X-Git-Url: https://gerrit.o-ran-sc.org/r/gitweb?a=blobdiff_plain;f=src%2Fmt%2Fss_msg.c;h=9e89c3f6e0211560cba27df7a3f2b29e3a482436;hb=71278e10d44c0ee8855fec565c95aa0bb9135183;hp=15cc55d863e34193769a69ef39307d3d276944e7;hpb=829bbd114f1c3dc00c1da47bca0a8207c049df3f;p=o-du%2Fl2.git diff --git a/src/mt/ss_msg.c b/src/mt/ss_msg.c index 15cc55d86..9e89c3f6e 100644 --- a/src/mt/ss_msg.c +++ b/src/mt/ss_msg.c @@ -91,8 +91,8 @@ #endif /* SS_SEUM_CAVIUM */ #include #ifdef XEON_SPECIFIC_CHANGES -U32 startMemLeak=0; -extern pthread_mutex_t memLock; +uint32_t startMemLeak=0; +pthread_mutex_t memLock; #endif #if (defined (MAC_FREE_RING_BUF) || defined (RLC_FREE_RING_BUF)) @@ -104,23 +104,23 @@ extern pthread_mutex_t memLock; #include "mt_plat_t33.x" #endif /* forward declarations */ -PUBLIC S16 ssGetDBufOfSize ARGS((Region region, Size size, Buffer **dBuf)); -PUBLIC S16 SIncMsgRef(Buffer *srcBuf,Region dstRegion, Pool dstPool,Buffer **dstBuf); +S16 ssGetDBufOfSize ARGS((Region region, Size size, Buffer **dBuf)); +S16 SIncMsgRef(Buffer *srcBuf,Region dstRegion, Pool dstPool,Buffer **dstBuf); #ifdef SSI_STATIC_MEM_LEAK_DETECTION -EXTERN PUBLIC U32 GetNextFreeIdx ARGS((StaticMemAllocInfo * memAllocInfo)); -EXTERN PUBLIC void LogForStaticMemLeak ARGS((StaticMemAllocInfo* memAllocInfo, char* - file, U32 line, U32 size, void* ptr, U32 idx)); -EXTERN PUBLIC void FreeIdx ARGS((U8* ptr, U32 idx, StaticMemAllocInfo* - memAllocInfo,U32 size, char* file, U32 line)); +uint32_t GetNextFreeIdx ARGS((StaticMemAllocInfo * memAllocInfo)); +void LogForStaticMemLeak ARGS((StaticMemAllocInfo* memAllocInfo, char* + file, uint32_t line, uint32_t size, void* ptr, uint32_t idx)); +void FreeIdx ARGS((uint8_t* ptr, uint32_t idx, StaticMemAllocInfo* + memAllocInfo,uint32_t size, char* file, uint32_t line)); #endif #ifdef SS_USE_ZBC_MEMORY #ifdef T2K_MEM_LEAK_DBG -PRIVATE S16 SPutZbcDBufNew ARGS((Region region, Buffer *buf,char*,U32)); +static S16 SPutZbcDBufNew ARGS((Region region, Buffer *buf,char*,uint32_t)); #else -PRIVATE S16 SPutZbcDBuf ARGS((Region region, Buffer *buf)); -PUBLIC S16 SAttachPtrToBuf ARGS(( Region region, Pool pool, Data *ptr, +static S16 SPutZbcDBuf ARGS((Region region, Buffer *buf)); +S16 SAttachPtrToBuf ARGS(( Region region, Pool pool, Data *ptr, MsgLen totalLen, Buffer** mBuf)); #endif #endif @@ -129,35 +129,35 @@ PUBLIC S16 SAttachPtrToBuf ARGS(( Region region, Pool pool, Data *ptr, #ifdef SS_M_PROTO_REGION #ifdef T2K_MEM_LEAK_DBG #define DupMsg(region,buffer) DupMsgNew(region,buffer,file,line) -PRIVATE Buffer *DupMsgNew ARGS((Region region, Buffer *buffer,char*,U32)); +static Buffer *DupMsgNew ARGS((Region region, Buffer *buffer,char*,uint32_t)); #else #ifdef INTEL_WLS #ifdef T2K_MEM_LEAK_DBG -PUBLIC S16 SAttachPtrToMBuf1 ARGS(( Region region, Pool pool, Data *ptr, MsgLen totalLen, - MsgLen ptrLen, Buffer** mBuf, char* file, U32 line)); +S16 SAttachPtrToMBuf1 ARGS(( Region region, Pool pool, Data *ptr, MsgLen totalLen, + MsgLen ptrLen, Buffer** mBuf, char* file, uint32_t line)); #else -PUBLIC S16 SAttachPtrToMBuf ARGS(( Region region, Pool pool, Data *ptr, MsgLen totalLen, +S16 SAttachPtrToMBuf ARGS(( Region region, Pool pool, Data *ptr, MsgLen totalLen, MsgLen ptrLen, Buffer** mBuf)); #endif #ifdef T2K_MEM_LEAK_DBG -PUBLIC S16 SAttachWlsPtrToMBuf1 ARGS(( Region region, Pool pool, Data *ptr, +S16 SAttachWlsPtrToMBuf1 ARGS(( Region region, Pool pool, Data *ptr, Data *readPtr, MsgLen totalLen, - MsgLen ptrLen, Buffer** mBuf, char* file, U32 line)); + MsgLen ptrLen, Buffer** mBuf, char* file, uint32_t line)); -PUBLIC S16 SAttachWlsPtrToMBuf ARGS(( Region region, Pool pool, Data *ptr, +S16 SAttachWlsPtrToMBuf ARGS(( Region region, Pool pool, Data *ptr, Data *readPtr, MsgLen totalLen, MsgLen ptrLen, Buffer** mBuf)); #endif #ifdef TENB_DPDK_BUF -PUBLIC S16 SDetachDpdkPtrFrmMBuf ARGS((Buffer *mBuf, Data **ptr)); -PUBLIC S16 SDetachDpdkPtrFrmDBuf ARGS((Buffer *mBuf, Data **ptr)); -PUBLIC S16 SPutSBufDpdk ARGS(( Data *ptr)); +S16 SDetachDpdkPtrFrmMBuf ARGS((Buffer *mBuf, Data **ptr)); +S16 SDetachDpdkPtrFrmDBuf ARGS((Buffer *mBuf, Data **ptr)); +S16 SPutSBufDpdk ARGS(( Data *ptr)); #endif /* TENB_DPDK_BUF */ #endif /* INTEL_WLS */ -PRIVATE Buffer *DupMsg ARGS((Region region, Buffer *buffer)); +static Buffer *DupMsg ARGS((Region region, Buffer *buffer)); #endif #endif /* SS_M_PROTO_REGION */ @@ -213,10 +213,10 @@ PRIVATE Buffer *DupMsg ARGS((Region region, Buffer *buffer)); } -EXTERN pthread_t tmpRegTidMap[20]; +pthread_t tmpRegTidMap[20]; #define CM_MEM_GET_REGION(_region) \ { \ - U8 _regCnt; \ + uint8_t _regCnt; \ _region = 0xFF; \ \ for(_regCnt = 0; _regCnt < 12; _regCnt++) \ @@ -230,7 +230,7 @@ EXTERN pthread_t tmpRegTidMap[20]; } #if (defined (MAC_FREE_RING_BUF) || defined (RLC_FREE_RING_BUF) || defined(L2_OPTMZ)) -extern S32 clusterMode; +S32 clusterMode; #endif /* * @@ -251,68 +251,59 @@ extern S32 clusterMode; * */ #ifdef T2K_MEM_LEAK_DBG -PUBLIC S16 ssGetDBufOfSizeNew +S16 ssGetDBufOfSizeNew ( Region region, Size size, Buffer **dBuf, char* file, -U32 line +uint32_t line ) #else -#ifdef ANSI -PUBLIC S16 ssGetDBufOfSize +S16 ssGetDBufOfSize ( Region region, Size size, Buffer **dBuf ) -#else -PUBLIC S16 ssGetDBufOfSize(region, size, dBuf) -Region region; -Size size; -Buffer **dBuf; -#endif #endif { Size mdsize; Data *data; SsDblk *dptr; - TRC1(ssGetDBufOfSize) - #if (ERRCLASS & ERRCLS_INT_PAR) /* check buffer pointer */ if (!dBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS047, ERRZERO, "ssGetDBufOfSize : Null\ Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (region >= SS_MAX_REGS) { SSLOGERROR(ERRCLS_INT_PAR, ESS048, ERRZERO, "ssGetDBufOfSize : Invalid\ region id"); - RETVALUE(RFAILED); + return RFAILED; } if (size <= 0) { SSLOGERROR(ERRCLS_INT_PAR, ESS049, ERRZERO, "ssGetDBufOfSize : Invalid\ size"); - RETVALUE(RFAILED); + return RFAILED; } #endif /* ss006.301 : optmized this function */ mdsize = MDBSIZE + size; #ifdef SS_HISTOGRAM_SUPPORT - if (SAlloc(region, &mdsize, 0, (Data **) dBuf, __LINE__, (U8*) __FILE__, ENTNC) != ROK) + if (SAlloc(region, &mdsize, 0, (Data **) dBuf, __LINE__, (uint8_t*) __FILE__, ENTNC) != ROK) #else if (SAlloc(region, &mdsize, 0, (Data **) dBuf) != ROK) #endif /* SS_HISTOGRAM_SUPPORT */ { - RETVALUE(ROUTRES); + return (ROUTRES); } data = (Data *) (*dBuf) + MDBSIZE; size = mdsize - MDBSIZE; @@ -327,7 +318,7 @@ Buffer **dBuf; } #endif - RETVALUE(ROK); + return ROK; } /* ssGetDBufOfSize */ @@ -350,47 +341,31 @@ Buffer **dBuf; */ /* ss001.301: additions */ #ifdef SS_HISTOGRAM_SUPPORT -#ifdef ANSI -PUBLIC S16 SGetMsgNew +S16 SGetMsgNew ( Region region, /* region id */ Pool pool, /* pool id */ Buffer **mBuf, /* pointer to message buffer */ -U32 line, -U8 *fileName +uint32_t line, +uint8_t *fileName ) -#else -PUBLIC S16 SGetMsgNew(region, pool, mBuf, line, fileName) -Region region; /* region id */ -Pool pool; /* pool id */ -Buffer **mBuf; /* pointer to message buffer */ -U32 line; -U8 *fileName; -#endif #else /* SS_HISTOGRAM_SUPPORT */ #ifdef T2K_MEM_LEAK_DBG -PUBLIC S16 SGetMsgNew +S16 SGetMsgNew ( Region region, /* region id */ Pool pool, /* pool id */ Buffer **mBuf, /* pointer to message buffer */ char* file, -U32 line +uint32_t line ) #else -#ifdef ANSI -PUBLIC S16 SGetMsg +S16 SGetMsg ( Region region, /* region id */ Pool pool, /* pool id */ Buffer **mBuf /* pointer to message buffer */ ) -#else -PUBLIC S16 SGetMsg(region, pool, mBuf) -Region region; /* region id */ -Pool pool; /* pool id */ -Buffer **mBuf; /* pointer to message buffer */ -#endif #endif #endif /* SS_HISTOGRAM_SUPPORT */ { @@ -411,8 +386,6 @@ Buffer **mBuf; /* pointer to message buffer */ #endif - TRC1(SGetMsgNew) - #ifdef XEON_SPECIFIC_CHANGES region = 0; pool = 0; @@ -423,19 +396,19 @@ Buffer **mBuf; /* pointer to message buffer */ if (!mBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS050, ERRZERO, "SGetMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (region >= SS_MAX_REGS) { SSLOGERROR(ERRCLS_INT_PAR, ESS051, ERRZERO, "SGetMsg : Invalid region\ id"); - RETVALUE(RFAILED); + return RFAILED; } if (pool >= SS_MAX_POOLS_PER_REG) { SSLOGERROR(ERRCLS_INT_PAR, ESS052, ERRZERO, "SGetMsg : Invalid pool id"); - RETVALUE(RFAILED); + return RFAILED; } /* ss037.103 Removed the semaphore operation for performance enhancement */ @@ -452,7 +425,7 @@ Buffer **mBuf; /* pointer to message buffer */ "Could not lock region table"); #endif - RETVALUE(RFAILED); + return RFAILED; } #endif #endif @@ -468,12 +441,12 @@ Buffer **mBuf; /* pointer to message buffer */ #if (ERRCLASS & ERRCLS_DEBUG) SSLOGERROR(ERRCLS_DEBUG, ESS054, ERRZERO, "Could not release semaphore"); - RETVALUE(RFAILED); + return RFAILED; #endif } #endif SSLOGERROR(ERRCLS_INT_PAR, ESS055, region, "Region not registered"); - RETVALUE(RFAILED); + return RFAILED; } /* ss037.103 Removed the semaphore operation for performance enhancement */ @@ -483,7 +456,7 @@ Buffer **mBuf; /* pointer to message buffer */ #if (ERRCLASS & ERRCLS_DEBUG) SSLOGERROR(ERRCLS_DEBUG, ESS056, ERRZERO, "Could not release semaphore"); - RETVALUE(RFAILED); + return RFAILED; #endif } #endif @@ -504,7 +477,7 @@ Buffer **mBuf; /* pointer to message buffer */ #endif /* SS_HISTOGRAM_SUPPORT */ { SSLOGERROR(ERRCLS_DEBUG, ESS058, ERRZERO, "SGetMsg:Failed in SAlloc"); - RETVALUE(ROUTRES); + return (ROUTRES); } #else /* SS_M_PROTO_REGION */ /* ss001.301: additions */ @@ -515,7 +488,7 @@ Buffer **mBuf; /* pointer to message buffer */ #endif /* SS_HISTOGRAM_SUPPORT */ { SSLOGERROR(ERRCLS_DEBUG, ESS059, ERRZERO, "SGetMsg:Failed in SAlloc"); - RETVALUE(ROUTRES); + return (ROUTRES); } #endif /* SS_M_PROTO_REGION */ @@ -546,7 +519,7 @@ Buffer **mBuf; /* pointer to message buffer */ } } #endif - RETVALUE(ROK); + return ROK; } #ifdef RGL_SPECIFIC_CHANGES @@ -558,7 +531,7 @@ S16 SSetMBufPool(Buffer *mBuf, Pool pool) minfo = (SsMsgInfo*) mBuf->b_rptr; minfo->pool = pool; - RETVALUE(ROK); + return ROK; } #endif @@ -581,44 +554,32 @@ S16 SSetMBufPool(Buffer *mBuf, Pool pool) */ /* ss001.301: additions */ #ifdef SS_HISTOGRAM_SUPPORT -#ifdef ANSI -PUBLIC S16 SPutMsgNew +S16 SPutMsgNew ( Buffer *mBuf, -U32 line, -U8 *fileName +uint32_t line, +uint8_t *fileName ) -#else -PUBLIC S16 SPutMsgNew(mBuf, line, fileName) -Buffer *mBuf; -U32 line; -U8 *fileName; -#endif #else /* SS_HISTOGRAM_SUPPORT */ #ifdef T2K_MEM_LEAK_DBG -PUBLIC S16 SPutMsgNew +S16 SPutMsgNew ( Buffer *mBuf, char* file, -U32 line +uint32_t line ) #else -#ifdef ANSI -PUBLIC S16 SPutMsg +S16 SPutMsg ( Buffer *mBuf ) -#else -PUBLIC S16 SPutMsg(mBuf) -Buffer *mBuf; -#endif #endif #endif /* SS_HISTOGRAM_SUPPORT */ { Buffer *tmp; SsMsgInfo *minfo; #ifdef SS_MEM_WL_DEBUG - U8 tmpThrReg; + uint8_t tmpThrReg; #endif /* ss001.301: additions */ @@ -626,8 +587,6 @@ Buffer *mBuf; Ent entId = 0; #endif /* SS_HISTOGRAM_SUPPORT */ - TRC1(SPutMsgNew) - #ifdef L2_OPTMZ //#ifdef RADIO_CLUSTER if(clusterMode == RADIO_CLUSTER_MODE) @@ -638,14 +597,14 @@ Buffer *mBuf; } if (mBuf->refCnt > 0) { - RETVALUE(ROK); + return ROK; } } #endif #if (defined (MAC_FREE_RING_BUF) || defined (RLC_FREE_RING_BUF)) { - extern pthread_t gMacTId,gRlcTId; - extern S32 clusterMode; + pthread_t gMacTId,gRlcTId; + S32 clusterMode; if(clusterMode == RADIO_CLUSTER_MODE) { @@ -653,24 +612,18 @@ Buffer *mBuf; if(pthread_self() == gMacTId) //if(pthread_equal(pthread_self(),gMacTId)) { -#if 0 -#else if(ROK == mtAddBufToRing(SS_RNG_BUF_MAC_FREE_RING,(Void *)mBuf,0)) -#endif { - RETVALUE(ROK); + return ROK; } } #endif #ifdef RLC_FREE_RING_BUF else if(pthread_self() == gRlcTId) { -#if 0 -#else if(ROK == mtAddBufToRing(SS_RNG_BUF_RLC_FREE_RING,(Void *)mBuf,0)) -#endif { - RETVALUE(ROK); + return ROK; } } #endif @@ -682,13 +635,13 @@ Buffer *mBuf; if (mBuf == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS060, ERRZERO, "SPutMsg: Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS061, ERRZERO, "SPutMsg: Incorrect buffer\ type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -697,7 +650,7 @@ Buffer *mBuf; if(tmpThrReg == 0xFF) { printf("\n Not able to get region \n"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -732,7 +685,7 @@ Buffer *mBuf; if (SFree(minfo->region, (Data *) mBuf, MSGSIZE) == RFAILED) #endif #endif /* SS_HISTOGRAM_SUPPORT */ - RETVALUE(RFAILED); + return RFAILED; #else /* SS_M_PROTO_REGION */ /* ss021.103 - Addition to check return value of SFree */ #ifdef SS_HISTOGRAM_SUPPORT @@ -740,10 +693,10 @@ Buffer *mBuf; #else if (SFree(minfo->region, (Data *) mBuf, MSGSIZE) == RFAILED) #endif /* SS_HISTOGRAM_SUPPORT */ - RETVALUE(RFAILED); + return RFAILED; #endif /* SS_M_PROTO_REGION */ - RETVALUE(ROK); + return ROK; } #ifdef SS_LOCKLESS_MEMORY @@ -764,71 +717,60 @@ Buffer *mBuf; */ /* ss001.301: additions */ #ifdef T2K_MEM_LEAK_DBG -PUBLIC S16 SPutStaticBufferNew +S16 SPutStaticBufferNew ( Region region, /* region ID */ Pool pool, /* pool ID */ Data *ptr, /* pointer to buffer */ Size size, /* size */ -U8 memType, /* memory type used if shareable or not */ +uint8_t memType, /* memory type used if shareable or not */ char* file, -U32 line +uint32_t line ) #else -#ifdef ANSI -PUBLIC S16 SPutStaticBuffer +S16 SPutStaticBuffer ( Region region, /* region ID */ Pool pool, /* pool ID */ Data *ptr, /* pointer to buffer */ Size size, /* size */ -U8 memType /* memory type used if shareable or not */ +uint8_t memType /* memory type used if shareable or not */ ) -#else -PUBLIC S16 SPutStaticBuffer(region, pool, ptr, size) -Region region; /* region ID */ -Pool pool; /* pool ID */ -Data *ptr; /* pointer to buffer */ -Size size; /* size */ -U8 memType; /* memory type used if shareable or not */ -#endif #endif { S16 ret = RFAILED; - TRC1(SPutStaticBuffer); - #if (ERRCLASS & ERRCLS_INT_PAR) /* validate region ID */ if (region >= SS_MAX_REGS) { SSLOGERROR(ERRCLS_INT_PAR, ESS220, region, "Invalid region"); - RETVALUE(RFAILED); + return RFAILED; } /* validate pool ID */ if (pool >= SS_MAX_POOLS_PER_REG) { SSLOGERROR(ERRCLS_INT_PAR, ESS221, pool, "Invalid pool"); - RETVALUE(RFAILED); + return RFAILED; } /* validate data pointer */ if (ptr == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS223, (ErrVal)0, "NULL data pointe"); - RETVALUE(RFAILED); + return RFAILED; } /* validate size */ if (size <= 0) { SSLOGERROR(ERRCLS_INT_PAR, ESS224, size, "Invalid size"); - RETVALUE(RFAILED); + return RFAILED; } #endif #if (defined (MAC_FREE_RING_BUF) || defined (RLC_FREE_RING_BUF)) { - extern pthread_t gMacTId,gRlcTId; + pthread_t gMacTId,gRlcTId; if(clusterMode == RADIO_CLUSTER_MODE) { @@ -836,24 +778,18 @@ U8 memType; /* memory type used if shareable or not */ if(pthread_self() == gMacTId) //if(pthread_equal(pthread_self(),gMacTId)) { -#if 0 -#else if(ROK == mtAddBufToRing(SS_RNG_BUF_MAC_FREE_RING,(Void *)ptr,1)) -#endif { - RETVALUE(ROK); + return ROK; } } #endif #ifdef RLC_FREE_RING_BUF else if(pthread_self() == gRlcTId) { -#if 0 -#else if(ROK == mtAddBufToRing(SS_RNG_BUF_RLC_FREE_RING,(Void *)ptr,1)) -#endif { - RETVALUE(ROK); + return ROK; } } } @@ -871,7 +807,7 @@ U8 memType; /* memory type used if shareable or not */ (osCp.dynRegionTbl[region].used == FALSE))) { SSLOGERROR(ERRCLS_INT_PAR, ESS218, region, "Region not registered"); - RETVALUE(ret); + return (ret); } #endif @@ -903,7 +839,7 @@ U8 memType; /* memory type used if shareable or not */ } #endif - RETVALUE(ret); + return (ret); } /* @@ -925,67 +861,56 @@ U8 memType; /* memory type used if shareable or not */ * */ #ifdef T2K_MEM_LEAK_DBG -PUBLIC S16 SGetStaticBufferNew +S16 SGetStaticBufferNew ( Region region, /* region ID */ Pool pool, /* pool ID */ Data **ptr, /* pointer to buffer */ Size size, /* size requested */ -U8 memType, /* memory type used if shareable or not */ +uint8_t memType, /* memory type used if shareable or not */ char* file, -U32 line +uint32_t line ) #else -#ifdef ANSI -PUBLIC S16 SGetStaticBuffer +S16 SGetStaticBuffer ( Region region, /* region ID */ Pool pool, /* pool ID */ Data **ptr, /* pointer to buffer */ Size size, /* size requested */ -U8 memType /* memory type used if shareable or not */ +uint8_t memType /* memory type used if shareable or not */ ) -#else -PUBLIC S16 SGetStaticBuffer(region, pool, ptr, size) -Region region; /* region ID */ -Pool pool; /* pool ID */ -Data **ptr; /* pointer to buffer */ -Size size; /* size requested */ -U8 memType; /* memory type used if shareable or not */ -#endif #endif { S16 ret = RFAILED; - U32 flags; - - TRC1(SGetStaticBuffer); + uint32_t flags; #if (ERRCLASS & ERRCLS_INT_PAR) /* validate region ID */ if (region >= SS_MAX_REGS) { SSLOGERROR(ERRCLS_INT_PAR, ESS211, region, "Invalid region"); - RETVALUE(ret); + return (ret); } /* validate pool ID */ if (pool >= SS_MAX_POOLS_PER_REG) { SSLOGERROR(ERRCLS_INT_PAR, ESS212, pool, "Invalid pool"); - RETVALUE(ret); + return (ret); } /* validate data pointer */ if (ptr == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS214, (ErrVal)0 , "NULL data pointer"); - RETVALUE(ret); + return (ret); } /* validate size */ if (size <= 0) { SSLOGERROR(ERRCLS_INT_PAR, ESS215, size, "Invalid size"); - RETVALUE(ret); + return (ret); } #endif @@ -997,7 +922,7 @@ U8 memType; /* memory type used if shareable or not */ (osCp.dynRegionTbl[region].used == FALSE))) { SSLOGERROR(ERRCLS_INT_PAR, ESS218, region, "Region not registered"); - RETVALUE(ret); + return (ret); } #endif @@ -1035,77 +960,59 @@ U8 memType; /* memory type used if shareable or not */ } #endif - RETVALUE(ret); + return (ret); } #endif /* SS_LOCKLESS_MEMORY */ -#ifdef INTEL_WLS +#ifdef INTEL_WLS_MEM #ifndef SS_LOCKLESS_MEMORY -#ifdef ANSI -PUBLIC S16 SGetStaticBuffer +S16 SGetStaticBuffer ( Region region, /* region ID */ Pool pool, /* pool ID */ Data **ptr, /* pointer to buffer */ Size size, /* size requested */ -U8 memType /* memory type used if shareable or not */ +uint8_t memType /* memory type used if shareable or not */ ) -#else -PUBLIC S16 SGetStaticBuffer(region, pool, ptr, size) -Region region; /* region ID */ -Pool pool; /* pool ID */ -Data **ptr; /* pointer to buffer */ -Size size; /* size requested */ -U8 memType; /* memory type used if shareable or not */ -#endif { S16 ret; ret = SGetSBuf(region, pool, ptr, size); - RETVALUE(ret); + return (ret); } -#ifdef ANSI -PUBLIC S16 SPutStaticBuffer +S16 SPutStaticBuffer ( Region region, /* region ID */ Pool pool, /* pool ID */ Data *ptr, /* pointer to buffer */ Size size, /* size */ -U8 memType /* memory type used if shareable or not */ +uint8_t memType /* memory type used if shareable or not */ ) -#else -PUBLIC S16 SPutStaticBuffer(region, pool, ptr, size) -Region region; /* region ID */ -Pool pool; /* pool ID */ -Data *ptr; /* pointer to buffer */ -Size size; /* size */ -U8 memType; /* memory type used if shareable or not */ -#endif { S16 ret; ret = SPutSBuf(region, pool, ptr, size); - RETVALUE(ret); + return (ret); } #endif #ifdef T2K_MEM_LEAK_DBG -PUBLIC S16 SGetSBufWls1 +S16 SGetSBufWls1 ( Region region, /* region ID */ Pool pool, /* pool ID */ Data **ptr, /* pointer to buffer */ Size size, /* size requested */ char* file, -U32 line +uint32_t line ) #else -PUBLIC S16 SGetSBufWls +S16 SGetSBufWls ( Region region, /* region ID */ Pool pool, /* pool ID */ @@ -1115,7 +1022,9 @@ Size size /* size requested */ #endif { S16 ret; - U32 flags = 0; +#ifndef SS_LOCKLESS_MEMORY + uint32_t flags = 0; +#endif #ifdef SS_LOCKLESS_MEMORY region = SS_GET_THREAD_MEM_REGION(); @@ -1131,21 +1040,21 @@ Size size /* size requested */ #endif #endif - RETVALUE(ret); + return (ret); } #ifdef T2K_MEM_LEAK_DBG -PUBLIC S16 SPutSBufWls1 +S16 SPutSBufWls1 ( Region region, /* region ID */ Pool pool, /* pool ID */ Data *ptr, /* pointer to buffer */ Size size, /* size */ char* file, -U32 line +uint32_t line ) #else -PUBLIC S16 SPutSBufWls +S16 SPutSBufWls ( Region region, /* region ID */ Pool pool, /* pool ID */ @@ -1168,7 +1077,7 @@ Size size /* size */ #endif #endif - RETVALUE(ret); + return (ret); } #endif /* INTEL_WLS */ @@ -1193,67 +1102,39 @@ Size size /* size */ */ /* ss001.301: additions */ #ifdef SS_HISTOGRAM_SUPPORT -#ifdef ANSI -PUBLIC S16 SGetSBufNew +S16 SGetSBufNew ( Region region, /* region ID */ Pool pool, /* pool ID */ Data **ptr, /* pointer to buffer */ Size size, /* size requested */ -U32 line, -U8 *fileName +uint32_t line, +uint8_t *fileName ) -#else -PUBLIC S16 SGetSBufNew(region, pool, ptr, size, line, fileName) -Region region; /* region ID */ -Pool pool; /* pool ID */ -Data **ptr; /* pointer to buffer */ -Size size; /* size requested */ -U32 line; -U8 *fileName; -#endif #else /* SS_HISTOGRAM_SUPPORT */ #if (defined(SSI_STATIC_MEM_LEAK_DETECTION) || defined(T2K_MEM_LEAK_DBG)) -#ifdef ANSI -PUBLIC S16 SGetSBuf1 +S16 SGetSBuf1 ( Region region, /* region ID */ Pool pool, /* pool ID */ Data **ptr, /* pointer to buffer */ Size size, /* size requested */ char* file, -U32 line +uint32_t line ) #else -PUBLIC S16 SGetSBuf1(region, pool, ptr, size, file, line) -Region region; /* region ID */ -Pool pool; /* pool ID */ -Data **ptr; /* pointer to buffer */ -Size size; /* size requested */ -char* file; -U32 line; -#endif -#else -#ifdef ANSI -PUBLIC S16 SGetSBuf +S16 SGetSBuf ( Region region, /* region ID */ Pool pool, /* pool ID */ Data **ptr, /* pointer to buffer */ Size size /* size requested */ ) -#else -PUBLIC S16 SGetSBuf(region, pool, ptr, size) -Region region; /* region ID */ -Pool pool; /* pool ID */ -Data **ptr; /* pointer to buffer */ -Size size; /* size requested */ -#endif #endif #endif /* SS_HISTOGRAM_SUPPORT */ { S16 ret; - U32 flags; + uint32_t flags; #ifdef SSI_STATIC_MEM_LEAK_DETECTION Size tmpSize; #endif @@ -1263,7 +1144,6 @@ Size size; /* size requested */ Bool hstReg = FALSE; #endif /* SS_HISTOGRAM_SUPPORT */ - TRC1(SGetSBufNew); region = SS_GET_THREAD_MEM_REGION(); #ifdef INTEL_WLS @@ -1275,28 +1155,28 @@ Size size; /* size requested */ if (region >= SS_MAX_REGS) { SSLOGERROR(ERRCLS_INT_PAR, ESS211, region, "Invalid region"); - RETVALUE(RFAILED); + return RFAILED; } /* validate pool ID */ if (pool >= SS_MAX_POOLS_PER_REG) { SSLOGERROR(ERRCLS_INT_PAR, ESS212, pool, "Invalid pool"); - RETVALUE(RFAILED); + return RFAILED; } /* ss008.13: addition */ /* validate data pointer */ if (ptr == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS214, (ErrVal)0 , "NULL data pointer"); - RETVALUE(RFAILED); + return RFAILED; } /* validate size */ if (size <= 0) { SSLOGERROR(ERRCLS_INT_PAR, ESS215, size, "Invalid size"); - RETVALUE(RFAILED); + return RFAILED; } #endif /* ss037.103 Removed the semaphore operation for performance enhancement */ @@ -1315,7 +1195,7 @@ Size size; /* size requested */ "Could not lock region table"); #endif - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -1332,12 +1212,12 @@ Size size; /* size requested */ #if (ERRCLASS & ERRCLS_DEBUG) SSLOGERROR(ERRCLS_DEBUG, ESS217, ERRZERO, "Could not release semaphore"); - RETVALUE(RFAILED); + return RFAILED; #endif } SSLOGERROR(ERRCLS_INT_PAR, ESS218, region, "Region not registered"); - RETVALUE(RFAILED); + return RFAILED; #endif } #endif @@ -1389,18 +1269,18 @@ Size size; /* size requested */ #endif /*size = tmpSize - 4;*/ { - /*printf("ptr = %p *ptr = %p\n",ptr,*ptr);*/ + /*printf("\nptr = %p *ptr = %p\n",ptr,*ptr);*/ #ifdef XEON_SPECIFIC_CHANGES pthread_mutex_lock(&(memLock)); #endif - U32 idx = GetNextFreeIdx(&SMemLeakInfo[region]); - U8* allocatedPtr = *ptr; + uint32_t idx = GetNextFreeIdx(&SMemLeakInfo[region]); + uint8_t* allocatedPtr = *ptr; void* actualPtr = allocatedPtr + 4; *ptr = actualPtr; /* store the index in the memory allocated itself */ - /**((U32*)*((U32*)allocatedPtr)) = idx;*/ - *((U32*)allocatedPtr) = idx; - /*printf("region = %d idx = %d ptr = %p *ptr = %p actual = %p allocated = %p content = %d\n",region, idx, ptr, *ptr, actualPtr, allocatedPtr, *((U32*)allocatedPtr));*/ + /**((uint32_t*)*((uint32_t*)allocatedPtr)) = idx;*/ + *((uint32_t*)allocatedPtr) = idx; + /*printf("\nregion = %d idx = %d ptr = %p *ptr = %p actual = %p allocated = %p content = %d\n",region, idx, ptr, *ptr, actualPtr, allocatedPtr, *((uint32_t*)allocatedPtr));*/ LogForStaticMemLeak(&SMemLeakInfo[region], file, @@ -1435,7 +1315,7 @@ Size size; /* size requested */ #if (ERRCLASS & ERRCLS_DEBUG) SSLOGERROR(ERRCLS_DEBUG, ESS219, ERRZERO, "Could not release semaphore"); - RETVALUE(RFAILED); + return RFAILED; #endif } #endif @@ -1449,7 +1329,7 @@ Size size; /* size requested */ } #endif /* SSI_DEBUG_LEVEL1 */ - RETVALUE(ret); + return (ret); } @@ -1470,62 +1350,34 @@ Size size; /* size requested */ */ /* ss001.301: additions */ #ifdef SS_HISTOGRAM_SUPPORT -#ifdef ANSI -PUBLIC S16 SPutSBufNew +S16 SPutSBufNew ( Region region, /* region ID */ Pool pool, /* pool ID */ Data *ptr, /* pointer to buffer */ Size size, /* size */ -U32 line, -U8 *fileName +uint32_t line, +uint8_t *fileName ) -#else -PUBLIC S16 SPutSBufNew(region, pool, ptr, size, line, fileName) -Region region; /* region ID */ -Pool pool; /* pool ID */ -Data *ptr; /* pointer to buffer */ -Size size; /* size */ -U32 line; -U8 *fileName; -#endif #else /* SS_HISTOGRAM_SUPPORT */ #if (defined(SSI_STATIC_MEM_LEAK_DETECTION) || defined(T2K_MEM_LEAK_DBG)) -#ifdef ANSI -PUBLIC S16 SPutSBuf1 +S16 SPutSBuf1 ( Region region, /* region ID */ Pool pool, /* pool ID */ Data *ptr, /* pointer to buffer */ Size size, /* size */ char* file, -U32 line +uint32_t line ) #else -PUBLIC S16 SPutSBuf1(region, pool, ptr, size, file, line) -Region region; /* region ID */ -Pool pool; /* pool ID */ -Data *ptr; /* pointer to buffer */ -Size size; /* size */ -char* file; -U32 line; -#endif -#else -#ifdef ANSI -PUBLIC S16 SPutSBuf +S16 SPutSBuf ( Region region, /* region ID */ Pool pool, /* pool ID */ Data *ptr, /* pointer to buffer */ Size size /* size */ ) -#else -PUBLIC S16 SPutSBuf(region, pool, ptr, size) -Region region; /* region ID */ -Pool pool; /* pool ID */ -Data *ptr; /* pointer to buffer */ -Size size; /* size */ -#endif #endif #endif /* SS_HISTOGRAM_SUPPORT */ { @@ -1536,9 +1388,6 @@ Size size; /* size */ Bool hstReg = FALSE; #endif /* SS_HISTOGRAM_SUPPORT */ - TRC1(SPutSBufNew); - - region = SS_GET_THREAD_MEM_REGION(); #if (!defined(SS_LOCKLESS_MEMORY) && defined(INTEL_WLS)) region = 1; @@ -1549,28 +1398,28 @@ Size size; /* size */ if (region >= SS_MAX_REGS) { SSLOGERROR(ERRCLS_INT_PAR, ESS220, region, "Invalid region"); - RETVALUE(RFAILED); + return RFAILED; } /* validate pool ID */ if (pool >= SS_MAX_POOLS_PER_REG) { SSLOGERROR(ERRCLS_INT_PAR, ESS221, pool, "Invalid pool"); - RETVALUE(RFAILED); + return RFAILED; } /* ss008.13: addition */ /* validate data pointer */ if (ptr == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS223, (ErrVal)0, "NULL data pointe"); - RETVALUE(RFAILED); + return RFAILED; } /* validate size */ if (size <= 0) { SSLOGERROR(ERRCLS_INT_PAR, ESS224, size, "Invalid size"); - RETVALUE(RFAILED); + return RFAILED; } #endif /* ss037.103 Removed the semaphore operation for performance enhancement */ @@ -1588,7 +1437,7 @@ Size size; /* size */ "Could not lock region table"); #endif - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -1604,12 +1453,12 @@ Size size; /* size */ #if (ERRCLASS & ERRCLS_DEBUG) SSLOGERROR(ERRCLS_DEBUG, ESS226, ERRZERO, "Could not release semaphore"); - RETVALUE(RFAILED); + return RFAILED; #endif } #endif SSLOGERROR(ERRCLS_INT_PAR, ESS227, region, "Region not registered"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -1619,7 +1468,7 @@ Size size; /* size */ #ifdef XEON_SPECIFIC_CHANGES pthread_mutex_lock(&(memLock)); #endif - U32 idx = *((U32*)((U8 *)ptr - 4)); + uint32_t idx = *((uint32_t*)((uint8_t *)ptr - 4)); FreeIdx(ptr,idx,&SMemLeakInfo[region],size,file,line); #ifdef XEON_SPECIFIC_CHANGES pthread_mutex_unlock(&(memLock)); @@ -1665,7 +1514,7 @@ Size size; /* size */ #if (ERRCLASS & ERRCLS_DEBUG) SSLOGERROR(ERRCLS_DEBUG, ESS228, ERRZERO, "Could not release semaphore"); - RETVALUE(RFAILED); + return RFAILED; #endif } #endif @@ -1680,7 +1529,7 @@ Size size; /* size */ } #endif /* SSI_DEBUG_LEVEL1 */ - RETVALUE(ret); + return (ret); } @@ -1702,34 +1551,24 @@ Size size; /* size */ * */ -#ifdef ANSI -PUBLIC S16 SInitMsg -( -Buffer *mBuf -) -#else -PUBLIC S16 SInitMsg(mBuf) -Buffer *mBuf; -#endif +S16 SInitMsg(Buffer *mBuf) { SsMsgInfo *minfo; Buffer *tmp; - U8 tmpRegId; - - TRC1(SInitMsg) + uint8_t tmpRegId; #if (ERRCLASS & ERRCLS_INT_PAR) /* check message buffer */ if (mBuf == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS062, ERRZERO, "SInitMsg: Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS063, ERRZERO, "SInitMsg: Incorrect buffer\ type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -1739,7 +1578,7 @@ Buffer *mBuf; CM_MEM_GET_REGION(tmpRegId); if(tmpRegId == 0xFF) { - RETVALUE(RFAILED); + return RFAILED; } #endif minfo = (SsMsgInfo*) mBuf->b_rptr; @@ -1752,7 +1591,7 @@ Buffer *mBuf; #if 1 #ifdef T2K_MEM_LEAK_DBG char * file = __FILE__; - U32 line = __LINE__; + uint32_t line = __LINE__; #endif (Void) SPutDBuf(tmpRegId, minfo->pool, tmp); @@ -1766,7 +1605,7 @@ Buffer *mBuf; minfo->endptr = NULLP; minfo->next = NULLP; - RETVALUE(ROK); + return ROK; } /* ss016.301 - Added a new API - SAddPreMsgMultInOrder. This preserves the @@ -1793,19 +1632,12 @@ Buffer *mBuf; * File: ss_msg.c * */ -#ifdef ANSI -PUBLIC S16 SAddPreMsgMultInOrder +S16 SAddPreMsgMultInOrder ( - Data *src, - MsgLen cnt, - Buffer *mBuf - ) -#else -PUBLIC S16 SAddPreMsgMultInOrder(src, cnt, mBuf) - Data *src; - MsgLen cnt; - Buffer *mBuf; -#endif +Data *src, +MsgLen cnt, +Buffer *mBuf +) { SsMsgInfo *minfo; /* Message info */ Buffer *tmp; @@ -1817,7 +1649,6 @@ PUBLIC S16 SAddPreMsgMultInOrder(src, cnt, mBuf) MsgLen offset; Data *rptr; Data *revSrc; - TRC1(SAddPreMsgMultInOrder) #if (ERRCLASS & ERRCLS_INT_PAR) /* check message buffer */ @@ -1825,27 +1656,27 @@ PUBLIC S16 SAddPreMsgMultInOrder(src, cnt, mBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS070, ERRZERO, "SAddPreMsgMultInOrder:\ Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check source */ if (src == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS071, ERRZERO, "SAddPreMsgMultInOrder:\ Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check count */ if (cnt <= 0) { SSLOGERROR(ERRCLS_INT_PAR, ESS072, ERRZERO, "SAddPreMsgMultInOrder:\ Invalid count"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS073, ERRZERO, "SAddPreMsgMultInOrder:\ Incorrect buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -1885,7 +1716,7 @@ PUBLIC S16 SAddPreMsgMultInOrder(src, cnt, mBuf) if (!cnt) { minfo->len += len; - RETVALUE(ROK); + return ROK; } } newblk = prevblk = NULLP; @@ -1899,7 +1730,7 @@ PUBLIC S16 SAddPreMsgMultInOrder(src, cnt, mBuf) prevblk = prevblk->b_cont; #ifdef T2K_MEM_LEAK_DBG char * file = __FILE__; - U32 line = __LINE__; + uint32_t line = __LINE__; #endif (Void) SPutDBuf(minfo->region, minfo->pool, curblk); @@ -1910,7 +1741,7 @@ PUBLIC S16 SAddPreMsgMultInOrder(src, cnt, mBuf) tmp->b_rptr = tmp->b_datap->db_base + offset; } - RETVALUE(ROUTRES); + return (ROUTRES); } /* attach curblk in the newblk chain */ if (prevblk) @@ -1957,7 +1788,7 @@ PUBLIC S16 SAddPreMsgMultInOrder(src, cnt, mBuf) /* update length of message */ minfo->len += len; - RETVALUE(ROK); + return ROK; } /* * @@ -1982,36 +1813,28 @@ PUBLIC S16 SAddPreMsgMultInOrder(src, cnt, mBuf) */ -#ifdef ANSI -PUBLIC S16 SAddPreMsg +S16 SAddPreMsg ( Data data, Buffer *mBuf ) -#else -PUBLIC S16 SAddPreMsg (data, mBuf) -Data data; -Buffer *mBuf; -#endif { SsMsgInfo *minfo; Buffer *tmp; Buffer *newb; - TRC1(SAddPreMsg) - #if (ERRCLASS & ERRCLS_INT_PAR) /* check message buffer */ if (!mBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS064, ERRZERO, "SAddPreMsg: Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS065, ERRZERO, "SAddPreMsg: Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -2024,7 +1847,7 @@ Buffer *mBuf; if (minfo->len == 0x7FFF) #endif { - RETVALUE(ROUTRES); + return (ROUTRES); } /* @@ -2040,7 +1863,7 @@ Buffer *mBuf; { SSLOGERROR(ERRCLS_DEBUG, ESS066, ERRZERO, "SAddPreMsg:Failed in\ SGetDBuf"); - RETVALUE(ROUTRES); + return (ROUTRES); } /* set the read and write pointers to end of data buffer */ /* subsequent prepends have all the buffer to insert data into */ @@ -2060,7 +1883,7 @@ Buffer *mBuf; *--tmp->b_rptr = data; minfo->len++; - RETVALUE(ROK); + return ROK; } /* @@ -2086,36 +1909,28 @@ Buffer *mBuf; */ -#ifdef ANSI -PUBLIC S16 SAddPstMsg +S16 SAddPstMsg ( Data data, Buffer *mBuf ) -#else -PUBLIC S16 SAddPstMsg (data, mBuf) -Data data; -Buffer *mBuf; -#endif { SsMsgInfo *minfo; Buffer *tmp; Buffer *newb; - - TRC1(SAddPstMsg) #if (ERRCLASS & ERRCLS_INT_PAR) /* check message buffer */ if (!mBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS067, ERRZERO, "SAddPstMsg: Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS068, ERRZERO, "SAddPstMsg: Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -2129,7 +1944,7 @@ Buffer *mBuf; { SSLOGERROR(ERRCLS_DEBUG, ESS069, ERRZERO, "SAddPstMsg: Failed in\ SGetDBuf()"); - RETVALUE(ROUTRES); + return (ROUTRES); } /* append newb to the end of the mBuf chain */ @@ -2147,7 +1962,7 @@ Buffer *mBuf; *tmp->b_wptr++ = data; minfo->len++; - RETVALUE(ROK); + return ROK; } /* @@ -2179,29 +1994,22 @@ Buffer *mBuf; */ #ifdef T2K_MEM_LEAK_DBG -PUBLIC S16 SAddPreMsgMult1 +S16 SAddPreMsgMult1 ( Data *src, MsgLen cnt, Buffer *mBuf, char *file, -U32 line +uint32_t line ) #else -#ifdef ANSI -PUBLIC S16 SAddPreMsgMult +S16 SAddPreMsgMult ( Data *src, MsgLen cnt, Buffer *mBuf ) -#else -PUBLIC S16 SAddPreMsgMult(src, cnt, mBuf) -Data *src; -MsgLen cnt; -Buffer *mBuf; -#endif #endif { SsMsgInfo *minfo; /* Message info */ @@ -2214,33 +2022,31 @@ Buffer *mBuf; MsgLen offset; Data *rptr; - TRC1(SAddPreMsgMult) - #if (ERRCLASS & ERRCLS_INT_PAR) /* check message buffer */ if (mBuf == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS070, ERRZERO, "SAddPreMsgMult:Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check source */ if (src == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS071, ERRZERO, "SAddPreMsgMult:Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check count */ if (cnt <= 0) { SSLOGERROR(ERRCLS_INT_PAR, ESS072, ERRZERO, "SAddPreMsgMult: Invalid\ count"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS073, ERRZERO, "SAddPreMsgMult: Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -2270,7 +2076,7 @@ Buffer *mBuf; if (!cnt) { minfo->len += len; - RETVALUE(ROK); + return ROK; } } newblk = prevblk = NULLP; @@ -2290,7 +2096,7 @@ Buffer *mBuf; tmp->b_rptr = tmp->b_datap->db_base + offset; } - RETVALUE(ROUTRES); + return (ROUTRES); } /* attach curblk in the newblk chain */ if (prevblk) @@ -2326,7 +2132,7 @@ Buffer *mBuf; /* update length of message */ minfo->len += len; - RETVALUE(ROK); + return ROK; } /* @@ -2358,28 +2164,21 @@ Buffer *mBuf; */ #ifdef T2K_MEM_LEAK_DBG -PUBLIC S16 SAddPstMsgMult1 +S16 SAddPstMsgMult1 ( Data *src, MsgLen cnt, Buffer *mBuf, char *file, -U32 line +uint32_t line ) #else -#ifdef ANSI -PUBLIC S16 SAddPstMsgMult +S16 SAddPstMsgMult ( Data *src, MsgLen cnt, Buffer *mBuf ) -#else -PUBLIC S16 SAddPstMsgMult(src, cnt, mBuf) -Data *src; -MsgLen cnt; -Buffer *mBuf; -#endif #endif { SsMsgInfo *minfo; @@ -2392,33 +2191,31 @@ Buffer *mBuf; MsgLen numBytes; Data *wptr; - TRC1(SAddPstMsgMult) - #if (ERRCLASS & ERRCLS_INT_PAR) /* check message buffer */ if (mBuf == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS074, ERRZERO, "SAddPstMsgMult:Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check source */ if (src == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS075, ERRZERO, "SAddPstMsgMult:Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check count */ if (cnt <= 0) { SSLOGERROR(ERRCLS_INT_PAR, ESS076, ERRZERO, "SAddPstMsgMult:Invalid\ count"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS077, ERRZERO, "SAddPstMsgMult: Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -2456,7 +2253,7 @@ Buffer *mBuf; if (!cnt) { minfo->len += len; - RETVALUE(ROK); + return ROK; } } @@ -2478,7 +2275,7 @@ Buffer *mBuf; tmp->b_wptr = tmp->b_datap->db_lim - offset; } - RETVALUE(ROUTRES); + return (ROUTRES); } /* insert curblk in the newblk chain */ @@ -2514,7 +2311,7 @@ Buffer *mBuf; /* update length */ minfo->len += len; - RETVALUE(ROK); + return ROK; } /* #ifdef SS_LOCKLESS_MEMORY */ @@ -2544,50 +2341,42 @@ Buffer *mBuf; */ -#ifdef ANSI -PUBLIC S16 SRemPreMsg +S16 SRemPreMsg ( Data *dataPtr, Buffer *mBuf ) -#else -PUBLIC S16 SRemPreMsg(dataPtr, mBuf) -Data *dataPtr; -Buffer *mBuf; -#endif { SsMsgInfo *minfo; Buffer *tmp; #ifdef T2K_MEM_LEAK_DBG char* file = __FILE__; - U32 line = __LINE__; + uint32_t line = __LINE__; #endif - TRC1(SRemPreMsg) - #if (ERRCLASS & ERRCLS_INT_PAR) /* check data pointer */ if (!dataPtr) { SSLOGERROR(ERRCLS_INT_PAR, ESS078, ERRZERO, "SRemPreMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check message buffer */ if (!mBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS079, ERRZERO, "SRemPreMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS080, ERRZERO, "SRemPreMsg : Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif if (!(tmp = mBuf->b_cont)) - RETVALUE(ROKDNA); + return (ROKDNA); /* get SsMsgInfo of mBuf */ minfo = (SsMsgInfo *) mBuf->b_rptr; @@ -2605,7 +2394,7 @@ Buffer *mBuf; if (!--minfo->len) minfo->endptr = NULLP; - RETVALUE(ROK); + return ROK; } /* @@ -2631,46 +2420,38 @@ Buffer *mBuf; */ -#ifdef ANSI -PUBLIC S16 SRemPstMsg +S16 SRemPstMsg ( Data *dataPtr, /* pointer to data */ Buffer *mBuf ) -#else -PUBLIC S16 SRemPstMsg(dataPtr, mBuf) -Data *dataPtr; /* pointer to data */ -Buffer *mBuf; /* message buffer */ -#endif { SsMsgInfo *minfo; Buffer *tmp; Buffer *last; #ifdef T2K_MEM_LEAK_DBG char* file = __FILE__; - U32 line = __LINE__; + uint32_t line = __LINE__; #endif - TRC1(SRemPstMsg) - #if (ERRCLASS & ERRCLS_INT_PAR) /* check data pointer */ if (dataPtr == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS081, ERRZERO, "SRemPstMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check message buffer */ if (mBuf == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS082, ERRZERO, "SRemPstMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS083, ERRZERO, "SRemPstMsg : Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -2678,7 +2459,7 @@ Buffer *mBuf; /* message buffer */ minfo = (SsMsgInfo*) mBuf->b_rptr; if (!(last = minfo->endptr)) - RETVALUE(ROKDNA); + return (ROKDNA); /* read databyte into dataPtr and decrement write ptr */ *dataPtr = *--last->b_wptr; @@ -2700,7 +2481,7 @@ Buffer *mBuf; /* message buffer */ /* update SsMsgInfo */ minfo->len--; - RETVALUE(ROK); + return ROK; } @@ -2733,29 +2514,21 @@ Buffer *mBuf; /* message buffer */ * */ -#ifdef ANSI -PUBLIC S16 SRemPreMsgMult +S16 SRemPreMsgMult ( Data *dst, /* destination */ MsgLen cnt, /* count */ Buffer *mBuf ) -#else -PUBLIC S16 SRemPreMsgMult(dst, cnt, mBuf) -Data *dst; /* destination */ -MsgLen cnt; /* count */ -Buffer *mBuf; /* message buffer */ -#endif { - SsMsgInfo *minfo; - Buffer *tmp; - MsgLen numBytes; + SsMsgInfo *minfo = NULLP; + Buffer *tmp = NULLP; + MsgLen numBytes =0; #ifdef T2K_MEM_LEAK_DBG char* file = __FILE__; - U32 line = __LINE__; + uint32_t line = __LINE__; #endif - TRC1(SRemPreMsgMult) /* ss023.103 - Modification of SRemPreMsgMult for bug fix */ @@ -2765,13 +2538,13 @@ Buffer *mBuf; /* message buffer */ { SSLOGERROR(ERRCLS_INT_PAR, ESS084, ERRZERO, "SRemPreMsgMult:Invalid\ count"); - RETVALUE(RFAILED); + return RFAILED; } /* check message buffer */ if (!mBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS085, ERRZERO, "SRemPreMsgMult:Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* ss021.103 - Addition to check for NULL pointer */ /* check data pointer */ @@ -2780,7 +2553,7 @@ Buffer *mBuf; /* message buffer */ { SSLOGERROR(ERRCLS_INT_PAR, ESS086, ERRZERO, "SRemPreMsgMult : Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -2789,7 +2562,7 @@ Buffer *mBuf; /* message buffer */ /* check if data present */ if (minfo->len < cnt) - RETVALUE(ROKDNA); + return (ROKDNA); else minfo->len -= cnt; @@ -2824,7 +2597,7 @@ Buffer *mBuf; /* message buffer */ if (!minfo->len) minfo->endptr = NULLP; - RETVALUE(ROK); + return ROK; } /* @@ -2856,19 +2629,12 @@ Buffer *mBuf; /* message buffer */ * */ -#ifdef ANSI -PUBLIC S16 SRemPstMsgMult +S16 SRemPstMsgMult ( Data *dst, /* destination */ MsgLen cnt, /* count */ Buffer *mBuf ) -#else -PUBLIC S16 SRemPstMsgMult(dst, cnt, mBuf) -Data *dst; /* destination */ -MsgLen cnt; /* count */ -Buffer *mBuf; /* message buffer */ -#endif { SsMsgInfo *minfo; Buffer *tmp; @@ -2878,10 +2644,9 @@ Buffer *mBuf; /* message buffer */ Data *cptr; #ifdef T2K_MEM_LEAK_DBG char* file = __FILE__; - U32 line = __LINE__; + uint32_t line = __LINE__; #endif - TRC1(SRemPstMsgMult) #if (ERRCLASS & ERRCLS_INT_PAR) /* check count */ @@ -2889,19 +2654,19 @@ Buffer *mBuf; /* message buffer */ { SSLOGERROR(ERRCLS_INT_PAR, ESS087, ERRZERO, "SRemPstMsgMult:Invalid\ count"); - RETVALUE(RFAILED); + return RFAILED; } /* check message buffer */ if (mBuf == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS088, ERRZERO, "SRemPstMsgMult:Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS089, ERRZERO, "SRemPstMsgMult : Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } /* ss021.103 - Addition to check dst data pointer */ /* check data pointer */ @@ -2913,7 +2678,7 @@ Buffer *mBuf; /* message buffer */ /* check if data present */ if (minfo->len < cnt) - RETVALUE(ROKDNA); + return (ROKDNA); else { minfo->len -= cnt; @@ -2960,7 +2725,7 @@ Buffer *mBuf; /* message buffer */ else minfo->endptr = prev; - RETVALUE(ROK); + return ROK; } /* @@ -2991,49 +2756,40 @@ Buffer *mBuf; /* message buffer */ */ -#ifdef ANSI -PUBLIC S16 SExamMsg +S16 SExamMsg ( Data *dataPtr, /* pointer to data */ Buffer *mBuf, /* message buffer */ MsgLen idx ) -#else -PUBLIC S16 SExamMsg(dataPtr, mBuf, idx) -Data *dataPtr; /* pointer to data */ -Buffer *mBuf; /* message buffer */ -MsgLen idx; /* index */ -#endif { SsMsgInfo *minfo; Buffer *tmp; - TRC1(SExamMsg) - #if (ERRCLASS & ERRCLS_INT_PAR) /* check data pointer */ if (!dataPtr) { SSLOGERROR(ERRCLS_INT_PAR, ESS090, ERRZERO, "SExamMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check message buffer */ if (!mBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS091, ERRZERO, "SExamMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check index */ if (idx < 0) { SSLOGERROR(ERRCLS_INT_PAR, ESS092, ERRZERO, "SExamMsg : Invalid Index"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS093, ERRZERO, "SExamMsg : Incorrect buffer\ type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -3042,7 +2798,7 @@ MsgLen idx; /* index */ if (minfo->len <= idx) { - RETVALUE(ROKDNA); + return (ROKDNA); } /* get the first SS_M_DATA blk */ @@ -3053,7 +2809,7 @@ MsgLen idx; /* index */ *dataPtr = *(tmp->b_rptr + idx); - RETVALUE(ROK); + return ROK; } @@ -3086,53 +2842,43 @@ MsgLen idx; /* index */ */ -#ifdef ANSI -PUBLIC S16 SGetDataFrmMsg +S16 SGetDataFrmMsg ( Buffer *mBuf, /* message buffer */ Data *dataPtr, /* pointer to data */ MsgLen idx, MsgLen dataLen ) -#else -PUBLIC S16 SGetDataFrmMsg(mBuf, dataPtr, idx, dataLen) -Buffer *mBuf; /* message buffer */ -Data *dataPtr; /* pointer to data */ -MsgLen idx; /* index */ -MsgLen dataLen; -#endif { SsMsgInfo *minfo; Buffer *tmp; MsgLen offSetLen; Data *tmpDataPtr = dataPtr; - TRC1(SGetDataFrmMsg) - #if (ERRCLASS & ERRCLS_INT_PAR) /* check data pointer */ if (!dataPtr) { SSLOGERROR(ERRCLS_INT_PAR, ESS090, ERRZERO, "SGetDataFrmMsg: Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check message buffer */ if (!mBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS091, ERRZERO, "SGetDataFrmMsg: Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check index */ if (idx < 0) { SSLOGERROR(ERRCLS_INT_PAR, ESS092, ERRZERO, "SGetDataFrmMsg: Invalid Index"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS093, ERRZERO, "SGetDataFrmMsg: Incorrect buffer\ type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -3141,7 +2887,7 @@ MsgLen dataLen; if (minfo->len <= (idx + dataLen) ) { - RETVALUE(ROKDNA); + return (ROKDNA); } /* get the first SS_M_DATA blk */ @@ -3150,7 +2896,7 @@ MsgLen dataLen; /* determine offset */ if(tmp == NULLP) { - RETVALUE(ROKDNA); + return (ROKDNA); } else { @@ -3168,12 +2914,12 @@ MsgLen dataLen; } if( tmp == NULLP ) { - RETVALUE(ROKDNA); + return (ROKDNA); } SMemCpy((Void *)tmpDataPtr, (Void *)(tmp->b_rptr + idx), (size_t)dataLen); } - RETVALUE(ROK); + return ROK; } /* End of SGetDataFrmMsg() */ /* @@ -3194,40 +2940,32 @@ MsgLen dataLen; */ -#ifdef ANSI -PUBLIC S16 SFndLenMsg +S16 SFndLenMsg ( REG1 Buffer *mBuf, /* message buffer */ MsgLen *lngPtr ) -#else -PUBLIC S16 SFndLenMsg(mBuf, lngPtr) -REG1 Buffer *mBuf; /* message buffer */ -MsgLen *lngPtr; /* pointer to length */ -#endif { SsMsgInfo *minfo; - TRC1(SFndLenMsg) - #if (ERRCLASS & ERRCLS_INT_PAR) /* check message buffer */ if (mBuf == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS094, ERRZERO, "SFndLenMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check length pointer */ if (lngPtr == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS095, ERRZERO, "SFndLenMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS096, ERRZERO, "SFndLenMsg : Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -3237,7 +2975,7 @@ MsgLen *lngPtr; /* pointer to length */ /* read length */ *lngPtr = minfo->len; - RETVALUE(ROK); + return ROK; } @@ -3280,28 +3018,21 @@ MsgLen *lngPtr; /* pointer to length */ * */ #ifdef T2K_MEM_LEAK_DBG -PUBLIC S16 SSegMsgNew +S16 SSegMsgNew ( Buffer *mBuf1, /* message 1 */ MsgLen idx, /* index */ Buffer **mBuf2, char* file, -U32 line +uint32_t line ) #else -#ifdef ANSI -PUBLIC S16 SSegMsg +S16 SSegMsg ( Buffer *mBuf1, /* message 1 */ MsgLen idx, /* index */ Buffer **mBuf2 ) -#else -PUBLIC S16 SSegMsg(mBuf1, idx, mBuf2) -Buffer *mBuf1; /* message 1 */ -MsgLen idx; /* index */ -Buffer **mBuf2; /* message 2 */ -#endif #endif { SsMsgInfo *minfo1; @@ -3310,31 +3041,30 @@ Buffer **mBuf2; /* message 2 */ Buffer *prev; Buffer *next; - TRC1(SSegMsg) #if (ERRCLASS & ERRCLS_INT_PAR) /* check message buffer 1 */ if (mBuf1 == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS097, ERRZERO, "SSegMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check message buffer 2 */ if (mBuf2 == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS098, ERRZERO, "SSegMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (idx < 0) { SSLOGERROR(ERRCLS_INT_PAR, ESS099, ERRZERO, "SSegMsg : Invalid index"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf1->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS100, ERRZERO, "SSegMsg : Incorrect buffer\ type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -3348,13 +3078,13 @@ Buffer **mBuf2; /* message 2 */ if (idx >= minfo1->len) { *mBuf2 = NULLP; - RETVALUE(ROKDNA); + return (ROKDNA); } /* allocate message buffer */ if (SGetMsg(minfo1->region, minfo1->pool, mBuf2) != ROK) { SSLOGERROR(ERRCLS_DEBUG, ESS101, ERRZERO, "SSegMsg : SGetMsg failed"); - RETVALUE(RFAILED); + return RFAILED; } /* get the SsMsgInfo of mBuf2 */ @@ -3376,7 +3106,7 @@ Buffer **mBuf2; /* message 2 */ minfo1->endptr = NULLP; mBuf1->b_cont = NULLP; - RETVALUE(ROK); + return ROK; } /* get the first SS_M_DATA blk */ @@ -3406,7 +3136,7 @@ Buffer **mBuf2; /* message 2 */ /* reset length */ minfo1->len += minfo2->len; (Void) SPutMsg(*mBuf2); - RETVALUE(ROUTRES); + return (ROUTRES); } (*mBuf2)->b_cont = next; @@ -3444,7 +3174,7 @@ Buffer **mBuf2; /* message 2 */ /* reset length */ minfo1->len += minfo2->len; (Void) SPutMsg(*mBuf2); - RETVALUE(ROUTRES); + return (ROUTRES); } (*mBuf2)->b_cont = next; tmp->b_wptr = tmp->b_rptr + idx; @@ -3468,7 +3198,7 @@ Buffer **mBuf2; /* message 2 */ #endif /*SS_MULTICORE_SUPPORT*/ } - RETVALUE(ROK); + return ROK; } /* @@ -3487,8 +3217,7 @@ Buffer **mBuf2; /* message 2 */ * */ -#ifdef ANSI -PUBLIC S16 