1 // SPDX-License-Identifier: GPL-2.0
2 /* Multipath TCP
3 *
4 * Copyright (c) 2019, Intel Corporation.
5 */
6 #define pr_fmt(fmt) "MPTCP: " fmt
7
8 #include <linux/kernel.h>
9 #include <net/tcp.h>
10 #include <net/mptcp.h>
11 #include "protocol.h"
12
13 #include "mib.h"
14
15 /* path manager command handlers */
16
mptcp_pm_announce_addr(struct mptcp_sock * msk,const struct mptcp_addr_info * addr,bool echo)17 int mptcp_pm_announce_addr(struct mptcp_sock *msk,
18 const struct mptcp_addr_info *addr,
19 bool echo)
20 {
21 u8 add_addr = READ_ONCE(msk->pm.addr_signal);
22
23 pr_debug("msk=%p, local_id=%d, echo=%d\n", msk, addr->id, echo);
24
25 lockdep_assert_held(&msk->pm.lock);
26
27 if (add_addr &
28 (echo ? BIT(MPTCP_ADD_ADDR_ECHO) : BIT(MPTCP_ADD_ADDR_SIGNAL))) {
29 MPTCP_INC_STATS(sock_net((struct sock *)msk),
30 echo ? MPTCP_MIB_ECHOADDTXDROP : MPTCP_MIB_ADDADDRTXDROP);
31 return -EINVAL;
32 }
33
34 if (echo) {
35 msk->pm.remote = *addr;
36 add_addr |= BIT(MPTCP_ADD_ADDR_ECHO);
37 } else {
38 msk->pm.local = *addr;
39 add_addr |= BIT(MPTCP_ADD_ADDR_SIGNAL);
40 }
41 WRITE_ONCE(msk->pm.addr_signal, add_addr);
42 return 0;
43 }
44
mptcp_pm_remove_addr(struct mptcp_sock * msk,const struct mptcp_rm_list * rm_list)45 int mptcp_pm_remove_addr(struct mptcp_sock *msk, const struct mptcp_rm_list *rm_list)
46 {
47 u8 rm_addr = READ_ONCE(msk->pm.addr_signal);
48
49 pr_debug("msk=%p, rm_list_nr=%d\n", msk, rm_list->nr);
50
51 if (rm_addr) {
52 MPTCP_ADD_STATS(sock_net((struct sock *)msk),
53 MPTCP_MIB_RMADDRTXDROP, rm_list->nr);
54 return -EINVAL;
55 }
56
57 msk->pm.rm_list_tx = *rm_list;
58 rm_addr |= BIT(MPTCP_RM_ADDR_SIGNAL);
59 WRITE_ONCE(msk->pm.addr_signal, rm_addr);
60 mptcp_pm_nl_addr_send_ack(msk);
61 return 0;
62 }
63
64 /* path manager event handlers */
65
mptcp_pm_new_connection(struct mptcp_sock * msk,const struct sock * ssk,int server_side)66 void mptcp_pm_new_connection(struct mptcp_sock *msk, const struct sock *ssk, int server_side)
67 {
68 struct mptcp_pm_data *pm = &msk->pm;
69
70 pr_debug("msk=%p, token=%u side=%d\n", msk, msk->token, server_side);
71
72 WRITE_ONCE(pm->server_side, server_side);
73 mptcp_event(MPTCP_EVENT_CREATED, msk, ssk, GFP_ATOMIC);
74 }
75
mptcp_pm_allow_new_subflow(struct mptcp_sock * msk)76 bool mptcp_pm_allow_new_subflow(struct mptcp_sock *msk)
77 {
78 struct mptcp_pm_data *pm = &msk->pm;
79 unsigned int subflows_max;
80 int ret = 0;
81
82 if (mptcp_pm_is_userspace(msk)) {
83 if (mptcp_userspace_pm_active(msk)) {
84 spin_lock_bh(&pm->lock);
85 pm->subflows++;
86 spin_unlock_bh(&pm->lock);
87 return true;
88 }
89 return false;
90 }
91
92 subflows_max = mptcp_pm_get_subflows_max(msk);
93
94 pr_debug("msk=%p subflows=%d max=%d allow=%d\n", msk, pm->subflows,
95 subflows_max, READ_ONCE(pm->accept_subflow));
96
97 /* try to avoid acquiring the lock below */
98 if (!READ_ONCE(pm->accept_subflow))
99 return false;
100
101 spin_lock_bh(&pm->lock);
102 if (READ_ONCE(pm->accept_subflow)) {
103 ret = pm->subflows < subflows_max;
104 if (ret && ++pm->subflows == subflows_max)
