123206Smckusick /* 229163Smckusick * Copyright (c) 1984, 1985, 1986 Regents of the University of California. 323206Smckusick * All rights reserved. The Berkeley software License Agreement 423206Smckusick * specifies the terms and conditions for redistribution. 523206Smckusick * 6*29924Skarels * @(#)ns_error.c 7.2 (Berkeley) 10/28/86 723206Smckusick */ 821483Ssklower 921483Ssklower #include "param.h" 1021483Ssklower #include "systm.h" 1121483Ssklower #include "mbuf.h" 1221483Ssklower #include "protosw.h" 1321483Ssklower #include "socket.h" 1421483Ssklower #include "time.h" 1521483Ssklower #include "kernel.h" 1621483Ssklower 1721483Ssklower #include "../net/route.h" 1821483Ssklower 1921483Ssklower #include "ns.h" 2021483Ssklower #include "ns_pcb.h" 2121483Ssklower #include "idp.h" 2221483Ssklower #include "ns_error.h" 2321483Ssklower 2424226Ssklower #ifdef lint 2524226Ssklower #define NS_ERRPRINTFS 1 2624226Ssklower #endif 2724226Ssklower 2821483Ssklower #ifdef NS_ERRPRINTFS 2921483Ssklower /* 3021483Ssklower * NS_ERR routines: error generation, receive packet processing, and 3121746Ssklower * routines to turnaround packets back to the originator. 3221483Ssklower */ 3321483Ssklower int ns_errprintfs = 0; 3421483Ssklower #endif 3521483Ssklower 3621483Ssklower /* 3721483Ssklower * Generate an error packet of type error 3821483Ssklower * in response to bad packet. 3921483Ssklower */ 4021483Ssklower 4121483Ssklower ns_error(om, type, param) 4221483Ssklower struct mbuf *om; 4321483Ssklower int type; 4421483Ssklower { 4521483Ssklower register struct ns_epidp *ep; 4621483Ssklower struct mbuf *m; 4721483Ssklower struct idp *nip; 4821483Ssklower register struct idp *oip = mtod(om, struct idp *); 4921483Ssklower extern int idpcksum; 5021483Ssklower 5121746Ssklower /* 5221746Ssklower * If this packet was sent to the echo port, 5321746Ssklower * and nobody was there, just echo it. 5421746Ssklower * (Yes, this is a wart!) 5521746Ssklower */ 5621746Ssklower if (type==NS_ERR_NOSOCK && 5721746Ssklower oip->idp_dna.x_port==htons(2) && 5821746Ssklower (type = ns_echo(oip)==0)) 5921746Ssklower return; 6021746Ssklower 6121483Ssklower #ifdef NS_ERRPRINTFS 6221483Ssklower if (ns_errprintfs) 6321483Ssklower printf("ns_err_error(%x, %d, %d)\n", oip, type, param); 6421483Ssklower #endif 6523980Ssklower /* 6623980Ssklower * Don't Generate error packets in response to multicasts. 6723980Ssklower */ 6823980Ssklower if (oip->idp_dna.x_host.c_host[0] & 1) 6923980Ssklower goto free; 7023980Ssklower 7121483Ssklower ns_errstat.ns_es_error++; 7221483Ssklower /* 7321483Ssklower * Make sure that the old IDP packet had 30 bytes of data to return; 7421483Ssklower * if not, don't bother. Also don't EVER error if the old 7521483Ssklower * packet protocol was NS_ERR. 7621483Ssklower */ 7721483Ssklower if (oip->idp_len < sizeof(struct idp)) { 7821483Ssklower ns_errstat.ns_es_oldshort++; 7921483Ssklower goto free; 8021483Ssklower } 8121483Ssklower if (oip->idp_pt == NSPROTO_ERROR) { 8221483Ssklower ns_errstat.ns_es_oldns_err++; 8321483Ssklower goto free; 8421483Ssklower } 8521483Ssklower 8621483Ssklower /* 8721483Ssklower * First, formulate ns_err message 8821483Ssklower */ 8921483Ssklower m = m_get(M_DONTWAIT, MT_HEADER); 9021483Ssklower if (m == NULL) 9121483Ssklower goto free; 9221483Ssklower m->m_len = sizeof(*ep); 9321483Ssklower m->m_off = MMAXOFF - m->m_len; 9421483Ssklower ep = mtod(m, struct ns_epidp *); 9521483Ssklower if ((u_int)type > NS_ERR_TOO_BIG) 9621483Ssklower panic("ns_err_error"); 9721483Ssklower ns_errstat.ns_es_outhist[ns_err_x(type)]++; 9824226Ssklower ep->ns_ep_errp.ns_err_num = htons((u_short)type); 9924226Ssklower ep->ns_ep_errp.ns_err_param = htons((u_short)param); 10021483Ssklower bcopy((caddr_t)oip, (caddr_t)&ep->ns_ep_errp.ns_err_idp, 42); 10121483Ssklower nip = &ep->ns_ep_idp; 10221483Ssklower nip->idp_len = sizeof(*ep); 10321483Ssklower nip->idp_len = htons((u_short)nip->idp_len); 10421483Ssklower nip->idp_pt = NSPROTO_ERROR; 10521483Ssklower nip->idp_tc = 0; 10621483Ssklower nip->idp_dna = oip->idp_sna; 10721483Ssklower nip->idp_sna = oip->idp_dna; 10821483Ssklower if (idpcksum) { 10921483Ssklower nip->idp_sum = 0; 11021483Ssklower nip->idp_sum = ns_cksum(dtom(nip), sizeof(*ep)); 11121483Ssklower } else 11221483Ssklower nip->idp_sum = 0xffff; 11324226Ssklower (void) ns_output(dtom(nip), (struct route *)0, 0); 11421483Ssklower 11521483Ssklower free: 11621483Ssklower m_freem(dtom(oip)); 11721483Ssklower } 11821483Ssklower 11921483Ssklower ns_printhost(p) 12021483Ssklower register struct ns_addr *p; 12121483Ssklower { 12221483Ssklower 12321483Ssklower printf("<net:%x%x,host:%x%x%x,port:%x>", 12421483Ssklower p->x_net.s_net[0], 12521483Ssklower p->x_net.s_net[1], 12621483Ssklower p->x_host.s_host[0], 12721483Ssklower p->x_host.s_host[1], 12821483Ssklower p->x_host.s_host[2], 12921483Ssklower p->x_port); 13021483Ssklower 13121483Ssklower } 13221483Ssklower 13321483Ssklower /* 13421483Ssklower * Process a received NS_ERR message. 13521483Ssklower */ 13621483Ssklower ns_err_input(m) 13721483Ssklower struct mbuf *m; 13821483Ssklower { 13921483Ssklower register struct ns_errp *ep; 14021483Ssklower register struct ns_epidp *epidp = mtod(m, struct ns_epidp *); 14121483Ssklower register int i; 14221483Ssklower int type, code, param; 14321483Ssklower 14421483Ssklower /* 14521483Ssklower * Locate ns_err structure in mbuf, and check 14621483Ssklower * that not corrupted and of at least minimum length. 14721483Ssklower */ 14821483Ssklower #ifdef NS_ERRPRINTFS 14921483Ssklower if (ns_errprintfs) { 15021483Ssklower printf("ns_err_input from "); 15121483Ssklower ns_printhost(&epidp->ns_ep_idp.idp_sna); 15221483Ssklower printf("len %d\n", ntohs(epidp->ns_ep_idp.idp_len)); 15321483Ssklower } 15421483Ssklower #endif 15521483Ssklower i = sizeof (struct ns_epidp); 15621483Ssklower if ((m->m_off > MMAXOFF || m->m_len < i) && 15721483Ssklower (m = m_pullup(m, i)) == 0) { 15821483Ssklower ns_errstat.ns_es_tooshort++; 15921483Ssklower return; 16021483Ssklower } 16121483Ssklower ep = &(mtod(m, struct ns_epidp *)->ns_ep_errp); 16221483Ssklower type = ntohs(ep->ns_err_num); 16321483Ssklower param = ntohs(ep->ns_err_param); 16423980Ssklower ns_errstat.ns_es_inhist[ns_err_x(type)]++; 16521483Ssklower 16621483Ssklower #ifdef NS_ERRPRINTFS 16721483Ssklower /* 16821483Ssklower * Message type specific processing. 