Selaa lähdekoodia

netfilter: xtables: add missing header inclusions for headers_check

Resolve these warnings on `make headers_check`:

usr/include/linux/netfilter/xt_CT.h:7: found __[us]{8,16,32,64} type
without #include <linux/types.h>
...

Signed-off-by: Jan Engelhardt <jengelh@medozas.de>
Jan Engelhardt 14 vuotta sitten
vanhempi
commit
06988b0693
39 muutettua tiedostoa jossa 77 lisäystä ja 0 poistoa
  1. 2 0
      include/linux/netfilter/xt_CT.h
  2. 2 0
      include/linux/netfilter/xt_TCPOPTSTRIP.h
  3. 2 0
      include/linux/netfilter/xt_TPROXY.h
  4. 2 0
      include/linux/netfilter/xt_cluster.h
  5. 2 0
      include/linux/netfilter/xt_connlimit.h
  6. 2 0
      include/linux/netfilter/xt_quota.h
  7. 2 0
      include/linux/netfilter/xt_socket.h
  8. 2 0
      include/linux/netfilter/xt_time.h
  9. 2 0
      include/linux/netfilter/xt_u32.h
  10. 2 0
      include/linux/netfilter_bridge/ebt_802_3.h
  11. 2 0
      include/linux/netfilter_bridge/ebt_among.h
  12. 2 0
      include/linux/netfilter_bridge/ebt_arp.h
  13. 2 0
      include/linux/netfilter_bridge/ebt_ip.h
  14. 2 0
      include/linux/netfilter_bridge/ebt_ip6.h
  15. 2 0
      include/linux/netfilter_bridge/ebt_limit.h
  16. 2 0
      include/linux/netfilter_bridge/ebt_log.h
  17. 2 0
      include/linux/netfilter_bridge/ebt_mark_m.h
  18. 2 0
      include/linux/netfilter_bridge/ebt_nflog.h
  19. 2 0
      include/linux/netfilter_bridge/ebt_pkttype.h
  20. 2 0
      include/linux/netfilter_bridge/ebt_stp.h
  21. 2 0
      include/linux/netfilter_bridge/ebt_ulog.h
  22. 2 0
      include/linux/netfilter_bridge/ebt_vlan.h
  23. 2 0
      include/linux/netfilter_ipv4/ipt_CLUSTERIP.h
  24. 2 0
      include/linux/netfilter_ipv4/ipt_ECN.h
  25. 2 0
      include/linux/netfilter_ipv4/ipt_SAME.h
  26. 2 0
      include/linux/netfilter_ipv4/ipt_TTL.h
  27. 2 0
      include/linux/netfilter_ipv4/ipt_addrtype.h
  28. 2 0
      include/linux/netfilter_ipv4/ipt_ah.h
  29. 2 0
      include/linux/netfilter_ipv4/ipt_ecn.h
  30. 2 0
      include/linux/netfilter_ipv4/ipt_ttl.h
  31. 2 0
      include/linux/netfilter_ipv6/ip6t_HL.h
  32. 2 0
      include/linux/netfilter_ipv6/ip6t_REJECT.h
  33. 2 0
      include/linux/netfilter_ipv6/ip6t_ah.h
  34. 2 0
      include/linux/netfilter_ipv6/ip6t_frag.h
  35. 2 0
      include/linux/netfilter_ipv6/ip6t_hl.h
  36. 2 0
      include/linux/netfilter_ipv6/ip6t_ipv6header.h
  37. 2 0
      include/linux/netfilter_ipv6/ip6t_mh.h
  38. 2 0
      include/linux/netfilter_ipv6/ip6t_opts.h
  39. 1 0
      include/linux/netfilter_ipv6/ip6t_rt.h

+ 2 - 0
include/linux/netfilter/xt_CT.h

@@ -1,6 +1,8 @@
 #ifndef _XT_CT_H
 #define _XT_CT_H
 
+#include <linux/types.h>
+
 #define XT_CT_NOTRACK	0x1
 
 struct xt_ct_target_info {

+ 2 - 0
include/linux/netfilter/xt_TCPOPTSTRIP.h

@@ -1,6 +1,8 @@
 #ifndef _XT_TCPOPTSTRIP_H
 #define _XT_TCPOPTSTRIP_H
 
+#include <linux/types.h>
+
 #define tcpoptstrip_set_bit(bmap, idx) \
 	(bmap[(idx) >> 5] |= 1U << (idx & 31))
 #define tcpoptstrip_test_bit(bmap, idx) \

+ 2 - 0
include/linux/netfilter/xt_TPROXY.h

@@ -1,6 +1,8 @@
 #ifndef _XT_TPROXY_H
 #define _XT_TPROXY_H
 
+#include <linux/types.h>
+
 /* TPROXY target is capable of marking the packet to perform
  * redirection. We can get rid of that whenever we get support for
  * mutliple targets in the same rule. */

