xref: /dpdk/doc/guides/linux_gsg/linux_drivers.rst (revision daa02b5cddbb8e11b31d41e2bf7bb1ae64dcae2f)
1..  SPDX-License-Identifier: BSD-3-Clause
2    Copyright(c) 2010-2015 Intel Corporation.
3    Copyright 2017 Mellanox Technologies, Ltd
4    All rights reserved.
5
6.. _linux_gsg_linux_drivers:
7
8Linux Drivers
9=============
10
11Different PMDs may require different kernel drivers in order to work properly.
12Depending on the PMD being used, a corresponding kernel driver should be loaded,
13and network ports should be bound to that driver.
14
15VFIO
16----
17
18VFIO is a robust and secure driver that relies on IOMMU protection.
19To make use of VFIO, the ``vfio-pci`` module must be loaded:
20
21.. code-block:: console
22
23    sudo modprobe vfio-pci
24
25VFIO kernel is usually present by default in all distributions,
26however please consult your distributions documentation to make sure that is the case.
27
28For DMA mapping of either external memory or hugepages, VFIO interface is used.
29VFIO does not support partial unmap of once mapped memory. Hence DPDK's memory is
30mapped in hugepage granularity or system page granularity. Number of DMA
31mappings is limited by kernel with user locked memory limit of a process (rlimit)
32for system/hugepage memory. Another per-container overall limit applicable both
33for external memory and system memory was added in kernel 5.1 defined by
34VFIO module parameter ``dma_entry_limit`` with a default value of 64K.
35When application is out of DMA entries, these limits need to be adjusted to
36increase the allowed limit.
37
38Since Linux version 5.7,
39the ``vfio-pci`` module supports the creation of virtual functions.
40After the PF is bound to ``vfio-pci`` module,
41the user can create the VFs using the ``sysfs`` interface,
42and these VFs will be bound to ``vfio-pci`` module automatically.
43
44When the PF is bound to ``vfio-pci``,
45by default it will have a randomly generated VF token.
46For security reasons, this token is write only,
47so the user cannot read it from the kernel directly.
48To access the VFs, the user needs to create a new token,
49and use it to initialize both VF and PF devices.
50The tokens are in UUID format,
51so any UUID generation tool can be used to create a new token.
52
53This VF token can be passed to DPDK by using EAL parameter ``--vfio-vf-token``.
54The token will be used for all PF and VF ports within the application.
55
56#. Generate the VF token by uuid command
57
58   .. code-block:: console
59
60      14d63f20-8445-11ea-8900-1f9ce7d5650d
61
62#. Load the ``vfio-pci`` module with ``enable_sriov`` parameter set
63
64   .. code-block:: console
65
66      sudo modprobe vfio-pci enable_sriov=1
67
68#. Bind the PCI devices to ``vfio-pci`` driver
69
70   .. code-block:: console
71
72      ./usertools/dpdk-devbind.py -b vfio-pci 0000:86:00.0
73
74#. Create the desired number of VF devices
75
76   .. code-block:: console
77
78      echo 2 > /sys/bus/pci/devices/0000:86:00.0/sriov_numvfs
79
80#. Start the DPDK application that will manage the PF device
81
82   .. code-block:: console
83
84      <build_dir>/app/dpdk-testpmd -l 22-25 -n 4 -a 86:00.0 \
85      --vfio-vf-token=14d63f20-8445-11ea-8900-1f9ce7d5650d --file-prefix=pf -- -i
86
87#. Start the DPDK application that will manage the VF device
88
89   .. code-block:: console
90
91      <build_dir>/app/dpdk-testpmd -l 26-29 -n 4 -a 86:02.0 \
92      --vfio-vf-token=14d63f20-8445-11ea-8900-1f9ce7d5650d --file-prefix=vf0 -- -i
93
94To make use of full VFIO functionality,
95both kernel and BIOS must support and be configured
96to use IO virtualization (such as Intel® VT-d).
97
98.. note::
99
100   Linux versions earlier than version 3.6 do not support VFIO.
101
102.. note::
103
104   Linux versions earlier than version 5.7 do not support the creation of
105   virtual functions within the VFIO framework.
106
107.. note::
108
109   In most cases, specifying "iommu=on" as kernel parameter should be enough to
110   configure the Linux kernel to use IOMMU.
111
112For proper operation of VFIO when running DPDK applications as a non-privileged user, correct permissions should also be set up.
113For more information, please refer to :ref:`Running_Without_Root_Privileges`.