SCpyFixMsg +S16 SCpyFixMsg ( Data *srcBuf, /* source buffer */ Buffer *dstMbuf, /* destination message buffer */ @@ -3496,51 +3225,41 @@ MsgLen dstIdx, /* destination index */ MsgLen cnt, /* count */ MsgLen *cCnt ) -#else -PUBLIC S16 SCpyFixMsg(srcBuf, dstMbuf, dstIdx, cnt, cCnt) -Data *srcBuf; /* source buffer */ -Buffer *dstMbuf; /* destination message buffer */ -MsgLen dstIdx; /* destination index */ -MsgLen cnt; /* count */ -MsgLen *cCnt; /* copied count */ -#endif { S16 ret; SsMsgInfo *minfo; Buffer *right; - TRC1(SCpyFixMsg) - #if (ERRCLASS & ERRCLS_INT_PAR) /* check source message buffer */ if (srcBuf == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS102, ERRZERO, "SCpyFixMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check destination message buffer */ if (dstMbuf == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS103, ERRZERO, "SCpyFixMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check copied count buffer */ if (cCnt == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS104, ERRZERO, "SCpyFixMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check copy count */ if (cnt <= 0) { SSLOGERROR(ERRCLS_INT_PAR, ESS105, ERRZERO, "SCpyFixMsg : Invalid count"); - RETVALUE(RFAILED); + return RFAILED; } if (dstMbuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS106, ERRZERO, "SCpyFixMsg : Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -3551,7 +3270,7 @@ MsgLen *cCnt; /* copied count */ #if (ERRCLASS & ERRCLS_DEBUG) SSLOGERROR(ERRCLS_DEBUG, ESS107, ERRZERO, "SCpyFixMsg : Invalid Index"); #endif - RETVALUE(RFAILED); + return RFAILED; } /* ss021.103 - Addition test if message length will exceed max msg length */ @@ -3565,7 +3284,7 @@ MsgLen *cCnt; /* copied count */ *cCnt = 0; SSLOGERROR(ERRCLS_INT_PAR, ESS108, ERRZERO, "SCpyFixMsg : msgLen + cnt > maxS16"); - RETVALUE(ROUTRES); + return (ROUTRES); } #endif @@ -3578,11 +3297,11 @@ MsgLen *cCnt; /* copied count */ SSLOGERROR(ERRCLS_DEBUG, ESS109, ERRZERO, "SCpyFixMsg : Failed in\ SAddPreMsgMult"); #endif - RETVALUE(ret); + return (ret); } *cCnt = cnt; - RETVALUE(ROK); + return ROK; } /* add data at the end of the dst buffer */ @@ -3590,17 +3309,17 @@ MsgLen *cCnt; /* copied count */ { if ((ret = SAddPstMsgMult(srcBuf, cnt, dstMbuf)) != ROK) { - RETVALUE(ret); + return (ret); } *cCnt = cnt; - RETVALUE(ROK); + return ROK; } /* segment the message into dstMbuf and right */ if ((ret = SSegMsg(dstMbuf, dstIdx, &right)) != ROK) { - RETVALUE(ret); + return (ret); } /* append data at the end of dstMbuf */ @@ -3608,7 +3327,7 @@ MsgLen *cCnt; /* copied count */ { /* ss020.103 - Addition for cleanup */ (Void) SPutMsg(right); - RETVALUE(ret); + return (ret); } /* cancatenate dstMbuf and right */ @@ -3616,14 +3335,14 @@ MsgLen *cCnt; /* copied count */ { /* ss020.103 - Addition for cleanup */ (Void) SPutMsg(right); - RETVALUE(ret); + return (ret); } *cCnt = cnt; (Void) SPutMsg(right); - RETVALUE(ROK); + return ROK; } /* @@ -3642,8 +3361,7 @@ MsgLen *cCnt; /* copied count */ * */ -#ifdef ANSI -PUBLIC S16 SCpyMsgFix +S16 SCpyMsgFix ( Buffer *srcMbuf, /* source message buffer */ MsgLen srcIdx, /* source index */ @@ -3651,56 +3369,46 @@ MsgLen cnt, /* count */ Data *dstBuf, /* destination buffer */ MsgLen *cCnt ) -#else -PUBLIC S16 SCpyMsgFix(srcMbuf, srcIdx, cnt, dstBuf, cCnt) -Buffer *srcMbuf; /* source message buffer */ -MsgLen srcIdx; /* source index */ -MsgLen cnt; /* count */ -Data *dstBuf; /* destination buffer */ -MsgLen *cCnt; /* copied count */ -#endif { - Data *cptr; - Buffer *tmp; - SsMsgInfo *minfo; - MsgLen numBytes; - - TRC1(SCpyMsgFix) + Data *cptr = NULLP; + Buffer *tmp = NULLP; + SsMsgInfo *minfo = NULLP; + MsgLen numBytes =0; #if (ERRCLASS & ERRCLS_INT_PAR) /* check source message buffer */ if (srcMbuf == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS110, ERRZERO, "SCpyMsgFix : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check destination message buffer */ if (dstBuf == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS111, ERRZERO, "SCpyMsgFix : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (cnt <= 0) { SSLOGERROR(ERRCLS_INT_PAR, ESS112, ERRZERO, "SCpyMsgFix : Invalid Index"); - RETVALUE(RFAILED); + return RFAILED; } if (srcIdx < 0) { SSLOGERROR(ERRCLS_INT_PAR, ESS113, ERRZERO, "SCpyMsgFix : Invalid Index"); - RETVALUE(RFAILED); + return RFAILED; } if (!cCnt) { SSLOGERROR(ERRCLS_INT_PAR, ESS114, ERRZERO, "SCpyMsgFix : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (srcMbuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS115, ERRZERO, "SCpyMsgFix : Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -3710,7 +3418,7 @@ MsgLen *cCnt; /* copied count */ if ((srcIdx + cnt) > minfo->len) { *cCnt = 0; - RETVALUE(ROKDNA); + return (ROKDNA); } /* get the first SS_M_DATA blk */ @@ -3751,7 +3459,7 @@ MsgLen *cCnt; /* copied count */ break; } - RETVALUE(ROK); + return ROK; } /* @@ -3772,31 +3480,23 @@ MsgLen *cCnt; /* copied count */ */ #ifdef T2K_MEM_LEAK_DBG -PUBLIC S16 SCpyMsgMsgNew +S16 SCpyMsgMsgNew ( Buffer *srcBuf, Region dstRegion, Pool dstPool, Buffer **dstBuf, char* file, -U32 line +uint32_t line ) #else -#ifdef ANSI -PUBLIC S16 SCpyMsgMsg +S16 SCpyMsgMsg ( Buffer *srcBuf, Region dstRegion, Pool dstPool, Buffer **dstBuf ) -#else -PUBLIC S16 SCpyMsgMsg(srcBuf, dstRegion, dstPool, dstBuf) -Buffer *srcBuf; -Region dstRegion; -Pool dstPool; -Buffer **dstBuf; -#endif #endif { SsMsgInfo *minfo1; @@ -3813,33 +3513,31 @@ Buffer **dstBuf; #endif #endif - TRC1(SCpyMsgMsg) - #if (ERRCLASS & ERRCLS_INT_PAR) if (!srcBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS116, ERRZERO, "SCpyMsgMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (srcBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS117, ERRZERO, "SCpyMsgMsg : Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } /* ss021.103 - Addition to validate region and pool */ if (dstRegion >= SS_MAX_REGS) { SSLOGERROR(ERRCLS_INT_PAR, ESS118, ERRZERO, "SCpyMsgMsg : Invalid region id"); - RETVALUE(RFAILED); + return RFAILED; } if (dstPool >= SS_MAX_POOLS_PER_REG) { SSLOGERROR(ERRCLS_INT_PAR, ESS119, ERRZERO, "SCpyMsgMsg : Invalid pool id"); - RETVALUE(RFAILED); + return RFAILED; } /* ss037.103 Removed the semaphore operation for performance enhancement */ @@ -3855,7 +3553,7 @@ Buffer **dstBuf; "Could not lock region table"); #endif - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -3869,12 +3567,12 @@ Buffer **dstBuf; #if (ERRCLASS & ERRCLS_DEBUG) SSLOGERROR(ERRCLS_DEBUG, ESS121, ERRZERO, "Could not release semaphore"); - RETVALUE(RFAILED); + return RFAILED; #endif } #endif SSLOGERROR(ERRCLS_INT_PAR, ESS122, dstRegion, "Region not registered"); - RETVALUE(RFAILED); + return RFAILED; } #endif /* ss037.103 Removed the semaphore operation for performance enhancement */ @@ -3885,7 +3583,7 @@ Buffer **dstBuf; #if (ERRCLASS & ERRCLS_DEBUG) SSLOGERROR(ERRCLS_DEBUG, ESS123, ERRZERO, "Could not release semaphore"); - RETVALUE(RFAILED); + return RFAILED; #endif } #endif @@ -3901,7 +3599,7 @@ Buffer **dstBuf; #if (ERRCLASS & ERRCLS_DEBUG) SSLOGERROR(ERRCLS_DEBUG, ESS124, ERRZERO, "SCpyMsgMsg : SGetMsg failed"); #endif - RETVALUE(RFAILED); + return RFAILED; } /* get the SsMsgInfo from srcBuf */ minfo1 = (SsMsgInfo*) srcBuf->b_rptr; @@ -3933,9 +3631,9 @@ Buffer **dstBuf; (Void) SPutDBuf(minfo1->region, minfo1->pool, newblk); newblk = curblk; } - printf("Failed to get the buffer of size %s %d\n", __FILE__, __LINE__); + printf("\nFailed to get the buffer of size %s %d\n", __FILE__, __LINE__); (Void) SPutMsg(*dstBuf); - RETVALUE(ROUTRES); + return (ROUTRES); } if (!prevblk) @@ -3953,7 +3651,7 @@ Buffer **dstBuf; minfo2->endptr = curblk; (*dstBuf)->b_cont = newblk; - RETVALUE(ROK); + return ROK; } @@ -3975,31 +3673,23 @@ Buffer **dstBuf; * */ #ifdef T2K_MEM_LEAK_DBG -PUBLIC S16 SAddMsgRefNew +S16 SAddMsgRefNew ( Buffer *srcBuf, Region dstRegion, Pool dstPool, Buffer **dstBuf, char* file, -U32 line +uint32_t line ) #else -#ifdef ANSI -PUBLIC S16 SAddMsgRef +S16 SAddMsgRef ( Buffer *srcBuf, Region dstRegion, Pool dstPool, Buffer **dstBuf ) -#else -PUBLIC S16 SAddMsgRef(srcBuf, dstRegion, dstPool, dstBuf) -Buffer *srcBuf; -Region dstRegion; -Pool dstPool; -Buffer **dstBuf; -#endif #endif { SsMsgInfo *minfo1; @@ -4012,19 +3702,18 @@ Buffer **dstBuf; Data *cptr; MsgLen numBytes; - TRC1(SAddMsgRef) #if (ERRCLASS & ERRCLS_INT_PAR) if (!srcBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS126, ERRZERO, "SAddMsgRef : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (srcBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS127, ERRZERO, "SAddMsgRef : Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif #ifdef XEON_SPECIFIC_CHANGES @@ -4038,7 +3727,7 @@ Buffer **dstBuf; #if (ERRCLASS & ERRCLS_DEBUG) SSLOGERROR(ERRCLS_DEBUG, ESS128, ERRZERO, "SAddMsgRef : SGetMsg failed"); #endif - RETVALUE(RFAILED); + return RFAILED; } /* get the SsMsgInfo from srcBuf */ minfo1 = (SsMsgInfo*) srcBuf->b_rptr; @@ -4073,7 +3762,7 @@ Buffer **dstBuf; newblk = curblk; } (Void) SPutMsg(*dstBuf); - RETVALUE(ROUTRES); + return (ROUTRES); } if (!prevblk) @@ -4091,7 +3780,7 @@ Buffer **dstBuf; minfo2->endptr = curblk; (*dstBuf)->b_cont = newblk; - RETVALUE(ROK); + return ROK; } /* allocate a data buffer */ @@ -4101,7 +3790,7 @@ Buffer **dstBuf; (Void) SPutMsg(*dstBuf); SSLOGERROR(ERRCLS_DEBUG, ESS129, ERRZERO, "SAddMsgRef : ssGetDBufOfSize\ failed"); - RETVALUE(ROUTRES); + return (ROUTRES); } dBuf->b_datap->db_type = SS_M_DATA; @@ -4118,7 +3807,7 @@ Buffer **dstBuf; minfo2->endptr = dBuf; (*dstBuf)->b_cont = dBuf; - RETVALUE(ROK); + return ROK; } /* ss012.13: Addition */ #ifdef SS_M_PROTO_REGION @@ -4140,46 +3829,38 @@ Buffer **dstBuf; * */ #ifdef T2K_MEM_LEAK_DBG -PRIVATE Buffer *DupMsgNew +static Buffer *DupMsgNew ( Region region, /* region id */ Buffer *mp, /* message block */ char* file, -U32 line +uint32_t line ) #else -#ifdef ANSI -PRIVATE Buffer *DupMsg +static Buffer *DupMsg ( Region region, /* region id */ Buffer *mp /* message block */ ) -#else -PRIVATE Buffer *DupMsg(region, mp) -Region region; /* region id */ -Buffer *mp; /* message block */ -#endif #endif { Buffer *bp; /* mblk for iteration */ S16 r; /* return value */ Size m; /* temporary */ - TRC1(DupMsg); - #if (ERRCLASS & ERRCLS_INT_PAR) if (mp == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS130, ERRZERO, "Null pointer"); - RETVALUE(NULLP); + return (NULLP); } if (region >= SS_MAX_REGS) { SSLOGERROR(ERRCLS_INT_PAR, ESS131, ERRZERO, "DupMsg : Invalid region\ id"); - RETVALUE(NULLP); + return (NULLP); } #endif @@ -4193,7 +3874,7 @@ Buffer *mp; /* message block */ #endif /* SS_MULTICORE_SUPPORT */ /* ss001.301: additions */ #ifdef SS_HISTOGRAM_SUPPORT - r = SAlloc(region, &m, 0, (Data **)&bp, __LINE__, (U8*) __FILE__, ENTNC); + r = SAlloc(region, &m, 0, (Data **)&bp, __LINE__, (uint8_t*) __FILE__, ENTNC); #else r = SAlloc(region, &m, 0, (Data **)&bp); #endif /* SS_HISTOGRAM_SUPPORT */ @@ -4203,16 +3884,16 @@ Buffer *mp; /* message block */ SSLOGERROR(ERRCLS_ADD_RES, ESS132, (ErrVal) r, "SAlloc() failed"); #endif - RETVALUE(NULLP); + return (NULLP); } /* generic set-up-message function */ #if 1 #ifndef SS_DBUF_REFLOCK_DISABLE - SS_STRM_INITB(bp, (SsDblk *)(((U8 *)bp) + sizeof(SsMblk)), NULLP, 0, NULLP); + SS_STRM_INITB(bp, (SsDblk *)(((uint8_t *)bp) + sizeof(SsMblk)), NULLP, 0, NULLP); #endif #else data = (Data *) (bp) + MDBSIZE; - SS_STRM_INITB(bp,(SsDblk *)(((U8 *)bp) + sizeof(SsMblk)), data, numBytes, NULLP); + SS_STRM_INITB(bp,(SsDblk *)(((uint8_t *)bp) + sizeof(SsMblk)), data, numBytes, NULLP); #endif /* SS_MULTICORE_SUPPORT */ @@ -4228,7 +3909,7 @@ Buffer *mp; /* message block */ { SSLOGERROR(ERRCLS_DEBUG, ESS335, ERRZERO, "Could not lock the mBuf Ref Lock"); - RETVALUE(NULLP); + return (NULLP); } #endif /* increment the reference count of the dblock */ @@ -4240,12 +3921,12 @@ Buffer *mp; /* message block */ { SSLOGERROR(ERRCLS_DEBUG, ESS335, ERRZERO, "Could not lock the mBuf Ref Lock"); - RETVALUE(NULLP); + return (NULLP); } #endif - RETVALUE(bp); + return (bp); } /* DupMsg */ #endif /* SS_M_PROTO_REGION */ @@ -4272,28 +3953,21 @@ Buffer *mp; /* message block */ */ #ifdef T2K_MEM_LEAK_DBG -PUBLIC S16 SGetDBufNew +S16 SGetDBufNew ( Region region, /* region id */ Pool pool, /* pool id */ Buffer **bufPtr, char* file, -U32 line +uint32_t line ) #else -#ifdef ANSI -PUBLIC S16 SGetDBuf +S16 SGetDBuf ( Region region, /* region id */ Pool pool, /* pool id */ Buffer **bufPtr ) -#else -PUBLIC S16 SGetDBuf(region, pool, bufPtr) -Region region; /* region id */ -Pool pool; /* pool id */ -Buffer **bufPtr; /* pointer to buffer */ -#endif #endif { Size size; @@ -4316,26 +3990,24 @@ Buffer **bufPtr; /* pointer to buffer */ #endif #endif - TRC1(SGetDBuf) - #if (ERRCLASS & ERRCLS_INT_PAR) /* check buffer pointer */ if (!bufPtr) { SSLOGERROR(ERRCLS_INT_PAR, ESS133, ERRZERO, "SGetDBuf : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (region >= SS_MAX_REGS) { SSLOGERROR(ERRCLS_INT_PAR, ESS134, ERRZERO, "SGetDBuf : Invalid region\ id"); - RETVALUE(RFAILED); + return RFAILED; } if (pool >= SS_MAX_POOLS_PER_REG) { SSLOGERROR(ERRCLS_INT_PAR, ESS135, ERRZERO, "SGetDBuf : Invalid pool id"); - RETVALUE(RFAILED); + return RFAILED; } /* ss037.103 Removed the semaphore operation for performance enhancement */ @@ -4351,7 +4023,7 @@ Buffer **bufPtr; /* pointer to buffer */ "Could not lock region table"); #endif - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -4368,12 +4040,12 @@ Buffer **bufPtr; /* pointer to buffer */ #if (ERRCLASS & ERRCLS_DEBUG) SSLOGERROR(ERRCLS_DEBUG, ESS137, ERRZERO, "Could not release semaphore"); - RETVALUE(RFAILED); + return RFAILED; #endif } #endif SSLOGERROR(ERRCLS_INT_PAR, ESS138, region, "Region not registered"); - RETVALUE(RFAILED); + return RFAILED; } #endif /* ss037.103 Removed the semaphore operation for performance enhancement */ @@ -4384,7 +4056,7 @@ Buffer **bufPtr; /* pointer to buffer */ #if (ERRCLASS & ERRCLS_DEBUG) SSLOGERROR(ERRCLS_DEBUG, ESS139, ERRZERO, "Could not release semaphore"); - RETVALUE(RFAILED); + return RFAILED; #endif } #endif @@ -4412,12 +4084,12 @@ Buffer **bufPtr; /* pointer to buffer */ /* ss006.301 : optimized this function */ /* ss001.301: additions */ #ifdef SS_HISTOGRAM_SUPPORT - if (SAlloc(region, &mdsize, 0, (Data **) bufPtr, __LINE__, (U8*) __FILE__, ENTNC) != ROK) + if (SAlloc(region, &mdsize, 0, (Data **) bufPtr, __LINE__, (uint8_t*) __FILE__, ENTNC) != ROK) #else if (SAlloc(region, &mdsize, 0, (Data **) bufPtr) != ROK) #endif /* SS_HISTOGRAM_SUPPORT */ { - RETVALUE(ROUTRES); + return (ROUTRES); } data = (Data *) (*bufPtr) + MDBSIZE; size = mdsize - MDBSIZE; @@ -4428,11 +4100,11 @@ Buffer **bufPtr; /* pointer to buffer */ #ifndef SS_DBUF_REFLOCK_DISABLE if((SInitLock (&(dptr->dBufLock), SS_LOCK_MUTEX)) != 0) { - printf("Falied to destroy lock\n"); + printf("\nFalied to destroy lock\n"); } #endif - RETVALUE(ROK); + return ROK; } /* @@ -4457,38 +4129,30 @@ Buffer **bufPtr; /* pointer to buffer */ */ #ifdef T2K_MEM_LEAK_DBG -PUBLIC S16 SPutDBufNew +S16 SPutDBufNew ( Region region, Pool pool, Buffer *buf, char* file, -U32 line +uint32_t line ) #else -#ifdef ANSI -PUBLIC S16 SPutDBuf +S16 SPutDBuf ( Region region, Pool pool, Buffer *buf ) -#else -PUBLIC S16 SPutDBuf(region, pool, buf) -Region region; -Pool pool; -Buffer *buf; -#endif #endif { - register SsDblk *dptr; + register SsDblk *dptr = NULLP; /* ss021.103 - Addition to check return value of SFree */ - S16 ret; + S16 ret = ROK; #if (defined(SS_USE_ZBC_MEMORY) && defined (TENB_DPDK_BUF)) - Data *dpdkBuf; + Data *dpdkBuf = NULLP; #endif - TRC2(SPutDBuf); /* ss021.103 - Addition of ret initialization */ ret = ROK; @@ -4497,26 +4161,26 @@ Buffer *buf; if (region >= SS_MAX_REGS) { SSLOGERROR(ERRCLS_INT_PAR, ESS141, ERRZERO, "SPutDBuf:Invalid region"); - RETVALUE(RFAILED); + return RFAILED; } if (pool >= SS_MAX_POOLS_PER_REG) { SSLOGERROR(ERRCLS_INT_PAR, ESS142, ERRZERO, "SPutDBuf:Invalid