VirtualBox

source: vbox/trunk/src/VBox/Devices/Network/slirp/ip.h@ 14252

Last change on this file since 14252 was 14252, checked in by vboxsync, 16 years ago

csum validation hack, for testing IP integration of fragmentation routines borrowed from BSD

  • Property svn:eol-style set to native
File size: 10.9 KB
Line 
1/*
2 * Copyright (c) 1982, 1986, 1993
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. All advertising materials mentioning features or use of this software
14 * must display the following acknowledgement:
15 * This product includes software developed by the University of
16 * California, Berkeley and its contributors.
17 * 4. Neither the name of the University nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
20 *
21 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31 * SUCH DAMAGE.
32 *
33 * @(#)ip.h 8.1 (Berkeley) 6/10/93
34 * ip.h,v 1.3 1994/08/21 05:27:30 paul Exp
35 */
36
37#ifndef _IP_H_
38#define _IP_H_
39
40#ifdef VBOX_WITH_BSD_REASS
41# ifndef RT_OS_WINDOWS
42# include <sys/queue.h>
43# else
44/* XXX: Windows has own queue types declared in winnt.h (should look at them once again) */
45# endif
46#define VBOX_WITH_BSD_REASS_CKSUM_HACK
47/* XXX: Don't forget to import BSD routines csum validation of reassembled packet */
48#endif
49
50#ifdef WORDS_BIGENDIAN
51# ifndef NTOHL
52# define NTOHL(d)
53# endif
54# ifndef NTOHS
55# define NTOHS(d)
56# endif
57# ifndef HTONL
58# define HTONL(d)
59# endif
60# ifndef HTONS
61# define HTONS(d)
62# endif
63#else
64# ifndef NTOHL
65# define NTOHL(d) ((d) = ntohl((d)))
66# endif
67# ifndef NTOHS
68# define NTOHS(d) ((d) = ntohs((u_int16_t)(d)))
69# endif
70# ifndef HTONL
71# define HTONL(d) ((d) = htonl((d)))
72# endif
73# ifndef HTONS
74# define HTONS(d) ((d) = htons((u_int16_t)(d)))
75# endif
76#endif
77
78typedef u_int32_t n_long; /* long as received from the net */
79
80/*
81 * Definitions for internet protocol version 4.
82 * Per RFC 791, September 1981.
83 */
84#define IPVERSION 4
85
86/*
87 * Structure of an internet header, naked of options.
88 */
89struct ip {
90/*
91 * bitfield types must be u_int8_t for MSVC, otherwise it will use a full dword (for u_int)
92 */
93#ifdef WORDS_BIGENDIAN
94 u_int ip_v:4, /* version */
95 ip_hl:4; /* header length */
96#else
97#ifdef _MSC_VER
98 u_int8_t ip_hl:4, /* header length */
99#else
100 u_int ip_hl:4, /* header length */
101#endif
102 ip_v:4; /* version */
103#endif
104 u_int8_t ip_tos; /* type of service */
105 u_int16_t ip_len; /* total length */
106 u_int16_t ip_id; /* identification */
107 u_int16_t ip_off; /* fragment offset field */
108#define IP_DF 0x4000 /* don't fragment flag */
109#define IP_MF 0x2000 /* more fragments flag */
110#define IP_OFFMASK 0x1fff /* mask for fragmenting bits */
111 u_int8_t ip_ttl; /* time to live */
112 u_int8_t ip_p; /* protocol */
113 u_int16_t ip_sum; /* checksum */
114 struct in_addr ip_src,ip_dst; /* source and dest address */
115};
116
117#define IP_MAXPACKET 65535 /* maximum packet size */
118
119/*
120 * Definitions for IP type of service (ip_tos)
121 */
122#define IPTOS_LOWDELAY 0x10
123#define IPTOS_THROUGHPUT 0x08
124#define IPTOS_RELIABILITY 0x04
125
126/*
127 * Definitions for options.
128 */
129#define IPOPT_COPIED(o) ((o)&0x80)
130#define IPOPT_CLASS(o) ((o)&0x60)
131#define IPOPT_NUMBER(o) ((o)&0x1f)
132
133#define IPOPT_CONTROL 0x00
134#define IPOPT_RESERVED1 0x20
135#define IPOPT_DEBMEAS 0x40
136#define IPOPT_RESERVED2 0x60
137
138#define IPOPT_EOL 0 /* end of option list */
139#define IPOPT_NOP 1 /* no operation */
140
141#define IPOPT_RR 7 /* record packet route */
142#define IPOPT_TS 68 /* timestamp */
