Home | History | Annotate | Line # | Download | only in netinet
in_l2tp.c revision 1.9
      1  1.9  knakahar /*	$NetBSD: in_l2tp.c,v 1.9 2017/12/18 03:21:44 knakahara Exp $	*/
      2  1.1  knakahar 
      3  1.1  knakahar /*
      4  1.1  knakahar  * Copyright (c) 2017 Internet Initiative Japan Inc.
      5  1.1  knakahar  * All rights reserved.
      6  1.1  knakahar  *
      7  1.1  knakahar  * Redistribution and use in source and binary forms, with or without
      8  1.1  knakahar  * modification, are permitted provided that the following conditions
      9  1.1  knakahar  * are met:
     10  1.1  knakahar  * 1. Redistributions of source code must retain the above copyright
     11  1.1  knakahar  *    notice, this list of conditions and the following disclaimer.
     12  1.1  knakahar  * 2. Redistributions in binary form must reproduce the above copyright
     13  1.1  knakahar  *    notice, this list of conditions and the following disclaimer in the
     14  1.1  knakahar  *    documentation and/or other materials provided with the distribution.
     15  1.1  knakahar  *
     16  1.1  knakahar  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     17  1.1  knakahar  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     18  1.1  knakahar  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     19  1.1  knakahar  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     20  1.1  knakahar  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     21  1.1  knakahar  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     22  1.1  knakahar  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     23  1.1  knakahar  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     24  1.1  knakahar  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     25  1.1  knakahar  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     26  1.1  knakahar  * POSSIBILITY OF SUCH DAMAGE.
     27  1.1  knakahar  */
     28  1.1  knakahar 
     29  1.1  knakahar #include <sys/cdefs.h>
     30  1.9  knakahar __KERNEL_RCSID(0, "$NetBSD: in_l2tp.c,v 1.9 2017/12/18 03:21:44 knakahara Exp $");
     31  1.1  knakahar 
     32  1.1  knakahar #ifdef _KERNEL_OPT
     33  1.1  knakahar #include "opt_l2tp.h"
     34  1.1  knakahar #endif
     35  1.1  knakahar 
     36  1.1  knakahar #include <sys/param.h>
     37  1.1  knakahar #include <sys/systm.h>
     38  1.1  knakahar #include <sys/socket.h>
     39  1.1  knakahar #include <sys/sockio.h>
     40  1.1  knakahar #include <sys/mbuf.h>
     41  1.1  knakahar #include <sys/errno.h>
     42  1.1  knakahar #include <sys/ioctl.h>
     43  1.1  knakahar #include <sys/syslog.h>
     44  1.1  knakahar #include <sys/kernel.h>
     45  1.1  knakahar 
     46  1.1  knakahar #include <net/if.h>
     47  1.1  knakahar #include <net/route.h>
     48  1.1  knakahar #include <net/if_ether.h>
     49  1.1  knakahar 
     50  1.1  knakahar #include <netinet/in.h>
     51  1.1  knakahar #include <netinet/in_systm.h>
     52  1.1  knakahar #include <netinet/ip.h>
     53  1.1  knakahar #include <netinet/ip_var.h>
     54  1.1  knakahar #include <netinet/ip_private.h>
     55  1.1  knakahar #include <netinet/in_l2tp.h>
     56  1.1  knakahar #include <netinet/in_var.h>
     57  1.1  knakahar #include <netinet/ip_encap.h>
     58  1.1  knakahar 
     59  1.1  knakahar #ifdef ALTQ
     60  1.1  knakahar #include <altq/altq.h>
     61  1.1  knakahar #endif
     62  1.1  knakahar 
     63  1.1  knakahar /* TODO: IP_TCPMSS support */
     64  1.1  knakahar #undef IP_TCPMSS
     65  1.1  knakahar #ifdef IP_TCPMSS
     66  1.1  knakahar #include <netinet/ip_tcpmss.h>
     67  1.1  knakahar #endif
     68  1.1  knakahar 
     69  1.1  knakahar #include <net/if_l2tp.h>
     70  1.1  knakahar 
     71  1.1  knakahar #include <net/net_osdep.h>
     72  1.1  knakahar 
     73  1.1  knakahar int ip_l2tp_ttl = L2TP_TTL;
