]> git.openfabrics.org - ~emulex/infiniband.git/commitdiff
ip: introduce ip_is_fragment helper inline function
authorPaul Gortmaker <paul.gortmaker@windriver.com>
Wed, 22 Jun 2011 03:33:34 +0000 (20:33 -0700)
committerDavid S. Miller <davem@davemloft.net>
Wed, 22 Jun 2011 03:33:34 +0000 (20:33 -0700)
There are enough instances of this:

    iph->frag_off & htons(IP_MF | IP_OFFSET)

that a helper function is probably warranted.

Signed-off-by: Paul Gortmaker <paul.gortmaker@windriver.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
19 files changed:
drivers/net/bonding/bond_main.c
drivers/net/ioc3-eth.c
drivers/net/myri10ge/myri10ge.c
drivers/net/s2io.c
drivers/net/sfc/filter.c
drivers/net/vxge/vxge-main.c
include/net/ip.h
net/core/dev.c
net/ipv4/ip_input.c
net/ipv4/ip_output.c
net/ipv4/ipconfig.c
net/ipv4/netfilter/nf_defrag_ipv4.c
net/ipv4/netfilter/nf_nat_standalone.c
net/ipv4/xfrm4_policy.c
net/netfilter/ipvs/ip_vs_core.c
net/sched/cls_flow.c
net/sched/cls_rsvp.h
net/sched/sch_choke.c
net/sched/sch_sfq.c

index d117280b9cd875ce5f0d1c8762dc5eeb4cb35fc9..ebb1d219b45cf997e7d7354b0321bb48340427e8 100644 (file)
@@ -3438,7 +3438,7 @@ static int bond_xmit_hash_policy_l34(struct sk_buff *skb, int count)
        int layer4_xor = 0;
 
        if (skb->protocol == htons(ETH_P_IP)) {
-               if (!(iph->frag_off & htons(IP_MF|IP_OFFSET)) &&
+               if (!ip_is_fragment(iph) &&
                    (iph->protocol == IPPROTO_TCP ||
                     iph->protocol == IPPROTO_UDP)) {
                        layer4_xor = ntohs((*layer4hdr ^ *(layer4hdr + 1)));
index 32f07f868d8914e58020860af796944a00f195b4..318a25a92310b3887052fb3a496fc10faa9624e3 100644 (file)
@@ -532,7 +532,7 @@ static void ioc3_tcpudp_checksum(struct sk_buff *skb, uint32_t hwsum, int len)
                return;
 
        ih = (struct iphdr *) ((char *)eh + ETH_HLEN);
-       if (ih->frag_off & htons(IP_MF | IP_OFFSET))
+       if (ip_is_fragment(ih))
                return;
 
        proto = ih->protocol;
index 3e89a842fc5ead3cb61233a23471737dbb6bd2d5..3ed5f3505ceab30d0f09d5aad9a878b09840d3ca 100644 (file)
@@ -2257,7 +2257,7 @@ myri10ge_get_frag_header(struct skb_frag_struct *frag, void **mac_hdr,
        *ip_hdr = iph;
        if (iph->protocol != IPPROTO_TCP)
                return -1;
-       if (iph->frag_off & htons(IP_MF | IP_OFFSET))
+       if (ip_is_fragment(iph))
                return -1;
        *hdr_flags |= LRO_TCP;
        *tcpudp_hdr = (u8 *) (*ip_hdr) + (iph->ihl << 2);
index f4d80f9050ef957a5fda50393602bc0f4416e264..043850b8c30477cba29f9d682771353a9512b38f 100644 (file)
@@ -4109,7 +4109,7 @@ static netdev_tx_t s2io_xmit(struct sk_buff *skb, struct net_device *dev)
                        struct tcphdr *th;
                        ip = ip_hdr(skb);
 
