Message ID | 1515761845-31323-1-git-send-email-eyal.birger@gmail.com |
---|---|
Headers | show
Return-Path: <netdev-owner@vger.kernel.org> X-Original-To: patchwork-incoming@ozlabs.org Delivered-To: patchwork-incoming@ozlabs.org Authentication-Results: ozlabs.org; spf=none (mailfrom) smtp.mailfrom=vger.kernel.org (client-ip=209.132.180.67; helo=vger.kernel.org; envelope-from=netdev-owner@vger.kernel.org; receiver=<UNKNOWN>) Authentication-Results: ozlabs.org; dkim=pass (2048-bit key; unprotected) header.d=gmail.com header.i=@gmail.com header.b="bSt5M7Z3"; dkim-atps=neutral Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by ozlabs.org (Postfix) with ESMTP id 3zJ2q03fr6z9sQm for <patchwork-incoming@ozlabs.org>; Fri, 12 Jan 2018 23:58:04 +1100 (AEDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933669AbeALM6B (ORCPT <rfc822;patchwork-incoming@ozlabs.org>); Fri, 12 Jan 2018 07:58:01 -0500 Received: from mail-wr0-f196.google.com ([209.85.128.196]:38681 "EHLO mail-wr0-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933428AbeALM6A (ORCPT <rfc822;netdev@vger.kernel.org>); Fri, 12 Jan 2018 07:58:00 -0500 Received: by mail-wr0-f196.google.com with SMTP id x1so1061838wrb.5 for <netdev@vger.kernel.org>; Fri, 12 Jan 2018 04:57:59 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id; bh=pVJ8wFbPDu0kmvUzoW7b2DpOHOlR+6cM7fbdtb0AGiM=; b=bSt5M7Z3mjIL/aBH5h187Q5eQHwVh+FNu+IS+xzhI2lsO4PejRmu9rHNhU06FHkYzF ssBpJhPkyBf/dS1UXUVHG2dGF/v1oEo62HT3FytOAfPb7aOdA3j4Fxi3VQyBPwOaFMsU S+TcQBPnYSvXteY1SYypOgI7NSNCt8BcIgRsa/xSaCjNGTjgtDSjsFBw5B01zn2/CKF1 mdHT6q4+W/E99TqR51t7rCA5foewb7TEEkSeonRNeCH5AqS7xOY4lG7e02TaXxP1Yi4J fg5i/H3UnBmQrM9s+uTJ+Fsx8ki2/J19MoEcHiLCZZFbvbaRiSfXdP90HmT5QEjZhh1T cBcA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=pVJ8wFbPDu0kmvUzoW7b2DpOHOlR+6cM7fbdtb0AGiM=; b=V9ltG4LkOIrrCFxA2zE0/Bo0cN/IJP7RPzgxjqVhmJxyoRk0iTuLDztNcx9jcqioLN 6DVZ673mRUo0BFLRkf7EbeSuZUh3KwJDVSoVgkAAu04H6BWP1hju8MPRT4BPyMpPXvXQ qovIWCP7J+iOo5PHSnprUULcxxzQotDztbuhz1HDSgKGuYnZl/btaEFgpLQ0VBgFSsNI ggM7oj1Rne9XvA/ZYYOvvnImVDZPe/eU+r/v7QZmlQ63ivelASL3VbCwFKVARUlksMAa AhC+8csE4cjyku9091CzksEeR5bgRAafRoGQ5xWd2PhiQirCsMIROOMVaKe0ferfK502 IRVg== X-Gm-Message-State: AKGB3mLYpD+0FIa/GyDGzMQ7h19yvL/wHkOGjVyQzIgJBO1ghDplT7EV dMVkuT878FG+33DdEm3v5gJVPdUFFMg= X-Google-Smtp-Source: ACJfBos51s80J9ATbcZqKc19N3uI2/CM6YSBkOmpJ5rnmwRap6dTm3CQHGjsL3DBs1LvaBb+rzHGIg== X-Received: by 10.223.161.12 with SMTP id o12mr25122509wro.243.1515761878601; Fri, 12 Jan 2018 04:57:58 -0800 (PST) Received: from localhost.localdomain (85.65.196.133.dynamic.barak-online.net. [85.65.196.133]) by smtp.gmail.com with ESMTPSA id v75sm2026595wrc.45.2018.01.12.04.57.56 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Fri, 12 Jan 2018 04:57:57 -0800 (PST) From: Eyal Birger <eyal.birger@gmail.com> To: netdev@vger.kernel.org, pablo@netfilter.org, jhs@mojatatu.com Cc: coreteam@netfilter.org, shmulik@metanetworks.com, Eyal Birger <eyal@metanetworks.com> Subject: [PATCH net-next 0/2] net: sched: Introduce em_policy ematch Date: Fri, 12 Jan 2018 14:57:23 +0200 Message-Id: <1515761845-31323-1-git-send-email-eyal.birger@gmail.com> X-Mailer: git-send-email 2.7.4 Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: <netdev.vger.kernel.org> X-Mailing-List: netdev@vger.kernel.org |
Series |
net: sched: Introduce em_policy ematch
|
expand
|
From: Eyal Birger <eyal@metanetworks.com> The following patchset introduces a new tc ematch for matching IPSec traffic from a tc context. This allows early classification as well as mirroning/redirecting IPSec traffic based on decapsulation criteria. The matching functionality is based on the netfilter xt_policy match, and shares code and data structures. Eyal Birger (2): net: netfilter: export xt_policy match_policy_in() as xt_policy_match_policy_in() net: sched: add xfrm policy ematch include/net/netfilter/xt_policy.h | 12 ++++ include/uapi/linux/pkt_cls.h | 3 +- net/netfilter/xt_policy.c | 18 +++--- net/sched/Kconfig | 10 ++++ net/sched/Makefile | 1 + net/sched/em_policy.c | 117 ++++++++++++++++++++++++++++++++++++++ 6 files changed, 152 insertions(+), 9 deletions(-) create mode 100644 include/net/netfilter/xt_policy.h create mode 100644 net/sched/em_policy.c