translation-table.c 113.8 KB
Newer Older
1
/* Copyright (C) 2007-2016  B.A.T.M.A.N. contributors:
2
 *
3
 * Marek Lindner, Simon Wunderlich, Antonio Quartulli
4 5 6 7 8 9 10 11 12 13 14
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of version 2 of the GNU General Public
 * License as published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
 * General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
15
 * along with this program; if not, see <http://www.gnu.org/licenses/>.
16 17 18
 */

#include "translation-table.h"
19 20 21
#include "main.h"

#include <linux/atomic.h>
22
#include <linux/bitops.h>
23 24 25 26 27 28 29 30 31 32 33
#include <linux/bug.h>
#include <linux/byteorder/generic.h>
#include <linux/compiler.h>
#include <linux/crc32c.h>
#include <linux/errno.h>
#include <linux/etherdevice.h>
#include <linux/fs.h>
#include <linux/if_ether.h>
#include <linux/jhash.h>
#include <linux/jiffies.h>
#include <linux/kernel.h>
34
#include <linux/kref.h>
35 36 37 38 39 40 41 42 43 44 45 46 47
#include <linux/list.h>
#include <linux/lockdep.h>
#include <linux/netdevice.h>
#include <linux/rculist.h>
#include <linux/rcupdate.h>
#include <linux/seq_file.h>
#include <linux/slab.h>
#include <linux/spinlock.h>
#include <linux/stddef.h>
#include <linux/string.h>
#include <linux/workqueue.h>

#include "bridge_loop_avoidance.h"
48
#include "hard-interface.h"
49
#include "hash.h"
50
#include "multicast.h"
51 52 53
#include "originator.h"
#include "packet.h"
#include "soft-interface.h"
54

55 56 57 58
/* hash class keys */
static struct lock_class_key batadv_tt_local_hash_lock_class_key;
static struct lock_class_key batadv_tt_global_hash_lock_class_key;

59
static void batadv_send_roam_adv(struct batadv_priv *bat_priv, u8 *client,
60
				 unsigned short vid,
61
				 struct batadv_orig_node *orig_node);
62 63
static void batadv_tt_purge(struct work_struct *work);
static void
64
batadv_tt_global_del_orig_list(struct batadv_tt_global_entry *tt_global_entry);
65 66 67
static void batadv_tt_global_del(struct batadv_priv *bat_priv,
				 struct batadv_orig_node *orig_node,
				 const unsigned char *addr,
68 69
				 unsigned short vid, const char *message,
				 bool roaming);
70

71
/**
72 73 74
 * batadv_compare_tt - check if two TT entries are the same
 * @node: the list element pointer of the first TT entry
 * @data2: pointer to the tt_common_entry of the second TT entry
75
 *
76 77
 * Compare the MAC address and the VLAN ID of the two TT entries and check if
 * they are the same TT client.
78
 * Return: true if the two TT clients are the same, false otherwise
79
 */
80
static bool batadv_compare_tt(const struct hlist_node *node, const void *data2)
81
{
82
	const void *data1 = container_of(node, struct batadv_tt_common_entry,
83
					 hash_entry);
84 85
	const struct batadv_tt_common_entry *tt1 = data1;
	const struct batadv_tt_common_entry *tt2 = data2;
86

87
	return (tt1->vid == tt2->vid) && batadv_compare_eth(data1, data2);
88 89
}

90 91 92 93 94
/**
 * batadv_choose_tt - return the index of the tt entry in the hash table
 * @data: pointer to the tt_common_entry object to map
 * @size: the size of the hash table
 *
95
 * Return: the hash index where the object represented by 'data' should be
96 97
 * stored at.
 */
98
static inline u32 batadv_choose_tt(const void *data, u32 size)
99 100
{
	struct batadv_tt_common_entry *tt;
101
	u32 hash = 0;
102 103

	tt = (struct batadv_tt_common_entry *)data;
104 105
	hash = jhash(&tt->addr, ETH_ALEN, hash);
	hash = jhash(&tt->vid, sizeof(tt->vid), hash);
106 107 108 109 110 111 112 113 114 115

	return hash % size;
}

/**
 * batadv_tt_hash_find - look for a client in the given hash table
 * @hash: the hash table to search
 * @addr: the mac address of the client to look for
 * @vid: VLAN identifier
 *
116
 * Return: a pointer to the tt_common struct belonging to the searched client if
117 118
 * found, NULL otherwise.
 */
119
static struct batadv_tt_common_entry *
120
batadv_tt_hash_find(struct batadv_hashtable *hash, const u8 *addr,
121
		    unsigned short vid)
122 123
{
	struct hlist_head *head;
124
	struct batadv_tt_common_entry to_search, *tt, *tt_tmp = NULL;
125
	u32 index;
126 127 128 129

	if (!hash)
		return NULL;

130
	ether_addr_copy(to_search.addr, addr);
131 132 133
	to_search.vid = vid;

	index = batadv_choose_tt(&to_search, hash->size);
134 135 136
	head = &hash->table[index];

	rcu_read_lock();
137 138 139 140 141
	hlist_for_each_entry_rcu(tt, head, hash_entry) {
		if (!batadv_compare_eth(tt, addr))
			continue;

		if (tt->vid != vid)
142 143
			continue;

144
		if (!kref_get_unless_zero(&tt->refcount))
145 146
			continue;

147
		tt_tmp = tt;
148 149 150 151
		break;
	}
	rcu_read_unlock();

152
	return tt_tmp;
153 154
}

155 156 157 158 159 160
/**
 * batadv_tt_local_hash_find - search the local table for a given client
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the mac address of the client to look for
 * @vid: VLAN identifier
 *
161
 * Return: a pointer to the corresponding tt_local_entry struct if the client is
162 163
 * found, NULL otherwise.
 */
164
static struct batadv_tt_local_entry *
165
batadv_tt_local_hash_find(struct batadv_priv *bat_priv, const u8 *addr,
166
			  unsigned short vid)
167
{
168 169
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_local_entry *tt_local_entry = NULL;
170

171 172
	tt_common_entry = batadv_tt_hash_find(bat_priv->tt.local_hash, addr,
					      vid);
173 174
	if (tt_common_entry)
		tt_local_entry = container_of(tt_common_entry,
175 176
					      struct batadv_tt_local_entry,
					      common);
177 178
	return tt_local_entry;
}
179

180 181 182 183 184 185
/**
 * batadv_tt_global_hash_find - search the global table for a given client
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the mac address of the client to look for
 * @vid: VLAN identifier
 *
186
 * Return: a pointer to the corresponding tt_global_entry struct if the client
187 188
 * is found, NULL otherwise.
 */
189
static struct batadv_tt_global_entry *
190
batadv_tt_global_hash_find(struct batadv_priv *bat_priv, const u8 *addr,
191
			   unsigned short vid)
192
{
193 194
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_global_entry *tt_global_entry = NULL;
195

196 197
	tt_common_entry = batadv_tt_hash_find(bat_priv->tt.global_hash, addr,
					      vid);
198 199
	if (tt_common_entry)
		tt_global_entry = container_of(tt_common_entry,
200 201
					       struct batadv_tt_global_entry,
					       common);
202
	return tt_global_entry;
203 204
}

205 206 207 208 209 210 211 212 213 214 215 216
/**
 * batadv_tt_local_entry_release - release tt_local_entry from lists and queue
 *  for free after rcu grace period
 * @ref: kref pointer of the nc_node
 */
static void batadv_tt_local_entry_release(struct kref *ref)
{
	struct batadv_tt_local_entry *tt_local_entry;

	tt_local_entry = container_of(ref, struct batadv_tt_local_entry,
				      common.refcount);

217 218
	batadv_softif_vlan_put(tt_local_entry->vlan);

219 220 221 222
	kfree_rcu(tt_local_entry, common.rcu);
}

/**
223
 * batadv_tt_local_entry_put - decrement the tt_local_entry refcounter and
224 225 226
 *  possibly release it
 * @tt_local_entry: tt_local_entry to be free'd
 */
227
static void
228
batadv_tt_local_entry_put(struct batadv_tt_local_entry *tt_local_entry)
229
{
230 231
	kref_put(&tt_local_entry->common.refcount,
		 batadv_tt_local_entry_release);
232 233
}

234
/**
235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250
 * batadv_tt_global_entry_release - release tt_global_entry from lists and queue
 *  for free after rcu grace period
 * @ref: kref pointer of the nc_node
 */
static void batadv_tt_global_entry_release(struct kref *ref)
{
	struct batadv_tt_global_entry *tt_global_entry;

	tt_global_entry = container_of(ref, struct batadv_tt_global_entry,
				       common.refcount);

	batadv_tt_global_del_orig_list(tt_global_entry);
	kfree_rcu(tt_global_entry, common.rcu);
}

/**
251 252
 * batadv_tt_global_entry_put - decrement the tt_global_entry refcounter and
 *  possibly release it
253
 * @tt_global_entry: tt_global_entry to be free'd
254
 */
255
static void
256
batadv_tt_global_entry_put(struct batadv_tt_global_entry *tt_global_entry)
257
{
258 259
	kref_put(&tt_global_entry->common.refcount,
		 batadv_tt_global_entry_release);
260 261
}

262 263
/**
 * batadv_tt_global_hash_count - count the number of orig entries
264
 * @bat_priv: the bat priv with all the soft interface information
265 266 267
 * @addr: the mac address of the client to count entries for
 * @vid: VLAN identifier
 *
268
 * Return: the number of originators advertising the given address/data
269 270 271
 * (excluding ourself).
 */
int batadv_tt_global_hash_count(struct batadv_priv *bat_priv,
272
				const u8 *addr, unsigned short vid)
273 274 275 276 277 278 279 280 281
{
	struct batadv_tt_global_entry *tt_global_entry;
	int count;

	tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
	if (!tt_global_entry)
		return 0;

	count = atomic_read(&tt_global_entry->orig_list_count);
282
	batadv_tt_global_entry_put(tt_global_entry);
283 284 285 286

	return count;
}

287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304
/**
 * batadv_tt_local_size_mod - change the size by v of the local table identified
 *  by vid
 * @bat_priv: the bat priv with all the soft interface information
 * @vid: the VLAN identifier of the sub-table to change
 * @v: the amount to sum to the local table size
 */
static void batadv_tt_local_size_mod(struct batadv_priv *bat_priv,
				     unsigned short vid, int v)
{
	struct batadv_softif_vlan *vlan;

	vlan = batadv_softif_vlan_get(bat_priv, vid);
	if (!vlan)
		return;

	atomic_add(v, &vlan->tt.num_entries);

305
	batadv_softif_vlan_put(vlan);
306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332
}

/**
 * batadv_tt_local_size_inc - increase by one the local table size for the given
 *  vid
 * @bat_priv: the bat priv with all the soft interface information
 * @vid: the VLAN identifier
 */
static void batadv_tt_local_size_inc(struct batadv_priv *bat_priv,
				     unsigned short vid)
{
	batadv_tt_local_size_mod(bat_priv, vid, 1);
}

/**
 * batadv_tt_local_size_dec - decrease by one the local table size for the given
 *  vid
 * @bat_priv: the bat priv with all the soft interface information
 * @vid: the VLAN identifier
 */
static void batadv_tt_local_size_dec(struct batadv_priv *bat_priv,
				     unsigned short vid)
{
	batadv_tt_local_size_mod(bat_priv, vid, -1);
}

/**
333 334 335
 * batadv_tt_global_size_mod - change the size by v of the global table
 *  for orig_node identified by vid
 * @orig_node: the originator for which the table has to be modified
336 337 338 339 340 341 342 343 344 345 346 347 348 349
 * @vid: the VLAN identifier
 * @v: the amount to sum to the global table size
 */
static void batadv_tt_global_size_mod(struct batadv_orig_node *orig_node,
				      unsigned short vid, int v)
{
	struct batadv_orig_node_vlan *vlan;

	vlan = batadv_orig_node_vlan_new(orig_node, vid);
	if (!vlan)
		return;

	if (atomic_add_return(v, &vlan->tt.num_entries) == 0) {
		spin_lock_bh(&orig_node->vlan_list_lock);
350 351
		if (!hlist_unhashed(&vlan->list)) {
			hlist_del_init_rcu(&vlan->list);
352
			batadv_orig_node_vlan_put(vlan);
353
		}
354 355 356
		spin_unlock_bh(&orig_node->vlan_list_lock);
	}

357
	batadv_orig_node_vlan_put(vlan);
358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383
}

/**
 * batadv_tt_global_size_inc - increase by one the global table size for the
 *  given vid
 * @orig_node: the originator which global table size has to be decreased
 * @vid: the vlan identifier
 */
static void batadv_tt_global_size_inc(struct batadv_orig_node *orig_node,
				      unsigned short vid)
{
	batadv_tt_global_size_mod(orig_node, vid, 1);
}

/**
 * batadv_tt_global_size_dec - decrease by one the global table size for the
 *  given vid
 * @orig_node: the originator which global table size has to be decreased
 * @vid: the vlan identifier
 */
static void batadv_tt_global_size_dec(struct batadv_orig_node *orig_node,
				      unsigned short vid)
{
	batadv_tt_global_size_mod(orig_node, vid, -1);
}

384 385 386
/**
 * batadv_tt_orig_list_entry_release - release tt orig entry from lists and
 *  queue for free after rcu grace period
387
 * @ref: kref pointer of the tt orig entry
388
 */
389
static void batadv_tt_orig_list_entry_release(struct kref *ref)
390
{
391 392 393 394 395
	struct batadv_tt_orig_list_entry *orig_entry;

	orig_entry = container_of(ref, struct batadv_tt_orig_list_entry,
				  refcount);

396
	batadv_orig_node_put(orig_entry->orig_node);
397 398 399
	kfree_rcu(orig_entry, rcu);
}

400
/**
401 402
 * batadv_tt_orig_list_entry_put - decrement the tt orig entry refcounter and
 *  possibly release it
403 404
 * @orig_entry: tt orig entry to be free'd
 */
405
static void
406
batadv_tt_orig_list_entry_put(struct batadv_tt_orig_list_entry *orig_entry)
407
{
408
	kref_put(&orig_entry->refcount, batadv_tt_orig_list_entry_release);
409 410
}

411 412 413 414 415 416
/**
 * batadv_tt_local_event - store a local TT event (ADD/DEL)
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_local_entry: the TT entry involved in the event
 * @event_flags: flags to store in the event structure
 */
417
static void batadv_tt_local_event(struct batadv_priv *bat_priv,
418
				  struct batadv_tt_local_entry *tt_local_entry,
419
				  u8 event_flags)
420
{
421
	struct batadv_tt_change_node *tt_change_node, *entry, *safe;
422
	struct batadv_tt_common_entry *common = &tt_local_entry->common;
423
	u8 flags = common->flags | event_flags;
424 425
	bool event_removed = false;
	bool del_op_requested, del_op_entry;
426 427 428 429 430

	tt_change_node = kmalloc(sizeof(*tt_change_node), GFP_ATOMIC);
	if (!tt_change_node)
		return;

431
	tt_change_node->change.flags = flags;
432 433
	memset(tt_change_node->change.reserved, 0,
	       sizeof(tt_change_node->change.reserved));
434
	ether_addr_copy(tt_change_node->change.addr, common->addr);
435
	tt_change_node->change.vid = htons(common->vid);
436

437
	del_op_requested = flags & BATADV_TT_CLIENT_DEL;
438 439

	/* check for ADD+DEL or DEL+ADD events */
440 441
	spin_lock_bh(&bat_priv->tt.changes_list_lock);
	list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
442
				 list) {
443
		if (!batadv_compare_eth(entry->change.addr, common->addr))
444 445 446 447 448 449 450 451 452
			continue;

		/* DEL+ADD in the same orig interval have no effect and can be
		 * removed to avoid silly behaviour on the receiver side. The
		 * other way around (ADD+DEL) can happen in case of roaming of
		 * a client still in the NEW state. Roaming of NEW clients is
		 * now possible due to automatically recognition of "temporary"
		 * clients
		 */
453
		del_op_entry = entry->change.flags & BATADV_TT_CLIENT_DEL;
454 455 456 457
		if (!del_op_requested && del_op_entry)
			goto del;
		if (del_op_requested && !del_op_entry)
			goto del;
458 459 460 461 462 463 464

		/* this is a second add in the same originator interval. It
		 * means that flags have been changed: update them!
		 */
		if (!del_op_requested && !del_op_entry)
			entry->change.flags = flags;

465 466 467 468
		continue;
del:
		list_del(&entry->list);
		kfree(entry);
469
		kfree(tt_change_node);
470 471 472 473
		event_removed = true;
		goto unlock;
	}

474
	/* track the change in the OGMinterval list */
475
	list_add_tail(&tt_change_node->list, &bat_priv->tt.changes_list);
476 477

unlock:
478
	spin_unlock_bh(&bat_priv->tt.changes_list_lock);
479

480
	if (event_removed)
481
		atomic_dec(&bat_priv->tt.local_changes);
482
	else
483
		atomic_inc(&bat_priv->tt.local_changes);
484 485
}

486 487 488 489
/**
 * batadv_tt_len - compute length in bytes of given number of tt changes
 * @changes_num: number of tt changes
 *
490
 * Return: computed length in bytes.
491 492
 */
static int batadv_tt_len(int changes_num)
493
{
494
	return changes_num * sizeof(struct batadv_tvlv_tt_change);
495 496
}

497 498 499 500
/**
 * batadv_tt_entries - compute the number of entries fitting in tt_len bytes
 * @tt_len: available space
 *
501
 * Return: the number of entries.
502
 */
503
static u16 batadv_tt_entries(u16 tt_len)
504 505 506 507
{
	return tt_len / batadv_tt_len(1);
}

508 509 510 511 512
/**
 * batadv_tt_local_table_transmit_size - calculates the local translation table
 *  size when transmitted over the air
 * @bat_priv: the bat priv with all the soft interface information
 *
513
 * Return: local translation table size in bytes.
514 515 516
 */
static int batadv_tt_local_table_transmit_size(struct batadv_priv *bat_priv)
{
517 518
	u16 num_vlan = 0;
	u16 tt_local_entries = 0;
519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537
	struct batadv_softif_vlan *vlan;
	int hdr_size;

	rcu_read_lock();
	hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
		num_vlan++;
		tt_local_entries += atomic_read(&vlan->tt.num_entries);
	}
	rcu_read_unlock();

	/* header size of tvlv encapsulated tt response payload */
	hdr_size = sizeof(struct batadv_unicast_tvlv_packet);
	hdr_size += sizeof(struct batadv_tvlv_hdr);
	hdr_size += sizeof(struct batadv_tvlv_tt_data);
	hdr_size += num_vlan * sizeof(struct batadv_tvlv_tt_vlan_data);

	return hdr_size + batadv_tt_len(tt_local_entries);
}

538
static int batadv_tt_local_init(struct batadv_priv *bat_priv)
539
{
540
	if (bat_priv->tt.local_hash)
541
		return 0;
542

543
	bat_priv->tt.local_hash = batadv_hash_new(1024);
544

545
	if (!bat_priv->tt.local_hash)
546
		return -ENOMEM;
547

548 549 550
	batadv_hash_set_lock_class(bat_priv->tt.local_hash,
				   &batadv_tt_local_hash_lock_class_key);

551
	return 0;
552 553
}

554 555 556 557 558
static void batadv_tt_global_free(struct batadv_priv *bat_priv,
				  struct batadv_tt_global_entry *tt_global,
				  const char *message)
{
	batadv_dbg(BATADV_DBG_TT, bat_priv,
559 560 561
		   "Deleting global tt entry %pM (vid: %d): %s\n",
		   tt_global->common.addr,
		   BATADV_PRINT_VID(tt_global->common.vid), message);
562 563

	batadv_hash_remove(bat_priv->tt.global_hash, batadv_compare_tt,
564
			   batadv_choose_tt, &tt_global->common);
565
	batadv_tt_global_entry_put(tt_global);
566 567
}

568 569 570 571 572 573 574 575
/**
 * batadv_tt_local_add - add a new client to the local table or update an
 *  existing client
 * @soft_iface: netdev struct of the mesh interface
 * @addr: the mac address of the client to add
 * @vid: VLAN identifier
 * @ifindex: index of the interface where the client is connected to (useful to
 *  identify wireless clients)
576 577
 * @mark: the value contained in the skb->mark field of the received packet (if
 *  any)
578
 *
579
 * Return: true if the client was successfully added, false otherwise.
580
 */
581 582
bool batadv_tt_local_add(struct net_device *soft_iface, const u8 *addr,
			 unsigned short vid, int ifindex, u32 mark)
583
{
584
	struct batadv_priv *bat_priv = netdev_priv(soft_iface);
585
	struct batadv_tt_local_entry *tt_local;
586
	struct batadv_tt_global_entry *tt_global = NULL;
587
	struct net *net = dev_net(soft_iface);
588
	struct batadv_softif_vlan *vlan;
589
	struct net_device *in_dev = NULL;
590
	struct hlist_head *head;
591
	struct batadv_tt_orig_list_entry *orig_entry;
592
	int hash_added, table_size, packet_size_max;
593 594
	bool ret = false;
	bool roamed_back = false;
595 596
	u8 remote_flags;
	u32 match_mark;
597

598
	if (ifindex != BATADV_NULL_IFINDEX)
599
		in_dev = dev_get_by_index(net, ifindex);
600

601
	tt_local = batadv_tt_local_hash_find(bat_priv, addr, vid);
602 603 604

	if (!is_multicast_ether_addr(addr))
		tt_global = batadv_tt_global_hash_find(bat_priv, addr, vid);
605

606 607
	if (tt_local) {
		tt_local->last_seen = jiffies;
608 609
		if (tt_local->common.flags & BATADV_TT_CLIENT_PENDING) {
			batadv_dbg(BATADV_DBG_TT, bat_priv,
610 611
				   "Re-adding pending client %pM (vid: %d)\n",
				   addr, BATADV_PRINT_VID(vid));
612 613 614 615 616 617 618 619 620 621 622
			/* whatever the reason why the PENDING flag was set,
			 * this is a client which was enqueued to be removed in
			 * this orig_interval. Since it popped up again, the
			 * flag can be reset like it was never enqueued
			 */
			tt_local->common.flags &= ~BATADV_TT_CLIENT_PENDING;
			goto add_event;
		}

		if (tt_local->common.flags & BATADV_TT_CLIENT_ROAM) {
			batadv_dbg(BATADV_DBG_TT, bat_priv,
623 624
				   "Roaming client %pM (vid: %d) came back to its original location\n",
				   addr, BATADV_PRINT_VID(vid));
625 626 627 628 629 630 631 632 633
			/* the ROAM flag is set because this client roamed away
			 * and the node got a roaming_advertisement message. Now
			 * that the client popped up again at its original
			 * location such flag can be unset
			 */
			tt_local->common.flags &= ~BATADV_TT_CLIENT_ROAM;
			roamed_back = true;
		}
		goto check_roaming;
634 635
	}

636 637 638 639 640 641 642 643 644 645 646
	/* Ignore the client if we cannot send it in a full table response. */
	table_size = batadv_tt_local_table_transmit_size(bat_priv);
	table_size += batadv_tt_len(1);
	packet_size_max = atomic_read(&bat_priv->packet_size_max);
	if (table_size > packet_size_max) {
		net_ratelimited_function(batadv_info, soft_iface,
					 "Local translation table size (%i) exceeds maximum packet size (%i); Ignoring new local tt entry: %pM\n",
					 table_size, packet_size_max, addr);
		goto out;
	}

647 648
	tt_local = kmalloc(sizeof(*tt_local), GFP_ATOMIC);
	if (!tt_local)
649
		goto out;
650

651 652
	/* increase the refcounter of the related vlan */
	vlan = batadv_softif_vlan_get(bat_priv, vid);
653
	if (WARN(!vlan, "adding TT local entry %pM to non-existent VLAN %d",
654 655 656
		 addr, BATADV_PRINT_VID(vid))) {
		kfree(tt_local);
		tt_local = NULL;
657
		goto out;
658
	}
659

660
	batadv_dbg(BATADV_DBG_TT, bat_priv,
661 662
		   "Creating new local tt entry: %pM (vid: %d, ttvn: %d)\n",
		   addr, BATADV_PRINT_VID(vid),
663
		   (u8)atomic_read(&bat_priv->tt.vn));
664

665
	ether_addr_copy(tt_local->common.addr, addr);
666 667 668 669 670
	/* The local entry has to be marked as NEW to avoid to send it in
	 * a full table response going out before the next ttvn increment
	 * (consistency check)
	 */
	tt_local->common.flags = BATADV_TT_CLIENT_NEW;
671
	tt_local->common.vid = vid;
672
	if (batadv_is_wifi_netdev(in_dev))
673
		tt_local->common.flags |= BATADV_TT_CLIENT_WIFI;
674 675
	kref_init(&tt_local->common.refcount);
	kref_get(&tt_local->common.refcount);
676 677
	tt_local->last_seen = jiffies;
	tt_local->common.added_at = tt_local->last_seen;
678
	tt_local->vlan = vlan;
679

680 681 682 683 684
	/* the batman interface mac and multicast addresses should never be
	 * purged
	 */
	if (batadv_compare_eth(addr, soft_iface->dev_addr) ||
	    is_multicast_ether_addr(addr))
685
		tt_local->common.flags |= BATADV_TT_CLIENT_NOPURGE;
686

687
	hash_added = batadv_hash_add(bat_priv->tt.local_hash, batadv_compare_tt,
688
				     batadv_choose_tt, &tt_local->common,
689
				     &tt_local->common.hash_entry);
690 691 692

	if (unlikely(hash_added != 0)) {
		/* remove the reference for the hash */
693
		batadv_tt_local_entry_put(tt_local);
694
		batadv_softif_vlan_put(vlan);
695 696 697
		goto out;
	}

698
add_event:
699
	batadv_tt_local_event(bat_priv, tt_local, BATADV_NO_FLAGS);
700

701 702 703 704 705
check_roaming:
	/* Check whether it is a roaming, but don't do anything if the roaming
	 * process has already been handled
	 */
	if (tt_global && !(tt_global->common.flags & BATADV_TT_CLIENT_ROAM)) {
706
		/* These node are probably going to update their tt table */
707
		head = &tt_global->orig_list;
708
		rcu_read_lock();
709
		hlist_for_each_entry_rcu(orig_entry, head, list) {
710
			batadv_send_roam_adv(bat_priv, tt_global->common.addr,
711
					     tt_global->common.vid,
712
					     orig_entry->orig_node);
713 714
		}
		rcu_read_unlock();
715 716 717 718 719 720 721 722 723 724 725
		if (roamed_back) {
			batadv_tt_global_free(bat_priv, tt_global,
					      "Roaming canceled");
			tt_global = NULL;
		} else {
			/* The global entry has to be marked as ROAMING and
			 * has to be kept for consistency purpose
			 */
			tt_global->common.flags |= BATADV_TT_CLIENT_ROAM;
			tt_global->roam_at = jiffies;
		}
726
	}
727

728 729 730 731 732 733 734 735 736
	/* store the current remote flags before altering them. This helps
	 * understanding is flags are changing or not
	 */
	remote_flags = tt_local->common.flags & BATADV_TT_REMOTE_MASK;

	if (batadv_is_wifi_netdev(in_dev))
		tt_local->common.flags |= BATADV_TT_CLIENT_WIFI;
	else
		tt_local->common.flags &= ~BATADV_TT_CLIENT_WIFI;
737

738 739 740 741 742 743 744 745 746 747 748
	/* check the mark in the skb: if it's equal to the configured
	 * isolation_mark, it means the packet is coming from an isolated
	 * non-mesh client
	 */
	match_mark = (mark & bat_priv->isolation_mark_mask);
	if (bat_priv->isolation_mark_mask &&
	    match_mark == bat_priv->isolation_mark)
		tt_local->common.flags |= BATADV_TT_CLIENT_ISOLA;
	else
		tt_local->common.flags &= ~BATADV_TT_CLIENT_ISOLA;

749 750 751 752 753 754 755
	/* if any "dynamic" flag has been modified, resend an ADD event for this
	 * entry so that all the nodes can get the new flags
	 */
	if (remote_flags ^ (tt_local->common.flags & BATADV_TT_REMOTE_MASK))
		batadv_tt_local_event(bat_priv, tt_local, BATADV_NO_FLAGS);

	ret = true;
756
out:
757 758
	if (in_dev)
		dev_put(in_dev);
759
	if (tt_local)
760
		batadv_tt_local_entry_put(tt_local);
761
	if (tt_global)
762
		batadv_tt_global_entry_put(tt_global);
763
	return ret;
764 765
}

766 767 768 769 770 771 772 773 774 775 776 777 778 779 780
/**
 * batadv_tt_prepare_tvlv_global_data - prepare the TVLV TT header to send
 *  within a TT Response directed to another node
 * @orig_node: originator for which the TT data has to be prepared
 * @tt_data: uninitialised pointer to the address of the TVLV buffer
 * @tt_change: uninitialised pointer to the address of the area where the TT
 *  changed can be stored
 * @tt_len: pointer to the length to reserve to the tt_change. if -1 this
 *  function reserves the amount of space needed to send the entire global TT
 *  table. In case of success the value is updated with the real amount of
 *  reserved bytes
 * Allocate the needed amount of memory for the entire TT TVLV and write its
 * header made up by one tvlv_tt_data object and a series of tvlv_tt_vlan_data
 * objects, one per active VLAN served by the originator node.
 *
781
 * Return: the size of the allocated buffer or 0 in case of failure.
782
 */
783
static u16
784 785 786
batadv_tt_prepare_tvlv_global_data(struct batadv_orig_node *orig_node,
				   struct batadv_tvlv_tt_data **tt_data,
				   struct batadv_tvlv_tt_change **tt_change,
787
				   s32 *tt_len)
788
{
789 790 791 792
	u16 num_vlan = 0;
	u16 num_entries = 0;
	u16 change_offset;
	u16 tvlv_len;
793 794
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
	struct batadv_orig_node_vlan *vlan;
795
	u8 *tt_change_ptr;
796 797

	rcu_read_lock();
798
	hlist_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) {
799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823
		num_vlan++;
		num_entries += atomic_read(&vlan->tt.num_entries);
	}

	change_offset = sizeof(**tt_data);
	change_offset += num_vlan * sizeof(*tt_vlan);

	/* if tt_len is negative, allocate the space needed by the full table */
	if (*tt_len < 0)
		*tt_len = batadv_tt_len(num_entries);

	tvlv_len = *tt_len;
	tvlv_len += change_offset;

	*tt_data = kmalloc(tvlv_len, GFP_ATOMIC);
	if (!*tt_data) {
		*tt_len = 0;
		goto out;
	}

	(*tt_data)->flags = BATADV_NO_FLAGS;
	(*tt_data)->ttvn = atomic_read(&orig_node->last_ttvn);
	(*tt_data)->num_vlan = htons(num_vlan);

	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(*tt_data + 1);
824
	hlist_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) {
825 826 827 828 829 830
		tt_vlan->vid = htons(vlan->vid);
		tt_vlan->crc = htonl(vlan->tt.crc);

		tt_vlan++;
	}

831
	tt_change_ptr = (u8 *)*tt_data + change_offset;
832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854
	*tt_change = (struct batadv_tvlv_tt_change *)tt_change_ptr;

out:
	rcu_read_unlock();
	return tvlv_len;
}

/**
 * batadv_tt_prepare_tvlv_local_data - allocate and prepare the TT TVLV for this
 *  node
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: uninitialised pointer to the address of the TVLV buffer
 * @tt_change: uninitialised pointer to the address of the area where the TT
 *  changes can be stored
 * @tt_len: pointer to the length to reserve to the tt_change. if -1 this
 *  function reserves the amount of space needed to send the entire local TT
 *  table. In case of success the value is updated with the real amount of
 *  reserved bytes
 *
 * Allocate the needed amount of memory for the entire TT TVLV and write its
 * header made up by one tvlv_tt_data object and a series of tvlv_tt_vlan_data
 * objects, one per active VLAN.
 *
855
 * Return: the size of the allocated buffer or 0 in case of failure.
856
 */
857
static u16
858 859 860
batadv_tt_prepare_tvlv_local_data(struct batadv_priv *bat_priv,
				  struct batadv_tvlv_tt_data **tt_data,
				  struct batadv_tvlv_tt_change **tt_change,
861
				  s32 *tt_len)
862 863 864
{
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
	struct batadv_softif_vlan *vlan;
865 866 867
	u16 num_vlan = 0;
	u16 num_entries = 0;
	u16 tvlv_len;
868
	u8 *tt_change_ptr;
869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904
	int change_offset;

	rcu_read_lock();
	hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
		num_vlan++;
		num_entries += atomic_read(&vlan->tt.num_entries);
	}

	change_offset = sizeof(**tt_data);
	change_offset += num_vlan * sizeof(*tt_vlan);

	/* if tt_len is negative, allocate the space needed by the full table */
	if (*tt_len < 0)
		*tt_len = batadv_tt_len(num_entries);

	tvlv_len = *tt_len;
	tvlv_len += change_offset;

	*tt_data = kmalloc(tvlv_len, GFP_ATOMIC);
	if (!*tt_data) {
		tvlv_len = 0;
		goto out;
	}

	(*tt_data)->flags = BATADV_NO_FLAGS;
	(*tt_data)->ttvn = atomic_read(&bat_priv->tt.vn);
	(*tt_data)->num_vlan = htons(num_vlan);

	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(*tt_data + 1);
	hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
		tt_vlan->vid = htons(vlan->vid);
		tt_vlan->crc = htonl(vlan->tt.crc);

		tt_vlan++;
	}

905
	tt_change_ptr = (u8 *)*tt_data + change_offset;
906 907 908 909 910 911 912
	*tt_change = (struct batadv_tvlv_tt_change *)tt_change_ptr;

out:
	rcu_read_unlock();
	return tvlv_len;
}

913 914 915 916 917 918
/**
 * batadv_tt_tvlv_container_update - update the translation table tvlv container
 *  after local tt changes have been committed
 * @bat_priv: the bat priv with all the soft interface information
 */
static void batadv_tt_tvlv_container_update(struct batadv_priv *bat_priv)
919
{
920 921 922
	struct batadv_tt_change_node *entry, *safe;
	struct batadv_tvlv_tt_data *tt_data;
	struct batadv_tvlv_tt_change *tt_change;
923
	int tt_diff_len, tt_change_len = 0;
924 925
	int tt_diff_entries_num = 0;
	int tt_diff_entries_count = 0;
926
	u16 tvlv_len;
927

928 929
	tt_diff_entries_num = atomic_read(&bat_priv->tt.local_changes);
	tt_diff_len = batadv_tt_len(tt_diff_entries_num);
930 931 932 933

	/* if we have too many changes for one packet don't send any
	 * and wait for the tt table request which will be fragmented
	 */
934 935
	if (tt_diff_len > bat_priv->soft_iface->mtu)
		tt_diff_len = 0;
936

937 938 939
	tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv, &tt_data,
						     &tt_change, &tt_diff_len);
	if (!tvlv_len)
940
		return;
941

942
	tt_data->flags = BATADV_TT_OGM_DIFF;
943

944 945
	if (tt_diff_len == 0)
		goto container_register;
946

947 948
	spin_lock_bh(&bat_priv->tt.changes_list_lock);
	atomic_set(&bat_priv->tt.local_changes, 0);
949

950
	list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
951
				 list) {
952 953 954 955 956
		if (tt_diff_entries_count < tt_diff_entries_num) {
			memcpy(tt_change + tt_diff_entries_count,
			       &entry->change,
			       sizeof(struct batadv_tvlv_tt_change));
			tt_diff_entries_count++;
957
		}
958 959
		list_del(&entry->list);
		kfree(entry);
960
	}
961
	spin_unlock_bh(&bat_priv->tt.changes_list_lock);
962 963

	/* Keep the buffer for possible tt_request */
964 965 966 967
	spin_lock_bh(&bat_priv->tt.last_changeset_lock);
	kfree(bat_priv->tt.last_changeset);
	bat_priv->tt.last_changeset_len = 0;
	bat_priv->tt.last_changeset = NULL;
968
	tt_change_len = batadv_tt_len(tt_diff_entries_count);
969
	/* check whether this new OGM has no changes due to size problems */
970
	if (tt_diff_entries_count > 0) {
971
		/* if kmalloc() fails we will reply with the full table
972 973
		 * instead of providing the diff
		 */
974
		bat_priv->tt.last_changeset = kzalloc(tt_diff_len, GFP_ATOMIC);
975
		if (bat_priv->tt.last_changeset) {
976 977 978
			memcpy(bat_priv->tt.last_changeset,
			       tt_change, tt_change_len);
			bat_priv->tt.last_changeset_len = tt_diff_len;
979 980
		}
	}
981
	spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
982

983 984
container_register:
	batadv_tvlv_container_register(bat_priv, BATADV_TVLV_TT, 1, tt_data,
985
				       tvlv_len);
986
	kfree(tt_data);
987 988
}

989
int batadv_tt_local_seq_print_text(struct seq_file *seq, void *offset)
990 991
{
	struct net_device *net_dev = (struct net_device *)seq->private;
992
	struct batadv_priv *bat_priv = netdev_priv(net_dev);
993
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
994
	struct batadv_tt_common_entry *tt_common_entry;
995
	struct batadv_tt_local_entry *tt_local;
996
	struct batadv_hard_iface *primary_if;
997
	struct hlist_head *head;
998
	unsigned short vid;
999
	u32 i;
1000 1001 1002 1003
	int last_seen_secs;
	int last_seen_msecs;
	unsigned long last_seen_jiffies;
	bool no_purge;
1004
	u16 np_flag = BATADV_TT_CLIENT_NOPURGE;
1005

1006 1007
	primary_if = batadv_seq_print_text_primary_if_get(seq);
	if (!primary_if)
1008
		goto out;
1009

1010
	seq_printf(seq,
1011
		   "Locally retrieved addresses (from %s) announced via TT (TTVN: %u):\n",
1012
		   net_dev->name, (u8)atomic_read(&bat_priv->tt.vn));
1013 1014
	seq_puts(seq,
		 "       Client         VID Flags    Last seen (CRC       )\n");
1015 1016 1017 1018

