xref: /freebsd/sys/netinet/ip_var.h (revision 11afcc8f9f96d657b8e6f7547c02c1957331fc96)
1 /*
2  * Copyright (c) 1982, 1986, 1993
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  * 3. All advertising materials mentioning features or use of this software
14  *    must display the following acknowledgement:
15  *	This product includes software developed by the University of
16  *	California, Berkeley and its contributors.
17  * 4. Neither the name of the University nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  *
33  *	@(#)ip_var.h	8.2 (Berkeley) 1/9/95
34  *	$Id: ip_var.h,v 1.42 1998/07/06 03:20:18 julian Exp $
35  */
36 
37 #ifndef _NETINET_IP_VAR_H_
38 #define	_NETINET_IP_VAR_H_
39 
40 /*
41  * Overlay for ip header used by other protocols (tcp, udp).
42  */
43 struct ipovly {
44 	caddr_t	ih_next, ih_prev;	/* for protocol sequence q's */
45 	u_char	ih_x1;			/* (unused) */
46 	u_char	ih_pr;			/* protocol */
47 	u_short	ih_len;			/* protocol length */
48 	struct	in_addr ih_src;		/* source internet address */
49 	struct	in_addr ih_dst;		/* destination internet address */
50 };
51 
52 /*
53  * Ip reassembly queue structure.  Each fragment
54  * being reassembled is attached to one of these structures.
55  * They are timed out after ipq_ttl drops to 0, and may also
56  * be reclaimed if memory becomes tight.
57  */
58 struct ipq {
59 	struct	ipq *next,*prev;	/* to other reass headers */
60 	u_char	ipq_ttl;		/* time for reass q to live */
61 	u_char	ipq_p;			/* protocol of this fragment */
62 	u_short	ipq_id;			/* sequence id for reassembly */
63 	struct	ipasfrag *ipq_next,*ipq_prev;
64 					/* to ip headers of fragments */
65 	struct	in_addr ipq_src,ipq_dst;
66 #ifdef IPDIVERT
67 	u_short ipq_divert;		/* divert protocol port */
68 	u_short ipq_div_cookie;		/* divert protocol cookie */
69 #endif
70 };
71 
72 /*
73  * Ip header, when holding a fragment.
74  *
75  * Note: ipf_next must be at same offset as ipq_next above
76  */
77 struct	ipasfrag {
78 #if BYTE_ORDER == LITTLE_ENDIAN
79 	u_int	ip_hl:4,
80 		ip_v:4;
81 #endif
82 #if BYTE_ORDER == BIG_ENDIAN
83 	u_int	ip_v:4,
84 		ip_hl:4;
85 #endif
86 	u_char	ipf_mff;		/* XXX overlays ip_tos: use low bit
87 					 * to avoid destroying tos;
88 					 * copied from (ip_off&IP_MF) */
89 	u_short	ip_len;
90 	u_short	ip_id;
91 	u_short	ip_off;
92 	u_char	ip_ttl;
93 	u_char	ip_p;
94 	u_short	ip_sum;
95 	struct	ipasfrag *ipf_next;	/* next fragment */
96 	struct	ipasfrag *ipf_prev;	/* previous fragment */
97 };
98 
99 /*
100  * Structure stored in mbuf in inpcb.ip_options
101  * and passed to ip_output when ip options are in use.
102  * The actual length of the options (including ipopt_dst)
103  * is in m_len.
104  */
105 #define MAX_IPOPTLEN	40
106 
107 struct ipoption {
108 	struct	in_addr ipopt_dst;	/* first-hop dst if source routed */
109 	char	ipopt_list[MAX_IPOPTLEN];	/* options proper */
110 };
111 
112 /*
113  * Structure attached to inpcb.ip_moptions and
114  * passed to ip_output when IP multicast options are in use.
