On Mon, 11 Aug 2025 11:55:31 +0200
Morten Brørup <m...@smartsharesystems.com> wrote:

> > From: Stephen Hemminger [mailto:step...@networkplumber.org]
> > Sent: Thursday, 3 April 2025 01.23
> > 
> > Replace rte_mbuf_sanity_check() with rte_mbuf_verify()
> > to match the similar macro RTE_VERIFY() in rte_debug.h
> > 
> > The term sanity check is on the Tier 2 list of words
> > that should be replaced.
> > 
> > For this release keep old API functions but mark them
> > as deprecated.
> > 
> > Signed-off-by: Stephen Hemminger <step...@networkplumber.org>
> > Acked-by: Andrew Rybchenko <andrew.rybche...@oktetlabs.ru>
> > Acked-by: Morten Brørup <m...@smartsharesystems.com>
> > ---
> >  app/test/test_cryptodev.c            |  2 +-
> >  app/test/test_mbuf.c                 | 28 +++++-----
> >  doc/guides/prog_guide/mbuf_lib.rst   |  4 +-
> >  doc/guides/rel_notes/deprecation.rst |  3 ++
> >  lib/mbuf/rte_mbuf.c                  | 23 +++++---
> >  lib/mbuf/rte_mbuf.h                  | 79 +++++++++++++++-------------
> >  lib/mbuf/version.map                 |  1 +
> >  7 files changed, 79 insertions(+), 61 deletions(-)
> > 
> > diff --git a/app/test/test_cryptodev.c b/app/test/test_cryptodev.c
> > index 31a4905a97..d5f3843daf 100644
> > --- a/app/test/test_cryptodev.c
> > +++ b/app/test/test_cryptodev.c
> > @@ -264,7 +264,7 @@ create_mbuf_from_heap(int pkt_len, uint8_t pattern)
> >     m->port = RTE_MBUF_PORT_INVALID;
> >     m->buf_len = MBUF_SIZE - sizeof(struct rte_mbuf) - RTE_PKTMBUF_HEADROOM;
> >     rte_pktmbuf_reset_headroom(m);
> > -   __rte_mbuf_sanity_check(m, 1);
> > +   __rte_mbuf_verify(m, 1);
> > 
> >     m->buf_addr = (char *)m + sizeof(struct rte_mbuf) +
> > RTE_PKTMBUF_HEADROOM;
> > 
> > diff --git a/app/test/test_mbuf.c b/app/test/test_mbuf.c
> > index 17be977f31..3fbb5dea8b 100644
> > --- a/app/test/test_mbuf.c
> > +++ b/app/test/test_mbuf.c
> > @@ -262,8 +262,8 @@ test_one_pktmbuf(struct rte_mempool *pktmbuf_pool)
> >             GOTO_FAIL("Buffer should be continuous");
> >     memset(hdr, 0x55, MBUF_TEST_HDR2_LEN);
> > 
> > -   rte_mbuf_sanity_check(m, 1);
> > -   rte_mbuf_sanity_check(m, 0);
> > +   rte_mbuf_verify(m, 1);
> > +   rte_mbuf_verify(m, 0);
> >     rte_pktmbuf_dump(stdout, m, 0);
> > 
> >     /* this prepend should fail */
> > @@ -1162,7 +1162,7 @@ test_refcnt_mbuf(void)
> > 
> >  #ifdef RTE_EXEC_ENV_WINDOWS
> >  static int
> > -test_failing_mbuf_sanity_check(struct rte_mempool *pktmbuf_pool)
> > +test_failing_mbuf_verify(struct rte_mempool *pktmbuf_pool)
> >  {
> >     RTE_SET_USED(pktmbuf_pool);
> >     return TEST_SKIPPED;
> > @@ -1181,12 +1181,12 @@ mbuf_check_pass(struct rte_mbuf *buf)
> >  }
> > 
> >  static int
> > -test_failing_mbuf_sanity_check(struct rte_mempool *pktmbuf_pool)
> > +test_failing_mbuf_verify(struct rte_mempool *pktmbuf_pool)
> >  {
> >     struct rte_mbuf *buf;
> >     struct rte_mbuf badbuf;
> > 
> > -   printf("Checking rte_mbuf_sanity_check for failure conditions\n");
