1 // SPDX-License-Identifier: GPL-2.0 2 /* Copyright 2011-2014 Autronica Fire and Security AS 3 * 4 * Author(s): 5 * 2011-2014 Arvid Brodin, arvid.brodin@alten.se 6 * 7 * Routines for handling Netlink messages for HSR. 8 */ 9 10 #include "hsr_netlink.h" 11 #include <linux/kernel.h> 12 #include <net/rtnetlink.h> 13 #include <net/genetlink.h> 14 #include "hsr_main.h" 15 #include "hsr_device.h" 16 #include "hsr_framereg.h" 17 18 static const struct nla_policy hsr_policy[IFLA_HSR_MAX + 1] = { 19 [IFLA_HSR_SLAVE1] = { .type = NLA_U32 }, 20 [IFLA_HSR_SLAVE2] = { .type = NLA_U32 }, 21 [IFLA_HSR_MULTICAST_SPEC] = { .type = NLA_U8 }, 22 [IFLA_HSR_VERSION] = { .type = NLA_U8 }, 23 [IFLA_HSR_SUPERVISION_ADDR] = { .len = ETH_ALEN }, 24 [IFLA_HSR_SEQ_NR] = { .type = NLA_U16 }, 25 }; 26 27 /* Here, it seems a netdevice has already been allocated for us, and the 28 * hsr_dev_setup routine has been executed. Nice! 29 */ 30 static int hsr_newlink(struct net *src_net, struct net_device *dev, 31 struct nlattr *tb[], struct nlattr *data[], 32 struct netlink_ext_ack *extack) 33 { 34 struct net_device *link[2]; 35 unsigned char multicast_spec, hsr_version; 36 37 if (!data) { 38 NL_SET_ERR_MSG_MOD(extack, "No slave devices specified"); 39 return -EINVAL; 40 } 41 if (!data[IFLA_HSR_SLAVE1]) { 42 NL_SET_ERR_MSG_MOD(extack, "Slave1 device not specified"); 43 return -EINVAL; 44 } 45 link[0] = __dev_get_by_index(src_net, 46 nla_get_u32(data[IFLA_HSR_SLAVE1])); 47 if (!link[0]) { 48 NL_SET_ERR_MSG_MOD(extack, "Slave1 does not exist"); 49 return -EINVAL; 50 } 51 if (!data[IFLA_HSR_SLAVE2]) { 52 NL_SET_ERR_MSG_MOD(extack, "Slave2 device not specified"); 53 return -EINVAL; 54 } 55 link[1] = __dev_get_by_index(src_net, 56 nla_get_u32(data[IFLA_HSR_SLAVE2])); 57 if (!link[1]) { 58 NL_SET_ERR_MSG_MOD(extack, "Slave2 does not exist"); 59 return -EINVAL; 60 } 61 62 if (link[0] == link[1]) { 63 NL_SET_ERR_MSG_MOD(extack, "Slave1 and Slave2 are same"); 64 return -EINVAL; 65 } 66 67 if (!data[IFLA_HSR_MULTICAST_SPEC]) 68 multicast_spec = 0; 69 else 70 multicast_spec = nla_get_u8(data[IFLA_HSR_MULTICAST_SPEC]); 71 72 if (!data[IFLA_HSR_VERSION]) 73 hsr_version = 0; 74 else 75 hsr_version = nla_get_u8(data[IFLA_HSR_VERSION]); 76 77 return hsr_dev_finalize(dev, link, multicast_spec, hsr_version, extack); 78 } 79 80 static int hsr_fill_info(struct sk_buff *skb, const struct net_device *dev) 81 { 82 struct hsr_priv *hsr = netdev_priv(dev); 83 struct hsr_port *port; 84 85 port = hsr_port_get_hsr(hsr, HSR_PT_SLAVE_A); 86 if (port) { 87 if (nla_put_u32(skb, IFLA_HSR_SLAVE1, port->dev->ifindex)) 88 goto nla_put_failure; 89 } 90 91 port = hsr_port_get_hsr(hsr, HSR_PT_SLAVE_B); 92 if (port) { 93 if (nla_put_u32(skb, IFLA_HSR_SLAVE2, port->dev->ifindex)) 94 goto nla_put_failure; 95 } 96 97 if (nla_put(skb, IFLA_HSR_SUPERVISION_ADDR, ETH_ALEN, 98 hsr->sup_multicast_addr) || 99 nla_put_u16(skb, IFLA_HSR_SEQ_NR, hsr->sequence_nr)) 100 goto nla_put_failure; 101 102 return 0; 103 104 nla_put_failure: 105 return -EMSGSIZE; 106 } 107 108 static struct rtnl_link_ops hsr_link_ops __read_mostly = { 109 .kind = "hsr", 110 .maxtype = IFLA_HSR_MAX, 111 .policy = hsr_policy, 112 .priv_size = sizeof(struct hsr_priv), 113 .setup = hsr_dev_setup, 114 .newlink = hsr_newlink, 115 .fill_info = hsr_fill_info, 116 }; 117 118 /* attribute policy */ 119 static const struct nla_policy hsr_genl_policy[HSR_A_MAX + 1] = { 120 [HSR_A_NODE_ADDR] = { .len = ETH_ALEN }, 121 [HSR_A_NODE_ADDR_B] = { .len = ETH_ALEN }, 122 [HSR_A_IFINDEX] = { .type = NLA_U32 }, 123 [HSR_A_IF1_AGE] = { .type = NLA_U32 }, 124 [HSR_A_IF2_AGE] = { .type = NLA_U32 }, 125 [HSR_A_IF1_SEQ] = { .type = NLA_U16 }, 126 [HSR_A_IF2_SEQ] = { .type = NLA_U16 }, 127 }; 128 129 static struct genl_family hsr_genl_family; 130 131 static const struct genl_multicast_group hsr_mcgrps[] = { 132 { .name = "hsr-network", }, 133 }; 134 135 /* This is called if for some node with MAC address addr, we only get frames 136 * over one of the slave interfaces. This would indicate an open network ring 137 * (i.e. a link has failed somewhere). 138 */ 139 void hsr_nl_ringerror(struct hsr_priv *hsr, unsigned char addr[ETH_ALEN], 140 struct hsr_port *port) 141 { 142 struct sk_buff *skb; 143 void *msg_head; 144 struct hsr_port *master; 145 int res; 146 147 skb = genlmsg_new(NLMSG_GOODSIZE, GFP_ATOMIC); 148 if (!skb) 149 goto fail; 150 151 msg_head = genlmsg_put(skb, 0, 0, &hsr_genl_family, 0, 152 HSR_C_RING_ERROR); 153 if (!msg_head) 154 goto nla_put_failure; 155 156 res = nla_put(skb, HSR_A_NODE_ADDR, ETH_ALEN, addr); 157 if (res < 0) 158 goto nla_put_failure; 159 160 res = nla_put_u32(skb, HSR_A_IFINDEX, port->dev->ifindex); 161 if (res < 0) 162 goto nla_put_failure; 163 164 genlmsg_end(skb, msg_head); 165 genlmsg_multicast(&hsr_genl_family, skb, 0, 0, GFP_ATOMIC); 166 167 return; 168 169 nla_put_failure: 170 kfree_skb(skb); 171 172 fail: 173 rcu_read_lock(); 174 master = hsr_port_get_hsr(hsr, HSR_PT_MASTER); 175 netdev_warn(master->dev, "Could not send HSR ring error message\n"); 176 rcu_read_unlock(); 177 } 178 179 /* This is called when we haven't heard from the node with MAC address addr for 180 * some time (just before the node is removed from the node table/list). 181 */ 182 void hsr_nl_nodedown(struct hsr_priv *hsr, unsigned char addr[ETH_ALEN]) 183 { 184 struct sk_buff *skb; 185 void *msg_head; 186 struct hsr_port *master; 187 int res; 188 189 skb = genlmsg_new(NLMSG_GOODSIZE, GFP_ATOMIC); 190 if (!skb) 191 goto fail; 192 193 msg_head = genlmsg_put(skb, 0, 0, &hsr_genl_family, 0, HSR_C_NODE_DOWN); 194 if (!msg_head) 195 goto nla_put_failure; 196 197 res = nla_put(skb, HSR_A_NODE_ADDR, ETH_ALEN, addr); 198 if (res < 0) 199 goto nla_put_failure; 200 201 genlmsg_end(skb, msg_head); 202 genlmsg_multicast(&hsr_genl_family, skb, 0, 0, GFP_ATOMIC); 203 204 return; 205 206 nla_put_failure: 207 kfree_skb(skb); 208 209 fail: 210 rcu_read_lock(); 211 master = hsr_port_get_hsr(hsr, HSR_PT_MASTER); 212 netdev_warn(master->dev, "Could not send HSR node down\n"); 213 rcu_read_unlock(); 214 } 215 216 /* HSR_C_GET_NODE_STATUS lets userspace query the internal HSR node table 217 * about the status of a specific node in the network, defined by its MAC 218 * address. 