summaryrefslogtreecommitdiff
path: root/include/net/netns/sctp.h
diff options
context:
space:
mode:
authorXin Long <lucien.xin@gmail.com>2020-10-29 10:04:58 +0300
committerJakub Kicinski <kuba@kernel.org>2020-10-31 01:23:52 +0300
commit965ae44412f8c0c19945b3f62bc945ad0b15a8aa (patch)
treedb151fd8b905d87d9b15a845a17339736881d2e6 /include/net/netns/sctp.h
parent527beb8ef9c02c11f8ca0d59fc46f7d081db1c33 (diff)
downloadlinux-965ae44412f8c0c19945b3f62bc945ad0b15a8aa.tar.xz
sctp: create udp4 sock and add its encap_rcv
This patch is to add the functions to create/release udp4 sock, and set the sock's encap_rcv to process the incoming udp encap sctp packets. In sctp_udp_rcv(), as we can see, all we need to do is fix the transport header for sctp_rcv(), then it would implement the part of rfc6951#section-5.4: "When an encapsulated packet is received, the UDP header is removed. Then, the generic lookup is performed, as done by an SCTP stack whenever a packet is received, to find the association for the received SCTP packet" Note that these functions will be called in the last patch of this patchset when enabling this feature. v1->v2: - Add pr_err() when fails to create udp v4 sock. v2->v3: - Add 'select NET_UDP_TUNNEL' in sctp Kconfig. v3->v4: - No change. v4->v5: - Change to set udp_port to 0 by default. Signed-off-by: Xin Long <lucien.xin@gmail.com> Acked-by: Marcelo Ricardo Leitner <marcelo.leitner@gmail.com> Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Diffstat (limited to 'include/net/netns/sctp.h')
-rw-r--r--include/net/netns/sctp.h5
1 files changed, 5 insertions, 0 deletions
diff --git a/include/net/netns/sctp.h b/include/net/netns/sctp.h
index d8d02e4188d1..8cc9aff24329 100644
--- a/include/net/netns/sctp.h
+++ b/include/net/netns/sctp.h
@@ -22,6 +22,11 @@ struct netns_sctp {
*/
struct sock *ctl_sock;
+ /* UDP tunneling listening sock. */
+ struct sock *udp4_sock;
+ /* UDP tunneling listening port. */
+ int udp_port;
+
/* This is the global local address list.
* We actively maintain this complete list of addresses on
* the system by catching address add/delete events.