Module Name:    src
Committed By:   maxv
Date:           Sun Sep  2 16:05:33 UTC 2018

Modified Files:
        src/sys/netinet: ip_input.c

Log Message:
remove reference to ipnat, and duplicate comments


To generate a diff of this commit:
cvs rdiff -u -r1.385 -r1.386 src/sys/netinet/ip_input.c

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/sys/netinet/ip_input.c
diff -u src/sys/netinet/ip_input.c:1.385 src/sys/netinet/ip_input.c:1.386
--- src/sys/netinet/ip_input.c:1.385	Tue Jul 10 15:46:58 2018
+++ src/sys/netinet/ip_input.c	Sun Sep  2 16:05:33 2018
@@ -1,4 +1,4 @@
-/*	$NetBSD: ip_input.c,v 1.385 2018/07/10 15:46:58 maxv Exp $	*/
+/*	$NetBSD: ip_input.c,v 1.386 2018/09/02 16:05:33 maxv Exp $	*/
 
 /*
  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
@@ -91,7 +91,7 @@
  */
 
 #include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: ip_input.c,v 1.385 2018/07/10 15:46:58 maxv Exp $");
+__KERNEL_RCSID(0, "$NetBSD: ip_input.c,v 1.386 2018/09/02 16:05:33 maxv Exp $");
 
 #ifdef _KERNEL_OPT
 #include "opt_inet.h"
@@ -176,7 +176,7 @@ int ip_do_randomid = 0;
  * and transmit implementation do not implement the Strong ES model,
  * setting this to 1 results in an odd hybrid.
  *
- * XXX - ip_checkinterface currently must be disabled if you use ipnat
+ * XXX - ip_checkinterface currently must be disabled if you use NAT
  * to translate the destination address to another local interface.
  *
  * XXX - ip_checkinterface must be disabled if you add IP aliases
@@ -324,13 +324,6 @@ ip_match_our_address(struct ifnet *ifp, 
 	 * strong ES model) if IP forwarding is disabled and the packet
 	 * is not locally generated.
 	 *
-	 * XXX - Checking also should be disabled if the destination
-	 * address is ipnat'ed to a different interface.
-	 *
-	 * XXX - Checking is incompatible with IP aliases added
-	 * to the loopback interface instead of the interface where
-	 * the packets are received.
-	 *
 	 * XXX - We need to add a per ifaddr flag for this so that
 	 * we get finer grain control.
 	 */

Reply via email to