summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJozsef Kadlecsik <kadlec@blackhole.kfki.hu>2011-05-31 21:44:47 +0200
committerJozsef Kadlecsik <kadlec@blackhole.kfki.hu>2011-05-31 21:44:47 +0200
commit2c9f4abdfddd8d742d9fb8bb61b369704b647da1 (patch)
tree367fe71cca4a84d6f956e014f90cd3d3f040c333
parent3f83fda46c14e47392ce3bb4d7aef5780a80ac78 (diff)
ipset 6.7 releasedv6.7
-rw-r--r--ChangeLog11
-rw-r--r--configure.ac2
-rw-r--r--kernel/ChangeLog8
3 files changed, 20 insertions, 1 deletions
diff --git a/ChangeLog b/ChangeLog
index 4dec7c2..b7920da 100644
--- a/ChangeLog
+++ b/ChangeLog
@@ -1,3 +1,14 @@
+6.7
+ - Whitespace and coding fixes, detected by checkpatch.pl
+ - hash:net,iface type introduced
+ - hash:* tests may seem to fail due to the too wide grep pattern, fix them
+ - Remove iptree tests and compatibility element parsing
+ - hash:net test may seem to fail due to the too wide grep pattern, fix it
+ - Fix long time uncovered bug at adding string attributes to the netlink
+ messages
+ - Fix warnings reported by valgrind
+ - Remove supporting set types iptree and iptreemap
+
6.6
- Restore with bitmap:port and list:set types did not work, fixed
- Accept "\r\n" terminated COMMIT command in restore files
diff --git a/configure.ac b/configure.ac
index f454dd0..107ba02 100644
--- a/configure.ac
+++ b/configure.ac
@@ -1,5 +1,5 @@
dnl Boilerplate
-AC_INIT([ipset], [6.6], [kadlec@blackhole.kfki.hu])
+AC_INIT([ipset], [6.7], [kadlec@blackhole.kfki.hu])
AC_CANONICAL_HOST
AC_CONFIG_MACRO_DIR([m4])
AC_CONFIG_HEADER([config.h])
diff --git a/kernel/ChangeLog b/kernel/ChangeLog
index ed23d62..b74de49 100644
--- a/kernel/ChangeLog
+++ b/kernel/ChangeLog
@@ -1,3 +1,11 @@
+6.7
+ - Whitespace and coding fixes, detected by checkpatch.pl
+ - hash:net,iface type introduced
+ - Use the stored first cidr value instead of '1'
+ - Fix return code for destroy when sets are in use
+ - Add xt_action_param to the variant level kadt functions, ipset API change
+ - Drop supporting kernel versions below 2.6.35
+
6.6
- Use unified from/to address masking and check the usage
- ip_set_flush returned -EPROTO instead of -IPSET_ERR_PROTOCOL, fixed