HAMMER 60I/Many: Mirroring
[dragonfly.git] / sys / netinet / ip_var.h
bloba3095d70d60c82ccad70f8ebece5ac1cd88c512b
1 /*
2 * Copyright (c) 1982, 1986, 1993
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
33 * @(#)ip_var.h 8.2 (Berkeley) 1/9/95
34 * $FreeBSD: src/sys/netinet/ip_var.h,v 1.50.2.13 2003/08/24 08:24:38 hsu Exp $
35 * $DragonFly: src/sys/netinet/ip_var.h,v 1.22 2007/12/19 11:00:22 sephe Exp $
38 #ifndef _NETINET_IP_VAR_H_
39 #define _NETINET_IP_VAR_H_
41 #ifndef _SYS_TYPES_H_
42 #include <sys/types.h>
43 #endif
44 #ifndef _SYS_QUEUE_H_
45 #include <sys/queue.h>
46 #endif
47 #ifndef _NETINET_IN_H_
48 #include <netinet/in.h>
49 #endif
51 #ifdef _KERNEL
53 #ifndef _MACHINE_ENDIAN_H_
54 #include <machine/endian.h>
55 #endif
56 #ifndef _MACHINE_PARAM_H_
57 #include <machine/param.h>
58 #endif
59 #ifndef _NET_ROUTE_H
60 #include <net/route.h>
61 #endif
63 #endif
66 * Overlay for ip header used by other protocols (tcp, udp).
68 struct ipovly {
69 u_char ih_x1[9]; /* (unused) */
70 u_char ih_pr; /* protocol */
71 u_short ih_len; /* protocol length */
72 struct in_addr ih_src; /* source internet address */
73 struct in_addr ih_dst; /* destination internet address */
77 * Ip reassembly queue structure. Each fragment
78 * being reassembled is attached to one of these structures.
79 * They are timed out after ipq_ttl drops to 0, and may also
80 * be reclaimed if memory becomes tight.
82 struct ipq {
83 struct ipq *next,*prev; /* to other reass headers */
84 u_char ipq_ttl; /* time for reass q to live */
85 u_char ipq_p; /* protocol of this fragment */
86 u_short ipq_id; /* sequence id for reassembly */
87 struct mbuf *ipq_frags; /* to ip headers of fragments */
88 struct in_addr ipq_src,ipq_dst;
89 u_char ipq_nfrags; /* # frags in this packet */
90 #ifdef IPDIVERT
91 u_int32_t ipq_div_info; /* ipfw divert port & flags */
92 #endif
96 * Structure stored in mbuf in inpcb.ip_options
97 * and passed to ip_output when ip options are in use.
98 * The actual length of the options (including ipopt_dst)
99 * is in m_len.
101 #define MAX_IPOPTLEN 40
103 struct ipoption {
104 struct in_addr ipopt_dst; /* first-hop dst if source routed */
105 char ipopt_list[MAX_IPOPTLEN]; /* options proper */
109 * Structure attached to inpcb.ip_moptions and
110 * passed to ip_output when IP multicast options are in use.
112 struct ip_moptions {
113 struct ifnet *imo_multicast_ifp; /* ifp for outgoing multicasts */
114 struct in_addr imo_multicast_addr; /* ifindex/addr on MULTICAST_IF */
115 u_char imo_multicast_ttl; /* TTL for outgoing multicasts */
116 u_char imo_multicast_loop; /* 1 => hear sends if a member */
117 u_short imo_num_memberships; /* no. memberships this socket */
118 u_short imo_max_memberships; /* max memberships this socket */
119 struct in_multi *imo_membership[IP_MAX_MEMBERSHIPS];
120 u_long imo_multicast_vif; /* vif num outgoing multicasts */
124 * IP Statistics.
