summaryrefslogtreecommitdiff
path: root/server/TetherController.cpp
diff options
context:
space:
mode:
authorMaciej Żenczykowski <maze@google.com>2021-01-17 03:14:20 -0800
committerMaciej Żenczykowski <maze@google.com>2021-01-19 23:18:46 -0800
commit0e5d26f4820a84f31b353f4859dbb856e3b55e66 (patch)
treef515911156069f0f7b679d5c9a6aab0d0f043443 /server/TetherController.cpp
parent44159383b792cfe5c867dbcf8251f2f95bc47597 (diff)
bpf is always supported
Test: builds, atest, TreeHugger Bug: 167500195 Signed-off-by: Maciej Żenczykowski <maze@google.com> Change-Id: Ia1a45de523bb20d451df2041a9cc3fe9930f6686
Diffstat (limited to 'server/TetherController.cpp')
-rw-r--r--server/TetherController.cpp6
1 files changed, 0 insertions, 6 deletions
diff --git a/server/TetherController.cpp b/server/TetherController.cpp
index 2445fb70..52c397fc 100644
--- a/server/TetherController.cpp
+++ b/server/TetherController.cpp
@@ -203,8 +203,6 @@ bool TetherController::disableForwarding(const char* requester) {
}
void TetherController::maybeInitMaps() {
- if (!bpf::isBpfSupported()) return;
-
// Open BPF maps, ignoring errors because the device might not support BPF offload.
int fd = getTetherIngressMapFd();
if (fd >= 0) {
@@ -1094,8 +1092,6 @@ Result<void> TetherController::setBpfLimit(uint32_t ifIndex, uint64_t limit) {
}
void TetherController::maybeStartBpf(const char* extIface) {
- if (!bpf::isBpfSupported()) return;
-
// TODO: perhaps ignore IPv4-only interface because IPv4 traffic downstream is not supported.
int ifIndex = if_nametoindex(extIface);
if (!ifIndex) {
@@ -1126,8 +1122,6 @@ void TetherController::maybeStartBpf(const char* extIface) {
}
void TetherController::maybeStopBpf(const char* extIface) {
- if (!bpf::isBpfSupported()) return;
-
// TODO: perhaps ignore IPv4-only interface because IPv4 traffic downstream is not supported.
int ifIndex = if_nametoindex(extIface);
if (!ifIndex) {