+ 2 - 0
include/linux/netfilter/xt_cluster.h

@@ -1,6 +1,8 @@
 #ifndef _XT_CLUSTER_MATCH_H
 #define _XT_CLUSTER_MATCH_H
 
+#include <linux/types.h>
+
 enum xt_cluster_flags {
 	XT_CLUSTER_F_INV	= (1 << 0)
 };

+ 2 - 0
include/linux/netfilter/xt_connlimit.h

@@ -1,6 +1,8 @@
 #ifndef _XT_CONNLIMIT_H
 #define _XT_CONNLIMIT_H
 
+#include <linux/types.h>
+
 struct xt_connlimit_data;
 
 enum {

+ 2 - 0
include/linux/netfilter/xt_quota.h

@@ -1,6 +1,8 @@
 #ifndef _XT_QUOTA_H
 #define _XT_QUOTA_H
 
+#include <linux/types.h>
+
 enum xt_quota_flags {
 	XT_QUOTA_INVERT		= 0x1,
 };

+ 2 - 0
include/linux/netfilter/xt_socket.h

@@ -1,6 +1,8 @@
 #ifndef _XT_SOCKET_H
 #define _XT_SOCKET_H
 
+#include <linux/types.h>
+
 enum {
 	XT_SOCKET_TRANSPARENT = 1 << 0,
 };

+ 2 - 0
include/linux/netfilter/xt_time.h

@@ -1,6 +1,8 @@
 #ifndef _XT_TIME_H
 #define _XT_TIME_H 1
 
+#include <linux/types.h>
+
 struct xt_time_info {
 	__u32 date_start;
 	__u32 date_stop;

+ 2 - 0
include/linux/netfilter/xt_u32.h

@@ -1,6 +1,8 @@
 #ifndef _XT_U32_H
 #define _XT_U32_H 1
 
+#include <linux/types.h>
+
 enum xt_u32_ops {
 	XT_U32_AND,
 	XT_U32_LEFTSH,

+ 2 - 0
include/linux/netfilter_bridge/ebt_802_3.h

@@ -1,6 +1,8 @@
 #ifndef __LINUX_BRIDGE_EBT_802_3_H
 #define __LINUX_BRIDGE_EBT_802_3_H
 
+#include <linux/types.h>
+
 #define EBT_802_3_SAP 0x01
 #define EBT_802_3_TYPE 0x02
 

+ 2 - 0
include/linux/netfilter_bridge/ebt_among.h

@@ -1,6 +1,8 @@
 #ifndef __LINUX_BRIDGE_EBT_AMONG_H
 #define __LINUX_BRIDGE_EBT_AMONG_H
 
+#include <linux/types.h>
+
 #define EBT_AMONG_DST 0x01
 #define EBT_AMONG_SRC 0x02
 

+ 2 - 0
include/linux/netfilter_bridge/ebt_arp.h

@@ -1,6 +1,8 @@
 #ifndef __LINUX_BRIDGE_EBT_ARP_H
 #define __LINUX_BRIDGE_EBT_ARP_H
 
+#include <linux/types.h>
+
 #define EBT_ARP_OPCODE 0x01
 #define EBT_ARP_HTYPE 0x02
 #define EBT_ARP_PTYPE 0x04

+ 2 - 0
include/linux/netfilter_bridge/ebt_ip.h

@@ -15,6 +15,8 @@
 #ifndef __LINUX_BRIDGE_EBT_IP_H
 #define __LINUX_BRIDGE_EBT_IP_H
 
+#include <linux/types.h>
+
 #define EBT_IP_SOURCE 0x01
 #define EBT_IP_DEST 0x02
 #define EBT_IP_TOS 0x04

+ 2 - 0
include/linux/netfilter_bridge/ebt_ip6.h

@@ -12,6 +12,8 @@
 #ifndef __LINUX_BRIDGE_EBT_IP6_H
 #define __LINUX_BRIDGE_EBT_IP6_H
 
+#include <linux/types.h>
+
 #define EBT_IP6_SOURCE 0x01
 #define EBT_IP6_DEST 0x02
 #define EBT_IP6_TCLASS 0x04

+ 2 - 0
include/linux/netfilter_bridge/ebt_limit.h

@@ -1,6 +1,8 @@
 #ifndef __LINUX_BRIDGE_EBT_LIMIT_H
 #define __LINUX_BRIDGE_EBT_LIMIT_H
 
+#include <linux/types.h>
+
 #define EBT_LIMIT_MATCH "limit"
 
 /* timings are in milliseconds. */

+ 2 - 0
include/linux/netfilter_bridge/ebt_log.h

@@ -1,6 +1,8 @@
 #ifndef __LINUX_BRIDGE_EBT_LOG_H
 #define __LINUX_BRIDGE_EBT_LOG_H
 
