Message ID | 20240119070847.5402-1-linma@zju.edu.cn |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel+bounces-30836-ouuuleilei=gmail.com@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a05:7301:2bc4:b0:101:a8e8:374 with SMTP id hx4csp839214dyb; Thu, 18 Jan 2024 23:09:32 -0800 (PST) X-Google-Smtp-Source: AGHT+IGZn/6oQi163GTq2TwZB+oUZPr0hl+MB7LloYTNizLyoaKlYeMRFDE4sRudzXjdKLOLFuXe X-Received: by 2002:a05:6214:dac:b0:680:d23d:53f2 with SMTP id h12-20020a0562140dac00b00680d23d53f2mr2329560qvh.59.1705648171947; Thu, 18 Jan 2024 23:09:31 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1705648171; cv=pass; d=google.com; s=arc-20160816; b=DUatvsOh0ZAl1Mq+J93z7v8Me6/SI39AolDGENGDz9zZMfEkn5FXEZOFBsIWcESQst SEp0OzM7aKDyhn/etzrR5nprM4OUwFWAd2J/ZohkcW58ovpUAv0/52gD6nV8pml7Sjkw vTSrrr2fYCwxxRhsyjIpPMp66qJcYqMnOfaVU1tJrVSFDjoEK3yKoISwoC0OpP8mPWNo TNRlhvARqCQvAOMXe743T9aP3GZRqlnyTK7vcDL7s4NKSgpEcpoI2px0CSTBmT7edDYO qbFpgqG1YKcL8KtiUtJyr2N4U8txZZcKWlLOFLD1yflUSwoKYBAxAg6GCFNJHiw0hvvz aIfw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:to:from; bh=A65S3nww7cQGtgKptpoidMk3ERqNslo01Ol4q//KyQA=; fh=AnrtpUEIF3Ir3CJtaFLyxWKJ+YQ+RcUaGOPSlODj1rw=; b=neP2pfBkSgf7mwg0ndAFu2DIqI/da9MlQ1zubC0uZIsebLoJOUfHWlGr89jtAE6omo jm+Vy9GGF6KZ8hftKOk8C4PJPYfWYe0EFa0ron0q2MovsPZji10mIqK5fG28y/UGZyD6 W3MYbuz2lQE/pDE8ZjW9pixaelXZ+uSfRTtMTuCBfWBYuN0dc/pDqI4BDMZ3wZpPUGMB yLGIC8xRX4GpIAEBhHJ0f9A9y4Vwckee7/o7ih/qTkBnPKf0lcYnYLJqtcEgl5FgaUiO 4QURDpIWqIy0ZMR+f3kbfOwkd6EIZ4UBP3JIGGtTH8Y57rOmT490vmd9Jm0e1/M0LSa9 30iw== ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=zju.edu.cn); spf=pass (google.com: domain of linux-kernel+bounces-30836-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-30836-ouuuleilei=gmail.com@vger.kernel.org" Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id d7-20020a0cb2c7000000b00681888f5741si3924452qvf.511.2024.01.18.23.09.31 for <ouuuleilei@gmail.com> (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 18 Jan 2024 23:09:31 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-30836-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=zju.edu.cn); spf=pass (google.com: domain of linux-kernel+bounces-30836-ouuuleilei=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-30836-ouuuleilei=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id B907B1C238D9 for <ouuuleilei@gmail.com>; Fri, 19 Jan 2024 07:09:31 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 9ED39CA4E; Fri, 19 Jan 2024 07:09:14 +0000 (UTC) Received: from azure-sdnproxy.icoremail.net (azure-sdnproxy.icoremail.net [20.231.56.155]) by smtp.subspace.kernel.org (Postfix) with ESMTP id CD352186F; Fri, 19 Jan 2024 07:09:07 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=20.231.56.155 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705648153; cv=none; b=dpVg5etD4A6FiPbjXvimtA3GDNwjF+RAOKMt6SVnUE/pXL0+r3a8Ock46z9KcSF4QYrIjmmdhc7h5lTZNNWGxtPVu+aUvAaVDMf735HR0MUaV30BNsLFOEDms10iIHDG8kKeexwK+EBLVLcXkudOqhFghOiFeVmqp7EpDdA4GWQ= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705648153; c=relaxed/simple; bh=B4FqppSt2LDQB57hJ959RB88Rbm/8I/Enz2IwTTW/88=; h=From:To:Subject:Date:Message-Id:MIME-Version; b=umaRovsyPI59M5DyakqWbUr1kaRlRxFbtz8T2amNXTcJsqFYcyX1DxyujwWvOO0WDti+UkmHJccoJ1WLtDZmbEmRqur6I7PDegakDJZ+7uD2th8RiSatDXVQdK32nDA3W2SENDay6h9AOKVc0XQkkWMwF+PbmfFGvNB/r9QgRd8= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=zju.edu.cn; spf=pass