cachepc-linux

Fork of AMDESE/linux with modifications for CachePC side-channel attack
git clone https://git.sinitax.com/sinitax/cachepc-linux
Log | Files | Refs | README | LICENSE | sfeed.txt

l2tp.rst (27479B)


      1.. SPDX-License-Identifier: GPL-2.0
      2
      3====
      4L2TP
      5====
      6
      7Layer 2 Tunneling Protocol (L2TP) allows L2 frames to be tunneled over
      8an IP network.
      9
     10This document covers the kernel's L2TP subsystem. It documents kernel
     11APIs for application developers who want to use the L2TP subsystem and
     12it provides some technical details about the internal implementation
     13which may be useful to kernel developers and maintainers.
     14
     15Overview
     16========
     17
     18The kernel's L2TP subsystem implements the datapath for L2TPv2 and
     19L2TPv3. L2TPv2 is carried over UDP. L2TPv3 is carried over UDP or
     20directly over IP (protocol 115).
     21
     22The L2TP RFCs define two basic kinds of L2TP packets: control packets
     23(the "control plane"), and data packets (the "data plane"). The kernel
     24deals only with data packets. The more complex control packets are
     25handled by user space.
     26
     27An L2TP tunnel carries one or more L2TP sessions. Each tunnel is
     28associated with a socket. Each session is associated with a virtual
     29netdevice, e.g. ``pppN``, ``l2tpethN``, through which data frames pass
     30to/from L2TP. Fields in the L2TP header identify the tunnel or session
     31and whether it is a control or data packet. When tunnels and sessions
     32are set up using the Linux kernel API, we're just setting up the L2TP
     33data path. All aspects of the control protocol are to be handled by
     34user space.
     35
     36This split in responsibilities leads to a natural sequence of
     37operations when establishing tunnels and sessions. The procedure looks
     38like this:
     39
     40    1) Create a tunnel socket. Exchange L2TP control protocol messages
     41       with the peer over that socket in order to establish a tunnel.
     42
     43    2) Create a tunnel context in the kernel, using information
     44       obtained from the peer using the control protocol messages.
     45
     46    3) Exchange L2TP control protocol messages with the peer over the
     47       tunnel socket in order to establish a session.
     48
     49    4) Create a session context in the kernel using information
     50       obtained from the peer using the control protocol messages.
     51
     52L2TP APIs
     53=========
     54
     55This section documents each userspace API of the L2TP subsystem.
     56
     57Tunnel Sockets
     58--------------
     59
     60L2TPv2 always uses UDP. L2TPv3 may use UDP or IP encapsulation.
     61
     62To create a tunnel socket for use by L2TP, the standard POSIX
     63socket API is used.
     64
     65For example, for a tunnel using IPv4 addresses and UDP encapsulation::
     66
     67    int sockfd = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
     68
     69Or for a tunnel using IPv6 addresses and IP encapsulation::
     70
     71    int sockfd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_L2TP);
     72
     73UDP socket programming doesn't need to be covered here.
     74
     75IPPROTO_L2TP is an IP protocol type implemented by the kernel's L2TP
     76subsystem. The L2TPIP socket address is defined in struct
     77sockaddr_l2tpip and struct sockaddr_l2tpip6 at
     78`include/uapi/linux/l2tp.h`_. The address includes the L2TP tunnel
     79(connection) id. To use L2TP IP encapsulation, an L2TPv3 application
     80should bind the L2TPIP socket using the locally assigned
     81tunnel id. When the peer's tunnel id and IP address is known, a
     82connect must be done.
     83
     84If the L2TP application needs to handle L2TPv3 tunnel setup requests
     85from peers using L2TPIP, it must open a dedicated L2TPIP
     86socket to listen for those requests and bind the socket using tunnel
     87id 0 since tunnel setup requests are addressed to tunnel id 0.
     88
     89An L2TP tunnel and all of its sessions are automatically closed when
     90its tunnel socket is closed.
