![]() MPLS tag to bind an LSP (Label Switching Path) to a given queue. In the hash calculation, the Label Switching router can allocate a special In the case of MPLS (Multiprotocol Label Switching), if the MPLS tag is used.Returning packets, of the given connection, will have desired LSB’s. In the case of SNAT (Source Network Address Translation) it is possible toįind a special source port number on translation so that the hash of.LSB’s as the hash from the original tuple. In this case it would be useful to find another tuple whose hash has the same Of the least significant bits (LSB) of the hash value are used to indicate anĮntry in the RSS Redirection Table (ReTa) and thus the index of the queue. In some use cases it is useful to have a way to find partial collisions of the A pointer to the memory where the matrices will be written.GFNI implementations from the RSS hash key. Rte_thash_complete_matrix() is a function that calculates matrices required by Array of uint32_t where to put calculated Toeplitz hash values.Array of the pointers on data to be hashed.A length of the longest tuple in bytes.Rte_thash_gfni_bulk() takes the parameters: A pointer to the matrices derived from the RSS hash key using rte_thash_complete_matrix().Rte_thash_gfni_bulk() bulk implementation of the rte_thash_gfni(). Rte_thash_gfni() calculates the hash value for a single tuple, and They expect the tuple to be in network byte order. Could be used if rte_thash_gfni_supported is true. The last two functions are vectorized implementations using The rte_softrss_be function is a faster implementation,īut it expects rss_key to be converted to the host byte order. To be exactly the same as the one installed on the NIC. The rte_softrss() function expects the rss_key “host” byte order and a multiple of 4 bytes in length. A pointer to the RSS hash key corresponding to the one installed on the NIC.īoth of above mentioned _softrss_ functions expect the tuple to be in. ![]() A length of this tuple counted in double words.A pointer to the tuple, containing fields extracted from the packet.There are four functions that provide calculation of the Toeplitz hash sum:įirst two functions are scalar implementation and take the parameters:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |