2019-05-27 14:55:01 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0-or-later
|
2020-07-23 00:32:06 +08:00
|
|
|
/* L2TPv3 ethernet pseudowire driver
|
2010-04-02 14:19:26 +08:00
|
|
|
*
|
|
|
|
* Copyright (c) 2008,2009,2010 Katalix Systems Ltd
|
|
|
|
*/
|
|
|
|
|
2012-05-16 17:55:56 +08:00
|
|
|
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
|
|
|
|
|
2010-04-02 14:19:26 +08:00
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/skbuff.h>
|
|
|
|
#include <linux/socket.h>
|
|
|
|
#include <linux/hash.h>
|
|
|
|
#include <linux/l2tp.h>
|
|
|
|
#include <linux/in.h>
|
|
|
|
#include <linux/etherdevice.h>
|
|
|
|
#include <linux/spinlock.h>
|
|
|
|
#include <net/sock.h>
|
|
|
|
#include <net/ip.h>
|
|
|
|
#include <net/icmp.h>
|
|
|
|
#include <net/udp.h>
|
|
|
|
#include <net/inet_common.h>
|
|
|
|
#include <net/inet_hashtables.h>
|
|
|
|
#include <net/tcp_states.h>
|
|
|
|
#include <net/protocol.h>
|
|
|
|
#include <net/xfrm.h>
|
|
|
|
#include <net/net_namespace.h>
|
|
|
|
#include <net/netns/generic.h>
|
L2TP:Adjust intf MTU, add underlay L3, L2 hdrs.
Existing L2TP kernel code does not derive the optimal MTU for Ethernet
pseudowires and instead leaves this to a userspace L2TP daemon or
operator. If an MTU is not specified, the existing kernel code chooses
an MTU that does not take account of all tunnel header overheads, which
can lead to unwanted IP fragmentation. When L2TP is used without a
control plane (userspace daemon), we would prefer that the kernel does a
better job of choosing a default pseudowire MTU, taking account of all
tunnel header overheads, including IP header options, if any. This patch
addresses this.
Change-set here uses the new kernel function, kernel_sock_ip_overhead(),
to factor the outer IP overhead on the L2TP tunnel socket (including
IP Options, if any) when calculating the default MTU for an Ethernet
pseudowire, along with consideration of the inner Ethernet header.
Signed-off-by: R. Parameswaran <rparames@brocade.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-04-06 08:00:07 +08:00
|
|
|
#include <linux/ip.h>
|
|
|
|
#include <linux/ipv6.h>
|
|
|
|
#include <linux/udp.h>
|
2010-04-02 14:19:26 +08:00
|
|
|
|
|
|
|
#include "l2tp_core.h"
|
|
|
|
|
|
|
|
/* Default device name. May be overridden by name specified by user */
|
|
|
|
#define L2TP_ETH_DEV_NAME "l2tpeth%d"
|
|
|
|
|
|
|
|
/* via netdev_priv() */
|
|
|
|
struct l2tp_eth {
|
|
|
|
struct l2tp_session *session;
|
|
|
|
};
|
|
|
|
|
|
|
|
/* via l2tp_session_priv() */
|
|
|
|
struct l2tp_eth_sess {
|
2017-10-27 22:51:51 +08:00
|
|
|
struct net_device __rcu *dev;
|
2010-04-02 14:19:26 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
static int l2tp_eth_dev_init(struct net_device *dev)
|
|
|
|
{
|
2012-02-15 14:45:39 +08:00
|
|
|
eth_hw_addr_random(dev);
|
2015-03-03 11:54:59 +08:00
|
|
|
eth_broadcast_addr(dev->broadcast);
|
2020-05-03 13:22:19 +08:00
|
|
|
netdev_lockdep_set_classes(dev);
|
2016-06-07 00:37:15 +08:00
|
|
|
|
2010-04-02 14:19:26 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void l2tp_eth_dev_uninit(struct net_device *dev)
|
|
|
|
{
|
2017-10-27 22:51:51 +08:00
|
|
|
struct l2tp_eth *priv = netdev_priv(dev);
|
|
|
|
struct l2tp_eth_sess *spriv;
|
|
|
|
|
|
|
|
spriv = l2tp_session_priv(priv->session);
|
|
|
|
RCU_INIT_POINTER(spriv->dev, NULL);
|
|
|
|
/* No need for synchronize_net() here. We're called by
|
|
|
|
* unregister_netdev*(), which does the synchronisation for us.
