2 Copyright(c) 2010-2014 Intel Corporation. All rights reserved.
5 Redistribution and use in source and binary forms, with or without
6 modification, are permitted provided that the following conditions
9 * Redistributions of source code must retain the above copyright
10 notice, this list of conditions and the following disclaimer.
11 * Redistributions in binary form must reproduce the above copyright
12 notice, this list of conditions and the following disclaimer in
13 the documentation and/or other materials provided with the
15 * Neither the name of Intel Corporation nor the names of its
16 contributors may be used to endorse or promote products derived
17 from this software without specific prior written permission.
19 THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
20 "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
21 LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
22 A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
23 OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
24 SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
25 LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
26 DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
27 THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
28 (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
29 OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
52 link_bonding_poll_mode_drv_lib
59 ip_fragment_reassembly_lib
62 thread_safety_intel_dpdk_functions
65 packet_classif_access_ctrl
68 port_hotplug_framework
71 dev_kit_root_make_help
76 writing_efficient_code
83 :numref:`figure_architecture-overview` :ref:`figure_architecture-overview`
85 :numref:`figure_linuxapp_launch` :ref:`figure_linuxapp_launch`
87 :numref:`figure_malloc_heap` :ref:`figure_malloc_heap`
89 :numref:`figure_ring1` :ref:`figure_ring1`
91 :numref:`figure_ring-enqueue1` :ref:`figure_ring-enqueue1`
93 :numref:`figure_ring-enqueue2` :ref:`figure_ring-enqueue2`
95 :numref:`figure_ring-enqueue3` :ref:`figure_ring-enqueue3`
97 :numref:`figure_ring-dequeue1` :ref:`figure_ring-dequeue1`
99 :numref:`figure_ring-dequeue2` :ref:`figure_ring-dequeue2`
101 :numref:`figure_ring-dequeue3` :ref:`figure_ring-dequeue3`
103 :numref:`figure_ring-mp-enqueue1` :ref:`figure_ring-mp-enqueue1`
105 :numref:`figure_ring-mp-enqueue2` :ref:`figure_ring-mp-enqueue2`
107 :numref:`figure_ring-mp-enqueue3` :ref:`figure_ring-mp-enqueue3`
109 :numref:`figure_ring-mp-enqueue4` :ref:`figure_ring-mp-enqueue4`
111 :numref:`figure_ring-mp-enqueue5` :ref:`figure_ring-mp-enqueue5`
113 :numref:`figure_ring-modulo1` :ref:`figure_ring-modulo1`
115 :numref:`figure_ring-modulo2` :ref:`figure_ring-modulo2`
117 :numref:`figure_memory-management` :ref:`figure_memory-management`
119 :numref:`figure_memory-management2` :ref:`figure_memory-management2`
121 :numref:`figure_mempool` :ref:`figure_mempool`
123 :numref:`figure_mbuf1` :ref:`figure_mbuf1`
125 :numref:`figure_mbuf2` :ref:`figure_mbuf2`
127 :numref:`figure_multi_process_memory` :ref:`figure_multi_process_memory`
129 :numref:`figure_kernel_nic_intf` :ref:`figure_kernel_nic_intf`
131 :numref:`figure_pkt_flow_kni` :ref:`figure_pkt_flow_kni`
133 :numref:`figure_vhost_net_arch2` :ref:`figure_vhost_net_arch2`
135 :numref:`figure_kni_traffic_flow` :ref:`figure_kni_traffic_flow`
138 :numref:`figure_pkt_proc_pipeline_qos` :ref:`figure_pkt_proc_pipeline_qos`
140 :numref:`figure_hier_sched_blk` :ref:`figure_hier_sched_blk`
142 :numref:`figure_sched_hier_per_port` :ref:`figure_sched_hier_per_port`
144 :numref:`figure_data_struct_per_port` :ref:`figure_data_struct_per_port`
146 :numref:`figure_prefetch_pipeline` :ref:`figure_prefetch_pipeline`
148 :numref:`figure_pipe_prefetch_sm` :ref:`figure_pipe_prefetch_sm`
