translation-table.c 126.2 KB
Newer Older
1
// SPDX-License-Identifier: GPL-2.0
2
/* Copyright (C) B.A.T.M.A.N. contributors:
3
 *
4
 * Marek Lindner, Simon Wunderlich, Antonio Quartulli
5 6 7
 */

#include "translation-table.h"
8 9 10
#include "main.h"

#include <linux/atomic.h>
11
#include <linux/bitops.h>
12
#include <linux/build_bug.h>
13
#include <linux/byteorder/generic.h>
14
#include <linux/cache.h>
15 16 17 18
#include <linux/compiler.h>
#include <linux/crc32c.h>
#include <linux/errno.h>
#include <linux/etherdevice.h>
19
#include <linux/gfp.h>
20
#include <linux/if_ether.h>
21
#include <linux/init.h>
22 23 24
#include <linux/jhash.h>
#include <linux/jiffies.h>
#include <linux/kernel.h>
25
#include <linux/kref.h>
26 27
#include <linux/list.h>
#include <linux/lockdep.h>
28
#include <linux/net.h>
29
#include <linux/netdevice.h>
30
#include <linux/netlink.h>
31 32
#include <linux/rculist.h>
#include <linux/rcupdate.h>
33
#include <linux/skbuff.h>
34 35 36 37 38
#include <linux/slab.h>
#include <linux/spinlock.h>
#include <linux/stddef.h>
#include <linux/string.h>
#include <linux/workqueue.h>
39 40 41
#include <net/genetlink.h>
#include <net/netlink.h>
#include <net/sock.h>
42
#include <uapi/linux/batadv_packet.h>
43
#include <uapi/linux/batman_adv.h>
44 45

#include "bridge_loop_avoidance.h"
46
#include "hard-interface.h"
47
#include "hash.h"
48
#include "log.h"
49
#include "netlink.h"
50 51
#include "originator.h"
#include "soft-interface.h"
52
#include "tvlv.h"
53

54 55 56 57 58 59 60
static struct kmem_cache *batadv_tl_cache __read_mostly;
static struct kmem_cache *batadv_tg_cache __read_mostly;
static struct kmem_cache *batadv_tt_orig_cache __read_mostly;
static struct kmem_cache *batadv_tt_change_cache __read_mostly;
static struct kmem_cache *batadv_tt_req_cache __read_mostly;
static struct kmem_cache *batadv_tt_roam_cache __read_mostly;

61 62 63 64
/* hash class keys */
static struct lock_class_key batadv_tt_local_hash_lock_class_key;
static struct lock_class_key batadv_tt_global_hash_lock_class_key;

65
static void batadv_send_roam_adv(struct batadv_priv *bat_priv, u8 *client,
66
				 unsigned short vid,
67
				 struct batadv_orig_node *orig_node);
68 69
static void batadv_tt_purge(struct work_struct *work);
static void
70
batadv_tt_global_del_orig_list(struct batadv_tt_global_entry *tt_global_entry);
71 72 73
static void batadv_tt_global_del(struct batadv_priv *bat_priv,
				 struct batadv_orig_node *orig_node,
				 const unsigned char *addr,
74 75
				 unsigned short vid, const char *message,
				 bool roaming);
76

77
/**
78
 * batadv_compare_tt() - check if two TT entries are the same
79 80
 * @node: the list element pointer of the first TT entry
 * @data2: pointer to the tt_common_entry of the second TT entry
81
 *
82 83
 * Compare the MAC address and the VLAN ID of the two TT entries and check if
 * they are the same TT client.
84
 * Return: true if the two TT clients are the same, false otherwise
85
 */
86
static bool batadv_compare_tt(const struct hlist_node *node, const void *data2)
87
{
88
	const void *data1 = container_of(node, struct batadv_tt_common_entry,
89
					 hash_entry);
90 91
	const struct batadv_tt_common_entry *tt1 = data1;
	const struct batadv_tt_common_entry *tt2 = data2;
92

93
	return (tt1->vid == tt2->vid) && batadv_compare_eth(data1, data2);
94 95
}

96
/**
97
 * batadv_choose_tt() - return the index of the tt entry in the hash table
98 99 100
 * @data: pointer to the tt_common_entry object to map
 * @size: the size of the hash table
 *
101
 * Return: the hash index where the object represented by 'data' should be
102 103
 * stored at.
 */
104
static inline u32 batadv_choose_tt(const void *data, u32 size)
105 106
{
	struct batadv_tt_common_entry *tt;
107
	u32 hash = 0;
108 109

	tt = (struct batadv_tt_common_entry *)data;
110 111
	hash = jhash(&tt->addr, ETH_ALEN, hash);
	hash = jhash(&tt->vid, sizeof(tt->vid), hash);
112 113 114 115 116

	return hash % size;
}

/**
117
 * batadv_tt_hash_find() - look for a client in the given hash table
118 119 120 121
 * @hash: the hash table to search
 * @addr: the mac address of the client to look for
 * @vid: VLAN identifier
 *
122
 * Return: a pointer to the tt_common struct belonging to the searched client if
123 124
 * found, NULL otherwise.
 */
125
static struct batadv_tt_common_entry *
126
batadv_tt_hash_find(struct batadv_hashtable *hash, const u8 *addr,
127
		    unsigned short vid)
128 129
{
	struct hlist_head *head;
130
	struct batadv_tt_common_entry to_search, *tt, *tt_tmp = NULL;
131
	u32 index;
132 133 134 135

	if (!hash)
		return NULL;

136
	ether_addr_copy(to_search.addr, addr);
137 138 139
	to_search.vid = vid;

	index = batadv_choose_tt(&to_search, hash->size);
140 141 142
	head = &hash->table[index];

	rcu_read_lock();
143 144 145 146 147
	hlist_for_each_entry_rcu(tt, head, hash_entry) {
		if (!batadv_compare_eth(tt, addr))
			continue;

		if (tt->vid != vid)
148 149
			continue;

150
		if (!kref_get_unless_zero(&tt->refcount))
151 152
			continue;

153
		tt_tmp = tt;
154 155 156 157
		break;
	}
	rcu_read_unlock();

158
	return tt_tmp;
159 160
}

161
/**
162
 * batadv_tt_local_hash_find() - search the local table for a given client
163 164 165 166
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the mac address of the client to look for
 * @vid: VLAN identifier
 *
167
 * Return: a pointer to the corresponding tt_local_entry struct if the client is
168 169
 * found, NULL otherwise.
 */
170
static struct batadv_tt_local_entry *
171
batadv_tt_local_hash_find(struct batadv_priv *bat_priv, const u8 *addr,
172
			  unsigned short vid)
173
{
174 175
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_local_entry *tt_local_entry = NULL;
176

177 178
	tt_common_entry = batadv_tt_hash_find(bat_priv->tt.local_hash, addr,
					      vid);
179 180
	if (tt_common_entry)
		tt_local_entry = container_of(tt_common_entry,
181 182
					      struct batadv_tt_local_entry,
					      common);
183 184
	return tt_local_entry;
}
185

186
/**
187
 * batadv_tt_global_hash_find() - search the global table for a given client
188 189 190 191
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the mac address of the client to look for
 * @vid: VLAN identifier
 *
192
 * Return: a pointer to the corresponding tt_global_entry struct if the client
193 194
 * is found, NULL otherwise.
 */
195
struct batadv_tt_global_entry *
196
batadv_tt_global_hash_find(struct batadv_priv *bat_priv, const u8 *addr,
197
			   unsigned short vid)
198
{
199 200
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_global_entry *tt_global_entry = NULL;
201

202 203
	tt_common_entry = batadv_tt_hash_find(bat_priv->tt.global_hash, addr,
					      vid);
204 205
	if (tt_common_entry)
		tt_global_entry = container_of(tt_common_entry,
206 207
					       struct batadv_tt_global_entry,
					       common);
208
	return tt_global_entry;
209 210
}

211
/**
212
 * batadv_tt_local_entry_free_rcu() - free the tt_local_entry
213 214 215 216 217 218 219 220 221 222 223 224
 * @rcu: rcu pointer of the tt_local_entry
 */
static void batadv_tt_local_entry_free_rcu(struct rcu_head *rcu)
{
	struct batadv_tt_local_entry *tt_local_entry;

	tt_local_entry = container_of(rcu, struct batadv_tt_local_entry,
				      common.rcu);

	kmem_cache_free(batadv_tl_cache, tt_local_entry);
}

225
/**
226
 * batadv_tt_local_entry_release() - release tt_local_entry from lists and queue
227 228 229 230 231 232 233 234 235 236
 *  for free after rcu grace period
 * @ref: kref pointer of the nc_node
 */
static void batadv_tt_local_entry_release(struct kref *ref)
{
	struct batadv_tt_local_entry *tt_local_entry;

	tt_local_entry = container_of(ref, struct batadv_tt_local_entry,
				      common.refcount);

237 238
	batadv_softif_vlan_put(tt_local_entry->vlan);

239
	call_rcu(&tt_local_entry->common.rcu, batadv_tt_local_entry_free_rcu);
240 241 242
}

/**
243
 * batadv_tt_local_entry_put() - decrement the tt_local_entry refcounter and
244 245 246
 *  possibly release it
 * @tt_local_entry: tt_local_entry to be free'd
 */
247
static void
248
batadv_tt_local_entry_put(struct batadv_tt_local_entry *tt_local_entry)
249
{
250 251 252
	if (!tt_local_entry)
		return;

253 254
	kref_put(&tt_local_entry->common.refcount,
		 batadv_tt_local_entry_release);
255 256
}

257
/**
258
 * batadv_tt_global_entry_free_rcu() - free the tt_global_entry
259 260 261 262 263 264 265 266 267 268 269 270
 * @rcu: rcu pointer of the tt_global_entry
 */
static void batadv_tt_global_entry_free_rcu(struct rcu_head *rcu)
{
	struct batadv_tt_global_entry *tt_global_entry;

	tt_global_entry = container_of(rcu, struct batadv_tt_global_entry,
				       common.rcu);

	kmem_cache_free(batadv_tg_cache, tt_global_entry);
}

271
/**
272 273
 * batadv_tt_global_entry_release() - release tt_global_entry from lists and
 *  queue for free after rcu grace period
274 275
 * @ref: kref pointer of the nc_node
 */
276
void batadv_tt_global_entry_release(struct kref *ref)
277 278 279 280 281 282 283
{
	struct batadv_tt_global_entry *tt_global_entry;

	tt_global_entry = container_of(ref, struct batadv_tt_global_entry,
				       common.refcount);

	batadv_tt_global_del_orig_list(tt_global_entry);
284 285

	call_rcu(&tt_global_entry->common.rcu, batadv_tt_global_entry_free_rcu);
286 287
}

288
/**
289
 * batadv_tt_global_hash_count() - count the number of orig entries
290
 * @bat_priv: the bat priv with all the soft interface information
291 292 293
 * @addr: the mac address of the client to count entries for
 * @vid: VLAN identifier
 *
294
 * Return: the number of originators advertising the given address/data
295
 * (excluding our self).
296 297
 */
int batadv_tt_global_hash_count(struct batadv_priv *bat_priv,
298
				const u8 *addr, unsigned short vid)
299 300 301 302 303 304 305 306 307
{
	struct batadv_tt_global_entry *tt_global_entry;
	int count;

	tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
	if (!tt_global_entry)
		return 0;

	count = atomic_read(&tt_global_entry->orig_list_count);
308
	batadv_tt_global_entry_put(tt_global_entry);
309 310 311 312

	return count;
}

313
/**
314 315
 * batadv_tt_local_size_mod() - change the size by v of the local table
 *  identified by vid
316 317 318 319 320 321 322 323 324 325 326 327 328 329 330
 * @bat_priv: the bat priv with all the soft interface information
 * @vid: the VLAN identifier of the sub-table to change
 * @v: the amount to sum to the local table size
 */
static void batadv_tt_local_size_mod(struct batadv_priv *bat_priv,
				     unsigned short vid, int v)
{
	struct batadv_softif_vlan *vlan;

	vlan = batadv_softif_vlan_get(bat_priv, vid);
	if (!vlan)
		return;

	atomic_add(v, &vlan->tt.num_entries);

331
	batadv_softif_vlan_put(vlan);
332 333 334
}

/**
335 336
 * batadv_tt_local_size_inc() - increase by one the local table size for the
 *  given vid
337 338 339 340 341 342 343 344 345 346
 * @bat_priv: the bat priv with all the soft interface information
 * @vid: the VLAN identifier
 */
static void batadv_tt_local_size_inc(struct batadv_priv *bat_priv,
				     unsigned short vid)
{
	batadv_tt_local_size_mod(bat_priv, vid, 1);
}

/**
347 348
 * batadv_tt_local_size_dec() - decrease by one the local table size for the
 *  given vid
349 350 351 352 353 354 355 356 357 358
 * @bat_priv: the bat priv with all the soft interface information
 * @vid: the VLAN identifier
 */
static void batadv_tt_local_size_dec(struct batadv_priv *bat_priv,
				     unsigned short vid)
{
	batadv_tt_local_size_mod(bat_priv, vid, -1);
}

/**
359
 * batadv_tt_global_size_mod() - change the size by v of the global table
360 361
 *  for orig_node identified by vid
 * @orig_node: the originator for which the table has to be modified
362 363 364 365 366 367 368 369 370 371 372 373 374 375
 * @vid: the VLAN identifier
 * @v: the amount to sum to the global table size
 */
static void batadv_tt_global_size_mod(struct batadv_orig_node *orig_node,
				      unsigned short vid, int v)
{
	struct batadv_orig_node_vlan *vlan;

	vlan = batadv_orig_node_vlan_new(orig_node, vid);
	if (!vlan)
		return;

	if (atomic_add_return(v, &vlan->tt.num_entries) == 0) {
		spin_lock_bh(&orig_node->vlan_list_lock);
376 377
		if (!hlist_unhashed(&vlan->list)) {
			hlist_del_init_rcu(&vlan->list);
378
			batadv_orig_node_vlan_put(vlan);
379
		}
380 381 382
		spin_unlock_bh(&orig_node->vlan_list_lock);
	}

383
	batadv_orig_node_vlan_put(vlan);
384 385 386
}

/**
387
 * batadv_tt_global_size_inc() - increase by one the global table size for the
388 389 390 391 392 393 394 395 396 397 398
 *  given vid
 * @orig_node: the originator which global table size has to be decreased
 * @vid: the vlan identifier
 */
static void batadv_tt_global_size_inc(struct batadv_orig_node *orig_node,
				      unsigned short vid)
{
	batadv_tt_global_size_mod(orig_node, vid, 1);
}

/**
399
 * batadv_tt_global_size_dec() - decrease by one the global table size for the
400 401 402 403 404 405 406 407 408 409
 *  given vid
 * @orig_node: the originator which global table size has to be decreased
 * @vid: the vlan identifier
 */
static void batadv_tt_global_size_dec(struct batadv_orig_node *orig_node,
				      unsigned short vid)
{
	batadv_tt_global_size_mod(orig_node, vid, -1);
}

410
/**
411
 * batadv_tt_orig_list_entry_free_rcu() - free the orig_entry
412 413 414 415 416 417 418 419 420 421 422
 * @rcu: rcu pointer of the orig_entry
 */
static void batadv_tt_orig_list_entry_free_rcu(struct rcu_head *rcu)
{
	struct batadv_tt_orig_list_entry *orig_entry;

	orig_entry = container_of(rcu, struct batadv_tt_orig_list_entry, rcu);

	kmem_cache_free(batadv_tt_orig_cache, orig_entry);
}

423
/**
424
 * batadv_tt_orig_list_entry_release() - release tt orig entry from lists and
425
 *  queue for free after rcu grace period
426
 * @ref: kref pointer of the tt orig entry
427
 */
428
static void batadv_tt_orig_list_entry_release(struct kref *ref)
429
{
430 431 432 433 434
	struct batadv_tt_orig_list_entry *orig_entry;

	orig_entry = container_of(ref, struct batadv_tt_orig_list_entry,
				  refcount);

435
	batadv_orig_node_put(orig_entry->orig_node);
436
	call_rcu(&orig_entry->rcu, batadv_tt_orig_list_entry_free_rcu);
437 438
}

439
/**
440
 * batadv_tt_orig_list_entry_put() - decrement the tt orig entry refcounter and
441
 *  possibly release it
442 443
 * @orig_entry: tt orig entry to be free'd
 */
444
static void
445
batadv_tt_orig_list_entry_put(struct batadv_tt_orig_list_entry *orig_entry)
446
{
447 448 449
	if (!orig_entry)
		return;

450
	kref_put(&orig_entry->refcount, batadv_tt_orig_list_entry_release);
451 452
}

453
/**
454
 * batadv_tt_local_event() - store a local TT event (ADD/DEL)
455 456 457 458
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_local_entry: the TT entry involved in the event
 * @event_flags: flags to store in the event structure
 */
459
static void batadv_tt_local_event(struct batadv_priv *bat_priv,
460
				  struct batadv_tt_local_entry *tt_local_entry,
461
				  u8 event_flags)
462
{
463
	struct batadv_tt_change_node *tt_change_node, *entry, *safe;
464
	struct batadv_tt_common_entry *common = &tt_local_entry->common;
465
	u8 flags = common->flags | event_flags;
466 467
	bool event_removed = false;
	bool del_op_requested, del_op_entry;
468

469
	tt_change_node = kmem_cache_alloc(batadv_tt_change_cache, GFP_ATOMIC);
470 471 472
	if (!tt_change_node)
		return;

473
	tt_change_node->change.flags = flags;
474 475
	memset(tt_change_node->change.reserved, 0,
	       sizeof(tt_change_node->change.reserved));
476
	ether_addr_copy(tt_change_node->change.addr, common->addr);
477
	tt_change_node->change.vid = htons(common->vid);
478

479
	del_op_requested = flags & BATADV_TT_CLIENT_DEL;
480 481

	/* check for ADD+DEL or DEL+ADD events */
482 483
	spin_lock_bh(&bat_priv->tt.changes_list_lock);
	list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
484
				 list) {
485
		if (!batadv_compare_eth(entry->change.addr, common->addr))
486 487 488 489 490 491 492 493 494
			continue;

		/* DEL+ADD in the same orig interval have no effect and can be
		 * removed to avoid silly behaviour on the receiver side. The
		 * other way around (ADD+DEL) can happen in case of roaming of
		 * a client still in the NEW state. Roaming of NEW clients is
		 * now possible due to automatically recognition of "temporary"
		 * clients
		 */
495
		del_op_entry = entry->change.flags & BATADV_TT_CLIENT_DEL;
496 497 498 499
		if (!del_op_requested && del_op_entry)
			goto del;
		if (del_op_requested && !del_op_entry)
			goto del;
500 501 502 503 504 505 506

		/* this is a second add in the same originator interval. It
		 * means that flags have been changed: update them!
		 */
		if (!del_op_requested && !del_op_entry)
			entry->change.flags = flags;

507 508 509
		continue;
del:
		list_del(&entry->list);
510 511
		kmem_cache_free(batadv_tt_change_cache, entry);
		kmem_cache_free(batadv_tt_change_cache, tt_change_node);
512 513 514 515
		event_removed = true;
		goto unlock;
	}

516
	/* track the change in the OGMinterval list */
517
	list_add_tail(&tt_change_node->list, &bat_priv->tt.changes_list);
518 519

unlock:
520
	spin_unlock_bh(&bat_priv->tt.changes_list_lock);
521

522
	if (event_removed)
523
		atomic_dec(&bat_priv->tt.local_changes);
524
	else
525
		atomic_inc(&bat_priv->tt.local_changes);
526 527
}

528
/**
529
 * batadv_tt_len() - compute length in bytes of given number of tt changes
530 531
 * @changes_num: number of tt changes
 *
532
 * Return: computed length in bytes.
533 534
 */
static int batadv_tt_len(int changes_num)
535
{
536
	return changes_num * sizeof(struct batadv_tvlv_tt_change);
537 538
}

539
/**
540
 * batadv_tt_entries() - compute the number of entries fitting in tt_len bytes
541 542
 * @tt_len: available space
 *
543
 * Return: the number of entries.
544
 */
545
static u16 batadv_tt_entries(u16 tt_len)
546 547 548 549
{
	return tt_len / batadv_tt_len(1);
}

550
/**
551 552
 * batadv_tt_local_table_transmit_size() - calculates the local translation
 *  table size when transmitted over the air
553 554
 * @bat_priv: the bat priv with all the soft interface information
 *
555
 * Return: local translation table size in bytes.
556 557 558
 */
static int batadv_tt_local_table_transmit_size(struct batadv_priv *bat_priv)
{
559 560
	u16 num_vlan = 0;
	u16 tt_local_entries = 0;
561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579
	struct batadv_softif_vlan *vlan;
	int hdr_size;

	rcu_read_lock();
	hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
		num_vlan++;
		tt_local_entries += atomic_read(&vlan->tt.num_entries);
	}
	rcu_read_unlock();

	/* header size of tvlv encapsulated tt response payload */
	hdr_size = sizeof(struct batadv_unicast_tvlv_packet);
	hdr_size += sizeof(struct batadv_tvlv_hdr);
	hdr_size += sizeof(struct batadv_tvlv_tt_data);
	hdr_size += num_vlan * sizeof(struct batadv_tvlv_tt_vlan_data);

	return hdr_size + batadv_tt_len(tt_local_entries);
}

580
static int batadv_tt_local_init(struct batadv_priv *bat_priv)
581
{
582
	if (bat_priv->tt.local_hash)
583
		return 0;
584

585
	bat_priv->tt.local_hash = batadv_hash_new(1024);
586

587
	if (!bat_priv->tt.local_hash)
588
		return -ENOMEM;
589

590 591 592
	batadv_hash_set_lock_class(bat_priv->tt.local_hash,
				   &batadv_tt_local_hash_lock_class_key);