126 struct ip_stats {
127 u_long ips_total; /* total packets received */
128 u_long ips_badsum; /* checksum bad */
129 u_long ips_tooshort; /* packet too short */
130 u_long ips_toosmall; /* not enough data */
131 u_long ips_badhlen; /* ip header length < data size */
132 u_long ips_badlen; /* ip length < ip header length */
133 u_long ips_fragments; /* fragments received */
134 u_long ips_fragdropped; /* frags dropped (dups, out of space) */
135 u_long ips_fragtimeout; /* fragments timed out */
136 u_long ips_forward; /* packets forwarded */
137 u_long ips_fastforward; /* packets fast forwarded */
138 u_long ips_cantforward; /* packets rcvd for unreachable dest */
139 u_long ips_redirectsent; /* packets forwarded on same net */
140 u_long ips_noproto; /* unknown or unsupported protocol */
141 u_long ips_delivered; /* datagrams delivered to upper level*/
142 u_long ips_localout; /* total ip packets generated here */
143 u_long ips_odropped; /* lost packets due to nobufs, etc. */
144 u_long ips_reassembled; /* total packets reassembled ok */
145 u_long ips_fragmented; /* datagrams successfully fragmented */
146 u_long ips_ofragments; /* output fragments created */
147 u_long ips_cantfrag; /* don't fragment flag was set, etc. */
148 u_long ips_badoptions; /* error in option processing */
149 u_long ips_noroute; /* packets discarded due to no route */
150 u_long ips_badvers; /* ip version != 4 */
151 u_long ips_rawout; /* total raw ip packets generated */
152 u_long ips_toolong; /* ip length > max ip packet size */
153 u_long ips_notmember; /* multicasts for unregistered grps */
154 u_long ips_nogif; /* no match gif found */
155 u_long ips_badaddr; /* invalid address on header */
158 #ifdef _KERNEL
160 #if defined(SMP)
161 #define ipstat ipstats_percpu[mycpuid]
162 #else /* !SMP */
163 #define ipstat ipstats_percpu[0]
164 #endif
166 extern struct ip_stats ipstats_percpu[MAXCPU];
168 /* flags passed to ip_output as last parameter */
169 #define IP_FORWARDING 0x1 /* most of ip header exists */
170 #define IP_RAWOUTPUT 0x2 /* raw ip header exists */
171 #define IP_ROUTETOIF SO_DONTROUTE /* bypass routing tables */
172 #define IP_ALLOWBROADCAST SO_BROADCAST /* can send broadcast packets */
174 /* direction passed to ip_mport as last parameter */
175 #define IP_MPORT_IN 0 /* Find lwkt port for incoming packets */
176 #define IP_MPORT_OUT 1 /* Find lwkt port for outgoing packets */
178 struct ip;
179 struct inpcb;
180 struct route;
181 struct sockopt;
182 struct lwkt_port;
184 extern u_short ip_id; /* ip packet ctr, for ids */
185 extern int ip_defttl; /* default IP ttl */
186 extern int ipforwarding; /* ip forwarding */
187 extern struct route ipforward_rt[]; /* ip forwarding cached route */
188 extern u_char ip_protox[];
189 extern struct socket *ip_rsvpd; /* reservation protocol daemon */
190 extern struct socket *ip_mrouter; /* multicast routing daemon */
191 extern int (*legal_vif_num)(int);
192 extern u_long (*ip_mcast_src)(int);
193 extern int rsvp_on;
194 extern struct pr_usrreqs rip_usrreqs;
196 int ip_ctloutput(struct socket *, struct sockopt *sopt);
197 void ip_drain(void);
198 int ip_fragment(struct ip *ip, struct mbuf **m_frag, int mtu,
199 u_long if_hwassist_flags, int sw_csum);
200 void ip_freemoptions(struct ip_moptions *);
201 void ip_init(void);
202 extern int (*ip_mforward)(struct ip *, struct ifnet *, struct mbuf *,
203 struct ip_moptions *);
204 struct lwkt_port *
205 ip_mport_in(struct mbuf **);
206 struct lwkt_port *
207 ip_mport(struct mbuf **, int);
208 boolean_t
209 ip_lengthcheck(struct mbuf **);
210 int ip_output(struct mbuf *,
211 struct mbuf *, struct route *, int, struct ip_moptions *,
212 struct inpcb *);
213 struct in_ifaddr *
214 ip_rtaddr(struct in_addr, struct route *);
215 void ip_savecontrol(struct inpcb *, struct mbuf **, struct ip *,
216 struct mbuf *);
217 void ip_slowtimo(void);
218 struct mbuf *
219 ip_srcroute(void);
220 void ip_stripoptions(struct mbuf *);
221 u_int16_t ip_randomid(void);
222 int rip_ctloutput(struct socket *, struct sockopt *);
223 void rip_ctlinput(int, struct sockaddr *, void *);
224 void rip_init(void);
225 void rip_input(struct mbuf *, ...);
226 int rip_output(struct mbuf *, struct socket *, ...);
227 extern void (*ipip_input)(struct mbuf *, int, int);
228 void rsvp_input(struct mbuf *, ...);
229 int ip_rsvp_init(struct socket *);
230 int ip_rsvp_done(void);
231 extern int (*ip_rsvp_vif)(struct socket *, struct sockopt *);
232 extern void (*ip_rsvp_force_done)(struct socket *);
233 extern void (*rsvp_input_p)(struct mbuf *m, ...);
235 #ifdef IPDIVERT
236 void div_init(void);
237 void div_input(struct mbuf *, ...);
238 struct lwkt_port *
239 div_soport(struct socket *, struct sockaddr *,
240 struct mbuf **, int);
241 void divert_packet(struct mbuf *m, int incoming, int port);
242 extern struct pr_usrreqs div_usrreqs;
243 #endif
245 extern struct pfil_head inet_pfil_hook;
247 void in_delayed_cksum(struct mbuf *m);
249 static __inline uint16_t ip_newid(void);
250 extern int ip_do_randomid;
252 static __inline uint16_t
253 ip_newid(void)
255 if (ip_do_randomid)
256 return ip_randomid();
257 else
258 return __htons(ip_id++);
261 #endif /* _KERNEL */
263 #endif /* !_NETINET_IP_VAR_H_ */