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

1019
		rcu_read_lock();
1020
		hlist_for_each_entry_rcu(tt_common_entry,
1021
					 head, hash_entry) {
1022 1023 1024
			tt_local = container_of(tt_common_entry,
						struct batadv_tt_local_entry,
						common);
1025
			vid = tt_common_entry->vid;
1026 1027 1028 1029 1030 1031
			last_seen_jiffies = jiffies - tt_local->last_seen;
			last_seen_msecs = jiffies_to_msecs(last_seen_jiffies);
			last_seen_secs = last_seen_msecs / 1000;
			last_seen_msecs = last_seen_msecs % 1000;

			no_purge = tt_common_entry->flags & np_flag;
1032
			seq_printf(seq,
1033
				   " * %pM %4i [%c%c%c%c%c%c] %3u.%03u   (%#.8x)\n",
1034
				   tt_common_entry->addr,
1035
				   BATADV_PRINT_VID(tt_common_entry->vid),
1036 1037
				   ((tt_common_entry->flags &
				     BATADV_TT_CLIENT_ROAM) ? 'R' : '.'),
1038
				   no_purge ? 'P' : '.',
1039 1040 1041 1042 1043 1044 1045 1046
				   ((tt_common_entry->flags &
				     BATADV_TT_CLIENT_NEW) ? 'N' : '.'),
				   ((tt_common_entry->flags &
				     BATADV_TT_CLIENT_PENDING) ? 'X' : '.'),
				   ((tt_common_entry->flags &
				     BATADV_TT_CLIENT_WIFI) ? 'W' : '.'),
				   ((tt_common_entry->flags &
				     BATADV_TT_CLIENT_ISOLA) ? 'I' : '.'),
1047
				   no_purge ? 0 : last_seen_secs,
1048
				   no_purge ? 0 : last_seen_msecs,
1049
				   tt_local->vlan->tt.crc);
1050
		}
1051
		rcu_read_unlock();
1052
	}
1053 1054
out:
	if (primary_if)
1055
		batadv_hardif_put(primary_if);
1056
	return 0;
1057 1058
}

1059 1060 1061
static void
batadv_tt_local_set_pending(struct batadv_priv *bat_priv,
			    struct batadv_tt_local_entry *tt_local_entry,
1062
			    u16 flags, const char *message)
1063
{
1064
	batadv_tt_local_event(bat_priv, tt_local_entry, flags);
1065

1066 1067
	/* The local client has to be marked as "pending to be removed" but has
	 * to be kept in the table in order to send it in a full table
1068 1069
	 * response issued before the net ttvn increment (consistency check)
	 */
1070
	tt_local_entry->common.flags |= BATADV_TT_CLIENT_PENDING;
1071

1072
	batadv_dbg(BATADV_DBG_TT, bat_priv,
1073 1074 1075
		   "Local tt entry (%pM, vid: %d) pending to be removed: %s\n",
		   tt_local_entry->common.addr,
		   BATADV_PRINT_VID(tt_local_entry->common.vid), message);
1076 1077
}

1078 1079 1080 1081
/**
 * batadv_tt_local_remove - logically remove an entry from the local table
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the MAC address of the client to remove
1082
 * @vid: VLAN identifier
1083 1084 1085
 * @message: message to append to the log on deletion
 * @roaming: true if the deletion is due to a roaming event
 *
1086
 * Return: the flags assigned to the local entry before being deleted
1087
 */
1088 1089 1090
u16 batadv_tt_local_remove(struct batadv_priv *bat_priv, const u8 *addr,
			   unsigned short vid, const char *message,
			   bool roaming)
1091
{
1092
	struct batadv_tt_local_entry *tt_local_entry;
1093
	u16 flags, curr_flags = BATADV_NO_FLAGS;
1094
	void *tt_entry_exists;
1095

1096
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
1097 1098 1099
	if (!tt_local_entry)
		goto out;

1100 1101
	curr_flags = tt_local_entry->common.flags;

1102
	flags = BATADV_TT_CLIENT_DEL;
1103 1104 1105 1106
	/* if this global entry addition is due to a roaming, the node has to
	 * mark the local entry as "roamed" in order to correctly reroute
	 * packets later
	 */
1107
	if (roaming) {
1108
		flags |= BATADV_TT_CLIENT_ROAM;
1109 1110 1111
		/* mark the local client as ROAMed */
		tt_local_entry->common.flags |= BATADV_TT_CLIENT_ROAM;
	}
1112

1113 1114 1115 1116 1117 1118 1119 1120
	if (!(tt_local_entry->common.flags & BATADV_TT_CLIENT_NEW)) {
		batadv_tt_local_set_pending(bat_priv, tt_local_entry, flags,
					    message);
		goto out;
	}
	/* if this client has been added right now, it is possible to
	 * immediately purge it
	 */
1121
	batadv_tt_local_event(bat_priv, tt_local_entry, BATADV_TT_CLIENT_DEL);
1122 1123 1124 1125 1126 1127 1128 1129 1130

	tt_entry_exists = batadv_hash_remove(bat_priv->tt.local_hash,
					     batadv_compare_tt,
					     batadv_choose_tt,
					     &tt_local_entry->common);
	if (!tt_entry_exists)
		goto out;

	/* extra call to free the local tt entry */
1131
	batadv_tt_local_entry_put(tt_local_entry);
1132

1133 1134
out:
	if (tt_local_entry)
1135
		batadv_tt_local_entry_put(tt_local_entry);
1136 1137

	return curr_flags;
1138 1139
}

1140 1141 1142 1143 1144 1145 1146
/**
 * batadv_tt_local_purge_list - purge inactive tt local entries
 * @bat_priv: the bat priv with all the soft interface information
 * @head: pointer to the list containing the local tt entries
 * @timeout: parameter deciding whether a given tt local entry is considered
 *  inactive or not
 */
1147
static void batadv_tt_local_purge_list(struct batadv_priv *bat_priv,
1148 1149
				       struct hlist_head *head,
				       int timeout)
1150
{
1151 1152
	struct batadv_tt_local_entry *tt_local_entry;
	struct batadv_tt_common_entry *tt_common_entry;
1153
	struct hlist_node *node_tmp;
1154

1155
	hlist_for_each_entry_safe(tt_common_entry, node_tmp, head,
1156 1157
				  hash_entry) {
		tt_local_entry = container_of(tt_common_entry,
1158 1159
					      struct batadv_tt_local_entry,
					      common);
1160 1161 1162 1163 1164 1165 1166
		if (tt_local_entry->common.flags & BATADV_TT_CLIENT_NOPURGE)
			continue;

		/* entry already marked for deletion */
		if (tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING)
			continue;

1167
		if (!batadv_has_timed_out(tt_local_entry->last_seen, timeout))
1168 1169 1170 1171 1172 1173 1174
			continue;

		batadv_tt_local_set_pending(bat_priv, tt_local_entry,
					    BATADV_TT_CLIENT_DEL, "timed out");
	}
}

1175 1176 1177 1178 1179 1180 1181 1182
/**
 * batadv_tt_local_purge - purge inactive tt local entries
 * @bat_priv: the bat priv with all the soft interface information
 * @timeout: parameter deciding whether a given tt local entry is considered
 *  inactive or not
 */
static void batadv_tt_local_purge(struct batadv_priv *bat_priv,
				  int timeout)
1183
{
1184
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
1185
	struct hlist_head *head;
1186
	spinlock_t *list_lock; /* protects write access to the hash lists */
1187
	u32 i;
1188 1189 1190

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
1191
		list_lock = &hash->list_locks[i];
1192

1193
		spin_lock_bh(list_lock);
1194
		batadv_tt_local_purge_list(bat_priv, head, timeout);
1195
		spin_unlock_bh(list_lock);
1196 1197 1198
	}
}

1199
static void batadv_tt_local_table_free(struct batadv_priv *bat_priv)
1200
{
1201
	struct batadv_hashtable *hash;
1202
	spinlock_t *list_lock; /* protects write access to the hash lists */
1203 1204
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_local_entry *tt_local;
1205
	struct hlist_node *node_tmp;
1206
	struct hlist_head *head;
1207
	u32 i;
1208

1209
	if (!bat_priv->tt.local_hash)
1210 1211
		return;

1212
	hash = bat_priv->tt.local_hash;
1213 1214 1215 1216 1217 1218

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
		list_lock = &hash->list_locks[i];

		spin_lock_bh(list_lock);
1219
		hlist_for_each_entry_safe(tt_common_entry, node_tmp,
1220
					  head, hash_entry) {
1221
			hlist_del_rcu(&tt_common_entry->hash_entry);
1222 1223 1224
			tt_local = container_of(tt_common_entry,
						struct batadv_tt_local_entry,
						common);
1225

1226
			batadv_tt_local_entry_put(tt_local);
1227 1228 1229 1230
		}
		spin_unlock_bh(list_lock);
	}

1231
	batadv_hash_destroy(hash);
1232

1233
	bat_priv->tt.local_hash = NULL;
1234 1235
}

1236
static int batadv_tt_global_init(struct batadv_priv *bat_priv)
1237
{
1238
	if (bat_priv->tt.global_hash)
1239
		return 0;
1240

1241
	bat_priv->tt.global_hash = batadv_hash_new(1024);
1242

1243
	if (!bat_priv->tt.global_hash)
1244
		return -ENOMEM;
1245

1246 1247 1248
	batadv_hash_set_lock_class(bat_priv->tt.global_hash,
				   &batadv_tt_global_hash_lock_class_key);

1249
	return 0;
1250 1251
}

1252
static void batadv_tt_changes_list_free(struct batadv_priv *bat_priv)
1253
{
1254
	struct batadv_tt_change_node *entry, *safe;
1255

1256
	spin_lock_bh(&bat_priv->tt.changes_list_lock);
1257

1258
	list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
1259 1260 1261 1262
				 list) {
		list_del(&entry->list);
		kfree(entry);
	}
1263

1264 1265
	atomic_set(&bat_priv->tt.local_changes, 0);
	spin_unlock_bh(&bat_priv->tt.changes_list_lock);
1266
}
1267

1268
/**
1269 1270 1271 1272
 * batadv_tt_global_orig_entry_find - find a TT orig_list_entry
 * @entry: the TT global entry where the orig_list_entry has to be
 *  extracted from
 * @orig_node: the originator for which the orig_list_entry has to be found
1273
 *
1274
 * retrieve the orig_tt_list_entry belonging to orig_node from the
1275 1276
 * batadv_tt_global_entry list
 *
1277
 * Return: it with an increased refcounter, NULL if not found
1278
 */
1279 1280 1281
static struct batadv_tt_orig_list_entry *
batadv_tt_global_orig_entry_find(const struct batadv_tt_global_entry *entry,
				 const struct batadv_orig_node *orig_node)
1282
{
1283
	struct batadv_tt_orig_list_entry *tmp_orig_entry, *orig_entry = NULL;
1284 1285 1286 1287
	const struct hlist_head *head;

	rcu_read_lock();
	head = &entry->orig_list;
1288
	hlist_for_each_entry_rcu(tmp_orig_entry, head, list) {
1289 1290
		if (tmp_orig_entry->orig_node != orig_node)
			continue;
1291
		if (!kref_get_unless_zero(&tmp_orig_entry->refcount))
1292 1293 1294 1295
			continue;

		orig_entry = tmp_orig_entry;
		break;
1296 1297
	}
	rcu_read_unlock();
1298 1299 1300 1301

	return orig_entry;
}

1302
/**
1303 1304 1305 1306
 * batadv_tt_global_entry_has_orig - check if a TT global entry is also handled
 *  by a given originator
 * @entry: the TT global entry to check
 * @orig_node: the originator to search in the list
1307 1308 1309 1310
 *
 * find out if an orig_node is already in the list of a tt_global_entry.
 *
 * Return: true if found, false otherwise
1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321
 */
static bool
batadv_tt_global_entry_has_orig(const struct batadv_tt_global_entry *entry,
				const struct batadv_orig_node *orig_node)
{
	struct batadv_tt_orig_list_entry *orig_entry;
	bool found = false;

	orig_entry = batadv_tt_global_orig_entry_find(entry, orig_node);
	if (orig_entry) {
		found = true;
1322
		batadv_tt_orig_list_entry_put(orig_entry);
1323 1324
	}

1325 1326 1327
	return found;
}

1328
static void
1329
batadv_tt_global_orig_entry_add(struct batadv_tt_global_entry *tt_global,
1330
				struct batadv_orig_node *orig_node, int ttvn)
1331
{
1332
	struct batadv_tt_orig_list_entry *orig_entry;
1333

1334
	orig_entry = batadv_tt_global_orig_entry_find(tt_global, orig_node);
1335 1336 1337 1338 1339
	if (orig_entry) {
		/* refresh the ttvn: the current value could be a bogus one that
		 * was added during a "temporary client detection"
		 */
		orig_entry->ttvn = ttvn;
1340
		goto out;
1341
	}
1342

1343 1344
	orig_entry = kzalloc(sizeof(*orig_entry), GFP_ATOMIC);
	if (!orig_entry)
1345
		goto out;
1346 1347

	INIT_HLIST_NODE(&orig_entry->list);
1348
	kref_get(&orig_node->refcount);
1349
	batadv_tt_global_size_inc(orig_node, tt_global->common.vid);
1350 1351
	orig_entry->orig_node = orig_node;
	orig_entry->ttvn = ttvn;
1352 1353
	kref_init(&orig_entry->refcount);
	kref_get(&orig_entry->refcount);
1354

1355
	spin_lock_bh(&tt_global->list_lock);
1356
	hlist_add_head_rcu(&orig_entry->list,
1357 1358
			   &tt_global->orig_list);
	spin_unlock_bh(&tt_global->list_lock);
1359 1360
	atomic_inc(&tt_global->orig_list_count);

1361 1362
out:
	if (orig_entry)
1363
		batadv_tt_orig_list_entry_put(orig_entry);
1364 1365
}

1366 1367 1368 1369 1370
/**
 * batadv_tt_global_add - add a new TT global entry or update an existing one
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: the originator announcing the client
 * @tt_addr: the mac address of the non-mesh client
1371
 * @vid: VLAN identifier
1372 1373 1374 1375 1376 1377 1378 1379 1380 1381
 * @flags: TT flags that have to be set for this non-mesh client
 * @ttvn: the tt version number ever announcing this non-mesh client
 *
 * Add a new TT global entry for the given originator. If the entry already
 * exists add a new reference to the given originator (a global entry can have
 * references to multiple originators) and adjust the flags attribute to reflect
 * the function argument.
 * If a TT local entry exists for this non-mesh client remove it.
 *
 * The caller must hold orig_node refcount.
1382
 *
1383
 * Return: true if the new entry has been added, false otherwise
1384
 */
1385 1386
static bool batadv_tt_global_add(struct batadv_priv *bat_priv,
				 struct batadv_orig_node *orig_node,
1387
				 const unsigned char *tt_addr,
1388
				 unsigned short vid, u16 flags, u8 ttvn)
1389
{
1390 1391
	struct batadv_tt_global_entry *tt_global_entry;
	struct batadv_tt_local_entry *tt_local_entry;
1392
	bool ret = false;
1393
	int hash_added;
1394
	struct batadv_tt_common_entry *common;
1395
	u16 local_flags;
1396

1397 1398 1399 1400
	/* ignore global entries from backbone nodes */
	if (batadv_bla_is_backbone_gw_orig(bat_priv, orig_node->orig, vid))
		return true;

1401 1402
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, tt_addr, vid);
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, tt_addr, vid);
1403 1404 1405 1406 1407 1408 1409 1410

	/* if the node already has a local client for this entry, it has to wait
	 * for a roaming advertisement instead of manually messing up the global
	 * table
	 */
	if ((flags & BATADV_TT_CLIENT_TEMP) && tt_local_entry &&
	    !(tt_local_entry->common.flags & BATADV_TT_CLIENT_NEW))
		goto out;
1411 1412

	if (!tt_global_entry) {
1413
		tt_global_entry = kzalloc(sizeof(*tt_global_entry), GFP_ATOMIC);
1414
		if (!tt_global_entry)
1415 1416
			goto out;

1417
		common = &tt_global_entry->common;
1418
		ether_addr_copy(common->addr, tt_addr);
1419
		common->vid = vid;
1420

1421
		common->flags = flags;
1422
		tt_global_entry->roam_at = 0;
1423 1424 1425 1426 1427 1428
		/* node must store current time in case of roaming. This is
		 * needed to purge this entry out on timeout (if nobody claims
		 * it)
		 */
		if (flags & BATADV_TT_CLIENT_ROAM)
			tt_global_entry->roam_at = jiffies;
1429 1430
		kref_init(&common->refcount);
		kref_get(&common->refcount);
1431
		common->added_at = jiffies;
1432 1433

		INIT_HLIST_HEAD(&tt_global_entry->orig_list);
1434
		atomic_set(&tt_global_entry->orig_list_count, 0);
1435
		spin_lock_init(&tt_global_entry->list_lock);
1436

1437
		hash_added = batadv_hash_add(bat_priv->tt.global_hash,
1438
					     batadv_compare_tt,
1439
					     batadv_choose_tt, common,
1440
					     &common->hash_entry);
1441 1442 1443

		if (unlikely(hash_added != 0)) {
			/* remove the reference for the hash */
1444
			batadv_tt_global_entry_put(tt_global_entry);
1445 1446
			goto out_remove;
		}
1447
	} else {
1448
		common = &tt_global_entry->common;
1449 1450
		/* If there is already a global entry, we can use this one for
		 * our processing.
1451 1452 1453 1454 1455 1456 1457
		 * But if we are trying to add a temporary client then here are
		 * two options at this point:
		 * 1) the global client is not a temporary client: the global
		 *    client has to be left as it is, temporary information
		 *    should never override any already known client state
		 * 2) the global client is a temporary client: purge the
		 *    originator list and add the new one orig_entry
1458
		 */
1459 1460 1461 1462 1463 1464 1465 1466 1467
		if (flags & BATADV_TT_CLIENT_TEMP) {
			if (!(common->flags & BATADV_TT_CLIENT_TEMP))
				goto out;
			if (batadv_tt_global_entry_has_orig(tt_global_entry,
							    orig_node))
				goto out_remove;
			batadv_tt_global_del_orig_list(tt_global_entry);
			goto add_orig_entry;
		}
1468 1469

		/* if the client was temporary added before receiving the first
1470 1471 1472 1473
		 * OGM announcing it, we have to clear the TEMP flag. Also,
		 * remove the previous temporary orig node and re-add it
		 * if required. If the orig entry changed, the new one which
		 * is a non-temporary entry is preferred.
1474
		 */
1475 1476 1477 1478
		if (common->flags & BATADV_TT_CLIENT_TEMP) {
			batadv_tt_global_del_orig_list(tt_global_entry);
			common->flags &= ~BATADV_TT_CLIENT_TEMP;
		}
1479

1480 1481 1482 1483
		/* the change can carry possible "attribute" flags like the
		 * TT_CLIENT_WIFI, therefore they have to be copied in the
		 * client entry
		 */
1484
		common->flags |= flags;
1485

1486 1487
		/* If there is the BATADV_TT_CLIENT_ROAM flag set, there is only
		 * one originator left in the list and we previously received a
1488 1489 1490 1491 1492
		 * delete + roaming change for this originator.
		 *
		 * We should first delete the old originator before adding the
		 * new one.
		 */
1493
		if (common->flags & BATADV_TT_CLIENT_ROAM) {
1494
			batadv_tt_global_del_orig_list(tt_global_entry);
1495
			common->flags &= ~BATADV_TT_CLIENT_ROAM;
1496
			tt_global_entry->roam_at = 0;
1497 1498
		}
	}
1499
add_orig_entry:
1500
	/* add the new orig_entry (if needed) or update it */
1501
	batadv_tt_global_orig_entry_add(tt_global_entry, orig_node, ttvn);
1502

1503
	batadv_dbg(BATADV_DBG_TT, bat_priv,
1504 1505 1506
		   "Creating new global tt entry: %pM (vid: %d, via %pM)\n",
		   common->addr, BATADV_PRINT_VID(common->vid),
		   orig_node->orig);
1507
	ret = true;
1508

