Linux 2.6.26-rc5
[linux-2.6/openmoko-kernel/knife-kernel.git] / include / net / udplite.h
blobb76b2e377af4540bc8336328f55485d87a26947b
1 /*
2 * Definitions for the UDP-Lite (RFC 3828) code.
3 */
4 #ifndef _UDPLITE_H
5 #define _UDPLITE_H
7 #include <net/ip6_checksum.h>
9 /* UDP-Lite socket options */
10 #define UDPLITE_SEND_CSCOV 10 /* sender partial coverage (as sent) */
11 #define UDPLITE_RECV_CSCOV 11 /* receiver partial coverage (threshold ) */
13 extern struct proto udplite_prot;
14 extern struct hlist_head udplite_hash[UDP_HTABLE_SIZE];
17 * Checksum computation is all in software, hence simpler getfrag.
19 static __inline__ int udplite_getfrag(void *from, char *to, int offset,
20 int len, int odd, struct sk_buff *skb)
22 return memcpy_fromiovecend(to, (struct iovec *) from, offset, len);
25 /* Designate sk as UDP-Lite socket */
26 static inline int udplite_sk_init(struct sock *sk)
28 udp_sk(sk)->pcflag = UDPLITE_BIT;
29 return 0;
33 * Checksumming routines
35 static inline int udplite_checksum_init(struct sk_buff *skb, struct udphdr *uh)
37 u16 cscov;
39 /* In UDPv4 a zero checksum means that the transmitter generated no
40 * checksum. UDP-Lite (like IPv6) mandates checksums, hence packets
41 * with a zero checksum field are illegal. */
42 if (uh->check == 0) {
43 LIMIT_NETDEBUG(KERN_DEBUG "UDPLITE: zeroed checksum field\n");
44 return 1;
47 cscov = ntohs(uh->len);
49 if (cscov == 0) /* Indicates that full coverage is required. */
51 else if (cscov < 8 || cscov > skb->len) {
53 * Coverage length violates RFC 3828: log and discard silently.
55 LIMIT_NETDEBUG(KERN_DEBUG "UDPLITE: bad csum coverage %d/%d\n",
56 cscov, skb->len);
57 return 1;
59 } else if (cscov < skb->len) {
60 UDP_SKB_CB(skb)->partial_cov = 1;
61 UDP_SKB_CB(skb)->cscov = cscov;
62 if (skb->ip_summed == CHECKSUM_COMPLETE)
63 skb->ip_summed = CHECKSUM_NONE;
66 return 0;
69 static inline int udplite_sender_cscov(struct udp_sock *up, struct udphdr *uh)
71 int cscov = up->len;
74 * Sender has set `partial coverage' option on UDP-Lite socket
76 if (up->pcflag & UDPLITE_SEND_CC) {
77 if (up->pcslen < up->len) {
78 /* up->pcslen == 0 means that full coverage is required,
79 * partial coverage only if 0 < up->pcslen < up->len */
80 if (0 < up->pcslen) {
81 cscov = up->pcslen;
83 uh->len = htons(up->pcslen);
86 * NOTE: Causes for the error case `up->pcslen > up->len':
87 * (i) Application error (will not be penalized).
88 * (ii) Payload too big for send buffer: data is split
89 * into several packets, each with its own header.
90 * In this case (e.g. last segment), coverage may
91 * exceed packet length.
92 * Since packets with coverage length > packet length are
93 * illegal, we fall back to the defaults here.
96 return cscov;
99 static inline __wsum udplite_csum_outgoing(struct sock *sk, struct sk_buff *skb)
101 int cscov = udplite_sender_cscov(udp_sk(sk), udp_hdr(skb));
102 __wsum csum = 0;
104 skb->ip_summed = CHECKSUM_NONE; /* no HW support for checksumming */
106 skb_queue_walk(&sk->sk_write_queue, skb) {
107 const int off = skb_transport_offset(skb);
108 const int len = skb->len - off;
110 csum = skb_checksum(skb, off, (cscov > len)? len : cscov, csum);
112 if ((cscov -= len) <= 0)
113 break;
115 return csum;
118 extern void udplite4_register(void);
119 extern int udplite_get_port(struct sock *sk, unsigned short snum,
120 int (*scmp)(const struct sock *, const struct sock *));
121 #endif /* _UDPLITE_H */