Date: Fri, 17 Oct 2003 04:20:38 +0900 From: Hajimu UMEMOTO <ume@mahoroba.org> To: Sam Leffler <sam@FreeBSD.org> Cc: cvs-all@FreeBSD.org Subject: Re: cvs commit: src/sys/netinet6 ip6_input.c Message-ID: <ygeu169xa49.wl%ume@mahoroba.org> In-Reply-To: <200310161857.h9GIvkxi012057@repoman.freebsd.org> References: <200310161857.h9GIvkxi012057@repoman.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi, >>>>> On Thu, 16 Oct 2003 11:57:46 -0700 (PDT) >>>>> Sam Leffler <sam@FreeBSD.org> said: sam> pfil hooks can modify packet contents so check if the destination sam> address has been changed when PFIL_HOOKS is enabled and, if it has, sam> arrange for the proper action by ip*_forward. Is following chunk is intentional? @@ -356,6 +365,7 @@ ip6_input(m) */ if (ip6_fw_enable && ip6_fw_chk_ptr) { u_short port = 0; + srcrt = !IN6_ARE_ADDR_EQUAL(&odst, &ip6->ip6_dst); /* If ipfw says divert, we have to just drop packet */ /* use port as a dummy argument */ if ((*ip6_fw_chk_ptr)(&ip6, NULL, &port, &m)) { Sincerely, -- Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan ume@mahoroba.org ume@bisd.hitachi.co.jp ume@{,jp.}FreeBSD.org http://www.imasy.org/~ume/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?ygeu169xa49.wl%ume>