> > +   printf("Checking rte_mbuf_verify for failure conditions\n");
> > 
> >     /* get a good mbuf to use to make copies */
> >     buf = rte_pktmbuf_alloc(pktmbuf_pool);
> > @@ -1708,7 +1708,7 @@ test_mbuf_validate_tx_offload(const char *test_name,
> >             GOTO_FAIL("%s: mbuf allocation failed!\n", __func__);
> >     if (rte_pktmbuf_pkt_len(m) != 0)
> >             GOTO_FAIL("%s: Bad packet length\n", __func__);
> > -   rte_mbuf_sanity_check(m, 0);
> > +   rte_mbuf_verify(m, 0);
> >     m->ol_flags = ol_flags;
> >     m->tso_segsz = segsize;
> >     ret = rte_validate_tx_offload(m);
> > @@ -1915,7 +1915,7 @@ test_pktmbuf_read(struct rte_mempool *pktmbuf_pool)
> >             GOTO_FAIL("%s: mbuf allocation failed!\n", __func__);
> >     if (rte_pktmbuf_pkt_len(m) != 0)
> >             GOTO_FAIL("%s: Bad packet length\n", __func__);
> > -   rte_mbuf_sanity_check(m, 0);
> > +   rte_mbuf_verify(m, 0);
> > 
> >     data = rte_pktmbuf_append(m, MBUF_TEST_DATA_LEN2);
> >     if (data == NULL)
> > @@ -1964,7 +1964,7 @@ test_pktmbuf_read_from_offset(struct rte_mempool
> > *pktmbuf_pool)
> > 
> >     if (rte_pktmbuf_pkt_len(m) != 0)
> >             GOTO_FAIL("%s: Bad packet length\n", __func__);
> > -   rte_mbuf_sanity_check(m, 0);
> > +   rte_mbuf_verify(m, 0);
> > 
> >     /* prepend an ethernet header */
> >     hdr = (struct ether_hdr *)rte_pktmbuf_prepend(m, hdr_len);
> > @@ -2109,7 +2109,7 @@ create_packet(struct rte_mempool *pktmbuf_pool,
> >                     GOTO_FAIL("%s: mbuf allocation failed!\n", __func__);
> >             if (rte_pktmbuf_pkt_len(pkt_seg) != 0)
> >                     GOTO_FAIL("%s: Bad packet length\n", __func__);
> > -           rte_mbuf_sanity_check(pkt_seg, 0);
> > +           rte_mbuf_verify(pkt_seg, 0);
> >             /* Add header only for the first segment */
> >             if (test_data->flags == MBUF_HEADER && seg == 0) {
> >                     hdr_len = sizeof(struct rte_ether_hdr);
> > @@ -2321,7 +2321,7 @@ test_pktmbuf_ext_shinfo_init_helper(struct rte_mempool
> > *pktmbuf_pool)
> >             GOTO_FAIL("%s: mbuf allocation failed!\n", __func__);
> >     if (rte_pktmbuf_pkt_len(m) != 0)
> >             GOTO_FAIL("%s: Bad packet length\n", __func__);
> > -   rte_mbuf_sanity_check(m, 0);
> > +   rte_mbuf_verify(m, 0);
> > 
> >     ext_buf_addr = rte_malloc("External buffer", buf_len,
> >                     RTE_CACHE_LINE_SIZE);
> > @@ -2482,8 +2482,8 @@ test_pktmbuf_ext_pinned_buffer(struct rte_mempool
> > *std_pool)
> >             GOTO_FAIL("%s: test_pktmbuf_copy(pinned) failed\n",
> >                       __func__);
> > 
> > -   if (test_failing_mbuf_sanity_check(pinned_pool) < 0)
> > -           GOTO_FAIL("%s: test_failing_mbuf_sanity_check(pinned)"
> > +   if (test_failing_mbuf_verify(pinned_pool) < 0)
> > +           GOTO_FAIL("%s: test_failing_mbuf_verify(pinned)"
> >                       " failed\n", __func__);
> > 
> >     if (test_mbuf_linearize_check(pinned_pool) < 0)
