include/uapi/linux/tc_ematch/tc_em_ipt.h
0 → 100644
+20
−0
+12
−0
+1
−0
net/sched/em_ipt.c
0 → 100644
+257
−0
Loading
Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more
The commit a new tc ematch for using netfilter xtable matches. This allows early classification as well as mirroning/redirecting traffic based on logic implemented in netfilter extensions. Current supported use case is classification based on the incoming IPSec state used during decpsulation using the 'policy' iptables extension (xt_policy). The module dynamically fetches the netfilter match module and calls it using a fake xt_action_param structure based on validated userspace provided parameters. As the xt_policy match does not access skb->data, no skb modifications are needed on match. Signed-off-by:Eyal Birger <eyal.birger@gmail.com> Signed-off-by:
David S. Miller <davem@davemloft.net>