1.. SPDX-License-Identifier: BSD-3-Clause 2 Copyright(c) 2010-2015 Intel Corporation. 3 Copyright 2017 Mellanox Technologies, Ltd 4 All rights reserved. 5 6.. include:: <isonum.txt> 7 8.. _linux_gsg_linux_drivers: 9 10Linux Drivers 11============= 12 13Different PMDs may require different kernel drivers in order to work properly. 14Depending on the PMD being used, a corresponding kernel driver should be loaded, 15and network ports should be bound to that driver. 16 17.. _linux_gsg_binding_kernel: 18 19Binding and Unbinding Network Ports to/from the Kernel Modules 20-------------------------------------------------------------- 21 22.. note:: 23 24 PMDs which use the bifurcated driver should not be unbound from their kernel drivers. 25 This section is for PMDs which use the UIO or VFIO drivers. 26 See :ref:`bifurcated_driver` section for more details. 27 28.. note:: 29 30 It is recommended that ``vfio-pci`` be used as the kernel module for DPDK-bound ports in all cases. 31 If an IOMMU is unavailable, the ``vfio-pci`` can be used in :ref:`no-iommu<vfio_noiommu>` mode. 32 If, for some reason, vfio is unavailable, then UIO-based modules, ``igb_uio`` and ``uio_pci_generic`` may be used. 33 See section :ref:`uio` for details. 34 35Most devices require that the hardware to be used by DPDK be unbound from the kernel driver it uses, 36and instead be bound to the ``vfio-pci`` kernel module before the application is run. 37For such PMDs, any network ports or other hardware under Linux* control will be ignored and cannot be used by the application. 38 39To bind ports to the ``vfio-pci`` module 40for DPDK use, or to return ports to Linux control, 41a utility script called ``dpdk-devbind.py`` is provided in the ``usertools`` subdirectory. 42This utility can be used to provide a view of the current state of the network ports on the system, 43and to bind and unbind those ports from the different kernel modules, 44including the VFIO and UIO modules. 45The following are some examples of how the script can be used. 46A full description of the script and its parameters can be obtained 47by calling the script with the ``--help`` or ``--usage`` options. 48Note that the UIO or VFIO kernel modules to be used, 49should be loaded into the kernel before running the ``dpdk-devbind.py`` script. 50 51.. note:: 52 53 Due to the way VFIO works, there are certain limitations 54 to which devices can be used with VFIO. 55 Mainly it comes down to how IOMMU groups work. 56 Any Virtual Function device can usually be used with VFIO on its own, 57 but physical devices may require either all ports bound to VFIO, 58 or some of them bound to VFIO while others not being bound to anything at all. 59 60 If your device is behind a PCI-to-PCI bridge, 61 the bridge will then be part of the IOMMU group in which your device is in. 62 Therefore, the bridge driver should also be unbound from the bridge PCI device 63 for VFIO to work with devices behind the bridge. 64 65.. note:: 66 67 While any user can run the ``dpdk-devbind.py`` script 68 to view the status of the network ports, 69 binding or unbinding network ports requires root privileges. 70 71To see the status of all network ports on the system: 72 73.. code-block:: console 74 75 ./usertools/dpdk-devbind.py --status 76 77 Network devices using DPDK-compatible driver 78 ============================================ 79 0000:82:00.0 '82599EB 10-GbE NIC' drv=vfio-pci unused=ixgbe 80 0000:82:00.1 '82599EB 10-GbE NIC' drv=vfio-pci unused=ixgbe 81 82 Network devices using kernel driver 83 =================================== 84 0000:04:00.0 'I350 1-GbE NIC' if=em0 drv=igb unused=vfio-pci *Active* 85 0000:04:00.1 'I350 1-GbE NIC' if=eth1 drv=igb unused=vfio-pci 86 0000:04:00.2 'I350 1-GbE NIC' if=eth2 drv=igb unused=vfio-pci 87 0000:04:00.3 'I350 1-GbE NIC' if=eth3 drv=igb unused=vfio-pci 88 89 Other network devices 90 ===================== 91 <none> 92 93To bind device ``eth1``,``04:00.1``, to the ``vfio-pci`` driver: 94 95.. code-block:: console 96 97 ./usertools/dpdk-devbind.py --bind=vfio-pci 04:00.1 98 99or, alternatively, 100 101.. code-block:: console 102 103 ./usertools/dpdk-devbind.py --bind=vfio-pci eth1 104 105When specifying device ids, wildcards can be used for the final part of the address. 106To restore device ``82:00.0`` and ``82:00.1`` to their original kernel binding: 107 108.. code-block:: console 109 110 ./usertools/dpdk-devbind.py --bind=ixgbe 82:00.* 111 112VFIO 113---- 114 115VFIO is a robust and secure driver that relies on IOMMU protection. 