xref: /dpdk/doc/guides/prog_guide/index.rst (revision 4a22e6ee3d2f8be8afd5b374a8916e232ab7fe97)
1fc1f2750SBernard Iremonger..  BSD LICENSE
2fc1f2750SBernard Iremonger    Copyright(c) 2010-2014 Intel Corporation. All rights reserved.
3fc1f2750SBernard Iremonger    All rights reserved.
4fc1f2750SBernard Iremonger
5fc1f2750SBernard Iremonger    Redistribution and use in source and binary forms, with or without
6fc1f2750SBernard Iremonger    modification, are permitted provided that the following conditions
7fc1f2750SBernard Iremonger    are met:
8fc1f2750SBernard Iremonger
9fc1f2750SBernard Iremonger    * Redistributions of source code must retain the above copyright
10fc1f2750SBernard Iremonger    notice, this list of conditions and the following disclaimer.
11fc1f2750SBernard Iremonger    * Redistributions in binary form must reproduce the above copyright
12fc1f2750SBernard Iremonger    notice, this list of conditions and the following disclaimer in
13fc1f2750SBernard Iremonger    the documentation and/or other materials provided with the
14fc1f2750SBernard Iremonger    distribution.
15fc1f2750SBernard Iremonger    * Neither the name of Intel Corporation nor the names of its
16fc1f2750SBernard Iremonger    contributors may be used to endorse or promote products derived
17fc1f2750SBernard Iremonger    from this software without specific prior written permission.
18fc1f2750SBernard Iremonger
19fc1f2750SBernard Iremonger    THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
20fc1f2750SBernard Iremonger    "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
21fc1f2750SBernard Iremonger    LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
22fc1f2750SBernard Iremonger    A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
23fc1f2750SBernard Iremonger    OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
24fc1f2750SBernard Iremonger    SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
25fc1f2750SBernard Iremonger    LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
26fc1f2750SBernard Iremonger    DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
27fc1f2750SBernard Iremonger    THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
28fc1f2750SBernard Iremonger    (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
29fc1f2750SBernard Iremonger    OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30fc1f2750SBernard Iremonger
31fc1f2750SBernard IremongerProgrammer's Guide
32fc1f2750SBernard Iremonger==================
33fc1f2750SBernard Iremonger
34a9bc351cSBruce Richardson|today|
35fc1f2750SBernard Iremonger
36fc1f2750SBernard Iremonger
37fc1f2750SBernard Iremonger**Contents**
38fc1f2750SBernard Iremonger
39fc1f2750SBernard Iremonger.. toctree::
40fc1f2750SBernard Iremonger    :maxdepth: 3
41fc1f2750SBernard Iremonger    :numbered:
42fc1f2750SBernard Iremonger
43fc1f2750SBernard Iremonger    intro
44fc1f2750SBernard Iremonger    overview
45fc1f2750SBernard Iremonger    env_abstraction_layer
46fc1f2750SBernard Iremonger    malloc_lib
47fc1f2750SBernard Iremonger    ring_lib
48fc1f2750SBernard Iremonger    mempool_lib
49fc1f2750SBernard Iremonger    mbuf_lib
50fc1f2750SBernard Iremonger    poll_mode_drv
51fc1f2750SBernard Iremonger    ivshmem_lib
52fc1f2750SBernard Iremonger    link_bonding_poll_mode_drv_lib
53fc1f2750SBernard Iremonger    timer_lib
54fc1f2750SBernard Iremonger    hash_lib
55fc1f2750SBernard Iremonger    lpm_lib
56fc1f2750SBernard Iremonger    lpm6_lib
57fc1f2750SBernard Iremonger    packet_distrib_lib
5834287c69SSergio Gonzalez Monroy    reorder_lib
59fc1f2750SBernard Iremonger    ip_fragment_reassembly_lib
60fc1f2750SBernard Iremonger    multi_proc_support
61fc1f2750SBernard Iremonger    kernel_nic_interface