1509
out_remove:
1510 1511 1512 1513 1514
	/* Do not remove multicast addresses from the local hash on
	 * global additions
	 */
	if (is_multicast_ether_addr(tt_addr))
		goto out;
1515

1516
	/* remove address from local hash if present */
1517
	local_flags = batadv_tt_local_remove(bat_priv, tt_addr, vid,
1518
					     "global tt received",
1519
					     flags & BATADV_TT_CLIENT_ROAM);
1520 1521
	tt_global_entry->common.flags |= local_flags & BATADV_TT_CLIENT_WIFI;

1522 1523 1524 1525 1526 1527
	if (!(flags & BATADV_TT_CLIENT_ROAM))
		/* this is a normal global add. Therefore the client is not in a
		 * roaming state anymore.
		 */
		tt_global_entry->common.flags &= ~BATADV_TT_CLIENT_ROAM;

1528 1529
out:
	if (tt_global_entry)
1530
		batadv_tt_global_entry_put(tt_global_entry);
1531
	if (tt_local_entry)
1532
		batadv_tt_local_entry_put(tt_local_entry);
1533
	return ret;
1534 1535
}

1536 1537
/**
 * batadv_transtable_best_orig - Get best originator list entry from tt entry
1538
 * @bat_priv: the bat priv with all the soft interface information
1539 1540 1541
 * @tt_global_entry: global translation table entry to be analyzed
 *
 * This functon assumes the caller holds rcu_read_lock().
1542
 * Return: best originator list entry or NULL on errors.
1543 1544
 */
static struct batadv_tt_orig_list_entry *
1545 1546
batadv_transtable_best_orig(struct batadv_priv *bat_priv,
			    struct batadv_tt_global_entry *tt_global_entry)
1547
{
1548 1549
	struct batadv_neigh_node *router, *best_router = NULL;
	struct batadv_algo_ops *bao = bat_priv->bat_algo_ops;
1550 1551 1552 1553
	struct hlist_head *head;
	struct batadv_tt_orig_list_entry *orig_entry, *best_entry = NULL;

	head = &tt_global_entry->orig_list;
1554
	hlist_for_each_entry_rcu(orig_entry, head, list) {
1555 1556
		router = batadv_orig_router_get(orig_entry->orig_node,
						BATADV_IF_DEFAULT);
1557 1558 1559
		if (!router)
			continue;

1560
		if (best_router &&
1561 1562
		    bao->bat_neigh_cmp(router, BATADV_IF_DEFAULT,
				       best_router, BATADV_IF_DEFAULT) <= 0) {
1563
			batadv_neigh_node_put(router);
1564
			continue;
1565 1566
		}

1567 1568
		/* release the refcount for the "old" best */
		if (best_router)
1569
			batadv_neigh_node_put(best_router);
1570 1571 1572

		best_entry = orig_entry;
		best_router = router;
1573 1574
	}

1575
	if (best_router)
1576
		batadv_neigh_node_put(best_router);
1577

1578 1579 1580
	return best_entry;
}

1581 1582 1583
/**
 * batadv_tt_global_print_entry - print all orig nodes who announce the address
 *  for this global entry
1584
 * @bat_priv: the bat priv with all the soft interface information
1585 1586 1587 1588
 * @tt_global_entry: global translation table entry to be printed
 * @seq: debugfs table seq_file struct
 *
 * This functon assumes the caller holds rcu_read_lock().
1589
 */
1590
static void
1591 1592
batadv_tt_global_print_entry(struct batadv_priv *bat_priv,
			     struct batadv_tt_global_entry *tt_global_entry,
1593
			     struct seq_file *seq)
1594
{
1595
	struct batadv_tt_orig_list_entry *orig_entry, *best_entry;
1596
	struct batadv_tt_common_entry *tt_common_entry;
1597 1598
	struct batadv_orig_node_vlan *vlan;
	struct hlist_head *head;
1599 1600
	u8 last_ttvn;
	u16 flags;
1601 1602

	tt_common_entry = &tt_global_entry->common;
1603 1604
	flags = tt_common_entry->flags;

1605
	best_entry = batadv_transtable_best_orig(bat_priv, tt_global_entry);
1606
	if (best_entry) {
1607 1608 1609 1610 1611 1612 1613 1614 1615 1616
		vlan = batadv_orig_node_vlan_get(best_entry->orig_node,
						 tt_common_entry->vid);
		if (!vlan) {
			seq_printf(seq,
				   " * Cannot retrieve VLAN %d for originator %pM\n",
				   BATADV_PRINT_VID(tt_common_entry->vid),
				   best_entry->orig_node->orig);
			goto print_list;
		}

1617
		last_ttvn = atomic_read(&best_entry->orig_node->last_ttvn);
1618
		seq_printf(seq,
1619
			   " %c %pM %4i   (%3u) via %pM     (%3u)   (%#.8x) [%c%c%c%c]\n",
1620
			   '*', tt_global_entry->common.addr,
1621
			   BATADV_PRINT_VID(tt_global_entry->common.vid),
1622
			   best_entry->ttvn, best_entry->orig_node->orig,
1623
			   last_ttvn, vlan->tt.crc,
1624 1625 1626 1627
			   ((flags & BATADV_TT_CLIENT_ROAM) ? 'R' : '.'),
			   ((flags & BATADV_TT_CLIENT_WIFI) ? 'W' : '.'),
			   ((flags & BATADV_TT_CLIENT_ISOLA) ? 'I' : '.'),
			   ((flags & BATADV_TT_CLIENT_TEMP) ? 'T' : '.'));
1628

1629
		batadv_orig_node_vlan_put(vlan);
1630
	}
1631

1632
print_list:
1633 1634
	head = &tt_global_entry->orig_list;

1635
	hlist_for_each_entry_rcu(orig_entry, head, list) {
1636 1637 1638
		if (best_entry == orig_entry)
			continue;

1639 1640 1641 1642 1643 1644 1645 1646 1647 1648
		vlan = batadv_orig_node_vlan_get(orig_entry->orig_node,
						 tt_common_entry->vid);
		if (!vlan) {
			seq_printf(seq,
				   " + Cannot retrieve VLAN %d for originator %pM\n",
				   BATADV_PRINT_VID(tt_common_entry->vid),
				   orig_entry->orig_node->orig);
			continue;
		}

1649
		last_ttvn = atomic_read(&orig_entry->orig_node->last_ttvn);
1650
		seq_printf(seq,
1651
			   " %c %pM %4d   (%3u) via %pM     (%3u)   (%#.8x) [%c%c%c%c]\n",
1652
			   '+', tt_global_entry->common.addr,
1653
			   BATADV_PRINT_VID(tt_global_entry->common.vid),
1654
			   orig_entry->ttvn, orig_entry->orig_node->orig,
1655
			   last_ttvn, vlan->tt.crc,
1656 1657 1658 1659
			   ((flags & BATADV_TT_CLIENT_ROAM) ? 'R' : '.'),
			   ((flags & BATADV_TT_CLIENT_WIFI) ? 'W' : '.'),
			   ((flags & BATADV_TT_CLIENT_ISOLA) ? 'I' : '.'),
			   ((flags & BATADV_TT_CLIENT_TEMP) ? 'T' : '.'));
1660

1661
		batadv_orig_node_vlan_put(vlan);
1662 1663 1664
	}
}

1665
int batadv_tt_global_seq_print_text(struct seq_file *seq, void *offset)
1666 1667
{
	struct net_device *net_dev = (struct net_device *)seq->private;
1668
	struct batadv_priv *bat_priv = netdev_priv(net_dev);
1669
	struct batadv_hashtable *hash = bat_priv->tt.global_hash;
1670 1671 1672
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_global_entry *tt_global;
	struct batadv_hard_iface *primary_if;
1673
	struct hlist_head *head;
1674
	u32 i;
1675

1676 1677
	primary_if = batadv_seq_print_text_primary_if_get(seq);
	if (!primary_if)
1678
		goto out;
1679

1680 1681
	seq_printf(seq,
		   "Globally announced TT entries received via the mesh %s\n",
1682
		   net_dev->name);
1683 1684
	seq_puts(seq,
		 "       Client         VID  (TTVN)       Originator      (Curr TTVN) (CRC       ) Flags\n");
1685 1686 1687 1688

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

1689
		rcu_read_lock();
1690
		hlist_for_each_entry_rcu(tt_common_entry,
1691
					 head, hash_entry) {
1692 1693 1694
			tt_global = container_of(tt_common_entry,
						 struct batadv_tt_global_entry,
						 common);
1695
			batadv_tt_global_print_entry(bat_priv, tt_global, seq);
1696
		}
1697
		rcu_read_unlock();
1698
	}
1699 1700
out:
	if (primary_if)
1701
		batadv_hardif_put(primary_if);
1702
	return 0;
1703 1704
}

1705
/**
1706
 * _batadv_tt_global_del_orig_entry - remove and free an orig_entry
1707 1708 1709 1710 1711
 * @tt_global_entry: the global entry to remove the orig_entry from
 * @orig_entry: the orig entry to remove and free
 *
 * Remove an orig_entry from its list in the given tt_global_entry and
 * free this orig_entry afterwards.
1712 1713 1714
 *
 * Caller must hold tt_global_entry->list_lock and ensure orig_entry->list is
 * part of a list.
1715 1716
 */
static void
1717 1718
_batadv_tt_global_del_orig_entry(struct batadv_tt_global_entry *tt_global_entry,
				 struct batadv_tt_orig_list_entry *orig_entry)
1719
{
1720 1721
	lockdep_assert_held(&tt_global_entry->list_lock);

1722 1723 1724
	batadv_tt_global_size_dec(orig_entry->orig_node,
				  tt_global_entry->common.vid);
	atomic_dec(&tt_global_entry->orig_list_count);
1725 1726 1727
	/* requires holding tt_global_entry->list_lock and orig_entry->list
	 * being part of a list
	 */
1728
	hlist_del_rcu(&orig_entry->list);
1729
	batadv_tt_orig_list_entry_put(orig_entry);
1730 1731
}

1732
/* deletes the orig list of a tt_global_entry */
1733
static void
1734
batadv_tt_global_del_orig_list(struct batadv_tt_global_entry *tt_global_entry)
1735
{
1736
	struct hlist_head *head;
1737
	struct hlist_node *safe;
1738
	struct batadv_tt_orig_list_entry *orig_entry;
1739

1740 1741
	spin_lock_bh(&tt_global_entry->list_lock);
	head = &tt_global_entry->orig_list;
1742
	hlist_for_each_entry_safe(orig_entry, safe, head, list)
1743
		_batadv_tt_global_del_orig_entry(tt_global_entry, orig_entry);
1744 1745 1746
	spin_unlock_bh(&tt_global_entry->list_lock);
}

1747 1748 1749 1750 1751 1752 1753 1754 1755 1756
/**
 * batadv_tt_global_del_orig_node - remove orig_node from a global tt entry
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_global_entry: the global entry to remove the orig_node from
 * @orig_node: the originator announcing the client
 * @message: message to append to the log on deletion
 *
 * Remove the given orig_node and its according orig_entry from the given
 * global tt entry.
 */
1757
static void
1758 1759 1760 1761
batadv_tt_global_del_orig_node(struct batadv_priv *bat_priv,
			       struct batadv_tt_global_entry *tt_global_entry,
			       struct batadv_orig_node *orig_node,
			       const char *message)
1762 1763
{
	struct hlist_head *head;
1764
	struct hlist_node *safe;
1765
	struct batadv_tt_orig_list_entry *orig_entry;
1766
	unsigned short vid;
1767 1768 1769

	spin_lock_bh(&tt_global_entry->list_lock);
	head = &tt_global_entry->orig_list;
1770
	hlist_for_each_entry_safe(orig_entry, safe, head, list) {
1771
		if (orig_entry->orig_node == orig_node) {
1772
			vid = tt_global_entry->common.vid;
1773
			batadv_dbg(BATADV_DBG_TT, bat_priv,
1774
				   "Deleting %pM from global tt entry %pM (vid: %d): %s\n",
1775
				   orig_node->orig,
1776 1777
				   tt_global_entry->common.addr,
				   BATADV_PRINT_VID(vid), message);
1778 1779
			_batadv_tt_global_del_orig_entry(tt_global_entry,
							 orig_entry);
1780 1781 1782 1783 1784 1785
		}
	}
	spin_unlock_bh(&tt_global_entry->list_lock);
}

/* If the client is to be deleted, we check if it is the last origantor entry
1786 1787
 * within tt_global entry. If yes, we set the BATADV_TT_CLIENT_ROAM flag and the
 * timer, otherwise we simply remove the originator scheduled for deletion.
1788
 */
1789
static void
1790 1791 1792 1793
batadv_tt_global_del_roaming(struct batadv_priv *bat_priv,
			     struct batadv_tt_global_entry *tt_global_entry,
			     struct batadv_orig_node *orig_node,
			     const char *message)
1794 1795 1796
{
	bool last_entry = true;
	struct hlist_head *head;
1797
	struct batadv_tt_orig_list_entry *orig_entry;
1798 1799 1800 1801 1802 1803 1804

	/* no local entry exists, case 1:
	 * Check if this is the last one or if other entries exist.
	 */

	rcu_read_lock();
	head = &tt_global_entry->orig_list;
1805
	hlist_for_each_entry_rcu(orig_entry, head, list) {
1806 1807 1808 1809 1810 1811 1812 1813 1814
		if (orig_entry->orig_node != orig_node) {
			last_entry = false;
			break;
		}
	}
	rcu_read_unlock();

	if (last_entry) {
		/* its the last one, mark for roaming. */
1815
		tt_global_entry->common.flags |= BATADV_TT_CLIENT_ROAM;
1816 1817 1818 1819 1820
		tt_global_entry->roam_at = jiffies;
	} else
		/* there is another entry, we can simply delete this
		 * one and can still use the other one.
		 */
1821 1822
		batadv_tt_global_del_orig_node(bat_priv, tt_global_entry,
					       orig_node, message);
1823 1824
}

1825 1826 1827 1828 1829 1830 1831 1832 1833 1834
/**
 * batadv_tt_global_del - remove a client from the global table
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: an originator serving this client
 * @addr: the mac address of the client
 * @vid: VLAN identifier
 * @message: a message explaining the reason for deleting the client to print
 *  for debugging purpose
 * @roaming: true if the deletion has been triggered by a roaming event
 */
1835 1836
static void batadv_tt_global_del(struct batadv_priv *bat_priv,
				 struct batadv_orig_node *orig_node,
1837
				 const unsigned char *addr, unsigned short vid,
1838
				 const char *message, bool roaming)
1839
{
1840
	struct batadv_tt_global_entry *tt_global_entry;
1841
	struct batadv_tt_local_entry *local_entry = NULL;
1842

1843
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
1844
	if (!tt_global_entry)
1845
		goto out;
1846

1847
	if (!roaming) {
1848 1849
		batadv_tt_global_del_orig_node(bat_priv, tt_global_entry,
					       orig_node, message);
1850 1851

		if (hlist_empty(&tt_global_entry->orig_list))
1852 1853
			batadv_tt_global_free(bat_priv, tt_global_entry,
					      message);
1854 1855 1856

		goto out;
	}
1857 1858 1859

	/* if we are deleting a global entry due to a roam
	 * event, there are two possibilities:
1860 1861
	 * 1) the client roamed from node A to node B => if there
	 *    is only one originator left for this client, we mark
1862
	 *    it with BATADV_TT_CLIENT_ROAM, we start a timer and we
1863 1864
	 *    wait for node B to claim it. In case of timeout
	 *    the entry is purged.
1865 1866 1867
	 *
	 *    If there are other originators left, we directly delete
	 *    the originator.
1868
	 * 2) the client roamed to us => we can directly delete
1869 1870
	 *    the global entry, since it is useless now.
	 */
1871
	local_entry = batadv_tt_local_hash_find(bat_priv,
1872 1873
						tt_global_entry->common.addr,
						vid);
1874
	if (local_entry) {
1875
		/* local entry exists, case 2: client roamed to us. */
1876
		batadv_tt_global_del_orig_list(tt_global_entry);
1877
		batadv_tt_global_free(bat_priv, tt_global_entry, message);
1878 1879
	} else
		/* no local entry exists, case 1: check for roaming */
1880 1881
		batadv_tt_global_del_roaming(bat_priv, tt_global_entry,
					     orig_node, message);
1882

1883
out:
1884
	if (tt_global_entry)
1885
		batadv_tt_global_entry_put(tt_global_entry);
1886
	if (local_entry)
1887
		batadv_tt_local_entry_put(local_entry);
1888 1889
}

1890 1891 1892 1893 1894 1895 1896 1897 1898
/**
 * batadv_tt_global_del_orig - remove all the TT global entries belonging to the
 *  given originator matching the provided vid
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: the originator owning the entries to remove
 * @match_vid: the VLAN identifier to match. If negative all the entries will be
 *  removed
 * @message: debug message to print as "reason"
 */
1899 1900
void batadv_tt_global_del_orig(struct batadv_priv *bat_priv,
			       struct batadv_orig_node *orig_node,
1901
			       s32 match_vid,
1902
			       const char *message)
1903
{
1904 1905
	struct batadv_tt_global_entry *tt_global;
	struct batadv_tt_common_entry *tt_common_entry;
1906
	u32 i;
1907
	struct batadv_hashtable *hash = bat_priv->tt.global_hash;
1908
	struct hlist_node *safe;
1909
	struct hlist_head *head;
1910
	spinlock_t *list_lock; /* protects write access to the hash lists */
1911
	unsigned short vid;
1912

1913 1914 1915
	if (!hash)
		return;

1916 1917
	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
1918
		list_lock = &hash->list_locks[i];
1919

1920
		spin_lock_bh(list_lock);
1921
		hlist_for_each_entry_safe(tt_common_entry, safe,
1922
					  head, hash_entry) {
1923 1924 1925 1926
			/* remove only matching entries */
			if (match_vid >= 0 && tt_common_entry->vid != match_vid)
				continue;

1927 1928 1929
			tt_global = container_of(tt_common_entry,
						 struct batadv_tt_global_entry,
						 common);
1930

1931 1932
			batadv_tt_global_del_orig_node(bat_priv, tt_global,
						       orig_node, message);
1933

1934
			if (hlist_empty(&tt_global->orig_list)) {
1935
				vid = tt_global->common.vid;
1936
				batadv_dbg(BATADV_DBG_TT, bat_priv,
1937 1938 1939
					   "Deleting global tt entry %pM (vid: %d): %s\n",
					   tt_global->common.addr,
					   BATADV_PRINT_VID(vid), message);
1940
				hlist_del_rcu(&tt_common_entry->hash_entry);
1941
				batadv_tt_global_entry_put(tt_global);
1942
			}
1943
		}
1944
		spin_unlock_bh(list_lock);
1945
	}
1946
	clear_bit(BATADV_ORIG_CAPA_HAS_TT, &orig_node->capa_initialized);
1947 1948
}

1949 1950
static bool batadv_tt_global_to_purge(struct batadv_tt_global_entry *tt_global,
				      char **msg)
1951
{
1952 1953 1954
	bool purge = false;
	unsigned long roam_timeout = BATADV_TT_CLIENT_ROAM_TIMEOUT;
	unsigned long temp_timeout = BATADV_TT_CLIENT_TEMP_TIMEOUT;
1955

1956 1957 1958 1959 1960
	if ((tt_global->common.flags & BATADV_TT_CLIENT_ROAM) &&
	    batadv_has_timed_out(tt_global->roam_at, roam_timeout)) {
		purge = true;
		*msg = "Roaming timeout\n";
	}
1961

