head	1.37;
access;
symbols
	RELENG_8_4:1.37.0.2
	RELENG_9_1_0_RELEASE:1.33.2.3.4.2
	RELENG_9_1:1.33.2.3.0.4
	RELENG_9_1_BP:1.33.2.3
	RELENG_8_3_0_RELEASE:1.30.2.4.2.1
	RELENG_8_3:1.30.2.4.0.2
	RELENG_8_3_BP:1.30.2.4
	RELENG_9_0_0_RELEASE:1.33.2.3.2.1
	RELENG_9_0:1.33.2.3.0.2
	RELENG_9_0_BP:1.33.2.3
	RELENG_9:1.33.0.2
	RELENG_9_BP:1.33
	RELENG_7_4_0_RELEASE:1.26.12.1
	RELENG_8_2_0_RELEASE:1.30.2.2.4.1
	RELENG_7_4:1.26.0.12
	RELENG_7_4_BP:1.26
	RELENG_8_2:1.30.2.2.0.4
	RELENG_8_2_BP:1.30.2.2
	RELENG_8_1_0_RELEASE:1.30.2.2.2.1
	RELENG_8_1:1.30.2.2.0.2
	RELENG_8_1_BP:1.30.2.2
	RELENG_7_3_0_RELEASE:1.26.10.1
	RELENG_7_3:1.26.0.10
	RELENG_7_3_BP:1.26
	RELENG_8_0_0_RELEASE:1.30.2.1.2.1
	RELENG_8_0:1.30.2.1.0.2
	RELENG_8_0_BP:1.30.2.1
	RELENG_8:1.30.0.2
	RELENG_8_BP:1.30
	RELENG_7_2_0_RELEASE:1.26.8.1
	RELENG_7_2:1.26.0.8
	RELENG_7_2_BP:1.26
	RELENG_7_1_0_RELEASE:1.26.6.1
	RELENG_6_4_0_RELEASE:1.21.2.2.6.1
	RELENG_7_1:1.26.0.6
	RELENG_7_1_BP:1.26
	RELENG_6_4:1.21.2.2.0.6
	RELENG_6_4_BP:1.21.2.2
	RELENG_7_0_0_RELEASE:1.26
	RELENG_6_3_0_RELEASE:1.21.2.2
	RELENG_7_0:1.26.0.4
	RELENG_7_0_BP:1.26
	RELENG_6_3:1.21.2.2.0.4
	RELENG_6_3_BP:1.21.2.2
	RELENG_7:1.26.0.2
	RELENG_7_BP:1.26
	RELENG_6_2_0_RELEASE:1.21.2.2
	RELENG_6_2:1.21.2.2.0.2
	RELENG_6_2_BP:1.21.2.2
	RELENG_5_5_0_RELEASE:1.17
	RELENG_5_5:1.17.0.8
	RELENG_5_5_BP:1.17
	RELENG_6_1_0_RELEASE:1.21.2.1
	RELENG_6_1:1.21.2.1.0.2
	RELENG_6_1_BP:1.21.2.1
	RELENG_6_0_0_RELEASE:1.21
	RELENG_6_0:1.21.0.4
	RELENG_6_0_BP:1.21
	RELENG_6:1.21.0.2
	RELENG_6_BP:1.21
	RELENG_5_4_0_RELEASE:1.17
	RELENG_5_4:1.17.0.6
	RELENG_5_4_BP:1.17
	RELENG_4_11_0_RELEASE:1.11.2.1
	RELENG_4_11:1.11.2.1.0.8
	RELENG_4_11_BP:1.11.2.1
	RELENG_5_3_0_RELEASE:1.17
	RELENG_5_3:1.17.0.4
	RELENG_5_3_BP:1.17
	RELENG_5:1.17.0.2
	RELENG_5_BP:1.17
	RELENG_4_10_0_RELEASE:1.11.2.1
	RELENG_4_10:1.11.2.1.0.6
	RELENG_4_10_BP:1.11.2.1
	RELENG_5_2_1_RELEASE:1.16
	RELENG_5_2_0_RELEASE:1.16
	RELENG_5_2:1.16.0.6
	RELENG_5_2_BP:1.16
	RELENG_4_9_0_RELEASE:1.11.2.1
	RELENG_4_9:1.11.2.1.0.4
	RELENG_4_9_BP:1.11.2.1
	RELENG_5_1_0_RELEASE:1.16
	RELENG_5_1:1.16.0.4
	RELENG_5_1_BP:1.16
	RELENG_4_8_0_RELEASE:1.11.2.1
	RELENG_4_8:1.11.2.1.0.2
	RELENG_4_8_BP:1.11.2.1
	RELENG_5_0_0_RELEASE:1.16
	RELENG_5_0:1.16.0.2
	RELENG_5_0_BP:1.16
	RELENG_4_7_0_RELEASE:1.11
	RELENG_4_7:1.11.0.12
	RELENG_4_7_BP:1.11
	RELENG_4_6_2_RELEASE:1.11
	RELENG_4_6_1_RELEASE:1.11
	RELENG_4_6_0_RELEASE:1.11
	RELENG_4_6:1.11.0.10
	RELENG_4_6_BP:1.11
	RELENG_4_5_0_RELEASE:1.11
	RELENG_4_5:1.11.0.8
	RELENG_4_5_BP:1.11
	RELENG_4_4_0_RELEASE:1.11
	RELENG_4_4:1.11.0.6
	RELENG_4_4_BP:1.11
	KSE_MILESTONE_2:1.14
	KSE_PRE_MILESTONE_2:1.14
	RELENG_4_3_0_RELEASE:1.11
	RELENG_4_3:1.11.0.4
	RELENG_4_3_BP:1.11
	RELENG_4_2_0_RELEASE:1.11
	RELENG_4_1_1_RELEASE:1.11
	PRE_SMPNG:1.13
	RELENG_4_1_0_RELEASE:1.11
	RELENG_3_5_0_RELEASE:1.9.2.1
	RELENG_4_0_0_RELEASE:1.11
	RELENG_4:1.11.0.2
	RELENG_4_BP:1.11
	RELENG_3_4_0_RELEASE:1.9.2.1
	RELENG_3_3_0_RELEASE:1.9.2.1
	RELENG_3_2_PAO:1.9.0.4
	RELENG_3_2_PAO_BP:1.9
	RELENG_3_2_0_RELEASE:1.9
	POST_VFS_BIO_NFS_PATCH:1.10
	PRE_VFS_BIO_NFS_PATCH:1.10
	POST_SMP_VMSHARE:1.10
	PRE_SMP_VMSHARE:1.10
	POST_NEWBUS:1.9
	PRE_NEWBUS:1.9
	RELENG_3_1_0_RELEASE:1.9
	RELENG_3:1.9.0.2
	RELENG_3_BP:1.9
	RELENG_3_0_0_RELEASE:1.9
	old_RELENG_2_2_7_RELEASE:1.5.2.1
	old_RELENG_2_2_6_RELEASE:1.5.2.1
	old_RELENG_2_2_5_RELEASE:1.5
	old_RELENG_2_2_2_RELEASE:1.5
	old_RELENG_2_2_1_RELEASE:1.5
	old_RELENG_2_2_0_RELEASE:1.5
	old_RELENG_2_1_7_RELEASE:1.3.4.1
	old_RELENG_2_1_6_1_RELEASE:1.3.4.1
	old_RELENG_2_1_6_RELEASE:1.3.4.1
	old_RELENG_2_2:1.5.0.2
	old_RELENG_2_2_BP:1.5
	old_RELENG_2_1_5_RELEASE:1.3
	old_RELENG_2_1_0_RELEASE:1.3
	old_RELENG_2_1_0:1.3.0.4
	old_RELENG_2_1_0_BP:1.3
	old_RELENG_2_0_5_RELEASE:1.3
	old_RELENG_2_0_5:1.3.0.2
	old_RELENG_2_0_5_BP:1.3
	old_RELENG_2_0_5_ALPHA:1.2;
locks; strict;
comment	@# @;


