View | Details | Raw Unified | Return to bug 61685
Collapse All | Expand All

(-)sys/netinet/ip_input.c (-2 / +2 lines)
Lines 340-346 Link Here
340
	if (args.rule) {	/* dummynet already filtered us */
340
	if (args.rule) {	/* dummynet already filtered us */
341
		ip = mtod(m, struct ip *);
341
		ip = mtod(m, struct ip *);
342
		hlen = IP_VHL_HL(ip->ip_vhl) << 2;
342
		hlen = IP_VHL_HL(ip->ip_vhl) << 2;
343
		goto iphack ;
343
		goto ipfw;	/* skip ipfilter now (already passed it)! */
344
	}
344
	}
345
345
346
	ipstat.ips_total++;
346
	ipstat.ips_total++;
Lines 451-457 Link Here
451
	 * - Encapsulate: put it in another IP and send out. <unimp.>
451
	 * - Encapsulate: put it in another IP and send out. <unimp.>
452
 	 */
452
 	 */
453
453
454
iphack:
455
	/*
454
	/*
456
	 * Check if we want to allow this packet to be processed.
455
	 * Check if we want to allow this packet to be processed.
457
	 * Consider it to be bad if not.
456
	 * Consider it to be bad if not.
Lines 463-468 Link Here
463
			return;
462
			return;
464
		ip = mtod(m = m1, struct ip *);
463
		ip = mtod(m = m1, struct ip *);
465
	}
464
	}
465
ipfw:
466
	if (fw_enable && IPFW_LOADED) {
466
	if (fw_enable && IPFW_LOADED) {
467
		/*
467
		/*
468
		 * If we've been forwarded from the output side, then
468
		 * If we've been forwarded from the output side, then

Return to bug 61685