Bugzilla – Attachment #2425: new patch for bug #2402
return true;
}
// Check if input device supports IP forwarding
if (m_ipv4->IsForwarding (iif) == false)
{
NS_LOG_LOGIC ("Forwarding disabled for this interface");
ecb (p, header, Socket::ERROR_NOROUTETOHOST);
// Forwarding
return Forwarding (p, header, ucb, ecb);
RoutingTableEntry toDst;
if (m_routingTable.LookupRoute (dst,toDst))
return false;
// Next, try to find a route
NS_LOG_LOGIC ("Unicast destination- looking up global route");
NS_LOG_FUNCTION (this << p << ipHeader << sockErrno);
NS_LOG_LOGIC ("Route input failure-- dropping packet to " << ipHeader << " with errno " << sockErrno);
m_dropTrace (ipHeader, p, DROP_ROUTE_ERROR, m_node->GetObject<Ipv4> (), 0);
// \todo Send an ICMP no route.
void
// If we have already delivered a packet locally (e.g. multicast)
ecb (p, ipHeader, Socket::ERROR_NOROUTETOHOST);
Ptr<Ipv4Route> rtentry = LookupStatic (ipHeader.GetDestination ());
NS_LOG_LOGIC ("Forwarding logic for node: " << m_node->GetId ());
// Drop RFC 3849 packets: 2001:db8::/32
if (header.GetDestinationAddress().IsDocumentation())
if (header.GetDestinationAddress().IsDocumentation ())
NS_LOG_WARN ("Received a packet for 2001:db8::/32 (documentation class). Drop.");
m_dropTrace (header, p, DROP_ROUTE_ERROR, m_node->GetObject<Ipv6> (), 0);
// We disable error callback for the called protocols.
NS_LOG_LOGIC ("Unicast destination");