From patchwork Fri Jan 12 15:50:26 2018 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arnd Bergmann X-Patchwork-Id: 124362 Delivered-To: patch@linaro.org Received: by 10.140.22.227 with SMTP id 90csp2210755qgn; Fri, 12 Jan 2018 07:51:10 -0800 (PST) X-Google-Smtp-Source: ACJfBosqHCr8855OOwirXyloNu3Com4CS9CBPbeD9SZpBRnZGuhQ3rpJjn7aVGt/PjET9rXBLmxj X-Received: by 10.159.242.199 with SMTP id x7mr18130328plw.94.1515772270502; Fri, 12 Jan 2018 07:51:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1515772270; cv=none; d=google.com; s=arc-20160816; b=NG+y6dsLc+KXZpS9U/ioc7v+BQp9UizLHCLoEqsZOIOqMBr4cqYagSUuoENoRcBpEf sHtWcZEDc3kuCNCbl+sf7+B3x9Dzc5B72sItLYWm/vIbGoI6D2zW5XeeXsUwSgr/ZO1/ Rw0PRtjuZHK9wN1DBsXBfN9maD3ygQO2xmW5K+0G16cJuj76Lvem4edMtGit9mZxlt0t dhBiXKswLoSEvAacqHrJ4CpR2+KIiiRY1faAgvugCJcvacEGI79TOMHCIQA7xmnFurH5 gMcuj06EJx6LItOb+hu5q1Jg8r4YUGjF/fASJW8DGV1UnrAOV9NtLuZ0efqnuyauf2au RWKQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:date:subject:cc:to:from :arc-authentication-results; bh=t45JFwHz4dAr2X+8wjJVnZJplLFZjX87by4Ldg0tILo=; b=pZcK0vaThu+Mny/twJdXjxtZd3XMIYi5gYOGd3LbcHK1zNdsVmWLo7q2bewunGEVPw Gxv9gPiBHhVsWAQQ87aiaE51UAdzkSDIEjiBH76+il043FNhhACcnwQQvuP3qa0uikz3 lYWChLMXLxCrQU9PMVJFS/ExIy2BWvzcvo5UQRUO4A9HEVNvRsbtTkaZqd3/8FGwXVcy ZX6k1R44Rwk5uaLbHl4DuYqum5FgxtqxJ+FcJu/ZL87Zkp19GoPdXkk74bDEr6xjytws hOyDrSEHX9WLahSsbjc8OJhofvpCDW4hJ9u4PVNA0ytRlgbqDgr4rpGPRJZdVcpV8OWK ZTag== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w18si9223503pgm.799.2018.01.12.07.51.10; Fri, 12 Jan 2018 07:51:10 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S934148AbeALPvI (ORCPT + 28 others); Fri, 12 Jan 2018 10:51:08 -0500 Received: from mout.kundenserver.de ([212.227.126.130]:52889 "EHLO mout.kundenserver.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933997AbeALPvG (ORCPT ); Fri, 12 Jan 2018 10:51:06 -0500 Received: from wuerfel.lan ([95.208.111.237]) by mrelayeu.kundenserver.de (mreue003 [212.227.15.129]) with ESMTPA (Nemesis) id 0LsdiP-1eyJim1CNl-012Eq0; Fri, 12 Jan 2018 16:50:37 +0100 From: Arnd Bergmann To: Pablo Neira Ayuso , Jozsef Kadlecsik , Florian Westphal , "David S. Miller" Cc: Arnd Bergmann , William Breathitt Gray , "Pablo M. Bermudo Garay" , Manuel Messner , netfilter-devel@vger.kernel.org, coreteam@netfilter.