116To make use of VFIO, the ``vfio-pci`` module must be loaded: 117 118.. code-block:: console 119 120 sudo modprobe vfio-pci 121 122VFIO kernel is usually present by default in all distributions, 123however please consult your distributions documentation to make sure that is the case. 124 125To make use of full VFIO functionality, 126both kernel and BIOS must support and be configured 127to use IO virtualization (such as Intel\ |reg| VT-d). 128 129.. note:: 130 131 In most cases, specifying "iommu=on" as kernel parameter should be enough to 132 configure the Linux kernel to use IOMMU. 133 134For proper operation of VFIO when running DPDK applications as a non-privileged user, correct permissions should also be set up. 135For more information, please refer to :ref:`Running_Without_Root_Privileges`. 136 137 138.. _vfio_noiommu: 139 140VFIO no-IOMMU mode 141~~~~~~~~~~~~~~~~~~ 142 143If there is no IOMMU available on the system, VFIO can still be used, 144but it has to be loaded with an additional module parameter: 145 146.. code-block:: console 147 148 modprobe vfio enable_unsafe_noiommu_mode=1 149 150Alternatively, one can also enable this option in an already loaded kernel module: 151 152.. code-block:: console 153 154 echo 1 > /sys/module/vfio/parameters/enable_unsafe_noiommu_mode 155 156After that, VFIO can be used with hardware devices as usual. 157 158.. note:: 159 160 It may be required to unload all VFIO related-modules before probing 161 the module again with ``enable_unsafe_noiommu_mode=1`` parameter. 162 163.. warning:: 164 165 Since no-IOMMU mode forgoes IOMMU protection, it is inherently unsafe. 166 That said, it does make it possible for the user 167 to keep the degree of device access and programming that VFIO has, 168 in situations where IOMMU is not available. 169 170VFIO Memory Mapping Limits 171~~~~~~~~~~~~~~~~~~~~~~~~~~~ 172 173For DMA mapping of either external memory or hugepages, VFIO interface is used. 174VFIO does not support partial unmap of once mapped memory. Hence DPDK's memory is 175mapped in hugepage granularity or system page granularity. Number of DMA 176mappings is limited by kernel with user locked memory limit of a process (rlimit) 177for system/hugepage memory. Another per-container overall limit applicable both 178for external memory and system memory was added in kernel 5.1 defined by 179VFIO module parameter ``dma_entry_limit`` with a default value of 64K. 180When application is out of DMA entries, these limits need to be adjusted to 181increase the allowed limit. 182 183Creating Virtual Functions using vfio-pci 184~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 185 186Since Linux version 5.7, 187the ``vfio-pci`` module supports the creation of virtual functions. 188After the PF is bound to ``vfio-pci`` module, 189the user can create the VFs using the ``sysfs`` interface, 190and these VFs will be bound to ``vfio-pci`` module automatically. 191 192When the PF is bound to ``vfio-pci``, 193by default it will have a randomly generated VF token. 194For security reasons, this token is write only, 195so the user cannot read it from the kernel directly. 196To access the VFs, the user needs to create a new token, 197and use it to initialize both VF and PF devices. 198The tokens are in UUID format, 199so any UUID generation tool can be used to create a new token. 200 201This VF token can be passed to DPDK by using EAL parameter ``--vfio-vf-token``. 202The token will be used for all PF and VF ports within the application. 203 204#. Generate the VF token by uuid command 205 206 .. code-block:: console 207 208 14d63f20-8445-11ea-8900-1f9ce7d5650d 209 210#. Load the ``vfio-pci`` module with ``enable_sriov`` parameter set 211 212 .. code-block:: console 213 214 sudo modprobe vfio-pci enable_sriov=1 215 216 Alternatively, pass the ``enable_sriov`` parameter through the ``sysfs`` if the module is already loaded or is built-in: 217 218 .. code-block:: console 219 220 echo 1 | sudo tee /sys/module/vfio_pci/parameters/enable_sriov 221 222#. Bind the PCI devices to ``vfio-pci`` driver 223 224 .. code-block:: console 225 226 ./usertools/dpdk-devbind.py -b vfio-pci 0000:86:00.0 227 228#. Create the desired number of VF devices 229 230 .. code-block:: console 231 232 echo 2 > /sys/bus/pci/devices/0000:86:00.0/sriov_numvfs 233 234#. Start the DPDK application that will manage the PF device 235 236 .. code-block:: console 237 238 <build_dir>/app/dpdk-testpmd -l 22-25 -n 4 -a 86:00.0 \ 239 --vfio-vf-token=14d63f20-8445-11ea-8900-1f9ce7d5650d --file-prefix=pf -- -i 240 241#. Start the DPDK application that will manage the VF device 242 243 .. code-block:: console 244 245 <build_dir>/app/dpdk-testpmd -l 26-29 -n 4 -a 86:02.0 \ 246 --vfio-vf-token=14d63f20-8445-11ea-8900-1f9ce7d5650d --file-prefix=vf0 -- -i 247 248.. note:: 249 250 Linux versions earlier than version 5.7 do not support the creation of 251 virtual functions within the VFIO framework. 