1fc1f2750SBernard Iremonger.. BSD LICENSE 2fc1f2750SBernard Iremonger Copyright(c) 2010-2014 Intel Corporation. All rights reserved. 3fc1f2750SBernard Iremonger All rights reserved. 4fc1f2750SBernard Iremonger 5fc1f2750SBernard Iremonger Redistribution and use in source and binary forms, with or without 6fc1f2750SBernard Iremonger modification, are permitted provided that the following conditions 7fc1f2750SBernard Iremonger are met: 8fc1f2750SBernard Iremonger 9fc1f2750SBernard Iremonger * Redistributions of source code must retain the above copyright 10fc1f2750SBernard Iremonger notice, this list of conditions and the following disclaimer. 11fc1f2750SBernard Iremonger * Redistributions in binary form must reproduce the above copyright 12fc1f2750SBernard Iremonger notice, this list of conditions and the following disclaimer in 13fc1f2750SBernard Iremonger the documentation and/or other materials provided with the 14fc1f2750SBernard Iremonger distribution. 15fc1f2750SBernard Iremonger * Neither the name of Intel Corporation nor the names of its 16fc1f2750SBernard Iremonger contributors may be used to endorse or promote products derived 17fc1f2750SBernard Iremonger from this software without specific prior written permission. 18fc1f2750SBernard Iremonger 19fc1f2750SBernard Iremonger THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 20fc1f2750SBernard Iremonger "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 21fc1f2750SBernard Iremonger LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 22fc1f2750SBernard Iremonger A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 23fc1f2750SBernard Iremonger OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 24fc1f2750SBernard Iremonger SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT 25fc1f2750SBernard Iremonger LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 26fc1f2750SBernard Iremonger DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 27fc1f2750SBernard Iremonger THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 28fc1f2750SBernard Iremonger (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE 29fc1f2750SBernard Iremonger OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 30fc1f2750SBernard Iremonger 31fc1f2750SBernard IremongerProgrammer's Guide 32fc1f2750SBernard Iremonger================== 33fc1f2750SBernard Iremonger 34a9bc351cSBruce Richardson|today| 35fc1f2750SBernard Iremonger 36fc1f2750SBernard Iremonger 37fc1f2750SBernard Iremonger**Contents** 38fc1f2750SBernard Iremonger 39fc1f2750SBernard Iremonger.. toctree:: 40fc1f2750SBernard Iremonger :maxdepth: 3 41fc1f2750SBernard Iremonger :numbered: 42fc1f2750SBernard Iremonger 43fc1f2750SBernard Iremonger intro 44fc1f2750SBernard Iremonger overview 45fc1f2750SBernard Iremonger env_abstraction_layer 46fc1f2750SBernard Iremonger malloc_lib 47fc1f2750SBernard Iremonger ring_lib 48fc1f2750SBernard Iremonger mempool_lib 49fc1f2750SBernard Iremonger mbuf_lib 50fc1f2750SBernard Iremonger poll_mode_drv 51fc1f2750SBernard Iremonger ivshmem_lib 52fc1f2750SBernard Iremonger link_bonding_poll_mode_drv_lib 53fc1f2750SBernard Iremonger timer_lib 54fc1f2750SBernard Iremonger hash_lib 55fc1f2750SBernard Iremonger lpm_lib 56fc1f2750SBernard Iremonger lpm6_lib 57fc1f2750SBernard Iremonger packet_distrib_lib 5834287c69SSergio Gonzalez Monroy reorder_lib 59fc1f2750SBernard Iremonger ip_fragment_reassembly_lib 60fc1f2750SBernard Iremonger multi_proc_support 61fc1f2750SBernard Iremonger kernel_nic_interface 62fc1f2750SBernard Iremonger thread_safety_intel_dpdk_functions 63fc1f2750SBernard Iremonger qos_framework 64fc1f2750SBernard Iremonger power_man 