-                       if ((ip->frag_off & htons(IP_OFFSET|IP_MF)) == 0) {
+                       if (!ip_is_fragment(ip)) {
                                th = (struct tcphdr *)(((unsigned char *)ip) +
                                                       ip->ihl*4);
 
index 95a980fd63d5d9c195c683512808fa43d6d91a2d..f2fc2587c09d3f2c45b3a3c4217148bb2ef6528c 100644 (file)
@@ -652,7 +652,7 @@ int efx_filter_rfs(struct net_device *net_dev, const struct sk_buff *skb,
        /* RFS must validate the IP header length before calling us */
        EFX_BUG_ON_PARANOID(!pskb_may_pull(skb, nhoff + sizeof(*ip)));
        ip = (const struct iphdr *)(skb->data + nhoff);
-       if (ip->frag_off & htons(IP_MF | IP_OFFSET))
+       if (ip_is_fragment(ip))
                return -EPROTONOSUPPORT;
        EFX_BUG_ON_PARANOID(!pskb_may_pull(skb, nhoff + 4 * ip->ihl + 4));
        ports = (const __be16 *)(skb->data + nhoff + 4 * ip->ihl);
index 54ca74806bb605f268f8241b2089e39f259b7128..1c92af392992fe731afe8c82554b5b2b4c82537e 100644 (file)
@@ -633,7 +633,7 @@ static u32 vxge_get_vpath_no(struct vxgedev *vdev, struct sk_buff *skb)
 
                ip = ip_hdr(skb);
 
-               if ((ip->frag_off & htons(IP_OFFSET|IP_MF)) == 0) {
+               if (!ip_is_fragment(ip)) {
                        th = (struct tcphdr *)(((unsigned char *)ip) +
                                        ip->ihl*4);
 
index e9ea7c73f8c141a531df65575c5a729ad6479b47..d603cd329c4e55094d796c3e2bc2132daa4228ad 100644 (file)
@@ -250,6 +250,11 @@ int ip_decrease_ttl(struct iphdr *iph)
        return --iph->ttl;
 }
 
+static inline bool ip_is_fragment(const struct iphdr *iph)
+{
+       return (iph->frag_off & htons(IP_MF | IP_OFFSET)) != 0;
+}
+
 static inline
 int ip_dont_fragment(struct sock *sk, struct dst_entry *dst)
 {
index 8efe85070131df938e924c493444fd0a43e5c750..6b6ef14b42f27fb866035ccbdc5246c01c10b906 100644 (file)
@@ -2532,7 +2532,7 @@ __u32 __skb_get_rxhash(struct sk_buff *skb)
                        goto done;
 
                ip = (const struct iphdr *) (skb->data + nhoff);
-               if (ip->frag_off & htons(IP_MF | IP_OFFSET))
+               if (ip_is_fragment(ip))
                        ip_proto = 0;
                else
                        ip_proto = ip->protocol;
index c8f48efc5fd3d778831458b1b72ccf07ca794594..073a9b01c40c9c37400ce9c320ffb355b0ae6e76 100644 (file)
@@ -165,7 +165,7 @@ int ip_call_ra_chain(struct sk_buff *skb)
                    (!sk->sk_bound_dev_if ||
                     sk->sk_bound_dev_if == dev->ifindex) &&
                    net_eq(sock_net(sk), dev_net(dev))) {
-                       if (ip_hdr(skb)->frag_off & htons(IP_MF | IP_OFFSET)) {
+                       if (ip_is_fragment(ip_hdr(skb))) {
                                if (ip_defrag(skb, IP_DEFRAG_CALL_RA_CHAIN))
                                        return 1;
                        }
@@ -256,7 +256,7 @@ int ip_local_deliver(struct sk_buff *skb)
         *      Reassemble IP fragments.
         */
 
