translation-table.c 132.6 KB
Newer Older
1
// SPDX-License-Identifier: GPL-2.0
2
/* Copyright (C) 2007-2018  B.A.T.M.A.N. contributors:
3
 *
4
 * Marek Lindner, Simon Wunderlich, Antonio Quartulli
5 6 7 8 9 10 11 12 13 14 15
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of version 2 of the GNU General Public
 * License as published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
 * General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
16
 * along with this program; if not, see <http://www.gnu.org/licenses/>.
17 18 19
 */

#include "translation-table.h"
20 21 22
#include "main.h"

#include <linux/atomic.h>
23
#include <linux/bitops.h>
24
#include <linux/build_bug.h>
25
#include <linux/byteorder/generic.h>
26
#include <linux/cache.h>
27 28 29 30
#include <linux/compiler.h>
#include <linux/crc32c.h>
#include <linux/errno.h>
#include <linux/etherdevice.h>
31
#include <linux/gfp.h>
32
#include <linux/if_ether.h>
33
#include <linux/init.h>
34 35 36
#include <linux/jhash.h>
#include <linux/jiffies.h>
#include <linux/kernel.h>
37
#include <linux/kref.h>
38 39
#include <linux/list.h>
#include <linux/lockdep.h>
40
#include <linux/net.h>
41
#include <linux/netdevice.h>
42
#include <linux/netlink.h>
43 44 45
#include <linux/rculist.h>
#include <linux/rcupdate.h>
#include <linux/seq_file.h>
46
#include <linux/skbuff.h>
47 48 49 50 51
#include <linux/slab.h>
#include <linux/spinlock.h>
#include <linux/stddef.h>
#include <linux/string.h>
#include <linux/workqueue.h>
52 53 54
#include <net/genetlink.h>
#include <net/netlink.h>
#include <net/sock.h>
55
#include <uapi/linux/batadv_packet.h>
56
#include <uapi/linux/batman_adv.h>
57 58

#include "bridge_loop_avoidance.h"
59
#include "hard-interface.h"
60
#include "hash.h"
61
#include "log.h"
62
#include "netlink.h"
63 64
#include "originator.h"
#include "soft-interface.h"
65
#include "tvlv.h"
66

67 68 69 70 71 72 73
static struct kmem_cache *batadv_tl_cache __read_mostly;
static struct kmem_cache *batadv_tg_cache __read_mostly;
static struct kmem_cache *batadv_tt_orig_cache __read_mostly;
static struct kmem_cache *batadv_tt_change_cache __read_mostly;
static struct kmem_cache *batadv_tt_req_cache __read_mostly;
static struct kmem_cache *batadv_tt_roam_cache __read_mostly;

74 75 76 77
/* hash class keys */
static struct lock_class_key batadv_tt_local_hash_lock_class_key;
static struct lock_class_key batadv_tt_global_hash_lock_class_key;

78
static void batadv_send_roam_adv(struct batadv_priv *bat_priv, u8 *client,
79
				 unsigned short vid,
80
				 struct batadv_orig_node *orig_node);
81 82
static void batadv_tt_purge(struct work_struct *work);
static void
83
batadv_tt_global_del_orig_list(struct batadv_tt_global_entry *tt_global_entry);
84 85 86
static void batadv_tt_global_del(struct batadv_priv *bat_priv,
				 struct batadv_orig_node *orig_node,
				 const unsigned char *addr,
87 88
				 unsigned short vid, const char *message,
				 bool roaming);
89

90
/**
91
 * batadv_compare_tt() - check if two TT entries are the same
92 93
 * @node: the list element pointer of the first TT entry
 * @data2: pointer to the tt_common_entry of the second TT entry
94
 *
95 96
 * Compare the MAC address and the VLAN ID of the two TT entries and check if
 * they are the same TT client.
97
 * Return: true if the two TT clients are the same, false otherwise
98
 */
99
static bool batadv_compare_tt(const struct hlist_node *node, const void *data2)
100
{
101
	const void *data1 = container_of(node, struct batadv_tt_common_entry,
102
					 hash_entry);
103 104
	const struct batadv_tt_common_entry *tt1 = data1;
	const struct batadv_tt_common_entry *tt2 = data2;
105

106
	return (tt1->vid == tt2->vid) && batadv_compare_eth(data1, data2);
107 108
}

109
/**
110
 * batadv_choose_tt() - return the index of the tt entry in the hash table
111 112 113
 * @data: pointer to the tt_common_entry object to map
 * @size: the size of the hash table
 *
114
 * Return: the hash index where the object represented by 'data' should be
115 116
 * stored at.
 */
117
static inline u32 batadv_choose_tt(const void *data, u32 size)
118 119
{
	struct batadv_tt_common_entry *tt;
120
	u32 hash = 0;
121 122

	tt = (struct batadv_tt_common_entry *)data;
123 124
	hash = jhash(&tt->addr, ETH_ALEN, hash);
	hash = jhash(&tt->vid, sizeof(tt->vid), hash);
125 126 127 128 129

	return hash % size;
}

/**
130
 * batadv_tt_hash_find() - look for a client in the given hash table
131 132 133 134
 * @hash: the hash table to search
 * @addr: the mac address of the client to look for
 * @vid: VLAN identifier
 *
135
 * Return: a pointer to the tt_common struct belonging to the searched client if
136 137
 * found, NULL otherwise.
 */
138
static struct batadv_tt_common_entry *
139
batadv_tt_hash_find(struct batadv_hashtable *hash, const u8 *addr,
140
		    unsigned short vid)
141 142
{
	struct hlist_head *head;
143
	struct batadv_tt_common_entry to_search, *tt, *tt_tmp = NULL;
144
	u32 index;
145 146 147 148

	if (!hash)
		return NULL;

149
	ether_addr_copy(to_search.addr, addr);
150 151 152
	to_search.vid = vid;

	index = batadv_choose_tt(&to_search, hash->size);
153 154 155
	head = &hash->table[index];

	rcu_read_lock();
156 157 158 159 160
	hlist_for_each_entry_rcu(tt, head, hash_entry) {
		if (!batadv_compare_eth(tt, addr))
			continue;

		if (tt->vid != vid)
161 162
			continue;

163
		if (!kref_get_unless_zero(&tt->refcount))
164 165
			continue;

166
		tt_tmp = tt;
167 168 169 170
		break;
	}
	rcu_read_unlock();

171
	return tt_tmp;
172 173
}

174
/**
175
 * batadv_tt_local_hash_find() - search the local table for a given client
176 177 178 179
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the mac address of the client to look for
 * @vid: VLAN identifier
 *
180
 * Return: a pointer to the corresponding tt_local_entry struct if the client is
181 182
 * found, NULL otherwise.
 */
183
static struct batadv_tt_local_entry *
184
batadv_tt_local_hash_find(struct batadv_priv *bat_priv, const u8 *addr,
185
			  unsigned short vid)
186
{
187 188
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_local_entry *tt_local_entry = NULL;
189

190 191
	tt_common_entry = batadv_tt_hash_find(bat_priv->tt.local_hash, addr,
					      vid);
192 193
	if (tt_common_entry)
		tt_local_entry = container_of(tt_common_entry,
194 195
					      struct batadv_tt_local_entry,
					      common);
196 197
	return tt_local_entry;
}
198

199
/**
200
 * batadv_tt_global_hash_find() - search the global table for a given client
201 202 203 204
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the mac address of the client to look for
 * @vid: VLAN identifier
 *
205
 * Return: a pointer to the corresponding tt_global_entry struct if the client
206 207
 * is found, NULL otherwise.
 */
208
static struct batadv_tt_global_entry *
209
batadv_tt_global_hash_find(struct batadv_priv *bat_priv, const u8 *addr,
210
			   unsigned short vid)
211
{
212 213
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_global_entry *tt_global_entry = NULL;
214

215 216
	tt_common_entry = batadv_tt_hash_find(bat_priv->tt.global_hash, addr,
					      vid);
217 218
	if (tt_common_entry)
		tt_global_entry = container_of(tt_common_entry,
219 220
					       struct batadv_tt_global_entry,
					       common);
221
	return tt_global_entry;
222 223
}

224
/**
225
 * batadv_tt_local_entry_free_rcu() - free the tt_local_entry
226 227 228 229 230 231 232 233 234 235 236 237
 * @rcu: rcu pointer of the tt_local_entry
 */
static void batadv_tt_local_entry_free_rcu(struct rcu_head *rcu)
{
	struct batadv_tt_local_entry *tt_local_entry;

	tt_local_entry = container_of(rcu, struct batadv_tt_local_entry,
				      common.rcu);

	kmem_cache_free(batadv_tl_cache, tt_local_entry);
}

238
/**
239
 * batadv_tt_local_entry_release() - release tt_local_entry from lists and queue
240 241 242 243 244 245 246 247 248 249
 *  for free after rcu grace period
 * @ref: kref pointer of the nc_node
 */
static void batadv_tt_local_entry_release(struct kref *ref)
{
	struct batadv_tt_local_entry *tt_local_entry;

	tt_local_entry = container_of(ref, struct batadv_tt_local_entry,
				      common.refcount);

250 251
	batadv_softif_vlan_put(tt_local_entry->vlan);

252
	call_rcu(&tt_local_entry->common.rcu, batadv_tt_local_entry_free_rcu);
253 254 255
}

/**
256
 * batadv_tt_local_entry_put() - decrement the tt_local_entry refcounter and
257 258 259
 *  possibly release it
 * @tt_local_entry: tt_local_entry to be free'd
 */
260
static void
261
batadv_tt_local_entry_put(struct batadv_tt_local_entry *tt_local_entry)
262
{
263 264
	kref_put(&tt_local_entry->common.refcount,
		 batadv_tt_local_entry_release);
265 266
}

267
/**
268
 * batadv_tt_global_entry_free_rcu() - free the tt_global_entry
269 270 271 272 273 274 275 276 277 278 279 280
 * @rcu: rcu pointer of the tt_global_entry
 */
static void batadv_tt_global_entry_free_rcu(struct rcu_head *rcu)
{
	struct batadv_tt_global_entry *tt_global_entry;

	tt_global_entry = container_of(rcu, struct batadv_tt_global_entry,
				       common.rcu);

	kmem_cache_free(batadv_tg_cache, tt_global_entry);
}

281
/**
282 283
 * batadv_tt_global_entry_release() - release tt_global_entry from lists and
 *  queue for free after rcu grace period
284 285 286 287 288 289 290 291 292 293
 * @ref: kref pointer of the nc_node
 */
static void batadv_tt_global_entry_release(struct kref *ref)
{
	struct batadv_tt_global_entry *tt_global_entry;

	tt_global_entry = container_of(ref, struct batadv_tt_global_entry,
				       common.refcount);

	batadv_tt_global_del_orig_list(tt_global_entry);
294 295

	call_rcu(&tt_global_entry->common.rcu, batadv_tt_global_entry_free_rcu);
296 297 298
}

/**
299
 * batadv_tt_global_entry_put() - decrement the tt_global_entry refcounter and
300
 *  possibly release it
301
 * @tt_global_entry: tt_global_entry to be free'd
302
 */
303
static void
304
batadv_tt_global_entry_put(struct batadv_tt_global_entry *tt_global_entry)
305
{
306 307
	kref_put(&tt_global_entry->common.refcount,
		 batadv_tt_global_entry_release);
308 309
}

310
/**
311
 * batadv_tt_global_hash_count() - count the number of orig entries
312
 * @bat_priv: the bat priv with all the soft interface information
313 314 315
 * @addr: the mac address of the client to count entries for
 * @vid: VLAN identifier
 *
316
 * Return: the number of originators advertising the given address/data
317 318 319
 * (excluding ourself).
 */
int batadv_tt_global_hash_count(struct batadv_priv *bat_priv,
320
				const u8 *addr, unsigned short vid)
321 322 323 324 325 326 327 328 329
{
	struct batadv_tt_global_entry *tt_global_entry;
	int count;

	tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
	if (!tt_global_entry)
		return 0;

	count = atomic_read(&tt_global_entry->orig_list_count);
330
	batadv_tt_global_entry_put(tt_global_entry);
331 332 333 334

	return count;
}

335
/**
336 337
 * batadv_tt_local_size_mod() - change the size by v of the local table
 *  identified by vid
338 339 340 341 342 343 344 345 346 347 348 349 350 351 352
 * @bat_priv: the bat priv with all the soft interface information
 * @vid: the VLAN identifier of the sub-table to change
 * @v: the amount to sum to the local table size
 */
static void batadv_tt_local_size_mod(struct batadv_priv *bat_priv,
				     unsigned short vid, int v)
{
	struct batadv_softif_vlan *vlan;

	vlan = batadv_softif_vlan_get(bat_priv, vid);
	if (!vlan)
		return;

	atomic_add(v, &vlan->tt.num_entries);

353
	batadv_softif_vlan_put(vlan);
354 355 356
}

/**
357 358
 * batadv_tt_local_size_inc() - increase by one the local table size for the
 *  given vid
359 360 361 362 363 364 365 366 367 368
 * @bat_priv: the bat priv with all the soft interface information
 * @vid: the VLAN identifier
 */
static void batadv_tt_local_size_inc(struct batadv_priv *bat_priv,
				     unsigned short vid)
{
	batadv_tt_local_size_mod(bat_priv, vid, 1);
}

/**
369 370
 * batadv_tt_local_size_dec() - decrease by one the local table size for the
 *  given vid
371 372 373 374 375 376 377 378 379 380
 * @bat_priv: the bat priv with all the soft interface information
 * @vid: the VLAN identifier
 */
static void batadv_tt_local_size_dec(struct batadv_priv *bat_priv,
				     unsigned short vid)
{
	batadv_tt_local_size_mod(bat_priv, vid, -1);
}

/**
381
 * batadv_tt_global_size_mod() - change the size by v of the global table
382 383
 *  for orig_node identified by vid
 * @orig_node: the originator for which the table has to be modified
384 385 386 387 388 389 390 391 392 393 394 395 396 397
 * @vid: the VLAN identifier
 * @v: the amount to sum to the global table size
 */
static void batadv_tt_global_size_mod(struct batadv_orig_node *orig_node,
				      unsigned short vid, int v)
{
	struct batadv_orig_node_vlan *vlan;

	vlan = batadv_orig_node_vlan_new(orig_node, vid);
	if (!vlan)
		return;

	if (atomic_add_return(v, &vlan->tt.num_entries) == 0) {
		spin_lock_bh(&orig_node->vlan_list_lock);
398 399
		if (!hlist_unhashed(&vlan->list)) {
			hlist_del_init_rcu(&vlan->list);
400
			batadv_orig_node_vlan_put(vlan);
401
		}
402 403 404
		spin_unlock_bh(&orig_node->vlan_list_lock);
	}

405
	batadv_orig_node_vlan_put(vlan);
406 407 408
}

/**
409
 * batadv_tt_global_size_inc() - increase by one the global table size for the
410 411 412 413 414 415 416 417 418 419 420
 *  given vid
 * @orig_node: the originator which global table size has to be decreased
 * @vid: the vlan identifier
 */
static void batadv_tt_global_size_inc(struct batadv_orig_node *orig_node,
				      unsigned short vid)
{
	batadv_tt_global_size_mod(orig_node, vid, 1);
}

/**
421
 * batadv_tt_global_size_dec() - decrease by one the global table size for the
422 423 424 425 426 427 428 429 430 431
 *  given vid
 * @orig_node: the originator which global table size has to be decreased
 * @vid: the vlan identifier
 */
static void batadv_tt_global_size_dec(struct batadv_orig_node *orig_node,
				      unsigned short vid)
{
	batadv_tt_global_size_mod(orig_node, vid, -1);
}

432
/**
433
 * batadv_tt_orig_list_entry_free_rcu() - free the orig_entry
434 435 436 437 438 439 440 441 442 443 444
 * @rcu: rcu pointer of the orig_entry
 */
static void batadv_tt_orig_list_entry_free_rcu(struct rcu_head *rcu)
{
	struct batadv_tt_orig_list_entry *orig_entry;

	orig_entry = container_of(rcu, struct batadv_tt_orig_list_entry, rcu);

	kmem_cache_free(batadv_tt_orig_cache, orig_entry);
}

445
/**
446
 * batadv_tt_orig_list_entry_release() - release tt orig entry from lists and
447
 *  queue for free after rcu grace period
448
 * @ref: kref pointer of the tt orig entry
449
 */
450
static void batadv_tt_orig_list_entry_release(struct kref *ref)
451
{
452 453 454 455 456
	struct batadv_tt_orig_list_entry *orig_entry;

	orig_entry = container_of(ref, struct batadv_tt_orig_list_entry,
				  refcount);

457
	batadv_orig_node_put(orig_entry->orig_node);
458
	call_rcu(&orig_entry->rcu, batadv_tt_orig_list_entry_free_rcu);
459 460
}

461
/**
462
 * batadv_tt_orig_list_entry_put() - decrement the tt orig entry refcounter and
463
 *  possibly release it
464 465
 * @orig_entry: tt orig entry to be free'd
 */
466
static void
467
batadv_tt_orig_list_entry_put(struct batadv_tt_orig_list_entry *orig_entry)
468
{
469
	kref_put(&orig_entry->refcount, batadv_tt_orig_list_entry_release);
470 471
}

472
/**
473
 * batadv_tt_local_event() - store a local TT event (ADD/DEL)
474 475 476 477
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_local_entry: the TT entry involved in the event
 * @event_flags: flags to store in the event structure
 */
478
static void batadv_tt_local_event(struct batadv_priv *bat_priv,
479
				  struct batadv_tt_local_entry *tt_local_entry,
480
				  u8 event_flags)
481
{
482
	struct batadv_tt_change_node *tt_change_node, *entry, *safe;
483
	struct batadv_tt_common_entry *common = &tt_local_entry->common;
484
	u8 flags = common->flags | event_flags;
485 486
	bool event_removed = false;
	bool del_op_requested, del_op_entry;
487

488
	tt_change_node = kmem_cache_alloc(batadv_tt_change_cache, GFP_ATOMIC);
489 490 491
	if (!tt_change_node)
		return;

492
	tt_change_node->change.flags = flags;
493 494
	memset(tt_change_node->change.reserved, 0,
	       sizeof(tt_change_node->change.reserved));
495
	ether_addr_copy(tt_change_node->change.addr, common->addr);
496
	tt_change_node->change.vid = htons(common->vid);
497

498
	del_op_requested = flags & BATADV_TT_CLIENT_DEL;
499 500

	/* check for ADD+DEL or DEL+ADD events */
501 502
	spin_lock_bh(&bat_priv->tt.changes_list_lock);
	list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
503
				 list) {
504
		if (!batadv_compare_eth(entry->change.addr, common->addr))
505 506 507 508 509 510 511 512 513
			continue;

		/* DEL+ADD in the same orig interval have no effect and can be
		 * removed to avoid silly behaviour on the receiver side. The
		 * other way around (ADD+DEL) can happen in case of roaming of
		 * a client still in the NEW state. Roaming of NEW clients is
		 * now possible due to automatically recognition of "temporary"
		 * clients
		 */
514
		del_op_entry = entry->change.flags & BATADV_TT_CLIENT_DEL;
515 516 517 518
		if (!del_op_requested && del_op_entry)
			goto del;
		if (del_op_requested && !del_op_entry)
			goto del;
519 520 521 522 523 524 525

		/* this is a second add in the same originator interval. It
		 * means that flags have been changed: update them!
		 */
		if (!del_op_requested && !del_op_entry)
			entry->change.flags = flags;

526 527 528
		continue;
del:
		list_del(&entry->list);
529 530
		kmem_cache_free(batadv_tt_change_cache, entry);
		kmem_cache_free(batadv_tt_change_cache, tt_change_node);
531 532 533 534
		event_removed = true;
		goto unlock;
	}

535
	/* track the change in the OGMinterval list */
536
	list_add_tail(&tt_change_node->list, &bat_priv->tt.changes_list);
537 538

unlock:
539
	spin_unlock_bh(&bat_priv->tt.changes_list_lock);
540

541
	if (event_removed)
542
		atomic_dec(&bat_priv->tt.local_changes);
543
	else
544
		atomic_inc(&bat_priv->tt.local_changes);
545 546
}

547
/**
548
 * batadv_tt_len() - compute length in bytes of given number of tt changes
549 550
 * @changes_num: number of tt changes
 *
551
 * Return: computed length in bytes.
552 553
 */
static int batadv_tt_len(int changes_num)
554
{
555
	return changes_num * sizeof(struct batadv_tvlv_tt_change);
556 557
}

558
/**
559
 * batadv_tt_entries() - compute the number of entries fitting in tt_len bytes
560 561
 * @tt_len: available space
 *
562
 * Return: the number of entries.
563
 */
564
static u16 batadv_tt_entries(u16 tt_len)
565 566 567 568
{
	return tt_len / batadv_tt_len(1);
}

569
/**
570 571
 * batadv_tt_local_table_transmit_size() - calculates the local translation
 *  table size when transmitted over the air
572 573
 * @bat_priv: the bat priv with all the soft interface information
 *
574
 * Return: local translation table size in bytes.
575 576 577
 */
static int batadv_tt_local_table_transmit_size(struct batadv_priv *bat_priv)
{
578 579
	u16 num_vlan = 0;
	u16 tt_local_entries = 0;
580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598
	struct batadv_softif_vlan *vlan;
	int hdr_size;

	rcu_read_lock();
	hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
		num_vlan++;
		tt_local_entries += atomic_read(&vlan->tt.num_entries);
	}
	rcu_read_unlock();

	/* header size of tvlv encapsulated tt response payload */
	hdr_size = sizeof(struct batadv_unicast_tvlv_packet);
	hdr_size += sizeof(struct batadv_tvlv_hdr);
	hdr_size += sizeof(struct batadv_tvlv_tt_data);
	hdr_size += num_vlan * sizeof(struct batadv_tvlv_tt_vlan_data);

	return hdr_size + batadv_tt_len(tt_local_entries);
}

599
static int batadv_tt_local_init(struct batadv_priv *bat_priv)
600
{
601
	if (bat_priv->tt.local_hash)
602
		return 0;
603

604
	bat_priv->tt.local_hash = batadv_hash_new(1024);
605

606
	if (!bat_priv->tt.local_hash)
607
		return -ENOMEM;
608

609 610 611
	batadv_hash_set_lock_class(bat_priv->tt.local_hash,
				   &batadv_tt_local_hash_lock_class_key);

612
	return 0;
613 614
}

615 616 617 618 619
static void batadv_tt_global_free(struct batadv_priv *bat_priv,
				  struct batadv_tt_global_entry *tt_global,
				  const char *message)
{
	batadv_dbg(BATADV_DBG_TT, bat_priv,
620 621
		   "Deleting global tt entry %pM (vid: %d): %s\n",
		   tt_global->common.addr,
622
		   batadv_print_vid(tt_global->common.vid), message);
623 624

	batadv_hash_remove(bat_priv->tt.global_hash, batadv_compare_tt,
625
			   batadv_choose_tt, &tt_global->common);
626
	batadv_tt_global_entry_put(tt_global);
627 628
}