> > @@ -2857,8 +2857,8 @@ test_mbuf(void)
> >             goto err;
> >     }
> > 
> > -   if (test_failing_mbuf_sanity_check(pktmbuf_pool) < 0) {
> > -           printf("test_failing_mbuf_sanity_check() failed\n");
> > +   if (test_failing_mbuf_verify(pktmbuf_pool) < 0) {
> > +           printf("test_failing_mbuf_verify() failed\n");
> >             goto err;
> >     }
> > 
> > diff --git a/doc/guides/prog_guide/mbuf_lib.rst
> > b/doc/guides/prog_guide/mbuf_lib.rst
> > index 4ad2a21f3f..6c96931f8c 100644
> > --- a/doc/guides/prog_guide/mbuf_lib.rst
> > +++ b/doc/guides/prog_guide/mbuf_lib.rst
> > @@ -266,8 +266,8 @@ can be found in several of the sample applications, for
> > example, the IPv4 Multic
> >  Debug
> >  -----
> > 
> > -In debug mode, the functions of the mbuf library perform sanity checks 
> > before
> > any operation (such as, buffer corruption,
> > -bad type, and so on).
> > +In debug mode, the functions of the mbuf library perform consistency checks
> > +before any operation (such as, buffer corruption, bad type, and so on).
> > 
> >  Use Cases
> >  ---------
> > diff --git a/doc/guides/rel_notes/deprecation.rst
> > b/doc/guides/rel_notes/deprecation.rst
> > index 36489f6e68..10bb08a634 100644
> > --- a/doc/guides/rel_notes/deprecation.rst
> > +++ b/doc/guides/rel_notes/deprecation.rst
> > @@ -142,3 +142,6 @@ Deprecation Notices
> >  * bus/vmbus: Starting DPDK 25.11, all the vmbus API defined in
> >    ``drivers/bus/vmbus/rte_bus_vmbus.h`` will become internal to DPDK.
> >    Those API functions are used internally by DPDK core and netvsc PMD.
> > +
> > +* mbuf: The function ``rte_mbuf_sanity_check`` is deprecated.
> > +  Use the new function ``rte_mbuf_verify`` instead.
> > diff --git a/lib/mbuf/rte_mbuf.c b/lib/mbuf/rte_mbuf.c
> > index 559d5ad8a7..fc5d4ba29d 100644
> > --- a/lib/mbuf/rte_mbuf.c
> > +++ b/lib/mbuf/rte_mbuf.c
> > @@ -367,9 +367,9 @@ rte_pktmbuf_pool_create_extbuf(const char *name, 
> > unsigned
> > int n,
> >     return mp;
> >  }
> > 
> > -/* do some sanity checks on a mbuf: panic if it fails */
> > +/* do some checks on a mbuf: panic if it fails */
> >  void
> > -rte_mbuf_sanity_check(const struct rte_mbuf *m, int is_header)
> > +rte_mbuf_verify(const struct rte_mbuf *m, int is_header)
> >  {
> >     const char *reason;
> > 
> > @@ -377,6 +377,13 @@ rte_mbuf_sanity_check(const struct rte_mbuf *m, int
> > is_header)
> >             rte_panic("%s\n", reason);
> >  }
> > 
> > +/* For ABI compatibility, to be removed in next release */
> > +void
> > +rte_mbuf_sanity_check(const struct rte_mbuf *m, int is_header)
> > +{
> > +   rte_mbuf_verify(m, is_header);
> > +}
> > +
> >  int rte_mbuf_check(const struct rte_mbuf *m, int is_header,
> >                const char **reason)
> >  {
> > @@ -496,7 +503,7 @@ void rte_pktmbuf_free_bulk(struct rte_mbuf **mbufs,
> > unsigned int count)
> >             if (unlikely(m == NULL))
> >                     continue;
> > 
