1 /* Copyright (C) 2007-2016 B.A.T.M.A.N. contributors: 2 * 3 * Marek Lindner, Simon Wunderlich 4 * 5 * This program is free software; you can redistribute it and/or 6 * modify it under the terms of version 2 of the GNU General Public 7 * License as published by the Free Software Foundation. 8 * 9 * This program is distributed in the hope that it will be useful, but 10 * WITHOUT ANY WARRANTY; without even the implied warranty of 11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 12 * General Public License for more details. 13 * 14 * You should have received a copy of the GNU General Public License 15 * along with this program; if not, see <http://www.gnu.org/licenses/>. 16 */ 17 18 #include "main.h" 19 20 #include <linux/atomic.h> 21 #include <linux/bug.h> 22 #include <linux/byteorder/generic.h> 23 #include <linux/crc32c.h> 24 #include <linux/errno.h> 25 #include <linux/fs.h> 26 #include <linux/if_ether.h> 27 #include <linux/if_vlan.h> 28 #include <linux/init.h> 29 #include <linux/ip.h> 30 #include <linux/ipv6.h> 31 #include <linux/kernel.h> 32 #include <linux/kref.h> 33 #include <linux/list.h> 34 #include <linux/module.h> 35 #include <linux/netdevice.h> 36 #include <linux/printk.h> 37 #include <linux/rculist.h> 38 #include <linux/rcupdate.h> 39 #include <linux/seq_file.h> 40 #include <linux/skbuff.h> 41 #include <linux/spinlock.h> 42 #include <linux/stddef.h> 43 #include <linux/string.h> 44 #include <linux/workqueue.h> 45 #include <net/dsfield.h> 46 #include <net/rtnetlink.h> 47 48 #include "bat_algo.h" 49 #include "bat_iv_ogm.h" 50 #include "bat_v.h" 51 #include "bridge_loop_avoidance.h" 52 #include "debugfs.h" 53 #include "distributed-arp-table.h" 54 #include "gateway_client.h" 55 #include "gateway_common.h" 56 #include "hard-interface.h" 57 #include "icmp_socket.h" 58 #include "log.h" 59 #include "multicast.h" 60 #include "netlink.h" 61 #include "network-coding.h" 62 #include "originator.h" 63 #include "packet.h" 64 #include "routing.h" 65 #include "send.h" 66 #include "soft-interface.h" 67 #include "tp_meter.h" 68 #include "translation-table.h" 69 70 /* List manipulations on hardif_list have to be rtnl_lock()'ed, 71 * list traversals just rcu-locked 72 */ 73 struct list_head batadv_hardif_list; 74 static int (*batadv_rx_handler[256])(struct sk_buff *, 75 struct batadv_hard_iface *); 76 77 unsigned char batadv_broadcast_addr[] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff}; 78 79 struct workqueue_struct *batadv_event_workqueue; 80 81 static void batadv_recv_handler_init(void); 82 83 static int __init batadv_init(void) 84 { 85 INIT_LIST_HEAD(&batadv_hardif_list); 86 batadv_algo_init(); 87 88 batadv_recv_handler_init(); 89 90 batadv_v_init(); 91 batadv_iv_init(); 92 batadv_nc_init(); 93 batadv_tp_meter_init(); 94 95 batadv_event_workqueue = create_singlethread_workqueue("bat_events"); 96 97 if (!batadv_event_workqueue) 98 return -ENOMEM; 99 100 batadv_socket_init(); 101 batadv_debugfs_init(); 102 103 register_netdevice_notifier(&batadv_hard_if_notifier); 104 rtnl_link_register(&batadv_link_ops); 105 batadv_netlink_register(); 106 107 pr_info("B.A.T.M.A.N. advanced %s (compatibility version %i) loaded\n", 108 BATADV_SOURCE_VERSION, BATADV_COMPAT_VERSION); 109 110 return 0; 111 } 112 113 static