the PPID of the different physical port. In some embodiments, each physical port is assigned multiple VPIDs that map to the PPID of the physical port (e.g., physical port 1621a of FIG. 16 is mapped to at least two ports). A primary VPID is assigned to each particular physical port, in some embodiments, for reverse lookups and a set of secondary VPIDs is assigned that are each used for a portion of data-message traffic distributed (e.g., by the load balancing of the link aggregation protocol) for egress from the pNIC. The assigned VPIDs, in some embodiments, are used in a round robin fashion (or some other selection mechanism) as flow entries are generated for egress through the particular physical port. Using multiple VPIDs for each port, in some embodiments, allows for updated load balancing decisions to be made with finer granularity. For example, if 10 VPIDs are associated with a single physical port, each VPID could be remapped separately allowing a rebalancing of 10% of the data message load on the physical port instead of an all-or-nothing approach. One of ordinary skill in the art will understand that the number 10 is provided only as an example and that more or less VPIDs may be assigned to balance granularity of rebalancing with the complexities of generating flow entries specifying multiple VPIDs for a same destination physical port and updating multiple VPID to PPID mappings.


Many of the above-described features and applications are implemented as software processes that are specified as a set of instructions recorded on a computer-readable storage medium (also referred to as computer-readable medium). When these instructions are executed by one or more processing unit(s) (e.g., one or more processors, cores of processors, or other processing units), they cause the processing unit(s) to perform the actions indicated in the instructions. Examples of computer-readable media include, but are not limited to, CD-ROMs, flash drives, RAM chips, hard drives, EPROMs, etc. The computer-readable media does not include carrier waves and electronic signals passing wirelessly or over wired connections.


In this specification, the term “software” is meant to include firmware residing in read-only memory or applications stored in magnetic storage, which can be read into memory for processing by a processor. Also, in some embodiments, multiple software inventions can be implemented as sub-parts of a larger program while remaining distinct software inventions. In some embodiments, multiple software inventions can also be implemented as separate programs. Finally, any combination of separate programs that together implement a software invention described here is within the scope of the invention. In some embodiments, the software programs, when installed to operate on one or more electronic systems, define one or more specific machine implementations that execute and perform the operations of the software programs.



FIG. 17 conceptually illustrates a computer system 1700 with which some embodiments of the invention are implemented. The computer system 1700 can be used to implement any of the above-described hosts, controllers, and managers. As such, it can be used to execute any of the above-described processes. This computer system includes various types of non-transitory machine readable media and interfaces for various other types of machine readable media. Computer system 1700 includes a bus 1705, processing unit(s) 1710, a system memory 1725, a read-only memory 1730, a permanent storage device 1735, input devices 1740, and output devices 1745.


The bus 1705 collectively represents all system, peripheral, and chipset buses that communicatively connect the numerous internal devices of the computer system 1700. For instance, the bus 1705 communicatively connects the processing unit(s) 1710 with the read-only memory 1730, the system memory 1725, and the permanent storage device 1735.


From these various memory units, the processing unit(s) 1710 retrieve instructions to execute and data to process in order to execute the processes of the invention. The processing unit(s) may be a single processor or a multi-core processor in different embodiments. The read-only-memory (ROM) 1730 stores static data and instructions that are needed by the processing unit(s) 1710 and other modules of the computer system. The permanent storage device 1735, on the other hand, is a read-and-write memory device. This device is a non-volatile memory unit that stores instructions and data even when the computer system 1700 is off. Some embodiments of the invention use a mass-storage device (such as a magnetic or optical disk and its corresponding disk drive) as the permanent storage device 1735.


Other embodiments use a removable storage device (such as a floppy disk, flash drive, etc.) as the permanent storage device. Like the permanent storage device 1735, the system memory 1725 is a read-and-write memory device. However, unlike storage device 1735, the system memory is a volatile read-and-write memory, such as random access memory. The system memory stores some of the instructions and data that the processor needs at runtime. In some embodiments, the invention's processes are stored in the system memory 1725, the permanent storage device 1735, and/or the read-only memory 1730. From these various memory units, the processing unit(s) 1710 retrieve instructions to execute and data to process in order to execute the processes of some embodiments.


The bus 1705 also connects to the input and output devices 1740 and 1745. The input devices 1740 enable the user to communicate information and select requests to the computer system. The input devices 1740 include alphanumeric keyboards and pointing devices (also called “cursor control devices”). The output devices 1745 display images generated by the computer system 1700. The output devices 1745 include printers and display devices, such as cathode ray tubes (CRT) or liquid crystal displays (LCD). Some embodiments include devices such as touchscreens that function as both input and output devices.


