dmsg - refactor cluster and pfs identifiers
[dragonfly.git] / sys / netinet / ip_var.h
blob85001fc79015e75c7b3d3588335771ae4f917bc9
1 /*
2 * Copyright (c) 1982, 1986, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
33 * @(#)ip_var.h 8.2 (Berkeley) 1/9/95
34 * $FreeBSD: src/sys/netinet/ip_var.h,v 1.50.2.13 2003/08/24 08:24:38 hsu Exp $
37 #ifndef _NETINET_IP_VAR_H_
38 #define _NETINET_IP_VAR_H_
40 #ifndef _SYS_TYPES_H_
41 #include <sys/types.h>
42 #endif
43 #ifndef _SYS_QUEUE_H_
44 #include <sys/queue.h>
45 #endif
46 #ifndef _NETINET_IN_H_
47 #include <netinet/in.h>
48 #endif
50 #ifdef _KERNEL
52 #include <machine/endian.h>
53 #ifndef _MACHINE_PARAM_H_
54 #include <machine/param.h>
55 #endif
56 #ifndef _NET_ROUTE_H
57 #include <net/route.h>
58 #endif
60 #endif
63 * Overlay for ip header used by other protocols (tcp, udp).
65 struct ipovly {
66 u_char ih_x1[9]; /* (unused) */
67 u_char ih_pr; /* protocol */
68 u_short ih_len; /* protocol length */
69 struct in_addr ih_src; /* source internet address */
70 struct in_addr ih_dst; /* destination internet address */
74 * Ip reassembly queue structure. Each fragment
75 * being reassembled is attached to one of these structures.
76 * They are timed out after ipq_ttl drops to 0, and may also
77 * be reclaimed if memory becomes tight.
79 struct ipq {
80 TAILQ_ENTRY(ipq) ipq_list; /* to other reass headers */
81 u_char ipq_ttl; /* time for reass q to live */
82 u_char ipq_p; /* protocol of this fragment */
83 u_short ipq_id; /* sequence id for reassembly */
84 struct mbuf *ipq_frags; /* to ip headers of fragments */
85 struct in_addr ipq_src,ipq_dst;
86 u_char ipq_nfrags; /* # frags in this packet */
90 * Structure stored in mbuf in inpcb.ip_options
91 * and passed to ip_output when ip options are in use.
92 * The actual length of the options (including ipopt_dst)
93 * is in m_len.
95 #define MAX_IPOPTLEN 40
97 struct ipoption {
98 struct in_addr ipopt_dst; /* first-hop dst if source routed */
99 char ipopt_list[MAX_IPOPTLEN]; /* options proper */
103 * Structure attached to inpcb.ip_moptions and
104 * passed to ip_output when IP multicast options are in use.
106 struct ip_moptions {
107 struct ifnet *imo_multicast_ifp; /* ifp for outgoing multicasts */
108 struct in_addr imo_multicast_addr; /* ifindex/addr on MULTICAST_IF */
109 u_char imo_multicast_ttl; /* TTL for outgoing multicasts */
110 u_char imo_multicast_loop; /* 1 => hear sends if a member */
111 u_short imo_num_memberships; /* no. memberships this socket */
112 u_short imo_max_memberships; /* max memberships this socket */
113 struct in_multi *imo_membership[IP_MAX_MEMBERSHIPS];
114 u_long imo_multicast_vif; /* vif num outgoing multicasts */
118 * IP Statistics.
120 * NOTE: Make sure this struct's size is multiple cache line size.