void __exit batadv_exit(void) 114 { 115 batadv_debugfs_destroy(); 116 batadv_netlink_unregister(); 117 rtnl_link_unregister(&batadv_link_ops); 118 unregister_netdevice_notifier(&batadv_hard_if_notifier); 119 batadv_hardif_remove_interfaces(); 120 121 flush_workqueue(batadv_event_workqueue); 122 destroy_workqueue(batadv_event_workqueue); 123 batadv_event_workqueue = NULL; 124 125 rcu_barrier(); 126 } 127 128 int batadv_mesh_init(struct net_device *soft_iface) 129 { 130 struct batadv_priv *bat_priv = netdev_priv(soft_iface); 131 int ret; 132 133 spin_lock_init(&bat_priv->forw_bat_list_lock); 134 spin_lock_init(&bat_priv->forw_bcast_list_lock); 135 spin_lock_init(&bat_priv->tt.changes_list_lock); 136 spin_lock_init(&bat_priv->tt.req_list_lock); 137 spin_lock_init(&bat_priv->tt.roam_list_lock); 138 spin_lock_init(&bat_priv->tt.last_changeset_lock); 139 spin_lock_init(&bat_priv->tt.commit_lock); 140 spin_lock_init(&bat_priv->gw.list_lock); 141 #ifdef CONFIG_BATMAN_ADV_MCAST 142 spin_lock_init(&bat_priv->mcast.want_lists_lock); 143 #endif 144 spin_lock_init(&bat_priv->tvlv.container_list_lock); 145 spin_lock_init(&bat_priv->tvlv.handler_list_lock); 146 spin_lock_init(&bat_priv->softif_vlan_list_lock); 147 spin_lock_init(&bat_priv->tp_list_lock); 148 149 INIT_HLIST_HEAD(&bat_priv->forw_bat_list); 150 INIT_HLIST_HEAD(&bat_priv->forw_bcast_list); 151 INIT_HLIST_HEAD(&bat_priv->gw.list); 152 #ifdef CONFIG_BATMAN_ADV_MCAST 153 INIT_HLIST_HEAD(&bat_priv->mcast.want_all_unsnoopables_list); 154 INIT_HLIST_HEAD(&bat_priv->mcast.want_all_ipv4_list); 155 INIT_HLIST_HEAD(&bat_priv->mcast.want_all_ipv6_list); 156 #endif 157 INIT_LIST_HEAD(&bat_priv->tt.changes_list); 158 INIT_HLIST_HEAD(&bat_priv->tt.req_list); 159 INIT_LIST_HEAD(&bat_priv->tt.roam_list); 160 #ifdef CONFIG_BATMAN_ADV_MCAST 161 INIT_HLIST_HEAD(&bat_priv->mcast.mla_list); 162 #endif 163 INIT_HLIST_HEAD(&bat_priv->tvlv.container_list); 164 INIT_HLIST_HEAD(&bat_priv->tvlv.handler_list); 165 INIT_HLIST_HEAD(&bat_priv->softif_vlan_list); 166 INIT_HLIST_HEAD(&bat_priv->tp_list); 167 168 ret = batadv_v_mesh_init(bat_priv); 169 if (ret < 0) 170 goto err; 171 172 ret = batadv_originator_init(bat_priv); 173 if (ret < 0) 174 goto err; 175 176 ret = batadv_tt_init(bat_priv); 177 if (ret < 0) 178 goto err; 179 180 ret = batadv_bla_init(bat_priv); 181 if (ret < 0) 182 goto err; 183 184 ret = batadv_dat_init(bat_priv); 185 if (ret < 0) 186 goto err; 187 188 ret = batadv_nc_mesh_init(bat_priv); 189 if (ret < 0) 190 goto err; 191 192 batadv_gw_init(bat_priv); 193 batadv_mcast_init(bat_priv); 194 195 atomic_set(&bat_priv->gw.reselect, 0); 196 atomic_set(&bat_priv->mesh_state, BATADV_MESH_ACTIVE); 197 198 return 0; 199 200 err: 201 batadv_mesh_free(soft_iface); 202 return ret; 203 } 204 205 void batadv_mesh_free(struct net_device *soft_iface) 206 { 207 struct batadv_priv *bat_priv = netdev_priv(soft_iface); 208 209 atomic_set(&bat_priv->mesh_state, BATADV_MESH_DEACTIVATING); 210 211 batadv_purge_outstanding_packets(bat_priv, NULL); 212 213 batadv_gw_node_free(bat_priv); 214 215 batadv_v_mesh_free(bat_priv); 216 batadv_nc_mesh_free(bat_priv); 217 batadv_dat_free(bat_priv); 218 batadv_bla_free(bat_priv); 219 220 batadv_mcast_free(bat_priv); 221 222 /* Free the TT and the originator tables only after having terminated 223 * all the other depending components which may use these structures for 224 * their purposes. 