> > -           __rte_mbuf_sanity_check(m, 1);
> > +           __rte_mbuf_verify(m, 1);
> > 
> >             do {
> >                     m_next = m->next;
> > @@ -546,7 +553,7 @@ rte_pktmbuf_clone(struct rte_mbuf *md, struct 
> > rte_mempool
> > *mp)
> >             return NULL;
> >     }
> > 
> > -   __rte_mbuf_sanity_check(mc, 1);
> > +   __rte_mbuf_verify(mc, 1);
> >     return mc;
> >  }
> > 
> > @@ -596,7 +603,7 @@ rte_pktmbuf_copy(const struct rte_mbuf *m, struct
> > rte_mempool *mp,
> >     struct rte_mbuf *mc, *m_last, **prev;
> > 
> >     /* garbage in check */
> > -   __rte_mbuf_sanity_check(m, 1);
> > +   __rte_mbuf_verify(m, 1);
> > 
> >     /* check for request to copy at offset past end of mbuf */
> >     if (unlikely(off >= m->pkt_len))
> > @@ -660,7 +667,7 @@ rte_pktmbuf_copy(const struct rte_mbuf *m, struct
> > rte_mempool *mp,
> >     }
> > 
> >     /* garbage out check */
> > -   __rte_mbuf_sanity_check(mc, 1);
> > +   __rte_mbuf_verify(mc, 1);
> >     return mc;
> >  }
> > 
> > @@ -671,7 +678,7 @@ rte_pktmbuf_dump(FILE *f, const struct rte_mbuf *m,
> > unsigned dump_len)
> >     unsigned int len;
> >     unsigned int nb_segs;
> > 
> > -   __rte_mbuf_sanity_check(m, 1);
> > +   __rte_mbuf_verify(m, 1);
> > 
> >     fprintf(f, "dump mbuf at %p, iova=%#" PRIx64 ", buf_len=%u\n", m,
> > rte_mbuf_iova_get(m),
> >             m->buf_len);
> > @@ -689,7 +696,7 @@ rte_pktmbuf_dump(FILE *f, const struct rte_mbuf *m,
> > unsigned dump_len)
> >     nb_segs = m->nb_segs;
> > 
> >     while (m && nb_segs != 0) {
> > -           __rte_mbuf_sanity_check(m, 0);
> > +           __rte_mbuf_verify(m, 0);
> > 
> >             fprintf(f, "  segment at %p, data=%p, len=%u, off=%u,
> > refcnt=%u\n",
> >                     m, rte_pktmbuf_mtod(m, void *),
> > diff --git a/lib/mbuf/rte_mbuf.h b/lib/mbuf/rte_mbuf.h
> > index 06ab7502a5..53a837e4d5 100644
> > --- a/lib/mbuf/rte_mbuf.h
> > +++ b/lib/mbuf/rte_mbuf.h
> > @@ -339,16 +339,20 @@ rte_pktmbuf_priv_flags(struct rte_mempool *mp)
> > 
> >  #ifdef RTE_LIBRTE_MBUF_DEBUG
> > 
> > -/**  check mbuf type in debug mode */
> > -#define __rte_mbuf_sanity_check(m, is_h) rte_mbuf_sanity_check(m, is_h)
> > +/**  do mbuf type in debug mode */
> > +#define __rte_mbuf_verify(m, is_h) rte_mbuf_verify(m, is_h)
> > 
> >  #else /*  RTE_LIBRTE_MBUF_DEBUG */
> > 
> > -/**  check mbuf type in debug mode */
> > -#define __rte_mbuf_sanity_check(m, is_h) do { } while (0)
> > +/**  ignore mbuf checks if not in debug mode */
> > +#define __rte_mbuf_verify(m, is_h) do { } while (0)
> > 
> >  #endif /*  RTE_LIBRTE_MBUF_DEBUG */
> > 
> > +/* deprecated version of the macro */
> > +#define __rte_mbuf_sanity_check(m, is_h)
> > RTE_DEPRECATED(__rte_mbuf_sanity_check) \
> > +           __rte_mbuf_verify(m, is_h)
> > +
> >  #ifdef RTE_MBUF_REFCNT_ATOMIC
> > 
> >  /**
> > @@ -514,10 +518,9 @@ rte_mbuf_ext_refcnt_update(struct
> > rte_mbuf_ext_shared_info *shinfo,
> > 
> > 
> >  /**
> > - * Sanity checks on an mbuf.
