1fc1f2750SBernard Iremonger.. BSD LICENSE 2fc1f2750SBernard Iremonger Copyright(c) 2010-2014 Intel Corporation. All rights reserved. 3fc1f2750SBernard Iremonger All rights reserved. 4fc1f2750SBernard Iremonger 5fc1f2750SBernard Iremonger Redistribution and use in source and binary forms, with or without 6fc1f2750SBernard Iremonger modification, are permitted provided that the following conditions 7fc1f2750SBernard Iremonger are met: 8fc1f2750SBernard Iremonger 9fc1f2750SBernard Iremonger * Redistributions of source code must retain the above copyright 10fc1f2750SBernard Iremonger notice, this list of conditions and the following disclaimer. 11fc1f2750SBernard Iremonger * Redistributions in binary form must reproduce the above copyright 12fc1f2750SBernard Iremonger notice, this list of conditions and the following disclaimer in 13fc1f2750SBernard Iremonger the documentation and/or other materials provided with the 14fc1f2750SBernard Iremonger distribution. 15fc1f2750SBernard Iremonger * Neither the name of Intel Corporation nor the names of its 16fc1f2750SBernard Iremonger contributors may be used to endorse or promote products derived 17fc1f2750SBernard Iremonger from this software without specific prior written permission. 18fc1f2750SBernard Iremonger 19fc1f2750SBernard Iremonger THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS 20fc1f2750SBernard Iremonger "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT 21fc1f2750SBernard Iremonger LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR 22fc1f2750SBernard Iremonger A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT 23fc1f2750SBernard Iremonger OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, 24fc1f2750SBernard Iremonger SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT 25fc1f2750SBernard Iremonger LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 26fc1f2750SBernard Iremonger DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 27fc1f2750SBernard Iremonger THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 28fc1f2750SBernard Iremonger (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE 29fc1f2750SBernard Iremonger OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 30fc1f2750SBernard Iremonger 31fc1f2750SBernard IremongerProgrammer's Guide 32fc1f2750SBernard Iremonger================== 33fc1f2750SBernard Iremonger 34*a9bc351cSBruce Richardson|today| 35fc1f2750SBernard Iremonger 36fc1f2750SBernard Iremonger 37fc1f2750SBernard IremongerINFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, 38fc1f2750SBernard IremongerTO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, 39fc1f2750SBernard IremongerINTEL ASSUMES NO LIABILITY WHATSOEVER AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS INCLUDING LIABILITY 40fc1f2750SBernard IremongerOR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT. 41fc1f2750SBernard Iremonger 42fc1f2750SBernard IremongerA "Mission Critical Application" is any application in which failure of the Intel Product could result, directly or indirectly, in personal injury or death. 43fc1f2750SBernard IremongerSHOULD YOU PURCHASE OR USE INTEL'S PRODUCTS FOR ANY SUCH MISSION CRITICAL APPLICATION, YOU SHALL INDEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS AND AFFILIATES, 44fc1f2750SBernard IremongerAND THE DIRECTORS, OFFICERS, AND EMPLOYEES OF EACH, HARMLESS AGAINST ALL CLAIMS COSTS, DAMAGES, AND EXPENSES AND REASONABLE ATTORNEYS' FEES ARISING OUT OF, DIRECTLY OR INDIRECTLY, 45fc1f2750SBernard IremongerANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR DEATH ARISING IN ANY WAY OUT OF SUCH MISSION CRITICAL APPLICATION, 46fc1f2750SBernard IremongerWHETHER OR NOT INTEL OR ITS SUBCONTRACTOR WAS NEGLIGENT IN THE DESIGN, MANUFACTURE, OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS PARTS. 