minix/servers/inet/generic/icmp.c

1226 lines
28 KiB
C
Raw Normal View History

2005-04-21 16:53:53 +02:00
/*
icmp.c
Copyright 1995 Philip Homburg
*/
#include "inet.h"
#include "buf.h"
#include "event.h"
#include "type.h"
#include "assert.h"
#include "clock.h"
2005-04-21 16:53:53 +02:00
#include "icmp.h"
#include "icmp_lib.h"
#include "io.h"
#include "ip.h"
#include "ip_int.h"
#include "ipr.h"
THIS_FILE
typedef struct icmp_port
{
int icp_flags;
int icp_state;
int icp_ipport;
int icp_ipfd;
unsigned icp_rate_count;
unsigned icp_rate_report;
time_t icp_rate_lasttime;
2005-04-21 16:53:53 +02:00
acc_t *icp_head_queue;
acc_t *icp_tail_queue;
acc_t *icp_write_pack;
event_t icp_event;
2005-04-21 16:53:53 +02:00
} icmp_port_t;
#define ICPF_EMPTY 0x0
#define ICPF_SUSPEND 0x1
#define ICPF_READ_IP 0x2
#define ICPF_READ_SP 0x4
#define ICPF_WRITE_IP 0x8
#define ICPF_WRITE_SP 0x10
#define ICPS_BEGIN 0
#define ICPS_IPOPT 1
#define ICPS_MAIN 2
#define ICPS_ERROR 3
PRIVATE icmp_port_t *icmp_port_table;
FORWARD void icmp_main ARGS(( icmp_port_t *icmp_port ));
FORWARD acc_t *icmp_getdata ARGS(( int port, size_t offset,
size_t count, int for_ioctl ));
FORWARD int icmp_putdata ARGS(( int port, size_t offset,
acc_t *data, int for_ioctl ));
FORWARD void icmp_read ARGS(( icmp_port_t *icmp_port ));
FORWARD void process_data ARGS(( icmp_port_t *icmp_port,
acc_t *data ));
FORWARD u16_t icmp_pack_oneCsum ARGS(( acc_t *ip_pack ));
FORWARD void icmp_echo_request ARGS(( icmp_port_t *icmp_port,
acc_t *ip_pack, int ip_hdr_len, ip_hdr_t *ip_hdr,
acc_t *icmp_pack, int icmp_len, icmp_hdr_t *icmp_hdr ));
FORWARD void icmp_dst_unreach ARGS(( icmp_port_t *icmp_port,
acc_t *ip_pack, int ip_hdr_len, ip_hdr_t *ip_hdr,
acc_t *icmp_pack, int icmp_len, icmp_hdr_t *icmp_hdr ));
FORWARD void icmp_time_exceeded ARGS(( icmp_port_t *icmp_port,
acc_t *ip_pack, int ip_hdr_len, ip_hdr_t *ip_hdr,
acc_t *icmp_pack, int icmp_len, icmp_hdr_t *icmp_hdr ));
FORWARD void icmp_router_advertisement ARGS(( icmp_port_t *icmp_port,
acc_t *icmp_pack, int icmp_len, icmp_hdr_t *icmp_hdr ));
FORWARD void icmp_redirect ARGS(( icmp_port_t *icmp_port,
ip_hdr_t *ip_hdr, acc_t *icmp_pack, int icmp_len,
icmp_hdr_t *icmp_hdr ));
FORWARD acc_t *make_repl_ip ARGS(( ip_hdr_t *ip_hdr,
int ip_len ));
FORWARD void enqueue_pack ARGS(( icmp_port_t *icmp_port,
acc_t *reply_ip_hdr ));
FORWARD int icmp_rate_limit ARGS(( icmp_port_t *icmp_port,
acc_t *reply_ip_hdr ));
FORWARD void icmp_write ARGS(( event_t *ev, ev_arg_t ev_arg ));
2005-04-21 16:53:53 +02:00
FORWARD void icmp_buffree ARGS(( int priority ));
FORWARD acc_t *icmp_err_pack ARGS(( acc_t *pack, icmp_hdr_t **icmp_hdr_pp ));
2005-04-21 16:53:53 +02:00
#ifdef BUF_CONSISTENCY_CHECK
FORWARD void icmp_bufcheck ARGS(( void ));
#endif
PUBLIC void icmp_prep()
{
icmp_port_table= alloc(ip_conf_nr * sizeof(icmp_port_table[0]));
}
PUBLIC void icmp_init()
{
int i;
icmp_port_t *icmp_port;
assert (BUF_S >= sizeof (nwio_ipopt_t));
for (i= 0, icmp_port= icmp_port_table; i<ip_conf_nr; i++, icmp_port++)
{
icmp_port->icp_flags= ICPF_EMPTY;
icmp_port->icp_state= ICPS_BEGIN;
icmp_port->icp_ipport= i;
icmp_port->icp_rate_count= 0;
icmp_port->icp_rate_report= ICMP_MAX_RATE;
icmp_port->icp_rate_lasttime= 0;
ev_init(&icmp_port->icp_event);
2005-04-21 16:53:53 +02:00
}
#ifndef BUF_CONSISTENCY_CHECK
bf_logon(icmp_buffree);
#else
bf_logon(icmp_buffree, icmp_bufcheck);
