diff options
author | Daniel Borkmann <daniel@iogearbox.net> | 2017-02-16 22:24:49 +0100 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2017-02-17 13:40:04 -0500 |
commit | 9383191da4e40360a5d880fbe6bb03911c61621b (patch) | |
tree | c92770092ea2f7d4d3fdc207c80b8266547572f6 /arch/x86/net | |
parent | c78f8bdfa11fcceb9723c61212e4bd8f76c87f9e (diff) | |
download | linux-9383191da4e40360a5d880fbe6bb03911c61621b.tar.gz linux-9383191da4e40360a5d880fbe6bb03911c61621b.tar.bz2 linux-9383191da4e40360a5d880fbe6bb03911c61621b.zip |
bpf: remove stubs for cBPF from arch code
Remove the dummy bpf_jit_compile() stubs for eBPF JITs and make
that a single __weak function in the core that can be overridden
similarly to the eBPF one. Also remove stale pr_err() mentions
of bpf_jit_compile.
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'arch/x86/net')
-rw-r--r-- | arch/x86/net/bpf_jit_comp.c | 8 |
1 files changed, 2 insertions, 6 deletions
diff --git a/arch/x86/net/bpf_jit_comp.c b/arch/x86/net/bpf_jit_comp.c index bb660e53cbd6..26123d0ae13a 100644 --- a/arch/x86/net/bpf_jit_comp.c +++ b/arch/x86/net/bpf_jit_comp.c @@ -1067,13 +1067,13 @@ common_load: ilen = prog - temp; if (ilen > BPF_MAX_INSN_SIZE) { - pr_err("bpf_jit_compile fatal insn size error\n"); + pr_err("bpf_jit: fatal insn size error\n"); return -EFAULT; } if (image) { if (unlikely(proglen + ilen > oldproglen)) { - pr_err("bpf_jit_compile fatal error\n"); + pr_err("bpf_jit: fatal error\n"); return -EFAULT; } memcpy(image + proglen, temp, ilen); @@ -1085,10 +1085,6 @@ common_load: return proglen; } -void bpf_jit_compile(struct bpf_prog *prog) -{ -} - struct bpf_prog *bpf_int_jit_compile(struct bpf_prog *prog) { struct bpf_binary_header *header = NULL; |