     91
     92Netlink API
     93-----------
     94
     95L2TP applications use netlink to manage L2TP tunnel and session
     96instances in the kernel. The L2TP netlink API is defined in
     97`include/uapi/linux/l2tp.h`_.
     98
     99L2TP uses `Generic Netlink`_ (GENL). Several commands are defined:
    100Create, Delete, Modify and Get for tunnel and session
    101instances, e.g. ``L2TP_CMD_TUNNEL_CREATE``. The API header lists the
    102netlink attribute types that can be used with each command.
    103
    104Tunnel and session instances are identified by a locally unique
    10532-bit id.  L2TP tunnel ids are given by ``L2TP_ATTR_CONN_ID`` and
    106``L2TP_ATTR_PEER_CONN_ID`` attributes and L2TP session ids are given
    107by ``L2TP_ATTR_SESSION_ID`` and ``L2TP_ATTR_PEER_SESSION_ID``
    108attributes. If netlink is used to manage L2TPv2 tunnel and session
    109instances, the L2TPv2 16-bit tunnel/session id is cast to a 32-bit
    110value in these attributes.
    111
    112In the ``L2TP_CMD_TUNNEL_CREATE`` command, ``L2TP_ATTR_FD`` tells the
    113kernel the tunnel socket fd being used. If not specified, the kernel
    114creates a kernel socket for the tunnel, using IP parameters set in
    115``L2TP_ATTR_IP[6]_SADDR``, ``L2TP_ATTR_IP[6]_DADDR``,
    116``L2TP_ATTR_UDP_SPORT``, ``L2TP_ATTR_UDP_DPORT`` attributes. Kernel
    117sockets are used to implement unmanaged L2TPv3 tunnels (iproute2's "ip
    118l2tp" commands). If ``L2TP_ATTR_FD`` is given, it must be a socket fd
    119that is already bound and connected. There is more information about
    120unmanaged tunnels later in this document.
    121
    122``L2TP_CMD_TUNNEL_CREATE`` attributes:-
    123
    124================== ======== ===
    125Attribute          Required Use
    126================== ======== ===
    127CONN_ID            Y        Sets the tunnel (connection) id.
    128PEER_CONN_ID       Y        Sets the peer tunnel (connection) id.
    129PROTO_VERSION      Y        Protocol version. 2 or 3.
    130ENCAP_TYPE         Y        Encapsulation type: UDP or IP.
    131FD                 N        Tunnel socket file descriptor.
    132UDP_CSUM           N        Enable IPv4 UDP checksums. Used only if FD is
    133                            not set.
    134UDP_ZERO_CSUM6_TX  N        Zero IPv6 UDP checksum on transmit. Used only
    135                            if FD is not set.
    136UDP_ZERO_CSUM6_RX  N        Zero IPv6 UDP checksum on receive. Used only if
    137                            FD is not set.
    138IP_SADDR           N        IPv4 source address. Used only if FD is not
    139                            set.
    140IP_DADDR           N        IPv4 destination address. Used only if FD is
    141                            not set.
    142UDP_SPORT          N        UDP source port. Used only if FD is not set.
    143UDP_DPORT          N        UDP destination port. Used only if FD is not
    144                            set.
    145IP6_SADDR          N        IPv6 source address. Used only if FD is not
    146                            set.
    147IP6_DADDR          N        IPv6 destination address. Used only if FD is
    148                            not set.
    149DEBUG              N        Debug flags.
    150================== ======== ===
    151
    152``L2TP_CMD_TUNNEL_DESTROY`` attributes:-
    153
    154================== ======== ===
    155Attribute          Required Use
    156================== ======== ===
    157CONN_ID            Y        Identifies the tunnel id to be destroyed.
    158================== ======== ===
    159
    160``L2TP_CMD_TUNNEL_MODIFY`` attributes:-
    161
    162================== ======== ===
    163Attribute          Required Use
    164================== ======== ===
    165CONN_ID            Y        Identifies the tunnel id to be modified.
    166DEBUG              N        Debug flags.