#endif
for (i= 0, icmp_port= icmp_port_table; i<ip_conf_nr; i++, icmp_port++)
{
icmp_main (icmp_port);
}
}
PRIVATE void icmp_main(icmp_port)
icmp_port_t *icmp_port;
{
int result;
switch (icmp_port->icp_state)
{
case ICPS_BEGIN:
icmp_port->icp_head_queue= 0;
icmp_port->icp_ipfd= ip_open(icmp_port->icp_ipport,
icmp_port->icp_ipport, icmp_getdata, icmp_putdata,
0 /* no put_pkt */, 0 /* no select_res */);
2005-04-21 16:53:53 +02:00
if (icmp_port->icp_ipfd<0)
{
DBLOCK(1, printf("unable to open ip_port %d\n",
icmp_port->icp_ipport));
break;
}
icmp_port->icp_state= ICPS_IPOPT;
icmp_port->icp_flags &= ~ICPF_SUSPEND;
result= ip_ioctl (icmp_port->icp_ipfd, NWIOSIPOPT);
if (result == NW_SUSPEND)
{
icmp_port->icp_flags |= ICPF_SUSPEND;
break;
}
assert(result == NW_OK);
/* falls through */
case ICPS_IPOPT:
icmp_port->icp_state= ICPS_MAIN;
icmp_port->icp_flags &= ~ICPF_SUSPEND;
icmp_read(icmp_port);
break;
default:
DBLOCK(1, printf("unknown state %d\n",
icmp_port->icp_state));
break;
}
}
PRIVATE acc_t *icmp_getdata(port, offset, count, for_ioctl)
int port;
size_t offset, count;
int for_ioctl;
{
icmp_port_t *icmp_port;
nwio_ipopt_t *ipopt;
acc_t *data;
int result;
ev_arg_t ev_arg;
2005-04-21 16:53:53 +02:00
icmp_port= &icmp_port_table[port];
if (icmp_port->icp_flags & ICPF_WRITE_IP)
{
if (!count)
{
bf_afree(icmp_port->icp_write_pack);
icmp_port->icp_write_pack= 0;
result= (int)offset;
if (result<0)
{
DBLOCK(1, printf("got write error %d\n",
result));
}
if (icmp_port->icp_flags & ICPF_WRITE_SP)
{
icmp_port->icp_flags &= ~ICPF_WRITE_SP;
ev_arg.ev_ptr= icmp_port;
ev_enqueue(&icmp_port->icp_event, icmp_write,
ev_arg);
2005-04-21 16:53:53 +02:00
}
return NW_OK;
}
return bf_cut(icmp_port->icp_write_pack, offset, count);
}
switch (icmp_port->icp_state)
{
case ICPS_IPOPT:
if (!count)
{
result= (int)offset;
assert(result == NW_OK);
if (result < 0)
{
icmp_port->icp_state= ICPS_ERROR;
break;
}
if (icmp_port->icp_flags & ICPF_SUSPEND)
icmp_main(icmp_port);
return NW_OK;
}
data= bf_memreq (sizeof (*ipopt));
ipopt= (nwio_ipopt_t *)ptr2acc_data(data);
ipopt->nwio_flags= NWIO_COPY | NWIO_EN_LOC |
NWIO_EN_BROAD |
NWIO_REMANY | NWIO_PROTOSPEC |
NWIO_HDR_O_ANY | NWIO_RWDATALL;
ipopt->nwio_proto= IPPROTO_ICMP;
return data;
default:
break;
2005-04-21 16:53:53 +02:00
}
DBLOCK(1, printf("unknown state %d\n", icmp_port->icp_state));
return NULL;
2005-04-21 16:53:53 +02:00
}
PRIVATE int icmp_putdata(port, offset, data, for_ioctl)
int port;
size_t offset;
acc_t *data;
int for_ioctl;
{
icmp_port_t *icmp_port;
int result;
icmp_port= &icmp_port_table[port];
if (icmp_port->icp_flags & ICPF_READ_IP)
{
if (!data)
{
result= (int)offset;
if (result<0)
{
DBLOCK(1, printf("got read error %d\n",
result));
}
if (icmp_port->icp_flags & ICPF_READ_SP)
{
icmp_port->icp_flags &=
~(ICPF_READ_IP|ICPF_READ_SP);
icmp_read (icmp_port);
}
return NW_OK;
}
process_data(icmp_port, data);
return NW_OK;
}
switch (icmp_port->icp_state)
{
default:
DBLOCK(1, printf("unknown state %d\n",
icmp_port->icp_state));
return 0;
}
}
PRIVATE void icmp_read(icmp_port)
icmp_port_t *icmp_port;
{
int result;
for (;;)
{
icmp_port->icp_flags |= ICPF_READ_IP;
icmp_port->icp_flags &= ~ICPF_READ_SP;
result= ip_read(icmp_port->icp_ipfd, ICMP_MAX_DATAGRAM);
if (result == NW_SUSPEND)
{
icmp_port->icp_flags |= ICPF_READ_SP;
return;
}
}
}
PUBLIC void icmp_snd_time_exceeded(port_nr, pack, code)
int port_nr;