593
	return 0;
594 595
}

596 597 598 599
static void batadv_tt_global_free(struct batadv_priv *bat_priv,
				  struct batadv_tt_global_entry *tt_global,
				  const char *message)
{
600 601 602
	struct batadv_tt_global_entry *tt_removed_entry;
	struct hlist_node *tt_removed_node;

603
	batadv_dbg(BATADV_DBG_TT, bat_priv,
604 605
		   "Deleting global tt entry %pM (vid: %d): %s\n",
		   tt_global->common.addr,
606
		   batadv_print_vid(tt_global->common.vid), message);
607

608 609 610 611 612 613 614 615 616 617 618 619
	tt_removed_node = batadv_hash_remove(bat_priv->tt.global_hash,
					     batadv_compare_tt,
					     batadv_choose_tt,
					     &tt_global->common);
	if (!tt_removed_node)
		return;

	/* drop reference of remove hash entry */
	tt_removed_entry = hlist_entry(tt_removed_node,
				       struct batadv_tt_global_entry,
				       common.hash_entry);
	batadv_tt_global_entry_put(tt_removed_entry);
620 621
}

622
/**
623
 * batadv_tt_local_add() - add a new client to the local table or update an
624 625 626 627 628 629
 *  existing client
 * @soft_iface: netdev struct of the mesh interface
 * @addr: the mac address of the client to add
 * @vid: VLAN identifier
 * @ifindex: index of the interface where the client is connected to (useful to
 *  identify wireless clients)
630 631
 * @mark: the value contained in the skb->mark field of the received packet (if
 *  any)
632
 *
633
 * Return: true if the client was successfully added, false otherwise.
634
 */
635 636
bool batadv_tt_local_add(struct net_device *soft_iface, const u8 *addr,
			 unsigned short vid, int ifindex, u32 mark)
637
{
638
	struct batadv_priv *bat_priv = netdev_priv(soft_iface);
639
	struct batadv_tt_local_entry *tt_local;
640
	struct batadv_tt_global_entry *tt_global = NULL;
641
	struct net *net = dev_net(soft_iface);
642
	struct batadv_softif_vlan *vlan;
643
	struct net_device *in_dev = NULL;
644
	struct batadv_hard_iface *in_hardif = NULL;
645
	struct hlist_head *head;
646
	struct batadv_tt_orig_list_entry *orig_entry;
647
	int hash_added, table_size, packet_size_max;
648 649
	bool ret = false;
	bool roamed_back = false;
650 651
	u8 remote_flags;
	u32 match_mark;
652

653
	if (ifindex != BATADV_NULL_IFINDEX)
654
		in_dev = dev_get_by_index(net, ifindex);
655

656 657 658
	if (in_dev)
		in_hardif = batadv_hardif_get_by_netdev(in_dev);

659
	tt_local = batadv_tt_local_hash_find(bat_priv, addr, vid);
660 661 662

	if (!is_multicast_ether_addr(addr))
		tt_global = batadv_tt_global_hash_find(bat_priv, addr, vid);
663

664 665
	if (tt_local) {
		tt_local->last_seen = jiffies;
666 667
		if (tt_local->common.flags & BATADV_TT_CLIENT_PENDING) {
			batadv_dbg(BATADV_DBG_TT, bat_priv,
668
				   "Re-adding pending client %pM (vid: %d)\n",
669
				   addr, batadv_print_vid(vid));
670 671 672 673 674 675 676 677 678 679 680
			/* whatever the reason why the PENDING flag was set,
			 * this is a client which was enqueued to be removed in
			 * this orig_interval. Since it popped up again, the
			 * flag can be reset like it was never enqueued
			 */
			tt_local->common.flags &= ~BATADV_TT_CLIENT_PENDING;
			goto add_event;
		}

		if (tt_local->common.flags & BATADV_TT_CLIENT_ROAM) {
			batadv_dbg(BATADV_DBG_TT, bat_priv,
681
				   "Roaming client %pM (vid: %d) came back to its original location\n",
682
				   addr, batadv_print_vid(vid));
683 684 685 686 687 688 689 690 691
			/* the ROAM flag is set because this client roamed away
			 * and the node got a roaming_advertisement message. Now
			 * that the client popped up again at its original
			 * location such flag can be unset
			 */
			tt_local->common.flags &= ~BATADV_TT_CLIENT_ROAM;
			roamed_back = true;
		}
		goto check_roaming;
692 693
	}

694 695 696 697 698 699 700 701 702 703 704
	/* Ignore the client if we cannot send it in a full table response. */
	table_size = batadv_tt_local_table_transmit_size(bat_priv);
	table_size += batadv_tt_len(1);
	packet_size_max = atomic_read(&bat_priv->packet_size_max);
	if (table_size > packet_size_max) {
		net_ratelimited_function(batadv_info, soft_iface,
					 "Local translation table size (%i) exceeds maximum packet size (%i); Ignoring new local tt entry: %pM\n",
					 table_size, packet_size_max, addr);
		goto out;
	}

705
	tt_local = kmem_cache_alloc(batadv_tl_cache, GFP_ATOMIC);
706
	if (!tt_local)
707
		goto out;
708

709 710
	/* increase the refcounter of the related vlan */
	vlan = batadv_softif_vlan_get(bat_priv, vid);
711 712 713
	if (!vlan) {
		net_ratelimited_function(batadv_info, soft_iface,
					 "adding TT local entry %pM to non-existent VLAN %d\n",
714
					 addr, batadv_print_vid(vid));
715
		kmem_cache_free(batadv_tl_cache, tt_local);
716
		tt_local = NULL;
717
		goto out;
718
	}
719

720
	batadv_dbg(BATADV_DBG_TT, bat_priv,
721
		   "Creating new local tt entry: %pM (vid: %d, ttvn: %d)\n",
722
		   addr, batadv_print_vid(vid),
723
		   (u8)atomic_read(&bat_priv->tt.vn));
724

725
	ether_addr_copy(tt_local->common.addr, addr);
726 727 728 729 730
	/* The local entry has to be marked as NEW to avoid to send it in
	 * a full table response going out before the next ttvn increment
	 * (consistency check)
	 */
	tt_local->common.flags = BATADV_TT_CLIENT_NEW;
731
	tt_local->common.vid = vid;
732
	if (batadv_is_wifi_hardif(in_hardif))
733
		tt_local->common.flags |= BATADV_TT_CLIENT_WIFI;
734
	kref_init(&tt_local->common.refcount);
735 736
	tt_local->last_seen = jiffies;
	tt_local->common.added_at = tt_local->last_seen;
737
	tt_local->vlan = vlan;
738

739 740 741 742 743
	/* the batman interface mac and multicast addresses should never be
	 * purged
	 */
	if (batadv_compare_eth(addr, soft_iface->dev_addr) ||
	    is_multicast_ether_addr(addr))
744
		tt_local->common.flags |= BATADV_TT_CLIENT_NOPURGE;
745

746
	kref_get(&tt_local->common.refcount);
747
	hash_added = batadv_hash_add(bat_priv->tt.local_hash, batadv_compare_tt,
748
				     batadv_choose_tt, &tt_local->common,
749
				     &tt_local->common.hash_entry);
750 751 752

	if (unlikely(hash_added != 0)) {
		/* remove the reference for the hash */
753
		batadv_tt_local_entry_put(tt_local);
754 755 756
		goto out;
	}

757
add_event:
758
	batadv_tt_local_event(bat_priv, tt_local, BATADV_NO_FLAGS);
759

760 761 762 763 764
check_roaming:
	/* Check whether it is a roaming, but don't do anything if the roaming
	 * process has already been handled
	 */
	if (tt_global && !(tt_global->common.flags & BATADV_TT_CLIENT_ROAM)) {
765
		/* These node are probably going to update their tt table */
766
		head = &tt_global->orig_list;
767
		rcu_read_lock();
768
		hlist_for_each_entry_rcu(orig_entry, head, list) {
769
			batadv_send_roam_adv(bat_priv, tt_global->common.addr,
770
					     tt_global->common.vid,
771
					     orig_entry->orig_node);
772 773
		}
		rcu_read_unlock();
774 775 776 777 778 779 780 781 782 783 784
		if (roamed_back) {
			batadv_tt_global_free(bat_priv, tt_global,
					      "Roaming canceled");
			tt_global = NULL;
		} else {
			/* The global entry has to be marked as ROAMING and
			 * has to be kept for consistency purpose
			 */
			tt_global->common.flags |= BATADV_TT_CLIENT_ROAM;
			tt_global->roam_at = jiffies;
		}
785
	}
786

787 788 789 790 791
	/* store the current remote flags before altering them. This helps
	 * understanding is flags are changing or not
	 */
	remote_flags = tt_local->common.flags & BATADV_TT_REMOTE_MASK;

792
	if (batadv_is_wifi_hardif(in_hardif))
793 794 795
		tt_local->common.flags |= BATADV_TT_CLIENT_WIFI;
	else
		tt_local->common.flags &= ~BATADV_TT_CLIENT_WIFI;
796

797 798 799 800 801 802 803 804 805 806 807
	/* check the mark in the skb: if it's equal to the configured
	 * isolation_mark, it means the packet is coming from an isolated
	 * non-mesh client
	 */
	match_mark = (mark & bat_priv->isolation_mark_mask);
	if (bat_priv->isolation_mark_mask &&
	    match_mark == bat_priv->isolation_mark)
		tt_local->common.flags |= BATADV_TT_CLIENT_ISOLA;
	else
		tt_local->common.flags &= ~BATADV_TT_CLIENT_ISOLA;

808 809 810 811 812 813 814
	/* if any "dynamic" flag has been modified, resend an ADD event for this
	 * entry so that all the nodes can get the new flags
	 */
	if (remote_flags ^ (tt_local->common.flags & BATADV_TT_REMOTE_MASK))
		batadv_tt_local_event(bat_priv, tt_local, BATADV_NO_FLAGS);

	ret = true;
815
out:
816 817
	if (in_hardif)
		batadv_hardif_put(in_hardif);
Y
Yajun Deng 已提交
818
	dev_put(in_dev);
819
	if (tt_local)
820
		batadv_tt_local_entry_put(tt_local);
821
	if (tt_global)
822
		batadv_tt_global_entry_put(tt_global);
823
	return ret;
824 825
}

826
/**
827
 * batadv_tt_prepare_tvlv_global_data() - prepare the TVLV TT header to send
828 829 830 831 832 833 834 835 836 837
 *  within a TT Response directed to another node
 * @orig_node: originator for which the TT data has to be prepared
 * @tt_data: uninitialised pointer to the address of the TVLV buffer
 * @tt_change: uninitialised pointer to the address of the area where the TT
 *  changed can be stored
 * @tt_len: pointer to the length to reserve to the tt_change. if -1 this
 *  function reserves the amount of space needed to send the entire global TT
 *  table. In case of success the value is updated with the real amount of
 *  reserved bytes
 * Allocate the needed amount of memory for the entire TT TVLV and write its
838
 * header made up of one tvlv_tt_data object and a series of tvlv_tt_vlan_data
839 840
 * objects, one per active VLAN served by the originator node.
 *
841
 * Return: the size of the allocated buffer or 0 in case of failure.
842
 */
843
static u16
844 845 846
batadv_tt_prepare_tvlv_global_data(struct batadv_orig_node *orig_node,
				   struct batadv_tvlv_tt_data **tt_data,
				   struct batadv_tvlv_tt_change **tt_change,
847
				   s32 *tt_len)
848
{
849 850 851 852
	u16 num_vlan = 0;
	u16 num_entries = 0;
	u16 change_offset;
	u16 tvlv_len;
853 854
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
	struct batadv_orig_node_vlan *vlan;
855
	u8 *tt_change_ptr;
856

857
	spin_lock_bh(&orig_node->vlan_list_lock);
858
	hlist_for_each_entry(vlan, &orig_node->vlan_list, list) {
859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883
		num_vlan++;
		num_entries += atomic_read(&vlan->tt.num_entries);
	}

	change_offset = sizeof(**tt_data);
	change_offset += num_vlan * sizeof(*tt_vlan);

	/* if tt_len is negative, allocate the space needed by the full table */
	if (*tt_len < 0)
		*tt_len = batadv_tt_len(num_entries);

	tvlv_len = *tt_len;
	tvlv_len += change_offset;

	*tt_data = kmalloc(tvlv_len, GFP_ATOMIC);
	if (!*tt_data) {
		*tt_len = 0;
		goto out;
	}

	(*tt_data)->flags = BATADV_NO_FLAGS;
	(*tt_data)->ttvn = atomic_read(&orig_node->last_ttvn);
	(*tt_data)->num_vlan = htons(num_vlan);

	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(*tt_data + 1);
884
	hlist_for_each_entry(vlan, &orig_node->vlan_list, list) {
885 886
		tt_vlan->vid = htons(vlan->vid);
		tt_vlan->crc = htonl(vlan->tt.crc);
887
		tt_vlan->reserved = 0;
888 889 890 891

		tt_vlan++;
	}

892
	tt_change_ptr = (u8 *)*tt_data + change_offset;
893 894 895
	*tt_change = (struct batadv_tvlv_tt_change *)tt_change_ptr;

out:
896
	spin_unlock_bh(&orig_node->vlan_list_lock);
897 898 899 900
	return tvlv_len;
}

/**
901 902
 * batadv_tt_prepare_tvlv_local_data() - allocate and prepare the TT TVLV for
 *  this node
903 904 905 906 907 908 909 910 911 912 913 914 915
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: uninitialised pointer to the address of the TVLV buffer
 * @tt_change: uninitialised pointer to the address of the area where the TT
 *  changes can be stored
 * @tt_len: pointer to the length to reserve to the tt_change. if -1 this
 *  function reserves the amount of space needed to send the entire local TT
 *  table. In case of success the value is updated with the real amount of
 *  reserved bytes
 *
 * Allocate the needed amount of memory for the entire TT TVLV and write its
 * header made up by one tvlv_tt_data object and a series of tvlv_tt_vlan_data
 * objects, one per active VLAN.
 *
916
 * Return: the size of the allocated buffer or 0 in case of failure.
917
 */
918
static u16
919 920 921
batadv_tt_prepare_tvlv_local_data(struct batadv_priv *bat_priv,
				  struct batadv_tvlv_tt_data **tt_data,
				  struct batadv_tvlv_tt_change **tt_change,
922
				  s32 *tt_len)
923 924 925
{
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
	struct batadv_softif_vlan *vlan;
926
	u16 num_vlan = 0;
927 928
	u16 vlan_entries = 0;
	u16 total_entries = 0;
929
	u16 tvlv_len;
930
	u8 *tt_change_ptr;
931 932
	int change_offset;

933
	spin_lock_bh(&bat_priv->softif_vlan_list_lock);
934
	hlist_for_each_entry(vlan, &bat_priv->softif_vlan_list, list) {
935 936 937 938
		vlan_entries = atomic_read(&vlan->tt.num_entries);
		if (vlan_entries < 1)
			continue;

939
		num_vlan++;
940
		total_entries += vlan_entries;
941 942 943 944 945 946 947
	}

	change_offset = sizeof(**tt_data);
	change_offset += num_vlan * sizeof(*tt_vlan);

	/* if tt_len is negative, allocate the space needed by the full table */
	if (*tt_len < 0)
948
		*tt_len = batadv_tt_len(total_entries);
949 950 951 952 953 954 955 956 957 958 959 960 961 962 963

	tvlv_len = *tt_len;
	tvlv_len += change_offset;

	*tt_data = kmalloc(tvlv_len, GFP_ATOMIC);
	if (!*tt_data) {
		tvlv_len = 0;
		goto out;
	}

	(*tt_data)->flags = BATADV_NO_FLAGS;
	(*tt_data)->ttvn = atomic_read(&bat_priv->tt.vn);
	(*tt_data)->num_vlan = htons(num_vlan);

	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(*tt_data + 1);
964
	hlist_for_each_entry(vlan, &bat_priv->softif_vlan_list, list) {
965 966 967 968
		vlan_entries = atomic_read(&vlan->tt.num_entries);
		if (vlan_entries < 1)
			continue;

969 970
		tt_vlan->vid = htons(vlan->vid);
		tt_vlan->crc = htonl(vlan->tt.crc);
971
		tt_vlan->reserved = 0;
972 973 974 975

		tt_vlan++;
	}

976
	tt_change_ptr = (u8 *)*tt_data + change_offset;
977 978 979
	*tt_change = (struct batadv_tvlv_tt_change *)tt_change_ptr;

out:
980
	spin_unlock_bh(&bat_priv->softif_vlan_list_lock);
981 982 983
	return tvlv_len;
}

984
/**
985 986
 * batadv_tt_tvlv_container_update() - update the translation table tvlv
 *  container after local tt changes have been committed
987 988 989
 * @bat_priv: the bat priv with all the soft interface information
 */
static void batadv_tt_tvlv_container_update(struct batadv_priv *bat_priv)
990
{
991 992 993
	struct batadv_tt_change_node *entry, *safe;
	struct batadv_tvlv_tt_data *tt_data;
	struct batadv_tvlv_tt_change *tt_change;
994
	int tt_diff_len, tt_change_len = 0;
995 996
	int tt_diff_entries_num = 0;
	int tt_diff_entries_count = 0;
997
	u16 tvlv_len;
998

999 1000
	tt_diff_entries_num = atomic_read(&bat_priv->tt.local_changes);
	tt_diff_len = batadv_tt_len(tt_diff_entries_num);
1001 1002 1003 1004

	/* if we have too many changes for one packet don't send any
	 * and wait for the tt table request which will be fragmented
	 */
1005 1006
	if (tt_diff_len > bat_priv->soft_iface->mtu)
		tt_diff_len = 0;
1007

1008 1009 1010
	tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv, &tt_data,
						     &tt_change, &tt_diff_len);
	if (!tvlv_len)
1011
		return;
1012

1013
	tt_data->flags = BATADV_TT_OGM_DIFF;
1014

1015 1016
	if (tt_diff_len == 0)
		goto container_register;
1017

1018 1019
	spin_lock_bh(&bat_priv->tt.changes_list_lock);
	atomic_set(&bat_priv->tt.local_changes, 0);
1020

1021
	list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
1022
				 list) {
1023 1024 1025 1026 1027
		if (tt_diff_entries_count < tt_diff_entries_num) {
			memcpy(tt_change + tt_diff_entries_count,
			       &entry->change,
			       sizeof(struct batadv_tvlv_tt_change));
			tt_diff_entries_count++;
1028
		}
1029
		list_del(&entry->list);
1030
		kmem_cache_free(batadv_tt_change_cache, entry);
1031
	}
1032
	spin_unlock_bh(&bat_priv->tt.changes_list_lock);
1033 1034

	/* Keep the buffer for possible tt_request */
1035 1036 1037 1038
	spin_lock_bh(&bat_priv->tt.last_changeset_lock);
	kfree(bat_priv->tt.last_changeset);
	bat_priv->tt.last_changeset_len = 0;
	bat_priv->tt.last_changeset = NULL;
1039
	tt_change_len = batadv_tt_len(tt_diff_entries_count);
1040
	/* check whether this new OGM has no changes due to size problems */
1041
	if (tt_diff_entries_count > 0) {
1042
		/* if kmalloc() fails we will reply with the full table
1043 1044
		 * instead of providing the diff
		 */
1045
		bat_priv->tt.last_changeset = kzalloc(tt_diff_len, GFP_ATOMIC);
1046
		if (bat_priv->tt.last_changeset) {
1047 1048 1049
			memcpy(bat_priv->tt.last_changeset,
			       tt_change, tt_change_len);
			bat_priv->tt.last_changeset_len = tt_diff_len;
1050 1051
		}
	}
1052
	spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
1053

1054 1055
container_register:
	batadv_tvlv_container_register(bat_priv, BATADV_TVLV_TT, 1, tt_data,
1056
				       tvlv_len);
1057
	kfree(tt_data);
1058 1059
}

1060
/**
1061
 * batadv_tt_local_dump_entry() - Dump one TT local entry into a message
1062 1063
 * @msg :Netlink message to dump into
 * @portid: Port making netlink request
1064
 * @cb: Control block containing additional options
1065 1066 1067 1068 1069 1070
 * @bat_priv: The bat priv with all the soft interface information
 * @common: tt local & tt global common data
 *
 * Return: Error code, or 0 on success
 */
static int
1071 1072
batadv_tt_local_dump_entry(struct sk_buff *msg, u32 portid,
			   struct netlink_callback *cb,
1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092
			   struct batadv_priv *bat_priv,
			   struct batadv_tt_common_entry *common)
{
	void *hdr;
	struct batadv_softif_vlan *vlan;
	struct batadv_tt_local_entry *local;
	unsigned int last_seen_msecs;
	u32 crc;

	local = container_of(common, struct batadv_tt_local_entry, common);
	last_seen_msecs = jiffies_to_msecs(jiffies - local->last_seen);

	vlan = batadv_softif_vlan_get(bat_priv, common->vid);
	if (!vlan)
		return 0;

	crc = vlan->tt.crc;

	batadv_softif_vlan_put(vlan);

1093 1094
	hdr = genlmsg_put(msg, portid, cb->nlh->nlmsg_seq,
			  &batadv_netlink_family,  NLM_F_MULTI,
1095 1096 1097 1098
			  BATADV_CMD_GET_TRANSTABLE_LOCAL);
	if (!hdr)
		return -ENOBUFS;

1099 1100
	genl_dump_check_consistent(cb, hdr);