1.37
date	2012.11.17.01.52.56;	author svnexp;	state Exp;
branches
	1.37.2.1;
next	1.36;

1.36
date	2012.09.14.11.51.49;	author glebius;	state Exp;
branches;
next	1.35;

1.35
date	2011.11.04.16.24.19;	author bz;	state Exp;
branches;
next	1.34;

1.34
date	2011.09.27.13.27.17;	author bz;	state Exp;
branches;
next	1.33;

1.33
date	2011.09.12.21.09.56;	author jhb;	state Exp;
branches
	1.33.2.1;
next	1.32;

1.32
date	2011.03.29.06.42.52;	author ae;	state Exp;
branches;
next	1.31;

1.31
date	2009.12.17.17.44.34;	author luigi;	state Exp;
branches;
next	1.30;

1.30
date	2009.06.08.19.57.35;	author bz;	state Exp;
branches
	1.30.2.1;
next	1.29;

1.29
date	2009.06.06.17.01.44;	author rwatson;	state Exp;
branches;
next	1.28;

1.28
date	2009.06.05.19.22.47;	author luigi;	state Exp;
branches;
next	1.27;

1.27
date	2008.12.02.21.37.28;	author bz;	state Exp;
branches;
next	1.26;

1.26
date	2007.07.03.12.46.06;	author mlaier;	state Exp;
branches
	1.26.2.1
	1.26.6.1
	1.26.8.1
	1.26.10.1
	1.26.12.1;
next	1.25;

1.25
date	2006.09.12.04.25.12;	author csjp;	state Exp;
branches;
next	1.24;

1.24
date	2006.03.17.18.54.37;	author ru;	state Exp;
branches;
next	1.23;

1.23
date	2005.11.29.19.39.04;	author ru;	state Exp;
branches;
next	1.22;

1.22
date	2005.11.29.17.56.11;	author ume;	state Exp;
branches;
next	1.21;

1.21
date	2004.10.25.20.02.33;	author andre;	state Exp;
branches
	1.21.2.1;
next	1.20;

1.20
date	2004.08.26.14.35.05;	author ru;	state Exp;
branches;
next	1.19;

1.19
date	2004.08.26.14.18.30;	author ru;	state Exp;
branches;
next	1.18;

1.18
date	2004.08.23.03.38.21;	author imp;	state Exp;
branches;
next	1.17;

1.17
date	2004.08.17.22.05.53;	author andre;	state Exp;
branches;
next	1.16;

1.16
date	2002.06.28.08.10.07;	author julian;	state Exp;
branches;
next	1.15;

1.15
date	2002.01.11.15.48.49;	author ru;	state Exp;
branches;
next	1.14;

1.14
date	2001.01.06.13.59.52;	author obrien;	state Exp;
branches;
next	1.13;

1.13
date	2000.05.27.01.13.50;	author peter;	state Exp;
branches;
next	1.12;

1.12
date	2000.05.04.12.07.33;	author peter;	state Exp;
branches;
next	1.11;

1.11
date	99.08.28.00.47.21;	author peter;	state Exp;
branches
	1.11.2.1;
next	1.10;

1.10
date	99.04.20.14.31.23;	author peter;	state Exp;
branches;
next	1.9;

1.9
date	98.10.16.04.30.46;	author peter;	state Exp;
branches
	1.9.2.1;
next	1.8;

1.8
date	97.09.10.04.19.07;	author peter;	state Exp;
branches;
next	1.7;

1.7
date	97.02.22.12.48.14;	author peter;	state Exp;
branches;
next	1.6;

1.6
date	97.01.14.06.22.02;	author jkh;	state Exp;
branches;
next	1.5;

1.5
date	96.06.23.14.27.52;	author bde;	state Exp;
branches
	1.5.2.1;
next	1.4;

1.4
date	96.02.24.13.41.56;	author phk;	state Exp;
branches;
next	1.3;

1.3
date	95.05.30.06.06.07;	author rgrimes;	state Exp;
branches
	1.3.4.1;
next	1.2;

1.2
date	95.01.12.13.57.51;	author ugen;	state Exp;
branches;
next	1.1;

1.1
date	95.01.12.13.03.01;	author ugen;	state Exp;
branches;
next	;

1.37.2.1
date	2012.11.17.01.52.56;	author svnexp;	state dead;
branches;
next	1.37.2.2;

1.37.2.2
date	2013.03.28.13.05.20;	author svnexp;	state Exp;
branches;
next	;

1.33.2.1
date	2011.09.23.00.51.37;	author kensmith;	state Exp;
branches;
next	1.33.2.2;

1.33.2.2
date	2011.10.04.11.02.48;	author bz;	state Exp;
branches;
next	1.33.2.3;

1.33.2.3
date	2011.11.06.17.31.57;	author bz;	state Exp;
branches
	1.33.2.3.2.1
	1.33.2.3.4.1;
next	1.33.2.4;

1.33.2.4
date	2012.11.17.11.37.17;	author svnexp;	state Exp;
branches;
next	1.33.2.5;

1.33.2.5
date	2012.11.22.12.16.37;	author svnexp;	state Exp;
branches;
next	;

1.33.2.3.2.1
date	2011.11.11.04.20.22;	author kensmith;	state Exp;
branches;
next	1.33.2.3.2.2;