1962 1963 1964 1965
	if ((tt_global->common.flags & BATADV_TT_CLIENT_TEMP) &&
	    batadv_has_timed_out(tt_global->common.added_at, temp_timeout)) {
		purge = true;
		*msg = "Temporary client timeout\n";
1966
	}
1967 1968

	return purge;
1969 1970
}

1971
static void batadv_tt_global_purge(struct batadv_priv *bat_priv)
1972
{
1973
	struct batadv_hashtable *hash = bat_priv->tt.global_hash;
1974
	struct hlist_head *head;
1975
	struct hlist_node *node_tmp;
1976
	spinlock_t *list_lock; /* protects write access to the hash lists */
1977
	u32 i;
1978 1979 1980
	char *msg = NULL;
	struct batadv_tt_common_entry *tt_common;
	struct batadv_tt_global_entry *tt_global;
1981 1982 1983

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
1984
		list_lock = &hash->list_locks[i];
1985

1986
		spin_lock_bh(list_lock);
1987
		hlist_for_each_entry_safe(tt_common, node_tmp, head,
1988 1989 1990 1991 1992 1993 1994 1995 1996
					  hash_entry) {
			tt_global = container_of(tt_common,
						 struct batadv_tt_global_entry,
						 common);

			if (!batadv_tt_global_to_purge(tt_global, &msg))
				continue;

			batadv_dbg(BATADV_DBG_TT, bat_priv,
1997 1998 1999 2000
				   "Deleting global tt entry %pM (vid: %d): %s\n",
				   tt_global->common.addr,
				   BATADV_PRINT_VID(tt_global->common.vid),
				   msg);
2001

2002
			hlist_del_rcu(&tt_common->hash_entry);
2003

2004
			batadv_tt_global_entry_put(tt_global);
2005
		}
2006
		spin_unlock_bh(list_lock);
2007 2008 2009
	}
}

2010
static void batadv_tt_global_table_free(struct batadv_priv *bat_priv)
2011
{
2012
	struct batadv_hashtable *hash;
2013
	spinlock_t *list_lock; /* protects write access to the hash lists */
2014 2015
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_global_entry *tt_global;
2016
	struct hlist_node *node_tmp;
2017
	struct hlist_head *head;
2018
	u32 i;
2019

2020
	if (!bat_priv->tt.global_hash)
2021 2022
		return;

2023
	hash = bat_priv->tt.global_hash;
2024 2025 2026 2027 2028 2029

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
		list_lock = &hash->list_locks[i];

		spin_lock_bh(list_lock);
2030
		hlist_for_each_entry_safe(tt_common_entry, node_tmp,
2031
					  head, hash_entry) {
2032
			hlist_del_rcu(&tt_common_entry->hash_entry);
2033 2034 2035
			tt_global = container_of(tt_common_entry,
						 struct batadv_tt_global_entry,
						 common);
2036
			batadv_tt_global_entry_put(tt_global);
2037 2038 2039 2040
		}
		spin_unlock_bh(list_lock);
	}

2041
	batadv_hash_destroy(hash);
2042

2043
	bat_priv->tt.global_hash = NULL;
2044 2045
}

2046 2047 2048
static bool
_batadv_is_ap_isolated(struct batadv_tt_local_entry *tt_local_entry,
		       struct batadv_tt_global_entry *tt_global_entry)
2049 2050 2051
{
	bool ret = false;

2052 2053
	if (tt_local_entry->common.flags & BATADV_TT_CLIENT_WIFI &&
	    tt_global_entry->common.flags & BATADV_TT_CLIENT_WIFI)
2054 2055
		ret = true;

2056 2057 2058 2059 2060
	/* check if the two clients are marked as isolated */
	if (tt_local_entry->common.flags & BATADV_TT_CLIENT_ISOLA &&
	    tt_global_entry->common.flags & BATADV_TT_CLIENT_ISOLA)
		ret = true;

2061 2062 2063
	return ret;
}

2064 2065 2066 2067 2068 2069 2070
/**
 * batadv_transtable_search - get the mesh destination for a given client
 * @bat_priv: the bat priv with all the soft interface information
 * @src: mac address of the source client
 * @addr: mac address of the destination client
 * @vid: VLAN identifier
 *
2071
 * Return: a pointer to the originator that was selected as destination in the
2072 2073 2074 2075 2076 2077
 * mesh for contacting the client 'addr', NULL otherwise.
 * In case of multiple originators serving the same client, the function returns
 * the best one (best in terms of metric towards the destination node).
 *
 * If the two clients are AP isolated the function returns NULL.
 */
2078
struct batadv_orig_node *batadv_transtable_search(struct batadv_priv *bat_priv,
2079 2080
						  const u8 *src,
						  const u8 *addr,
2081
						  unsigned short vid)
2082
{
2083 2084 2085
	struct batadv_tt_local_entry *tt_local_entry = NULL;
	struct batadv_tt_global_entry *tt_global_entry = NULL;
	struct batadv_orig_node *orig_node = NULL;
2086
	struct batadv_tt_orig_list_entry *best_entry;
2087

2088
	if (src && batadv_vlan_ap_isola_get(bat_priv, vid)) {
2089
		tt_local_entry = batadv_tt_local_hash_find(bat_priv, src, vid);
2090 2091
		if (!tt_local_entry ||
		    (tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING))
2092 2093
			goto out;
	}
2094

2095
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
2096
	if (!tt_global_entry)
2097
		goto out;
2098

2099
	/* check whether the clients should not communicate due to AP
2100 2101
	 * isolation
	 */
2102 2103
	if (tt_local_entry &&
	    _batadv_is_ap_isolated(tt_local_entry, tt_global_entry))
2104 2105
		goto out;

2106
	rcu_read_lock();
2107
	best_entry = batadv_transtable_best_orig(bat_priv, tt_global_entry);
2108
	/* found anything? */
2109 2110
	if (best_entry)
		orig_node = best_entry->orig_node;
2111
	if (orig_node && !kref_get_unless_zero(&orig_node->refcount))
2112 2113
		orig_node = NULL;
	rcu_read_unlock();
2114

2115
out:
2116
	if (tt_global_entry)
2117
		batadv_tt_global_entry_put(tt_global_entry);
2118
	if (tt_local_entry)
2119
		batadv_tt_local_entry_put(tt_local_entry);
2120

2121
	return orig_node;
2122
}
2123

2124 2125 2126 2127
/**
 * batadv_tt_global_crc - calculates the checksum of the local table belonging
 *  to the given orig_node
 * @bat_priv: the bat priv with all the soft interface information
2128
 * @orig_node: originator for which the CRC should be computed
2129
 * @vid: VLAN identifier for which the CRC32 has to be computed
2130 2131 2132 2133 2134 2135 2136 2137 2138 2139 2140 2141 2142 2143 2144 2145
 *
 * This function computes the checksum for the global table corresponding to a
 * specific originator. In particular, the checksum is computed as follows: For
 * each client connected to the originator the CRC32C of the MAC address and the
 * VID is computed and then all the CRC32Cs of the various clients are xor'ed
 * together.
 *
 * The idea behind is that CRC32C should be used as much as possible in order to
 * produce a unique hash of the table, but since the order which is used to feed
 * the CRC32C function affects the result and since every node in the network
 * probably sorts the clients differently, the hash function cannot be directly
 * computed over the entire table. Hence the CRC32C is used only on
 * the single client entry, while all the results are then xor'ed together
 * because the XOR operation can combine them all while trying to reduce the
 * noise as much as possible.
 *
2146
 * Return: the checksum of the global table of a given originator.
2147
 */
2148 2149 2150
static u32 batadv_tt_global_crc(struct batadv_priv *bat_priv,
				struct batadv_orig_node *orig_node,
				unsigned short vid)
2151
{
2152
	struct batadv_hashtable *hash = bat_priv->tt.global_hash;
2153 2154
	struct batadv_tt_common_entry *tt_common;
	struct batadv_tt_global_entry *tt_global;
2155
	struct hlist_head *head;
2156 2157
	u32 i, crc_tmp, crc = 0;
	u8 flags;
2158
	__be16 tmp_vid;
2159 2160 2161 2162 2163

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

		rcu_read_lock();
2164
		hlist_for_each_entry_rcu(tt_common, head, hash_entry) {
2165 2166 2167
			tt_global = container_of(tt_common,
						 struct batadv_tt_global_entry,
						 common);
2168 2169 2170 2171 2172 2173
			/* compute the CRC only for entries belonging to the
			 * VLAN identified by the vid passed as parameter
			 */
			if (tt_common->vid != vid)
				continue;

2174 2175 2176 2177 2178
			/* Roaming clients are in the global table for
			 * consistency only. They don't have to be
			 * taken into account while computing the
			 * global crc
			 */
2179
			if (tt_common->flags & BATADV_TT_CLIENT_ROAM)
2180
				continue;
2181 2182 2183 2184 2185 2186
			/* Temporary clients have not been announced yet, so
			 * they have to be skipped while computing the global
			 * crc
			 */
			if (tt_common->flags & BATADV_TT_CLIENT_TEMP)
				continue;
2187 2188 2189 2190

			/* find out if this global entry is announced by this
			 * originator
			 */
2191
			if (!batadv_tt_global_entry_has_orig(tt_global,
2192
							     orig_node))
2193 2194
				continue;

2195 2196 2197 2198 2199
			/* use network order to read the VID: this ensures that
			 * every node reads the bytes in the same order.
			 */
			tmp_vid = htons(tt_common->vid);
			crc_tmp = crc32c(0, &tmp_vid, sizeof(tmp_vid));
2200 2201 2202 2203 2204 2205 2206

			/* compute the CRC on flags that have to be kept in sync
			 * among nodes
			 */
			flags = tt_common->flags & BATADV_TT_SYNC_MASK;
			crc_tmp = crc32c(crc_tmp, &flags, sizeof(flags));

2207
			crc ^= crc32c(crc_tmp, tt_common->addr, ETH_ALEN);
2208 2209 2210 2211
		}
		rcu_read_unlock();
	}

2212
	return crc;
2213 2214
}

2215 2216 2217
/**
 * batadv_tt_local_crc - calculates the checksum of the local table
 * @bat_priv: the bat priv with all the soft interface information
2218
 * @vid: VLAN identifier for which the CRC32 has to be computed
2219 2220 2221 2222
 *
 * For details about the computation, please refer to the documentation for
 * batadv_tt_global_crc().
 *
2223
 * Return: the checksum of the local table
2224
 */
2225 2226
static u32 batadv_tt_local_crc(struct batadv_priv *bat_priv,
			       unsigned short vid)
2227
{
2228
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
2229
	struct batadv_tt_common_entry *tt_common;
2230
	struct hlist_head *head;
2231 2232
	u32 i, crc_tmp, crc = 0;
	u8 flags;
2233
	__be16 tmp_vid;
2234 2235 2236 2237 2238

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

		rcu_read_lock();
2239
		hlist_for_each_entry_rcu(tt_common, head, hash_entry) {
2240 2241 2242 2243 2244 2245
			/* compute the CRC only for entries belonging to the
			 * VLAN identified by vid
			 */
			if (tt_common->vid != vid)
				continue;

2246
			/* not yet committed clients have not to be taken into
2247 2248
			 * account while computing the CRC
			 */
2249
			if (tt_common->flags & BATADV_TT_CLIENT_NEW)
2250
				continue;
2251

2252 2253 2254 2255 2256
			/* use network order to read the VID: this ensures that
			 * every node reads the bytes in the same order.
			 */
			tmp_vid = htons(tt_common->vid);
			crc_tmp = crc32c(0, &tmp_vid, sizeof(tmp_vid));
2257 2258 2259 2260 2261 2262 2263

			/* compute the CRC on flags that have to be kept in sync
			 * among nodes
			 */
			flags = tt_common->flags & BATADV_TT_SYNC_MASK;
			crc_tmp = crc32c(crc_tmp, &flags, sizeof(flags));

2264
			crc ^= crc32c(crc_tmp, tt_common->addr, ETH_ALEN);
2265 2266 2267 2268
		}
		rcu_read_unlock();
	}

2269
	return crc;
2270 2271
}

2272
static void batadv_tt_req_list_free(struct batadv_priv *bat_priv)
2273
{
2274 2275
	struct batadv_tt_req_node *node;
	struct hlist_node *safe;
2276

2277
	spin_lock_bh(&bat_priv->tt.req_list_lock);
2278

2279 2280
	hlist_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
		hlist_del_init(&node->list);
2281 2282 2283
		kfree(node);
	}

2284
	spin_unlock_bh(&bat_priv->tt.req_list_lock);
2285 2286
}

2287 2288
static void batadv_tt_save_orig_buffer(struct batadv_priv *bat_priv,
				       struct batadv_orig_node *orig_node,
2289
				       const void *tt_buff,
2290
				       u16 tt_buff_len)
2291 2292
{
	/* Replace the old buffer only if I received something in the
2293 2294
	 * last OGM (the OGM could carry no changes)
	 */
2295 2296 2297 2298 2299 2300 2301 2302 2303 2304 2305 2306 2307
	spin_lock_bh(&orig_node->tt_buff_lock);
	if (tt_buff_len > 0) {
		kfree(orig_node->tt_buff);
		orig_node->tt_buff_len = 0;
		orig_node->tt_buff = kmalloc(tt_buff_len, GFP_ATOMIC);
		if (orig_node->tt_buff) {
			memcpy(orig_node->tt_buff, tt_buff, tt_buff_len);
			orig_node->tt_buff_len = tt_buff_len;
		}
	}
	spin_unlock_bh(&orig_node->tt_buff_lock);
}

2308
static void batadv_tt_req_purge(struct batadv_priv *bat_priv)
2309
{
2310 2311
	struct batadv_tt_req_node *node;
	struct hlist_node *safe;
2312

2313
	spin_lock_bh(&bat_priv->tt.req_list_lock);
2314
	hlist_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
2315 2316
		if (batadv_has_timed_out(node->issued_at,
					 BATADV_TT_REQUEST_TIMEOUT)) {
2317
			hlist_del_init(&node->list);
2318 2319 2320
			kfree(node);
		}
	}
2321
	spin_unlock_bh(&bat_priv->tt.req_list_lock);
2322 2323
}

2324 2325 2326 2327 2328
/**
 * batadv_tt_req_node_new - search and possibly create a tt_req_node object
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: orig node this request is being issued for
 *
2329
 * Return: the pointer to the new tt_req_node struct if no request
2330
 * has already been issued for this orig_node, NULL otherwise.
2331
 */
2332
static struct batadv_tt_req_node *
2333
batadv_tt_req_node_new(struct batadv_priv *bat_priv,
2334
		       struct batadv_orig_node *orig_node)
2335
{
2336
	struct batadv_tt_req_node *tt_req_node_tmp, *tt_req_node = NULL;
2337

2338
	spin_lock_bh(&bat_priv->tt.req_list_lock);
2339
	hlist_for_each_entry(tt_req_node_tmp, &bat_priv->tt.req_list, list) {
2340 2341
		if (batadv_compare_eth(tt_req_node_tmp, orig_node) &&
		    !batadv_has_timed_out(tt_req_node_tmp->issued_at,
2342
					  BATADV_TT_REQUEST_TIMEOUT))
2343 2344 2345 2346 2347 2348 2349
			goto unlock;
	}

	tt_req_node = kmalloc(sizeof(*tt_req_node), GFP_ATOMIC);
	if (!tt_req_node)
		goto unlock;

2350
	ether_addr_copy(tt_req_node->addr, orig_node->orig);
2351 2352
	tt_req_node->issued_at = jiffies;

2353
	hlist_add_head(&tt_req_node->list, &bat_priv->tt.req_list);
2354
unlock:
2355
	spin_unlock_bh(&bat_priv->tt.req_list_lock);
2356 2357 2358
	return tt_req_node;
}

2359 2360 2361 2362 2363
/**
 * batadv_tt_local_valid - verify that given tt entry is a valid one
 * @entry_ptr: to be checked local tt entry
 * @data_ptr: not used but definition required to satisfy the callback prototype
 *
2364
 * Return: true if the entry is a valid, false otherwise.
2365
 */
2366
static bool batadv_tt_local_valid(const void *entry_ptr, const void *data_ptr)
2367
{
2368
	const struct batadv_tt_common_entry *tt_common_entry = entry_ptr;
2369

2370
	if (tt_common_entry->flags & BATADV_TT_CLIENT_NEW)
2371 2372
		return false;
	return true;
2373 2374
}

2375 2376
static bool batadv_tt_global_valid(const void *entry_ptr,
				   const void *data_ptr)
2377
{
2378 2379 2380
	const struct batadv_tt_common_entry *tt_common_entry = entry_ptr;
	const struct batadv_tt_global_entry *tt_global_entry;
	const struct batadv_orig_node *orig_node = data_ptr;
2381

2382 2383
	if (tt_common_entry->flags & BATADV_TT_CLIENT_ROAM ||
	    tt_common_entry->flags & BATADV_TT_CLIENT_TEMP)
2384
		return false;
2385

2386 2387
	tt_global_entry = container_of(tt_common_entry,
				       struct batadv_tt_global_entry,
2388 2389
				       common);

2390
	return batadv_tt_global_entry_has_orig(tt_global_entry, orig_node);
2391 2392
}

2393
/**
2394 2395
 * batadv_tt_tvlv_generate - fill the tvlv buff with the tt entries from the
 *  specified tt hash
2396 2397 2398
 * @bat_priv: the bat priv with all the soft interface information
 * @hash: hash table containing the tt entries
 * @tt_len: expected tvlv tt data buffer length in number of bytes
2399
 * @tvlv_buff: pointer to the buffer to fill with the TT data
2400 2401 2402
 * @valid_cb: function to filter tt change entries
 * @cb_data: data passed to the filter function as argument
 */
2403 2404
static void batadv_tt_tvlv_generate(struct batadv_priv *bat_priv,
				    struct batadv_hashtable *hash,
2405
				    void *tvlv_buff, u16 tt_len,
2406 2407
				    bool (*valid_cb)(const void *,
						     const void *),
2408
				    void *cb_data)
2409
{
2410
	struct batadv_tt_common_entry *tt_common_entry;
2411
	struct batadv_tvlv_tt_change *tt_change;
2412
	struct hlist_head *head;
2413 2414
	u16 tt_tot, tt_num_entries = 0;
	u32 i;
2415

2416
	tt_tot = batadv_tt_entries(tt_len);
2417
	tt_change = (struct batadv_tvlv_tt_change *)tvlv_buff;
2418 2419 2420 2421 2422

	rcu_read_lock();
	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

2423
		hlist_for_each_entry_rcu(tt_common_entry,
2424
					 head, hash_entry) {
2425
			if (tt_tot == tt_num_entries)
2426 2427
				break;

2428
			if ((valid_cb) && (!valid_cb(tt_common_entry, cb_data)))
2429 2430
				continue;

2431
			ether_addr_copy(tt_change->addr, tt_common_entry->addr);
2432
			tt_change->flags = tt_common_entry->flags;
2433
			tt_change->vid = htons(tt_common_entry->vid);
2434 2435
			memset(tt_change->reserved, 0,
			       sizeof(tt_change->reserved));
2436

2437
			tt_num_entries++;
2438 2439 2440 2441
			tt_change++;
		}
	}
	rcu_read_unlock();
2442
}
2443