|
|
|
|
*/
|
2010-04-02 14:19:26 +08:00
|
|
|
}
|
|
|
|
|
2020-06-29 03:53:36 +08:00
|
|
|
static netdev_tx_t l2tp_eth_dev_xmit(struct sk_buff *skb, struct net_device *dev)
|
2010-04-02 14:19:26 +08:00
|
|
|
{
|
|
|
|
struct l2tp_eth *priv = netdev_priv(dev);
|
|
|
|
struct l2tp_session *session = priv->session;
|
2012-06-29 04:15:13 +08:00
|
|
|
unsigned int len = skb->len;
|
2020-09-03 16:54:47 +08:00
|
|
|
int ret = l2tp_xmit_skb(session, skb);
|
2012-06-29 04:15:13 +08:00
|
|
|
|
2016-11-22 15:24:43 +08:00
|
|
|
if (likely(ret == NET_XMIT_SUCCESS)) {
|
2023-09-21 16:52:18 +08:00
|
|
|
DEV_STATS_ADD(dev, tx_bytes, len);
|
|
|
|
DEV_STATS_INC(dev, tx_packets);
|
2012-06-29 04:15:13 +08:00
|
|
|
} else {
|
2023-09-21 16:52:18 +08:00
|
|
|
DEV_STATS_INC(dev, tx_dropped);
|
2012-06-29 04:15:13 +08:00
|
|
|
}
|
2012-06-25 08:45:14 +08:00
|
|
|
return NETDEV_TX_OK;
|
2010-04-02 14:19:26 +08:00
|
|
|
}
|
|
|
|
|
2017-01-07 11:12:52 +08:00
|
|
|
static void l2tp_eth_get_stats64(struct net_device *dev,
|
|
|
|
struct rtnl_link_stats64 *stats)
|
2012-06-25 13:35:45 +08:00
|
|
|
{
|
2023-09-21 16:52:18 +08:00
|
|
|
stats->tx_bytes = DEV_STATS_READ(dev, tx_bytes);
|
|
|
|
stats->tx_packets = DEV_STATS_READ(dev, tx_packets);
|
|
|
|
stats->tx_dropped = DEV_STATS_READ(dev, tx_dropped);
|
|
|
|
stats->rx_bytes = DEV_STATS_READ(dev, rx_bytes);
|
|
|
|
stats->rx_packets = DEV_STATS_READ(dev, rx_packets);
|
|
|
|
stats->rx_errors = DEV_STATS_READ(dev, rx_errors);
|
2012-06-25 13:35:45 +08:00
|
|
|
}
|
|
|
|
|
2016-09-16 04:23:26 +08:00
|
|
|
static const struct net_device_ops l2tp_eth_netdev_ops = {
|
2010-04-02 14:19:26 +08:00
|
|
|
.ndo_init = l2tp_eth_dev_init,
|
|
|
|
.ndo_uninit = l2tp_eth_dev_uninit,
|
|
|
|
.ndo_start_xmit = l2tp_eth_dev_xmit,
|
2012-06-25 13:35:45 +08:00
|
|
|
.ndo_get_stats64 = l2tp_eth_get_stats64,
|
2014-11-19 20:24:39 +08:00
|
|
|
.ndo_set_mac_address = eth_mac_addr,
|
2010-04-02 14:19:26 +08:00
|
|
|
};
|
|
|
|
|
2017-04-24 20:16:07 +08:00
|
|
|
static struct device_type l2tpeth_type = {
|
|
|
|
.name = "l2tpeth",
|
|
|
|
};
|
|
|
|
|
2010-04-02 14:19:26 +08:00
|
|
|
static void l2tp_eth_dev_setup(struct net_device *dev)
|
|
|
|
{
|
2017-04-24 20:16:07 +08:00
|
|
|
SET_NETDEV_DEVTYPE(dev, &l2tpeth_type);
|
2010-04-02 14:19:26 +08:00
|
|
|
ether_setup(dev);
|
2012-06-25 13:35:45 +08:00
|
|
|
dev->priv_flags &= ~IFF_TX_SKB_SHARING;
|
|
|
|
dev->features |= NETIF_F_LLTX;
|
2010-04-02 14:19:26 +08:00
|
|
|
dev->netdev_ops = &l2tp_eth_netdev_ops;
|
net: Fix inconsistent teardown and release of private netdev state.