    167================== ======== ===
    168
    169``L2TP_CMD_TUNNEL_GET`` attributes:-
    170
    171================== ======== ===
    172Attribute          Required Use
    173================== ======== ===
    174CONN_ID            N        Identifies the tunnel id to be queried.
    175                            Ignored in DUMP requests.
    176================== ======== ===
    177
    178``L2TP_CMD_SESSION_CREATE`` attributes:-
    179
    180================== ======== ===
    181Attribute          Required Use
    182================== ======== ===
    183CONN_ID            Y        The parent tunnel id.
    184SESSION_ID         Y        Sets the session id.
    185PEER_SESSION_ID    Y        Sets the parent session id.
    186PW_TYPE            Y        Sets the pseudowire type.
    187DEBUG              N        Debug flags.
    188RECV_SEQ           N        Enable rx data sequence numbers.
    189SEND_SEQ           N        Enable tx data sequence numbers.
    190LNS_MODE           N        Enable LNS mode (auto-enable data sequence
    191                            numbers).
    192RECV_TIMEOUT       N        Timeout to wait when reordering received
    193                            packets.
    194L2SPEC_TYPE        N        Sets layer2-specific-sublayer type (L2TPv3
    195                            only).
    196COOKIE             N        Sets optional cookie (L2TPv3 only).
    197PEER_COOKIE        N        Sets optional peer cookie (L2TPv3 only).
    198IFNAME             N        Sets interface name (L2TPv3 only).
    199================== ======== ===
    200
    201For Ethernet session types, this will create an l2tpeth virtual
    202interface which can then be configured as required. For PPP session
    203types, a PPPoL2TP socket must also be opened and connected, mapping it
    204onto the new session. This is covered in "PPPoL2TP Sockets" later.
    205
    206``L2TP_CMD_SESSION_DESTROY`` attributes:-
    207
    208================== ======== ===
    209Attribute          Required Use
    210================== ======== ===
    211CONN_ID            Y        Identifies the parent tunnel id of the session
    212                            to be destroyed.
    213SESSION_ID         Y        Identifies the session id to be destroyed.
    214IFNAME             N        Identifies the session by interface name. If
    215                            set, this overrides any CONN_ID and SESSION_ID
    216                            attributes. Currently supported for L2TPv3
    217                            Ethernet sessions only.
    218================== ======== ===
    219
    220``L2TP_CMD_SESSION_MODIFY`` attributes:-
    221
    222================== ======== ===
    223Attribute          Required Use
    224================== ======== ===
    225CONN_ID            Y        Identifies the parent tunnel id of the session
    226                            to be modified.
    227SESSION_ID         Y        Identifies the session id to be modified.
    228IFNAME             N        Identifies the session by interface name. If
    229                            set, this overrides any CONN_ID and SESSION_ID
    230                            attributes. Currently supported for L2TPv3
    231                            Ethernet sessions only.
    232DEBUG              N        Debug flags.
    233RECV_SEQ           N        Enable rx data sequence numbers.
    234SEND_SEQ           N        Enable tx data sequence numbers.
    235LNS_MODE           N        Enable LNS mode (auto-enable data sequence
    236                            numbers).
    237RECV_TIMEOUT       N        Timeout to wait when reordering received
    238                            packets.
    239================== ======== ===
    240
    241``L2TP_CMD_SESSION_GET`` attributes:-
    242
    243================== ======== ===
    244Attribute          Required Use
    245================== ======== ===
    246CONN_ID            N        Identifies the tunnel id to be queried.
    247                            Ignored for DUMP requests.
    248SESSION_ID         N        Identifies the session id to be queried.
    249                            Ignored for DUMP requests.
    250IFNAME             N        Identifies the session by interface name.
    251                            If set, this overrides any CONN_ID and
    252                            SESSION_ID attributes. Ignored for DUMP
    253                            requests. Currently supported for L2TPv3
    254                            Ethernet sessions only.
    255================== ======== ===
    256
    257Application developers should refer to `include/uapi/linux/l2tp.h`_ for
    258netlink command and attribute definitions.
