xref: /dpdk/doc/guides/sample_app_ug/l3_forward.rst (revision 7917b0d38e92e8b9ec5a870415b791420e10f11a)
1..  SPDX-License-Identifier: BSD-3-Clause
2    Copyright(c) 2010-2014 Intel Corporation.
3
4L3 Forwarding Sample Application
5================================
6
7The L3 Forwarding application is a simple example of packet processing using
8DPDK to demonstrate usage of poll and event mode packet I/O mechanism.
9The application performs L3 forwarding.
10
11Overview
12--------
13
14The application demonstrates the use of the hash, LPM, FIB and ACL libraries in DPDK
15to implement packet forwarding using poll or event mode PMDs for packet I/O.
16The initialization and run-time paths are very similar to those of the
17:doc:`l2_forward_real_virtual` and :doc:`l2_forward_event`.
18The main difference from the L2 Forwarding sample application is that optionally
19packet can be Rx/Tx from/to eventdev instead of port directly and forwarding
20decision is made based on information read from the input packet.
21
22Eventdev can optionally use S/W or H/W (if supported by platform) scheduler
23implementation for packet I/O based on run time parameters.
24
25The lookup method is hash-based, LPM-based, FIB-based or ACL-based
26and is selected at run time.
27When the selected lookup method is hash-based,
28a hash object is used to emulate the flow classification stage.
29The hash object is used in correlation with a flow table to map each input packet to its flow at runtime.
30
31The hash lookup key is represented by a DiffServ 5-tuple composed of the following fields read from the input packet:
32Source IP Address, Destination IP Address, Protocol, Source Port and Destination Port.
33The ID of the output interface for the input packet is read from the identified flow table entry.
34The set of flows used by the application is statically configured and loaded into the hash at initialization time.
35When the selected lookup method is LPM or FIB based,
36an LPM or FIB object is used to emulate the forwarding stage for IPv4 packets.
37The LPM or FIB object is used as the routing table
38to identify the next hop for each input packet at runtime.
39
40The LPM and FIB lookup keys are represented by the destination IP address field
41read from the input packet.
42The ID of the output interface for the input packet is the next hop
43returned by the LPM or FIB lookup.
44The set of LPM and FIB rules used by the application is statically configured
45and loaded into the LPM or FIB object at initialization time.
46
47For ACL, the ACL library is used to perform both ACL and route entry lookup.
48When packets are received from a port,
49the application extracts the necessary information
50from the TCP/IP header of the received packet
51and performs a lookup in the rule database to figure out
52whether the packets should be dropped (in the ACL range)
53or forwarded to desired ports.
54For ACL, the application implements packet classification
55for the IPv4/IPv6 5-tuple syntax specifically.
56The 5-tuple syntax consists of a source IP address, a destination IP address,
57a source port, a destination port and a protocol identifier.
58
59In the sample application, hash-based, LPM-based, FIB-based and ACL-based forwarding supports
60both IPv4 and IPv6.
61During the initialization phase route rules for IPv4 and IPv6 are read from rule files.
62
63Compiling the Application
64-------------------------
65
66To compile the sample application see :doc:`compiling`.
67
68The application is located in the ``l3fwd`` sub-directory.
69
70Running the Application
71-----------------------
72
73The application has a number of command line options::
74
75    ./dpdk-l3fwd [EAL options] -- -p PORTMASK
76                             --rule_ipv4=FILE
77                             --rule_ipv6=FILE
78                             [-P]
79                             [--lookup LOOKUP_METHOD]
80                             --config(port,queue,lcore)[,(port,queue,lcore)]
81                             [--eth-dest=X,MM:MM:MM:MM:MM:MM]
82                             [--max-pkt-len PKTLEN]
83                             [--no-numa]
84                             [--hash-entry-num]
85                             [--ipv6]
86                             [--parse-ptype]
87                             [--per-port-pool]
88                             [--mode]
89                             [--eventq-sched]
90                             [--event-eth-rxqs]
91                             [--event-vector [--event-vector-size SIZE] [--event-vector-tmo NS]]
92                             [-E]
93                             [-L]
94
95Where,
96
97* ``-p PORTMASK:`` Hexadecimal bitmask of ports to configure
98
99* ``--rule_ipv4=FILE:`` specify the ipv4 rules entries file.
100  Each rule occupies one line.
101
102* ``--rule_ipv6=FILE:`` specify the ipv6 rules entries file.
