translation-table.c 112.9 KB
Newer Older
1
/* Copyright (C) 2007-2015 B.A.T.M.A.N. contributors:
2
 *
3
 * Marek Lindner, Simon Wunderlich, Antonio Quartulli
4 5 6 7 8 9 10 11 12 13 14
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of version 2 of the GNU General Public
 * License as published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
 * General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
15
 * along with this program; if not, see <http://www.gnu.org/licenses/>.
16 17 18
 */

#include "translation-table.h"
19 20 21
#include "main.h"

#include <linux/atomic.h>
22
#include <linux/bitops.h>
23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47
#include <linux/bug.h>
#include <linux/byteorder/generic.h>
#include <linux/compiler.h>
#include <linux/crc32c.h>
#include <linux/errno.h>
#include <linux/etherdevice.h>
#include <linux/fs.h>
#include <linux/if_ether.h>
#include <linux/jhash.h>
#include <linux/jiffies.h>
#include <linux/kernel.h>
#include <linux/list.h>
#include <linux/lockdep.h>
#include <linux/netdevice.h>
#include <linux/rculist.h>
#include <linux/rcupdate.h>
#include <linux/seq_file.h>
#include <linux/slab.h>
#include <linux/spinlock.h>
#include <linux/stddef.h>
#include <linux/string.h>
#include <linux/workqueue.h>
#include <net/net_namespace.h>

#include "bridge_loop_avoidance.h"
48
#include "hard-interface.h"
49
#include "hash.h"
50
#include "multicast.h"
51 52 53
#include "originator.h"
#include "packet.h"
#include "soft-interface.h"
54

55 56 57 58
/* hash class keys */
static struct lock_class_key batadv_tt_local_hash_lock_class_key;
static struct lock_class_key batadv_tt_global_hash_lock_class_key;

59
static void batadv_send_roam_adv(struct batadv_priv *bat_priv, u8 *client,
60
				 unsigned short vid,
61
				 struct batadv_orig_node *orig_node);
62 63
static void batadv_tt_purge(struct work_struct *work);
static void
64
batadv_tt_global_del_orig_list(struct batadv_tt_global_entry *tt_global_entry);
65 66 67
static void batadv_tt_global_del(struct batadv_priv *bat_priv,
				 struct batadv_orig_node *orig_node,
				 const unsigned char *addr,
68 69
				 unsigned short vid, const char *message,
				 bool roaming);
70

71
/* returns 1 if they are the same mac addr and vid */
72
static int batadv_compare_tt(const struct hlist_node *node, const void *data2)
73
{
74
	const void *data1 = container_of(node, struct batadv_tt_common_entry,
75
					 hash_entry);
76 77
	const struct batadv_tt_common_entry *tt1 = data1;
	const struct batadv_tt_common_entry *tt2 = data2;
78

79
	return (tt1->vid == tt2->vid) && batadv_compare_eth(data1, data2);
80 81
}

82 83 84 85 86 87 88 89
/**
 * batadv_choose_tt - return the index of the tt entry in the hash table
 * @data: pointer to the tt_common_entry object to map
 * @size: the size of the hash table
 *
 * Returns the hash index where the object represented by 'data' should be
 * stored at.
 */
90
static inline u32 batadv_choose_tt(const void *data, u32 size)
91 92
{
	struct batadv_tt_common_entry *tt;
93
	u32 hash = 0;
94 95

	tt = (struct batadv_tt_common_entry *)data;
96 97
	hash = jhash(&tt->addr, ETH_ALEN, hash);
	hash = jhash(&tt->vid, sizeof(tt->vid), hash);
98 99 100 101 102 103 104 105 106 107 108 109 110

	return hash % size;
}

/**
 * batadv_tt_hash_find - look for a client in the given hash table
 * @hash: the hash table to search
 * @addr: the mac address of the client to look for
 * @vid: VLAN identifier
 *
 * Returns a pointer to the tt_common struct belonging to the searched client if
 * found, NULL otherwise.
 */
111
static struct batadv_tt_common_entry *
112
batadv_tt_hash_find(struct batadv_hashtable *hash, const u8 *addr,
113
		    unsigned short vid)
114 115
{
	struct hlist_head *head;
116
	struct batadv_tt_common_entry to_search, *tt, *tt_tmp = NULL;
117
	u32 index;
118 119 120 121

	if (!hash)
		return NULL;