2444 2445 2446 2447 2448 2449
/**
 * batadv_tt_global_check_crc - check if all the CRCs are correct
 * @orig_node: originator for which the CRCs have to be checked
 * @tt_vlan: pointer to the first tvlv VLAN entry
 * @num_vlan: number of tvlv VLAN entries
 *
2450
 * Return: true if all the received CRCs match the locally stored ones, false
2451 2452 2453 2454
 * otherwise
 */
static bool batadv_tt_global_check_crc(struct batadv_orig_node *orig_node,
				       struct batadv_tvlv_tt_vlan_data *tt_vlan,
2455
				       u16 num_vlan)
2456 2457 2458
{
	struct batadv_tvlv_tt_vlan_data *tt_vlan_tmp;
	struct batadv_orig_node_vlan *vlan;
2459
	int i, orig_num_vlan;
2460
	u32 crc;
2461 2462 2463 2464 2465 2466 2467 2468 2469

	/* check if each received CRC matches the locally stored one */
	for (i = 0; i < num_vlan; i++) {
		tt_vlan_tmp = tt_vlan + i;

		/* if orig_node is a backbone node for this VLAN, don't check
		 * the CRC as we ignore all the global entries over it
		 */
		if (batadv_bla_is_backbone_gw_orig(orig_node->bat_priv,
2470 2471
						   orig_node->orig,
						   ntohs(tt_vlan_tmp->vid)))
2472 2473 2474 2475 2476 2477 2478
			continue;

		vlan = batadv_orig_node_vlan_get(orig_node,
						 ntohs(tt_vlan_tmp->vid));
		if (!vlan)
			return false;

2479
		crc = vlan->tt.crc;
2480
		batadv_orig_node_vlan_put(vlan);
2481 2482

		if (crc != ntohl(tt_vlan_tmp->crc))
2483 2484 2485
			return false;
	}

2486 2487 2488 2489 2490 2491 2492 2493 2494 2495 2496 2497
	/* check if any excess VLANs exist locally for the originator
	 * which are not mentioned in the TVLV from the originator.
	 */
	rcu_read_lock();
	orig_num_vlan = 0;
	hlist_for_each_entry_rcu(vlan, &orig_node->vlan_list, list)
		orig_num_vlan++;
	rcu_read_unlock();

	if (orig_num_vlan > num_vlan)
		return false;

2498 2499 2500 2501 2502 2503 2504 2505 2506 2507 2508 2509 2510 2511 2512 2513 2514 2515 2516 2517 2518 2519 2520 2521 2522 2523 2524 2525
	return true;
}

/**
 * batadv_tt_local_update_crc - update all the local CRCs
 * @bat_priv: the bat priv with all the soft interface information
 */
static void batadv_tt_local_update_crc(struct batadv_priv *bat_priv)
{
	struct batadv_softif_vlan *vlan;

	/* recompute the global CRC for each VLAN */
	rcu_read_lock();
	hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
		vlan->tt.crc = batadv_tt_local_crc(bat_priv, vlan->vid);
	}
	rcu_read_unlock();
}

/**
 * batadv_tt_global_update_crc - update all the global CRCs for this orig_node
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: the orig_node for which the CRCs have to be updated
 */
static void batadv_tt_global_update_crc(struct batadv_priv *bat_priv,
					struct batadv_orig_node *orig_node)
{
	struct batadv_orig_node_vlan *vlan;
2526
	u32 crc;
2527 2528 2529

	/* recompute the global CRC for each VLAN */
	rcu_read_lock();
2530
	hlist_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) {
2531 2532 2533
		/* if orig_node is a backbone node for this VLAN, don't compute
		 * the CRC as we ignore all the global entries over it
		 */
2534 2535
		if (batadv_bla_is_backbone_gw_orig(bat_priv, orig_node->orig,
						   vlan->vid))
2536 2537 2538 2539 2540 2541
			continue;

		crc = batadv_tt_global_crc(bat_priv, orig_node, vlan->vid);
		vlan->tt.crc = crc;
	}
	rcu_read_unlock();
2542 2543
}

2544 2545 2546 2547 2548
/**
 * batadv_send_tt_request - send a TT Request message to a given node
 * @bat_priv: the bat priv with all the soft interface information
 * @dst_orig_node: the destination of the message
 * @ttvn: the version number that the source of the message is looking for
2549 2550
 * @tt_vlan: pointer to the first tvlv VLAN object to request
 * @num_vlan: number of tvlv VLAN entries
2551 2552
 * @full_table: ask for the entire translation table if true, while only for the
 *  last TT diff otherwise
2553 2554
 *
 * Return: true if the TT Request was sent, false otherwise
2555
 */
2556 2557 2558 2559 2560
static bool batadv_send_tt_request(struct batadv_priv *bat_priv,
				   struct batadv_orig_node *dst_orig_node,
				   u8 ttvn,
				   struct batadv_tvlv_tt_vlan_data *tt_vlan,
				   u16 num_vlan, bool full_table)
2561
{
2562
	struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
2563
	struct batadv_tt_req_node *tt_req_node = NULL;
2564 2565
	struct batadv_tvlv_tt_vlan_data *tt_vlan_req;
	struct batadv_hard_iface *primary_if;
2566
	bool ret = false;
2567
	int i, size;
2568

2569
	primary_if = batadv_primary_if_get_selected(bat_priv);
2570 2571 2572 2573
	if (!primary_if)
		goto out;

	/* The new tt_req will be issued only if I'm not waiting for a
2574 2575
	 * reply from the same orig_node yet
	 */
2576
	tt_req_node = batadv_tt_req_node_new(bat_priv, dst_orig_node);
2577 2578 2579
	if (!tt_req_node)
		goto out;

2580 2581
	size = sizeof(*tvlv_tt_data) + sizeof(*tt_vlan_req) * num_vlan;
	tvlv_tt_data = kzalloc(size, GFP_ATOMIC);
2582
	if (!tvlv_tt_data)
2583 2584
		goto out;

2585 2586
	tvlv_tt_data->flags = BATADV_TT_REQUEST;
	tvlv_tt_data->ttvn = ttvn;
2587 2588 2589 2590 2591 2592 2593 2594 2595 2596 2597 2598 2599
	tvlv_tt_data->num_vlan = htons(num_vlan);

	/* send all the CRCs within the request. This is needed by intermediate
	 * nodes to ensure they have the correct table before replying
	 */
	tt_vlan_req = (struct batadv_tvlv_tt_vlan_data *)(tvlv_tt_data + 1);
	for (i = 0; i < num_vlan; i++) {
		tt_vlan_req->vid = tt_vlan->vid;
		tt_vlan_req->crc = tt_vlan->crc;

		tt_vlan_req++;
		tt_vlan++;
	}
2600 2601

	if (full_table)
2602
		tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
2603

2604
	batadv_dbg(BATADV_DBG_TT, bat_priv, "Sending TT_REQUEST to %pM [%c]\n",
2605
		   dst_orig_node->orig, full_table ? 'F' : '.');
2606

2607
	batadv_inc_counter(bat_priv, BATADV_CNT_TT_REQUEST_TX);
2608 2609
	batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
				 dst_orig_node->orig, BATADV_TVLV_TT, 1,
2610
				 tvlv_tt_data, size);
2611
	ret = true;
2612 2613 2614

out:
	if (primary_if)
2615
		batadv_hardif_put(primary_if);
2616
	if (ret && tt_req_node) {
2617
		spin_lock_bh(&bat_priv->tt.req_list_lock);
2618 2619
		/* hlist_del_init() verifies tt_req_node still is in the list */
		hlist_del_init(&tt_req_node->list);
2620
		spin_unlock_bh(&bat_priv->tt.req_list_lock);
2621 2622
		kfree(tt_req_node);
	}
2623
	kfree(tvlv_tt_data);
2624 2625 2626
	return ret;
}

2627 2628 2629 2630 2631 2632 2633 2634
/**
 * batadv_send_other_tt_response - send reply to tt request concerning another
 *  node's translation table
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: tt data containing the tt request information
 * @req_src: mac address of tt request sender
 * @req_dst: mac address of tt request recipient
 *
2635
 * Return: true if tt request reply was sent, false otherwise.
2636 2637 2638
 */
static bool batadv_send_other_tt_response(struct batadv_priv *bat_priv,
					  struct batadv_tvlv_tt_data *tt_data,
2639
					  u8 *req_src, u8 *req_dst)
2640
{
2641
	struct batadv_orig_node *req_dst_orig_node;
2642
	struct batadv_orig_node *res_dst_orig_node = NULL;
2643
	struct batadv_tvlv_tt_change *tt_change;
2644
	struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
2645
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
2646
	bool ret = false, full_table;
2647 2648 2649
	u8 orig_ttvn, req_ttvn;
	u16 tvlv_len;
	s32 tt_len;
2650

2651
	batadv_dbg(BATADV_DBG_TT, bat_priv,
2652
		   "Received TT_REQUEST from %pM for ttvn: %u (%pM) [%c]\n",
2653
		   req_src, tt_data->ttvn, req_dst,
2654
		   ((tt_data->flags & BATADV_TT_FULL_TABLE) ? 'F' : '.'));
2655 2656

	/* Let's get the orig node of the REAL destination */
2657
	req_dst_orig_node = batadv_orig_hash_find(bat_priv, req_dst);
2658 2659 2660
	if (!req_dst_orig_node)
		goto out;

2661
	res_dst_orig_node = batadv_orig_hash_find(bat_priv, req_src);
2662 2663 2664
	if (!res_dst_orig_node)
		goto out;

2665
	orig_ttvn = (u8)atomic_read(&req_dst_orig_node->last_ttvn);
2666
	req_ttvn = tt_data->ttvn;
2667

2668
	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(tt_data + 1);
2669
	/* this node doesn't have the requested data */
2670
	if (orig_ttvn != req_ttvn ||
2671 2672
	    !batadv_tt_global_check_crc(req_dst_orig_node, tt_vlan,
					ntohs(tt_data->num_vlan)))
2673 2674
		goto out;

2675
	/* If the full table has been explicitly requested */
2676
	if (tt_data->flags & BATADV_TT_FULL_TABLE ||
2677 2678 2679 2680 2681
	    !req_dst_orig_node->tt_buff)
		full_table = true;
	else
		full_table = false;

2682 2683
	/* TT fragmentation hasn't been implemented yet, so send as many
	 * TT entries fit a single packet as possible only
2684
	 */
2685 2686 2687 2688
	if (!full_table) {
		spin_lock_bh(&req_dst_orig_node->tt_buff_lock);
		tt_len = req_dst_orig_node->tt_buff_len;

2689 2690 2691 2692 2693
		tvlv_len = batadv_tt_prepare_tvlv_global_data(req_dst_orig_node,
							      &tvlv_tt_data,
							      &tt_change,
							      &tt_len);
		if (!tt_len)
2694 2695 2696
			goto unlock;

		/* Copy the last orig_node's OGM buffer */
2697
		memcpy(tt_change, req_dst_orig_node->tt_buff,
2698 2699 2700
		       req_dst_orig_node->tt_buff_len);
		spin_unlock_bh(&req_dst_orig_node->tt_buff_lock);
	} else {
2701 2702 2703 2704 2705 2706 2707 2708 2709
		/* allocate the tvlv, put the tt_data and all the tt_vlan_data
		 * in the initial part
		 */
		tt_len = -1;
		tvlv_len = batadv_tt_prepare_tvlv_global_data(req_dst_orig_node,
							      &tvlv_tt_data,
							      &tt_change,
							      &tt_len);
		if (!tt_len)
2710
			goto out;
2711 2712 2713 2714 2715 2716

		/* fill the rest of the tvlv with the real TT entries */
		batadv_tt_tvlv_generate(bat_priv, bat_priv->tt.global_hash,
					tt_change, tt_len,
					batadv_tt_global_valid,
					req_dst_orig_node);
2717 2718
	}

2719 2720 2721 2722 2723 2724 2725 2726 2727
	/* Don't send the response, if larger than fragmented packet. */
	tt_len = sizeof(struct batadv_unicast_tvlv_packet) + tvlv_len;
	if (tt_len > atomic_read(&bat_priv->packet_size_max)) {
		net_ratelimited_function(batadv_info, bat_priv->soft_iface,
					 "Ignoring TT_REQUEST from %pM; Response size exceeds max packet size.\n",
					 res_dst_orig_node->orig);
		goto out;
	}

2728 2729
	tvlv_tt_data->flags = BATADV_TT_RESPONSE;
	tvlv_tt_data->ttvn = req_ttvn;
2730 2731

	if (full_table)
2732
		tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
2733

2734
	batadv_dbg(BATADV_DBG_TT, bat_priv,
2735 2736 2737
		   "Sending TT_RESPONSE %pM for %pM [%c] (ttvn: %u)\n",
		   res_dst_orig_node->orig, req_dst_orig_node->orig,
		   full_table ? 'F' : '.', req_ttvn);
2738

2739
	batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_TX);
2740

2741
	batadv_tvlv_unicast_send(bat_priv, req_dst_orig_node->orig,
2742 2743
				 req_src, BATADV_TVLV_TT, 1, tvlv_tt_data,
				 tvlv_len);
2744

2745
	ret = true;
2746 2747 2748 2749 2750 2751 2752
	goto out;

unlock:
	spin_unlock_bh(&req_dst_orig_node->tt_buff_lock);

out:
	if (res_dst_orig_node)
2753
		batadv_orig_node_put(res_dst_orig_node);
2754
	if (req_dst_orig_node)
2755
		batadv_orig_node_put(req_dst_orig_node);
2756
	kfree(tvlv_tt_data);
2757 2758
	return ret;
}
2759

2760 2761 2762 2763 2764 2765 2766
/**
 * batadv_send_my_tt_response - send reply to tt request concerning this node's
 *  translation table
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: tt data containing the tt request information
 * @req_src: mac address of tt request sender
 *
2767
 * Return: true if tt request reply was sent, false otherwise.
2768 2769 2770
 */
static bool batadv_send_my_tt_response(struct batadv_priv *bat_priv,
				       struct batadv_tvlv_tt_data *tt_data,
2771
				       u8 *req_src)
2772
{
2773
	struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
2774
	struct batadv_hard_iface *primary_if = NULL;
2775 2776
	struct batadv_tvlv_tt_change *tt_change;
	struct batadv_orig_node *orig_node;
2777 2778
	u8 my_ttvn, req_ttvn;
	u16 tvlv_len;
2779
	bool full_table;
2780
	s32 tt_len;
2781

2782
	batadv_dbg(BATADV_DBG_TT, bat_priv,
2783
		   "Received TT_REQUEST from %pM for ttvn: %u (me) [%c]\n",
2784
		   req_src, tt_data->ttvn,
2785
		   ((tt_data->flags & BATADV_TT_FULL_TABLE) ? 'F' : '.'));
2786

2787
	spin_lock_bh(&bat_priv->tt.commit_lock);
2788

2789
	my_ttvn = (u8)atomic_read(&bat_priv->tt.vn);
2790
	req_ttvn = tt_data->ttvn;
2791

2792
	orig_node = batadv_orig_hash_find(bat_priv, req_src);
2793 2794 2795
	if (!orig_node)
		goto out;

2796
	primary_if = batadv_primary_if_get_selected(bat_priv);
2797 2798 2799 2800
	if (!primary_if)
		goto out;

	/* If the full table has been explicitly requested or the gap
2801 2802
	 * is too big send the whole local translation table
	 */
2803
	if (tt_data->flags & BATADV_TT_FULL_TABLE || my_ttvn != req_ttvn ||
2804
	    !bat_priv->tt.last_changeset)
2805 2806 2807 2808
		full_table = true;
	else
		full_table = false;

2809 2810
	/* TT fragmentation hasn't been implemented yet, so send as many
	 * TT entries fit a single packet as possible only
2811
	 */
2812
	if (!full_table) {
2813
		spin_lock_bh(&bat_priv->tt.last_changeset_lock);
2814

2815 2816 2817 2818 2819 2820
		tt_len = bat_priv->tt.last_changeset_len;
		tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv,
							     &tvlv_tt_data,
							     &tt_change,
							     &tt_len);
		if (!tt_len)
2821 2822
			goto unlock;

2823
		/* Copy the last orig_node's OGM buffer */
2824
		memcpy(tt_change, bat_priv->tt.last_changeset,
2825 2826
		       bat_priv->tt.last_changeset_len);
		spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
2827
	} else {
2828
		req_ttvn = (u8)atomic_read(&bat_priv->tt.vn);
2829

2830 2831 2832 2833 2834 2835 2836 2837 2838
		/* allocate the tvlv, put the tt_data and all the tt_vlan_data
		 * in the initial part
		 */
		tt_len = -1;
		tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv,
							     &tvlv_tt_data,
							     &tt_change,
							     &tt_len);
		if (!tt_len)
2839
			goto out;
2840 2841 2842 2843 2844

		/* fill the rest of the tvlv with the real TT entries */
		batadv_tt_tvlv_generate(bat_priv, bat_priv->tt.local_hash,
					tt_change, tt_len,
					batadv_tt_local_valid, NULL);
2845 2846
	}

2847 2848
	tvlv_tt_data->flags = BATADV_TT_RESPONSE;
	tvlv_tt_data->ttvn = req_ttvn;
2849 2850

	if (full_table)
2851
		tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
2852

2853
	batadv_dbg(BATADV_DBG_TT, bat_priv,
2854 2855
		   "Sending TT_RESPONSE to %pM [%c] (ttvn: %u)\n",
		   orig_node->orig, full_table ? 'F' : '.', req_ttvn);
2856

2857
	batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_TX);
2858

2859
	batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
2860 2861
				 req_src, BATADV_TVLV_TT, 1, tvlv_tt_data,
				 tvlv_len);
2862

2863 2864 2865
	goto out;

unlock:
2866
	spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
2867
out:
2868
	spin_unlock_bh(&bat_priv->tt.commit_lock);
2869
	if (orig_node)
2870
		batadv_orig_node_put(orig_node);
2871
	if (primary_if)
2872
		batadv_hardif_put(primary_if);
2873 2874
	kfree(tvlv_tt_data);
	/* The packet was for this host, so it doesn't need to be re-routed */
2875 2876 2877
	return true;
}

2878 2879 2880 2881 2882 2883 2884
/**
 * batadv_send_tt_response - send reply to tt request
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: tt data containing the tt request information
 * @req_src: mac address of tt request sender
 * @req_dst: mac address of tt request recipient
 *
2885
 * Return: true if tt request reply was sent, false otherwise.
2886 2887 2888
 */
static bool batadv_send_tt_response(struct batadv_priv *bat_priv,
				    struct batadv_tvlv_tt_data *tt_data,
2889
				    u8 *req_src, u8 *req_dst)
2890
{
2891
	if (batadv_is_my_mac(bat_priv, req_dst))
2892
		return batadv_send_my_tt_response(bat_priv, tt_data, req_src);
2893 2894
	return batadv_send_other_tt_response(bat_priv, tt_data, req_src,
					     req_dst);
2895 2896
}

2897 2898
static void _batadv_tt_update_changes(struct batadv_priv *bat_priv,
				      struct batadv_orig_node *orig_node,
2899
				      struct batadv_tvlv_tt_change *tt_change,
2900
				      u16 tt_num_changes, u8 ttvn)
2901 2902
{
	int i;
2903
	int roams;
2904 2905

	for (i = 0; i < tt_num_changes; i++) {
2906 2907
		if ((tt_change + i)->flags & BATADV_TT_CLIENT_DEL) {
			roams = (tt_change + i)->flags & BATADV_TT_CLIENT_ROAM;
2908 2909
			batadv_tt_global_del(bat_priv, orig_node,
					     (tt_change + i)->addr,
2910
					     ntohs((tt_change + i)->vid),
2911 2912
					     "tt removed by changes",
					     roams);
2913 2914
		} else {
			if (!batadv_tt_global_add(bat_priv, orig_node,
2915
						  (tt_change + i)->addr,
2916
						  ntohs((tt_change + i)->vid),
2917
						  (tt_change + i)->flags, ttvn))
2918 2919 2920 2921 2922 2923 2924
				/* In case of problem while storing a
				 * global_entry, we stop the updating
				 * procedure without committing the
				 * ttvn change. This will avoid to send
				 * corrupted data on tt_request
				 */
				return;
2925
		}
2926
	}
2927
	set_bit(BATADV_ORIG_CAPA_HAS_TT, &orig_node->capa_initialized);
2928 2929
}

