blob: 5299e69a32afd91a6bd577ee2f7427d8c37bdf3b [file] [log] [blame]
Alexey Dobriyand62ddc22008-11-25 17:14:31 -08001#ifndef __NETNS_XFRM_H
2#define __NETNS_XFRM_H
3
Alexey Dobriyan9d4139c2008-11-25 17:16:11 -08004#include <linux/list.h>
Alexey Dobriyan50a30652008-11-25 17:21:01 -08005#include <linux/wait.h>
Alexey Dobriyan63082732008-11-25 17:19:07 -08006#include <linux/workqueue.h>
Alexey Dobriyan8b18f8e2008-11-25 17:23:26 -08007#include <linux/xfrm.h>
Alexey Dobriyand7c75442010-01-24 22:47:53 -08008#include <net/dst_ops.h>
Alexey Dobriyan9d4139c2008-11-25 17:16:11 -08009
Alexey Dobriyanb27aead2008-11-25 18:00:48 -080010struct ctl_table_header;
11
Alexey Dobriyana35f6c52008-11-25 17:23:48 -080012struct xfrm_policy_hash {
13 struct hlist_head *table;
14 unsigned int hmask;
15};
16
Alexey Dobriyand62ddc22008-11-25 17:14:31 -080017struct netns_xfrm {
Alexey Dobriyan9d4139c2008-11-25 17:16:11 -080018 struct list_head state_all;
Alexey Dobriyan73d189d2008-11-25 17:16:58 -080019 /*
20 * Hash table to find appropriate SA towards given target (endpoint of
21 * tunnel or destination of transport mode) allowed by selector.
22 *
23 * Main use is finding SA after policy selected tunnel or transport
24 * mode. Also, it can be used by ah/esp icmp error handler to find
25 * offending SA.
26 */
27 struct hlist_head *state_bydst;
Alexey Dobriyand320bbb2008-11-25 17:17:24 -080028 struct hlist_head *state_bysrc;
Alexey Dobriyanb754a4f2008-11-25 17:17:47 -080029 struct hlist_head *state_byspi;
Alexey Dobriyan529983e2008-11-25 17:18:12 -080030 unsigned int state_hmask;
Alexey Dobriyan0bf7c5b2008-11-25 17:18:39 -080031 unsigned int state_num;
Alexey Dobriyan63082732008-11-25 17:19:07 -080032 struct work_struct state_hash_work;
Alexey Dobriyanb8a0ae22008-11-25 17:20:11 -080033 struct hlist_head state_gc_list;
Alexey Dobriyanc7837142008-11-25 17:20:36 -080034 struct work_struct state_gc_work;
Alexey Dobriyan50a30652008-11-25 17:21:01 -080035
36 wait_queue_head_t km_waitq;
Alexey Dobriyanadfcf0b2008-11-25 17:22:11 -080037
38 struct list_head policy_all;
Alexey Dobriyan93b851c2008-11-25 17:22:35 -080039 struct hlist_head *policy_byidx;
Alexey Dobriyan8100bea2008-11-25 17:22:58 -080040 unsigned int policy_idx_hmask;
Alexey Dobriyan8b18f8e2008-11-25 17:23:26 -080041 struct hlist_head policy_inexact[XFRM_POLICY_MAX * 2];
Alexey Dobriyana35f6c52008-11-25 17:23:48 -080042 struct xfrm_policy_hash policy_bydst[XFRM_POLICY_MAX * 2];
Alexey Dobriyandc2caba2008-11-25 17:24:15 -080043 unsigned int policy_count[XFRM_POLICY_MAX * 2];
Alexey Dobriyan66caf622008-11-25 17:28:57 -080044 struct work_struct policy_hash_work;
Alexey Dobriyana6483b72008-11-25 17:38:20 -080045
Alexey Dobriyand7c75442010-01-24 22:47:53 -080046
Alexey Dobriyana6483b72008-11-25 17:38:20 -080047 struct sock *nlsk;
Eric W. Biedermand79d7922009-12-03 02:29:05 +000048 struct sock *nlsk_stash;
Alexey Dobriyanb27aead2008-11-25 18:00:48 -080049
50 u32 sysctl_aevent_etime;
51 u32 sysctl_aevent_rseqth;
52 int sysctl_larval_drop;
53 u32 sysctl_acq_expires;
54#ifdef CONFIG_SYSCTL
55 struct ctl_table_header *sysctl_hdr;
56#endif
Eric Dumazet8e602ce2010-10-14 05:56:18 +000057
58 struct dst_ops xfrm4_dst_ops;
Eric Dumazetdfd56b82011-12-10 09:48:31 +000059#if IS_ENABLED(CONFIG_IPV6)
Eric Dumazet8e602ce2010-10-14 05:56:18 +000060 struct dst_ops xfrm6_dst_ops;
61#endif
Alexey Dobriyand62ddc22008-11-25 17:14:31 -080062};
63
64#endif