1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119
	if (nla_put(msg, BATADV_ATTR_TT_ADDRESS, ETH_ALEN, common->addr) ||
	    nla_put_u32(msg, BATADV_ATTR_TT_CRC32, crc) ||
	    nla_put_u16(msg, BATADV_ATTR_TT_VID, common->vid) ||
	    nla_put_u32(msg, BATADV_ATTR_TT_FLAGS, common->flags))
		goto nla_put_failure;

	if (!(common->flags & BATADV_TT_CLIENT_NOPURGE) &&
	    nla_put_u32(msg, BATADV_ATTR_LAST_SEEN_MSECS, last_seen_msecs))
		goto nla_put_failure;

	genlmsg_end(msg, hdr);
	return 0;

 nla_put_failure:
	genlmsg_cancel(msg, hdr);
	return -EMSGSIZE;
}

/**
1120
 * batadv_tt_local_dump_bucket() - Dump one TT local bucket into a message
1121 1122
 * @msg: Netlink message to dump into
 * @portid: Port making netlink request
1123
 * @cb: Control block containing additional options
1124
 * @bat_priv: The bat priv with all the soft interface information
1125 1126
 * @hash: hash to dump
 * @bucket: bucket index to dump
1127 1128 1129 1130 1131
 * @idx_s: Number of entries to skip
 *
 * Return: Error code, or 0 on success
 */
static int
1132 1133
batadv_tt_local_dump_bucket(struct sk_buff *msg, u32 portid,
			    struct netlink_callback *cb,
1134
			    struct batadv_priv *bat_priv,
1135 1136
			    struct batadv_hashtable *hash, unsigned int bucket,
			    int *idx_s)
1137 1138 1139 1140
{
	struct batadv_tt_common_entry *common;
	int idx = 0;

1141 1142 1143 1144
	spin_lock_bh(&hash->list_locks[bucket]);
	cb->seq = atomic_read(&hash->generation) << 1 | 1;

	hlist_for_each_entry(common, &hash->table[bucket], hash_entry) {
1145 1146 1147
		if (idx++ < *idx_s)
			continue;

1148
		if (batadv_tt_local_dump_entry(msg, portid, cb, bat_priv,
1149
					       common)) {
1150
			spin_unlock_bh(&hash->list_locks[bucket]);
1151 1152 1153 1154
			*idx_s = idx - 1;
			return -EMSGSIZE;
		}
	}
1155
	spin_unlock_bh(&hash->list_locks[bucket]);
1156 1157 1158 1159 1160 1161

	*idx_s = 0;
	return 0;
}

/**
1162
 * batadv_tt_local_dump() - Dump TT local entries into a message
1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201
 * @msg: Netlink message to dump into
 * @cb: Parameters from query
 *
 * Return: Error code, or 0 on success
 */
int batadv_tt_local_dump(struct sk_buff *msg, struct netlink_callback *cb)
{
	struct net *net = sock_net(cb->skb->sk);
	struct net_device *soft_iface;
	struct batadv_priv *bat_priv;
	struct batadv_hard_iface *primary_if = NULL;
	struct batadv_hashtable *hash;
	int ret;
	int ifindex;
	int bucket = cb->args[0];
	int idx = cb->args[1];
	int portid = NETLINK_CB(cb->skb).portid;

	ifindex = batadv_netlink_get_ifindex(cb->nlh, BATADV_ATTR_MESH_IFINDEX);
	if (!ifindex)
		return -EINVAL;

	soft_iface = dev_get_by_index(net, ifindex);
	if (!soft_iface || !batadv_softif_is_valid(soft_iface)) {
		ret = -ENODEV;
		goto out;
	}

	bat_priv = netdev_priv(soft_iface);

	primary_if = batadv_primary_if_get_selected(bat_priv);
	if (!primary_if || primary_if->if_status != BATADV_IF_ACTIVE) {
		ret = -ENOENT;
		goto out;
	}

	hash = bat_priv->tt.local_hash;

	while (bucket < hash->size) {
1202 1203
		if (batadv_tt_local_dump_bucket(msg, portid, cb, bat_priv,
						hash, bucket, &idx))
1204 1205 1206 1207 1208 1209 1210 1211 1212 1213
			break;

		bucket++;
	}

	ret = msg->len;

 out:
	if (primary_if)
		batadv_hardif_put(primary_if);
Y
Yajun Deng 已提交
1214
	dev_put(soft_iface);
1215 1216 1217 1218 1219 1220 1221

	cb->args[0] = bucket;
	cb->args[1] = idx;

	return ret;
}

1222 1223 1224
static void
batadv_tt_local_set_pending(struct batadv_priv *bat_priv,
			    struct batadv_tt_local_entry *tt_local_entry,
1225
			    u16 flags, const char *message)
1226
{
1227
	batadv_tt_local_event(bat_priv, tt_local_entry, flags);
1228

1229 1230
	/* The local client has to be marked as "pending to be removed" but has
	 * to be kept in the table in order to send it in a full table
1231 1232
	 * response issued before the net ttvn increment (consistency check)
	 */
1233
	tt_local_entry->common.flags |= BATADV_TT_CLIENT_PENDING;
1234

1235
	batadv_dbg(BATADV_DBG_TT, bat_priv,
1236 1237
		   "Local tt entry (%pM, vid: %d) pending to be removed: %s\n",
		   tt_local_entry->common.addr,
1238
		   batadv_print_vid(tt_local_entry->common.vid), message);
1239 1240
}

1241
/**
1242
 * batadv_tt_local_remove() - logically remove an entry from the local table
1243 1244
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the MAC address of the client to remove
1245
 * @vid: VLAN identifier
1246 1247 1248
 * @message: message to append to the log on deletion
 * @roaming: true if the deletion is due to a roaming event
 *
1249
 * Return: the flags assigned to the local entry before being deleted
1250
 */
1251 1252 1253
u16 batadv_tt_local_remove(struct batadv_priv *bat_priv, const u8 *addr,
			   unsigned short vid, const char *message,
			   bool roaming)
1254
{
1255
	struct batadv_tt_local_entry *tt_removed_entry;
1256
	struct batadv_tt_local_entry *tt_local_entry;
1257
	u16 flags, curr_flags = BATADV_NO_FLAGS;
1258
	struct hlist_node *tt_removed_node;
1259

1260
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
1261 1262 1263
	if (!tt_local_entry)
		goto out;

1264 1265
	curr_flags = tt_local_entry->common.flags;

1266
	flags = BATADV_TT_CLIENT_DEL;
1267 1268 1269 1270
	/* if this global entry addition is due to a roaming, the node has to
	 * mark the local entry as "roamed" in order to correctly reroute
	 * packets later
	 */
1271
	if (roaming) {
1272
		flags |= BATADV_TT_CLIENT_ROAM;
1273 1274 1275
		/* mark the local client as ROAMed */
		tt_local_entry->common.flags |= BATADV_TT_CLIENT_ROAM;
	}
1276

1277 1278 1279 1280 1281 1282 1283 1284
	if (!(tt_local_entry->common.flags & BATADV_TT_CLIENT_NEW)) {
		batadv_tt_local_set_pending(bat_priv, tt_local_entry, flags,
					    message);
		goto out;
	}
	/* if this client has been added right now, it is possible to
	 * immediately purge it
	 */
1285
	batadv_tt_local_event(bat_priv, tt_local_entry, BATADV_TT_CLIENT_DEL);
1286

1287
	tt_removed_node = batadv_hash_remove(bat_priv->tt.local_hash,
1288 1289 1290
					     batadv_compare_tt,
					     batadv_choose_tt,
					     &tt_local_entry->common);
1291
	if (!tt_removed_node)
1292 1293
		goto out;

1294 1295 1296 1297 1298
	/* drop reference of remove hash entry */
	tt_removed_entry = hlist_entry(tt_removed_node,
				       struct batadv_tt_local_entry,
				       common.hash_entry);
	batadv_tt_local_entry_put(tt_removed_entry);
1299

1300 1301
out:
	if (tt_local_entry)
1302
		batadv_tt_local_entry_put(tt_local_entry);
1303 1304

	return curr_flags;
1305 1306
}

1307
/**
1308
 * batadv_tt_local_purge_list() - purge inactive tt local entries
1309 1310 1311 1312 1313
 * @bat_priv: the bat priv with all the soft interface information
 * @head: pointer to the list containing the local tt entries
 * @timeout: parameter deciding whether a given tt local entry is considered
 *  inactive or not
 */
1314
static void batadv_tt_local_purge_list(struct batadv_priv *bat_priv,
1315 1316
				       struct hlist_head *head,
				       int timeout)
1317
{
1318 1319
	struct batadv_tt_local_entry *tt_local_entry;
	struct batadv_tt_common_entry *tt_common_entry;
1320
	struct hlist_node *node_tmp;
1321

1322
	hlist_for_each_entry_safe(tt_common_entry, node_tmp, head,
1323 1324
				  hash_entry) {
		tt_local_entry = container_of(tt_common_entry,
1325 1326
					      struct batadv_tt_local_entry,
					      common);
1327 1328 1329 1330 1331 1332 1333
		if (tt_local_entry->common.flags & BATADV_TT_CLIENT_NOPURGE)
			continue;

		/* entry already marked for deletion */
		if (tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING)
			continue;

1334
		if (!batadv_has_timed_out(tt_local_entry->last_seen, timeout))
1335 1336 1337 1338 1339 1340 1341
			continue;

		batadv_tt_local_set_pending(bat_priv, tt_local_entry,
					    BATADV_TT_CLIENT_DEL, "timed out");
	}
}

1342
/**
1343
 * batadv_tt_local_purge() - purge inactive tt local entries
1344 1345 1346 1347 1348 1349
 * @bat_priv: the bat priv with all the soft interface information
 * @timeout: parameter deciding whether a given tt local entry is considered
 *  inactive or not
 */
static void batadv_tt_local_purge(struct batadv_priv *bat_priv,
				  int timeout)
1350
{
1351
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
1352
	struct hlist_head *head;
1353
	spinlock_t *list_lock; /* protects write access to the hash lists */
1354
	u32 i;
1355 1356 1357

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
1358
		list_lock = &hash->list_locks[i];
1359

1360
		spin_lock_bh(list_lock);
1361
		batadv_tt_local_purge_list(bat_priv, head, timeout);
1362
		spin_unlock_bh(list_lock);
1363 1364 1365
	}
}

1366
static void batadv_tt_local_table_free(struct batadv_priv *bat_priv)
1367
{
1368
	struct batadv_hashtable *hash;
1369
	spinlock_t *list_lock; /* protects write access to the hash lists */
1370 1371
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_local_entry *tt_local;
1372
	struct hlist_node *node_tmp;
1373
	struct hlist_head *head;
1374
	u32 i;
1375

1376
	if (!bat_priv->tt.local_hash)
1377 1378
		return;

1379
	hash = bat_priv->tt.local_hash;
1380 1381 1382 1383 1384 1385

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
		list_lock = &hash->list_locks[i];

		spin_lock_bh(list_lock);
1386
		hlist_for_each_entry_safe(tt_common_entry, node_tmp,
1387
					  head, hash_entry) {
1388
			hlist_del_rcu(&tt_common_entry->hash_entry);
1389 1390 1391
			tt_local = container_of(tt_common_entry,
						struct batadv_tt_local_entry,
						common);
1392

1393
			batadv_tt_local_entry_put(tt_local);
1394 1395 1396 1397
		}
		spin_unlock_bh(list_lock);
	}

1398
	batadv_hash_destroy(hash);
1399

1400
	bat_priv->tt.local_hash = NULL;
1401 1402
}

1403
static int batadv_tt_global_init(struct batadv_priv *bat_priv)
1404
{
1405
	if (bat_priv->tt.global_hash)
1406
		return 0;
1407

1408
	bat_priv->tt.global_hash = batadv_hash_new(1024);
1409

1410
	if (!bat_priv->tt.global_hash)
1411
		return -ENOMEM;
1412

1413 1414 1415
	batadv_hash_set_lock_class(bat_priv->tt.global_hash,
				   &batadv_tt_global_hash_lock_class_key);

1416
	return 0;
1417 1418
}

1419
static void batadv_tt_changes_list_free(struct batadv_priv *bat_priv)
1420
{
1421
	struct batadv_tt_change_node *entry, *safe;
1422

1423
	spin_lock_bh(&bat_priv->tt.changes_list_lock);
1424

1425
	list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
1426 1427
				 list) {
		list_del(&entry->list);
1428
		kmem_cache_free(batadv_tt_change_cache, entry);
1429
	}
1430

1431 1432
	atomic_set(&bat_priv->tt.local_changes, 0);
	spin_unlock_bh(&bat_priv->tt.changes_list_lock);
1433
}
1434

1435
/**
1436
 * batadv_tt_global_orig_entry_find() - find a TT orig_list_entry
1437 1438 1439
 * @entry: the TT global entry where the orig_list_entry has to be
 *  extracted from
 * @orig_node: the originator for which the orig_list_entry has to be found
1440
 *
1441
 * retrieve the orig_tt_list_entry belonging to orig_node from the
1442 1443
 * batadv_tt_global_entry list
 *
1444
 * Return: it with an increased refcounter, NULL if not found
1445
 */
1446 1447 1448
static struct batadv_tt_orig_list_entry *
batadv_tt_global_orig_entry_find(const struct batadv_tt_global_entry *entry,
				 const struct batadv_orig_node *orig_node)
1449
{
1450
	struct batadv_tt_orig_list_entry *tmp_orig_entry, *orig_entry = NULL;
1451 1452 1453 1454
	const struct hlist_head *head;

	rcu_read_lock();
	head = &entry->orig_list;
1455
	hlist_for_each_entry_rcu(tmp_orig_entry, head, list) {
1456 1457
		if (tmp_orig_entry->orig_node != orig_node)
			continue;
1458
		if (!kref_get_unless_zero(&tmp_orig_entry->refcount))
1459 1460 1461 1462
			continue;

		orig_entry = tmp_orig_entry;
		break;
1463 1464
	}
	rcu_read_unlock();
1465 1466 1467 1468

	return orig_entry;
}

1469
/**
1470 1471
 * batadv_tt_global_entry_has_orig() - check if a TT global entry is also
 *  handled by a given originator
1472 1473
 * @entry: the TT global entry to check
 * @orig_node: the originator to search in the list
1474 1475
 * @flags: a pointer to store TT flags for the given @entry received
 *  from @orig_node
1476 1477 1478 1479
 *
 * find out if an orig_node is already in the list of a tt_global_entry.
 *
 * Return: true if found, false otherwise
1480 1481 1482
 */
static bool
batadv_tt_global_entry_has_orig(const struct batadv_tt_global_entry *entry,
1483 1484
				const struct batadv_orig_node *orig_node,
				u8 *flags)
1485 1486 1487 1488 1489 1490 1491
{
	struct batadv_tt_orig_list_entry *orig_entry;
	bool found = false;

	orig_entry = batadv_tt_global_orig_entry_find(entry, orig_node);
	if (orig_entry) {
		found = true;
1492 1493 1494 1495

		if (flags)
			*flags = orig_entry->flags;

1496
		batadv_tt_orig_list_entry_put(orig_entry);
1497 1498
	}

1499 1500 1501
	return found;
}

1502
/**
1503
 * batadv_tt_global_sync_flags() - update TT sync flags
1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526
 * @tt_global: the TT global entry to update sync flags in
 *
 * Updates the sync flag bits in the tt_global flag attribute with a logical
 * OR of all sync flags from any of its TT orig entries.
 */
static void
batadv_tt_global_sync_flags(struct batadv_tt_global_entry *tt_global)
{
	struct batadv_tt_orig_list_entry *orig_entry;
	const struct hlist_head *head;
	u16 flags = BATADV_NO_FLAGS;

	rcu_read_lock();
	head = &tt_global->orig_list;
	hlist_for_each_entry_rcu(orig_entry, head, list)
		flags |= orig_entry->flags;
	rcu_read_unlock();

	flags |= tt_global->common.flags & (~BATADV_TT_SYNC_MASK);
	tt_global->common.flags = flags;
}

/**
1527
 * batadv_tt_global_orig_entry_add() - add or update a TT orig entry
1528 1529 1530 1531 1532
 * @tt_global: the TT global entry to add an orig entry in
 * @orig_node: the originator to add an orig entry for
 * @ttvn: translation table version number of this changeset
 * @flags: TT sync flags
 */
1533
static void
1534
batadv_tt_global_orig_entry_add(struct batadv_tt_global_entry *tt_global,
1535 1536
				struct batadv_orig_node *orig_node, int ttvn,
				u8 flags)
1537
{
1538
	struct batadv_tt_orig_list_entry *orig_entry;
1539

1540 1541
	spin_lock_bh(&tt_global->list_lock);

1542
	orig_entry = batadv_tt_global_orig_entry_find(tt_global, orig_node);
1543 1544 1545 1546 1547
	if (orig_entry) {
		/* refresh the ttvn: the current value could be a bogus one that
		 * was added during a "temporary client detection"
		 */
		orig_entry->ttvn = ttvn;
1548 1549
		orig_entry->flags = flags;
		goto sync_flags;
1550
	}
1551

1552
	orig_entry = kmem_cache_zalloc(batadv_tt_orig_cache, GFP_ATOMIC);
1553
	if (!orig_entry)
1554
		goto out;
1555 1556

	INIT_HLIST_NODE(&orig_entry->list);
1557
	kref_get(&orig_node->refcount);
1558
	batadv_tt_global_size_inc(orig_node, tt_global->common.vid);
1559 1560
	orig_entry->orig_node = orig_node;
	orig_entry->ttvn = ttvn;
1561
	orig_entry->flags = flags;
1562
	kref_init(&orig_entry->refcount);
1563

1564
	kref_get(&orig_entry->refcount);
1565
	hlist_add_head_rcu(&orig_entry->list,
1566
			   &tt_global->orig_list);
1567 1568
	atomic_inc(&tt_global->orig_list_count);

1569 1570
sync_flags:
	batadv_tt_global_sync_flags(tt_global);
1571 1572
out:
	if (orig_entry)
1573
		batadv_tt_orig_list_entry_put(orig_entry);
1574 1575

	spin_unlock_bh(&tt_global->list_lock);
1576 1577
}

1578
/**
1579
 * batadv_tt_global_add() - add a new TT global entry or update an existing one
1580 1581 1582
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: the originator announcing the client
 * @tt_addr: the mac address of the non-mesh client
1583
 * @vid: VLAN identifier
1584 1585 1586 1587 1588 1589 1590 1591 1592
 * @flags: TT flags that have to be set for this non-mesh client
 * @ttvn: the tt version number ever announcing this non-mesh client
 *
 * Add a new TT global entry for the given originator. If the entry already
 * exists add a new reference to the given originator (a global entry can have
 * references to multiple originators) and adjust the flags attribute to reflect
 * the function argument.
 * If a TT local entry exists for this non-mesh client remove it.
 *
1593
 * The caller must hold the orig_node refcount.
1594
 *
1595
 * Return: true if the new entry has been added, false otherwise
1596
 */
1597 1598
static bool batadv_tt_global_add(struct batadv_priv *bat_priv,
				 struct batadv_orig_node *orig_node,
1599
				 const unsigned char *tt_addr,
1600
				 unsigned short vid, u16 flags, u8 ttvn)
1601
{
1602 1603
	struct batadv_tt_global_entry *tt_global_entry;
	struct batadv_tt_local_entry *tt_local_entry;
1604
	bool ret = false;
1605
	int hash_added;
1606
	struct batadv_tt_common_entry *common;
1607
	u16 local_flags;
1608

1609 1610 1611 1612
	/* ignore global entries from backbone nodes */
	if (batadv_bla_is_backbone_gw_orig(bat_priv, orig_node->orig, vid))
		return true;

1613 1614
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, tt_addr, vid);
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, tt_addr, vid);
1615 1616 1617 1618 1619 1620 1621 1622

	/* if the node already has a local client for this entry, it has to wait
	 * for a roaming advertisement instead of manually messing up the global
	 * table
	 */
	if ((flags & BATADV_TT_CLIENT_TEMP) && tt_local_entry &&
	    !(tt_local_entry->common.flags & BATADV_TT_CLIENT_NEW))
		goto out;
1623 1624

	if (!tt_global_entry) {
1625 1626
		tt_global_entry = kmem_cache_zalloc(batadv_tg_cache,
						    GFP_ATOMIC);
1627
		if (!tt_global_entry)
1628 1629
			goto out;

1630
		common = &tt_global_entry->common;
1631
		ether_addr_copy(common->addr, tt_addr);
1632
		common->vid = vid;
1633

1634 1635
		if (!is_multicast_ether_addr(common->addr))
			common->flags = flags & (~BATADV_TT_SYNC_MASK);
1636

1637
		tt_global_entry->roam_at = 0;
1638 1639 1640 1641 1642 1643
		/* node must store current time in case of roaming. This is
		 * needed to purge this entry out on timeout (if nobody claims
		 * it)
		 */
		if (flags & BATADV_TT_CLIENT_ROAM)
			tt_global_entry->roam_at = jiffies;
1644
		kref_init(&common->refcount);
1645
		common->added_at = jiffies;
1646 1647

		INIT_HLIST_HEAD(&tt_global_entry->orig_list);
1648
		atomic_set(&tt_global_entry->orig_list_count, 0);
1649
		spin_lock_init(&tt_global_entry->list_lock);
1650

1651
		kref_get(&common->refcount);
1652
		hash_added = batadv_hash_add(bat_priv->tt.global_hash,
1653
					     batadv_compare_tt,
1654
					     batadv_choose_tt, common,
1655
					     &common->hash_entry);
1656 1657 1658

		if (unlikely(hash_added != 0)) {
			/* remove the reference for the hash */
1659
			batadv_tt_global_entry_put(tt_global_entry);
1660 1661
			goto out_remove;
		}
1662
	} else {
1663
		common = &tt_global_entry->common;
1664 1665
		/* If there is already a global entry, we can use this one for
		 * our processing.
1666 1667 1668 1669 1670 1671 1672
		 * But if we are trying to add a temporary client then here are
		 * two options at this point:
		 * 1) the global client is not a temporary client: the global
		 *    client has to be left as it is, temporary information
		 *    should never override any already known client state
		 * 2) the global client is a temporary client: purge the
		 *    originator list and add the new one orig_entry
1673
		 */
1674 1675 1676 1677
		if (flags & BATADV_TT_CLIENT_TEMP) {
			if (!(common->flags & BATADV_TT_CLIENT_TEMP))
				goto out;
			if (batadv_tt_global_entry_has_orig(tt_global_entry,
1678
							    orig_node, NULL))
1679 1680 1681 1682
				goto out_remove;
			batadv_tt_global_del_orig_list(tt_global_entry);
			goto add_orig_entry;
		}
1683 1684