252 253Troubleshooting VFIO 254~~~~~~~~~~~~~~~~~~~~ 255 256In certain situations, using ``dpdk-devbind.py`` script 257to bind a device to VFIO driver may fail. 258The first place to check is the kernel messages: 259 260.. code-block:: console 261 262 dmesg | tail 263 ... 264 [ 1297.875090] vfio-pci: probe of 0000:31:00.0 failed with error -22 265 ... 266 267In most cases, the ``error -22`` indicates that the VFIO subsystem 268could not be enabled because there is no IOMMU support. 269 270To check whether the kernel has been booted with correct parameters, 271one can check the kernel command-line: 272 273.. code-block:: console 274 275 cat /proc/cmdline 276 277Please refer to earlier sections on how to configure kernel parameters 278correctly for your system. 279 280If the kernel is configured correctly, one also has to make sure that 281the BIOS configuration has virtualization features (such as Intel\ |reg| VT-d). 282There is no standard way to check if the platform is configured correctly, 283so please check with your platform documentation to see if it has such features, 284and how to enable them. 285 286In certain distributions, default kernel configuration is such that 287the no-IOMMU mode is disabled altogether at compile time. 288This can be checked in the boot configuration of your system: 289 290.. code-block:: console 291 292 cat /boot/config-$(uname -r) | grep NOIOMMU 293 # CONFIG_VFIO_NOIOMMU is not set 294 295If ``CONFIG_VFIO_NOIOMMU`` is not enabled in the kernel configuration, 296VFIO driver will not support the no-IOMMU mode, 297and other alternatives (such as UIO drivers) will have to be used. 298 299.. _bifurcated_driver: 300 301Bifurcated Driver 302----------------- 303 304PMDs which use the bifurcated driver co-exists with the device kernel driver. 305On such model the NIC is controlled by the kernel, while the data 306path is performed by the PMD directly on top of the device. 307 308Such model has the following benefits: 309 310 - It is secure and robust, as the memory management and isolation 311 is done by the kernel. 312 - It enables the user to use legacy linux tools such as ``ethtool`` or 313 ``ifconfig`` while running DPDK application on the same network ports. 314 - It enables the DPDK application to filter only part of the traffic, 315 while the rest will be directed and handled by the kernel driver. 316 The flow bifurcation is performed by the NIC hardware. 317 As an example, using :ref:`flow_isolated_mode` allows to choose 318 strictly what is received in DPDK. 319 320More about the bifurcated driver can be found in 321`Mellanox Bifurcated DPDK PMD 322<https://www.dpdk.org/wp-content/uploads/sites/35/2016/10/Day02-Session04-RonyEfraim-Userspace2016.pdf>`__. 323 324.. _uio: 325 326UIO 327--- 328 329.. warning:: 330 331 Using UIO drivers is inherently unsafe due to this method lacking IOMMU protection, 332 and can only be done by root user. 333 334In situations where using VFIO is not an option, there are alternative drivers one can use. 335In many cases, the standard ``uio_pci_generic`` module included in the Linux kernel 336can be used as a substitute for VFIO. This module can be loaded using the command: 337 338.. code-block:: console 339 340 sudo modprobe uio_pci_generic 341 342.. note:: 343 344 ``uio_pci_generic`` module doesn't support the creation of virtual functions. 345 346As an alternative to the ``uio_pci_generic``, there is the ``igb_uio`` module 347which can be found in the repository `dpdk-kmods <http://git.dpdk.org/dpdk-kmods>`_. 348It can be loaded as shown below: 349 350.. code-block:: console 351 352 sudo modprobe uio 353 sudo insmod igb_uio.ko 354 355.. note:: 356 357 For some devices which lack support for legacy interrupts, e.g. virtual function 358 (VF) devices, the ``igb_uio`` module may be needed in place of ``uio_pci_generic``. 359 360.. note:: 361 362 If UEFI secure boot is enabled, 363 the Linux kernel may disallow the use of UIO on the system. 364 Therefore, devices for use by DPDK should be bound to the ``vfio-pci`` kernel module 365 rather than any UIO-based module. 366 For more details see :ref:`linux_gsg_binding_kernel` below. 367 368.. note:: 369 370 If the devices used for DPDK are bound to a UIO-based kernel module, 371 please make sure that the IOMMU is disabled or is in passthrough mode. 372 One can add ``intel_iommu=off`` or ``amd_iommu=off`` or ``intel_iommu=on iommu=pt`` 373 in GRUB command line on x86_64 systems, 374 or add ``iommu.passthrough=1`` on aarch64 systems. 375