[dpdk-dev] [PATCH v3 00/18] ACL: New AVX2 classify method and several other enhancements.

Fu, JingguoX jingguox.fu at intel.com
Fri Jan 30 04:12:19 CET 2015


Tested-by: Jingguo Fu <jingguox.fu at intel.com>

- Tested Commit: 17f520d2cff8d69962824f28810f36e949a7184d
- OS: Ubuntu14.04 3.13.0-24-generic
- GCC: gcc version 4.8.2
- CPU: Intel(R) Xeon(R) CPU E5-2680 v2 @ 2.80GHz
- NIC: Intel Corporation 82599ES 10-Gigabit SFI/SFP+ [8086:10fb] (rev 01)
- Default x86_64-native-linuxapp-gcc configuration
- Total 5 cases, 5 passed, 0 failed


- Case: l3fwdACL_ACL_rule
  Description:
        l3fwd Access Control match ACL rule test
  Command / instruction:
        Add ACL rules:
            echo '' > /root/rule_ipv4.db
            echo 'R0.0.0.0/0 0.0.0.0/0 0 : 65535 0 : 65535 0x00/0x00 1' >> /root/rule_ipv4.db
            echo '' > /root/rule_ipv6.db
            echo 'R0:0:0:0:0:0:0:0/0 0:0:0:0:0:0:0:0/0 0 : 65535 0 : 65535 0x00/0x00 1' >> /root/rule_ipv6.db
            echo '' > /root/rule_ipv4.db
            echo @200.10.0.1/32 0.0.0.0/0 0 : 65535 0 : 65535 0x00/0x00  >> /root/rule_ipv4.db
            echo R0.0.0.0/0 0.0.0.0/0 0 : 65535 0 : 65535 0x00/0x00 1 >> /root/rule_ipv4.db
        Start l3fwd-ACL with rule_ipv4 and rule_ipv6 config
            # ./examples/l3fwd-ACL/build/l3fwd-ACL -c 0x3c1e03c1e -n 4 -- -p 0x3 --config="(0,0,2),(1,0,3)" --rule_ipv4="/root/rule_ipv4.db" --rule_ipv6="/root/rule_ipv6.db"
        Send packets by Scapy according to ACL rule
  Expected result:
        Application can filter packets by ACL rules
  Test Result: PASSED

- Case: l3fwdACL_exact_route
  Description:
        l3fwd Access Control match Exact route rule test
  Command / instruction:
        Add ACL rules:
            echo '' > /root/rule_ipv4.db
            echo 'R0.0.0.0/0 0.0.0.0/0 0 : 65535 0 : 65535 0x00/0x00 1' >> /root/rule_ipv4.db
            echo '' > /root/rule_ipv6.db
            echo 'R0:0:0:0:0:0:0:0/0 0:0:0:0:0:0:0:0/0 0 : 65535 0 : 65535 0x00/0x00 1' >> /root/rule_ipv6.db
            echo '' > /root/rule_ipv4.db
            echo R200.10.0.1/32 100.10.0.1/32 11 : 11 101 : 101 0x06/0xff 0 >> /root/rule_ipv4.db
            echo R200.20.0.1/32 100.20.0.1/32 12 : 12 102 : 102 0x06/0xff 1 >> /root/rule_ipv4.db
        Start l3fwd-ACL with rule_ipv4 and rule_ipv6 config
            # ./examples/l3fwd-ACL/build/l3fwd-ACL -c 0x3c1e03c1e -n 4 -- -p 0x3 --config="(0,0,2),(1,0,3)" --rule_ipv4="/root/rule_ipv4.db" --rule_ipv6="/root/rule_ipv6.db"
        Send packets by Scapy according to route rule
  Expected result:
        ACL rule can filter packets
  Test Result: PASSED
  