1.33.2.3.2.2
date	2012.11.17.08.37.13;	author svnexp;	state Exp;
branches;
next	;

1.33.2.3.4.1
date	2012.08.05.23.54.33;	author kensmith;	state Exp;
branches;
next	1.33.2.3.4.2;

1.33.2.3.4.2
date	2012.11.17.08.48.04;	author svnexp;	state Exp;
branches;
next	;

1.30.2.1
date	2009.08.03.08.13.06;	author kensmith;	state Exp;
branches
	1.30.2.1.2.1;
next	1.30.2.2;

1.30.2.2
date	2010.03.24.15.11.10;	author luigi;	state Exp;
branches
	1.30.2.2.2.1
	1.30.2.2.4.1;
next	1.30.2.3;

1.30.2.3
date	2011.04.05.04.18.42;	author ae;	state Exp;
branches;
next	1.30.2.4;

1.30.2.4
date	2012.01.04.16.20.55;	author jhb;	state Exp;
branches
	1.30.2.4.2.1;
next	1.30.2.5;

1.30.2.5
date	2012.11.17.10.36.56;	author svnexp;	state Exp;
branches;
next	;

1.30.2.1.2.1
date	2009.10.25.01.10.29;	author kensmith;	state Exp;
branches;
next	;

1.30.2.2.2.1
date	2010.06.14.02.09.06;	author kensmith;	state Exp;
branches;
next	;

1.30.2.2.4.1
date	2010.12.21.17.09.25;	author kensmith;	state Exp;
branches;
next	;

1.30.2.4.2.1
date	2012.03.03.06.15.13;	author kensmith;	state Exp;
branches;
next	1.30.2.4.2.2;

1.30.2.4.2.2
date	2012.11.17.08.25.33;	author svnexp;	state Exp;
branches;
next	;

1.26.2.1
date	2012.11.17.08.06.49;	author svnexp;	state Exp;
branches;
next	;

1.26.6.1
date	2008.11.25.02.59.29;	author kensmith;	state Exp;
branches;
next	;

1.26.8.1
date	2009.04.15.03.14.26;	author kensmith;	state Exp;
branches;
next	;

1.26.10.1
date	2010.02.10.00.26.20;	author kensmith;	state Exp;
branches;
next	;

1.26.12.1
date	2010.12.21.17.10.29;	author kensmith;	state Exp;
branches;
next	1.26.12.2;

1.26.12.2
date	2012.11.17.08.17.27;	author svnexp;	state Exp;
branches;
next	;

1.21.2.1
date	2006.02.11.08.19.37;	author ume;	state Exp;
branches;
next	1.21.2.2;

1.21.2.2
date	2006.09.19.15.45.21;	author csjp;	state Exp;
branches
	1.21.2.2.6.1;
next	1.21.2.3;

1.21.2.3
date	2012.11.17.07.44.20;	author svnexp;	state Exp;
branches;
next	;

1.21.2.2.6.1
date	2008.10.02.02.57.24;	author kensmith;	state Exp;
branches;
next	;

1.11.2.1
date	2003.02.14.14.09.21;	author maxim;	state Exp;
branches;
next	1.11.2.2;

1.11.2.2
date	2012.11.17.07.26.31;	author svnexp;	state Exp;
branches;
next	;

1.9.2.1
date	99.08.29.16.27.20;	author peter;	state Exp;
branches;
next	;

1.5.2.1
date	98.03.06.05.26.59;	author jkh;	state Exp;
branches;
next	;

1.3.4.1
date	96.11.12.17.30.22;	author jkh;	state Exp;
branches;
next	;


desc
@@


1.37
log
@Switching exporter and resync
@
text
@# $FreeBSD: head/sys/modules/ipfw/Makefile 240494 2012-09-14 11:51:49Z glebius $

.include <bsd.own.mk>

.PATH: ${.CURDIR}/../../netpfil/ipfw

KMOD=	ipfw
SRCS=	ip_fw2.c ip_fw_pfil.c
SRCS+=	ip_fw_dynamic.c ip_fw_log.c
SRCS+=	ip_fw_sockopt.c ip_fw_table.c
SRCS+=	opt_inet.h opt_inet6.h opt_ipdivert.h opt_ipfw.h opt_ipsec.h

CFLAGS+= -DIPFIREWALL
#
#If you want it verbose
#CFLAGS+= -DIPFIREWALL_VERBOSE
#CFLAGS+= -DIPFIREWALL_VERBOSE_LIMIT=100
#
#If you want it to pass all packets by default
#CFLAGS+= -DIPFIREWALL_DEFAULT_TO_ACCEPT
#

.if !defined(KERNBUILDDIR)
.if ${MK_INET_SUPPORT} != "no"
opt_inet.h:
	echo "#define INET 1" > ${.TARGET}
.endif
.if ${MK_INET6_SUPPORT} != "no"
opt_inet6.h:
	echo "#define INET6 1" > ${.TARGET}
.endif
.endif

.include <bsd.kmod.mk>
@


1.37.2.1
log
@file Makefile was added on branch RELENG_8_4 on 2013-03-28 13:05:20 +0000
@
text
@d1 34
@


1.37.2.2
log
@## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/248810
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
@
text
@a0 35
# $FreeBSD: releng/8.4/sys/modules/ipfw/Makefile 229497 2012-01-04 16:20:55Z jhb $

.include <bsd.own.mk>

.PATH: ${.CURDIR}/../../netinet/ipfw

KMOD=	ipfw
SRCS=	ip_fw2.c ip_fw_pfil.c
SRCS+=	ip_fw_dynamic.c ip_fw_log.c
SRCS+=	ip_fw_sockopt.c ip_fw_table.c
SRCS+=	opt_inet.h opt_inet6.h opt_ipdivert.h opt_ipfw.h opt_ipsec.h

CFLAGS+= -DIPFIREWALL
CFLAGS+= -I${.CURDIR}/../../contrib/pf
#
#If you want it verbose
#CFLAGS+= -DIPFIREWALL_VERBOSE
#CFLAGS+= -DIPFIREWALL_VERBOSE_LIMIT=100
#
#If you want it to pass all packets by default
#CFLAGS+= -DIPFIREWALL_DEFAULT_TO_ACCEPT
#

.if !defined(KERNBUILDDIR)
.if ${MK_INET_SUPPORT} != "no"
opt_inet.h:
	echo "#define INET 1" > ${.TARGET}
.endif
.if ${MK_INET6_SUPPORT} != "no"
opt_inet6.h:
	echo "#define INET6 1" > ${.TARGET}
.endif
.endif

.include <bsd.kmod.mk>
@


1.36
log
@SVN rev 240494 on 2012-09-14 11:51:49Z by glebius

o Create directory sys/netpfil, where all packet filters should
  reside, and move there ipfw(4) and pf(4).

o Move most modified parts of pf out of contrib.

