diff options
author | Willem de Bruijn <willemb@google.com> | 2016-12-08 17:09:38 -0500 |
---|---|---|
committer | Pablo Neira Ayuso <pablo@netfilter.org> | 2016-12-10 14:04:28 +0100 |
commit | f17f9ace8a84f6986235fc2d0fedc1fd5148a3bd (patch) | |
tree | d6bb856a7278cb57c8280fb18f8685ae894b554a /configure.ac | |
parent | bb50942a62b2d76810babc0b1150895d9e5ef229 (diff) |
extensions: libxt_bpf: support ebpf pinned objects
Exercise the new kernel feature introduced in commit 2c16d6033264
("netfilter: xt_bpf: support ebpf") to load pinned eBPF programs.
The new interface allows instantiating a bpf match using
-m bpf --object-pinned ${PATH}
where ${PATH} points to a node in a bpf virtual filesystem. See
also the revised man page.
Signed-off-by: Willem de Bruijn <willemb@google.com>
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'configure.ac')
-rw-r--r-- | configure.ac | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/configure.ac b/configure.ac index bb9e7795..6ae63f83 100644 --- a/configure.ac +++ b/configure.ac @@ -89,7 +89,7 @@ blacklist_a_modules="" blacklist_4_modules="" blacklist_6_modules="" -AC_CHECK_HEADERS([linux/dccp.h linux/ip_vs.h linux/magic.h linux/proc_fs.h]) +AC_CHECK_HEADERS([linux/dccp.h linux/ip_vs.h linux/magic.h linux/proc_fs.h linux/bpf.h]) if test "$ac_cv_header_linux_dccp_h" != "yes"; then blacklist_modules="$blacklist_modules dccp"; fi; |