    259
    260Sample userspace code using libmnl_:
    261
    262  - Open L2TP netlink socket::
    263
    264        struct nl_sock *nl_sock;
    265        int l2tp_nl_family_id;
    266
    267        nl_sock = nl_socket_alloc();
    268        genl_connect(nl_sock);
    269        genl_id = genl_ctrl_resolve(nl_sock, L2TP_GENL_NAME);
    270
    271  - Create a tunnel::
    272
    273        struct nlmsghdr *nlh;
    274        struct genlmsghdr *gnlh;
    275
    276        nlh = mnl_nlmsg_put_header(buf);
    277        nlh->nlmsg_type = genl_id; /* assigned to genl socket */
    278        nlh->nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK;
    279        nlh->nlmsg_seq = seq;
    280
    281        gnlh = mnl_nlmsg_put_extra_header(nlh, sizeof(*gnlh));
    282        gnlh->cmd = L2TP_CMD_TUNNEL_CREATE;
    283        gnlh->version = L2TP_GENL_VERSION;
    284        gnlh->reserved = 0;
    285
    286        mnl_attr_put_u32(nlh, L2TP_ATTR_FD, tunl_sock_fd);
    287        mnl_attr_put_u32(nlh, L2TP_ATTR_CONN_ID, tid);
    288        mnl_attr_put_u32(nlh, L2TP_ATTR_PEER_CONN_ID, peer_tid);
    289        mnl_attr_put_u8(nlh, L2TP_ATTR_PROTO_VERSION, protocol_version);
    290        mnl_attr_put_u16(nlh, L2TP_ATTR_ENCAP_TYPE, encap);
    291
    292  - Create a session::
    293
    294        struct nlmsghdr *nlh;
    295        struct genlmsghdr *gnlh;
    296
    297        nlh = mnl_nlmsg_put_header(buf);
    298        nlh->nlmsg_type = genl_id; /* assigned to genl socket */
    299        nlh->nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK;
    300        nlh->nlmsg_seq = seq;
    301
    302        gnlh = mnl_nlmsg_put_extra_header(nlh, sizeof(*gnlh));
    303        gnlh->cmd = L2TP_CMD_SESSION_CREATE;
    304        gnlh->version = L2TP_GENL_VERSION;
    305        gnlh->reserved = 0;
    306
    307        mnl_attr_put_u32(nlh, L2TP_ATTR_CONN_ID, tid);
    308        mnl_attr_put_u32(nlh, L2TP_ATTR_PEER_CONN_ID, peer_tid);
    309        mnl_attr_put_u32(nlh, L2TP_ATTR_SESSION_ID, sid);
    310        mnl_attr_put_u32(nlh, L2TP_ATTR_PEER_SESSION_ID, peer_sid);
    311        mnl_attr_put_u16(nlh, L2TP_ATTR_PW_TYPE, pwtype);
    312        /* there are other session options which can be set using netlink
    313         * attributes during session creation -- see l2tp.h
    314         */
    315
    316  - Delete a session::
    317
    318        struct nlmsghdr *nlh;
    319        struct genlmsghdr *gnlh;
    320
    321        nlh = mnl_nlmsg_put_header(buf);
    322        nlh->nlmsg_type = genl_id; /* assigned to genl socket */
    323        nlh->nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK;
    324        nlh->nlmsg_seq = seq;
    325
    326        gnlh = mnl_nlmsg_put_extra_header(nlh, sizeof(*gnlh));
    327        gnlh->cmd = L2TP_CMD_SESSION_DELETE;
    328        gnlh->version = L2TP_GENL_VERSION;
    329        gnlh->reserved = 0;
    330
    331        mnl_attr_put_u32(nlh, L2TP_ATTR_CONN_ID, tid);
    332        mnl_attr_put_u32(nlh, L2TP_ATTR_SESSION_ID, sid);
    333
    334  - Delete a tunnel and all of its sessions (if any)::
    335
    336        struct nlmsghdr *nlh;
    337        struct genlmsghdr *gnlh;
    338
    339        nlh = mnl_nlmsg_put_header(buf);
    340        nlh->nlmsg_type = genl_id; /* assigned to genl socket */
    341        nlh->nlmsg_flags = NLM_F_REQUEST | NLM_F_ACK;
    342        nlh->nlmsg_seq = seq;
    343
    344        gnlh = mnl_nlmsg_put_extra_header(nlh, sizeof(*gnlh));
    345        gnlh->cmd = L2TP_CMD_TUNNEL_DELETE;
    346        gnlh->version = L2TP_GENL_VERSION;
    347        gnlh->reserved = 0;
    348
    349        mnl_attr_put_u32(nlh, L2TP_ATTR_CONN_ID, tid);
    350
    351PPPoL2TP Session Socket API
    352---------------------------
    353
    354For PPP session types, a PPPoL2TP socket must be opened and connected
    355to the L2TP session.
