X-Git-Url: http://git.droids-corp.org/?a=blobdiff_plain;f=lib%2Fmbuf%2Frte_mbuf.h;h=dedf83c38d1bcba34c7c79b5feb4da0769cc063f;hb=6d72dce7ed683fe0f9d8670edddb381eb20184b0;hp=756a0462a214ec1e040d500593c4b023e1011284;hpb=8d2a436d6952274fdfafd5eea627d7705cf36e60;p=dpdk.git diff --git a/lib/mbuf/rte_mbuf.h b/lib/mbuf/rte_mbuf.h index 756a0462a2..dedf83c38d 100644 --- a/lib/mbuf/rte_mbuf.h +++ b/lib/mbuf/rte_mbuf.h @@ -77,7 +77,7 @@ int rte_get_rx_ol_flag_list(uint64_t mask, char *buf, size_t buflen); * @param mask * The mask describing the flag. Usually only one bit must be set. * Several bits can be given if they belong to the same mask. - * Ex: PKT_TX_L4_MASK. + * Ex: RTE_MBUF_F_TX_L4_MASK. * @return * The name of this flag, or NULL if it's not a valid TX flag. */ @@ -512,7 +512,6 @@ rte_mbuf_sanity_check(const struct rte_mbuf *m, int is_header); * - -1 if a problem is detected, reason then points to a string describing * the reason why the mbuf is deemed invalid. */ -__rte_experimental int rte_mbuf_check(const struct rte_mbuf *m, int is_header, const char **reason); @@ -850,7 +849,7 @@ static inline void rte_pktmbuf_reset(struct rte_mbuf *m) m->nb_segs = 1; m->port = RTE_MBUF_PORT_INVALID; - m->ol_flags &= EXT_ATTACHED_MBUF; + m->ol_flags &= RTE_MBUF_F_EXTERNAL; m->packet_type = 0; rte_pktmbuf_reset_headroom(m); @@ -1065,7 +1064,7 @@ rte_pktmbuf_attach_extbuf(struct rte_mbuf *m, void *buf_addr, m->data_len = 0; m->data_off = 0; - m->ol_flags |= EXT_ATTACHED_MBUF; + m->ol_flags |= RTE_MBUF_F_EXTERNAL; m->shinfo = shinfo; } @@ -1139,7 +1138,7 @@ static inline void rte_pktmbuf_attach(struct rte_mbuf *mi, struct rte_mbuf *m) /* if m is not direct, get the mbuf that embeds the data */ rte_mbuf_refcnt_update(rte_mbuf_from_indirect(m), 1); mi->priv_size = m->priv_size; - mi->ol_flags = m->ol_flags | IND_ATTACHED_MBUF; + mi->ol_flags = m->ol_flags | RTE_MBUF_F_INDIRECT; } __rte_pktmbuf_copy_hdr(mi, m); @@ -1273,7 +1272,7 @@ static inline int __rte_pktmbuf_pinned_extbuf_decref(struct rte_mbuf *m) struct rte_mbuf_ext_shared_info *shinfo; /* Clear flags, mbuf is being freed. */ - m->ol_flags = EXT_ATTACHED_MBUF; + m->ol_flags = RTE_MBUF_F_EXTERNAL; shinfo = m->shinfo; /* Optimize for performance - do not dec/reinit */ @@ -1322,10 +1321,10 @@ rte_pktmbuf_prefree_seg(struct rte_mbuf *m) return NULL; } - if (m->next != NULL) { + if (m->next != NULL) m->next = NULL; + if (m->nb_segs != 1) m->nb_segs = 1; - } return m; @@ -1339,10 +1338,10 @@ rte_pktmbuf_prefree_seg(struct rte_mbuf *m) return NULL; } - if (m->next != NULL) { + if (m->next != NULL) m->next = NULL; + if (m->nb_segs != 1) m->nb_segs = 1; - } rte_mbuf_refcnt_set(m, 1); return m; @@ -1402,7 +1401,6 @@ static inline void rte_pktmbuf_free(struct rte_mbuf *m) * @param count * Array size. */ -__rte_experimental void rte_pktmbuf_free_bulk(struct rte_mbuf **mbufs, unsigned int count); /** @@ -1432,7 +1430,7 @@ rte_pktmbuf_clone(struct rte_mbuf *md, struct rte_mempool *mp); * set of mbufs. The private data are is not copied. * * @param m - * The packet mbuf to be copiedd. + * The packet mbuf to be copied. * @param mp * The mempool from which the "clone" mbufs are allocated. * @param offset @@ -1446,7 +1444,6 @@ rte_pktmbuf_clone(struct rte_mbuf *md, struct rte_mempool *mp); * - The pointer to the new "clone" mbuf on success. * - NULL if allocation fails. */ -__rte_experimental struct rte_mbuf * rte_pktmbuf_copy(const struct rte_mbuf *m, struct rte_mempool *mp, uint32_t offset, uint32_t length); @@ -1751,10 +1748,7 @@ static inline int rte_pktmbuf_chain(struct rte_mbuf *head, struct rte_mbuf *tail return 0; } -/* - * @warning - * @b EXPERIMENTAL: This API may change without prior notice. - * +/** * For given input values generate raw tx_offload value. * Note that it is caller responsibility to make sure that input parameters * don't exceed maximum bit-field values. @@ -1804,28 +1798,28 @@ rte_validate_tx_offload(const struct rte_mbuf *m) uint64_t ol_flags = m->ol_flags; /* Does packet set any of available offloads? */ - if (!(ol_flags & PKT_TX_OFFLOAD_MASK)) + if (!(ol_flags & RTE_MBUF_F_TX_OFFLOAD_MASK)) return 0; /* IP checksum can be counted only for IPv4 packet */ - if ((ol_flags & PKT_TX_IP_CKSUM) && (ol_flags & PKT_TX_IPV6)) + if ((ol_flags & RTE_MBUF_F_TX_IP_CKSUM) && (ol_flags & RTE_MBUF_F_TX_IPV6)) return -EINVAL; /* IP type not set when required */ - if (ol_flags & (PKT_TX_L4_MASK | PKT_TX_TCP_SEG)) - if (!(ol_flags & (PKT_TX_IPV4 | PKT_TX_IPV6))) + if (ol_flags & (RTE_MBUF_F_TX_L4_MASK | RTE_MBUF_F_TX_TCP_SEG)) + if (!(ol_flags & (RTE_MBUF_F_TX_IPV4 | RTE_MBUF_F_TX_IPV6))) return -EINVAL; /* Check requirements for TSO packet */ - if (ol_flags & PKT_TX_TCP_SEG) + if (ol_flags & RTE_MBUF_F_TX_TCP_SEG) if ((m->tso_segsz == 0) || - ((ol_flags & PKT_TX_IPV4) && - !(ol_flags & PKT_TX_IP_CKSUM))) + ((ol_flags & RTE_MBUF_F_TX_IPV4) && + !(ol_flags & RTE_MBUF_F_TX_IP_CKSUM))) return -EINVAL; - /* PKT_TX_OUTER_IP_CKSUM set for non outer IPv4 packet. */ - if ((ol_flags & PKT_TX_OUTER_IP_CKSUM) && - !(ol_flags & PKT_TX_OUTER_IPV4)) + /* RTE_MBUF_F_TX_OUTER_IP_CKSUM set for non outer IPv4 packet. */ + if ((ol_flags & RTE_MBUF_F_TX_OUTER_IP_CKSUM) && + !(ol_flags & RTE_MBUF_F_TX_OUTER_IPV4)) return -EINVAL; return 0;