Finally, as shown in FIG. 17, bus 1705 also couples computer system 1700 to a network 1765 through a network adapter (not shown). In this manner, the computer 1700 can be a part of a network of computers (such as a local area network (“LAN”), a wide area network (“WAN”), or an Intranet), or a network of networks (such as the Internet). Any or all components of computer system 1700 may be used in conjunction with the invention.


Some embodiments include electronic components, such as microprocessors, that store computer program instructions in a machine-readable or computer-readable medium (alternatively referred to as computer-readable storage media, machine-readable media, or machine-readable storage media). Some examples of such computer-readable media include RAM, ROM, read-only compact discs (CD-ROM), recordable compact discs (CD-R), rewritable compact discs (CD-RW), read-only digital versatile discs (e.g., DVD-ROM, dual-layer DVD-ROM), a variety of recordable/rewritable DVDs (e.g., DVD-RAM, DVD-RW, DVD+RW, etc.), flash memory (e.g., SD cards, mini-SD cards, micro-SD cards, etc.), magnetic and/or solid state hard drives, read-only and recordable Blu-Ray® discs, ultra-density optical discs, any other optical or magnetic media, and floppy disks. The computer-readable media may store a computer program that is executable by at least one processing unit and includes sets of instructions for performing various operations. Examples of computer programs or computer code include machine code, such as is produced by a compiler, and files including higher-level code that are executed by a computer, an electronic component, or a microprocessor using an interpreter.


While the above discussion primarily refers to microprocessor or multi-core processors that execute software, some embodiments are performed by one or more integrated circuits, such as application-specific integrated circuits (ASICs) or field-programmable gate arrays (FPGAs). In some embodiments, such integrated circuits execute instructions that are stored on the circuit itself.


As used in this specification, the terms “computer”, “server”, “processor”, and “memory” all refer to electronic or other technological devices. These terms exclude people or groups of people. For the purposes of the specification, the terms “display” or “displaying” mean displaying on an electronic device. As used in this specification, the terms “computer-readable medium,” “computer-readable media,” and “machine-readable medium” are entirely restricted to tangible, physical objects that store information in a form that is readable by a computer. These terms exclude any wireless signals, wired download signals, and any other ephemeral or transitory signals.


While the invention has been described with reference to numerous specific details, one of ordinary skill in the art will recognize that the invention can be embodied in other specific forms without departing from the spirit of the invention. Also, while several examples above refer to container Pods, other embodiments use containers outside of Pods. Thus, one of ordinary skill in the art would understand that the invention is not to be limited by the foregoing illustrative details, but rather is to be defined by the appended claims.

Claims
  • 1. A method for configuring a physical network interface controller (pNIC) connected to a host computer to perform flow processing offload (FPO) for a set of machines executing on the host computer, the method comprising: providing the pNIC with a set of mappings between virtual port identifiers (VPIDs) of interfaces of the set of machines executing on the host computer and physical port identifiers (PPIDs) of interfaces of the pNIC; andproviding the pNIC with a set of flow entries for a set of data message flows, each flow entry in the set of flow entries specifying a destination using a VPID, wherein the set of flow entries is stored by the pNIC for performing flow processing for data messages associated with machines executing on the host computer, andwherein the set of mappings is stored by the pNIC for translating VPIDs specified in the set of flow entries to PPIDs to identify an egress interface of the pNIC to which to forward a data message destined to a particular VPID.
  • 2. The method of claim 1, wherein the set of mappings between VPIDs and PPIDs is generated by a flow processing and action generator that generates the set of mappings based on configuration data regarding VPIDs and PPIDs received by the flow processing and action generator, andthe set of flow entries is generated by the flow processing and action generator by processing a first data message in each data message flow in the set of data message flows to determine a result of processing the first data message, wherein the flow entry for the data message flow in the set of data message flows is generated based on the determined result.
  • 3. The method of claim 2 further comprising providing, after a change affecting data message processing for a set of data message flows, at least one update to the mapping table based on the change, wherein the change affecting data message processing comprises a change related to at least one of (i) the interfaces of the pNIC and (ii) the interfaces of the machines executing on the host computer.
  • 4. The method of claim 3, wherein providing the at least one update comprises: providing an instruction to remove a particular mapping between a first VPID and a first PPID; andproviding an instruction to add a new entry based on the change affecting data message processing.
  • 5. The method of claim 4, wherein the configuration of a virtual network interface controller (vNIC) of a machine executing on the host computer changes and a new, second VPID is assigned to the vNIC,the first VPID is the VPID associated with the vNIC before the configuration change, andthe new entry maps the second VPID associated with the vNIC after the configuration change to the first PPID.
