lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 30 Mar 2021 02:48:43 +0000 From: He Fengqing <hefengqing@...wei.com> To: <bpf@...r.kernel.org>, <netdev@...r.kernel.org>, <linux-kernel@...r.kernel.org> CC: <ast@...nel.org>, <daniel@...earbox.net>, <andrii@...nel.org>, <kafai@...com>, <ongliubraving@...com>, <yhs@...com>, <john.fastabend@...il.com>, <kpsingh@...nel.org> Subject: [Patch bpf-next] net: filter: Remove unused bpf_load_pointer Remove unused bpf_load_pointer function in filter.h Signed-off-by: He Fengqing <hefengqing@...wei.com> --- include/linux/filter.h | 9 --------- 1 file changed, 9 deletions(-) diff --git a/include/linux/filter.h b/include/linux/filter.h index eecfd82db648..9a09547bc7ba 100644 --- a/include/linux/filter.h +++ b/include/linux/filter.h @@ -1246,15 +1246,6 @@ static inline u16 bpf_anc_helper(const struct sock_filter *ftest) void *bpf_internal_load_pointer_neg_helper(const struct sk_buff *skb, int k, unsigned int size); -static inline void *bpf_load_pointer(const struct sk_buff *skb, int k, - unsigned int size, void *buffer) -{ - if (k >= 0) - return skb_header_pointer(skb, k, size, buffer); - - return bpf_internal_load_pointer_neg_helper(skb, k, size); -} - static inline int bpf_tell_extensions(void) { return SKF_AD_MAX; -- 2.25.1
Powered by blists - more mailing lists