acc_t *pack;
int code;
{
icmp_hdr_t *icmp_hdr;
icmp_port_t *icmp_port;
if (port_nr >= 0 && port_nr < ip_conf_nr)
icmp_port= &icmp_port_table[port_nr];
else
{
printf("icmp_snd_time_exceeded: strange port %d\n", port_nr);
bf_afree(pack);
return;
}
2005-04-21 16:53:53 +02:00
pack= icmp_err_pack(pack, &icmp_hdr);
if (pack == NULL)
return;
icmp_hdr->ih_type= ICMP_TYPE_TIME_EXCEEDED;
icmp_hdr->ih_code= code;
icmp_hdr->ih_chksum= ~oneC_sum(~icmp_hdr->ih_chksum,
(u16_t *)&icmp_hdr->ih_type, 2);
enqueue_pack(icmp_port, pack);
}
PUBLIC void icmp_snd_redirect(port_nr, pack, code, gw)
int port_nr;
acc_t *pack;
int code;
ipaddr_t gw;
{
icmp_hdr_t *icmp_hdr;
icmp_port_t *icmp_port;
if (port_nr >= 0 && port_nr < ip_conf_nr)
icmp_port= &icmp_port_table[port_nr];
else
{
printf("icmp_snd_redirect: strange port %d\n", port_nr);
bf_afree(pack);
return;
}
2005-04-21 16:53:53 +02:00
pack= icmp_err_pack(pack, &icmp_hdr);
if (pack == NULL)
return;
icmp_hdr->ih_type= ICMP_TYPE_REDIRECT;
icmp_hdr->ih_code= code;
icmp_hdr->ih_hun.ihh_gateway= gw;
icmp_hdr->ih_chksum= ~oneC_sum(~icmp_hdr->ih_chksum,
(u16_t *)&icmp_hdr->ih_type, 2);
icmp_hdr->ih_chksum= ~oneC_sum(~icmp_hdr->ih_chksum,
(u16_t *)&icmp_hdr->ih_hun.ihh_gateway, 4);
enqueue_pack(icmp_port, pack);
}
PUBLIC void icmp_snd_unreachable(port_nr, pack, code)
int port_nr;
acc_t *pack;
int code;
{
icmp_hdr_t *icmp_hdr;
icmp_port_t *icmp_port;
if (port_nr >= 0 && port_nr < ip_conf_nr)
icmp_port= &icmp_port_table[port_nr];
else
{
printf("icmp_snd_unreachable: strange port %d\n", port_nr);
bf_afree(pack);
return;
}
2005-04-21 16:53:53 +02:00
pack= icmp_err_pack(pack, &icmp_hdr);
if (pack == NULL)
return;
icmp_hdr->ih_type= ICMP_TYPE_DST_UNRCH;
icmp_hdr->ih_code= code;
icmp_hdr->ih_chksum= ~oneC_sum(~icmp_hdr->ih_chksum,
(u16_t *)&icmp_hdr->ih_type, 2);
enqueue_pack(icmp_port, pack);
}
PUBLIC void icmp_snd_mtu(port_nr, pack, mtu)
int port_nr;
acc_t *pack;
u16_t mtu;
{
icmp_hdr_t *icmp_hdr;
icmp_port_t *icmp_port;
if (port_nr >= 0 && port_nr < ip_conf_nr)
icmp_port= &icmp_port_table[port_nr];
else
{
printf("icmp_snd_mtu: strange port %d\n", port_nr);
bf_afree(pack);
return;
}
pack= icmp_err_pack(pack, &icmp_hdr);
if (pack == NULL)
return;
icmp_hdr->ih_type= ICMP_TYPE_DST_UNRCH;
icmp_hdr->ih_code= ICMP_FRAGM_AND_DF;
icmp_hdr->ih_hun.ihh_mtu.im_mtu= htons(mtu);
icmp_hdr->ih_chksum= ~oneC_sum(~icmp_hdr->ih_chksum,
(u16_t *)&icmp_hdr->ih_type, 2);
icmp_hdr->ih_chksum= ~oneC_sum(~icmp_hdr->ih_chksum,
(u16_t *)&icmp_hdr->ih_hun.ihh_mtu.im_mtu, 2);
enqueue_pack(icmp_port, pack);
}
2005-04-21 16:53:53 +02:00
PRIVATE void process_data(icmp_port, data)
icmp_port_t *icmp_port;
acc_t *data;
{
ip_hdr_t *ip_hdr;
icmp_hdr_t *icmp_hdr;
acc_t *icmp_data;
int ip_hdr_len;
size_t pack_len;
/* Align entire packet */
data= bf_align(data, BUF_S, 4);
data= bf_packIffLess(data, IP_MIN_HDR_SIZE);
ip_hdr= (ip_hdr_t *)ptr2acc_data(data);
DIFBLOCK(0x10, (ip_hdr->ih_dst & HTONL(0xf0000000)) == HTONL(0xe0000000),
printf("got multicast packet\n"));
ip_hdr_len= (ip_hdr->ih_vers_ihl & IH_IHL_MASK) << 2;
if (ip_hdr_len>IP_MIN_HDR_SIZE)
{
data= bf_packIffLess(data, ip_hdr_len);
ip_hdr= (ip_hdr_t *)ptr2acc_data(data);
}
pack_len= bf_bufsize(data);
pack_len -= ip_hdr_len;
if (pack_len < ICMP_MIN_HDR_SIZE)
2005-04-21 16:53:53 +02:00
{
if (pack_len == 0 && ip_hdr->ih_proto == 0)
{
/* IP layer reports new ip address, which can be
* ignored.