629
/**
630
 * batadv_tt_local_add() - add a new client to the local table or update an
631 632 633 634 635 636
 *  existing client
 * @soft_iface: netdev struct of the mesh interface
 * @addr: the mac address of the client to add
 * @vid: VLAN identifier
 * @ifindex: index of the interface where the client is connected to (useful to
 *  identify wireless clients)
637 638
 * @mark: the value contained in the skb->mark field of the received packet (if
 *  any)
639
 *
640
 * Return: true if the client was successfully added, false otherwise.
641
 */
642 643
bool batadv_tt_local_add(struct net_device *soft_iface, const u8 *addr,
			 unsigned short vid, int ifindex, u32 mark)
644
{
645
	struct batadv_priv *bat_priv = netdev_priv(soft_iface);
646
	struct batadv_tt_local_entry *tt_local;
647
	struct batadv_tt_global_entry *tt_global = NULL;
648
	struct net *net = dev_net(soft_iface);
649
	struct batadv_softif_vlan *vlan;
650
	struct net_device *in_dev = NULL;
651
	struct batadv_hard_iface *in_hardif = NULL;
652
	struct hlist_head *head;
653
	struct batadv_tt_orig_list_entry *orig_entry;
654
	int hash_added, table_size, packet_size_max;
655 656
	bool ret = false;
	bool roamed_back = false;
657 658
	u8 remote_flags;
	u32 match_mark;
659

660
	if (ifindex != BATADV_NULL_IFINDEX)
661
		in_dev = dev_get_by_index(net, ifindex);
662

663 664 665
	if (in_dev)
		in_hardif = batadv_hardif_get_by_netdev(in_dev);

666
	tt_local = batadv_tt_local_hash_find(bat_priv, addr, vid);
667 668 669

	if (!is_multicast_ether_addr(addr))
		tt_global = batadv_tt_global_hash_find(bat_priv, addr, vid);
670

671 672
	if (tt_local) {
		tt_local->last_seen = jiffies;
673 674
		if (tt_local->common.flags & BATADV_TT_CLIENT_PENDING) {
			batadv_dbg(BATADV_DBG_TT, bat_priv,
675
				   "Re-adding pending client %pM (vid: %d)\n",
676
				   addr, batadv_print_vid(vid));
677 678 679 680 681 682 683 684 685 686 687
			/* whatever the reason why the PENDING flag was set,
			 * this is a client which was enqueued to be removed in
			 * this orig_interval. Since it popped up again, the
			 * flag can be reset like it was never enqueued
			 */
			tt_local->common.flags &= ~BATADV_TT_CLIENT_PENDING;
			goto add_event;
		}

		if (tt_local->common.flags & BATADV_TT_CLIENT_ROAM) {
			batadv_dbg(BATADV_DBG_TT, bat_priv,
688
				   "Roaming client %pM (vid: %d) came back to its original location\n",
689
				   addr, batadv_print_vid(vid));
690 691 692 693 694 695 696 697 698
			/* the ROAM flag is set because this client roamed away
			 * and the node got a roaming_advertisement message. Now
			 * that the client popped up again at its original
			 * location such flag can be unset
			 */
			tt_local->common.flags &= ~BATADV_TT_CLIENT_ROAM;
			roamed_back = true;
		}
		goto check_roaming;
699 700
	}

701 702 703 704 705 706 707 708 709 710 711
	/* Ignore the client if we cannot send it in a full table response. */
	table_size = batadv_tt_local_table_transmit_size(bat_priv);
	table_size += batadv_tt_len(1);
	packet_size_max = atomic_read(&bat_priv->packet_size_max);
	if (table_size > packet_size_max) {
		net_ratelimited_function(batadv_info, soft_iface,
					 "Local translation table size (%i) exceeds maximum packet size (%i); Ignoring new local tt entry: %pM\n",
					 table_size, packet_size_max, addr);
		goto out;
	}

712
	tt_local = kmem_cache_alloc(batadv_tl_cache, GFP_ATOMIC);
713
	if (!tt_local)
714
		goto out;
715

716 717
	/* increase the refcounter of the related vlan */
	vlan = batadv_softif_vlan_get(bat_priv, vid);
718 719 720
	if (!vlan) {
		net_ratelimited_function(batadv_info, soft_iface,
					 "adding TT local entry %pM to non-existent VLAN %d\n",
721
					 addr, batadv_print_vid(vid));
722
		kmem_cache_free(batadv_tl_cache, tt_local);
723
		tt_local = NULL;
724
		goto out;
725
	}
726

727
	batadv_dbg(BATADV_DBG_TT, bat_priv,
728
		   "Creating new local tt entry: %pM (vid: %d, ttvn: %d)\n",
729
		   addr, batadv_print_vid(vid),
730
		   (u8)atomic_read(&bat_priv->tt.vn));
731

732
	ether_addr_copy(tt_local->common.addr, addr);
733 734 735 736 737
	/* The local entry has to be marked as NEW to avoid to send it in
	 * a full table response going out before the next ttvn increment
	 * (consistency check)
	 */
	tt_local->common.flags = BATADV_TT_CLIENT_NEW;
738
	tt_local->common.vid = vid;
739
	if (batadv_is_wifi_hardif(in_hardif))
740
		tt_local->common.flags |= BATADV_TT_CLIENT_WIFI;
741
	kref_init(&tt_local->common.refcount);
742 743
	tt_local->last_seen = jiffies;
	tt_local->common.added_at = tt_local->last_seen;
744
	tt_local->vlan = vlan;
745

746 747 748 749 750
	/* the batman interface mac and multicast addresses should never be
	 * purged
	 */
	if (batadv_compare_eth(addr, soft_iface->dev_addr) ||
	    is_multicast_ether_addr(addr))
751
		tt_local->common.flags |= BATADV_TT_CLIENT_NOPURGE;
752

753
	kref_get(&tt_local->common.refcount);
754
	hash_added = batadv_hash_add(bat_priv->tt.local_hash, batadv_compare_tt,
755
				     batadv_choose_tt, &tt_local->common,
756
				     &tt_local->common.hash_entry);
757 758 759

	if (unlikely(hash_added != 0)) {
		/* remove the reference for the hash */
760
		batadv_tt_local_entry_put(tt_local);
761 762 763
		goto out;
	}

764
add_event:
765
	batadv_tt_local_event(bat_priv, tt_local, BATADV_NO_FLAGS);
766

767 768 769 770 771
check_roaming:
	/* Check whether it is a roaming, but don't do anything if the roaming
	 * process has already been handled
	 */
	if (tt_global && !(tt_global->common.flags & BATADV_TT_CLIENT_ROAM)) {
772
		/* These node are probably going to update their tt table */
773
		head = &tt_global->orig_list;
774
		rcu_read_lock();
775
		hlist_for_each_entry_rcu(orig_entry, head, list) {
776
			batadv_send_roam_adv(bat_priv, tt_global->common.addr,
777
					     tt_global->common.vid,
778
					     orig_entry->orig_node);
779 780
		}
		rcu_read_unlock();
781 782 783 784 785 786 787 788 789 790 791
		if (roamed_back) {
			batadv_tt_global_free(bat_priv, tt_global,
					      "Roaming canceled");
			tt_global = NULL;
		} else {
			/* The global entry has to be marked as ROAMING and
			 * has to be kept for consistency purpose
			 */
			tt_global->common.flags |= BATADV_TT_CLIENT_ROAM;
			tt_global->roam_at = jiffies;
		}
792
	}
793

794 795 796 797 798
	/* store the current remote flags before altering them. This helps
	 * understanding is flags are changing or not
	 */
	remote_flags = tt_local->common.flags & BATADV_TT_REMOTE_MASK;

799
	if (batadv_is_wifi_hardif(in_hardif))
800 801 802
		tt_local->common.flags |= BATADV_TT_CLIENT_WIFI;
	else
		tt_local->common.flags &= ~BATADV_TT_CLIENT_WIFI;
803

804 805 806 807 808 809 810 811 812 813 814
	/* check the mark in the skb: if it's equal to the configured
	 * isolation_mark, it means the packet is coming from an isolated
	 * non-mesh client
	 */
	match_mark = (mark & bat_priv->isolation_mark_mask);
	if (bat_priv->isolation_mark_mask &&
	    match_mark == bat_priv->isolation_mark)
		tt_local->common.flags |= BATADV_TT_CLIENT_ISOLA;
	else
		tt_local->common.flags &= ~BATADV_TT_CLIENT_ISOLA;

815 816 817 818 819 820 821
	/* if any "dynamic" flag has been modified, resend an ADD event for this
	 * entry so that all the nodes can get the new flags
	 */
	if (remote_flags ^ (tt_local->common.flags & BATADV_TT_REMOTE_MASK))
		batadv_tt_local_event(bat_priv, tt_local, BATADV_NO_FLAGS);

	ret = true;
822
out:
823 824
	if (in_hardif)
		batadv_hardif_put(in_hardif);
825 826
	if (in_dev)
		dev_put(in_dev);
827
	if (tt_local)
828
		batadv_tt_local_entry_put(tt_local);
829
	if (tt_global)
830
		batadv_tt_global_entry_put(tt_global);
831
	return ret;
832 833
}

834
/**
835
 * batadv_tt_prepare_tvlv_global_data() - prepare the TVLV TT header to send
836 837 838 839 840 841 842 843 844 845 846 847 848
 *  within a TT Response directed to another node
 * @orig_node: originator for which the TT data has to be prepared
 * @tt_data: uninitialised pointer to the address of the TVLV buffer
 * @tt_change: uninitialised pointer to the address of the area where the TT
 *  changed can be stored
 * @tt_len: pointer to the length to reserve to the tt_change. if -1 this
 *  function reserves the amount of space needed to send the entire global TT
 *  table. In case of success the value is updated with the real amount of
 *  reserved bytes
 * Allocate the needed amount of memory for the entire TT TVLV and write its
 * header made up by one tvlv_tt_data object and a series of tvlv_tt_vlan_data
 * objects, one per active VLAN served by the originator node.
 *
849
 * Return: the size of the allocated buffer or 0 in case of failure.
850
 */
851
static u16
852 853 854
batadv_tt_prepare_tvlv_global_data(struct batadv_orig_node *orig_node,
				   struct batadv_tvlv_tt_data **tt_data,
				   struct batadv_tvlv_tt_change **tt_change,
855
				   s32 *tt_len)
856
{
857 858 859 860
	u16 num_vlan = 0;
	u16 num_entries = 0;
	u16 change_offset;
	u16 tvlv_len;
861 862
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
	struct batadv_orig_node_vlan *vlan;
863
	u8 *tt_change_ptr;
864

865
	spin_lock_bh(&orig_node->vlan_list_lock);
866
	hlist_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) {
867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891
		num_vlan++;
		num_entries += atomic_read(&vlan->tt.num_entries);
	}

	change_offset = sizeof(**tt_data);
	change_offset += num_vlan * sizeof(*tt_vlan);

	/* if tt_len is negative, allocate the space needed by the full table */
	if (*tt_len < 0)
		*tt_len = batadv_tt_len(num_entries);

	tvlv_len = *tt_len;
	tvlv_len += change_offset;

	*tt_data = kmalloc(tvlv_len, GFP_ATOMIC);
	if (!*tt_data) {
		*tt_len = 0;
		goto out;
	}

	(*tt_data)->flags = BATADV_NO_FLAGS;
	(*tt_data)->ttvn = atomic_read(&orig_node->last_ttvn);
	(*tt_data)->num_vlan = htons(num_vlan);

	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(*tt_data + 1);
892
	hlist_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) {
893 894 895 896 897 898
		tt_vlan->vid = htons(vlan->vid);
		tt_vlan->crc = htonl(vlan->tt.crc);

		tt_vlan++;
	}

899
	tt_change_ptr = (u8 *)*tt_data + change_offset;
900 901 902
	*tt_change = (struct batadv_tvlv_tt_change *)tt_change_ptr;

out:
903
	spin_unlock_bh(&orig_node->vlan_list_lock);
904 905 906 907
	return tvlv_len;
}

/**
908 909
 * batadv_tt_prepare_tvlv_local_data() - allocate and prepare the TT TVLV for
 *  this node
910 911 912 913 914 915 916 917 918 919 920 921 922
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: uninitialised pointer to the address of the TVLV buffer
 * @tt_change: uninitialised pointer to the address of the area where the TT
 *  changes can be stored
 * @tt_len: pointer to the length to reserve to the tt_change. if -1 this
 *  function reserves the amount of space needed to send the entire local TT
 *  table. In case of success the value is updated with the real amount of
 *  reserved bytes
 *
 * Allocate the needed amount of memory for the entire TT TVLV and write its
 * header made up by one tvlv_tt_data object and a series of tvlv_tt_vlan_data
 * objects, one per active VLAN.
 *
923
 * Return: the size of the allocated buffer or 0 in case of failure.
924
 */
925
static u16
926 927 928
batadv_tt_prepare_tvlv_local_data(struct batadv_priv *bat_priv,
				  struct batadv_tvlv_tt_data **tt_data,
				  struct batadv_tvlv_tt_change **tt_change,
929
				  s32 *tt_len)
930 931 932
{
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
	struct batadv_softif_vlan *vlan;
933
	u16 num_vlan = 0;
934 935
	u16 vlan_entries = 0;
	u16 total_entries = 0;
936
	u16 tvlv_len;
937
	u8 *tt_change_ptr;
938 939
	int change_offset;

940
	spin_lock_bh(&bat_priv->softif_vlan_list_lock);
941
	hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
942 943 944 945
		vlan_entries = atomic_read(&vlan->tt.num_entries);
		if (vlan_entries < 1)
			continue;

946
		num_vlan++;
947
		total_entries += vlan_entries;
948 949 950 951 952 953 954
	}

	change_offset = sizeof(**tt_data);
	change_offset += num_vlan * sizeof(*tt_vlan);

	/* if tt_len is negative, allocate the space needed by the full table */
	if (*tt_len < 0)
955
		*tt_len = batadv_tt_len(total_entries);
956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971

	tvlv_len = *tt_len;
	tvlv_len += change_offset;

	*tt_data = kmalloc(tvlv_len, GFP_ATOMIC);
	if (!*tt_data) {
		tvlv_len = 0;
		goto out;
	}

	(*tt_data)->flags = BATADV_NO_FLAGS;
	(*tt_data)->ttvn = atomic_read(&bat_priv->tt.vn);
	(*tt_data)->num_vlan = htons(num_vlan);

	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(*tt_data + 1);
	hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
972 973 974 975
		vlan_entries = atomic_read(&vlan->tt.num_entries);
		if (vlan_entries < 1)
			continue;

976 977 978 979 980 981
		tt_vlan->vid = htons(vlan->vid);
		tt_vlan->crc = htonl(vlan->tt.crc);

		tt_vlan++;
	}

982
	tt_change_ptr = (u8 *)*tt_data + change_offset;
983 984 985
	*tt_change = (struct batadv_tvlv_tt_change *)tt_change_ptr;

out:
986
	spin_unlock_bh(&bat_priv->softif_vlan_list_lock);
987 988 989
	return tvlv_len;
}

990
/**
991 992
 * batadv_tt_tvlv_container_update() - update the translation table tvlv
 *  container after local tt changes have been committed
993 994 995
 * @bat_priv: the bat priv with all the soft interface information
 */
static void batadv_tt_tvlv_container_update(struct batadv_priv *bat_priv)
996
{
997 998 999
	struct batadv_tt_change_node *entry, *safe;
	struct batadv_tvlv_tt_data *tt_data;
	struct batadv_tvlv_tt_change *tt_change;
1000
	int tt_diff_len, tt_change_len = 0;
1001 1002
	int tt_diff_entries_num = 0;
	int tt_diff_entries_count = 0;
1003
	u16 tvlv_len;
1004

1005 1006
	tt_diff_entries_num = atomic_read(&bat_priv->tt.local_changes);
	tt_diff_len = batadv_tt_len(tt_diff_entries_num);
1007 1008 1009 1010

	/* if we have too many changes for one packet don't send any
	 * and wait for the tt table request which will be fragmented
	 */
1011 1012
	if (tt_diff_len > bat_priv->soft_iface->mtu)
		tt_diff_len = 0;
1013

1014 1015 1016
	tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv, &tt_data,
						     &tt_change, &tt_diff_len);
	if (!tvlv_len)
1017
		return;
1018

1019
	tt_data->flags = BATADV_TT_OGM_DIFF;
1020

1021 1022
	if (tt_diff_len == 0)
		goto container_register;
1023

1024 1025
	spin_lock_bh(&bat_priv->tt.changes_list_lock);
	atomic_set(&bat_priv->tt.local_changes, 0);
1026

1027
	list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
1028
				 list) {
1029 1030 1031 1032 1033
		if (tt_diff_entries_count < tt_diff_entries_num) {
			memcpy(tt_change + tt_diff_entries_count,
			       &entry->change,
			       sizeof(struct batadv_tvlv_tt_change));
			tt_diff_entries_count++;
1034
		}
1035
		list_del(&entry->list);
1036
		kmem_cache_free(batadv_tt_change_cache, entry);
1037
	}
1038
	spin_unlock_bh(&bat_priv->tt.changes_list_lock);
1039 1040

	/* Keep the buffer for possible tt_request */
1041 1042 1043 1044
	spin_lock_bh(&bat_priv->tt.last_changeset_lock);
	kfree(bat_priv->tt.last_changeset);
	bat_priv->tt.last_changeset_len = 0;
	bat_priv->tt.last_changeset = NULL;
1045
	tt_change_len = batadv_tt_len(tt_diff_entries_count);
1046
	/* check whether this new OGM has no changes due to size problems */
1047
	if (tt_diff_entries_count > 0) {
1048
		/* if kmalloc() fails we will reply with the full table
1049 1050
		 * instead of providing the diff
		 */
1051
		bat_priv->tt.last_changeset = kzalloc(tt_diff_len, GFP_ATOMIC);
1052
		if (bat_priv->tt.last_changeset) {
1053 1054 1055
			memcpy(bat_priv->tt.last_changeset,
			       tt_change, tt_change_len);
			bat_priv->tt.last_changeset_len = tt_diff_len;
1056 1057
		}
	}
1058
	spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
1059

1060 1061
container_register:
	batadv_tvlv_container_register(bat_priv, BATADV_TVLV_TT, 1, tt_data,
1062
				       tvlv_len);
1063
	kfree(tt_data);
1064 1065
}

1066
#ifdef CONFIG_BATMAN_ADV_DEBUGFS
1067 1068 1069 1070 1071 1072 1073 1074

/**
 * batadv_tt_local_seq_print_text() - Print the local tt table in a seq file
 * @seq: seq file to print on
 * @offset: not used
 *
 * Return: always 0
 */
1075
int batadv_tt_local_seq_print_text(struct seq_file *seq, void *offset)
1076 1077
{
	struct net_device *net_dev = (struct net_device *)seq->private;
1078
	struct batadv_priv *bat_priv = netdev_priv(net_dev);
1079
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
1080
	struct batadv_tt_common_entry *tt_common_entry;
1081
	struct batadv_tt_local_entry *tt_local;
1082
	struct batadv_hard_iface *primary_if;
1083
	struct hlist_head *head;
1084
	u32 i;
1085 1086 1087 1088
	int last_seen_secs;
	int last_seen_msecs;
	unsigned long last_seen_jiffies;
	bool no_purge;
1089
	u16 np_flag = BATADV_TT_CLIENT_NOPURGE;
1090

1091 1092
	primary_if = batadv_seq_print_text_primary_if_get(seq);
	if (!primary_if)
1093
		goto out;
1094

1095
	seq_printf(seq,
1096
		   "Locally retrieved addresses (from %s) announced via TT (TTVN: %u):\n",
1097
		   net_dev->name, (u8)atomic_read(&bat_priv->tt.vn));
1098 1099
	seq_puts(seq,
		 "       Client         VID Flags    Last seen (CRC       )\n");
1100 1101 1102 1103

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

1104
		rcu_read_lock();
1105
		hlist_for_each_entry_rcu(tt_common_entry,
1106
					 head, hash_entry) {
1107 1108 1109 1110 1111 1112 1113 1114 1115
			tt_local = container_of(tt_common_entry,
						struct batadv_tt_local_entry,
						common);
			last_seen_jiffies = jiffies - tt_local->last_seen;
			last_seen_msecs = jiffies_to_msecs(last_seen_jiffies);
			last_seen_secs = last_seen_msecs / 1000;
			last_seen_msecs = last_seen_msecs % 1000;

			no_purge = tt_common_entry->flags & np_flag;
1116
			seq_printf(seq,
1117
				   " * %pM %4i [%c%c%c%c%c%c] %3u.%03u   (%#.8x)\n",
1118
				   tt_common_entry->addr,
1119
				   batadv_print_vid(tt_common_entry->vid),
1120 1121
				   ((tt_common_entry->flags &
				     BATADV_TT_CLIENT_ROAM) ? 'R' : '.'),
1122
				   no_purge ? 'P' : '.',
1123 1124 1125 1126 1127 1128 1129 1130
				   ((tt_common_entry->flags &
				     BATADV_TT_CLIENT_NEW) ? 'N' : '.'),
				   ((tt_common_entry->flags &
				     BATADV_TT_CLIENT_PENDING) ? 'X' : '.'),
				   ((tt_common_entry->flags &
				     BATADV_TT_CLIENT_WIFI) ? 'W' : '.'),
				   ((tt_common_entry->flags &
				     BATADV_TT_CLIENT_ISOLA) ? 'I' : '.'),
1131
				   no_purge ? 0 : last_seen_secs,
1132
				   no_purge ? 0 : last_seen_msecs,
1133
				   tt_local->vlan->tt.crc);
1134
		}
1135
		rcu_read_unlock();
1136
	}
1137 1138
out:
	if (primary_if)
1139
		batadv_hardif_put(primary_if);
1140
	return 0;
1141
}
1142
#endif
1143

