^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 1) // SPDX-License-Identifier: GPL-2.0-or-later
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 2) /* L2TPv3 IP encapsulation support
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 3) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 4) * Copyright (c) 2008,2009,2010 Katalix Systems Ltd
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 5) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 6)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 7) #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 8)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 9) #include <asm/ioctls.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 10) #include <linux/icmp.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 11) #include <linux/module.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 12) #include <linux/skbuff.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 13) #include <linux/random.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 14) #include <linux/socket.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 15) #include <linux/l2tp.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 16) #include <linux/in.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 17) #include <net/sock.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 18) #include <net/ip.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 19) #include <net/icmp.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 20) #include <net/udp.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 21) #include <net/inet_common.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 22) #include <net/tcp_states.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 23) #include <net/protocol.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 24) #include <net/xfrm.h>
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 25)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 26) #include "l2tp_core.h"
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 27)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 28) struct l2tp_ip_sock {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 29) /* inet_sock has to be the first member of l2tp_ip_sock */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 30) struct inet_sock inet;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 31)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 32) u32 conn_id;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 33) u32 peer_conn_id;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 34) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 35)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 36) static DEFINE_RWLOCK(l2tp_ip_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 37) static struct hlist_head l2tp_ip_table;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 38) static struct hlist_head l2tp_ip_bind_table;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 39)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 40) static inline struct l2tp_ip_sock *l2tp_ip_sk(const struct sock *sk)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 41) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 42) return (struct l2tp_ip_sock *)sk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 43) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 44)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 45) static struct sock *__l2tp_ip_bind_lookup(const struct net *net, __be32 laddr,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 46) __be32 raddr, int dif, u32 tunnel_id)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 47) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 48) struct sock *sk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 49)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 50) sk_for_each_bound(sk, &l2tp_ip_bind_table) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 51) const struct l2tp_ip_sock *l2tp = l2tp_ip_sk(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 52) const struct inet_sock *inet = inet_sk(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 53)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 54) if (!net_eq(sock_net(sk), net))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 55) continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 56)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 57) if (sk->sk_bound_dev_if && dif && sk->sk_bound_dev_if != dif)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 58) continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 59)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 60) if (inet->inet_rcv_saddr && laddr &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 61) inet->inet_rcv_saddr != laddr)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 62) continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 63)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 64) if (inet->inet_daddr && raddr && inet->inet_daddr != raddr)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 65) continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 66)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 67) if (l2tp->conn_id != tunnel_id)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 68) continue;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 69)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 70) goto found;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 71) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 72)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 73) sk = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 74) found:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 75) return sk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 76) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 77)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 78) /* When processing receive frames, there are two cases to
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 79) * consider. Data frames consist of a non-zero session-id and an
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 80) * optional cookie. Control frames consist of a regular L2TP header
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 81) * preceded by 32-bits of zeros.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 82) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 83) * L2TPv3 Session Header Over IP
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 84) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 85) * 0 1 2 3
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 86) * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 87) * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 88) * | Session ID |
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 89) * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 90) * | Cookie (optional, maximum 64 bits)...
