summaryrefslogtreecommitdiffstats
path: root/configure.ac
Commit message (Collapse)AuthorAgeFilesLines
* Add compatibility to support kvcalloc()Jozsef Kadlecsik2018-09-241-0/+10
|
* Add compatibility to support is_zero_ether_addr()Jozsef Kadlecsik2018-08-301-0/+10
|
* ipset 6.38 releasedv6.38Jozsef Kadlecsik2018-04-101-1/+1
|
* ipset 6.37 releasedv6.37Jozsef Kadlecsik2018-04-101-1/+1
|
* ipset 6.36 releasedv6.36Jozsef Kadlecsik2018-03-031-1/+1
|
* ipset 6.35 releasedv6.35Jozsef Kadlecsik2018-01-061-1/+1
|
* Backport patch: netfilter: ipset: use nfnl_mutex_is_lockedJozsef Kadlecsik2018-01-041-0/+10
|
* Backport patch: netfilter: ipset: Convert timers to use timer_setup()Jozsef Kadlecsik2018-01-031-0/+10
|
* ipset 6.34 releasedv6.34Jozsef Kadlecsik2017-09-231-1/+1
|
* ipset 6.33 releasedv6.33Jozsef Kadlecsik2017-09-121-1/+1
|
* Backport patch: sctp: remove the typedef sctp_sctphdr_tJozsef Kadlecsik2017-09-111-0/+10
|
* Backport patch: netfilter: nfnetlink: extended ACK reportingJozsef Kadlecsik2017-09-111-2/+12
|
* Backport patch: netlink: pass extended ACK struct to parsing functionsJozsef Kadlecsik2017-09-111-0/+10
|
* Backport patch netlink: extended ACK reportingJozsef Kadlecsik2017-09-111-0/+10
|
* Backport nfnl_msg_type()Jozsef Kadlecsik2017-09-111-0/+10
|
* Compatibility: handle changes in 4.10 kernel treeJozsef Kadlecsik2017-03-231-0/+31
| | | | | Handle changes in struct xt_action_param and the new xt_family(), xt_net() interfaces (reported by Jan Engelhardt).
* ipset 6.32 releasedv6.32Jozsef Kadlecsik2017-03-121-1/+1
|
* ipset 6.31 releasedv6.31Jozsef Kadlecsik2017-02-191-1/+1
|
* ipset 6.30 releasedv6.30Jozsef Kadlecsik2016-10-171-1/+1
|
* ipset: Fix the incorrect dynamic/static modules listNeutron Soutmun2016-10-171-2/+2
| | | | | | | | | | * The module's name should not be partial matched. SETTYPE_MODLIST="ipset_hash_ipmac" It shoud not be matched with "ipset_hash_ip". Signed-off-by: Neutron Soutmun <neo.neutron@gmail.com> Signed-off-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
* netfilter: x_tables: Pass struct net in xt_action_paramEric W. Biederman2016-10-111-0/+11
| | | | | | | | | | | As xt_action_param lives on the stack this does not bloat any persistent data structures. This is a first step in making netfilter code that needs to know which network namespace it is executing in simpler. Signed-off-by: "Eric W. Biederman" <ebiederm@xmission.com> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
* net: sched: fix skb->protocol use in case of accelerated vlan pathJiri Pirko2016-10-111-0/+10
| | | | | | | | | | | | | | tc code implicitly considers skb->protocol even in case of accelerated vlan paths and expects vlan protocol type here. However, on rx path, if the vlan header was already stripped, skb->protocol contains value of next header. Similar situation is on tx path. So for skbs that use skb->vlan_tci for tagging, use skb->vlan_proto instead. Reported-by: Jamal Hadi Salim <jhs@mojatatu.com> Signed-off-by: Jiri Pirko <jiri@resnulli.us> Acked-by: Jamal Hadi Salim <jhs@mojatatu.com> Signed-off-by: David S. Miller <davem@davemloft.net>
* ipset: Backports for the nla_put_net64() API changesNeutron Soutmun2016-06-281-0/+10
| | | | | | | | | | | | | | | | | | | * Backports the patch "libnl: nla_put_net64():align on a 64-bit area" [1] by Nicolas Dichtel <nicolas.dichtel@6wind.com> * Since the nla_put_net64() API has been changed, therefore, the ip_set_compat.h.in should provides the macro IPSET_NLA_PUT_NET64 that point to the nla_put_net64() with appropriate number of arguments. The build script should distinguish the API changes by detect for the existence of nla_put_64bit() function in include/net/netlink.h. This function was added in the same patches set and called by the nla_put_be64() that called by nla_put_net64() respectively. [1] https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit?id=e9bbe898cbe89b17ad3993c136aa13d0431cd537 Signed-off-by: Neutron Soutmun <neo.neutron@gmail.com> Signed-off-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
* ipset 6.29 releasedv6.29Jozsef Kadlecsik2016-03-161-1/+1
|
* Fix "configure" breakage due to pkg-config related changesJozsef Kadlecsik2016-03-131-0/+2
| | | | | The support for older pkg-config packages broke the "configure" script (reported by Jan Engelhardt).
