xref: /dpdk/doc/guides/prog_guide/index.rst (revision edab33b1c01d508fdd934c06ee27f84250d2749a)
1..  BSD LICENSE
2    Copyright(c) 2010-2014 Intel Corporation. All rights reserved.
3    All rights reserved.
4
5    Redistribution and use in source and binary forms, with or without
6    modification, are permitted provided that the following conditions
7    are met:
8
9    * Redistributions of source code must retain the above copyright
10    notice, this list of conditions and the following disclaimer.
11    * Redistributions in binary form must reproduce the above copyright
12    notice, this list of conditions and the following disclaimer in
13    the documentation and/or other materials provided with the
14    distribution.
15    * Neither the name of Intel Corporation nor the names of its
16    contributors may be used to endorse or promote products derived
17    from this software without specific prior written permission.
18
19    THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
20    "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
21    LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
22    A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
23    OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
24    SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
25    LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
26    DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
27    THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
28    (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
29    OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30
31Programmer's Guide
32==================
33
34|today|
35
36
37**Contents**
38
39.. toctree::
40    :maxdepth: 3
41    :numbered:
42
43    intro
44    overview
45    env_abstraction_layer
46    malloc_lib
47    ring_lib
48    mempool_lib
49    mbuf_lib
50    poll_mode_drv
51    i40e_ixgbe_igb_virt_func_drv
52    driver_vm_emul_dev
53    ivshmem_lib
54    poll_mode_drv_emulated_virtio_nic
55    poll_mode_drv_paravirtual_vmxnets_nic
56    intel_dpdk_xen_based_packet_switch_sol
57    libpcap_ring_based_poll_mode_drv
58    link_bonding_poll_mode_drv_lib
59    mlx4_poll_mode_drv
60    timer_lib
61    hash_lib
62    lpm_lib
63    lpm6_lib
64    packet_distrib_lib
65    reorder_lib
66    ip_fragment_reassembly_lib
67    multi_proc_support
68    kernel_nic_interface
69    thread_safety_intel_dpdk_functions
70    qos_framework
71    power_man
72    packet_classif_access_ctrl
73    packet_framework
74    vhost_lib
75    port_hotplug_framework
76    source_org
77    dev_kit_build_system
78    dev_kit_root_make_help
79    extend_intel_dpdk
80    build_app
81    ext_app_lib_make_help
82    perf_opt_guidelines
83    writing_efficient_code
84    profile_app
85    glossary
86
87
88**Figures**
89
90:ref:`Figure 1. Core Components Architecture <pg_figure_1>`
91
92:ref:`Figure 2. EAL Initialization in a Linux Application Environment <pg_figure_2>`
93
94:ref:`Figure 3. Example of a malloc heap and malloc elements within the malloc library <pg_figure_3>`
95
96:ref:`Figure 4. Ring Structure <pg_figure_4>`
97
98:ref:`Figure 5. Two Channels and Quad-ranked DIMM Example <pg_figure_5>`
99
100:ref:`Figure 6. Three Channels and Two Dual-ranked DIMM Example <pg_figure_6>`
101
102:ref:`Figure 7. A mempool in Memory with its Associated Ring <pg_figure_7>`
103
104:ref:`Figure 8. An mbuf with One Segment <pg_figure_8>`
105
106:ref:`Figure 9. An mbuf with Three Segments <pg_figure_9>`
107
108:ref:`Figure 10. Virtualization for a Single Port NIC in SR-IOV Mode <pg_figure_10>`
109
110:ref:`Figure 11. Performance Benchmark Setup <pg_figure_11>`
111
112:ref:`Figure 12. Fast Host-based Packet Processing <pg_figure_12>`
113
114:ref:`Figure 13. Inter-VM Communication <pg_figure_13>`
115
116:ref:`Figure 14. Host2VM Communication Example Using kni vhost Back End <pg_figure_14>`
117
118:ref:`Figure 15. Host2VM Communication Example Using qemu vhost Back End <pg_figure_15>`
119
120:ref:`Figure 16. Memory Sharing inthe Intel® DPDK Multi-process Sample Application <pg_figure_16>`
121
122:ref:`Figure 17. Components of an Intel® DPDK KNI Application <pg_figure_17>`
123
124:ref:`Figure 18. Packet Flow via mbufs in the Intel DPDK® KNI <pg_figure_18>`
125
126:ref:`Figure 19. vHost-net Architecture Overview <pg_figure_19>`
127
128:ref:`Figure 20. KNI Traffic Flow <pg_figure_20>`
129
130:ref:`Figure 21. Complex Packet Processing Pipeline with QoS Support <pg_figure_21>`
131
132:ref:`Figure 22. Hierarchical Scheduler Block Internal Diagram <pg_figure_22>`
133
134:ref:`Figure 23. Scheduling Hierarchy per Port <pg_figure_23>`
135
136:ref:`Figure 24. Internal Data Structures per Port <pg_figure_24>`