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 91) * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 92) * |
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 93) * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 94) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 95) * L2TPv3 Control Message Header Over IP
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 96) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 97) * 0 1 2 3
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 98) * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 99) * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 100) * | (32 bits of zeros) |
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 101) * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 102) * |T|L|x|x|S|x|x|x|x|x|x|x| Ver | Length |
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 103) * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 104) * | Control Connection ID |
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 105) * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 106) * | Ns | Nr |
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 107) * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 108) *
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 109) * All control frames are passed to userspace.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 110) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 111) static int l2tp_ip_recv(struct sk_buff *skb)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 112) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 113) struct net *net = dev_net(skb->dev);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 114) struct sock *sk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 115) u32 session_id;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 116) u32 tunnel_id;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 117) unsigned char *ptr, *optr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 118) struct l2tp_session *session;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 119) struct l2tp_tunnel *tunnel = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 120) struct iphdr *iph;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 121)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 122) if (!pskb_may_pull(skb, 4))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 123) goto discard;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 124)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 125) /* Point to L2TP header */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 126) optr = skb->data;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 127) ptr = skb->data;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 128) session_id = ntohl(*((__be32 *)ptr));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 129) ptr += 4;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 130)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 131) /* RFC3931: L2TP/IP packets have the first 4 bytes containing
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 132) * the session_id. If it is 0, the packet is a L2TP control
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 133) * frame and the session_id value can be discarded.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 134) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 135) if (session_id == 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 136) __skb_pull(skb, 4);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 137) goto pass_up;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 138) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 139)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 140) /* Ok, this is a data packet. Lookup the session. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 141) session = l2tp_session_get(net, session_id);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 142) if (!session)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 143) goto discard;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 144)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 145) tunnel = session->tunnel;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 146) if (!tunnel)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 147) goto discard_sess;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 148)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 149) if (l2tp_v3_ensure_opt_in_linear(session, skb, &ptr, &optr))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 150) goto discard_sess;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 151)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 152) l2tp_recv_common(session, skb, ptr, optr, 0, skb->len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 153) l2tp_session_dec_refcount(session);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 154)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 155) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 156)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 157) pass_up:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 158) /* Get the tunnel_id from the L2TP header */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 159) if (!pskb_may_pull(skb, 12))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 160) goto discard;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 161)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 162) if ((skb->data[0] & 0xc0) != 0xc0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 163) goto discard;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 164)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 165) tunnel_id = ntohl(*(__be32 *)&skb->data[4]);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 166) iph = (struct iphdr *)skb_network_header(skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 167)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 168) read_lock_bh(&l2tp_ip_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 169) sk = __l2tp_ip_bind_lookup(net, iph->daddr, iph->saddr, inet_iif(skb),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 170) tunnel_id);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 171) if (!sk) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 172) read_unlock_bh(&l2tp_ip_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 173) goto discard;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 174) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 175) sock_hold(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 176) read_unlock_bh(&l2tp_ip_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 177)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 178) if (!xfrm4_policy_check(sk, XFRM_POLICY_IN, skb))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 179) goto discard_put;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 180)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 181) nf_reset_ct(skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 182)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 183) return sk_receive_skb(sk, skb, 1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 184)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 185) discard_sess:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 186) l2tp_session_dec_refcount(session);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 187) goto discard;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 188)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 189) discard_put:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 190) sock_put(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 191)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 192) discard:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 193) kfree_skb(skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 194) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 195) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 196)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 197) static int l2tp_ip_hash(struct sock *sk)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 198) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 199) if (sk_unhashed(sk)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 200) write_lock_bh(&l2tp_ip_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 201) sk_add_node(sk, &l2tp_ip_table);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 202) write_unlock_bh(&l2tp_ip_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 203) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 204) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 205) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 206)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 207) static void l2tp_ip_unhash(struct sock *sk)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 208) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 209) if (sk_unhashed(sk))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 210) return;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 211) write_lock_bh(&l2tp_ip_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 212) sk_del_node_init(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 213) write_unlock_bh(&l2tp_ip_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 214) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 215)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 216) static int l2tp_ip_open(struct sock *sk)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 217) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 218) /* Prevent autobind. We don't have ports. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 219) inet_sk(sk)->inet_num = IPPROTO_L2TP;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 220)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 221) l2tp_ip_hash(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 222) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 223) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 224)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 225) static void l2tp_ip_close(struct sock *sk, long timeout)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 226) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 227) write_lock_bh(&l2tp_ip_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 228) hlist_del_init(&sk->sk_bind_node);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 229) sk_del_node_init(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 230) write_unlock_bh(&l2tp_ip_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 231) sk_common_release(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 232) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 233)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 234) static void l2tp_ip_destroy_sock(struct sock *sk)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 235) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 236) struct l2tp_tunnel *tunnel = l2tp_sk_to_tunnel(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 237) struct sk_buff *skb;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 238)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 239) while ((skb = __skb_dequeue_tail(&sk->sk_write_queue)) != NULL)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 240) kfree_skb(skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 241)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 242) if (tunnel)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 243) l2tp_tunnel_delete(tunnel);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 244) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 245)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 246) static int l2tp_ip_bind(struct sock *sk, struct sockaddr *uaddr, int addr_len)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 247) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 248) struct inet_sock *inet = inet_sk(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 249) struct sockaddr_l2tpip *addr = (struct sockaddr_l2tpip *)uaddr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 250) struct net *net = sock_net(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 251) int ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 252) int chk_addr_ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 253)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 254) if (addr_len < sizeof(struct sockaddr_l2tpip))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 255) return -EINVAL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 256) if (addr->l2tp_family != AF_INET)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 257) return -EINVAL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 258)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 259) lock_sock(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 260)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 261) ret = -EINVAL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 262) if (!sock_flag(sk, SOCK_ZAPPED))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 263) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 264)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 265) if (sk->sk_state != TCP_CLOSE)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 266) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 267)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 268) chk_addr_ret = inet_addr_type(net, addr->l2tp_addr.s_addr);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 269) ret = -EADDRNOTAVAIL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 270) if (addr->l2tp_addr.s_addr && chk_addr_ret != RTN_LOCAL &&
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 271) chk_addr_ret != RTN_MULTICAST && chk_addr_ret != RTN_BROADCAST)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 272) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 273)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 274) if (addr->l2tp_addr.s_addr) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 275) inet->inet_rcv_saddr = addr->l2tp_addr.s_addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 276) inet->inet_saddr = addr->l2tp_addr.s_addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 277) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 278) if (chk_addr_ret == RTN_MULTICAST || chk_addr_ret == RTN_BROADCAST)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 279) inet->inet_saddr = 0; /* Use device */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 280)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 281) write_lock_bh(&l2tp_ip_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 282) if (__l2tp_ip_bind_lookup(net, addr->l2tp_addr.s_addr, 0,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 283) sk->sk_bound_dev_if, addr->l2tp_conn_id)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 284) write_unlock_bh(&l2tp_ip_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 285) ret = -EADDRINUSE;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 286) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 287) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 288)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 289) sk_dst_reset(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 290) l2tp_ip_sk(sk)->conn_id = addr->l2tp_conn_id;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 291)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 292) sk_add_bind_node(sk, &l2tp_ip_bind_table);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 293) sk_del_node_init(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 294) write_unlock_bh(&l2tp_ip_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 295)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 296) ret = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 297) sock_reset_flag(sk, SOCK_ZAPPED);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 298)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 299) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 300) release_sock(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 301)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 302) return ret;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 303) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 304)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 305) static int l2tp_ip_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 306) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 307) struct sockaddr_l2tpip *lsa = (struct sockaddr_l2tpip *)uaddr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 308) int rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 309)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 310) if (addr_len < sizeof(*lsa))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 311) return -EINVAL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 312)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 313) if (ipv4_is_multicast(lsa->l2tp_addr.s_addr))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 314) return -EINVAL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 315)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 316) lock_sock(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 317)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 318) /* Must bind first - autobinding does not work */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 319) if (sock_flag(sk, SOCK_ZAPPED)) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 320) rc = -EINVAL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 321) goto out_sk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 322) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 323)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 324) rc = __ip4_datagram_connect(sk, uaddr, addr_len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 325) if (rc < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 326) goto out_sk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 327)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 328) l2tp_ip_sk(sk)->peer_conn_id = lsa->l2tp_conn_id;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 329)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 330) write_lock_bh(&l2tp_ip_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 331) hlist_del_init(&sk->sk_bind_node);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 332) sk_add_bind_node(sk, &l2tp_ip_bind_table);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 333) write_unlock_bh(&l2tp_ip_lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 334)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 335) out_sk:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 336) release_sock(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 337)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 338) return rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 339) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 340)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 341) static int l2tp_ip_disconnect(struct sock *sk, int flags)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 342) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 343) if (sock_flag(sk, SOCK_ZAPPED))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 344) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 345)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 346) return __udp_disconnect(sk, flags);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 347) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 348)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 349) static int l2tp_ip_getname(struct socket *sock, struct sockaddr *uaddr,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 350) int peer)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 351) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 352) struct sock *sk = sock->sk;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 353) struct inet_sock *inet = inet_sk(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 354) struct l2tp_ip_sock *lsk = l2tp_ip_sk(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 355) struct sockaddr_l2tpip *lsa = (struct sockaddr_l2tpip *)uaddr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 356)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 357) memset(lsa, 0, sizeof(*lsa));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 358) lsa->l2tp_family = AF_INET;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 359) if (peer) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 360) if (!inet->inet_dport)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 361) return -ENOTCONN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 362) lsa->l2tp_conn_id = lsk->peer_conn_id;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 363) lsa->l2tp_addr.s_addr = inet->inet_daddr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 364) } else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 365) __be32 addr = inet->inet_rcv_saddr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 366)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 367) if (!addr)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 368) addr = inet->inet_saddr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 369) lsa->l2tp_conn_id = lsk->conn_id;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 370) lsa->l2tp_addr.s_addr = addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 371) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 372) return sizeof(*lsa);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 373) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 374)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 375) static int l2tp_ip_backlog_recv(struct sock *sk, struct sk_buff *skb)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 376) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 377) int rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 378)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 379) /* Charge it to the socket, dropping if the queue is full. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 380) rc = sock_queue_rcv_skb(sk, skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 381) if (rc < 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 382) goto drop;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 383)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 384) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 385)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 386) drop:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 387) IP_INC_STATS(sock_net(sk), IPSTATS_MIB_INDISCARDS);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 388) kfree_skb(skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 389) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 390) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 391)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 392) /* Userspace will call sendmsg() on the tunnel socket to send L2TP
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 393) * control frames.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 394) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 395) static int l2tp_ip_sendmsg(struct sock *sk, struct msghdr *msg, size_t len)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 396) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 397) struct sk_buff *skb;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 398) int rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 399) struct inet_sock *inet = inet_sk(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 400) struct rtable *rt = NULL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 401) struct flowi4 *fl4;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 402) int connected = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 403) __be32 daddr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 404)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 405) lock_sock(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 406)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 407) rc = -ENOTCONN;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 408) if (sock_flag(sk, SOCK_DEAD))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 409) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 410)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 411) /* Get and verify the address. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 412) if (msg->msg_name) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 413) DECLARE_SOCKADDR(struct sockaddr_l2tpip *, lip, msg->msg_name);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 414)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 415) rc = -EINVAL;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 416) if (msg->msg_namelen < sizeof(*lip))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 417) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 418)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 419) if (lip->l2tp_family != AF_INET) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 420) rc = -EAFNOSUPPORT;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 421) if (lip->l2tp_family != AF_UNSPEC)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 422) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 423) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 424)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 425) daddr = lip->l2tp_addr.s_addr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 426) } else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 427) rc = -EDESTADDRREQ;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 428) if (sk->sk_state != TCP_ESTABLISHED)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 429) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 430)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 431) daddr = inet->inet_daddr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 432) connected = 1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 433) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 434)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 435) /* Allocate a socket buffer */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 436) rc = -ENOMEM;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 437) skb = sock_wmalloc(sk, 2 + NET_SKB_PAD + sizeof(struct iphdr) +
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 438) 4 + len, 0, GFP_KERNEL);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 439) if (!skb)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 440) goto error;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 441)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 442) /* Reserve space for headers, putting IP header on 4-byte boundary. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 443) skb_reserve(skb, 2 + NET_SKB_PAD);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 444) skb_reset_network_header(skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 445) skb_reserve(skb, sizeof(struct iphdr));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 446) skb_reset_transport_header(skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 447)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 448) /* Insert 0 session_id */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 449) *((__be32 *)skb_put(skb, 4)) = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 450)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 451) /* Copy user data into skb */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 452) rc = memcpy_from_msg(skb_put(skb, len), msg, len);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 453) if (rc < 0) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 454) kfree_skb(skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 455) goto error;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 456) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 457)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 458) fl4 = &inet->cork.fl.u.ip4;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 459) if (connected)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 460) rt = (struct rtable *)__sk_dst_check(sk, 0);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 461)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 462) rcu_read_lock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 463) if (!rt) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 464) const struct ip_options_rcu *inet_opt;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 465)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 466) inet_opt = rcu_dereference(inet->inet_opt);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 467)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 468) /* Use correct destination address if we have options. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 469) if (inet_opt && inet_opt->opt.srr)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 470) daddr = inet_opt->opt.faddr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 471)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 472) /* If this fails, retransmit mechanism of transport layer will
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 473) * keep trying until route appears or the connection times
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 474) * itself out.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 475) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 476) rt = ip_route_output_ports(sock_net(sk), fl4, sk,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 477) daddr, inet->inet_saddr,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 478) inet->inet_dport, inet->inet_sport,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 479) sk->sk_protocol, RT_CONN_FLAGS(sk),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 480) sk->sk_bound_dev_if);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 481) if (IS_ERR(rt))
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 482) goto no_route;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 483) if (connected) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 484) sk_setup_caps(sk, &rt->dst);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 485) } else {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 486) skb_dst_set(skb, &rt->dst);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 487) goto xmit;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 488) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 489) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 490)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 491) /* We dont need to clone dst here, it is guaranteed to not disappear.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 492) * __dev_xmit_skb() might force a refcount if needed.