+#include <linux/types.h>
+
 #define EBT_LOG_IP 0x01 /* if the frame is made by ip, log the ip information */
 #define EBT_LOG_ARP 0x02
 #define EBT_LOG_NFLOG 0x04

+ 2 - 0
include/linux/netfilter_bridge/ebt_mark_m.h

@@ -1,6 +1,8 @@
 #ifndef __LINUX_BRIDGE_EBT_MARK_M_H
 #define __LINUX_BRIDGE_EBT_MARK_M_H
 
+#include <linux/types.h>
+
 #define EBT_MARK_AND 0x01
 #define EBT_MARK_OR 0x02
 #define EBT_MARK_MASK (EBT_MARK_AND | EBT_MARK_OR)

+ 2 - 0
include/linux/netfilter_bridge/ebt_nflog.h

@@ -1,6 +1,8 @@
 #ifndef __LINUX_BRIDGE_EBT_NFLOG_H
 #define __LINUX_BRIDGE_EBT_NFLOG_H
 
+#include <linux/types.h>
+
 #define EBT_NFLOG_MASK 0x0
 
 #define EBT_NFLOG_PREFIX_SIZE 64

+ 2 - 0
include/linux/netfilter_bridge/ebt_pkttype.h

@@ -1,6 +1,8 @@
 #ifndef __LINUX_BRIDGE_EBT_PKTTYPE_H
 #define __LINUX_BRIDGE_EBT_PKTTYPE_H
 
+#include <linux/types.h>
+
 struct ebt_pkttype_info {
 	__u8 pkt_type;
 	__u8 invert;

+ 2 - 0
include/linux/netfilter_bridge/ebt_stp.h

@@ -1,6 +1,8 @@
 #ifndef __LINUX_BRIDGE_EBT_STP_H
 #define __LINUX_BRIDGE_EBT_STP_H
 
+#include <linux/types.h>
+
 #define EBT_STP_TYPE		0x0001
 
 #define EBT_STP_FLAGS		0x0002

+ 2 - 0
include/linux/netfilter_bridge/ebt_ulog.h

@@ -1,6 +1,8 @@
 #ifndef _EBT_ULOG_H
 #define _EBT_ULOG_H
 
+#include <linux/types.h>
+
 #define EBT_ULOG_DEFAULT_NLGROUP 0
 #define EBT_ULOG_DEFAULT_QTHRESHOLD 1
 #define EBT_ULOG_MAXNLGROUPS 32 /* hardcoded netlink max */

+ 2 - 0
include/linux/netfilter_bridge/ebt_vlan.h

@@ -1,6 +1,8 @@
 #ifndef __LINUX_BRIDGE_EBT_VLAN_H
 #define __LINUX_BRIDGE_EBT_VLAN_H
 
+#include <linux/types.h>
+
 #define EBT_VLAN_ID	0x01
 #define EBT_VLAN_PRIO	0x02
 #define EBT_VLAN_ENCAP	0x04

+ 2 - 0
include/linux/netfilter_ipv4/ipt_CLUSTERIP.h

@@ -1,6 +1,8 @@
 #ifndef _IPT_CLUSTERIP_H_target
 #define _IPT_CLUSTERIP_H_target
 
+#include <linux/types.h>
+
 enum clusterip_hashmode {
     CLUSTERIP_HASHMODE_SIP = 0,
     CLUSTERIP_HASHMODE_SIP_SPT,

+ 2 - 0
include/linux/netfilter_ipv4/ipt_ECN.h

@@ -8,6 +8,8 @@
 */
 #ifndef _IPT_ECN_TARGET_H
 #define _IPT_ECN_TARGET_H
+
+#include <linux/types.h>
 #include <linux/netfilter/xt_DSCP.h>
 
 #define IPT_ECN_IP_MASK	(~XT_DSCP_MASK)

+ 2 - 0
include/linux/netfilter_ipv4/ipt_SAME.h

@@ -1,6 +1,8 @@
 #ifndef _IPT_SAME_H
 #define _IPT_SAME_H
 
+#include <linux/types.h>
+
 #define IPT_SAME_MAX_RANGE	10
 
 #define IPT_SAME_NODST		0x01

+ 2 - 0
include/linux/netfilter_ipv4/ipt_TTL.h

@@ -4,6 +4,8 @@
 #ifndef _IPT_TTL_H
 #define _IPT_TTL_H
 
+#include <linux/types.h>
+
 enum {
 	IPT_TTL_SET = 0,
 	IPT_TTL_INC,

+ 2 - 0
include/linux/netfilter_ipv4/ipt_addrtype.h

@@ -1,6 +1,8 @@
 #ifndef _IPT_ADDRTYPE_H
 #define _IPT_ADDRTYPE_H
 
+#include <linux/types.h>
+
 enum {
 	IPT_ADDRTYPE_INVERT_SOURCE	= 0x0001,
 	IPT_ADDRTYPE_INVERT_DEST	= 0x0002,