Network devices can allocate reasources and private memory using
netdev_ops->ndo_init(). However, the release of these resources
can occur in one of two different places.
Either netdev_ops->ndo_uninit() or netdev->destructor().
The decision of which operation frees the resources depends upon
whether it is necessary for all netdev refs to be released before it
is safe to perform the freeing.
netdev_ops->ndo_uninit() presumably can occur right after the
NETDEV_UNREGISTER notifier completes and the unicast and multicast
address lists are flushed.
netdev->destructor(), on the other hand, does not run until the
netdev references all go away.
Further complicating the situation is that netdev->destructor()
almost universally does also a free_netdev().
This creates a problem for the logic in register_netdevice().
Because all callers of register_netdevice() manage the freeing
of the netdev, and invoke free_netdev(dev) if register_netdevice()
fails.
If netdev_ops->ndo_init() succeeds, but something else fails inside
of register_netdevice(), it does call ndo_ops->ndo_uninit(). But
it is not able to invoke netdev->destructor().
This is because netdev->destructor() will do a free_netdev() and
then the caller of register_netdevice() will do the same.
However, this means that the resources that would normally be released
by netdev->destructor() will not be.
Over the years drivers have added local hacks to deal with this, by
invoking their destructor parts by hand when register_netdevice()
fails.
Many drivers do not try to deal with this, and instead we have leaks.
Let's close this hole by formalizing the distinction between what
private things need to be freed up by netdev->destructor() and whether
the driver needs unregister_netdevice() to perform the free_netdev().
netdev->priv_destructor() performs all actions to free up the private
resources that used to be freed by netdev->destructor(), except for
free_netdev().
netdev->needs_free_netdev is a boolean that indicates whether
free_netdev() should be done at the end of unregister_netdevice().
Now, register_netdevice() can sanely release all resources after
ndo_ops->ndo_init() succeeds, by invoking both ndo_ops->ndo_uninit()
and netdev->priv_destructor().
And at the end of unregister_netdevice(), we invoke
netdev->priv_destructor() and optionally call free_netdev().