105 WRITE_ONCE(pm->accept_subflow, false);
106 }
107 spin_unlock_bh(&pm->lock);
108
109 return ret;
110 }
111
112 /* return true if the new status bit is currently cleared, that is, this event
113 * can be server, eventually by an already scheduled work
114 */
mptcp_pm_schedule_work(struct mptcp_sock * msk,enum mptcp_pm_status new_status)115 static bool mptcp_pm_schedule_work(struct mptcp_sock *msk,
116 enum mptcp_pm_status new_status)
117 {
118 pr_debug("msk=%p status=%x new=%lx\n", msk, msk->pm.status,
119 BIT(new_status));
120 if (msk->pm.status & BIT(new_status))
121 return false;
122
123 msk->pm.status |= BIT(new_status);
124 mptcp_schedule_work((struct sock *)msk);
125 return true;
126 }
127
mptcp_pm_fully_established(struct mptcp_sock * msk,const struct sock * ssk)128 void mptcp_pm_fully_established(struct mptcp_sock *msk, const struct sock *ssk)
129 {
130 struct mptcp_pm_data *pm = &msk->pm;
131 bool announce = false;
132
133 pr_debug("msk=%p\n", msk);
134
135 spin_lock_bh(&pm->lock);
136
137 /* mptcp_pm_fully_established() can be invoked by multiple
138 * racing paths - accept() and check_fully_established()
139 * be sure to serve this event only once.
140 */
141 if (READ_ONCE(pm->work_pending) &&
142 !(msk->pm.status & BIT(MPTCP_PM_ALREADY_ESTABLISHED)))
143 mptcp_pm_schedule_work(msk, MPTCP_PM_ESTABLISHED);
144
145 if ((msk->pm.status & BIT(MPTCP_PM_ALREADY_ESTABLISHED)) == 0)
146 announce = true;
147
148 msk->pm.status |= BIT(MPTCP_PM_ALREADY_ESTABLISHED);
149 spin_unlock_bh(&pm->lock);
150
151 if (announce)
152 mptcp_event(MPTCP_EVENT_ESTABLISHED, msk, ssk, GFP_ATOMIC);
153 }
154
mptcp_pm_connection_closed(struct mptcp_sock * msk)155 void mptcp_pm_connection_closed(struct mptcp_sock *msk)
156 {
157 pr_debug("msk=%p\n", msk);
158 }
159
mptcp_pm_subflow_established(struct mptcp_sock * msk)160 void mptcp_pm_subflow_established(struct mptcp_sock *msk)
161 {
162 struct mptcp_pm_data *pm = &msk->pm;
163
164 pr_debug("msk=%p\n", msk);
165
166 if (!READ_ONCE(pm->work_pending))
167 return;
168
169 spin_lock_bh(&pm->lock);
170
171 if (READ_ONCE(pm->work_pending))
172 mptcp_pm_schedule_work(msk, MPTCP_PM_SUBFLOW_ESTABLISHED);
173
174 spin_unlock_bh(&pm->lock);
175 }
176
mptcp_pm_subflow_check_next(struct mptcp_sock * msk,const struct sock * ssk,const struct mptcp_subflow_context * subflow)177 void mptcp_pm_subflow_check_next(struct mptcp_sock *msk, const struct sock *ssk,
178 const struct mptcp_subflow_context *subflow)
179 {
180 struct mptcp_pm_data *pm = &msk->pm;
181 bool update_subflows;
182
183 update_subflows = subflow->request_join || subflow->mp_join;
184 if (mptcp_pm_is_userspace(msk)) {
185 if (update_subflows) {
186 spin_lock_bh(&pm->lock);
187 pm->subflows--;
188 spin_unlock_bh(&pm->lock);
189 }
190 return;
191 }
192
193 if (!READ_ONCE(pm->work_pending) && !update_subflows)
194 return;
195
196 spin_lock_bh(&pm->lock);
197 if (update_subflows)
198 __mptcp_pm_close_subflow(msk);
199
200 /* Even if this subflow is not really established, tell the PM to try
201 * to pick the next ones, if possible.