smtp.mailfrom=zju.edu.cn; arc=none smtp.client-ip=20.231.56.155 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=zju.edu.cn Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=zju.edu.cn Received: from cmd.. (unknown [183.159.169.110]) by mail-app3 (Coremail) with SMTP id cC_KCgDnyjQAIKplWz1JAA--.63700S2; Fri, 19 Jan 2024 15:08:48 +0800 (CST) From: Lin Ma <linma@zju.edu.cn> To: davem@davemloft.net, edumazet@google.com, kuba@kernel.org, pabeni@redhat.com, dsahern@kernel.org, razor@blackwall.org, leon@kernel.org, linma@zju.edu.cn, haleyb.dev@gmail.com, ja@ssi.bg, judyhsiao@chromium.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH net-next v1] neighbour: complement nl_ntbl_parm_policy Date: Fri, 19 Jan 2024 15:08:47 +0800 Message-Id: <20240119070847.5402-1-linma@zju.edu.cn> X-Mailer: git-send-email 2.34.1 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: <linux-kernel.vger.kernel.org> List-Subscribe: <mailto:linux-kernel+subscribe@vger.kernel.org> List-Unsubscribe: <mailto:linux-kernel+unsubscribe@vger.kernel.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-CM-TRANSID: cC_KCgDnyjQAIKplWz1JAA--.63700S2 X-Coremail-Antispam: 1UD129KBjvJXoW7Gr43JryUuF1rZF4UJF4DXFb_yoW8Jry5pa yDu3429ayDZr47Aa9rXayv93WIgr1qqan8Xr17C34ay3s7tr1kC34Utry0vr1SyF4kJrya qa15Ar43JFWIvwUanT9S1TB71UUUUU7qnTZGkaVYY2UrUUUUjbIjqfuFe4nvWSU5nxnvy2 9KBjDU0xBIdaVrnRJUUU9K14x267AKxVW8JVW5JwAFc2x0x2IEx4CE42xK8VAvwI8IcIk0 rVWrJVCq3wAFIxvE14AKwVWUJVWUGwA2ocxC64kIII0Yj41l84x0c7CEw4AK67xGY2AK02 1l84ACjcxK6xIIjxv20xvE14v26w1j6s0DM28EF7xvwVC0I7IYx2IY6xkF7I0E14v26F4U JVW0owA2z4x0Y4vEx4A2jsIE14v26rxl6s0DM28EF7xvwVC2z280aVCY1x0267AKxVW0oV Cq3wAS0I0E0xvYzxvE52x082IY62kv0487Mc02F40EFcxC0VAKzVAqx4xG6I80ewAv7VC0 I7IYx2IY67AKxVWUGVWUXwAv7VC2z280aVAFwI0_Jr0_Gr1lOx8S6xCaFVCjc4AY6r1j6r 4UM4x0Y48IcxkI7VAKI48JM4x0x7Aq67IIx4CEVc8vx2IErcIFxwACI402YVCY1x02628v n2kIc2xKxwCY1x0262kKe7AKxVWUtVW8ZwCY02Avz4vE14v_GF4l42xK82IYc2Ij64vIr4 1l4I8I3I0E4IkC6x0Yz7v_Jr0_Gr1lx2IqxVAqx4xG67AKxVWUJVWUGwC20s026x8GjcxK 67AKxVWUGVWUWwC2zVAF1VAY17CE14v26r1q6r43MIIYrxkI7VAKI48JMIIF0xvE2Ix0cI 8IcVAFwI0_Jr0_JF4lIxAIcVC0I7IYx2IY6xkF7I0E14v26r4j6F4UMIIF0xvE42xK8VAv wI8IcIk0rVWUJVWUCwCI42IY6I8E87Iv67AKxVWUJVW8JwCI42IY6I8E87Iv6xkF7I0E14 v26r4j6r4UJbIYCTnIWIevJa73UjIFyTuYvjfUr4SrUUUUU X-CM-SenderInfo: qtrwiiyqvtljo62m3hxhgxhubq/ X-getmail-retrieved-from-mailbox: INBOX X-GMAIL-THRID: 1788501737158507385 X-GMAIL-MSGID: 1788501737158507385 |
Series |
[net-next,v1] neighbour: complement nl_ntbl_parm_policy
|
|
Commit Message
Lin Ma
Jan. 19, 2024, 7:08 a.m. UTC
In the neightbl_set function, the attributes array is parsed and validated
using the nl_ntbl_parm_policy policy. However, this policy overlooks the
NDTPA_QUEUE_LENBYTES attribute since the commit 6b3f8674bccb ("[NEIGH]:
Convert neighbour table modification to new netlink api").
