diff options
author | Tom Herbert <therbert@google.com> | 2014-08-31 15:12:41 -0700 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2014-09-01 21:36:27 -0700 |
commit | 5a21232983aa7acfe7fd26170832a9e0a4a7b4ae (patch) | |
tree | 460b541ed810999e911bf64b51443fb1b4f04c30 /init | |
parent | 52aec126c42819899793b9ffbd3f2e25705ba096 (diff) | |
download | lwn-5a21232983aa7acfe7fd26170832a9e0a4a7b4ae.tar.gz lwn-5a21232983aa7acfe7fd26170832a9e0a4a7b4ae.zip |
net: Support for csum_bad in skbuff
This flag indicates that an invalid checksum was detected in the
packet. __skb_mark_checksum_bad helper function was added to set this.
Checksums can be marked bad from a driver or the GRO path (the latter
is implemented in this patch). csum_bad is checked in
__skb_checksum_validate_complete (i.e. calling that when ip_summed ==
CHECKSUM_NONE).
csum_bad works in conjunction with ip_summed value. In the case that
ip_summed is CHECKSUM_NONE and csum_bad is set, this implies that the
first (or next) checksum encountered in the packet is bad. When
ip_summed is CHECKSUM_UNNECESSARY, the first checksum after the last
one validated is bad. For example, if ip_summed == CHECKSUM_UNNECESSARY,
csum_level == 1, and csum_bad is set-- then the third checksum in the
packet is bad. In the normal path, the packet will be dropped when
processing the protocol layer of the bad checksum:
__skb_decr_checksum_unnecessary called twice for the good checksums
changing ip_summed to CHECKSUM_NONE so that
__skb_checksum_validate_complete is called to validate the third
checksum and that will fail since csum_bad is set.
Signed-off-by: Tom Herbert <therbert@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'init')
0 files changed, 0 insertions, 0 deletions