Bring CARP into the tree. CARP = Common Address Redundancy Protocol, which
[dragonfly.git] / sys / netinet / ip_var.h
CommitLineData
984263bc
MD
1/*
2 * Copyright (c) 1982, 1986, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 *
33 * @(#)ip_var.h 8.2 (Berkeley) 1/9/95
f1f552f6 34 * $FreeBSD: src/sys/netinet/ip_var.h,v 1.50.2.13 2003/08/24 08:24:38 hsu Exp $
0d16ba1d 35 * $DragonFly: src/sys/netinet/ip_var.h,v 1.21 2007/08/16 20:03:57 dillon Exp $
984263bc
MD
36 */
37
38#ifndef _NETINET_IP_VAR_H_
39#define _NETINET_IP_VAR_H_
40
1bd40720
MD
41#ifndef _SYS_TYPES_H_
42#include <sys/types.h>
43#endif
44#ifndef _SYS_QUEUE_H_
984263bc 45#include <sys/queue.h>
1bd40720
MD
46#endif
47#ifndef _NETINET_IN_H_
48#include <netinet/in.h>
49#endif
50
51#ifdef _KERNEL
52
53#ifndef _MACHINE_ENDIAN_H_
54#include <machine/endian.h>
55#endif
56#ifndef _MACHINE_PARAM_H_
57#include <machine/param.h>
58#endif
70068ffd
SW
59#ifndef _NET_ROUTE_H
60#include <net/route.h>
61#endif
1bd40720
MD
62
63#endif
984263bc
MD
64
65/*
66 * Overlay for ip header used by other protocols (tcp, udp).
67 */
68struct ipovly {
69 u_char ih_x1[9]; /* (unused) */
70 u_char ih_pr; /* protocol */
71 u_short ih_len; /* protocol length */
72 struct in_addr ih_src; /* source internet address */
73 struct in_addr ih_dst; /* destination internet address */
74};
75
76/*
77 * Ip reassembly queue structure. Each fragment
78 * being reassembled is attached to one of these structures.
79 * They are timed out after ipq_ttl drops to 0, and may also
80 * be reclaimed if memory becomes tight.
81 */
82struct ipq {
83 struct ipq *next,*prev; /* to other reass headers */
84 u_char ipq_ttl; /* time for reass q to live */
85 u_char ipq_p; /* protocol of this fragment */
86 u_short ipq_id; /* sequence id for reassembly */
87 struct mbuf *ipq_frags; /* to ip headers of fragments */
88 struct in_addr ipq_src,ipq_dst;
89 u_char ipq_nfrags; /* # frags in this packet */
90#ifdef IPDIVERT
91 u_int32_t ipq_div_info; /* ipfw divert port & flags */
984263bc
MD
92#endif
93};
94
95/*
96 * Structure stored in mbuf in inpcb.ip_options
97 * and passed to ip_output when ip options are in use.
98 * The actual length of the options (including ipopt_dst)
99 * is in m_len.
100 */
101#define MAX_IPOPTLEN 40
102
103struct ipoption {
104 struct in_addr ipopt_dst; /* first-hop dst if source routed */
105 char ipopt_list[MAX_IPOPTLEN]; /* options proper */
106};
107
108/*
109 * Structure attached to inpcb.ip_moptions and
110 * passed to ip_output when IP multicast options are in use.
111 */
112struct ip_moptions {
113 struct ifnet *imo_multicast_ifp; /* ifp for outgoing multicasts */
114 struct in_addr imo_multicast_addr; /* ifindex/addr on MULTICAST_IF */
115 u_char imo_multicast_ttl; /* TTL for outgoing multicasts */
116 u_char imo_multicast_loop; /* 1 => hear sends if a member */
117 u_short imo_num_memberships; /* no. memberships this socket */
0d16ba1d 118 u_short imo_max_memberships; /* max memberships this socket */
984263bc
MD
119 struct in_multi *imo_membership[IP_MAX_MEMBERSHIPS];
120 u_long imo_multicast_vif; /* vif num outgoing multicasts */
121};
122
fc9c7b4f
HP
123/*
124 * IP Statistics.