As a result, no validation is performed when accessing the
NDTPA_QUEUE_LENBYTES attribute.
This patch addresses this issue by complementing the policy to ensure that
every attribute being accessed is properly validated.
Signed-off-by: Lin Ma <linma@zju.edu.cn>
---
net/core/neighbour.c | 1 +
1 file changed, 1 insertion(+)
Comments
On Fri, Jan 19, 2024 at 03:08:47PM +0800, Lin Ma wrote: > In the neightbl_set function, the attributes array is parsed and validated > using the nl_ntbl_parm_policy policy. However, this policy overlooks the > NDTPA_QUEUE_LENBYTES attribute since the commit 6b3f8674bccb ("[NEIGH]: > Convert neighbour table modification to new netlink api"). > As a result, no validation is performed when accessing the > NDTPA_QUEUE_LENBYTES attribute. > > This patch addresses this issue by complementing the policy to ensure that > every attribute being accessed is properly validated. > > Signed-off-by: Lin Ma <linma@zju.edu.cn> > --- > net/core/neighbour.c | 1 + > 1 file changed, 1 insertion(+) > > diff --git a/net/core/neighbour.c b/net/core/neighbour.c > index 552719c3bbc3..ece0447cf409 100644 > --- a/net/core/neighbour.c > +++ b/net/core/neighbour.c > @@ -2293,6 +2293,7 @@ static const struct nla_policy nl_neightbl_policy[NDTA_MAX+1] = { > static const struct nla_policy nl_ntbl_parm_policy[NDTPA_MAX+1] = { > [NDTPA_IFINDEX] = { .type = NLA_U32 }, > [NDTPA_QUEUE_LEN] = { .type = NLA_U32 }, > + [NPTPA_QUEUE_LEN_BYTES] = { .type = NLA_U32 }, This does not compile because NPTPA_QUEUE_LEN_BYTES is not present in net-next. > [NDTPA_PROXY_QLEN] = { .type = NLA_U32 }, > [NDTPA_APP_PROBES] = { .type = NLA_U32 }, > [NDTPA_UCAST_PROBES] = { .type = NLA_U32 }, ## Form letter - net-next-closed [adapted from text by Jakub] The merge window for v6.8 has begun and therefore net-next is closed for new drivers, features, code refactoring and optimizations. We are currently accepting bug fixes only. Please repost when net-next reopens on or after 22nd January. RFC patches sent for review only are obviously welcome at any time. See: https://www.kernel.org/doc/html/next/process/maintainer-netdev.html#development-cycle -- pw-bot: defer
Hi Lin, kernel test robot noticed the following build errors: [auto build test ERROR on net-next/main] url: https://github.com/intel-lab-lkp/linux/commits/Lin-Ma/neighbour-complement-nl_ntbl_parm_policy/20240119-151255 base: net-next/main patch link: https://lore.kernel.org/r/20240119070847.5402-1-linma%40zju.edu.cn patch subject: [PATCH net-next v1] neighbour: complement nl_ntbl_parm_policy config: arm-randconfig-001-20240120 (https://download.01.org/0day-ci/archive/20240120/202401200717.gbJdfFML-lkp@intel.com/config) compiler: clang version 18.0.0git (https://github.com/llvm/llvm-project d92ce344bf641e6bb025b41b3f1a77dd25e2b3e9) reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20240120/202401200717.gbJdfFML-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp@intel.com> | Closes: https://lore.kernel.org/oe-kbuild-all/202401200717.gbJdfFML-lkp@intel.com/ All errors (new ones prefixed by >>): >> net/core/neighbour.c:2296:3: error: use of undeclared identifier 'NPTPA_QUEUE_LEN_BYTES'; did you mean 'NDTPA_QUEUE_LENBYTES'? 