123209Smckusick /*
263231Sbostic * Copyright (c) 1984, 1985, 1986, 1987, 1993
363231Sbostic * The Regents of the University of California. All rights reserved.
423209Smckusick *
544504Sbostic * %sccs.include.redist.c%
633371Ssklower *
7*67778Ssklower * @(#)ns_input.c 8.2 (Berkeley) 09/22/94
823209Smckusick */
921486Ssklower
1056534Sbostic #include <sys/param.h>
1156534Sbostic #include <sys/systm.h>
1256534Sbostic #include <sys/malloc.h>
1356534Sbostic #include <sys/mbuf.h>
1456534Sbostic #include <sys/domain.h>
1556534Sbostic #include <sys/protosw.h>
1656534Sbostic #include <sys/socket.h>
1756534Sbostic #include <sys/socketvar.h>
1856534Sbostic #include <sys/errno.h>
1956534Sbostic #include <sys/time.h>
2056534Sbostic #include <sys/kernel.h>
2121486Ssklower
2256534Sbostic #include <net/if.h>
2356534Sbostic #include <net/route.h>
2456534Sbostic #include <net/raw_cb.h>
2521486Ssklower
2656534Sbostic #include <netns/ns.h>
2756534Sbostic #include <netns/ns_if.h>
2856534Sbostic #include <netns/ns_pcb.h>
2956534Sbostic #include <netns/idp.h>
3056534Sbostic #include <netns/idp_var.h>
3156534Sbostic #include <netns/ns_error.h>
3221486Ssklower
3321486Ssklower /*
3421486Ssklower * NS initialization.
3521486Ssklower */
3621486Ssklower union ns_host ns_thishost;
3721486Ssklower union ns_host ns_zerohost;
3821486Ssklower union ns_host ns_broadhost;
3926055Ssklower union ns_net ns_zeronet;
4026055Ssklower union ns_net ns_broadnet;
4137473Ssklower struct sockaddr_ns ns_netmask, ns_hostmask;
4221486Ssklower
4326055Ssklower static u_short allones[] = {-1, -1, -1};
4421486Ssklower
4521486Ssklower struct nspcb nspcb;
4621486Ssklower struct nspcb nsrawpcb;
4721486Ssklower
4821486Ssklower struct ifqueue nsintrq;
4921486Ssklower int nsqmaxlen = IFQ_MAXLEN;
5021486Ssklower
5123502Ssklower int idpcksum = 1;
5223981Ssklower long ns_pexseq;
5321486Ssklower
ns_init()5421486Ssklower ns_init()
5521486Ssklower {
5621486Ssklower ns_broadhost = * (union ns_host *) allones;
5726055Ssklower ns_broadnet = * (union ns_net *) allones;
5821486Ssklower nspcb.nsp_next = nspcb.nsp_prev = &nspcb;
5921486Ssklower nsrawpcb.nsp_next = nsrawpcb.nsp_prev = &nsrawpcb;
6021486Ssklower nsintrq.ifq_maxlen = nsqmaxlen;
6123981Ssklower ns_pexseq = time.tv_usec;
6237473Ssklower ns_netmask.sns_len = 6;
6337473Ssklower ns_netmask.sns_addr.x_net = ns_broadnet;
6437473Ssklower ns_hostmask.sns_len = 12;
6537473Ssklower ns_hostmask.sns_addr.x_net = ns_broadnet;
6637473Ssklower ns_hostmask.sns_addr.x_host = ns_broadhost;
6721486Ssklower }
6821486Ssklower
6921486Ssklower /*
7021486Ssklower * Idp input routine. Pass to next level.