Actual movements:

sys/contrib/pf/net/*.c		-> sys/netpfil/pf/
sys/contrib/pf/net/*.h		-> sys/net/
contrib/pf/pfctl/*.c		-> sbin/pfctl
contrib/pf/pfctl/*.h		-> sbin/pfctl
contrib/pf/pfctl/pfctl.8	-> sbin/pfctl
contrib/pf/pfctl/*.4		-> share/man/man4
contrib/pf/pfctl/*.5		-> share/man/man5

sys/netinet/ipfw		-> sys/netpfil/ipfw

The arguable movement is pf/net/*.h -> sys/net. There are
future plans to refactor pf includes, so I decided not to
break things twice.

Not modified bits of pf left in contrib: authpf, ftp-proxy,
tftp-proxy, pflogd.

The ipfw(4) movement is planned to be merged to stable/9,
to make head and stable match.

Discussed with:		bz, luigi
@
text
@d1 1
a1 1
# $FreeBSD$
@


1.35
log
@SVN rev 227085 on 2011-11-04 16:24:19Z by bz

Always use the opt_*.h options for ipfw.ko, not just when
compiled into the kernel.
Do not try to build the module in case of no INET support but
keep #error calls for now in case we would compile it into the
kernel.

This should fix an issue where the module would fail to enable
IPv6 support from the rc framework, but also other INET and INET6
parts being silently compiled out without giving a warning in the
module case.

While here garbage collect unneeded opt_*.h includes.
opt_ipdn.h is not used anywhere but we need to leave the DUMMYNET
entry in options for conditional inclusion in kernel so keep the
file with the same name.

Reported by:	pluknet
Reviewed by:	plunket, jhb
MFC After:	3 days
@
text
@d5 1
a5 1
.PATH: ${.CURDIR}/../../netinet/ipfw
a13 1
CFLAGS+= -I${.CURDIR}/../../contrib/pf
@


1.34
log
@SVN rev 225793 on 2011-09-27 13:27:17Z by bz

Unbreak no-ip and no-inet6 module builds with ipfw.  For now continue to
build the ip_fw_pfil.c hooks and ipfw even in case of no-ip under the
assumption that the private L2 hook (which hopefully eventually will be a
pfil hook as well) can still be useful.

Allow building the module without inet as well.

Glanced at by:	jhb
MFC after:	3 days
@
text
@d11 1
a11 1
SRCS+=	opt_inet.h opt_inet6.h opt_ipfw.h opt_ipsec.h
@


1.33
log
@SVN rev 225518 on 2011-09-12 21:09:56Z by jhb

Allow the ipfw.ko module built with a kernel to honor any IPFIREWALL_*
options defined in the kernel config.  This more closely matches the
behavior of other modules which inherit configuration settings from the
kernel configuration during a kernel + modules build.

Reviewed by:	luigi
Approved by:	re (kib)
MFC after:	1 week
@
text
@d11 1
a11 1
SRCS+=	opt_inet6.h opt_ipfw.h opt_ipsec.h
d25 4
@


1.33.2.1
log
@SVN rev 225736 on 2011-09-23 00:51:37Z by kensmith

Copy head to stable/9 as part of 9.0-RELEASE release cycle.

Approved by:	re (implicit)
@
text
@@


1.33.2.2
log
@SVN rev 225965 on 2011-10-04 11:02:48Z by bz

MFC r225793:

 Unbreak no-ip and no-inet6 module builds with ipfw.  For now continue to
 build the ip_fw_pfil.c hooks and ipfw even in case of no-ip under the
 assumption that the private L2 hook (which hopefully eventually will be a
 pfil hook as well) can still be useful.

 Allow building the module without inet as well.

Approved by:	re (kib)
@
text
@d11 1
a11 1
SRCS+=	opt_inet.h opt_inet6.h opt_ipfw.h opt_ipsec.h
a24 4
.if ${MK_INET_SUPPORT} != "no"
opt_inet.h:
	echo "#define INET 1" > ${.TARGET}
.endif
@


1.33.2.3
log
@SVN rev 227232 on 2011-11-06 17:31:57Z by bz

MFC r227085:

  Always use the opt_*.h options for ipfw.ko, not just when
  compiled into the kernel.
  Do not try to build the module in case of no INET support but
  keep #error calls for now in case we would compile it into the
  kernel.

  This should fix an issue where the module would fail to enable
  IPv6 support from the rc framework, but also other INET and INET6
  parts being silently compiled out without giving a warning in the
  module case.

  While here garbage collect unneeded opt_*.h includes.
  opt_ipdn.h is not used anywhere but we need to leave the DUMMYNET
  entry in options for conditional inclusion in kernel so keep the
  file with the same name.

  Reported by:  pluknet
  Reviewed by:  plunket, jhb

Approved by:	re (kib)
@
text
@d11 1
a11 1
SRCS+=	opt_inet.h opt_inet6.h opt_ipdivert.h opt_ipfw.h opt_ipsec.h
@


1.33.2.4
log
@## SVN ##
## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/ 242902
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
## SVN ##
## SVN ## ------------------------------------------------------------------------
## SVN ## r242902 | dteske | 2012-11-11 23:29:45 +0000 (Sun, 11 Nov 2012) | 10 lines
## SVN ##
## SVN ## Fix a regression introduced by SVN r211417 that saw the breakage of a feature
## SVN ## documented in usr.sbin/sysinstall/help/shortcuts.hlp (reproduced below):
## SVN ##
## SVN ## If /usr/sbin/sysinstall is linked to another filename, say
## SVN ## `/usr/local/bin/configPackages', then the basename will be used
## SVN ## as an implicit command name.
## SVN ##
## SVN ## Reviewed by:	adrian (co-mentor)
## SVN ## Approved by:	adrian (co-mentor)
## SVN ##
## SVN ## ------------------------------------------------------------------------
## SVN ##
@
text
@d1 1
a1 1
# $FreeBSD: stable/9/sys/modules/ipfw/Makefile 227232 2011-11-06 17:31:57Z bz $
@


1.33.2.5
log
@## SVN ##
## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/ 243401
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
## SVN ##
## SVN ## ------------------------------------------------------------------------
## SVN ## r243401 | glebius | 2012-11-22 12:11:32 +0000 (Thu, 22 Nov 2012) | 3 lines
## SVN ##
## SVN ##   Partially merge r240494, which moved netinet/ipfw to netpfil/ipfw,
## SVN ## to make it easier to merge ipfw commits back to stable/9.
## SVN ##
## SVN ## ------------------------------------------------------------------------
## SVN ##
@
text
@d1 1
a1 1
# $FreeBSD: stable/9/sys/modules/ipfw/Makefile 243401 2012-11-22 12:11:32Z glebius $
d5 1
a5 1
.PATH: ${.CURDIR}/../../netpfil/ipfw
@


1.33.2.3.4.1
log
@SVN rev 239080 on 2012-08-05 23:54:33Z by kensmith

Copy stable/9 to releng/9.1 as part of the 9.1-RELEASE release process.