122 struct ip_stats {
123 u_long ips_total; /* total packets received */
124 u_long ips_badsum; /* checksum bad */
125 u_long ips_tooshort; /* packet too short */
126 u_long ips_toosmall; /* not enough data */
127 u_long ips_badhlen; /* ip header length < data size */
128 u_long ips_badlen; /* ip length < ip header length */
129 u_long ips_fragments; /* fragments received */
130 u_long ips_fragdropped; /* frags dropped (dups, out of space) */
131 u_long ips_fragtimeout; /* fragments timed out */
132 u_long ips_forward; /* packets forwarded */
133 u_long ips_fastforward; /* packets fast forwarded */
134 u_long ips_cantforward; /* packets rcvd for unreachable dest */
135 u_long ips_redirectsent; /* packets forwarded on same net */
136 u_long ips_noproto; /* unknown or unsupported protocol */
137 u_long ips_delivered; /* datagrams delivered to upper level*/
138 u_long ips_localout; /* total ip packets generated here */
139 u_long ips_odropped; /* lost packets due to nobufs, etc. */
140 u_long ips_reassembled; /* total packets reassembled ok */
141 u_long ips_fragmented; /* datagrams successfully fragmented */
142 u_long ips_ofragments; /* output fragments created */
143 u_long ips_cantfrag; /* don't fragment flag was set, etc. */
144 u_long ips_badoptions; /* error in option processing */
145 u_long ips_noroute; /* packets discarded due to no route */
146 u_long ips_badvers; /* ip version != 4 */
147 u_long ips_rawout; /* total raw ip packets generated */
148 u_long ips_toolong; /* ip length > max ip packet size */
149 u_long ips_notmember; /* multicasts for unregistered grps */
150 u_long ips_nogif; /* no match gif found */
151 u_long ips_badaddr; /* invalid address on header */
152 u_long ips_pad[3]; /* pad to cache line size (64B) */
155 #ifdef _KERNEL
157 #define ipstat ipstats_percpu[mycpuid]
159 extern struct ip_stats ipstats_percpu[MAXCPU];
161 /* flags passed to ip_output as last parameter */
162 #define IP_FORWARDING 0x1 /* most of ip header exists */
163 #define IP_RAWOUTPUT 0x2 /* raw ip header exists */
164 #define IP_ROUTETOIF SO_DONTROUTE /* bypass routing tables */
165 #define IP_ALLOWBROADCAST SO_BROADCAST /* can send broadcast packets */
166 #define IP_DEBUGROUTE 0x10000 /* debug route */
168 struct ip;
169 struct inpcb;
170 struct route;
171 struct sockopt;
172 struct lwkt_port;
173 struct pktinfo;
174 union netmsg;
176 extern u_short ip_id; /* ip packet ctr, for ids */
177 extern int ip_defttl; /* default IP ttl */
178 extern int ipforwarding; /* ip forwarding */
179 extern u_char ip_protox[];
180 extern struct socket *ip_rsvpd; /* reservation protocol daemon */
181 extern struct socket *ip_mrouter; /* multicast routing daemon */
182 extern int (*legal_vif_num)(int);
183 extern u_long (*ip_mcast_src)(int);
184 extern int rsvp_on;
185 extern struct pr_usrreqs rip_usrreqs;
187 void ip_ctloutput(union netmsg *);
188 void ip_drain(void);
189 int ip_fragment(struct ip *ip, struct mbuf **m_frag, int mtu,
190 u_long if_hwassist_flags, int sw_csum);
191 struct mbuf *
192 ip_reass(struct mbuf *);
193 void ip_freemoptions(struct ip_moptions *);
194 void ip_init(void);
195 extern int (*ip_mforward)(struct ip *, struct ifnet *, struct mbuf *,
196 struct ip_moptions *);
198 void ip_hashfn(struct mbuf **, int);
199 void ip_hashcheck(struct mbuf *, const struct pktinfo *);
201 boolean_t
202 ip_lengthcheck(struct mbuf **, int);
203 int ip_output(struct mbuf *,
204 struct mbuf *, struct route *, int, struct ip_moptions *,
205 struct inpcb *);
206 struct in_ifaddr *
207 ip_rtaddr(struct in_addr, struct route *);
208 void ip_savecontrol(struct inpcb *, struct mbuf **, struct ip *,
209 struct mbuf *);
210 void ip_slowtimo(void);
211 struct mbuf *
212 ip_srcroute(struct mbuf *);
213 void ip_stripoptions(struct mbuf *);
214 u_int16_t ip_randomid(void);
215 void rip_ctloutput(union netmsg *);
216 void rip_ctlinput(union netmsg *);
217 void rip_init(void);
218 int rip_input(struct mbuf **, int *, int);
219 int rip_output(struct mbuf *, struct socket *, ...);
220 extern int (*ipip_input)(struct mbuf **, int *, int);
221 int rsvp_input(struct mbuf **, int *, int);
222 int ip_rsvp_init(struct socket *);
223 int ip_rsvp_done(void);
224 extern int (*ip_rsvp_vif)(struct socket *, struct sockopt *);
225 extern void (*ip_rsvp_force_done)(struct socket *);
226 extern int (*rsvp_input_p)(struct mbuf **, int *, int);
228 extern struct pfil_head inet_pfil_hook;
230 void in_delayed_cksum(struct mbuf *m);
232 static __inline uint16_t ip_newid(void);
233 extern int ip_do_randomid;
235 static __inline uint16_t
236 ip_newid(void)
238 if (ip_do_randomid)
239 return ip_randomid();
240 else
241 return __htons(ip_id++);
244 #endif /* _KERNEL */
246 #endif /* !_NETINET_IP_VAR_H_ */