xref: /dpdk/doc/guides/prog_guide/index.rst (revision a9bc351cd4c572c583316861bfbcf78c756f3b2b)
1fc1f2750SBernard Iremonger..  BSD LICENSE
2fc1f2750SBernard Iremonger    Copyright(c) 2010-2014 Intel Corporation. All rights reserved.
3fc1f2750SBernard Iremonger    All rights reserved.
4fc1f2750SBernard Iremonger
5fc1f2750SBernard Iremonger    Redistribution and use in source and binary forms, with or without
6fc1f2750SBernard Iremonger    modification, are permitted provided that the following conditions
7fc1f2750SBernard Iremonger    are met:
8fc1f2750SBernard Iremonger
9fc1f2750SBernard Iremonger    * Redistributions of source code must retain the above copyright
10fc1f2750SBernard Iremonger    notice, this list of conditions and the following disclaimer.
11fc1f2750SBernard Iremonger    * Redistributions in binary form must reproduce the above copyright
12fc1f2750SBernard Iremonger    notice, this list of conditions and the following disclaimer in
13fc1f2750SBernard Iremonger    the documentation and/or other materials provided with the
14fc1f2750SBernard Iremonger    distribution.
15fc1f2750SBernard Iremonger    * Neither the name of Intel Corporation nor the names of its
16fc1f2750SBernard Iremonger    contributors may be used to endorse or promote products derived
17fc1f2750SBernard Iremonger    from this software without specific prior written permission.
18fc1f2750SBernard Iremonger
19fc1f2750SBernard Iremonger    THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
20fc1f2750SBernard Iremonger    "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
21fc1f2750SBernard Iremonger    LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
22fc1f2750SBernard Iremonger    A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
23fc1f2750SBernard Iremonger    OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
24fc1f2750SBernard Iremonger    SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
25fc1f2750SBernard Iremonger    LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
26fc1f2750SBernard Iremonger    DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
27fc1f2750SBernard Iremonger    THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
28fc1f2750SBernard Iremonger    (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
29fc1f2750SBernard Iremonger    OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30fc1f2750SBernard Iremonger
31fc1f2750SBernard IremongerProgrammer's Guide
32fc1f2750SBernard Iremonger==================
33fc1f2750SBernard Iremonger
34*a9bc351cSBruce Richardson|today|
35fc1f2750SBernard Iremonger
36fc1f2750SBernard Iremonger
37fc1f2750SBernard IremongerINFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE,
38fc1f2750SBernard IremongerTO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS,
39fc1f2750SBernard IremongerINTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY
40fc1f2750SBernard IremongerOR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT.
41fc1f2750SBernard Iremonger
42fc1f2750SBernard IremongerA "Mission Critical Application" is any application in which failure of the Intel Product could result, directly or indirectly, in personal injury or death.
43fc1f2750SBernard IremongerSHOULD YOU PURCHASE OR USE INTEL'S PRODUCTS FOR ANY SUCH MISSION CRITICAL APPLICATION, YOU SHALL INDEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS AND AFFILIATES,
44fc1f2750SBernard IremongerAND THE DIRECTORS, OFFICERS, AND EMPLOYEES OF EACH, HARMLESS AGAINST ALL CLAIMS COSTS, DAMAGES, AND EXPENSES AND REASONABLE ATTORNEYS' FEES ARISING OUT OF, DIRECTLY OR INDIRECTLY,
45fc1f2750SBernard IremongerANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR DEATH ARISING IN ANY WAY OUT OF SUCH MISSION CRITICAL APPLICATION,
46fc1f2750SBernard IremongerWHETHER OR NOT INTEL OR ITS SUBCONTRACTOR WAS NEGLIGENT IN THE DESIGN, MANUFACTURE, OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS PARTS.
47fc1f2750SBernard Iremonger
48fc1f2750SBernard IremongerIntel may make changes to specifications and product descriptions at any time, without notice.
49fc1f2750SBernard IremongerDesigners must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined".
50fc1f2750SBernard IremongerIntel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them.
51fc1f2750SBernard IremongerThe information here is subject to change without notice. Do not finalize a design with this information.
52fc1f2750SBernard Iremonger
53fc1f2750SBernard IremongerThe products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications.
54fc1f2750SBernard IremongerCurrent characterized errata are available on request.
55fc1f2750SBernard Iremonger
56fc1f2750SBernard IremongerContact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order.
57fc1f2750SBernard Iremonger
58fc1f2750SBernard IremongerCopies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling 1-800-548- 4725,
59fc1f2750SBernard Iremongeror go to: http://www.intel.com/design/literature.htm.
