The xfrm gc threshold can be configured via xfrm{4,6}_gc_thresh
sysctl but currently only in init_net, other namespaces always
use the default value. This can substantially limit the number
of IPsec tunnels that can be effectively used.
Signed-off-by: Michal Kubecek <mkubecek@suse.cz>
Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
		
	
			
		
			
				
	
	
		
			81 lines
		
	
	
	
		
			1.8 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			81 lines
		
	
	
	
		
			1.8 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
/*
 | 
						|
 * ipv4 in net namespaces
 | 
						|
 */
 | 
						|
 | 
						|
#ifndef __NETNS_IPV4_H__
 | 
						|
#define __NETNS_IPV4_H__
 | 
						|
 | 
						|
#include <linux/uidgid.h>
 | 
						|
#include <net/inet_frag.h>
 | 
						|
 | 
						|
struct tcpm_hash_bucket;
 | 
						|
struct ctl_table_header;
 | 
						|
struct ipv4_devconf;
 | 
						|
struct fib_rules_ops;
 | 
						|
struct hlist_head;
 | 
						|
struct fib_table;
 | 
						|
struct sock;
 | 
						|
 | 
						|
struct netns_ipv4 {
 | 
						|
#ifdef CONFIG_SYSCTL
 | 
						|
	struct ctl_table_header	*forw_hdr;
 | 
						|
	struct ctl_table_header	*frags_hdr;
 | 
						|
	struct ctl_table_header	*ipv4_hdr;
 | 
						|
	struct ctl_table_header *route_hdr;
 | 
						|
	struct ctl_table_header *xfrm4_hdr;
 | 
						|
#endif
 | 
						|
	struct ipv4_devconf	*devconf_all;
 | 
						|
	struct ipv4_devconf	*devconf_dflt;
 | 
						|
#ifdef CONFIG_IP_MULTIPLE_TABLES
 | 
						|
	struct fib_rules_ops	*rules_ops;
 | 
						|
	bool			fib_has_custom_rules;
 | 
						|
	struct fib_table	*fib_local;
 | 
						|
	struct fib_table	*fib_main;
 | 
						|
	struct fib_table	*fib_default;
 | 
						|
#endif
 | 
						|
#ifdef CONFIG_IP_ROUTE_CLASSID
 | 
						|
	int			fib_num_tclassid_users;
 | 
						|
#endif
 | 
						|
	struct hlist_head	*fib_table_hash;
 | 
						|
	struct sock		*fibnl;
 | 
						|
 | 
						|
	struct sock		**icmp_sk;
 | 
						|
	struct inet_peer_base	*peers;
 | 
						|
	struct tcpm_hash_bucket	*tcp_metrics_hash;
 | 
						|
	unsigned int		tcp_metrics_hash_log;
 | 
						|
	struct netns_frags	frags;
 | 
						|
#ifdef CONFIG_NETFILTER
 | 
						|
	struct xt_table		*iptable_filter;
 | 
						|
	struct xt_table		*iptable_mangle;
 | 
						|
	struct xt_table		*iptable_raw;
 | 
						|
	struct xt_table		*arptable_filter;
 | 
						|
#ifdef CONFIG_SECURITY
 | 
						|
	struct xt_table		*iptable_security;
 | 
						|
#endif
 | 
						|
	struct xt_table		*nat_table;
 | 
						|
#endif
 | 
						|
 | 
						|
	int sysctl_icmp_echo_ignore_all;
 | 
						|
	int sysctl_icmp_echo_ignore_broadcasts;
 | 
						|
	int sysctl_icmp_ignore_bogus_error_responses;
 | 
						|
	int sysctl_icmp_ratelimit;
 | 
						|
	int sysctl_icmp_ratemask;
 | 
						|
	int sysctl_icmp_errors_use_inbound_ifaddr;
 | 
						|
 | 
						|
	int sysctl_tcp_ecn;
 | 
						|
 | 
						|
	kgid_t sysctl_ping_group_range[2];
 | 
						|
	long sysctl_tcp_mem[3];
 | 
						|
 | 
						|
	atomic_t dev_addr_genid;
 | 
						|
 | 
						|
#ifdef CONFIG_IP_MROUTE
 | 
						|
#ifndef CONFIG_IP_MROUTE_MULTIPLE_TABLES
 | 
						|
	struct mr_table		*mrt;
 | 
						|
#else
 | 
						|
	struct list_head	mr_tables;
 | 
						|
	struct fib_rules_ops	*mr_rules_ops;
 | 
						|
#endif
 | 
						|
#endif
 | 
						|
};
 | 
						|
#endif
 |