123206Smckusick /* 2*33371Ssklower * Copyright (c) 1984, 1985, 1986, 1987 Regents of the University of California. 3*33371Ssklower * All rights reserved. 423206Smckusick * 5*33371Ssklower * Redistribution and use in source and binary forms are permitted 6*33371Ssklower * provided that this notice is preserved and that due credit is given 7*33371Ssklower * to the University of California at Berkeley. The name of the University 8*33371Ssklower * may not be used to endorse or promote products derived from this 9*33371Ssklower * software without specific prior written permission. This software 10*33371Ssklower * is provided ``as is'' without express or implied warranty. 11*33371Ssklower * 12*33371Ssklower * @(#)ns_error.c 7.3 (Berkeley) 01/20/88 1323206Smckusick */ 1421483Ssklower 1521483Ssklower #include "param.h" 1621483Ssklower #include "systm.h" 1721483Ssklower #include "mbuf.h" 1821483Ssklower #include "protosw.h" 1921483Ssklower #include "socket.h" 2021483Ssklower #include "time.h" 2121483Ssklower #include "kernel.h" 2221483Ssklower 2321483Ssklower #include "../net/route.h" 2421483Ssklower 2521483Ssklower #include "ns.h" 2621483Ssklower #include "ns_pcb.h" 2721483Ssklower #include "idp.h" 2821483Ssklower #include "ns_error.h" 2921483Ssklower 3024226Ssklower #ifdef lint 3124226Ssklower #define NS_ERRPRINTFS 1 3224226Ssklower #endif 3324226Ssklower 3421483Ssklower #ifdef NS_ERRPRINTFS 3521483Ssklower /* 3621483Ssklower * NS_ERR routines: error generation, receive packet processing, and 3721746Ssklower * routines to turnaround packets back to the originator. 3821483Ssklower */ 3921483Ssklower int ns_errprintfs = 0; 4021483Ssklower #endif 4121483Ssklower 4221483Ssklower /* 4321483Ssklower * Generate an error packet of type error 4421483Ssklower * in response to bad packet. 4521483Ssklower */ 4621483Ssklower 4721483Ssklower ns_error(om, type, param) 4821483Ssklower struct mbuf *om; 4921483Ssklower int type; 5021483Ssklower { 5121483Ssklower register struct ns_epidp *ep; 5221483Ssklower struct mbuf *m; 5321483Ssklower struct idp *nip; 5421483Ssklower register struct idp *oip = mtod(om, struct idp *); 5521483Ssklower extern int idpcksum; 5621483Ssklower 5721746Ssklower /* 5821746Ssklower * If this packet was sent to the echo port, 5921746Ssklower * and nobody was there, just echo it. 6021746Ssklower * (Yes, this is a wart!) 6121746Ssklower */ 6221746Ssklower if (type==NS_ERR_NOSOCK && 6321746Ssklower oip->idp_dna.x_port==htons(2) && 6421746Ssklower (type = ns_echo(oip)==0)) 6521746Ssklower return; 6621746Ssklower 6721483Ssklower #ifdef NS_ERRPRINTFS 6821483Ssklower if (ns_errprintfs) 6921483Ssklower printf("ns_err_error(%x, %d, %d)\n", oip, type, param); 7021483Ssklower #endif 7123980Ssklower /* 7223980Ssklower * Don't Generate error packets in response to multicasts. 7323980Ssklower */ 7423980Ssklower if (oip->idp_dna.x_host.c_host[0] & 1) 7523980Ssklower goto free; 7623980Ssklower 7721483Ssklower ns_errstat.ns_es_error++; 7821483Ssklower /* 7921483Ssklower * Make sure that the old IDP packet had 30 bytes of data to return; 8021483Ssklower * if not, don't bother. Also don't EVER error if the old 8121483Ssklower * packet protocol was NS_ERR. 8221483Ssklower */ 8321483Ssklower if (oip->idp_len < sizeof(struct idp)) { 8421483Ssklower ns_errstat.ns_es_oldshort++; 8521483Ssklower goto free; 8621483Ssklower } 8721483Ssklower if (oip->idp_pt == NSPROTO_ERROR) { 8821483Ssklower ns_errstat.ns_es_oldns_err++; 