		/* if the client was temporary added before receiving the first
1685 1686 1687 1688
		 * OGM announcing it, we have to clear the TEMP flag. Also,
		 * remove the previous temporary orig node and re-add it
		 * if required. If the orig entry changed, the new one which
		 * is a non-temporary entry is preferred.
1689
		 */
1690 1691 1692 1693
		if (common->flags & BATADV_TT_CLIENT_TEMP) {
			batadv_tt_global_del_orig_list(tt_global_entry);
			common->flags &= ~BATADV_TT_CLIENT_TEMP;
		}
1694

1695
		/* the change can carry possible "attribute" flags like the
1696
		 * TT_CLIENT_TEMP, therefore they have to be copied in the
1697 1698
		 * client entry
		 */
1699 1700
		if (!is_multicast_ether_addr(common->addr))
			common->flags |= flags & (~BATADV_TT_SYNC_MASK);
1701

1702 1703
		/* If there is the BATADV_TT_CLIENT_ROAM flag set, there is only
		 * one originator left in the list and we previously received a
1704 1705 1706 1707 1708
		 * delete + roaming change for this originator.
		 *
		 * We should first delete the old originator before adding the
		 * new one.
		 */
1709
		if (common->flags & BATADV_TT_CLIENT_ROAM) {
1710
			batadv_tt_global_del_orig_list(tt_global_entry);
1711
			common->flags &= ~BATADV_TT_CLIENT_ROAM;
1712
			tt_global_entry->roam_at = 0;
1713 1714
		}
	}
1715
add_orig_entry:
1716
	/* add the new orig_entry (if needed) or update it */
1717 1718
	batadv_tt_global_orig_entry_add(tt_global_entry, orig_node, ttvn,
					flags & BATADV_TT_SYNC_MASK);
1719

1720
	batadv_dbg(BATADV_DBG_TT, bat_priv,
1721
		   "Creating new global tt entry: %pM (vid: %d, via %pM)\n",
1722
		   common->addr, batadv_print_vid(common->vid),
1723
		   orig_node->orig);
1724
	ret = true;
1725

1726
out_remove:
1727 1728 1729 1730 1731
	/* Do not remove multicast addresses from the local hash on
	 * global additions
	 */
	if (is_multicast_ether_addr(tt_addr))
		goto out;
1732

1733
	/* remove address from local hash if present */
1734
	local_flags = batadv_tt_local_remove(bat_priv, tt_addr, vid,
1735
					     "global tt received",
1736
					     flags & BATADV_TT_CLIENT_ROAM);
1737 1738
	tt_global_entry->common.flags |= local_flags & BATADV_TT_CLIENT_WIFI;

1739 1740 1741 1742 1743 1744
	if (!(flags & BATADV_TT_CLIENT_ROAM))
		/* this is a normal global add. Therefore the client is not in a
		 * roaming state anymore.
		 */
		tt_global_entry->common.flags &= ~BATADV_TT_CLIENT_ROAM;

1745 1746
out:
	if (tt_global_entry)
1747
		batadv_tt_global_entry_put(tt_global_entry);
1748
	if (tt_local_entry)
1749
		batadv_tt_local_entry_put(tt_local_entry);
1750
	return ret;
1751 1752
}

1753
/**
1754
 * batadv_transtable_best_orig() - Get best originator list entry from tt entry
1755
 * @bat_priv: the bat priv with all the soft interface information
1756 1757
 * @tt_global_entry: global translation table entry to be analyzed
 *
1758
 * This function assumes the caller holds rcu_read_lock().
1759
 * Return: best originator list entry or NULL on errors.
1760 1761
 */
static struct batadv_tt_orig_list_entry *
1762 1763
batadv_transtable_best_orig(struct batadv_priv *bat_priv,
			    struct batadv_tt_global_entry *tt_global_entry)
1764
{
1765
	struct batadv_neigh_node *router, *best_router = NULL;
1766
	struct batadv_algo_ops *bao = bat_priv->algo_ops;
1767 1768 1769 1770
	struct hlist_head *head;
	struct batadv_tt_orig_list_entry *orig_entry, *best_entry = NULL;

	head = &tt_global_entry->orig_list;
1771
	hlist_for_each_entry_rcu(orig_entry, head, list) {
1772 1773
		router = batadv_orig_router_get(orig_entry->orig_node,
						BATADV_IF_DEFAULT);
1774 1775 1776
		if (!router)
			continue;

1777
		if (best_router &&
1778 1779
		    bao->neigh.cmp(router, BATADV_IF_DEFAULT, best_router,
				   BATADV_IF_DEFAULT) <= 0) {
1780
			batadv_neigh_node_put(router);
1781
			continue;
1782 1783
		}

1784 1785
		/* release the refcount for the "old" best */
		if (best_router)
1786
			batadv_neigh_node_put(best_router);
1787 1788 1789

		best_entry = orig_entry;
		best_router = router;
1790 1791
	}

1792
	if (best_router)
1793
		batadv_neigh_node_put(best_router);
1794

1795 1796 1797
	return best_entry;
}

1798
/**
1799
 * batadv_tt_global_dump_subentry() - Dump all TT local entries into a message
1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814
 * @msg: Netlink message to dump into
 * @portid: Port making netlink request
 * @seq: Sequence number of netlink message
 * @common: tt local & tt global common data
 * @orig: Originator node announcing a non-mesh client
 * @best: Is the best originator for the TT entry
 *
 * Return: Error code, or 0 on success
 */
static int
batadv_tt_global_dump_subentry(struct sk_buff *msg, u32 portid, u32 seq,
			       struct batadv_tt_common_entry *common,
			       struct batadv_tt_orig_list_entry *orig,
			       bool best)
{
1815
	u16 flags = (common->flags & (~BATADV_TT_SYNC_MASK)) | orig->flags;
1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844
	void *hdr;
	struct batadv_orig_node_vlan *vlan;
	u8 last_ttvn;
	u32 crc;

	vlan = batadv_orig_node_vlan_get(orig->orig_node,
					 common->vid);
	if (!vlan)
		return 0;

	crc = vlan->tt.crc;

	batadv_orig_node_vlan_put(vlan);

	hdr = genlmsg_put(msg, portid, seq, &batadv_netlink_family,
			  NLM_F_MULTI,
			  BATADV_CMD_GET_TRANSTABLE_GLOBAL);
	if (!hdr)
		return -ENOBUFS;

	last_ttvn = atomic_read(&orig->orig_node->last_ttvn);

	if (nla_put(msg, BATADV_ATTR_TT_ADDRESS, ETH_ALEN, common->addr) ||
	    nla_put(msg, BATADV_ATTR_ORIG_ADDRESS, ETH_ALEN,
		    orig->orig_node->orig) ||
	    nla_put_u8(msg, BATADV_ATTR_TT_TTVN, orig->ttvn) ||
	    nla_put_u8(msg, BATADV_ATTR_TT_LAST_TTVN, last_ttvn) ||
	    nla_put_u32(msg, BATADV_ATTR_TT_CRC32, crc) ||
	    nla_put_u16(msg, BATADV_ATTR_TT_VID, common->vid) ||
1845
	    nla_put_u32(msg, BATADV_ATTR_TT_FLAGS, flags))
1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859
		goto nla_put_failure;

	if (best && nla_put_flag(msg, BATADV_ATTR_FLAG_BEST))
		goto nla_put_failure;

	genlmsg_end(msg, hdr);
	return 0;

 nla_put_failure:
	genlmsg_cancel(msg, hdr);
	return -EMSGSIZE;
}

/**
1860
 * batadv_tt_global_dump_entry() - Dump one TT global entry into a message
1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904
 * @msg: Netlink message to dump into
 * @portid: Port making netlink request
 * @seq: Sequence number of netlink message
 * @bat_priv: The bat priv with all the soft interface information
 * @common: tt local & tt global common data
 * @sub_s: Number of entries to skip
 *
 * This function assumes the caller holds rcu_read_lock().
 *
 * Return: Error code, or 0 on success
 */
static int
batadv_tt_global_dump_entry(struct sk_buff *msg, u32 portid, u32 seq,
			    struct batadv_priv *bat_priv,
			    struct batadv_tt_common_entry *common, int *sub_s)
{
	struct batadv_tt_orig_list_entry *orig_entry, *best_entry;
	struct batadv_tt_global_entry *global;
	struct hlist_head *head;
	int sub = 0;
	bool best;

	global = container_of(common, struct batadv_tt_global_entry, common);
	best_entry = batadv_transtable_best_orig(bat_priv, global);
	head = &global->orig_list;

	hlist_for_each_entry_rcu(orig_entry, head, list) {
		if (sub++ < *sub_s)
			continue;

		best = (orig_entry == best_entry);

		if (batadv_tt_global_dump_subentry(msg, portid, seq, common,
						   orig_entry, best)) {
			*sub_s = sub - 1;
			return -EMSGSIZE;
		}
	}

	*sub_s = 0;
	return 0;
}

/**
1905
 * batadv_tt_global_dump_bucket() - Dump one TT local bucket into a message
1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943
 * @msg: Netlink message to dump into
 * @portid: Port making netlink request
 * @seq: Sequence number of netlink message
 * @bat_priv: The bat priv with all the soft interface information
 * @head: Pointer to the list containing the global tt entries
 * @idx_s: Number of entries to skip
 * @sub: Number of entries to skip
 *
 * Return: Error code, or 0 on success
 */
static int
batadv_tt_global_dump_bucket(struct sk_buff *msg, u32 portid, u32 seq,
			     struct batadv_priv *bat_priv,
			     struct hlist_head *head, int *idx_s, int *sub)
{
	struct batadv_tt_common_entry *common;
	int idx = 0;

	rcu_read_lock();
	hlist_for_each_entry_rcu(common, head, hash_entry) {
		if (idx++ < *idx_s)
			continue;

		if (batadv_tt_global_dump_entry(msg, portid, seq, bat_priv,
						common, sub)) {
			rcu_read_unlock();
			*idx_s = idx - 1;
			return -EMSGSIZE;
		}
	}
	rcu_read_unlock();

	*idx_s = 0;
	*sub = 0;
	return 0;
}

/**
1944
 * batadv_tt_global_dump() -  Dump TT global entries into a message
1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000
 * @msg: Netlink message to dump into
 * @cb: Parameters from query
 *
 * Return: Error code, or length of message on success
 */
int batadv_tt_global_dump(struct sk_buff *msg, struct netlink_callback *cb)
{
	struct net *net = sock_net(cb->skb->sk);
	struct net_device *soft_iface;
	struct batadv_priv *bat_priv;
	struct batadv_hard_iface *primary_if = NULL;
	struct batadv_hashtable *hash;
	struct hlist_head *head;
	int ret;
	int ifindex;
	int bucket = cb->args[0];
	int idx = cb->args[1];
	int sub = cb->args[2];
	int portid = NETLINK_CB(cb->skb).portid;

	ifindex = batadv_netlink_get_ifindex(cb->nlh, BATADV_ATTR_MESH_IFINDEX);
	if (!ifindex)
		return -EINVAL;

	soft_iface = dev_get_by_index(net, ifindex);
	if (!soft_iface || !batadv_softif_is_valid(soft_iface)) {
		ret = -ENODEV;
		goto out;
	}

	bat_priv = netdev_priv(soft_iface);

	primary_if = batadv_primary_if_get_selected(bat_priv);
	if (!primary_if || primary_if->if_status != BATADV_IF_ACTIVE) {
		ret = -ENOENT;
		goto out;
	}

	hash = bat_priv->tt.global_hash;

	while (bucket < hash->size) {
		head = &hash->table[bucket];

		if (batadv_tt_global_dump_bucket(msg, portid,
						 cb->nlh->nlmsg_seq, bat_priv,
						 head, &idx, &sub))
			break;

		bucket++;
	}

	ret = msg->len;

 out:
	if (primary_if)
		batadv_hardif_put(primary_if);
Y
Yajun Deng 已提交
2001
	dev_put(soft_iface);
2002 2003 2004 2005 2006 2007 2008 2009

	cb->args[0] = bucket;
	cb->args[1] = idx;
	cb->args[2] = sub;

	return ret;
}

2010
/**
2011
 * _batadv_tt_global_del_orig_entry() - remove and free an orig_entry
2012 2013 2014 2015 2016
 * @tt_global_entry: the global entry to remove the orig_entry from
 * @orig_entry: the orig entry to remove and free
 *
 * Remove an orig_entry from its list in the given tt_global_entry and
 * free this orig_entry afterwards.
2017 2018 2019
 *
 * Caller must hold tt_global_entry->list_lock and ensure orig_entry->list is
 * part of a list.
2020 2021
 */
static void
2022 2023
_batadv_tt_global_del_orig_entry(struct batadv_tt_global_entry *tt_global_entry,
				 struct batadv_tt_orig_list_entry *orig_entry)
2024
{
2025 2026
	lockdep_assert_held(&tt_global_entry->list_lock);

2027 2028 2029
	batadv_tt_global_size_dec(orig_entry->orig_node,
				  tt_global_entry->common.vid);
	atomic_dec(&tt_global_entry->orig_list_count);
2030 2031 2032
	/* requires holding tt_global_entry->list_lock and orig_entry->list
	 * being part of a list
	 */
2033
	hlist_del_rcu(&orig_entry->list);
2034
	batadv_tt_orig_list_entry_put(orig_entry);
2035 2036
}

2037
/* deletes the orig list of a tt_global_entry */
2038
static void
2039
batadv_tt_global_del_orig_list(struct batadv_tt_global_entry *tt_global_entry)
2040
{
2041
	struct hlist_head *head;
2042
	struct hlist_node *safe;
2043
	struct batadv_tt_orig_list_entry *orig_entry;
2044

2045 2046
	spin_lock_bh(&tt_global_entry->list_lock);
	head = &tt_global_entry->orig_list;
2047
	hlist_for_each_entry_safe(orig_entry, safe, head, list)
2048
		_batadv_tt_global_del_orig_entry(tt_global_entry, orig_entry);
2049 2050 2051
	spin_unlock_bh(&tt_global_entry->list_lock);
}

2052
/**
2053
 * batadv_tt_global_del_orig_node() - remove orig_node from a global tt entry
2054 2055 2056 2057 2058 2059 2060 2061
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_global_entry: the global entry to remove the orig_node from
 * @orig_node: the originator announcing the client
 * @message: message to append to the log on deletion
 *
 * Remove the given orig_node and its according orig_entry from the given
 * global tt entry.
 */
2062
static void
2063 2064 2065 2066
batadv_tt_global_del_orig_node(struct batadv_priv *bat_priv,
			       struct batadv_tt_global_entry *tt_global_entry,
			       struct batadv_orig_node *orig_node,
			       const char *message)
2067 2068
{
	struct hlist_head *head;
2069
	struct hlist_node *safe;
2070
	struct batadv_tt_orig_list_entry *orig_entry;
2071
	unsigned short vid;
2072 2073 2074

	spin_lock_bh(&tt_global_entry->list_lock);
	head = &tt_global_entry->orig_list;
2075
	hlist_for_each_entry_safe(orig_entry, safe, head, list) {
2076
		if (orig_entry->orig_node == orig_node) {
2077
			vid = tt_global_entry->common.vid;
2078
			batadv_dbg(BATADV_DBG_TT, bat_priv,
2079
				   "Deleting %pM from global tt entry %pM (vid: %d): %s\n",
2080
				   orig_node->orig,
2081
				   tt_global_entry->common.addr,
2082
				   batadv_print_vid(vid), message);
2083 2084
			_batadv_tt_global_del_orig_entry(tt_global_entry,
							 orig_entry);
2085 2086 2087 2088 2089 2090
		}
	}
	spin_unlock_bh(&tt_global_entry->list_lock);
}

/* If the client is to be deleted, we check if it is the last origantor entry
2091 2092
 * within tt_global entry. If yes, we set the BATADV_TT_CLIENT_ROAM flag and the
 * timer, otherwise we simply remove the originator scheduled for deletion.
2093
 */
2094
static void
2095 2096 2097 2098
batadv_tt_global_del_roaming(struct batadv_priv *bat_priv,
			     struct batadv_tt_global_entry *tt_global_entry,
			     struct batadv_orig_node *orig_node,
			     const char *message)
2099 2100 2101
{
	bool last_entry = true;
	struct hlist_head *head;
2102
	struct batadv_tt_orig_list_entry *orig_entry;
2103 2104 2105 2106 2107 2108 2109

	/* no local entry exists, case 1:
	 * Check if this is the last one or if other entries exist.
	 */

	rcu_read_lock();
	head = &tt_global_entry->orig_list;
2110
	hlist_for_each_entry_rcu(orig_entry, head, list) {
2111 2112 2113 2114 2115 2116 2117 2118 2119
		if (orig_entry->orig_node != orig_node) {
			last_entry = false;
			break;
		}
	}
	rcu_read_unlock();

	if (last_entry) {
		/* its the last one, mark for roaming. */
2120
		tt_global_entry->common.flags |= BATADV_TT_CLIENT_ROAM;
2121
		tt_global_entry->roam_at = jiffies;
2122
	} else {
2123 2124 2125
		/* there is another entry, we can simply delete this
		 * one and can still use the other one.
		 */
2126 2127
		batadv_tt_global_del_orig_node(bat_priv, tt_global_entry,
					       orig_node, message);
2128
	}
2129 2130
}

2131
/**
2132
 * batadv_tt_global_del() - remove a client from the global table
2133 2134 2135 2136 2137 2138 2139 2140
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: an originator serving this client
 * @addr: the mac address of the client
 * @vid: VLAN identifier
 * @message: a message explaining the reason for deleting the client to print
 *  for debugging purpose
 * @roaming: true if the deletion has been triggered by a roaming event
 */
2141 2142
static void batadv_tt_global_del(struct batadv_priv *bat_priv,
				 struct batadv_orig_node *orig_node,
2143
				 const unsigned char *addr, unsigned short vid,
2144
				 const char *message, bool roaming)
2145
{
2146
	struct batadv_tt_global_entry *tt_global_entry;
2147
	struct batadv_tt_local_entry *local_entry = NULL;
2148

2149
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
2150
	if (!tt_global_entry)
2151
		goto out;
2152

2153
	if (!roaming) {
2154 2155
		batadv_tt_global_del_orig_node(bat_priv, tt_global_entry,
					       orig_node, message);
2156 2157

		if (hlist_empty(&tt_global_entry->orig_list))
2158 2159
			batadv_tt_global_free(bat_priv, tt_global_entry,
					      message);
2160 2161 2162

		goto out;
	}
2163 2164 2165

	/* if we are deleting a global entry due to a roam
	 * event, there are two possibilities:
2166 2167
	 * 1) the client roamed from node A to node B => if there
	 *    is only one originator left for this client, we mark
2168
	 *    it with BATADV_TT_CLIENT_ROAM, we start a timer and we
2169 2170
	 *    wait for node B to claim it. In case of timeout
	 *    the entry is purged.
2171 2172 2173
	 *
	 *    If there are other originators left, we directly delete
	 *    the originator.
2174
	 * 2) the client roamed to us => we can directly delete
2175 2176
	 *    the global entry, since it is useless now.
	 */
2177
	local_entry = batadv_tt_local_hash_find(bat_priv,
2178 2179
						tt_global_entry->common.addr,
						vid);
2180
	if (local_entry) {
2181
		/* local entry exists, case 2: client roamed to us. */
2182
		batadv_tt_global_del_orig_list(tt_global_entry);
2183
		batadv_tt_global_free(bat_priv, tt_global_entry, message);
2184
	} else {
2185
		/* no local entry exists, case 1: check for roaming */
2186 2187
		batadv_tt_global_del_roaming(bat_priv, tt_global_entry,
					     orig_node, message);
2188
	}
2189

2190
out:
2191
	if (tt_global_entry)
2192
		batadv_tt_global_entry_put(tt_global_entry);
2193
	if (local_entry)
2194
		batadv_tt_local_entry_put(local_entry);
2195 2196
}

2197
/**
2198 2199
 * batadv_tt_global_del_orig() - remove all the TT global entries belonging to
 *  the given originator matching the provided vid
2200 2201 2202 2203 2204 2205
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: the originator owning the entries to remove
 * @match_vid: the VLAN identifier to match. If negative all the entries will be
 *  removed
 * @message: debug message to print as "reason"
 */
2206 2207
void batadv_tt_global_del_orig(struct batadv_priv *bat_priv,
			       struct batadv_orig_node *orig_node,
2208
			       s32 match_vid,
2209
			       const char *message)
2210
{
2211 2212
	struct batadv_tt_global_entry *tt_global;
	struct batadv_tt_common_entry *tt_common_entry;
2213
	u32 i;
2214
	struct batadv_hashtable *hash = bat_priv->tt.global_hash;
2215
	struct hlist_node *safe;
2216
	struct hlist_head *head;
2217
	spinlock_t *list_lock; /* protects write access to the hash lists */
2218
	unsigned short vid;
2219

2220 2221 2222
	if (!hash)
		return;

2223 2224
	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
2225
		list_lock = &hash->list_locks[i];
2226

2227
		spin_lock_bh(list_lock);
2228
		hlist_for_each_entry_safe(tt_common_entry, safe,
2229
					  head, hash_entry) {
2230 2231 2232 2233
			/* remove only matching entries */
			if (match_vid >= 0 && tt_common_entry->vid != match_vid)
				continue;