65fc1f2750SBernard Iremonger packet_classif_access_ctrl 66fc1f2750SBernard Iremonger packet_framework 670ee5e7fbSSiobhan Butler vhost_lib 680cf92e62STetsuya Mukawa port_hotplug_framework 69fc1f2750SBernard Iremonger source_org 70fc1f2750SBernard Iremonger dev_kit_build_system 71fc1f2750SBernard Iremonger dev_kit_root_make_help 72fc1f2750SBernard Iremonger extend_intel_dpdk 73fc1f2750SBernard Iremonger build_app 74fc1f2750SBernard Iremonger ext_app_lib_make_help 75fc1f2750SBernard Iremonger perf_opt_guidelines 76fc1f2750SBernard Iremonger writing_efficient_code 77fc1f2750SBernard Iremonger profile_app 78fc1f2750SBernard Iremonger glossary 79fc1f2750SBernard Iremonger 80fc1f2750SBernard Iremonger 81fc1f2750SBernard Iremonger**Figures** 82fc1f2750SBernard Iremonger 83*4a22e6eeSJohn McNamara:numref:`figure_architecture-overview` :ref:`figure_architecture-overview` 84fc1f2750SBernard Iremonger 85*4a22e6eeSJohn McNamara:numref:`figure_linuxapp_launch` :ref:`figure_linuxapp_launch` 86fc1f2750SBernard Iremonger 87*4a22e6eeSJohn McNamara:numref:`figure_malloc_heap` :ref:`figure_malloc_heap` 88fc1f2750SBernard Iremonger 89*4a22e6eeSJohn McNamara:numref:`figure_ring1` :ref:`figure_ring1` 90fc1f2750SBernard Iremonger 91*4a22e6eeSJohn McNamara:numref:`figure_ring-enqueue1` :ref:`figure_ring-enqueue1` 92fc1f2750SBernard Iremonger 93*4a22e6eeSJohn McNamara:numref:`figure_ring-enqueue2` :ref:`figure_ring-enqueue2` 94fc1f2750SBernard Iremonger 95*4a22e6eeSJohn McNamara:numref:`figure_ring-enqueue3` :ref:`figure_ring-enqueue3` 96fc1f2750SBernard Iremonger 97*4a22e6eeSJohn McNamara:numref:`figure_ring-dequeue1` :ref:`figure_ring-dequeue1` 98fc1f2750SBernard Iremonger 99*4a22e6eeSJohn McNamara:numref:`figure_ring-dequeue2` :ref:`figure_ring-dequeue2` 100fc1f2750SBernard Iremonger 101*4a22e6eeSJohn McNamara:numref:`figure_ring-dequeue3` :ref:`figure_ring-dequeue3` 102fc1f2750SBernard Iremonger 103*4a22e6eeSJohn McNamara:numref:`figure_ring-mp-enqueue1` :ref:`figure_ring-mp-enqueue1` 104fc1f2750SBernard Iremonger 105*4a22e6eeSJohn McNamara:numref:`figure_ring-mp-enqueue2` :ref:`figure_ring-mp-enqueue2` 106fc1f2750SBernard Iremonger 107*4a22e6eeSJohn McNamara:numref:`figure_ring-mp-enqueue3` :ref:`figure_ring-mp-enqueue3` 108fc1f2750SBernard Iremonger 109*4a22e6eeSJohn McNamara:numref:`figure_ring-mp-enqueue4` :ref:`figure_ring-mp-enqueue4` 110fc1f2750SBernard Iremonger 111*4a22e6eeSJohn McNamara:numref:`figure_ring-mp-enqueue5` :ref:`figure_ring-mp-enqueue5` 112fc1f2750SBernard Iremonger 113*4a22e6eeSJohn McNamara:numref:`figure_ring-modulo1` :ref:`figure_ring-modulo1` 114fc1f2750SBernard Iremonger 115*4a22e6eeSJohn McNamara:numref:`figure_ring-modulo2` :ref:`figure_ring-modulo2` 116fc1f2750SBernard Iremonger 117*4a22e6eeSJohn McNamara:numref:`figure_memory-management` :ref:`figure_memory-management` 118fc1f2750SBernard Iremonger 119*4a22e6eeSJohn McNamara:numref:`figure_memory-management2` :ref:`figure_memory-management2` 120fc1f2750SBernard Iremonger 121*4a22e6eeSJohn McNamara:numref:`figure_mempool` :ref:`figure_mempool` 122fc1f2750SBernard Iremonger 123*4a22e6eeSJohn McNamara:numref:`figure_mbuf1` :ref:`figure_mbuf1` 124fc1f2750SBernard Iremonger 125*4a22e6eeSJohn McNamara:numref:`figure_mbuf2` :ref:`figure_mbuf2` 126fc1f2750SBernard Iremonger 127*4a22e6eeSJohn McNamara:numref:`figure_multi_process_memory` :ref:`figure_multi_process_memory` 128fc1f2750SBernard Iremonger 129*4a22e6eeSJohn McNamara:numref:`figure_kernel_nic_intf` :ref:`figure_kernel_nic_intf` 130fc1f2750SBernard Iremonger 131*4a22e6eeSJohn McNamara:numref:`figure_pkt_flow_kni` :ref:`figure_pkt_flow_kni` 132fc1f2750SBernard Iremonger 