1144
/**
1145
 * batadv_tt_local_dump_entry() - Dump one TT local entry into a message
1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200
 * @msg :Netlink message to dump into
 * @portid: Port making netlink request
 * @seq: Sequence number of netlink message
 * @bat_priv: The bat priv with all the soft interface information
 * @common: tt local & tt global common data
 *
 * Return: Error code, or 0 on success
 */
static int
batadv_tt_local_dump_entry(struct sk_buff *msg, u32 portid, u32 seq,
			   struct batadv_priv *bat_priv,
			   struct batadv_tt_common_entry *common)
{
	void *hdr;
	struct batadv_softif_vlan *vlan;
	struct batadv_tt_local_entry *local;
	unsigned int last_seen_msecs;
	u32 crc;

	local = container_of(common, struct batadv_tt_local_entry, common);
	last_seen_msecs = jiffies_to_msecs(jiffies - local->last_seen);

	vlan = batadv_softif_vlan_get(bat_priv, common->vid);
	if (!vlan)
		return 0;

	crc = vlan->tt.crc;

	batadv_softif_vlan_put(vlan);

	hdr = genlmsg_put(msg, portid, seq, &batadv_netlink_family,
			  NLM_F_MULTI,
			  BATADV_CMD_GET_TRANSTABLE_LOCAL);
	if (!hdr)
		return -ENOBUFS;

	if (nla_put(msg, BATADV_ATTR_TT_ADDRESS, ETH_ALEN, common->addr) ||
	    nla_put_u32(msg, BATADV_ATTR_TT_CRC32, crc) ||
	    nla_put_u16(msg, BATADV_ATTR_TT_VID, common->vid) ||
	    nla_put_u32(msg, BATADV_ATTR_TT_FLAGS, common->flags))
		goto nla_put_failure;

	if (!(common->flags & BATADV_TT_CLIENT_NOPURGE) &&
	    nla_put_u32(msg, BATADV_ATTR_LAST_SEEN_MSECS, last_seen_msecs))
		goto nla_put_failure;

	genlmsg_end(msg, hdr);
	return 0;

 nla_put_failure:
	genlmsg_cancel(msg, hdr);
	return -EMSGSIZE;
}

/**
1201
 * batadv_tt_local_dump_bucket() - Dump one TT local bucket into a message
1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237
 * @msg: Netlink message to dump into
 * @portid: Port making netlink request
 * @seq: Sequence number of netlink message
 * @bat_priv: The bat priv with all the soft interface information
 * @head: Pointer to the list containing the local tt entries
 * @idx_s: Number of entries to skip
 *
 * Return: Error code, or 0 on success
 */
static int
batadv_tt_local_dump_bucket(struct sk_buff *msg, u32 portid, u32 seq,
			    struct batadv_priv *bat_priv,
			    struct hlist_head *head, int *idx_s)
{
	struct batadv_tt_common_entry *common;
	int idx = 0;

	rcu_read_lock();
	hlist_for_each_entry_rcu(common, head, hash_entry) {
		if (idx++ < *idx_s)
			continue;

		if (batadv_tt_local_dump_entry(msg, portid, seq, bat_priv,
					       common)) {
			rcu_read_unlock();
			*idx_s = idx - 1;
			return -EMSGSIZE;
		}
	}
	rcu_read_unlock();

	*idx_s = 0;
	return 0;
}

/**
1238
 * batadv_tt_local_dump() - Dump TT local entries into a message
1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301
 * @msg: Netlink message to dump into
 * @cb: Parameters from query
 *
 * Return: Error code, or 0 on success
 */
int batadv_tt_local_dump(struct sk_buff *msg, struct netlink_callback *cb)
{
	struct net *net = sock_net(cb->skb->sk);
	struct net_device *soft_iface;
	struct batadv_priv *bat_priv;
	struct batadv_hard_iface *primary_if = NULL;
	struct batadv_hashtable *hash;
	struct hlist_head *head;
	int ret;
	int ifindex;
	int bucket = cb->args[0];
	int idx = cb->args[1];
	int portid = NETLINK_CB(cb->skb).portid;

	ifindex = batadv_netlink_get_ifindex(cb->nlh, BATADV_ATTR_MESH_IFINDEX);
	if (!ifindex)
		return -EINVAL;

	soft_iface = dev_get_by_index(net, ifindex);
	if (!soft_iface || !batadv_softif_is_valid(soft_iface)) {
		ret = -ENODEV;
		goto out;
	}

	bat_priv = netdev_priv(soft_iface);

	primary_if = batadv_primary_if_get_selected(bat_priv);
	if (!primary_if || primary_if->if_status != BATADV_IF_ACTIVE) {
		ret = -ENOENT;
		goto out;
	}

	hash = bat_priv->tt.local_hash;

	while (bucket < hash->size) {
		head = &hash->table[bucket];

		if (batadv_tt_local_dump_bucket(msg, portid, cb->nlh->nlmsg_seq,
						bat_priv, head, &idx))
			break;

		bucket++;
	}

	ret = msg->len;

 out:
	if (primary_if)
		batadv_hardif_put(primary_if);
	if (soft_iface)
		dev_put(soft_iface);

	cb->args[0] = bucket;
	cb->args[1] = idx;

	return ret;
}

1302 1303 1304
static void
batadv_tt_local_set_pending(struct batadv_priv *bat_priv,
			    struct batadv_tt_local_entry *tt_local_entry,
1305
			    u16 flags, const char *message)
1306
{
1307
	batadv_tt_local_event(bat_priv, tt_local_entry, flags);
1308

1309 1310
	/* The local client has to be marked as "pending to be removed" but has
	 * to be kept in the table in order to send it in a full table
1311 1312
	 * response issued before the net ttvn increment (consistency check)
	 */
1313
	tt_local_entry->common.flags |= BATADV_TT_CLIENT_PENDING;
1314

1315
	batadv_dbg(BATADV_DBG_TT, bat_priv,
1316 1317
		   "Local tt entry (%pM, vid: %d) pending to be removed: %s\n",
		   tt_local_entry->common.addr,
1318
		   batadv_print_vid(tt_local_entry->common.vid), message);
1319 1320
}

1321
/**
1322
 * batadv_tt_local_remove() - logically remove an entry from the local table
1323 1324
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the MAC address of the client to remove
1325
 * @vid: VLAN identifier
1326 1327 1328
 * @message: message to append to the log on deletion
 * @roaming: true if the deletion is due to a roaming event
 *
1329
 * Return: the flags assigned to the local entry before being deleted
1330
 */
1331 1332 1333
u16 batadv_tt_local_remove(struct batadv_priv *bat_priv, const u8 *addr,
			   unsigned short vid, const char *message,
			   bool roaming)
1334
{
1335
	struct batadv_tt_local_entry *tt_local_entry;
1336
	u16 flags, curr_flags = BATADV_NO_FLAGS;
1337
	void *tt_entry_exists;
1338

1339
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
1340 1341 1342
	if (!tt_local_entry)
		goto out;

1343 1344
	curr_flags = tt_local_entry->common.flags;

1345
	flags = BATADV_TT_CLIENT_DEL;
1346 1347 1348 1349
	/* if this global entry addition is due to a roaming, the node has to
	 * mark the local entry as "roamed" in order to correctly reroute
	 * packets later
	 */
1350
	if (roaming) {
1351
		flags |= BATADV_TT_CLIENT_ROAM;
1352 1353 1354
		/* mark the local client as ROAMed */
		tt_local_entry->common.flags |= BATADV_TT_CLIENT_ROAM;
	}
1355

1356 1357 1358 1359 1360 1361 1362 1363
	if (!(tt_local_entry->common.flags & BATADV_TT_CLIENT_NEW)) {
		batadv_tt_local_set_pending(bat_priv, tt_local_entry, flags,
					    message);
		goto out;
	}
	/* if this client has been added right now, it is possible to
	 * immediately purge it
	 */
1364
	batadv_tt_local_event(bat_priv, tt_local_entry, BATADV_TT_CLIENT_DEL);
1365 1366 1367 1368 1369 1370 1371 1372 1373

	tt_entry_exists = batadv_hash_remove(bat_priv->tt.local_hash,
					     batadv_compare_tt,
					     batadv_choose_tt,
					     &tt_local_entry->common);
	if (!tt_entry_exists)
		goto out;

	/* extra call to free the local tt entry */
1374
	batadv_tt_local_entry_put(tt_local_entry);
1375

1376 1377
out:
	if (tt_local_entry)
1378
		batadv_tt_local_entry_put(tt_local_entry);
1379 1380

	return curr_flags;
1381 1382
}

1383
/**
1384
 * batadv_tt_local_purge_list() - purge inactive tt local entries
1385 1386 1387 1388 1389
 * @bat_priv: the bat priv with all the soft interface information
 * @head: pointer to the list containing the local tt entries
 * @timeout: parameter deciding whether a given tt local entry is considered
 *  inactive or not
 */
1390
static void batadv_tt_local_purge_list(struct batadv_priv *bat_priv,
1391 1392
				       struct hlist_head *head,
				       int timeout)
1393
{
1394 1395
	struct batadv_tt_local_entry *tt_local_entry;
	struct batadv_tt_common_entry *tt_common_entry;
1396
	struct hlist_node *node_tmp;
1397

1398
	hlist_for_each_entry_safe(tt_common_entry, node_tmp, head,
1399 1400
				  hash_entry) {
		tt_local_entry = container_of(tt_common_entry,
1401 1402
					      struct batadv_tt_local_entry,
					      common);
1403 1404 1405 1406 1407 1408 1409
		if (tt_local_entry->common.flags & BATADV_TT_CLIENT_NOPURGE)
			continue;

		/* entry already marked for deletion */
		if (tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING)
			continue;

1410
		if (!batadv_has_timed_out(tt_local_entry->last_seen, timeout))
1411 1412 1413 1414 1415 1416 1417
			continue;

		batadv_tt_local_set_pending(bat_priv, tt_local_entry,
					    BATADV_TT_CLIENT_DEL, "timed out");
	}
}

1418
/**
1419
 * batadv_tt_local_purge() - purge inactive tt local entries
1420 1421 1422 1423 1424 1425
 * @bat_priv: the bat priv with all the soft interface information
 * @timeout: parameter deciding whether a given tt local entry is considered
 *  inactive or not
 */
static void batadv_tt_local_purge(struct batadv_priv *bat_priv,
				  int timeout)
1426
{
1427
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
1428
	struct hlist_head *head;
1429
	spinlock_t *list_lock; /* protects write access to the hash lists */
1430
	u32 i;
1431 1432 1433

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
1434
		list_lock = &hash->list_locks[i];
1435

1436
		spin_lock_bh(list_lock);
1437
		batadv_tt_local_purge_list(bat_priv, head, timeout);
1438
		spin_unlock_bh(list_lock);
1439 1440 1441
	}
}

1442
static void batadv_tt_local_table_free(struct batadv_priv *bat_priv)
1443
{
1444
	struct batadv_hashtable *hash;
1445
	spinlock_t *list_lock; /* protects write access to the hash lists */
1446 1447
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_local_entry *tt_local;
1448
	struct hlist_node *node_tmp;
1449
	struct hlist_head *head;
1450
	u32 i;
1451

1452
	if (!bat_priv->tt.local_hash)
1453 1454
		return;

1455
	hash = bat_priv->tt.local_hash;
1456 1457 1458 1459 1460 1461

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
		list_lock = &hash->list_locks[i];

		spin_lock_bh(list_lock);
1462
		hlist_for_each_entry_safe(tt_common_entry, node_tmp,
1463
					  head, hash_entry) {
1464
			hlist_del_rcu(&tt_common_entry->hash_entry);
1465 1466 1467
			tt_local = container_of(tt_common_entry,
						struct batadv_tt_local_entry,
						common);
1468

1469
			batadv_tt_local_entry_put(tt_local);
1470 1471 1472 1473
		}
		spin_unlock_bh(list_lock);
	}

1474
	batadv_hash_destroy(hash);
1475

1476
	bat_priv->tt.local_hash = NULL;
1477 1478
}

1479
static int batadv_tt_global_init(struct batadv_priv *bat_priv)
1480
{
1481
	if (bat_priv->tt.global_hash)
1482
		return 0;
1483

1484
	bat_priv->tt.global_hash = batadv_hash_new(1024);
1485

1486
	if (!bat_priv->tt.global_hash)
1487
		return -ENOMEM;
1488

1489 1490 1491
	batadv_hash_set_lock_class(bat_priv->tt.global_hash,
				   &batadv_tt_global_hash_lock_class_key);

1492
	return 0;
1493 1494
}

1495
static void batadv_tt_changes_list_free(struct batadv_priv *bat_priv)
1496
{
1497
	struct batadv_tt_change_node *entry, *safe;
1498

1499
	spin_lock_bh(&bat_priv->tt.changes_list_lock);
1500

1501
	list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
1502 1503
				 list) {
		list_del(&entry->list);
1504
		kmem_cache_free(batadv_tt_change_cache, entry);
1505
	}
1506

1507 1508
	atomic_set(&bat_priv->tt.local_changes, 0);
	spin_unlock_bh(&bat_priv->tt.changes_list_lock);
1509
}
1510

1511
/**
1512
 * batadv_tt_global_orig_entry_find() - find a TT orig_list_entry
1513 1514 1515
 * @entry: the TT global entry where the orig_list_entry has to be
 *  extracted from
 * @orig_node: the originator for which the orig_list_entry has to be found
1516
 *
1517
 * retrieve the orig_tt_list_entry belonging to orig_node from the
1518 1519
 * batadv_tt_global_entry list
 *
1520
 * Return: it with an increased refcounter, NULL if not found
1521
 */
1522 1523 1524
static struct batadv_tt_orig_list_entry *
batadv_tt_global_orig_entry_find(const struct batadv_tt_global_entry *entry,
				 const struct batadv_orig_node *orig_node)
1525
{
1526
	struct batadv_tt_orig_list_entry *tmp_orig_entry, *orig_entry = NULL;
1527 1528 1529 1530
	const struct hlist_head *head;

	rcu_read_lock();
	head = &entry->orig_list;
1531
	hlist_for_each_entry_rcu(tmp_orig_entry, head, list) {
1532 1533
		if (tmp_orig_entry->orig_node != orig_node)
			continue;
1534
		if (!kref_get_unless_zero(&tmp_orig_entry->refcount))
1535 1536 1537 1538
			continue;

		orig_entry = tmp_orig_entry;
		break;
1539 1540
	}
	rcu_read_unlock();
1541 1542 1543 1544

	return orig_entry;
}

1545
/**
1546 1547
 * batadv_tt_global_entry_has_orig() - check if a TT global entry is also
 *  handled by a given originator
1548 1549
 * @entry: the TT global entry to check
 * @orig_node: the originator to search in the list
1550 1551
 * @flags: a pointer to store TT flags for the given @entry received
 *  from @orig_node
1552 1553 1554 1555
 *
 * find out if an orig_node is already in the list of a tt_global_entry.
 *
 * Return: true if found, false otherwise
1556 1557 1558
 */
static bool
batadv_tt_global_entry_has_orig(const struct batadv_tt_global_entry *entry,
1559 1560
				const struct batadv_orig_node *orig_node,
				u8 *flags)
1561 1562 1563 1564 1565 1566 1567
{
	struct batadv_tt_orig_list_entry *orig_entry;
	bool found = false;

	orig_entry = batadv_tt_global_orig_entry_find(entry, orig_node);
	if (orig_entry) {
		found = true;
1568 1569 1570 1571

		if (flags)
			*flags = orig_entry->flags;

1572
		batadv_tt_orig_list_entry_put(orig_entry);
1573 1574
	}

1575 1576 1577
	return found;
}

1578
/**
1579
 * batadv_tt_global_sync_flags() - update TT sync flags
1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602
 * @tt_global: the TT global entry to update sync flags in
 *
 * Updates the sync flag bits in the tt_global flag attribute with a logical
 * OR of all sync flags from any of its TT orig entries.
 */
static void
batadv_tt_global_sync_flags(struct batadv_tt_global_entry *tt_global)
{
	struct batadv_tt_orig_list_entry *orig_entry;
	const struct hlist_head *head;
	u16 flags = BATADV_NO_FLAGS;

	rcu_read_lock();
	head = &tt_global->orig_list;
	hlist_for_each_entry_rcu(orig_entry, head, list)
		flags |= orig_entry->flags;
	rcu_read_unlock();

	flags |= tt_global->common.flags & (~BATADV_TT_SYNC_MASK);
	tt_global->common.flags = flags;
}

/**
1603
 * batadv_tt_global_orig_entry_add() - add or update a TT orig entry
1604 1605 1606 1607 1608
 * @tt_global: the TT global entry to add an orig entry in
 * @orig_node: the originator to add an orig entry for
 * @ttvn: translation table version number of this changeset
 * @flags: TT sync flags
 */
1609
static void
1610
batadv_tt_global_orig_entry_add(struct batadv_tt_global_entry *tt_global,
1611 1612
				struct batadv_orig_node *orig_node, int ttvn,
				u8 flags)
1613
{
1614
	struct batadv_tt_orig_list_entry *orig_entry;
1615

1616
	orig_entry = batadv_tt_global_orig_entry_find(tt_global, orig_node);
1617 1618 1619 1620 1621
	if (orig_entry) {
		/* refresh the ttvn: the current value could be a bogus one that
		 * was added during a "temporary client detection"
		 */
		orig_entry->ttvn = ttvn;
1622 1623
		orig_entry->flags = flags;
		goto sync_flags;
1624
	}
1625

1626
	orig_entry = kmem_cache_zalloc(batadv_tt_orig_cache, GFP_ATOMIC);
1627
	if (!orig_entry)
1628
		goto out;
1629 1630

	INIT_HLIST_NODE(&orig_entry->list);
1631
	kref_get(&orig_node->refcount);
1632
	batadv_tt_global_size_inc(orig_node, tt_global->common.vid);
1633 1634
	orig_entry->orig_node = orig_node;
	orig_entry->ttvn = ttvn;
1635
	orig_entry->flags = flags;
1636
	kref_init(&orig_entry->refcount);
1637

1638
	spin_lock_bh(&tt_global->list_lock);
1639
	kref_get(&orig_entry->refcount);
1640
	hlist_add_head_rcu(&orig_entry->list,
1641 1642
			   &tt_global->orig_list);
	spin_unlock_bh(&tt_global->list_lock);
1643 1644
	atomic_inc(&tt_global->orig_list_count);

1645 1646
sync_flags:
	batadv_tt_global_sync_flags(tt_global);
1647 1648
out:
	if (orig_entry)
1649
		batadv_tt_orig_list_entry_put(orig_entry);
1650 1651
}

1652
/**
1653
 * batadv_tt_global_add() - add a new TT global entry or update an existing one
1654 1655 1656
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: the originator announcing the client
 * @tt_addr: the mac address of the non-mesh client
1657
 * @vid: VLAN identifier
1658 1659 1660 1661 1662 1663 1664 1665 1666 1667
 * @flags: TT flags that have to be set for this non-mesh client
 * @ttvn: the tt version number ever announcing this non-mesh client
 *
 * Add a new TT global entry for the given originator. If the entry already
 * exists add a new reference to the given originator (a global entry can have
 * references to multiple originators) and adjust the flags attribute to reflect
 * the function argument.
 * If a TT local entry exists for this non-mesh client remove it.
 *
 * The caller must hold orig_node refcount.
1668
 *
1669
 * Return: true if the new entry has been added, false otherwise
1670
 */
1671 1672
static bool batadv_tt_global_add(struct batadv_priv *bat_priv,
				 struct batadv_orig_node *orig_node,
1673
				 const unsigned char *tt_addr,
1674
				 unsigned short vid, u16 flags, u8 ttvn)
1675
{
1676 1677
	struct batadv_tt_global_entry *tt_global_entry;
	struct batadv_tt_local_entry *tt_local_entry;
1678
	bool ret = false;
1679
	int hash_added;
1680
	struct batadv_tt_common_entry *common;
1681
	u16 local_flags;
1682

1683 1684 1685 1686
	/* ignore global entries from backbone nodes */
	if (batadv_bla_is_backbone_gw_orig(bat_priv, orig_node->orig, vid))
		return true;

1687 1688
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, tt_addr, vid);
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, tt_addr, vid);
1689 1690 1691 1692 1693 1694 1695 1696

	/* if the node already has a local client for this entry, it has to wait
	 * for a roaming advertisement instead of manually messing up the global
	 * table
	 */
	if ((flags & BATADV_TT_CLIENT_TEMP) && tt_local_entry &&
	    !(tt_local_entry->common.flags & BATADV_TT_CLIENT_NEW))
		goto out;
1697 1698

	if (!tt_global_entry) {
1699 1700
		tt_global_entry = kmem_cache_zalloc(batadv_tg_cache,
						    GFP_ATOMIC);
1701
		if (!tt_global_entry)
1702 1703
			goto out;

1704
		common = &tt_global_entry->common;
1705
		ether_addr_copy(common->addr, tt_addr);
1706
		common->vid = vid;
1707

1708 1709
		if (!is_multicast_ether_addr(common->addr))
			common->flags = flags & (~BATADV_TT_SYNC_MASK);
1710

1711
		tt_global_entry->roam_at = 0;
1712 1713 1714 1715 1716 1717
		/* node must store current time in case of roaming. This is
		 * needed to purge this entry out on timeout (if nobody claims
		 * it)
		 */
		if (flags & BATADV_TT_CLIENT_ROAM)
			tt_global_entry->roam_at = jiffies;
1718
		kref_init(&common->refcount);
1719
		common->added_at = jiffies;
1720 1721

		INIT_HLIST_HEAD(&tt_global_entry->orig_list);
1722
		atomic_set(&tt_global_entry->orig_list_count, 0);
1723
		spin_lock_init(&tt_global_entry->list_lock);
1724

1725
		kref_get(&common->refcount);
1726
		hash_added = batadv_hash_add(bat_priv->tt.global_hash,
1727
					     batadv_compare_tt,
1728
					     batadv_choose_tt, common,
1729
					     &common->hash_entry);
1730 1731 1732

		if (unlikely(hash_added != 0)) {
			/* remove the reference for the hash */
1733
			batadv_tt_global_entry_put(tt_global_entry);
1734 1735
			goto out_remove;
		}
1736
	} else {
1737
		common = &tt_global_entry->common;
1738 1739
		/* If there is already a global entry, we can use this one for
		 * our processing.
1740 1741 1742 1743 1744 1745 1746
		 * But if we are trying to add a temporary client then here are
		 * two options at this point:
		 * 1) the global client is not a temporary client: the global
		 *    client has to be left as it is, temporary information
		 *    should never override any already known client state
		 * 2) the global client is a temporary client: purge the
		 *    originator list and add the new one orig_entry
1747
		 */
1748 1749 1750 1751
		if (flags & BATADV_TT_CLIENT_TEMP) {
			if (!(common->flags & BATADV_TT_CLIENT_TEMP))
				goto out;
			if (batadv_tt_global_entry_has_orig(tt_global_entry,
1752
							    orig_node, NULL))
1753 1754 1755 1756
				goto out_remove;
			batadv_tt_global_del_orig_list(tt_global_entry);
			goto add_orig_entry;
		}
1757 1758

		/* if the client was temporary added before receiving the first
1759 1760 1761 1762
		 * OGM announcing it, we have to clear the TEMP flag. Also,
		 * remove the previous temporary orig node and re-add it
		 * if required. If the orig entry changed, the new one which
		 * is a non-temporary entry is preferred.
1763
		 */
1764 1765 1766 1767
		if (common->flags & BATADV_TT_CLIENT_TEMP) {
			batadv_tt_global_del_orig_list(tt_global_entry);
			common->flags &= ~BATADV_TT_CLIENT_TEMP;
		}
1768

1769
		/* the change can carry possible "attribute" flags like the
1770
		 * TT_CLIENT_TEMP, therefore they have to be copied in the
1771 1772
		 * client entry
		 */
1773 1774
		if (!is_multicast_ether_addr(common->addr))
			common->flags |= flags & (~BATADV_TT_SYNC_MASK);
1775

1776 1777
		/* If there is the BATADV_TT_CLIENT_ROAM flag set, there is only
		 * one originator left in the list and we previously received a
1778 1779 1780 1781 1782
		 * delete + roaming change for this originator.
		 *
		 * We should first delete the old originator before adding the
		 * new one.
		 */
1783
		if (common->flags & BATADV_TT_CLIENT_ROAM) {
1784
			batadv_tt_global_del_orig_list(tt_global_entry);
1785
			common->flags &= ~BATADV_TT_CLIENT_ROAM;
1786
			tt_global_entry->roam_at = 0;
1787 1788
		}
	}
1789
add_orig_entry:
1790
	/* add the new orig_entry (if needed) or update it */
1791 1792
	batadv_tt_global_orig_entry_add(tt_global_entry, orig_node, ttvn,
					flags & BATADV_TT_SYNC_MASK);
1793

1794
	batadv_dbg(BATADV_DBG_TT, bat_priv,
1795
		   "Creating new global tt entry: %pM (vid: %d, via %pM)\n",
1796
		   common->addr, batadv_print_vid(common->vid),
1797
		   orig_node->orig);
1798
	ret = true;
1799

1800
out_remove:
1801 1802 1803 1804 1805
	/* Do not remove multicast addresses from the local hash on
	 * global additions
	 */
	if (is_multicast_ether_addr(tt_addr))
		goto out;
1806

1807
	/* remove address from local hash if present */
1808
	local_flags = batadv_tt_local_remove(bat_priv, tt_addr, vid,
1809
					     "global tt received",
1810
					     flags & BATADV_TT_CLIENT_ROAM);
1811 1812
	tt_global_entry->common.flags |= local_flags & BATADV_TT_CLIENT_WIFI;

1813 1814 1815 1816 1817 1818
	if (!(flags & BATADV_TT_CLIENT_ROAM))
		/* this is a normal global add. Therefore the client is not in a
		 * roaming state anymore.
		 */
		tt_global_entry->common.flags &= ~BATADV_TT_CLIENT_ROAM;

1819 1820
out:
	if (tt_global_entry)
1821
		batadv_tt_global_entry_put(tt_global_entry);
1822
	if (tt_local_entry)
1823
		batadv_tt_local_entry_put(tt_local_entry);
1824
	return ret;
1825 1826
}

1827
/**
1828
 * batadv_transtable_best_orig() - Get best originator list entry from tt entry
1829
 * @bat_priv: the bat priv with all the soft interface information
1830 1831 1832
 * @tt_global_entry: global translation table entry to be analyzed
 *
 * This functon assumes the caller holds rcu_read_lock().
1833
 * Return: best originator list entry or NULL on errors.
1834 1835
 */
static struct batadv_tt_orig_list_entry *
1836 1837
batadv_transtable_best_orig(struct batadv_priv *bat_priv,
			    struct batadv_tt_global_entry *tt_global_entry)
1838
{
1839
	struct batadv_neigh_node *router, *best_router = NULL;
1840
	struct batadv_algo_ops *bao = bat_priv->algo_ops;
1841 1842 1843 1844
	struct hlist_head *head;
	struct batadv_tt_orig_list_entry *orig_entry, *best_entry = NULL;

	head = &tt_global_entry->orig_list;
1845
	hlist_for_each_entry_rcu(orig_entry, head, list) {
1846 1847
		router = batadv_orig_router_get(orig_entry->orig_node,
						BATADV_IF_DEFAULT);
1848 1849 1850
		if (!router)
			continue;

1851
		if (best_router &&
1852 1853
		    bao->neigh.cmp(router, BATADV_IF_DEFAULT, best_router,
				   BATADV_IF_DEFAULT) <= 0) {
1854
			batadv_neigh_node_put(router);
1855
			continue;
1856 1857
		}

1858 1859
		/* release the refcount for the "old" best */
		if (best_router)
1860
			batadv_neigh_node_put(best_router);
1861 1862 1863

		best_entry = orig_entry;
		best_router = router;
1864 1865
	}

1866
	if (best_router)
1867
		batadv_neigh_node_put(best_router);
1868

1869 1870 1871
	return best_entry;
}

1872
#ifdef CONFIG_BATMAN_ADV_DEBUGFS
1873
/**
1874 1875
 * batadv_tt_global_print_entry() - print all orig nodes who announce the
 *  address for this global entry
1876
 * @bat_priv: the bat priv with all the soft interface information
1877 1878 1879 1880
 * @tt_global_entry: global translation table entry to be printed
 * @seq: debugfs table seq_file struct
 *
 * This functon assumes the caller holds rcu_read_lock().
1881
 */
1882
static void
1883 1884
batadv_tt_global_print_entry(struct batadv_priv *bat_priv,
			     struct batadv_tt_global_entry *tt_global_entry,
1885
			     struct seq_file *seq)
1886
{
1887
	struct batadv_tt_orig_list_entry *orig_entry, *best_entry;
1888
	struct batadv_tt_common_entry *tt_common_entry;
1889 1890
	struct batadv_orig_node_vlan *vlan;
	struct hlist_head *head;
1891 1892
	u8 last_ttvn;
	u16 flags;
1893 1894

	tt_common_entry = &tt_global_entry->common;
1895 1896
	flags = tt_common_entry->flags;

1897
	best_entry = batadv_transtable_best_orig(bat_priv, tt_global_entry);
1898
	if (best_entry) {
1899 1900 1901 1902 1903
		vlan = batadv_orig_node_vlan_get(best_entry->orig_node,
						 tt_common_entry->vid);
		if (!vlan) {
			seq_printf(seq,
				   " * Cannot retrieve VLAN %d for originator %pM\n",
1904
				   batadv_print_vid(tt_common_entry->vid),
1905 1906 1907 1908
				   best_entry->orig_node->orig);
			goto print_list;
		}

1909
		last_ttvn = atomic_read(&best_entry->orig_node->last_ttvn);
1910
		seq_printf(seq,
1911
			   " %c %pM %4i   (%3u) via %pM     (%3u)   (%#.8x) [%c%c%c%c]\n",
1912
			   '*', tt_global_entry->common.addr,
1913
			   batadv_print_vid(tt_global_entry->common.vid),
1914
			   best_entry->ttvn, best_entry->orig_node->orig,
1915
			   last_ttvn, vlan->tt.crc,
1916 1917 1918 1919
			   ((flags & BATADV_TT_CLIENT_ROAM) ? 'R' : '.'),
			   ((flags & BATADV_TT_CLIENT_WIFI) ? 'W' : '.'),
			   ((flags & BATADV_TT_CLIENT_ISOLA) ? 'I' : '.'),
			   ((flags & BATADV_TT_CLIENT_TEMP) ? 'T' : '.'));
1920

1921
		batadv_orig_node_vlan_put(vlan);
1922
	}
1923

1924
print_list:
1925 1926
	head = &tt_global_entry->orig_list;

1927
	hlist_for_each_entry_rcu(orig_entry, head, list) {
1928 1929 1930
		if (best_entry == orig_entry)
			continue;

1931 1932 1933 1934 1935
		vlan = batadv_orig_node_vlan_get(orig_entry->orig_node,
						 tt_common_entry->vid);
		if (!vlan) {
			seq_printf(seq,
				   " + Cannot retrieve VLAN %d for originator %pM\n",
1936
				   batadv_print_vid(tt_common_entry->vid),
1937 1938 1939 1940
				   orig_entry->orig_node->orig);
			continue;
		}

1941
		last_ttvn = atomic_read(&orig_entry->orig_node->last_ttvn);
1942
		seq_printf(seq,
1943
			   " %c %pM %4d   (%3u) via %pM     (%3u)   (%#.8x) [%c%c%c%c]\n",
1944
			   '+', tt_global_entry->common.addr,
1945
			   batadv_print_vid(tt_global_entry->common.vid),
1946
			   orig_entry->ttvn, orig_entry->orig_node->orig,
1947
			   last_ttvn, vlan->tt.crc,
1948 1949 1950 1951
			   ((flags & BATADV_TT_CLIENT_ROAM) ? 'R' : '.'),
			   ((flags & BATADV_TT_CLIENT_WIFI) ? 'W' : '.'),
			   ((flags & BATADV_TT_CLIENT_ISOLA) ? 'I' : '.'),
			   ((flags & BATADV_TT_CLIENT_TEMP) ? 'T' : '.'));
1952

1953
		batadv_orig_node_vlan_put(vlan);
1954 1955 1956
	}
}

1957 1958 1959 1960 1961 1962 1963
/**
 * batadv_tt_global_seq_print_text() - Print the global tt table in a seq file
 * @seq: seq file to print on
 * @offset: not used
 *
 * Return: always 0
 */
1964
int batadv_tt_global_seq_print_text(struct seq_file *seq, void *offset)
1965 1966
{
	struct net_device *net_dev = (struct net_device *)seq->private;
1967
	struct batadv_priv *bat_priv = netdev_priv(net_dev);
1968
	struct batadv_hashtable *hash = bat_priv->tt.global_hash;
1969 1970 1971
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_global_entry *tt_global;
	struct batadv_hard_iface *primary_if;
1972
	struct hlist_head *head;
1973
	u32 i;
1974

1975 1976
	primary_if = batadv_seq_print_text_primary_if_get(seq);
	if (!primary_if)
1977
		goto out;
1978

1979 1980
	seq_printf(seq,
		   "Globally announced TT entries received via the mesh %s\n",
1981
		   net_dev->name);
1982 1983
	seq_puts(seq,
		 "       Client         VID  (TTVN)       Originator      (Curr TTVN) (CRC       ) Flags\n");
1984 1985 1986 1987

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

1988
		rcu_read_lock();
1989
		hlist_for_each_entry_rcu(tt_common_entry,
1990
					 head, hash_entry) {
1991 1992 1993
			tt_global = container_of(tt_common_entry,
						 struct batadv_tt_global_entry,
						 common);
1994
			batadv_tt_global_print_entry(bat_priv, tt_global, seq);
1995
		}
1996
		rcu_read_unlock();
1997
	}
1998 1999
out:
	if (primary_if)
2000
		batadv_hardif_put(primary_if);
2001
	return 0;
2002
}
2003
#endif
2004

2005
/**
2006
 * batadv_tt_global_dump_subentry() - Dump all TT local entries into a message
2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021
 * @msg: Netlink message to dump into
 * @portid: Port making netlink request
 * @seq: Sequence number of netlink message
 * @common: tt local & tt global common data
 * @orig: Originator node announcing a non-mesh client
 * @best: Is the best originator for the TT entry
 *
 * Return: Error code, or 0 on success
 */
static int
batadv_tt_global_dump_subentry(struct sk_buff *msg, u32 portid, u32 seq,
			       struct batadv_tt_common_entry *common,
			       struct batadv_tt_orig_list_entry *orig,
			       bool best)
{
2022
	u16 flags = (common->flags & (~BATADV_TT_SYNC_MASK)) | orig->flags;
2023 2024 2025 2026 2027 2028 2029 2030 2031 2032 2033 2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 2046 2047 2048 2049 2050 2051
	void *hdr;
	struct batadv_orig_node_vlan *vlan;
	u8 last_ttvn;
	u32 crc;

	vlan = batadv_orig_node_vlan_get(orig->orig_node,
					 common->vid);
	if (!vlan)
		return 0;

	crc = vlan->tt.crc;

	batadv_orig_node_vlan_put(vlan);

	hdr = genlmsg_put(msg, portid, seq, &batadv_netlink_family,
			  NLM_F_MULTI,
			  BATADV_CMD_GET_TRANSTABLE_GLOBAL);
	if (!hdr)
		return -ENOBUFS;

	last_ttvn = atomic_read(&orig->orig_node->last_ttvn);

	if (nla_put(msg, BATADV_ATTR_TT_ADDRESS, ETH_ALEN, common->addr) ||
	    nla_put(msg, BATADV_ATTR_ORIG_ADDRESS, ETH_ALEN,
		    orig->orig_node->orig) ||
	    nla_put_u8(msg, BATADV_ATTR_TT_TTVN, orig->ttvn) ||
	    nla_put_u8(msg, BATADV_ATTR_TT_LAST_TTVN, last_ttvn) ||
	    nla_put_u32(msg, BATADV_ATTR_TT_CRC32, crc) ||
	    nla_put_u16(msg, BATADV_ATTR_TT_VID, common->vid) ||
2052
	    nla_put_u32(msg, BATADV_ATTR_TT_FLAGS, flags))
2053 2054 2055 2056 2057 2058 2059 2060 2061 2062 2063 2064 2065 2066
		goto nla_put_failure;

	if (best && nla_put_flag(msg, BATADV_ATTR_FLAG_BEST))
		goto nla_put_failure;

	genlmsg_end(msg, hdr);
	return 0;

 nla_put_failure:
	genlmsg_cancel(msg, hdr);
	return -EMSGSIZE;
}

/**
2067
 * batadv_tt_global_dump_entry() - Dump one TT global entry into a message
2068 2069 2070 2071 2072 2073 2074 2075 2076 2077 2078 2079 2080 2081 2082 2083 2084 2085 2086 2087 2088 2089 2090 2091 2092 2093 2094 2095 2096 2097 2098 2099 2100 2101 2102 2103 2104 2105 2106 2107 2108 2109 2110 2111
 * @msg: Netlink message to dump into
 * @portid: Port making netlink request
 * @seq: Sequence number of netlink message
 * @bat_priv: The bat priv with all the soft interface information
 * @common: tt local & tt global common data
 * @sub_s: Number of entries to skip
 *
 * This function assumes the caller holds rcu_read_lock().
 *
 * Return: Error code, or 0 on success
 */
static int
batadv_tt_global_dump_entry(struct sk_buff *msg, u32 portid, u32 seq,
			    struct batadv_priv *bat_priv,
			    struct batadv_tt_common_entry *common, int *sub_s)
{
	struct batadv_tt_orig_list_entry *orig_entry, *best_entry;
	struct batadv_tt_global_entry *global;
	struct hlist_head *head;
	int sub = 0;
	bool best;

	global = container_of(common, struct batadv_tt_global_entry, common);
	best_entry = batadv_transtable_best_orig(bat_priv, global);
	head = &global->orig_list;

	hlist_for_each_entry_rcu(orig_entry, head, list) {
		if (sub++ < *sub_s)
			continue;

		best = (orig_entry == best_entry);

		if (batadv_tt_global_dump_subentry(msg, portid, seq, common,
						   orig_entry, best)) {
			*sub_s = sub - 1;
			return -EMSGSIZE;
		}
	}

	*sub_s = 0;
	return 0;
}

/**
2112
 * batadv_tt_global_dump_bucket() - Dump one TT local bucket into a message
2113 2114 2115 2116 2117 2118 2119 2120 2121 2122 2123 2124 2125 2126 2127 2128 2129 2130 2131 2132 2133 2134 2135 2136 2137 2138 2139 2140 2141 2142 2143 2144 2145 2146 2147 2148 2149 2150
 * @msg: Netlink message to dump into
 * @portid: Port making netlink request
 * @seq: Sequence number of netlink message
 * @bat_priv: The bat priv with all the soft interface information
 * @head: Pointer to the list containing the global tt entries
 * @idx_s: Number of entries to skip
 * @sub: Number of entries to skip
 *
 * Return: Error code, or 0 on success
 */
static int
batadv_tt_global_dump_bucket(struct sk_buff *msg, u32 portid, u32 seq,
			     struct batadv_priv *bat_priv,
			     struct hlist_head *head, int *idx_s, int *sub)
{
	struct batadv_tt_common_entry *common;
	int idx = 0;

	rcu_read_lock();
	hlist_for_each_entry_rcu(common, head, hash_entry) {
		if (idx++ < *idx_s)
			continue;

		if (batadv_tt_global_dump_entry(msg, portid, seq, bat_priv,
						common, sub)) {
			rcu_read_unlock();
			*idx_s = idx - 1;
			return -EMSGSIZE;
		}
	}
	rcu_read_unlock();

	*idx_s = 0;
	*sub = 0;
	return 0;
}

/**
2151
 * batadv_tt_global_dump() -  Dump TT global entries into a message
2152 2153 2154 2155 2156 2157 2158 2159 2160 2161 2162 2163 2164 2165 2166 2167 2168 2169 2170 2171 2172 2173 2174 2175 2176 2177 2178 2179 2180 2181 2182 2183 2184 2185 2186 2187 2188 2189 2190 2191 2192 2193 2194 2195 2196 2197 2198 2199 2200 2201 2202 2203 2204 2205 2206 2207 2208 2209 2210 2211 2212 2213 2214 2215 2216 2217
 * @msg: Netlink message to dump into
 * @cb: Parameters from query
 *
 * Return: Error code, or length of message on success
 */
int batadv_tt_global_dump(struct sk_buff *msg, struct netlink_callback *cb)
{
	struct net *net = sock_net(cb->skb->sk);
	struct net_device *soft_iface;
	struct batadv_priv *bat_priv;
	struct batadv_hard_iface *primary_if = NULL;
	struct batadv_hashtable *hash;
	struct hlist_head *head;
	int ret;
	int ifindex;
	int bucket = cb->args[0];
	int idx = cb->args[1];
	int sub = cb->args[2];
	int portid = NETLINK_CB(cb->skb).portid;

	ifindex = batadv_netlink_get_ifindex(cb->nlh, BATADV_ATTR_MESH_IFINDEX);
	if (!ifindex)
		return -EINVAL;

	soft_iface = dev_get_by_index(net, ifindex);
	if (!soft_iface || !batadv_softif_is_valid(soft_iface)) {
		ret = -ENODEV;
		goto out;
	}

	bat_priv = netdev_priv(soft_iface);

	primary_if = batadv_primary_if_get_selected(bat_priv);
	if (!primary_if || primary_if->if_status != BATADV_IF_ACTIVE) {
		ret = -ENOENT;
		goto out;
	}

	hash = bat_priv->tt.global_hash;

	while (bucket < hash->size) {
		head = &hash->table[bucket];

		if (batadv_tt_global_dump_bucket(msg, portid,
						 cb->nlh->nlmsg_seq, bat_priv,
						 head, &idx, &sub))
			break;

		bucket++;
	}

	ret = msg->len;

 out:
	if (primary_if)
		batadv_hardif_put(primary_if);
	if (soft_iface)
		dev_put(soft_iface);

	cb->args[0] = bucket;
	cb->args[1] = idx;
	cb->args[2] = sub;

	return ret;
}

2218
/**
2219
 * _batadv_tt_global_del_orig_entry() - remove and free an orig_entry
2220 2221 2222 2223 2224
 * @tt_global_entry: the global entry to remove the orig_entry from
 * @orig_entry: the orig entry to remove and free
 *
 * Remove an orig_entry from its list in the given tt_global_entry and
 * free this orig_entry afterwards.
2225 2226 2227
 *
 * Caller must hold tt_global_entry->list_lock and ensure orig_entry->list is
 * part of a list.
2228 2229
 */
static void
2230 2231
_batadv_tt_global_del_orig_entry(struct batadv_tt_global_entry *tt_global_entry,
				 struct batadv_tt_orig_list_entry *orig_entry)
2232
{
2233 2234
	lockdep_assert_held(&tt_global_entry->list_lock);

2235 2236 2237
	batadv_tt_global_size_dec(orig_entry->orig_node,
				  tt_global_entry->common.vid);
	atomic_dec(&tt_global_entry->orig_list_count);
2238 2239 2240
	/* requires holding tt_global_entry->list_lock and orig_entry->list
	 * being part of a list
	 */
2241
	hlist_del_rcu(&orig_entry->list);
2242
	batadv_tt_orig_list_entry_put(orig_entry);
2243 2244
}

2245
/* deletes the orig list of a tt_global_entry */
2246
static void
2247
batadv_tt_global_del_orig_list(struct batadv_tt_global_entry *tt_global_entry)
2248
{
2249
	struct hlist_head *head;
2250
	struct hlist_node *safe;
2251
	struct batadv_tt_orig_list_entry *orig_entry;
2252

2253 2254
	spin_lock_bh(&tt_global_entry->list_lock);
	head = &tt_global_entry->orig_list;
2255
	hlist_for_each_entry_safe(orig_entry, safe, head, list)
2256
		_batadv_tt_global_del_orig_entry(tt_global_entry, orig_entry);
2257 2258 2259
	spin_unlock_bh(&tt_global_entry->list_lock);
}

2260
/**
2261
 * batadv_tt_global_del_orig_node() - remove orig_node from a global tt entry
2262 2263 2264 2265 2266 2267 2268 2269
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_global_entry: the global entry to remove the orig_node from
 * @orig_node: the originator announcing the client
 * @message: message to append to the log on deletion
 *
 * Remove the given orig_node and its according orig_entry from the given
 * global tt entry.
 */
2270
static void
2271 2272 2273 2274
batadv_tt_global_del_orig_node(struct batadv_priv *bat_priv,
			       struct batadv_tt_global_entry *tt_global_entry,
			       struct batadv_orig_node *orig_node,
			       const char *message)
2275 2276
{
	struct hlist_head *head;
2277
	struct hlist_node *safe;
2278
	struct batadv_tt_orig_list_entry *orig_entry;
2279
	unsigned short vid;
2280 2281 2282

	spin_lock_bh(&tt_global_entry->list_lock);
	head = &tt_global_entry->orig_list;
2283
	hlist_for_each_entry_safe(orig_entry, safe, head, list) {
2284
		if (orig_entry->orig_node == orig_node) {
2285
			vid = tt_global_entry->common.vid;
2286
			batadv_dbg(BATADV_DBG_TT, bat_priv,
2287
				   "Deleting %pM from global tt entry %pM (vid: %d): %s\n",
2288
				   orig_node->orig,
2289
				   tt_global_entry->common.addr,
2290
				   batadv_print_vid(vid), message);
2291 2292
			_batadv_tt_global_del_orig_entry(tt_global_entry,
							 orig_entry);
2293 2294 2295 2296 2297 2298
		}
	}
	spin_unlock_bh(&tt_global_entry->list_lock);
}

/* If the client is to be deleted, we check if it is the last origantor entry
2299 2300
 * within tt_global entry. If yes, we set the BATADV_TT_CLIENT_ROAM flag and the
 * timer, otherwise we simply remove the originator scheduled for deletion.
2301
 */
2302
static void
2303 2304 2305 2306
batadv_tt_global_del_roaming(struct batadv_priv *bat_priv,
			     struct batadv_tt_global_entry *tt_global_entry,
			     struct batadv_orig_node *orig_node,
			     const char *message)
2307 2308 2309
{
	bool last_entry = true;
	struct hlist_head *head;
2310
	struct batadv_tt_orig_list_entry *orig_entry;
2311 2312 2313 2314 2315 2316 2317

