Searched hist:ccc007e4a746bb592d3e72106f00241f81d51410 (Results 1 – 5 of 5) sorted by relevance
/openbmc/linux/include/uapi/linux/tc_ematch/ |
H A D | tc_em_ipt.h | ccc007e4a746bb592d3e72106f00241f81d51410 Thu Feb 15 11:42:43 CST 2018 Eyal Birger <eyal.birger@gmail.com> net: sched: add em_ipt ematch for calling xtables matches
The commit a new tc ematch for using netfilter xtable matches.
This allows early classification as well as mirroning/redirecting traffic based on logic implemented in netfilter extensions.
Current supported use case is classification based on the incoming IPSec state used during decpsulation using the 'policy' iptables extension (xt_policy).
The module dynamically fetches the netfilter match module and calls it using a fake xt_action_param structure based on validated userspace provided parameters.
As the xt_policy match does not access skb->data, no skb modifications are needed on match.
Signed-off-by: Eyal Birger <eyal.birger@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
/openbmc/linux/net/sched/ |
H A D | em_ipt.c | ccc007e4a746bb592d3e72106f00241f81d51410 Thu Feb 15 11:42:43 CST 2018 Eyal Birger <eyal.birger@gmail.com> net: sched: add em_ipt ematch for calling xtables matches
The commit a new tc ematch for using netfilter xtable matches.
This allows early classification as well as mirroning/redirecting traffic based on logic implemented in netfilter extensions.
Current supported use case is classification based on the incoming IPSec state used during decpsulation using the 'policy' iptables extension (xt_policy).
The module dynamically fetches the netfilter match module and calls it using a fake xt_action_param structure based on validated userspace provided parameters.
As the xt_policy match does not access skb->data, no skb modifications are needed on match.
Signed-off-by: Eyal Birger <eyal.birger@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | Makefile | ccc007e4a746bb592d3e72106f00241f81d51410 Thu Feb 15 11:42:43 CST 2018 Eyal Birger <eyal.birger@gmail.com> net: sched: add em_ipt ematch for calling xtables matches
The commit a new tc ematch for using netfilter xtable matches.
This allows early classification as well as mirroning/redirecting traffic based on logic implemented in netfilter extensions.
Current supported use case is classification based on the incoming IPSec state used during decpsulation using the 'policy' iptables extension (xt_policy).
The module dynamically fetches the netfilter match module and calls it using a fake xt_action_param structure based on validated userspace provided parameters.
As the xt_policy match does not access skb->data, no skb modifications are needed on match.
Signed-off-by: Eyal Birger <eyal.birger@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
H A D | Kconfig | ccc007e4a746bb592d3e72106f00241f81d51410 Thu Feb 15 11:42:43 CST 2018 Eyal Birger <eyal.birger@gmail.com> net: sched: add em_ipt ematch for calling xtables matches
The commit a new tc ematch for using netfilter xtable matches.
This allows early classification as well as mirroning/redirecting traffic based on logic implemented in netfilter extensions.
Current supported use case is classification based on the incoming IPSec state used during decpsulation using the 'policy' iptables extension (xt_policy).
The module dynamically fetches the netfilter match module and calls it using a fake xt_action_param structure based on validated userspace provided parameters.
As the xt_policy match does not access skb->data, no skb modifications are needed on match.
Signed-off-by: Eyal Birger <eyal.birger@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|
/openbmc/linux/include/uapi/linux/ |
H A D | pkt_cls.h | ccc007e4a746bb592d3e72106f00241f81d51410 Thu Feb 15 11:42:43 CST 2018 Eyal Birger <eyal.birger@gmail.com> net: sched: add em_ipt ematch for calling xtables matches
The commit a new tc ematch for using netfilter xtable matches.
This allows early classification as well as mirroning/redirecting traffic based on logic implemented in netfilter extensions.
Current supported use case is classification based on the incoming IPSec state used during decpsulation using the 'policy' iptables extension (xt_policy).
The module dynamically fetches the netfilter match module and calls it using a fake xt_action_param structure based on validated userspace provided parameters.
As the xt_policy match does not access skb->data, no skb modifications are needed on match.
Signed-off-by: Eyal Birger <eyal.birger@gmail.com> Signed-off-by: David S. Miller <davem@davemloft.net>
|