7121486Ssklower */
7221486Ssklower int nsintr_getpck = 0;
7321486Ssklower int nsintr_swtch = 0;
nsintr()7421486Ssklower nsintr()
7521486Ssklower {
7621486Ssklower register struct idp *idp;
7721486Ssklower register struct mbuf *m;
7824048Ssklower register struct nspcb *nsp;
7921486Ssklower register int i;
8021486Ssklower int len, s, error;
8121486Ssklower char oddpacketp;
8221486Ssklower
8321486Ssklower next:
8421486Ssklower /*
8521486Ssklower * Get next datagram off input queue and get IDP header
8621486Ssklower * in first mbuf.
8721486Ssklower */
8821486Ssklower s = splimp();
8935797Ssklower IF_DEQUEUE(&nsintrq, m);
9021486Ssklower splx(s);
9121486Ssklower nsintr_getpck++;
9221486Ssklower if (m == 0)
9321486Ssklower return;
9435797Ssklower if ((m->m_flags & M_EXT || m->m_len < sizeof (struct idp)) &&
9521486Ssklower (m = m_pullup(m, sizeof (struct idp))) == 0) {
9621486Ssklower idpstat.idps_toosmall++;
9721486Ssklower goto next;
9821486Ssklower }
9921486Ssklower
10021486Ssklower /*
10121486Ssklower * Give any raw listeners a crack at the packet
10221486Ssklower */
10321486Ssklower for (nsp = nsrawpcb.nsp_next; nsp != &nsrawpcb; nsp = nsp->nsp_next) {
10424226Ssklower struct mbuf *m1 = m_copy(m, 0, (int)M_COPYALL);
10535797Ssklower if (m1) idp_input(m1, nsp);
10621486Ssklower }
10721486Ssklower
10821486Ssklower idp = mtod(m, struct idp *);
10921486Ssklower len = ntohs(idp->idp_len);
11021486Ssklower if (oddpacketp = len & 1) {
11121486Ssklower len++; /* If this packet is of odd length,
11221486Ssklower preserve garbage byte for checksum */
11321486Ssklower }
11421486Ssklower
11521486Ssklower /*
11621486Ssklower * Check that the amount of data in the buffers
11721486Ssklower * is as at least much as the IDP header would have us expect.
11821486Ssklower * Trim mbufs if longer than we expect.
11921486Ssklower * Drop packet if shorter than we expect.
12021486Ssklower */
12135797Ssklower if (m->m_pkthdr.len < len) {
12235797Ssklower idpstat.idps_tooshort++;
12335797Ssklower goto bad;
12421486Ssklower }
12535797Ssklower if (m->m_pkthdr.len > len) {
12635797Ssklower if (m->m_len == m->m_pkthdr.len) {
12735797Ssklower m->m_len = len;
12835797Ssklower m->m_pkthdr.len = len;
12935797Ssklower } else
13035797Ssklower m_adj(m, len - m->m_pkthdr.len);
13121486Ssklower }
13221486Ssklower if (idpcksum && ((i = idp->idp_sum)!=0xffff)) {
13321486Ssklower idp->idp_sum = 0;
13435797Ssklower if (i != (idp->idp_sum = ns_cksum(m, len))) {
13521486Ssklower idpstat.idps_badsum++;
13623981Ssklower idp->idp_sum = i;
13721486Ssklower if (ns_hosteqnh(ns_thishost, idp->idp_dna.x_host))
13821486Ssklower error = NS_ERR_BADSUM;
13921486Ssklower else
14021486Ssklower error = NS_ERR_BADSUM_T;
14121486Ssklower ns_error(m, error, 0);
14221486Ssklower goto next;
14321486Ssklower }
14421486Ssklower }
14521486Ssklower /*
14621486Ssklower * Is this a directed broadcast?
14721486Ssklower */
14821486Ssklower if (ns_hosteqnh(ns_broadhost,idp->idp_dna.x_host)) {
14926055Ssklower if ((!ns_neteq(idp->idp_dna, idp->idp_sna)) &&
15026055Ssklower (!ns_neteqnn(idp->idp_dna.x_net, ns_broadnet)) &&
15126055Ssklower (!ns_neteqnn(idp->idp_sna.x_net, ns_zeronet)) &&
15226055Ssklower (!ns_neteqnn(idp->idp_dna.x_net, ns_zeronet)) ) {
15321486Ssklower /*
15421752Ssklower * Look to see if I need to eat this packet.