103
104* ``-P:`` Optional, sets all ports to promiscuous mode so that packets are accepted regardless of the packet's Ethernet MAC destination address.
105  Without this option, only packets with the Ethernet MAC destination address set to the Ethernet address of the port are accepted.
106
107* ``--lookup:`` Optional, select the lookup method.
108  Accepted options:
109  ``em`` (Exact Match),
110  ``lpm`` (Longest Prefix Match),
111  ``fib`` (Forwarding Information Base),
112  ``acl`` (Access Control List).
113  Default is ``lpm``.
114
115* ``--config (port,queue,lcore)[,(port,queue,lcore)]:`` Determines which queues from which ports are mapped to which cores.
116
117* ``--eth-dest=X,MM:MM:MM:MM:MM:MM:`` Optional, ethernet destination for port X.
118
119* ``--max-pkt-len:`` Optional, maximum packet length in decimal (64-9600).
120
121* ``--no-numa:`` Optional, disables numa awareness.
122
123* ``--hash-entry-num:`` Optional, specifies the hash entry number in hexadecimal to be setup.
124
125* ``--ipv6:`` Optional, set if running ipv6 packets.
126
127* ``--parse-ptype:`` Optional, set to use software to analyze packet type. Without this option, hardware will check the packet type.
128
129* ``--per-port-pool:`` Optional, set to use independent buffer pools per port. Without this option, single buffer pool is used for all ports.
130
131* ``--mode:`` Optional, Packet transfer mode for I/O, poll or eventdev.
132
133* ``--eventq-sched:`` Optional, Event queue synchronization method, Ordered, Atomic or Parallel. Only valid if --mode=eventdev.
134
135* ``--event-eth-rxqs:`` Optional, Number of ethernet RX queues per device. Only valid if --mode=eventdev.
136
137* ``--event-vector:`` Optional, Enable event vectorization. Only valid if --mode=eventdev.
138
139* ``--event-vector-size:`` Optional, Max vector size if event vectorization is enabled.
140
141* ``--event-vector-tmo:`` Optional, Max timeout to form vector in nanoseconds if event vectorization is enabled.
142
143* ``--alg=<val>:`` optional, ACL classify method to use, one of:
144  ``scalar|sse|avx2|neon|altivec|avx512x16|avx512x32``
145
146* ``-E:`` Optional, enable exact match,
147  legacy flag, please use ``--lookup=em`` instead.
148
149* ``-L:`` Optional, enable longest prefix match,
150  legacy flag, please use ``--lookup=lpm`` instead.
151
152
153For example, consider a dual processor socket platform with 8 physical cores, where cores 0-7 and 16-23 appear on socket 0,
154while cores 8-15 and 24-31 appear on socket 1.
155
156To enable L3 forwarding between two ports, assuming that both ports are in the same socket, using two cores, cores 1 and 2,
157(which are in the same socket too), use the following command:
158
159.. code-block:: console
160
161    ./<build_dir>/examples/dpdk-l3fwd -l 1,2 -n 4 -- -p 0x3 --config="(0,0,1),(1,0,2)" --rule_ipv4="rule_ipv4.cfg" --rule_ipv6="rule_ipv6.cfg"
162
163In this command:
164
165*   The -l option enables cores 1, 2
166
167*   The -p option enables ports 0 and 1
168
169*   The --config option enables one queue on each port and maps each (port,queue) pair to a specific core.
170    The following table shows the mapping in this example:
171
172+----------+-----------+-----------+-------------------------------------+
173| **Port** | **Queue** | **lcore** | **Description**                     |
174|          |           |           |                                     |
175+----------+-----------+-----------+-------------------------------------+
176| 0        | 0         | 1         | Map queue 0 from port 0 to lcore 1. |
177|          |           |           |                                     |
178+----------+-----------+-----------+-------------------------------------+
179| 1        | 0         | 2         | Map queue 0 from port 1 to lcore 2. |
180|          |           |           |                                     |
181+----------+-----------+-----------+-------------------------------------+
182
183*   The -rule_ipv4 option specifies the reading of IPv4 rules sets from the rule_ipv4.cfg file
184
185*   The -rule_ipv6 option specifies the reading of IPv6 rules sets from the rule_ipv6.cfg file.
