ip_forward.c 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123
  1. /*
  2. * INET An implementation of the TCP/IP protocol suite for the LINUX
  3. * operating system. INET is implemented using the BSD Socket
  4. * interface as the means of communication with the user level.
  5. *
  6. * The IP forwarding functionality.
  7. *
  8. * Version: $Id: ip_forward.c,v 1.48 2000/12/13 18:31:48 davem Exp $
  9. *
  10. * Authors: see ip.c
  11. *
  12. * Fixes:
  13. * Many : Split from ip.c , see ip_input.c for
  14. * history.
  15. * Dave Gregorich : NULL ip_rt_put fix for multicast
  16. * routing.
  17. * Jos Vos : Add call_out_firewall before sending,
  18. * use output device for accounting.
  19. * Jos Vos : Call forward firewall after routing
  20. * (always use output device).
  21. * Mike McLagan : Routing by source
  22. */
  23. #include <linux/types.h>
  24. #include <linux/mm.h>
  25. #include <linux/sched.h>
  26. #include <linux/skbuff.h>
  27. #include <linux/ip.h>
  28. #include <linux/icmp.h>
  29. #include <linux/netdevice.h>
  30. #include <net/sock.h>
  31. #include <net/ip.h>
  32. #include <net/tcp.h>
  33. #include <net/udp.h>
  34. #include <net/icmp.h>
  35. #include <linux/tcp.h>
  36. #include <linux/udp.h>
  37. #include <linux/netfilter_ipv4.h>
  38. #include <net/checksum.h>
  39. #include <linux/route.h>
  40. #include <net/route.h>
  41. #include <net/xfrm.h>
  42. static inline int ip_forward_finish(struct sk_buff *skb)
  43. {
  44. struct ip_options * opt = &(IPCB(skb)->opt);
  45. IP_INC_STATS_BH(IPSTATS_MIB_OUTFORWDATAGRAMS);
  46. if (unlikely(opt->optlen))
  47. ip_forward_options(skb);
  48. return dst_output(skb);
  49. }
  50. int ip_forward(struct sk_buff *skb)
  51. {
  52. struct iphdr *iph; /* Our header */
  53. struct rtable *rt; /* Route we use */
  54. struct ip_options * opt = &(IPCB(skb)->opt);
  55. if (!xfrm4_policy_check(NULL, XFRM_POLICY_FWD, skb))
  56. goto drop;
  57. if (IPCB(skb)->opt.router_alert && ip_call_ra_chain(skb))
  58. return NET_RX_SUCCESS;
  59. if (skb->pkt_type != PACKET_HOST)
  60. goto drop;
  61. skb->ip_summed = CHECKSUM_NONE;
  62. /*
  63. * According to the RFC, we must first decrease the TTL field. If
  64. * that reaches zero, we must reply an ICMP control message telling
  65. * that the packet's lifetime expired.
  66. */
  67. if (skb->nh.iph->ttl <= 1)
  68. goto too_many_hops;
  69. if (!xfrm4_route_forward(skb))
  70. goto drop;
  71. rt = (struct rtable*)skb->dst;
  72. if (opt->is_strictroute && rt->rt_dst != rt->rt_gateway)
  73. goto sr_failed;
  74. /* We are about to mangle packet. Copy it! */
  75. if (skb_cow(skb, LL_RESERVED_SPACE(rt->u.dst.dev)+rt->u.dst.header_len))
  76. goto drop;
  77. iph = skb->nh.iph;
  78. /* Decrease ttl after skb cow done */
  79. ip_decrease_ttl(iph);
  80. /*
  81. * We now generate an ICMP HOST REDIRECT giving the route
  82. * we calculated.
  83. */
  84. if (rt->rt_flags&RTCF_DOREDIRECT && !opt->srr)
  85. ip_rt_send_redirect(skb);
  86. skb->priority = rt_tos2priority(iph->tos);
  87. return NF_HOOK(PF_INET, NF_IP_FORWARD, skb, skb->dev, rt->u.dst.dev,
  88. ip_forward_finish);
  89. sr_failed:
  90. /*
  91. * Strict routing permits no gatewaying
  92. */
  93. icmp_send(skb, ICMP_DEST_UNREACH, ICMP_SR_FAILED, 0);
  94. goto drop;
  95. too_many_hops:
  96. /* Tell the sender its packet died... */
  97. IP_INC_STATS_BH(IPSTATS_MIB_INHDRERRORS);
  98. icmp_send(skb, ICMP_TIME_EXCEEDED, ICMP_EXC_TTL, 0);
  99. drop:
  100. kfree_skb(skb);
  101. return NET_RX_DROP;
  102. }