From mboxrd@z Thu Jan 1 00:00:00 1970 From: Guillaume Nault Subject: Re: [PATCH net-next 2/2] l2tp: add peer_offset parameter Date: Wed, 3 Jan 2018 15:16:35 +0100 Message-ID: <20180103141635.GD1402@alphalink.fr> References: <20171228145340.GA1292@alphalink.fr> <20171228182347.GA8732@localhost.localdomain> <20171228194556.GA1256@alphalink.fr> <27e0a7c8-b95b-04eb-d808-bcae67e417b1@katalix.com> <20180102180557.GB1402@alphalink.fr> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: James Chapman , "David S. Miller" , netdev@vger.kernel.org, Hangbin Liu To: Lorenzo Bianconi Return-path: Received: from zimbra.alphalink.fr ([217.15.80.77]:60230 "EHLO zimbra.alphalink.fr" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752802AbeACOQi (ORCPT ); Wed, 3 Jan 2018 09:16:38 -0500 Content-Disposition: inline In-Reply-To: Sender: netdev-owner@vger.kernel.org List-ID: On Tue, Jan 02, 2018 at 08:28:03PM +0100, Lorenzo Bianconi wrote: > Perhaps I am little bit polarized on UABI issue, but I was rethinking > about it and maybe removing offset parameter would lead to an > interoperability issue for device running L2TPv3 since offset > parameter is there and it is not a nope. > Please consider this setup: > - 2 endpoint running L2TPv3, the first running net-next and the second > running 4.14 > - both endpoint are configured using iproute2 in this way: > > - ip l2tp add tunnel local remote tunnel_id > peer_tunnel_id udp_sport udp_dport > - ip l2tp add tunnel local remote tunnel_id > peer_tunnel_id udp_sport udp_dport > - ip l2tp add session name l2tp0 tunnel_id session_id > peer_session_id offset 8 > - ip l2tp add session name l2tp0 tunnel_id session_id > peer_session_id offset 8 > > Can we assume offset is never used for L2TPv3? > That's what I think. You're right worrying about ABI issues. And I wouldn't dare proposing such a removal if I had doubts about breaking a user setup. Considering the lack of use cases and the absence of interoperability of this feature, I hardly can imagine it being used. But it's not only that: the feature has been buggy for years without anyone noticing. And this bug wasn't difficult to spot (one just needs to look at an L2TPv3 header in a network packet dump). It's really the combination of these three issues (buggy, no use case and not producing valid L2TPv3 frames) that makes me propose a removal.