60fc1f2750SBernard Iremonger
61fc1f2750SBernard IremongerAny software source code reprinted in this document is furnished for informational purposes only and may only be used or copied and no license, express or implied,
62fc1f2750SBernard Iremongerby estoppel or otherwise, to any of the reprinted source code is granted by this document.
63fc1f2750SBernard Iremonger
64fc1f2750SBernard IremongerCode Names are only for use by Intel to identify products, platforms, programs, services, etc.
65fc1f2750SBernard Iremonger("products") in development by Intel that have not been made commercially available to the public, i.e., announced, launched or shipped.
66fc1f2750SBernard IremongerThey are never to be used as "commercial" names for products. Also, they are not intended to function as trademarks.
67fc1f2750SBernard Iremonger
68fc1f2750SBernard IremongerIntel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
69fc1f2750SBernard Iremonger
70fc1f2750SBernard Iremonger\*Other names and brands may be claimed as the property of others.
71fc1f2750SBernard Iremonger
72fc1f2750SBernard IremongerCopyright © 2012-2014, Intel Corporation. All rights reserved.
73fc1f2750SBernard Iremonger
74fc1f2750SBernard Iremonger**Contents**
75fc1f2750SBernard Iremonger
76fc1f2750SBernard Iremonger.. toctree::
77fc1f2750SBernard Iremonger    :maxdepth: 3
78fc1f2750SBernard Iremonger    :numbered:
79fc1f2750SBernard Iremonger
80fc1f2750SBernard Iremonger    intro
81fc1f2750SBernard Iremonger    overview
82fc1f2750SBernard Iremonger    env_abstraction_layer
83fc1f2750SBernard Iremonger    malloc_lib
84fc1f2750SBernard Iremonger    ring_lib
85fc1f2750SBernard Iremonger    mempool_lib
86fc1f2750SBernard Iremonger    mbuf_lib
87fc1f2750SBernard Iremonger    poll_mode_drv
88fc1f2750SBernard Iremonger    i40e_ixgbe_igb_virt_func_drv
89fc1f2750SBernard Iremonger    driver_vm_emul_dev
90fc1f2750SBernard Iremonger    ivshmem_lib
91fc1f2750SBernard Iremonger    poll_mode_drv_emulated_virtio_nic
92fc1f2750SBernard Iremonger    poll_mode_drv_paravirtual_vmxnets_nic
93fc1f2750SBernard Iremonger    intel_dpdk_xen_based_packet_switch_sol
94fc1f2750SBernard Iremonger    libpcap_ring_based_poll_mode_drv
95fc1f2750SBernard Iremonger    link_bonding_poll_mode_drv_lib
96fc1f2750SBernard Iremonger    timer_lib
97fc1f2750SBernard Iremonger    hash_lib
98fc1f2750SBernard Iremonger    lpm_lib
99fc1f2750SBernard Iremonger    lpm6_lib
100fc1f2750SBernard Iremonger    packet_distrib_lib
101fc1f2750SBernard Iremonger    ip_fragment_reassembly_lib
102fc1f2750SBernard Iremonger    multi_proc_support
103fc1f2750SBernard Iremonger    kernel_nic_interface
104fc1f2750SBernard Iremonger    thread_safety_intel_dpdk_functions
105fc1f2750SBernard Iremonger    qos_framework
106fc1f2750SBernard Iremonger    power_man
107fc1f2750SBernard Iremonger    packet_classif_access_ctrl
108fc1f2750SBernard Iremonger    packet_framework
1090ee5e7fbSSiobhan Butler    vhost_lib
110fc1f2750SBernard Iremonger    source_org
111fc1f2750SBernard Iremonger    dev_kit_build_system
112fc1f2750SBernard Iremonger    dev_kit_root_make_help
113fc1f2750SBernard Iremonger    extend_intel_dpdk
114fc1f2750SBernard Iremonger    build_app
115fc1f2750SBernard Iremonger    ext_app_lib_make_help
116fc1f2750SBernard Iremonger    perf_opt_guidelines
117fc1f2750SBernard Iremonger    writing_efficient_code
118fc1f2750SBernard Iremonger    profile_app
119fc1f2750SBernard Iremonger    glossary
120fc1f2750SBernard Iremonger
121fc1f2750SBernard Iremonger