Approved by:	re (implicit)
@
text
@@


1.33.2.3.4.2
log
@Switch importer
@
text
@d1 1
a1 1
# $FreeBSD: releng/9.1/sys/modules/ipfw/Makefile 227232 2011-11-06 17:31:57Z bz $
@


1.33.2.3.2.1
log
@SVN rev 227445 on 2011-11-11 04:20:22Z by kensmith

Copy stable/9 to releng/9.0 as part of the FreeBSD 9.0-RELEASE release
cycle.

Approved by:	re (implicit)
@
text
@@


1.33.2.3.2.2
log
@Switch importer
@
text
@d1 1
a1 1
# $FreeBSD: releng/9.0/sys/modules/ipfw/Makefile 227232 2011-11-06 17:31:57Z bz $
@


1.32
log
@SVN rev 220124 on 2011-03-29 06:42:52Z by ae

Do not build ip_fw_nat.c for ipfw.ko. It can be build as separate module.

MFC after:	1 week
@
text
@d11 1
a11 1
SRCS+=	opt_inet6.h opt_ipsec.h
@


1.31
log
@SVN rev 200636 on 2009-12-17 17:44:34Z by luigi

Now that ipfw is split into multiple files, we need
to list them all in the Makefile for the module,
otherwise it won't load due to missing symbols.

The problem only affected head with ipfw built as a module.

Reported by David Horn
@
text
@d9 1
a9 1
SRCS+=	ip_fw_dynamic.c ip_fw_log.c ip_fw_nat.c
@


1.30
log
@SVN rev 193744 on 2009-06-08 19:57:35Z by bz

After r193232 rt_tables in vnet.h are no longer indirectly dependent on
the ROUTETABLES kernel option thus there is no need to include opt_route.h
anymore in all consumers of vnet.h and no longer depend on it for module
builds.

Remove the hidden include in flowtable.h as well and leave the two
explicit #includes in ip_input.c and ip_output.c.
@
text
@d9 2
@


1.30.2.1
log
@SVN rev 196045 on 2009-08-03 08:13:06Z by kensmith

Copy head to stable/8 as part of 8.0 Release cycle.

Approved by:	re (Implicit)
@
text
@@


1.30.2.2
log
@SVN rev 205600 on 2010-03-24 15:11:10Z by luigi

MFC r200636, list all files needed to build the ipfw module

Submitted by:	Alexander Wittig
@
text
@a8 2
SRCS+=	ip_fw_dynamic.c ip_fw_log.c ip_fw_nat.c
SRCS+=	ip_fw_sockopt.c ip_fw_table.c
@


1.30.2.3
log
@SVN rev 220352 on 2011-04-05 04:18:42Z by ae

MFC r220124:
  Do not build ip_fw_nat.c for ipfw.ko. It can be build as separate module.
@
text
@d9 1
a9 1
SRCS+=	ip_fw_dynamic.c ip_fw_log.c
@


1.30.2.4
log
@SVN rev 229497 on 2012-01-04 16:20:55Z by jhb

MFC 225518,225793,227085:
Allow the ipfw.ko module built with a kernel to honor any options defined
in the kernel config.  This more closely matches the behavior of other
modules which inherit configuration settings from the kernel configuration
during a kernel + modules build.

Do not try to build the module in case of no INET support but keep #error
calls for now in case we would compile it into the kernel.

While here garbage collect unneeded opt_*.h includes.
opt_ipdn.h is not used anywhere but we need to leave the DUMMYNET
entry in options for conditional inclusion in kernel so keep the
file with the same name.
@
text
@d11 1
a11 1
SRCS+=	opt_inet.h opt_inet6.h opt_ipdivert.h opt_ipfw.h opt_ipsec.h
a24 4
.if ${MK_INET_SUPPORT} != "no"
opt_inet.h:
	echo "#define INET 1" > ${.TARGET}
.endif
@


1.30.2.5
log
@## SVN ##
## SVN ## Exported commit - http://svnweb.freebsd.org/changeset/base/ 242909
## SVN ## CVS IS DEPRECATED: http://wiki.freebsd.org/CvsIsDeprecated
## SVN ##
## SVN ## ------------------------------------------------------------------------
## SVN ## r242909 | dim | 2012-11-12 07:47:19 +0000 (Mon, 12 Nov 2012) | 20 lines
## SVN ##
## SVN ## MFC r242625:
## SVN ##
## SVN ## Remove duplicate const specifiers in many drivers (I hope I got all of
## SVN ## them, please let me know if not).  Most of these are of the form:
## SVN ##
## SVN ## static const struct bzzt_type {
## SVN ##       [...list of members...]
## SVN ## } const bzzt_devs[] = {
## SVN ##       [...list of initializers...]
## SVN ## };
## SVN ##
## SVN ## The second const is unnecessary, as arrays cannot be modified anyway,
## SVN ## and if the elements are const, the whole thing is const automatically
## SVN ## (e.g. it is placed in .rodata).
## SVN ##
## SVN ## I have verified this does not change the binary output of a full kernel
## SVN ## build (except for build timestamps embedded in the object files).
## SVN ##
## SVN ## Reviewed by:	yongari, marius
## SVN ##
## SVN ## ------------------------------------------------------------------------
## SVN ##
@
text
@d1 1
a1 1
# $FreeBSD: stable/8/sys/modules/ipfw/Makefile 229497 2012-01-04 16:20:55Z jhb $
@


1.30.2.4.2.1
log
@SVN rev 232438 on 2012-03-03 06:15:13Z by kensmith

Copy stable/8 to releng/8.3 as part of 8.3-RELEASE release cycle.

Approved by:	re (implicit)
@
text
@@


1.30.2.4.2.2
log
@Switch importer
@
text
@d1 1
a1 1
# $FreeBSD: releng/8.3/sys/modules/ipfw/Makefile 229497 2012-01-04 16:20:55Z jhb $
@


1.30.2.2.4.1
log
@SVN rev 216617 on 2010-12-21 17:09:25Z by kensmith

Copy stable/8 to releng/8.2 in preparation for FreeBSD-8.2 release.