*/
}
else
DBLOCK(1, printf("got an incomplete icmp packet\n"));
2005-04-21 16:53:53 +02:00
bf_afree(data);
return;
}
icmp_data= bf_cut(data, ip_hdr_len, pack_len);
icmp_data= bf_packIffLess (icmp_data, ICMP_MIN_HDR_SIZE);
2005-04-21 16:53:53 +02:00
icmp_hdr= (icmp_hdr_t *)ptr2acc_data(icmp_data);
if ((u16_t)~icmp_pack_oneCsum(icmp_data))
{
DBLOCK(1, printf(
"got packet with bad checksum (= 0x%x, 0x%x)\n",
icmp_hdr->ih_chksum,
(u16_t)~icmp_pack_oneCsum(icmp_data)));
bf_afree(data);
bf_afree(icmp_data);
return;
}
switch (icmp_hdr->ih_type)
{
case ICMP_TYPE_ECHO_REPL:
break;
case ICMP_TYPE_DST_UNRCH:
icmp_dst_unreach (icmp_port, data, ip_hdr_len, ip_hdr,
icmp_data, pack_len, icmp_hdr);
break;
case ICMP_TYPE_SRC_QUENCH:
/* Ignore src quench ICMPs */
DBLOCK(2, printf("ignoring SRC QUENCH ICMP.\n"));
break;
case ICMP_TYPE_REDIRECT:
icmp_redirect (icmp_port, ip_hdr, icmp_data, pack_len,
icmp_hdr);
break;
case ICMP_TYPE_ECHO_REQ:
icmp_echo_request(icmp_port, data, ip_hdr_len, ip_hdr,
icmp_data, pack_len, icmp_hdr);
return;
case ICMP_TYPE_ROUTER_ADVER:
icmp_router_advertisement(icmp_port, icmp_data, pack_len,
icmp_hdr);
break;
case ICMP_TYPE_ROUTE_SOL:
break; /* Should be handled by a routing deamon. */
case ICMP_TYPE_TIME_EXCEEDED:
icmp_time_exceeded (icmp_port, data, ip_hdr_len, ip_hdr,
icmp_data, pack_len, icmp_hdr);
break;
default:
DBLOCK(1, printf("got an unknown icmp (%d) from ",
icmp_hdr->ih_type);
writeIpAddr(ip_hdr->ih_src); printf("\n"));
break;
}
bf_afree(data);
bf_afree(icmp_data);
}
PRIVATE void icmp_echo_request(icmp_port, ip_data, ip_len, ip_hdr,
icmp_data, icmp_len, icmp_hdr)
icmp_port_t *icmp_port;
acc_t *ip_data, *icmp_data;
int ip_len, icmp_len;
ip_hdr_t *ip_hdr;
icmp_hdr_t *icmp_hdr;
{
acc_t *repl_ip_hdr, *repl_icmp;
ipaddr_t tmpaddr, locaddr, netmask;
2005-04-21 16:53:53 +02:00
icmp_hdr_t *repl_icmp_hdr;
i32_t tmp_chksum;
ip_port_t *ip_port;
2005-04-21 16:53:53 +02:00
if (icmp_hdr->ih_code != 0)
{
DBLOCK(1,
printf("got an icmp echo request with unknown code (%d)\n",
icmp_hdr->ih_code));
bf_afree(ip_data);
bf_afree(icmp_data);
return;
}
if (icmp_len < ICMP_MIN_HDR_SIZE + sizeof(icmp_id_seq_t))
2005-04-21 16:53:53 +02:00
{
DBLOCK(1, printf("got an incomplete icmp echo request\n"));
bf_afree(ip_data);
bf_afree(icmp_data);
return;
}
tmpaddr= ntohl(ip_hdr->ih_dst);
if ((tmpaddr & 0xe0000000) == 0xe0000000 &&
tmpaddr != 0xffffffff)
{
/* Respond only to the all hosts multicast address until
* a decent listening service has been implemented
*/
if (tmpaddr != 0xe0000001)
{
bf_afree(ip_data);
bf_afree(icmp_data);
return;
}
}
/* Limit subnet broadcasts to the local net */
ip_port= &ip_port_table[icmp_port->icp_ipport];
locaddr= ip_port->ip_ipaddr;
netmask= ip_port->ip_subnetmask;
if (ip_hdr->ih_dst == (locaddr | ~netmask) &&
(ip_port->ip_flags & IPF_SUBNET_BCAST) &&
((ip_hdr->ih_src ^ locaddr) & netmask) != 0)
{
/* Directed broadcast */
bf_afree(ip_data);
bf_afree(icmp_data);
return;
}
2005-04-21 16:53:53 +02:00
repl_ip_hdr= make_repl_ip(ip_hdr, ip_len);
repl_icmp= bf_memreq (ICMP_MIN_HDR_SIZE);
2005-04-21 16:53:53 +02:00
repl_icmp_hdr= (icmp_hdr_t *)ptr2acc_data(repl_icmp);
repl_icmp_hdr->ih_type= ICMP_TYPE_ECHO_REPL;
repl_icmp_hdr->ih_code= 0;
DBLOCK(2,
printf("ih_chksum= 0x%x, ih_type= 0x%x, repl->ih_type= 0x%x\n",
icmp_hdr->ih_chksum, *(u16_t *)&icmp_hdr->ih_type,
*(u16_t *)&repl_icmp_hdr->ih_type));
tmp_chksum= (~icmp_hdr->ih_chksum & 0xffff) -
(i32_t)*(u16_t *)&icmp_hdr->ih_type+
*(u16_t *)&repl_icmp_hdr->ih_type;
tmp_chksum= (tmp_chksum >> 16) + (tmp_chksum & 0xffff);
tmp_chksum= (tmp_chksum >> 16) + (tmp_chksum & 0xffff);