2296 | [NPTPA_QUEUE_LEN_BYTES] = { .type = NLA_U32 }, | ^~~~~~~~~~~~~~~~~~~~~ | NDTPA_QUEUE_LENBYTES include/uapi/linux/neighbour.h:160:2: note: 'NDTPA_QUEUE_LENBYTES' declared here 160 | NDTPA_QUEUE_LENBYTES, /* u32 */ | ^ 1 error generated. vim +2296 net/core/neighbour.c 2292 2293 static const struct nla_policy nl_ntbl_parm_policy[NDTPA_MAX+1] = { 2294 [NDTPA_IFINDEX] = { .type = NLA_U32 }, 2295 [NDTPA_QUEUE_LEN] = { .type = NLA_U32 }, > 2296 [NPTPA_QUEUE_LEN_BYTES] = { .type = NLA_U32 }, 2297 [NDTPA_PROXY_QLEN] = { .type = NLA_U32 }, 2298 [NDTPA_APP_PROBES] = { .type = NLA_U32 }, 2299 [NDTPA_UCAST_PROBES] = { .type = NLA_U32 }, 2300 [NDTPA_MCAST_PROBES] = { .type = NLA_U32 }, 2301 [NDTPA_MCAST_REPROBES] = { .type = NLA_U32 }, 2302 [NDTPA_BASE_REACHABLE_TIME] = { .type = NLA_U64 }, 2303 [NDTPA_GC_STALETIME] = { .type = NLA_U64 }, 2304 [NDTPA_DELAY_PROBE_TIME] = { .type = NLA_U64 }, 2305 [NDTPA_RETRANS_TIME] = { .type = NLA_U64 }, 2306 [NDTPA_ANYCAST_DELAY] = { .type = NLA_U64 }, 2307 [NDTPA_PROXY_DELAY] = { .type = NLA_U64 }, 2308 [NDTPA_LOCKTIME] = { .type = NLA_U64 }, 2309 [NDTPA_INTERVAL_PROBE_TIME_MS] = { .type = NLA_U64, .min = 1 }, 2310 }; 2311
Hello Simon, > On Fri, Jan 19, 2024 at 03:08:47PM +0800, Lin Ma wrote: > > In the neightbl_set function, the attributes array is parsed and validated > > using the nl_ntbl_parm_policy policy. However, this policy overlooks the > > NDTPA_QUEUE_LENBYTES attribute since the commit 6b3f8674bccb ("[NEIGH]: > > Convert neighbour table modification to new netlink api"). > > As a result, no validation is performed when accessing the > > NDTPA_QUEUE_LENBYTES attribute. > > > > This patch addresses this issue by complementing the policy to ensure that > > every attribute being accessed is properly validated. > > > > Signed-off-by: Lin Ma <linma@zju.edu.cn> > > --- > > net/core/neighbour.c | 1 + > > 1 file changed, 1 insertion(+) > > > > diff --git a/net/core/neighbour.c b/net/core/neighbour.c > > index 552719c3bbc3..ece0447cf409 100644 > > --- a/net/core/neighbour.c > > +++ b/net/core/neighbour.c > > @@ -2293,6 +2293,7 @@ static const struct nla_policy nl_neightbl_policy[NDTA_MAX+1] = { > > static const struct nla_policy nl_ntbl_parm_policy[NDTPA_MAX+1] = { > > [NDTPA_IFINDEX] = { .type = NLA_U32 }, > > [NDTPA_QUEUE_LEN] = { .type = NLA_U32 }, > > + [NPTPA_QUEUE_LEN_BYTES] = { .type = NLA_U32 }, > > This does not compile because NPTPA_QUEUE_LEN_BYTES is > not present in net-next. > > > [NDTPA_PROXY_QLEN] = { .type = NLA_U32 }, > > [NDTPA_APP_PROBES] = { .type = NLA_U32 }, > > [NDTPA_UCAST_PROBES] = { .type = NLA_U32 }, > > > ## Form letter - net-next-closed > > [adapted from text by Jakub] > > The merge window for v6.8 has begun and therefore net-next is closed > for new drivers, features, code refactoring and optimizations. > We are currently accepting bug fixes only. > > Please repost when net-next reopens on or after 22nd January. > > RFC patches sent for review only are obviously welcome at any time. > > See: https://www.kernel.org/doc/html/next/process/maintainer-netdev.html#development-cycle > -- > pw-bot: defer My bad, I prepare this patch on the linux-stable tree and never thought this would happen. Will also compile on the right tree next time. So should I send this to net which has this attribute or something? Thanks are really Sorry Lin
On Sat, Jan 20, 2024 at 08:53:50AM +0800, Lin Ma wrote: > Hello Simon, .. > My bad, I prepare this patch on the linux-stable tree and never thought this would happen. > Will also compile on the right tree next time. > > So should I send this to net which has this attribute or something? Hi Lin Ma, If it is a fix for net, then it should be based on net and targeted at net. Subject: [PATCH net] ... Else, it should be based on and targeted at net-next. Either way, I think reposting is a good idea. Although in the net-next case, please note that it is closed, so please wait for it to reopen before posting patches for it. It is likely to reopen next week. Does that help?