47fc1f2750SBernard Iremonger 48fc1f2750SBernard IremongerIntel may make changes to specifications and product descriptions at any time, without notice. 49fc1f2750SBernard IremongerDesigners must not rely on the absence or characteristics of any features or instructions marked "reserved" or "undefined". 50fc1f2750SBernard IremongerIntel reserves these for future definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. 51fc1f2750SBernard IremongerThe information here is subject to change without notice. Do not finalize a design with this information. 52fc1f2750SBernard Iremonger 53fc1f2750SBernard IremongerThe products described in this document may contain design defects or errors known as errata which may cause the product to deviate from published specifications. 54fc1f2750SBernard IremongerCurrent characterized errata are available on request. 55fc1f2750SBernard Iremonger 56fc1f2750SBernard IremongerContact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order. 57fc1f2750SBernard Iremonger 58fc1f2750SBernard IremongerCopies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained by calling 1-800-548- 4725, 59fc1f2750SBernard Iremongeror go to: http://www.intel.com/design/literature.htm. 60fc1f2750SBernard Iremonger 61fc1f2750SBernard IremongerAny software source code reprinted in this document is furnished for informational purposes only and may only be used or copied and no license, express or implied, 62fc1f2750SBernard Iremongerby estoppel or otherwise, to any of the reprinted source code is granted by this document. 63fc1f2750SBernard Iremonger 64fc1f2750SBernard IremongerCode Names are only for use by Intel to identify products, platforms, programs, services, etc. 65fc1f2750SBernard Iremonger("products") in development by Intel that have not been made commercially available to the public, i.e., announced, launched or shipped. 66fc1f2750SBernard IremongerThey are never to be used as "commercial" names for products. Also, they are not intended to function as trademarks. 67fc1f2750SBernard Iremonger 68fc1f2750SBernard IremongerIntel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries. 69fc1f2750SBernard Iremonger 70fc1f2750SBernard Iremonger\*Other names and brands may be claimed as the property of others. 71fc1f2750SBernard Iremonger 72fc1f2750SBernard IremongerCopyright © 2012-2014, Intel Corporation. All rights reserved. 73fc1f2750SBernard Iremonger 74fc1f2750SBernard Iremonger**Contents** 75fc1f2750SBernard Iremonger 76fc1f2750SBernard Iremonger.. toctree:: 77fc1f2750SBernard Iremonger :maxdepth: 3 78fc1f2750SBernard Iremonger :numbered: 79fc1f2750SBernard Iremonger 80fc1f2750SBernard Iremonger intro 81fc1f2750SBernard Iremonger overview 82fc1f2750SBernard Iremonger env_abstraction_layer 83fc1f2750SBernard Iremonger malloc_lib 84fc1f2750SBernard Iremonger ring_lib 85fc1f2750SBernard Iremonger mempool_lib 86fc1f2750SBernard Iremonger mbuf_lib 87fc1f2750SBernard Iremonger poll_mode_drv 88fc1f2750SBernard Iremonger i40e_ixgbe_igb_virt_func_drv 89fc1f2750SBernard Iremonger driver_vm_emul_dev 90fc1f2750SBernard Iremonger ivshmem_lib 91fc1f2750SBernard Iremonger poll_mode_drv_emulated_virtio_nic 92fc1f2750SBernard Iremonger poll_mode_drv_paravirtual_vmxnets_nic 93fc1f2750SBernard Iremonger intel_dpdk_xen_based_packet_switch_sol 94fc1f2750SBernard Iremonger libpcap_ring_based_poll_mode_drv 95fc1f2750SBernard Iremonger link_bonding_poll_mode_drv_lib 96fc1f2750SBernard Iremonger timer_lib 97fc1f2750SBernard Iremonger hash_lib 98fc1f2750SBernard Iremonger lpm_lib 99fc1f2750SBernard Iremonger lpm6_lib 100fc1f2750SBernard Iremonger packet_distrib_lib 101fc1f2750SBernard Iremonger ip_fragment_reassembly_lib 102fc1f2750SBernard Iremonger multi_proc_support 103fc1f2750SBernard Iremonger