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 493) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 494) skb_dst_set_noref(skb, &rt->dst);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 495)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 496) xmit:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 497) /* Queue the packet to IP for output */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 498) rc = ip_queue_xmit(sk, skb, &inet->cork.fl);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 499) rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 500)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 501) error:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 502) if (rc >= 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 503) rc = len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 504)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 505) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 506) release_sock(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 507) return rc;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 508)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 509) no_route:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 510) rcu_read_unlock();
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 511) IP_INC_STATS(sock_net(sk), IPSTATS_MIB_OUTNOROUTES);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 512) kfree_skb(skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 513) rc = -EHOSTUNREACH;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 514) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 515) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 516)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 517) static int l2tp_ip_recvmsg(struct sock *sk, struct msghdr *msg,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 518) size_t len, int noblock, int flags, int *addr_len)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 519) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 520) struct inet_sock *inet = inet_sk(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 521) size_t copied = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 522) int err = -EOPNOTSUPP;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 523) DECLARE_SOCKADDR(struct sockaddr_in *, sin, msg->msg_name);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 524) struct sk_buff *skb;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 525)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 526) if (flags & MSG_OOB)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 527) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 528)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 529) skb = skb_recv_datagram(sk, flags, noblock, &err);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 530) if (!skb)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 531) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 532)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 533) copied = skb->len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 534) if (len < copied) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 535) msg->msg_flags |= MSG_TRUNC;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 536) copied = len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 537) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 538)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 539) err = skb_copy_datagram_msg(skb, 0, msg, copied);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 540) if (err)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 541) goto done;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 542)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 543) sock_recv_timestamp(msg, sk, skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 544)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 545) /* Copy the address. */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 546) if (sin) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 547) sin->sin_family = AF_INET;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 548) sin->sin_addr.s_addr = ip_hdr(skb)->saddr;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 549) sin->sin_port = 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 550) memset(&sin->sin_zero, 0, sizeof(sin->sin_zero));
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 551) *addr_len = sizeof(*sin);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 552) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 553) if (inet->cmsg_flags)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 554) ip_cmsg_recv(msg, skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 555) if (flags & MSG_TRUNC)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 556) copied = skb->len;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 557) done:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 558) skb_free_datagram(sk, skb);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 559) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 560) return err ? err : copied;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 561) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 562)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 563) int l2tp_ioctl(struct sock *sk, int cmd, unsigned long arg)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 564) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 565) struct sk_buff *skb;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 566) int amount;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 567)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 568) switch (cmd) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 569) case SIOCOUTQ:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 570) amount = sk_wmem_alloc_get(sk);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 571) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 572) case SIOCINQ:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 573) spin_lock_bh(&sk->sk_receive_queue.lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 574) skb = skb_peek(&sk->sk_receive_queue);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 575) amount = skb ? skb->len : 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 576) spin_unlock_bh(&sk->sk_receive_queue.lock);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 577) break;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 578)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 579) default:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 580) return -ENOIOCTLCMD;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 581) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 582)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 583) return put_user(amount, (int __user *)arg);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 584) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 585) EXPORT_SYMBOL_GPL(l2tp_ioctl);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 586)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 587) static struct proto l2tp_ip_prot = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 588) .name = "L2TP/IP",