202 */
203 if (mptcp_pm_nl_check_work_pending(msk))
204 mptcp_pm_schedule_work(msk, MPTCP_PM_SUBFLOW_ESTABLISHED);
205
206 spin_unlock_bh(&pm->lock);
207 }
208
mptcp_pm_add_addr_received(const struct sock * ssk,const struct mptcp_addr_info * addr)209 void mptcp_pm_add_addr_received(const struct sock *ssk,
210 const struct mptcp_addr_info *addr)
211 {
212 struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(ssk);
213 struct mptcp_sock *msk = mptcp_sk(subflow->conn);
214 struct mptcp_pm_data *pm = &msk->pm;
215
216 pr_debug("msk=%p remote_id=%d accept=%d\n", msk, addr->id,
217 READ_ONCE(pm->accept_addr));
218
219 mptcp_event_addr_announced(ssk, addr);
220
221 spin_lock_bh(&pm->lock);
222
223 if (mptcp_pm_is_userspace(msk)) {
224 if (mptcp_userspace_pm_active(msk)) {
225 mptcp_pm_announce_addr(msk, addr, true);
226 mptcp_pm_add_addr_send_ack(msk);
227 } else {
228 __MPTCP_INC_STATS(sock_net((struct sock *)msk), MPTCP_MIB_ADDADDRDROP);
229 }
230 /* id0 should not have a different address */
231 } else if ((addr->id == 0 && !mptcp_pm_nl_is_init_remote_addr(msk, addr)) ||
232 (addr->id > 0 && !READ_ONCE(pm->accept_addr))) {
233 mptcp_pm_announce_addr(msk, addr, true);
234 mptcp_pm_add_addr_send_ack(msk);
235 } else if (mptcp_pm_schedule_work(msk, MPTCP_PM_ADD_ADDR_RECEIVED)) {
236 pm->remote = *addr;
237 } else {
238 __MPTCP_INC_STATS(sock_net((struct sock *)msk), MPTCP_MIB_ADDADDRDROP);
239 }
240
241 spin_unlock_bh(&pm->lock);
242 }
243
mptcp_pm_add_addr_echoed(struct mptcp_sock * msk,const struct mptcp_addr_info * addr)244 void mptcp_pm_add_addr_echoed(struct mptcp_sock *msk,
245 const struct mptcp_addr_info *addr)
246 {
247 struct mptcp_pm_data *pm = &msk->pm;
248
249 pr_debug("msk=%p\n", msk);
250
251 spin_lock_bh(&pm->lock);
252
253 if (mptcp_lookup_anno_list_by_saddr(msk, addr) && READ_ONCE(pm->work_pending))
254 mptcp_pm_schedule_work(msk, MPTCP_PM_SUBFLOW_ESTABLISHED);
255
256 spin_unlock_bh(&pm->lock);
257 }
258
mptcp_pm_add_addr_send_ack(struct mptcp_sock * msk)259 void mptcp_pm_add_addr_send_ack(struct mptcp_sock *msk)
260 {
261 if (!mptcp_pm_should_add_signal(msk))
262 return;
263
264 mptcp_pm_schedule_work(msk, MPTCP_PM_ADD_ADDR_SEND_ACK);
265 }
266
mptcp_pm_rm_addr_received(struct mptcp_sock * msk,const struct mptcp_rm_list * rm_list)267 void mptcp_pm_rm_addr_received(struct mptcp_sock *msk,
268 const struct mptcp_rm_list *rm_list)
269 {
270 struct mptcp_pm_data *pm = &msk->pm;
271 u8 i;
272
273 pr_debug("msk=%p remote_ids_nr=%d\n", msk, rm_list->nr);
274
275 for (i = 0; i < rm_list->nr; i++)
276 mptcp_event_addr_removed(msk, rm_list->ids[i]);
277
278 spin_lock_bh(&pm->lock);
279 if (mptcp_pm_schedule_work(msk, MPTCP_PM_RM_ADDR_RECEIVED))
280 pm->rm_list_rx = *rm_list;
281 else
282 __MPTCP_INC_STATS(sock_net((struct sock *)msk), MPTCP_MIB_RMADDRDROP);
283 spin_unlock_bh(&pm->lock);
284 }
285
mptcp_pm_mp_prio_received(struct sock * ssk,u8 bkup)286 void mptcp_pm_mp_prio_received(struct sock *ssk, u8 bkup)
287 {
288 struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(ssk);