kernel_nic_interface 104fc1f2750SBernard Iremonger thread_safety_intel_dpdk_functions 105fc1f2750SBernard Iremonger qos_framework 106fc1f2750SBernard Iremonger power_man 107fc1f2750SBernard Iremonger packet_classif_access_ctrl 108fc1f2750SBernard Iremonger packet_framework 1090ee5e7fbSSiobhan Butler vhost_lib 110fc1f2750SBernard Iremonger source_org 111fc1f2750SBernard Iremonger dev_kit_build_system 112fc1f2750SBernard Iremonger dev_kit_root_make_help 113fc1f2750SBernard Iremonger extend_intel_dpdk 114fc1f2750SBernard Iremonger build_app 115fc1f2750SBernard Iremonger ext_app_lib_make_help 116fc1f2750SBernard Iremonger perf_opt_guidelines 117fc1f2750SBernard Iremonger writing_efficient_code 118fc1f2750SBernard Iremonger profile_app 119fc1f2750SBernard Iremonger glossary 120fc1f2750SBernard Iremonger 121fc1f2750SBernard Iremonger 122fc1f2750SBernard Iremonger**Figures** 123fc1f2750SBernard Iremonger 124fc1f2750SBernard Iremonger:ref:`Figure 1. Core Components Architecture <pg_figure_1>` 125fc1f2750SBernard Iremonger 126fc1f2750SBernard Iremonger:ref:`Figure 2. EAL Initialization in a Linux Application Environment <pg_figure_2>` 127fc1f2750SBernard Iremonger 128fc1f2750SBernard Iremonger:ref:`Figure 3. Example of a malloc heap and malloc elements within the malloc library <pg_figure_3>` 129fc1f2750SBernard Iremonger 130fc1f2750SBernard Iremonger:ref:`Figure 4. Ring Structure <pg_figure_4>` 131fc1f2750SBernard Iremonger 132fc1f2750SBernard Iremonger:ref:`Figure 5. Two Channels and Quad-ranked DIMM Example <pg_figure_5>` 133fc1f2750SBernard Iremonger 134fc1f2750SBernard Iremonger:ref:`Figure 6. Three Channels and Two Dual-ranked DIMM Example <pg_figure_6>` 135fc1f2750SBernard Iremonger 136fc1f2750SBernard Iremonger:ref:`Figure 7. A mempool in Memory with its Associated Ring <pg_figure_7>` 137fc1f2750SBernard Iremonger 138fc1f2750SBernard Iremonger:ref:`Figure 8. An mbuf with One Segment <pg_figure_8>` 139fc1f2750SBernard Iremonger 140fc1f2750SBernard Iremonger:ref:`Figure 9. An mbuf with Three Segments <pg_figure_9>` 141fc1f2750SBernard Iremonger 142fc1f2750SBernard Iremonger:ref:`Figure 10. Virtualization for a Single Port NIC in SR-IOV Mode <pg_figure_10>` 143fc1f2750SBernard Iremonger 144fc1f2750SBernard Iremonger:ref:`Figure 11. Performance Benchmark Setup <pg_figure_11>` 145fc1f2750SBernard Iremonger 146fc1f2750SBernard Iremonger:ref:`Figure 12. Fast Host-based Packet Processing <pg_figure_12>` 147fc1f2750SBernard Iremonger 148fc1f2750SBernard Iremonger:ref:`Figure 13. Inter-VM Communication <pg_figure_13>` 149fc1f2750SBernard Iremonger 150fc1f2750SBernard Iremonger:ref:`Figure 14. Host2VM Communication Example Using kni vhost Back End <pg_figure_14>` 151fc1f2750SBernard Iremonger 152fc1f2750SBernard Iremonger:ref:`Figure 15. Host2VM Communication Example Using qemu vhost Back End <pg_figure_15>` 153fc1f2750SBernard Iremonger 154fc1f2750SBernard Iremonger:ref:`Figure 16. Memory Sharing inthe Intel® DPDK Multi-process Sample Application <pg_figure_16>` 155fc1f2750SBernard Iremonger 156fc1f2750SBernard Iremonger:ref:`Figure 17. Components of an Intel® DPDK KNI Application <pg_figure_17>` 157fc1f2750SBernard Iremonger 158fc1f2750SBernard Iremonger:ref:`Figure 18. Packet Flow via mbufs in the Intel DPDK® KNI <pg_figure_18>` 159fc1f2750SBernard Iremonger 160fc1f2750SBernard Iremonger:ref:`Figure 19. vHost-net Architecture Overview <pg_figure_19>` 161fc1f2750SBernard Iremonger 162fc1f2750SBernard Iremonger:ref:`Figure 20. KNI Traffic Flow <pg_figure_20>` 163fc1f2750SBernard Iremonger 164fc1f2750SBernard Iremonger:ref:`Figure 21. Complex Packet Processing Pipeline with QoS Support <pg_figure_21>` 165fc1f2750SBernard Iremonger 166fc1f2750SBernard Iremonger:ref:`Figure 22. Hierarchical Scheduler Block Internal Diagram <pg_figure_22>` 