2234 2235 2236
			tt_global = container_of(tt_common_entry,
						 struct batadv_tt_global_entry,
						 common);
2237

2238 2239
			batadv_tt_global_del_orig_node(bat_priv, tt_global,
						       orig_node, message);
2240

2241
			if (hlist_empty(&tt_global->orig_list)) {
2242
				vid = tt_global->common.vid;
2243
				batadv_dbg(BATADV_DBG_TT, bat_priv,
2244 2245
					   "Deleting global tt entry %pM (vid: %d): %s\n",
					   tt_global->common.addr,
2246
					   batadv_print_vid(vid), message);
2247
				hlist_del_rcu(&tt_common_entry->hash_entry);
2248
				batadv_tt_global_entry_put(tt_global);
2249
			}
2250
		}
2251
		spin_unlock_bh(list_lock);
2252
	}
2253
	clear_bit(BATADV_ORIG_CAPA_HAS_TT, &orig_node->capa_initialized);
2254 2255
}

2256 2257
static bool batadv_tt_global_to_purge(struct batadv_tt_global_entry *tt_global,
				      char **msg)
2258
{
2259 2260 2261
	bool purge = false;
	unsigned long roam_timeout = BATADV_TT_CLIENT_ROAM_TIMEOUT;
	unsigned long temp_timeout = BATADV_TT_CLIENT_TEMP_TIMEOUT;
2262

2263 2264 2265 2266 2267
	if ((tt_global->common.flags & BATADV_TT_CLIENT_ROAM) &&
	    batadv_has_timed_out(tt_global->roam_at, roam_timeout)) {
		purge = true;
		*msg = "Roaming timeout\n";
	}
2268

2269 2270 2271 2272
	if ((tt_global->common.flags & BATADV_TT_CLIENT_TEMP) &&
	    batadv_has_timed_out(tt_global->common.added_at, temp_timeout)) {
		purge = true;
		*msg = "Temporary client timeout\n";
2273
	}
2274 2275

	return purge;
2276 2277
}

2278
static void batadv_tt_global_purge(struct batadv_priv *bat_priv)
2279
{
2280
	struct batadv_hashtable *hash = bat_priv->tt.global_hash;
2281
	struct hlist_head *head;
2282
	struct hlist_node *node_tmp;
2283
	spinlock_t *list_lock; /* protects write access to the hash lists */
2284
	u32 i;
2285 2286 2287
	char *msg = NULL;
	struct batadv_tt_common_entry *tt_common;
	struct batadv_tt_global_entry *tt_global;
2288 2289 2290

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
2291
		list_lock = &hash->list_locks[i];
2292

2293
		spin_lock_bh(list_lock);
2294
		hlist_for_each_entry_safe(tt_common, node_tmp, head,
2295 2296 2297 2298 2299 2300 2301 2302 2303
					  hash_entry) {
			tt_global = container_of(tt_common,
						 struct batadv_tt_global_entry,
						 common);

			if (!batadv_tt_global_to_purge(tt_global, &msg))
				continue;

			batadv_dbg(BATADV_DBG_TT, bat_priv,
2304 2305
				   "Deleting global tt entry %pM (vid: %d): %s\n",
				   tt_global->common.addr,
2306
				   batadv_print_vid(tt_global->common.vid),
2307
				   msg);
2308

2309
			hlist_del_rcu(&tt_common->hash_entry);
2310

2311
			batadv_tt_global_entry_put(tt_global);
2312
		}
2313
		spin_unlock_bh(list_lock);
2314 2315 2316
	}
}

2317
static void batadv_tt_global_table_free(struct batadv_priv *bat_priv)
2318
{
2319
	struct batadv_hashtable *hash;
2320
	spinlock_t *list_lock; /* protects write access to the hash lists */
2321 2322
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_global_entry *tt_global;
2323
	struct hlist_node *node_tmp;
2324
	struct hlist_head *head;
2325
	u32 i;
2326

2327
	if (!bat_priv->tt.global_hash)
2328 2329
		return;

2330
	hash = bat_priv->tt.global_hash;
2331 2332 2333 2334 2335 2336

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
		list_lock = &hash->list_locks[i];

		spin_lock_bh(list_lock);
2337
		hlist_for_each_entry_safe(tt_common_entry, node_tmp,
2338
					  head, hash_entry) {
2339
			hlist_del_rcu(&tt_common_entry->hash_entry);
2340 2341 2342
			tt_global = container_of(tt_common_entry,
						 struct batadv_tt_global_entry,
						 common);
2343
			batadv_tt_global_entry_put(tt_global);
2344 2345 2346 2347
		}
		spin_unlock_bh(list_lock);
	}

2348
	batadv_hash_destroy(hash);
2349

2350
	bat_priv->tt.global_hash = NULL;
2351 2352
}

2353 2354 2355
static bool
_batadv_is_ap_isolated(struct batadv_tt_local_entry *tt_local_entry,
		       struct batadv_tt_global_entry *tt_global_entry)
2356
{
2357 2358
	if (tt_local_entry->common.flags & BATADV_TT_CLIENT_WIFI &&
	    tt_global_entry->common.flags & BATADV_TT_CLIENT_WIFI)
2359
		return true;
2360

2361 2362 2363
	/* check if the two clients are marked as isolated */
	if (tt_local_entry->common.flags & BATADV_TT_CLIENT_ISOLA &&
	    tt_global_entry->common.flags & BATADV_TT_CLIENT_ISOLA)
2364
		return true;
2365

2366
	return false;
2367 2368
}

2369
/**
2370
 * batadv_transtable_search() - get the mesh destination for a given client
2371 2372 2373 2374 2375
 * @bat_priv: the bat priv with all the soft interface information
 * @src: mac address of the source client
 * @addr: mac address of the destination client
 * @vid: VLAN identifier
 *
2376
 * Return: a pointer to the originator that was selected as destination in the
2377 2378 2379 2380 2381 2382
 * mesh for contacting the client 'addr', NULL otherwise.
 * In case of multiple originators serving the same client, the function returns
 * the best one (best in terms of metric towards the destination node).
 *
 * If the two clients are AP isolated the function returns NULL.
 */
2383
struct batadv_orig_node *batadv_transtable_search(struct batadv_priv *bat_priv,
2384 2385
						  const u8 *src,
						  const u8 *addr,
2386
						  unsigned short vid)
2387
{
2388 2389 2390
	struct batadv_tt_local_entry *tt_local_entry = NULL;
	struct batadv_tt_global_entry *tt_global_entry = NULL;
	struct batadv_orig_node *orig_node = NULL;
2391
	struct batadv_tt_orig_list_entry *best_entry;
2392

2393
	if (src && batadv_vlan_ap_isola_get(bat_priv, vid)) {
2394
		tt_local_entry = batadv_tt_local_hash_find(bat_priv, src, vid);
2395 2396
		if (!tt_local_entry ||
		    (tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING))
2397 2398
			goto out;
	}
2399

2400
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
2401
	if (!tt_global_entry)
2402
		goto out;
2403

2404
	/* check whether the clients should not communicate due to AP
2405 2406
	 * isolation
	 */
2407 2408
	if (tt_local_entry &&
	    _batadv_is_ap_isolated(tt_local_entry, tt_global_entry))
2409 2410
		goto out;

2411
	rcu_read_lock();
2412
	best_entry = batadv_transtable_best_orig(bat_priv, tt_global_entry);
2413
	/* found anything? */
2414 2415
	if (best_entry)
		orig_node = best_entry->orig_node;
2416
	if (orig_node && !kref_get_unless_zero(&orig_node->refcount))
2417 2418
		orig_node = NULL;
	rcu_read_unlock();
2419

2420
out:
2421
	if (tt_global_entry)
2422
		batadv_tt_global_entry_put(tt_global_entry);
2423
	if (tt_local_entry)
2424
		batadv_tt_local_entry_put(tt_local_entry);
2425

2426
	return orig_node;
2427
}
2428

2429
/**
2430
 * batadv_tt_global_crc() - calculates the checksum of the local table belonging
2431 2432
 *  to the given orig_node
 * @bat_priv: the bat priv with all the soft interface information
2433
 * @orig_node: originator for which the CRC should be computed
2434
 * @vid: VLAN identifier for which the CRC32 has to be computed
2435 2436 2437 2438 2439 2440 2441 2442 2443 2444 2445 2446 2447 2448 2449 2450
 *
 * This function computes the checksum for the global table corresponding to a
 * specific originator. In particular, the checksum is computed as follows: For
 * each client connected to the originator the CRC32C of the MAC address and the
 * VID is computed and then all the CRC32Cs of the various clients are xor'ed
 * together.
 *
 * The idea behind is that CRC32C should be used as much as possible in order to
 * produce a unique hash of the table, but since the order which is used to feed
 * the CRC32C function affects the result and since every node in the network
 * probably sorts the clients differently, the hash function cannot be directly
 * computed over the entire table. Hence the CRC32C is used only on
 * the single client entry, while all the results are then xor'ed together
 * because the XOR operation can combine them all while trying to reduce the
 * noise as much as possible.
 *
2451
 * Return: the checksum of the global table of a given originator.
2452
 */
2453 2454 2455
static u32 batadv_tt_global_crc(struct batadv_priv *bat_priv,
				struct batadv_orig_node *orig_node,
				unsigned short vid)
2456
{
2457
	struct batadv_hashtable *hash = bat_priv->tt.global_hash;
2458
	struct batadv_tt_orig_list_entry *tt_orig;
2459 2460
	struct batadv_tt_common_entry *tt_common;
	struct batadv_tt_global_entry *tt_global;
2461
	struct hlist_head *head;
2462 2463
	u32 i, crc_tmp, crc = 0;
	u8 flags;
2464
	__be16 tmp_vid;
2465 2466 2467 2468 2469

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

		rcu_read_lock();
2470
		hlist_for_each_entry_rcu(tt_common, head, hash_entry) {
2471 2472 2473
			tt_global = container_of(tt_common,
						 struct batadv_tt_global_entry,
						 common);
2474 2475 2476 2477 2478 2479
			/* compute the CRC only for entries belonging to the
			 * VLAN identified by the vid passed as parameter
			 */
			if (tt_common->vid != vid)
				continue;

2480 2481 2482 2483 2484
			/* Roaming clients are in the global table for
			 * consistency only. They don't have to be
			 * taken into account while computing the
			 * global crc
			 */
2485
			if (tt_common->flags & BATADV_TT_CLIENT_ROAM)
2486
				continue;
2487 2488 2489 2490 2491 2492
			/* Temporary clients have not been announced yet, so
			 * they have to be skipped while computing the global
			 * crc
			 */
			if (tt_common->flags & BATADV_TT_CLIENT_TEMP)
				continue;
2493 2494 2495 2496

			/* find out if this global entry is announced by this
			 * originator
			 */
2497 2498 2499
			tt_orig = batadv_tt_global_orig_entry_find(tt_global,
								   orig_node);
			if (!tt_orig)
2500 2501
				continue;

2502 2503 2504 2505 2506
			/* use network order to read the VID: this ensures that
			 * every node reads the bytes in the same order.
			 */
			tmp_vid = htons(tt_common->vid);
			crc_tmp = crc32c(0, &tmp_vid, sizeof(tmp_vid));
2507 2508 2509 2510

			/* compute the CRC on flags that have to be kept in sync
			 * among nodes
			 */
2511
			flags = tt_orig->flags;
2512 2513
			crc_tmp = crc32c(crc_tmp, &flags, sizeof(flags));

2514
			crc ^= crc32c(crc_tmp, tt_common->addr, ETH_ALEN);
2515 2516

			batadv_tt_orig_list_entry_put(tt_orig);
2517 2518 2519 2520
		}
		rcu_read_unlock();
	}

2521
	return crc;
2522 2523
}

2524
/**
2525
 * batadv_tt_local_crc() - calculates the checksum of the local table
2526
 * @bat_priv: the bat priv with all the soft interface information
2527
 * @vid: VLAN identifier for which the CRC32 has to be computed
2528 2529 2530 2531
 *
 * For details about the computation, please refer to the documentation for
 * batadv_tt_global_crc().
 *
2532
 * Return: the checksum of the local table
2533
 */
2534 2535
static u32 batadv_tt_local_crc(struct batadv_priv *bat_priv,
			       unsigned short vid)
2536
{
2537
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
2538
	struct batadv_tt_common_entry *tt_common;
2539
	struct hlist_head *head;
2540 2541
	u32 i, crc_tmp, crc = 0;
	u8 flags;
2542
	__be16 tmp_vid;
2543 2544 2545 2546 2547

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

		rcu_read_lock();
2548
		hlist_for_each_entry_rcu(tt_common, head, hash_entry) {
2549 2550 2551 2552 2553 2554
			/* compute the CRC only for entries belonging to the
			 * VLAN identified by vid
			 */
			if (tt_common->vid != vid)
				continue;

2555
			/* not yet committed clients have not to be taken into
2556 2557
			 * account while computing the CRC
			 */
2558
			if (tt_common->flags & BATADV_TT_CLIENT_NEW)
2559
				continue;
2560

2561 2562 2563 2564 2565
			/* use network order to read the VID: this ensures that
			 * every node reads the bytes in the same order.
			 */
			tmp_vid = htons(tt_common->vid);
			crc_tmp = crc32c(0, &tmp_vid, sizeof(tmp_vid));
2566 2567 2568 2569 2570 2571 2572

			/* compute the CRC on flags that have to be kept in sync
			 * among nodes
			 */
			flags = tt_common->flags & BATADV_TT_SYNC_MASK;
			crc_tmp = crc32c(crc_tmp, &flags, sizeof(flags));

2573
			crc ^= crc32c(crc_tmp, tt_common->addr, ETH_ALEN);
2574 2575 2576 2577
		}
		rcu_read_unlock();
	}

2578
	return crc;
2579 2580
}

2581
/**
2582
 * batadv_tt_req_node_release() - free tt_req node entry
2583 2584 2585 2586 2587 2588 2589 2590
 * @ref: kref pointer of the tt req_node entry
 */
static void batadv_tt_req_node_release(struct kref *ref)
{
	struct batadv_tt_req_node *tt_req_node;

	tt_req_node = container_of(ref, struct batadv_tt_req_node, refcount);

2591
	kmem_cache_free(batadv_tt_req_cache, tt_req_node);
2592 2593 2594
}

/**
2595
 * batadv_tt_req_node_put() - decrement the tt_req_node refcounter and
2596 2597 2598 2599 2600
 *  possibly release it
 * @tt_req_node: tt_req_node to be free'd
 */
static void batadv_tt_req_node_put(struct batadv_tt_req_node *tt_req_node)
{
2601 2602 2603
	if (!tt_req_node)
		return;

2604 2605 2606
	kref_put(&tt_req_node->refcount, batadv_tt_req_node_release);
}

2607
static void batadv_tt_req_list_free(struct batadv_priv *bat_priv)
2608
{
2609 2610
	struct batadv_tt_req_node *node;
	struct hlist_node *safe;
2611

2612
	spin_lock_bh(&bat_priv->tt.req_list_lock);
2613

2614 2615
	hlist_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
		hlist_del_init(&node->list);
2616
		batadv_tt_req_node_put(node);
2617 2618
	}

2619
	spin_unlock_bh(&bat_priv->tt.req_list_lock);
2620 2621
}

2622 2623
static void batadv_tt_save_orig_buffer(struct batadv_priv *bat_priv,
				       struct batadv_orig_node *orig_node,
2624
				       const void *tt_buff,
2625
				       u16 tt_buff_len)
2626 2627
{
	/* Replace the old buffer only if I received something in the
2628 2629
	 * last OGM (the OGM could carry no changes)
	 */
2630 2631 2632 2633 2634 2635 2636 2637 2638 2639 2640 2641 2642
	spin_lock_bh(&orig_node->tt_buff_lock);
	if (tt_buff_len > 0) {
		kfree(orig_node->tt_buff);
		orig_node->tt_buff_len = 0;
		orig_node->tt_buff = kmalloc(tt_buff_len, GFP_ATOMIC);
		if (orig_node->tt_buff) {
			memcpy(orig_node->tt_buff, tt_buff, tt_buff_len);
			orig_node->tt_buff_len = tt_buff_len;
		}
	}
	spin_unlock_bh(&orig_node->tt_buff_lock);
}

2643
static void batadv_tt_req_purge(struct batadv_priv *bat_priv)
2644
{
2645 2646
	struct batadv_tt_req_node *node;
	struct hlist_node *safe;
2647

2648
	spin_lock_bh(&bat_priv->tt.req_list_lock);
2649
	hlist_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
2650 2651
		if (batadv_has_timed_out(node->issued_at,
					 BATADV_TT_REQUEST_TIMEOUT)) {
2652
			hlist_del_init(&node->list);
2653
			batadv_tt_req_node_put(node);
2654 2655
		}
	}
2656
	spin_unlock_bh(&bat_priv->tt.req_list_lock);
2657 2658
}

2659
/**
2660
 * batadv_tt_req_node_new() - search and possibly create a tt_req_node object
2661 2662 2663
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: orig node this request is being issued for
 *
2664
 * Return: the pointer to the new tt_req_node struct if no request
2665
 * has already been issued for this orig_node, NULL otherwise.
2666
 */
2667
static struct batadv_tt_req_node *
2668
batadv_tt_req_node_new(struct batadv_priv *bat_priv,
2669
		       struct batadv_orig_node *orig_node)
2670
{
2671
	struct batadv_tt_req_node *tt_req_node_tmp, *tt_req_node = NULL;
2672

2673
	spin_lock_bh(&bat_priv->tt.req_list_lock);
2674
	hlist_for_each_entry(tt_req_node_tmp, &bat_priv->tt.req_list, list) {
2675 2676
		if (batadv_compare_eth(tt_req_node_tmp, orig_node) &&
		    !batadv_has_timed_out(tt_req_node_tmp->issued_at,
2677
					  BATADV_TT_REQUEST_TIMEOUT))
2678 2679 2680
			goto unlock;
	}

2681
	tt_req_node = kmem_cache_alloc(batadv_tt_req_cache, GFP_ATOMIC);
2682 2683 2684
	if (!tt_req_node)
		goto unlock;

2685
	kref_init(&tt_req_node->refcount);
2686
	ether_addr_copy(tt_req_node->addr, orig_node->orig);
2687 2688
	tt_req_node->issued_at = jiffies;

2689
	kref_get(&tt_req_node->refcount);
2690
	hlist_add_head(&tt_req_node->list, &bat_priv->tt.req_list);
2691
unlock:
2692
	spin_unlock_bh(&bat_priv->tt.req_list_lock);
2693 2694 2695
	return tt_req_node;
}

2696
/**
2697
 * batadv_tt_local_valid() - verify local tt entry and get flags
2698 2699
 * @entry_ptr: to be checked local tt entry
 * @data_ptr: not used but definition required to satisfy the callback prototype
2700 2701 2702 2703
 * @flags: a pointer to store TT flags for this client to
 *
 * Checks the validity of the given local TT entry. If it is, then the provided
 * flags pointer is updated.
2704
 *
2705
 * Return: true if the entry is a valid, false otherwise.
2706
 */
2707 2708 2709
static bool batadv_tt_local_valid(const void *entry_ptr,
				  const void *data_ptr,
				  u8 *flags)
2710
{
2711
	const struct batadv_tt_common_entry *tt_common_entry = entry_ptr;
2712

2713
	if (tt_common_entry->flags & BATADV_TT_CLIENT_NEW)
2714
		return false;
2715 2716 2717 2718

	if (flags)
		*flags = tt_common_entry->flags;

2719
	return true;
2720 2721
}

2722 2723 2724 2725 2726 2727 2728 2729 2730 2731 2732 2733
/**
 * batadv_tt_global_valid() - verify global tt entry and get flags
 * @entry_ptr: to be checked global tt entry
 * @data_ptr: an orig_node object (may be NULL)
 * @flags: a pointer to store TT flags for this client to
 *
 * Checks the validity of the given global TT entry. If it is, then the provided
 * flags pointer is updated either with the common (summed) TT flags if data_ptr
 * is NULL or the specific, per originator TT flags otherwise.
 *
 * Return: true if the entry is a valid, false otherwise.
 */
2734
static bool batadv_tt_global_valid(const void *entry_ptr,
2735 2736
				   const void *data_ptr,
				   u8 *flags)
2737
{
2738 2739 2740
	const struct batadv_tt_common_entry *tt_common_entry = entry_ptr;
	const struct batadv_tt_global_entry *tt_global_entry;
	const struct batadv_orig_node *orig_node = data_ptr;
2741

2742 2743
	if (tt_common_entry->flags & BATADV_TT_CLIENT_ROAM ||
	    tt_common_entry->flags & BATADV_TT_CLIENT_TEMP)
2744
		return false;
2745

2746 2747
	tt_global_entry = container_of(tt_common_entry,
				       struct batadv_tt_global_entry,
2748 2749
				       common);

2750 2751
	return batadv_tt_global_entry_has_orig(tt_global_entry, orig_node,
					       flags);
2752 2753
}

2754
/**
2755
 * batadv_tt_tvlv_generate() - fill the tvlv buff with the tt entries from the
2756
 *  specified tt hash
2757 2758 2759
 * @bat_priv: the bat priv with all the soft interface information
 * @hash: hash table containing the tt entries
 * @tt_len: expected tvlv tt data buffer length in number of bytes
2760
 * @tvlv_buff: pointer to the buffer to fill with the TT data
2761
 * @valid_cb: function to filter tt change entries and to return TT flags
2762
 * @cb_data: data passed to the filter function as argument
2763 2764 2765
 *
 * Fills the tvlv buff with the tt entries from the specified hash. If valid_cb
 * is not provided then this becomes a no-op.
2766
 */
2767 2768
static void batadv_tt_tvlv_generate(struct batadv_priv *bat_priv,
				    struct batadv_hashtable *hash,
2769
				    void *tvlv_buff, u16 tt_len,
2770
				    bool (*valid_cb)(const void *,
2771 2772
						     const void *,
						     u8 *flags),
2773
				    void *cb_data)
2774
{
2775
	struct batadv_tt_common_entry *tt_common_entry;
2776
	struct batadv_tvlv_tt_change *tt_change;
2777
	struct hlist_head *head;
2778
	u16 tt_tot, tt_num_entries = 0;
2779 2780
	u8 flags;
	bool ret;
2781
	u32 i;
2782