     74  1.1  knakahar 
     75  1.4  knakahar static void in_l2tp_input(struct mbuf *, int, int, void *);
     76  1.1  knakahar 
     77  1.1  knakahar static const struct encapsw in_l2tp_encapsw = {
     78  1.1  knakahar 	.encapsw4 = {
     79  1.1  knakahar 		.pr_input	= in_l2tp_input,
     80  1.1  knakahar 		.pr_ctlinput	= NULL,
     81  1.1  knakahar 	}
     82  1.1  knakahar };
     83  1.1  knakahar 
     84  1.1  knakahar static int in_l2tp_match(struct mbuf *, int, int, void *);
     85  1.1  knakahar 
     86  1.1  knakahar int
     87  1.1  knakahar in_l2tp_output(struct l2tp_variant *var, struct mbuf *m)
     88  1.1  knakahar {
     89  1.1  knakahar 	struct l2tp_softc *sc;
     90  1.1  knakahar 	struct ifnet *ifp;
     91  1.1  knakahar 	struct sockaddr_in *sin_src = satosin(var->lv_psrc);
     92  1.1  knakahar 	struct sockaddr_in *sin_dst = satosin(var->lv_pdst);
     93  1.1  knakahar 	struct ip iphdr;	/* capsule IP header, host byte ordered */
     94  1.1  knakahar 	struct rtentry *rt;
     95  1.1  knakahar 	struct l2tp_ro *lro;
     96  1.1  knakahar 	int error;
     97  1.1  knakahar 	uint32_t sess_id;
     98  1.1  knakahar 
     99  1.1  knakahar 	KASSERT(var != NULL);
    100  1.1  knakahar 	KASSERT(l2tp_heldref_variant(var));
    101  1.1  knakahar 	KASSERT(sin_src != NULL && sin_dst != NULL);
    102  1.1  knakahar 	KASSERT(sin_src->sin_family == AF_INET
    103  1.1  knakahar 	    && sin_dst->sin_family == AF_INET);
    104  1.1  knakahar 
    105  1.1  knakahar 	sc = var->lv_softc;
    106  1.1  knakahar 	if (sc == NULL)
    107  1.1  knakahar 		return ENETUNREACH;
    108  1.1  knakahar 
    109  1.1  knakahar 	ifp = &sc->l2tp_ec.ec_if;
    110  1.1  knakahar 	error = l2tp_check_nesting(ifp, m);
    111  1.3  knakahar 	if (error) {
    112  1.3  knakahar 		m_freem(m);
    113  1.1  knakahar 		goto looped;
    114  1.3  knakahar 	}
    115  1.1  knakahar 
    116  1.1  knakahar #ifdef NETYET
    117  1.1  knakahar /* TODO: support ALTQ for innner frame */
    118  1.1  knakahar #ifdef ALTQ
    119  1.1  knakahar 	ALTQ_SAVE_PAYLOAD(m, AF_ETHER);
    120  1.1  knakahar #endif
    121  1.1  knakahar #endif
    122  1.1  knakahar 
    123  1.1  knakahar 	memset(&iphdr, 0, sizeof(iphdr));
    124  1.1  knakahar 	iphdr.ip_src = sin_src->sin_addr;
    125  1.1  knakahar 	/* bidirectional configured tunnel mode */
    126  1.1  knakahar 	if (sin_dst->sin_addr.s_addr != INADDR_ANY)
    127  1.1  knakahar 		iphdr.ip_dst = sin_dst->sin_addr;
    128  1.1  knakahar 	else {
    129  1.1  knakahar 		m_freem(m);
    130  1.1  knakahar 		if ((ifp->if_flags & IFF_DEBUG) != 0)
    131  1.1  knakahar 			log(LOG_DEBUG, "%s: ENETUNREACH\n", __func__);
    132  1.1  knakahar 		error = ENETUNREACH;
    133  1.1  knakahar 		goto out;
    134  1.1  knakahar 	}
    135  1.1  knakahar 	iphdr.ip_p = IPPROTO_L2TP;
    136  1.1  knakahar 	/* version will be set in ip_output() */
    137  1.1  knakahar 	iphdr.ip_ttl = ip_l2tp_ttl;
    138  1.1  knakahar 	/* outer IP header length */
    139  1.1  knakahar 	iphdr.ip_len = sizeof(struct ip);
    140  1.1  knakahar 	/* session-id length */
    141  1.1  knakahar 	iphdr.ip_len += sizeof(uint32_t);
    142  1.1  knakahar 	if (var->lv_use_cookie == L2TP_COOKIE_ON) {
    143  1.1  knakahar 		/* cookie length */
    144  1.1  knakahar 		iphdr.ip_len += var->lv_peer_cookie_len;
    145  1.1  knakahar 	}
    146  1.1  knakahar 
    147  1.1  knakahar /* TODO: IP_TCPMSS support */
    148  1.1  knakahar #ifdef IP_TCPMSS
    149  1.1  knakahar 	m = l2tp_tcpmss_clamp(ifp, m);
    150  1.1  knakahar 	if (m == NULL) {
    151  1.1  knakahar 		error = EINVAL;
    152  1.1  knakahar 		goto out;
    153  1.1  knakahar 	}
    154  1.1  knakahar #endif
    155  1.1  knakahar 	/*
    156  1.1  knakahar 	 * payload length
    157  1.1  knakahar 	 *  NOTE: Payload length may be changed in ip_tcpmss().