137
138:ref:`Figure 25. Prefetch Pipeline for the Hierarchical Scheduler Enqueue Operation <pg_figure_25>`
139
140:ref:`Figure 26. Pipe Prefetch State Machine for the Hierarchical Scheduler Dequeue Operation <pg_figure_26>`
141
142:ref:`Figure 27. High-level Block Diagram of the Intel® DPDK Dropper <pg_figure_27>`
143
144:ref:`Figure 28. Flow Through the Dropper <pg_figure_28>`
145
146:ref:`Figure 29. Example Data Flow Through Dropper <pg_figure_29>`
147
148:ref:`Figure 30. Packet Drop Probability for a Given RED Configuration <pg_figure_30>`
149
150:ref:`Figure 31. Initial Drop Probability (pb), Actual Drop probability (pa) Computed Using a Factor 1 (Blue Curve) and a Factor 2 (Red Curve) <pg_figure_31>`
151
152:ref:`Figure 32. Example of packet processing pipeline. The input ports 0 and 1 are connected with the output ports 0, 1 and 2 through tables 0 and 1. <pg_figure_32>`
153
154:ref:`Figure 33. Sequence of steps for hash table operations in packet processing context <pg_figure_33>`
155
156:ref:`Figure 34. Data structures for configurable key size hash tables <pg_figure_34>`
157
158:ref:`Figure 35. Bucket search pipeline for key lookup operation (configurable key size hash tables) <pg_figure_35>`
159
160:ref:`Figure 36. Pseudo-code for match, match_many and match_pos <pg_figure_36>`
161
162:ref:`Figure 37. Data structures for 8-byte key hash tables <pg_figure_37>`
163
164:ref:`Figure 38. Data structures for 16-byte key hash tables <pg_figure_38>`
165
166:ref:`Figure 39. Bucket search pipeline for key lookup operation (single key size hash tables) <pg_figure_39>`
167
168**Tables**
169
170:ref:`Table 1. Packet Processing Pipeline Implementing QoS <pg_table_1>`
171
172:ref:`Table 2. Infrastructure Blocks Used by the Packet Processing Pipeline <pg_table_2>`
173
174:ref:`Table 3. Port Scheduling Hierarchy <pg_table_3>`
175
176:ref:`Table 4. Scheduler Internal Data Structures per Port <pg_table_4>`
177
178:ref:`Table 5. Ethernet Frame Overhead Fields <pg_table_5>`
179
180:ref:`Table 6. Token Bucket Generic Operations <pg_table_6>`
181
182:ref:`Table 7. Token Bucket Generic Parameters <pg_table_7>`
183
184:ref:`Table 8. Token Bucket Persistent Data Structure <pg_table_8>`
185
186:ref:`Table 9. Token Bucket Operations <pg_table_9>`
187
188:ref:`Table 10. Subport/Pipe Traffic Class Upper Limit Enforcement Persistent Data Structure <pg_table_10>`
189
190:ref:`Table 11. Subport/Pipe Traffic Class Upper Limit Enforcement Operations <pg_table_11>`
191
192:ref:`Table 12. Weighted Round Robin (WRR) <pg_table_12>`
193
194:ref:`Table 13. Subport Traffic Class Oversubscription <pg_table_13>`
195
196:ref:`Table 14. Watermark Propagation from Subport Level to Member Pipes at the Beginning of Each Traffic Class Upper Limit Enforcement Period <pg_table_14>`
197
198:ref:`Table 15. Watermark Calculation <pg_table_15>`
199
200:ref:`Table 16. RED Configuration Parameters <pg_table_16>`
201
202:ref:`Table 17. Relative Performance of Alternative Approaches <pg_table_17>`
203
204:ref:`Table 18. RED Configuration Corresponding to RED Configuration File <pg_table_18>`
205
206:ref:`Table 19. Port types <pg_table_19>`
207
208:ref:`Table 20. Port abstract interface <pg_table_20>`
209
210:ref:`Table 21. Table types <pg_table_21>`
211
212:ref:`Table 29. Table Abstract Interface <pg_table_29_1>`
213
214:ref:`Table 22. Configuration parameters common for all hash table types <pg_table_22>`
215
216:ref:`Table 23. Configuration parameters specific to extendible bucket hash table <pg_table_23>`
217
218:ref:`Table 24. Configuration parameters specific to pre-computed key signature hash table <pg_table_24>`
219
220:ref:`Table 25. The main large data structures (arrays) used for configurable key size hash tables <pg_table_25>`
221
222:ref:`Table 26. Field description for bucket array entry (configurable key size hash tables) <pg_table_26>`
223
224:ref:`Table 27. Description of the bucket search pipeline stages (configurable key size hash tables) <pg_table_27>`
225
226:ref:`Table 28. Lookup tables for match, match_many, match_pos <pg_table_28>`
227
228:ref:`Table 29. Collapsed lookup tables for match, match_many and match_pos <pg_table_29>`
229
230:ref:`Table 30. The main large data structures (arrays) used for 8-byte and 16-byte key size hash tables <pg_table_30>`
231
232:ref:`Table 31. Field description for bucket array entry (8-byte and 16-byte key hash tables) <pg_table_31>`
233
234:ref:`Table 32. Description of the bucket search pipeline stages (8-byte and 16-byte key hash tables) <pg_table_32>`
235
236:ref:`Table 33. Next hop actions (reserved) <pg_table_33>`
237
238:ref:`Table 34. User action examples <pg_table_34>`
239