122fc1f2750SBernard Iremonger**Figures**
123fc1f2750SBernard Iremonger
124fc1f2750SBernard Iremonger:ref:`Figure 1. Core Components Architecture <pg_figure_1>`
125fc1f2750SBernard Iremonger
126fc1f2750SBernard Iremonger:ref:`Figure 2. EAL Initialization in a Linux Application Environment <pg_figure_2>`
127fc1f2750SBernard Iremonger
128fc1f2750SBernard Iremonger:ref:`Figure 3. Example of a malloc heap and malloc elements within the malloc library <pg_figure_3>`
129fc1f2750SBernard Iremonger
130fc1f2750SBernard Iremonger:ref:`Figure 4. Ring Structure <pg_figure_4>`
131fc1f2750SBernard Iremonger
132fc1f2750SBernard Iremonger:ref:`Figure 5. Two Channels and Quad-ranked DIMM Example <pg_figure_5>`
133fc1f2750SBernard Iremonger
134fc1f2750SBernard Iremonger:ref:`Figure 6. Three Channels and Two Dual-ranked DIMM Example <pg_figure_6>`
135fc1f2750SBernard Iremonger
136fc1f2750SBernard Iremonger:ref:`Figure 7. A mempool in Memory with its Associated Ring <pg_figure_7>`
137fc1f2750SBernard Iremonger
138fc1f2750SBernard Iremonger:ref:`Figure 8. An mbuf with One Segment <pg_figure_8>`
139fc1f2750SBernard Iremonger
140fc1f2750SBernard Iremonger:ref:`Figure 9. An mbuf with Three Segments <pg_figure_9>`
141fc1f2750SBernard Iremonger
142fc1f2750SBernard Iremonger:ref:`Figure 10. Virtualization for a Single Port NIC in SR-IOV Mode <pg_figure_10>`
143fc1f2750SBernard Iremonger
144fc1f2750SBernard Iremonger:ref:`Figure 11. Performance Benchmark Setup <pg_figure_11>`
145fc1f2750SBernard Iremonger
146fc1f2750SBernard Iremonger:ref:`Figure 12. Fast Host-based Packet Processing <pg_figure_12>`
147fc1f2750SBernard Iremonger
148fc1f2750SBernard Iremonger:ref:`Figure 13. Inter-VM Communication <pg_figure_13>`
149fc1f2750SBernard Iremonger
150fc1f2750SBernard Iremonger:ref:`Figure 14. Host2VM Communication Example Using kni vhost Back End <pg_figure_14>`
151fc1f2750SBernard Iremonger
152fc1f2750SBernard Iremonger:ref:`Figure 15. Host2VM Communication Example Using qemu vhost Back End <pg_figure_15>`
153fc1f2750SBernard Iremonger
154fc1f2750SBernard Iremonger:ref:`Figure 16. Memory Sharing inthe Intel® DPDK Multi-process Sample Application <pg_figure_16>`
155fc1f2750SBernard Iremonger
156fc1f2750SBernard Iremonger:ref:`Figure 17. Components of an Intel® DPDK KNI Application <pg_figure_17>`
157fc1f2750SBernard Iremonger
158fc1f2750SBernard Iremonger:ref:`Figure 18. Packet Flow via mbufs in the Intel DPDK® KNI <pg_figure_18>`
159fc1f2750SBernard Iremonger
160fc1f2750SBernard Iremonger:ref:`Figure 19. vHost-net Architecture Overview <pg_figure_19>`
161fc1f2750SBernard Iremonger
162fc1f2750SBernard Iremonger:ref:`Figure 20. KNI Traffic Flow <pg_figure_20>`
163fc1f2750SBernard Iremonger
164fc1f2750SBernard Iremonger:ref:`Figure 21. Complex Packet Processing Pipeline with QoS Support <pg_figure_21>`
165fc1f2750SBernard Iremonger
166fc1f2750SBernard Iremonger:ref:`Figure 22. Hierarchical Scheduler Block Internal Diagram <pg_figure_22>`
167fc1f2750SBernard Iremonger
168fc1f2750SBernard Iremonger:ref:`Figure 23. Scheduling Hierarchy per Port <pg_figure_23>`
169fc1f2750SBernard Iremonger
170fc1f2750SBernard Iremonger:ref:`Figure 24. Internal Data Structures per Port <pg_figure_24>`
171fc1f2750SBernard Iremonger
172fc1f2750SBernard Iremonger:ref:`Figure 25. Prefetch Pipeline for the Hierarchical Scheduler Enqueue Operation <pg_figure_25>`
173fc1f2750SBernard Iremonger
174fc1f2750SBernard Iremonger:ref:`Figure 26. Pipe Prefetch State Machine for the Hierarchical Scheduler Dequeue Operation <pg_figure_26>`