225 */ 226 batadv_tt_free(bat_priv); 227 228 /* Since the originator table clean up routine is accessing the TT 229 * tables as well, it has to be invoked after the TT tables have been 230 * freed and marked as empty. This ensures that no cleanup RCU callbacks 231 * accessing the TT data are scheduled for later execution. 232 */ 233 batadv_originator_free(bat_priv); 234 235 batadv_gw_free(bat_priv); 236 237 free_percpu(bat_priv->bat_counters); 238 bat_priv->bat_counters = NULL; 239 240 atomic_set(&bat_priv->mesh_state, BATADV_MESH_INACTIVE); 241 } 242 243 /** 244 * batadv_is_my_mac - check if the given mac address belongs to any of the real 245 * interfaces in the current mesh 246 * @bat_priv: the bat priv with all the soft interface information 247 * @addr: the address to check 248 * 249 * Return: 'true' if the mac address was found, false otherwise. 250 */ 251 bool batadv_is_my_mac(struct batadv_priv *bat_priv, const u8 *addr) 252 { 253 const struct batadv_hard_iface *hard_iface; 254 bool is_my_mac = false; 255 256 rcu_read_lock(); 257 list_for_each_entry_rcu(hard_iface, &batadv_hardif_list, list) { 258 if (hard_iface->if_status != BATADV_IF_ACTIVE) 259 continue; 260 261 if (hard_iface->soft_iface != bat_priv->soft_iface) 262 continue; 263 264 if (batadv_compare_eth(hard_iface->net_dev->dev_addr, addr)) { 265 is_my_mac = true; 266 break; 267 } 268 } 269 rcu_read_unlock(); 270 return is_my_mac; 271 } 272 273 /** 274 * batadv_seq_print_text_primary_if_get - called from debugfs table printing 275 * function that requires the primary interface 276 * @seq: debugfs table seq_file struct 277 * 278 * Return: primary interface if found or NULL otherwise. 279 */ 280 struct batadv_hard_iface * 281 batadv_seq_print_text_primary_if_get(struct seq_file *seq) 282 { 283 struct net_device *net_dev = (struct net_device *)seq->private; 284 struct batadv_priv *bat_priv = netdev_priv(net_dev); 285 struct batadv_hard_iface *primary_if; 286 287 primary_if = batadv_primary_if_get_selected(bat_priv); 288 289 if (!primary_if) { 290 seq_printf(seq, 291 "BATMAN mesh %s disabled - please specify interfaces to enable it\n", 292 net_dev->name); 293 goto out; 294 } 295 296 if (primary_if->if_status == BATADV_IF_ACTIVE) 297 goto out; 298 299 seq_printf(seq, 300 "BATMAN mesh %s disabled - primary interface not active\n", 301 net_dev->name); 302 batadv_hardif_put(primary_if); 303 primary_if = NULL; 304 305 out: 306 return primary_if; 307 } 308 309 /** 310 * batadv_max_header_len - calculate maximum encapsulation overhead for a 311 * payload packet 312 * 313 * Return: the maximum encapsulation overhead in bytes. 314 */ 315 int batadv_max_header_len(void) 316 { 317 int header_len = 0; 318 319 header_len = max_t(int, header_len, 320 sizeof(struct batadv_unicast_packet)); 321 header_len = max_t(int, header_len, 322 sizeof(struct batadv_unicast_4addr_packet)); 323 header_len = max_t(int, header_len, 324 sizeof(struct batadv_bcast_packet)); 325 326 #ifdef CONFIG_BATMAN_ADV_NC 327 header_len = max_t(int, header_len, 328 sizeof(struct batadv_coded_packet)); 329 #endif 330 331 return header_len + ETH_HLEN; 332 } 333 334 /** 335 * batadv_skb_set_priority - sets skb priority according to packet content 336 * @skb: the packet to be sent 337 * @offset: offset to the packet content 338 * 339 * This function sets a value between 256 and 263 (802.1d priority), which 340 * can be interpreted by the cfg80211 or other drivers. 