Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 17 Oct 2003 04:20:38 +0900
From:      Hajimu UMEMOTO <ume@mahoroba.org>
To:        Sam Leffler <sam@FreeBSD.org>
Cc:        cvs-all@FreeBSD.org
Subject:   Re: cvs commit: src/sys/netinet6 ip6_input.c
Message-ID:  <ygeu169xa49.wl%ume@mahoroba.org>
In-Reply-To: <200310161857.h9GIvkxi012057@repoman.freebsd.org>
References:  <200310161857.h9GIvkxi012057@repoman.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi,

>>>>> On Thu, 16 Oct 2003 11:57:46 -0700 (PDT)
>>>>> Sam Leffler <sam@FreeBSD.org> said:

sam>   pfil hooks can modify packet contents so check if the destination
sam>   address has been changed when PFIL_HOOKS is enabled and, if it has,
sam>   arrange for the proper action by ip*_forward.

Is following chunk is intentional?

@@ -356,6 +365,7 @@ ip6_input(m)
 	 */
 	if (ip6_fw_enable && ip6_fw_chk_ptr) {
 		u_short port = 0;
+	srcrt = !IN6_ARE_ADDR_EQUAL(&odst, &ip6->ip6_dst);
 		/* If ipfw says divert, we have to just drop packet */
 		/* use port as a dummy argument */
 		if ((*ip6_fw_chk_ptr)(&ip6, NULL, &port, &m)) {


Sincerely,

--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
ume@mahoroba.org  ume@bisd.hitachi.co.jp  ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?ygeu169xa49.wl%ume>