2930
static void batadv_tt_fill_gtable(struct batadv_priv *bat_priv,
2931
				  struct batadv_tvlv_tt_change *tt_change,
2932 2933
				  u8 ttvn, u8 *resp_src,
				  u16 num_entries)
2934
{
2935
	struct batadv_orig_node *orig_node;
2936

2937
	orig_node = batadv_orig_hash_find(bat_priv, resp_src);
2938 2939 2940 2941
	if (!orig_node)
		goto out;

	/* Purge the old table first.. */
2942 2943
	batadv_tt_global_del_orig(bat_priv, orig_node, -1,
				  "Received full table");
2944

2945 2946
	_batadv_tt_update_changes(bat_priv, orig_node, tt_change, num_entries,
				  ttvn);
2947 2948 2949 2950 2951 2952 2953

	spin_lock_bh(&orig_node->tt_buff_lock);
	kfree(orig_node->tt_buff);
	orig_node->tt_buff_len = 0;
	orig_node->tt_buff = NULL;
	spin_unlock_bh(&orig_node->tt_buff_lock);

2954
	atomic_set(&orig_node->last_ttvn, ttvn);
2955 2956 2957

out:
	if (orig_node)
2958
		batadv_orig_node_put(orig_node);
2959 2960
}

2961 2962
static void batadv_tt_update_changes(struct batadv_priv *bat_priv,
				     struct batadv_orig_node *orig_node,
2963
				     u16 tt_num_changes, u8 ttvn,
2964
				     struct batadv_tvlv_tt_change *tt_change)
2965
{
2966 2967
	_batadv_tt_update_changes(bat_priv, orig_node, tt_change,
				  tt_num_changes, ttvn);
2968

2969 2970
	batadv_tt_save_orig_buffer(bat_priv, orig_node, tt_change,
				   batadv_tt_len(tt_num_changes));
2971 2972 2973
	atomic_set(&orig_node->last_ttvn, ttvn);
}

2974 2975 2976
/**
 * batadv_is_my_client - check if a client is served by the local node
 * @bat_priv: the bat priv with all the soft interface information
2977
 * @addr: the mac address of the client to check
2978 2979
 * @vid: VLAN identifier
 *
2980
 * Return: true if the client is served by this node, false otherwise.
2981
 */
2982
bool batadv_is_my_client(struct batadv_priv *bat_priv, const u8 *addr,
2983
			 unsigned short vid)
2984
{
2985
	struct batadv_tt_local_entry *tt_local_entry;
2986
	bool ret = false;
2987

2988
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
2989 2990
	if (!tt_local_entry)
		goto out;
2991
	/* Check if the client has been logically deleted (but is kept for
2992 2993
	 * consistency purpose)
	 */
2994 2995
	if ((tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING) ||
	    (tt_local_entry->common.flags & BATADV_TT_CLIENT_ROAM))
2996
		goto out;
2997 2998
	ret = true;
out:
2999
	if (tt_local_entry)
3000
		batadv_tt_local_entry_put(tt_local_entry);
3001
	return ret;
3002 3003
}

3004 3005 3006 3007 3008 3009 3010 3011 3012
/**
 * batadv_handle_tt_response - process incoming tt reply
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: tt data containing the tt request information
 * @resp_src: mac address of tt reply sender
 * @num_entries: number of tt change entries appended to the tt data
 */
static void batadv_handle_tt_response(struct batadv_priv *bat_priv,
				      struct batadv_tvlv_tt_data *tt_data,
3013
				      u8 *resp_src, u16 num_entries)
3014
{
3015 3016
	struct batadv_tt_req_node *node;
	struct hlist_node *safe;
3017
	struct batadv_orig_node *orig_node = NULL;
3018
	struct batadv_tvlv_tt_change *tt_change;
3019 3020
	u8 *tvlv_ptr = (u8 *)tt_data;
	u16 change_offset;
3021

3022
	batadv_dbg(BATADV_DBG_TT, bat_priv,
3023
		   "Received TT_RESPONSE from %pM for ttvn %d t_size: %d [%c]\n",
3024
		   resp_src, tt_data->ttvn, num_entries,
3025
		   ((tt_data->flags & BATADV_TT_FULL_TABLE) ? 'F' : '.'));
3026

3027
	orig_node = batadv_orig_hash_find(bat_priv, resp_src);
3028 3029 3030
	if (!orig_node)
		goto out;

3031 3032
	spin_lock_bh(&orig_node->tt_lock);

3033 3034 3035 3036 3037 3038
	change_offset = sizeof(struct batadv_tvlv_tt_vlan_data);
	change_offset *= ntohs(tt_data->num_vlan);
	change_offset += sizeof(*tt_data);
	tvlv_ptr += change_offset;

	tt_change = (struct batadv_tvlv_tt_change *)tvlv_ptr;
3039
	if (tt_data->flags & BATADV_TT_FULL_TABLE) {
3040 3041
		batadv_tt_fill_gtable(bat_priv, tt_change, tt_data->ttvn,
				      resp_src, num_entries);
3042
	} else {
3043 3044
		batadv_tt_update_changes(bat_priv, orig_node, num_entries,
					 tt_data->ttvn, tt_change);
3045
	}
3046

3047
	/* Recalculate the CRC for this orig_node and store it */
3048
	batadv_tt_global_update_crc(bat_priv, orig_node);
3049 3050 3051

	spin_unlock_bh(&orig_node->tt_lock);

3052
	/* Delete the tt_req_node from pending tt_requests list */
3053
	spin_lock_bh(&bat_priv->tt.req_list_lock);
3054
	hlist_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
3055
		if (!batadv_compare_eth(node->addr, resp_src))
3056
			continue;
3057
		hlist_del_init(&node->list);
3058 3059
		kfree(node);
	}
3060

3061
	spin_unlock_bh(&bat_priv->tt.req_list_lock);
3062 3063
out:
	if (orig_node)
3064
		batadv_orig_node_put(orig_node);
3065 3066
}

3067
static void batadv_tt_roam_list_free(struct batadv_priv *bat_priv)
3068
{
3069
	struct batadv_tt_roam_node *node, *safe;
3070

3071
	spin_lock_bh(&bat_priv->tt.roam_list_lock);
3072

3073
	list_for_each_entry_safe(node, safe, &bat_priv->tt.roam_list, list) {
3074 3075 3076 3077
		list_del(&node->list);
		kfree(node);
	}

3078
	spin_unlock_bh(&bat_priv->tt.roam_list_lock);
3079 3080
}

3081
static void batadv_tt_roam_purge(struct batadv_priv *bat_priv)
3082
{
3083
	struct batadv_tt_roam_node *node, *safe;
3084

3085 3086
	spin_lock_bh(&bat_priv->tt.roam_list_lock);
	list_for_each_entry_safe(node, safe, &bat_priv->tt.roam_list, list) {
3087 3088
		if (!batadv_has_timed_out(node->first_time,
					  BATADV_ROAMING_MAX_TIME))
3089 3090 3091 3092 3093
			continue;

		list_del(&node->list);
		kfree(node);
	}
3094
	spin_unlock_bh(&bat_priv->tt.roam_list_lock);
3095 3096
}

3097
/**
3098 3099 3100
 * batadv_tt_check_roam_count - check if a client has roamed too frequently
 * @bat_priv: the bat priv with all the soft interface information
 * @client: mac address of the roaming client
3101 3102
 *
 * This function checks whether the client already reached the
3103 3104 3105
 * maximum number of possible roaming phases. In this case the ROAMING_ADV
 * will not be sent.
 *
3106
 * Return: true if the ROAMING_ADV can be sent, false otherwise
3107
 */
3108
static bool batadv_tt_check_roam_count(struct batadv_priv *bat_priv, u8 *client)
3109
{
3110
	struct batadv_tt_roam_node *tt_roam_node;
3111 3112
	bool ret = false;

3113
	spin_lock_bh(&bat_priv->tt.roam_list_lock);
3114
	/* The new tt_req will be issued only if I'm not waiting for a
3115 3116
	 * reply from the same orig_node yet
	 */
3117
	list_for_each_entry(tt_roam_node, &bat_priv->tt.roam_list, list) {
3118
		if (!batadv_compare_eth(tt_roam_node->addr, client))
3119 3120
			continue;

3121
		if (batadv_has_timed_out(tt_roam_node->first_time,
3122
					 BATADV_ROAMING_MAX_TIME))
3123 3124
			continue;

3125
		if (!batadv_atomic_dec_not_zero(&tt_roam_node->counter))
3126 3127 3128 3129 3130 3131 3132 3133 3134 3135 3136 3137
			/* Sorry, you roamed too many times! */
			goto unlock;
		ret = true;
		break;
	}

	if (!ret) {
		tt_roam_node = kmalloc(sizeof(*tt_roam_node), GFP_ATOMIC);
		if (!tt_roam_node)
			goto unlock;

		tt_roam_node->first_time = jiffies;
3138 3139
		atomic_set(&tt_roam_node->counter,
			   BATADV_ROAMING_MAX_COUNT - 1);
3140
		ether_addr_copy(tt_roam_node->addr, client);
3141

3142
		list_add(&tt_roam_node->list, &bat_priv->tt.roam_list);
3143 3144 3145 3146
		ret = true;
	}

unlock:
3147
	spin_unlock_bh(&bat_priv->tt.roam_list_lock);
3148 3149 3150
	return ret;
}

3151 3152 3153 3154 3155 3156 3157 3158 3159 3160 3161 3162
/**
 * batadv_send_roam_adv - send a roaming advertisement message
 * @bat_priv: the bat priv with all the soft interface information
 * @client: mac address of the roaming client
 * @vid: VLAN identifier
 * @orig_node: message destination
 *
 * Send a ROAMING_ADV message to the node which was previously serving this
 * client. This is done to inform the node that from now on all traffic destined
 * for this particular roamed client has to be forwarded to the sender of the
 * roaming message.
 */
3163
static void batadv_send_roam_adv(struct batadv_priv *bat_priv, u8 *client,
3164
				 unsigned short vid,
3165
				 struct batadv_orig_node *orig_node)
3166
{
3167
	struct batadv_hard_iface *primary_if;
3168 3169 3170 3171 3172
	struct batadv_tvlv_roam_adv tvlv_roam;

	primary_if = batadv_primary_if_get_selected(bat_priv);
	if (!primary_if)
		goto out;
3173 3174

	/* before going on we have to check whether the client has
3175 3176
	 * already roamed to us too many times
	 */
3177
	if (!batadv_tt_check_roam_count(bat_priv, client))
3178 3179
		goto out;

3180
	batadv_dbg(BATADV_DBG_TT, bat_priv,
3181 3182
		   "Sending ROAMING_ADV to %pM (client %pM, vid: %d)\n",
		   orig_node->orig, client, BATADV_PRINT_VID(vid));
3183

3184
	batadv_inc_counter(bat_priv, BATADV_CNT_TT_ROAM_ADV_TX);
3185

3186
	memcpy(tvlv_roam.client, client, sizeof(tvlv_roam.client));
3187
	tvlv_roam.vid = htons(vid);
3188 3189 3190 3191

	batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
				 orig_node->orig, BATADV_TVLV_ROAM, 1,
				 &tvlv_roam, sizeof(tvlv_roam));
3192 3193

out:
3194
	if (primary_if)
3195
		batadv_hardif_put(primary_if);
3196 3197
}

3198
static void batadv_tt_purge(struct work_struct *work)
3199
{
3200
	struct delayed_work *delayed_work;
3201
	struct batadv_priv_tt *priv_tt;
3202 3203
	struct batadv_priv *bat_priv;

G
Geliang Tang 已提交
3204
	delayed_work = to_delayed_work(work);
3205 3206
	priv_tt = container_of(delayed_work, struct batadv_priv_tt, work);
	bat_priv = container_of(priv_tt, struct batadv_priv, tt);
3207

3208
	batadv_tt_local_purge(bat_priv, BATADV_TT_LOCAL_TIMEOUT);
3209
	batadv_tt_global_purge(bat_priv);
3210 3211
	batadv_tt_req_purge(bat_priv);
	batadv_tt_roam_purge(bat_priv);
3212

3213 3214
	queue_delayed_work(batadv_event_workqueue, &bat_priv->tt.work,
			   msecs_to_jiffies(BATADV_TT_WORK_PERIOD));
3215
}
3216

3217
void batadv_tt_free(struct batadv_priv *bat_priv)
3218
{
3219 3220 3221
	batadv_tvlv_container_unregister(bat_priv, BATADV_TVLV_TT, 1);
	batadv_tvlv_handler_unregister(bat_priv, BATADV_TVLV_TT, 1);

3222
	cancel_delayed_work_sync(&bat_priv->tt.work);
3223

3224 3225 3226 3227 3228
	batadv_tt_local_table_free(bat_priv);
	batadv_tt_global_table_free(bat_priv);
	batadv_tt_req_list_free(bat_priv);
	batadv_tt_changes_list_free(bat_priv);
	batadv_tt_roam_list_free(bat_priv);
3229

3230
	kfree(bat_priv->tt.last_changeset);
3231
}
3232

3233 3234 3235 3236 3237 3238 3239
/**
 * batadv_tt_local_set_flags - set or unset the specified flags on the local
 *  table and possibly count them in the TT size
 * @bat_priv: the bat priv with all the soft interface information
 * @flags: the flag to switch
 * @enable: whether to set or unset the flag
 * @count: whether to increase the TT size by the number of changed entries
3240
 */
3241 3242
static void batadv_tt_local_set_flags(struct batadv_priv *bat_priv, u16 flags,
				      bool enable, bool count)
3243
{
3244 3245
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
	struct batadv_tt_common_entry *tt_common_entry;
3246
	u16 changed_num = 0;
3247
	struct hlist_head *head;
3248
	u32 i;
3249 3250

	if (!hash)
3251
		return;
3252 3253 3254 3255 3256

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

		rcu_read_lock();
3257
		hlist_for_each_entry_rcu(tt_common_entry,
3258
					 head, hash_entry) {
3259 3260 3261 3262 3263 3264 3265 3266 3267 3268
			if (enable) {
				if ((tt_common_entry->flags & flags) == flags)
					continue;
				tt_common_entry->flags |= flags;
			} else {
				if (!(tt_common_entry->flags & flags))
					continue;
				tt_common_entry->flags &= ~flags;
			}
			changed_num++;
3269 3270 3271 3272 3273 3274

			if (!count)
				continue;

			batadv_tt_local_size_inc(bat_priv,
						 tt_common_entry->vid);
3275 3276 3277 3278 3279
		}
		rcu_read_unlock();
	}
}

3280
/* Purge out all the tt local entries marked with BATADV_TT_CLIENT_PENDING */
3281
static void batadv_tt_local_purge_pending_clients(struct batadv_priv *bat_priv)
3282
{
3283
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
3284 3285
	struct batadv_tt_common_entry *tt_common;
	struct batadv_tt_local_entry *tt_local;
3286
	struct hlist_node *node_tmp;
3287 3288
	struct hlist_head *head;
	spinlock_t *list_lock; /* protects write access to the hash lists */
3289
	u32 i;
3290 3291 3292 3293 3294 3295 3296 3297 3298

	if (!hash)
		return;

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
		list_lock = &hash->list_locks[i];

		spin_lock_bh(list_lock);
3299
		hlist_for_each_entry_safe(tt_common, node_tmp, head,
3300 3301
					  hash_entry) {
			if (!(tt_common->flags & BATADV_TT_CLIENT_PENDING))
3302 3303
				continue;

3304
			batadv_dbg(BATADV_DBG_TT, bat_priv,
3305 3306 3307
				   "Deleting local tt entry (%pM, vid: %d): pending\n",
				   tt_common->addr,
				   BATADV_PRINT_VID(tt_common->vid));
3308

3309
			batadv_tt_local_size_dec(bat_priv, tt_common->vid);
3310
			hlist_del_rcu(&tt_common->hash_entry);
3311 3312 3313
			tt_local = container_of(tt_common,
						struct batadv_tt_local_entry,
						common);
3314

3315
			batadv_tt_local_entry_put(tt_local);
3316 3317 3318 3319 3320
		}
		spin_unlock_bh(list_lock);
	}
}

3321
/**
3322 3323
 * batadv_tt_local_commit_changes_nolock - commit all pending local tt changes
 *  which have been queued in the time since the last commit
3324
 * @bat_priv: the bat priv with all the soft interface information
3325 3326
 *
 * Caller must hold tt->commit_lock.
3327
 */
3328
static void batadv_tt_local_commit_changes_nolock(struct batadv_priv *bat_priv)
3329
{
3330 3331
	lockdep_assert_held(&bat_priv->tt.commit_lock);

3332 3333 3334
	/* Update multicast addresses in local translation table */
	batadv_mcast_mla_update(bat_priv);

3335 3336 3337
	if (atomic_read(&bat_priv->tt.local_changes) < 1) {
		if (!batadv_atomic_dec_not_zero(&bat_priv->tt.ogm_append_cnt))
			batadv_tt_tvlv_container_update(bat_priv);
3338
		return;
3339
	}
3340

3341
	batadv_tt_local_set_flags(bat_priv, BATADV_TT_CLIENT_NEW, false, true);
3342

3343
	batadv_tt_local_purge_pending_clients(bat_priv);
3344
	batadv_tt_local_update_crc(bat_priv);
3345 3346

	/* Increment the TTVN only once per OGM interval */
3347
	atomic_inc(&bat_priv->tt.vn);
3348
	batadv_dbg(BATADV_DBG_TT, bat_priv,
3349
		   "Local changes committed, updating to ttvn %u\n",
3350
		   (u8)atomic_read(&bat_priv->tt.vn));
3351 3352

	/* reset the sending counter */
3353
	atomic_set(&bat_priv->tt.ogm_append_cnt, BATADV_TT_OGM_APPEND_MAX);
3354
	batadv_tt_tvlv_container_update(bat_priv);
3355
}
3356

3357 3358 3359 3360 3361 3362 3363 3364 3365
/**
 * batadv_tt_local_commit_changes - commit all pending local tt changes which
 *  have been queued in the time since the last commit
 * @bat_priv: the bat priv with all the soft interface information
 */
void batadv_tt_local_commit_changes(struct batadv_priv *bat_priv)
{
	spin_lock_bh(&bat_priv->tt.commit_lock);
	batadv_tt_local_commit_changes_nolock(bat_priv);
3366
	spin_unlock_bh(&bat_priv->tt.commit_lock);
3367
}
3368

3369 3370
bool batadv_is_ap_isolated(struct batadv_priv *bat_priv, u8 *src, u8 *dst,
			   unsigned short vid)
3371
{
3372 3373
	struct batadv_tt_local_entry *tt_local_entry = NULL;
	struct batadv_tt_global_entry *tt_global_entry = NULL;
3374
	struct batadv_softif_vlan *vlan;
3375
	bool ret = false;
3376