2783
	tt_tot = batadv_tt_entries(tt_len);
2784
	tt_change = (struct batadv_tvlv_tt_change *)tvlv_buff;
2785

2786 2787 2788
	if (!valid_cb)
		return;

2789 2790 2791 2792
	rcu_read_lock();
	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

2793
		hlist_for_each_entry_rcu(tt_common_entry,
2794
					 head, hash_entry) {
2795
			if (tt_tot == tt_num_entries)
2796 2797
				break;

2798 2799
			ret = valid_cb(tt_common_entry, cb_data, &flags);
			if (!ret)
2800 2801
				continue;

2802
			ether_addr_copy(tt_change->addr, tt_common_entry->addr);
2803
			tt_change->flags = flags;
2804
			tt_change->vid = htons(tt_common_entry->vid);
2805 2806
			memset(tt_change->reserved, 0,
			       sizeof(tt_change->reserved));
2807

2808
			tt_num_entries++;
2809 2810 2811 2812
			tt_change++;
		}
	}
	rcu_read_unlock();
2813
}
2814

2815
/**
2816
 * batadv_tt_global_check_crc() - check if all the CRCs are correct
2817 2818 2819 2820
 * @orig_node: originator for which the CRCs have to be checked
 * @tt_vlan: pointer to the first tvlv VLAN entry
 * @num_vlan: number of tvlv VLAN entries
 *
2821
 * Return: true if all the received CRCs match the locally stored ones, false
2822 2823 2824 2825
 * otherwise
 */
static bool batadv_tt_global_check_crc(struct batadv_orig_node *orig_node,
				       struct batadv_tvlv_tt_vlan_data *tt_vlan,
2826
				       u16 num_vlan)
2827 2828 2829
{
	struct batadv_tvlv_tt_vlan_data *tt_vlan_tmp;
	struct batadv_orig_node_vlan *vlan;
2830
	int i, orig_num_vlan;
2831
	u32 crc;
2832 2833 2834 2835 2836 2837 2838 2839 2840

	/* check if each received CRC matches the locally stored one */
	for (i = 0; i < num_vlan; i++) {
		tt_vlan_tmp = tt_vlan + i;

		/* if orig_node is a backbone node for this VLAN, don't check
		 * the CRC as we ignore all the global entries over it
		 */
		if (batadv_bla_is_backbone_gw_orig(orig_node->bat_priv,
2841 2842
						   orig_node->orig,
						   ntohs(tt_vlan_tmp->vid)))
2843 2844 2845 2846 2847 2848 2849
			continue;

		vlan = batadv_orig_node_vlan_get(orig_node,
						 ntohs(tt_vlan_tmp->vid));
		if (!vlan)
			return false;

2850
		crc = vlan->tt.crc;
2851
		batadv_orig_node_vlan_put(vlan);
2852 2853

		if (crc != ntohl(tt_vlan_tmp->crc))
2854 2855 2856
			return false;
	}

2857 2858 2859 2860 2861 2862 2863 2864 2865 2866 2867 2868
	/* check if any excess VLANs exist locally for the originator
	 * which are not mentioned in the TVLV from the originator.
	 */
	rcu_read_lock();
	orig_num_vlan = 0;
	hlist_for_each_entry_rcu(vlan, &orig_node->vlan_list, list)
		orig_num_vlan++;
	rcu_read_unlock();

	if (orig_num_vlan > num_vlan)
		return false;

2869 2870 2871 2872
	return true;
}

/**
2873
 * batadv_tt_local_update_crc() - update all the local CRCs
2874 2875 2876 2877 2878 2879 2880 2881 2882 2883 2884 2885 2886 2887 2888
 * @bat_priv: the bat priv with all the soft interface information
 */
static void batadv_tt_local_update_crc(struct batadv_priv *bat_priv)
{
	struct batadv_softif_vlan *vlan;

	/* recompute the global CRC for each VLAN */
	rcu_read_lock();
	hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
		vlan->tt.crc = batadv_tt_local_crc(bat_priv, vlan->vid);
	}
	rcu_read_unlock();
}

/**
2889
 * batadv_tt_global_update_crc() - update all the global CRCs for this orig_node
2890 2891 2892 2893 2894 2895 2896
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: the orig_node for which the CRCs have to be updated
 */
static void batadv_tt_global_update_crc(struct batadv_priv *bat_priv,
					struct batadv_orig_node *orig_node)
{
	struct batadv_orig_node_vlan *vlan;
2897
	u32 crc;
2898 2899 2900

	/* recompute the global CRC for each VLAN */
	rcu_read_lock();
2901
	hlist_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) {
2902 2903 2904
		/* if orig_node is a backbone node for this VLAN, don't compute
		 * the CRC as we ignore all the global entries over it
		 */
2905 2906
		if (batadv_bla_is_backbone_gw_orig(bat_priv, orig_node->orig,
						   vlan->vid))
2907 2908 2909 2910 2911 2912
			continue;

		crc = batadv_tt_global_crc(bat_priv, orig_node, vlan->vid);
		vlan->tt.crc = crc;
	}
	rcu_read_unlock();
2913 2914
}

2915
/**
2916
 * batadv_send_tt_request() - send a TT Request message to a given node
2917 2918 2919
 * @bat_priv: the bat priv with all the soft interface information
 * @dst_orig_node: the destination of the message
 * @ttvn: the version number that the source of the message is looking for
2920 2921
 * @tt_vlan: pointer to the first tvlv VLAN object to request
 * @num_vlan: number of tvlv VLAN entries
2922 2923
 * @full_table: ask for the entire translation table if true, while only for the
 *  last TT diff otherwise
2924 2925
 *
 * Return: true if the TT Request was sent, false otherwise
2926
 */
2927 2928 2929 2930 2931
static bool batadv_send_tt_request(struct batadv_priv *bat_priv,
				   struct batadv_orig_node *dst_orig_node,
				   u8 ttvn,
				   struct batadv_tvlv_tt_vlan_data *tt_vlan,
				   u16 num_vlan, bool full_table)
2932
{
2933
	struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
2934
	struct batadv_tt_req_node *tt_req_node = NULL;
2935 2936
	struct batadv_tvlv_tt_vlan_data *tt_vlan_req;
	struct batadv_hard_iface *primary_if;
2937
	bool ret = false;
2938
	int i, size;
2939

2940
	primary_if = batadv_primary_if_get_selected(bat_priv);
2941 2942 2943 2944
	if (!primary_if)
		goto out;

	/* The new tt_req will be issued only if I'm not waiting for a
2945 2946
	 * reply from the same orig_node yet
	 */
2947
	tt_req_node = batadv_tt_req_node_new(bat_priv, dst_orig_node);
2948 2949 2950
	if (!tt_req_node)
		goto out;

2951 2952
	size = sizeof(*tvlv_tt_data) + sizeof(*tt_vlan_req) * num_vlan;
	tvlv_tt_data = kzalloc(size, GFP_ATOMIC);
2953
	if (!tvlv_tt_data)
2954 2955
		goto out;

2956 2957
	tvlv_tt_data->flags = BATADV_TT_REQUEST;
	tvlv_tt_data->ttvn = ttvn;
2958 2959 2960 2961 2962 2963 2964 2965 2966 2967 2968 2969 2970
	tvlv_tt_data->num_vlan = htons(num_vlan);

	/* send all the CRCs within the request. This is needed by intermediate
	 * nodes to ensure they have the correct table before replying
	 */
	tt_vlan_req = (struct batadv_tvlv_tt_vlan_data *)(tvlv_tt_data + 1);
	for (i = 0; i < num_vlan; i++) {
		tt_vlan_req->vid = tt_vlan->vid;
		tt_vlan_req->crc = tt_vlan->crc;

		tt_vlan_req++;
		tt_vlan++;
	}
2971 2972

	if (full_table)
2973
		tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
2974

2975
	batadv_dbg(BATADV_DBG_TT, bat_priv, "Sending TT_REQUEST to %pM [%c]\n",
2976
		   dst_orig_node->orig, full_table ? 'F' : '.');
2977

2978
	batadv_inc_counter(bat_priv, BATADV_CNT_TT_REQUEST_TX);
2979 2980
	batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
				 dst_orig_node->orig, BATADV_TVLV_TT, 1,
2981
				 tvlv_tt_data, size);
2982
	ret = true;
2983 2984 2985

out:
	if (primary_if)
2986
		batadv_hardif_put(primary_if);
2987

2988
	if (ret && tt_req_node) {
2989
		spin_lock_bh(&bat_priv->tt.req_list_lock);
2990 2991 2992 2993
		if (!hlist_unhashed(&tt_req_node->list)) {
			hlist_del_init(&tt_req_node->list);
			batadv_tt_req_node_put(tt_req_node);
		}
2994
		spin_unlock_bh(&bat_priv->tt.req_list_lock);
2995
	}
2996 2997 2998 2999

	if (tt_req_node)
		batadv_tt_req_node_put(tt_req_node);

3000
	kfree(tvlv_tt_data);
3001 3002 3003
	return ret;
}

3004
/**
3005
 * batadv_send_other_tt_response() - send reply to tt request concerning another
3006 3007 3008 3009 3010 3011
 *  node's translation table
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: tt data containing the tt request information
 * @req_src: mac address of tt request sender
 * @req_dst: mac address of tt request recipient
 *
3012
 * Return: true if tt request reply was sent, false otherwise.
3013 3014 3015
 */
static bool batadv_send_other_tt_response(struct batadv_priv *bat_priv,
					  struct batadv_tvlv_tt_data *tt_data,
3016
					  u8 *req_src, u8 *req_dst)
3017
{
3018
	struct batadv_orig_node *req_dst_orig_node;
3019
	struct batadv_orig_node *res_dst_orig_node = NULL;
3020
	struct batadv_tvlv_tt_change *tt_change;
3021
	struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
3022
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
3023
	bool ret = false, full_table;
3024 3025 3026
	u8 orig_ttvn, req_ttvn;
	u16 tvlv_len;
	s32 tt_len;
3027

3028
	batadv_dbg(BATADV_DBG_TT, bat_priv,
3029
		   "Received TT_REQUEST from %pM for ttvn: %u (%pM) [%c]\n",
3030
		   req_src, tt_data->ttvn, req_dst,
3031
		   ((tt_data->flags & BATADV_TT_FULL_TABLE) ? 'F' : '.'));
3032 3033

	/* Let's get the orig node of the REAL destination */
3034
	req_dst_orig_node = batadv_orig_hash_find(bat_priv, req_dst);
3035 3036 3037
	if (!req_dst_orig_node)
		goto out;

3038
	res_dst_orig_node = batadv_orig_hash_find(bat_priv, req_src);
3039 3040 3041
	if (!res_dst_orig_node)
		goto out;

3042
	orig_ttvn = (u8)atomic_read(&req_dst_orig_node->last_ttvn);
3043
	req_ttvn = tt_data->ttvn;
3044

3045
	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(tt_data + 1);
3046
	/* this node doesn't have the requested data */
3047
	if (orig_ttvn != req_ttvn ||
3048 3049
	    !batadv_tt_global_check_crc(req_dst_orig_node, tt_vlan,
					ntohs(tt_data->num_vlan)))
3050 3051
		goto out;

3052
	/* If the full table has been explicitly requested */
3053
	if (tt_data->flags & BATADV_TT_FULL_TABLE ||
3054 3055 3056 3057 3058
	    !req_dst_orig_node->tt_buff)
		full_table = true;
	else
		full_table = false;

3059 3060
	/* TT fragmentation hasn't been implemented yet, so send as many
	 * TT entries fit a single packet as possible only
3061
	 */
3062 3063 3064 3065
	if (!full_table) {
		spin_lock_bh(&req_dst_orig_node->tt_buff_lock);
		tt_len = req_dst_orig_node->tt_buff_len;

3066 3067 3068 3069 3070
		tvlv_len = batadv_tt_prepare_tvlv_global_data(req_dst_orig_node,
							      &tvlv_tt_data,
							      &tt_change,
							      &tt_len);
		if (!tt_len)
3071 3072 3073
			goto unlock;

		/* Copy the last orig_node's OGM buffer */
3074
		memcpy(tt_change, req_dst_orig_node->tt_buff,
3075 3076 3077
		       req_dst_orig_node->tt_buff_len);
		spin_unlock_bh(&req_dst_orig_node->tt_buff_lock);
	} else {
3078 3079 3080 3081 3082 3083 3084 3085 3086
		/* allocate the tvlv, put the tt_data and all the tt_vlan_data
		 * in the initial part
		 */
		tt_len = -1;
		tvlv_len = batadv_tt_prepare_tvlv_global_data(req_dst_orig_node,
							      &tvlv_tt_data,
							      &tt_change,
							      &tt_len);
		if (!tt_len)
3087
			goto out;
3088 3089 3090 3091 3092 3093

		/* fill the rest of the tvlv with the real TT entries */
		batadv_tt_tvlv_generate(bat_priv, bat_priv->tt.global_hash,
					tt_change, tt_len,
					batadv_tt_global_valid,
					req_dst_orig_node);
3094 3095
	}

3096 3097 3098 3099 3100 3101 3102 3103 3104
	/* Don't send the response, if larger than fragmented packet. */
	tt_len = sizeof(struct batadv_unicast_tvlv_packet) + tvlv_len;
	if (tt_len > atomic_read(&bat_priv->packet_size_max)) {
		net_ratelimited_function(batadv_info, bat_priv->soft_iface,
					 "Ignoring TT_REQUEST from %pM; Response size exceeds max packet size.\n",
					 res_dst_orig_node->orig);
		goto out;
	}

3105 3106
	tvlv_tt_data->flags = BATADV_TT_RESPONSE;
	tvlv_tt_data->ttvn = req_ttvn;
3107 3108

	if (full_table)
3109
		tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
3110

3111
	batadv_dbg(BATADV_DBG_TT, bat_priv,
3112 3113 3114
		   "Sending TT_RESPONSE %pM for %pM [%c] (ttvn: %u)\n",
		   res_dst_orig_node->orig, req_dst_orig_node->orig,
		   full_table ? 'F' : '.', req_ttvn);
3115

3116
	batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_TX);
3117

3118
	batadv_tvlv_unicast_send(bat_priv, req_dst_orig_node->orig,
3119 3120
				 req_src, BATADV_TVLV_TT, 1, tvlv_tt_data,
				 tvlv_len);
3121

3122
	ret = true;
3123 3124 3125 3126 3127 3128 3129
	goto out;

unlock:
	spin_unlock_bh(&req_dst_orig_node->tt_buff_lock);

out:
	if (res_dst_orig_node)
3130
		batadv_orig_node_put(res_dst_orig_node);
3131
	if (req_dst_orig_node)
3132
		batadv_orig_node_put(req_dst_orig_node);
3133
	kfree(tvlv_tt_data);
3134 3135
	return ret;
}
3136

3137
/**
3138 3139
 * batadv_send_my_tt_response() - send reply to tt request concerning this
 *  node's translation table
3140 3141 3142 3143
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: tt data containing the tt request information
 * @req_src: mac address of tt request sender
 *
3144
 * Return: true if tt request reply was sent, false otherwise.
3145 3146 3147
 */
static bool batadv_send_my_tt_response(struct batadv_priv *bat_priv,
				       struct batadv_tvlv_tt_data *tt_data,
3148
				       u8 *req_src)
3149
{
3150
	struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
3151
	struct batadv_hard_iface *primary_if = NULL;
3152 3153
	struct batadv_tvlv_tt_change *tt_change;
	struct batadv_orig_node *orig_node;
3154 3155
	u8 my_ttvn, req_ttvn;
	u16 tvlv_len;
3156
	bool full_table;
3157
	s32 tt_len;
3158

3159
	batadv_dbg(BATADV_DBG_TT, bat_priv,
3160
		   "Received TT_REQUEST from %pM for ttvn: %u (me) [%c]\n",
3161
		   req_src, tt_data->ttvn,
3162
		   ((tt_data->flags & BATADV_TT_FULL_TABLE) ? 'F' : '.'));
3163

3164
	spin_lock_bh(&bat_priv->tt.commit_lock);
3165

3166
	my_ttvn = (u8)atomic_read(&bat_priv->tt.vn);
3167
	req_ttvn = tt_data->ttvn;
3168

3169
	orig_node = batadv_orig_hash_find(bat_priv, req_src);
3170 3171 3172
	if (!orig_node)
		goto out;

3173
	primary_if = batadv_primary_if_get_selected(bat_priv);
3174 3175 3176 3177
	if (!primary_if)
		goto out;

	/* If the full table has been explicitly requested or the gap
3178 3179
	 * is too big send the whole local translation table
	 */
3180
	if (tt_data->flags & BATADV_TT_FULL_TABLE || my_ttvn != req_ttvn ||
3181
	    !bat_priv->tt.last_changeset)
3182 3183 3184 3185
		full_table = true;
	else
		full_table = false;

3186 3187
	/* TT fragmentation hasn't been implemented yet, so send as many
	 * TT entries fit a single packet as possible only
3188
	 */
3189
	if (!full_table) {
3190
		spin_lock_bh(&bat_priv->tt.last_changeset_lock);
3191

3192 3193 3194 3195 3196
		tt_len = bat_priv->tt.last_changeset_len;
		tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv,
							     &tvlv_tt_data,
							     &tt_change,
							     &tt_len);
3197
		if (!tt_len || !tvlv_len)
3198 3199
			goto unlock;

3200
		/* Copy the last orig_node's OGM buffer */
3201
		memcpy(tt_change, bat_priv->tt.last_changeset,
3202 3203
		       bat_priv->tt.last_changeset_len);
		spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
3204
	} else {
3205
		req_ttvn = (u8)atomic_read(&bat_priv->tt.vn);
3206

3207 3208 3209 3210 3211 3212 3213 3214
		/* allocate the tvlv, put the tt_data and all the tt_vlan_data
		 * in the initial part
		 */
		tt_len = -1;
		tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv,
							     &tvlv_tt_data,
							     &tt_change,
							     &tt_len);
3215
		if (!tt_len || !tvlv_len)
3216
			goto out;
3217 3218 3219 3220 3221

		/* fill the rest of the tvlv with the real TT entries */
		batadv_tt_tvlv_generate(bat_priv, bat_priv->tt.local_hash,
					tt_change, tt_len,
					batadv_tt_local_valid, NULL);
3222 3223
	}

3224 3225
	tvlv_tt_data->flags = BATADV_TT_RESPONSE;
	tvlv_tt_data->ttvn = req_ttvn;
3226 3227

	if (full_table)
3228
		tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
3229

3230
	batadv_dbg(BATADV_DBG_TT, bat_priv,
3231 3232
		   "Sending TT_RESPONSE to %pM [%c] (ttvn: %u)\n",
		   orig_node->orig, full_table ? 'F' : '.', req_ttvn);
3233

3234
	batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_TX);
3235

3236
	batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
3237 3238
				 req_src, BATADV_TVLV_TT, 1, tvlv_tt_data,
				 tvlv_len);
3239

3240 3241 3242
	goto out;

unlock:
3243
	spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
3244
out:
3245
	spin_unlock_bh(&bat_priv->tt.commit_lock);
3246
	if (orig_node)
3247
		batadv_orig_node_put(orig_node);
3248
	if (primary_if)
3249
		batadv_hardif_put(primary_if);
3250 3251
	kfree(tvlv_tt_data);
	/* The packet was for this host, so it doesn't need to be re-routed */
3252 3253 3254
	return true;
}

3255
/**
3256
 * batadv_send_tt_response() - send reply to tt request
3257 3258 3259 3260 3261
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: tt data containing the tt request information
 * @req_src: mac address of tt request sender
 * @req_dst: mac address of tt request recipient
 *
3262
 * Return: true if tt request reply was sent, false otherwise.
3263 3264 3265
 */
static bool batadv_send_tt_response(struct batadv_priv *bat_priv,
				    struct batadv_tvlv_tt_data *tt_data,
3266
				    u8 *req_src, u8 *req_dst)
3267
{
3268
	if (batadv_is_my_mac(bat_priv, req_dst))
3269
		return batadv_send_my_tt_response(bat_priv, tt_data, req_src);
3270 3271
	return batadv_send_other_tt_response(bat_priv, tt_data, req_src,
					     req_dst);
3272 3273
}

3274 3275
static void _batadv_tt_update_changes(struct batadv_priv *bat_priv,
				      struct batadv_orig_node *orig_node,
3276
				      struct batadv_tvlv_tt_change *tt_change,
3277
				      u16 tt_num_changes, u8 ttvn)
3278 3279
{
	int i;
3280
	int roams;
3281 3282

	for (i = 0; i < tt_num_changes; i++) {
3283 3284
		if ((tt_change + i)->flags & BATADV_TT_CLIENT_DEL) {
			roams = (tt_change + i)->flags & BATADV_TT_CLIENT_ROAM;
3285 3286
			batadv_tt_global_del(bat_priv, orig_node,
					     (tt_change + i)->addr,
3287
					     ntohs((tt_change + i)->vid),
3288 3289
					     "tt removed by changes",
					     roams);
3290 3291
		} else {
			if (!batadv_tt_global_add(bat_priv, orig_node,
3292
						  (tt_change + i)->addr,
3293
						  ntohs((tt_change + i)->vid),
3294
						  (tt_change + i)->flags, ttvn))
3295 3296 3297 3298 3299 3300 3301
				/* In case of problem while storing a
				 * global_entry, we stop the updating
				 * procedure without committing the
				 * ttvn change. This will avoid to send
				 * corrupted data on tt_request
				 */
				return;
3302
		}
3303
	}
3304
	set_bit(BATADV_ORIG_CAPA_HAS_TT, &orig_node->capa_initialized);
3305 3306
}

