ipt_mirror.c

来自「linux-2.4.29操作系统的源码」· C语言 代码 · 共 210 行

C
210
字号
/*  This is a module which is used for resending packets with inverted src and dst.  Based on code from: ip_nat_dumb.c,v 1.9 1999/08/20  and various sources.  Copyright (C) 2000 Emmanuel Roger <winfield@freegates.be>  Changes:	25 Aug 2001 Harald Welte <laforge@gnumonks.org>		- decrement and check TTL if not called from FORWARD hook  This program is free software; you can redistribute it and/or modify it  under the terms of the GNU General Public License as published by the  Free Software Foundation; either version 2 of the License, or (at your  option) any later version.  This program is distributed in the hope that it will be useful, but  WITHOUT ANY WARRANTY; without even the implied warranty of  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU  General Public License for more details.  You should have received a copy of the GNU General Public License  along with this program; if not, write to the Free Software Foundation,  Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA */#include <linux/module.h>#include <linux/skbuff.h>#include <linux/ip.h>#include <net/ip.h>#include <net/icmp.h>#include <linux/netfilter_ipv4/ip_tables.h>#include <linux/netdevice.h>#include <linux/route.h>#include <net/route.h>#if 0#define DEBUGP printk#else#define DEBUGP(format, args...)#endifstatic inline struct rtable *route_mirror(struct sk_buff *skb, int local){        struct iphdr *iph = skb->nh.iph;	struct dst_entry *odst;	struct rt_key key = {};	struct rtable *rt;	if (local) {		key.dst = iph->saddr;		key.src = iph->daddr;		key.tos = RT_TOS(iph->tos);		if (ip_route_output_key(&rt, &key) != 0)			return NULL;	} else {		/* non-local src, find valid iif to satisfy		 * rp-filter when calling ip_route_input. */		key.dst = iph->daddr;		if (ip_route_output_key(&rt, &key) != 0)			return NULL;		odst = skb->dst;		if (ip_route_input(skb, iph->saddr, iph->daddr,		                   RT_TOS(iph->tos), rt->u.dst.dev) != 0) {			dst_release(&rt->u.dst);			return NULL;		}		dst_release(&rt->u.dst);		rt = (struct rtable *)skb->dst;		skb->dst = odst;	}	if (rt->u.dst.error) {		dst_release(&rt->u.dst);		rt = NULL;	}	return rt;}static inline void ip_rewrite(struct sk_buff *skb){	struct iphdr *iph = skb->nh.iph;	u32 odaddr = iph->saddr;	u32 osaddr = iph->daddr;	skb->nfcache |= NFC_ALTERED;	/* Rewrite IP header */	iph->daddr = odaddr;	iph->saddr = osaddr;}/* Stolen from ip_finish_output2 */static void ip_direct_send(struct sk_buff *skb){	struct dst_entry *dst = skb->dst;	struct hh_cache *hh = dst->hh;	if (hh) {		int hh_alen;		read_lock_bh(&hh->hh_lock);		hh_alen = HH_DATA_ALIGN(hh->hh_len);  		memcpy(skb->data - hh_alen, hh->hh_data, hh_alen);		read_unlock_bh(&hh->hh_lock);	        skb_push(skb, hh->hh_len);		hh->hh_output(skb);	} else if (dst->neighbour)		dst->neighbour->output(skb);	else {		printk(KERN_DEBUG "khm in MIRROR\n");		kfree_skb(skb);	}}static unsigned int ipt_mirror_target(struct sk_buff **pskb,				      unsigned int hooknum,				      const struct net_device *in,				      const struct net_device *out,				      const void *targinfo,				      void *userinfo){	struct rtable *rt;	struct sk_buff *nskb;	unsigned int hh_len;	/* If we are not at FORWARD hook (INPUT/PREROUTING),	 * the TTL isn't decreased by the IP stack */	if (hooknum != NF_IP_FORWARD) {		struct iphdr *iph = (*pskb)->nh.iph;		if (iph->ttl <= 1) {			/* this will traverse normal stack, and 			 * thus call conntrack on the icmp packet */			icmp_send(*pskb, ICMP_TIME_EXCEEDED, 				  ICMP_EXC_TTL, 0);			return NF_DROP;		}		ip_decrease_ttl(iph);	}	if ((rt = route_mirror(*pskb, hooknum == NF_IP_LOCAL_IN)) == NULL)		return NF_DROP;	hh_len = (rt->u.dst.dev->hard_header_len + 15) & ~15;	/* Copy skb (even if skb is about to be dropped, we can't just	 * clone it because there may be other things, such as tcpdump,	 * interested in it). We also need to expand headroom in case	 * hh_len of incoming interface < hh_len of outgoing interface */	nskb = skb_copy_expand(*pskb, hh_len, skb_tailroom(*pskb), GFP_ATOMIC);	if (nskb == NULL) {		dst_release(&rt->u.dst);		return NF_DROP;	}	dst_release(nskb->dst);	nskb->dst = &rt->u.dst;	ip_rewrite(nskb);	/* Don't let conntrack code see this packet:           it will think we are starting a new           connection! --RR */	ip_direct_send(nskb);	return NF_DROP;}static int ipt_mirror_checkentry(const char *tablename,				 const struct ipt_entry *e,				 void *targinfo,				 unsigned int targinfosize,				 unsigned int hook_mask){	/* Only on INPUT, FORWARD or PRE_ROUTING, otherwise loop danger. */	if (hook_mask & ~((1 << NF_IP_PRE_ROUTING)			  | (1 << NF_IP_FORWARD)			  | (1 << NF_IP_LOCAL_IN))) {		DEBUGP("MIRROR: bad hook\n");		return 0;	}	if (targinfosize != IPT_ALIGN(0)) {		DEBUGP("MIRROR: targinfosize %u != 0\n", targinfosize);		return 0;	}	return 1;}static struct ipt_target ipt_mirror_reg= { { NULL, NULL }, "MIRROR", ipt_mirror_target, ipt_mirror_checkentry, NULL,    THIS_MODULE };static int __init init(void){	return ipt_register_target(&ipt_mirror_reg);}static void __exit fini(void){	ipt_unregister_target(&ipt_mirror_reg);}module_init(init);module_exit(fini);MODULE_LICENSE("GPL");

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?