143#define IPOPT_SECURITY 130 /* provide s,c,h,tcc */
144#define IPOPT_LSRR 131 /* loose source route */
145#define IPOPT_SATID 136 /* satnet id */
146#define IPOPT_SSRR 137 /* strict source route */
147
148/*
149 * Offsets to fields in options other than EOL and NOP.
150 */
151#define IPOPT_OPTVAL 0 /* option ID */
152#define IPOPT_OLEN 1 /* option length */
153#define IPOPT_OFFSET 2 /* offset within option */
154#define IPOPT_MINOFF 4 /* min value of above */
155
156/*
157 * Time stamp option structure.
158 */
159struct ip_timestamp {
160 u_int8_t ipt_code; /* IPOPT_TS */
161 u_int8_t ipt_len; /* size of structure (variable) */
162 u_int8_t ipt_ptr; /* index of current entry */
163/*
164 * bitfield types must be u_int8_t for MSVC, otherwise it will use a full dword (for u_int)
165 */
166#ifdef WORDS_BIGENDIAN
167 u_int ipt_oflw:4, /* overflow counter */
168 ipt_flg:4; /* flags, see below */
169#else
170#ifdef _MSC_VER
171 u_int8_t ipt_flg:4, /* flags, see below */
172#else
173 u_int ipt_flg:4, /* flags, see below */
174#endif
175 ipt_oflw:4; /* overflow counter */
176#endif
177 union ipt_timestamp {
178 n_long ipt_time[1];
179 struct ipt_ta {
180 struct in_addr ipt_addr;
181 n_long ipt_time;
182 } ipt_ta[1];
183 } ipt_timestamp;
184};
185
186/* flag bits for ipt_flg */
187#define IPOPT_TS_TSONLY 0 /* timestamps only */
188#define IPOPT_TS_TSANDADDR 1 /* timestamps and addresses */
189#define IPOPT_TS_PRESPEC 3 /* specified modules only */
190
191/* bits for security (not byte swapped) */
192#define IPOPT_SECUR_UNCLASS 0x0000
193#define IPOPT_SECUR_CONFID 0xf135
194#define IPOPT_SECUR_EFTO 0x789a
195#define IPOPT_SECUR_MMMM 0xbc4d
196#define IPOPT_SECUR_RESTR 0xaf13
197#define IPOPT_SECUR_SECRET 0xd788
198#define IPOPT_SECUR_TOPSECRET 0x6bc5
199
200/*
201 * Internet implementation parameters.
202 */
203#define MAXTTL 255 /* maximum time to live (seconds) */
204#define IPDEFTTL 64 /* default ttl, from RFC 1340 */
205#define IPFRAGTTL 60 /* time to live for frags, slowhz */
206#define IPTTLDEC 1 /* subtracted when forwarding */
207
208#define IP_MSS 576 /* default maximum segment size */
209
210#ifdef HAVE_SYS_TYPES32_H /* Overcome some Solaris 2.x junk */
211#include <sys/types32.h>
212#else
213#if SIZEOF_CHAR_P == 4
214typedef caddr_t caddr32_t;
215#else
216typedef u_int32_t caddr32_t;
217#endif
218#endif
219
220#if SIZEOF_CHAR_P == 4
221typedef struct ipq_t *ipqp_32;
222typedef struct ipasfrag *ipasfragp_32;
223#else
224typedef caddr32_t ipqp_32;
225typedef caddr32_t ipasfragp_32;
226#endif
227
228/*
229 * Overlay for ip header used by other protocols (tcp, udp).
230 */
231struct ipovly {
232 caddr32_t ih_next, ih_prev; /* for protocol sequence q's */
233 u_int8_t ih_x1; /* (unused) */
234 u_int8_t ih_pr; /* protocol */
235 u_int16_t ih_len; /* protocol length */
236 struct in_addr ih_src; /* source internet address */
237 struct in_addr ih_dst; /* destination internet address */
238};
239
240/*
241 * Ip reassembly queue structure. Each fragment
242 * being reassembled is attached to one of these structures.
243 * They are timed out after ipq_ttl drops to 0, and may also
244 * be reclaimed if memory becomes tight.
245 * size 28 bytes
246 */
247struct ipq_t {
248#ifndef VBOX_WITH_BSD_REASS
249 ipqp_32 next,prev; /* to other reass headers */
250#else /* !VBOX_WITH_BSD_REASS */
251 TAILQ_ENTRY(ipq_t) ipq_list;
252#endif /* VBOX_WITH_BSD_REASS */
253 u_int8_t ipq_ttl; /* time for reass q to live */
254 u_int8_t ipq_p; /* protocol of this fragment */
255 u_int16_t ipq_id; /* sequence id for reassembly */
256#ifndef VBOX_WITH_BSD_REASS