repl_icmp_hdr->ih_chksum= ~tmp_chksum;
DBLOCK(2, printf("sending chksum 0x%x\n", repl_icmp_hdr->ih_chksum));
repl_ip_hdr->acc_next= repl_icmp;
repl_icmp->acc_next= bf_cut (icmp_data, ICMP_MIN_HDR_SIZE,
icmp_len - ICMP_MIN_HDR_SIZE);
2005-04-21 16:53:53 +02:00
bf_afree(ip_data);
bf_afree(icmp_data);
enqueue_pack(icmp_port, repl_ip_hdr);
}
PRIVATE u16_t icmp_pack_oneCsum(icmp_pack)
acc_t *icmp_pack;
{
u16_t prev;
int odd_byte;
char *data_ptr;
int length;
char byte_buf[2];
prev= 0;
odd_byte= FALSE;
for (; icmp_pack; icmp_pack= icmp_pack->acc_next)
{
data_ptr= ptr2acc_data(icmp_pack);
length= icmp_pack->acc_length;
if (!length)
continue;
if (odd_byte)
{
byte_buf[1]= *data_ptr;
prev= oneC_sum(prev, (u16_t *)byte_buf, 2);
data_ptr++;
length--;
odd_byte= FALSE;
}
if (length & 1)
{
odd_byte= TRUE;
length--;
byte_buf[0]= data_ptr[length];
}
if (!length)
continue;
prev= oneC_sum (prev, (u16_t *)data_ptr, length);
}
if (odd_byte)
prev= oneC_sum (prev, (u16_t *)byte_buf, 1);
return prev;
}
PRIVATE acc_t *make_repl_ip(ip_hdr, ip_len)
ip_hdr_t *ip_hdr;
int ip_len;
{
ip_hdr_t *repl_ip_hdr;
acc_t *repl;
int repl_hdr_len;
if (ip_len>IP_MIN_HDR_SIZE)
{
DBLOCK(1, printf("ip_hdr options NOT supported (yet?)\n"));
ip_len= IP_MIN_HDR_SIZE;
}
repl_hdr_len= IP_MIN_HDR_SIZE;
repl= bf_memreq(repl_hdr_len);
repl_ip_hdr= (ip_hdr_t *)ptr2acc_data(repl);
repl_ip_hdr->ih_vers_ihl= repl_hdr_len >> 2;
repl_ip_hdr->ih_tos= ip_hdr->ih_tos;
repl_ip_hdr->ih_ttl= ICMP_DEF_TTL;
repl_ip_hdr->ih_proto= IPPROTO_ICMP;
repl_ip_hdr->ih_dst= ip_hdr->ih_src;
repl_ip_hdr->ih_flags_fragoff= 0;
return repl;
}
PRIVATE void enqueue_pack(icmp_port, reply_ip_hdr)
icmp_port_t *icmp_port;
acc_t *reply_ip_hdr;
{
int r;
ev_arg_t ev_arg;
/* Check rate */
if (icmp_port->icp_rate_count >= ICMP_MAX_RATE)
{
/* Something is going wrong; check policy */
r= icmp_rate_limit(icmp_port, reply_ip_hdr);
if (r == -1)
{
bf_afree(reply_ip_hdr);
return;
}
/* OK, continue */
}
icmp_port->icp_rate_count++;
2005-04-21 16:53:53 +02:00
reply_ip_hdr->acc_ext_link= 0;
if (icmp_port->icp_head_queue)
{
icmp_port->icp_tail_queue->acc_ext_link=
reply_ip_hdr;
}
else
{
icmp_port->icp_head_queue= reply_ip_hdr;
}
reply_ip_hdr->acc_ext_link= NULL;
icmp_port->icp_tail_queue= reply_ip_hdr;
if (!(icmp_port->icp_flags & ICPF_WRITE_IP))
{
icmp_port->icp_flags |= ICPF_WRITE_IP;
ev_arg.ev_ptr= icmp_port;
ev_enqueue(&icmp_port->icp_event, icmp_write, ev_arg);
}
2005-04-21 16:53:53 +02:00
}
PRIVATE int icmp_rate_limit(icmp_port, reply_ip_hdr)
2005-04-21 16:53:53 +02:00
icmp_port_t *icmp_port;
acc_t *reply_ip_hdr;
{
time_t t;
acc_t *pack;
ip_hdr_t *ip_hdr;
icmp_hdr_t *icmp_hdr;
int hdrlen, icmp_hdr_len, type;
/* Check the time first */
t= get_time();
if (t >= icmp_port->icp_rate_lasttime + ICMP_RATE_INTERVAL)
{
icmp_port->icp_rate_lasttime= t;
icmp_port->icp_rate_count= 0;
return 0;
}
icmp_port->icp_rate_count++;
/* Adjust report limit if necessary */
if (icmp_port->icp_rate_count >
icmp_port->icp_rate_report+ICMP_RATE_WARN)
{
icmp_port->icp_rate_report *= 2;
return -1;
}
/* Do we need to report */
if (icmp_port->icp_rate_count < icmp_port->icp_rate_report)
return -1;
pack= bf_dupacc(reply_ip_hdr);
pack= bf_packIffLess(pack, IP_MIN_HDR_SIZE);
ip_hdr= (ip_hdr_t *)ptr2acc_data(pack);
printf("icmp[%d]: dropping ICMP packet #%d to ",
icmp_port->icp_ipport, icmp_port->icp_rate_count);
writeIpAddr(ip_hdr->ih_dst);
hdrlen= (ip_hdr->ih_vers_ihl & IH_IHL_MASK)*4;
pack= bf_packIffLess(pack, hdrlen+ICMP_MIN_HDR_SIZE);
ip_hdr= (ip_hdr_t *)ptr2acc_data(pack);
icmp_hdr= (icmp_hdr_t *)(ptr2acc_data(pack)+hdrlen);
type= icmp_hdr->ih_type;
printf(" type %d, code %d\n", type, icmp_hdr->ih_code);
