Date: Fri, 17 Oct 2003 04:20:38 +0900 From: Hajimu UMEMOTO <ume@mahoroba.org> To: Sam Leffler <sam@FreeBSD.org> Cc: cvs-all@FreeBSD.org Subject: Re: cvs commit: src/sys/netinet6 ip6_input.c Message-ID: <ygeu169xa49.wl%ume@mahoroba.org> In-Reply-To: <200310161857.h9GIvkxi012057@repoman.freebsd.org> References: <200310161857.h9GIvkxi012057@repoman.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi,
>>>>> On Thu, 16 Oct 2003 11:57:46 -0700 (PDT)
>>>>> Sam Leffler <sam@FreeBSD.org> said:
sam> pfil hooks can modify packet contents so check if the destination
sam> address has been changed when PFIL_HOOKS is enabled and, if it has,
sam> arrange for the proper action by ip*_forward.
Is following chunk is intentional?
@@ -356,6 +365,7 @@ ip6_input(m)
*/
if (ip6_fw_enable && ip6_fw_chk_ptr) {
u_short port = 0;
+ srcrt = !IN6_ARE_ADDR_EQUAL(&odst, &ip6->ip6_dst);
/* If ipfw says divert, we have to just drop packet */
/* use port as a dummy argument */
if ((*ip6_fw_chk_ptr)(&ip6, NULL, &port, &m)) {
Sincerely,
--
Hajimu UMEMOTO @ Internet Mutual Aid Society Yokohama, Japan
ume@mahoroba.org ume@bisd.hitachi.co.jp ume@{,jp.}FreeBSD.org
http://www.imasy.org/~ume/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?ygeu169xa49.wl%ume>