8921483Ssklower goto free; 9021483Ssklower } 9121483Ssklower 9221483Ssklower /* 9321483Ssklower * First, formulate ns_err message 9421483Ssklower */ 9521483Ssklower m = m_get(M_DONTWAIT, MT_HEADER); 9621483Ssklower if (m == NULL) 9721483Ssklower goto free; 9821483Ssklower m->m_len = sizeof(*ep); 9921483Ssklower m->m_off = MMAXOFF - m->m_len; 10021483Ssklower ep = mtod(m, struct ns_epidp *); 10121483Ssklower if ((u_int)type > NS_ERR_TOO_BIG) 10221483Ssklower panic("ns_err_error"); 10321483Ssklower ns_errstat.ns_es_outhist[ns_err_x(type)]++; 10424226Ssklower ep->ns_ep_errp.ns_err_num = htons((u_short)type); 10524226Ssklower ep->ns_ep_errp.ns_err_param = htons((u_short)param); 10621483Ssklower bcopy((caddr_t)oip, (caddr_t)&ep->ns_ep_errp.ns_err_idp, 42); 10721483Ssklower nip = &ep->ns_ep_idp; 10821483Ssklower nip->idp_len = sizeof(*ep); 10921483Ssklower nip->idp_len = htons((u_short)nip->idp_len); 11021483Ssklower nip->idp_pt = NSPROTO_ERROR; 11121483Ssklower nip->idp_tc = 0; 11221483Ssklower nip->idp_dna = oip->idp_sna; 11321483Ssklower nip->idp_sna = oip->idp_dna; 11421483Ssklower if (idpcksum) { 11521483Ssklower nip->idp_sum = 0; 11621483Ssklower nip->idp_sum = ns_cksum(dtom(nip), sizeof(*ep)); 11721483Ssklower } else 11821483Ssklower nip->idp_sum = 0xffff; 11924226Ssklower (void) ns_output(dtom(nip), (struct route *)0, 0); 12021483Ssklower 12121483Ssklower free: 12221483Ssklower m_freem(dtom(oip)); 12321483Ssklower } 12421483Ssklower 12521483Ssklower ns_printhost(p) 12621483Ssklower register struct ns_addr *p; 12721483Ssklower { 12821483Ssklower 12921483Ssklower printf("<net:%x%x,host:%x%x%x,port:%x>", 13021483Ssklower p->x_net.s_net[0], 13121483Ssklower p->x_net.s_net[1], 13221483Ssklower p->x_host.s_host[0], 13321483Ssklower p->x_host.s_host[1], 13421483Ssklower p->x_host.s_host[2], 13521483Ssklower p->x_port); 13621483Ssklower 13721483Ssklower } 13821483Ssklower 13921483Ssklower /* 14021483Ssklower * Process a received NS_ERR message. 14121483Ssklower */ 14221483Ssklower ns_err_input(m) 14321483Ssklower struct mbuf *m; 14421483Ssklower { 14521483Ssklower register struct ns_errp *ep; 14621483Ssklower register struct ns_epidp *epidp = mtod(m, struct ns_epidp *); 14721483Ssklower register int i; 14821483Ssklower int type, code, param; 14921483Ssklower 15021483Ssklower /* 15121483Ssklower * Locate ns_err structure in mbuf, and check 15221483Ssklower * that not corrupted and of at least minimum length. 15321483Ssklower */ 15421483Ssklower #ifdef NS_ERRPRINTFS 15521483Ssklower if (ns_errprintfs) { 15621483Ssklower printf("ns_err_input from "); 15721483Ssklower ns_printhost(&epidp->ns_ep_idp.idp_sna); 15821483Ssklower printf("len %d\n", ntohs(epidp->ns_ep_idp.idp_len)); 15921483Ssklower } 16021483Ssklower #endif 16121483Ssklower i = sizeof (struct ns_epidp); 16221483Ssklower if ((m->m_off > MMAXOFF || m->m_len < i) && 16321483Ssklower (m = m_pullup(m, i)) == 0) { 16421483Ssklower ns_errstat.ns_es_tooshort++; 16521483Ssklower return; 16621483Ssklower } 16721483Ssklower ep = &(mtod(m, struct ns_epidp *)->ns_ep_errp); 16821483Ssklower type = ntohs(ep->ns_err_num); 16921483Ssklower param = ntohs(ep->ns_err_param); 17023980Ssklower ns_errstat.ns_es_inhist[ns_err_x(type)]++; 17121483Ssklower 17221483Ssklower #ifdef NS_ERRPRINTFS 17321483Ssklower /* 17421483Ssklower * Message type specific processing. 