Approved by:	re (implicit)
@
text
@@


1.30.2.2.2.1
log
@SVN rev 209145 on 2010-06-14 02:09:06Z by kensmith

Copy stable/8 to releng/8.1 in preparation for 8.1-RC1.

Approved by:	re (implicit)
@
text
@@


1.30.2.1.2.1
log
@SVN rev 198460 on 2009-10-25 01:10:29Z by kensmith

Copy stable/8 to releng/8.0 as part of 8.0-RELEASE release procedure.

Approved by:	re (implicit)
@
text
@@


1.29
log
@SVN rev 193588 on 2009-06-06 17:01:44Z by rwatson

Remove opt_mac.h generation for various kernel modules that no longer
require it.

Submitted by:	pjd
@
text
@d9 1
a9 1
SRCS+=	opt_inet6.h opt_ipsec.h opt_route.h
@


1.28
log
@SVN rev 193532 on 2009-06-05 19:22:47Z by luigi

move kernel ipfw-related sources to a separate directory,
adjust conf/files and modules' Makefiles accordingly.

No code or ABI changes so this and most of previous related
changes can be easily MFC'ed

MFC after:	5 days
@
text
@d9 1
a9 1
SRCS+=	opt_inet6.h opt_ipsec.h opt_mac.h opt_route.h
@


1.27
log
@SVN rev 185571 on 2008-12-02 21:37:28Z by bz

Rather than using hidden includes (with cicular dependencies),
directly include only the header files needed. This reduces the
unneeded spamming of various headers into lots of files.

For now, this leaves us with very few modules including vnet.h
and thus needing to depend on opt_route.h.

Reviewed by:	brooks, gnn, des, zec, imp
Sponsored by:	The FreeBSD Foundation
@
text
@d5 1
a5 1
.PATH: ${.CURDIR}/../../netinet
@


1.26
log
@Link pf 4.1 to the build:
 - move ftp-proxy from libexec to usr.sbin
 - add tftp-proxy
 - new altq mtag link

Approved by:	re (kensmith)
@
text
@d9 1
a9 1
SRCS+=	opt_inet6.h opt_ipsec.h opt_mac.h
@


1.26.2.1
log
@Switch importer
@
text
@d1 1
a1 1
# $FreeBSD: stable/7/sys/modules/ipfw/Makefile 171173 2007-07-03 12:46:08Z mlaier $
@


1.26.12.1
log
@SVN rev 216618 on 2010-12-21 17:10:29Z by kensmith

Copy stable/7 to releng/7.4 in preparation for FreeBSD-7.4 release.

Approved by:	re (implicit)
@
text
@@


1.26.12.2
log
@Switch importer
@
text
@d1 1
a1 1
# $FreeBSD: releng/7.4/sys/modules/ipfw/Makefile 171173 2007-07-03 12:46:08Z mlaier $
@


1.26.10.1
log
@SVN rev 203736 on 2010-02-10 00:26:20Z by kensmith

Copy stable/7 to releng/7.3 as part of the 7.3-RELEASE process.

Approved by:	re (implicit)
@
text
@@


1.26.8.1
log
@SVN rev 191087 on 2009-04-15 03:14:26Z by kensmith

Create releng/7.2 from stable/7 in preparation for 7.2-RELEASE.

Approved by:	re (implicit)
@
text
@@


1.26.6.1
log
@SVN rev 185281 on 2008-11-25 02:59:29Z by kensmith

Create releng/7.1 in preparation for moving into RC phase of 7.1 release
cycle.

Approved by:	re (implicit)
@
text
@@


1.25
log
@Introduce a new entry point, mac_create_mbuf_from_firewall. This entry point
exists to allow the mandatory access control policy to properly initialize
mbufs generated by the firewall. An example where this might happen is keep
alive packets, or ICMP error packets in response to other packets.

This takes care of kernel panics associated with un-initialize mbuf labels
when the firewall generates packets.

[1] I modified this patch from it's original version, the initial patch
    introduced a number of entry points which were programmatically
    equivalent. So I introduced only one. Instead, we should leverage
    mac_create_mbuf_netlayer() which is used for similar situations,
    an example being icmp_error()

    This will minimize the impact associated with the MFC

Submitted by:	mlaier [1]
MFC after:	1 week

This is a RELENG_6 candidate
@
text
@d12 1
@


1.24
log
@Reimplementation of world/kernel build options.  For details, see:

http://lists.freebsd.org/pipermail/freebsd-current/2006-March/061725.html

The src.conf(5) manpage is to follow in a few days.

Brought to you by:	imp, jhb, kris, phk, ru (all bugs are mine)
@
text
@d9 1
a9 1
SRCS+=	opt_inet6.h opt_ipsec.h
@


1.23
log
@Let kmod.mk create empty opt_*.h files.
@
text
@d3 2
d22 1
a22 1
.if !defined(NO_INET6)
@


1.22
log
@obey opt_inet6.h and opt_ipsec.h in kernel build directory.

Requested by:	hrs
@
text
@d20 1
a20 4
.if defined(NO_INET6)
opt_inet6.h:
	cat /dev/null > ${.TARGET}
.else
a23 3

opt_ipsec.h:
	cat /dev/null > ${.TARGET}
@


1.21
log
@IPDIVERT is a module now and tell the other parts of the kernel about it.
IPDIVERT depends on IPFIREWALL being loaded or compiled into the kernel.
@
text
@d7 1
d19 13
@


1.21.2.1
log
@MFC: obey opt_inet6.h and opt_ipsec.h in kernel build directory.

	src/sys/modules/ipfw/Makefile:	1.22, 1.23
	src/sys/netinet/ip_fw2.c:	1.117
	src/sys/netinet/ip_fw_pfil.c:	1.20

Approved by:	re (scottl)
@
text
@a6 1
SRCS+=	opt_inet6.h opt_ipsec.h
a17 7
.if !defined(KERNBUILDDIR)
.if !defined(NO_INET6)
opt_inet6.h:
	echo "#define INET6 1" > ${.TARGET}
.endif
.endif

@


1.21.2.2
log
@MFC the firewall labeling changes.

This fixes kernel panics which occur when the firewall sends out a packet.
This can happen for keep alives, or instances when the firewall is
configured to return RST or ICMP unreach packets. These panics occured
only if MLS, BIBA or LOMAC security policies were loaded.