    356
    357When creating PPPoL2TP sockets, the application provides information
    358to the kernel about the tunnel and session in a socket connect()
    359call. Source and destination tunnel and session ids are provided, as
    360well as the file descriptor of a UDP or L2TPIP socket. See struct
    361pppol2tp_addr in `include/linux/if_pppol2tp.h`_. For historical reasons,
    362there are unfortunately slightly different address structures for
    363L2TPv2/L2TPv3 IPv4/IPv6 tunnels and userspace must use the appropriate
    364structure that matches the tunnel socket type.
    365
    366Userspace may control behavior of the tunnel or session using
    367setsockopt and ioctl on the PPPoX socket. The following socket
    368options are supported:-
    369
    370=========   ===========================================================
    371DEBUG       bitmask of debug message categories. See below.
    372SENDSEQ     - 0 => don't send packets with sequence numbers
    373            - 1 => send packets with sequence numbers
    374RECVSEQ     - 0 => receive packet sequence numbers are optional
    375            - 1 => drop receive packets without sequence numbers
    376LNSMODE     - 0 => act as LAC.
    377            - 1 => act as LNS.
    378REORDERTO   reorder timeout (in millisecs). If 0, don't try to reorder.
    379=========   ===========================================================
    380
    381In addition to the standard PPP ioctls, a PPPIOCGL2TPSTATS is provided
    382to retrieve tunnel and session statistics from the kernel using the
    383PPPoX socket of the appropriate tunnel or session.
    384
    385Sample userspace code:
    386
    387  - Create session PPPoX data socket::
    388
    389        struct sockaddr_pppol2tp sax;
    390        int fd;
    391
    392        /* Note, the tunnel socket must be bound already, else it
    393         * will not be ready
    394         */
    395        sax.sa_family = AF_PPPOX;
    396        sax.sa_protocol = PX_PROTO_OL2TP;
    397        sax.pppol2tp.fd = tunnel_fd;
    398        sax.pppol2tp.addr.sin_addr.s_addr = addr->sin_addr.s_addr;
    399        sax.pppol2tp.addr.sin_port = addr->sin_port;
    400        sax.pppol2tp.addr.sin_family = AF_INET;
    401        sax.pppol2tp.s_tunnel  = tunnel_id;
    402        sax.pppol2tp.s_session = session_id;
    403        sax.pppol2tp.d_tunnel  = peer_tunnel_id;
    404        sax.pppol2tp.d_session = peer_session_id;
    405
    406        /* session_fd is the fd of the session's PPPoL2TP socket.
    407         * tunnel_fd is the fd of the tunnel UDP / L2TPIP socket.