	/* no local entry exists, case 1:
	 * Check if this is the last one or if other entries exist.
	 */

	rcu_read_lock();
	head = &tt_global_entry->orig_list;
2318
	hlist_for_each_entry_rcu(orig_entry, head, list) {
2319 2320 2321 2322 2323 2324 2325 2326 2327
		if (orig_entry->orig_node != orig_node) {
			last_entry = false;
			break;
		}
	}
	rcu_read_unlock();

	if (last_entry) {
		/* its the last one, mark for roaming. */
2328
		tt_global_entry->common.flags |= BATADV_TT_CLIENT_ROAM;
2329
		tt_global_entry->roam_at = jiffies;
2330
	} else {
2331 2332 2333
		/* there is another entry, we can simply delete this
		 * one and can still use the other one.
		 */
2334 2335
		batadv_tt_global_del_orig_node(bat_priv, tt_global_entry,
					       orig_node, message);
2336
	}
2337 2338
}

2339
/**
2340
 * batadv_tt_global_del() - remove a client from the global table
2341 2342 2343 2344 2345 2346 2347 2348
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: an originator serving this client
 * @addr: the mac address of the client
 * @vid: VLAN identifier
 * @message: a message explaining the reason for deleting the client to print
 *  for debugging purpose
 * @roaming: true if the deletion has been triggered by a roaming event
 */
2349 2350
static void batadv_tt_global_del(struct batadv_priv *bat_priv,
				 struct batadv_orig_node *orig_node,
2351
				 const unsigned char *addr, unsigned short vid,
2352
				 const char *message, bool roaming)
2353
{
2354
	struct batadv_tt_global_entry *tt_global_entry;
2355
	struct batadv_tt_local_entry *local_entry = NULL;
2356

2357
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
2358
	if (!tt_global_entry)
2359
		goto out;
2360

2361
	if (!roaming) {
2362 2363
		batadv_tt_global_del_orig_node(bat_priv, tt_global_entry,
					       orig_node, message);
2364 2365

		if (hlist_empty(&tt_global_entry->orig_list))
2366 2367
			batadv_tt_global_free(bat_priv, tt_global_entry,
					      message);
2368 2369 2370

		goto out;
	}
2371 2372 2373

	/* if we are deleting a global entry due to a roam
	 * event, there are two possibilities:
2374 2375
	 * 1) the client roamed from node A to node B => if there
	 *    is only one originator left for this client, we mark
2376
	 *    it with BATADV_TT_CLIENT_ROAM, we start a timer and we
2377 2378
	 *    wait for node B to claim it. In case of timeout
	 *    the entry is purged.
2379 2380 2381
	 *
	 *    If there are other originators left, we directly delete
	 *    the originator.
2382
	 * 2) the client roamed to us => we can directly delete
2383 2384
	 *    the global entry, since it is useless now.
	 */
2385
	local_entry = batadv_tt_local_hash_find(bat_priv,
2386 2387
						tt_global_entry->common.addr,
						vid);
2388
	if (local_entry) {
2389
		/* local entry exists, case 2: client roamed to us. */
2390
		batadv_tt_global_del_orig_list(tt_global_entry);
2391
		batadv_tt_global_free(bat_priv, tt_global_entry, message);
2392
	} else {
2393
		/* no local entry exists, case 1: check for roaming */
2394 2395
		batadv_tt_global_del_roaming(bat_priv, tt_global_entry,
					     orig_node, message);
2396
	}
2397

2398
out:
2399
	if (tt_global_entry)
2400
		batadv_tt_global_entry_put(tt_global_entry);
2401
	if (local_entry)
2402
		batadv_tt_local_entry_put(local_entry);
2403 2404
}

2405
/**
2406 2407
 * batadv_tt_global_del_orig() - remove all the TT global entries belonging to
 *  the given originator matching the provided vid
2408 2409 2410 2411 2412 2413
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: the originator owning the entries to remove
 * @match_vid: the VLAN identifier to match. If negative all the entries will be
 *  removed
 * @message: debug message to print as "reason"
 */
2414 2415
void batadv_tt_global_del_orig(struct batadv_priv *bat_priv,
			       struct batadv_orig_node *orig_node,
2416
			       s32 match_vid,
2417
			       const char *message)
2418
{
2419 2420
	struct batadv_tt_global_entry *tt_global;
	struct batadv_tt_common_entry *tt_common_entry;
2421
	u32 i;
2422
	struct batadv_hashtable *hash = bat_priv->tt.global_hash;
2423
	struct hlist_node *safe;
2424
	struct hlist_head *head;
2425
	spinlock_t *list_lock; /* protects write access to the hash lists */
2426
	unsigned short vid;
2427

2428 2429 2430
	if (!hash)
		return;

2431 2432
	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
2433
		list_lock = &hash->list_locks[i];
2434

2435
		spin_lock_bh(list_lock);
2436
		hlist_for_each_entry_safe(tt_common_entry, safe,
2437
					  head, hash_entry) {
2438 2439 2440 2441
			/* remove only matching entries */
			if (match_vid >= 0 && tt_common_entry->vid != match_vid)
				continue;

2442 2443 2444
			tt_global = container_of(tt_common_entry,
						 struct batadv_tt_global_entry,
						 common);
2445

2446 2447
			batadv_tt_global_del_orig_node(bat_priv, tt_global,
						       orig_node, message);
2448

2449
			if (hlist_empty(&tt_global->orig_list)) {
2450
				vid = tt_global->common.vid;
2451
				batadv_dbg(BATADV_DBG_TT, bat_priv,
2452 2453
					   "Deleting global tt entry %pM (vid: %d): %s\n",
					   tt_global->common.addr,
2454
					   batadv_print_vid(vid), message);
2455
				hlist_del_rcu(&tt_common_entry->hash_entry);
2456
				batadv_tt_global_entry_put(tt_global);
2457
			}
2458
		}
2459
		spin_unlock_bh(list_lock);
2460
	}
2461
	clear_bit(BATADV_ORIG_CAPA_HAS_TT, &orig_node->capa_initialized);
2462 2463
}

2464 2465
static bool batadv_tt_global_to_purge(struct batadv_tt_global_entry *tt_global,
				      char **msg)
2466
{
2467 2468 2469
	bool purge = false;
	unsigned long roam_timeout = BATADV_TT_CLIENT_ROAM_TIMEOUT;
	unsigned long temp_timeout = BATADV_TT_CLIENT_TEMP_TIMEOUT;
2470

2471 2472 2473 2474 2475
	if ((tt_global->common.flags & BATADV_TT_CLIENT_ROAM) &&
	    batadv_has_timed_out(tt_global->roam_at, roam_timeout)) {
		purge = true;
		*msg = "Roaming timeout\n";
	}
2476

2477 2478 2479 2480
	if ((tt_global->common.flags & BATADV_TT_CLIENT_TEMP) &&
	    batadv_has_timed_out(tt_global->common.added_at, temp_timeout)) {
		purge = true;
		*msg = "Temporary client timeout\n";
2481
	}
2482 2483

	return purge;
2484 2485
}

2486
static void batadv_tt_global_purge(struct batadv_priv *bat_priv)
2487
{
2488
	struct batadv_hashtable *hash = bat_priv->tt.global_hash;
2489
	struct hlist_head *head;
2490
	struct hlist_node *node_tmp;
2491
	spinlock_t *list_lock; /* protects write access to the hash lists */
2492
	u32 i;
2493 2494 2495
	char *msg = NULL;
	struct batadv_tt_common_entry *tt_common;
	struct batadv_tt_global_entry *tt_global;
2496 2497 2498

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
2499
		list_lock = &hash->list_locks[i];
2500

2501
		spin_lock_bh(list_lock);
2502
		hlist_for_each_entry_safe(tt_common, node_tmp, head,
2503 2504 2505 2506 2507 2508 2509 2510 2511
					  hash_entry) {
			tt_global = container_of(tt_common,
						 struct batadv_tt_global_entry,
						 common);

			if (!batadv_tt_global_to_purge(tt_global, &msg))
				continue;

			batadv_dbg(BATADV_DBG_TT, bat_priv,
2512 2513
				   "Deleting global tt entry %pM (vid: %d): %s\n",
				   tt_global->common.addr,
2514
				   batadv_print_vid(tt_global->common.vid),
2515
				   msg);
2516

2517
			hlist_del_rcu(&tt_common->hash_entry);
2518

2519
			batadv_tt_global_entry_put(tt_global);
2520
		}
2521
		spin_unlock_bh(list_lock);
2522 2523 2524
	}
}

2525
static void batadv_tt_global_table_free(struct batadv_priv *bat_priv)
2526
{
2527
	struct batadv_hashtable *hash;
2528
	spinlock_t *list_lock; /* protects write access to the hash lists */
2529 2530
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_global_entry *tt_global;
2531
	struct hlist_node *node_tmp;
2532
	struct hlist_head *head;
2533
	u32 i;
2534

2535
	if (!bat_priv->tt.global_hash)
2536 2537
		return;

2538
	hash = bat_priv->tt.global_hash;
2539 2540 2541 2542 2543 2544

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
		list_lock = &hash->list_locks[i];

		spin_lock_bh(list_lock);
2545
		hlist_for_each_entry_safe(tt_common_entry, node_tmp,
2546
					  head, hash_entry) {
2547
			hlist_del_rcu(&tt_common_entry->hash_entry);
2548 2549 2550
			tt_global = container_of(tt_common_entry,
						 struct batadv_tt_global_entry,
						 common);
2551
			batadv_tt_global_entry_put(tt_global);
2552 2553 2554 2555
		}
		spin_unlock_bh(list_lock);
	}

2556
	batadv_hash_destroy(hash);
2557

2558
	bat_priv->tt.global_hash = NULL;
2559 2560
}

2561 2562 2563
static bool
_batadv_is_ap_isolated(struct batadv_tt_local_entry *tt_local_entry,
		       struct batadv_tt_global_entry *tt_global_entry)
2564
{
2565 2566
	if (tt_local_entry->common.flags & BATADV_TT_CLIENT_WIFI &&
	    tt_global_entry->common.flags & BATADV_TT_CLIENT_WIFI)
2567
		return true;
2568

2569 2570 2571
	/* check if the two clients are marked as isolated */
	if (tt_local_entry->common.flags & BATADV_TT_CLIENT_ISOLA &&
	    tt_global_entry->common.flags & BATADV_TT_CLIENT_ISOLA)
2572
		return true;
2573

2574
	return false;
2575 2576
}

2577
/**
2578
 * batadv_transtable_search() - get the mesh destination for a given client
2579 2580 2581 2582 2583
 * @bat_priv: the bat priv with all the soft interface information
 * @src: mac address of the source client
 * @addr: mac address of the destination client
 * @vid: VLAN identifier
 *
2584
 * Return: a pointer to the originator that was selected as destination in the
2585 2586 2587 2588 2589 2590
 * mesh for contacting the client 'addr', NULL otherwise.
 * In case of multiple originators serving the same client, the function returns
 * the best one (best in terms of metric towards the destination node).
 *
 * If the two clients are AP isolated the function returns NULL.
 */
2591
struct batadv_orig_node *batadv_transtable_search(struct batadv_priv *bat_priv,
2592 2593
						  const u8 *src,
						  const u8 *addr,
2594
						  unsigned short vid)
2595
{
2596 2597 2598
	struct batadv_tt_local_entry *tt_local_entry = NULL;
	struct batadv_tt_global_entry *tt_global_entry = NULL;
	struct batadv_orig_node *orig_node = NULL;
2599
	struct batadv_tt_orig_list_entry *best_entry;
2600

2601
	if (src && batadv_vlan_ap_isola_get(bat_priv, vid)) {
2602
		tt_local_entry = batadv_tt_local_hash_find(bat_priv, src, vid);
2603 2604
		if (!tt_local_entry ||
		    (tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING))
2605 2606
			goto out;
	}
2607

2608
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
2609
	if (!tt_global_entry)
2610
		goto out;
2611

2612
	/* check whether the clients should not communicate due to AP
2613 2614
	 * isolation
	 */
2615 2616
	if (tt_local_entry &&
	    _batadv_is_ap_isolated(tt_local_entry, tt_global_entry))
2617 2618
		goto out;

2619
	rcu_read_lock();
2620
	best_entry = batadv_transtable_best_orig(bat_priv, tt_global_entry);
2621
	/* found anything? */
2622 2623
	if (best_entry)
		orig_node = best_entry->orig_node;
2624
	if (orig_node && !kref_get_unless_zero(&orig_node->refcount))
2625 2626
		orig_node = NULL;
	rcu_read_unlock();
2627

2628
out:
2629
	if (tt_global_entry)
2630
		batadv_tt_global_entry_put(tt_global_entry);
2631
	if (tt_local_entry)
2632
		batadv_tt_local_entry_put(tt_local_entry);
2633

2634
	return orig_node;
2635
}
2636

2637
/**
2638
 * batadv_tt_global_crc() - calculates the checksum of the local table belonging
2639 2640
 *  to the given orig_node
 * @bat_priv: the bat priv with all the soft interface information
2641
 * @orig_node: originator for which the CRC should be computed
2642
 * @vid: VLAN identifier for which the CRC32 has to be computed
2643 2644 2645 2646 2647 2648 2649 2650 2651 2652 2653 2654 2655 2656 2657 2658
 *
 * This function computes the checksum for the global table corresponding to a
 * specific originator. In particular, the checksum is computed as follows: For
 * each client connected to the originator the CRC32C of the MAC address and the
 * VID is computed and then all the CRC32Cs of the various clients are xor'ed
 * together.
 *
 * The idea behind is that CRC32C should be used as much as possible in order to
 * produce a unique hash of the table, but since the order which is used to feed
 * the CRC32C function affects the result and since every node in the network
 * probably sorts the clients differently, the hash function cannot be directly
 * computed over the entire table. Hence the CRC32C is used only on
 * the single client entry, while all the results are then xor'ed together
 * because the XOR operation can combine them all while trying to reduce the
 * noise as much as possible.
 *
2659
 * Return: the checksum of the global table of a given originator.
2660
 */
2661 2662 2663
static u32 batadv_tt_global_crc(struct batadv_priv *bat_priv,
				struct batadv_orig_node *orig_node,
				unsigned short vid)
2664
{
2665
	struct batadv_hashtable *hash = bat_priv->tt.global_hash;
2666
	struct batadv_tt_orig_list_entry *tt_orig;
2667 2668
	struct batadv_tt_common_entry *tt_common;
	struct batadv_tt_global_entry *tt_global;
2669
	struct hlist_head *head;
2670 2671
	u32 i, crc_tmp, crc = 0;
	u8 flags;
2672
	__be16 tmp_vid;
2673 2674 2675 2676 2677

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

		rcu_read_lock();
2678
		hlist_for_each_entry_rcu(tt_common, head, hash_entry) {
2679 2680 2681
			tt_global = container_of(tt_common,
						 struct batadv_tt_global_entry,
						 common);
2682 2683 2684 2685 2686 2687
			/* compute the CRC only for entries belonging to the
			 * VLAN identified by the vid passed as parameter
			 */
			if (tt_common->vid != vid)
				continue;

2688 2689 2690 2691 2692
			/* Roaming clients are in the global table for
			 * consistency only. They don't have to be
			 * taken into account while computing the
			 * global crc
			 */
2693
			if (tt_common->flags & BATADV_TT_CLIENT_ROAM)
2694
				continue;
2695 2696 2697 2698 2699 2700
			/* Temporary clients have not been announced yet, so
			 * they have to be skipped while computing the global
			 * crc
			 */
			if (tt_common->flags & BATADV_TT_CLIENT_TEMP)
				continue;
2701 2702 2703 2704

			/* find out if this global entry is announced by this
			 * originator
			 */
2705 2706 2707
			tt_orig = batadv_tt_global_orig_entry_find(tt_global,
								   orig_node);
			if (!tt_orig)
2708 2709
				continue;

2710 2711 2712 2713 2714
			/* use network order to read the VID: this ensures that
			 * every node reads the bytes in the same order.
			 */
			tmp_vid = htons(tt_common->vid);
			crc_tmp = crc32c(0, &tmp_vid, sizeof(tmp_vid));
2715 2716 2717 2718

			/* compute the CRC on flags that have to be kept in sync
			 * among nodes
			 */
2719
			flags = tt_orig->flags;
2720 2721
			crc_tmp = crc32c(crc_tmp, &flags, sizeof(flags));

2722
			crc ^= crc32c(crc_tmp, tt_common->addr, ETH_ALEN);
2723 2724

			batadv_tt_orig_list_entry_put(tt_orig);
2725 2726 2727 2728
		}
		rcu_read_unlock();
	}

2729
	return crc;
2730 2731
}

2732
/**
2733
 * batadv_tt_local_crc() - calculates the checksum of the local table
2734
 * @bat_priv: the bat priv with all the soft interface information
2735
 * @vid: VLAN identifier for which the CRC32 has to be computed
2736 2737 2738 2739
 *
 * For details about the computation, please refer to the documentation for
 * batadv_tt_global_crc().
 *
2740
 * Return: the checksum of the local table
2741
 */
2742 2743
static u32 batadv_tt_local_crc(struct batadv_priv *bat_priv,
			       unsigned short vid)
2744
{
2745
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
2746
	struct batadv_tt_common_entry *tt_common;
2747
	struct hlist_head *head;
2748 2749
	u32 i, crc_tmp, crc = 0;
	u8 flags;
2750
	__be16 tmp_vid;
2751 2752 2753 2754 2755

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

		rcu_read_lock();
2756
		hlist_for_each_entry_rcu(tt_common, head, hash_entry) {
2757 2758 2759 2760 2761 2762
			/* compute the CRC only for entries belonging to the
			 * VLAN identified by vid
			 */
			if (tt_common->vid != vid)
				continue;

2763
			/* not yet committed clients have not to be taken into
2764 2765
			 * account while computing the CRC
			 */
2766
			if (tt_common->flags & BATADV_TT_CLIENT_NEW)
2767
				continue;
2768

2769 2770 2771 2772 2773
			/* use network order to read the VID: this ensures that
			 * every node reads the bytes in the same order.
			 */
			tmp_vid = htons(tt_common->vid);
			crc_tmp = crc32c(0, &tmp_vid, sizeof(tmp_vid));
2774 2775 2776 2777 2778 2779 2780

			/* compute the CRC on flags that have to be kept in sync
			 * among nodes
			 */
			flags = tt_common->flags & BATADV_TT_SYNC_MASK;
			crc_tmp = crc32c(crc_tmp, &flags, sizeof(flags));

2781
			crc ^= crc32c(crc_tmp, tt_common->addr, ETH_ALEN);
2782 2783 2784 2785
		}
		rcu_read_unlock();
	}

2786
	return crc;
2787 2788
}

2789
/**
2790
 * batadv_tt_req_node_release() - free tt_req node entry
2791 2792 2793 2794 2795 2796 2797 2798
 * @ref: kref pointer of the tt req_node entry
 */
static void batadv_tt_req_node_release(struct kref *ref)
{
	struct batadv_tt_req_node *tt_req_node;

	tt_req_node = container_of(ref, struct batadv_tt_req_node, refcount);

2799
	kmem_cache_free(batadv_tt_req_cache, tt_req_node);
2800 2801 2802
}

/**
2803
 * batadv_tt_req_node_put() - decrement the tt_req_node refcounter and
2804 2805 2806 2807 2808 2809 2810 2811
 *  possibly release it
 * @tt_req_node: tt_req_node to be free'd
 */
static void batadv_tt_req_node_put(struct batadv_tt_req_node *tt_req_node)
{
	kref_put(&tt_req_node->refcount, batadv_tt_req_node_release);
}

2812
static void batadv_tt_req_list_free(struct batadv_priv *bat_priv)
2813
{
2814 2815
	struct batadv_tt_req_node *node;
	struct hlist_node *safe;
2816

2817
	spin_lock_bh(&bat_priv->tt.req_list_lock);
2818

2819 2820
	hlist_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
		hlist_del_init(&node->list);
2821
		batadv_tt_req_node_put(node);
2822 2823
	}

2824
	spin_unlock_bh(&bat_priv->tt.req_list_lock);
2825 2826
}

2827 2828
static void batadv_tt_save_orig_buffer(struct batadv_priv *bat_priv,
				       struct batadv_orig_node *orig_node,
2829
				       const void *tt_buff,
2830
				       u16 tt_buff_len)
2831 2832
{
	/* Replace the old buffer only if I received something in the
2833 2834
	 * last OGM (the OGM could carry no changes)
	 */
2835 2836 2837 2838 2839 2840 2841 2842 2843 2844 2845 2846 2847
	spin_lock_bh(&orig_node->tt_buff_lock);
	if (tt_buff_len > 0) {
		kfree(orig_node->tt_buff);
		orig_node->tt_buff_len = 0;
		orig_node->tt_buff = kmalloc(tt_buff_len, GFP_ATOMIC);
		if (orig_node->tt_buff) {
			memcpy(orig_node->tt_buff, tt_buff, tt_buff_len);
			orig_node->tt_buff_len = tt_buff_len;
		}
	}
	spin_unlock_bh(&orig_node->tt_buff_lock);
}

2848
static void batadv_tt_req_purge(struct batadv_priv *bat_priv)
2849
{
2850 2851
	struct batadv_tt_req_node *node;
	struct hlist_node *safe;
2852

2853
	spin_lock_bh(&bat_priv->tt.req_list_lock);
2854
	hlist_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
2855 2856
		if (batadv_has_timed_out(node->issued_at,
					 BATADV_TT_REQUEST_TIMEOUT)) {
2857
			hlist_del_init(&node->list);
2858
			batadv_tt_req_node_put(node);
2859 2860
		}
	}
2861
	spin_unlock_bh(&bat_priv->tt.req_list_lock);
2862 2863
}

2864
/**
2865
 * batadv_tt_req_node_new() - search and possibly create a tt_req_node object
2866 2867 2868
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: orig node this request is being issued for
 *
2869
 * Return: the pointer to the new tt_req_node struct if no request
2870
 * has already been issued for this orig_node, NULL otherwise.
2871
 */
2872
static struct batadv_tt_req_node *
2873
batadv_tt_req_node_new(struct batadv_priv *bat_priv,
2874
		       struct batadv_orig_node *orig_node)
2875
{
2876
	struct batadv_tt_req_node *tt_req_node_tmp, *tt_req_node = NULL;
2877

2878
	spin_lock_bh(&bat_priv->tt.req_list_lock);
2879
	hlist_for_each_entry(tt_req_node_tmp, &bat_priv->tt.req_list, list) {
2880 2881
		if (batadv_compare_eth(tt_req_node_tmp, orig_node) &&
		    !batadv_has_timed_out(tt_req_node_tmp->issued_at,
2882
					  BATADV_TT_REQUEST_TIMEOUT))
2883 2884 2885
			goto unlock;
	}

2886
	tt_req_node = kmem_cache_alloc(batadv_tt_req_cache, GFP_ATOMIC);
2887 2888 2889
	if (!tt_req_node)
		goto unlock;

2890
	kref_init(&tt_req_node->refcount);
2891
	ether_addr_copy(tt_req_node->addr, orig_node->orig);
2892 2893
	tt_req_node->issued_at = jiffies;

