Add tcp process detection with ebpf
This commit is contained in:
@@ -1,6 +1,7 @@
|
||||
package interception
|
||||
|
||||
import (
|
||||
"github.com/safing/portmaster/firewall/interception/ebpf"
|
||||
"github.com/safing/portmaster/firewall/interception/nfq"
|
||||
"github.com/safing/portmaster/network"
|
||||
"github.com/safing/portmaster/network/packet"
|
||||
@@ -8,11 +9,13 @@ import (
|
||||
|
||||
// start starts the interception.
|
||||
func start(ch chan packet.Packet) error {
|
||||
ebpf.StartEBPFWorker(ch)
|
||||
return StartNfqueueInterception(ch)
|
||||
}
|
||||
|
||||
// stop starts the interception.
|
||||
func stop() error {
|
||||
ebpf.StopEBPFWorker()
|
||||
return StopNfqueueInterception()
|
||||
}
|
||||
|
||||
|
||||
Reference in New Issue
Block a user