289 struct sock *sk = subflow->conn;
290 struct mptcp_sock *msk;
291
292 pr_debug("subflow->backup=%d, bkup=%d\n", subflow->backup, bkup);
293 msk = mptcp_sk(sk);
294 if (subflow->backup != bkup)
295 subflow->backup = bkup;
296
297 mptcp_event(MPTCP_EVENT_SUB_PRIORITY, msk, ssk, GFP_ATOMIC);
298 }
299
mptcp_pm_mp_fail_received(struct sock * sk,u64 fail_seq)300 void mptcp_pm_mp_fail_received(struct sock *sk, u64 fail_seq)
301 {
302 struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(sk);
303 struct mptcp_sock *msk = mptcp_sk(subflow->conn);
304
305 pr_debug("fail_seq=%llu\n", fail_seq);
306
307 /* After accepting the fail, we can't create any other subflows */
308 spin_lock_bh(&msk->fallback_lock);
309 if (!msk->allow_infinite_fallback) {
310 spin_unlock_bh(&msk->fallback_lock);
311 return;
312 }
313 msk->allow_subflows = false;
314 spin_unlock_bh(&msk->fallback_lock);
315
316 if (!subflow->fail_tout) {
317 pr_debug("send MP_FAIL response and infinite map\n");
318
319 subflow->send_mp_fail = 1;
320 subflow->send_infinite_map = 1;
321 tcp_send_ack(sk);
322 } else {
323 pr_debug("MP_FAIL response received\n");
324 WRITE_ONCE(subflow->fail_tout, 0);
325 }
326 }
327
328 /* path manager helpers */
329
mptcp_pm_add_addr_signal(struct mptcp_sock * msk,const struct sk_buff * skb,unsigned int opt_size,unsigned int remaining,struct mptcp_addr_info * addr,bool * echo,bool * drop_other_suboptions)330 bool mptcp_pm_add_addr_signal(struct mptcp_sock *msk, const struct sk_buff *skb,
331 unsigned int opt_size, unsigned int remaining,
332 struct mptcp_addr_info *addr, bool *echo,
333 bool *drop_other_suboptions)
334 {
335 int ret = false;
336 u8 add_addr;
337 u8 family;
338 bool port;
339
340 spin_lock_bh(&msk->pm.lock);
341
342 /* double check after the lock is acquired */
343 if (!mptcp_pm_should_add_signal(msk))
344 goto out_unlock;
345
346 /* always drop every other options for pure ack ADD_ADDR; this is a
347 * plain dup-ack from TCP perspective. The other MPTCP-relevant info,
348 * if any, will be carried by the 'original' TCP ack
349 */
350 if (skb && skb_is_tcp_pure_ack(skb)) {
351 remaining += opt_size;
352 *drop_other_suboptions = true;
353 }
354
355 *echo = mptcp_pm_should_add_signal_echo(msk);
356 port = !!(*echo ? msk->pm.remote.port : msk->pm.local.port);
357
358 family = *echo ? msk->pm.remote.family : msk->pm.local.family;
359 if (remaining < mptcp_add_addr_len(family, *echo, port))
360 goto out_unlock;
361
362 if (*echo) {
363 *addr = msk->pm.remote;
364 add_addr = msk->pm.addr_signal & ~BIT(MPTCP_ADD_ADDR_ECHO);
365 } else {
366 *addr = msk->pm.local;
367 add_addr = msk->pm.addr_signal & ~BIT(MPTCP_ADD_ADDR_SIGNAL);
368 }
369 WRITE_ONCE(msk->pm.addr_signal, add_addr);
370 ret = true;
371
372 out_unlock:
373 spin_unlock_bh(&msk->pm.lock);
374 return ret;
375 }
376
mptcp_pm_rm_addr_signal(struct mptcp_sock * msk,unsigned int remaining,struct mptcp_rm_list * rm_list)377 bool mptcp_pm_rm_addr_signal(struct mptcp_sock *msk, unsigned int remaining,