2894
	kref_get(&tt_req_node->refcount);
2895
	hlist_add_head(&tt_req_node->list, &bat_priv->tt.req_list);
2896
unlock:
2897
	spin_unlock_bh(&bat_priv->tt.req_list_lock);
2898 2899 2900
	return tt_req_node;
}

2901
/**
2902
 * batadv_tt_local_valid() - verify local tt entry and get flags
2903 2904
 * @entry_ptr: to be checked local tt entry
 * @data_ptr: not used but definition required to satisfy the callback prototype
2905 2906 2907 2908
 * @flags: a pointer to store TT flags for this client to
 *
 * Checks the validity of the given local TT entry. If it is, then the provided
 * flags pointer is updated.
2909
 *
2910
 * Return: true if the entry is a valid, false otherwise.
2911
 */
2912 2913 2914
static bool batadv_tt_local_valid(const void *entry_ptr,
				  const void *data_ptr,
				  u8 *flags)
2915
{
2916
	const struct batadv_tt_common_entry *tt_common_entry = entry_ptr;
2917

2918
	if (tt_common_entry->flags & BATADV_TT_CLIENT_NEW)
2919
		return false;
2920 2921 2922 2923

	if (flags)
		*flags = tt_common_entry->flags;

2924
	return true;
2925 2926
}

2927 2928 2929 2930 2931 2932 2933 2934 2935 2936 2937 2938
/**
 * batadv_tt_global_valid() - verify global tt entry and get flags
 * @entry_ptr: to be checked global tt entry
 * @data_ptr: an orig_node object (may be NULL)
 * @flags: a pointer to store TT flags for this client to
 *
 * Checks the validity of the given global TT entry. If it is, then the provided
 * flags pointer is updated either with the common (summed) TT flags if data_ptr
 * is NULL or the specific, per originator TT flags otherwise.
 *
 * Return: true if the entry is a valid, false otherwise.
 */
2939
static bool batadv_tt_global_valid(const void *entry_ptr,
2940 2941
				   const void *data_ptr,
				   u8 *flags)
2942
{
2943 2944 2945
	const struct batadv_tt_common_entry *tt_common_entry = entry_ptr;
	const struct batadv_tt_global_entry *tt_global_entry;
	const struct batadv_orig_node *orig_node = data_ptr;
2946

2947 2948
	if (tt_common_entry->flags & BATADV_TT_CLIENT_ROAM ||
	    tt_common_entry->flags & BATADV_TT_CLIENT_TEMP)
2949
		return false;
2950

2951 2952
	tt_global_entry = container_of(tt_common_entry,
				       struct batadv_tt_global_entry,
2953 2954
				       common);

2955 2956
	return batadv_tt_global_entry_has_orig(tt_global_entry, orig_node,
					       flags);
2957 2958
}

2959
/**
2960
 * batadv_tt_tvlv_generate() - fill the tvlv buff with the tt entries from the
2961
 *  specified tt hash
2962 2963 2964
 * @bat_priv: the bat priv with all the soft interface information
 * @hash: hash table containing the tt entries
 * @tt_len: expected tvlv tt data buffer length in number of bytes
2965
 * @tvlv_buff: pointer to the buffer to fill with the TT data
2966
 * @valid_cb: function to filter tt change entries and to return TT flags
2967
 * @cb_data: data passed to the filter function as argument
2968 2969 2970
 *
 * Fills the tvlv buff with the tt entries from the specified hash. If valid_cb
 * is not provided then this becomes a no-op.
2971
 */
2972 2973
static void batadv_tt_tvlv_generate(struct batadv_priv *bat_priv,
				    struct batadv_hashtable *hash,
2974
				    void *tvlv_buff, u16 tt_len,
2975
				    bool (*valid_cb)(const void *,
2976 2977
						     const void *,
						     u8 *flags),
2978
				    void *cb_data)
2979
{
2980
	struct batadv_tt_common_entry *tt_common_entry;
2981
	struct batadv_tvlv_tt_change *tt_change;
2982
	struct hlist_head *head;
2983
	u16 tt_tot, tt_num_entries = 0;
2984 2985
	u8 flags;
	bool ret;
2986
	u32 i;
2987

2988
	tt_tot = batadv_tt_entries(tt_len);
2989
	tt_change = (struct batadv_tvlv_tt_change *)tvlv_buff;
2990

2991 2992 2993
	if (!valid_cb)
		return;

2994 2995 2996 2997
	rcu_read_lock();
	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

2998
		hlist_for_each_entry_rcu(tt_common_entry,
2999
					 head, hash_entry) {
3000
			if (tt_tot == tt_num_entries)
3001 3002
				break;

3003 3004
			ret = valid_cb(tt_common_entry, cb_data, &flags);
			if (!ret)
3005 3006
				continue;

3007
			ether_addr_copy(tt_change->addr, tt_common_entry->addr);
3008
			tt_change->flags = flags;
3009
			tt_change->vid = htons(tt_common_entry->vid);
3010 3011
			memset(tt_change->reserved, 0,
			       sizeof(tt_change->reserved));
3012

3013
			tt_num_entries++;
3014 3015 3016 3017
			tt_change++;
		}
	}
	rcu_read_unlock();
3018
}
3019

3020
/**
3021
 * batadv_tt_global_check_crc() - check if all the CRCs are correct
3022 3023 3024 3025
 * @orig_node: originator for which the CRCs have to be checked
 * @tt_vlan: pointer to the first tvlv VLAN entry
 * @num_vlan: number of tvlv VLAN entries
 *
3026
 * Return: true if all the received CRCs match the locally stored ones, false
3027 3028 3029 3030
 * otherwise
 */
static bool batadv_tt_global_check_crc(struct batadv_orig_node *orig_node,
				       struct batadv_tvlv_tt_vlan_data *tt_vlan,
3031
				       u16 num_vlan)
3032 3033 3034
{
	struct batadv_tvlv_tt_vlan_data *tt_vlan_tmp;
	struct batadv_orig_node_vlan *vlan;
3035
	int i, orig_num_vlan;
3036
	u32 crc;
3037 3038 3039 3040 3041 3042 3043 3044 3045

	/* check if each received CRC matches the locally stored one */
	for (i = 0; i < num_vlan; i++) {
		tt_vlan_tmp = tt_vlan + i;

		/* if orig_node is a backbone node for this VLAN, don't check
		 * the CRC as we ignore all the global entries over it
		 */
		if (batadv_bla_is_backbone_gw_orig(orig_node->bat_priv,
3046 3047
						   orig_node->orig,
						   ntohs(tt_vlan_tmp->vid)))
3048 3049 3050 3051 3052 3053 3054
			continue;

		vlan = batadv_orig_node_vlan_get(orig_node,
						 ntohs(tt_vlan_tmp->vid));
		if (!vlan)
			return false;

3055
		crc = vlan->tt.crc;
3056
		batadv_orig_node_vlan_put(vlan);
3057 3058

		if (crc != ntohl(tt_vlan_tmp->crc))
3059 3060 3061
			return false;
	}

3062 3063 3064 3065 3066 3067 3068 3069 3070 3071 3072 3073
	/* check if any excess VLANs exist locally for the originator
	 * which are not mentioned in the TVLV from the originator.
	 */
	rcu_read_lock();
	orig_num_vlan = 0;
	hlist_for_each_entry_rcu(vlan, &orig_node->vlan_list, list)
		orig_num_vlan++;
	rcu_read_unlock();

	if (orig_num_vlan > num_vlan)
		return false;

3074 3075 3076 3077
	return true;
}

/**
3078
 * batadv_tt_local_update_crc() - update all the local CRCs
3079 3080 3081 3082 3083 3084 3085 3086 3087 3088 3089 3090 3091 3092 3093
 * @bat_priv: the bat priv with all the soft interface information
 */
static void batadv_tt_local_update_crc(struct batadv_priv *bat_priv)
{
	struct batadv_softif_vlan *vlan;

	/* recompute the global CRC for each VLAN */
	rcu_read_lock();
	hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
		vlan->tt.crc = batadv_tt_local_crc(bat_priv, vlan->vid);
	}
	rcu_read_unlock();
}

/**
3094
 * batadv_tt_global_update_crc() - update all the global CRCs for this orig_node
3095 3096 3097 3098 3099 3100 3101
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: the orig_node for which the CRCs have to be updated
 */
static void batadv_tt_global_update_crc(struct batadv_priv *bat_priv,
					struct batadv_orig_node *orig_node)
{
	struct batadv_orig_node_vlan *vlan;
3102
	u32 crc;
3103 3104 3105

	/* recompute the global CRC for each VLAN */
	rcu_read_lock();
3106
	hlist_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) {
3107 3108 3109
		/* if orig_node is a backbone node for this VLAN, don't compute
		 * the CRC as we ignore all the global entries over it
		 */
3110 3111
		if (batadv_bla_is_backbone_gw_orig(bat_priv, orig_node->orig,
						   vlan->vid))
3112 3113 3114 3115 3116 3117
			continue;

		crc = batadv_tt_global_crc(bat_priv, orig_node, vlan->vid);
		vlan->tt.crc = crc;
	}
	rcu_read_unlock();
3118 3119
}

3120
/**
3121
 * batadv_send_tt_request() - send a TT Request message to a given node
3122 3123 3124
 * @bat_priv: the bat priv with all the soft interface information
 * @dst_orig_node: the destination of the message
 * @ttvn: the version number that the source of the message is looking for
3125 3126
 * @tt_vlan: pointer to the first tvlv VLAN object to request
 * @num_vlan: number of tvlv VLAN entries
3127 3128
 * @full_table: ask for the entire translation table if true, while only for the
 *  last TT diff otherwise
3129 3130
 *
 * Return: true if the TT Request was sent, false otherwise
3131
 */
3132 3133 3134 3135 3136
static bool batadv_send_tt_request(struct batadv_priv *bat_priv,
				   struct batadv_orig_node *dst_orig_node,
				   u8 ttvn,
				   struct batadv_tvlv_tt_vlan_data *tt_vlan,
				   u16 num_vlan, bool full_table)
3137
{
3138
	struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
3139
	struct batadv_tt_req_node *tt_req_node = NULL;
3140 3141
	struct batadv_tvlv_tt_vlan_data *tt_vlan_req;
	struct batadv_hard_iface *primary_if;
3142
	bool ret = false;
3143
	int i, size;
3144

3145
	primary_if = batadv_primary_if_get_selected(bat_priv);
3146 3147 3148 3149
	if (!primary_if)
		goto out;

	/* The new tt_req will be issued only if I'm not waiting for a
3150 3151
	 * reply from the same orig_node yet
	 */
3152
	tt_req_node = batadv_tt_req_node_new(bat_priv, dst_orig_node);
3153 3154 3155
	if (!tt_req_node)
		goto out;

3156 3157
	size = sizeof(*tvlv_tt_data) + sizeof(*tt_vlan_req) * num_vlan;
	tvlv_tt_data = kzalloc(size, GFP_ATOMIC);
3158
	if (!tvlv_tt_data)
3159 3160
		goto out;

3161 3162
	tvlv_tt_data->flags = BATADV_TT_REQUEST;
	tvlv_tt_data->ttvn = ttvn;
3163 3164 3165 3166 3167 3168 3169 3170 3171 3172 3173 3174 3175
	tvlv_tt_data->num_vlan = htons(num_vlan);

	/* send all the CRCs within the request. This is needed by intermediate
	 * nodes to ensure they have the correct table before replying
	 */
	tt_vlan_req = (struct batadv_tvlv_tt_vlan_data *)(tvlv_tt_data + 1);
	for (i = 0; i < num_vlan; i++) {
		tt_vlan_req->vid = tt_vlan->vid;
		tt_vlan_req->crc = tt_vlan->crc;

		tt_vlan_req++;
		tt_vlan++;
	}
3176 3177

	if (full_table)
3178
		tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
3179

3180
	batadv_dbg(BATADV_DBG_TT, bat_priv, "Sending TT_REQUEST to %pM [%c]\n",
3181
		   dst_orig_node->orig, full_table ? 'F' : '.');
3182

3183
	batadv_inc_counter(bat_priv, BATADV_CNT_TT_REQUEST_TX);
3184 3185
	batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
				 dst_orig_node->orig, BATADV_TVLV_TT, 1,
3186
				 tvlv_tt_data, size);
3187
	ret = true;
3188 3189 3190

out:
	if (primary_if)
3191
		batadv_hardif_put(primary_if);
3192

3193
	if (ret && tt_req_node) {
3194
		spin_lock_bh(&bat_priv->tt.req_list_lock);
3195 3196 3197 3198
		if (!hlist_unhashed(&tt_req_node->list)) {
			hlist_del_init(&tt_req_node->list);
			batadv_tt_req_node_put(tt_req_node);
		}
3199
		spin_unlock_bh(&bat_priv->tt.req_list_lock);
3200
	}
3201 3202 3203 3204

	if (tt_req_node)
		batadv_tt_req_node_put(tt_req_node);

3205
	kfree(tvlv_tt_data);
3206 3207 3208
	return ret;
}

3209
/**
3210
 * batadv_send_other_tt_response() - send reply to tt request concerning another
3211 3212 3213 3214 3215 3216
 *  node's translation table
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: tt data containing the tt request information
 * @req_src: mac address of tt request sender
 * @req_dst: mac address of tt request recipient
 *
3217
 * Return: true if tt request reply was sent, false otherwise.
3218 3219 3220
 */
static bool batadv_send_other_tt_response(struct batadv_priv *bat_priv,
					  struct batadv_tvlv_tt_data *tt_data,
3221
					  u8 *req_src, u8 *req_dst)
3222
{
3223
	struct batadv_orig_node *req_dst_orig_node;
3224
	struct batadv_orig_node *res_dst_orig_node = NULL;
3225
	struct batadv_tvlv_tt_change *tt_change;
3226
	struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
3227
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
3228
	bool ret = false, full_table;
3229 3230 3231
	u8 orig_ttvn, req_ttvn;
	u16 tvlv_len;
	s32 tt_len;
3232

3233
	batadv_dbg(BATADV_DBG_TT, bat_priv,
3234
		   "Received TT_REQUEST from %pM for ttvn: %u (%pM) [%c]\n",
3235
		   req_src, tt_data->ttvn, req_dst,
3236
		   ((tt_data->flags & BATADV_TT_FULL_TABLE) ? 'F' : '.'));
3237 3238

	/* Let's get the orig node of the REAL destination */
3239
	req_dst_orig_node = batadv_orig_hash_find(bat_priv, req_dst);
3240 3241 3242
	if (!req_dst_orig_node)
		goto out;

3243
	res_dst_orig_node = batadv_orig_hash_find(bat_priv, req_src);
3244 3245 3246
	if (!res_dst_orig_node)
		goto out;

3247
	orig_ttvn = (u8)atomic_read(&req_dst_orig_node->last_ttvn);
3248
	req_ttvn = tt_data->ttvn;
3249

3250
	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(tt_data + 1);
3251
	/* this node doesn't have the requested data */
3252
	if (orig_ttvn != req_ttvn ||
3253 3254
	    !batadv_tt_global_check_crc(req_dst_orig_node, tt_vlan,
					ntohs(tt_data->num_vlan)))
3255 3256
		goto out;

3257
	/* If the full table has been explicitly requested */
3258
	if (tt_data->flags & BATADV_TT_FULL_TABLE ||
3259 3260 3261 3262 3263
	    !req_dst_orig_node->tt_buff)
		full_table = true;
	else
		full_table = false;

3264 3265
	/* TT fragmentation hasn't been implemented yet, so send as many
	 * TT entries fit a single packet as possible only
3266
	 */
3267 3268 3269 3270
	if (!full_table) {
		spin_lock_bh(&req_dst_orig_node->tt_buff_lock);
		tt_len = req_dst_orig_node->tt_buff_len;

3271 3272 3273 3274 3275
		tvlv_len = batadv_tt_prepare_tvlv_global_data(req_dst_orig_node,
							      &tvlv_tt_data,
							      &tt_change,
							      &tt_len);
		if (!tt_len)
3276 3277 3278
			goto unlock;

		/* Copy the last orig_node's OGM buffer */
3279
		memcpy(tt_change, req_dst_orig_node->tt_buff,
3280 3281 3282
		       req_dst_orig_node->tt_buff_len);
		spin_unlock_bh(&req_dst_orig_node->tt_buff_lock);
	} else {
3283 3284 3285 3286 3287 3288 3289 3290 3291
		/* allocate the tvlv, put the tt_data and all the tt_vlan_data
		 * in the initial part
		 */
		tt_len = -1;
		tvlv_len = batadv_tt_prepare_tvlv_global_data(req_dst_orig_node,
							      &tvlv_tt_data,
							      &tt_change,
							      &tt_len);
		if (!tt_len)
3292
			goto out;
3293 3294 3295 3296 3297 3298

		/* fill the rest of the tvlv with the real TT entries */
		batadv_tt_tvlv_generate(bat_priv, bat_priv->tt.global_hash,
					tt_change, tt_len,
					batadv_tt_global_valid,
					req_dst_orig_node);
3299 3300
	}

3301 3302 3303 3304 3305 3306 3307 3308 3309
	/* Don't send the response, if larger than fragmented packet. */
	tt_len = sizeof(struct batadv_unicast_tvlv_packet) + tvlv_len;
	if (tt_len > atomic_read(&bat_priv->packet_size_max)) {
		net_ratelimited_function(batadv_info, bat_priv->soft_iface,
					 "Ignoring TT_REQUEST from %pM; Response size exceeds max packet size.\n",
					 res_dst_orig_node->orig);
		goto out;
	}

3310 3311
	tvlv_tt_data->flags = BATADV_TT_RESPONSE;
	tvlv_tt_data->ttvn = req_ttvn;
3312 3313

	if (full_table)
3314
		tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
3315

3316
	batadv_dbg(BATADV_DBG_TT, bat_priv,
3317 3318 3319
		   "Sending TT_RESPONSE %pM for %pM [%c] (ttvn: %u)\n",
		   res_dst_orig_node->orig, req_dst_orig_node->orig,
		   full_table ? 'F' : '.', req_ttvn);
3320

3321
	batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_TX);
3322

3323
	batadv_tvlv_unicast_send(bat_priv, req_dst_orig_node->orig,
3324 3325
				 req_src, BATADV_TVLV_TT, 1, tvlv_tt_data,
				 tvlv_len);
3326

3327
	ret = true;
3328 3329 3330 3331 3332 3333 3334
	goto out;

unlock:
	spin_unlock_bh(&req_dst_orig_node->tt_buff_lock);

out:
	if (res_dst_orig_node)
3335
		batadv_orig_node_put(res_dst_orig_node);
3336
	if (req_dst_orig_node)
3337
		batadv_orig_node_put(req_dst_orig_node);
3338
	kfree(tvlv_tt_data);
3339 3340
	return ret;
}
3341

3342
/**
3343 3344
 * batadv_send_my_tt_response() - send reply to tt request concerning this
 *  node's translation table
3345 3346 3347 3348
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: tt data containing the tt request information
 * @req_src: mac address of tt request sender
 *
3349
 * Return: true if tt request reply was sent, false otherwise.
3350 3351 3352
 */
static bool batadv_send_my_tt_response(struct batadv_priv *bat_priv,
				       struct batadv_tvlv_tt_data *tt_data,
3353
				       u8 *req_src)
3354
{
3355
	struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
3356
	struct batadv_hard_iface *primary_if = NULL;
3357 3358
	struct batadv_tvlv_tt_change *tt_change;
	struct batadv_orig_node *orig_node;
3359 3360
	u8 my_ttvn, req_ttvn;
	u16 tvlv_len;
3361
	bool full_table;
3362
	s32 tt_len;
3363

3364
	batadv_dbg(BATADV_DBG_TT, bat_priv,
3365
		   "Received TT_REQUEST from %pM for ttvn: %u (me) [%c]\n",
3366
		   req_src, tt_data->ttvn,
3367
		   ((tt_data->flags & BATADV_TT_FULL_TABLE) ? 'F' : '.'));
3368

3369
	spin_lock_bh(&bat_priv->tt.commit_lock);
3370

3371
	my_ttvn = (u8)atomic_read(&bat_priv->tt.vn);
3372
	req_ttvn = tt_data->ttvn;
3373

3374
	orig_node = batadv_orig_hash_find(bat_priv, req_src);
3375 3376 3377
	if (!orig_node)
		goto out;

3378
	primary_if = batadv_primary_if_get_selected(bat_priv);
3379 3380 3381 3382
	if (!primary_if)
		goto out;

	/* If the full table has been explicitly requested or the gap
3383 3384
	 * is too big send the whole local translation table
	 */
3385
	if (tt_data->flags & BATADV_TT_FULL_TABLE || my_ttvn != req_ttvn ||
3386
	    !bat_priv->tt.last_changeset)
3387 3388 3389 3390
		full_table = true;
	else
		full_table = false;

3391 3392
	/* TT fragmentation hasn't been implemented yet, so send as many
	 * TT entries fit a single packet as possible only
3393
	 */
3394
	if (!full_table) {
3395
		spin_lock_bh(&bat_priv->tt.last_changeset_lock);
3396

3397 3398 3399 3400 3401
		tt_len = bat_priv->tt.last_changeset_len;
		tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv,
							     &tvlv_tt_data,
							     &tt_change,
							     &tt_len);
3402
		if (!tt_len || !tvlv_len)
3403 3404
			goto unlock;

3405
		/* Copy the last orig_node's OGM buffer */
3406
		memcpy(tt_change, bat_priv->tt.last_changeset,
3407 3408
		       bat_priv->tt.last_changeset_len);
		spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
3409
	} else {
3410
		req_ttvn = (u8)atomic_read(&bat_priv->tt.vn);
3411

3412 3413 3414 3415 3416 3417 3418 3419
		/* allocate the tvlv, put the tt_data and all the tt_vlan_data
		 * in the initial part
		 */
		tt_len = -1;
		tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv,
							     &tvlv_tt_data,
							     &tt_change,
							     &tt_len);
3420
		if (!tt_len || !tvlv_len)
3421
			goto out;
3422 3423 3424 3425 3426

		/* fill the rest of the tvlv with the real TT entries */
		batadv_tt_tvlv_generate(bat_priv, bat_priv->tt.local_hash,
					tt_change, tt_len,
					batadv_tt_local_valid, NULL);
3427 3428
	}

3429 3430
	tvlv_tt_data->flags = BATADV_TT_RESPONSE;
	tvlv_tt_data->ttvn = req_ttvn;
3431 3432

	if (full_table)
3433
		tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
3434

3435
	batadv_dbg(BATADV_DBG_TT, bat_priv,
3436 3437
		   "Sending TT_RESPONSE to %pM [%c] (ttvn: %u)\n",
		   orig_node->orig, full_table ? 'F' : '.', req_ttvn);
3438

3439
	batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_TX);
3440

3441
	batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
3442 3443
				 req_src, BATADV_TVLV_TT, 1, tvlv_tt_data,
				 tvlv_len);
3444

