Root/
1 | /* |
2 | * net/tipc/addr.h: Include file for TIPC address utility routines |
3 | * |
4 | * Copyright (c) 2000-2006, Ericsson AB |
5 | * Copyright (c) 2004-2005, Wind River Systems |
6 | * All rights reserved. |
7 | * |
8 | * Redistribution and use in source and binary forms, with or without |
9 | * modification, are permitted provided that the following conditions are met: |
10 | * |
11 | * 1. Redistributions of source code must retain the above copyright |
12 | * notice, this list of conditions and the following disclaimer. |
13 | * 2. Redistributions in binary form must reproduce the above copyright |
14 | * notice, this list of conditions and the following disclaimer in the |
15 | * documentation and/or other materials provided with the distribution. |
16 | * 3. Neither the names of the copyright holders nor the names of its |
17 | * contributors may be used to endorse or promote products derived from |
18 | * this software without specific prior written permission. |
19 | * |
20 | * Alternatively, this software may be distributed under the terms of the |
21 | * GNU General Public License ("GPL") version 2 as published by the Free |
22 | * Software Foundation. |
23 | * |
24 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" |
25 | * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
26 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
27 | * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE |
28 | * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR |
29 | * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF |
30 | * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS |
31 | * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN |
32 | * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) |
33 | * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE |
34 | * POSSIBILITY OF SUCH DAMAGE. |
35 | */ |
36 | |
37 | #ifndef _TIPC_ADDR_H |
38 | #define _TIPC_ADDR_H |
39 | |
40 | static inline u32 own_node(void) |
41 | { |
42 | return tipc_node(tipc_own_addr); |
43 | } |
44 | |
45 | static inline u32 own_cluster(void) |
46 | { |
47 | return tipc_cluster(tipc_own_addr); |
48 | } |
49 | |
50 | static inline u32 own_zone(void) |
51 | { |
52 | return tipc_zone(tipc_own_addr); |
53 | } |
54 | |
55 | static inline int in_own_cluster(u32 addr) |
56 | { |
57 | return !((addr ^ tipc_own_addr) >> 12); |
58 | } |
59 | |
60 | static inline int is_slave(u32 addr) |
61 | { |
62 | return addr & 0x800; |
63 | } |
64 | |
65 | static inline int may_route(u32 addr) |
66 | { |
67 | return(addr ^ tipc_own_addr) >> 11; |
68 | } |
69 | |
70 | /** |
71 | * addr_domain - convert 2-bit scope value to equivalent message lookup domain |
72 | * |
73 | * Needed when address of a named message must be looked up a second time |
74 | * after a network hop. |
75 | */ |
76 | |
77 | static inline int addr_domain(int sc) |
78 | { |
79 | if (likely(sc == TIPC_NODE_SCOPE)) |
80 | return tipc_own_addr; |
81 | if (sc == TIPC_CLUSTER_SCOPE) |
82 | return tipc_addr(tipc_zone(tipc_own_addr), |
83 | tipc_cluster(tipc_own_addr), 0); |
84 | return tipc_addr(tipc_zone(tipc_own_addr), 0, 0); |
85 | } |
86 | |
87 | int tipc_addr_domain_valid(u32); |
88 | int tipc_addr_node_valid(u32 addr); |
89 | int tipc_in_scope(u32 domain, u32 addr); |
90 | int tipc_addr_scope(u32 domain); |
91 | char *tipc_addr_string_fill(char *string, u32 addr); |
92 | #endif |
93 |
Branches:
ben-wpan
ben-wpan-stefan
javiroman/ks7010
jz-2.6.34
jz-2.6.34-rc5
jz-2.6.34-rc6
jz-2.6.34-rc7
jz-2.6.35
jz-2.6.36
jz-2.6.37
jz-2.6.38
jz-2.6.39
jz-3.0
jz-3.1
jz-3.11
jz-3.12
jz-3.13
jz-3.15
jz-3.16
jz-3.18-dt
jz-3.2
jz-3.3
jz-3.4
jz-3.5
jz-3.6
jz-3.6-rc2-pwm
jz-3.9
jz-3.9-clk
jz-3.9-rc8
jz47xx
jz47xx-2.6.38
master
Tags:
od-2011-09-04
od-2011-09-18
v2.6.34-rc5
v2.6.34-rc6
v2.6.34-rc7
v3.9