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-05-09 00:52:56 +08:00
|
|
|
dev->needs_free_netdev = true;
|
2010-04-02 14:19:26 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void l2tp_eth_dev_recv(struct l2tp_session *session, struct sk_buff *skb, int data_len)
|
|
|
|
{
|
|
|
|
struct l2tp_eth_sess *spriv = l2tp_session_priv(session);
|
2017-10-27 22:51:51 +08:00
|
|
|
struct net_device *dev;
|
2010-04-02 14:19:26 +08:00
|
|
|
|
2012-09-05 03:54:55 +08:00
|
|
|
if (!pskb_may_pull(skb, ETH_HLEN))
|
2010-04-02 14:19:26 +08:00
|
|
|
goto error;
|
|
|
|
|
|
|
|
secpath_reset(skb);
|
|
|
|
|
|
|
|
/* checksums verified by L2TP */
|
|
|
|
skb->ip_summed = CHECKSUM_NONE;
|
|
|
|
|
|
|
|
skb_dst_drop(skb);
|
2019-09-30 02:54:03 +08:00
|
|
|
nf_reset_ct(skb);
|
2010-04-02 14:19:26 +08:00
|
|
|
|
2017-10-27 22:51:51 +08:00
|
|
|
rcu_read_lock();
|
|
|
|
dev = rcu_dereference(spriv->dev);
|
|
|
|
if (!dev)
|
|
|
|
goto error_rcu;
|
|
|
|
|
2010-04-02 14:19:26 +08:00
|
|
|
if (dev_forward_skb(dev, skb) == NET_RX_SUCCESS) {
|
2023-09-21 16:52:18 +08:00
|
|
|
DEV_STATS_INC(dev, rx_packets);
|
|
|
|
DEV_STATS_ADD(dev, rx_bytes, data_len);
|
2012-06-25 13:35:45 +08:00
|
|
|
} else {
|
2023-09-21 16:52:18 +08:00
|
|
|
DEV_STATS_INC(dev, rx_errors);
|
2012-06-25 13:35:45 +08:00
|
|
|
}
|
2017-10-27 22:51:51 +08:00
|
|
|
rcu_read_unlock();
|
|
|
|
|
2010-04-02 14:19:26 +08:00
|
|
|
return;
|
|
|
|
|
2017-10-27 22:51:51 +08:00
|
|
|
error_rcu:
|
|
|
|
rcu_read_unlock();
|
2010-04-02 14:19:26 +08:00
|
|
|
error:
|
|
|
|
kfree_skb(skb);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void l2tp_eth_delete(struct l2tp_session *session)
|
|
|
|
{
|
|
|
|
struct l2tp_eth_sess *spriv;
|
|
|
|
struct net_device *dev;
|
|
|
|
|
|
|
|
if (session) {
|
|
|
|
spriv = l2tp_session_priv(session);
|
2017-10-27 22:51:51 +08:00
|
|
|
|
|
|
|
rtnl_lock();
|
|
|
|
dev = rtnl_dereference(spriv->dev);
|
2010-04-02 14:19:26 +08:00
|
|
|
if (dev) {
|
2017-10-27 22:51:51 +08:00
|
|
|
unregister_netdevice(dev);
|
|
|
|
rtnl_unlock();
|
2012-06-07 08:07:20 +08:00
|
|
|
module_put(THIS_MODULE);
|
2017-10-27 22:51:51 +08:00
|
|
|
} else {
|
|
|
|
rtnl_unlock();
|
2010-04-02 14:19:26 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-04-02 14:19:33 +08:00
|
|
|
static void l2tp_eth_show(struct seq_file *m, void *arg)
|
|
|
|
{
|
|
|
|
struct l2tp_session *session = arg;
|
|
|
|
struct l2tp_eth_sess *spriv = l2tp_session_priv(session);
|
2017-10-27 22:51:51 +08:00
|
|
|
struct net_device *dev;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
dev = rcu_dereference(spriv->dev);
|
|
|
|
if (!dev) {
|
|
|
|
rcu_read_unlock();
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
dev_hold(dev);
|
|
|
|
rcu_read_unlock();
|
2010-04-02 14:19:33 +08:00
|
|
|
|
|
|
|
seq_printf(m, " interface %s\n", dev->name);
|
2017-10-27 22:51:51 +08:00
|
|
|
|
|
|
|
dev_put(dev);
|
2010-04-02 14:19:33 +08:00
|
|
|
}
|
|
|
|
|
L2TP:Adjust intf MTU, add underlay L3, L2 hdrs.
Existing L2TP kernel code does not derive the optimal MTU for Ethernet
pseudowires and instead leaves this to a userspace L2TP daemon or
operator. If an MTU is not specified, the existing kernel code chooses
an MTU that does not take account of all tunnel header overheads, which
can lead to unwanted IP fragmentation. When L2TP is used without a
control plane (userspace daemon), we would prefer that the kernel does a
better job of choosing a default pseudowire MTU, taking account of all
tunnel header overheads, including IP header options, if any. This patch
addresses this.