Approved by:	re@@ (kensmith)
Submitted by:	mlaier (with changes)
@
text
@d7 1
a7 1
SRCS+=	opt_inet6.h opt_ipsec.h opt_mac.h
@


1.21.2.3
log
@Switch importer
@
text
@d1 1
a1 1
# $FreeBSD: stable/6/sys/modules/ipfw/Makefile 162448 2006-09-19 15:45:22Z csjp $
@


1.21.2.2.6.1
log
@SVN rev 183531 on 2008-10-02 02:57:24Z by kensmith

Create releng/6.4 from stable/6 in preparation for 6.4-RC1.

Approved by:	re (implicit)
@
text
@@


1.20
log
@Document how a standalone module can be built with divert(4) support.
@
text
@a16 4
#If you want it with divert(4) support (kernel must be compiled
#with "options IPDIVERT" for this to work)
#CFLAGS+= -DIPDIVERT
#
@


1.19
log
@Revert the last change to sys/modules/ipfw/Makefile and fix a
standalone module build in a better way.

Silence from:	andre
MFC after:	3 days
@
text
@d17 4
@


1.18
log
@Make this compile again in the standalone and the MODULES_WITH_WORLD
environments.  Chances are good that this doesn't produce a good
module, but I leave the proper defaults to the dummy opt_* files to
the author.
@
text
@d6 1
a6 3
SRCS=	ip_fw2.c ip_fw_pfil.c \
	opt_inet.h opt_ipfw.h opt_ipdn.h opt_ipdivert.h opt_ipsec.h \
	opt_pfil_hooks.h
a16 2
opt_inet.h:
	echo "#define INET 1" > opt_inet.h
@


1.17
log
@Convert ipfw to use PFIL_HOOKS.  This is change is transparent to userland
and preserves the ipfw ABI.  The ipfw core packet inspection and filtering
functions have not been changed, only how ipfw is invoked is different.

However there are many changes how ipfw is and its add-on's are handled:

 In general ipfw is now called through the PFIL_HOOKS and most associated
 magic, that was in ip_input() or ip_output() previously, is now done in
 ipfw_check_[in|out]() in the ipfw PFIL handler.

 IPDIVERT is entirely handled within the ipfw PFIL handlers.  A packet to
 be diverted is checked if it is fragmented, if yes, ip_reass() gets in for
 reassembly.  If not, or all fragments arrived and the packet is complete,
 divert_packet is called directly.  For 'tee' no reassembly attempt is made
 and a copy of the packet is sent to the divert socket unmodified.  The
 original packet continues its way through ip_input/output().

 ipfw 'forward' is done via m_tag's.  The ipfw PFIL handlers tag the packet
 with the new destination sockaddr_in.  A check if the new destination is a
 local IP address is made and the m_flags are set appropriately.  ip_input()
 and ip_output() have some more work to do here.  For ip_input() the m_flags
 are checked and a packet for us is directly sent to the 'ours' section for
 further processing.  Destination changes on the input path are only tagged
 and the 'srcrt' flag to ip_forward() is set to disable destination checks
 and ICMP replies at this stage.  The tag is going to be handled on output.
 ip_output() again checks for m_flags and the 'ours' tag.  If found, the
 packet will be dropped back to the IP netisr where it is going to be picked
 up by ip_input() again and the directly sent to the 'ours' section.  When
 only the destination changes, the route's 'dst' is overwritten with the
 new destination from the forward m_tag.  Then it jumps back at the route
 lookup again and skips the firewall check because it has been marked with
 M_SKIP_FIREWALL.  ipfw 'forward' has to be compiled into the kernel with
 'option IPFIREWALL_FORWARD' to enable it.

 DUMMYNET is entirely handled within the ipfw PFIL handlers.  A packet for
 a dummynet pipe or queue is directly sent to dummynet_io().  Dummynet will
 then inject it back into ip_input/ip_output() after it has served its time.
 Dummynet packets are tagged and will continue from the next rule when they
 hit the ipfw PFIL handlers again after re-injection.

 BRIDGING and IPFW_ETHER are not changed yet and use ipfw_chk() directly as
 they did before.  Later this will be changed to dedicated ETHER PFIL_HOOKS.

More detailed changes to the code:

 conf/files
	Add netinet/ip_fw_pfil.c.

 conf/options
	Add IPFIREWALL_FORWARD option.

 modules/ipfw/Makefile
	Add ip_fw_pfil.c.

 net/bridge.c
	Disable PFIL_HOOKS if ipfw for bridging is active.  Bridging ipfw
	is still directly invoked to handle layer2 headers and packets would
	get a double ipfw when run through PFIL_HOOKS as well.

 netinet/ip_divert.c
	Removed divert_clone() function.  It is no longer used.

 netinet/ip_dummynet.[ch]
	Neither the route 'ro' nor the destination 'dst' need to be stored
	while in dummynet transit.  Structure members and associated macros
	are removed.

 netinet/ip_fastfwd.c
	Removed all direct ipfw handling code and replace it with the new
	'ipfw forward' handling code.

 netinet/ip_fw.h
	Removed 'ro' and 'dst' from struct ip_fw_args.

 netinet/ip_fw2.c
	(Re)moved some global variables and the module handling.

 netinet/ip_fw_pfil.c
	New file containing the ipfw PFIL handlers and module initialization.

 netinet/ip_input.c
	Removed all direct ipfw handling code and replace it with the new
	'ipfw forward' handling code.  ip_forward() does not longer require
	the 'next_hop' struct sockaddr_in argument.  Disable early checks
	if 'srcrt' is set.

 netinet/ip_output.c
	Removed all direct ipfw handling code and replace it with the new
	'ipfw forward' handling code.

 netinet/ip_var.h
	Add ip_reass() as general function.  (Used from ipfw PFIL handlers
	for IPDIVERT.)

 netinet/raw_ip.c
	Directly check if ipfw and dummynet control pointers are active.

 netinet/tcp_input.c
	Rework the 'ipfw forward' to local code to work with the new way of
	forward tags.

 netinet/tcp_sack.c
	Remove include 'opt_ipfw.h' which is not needed here.

 sys/mbuf.h
	Remove m_claim_next() macro which was exclusively for ipfw 'forward'
	and is no longer needed.

Approved by:	re (scottl)
@
text
@d6 3
a8 1
SRCS=	ip_fw2.c ip_fw_pfil.c
d19 2
@


1.16
log
@bring Makefile up to date with new ipfw

Submitted by:	luigi
@
text
@d6 1
a6 1
SRCS=	ip_fw2.c
@


1.15
log
@Drop <bsd.man.mk> support from <bsd.kmod.mk>.

