2 * Definitions for the UDP-Lite (RFC 3828) code.
7 #include <net/ip6_checksum.h>
9 /* UDP-Lite socket options */
10 #define UDPLITE_SEND_CSCOV 10 /* sender partial coverage (as sent) */
11 #define UDPLITE_RECV_CSCOV 11 /* receiver partial coverage (threshold ) */
13 extern struct proto udplite_prot;
14 extern struct udp_table udplite_table;
17 * Checksum computation is all in software, hence simpler getfrag.
19 static __inline__ int udplite_getfrag(void *from, char *to, int offset,
20 int len, int odd, struct sk_buff *skb)
22 struct msghdr *msg = from;
23 return copy_from_iter_full(to, len, &msg->msg_iter) ? 0 : -EFAULT;
26 /* Designate sk as UDP-Lite socket */
27 static inline int udplite_sk_init(struct sock *sk)
29 udp_sk(sk)->pcflag = UDPLITE_BIT;
30 sk->sk_destruct = udp_destruct_sock;
35 * Checksumming routines
37 static inline int udplite_checksum_init(struct sk_buff *skb, struct udphdr *uh)
41 /* In UDPv4 a zero checksum means that the transmitter generated no
42 * checksum. UDP-Lite (like IPv6) mandates checksums, hence packets
43 * with a zero checksum field are illegal. */
45 net_dbg_ratelimited("UDPLite: zeroed checksum field\n");
49 cscov = ntohs(uh->len);
51 if (cscov == 0) /* Indicates that full coverage is required. */
53 else if (cscov < 8 || cscov > skb->len) {
55 * Coverage length violates RFC 3828: log and discard silently.
57 net_dbg_ratelimited("UDPLite: bad csum coverage %d/%d\n",
61 } else if (cscov < skb->len) {
62 UDP_SKB_CB(skb)->partial_cov = 1;
63 UDP_SKB_CB(skb)->cscov = cscov;
64 if (skb->ip_summed == CHECKSUM_COMPLETE)
65 skb->ip_summed = CHECKSUM_NONE;
71 /* Slow-path computation of checksum. Socket is locked. */
72 static inline __wsum udplite_csum_outgoing(struct sock *sk, struct sk_buff *skb)
74 const struct udp_sock *up = udp_sk(skb->sk);
78 if (up->pcflag & UDPLITE_SEND_CC) {
80 * Sender has set `partial coverage' option on UDP-Lite socket.
81 * The special case "up->pcslen == 0" signifies full coverage.
83 if (up->pcslen < up->len) {
86 udp_hdr(skb)->len = htons(up->pcslen);
89 * NOTE: Causes for the error case `up->pcslen > up->len':
90 * (i) Application error (will not be penalized).
91 * (ii) Payload too big for send buffer: data is split
92 * into several packets, each with its own header.
93 * In this case (e.g. last segment), coverage may
94 * exceed packet length.
95 * Since packets with coverage length > packet length are
96 * illegal, we fall back to the defaults here.
100 skb->ip_summed = CHECKSUM_NONE; /* no HW support for checksumming */
102 skb_queue_walk(&sk->sk_write_queue, skb) {
103 const int off = skb_transport_offset(skb);
104 const int len = skb->len - off;
106 csum = skb_checksum(skb, off, (cscov > len)? len : cscov, csum);
108 if ((cscov -= len) <= 0)
114 /* Fast-path computation of checksum. Socket may not be locked. */
115 static inline __wsum udplite_csum(struct sk_buff *skb)
117 const struct udp_sock *up = udp_sk(skb->sk);
118 const int off = skb_transport_offset(skb);
119 int len = skb->len - off;
121 if ((up->pcflag & UDPLITE_SEND_CC) && up->pcslen < len) {
124 udp_hdr(skb)->len = htons(up->pcslen);
126 skb->ip_summed = CHECKSUM_NONE; /* no HW support for checksumming */
128 return skb_checksum(skb, off, len, 0);
131 void udplite4_register(void);
132 int udplite_get_port(struct sock *sk, unsigned short snum,
133 int (*scmp)(const struct sock *, const struct sock *));
134 #endif /* _UDPLITE_H */