Message ID | 20230422073544.17634-1-fw@strlen.de (mailing list archive) |
---|---|
State | Accepted |
Commit | 6d26d985eeda89faedabbcf6607c37454b9691b0 |
Delegated to: | BPF |
Headers | show |
Series | [bpf-next] bpf: fix link failure with NETFILTER=y INET=n | expand |
On Sat, Apr 22, 2023 at 12:35 AM Florian Westphal <fw@strlen.de> wrote: > > Explicitly check if NETFILTER_BPF_LINK is enabled, else configs > that have NETFILTER=y but CONFIG_INET=n fail to link: netfilter=y and inet=n ? wow. Didn't realize such a config is possible. Thanks for the quick fix. Applied. > > kernel/bpf/syscall.o: undefined reference to `netfilter_prog_ops' > > kernel/bpf/verifier.o: undefined reference to `netfilter_verifier_ops'
Hello: This patch was applied to bpf/bpf-next.git (master) by Alexei Starovoitov <ast@kernel.org>: On Sat, 22 Apr 2023 09:35:44 +0200 you wrote: > Explicitly check if NETFILTER_BPF_LINK is enabled, else configs > that have NETFILTER=y but CONFIG_INET=n fail to link: > > > kernel/bpf/syscall.o: undefined reference to `netfilter_prog_ops' > > kernel/bpf/verifier.o: undefined reference to `netfilter_verifier_ops' > > Fixes: fd9c663b9ad6 ("bpf: minimal support for programs hooked into netfilter framework") > Reported-by: kernel test robot <lkp@intel.com> > Link: https://lore.kernel.org/oe-kbuild-all/202304220903.fRZTJtxe-lkp@intel.com/ > Signed-off-by: Florian Westphal <fw@strlen.de> > > [...] Here is the summary with links: - [bpf-next] bpf: fix link failure with NETFILTER=y INET=n https://git.kernel.org/bpf/bpf-next/c/6d26d985eeda You are awesome, thank you!
diff --git a/include/linux/bpf_types.h b/include/linux/bpf_types.h index 39a999abb0ce..fc0d6f32c687 100644 --- a/include/linux/bpf_types.h +++ b/include/linux/bpf_types.h @@ -79,7 +79,7 @@ BPF_PROG_TYPE(BPF_PROG_TYPE_LSM, lsm, #endif BPF_PROG_TYPE(BPF_PROG_TYPE_SYSCALL, bpf_syscall, void *, void *) -#ifdef CONFIG_NETFILTER +#ifdef CONFIG_NETFILTER_BPF_LINK BPF_PROG_TYPE(BPF_PROG_TYPE_NETFILTER, netfilter, struct bpf_nf_ctx, struct bpf_nf_ctx) #endif