Not objected to by:	-current
@
text
@d6 1
a6 1
SRCS=	ip_fw.c
@


1.14
log
@Use a consistent style and one much closer to the rest of /usr/src
@
text
@d1 1
a1 1
# $FreeBSD: src/sys/modules/ipfw/Makefile,v 1.13 2000/05/27 01:13:50 peter Exp $
a6 1
NOMAN=
@


1.13
log
@Use .include <bsd.kmod.mk> to get to ../../*/conf/kmod.mk instead of
encoding the relative path.
@
text
@d1 3
a3 1
# $FreeBSD: src/sys/modules/ipfw/Makefile,v 1.12 2000/05/04 12:07:33 peter Exp $
a4 1
.PATH:	${.CURDIR}/../../netinet
d8 1
@


1.12
log
@Pull in sys/conf/kmod.mk, rather than /usr/share/mk/bsd.kmod.mk.
This means that the kernel can be totally self contained now and is not
dependent on the last buildworld to update /usr/share/mk.  This might
also make it easier to build 5.x kernels on 4.0 boxes etc, assuming
gensetdefs and config(8) are updated.
@
text
@d1 1
a1 1
# $FreeBSD: src/sys/modules/ipfw/Makefile,v 1.11 1999/08/28 00:47:21 peter Exp $
d17 1
a17 1
.include "${.CURDIR}/../../conf/kmod.mk"
@


1.11
log
@$Id$ -> $FreeBSD$
@
text
@d1 1
a1 1
# $FreeBSD$
d17 1
a17 1
.include <bsd.kmod.mk>
@


1.11.2.1
log
@o Respect IPFW2 compile time flag, build ipfw2 kld module as well.

PR:		kern/46494
Submitted by:	Oleg Koreshkov <okoreshkov@@salut.ru>
Reviewed by:	luigi
@
text
@d5 1
a7 6
.if defined(IPFW2)
SRCS=	ip_fw2.c
CFLAGS+= -DIPFW2
.else
SRCS=	ip_fw.c
.endif
@


1.11.2.2
log
@Switch importer
@
text
@d1 1
a1 1
# $FreeBSD: stable/4/sys/modules/ipfw/Makefile 110866 2003-02-14 14:09:21Z maxim $
@


1.10
log
@No need to use a magic IPFIREWALL_MODULE - the build system supplies
one already we can test for.
@
text
@d1 1
a1 1
#	$Id: Makefile,v 1.9 1998/10/16 04:30:46 peter Exp $
@


1.9
log
@Sample initial set of kld-ified modules.  Not all have been completely
converted yet.  These are more of a starting point.  This is NOT connected
to the parent Makefile.

OK'ed by jkh (who is ever so patiently waiting)
@
text
@d1 1
a1 1
#	$Id: Makefile,v 1.8 1997/09/10 04:19:07 peter Exp $
d7 1
a7 1
CFLAGS+= -DIPFIREWALL -DIPFIREWALL_MODULE
@


1.9.2.1
log
@$Id$ -> $FreeBSD$
@
text
@d1 1
a1 1
# $FreeBSD$
@


1.8
log
@Add example for IPFIREWALL_DEFAULT_TO_ACCEPT
@
text
@d1 1
a1 1
#	$Id: Makefile,v 1.7 1997/02/22 12:48:14 peter Exp $
d3 2
a4 2
.PATH:	${.CURDIR}/../../sys/netinet
KMOD=	ipfw_mod
@


1.7
log
@Revert $FreeBSD$ back to $Id$
@
text
@d1 1
a1 1
#	$Id$
d12 3
@


1.6
log
@Make the long-awaited change from $Id$ to $FreeBSD$

This will make a number of things easier in the future, as well as (finally!)
avoiding the Id-smashing problem which has plagued developers for so long.

Boy, I'm glad we're not using sup anymore.  This update would have been
insane otherwise.
@
text
@d1 1
a1 1
#	$FreeBSD$
@


1.5
log
@Use IPFIREWALL_MODULE instead of ACTUALLY_LKM_NOT_KERNEL to indicate
LKM'ness.  ACTUALLY_LKM_NOT_KERNEL is supposed to be so ugly that it
only gets used until <machine/conf.h> goes away.  bsd.kmod.mk should
define a better-named general macro for this.  Some places use
PSEUDO_LKM.  This is another bad name.

Makefile:
Added IPFIREWALL_VERBOSE_LIMIT option (commented out).
@
text
@d1 1
a1 1
#	$Id: Makefile,v 1.4 1996/02/24 13:41:56 phk Exp $
@


1.5.2.1
log
@MFC: primarily do-nothing commits just to facilitate future merging.
@
text
@d1 1
a1 1
#	$Id: Makefile,v 1.5 1996/06/23 14:27:52 bde Exp $
a11 3
#
#If you want it to pass all packets by default
#CFLAGS+= -DIPFIREWALL_DEFAULT_TO_ACCEPT
@


1.4
log
@Make the ipfw LKM work again.
This concludes this round of updates to ipfw, have at it!
@
text
@d1 1
a1 1
#	$Id: Makefile,v 1.3 1995/05/30 06:06:07 rgrimes Exp $
d7 1
a7 1
CFLAGS+= -DIPFIREWALL
d11 1
@


1.3
log
@Remove trailing whitespace.
@
text
@d1 1
a1 1
#	$Id: Makefile,v 1.2 1995/01/12 13:57:51 ugen Exp $
d5 1
a5 1
SRCS=	ipfw_lkm.c ip_fw.c
d7 1
a7 1
CFLAGS+= -DIPFIREWALL  -DIPACCT
@


1.3.4.1
log
@Fix the ipfw LKM.
Submitted-By: jc@@irbs.com (John Capo)
@
text
@d1 1
a1 1
#	$Id: Makefile,v 1.3 1995/05/30 06:06:07 rgrimes Exp $
d5 1
a5 1
SRCS=	ip_fw.c
d7 1
a7 1
CFLAGS+= -DACTUALLY_LKM_NOT_KERNEL -DIPFIREWALL  -DIPACCT 
@


1.2
log
@Checking new lkm structure..
@
text
@d1 1
a1 1
#	$Id: Makefile,v 1.1 1995/01/12 13:03:01 ugen Exp $
d5 1
a5 1
SRCS=	ipfw_lkm.c ip_fw.c 
@


1.1
log
@Firewall can be used as lkm module.To use it
firewall should *NOT* be compiled into kernel.
Then it can  be loaded.This is misc module but i'v
got no problemms with it,so shouldn't you i suppose..
BTW this is very stupid to have one module in CVS
for ALL lkm's...
@
text
@d1 1
a1 1
#	$Id: Makefile,v 1.1 1994/09/21 23:27:09 wollman Exp $
d9 1
a9 1
# If you want it verbose
@