341 */ 342 void batadv_skb_set_priority(struct sk_buff *skb, int offset) 343 { 344 struct iphdr ip_hdr_tmp, *ip_hdr; 345 struct ipv6hdr ip6_hdr_tmp, *ip6_hdr; 346 struct ethhdr ethhdr_tmp, *ethhdr; 347 struct vlan_ethhdr *vhdr, vhdr_tmp; 348 u32 prio; 349 350 /* already set, do nothing */ 351 if (skb->priority >= 256 && skb->priority <= 263) 352 return; 353 354 ethhdr = skb_header_pointer(skb, offset, sizeof(*ethhdr), ðhdr_tmp); 355 if (!ethhdr) 356 return; 357 358 switch (ethhdr->h_proto) { 359 case htons(ETH_P_8021Q): 360 vhdr = skb_header_pointer(skb, offset + sizeof(*vhdr), 361 sizeof(*vhdr), &vhdr_tmp); 362 if (!vhdr) 363 return; 364 prio = ntohs(vhdr->h_vlan_TCI) & VLAN_PRIO_MASK; 365 prio = prio >> VLAN_PRIO_SHIFT; 366 break; 367 case htons(ETH_P_IP): 368 ip_hdr = skb_header_pointer(skb, offset + sizeof(*ethhdr), 369 sizeof(*ip_hdr), &ip_hdr_tmp); 370 if (!ip_hdr) 371 return; 372 prio = (ipv4_get_dsfield(ip_hdr) & 0xfc) >> 5; 373 break; 374 case htons(ETH_P_IPV6): 375 ip6_hdr = skb_header_pointer(skb, offset + sizeof(*ethhdr), 376 sizeof(*ip6_hdr), &ip6_hdr_tmp); 377 if (!ip6_hdr) 378 return; 379 prio = (ipv6_get_dsfield(ip6_hdr) & 0xfc) >> 5; 380 break; 381 default: 382 return; 383 } 384 385 skb->priority = prio + 256; 386 } 387 388 static int batadv_recv_unhandled_packet(struct sk_buff *skb, 389 struct batadv_hard_iface *recv_if) 390 { 391 return NET_RX_DROP; 392 } 393 394 /* incoming packets with the batman ethertype received on any active hard 395 * interface 396 */ 397 int batadv_batman_skb_recv(struct sk_buff *skb, struct net_device *dev, 398 struct packet_type *ptype, 399 struct net_device *orig_dev) 400 { 401 struct batadv_priv *bat_priv; 402 struct batadv_ogm_packet *batadv_ogm_packet; 403 struct batadv_hard_iface *hard_iface; 404 u8 idx; 405 int ret; 406 407 hard_iface = container_of(ptype, struct batadv_hard_iface, 408 batman_adv_ptype); 409 410 /* Prevent processing a packet received on an interface which is getting 411 * shut down otherwise the packet may trigger de-reference errors 412 * further down in the receive path. 413 */ 414 if (!kref_get_unless_zero(&hard_iface->refcount)) 415 goto err_out; 416 417 skb = skb_share_check(skb, GFP_ATOMIC); 418 419 /* skb was released by skb_share_check() */ 420 if (!skb) 421 goto err_put; 422 423 /* packet should hold at least type and version */ 424 if (unlikely(!pskb_may_pull(skb, 2))) 425 goto err_free; 426 427 /* expect a valid ethernet header here. */ 428 if (unlikely(skb->mac_len != ETH_HLEN || !skb_mac_header(skb))) 429 goto err_free; 430 431 if (!hard_iface->soft_iface) 432 goto err_free; 433 434 bat_priv = netdev_priv(hard_iface->soft_iface); 435 436 if (atomic_read(&bat_priv->mesh_state) != BATADV_MESH_ACTIVE) 437 goto err_free; 438 439 /* discard frames on not active interfaces */ 440 if (hard_iface->if_status != BATADV_IF_ACTIVE) 441 goto err_free; 442 443 batadv_ogm_packet = (struct batadv_ogm_packet *)skb->data; 444 445 if (batadv_ogm_packet->version != BATADV_COMPAT_VERSION) { 446 batadv_dbg(BATADV_DBG_BATMAN, bat_priv, 447 "Drop packet: incompatible batman version (%i)\n", 448 batadv_ogm_packet->version); 449 goto err_free; 450 } 451 452 /* reset control block to avoid left overs from previous users */ 453 memset(skb->cb, 0, sizeof(struct batadv_skb_cb)); 454 455 /* all receive handlers return whether they received or reused 456 * the supplied skb. if not, we have to free the skb. 457 */ 458 idx = batadv_ogm_packet->packet_type; 459 ret = (*batadv_rx_handler[idx])(skb, hard_iface); 460 461 if (ret == NET_RX_DROP) 462 kfree_skb(skb); 463 464 batadv_hardif_put(hard_iface); 465 466 /* return NET_RX_SUCCESS in any case as we 467 * most probably dropped the packet for 468 * routing-logical reasons. 469 */ 470 return NET_RX_SUCCESS; 471 472 err_free: 473 kfree_skb(skb); 474 err_put: 475 batadv_hardif_put(hard_iface); 476 err_out: 477 return NET_RX_DROP; 478 } 479 480 static void batadv_recv_handler_init(void) 481 { 482 int i; 483 484 for (i = 0; i < ARRAY_SIZE(batadv_rx_handler); i++) 485 batadv_rx_handler[i] = batadv_recv_unhandled_packet; 486 487 for (i = BATADV_UNICAST_MIN; i <= BATADV_UNICAST_MAX; i++) 488 batadv_rx_handler[i] = batadv_recv_unhandled_unicast_packet; 489 490 /* compile time checks for sizes */ 491 BUILD_BUG_ON(sizeof(struct batadv_bla_claim_dst) != 6); 492 BUILD_BUG_ON(sizeof(struct batadv_ogm_packet) != 24); 493 BUILD_BUG_ON(sizeof(struct batadv_icmp_header) != 20); 494 BUILD_BUG_ON(sizeof(struct batadv_icmp_packet) != 20); 495 BUILD_BUG_ON(sizeof(struct batadv_icmp_packet_rr) != 116); 496 BUILD_BUG_ON(sizeof(struct batadv_unicast_packet) != 10); 497 BUILD_BUG_ON(sizeof(struct batadv_unicast_4addr_packet) != 18); 498 BUILD_BUG_ON(sizeof(struct batadv_frag_packet) != 20); 499 BUILD_BUG_ON(sizeof(struct batadv_bcast_packet) != 14); 500 BUILD_BUG_ON(sizeof(struct batadv_coded_packet) != 46); 501 BUILD_BUG_ON(sizeof(struct batadv_unicast_tvlv_packet) != 20); 502 BUILD_BUG_ON(sizeof(struct batadv_tvlv_hdr) != 4); 503 BUILD_BUG_ON(sizeof(struct batadv_tvlv_gateway_data) != 8); 504 BUILD_BUG_ON(sizeof(struct batadv_tvlv_tt_vlan_data) != 8); 505 BUILD_BUG_ON(sizeof(struct batadv_tvlv_tt_change) != 12); 506 BUILD_BUG_ON(sizeof(struct batadv_tvlv_roam_adv) != 8); 507 508 /* broadcast packet */ 509 batadv_rx_handler[BATADV_BCAST] = batadv_recv_bcast_packet; 510 511 /* unicast packets ... */ 512 /* unicast with 4 addresses packet */ 513 batadv_rx_handler[BATADV_UNICAST_4ADDR] = batadv_recv_unicast_packet; 514 /* unicast packet */ 515 batadv_rx_handler[BATADV_UNICAST] = batadv_recv_unicast_packet; 516 /* unicast tvlv packet */ 517 batadv_rx_handler[BATADV_UNICAST_TVLV] = batadv_recv_unicast_tvlv; 518 /* batman icmp packet */ 519 batadv_rx_handler[BATADV_ICMP] = batadv_recv_icmp_packet; 520 /* Fragmented packets */ 521 batadv_rx_handler[BATADV_UNICAST_FRAG] = batadv_recv_frag_packet; 522 } 523 524 int 525 batadv_recv_handler_register(u8 packet_type, 526 int (*recv_handler)(struct sk_buff *, 527 struct batadv_hard_iface *)) 528 { 529 int (*curr)(struct sk_buff *, 530 struct batadv_hard_iface *); 531 curr = batadv_rx_handler[packet_type]; 532 533 if ((curr != batadv_recv_unhandled_packet) && 534 (curr != batadv_recv_unhandled_unicast_packet)) 