-       if (ip_hdr(skb)->frag_off & htons(IP_MF | IP_OFFSET)) {
+       if (ip_is_fragment(ip_hdr(skb))) {
                if (ip_defrag(skb, IP_DEFRAG_LOCAL_DELIVER))
                        return 0;
        }
index a8024eaa0e87b15ebdc86058a87c24f0813a610a..167da8ba416ac3ea4e83ef9135225970daa73ad9 100644 (file)
@@ -489,7 +489,7 @@ int ip_fragment(struct sk_buff *skb, int (*output)(struct sk_buff *))
 
                if (first_len - hlen > mtu ||
                    ((first_len - hlen) & 7) ||
-                   (iph->frag_off & htons(IP_MF|IP_OFFSET)) ||
+                   ip_is_fragment(iph) ||
                    skb_cloned(skb))
                        goto slow_path;
 
index ab7e5542c1cff9203b8c5e21108eb83cb5a27515..ae93dd5ef40164b266fc955ace0346c977cd00e0 100644 (file)
@@ -932,7 +932,7 @@ static int __init ic_bootp_recv(struct sk_buff *skb, struct net_device *dev, str
                goto drop;
 
        /* Fragments are not supported */
-       if (h->frag_off & htons(IP_OFFSET | IP_MF)) {
+       if (ip_is_fragment(h)) {
                if (net_ratelimit())
                        printk(KERN_ERR "DHCP/BOOTP: Ignoring fragmented "
                               "reply.\n");
index f3a9b42b16c620a7f569e00039beea13bc75bc3c..9bb1b8a37a22be1485466ff4b6097488a28e0974 100644 (file)
@@ -82,7 +82,7 @@ static unsigned int ipv4_conntrack_defrag(unsigned int hooknum,
 #endif
 #endif
        /* Gather fragments. */
-       if (ip_hdr(skb)->frag_off & htons(IP_MF | IP_OFFSET)) {
+       if (ip_is_fragment(ip_hdr(skb))) {
                enum ip_defrag_users user = nf_ct_defrag_user(hooknum, skb);
                if (nf_ct_ipv4_gather_frags(skb, user))
                        return NF_STOLEN;
index 483b76d042da5ad2836005ab1dad3d1c17727c61..a6e606e8482071f143f82c18d42eee9a57bc68d3 100644 (file)
@@ -88,7 +88,7 @@ nf_nat_fn(unsigned int hooknum,
 
        /* We never see fragments: conntrack defrags on pre-routing
           and local-out, and nf_nat_out protects post-routing. */
-       NF_CT_ASSERT(!(ip_hdr(skb)->frag_off & htons(IP_MF | IP_OFFSET)));
+       NF_CT_ASSERT(!ip_is_fragment(ip_hdr(skb)));
 
        ct = nf_ct_get(skb, &ctinfo);
        /* Can't track?  It's not due to stress, or conntrack would
index 981e43eaf7046c36bc5fc3961a5b564b875c0926..fc5368ad2b0d160b9429f8f830aed6d9da223d77 100644 (file)
@@ -117,7 +117,7 @@ _decode_session4(struct sk_buff *skb, struct flowi *fl, int reverse)
        memset(fl4, 0, sizeof(struct flowi4));
        fl4->flowi4_mark = skb->mark;
 
-       if (!(iph->frag_off & htons(IP_MF | IP_OFFSET))) {
+       if (!ip_is_fragment(iph)) {
                switch (iph->protocol) {
                case IPPROTO_UDP:
                case IPPROTO_UDPLITE:
index e33d48cae9fd53b7cdcd6e9e72735ae1c5bc98f2..4f77bb16d22abea2f60ea479318329bbab769a49 100644 (file)
@@ -852,7 +852,7 @@ static int ip_vs_out_icmp(struct sk_buff *skb, int *related,
        *related = 1;
 
