xref: /dpdk/doc/guides/prog_guide/writing_efficient_code.rst (revision fea1d908d39989a27890b29b5c0ec94c85c8257b)
1fc1f2750SBernard Iremonger..  BSD LICENSE
2fc1f2750SBernard Iremonger    Copyright(c) 2010-2014 Intel Corporation. All rights reserved.
3fc1f2750SBernard Iremonger    All rights reserved.
4fc1f2750SBernard Iremonger
5fc1f2750SBernard Iremonger    Redistribution and use in source and binary forms, with or without
6fc1f2750SBernard Iremonger    modification, are permitted provided that the following conditions
7fc1f2750SBernard Iremonger    are met:
8fc1f2750SBernard Iremonger
9fc1f2750SBernard Iremonger    * Redistributions of source code must retain the above copyright
10fc1f2750SBernard Iremonger    notice, this list of conditions and the following disclaimer.
11fc1f2750SBernard Iremonger    * Redistributions in binary form must reproduce the above copyright
12fc1f2750SBernard Iremonger    notice, this list of conditions and the following disclaimer in
13fc1f2750SBernard Iremonger    the documentation and/or other materials provided with the
14fc1f2750SBernard Iremonger    distribution.
15fc1f2750SBernard Iremonger    * Neither the name of Intel Corporation nor the names of its
16fc1f2750SBernard Iremonger    contributors may be used to endorse or promote products derived
17fc1f2750SBernard Iremonger    from this software without specific prior written permission.
18fc1f2750SBernard Iremonger
19fc1f2750SBernard Iremonger    THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
20fc1f2750SBernard Iremonger    "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
21fc1f2750SBernard Iremonger    LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
22fc1f2750SBernard Iremonger    A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
23fc1f2750SBernard Iremonger    OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
24fc1f2750SBernard Iremonger    SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
25fc1f2750SBernard Iremonger    LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
26fc1f2750SBernard Iremonger    DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
27fc1f2750SBernard Iremonger    THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
28fc1f2750SBernard Iremonger    (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
29fc1f2750SBernard Iremonger    OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30fc1f2750SBernard Iremonger
31fc1f2750SBernard IremongerWriting Efficient Code
32fc1f2750SBernard Iremonger======================
33fc1f2750SBernard Iremonger
3448624fd9SSiobhan ButlerThis chapter provides some tips for developing efficient code using the DPDK.
35fc1f2750SBernard IremongerFor additional and more general information,
36fc1f2750SBernard Iremongerplease refer to the *Intel® 64 and IA-32 Architectures Optimization Reference Manual*
37fc1f2750SBernard Iremongerwhich is a valuable reference to writing efficient code.
38fc1f2750SBernard Iremonger
39fc1f2750SBernard IremongerMemory
40fc1f2750SBernard Iremonger------
41fc1f2750SBernard Iremonger
4248624fd9SSiobhan ButlerThis section describes some key memory considerations when developing applications in the DPDK environment.
43fc1f2750SBernard Iremonger
44fc1f2750SBernard IremongerMemory Copy: Do not Use libc in the Data Plane
45fc1f2750SBernard Iremonger~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
46fc1f2750SBernard Iremonger
4748624fd9SSiobhan ButlerMany libc functions are available in the DPDK, via the Linux* application environment.
48fc1f2750SBernard IremongerThis can ease the porting of applications and the development of the configuration plane.
49fc1f2750SBernard IremongerHowever, many of these functions are not designed for performance.
50fc1f2750SBernard IremongerFunctions such as memcpy() or strcpy() should not be used in the data plane.
51fc1f2750SBernard IremongerTo copy small structures, the preference is for a simpler technique that can be optimized by the compiler.
52fc1f2750SBernard IremongerRefer to the *VTune™ Performance Analyzer Essentials* publication from Intel Press for recommendations.
53fc1f2750SBernard Iremonger
54fc1f2750SBernard IremongerFor specific functions that are called often,
55fc1f2750SBernard Iremongerit is also a good idea to provide a self-made optimized function, which should be declared as static inline.
56fc1f2750SBernard Iremonger
5748624fd9SSiobhan ButlerThe DPDK API provides an optimized rte_memcpy() function.
58fc1f2750SBernard Iremonger
59fc1f2750SBernard IremongerMemory Allocation
60fc1f2750SBernard Iremonger~~~~~~~~~~~~~~~~~
61fc1f2750SBernard Iremonger
62fc1f2750SBernard IremongerOther functions of libc, such as malloc(), provide a flexible way to allocate and free memory.