- Case: l3fwdACL_invalid
  Description:
        l3fwd Access Control handle Invalid rule test
  Command / instruction:
        Add ACL rules:
            echo '' > /root/rule_ipv4.db
            echo 'R0.0.0.0/0 0.0.0.0/0 0 : 65535 0 : 65535 0x00/0x00 1' >> /root/rule_ipv4.db
            echo '' > /root/rule_ipv6.db
            echo 'R0:0:0:0:0:0:0:0/0 0:0:0:0:0:0:0:0/0 0 : 65535 0 : 65535 0x00/0x00 1' >> /root/rule_ipv6.db
            echo '' > /root/rule_ipv4.db
            echo R0.0.0.0/0 0.0.0.0/0 12 : 11 0 : 65535 0x00/0x00 0 >> /root/rule_ipv4.db
            echo R0.0.0.0/0 0.0.0.0/0 0 : 65535 0 : 65535 0x00/0x00 1 >> /root/rule_ipv4.db
        Start l3fwd-ACL with rule_ipv4 and rule_ipv6 config
            # ./examples/l3fwd-ACL/build/l3fwd-ACL -c 0x3c1e03c1e -n 4 -- -p 0x3 --config="(0,0,2),(1,0,3)" --rule_ipv4="/root/rule_ipv4.db" --rule_ipv6="/root/rule_ipv6.db"
        Send packets by Scapy according to invalid rule
  Expected result:
        ACL rule can filter packets
  Test Result: PASSED

- Case: l3fwdACL_lpm_route
  Description:
        l3fwd Access Control match Lpm route rule test
  Command / instruction:
        Add ACL rules:
            echo '' > /root/rule_ipv4.db
            echo 'R0.0.0.0/0 0.0.0.0/0 0 : 65535 0 : 65535 0x00/0x00 1' >> /root/rule_ipv4.db
            echo '' > /root/rule_ipv6.db
            echo 'R0:0:0:0:0:0:0:0/0 0:0:0:0:0:0:0:0/0 0 : 65535 0 : 65535 0x00/0x00 1' >> /root/rule_ipv6.db
            echo '' > /root/rule_ipv4.db
            echo R0.0.0.0/0 1.1.1.0/24 0 : 65535 0 : 65535 0x00/0x00 0 >> /root/rule_ipv4.db
            echo R0.0.0.0/0 2.1.1.0/24 0 : 65535 0 : 65535 0x00/0x00 1 >> /root/rule_ipv4.db
        Start l3fwd-ACL with rule_ipv4 and rule_ipv6 config
            # ./examples/l3fwd-ACL/build/l3fwd-ACL -c 0x3c1e03c1e -n 4 -- -p 0x3 --config="(0,0,2),(1,0,3)" --rule_ipv4="/root/rule_ipv4.db" --rule_ipv6="/root/rule_ipv6.db"
        Send packets by Scapy according to lpm route rule
  Expected result:
        ACL rule can filter packets
  Test Result: PASSED

- Case: l3fwdACL_scalar
  Description:
        l3fwd Access Control match with Scalar function test
  Command / instruction:
        Add ACL rules:
            echo '' > /root/rule_ipv4.db
            echo 'R0.0.0.0/0 0.0.0.0/0 0 : 65535 0 : 65535 0x00/0x00 1' >> /root/rule_ipv4.db
            echo '' > /root/rule_ipv6.db
            echo 'R0:0:0:0:0:0:0:0/0 0:0:0:0:0:0:0:0/0 0 : 65535 0 : 65535 0x00/0x00 1' >> /root/rule_ipv6.db
            echo '' > /root/rule_ipv4.db
            echo @200.10.0.1/32 100.10.0.1/32 11 : 11 101 : 101 0x06/0xff  >> /root/rule_ipv4.db
            echo R0.0.0.0/0 0.0.0.0/0 0 : 65535 0 : 65535 0x00/0x00 1 >> /root/rule_ipv4.db
        Start l3fwd-ACL with rule_ipv4 and rule_ipv6 config
            # ./examples/l3fwd-ACL/build/l3fwd-ACL -c 0x3c1e03c1e -n 4 -- -p 0x3 --config="(0,0,2),(1,0,3)" --rule_ipv4="/root/rule_ipv4.db" --rule_ipv6="/root/rule_ipv6.db"
        Send packets by Scapy according to ACL rule
  Expected result:
        ACL rule can filter packets
  Test Result: PASSED


-----Original Message-----
From: dev [mailto:dev-bounces at dpdk.org] On Behalf Of Konstantin Ananyev
Sent: Wednesday, January 21, 2015 02:41
To: dev at dpdk.org
Subject: [dpdk-dev] [PATCH v3 00/18] ACL: New AVX2 classify method and several other enhancements.

v3 changes:
Applied review comments from Thomas:
- fix spelling errors reported by codespell.
- split last patch into two:
    first to remove unused macros,
    second to add some comments about ACL internal layout.

v2 changes:
- When build with the compilers that don't support AVX2 instructions,
make rte_ACL_classify_avx2() do nothing and return an error.
- Remove unneeded 'ifdef __AVX2__' in ACL_run_avx2.*.
- Reorder order of patches in the set, to keep RTE_LIBRTE_ACL_STANDALONE=y
always buildable.