pool"); - RETVALUE(RFAILED); + return RFAILED; } if (buf == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS143, ERRZERO, "SPutDBuf:Null pointer"); - RETVALUE(RFAILED); + return RFAILED; } if ( (buf->b_datap->db_type != SS_M_DATA) && (buf->b_datap->db_type != SS_M_PROTO)) { SSLOGERROR(ERRCLS_INT_PAR, ESS144, ERRZERO, "SPutDBuf:Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif /* ss016.13: Addition */ @@ -4526,7 +4190,7 @@ Buffer *buf; if(dptr->db_type == SS_MEM_TYPE_SSI_ZBC) { ret = SPutZbcDBuf(region, buf); - RETVALUE(ret); + return (ret); } #ifdef TENB_DPDK_BUF @@ -4536,7 +4200,7 @@ Buffer *buf; SDetachDpdkPtrFrmDBuf(buf, &dpdkBuf); SPutSBufDpdk(dpdkBuf); ret = SFree(region, (Data *) buf, MDBSIZE); - RETVALUE(ret); + return (ret); } #endif /* TENB_DPDK_BUF */ #endif /* SS_USE_ZBC_MEMORY */ @@ -4552,7 +4216,7 @@ Buffer *buf; /* if the data block is not shared, free the buffer, checks not reqd */ #ifdef SS_HISTOGRAM_SUPPORT ret = SFree(region, (Data *) buf, MDBSIZE + dptr->db_lim - dptr->db_base - , __LINE__, (U8*) __FILE__, ENTNC); + , __LINE__, (uint8_t*) __FILE__, ENTNC); #else ret = SFree(region, (Data *) buf, MDBSIZE + dptr->db_lim - dptr->db_base); #endif /* SS_HISTOGRAM_SUPPORT */ @@ -4564,7 +4228,7 @@ Buffer *buf; { SSLOGERROR(ERRCLS_DEBUG, ESSXXX, ERRZERO, "Could not lock the mBuf Ref Lock"); - RETVALUE(RFAILED); + return RFAILED; } #endif --dptr->db_ref; @@ -4572,13 +4236,13 @@ Buffer *buf; if (buf != (SsMblk *) (((Data*) dptr) - MBSIZE)) { - SsDblk* dupdptr = (SsDblk *)((U8 *)buf + MBSIZE); + SsDblk* dupdptr = (SsDblk *)((uint8_t *)buf + MBSIZE); dupdptr->db_ref--; if(dupdptr->db_ref == 0) { #ifdef SS_HISTOGRAM_SUPPORT - ret = SFree(region, (Data *) buf, MDBSIZE, __LINE__, (U8*) __FILE__, ENTNC); + ret = SFree(region, (Data *) buf, MDBSIZE, __LINE__, (uint8_t*) __FILE__, ENTNC); #else ret = SFree(region, (Data *) buf, MDBSIZE); @@ -4593,17 +4257,17 @@ Buffer *buf; ret = SUnlock(&dptr->dBufLock) ; if((SDestroyLock(&dptr->dBufLock)) != 0) { - printf("Falied to destroy lock\n"); + printf("\nFalied to destroy lock\n"); } #endif /* free buffer to region */ #ifdef SS_HISTOGRAM_SUPPORT ret = SFree(region, (Data *) buf, MDBSIZE + dptr->db_lim - dptr->db_base - , __LINE__, (U8*) __FILE__, ENTNC); + , __LINE__, (uint8_t*) __FILE__, ENTNC); #else ret = SFree(region, (Data *) buf, MDBSIZE + dptr->db_lim - dptr->db_base); #endif /* SS_HISTOGRAM_SUPPORT */ - RETVALUE(ret); + return (ret); } #ifndef SS_DBUF_REFLOCK_DISABLE ret = SUnlock(&(dptr->dBufLock)); @@ -4613,12 +4277,12 @@ Buffer *buf; /* If MultiCore Support enabled, Dblk never be shared */ #ifdef SS_HISTOGRAM_SUPPORT ret = SFree(region, (Data *) buf, MDBSIZE + dptr->db_lim - dptr->db_base - , __LINE__, (U8*) __FILE__, ENTNC); + , __LINE__, (uint8_t*) __FILE__, ENTNC); #else ret = SFree(region, (Data *) buf, MDBSIZE + dptr->db_lim - dptr->db_base); #endif /* SS_HISTOGRAM_SUPPORT */ #endif /* SS_MULTICORE_SUPPORT */ - RETVALUE(ret); + return (ret); } @@ -4652,64 +4316,55 @@ Buffer *buf; */ -#ifdef ANSI -PUBLIC S16 SCatMsg +S16 SCatMsg ( Buffer *mBuf1, /* message 1 */ Buffer *mBuf2, /* message 2 */ Order order ) -#else -PUBLIC S16 SCatMsg(mBuf1, mBuf2, order) -Buffer *mBuf1; /* message 1 */ -Buffer *mBuf2; /* message 2 */ -Order order; /* order */ -#endif { SsMsgInfo *minfo1; SsMsgInfo *minfo2; Buffer *tmp; Buffer *newb; - TRC1(SCatMsg) - #if (ERRCLASS & ERRCLS_INT_PAR) /* check message buffer 1 */ if (mBuf1 == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS148, ERRZERO, "SCatMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check message buffer 2 */ if (mBuf2 == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS149, ERRZERO, "SCatMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* ss021.103 - Addition to test if same buffer */ /* check message buffer 1 and 2 not same buffer */ if (mBuf1 == mBuf2) { SSLOGERROR(ERRCLS_INT_PAR, ESS150, ERRZERO, "SCatMsg : mBuf1 == mBuf2"); - RETVALUE(RFAILED); + return RFAILED; } if ((order != M1M2) && (order != M2M1)) { SSLOGERROR(ERRCLS_INT_PAR, ESS151, ERRZERO, "SCatMsg : Invalid Order"); - RETVALUE(RFAILED); + return RFAILED; } if ((mBuf1->b_datap->db_type != SS_M_PROTO) || (mBuf2->b_datap->db_type != SS_M_PROTO)) { SSLOGERROR(ERRCLS_INT_PAR, ESS152, ERRZERO, "SCatMsg : Incorrect buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif /* no data to append or prepend */ if (!mBuf2->b_cont) - RETVALUE(ROK); + return ROK; minfo1 = (SsMsgInfo*) mBuf1->b_rptr; minfo2 = (SsMsgInfo*) mBuf2->b_rptr; @@ -4723,7 +4378,7 @@ Order order; /* order */ #endif { SSLOGERROR(ERRCLS_INT_PAR, ESS153, ERRZERO, "SCpyFixMsg : messages too big"); - RETVALUE(ROUTRES); + return (ROUTRES); } #endif @@ -4732,7 +4387,7 @@ Order order; /* order */ /* duplicate mBuf2 from the region/pool of mBuf1, initialise mBuf2 */ /*ss015.13: addition */ if (SCpyMsgMsg(mBuf2, minfo1->region, minfo1->pool, &newb) != ROK) - RETVALUE(RFAILED); + return RFAILED; minfo2 = (SsMsgInfo*) newb->b_rptr; } @@ -4767,7 +4422,7 @@ Order order; /* order */ #endif if (newb && (newb != mBuf2)) (Void) SPutMsg(newb); - RETVALUE(RFAILED); + return RFAILED; } } } @@ -4785,7 +4440,7 @@ Order order; /* order */ (Void) SInitMsg(mBuf2); } - RETVALUE(ROK); + return ROK; } /* @@ -4813,19 +4468,12 @@ Order order; /* order */ */ -#ifdef ANSI -PUBLIC S16 SRepMsg +S16 SRepMsg ( Data data, /* data */ Buffer *mBuf, /* message buffer */ MsgLen idx ) -#else -PUBLIC S16 SRepMsg(data, mBuf, idx) -Data data; /* data */ -Buffer *mBuf; /* message buffer */ -MsgLen idx; /* index */ -#endif { SsMsgInfo *minfo; Buffer *tmp; @@ -4833,29 +4481,28 @@ MsgLen idx; /* index */ Buffer *prev; MsgLen numBytes; - TRC1(SRepMsg) #ifdef T2K_MEM_LEAK_DBG char* file = __FILE__; - U32 line = __LINE__; + uint32_t line = __LINE__; #endif #if ( ERRCLASS & ERRCLS_INT_PAR) /* check message buffer */ if (mBuf == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS155, ERRZERO, "SRepMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (idx < 0) { SSLOGERROR(ERRCLS_INT_PAR, ESS156, ERRZERO, "SRepMsg : Invalid index"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS157, ERRZERO, "SRepMsg : Incorrect buffer\ type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -4864,7 +4511,7 @@ MsgLen idx; /* index */ /* if index > length of the buffer */ if (minfo->len <= idx) { - RETVALUE(ROKDNA); + return (ROKDNA); } tmp = mBuf->b_cont; /* get the first SS_M_DATA blk */ @@ -4881,7 +4528,7 @@ MsgLen idx; /* index */ { SSLOGERROR(ERRCLS_DEBUG, ESS158, ERRZERO, "SRepMsg : ssGetDBufOfSize\ failed"); - RETVALUE(RFAILED); + return RFAILED; } while (numBytes--) *newb->b_wptr++ = *tmp->b_rptr++; @@ -4897,7 +4544,7 @@ MsgLen idx; /* index */ } *(tmp->b_rptr + idx) = data; - RETVALUE(ROK); + return ROK; } /* @@ -4915,46 +4562,37 @@ MsgLen idx; /* index */ */ -#ifdef ANSI -PUBLIC S16 SUpdMsg +S16 SUpdMsg ( Buffer *mBuf, /* message buffer */ Buffer *dBuf, /* data buffer */ MsgLen dLen ) -#else -PUBLIC S16 SUpdMsg(mBuf, dBuf, dLen) -Buffer *mBuf; /* message buffer */ -Buffer *dBuf; /* data buffer */ -MsgLen dLen; /* data length */ -#endif { SsMsgInfo *minfo; - TRC1(SUpdMsg) - #if (ERRCLASS & ERRCLS_INT_PAR) if (!mBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS159, ERRZERO, "SUpdMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (!dBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS160, ERRZERO, "SUpdMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (dLen < 0) { SSLOGERROR(ERRCLS_INT_PAR, ESS161, ERRZERO, "SUpdMsg : Invalid length"); - RETVALUE(RFAILED); + return RFAILED; } if ((mBuf->b_datap->db_type != SS_M_PROTO) || (dBuf->b_datap->db_type != SS_M_DATA)) { SSLOGERROR(ERRCLS_INT_PAR, ESS162, ERRZERO, "SUpdMsg : Incorrect buffer\ type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -4967,7 +4605,7 @@ MsgLen dLen; /* data length */ if ((dBuf->b_rptr + dLen) > dBuf->b_datap->db_lim) { SSLOGERROR(ERRCLS_DEBUG, ESS163, ERRZERO, "SUpdMsg:Offset out of bounds"); - RETVALUE(RFAILED); + return RFAILED; } /* offset write ptr from read ptr by dLen */ @@ -4984,7 +4622,7 @@ MsgLen dLen; /* data length */ minfo->len += dLen; - RETVALUE(ROK); + return ROK; } /* @@ -5008,41 +4646,33 @@ MsgLen dLen; /* data length */ */ -#ifdef ANSI -PUBLIC S16 SAddDBufPst +S16 SAddDBufPst ( Buffer *mBuf, /* message buffer */ Buffer *dBuf ) -#else -PUBLIC S16 SAddDBufPst(mBuf, dBuf) -Buffer *mBuf; /* message buffer */ -Buffer *dBuf; /* data buffer */ -#endif { SsMsgInfo *minfo; - TRC1(SAddDBufPst) - #if (ERRCLASS & ERRCLS_INT_PAR) /* check buffer queue */ if (!mBuf || !dBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS164, ERRZERO, "SAddDBufPst : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if ((mBuf->b_datap->db_type != SS_M_PROTO) || (dBuf->b_datap->db_type != SS_M_DATA)) { SSLOGERROR(ERRCLS_INT_PAR, ESS165, ERRZERO, "SAddDBufPst : Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif /* no data, return */ if (dBuf->b_wptr == dBuf->b_rptr) - RETVALUE(ROK); + return ROK; minfo = (SsMsgInfo*) (mBuf)->b_rptr; @@ -5057,7 +4687,7 @@ Buffer *dBuf; /* data buffer */ minfo->len += dBuf->b_wptr - dBuf->b_rptr; - RETVALUE(ROK); + return ROK; } /* @@ -5081,42 +4711,34 @@ Buffer *dBuf; /* data buffer */ */ -#ifdef ANSI -PUBLIC S16 SAddDBufPre +S16 SAddDBufPre ( Buffer *mBuf, /* message buffer */ Buffer *dBuf ) -#else -PUBLIC S16 SAddDBufPre(mBuf, dBuf) -Buffer *mBuf; /* message buffer */ -Buffer *dBuf; /* data buffer */ -#endif { SsMsgInfo *minfo; Buffer *tmp; - TRC1(SAddDBufPre) - #if (ERRCLASS & ERRCLS_INT_PAR) /* check buffer queue */ if (!mBuf || !dBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS166, ERRZERO, "SAddDBufPre : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if ((mBuf->b_datap->db_type != SS_M_PROTO) || (dBuf->b_datap->db_type != SS_M_DATA)) { SSLOGERROR(ERRCLS_INT_PAR, ESS167, ERRZERO, "SAddDBufPre : Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif /* no data, return */ if (dBuf->b_wptr == dBuf->b_rptr) - RETVALUE(ROK); + return ROK; minfo = (SsMsgInfo*) (mBuf)->b_rptr; @@ -5131,7 +4753,7 @@ Buffer *dBuf; /* data buffer */ if (!tmp) minfo->endptr = dBuf; - RETVALUE(ROK); + return ROK; } /* @@ -5157,40 +4779,32 @@ Buffer *dBuf; /* data buffer */ */ -#ifdef ANSI -PUBLIC S16 SRemDBufPre +S16 SRemDBufPre ( Buffer *mBuf, /* message buffer */ Buffer **dBufPtr ) -#else -PUBLIC S16 SRemDBufPre(mBuf, dBufPtr) -Buffer *mBuf; /* message buffer */ -Buffer **dBufPtr; /* pointer to data buffer */ -#endif { SsMsgInfo *minfo; - TRC1(SRemDBufPre) - #if (ERRCLASS & ERRCLS_INT_PAR) /* check buffer pointer */ if (dBufPtr == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS168, ERRZERO, "SRemDBufPre : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check queue */ if (mBuf == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS169, ERRZERO, "SRemDBufPre : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS170, ERRZERO, "SRemDBufPre : Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -5208,7 +4822,7 @@ Buffer **dBufPtr; /* pointer to data buffer */ if (!(minfo->len -= (*dBufPtr)->b_wptr - (*dBufPtr)->b_rptr)) minfo->endptr = NULLP; - RETVALUE(ROK); + return ROK; } /* @@ -5234,41 +4848,33 @@ Buffer **dBufPtr; /* pointer to data buffer */ */ -#ifdef ANSI -PUBLIC S16 SRemDBufPst +S16 SRemDBufPst ( Buffer *mBuf, /* message buffer */ Buffer **dBufPtr ) -#else -PUBLIC S16 SRemDBufPst(mBuf, dBufPtr) -Buffer *mBuf; /* message buffer */ -Buffer **dBufPtr; /* pointer to data buffer */ -#endif { SsMsgInfo *minfo; Buffer *tmp; - TRC1(SRemDBufPst) - #if (ERRCLASS & ERRCLS_INT_PAR) /* check buffer pointer */ if (!dBufPtr) { SSLOGERROR(ERRCLS_INT_PAR, ESS171, ERRZERO, "SRemDBufPst : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check message */ if (!mBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS172, ERRZERO, "SRemDBufPst : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS173, ERRZERO, "SRemDBufPst : Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -5290,7 +4896,7 @@ Buffer **dBufPtr; /* pointer to data buffer */ else minfo->endptr = tmp; - RETVALUE(ROK); + return ROK; } /* @@ -5308,31 +4914,24 @@ Buffer **dBufPtr; /* pointer to data buffer */ */ -#ifdef ANSI -PUBLIC S16 SInitNxtDBuf +S16 SInitNxtDBuf ( Buffer *mBuf ) -#else -PUBLIC S16 SInitNxtDBuf(mBuf) -Buffer *mBuf; /* message buffer */ -#endif { SsMsgInfo *minfo; - TRC1(SInitNxtDBuf) - #if (ERRCLASS & ERRCLS_INT_PAR) if (!mBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS174, ERRZERO, "SInitNxtDBuf : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS175, ERRZERO, "SInitNxtDBuf : Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -5341,7 +4940,7 @@ Buffer *mBuf; /* message buffer */ /* set the next ptr of mBuf to point to the first SS_M_DATA blk */ minfo->next = mBuf->b_cont; - RETVALUE(ROK); + return ROK; } /* @@ -5359,38 +4958,30 @@ Buffer *mBuf; /* message buffer */ */ -#ifdef ANSI -PUBLIC S16 SGetNxtDBuf +S16 SGetNxtDBuf ( Buffer *mBuf, /* message buffer */ Buffer **dBuf ) -#else -PUBLIC S16 SGetNxtDBuf(mBuf, dBuf) -Buffer *mBuf; /* message buffer */ -Buffer **dBuf; /* data buffer return */ -#endif { SsMsgInfo *minfo; - TRC1(SGetNxtDBuf) - #if (ERRCLASS & ERRCLS_INT_PAR) if (!mBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS176, ERRZERO, "SGetNxtDBuf : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (!dBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS177, ERRZERO, "SGetNxtDBuf : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS178, ERRZERO, "SGetNxtDBuf : Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -5398,12 +4989,12 @@ Buffer **dBuf; /* data buffer return */ /* if next ptr of mBuf is NULLP, return */ if ((*dBuf = minfo->next) == NULLP) - RETVALUE(ROKDNA); + return (ROKDNA); /* update next */ minfo->next = (*dBuf)->b_cont; - RETVALUE(ROK); + return ROK; } /* @@ -5420,31 +5011,24 @@ Buffer **dBuf; /* data buffer return */ * */ -#ifdef ANSI -PUBLIC S16 SChkNxtDBuf +S16 SChkNxtDBuf ( Buffer *mBuf ) -#else -PUBLIC S16 SChkNxtDBuf(mBuf) -Buffer *mBuf; /* message buffer */ -#endif { SsMsgInfo *minfo; - TRC1(SChkNxtDBuf) - #if (ERRCLASS & ERRCLS_INT_PAR) if (!mBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS179, ERRZERO, "SChkNxtDBuf : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS180, ERRZERO, "SChkNxtDBuf : Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif /* ERRCLASS */ @@ -5452,9 +5036,9 @@ Buffer *mBuf; /* message buffer */ /* if next is valid, return ROK */ if (minfo->next) - RETVALUE(ROK); + return ROK; else - RETVALUE(ROKDNA); + return (ROKDNA); } /* @@ -5475,45 +5059,36 @@ Buffer *mBuf; /* message buffer */ */ -#ifdef ANSI -PUBLIC S16 SGetDataRx +S16 SGetDataRx ( Buffer *dBuf, /* data buffer */ MsgLen pad, /* pad */ Data **retDatPtr, /* return data pointer */ MsgLen *retDatLen ) -#else -PUBLIC S16 SGetDataRx(dBuf, pad, retDatPtr, retDatLen) -Buffer *dBuf; /* data buffer */ -MsgLen pad; /* pad */ -Data **retDatPtr; /* return data pointer */ -MsgLen *retDatLen; /* return data length */ -#endif { - TRC1(SGetDataRx) #if (ERRCLASS & ERRCLS_INT_PAR) if (!dBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS181, ERRZERO, "SGetDataRx : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (!retDatLen || (pad < 0)) { SSLOGERROR(ERRCLS_INT_PAR, ESS182, ERRZERO, "SGetDataRx : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (!retDatPtr) { SSLOGERROR(ERRCLS_INT_PAR, ESS183, ERRZERO, "SGetDataRx : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (dBuf->b_datap->db_type != SS_M_DATA) { SSLOGERROR(ERRCLS_INT_PAR, ESS184, ERRZERO, "SGetDataRx : Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif /* ERRCLASS */ @@ -5523,7 +5098,7 @@ MsgLen *retDatLen; /* return data length */ SSLOGERROR(ERRCLS_DEBUG, ESS185, ERRZERO, "SGetDataRx : Reference\ count > 1"); #endif - RETVALUE(RFAILED); + return RFAILED; } /* return the write ptr loc(with padding) if there is data to write to */ @@ -5535,10 +5110,10 @@ MsgLen *retDatLen; /* return data length */ #if (ERRCLASS & ERRCLS_DEBUG) SSLOGERROR(ERRCLS_DEBUG, ESS186, ERRZERO, "SGetDataRx:No data available"); #endif - RETVALUE(RFAILED); + return RFAILED; } - RETVALUE(ROK); + return ROK; } /* @@ -5559,46 +5134,38 @@ MsgLen *retDatLen; /* return data length */ */ -#ifdef ANSI -PUBLIC S16 SGetDataTx +S16 SGetDataTx ( Buffer *dBuf, /* data buffer */ Data **retDatPtr, /* return data pointer */ MsgLen *retDatLen /* return data length */ ) -#else -PUBLIC S16 SGetDataTx(dBuf, retDatPtr, retDatLen) -Buffer *dBuf; /* data buffer */ -Data **retDatPtr; /* return data pointer */ -MsgLen *retDatLen; /* return data length */ -#endif { - TRC1(SGetDataTx) #if (ERRCLASS & ERRCLS_INT_PAR) /* ss021.103 - Modification to check parameters */ if (!retDatPtr) { SSLOGERROR(ERRCLS_INT_PAR, ESS187, ERRZERO, "SGetDataTx : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (!dBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS188, ERRZERO, "SGetDataTx : Null Buffer"); *retDatPtr = (Data *)NULLP; - RETVALUE(RFAILED); + return RFAILED; } if (!retDatLen) { SSLOGERROR(ERRCLS_INT_PAR, ESS189, ERRZERO, "SGetDataTx : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (dBuf->b_datap->db_type != SS_M_DATA) { SSLOGERROR(ERRCLS_INT_PAR, ESS190, ERRZERO, "SGetDataTx : Incorrect\ buffer type"); *retDatPtr = (Data *)NULLP; - RETVALUE(RFAILED); + return RFAILED; } #endif /* ERRCLASS */ @@ -5611,10 +5178,10 @@ MsgLen *retDatLen; /* return data length */ #if (ERRCLASS & ERRCLS_DEBUG) SSLOGERROR(ERRCLS_DEBUG, ESS191, ERRZERO, "SGetDataTx : Buffer empty"); #endif - RETVALUE(RFAILED); + return RFAILED; } - RETVALUE(ROK); + return ROK; } #ifndef SS_ENABLE_MACROS @@ -5633,23 +5200,15 @@ MsgLen *retDatLen; /* return data length */ * File: ss_msg.c * */ -#ifdef ANSI -PUBLIC S16 SGetBufRegionPool +S16 SGetBufRegionPool ( Buffer *mBuf, /* message buffer */ Region *region, /* region */ Pool *pool /* pool */ ) -#else -PUBLIC S16 SGetBufRegionPool(mBuf, region, pool) -Buffer *mBuf; /* message buffer */ -Region *region; /* region */ -Pool *pool; /* pool */ -#endif { SsMsgInfo *mInfo; /* message info pointer */ - TRC1(SGetBufRegionPool) #if (ERRCLASS & ERRCLS_INT_PAR) @@ -5657,19 +5216,19 @@ Pool *pool; /* pool */ { SSLOGERROR(ERRCLS_INT_PAR, ESS192, ERRZERO, "SGetBufRegionPool : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if ((region == NULLP) && (pool == NULLP)) { SSLOGERROR(ERRCLS_INT_PAR, ESS193, ERRZERO, "SGetBufRegionPool : Null region and pool pointers"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS194, ERRZERO, "SUpdMsg : Incorrect buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif /* (ERRCLASS & ERRCLS_INT_PAR */ @@ -5680,7 +5239,7 @@ Pool *pool; /* pool */ SSLOGERROR(ERRCLS_DEBUG, ESS195, ERRZERO, "SGetBufRegionPool : mBuf's control data is null"); #endif - RETVALUE(RFAILED); + return RFAILED; } if (region != NULLP) @@ -5688,7 +5247,7 @@ Pool *pool; /* pool */ if (pool != NULLP) *pool = mInfo->pool; - RETVALUE(ROK); + return ROK; } /* end of SGetBufRegionPool */ #endif /* SS_ENABLE_MACROS */ @@ -5711,15 +5270,10 @@ Pool *pool; /* pool */ */ -#ifdef ANSI -PUBLIC S16 SCompressMsg +S16 SCompressMsg ( Buffer *mBuf ) -#else -PUBLIC S16 SCompressMsg(mBuf) -Buffer *mBuf; /* message buffer */ -#endif { SsMsgInfo *minfo; MsgLen numBytes; @@ -5730,21 +5284,20 @@ Buffer *mBuf; /* message buffer */ #ifdef T2K_MEM_LEAK_DBG char* file = __FILE__; - U32 line = __LINE__; + uint32_t line = __LINE__; #endif - TRC1(SCompressMsg) #if (ERRCLASS & ERRCLS_INT_PAR) if (!mBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS196, ERRZERO, "SCompressMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS197, ERRZERO, "SCompressMsg : Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -5752,7 +5305,7 @@ Buffer *mBuf; /* message buffer */ if ((tmp = mBuf->b_cont) == minfo->endptr) { - RETVALUE(ROK); + return ROK; } /* allocate a data buffer of size bytes*/ @@ -5760,7 +5313,7 @@ Buffer *mBuf; /* message buffer */ { SSLOGERROR(ERRCLS_DEBUG, ESS198, ERRZERO, "SAddMsgRef : ssGetDBufOfSize\ failed"); - RETVALUE(RFAILED); + return RFAILED; } dBuf->b_datap->db_type = SS_M_DATA; @@ -5787,7 +5340,7 @@ Buffer *mBuf; /* message buffer */ mBuf->b_cont = dBuf; minfo->endptr = dBuf; - RETVALUE(ROK); + return ROK; } /* @@ -5809,46 +5362,38 @@ Buffer *mBuf; /* message buffer */ * */ -#ifdef ANSI -PUBLIC S16 SPrntMsg +S16 SPrntMsg ( Buffer *mBuf, /* message buffer */ S16 src, /* source id */ S16 dst /* destination id */ ) -#else -PUBLIC S16 SPrntMsg(mBuf, src, dst) -Buffer *mBuf; /* message buffer */ -S16 src; /* source id */ -S16 dst; /* destination id */ -#endif { - QLen qlen; /* queue length */ - MsgLen mlen; /* message length */ + QLen qlen =0; /* queue length */ + MsgLen mlen =0; /* message length */ /* * SDeRegTTsk patch */ /* ss038.103 : 102061 Changed to MsgLen from S16 */ - MsgLen i; /* counter */ - S16 j; /* counter */ - S16 k; /* counter */ - U8 data; /* data */ - U8 tdata[16] = {0}; /* temporary data */ - S8 prntBuf[256]; /* print buffer */ - Buffer *tmp; /* buffer ptr */ - Data *cptr; + MsgLen i =0; /* counter */ + S16 j =0; /* counter */ + S16 k =0; /* counter */ + uint8_t data =0; /* data */ + uint8_t tdata[16] = {0}; /* temporary data */ + S8 prntBuf[256] ={0}; /* print buffer */ + Buffer *tmp = NULLP; /* buffer ptr */ + Data *cptr =NULLP; /* ss012.13: Addition */ - Data reg; + Data reg =0; - TRC1(SPrntMsg) if (mBuf == NULLP) { sprintf(prntBuf,"\nmsg: empty\n"); SPrint(prntBuf); SPrint( (S8*)"\n\n"); - RETVALUE(ROK); + return ROK; } for (qlen = 0, tmp = mBuf->b_cont; tmp; qlen++) @@ -5857,7 +5402,7 @@ S16 dst; /* destination id */ reg = ((SsMsgInfo*)(mBuf->b_rptr))->region; /*ss013.301: Fixed Warnings for 32/64 bit compilation*/ sprintf(prntBuf,"\nmsg: qlen: %04d mlen: %04d %02d-->%02d region: %02d\n", - (U16)qlen,(U16)mlen,src,dst,reg); + (uint16_t)qlen,(uint16_t)mlen,src,dst,reg); SPrint( prntBuf); #ifdef XEON_SPECIFIC_CHANGES printf("%s\n", prntBuf); @@ -5872,7 +5417,7 @@ S16 dst; /* destination id */ sprintf(prntBuf," empty\n"); SPrint(prntBuf); SPrint( (S8*)"\n\n"); - RETVALUE(ROK); + return ROK; } tmp = mBuf->b_cont; cptr = tmp->b_rptr; @@ -5887,7 +5432,7 @@ S16 dst; /* destination id */ { /* print hex */ tdata[j]=data; - sprintf( prntBuf,"%02x ",(U16) data); + sprintf( prntBuf,"%02x ",(uint16_t) data); SPrint( prntBuf); #ifdef XEON_SPECIFIC_CHANGES printf("%s\n", prntBuf); @@ -5940,7 +5485,7 @@ S16 dst; /* destination id */ printf("%s\n", prntBuf); #endif } - RETVALUE(ROK); + return ROK; } /* end of SPrntMsg */ @@ -5967,17 +5512,11 @@ S16 dst; /* destination id */ * File: ss_msg.c * */ -#ifdef ANSI -PUBLIC S16 SGetPstMsgMult +S16 SGetPstMsgMult ( MsgLen cnt, /* count */ Buffer *mBuf /* message buffer */ ) -#else -PUBLIC S16 SGetPstMsgMult(cnt, mBuf) -MsgLen cnt; /* count */ -Buffer *mBuf; /* message buffer */ -#endif { Buffer *tmp; Buffer *newb; @@ -5985,26 +5524,21 @@ Buffer *mBuf; /* message buffer */ MsgLen numBytes; MsgLen avail; -#if 0 - char* file = __FILE__; - U32 line = __LINE__; -#endif - TRC1(SGetPstMsgMult) #if ( ERRCLASS & ERRCLS_INT_PAR ) /* check message buffer */ if (mBuf == NULLP) { - RETVALUE(RFAILED); + return RFAILED; } /* check count */ if (cnt <= 0) { - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { - RETVALUE(RFAILED); + return RFAILED; } #endif /* get the message info */ @@ -6028,7 +5562,7 @@ Buffer *mBuf; /* message buffer */ tmp->b_wptr += numBytes; if (!cnt) - RETVALUE(ROK); + return ROK; } if (ssGetDBufOfSize(minfo->region, cnt, &newb) != ROK) { @@ -6036,7 +5570,7 @@ Buffer *mBuf; /* message buffer */ if ((avail) && (tmp)) tmp->b_wptr = tmp->b_datap->db_lim - avail; minfo->len -= avail; - RETVALUE(ROUTRES); + return (ROUTRES); } minfo->len += cnt; @@ -6056,7 +5590,7 @@ Buffer *mBuf; /* message buffer */ minfo->endptr = newb; - RETVALUE(ROK); + return ROK; } /* @@ -6076,45 +5610,39 @@ Buffer *mBuf; /* message buffer */ * File: ss_msg.c * */ -#ifdef ANSI -PUBLIC S16 SChkMsg +S16 SChkMsg ( Buffer *mBuf ) -#else -PUBLIC S16 SChkMsg(mBuf) -Buffer *mBuf; -#endif { SsMsgInfo *minfo; Buffer *tmp; - TRC1(SChkMsg) #if ( ERRCLASS & ERRCLS_INT_PAR ) /* check message buffer */ if (mBuf == NULLP) { - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { - RETVALUE(RFAILED); + return RFAILED; } #endif /* get the message info */ minfo = (SsMsgInfo *) (mBuf->b_rptr); if (minfo->len < 2) - RETVALUE(RFAILED); + return RFAILED; /* get the first M_DATA blk*/ tmp = mBuf->b_cont; if (((tmp->b_rptr + 2) <= tmp->b_wptr) || (SCompressMsg(mBuf) == ROK)) - RETVALUE(ROK); + return ROK; - RETVALUE(RFAILED); + return RFAILED; } /* @@ -6131,43 +5659,36 @@ Buffer *mBuf; * File: ss_msg.c * */ -#ifdef ANSI -PUBLIC S16 SAlignDBufEven +S16 SAlignDBufEven ( Buffer *dBuf /* data buffer */ ) -#else -PUBLIC S16 SAlignDBufEven(dBuf) -Buffer *dBuf; /* data buffer */ -#endif { MsgLen len; Data *src; - TRC1(SAlignDBufEven) - #if (ERRCLASS & ERRCLS_INT_PAR) if (!dBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS199, ERRZERO, "SAlignDBufEven : Null\ Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (dBuf->b_datap->db_type != SS_M_DATA) { SSLOGERROR(ERRCLS_INT_PAR, ESS200, ERRZERO, "SAlignDBufEven : Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif src = dBuf->b_rptr; /* ss008.13: addition */ if (!((PTR)src % (PTR)2)) - RETVALUE(ROK); + return ROK; if (dBuf->b_datap->db_ref > 1) - RETVALUE(RFAILED); + return RFAILED; len = dBuf->b_wptr - dBuf->b_rptr; @@ -6186,9 +5707,9 @@ Buffer *dBuf; /* data buffer */ *--dBuf->b_rptr = *src--; } else - RETVALUE(RFAILED); + return RFAILED; - RETVALUE(ROK); + return ROK; } /* ss004.13: addition */ @@ -6206,37 +5727,29 @@ Buffer *dBuf; /* data buffer */ * File: ss_msg.c * */ -#ifdef ANSI -PUBLIC S16 SAlignDBuf +S16 SAlignDBuf ( Buffer *dBuf, /* data buffer */ -U32 align /* alignemnt required */ +uint32_t align /* alignemnt required */ ) -#else -PUBLIC S16 SAlignDBuf(dBuf, align) -Buffer *dBuf; /* data buffer */ -U32 align; /* alignemnt required */ -#endif { MsgLen len; Data *src; - U32 upShift; /* no. of bytes to be shifted up */ - U32 downShift; /* no. of bytes to be shifted down */ - - TRC1(SAlignDBuf) + uint32_t upShift; /* no. of bytes to be shifted up */ + uint32_t downShift; /* no. of bytes to be shifted down */ #if (ERRCLASS & ERRCLS_INT_PAR) if (!dBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESS201, ERRZERO, "SAlignDBuf: Null\ Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (dBuf->b_datap->db_type != SS_M_DATA) { SSLOGERROR(ERRCLS_INT_PAR, ESS202, ERRZERO, "SAlignDBuf: Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -6246,10 +5759,10 @@ U32 align; /* alignemnt required */ * the read and write pointers */ if (!upShift) - RETVALUE(ROK); + return ROK; if (dBuf->b_datap->db_ref > 1) - RETVALUE(RFAILED); + return RFAILED; downShift = align - upShift; /* no of bytes by which to shift down * the read and write pointers */ @@ -6275,10 +5788,10 @@ U32 align; /* alignemnt required */ *--dBuf->b_rptr = *src--; } else - RETVALUE(RFAILED); + return RFAILED; } - RETVALUE(ROK); + return ROK; } @@ -6299,22 +5812,13 @@ U32 align; /* alignemnt required */ * File: ss_msg.c * */ -#ifdef ANSI -PUBLIC S16 SGetSMem +S16 SGetSMem ( Region region, /* region ID */ Size size, /* size */ Pool *pool /* pointer to pool ID */ ) -#else -PUBLIC S16 SGetSMem(region, size, pool) -Region region; /* region ID */ -Size size; /* size */ -Pool *pool; /* pointer to pool ID */ -#endif { - TRC1(SGetSMem); - UNUSED(size); @@ -6324,14 +5828,14 @@ Pool *pool; /* pointer to pool ID */ if (region >= SS_MAX_REGS) { SSLOGERROR(ERRCLS_INT_PAR, ESS203, region, "Invalid region"); - RETVALUE(RFAILED); + return RFAILED; } /* validate pointer to pool ID */ if (pool == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS204, region, "Null pointer"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -6340,7 +5844,7 @@ Pool *pool; /* pointer to pool ID */ *pool = 0; - RETVALUE(ROK); + return ROK; } @@ -6360,39 +5864,31 @@ Pool *pool; /* pointer to pool ID */ * File: ss_msg.c * */ -#ifdef ANSI -PUBLIC S16 SPutSMem +S16 SPutSMem ( Region region, /* region ID */ Pool pool /* pool ID */ ) -#else -PUBLIC S16 SPutSMem(region, pool) -Region region; /* region ID */ -Pool pool; /* pool ID */ -#endif { /* ss021.103 - Addition of return value */ #if (ERRCLASS & ERRCLS_INT_PAR) S16 ret; #endif - TRC1(SPutSMem); - #if (ERRCLASS & ERRCLS_INT_PAR) /* validate region ID */ if (region >= SS_MAX_REGS) { SSLOGERROR(ERRCLS_INT_PAR, ESS205, region, "Invalid region"); - RETVALUE(RFAILED); + return RFAILED; } /* validate pool ID */ if (pool >= SS_MAX_POOLS_PER_REG) { SSLOGERROR(ERRCLS_INT_PAR, ESS206, region, "Invalid pool"); - RETVALUE(RFAILED); + return RFAILED; } /* ss021.103 - Addition to check if region is registered */ @@ -6406,7 +5902,7 @@ Pool pool; /* pool ID */ "Could not lock region table"); #endif - RETVALUE(RFAILED); + return RFAILED; } @@ -6419,12 +5915,12 @@ Pool pool; /* pool ID */ #if (ERRCLASS & ERRCLS_DEBUG) SSLOGERROR(ERRCLS_DEBUG, ESS208, ERRZERO, "Could not release semaphore"); - RETVALUE(RFAILED); + return RFAILED; #endif } SSLOGERROR(ERRCLS_INT_PAR, ESS209, region, "Region not registered"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -6433,12 +5929,12 @@ Pool pool; /* pool ID */ #if (ERRCLASS & ERRCLS_DEBUG) SSLOGERROR(ERRCLS_DEBUG, ESS210, ERRZERO, "Could not release semaphore"); - RETVALUE(RFAILED); + return RFAILED; #endif } #endif - RETVALUE(ROK); + return ROK; } @@ -6456,47 +5952,38 @@ Pool pool; /* pool ID */ * File: ss_msg.c * */ -#ifdef ANSI -PUBLIC S16 SChkRes +S16 SChkRes ( Region region, /* region ID */ Pool pool, /* pool ID */ Status *status /* pointer to status */ ) -#else -PUBLIC S16 SChkRes(region, pool, status) -Region region; /* region ID */ -Pool pool; /* pool ID */ -Status *status; /* pointer to status */ -#endif { S16 ret; SMemCtl mctl; - TRC1(SChkRes); - #if (ERRCLASS & ERRCLS_INT_PAR) /* validate region ID */ if (region >= SS_MAX_REGS) { SSLOGERROR(ERRCLS_INT_PAR, ESS229, region, "Invalid region"); - RETVALUE(RFAILED); + return RFAILED; } /* validate pool ID */ if (pool >= SS_MAX_POOLS_PER_REG) { SSLOGERROR(ERRCLS_INT_PAR, ESS230, region, "Invalid pool"); - RETVALUE(RFAILED); + return RFAILED; } /* validate status pointer */ if (status == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS231, ERRZERO, "Null pointer"); - RETVALUE(RFAILED); + return RFAILED; } #endif /* ss037.103 Removed the semaphore operation for performance enhancement */ @@ -6512,7 +5999,7 @@ Status *status; /* pointer to status */ "Could not lock region table"); #endif - RETVALUE(RFAILED); + return RFAILED; } @@ -6527,19 +6014,19 @@ Status *status; /* pointer to status */ #if (ERRCLASS & ERRCLS_DEBUG) SSLOGERROR(ERRCLS_DEBUG, ESS233, ERRZERO, "Could not release semaphore"); - RETVALUE(RFAILED); + return RFAILED; #endif } SSLOGERROR(ERRCLS_INT_PAR, ESS234, region, "Region not registered"); - RETVALUE(RFAILED); + return RFAILED; } /* verify that this is a valid pool */ if (osCp.regionTbl[region].poolTbl[pool].type != SS_POOL_DYNAMIC) { SSLOGERROR(ERRCLS_DEBUG, ESS235, ERRZERO, "Invalid pool"); - RETVALUE(RFAILED); + return RFAILED; } #endif #endif @@ -6559,12 +6046,12 @@ Status *status; /* pointer to status */ #if (ERRCLASS & ERRCLS_DEBUG) SSLOGERROR(ERRCLS_DEBUG, ESS236, ERRZERO, "Could not release semaphore"); - RETVALUE(RFAILED); + return RFAILED; #endif } #endif - RETVALUE(ret); + return (ret); } /* @@ -6584,17 +6071,11 @@ Status *status; /* pointer to status */ */ -#ifdef ANSI -PUBLIC S16 SSwapMsg +S16 SSwapMsg ( Buffer *mBuf1, /* message 1 */ Buffer *mBuf2 /* message 2 */ ) -#else -PUBLIC S16 SSwapMsg(mBuf1, mBuf2) -Buffer *mBuf1; /* message 1 */ -Buffer *mBuf2; /* message 2 */ -#endif { SsMsgInfo *minfop; SsMsgInfo minfo; @@ -6603,34 +6084,33 @@ Buffer *mBuf2; /* message 2 */ SsMsgInfo *minfo2; #endif Buffer *tmp; - U8 tmp2; + uint8_t tmp2; - TRC1(SSwapMsg) #if (ERRCLASS & ERRCLS_INT_PAR) /* check message buffer 1 */ if (mBuf1 == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS237, ERRZERO, "SSwapMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check message buffer 2 */ if (mBuf2 == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS238, ERRZERO, "SSwapMsg : Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf1->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS239, ERRZERO, "SSwapMsg: Incorrect buffer\ type"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf2->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS240, ERRZERO, "SSwapMsg: Incorrect buffer\ type"); - RETVALUE(RFAILED); + return RFAILED; } minfo1 = (SsMsgInfo*) mBuf1->b_rptr; minfo2 = (SsMsgInfo*) mBuf2->b_rptr; @@ -6638,7 +6118,7 @@ Buffer *mBuf2; /* message 2 */ { SSLOGERROR(ERRCLS_INT_PAR, ESS241, ERRZERO, "SSwapMsg: differnt regions\ for messages"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -6673,7 +6153,7 @@ Buffer *mBuf2; /* message 2 */ SMemCpy((Void *) (mBuf1->b_datap->db_base), (Void *) (mBuf2->b_datap->db_base), (size_t)(sizeof(SsMsgInfo))); SMemCpy((Void *) (mBuf2->b_datap->db_base), (Void *) minfop, (size_t)(sizeof(SsMsgInfo))); - RETVALUE(ROK); + return ROK; } /* ss004.301 : Cavium changes */ #ifdef SS_SEUM_CAVIUM @@ -6696,15 +6176,10 @@ Buffer *mBuf2; /* message 2 */ * File: ss_msg.c * */ -#ifdef ANSI -PUBLIC S16 SConvPtrPhy +S16 SConvPtrPhy ( Buffer **mBuf ) -#else -PUBLIC S16 SConvPtrPhy (mBuf) - Buffer **mBuf; -#endif { Buffer *curPtr; @@ -6713,13 +6188,11 @@ PUBLIC S16 SConvPtrPhy (mBuf) SsDblk *dblkPtr; SsFrtn *frtnPtr; - TRC1(SConvPtrPhy); - /* check mBuf for NULLP */ if ( (mBuf == NULLP) || (*mBuf == NULLP ) ) { - RETVALUE(RFAILED); + return RFAILED; } /* first block in Buffer is head */ @@ -6754,9 +6227,9 @@ PUBLIC S16 SConvPtrPhy (mBuf) minfoPtr->next = (Buffer*)cvmx_ptr_to_phys (minfoPtr->next); } - curPtr->b_rptr = (U8*)cvmx_ptr_to_phys (curPtr->b_rptr); + curPtr->b_rptr = (uint8_t*)cvmx_ptr_to_phys (curPtr->b_rptr); - curPtr->b_wptr = (U8*)cvmx_ptr_to_phys (curPtr->b_wptr); + curPtr->b_wptr = (uint8_t*)cvmx_ptr_to_phys (curPtr->b_wptr); /* Convert the pointers of Dblock to Physical addr */ dblkPtr = (SsDblk*)curPtr->b_datap; @@ -6779,8 +6252,8 @@ PUBLIC S16 SConvPtrPhy (mBuf) } #endif - dblkPtr->db_base = (U8*)cvmx_ptr_to_phys (dblkPtr->db_base); - dblkPtr->db_lim = (U8*)cvmx_ptr_to_phys (dblkPtr->db_lim); + dblkPtr->db_base = (uint8_t*)cvmx_ptr_to_phys (dblkPtr->db_base); + dblkPtr->db_lim = (uint8_t*)cvmx_ptr_to_phys (dblkPtr->db_lim); curPtr->b_datap = (SsDblk*)cvmx_ptr_to_phys (curPtr->b_datap); @@ -6797,8 +6270,8 @@ PUBLIC S16 SConvPtrPhy (mBuf) curPtr->b_cont = (Buffer*)cvmx_ptr_to_phys (curPtr->b_cont); } - curPtr->b_rptr = (U8*)cvmx_ptr_to_phys (curPtr->b_rptr); - curPtr->b_wptr = (U8*)cvmx_ptr_to_phys (curPtr->b_wptr); + curPtr->b_rptr = (uint8_t*)cvmx_ptr_to_phys (curPtr->b_rptr); + curPtr->b_wptr = (uint8_t*)cvmx_ptr_to_phys (curPtr->b_wptr); /* Convert the pointers of Dblock to Physical addr */ dblkPtr = (SsDblk*)curPtr->b_datap; @@ -6821,8 +6294,8 @@ PUBLIC S16 SConvPtrPhy (mBuf) } #endif - dblkPtr->db_base = (U8*)cvmx_ptr_to_phys (dblkPtr->db_base); - dblkPtr->db_lim = (U8*)cvmx_ptr_to_phys (dblkPtr->db_lim); + dblkPtr->db_base = (uint8_t*)cvmx_ptr_to_phys (dblkPtr->db_base); + dblkPtr->db_lim = (uint8_t*)cvmx_ptr_to_phys (dblkPtr->db_lim); curPtr->b_datap = (SsDblk*)cvmx_ptr_to_phys (curPtr->b_datap); @@ -6832,7 +6305,7 @@ PUBLIC S16 SConvPtrPhy (mBuf) *mBuf = (Buffer*)cvmx_ptr_to_phys (*mBuf); - RETVALUE(ROK); + return ROK; } /* SConvPtrPhy */ @@ -6854,15 +6327,10 @@ PUBLIC S16 SConvPtrPhy (mBuf) * File: ss_msg.c * */ -#ifdef ANSI -PUBLIC S16 SConvPhyPtr +S16 SConvPhyPtr ( - Buffer **workPtr - ) -#else -PUBLIC S16 SConvPhyPtr (workPtr) - Buffer **workPtr; -#endif +Buffer **workPtr +) { Buffer *curPtr; @@ -6871,53 +6339,51 @@ PUBLIC S16 SConvPhyPtr (workPtr) SsDblk *dblkPtr; SsFrtn *frtnPtr; - TRC1(SConvPhyPtr); - /* check workPtr for NULLP */ if ( (workPtr == NULLP) || (*workPtr == NULLP) ) { - RETVALUE(RFAILED); + return RFAILED; } /* Convert the buffer address to pointer */ - mBuf = (Buffer*)cvmx_phys_to_ptr ((U64)(*workPtr)); + mBuf = (Buffer*)cvmx_phys_to_ptr ((uint64_t)(*workPtr)); curPtr = mBuf; /* first block is mblk */ if (curPtr->b_next) { - curPtr->b_next = (Buffer*)cvmx_phys_to_ptr ((U64)curPtr->b_next); + curPtr->b_next = (Buffer*)cvmx_phys_to_ptr ((uint64_t)curPtr->b_next); } if (curPtr->b_prev) { - curPtr->b_prev = (Buffer*)cvmx_phys_to_ptr ((U64)curPtr->b_prev); + curPtr->b_prev = (Buffer*)cvmx_phys_to_ptr ((uint64_t)curPtr->b_prev); } if(curPtr->b_cont) { - curPtr->b_cont = (Buffer*)cvmx_phys_to_ptr ((U64)curPtr->b_cont); + curPtr->b_cont = (Buffer*)cvmx_phys_to_ptr ((uint64_t)curPtr->b_cont); } - curPtr->b_rptr = (U8*)cvmx_phys_to_ptr ((U64)curPtr->b_rptr); + curPtr->b_rptr = (uint8_t*)cvmx_phys_to_ptr ((uint64_t)curPtr->b_rptr); /* Get the pointer for minfo */ minfoPtr = (SsMsgInfo*)curPtr->b_rptr; if (minfoPtr->endptr) { - minfoPtr->endptr = (Buffer*)cvmx_phys_to_ptr ((U64)minfoPtr->endptr); + minfoPtr->endptr = (Buffer*)cvmx_phys_to_ptr ((uint64_t)minfoPtr->endptr); } if (minfoPtr->next) { - minfoPtr->next = (Buffer*)cvmx_phys_to_ptr ((U64)minfoPtr->next); + minfoPtr->next = (Buffer*)cvmx_phys_to_ptr ((uint64_t)minfoPtr->next); } - curPtr->b_wptr = (U8*)cvmx_phys_to_ptr ((U64)curPtr->b_wptr); + curPtr->b_wptr = (uint8_t*)cvmx_phys_to_ptr ((uint64_t)curPtr->b_wptr); - curPtr->b_datap = (SsDblk*)cvmx_phys_to_ptr ((U64)curPtr->b_datap); + curPtr->b_datap = (SsDblk*)cvmx_phys_to_ptr ((uint64_t)curPtr->b_datap); /* Get the Dblock pointers */ dblkPtr = (SsDblk*)curPtr->b_datap; @@ -6926,22 +6392,22 @@ PUBLIC S16 SConvPhyPtr (workPtr) #ifdef SS_DBLK_FREE_RTN if (dblkPtr->db_frtnp) { - dblkPtr->db_frtnp = (SsFrtn*)cvmx_phys_to_ptr ((U64)dblkPtr->db_frtnp); + dblkPtr->db_frtnp = (SsFrtn*)cvmx_phys_to_ptr ((uint64_t)dblkPtr->db_frtnp); frtnPtr = dblkPtr->db_frtnp; if (frtnPtr->free_func) { - frtnPtr->free_func = cvmx_phys_to_ptr ((U64)frtnPtr->free_func); + frtnPtr->free_func = cvmx_phys_to_ptr ((uint64_t)frtnPtr->free_func); } if (frtnPtr->free_arg) { - frtnPtr->free_arg = (S8*)cvmx_phys_to_ptr ((U64)frtnPtr->free_arg); + frtnPtr->free_arg = (S8*)cvmx_phys_to_ptr ((uint64_t)frtnPtr->free_arg); } } #endif - dblkPtr->db_base = (U8*)cvmx_phys_to_ptr ((U64)dblkPtr->db_base); - dblkPtr->db_lim = (U8*)cvmx_phys_to_ptr ((U64)dblkPtr->db_lim); + dblkPtr->db_base = (uint8_t*)cvmx_phys_to_ptr ((uint64_t)dblkPtr->db_base); + dblkPtr->db_lim = (uint8_t*)cvmx_phys_to_ptr ((uint64_t)dblkPtr->db_lim); curPtr = curPtr->b_cont; @@ -6950,14 +6416,14 @@ PUBLIC S16 SConvPhyPtr (workPtr) { if(curPtr->b_cont) { - curPtr->b_cont = (Buffer*)cvmx_phys_to_ptr ((U64)curPtr->b_cont); + curPtr->b_cont = (Buffer*)cvmx_phys_to_ptr ((uint64_t)curPtr->b_cont); } - curPtr->b_rptr = (U8*)cvmx_phys_to_ptr ((U64)curPtr->b_rptr); + curPtr->b_rptr = (uint8_t*)cvmx_phys_to_ptr ((uint64_t)curPtr->b_rptr); - curPtr->b_wptr = (U8*)cvmx_phys_to_ptr ((U64)curPtr->b_wptr); + curPtr->b_wptr = (uint8_t*)cvmx_phys_to_ptr ((uint64_t)curPtr->b_wptr); - curPtr->b_datap = (SsDblk*)cvmx_phys_to_ptr ((U64)curPtr->b_datap); + curPtr->b_datap = (SsDblk*)cvmx_phys_to_ptr ((uint64_t)curPtr->b_datap); /* Get the Dblock pointers */ dblkPtr = (SsDblk*)curPtr->b_datap; @@ -6966,23 +6432,23 @@ PUBLIC S16 SConvPhyPtr (workPtr) #ifdef SS_DBLK_FREE_RTN if (dblkPtr->db_frtnp) { - dblkPtr->db_frtnp = (SsFrtn*)cvmx_phys_to_ptr ((U64)dblkPtr->db_frtnp); + dblkPtr->db_frtnp = (SsFrtn*)cvmx_phys_to_ptr ((uint64_t)dblkPtr->db_frtnp); frtnPtr = dblkPtr->db_frtnp; if (frtnPtr->free_func) { - frtnPtr->free_func = cvmx_phys_to_ptr ((U64)frtnPtr->free_func); + frtnPtr->free_func = cvmx_phys_to_ptr ((uint64_t)frtnPtr->free_func); } if (frtnPtr->free_arg) { - frtnPtr->free_arg = (S8*)cvmx_phys_to_ptr ((U64)frtnPtr->free_arg); + frtnPtr->free_arg = (S8*)cvmx_phys_to_ptr ((uint64_t)frtnPtr->free_arg); } } #endif - dblkPtr->db_base = (U8*)cvmx_phys_to_ptr ((U64)dblkPtr->db_base); - dblkPtr->db_lim = (U8*)cvmx_phys_to_ptr ((U64)dblkPtr->db_lim); + dblkPtr->db_base = (uint8_t*)cvmx_phys_to_ptr ((uint64_t)dblkPtr->db_base); + dblkPtr->db_lim = (uint8_t*)cvmx_phys_to_ptr ((uint64_t)dblkPtr->db_lim); curPtr = curPtr->b_cont; } @@ -6990,7 +6456,7 @@ PUBLIC S16 SConvPhyPtr (workPtr) /* Place the converted buffer */ *workPtr = mBuf; - RETVALUE(ROK); + return ROK; } /* SConvPhyPtr */ @@ -7012,21 +6478,13 @@ PUBLIC S16 SConvPhyPtr (workPtr) * File: * */ -#ifdef ANSI -PUBLIC S16 SCpyFpaMsg +S16 SCpyFpaMsg ( - Buffer *srcBuf, - Region dstRegion, - Pool dstPool, - Buffer **dstBuf - ) -#else -PUBLIC S16 SCpyFpaMsg (srcBuf, dstRegion, dstPool, dstBuf) - Buffer *srcBuf; - Region dstRegion; - Pool dstPool; - Buffer **dstBuf; -#endif +Buffer *srcBuf, +Region dstRegion, +Pool dstPool, +Buffer **dstBuf +) { Size numBytes; @@ -7042,19 +6500,17 @@ PUBLIC S16 SCpyFpaMsg (srcBuf, dstRegion, dstPool, dstBuf) SsDblk *dblkPtr = NULLP; SsDblk *dptr = NULLP; - TRC1(SCpyFpaMsg); - if ( srcBuf == (Buffer*)NULLP ) { - RETVALUE(RFAILED); + return RFAILED; } if ((dstRegion >= SS_MAX_REGS) || (dstPool >= SS_MAX_POOLS_PER_REG)) { /* Free the source buffer and return failure */ SPutFpaMsg(srcBuf); - RETVALUE(RFAILED); + return RFAILED; } /* Allocate memory for destination buffer */ @@ -7062,7 +6518,7 @@ PUBLIC S16 SCpyFpaMsg (srcBuf, dstRegion, dstPool, dstBuf) { /* Free the source buffer and return failure */ SPutFpaMsg(srcBuf); - RETVALUE(ROUTRES); + return (ROUTRES); } /* get the minfo of dest and src buffers */ @@ -7094,7 +6550,7 @@ PUBLIC S16 SCpyFpaMsg (srcBuf, dstRegion, dstPool, dstBuf) (Void) SPutMsg(*dstBuf); /* Free the source buffer and return failure */ SPutFpaMsg(srcBuf); - RETVALUE(ROUTRES); + return (ROUTRES); } dat = (Data *)tmpblk + MDBSIZE; @@ -7144,7 +6600,7 @@ PUBLIC S16 SCpyFpaMsg (srcBuf, dstRegion, dstPool, dstBuf) /* Free the source buffer after copying it */ SPutFpaMsg(srcBuf); - RETVALUE(ROK); + return ROK; } /* SCpyFpaMsg */ @@ -7167,17 +6623,11 @@ PUBLIC S16 SCpyFpaMsg (srcBuf, dstRegion, dstPool, dstBuf) * File: * */ -#ifdef ANSI -PUBLIC S16 SCpyMsgFpa +S16 SCpyMsgFpa ( - Buffer *srcBuf, - Buffer **dstBuf - ) -#else -PUBLIC S16 SCpyMsgFpa (srcBuf, dstBuf) - Buffer *srcBuf; - Buffer **dstBuf; -#endif +Buffer *srcBuf, +Buffer **dstBuf +) { Buffer *curPtr = NULLP; @@ -7189,15 +6639,13 @@ PUBLIC S16 SCpyMsgFpa (srcBuf, dstBuf) SsMsgInfo *minfoDst = NULLP; SsDblk *dblkPtr = NULLP; SsDblk *dptr = NULLP; - U32 numBytes; + uint32_t numBytes; Pool pool; - TRC1(SCpyMsgFpa); - if (srcBuf == (Buffer*)NULLP) { - RETVALUE(RFAILED); + return RFAILED; } *dstBuf = (Buffer*)cvmx_fpa_alloc(SS_CVMX_POOL_0); @@ -7206,7 +6654,7 @@ PUBLIC S16 SCpyMsgFpa (srcBuf, dstBuf) { /* Free the source buffer before returning */ SPutMsg(srcBuf); - RETVALUE(ROUTRES); + return (ROUTRES); } dat = (Data *)(*dstBuf) + MDBSIZE; @@ -7264,7 +6712,7 @@ PUBLIC S16 SCpyMsgFpa (srcBuf, dstBuf) SPutFpaMsg(*dstBuf); /* Free the source buffer before returning */ SPutMsg(srcBuf); - RETVALUE(RFAILED); + return RFAILED; } /* Allocate for mBuf and copy both the header and contents */ @@ -7278,7 +6726,7 @@ PUBLIC S16 SCpyMsgFpa (srcBuf, dstBuf) SPutFpaMsg(*dstBuf); /* Free the source buffer before returning */ SPutMsg(srcBuf); - RETVALUE(ROUTRES); + return (ROUTRES); } dat = (Data *)tmpblk + MDBSIZE; @@ -7329,7 +6777,7 @@ PUBLIC S16 SCpyMsgFpa (srcBuf, dstBuf) /* Free the source buffer after copying it */ SPutMsg(srcBuf); - RETVALUE(ROK); + return ROK; } /* SCpyMsgFpa */ @@ -7350,26 +6798,20 @@ PUBLIC S16 SCpyMsgFpa (srcBuf, dstBuf) * File: * */ -#ifdef ANSI -PUBLIC S16 SPutFpaMsg +S16 SPutFpaMsg ( - Buffer *fpaBuf +Buffer *fpaBuf ) -#else -PUBLIC S16 SPutFpaMsg(fpaBuf) -Buffer *fpaBuf; -#endif { - U16 size; + uint16_t size; Buffer *curBlk; Buffer *nextBlk; SsDblk *dblkPtr; - TRC1(SPutFpaMsg); if( fpaBuf == NULLP ) { - RETVALUE(ROK); + return ROK; } curBlk = fpaBuf->b_cont; @@ -7412,7 +6854,7 @@ Buffer *fpaBuf; cvmx_fpa_free(fpaBuf, SS_CVMX_POOL_0, 0); - RETVALUE(ROK); + return ROK; } /* SPutFpaMsg */ @@ -7437,21 +6879,13 @@ Buffer *fpaBuf; * */ -#ifdef ANSI -PUBLIC S16 SCpyPartMsg +S16 SCpyPartMsg ( Buffer *srcBuf, MsgLen idx, MsgLen cnt, Buffer *dstBuf ) -#else -PUBLIC S16 SCpyPartMsg(srcBuf, idx, cnt, dstBuf) -Buffer *srcBuf; -MsgLen idx; -MsgLen cnt; -Buffer *dstBuf; -#endif { SsMsgInfo *sMinfo; SsMsgInfo *dMinfo; @@ -7462,30 +6896,29 @@ Buffer *dstBuf; MsgLen dCnt; MsgLen numCpd; - TRC1(SCpyPartMsg) #if (ERRCLASS & ERRCLS_INT_PAR) if (!srcBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SCpyPartMsg : Null src Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (srcBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SCpyPartMsg : Incorrect\ src buffer type"); - RETVALUE(RFAILED); + return RFAILED; } if(!dstBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SCpyPartMsg : Null dst Buffer"); - RETVALUE(RFAILED); + return RFAILED; } if (dstBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SCpyPartMsg : Incorrect\ dst buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif /* (ERRCLASS & ERRCLS_INT_PAR) */ @@ -7497,7 +6930,7 @@ Buffer *dstBuf; { SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SCpyPartMsg : Incorrect\ idx value "); - RETVALUE(RFAILED); + return RFAILED; } sBuf = srcBuf->b_cont; @@ -7532,7 +6965,7 @@ Buffer *dstBuf; { SSLOGERROR(ERRCLS_DEBUG, ESS125, ERRZERO, "SCpyPartMsg : SGetDBuf\ failed"); - RETVALUE(ROUTRES); + return (ROUTRES); } dCnt = MIN(cnt, (dBuf->b_datap->db_lim - dBuf->b_datap->db_base)); dPrev->b_cont = dBuf; @@ -7585,7 +7018,7 @@ Buffer *dstBuf; dMinfo->len += numCpd; dMinfo->endptr = dBuf; - RETVALUE(ROK); + return ROK; } /* @@ -7604,21 +7037,13 @@ Buffer *dstBuf; * */ -#ifdef ANSI -PUBLIC S16 SRepPartMsg +S16 SRepPartMsg ( Buffer *srcBuf, MsgLen idx, MsgLen cnt, Buffer *dstBuf ) -#else -PUBLIC S16 SRepPartMsg(srcBuf, idx, cnt, dstBuf) -Buffer *srcBuf; -MsgLen idx; -MsgLen cnt; -Buffer *dstBuf; -#endif { SsMsgInfo *sMinfo; SsMsgInfo *dMinfo; @@ -7629,30 +7054,29 @@ Buffer *dstBuf; MsgLen sIdx; MsgLen cpBytes; - TRC1(SRepPartMsg) #if (ERRCLASS & ERRCLS_INT_PAR) if (!dstBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SRepPartMsg : Null dstBuf"); - RETVALUE(RFAILED); + return RFAILED; } if (dstBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SRepPartMsg : Incorrect\ dstBuf buffer type"); - RETVALUE(RFAILED); + return RFAILED; } if(!srcBuf) { SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SRepPartMsg : Null Src Buffer "); - RETVALUE(RFAILED); + return RFAILED; } if (srcBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SRepPartMsg : Incorrect\ sBuf buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif /* (ERRCLASS & ERRCLS_INT_PAR) */ @@ -7663,7 +7087,7 @@ Buffer *dstBuf; { SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SRepPartMsg : Incorrect\ cnt value "); - RETVALUE(RFAILED); + return RFAILED; } dBuf = dstBuf->b_cont; @@ -7706,10 +7130,10 @@ Buffer *dstBuf; { SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SRepPartMsg : unable to replace\ some bytes "); - RETVALUE(RFAILED); + return RFAILED; } - RETVALUE(ROK); + return ROK; } /* @@ -7747,19 +7171,12 @@ Buffer *dstBuf; */ -#ifdef ANSI -PUBLIC S16 SMovPartMsg +S16 SMovPartMsg ( Buffer *srcBuf, /* message 1 */ MsgLen idx, /* index */ Buffer *dstBuf /* message 2 */ ) -#else -PUBLIC S16 SMovPartMsg(srcBuf, idx, dstBuf) -Buffer *srcBuf; /* message 1 */ -MsgLen idx; /* index */ -Buffer *dstBuf; /* message 2 */ -#endif { MsgLen dCnt; MsgLen sCnt; @@ -7770,28 +7187,27 @@ Buffer *dstBuf; /* message 2 */ SsMsgInfo *dMinfo; #ifdef T2K_MEM_LEAK_DBG char* file = __FILE__; - U32 line = __LINE__; + uint32_t line = __LINE__; #endif - TRC1(SMovPartMsg) #if (ERRCLASS & ERRCLS_INT_PAR) /* check message buffer 1 */ if ((!srcBuf) || (!dstBuf )) { SSLOGERROR(ERRCLS_INT_PAR, ESS097, ERRZERO, "SMovPartMsg : Null Buffer (src or Dst)"); - RETVALUE(RFAILED); + return RFAILED; } if (idx < 