62fc1f2750SBernard Iremonger    thread_safety_intel_dpdk_functions
63fc1f2750SBernard Iremonger    qos_framework
64fc1f2750SBernard Iremonger    power_man
65fc1f2750SBernard Iremonger    packet_classif_access_ctrl
66fc1f2750SBernard Iremonger    packet_framework
670ee5e7fbSSiobhan Butler    vhost_lib
680cf92e62STetsuya Mukawa    port_hotplug_framework
69fc1f2750SBernard Iremonger    source_org
70fc1f2750SBernard Iremonger    dev_kit_build_system
71fc1f2750SBernard Iremonger    dev_kit_root_make_help
72fc1f2750SBernard Iremonger    extend_intel_dpdk
73fc1f2750SBernard Iremonger    build_app
74fc1f2750SBernard Iremonger    ext_app_lib_make_help
75fc1f2750SBernard Iremonger    perf_opt_guidelines
76fc1f2750SBernard Iremonger    writing_efficient_code
77fc1f2750SBernard Iremonger    profile_app
78fc1f2750SBernard Iremonger    glossary
79fc1f2750SBernard Iremonger
80fc1f2750SBernard Iremonger
81fc1f2750SBernard Iremonger**Figures**
82fc1f2750SBernard Iremonger
83*4a22e6eeSJohn McNamara:numref:`figure_architecture-overview` :ref:`figure_architecture-overview`
84fc1f2750SBernard Iremonger
85*4a22e6eeSJohn McNamara:numref:`figure_linuxapp_launch` :ref:`figure_linuxapp_launch`
86fc1f2750SBernard Iremonger
87*4a22e6eeSJohn McNamara:numref:`figure_malloc_heap` :ref:`figure_malloc_heap`
88fc1f2750SBernard Iremonger
89*4a22e6eeSJohn McNamara:numref:`figure_ring1` :ref:`figure_ring1`
90fc1f2750SBernard Iremonger
91*4a22e6eeSJohn McNamara:numref:`figure_ring-enqueue1` :ref:`figure_ring-enqueue1`
92fc1f2750SBernard Iremonger
93*4a22e6eeSJohn McNamara:numref:`figure_ring-enqueue2` :ref:`figure_ring-enqueue2`
94fc1f2750SBernard Iremonger
95*4a22e6eeSJohn McNamara:numref:`figure_ring-enqueue3` :ref:`figure_ring-enqueue3`
96fc1f2750SBernard Iremonger
97*4a22e6eeSJohn McNamara:numref:`figure_ring-dequeue1` :ref:`figure_ring-dequeue1`
98fc1f2750SBernard Iremonger
99*4a22e6eeSJohn McNamara:numref:`figure_ring-dequeue2` :ref:`figure_ring-dequeue2`
100fc1f2750SBernard Iremonger
101*4a22e6eeSJohn McNamara:numref:`figure_ring-dequeue3` :ref:`figure_ring-dequeue3`
102fc1f2750SBernard Iremonger
103*4a22e6eeSJohn McNamara:numref:`figure_ring-mp-enqueue1` :ref:`figure_ring-mp-enqueue1`
104fc1f2750SBernard Iremonger
105*4a22e6eeSJohn McNamara:numref:`figure_ring-mp-enqueue2` :ref:`figure_ring-mp-enqueue2`
106fc1f2750SBernard Iremonger
107*4a22e6eeSJohn McNamara:numref:`figure_ring-mp-enqueue3` :ref:`figure_ring-mp-enqueue3`
108fc1f2750SBernard Iremonger
109*4a22e6eeSJohn McNamara:numref:`figure_ring-mp-enqueue4` :ref:`figure_ring-mp-enqueue4`
110fc1f2750SBernard Iremonger
111*4a22e6eeSJohn McNamara:numref:`figure_ring-mp-enqueue5` :ref:`figure_ring-mp-enqueue5`
112fc1f2750SBernard Iremonger
113*4a22e6eeSJohn McNamara:numref:`figure_ring-modulo1` :ref:`figure_ring-modulo1`
114fc1f2750SBernard Iremonger
115*4a22e6eeSJohn McNamara:numref:`figure_ring-modulo2` :ref:`figure_ring-modulo2`
116fc1f2750SBernard Iremonger
117*4a22e6eeSJohn McNamara:numref:`figure_memory-management` :ref:`figure_memory-management`
118fc1f2750SBernard Iremonger
119*4a22e6eeSJohn McNamara:numref:`figure_memory-management2` :ref:`figure_memory-management2`
120fc1f2750SBernard Iremonger
121*4a22e6eeSJohn McNamara:numref:`figure_mempool` :ref:`figure_mempool`
122fc1f2750SBernard Iremonger
123*4a22e6eeSJohn McNamara:numref:`figure_mbuf1` :ref:`figure_mbuf1`
124fc1f2750SBernard Iremonger
125*4a22e6eeSJohn McNamara:numref:`figure_mbuf2` :ref:`figure_mbuf2`
126fc1f2750SBernard Iremonger
127*4a22e6eeSJohn McNamara:numref:`figure_multi_process_memory` :ref:`figure_multi_process_memory`
128fc1f2750SBernard Iremonger
129*4a22e6eeSJohn McNamara:numref:`figure_kernel_nic_intf` :ref:`figure_kernel_nic_intf`