3445 3446 3447
	goto out;

unlock:
3448
	spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
3449
out:
3450
	spin_unlock_bh(&bat_priv->tt.commit_lock);
3451
	if (orig_node)
3452
		batadv_orig_node_put(orig_node);
3453
	if (primary_if)
3454
		batadv_hardif_put(primary_if);
3455 3456
	kfree(tvlv_tt_data);
	/* The packet was for this host, so it doesn't need to be re-routed */
3457 3458 3459
	return true;
}

3460
/**
3461
 * batadv_send_tt_response() - send reply to tt request
3462 3463 3464 3465 3466
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: tt data containing the tt request information
 * @req_src: mac address of tt request sender
 * @req_dst: mac address of tt request recipient
 *
3467
 * Return: true if tt request reply was sent, false otherwise.
3468 3469 3470
 */
static bool batadv_send_tt_response(struct batadv_priv *bat_priv,
				    struct batadv_tvlv_tt_data *tt_data,
3471
				    u8 *req_src, u8 *req_dst)
3472
{
3473
	if (batadv_is_my_mac(bat_priv, req_dst))
3474
		return batadv_send_my_tt_response(bat_priv, tt_data, req_src);
3475 3476
	return batadv_send_other_tt_response(bat_priv, tt_data, req_src,
					     req_dst);
3477 3478
}

3479 3480
static void _batadv_tt_update_changes(struct batadv_priv *bat_priv,
				      struct batadv_orig_node *orig_node,
3481
				      struct batadv_tvlv_tt_change *tt_change,
3482
				      u16 tt_num_changes, u8 ttvn)
3483 3484
{
	int i;
3485
	int roams;
3486 3487

	for (i = 0; i < tt_num_changes; i++) {
3488 3489
		if ((tt_change + i)->flags & BATADV_TT_CLIENT_DEL) {
			roams = (tt_change + i)->flags & BATADV_TT_CLIENT_ROAM;
3490 3491
			batadv_tt_global_del(bat_priv, orig_node,
					     (tt_change + i)->addr,
3492
					     ntohs((tt_change + i)->vid),
3493 3494
					     "tt removed by changes",
					     roams);
3495 3496
		} else {
			if (!batadv_tt_global_add(bat_priv, orig_node,
3497
						  (tt_change + i)->addr,
3498
						  ntohs((tt_change + i)->vid),
3499
						  (tt_change + i)->flags, ttvn))
3500 3501 3502 3503 3504 3505 3506
				/* In case of problem while storing a
				 * global_entry, we stop the updating
				 * procedure without committing the
				 * ttvn change. This will avoid to send
				 * corrupted data on tt_request
				 */
				return;
3507
		}
3508
	}
3509
	set_bit(BATADV_ORIG_CAPA_HAS_TT, &orig_node->capa_initialized);
3510 3511
}

3512
static void batadv_tt_fill_gtable(struct batadv_priv *bat_priv,
3513
				  struct batadv_tvlv_tt_change *tt_change,
3514 3515
				  u8 ttvn, u8 *resp_src,
				  u16 num_entries)
3516
{
3517
	struct batadv_orig_node *orig_node;
3518

3519
	orig_node = batadv_orig_hash_find(bat_priv, resp_src);
3520 3521 3522 3523
	if (!orig_node)
		goto out;

	/* Purge the old table first.. */
3524 3525
	batadv_tt_global_del_orig(bat_priv, orig_node, -1,
				  "Received full table");
3526

3527 3528
	_batadv_tt_update_changes(bat_priv, orig_node, tt_change, num_entries,
				  ttvn);
3529 3530 3531 3532 3533 3534 3535

	spin_lock_bh(&orig_node->tt_buff_lock);
	kfree(orig_node->tt_buff);
	orig_node->tt_buff_len = 0;
	orig_node->tt_buff = NULL;
	spin_unlock_bh(&orig_node->tt_buff_lock);

3536
	atomic_set(&orig_node->last_ttvn, ttvn);
3537 3538 3539

out:
	if (orig_node)
3540
		batadv_orig_node_put(orig_node);
3541 3542
}

3543 3544
static void batadv_tt_update_changes(struct batadv_priv *bat_priv,
				     struct batadv_orig_node *orig_node,
3545
				     u16 tt_num_changes, u8 ttvn,
3546
				     struct batadv_tvlv_tt_change *tt_change)
3547
{
3548 3549
	_batadv_tt_update_changes(bat_priv, orig_node, tt_change,
				  tt_num_changes, ttvn);
3550

3551 3552
	batadv_tt_save_orig_buffer(bat_priv, orig_node, tt_change,
				   batadv_tt_len(tt_num_changes));
3553 3554 3555
	atomic_set(&orig_node->last_ttvn, ttvn);
}

3556
/**
3557
 * batadv_is_my_client() - check if a client is served by the local node
3558
 * @bat_priv: the bat priv with all the soft interface information
3559
 * @addr: the mac address of the client to check
3560 3561
 * @vid: VLAN identifier
 *
3562
 * Return: true if the client is served by this node, false otherwise.
3563
 */
3564
bool batadv_is_my_client(struct batadv_priv *bat_priv, const u8 *addr,
3565
			 unsigned short vid)
3566
{
3567
	struct batadv_tt_local_entry *tt_local_entry;
3568
	bool ret = false;
3569

3570
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
3571 3572
	if (!tt_local_entry)
		goto out;
3573
	/* Check if the client has been logically deleted (but is kept for
3574 3575
	 * consistency purpose)
	 */
3576 3577
	if ((tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING) ||
	    (tt_local_entry->common.flags & BATADV_TT_CLIENT_ROAM))
3578
		goto out;
3579 3580
	ret = true;
out:
3581
	if (tt_local_entry)
3582
		batadv_tt_local_entry_put(tt_local_entry);
3583
	return ret;
3584 3585
}

3586
/**
3587
 * batadv_handle_tt_response() - process incoming tt reply
3588 3589 3590 3591 3592 3593 3594
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: tt data containing the tt request information
 * @resp_src: mac address of tt reply sender
 * @num_entries: number of tt change entries appended to the tt data
 */
static void batadv_handle_tt_response(struct batadv_priv *bat_priv,
				      struct batadv_tvlv_tt_data *tt_data,
3595
				      u8 *resp_src, u16 num_entries)
3596
{
3597 3598
	struct batadv_tt_req_node *node;
	struct hlist_node *safe;
3599
	struct batadv_orig_node *orig_node = NULL;
3600
	struct batadv_tvlv_tt_change *tt_change;
3601 3602
	u8 *tvlv_ptr = (u8 *)tt_data;
	u16 change_offset;
3603

3604
	batadv_dbg(BATADV_DBG_TT, bat_priv,
3605
		   "Received TT_RESPONSE from %pM for ttvn %d t_size: %d [%c]\n",
3606
		   resp_src, tt_data->ttvn, num_entries,
3607
		   ((tt_data->flags & BATADV_TT_FULL_TABLE) ? 'F' : '.'));
3608

3609
	orig_node = batadv_orig_hash_find(bat_priv, resp_src);
3610 3611 3612
	if (!orig_node)
		goto out;

3613 3614
	spin_lock_bh(&orig_node->tt_lock);

3615 3616 3617 3618 3619 3620
	change_offset = sizeof(struct batadv_tvlv_tt_vlan_data);
	change_offset *= ntohs(tt_data->num_vlan);
	change_offset += sizeof(*tt_data);
	tvlv_ptr += change_offset;

	tt_change = (struct batadv_tvlv_tt_change *)tvlv_ptr;
3621
	if (tt_data->flags & BATADV_TT_FULL_TABLE) {
3622 3623
		batadv_tt_fill_gtable(bat_priv, tt_change, tt_data->ttvn,
				      resp_src, num_entries);
3624
	} else {
3625 3626
		batadv_tt_update_changes(bat_priv, orig_node, num_entries,
					 tt_data->ttvn, tt_change);
3627
	}
3628

3629
	/* Recalculate the CRC for this orig_node and store it */
3630
	batadv_tt_global_update_crc(bat_priv, orig_node);
3631 3632 3633

	spin_unlock_bh(&orig_node->tt_lock);

3634
	/* Delete the tt_req_node from pending tt_requests list */
3635
	spin_lock_bh(&bat_priv->tt.req_list_lock);
3636
	hlist_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
3637
		if (!batadv_compare_eth(node->addr, resp_src))
3638
			continue;
3639
		hlist_del_init(&node->list);
3640
		batadv_tt_req_node_put(node);
3641
	}
3642

3643
	spin_unlock_bh(&bat_priv->tt.req_list_lock);
3644 3645
out:
	if (orig_node)
3646
		batadv_orig_node_put(orig_node);
3647 3648
}

3649
static void batadv_tt_roam_list_free(struct batadv_priv *bat_priv)
3650
{
3651
	struct batadv_tt_roam_node *node, *safe;
3652

3653
	spin_lock_bh(&bat_priv->tt.roam_list_lock);
3654

3655
	list_for_each_entry_safe(node, safe, &bat_priv->tt.roam_list, list) {
3656
		list_del(&node->list);
3657
		kmem_cache_free(batadv_tt_roam_cache, node);
3658 3659
	}

3660
	spin_unlock_bh(&bat_priv->tt.roam_list_lock);
3661 3662
}

3663
static void batadv_tt_roam_purge(struct batadv_priv *bat_priv)
3664
{
3665
	struct batadv_tt_roam_node *node, *safe;
3666

3667 3668
	spin_lock_bh(&bat_priv->tt.roam_list_lock);
	list_for_each_entry_safe(node, safe, &bat_priv->tt.roam_list, list) {
3669 3670
		if (!batadv_has_timed_out(node->first_time,
					  BATADV_ROAMING_MAX_TIME))
3671 3672 3673
			continue;

		list_del(&node->list);
3674
		kmem_cache_free(batadv_tt_roam_cache, node);
3675
	}
3676
	spin_unlock_bh(&bat_priv->tt.roam_list_lock);
3677 3678
}

3679
/**
3680
 * batadv_tt_check_roam_count() - check if a client has roamed too frequently
3681 3682
 * @bat_priv: the bat priv with all the soft interface information
 * @client: mac address of the roaming client
3683 3684
 *
 * This function checks whether the client already reached the
3685 3686 3687
 * maximum number of possible roaming phases. In this case the ROAMING_ADV
 * will not be sent.
 *
3688
 * Return: true if the ROAMING_ADV can be sent, false otherwise
3689
 */
3690
static bool batadv_tt_check_roam_count(struct batadv_priv *bat_priv, u8 *client)
3691
{
3692
	struct batadv_tt_roam_node *tt_roam_node;
3693 3694
	bool ret = false;

3695
	spin_lock_bh(&bat_priv->tt.roam_list_lock);
3696
	/* The new tt_req will be issued only if I'm not waiting for a
3697 3698
	 * reply from the same orig_node yet
	 */
3699
	list_for_each_entry(tt_roam_node, &bat_priv->tt.roam_list, list) {
3700
		if (!batadv_compare_eth(tt_roam_node->addr, client))
3701 3702
			continue;

3703
		if (batadv_has_timed_out(tt_roam_node->first_time,
3704
					 BATADV_ROAMING_MAX_TIME))
3705 3706
			continue;

3707
		if (!batadv_atomic_dec_not_zero(&tt_roam_node->counter))
3708 3709 3710 3711 3712 3713 3714
			/* Sorry, you roamed too many times! */
			goto unlock;
		ret = true;
		break;
	}

	if (!ret) {
3715 3716
		tt_roam_node = kmem_cache_alloc(batadv_tt_roam_cache,
						GFP_ATOMIC);
3717 3718 3719 3720
		if (!tt_roam_node)
			goto unlock;

		tt_roam_node->first_time = jiffies;
3721 3722
		atomic_set(&tt_roam_node->counter,
			   BATADV_ROAMING_MAX_COUNT - 1);
3723
		ether_addr_copy(tt_roam_node->addr, client);
3724

3725
		list_add(&tt_roam_node->list, &bat_priv->tt.roam_list);
3726 3727 3728 3729
		ret = true;
	}

unlock:
3730
	spin_unlock_bh(&bat_priv->tt.roam_list_lock);
3731 3732 3733
	return ret;
}

3734
/**
3735
 * batadv_send_roam_adv() - send a roaming advertisement message
3736 3737 3738 3739 3740 3741 3742 3743 3744 3745
 * @bat_priv: the bat priv with all the soft interface information
 * @client: mac address of the roaming client
 * @vid: VLAN identifier
 * @orig_node: message destination
 *
 * Send a ROAMING_ADV message to the node which was previously serving this
 * client. This is done to inform the node that from now on all traffic destined
 * for this particular roamed client has to be forwarded to the sender of the
 * roaming message.
 */
3746
static void batadv_send_roam_adv(struct batadv_priv *bat_priv, u8 *client,
3747
				 unsigned short vid,
3748
				 struct batadv_orig_node *orig_node)
3749
{
3750
	struct batadv_hard_iface *primary_if;
3751 3752 3753 3754 3755
	struct batadv_tvlv_roam_adv tvlv_roam;

	primary_if = batadv_primary_if_get_selected(bat_priv);
	if (!primary_if)
		goto out;
3756 3757

	/* before going on we have to check whether the client has
3758 3759
	 * already roamed to us too many times
	 */
3760
	if (!batadv_tt_check_roam_count(bat_priv, client))
3761 3762
		goto out;

3763
	batadv_dbg(BATADV_DBG_TT, bat_priv,
3764
		   "Sending ROAMING_ADV to %pM (client %pM, vid: %d)\n",
3765
		   orig_node->orig, client, batadv_print_vid(vid));
3766

3767
	batadv_inc_counter(bat_priv, BATADV_CNT_TT_ROAM_ADV_TX);
3768

3769
	memcpy(tvlv_roam.client, client, sizeof(tvlv_roam.client));
3770
	tvlv_roam.vid = htons(vid);
3771 3772 3773 3774

	batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
				 orig_node->orig, BATADV_TVLV_ROAM, 1,
				 &tvlv_roam, sizeof(tvlv_roam));
3775 3776

out:
3777
	if (primary_if)
3778
		batadv_hardif_put(primary_if);
3779 3780
}

3781
static void batadv_tt_purge(struct work_struct *work)
3782
{
3783
	struct delayed_work *delayed_work;
3784
	struct batadv_priv_tt *priv_tt;
3785 3786
	struct batadv_priv *bat_priv;

G
Geliang Tang 已提交
3787
	delayed_work = to_delayed_work(work);
3788 3789
	priv_tt = container_of(delayed_work, struct batadv_priv_tt, work);
	bat_priv = container_of(priv_tt, struct batadv_priv, tt);
3790

3791
	batadv_tt_local_purge(bat_priv, BATADV_TT_LOCAL_TIMEOUT);
3792
	batadv_tt_global_purge(bat_priv);
3793 3794
	batadv_tt_req_purge(bat_priv);
	batadv_tt_roam_purge(bat_priv);
3795

3796 3797
	queue_delayed_work(batadv_event_workqueue, &bat_priv->tt.work,
			   msecs_to_jiffies(BATADV_TT_WORK_PERIOD));
3798
}
3799

3800 3801 3802 3803
/**
 * batadv_tt_free() - Free translation table of soft interface
 * @bat_priv: the bat priv with all the soft interface information
 */
3804
void batadv_tt_free(struct batadv_priv *bat_priv)
3805
{
3806 3807 3808
	batadv_tvlv_container_unregister(bat_priv, BATADV_TVLV_TT, 1);
	batadv_tvlv_handler_unregister(bat_priv, BATADV_TVLV_TT, 1);

3809
	cancel_delayed_work_sync(&bat_priv->tt.work);
3810

3811 3812 3813 3814 3815
	batadv_tt_local_table_free(bat_priv);
	batadv_tt_global_table_free(bat_priv);
	batadv_tt_req_list_free(bat_priv);
	batadv_tt_changes_list_free(bat_priv);
	batadv_tt_roam_list_free(bat_priv);
3816

3817
	kfree(bat_priv->tt.last_changeset);
3818
}
3819

3820
/**
3821
 * batadv_tt_local_set_flags() - set or unset the specified flags on the local
3822 3823 3824 3825 3826
 *  table and possibly count them in the TT size
 * @bat_priv: the bat priv with all the soft interface information
 * @flags: the flag to switch
 * @enable: whether to set or unset the flag
 * @count: whether to increase the TT size by the number of changed entries
3827
 */
3828 3829
static void batadv_tt_local_set_flags(struct batadv_priv *bat_priv, u16 flags,
				      bool enable, bool count)
3830
{
3831 3832
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
	struct batadv_tt_common_entry *tt_common_entry;
3833
	struct hlist_head *head;
3834
	u32 i;
3835 3836

	if (!hash)
3837
		return;
3838 3839 3840 3841 3842

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

		rcu_read_lock();
3843
		hlist_for_each_entry_rcu(tt_common_entry,
3844
					 head, hash_entry) {
3845 3846 3847 3848 3849 3850 3851 3852 3853
			if (enable) {
				if ((tt_common_entry->flags & flags) == flags)
					continue;
				tt_common_entry->flags |= flags;
			} else {
				if (!(tt_common_entry->flags & flags))
					continue;
				tt_common_entry->flags &= ~flags;
			}
3854 3855 3856 3857 3858 3859

			if (!count)
				continue;

			batadv_tt_local_size_inc(bat_priv,
						 tt_common_entry->vid);
3860 3861 3862 3863 3864
		}
		rcu_read_unlock();
	}
}

3865
/* Purge out all the tt local entries marked with BATADV_TT_CLIENT_PENDING */
3866
static void batadv_tt_local_purge_pending_clients(struct batadv_priv *bat_priv)
3867
{
3868
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
3869 3870
	struct batadv_tt_common_entry *tt_common;
	struct batadv_tt_local_entry *tt_local;
3871
	struct hlist_node *node_tmp;
3872 3873
	struct hlist_head *head;
	spinlock_t *list_lock; /* protects write access to the hash lists */
3874
	u32 i;
3875 3876 3877 3878 3879 3880 3881 3882 3883

	if (!hash)
		return;

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
		list_lock = &hash->list_locks[i];

		spin_lock_bh(list_lock);
3884
		hlist_for_each_entry_safe(tt_common, node_tmp, head,
3885 3886
					  hash_entry) {
			if (!(tt_common->flags & BATADV_TT_CLIENT_PENDING))
3887 3888
				continue;

3889
			batadv_dbg(BATADV_DBG_TT, bat_priv,
3890 3891
				   "Deleting local tt entry (%pM, vid: %d): pending\n",
				   tt_common->addr,
3892
				   batadv_print_vid(tt_common->vid));
3893

3894
			batadv_tt_local_size_dec(bat_priv, tt_common->vid);
3895
			hlist_del_rcu(&tt_common->hash_entry);
3896 3897 3898
			tt_local = container_of(tt_common,
						struct batadv_tt_local_entry,
						common);
3899

3900
			batadv_tt_local_entry_put(tt_local);
3901 3902 3903 3904 3905
		}
		spin_unlock_bh(list_lock);
	}
}

3906
/**
3907
 * batadv_tt_local_commit_changes_nolock() - commit all pending local tt changes
3908
 *  which have been queued in the time since the last commit
3909
 * @bat_priv: the bat priv with all the soft interface information
3910 3911
 *
 * Caller must hold tt->commit_lock.
3912
 */
3913
static void batadv_tt_local_commit_changes_nolock(struct batadv_priv *bat_priv)
3914
{
3915 3916
	lockdep_assert_held(&bat_priv->tt.commit_lock);

3917 3918 3919
	if (atomic_read(&bat_priv->tt.local_changes) < 1) {
		if (!batadv_atomic_dec_not_zero(&bat_priv->tt.ogm_append_cnt))
			batadv_tt_tvlv_container_update(bat_priv);
3920
		return;
3921
	}
3922

3923
	batadv_tt_local_set_flags(bat_priv, BATADV_TT_CLIENT_NEW, false, true);
3924

3925
	batadv_tt_local_purge_pending_clients(bat_priv);
3926
	batadv_tt_local_update_crc(bat_priv);
3927 3928

	/* Increment the TTVN only once per OGM interval */
3929
	atomic_inc(&bat_priv->tt.vn);
3930
	batadv_dbg(BATADV_DBG_TT, bat_priv,
3931
		   "Local changes committed, updating to ttvn %u\n",
3932
		   (u8)atomic_read(&bat_priv->tt.vn));
3933 3934

	/* reset the sending counter */
3935
	atomic_set(&bat_priv->tt.ogm_append_cnt, BATADV_TT_OGM_APPEND_MAX);
3936
	batadv_tt_tvlv_container_update(bat_priv);
3937
}
3938

3939
/**
3940
 * batadv_tt_local_commit_changes() - commit all pending local tt changes which
3941 3942 3943 3944 3945 3946 3947
 *  have been queued in the time since the last commit
 * @bat_priv: the bat priv with all the soft interface information
 */
void batadv_tt_local_commit_changes(struct batadv_priv *bat_priv)
{
	spin_lock_bh(&bat_priv->tt.commit_lock);
	batadv_tt_local_commit_changes_nolock(bat_priv);
3948
	spin_unlock_bh(&bat_priv->tt.commit_lock);
3949
}
3950

3951 3952 3953 3954 3955 3956 3957 3958 3959
/**
 * batadv_is_ap_isolated() - Check if packet from upper layer should be dropped
 * @bat_priv: the bat priv with all the soft interface information
 * @src: source mac address of packet
 * @dst: destination mac address of packet
 * @vid: vlan id of packet
 *
 * Return: true when src+dst(+vid) pair should be isolated, false otherwise
 */
3960 3961
bool batadv_is_ap_isolated(struct batadv_priv *bat_priv, u8 *src, u8 *dst,
			   unsigned short vid)
3962
{
3963 3964
	struct batadv_tt_local_entry *tt_local_entry;
	struct batadv_tt_global_entry *tt_global_entry;
3965
	struct batadv_softif_vlan *vlan;
3966
	bool ret = false;
3967

3968
	vlan = batadv_softif_vlan_get(bat_priv, vid);
3969 3970 3971 3972
	if (!vlan)
		return false;

	if (!atomic_read(&vlan->ap_isolation))
3973
		goto vlan_put;
3974

3975
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, dst, vid);
3976
	if (!tt_local_entry)
3977
		goto vlan_put;
3978

3979
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, src, vid);
3980
	if (!tt_global_entry)
3981
		goto local_entry_put;
3982

3983 3984
	if (_batadv_is_ap_isolated(tt_local_entry, tt_global_entry))
		ret = true;
3985

3986 3987 3988 3989
	batadv_tt_global_entry_put(tt_global_entry);
local_entry_put:
	batadv_tt_local_entry_put(tt_local_entry);
vlan_put:
3990
	batadv_softif_vlan_put(vlan);
3991 3992
	return ret;
}
3993