    408         */
    409        fd = connect(session_fd, (struct sockaddr *)&sax, sizeof(sax));
    410        if (fd < 0 ) {
    411                return -errno;
    412        }
    413        return 0;
    414
    415Old L2TPv2-only API
    416-------------------
    417
    418When L2TP was first added to the Linux kernel in 2.6.23, it
    419implemented only L2TPv2 and did not include a netlink API. Instead,
    420tunnel and session instances in the kernel were managed directly using
    421only PPPoL2TP sockets. The PPPoL2TP socket is used as described in
    422section "PPPoL2TP Session Socket API" but tunnel and session instances
    423are automatically created on a connect() of the socket instead of
    424being created by a separate netlink request:
    425
    426    - Tunnels are managed using a tunnel management socket which is a
    427      dedicated PPPoL2TP socket, connected to (invalid) session
    428      id 0. The L2TP tunnel instance is created when the PPPoL2TP
    429      tunnel management socket is connected and is destroyed when the
    430      socket is closed.
    431
    432    - Session instances are created in the kernel when a PPPoL2TP
    433      socket is connected to a non-zero session id. Session parameters
    434      are set using setsockopt. The L2TP session instance is destroyed
    435      when the socket is closed.
    436
    437This API is still supported but its use is discouraged. Instead, new
    438L2TPv2 applications should use netlink to first create the tunnel and
    439session, then create a PPPoL2TP socket for the session.
    440
    441Unmanaged L2TPv3 tunnels
    442------------------------
    443
    444The kernel L2TP subsystem also supports static (unmanaged) L2TPv3
    445tunnels. Unmanaged tunnels have no userspace tunnel socket, and
    446exchange no control messages with the peer to set up the tunnel; the
    447tunnel is configured manually at each end of the tunnel. All
    448configuration is done using netlink. There is no need for an L2TP
    449userspace application in this case -- the tunnel socket is created by
    450the kernel and configured using parameters sent in the
    451``L2TP_CMD_TUNNEL_CREATE`` netlink request. The ``ip`` utility of
    452``iproute2`` has commands for managing static L2TPv3 tunnels; do ``ip
    453l2tp help`` for more information.
    454
    455Debugging
    456---------
    457
    458The L2TP subsystem offers a range of debugging interfaces through the
    459debugfs filesystem.
    460
    461To access these interfaces, the debugfs filesystem must first be mounted::
    462
    463    # mount -t debugfs debugfs /debug
    464
    465Files under the l2tp directory can then be accessed, providing a summary
    466of the current population of tunnel and session contexts existing in the
    467kernel::
    468
    469    # cat /debug/l2tp/tunnels
    470
    471The debugfs files should not be used by applications to obtain L2TP
    472state information because the file format is subject to change. It is
    473implemented to provide extra debug information to help diagnose
    474problems. Applications should instead use the netlink API.
    475
    476In addition the L2TP subsystem implements tracepoints using the standard
    477kernel event tracing API.  The available L2TP events can be reviewed as
    478follows::
    479
    480    # find /debug/tracing/events/l2tp
    481
    482Finally, /proc/net/pppol2tp is also provided for backwards compatibility
    483with the original pppol2tp code. It lists information about L2TPv2
    484tunnels and sessions only. Its use is discouraged.
    485
    486Internal Implementation
    487=======================
    488
    489This section is for kernel developers and maintainers.
    490
    491Sockets
    492-------
    493
    494UDP sockets are implemented by the networking core. When an L2TP
    495tunnel is created using a UDP socket, the socket is set up as an
    496encapsulated UDP socket by setting encap_rcv and encap_destroy
    497callbacks on the UDP socket. l2tp_udp_encap_recv is called when
    498packets are received on the socket. l2tp_udp_encap_destroy is called
    499when userspace closes the socket.
    500
    501L2TPIP sockets are implemented in `net/l2tp/l2tp_ip.c`_ and
    502`net/l2tp/l2tp_ip6.c`_.
    503
    504Tunnels
    505-------
    506
    507The kernel keeps a struct l2tp_tunnel context per L2TP tunnel. The
    508l2tp_tunnel is always associated with a UDP or L2TP/IP socket and
    509keeps a list of sessions in the tunnel. When a tunnel is first
    510registered with L2TP core, the reference count on the socket is
    511increased. This ensures that the socket cannot be removed while L2TP's
    512data structures reference it.
