This website requires JavaScript.
Explore
Help
Sign In
hollalinux
/
linux-sg2042
mirror of
https://github.com/sophgo/linux-riscv.git
Watch
1
Star
0
Fork
You've already forked linux-sg2042
0
Code
Issues
Packages
Projects
Releases
Wiki
Activity
c49a0a8439
linux-sg2042
/
kernel
/
bpf
/
Makefile
3 lines
97 B
Makefile
Raw
Normal View
History
Unescape
Escape
bpf: split eBPF out of NET introduce two configs: - hidden CONFIG_BPF to select eBPF interpreter that classic socket filters depend on - visible CONFIG_BPF_SYSCALL (default off) that tracing and sockets can use that solves several problems: - tracing and others that wish to use eBPF don't need to depend on NET. They can use BPF_SYSCALL to allow loading from userspace or select BPF to use it directly from kernel in NET-less configs. - in 3.18 programs cannot be attached to events yet, so don't force it on - when the rest of eBPF infra is there in 3.19+, it's still useful to switch it off to minimize kernel size bloat-o-meter on x64 shows: add/remove: 0/60 grow/shrink: 0/2 up/down: 0/-15601 (-15601) tested with many different config combinations. Hopefully didn't miss anything. Signed-off-by: Alexei Starovoitov <ast@plumgrid.com> Acked-by: Daniel Borkmann <dborkman@redhat.com> Signed-off-by: David S. Miller <davem@davemloft.net>
2014-10-24 09:41:08 +08:00
obj-y
:=
core.o
bpf: allow eBPF programs to use maps expose bpf_map_lookup_elem(), bpf_map_update_elem(), bpf_map_delete_elem() map accessors to eBPF programs Signed-off-by: Alexei Starovoitov <ast@plumgrid.com> Signed-off-by: David S. Miller <davem@davemloft.net>
2014-11-14 09:36:49 +08:00
obj-$(CONFIG_BPF_SYSCALL)
+=
syscall.o verifier.o hashtab.o arraymap.o helpers.o