Home
last modified time | relevance | path

Searched refs:its (Results 1 – 25 of 143) sorted by relevance

123456

/dpdk/doc/guides/nics/
H A Dfail_safe.rst11 from its bus suddenly.
26 meant to be removed itself, unlike its sub-devices which should support it.
27 If a sub-device supports hotplugging, the fail-safe PMD will enable its use
61 options provided to the EAL instead of its own parameters.
73 The first line of its output is read by the fail-safe PMD and otherwise
93 and all of its sub-devices.
95 address of the first of its sub-device to be successfully probed and use it as
96 its default MAC address, trying to set it to all of its other sub-devices.
188 to emit anything, returning ``0`` from its TX function. Any unsent packet must
191 Upon the probing of its missing sub-device, the current stored configuration
[all …]
H A Dvdev_netvsc.rst19 NetVSC interface proper and its SR-IOV VF (referred to as "physical" from
80 Same as ``iface`` except a suitable NetVSC interface is located using its
/dpdk/doc/guides/prog_guide/
H A Dtraffic_management.rst122 Each hierarchy leaf node with WRED enabled as its congestion management mode
171 Each non-leaf node has multiple inputs (its children nodes) and single output
172 (which is input to its parent node). It arbitrates its inputs using Strict
174 packets to its output while observing its shaping (rate limiting) constraints.
180 weights of all its sibling nodes that have the same priority, with 1 as the
198 conducted, usually limited in scope to the current node, its parent node and
199 its sibling nodes. At this time, since the hierarchy is not fully defined,
H A Dmempool_lib.rst82 In this way, each core has full access to its own cache (with locks) of free objects and
87 the speed at which a core can access its own cache for a specific memory pool without locks provide…
89 The cache is composed of a small, per-core table of pointers and its length (used as a stack).
100 A mempool in Memory with its Associated Ring
H A Dlink_bonding_poll_mode_drv_lib.rst26 bonded device and its slave devices.
156 RSS-capable, so all slaves are synchronized with its configuration. This mode is
160 Bonding device stores its own version of RSS settings i.e. RETA, RSS hash
161 function and RSS key, used to set up its slaves. That let to define the meaning
167 supported by all bonded slaves. RETA size is a GCD of all its RETA's sizes, so
268 The other configurable parameters for a bonded device are its slave devices,
269 its primary slave, a user defined MAC address and transmission policy to use if
280 The bonded also guarantees to return the MAC address of the slave device to its
358 The link status of a bonded device is dictated by that of its slaves, if all
H A Devent_ethernet_tx_adapter.rst15 PMD support or in its absence, a common implementation.
19 from its event port and transmits the mbufs referenced by these events.
80 adapter and retrieve its service identifier using the
H A Dstack_lib.rst21 * Lookup a pointer to a stack by its name.
80 but its pointed-to data is different than what thread A read.
H A Dthread_safety_dpdk_functions.rst31 …to locking would be to create multiple instances of these tables allowing each thread its own copy.
40 The ring library is based on a lockless ring-buffer algorithm that maintains its original design fo…
H A Dtelemetry_lib.rst80 The callback function provided by the library must format its telemetry
166 For details on its use, see the :doc:`../howto/telemetry`.
H A Dhash_lib.rst44 * Add / lookup / delete entry with key and precomputed hash: Both the key and its precomputed has…
128 * The second table is an array of all the keys stored in the hash table and its data associated to …
150 If signature was stored there, we compare its key against the one provided and return the position
160 If there is no space in the primary bucket, one of the entries on that bucket is pushed to its alte…
161 and the key to be added is inserted in its position.
176 Similar to lookup, the key is searched in its primary and secondary buckets. If the key is found, t…
H A Dlpm6_lib.rst30 which corresponds to its main use of storing the ID of the next hop in a routing table entry.
127 * If the entry is invalid (i.e. it doesn't already contain a rule) then set its next hop to its v…
202 due to its impact in memory consumption and the number or rules that can be added to the LPM table.
H A Drcu_lib.rst41 the application to determine its quiescent state.
135 to report its quiescent state. This can be called from a reader thread.
138 reporting its quiescent state.
180 ``rte_rcu_qsbr_thread_unregister()`` APIs to remove itself from reporting its