130fc1f2750SBernard Iremonger
131*4a22e6eeSJohn McNamara:numref:`figure_pkt_flow_kni` :ref:`figure_pkt_flow_kni`
132fc1f2750SBernard Iremonger
133*4a22e6eeSJohn McNamara:numref:`figure_vhost_net_arch2` :ref:`figure_vhost_net_arch2`
134fc1f2750SBernard Iremonger
135*4a22e6eeSJohn McNamara:numref:`figure_kni_traffic_flow` :ref:`figure_kni_traffic_flow`
136fc1f2750SBernard Iremonger
137fc1f2750SBernard Iremonger
138*4a22e6eeSJohn McNamara:numref:`figure_pkt_proc_pipeline_qos` :ref:`figure_pkt_proc_pipeline_qos`
139fc1f2750SBernard Iremonger
140*4a22e6eeSJohn McNamara:numref:`figure_hier_sched_blk` :ref:`figure_hier_sched_blk`
141fc1f2750SBernard Iremonger
142*4a22e6eeSJohn McNamara:numref:`figure_sched_hier_per_port` :ref:`figure_sched_hier_per_port`
143fc1f2750SBernard Iremonger
144*4a22e6eeSJohn McNamara:numref:`figure_data_struct_per_port` :ref:`figure_data_struct_per_port`
145fc1f2750SBernard Iremonger
146*4a22e6eeSJohn McNamara:numref:`figure_prefetch_pipeline` :ref:`figure_prefetch_pipeline`
147*4a22e6eeSJohn McNamara
148*4a22e6eeSJohn McNamara:numref:`figure_pipe_prefetch_sm` :ref:`figure_pipe_prefetch_sm`
149*4a22e6eeSJohn McNamara
150*4a22e6eeSJohn McNamara:numref:`figure_blk_diag_dropper` :ref:`figure_blk_diag_dropper`
151*4a22e6eeSJohn McNamara
152*4a22e6eeSJohn McNamara:numref:`figure_flow_tru_droppper` :ref:`figure_flow_tru_droppper`
153*4a22e6eeSJohn McNamara
154*4a22e6eeSJohn McNamara:numref:`figure_ex_data_flow_tru_dropper` :ref:`figure_ex_data_flow_tru_dropper`
155*4a22e6eeSJohn McNamara
156*4a22e6eeSJohn McNamara:numref:`figure_pkt_drop_probability` :ref:`figure_pkt_drop_probability`
157*4a22e6eeSJohn McNamara
158*4a22e6eeSJohn McNamara:numref:`figure_drop_probability_graph` :ref:`figure_drop_probability_graph`
159*4a22e6eeSJohn McNamara
160*4a22e6eeSJohn McNamara:numref:`figure_figure32` :ref:`figure_figure32`
161*4a22e6eeSJohn McNamara
162*4a22e6eeSJohn McNamara:numref:`figure_figure33` :ref:`figure_figure33`
163*4a22e6eeSJohn McNamara
164*4a22e6eeSJohn McNamara:numref:`figure_figure34` :ref:`figure_figure34`
165*4a22e6eeSJohn McNamara
166*4a22e6eeSJohn McNamara:numref:`figure_figure35` :ref:`figure_figure35`
167*4a22e6eeSJohn McNamara
168*4a22e6eeSJohn McNamara:numref:`figure_figure37` :ref:`figure_figure37`
169*4a22e6eeSJohn McNamara
170*4a22e6eeSJohn McNamara:numref:`figure_figure38` :ref:`figure_figure38`
171*4a22e6eeSJohn McNamara
172*4a22e6eeSJohn McNamara:numref:`figure_figure39` :ref:`figure_figure39`
173*4a22e6eeSJohn McNamara
174fc1f2750SBernard Iremonger
175fc1f2750SBernard Iremonger**Tables**
176fc1f2750SBernard Iremonger
177fc1f2750SBernard Iremonger:ref:`Table 1. Packet Processing Pipeline Implementing QoS <pg_table_1>`
178fc1f2750SBernard Iremonger
179fc1f2750SBernard Iremonger:ref:`Table 2. Infrastructure Blocks Used by the Packet Processing Pipeline <pg_table_2>`
180fc1f2750SBernard Iremonger
181fc1f2750SBernard Iremonger:ref:`Table 3. Port Scheduling Hierarchy <pg_table_3>`
182fc1f2750SBernard Iremonger
183fc1f2750SBernard Iremonger:ref:`Table 4. Scheduler Internal Data Structures per Port <pg_table_4>`
184fc1f2750SBernard Iremonger
185fc1f2750SBernard Iremonger:ref:`Table 5. Ethernet Frame Overhead Fields <pg_table_5>`
186fc1f2750SBernard Iremonger
187fc1f2750SBernard Iremonger:ref:`Table 6. Token Bucket Generic Operations <pg_table_6>`
188fc1f2750SBernard Iremonger
189fc1f2750SBernard Iremonger:ref:`Table 7. Token Bucket Generic Parameters <pg_table_7>`
190fc1f2750SBernard Iremonger
191fc1f2750SBernard Iremonger:ref:`Table 8. Token Bucket Persistent Data Structure <pg_table_8>`
192fc1f2750SBernard Iremonger
193fc1f2750SBernard Iremonger:ref:`Table 9. Token Bucket Operations <pg_table_9>`
194fc1f2750SBernard Iremonger
