[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20161205223415.GA14689@salvia>
Date: Mon, 5 Dec 2016 23:34:15 +0100
From: Pablo Neira Ayuso <pablo@...filter.org>
To: Florian Westphal <fw@...len.de>
Cc: Eric Dumazet <eric.dumazet@...il.com>,
Willem de Bruijn <willemdebruijn.kernel@...il.com>,
netfilter-devel@...r.kernel.org, netdev@...r.kernel.org,
daniel@...earbox.net, Willem de Bruijn <willemb@...gle.com>
Subject: Re: [PATCH nf-next] netfilter: xt_bpf: support ebpf
On Mon, Dec 05, 2016 at 10:30:01PM +0100, Florian Westphal wrote:
> Eric Dumazet <eric.dumazet@...il.com> wrote:
> > On Mon, 2016-12-05 at 15:28 -0500, Willem de Bruijn wrote:
> > > From: Willem de Bruijn <willemb@...gle.com>
> > >
> > > Add support for attaching an eBPF object by file descriptor.
> > >
> > > The iptables binary can be called with a path to an elf object or a
> > > pinned bpf object. Also pass the mode and path to the kernel to be
> > > able to return it later for iptables dump and save.
> > >
> > > Signed-off-by: Willem de Bruijn <willemb@...gle.com>
> > > ---
> >
> > Assuming there is no simple way to get variable matchsize in iptables,
> > this looks good to me, thanks.
>
> It should be possible by setting kernel .matchsize to ~0 which
> suppresses strict size enforcement.
>
> Its currently only used by ebt_among, but this should work for any xtables
> module.
This is likely going to trigger a large rewrite of the core userspace
iptables codebase, and likely going to pull part of the mess we have
in ebtables into iptables. So I'd prefer not to follow this path.
Powered by blists - more mailing lists