Received: by 2002:ac0:aa62:0:0:0:0:0 with SMTP id w31-v6csp500420ima; Wed, 24 Oct 2018 04:55:09 -0700 (PDT) X-Google-Smtp-Source: AJdET5ei7AzFrZkt/IYAF/WA2Uylhs8J5mkAYw/4NaJCQSz2PU2jZoC0Q2hCX8nx8OhAGXiJbvbJ X-Received: by 2002:a62:449b:: with SMTP id m27-v6mr2371239pfi.82.1540382109745; Wed, 24 Oct 2018 04:55:09 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1540382109; cv=none; d=google.com; s=arc-20160816; b=w0t4Fq1j5ErDSuB3rLm1a5lWluZidk7ICLa1SHkV3WGFBWRo9sToL89iRFCKpcu296 O6Bx8pRPGLJ+xkC4ODpqhah80NIRCsGUoHhCYIpOcHCiw8rw9BBk9bhJtS9+2vLIw+yn kBvEBYesqj7yApHWpRzJ3x+gHnghGsZXJQollkMc+75NkT9zsOucSVCz7x1qVEElIjD2 gFb/Po0nby4Q9KngP5URXcAOs97hw83/hhiUHoUivfvzBDrsNrtI3z8qp/ZcuKh66NrT 7bOJUqoMllSaozKaqtvLpYGWN8uRuJc1aDCdZUf2s83zqBV0ZfNmMQZpS8ZkI/AlUsx2 mVNg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=CmeTmdySJwrUZ1uW3nM3xopp0Flh166wE7DErDCMY74=; b=nAQYZklEWoJY4InmMI7nDvH6K36D2zrexBZho2f5VKpWgdbwvB/FMISZILI3a/XJ0N QEB4seAazI+psQyhpQ5IBQZEY40iJl6kQ+y08Z2jXKCEMbyZTkOp85eOzP9x1h3nJYL2 qpkJnIIe1TehLpEcz5Fl3ZNk9c6okHgsS3xI58TXD47T3ecpQ05wiFWUCRGUZ8UcqQnQ yi2C4laGnlFx5LSICeFQj3hklEDs0puWO8dacpHVDX5qdLOeYdDt/Uqh1CVI+JzWlAYE oKEhy9JtA/1mnTu0V29xB/9VeVlbLPfI0SDvLr8VijIIDZhnuv8aEE2ic1jDlyOsbYA1 iULw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 6-v6si3988116pfx.185.2018.10.24.04.54.40; Wed, 24 Oct 2018 04:55:09 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727416AbeJXUV4 (ORCPT + 99 others); Wed, 24 Oct 2018 16:21:56 -0400 Received: from mx2.suse.de ([195.135.220.15]:36222 "EHLO mx1.suse.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726428AbeJXUV4 (ORCPT ); Wed, 24 Oct 2018 16:21:56 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay1.suse.de (unknown [195.135.220.254]) by mx1.suse.de (Postfix) with ESMTP id 2E014AD68; Wed, 24 Oct 2018 11:54:06 +0000 (UTC) From: Jiri Slaby To: pablo@netfilter.org Cc: kadlec@blackhole.kfki.hu, fw@strlen.de, netfilter-devel@vger.kernel.org, coreteam@netfilter.org, linux-kernel@vger.kernel.org, Jiri Slaby , =?UTF-8?q?M=C3=A1t=C3=A9=20Eckl?= Subject: [PATCH] netfilter: bridge: define INT_MIN & INT_MAX in userspace Date: Wed, 24 Oct 2018 13:54:03 +0200 Message-Id: <20181024115403.3938-1-jslaby@suse.cz> X-Mailer: git-send-email 2.19.1 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org With 4.19, programs like ebtables fail to build when they include "linux/netfilter_bridge.h". It is caused by commit 94276fa8a2a4 which added a use of INT_MIN and INT_MAX to the header: : In file included from /usr/include/linux/netfilter_bridge/ebtables.h:18, : from include/ebtables_u.h:28, : from communication.c:23: : /usr/include/linux/netfilter_bridge.h:30:20: error: 'INT_MIN' undeclared here (not in a function) : NF_BR_PRI_FIRST = INT_MIN, : ^~~~~~~ Define these constants by including "limits.h" when !__KERNEL__ (the same way as for other netfilter_* headers). Fixes: 94276fa8a2a4 ("netfilter: bridge: Expose nf_tables bridge hook priorities through uapi") Signed-off-by: Jiri Slaby Cc: Máté Eckl Cc: Pablo Neira Ayuso --- include/uapi/linux/netfilter_bridge.h | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/include/uapi/linux/netfilter_bridge.h b/include/uapi/linux/netfilter_bridge.h index 156ccd089df1..1610fdbab98d 100644 --- a/include/uapi/linux/netfilter_bridge.h +++ b/include/uapi/linux/netfilter_bridge.h @@ -11,6 +11,10 @@ #include #include +#ifndef __KERNEL__ +#include /* for INT_MIN, INT_MAX */ +#endif + /* Bridge Hooks */ /* After promisc drops, checksum checks. */ #define NF_BR_PRE_ROUTING 0 -- 2.19.1