| /dpdk/doc/guides/nics/ |
| H A D | fail_safe.rst | 11 from its bus suddenly. 26 meant to be removed itself, unlike its sub-devices which should support it. 27 If a sub-device supports hotplugging, the fail-safe PMD will enable its use 61 options provided to the EAL instead of its own parameters. 73 The first line of its output is read by the fail-safe PMD and otherwise 93 and all of its sub-devices. 95 address of the first of its sub-device to be successfully probed and use it as 96 its default MAC address, trying to set it to all of its other sub-devices. 188 to emit anything, returning ``0`` from its TX function. Any unsent packet must 191 Upon the probing of its missing sub-device, the current stored configuration [all …]
|
| H A D | vdev_netvsc.rst | 19 NetVSC interface proper and its SR-IOV VF (referred to as "physical" from 80 Same as ``iface`` except a suitable NetVSC interface is located using its
|
| /dpdk/doc/guides/prog_guide/ |
| H A D | traffic_management.rst | 122 Each hierarchy leaf node with WRED enabled as its congestion management mode 171 Each non-leaf node has multiple inputs (its children nodes) and single output 172 (which is input to its parent node). It arbitrates its inputs using Strict 174 packets to its output while observing its shaping (rate limiting) constraints. 180 weights of all its sibling nodes that have the same priority, with 1 as the 198 conducted, usually limited in scope to the current node, its parent node and 199 its sibling nodes. At this time, since the hierarchy is not fully defined,
|
| H A D | mempool_lib.rst | 82 In this way, each core has full access to its own cache (with locks) of free objects and 87 the speed at which a core can access its own cache for a specific memory pool without locks provide… 89 The cache is composed of a small, per-core table of pointers and its length (used as a stack). 100 A mempool in Memory with its Associated Ring
|
| H A D | link_bonding_poll_mode_drv_lib.rst | 26 bonded device and its slave devices. 156 RSS-capable, so all slaves are synchronized with its configuration. This mode is 160 Bonding device stores its own version of RSS settings i.e. RETA, RSS hash 161 function and RSS key, used to set up its slaves. That let to define the meaning 167 supported by all bonded slaves. RETA size is a GCD of all its RETA's sizes, so 268 The other configurable parameters for a bonded device are its slave devices, 269 its primary slave, a user defined MAC address and transmission policy to use if 280 The bonded also guarantees to return the MAC address of the slave device to its 358 The link status of a bonded device is dictated by that of its slaves, if all
|
| H A D | event_ethernet_tx_adapter.rst | 15 PMD support or in its absence, a common implementation. 19 from its event port and transmits the mbufs referenced by these events. 80 adapter and retrieve its service identifier using the
|
| H A D | stack_lib.rst | 21 * Lookup a pointer to a stack by its name. 80 but its pointed-to data is different than what thread A read.
|
| H A D | thread_safety_dpdk_functions.rst | 31 …to locking would be to create multiple instances of these tables allowing each thread its own copy. 40 The ring library is based on a lockless ring-buffer algorithm that maintains its original design fo…
|
| H A D | telemetry_lib.rst | 80 The callback function provided by the library must format its telemetry 166 For details on its use, see the :doc:`../howto/telemetry`.
|
| H A D | hash_lib.rst | 44 * Add / lookup / delete entry with key and precomputed hash: Both the key and its precomputed has… 128 * The second table is an array of all the keys stored in the hash table and its data associated to … 150 If signature was stored there, we compare its key against the one provided and return the position 160 If there is no space in the primary bucket, one of the entries on that bucket is pushed to its alte… 161 and the key to be added is inserted in its position. 176 Similar to lookup, the key is searched in its primary and secondary buckets. If the key is found, t…
|
| H A D | lpm6_lib.rst | 30 which corresponds to its main use of storing the ID of the next hop in a routing table entry. 127 * If the entry is invalid (i.e. it doesn't already contain a rule) then set its next hop to its v… 202 due to its impact in memory consumption and the number or rules that can be added to the LPM table.
