From patchwork Tue Apr 12 10:33:58 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Adolf Belka X-Patchwork-Id: 5498 Return-Path: Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by web04.haj.ipfire.org (Postfix) with ESMTPS id 4Kd2Bz58t6z3x1J for ; Tue, 12 Apr 2022 10:34:03 +0000 (UTC) Received: from mail02.haj.ipfire.org (mail02.haj.ipfire.org [172.28.1.201]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail02.haj.ipfire.org", Issuer "R3" (verified OK)) by mail01.ipfire.org (Postfix) with ESMTPS id 4Kd2Bz0vZzz5XV; Tue, 12 Apr 2022 10:34:03 +0000 (UTC) Received: from mail02.haj.ipfire.org (localhost [127.0.0.1]) by mail02.haj.ipfire.org (Postfix) with ESMTP id 4Kd2Bz0b3Gz2yVB; Tue, 12 Apr 2022 10:34:03 +0000 (UTC) Received: from mail01.ipfire.org (mail01.haj.ipfire.org [172.28.1.202]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) client-signature ECDSA (P-384)) (Client CN "mail01.haj.ipfire.org", Issuer "R3" (verified OK)) by mail02.haj.ipfire.org (Postfix) with ESMTPS id 4Kd2By2BCNz2xQn for ; Tue, 12 Apr 2022 10:34:02 +0000 (UTC) Received: from [127.0.0.1] (localhost [127.0.0.1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (No client certificate requested) by mail01.ipfire.org (Postfix) with ESMTPSA id 4Kd2Bx6TsPz5XP; Tue, 12 Apr 2022 10:34:01 +0000 (UTC) DKIM-Signature: v=1; a=ed25519-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003ed25519; t=1649759642; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=AsFQkMg1TdxIhZRbciIVXA/GJ05hveSB1jiGs8nVaAE=; b=3xWbYgt2Wd2bvta5B6VOVxAU3Gyzn17znmF+ID2salaRJf3oqq+bkivh4X+HFYD4webPNJ Az2UHmx+PL5fW/AA== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipfire.org; s=202003rsa; t=1649759642; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=AsFQkMg1TdxIhZRbciIVXA/GJ05hveSB1jiGs8nVaAE=; b=E8roOzGM7f0s6et+IuJ7bTx7876/HM4krsbjuALFzFCPbETGJ4VIaJKJrbKo2YT1oeT6Fk take8WvTIC1kCLwUFb8lGsqbJH3rXD/TvcEKkSVcOY91Qi0CoU/454mIPDEWA78+TDzwNG DxQKJ1gLmLPDAq2Z2dIqxHlmzfI8+jBNQHKReGA8ULGvTvjRcJdn8QbXWkY5gV97p9mgU4 Y8gq7ux3mD5duXRfoN8GGmmf/2eEIVeiblI4Mj3by+O2BFPOeUr1o0lP9zvduOzHA9FD4W dMTc3GBsrDJBkblIJFKoLmHcxxKGQcGPh9pOh19RQUjBic30rdThq1TMQrz5IQ== From: Adolf Belka To: development@lists.ipfire.org Subject: [PATCH] ipset: Update to version 7.15 Date: Tue, 12 Apr 2022 12:33:58 +0200 Message-Id: <20220412103358.59325-1-adolf.belka@ipfire.org> MIME-Version: 1.0 X-BeenThere: development@lists.ipfire.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: IPFire development talk List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: development-bounces@lists.ipfire.org Sender: "Development" - Update from 7.11 to 7.15 - Update of rootfile - Changelog 7.15 Kernel part changes netfilter: ipset: Fix maximal range check in hash_ipportnet4_uadt() 7.14 Userspace changes Add missing function to libipset.map and bump library version Kernel part changes 64bit division isn't allowed on 32bit, replace it with shift 7.13 Userspace changes When parsing protocols by number, do not check it in /etc/protocols. Add missing hunk to patch "Allow specifying protocols by number" Kernel part changes Limit the maximal range of consecutive elements to add/delete fix 7.12 Userspace changes Allow specifying protocols by number Fix example in ipset.8 manpage tests: add tests ipset to nftables add ipset to nftables translation infrastructur lib: Detach restore routine from parser lib: split parser from command execution Fix patch "Parse port before trying by service name" Kernel part changes Limit the maximal range of consecutive elements to add/delete Backport "netfilter: use nfnetlink_unicast()" Backport "netfilter: nfnetlink: consolidate callback type" Backport "netfilter: nfnetlink: add struct nfnl_info and pass it to callbacks" Backport "netfilter: add helper function to set up the nfnetlink header and use it" Signed-off-by: Adolf Belka --- config/rootfiles/common/ipset | 5 ++++- lfs/ipset | 4 ++-- 2 files changed, 6 insertions(+), 3 deletions(-) diff --git a/config/rootfiles/common/ipset b/config/rootfiles/common/ipset index 84703391f..5cea7ad22 100644 --- a/config/rootfiles/common/ipset +++ b/config/rootfiles/common/ipset @@ -18,11 +18,14 @@ etc/ipset #usr/include/libipset/transport.h #usr/include/libipset/types.h #usr/include/libipset/utils.h +#usr/include/libipset/xlate.h #usr/lib/libipset.la #usr/lib/libipset.so usr/lib/libipset.so.13 -usr/lib/libipset.so.13.2.0 +usr/lib/libipset.so.13.3.0 #usr/lib/pkgconfig/libipset.pc usr/sbin/ipset +#usr/sbin/ipset-translate #usr/share/man/man3/libipset.3 +#usr/share/man/man8/ipset-translate.8 #usr/share/man/man8/ipset.8 diff --git a/lfs/ipset b/lfs/ipset index 7b7612875..1dae6f936 100644 --- a/lfs/ipset +++ b/lfs/ipset @@ -24,7 +24,7 @@ include Config -VER = 7.11 +VER = 7.15 THISAPP = ipset-$(VER) DL_FILE = $(THISAPP).tar.bz2 @@ -40,7 +40,7 @@ objects = $(DL_FILE) $(DL_FILE) = $(DL_FROM)/$(DL_FILE) -$(DL_FILE)_BLAKE2 = 97f2e3372e963654ece511960e8c22d0dd9e29376d087a3767d89544dfbd85f9f9e75e0cc6c4eb9e1d813d1a472a410033a76feef3319b1d87fd51b0c3fd97cd +$(DL_FILE)_BLAKE2 = 10acff9741370ad80a2845605be1be4f691e987b271f4dcf1fab3abfe158c63c7d39e6b3453ba7cd361dee3df92f85419cfb70806a71b6806555f6571c70b1ed install : $(TARGET)