Change-set here uses the new kernel function, kernel_sock_ip_overhead(),
to factor the outer IP overhead on the L2TP tunnel socket (including
IP Options, if any) when calculating the default MTU for an Ethernet
pseudowire, along with consideration of the inner Ethernet header.
Signed-off-by: R. Parameswaran <rparames@brocade.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-04-06 08:00:07 +08:00
|
|
|
static void l2tp_eth_adjust_mtu(struct l2tp_tunnel *tunnel,
|
|
|
|
struct l2tp_session *session,
|
|
|
|
struct net_device *dev)
|
|
|
|
{
|
|
|
|
unsigned int overhead = 0;
|
|
|
|
u32 l3_overhead = 0;
|
2018-08-03 18:38:34 +08:00
|
|
|
u32 mtu;
|
L2TP:Adjust intf MTU, add underlay L3, L2 hdrs.
Existing L2TP kernel code does not derive the optimal MTU for Ethernet
pseudowires and instead leaves this to a userspace L2TP daemon or
operator. If an MTU is not specified, the existing kernel code chooses
an MTU that does not take account of all tunnel header overheads, which
can lead to unwanted IP fragmentation. When L2TP is used without a
control plane (userspace daemon), we would prefer that the kernel does a
better job of choosing a default pseudowire MTU, taking account of all
tunnel header overheads, including IP header options, if any. This patch
addresses this.
Change-set here uses the new kernel function, kernel_sock_ip_overhead(),
to factor the outer IP overhead on the L2TP tunnel socket (including
IP Options, if any) when calculating the default MTU for an Ethernet
pseudowire, along with consideration of the inner Ethernet header.
Signed-off-by: R. Parameswaran <rparames@brocade.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-04-06 08:00:07 +08:00
|
|
|
|
|
|
|
/* if the encap is UDP, account for UDP header size */
|
|
|
|
if (tunnel->encap == L2TP_ENCAPTYPE_UDP) {
|
|
|
|
overhead += sizeof(struct udphdr);
|
|
|
|
dev->needed_headroom += sizeof(struct udphdr);
|
|
|
|
}
|
2018-08-03 18:38:39 +08:00
|
|
|
|
2017-04-13 09:31:04 +08:00
|
|
|
lock_sock(tunnel->sock);
|
L2TP:Adjust intf MTU, add underlay L3, L2 hdrs.
Existing L2TP kernel code does not derive the optimal MTU for Ethernet
pseudowires and instead leaves this to a userspace L2TP daemon or
operator. If an MTU is not specified, the existing kernel code chooses
an MTU that does not take account of all tunnel header overheads, which
can lead to unwanted IP fragmentation. When L2TP is used without a
control plane (userspace daemon), we would prefer that the kernel does a
better job of choosing a default pseudowire MTU, taking account of all
tunnel header overheads, including IP header options, if any. This patch
addresses this.
Change-set here uses the new kernel function, kernel_sock_ip_overhead(),
to factor the outer IP overhead on the L2TP tunnel socket (including
IP Options, if any) when calculating the default MTU for an Ethernet
pseudowire, along with consideration of the inner Ethernet header.
Signed-off-by: R. Parameswaran <rparames@brocade.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-04-06 08:00:07 +08:00
|
|
|
l3_overhead = kernel_sock_ip_overhead(tunnel->sock);
|
2017-04-13 09:31:04 +08:00
|
|
|
release_sock(tunnel->sock);
|
2018-08-03 18:38:39 +08:00
|
|
|
|
L2TP:Adjust intf MTU, add underlay L3, L2 hdrs.
Existing L2TP kernel code does not derive the optimal MTU for Ethernet
pseudowires and instead leaves this to a userspace L2TP daemon or
operator. If an MTU is not specified, the existing kernel code chooses
an MTU that does not take account of all tunnel header overheads, which
can lead to unwanted IP fragmentation. When L2TP is used without a
control plane (userspace daemon), we would prefer that the kernel does a
better job of choosing a default pseudowire MTU, taking account of all
tunnel header overheads, including IP header options, if any. This patch
addresses this.