219 * 220 * Input: hsr ifindex, node mac address 221 * Output: hsr ifindex, node mac address (copied from request), 222 * age of latest frame from node over slave 1, slave 2 [ms] 223 */ 224 static int hsr_get_node_status(struct sk_buff *skb_in, struct genl_info *info) 225 { 226 /* For receiving */ 227 struct nlattr *na; 228 struct net_device *hsr_dev; 229 230 /* For sending */ 231 struct sk_buff *skb_out; 232 void *msg_head; 233 struct hsr_priv *hsr; 234 struct hsr_port *port; 235 unsigned char hsr_node_addr_b[ETH_ALEN]; 236 int hsr_node_if1_age; 237 u16 hsr_node_if1_seq; 238 int hsr_node_if2_age; 239 u16 hsr_node_if2_seq; 240 int addr_b_ifindex; 241 int res; 242 243 if (!info) 244 goto invalid; 245 246 na = info->attrs[HSR_A_IFINDEX]; 247 if (!na) 248 goto invalid; 249 na = info->attrs[HSR_A_NODE_ADDR]; 250 if (!na) 251 goto invalid; 252 253 hsr_dev = __dev_get_by_index(genl_info_net(info), 254 nla_get_u32(info->attrs[HSR_A_IFINDEX])); 255 if (!hsr_dev) 256 goto invalid; 257 if (!is_hsr_master(hsr_dev)) 258 goto invalid; 259 260 /* Send reply */ 261 skb_out = genlmsg_new(NLMSG_GOODSIZE, GFP_KERNEL); 262 if (!skb_out) { 263 res = -ENOMEM; 264 goto fail; 265 } 266 267 msg_head = genlmsg_put(skb_out, NETLINK_CB(skb_in).portid, 268 info->snd_seq, &hsr_genl_family, 0, 269 HSR_C_SET_NODE_STATUS); 270 if (!msg_head) { 271 res = -ENOMEM; 272 goto nla_put_failure; 273 } 274 275 res = nla_put_u32(skb_out, HSR_A_IFINDEX, hsr_dev->ifindex); 276 if (res < 0) 277 goto nla_put_failure; 278 279 hsr = netdev_priv(hsr_dev); 280 res = hsr_get_node_data(hsr, 281 (unsigned char *) 282 nla_data(info->attrs[HSR_A_NODE_ADDR]), 283 hsr_node_addr_b, 284 &addr_b_ifindex, 285 &hsr_node_if1_age, 286 &hsr_node_if1_seq, 287 &hsr_node_if2_age, 288 &hsr_node_if2_seq); 289 if (res < 0) 290 goto nla_put_failure; 291 292 res = nla_put(skb_out, HSR_A_NODE_ADDR, ETH_ALEN, 293 nla_data(info->attrs[HSR_A_NODE_ADDR])); 294 if (res < 0) 295 goto nla_put_failure; 296 297 if (addr_b_ifindex > -1) { 298 res = nla_put(skb_out, HSR_A_NODE_ADDR_B, ETH_ALEN, 299 hsr_node_addr_b); 300 if (res < 0) 301 goto nla_put_failure; 302 303 res = nla_put_u32(skb_out, HSR_A_ADDR_B_IFINDEX, 304 addr_b_ifindex); 305 if (res < 0) 306 goto nla_put_failure; 307 } 308 309 res = nla_put_u32(skb_out, HSR_A_IF1_AGE, hsr_node_if1_age); 310 if (res < 0) 311 goto nla_put_failure; 312 res = nla_put_u16(skb_out, HSR_A_IF1_SEQ, hsr_node_if1_seq); 313 if (res < 0) 314 goto nla_put_failure; 315 rcu_read_lock(); 316 port = hsr_port_get_hsr(hsr, HSR_PT_SLAVE_A); 317 if (port) 318 res = nla_put_u32(skb_out, HSR_A_IF1_IFINDEX, 319 port->dev->ifindex); 320 rcu_read_unlock(); 321 if (res < 0) 322 goto nla_put_failure; 323 324 res = nla_put_u32(skb_out, HSR_A_IF2_AGE, hsr_node_if2_age); 325 if (res < 0) 326 goto nla_put_failure; 327 res = nla_put_u16(skb_out, HSR_A_IF2_SEQ, hsr_node_if2_seq); 328 if (res < 0) 329 goto nla_put_failure; 330 rcu_read_lock(); 331 port = hsr_port_get_hsr(hsr, HSR_PT_SLAVE_B); 332 if (port) 333 res = nla_put_u32(skb_out, HSR_A_IF2_IFINDEX, 334 port->dev->ifindex); 335 rcu_read_unlock(); 336 if (res < 0) 337 goto nla_put_failure; 338 339 genlmsg_end(skb_out, msg_head); 340 genlmsg_unicast(genl_info_net(info), skb_out, info->snd_portid); 341 342 return 0; 343 344 invalid: 345 netlink_ack(skb_in, nlmsg_hdr(skb_in), -EINVAL, NULL); 346 return 0; 347 348 nla_put_failure: 349 kfree_skb(skb_out); 350 /* Fall through */ 351 352 fail: 353 return res; 354 } 355 356 /* Get a list of MacAddressA of all nodes known to this node (including self). 