mirror of
https://git.FreeBSD.org/src.git
synced 2024-12-29 12:03:03 +00:00
d94f2a68f8
exists to allow the mandatory access control policy to properly initialize mbufs generated by the firewall. An example where this might happen is keep alive packets, or ICMP error packets in response to other packets. This takes care of kernel panics associated with un-initialize mbuf labels when the firewall generates packets. [1] I modified this patch from it's original version, the initial patch introduced a number of entry points which were programmatically equivalent. So I introduced only one. Instead, we should leverage mac_create_mbuf_netlayer() which is used for similar situations, an example being icmp_error() This will minimize the impact associated with the MFC Submitted by: mlaier [1] MFC after: 1 week This is a RELENG_6 candidate
29 lines
560 B
Makefile
29 lines
560 B
Makefile
# $FreeBSD$
|
|
|
|
.include <bsd.own.mk>
|
|
|
|
.PATH: ${.CURDIR}/../../contrib/pf/net
|
|
.PATH: ${.CURDIR}/../../contrib/pf/netinet
|
|
|
|
KMOD= pf
|
|
SRCS = pf.c pf_if.c pf_subr.c pf_osfp.c pf_ioctl.c pf_norm.c pf_table.c \
|
|
in4_cksum.c \
|
|
opt_pf.h opt_inet.h opt_inet6.h opt_bpf.h opt_mac.h
|
|
|
|
CFLAGS+= -I${.CURDIR}/../../contrib/pf
|
|
|
|
.if !defined(KERNBUILDDIR)
|
|
opt_inet.h:
|
|
echo "#define INET 1" > opt_inet.h
|
|
|
|
.if ${MK_INET6_SUPPORT} != "no"
|
|
opt_inet6.h:
|
|
echo "#define INET6 1" > opt_inet6.h
|
|
.endif
|
|
|
|
opt_bpf.h:
|
|
echo "#define DEV_BPF 1" > opt_bpf.h
|
|
.endif
|
|
|
|
.include <bsd.kmod.mk>
|