186
187To use eventdev mode with sync method **ordered** on above mentioned environment,
188Following is the sample command:
189
190.. code-block:: console
191
192    ./<build_dir>/examples/dpdk-l3fwd -l 0-3 -n 4 -a <event device> -- -p 0x3 --eventq-sched=ordered --rule_ipv4="rule_ipv4.cfg" --rule_ipv6="rule_ipv6.cfg"
193
194or
195
196.. code-block:: console
197
198    ./<build_dir>/examples/dpdk-l3fwd -l 0-3 -n 4 -a <event device> \
199		-- -p 0x03 --mode=eventdev --eventq-sched=ordered --rule_ipv4="rule_ipv4.cfg" --rule_ipv6="rule_ipv6.cfg"
200
201In this command:
202
203*   -a option allows the event device supported by platform.
204    The syntax used to indicate this device may vary based on platform.
205
206*   The --mode option defines PMD to be used for packet I/O.
207
208*   The --eventq-sched option enables synchronization menthod of event queue so that packets will be scheduled accordingly.
209
210If application uses S/W scheduler, it uses following DPDK services:
211
212*   Software scheduler
213*   Rx adapter service function
214*   Tx adapter service function
215
216Application needs service cores to run above mentioned services. Service cores
217must be provided as EAL parameters along with the --vdev=event_sw0 to enable S/W
218scheduler. Following is the sample command:
219
220.. code-block:: console
221
222    ./<build_dir>/examples/dpdk-l3fwd -l 0-7 -s 0xf0000 -n 4 --vdev event_sw0 -- -p 0x3 --mode=eventdev --eventq-sched=ordered --rule_ipv4="rule_ipv4.cfg" --rule_ipv6="rule_ipv6.cfg"
223
224In case of eventdev mode, *--config* option is not used for ethernet port
225configuration. Instead each ethernet port will be configured with mentioned
226setup:
227
228*   Single Rx/Tx queue
229
230*   Each Rx queue will be connected to event queue via Rx adapter.
231
232*   Each Tx queue will be connected via Tx adapter.
233
234Refer to the *DPDK Getting Started Guide* for general information on running applications and
235the Environment Abstraction Layer (EAL) options.
236
237.. _l3_fwd_explanation:
238
239Explanation
240-----------
241
242The following sections provide some explanation of the sample application code. As mentioned in the overview section,
243the initialization and run-time paths are very similar to those of the :doc:`l2_forward_real_virtual` and :doc:`l2_forward_event`.
244The following sections describe aspects that are specific to the L3 Forwarding sample application.
245
246Parse Rules from File
247~~~~~~~~~~~~~~~~~~~~~
248
249The application parses the rules from the file and adds them to the appropriate route table by calling the appropriate function.
250It ignores empty and comment lines, and parses and validates the rules it reads.
251If errors are detected, the application exits with messages to identify the errors encountered.
252
253The format of the route rules differs based on which lookup method is being used.
254Therefore, the code only decreases the priority number with each rule it parses.
255Route rules are mandatory.
256To read data from the specified file successfully, the application assumes the following:
257
258*   Each rule occupies a single line.
259
260*   Only the following four rule line types are valid in this application:
261
262*   Route rule line, which starts with a leading character 'R'
263
264*   Comment line, which starts with a leading character '#'
265
266*   ACL rule line, which starts with a leading character ‘@’
267
268*   Empty line, which consists of a space, form-feed ('\f'), newline ('\n'),
269    carriage return ('\r'), horizontal tab ('\t'), or vertical tab ('\v').
270
271Other lines types are considered invalid.
272
273*   Rules are organized in descending order of priority,
274    which means rules at the head of the file always have a higher priority than those further down in the file.
275
276*   A typical IPv4 LPM/FIB rule line should have a format as shown below:
277
278R<destination_ip>/<ip_mask_length><output_port_number>
279
280*   A typical IPv4 EM rule line should have a format as shown below:
281
282R<destination_ip><source_ip><destination_port><source_port><protocol><output_port_number>
283
284*   A typical IPv4 ACL rule line should have a format as shown below:
285
286.. _figure_ipv4_acl_rule:
287
288.. figure:: img/ipv4_acl_rule.*
289
290   A typical IPv4 ACL rule
291
292IPv4 addresses are specified in CIDR format as specified in RFC 4632.
293For LPM/FIB/ACL they consist of the dot notation for the address
294and a prefix length separated by '/'.
295For example, 192.168.0.34/32, where the address is 192.168.0.34 and the prefix length is 32.