Change-set here uses the new kernel function, kernel_sock_ip_overhead(),
to factor the outer IP overhead on the L2TP tunnel socket (including
IP Options, if any) when calculating the default MTU for an Ethernet
pseudowire, along with consideration of the inner Ethernet header.
Signed-off-by: R. Parameswaran <rparames@brocade.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-04-06 08:00:07 +08:00
|
|
|
if (l3_overhead == 0) {
|
|
|
|
/* L3 Overhead couldn't be identified, this could be
|
|
|
|
* because tunnel->sock was NULL or the socket's
|
|
|
|
* address family was not IPv4 or IPv6,
|
|
|
|
* dev mtu stays at 1500.
|
|
|
|
*/
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
/* Adjust MTU, factor overhead - underlay L3, overlay L2 hdr
|
|
|
|
* UDP overhead, if any, was already factored in above.
|
|
|
|
*/
|
|
|
|
overhead += session->hdr_len + ETH_HLEN + l3_overhead;
|
|
|
|
|
2018-08-03 18:38:39 +08:00
|
|
|
mtu = l2tp_tunnel_dst_mtu(tunnel) - overhead;
|
|
|
|
if (mtu < dev->min_mtu || mtu > dev->max_mtu)
|
|
|
|
dev->mtu = ETH_DATA_LEN - overhead;
|
|
|
|
else
|
2018-08-03 18:38:34 +08:00
|
|
|
dev->mtu = mtu;
|
2018-08-03 18:38:39 +08:00
|
|
|
|
L2TP:Adjust intf MTU, add underlay L3, L2 hdrs.
Existing L2TP kernel code does not derive the optimal MTU for Ethernet
pseudowires and instead leaves this to a userspace L2TP daemon or
operator. If an MTU is not specified, the existing kernel code chooses
an MTU that does not take account of all tunnel header overheads, which
can lead to unwanted IP fragmentation. When L2TP is used without a
control plane (userspace daemon), we would prefer that the kernel does a
better job of choosing a default pseudowire MTU, taking account of all
tunnel header overheads, including IP header options, if any. This patch
addresses this.
Change-set here uses the new kernel function, kernel_sock_ip_overhead(),
to factor the outer IP overhead on the L2TP tunnel socket (including
IP Options, if any) when calculating the default MTU for an Ethernet
pseudowire, along with consideration of the inner Ethernet header.
Signed-off-by: R. Parameswaran <rparames@brocade.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-04-06 08:00:07 +08:00
|
|
|
dev->needed_headroom += session->hdr_len;
|
|
|
|
}
|
|
|
|
|
2017-09-01 23:58:51 +08:00
|
|
|
static int l2tp_eth_create(struct net *net, struct l2tp_tunnel *tunnel,
|
|
|
|
u32 session_id, u32 peer_session_id,
|
|
|
|
struct l2tp_session_cfg *cfg)
|
2010-04-02 14:19:26 +08:00
|
|
|
{
|
2017-04-24 20:16:06 +08:00
|
|
|
unsigned char name_assign_type;
|
2010-04-02 14:19:26 +08:00
|
|
|
struct net_device *dev;
|
|
|
|
char name[IFNAMSIZ];
|
|
|
|
struct l2tp_session *session;
|
|
|
|
struct l2tp_eth *priv;
|
|
|
|
struct l2tp_eth_sess *spriv;
|
|
|
|
int rc;
|
|
|
|
|
|
|
|
if (cfg->ifname) {
|
2022-08-19 05:02:21 +08:00
|
|
|
strscpy(name, cfg->ifname, IFNAMSIZ);
|
2017-04-24 20:16:06 +08:00
|
|
|
name_assign_type = NET_NAME_USER;
|
|
|
|
} else {
|
2010-04-02 14:19:26 +08:00
|
|
|
strcpy(name, L2TP_ETH_DEV_NAME);
|
2017-04-24 20:16:06 +08:00
|
|
|
name_assign_type = NET_NAME_ENUM;
|
|
|
|
}
|
2010-04-02 14:19:26 +08:00
|
|
|
|
|
|
|
session = l2tp_session_create(sizeof(*spriv), tunnel, session_id,
|
|
|
|
peer_session_id, cfg);
|
2017-03-31 19:02:27 +08:00
|
|
|
if (IS_ERR(session)) {
|
|
|
|
rc = PTR_ERR(session);
|
2017-10-27 22:51:51 +08:00
|
|
|
goto err;
|
2017-10-27 22:51:50 +08:00
|
|
|
}
|
|
|
|
|
2017-04-24 20:16:06 +08:00
|
|
|
dev = alloc_netdev(sizeof(*priv), name, name_assign_type,
|
net: set name_assign_type in alloc_netdev()
Extend alloc_netdev{,_mq{,s}}() to take name_assign_type as argument, and convert
all users to pass NET_NAME_UNKNOWN.