167fc1f2750SBernard Iremonger 168fc1f2750SBernard Iremonger:ref:`Figure 23. Scheduling Hierarchy per Port <pg_figure_23>` 169fc1f2750SBernard Iremonger 170fc1f2750SBernard Iremonger:ref:`Figure 24. Internal Data Structures per Port <pg_figure_24>` 171fc1f2750SBernard Iremonger 172fc1f2750SBernard Iremonger:ref:`Figure 25. Prefetch Pipeline for the Hierarchical Scheduler Enqueue Operation <pg_figure_25>` 173fc1f2750SBernard Iremonger 174fc1f2750SBernard Iremonger:ref:`Figure 26. Pipe Prefetch State Machine for the Hierarchical Scheduler Dequeue Operation <pg_figure_26>` 175fc1f2750SBernard Iremonger 176fc1f2750SBernard Iremonger:ref:`Figure 27. High-level Block Diagram of the Intel® DPDK Dropper <pg_figure_27>` 177fc1f2750SBernard Iremonger 178fc1f2750SBernard Iremonger:ref:`Figure 28. Flow Through the Dropper <pg_figure_28>` 179fc1f2750SBernard Iremonger 180fc1f2750SBernard Iremonger:ref:`Figure 29. Example Data Flow Through Dropper <pg_figure_29>` 181fc1f2750SBernard Iremonger 182fc1f2750SBernard Iremonger:ref:`Figure 30. Packet Drop Probability for a Given RED Configuration <pg_figure_30>` 183fc1f2750SBernard Iremonger 184fc1f2750SBernard Iremonger:ref:`Figure 31. Initial Drop Probability (pb), Actual Drop probability (pa) Computed Using a Factor 1 (Blue Curve) and a Factor 2 (Red Curve) <pg_figure_31>` 185fc1f2750SBernard Iremonger 186fc1f2750SBernard Iremonger:ref:`Figure 32. Example of packet processing pipeline. The input ports 0 and 1 are connected with the output ports 0, 1 and 2 through tables 0 and 1. <pg_figure_32>` 187fc1f2750SBernard Iremonger 188fc1f2750SBernard Iremonger:ref:`Figure 33. Sequence of steps for hash table operations in packet processing context <pg_figure_33>` 189fc1f2750SBernard Iremonger 190fc1f2750SBernard Iremonger:ref:`Figure 34. Data structures for configurable key size hash tables <pg_figure_34>` 191fc1f2750SBernard Iremonger 192fc1f2750SBernard Iremonger:ref:`Figure 35. Bucket search pipeline for key lookup operation (configurable key size hash tables) <pg_figure_35>` 193fc1f2750SBernard Iremonger 194fc1f2750SBernard Iremonger:ref:`Figure 36. Pseudo-code for match, match_many and match_pos <pg_figure_36>` 195fc1f2750SBernard Iremonger 196fc1f2750SBernard Iremonger:ref:`Figure 37. Data structures for 8-byte key hash tables <pg_figure_37>` 197fc1f2750SBernard Iremonger 198fc1f2750SBernard Iremonger:ref:`Figure 38. Data structures for 16-byte key hash tables <pg_figure_38>` 199fc1f2750SBernard Iremonger 200fc1f2750SBernard Iremonger:ref:`Figure 39. Bucket search pipeline for key lookup operation (single key size hash tables) <pg_figure_39>` 201fc1f2750SBernard Iremonger 202fc1f2750SBernard Iremonger**Tables** 203fc1f2750SBernard Iremonger 204fc1f2750SBernard Iremonger:ref:`Table 1. Packet Processing Pipeline Implementing QoS <pg_table_1>` 205fc1f2750SBernard Iremonger 206fc1f2750SBernard Iremonger:ref:`Table 2. Infrastructure Blocks Used by the Packet Processing Pipeline <pg_table_2>` 207fc1f2750SBernard Iremonger 208fc1f2750SBernard Iremonger:ref:`Table 3. Port Scheduling Hierarchy <pg_table_3>` 209fc1f2750SBernard Iremonger 210fc1f2750SBernard Iremonger:ref:`Table 4. Scheduler Internal Data Structures per Port <pg_table_4>` 211fc1f2750SBernard Iremonger 212fc1f2750SBernard Iremonger:ref:`Table 5. Ethernet Frame Overhead Fields <pg_table_5>` 213fc1f2750SBernard Iremonger 214fc1f2750SBernard Iremonger:ref:`Table 6. Token Bucket Generic Operations <pg_table_6>` 215fc1f2750SBernard Iremonger 216fc1f2750SBernard Iremonger:ref:`Table 7. Token Bucket Generic Parameters <pg_table_7>` 217fc1f2750SBernard Iremonger 218fc1f2750SBernard Iremonger:ref:`Table 8. Token Bucket Persistent Data Structure <pg_table_8>` 219fc1f2750SBernard Iremonger 220fc1f2750SBernard Iremonger:ref:`Table 9. Token