133*4a22e6eeSJohn McNamara:numref:`figure_vhost_net_arch2` :ref:`figure_vhost_net_arch2` 134fc1f2750SBernard Iremonger 135*4a22e6eeSJohn McNamara:numref:`figure_kni_traffic_flow` :ref:`figure_kni_traffic_flow` 136fc1f2750SBernard Iremonger 137fc1f2750SBernard Iremonger 138*4a22e6eeSJohn McNamara:numref:`figure_pkt_proc_pipeline_qos` :ref:`figure_pkt_proc_pipeline_qos` 139fc1f2750SBernard Iremonger 140*4a22e6eeSJohn McNamara:numref:`figure_hier_sched_blk` :ref:`figure_hier_sched_blk` 141fc1f2750SBernard Iremonger 142*4a22e6eeSJohn McNamara:numref:`figure_sched_hier_per_port` :ref:`figure_sched_hier_per_port` 143fc1f2750SBernard Iremonger 144*4a22e6eeSJohn McNamara:numref:`figure_data_struct_per_port` :ref:`figure_data_struct_per_port` 145fc1f2750SBernard Iremonger 146*4a22e6eeSJohn McNamara:numref:`figure_prefetch_pipeline` :ref:`figure_prefetch_pipeline` 147*4a22e6eeSJohn McNamara 148*4a22e6eeSJohn McNamara:numref:`figure_pipe_prefetch_sm` :ref:`figure_pipe_prefetch_sm` 149*4a22e6eeSJohn McNamara 150*4a22e6eeSJohn McNamara:numref:`figure_blk_diag_dropper` :ref:`figure_blk_diag_dropper` 151*4a22e6eeSJohn McNamara 152*4a22e6eeSJohn McNamara:numref:`figure_flow_tru_droppper` :ref:`figure_flow_tru_droppper` 153*4a22e6eeSJohn McNamara 154*4a22e6eeSJohn McNamara:numref:`figure_ex_data_flow_tru_dropper` :ref:`figure_ex_data_flow_tru_dropper` 155*4a22e6eeSJohn McNamara 156*4a22e6eeSJohn McNamara:numref:`figure_pkt_drop_probability` :ref:`figure_pkt_drop_probability` 157*4a22e6eeSJohn McNamara 158*4a22e6eeSJohn McNamara:numref:`figure_drop_probability_graph` :ref:`figure_drop_probability_graph` 159*4a22e6eeSJohn McNamara 160*4a22e6eeSJohn McNamara:numref:`figure_figure32` :ref:`figure_figure32` 161*4a22e6eeSJohn McNamara 162*4a22e6eeSJohn McNamara:numref:`figure_figure33` :ref:`figure_figure33` 163*4a22e6eeSJohn McNamara 164*4a22e6eeSJohn McNamara:numref:`figure_figure34` :ref:`figure_figure34` 165*4a22e6eeSJohn McNamara 166*4a22e6eeSJohn McNamara:numref:`figure_figure35` :ref:`figure_figure35` 167*4a22e6eeSJohn McNamara 168*4a22e6eeSJohn McNamara:numref:`figure_figure37` :ref:`figure_figure37` 169*4a22e6eeSJohn McNamara 170*4a22e6eeSJohn McNamara:numref:`figure_figure38` :ref:`figure_figure38` 171*4a22e6eeSJohn McNamara 172*4a22e6eeSJohn McNamara:numref:`figure_figure39` :ref:`figure_figure39` 173*4a22e6eeSJohn McNamara 174fc1f2750SBernard Iremonger 175fc1f2750SBernard Iremonger**Tables** 176fc1f2750SBernard Iremonger 177fc1f2750SBernard Iremonger:ref:`Table 1. Packet Processing Pipeline Implementing QoS <pg_table_1>` 178fc1f2750SBernard Iremonger 179fc1f2750SBernard Iremonger:ref:`Table 2. Infrastructure Blocks Used by the Packet Processing Pipeline <pg_table_2>` 180fc1f2750SBernard Iremonger 181fc1f2750SBernard Iremonger:ref:`Table 3. Port Scheduling Hierarchy <pg_table_3>` 182fc1f2750SBernard Iremonger 183fc1f2750SBernard Iremonger:ref:`Table 4. Scheduler Internal Data Structures per Port <pg_table_4>` 184fc1f2750SBernard Iremonger 185fc1f2750SBernard Iremonger:ref:`Table 5. Ethernet Frame Overhead Fields <pg_table_5>` 186fc1f2750SBernard Iremonger 187fc1f2750SBernard Iremonger:ref:`Table 6. Token Bucket Generic Operations <pg_table_6>` 188fc1f2750SBernard Iremonger 189fc1f2750SBernard Iremonger:ref:`Table 7. Token Bucket Generic Parameters <pg_table_7>` 190fc1f2750SBernard Iremonger 191fc1f2750SBernard Iremonger:ref:`Table 8. Token Bucket Persistent Data Structure <pg_table_8>` 192fc1f2750SBernard Iremonger 193fc1f2750SBernard Iremonger:ref:`Table 9. Token Bucket Operations <pg_table_9>` 194fc1f2750SBernard Iremonger 195fc1f2750SBernard Iremonger:ref:`Table 10. Subport/Pipe Traffic Class Upper