    513
    514Tunnels are identified by a unique tunnel id. The id is 16-bit for
    515L2TPv2 and 32-bit for L2TPv3. Internally, the id is stored as a 32-bit
    516value.
    517
    518Tunnels are kept in a per-net list, indexed by tunnel id. The tunnel
    519id namespace is shared by L2TPv2 and L2TPv3. The tunnel context can be
    520derived from the socket's sk_user_data.
    521
    522Handling tunnel socket close is perhaps the most tricky part of the
    523L2TP implementation. If userspace closes a tunnel socket, the L2TP
    524tunnel and all of its sessions must be closed and destroyed. Since the
    525tunnel context holds a ref on the tunnel socket, the socket's
    526sk_destruct won't be called until the tunnel sock_put's its
    527socket. For UDP sockets, when userspace closes the tunnel socket, the
    528socket's encap_destroy handler is invoked, which L2TP uses to initiate
    529its tunnel close actions. For L2TPIP sockets, the socket's close
    530handler initiates the same tunnel close actions. All sessions are
    531first closed. Each session drops its tunnel ref. When the tunnel ref
    532reaches zero, the tunnel puts its socket ref. When the socket is
    533eventually destroyed, it's sk_destruct finally frees the L2TP tunnel
    534context.
    535
    536Sessions
    537--------
    538
    539The kernel keeps a struct l2tp_session context for each session.  Each
    540session has private data which is used for data specific to the
    541session type. With L2TPv2, the session always carries PPP
    542traffic. With L2TPv3, the session can carry Ethernet frames (Ethernet
    543pseudowire) or other data types such as PPP, ATM, HDLC or Frame
    544Relay. Linux currently implements only Ethernet and PPP session types.
    545
    546Some L2TP session types also have a socket (PPP pseudowires) while
    547others do not (Ethernet pseudowires). We can't therefore use the
    548socket reference count as the reference count for session
    549contexts. The L2TP implementation therefore has its own internal
    550reference counts on the session contexts.
    551
    552Like tunnels, L2TP sessions are identified by a unique
    553session id. Just as with tunnel ids, the session id is 16-bit for
    554L2TPv2 and 32-bit for L2TPv3. Internally, the id is stored as a 32-bit
    555value.
    556
    557Sessions hold a ref on their parent tunnel to ensure that the tunnel
    558stays extant while one or more sessions references it.
    559
    560Sessions are kept in a per-tunnel list, indexed by session id. L2TPv3
    561sessions are also kept in a per-net list indexed by session id,
    562because L2TPv3 session ids are unique across all tunnels and L2TPv3
    563data packets do not contain a tunnel id in the header. This list is
    564therefore needed to find the session context associated with a
    565received data packet when the tunnel context cannot be derived from
    566the tunnel socket.
    567
    568Although the L2TPv3 RFC specifies that L2TPv3 session ids are not
    569scoped by the tunnel, the kernel does not police this for L2TPv3 UDP
    570tunnels and does not add sessions of L2TPv3 UDP tunnels into the
    571per-net session list. In the UDP receive code, we must trust that the
    572tunnel can be identified using the tunnel socket's sk_user_data and
    573lookup the session in the tunnel's session list instead of the per-net
    574session list.
    575
    576PPP
    577---
    578
    579`net/l2tp/l2tp_ppp.c`_ implements the PPPoL2TP socket family. Each PPP
    580session has a PPPoL2TP socket.
    581
    582The PPPoL2TP socket's sk_user_data references the l2tp_session.
    583
    584Userspace sends and receives PPP packets over L2TP using a PPPoL2TP
    585socket. Only PPP control frames pass over this socket: PPP data
    586packets are handled entirely by the kernel, passing between the L2TP
    587session and its associated ``pppN`` netdev through the PPP channel
    588interface of the kernel PPP subsystem.
