From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx01.arubanetworks.com (mx01.arubanetworks.com [104.36.248.59]) by dpdk.org (Postfix) with ESMTP id 5D6A23F9 for ; Mon, 15 Dec 2014 06:07:40 +0100 (CET) X-ASG-Debug-ID: 1418620058-03d1242e0132c8f0001-TfluYd Received: from sjc-exch10hc-02.arubanetworks.com (sjc-exch10hc-02.arubanetworks.com [10.1.8.46]) by mx01.arubanetworks.com with ESMTP id 3eKayx0tBsiDzVad (version=TLSv1 cipher=AES128-SHA bits=128 verify=NO) for ; Sun, 14 Dec 2014 21:07:38 -0800 (PST) X-Barracuda-Envelope-From: vmohare@arubanetworks.com Received: from BOREAL.arubanetworks.com ([fe80::19f0:d3af:7377:a759]) by sjc-exch10hc-02.arubanetworks.com ([fe80::88ce:11e3:e0a3:1489%16]) with mapi id 14.03.0158.001; Sun, 14 Dec 2014 21:07:38 -0800 From: Vithal S Mohare To: "dev@dpdk.org" Thread-Topic: Walk through a given mbuf-pool elements X-ASG-Orig-Subj: Walk through a given mbuf-pool elements Thread-Index: AdAV+ITkEUt7RBPFRD2vipPFJF40NgCLG22g Date: Mon, 15 Dec 2014 05:07:37 +0000 Message-ID: <98DB008FA2AC6644B40AD8C766FAB271014BDE0E4F@BOREAL.arubanetworks.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.20.22.46] MIME-Version: 1.0 X-Barracuda-Connect: sjc-exch10hc-02.arubanetworks.com[10.1.8.46] X-Barracuda-Start-Time: 1418620058 X-Barracuda-Encrypted: AES128-SHA X-Barracuda-URL: http://mx01.arubanetworks.com:8000/cgi-mod/mark.cgi X-Virus-Scanned: by bsmtpd at arubanetworks.com X-Barracuda-BRTS-Status: 1 X-Barracuda-Spam-Score: 0.00 X-Barracuda-Spam-Status: No, SCORE=0.00 using global scores of TAG_LEVEL=1000.0 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=7.0 tests=HTML_MESSAGE X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.12911 Rule breakdown below pts rule name description ---- ---------------------- -------------------------------------------------- 0.00 HTML_MESSAGE BODY: HTML included in message Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.15 Subject: [dpdk-dev] Walk through a given mbuf-pool elements X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: patches and discussions about DPDK List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 15 Dec 2014 05:07:40 -0000 [Re-sending the mail after registering to dpdk.org] Team, I am looking for a code/api to walk through a dpdk mbuf-pool elements (simi= lar to rte_mempool_walk() but for elements within mempool). Calling pkt_m= buf_alloc for 'n' elements and then _free is not an option. Rte_mempool_ob= j_itr() walks through, but does lot more than walking itself. Please sugg= est if anybody has better alternatives. Thanks, -Vithal