1 // SPDX-License-Identifier: GPL-2.0 2 /* Copyright (C) 2007-2019 B.A.T.M.A.N. contributors: 3 * 4 * Marek Lindner, Simon Wunderlich 5 * 6 * This program is free software; you can redistribute it and/or 7 * modify it under the terms of version 2 of the GNU General Public 8 * License as published by the Free Software Foundation. 9 * 10 * This program is distributed in the hope that it will be useful, but 11 * WITHOUT ANY WARRANTY; without even the implied warranty of 12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 13 * General Public License for more details. 14 * 15 * You should have received a copy of the GNU General Public License 16 * along with this program; if not, see <http://www.gnu.org/licenses/>. 17 */ 18 19 #include "soft-interface.h" 20 #include "main.h" 21 22 #include <linux/atomic.h> 23 #include <linux/byteorder/generic.h> 24 #include <linux/cache.h> 25 #include <linux/compiler.h> 26 #include <linux/cpumask.h> 27 #include <linux/errno.h> 28 #include <linux/etherdevice.h> 29 #include <linux/ethtool.h> 30 #include <linux/gfp.h> 31 #include <linux/if_ether.h> 32 #include <linux/if_vlan.h> 33 #include <linux/jiffies.h> 34 #include <linux/kernel.h> 35 #include <linux/kref.h> 36 #include <linux/list.h> 37 #include <linux/lockdep.h> 38 #include <linux/netdevice.h> 39 #include <linux/percpu.h> 40 #include <linux/printk.h> 41 #include <linux/random.h> 42 #include <linux/rculist.h> 43 #include <linux/rcupdate.h> 44 #include <linux/rtnetlink.h> 45 #include <linux/skbuff.h> 46 #include <linux/slab.h> 47 #include <linux/socket.h> 48 #include <linux/spinlock.h> 49 #include <linux/stddef.h> 50 #include <linux/string.h> 51 #include <linux/types.h> 52 #include <uapi/linux/batadv_packet.h> 53 #include <uapi/linux/batman_adv.h> 54 55 #include "bat_algo.h" 56 #include "bridge_loop_avoidance.h" 57 #include "debugfs.h" 58 #include "distributed-arp-table.h" 59 #include "gateway_client.h" 60 #include "hard-interface.h" 61 #include "multicast.h" 62 #include "network-coding.h" 63 #include "originator.h" 64 #include "send.h" 65 #include "sysfs.h" 66 #include "translation-table.h" 67 68 /** 69 * batadv_skb_head_push() - Increase header size and move (push) head pointer 70 * @skb: packet buffer which should be modified 71 * @len: number of bytes to add 72 * 73 * Return: 0 on success or negative error number in case of failure 74 */ 75 int batadv_skb_head_push(struct sk_buff *skb, unsigned int len) 76 { 77 int result; 78 79 /* TODO: We must check if we can release all references to non-payload 80 * data using __skb_header_release in our skbs to allow skb_cow_header 81 * to work optimally. This means that those skbs are not allowed to read 82 * or write any data which is before the current position of skb->data 83 * after that call and thus allow other skbs with the same data buffer 84 * to write freely in that area. 85 */ 86 result = skb_cow_head(skb, len); 87 if (result < 0) 88 return result; 89 90 skb_push(skb, len); 91 return 0; 92 } 93 94 static int batadv_interface_open(struct net_device *dev) 95 { 96 netif_start_queue(dev); 97 return 0; 98 } 99 100 static int batadv_interface_release(struct net_device *dev) 101 { 102 netif_stop_queue(dev); 103 return 0; 104 } 105 106 /** 107 * batadv_sum_counter() - Sum the cpu-local counters for index 'idx' 108 * @bat_priv: the bat priv with all the soft interface information 109 * @idx: index of counter to sum up 110 * 111 * Return: sum of all cpu-local counters 112 */ 113 static u64 batadv_sum_counter(struct batadv_priv *bat_priv, size_t idx) 114 { 115 u64 *counters, sum = 0; 116 int cpu; 117 118 for_each_possible_cpu(cpu) { 119 counters = per_cpu_ptr(bat_priv->bat_counters, cpu); 120 sum += counters[idx]; 121 } 122 123 return sum; 124 } 125 126 static struct net_device_stats *batadv_interface_stats(struct net_device *dev) 127 { 128 struct batadv_priv *bat_priv = netdev_priv(dev); 129 struct net_device_stats *stats = &dev->stats; 130 131 stats->tx_packets = batadv_sum_counter(bat_priv, BATADV_CNT_TX); 132 stats->tx_bytes = batadv_sum_counter(bat_priv, BATADV_CNT_TX_BYTES); 133 stats->tx_dropped = batadv_sum_counter(bat_priv, BATADV_CNT_TX_DROPPED); 134 stats->rx_packets = batadv_sum_counter(bat_priv, BATADV_CNT_RX); 135 stats->rx_bytes = batadv_sum_counter(bat_priv, BATADV_CNT_RX_BYTES); 136 return stats; 137 } 138 139 static int batadv_interface_set_mac_addr(struct net_device *dev, void *p) 140 { 141 struct batadv_priv *bat_priv = netdev_priv(dev); 142 struct batadv_softif_vlan *vlan; 143 struct sockaddr *addr = p; 144 u8 old_addr[ETH_ALEN]; 145 146 if (!is_valid_ether_addr(addr->sa_data)) 147 return -EADDRNOTAVAIL; 148 149 ether_addr_copy(old_addr, dev->dev_addr); 150 ether_addr_copy(dev->dev_addr, addr->sa_data); 151 152 /* only modify transtable if it has been initialized before */ 153 if (atomic_read(&bat_priv->mesh_state) != BATADV_MESH_ACTIVE) 154 return 0; 155 156 rcu_read_lock(); 157 hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) { 158 batadv_tt_local_remove(bat_priv, old_addr, vlan->vid, 159 "mac address changed", false); 160 batadv_tt_local_add(dev, addr->sa_data, vlan->vid, 161 BATADV_NULL_IFINDEX, BATADV_NO_MARK); 162 } 163 rcu_read_unlock(); 164 165 return 0; 166 } 167 168 static int batadv_interface_change_mtu(struct net_device *dev, int new_mtu) 169 { 170 /* check ranges */ 171 if (new_mtu < 68 || new_mtu > batadv_hardif_min_mtu(dev)) 172 return -EINVAL; 173 174 dev->mtu = new_mtu; 175 176 return 0; 177 } 178 179 /** 180 * batadv_interface_set_rx_mode() - set the rx mode of a device 181 * @dev: registered network device to modify 182 * 183 * We do not actually need to set any rx filters for the virtual batman 184 * soft interface. However a dummy handler enables a user to set static 185 * multicast listeners for instance. 186 */ 187 static void batadv_interface_set_rx_mode(struct net_device *dev) 188 { 189 } 190 191 static netdev_tx_t batadv_interface_tx(struct sk_buff *skb, 192 struct net_device *soft_iface) 193 { 194 struct ethhdr *ethhdr; 195 struct batadv_priv *bat_priv = netdev_priv(soft_iface); 196 struct batadv_hard_iface *primary_if = NULL; 197 struct batadv_bcast_packet *bcast_packet; 198 static const u8 stp_addr[ETH_ALEN] = {0x01, 0x80, 0xC2, 0x00, 199 0x00, 0x00}; 200 static const u8 ectp_addr[ETH_ALEN] = {0xCF, 0x00, 0x00, 0x00, 201 0x00, 0x00}; 202 enum batadv_dhcp_recipient dhcp_rcp = BATADV_DHCP_NO; 203 u8 *dst_hint = NULL, chaddr[ETH_ALEN]; 204 struct vlan_ethhdr *vhdr; 205 unsigned int header_len = 0; 206 int data_len = skb->len, ret; 207 unsigned long brd_delay = 1; 208 bool do_bcast = false, client_added; 209 unsigned short vid; 210 u32 seqno; 211 int gw_mode; 212 enum batadv_forw_mode forw_mode; 213 struct batadv_orig_node *mcast_single_orig = NULL; 214 int network_offset = ETH_HLEN; 215 __be16 proto; 216 217 if (atomic_read(&bat_priv->mesh_state) != BATADV_MESH_ACTIVE) 218 goto dropped; 219 220 /* reset control block to avoid left overs from previous users */ 221 memset(skb->cb, 0, sizeof(struct batadv_skb_cb)); 222 223 netif_trans_update(soft_iface); 224 vid = batadv_get_vid(skb, 0); 225 226 skb_reset_mac_header(skb); 227 ethhdr = eth_hdr(skb); 228 229 proto = ethhdr->h_proto; 230 231 switch (ntohs(proto)) { 232 case ETH_P_8021Q: 233 if (!pskb_may_pull(skb, sizeof(*vhdr))) 234 goto dropped; 235 vhdr = vlan_eth_hdr(skb); 236 proto = vhdr->h_vlan_encapsulated_proto; 237 238 /* drop batman-in-batman packets to prevent loops */ 239 if (proto != htons(ETH_P_BATMAN)) { 240 network_offset += VLAN_HLEN; 241 break; 242 } 243 244 /* fall through */ 245 case ETH_P_BATMAN: 246 goto dropped; 247 } 248 249 skb_set_network_header(skb, network_offset); 250 251 if (batadv_bla_tx(bat_priv, skb, vid)) 252 goto dropped; 253 254 /* skb->data might have been reallocated by batadv_bla_tx() */ 255 ethhdr = eth_hdr(skb); 256 257 /* Register the client MAC in the transtable */ 258 if (!is_multicast_ether_addr(ethhdr->h_source) && 259 !batadv_bla_is_loopdetect_mac(ethhdr->h_source)) { 260 client_added = batadv_tt_local_add(soft_iface, ethhdr->h_source, 261 vid, skb->skb_iif, 262 skb->mark); 263 if (!client_added) 264 goto dropped; 265 } 266 267 /* Snoop address candidates from DHCPACKs for early DAT filling */ 268 batadv_dat_snoop_outgoing_dhcp_ack(bat_priv, skb, proto, vid); 269 270 /* don't accept stp packets. STP does not help in meshes. 271 * better use the bridge loop avoidance ... 272 * 273 * The same goes for ECTP sent at least by some Cisco Switches, 274 * it might confuse the mesh when used with bridge loop avoidance. 275 */ 276 if (batadv_compare_eth(ethhdr->h_dest, stp_addr)) 277 goto dropped; 278 279 if (batadv_compare_eth(ethhdr->h_dest, ectp_addr)) 280 goto dropped; 281 282 gw_mode = atomic_read(&bat_priv->gw.mode); 283 if (is_multicast_ether_addr(ethhdr->h_dest)) { 284 /* if gw mode is off, broadcast every packet */ 285 if (gw_mode == BATADV_GW_MODE_OFF) { 286 do_bcast = true; 287 goto send; 288 } 289 290 dhcp_rcp = batadv_gw_dhcp_recipient_get(skb, &header_len, 291 chaddr); 292 /* skb->data may have been modified by 293 * batadv_gw_dhcp_recipient_get() 294 */ 295 ethhdr = eth_hdr(skb); 296 /* if gw_mode is on, broadcast any non-DHCP message. 297 * All the DHCP packets are going to be sent as unicast 298 */ 299 if (dhcp_rcp == BATADV_DHCP_NO) { 300 do_bcast = true; 301 goto send; 302 } 303 304 if (dhcp_rcp == BATADV_DHCP_TO_CLIENT) 305 dst_hint = chaddr; 306 else if ((gw_mode == BATADV_GW_MODE_SERVER) && 307 (dhcp_rcp == BATADV_DHCP_TO_SERVER)) 308 /* gateways should not forward any DHCP message if 309 * directed to a DHCP server 310 */ 311 goto dropped; 312 313 send: 314 if (do_bcast && !is_broadcast_ether_addr(ethhdr->h_dest)) { 315 forw_mode = batadv_mcast_forw_mode(bat_priv, skb, 316 &mcast_single_orig); 317 if (forw_mode == BATADV_FORW_NONE) 318 goto dropped; 319 320 if (forw_mode == BATADV_FORW_SINGLE) 321 do_bcast = false; 322 } 323 } 324 325 batadv_skb_set_priority(skb, 0); 326 327 /* ethernet packet should be broadcasted */ 328 if (do_bcast) { 329 primary_if = batadv_primary_if_get_selected(bat_priv); 330 if (!primary_if) 331 goto dropped; 332 333 /* in case of ARP request, we do not immediately broadcasti the 334 * packet, instead we first wait for DAT to try to retrieve the 335 * correct ARP entry 336 */ 337 if (batadv_dat_snoop_outgoing_arp_request(bat_priv, skb)) 338 brd_delay = msecs_to_jiffies(ARP_REQ_DELAY); 339 340 if (batadv_skb_head_push(skb, sizeof(*bcast_packet)) < 0) 341 goto dropped; 342 343 bcast_packet = (struct batadv_bcast_packet *)skb->data; 344 bcast_packet->version = BATADV_COMPAT_VERSION; 345 bcast_packet->ttl = BATADV_TTL; 346 347 /* batman packet type: broadcast */ 348 bcast_packet->packet_type = BATADV_BCAST; 349 bcast_packet->reserved = 0; 350 351 /* hw address of first interface is the orig mac because only 352 * this mac is known throughout the mesh 353 */ 354 ether_addr_copy(bcast_packet->orig, 355 primary_if->net_dev->dev_addr); 356 357 /* set broadcast sequence number */ 358 seqno = atomic_inc_return(&bat_priv->bcast_seqno); 359 bcast_packet->seqno = htonl(seqno); 360 361 batadv_add_bcast_packet_to_list(bat_priv, skb, brd_delay, true); 362 363 /* a copy is stored in the bcast list, therefore removing 364 * the original skb. 365 */ 366 consume_skb(skb); 367 368 /* unicast packet */ 369 } else { 370 /* DHCP packets going to a server will use the GW feature */ 371 if (dhcp_rcp == BATADV_DHCP_TO_SERVER) { 372 ret = batadv_gw_out_of_range(bat_priv, skb); 373 if (ret) 374 goto dropped; 375 ret = batadv_send_skb_via_gw(bat_priv, skb, vid); 376 } else if (mcast_single_orig) { 377 ret = batadv_send_skb_unicast(bat_priv, skb, 378 BATADV_UNICAST, 0, 379 mcast_single_orig, vid); 380 } else { 381 if (batadv_dat_snoop_outgoing_arp_request(bat_priv, 382 skb)) 383 goto dropped; 384 385 batadv_dat_snoop_outgoing_arp_reply(bat_priv, skb); 386 387 ret = batadv_send_skb_via_tt(bat_priv, skb, dst_hint, 388 vid); 389 } 390 if (ret != NET_XMIT_SUCCESS) 391 goto dropped_freed; 392 } 393 394 batadv_inc_counter(bat_priv, BATADV_CNT_TX); 395 batadv_add_counter(bat_priv, BATADV_CNT_TX_BYTES, data_len); 396 goto end; 397 398 dropped: 399 kfree_skb(skb); 400 dropped_freed: 401 batadv_inc_counter(bat_priv, BATADV_CNT_TX_DROPPED); 402 end: 403 if (mcast_single_orig) 404 batadv_orig_node_put(mcast_single_orig); 405 if (primary_if) 406 batadv_hardif_put(primary_if); 407 return NETDEV_TX_OK; 408 } 409 410 /** 411 * batadv_interface_rx() - receive ethernet frame on local batman-adv interface 412 * @soft_iface: local interface which will receive the ethernet frame 413 * @skb: ethernet frame for @soft_iface 414 * @hdr_size: size of already parsed batman-adv header 415 * @orig_node: originator from which the batman-adv packet was sent 416 * 417 * Sends a ethernet frame to the receive path of the local @soft_iface. 418 * skb->data has still point to the batman-adv header with the size @hdr_size. 419 * The caller has to have parsed this header already and made sure that at least 420 * @hdr_size bytes are still available for pull in @skb. 421 * 422 * The packet may still get dropped. This can happen when the encapsulated 423 * ethernet frame is invalid or contains again an batman-adv packet. Also 424 * unicast packets will be dropped directly when it was sent between two 425 * isolated clients. 426 */ 427 void batadv_interface_rx(struct net_device *soft_iface, 428 struct sk_buff *skb, int hdr_size, 429 struct batadv_orig_node *orig_node) 430 { 431 struct batadv_bcast_packet *batadv_bcast_packet; 432 struct batadv_priv *bat_priv = netdev_priv(soft_iface); 433 struct vlan_ethhdr *vhdr; 434 struct ethhdr *ethhdr; 435 unsigned short vid; 436 bool is_bcast; 437 438 batadv_bcast_packet = (struct batadv_bcast_packet *)skb->data; 439 is_bcast = (batadv_bcast_packet->packet_type == BATADV_BCAST); 440 441 skb_pull_rcsum(skb, hdr_size); 442 skb_reset_mac_header(skb); 443 444 /* clean the netfilter state now that the batman-adv header has been 445 * removed 446 */ 447 nf_reset(skb); 448 449 if (unlikely(!pskb_may_pull(skb, ETH_HLEN))) 450 goto dropped; 451 452 vid = batadv_get_vid(skb, 0); 453 ethhdr = eth_hdr(skb); 454 455 switch (ntohs(ethhdr->h_proto)) { 456 case ETH_P_8021Q: 457 if (!pskb_may_pull(skb, VLAN_ETH_HLEN)) 458 goto dropped; 459 460 vhdr = (struct vlan_ethhdr *)skb->data; 461 462 /* drop batman-in-batman packets to prevent loops */ 463 if (vhdr->h_vlan_encapsulated_proto != htons(ETH_P_BATMAN)) 464 break; 465 466 /* fall through */ 467 case ETH_P_BATMAN: 468 goto dropped; 469 } 470 471 /* skb->dev & skb->pkt_type are set here */ 472 skb->protocol = eth_type_trans(skb, soft_iface); 473 skb_postpull_rcsum(skb, eth_hdr(skb), ETH_HLEN); 474 475 batadv_inc_counter(bat_priv, BATADV_CNT_RX); 476 batadv_add_counter(bat_priv, BATADV_CNT_RX_BYTES, 477 skb->len + ETH_HLEN); 478 479 /* Let the bridge loop avoidance check the packet. If will 480 * not handle it, we can safely push it up. 481 */ 482 if (batadv_bla_rx(bat_priv, skb, vid, is_bcast)) 483 goto out; 484 485 if (orig_node) 486 batadv_tt_add_temporary_global_entry(bat_priv, orig_node, 487 ethhdr->h_source, vid); 488 489 if (is_multicast_ether_addr(ethhdr->h_dest)) { 490 /* set the mark on broadcast packets if AP isolation is ON and 491 * the packet is coming from an "isolated" client 492 */ 493 if (batadv_vlan_ap_isola_get(bat_priv, vid) && 494 batadv_tt_global_is_isolated(bat_priv, ethhdr->h_source, 495 vid)) { 496 /* save bits in skb->mark not covered by the mask and 497 * apply the mark on the rest 498 */ 499 skb->mark &= ~bat_priv->isolation_mark_mask; 500 skb->mark |= bat_priv->isolation_mark; 501 } 502 } else if (batadv_is_ap_isolated(bat_priv, ethhdr->h_source, 503 ethhdr->h_dest, vid)) { 504 goto dropped; 505 } 506 507 netif_rx(skb); 508 goto out; 509 510 dropped: 511 kfree_skb(skb); 512 out: 513 return; 514 } 515 516 /** 517 * batadv_softif_vlan_release() - release vlan from lists and queue for free 518 * after rcu grace period 519 * @ref: kref pointer of the vlan object 520 */ 521 static void batadv_softif_vlan_release(struct kref *ref) 522 { 523 struct batadv_softif_vlan *vlan; 524 525 vlan = container_of(ref, struct batadv_softif_vlan, refcount); 526 527 spin_lock_bh(&vlan->bat_priv->softif_vlan_list_lock); 528 hlist_del_rcu(&vlan->list); 529 spin_unlock_bh(&vlan->bat_priv->softif_vlan_list_lock); 530 531 kfree_rcu(vlan, rcu); 532 } 533 534 /** 535 * batadv_softif_vlan_put() - decrease the vlan object refcounter and 536 * possibly release it 537 * @vlan: the vlan object to release 538 */ 539 void batadv_softif_vlan_put(struct batadv_softif_vlan *vlan) 540 { 541 if (!vlan) 542 return; 543 544 kref_put(&vlan->refcount, batadv_softif_vlan_release); 545 } 546 547 /** 548 * batadv_softif_vlan_get() - get the vlan object for a specific vid 549 * @bat_priv: the bat priv with all the soft interface information 550 * @vid: the identifier of the vlan object to retrieve 551 * 552 * Return: the private data of the vlan matching the vid passed as argument or 553 * NULL otherwise. The refcounter of the returned object is incremented by 1. 554 */ 555 struct batadv_softif_vlan *batadv_softif_vlan_get(struct batadv_priv *bat_priv, 556 unsigned short vid) 557 { 558 struct batadv_softif_vlan *vlan_tmp, *vlan = NULL; 559 560 rcu_read_lock(); 561 hlist_for_each_entry_rcu(vlan_tmp, &bat_priv->softif_vlan_list, list) { 562 if (vlan_tmp->vid != vid) 563 continue; 564 565 if (!kref_get_unless_zero(&vlan_tmp->refcount)) 566 continue; 567 568 vlan = vlan_tmp; 569 break; 570 } 571 rcu_read_unlock(); 572 573 return vlan; 574 } 575 576 /** 577 * batadv_softif_create_vlan() - allocate the needed resources for a new vlan 578 * @bat_priv: the bat priv with all the soft interface information 579 * @vid: the VLAN identifier 580 * 581 * Return: 0 on success, a negative error otherwise. 