15521752Ssklower * Algorithm is to forward all young packets
15621752Ssklower * and prematurely age any packets which will
15721752Ssklower * by physically broadcasted.
15821752Ssklower * Any very old packets eaten without forwarding
15921752Ssklower * would die anyway.
16021752Ssklower *
16121752Ssklower * Suggestion of Bill Nesheim, Cornell U.
16221486Ssklower */
16323502Ssklower if (idp->idp_tc < NS_MAXHOPS) {
16435797Ssklower idp_forward(m);
16521486Ssklower goto next;
16621752Ssklower }
16721486Ssklower }
16821486Ssklower /*
16921486Ssklower * Is this our packet? If not, forward.
17021486Ssklower */
17121486Ssklower } else if (!ns_hosteqnh(ns_thishost,idp->idp_dna.x_host)) {
17235797Ssklower idp_forward(m);
17321486Ssklower goto next;
17421486Ssklower }
17524048Ssklower /*
17624048Ssklower * Locate pcb for datagram.
17724048Ssklower */
17824048Ssklower nsp = ns_pcblookup(&idp->idp_sna, idp->idp_dna.x_port, NS_WILDCARD);
17924048Ssklower /*
18024048Ssklower * Switch out to protocol's input routine.
18124048Ssklower */
18224048Ssklower nsintr_swtch++;
18324048Ssklower if (nsp) {
18424048Ssklower if (oddpacketp) {
18535797Ssklower m_adj(m, -1);
18624048Ssklower }
18724048Ssklower if ((nsp->nsp_flags & NSP_ALL_PACKETS)==0)
18824048Ssklower switch (idp->idp_pt) {
18921486Ssklower
19024048Ssklower case NSPROTO_SPP:
19135797Ssklower spp_input(m, nsp);
19224048Ssklower goto next;
19321486Ssklower
19424048Ssklower case NSPROTO_ERROR:
19524048Ssklower ns_err_input(m);
19624048Ssklower goto next;
19724048Ssklower }
19835797Ssklower idp_input(m, nsp);
19924048Ssklower } else {
20024048Ssklower ns_error(m, NS_ERR_NOSOCK, 0);
20121486Ssklower }
20221486Ssklower goto next;
20321486Ssklower
20421486Ssklower bad:
20521486Ssklower m_freem(m);
20621486Ssklower goto next;
20721486Ssklower }
20821486Ssklower
20921486Ssklower u_char nsctlerrmap[PRC_NCMDS] = {
21021486Ssklower ECONNABORTED, ECONNABORTED, 0, 0,
21121486Ssklower 0, 0, EHOSTDOWN, EHOSTUNREACH,
21221486Ssklower ENETUNREACH, EHOSTUNREACH, ECONNREFUSED, ECONNREFUSED,
21321486Ssklower EMSGSIZE, 0, 0, 0,
21421486Ssklower 0, 0, 0, 0
21521486Ssklower };
21621486Ssklower
21750238Ssklower int idp_donosocks = 1;
21823981Ssklower
idp_ctlinput(cmd,arg)21921486Ssklower idp_ctlinput(cmd, arg)
22021486Ssklower int cmd;
22121486Ssklower caddr_t arg;
22221486Ssklower {
22321486Ssklower struct ns_addr *ns;
22423981Ssklower struct nspcb *nsp;
22523981Ssklower struct ns_errp *errp;
22621486Ssklower int idp_abort();
22724226Ssklower extern struct nspcb *idp_drop();
22821486Ssklower int type;
22921486Ssklower
23021486Ssklower if (cmd < 0 || cmd > PRC_NCMDS)
23121486Ssklower return;
23221486Ssklower if (nsctlerrmap[cmd] == 0)
23321486Ssklower return; /* XXX */
23421486Ssklower type = NS_ERR_UNREACH_HOST;
23524611Ssklower switch (cmd) {
23624611Ssklower struct sockaddr_ns *sns;