115  */
116 struct ip_moptions {
117 	struct	ifnet *imo_multicast_ifp; /* ifp for outgoing multicasts */
118 	u_char	imo_multicast_ttl;	/* TTL for outgoing multicasts */
119 	u_char	imo_multicast_loop;	/* 1 => hear sends if a member */
120 	u_short	imo_num_memberships;	/* no. memberships this socket */
121 	struct	in_multi *imo_membership[IP_MAX_MEMBERSHIPS];
122 	u_long	imo_multicast_vif;	/* vif num outgoing multicasts */
123 };
124 
125 struct	ipstat {
126 	u_long	ips_total;		/* total packets received */
127 	u_long	ips_badsum;		/* checksum bad */
128 	u_long	ips_tooshort;		/* packet too short */
129 	u_long	ips_toosmall;		/* not enough data */
130 	u_long	ips_badhlen;		/* ip header length < data size */
131 	u_long	ips_badlen;		/* ip length < ip header length */
132 	u_long	ips_fragments;		/* fragments received */
133 	u_long	ips_fragdropped;	/* frags dropped (dups, out of space) */
134 	u_long	ips_fragtimeout;	/* fragments timed out */
135 	u_long	ips_forward;		/* packets forwarded */
136 	u_long	ips_fastforward;	/* packets fast forwarded */
137 	u_long	ips_cantforward;	/* packets rcvd for unreachable dest */
138 	u_long	ips_redirectsent;	/* packets forwarded on same net */
139 	u_long	ips_noproto;		/* unknown or unsupported protocol */
140 	u_long	ips_delivered;		/* datagrams delivered to upper level*/
141 	u_long	ips_localout;		/* total ip packets generated here */
142 	u_long	ips_odropped;		/* lost packets due to nobufs, etc. */
143 	u_long	ips_reassembled;	/* total packets reassembled ok */
144 	u_long	ips_fragmented;		/* datagrams successfully fragmented */
145 	u_long	ips_ofragments;		/* output fragments created */
146 	u_long	ips_cantfrag;		/* don't fragment flag was set, etc. */
147 	u_long	ips_badoptions;		/* error in option processing */
148 	u_long	ips_noroute;		/* packets discarded due to no route */
149 	u_long	ips_badvers;		/* ip version != 4 */
150 	u_long	ips_rawout;		/* total raw ip packets generated */
151 	u_long	ips_toolong;		/* ip length > max ip packet size */
152 	u_long	ips_notmember;		/* multicasts for unregistered grps */
153 };
154 
155 #ifdef KERNEL
156 
157 /* flags passed to ip_output as last parameter */
158 #define	IP_FORWARDING		0x1		/* most of ip header exists */
159 #define	IP_RAWOUTPUT		0x2		/* raw ip header exists */
160 #define	IP_ROUTETOIF		SO_DONTROUTE	/* bypass routing tables */
161 #define	IP_ALLOWBROADCAST	SO_BROADCAST	/* can send broadcast packets */
162 
163 struct inpcb;
164 struct route;
165 
166 extern struct	ipstat	ipstat;
167 extern u_short	ip_id;				/* ip packet ctr, for ids */
168 extern int	ip_defttl;			/* default IP ttl */
169 extern int	ipforwarding;			/* ip forwarding */
170 extern u_char	ip_protox[];
171 extern struct socket *ip_rsvpd;	/* reservation protocol daemon */
172 extern struct socket *ip_mrouter; /* multicast routing daemon */
173 extern int	(*legal_vif_num) __P((int));
174 extern u_long	(*ip_mcast_src) __P((int));
175 extern int rsvp_on;
176 extern struct	pr_usrreqs rip_usrreqs;
177 
178 int	 ip_ctloutput __P((int, struct socket *, int, int, struct mbuf **,
179 			   struct proc *));
180 void	 ip_drain __P((void));
181 void	 ip_freemoptions __P((struct ip_moptions *));
182 void	 ip_init __P((void));
183 extern int	 (*ip_mforward) __P((struct ip *, struct ifnet *, struct mbuf *,
184 			  struct ip_moptions *));
185 int	 ip_output __P((struct mbuf *,
186 	    struct mbuf *, struct route *, int, struct ip_moptions *));
187 void	 ip_savecontrol __P((struct inpcb *, struct mbuf **, struct ip *,
188 		struct mbuf *));
189 void	 ip_slowtimo __P((void));
190 struct mbuf *
191 	 ip_srcroute __P((void));
192 void	 ip_stripoptions __P((struct mbuf *, struct mbuf *));
193 int	 rip_ctloutput __P((int, struct socket *, int, int, struct mbuf **,
194 			    struct proc *p));
195 void	 rip_ctlinput __P((int, struct sockaddr *, void *));
196 void	 rip_init __P((void));
197 void	 rip_input __P((struct mbuf *, int));
198 int	 rip_output __P((struct mbuf *, struct socket *, u_long));
199 void	ipip_input __P((struct mbuf *, int));
200 void	rsvp_input __P((struct mbuf *, int));
201 int	ip_rsvp_init __P((struct socket *));
202 int	ip_rsvp_done __P((void));
203 int	ip_rsvp_vif_init __P((struct socket *, struct mbuf *));
204 int	ip_rsvp_vif_done __P((struct socket *, struct mbuf *));
205 void	ip_rsvp_force_done __P((struct socket *));
206 
207 #ifdef IPDIVERT
208 void	div_init __P((void));
209 void	div_input __P((struct mbuf *, int));
210 extern struct pr_usrreqs div_usrreqs;
211 extern u_short ip_divert_port;
212 extern u_short ip_divert_cookie;
213 #endif
214 
215 extern struct sockaddr_in *ip_fw_fwd_addr;
216 
217 #endif /* KERNEL */
218 
219 #endif /* !_NETINET_IP_VAR_H_ */
220