535 return -EBUSY; 536 537 batadv_rx_handler[packet_type] = recv_handler; 538 return 0; 539 } 540 541 void batadv_recv_handler_unregister(u8 packet_type) 542 { 543 batadv_rx_handler[packet_type] = batadv_recv_unhandled_packet; 544 } 545 546 /** 547 * batadv_skb_crc32 - calculate CRC32 of the whole packet and skip bytes in 548 * the header 549 * @skb: skb pointing to fragmented socket buffers 550 * @payload_ptr: Pointer to position inside the head buffer of the skb 551 * marking the start of the data to be CRC'ed 552 * 553 * payload_ptr must always point to an address in the skb head buffer and not to 554 * a fragment. 555 * 556 * Return: big endian crc32c of the checksummed data 557 */ 558 __be32 batadv_skb_crc32(struct sk_buff *skb, u8 *payload_ptr) 559 { 560 u32 crc = 0; 561 unsigned int from; 562 unsigned int to = skb->len; 563 struct skb_seq_state st; 564 const u8 *data; 565 unsigned int len; 566 unsigned int consumed = 0; 567 568 from = (unsigned int)(payload_ptr - skb->data); 569 570 skb_prepare_seq_read(skb, from, to, &st); 571 while ((len = skb_seq_read(consumed, &data, &st)) != 0) { 572 crc = crc32c(crc, data, len); 573 consumed += len; 574 } 575 576 return htonl(crc); 577 } 578 579 /** 580 * batadv_get_vid - extract the VLAN identifier from skb if any 581 * @skb: the buffer containing the packet 582 * @header_len: length of the batman header preceding the ethernet header 583 * 584 * Return: VID with the BATADV_VLAN_HAS_TAG flag when the packet embedded in the 585 * skb is vlan tagged. Otherwise BATADV_NO_FLAGS. 586 */ 587 unsigned short batadv_get_vid(struct sk_buff *skb, size_t header_len) 588 { 589 struct ethhdr *ethhdr = (struct ethhdr *)(skb->data + header_len); 590 struct vlan_ethhdr *vhdr; 591 unsigned short vid; 592 593 if (ethhdr->h_proto != htons(ETH_P_8021Q)) 594 return BATADV_NO_FLAGS; 595 596 if (!pskb_may_pull(skb, header_len + VLAN_ETH_HLEN)) 597 return BATADV_NO_FLAGS; 598 599 vhdr = (struct vlan_ethhdr *)(skb->data + header_len); 600 vid = ntohs(vhdr->h_vlan_TCI) & VLAN_VID_MASK; 601 vid |= BATADV_VLAN_HAS_TAG; 602 603 return vid; 604 } 605 606 /** 607 * batadv_vlan_ap_isola_get - return the AP isolation status for the given vlan 608 * @bat_priv: the bat priv with all the soft interface information 609 * @vid: the VLAN identifier for which the AP isolation attributed as to be 610 * looked up 611 * 612 * Return: true if AP isolation is on for the VLAN idenfied by vid, false 613 * otherwise 614 */ 615 bool batadv_vlan_ap_isola_get(struct batadv_priv *bat_priv, unsigned short vid) 616 { 617 bool ap_isolation_enabled = false; 618 struct batadv_softif_vlan *vlan; 619 620 /* if the AP isolation is requested on a VLAN, then check for its 621 * setting in the proper VLAN private data structure 622 */ 623 vlan = batadv_softif_vlan_get(bat_priv, vid); 624 if (vlan) { 625 ap_isolation_enabled = atomic_read(&vlan->ap_isolation); 626 batadv_softif_vlan_put(vlan); 627 } 628 629 return ap_isolation_enabled; 630 } 631 632 module_init(batadv_init); 633 module_exit(batadv_exit); 634 635 MODULE_LICENSE("GPL"); 636 637 MODULE_AUTHOR(BATADV_DRIVER_AUTHOR); 638 MODULE_DESCRIPTION(BATADV_DRIVER_DESC); 639 MODULE_SUPPORTED_DEVICE(BATADV_DRIVER_DEVICE); 640 MODULE_VERSION(BATADV_SOURCE_VERSION); 641