> > + * Check that the mbuf is valid and panic if corrupted.
> >   *
> > - * Check the consistency of the given mbuf. The function will cause a
> > - * panic if corruption is detected.
> > + * Acts assertion that mbuf is consistent. If not it calls rte_panic().
> >   *
> >   * @param m
> >   *   The mbuf to be checked.
> > @@ -526,13 +529,17 @@ rte_mbuf_ext_refcnt_update(struct
> > rte_mbuf_ext_shared_info *shinfo,
> >   *   of a packet (in this case, some fields like nb_segs are not checked)
> >   */
> >  void
> > +rte_mbuf_verify(const struct rte_mbuf *m, int is_header);
> > +
> > +__rte_deprecated
> > +void
> >  rte_mbuf_sanity_check(const struct rte_mbuf *m, int is_header);
> > 
> >  /**
> > - * Sanity checks on a mbuf.
> > + * Do consistency checks on a mbuf.
> >   *
> > - * Almost like rte_mbuf_sanity_check(), but this function gives the reason
> > - * if corruption is detected rather than panic.
> > + * Check the consistency of the given mbuf and if not valid
> > + * return the reason.
> >   *
> >   * @param m
> >   *   The mbuf to be checked.
> > @@ -551,7 +558,7 @@ int rte_mbuf_check(const struct rte_mbuf *m, int
> > is_header,
> >                const char **reason);
> > 
> >  /**
> > - * Sanity checks on a reinitialized mbuf in debug mode.
> > + * Do checks on a reinitialized mbuf in debug mode.
> >   *
> >   * Check the consistency of the given reinitialized mbuf.
> >   * The function will cause a panic if corruption is detected.
> > @@ -563,7 +570,7 @@ int rte_mbuf_check(const struct rte_mbuf *m, int
> > is_header,
> >   *   The mbuf to be checked.
> >   */
> >  static __rte_always_inline void
> > -__rte_mbuf_raw_sanity_check(__rte_unused const struct rte_mbuf *m)
> > +__rte_mbuf_raw_verify(__rte_unused const struct rte_mbuf *m)
> >  {
> >     RTE_ASSERT(rte_mbuf_refcnt_read(m) == 1);
> >     RTE_ASSERT(m->next == NULL);
> > @@ -572,11 +579,11 @@ __rte_mbuf_raw_sanity_check(__rte_unused const struct
> > rte_mbuf *m)
> >     RTE_ASSERT(!RTE_MBUF_HAS_EXTBUF(m) ||
> >                     (RTE_MBUF_HAS_PINNED_EXTBUF(m) &&
> >                     rte_mbuf_ext_refcnt_read(m->shinfo) == 1));
> > -   __rte_mbuf_sanity_check(m, 0);
> > +   __rte_mbuf_verify(m, 0);
> >  }
> > 
> >  /** For backwards compatibility. */
> > -#define MBUF_RAW_ALLOC_CHECK(m) __rte_mbuf_raw_sanity_check(m)
> > +#define MBUF_RAW_ALLOC_CHECK(m) __rte_mbuf_raw_verify(m)
> > 
> >  /**
> >   * Allocate an uninitialized mbuf from mempool *mp*.