582 */ 583 int batadv_softif_create_vlan(struct batadv_priv *bat_priv, unsigned short vid) 584 { 585 struct batadv_softif_vlan *vlan; 586 int err; 587 588 spin_lock_bh(&bat_priv->softif_vlan_list_lock); 589 590 vlan = batadv_softif_vlan_get(bat_priv, vid); 591 if (vlan) { 592 batadv_softif_vlan_put(vlan); 593 spin_unlock_bh(&bat_priv->softif_vlan_list_lock); 594 return -EEXIST; 595 } 596 597 vlan = kzalloc(sizeof(*vlan), GFP_ATOMIC); 598 if (!vlan) { 599 spin_unlock_bh(&bat_priv->softif_vlan_list_lock); 600 return -ENOMEM; 601 } 602 603 vlan->bat_priv = bat_priv; 604 vlan->vid = vid; 605 kref_init(&vlan->refcount); 606 607 atomic_set(&vlan->ap_isolation, 0); 608 609 kref_get(&vlan->refcount); 610 hlist_add_head_rcu(&vlan->list, &bat_priv->softif_vlan_list); 611 spin_unlock_bh(&bat_priv->softif_vlan_list_lock); 612 613 /* batadv_sysfs_add_vlan cannot be in the spinlock section due to the 614 * sleeping behavior of the sysfs functions and the fs_reclaim lock 615 */ 616 err = batadv_sysfs_add_vlan(bat_priv->soft_iface, vlan); 617 if (err) { 618 /* ref for the function */ 619 batadv_softif_vlan_put(vlan); 620 621 /* ref for the list */ 622 batadv_softif_vlan_put(vlan); 623 return err; 624 } 625 626 /* add a new TT local entry. This one will be marked with the NOPURGE 627 * flag 628 */ 629 batadv_tt_local_add(bat_priv->soft_iface, 630 bat_priv->soft_iface->dev_addr, vid, 631 BATADV_NULL_IFINDEX, BATADV_NO_MARK); 632 633 /* don't return reference to new softif_vlan */ 634 batadv_softif_vlan_put(vlan); 635 636 return 0; 637 } 638 639 /** 640 * batadv_softif_destroy_vlan() - remove and destroy a softif_vlan object 641 * @bat_priv: the bat priv with all the soft interface information 642 * @vlan: the object to remove 643 */ 644 static void batadv_softif_destroy_vlan(struct batadv_priv *bat_priv, 645 struct batadv_softif_vlan *vlan) 646 { 647 /* explicitly remove the associated TT local entry because it is marked 648 * with the NOPURGE flag 649 */ 650 batadv_tt_local_remove(bat_priv, bat_priv->soft_iface->dev_addr, 651 vlan->vid, "vlan interface destroyed", false); 652 653 batadv_sysfs_del_vlan(bat_priv, vlan); 654 batadv_softif_vlan_put(vlan); 655 } 656 657 /** 658 * batadv_interface_add_vid() - ndo_add_vid API implementation 659 * @dev: the netdev of the mesh interface 660 * @proto: protocol of the the vlan id 661 * @vid: identifier of the new vlan 662 * 663 * Set up all the internal structures for handling the new vlan on top of the 664 * mesh interface 665 * 666 * Return: 0 on success or a negative error code in case of failure. 667 */ 668 static int batadv_interface_add_vid(struct net_device *dev, __be16 proto, 669 unsigned short vid) 670 { 671 struct batadv_priv *bat_priv = netdev_priv(dev); 672 struct batadv_softif_vlan *vlan; 673 int ret; 674 675 /* only 802.1Q vlans are supported. 676 * batman-adv does not know how to handle other types 677 */ 678 if (proto != htons(ETH_P_8021Q)) 679 return -EINVAL; 680 681 vid |= BATADV_VLAN_HAS_TAG; 682 683 /* if a new vlan is getting created and it already exists, it means that 684 * it was not deleted yet. batadv_softif_vlan_get() increases the 685 * refcount in order to revive the object. 686 * 687 * if it does not exist then create it. 688 */ 689 vlan = batadv_softif_vlan_get(bat_priv, vid); 690 if (!vlan) 691 return batadv_softif_create_vlan(bat_priv, vid); 692 693 /* recreate the sysfs object if it was already destroyed (and it should 694 * be since we received a kill_vid() for this vlan 695 */ 696 if (!vlan->kobj) { 697 ret = batadv_sysfs_add_vlan(bat_priv->soft_iface, vlan); 698 if (ret) { 699 batadv_softif_vlan_put(vlan); 700 return ret; 701 } 702 } 703 704 /* add a new TT local entry. This one will be marked with the NOPURGE 705 * flag. This must be added again, even if the vlan object already 706 * exists, because the entry was deleted by kill_vid() 707 */ 708 batadv_tt_local_add(bat_priv->soft_iface, 709 bat_priv->soft_iface->dev_addr, vid, 710 BATADV_NULL_IFINDEX, BATADV_NO_MARK); 711 712 return 0; 713 } 714 715 /** 716 * batadv_interface_kill_vid() - ndo_kill_vid API implementation 717 * @dev: the netdev of the mesh interface 718 * @proto: protocol of the the vlan id 719 * @vid: identifier of the deleted vlan 720 * 721 * Destroy all the internal structures used to handle the vlan identified by vid 722 * on top of the mesh interface 723 * 724 * Return: 0 on success, -EINVAL if the specified prototype is not ETH_P_8021Q 725 * or -ENOENT if the specified vlan id wasn't registered. 726 */ 727 static int batadv_interface_kill_vid(struct net_device *dev, __be16 proto, 728 unsigned short vid) 729 { 730 struct batadv_priv *bat_priv = netdev_priv(dev); 731 struct batadv_softif_vlan *vlan; 732 733 /* only 802.1Q vlans are supported. batman-adv does not know how to 734 * handle other types 735 */ 736 if (proto != htons(ETH_P_8021Q)) 737 return -EINVAL; 738 739 vlan = batadv_softif_vlan_get(bat_priv, vid | BATADV_VLAN_HAS_TAG); 740 if (!vlan) 741 return -ENOENT; 742 743 batadv_softif_destroy_vlan(bat_priv, vlan); 744 745 /* finally free the vlan object */ 746 batadv_softif_vlan_put(vlan); 747 748 return 0; 749 } 750 751 /* batman-adv network devices have devices nesting below it and are a