23724611Ssklower
23824611Ssklower case PRC_IFDOWN:
23924611Ssklower case PRC_HOSTDEAD:
24024611Ssklower case PRC_HOSTUNREACH:
24124611Ssklower sns = (struct sockaddr_ns *)arg;
24237473Ssklower if (sns->sns_family != AF_NS)
24324611Ssklower return;
24424611Ssklower ns = &sns->sns_addr;
24524611Ssklower break;
24624611Ssklower
24724611Ssklower default:
24823981Ssklower errp = (struct ns_errp *)arg;
24923981Ssklower ns = &errp->ns_err_idp.idp_dna;
25023981Ssklower type = errp->ns_err_num;
25124226Ssklower type = ntohs((u_short)type);
25221486Ssklower }
25321486Ssklower switch (type) {
25423502Ssklower
25521486Ssklower case NS_ERR_UNREACH_HOST:
25624226Ssklower ns_pcbnotify(ns, (int)nsctlerrmap[cmd], idp_abort, (long)0);
25723981Ssklower break;
25823981Ssklower
25921486Ssklower case NS_ERR_NOSOCK:
26023981Ssklower nsp = ns_pcblookup(ns, errp->ns_err_idp.idp_sna.x_port,
26123981Ssklower NS_WILDCARD);
26223981Ssklower if(nsp && idp_donosocks && ! ns_nullhost(nsp->nsp_faddr))
26324226Ssklower (void) idp_drop(nsp, (int)nsctlerrmap[cmd]);
26421486Ssklower }
26521486Ssklower }
26621486Ssklower
26721486Ssklower int idpprintfs = 0;
26821486Ssklower int idpforwarding = 1;
26921486Ssklower /*
27021486Ssklower * Forward a packet. If some error occurs return the sender
27121486Ssklower * an error packet. Note we can't always generate a meaningful
27221486Ssklower * error message because the NS errors don't have a large enough repetoire
27321486Ssklower * of codes and types.
27421486Ssklower */
27521486Ssklower struct route idp_droute;
27621486Ssklower struct route idp_sroute;
27721486Ssklower
27835797Ssklower idp_forward(m)
27935797Ssklower struct mbuf *m;
28021486Ssklower {
28135797Ssklower register struct idp *idp = mtod(m, struct idp *);
28221486Ssklower register int error, type, code;
28321752Ssklower struct mbuf *mcopy = NULL;
28421752Ssklower int agedelta = 1;
28521752Ssklower int flags = NS_FORWARDING;
28621752Ssklower int ok_there = 0;
28721752Ssklower int ok_back = 0;
28821486Ssklower
28921486Ssklower if (idpprintfs) {
29021486Ssklower printf("forward: src ");
29121486Ssklower ns_printhost(&idp->idp_sna);
29221486Ssklower printf(", dst ");
29321486Ssklower ns_printhost(&idp->idp_dna);
29421486Ssklower printf("hop count %d\n", idp->idp_tc);
29521486Ssklower }
29621486Ssklower if (idpforwarding == 0) {
29721486Ssklower /* can't tell difference between net and host */
29821486Ssklower type = NS_ERR_UNREACH_HOST, code = 0;
29921486Ssklower goto senderror;
30021486Ssklower }
30121486Ssklower idp->idp_tc++;
30221486Ssklower if (idp->idp_tc > NS_MAXHOPS) {
30321486Ssklower type = NS_ERR_TOO_OLD, code = 0;
30421486Ssklower goto senderror;
30521486Ssklower }
30621752Ssklower /*
30721752Ssklower * Save at most 42 bytes of the packet in case
30821752Ssklower * we need to generate an NS error message to the src.