Coccinelle patch:
@@
expression sizeof_priv, name, setup, txqs, rxqs, count;
@@
(
-alloc_netdev_mqs(sizeof_priv, name, setup, txqs, rxqs)
+alloc_netdev_mqs(sizeof_priv, name, NET_NAME_UNKNOWN, setup, txqs, rxqs)
|
-alloc_netdev_mq(sizeof_priv, name, setup, count)
+alloc_netdev_mq(sizeof_priv, name, NET_NAME_UNKNOWN, setup, count)
|
-alloc_netdev(sizeof_priv, name, setup)
+alloc_netdev(sizeof_priv, name, NET_NAME_UNKNOWN, setup)
)
v9: move comments here from the wrong commit
Signed-off-by: Tom Gundersen <teg@jklm.no>
Reviewed-by: David Herrmann <dh.herrmann@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-07-14 22:37:24 +08:00
|
|
|
l2tp_eth_dev_setup);
|
2010-04-02 14:19:26 +08:00
|
|
|
if (!dev) {
|
|
|
|
rc = -ENOMEM;
|
2017-10-27 22:51:51 +08:00
|
|
|
goto err_sess;
|
2010-04-02 14:19:26 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
dev_net_set(dev, net);
|
2016-10-21 11:25:27 +08:00
|
|
|
dev->min_mtu = 0;
|
|
|
|
dev->max_mtu = ETH_MAX_MTU;
|
L2TP:Adjust intf MTU, add underlay L3, L2 hdrs.
Existing L2TP kernel code does not derive the optimal MTU for Ethernet
pseudowires and instead leaves this to a userspace L2TP daemon or
operator. If an MTU is not specified, the existing kernel code chooses
an MTU that does not take account of all tunnel header overheads, which
can lead to unwanted IP fragmentation. When L2TP is used without a
control plane (userspace daemon), we would prefer that the kernel does a
better job of choosing a default pseudowire MTU, taking account of all
tunnel header overheads, including IP header options, if any. This patch
addresses this.
Change-set here uses the new kernel function, kernel_sock_ip_overhead(),
to factor the outer IP overhead on the L2TP tunnel socket (including
IP Options, if any) when calculating the default MTU for an Ethernet
pseudowire, along with consideration of the inner Ethernet header.
Signed-off-by: R. Parameswaran <rparames@brocade.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-04-06 08:00:07 +08:00
|
|
|
l2tp_eth_adjust_mtu(tunnel, session, dev);
|
2010-04-02 14:19:26 +08:00
|
|
|
|
|
|
|
priv = netdev_priv(dev);
|
|
|
|
priv->session = session;
|
|
|
|
|
|
|
|
session->recv_skb = l2tp_eth_dev_recv;
|
|
|
|
session->session_close = l2tp_eth_delete;
|
2018-08-14 05:43:05 +08:00
|
|
|
if (IS_ENABLED(CONFIG_L2TP_DEBUGFS))
|
|
|
|
session->show = l2tp_eth_show;
|
2010-04-02 14:19:26 +08:00
|
|
|
|
|
|
|
spriv = l2tp_session_priv(session);
|
|
|
|
|
2017-10-27 22:51:51 +08:00
|
|
|
l2tp_session_inc_refcount(session);
|
|
|
|
|
|
|
|
rtnl_lock();
|
|
|
|
|
|
|
|
/* Register both device and session while holding the rtnl lock. This
|
|
|
|
* ensures that l2tp_eth_delete() will see that there's a device to
|
|
|
|
* unregister, even if it happened to run before we assign spriv->dev.