> > @@ -606,7 +613,7 @@ static inline struct rte_mbuf *rte_mbuf_raw_alloc(struct
> > rte_mempool *mp)
> > 
> >     if (rte_mempool_get(mp, &ret.ptr) < 0)
> >             return NULL;
> > -   __rte_mbuf_raw_sanity_check(ret.m);
> > +   __rte_mbuf_raw_verify(ret.m);
> >     return ret.m;
> >  }
> > 
> > @@ -644,7 +651,7 @@ rte_mbuf_raw_alloc_bulk(struct rte_mempool *mp, struct
> > rte_mbuf **mbufs, unsigne
> >     int rc = rte_mempool_get_bulk(mp, (void **)mbufs, count);
> >     if (likely(rc == 0))
> >             for (unsigned int idx = 0; idx < count; idx++)
> > -                   __rte_mbuf_raw_sanity_check(mbufs[idx]);
> > +                   __rte_mbuf_raw_verify(mbufs[idx]);
> >     return rc;
> >  }
> > 
> > @@ -665,7 +672,7 @@ rte_mbuf_raw_alloc_bulk(struct rte_mempool *mp, struct
> > rte_mbuf **mbufs, unsigne
> >  static __rte_always_inline void
> >  rte_mbuf_raw_free(struct rte_mbuf *m)
> >  {
> > -   __rte_mbuf_raw_sanity_check(m);
> > +   __rte_mbuf_raw_verify(m);
> >     rte_mempool_put(m->pool, m);
> >  }
> > 
> > @@ -700,7 +707,7 @@ rte_mbuf_raw_free_bulk(struct rte_mempool *mp, struct
> > rte_mbuf **mbufs, unsigned
> >             const struct rte_mbuf *m = mbufs[idx];
> >             RTE_ASSERT(m != NULL);
> >             RTE_ASSERT(m->pool == mp);
> > -           __rte_mbuf_raw_sanity_check(m);
> > +           __rte_mbuf_raw_verify(m);
> >     }
> > 
> >     rte_mempool_put_bulk(mp, (void **)mbufs, count);
> > @@ -965,7 +972,7 @@ static inline void rte_pktmbuf_reset(struct rte_mbuf *m)
> >     rte_pktmbuf_reset_headroom(m);
> > 
> >     m->data_len = 0;
> > -   __rte_mbuf_sanity_check(m, 1);
> > +   __rte_mbuf_verify(m, 1);
> >  }
> > 
> >  /**
> > @@ -1021,22 +1028,22 @@ static inline int rte_pktmbuf_alloc_bulk(struct
> > rte_mempool *pool,
> >     switch (count % 4) {
> >     case 0:
> >             while (idx != count) {
> > -                   __rte_mbuf_raw_sanity_check(mbufs[idx]);
> > +                   __rte_mbuf_raw_verify(mbufs[idx]);
> >                     rte_pktmbuf_reset(mbufs[idx]);
> >                     idx++;
> >                     /* fall-through */
> >     case 3:
> > -                   __rte_mbuf_raw_sanity_check(mbufs[idx]);
> > +                   __rte_mbuf_raw_verify(mbufs[idx]);
> >                     rte_pktmbuf_reset(mbufs[idx]);
> >                     idx++;
> >                     /* fall-through */
> >     case 2:
> > -                   __rte_mbuf_raw_sanity_check(mbufs[idx]);
> > +                   __rte_mbuf_raw_verify(mbufs[idx]);
> >                     rte_pktmbuf_reset(mbufs[idx]);
> >                     idx++;
> >                     /* fall-through */
> >     case 1:
> > -                   __rte_mbuf_raw_sanity_check(mbufs[idx]);
> > +                   __rte_mbuf_raw_verify(mbufs[idx]);