296For EM they consist of just the dot notation for the address and no prefix length.
297For example, 192.168.0.34, where the Address is 192.168.0.34.
298EM also includes ports which are specified as a single number which represents a single port.
299
300The application parses the rules from the file,
301it ignores empty and comment lines,
302and parses and validates the rules it reads.
303If errors are detected, the application exits
304with messages to identify the errors encountered.
305The ACL rules save the index to the specific rules in the userdata field,
306while route rules save the forwarding port number.
307
308Hash Initialization
309~~~~~~~~~~~~~~~~~~~
310
311The hash object is created and loaded with the pre-configured entries read from a global array,
312and then generate the expected 5-tuple as key to keep consistence with those of real flow
313for the convenience to execute hash performance test on 4M/8M/16M flows.
314
315.. note::
316
317    The Hash initialization will setup both ipv4 and ipv6 hash table,
318    and populate the either table depending on the value of variable ipv6.
319
320.. note::
321
322    Value of global variable ipv6 can be specified with --ipv6 in the command line.
323    Value of global variable hash_entry_number,
324    which is used to specify the total hash entry number for all used ports in hash performance test,
325    can be specified with --hash-entry-num VALUE in command line, being its default value 4.
326
327.. code-block:: c
328
329    #if (APP_LOOKUP_METHOD == APP_LOOKUP_EXACT_MATCH)
330
331        static void
332        setup_hash(int socketid)
333        {
334            // ...
335
336            if (ipv6 == 0) {
337                /* populate the ipv4 hash */
338                populate_ipv4_flow_into_table(
339                    ipv4_l3fwd_em_lookup_struct[socketid]);
340            } else {
341                /* populate the ipv6 hash */
342                populate_ipv6_flow_into_table(
343                    ipv6_l3fwd_em_lookup_struct[socketid]);
344            }
345        }
346    #endif
347
348LPM Initialization
349~~~~~~~~~~~~~~~~~~
350
351The LPM object is created and loaded with the pre-configured entries read from a global array.
352
353.. literalinclude:: ../../../examples/l3fwd/l3fwd_em.c
354    :language: c
355    :start-after: Initialize exact match (hash) parameters. 8<
356    :end-before: >8 End of initialization of hash parameters.
357
358FIB Initialization
359~~~~~~~~~~~~~~~~~~
360
361The FIB object is created and loaded with the pre-configured entries
362read from a global array.
363The abridged code snippet below shows the FIB initialization for IPv4,
364the full setup function including the IPv6 setup can be seen in the app code.
365
366.. literalinclude:: ../../../examples/l3fwd/l3fwd_fib.c
367   :language: c
368   :start-after: Function to setup fib. 8<
369   :end-before: >8 End of setup fib.
370
371ACL Initialization
372~~~~~~~~~~~~~~~~~~
373
374For each supported ACL rule format (IPv4 5-tuple, IPv6 6-tuple),
375the application creates a separate context handler
376from the ACL library for each CPU socket on the board
377and adds parsed rules into that context.
378
379Note, that for each supported rule type,
380the application needs to calculate the expected offset of the fields
381from the start of the packet.
382That's why only packets with fixed IPv4/ IPv6 header are supported.
383That allows to perform ACL classify straight over incoming packet buffer -
384no extra protocol field retrieval need to be performed.
385
386Subsequently, the application checks whether NUMA is enabled.
387If it is, the application records the socket IDs of the CPU cores involved in the task.
388
389Finally, the application creates contexts handler from the ACL library,
390adds rules parsed from the file into the database and build an ACL trie.
391It is important to note that the application creates an independent copy
392of each database for each socket CPU involved in the task
393to reduce the time for remote memory access.
394
395.. literalinclude:: ../../../examples/l3fwd/l3fwd_acl.c
396   :language: c
397   :start-after: Setup ACL context. 8<
398   :end-before: >8 End of ACL context setup.
399
400Packet Forwarding for Hash-based Lookups
401~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
402
403For each input packet, the packet forwarding operation is done by the l3fwd_simple_forward()
404or simple_ipv4_fwd_4pkts() function for IPv4 packets or the simple_ipv6_fwd_4pkts() function for IPv6 packets.
