mirror of
git://git.code.sf.net/p/xtables-addons/xtables-addons
synced 2025-09-20 19:44:56 +02:00
Compare commits
4 Commits
Author | SHA1 | Date | |
---|---|---|---|
![]() |
3f04148501 | ||
![]() |
d96fff8893 | ||
![]() |
aceca54912 | ||
![]() |
cb1cdb190f |
@@ -1,4 +1,4 @@
|
|||||||
AC_INIT([xtables-addons], [2.1])
|
AC_INIT([xtables-addons], [2.2])
|
||||||
AC_CONFIG_AUX_DIR([build-aux])
|
AC_CONFIG_AUX_DIR([build-aux])
|
||||||
AC_CONFIG_HEADERS([config.h])
|
AC_CONFIG_HEADERS([config.h])
|
||||||
AC_CONFIG_MACRO_DIR([m4])
|
AC_CONFIG_MACRO_DIR([m4])
|
||||||
@@ -63,8 +63,8 @@ if test -n "$kbuilddir"; then
|
|||||||
echo "WARNING: Version detection did not succeed. Continue at own luck.";
|
echo "WARNING: Version detection did not succeed. Continue at own luck.";
|
||||||
else
|
else
|
||||||
echo "$kmajor.$kminor.$kmicro.$kstable in $kbuilddir";
|
echo "$kmajor.$kminor.$kmicro.$kstable in $kbuilddir";
|
||||||
if test "$kmajor" -gt 3 -o "$kmajor" -eq 3 -a "$kminor" -gt 8; then
|
if test "$kmajor" -gt 3 -o "$kmajor" -eq 3 -a "$kminor" -gt 9; then
|
||||||
echo "WARNING: That kernel version is not officially supported.";
|
echo "WARNING: That kernel version is not officially supported yet. Continue at own luck.";
|
||||||
elif test "$kmajor" -eq 3 -a "$kminor" -ge 7; then
|
elif test "$kmajor" -eq 3 -a "$kminor" -ge 7; then
|
||||||
:;
|
:;
|
||||||
else
|
else
|
||||||
|
@@ -3,6 +3,13 @@ HEAD
|
|||||||
====
|
====
|
||||||
|
|
||||||
|
|
||||||
|
v2.2 (2013-03-31)
|
||||||
|
=================
|
||||||
|
Enhancements:
|
||||||
|
- Support for Linux 3.9
|
||||||
|
- iptaccount: fix entire program being erroneously optimized away on PPC
|
||||||
|
|
||||||
|
|
||||||
v2.1 (2012-11-27)
|
v2.1 (2012-11-27)
|
||||||
=================
|
=================
|
||||||
Fixes:
|
Fixes:
|
||||||
|
@@ -64,7 +64,7 @@ int main(int argc, char *argv[])
|
|||||||
struct ipt_ACCOUNT_context ctx;
|
struct ipt_ACCOUNT_context ctx;
|
||||||
struct ipt_acc_handle_ip *entry;
|
struct ipt_acc_handle_ip *entry;
|
||||||
int i;
|
int i;
|
||||||
char optchar;
|
int optchar;
|
||||||
bool doHandleUsage = false, doHandleFree = false, doTableNames = false;
|
bool doHandleUsage = false, doHandleFree = false, doTableNames = false;
|
||||||
bool doFlush = false, doContinue = false, doCSV = false;
|
bool doFlush = false, doContinue = false, doCSV = false;
|
||||||
|
|
||||||
|
@@ -140,9 +140,11 @@ static void delude_send_reset(struct sk_buff *oldskb, unsigned int hook)
|
|||||||
static unsigned int
|
static unsigned int
|
||||||
delude_tg(struct sk_buff **pskb, const struct xt_action_param *par)
|
delude_tg(struct sk_buff **pskb, const struct xt_action_param *par)
|
||||||
{
|
{
|
||||||
/* WARNING: This code causes reentry within iptables.
|
/*
|
||||||
This means that the iptables jump stack is now crap. We
|
* Sending the reset causes reentrancy within iptables - and should not pose
|
||||||
must return an absolute verdict. --RR */
|
* a problem, as that is supported since Linux 2.6.35. But since we do not
|
||||||
|
* actually want to have a connection open, we are still going to drop it.
|
||||||
|
*/
|
||||||
delude_send_reset(*pskb, par->hooknum);
|
delude_send_reset(*pskb, par->hooknum);
|
||||||
return NF_DROP;
|
return NF_DROP;
|
||||||
}
|
}
|
||||||
|
@@ -835,7 +835,7 @@ static int __net_init dnetmap_proc_net_init(struct net *net)
|
|||||||
|
|
||||||
static void __net_exit dnetmap_proc_net_exit(struct net *net)
|
static void __net_exit dnetmap_proc_net_exit(struct net *net)
|
||||||
{
|
{
|
||||||
proc_net_remove(net, "xt_DNETMAP");
|
remove_proc_entry("xt_DNETMAP", net->proc_net);
|
||||||
}
|
}
|
||||||
|
|
||||||
#else
|
#else
|
||||||
|
@@ -1,4 +1,4 @@
|
|||||||
.TH xtables-addons 8 "v2.1 (2012-11-27)" "" "v2.1 (2012-11-27)"
|
.TH xtables-addons 8 "Continuous Snow Edition" "" "v2.2 (2013-03-31)"
|
||||||
.SH Name
|
.SH Name
|
||||||
Xtables-addons \(em additional extensions for iptables, ip6tables, etc.
|
Xtables-addons \(em additional extensions for iptables, ip6tables, etc.
|
||||||
.SH Targets
|
.SH Targets
|
||||||
|
Reference in New Issue
Block a user