switch(type)
{
case ICMP_TYPE_DST_UNRCH:
case ICMP_TYPE_SRC_QUENCH:
case ICMP_TYPE_REDIRECT:
case ICMP_TYPE_TIME_EXCEEDED:
case ICMP_TYPE_PARAM_PROBLEM:
icmp_hdr_len= offsetof(struct icmp_hdr, ih_dun);
pack= bf_packIffLess(pack,
hdrlen+icmp_hdr_len+IP_MIN_HDR_SIZE);
ip_hdr= (ip_hdr_t *)(ptr2acc_data(pack)+hdrlen+icmp_hdr_len);
icmp_hdr= (icmp_hdr_t *)(ptr2acc_data(pack)+hdrlen);
printf("\tinfo %08x, original dst ",
ntohs(icmp_hdr->ih_hun.ihh_unused));
writeIpAddr(ip_hdr->ih_dst);
printf(", proto %d, length %u\n",
ip_hdr->ih_proto, ntohs(ip_hdr->ih_length));
break;
default:
break;
}
bf_afree(pack); pack= NULL;
return -1;
}
PRIVATE void icmp_write(ev, ev_arg)
event_t *ev;
ev_arg_t ev_arg;
2005-04-21 16:53:53 +02:00
{
int result;
icmp_port_t *icmp_port;
acc_t *data;
icmp_port= ev_arg.ev_ptr;
assert(ev == &icmp_port->icp_event);
2005-04-21 16:53:53 +02:00
assert (icmp_port->icp_flags & ICPF_WRITE_IP);
assert (!(icmp_port->icp_flags & ICPF_WRITE_SP));
2005-04-21 16:53:53 +02:00
while (icmp_port->icp_head_queue != NULL)
{
data= icmp_port->icp_head_queue;
icmp_port->icp_head_queue= data->acc_ext_link;
2005-04-21 16:53:53 +02:00
result= ip_send(icmp_port->icp_ipfd, data,
bf_bufsize(data));
if (result != NW_WOULDBLOCK)
{
if (result == NW_OK)
continue;
DBLOCK(1, printf("icmp_write: error %d\n", result););
continue;
}
2005-04-21 16:53:53 +02:00
assert(icmp_port->icp_write_pack == NULL);
icmp_port->icp_write_pack= data;
2005-04-21 16:53:53 +02:00
result= ip_write(icmp_port->icp_ipfd,
bf_bufsize(icmp_port->icp_write_pack));
if (result == NW_SUSPEND)
{
icmp_port->icp_flags |= ICPF_WRITE_SP;
return;
}
}
icmp_port->icp_flags &= ~ICPF_WRITE_IP;
2005-04-21 16:53:53 +02:00
}
PRIVATE void icmp_buffree(priority)
int priority;
{
acc_t *tmp_acc;
int i;
icmp_port_t *icmp_port;
if (priority == ICMP_PRI_QUEUE)
{
for (i=0, icmp_port= icmp_port_table; i<ip_conf_nr;
i++, icmp_port++)
{
while(icmp_port->icp_head_queue)
{
tmp_acc= icmp_port->icp_head_queue;
icmp_port->icp_head_queue=
tmp_acc->acc_ext_link;
bf_afree(tmp_acc);
}
}
}
}
#ifdef BUF_CONSISTENCY_CHECK
PRIVATE void icmp_bufcheck()
{
int i;
icmp_port_t *icmp_port;
acc_t *pack;
for (i= 0, icmp_port= icmp_port_table; i<ip_conf_nr; i++, icmp_port++)
{
for (pack= icmp_port->icp_head_queue; pack;
pack= pack->acc_ext_link)
{
bf_check_acc(pack);
}
bf_check_acc(icmp_port->icp_write_pack);
}
}
#endif
PRIVATE void icmp_dst_unreach(icmp_port, ip_pack, ip_hdr_len, ip_hdr, icmp_pack,
icmp_len, icmp_hdr)
icmp_port_t *icmp_port;
acc_t *ip_pack;
int ip_hdr_len;
ip_hdr_t *ip_hdr;
acc_t *icmp_pack;
int icmp_len;
icmp_hdr_t *icmp_hdr;
{
acc_t *old_ip_pack;
ip_hdr_t *old_ip_hdr;
int ip_port_nr;
ipaddr_t dst, mask;
size_t old_pack_size;
u16_t new_mtu;
2005-04-21 16:53:53 +02:00
if (icmp_len < 8 + IP_MIN_HDR_SIZE)
{
DBLOCK(1, printf("dest unrch with wrong size\n"));
return;
}
old_ip_pack= bf_cut (icmp_pack, 8, icmp_len-8);
old_ip_pack= bf_packIffLess(old_ip_pack, IP_MIN_HDR_SIZE);
old_ip_hdr= (ip_hdr_t *)ptr2acc_data(old_ip_pack);
if (old_ip_hdr->ih_src != ip_hdr->ih_dst)
{
DBLOCK(1, printf("dest unrch based on wrong packet\n"));
bf_afree(old_ip_pack);
return;
}
ip_port_nr= icmp_port->icp_ipport;
switch(icmp_hdr->ih_code)
{
case ICMP_NET_UNRCH:
dst= old_ip_hdr->ih_dst;
mask= ip_get_netmask(dst);
ipr_destunrch (ip_port_nr, dst & mask, mask,
IPR_UNRCH_TIMEOUT);
break;
case ICMP_HOST_UNRCH:
ipr_destunrch (ip_port_nr, old_ip_hdr->ih_dst, (ipaddr_t)-1,
IPR_UNRCH_TIMEOUT);
break;
case ICMP_PORT_UNRCH:
/* At the moment we don't do anything with this information.
* It should be handed to the appropriate transport layer.