    158  1.1  knakahar 	 *        Typical case is missing of TCP mss option in original
    159  1.1  knakahar 	 *        TCP header.
    160  1.1  knakahar 	 */
    161  1.1  knakahar 	iphdr.ip_len += m->m_pkthdr.len;
    162  1.1  knakahar 	HTONS(iphdr.ip_len);
    163  1.1  knakahar 
    164  1.1  knakahar 	if (var->lv_use_cookie == L2TP_COOKIE_ON) {
    165  1.1  knakahar 		/* prepend session cookie */
    166  1.1  knakahar 		uint32_t cookie_32;
    167  1.1  knakahar 		uint64_t cookie_64;
    168  1.1  knakahar 		M_PREPEND(m, var->lv_peer_cookie_len, M_DONTWAIT);
    169  1.1  knakahar 		if (m && m->m_len < var->lv_peer_cookie_len)
    170  1.1  knakahar 			m = m_pullup(m, var->lv_peer_cookie_len);
    171  1.1  knakahar 		if (m == NULL) {
    172  1.1  knakahar 			error = ENOBUFS;
    173  1.1  knakahar 			goto out;
    174  1.1  knakahar 		}
    175  1.1  knakahar 		if (var->lv_peer_cookie_len == 4) {
    176  1.1  knakahar 			cookie_32 = htonl((uint32_t)var->lv_peer_cookie);
    177  1.1  knakahar 			memcpy(mtod(m, void *), &cookie_32,
    178  1.1  knakahar 			    sizeof(uint32_t));
    179  1.1  knakahar 		} else {
    180  1.1  knakahar 			cookie_64 = htobe64(var->lv_peer_cookie);
    181  1.1  knakahar 			memcpy(mtod(m, void *), &cookie_64,
    182  1.1  knakahar 			    sizeof(uint64_t));
    183  1.1  knakahar 		}
    184  1.1  knakahar 	}
    185  1.1  knakahar 
    186  1.1  knakahar 	/* prepend session-ID */
    187  1.1  knakahar 	sess_id = htonl(var->lv_peer_sess_id);
    188  1.1  knakahar 	M_PREPEND(m, sizeof(uint32_t), M_DONTWAIT);
    189  1.1  knakahar 	if (m && m->m_len < sizeof(uint32_t))
    190  1.1  knakahar 		m = m_pullup(m, sizeof(uint32_t));
    191  1.1  knakahar 	if (m == NULL) {
    192  1.1  knakahar 		error = ENOBUFS;
    193  1.1  knakahar 		goto out;
    194  1.1  knakahar 	}
    195  1.1  knakahar 	memcpy(mtod(m, uint32_t *), &sess_id, sizeof(uint32_t));
    196  1.1  knakahar 
    197  1.1  knakahar 	/* prepend new IP header */
    198  1.1  knakahar 	M_PREPEND(m, sizeof(struct ip), M_DONTWAIT);
    199  1.1  knakahar 	if (IP_HDR_ALIGNED_P(mtod(m, void *)) == 0) {
    200  1.1  knakahar 		if (m)
    201  1.1  knakahar 			m = m_copyup(m, sizeof(struct ip), 0);
    202  1.1  knakahar 	} else {
    203  1.1  knakahar 		if (m && m->m_len < sizeof(struct ip))
    204  1.1  knakahar 			m = m_pullup(m, sizeof(struct ip));
    205  1.1  knakahar 	}
    206  1.1  knakahar 	if (m == NULL) {
    207  1.1  knakahar 		error = ENOBUFS;
    208  1.1  knakahar 		goto out;
    209  1.1  knakahar 	}
    210  1.1  knakahar 	memcpy(mtod(m, struct ip *), &iphdr, sizeof(struct ip));
    211  1.1  knakahar 
    212  1.1  knakahar 	lro = percpu_getref(sc->l2tp_ro_percpu);
    213  1.1  knakahar 	mutex_enter(&lro->lr_lock);
    214  1.1  knakahar 	if ((rt = rtcache_lookup(&lro->lr_ro, var->lv_pdst)) == NULL) {