3377
	vlan = batadv_softif_vlan_get(bat_priv, vid);
3378 3379 3380 3381
	if (!vlan)
		return false;

	if (!atomic_read(&vlan->ap_isolation))
3382
		goto out;
3383

3384
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, dst, vid);
3385 3386 3387
	if (!tt_local_entry)
		goto out;

3388
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, src, vid);
3389 3390 3391
	if (!tt_global_entry)
		goto out;

3392
	if (!_batadv_is_ap_isolated(tt_local_entry, tt_global_entry))
3393 3394
		goto out;

3395
	ret = true;
3396 3397

out:
3398
	batadv_softif_vlan_put(vlan);
3399
	if (tt_global_entry)
3400
		batadv_tt_global_entry_put(tt_global_entry);
3401
	if (tt_local_entry)
3402
		batadv_tt_local_entry_put(tt_local_entry);
3403 3404
	return ret;
}
3405

3406 3407 3408 3409
/**
 * batadv_tt_update_orig - update global translation table with new tt
 *  information received via ogms
 * @bat_priv: the bat priv with all the soft interface information
3410 3411
 * @orig_node: the orig_node of the ogm
 * @tt_buff: pointer to the first tvlv VLAN entry
3412 3413
 * @tt_num_vlan: number of tvlv VLAN entries
 * @tt_change: pointer to the first entry in the TT buffer
3414 3415 3416 3417 3418
 * @tt_num_changes: number of tt changes inside the tt buffer
 * @ttvn: translation table version number of this changeset
 */
static void batadv_tt_update_orig(struct batadv_priv *bat_priv,
				  struct batadv_orig_node *orig_node,
3419
				  const void *tt_buff, u16 tt_num_vlan,
3420
				  struct batadv_tvlv_tt_change *tt_change,
3421
				  u16 tt_num_changes, u8 ttvn)
3422
{
3423
	u8 orig_ttvn = (u8)atomic_read(&orig_node->last_ttvn);
3424
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
3425
	bool full_table = true;
3426
	bool has_tt_init;
3427

3428
	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)tt_buff;
3429 3430
	has_tt_init = test_bit(BATADV_ORIG_CAPA_HAS_TT,
			       &orig_node->capa_initialized);
3431

3432
	/* orig table not initialised AND first diff is in the OGM OR the ttvn
3433 3434
	 * increased by one -> we can apply the attached changes
	 */
3435
	if ((!has_tt_init && ttvn == 1) || ttvn - orig_ttvn == 1) {
3436
		/* the OGM could not contain the changes due to their size or
3437 3438
		 * because they have already been sent BATADV_TT_OGM_APPEND_MAX
		 * times.
3439 3440
		 * In this case send a tt request
		 */
3441 3442 3443 3444 3445
		if (!tt_num_changes) {
			full_table = false;
			goto request_table;
		}

3446 3447
		spin_lock_bh(&orig_node->tt_lock);

3448
		batadv_tt_update_changes(bat_priv, orig_node, tt_num_changes,
3449
					 ttvn, tt_change);
3450 3451 3452

		/* Even if we received the precomputed crc with the OGM, we
		 * prefer to recompute it to spot any possible inconsistency
3453 3454
		 * in the global table
		 */
3455
		batadv_tt_global_update_crc(bat_priv, orig_node);
3456

3457 3458
		spin_unlock_bh(&orig_node->tt_lock);

3459 3460 3461 3462 3463 3464 3465
		/* The ttvn alone is not enough to guarantee consistency
		 * because a single value could represent different states
		 * (due to the wrap around). Thus a node has to check whether
		 * the resulting table (after applying the changes) is still
		 * consistent or not. E.g. a node could disconnect while its
		 * ttvn is X and reconnect on ttvn = X + TTVN_MAX: in this case
		 * checking the CRC value is mandatory to detect the
3466 3467
		 * inconsistency
		 */
3468 3469
		if (!batadv_tt_global_check_crc(orig_node, tt_vlan,
						tt_num_vlan))
3470 3471 3472
			goto request_table;
	} else {
		/* if we missed more than one change or our tables are not
3473 3474
		 * in sync anymore -> request fresh tt data
		 */
3475
		if (!has_tt_init || ttvn != orig_ttvn ||
3476 3477
		    !batadv_tt_global_check_crc(orig_node, tt_vlan,
						tt_num_vlan)) {
3478
request_table:
3479
			batadv_dbg(BATADV_DBG_TT, bat_priv,
3480 3481 3482
				   "TT inconsistency for %pM. Need to retrieve the correct information (ttvn: %u last_ttvn: %u num_changes: %u)\n",
				   orig_node->orig, ttvn, orig_ttvn,
				   tt_num_changes);
3483
			batadv_send_tt_request(bat_priv, orig_node, ttvn,
3484 3485
					       tt_vlan, tt_num_vlan,
					       full_table);
3486 3487 3488 3489
			return;
		}
	}
}
3490

3491 3492 3493 3494 3495 3496
/**
 * batadv_tt_global_client_is_roaming - check if a client is marked as roaming
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the mac address of the client to check
 * @vid: VLAN identifier
 *
3497
 * Return: true if we know that the client has moved from its old originator
3498 3499
 * to another one. This entry is still kept for consistency purposes and will be
 * deleted later by a DEL or because of timeout
3500
 */
3501
bool batadv_tt_global_client_is_roaming(struct batadv_priv *bat_priv,
3502
					u8 *addr, unsigned short vid)
3503
{
3504
	struct batadv_tt_global_entry *tt_global_entry;
3505 3506
	bool ret = false;

3507
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
3508 3509 3510
	if (!tt_global_entry)
		goto out;

3511
	ret = tt_global_entry->common.flags & BATADV_TT_CLIENT_ROAM;
3512
	batadv_tt_global_entry_put(tt_global_entry);
3513 3514 3515
out:
	return ret;
}
3516

3517 3518 3519
/**
 * batadv_tt_local_client_is_roaming - tells whether the client is roaming
 * @bat_priv: the bat priv with all the soft interface information
3520 3521
 * @addr: the mac address of the local client to query
 * @vid: VLAN identifier
3522
 *
3523
 * Return: true if the local client is known to be roaming (it is not served by
3524 3525 3526 3527
 * this node anymore) or not. If yes, the client is still present in the table
 * to keep the latter consistent with the node TTVN
 */
bool batadv_tt_local_client_is_roaming(struct batadv_priv *bat_priv,
3528
				       u8 *addr, unsigned short vid)
3529 3530 3531 3532
{
	struct batadv_tt_local_entry *tt_local_entry;
	bool ret = false;

3533
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
3534 3535 3536 3537
	if (!tt_local_entry)
		goto out;

	ret = tt_local_entry->common.flags & BATADV_TT_CLIENT_ROAM;
3538
	batadv_tt_local_entry_put(tt_local_entry);
3539 3540 3541 3542
out:
	return ret;
}

3543 3544
bool batadv_tt_add_temporary_global_entry(struct batadv_priv *bat_priv,
					  struct batadv_orig_node *orig_node,
3545
					  const unsigned char *addr,
3546
					  unsigned short vid)
3547 3548 3549
{
	bool ret = false;

3550
	if (!batadv_tt_global_add(bat_priv, orig_node, addr, vid,
3551 3552 3553 3554 3555
				  BATADV_TT_CLIENT_TEMP,
				  atomic_read(&orig_node->last_ttvn)))
		goto out;

	batadv_dbg(BATADV_DBG_TT, bat_priv,
3556 3557
		   "Added temporary global client (addr: %pM, vid: %d, orig: %pM)\n",
		   addr, BATADV_PRINT_VID(vid), orig_node->orig);
3558 3559 3560 3561
	ret = true;
out:
	return ret;
}
3562

3563 3564 3565 3566 3567 3568 3569 3570 3571 3572 3573 3574 3575 3576 3577 3578 3579 3580 3581 3582 3583 3584 3585 3586 3587 3588 3589 3590 3591 3592 3593 3594 3595 3596 3597 3598 3599 3600 3601 3602 3603
/**
 * batadv_tt_local_resize_to_mtu - resize the local translation table fit the
 *  maximum packet size that can be transported through the mesh
 * @soft_iface: netdev struct of the mesh interface
 *
 * Remove entries older than 'timeout' and half timeout if more entries need
 * to be removed.
 */
void batadv_tt_local_resize_to_mtu(struct net_device *soft_iface)
{
	struct batadv_priv *bat_priv = netdev_priv(soft_iface);
	int packet_size_max = atomic_read(&bat_priv->packet_size_max);
	int table_size, timeout = BATADV_TT_LOCAL_TIMEOUT / 2;
	bool reduced = false;

	spin_lock_bh(&bat_priv->tt.commit_lock);

	while (true) {
		table_size = batadv_tt_local_table_transmit_size(bat_priv);
		if (packet_size_max >= table_size)
			break;

		batadv_tt_local_purge(bat_priv, timeout);
		batadv_tt_local_purge_pending_clients(bat_priv);

		timeout /= 2;
		reduced = true;
		net_ratelimited_function(batadv_info, soft_iface,
					 "Forced to purge local tt entries to fit new maximum fragment MTU (%i)\n",
					 packet_size_max);
	}

	/* commit these changes immediately, to avoid synchronization problem
	 * with the TTVN
	 */
	if (reduced)
		batadv_tt_local_commit_changes_nolock(bat_priv);

	spin_unlock_bh(&bat_priv->tt.commit_lock);
}

3604 3605 3606 3607 3608 3609 3610 3611 3612 3613
/**
 * batadv_tt_tvlv_ogm_handler_v1 - process incoming tt tvlv container
 * @bat_priv: the bat priv with all the soft interface information
 * @orig: the orig_node of the ogm
 * @flags: flags indicating the tvlv state (see batadv_tvlv_handler_flags)
 * @tvlv_value: tvlv buffer containing the gateway data
 * @tvlv_value_len: tvlv buffer length
 */
static void batadv_tt_tvlv_ogm_handler_v1(struct batadv_priv *bat_priv,
					  struct batadv_orig_node *orig,
3614 3615
					  u8 flags, void *tvlv_value,
					  u16 tvlv_value_len)
3616
{
3617 3618
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
	struct batadv_tvlv_tt_change *tt_change;
3619
	struct batadv_tvlv_tt_data *tt_data;
3620
	u16 num_entries, num_vlan;
3621 3622 3623 3624 3625 3626 3627

	if (tvlv_value_len < sizeof(*tt_data))
		return;

	tt_data = (struct batadv_tvlv_tt_data *)tvlv_value;
	tvlv_value_len -= sizeof(*tt_data);

3628 3629 3630 3631 3632 3633 3634 3635 3636
	num_vlan = ntohs(tt_data->num_vlan);

	if (tvlv_value_len < sizeof(*tt_vlan) * num_vlan)
		return;

	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(tt_data + 1);
	tt_change = (struct batadv_tvlv_tt_change *)(tt_vlan + num_vlan);
	tvlv_value_len -= sizeof(*tt_vlan) * num_vlan;

3637
	num_entries = batadv_tt_entries(tvlv_value_len);
3638

3639 3640
	batadv_tt_update_orig(bat_priv, orig, tt_vlan, num_vlan, tt_change,
			      num_entries, tt_data->ttvn);
3641 3642
}

3643 3644 3645 3646 3647 3648 3649 3650 3651
/**
 * batadv_tt_tvlv_unicast_handler_v1 - process incoming (unicast) tt tvlv
 *  container
 * @bat_priv: the bat priv with all the soft interface information
 * @src: mac address of tt tvlv sender
 * @dst: mac address of tt tvlv recipient
 * @tvlv_value: tvlv buffer containing the tt data
 * @tvlv_value_len: tvlv buffer length
 *
3652
 * Return: NET_RX_DROP if the tt tvlv is to be re-routed, NET_RX_SUCCESS
3653 3654 3655
 * otherwise.
 */
static int batadv_tt_tvlv_unicast_handler_v1(struct batadv_priv *bat_priv,
3656
					     u8 *src, u8 *dst,
3657
					     void *tvlv_value,
3658
					     u16 tvlv_value_len)
3659 3660
{
	struct batadv_tvlv_tt_data *tt_data;
3661
	u16 tt_vlan_len, tt_num_entries;
3662 3663 3664 3665 3666 3667 3668 3669 3670
	char tt_flag;
	bool ret;

	if (tvlv_value_len < sizeof(*tt_data))
		return NET_RX_SUCCESS;

	tt_data = (struct batadv_tvlv_tt_data *)tvlv_value;
	tvlv_value_len -= sizeof(*tt_data);

3671 3672 3673 3674 3675 3676 3677 3678
	tt_vlan_len = sizeof(struct batadv_tvlv_tt_vlan_data);
	tt_vlan_len *= ntohs(tt_data->num_vlan);

	if (tvlv_value_len < tt_vlan_len)
		return NET_RX_SUCCESS;

	tvlv_value_len -= tt_vlan_len;
	tt_num_entries = batadv_tt_entries(tvlv_value_len);
3679 3680 3681 3682 3683 3684 3685 3686 3687 3688 3689 3690 3691 3692 3693 3694 3695 3696 3697 3698 3699 3700 3701 3702 3703 3704 3705

	switch (tt_data->flags & BATADV_TT_DATA_TYPE_MASK) {
	case BATADV_TT_REQUEST:
		batadv_inc_counter(bat_priv, BATADV_CNT_TT_REQUEST_RX);

		/* If this node cannot provide a TT response the tt_request is
		 * forwarded
		 */
		ret = batadv_send_tt_response(bat_priv, tt_data, src, dst);
		if (!ret) {
			if (tt_data->flags & BATADV_TT_FULL_TABLE)
				tt_flag = 'F';
			else
				tt_flag = '.';

			batadv_dbg(BATADV_DBG_TT, bat_priv,
				   "Routing TT_REQUEST to %pM [%c]\n",
				   dst, tt_flag);
			/* tvlv API will re-route the packet */
			return NET_RX_DROP;
		}
		break;
	case BATADV_TT_RESPONSE:
		batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_RX);

		if (batadv_is_my_mac(bat_priv, dst)) {
			batadv_handle_tt_response(bat_priv, tt_data,
3706
						  src, tt_num_entries);
3707 3708 3709 3710 3711 3712 3713 3714 3715 3716 3717 3718 3719 3720 3721 3722 3723 3724
			return NET_RX_SUCCESS;
		}

		if (tt_data->flags & BATADV_TT_FULL_TABLE)
			tt_flag =  'F';
		else
			tt_flag = '.';

		batadv_dbg(BATADV_DBG_TT, bat_priv,
			   "Routing TT_RESPONSE to %pM [%c]\n", dst, tt_flag);

		/* tvlv API will re-route the packet */
		return NET_RX_DROP;
	}

	return NET_RX_SUCCESS;
}

3725 3726 3727 3728 3729 3730 3731 3732
/**
 * batadv_roam_tvlv_unicast_handler_v1 - process incoming tt roam tvlv container
 * @bat_priv: the bat priv with all the soft interface information
 * @src: mac address of tt tvlv sender
 * @dst: mac address of tt tvlv recipient
 * @tvlv_value: tvlv buffer containing the tt data
 * @tvlv_value_len: tvlv buffer length
 *
3733
 * Return: NET_RX_DROP if the tt roam tvlv is to be re-routed, NET_RX_SUCCESS
3734 3735 3736
 * otherwise.
 */
static int batadv_roam_tvlv_unicast_handler_v1(struct batadv_priv *bat_priv,
3737
					       u8 *src, u8 *dst,
3738
					       void *tvlv_value,
3739
					       u16 tvlv_value_len)
3740 3741 3742 3743 3744 3745 3746 3747 3748 3749 3750 3751 3752 3753 3754 3755 3756 3757 3758 3759 3760 3761 3762 3763 3764 3765
{
	struct batadv_tvlv_roam_adv *roaming_adv;
	struct batadv_orig_node *orig_node = NULL;

	/* If this node is not the intended recipient of the
	 * roaming advertisement the packet is forwarded
	 * (the tvlv API will re-route the packet).
	 */
	if (!batadv_is_my_mac(bat_priv, dst))
		return NET_RX_DROP;

	if (tvlv_value_len < sizeof(*roaming_adv))
		goto out;

	orig_node = batadv_orig_hash_find(bat_priv, src);
	if (!orig_node)
		goto out;

	batadv_inc_counter(bat_priv, BATADV_CNT_TT_ROAM_ADV_RX);
	roaming_adv = (struct batadv_tvlv_roam_adv *)tvlv_value;

	batadv_dbg(BATADV_DBG_TT, bat_priv,
		   "Received ROAMING_ADV from %pM (client %pM)\n",
		   src, roaming_adv->client);

	batadv_tt_global_add(bat_priv, orig_node, roaming_adv->client,
3766
			     ntohs(roaming_adv->vid), BATADV_TT_CLIENT_ROAM,
3767 3768 3769 3770
			     atomic_read(&orig_node->last_ttvn) + 1);

out:
	if (orig_node)
3771
		batadv_orig_node_put(orig_node);
3772 3773 3774
	return NET_RX_SUCCESS;
}

3775 3776 3777 3778
/**
 * batadv_tt_init - initialise the translation table internals
 * @bat_priv: the bat priv with all the soft interface information
 *
3779
 * Return: 0 on success or negative error number in case of failure.
3780 3781 3782 3783 3784
 */
int batadv_tt_init(struct batadv_priv *bat_priv)
{
	int ret;

3785 3786 3787
	/* synchronized flags must be remote */
	BUILD_BUG_ON(!(BATADV_TT_SYNC_MASK & BATADV_TT_REMOTE_MASK));

3788 3789 3790 3791 3792 3793 3794 3795 3796
	ret = batadv_tt_local_init(bat_priv);
	if (ret < 0)
		return ret;

	ret = batadv_tt_global_init(bat_priv);
	if (ret < 0)
		return ret;

	batadv_tvlv_handler_register(bat_priv, batadv_tt_tvlv_ogm_handler_v1,
3797 3798
				     batadv_tt_tvlv_unicast_handler_v1,
				     BATADV_TVLV_TT, 1, BATADV_NO_FLAGS);
3799

3800 3801 3802 3803
	batadv_tvlv_handler_register(bat_priv, NULL,
				     batadv_roam_tvlv_unicast_handler_v1,
				     BATADV_TVLV_ROAM, 1, BATADV_NO_FLAGS);

3804 3805 3806 3807 3808 3809
	INIT_DELAYED_WORK(&bat_priv->tt.work, batadv_tt_purge);
	queue_delayed_work(batadv_event_workqueue, &bat_priv->tt.work,
			   msecs_to_jiffies(BATADV_TT_WORK_PERIOD));

	return 1;
}
3810 3811 3812 3813 3814 3815 3816

/**
 * batadv_tt_global_is_isolated - check if a client is marked as isolated
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the mac address of the client
 * @vid: the identifier of the VLAN where this client is connected
 *
3817
 * Return: true if the client is marked with the TT_CLIENT_ISOLA flag, false
3818 3819 3820
 * otherwise
 */
bool batadv_tt_global_is_isolated(struct batadv_priv *bat_priv,
3821
				  const u8 *addr, unsigned short vid)
3822 3823 3824 3825 3826 3827 3828 3829 3830 3831
{
	struct batadv_tt_global_entry *tt;
	bool ret;

	tt = batadv_tt_global_hash_find(bat_priv, addr, vid);
	if (!tt)
		return false;

	ret = tt->common.flags & BATADV_TT_CLIENT_ISOLA;

3832
	batadv_tt_global_entry_put(tt);
3833 3834 3835

	return ret;
}