pfil hooks can modify packet contents so check if the destination

address has been changed when PFIL_HOOKS is enabled and, if it has,
arrange for the proper action by ip*_forward.

Supported by:	FreeBSD Foundation
Submitted by:	Pyun YongHyeon
This commit is contained in:
Sam Leffler 2003-10-16 16:25:25 +00:00
parent b15694110f
commit f51f805f7e
Notes: svn2git 2020-12-20 02:59:44 +00:00
svn path=/head/; revision=121141

View File

@ -360,6 +360,10 @@ ip_input(struct mbuf *m)
u_int32_t divert_info = 0; /* packet divert/tee info */
struct ip_fw_args args;
struct route cro; /* copy of cached route */
int srcrt = 0; /* forward by ``src routing'' */
#ifdef PFIL_HOOKS
struct in_addr odst; /* original dst address */
#endif
#ifdef FAST_IPSEC
struct m_tag *mtag;
struct tdb_ident *tdbi;
@ -516,13 +520,19 @@ ip_input(struct mbuf *m)
#ifdef PFIL_HOOKS
/*
* Run through list of hooks for input packets.
*
* NB: Beware of the destination address changing (e.g.
* by NAT rewriting). When this happens, tell
* ip_forward to do the right thing.
*/
odst = ip->ip_dst;
if (pfil_run_hooks(&inet_pfil_hook, &m, m->m_pkthdr.rcvif,
PFIL_IN) != 0)
return;
if (m == NULL) /* consumed by filter */
return;
ip = mtod(m, struct ip *);
srcrt = (odst.s_addr != ip->ip_dst.s_addr);
#endif /* PFIL_HOOKS */
if (fw_enable && IPFW_LOADED) {
@ -759,7 +769,7 @@ ip_input(struct mbuf *m)
}
#endif /* FAST_IPSEC */
RTCACHE_GET(&cro);
ip_forward(m, &cro, 0, args.next_hop);
ip_forward(m, &cro, srcrt, args.next_hop);
}
return;