@@ -2089,12 +2089,12 @@ conn_key_extract(struct conntrack *ct, struct dp_packet *pkt, ovs_be16 dl_type,
ctx->key.dl_type = dl_type;
if (ctx->key.dl_type == htons(ETH_TYPE_IP)) {
- bool hwol_bad_l3_csum = dp_packet_ip_csum_bad(pkt);
+ bool hwol_bad_l3_csum = dp_packet_ol_ip_csum_bad(pkt);
if (hwol_bad_l3_csum) {
ok = false;
COVERAGE_INC(conntrack_l3csum_err);
} else {
- bool hwol_good_l3_csum = dp_packet_ip_csum_good(pkt)
+ bool hwol_good_l3_csum = dp_packet_ol_ip_csum_good(pkt)
|| dp_packet_ol_tx_ipv4(pkt);
/* Validate the checksum only when hwol is not supported. */
ok = extract_l3_ipv4(&ctx->key, l3, dp_packet_l3_size(pkt), NULL,
@@ -2107,9 +2107,9 @@ conn_key_extract(struct conntrack *ct, struct dp_packet *pkt, ovs_be16 dl_type,
}
if (ok) {
- bool hwol_bad_l4_csum = dp_packet_l4_csum_bad(pkt);
+ bool hwol_bad_l4_csum = dp_packet_ol_l4_csum_bad(pkt);
if (!hwol_bad_l4_csum) {
- bool hwol_good_l4_csum = dp_packet_l4_csum_good(pkt)
+ bool hwol_good_l4_csum = dp_packet_ol_l4_csum_good(pkt)
|| dp_packet_ol_tx_l4_csum(pkt);
/* Validate the checksum only when hwol is not supported. */
if (extract_l4(&ctx->key, l4, dp_packet_l4_size(pkt),
@@ -32,7 +32,7 @@ dp_packet_init__(struct dp_packet *p, size_t allocated, enum dp_packet_source so
dp_packet_reset_offsets(p);
pkt_metadata_init(&p->md, 0);
dp_packet_reset_cutlen(p);
- dp_packet_reset_offload(p);
+ dp_packet_ol_reset(p);
/* Initialize implementation-specific fields of dp_packet. */
dp_packet_init_specific(p);
/* By default assume the packet type to be Ethernet. */
@@ -933,7 +933,7 @@ dp_packet_rss_valid(const struct dp_packet *p)
}
static inline void
-dp_packet_reset_offload(struct dp_packet *p)
+dp_packet_ol_reset(struct dp_packet *p)
{
*dp_packet_ol_flags_ptr(p) &= ~DP_PACKET_OL_SUPPORTED_MASK;
}
@@ -1049,28 +1049,28 @@ dp_packet_ol_set_tcp_seg(struct dp_packet *p)
}
static inline bool
-dp_packet_ip_csum_good(const struct dp_packet *p)
+dp_packet_ol_ip_csum_good(const struct dp_packet *p)
{
return (*dp_packet_ol_flags_ptr(p) & DP_PACKET_OL_RX_IP_CSUM_MASK) ==
DP_PACKET_OL_RX_IP_CSUM_GOOD;
}
static inline bool
-dp_packet_ip_csum_bad(const struct dp_packet *p)
+dp_packet_ol_ip_csum_bad(const struct dp_packet *p)
{
return (*dp_packet_ol_flags_ptr(p) & DP_PACKET_OL_RX_IP_CSUM_MASK) ==
DP_PACKET_OL_RX_IP_CSUM_BAD;
}
static inline bool
-dp_packet_l4_csum_good(const struct dp_packet *p)
+dp_packet_ol_l4_csum_good(const struct dp_packet *p)
{
return (*dp_packet_ol_flags_ptr(p) & DP_PACKET_OL_RX_L4_CSUM_MASK) ==
DP_PACKET_OL_RX_L4_CSUM_GOOD;
}
static inline bool
-dp_packet_l4_csum_bad(const struct dp_packet *p)
+dp_packet_ol_l4_csum_bad(const struct dp_packet *p)
{
return (*dp_packet_ol_flags_ptr(p) & DP_PACKET_OL_RX_L4_CSUM_MASK) ==
DP_PACKET_OL_RX_L4_CSUM_BAD;
@@ -574,7 +574,7 @@ ipf_list_state_transition(struct ipf *ipf, struct ipf_list *ipf_list,
static bool
ipf_is_valid_v4_frag(struct ipf *ipf, struct dp_packet *pkt)
{
- if (OVS_UNLIKELY(dp_packet_ip_csum_bad(pkt))) {
+ if (OVS_UNLIKELY(dp_packet_ol_ip_csum_bad(pkt))) {
COVERAGE_INC(ipf_l3csum_err);
goto invalid_pkt;
}
@@ -608,7 +608,7 @@ ipf_is_valid_v4_frag(struct ipf *ipf, struct dp_packet *pkt)
goto invalid_pkt;
}
- if (OVS_UNLIKELY(!dp_packet_ip_csum_good(pkt)
+ if (OVS_UNLIKELY(!dp_packet_ol_ip_csum_good(pkt)
&& !dp_packet_ol_tx_ipv4(pkt)
&& csum(l3, ip_hdr_len) != 0)) {
COVERAGE_INC(ipf_l3csum_err);
@@ -88,7 +88,7 @@ netdev_tnl_ip_extract_tnl_md(struct dp_packet *packet, struct flow_tnl *tnl,
ovs_be32 ip_src, ip_dst;
- if (OVS_UNLIKELY(!dp_packet_ip_csum_good(packet))) {
+ if (OVS_UNLIKELY(!dp_packet_ol_ip_csum_good(packet))) {
if (csum(ip, IP_IHL(ip->ip_ihl_ver) * 4)) {
VLOG_WARN_RL(&err_rl, "ip packet has invalid checksum");
return NULL;
@@ -190,7 +190,7 @@ udp_extract_tnl_md(struct dp_packet *packet, struct flow_tnl *tnl,
}
if (udp->udp_csum) {
- if (OVS_UNLIKELY(!dp_packet_l4_csum_good(packet))) {
+ if (OVS_UNLIKELY(!dp_packet_ol_l4_csum_good(packet))) {
uint32_t csum;
if (netdev_tnl_is_header_ipv6(dp_packet_data(packet))) {
csum = packet_csum_pseudoheader6(dp_packet_l3(packet));
@@ -913,7 +913,7 @@ netdev_pop_header(struct netdev *netdev, struct dp_packet_batch *batch)
/* Reset the offload flags if present, to avoid wrong
* interpretation in the further packet processing when
* recirculated.*/
- dp_packet_reset_offload(packet);
+ dp_packet_ol_reset(packet);
pkt_metadata_init_conn(&packet->md);
dp_packet_batch_refill(batch, packet, i);
}
@@ -439,7 +439,7 @@ pop_mpls(struct dp_packet *packet, ovs_be16 ethtype)
/* Invalidate offload flags as they are not valid after
* decapsulation of MPLS header. */
- dp_packet_reset_offload(packet);
+ dp_packet_ol_reset(packet);
}
}
This helps to identify when it is about the flags or the packet itself. Signed-off-by: Flavio Leitner <fbl@sysclose.org> --- lib/conntrack.c | 8 ++++---- lib/dp-packet.c | 2 +- lib/dp-packet.h | 10 +++++----- lib/ipf.c | 4 ++-- lib/netdev-native-tnl.c | 4 ++-- lib/netdev.c | 2 +- lib/packets.c | 2 +- 7 files changed, 16 insertions(+), 16 deletions(-)