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 589) .owner = THIS_MODULE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 590) .init = l2tp_ip_open,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 591) .close = l2tp_ip_close,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 592) .bind = l2tp_ip_bind,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 593) .connect = l2tp_ip_connect,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 594) .disconnect = l2tp_ip_disconnect,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 595) .ioctl = l2tp_ioctl,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 596) .destroy = l2tp_ip_destroy_sock,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 597) .setsockopt = ip_setsockopt,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 598) .getsockopt = ip_getsockopt,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 599) .sendmsg = l2tp_ip_sendmsg,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 600) .recvmsg = l2tp_ip_recvmsg,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 601) .backlog_rcv = l2tp_ip_backlog_recv,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 602) .hash = l2tp_ip_hash,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 603) .unhash = l2tp_ip_unhash,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 604) .obj_size = sizeof(struct l2tp_ip_sock),
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 605) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 606)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 607) static const struct proto_ops l2tp_ip_ops = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 608) .family = PF_INET,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 609) .owner = THIS_MODULE,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 610) .release = inet_release,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 611) .bind = inet_bind,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 612) .connect = inet_dgram_connect,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 613) .socketpair = sock_no_socketpair,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 614) .accept = sock_no_accept,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 615) .getname = l2tp_ip_getname,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 616) .poll = datagram_poll,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 617) .ioctl = inet_ioctl,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 618) .gettstamp = sock_gettstamp,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 619) .listen = sock_no_listen,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 620) .shutdown = inet_shutdown,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 621) .setsockopt = sock_common_setsockopt,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 622) .getsockopt = sock_common_getsockopt,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 623) .sendmsg = inet_sendmsg,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 624) .recvmsg = sock_common_recvmsg,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 625) .mmap = sock_no_mmap,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 626) .sendpage = sock_no_sendpage,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 627) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 628)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 629) static struct inet_protosw l2tp_ip_protosw = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 630) .type = SOCK_DGRAM,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 631) .protocol = IPPROTO_L2TP,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 632) .prot = &l2tp_ip_prot,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 633) .ops = &l2tp_ip_ops,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 634) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 635)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 636) static struct net_protocol l2tp_ip_protocol __read_mostly = {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 637) .handler = l2tp_ip_recv,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 638) .netns_ok = 1,
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 639) };
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 640)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 641) static int __init l2tp_ip_init(void)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 642) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 643) int err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 644)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 645) pr_info("L2TP IP encapsulation support (L2TPv3)\n");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 646)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 647) err = proto_register(&l2tp_ip_prot, 1);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 648) if (err != 0)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 649) goto out;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 650)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 651) err = inet_add_protocol(&l2tp_ip_protocol, IPPROTO_L2TP);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 652) if (err)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 653) goto out1;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 654)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 655) inet_register_protosw(&l2tp_ip_protosw);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 656) return 0;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 657)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 658) out1:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 659) proto_unregister(&l2tp_ip_prot);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 660) out:
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 661) return err;
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 662) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 663)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 664) static void __exit l2tp_ip_exit(void)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 665) {
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 666) inet_unregister_protosw(&l2tp_ip_protosw);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 667) inet_del_protocol(&l2tp_ip_protocol, IPPROTO_L2TP);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 668) proto_unregister(&l2tp_ip_prot);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 669) }
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 670)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 671) module_init(l2tp_ip_init);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 672) module_exit(l2tp_ip_exit);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 673)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 674) MODULE_LICENSE("GPL");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 675) MODULE_AUTHOR("James Chapman <jchapman@katalix.com>");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 676) MODULE_DESCRIPTION("L2TP over IP");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 677) MODULE_VERSION("1.0");
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 678)
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 679) /* Use the value of SOCK_DGRAM (2) directory, because __stringify doesn't like
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 680) * enums
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 681) */
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 682) MODULE_ALIAS_NET_PF_PROTO_TYPE(PF_INET, 2, IPPROTO_L2TP);
^8f3ce5b39 (kx 2023-10-28 12:00:06 +0300 683) MODULE_ALIAS_NET_PF_PROTO(PF_INET, IPPROTO_L2TP);