30921752Ssklower */
31035797Ssklower mcopy = m_copy(m, 0, imin((int)ntohs(idp->idp_len), 42));
31121752Ssklower
31223502Ssklower if ((ok_there = idp_do_route(&idp->idp_dna,&idp_droute))==0) {
31321752Ssklower type = NS_ERR_UNREACH_HOST, code = 0;
31421752Ssklower goto senderror;
31521752Ssklower }
31621752Ssklower /*
31721752Ssklower * Here we think about forwarding broadcast packets,
31821752Ssklower * so we try to insure that it doesn't go back out
31921752Ssklower * on the interface it came in on. Also, if we
32021752Ssklower * are going to physically broadcast this, let us
32121752Ssklower * age the packet so we can eat it safely the second time around.
32221752Ssklower */
32321752Ssklower if (idp->idp_dna.x_host.c_host[0] & 0x1) {
32425041Ssklower struct ns_ifaddr *ia = ns_iaonnetof(&idp->idp_dna);
32521752Ssklower struct ifnet *ifp;
32621752Ssklower if (ia) {
32721752Ssklower /* I'm gonna hafta eat this packet */
32821752Ssklower agedelta += NS_MAXHOPS - idp->idp_tc;
32921752Ssklower idp->idp_tc = NS_MAXHOPS;
33021752Ssklower }
33121752Ssklower if ((ok_back = idp_do_route(&idp->idp_sna,&idp_sroute))==0) {
33221752Ssklower /* error = ENETUNREACH; He'll never get it! */
33335797Ssklower m_freem(m);
33421752Ssklower goto cleanup;
33521752Ssklower }
33621752Ssklower if (idp_droute.ro_rt &&
33721752Ssklower (ifp=idp_droute.ro_rt->rt_ifp) &&
33821752Ssklower idp_sroute.ro_rt &&
33921752Ssklower (ifp!=idp_sroute.ro_rt->rt_ifp)) {
34021752Ssklower flags |= NS_ALLOWBROADCAST;
34121752Ssklower } else {
34221752Ssklower type = NS_ERR_UNREACH_HOST, code = 0;
34321752Ssklower goto senderror;
34421752Ssklower }
34521752Ssklower }
34621486Ssklower /* need to adjust checksum */
34721486Ssklower if (idp->idp_sum!=0xffff) {
34821486Ssklower union bytes {
34921486Ssklower u_char c[4];
35021486Ssklower u_short s[2];
35121486Ssklower long l;
35221486Ssklower } x;
35321486Ssklower register int shift;
35421752Ssklower x.l = 0; x.c[0] = agedelta;
35521486Ssklower shift = (((((int)ntohs(idp->idp_len))+1)>>1)-2) & 0xf;
35634162Ssklower x.l = idp->idp_sum + (x.s[0] << shift);
35721486Ssklower x.l = x.s[0] + x.s[1];
35821486Ssklower x.l = x.s[0] + x.s[1];
35921486Ssklower if (x.l==0xffff) idp->idp_sum = 0; else idp->idp_sum = x.l;
36021486Ssklower }
36135797Ssklower if ((error = ns_output(m, &idp_droute, flags)) &&
36221752Ssklower (mcopy!=NULL)) {
36321752Ssklower idp = mtod(mcopy, struct idp *);
36421752Ssklower type = NS_ERR_UNSPEC_T, code = 0;
36521752Ssklower switch (error) {
36621486Ssklower
36721752Ssklower case ENETUNREACH:
36821752Ssklower case EHOSTDOWN:
36921752Ssklower case EHOSTUNREACH:
37021752Ssklower case ENETDOWN:
37121752Ssklower case EPERM:
37221752Ssklower type = NS_ERR_UNREACH_HOST;
37321752Ssklower break;
37421486Ssklower
37521752Ssklower case EMSGSIZE:
37621752Ssklower type = NS_ERR_TOO_BIG;