63fc1f2750SBernard IremongerIn some cases, using dynamic allocation is necessary,
64fc1f2750SBernard Iremongerbut it is really not advised to use malloc-like functions in the data plane because
65fc1f2750SBernard Iremongermanaging a fragmented heap can be costly and the allocator may not be optimized for parallel allocation.
66fc1f2750SBernard Iremonger
67fc1f2750SBernard IremongerIf you really need dynamic allocation in the data plane, it is better to use a memory pool of fixed-size objects.
68fc1f2750SBernard IremongerThis API is provided by librte_mempool.
69fc1f2750SBernard IremongerThis data structure provides several services that increase performance, such as memory alignment of objects,
70fc1f2750SBernard Iremongerlockless access to objects, NUMA awareness, bulk get/put and per-lcore cache.
71fc1f2750SBernard IremongerThe rte_malloc () function uses a similar concept to mempools.
72fc1f2750SBernard Iremonger
73fc1f2750SBernard IremongerConcurrent Access to the Same Memory Area
74fc1f2750SBernard Iremonger~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
75fc1f2750SBernard Iremonger
76fc1f2750SBernard IremongerRead-Write (RW) access operations by several lcores to the same memory area can generate a lot of data cache misses,
77fc1f2750SBernard Iremongerwhich are very costly.
78fc1f2750SBernard IremongerIt is often possible to use per-lcore variables, for example, in the case of statistics.
79fc1f2750SBernard IremongerThere are at least two solutions for this:
80fc1f2750SBernard Iremonger
81fc1f2750SBernard Iremonger*   Use RTE_PER_LCORE variables. Note that in this case, data on lcore X is not available to lcore Y.
82fc1f2750SBernard Iremonger
83fc1f2750SBernard Iremonger*   Use a table of structures (one per lcore). In this case, each structure must be cache-aligned.
84fc1f2750SBernard Iremonger
85fc1f2750SBernard IremongerRead-mostly variables can be shared among lcores without performance losses if there are no RW variables in the same cache line.
86fc1f2750SBernard Iremonger
87fc1f2750SBernard IremongerNUMA
88fc1f2750SBernard Iremonger~~~~
89fc1f2750SBernard Iremonger
90fc1f2750SBernard IremongerOn a NUMA system, it is preferable to access local memory since remote memory access is slower.
9148624fd9SSiobhan ButlerIn the DPDK, the memzone, ring, rte_malloc and mempool APIs provide a way to create a pool on a specific socket.
92fc1f2750SBernard Iremonger
93fc1f2750SBernard IremongerSometimes, it can be a good idea to duplicate data to optimize speed.
94fc1f2750SBernard IremongerFor read-mostly variables that are often accessed,
95fc1f2750SBernard Iremongerit should not be a problem to keep them in one socket only, since data will be present in cache.
96fc1f2750SBernard Iremonger
97fc1f2750SBernard IremongerDistribution Across Memory Channels
98fc1f2750SBernard Iremonger~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
99fc1f2750SBernard Iremonger
100fc1f2750SBernard IremongerModern memory controllers have several memory channels that can load or store data in parallel.
101fc1f2750SBernard IremongerDepending on the memory controller and its configuration,
102fc1f2750SBernard Iremongerthe number of channels and the way the memory is distributed across the channels varies.
103fc1f2750SBernard IremongerEach channel has a bandwidth limit,
104fc1f2750SBernard Iremongermeaning that if all memory access operations are done on the first channel only, there is a potential bottleneck.
105fc1f2750SBernard Iremonger
106fc1f2750SBernard IremongerBy default, the  :ref:`Mempool Library <Mempool_Library>` spreads the addresses of objects among memory channels.
107fc1f2750SBernard Iremonger
108fc1f2750SBernard IremongerCommunication Between lcores
109fc1f2750SBernard Iremonger----------------------------
110fc1f2750SBernard Iremonger
111fc1f2750SBernard IremongerTo provide a message-based communication between lcores,
11248624fd9SSiobhan Butlerit is advised to use the DPDK ring API, which provides a lockless ring implementation.
113fc1f2750SBernard Iremonger
114fc1f2750SBernard IremongerThe ring supports bulk and burst access,
115fc1f2750SBernard Iremongermeaning that it is possible to read several elements from the ring with only one costly atomic operation
116fc1f2750SBernard Iremonger(see Chapter 5 "Ring Library").
117fc1f2750SBernard IremongerPerformance is greatly improved when using bulk access operations.