    215  1.1  knakahar 		mutex_exit(&lro->lr_lock);
    216  1.1  knakahar 		percpu_putref(sc->l2tp_ro_percpu);
    217  1.1  knakahar 		m_freem(m);
    218  1.1  knakahar 		error = ENETUNREACH;
    219  1.1  knakahar 		goto out;
    220  1.1  knakahar 	}
    221  1.1  knakahar 
    222  1.1  knakahar 	if (rt->rt_ifp == ifp) {
    223  1.1  knakahar 		rtcache_unref(rt, &lro->lr_ro);
    224  1.1  knakahar 		rtcache_free(&lro->lr_ro);
    225  1.1  knakahar 		mutex_exit(&lro->lr_lock);
    226  1.1  knakahar 		percpu_putref(sc->l2tp_ro_percpu);
    227  1.1  knakahar 		m_freem(m);
    228  1.1  knakahar 		error = ENETUNREACH;	/*XXX*/
    229  1.1  knakahar 		goto out;
    230  1.1  knakahar 	}
    231  1.1  knakahar 	rtcache_unref(rt, &lro->lr_ro);
    232  1.1  knakahar 
    233  1.1  knakahar 	/*
    234  1.1  knakahar 	 * To avoid inappropriate rewrite of checksum,
    235  1.1  knakahar 	 * clear csum flags.
    236  1.1  knakahar 	 */
    237  1.1  knakahar 	m->m_pkthdr.csum_flags  = 0;
    238  1.1  knakahar 
    239  1.1  knakahar 	error = ip_output(m, NULL, &lro->lr_ro, 0, NULL, NULL);
    240  1.1  knakahar 	mutex_exit(&lro->lr_lock);
    241  1.1  knakahar 	percpu_putref(sc->l2tp_ro_percpu);
    242  1.1  knakahar 	return error;
    243  1.1  knakahar 
    244  1.1  knakahar looped:
    245  1.1  knakahar 	if (error)
    246  1.1  knakahar 		ifp->if_oerrors++;
    247  1.1  knakahar 
    248  1.1  knakahar out:
    249  1.1  knakahar 	return error;
    250  1.1  knakahar }
    251  1.1  knakahar 
    252  1.1  knakahar static void
    253  1.4  knakahar in_l2tp_input(struct mbuf *m, int off, int proto, void *eparg __unused)
    254  1.1  knakahar {
    255  1.1  knakahar 	struct ifnet *l2tpp = NULL;
    256  1.1  knakahar 	struct l2tp_softc *sc;
    257  1.1  knakahar 	uint32_t sess_id;
    258  1.1  knakahar 	uint32_t cookie_32;
    259  1.1  knakahar 	uint64_t cookie_64;
    260  1.1  knakahar 	struct psref psref;
    261  1.1  knakahar 	struct l2tp_variant *var;
    262  1.1  knakahar 
    263  1.1  knakahar 	if (m->m_len < off + sizeof(uint32_t)) {
    264  1.1  knakahar 		m = m_pullup(m, off + sizeof(uint32_t));
    265  1.1  knakahar 		if (!m) {
    266  1.1  knakahar 			/* if payload length < 4 octets */
    267  1.1  knakahar 			return;
    268  1.1  knakahar 		}
    269  1.1  knakahar         }
    270  1.1  knakahar 
    271  1.1  knakahar 	/* get L2TP session ID */
    272  1.1  knakahar 	m_copydata(m, off, sizeof(uint32_t), (void *)&sess_id);
    273  1.1  knakahar 	NTOHL(sess_id);
    274  1.1  knakahar #ifdef L2TP_DEBUG
    275  1.1  knakahar 	log(LOG_DEBUG, "%s: sess_id = %" PRIu32 "\n", __func__, sess_id);
    276  1.1  knakahar #endif
    277  1.1  knakahar 	if (sess_id == 0) {
    278  1.1  knakahar 		/*
    279  1.1  knakahar 		 * L2TPv3 control packet received.