3307
static void batadv_tt_fill_gtable(struct batadv_priv *bat_priv,
3308
				  struct batadv_tvlv_tt_change *tt_change,
3309 3310
				  u8 ttvn, u8 *resp_src,
				  u16 num_entries)
3311
{
3312
	struct batadv_orig_node *orig_node;
3313

3314
	orig_node = batadv_orig_hash_find(bat_priv, resp_src);
3315 3316 3317 3318
	if (!orig_node)
		goto out;

	/* Purge the old table first.. */
3319 3320
	batadv_tt_global_del_orig(bat_priv, orig_node, -1,
				  "Received full table");
3321

3322 3323
	_batadv_tt_update_changes(bat_priv, orig_node, tt_change, num_entries,
				  ttvn);
3324 3325 3326 3327 3328 3329 3330

	spin_lock_bh(&orig_node->tt_buff_lock);
	kfree(orig_node->tt_buff);
	orig_node->tt_buff_len = 0;
	orig_node->tt_buff = NULL;
	spin_unlock_bh(&orig_node->tt_buff_lock);

3331
	atomic_set(&orig_node->last_ttvn, ttvn);
3332 3333 3334

out:
	if (orig_node)
3335
		batadv_orig_node_put(orig_node);
3336 3337
}

3338 3339
static void batadv_tt_update_changes(struct batadv_priv *bat_priv,
				     struct batadv_orig_node *orig_node,
3340
				     u16 tt_num_changes, u8 ttvn,
3341
				     struct batadv_tvlv_tt_change *tt_change)
3342
{
3343 3344
	_batadv_tt_update_changes(bat_priv, orig_node, tt_change,
				  tt_num_changes, ttvn);
3345

3346 3347
	batadv_tt_save_orig_buffer(bat_priv, orig_node, tt_change,
				   batadv_tt_len(tt_num_changes));
3348 3349 3350
	atomic_set(&orig_node->last_ttvn, ttvn);
}

3351
/**
3352
 * batadv_is_my_client() - check if a client is served by the local node
3353
 * @bat_priv: the bat priv with all the soft interface information
3354
 * @addr: the mac address of the client to check
3355 3356
 * @vid: VLAN identifier
 *
3357
 * Return: true if the client is served by this node, false otherwise.
3358
 */
3359
bool batadv_is_my_client(struct batadv_priv *bat_priv, const u8 *addr,
3360
			 unsigned short vid)
3361
{
3362
	struct batadv_tt_local_entry *tt_local_entry;
3363
	bool ret = false;
3364

3365
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
3366 3367
	if (!tt_local_entry)
		goto out;
3368
	/* Check if the client has been logically deleted (but is kept for
3369 3370
	 * consistency purpose)
	 */
3371 3372
	if ((tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING) ||
	    (tt_local_entry->common.flags & BATADV_TT_CLIENT_ROAM))
3373
		goto out;
3374 3375
	ret = true;
out:
3376
	if (tt_local_entry)
3377
		batadv_tt_local_entry_put(tt_local_entry);
3378
	return ret;
3379 3380
}

3381
/**
3382
 * batadv_handle_tt_response() - process incoming tt reply
3383 3384 3385 3386 3387 3388 3389
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: tt data containing the tt request information
 * @resp_src: mac address of tt reply sender
 * @num_entries: number of tt change entries appended to the tt data
 */
static void batadv_handle_tt_response(struct batadv_priv *bat_priv,
				      struct batadv_tvlv_tt_data *tt_data,
3390
				      u8 *resp_src, u16 num_entries)
3391
{
3392 3393
	struct batadv_tt_req_node *node;
	struct hlist_node *safe;
3394
	struct batadv_orig_node *orig_node = NULL;
3395
	struct batadv_tvlv_tt_change *tt_change;
3396 3397
	u8 *tvlv_ptr = (u8 *)tt_data;
	u16 change_offset;
3398

3399
	batadv_dbg(BATADV_DBG_TT, bat_priv,
3400
		   "Received TT_RESPONSE from %pM for ttvn %d t_size: %d [%c]\n",
3401
		   resp_src, tt_data->ttvn, num_entries,
3402
		   ((tt_data->flags & BATADV_TT_FULL_TABLE) ? 'F' : '.'));
3403

3404
	orig_node = batadv_orig_hash_find(bat_priv, resp_src);
3405 3406 3407
	if (!orig_node)
		goto out;

3408 3409
	spin_lock_bh(&orig_node->tt_lock);

3410 3411 3412 3413 3414 3415
	change_offset = sizeof(struct batadv_tvlv_tt_vlan_data);
	change_offset *= ntohs(tt_data->num_vlan);
	change_offset += sizeof(*tt_data);
	tvlv_ptr += change_offset;

	tt_change = (struct batadv_tvlv_tt_change *)tvlv_ptr;
3416
	if (tt_data->flags & BATADV_TT_FULL_TABLE) {
3417 3418
		batadv_tt_fill_gtable(bat_priv, tt_change, tt_data->ttvn,
				      resp_src, num_entries);
3419
	} else {
3420 3421
		batadv_tt_update_changes(bat_priv, orig_node, num_entries,
					 tt_data->ttvn, tt_change);
3422
	}
3423

3424
	/* Recalculate the CRC for this orig_node and store it */
3425
	batadv_tt_global_update_crc(bat_priv, orig_node);
3426 3427 3428

	spin_unlock_bh(&orig_node->tt_lock);

3429
	/* Delete the tt_req_node from pending tt_requests list */
3430
	spin_lock_bh(&bat_priv->tt.req_list_lock);
3431
	hlist_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
3432
		if (!batadv_compare_eth(node->addr, resp_src))
3433
			continue;
3434
		hlist_del_init(&node->list);
3435
		batadv_tt_req_node_put(node);
3436
	}
3437

3438
	spin_unlock_bh(&bat_priv->tt.req_list_lock);
3439 3440
out:
	if (orig_node)
3441
		batadv_orig_node_put(orig_node);
3442 3443
}

3444
static void batadv_tt_roam_list_free(struct batadv_priv *bat_priv)
3445
{
3446
	struct batadv_tt_roam_node *node, *safe;
3447

3448
	spin_lock_bh(&bat_priv->tt.roam_list_lock);
3449

3450
	list_for_each_entry_safe(node, safe, &bat_priv->tt.roam_list, list) {
3451
		list_del(&node->list);
3452
		kmem_cache_free(batadv_tt_roam_cache, node);
3453 3454
	}

3455
	spin_unlock_bh(&bat_priv->tt.roam_list_lock);
3456 3457
}

3458
static void batadv_tt_roam_purge(struct batadv_priv *bat_priv)
3459
{
3460
	struct batadv_tt_roam_node *node, *safe;
3461

3462 3463
	spin_lock_bh(&bat_priv->tt.roam_list_lock);
	list_for_each_entry_safe(node, safe, &bat_priv->tt.roam_list, list) {
3464 3465
		if (!batadv_has_timed_out(node->first_time,
					  BATADV_ROAMING_MAX_TIME))
3466 3467 3468
			continue;

		list_del(&node->list);
3469
		kmem_cache_free(batadv_tt_roam_cache, node);
3470
	}
3471
	spin_unlock_bh(&bat_priv->tt.roam_list_lock);
3472 3473
}

3474
/**
3475
 * batadv_tt_check_roam_count() - check if a client has roamed too frequently
3476 3477
 * @bat_priv: the bat priv with all the soft interface information
 * @client: mac address of the roaming client
3478 3479
 *
 * This function checks whether the client already reached the
3480 3481 3482
 * maximum number of possible roaming phases. In this case the ROAMING_ADV
 * will not be sent.
 *
3483
 * Return: true if the ROAMING_ADV can be sent, false otherwise
3484
 */
3485
static bool batadv_tt_check_roam_count(struct batadv_priv *bat_priv, u8 *client)
3486
{
3487
	struct batadv_tt_roam_node *tt_roam_node;
3488 3489
	bool ret = false;

3490
	spin_lock_bh(&bat_priv->tt.roam_list_lock);
3491
	/* The new tt_req will be issued only if I'm not waiting for a
3492 3493
	 * reply from the same orig_node yet
	 */
3494
	list_for_each_entry(tt_roam_node, &bat_priv->tt.roam_list, list) {
3495
		if (!batadv_compare_eth(tt_roam_node->addr, client))
3496 3497
			continue;

3498
		if (batadv_has_timed_out(tt_roam_node->first_time,
3499
					 BATADV_ROAMING_MAX_TIME))
3500 3501
			continue;

3502
		if (!batadv_atomic_dec_not_zero(&tt_roam_node->counter))
3503 3504 3505 3506 3507 3508 3509
			/* Sorry, you roamed too many times! */
			goto unlock;
		ret = true;
		break;
	}

	if (!ret) {
3510 3511
		tt_roam_node = kmem_cache_alloc(batadv_tt_roam_cache,
						GFP_ATOMIC);
3512 3513 3514 3515
		if (!tt_roam_node)
			goto unlock;

		tt_roam_node->first_time = jiffies;
3516 3517
		atomic_set(&tt_roam_node->counter,
			   BATADV_ROAMING_MAX_COUNT - 1);
3518
		ether_addr_copy(tt_roam_node->addr, client);
3519

3520
		list_add(&tt_roam_node->list, &bat_priv->tt.roam_list);
3521 3522 3523 3524
		ret = true;
	}

unlock:
3525
	spin_unlock_bh(&bat_priv->tt.roam_list_lock);
3526 3527 3528
	return ret;
}

3529
/**
3530
 * batadv_send_roam_adv() - send a roaming advertisement message
3531 3532 3533 3534 3535 3536 3537 3538 3539 3540
 * @bat_priv: the bat priv with all the soft interface information
 * @client: mac address of the roaming client
 * @vid: VLAN identifier
 * @orig_node: message destination
 *
 * Send a ROAMING_ADV message to the node which was previously serving this
 * client. This is done to inform the node that from now on all traffic destined
 * for this particular roamed client has to be forwarded to the sender of the
 * roaming message.
 */
3541
static void batadv_send_roam_adv(struct batadv_priv *bat_priv, u8 *client,
3542
				 unsigned short vid,
3543
				 struct batadv_orig_node *orig_node)
3544
{
3545
	struct batadv_hard_iface *primary_if;
3546 3547 3548 3549 3550
	struct batadv_tvlv_roam_adv tvlv_roam;

	primary_if = batadv_primary_if_get_selected(bat_priv);
	if (!primary_if)
		goto out;
3551 3552

	/* before going on we have to check whether the client has
3553 3554
	 * already roamed to us too many times
	 */
3555
	if (!batadv_tt_check_roam_count(bat_priv, client))
3556 3557
		goto out;

3558
	batadv_dbg(BATADV_DBG_TT, bat_priv,
3559
		   "Sending ROAMING_ADV to %pM (client %pM, vid: %d)\n",
3560
		   orig_node->orig, client, batadv_print_vid(vid));
3561

3562
	batadv_inc_counter(bat_priv, BATADV_CNT_TT_ROAM_ADV_TX);
3563

3564
	memcpy(tvlv_roam.client, client, sizeof(tvlv_roam.client));
3565
	tvlv_roam.vid = htons(vid);
3566 3567 3568 3569

	batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
				 orig_node->orig, BATADV_TVLV_ROAM, 1,
				 &tvlv_roam, sizeof(tvlv_roam));
3570 3571

out:
3572
	if (primary_if)
3573
		batadv_hardif_put(primary_if);
3574 3575
}

3576
static void batadv_tt_purge(struct work_struct *work)
3577
{
3578
	struct delayed_work *delayed_work;
3579
	struct batadv_priv_tt *priv_tt;
3580 3581
	struct batadv_priv *bat_priv;

G
Geliang Tang 已提交
3582
	delayed_work = to_delayed_work(work);
3583 3584
	priv_tt = container_of(delayed_work, struct batadv_priv_tt, work);
	bat_priv = container_of(priv_tt, struct batadv_priv, tt);
3585

3586
	batadv_tt_local_purge(bat_priv, BATADV_TT_LOCAL_TIMEOUT);
3587
	batadv_tt_global_purge(bat_priv);
3588 3589
	batadv_tt_req_purge(bat_priv);
	batadv_tt_roam_purge(bat_priv);
3590

3591 3592
	queue_delayed_work(batadv_event_workqueue, &bat_priv->tt.work,
			   msecs_to_jiffies(BATADV_TT_WORK_PERIOD));
3593
}
3594

3595 3596 3597 3598
/**
 * batadv_tt_free() - Free translation table of soft interface
 * @bat_priv: the bat priv with all the soft interface information
 */
3599
void batadv_tt_free(struct batadv_priv *bat_priv)
3600
{
3601 3602
	batadv_tvlv_handler_unregister(bat_priv, BATADV_TVLV_ROAM, 1);

3603 3604 3605
	batadv_tvlv_container_unregister(bat_priv, BATADV_TVLV_TT, 1);
	batadv_tvlv_handler_unregister(bat_priv, BATADV_TVLV_TT, 1);

3606
	cancel_delayed_work_sync(&bat_priv->tt.work);
3607

3608 3609 3610 3611 3612
	batadv_tt_local_table_free(bat_priv);
	batadv_tt_global_table_free(bat_priv);
	batadv_tt_req_list_free(bat_priv);
	batadv_tt_changes_list_free(bat_priv);
	batadv_tt_roam_list_free(bat_priv);
3613

3614
	kfree(bat_priv->tt.last_changeset);
3615
}
3616

3617
/**
3618
 * batadv_tt_local_set_flags() - set or unset the specified flags on the local
3619 3620 3621 3622 3623
 *  table and possibly count them in the TT size
 * @bat_priv: the bat priv with all the soft interface information
 * @flags: the flag to switch
 * @enable: whether to set or unset the flag
 * @count: whether to increase the TT size by the number of changed entries
3624
 */
3625 3626
static void batadv_tt_local_set_flags(struct batadv_priv *bat_priv, u16 flags,
				      bool enable, bool count)
3627
{
3628 3629
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
	struct batadv_tt_common_entry *tt_common_entry;
3630
	struct hlist_head *head;
3631
	u32 i;
3632 3633

	if (!hash)
3634
		return;
3635 3636 3637 3638 3639

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

		rcu_read_lock();
3640
		hlist_for_each_entry_rcu(tt_common_entry,
3641
					 head, hash_entry) {
3642 3643 3644 3645 3646 3647 3648 3649 3650
			if (enable) {
				if ((tt_common_entry->flags & flags) == flags)
					continue;
				tt_common_entry->flags |= flags;
			} else {
				if (!(tt_common_entry->flags & flags))
					continue;
				tt_common_entry->flags &= ~flags;
			}
3651 3652 3653 3654 3655 3656

			if (!count)
				continue;

			batadv_tt_local_size_inc(bat_priv,
						 tt_common_entry->vid);
3657 3658 3659 3660 3661
		}
		rcu_read_unlock();
	}
}

3662
/* Purge out all the tt local entries marked with BATADV_TT_CLIENT_PENDING */
3663
static void batadv_tt_local_purge_pending_clients(struct batadv_priv *bat_priv)
3664
{
3665
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
3666 3667
	struct batadv_tt_common_entry *tt_common;
	struct batadv_tt_local_entry *tt_local;
3668
	struct hlist_node *node_tmp;
3669 3670
	struct hlist_head *head;
	spinlock_t *list_lock; /* protects write access to the hash lists */
3671
	u32 i;
3672 3673 3674 3675 3676 3677 3678 3679 3680

	if (!hash)
		return;

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
		list_lock = &hash->list_locks[i];

		spin_lock_bh(list_lock);
3681
		hlist_for_each_entry_safe(tt_common, node_tmp, head,
3682 3683
					  hash_entry) {
			if (!(tt_common->flags & BATADV_TT_CLIENT_PENDING))
3684 3685
				continue;

3686
			batadv_dbg(BATADV_DBG_TT, bat_priv,
3687 3688
				   "Deleting local tt entry (%pM, vid: %d): pending\n",
				   tt_common->addr,
3689
				   batadv_print_vid(tt_common->vid));
3690

3691
			batadv_tt_local_size_dec(bat_priv, tt_common->vid);
3692
			hlist_del_rcu(&tt_common->hash_entry);
3693 3694 3695
			tt_local = container_of(tt_common,
						struct batadv_tt_local_entry,
						common);
3696

3697
			batadv_tt_local_entry_put(tt_local);
3698 3699 3700 3701 3702
		}
		spin_unlock_bh(list_lock);
	}
}

3703
/**
3704
 * batadv_tt_local_commit_changes_nolock() - commit all pending local tt changes
3705
 *  which have been queued in the time since the last commit
3706
 * @bat_priv: the bat priv with all the soft interface information
3707 3708
 *
 * Caller must hold tt->commit_lock.
3709
 */
3710
static void batadv_tt_local_commit_changes_nolock(struct batadv_priv *bat_priv)
3711
{
3712 3713
	lockdep_assert_held(&bat_priv->tt.commit_lock);

3714 3715 3716
	if (atomic_read(&bat_priv->tt.local_changes) < 1) {
		if (!batadv_atomic_dec_not_zero(&bat_priv->tt.ogm_append_cnt))
			batadv_tt_tvlv_container_update(bat_priv);
3717
		return;
3718
	}
3719

3720
	batadv_tt_local_set_flags(bat_priv, BATADV_TT_CLIENT_NEW, false, true);
3721

3722
	batadv_tt_local_purge_pending_clients(bat_priv);
3723
	batadv_tt_local_update_crc(bat_priv);
3724 3725

	/* Increment the TTVN only once per OGM interval */
3726
	atomic_inc(&bat_priv->tt.vn);
3727
	batadv_dbg(BATADV_DBG_TT, bat_priv,
3728
		   "Local changes committed, updating to ttvn %u\n",
3729
		   (u8)atomic_read(&bat_priv->tt.vn));
3730 3731

	/* reset the sending counter */
3732
	atomic_set(&bat_priv->tt.ogm_append_cnt, BATADV_TT_OGM_APPEND_MAX);
3733
	batadv_tt_tvlv_container_update(bat_priv);
3734
}
3735

3736
/**
3737
 * batadv_tt_local_commit_changes() - commit all pending local tt changes which
3738 3739 3740 3741 3742 3743 3744
 *  have been queued in the time since the last commit
 * @bat_priv: the bat priv with all the soft interface information
 */
void batadv_tt_local_commit_changes(struct batadv_priv *bat_priv)
{
	spin_lock_bh(&bat_priv->tt.commit_lock);
	batadv_tt_local_commit_changes_nolock(bat_priv);
3745
	spin_unlock_bh(&bat_priv->tt.commit_lock);
3746
}
3747

3748 3749 3750 3751 3752 3753 3754 3755 3756
/**
 * batadv_is_ap_isolated() - Check if packet from upper layer should be dropped
 * @bat_priv: the bat priv with all the soft interface information
 * @src: source mac address of packet
 * @dst: destination mac address of packet
 * @vid: vlan id of packet
 *
 * Return: true when src+dst(+vid) pair should be isolated, false otherwise
 */
3757 3758
bool batadv_is_ap_isolated(struct batadv_priv *bat_priv, u8 *src, u8 *dst,
			   unsigned short vid)
3759
{
3760 3761
	struct batadv_tt_local_entry *tt_local_entry;
	struct batadv_tt_global_entry *tt_global_entry;
3762
	struct batadv_softif_vlan *vlan;
3763
	bool ret = false;
3764

3765
	vlan = batadv_softif_vlan_get(bat_priv, vid);
3766 3767 3768 3769
	if (!vlan)
		return false;

	if (!atomic_read(&vlan->ap_isolation))
3770
		goto vlan_put;
3771

3772
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, dst, vid);
3773
	if (!tt_local_entry)
3774
		goto vlan_put;
3775

3776
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, src, vid);
3777
	if (!tt_global_entry)
3778
		goto local_entry_put;
3779

3780 3781
	if (_batadv_is_ap_isolated(tt_local_entry, tt_global_entry))
		ret = true;
3782

3783 3784 3785 3786
	batadv_tt_global_entry_put(tt_global_entry);
local_entry_put:
	batadv_tt_local_entry_put(tt_local_entry);
vlan_put:
3787
	batadv_softif_vlan_put(vlan);
3788 3789
	return ret;
}
3790

3791
/**
3792
 * batadv_tt_update_orig() - update global translation table with new tt
3793 3794
 *  information received via ogms
 * @bat_priv: the bat priv with all the soft interface information
3795 3796
 * @orig_node: the orig_node of the ogm
 * @tt_buff: pointer to the first tvlv VLAN entry
3797 3798
 * @tt_num_vlan: number of tvlv VLAN entries
 * @tt_change: pointer to the first entry in the TT buffer
3799 3800 3801 3802 3803
 * @tt_num_changes: number of tt changes inside the tt buffer
 * @ttvn: translation table version number of this changeset
 */
static void batadv_tt_update_orig(struct batadv_priv *bat_priv,
				  struct batadv_orig_node *orig_node,
3804
				  const void *tt_buff, u16 tt_num_vlan,
3805
				  struct batadv_tvlv_tt_change *tt_change,
3806
				  u16 tt_num_changes, u8 ttvn)
3807
{
3808
	u8 orig_ttvn = (u8)atomic_read(&orig_node->last_ttvn);
3809
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
3810
	bool full_table = true;
3811
	bool has_tt_init;
3812

3813
	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)tt_buff;
3814 3815
	has_tt_init = test_bit(BATADV_ORIG_CAPA_HAS_TT,
			       &orig_node->capa_initialized);
3816