175fc1f2750SBernard Iremonger
176fc1f2750SBernard Iremonger:ref:`Figure 27. High-level Block Diagram of the Intel® DPDK Dropper <pg_figure_27>`
177fc1f2750SBernard Iremonger
178fc1f2750SBernard Iremonger:ref:`Figure 28. Flow Through the Dropper <pg_figure_28>`
179fc1f2750SBernard Iremonger
180fc1f2750SBernard Iremonger:ref:`Figure 29. Example Data Flow Through Dropper <pg_figure_29>`
181fc1f2750SBernard Iremonger
182fc1f2750SBernard Iremonger:ref:`Figure 30. Packet Drop Probability for a Given RED Configuration <pg_figure_30>`
183fc1f2750SBernard Iremonger
184fc1f2750SBernard Iremonger:ref:`Figure 31. Initial Drop Probability (pb), Actual Drop probability (pa) Computed Using a Factor 1 (Blue Curve) and a Factor 2 (Red Curve) <pg_figure_31>`
185fc1f2750SBernard Iremonger
186fc1f2750SBernard Iremonger:ref:`Figure 32. Example of packet processing pipeline. The input ports 0 and 1 are connected with the output ports 0, 1 and 2 through tables 0 and 1. <pg_figure_32>`
187fc1f2750SBernard Iremonger
188fc1f2750SBernard Iremonger:ref:`Figure 33. Sequence of steps for hash table operations in packet processing context <pg_figure_33>`
189fc1f2750SBernard Iremonger
190fc1f2750SBernard Iremonger:ref:`Figure 34. Data structures for configurable key size hash tables <pg_figure_34>`
191fc1f2750SBernard Iremonger
192fc1f2750SBernard Iremonger:ref:`Figure 35. Bucket search pipeline for key lookup operation (configurable key size hash tables) <pg_figure_35>`
193fc1f2750SBernard Iremonger
194fc1f2750SBernard Iremonger:ref:`Figure 36. Pseudo-code for match, match_many and match_pos <pg_figure_36>`
195fc1f2750SBernard Iremonger
196fc1f2750SBernard Iremonger:ref:`Figure 37. Data structures for 8-byte key hash tables <pg_figure_37>`
197fc1f2750SBernard Iremonger
198fc1f2750SBernard Iremonger:ref:`Figure 38. Data structures for 16-byte key hash tables <pg_figure_38>`
199fc1f2750SBernard Iremonger
200fc1f2750SBernard Iremonger:ref:`Figure 39. Bucket search pipeline for key lookup operation (single key size hash tables) <pg_figure_39>`
201fc1f2750SBernard Iremonger
202fc1f2750SBernard Iremonger**Tables**
203fc1f2750SBernard Iremonger
204fc1f2750SBernard Iremonger:ref:`Table 1. Packet Processing Pipeline Implementing QoS <pg_table_1>`
205fc1f2750SBernard Iremonger
206fc1f2750SBernard Iremonger:ref:`Table 2. Infrastructure Blocks Used by the Packet Processing Pipeline <pg_table_2>`
207fc1f2750SBernard Iremonger
208fc1f2750SBernard Iremonger:ref:`Table 3. Port Scheduling Hierarchy <pg_table_3>`
209fc1f2750SBernard Iremonger
210fc1f2750SBernard Iremonger:ref:`Table 4. Scheduler Internal Data Structures per Port <pg_table_4>`
211fc1f2750SBernard Iremonger
212fc1f2750SBernard Iremonger:ref:`Table 5. Ethernet Frame Overhead Fields <pg_table_5>`
213fc1f2750SBernard Iremonger
214fc1f2750SBernard Iremonger:ref:`Table 6. Token Bucket Generic Operations <pg_table_6>`
215fc1f2750SBernard Iremonger
216fc1f2750SBernard Iremonger:ref:`Table 7. Token Bucket Generic Parameters <pg_table_7>`
217fc1f2750SBernard Iremonger
218fc1f2750SBernard Iremonger:ref:`Table 8. Token Bucket Persistent Data Structure <pg_table_8>`
219fc1f2750SBernard Iremonger
220fc1f2750SBernard Iremonger:ref:`Table 9. Token Bucket Operations <pg_table_9>`
221fc1f2750SBernard Iremonger
222fc1f2750SBernard Iremonger:ref:`Table 10. Subport/Pipe Traffic Class Upper Limit Enforcement Persistent Data Structure <pg_table_10>`
223fc1f2750SBernard Iremonger