* ipset 6.28 releasedv6.28Jozsef Kadlecsik2016-03-121-1/+1
|
* Support older pkg-config packagesJozsef Kadlecsik2016-02-291-0/+17
| | | | | Resolve the pkg-config 0.28 or greater dependency introduced by the patch "Add bash completion to the install routine."
* Add bash completion to the install routine.Mart Frauenlob2016-02-261-1/+15
| | | | | | | | Add the configure option --enable-bashcompl (default disabled). The PKG_CHECK_VAR requires pkg-config 0.28 or greater. Signed-off-by: Mart Frauenlob <mart.frauenlob@chello.at> Signed-off-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
* Add compatibility to support EXPORT_SYMBOL_GPL in module.hJozsef Kadlecsik2016-02-241-0/+10
| | | | Fixes netfilter bugzilla id #1008
* netfilter: nfnetlink: pass down netns pointer to call() and call_rcu()Jozsef Kadlecsik2016-02-161-0/+11
| | | | Backport patch from Pablo Neira Ayuso <pablo@netfilter.org>
* ipset 6.27 releasedv6.27Jozsef Kadlecsik2015-11-071-1/+1
|
* Fix detecting 'struct net' in 'struct tcf_ematch'Jozsef Kadlecsik2015-10-191-1/+1
| | | | | Nikolay Borisov reported that the detection is broken. Fix checking in the right sctructure and wrap the call to dev_get_by_index_rcu() too.
* ipset 6.26 releasedv6.26Jozsef Kadlecsik2015-08-281-1/+1
|
* ipset 6.25.1 releasedv6.25.1Jozsef Kadlecsik2015-06-251-1/+1
|
* ipset 6.25 releasedv6.25Jozsef Kadlecsik2015-06-251-1/+1
|
* netlink: implement nla_put_in_addr and nla_put_in6_addrJiri Benc2015-06-131-0/+10
| | | | | | | | | | | | | | | | IP addresses are often stored in netlink attributes. Add generic functions to do that. For nla_put_in_addr, it would be nicer to pass struct in_addr but this is not used universally throughout the kernel, in way too many places __be32 is used to store IPv4 address. Signed-off-by: Jiri Benc <jbenc@redhat.com> Signed-off-by: David S. Miller <davem@davemloft.net> Compatibility part added. Signed-off-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
* netfilter: bridge: add helpers for fetching physin/outdevpabloFlorian Westphal2015-04-271-0/+10
| | | | | | | | | | | | | | | | right now we store this in the nf_bridge_info struct, accessible via skb->nf_bridge. This patch prepares removal of this pointer from skb: Instead of using skb->nf_bridge->x, we use helpers to obtain the in/out device (or ifindexes). Followup patches to netfilter will then allow nf_bridge_info to be obtained by a call into the br_netfilter core, rather than keeping a pointer to it in sk_buff. Signed-off-by: Florian Westphal <fw@strlen.de> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org> Signed-off-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
* Fix coding styles reported by the most recent checkpatch.pl.Jozsef Kadlecsik2015-04-171-0/+10
|
* More compatibility checking and simplificationsJozsef Kadlecsik2015-01-061-0/+10
| | | | | Try hard to keep the support of the 2.6.32 kernel tree and simplify the code with self-referential macros.
* Compatibility: check kernel source for list_last_entryJozsef Kadlecsik2015-01-061-0/+10
| | | | list_last_entry is missing on CentOS7, reported by Ricardo Klein.
* ipset 6.24 releasedv6.24Jozsef Kadlecsik2014-11-241-1/+1
|
* Add more compatibility checkings to support older kernel releasesJozsef Kadlecsik2014-11-181-4/+25
|
* Kernel API changes in em_ipset.c, support both old and new onesJozsef Kadlecsik2014-11-031-0/+22
|
* net: use the new API kvfree()WANG Cong2014-11-031-0/+10
| | | | | | | | | It is available since v3.15-rc5. Cc: Pablo Neira Ayuso <pablo@netfilter.org> Cc: "David S. Miller" <davem@davemloft.net> Signed-off-by: Cong Wang <xiyou.wangcong@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net>
* ipset 6.23 releasedv6.23Jozsef Kadlecsik2014-09-231-1/+1
|
* ipset 6.22 releasedv6.22Jozsef Kadlecsik2014-09-151-1/+1
|
* ipset 6.21.1 releasedv6.21.1Jozsef Kadlecsik2014-03-071-1/+1
|
* ipset 6.21 releasedv6.21Jozsef Kadlecsik2014-03-041-1/+1
|
* net ipset: use rbtree postorder iteration instead of opencodingCody P Schafer2013-11-131-0/+10
| | | | | | | | Use rbtree_postorder_for_each_entry_safe() to destroy the rbtree instead of opencoding an alternate postorder iteration that modifies the tree Signed-off-by: Cody P Schafer <cody@linux.vnet.ibm.com> Signed-off-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
* ipset 6.20.1 releasedv6.20.1Jozsef Kadlecsik2013-10-271-1/+1
|