118fc1f2750SBernard Iremonger
119fc1f2750SBernard IremongerThe code algorithm that dequeues messages may be something similar to the following:
120fc1f2750SBernard Iremonger
121fc1f2750SBernard Iremonger.. code-block:: c
122fc1f2750SBernard Iremonger
123fc1f2750SBernard Iremonger    #define MAX_BULK 32
124fc1f2750SBernard Iremonger
125fc1f2750SBernard Iremonger    while (1) {
126fc1f2750SBernard Iremonger        /* Process as many elements as can be dequeued. */
127fc1f2750SBernard Iremonger        count = rte_ring_dequeue_burst(ring, obj_table, MAX_BULK);
128fc1f2750SBernard Iremonger        if (unlikely(count == 0))
129fc1f2750SBernard Iremonger            continue;
130fc1f2750SBernard Iremonger
131fc1f2750SBernard Iremonger        my_process_bulk(obj_table, count);
132fc1f2750SBernard Iremonger   }
133fc1f2750SBernard Iremonger
134fc1f2750SBernard IremongerPMD Driver
135fc1f2750SBernard Iremonger----------
136fc1f2750SBernard Iremonger
13748624fd9SSiobhan ButlerThe DPDK Poll Mode Driver (PMD) is also able to work in bulk/burst mode,
138fc1f2750SBernard Iremongerallowing the factorization of some code for each call in the send or receive function.
139fc1f2750SBernard Iremonger
140fc1f2750SBernard IremongerAvoid partial writes.
141fc1f2750SBernard IremongerWhen PCI devices write to system memory through DMA,
142fc1f2750SBernard Iremongerit costs less if the write operation is on a full cache line as opposed to part of it.
143fc1f2750SBernard IremongerIn the PMD code, actions have been taken to avoid partial writes as much as possible.
144fc1f2750SBernard Iremonger
145fc1f2750SBernard IremongerLower Packet Latency
146fc1f2750SBernard Iremonger~~~~~~~~~~~~~~~~~~~~
147fc1f2750SBernard Iremonger
148fc1f2750SBernard IremongerTraditionally, there is a trade-off between throughput and latency.
149fc1f2750SBernard IremongerAn application can be tuned to achieve a high throughput,
150fc1f2750SBernard Iremongerbut the end-to-end latency of an average packet will typically increase as a result.
151fc1f2750SBernard IremongerSimilarly, the application can be tuned to have, on average,
152fc1f2750SBernard Iremongera low end-to-end latency, at the cost of lower throughput.
153fc1f2750SBernard Iremonger
154fc1f2750SBernard IremongerIn order to achieve higher throughput,
15548624fd9SSiobhan Butlerthe DPDK attempts to aggregate the cost of processing each packet individually by processing packets in bursts.
156fc1f2750SBernard Iremonger
157fc1f2750SBernard IremongerUsing the testpmd application as an example,
158fc1f2750SBernard Iremongerthe burst size can be set on the command line to a value of 16 (also the default value).
159fc1f2750SBernard IremongerThis allows the application to request 16 packets at a time from the PMD.
160fc1f2750SBernard IremongerThe testpmd application then immediately attempts to transmit all the packets that were received,
161fc1f2750SBernard Iremongerin this case, all 16 packets.
162fc1f2750SBernard Iremonger
163fc1f2750SBernard IremongerThe packets are not transmitted until the tail pointer is updated on the corresponding TX queue of the network port.
164fc1f2750SBernard IremongerThis behavior is desirable when tuning for high throughput because
165fc1f2750SBernard Iremongerthe cost of tail pointer updates to both the RX and TX queues can be spread across 16 packets,
166fc1f2750SBernard Iremongereffectively hiding the relatively slow MMIO cost of writing to the PCIe* device.
167fc1f2750SBernard IremongerHowever, this is not very desirable when tuning for low latency because
168fc1f2750SBernard Iremongerthe first packet that was received must also wait for another 15 packets to be received.
169fc1f2750SBernard IremongerIt cannot be transmitted until the other 15 packets have also been processed because
170fc1f2750SBernard Iremongerthe NIC will not know to transmit the packets until the TX tail pointer has been updated,
171fc1f2750SBernard Iremongerwhich is not done until all 16 packets have been processed for transmission.
172fc1f2750SBernard Iremonger
173fc1f2750SBernard IremongerTo consistently achieve low latency, even under heavy system load,
174fc1f2750SBernard Iremongerthe application developer should avoid processing packets in bunches.
175fc1f2750SBernard IremongerThe testpmd application can be configured from the command line to use a burst value of 1.