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH] netfilter: nf_tables: flow_offload depends on flow_table Date: Fri, 12 Jan 2018 16:50:26 +0100 Message-Id: <20180112155033.3694504-1-arnd@arndb.de> X-Mailer: git-send-email 2.9.0 X-Provags-ID: V03:K0:WSOEG7ERv+0uSoQHHNQHDsbmdhB1I8Qv6rOwCXt7RZbJn+RiSSc teIw9bm/LQRZKJ14a0FgzQzGOuMFETqDMY7XYW5j9lnAiPu7r4tn/+zSr3U2nmdT9JxAL3r LZxiEFGq7Hxk2hLZrJM9szi3dZSeLLJ0+UhchH5TcYEkp4xb3uUg0dStmDNCH/XCMmKgnh+ fAtaSrMlP6AwoalkFjpqg== X-UI-Out-Filterresults: notjunk:1; V01:K0:JrckZO3Hoak=:HbhEWOJfIH818/iILfzzTn MRbDpScrboxE0hXk267VtTdYw3Gkt87CkgaFxBNwhoc1JsMKmLN883zSPWHVxALDKeRXmkAkE jyv9S2OEFvHPkr4ix6gv7xyLafQUm9VvyJyjP4NS2FkhL8uH1iZX6n7jzLQ9e+4NOPKcewvv7 3S6KP1WMiSldr75LBQNxyN/WLwCwSfttEceDWO7f8ETD8HasxY0+lQMMJqUvqzf8vYSQv7VyR LC6rWC1uQiB5OJ6GJdYt515pHnci21shxE9HsIo/etSGUHhvaUfFzDJCtgITf5ZL+5L4NWY2C mL/aJy8wd7mF0wba/R3qpR7vB3GNoi3u6ghCS0bwPa8+txtTqmMzEMBqeH/q2mrYcp0KXbiC+ k5bEgrT7K7gZIhAcrNKIWm6Bni0pFhlQBI4C9iDHkrRxkHjYlu515u0wD7CjZ2v/dAycpaMuB SBEPKRBriVoBj5+/vtHRkOQaX/Ry6XXlB4GvFTcT/8SENDVLptPVxPEBBewy75ZFUQ2quUcVp TJ6iRCUvG6E4GshDvPiTP4iV6s9rFLUpL70mAStsWejxYgPpfxFfCUaz6t4ekHem1GilNZwRO G2SPlB5pfE20uxS0pn+x56urb96HsXOfXAgR1fVbMdV+qcdHlYtd/yVmXpwtuIHtzoHYqDTqL W0zHCkLsa6nLpFCJvpJaeSiQCAUIPrHXY8wuJq8xlaAp/TcvIf0o1rHg1CoFH7UXSugF8S5Sa MXx7ydyxSEDQ1D+x2AR3y1gFbxT4JX3ZU93ixw== Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Without CONFIG_NF_FLOW_TABLE, the new nft_flow_offload module produces a link error: net/netfilter/nft_flow_offload.o: In function `nft_flow_offload_iterate_cleanup': nft_flow_offload.c:(.text+0xb0): undefined reference to `nf_flow_table_iterate' net/netfilter/nft_flow_offload.o: In function `flow_offload_iterate_cleanup': nft_flow_offload.c:(.text+0x160): undefined reference to `flow_offload_dead' net/netfilter/nft_flow_offload.o: In function `nft_flow_offload_eval': nft_flow_offload.c:(.text+0xc4c): undefined reference to `flow_offload_alloc' nft_flow_offload.c:(.text+0xc64): undefined reference to `flow_offload_add' nft_flow_offload.c:(.text+0xc94): undefined reference to `flow_offload_free' This adds a Kconfig dependency for it. Fixes: a3c90f7a2323 ("netfilter: nf_tables: flow offload expression") Signed-off-by: Arnd Bergmann --- net/netfilter/Kconfig | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) -- 2.9.0 diff --git a/net/netfilter/Kconfig b/net/netfilter/Kconfig index ea447826e127..9019fa98003d 100644 --- a/net/netfilter/Kconfig +++ b/net/netfilter/Kconfig @@ -506,7 +506,7 @@ config NFT_CT connection tracking information such as the flow state. config NFT_FLOW_OFFLOAD - depends on NF_CONNTRACK + depends on NF_CONNTRACK && NF_FLOW_TABLE tristate "Netfilter nf_tables hardware flow offload module" help This option adds the "flow_offload" expression that you can use to