    280  1.1  knakahar 		 * userland daemon(l2tpd?) should process.
    281  1.1  knakahar 		 */
    282  1.1  knakahar 		rip_input(m, off, proto);
    283  1.1  knakahar 		return;
    284  1.1  knakahar 	}
    285  1.1  knakahar 
    286  1.1  knakahar 	var = l2tp_lookup_session_ref(sess_id, &psref);
    287  1.1  knakahar 	if (var == NULL) {
    288  1.1  knakahar 		m_freem(m);
    289  1.1  knakahar 		ip_statinc(IP_STAT_NOL2TP);
    290  1.1  knakahar 		return;
    291  1.1  knakahar 	} else {
    292  1.1  knakahar 		sc = var->lv_softc;
    293  1.1  knakahar 		l2tpp = &(sc->l2tp_ec.ec_if);
    294  1.1  knakahar 
    295  1.1  knakahar 		if (l2tpp == NULL || (l2tpp->if_flags & IFF_UP) == 0) {
    296  1.1  knakahar #ifdef L2TP_DEBUG
    297  1.1  knakahar 			if (l2tpp == NULL)
    298  1.1  knakahar 				log(LOG_DEBUG, "%s: l2tpp is NULL\n", __func__);
    299  1.1  knakahar 			else
    300  1.1  knakahar 				log(LOG_DEBUG, "%s: l2tpp is down\n", __func__);
    301  1.1  knakahar #endif
    302  1.1  knakahar 			m_freem(m);
    303  1.1  knakahar 			ip_statinc(IP_STAT_NOL2TP);
    304  1.1  knakahar 			goto out;
    305  1.1  knakahar 		}
    306  1.1  knakahar 
    307  1.1  knakahar 		/* other CPU do l2tp_delete_tunnel */
    308  1.1  knakahar 		if (var->lv_psrc == NULL || var->lv_pdst == NULL) {
    309  1.1  knakahar 			m_freem(m);
    310  1.1  knakahar 			ip_statinc(IP_STAT_NOL2TP);
    311  1.1  knakahar 			goto out;
    312  1.1  knakahar 		}
    313  1.1  knakahar 	}
    314  1.1  knakahar 
    315  1.1  knakahar 	if (var->lv_state != L2TP_STATE_UP) {
    316  1.1  knakahar 		m_freem(m);
    317  1.1  knakahar 		goto out;
    318  1.1  knakahar 	}
    319  1.1  knakahar 
    320  1.1  knakahar 	m_adj(m, off + sizeof(uint32_t));
    321  1.1  knakahar 
    322  1.1  knakahar 	if (var->lv_use_cookie == L2TP_COOKIE_ON) {
    323  1.1  knakahar 		if (var->lv_my_cookie_len == 4) {
    324  1.1  knakahar 			m_copydata(m, 0, sizeof(uint32_t), (void *)&cookie_32);
    325  1.1  knakahar 			NTOHL(cookie_32);
    326  1.1  knakahar 			if (cookie_32 != var->lv_my_cookie) {
    327  1.1  knakahar 				m_freem(m);
    328  1.1  knakahar 				goto out;
    329  1.1  knakahar 			}
    330  1.1  knakahar 			m_adj(m, sizeof(uint32_t));
    331  1.1  knakahar 		} else {
    332  1.1  knakahar 			m_copydata(m, 0, sizeof(uint64_t), (void *)&cookie_64);
    333  1.1  knakahar 			BE64TOH(cookie_64);
    334  1.1  knakahar 			if (cookie_64 != var->lv_my_cookie) {
    335  1.1  knakahar 				m_freem(m);
    336  1.1  knakahar 				goto out;
    337  1.1  knakahar 			}
    338  1.1  knakahar 			m_adj(m, sizeof(uint64_t));
    339  1.1  knakahar 		}
    340  1.1  knakahar 	}
    341  1.1  knakahar 
    342  1.1  knakahar /* TODO: IP_TCPMSS support */
    343  1.1  knakahar #ifdef IP_TCPMSS
    344  1.1  knakahar 	m = l2tp_tcpmss_clamp(l2tpp, m);
    345  1.1  knakahar 	if (m == NULL)
    346  1.1  knakahar 		goto out;
    347  1.1  knakahar #endif
    348  1.1  knakahar 	l2tp_input(m, l2tpp);
    349  1.1  knakahar 
    350  1.1  knakahar out:
    351  1.1  knakahar 	l2tp_putref_variant(var, &psref);
    352  1.1  knakahar 	return;
    353  1.1  knakahar }
    354  1.1  knakahar 
    355  1.1  knakahar /*
    356  1.1  knakahar  * This function is used by encap4_lookup() to decide priority of the encaptab.