  • 6. The method of claim 3, wherein the change is a change from an association between a first virtual network interface controller (vNIC) of a machine executing on the host computer and a first interface of the pNIC to an association between the first vNIC and a second interface of the pNIC,the first vNIC is associated with a first VPID, the first interface of the pNIC is associated with a first PPID, and the second interface of the pNIC is associated with a second PPID,the at least one update to the mapping table updates the mapping of the first VPID to the first PPID into a mapping of the first VPID to the second PPID, andthe pNIC, based on the provided update, identifies the second interface of the pNIC associated with the second PPID as an egress interface of the pNIC for a particular data message matching a flow entry specifying the first VPID as a destination.
  • 7. The method of claim 6, wherein the second PPID is associated with multiple VPIDs,the provided update mapping the first VPID to the second PPID includes an indication that data messages destined to the first VPID should be forwarded along with the first VPID to the second interface of the pNIC associated with the second PPID,identifying the second interface of the pNIC as an egress interface of the pNIC further comprises identifying that the data message should be forwarded along with the first VPID, andthe first VPID is used by a software switch executing on the host computer to direct the particular data message to the first vNIC.
  • 8. The method of claim 7, wherein, before updating the mapping table, the first PPID was associated only with the first VPID,data messages destined for the first VPID were delivered to the first vNIC without traversing the software switch, andthe VPID was not forwarded along with data messages to the second interface of the pNIC associated with the first PPID.
  • 9. The method of claim 3, wherein the change is a change to the selection of a physical uplink port used as an egress interface for a particular set of data message flows, and the change is based on at least one of a failure of a first physical uplink port and an updated load balancing operation performed to select a physical uplink port to use for the particular set of data messages.
  • 10. The method of claim 2, wherein the flow processing and action generator: receives a particular data message that matched a particular flow entry in the set of flow entries, but did not resolve into a PPID;receives a notification from the pNIC with an identifier of at least one of the particular flow entry in the set of flow entries and a particular VPID specified as a destination in the particular flow entry;generates (1) a set of instructions for removing the particular flow entry and (2) a new flow entry for a data message flow to which the particular data message belongs; andprovides the generated set of instructions and the new flow entry to the pNIC.
  • 11. The method of claim 10, wherein the set of instructions for removing the particular flow entry is included in a set of instructions for removing all flow entries specifying the particular VPID as a destination, wherein the set of instructions for removing all flow entries specifying the particular VPID as a destination is generated based on information stored by the flow processing and action generator regarding sets of generated flow entries specifying the particular VPID as a destination VPID.
  • 12. The method of claim 11, wherein at least one of generating the set of instructions at the flow processing and action generator and executing the set of instructions for removing all flow entries specifying the particular VPID as a destination by the pNIC is performed as a background operation after a change that caused the particular flow entry to fail to be resolved into a PPID.
  • 13. The method of claim 12, wherein after removing the flow entries, the second VPID is available to be reused to identify an interface of a machine executing on the host computer.
  • 14. The method of claim 2, wherein the flow processing and action generator executes on a set of processing units of the host computer.
  • 15. The method of claim 14, wherein the flow processing and action generator communicates with the pNIC using a physical function provided by virtualization software executing on the pNIC.
  • 16. The method of claim 2, wherein the flow processing and action generator executes on a set of processing units of the pNIC.
  • 17. The method of claim 16, wherein the flow processing and action generator communicates with a set of elements of the pNIC that perform flow processing based on the sets of flow entries and mappings using a peripheral component interconnect express (PCIe) bus of the pNIC.
  • 18. The method of claim 1, wherein the VPID comprises a number of bits that is larger than the PPID.
  • 19. The method of claim 1, wherein the set of mappings is stored by the pNIC for translating a set of PPIDs for interfaces of the pNIC at which data messages are received into a set of VPIDs that are used to identify flow entries matching the received data messages.
  • 20. A non-transitory machine readable medium storing a program for execution by at least one processing unit, the program for configuring a physical network interface controller (pNIC) connected to a host computer to perform flow processing offload (FPO) for a set of machines executing on the host computer, the program comprising sets of instructions: providing the pNIC with a set of mappings between virtual port identifiers (VPIDs) of interfaces of the set of machines executing on the host computer and physical port identifiers (PPIDs) of interfaces of the pNIC, each VPID used by a software switch executing on the host computer to forward data messages to a virtual network interface controller (vNIC) of a machine in the set of machines executing on the host computer; andproviding the pNIC with a set of flow entries for a set of data message flows, each flow entry in the set of flow entries specifying a destination using a VPID, wherein the PNIC stores the set of flow entries and uses the set of flow entries to perform flow processing for data messages associated with machines executing on the host computer, andwherein the PNIC stores the set of mappings and uses the set of mappings to translate VPIDs, which are obtained through the performed flow processing of the data messages, to PPIDs in order to identify an egress interface of the pNIC to which to forward a data message destined to a particular VPID.