37721752Ssklower code = 576; /* too hard to figure out mtu here */
37821752Ssklower break;
37921486Ssklower
38021752Ssklower case ENOBUFS:
38121752Ssklower type = NS_ERR_UNSPEC_T;
38221752Ssklower break;
38321486Ssklower }
38423656Ssklower mcopy = NULL;
38523656Ssklower senderror:
38635797Ssklower ns_error(m, type, code);
38721486Ssklower }
38821752Ssklower cleanup:
38921752Ssklower if (ok_there)
39021752Ssklower idp_undo_route(&idp_droute);
39121752Ssklower if (ok_back)
39221752Ssklower idp_undo_route(&idp_sroute);
39321752Ssklower if (mcopy != NULL)
39421752Ssklower m_freem(mcopy);
39521486Ssklower }
39621486Ssklower
39721486Ssklower idp_do_route(src, ro)
39821486Ssklower struct ns_addr *src;
39921486Ssklower struct route *ro;
40021486Ssklower {
40121486Ssklower
40221486Ssklower struct sockaddr_ns *dst;
40321486Ssklower
40421486Ssklower bzero((caddr_t)ro, sizeof (*ro));
40521486Ssklower dst = (struct sockaddr_ns *)&ro->ro_dst;
40621486Ssklower
40737473Ssklower dst->sns_len = sizeof(*dst);
40821486Ssklower dst->sns_family = AF_NS;
40921486Ssklower dst->sns_addr = *src;
41023502Ssklower dst->sns_addr.x_port = 0;
41121486Ssklower rtalloc(ro);
41221486Ssklower if (ro->ro_rt == 0 || ro->ro_rt->rt_ifp == 0) {
41323502Ssklower return (0);
41421486Ssklower }
41521486Ssklower ro->ro_rt->rt_use++;
41623502Ssklower return (1);
41721486Ssklower }
41821486Ssklower
idp_undo_route(ro)41921486Ssklower idp_undo_route(ro)
42021486Ssklower register struct route *ro;
42121486Ssklower {
42221486Ssklower if (ro->ro_rt) {RTFREE(ro->ro_rt);}
42321486Ssklower }
42425041Ssklower
42525041Ssklower ns_watch_output(m, ifp)
42621486Ssklower struct mbuf *m;
42725041Ssklower struct ifnet *ifp;
42821486Ssklower {
42921486Ssklower register struct nspcb *nsp;
43037473Ssklower register struct ifaddr *ifa;
43121486Ssklower /*
43221486Ssklower * Give any raw listeners a crack at the packet
43321486Ssklower */
43421486Ssklower for (nsp = nsrawpcb.nsp_next; nsp != &nsrawpcb; nsp = nsp->nsp_next) {
43525041Ssklower struct mbuf *m0 = m_copy(m, 0, (int)M_COPYALL);
43625041Ssklower if (m0) {
43735797Ssklower register struct idp *idp;
43825041Ssklower
43935797Ssklower M_PREPEND(m0, sizeof (*idp), M_DONTWAIT);
44035797Ssklower if (m0 == NULL)
44135797Ssklower continue;
44235797Ssklower idp = mtod(m0, struct idp *);
44335797Ssklower idp->idp_sna.x_net = ns_zeronet;
44435797Ssklower idp->idp_sna.x_host = ns_thishost;
44535797Ssklower if (ifp && (ifp->if_flags & IFF_POINTOPOINT))
44637473Ssklower for(ifa = ifp->if_addrlist; ifa;
44737473Ssklower ifa = ifa->ifa_next) {
44837473Ssklower if (ifa->ifa_addr->sa_family==AF_NS) {
44937473Ssklower idp->idp_sna = IA_SNS(ifa)->sns_addr;
45035797Ssklower break;
45135797Ssklower }
45235797Ssklower }
45335797Ssklower idp->idp_len = ntohl(m0->m_pkthdr.len);
45435797Ssklower idp_input(m0, nsp);
45525041Ssklower }
45621486Ssklower }
45721486Ssklower }
458