> >                     rte_pktmbuf_reset(mbufs[idx]);
> >                     idx++;
> >                     /* fall-through */
> > @@ -1267,8 +1274,8 @@ static inline void rte_pktmbuf_attach(struct rte_mbuf
> > *mi, struct rte_mbuf *m)
> >     mi->pkt_len = mi->data_len;
> >     mi->nb_segs = 1;
> > 
> > -   __rte_mbuf_sanity_check(mi, 1);
> > -   __rte_mbuf_sanity_check(m, 0);
> > +   __rte_mbuf_verify(mi, 1);
> > +   __rte_mbuf_verify(m, 0);
> >  }
> > 
> >  /**
> > @@ -1423,7 +1430,7 @@ static inline int
> > __rte_pktmbuf_pinned_extbuf_decref(struct rte_mbuf *m)
> >  static __rte_always_inline struct rte_mbuf *
> >  rte_pktmbuf_prefree_seg(struct rte_mbuf *m)
> >  {
> > -   __rte_mbuf_sanity_check(m, 0);
> > +   __rte_mbuf_verify(m, 0);
> > 
> >     if (likely(rte_mbuf_refcnt_read(m) == 1)) {
> > 
> > @@ -1494,7 +1501,7 @@ static inline void rte_pktmbuf_free(struct rte_mbuf 
> > *m)
> >     struct rte_mbuf *m_next;
> > 
> >     if (m != NULL)
> > -           __rte_mbuf_sanity_check(m, 1);
> > +           __rte_mbuf_verify(m, 1);
> > 
> >     while (m != NULL) {
> >             m_next = m->next;
> > @@ -1575,7 +1582,7 @@ rte_pktmbuf_copy(const struct rte_mbuf *m, struct
> > rte_mempool *mp,
> >   */
> >  static inline void rte_pktmbuf_refcnt_update(struct rte_mbuf *m, int16_t v)
> >  {
> > -   __rte_mbuf_sanity_check(m, 1);
> > +   __rte_mbuf_verify(m, 1);
> > 
> >     do {
> >             rte_mbuf_refcnt_update(m, v);
> > @@ -1592,7 +1599,7 @@ static inline void rte_pktmbuf_refcnt_update(struct
> > rte_mbuf *m, int16_t v)
> >   */
> >  static inline uint16_t rte_pktmbuf_headroom(const struct rte_mbuf *m)
> >  {
> > -   __rte_mbuf_sanity_check(m, 0);
> > +   __rte_mbuf_verify(m, 0);
> >     return m->data_off;
> >  }
> > 
> > @@ -1606,7 +1613,7 @@ static inline uint16_t rte_pktmbuf_headroom(const 
> > struct
> > rte_mbuf *m)
> >   */
> >  static inline uint16_t rte_pktmbuf_tailroom(const struct rte_mbuf *m)
> >  {
> > -   __rte_mbuf_sanity_check(m, 0);
> > +   __rte_mbuf_verify(m, 0);
> >     return (uint16_t)(m->buf_len - rte_pktmbuf_headroom(m) -
> >                       m->data_len);
> >  }
> > @@ -1621,7 +1628,7 @@ static inline uint16_t rte_pktmbuf_tailroom(const 
> > struct
> > rte_mbuf *m)
> >   */
> >  static inline struct rte_mbuf *rte_pktmbuf_lastseg(struct rte_mbuf *m)
> >  {
> > -   __rte_mbuf_sanity_check(m, 1);
> > +   __rte_mbuf_verify(m, 1);
> >     while (m->next != NULL)
> >             m = m->next;
> >     return m;
> > @@ -1665,7 +1672,7 @@ static inline struct rte_mbuf
> > *rte_pktmbuf_lastseg(struct rte_mbuf *m)
> >  static inline char *rte_pktmbuf_prepend(struct rte_mbuf *m,
> >                                     uint16_t len)
> >  {
> > -   __rte_mbuf_sanity_check(m, 1);
> > +   __rte_mbuf_verify(m, 1);