/dpdk/doc/guides/eventdevs/
H A Ddlb2.rst63 event is dequeued, its sched_type will be ``RTE_SCHED_TYPE_ORDERED``. Else if
121 and overrides its scheduling type. Note that the originally selected scheduling
176 defined by its low watermark, high watermark, and refill quanta. These three
214 In this model, an event is "in the system" from its first enqueue into eventdev
218 A port will fail to enqueue if the number of events in the system exceeds its
225 application using the DLB ought to retry its enqueues if they fail.
234 credit. If the worker thread retries its enqueue indefinitely, it will not
266 The Eventdev API allows one to reconfigure a device, its ports, and its queues
284 of its ports or queues are not, the PMD will apply their previous
294 before its ports or queues can be.
[all …]
/dpdk/doc/guides/cryptodevs/
H A Dscheduler.rst21 mode defines certain actions for scheduling crypto ops to its workers.
106 among its workers in a round-robin manner. This mode may help to fill
117 distributed to the primary worker if its data length is equal to or bigger
124 its own, by making use of the available CPU cycles to deal with smaller
162 Each worker uses its own cryptodev. Only software cryptodevs
/dpdk/doc/guides/vdpadevs/
H A Difc.rst11 report/restore, this driver enables its vDPA functionality.
18 with its specific subsystem vendor ID and device ID. To let the device be
25 VMs, so each VF needs to have its own DMA address translation service. During
/dpdk/doc/guides/sample_app_ug/
H A Dl2_forward_cat.rst110 * cpus 1 and 3 share its 4 ways with cpus 4, 5 and 6;
112 * cpus 4, 5 and 6 share half (4 out of 8 ways) of its L3 with cpus 1 and 3;
116 * cpu 7 has exclusive access to all of its 4 ways;
152 For more info about ``pqos`` tool please see its man page or
H A Dlink_status_intr.rst25 This application can be used to demonstrate the usage of link status interrupt and its user space c…
138 which is different from the main thread of its caller.
257 To ensure that no packets remain in the tables, each lcore does a draining of the TX queue in its m…
263 :start-after: Draining TX queue in its main loop. 8<
264 :end-before: >8 End of draining TX queue in its main loop.
/dpdk/doc/guides/rawdevs/
H A Difpga.rst11 FPGA uses Partial Reconfigure (PR) Parts of Bit Stream to achieve its
42 All AFU device driver bind to AFU device by its UUID (Universally Unique
/dpdk/doc/guides/windows_gsg/
H A Dbuild_dpdk.rst10 Building the DPDK and its applications requires one of the following
54 Install to a folder without spaces in its name, like ``C:\MinGW``.
/dpdk/doc/guides/platform/
H A Dmlx5.rst55 To select a specific PMD, its name should be specified as a device parameter
349 it has its own dedicated queues.
350 An SF shares PCI-level resources with other SFs and/or with its parent PCI function.
563 Each device class PMD has its own list of specific arguments,
590 its memory is already registered for DMA in the PMD and no registration
661 achieved from the original PD by getting its ``ibv_pd->handle`` member value.
663 and its value must be a valid kernel handle for a PD object
/dpdk/kernel/freebsd/
H A Dmeson.build7 # with Linux. We have a skeleton BSDmakefile, which pulls many of its
/dpdk/license/
H A Dlgpl-2.1.txt18 free software--to make sure the software is free for all its users.
77 entire combination fits its criteria of freedom. The Lesser General
101 operating system, as well as its variant, the GNU/Linux operating
143 covered by this License; they are outside its scope. The act of
145 such a program is covered only if its contents constitute a work based
181 its purpose remains meaningful.
193 themselves, then this License, and its terms, do not apply to those
279 Library is used in it and that the Library and its use are covered by
359 distribute the Library or its derivative works. These actions are
363 all its terms and conditions for copying, distributing or modifying
H A Dbsd-3-clause.txt7 3. Neither the name of the copyright holder nor the names of its contributors may be used to endors…
H A Dgpl-2.0.txt14 software--to make sure the software is free for all its users. This
46 want its recipients to know that what they have is not the original, so
73 covered by this License; they are outside its scope. The act of
75 is covered only if its contents constitute a work based on the
117 themselves, then this License, and its terms, do not apply to those
182 distribute the Program or its derivative works. These actions are
186 all its terms and conditions for copying, distributing or modifying
/dpdk/doc/guides/mempool/
H A Dstack.rst13 than a ring-based mempool, since its LIFO behavior results in better temporal

123456