FreeBSD/Linux Kernel Cross Reference
sys/netinet/ip_var.h
1 /*
2 * Copyright (c) 1982, 1986, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 *
33 * @(#)ip_var.h 8.2 (Berkeley) 1/9/95
34 * $FreeBSD: src/sys/netinet/ip_var.h,v 1.24.2.6 1999/09/05 08:18:36 peter Exp $
35 */
36
37 #ifndef _NETINET_IP_VAR_H_
38 #define _NETINET_IP_VAR_H_
39
40 /*
41 * Overlay for ip header used by other protocols (tcp, udp).
42 */
43 struct ipovly {
44 caddr_t ih_next, ih_prev; /* for protocol sequence q's */
45 u_char ih_x1; /* (unused) */
46 u_char ih_pr; /* protocol */
47 u_short ih_len; /* protocol length */
48 struct in_addr ih_src; /* source internet address */
49 struct in_addr ih_dst; /* destination internet address */
50 };
51
52 /*
53 * Ip reassembly queue structure. Each fragment
54 * being reassembled is attached to one of these structures.
55 * They are timed out after ipq_ttl drops to 0, and may also
56 * be reclaimed if memory becomes tight.
57 */
58 struct ipq {
59 struct ipq *next,*prev; /* to other reass headers */
60 u_char ipq_ttl; /* time for reass q to live */
61 u_char ipq_p; /* protocol of this fragment */
62 u_short ipq_id; /* sequence id for reassembly */
63 struct ipasfrag *ipq_next,*ipq_prev;
64 /* to ip headers of fragments */
65 struct in_addr ipq_src,ipq_dst;
66 #ifdef IPDIVERT
67 u_short ipq_divert; /* divert protocol port */
68 #ifdef IPFW_DIVERT_RESTART
69 u_short ipq_div_cookie; /* divert protocol cookie */
70 #endif /* IPFW_DIVERT_RESTART */
71 #endif
72 };
73
74 /*
75 * Ip header, when holding a fragment.
76 *
77 * Note: ipf_next must be at same offset as ipq_next above
78 */
79 struct ipasfrag {
80 #if BYTE_ORDER == LITTLE_ENDIAN
81 u_char ip_hl:4,
82 ip_v:4;
83 #endif
84 #if BYTE_ORDER == BIG_ENDIAN
85 u_char ip_v:4,
86 ip_hl:4;
87 #endif
88 u_char ipf_mff; /* XXX overlays ip_tos: use low bit
89 * to avoid destroying tos;
90 * copied from (ip_off&IP_MF) */
91 u_short ip_len;
92 u_short ip_id;
93 u_short ip_off;
94 u_char ip_ttl;
95 u_char ip_p;
96 u_short ip_sum;
97 struct ipasfrag *ipf_next; /* next fragment */
98 struct ipasfrag *ipf_prev; /* previous fragment */
99 };
100
101 /*
102 * Structure stored in mbuf in inpcb.ip_options
103 * and passed to ip_output when ip options are in use.
104 * The actual length of the options (including ipopt_dst)
105 * is in m_len.
106 */
107 #define MAX_IPOPTLEN 40
108
109 struct ipoption {
110 struct in_addr ipopt_dst; /* first-hop dst if source routed */
111 char ipopt_list[MAX_IPOPTLEN]; /* options proper */
112 };
113
114 /*
115 * Structure attached to inpcb.ip_moptions and
116 * passed to ip_output when IP multicast options are in use.