+ 2 - 0
include/linux/netfilter_ipv4/ipt_ah.h

@@ -1,6 +1,8 @@
 #ifndef _IPT_AH_H
 #define _IPT_AH_H
 
+#include <linux/types.h>
+
 struct ipt_ah {
 	__u32 spis[2];			/* Security Parameter Index */
 	__u8  invflags;			/* Inverse flags */

+ 2 - 0
include/linux/netfilter_ipv4/ipt_ecn.h

@@ -8,6 +8,8 @@
 */
 #ifndef _IPT_ECN_H
 #define _IPT_ECN_H
+
+#include <linux/types.h>
 #include <linux/netfilter/xt_dscp.h>
 
 #define IPT_ECN_IP_MASK	(~XT_DSCP_MASK)

+ 2 - 0
include/linux/netfilter_ipv4/ipt_ttl.h

@@ -4,6 +4,8 @@
 #ifndef _IPT_TTL_H
 #define _IPT_TTL_H
 
+#include <linux/types.h>
+
 enum {
 	IPT_TTL_EQ = 0,		/* equals */
 	IPT_TTL_NE,		/* not equals */

+ 2 - 0
include/linux/netfilter_ipv6/ip6t_HL.h

@@ -5,6 +5,8 @@
 #ifndef _IP6T_HL_H
 #define _IP6T_HL_H
 
+#include <linux/types.h>
+
 enum {
 	IP6T_HL_SET = 0,
 	IP6T_HL_INC,

+ 2 - 0
include/linux/netfilter_ipv6/ip6t_REJECT.h

@@ -1,6 +1,8 @@
 #ifndef _IP6T_REJECT_H
 #define _IP6T_REJECT_H
 
+#include <linux/types.h>
+
 enum ip6t_reject_with {
 	IP6T_ICMP6_NO_ROUTE,
 	IP6T_ICMP6_ADM_PROHIBITED,

+ 2 - 0
include/linux/netfilter_ipv6/ip6t_ah.h

@@ -1,6 +1,8 @@
 #ifndef _IP6T_AH_H
 #define _IP6T_AH_H
 
+#include <linux/types.h>
+
 struct ip6t_ah {
 	__u32 spis[2];			/* Security Parameter Index */
 	__u32 hdrlen;			/* Header Length */

+ 2 - 0
include/linux/netfilter_ipv6/ip6t_frag.h

@@ -1,6 +1,8 @@
 #ifndef _IP6T_FRAG_H
 #define _IP6T_FRAG_H
 
+#include <linux/types.h>
+
 struct ip6t_frag {
 	__u32 ids[2];			/* Security Parameter Index */
 	__u32 hdrlen;			/* Header Length */

+ 2 - 0
include/linux/netfilter_ipv6/ip6t_hl.h

@@ -5,6 +5,8 @@
 #ifndef _IP6T_HL_H
 #define _IP6T_HL_H
 
+#include <linux/types.h>
+
 enum {
 	IP6T_HL_EQ = 0,		/* equals */
 	IP6T_HL_NE,		/* not equals */

+ 2 - 0
include/linux/netfilter_ipv6/ip6t_ipv6header.h

@@ -8,6 +8,8 @@ on whether they contain certain headers */
 #ifndef __IPV6HEADER_H
 #define __IPV6HEADER_H
 
+#include <linux/types.h>
+
 struct ip6t_ipv6header_info {
 	__u8 matchflags;
 	__u8 invflags;

+ 2 - 0
include/linux/netfilter_ipv6/ip6t_mh.h

@@ -1,6 +1,8 @@
 #ifndef _IP6T_MH_H
 #define _IP6T_MH_H
 
+#include <linux/types.h>
+
 /* MH matching stuff */
 struct ip6t_mh {
 	__u8 types[2];	/* MH type range */

+ 2 - 0
include/linux/netfilter_ipv6/ip6t_opts.h

@@ -1,6 +1,8 @@
 #ifndef _IP6T_OPTS_H
 #define _IP6T_OPTS_H
 
+#include <linux/types.h>
+
 #define IP6T_OPTS_OPTSNR 16
 
 struct ip6t_opts {

+ 1 - 0
include/linux/netfilter_ipv6/ip6t_rt.h

@@ -1,6 +1,7 @@
 #ifndef _IP6T_RT_H
 #define _IP6T_RT_H
 
+#include <linux/types.h>
 /*#include <linux/in6.h>*/
 
 #define IP6T_RT_HOPS 16