US Referenced Citations (265)
Number Name Date Kind
5884313 Talluri et al. Mar 1999 A
5887134 Ebrahim Mar 1999 A
5974547 Klimenko Oct 1999 A
6219699 McCloghrie et al. Apr 2001 B1
6393483 Latif et al. May 2002 B1
6496935 Fink et al. Dec 2002 B1
7079544 Wakayama et al. Jul 2006 B2
7424710 Nelson et al. Sep 2008 B1
7606260 Oguchi et al. Oct 2009 B2
7849168 Utsunomiya et al. Dec 2010 B2
7853998 Blaisdell et al. Dec 2010 B2
8346919 Eiriksson et al. Jan 2013 B1
8442059 Iglesia et al. May 2013 B1
8660129 Brendel et al. Feb 2014 B1
8825900 Gross et al. Sep 2014 B1
8856518 Sridharan et al. Oct 2014 B2
8930529 Wang et al. Jan 2015 B1
8931047 Wanser et al. Jan 2015 B2
9008085 Kamble et al. Apr 2015 B2
9047109 Wang et al. Jun 2015 B1
9116727 Benny et al. Aug 2015 B2
9135044 Maharana Sep 2015 B2
9143582 Banavalikar et al. Sep 2015 B2
9148895 PalChaudhuri et al. Sep 2015 B2
9152593 Galles Oct 2015 B2
9154327 Marino et al. Oct 2015 B1
9197551 DeCusatis et al. Nov 2015 B2
9231849 Hyoudou et al. Jan 2016 B2
9325739 Roth et al. Apr 2016 B1
9378161 Dalal et al. Jun 2016 B1
9380027 Lian et al. Jun 2016 B1
9419897 Cherian et al. Aug 2016 B2
9460031 Dalal et al. Oct 2016 B1
9621516 Basak et al. Apr 2017 B2
9634990 Lee Apr 2017 B2
9692698 Cherian et al. Jun 2017 B2
9755903 Masurekar et al. Sep 2017 B2
9806948 Masurekar et al. Oct 2017 B2
9916269 Machulsky et al. Mar 2018 B1
10050884 Dhanabalan et al. Aug 2018 B1
10142127 Cherian et al. Nov 2018 B2
10162793 BShara et al. Dec 2018 B1
10193771 Koponen et al. Jan 2019 B2
10284478 Yokota May 2019 B2
10341296 Bhagwat et al. Jul 2019 B2
10567308 Subbiah et al. Feb 2020 B1
10873566 Han Dec 2020 B2
10997106 Bandaru et al. May 2021 B1
11005755 Yu et al. May 2021 B2
11038845 Han Jun 2021 B2
11108593 Cherian et al. Aug 2021 B2
11221972 Raman et al. Jan 2022 B1
11385981 Silakov et al. Jul 2022 B1
11593278 Kim et al. Feb 2023 B2
11606310 Ang et al. Mar 2023 B2
11636053 Kim et al. Apr 2023 B2
20020069245 Kim Jun 2002 A1
20030097589 Syvanne May 2003 A1
20030130833 Brownell et al. Jul 2003 A1
20030140124 Burns Jul 2003 A1
20030145114 Gertner Jul 2003 A1
20030200290 Zimmerman et al. Oct 2003 A1
20030217119 Raman et al. Nov 2003 A1
20040042464 Elzur et al. Mar 2004 A1
20050053079 Havala Mar 2005 A1
20060029056 Perera et al. Feb 2006 A1
20060041894 Cheng et al. Feb 2006 A1
20060206603 Rajan et al. Sep 2006 A1
20060206655 Chappell et al. Sep 2006 A1
20060236054 Kitamura Oct 2006 A1
20070056038 Lok Mar 2007 A1
20070174850 Zur Jul 2007 A1
20080008202 Terrell et al. Jan 2008 A1
20080163207 Reumann et al. Jul 2008 A1
20080267177 Johnson et al. Oct 2008 A1
20090089537 Vick et al. Apr 2009 A1
20090119087 Ang et al. May 2009 A1
20090161547 Riddle et al. Jun 2009 A1
20090161673 Breslau et al. Jun 2009 A1
20090249472 Litvin et al. Oct 2009 A1
20100070677 Thakkar Mar 2010 A1
20100115208 Logan May 2010 A1
20100165874 Brown et al. Jul 2010 A1
20100275199 Smith et al. Oct 2010 A1
20100287306 Matsuda Nov 2010 A1
20110060859 Shukla et al. Mar 2011 A1
20110219170 Frost et al. Sep 2011 A1
20120042138 Eguchi et al. Feb 2012 A1
20120072909 Malik et al. Mar 2012 A1
20120079478 Galles et al. Mar 2012 A1
20120096459 Miyazaki Apr 2012 A1
20120163388 Goel et al. Jun 2012 A1
20120167082 Kumar et al. Jun 2012 A1
20120207174 Shieh Aug 2012 A1
20120259953 Gertner Oct 2012 A1
20120278584 Nagami et al. Nov 2012 A1
20120290703 Barabash et al. Nov 2012 A1
20120320918 Fomin et al. Dec 2012 A1