3817
	/* orig table not initialised AND first diff is in the OGM OR the ttvn
3818 3819
	 * increased by one -> we can apply the attached changes
	 */
3820
	if ((!has_tt_init && ttvn == 1) || ttvn - orig_ttvn == 1) {
3821
		/* the OGM could not contain the changes due to their size or
3822 3823
		 * because they have already been sent BATADV_TT_OGM_APPEND_MAX
		 * times.
3824 3825
		 * In this case send a tt request
		 */
3826 3827 3828 3829 3830
		if (!tt_num_changes) {
			full_table = false;
			goto request_table;
		}

3831 3832
		spin_lock_bh(&orig_node->tt_lock);

3833
		batadv_tt_update_changes(bat_priv, orig_node, tt_num_changes,
3834
					 ttvn, tt_change);
3835 3836 3837

		/* Even if we received the precomputed crc with the OGM, we
		 * prefer to recompute it to spot any possible inconsistency
3838 3839
		 * in the global table
		 */
3840
		batadv_tt_global_update_crc(bat_priv, orig_node);
3841

3842 3843
		spin_unlock_bh(&orig_node->tt_lock);

3844 3845 3846 3847 3848 3849 3850
		/* The ttvn alone is not enough to guarantee consistency
		 * because a single value could represent different states
		 * (due to the wrap around). Thus a node has to check whether
		 * the resulting table (after applying the changes) is still
		 * consistent or not. E.g. a node could disconnect while its
		 * ttvn is X and reconnect on ttvn = X + TTVN_MAX: in this case
		 * checking the CRC value is mandatory to detect the
3851 3852
		 * inconsistency
		 */
3853 3854
		if (!batadv_tt_global_check_crc(orig_node, tt_vlan,
						tt_num_vlan))
3855 3856 3857
			goto request_table;
	} else {
		/* if we missed more than one change or our tables are not
3858 3859
		 * in sync anymore -> request fresh tt data
		 */
3860
		if (!has_tt_init || ttvn != orig_ttvn ||
3861 3862
		    !batadv_tt_global_check_crc(orig_node, tt_vlan,
						tt_num_vlan)) {
3863
request_table:
3864
			batadv_dbg(BATADV_DBG_TT, bat_priv,
3865 3866 3867
				   "TT inconsistency for %pM. Need to retrieve the correct information (ttvn: %u last_ttvn: %u num_changes: %u)\n",
				   orig_node->orig, ttvn, orig_ttvn,
				   tt_num_changes);
3868
			batadv_send_tt_request(bat_priv, orig_node, ttvn,
3869 3870
					       tt_vlan, tt_num_vlan,
					       full_table);
3871 3872 3873 3874
			return;
		}
	}
}
3875

3876
/**
3877
 * batadv_tt_global_client_is_roaming() - check if a client is marked as roaming
3878 3879 3880 3881
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the mac address of the client to check
 * @vid: VLAN identifier
 *
3882
 * Return: true if we know that the client has moved from its old originator
3883 3884
 * to another one. This entry is still kept for consistency purposes and will be
 * deleted later by a DEL or because of timeout
3885
 */
3886
bool batadv_tt_global_client_is_roaming(struct batadv_priv *bat_priv,
3887
					u8 *addr, unsigned short vid)
3888
{
3889
	struct batadv_tt_global_entry *tt_global_entry;
3890 3891
	bool ret = false;

3892
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
3893 3894 3895
	if (!tt_global_entry)
		goto out;

3896
	ret = tt_global_entry->common.flags & BATADV_TT_CLIENT_ROAM;
3897
	batadv_tt_global_entry_put(tt_global_entry);
3898 3899 3900
out:
	return ret;
}
3901

3902
/**
3903
 * batadv_tt_local_client_is_roaming() - tells whether the client is roaming
3904
 * @bat_priv: the bat priv with all the soft interface information
3905 3906
 * @addr: the mac address of the local client to query
 * @vid: VLAN identifier
3907
 *
3908
 * Return: true if the local client is known to be roaming (it is not served by
3909 3910 3911 3912
 * this node anymore) or not. If yes, the client is still present in the table
 * to keep the latter consistent with the node TTVN
 */
bool batadv_tt_local_client_is_roaming(struct batadv_priv *bat_priv,
3913
				       u8 *addr, unsigned short vid)
3914 3915 3916 3917
{
	struct batadv_tt_local_entry *tt_local_entry;
	bool ret = false;

3918
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
3919 3920 3921 3922
	if (!tt_local_entry)
		goto out;

	ret = tt_local_entry->common.flags & BATADV_TT_CLIENT_ROAM;
3923
	batadv_tt_local_entry_put(tt_local_entry);
3924 3925 3926 3927
out:
	return ret;
}

3928 3929 3930 3931 3932 3933 3934 3935 3936
/**
 * batadv_tt_add_temporary_global_entry() - Add temporary entry to global TT
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: orig node which the temporary entry should be associated with
 * @addr: mac address of the client
 * @vid: VLAN id of the new temporary global translation table
 *
 * Return: true when temporary tt entry could be added, false otherwise
 */
3937 3938
bool batadv_tt_add_temporary_global_entry(struct batadv_priv *bat_priv,
					  struct batadv_orig_node *orig_node,
3939
					  const unsigned char *addr,
3940
					  unsigned short vid)
3941
{
3942 3943 3944 3945 3946 3947
	/* ignore loop detect macs, they are not supposed to be in the tt local
	 * data as well.
	 */
	if (batadv_bla_is_loopdetect_mac(addr))
		return false;

3948
	if (!batadv_tt_global_add(bat_priv, orig_node, addr, vid,
3949 3950
				  BATADV_TT_CLIENT_TEMP,
				  atomic_read(&orig_node->last_ttvn)))
3951
		return false;
3952 3953

	batadv_dbg(BATADV_DBG_TT, bat_priv,
3954
		   "Added temporary global client (addr: %pM, vid: %d, orig: %pM)\n",
3955
		   addr, batadv_print_vid(vid), orig_node->orig);
3956 3957

	return true;
3958
}
3959

3960
/**
3961
 * batadv_tt_local_resize_to_mtu() - resize the local translation table fit the
3962 3963 3964 3965 3966 3967 3968 3969 3970 3971 3972 3973 3974 3975 3976 3977 3978 3979 3980 3981 3982 3983 3984 3985 3986 3987 3988 3989 3990 3991 3992 3993 3994 3995 3996 3997 3998 3999 4000
 *  maximum packet size that can be transported through the mesh
 * @soft_iface: netdev struct of the mesh interface
 *
 * Remove entries older than 'timeout' and half timeout if more entries need
 * to be removed.
 */
void batadv_tt_local_resize_to_mtu(struct net_device *soft_iface)
{
	struct batadv_priv *bat_priv = netdev_priv(soft_iface);
	int packet_size_max = atomic_read(&bat_priv->packet_size_max);
	int table_size, timeout = BATADV_TT_LOCAL_TIMEOUT / 2;
	bool reduced = false;

	spin_lock_bh(&bat_priv->tt.commit_lock);

	while (true) {
		table_size = batadv_tt_local_table_transmit_size(bat_priv);
		if (packet_size_max >= table_size)
			break;

		batadv_tt_local_purge(bat_priv, timeout);
		batadv_tt_local_purge_pending_clients(bat_priv);

		timeout /= 2;
		reduced = true;
		net_ratelimited_function(batadv_info, soft_iface,
					 "Forced to purge local tt entries to fit new maximum fragment MTU (%i)\n",
					 packet_size_max);
	}

	/* commit these changes immediately, to avoid synchronization problem
	 * with the TTVN
	 */
	if (reduced)
		batadv_tt_local_commit_changes_nolock(bat_priv);

	spin_unlock_bh(&bat_priv->tt.commit_lock);
}

4001
/**
4002
 * batadv_tt_tvlv_ogm_handler_v1() - process incoming tt tvlv container
4003 4004 4005 4006 4007 4008 4009 4010
 * @bat_priv: the bat priv with all the soft interface information
 * @orig: the orig_node of the ogm
 * @flags: flags indicating the tvlv state (see batadv_tvlv_handler_flags)
 * @tvlv_value: tvlv buffer containing the gateway data
 * @tvlv_value_len: tvlv buffer length
 */
static void batadv_tt_tvlv_ogm_handler_v1(struct batadv_priv *bat_priv,
					  struct batadv_orig_node *orig,
4011 4012
					  u8 flags, void *tvlv_value,
					  u16 tvlv_value_len)
4013
{
4014 4015
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
	struct batadv_tvlv_tt_change *tt_change;
4016
	struct batadv_tvlv_tt_data *tt_data;
4017
	u16 num_entries, num_vlan;
4018 4019 4020 4021 4022 4023 4024

	if (tvlv_value_len < sizeof(*tt_data))
		return;

	tt_data = (struct batadv_tvlv_tt_data *)tvlv_value;
	tvlv_value_len -= sizeof(*tt_data);

4025 4026 4027 4028 4029 4030 4031 4032 4033
	num_vlan = ntohs(tt_data->num_vlan);

	if (tvlv_value_len < sizeof(*tt_vlan) * num_vlan)
		return;

	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(tt_data + 1);
	tt_change = (struct batadv_tvlv_tt_change *)(tt_vlan + num_vlan);
	tvlv_value_len -= sizeof(*tt_vlan) * num_vlan;

4034
	num_entries = batadv_tt_entries(tvlv_value_len);
4035

4036 4037
	batadv_tt_update_orig(bat_priv, orig, tt_vlan, num_vlan, tt_change,
			      num_entries, tt_data->ttvn);
4038 4039
}

4040
/**
4041
 * batadv_tt_tvlv_unicast_handler_v1() - process incoming (unicast) tt tvlv
4042 4043 4044 4045 4046 4047 4048
 *  container
 * @bat_priv: the bat priv with all the soft interface information
 * @src: mac address of tt tvlv sender
 * @dst: mac address of tt tvlv recipient
 * @tvlv_value: tvlv buffer containing the tt data
 * @tvlv_value_len: tvlv buffer length
 *
4049
 * Return: NET_RX_DROP if the tt tvlv is to be re-routed, NET_RX_SUCCESS
4050 4051 4052
 * otherwise.
 */
static int batadv_tt_tvlv_unicast_handler_v1(struct batadv_priv *bat_priv,
4053
					     u8 *src, u8 *dst,
4054
					     void *tvlv_value,
4055
					     u16 tvlv_value_len)
4056 4057
{
	struct batadv_tvlv_tt_data *tt_data;
4058
	u16 tt_vlan_len, tt_num_entries;
4059 4060 4061 4062 4063 4064 4065 4066 4067
	char tt_flag;
	bool ret;

	if (tvlv_value_len < sizeof(*tt_data))
		return NET_RX_SUCCESS;

	tt_data = (struct batadv_tvlv_tt_data *)tvlv_value;
	tvlv_value_len -= sizeof(*tt_data);

4068 4069 4070 4071 4072 4073 4074 4075
	tt_vlan_len = sizeof(struct batadv_tvlv_tt_vlan_data);
	tt_vlan_len *= ntohs(tt_data->num_vlan);

	if (tvlv_value_len < tt_vlan_len)
		return NET_RX_SUCCESS;

	tvlv_value_len -= tt_vlan_len;
	tt_num_entries = batadv_tt_entries(tvlv_value_len);
4076 4077 4078 4079 4080 4081 4082 4083 4084 4085 4086 4087 4088 4089 4090 4091 4092 4093 4094 4095 4096 4097 4098 4099 4100 4101 4102

	switch (tt_data->flags & BATADV_TT_DATA_TYPE_MASK) {
	case BATADV_TT_REQUEST:
		batadv_inc_counter(bat_priv, BATADV_CNT_TT_REQUEST_RX);

		/* If this node cannot provide a TT response the tt_request is
		 * forwarded
		 */
		ret = batadv_send_tt_response(bat_priv, tt_data, src, dst);
		if (!ret) {
			if (tt_data->flags & BATADV_TT_FULL_TABLE)
				tt_flag = 'F';
			else
				tt_flag = '.';

			batadv_dbg(BATADV_DBG_TT, bat_priv,
				   "Routing TT_REQUEST to %pM [%c]\n",
				   dst, tt_flag);
			/* tvlv API will re-route the packet */
			return NET_RX_DROP;
		}
		break;
	case BATADV_TT_RESPONSE:
		batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_RX);

		if (batadv_is_my_mac(bat_priv, dst)) {
			batadv_handle_tt_response(bat_priv, tt_data,
4103
						  src, tt_num_entries);
4104 4105 4106 4107 4108 4109 4110 4111 4112 4113 4114 4115 4116 4117 4118 4119 4120 4121
			return NET_RX_SUCCESS;
		}

		if (tt_data->flags & BATADV_TT_FULL_TABLE)
			tt_flag =  'F';
		else
			tt_flag = '.';

		batadv_dbg(BATADV_DBG_TT, bat_priv,
			   "Routing TT_RESPONSE to %pM [%c]\n", dst, tt_flag);

		/* tvlv API will re-route the packet */
		return NET_RX_DROP;
	}

	return NET_RX_SUCCESS;
}

4122
/**
4123 4124
 * batadv_roam_tvlv_unicast_handler_v1() - process incoming tt roam tvlv
 *  container
4125 4126 4127 4128 4129 4130
 * @bat_priv: the bat priv with all the soft interface information
 * @src: mac address of tt tvlv sender
 * @dst: mac address of tt tvlv recipient
 * @tvlv_value: tvlv buffer containing the tt data
 * @tvlv_value_len: tvlv buffer length
 *
4131
 * Return: NET_RX_DROP if the tt roam tvlv is to be re-routed, NET_RX_SUCCESS
4132 4133 4134
 * otherwise.
 */
static int batadv_roam_tvlv_unicast_handler_v1(struct batadv_priv *bat_priv,
4135
					       u8 *src, u8 *dst,
4136
					       void *tvlv_value,
4137
					       u16 tvlv_value_len)
4138 4139 4140 4141 4142 4143 4144 4145 4146 4147 4148 4149 4150 4151 4152 4153 4154 4155 4156 4157 4158 4159 4160 4161 4162 4163
{
	struct batadv_tvlv_roam_adv *roaming_adv;
	struct batadv_orig_node *orig_node = NULL;

	/* If this node is not the intended recipient of the
	 * roaming advertisement the packet is forwarded
	 * (the tvlv API will re-route the packet).
	 */
	if (!batadv_is_my_mac(bat_priv, dst))
		return NET_RX_DROP;

	if (tvlv_value_len < sizeof(*roaming_adv))
		goto out;

	orig_node = batadv_orig_hash_find(bat_priv, src);
	if (!orig_node)
		goto out;

	batadv_inc_counter(bat_priv, BATADV_CNT_TT_ROAM_ADV_RX);
	roaming_adv = (struct batadv_tvlv_roam_adv *)tvlv_value;

	batadv_dbg(BATADV_DBG_TT, bat_priv,
		   "Received ROAMING_ADV from %pM (client %pM)\n",
		   src, roaming_adv->client);

	batadv_tt_global_add(bat_priv, orig_node, roaming_adv->client,
4164
			     ntohs(roaming_adv->vid), BATADV_TT_CLIENT_ROAM,
4165 4166 4167 4168
			     atomic_read(&orig_node->last_ttvn) + 1);

out:
	if (orig_node)
4169
		batadv_orig_node_put(orig_node);
4170 4171 4172
	return NET_RX_SUCCESS;
}

4173
/**
4174
 * batadv_tt_init() - initialise the translation table internals
4175 4176
 * @bat_priv: the bat priv with all the soft interface information
 *
4177
 * Return: 0 on success or negative error number in case of failure.
4178 4179 4180 4181 4182
 */
int batadv_tt_init(struct batadv_priv *bat_priv)
{
	int ret;

4183 4184 4185
	/* synchronized flags must be remote */
	BUILD_BUG_ON(!(BATADV_TT_SYNC_MASK & BATADV_TT_REMOTE_MASK));

4186 4187 4188 4189 4190 4191 4192 4193 4194
	ret = batadv_tt_local_init(bat_priv);
	if (ret < 0)
		return ret;

	ret = batadv_tt_global_init(bat_priv);
	if (ret < 0)
		return ret;

	batadv_tvlv_handler_register(bat_priv, batadv_tt_tvlv_ogm_handler_v1,
4195 4196
				     batadv_tt_tvlv_unicast_handler_v1,
				     BATADV_TVLV_TT, 1, BATADV_NO_FLAGS);
4197

4198 4199 4200 4201
	batadv_tvlv_handler_register(bat_priv, NULL,
				     batadv_roam_tvlv_unicast_handler_v1,
				     BATADV_TVLV_ROAM, 1, BATADV_NO_FLAGS);

4202 4203 4204 4205 4206 4207
	INIT_DELAYED_WORK(&bat_priv->tt.work, batadv_tt_purge);
	queue_delayed_work(batadv_event_workqueue, &bat_priv->tt.work,
			   msecs_to_jiffies(BATADV_TT_WORK_PERIOD));

	return 1;
}
4208 4209

/**
4210
 * batadv_tt_global_is_isolated() - check if a client is marked as isolated
4211 4212 4213 4214
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the mac address of the client
 * @vid: the identifier of the VLAN where this client is connected
 *
4215
 * Return: true if the client is marked with the TT_CLIENT_ISOLA flag, false
4216 4217 4218
 * otherwise
 */
bool batadv_tt_global_is_isolated(struct batadv_priv *bat_priv,
4219
				  const u8 *addr, unsigned short vid)
4220 4221 4222 4223 4224 4225 4226 4227 4228 4229
{
	struct batadv_tt_global_entry *tt;
	bool ret;

	tt = batadv_tt_global_hash_find(bat_priv, addr, vid);
	if (!tt)
		return false;

	ret = tt->common.flags & BATADV_TT_CLIENT_ISOLA;

4230
	batadv_tt_global_entry_put(tt);
4231 4232 4233

	return ret;
}
4234 4235

/**
4236
 * batadv_tt_cache_init() - Initialize tt memory object cache
4237 4238 4239 4240 4241 4242 4243 4244 4245 4246 4247 4248 4249 4250 4251 4252 4253 4254 4255 4256 4257 4258 4259 4260 4261 4262 4263 4264 4265 4266 4267 4268 4269 4270 4271 4272 4273 4274 4275 4276 4277 4278 4279 4280 4281 4282 4283 4284 4285 4286 4287 4288 4289 4290 4291 4292 4293 4294 4295 4296 4297 4298 4299 4300 4301 4302 4303 4304
 *
 * Return: 0 on success or negative error number in case of failure.
 */
int __init batadv_tt_cache_init(void)
{
	size_t tl_size = sizeof(struct batadv_tt_local_entry);
	size_t tg_size = sizeof(struct batadv_tt_global_entry);
	size_t tt_orig_size = sizeof(struct batadv_tt_orig_list_entry);
	size_t tt_change_size = sizeof(struct batadv_tt_change_node);
	size_t tt_req_size = sizeof(struct batadv_tt_req_node);
	size_t tt_roam_size = sizeof(struct batadv_tt_roam_node);

	batadv_tl_cache = kmem_cache_create("batadv_tl_cache", tl_size, 0,
					    SLAB_HWCACHE_ALIGN, NULL);
	if (!batadv_tl_cache)
		return -ENOMEM;

	batadv_tg_cache = kmem_cache_create("batadv_tg_cache", tg_size, 0,
					    SLAB_HWCACHE_ALIGN, NULL);
	if (!batadv_tg_cache)
		goto err_tt_tl_destroy;

	batadv_tt_orig_cache = kmem_cache_create("batadv_tt_orig_cache",
						 tt_orig_size, 0,
						 SLAB_HWCACHE_ALIGN, NULL);
	if (!batadv_tt_orig_cache)
		goto err_tt_tg_destroy;

	batadv_tt_change_cache = kmem_cache_create("batadv_tt_change_cache",
						   tt_change_size, 0,
						   SLAB_HWCACHE_ALIGN, NULL);
	if (!batadv_tt_change_cache)
		goto err_tt_orig_destroy;

	batadv_tt_req_cache = kmem_cache_create("batadv_tt_req_cache",
						tt_req_size, 0,
						SLAB_HWCACHE_ALIGN, NULL);
	if (!batadv_tt_req_cache)
		goto err_tt_change_destroy;

	batadv_tt_roam_cache = kmem_cache_create("batadv_tt_roam_cache",
						 tt_roam_size, 0,
						 SLAB_HWCACHE_ALIGN, NULL);
	if (!batadv_tt_roam_cache)
		goto err_tt_req_destroy;

	return 0;

err_tt_req_destroy:
	kmem_cache_destroy(batadv_tt_req_cache);
	batadv_tt_req_cache = NULL;
err_tt_change_destroy:
	kmem_cache_destroy(batadv_tt_change_cache);
	batadv_tt_change_cache = NULL;
err_tt_orig_destroy:
	kmem_cache_destroy(batadv_tt_orig_cache);
	batadv_tt_orig_cache = NULL;
err_tt_tg_destroy:
	kmem_cache_destroy(batadv_tg_cache);
	batadv_tg_cache = NULL;
err_tt_tl_destroy:
	kmem_cache_destroy(batadv_tl_cache);
	batadv_tl_cache = NULL;

	return -ENOMEM;
}

/**
4305
 * batadv_tt_cache_destroy() - Destroy tt memory object cache
4306 4307 4308 4309 4310 4311 4312 4313 4314 4315
 */
void batadv_tt_cache_destroy(void)
{
	kmem_cache_destroy(batadv_tl_cache);
	kmem_cache_destroy(batadv_tg_cache);
	kmem_cache_destroy(batadv_tt_orig_cache);
	kmem_cache_destroy(batadv_tt_change_cache);
	kmem_cache_destroy(batadv_tt_req_cache);
	kmem_cache_destroy(batadv_tt_roam_cache);
}