There is no NET_RX_BAD: this is clearly NET_RX_DROP.
Cheers,
Rusty.
diff -urN -I \$.*\$ -X /tmp/kerndiff.PkEnMY --minimal
linux-2.4.0-test10-7/net/ipv4/ip_forward.c
working-2.4.0-test10-7/net/ipv4/ip_forward.c
--- linux-2.4.0-test10-7/net/ipv4/ip_forward.c Mon Nov 6 20:34:45 2000
+++ working-2.4.0-test10-7/net/ipv4/ip_forward.c Tue Nov 7 15:26:50 2000
@@ -136,7 +136,7 @@
if (rt->rt_flags & RTCF_NAT) {
if (ip_do_nat(skb)) {
kfree_skb(skb);
- return NET_RX_BAD;
+ return NET_RX_DROP;
}
}
#endif
diff -urN -I \$.*\$ -X /tmp/kerndiff.PkEnMY --minimal
linux-2.4.0-test10-7/net/ipv4/ip_nat_dumb.c
working-2.4.0-test10-7/net/ipv4/ip_nat_dumb.c
--- linux-2.4.0-test10-7/net/ipv4/ip_nat_dumb.c Mon Nov 6 20:34:45 2000
+++ working-2.4.0-test10-7/net/ipv4/ip_nat_dumb.c Tue Nov 7 15:26:44 2000
@@ -155,6 +155,6 @@
return NET_RX_SUCCESS;
truncated:
- /* should be return NET_RX_BAD; */
+ /* should be return NET_RX_DROP; */
return -EINVAL;
}
--
Hacking time.
|