20130033993 Cardona et al. Feb 2013 A1
20130058346 Sridharan et al. Mar 2013 A1
20130061047 Sridharan et al. Mar 2013 A1
20130073702 Umbehocker Mar 2013 A1
20130125122 Hansen May 2013 A1
20130125230 Koponen et al. May 2013 A1
20130145106 Kan Jun 2013 A1
20130311663 Kamath et al. Nov 2013 A1
20130318219 Kancherla Nov 2013 A1
20130318268 Dalal et al. Nov 2013 A1
20140003442 Hernandez et al. Jan 2014 A1
20140056151 Petrus et al. Feb 2014 A1
20140067763 Jorapurkar et al. Mar 2014 A1
20140074799 Karampuri et al. Mar 2014 A1
20140098815 Mishra et al. Apr 2014 A1
20140115578 Cooper et al. Apr 2014 A1
20140123211 Wanser et al. May 2014 A1
20140164595 Bray et al. Jun 2014 A1
20140195666 Dumitriu et al. Jul 2014 A1
20140208075 McCormick, Jr. Jul 2014 A1
20140215036 Elzur Jul 2014 A1
20140244983 McDonald et al. Aug 2014 A1
20140245296 Sethuramalingam et al. Aug 2014 A1
20140245423 Lee Aug 2014 A1
20140269712 Kidambi Sep 2014 A1
20140269754 Eguchi et al. Sep 2014 A1
20140376367 Jain et al. Dec 2014 A1
20150007317 Jain Jan 2015 A1
20150016300 Devireddy et al. Jan 2015 A1
20150019748 Gross, IV et al. Jan 2015 A1
20150020067 Brant et al. Jan 2015 A1
20150033222 Hussain Jan 2015 A1
20150052280 Lawson Feb 2015 A1
20150082417 Bhagwat et al. Mar 2015 A1
20150117445 Koponen et al. Apr 2015 A1
20150156250 Varshney et al. Jun 2015 A1
20150172183 DeCusatis et al. Jun 2015 A1
20150200808 Gourlay et al. Jul 2015 A1
20150212892 Li et al. Jul 2015 A1
20150215207 Qin et al. Jul 2015 A1
20150222547 Hayut et al. Aug 2015 A1
20150237013 Bansal et al. Aug 2015 A1
20150242134 Takada et al. Aug 2015 A1
20150261556 Jain et al. Sep 2015 A1
20150261720 Kagan et al. Sep 2015 A1
20150281178 Raman et al. Oct 2015 A1
20150281179 Raman et al. Oct 2015 A1
20150326532 Grant et al. Nov 2015 A1
20150347231 Gopal et al. Dec 2015 A1
20150358288 Jain et al. Dec 2015 A1
20150358290 Jain et al. Dec 2015 A1
20150381494 Cherian et al. Dec 2015 A1
20150381495 Cherian et al. Dec 2015 A1
20160006696 Donley et al. Jan 2016 A1
20160092108 Karaje et al. Mar 2016 A1
20160134702 Gertner May 2016 A1
20160156591 Zhou et al. Jun 2016 A1
20160162302 Warszawski et al. Jun 2016 A1
20160162438 Hussain et al. Jun 2016 A1
20160179579 Amann et al. Jun 2016 A1
20160182342 Singaravelu et al. Jun 2016 A1
20160239330 Bride et al. Aug 2016 A1
20160285913 Itskin et al. Sep 2016 A1
20160294858 Woolward et al. Oct 2016 A1
20160306648 Deguillard et al. Oct 2016 A1
20170005986 Bansal et al. Jan 2017 A1
20170024334 Bergsten et al. Jan 2017 A1
20170075845 Kopparthi Mar 2017 A1
20170093623 Zheng Mar 2017 A1
20170099532 Kakande Apr 2017 A1
20170104790 Meyers et al. Apr 2017 A1
20170118173 Arramreddy et al. Apr 2017 A1
20170134433 Hugenbruch et al. May 2017 A1
20170161090 Kodama Jun 2017 A1
20170161189 Gertner Jun 2017 A1
20170180414 Andrews et al. Jun 2017 A1
20170187679 Basak et al. Jun 2017 A1
20170195454 Shieh Jul 2017 A1
20170208100 Lian et al. Jul 2017 A1
20170214549 Yoshino et al. Jul 2017 A1
20170244671 Kamalakantha et al. Aug 2017 A1
20170244673 Han Aug 2017 A1
20170244674 Han Aug 2017 A1
20170264622 Cooper et al. Sep 2017 A1
20170295033 Cherian et al. Oct 2017 A1
20180024964 Mao et al. Jan 2018 A1
20180032249 Makhervaks et al. Feb 2018 A1
20180088978 Li et al. Mar 2018 A1
20180095872 Dreier et al. Apr 2018 A1
20180109471 Chang Apr 2018 A1
20180152540 Niell et al. May 2018 A1
20180260125 Botes et al. Sep 2018 A1
20180262599 Firestone Sep 2018 A1