Bucket Operations <pg_table_9>` 221fc1f2750SBernard Iremonger 222fc1f2750SBernard Iremonger:ref:`Table 10. Subport/Pipe Traffic Class Upper Limit Enforcement Persistent Data Structure <pg_table_10>` 223fc1f2750SBernard Iremonger 224fc1f2750SBernard Iremonger:ref:`Table 11. Subport/Pipe Traffic Class Upper Limit Enforcement Operations <pg_table_11>` 225fc1f2750SBernard Iremonger 226fc1f2750SBernard Iremonger:ref:`Table 12. Weighted Round Robin (WRR) <pg_table_12>` 227fc1f2750SBernard Iremonger 228fc1f2750SBernard Iremonger:ref:`Table 13. Subport Traffic Class Oversubscription <pg_table_13>` 229fc1f2750SBernard Iremonger 230fc1f2750SBernard Iremonger:ref:`Table 14. Watermark Propagation from Subport Level to Member Pipes at the Beginning of Each Traffic Class Upper Limit Enforcement Period <pg_table_14>` 231fc1f2750SBernard Iremonger 232fc1f2750SBernard Iremonger:ref:`Table 15. Watermark Calculation <pg_table_15>` 233fc1f2750SBernard Iremonger 234fc1f2750SBernard Iremonger:ref:`Table 16. RED Configuration Parameters <pg_table_16>` 235fc1f2750SBernard Iremonger 236fc1f2750SBernard Iremonger:ref:`Table 17. Relative Performance of Alternative Approaches <pg_table_17>` 237fc1f2750SBernard Iremonger 238fc1f2750SBernard Iremonger:ref:`Table 18. RED Configuration Corresponding to RED Configuration File <pg_table_18>` 239fc1f2750SBernard Iremonger 240fc1f2750SBernard Iremonger:ref:`Table 19. Port types <pg_table_19>` 241fc1f2750SBernard Iremonger 242fc1f2750SBernard Iremonger:ref:`Table 20. Port abstract interface <pg_table_20>` 243fc1f2750SBernard Iremonger 244fc1f2750SBernard Iremonger:ref:`Table 21. Table types <pg_table_21>` 245fc1f2750SBernard Iremonger 246fc1f2750SBernard Iremonger:ref:`Table 29. Table Abstract Interface <pg_table_29_1>` 247fc1f2750SBernard Iremonger 248fc1f2750SBernard Iremonger:ref:`Table 22. Configuration parameters common for all hash table types <pg_table_22>` 249fc1f2750SBernard Iremonger 250fc1f2750SBernard Iremonger:ref:`Table 23. Configuration parameters specific to extendible bucket hash table <pg_table_23>` 251fc1f2750SBernard Iremonger 252fc1f2750SBernard Iremonger:ref:`Table 24. Configuration parameters specific to pre-computed key signature hash table <pg_table_24>` 253fc1f2750SBernard Iremonger 254fc1f2750SBernard Iremonger:ref:`Table 25. The main large data structures (arrays) used for configurable key size hash tables <pg_table_25>` 255fc1f2750SBernard Iremonger 256fc1f2750SBernard Iremonger:ref:`Table 26. Field description for bucket array entry (configurable key size hash tables) <pg_table_26>` 257fc1f2750SBernard Iremonger 258fc1f2750SBernard Iremonger:ref:`Table 27. Description of the bucket search pipeline stages (configurable key size hash tables) <pg_table_27>` 259fc1f2750SBernard Iremonger 260fc1f2750SBernard Iremonger:ref:`Table 28. Lookup tables for match, match_many, match_pos <pg_table_28>` 261fc1f2750SBernard Iremonger 262fc1f2750SBernard Iremonger:ref:`Table 29. Collapsed lookup tables for match, match_many and match_pos <pg_table_29>` 263fc1f2750SBernard Iremonger 264fc1f2750SBernard Iremonger:ref:`Table 30. The main large data structures (arrays) used for 8-byte and 16-byte key size hash tables <pg_table_30>` 265fc1f2750SBernard Iremonger 266fc1f2750SBernard Iremonger:ref:`Table 31. Field description for bucket array entry (8-byte and 16-byte key hash tables) <pg_table_31>` 267fc1f2750SBernard Iremonger 268fc1f2750SBernard Iremonger:ref:`Table 32. Description of the bucket search pipeline stages (8-byte and 16-byte key hash tables) <pg_table_32>` 269fc1f2750SBernard Iremonger 270fc1f2750SBernard Iremonger:ref:`Table 33. Next hop actions (reserved) <pg_table_33>` 271fc1f2750SBernard Iremonger 272fc1f2750SBernard Iremonger:ref:`Table 34. User action examples <pg_table_34>` 273