Limit Enforcement Persistent Data Structure <pg_table_10>` 196fc1f2750SBernard Iremonger 197fc1f2750SBernard Iremonger:ref:`Table 11. Subport/Pipe Traffic Class Upper Limit Enforcement Operations <pg_table_11>` 198fc1f2750SBernard Iremonger 199fc1f2750SBernard Iremonger:ref:`Table 12. Weighted Round Robin (WRR) <pg_table_12>` 200fc1f2750SBernard Iremonger 201fc1f2750SBernard Iremonger:ref:`Table 13. Subport Traffic Class Oversubscription <pg_table_13>` 202fc1f2750SBernard Iremonger 203fc1f2750SBernard Iremonger:ref:`Table 14. Watermark Propagation from Subport Level to Member Pipes at the Beginning of Each Traffic Class Upper Limit Enforcement Period <pg_table_14>` 204fc1f2750SBernard Iremonger 205fc1f2750SBernard Iremonger:ref:`Table 15. Watermark Calculation <pg_table_15>` 206fc1f2750SBernard Iremonger 207fc1f2750SBernard Iremonger:ref:`Table 16. RED Configuration Parameters <pg_table_16>` 208fc1f2750SBernard Iremonger 209fc1f2750SBernard Iremonger:ref:`Table 17. Relative Performance of Alternative Approaches <pg_table_17>` 210fc1f2750SBernard Iremonger 211fc1f2750SBernard Iremonger:ref:`Table 18. RED Configuration Corresponding to RED Configuration File <pg_table_18>` 212fc1f2750SBernard Iremonger 213fc1f2750SBernard Iremonger:ref:`Table 19. Port types <pg_table_19>` 214fc1f2750SBernard Iremonger 215fc1f2750SBernard Iremonger:ref:`Table 20. Port abstract interface <pg_table_20>` 216fc1f2750SBernard Iremonger 217fc1f2750SBernard Iremonger:ref:`Table 21. Table types <pg_table_21>` 218fc1f2750SBernard Iremonger 219fc1f2750SBernard Iremonger:ref:`Table 29. Table Abstract Interface <pg_table_29_1>` 220fc1f2750SBernard Iremonger 221fc1f2750SBernard Iremonger:ref:`Table 22. Configuration parameters common for all hash table types <pg_table_22>` 222fc1f2750SBernard Iremonger 223fea1d908SJohn McNamara:ref:`Table 23. Configuration parameters specific to extendable bucket hash table <pg_table_23>` 224fc1f2750SBernard Iremonger 225fc1f2750SBernard Iremonger:ref:`Table 24. Configuration parameters specific to pre-computed key signature hash table <pg_table_24>` 226fc1f2750SBernard Iremonger 227fc1f2750SBernard Iremonger:ref:`Table 25. The main large data structures (arrays) used for configurable key size hash tables <pg_table_25>` 228fc1f2750SBernard Iremonger 229fc1f2750SBernard Iremonger:ref:`Table 26. Field description for bucket array entry (configurable key size hash tables) <pg_table_26>` 230fc1f2750SBernard Iremonger 231fc1f2750SBernard Iremonger:ref:`Table 27. Description of the bucket search pipeline stages (configurable key size hash tables) <pg_table_27>` 232fc1f2750SBernard Iremonger 233fc1f2750SBernard Iremonger:ref:`Table 28. Lookup tables for match, match_many, match_pos <pg_table_28>` 234fc1f2750SBernard Iremonger 235fc1f2750SBernard Iremonger:ref:`Table 29. Collapsed lookup tables for match, match_many and match_pos <pg_table_29>` 236fc1f2750SBernard Iremonger 237fc1f2750SBernard Iremonger:ref:`Table 30. The main large data structures (arrays) used for 8-byte and 16-byte key size hash tables <pg_table_30>` 238fc1f2750SBernard Iremonger 239fc1f2750SBernard Iremonger:ref:`Table 31. Field description for bucket array entry (8-byte and 16-byte key hash tables) <pg_table_31>` 240fc1f2750SBernard Iremonger 241fc1f2750SBernard Iremonger:ref:`Table 32. Description of the bucket search pipeline stages (8-byte and 16-byte key hash tables) <pg_table_32>` 242fc1f2750SBernard Iremonger 243fc1f2750SBernard Iremonger:ref:`Table 33. Next hop actions (reserved) <pg_table_33>` 244fc1f2750SBernard Iremonger 245fc1f2750SBernard Iremonger:ref:`Table 34. User action examples <pg_table_34>` 246