> > 
> >     if (unlikely(len > rte_pktmbuf_headroom(m)))
> >             return NULL;
> > @@ -1700,7 +1707,7 @@ static inline char *rte_pktmbuf_append(struct rte_mbuf
> > *m, uint16_t len)
> >     void *tail;
> >     struct rte_mbuf *m_last;
> > 
> > -   __rte_mbuf_sanity_check(m, 1);
> > +   __rte_mbuf_verify(m, 1);
> > 
> >     m_last = rte_pktmbuf_lastseg(m);
> >     if (unlikely(len > rte_pktmbuf_tailroom(m_last)))
> > @@ -1728,7 +1735,7 @@ static inline char *rte_pktmbuf_append(struct rte_mbuf
> > *m, uint16_t len)
> >   */
> >  static inline char *rte_pktmbuf_adj(struct rte_mbuf *m, uint16_t len)
> >  {
> > -   __rte_mbuf_sanity_check(m, 1);
> > +   __rte_mbuf_verify(m, 1);
> > 
> >     if (unlikely(len > m->data_len))
> >             return NULL;
> > @@ -1760,7 +1767,7 @@ static inline int rte_pktmbuf_trim(struct rte_mbuf *m,
> > uint16_t len)
> >  {
> >     struct rte_mbuf *m_last;
> > 
> > -   __rte_mbuf_sanity_check(m, 1);
> > +   __rte_mbuf_verify(m, 1);
> > 
> >     m_last = rte_pktmbuf_lastseg(m);
> >     if (unlikely(len > m_last->data_len))
> > @@ -1782,7 +1789,7 @@ static inline int rte_pktmbuf_trim(struct rte_mbuf *m,
> > uint16_t len)
> >   */
> >  static inline int rte_pktmbuf_is_contiguous(const struct rte_mbuf *m)
> >  {
> > -   __rte_mbuf_sanity_check(m, 1);
> > +   __rte_mbuf_verify(m, 1);
> >     return m->nb_segs == 1;
> >  }
> > 
> > diff --git a/lib/mbuf/version.map b/lib/mbuf/version.map
> > index 76f1832924..2950f24caa 100644
> > --- a/lib/mbuf/version.map
> > +++ b/lib/mbuf/version.map
> > @@ -31,6 +31,7 @@ DPDK_25 {
> >     rte_mbuf_set_platform_mempool_ops;
> >     rte_mbuf_set_user_mempool_ops;
> >     rte_mbuf_user_mempool_ops;
> > +   rte_mbuf_verify;
> >     rte_pktmbuf_clone;
> >     rte_pktmbuf_copy;
> >     rte_pktmbuf_dump;
> > --
> > 2.47.2  
> 
> Stephen,
> 
> I have submitted another patch [1], where __rte_mbuf_raw_sanity_check()'s 
> successor takes one more parameter, so I had to give it a new name 
> __rte_mbuf_raw_sanity_check_mp() for API compatibility. And then I added:
> +/** For backwards compatibility. */
> +#define __rte_mbuf_raw_sanity_check(m) __rte_mbuf_raw_sanity_check_mp(m, 
> NULL)
> 
> If you proceed with your patch, __rte_mbuf_raw_sanity_check() will be renamed 
> to __rte_mbuf_raw_verify(), and __rte_mbuf_raw_sanity_check() disappears.
> Would it make sense to change your patch, so __rte_mbuf_raw_verify() replaces 
> __rte_mbuf_raw_sanity_check_mp() instead of __rte_mbuf_raw_sanity_check()? If 
> your patch changes the API anyway, adding an extra parameter to the function 
> should be acceptable.
> 
> [1]: 
> https://patchwork.dpdk.org/project/dpdk/patch/20250722093431.555214-1...@smartsharesystems.com/

Sure will go back and rebase old patches in a few weeks.

Reply via email to