*/
break;
case ICMP_FRAGM_AND_DF:
DBLOCK(1, printf("icmp_dst_unreach: got mtu icmp from ");
writeIpAddr(ip_hdr->ih_src);
printf("; original destination: ");
writeIpAddr(old_ip_hdr->ih_dst);
printf("; protocol: %d\n",
old_ip_hdr->ih_proto));
old_pack_size= ntohs(old_ip_hdr->ih_length);
if (!old_pack_size)
break;
new_mtu= ntohs(icmp_hdr->ih_hun.ihh_mtu.im_mtu);
if (!new_mtu || new_mtu > old_pack_size)
new_mtu= old_pack_size-1;
ipr_mtu(ip_port_nr, old_ip_hdr->ih_dst, new_mtu,
IPR_MTU_TIMEOUT);
break;
2005-04-21 16:53:53 +02:00
default:
DBLOCK(1, printf("icmp_dst_unreach: got strange code %d from ",
icmp_hdr->ih_code);
writeIpAddr(ip_hdr->ih_src);
printf("; original destination: ");
writeIpAddr(old_ip_hdr->ih_dst);
printf("; protocol: %d\n",
old_ip_hdr->ih_proto));
break;
}
bf_afree(old_ip_pack);
}
PRIVATE void icmp_time_exceeded(icmp_port, ip_pack, ip_hdr_len, ip_hdr,
icmp_pack, icmp_len, icmp_hdr)
icmp_port_t *icmp_port;
acc_t *ip_pack;
int ip_hdr_len;
ip_hdr_t *ip_hdr;
acc_t *icmp_pack;
int icmp_len;
icmp_hdr_t *icmp_hdr;
{
acc_t *old_ip_pack;
ip_hdr_t *old_ip_hdr;
int ip_port_nr;
if (icmp_len < 8 + IP_MIN_HDR_SIZE)
{
DBLOCK(1, printf("time exceeded with wrong size\n"));
return;
}
old_ip_pack= bf_cut (icmp_pack, 8, icmp_len-8);
old_ip_pack= bf_packIffLess(old_ip_pack, IP_MIN_HDR_SIZE);
old_ip_hdr= (ip_hdr_t *)ptr2acc_data(old_ip_pack);
if (old_ip_hdr->ih_src != ip_hdr->ih_dst)
{
DBLOCK(1, printf("time exceeded based on wrong packet\n"));
bf_afree(old_ip_pack);
return;
}
ip_port_nr= icmp_port->icp_ipport;
switch(icmp_hdr->ih_code)
{
case ICMP_TTL_EXC:
ipr_ttl_exc (ip_port_nr, old_ip_hdr->ih_dst, (ipaddr_t)-1,
IPR_TTL_TIMEOUT);
break;
case ICMP_FRAG_REASSEM:
/* Ignore reassembly time-outs. */
break;
default:
DBLOCK(1, printf("got strange code: %d\n",
icmp_hdr->ih_code));
break;
}
bf_afree(old_ip_pack);
}
PRIVATE void icmp_router_advertisement(icmp_port, icmp_pack, icmp_len, icmp_hdr)
icmp_port_t *icmp_port;
acc_t *icmp_pack;
int icmp_len;
icmp_hdr_t *icmp_hdr;
{
int entries;
int entry_size;
u32_t addr;
i32_t pref;
2005-04-21 16:53:53 +02:00
u16_t lifetime;
int i;
char *bufp;
if (icmp_len < 8)
{
DBLOCK(1,
printf("router advertisement with wrong size (%d)\n",
icmp_len));
return;
}
if (icmp_hdr->ih_code != 0)
{
DBLOCK(1,
printf("router advertisement with wrong code (%d)\n",
icmp_hdr->ih_code));
return;
}
entries= icmp_hdr->ih_hun.ihh_ram.iram_na;
entry_size= icmp_hdr->ih_hun.ihh_ram.iram_aes * 4;
if (entries < 1)
{
DBLOCK(1, printf(
"router advertisement with wrong number of entries (%d)\n",
entries));
return;
}
if (entry_size < 8)
{
DBLOCK(1, printf(
"router advertisement with wrong entry size (%d)\n",
entry_size));
return;
}
if (icmp_len < 8 + entries * entry_size)
{
DBLOCK(1,
printf("router advertisement with wrong size\n");
printf(
"\t(entries= %d, entry_size= %d, icmp_len= %d)\n",
entries, entry_size, icmp_len));
return;
}
lifetime= ntohs(icmp_hdr->ih_hun.ihh_ram.iram_lt);
if (lifetime > 9000)
{
DBLOCK(1, printf(
"router advertisement with wrong lifetime (%d)\n",
lifetime));
return;
}
for (i= 0, bufp= (char *)&icmp_hdr->ih_dun.uhd_data[0]; i< entries; i++,
bufp += entry_size)
{
addr= *(ipaddr_t *)bufp;
pref= ntohl(*(u32_t *)(bufp+4));
2005-04-21 16:53:53 +02:00
ipr_add_oroute(icmp_port->icp_ipport, HTONL(0L), HTONL(0L),
addr, lifetime ? lifetime * HZ : 1,
1, 0, 0, pref, NULL);
2005-04-21 16:53:53 +02:00
}
}
PRIVATE void icmp_redirect(icmp_port, ip_hdr, icmp_pack, icmp_len, icmp_hdr)
icmp_port_t *icmp_port;
ip_hdr_t *ip_hdr;
acc_t *icmp_pack;
int icmp_len;
icmp_hdr_t *icmp_hdr;
{
acc_t *old_ip_pack;
ip_hdr_t *old_ip_hdr;
int ip_port_nr;
ipaddr_t dst, mask;
if (icmp_len < 8 + IP_MIN_HDR_SIZE)
{
DBLOCK(1, printf("redirect with wrong size\n"));
return;
}
old_ip_pack= bf_cut (icmp_pack, 8, icmp_len-8);
old_ip_pack= bf_packIffLess(old_ip_pack, IP_MIN_HDR_SIZE);
old_ip_hdr= (ip_hdr_t *)ptr2acc_data(old_ip_pack);
ip_port_nr= icmp_port->icp_ipport;
switch(icmp_hdr->ih_code)
{
case ICMP_REDIRECT_NET:
dst= old_ip_hdr->ih_dst;
mask= ip_get_netmask(dst);
ipr_redirect (ip_port_nr, dst & mask, mask,
ip_hdr->ih_src, icmp_hdr->ih_hun.ihh_gateway,
IPR_REDIRECT_TIMEOUT);
break;
case ICMP_REDIRECT_HOST:
ipr_redirect (ip_port_nr, old_ip_hdr->ih_dst, (ipaddr_t)-1,
ip_hdr->ih_src, icmp_hdr->ih_hun.ihh_gateway,
IPR_REDIRECT_TIMEOUT);
break;
default:
DBLOCK(1, printf("got strange code: %d\n",
icmp_hdr->ih_code));
break;
}
bf_afree(old_ip_pack);
}
PRIVATE acc_t *icmp_err_pack(pack, icmp_hdr_pp)
2005-04-21 16:53:53 +02:00
acc_t *pack;
icmp_hdr_t **icmp_hdr_pp;
2005-04-21 16:53:53 +02:00
{
ip_hdr_t *ip_hdr;
icmp_hdr_t *icmp_hdr_p;
2005-04-21 16:53:53 +02:00
acc_t *ip_pack, *icmp_pack, *tmp_pack;
int ip_hdr_len, icmp_hdr_len, ih_type;
size_t size, pack_len;
ipaddr_t dest;
2005-04-21 16:53:53 +02:00
nettype_t nettype;
pack= bf_packIffLess(pack, IP_MIN_HDR_SIZE);
ip_hdr= (ip_hdr_t *)ptr2acc_data(pack);
ip_hdr_len= (ip_hdr->ih_vers_ihl & IH_IHL_MASK) << 2;
pack_len= bf_bufsize(pack);
2005-04-21 16:53:53 +02:00
/* If the IP protocol is ICMP (except echo request/reply) or the
* fragment offset is non-zero,
2005-04-21 16:53:53 +02:00
* drop the packet. Also check if the source address is valid.