    589
    590The L2TP PPP implementation handles the closing of a PPPoL2TP socket
    591by closing its corresponding L2TP session. This is complicated because
    592it must consider racing with netlink session create/destroy requests
    593and pppol2tp_connect trying to reconnect with a session that is in the
    594process of being closed. Unlike tunnels, PPP sessions do not hold a
    595ref on their associated socket, so code must be careful to sock_hold
    596the socket where necessary. For all the details, see commit
    5973d609342cc04129ff7568e19316ce3d7451a27e8.
    598
    599Ethernet
    600--------
    601
    602`net/l2tp/l2tp_eth.c`_ implements L2TPv3 Ethernet pseudowires. It
    603manages a netdev for each session.
    604
    605L2TP Ethernet sessions are created and destroyed by netlink request,
    606or are destroyed when the tunnel is destroyed. Unlike PPP sessions,
    607Ethernet sessions do not have an associated socket.
    608
    609Miscellaneous
    610=============
    611
    612RFCs
    613----
    614
    615The kernel code implements the datapath features specified in the
    616following RFCs:
    617
    618======= =============== ===================================
    619RFC2661 L2TPv2          https://tools.ietf.org/html/rfc2661
    620RFC3931 L2TPv3          https://tools.ietf.org/html/rfc3931
    621RFC4719 L2TPv3 Ethernet https://tools.ietf.org/html/rfc4719
    622======= =============== ===================================
    623
    624Implementations
    625---------------
    626
    627A number of open source applications use the L2TP kernel subsystem:
    628
    629============ ==============================================
    630iproute2     https://github.com/shemminger/iproute2
    631go-l2tp      https://github.com/katalix/go-l2tp
    632tunneldigger https://github.com/wlanslovenija/tunneldigger
    633xl2tpd       https://github.com/xelerance/xl2tpd
    634============ ==============================================
    635
    636Limitations
    637-----------
    638
    639The current implementation has a number of limitations:
    640
    641  1) Multiple UDP sockets with the same 5-tuple address cannot be
    642     used. The kernel's tunnel context is identified using private
    643     data associated with the socket so it is important that each
    644     socket is uniquely identified by its address.
    645
    646  2) Interfacing with openvswitch is not yet implemented. It may be
    647     useful to map OVS Ethernet and VLAN ports into L2TPv3 tunnels.
    648
    649  3) VLAN pseudowires are implemented using an ``l2tpethN`` interface
    650     configured with a VLAN sub-interface. Since L2TPv3 VLAN
    651     pseudowires carry one and only one VLAN, it may be better to use
    652     a single netdevice rather than an ``l2tpethN`` and ``l2tpethN``:M
    653     pair per VLAN session. The netlink attribute
    654     ``L2TP_ATTR_VLAN_ID`` was added for this, but it was never
    655     implemented.
    656
    657Testing
    658-------
    659
    660Unmanaged L2TPv3 Ethernet features are tested by the kernel's built-in
    661selftests. See `tools/testing/selftests/net/l2tp.sh`_.
    662
    663Another test suite, l2tp-ktest_, covers all
    664of the L2TP APIs and tunnel/session types. This may be integrated into
    665the kernel's built-in L2TP selftests in the future.
    666
    667.. Links
    668.. _Generic Netlink: generic_netlink.html
    669.. _libmnl: https://www.netfilter.org/projects/libmnl
    670.. _include/uapi/linux/l2tp.h: ../../../include/uapi/linux/l2tp.h
    671.. _include/linux/if_pppol2tp.h: ../../../include/linux/if_pppol2tp.h
    672.. _net/l2tp/l2tp_ip.c: ../../../net/l2tp/l2tp_ip.c
    673.. _net/l2tp/l2tp_ip6.c: ../../../net/l2tp/l2tp_ip6.c
    674.. _net/l2tp/l2tp_ppp.c: ../../../net/l2tp/l2tp_ppp.c
    675.. _net/l2tp/l2tp_eth.c: ../../../net/l2tp/l2tp_eth.c
    676.. _tools/testing/selftests/net/l2tp.sh: ../../../tools/testing/selftests/net/l2tp.sh
    677.. _l2tp-ktest: https://github.com/katalix/l2tp-ktest