|
| H A D | rcu_lib.rst | 41 the application to determine its quiescent state. 135 to report its quiescent state. This can be called from a reader thread. 138 reporting its quiescent state. 180 ``rte_rcu_qsbr_thread_unregister()`` APIs to remove itself from reporting its
|
| /dpdk/doc/guides/eventdevs/ |
| H A D | dlb2.rst | 63 event is dequeued, its sched_type will be ``RTE_SCHED_TYPE_ORDERED``. Else if 121 and overrides its scheduling type. Note that the originally selected scheduling 176 defined by its low watermark, high watermark, and refill quanta. These three 214 In this model, an event is "in the system" from its first enqueue into eventdev 218 A port will fail to enqueue if the number of events in the system exceeds its 225 application using the DLB ought to retry its enqueues if they fail. 234 credit. If the worker thread retries its enqueue indefinitely, it will not 266 The Eventdev API allows one to reconfigure a device, its ports, and its queues 284 of its ports or queues are not, the PMD will apply their previous 294 before its ports or queues can be. [all …]
|
| /dpdk/doc/guides/cryptodevs/ |
| H A D | scheduler.rst | 21 mode defines certain actions for scheduling crypto ops to its workers. 106 among its workers in a round-robin manner. This mode may help to fill 117 distributed to the primary worker if its data length is equal to or bigger 124 its own, by making use of the available CPU cycles to deal with smaller 162 Each worker uses its own cryptodev. Only software cryptodevs
|
| /dpdk/doc/guides/vdpadevs/ |
| H A D | ifc.rst | 11 report/restore, this driver enables its vDPA functionality. 18 with its specific subsystem vendor ID and device ID. To let the device be 25 VMs, so each VF needs to have its own DMA address translation service. During
|
| /dpdk/doc/guides/sample_app_ug/ |
| H A D | l2_forward_cat.rst | 110 * cpus 1 and 3 share its 4 ways with cpus 4, 5 and 6; 112 * cpus 4, 5 and 6 share half (4 out of 8 ways) of its L3 with cpus 1 and 3; 116 * cpu 7 has exclusive access to all of its 4 ways; 152 For more info about ``pqos`` tool please see its man page or
|
| H A D | link_status_intr.rst | 25 This application can be used to demonstrate the usage of link status interrupt and its user space c… 138 which is different from the main thread of its caller. 257 To ensure that no packets remain in the tables, each lcore does a draining of the TX queue in its m… 263 :start-after: Draining TX queue in its main loop. 8< 264 :end-before: >8 End of draining TX queue in its main loop.
|
| /dpdk/doc/guides/rawdevs/ |
| H A D | ifpga.rst | 11 FPGA uses Partial Reconfigure (PR) Parts of Bit Stream to achieve its 42 All AFU device driver bind to AFU device by its UUID (Universally Unique
|
| /dpdk/doc/guides/windows_gsg/ |
| H A D | build_dpdk.rst | 10 Building the DPDK and its applications requires one of the following 54 Install to a folder without spaces in its name, like ``C:\MinGW``.
|
| /dpdk/doc/guides/platform/ |
| H A D | mlx5.rst | 55 To select a specific PMD, its name should be specified as a device parameter 349 it has its own dedicated queues. 350 An SF shares PCI-level resources with other SFs and/or with its parent PCI function. 563 Each device class PMD has its own list of specific arguments, 590 its memory is already registered for DMA in the PMD and no registration 661 achieved from the original PD by getting its ``ibv_pd->handle`` member value. 663 and its value must be a valid kernel handle for a PD object
|
| /dpdk/kernel/freebsd/ |
| H A D | meson.build | 7 # with Linux. We have a skeleton BSDmakefile, which pulls many of its
|
| /dpdk/license/ |
| H A D | lgpl-2.1.txt | 18 free software--to make sure the software is free for all its users. 77 entire combination fits its criteria of freedom. The Lesser General 101 operating system, as well as its variant, the GNU/Linux operating 143 covered by this License; they are outside its scope. The act of 145 such a program is covered only if its contents constitute a work based 181 its purpose remains meaningful. 193 themselves, then this License, and its terms, do not apply to those 279 Library is used in it and that the Library and its use are covered by 359 distribute the Library or its derivative works. These actions are 363 all its terms and conditions for copying, distributing or modifying
|
| H A D | bsd-3-clause.txt | 7 3. Neither the name of the copyright holder nor the names of its contributors may be used to endors…
|
| H A D | gpl-2.0.txt | 14 software--to make sure the software is free for all its users. This 46 want its recipients to know that what they have is not the original, so 73 covered by this License; they are outside its scope. The act of 75 is covered only if its contents constitute a work based on the 117 themselves, then this License, and its terms, do not apply to those 182 distribute the Program or its derivative works. These actions are 186 all its terms and conditions for copying, distributing or modifying
|
| /dpdk/doc/guides/mempool/ |
| H A D | stack.rst | 13 than a ring-based mempool, since its LIFO behavior results in better temporal
|