405The l3fwd_simple_forward() function provides the basic functionality for both IPv4 and IPv6 packet forwarding
406for any number of burst packets received,
407and the packet forwarding decision (that is, the identification of the output interface for the packet)
408for hash-based lookups is done by the  get_ipv4_dst_port() or get_ipv6_dst_port() function.
409The get_ipv4_dst_port() function is shown below:
410
411.. literalinclude:: ../../../examples/l3fwd/l3fwd_em.c
412   :language: c
413   :start-after: Performing hash-based lookups. 8<
414   :end-before: >8 End of performing hash-based lookups.
415
416The get_ipv6_dst_port() function is similar to the get_ipv4_dst_port() function.
417
418The simple_ipv4_fwd_4pkts() and simple_ipv6_fwd_4pkts() function are optimized for continuous 4 valid ipv4 and ipv6 packets,
419they leverage the multiple buffer optimization to boost the performance of forwarding packets with the exact match on hash table.
420The key code snippet of simple_ipv4_fwd_4pkts() is shown below:
421
422.. code-block:: c
423
424    static inline void
425    simple_ipv4_fwd_4pkts(struct rte_mbuf* m[4], uint16_t portid, struct lcore_conf *qconf)
426    {
427        // ...
428
429        data[0] = _mm_loadu_si128(( m128i*)(rte_pktmbuf_mtod(m[0], unsigned char *) + sizeof(struct rte_ether_hdr) + offsetof(struct rte_ipv4_hdr, time_to_live)));
430        data[1] = _mm_loadu_si128(( m128i*)(rte_pktmbuf_mtod(m[1], unsigned char *) + sizeof(struct rte_ether_hdr) + offsetof(struct rte_ipv4_hdr, time_to_live)));
431        data[2] = _mm_loadu_si128(( m128i*)(rte_pktmbuf_mtod(m[2], unsigned char *) + sizeof(struct rte_ether_hdr) + offsetof(struct rte_ipv4_hdr, time_to_live)));
432        data[3] = _mm_loadu_si128(( m128i*)(rte_pktmbuf_mtod(m[3], unsigned char *) + sizeof(struct rte_ether_hdr) + offsetof(struct rte_ipv4_hdr, time_to_live)));
433
434        key[0].xmm = _mm_and_si128(data[0], mask0);
435        key[1].xmm = _mm_and_si128(data[1], mask0);
436        key[2].xmm = _mm_and_si128(data[2], mask0);
437        key[3].xmm = _mm_and_si128(data[3], mask0);
438
439        const void *key_array[4] = {&key[0], &key[1], &key[2],&key[3]};
440
441        rte_hash_lookup_bulk(qconf->ipv4_lookup_struct, &key_array[0], 4, ret);
442
443        dst_port[0] = (ret[0] < 0)? portid:ipv4_l3fwd_out_if[ret[0]];
444        dst_port[1] = (ret[1] < 0)? portid:ipv4_l3fwd_out_if[ret[1]];
445        dst_port[2] = (ret[2] < 0)? portid:ipv4_l3fwd_out_if[ret[2]];
446        dst_port[3] = (ret[3] < 0)? portid:ipv4_l3fwd_out_if[ret[3]];
447
448        // ...
449    }
450
451The simple_ipv6_fwd_4pkts() function is similar to the simple_ipv4_fwd_4pkts() function.
452
453Known issue: IP packets with extensions or IP packets which are not TCP/UDP cannot work well at this mode.
454
455Packet Forwarding for LPM-based Lookups
456~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
457
458For each input packet, the packet forwarding operation is done by the l3fwd_simple_forward() function,
459but the packet forwarding decision (that is, the identification of the output interface for the packet)
460for LPM-based lookups is done by the get_ipv4_dst_port() function below:
461
462.. literalinclude:: ../../../examples/l3fwd/l3fwd_lpm.c
463   :language: c
464   :start-after: Performing LPM-based lookups. 8<
465   :end-before: >8 End of performing LPM-based lookups.
466
467Packet Forwarding for FIB-based Lookups
468~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
469
470The FIB library was designed to process multiple packets at once,
471it does not have separate functions for single and bulk lookups.
472``rte_fib_lookup_bulk`` is used for IPv4 lookups
473and ``rte_fib6_lookup_bulk`` for IPv6.
474Various examples of these functions being used
475can be found in the sample app code.
476
477Eventdev Driver Initialization
478~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
479Eventdev driver initialization is same as L2 forwarding eventdev application.
480Refer :doc:`l2_forward_event` for more details.
481