aboutsummaryrefslogtreecommitdiff
path: root/hw/net/net_rx_pkt.c
diff options
context:
space:
mode:
authorEd Swierk <eswierk@skyportsystems.com>2017-11-16 06:06:06 -0800
committerJason Wang <jasowang@redhat.com>2017-11-20 11:08:00 +0800
commit0dacea92d26c31d453c58de2e99c178fee554166 (patch)
tree5b8fd0c05385e02a586fbc136808821e603ea14f /hw/net/net_rx_pkt.c
parentebc2327f0793deed845e2f7aeddf43b367c5c71c (diff)
downloadqemu-0dacea92d26c31d453c58de2e99c178fee554166.zip
qemu-0dacea92d26c31d453c58de2e99c178fee554166.tar.gz
qemu-0dacea92d26c31d453c58de2e99c178fee554166.tar.bz2
net: Transmit zero UDP checksum as 0xFFFF
The checksum algorithm used by IPv4, TCP and UDP allows a zero value to be represented by either 0x0000 and 0xFFFF. But per RFC 768, a zero UDP checksum must be transmitted as 0xFFFF because 0x0000 is a special value meaning no checksum. Substitute 0xFFFF whenever a checksum is computed as zero when modifying a UDP datagram header. Doing this on IPv4 and TCP checksums is unnecessary but legal. Add a wrapper for net_checksum_finish() that makes the substitution. (We can't just change net_checksum_finish(), as that function is also used by receivers to verify checksums, and in that case the expected value is always 0x0000.) Signed-off-by: Ed Swierk <eswierk@skyportsystems.com> Signed-off-by: Jason Wang <jasowang@redhat.com>
Diffstat (limited to 'hw/net/net_rx_pkt.c')
-rw-r--r--hw/net/net_rx_pkt.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/hw/net/net_rx_pkt.c b/hw/net/net_rx_pkt.c
index cef1c2e..98a5030 100644
--- a/hw/net/net_rx_pkt.c
+++ b/hw/net/net_rx_pkt.c
@@ -518,7 +518,7 @@ _net_rx_pkt_calc_l4_csum(struct NetRxPkt *pkt)
cntr += net_checksum_add_iov(pkt->vec, pkt->vec_len,
pkt->l4hdr_off, csl, cso);
- csum = net_checksum_finish(cntr);
+ csum = net_checksum_finish_nozero(cntr);
trace_net_rx_pkt_l4_csum_calc_csum(pkt->l4hdr_off, csl, cntr, csum);