From mboxrd@z Thu Jan 1 00:00:00 1970 From: Pablo Neira Ayuso Subject: Re: [PATCH nf-next] netfilter: xt_bpf: support ebpf Date: Tue, 6 Dec 2016 00:22:14 +0100 Message-ID: <20161205232214.GA15825@salvia> References: <1480969684-74414-1-git-send-email-willemdebruijn.kernel@gmail.com> <1480972006.18162.559.camel@edumazet-glaptop3.roam.corp.google.com> <20161205213001.GA16819@breakpoint.cc> <20161205223415.GA14689@salvia> <20161205230055.GA15379@salvia> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: netfilter-devel@vger.kernel.org, Network Development , Daniel Borkmann , Willem de Bruijn , Florian Westphal , Eric Dumazet To: Willem de Bruijn Return-path: Content-Disposition: inline In-Reply-To: Sender: netdev-owner@vger.kernel.org List-Id: netfilter-devel.vger.kernel.org On Mon, Dec 05, 2016 at 06:06:05PM -0500, Willem de Bruijn wrote: [...] > Eric also suggests a private variable to avoid being subject to > changes to PATH_MAX. Then we can indeed also choose an arbitrary lower > length than current PATH_MAX. Good. > FWIW, there is a workaround for users with deeply nested paths: the > path passed does not have to be absolute. It is literally what is > passed on the command line to iptables right now, including relative > addresses. If iptables userspace always expects to have the bpf file repository in some given location (suggesting to have a directory that we specify at ./configure time, similar to what we do with connlabel.conf), then I think we can rely on relative paths. Would this be flexible enough for your usecase?