195fc1f2750SBernard Iremonger:ref:`Table 10. Subport/Pipe Traffic Class Upper Limit Enforcement Persistent Data Structure <pg_table_10>`
196fc1f2750SBernard Iremonger
197fc1f2750SBernard Iremonger:ref:`Table 11. Subport/Pipe Traffic Class Upper Limit Enforcement Operations <pg_table_11>`
198fc1f2750SBernard Iremonger
199fc1f2750SBernard Iremonger:ref:`Table 12. Weighted Round Robin (WRR) <pg_table_12>`
200fc1f2750SBernard Iremonger
201fc1f2750SBernard Iremonger:ref:`Table 13. Subport Traffic Class Oversubscription <pg_table_13>`
202fc1f2750SBernard Iremonger
203fc1f2750SBernard Iremonger:ref:`Table 14. Watermark Propagation from Subport Level to Member Pipes at the Beginning of Each Traffic Class Upper Limit Enforcement Period <pg_table_14>`
204fc1f2750SBernard Iremonger
205fc1f2750SBernard Iremonger:ref:`Table 15. Watermark Calculation <pg_table_15>`
206fc1f2750SBernard Iremonger
207fc1f2750SBernard Iremonger:ref:`Table 16. RED Configuration Parameters <pg_table_16>`
208fc1f2750SBernard Iremonger
209fc1f2750SBernard Iremonger:ref:`Table 17. Relative Performance of Alternative Approaches <pg_table_17>`
210fc1f2750SBernard Iremonger
211fc1f2750SBernard Iremonger:ref:`Table 18. RED Configuration Corresponding to RED Configuration File <pg_table_18>`
212fc1f2750SBernard Iremonger
213fc1f2750SBernard Iremonger:ref:`Table 19. Port types <pg_table_19>`
214fc1f2750SBernard Iremonger
215fc1f2750SBernard Iremonger:ref:`Table 20. Port abstract interface <pg_table_20>`
216fc1f2750SBernard Iremonger
217fc1f2750SBernard Iremonger:ref:`Table 21. Table types <pg_table_21>`
218fc1f2750SBernard Iremonger
219fc1f2750SBernard Iremonger:ref:`Table 29. Table Abstract Interface <pg_table_29_1>`
220fc1f2750SBernard Iremonger
221fc1f2750SBernard Iremonger:ref:`Table 22. Configuration parameters common for all hash table types <pg_table_22>`
222fc1f2750SBernard Iremonger
223fea1d908SJohn McNamara:ref:`Table 23. Configuration parameters specific to extendable bucket hash table <pg_table_23>`
224fc1f2750SBernard Iremonger
225fc1f2750SBernard Iremonger:ref:`Table 24. Configuration parameters specific to pre-computed key signature hash table <pg_table_24>`
226fc1f2750SBernard Iremonger
227fc1f2750SBernard Iremonger:ref:`Table 25. The main large data structures (arrays) used for configurable key size hash tables <pg_table_25>`
228fc1f2750SBernard Iremonger
229fc1f2750SBernard Iremonger:ref:`Table 26. Field description for bucket array entry (configurable key size hash tables) <pg_table_26>`
230fc1f2750SBernard Iremonger
231fc1f2750SBernard Iremonger:ref:`Table 27. Description of the bucket search pipeline stages (configurable key size hash tables) <pg_table_27>`
232fc1f2750SBernard Iremonger
233fc1f2750SBernard Iremonger:ref:`Table 28. Lookup tables for match, match_many, match_pos <pg_table_28>`
234fc1f2750SBernard Iremonger
235fc1f2750SBernard Iremonger:ref:`Table 29. Collapsed lookup tables for match, match_many and match_pos <pg_table_29>`
236fc1f2750SBernard Iremonger
237fc1f2750SBernard Iremonger:ref:`Table 30. The main large data structures (arrays) used for 8-byte and 16-byte key size hash tables <pg_table_30>`
238fc1f2750SBernard Iremonger
239fc1f2750SBernard Iremonger:ref:`Table 31. Field description for bucket array entry (8-byte and 16-byte key hash tables) <pg_table_31>`
240fc1f2750SBernard Iremonger
241fc1f2750SBernard Iremonger:ref:`Table 32. Description of the bucket search pipeline stages (8-byte and 16-byte key hash tables) <pg_table_32>`
242fc1f2750SBernard Iremonger
243fc1f2750SBernard Iremonger:ref:`Table 33. Next hop actions (reserved) <pg_table_33>`
244fc1f2750SBernard Iremonger
245fc1f2750SBernard Iremonger:ref:`Table 34. User action examples <pg_table_34>`
246