114
115VFIO no-IOMMU mode
116------------------
117
118If there is no IOMMU available on the system, VFIO can still be used,
119but it has to be loaded with an additional module parameter:
120
121.. code-block:: console
122
123   modprobe vfio enable_unsafe_noiommu_mode=1
124
125Alternatively, one can also enable this option in an already loaded kernel module:
126
127.. code-block:: console
128
129   echo 1 > /sys/module/vfio/parameters/enable_unsafe_noiommu_mode
130
131After that, VFIO can be used with hardware devices as usual.
132
133.. note::
134
135   It may be required to unload all VFIO related-modules before probing
136   the module again with ``enable_unsafe_noiommu_mode=1`` parameter.
137
138.. warning::
139
140   Since no-IOMMU mode forgoes IOMMU protection, it is inherently unsafe.
141   That said, it does make it possible for the user
142   to keep the degree of device access and programming that VFIO has,
143   in situations where IOMMU is not available.
144
145UIO
146---
147
148In situations where using VFIO is not an option, there are alternative drivers one can use.
149In many cases, the standard ``uio_pci_generic`` module included in the Linux kernel
150can be used as a substitute for VFIO. This module can be loaded using the command:
151
152.. code-block:: console
153
154   sudo modprobe uio_pci_generic
155
156.. note::
157
158   ``uio_pci_generic`` module doesn't support the creation of virtual functions.
159
160As an alternative to the ``uio_pci_generic``, there is the ``igb_uio`` module
161which can be found in the repository `dpdk-kmods <http://git.dpdk.org/dpdk-kmods>`_.
162It can be loaded as shown below:
163
164.. code-block:: console
165
166   sudo modprobe uio
167   sudo insmod igb_uio.ko
168
169.. note::
170
171   If UEFI secure boot is enabled,
172   the Linux kernel may disallow the use of UIO on the system.
173   Therefore, devices for use by DPDK should be bound to the ``vfio-pci`` kernel module
174   rather than any UIO-based module.
175   For more details see :ref:`linux_gsg_binding_kernel` below.
176
177.. note::
178
179   If the devices used for DPDK are bound to the ``uio_pci_generic`` kernel module,
180   please make sure that the IOMMU is disabled or is in passthrough mode.
181   One can add ``intel_iommu=off`` or ``amd_iommu=off`` or ``intel_iommu=on iommu=pt``
182   in GRUB command line on x86_64 systems,
183   or add ``iommu.passthrough=1`` on aarch64 systems.
184
185.. note::
186
187   Using UIO drivers is inherently unsafe due to this method lacking IOMMU protection,
188   and can only be done by root user.
189
190.. _bifurcated_driver:
191
192Bifurcated Driver
193-----------------
194
195PMDs which use the bifurcated driver co-exists with the device kernel driver.
196On such model the NIC is controlled by the kernel, while the data
197path is performed by the PMD directly on top of the device.
198
199Such model has the following benefits:
200
201 - It is secure and robust, as the memory management and isolation
202   is done by the kernel.
203 - It enables the user to use legacy linux tools such as ``ethtool`` or
204   ``ifconfig`` while running DPDK application on the same network ports.
205 - It enables the DPDK application to filter only part of the traffic,
206   while the rest will be directed and handled by the kernel driver.
207   The flow bifurcation is performed by the NIC hardware.
208   As an example, using :ref:`flow_isolated_mode` allows to choose
209   strictly what is received in DPDK.
210
211More about the bifurcated driver can be found in
212`Mellanox Bifurcated DPDK PMD
213<https://www.dpdk.org/wp-content/uploads/sites/35/2016/10/Day02-Session04-RonyEfraim-Userspace2016.pdf>`__.
214
215.. _linux_gsg_binding_kernel:
216
217Binding and Unbinding Network Ports to/from the Kernel Modules
218--------------------------------------------------------------
219
220.. note::
221
222   PMDs which use the bifurcated driver should not be unbound from their kernel drivers.
223   This section is for PMDs which use the UIO or VFIO drivers.
224
225As of release 1.4, DPDK applications no longer automatically unbind all supported network ports from the kernel driver in use.
226Instead, in case the PMD being used use the VFIO or UIO drivers,
227all ports that are to be used by a DPDK application must be bound to
228the ``vfio-pci``, ``uio_pci_generic``, or ``igb_uio`` module
229before the application is run.
230For such PMDs, any network ports under Linux* control will be ignored and cannot be used by the application.