378 struct mptcp_rm_list *rm_list)
379 {
380 int ret = false, len;
381 u8 rm_addr;
382
383 spin_lock_bh(&msk->pm.lock);
384
385 /* double check after the lock is acquired */
386 if (!mptcp_pm_should_rm_signal(msk))
387 goto out_unlock;
388
389 rm_addr = msk->pm.addr_signal & ~BIT(MPTCP_RM_ADDR_SIGNAL);
390 len = mptcp_rm_addr_len(&msk->pm.rm_list_tx);
391 if (len < 0) {
392 WRITE_ONCE(msk->pm.addr_signal, rm_addr);
393 goto out_unlock;
394 }
395 if (remaining < len)
396 goto out_unlock;
397
398 *rm_list = msk->pm.rm_list_tx;
399 WRITE_ONCE(msk->pm.addr_signal, rm_addr);
400 ret = true;
401
402 out_unlock:
403 spin_unlock_bh(&msk->pm.lock);
404 return ret;
405 }
406
mptcp_pm_get_local_id(struct mptcp_sock * msk,struct sock_common * skc)407 int mptcp_pm_get_local_id(struct mptcp_sock *msk, struct sock_common *skc)
408 {
409 struct mptcp_addr_info skc_local;
410 struct mptcp_addr_info msk_local;
411
412 if (WARN_ON_ONCE(!msk))
413 return -1;
414
415 /* The 0 ID mapping is defined by the first subflow, copied into the msk
416 * addr
417 */
418 mptcp_local_address((struct sock_common *)msk, &msk_local);
419 mptcp_local_address((struct sock_common *)skc, &skc_local);
420 if (mptcp_addresses_equal(&msk_local, &skc_local, false))
421 return 0;
422
423 if (mptcp_pm_is_userspace(msk))
424 return mptcp_userspace_pm_get_local_id(msk, &skc_local);
425 return mptcp_pm_nl_get_local_id(msk, &skc_local);
426 }
427
mptcp_pm_is_backup(struct mptcp_sock * msk,struct sock_common * skc)428 bool mptcp_pm_is_backup(struct mptcp_sock *msk, struct sock_common *skc)
429 {
430 struct mptcp_addr_info skc_local;
431
432 mptcp_local_address((struct sock_common *)skc, &skc_local);
433
434 if (mptcp_pm_is_userspace(msk))
435 return mptcp_userspace_pm_is_backup(msk, &skc_local);
436
437 return mptcp_pm_nl_is_backup(msk, &skc_local);
438 }
439
mptcp_pm_get_flags_and_ifindex_by_id(struct mptcp_sock * msk,unsigned int id,u8 * flags,int * ifindex)440 int mptcp_pm_get_flags_and_ifindex_by_id(struct mptcp_sock *msk, unsigned int id,
441 u8 *flags, int *ifindex)
442 {
443 *flags = 0;
444 *ifindex = 0;
445
446 if (mptcp_pm_is_userspace(msk))
447 return mptcp_userspace_pm_get_flags_and_ifindex_by_id(msk, id, flags, ifindex);
448 return mptcp_pm_nl_get_flags_and_ifindex_by_id(msk, id, flags, ifindex);
449 }
450
mptcp_pm_set_flags(struct net * net,struct nlattr * token,struct mptcp_pm_addr_entry * loc,struct mptcp_pm_addr_entry * rem,u8 bkup)451 int mptcp_pm_set_flags(struct net *net, struct nlattr *token,
452 struct mptcp_pm_addr_entry *loc,
453 struct mptcp_pm_addr_entry *rem, u8 bkup)
454 {
455 if (token)
456 return mptcp_userspace_pm_set_flags(net, token, loc, rem, bkup);
457 return mptcp_pm_nl_set_flags(net, loc, bkup);
458 }
459
mptcp_pm_subflow_chk_stale(const struct mptcp_sock * msk,struct sock * ssk)460 void mptcp_pm_subflow_chk_stale(const struct mptcp_sock *msk, struct sock *ssk)
461 {
462 struct mptcp_subflow_context *subflow = mptcp_subflow_ctx(ssk);
463 u32 rcv_tstamp = READ_ONCE(tcp_sk(ssk)->rcv_tstamp);