0) { SSLOGERROR(ERRCLS_INT_PAR, ESS099, ERRZERO, "SMovPartMsg : Invalid index"); - RETVALUE(RFAILED); + return RFAILED; } if ((srcBuf->b_datap->db_type != SS_M_PROTO) || (dstBuf->b_datap->db_type != SS_M_PROTO)) { SSLOGERROR(ERRCLS_INT_PAR, ESS100, ERRZERO, "SMovPartMsg : Incorrect buffer\ type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -7805,7 +7221,7 @@ Buffer *dstBuf; /* message 2 */ /*-- ss008.301 */ if (idx > sMinfo->len) { - RETVALUE(ROKDNA); + return (ROKDNA); } /* one block might not sufficient - Check for generic implementation */ @@ -7827,7 +7243,7 @@ Buffer *dstBuf; /* message 2 */ { SSLOGERROR(ERRCLS_DEBUG, ESS125, ERRZERO, "SCpyMsgPartMsg : SGetDBuf\ failed"); - RETVALUE(ROUTRES); + return (ROUTRES); } dCnt = MIN(idx, (dBuf->b_datap->db_lim - dBuf->b_datap->db_base)); dPrev->b_cont = dBuf; @@ -7875,7 +7291,7 @@ Buffer *dstBuf; /* message 2 */ idx -= sCnt; /* deallocate the sBuf here */ tmp = sBuf->b_cont; - /* printf("SMovPartMsg() sBuf is completely copied sBuf->b_cont(%p)\n", sBuf->b_cont); */ + /* printf("\nSMovPartMsg() sBuf is completely copied sBuf->b_cont(%p)\n", sBuf->b_cont); */ (Void)SPutDBuf(sMinfo->region, sMinfo->pool, sBuf); srcBuf->b_cont = sBuf = tmp; } @@ -7888,10 +7304,10 @@ Buffer *dstBuf; /* message 2 */ dMinfo->len -= idx; SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SMovPartMsg : unable to copy\ some bytes "); - RETVALUE(RFAILED); + return RFAILED; } - RETVALUE(ROK); + return ROK; } /* @@ -7922,19 +7338,12 @@ Buffer *dstBuf; /* message 2 */ * */ -#ifdef ANSI -PUBLIC S16 SPkMsgMult +S16 SPkMsgMult ( Data *src, MsgLen cnt, Buffer *mBuf ) -#else -PUBLIC S16 SPkMsgMult(src, cnt, mBuf) -Data *src; -MsgLen cnt; -Buffer *mBuf; -#endif { SsMsgInfo *minfo; /* Message info */ Buffer *tmp; @@ -7942,33 +7351,32 @@ Buffer *mBuf; MsgLen numBytes; /* no. of bytes to be copied */ MsgLen offset; - TRC1(SPkMsgMult) #if (ERRCLASS & ERRCLS_INT_PAR) /* check message buffer */ if (mBuf == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS070, ERRZERO, "SPkMsgMult:Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check source */ if (src == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESS071, ERRZERO, "SPkMsgMult:Null Buffer"); - RETVALUE(RFAILED); + return RFAILED; } /* check count */ if (cnt <= 0) { SSLOGERROR(ERRCLS_INT_PAR, ESS072, ERRZERO, "SPkMsgMult: Invalid\ count"); - RETVALUE(RFAILED); + return RFAILED; } if (mBuf->b_datap->db_type != SS_M_PROTO) { SSLOGERROR(ERRCLS_INT_PAR, ESS073, ERRZERO, "SPkMsgMult: Incorrect\ buffer type"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -7993,36 +7401,31 @@ Buffer *mBuf; /* update the read ptr */ tmp->b_rptr -= numBytes; /* copy data */ - memcpy((U8*)tmp->b_rptr, (src + cnt), numBytes); + memcpy(tmp->b_rptr, (src + cnt), numBytes); minfo->len += numBytes; if (!cnt) { - RETVALUE(ROK); + return ROK; } } -#if 0 - char * file = __FILE__; - U32 line = __LINE__; -#endif - /* allocate a DBlk minimum of size Cnt to pack the data */ newblk = NULLP; if (ssGetDBufOfSize(minfo->region, cnt, &newblk) != ROK) { - RETVALUE(ROUTRES); + return (ROUTRES); } newblk->b_datap->db_type = SS_M_DATA; newblk->b_rptr = newblk->b_datap->db_lim - cnt; newblk->b_wptr = newblk->b_datap->db_lim; - memcpy((U8*)newblk->b_rptr, src, cnt); + memcpy(newblk->b_rptr, src, cnt); /* attach the newblk chain into mBuf */ newblk->b_cont = tmp; mBuf->b_cont = newblk; minfo->len += cnt; minfo->endptr = newblk; - RETVALUE(ROK); + return ROK; } /* ss006.301 : new buffer management APIs, end */ /* @@ -8039,19 +7442,12 @@ Buffer *mBuf; * File: ss_msg.c * */ -#ifdef ANSI -PUBLIC S16 SGetReadPtr +S16 SGetReadPtr ( - Buffer *mBuf, - U8** data, - MsgLen *len +Buffer *mBuf, +uint8_t** data, +MsgLen *len ) -#else -PUBLIC S16 SGetReadPtr (mBuf, data, len) -Buffer *mBuf; -U8** data; -MsgLen *len; -#endif { /* Buffer *tmp; */ @@ -8066,7 +7462,7 @@ MsgLen *len; *len = 0; } - RETVALUE(ROK); + return ROK; } #ifdef SS_USE_ZBC_MEMORY /* @@ -8089,7 +7485,7 @@ MsgLen *len; */ #ifdef T2K_MEM_LEAK_DBG -PUBLIC S16 SAttachPtrToBufNew +S16 SAttachPtrToBufNew ( Region region, Pool pool, @@ -8097,11 +7493,10 @@ Data *ptr, MsgLen totalLen, Buffer** mBuf, char* file, -U32 line +uint32_t line ) #else -#ifdef ANSI -PUBLIC S16 SAttachPtrToBuf +S16 SAttachPtrToBuf ( Region region, Pool pool, @@ -8109,14 +7504,6 @@ Data *ptr, MsgLen totalLen, Buffer** mBuf ) -#else -PUBLIC S16 SAttachPtrToBuf(region, pool, ptr, totalLen, mBuf) -Region region; -Pool pool; -Data *ptr; -MsgLen totalLen; -Buffer** mBuf; -#endif #endif { SsMsgInfo *minfo; /* Message info */ @@ -8125,13 +7512,12 @@ Buffer** mBuf; Buffer *newblk; /* Void *iccHdlr; */ - TRC1(SAttachPtrToBuf) #if (ERRCLASS & ERRCLS_INT_PAR) if (ptr == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SAttachPtrToBuf: Null PTR"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -8141,20 +7527,20 @@ Buffer** mBuf; if(SGetMsg(region, pool, mBuf) != ROK) { SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SAttachPtrToBuf: SGetMsg Failed"); - RETVALUE(ROUTRES); + return (ROUTRES); } mdsize = MDBSIZE; #ifdef SS_HISTOGRAM_SUPPORT - if (SAlloc(region, &mdsize, 0, (Data **) &newblk, __LINE__, (U8*) __FILE__, ENTNC) != ROK) + if (SAlloc(region, &mdsize, 0, (Data **) &newblk, __LINE__, (uint8_t*) __FILE__, ENTNC) != ROK) #else if (SAlloc(region, &mdsize, 0, (Data **) &newblk) != ROK) #endif /* SS_HISTOGRAM_SUPPORT */ { SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SAttachPtrToBuf: SAlloc Failed"); SPutMsg(*mBuf); - RETVALUE(ROUTRES); + return (ROUTRES); } (*mBuf)->b_cont = newblk; @@ -8172,7 +7558,7 @@ Buffer** mBuf; #ifndef SS_DBUF_REFLOCK_DISABLE if((SInitLock (&(dptr->dBufLock), SS_LOCK_MUTEX)) != 0) { - printf("Falied to destroy lock\n"); + printf("\nFalied to destroy lock\n"); } #endif @@ -8183,7 +7569,7 @@ Buffer** mBuf; minfo->len = totalLen; minfo->endptr = newblk; - RETVALUE(ROK); + return ROK; } /* @@ -8203,32 +7589,25 @@ Buffer** mBuf; */ #ifdef T2K_MEM_LEAK_DBG -PRIVATE S16 SPutZbcDBufNew +static S16 SPutZbcDBufNew ( Region region, Buffer *buf, char* file, -U32 line +uint32_t line ) #else -#ifdef ANSI -PRIVATE S16 SPutZbcDBuf +static S16 SPutZbcDBuf ( Region region, Buffer *buf ) -#else -PRIVATE S16 SPutZbcDBuf(region, buf) -Region region; -Buffer *buf; -#endif #endif { register SsDblk *dptr; MsgLen bufLen; S16 ret = ROK; - TRC2(SPutZbcDBuf); dptr = buf->b_datap; /* Get the length of the buffer */ @@ -8246,14 +7625,14 @@ Buffer *buf; #ifdef SS_HISTOGRAM_SUPPORT ret = SFree(region, (Data *) buf->b_datap->db_base, bufLen, __LINE__, - (U8*) __FILE__, ENTNC); + (uint8_t*) __FILE__, ENTNC); #else ret = SFree(region, (Data *) buf->b_datap->db_base, bufLen); #endif /* SS_HISTOGRAM_SUPPORT */ /* if the data block is not shared, free the buffer, checks not reqd */ #ifdef SS_HISTOGRAM_SUPPORT - ret = SFree(region, (Data *) buf, MDBSIZE, __LINE__, (U8*) __FILE__, + ret = SFree(region, (Data *) buf, MDBSIZE, __LINE__, (uint8_t*) __FILE__, ENTNC); #else ret = SFree(region, (Data *) buf, MDBSIZE); @@ -8268,7 +7647,7 @@ Buffer *buf; { SSLOGERROR(ERRCLS_DEBUG, ESSXXX, ERRZERO, "Could not lock the mBuf Ref Lock"); - RETVALUE(RFAILED); + return RFAILED; } #endif --dptr->db_ref; @@ -8276,7 +7655,7 @@ Buffer *buf; if (buf != (SsMblk *) (((Data*) dptr) - MBSIZE)) { #ifdef SS_HISTOGRAM_SUPPORT - ret = SFree(region, (Data *) buf, MDBSIZE, __LINE__, (U8*) __FILE__, ENTNC); + ret = SFree(region, (Data *) buf, MDBSIZE, __LINE__, (uint8_t*) __FILE__, ENTNC); #else ret = SFree(region, (Data *) buf, MDBSIZE); #endif /* SS_HISTOGRAM_SUPPORT */ @@ -8289,30 +7668,30 @@ Buffer *buf; ret = SUnlock(&dptr->dBufLock) ; if((SDestroyLock(&dptr->dBufLock)) != 0) { - printf("Falied to destroy lock\n"); + printf("\nFalied to destroy lock\n"); } #endif #ifdef SS_HISTOGRAM_SUPPORT ret = SFree(region, (Data *) buf->b_datap->db_base, bufLen, __LINE__, - (U8*) __FILE__, ENTNC); + (uint8_t*) __FILE__, ENTNC); #else ret = SFree(region, (Data *) buf->b_datap->db_base, bufLen); #endif /* SS_HISTOGRAM_SUPPORT */ #ifdef SS_HISTOGRAM_SUPPORT - ret = SFree(region, (Data *) buf, MDBSIZE, __LINE__, (U8*) __FILE__, + ret = SFree(region, (Data *) buf, MDBSIZE, __LINE__, (uint8_t*) __FILE__, ENTNC); #else ret = SFree(region, (Data *) buf, MDBSIZE); #endif /* SS_HISTOGRAM_SUPPORT */ - RETVALUE(ret); + return (ret); } #ifndef SS_DBUF_REFLOCK_DISABLE ret = SUnlock(&(dptr->dBufLock)); #endif } - RETVALUE(ret); + return (ret); } #endif /* SS_USE_ZBC_MEMORY */ @@ -8337,7 +7716,7 @@ Buffer *buf; * */ #ifdef T2K_MEM_LEAK_DBG -PUBLIC S16 SAttachPtrToMBuf1 +S16 SAttachPtrToMBuf1 ( Region region, Pool pool, @@ -8346,11 +7725,10 @@ MsgLen totalLen, MsgLen ptrLen, Buffer** mBuf, char* file, -U32 line +uint32_t line ) #else -#ifdef ANSI -PUBLIC S16 SAttachPtrToMBuf +S16 SAttachPtrToMBuf ( Region region, Pool pool, @@ -8359,15 +7737,6 @@ MsgLen totalLen, MsgLen ptrLen, Buffer** mBuf ) -#else -PUBLIC S16 SAttachPtrToMBuf(region, pool, ptr, totalLen, ptrLen, mBuf) -Region region; -Pool pool; -Data *ptr; -MsgLen totalLen; -MsgLen ptrLen; -Buffer** mBuf; -#endif #endif { SsMsgInfo *minfo; /* Message info */ @@ -8376,34 +7745,33 @@ Buffer** mBuf; Buffer *newblk; /* Void *iccHdlr; */ - TRC1(SAttachPtrToMBuf) #if (ERRCLASS & ERRCLS_INT_PAR) if (ptr == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SAttachPtrToBuf: Null PTR"); - RETVALUE(RFAILED); + return RFAILED; } #endif if(SGetMsg(region, pool, mBuf) != ROK) { SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SAttachPtrToBuf: SGetMsg Failed"); - RETVALUE(ROUTRES); + return (ROUTRES); } region = 0; mdsize = MDBSIZE; #ifdef SS_HISTOGRAM_SUPPORT - if (SAlloc(region, &mdsize, 0, (Data **) &newblk, __LINE__, (U8*) __FILE__, ENTNC) != ROK) + if (SAlloc(region, &mdsize, 0, (Data **) &newblk, __LINE__, (uint8_t*) __FILE__, ENTNC) != ROK) #else if (SAlloc(region, &mdsize, 0, (Data **) &newblk) != ROK) #endif /* SS_HISTOGRAM_SUPPORT */ { SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SAttachPtrToBuf: SAlloc Failed"); SPutMsg(*mBuf); - RETVALUE(ROUTRES); + return (ROUTRES); } (*mBuf)->b_cont = newblk; @@ -8421,7 +7789,7 @@ Buffer** mBuf; #ifndef SS_DBUF_REFLOCK_DISABLE if((SInitLock (&(dptr->dBufLock), SS_LOCK_MUTEX)) != 0) { - printf("Falied to destroy lock\n"); + printf("\nFalied to destroy lock\n"); } #endif @@ -8432,21 +7800,21 @@ Buffer** mBuf; minfo->len = totalLen; minfo->endptr = newblk; - //printf("Mbuf PTR = %x, DBlk PTR = %x, PTR = %x\n", *mBuf, newblk, ptr); - RETVALUE(ROK); + //printf("\nMbuf PTR = %x, DBlk PTR = %x, PTR = %x\n", *mBuf, newblk, ptr); + return ROK; } #endif /* INTEL_WLS */ -PUBLIC S16 SIncMsgRef(Buffer *srcBuf,Region dstRegion, Pool dstPool,Buffer **dstBuf) +S16 SIncMsgRef(Buffer *srcBuf,Region dstRegion, Pool dstPool,Buffer **dstBuf) { #ifndef L2_OPTMZ - RETVALUE(SAddMsgRef(srcBuf,dstRegion, dstPool,dstBuf)); + return (SAddMsgRef(srcBuf,dstRegion, dstPool,dstBuf)); #else *dstBuf = srcBuf; #endif - RETVALUE(ROK); + return ROK; } #ifdef L2_OPTMZ -PUBLIC Void SResetMBuf(Buffer *mbuf) +Void SResetMBuf(Buffer *mbuf) { SsMsgInfo *minfo; Buffer *tmp; @@ -8460,7 +7828,7 @@ PUBLIC Void SResetMBuf(Buffer *mbuf) if(tmp) { - // printf("SResetMBuf The write & read ptr is %p %p %p %p \n", tmp->b_wptr, tmp->b_rptr, tmp->b_datap->db_base, tmp->b_datap->db_lim ); + // printf("\nSResetMBuf The write & read ptr is %p %p %p %p \n", tmp->b_wptr, tmp->b_rptr, tmp->b_datap->db_base, tmp->b_datap->db_lim ); // tmp->b_wptr = tmp->b_rptr = tmp->b_datap->db_base; tmp->b_wptr = tmp->b_rptr = (tmp->b_datap->db_base + 5); tmp->b_datap->db_ref = 1; @@ -8469,7 +7837,7 @@ PUBLIC Void SResetMBuf(Buffer *mbuf) #endif - RETVOID; + return; } #endif @@ -8493,7 +7861,7 @@ PUBLIC Void SResetMBuf(Buffer *mbuf) * */ #ifdef T2K_MEM_LEAK_DBG -PUBLIC S16 SAttachWlsPtrToMBuf1 +S16 SAttachWlsPtrToMBuf1 ( Region region, Pool pool, @@ -8503,11 +7871,10 @@ MsgLen totalLen, MsgLen ptrLen, Buffer** mBuf, char* file, -U32 line +uint32_t line ) #else -#ifdef ANSI -PUBLIC S16 SAttachWlsPtrToMBuf +S16 SAttachWlsPtrToMBuf ( Region region, Pool pool, @@ -8517,16 +7884,6 @@ MsgLen totalLen, MsgLen ptrLen, Buffer** mBuf ) -#else -PUBLIC S16 SAttachWlsPtrToMBuf(region, pool, ptr, readPtr, totalLen, ptrLen, mBuf) -Region region; -Pool pool; -Data *ptr; -Data *readPtr; -MsgLen totalLen; -MsgLen ptrLen; -Buffer** mBuf; -#endif #endif { SsMsgInfo *minfo; /* Message info */ @@ -8535,13 +7892,12 @@ Buffer** mBuf; Buffer *newblk; /* Void *iccHdlr; */ - TRC1(SAttachWlsPtrToMBuf) #if (ERRCLASS & ERRCLS_INT_PAR) if (ptr == NULLP) { SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SAttachPtrToBuf: Null PTR"); - RETVALUE(RFAILED); + return RFAILED; } #endif @@ -8549,20 +7905,20 @@ Buffer** mBuf; if(SGetMsg(region, pool, mBuf) != ROK) { SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SAttachPtrToBuf: SGetMsg Failed"); - RETVALUE(ROUTRES); + return (ROUTRES); } mdsize = MDBSIZE; #ifdef SS_HISTOGRAM_SUPPORT - if (SAlloc(region, &mdsize, 0, (Data **) &newblk, __LINE__, (U8*) __FILE__, ENTNC) != ROK) + if (SAlloc(region, &mdsize, 0, (Data **) &newblk, __LINE__, (uint8_t*) __FILE__, ENTNC) != ROK) #else if (SAlloc(region, &mdsize, 0, (Data **) &newblk) != ROK) #endif /* SS_HISTOGRAM_SUPPORT */ { SSLOGERROR(ERRCLS_INT_PAR, ESSXXX, ERRZERO, "SAttachPtrToBuf: SAlloc Failed"); SPutMsg(*mBuf); - RETVALUE(ROUTRES); + return (ROUTRES); } (*mBuf)->b_cont = newblk; @@ -8580,7 +7936,7 @@ Buffer** mBuf; #ifndef SS_DBUF_REFLOCK_DISABLE if((SInitLock (&(dptr->dBufLock), SS_LOCK_MUTEX)) != 0) { - printf("Falied to destroy lock\n"); + printf("\nFalied to destroy lock\n"); } #endif @@ -8591,15 +7947,15 @@ Buffer** mBuf; minfo->len = totalLen; minfo->endptr = newblk; - //printf("Mbuf PTR = %x, DBlk PTR = %x, PTR = %x\n", *mBuf, newblk, ptr); - RETVALUE(ROK); + //printf("\nMbuf PTR = %x, DBlk PTR = %x, PTR = %x\n", *mBuf, newblk, ptr); + return ROK; } #ifdef TENB_DPDK_BUF -extern U32 numeTti; +uint32_t numeTti; -PUBLIC S16 SGetSBufDpdk +S16 SGetSBufDpdk ( Data **ptr, /* pointer to buffer */ Size size /* size requested */ @@ -8609,23 +7965,23 @@ Size size /* size requested */ *ptr = ntl_alloc(mtGetNtlHdl(), size); - RETVALUE(ret); + return (ret); } -PUBLIC S16 SPutSBufDpdk +S16 SPutSBufDpdk ( Data *ptr /* pointer to buffer */ ) { - S16 ret; - U32 flags = 0; + S16 ret = ROK; + uint32_t flags = 0; ntl_free(mtGetNtlHdl(), ptr); - RETVALUE(ret); + return (ret); } -PUBLIC S16 SDetachDpdkPtrFrmDBuf +S16 SDetachDpdkPtrFrmDBuf ( Buffer *mBuf, Data **ptr @@ -8636,8 +7992,8 @@ Data **ptr SsMsgInfo *minfo; //msgBlk = mBuf->b_cont; - //*ptr = msgBlk->b_rptr;; - *ptr = mBuf->b_datap->db_base;; + //*ptr = msgBlk->b_rptr; + *ptr = mBuf->b_datap->db_base; mBuf->b_cont = NULL; @@ -8645,11 +8001,11 @@ Data **ptr //minfo->len = 0; - RETVALUE(ROK); + return ROK; } -PUBLIC S16 SDetachDpdkPtrFrmMBuf +S16 SDetachDpdkPtrFrmMBuf ( Buffer *mBuf, Data **ptr @@ -8666,29 +8022,28 @@ PUBLIC S16 SDetachDpdkPtrFrmMBuf if(msgBlk == NULLP) { *ptr = NULLP; - RETVALUE(RFAILED); + return RFAILED; } dptr = msgBlk->b_datap; if(dptr->db_type != SS_MEM_TYPE_DPDK_ZBC) { *ptr = NULLP; - RETVALUE(RFAILED); + return RFAILED; } - *ptr = msgBlk->b_rptr;; + *ptr = msgBlk->b_rptr; mBuf->b_cont = NULL; minfo = (SsMsgInfo*) mBuf->b_rptr; minfo->len = 0; - RETVALUE(ROK); + return ROK; } -#ifdef ANSI -PUBLIC S16 SAttachDpdkPtrToMBuf +S16 SAttachDpdkPtrToMBuf ( Region region, Pool pool, @@ -8698,29 +8053,19 @@ MsgLen msgLen, MsgLen totalLen, Buffer** mBuf ) -#else -PUBLIC S16 SAttachDpdkPtrToMBuf(region, pool, ptr, readPtr, msgLen, totalLen, mBuf) -Region region; -Pool pool; -Data *ptr; -Data *readPtr; -MsgLen msgLen; -MsgLen totalLen; -Buffer** mBuf; -#endif { SsDblk *dptr; if(0 == msgLen) - RETVALUE(RFAILED); + return RFAILED; SAttachWlsPtrToMBuf(region, pool, ptr, readPtr, msgLen, totalLen, mBuf); dptr = (SsDblk*) (((Data *) ((*mBuf)->b_cont)) + MBSIZE); dptr->db_type = SS_MEM_TYPE_DPDK_ZBC; - RETVALUE(ROK); + return ROK; } #endif /* TENB_DPDK_BUF */