Hi Lin, kernel test robot noticed the following build errors: [auto build test ERROR on net-next/main] url: https://github.com/intel-lab-lkp/linux/commits/Lin-Ma/neighbour-complement-nl_ntbl_parm_policy/20240119-151255 base: net-next/main patch link: https://lore.kernel.org/r/20240119070847.5402-1-linma%40zju.edu.cn patch subject: [PATCH net-next v1] neighbour: complement nl_ntbl_parm_policy config: m68k-allmodconfig (https://download.01.org/0day-ci/archive/20240120/202401202347.sHNru6Y6-lkp@intel.com/config) compiler: m68k-linux-gcc (GCC) 13.2.0 reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20240120/202401202347.sHNru6Y6-lkp@intel.com/reproduce) If you fix the issue in a separate patch/commit (i.e. not just a new version of the same patch/commit), kindly add following tags | Reported-by: kernel test robot <lkp@intel.com> | Closes: https://lore.kernel.org/oe-kbuild-all/202401202347.sHNru6Y6-lkp@intel.com/ All errors (new ones prefixed by >>): >> net/core/neighbour.c:2296:10: error: 'NPTPA_QUEUE_LEN_BYTES' undeclared here (not in a function); did you mean 'NDTPA_QUEUE_LENBYTES'? 2296 | [NPTPA_QUEUE_LEN_BYTES] = { .type = NLA_U32 }, | ^~~~~~~~~~~~~~~~~~~~~ | NDTPA_QUEUE_LENBYTES >> net/core/neighbour.c:2296:10: error: array index in initializer not of integer type net/core/neighbour.c:2296:10: note: (near initialization for 'nl_ntbl_parm_policy') net/core/neighbour.c:2298:43: warning: initialized field overwritten [-Woverride-init] 2298 | [NDTPA_APP_PROBES] = { .type = NLA_U32 }, | ^ net/core/neighbour.c:2298:43: note: (near initialization for 'nl_ntbl_parm_policy[9]') vim +2296 net/core/neighbour.c 2292 2293 static const struct nla_policy nl_ntbl_parm_policy[NDTPA_MAX+1] = { 2294 [NDTPA_IFINDEX] = { .type = NLA_U32 }, 2295 [NDTPA_QUEUE_LEN] = { .type = NLA_U32 }, > 2296 [NPTPA_QUEUE_LEN_BYTES] = { .type = NLA_U32 }, 2297 [NDTPA_PROXY_QLEN] = { .type = NLA_U32 }, 2298 [NDTPA_APP_PROBES] = { .type = NLA_U32 }, 2299 [NDTPA_UCAST_PROBES] = { .type = NLA_U32 }, 2300 [NDTPA_MCAST_PROBES] = { .type = NLA_U32 }, 2301 [NDTPA_MCAST_REPROBES] = { .type = NLA_U32 }, 2302 [NDTPA_BASE_REACHABLE_TIME] = { .type = NLA_U64 }, 2303 [NDTPA_GC_STALETIME] = { .type = NLA_U64 }, 2304 [NDTPA_DELAY_PROBE_TIME] = { .type = NLA_U64 }, 2305 [NDTPA_RETRANS_TIME] = { .type = NLA_U64 }, 2306 [NDTPA_ANYCAST_DELAY] = { .type = NLA_U64 }, 2307 [NDTPA_PROXY_DELAY] = { .type = NLA_U64 }, 2308 [NDTPA_LOCKTIME] = { .type = NLA_U64 }, 2309 [NDTPA_INTERVAL_PROBE_TIME_MS] = { .type = NLA_U64, .min = 1 }, 2310 }; 2311
diff --git a/net/core/neighbour.c b/net/core/neighbour.c index 552719c3bbc3..ece0447cf409 100644 --- a/net/core/neighbour.c +++ b/net/core/neighbour.c @@ -2293,6 +2293,7 @@ static const struct nla_policy nl_neightbl_policy[NDTA_MAX+1] = { static const struct nla_policy nl_ntbl_parm_policy[NDTPA_MAX+1] = { [NDTPA_IFINDEX] = { .type = NLA_U32 }, [NDTPA_QUEUE_LEN] = { .type = NLA_U32 }, + [NPTPA_QUEUE_LEN_BYTES] = { .type = NLA_U32 }, [NDTPA_PROXY_QLEN] = { .type = NLA_U32 }, [NDTPA_APP_PROBES] = { .type = NLA_U32 }, [NDTPA_UCAST_PROBES] = { .type = NLA_U32 },