diff options
| author | Maciej Żenczykowski <maze@google.com> | 2021-01-17 03:14:20 -0800 |
|---|---|---|
| committer | Maciej Żenczykowski <maze@google.com> | 2021-01-19 23:18:46 -0800 |
| commit | 0e5d26f4820a84f31b353f4859dbb856e3b55e66 (patch) | |
| tree | f515911156069f0f7b679d5c9a6aab0d0f043443 /server/TetherController.cpp | |
| parent | 44159383b792cfe5c867dbcf8251f2f95bc47597 (diff) | |
bpf is always supported
Test: builds, atest, TreeHugger
Bug: 167500195
Signed-off-by: Maciej Żenczykowski <maze@google.com>
Change-Id: Ia1a45de523bb20d451df2041a9cc3fe9930f6686
Diffstat (limited to 'server/TetherController.cpp')
| -rw-r--r-- | server/TetherController.cpp | 6 |
1 files changed, 0 insertions, 6 deletions
diff --git a/server/TetherController.cpp b/server/TetherController.cpp index 2445fb70..52c397fc 100644 --- a/server/TetherController.cpp +++ b/server/TetherController.cpp @@ -203,8 +203,6 @@ bool TetherController::disableForwarding(const char* requester) { } void TetherController::maybeInitMaps() { - if (!bpf::isBpfSupported()) return; - // Open BPF maps, ignoring errors because the device might not support BPF offload. int fd = getTetherIngressMapFd(); if (fd >= 0) { @@ -1094,8 +1092,6 @@ Result<void> TetherController::setBpfLimit(uint32_t ifIndex, uint64_t limit) { } void TetherController::maybeStartBpf(const char* extIface) { - if (!bpf::isBpfSupported()) return; - // TODO: perhaps ignore IPv4-only interface because IPv4 traffic downstream is not supported. int ifIndex = if_nametoindex(extIface); if (!ifIndex) { @@ -1126,8 +1122,6 @@ void TetherController::maybeStartBpf(const char* extIface) { } void TetherController::maybeStopBpf(const char* extIface) { - if (!bpf::isBpfSupported()) return; - // TODO: perhaps ignore IPv4-only interface because IPv4 traffic downstream is not supported. int ifIndex = if_nametoindex(extIface); if (!ifIndex) { |