117 */
118 struct ip_moptions {
119 struct ifnet *imo_multicast_ifp; /* ifp for outgoing multicasts */
120 u_char imo_multicast_ttl; /* TTL for outgoing multicasts */
121 u_char imo_multicast_loop; /* 1 => hear sends if a member */
122 u_short imo_num_memberships; /* no. memberships this socket */
123 struct in_multi *imo_membership[IP_MAX_MEMBERSHIPS];
124 u_long imo_multicast_vif; /* vif num outgoing multicasts */
125 };
126
127 struct ipstat {
128 u_long ips_total; /* total packets received */
129 u_long ips_badsum; /* checksum bad */
130 u_long ips_tooshort; /* packet too short */
131 u_long ips_toosmall; /* not enough data */
132 u_long ips_badhlen; /* ip header length < data size */
133 u_long ips_badlen; /* ip length < ip header length */
134 u_long ips_fragments; /* fragments received */
135 u_long ips_fragdropped; /* frags dropped (dups, out of space) */
136 u_long ips_fragtimeout; /* fragments timed out */
137 u_long ips_forward; /* packets forwarded */
138 u_long ips_cantforward; /* packets rcvd for unreachable dest */
139 u_long ips_redirectsent; /* packets forwarded on same net */
140 u_long ips_noproto; /* unknown or unsupported protocol */
141 u_long ips_delivered; /* datagrams delivered to upper level*/
142 u_long ips_localout; /* total ip packets generated here */
143 u_long ips_odropped; /* lost packets due to nobufs, etc. */
144 u_long ips_reassembled; /* total packets reassembled ok */
145 u_long ips_fragmented; /* datagrams successfully fragmented */
146 u_long ips_ofragments; /* output fragments created */
147 u_long ips_cantfrag; /* don't fragment flag was set, etc. */
148 u_long ips_badoptions; /* error in option processing */
149 u_long ips_noroute; /* packets discarded due to no route */
150 u_long ips_badvers; /* ip version != 4 */
151 u_long ips_rawout; /* total raw ip packets generated */
152 u_long ips_toolong; /* ip length > max ip packet size */
153 };
154
155 #ifdef KERNEL
156 /* flags passed to ip_output as last parameter */
157 #define IP_FORWARDING 0x1 /* most of ip header exists */
158 #define IP_RAWOUTPUT 0x2 /* raw ip header exists */
159 #define IP_ROUTETOIF SO_DONTROUTE /* bypass routing tables */
160 #define IP_ALLOWBROADCAST SO_BROADCAST /* can send broadcast packets */
161
162 struct inpcb;
163 struct route;
164
165 extern struct ipstat ipstat;
166 extern u_short ip_id; /* ip packet ctr, for ids */
167 extern int ip_defttl; /* default IP ttl */
168 extern u_char ip_protox[];
169 extern struct socket *ip_rsvpd; /* reservation protocol daemon */
170 extern struct socket *ip_mrouter; /* multicast routing daemon */
171 extern int (*legal_vif_num) __P((int));
172 extern u_long (*ip_mcast_src) __P((int));
173 extern int rsvp_on;
174
175 int ip_ctloutput __P((int, struct socket *, int, int, struct mbuf **));
176 void ip_drain __P((void));
177 void ip_freemoptions __P((struct ip_moptions *));
178 void ip_init __P((void));
179 extern int (*ip_mforward) __P((struct ip *, struct ifnet *, struct mbuf *,
180 struct ip_moptions *));
181 int ip_output __P((struct mbuf *,
182 struct mbuf *, struct route *, int, struct ip_moptions *));
183 void ip_savecontrol __P((struct inpcb *, struct mbuf **, struct ip *,
184 struct mbuf *));
185 void ip_slowtimo __P((void));
186 struct mbuf *
187 ip_srcroute __P((void));
188 void ip_stripoptions __P((struct mbuf *, struct mbuf *));
189 int rip_ctloutput __P((int, struct socket *, int, int, struct mbuf **));
190 void rip_init __P((void));
191 void rip_input __P((struct mbuf *, int));
192 int rip_output __P((struct mbuf *, struct socket *, u_long));
193 int rip_usrreq __P((struct socket *,
194 int, struct mbuf *, struct mbuf *, struct mbuf *));
195 void ipip_input __P((struct mbuf *, int));
196 void rsvp_input __P((struct mbuf *, int));
197 int ip_rsvp_init __P((struct socket *));
198 int ip_rsvp_done __P((void));
199 int ip_rsvp_vif_init __P((struct socket *, struct mbuf *));
200 int ip_rsvp_vif_done __P((struct socket *, struct mbuf *));
201 void ip_rsvp_force_done __P((struct socket *));
202
203 #ifdef IPDIVERT
204 void div_init __P((void));
205 void div_input __P((struct mbuf *, int));
206 int div_usrreq __P((struct socket *,
207 int, struct mbuf *, struct mbuf *, struct mbuf *));
208 extern u_short ip_divert_port;
209 extern u_short ip_divert_cookie;
210 #endif /* IPDIVERT */
211
212 #endif /* KERNEL */
213
214 #endif /* _NETINET_IP_VAR_H_ */
Cache object: adef81328f38643dac6759fa8ffcaca1
|