        /* reassemble IP fragments */
-       if (ip_hdr(skb)->frag_off & htons(IP_MF | IP_OFFSET)) {
+       if (ip_is_fragment(ip_hdr(skb))) {
                if (ip_vs_gather_frags(skb, ip_vs_defrag_user(hooknum)))
                        return NF_STOLEN;
        }
@@ -1156,8 +1156,7 @@ ip_vs_out(unsigned int hooknum, struct sk_buff *skb, int af)
                ip_vs_fill_iphdr(af, skb_network_header(skb), &iph);
        } else
 #endif
-               if (unlikely(ip_hdr(skb)->frag_off & htons(IP_MF|IP_OFFSET) &&
-                            !pp->dont_defrag)) {
+               if (unlikely(ip_is_fragment(ip_hdr(skb)) && !pp->dont_defrag)) {
                        if (ip_vs_gather_frags(skb,
                                               ip_vs_defrag_user(hooknum)))
                                return NF_STOLEN;
@@ -1310,7 +1309,7 @@ ip_vs_in_icmp(struct sk_buff *skb, int *related, unsigned int hooknum)
        *related = 1;
 
        /* reassemble IP fragments */
-       if (ip_hdr(skb)->frag_off & htons(IP_MF | IP_OFFSET)) {
+       if (ip_is_fragment(ip_hdr(skb))) {
                if (ip_vs_gather_frags(skb, ip_vs_defrag_user(hooknum)))
                        return NF_STOLEN;
        }
index 8ec01391d98866dff1b0287ba392379d11b84d54..34533a5d1b3af317b55955c36da2ba4970d2c9ff 100644 (file)
@@ -121,7 +121,7 @@ static u32 flow_get_proto_src(struct sk_buff *skb)
                if (!pskb_network_may_pull(skb, sizeof(*iph)))
                        break;
                iph = ip_hdr(skb);
-               if (iph->frag_off & htons(IP_MF | IP_OFFSET))
+               if (ip_is_fragment(iph))
                        break;
                poff = proto_ports_offset(iph->protocol);
                if (poff >= 0 &&
@@ -163,7 +163,7 @@ static u32 flow_get_proto_dst(struct sk_buff *skb)
                if (!pskb_network_may_pull(skb, sizeof(*iph)))
                        break;
                iph = ip_hdr(skb);
-               if (iph->frag_off & htons(IP_MF | IP_OFFSET))
+               if (ip_is_fragment(iph))
                        break;
                poff = proto_ports_offset(iph->protocol);
                if (poff >= 0 &&
index 402c44b241a3927e0c8efce6e0cb91d19772e7fe..ed691b148384218de903207dbd923becd131938d 100644 (file)
@@ -167,7 +167,7 @@ restart:
        dst = &nhptr->daddr;
        protocol = nhptr->protocol;
        xprt = ((u8 *)nhptr) + (nhptr->ihl<<2);
-       if (nhptr->frag_off & htons(IP_MF | IP_OFFSET))
+       if (ip_is_fragment(nhptr))
                return -1;
 #endif
 
index 06afbaeb4c88aceb565af85dbab35baf3d4ae6d6..3422b25df9e46d8149ea0591ddc1625740b64bb6 100644 (file)
@@ -181,7 +181,7 @@ static bool choke_match_flow(struct sk_buff *skb1,
                    ip1->saddr != ip2->saddr || ip1->daddr != ip2->daddr)
                        return false;
 
-               if ((ip1->frag_off | ip2->frag_off) & htons(IP_MF | IP_OFFSET))
+               if (ip_is_fragment(ip1) | ip_is_fragment(ip2))
                        ip_proto = 0;
                off1 += ip1->ihl * 4;
                off2 += ip2->ihl * 4;
index b6ea6afa55b0197a7d7975ea5ec24aa500a92868..4536ee64383e8a6a02a076374ed96b5036df9bd6 100644 (file)
@@ -157,7 +157,7 @@ static unsigned int sfq_hash(struct sfq_sched_data *q, struct sk_buff *skb)
                iph = ip_hdr(skb);
                h = (__force u32)iph->daddr;
                h2 = (__force u32)iph->saddr ^ iph->protocol;
-               if (iph->frag_off & htons(IP_MF | IP_OFFSET))
+               if (ip_is_fragment(iph))
                        break;
                poff = proto_ports_offset(iph->protocol);
                if (poff >= 0 &&