20180278684 Rashid et al. Sep 2018 A1
20180309641 Wang et al. Oct 2018 A1
20180309718 Zuo Oct 2018 A1
20180329743 Pope et al. Nov 2018 A1
20180331976 Pope et al. Nov 2018 A1
20180336346 Guenther Nov 2018 A1
20180337991 Kumar et al. Nov 2018 A1
20180349037 Zhao et al. Dec 2018 A1
20180359215 Khare et al. Dec 2018 A1
20190042506 Devey et al. Feb 2019 A1
20190044809 Willis et al. Feb 2019 A1
20190044866 Chilikin et al. Feb 2019 A1
20190075063 McDonnell et al. Mar 2019 A1
20190132296 Jiang et al. May 2019 A1
20190158396 Yu et al. May 2019 A1
20190173689 Cherian et al. Jun 2019 A1
20190200105 Cheng et al. Jun 2019 A1
20190235909 Jin et al. Aug 2019 A1
20190278675 Bolkhovitin et al. Sep 2019 A1
20190280980 Hyoudou Sep 2019 A1
20190286373 Karumbunathan et al. Sep 2019 A1
20190306083 Shih et al. Oct 2019 A1
20200021532 Borikar Jan 2020 A1
20200028800 Strathman et al. Jan 2020 A1
20200042234 Krasner et al. Feb 2020 A1
20200042389 Kulkarni et al. Feb 2020 A1
20200042412 Kulkarni et al. Feb 2020 A1
20200133909 Hefty et al. Apr 2020 A1
20200136996 Li et al. Apr 2020 A1
20200213227 Pianigiani et al. Jul 2020 A1
20200259731 Sivaraman et al. Aug 2020 A1
20200278892 Nainar et al. Sep 2020 A1
20200278893 Niell et al. Sep 2020 A1
20200314011 Deval et al. Oct 2020 A1
20200319812 He et al. Oct 2020 A1
20200328192 Zaman et al. Oct 2020 A1
20200382329 Yuan Dec 2020 A1
20200401320 Pyati et al. Dec 2020 A1
20200412659 Ilitzky et al. Dec 2020 A1
20210019270 Li et al. Jan 2021 A1
20210026670 Krivenok et al. Jan 2021 A1
20210058342 McBrearty Feb 2021 A1
20210176212 Han Jun 2021 A1
20210226846 Ballard et al. Jul 2021 A1
20210232528 Kutch et al. Jul 2021 A1
20210266259 Renner, III et al. Aug 2021 A1
20210314232 Nainar et al. Oct 2021 A1
20210357242 Ballard et al. Nov 2021 A1
20210377166 Brar et al. Dec 2021 A1
20210377188 Ghag et al. Dec 2021 A1
20210392017 Cherian et al. Dec 2021 A1
20210409317 Seshan et al. Dec 2021 A1
20220043572 Said et al. Feb 2022 A1
20220100432 Kim et al. Mar 2022 A1
20220100491 Voltz et al. Mar 2022 A1
20220100542 Voltz Mar 2022 A1
20220100544 Voltz Mar 2022 A1
20220100545 Cherian et al. Mar 2022 A1
20220100546 Cherian et al. Mar 2022 A1
20220103478 Ang et al. Mar 2022 A1
20220103488 Wang et al. Mar 2022 A1
20220103490 Kim et al. Mar 2022 A1
20220103629 Cherian et al. Mar 2022 A1
20220150055 Cui et al. May 2022 A1
20220164451 Bagwell May 2022 A1
20220197681 Rajagopal Jun 2022 A1
20220206908 Brar et al. Jun 2022 A1
20220206962 Kim et al. Jun 2022 A1
20220206964 Kim et al. Jun 2022 A1
20220210229 Maddukuri et al. Jun 2022 A1
20220231968 Rajagopal Jul 2022 A1
20220272039 Cardona et al. Aug 2022 A1
20220335563 Elzur Oct 2022 A1
20230004508 Liu et al. Jan 2023 A1
Foreign Referenced Citations (21)
Number Date Country
2672100 Jun 2008 CA
2918551 Jul 2010 CA
101258725 Sep 2008 CN
101540826 Sep 2009 CN
102018004046 Nov 2018 DE
1482711 Dec 2004 EP
3598291 Jan 2020 EP
4127953 Feb 2023 EP
4160424 Apr 2023 EP
202107297 Feb 2021 TW
2005099201 Oct 2005 WO
2007036372 Apr 2007 WO
2010008984 Jan 2010 WO
2016003489 Jan 2016 WO
2020027913 Feb 2020 WO
2021030020 Feb 2021 WO
2022066267 Mar 2022 WO
2022066268 Mar 2022 WO
2022066270 Mar 2022 WO
2022066271 Mar 2022 WO
2022066531 Mar 2022 WO
Non-Patent Literature Citations (44)
Entry
Mohammadkhan et al., “P4NFV: P4 Enabled NFV Systems with SmartNICs,” 2019 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), pp. 1-7, 2019 (Year: 2019).
