Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux

bpf, cgroup: Remove unused exports

Except for a few of the networking hooks called from modular ipv4
or ipv6 code, all of hooks are just called from guaranteed to be
built-in code.

Signed-off-by: Christoph Hellwig <hch@lst.de>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Andrey Ignatov <rdna@fb.com>
Link: https://lore.kernel.org/bpf/20200424064338.538313-2-hch@lst.de

authored by

Christoph Hellwig and committed by
Daniel Borkmann
8c1b2bf1 e411eb25

-4
-4
kernel/bpf/cgroup.c
··· 1054 1054 1055 1055 return !allow; 1056 1056 } 1057 - EXPORT_SYMBOL(__cgroup_bpf_check_dev_permission); 1058 1057 1059 1058 static const struct bpf_func_proto * 1060 1059 cgroup_base_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog) ··· 1206 1207 1207 1208 return ret == 1 ? 0 : -EPERM; 1208 1209 } 1209 - EXPORT_SYMBOL(__cgroup_bpf_run_filter_sysctl); 1210 1210 1211 1211 #ifdef CONFIG_NET 1212 1212 static bool __cgroup_bpf_prog_array_is_empty(struct cgroup *cgrp, ··· 1310 1312 sockopt_free_buf(&ctx); 1311 1313 return ret; 1312 1314 } 1313 - EXPORT_SYMBOL(__cgroup_bpf_run_filter_setsockopt); 1314 1315 1315 1316 int __cgroup_bpf_run_filter_getsockopt(struct sock *sk, int level, 1316 1317 int optname, char __user *optval, ··· 1396 1399 sockopt_free_buf(&ctx); 1397 1400 return ret; 1398 1401 } 1399 - EXPORT_SYMBOL(__cgroup_bpf_run_filter_getsockopt); 1400 1402 #endif 1401 1403 1402 1404 static ssize_t sysctl_cpy_dir(const struct ctl_dir *dir, char **bufp,