|
|
|
|
*/
|
|
|
|
rc = l2tp_session_register(session, tunnel);
|
|
|
|
if (rc < 0) {
|
|
|
|
rtnl_unlock();
|
|
|
|
goto err_sess_dev;
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = register_netdevice(dev);
|
|
|
|
if (rc < 0) {
|
|
|
|
rtnl_unlock();
|
|
|
|
l2tp_session_delete(session);
|
|
|
|
l2tp_session_dec_refcount(session);
|
|
|
|
free_netdev(dev);
|
|
|
|
|
|
|
|
return rc;
|
|
|
|
}
|
2010-04-02 14:19:26 +08:00
|
|
|
|
2022-08-19 05:02:21 +08:00
|
|
|
strscpy(session->ifname, dev->name, IFNAMSIZ);
|
2017-10-27 22:51:51 +08:00
|
|
|
rcu_assign_pointer(spriv->dev, dev);
|
|
|
|
|
|
|
|
rtnl_unlock();
|
|
|
|
|
2017-10-27 22:51:50 +08:00
|
|
|
l2tp_session_dec_refcount(session);
|
2010-04-02 14:19:26 +08:00
|
|
|
|
2017-10-27 22:51:51 +08:00
|
|
|
__module_get(THIS_MODULE);
|
2010-04-02 14:19:26 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
2017-10-27 22:51:51 +08:00
|
|
|
err_sess_dev:
|
2017-10-27 22:51:50 +08:00
|
|
|
l2tp_session_dec_refcount(session);
|
2017-10-27 22:51:51 +08:00
|
|
|
free_netdev(dev);
|
|
|
|
err_sess:
|
|
|
|
kfree(session);
|
|
|
|
err:
|
2010-04-02 14:19:26 +08:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct l2tp_nl_cmd_ops l2tp_eth_nl_cmd_ops = {
|
|
|
|
.session_create = l2tp_eth_create,
|
|
|
|
.session_delete = l2tp_session_delete,
|
|
|
|
};
|
|
|
|
|
|
|
|
static int __init l2tp_eth_init(void)
|
|
|
|
{
|
|
|
|
int err = 0;
|
|
|
|
|
|
|
|
err = l2tp_nl_register_ops(L2TP_PWTYPE_ETH, &l2tp_eth_nl_cmd_ops);
|
|
|
|
if (err)
|
2017-09-28 21:44:38 +08:00
|
|
|
goto err;
|
2010-04-02 14:19:26 +08:00
|
|
|
|
2012-05-16 17:55:56 +08:00
|
|
|
pr_info("L2TP ethernet pseudowire support (L2TPv3)\n");
|
2010-04-02 14:19:26 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
2017-09-28 21:44:38 +08:00
|
|
|
err:
|
2010-04-02 14:19:26 +08:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void __exit l2tp_eth_exit(void)
|
|
|
|
{
|
|
|
|
l2tp_nl_unregister_ops(L2TP_PWTYPE_ETH);
|
|
|
|
}
|
|
|
|
|
|
|
|
module_init(l2tp_eth_init);
|
|
|
|
module_exit(l2tp_eth_exit);
|
|
|
|
|
|
|
|
MODULE_LICENSE("GPL");
|
|
|
|
MODULE_AUTHOR("James Chapman <jchapman@katalix.com>");
|
|
|
|
MODULE_DESCRIPTION("L2TP ethernet pseudowire driver");
|
|
|
|
MODULE_VERSION("1.0");
|
2015-09-24 12:33:34 +08:00
|
|
|
MODULE_ALIAS_L2TP_PWTYPE(5);
|