Received: by 10.192.165.148 with SMTP id m20csp4046216imm; Tue, 8 May 2018 01:51:56 -0700 (PDT) X-Google-Smtp-Source: AB8JxZqZ37KZRZIgtqEeVO9tNFTS4clOE3ZhZwaftbMinnK3n5zpm28nOp+bbbBtclrySqdHh8N8 X-Received: by 2002:a17:902:d68c:: with SMTP id v12-v6mr41602699ply.190.1525769516735; Tue, 08 May 2018 01:51:56 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1525769516; cv=none; d=google.com; s=arc-20160816; b=vNvs71xLfa87whzsk1gfGoGfMvnuUaf7Znt9X4D9R4qLg4kUxWkTzgFYUvawlhN8yi dZS0cVOPIhSifG6UvKj7W9oFyvNqh3AQ4rDWlhpiXgCcqwZAbuN1D24CwJlDjEmDdBeI x0hbQQryA/4Hd/qGbClhOfXK5VWnnTZfhgNSklMDwQA+VqkWtZIRvwK8DcdXgtIICu39 pwKepTyRTaG84e6LqT1qn2Ec/pM7RRTNAln4G9n7TDSnohM4sn5GclgN5/MK9J66NtFn Krh5OPOnGySg8fLe4XSb7rX6ifsrwAkimkCDx18ki/n2mXVTdDRFK5TMfRdR11I7CEJZ BG2A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=TS+R33ZiVi0M3nqcqbxGm1X+q9XVYnWMkb2bx0M/Uvk=; b=BAWGeY2+RFTGiDUix+6EboVuFw06a4MMzD+9xOvyJMBmXUG3BXiOX5VdCez0G/ZXOo GaUWvif05fzaiWxX5Eze176nfotsXOqx21ivxeBwMZssqsc277IPFRzIWCD4ywXgbhD8 X1sfyKJZBZuudRFdFUeCSM4PS0a6/9lc9+DUe7wkDirCw/615h51Xw3wSzm54xlKdZ93 BE1CdW9Oh5x7nUvWhfSroK2Jk8PZR/CeK6tqseiBP0a6gAvcngNPIG1j03T4nSFO+QLg jmpQISI56R8bwdY0fFIN64WqLyRU0fJ0TSzvj7XJvIhSE/ssL1wDScIWJHwLPsk2C7Ny BNTg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 31-v6si23589701plz.364.2018.05.08.01.51.42; Tue, 08 May 2018 01:51:56 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933422AbeEHIvL (ORCPT + 99 others); Tue, 8 May 2018 04:51:11 -0400 Received: from Chamillionaire.breakpoint.cc ([146.0.238.67]:50354 "EHLO Chamillionaire.breakpoint.cc" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932130AbeEHIND (ORCPT ); Tue, 8 May 2018 04:13:03 -0400 Received: from fw by Chamillionaire.breakpoint.cc with local (Exim 4.89) (envelope-from ) id 1fFxk3-0007Fw-GE; Tue, 08 May 2018 10:12:59 +0200 From: Florian Westphal To: Cc: sfr@canb.auug.org.au, linux-next@vger.kernel.org, linux-kernel@vger.kernel.org, ffmancera@riseup.net, Florian Westphal Subject: [PATCH nf-next] netfilter: fix fallout from xt/nf osf separation Date: Tue, 8 May 2018 10:05:38 +0200 Message-Id: <20180508080538.31992-1-fw@strlen.de> X-Mailer: git-send-email 2.16.1 In-Reply-To: <20180508102101.768d5c52@canb.auug.org.au> References: <20180508102101.768d5c52@canb.auug.org.au> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Stephen Rothwell says: today's linux-next build (x86_64 allmodconfig) produced this warning: ./usr/include/linux/netfilter/nf_osf.h:25: found __[us]{8,16,32,64} type without #include Fix that up and also move kernel-private struct out of uapi (it was not exposed in any released kernel version). tested via allmodconfig build + make headers_check. Reported-by: Stephen Rothwell Fixes: bfb15f2a95cb ("netfilter: extract Passive OS fingerprint infrastructure from xt_osf") Signed-off-by: Florian Westphal --- include/linux/netfilter/nf_osf.h | 6 ++++++ include/uapi/linux/netfilter/nf_osf.h | 8 ++------ 2 files changed, 8 insertions(+), 6 deletions(-) diff --git a/include/linux/netfilter/nf_osf.h b/include/linux/netfilter/nf_osf.h index a2b39602e87d..0e114c492fb8 100644 --- a/include/linux/netfilter/nf_osf.h +++ b/include/linux/netfilter/nf_osf.h @@ -21,6 +21,12 @@ enum osf_fmatch_states { FMATCH_OPT_WRONG, }; +struct nf_osf_finger { + struct rcu_head rcu_head; + struct list_head finger_entry; + struct nf_osf_user_finger finger; +}; + bool nf_osf_match(const struct sk_buff *skb, u_int8_t family, int hooknum, struct net_device *in, struct net_device *out, const struct nf_osf_info *info, struct net *net, diff --git a/include/uapi/linux/netfilter/nf_osf.h b/include/uapi/linux/netfilter/nf_osf.h index 45376eae31ef..8f2f2f403183 100644 --- a/include/uapi/linux/netfilter/nf_osf.h +++ b/include/uapi/linux/netfilter/nf_osf.h @@ -1,6 +1,8 @@ #ifndef _NF_OSF_H #define _NF_OSF_H +#include + #define MAXGENRELEN 32 #define NF_OSF_GENRE (1 << 0) @@ -57,12 +59,6 @@ struct nf_osf_user_finger { struct nf_osf_opt opt[MAX_IPOPTLEN]; }; -struct nf_osf_finger { - struct rcu_head rcu_head; - struct list_head finger_entry; - struct nf_osf_user_finger finger; -}; - struct nf_osf_nlmsg { struct nf_osf_user_finger f; struct iphdr ip; -- 2.16.1