Li et al., “DrawerPipe: A Reconfigurable Pipeline for Network Processing on FPGA-Based SmartNIC”, Electronics 9, 59., 2020 (Year: 2020).
Anwer, Muhammad Bilal, et al., “Building a Fast, Virtualized Data Plane with Programmable Hardware,” Aug. 17, 2009, 8 pages, VISA'09, ACM, Barcelona, Spain.
Author Unknown, “Network Functions Virtualisation; Infrastructure Architecture; Architecture of the Hypervisor Domain,” Draft ETSI GS NFV-INF 004 V0.3.1, May 28, 2014, 50 pages, France.
Koponen, Teemu, et al., “Network Virtualization in Multi-tenant Datacenters,” Technical Report TR-2013-001E, Aug. 2013, 22 pages, VMware, Inc., Palo Alto, CA, USA.
Le Vasseur, Joshua, et al., “Standardized but Flexible I/O for Self-Virtualizing Devices,” Month Unknown 2008, 7 pages.
Non-Published Commonly Owned U.S. Appl. No. 17/091,663, filed Nov. 6, 2020, 29 pages, VMware, Inc.
Non-Published Commonly Owned U.S. Appl. No. 17/107,561, filed Nov. 30, 2020, 39 pages, VMware, Inc.
Non-Published Commonly Owned U.S. Appl. No. 17/107,568, filed Nov. 30, 2020, 39 pages, VMware, Inc.
Non-Published Commonly Owned Related U.S. Appl. No. 17/114,975 with similar specification, filed Dec. 8, 2020, 52 pages, VMware, Inc.
Non-Published Commonly Owned U.S. Appl. No. 17/145,318, filed Jan. 9, 2021, 70 pages, VMware, Inc.
Non-Published Commonly Owned U.S. Appl. No. 17/145,319, filed Jan. 9, 2021, 70 pages, VMware, Inc.
Non-Published Commonly Owned U.S. Appl. No. 17/145,320, filed Jan. 9, 2021, 70 pages, VMware, Inc.
Non-Published Commonly Owned U.S. Appl. No. 17/145,321, filed Jan. 9, 2021, 49 pages, VMware, Inc.
Non-Published Commonly Owned U.S. Appl. No. 17/145,322, filed Jan. 9, 2021, 49 pages, VMware, Inc.
Non-Published Commonly Owned U.S. Appl. No. 17/145,329, filed Jan. 9, 2021, 50 pages, VMware, Inc.
Non-Published Commonly Owned U.S. Appl. No. 17/145,334, filed Jan. 9, 2021, 49 pages, VMware, Inc.
Peterson, Larry L., et al., “OS Support for General-Purpose Routers,” Month Unknown 1999, 6 pages, Department of Computer Science, Princeton University.
Pettit, Justin, et al., “Virtual Switching in an Era of Advanced Edges,” In Proc. 2nd Workshop on Data Center—Converged and Virtual Ethernet Switching (DCCAVES), Sep. 2010, 7 pages, vol. 22. ITC.
Spalink, Tammo, et al., “Building a Robust Software-Based Router Using Network Processors,” Month Unknown 2001, 14 pages, ACM, Banff, Canada.
Turner, Jon, et al., “Supercharging PlanetLab—High Performance, Multi-Application Overlay Network Platform,” SIGCOMM-07, Aug. 27-31, 2007, 12 pages, ACM, Koyoto, Japan.