16921483Ssklower */ 17021483Ssklower if (ns_errprintfs) 17121483Ssklower printf("ns_err_input, type %d param %d\n", type, param); 17221483Ssklower #endif 17321483Ssklower if (type >= NS_ERR_TOO_BIG) { 17421483Ssklower goto badcode; 17521483Ssklower } 17621483Ssklower ns_errstat.ns_es_outhist[ns_err_x(type)]++; 17721483Ssklower switch (type) { 17821483Ssklower 17921483Ssklower case NS_ERR_UNREACH_HOST: 18021483Ssklower code = PRC_UNREACH_NET; 18121483Ssklower goto deliver; 18221483Ssklower 18321483Ssklower case NS_ERR_TOO_OLD: 18421483Ssklower code = PRC_TIMXCEED_INTRANS; 18521483Ssklower goto deliver; 18621483Ssklower 18721483Ssklower case NS_ERR_TOO_BIG: 18821483Ssklower code = PRC_MSGSIZE; 18921483Ssklower goto deliver; 19021483Ssklower 19121483Ssklower case NS_ERR_FULLUP: 19221483Ssklower code = PRC_QUENCH; 19321483Ssklower goto deliver; 19421483Ssklower 19521483Ssklower case NS_ERR_NOSOCK: 19621483Ssklower code = PRC_UNREACH_PORT; 19721483Ssklower goto deliver; 19821483Ssklower 19921483Ssklower case NS_ERR_UNSPEC_T: 20021483Ssklower case NS_ERR_BADSUM_T: 20121483Ssklower case NS_ERR_BADSUM: 20221483Ssklower case NS_ERR_UNSPEC: 20321483Ssklower code = PRC_PARAMPROB; 20421483Ssklower goto deliver; 20521483Ssklower 20621483Ssklower deliver: 20721483Ssklower /* 20821483Ssklower * Problem with datagram; advise higher level routines. 20921483Ssklower */ 21021483Ssklower #ifdef NS_ERRPRINTFS 21121483Ssklower if (ns_errprintfs) 21221483Ssklower printf("deliver to protocol %d\n", 21321483Ssklower ep->ns_err_idp.idp_pt); 21421483Ssklower #endif 21521483Ssklower switch(ep->ns_err_idp.idp_pt) { 21621483Ssklower case NSPROTO_SPP: 21721483Ssklower spp_ctlinput(code, (caddr_t)ep); 21821483Ssklower break; 21921483Ssklower 22021483Ssklower default: 22121483Ssklower idp_ctlinput(code, (caddr_t)ep); 22221483Ssklower } 22321483Ssklower 22421483Ssklower goto free; 22521483Ssklower 22621483Ssklower default: 22721483Ssklower badcode: 22821483Ssklower ns_errstat.ns_es_badcode++; 22921483Ssklower goto free; 23021483Ssklower 23121483Ssklower } 23221483Ssklower free: 23321483Ssklower m_freem(m); 23421483Ssklower } 23521746Ssklower 23628956Skarels #ifdef notdef 23721483Ssklower u_long 23821483Ssklower nstime() 23921483Ssklower { 240*29924Skarels int s = splclock(); 24121483Ssklower u_long t; 24221483Ssklower 24321483Ssklower t = (time.tv_sec % (24*60*60)) * 1000 + time.tv_usec / 1000; 24421483Ssklower splx(s); 24521483Ssklower return (htonl(t)); 24621483Ssklower } 24728956Skarels #endif 24821746Ssklower 24921746Ssklower ns_echo(idp) 25021746Ssklower register struct idp *idp; 25121746Ssklower { 25221746Ssklower struct mbuf *m = dtom(idp); 25321746Ssklower register struct echo { 25421746Ssklower struct idp ec_idp; 25521746Ssklower u_short ec_op; /* Operation, 1 = request, 2 = reply */ 25621746Ssklower } *ec = (struct echo *)idp; 25721746Ssklower struct ns_addr temp; 25821746Ssklower 25921746Ssklower if (idp->idp_pt!=NSPROTO_ECHO) return(NS_ERR_NOSOCK); 26021746Ssklower if (ec->ec_op!=htons(1)) return(NS_ERR_UNSPEC); 26121746Ssklower 26221746Ssklower ec->ec_op = htons(2); 26321746Ssklower 26421746Ssklower temp = idp->idp_dna; 26521746Ssklower idp->idp_dna = idp->idp_sna; 26621746Ssklower idp->idp_sna = temp; 26721746Ssklower 26821746Ssklower if (idp->idp_sum != 0xffff) { 26921746Ssklower idp->idp_sum = 0; 27028956Skarels idp->idp_sum = ns_cksum(m, 27128956Skarels (int)(((ntohs(idp->idp_len) - 1)|1)+1)); 27221746Ssklower } 27326389Skarels (void) ns_output(m, (struct route *)0, NS_FORWARDING); 27421746Ssklower return(0); 27521746Ssklower } 276