125 */
126struct ip_stats {
984263bc
MD
127 u_long ips_total; /* total packets received */
128 u_long ips_badsum; /* checksum bad */
129 u_long ips_tooshort; /* packet too short */
130 u_long ips_toosmall; /* not enough data */
131 u_long ips_badhlen; /* ip header length < data size */
132 u_long ips_badlen; /* ip length < ip header length */
133 u_long ips_fragments; /* fragments received */
134 u_long ips_fragdropped; /* frags dropped (dups, out of space) */
135 u_long ips_fragtimeout; /* fragments timed out */
136 u_long ips_forward; /* packets forwarded */
137 u_long ips_fastforward; /* packets fast forwarded */
138 u_long ips_cantforward; /* packets rcvd for unreachable dest */
139 u_long ips_redirectsent; /* packets forwarded on same net */
140 u_long ips_noproto; /* unknown or unsupported protocol */
141 u_long ips_delivered; /* datagrams delivered to upper level*/
142 u_long ips_localout; /* total ip packets generated here */
143 u_long ips_odropped; /* lost packets due to nobufs, etc. */
144 u_long ips_reassembled; /* total packets reassembled ok */
145 u_long ips_fragmented; /* datagrams successfully fragmented */
146 u_long ips_ofragments; /* output fragments created */
147 u_long ips_cantfrag; /* don't fragment flag was set, etc. */
148 u_long ips_badoptions; /* error in option processing */
149 u_long ips_noroute; /* packets discarded due to no route */
150 u_long ips_badvers; /* ip version != 4 */
151 u_long ips_rawout; /* total raw ip packets generated */
152 u_long ips_toolong; /* ip length > max ip packet size */
153 u_long ips_notmember; /* multicasts for unregistered grps */
154 u_long ips_nogif; /* no match gif found */
155 u_long ips_badaddr; /* invalid address on header */
156};
157
158#ifdef _KERNEL
159
70068ffd
SW
160#if defined(SMP)
161#define ipstat ipstats_percpu[mycpuid]
162#else /* !SMP */
163#define ipstat ipstats_percpu[0]
164#endif
165
166extern struct ip_stats ipstats_percpu[MAXCPU];
167
984263bc
MD
168/* flags passed to ip_output as last parameter */
169#define IP_FORWARDING 0x1 /* most of ip header exists */
170#define IP_RAWOUTPUT 0x2 /* raw ip header exists */
171#define IP_ROUTETOIF SO_DONTROUTE /* bypass routing tables */
172#define IP_ALLOWBROADCAST SO_BROADCAST /* can send broadcast packets */
173
174struct ip;
175struct inpcb;
176struct route;
177struct sockopt;
bf82f9b7 178struct lwkt_port;
984263bc 179
984263bc 180extern u_short ip_id; /* ip packet ctr, for ids */
984263bc
MD
181extern int ip_defttl; /* default IP ttl */
182extern int ipforwarding; /* ip forwarding */
ecdefdda 183extern struct route ipforward_rt[]; /* ip forwarding cached route */
984263bc 184extern u_char ip_protox[];
ecdefdda
MD
185extern struct socket *ip_rsvpd; /* reservation protocol daemon */
186extern struct socket *ip_mrouter; /* multicast routing daemon */
984263bc
MD
187extern int (*legal_vif_num)(int);
188extern u_long (*ip_mcast_src)(int);
189extern int rsvp_on;
190extern struct pr_usrreqs rip_usrreqs;
191
192int ip_ctloutput(struct socket *, struct sockopt *sopt);
193void ip_drain(void);
f1f552f6
JH
194int ip_fragment(struct ip *ip, struct mbuf **m_frag, int mtu,
195 u_long if_hwassist_flags, int sw_csum);
984263bc
MD
196void ip_freemoptions(struct ip_moptions *);
197void ip_init(void);
198extern int (*ip_mforward)(struct ip *, struct ifnet *, struct mbuf *,
199 struct ip_moptions *);
bf82f9b7 200struct lwkt_port *
b01ae44a 201 ip_mport(struct mbuf **);
1e316d14
JH
202boolean_t
203 ip_lengthcheck(struct mbuf **);
984263bc
MD
204int ip_output(struct mbuf *,
205 struct mbuf *, struct route *, int, struct ip_moptions *,
206 struct inpcb *);
207struct in_ifaddr *
208 ip_rtaddr(struct in_addr, struct route *);
209void ip_savecontrol(struct inpcb *, struct mbuf **, struct ip *,
210 struct mbuf *);
211void ip_slowtimo(void);
212struct mbuf *
213 ip_srcroute(void);
bddf0751 214void ip_stripoptions(struct mbuf *);
6277137d 215u_int16_t ip_randomid(void);
984263bc
MD
216int rip_ctloutput(struct socket *, struct sockopt *);
217void rip_ctlinput(int, struct sockaddr *, void *);
218void rip_init(void);
a00138cb 219void rip_input(struct mbuf *, ...);
deffea2e 220int rip_output(struct mbuf *, struct socket *, ...);
984263bc 221extern void (*ipip_input)(struct mbuf *, int, int);
a00138cb 222void rsvp_input(struct mbuf *, ...);
984263bc
MD
223int ip_rsvp_init(struct socket *);
224int ip_rsvp_done(void);
225extern int (*ip_rsvp_vif)(struct socket *, struct sockopt *);
226extern void (*ip_rsvp_force_done)(struct socket *);
a00138cb 227extern void (*rsvp_input_p)(struct mbuf *m, ...);
984263bc
MD
228
229#ifdef IPDIVERT
230void div_init(void);
a00138cb 231void div_input(struct mbuf *, ...);
e5ecc832 232void divert_packet(struct mbuf *m, int incoming, int port);
984263bc
MD
233extern struct pr_usrreqs div_usrreqs;
234#endif
235
e7e55f42 236extern struct pfil_head inet_pfil_hook;
e7e55f42 237
984263bc
MD
238void in_delayed_cksum(struct mbuf *m);
239
6277137d
MD
240static __inline uint16_t ip_newid(void);
241extern int ip_do_randomid;
242
243static __inline uint16_t
244ip_newid(void)
245{
246 if (ip_do_randomid)
247 return ip_randomid();
248 else
1bd40720 249 return __htons(ip_id++);
6277137d
MD
250}
251
984263bc
MD
252#endif /* _KERNEL */
253
254#endif /* !_NETINET_IP_VAR_H_ */