special 752 * "super class" of normal network devices; split their locks off into a 753 * separate class since they always nest. 754 */ 755 static struct lock_class_key batadv_netdev_xmit_lock_key; 756 static struct lock_class_key batadv_netdev_addr_lock_key; 757 758 /** 759 * batadv_set_lockdep_class_one() - Set lockdep class for a single tx queue 760 * @dev: device which owns the tx queue 761 * @txq: tx queue to modify 762 * @_unused: always NULL 763 */ 764 static void batadv_set_lockdep_class_one(struct net_device *dev, 765 struct netdev_queue *txq, 766 void *_unused) 767 { 768 lockdep_set_class(&txq->_xmit_lock, &batadv_netdev_xmit_lock_key); 769 } 770 771 /** 772 * batadv_set_lockdep_class() - Set txq and addr_list lockdep class 773 * @dev: network device to modify 774 */ 775 static void batadv_set_lockdep_class(struct net_device *dev) 776 { 777 lockdep_set_class(&dev->addr_list_lock, &batadv_netdev_addr_lock_key); 778 netdev_for_each_tx_queue(dev, batadv_set_lockdep_class_one, NULL); 779 } 780 781 /** 782 * batadv_softif_init_late() - late stage initialization of soft interface 783 * @dev: registered network device to modify 784 * 785 * Return: error code on failures 786 */ 787 static int batadv_softif_init_late(struct net_device *dev) 788 { 789 struct batadv_priv *bat_priv; 790 u32 random_seqno; 791 int ret; 792 size_t cnt_len = sizeof(u64) * BATADV_CNT_NUM; 793 794 batadv_set_lockdep_class(dev); 795 796 bat_priv = netdev_priv(dev); 797 bat_priv->soft_iface = dev; 798 799 /* batadv_interface_stats() needs to be available as soon as 800 * register_netdevice() has been called 801 */ 802 bat_priv->bat_counters = __alloc_percpu(cnt_len, __alignof__(u64)); 803 if (!bat_priv->bat_counters) 804 return -ENOMEM; 805 806 atomic_set(&bat_priv->aggregated_ogms, 1); 807 atomic_set(&bat_priv->bonding, 0); 808 #ifdef CONFIG_BATMAN_ADV_BLA 809 atomic_set(&bat_priv->bridge_loop_avoidance, 1); 810 #endif 811 #ifdef CONFIG_BATMAN_ADV_DAT 812 atomic_set(&bat_priv->distributed_arp_table, 1); 813 #endif 814 #ifdef CONFIG_BATMAN_ADV_MCAST 815 bat_priv->mcast.querier_ipv4.exists = false; 816 bat_priv->mcast.querier_ipv4.shadowing = false; 817 bat_priv->mcast.querier_ipv6.exists = false; 818 bat_priv->mcast.querier_ipv6.shadowing = false; 819 bat_priv->mcast.flags = BATADV_NO_FLAGS; 820 atomic_set(&bat_priv->multicast_mode, 1); 821 atomic_set(&bat_priv->mcast.num_want_all_unsnoopables, 0); 822 atomic_set(&bat_priv->mcast.num_want_all_ipv4, 0); 823 atomic_set(&bat_priv->mcast.num_want_all_ipv6, 0); 824 #endif 825 atomic_set(&bat_priv->gw.mode, BATADV_GW_MODE_OFF); 826 atomic_set(&bat_priv->gw.bandwidth_down, 100); 827 atomic_set(&bat_priv->gw.bandwidth_up, 20); 828 atomic_set(&bat_priv->orig_interval, 1000); 829 atomic_set(&bat_priv->hop_penalty, 30); 830 #ifdef CONFIG_BATMAN_ADV_DEBUG 831 atomic_set(&bat_priv->log_level, 0); 832 #endif 833 atomic_set(&bat_priv->fragmentation, 1); 834 atomic_set(&bat_priv->packet_size_max, ETH_DATA_LEN); 835 atomic_set(&bat_priv->bcast_queue_left, BATADV_BCAST_QUEUE_LEN); 836 atomic_set(&bat_priv->batman_queue_left, BATADV_BATMAN_QUEUE_LEN); 837 838 atomic_set(&bat_priv->mesh_state, BATADV_MESH_INACTIVE); 839 atomic_set(&bat_priv->bcast_seqno, 1); 840 atomic_set(&bat_priv->tt.vn, 0); 841 atomic_set(&bat_priv->tt.local_changes, 0); 842 atomic_set(&bat_priv->tt.ogm_append_cnt, 0); 843 #ifdef CONFIG_BATMAN_ADV_BLA 844 atomic_set(&bat_priv->bla.num_requests, 0); 845 #endif 846 atomic_set(&bat_priv->tp_num, 0); 847 848 bat_priv->tt.last_changeset = NULL; 849 bat_priv->tt.last_changeset_len = 0; 850 bat_priv->isolation_mark = 0; 851 bat_priv->isolation_mark_mask = 0; 852 853 /* randomize initial seqno to avoid collision */ 854 get_random_bytes(&random_seqno, sizeof(random_seqno)); 855 atomic_set(&bat_priv->frag_seqno, random_seqno); 856 857 bat_priv->primary_if = NULL; 858 859 batadv_nc_init_bat_priv(bat_priv); 860 861 ret = batadv_algo_select(bat_priv, batadv_routing_algo); 862 if (ret < 0) 863 goto free_bat_counters; 864 865 ret = batadv_debugfs_add_meshif(dev); 866 if (ret < 0) 867 goto free_bat_counters; 868 869 ret = batadv_mesh_init(dev); 870 if (ret < 0) 871 goto unreg_debugfs; 872 873 return 0; 874 875 unreg_debugfs: 876 batadv_debugfs_del_meshif(dev); 877 free_bat_counters: 878 free_percpu(bat_priv->bat_counters); 879 bat_priv->bat_counters = NULL; 880 881 return ret; 882 } 883 884 /** 885 * batadv_softif_slave_add() - Add a slave interface to a batadv_soft_interface 886 * @dev: batadv_soft_interface used as master interface 887 * @slave_dev: net_device which should become the slave interface 888 * @extack: extended ACK report struct 889 * 890 * Return: 0 if successful or error otherwise. 