357 */ 358 static int hsr_get_node_list(struct sk_buff *skb_in, struct genl_info *info) 359 { 360 /* For receiving */ 361 struct nlattr *na; 362 struct net_device *hsr_dev; 363 364 /* For sending */ 365 struct sk_buff *skb_out; 366 void *msg_head; 367 struct hsr_priv *hsr; 368 void *pos; 369 unsigned char addr[ETH_ALEN]; 370 int res; 371 372 if (!info) 373 goto invalid; 374 375 na = info->attrs[HSR_A_IFINDEX]; 376 if (!na) 377 goto invalid; 378 379 hsr_dev = __dev_get_by_index(genl_info_net(info), 380 nla_get_u32(info->attrs[HSR_A_IFINDEX])); 381 if (!hsr_dev) 382 goto invalid; 383 if (!is_hsr_master(hsr_dev)) 384 goto invalid; 385 386 /* Send reply */ 387 skb_out = genlmsg_new(NLMSG_GOODSIZE, GFP_KERNEL); 388 if (!skb_out) { 389 res = -ENOMEM; 390 goto fail; 391 } 392 393 msg_head = genlmsg_put(skb_out, NETLINK_CB(skb_in).portid, 394 info->snd_seq, &hsr_genl_family, 0, 395 HSR_C_SET_NODE_LIST); 396 if (!msg_head) { 397 res = -ENOMEM; 398 goto nla_put_failure; 399 } 400 401 res = nla_put_u32(skb_out, HSR_A_IFINDEX, hsr_dev->ifindex); 402 if (res < 0) 403 goto nla_put_failure; 404 405 hsr = netdev_priv(hsr_dev); 406 407 rcu_read_lock(); 408 pos = hsr_get_next_node(hsr, NULL, addr); 409 while (pos) { 410 res = nla_put(skb_out, HSR_A_NODE_ADDR, ETH_ALEN, addr); 411 if (res < 0) { 412 rcu_read_unlock(); 413 goto nla_put_failure; 414 } 415 pos = hsr_get_next_node(hsr, pos, addr); 416 } 417 rcu_read_unlock(); 418 419 genlmsg_end(skb_out, msg_head); 420 genlmsg_unicast(genl_info_net(info), skb_out, info->snd_portid); 421 422 return 0; 423 424 invalid: 425 netlink_ack(skb_in, nlmsg_hdr(skb_in), -EINVAL, NULL); 426 return 0; 427 428 nla_put_failure: 429 kfree_skb(skb_out); 430 /* Fall through */ 431 432 fail: 433 return res; 434 } 435 436 static const struct genl_ops hsr_ops[] = { 437 { 438 .cmd = HSR_C_GET_NODE_STATUS, 439 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP, 440 .flags = 0, 441 .doit = hsr_get_node_status, 442 .dumpit = NULL, 443 }, 444 { 445 .cmd = HSR_C_GET_NODE_LIST, 446 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP, 447 .flags = 0, 448 .doit = hsr_get_node_list, 449 .dumpit = NULL, 450 }, 451 }; 452 453 static struct genl_family hsr_genl_family __ro_after_init = { 454 .hdrsize = 0, 455 .name = "HSR", 456 .version = 1, 457 .maxattr = HSR_A_MAX, 458 .policy = hsr_genl_policy, 459 .module = THIS_MODULE, 460 .ops = hsr_ops, 461 .n_ops = ARRAY_SIZE(hsr_ops), 462 .mcgrps = hsr_mcgrps, 463 .n_mcgrps = ARRAY_SIZE(hsr_mcgrps), 464 }; 465 466 int __init hsr_netlink_init(void) 467 { 468 int rc; 469 470 rc = rtnl_link_register(&hsr_link_ops); 471 if (rc) 472 goto fail_rtnl_link_register; 473 474 rc = genl_register_family(&hsr_genl_family); 475 if (rc) 476 goto fail_genl_register_family; 477 478 hsr_debugfs_create_root(); 479 return 0; 480 481 fail_genl_register_family: 482 rtnl_link_unregister(&hsr_link_ops); 483 fail_rtnl_link_register: 484 485 return rc; 486 } 487 488 void __exit hsr_netlink_exit(void) 489 { 490 genl_unregister_family(&hsr_genl_family); 491 rtnl_link_unregister(&hsr_link_ops); 492 } 493 494 MODULE_ALIAS_RTNL_LINK("hsr"); 495