Author Unknown, “An Introduction to SmartNICs” The Next Platform, Mar. 4, 2019, 4 pages, retrieved from https://www.nextplatform.com/2019/03/04/an-introduction-to-smartnics/.
Author Unknown, “In-Hardware Storage Virtualization—NVMe SNAP™ Revolutionizes Data Center Storage: Composable Storage Made Simple,” Month Unknown 2019, 3 pages, Mellanox Technologies, Sunnyvale, CA, USA.
Author Unknown, “Package Manager,” Wikipedia, Sep. 8, 2020, 10 pages.
Author Unknown, “VMDK”, Wikipedia, May 17, 2020, 3 pages, retrieved from https://en.wikipedia.org/w/index.php?title=VMDK&oldid=957225521.
Author Unknown, “vSphere Managed Inventory Objects,” Aug. 3, 2020, 3 pages, retrieved from https://docs.vmware.com/en/VMware-vSphere/6.7/com.vmware.vsphere.vcenterhost.doc/GUID-4D4B3DF2-D033-4782-A030-3C3600DE5A7F.html, VMware, Inc.
Grant, Stewart, et al., “SmartNIC Performance Isolation with FairNIC: Programmable Networking for the Cloud,” SIGCOMM '20, Aug. 10-14, 2020, 13 pages, ACM, Virtual Event, USA.
Liu, Ming, et al., “Offloading Distributed Applications onto SmartNICs using iPipe,” SIGCOMM '19, Aug. 19-23, 2019, 16 pages, ACM, Beijing, China.
PCT International Search Report and Written Opinion of Commonly Owned International Patent Application PCT/US2021/042115, dated Dec. 2, 2021, 14 pages, International Searching Authority (EPO).
Suarez, Julio, “Reduce TCO with Arm Based SmartNICs,” Nov. 14, 2019, 12 pages, retrieved from https://community.arm.com/arm-community-blogs/b/architectures-and-processors-blog/posts/reduce-tco-with-arm-based-smartnics.
Author Unknown, “8.6 Receive-Side Scaling (RSS),” Month Unknown 2020, 2 pages, Red Hat, Inc.
Herbert, Tom, et al., “Scaling in the Linux Networking Stack,” Jun. 2, 2020, retrieved from https://01.org/linuxgraphics/gfx-docs/drm/networking/scaling.html.
Non-Published Commonly Owned U.S. Appl. No. 16/890,890, filed Jun. 2, 2020, 39 pages, VMware, Inc.
Stringer, Joe, et al., “OVS Hardware Offloads Discussion Panel,” Nov. 7, 2016, 37 pages, retrieved from http://openvswitch.org/support/ovscon2016/7/1450-stringer.pdf.
Non-Published Commonly Owned Related International Patent Application PCT/US2021/042115 with similar specification, filed Jul. 17, 2021, 52 pages, VMware, Inc.
Non-Published Commonly Owned U.S. Appl. No. 17/461,908, filed Aug. 30, 2021, 60 pages, Nicira, Inc.
Author Unknown, “vSAN Planning and Deployment” Update 3, Aug. 20, 2019, 85 pages, VMware, Inc., Palo Alto, CA, USA.
Author Unknown, “What is End-to-End Encryption and How does it Work?,” Mar. 7, 2018, 4 pages, Proton Technologies AG, Geneva, Switzerland.
Harris, Jim, “Accelerating NVME-oF* for VMs with the Storage Performance Development Kit,” Flash Memory Summit, Aug. 2017, 18 pages, Intel Corporation, Santa Clara, CA.
Perlroth, Nicole, “What is End-to-End Encryption? Another Bull's-Eye on Big Tech,” The New York Times, Nov. 19, 2019, 4 pages, retrieved from https://nytimes.com/2019/11/19/technology/end-to-end-encryption.html.
Angeles, Sara, “Cloud vs. Data Center: What's the difference?” Nov. 23, 2018, 1 page, retrieved from https://www.businessnewsdaily.com/4982-cloud-vs-data-center.html.
Author Unknown, “Middlebox,” Wikipedia, Nov. 19, 2019, 1 page, Wikipedia.com.
Doyle, Lee, “An Introduction to smart NICs and their Benefits,” Jul. 2019, 2 pages, retrieved from https://www.techtarget.com/searchnetworking/tip/An-introduction-to-smart-NICs-and-ther-benefits.
Non-Published Commonly Owned U.S. Appl. No. 18/196,844, filed May 12, 2023, 41 pages, Nicira, Inc.
Related Publications (1)
Number Date Country
20220103487 A1 Mar 2022 US
Provisional Applications (1)
Number Date Country
63084436 Sep 2020 US