257 ipasfragp_32 ipq_next,ipq_prev; /* to ip headers of fragments */
258#else /* !VBOX_WITH_BSD_REASS */
259 u_int8_t ipq_nfrags; /* # of fragments in this packet */
260 struct mbuf *ipq_frags; /* to ip headers of fragments */
261#endif /* VBOX_WITH_BSD_REASS */
262
263 struct in_addr ipq_src,ipq_dst;
264};
265
266#ifdef VBOX_WITH_BSD_REASS
267/*
268* IP datagram reassembly.
269*/
270#define IPREASS_NHASH_LOG2 6
271#define IPREASS_NHASH (1 << IPREASS_NHASH_LOG2)
272#define IPREASS_HMASK (IPREASS_NHASH - 1)
273#define IPREASS_HASH(x,y) \
274(((((x) & 0xF) | ((((x) >> 8) & 0xF) << 4)) ^ (y)) & IPREASS_HMASK)
275TAILQ_HEAD(ipqhead,ipq_t);
276#endif /* VBOX_WITH_BSD_REASS */
277
278/*
279 * Ip header, when holding a fragment.
280 *
281 * Note: ipf_next must be at same offset as ipq_next above
282 */
283struct ipasfrag {
284#ifdef WORDS_BIGENDIAN
285 u_int ip_v:4,
286 ip_hl:4;
287#else
288#ifdef _MSC_VER
289 u_int8_t ip_hl:4,
290#else
291 u_int ip_hl:4,
292#endif
293 ip_v:4;
294#endif
295 /* BUG : u_int changed to u_int8_t.
296 * sizeof(u_int)==4 on linux 2.0
297 */
298 u_int8_t ipf_mff; /* XXX overlays ip_tos: use low bit
299 * to avoid destroying tos (PPPDTRuu);
300 * copied from (ip_off&IP_MF) */
301 u_int16_t ip_len;
302 u_int16_t ip_id;
303 u_int16_t ip_off;
304 u_int8_t ip_ttl;
305 u_int8_t ip_p;
306 u_int16_t ip_sum;
307 ipasfragp_32 ipf_next; /* next fragment */
308 ipasfragp_32 ipf_prev; /* previous fragment */
309};
310
311/*
312 * Structure stored in mbuf in inpcb.ip_options
313 * and passed to ip_output when ip options are in use.
314 * The actual length of the options (including ipopt_dst)
315 * is in m_len.
316 */
317#define MAX_IPOPTLEN 40
318
319struct ipoption {
320 struct in_addr ipopt_dst; /* first-hop dst if source routed */
321 int8_t ipopt_list[MAX_IPOPTLEN]; /* options proper */
322};
323
324/*
325 * Structure attached to inpcb.ip_moptions and
326 * passed to ip_output when IP multicast options are in use.
327 */
328
329struct ipstat_t {
330 u_long ips_total; /* total packets received */
331 u_long ips_badsum; /* checksum bad */
332 u_long ips_tooshort; /* packet too short */
333 u_long ips_toosmall; /* not enough data */
334 u_long ips_badhlen; /* ip header length < data size */
335 u_long ips_badlen; /* ip length < ip header length */
336 u_long ips_fragments; /* fragments received */
337 u_long ips_fragdropped; /* frags dropped (dups, out of space) */
338 u_long ips_fragtimeout; /* fragments timed out */
339 u_long ips_forward; /* packets forwarded */
340 u_long ips_cantforward; /* packets rcvd for unreachable dest */
341 u_long ips_redirectsent; /* packets forwarded on same net */
342 u_long ips_noproto; /* unknown or unsupported protocol */
343 u_long ips_delivered; /* datagrams delivered to upper level*/
344 u_long ips_localout; /* total ip packets generated here */
345 u_long ips_odropped; /* lost packets due to nobufs, etc. */
346 u_long ips_reassembled; /* total packets reassembled ok */
347 u_long ips_fragmented; /* datagrams successfully fragmented */
348 u_long ips_ofragments; /* output fragments created */
349 u_long ips_cantfrag; /* don't fragment flag was set, etc. */
350 u_long ips_badoptions; /* error in option processing */
351 u_long ips_noroute; /* packets discarded due to no route */
352 u_long ips_badvers; /* ip version != 4 */
353 u_long ips_rawout; /* total raw ip packets generated */
354 u_long ips_unaligned; /* times the ip packet was not aligned */
355};
356
357
358#endif
Note: See TracBrowser for help on using the repository browser.

© 2024 Oracle Support Privacy / Do Not Sell My Info Terms of Use Trademark Policy Automated Access Etiquette