17521483Ssklower */ 17621483Ssklower if (ns_errprintfs) 17721483Ssklower printf("ns_err_input, type %d param %d\n", type, param); 17821483Ssklower #endif 17921483Ssklower if (type >= NS_ERR_TOO_BIG) { 18021483Ssklower goto badcode; 18121483Ssklower } 18221483Ssklower ns_errstat.ns_es_outhist[ns_err_x(type)]++; 18321483Ssklower switch (type) { 18421483Ssklower 18521483Ssklower case NS_ERR_UNREACH_HOST: 18621483Ssklower code = PRC_UNREACH_NET; 18721483Ssklower goto deliver; 18821483Ssklower 18921483Ssklower case NS_ERR_TOO_OLD: 19021483Ssklower code = PRC_TIMXCEED_INTRANS; 19121483Ssklower goto deliver; 19221483Ssklower 19321483Ssklower case NS_ERR_TOO_BIG: 19421483Ssklower code = PRC_MSGSIZE; 19521483Ssklower goto deliver; 19621483Ssklower 19721483Ssklower case NS_ERR_FULLUP: 19821483Ssklower code = PRC_QUENCH; 19921483Ssklower goto deliver; 20021483Ssklower 20121483Ssklower case NS_ERR_NOSOCK: 20221483Ssklower code = PRC_UNREACH_PORT; 20321483Ssklower goto deliver; 20421483Ssklower 20521483Ssklower case NS_ERR_UNSPEC_T: 20621483Ssklower case NS_ERR_BADSUM_T: 20721483Ssklower case NS_ERR_BADSUM: 20821483Ssklower case NS_ERR_UNSPEC: 20921483Ssklower code = PRC_PARAMPROB; 21021483Ssklower goto deliver; 21121483Ssklower 21221483Ssklower deliver: 21321483Ssklower /* 21421483Ssklower * Problem with datagram; advise higher level routines. 21521483Ssklower */ 21621483Ssklower #ifdef NS_ERRPRINTFS 21721483Ssklower if (ns_errprintfs) 21821483Ssklower printf("deliver to protocol %d\n", 21921483Ssklower ep->ns_err_idp.idp_pt); 22021483Ssklower #endif 22121483Ssklower switch(ep->ns_err_idp.idp_pt) { 22221483Ssklower case NSPROTO_SPP: 22321483Ssklower spp_ctlinput(code, (caddr_t)ep); 22421483Ssklower break; 22521483Ssklower 22621483Ssklower default: 22721483Ssklower idp_ctlinput(code, (caddr_t)ep); 22821483Ssklower } 22921483Ssklower 23021483Ssklower goto free; 23121483Ssklower 23221483Ssklower default: 23321483Ssklower badcode: 23421483Ssklower ns_errstat.ns_es_badcode++; 23521483Ssklower goto free; 23621483Ssklower 23721483Ssklower } 23821483Ssklower free: 23921483Ssklower m_freem(m); 24021483Ssklower } 24121746Ssklower 24228956Skarels #ifdef notdef 24321483Ssklower u_long 24421483Ssklower nstime() 24521483Ssklower { 24629924Skarels int s = splclock(); 24721483Ssklower u_long t; 24821483Ssklower 24921483Ssklower t = (time.tv_sec % (24*60*60)) * 1000 + time.tv_usec / 1000; 25021483Ssklower splx(s); 25121483Ssklower return (htonl(t)); 25221483Ssklower } 25328956Skarels #endif 25421746Ssklower 25521746Ssklower ns_echo(idp) 25621746Ssklower register struct idp *idp; 25721746Ssklower { 25821746Ssklower struct mbuf *m = dtom(idp); 25921746Ssklower register struct echo { 26021746Ssklower struct idp ec_idp; 26121746Ssklower u_short ec_op; /* Operation, 1 = request, 2 = reply */ 26221746Ssklower } *ec = (struct echo *)idp; 26321746Ssklower struct ns_addr temp; 26421746Ssklower 26521746Ssklower if (idp->idp_pt!=NSPROTO_ECHO) return(NS_ERR_NOSOCK); 26621746Ssklower if (ec->ec_op!=htons(1)) return(NS_ERR_UNSPEC); 26721746Ssklower 26821746Ssklower ec->ec_op = htons(2); 26921746Ssklower 27021746Ssklower temp = idp->idp_dna; 27121746Ssklower idp->idp_dna = idp->idp_sna; 27221746Ssklower idp->idp_sna = temp; 27321746Ssklower 27421746Ssklower if (idp->idp_sum != 0xffff) { 27521746Ssklower idp->idp_sum = 0; 27628956Skarels idp->idp_sum = ns_cksum(m, 27728956Skarels (int)(((ntohs(idp->idp_len) - 1)|1)+1)); 27821746Ssklower } 27926389Skarels (void) ns_output(m, (struct route *)0, NS_FORWARDING); 28021746Ssklower return(0); 28121746Ssklower } 282