224fc1f2750SBernard Iremonger:ref:`Table 11. Subport/Pipe Traffic Class Upper Limit Enforcement Operations <pg_table_11>`
225fc1f2750SBernard Iremonger
226fc1f2750SBernard Iremonger:ref:`Table 12. Weighted Round Robin (WRR) <pg_table_12>`
227fc1f2750SBernard Iremonger
228fc1f2750SBernard Iremonger:ref:`Table 13. Subport Traffic Class Oversubscription <pg_table_13>`
229fc1f2750SBernard Iremonger
230fc1f2750SBernard Iremonger:ref:`Table 14. Watermark Propagation from Subport Level to Member Pipes at the Beginning of Each Traffic Class Upper Limit Enforcement Period <pg_table_14>`
231fc1f2750SBernard Iremonger
232fc1f2750SBernard Iremonger:ref:`Table 15. Watermark Calculation <pg_table_15>`
233fc1f2750SBernard Iremonger
234fc1f2750SBernard Iremonger:ref:`Table 16. RED Configuration Parameters <pg_table_16>`
235fc1f2750SBernard Iremonger
236fc1f2750SBernard Iremonger:ref:`Table 17. Relative Performance of Alternative Approaches <pg_table_17>`
237fc1f2750SBernard Iremonger
238fc1f2750SBernard Iremonger:ref:`Table 18. RED Configuration Corresponding to RED Configuration File <pg_table_18>`
239fc1f2750SBernard Iremonger
240fc1f2750SBernard Iremonger:ref:`Table 19. Port types <pg_table_19>`
241fc1f2750SBernard Iremonger
242fc1f2750SBernard Iremonger:ref:`Table 20. Port abstract interface <pg_table_20>`
243fc1f2750SBernard Iremonger
244fc1f2750SBernard Iremonger:ref:`Table 21. Table types <pg_table_21>`
245fc1f2750SBernard Iremonger
246fc1f2750SBernard Iremonger:ref:`Table 29. Table Abstract Interface <pg_table_29_1>`
247fc1f2750SBernard Iremonger
248fc1f2750SBernard Iremonger:ref:`Table 22. Configuration parameters common for all hash table types <pg_table_22>`
249fc1f2750SBernard Iremonger
250fc1f2750SBernard Iremonger:ref:`Table 23. Configuration parameters specific to extendible bucket hash table <pg_table_23>`
251fc1f2750SBernard Iremonger
252fc1f2750SBernard Iremonger:ref:`Table 24. Configuration parameters specific to pre-computed key signature hash table <pg_table_24>`
253fc1f2750SBernard Iremonger
254fc1f2750SBernard Iremonger:ref:`Table 25. The main large data structures (arrays) used for configurable key size hash tables <pg_table_25>`
255fc1f2750SBernard Iremonger
256fc1f2750SBernard Iremonger:ref:`Table 26. Field description for bucket array entry (configurable key size hash tables) <pg_table_26>`
257fc1f2750SBernard Iremonger
258fc1f2750SBernard Iremonger:ref:`Table 27. Description of the bucket search pipeline stages (configurable key size hash tables) <pg_table_27>`
259fc1f2750SBernard Iremonger
260fc1f2750SBernard Iremonger:ref:`Table 28. Lookup tables for match, match_many, match_pos <pg_table_28>`
261fc1f2750SBernard Iremonger
262fc1f2750SBernard Iremonger:ref:`Table 29. Collapsed lookup tables for match, match_many and match_pos <pg_table_29>`
263fc1f2750SBernard Iremonger
264fc1f2750SBernard Iremonger:ref:`Table 30. The main large data structures (arrays) used for 8-byte and 16-byte key size hash tables <pg_table_30>`
265fc1f2750SBernard Iremonger
266fc1f2750SBernard Iremonger:ref:`Table 31. Field description for bucket array entry (8-byte and 16-byte key hash tables) <pg_table_31>`
267fc1f2750SBernard Iremonger
268fc1f2750SBernard Iremonger:ref:`Table 32. Description of the bucket search pipeline stages (8-byte and 16-byte key hash tables) <pg_table_32>`
269fc1f2750SBernard Iremonger
270fc1f2750SBernard Iremonger:ref:`Table 33. Next hop actions (reserved) <pg_table_33>`
271fc1f2750SBernard Iremonger
272fc1f2750SBernard Iremonger:ref:`Table 34. User action examples <pg_table_34>`
273