    357  1.1  knakahar  * This priority is compared to the match length between mbuf's source/destination
    358  1.1  knakahar  * IPv4 address pair and encaptab's one.
    359  1.1  knakahar  * l2tp(4) does not use address pairs to search matched encaptab, so this
    360  1.1  knakahar  * function must return the length bigger than or equals to IPv4 address pair to
    361  1.1  knakahar  * avoid wrong encaptab.
    362  1.1  knakahar  */
    363  1.1  knakahar static int
    364  1.1  knakahar in_l2tp_match(struct mbuf *m, int off, int proto, void *arg)
    365  1.1  knakahar {
    366  1.1  knakahar 	struct l2tp_variant *var = arg;
    367  1.1  knakahar 	uint32_t sess_id;
    368  1.1  knakahar 
    369  1.1  knakahar 	KASSERT(proto == IPPROTO_L2TP);
    370  1.1  knakahar 
    371  1.9  knakahar 	/*
    372  1.9  knakahar 	 * If the packet contains no session ID it cannot match
    373  1.9  knakahar 	 */
    374  1.9  knakahar 	if (m_length(m) < off + sizeof(uint32_t))
    375  1.9  knakahar 		return 0;
    376  1.1  knakahar 
    377  1.1  knakahar 	/* get L2TP session ID */
    378  1.1  knakahar 	m_copydata(m, off, sizeof(uint32_t), (void *)&sess_id);
    379  1.1  knakahar 	NTOHL(sess_id);
    380  1.1  knakahar 	if (sess_id == 0) {
    381  1.1  knakahar 		/*
    382  1.1  knakahar 		 * L2TPv3 control packet received.
    383  1.1  knakahar 		 * userland daemon(l2tpd?) should process.
    384  1.1  knakahar 		 */
    385  1.1  knakahar 		return 32 * 2;
    386  1.1  knakahar 	} else if (sess_id == var->lv_my_sess_id)
    387  1.1  knakahar 		return 32 * 2;
    388  1.1  knakahar 	else
    389  1.1  knakahar 		return 0;
    390  1.1  knakahar }
    391  1.1  knakahar 
    392  1.1  knakahar int
    393  1.1  knakahar in_l2tp_attach(struct l2tp_variant *var)
    394  1.1  knakahar {
    395  1.1  knakahar 
    396  1.1  knakahar 	var->lv_encap_cookie = encap_attach_func(AF_INET, IPPROTO_L2TP,
    397  1.1  knakahar 	    in_l2tp_match, &in_l2tp_encapsw, var);
    398  1.1  knakahar 	if (var->lv_encap_cookie == NULL)
    399  1.1  knakahar 		return EEXIST;
    400  1.1  knakahar 
    401  1.1  knakahar 	return 0;
    402  1.1  knakahar }
    403  1.1  knakahar 
    404  1.1  knakahar int
    405  1.1  knakahar in_l2tp_detach(struct l2tp_variant *var)
    406  1.1  knakahar {
    407  1.1  knakahar 	int error;
    408  1.1  knakahar 
    409  1.1  knakahar 	error = encap_detach(var->lv_encap_cookie);
    410  1.1  knakahar 	if (error == 0)
    411  1.1  knakahar 		var->lv_encap_cookie = NULL;
    412  1.1  knakahar 
    413  1.1  knakahar 	return error;
    414  1.1  knakahar }
    415