Module Name: src Committed By: maxv Date: Sun Sep 2 16:05:33 UTC 2018
Modified Files: src/sys/netinet: ip_input.c Log Message: remove reference to ipnat, and duplicate comments To generate a diff of this commit: cvs rdiff -u -r1.385 -r1.386 src/sys/netinet/ip_input.c Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/sys/netinet/ip_input.c diff -u src/sys/netinet/ip_input.c:1.385 src/sys/netinet/ip_input.c:1.386 --- src/sys/netinet/ip_input.c:1.385 Tue Jul 10 15:46:58 2018 +++ src/sys/netinet/ip_input.c Sun Sep 2 16:05:33 2018 @@ -1,4 +1,4 @@ -/* $NetBSD: ip_input.c,v 1.385 2018/07/10 15:46:58 maxv Exp $ */ +/* $NetBSD: ip_input.c,v 1.386 2018/09/02 16:05:33 maxv Exp $ */ /* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. @@ -91,7 +91,7 @@ */ #include <sys/cdefs.h> -__KERNEL_RCSID(0, "$NetBSD: ip_input.c,v 1.385 2018/07/10 15:46:58 maxv Exp $"); +__KERNEL_RCSID(0, "$NetBSD: ip_input.c,v 1.386 2018/09/02 16:05:33 maxv Exp $"); #ifdef _KERNEL_OPT #include "opt_inet.h" @@ -176,7 +176,7 @@ int ip_do_randomid = 0; * and transmit implementation do not implement the Strong ES model, * setting this to 1 results in an odd hybrid. * - * XXX - ip_checkinterface currently must be disabled if you use ipnat + * XXX - ip_checkinterface currently must be disabled if you use NAT * to translate the destination address to another local interface. * * XXX - ip_checkinterface must be disabled if you add IP aliases @@ -324,13 +324,6 @@ ip_match_our_address(struct ifnet *ifp, * strong ES model) if IP forwarding is disabled and the packet * is not locally generated. * - * XXX - Checking also should be disabled if the destination - * address is ipnat'ed to a different interface. - * - * XXX - Checking is incompatible with IP aliases added - * to the loopback interface instead of the interface where - * the packets are received. - * * XXX - We need to add a per ifaddr flag for this so that * we get finer grain control. */