464
465 /* keep track of rtx periods with no progress */
466 if (!subflow->stale_count) {
467 subflow->stale_rcv_tstamp = rcv_tstamp;
468 subflow->stale_count++;
469 } else if (subflow->stale_rcv_tstamp == rcv_tstamp) {
470 if (subflow->stale_count < U8_MAX)
471 subflow->stale_count++;
472 mptcp_pm_nl_subflow_chk_stale(msk, ssk);
473 } else {
474 subflow->stale_count = 0;
475 mptcp_subflow_set_active(subflow);
476 }
477 }
478
479 /* if sk is ipv4 or ipv6_only allows only same-family local and remote addresses,
480 * otherwise allow any matching local/remote pair
481 */
mptcp_pm_addr_families_match(const struct sock * sk,const struct mptcp_addr_info * loc,const struct mptcp_addr_info * rem)482 bool mptcp_pm_addr_families_match(const struct sock *sk,
483 const struct mptcp_addr_info *loc,
484 const struct mptcp_addr_info *rem)
485 {
486 bool mptcp_is_v4 = sk->sk_family == AF_INET;
487
488 #if IS_ENABLED(CONFIG_MPTCP_IPV6)
489 bool loc_is_v4 = loc->family == AF_INET || ipv6_addr_v4mapped(&loc->addr6);
490 bool rem_is_v4 = rem->family == AF_INET || ipv6_addr_v4mapped(&rem->addr6);
491
492 if (mptcp_is_v4)
493 return loc_is_v4 && rem_is_v4;
494
495 if (ipv6_only_sock(sk))
496 return !loc_is_v4 && !rem_is_v4;
497
498 return loc_is_v4 == rem_is_v4;
499 #else
500 return mptcp_is_v4 && loc->family == AF_INET && rem->family == AF_INET;
501 #endif
502 }
503
mptcp_pm_data_reset(struct mptcp_sock * msk)504 void mptcp_pm_data_reset(struct mptcp_sock *msk)
505 {
506 u8 pm_type = mptcp_get_pm_type(sock_net((struct sock *)msk));
507 struct mptcp_pm_data *pm = &msk->pm;
508
509 pm->add_addr_signaled = 0;
510 pm->add_addr_accepted = 0;
511 pm->local_addr_used = 0;
512 pm->subflows = 0;
513 pm->rm_list_tx.nr = 0;
514 pm->rm_list_rx.nr = 0;
515 WRITE_ONCE(pm->pm_type, pm_type);
516
517 if (pm_type == MPTCP_PM_TYPE_KERNEL) {
518 bool subflows_allowed = !!mptcp_pm_get_subflows_max(msk);
519
520 /* pm->work_pending must be only be set to 'true' when
521 * pm->pm_type is set to MPTCP_PM_TYPE_KERNEL
522 */
523 WRITE_ONCE(pm->work_pending,
524 (!!mptcp_pm_get_local_addr_max(msk) &&
525 subflows_allowed) ||
526 !!mptcp_pm_get_add_addr_signal_max(msk));
527 WRITE_ONCE(pm->accept_addr,
528 !!mptcp_pm_get_add_addr_accept_max(msk) &&
529 subflows_allowed);
530 WRITE_ONCE(pm->accept_subflow, subflows_allowed);
531 } else {
532 WRITE_ONCE(pm->work_pending, 0);
533 WRITE_ONCE(pm->accept_addr, 0);
534 WRITE_ONCE(pm->accept_subflow, 0);
535 }
536
537 WRITE_ONCE(pm->addr_signal, 0);
538 WRITE_ONCE(pm->remote_deny_join_id0, false);
539 pm->status = 0;
540 bitmap_fill(msk->pm.id_avail_bitmap, MPTCP_PM_MAX_ADDR_ID + 1);
541 }
542
mptcp_pm_data_init(struct mptcp_sock * msk)543 void mptcp_pm_data_init(struct mptcp_sock *msk)
544 {
545 spin_lock_init(&msk->pm.lock);
546 INIT_LIST_HEAD(&msk->pm.anno_list);
547 INIT_LIST_HEAD(&msk->pm.userspace_pm_local_addr_list);
548 mptcp_pm_data_reset(msk);
549 }
550
mptcp_pm_init(void)551 void __init mptcp_pm_init(void)
552 {
553 mptcp_pm_nl_init();
554 }
555