Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 11 Mar 2019 10:42:10 +0000 (UTC)
From:      "Andrey V. Elsukov" <ae@FreeBSD.org>
To:        src-committers@freebsd.org, svn-src-all@freebsd.org, svn-src-head@freebsd.org
Subject:   svn commit: r345004 - head/sys/netpfil/ipfw
Message-ID:  <201903111042.x2BAgABw081709@repo.freebsd.org>

next in thread | raw e-mail | index | archive | help
Author: ae
Date: Mon Mar 11 10:42:09 2019
New Revision: 345004
URL: https://svnweb.freebsd.org/changeset/base/345004

Log:
  Add IP_FW_NAT64 to codes that ipfw_chk() can return.
  
  It will be used by upcoming NAT64 changes. We use separate code
  to avoid propogating EACCES error code to user level applications
  when NAT64 consumes a packet.
  
  Obtained from:	Yandex LLC
  MFC after:	1 week
  Sponsored by:	Yandex LLC

Modified:
  head/sys/netpfil/ipfw/ip_fw_pfil.c
  head/sys/netpfil/ipfw/ip_fw_private.h

Modified: head/sys/netpfil/ipfw/ip_fw_pfil.c
==============================================================================
--- head/sys/netpfil/ipfw/ip_fw_pfil.c	Mon Mar 11 10:33:32 2019	(r345003)
+++ head/sys/netpfil/ipfw/ip_fw_pfil.c	Mon Mar 11 10:42:09 2019	(r345004)
@@ -313,6 +313,10 @@ again:
 	case IP_FW_REASS:
 		goto again;		/* continue with packet */
 
+	case IP_FW_NAT64:
+		ret = PFIL_CONSUMED;
+		break;
+
 	default:
 		KASSERT(0, ("%s: unknown retval", __func__));
 	}

Modified: head/sys/netpfil/ipfw/ip_fw_private.h
==============================================================================
--- head/sys/netpfil/ipfw/ip_fw_private.h	Mon Mar 11 10:33:32 2019	(r345003)
+++ head/sys/netpfil/ipfw/ip_fw_private.h	Mon Mar 11 10:42:09 2019	(r345004)
@@ -61,6 +61,7 @@ enum {
 	IP_FW_NGTEE,
 	IP_FW_NAT,
 	IP_FW_REASS,
+	IP_FW_NAT64,
 };
 
 /*



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201903111042.x2BAgABw081709>