150 :numref:`figure_blk_diag_dropper` :ref:`figure_blk_diag_dropper`
152 :numref:`figure_flow_tru_droppper` :ref:`figure_flow_tru_droppper`
154 :numref:`figure_ex_data_flow_tru_dropper` :ref:`figure_ex_data_flow_tru_dropper`
156 :numref:`figure_pkt_drop_probability` :ref:`figure_pkt_drop_probability`
158 :numref:`figure_drop_probability_graph` :ref:`figure_drop_probability_graph`
160 :numref:`figure_figure32` :ref:`figure_figure32`
162 :numref:`figure_figure33` :ref:`figure_figure33`
164 :numref:`figure_figure34` :ref:`figure_figure34`
166 :numref:`figure_figure35` :ref:`figure_figure35`
168 :numref:`figure_figure37` :ref:`figure_figure37`
170 :numref:`figure_figure38` :ref:`figure_figure38`
172 :numref:`figure_figure39` :ref:`figure_figure39`
177 :ref:`Table 1. Packet Processing Pipeline Implementing QoS <pg_table_1>`
179 :ref:`Table 2. Infrastructure Blocks Used by the Packet Processing Pipeline <pg_table_2>`
181 :ref:`Table 3. Port Scheduling Hierarchy <pg_table_3>`
183 :ref:`Table 4. Scheduler Internal Data Structures per Port <pg_table_4>`
185 :ref:`Table 5. Ethernet Frame Overhead Fields <pg_table_5>`
187 :ref:`Table 6. Token Bucket Generic Operations <pg_table_6>`
189 :ref:`Table 7. Token Bucket Generic Parameters <pg_table_7>`
191 :ref:`Table 8. Token Bucket Persistent Data Structure <pg_table_8>`
193 :ref:`Table 9. Token Bucket Operations <pg_table_9>`
195 :ref:`Table 10. Subport/Pipe Traffic Class Upper Limit Enforcement Persistent Data Structure <pg_table_10>`
197 :ref:`Table 11. Subport/Pipe Traffic Class Upper Limit Enforcement Operations <pg_table_11>`
199 :ref:`Table 12. Weighted Round Robin (WRR) <pg_table_12>`
201 :ref:`Table 13. Subport Traffic Class Oversubscription <pg_table_13>`
203 :ref:`Table 14. Watermark Propagation from Subport Level to Member Pipes at the Beginning of Each Traffic Class Upper Limit Enforcement Period <pg_table_14>`
205 :ref:`Table 15. Watermark Calculation <pg_table_15>`
207 :ref:`Table 16. RED Configuration Parameters <pg_table_16>`
209 :ref:`Table 17. Relative Performance of Alternative Approaches <pg_table_17>`
211 :ref:`Table 18. RED Configuration Corresponding to RED Configuration File <pg_table_18>`
213 :ref:`Table 19. Port types <pg_table_19>`
215 :ref:`Table 20. Port abstract interface <pg_table_20>`
217 :ref:`Table 21. Table types <pg_table_21>`
219 :ref:`Table 29. Table Abstract Interface <pg_table_29_1>`
221 :ref:`Table 22. Configuration parameters common for all hash table types <pg_table_22>`
223 :ref:`Table 23. Configuration parameters specific to extendable bucket hash table <pg_table_23>`
225 :ref:`Table 24. Configuration parameters specific to pre-computed key signature hash table <pg_table_24>`
227 :ref:`Table 25. The main large data structures (arrays) used for configurable key size hash tables <pg_table_25>`
229 :ref:`Table 26. Field description for bucket array entry (configurable key size hash tables) <pg_table_26>`
231 :ref:`Table 27. Description of the bucket search pipeline stages (configurable key size hash tables) <pg_table_27>`
233 :ref:`Table 28. Lookup tables for match, match_many, match_pos <pg_table_28>`
235 :ref:`Table 29. Collapsed lookup tables for match, match_many and match_pos <pg_table_29>`
237 :ref:`Table 30. The main large data structures (arrays) used for 8-byte and 16-byte key size hash tables <pg_table_30>`
239 :ref:`Table 31. Field description for bucket array entry (8-byte and 16-byte key hash tables) <pg_table_31>`
241 :ref:`Table 32. Description of the bucket search pipeline stages (8-byte and 16-byte key hash tables) <pg_table_32>`
243 :ref:`Table 33. Next hop actions (reserved) <pg_table_33>`
245 :ref:`Table 34. User action examples <pg_table_34>`