231
232To bind ports to the ``vfio-pci``, ``uio_pci_generic`` or ``igb_uio`` module
233for DPDK use, or to return ports to Linux control,
234a utility script called ``dpdk-devbind.py`` is provided in the ``usertools`` subdirectory.
235This utility can be used to provide a view of the current state of the network ports on the system,
236and to bind and unbind those ports from the different kernel modules,
237including the VFIO and UIO modules.
238The following are some examples of how the script can be used.
239A full description of the script and its parameters can be obtained
240by calling the script with the ``--help`` or ``--usage`` options.
241Note that the UIO or VFIO kernel modules to be used,
242should be loaded into the kernel before running the ``dpdk-devbind.py`` script.
243
244.. warning::
245
246   Due to the way VFIO works, there are certain limitations
247   to which devices can be used with VFIO.
248   Mainly it comes down to how IOMMU groups work.
249   Any Virtual Function device can usually be used with VFIO on its own,
250   but physical devices may require either all ports bound to VFIO,
251   or some of them bound to VFIO while others not being bound to anything at all.
252
253   If your device is behind a PCI-to-PCI bridge,
254   the bridge will then be part of the IOMMU group in which your device is in.
255   Therefore, the bridge driver should also be unbound from the bridge PCI device
256   for VFIO to work with devices behind the bridge.
257
258.. warning::
259
260   While any user can run the ``dpdk-devbind.py`` script
261   to view the status of the network ports,
262   binding or unbinding network ports requires root privileges.
263
264To see the status of all network ports on the system:
265
266.. code-block:: console
267
268    ./usertools/dpdk-devbind.py --status
269
270    Network devices using DPDK-compatible driver
271    ============================================
272    0000:82:00.0 '82599EB 10-GbE NIC' drv=uio_pci_generic unused=ixgbe
273    0000:82:00.1 '82599EB 10-GbE NIC' drv=uio_pci_generic unused=ixgbe
274
275    Network devices using kernel driver
276    ===================================
277    0000:04:00.0 'I350 1-GbE NIC' if=em0  drv=igb unused=uio_pci_generic *Active*
278    0000:04:00.1 'I350 1-GbE NIC' if=eth1 drv=igb unused=uio_pci_generic
279    0000:04:00.2 'I350 1-GbE NIC' if=eth2 drv=igb unused=uio_pci_generic
280    0000:04:00.3 'I350 1-GbE NIC' if=eth3 drv=igb unused=uio_pci_generic
281
282    Other network devices
283    =====================
284    <none>
285
286To bind device ``eth1``,``04:00.1``, to the ``uio_pci_generic`` driver:
287
288.. code-block:: console
289
290    ./usertools/dpdk-devbind.py --bind=uio_pci_generic 04:00.1
291
292or, alternatively,
293
294.. code-block:: console
295
296    ./usertools/dpdk-devbind.py --bind=uio_pci_generic eth1
297
298To restore device ``82:00.0`` to its original kernel binding:
299
300.. code-block:: console
301
302    ./usertools/dpdk-devbind.py --bind=ixgbe 82:00.0
303
304Troubleshooting VFIO
305--------------------
306
307In certain situations, using ``dpdk-devbind.py`` script
308to bind a device to VFIO driver may fail.
309The first place to check is the kernel messages:
310
311.. code-block:: console
312
313   dmesg | tail
314   ...
315   [ 1297.875090] vfio-pci: probe of 0000:31:00.0 failed with error -22
316   ...
317
318In most cases, the ``error -22`` indicates that the VFIO subsystem
319could not be enabled because there is no IOMMU support.
320
321To check whether the kernel has been booted with correct parameters,
322one can check the kernel command-line:
323
324.. code-block:: console
325
326   cat /proc/cmdline
327
328Please refer to earlier sections on how to configure kernel parameters
329correctly for your system.
330
331If the kernel is configured correctly, one also has to make sure that
332the BIOS configuration has virtualization features (such as Intel® VT-d).
333There is no standard way to check if the platform is configured correctly,
334so please check with your platform documentation to see if it has such features,
335and how to enable them.
336
337In certain distributions, default kernel configuration is such that
338the no-IOMMU mode is disabled altogether at compile time.
339This can be checked in the boot configuration of your system:
340
341.. code-block:: console
342
343   cat /boot/config-$(uname -r) | grep NOIOMMU
344   # CONFIG_VFIO_NOIOMMU is not set
345
346If ``CONFIG_VFIO_NOIOMMU`` is not enabled in the kernel configuration,
347VFIO driver will not support the no-IOMMU mode,
348and other alternatives (such as UIO drivers) will have to be used.
349