891 */ 892 static int batadv_softif_slave_add(struct net_device *dev, 893 struct net_device *slave_dev, 894 struct netlink_ext_ack *extack) 895 { 896 struct batadv_hard_iface *hard_iface; 897 struct net *net = dev_net(dev); 898 int ret = -EINVAL; 899 900 hard_iface = batadv_hardif_get_by_netdev(slave_dev); 901 if (!hard_iface || hard_iface->soft_iface) 902 goto out; 903 904 ret = batadv_hardif_enable_interface(hard_iface, net, dev->name); 905 906 out: 907 if (hard_iface) 908 batadv_hardif_put(hard_iface); 909 return ret; 910 } 911 912 /** 913 * batadv_softif_slave_del() - Delete a slave iface from a batadv_soft_interface 914 * @dev: batadv_soft_interface used as master interface 915 * @slave_dev: net_device which should be removed from the master interface 916 * 917 * Return: 0 if successful or error otherwise. 918 */ 919 static int batadv_softif_slave_del(struct net_device *dev, 920 struct net_device *slave_dev) 921 { 922 struct batadv_hard_iface *hard_iface; 923 int ret = -EINVAL; 924 925 hard_iface = batadv_hardif_get_by_netdev(slave_dev); 926 927 if (!hard_iface || hard_iface->soft_iface != dev) 928 goto out; 929 930 batadv_hardif_disable_interface(hard_iface, BATADV_IF_CLEANUP_KEEP); 931 ret = 0; 932 933 out: 934 if (hard_iface) 935 batadv_hardif_put(hard_iface); 936 return ret; 937 } 938 939 static const struct net_device_ops batadv_netdev_ops = { 940 .ndo_init = batadv_softif_init_late, 941 .ndo_open = batadv_interface_open, 942 .ndo_stop = batadv_interface_release, 943 .ndo_get_stats = batadv_interface_stats, 944 .ndo_vlan_rx_add_vid = batadv_interface_add_vid, 945 .ndo_vlan_rx_kill_vid = batadv_interface_kill_vid, 946 .ndo_set_mac_address = batadv_interface_set_mac_addr, 947 .ndo_change_mtu = batadv_interface_change_mtu, 948 .ndo_set_rx_mode = batadv_interface_set_rx_mode, 949 .ndo_start_xmit = batadv_interface_tx, 950 .ndo_validate_addr = eth_validate_addr, 951 .ndo_add_slave = batadv_softif_slave_add, 952 .ndo_del_slave = batadv_softif_slave_del, 953 }; 954 955 static void batadv_get_drvinfo(struct net_device *dev, 956 struct ethtool_drvinfo *info) 957 { 958 strlcpy(info->driver, "B.A.T.M.A.N. advanced", sizeof(info->driver)); 959 strlcpy(info->version, BATADV_SOURCE_VERSION, sizeof(info->version)); 960 strlcpy(info->fw_version, "N/A", sizeof(info->fw_version)); 961 strlcpy(info->bus_info, "batman", sizeof(info->bus_info)); 962 } 963 964 /* Inspired by drivers/net/ethernet/dlink/sundance.c:1702 965 * Declare each description string in struct.name[] to get fixed sized buffer 966 * and compile time checking for strings longer than ETH_GSTRING_LEN. 967 */ 968 static const struct { 969 const char name[ETH_GSTRING_LEN]; 970 } batadv_counters_strings[] = { 971 { "tx" }, 972 { "tx_bytes" }, 973 { "tx_dropped" }, 974 { "rx" }, 975 { "rx_bytes" }, 976 { "forward" }, 977 { "forward_bytes" }, 978 { "mgmt_tx" }, 979 { "mgmt_tx_bytes" }, 980 { "mgmt_rx" }, 981 { "mgmt_rx_bytes" }, 982 { "frag_tx" }, 983 { "frag_tx_bytes" }, 984 { "frag_rx" }, 985 { "frag_rx_bytes" }, 986 { "frag_fwd" }, 987 { "frag_fwd_bytes" }, 988 { "tt_request_tx" }, 989 { "tt_request_rx" }, 990 { "tt_response_tx" }, 991 { "tt_response_rx" }, 992 { "tt_roam_adv_tx" }, 993 { "tt_roam_adv_rx" }, 994 #ifdef CONFIG_BATMAN_ADV_DAT 995 { "dat_get_tx" }, 996 { "dat_get_rx" }, 997 { "dat_put_tx" }, 998 { "dat_put_rx" }, 999 { "dat_cached_reply_tx" }, 1000 #endif 1001 #ifdef CONFIG_BATMAN_ADV_NC 1002 { "nc_code" }, 1003 { "nc_code_bytes" }, 1004 { "nc_recode" }, 1005 { "nc_recode_bytes" }, 1006 { "nc_buffer" }, 1007 { "nc_decode" }, 1008 { "nc_decode_bytes" }, 1009 { "nc_decode_failed" }, 1010 { "nc_sniffed" }, 1011 #endif 1012 }; 1013 1014 static void batadv_get_strings(struct net_device *dev, u32 stringset, u8 *data) 1015 { 1016 if (stringset == ETH_SS_STATS) 1017 memcpy(data, batadv_counters_strings, 1018 sizeof(batadv_counters_strings)); 1019 } 1020 1021 static void batadv_get_ethtool_stats(struct net_device *dev, 1022 struct ethtool_stats *stats, u64 *data) 1023 { 1024 struct batadv_priv *bat_priv = netdev_priv(dev); 1025 int i; 1026 1027 for (i = 0; i < BATADV_CNT_NUM; i++) 1028 data[i] = batadv_sum_counter(bat_priv, i); 1029 } 1030 1031 static int batadv_get_sset_count(struct net_device *dev, int stringset) 1032 { 1033 if (stringset == ETH_SS_STATS) 1034 return BATADV_CNT_NUM; 1035 1036 return -EOPNOTSUPP; 1037 } 1038 1039 static const struct ethtool_ops batadv_ethtool_ops = { 1040 .get_drvinfo = batadv_get_drvinfo, 1041 .get_link = ethtool_op_get_link, 1042 .get_strings = batadv_get_strings, 1043 .get_ethtool_stats = batadv_get_ethtool_stats, 1044 .get_sset_count = batadv_get_sset_count, 1045 }; 1046 1047 /** 1048 * batadv_softif_free() - Deconstructor of batadv_soft_interface 1049 * @dev: Device to cleanup and remove 1050 */ 1051 static void batadv_softif_free(struct net_device *dev) 1052 { 1053 batadv_debugfs_del_meshif(dev); 1054 batadv_mesh_free(dev); 1055 1056 /* some scheduled RCU callbacks need the bat_priv struct to accomplish 1057 * their tasks. Wait for them all to be finished before freeing the 1058 * netdev and its private data (bat_priv) 1059 */ 1060 rcu_barrier(); 1061 } 1062 1063 /** 1064 * batadv_softif_init_early() - early stage initialization of soft interface 1065 * @dev: registered network device to modify 1066 */ 1067 static void batadv_softif_init_early(struct net_device *dev) 1068 { 1069 ether_setup(dev); 1070 1071 dev->netdev_ops = &batadv_netdev_ops; 1072 dev->needs_free_netdev = true; 1073 dev->priv_destructor = batadv_softif_free; 1074 dev->features |= NETIF_F_HW_VLAN_CTAG_FILTER | NETIF_F_NETNS_LOCAL; 1075 dev->features |= NETIF_F_LLTX; 1076 dev->priv_flags |= IFF_NO_QUEUE; 1077 1078 /* can't call min_mtu, because the needed variables 1079 * have not been initialized yet 1080 */ 1081 dev->mtu = ETH_DATA_LEN; 1082 1083 /* generate random address */ 1084 eth_hw_addr_random(dev); 1085 1086 dev->ethtool_ops = &batadv_ethtool_ops; 1087 } 1088 1089 /** 1090 * batadv_softif_create() - Create and register soft interface 1091 * @net: the applicable net namespace 1092 * @name: name of the new soft interface 1093 * 1094 * Return: newly allocated soft_interface, NULL on errors 1095 */ 1096 struct net_device *batadv_softif_create(struct net *net, const char *name) 1097 { 1098 struct net_device *soft_iface; 1099 int ret; 1100 1101 soft_iface = alloc_netdev(sizeof(struct batadv_priv), name, 1102 NET_NAME_UNKNOWN, batadv_softif_init_early); 1103 if (!soft_iface) 1104 return NULL; 1105 1106 dev_net_set(soft_iface, net); 1107 1108 soft_iface->rtnl_link_ops = &batadv_link_ops; 1109 1110 ret = register_netdevice(soft_iface); 1111 if (ret < 0) { 1112 pr_err("Unable to register the batman interface '%s': %i\n", 1113 name, ret); 1114 free_netdev(soft_iface); 1115 return NULL; 1116 } 1117 1118 return soft_iface; 1119 } 1120 1121 /** 1122 * batadv_softif_destroy_sysfs() - deletion of batadv_soft_interface via sysfs 1123 * @soft_iface: the to-be-removed batman-adv interface 1124 */ 1125 void batadv_softif_destroy_sysfs(struct net_device *soft_iface) 1126 { 1127 struct batadv_priv *bat_priv = netdev_priv(soft_iface); 1128 struct batadv_softif_vlan *vlan; 1129 1130 ASSERT_RTNL(); 1131 1132 /* destroy the "untagged" VLAN */ 1133 vlan = batadv_softif_vlan_get(bat_priv, BATADV_NO_FLAGS); 1134 if (vlan) { 1135 batadv_softif_destroy_vlan(bat_priv, vlan); 1136 batadv_softif_vlan_put(vlan); 1137 } 1138 1139 batadv_sysfs_del_meshif(soft_iface); 1140 unregister_netdevice(soft_iface); 1141 } 1142 1143 /** 1144 * batadv_softif_destroy_netlink() - deletion of batadv_soft_interface via 1145 * netlink 1146 * @soft_iface: the to-be-removed batman-adv interface 1147 * @head: list pointer 1148 */ 1149 static void batadv_softif_destroy_netlink(struct net_device *soft_iface, 1150 struct list_head *head) 1151 { 1152 struct batadv_priv *bat_priv = netdev_priv(soft_iface); 1153 struct batadv_hard_iface *hard_iface; 1154 struct batadv_softif_vlan *vlan; 1155 1156 list_for_each_entry(hard_iface, &batadv_hardif_list, list) { 1157 if (hard_iface->soft_iface == soft_iface) 1158 batadv_hardif_disable_interface(hard_iface, 1159 BATADV_IF_CLEANUP_KEEP); 1160 } 1161 1162 /* destroy the "untagged" VLAN */ 1163 vlan = batadv_softif_vlan_get(bat_priv, BATADV_NO_FLAGS); 1164 if (vlan) { 1165 batadv_softif_destroy_vlan(bat_priv, vlan); 1166 batadv_softif_vlan_put(vlan); 1167 } 1168 1169 batadv_sysfs_del_meshif(soft_iface); 1170 unregister_netdevice_queue(soft_iface, head); 1171 } 1172 1173 /** 1174 * batadv_softif_is_valid() - Check whether device is a batadv soft interface 1175 * @net_dev: device which should be checked 1176 * 1177 * Return: true when net_dev is a batman-adv interface, false otherwise 1178 */ 1179 bool batadv_softif_is_valid(const struct net_device *net_dev) 1180 { 1181 if (net_dev->netdev_ops->ndo_start_xmit == batadv_interface_tx) 1182 return true; 1183 1184 return false; 1185 } 1186 1187 struct rtnl_link_ops batadv_link_ops __read_mostly = { 1188 .kind = "batadv", 1189 .priv_size = sizeof(struct batadv_priv), 1190 .setup = batadv_softif_init_early, 1191 .dellink = batadv_softif_destroy_netlink, 1192 }; 1193