*/
if ((ntohs(ip_hdr->ih_flags_fragoff) & IH_FRAGOFF_MASK) != 0)
2005-04-21 16:53:53 +02:00
{
bf_afree(pack);
return NULL;
}
if (ip_hdr->ih_proto == IPPROTO_ICMP)
{
if (ip_hdr_len>IP_MIN_HDR_SIZE)
{
pack= bf_packIffLess(pack, ip_hdr_len);
ip_hdr= (ip_hdr_t *)ptr2acc_data(pack);
}
if (pack_len < ip_hdr_len+ICMP_MIN_HDR_SIZE)
{
bf_afree(pack);
return NULL;
}
icmp_pack= bf_cut(pack, ip_hdr_len, ICMP_MIN_HDR_SIZE);
icmp_pack= bf_packIffLess (icmp_pack, ICMP_MIN_HDR_SIZE);
icmp_hdr_p= (icmp_hdr_t *)ptr2acc_data(icmp_pack);
ih_type= icmp_hdr_p->ih_type;
bf_afree(icmp_pack); icmp_pack= NULL;
if (ih_type != ICMP_TYPE_ECHO_REQ &&
ih_type != ICMP_TYPE_ECHO_REPL)
{
bf_afree(pack);
return NULL;
}
}
2005-04-21 16:53:53 +02:00
dest= ip_hdr->ih_src;
nettype= ip_nettype(dest);
if (nettype != IPNT_CLASS_A && nettype != IPNT_LOCAL &&
nettype != IPNT_CLASS_B && nettype != IPNT_CLASS_C)
2005-04-21 16:53:53 +02:00
{
printf("icmp_err_pack: invalid source address: ");
writeIpAddr(dest);
printf("\n");
bf_afree(pack);
return NULL;
}
/* Take the IP header and the first 64 bits of user data. */
size= ntohs(ip_hdr->ih_length);
if (size < ip_hdr_len || pack_len < size)
2005-04-21 16:53:53 +02:00
{
printf("icmp_err_pack: wrong packet size:\n");
printf("\thdrlen= %d, ih_length= %d, bufsize= %d\n",
ip_hdr_len, size, pack_len);
2005-04-21 16:53:53 +02:00
bf_afree(pack);
return NULL;
}
if (ip_hdr_len + 8 < size)
size= ip_hdr_len+8;
tmp_pack= bf_cut(pack, 0, size);
bf_afree(pack);
pack= tmp_pack;
tmp_pack= NULL;
/* Create a minimal size ICMP hdr. */
icmp_hdr_len= offsetof(icmp_hdr_t, ih_dun);
icmp_pack= bf_memreq(icmp_hdr_len);
pack= bf_append(icmp_pack, pack);
size += icmp_hdr_len;
pack= bf_packIffLess(pack, icmp_hdr_len);
icmp_hdr_p= (icmp_hdr_t *)ptr2acc_data(pack);
icmp_hdr_p->ih_type= 0;
icmp_hdr_p->ih_code= 0;
icmp_hdr_p->ih_chksum= 0;
icmp_hdr_p->ih_hun.ihh_unused= 0;
icmp_hdr_p->ih_chksum= ~icmp_pack_oneCsum(pack);
*icmp_hdr_pp= icmp_hdr_p;
2005-04-21 16:53:53 +02:00
/* Create an IP header */
ip_hdr_len= IP_MIN_HDR_SIZE;
ip_pack= bf_memreq(ip_hdr_len);
ip_hdr= (ip_hdr_t *)ptr2acc_data(ip_pack);
ip_hdr->ih_vers_ihl= ip_hdr_len >> 2;
ip_hdr->ih_tos= 0;
ip_hdr->ih_length= htons(ip_hdr_len + size);
ip_hdr->ih_flags_fragoff= 0;
ip_hdr->ih_ttl= ICMP_DEF_TTL;
ip_hdr->ih_proto= IPPROTO_ICMP;
ip_hdr->ih_dst= dest;
assert(ip_pack->acc_next == NULL);
ip_pack->acc_next= pack;
return ip_pack;
}
/*
* $PchId: icmp.c,v 1.23 2005/06/28 14:16:56 philip Exp $
2005-04-21 16:53:53 +02:00
*/