This patch series contain several fixes and enhancements for ACL library.
See complete list below.
Two main changes that are externally visible:
- Introduce new classify method:  RTE_ACL_CLASSIFY_AVX2.
It uses AVX2 instructions and 256 bit wide data types
to perform internal trie traversal.
That helps to increase classify() throughput.
This method is selected as default one on CPUs that supports AVX2.
- Introduce new field in the build config structure: max_size.
It specifies maximum size that internal RT structure for given context
can reach.
The purpose of that is to allow user to decide about space/performance trade-off
(faster classify() vs less space for RT internal structures)
for each given set of rules.

Konstantin Ananyev (18):
  fix fix compilation issues with RTE_LIBRTE_ACL_STANDALONE=y
  app/test: few small fixes fot test_ACL.c
  librte_ACL: make data_indexes long enough to survive idle transitions.
  librte_ACL: remove build phase heuristsic with negative performance
    effect.
  librte_ACL: fix a bug at build phase that can cause matches beeing
    overwirtten.
  librte_ACL: introduce DFA nodes compression (group64) for identical
    entries.
  librte_ACL: build/gen phase - simplify the way match nodes are
    allocated.
  librte_ACL: make scalar RT code to be more similar to vector one.
  librte_ACL: a bit of RT code deduplication.
  EAL: introduce rte_ymm and relatives in rte_common_vect.h.
  librte_ACL: add AVX2 as new rte_ACL_classify() method
  test-ACL: add ability to manually select RT method.
  librte_ACL: Remove search_sse_2 and relatives.
  libter_ACL: move lo/hi dwords shuffle out from calc_addr
  libte_ACL: make calc_addr a define to deduplicate the code.
  libte_ACL: introduce max_size into rte_ACL_config.
  libte_ACL: remove unused macros.
  libte_ACL: add some comments about ACL internal layout.

 app/test-ACL/main.c                             | 126 +++--
 app/test/test_ACL.c                             |   8 +-
 examples/l3fwd-ACL/main.c                       |   3 +-
 examples/l3fwd/main.c                           |   2 +-
 lib/librte_ACL/Makefile                         |  18 +
 lib/librte_ACL/ACL.h                            |  58 ++-
 lib/librte_ACL/ACL_bld.c                        | 392 +++++++---------
 lib/librte_ACL/ACL_gen.c                        | 268 +++++++----
 lib/librte_ACL/ACL_run.h                        |   7 +-
 lib/librte_ACL/ACL_run_avx2.c                   |  54 +++
 lib/librte_ACL/ACL_run_avx2.h                   | 284 ++++++++++++
 lib/librte_ACL/ACL_run_scalar.c                 |  65 ++-
 lib/librte_ACL/ACL_run_sse.c                    | 585 +-----------------------
 lib/librte_ACL/ACL_run_sse.h                    | 357 +++++++++++++++
 lib/librte_ACL/ACL_vect.h                       | 132 +++---
 lib/librte_ACL/rte_ACL.c                        |  47 +-
 lib/librte_ACL/rte_ACL.h                        |   4 +
 lib/librte_ACL/rte_ACL_osdep_alone.h            |  47 +-
 lib/librte_eal/common/include/rte_common_vect.h |  39 +-
 lib/librte_lpm/rte_lpm.h                        |   2 +-
 20 files changed, 1444 insertions(+), 1054 deletions(-)
 create mode 100644 lib/librte_ACL/ACL_run_avx2.c
 create mode 100644 lib/librte_ACL/ACL_run_avx2.h
 create mode 100644 lib/librte_ACL/ACL_run_sse.h

-- 
1.8.5.3



More information about the dev mailing list