3994
/**
3995
 * batadv_tt_update_orig() - update global translation table with new tt
3996 3997
 *  information received via ogms
 * @bat_priv: the bat priv with all the soft interface information
3998 3999
 * @orig_node: the orig_node of the ogm
 * @tt_buff: pointer to the first tvlv VLAN entry
4000 4001
 * @tt_num_vlan: number of tvlv VLAN entries
 * @tt_change: pointer to the first entry in the TT buffer
4002 4003 4004 4005 4006
 * @tt_num_changes: number of tt changes inside the tt buffer
 * @ttvn: translation table version number of this changeset
 */
static void batadv_tt_update_orig(struct batadv_priv *bat_priv,
				  struct batadv_orig_node *orig_node,
4007
				  const void *tt_buff, u16 tt_num_vlan,
4008
				  struct batadv_tvlv_tt_change *tt_change,
4009
				  u16 tt_num_changes, u8 ttvn)
4010
{
4011
	u8 orig_ttvn = (u8)atomic_read(&orig_node->last_ttvn);
4012
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
4013
	bool full_table = true;
4014
	bool has_tt_init;
4015

4016
	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)tt_buff;
4017 4018
	has_tt_init = test_bit(BATADV_ORIG_CAPA_HAS_TT,
			       &orig_node->capa_initialized);
4019

4020
	/* orig table not initialised AND first diff is in the OGM OR the ttvn
4021 4022
	 * increased by one -> we can apply the attached changes
	 */
4023
	if ((!has_tt_init && ttvn == 1) || ttvn - orig_ttvn == 1) {
4024
		/* the OGM could not contain the changes due to their size or
4025 4026
		 * because they have already been sent BATADV_TT_OGM_APPEND_MAX
		 * times.
4027 4028
		 * In this case send a tt request
		 */
4029 4030 4031 4032 4033
		if (!tt_num_changes) {
			full_table = false;
			goto request_table;
		}

4034 4035
		spin_lock_bh(&orig_node->tt_lock);

4036
		batadv_tt_update_changes(bat_priv, orig_node, tt_num_changes,
4037
					 ttvn, tt_change);
4038 4039 4040

		/* Even if we received the precomputed crc with the OGM, we
		 * prefer to recompute it to spot any possible inconsistency
4041 4042
		 * in the global table
		 */
4043
		batadv_tt_global_update_crc(bat_priv, orig_node);
4044

4045 4046
		spin_unlock_bh(&orig_node->tt_lock);

4047 4048 4049 4050 4051 4052 4053
		/* The ttvn alone is not enough to guarantee consistency
		 * because a single value could represent different states
		 * (due to the wrap around). Thus a node has to check whether
		 * the resulting table (after applying the changes) is still
		 * consistent or not. E.g. a node could disconnect while its
		 * ttvn is X and reconnect on ttvn = X + TTVN_MAX: in this case
		 * checking the CRC value is mandatory to detect the
4054 4055
		 * inconsistency
		 */
4056 4057
		if (!batadv_tt_global_check_crc(orig_node, tt_vlan,
						tt_num_vlan))
4058 4059 4060
			goto request_table;
	} else {
		/* if we missed more than one change or our tables are not
4061 4062
		 * in sync anymore -> request fresh tt data
		 */
4063
		if (!has_tt_init || ttvn != orig_ttvn ||
4064 4065
		    !batadv_tt_global_check_crc(orig_node, tt_vlan,
						tt_num_vlan)) {
4066
request_table:
4067
			batadv_dbg(BATADV_DBG_TT, bat_priv,
4068 4069 4070
				   "TT inconsistency for %pM. Need to retrieve the correct information (ttvn: %u last_ttvn: %u num_changes: %u)\n",
				   orig_node->orig, ttvn, orig_ttvn,
				   tt_num_changes);
4071
			batadv_send_tt_request(bat_priv, orig_node, ttvn,
4072 4073
					       tt_vlan, tt_num_vlan,
					       full_table);
4074 4075 4076 4077
			return;
		}
	}
}
4078

4079
/**
4080
 * batadv_tt_global_client_is_roaming() - check if a client is marked as roaming
4081 4082 4083 4084
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the mac address of the client to check
 * @vid: VLAN identifier
 *
4085
 * Return: true if we know that the client has moved from its old originator
4086 4087
 * to another one. This entry is still kept for consistency purposes and will be
 * deleted later by a DEL or because of timeout
4088
 */
4089
bool batadv_tt_global_client_is_roaming(struct batadv_priv *bat_priv,
4090
					u8 *addr, unsigned short vid)
4091
{
4092
	struct batadv_tt_global_entry *tt_global_entry;
4093 4094
	bool ret = false;

4095
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
4096 4097 4098
	if (!tt_global_entry)
		goto out;

4099
	ret = tt_global_entry->common.flags & BATADV_TT_CLIENT_ROAM;
4100
	batadv_tt_global_entry_put(tt_global_entry);
4101 4102 4103
out:
	return ret;
}
4104

4105
/**
4106
 * batadv_tt_local_client_is_roaming() - tells whether the client is roaming
4107
 * @bat_priv: the bat priv with all the soft interface information
4108 4109
 * @addr: the mac address of the local client to query
 * @vid: VLAN identifier
4110
 *
4111
 * Return: true if the local client is known to be roaming (it is not served by
4112 4113 4114 4115
 * this node anymore) or not. If yes, the client is still present in the table
 * to keep the latter consistent with the node TTVN
 */
bool batadv_tt_local_client_is_roaming(struct batadv_priv *bat_priv,
4116
				       u8 *addr, unsigned short vid)
4117 4118 4119 4120
{
	struct batadv_tt_local_entry *tt_local_entry;
	bool ret = false;

4121
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
4122 4123 4124 4125
	if (!tt_local_entry)
		goto out;

	ret = tt_local_entry->common.flags & BATADV_TT_CLIENT_ROAM;
4126
	batadv_tt_local_entry_put(tt_local_entry);
4127 4128 4129 4130
out:
	return ret;
}

4131 4132 4133 4134 4135 4136 4137 4138 4139
/**
 * batadv_tt_add_temporary_global_entry() - Add temporary entry to global TT
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: orig node which the temporary entry should be associated with
 * @addr: mac address of the client
 * @vid: VLAN id of the new temporary global translation table
 *
 * Return: true when temporary tt entry could be added, false otherwise
 */
4140 4141
bool batadv_tt_add_temporary_global_entry(struct batadv_priv *bat_priv,
					  struct batadv_orig_node *orig_node,
4142
					  const unsigned char *addr,
4143
					  unsigned short vid)
4144
{
4145 4146 4147 4148 4149 4150
	/* ignore loop detect macs, they are not supposed to be in the tt local
	 * data as well.
	 */
	if (batadv_bla_is_loopdetect_mac(addr))
		return false;

4151
	if (!batadv_tt_global_add(bat_priv, orig_node, addr, vid,
4152 4153
				  BATADV_TT_CLIENT_TEMP,
				  atomic_read(&orig_node->last_ttvn)))
4154
		return false;
4155 4156

	batadv_dbg(BATADV_DBG_TT, bat_priv,
4157
		   "Added temporary global client (addr: %pM, vid: %d, orig: %pM)\n",
4158
		   addr, batadv_print_vid(vid), orig_node->orig);
4159 4160

	return true;
4161
}
4162

4163
/**
4164
 * batadv_tt_local_resize_to_mtu() - resize the local translation table fit the
4165 4166 4167 4168 4169 4170 4171 4172 4173 4174 4175 4176 4177 4178 4179 4180 4181 4182 4183 4184 4185 4186 4187 4188 4189 4190 4191 4192 4193 4194 4195 4196 4197 4198 4199 4200 4201 4202 4203
 *  maximum packet size that can be transported through the mesh
 * @soft_iface: netdev struct of the mesh interface
 *
 * Remove entries older than 'timeout' and half timeout if more entries need
 * to be removed.
 */
void batadv_tt_local_resize_to_mtu(struct net_device *soft_iface)
{
	struct batadv_priv *bat_priv = netdev_priv(soft_iface);
	int packet_size_max = atomic_read(&bat_priv->packet_size_max);
	int table_size, timeout = BATADV_TT_LOCAL_TIMEOUT / 2;
	bool reduced = false;

	spin_lock_bh(&bat_priv->tt.commit_lock);

	while (true) {
		table_size = batadv_tt_local_table_transmit_size(bat_priv);
		if (packet_size_max >= table_size)
			break;

		batadv_tt_local_purge(bat_priv, timeout);
		batadv_tt_local_purge_pending_clients(bat_priv);

		timeout /= 2;
		reduced = true;
		net_ratelimited_function(batadv_info, soft_iface,
					 "Forced to purge local tt entries to fit new maximum fragment MTU (%i)\n",
					 packet_size_max);
	}

	/* commit these changes immediately, to avoid synchronization problem
	 * with the TTVN
	 */
	if (reduced)
		batadv_tt_local_commit_changes_nolock(bat_priv);

	spin_unlock_bh(&bat_priv->tt.commit_lock);
}

4204
/**
4205
 * batadv_tt_tvlv_ogm_handler_v1() - process incoming tt tvlv container
4206 4207 4208 4209 4210 4211 4212 4213
 * @bat_priv: the bat priv with all the soft interface information
 * @orig: the orig_node of the ogm
 * @flags: flags indicating the tvlv state (see batadv_tvlv_handler_flags)
 * @tvlv_value: tvlv buffer containing the gateway data
 * @tvlv_value_len: tvlv buffer length
 */
static void batadv_tt_tvlv_ogm_handler_v1(struct batadv_priv *bat_priv,
					  struct batadv_orig_node *orig,
4214 4215
					  u8 flags, void *tvlv_value,
					  u16 tvlv_value_len)
4216
{
4217 4218
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
	struct batadv_tvlv_tt_change *tt_change;
4219
	struct batadv_tvlv_tt_data *tt_data;
4220
	u16 num_entries, num_vlan;
4221 4222 4223 4224 4225 4226 4227

	if (tvlv_value_len < sizeof(*tt_data))
		return;

	tt_data = (struct batadv_tvlv_tt_data *)tvlv_value;
	tvlv_value_len -= sizeof(*tt_data);

4228 4229 4230 4231 4232 4233 4234 4235 4236
	num_vlan = ntohs(tt_data->num_vlan);

	if (tvlv_value_len < sizeof(*tt_vlan) * num_vlan)
		return;

	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(tt_data + 1);
	tt_change = (struct batadv_tvlv_tt_change *)(tt_vlan + num_vlan);
	tvlv_value_len -= sizeof(*tt_vlan) * num_vlan;

4237
	num_entries = batadv_tt_entries(tvlv_value_len);
4238

4239 4240
	batadv_tt_update_orig(bat_priv, orig, tt_vlan, num_vlan, tt_change,
			      num_entries, tt_data->ttvn);
4241 4242
}

4243
/**
4244
 * batadv_tt_tvlv_unicast_handler_v1() - process incoming (unicast) tt tvlv
4245 4246 4247 4248 4249 4250 4251
 *  container
 * @bat_priv: the bat priv with all the soft interface information
 * @src: mac address of tt tvlv sender
 * @dst: mac address of tt tvlv recipient
 * @tvlv_value: tvlv buffer containing the tt data
 * @tvlv_value_len: tvlv buffer length
 *
4252
 * Return: NET_RX_DROP if the tt tvlv is to be re-routed, NET_RX_SUCCESS
4253 4254 4255
 * otherwise.
 */
static int batadv_tt_tvlv_unicast_handler_v1(struct batadv_priv *bat_priv,
4256
					     u8 *src, u8 *dst,
4257
					     void *tvlv_value,
4258
					     u16 tvlv_value_len)
4259 4260
{
	struct batadv_tvlv_tt_data *tt_data;
4261
	u16 tt_vlan_len, tt_num_entries;
4262 4263 4264 4265 4266 4267 4268 4269 4270
	char tt_flag;
	bool ret;

	if (tvlv_value_len < sizeof(*tt_data))
		return NET_RX_SUCCESS;

	tt_data = (struct batadv_tvlv_tt_data *)tvlv_value;
	tvlv_value_len -= sizeof(*tt_data);

4271 4272 4273 4274 4275 4276 4277 4278
	tt_vlan_len = sizeof(struct batadv_tvlv_tt_vlan_data);
	tt_vlan_len *= ntohs(tt_data->num_vlan);

	if (tvlv_value_len < tt_vlan_len)
		return NET_RX_SUCCESS;

	tvlv_value_len -= tt_vlan_len;
	tt_num_entries = batadv_tt_entries(tvlv_value_len);
4279 4280 4281 4282 4283 4284 4285 4286 4287 4288 4289 4290 4291 4292 4293 4294 4295 4296 4297 4298 4299 4300 4301 4302 4303 4304 4305

	switch (tt_data->flags & BATADV_TT_DATA_TYPE_MASK) {
	case BATADV_TT_REQUEST:
		batadv_inc_counter(bat_priv, BATADV_CNT_TT_REQUEST_RX);

		/* If this node cannot provide a TT response the tt_request is
		 * forwarded
		 */
		ret = batadv_send_tt_response(bat_priv, tt_data, src, dst);
		if (!ret) {
			if (tt_data->flags & BATADV_TT_FULL_TABLE)
				tt_flag = 'F';
			else
				tt_flag = '.';

			batadv_dbg(BATADV_DBG_TT, bat_priv,
				   "Routing TT_REQUEST to %pM [%c]\n",
				   dst, tt_flag);
			/* tvlv API will re-route the packet */
			return NET_RX_DROP;
		}
		break;
	case BATADV_TT_RESPONSE:
		batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_RX);

		if (batadv_is_my_mac(bat_priv, dst)) {
			batadv_handle_tt_response(bat_priv, tt_data,
4306
						  src, tt_num_entries);
4307 4308 4309 4310 4311 4312 4313 4314 4315 4316 4317 4318 4319 4320 4321 4322 4323 4324
			return NET_RX_SUCCESS;
		}

		if (tt_data->flags & BATADV_TT_FULL_TABLE)
			tt_flag =  'F';
		else
			tt_flag = '.';

		batadv_dbg(BATADV_DBG_TT, bat_priv,
			   "Routing TT_RESPONSE to %pM [%c]\n", dst, tt_flag);

		/* tvlv API will re-route the packet */
		return NET_RX_DROP;
	}

	return NET_RX_SUCCESS;
}

4325
/**
4326 4327
 * batadv_roam_tvlv_unicast_handler_v1() - process incoming tt roam tvlv
 *  container
4328 4329 4330 4331 4332 4333
 * @bat_priv: the bat priv with all the soft interface information
 * @src: mac address of tt tvlv sender
 * @dst: mac address of tt tvlv recipient
 * @tvlv_value: tvlv buffer containing the tt data
 * @tvlv_value_len: tvlv buffer length
 *
4334
 * Return: NET_RX_DROP if the tt roam tvlv is to be re-routed, NET_RX_SUCCESS
4335 4336 4337
 * otherwise.
 */
static int batadv_roam_tvlv_unicast_handler_v1(struct batadv_priv *bat_priv,
4338
					       u8 *src, u8 *dst,
4339
					       void *tvlv_value,
4340
					       u16 tvlv_value_len)
4341 4342 4343 4344 4345 4346 4347 4348 4349 4350 4351 4352 4353 4354 4355 4356 4357 4358 4359 4360 4361 4362 4363 4364 4365 4366
{
	struct batadv_tvlv_roam_adv *roaming_adv;
	struct batadv_orig_node *orig_node = NULL;

	/* If this node is not the intended recipient of the
	 * roaming advertisement the packet is forwarded
	 * (the tvlv API will re-route the packet).
	 */
	if (!batadv_is_my_mac(bat_priv, dst))
		return NET_RX_DROP;

	if (tvlv_value_len < sizeof(*roaming_adv))
		goto out;

	orig_node = batadv_orig_hash_find(bat_priv, src);
	if (!orig_node)
		goto out;

	batadv_inc_counter(bat_priv, BATADV_CNT_TT_ROAM_ADV_RX);
	roaming_adv = (struct batadv_tvlv_roam_adv *)tvlv_value;

	batadv_dbg(BATADV_DBG_TT, bat_priv,
		   "Received ROAMING_ADV from %pM (client %pM)\n",
		   src, roaming_adv->client);

	batadv_tt_global_add(bat_priv, orig_node, roaming_adv->client,
4367
			     ntohs(roaming_adv->vid), BATADV_TT_CLIENT_ROAM,
4368 4369 4370 4371
			     atomic_read(&orig_node->last_ttvn) + 1);

out:
	if (orig_node)
4372
		batadv_orig_node_put(orig_node);
4373 4374 4375
	return NET_RX_SUCCESS;
}

4376
/**
4377
 * batadv_tt_init() - initialise the translation table internals
4378 4379
 * @bat_priv: the bat priv with all the soft interface information
 *
4380
 * Return: 0 on success or negative error number in case of failure.
4381 4382 4383 4384 4385
 */
int batadv_tt_init(struct batadv_priv *bat_priv)
{
	int ret;

4386 4387 4388
	/* synchronized flags must be remote */
	BUILD_BUG_ON(!(BATADV_TT_SYNC_MASK & BATADV_TT_REMOTE_MASK));

4389 4390 4391 4392 4393 4394 4395 4396 4397
	ret = batadv_tt_local_init(bat_priv);
	if (ret < 0)
		return ret;

	ret = batadv_tt_global_init(bat_priv);
	if (ret < 0)
		return ret;

	batadv_tvlv_handler_register(bat_priv, batadv_tt_tvlv_ogm_handler_v1,
4398 4399
				     batadv_tt_tvlv_unicast_handler_v1,
				     BATADV_TVLV_TT, 1, BATADV_NO_FLAGS);
4400

4401 4402 4403 4404
	batadv_tvlv_handler_register(bat_priv, NULL,
				     batadv_roam_tvlv_unicast_handler_v1,
				     BATADV_TVLV_ROAM, 1, BATADV_NO_FLAGS);

4405 4406 4407 4408 4409 4410
	INIT_DELAYED_WORK(&bat_priv->tt.work, batadv_tt_purge);
	queue_delayed_work(batadv_event_workqueue, &bat_priv->tt.work,
			   msecs_to_jiffies(BATADV_TT_WORK_PERIOD));

	return 1;
}
4411 4412

/**
4413
 * batadv_tt_global_is_isolated() - check if a client is marked as isolated
4414 4415 4416 4417
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the mac address of the client
 * @vid: the identifier of the VLAN where this client is connected
 *
4418
 * Return: true if the client is marked with the TT_CLIENT_ISOLA flag, false
4419 4420 4421
 * otherwise
 */
bool batadv_tt_global_is_isolated(struct batadv_priv *bat_priv,
4422
				  const u8 *addr, unsigned short vid)
4423 4424 4425 4426 4427 4428 4429 4430 4431 4432
{
	struct batadv_tt_global_entry *tt;
	bool ret;

	tt = batadv_tt_global_hash_find(bat_priv, addr, vid);
	if (!tt)
		return false;

	ret = tt->common.flags & BATADV_TT_CLIENT_ISOLA;

4433
	batadv_tt_global_entry_put(tt);
4434 4435 4436

	return ret;
}
4437 4438

/**
4439
 * batadv_tt_cache_init() - Initialize tt memory object cache
4440 4441 4442 4443 4444 4445 4446 4447 4448 4449 4450 4451 4452 4453 4454 4455 4456 4457 4458 4459 4460 4461 4462 4463 4464 4465 4466 4467 4468 4469 4470 4471 4472 4473 4474 4475 4476 4477 4478 4479 4480 4481 4482 4483 4484 4485 4486 4487 4488 4489 4490 4491 4492 4493 4494 4495 4496 4497 4498 4499 4500 4501 4502 4503 4504 4505 4506 4507
 *
 * Return: 0 on success or negative error number in case of failure.
 */
int __init batadv_tt_cache_init(void)
{
	size_t tl_size = sizeof(struct batadv_tt_local_entry);
	size_t tg_size = sizeof(struct batadv_tt_global_entry);
	size_t tt_orig_size = sizeof(struct batadv_tt_orig_list_entry);
	size_t tt_change_size = sizeof(struct batadv_tt_change_node);
	size_t tt_req_size = sizeof(struct batadv_tt_req_node);
	size_t tt_roam_size = sizeof(struct batadv_tt_roam_node);

	batadv_tl_cache = kmem_cache_create("batadv_tl_cache", tl_size, 0,
					    SLAB_HWCACHE_ALIGN, NULL);
	if (!batadv_tl_cache)
		return -ENOMEM;

	batadv_tg_cache = kmem_cache_create("batadv_tg_cache", tg_size, 0,
					    SLAB_HWCACHE_ALIGN, NULL);
	if (!batadv_tg_cache)
		goto err_tt_tl_destroy;

	batadv_tt_orig_cache = kmem_cache_create("batadv_tt_orig_cache",
						 tt_orig_size, 0,
						 SLAB_HWCACHE_ALIGN, NULL);
	if (!batadv_tt_orig_cache)
		goto err_tt_tg_destroy;

	batadv_tt_change_cache = kmem_cache_create("batadv_tt_change_cache",
						   tt_change_size, 0,
						   SLAB_HWCACHE_ALIGN, NULL);
	if (!batadv_tt_change_cache)
		goto err_tt_orig_destroy;

	batadv_tt_req_cache = kmem_cache_create("batadv_tt_req_cache",
						tt_req_size, 0,
						SLAB_HWCACHE_ALIGN, NULL);
	if (!batadv_tt_req_cache)
		goto err_tt_change_destroy;

	batadv_tt_roam_cache = kmem_cache_create("batadv_tt_roam_cache",
						 tt_roam_size, 0,
						 SLAB_HWCACHE_ALIGN, NULL);
	if (!batadv_tt_roam_cache)
		goto err_tt_req_destroy;

	return 0;

err_tt_req_destroy:
	kmem_cache_destroy(batadv_tt_req_cache);
	batadv_tt_req_cache = NULL;
err_tt_change_destroy:
	kmem_cache_destroy(batadv_tt_change_cache);
	batadv_tt_change_cache = NULL;
err_tt_orig_destroy:
	kmem_cache_destroy(batadv_tt_orig_cache);
	batadv_tt_orig_cache = NULL;
err_tt_tg_destroy:
	kmem_cache_destroy(batadv_tg_cache);
	batadv_tg_cache = NULL;
err_tt_tl_destroy:
	kmem_cache_destroy(batadv_tl_cache);
	batadv_tl_cache = NULL;

	return -ENOMEM;
}

/**
4508
 * batadv_tt_cache_destroy() - Destroy tt memory object cache
4509 4510 4511 4512 4513 4514 4515 4516 4517 4518
 */
void batadv_tt_cache_destroy(void)
{
	kmem_cache_destroy(batadv_tl_cache);
	kmem_cache_destroy(batadv_tg_cache);
	kmem_cache_destroy(batadv_tt_orig_cache);
	kmem_cache_destroy(batadv_tt_change_cache);
	kmem_cache_destroy(batadv_tt_req_cache);
	kmem_cache_destroy(batadv_tt_roam_cache);
}