176fc1f2750SBernard IremongerThis will allow a single packet to be processed at a time, providing lower latency,
177fc1f2750SBernard Iremongerbut with the added cost of lower throughput.
178fc1f2750SBernard Iremonger
179fc1f2750SBernard IremongerLocks and Atomic Operations
180fc1f2750SBernard Iremonger---------------------------
181fc1f2750SBernard Iremonger
182fc1f2750SBernard IremongerAtomic operations imply a lock prefix before the instruction,
183fc1f2750SBernard Iremongercausing the processor's LOCK# signal to be asserted during execution of the following instruction.
184fc1f2750SBernard IremongerThis has a big impact on performance in a multicore environment.
185fc1f2750SBernard Iremonger
186fc1f2750SBernard IremongerPerformance can be improved by avoiding lock mechanisms in the data plane.
187fc1f2750SBernard IremongerIt can often be replaced by other solutions like per-lcore variables.
188fc1f2750SBernard IremongerAlso, some locking techniques are more efficient than others.
189fc1f2750SBernard IremongerFor instance, the Read-Copy-Update (RCU) algorithm can frequently replace simple rwlocks.
190fc1f2750SBernard Iremonger
191fc1f2750SBernard IremongerCoding Considerations
192fc1f2750SBernard Iremonger---------------------
193fc1f2750SBernard Iremonger
194fc1f2750SBernard IremongerInline Functions
195fc1f2750SBernard Iremonger~~~~~~~~~~~~~~~~
196fc1f2750SBernard Iremonger
197fc1f2750SBernard IremongerSmall functions can be declared as static inline in the header file.
198fc1f2750SBernard IremongerThis avoids the cost of a call instruction (and the associated context saving).
199fc1f2750SBernard IremongerHowever, this technique is not always efficient; it depends on many factors including the compiler.
200fc1f2750SBernard Iremonger
201fc1f2750SBernard IremongerBranch Prediction
202fc1f2750SBernard Iremonger~~~~~~~~~~~~~~~~~
203fc1f2750SBernard Iremonger
204fc1f2750SBernard IremongerThe Intel® C/C++ Compiler (icc)/gcc built-in helper functions likely() and unlikely()
205fc1f2750SBernard Iremongerallow the developer to indicate if a code branch is likely to be taken or not.
206fc1f2750SBernard IremongerFor instance:
207fc1f2750SBernard Iremonger
208fc1f2750SBernard Iremonger.. code-block:: c
209fc1f2750SBernard Iremonger
210fc1f2750SBernard Iremonger    if (likely(x > 1))
211fc1f2750SBernard Iremonger        do_stuff();
212fc1f2750SBernard Iremonger
213fc1f2750SBernard IremongerSetting the Target CPU Type
214fc1f2750SBernard Iremonger---------------------------
215fc1f2750SBernard Iremonger
21648624fd9SSiobhan ButlerThe DPDK supports CPU microarchitecture-specific optimizations by means of CONFIG_RTE_MACHINE option
21748624fd9SSiobhan Butlerin the DPDK configuration file.
218*fea1d908SJohn McNamaraThe degree of optimization depends on the compiler's ability to optimize for a specific microarchitecture,
219fc1f2750SBernard Iremongertherefore it is preferable to use the latest compiler versions whenever possible.
220fc1f2750SBernard Iremonger
221fc1f2750SBernard IremongerIf the compiler version does not support the specific feature set (for example, the Intel® AVX instruction set),
222fc1f2750SBernard Iremongerthe build process gracefully degrades to whatever latest feature set is supported by the compiler.
223fc1f2750SBernard Iremonger
224fc1f2750SBernard IremongerSince the build and runtime targets may not be the same,
225fc1f2750SBernard Iremongerthe resulting binary also contains a platform check that runs before the
226fc1f2750SBernard Iremongermain() function and checks if the current machine is suitable for running the binary.
227fc1f2750SBernard Iremonger
228fc1f2750SBernard IremongerAlong with compiler optimizations,
229fc1f2750SBernard Iremongera set of preprocessor defines are automatically added to the build process (regardless of the compiler version).
230fc1f2750SBernard IremongerThese defines correspond to the instruction sets that the target CPU should be able to support.
231fc1f2750SBernard IremongerFor example, a binary compiled for any SSE4.2-capable processor will have RTE_MACHINE_CPUFLAG_SSE4_2 defined,
232fc1f2750SBernard Iremongerthus enabling compile-time code path selection for different platforms.
233