122
	ether_addr_copy(to_search.addr, addr);
123 124 125
	to_search.vid = vid;

	index = batadv_choose_tt(&to_search, hash->size);
126 127 128
	head = &hash->table[index];

	rcu_read_lock();
129 130 131 132 133
	hlist_for_each_entry_rcu(tt, head, hash_entry) {
		if (!batadv_compare_eth(tt, addr))
			continue;

		if (tt->vid != vid)
134 135
			continue;

136
		if (!atomic_inc_not_zero(&tt->refcount))
137 138
			continue;

139
		tt_tmp = tt;
140 141 142 143
		break;
	}
	rcu_read_unlock();

144
	return tt_tmp;
145 146
}

147 148 149 150 151 152 153 154 155
/**
 * batadv_tt_local_hash_find - search the local table for a given client
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the mac address of the client to look for
 * @vid: VLAN identifier
 *
 * Returns a pointer to the corresponding tt_local_entry struct if the client is
 * found, NULL otherwise.
 */
156
static struct batadv_tt_local_entry *
157
batadv_tt_local_hash_find(struct batadv_priv *bat_priv, const u8 *addr,
158
			  unsigned short vid)
159
{
160 161
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_local_entry *tt_local_entry = NULL;
162

163 164
	tt_common_entry = batadv_tt_hash_find(bat_priv->tt.local_hash, addr,
					      vid);
165 166
	if (tt_common_entry)
		tt_local_entry = container_of(tt_common_entry,
167 168
					      struct batadv_tt_local_entry,
					      common);
169 170
	return tt_local_entry;
}
171

172 173 174 175 176 177 178 179 180
/**
 * batadv_tt_global_hash_find - search the global table for a given client
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the mac address of the client to look for
 * @vid: VLAN identifier
 *
 * Returns a pointer to the corresponding tt_global_entry struct if the client
 * is found, NULL otherwise.
 */
181
static struct batadv_tt_global_entry *
182
batadv_tt_global_hash_find(struct batadv_priv *bat_priv, const u8 *addr,
183
			   unsigned short vid)
184
{
185 186
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_global_entry *tt_global_entry = NULL;
187

188 189
	tt_common_entry = batadv_tt_hash_find(bat_priv->tt.global_hash, addr,
					      vid);
190 191
	if (tt_common_entry)
		tt_global_entry = container_of(tt_common_entry,
192 193
					       struct batadv_tt_global_entry,
					       common);
194
	return tt_global_entry;
195 196
}

197
static void
198
batadv_tt_local_entry_free_ref(struct batadv_tt_local_entry *tt_local_entry)
199
{
200 201
	if (atomic_dec_and_test(&tt_local_entry->common.refcount))
		kfree_rcu(tt_local_entry, common.rcu);
202 203
}

204 205 206 207 208
/**
 * batadv_tt_global_entry_free_ref - decrement the refcounter for a
 *  tt_global_entry and possibly free it
 * @tt_global_entry: the object to free
 */
209
static void
210
batadv_tt_global_entry_free_ref(struct batadv_tt_global_entry *tt_global_entry)
211
{
212
	if (atomic_dec_and_test(&tt_global_entry->common.refcount)) {
213
		batadv_tt_global_del_orig_list(tt_global_entry);
214
		kfree_rcu(tt_global_entry, common.rcu);
215 216 217
	}
}

218 219 220 221 222 223 224 225 226 227
/**
 * batadv_tt_global_hash_count - count the number of orig entries
 * @hash: hash table containing the tt entries
 * @addr: the mac address of the client to count entries for
 * @vid: VLAN identifier
 *
 * Return the number of originators advertising the given address/data
 * (excluding ourself).
 */
int batadv_tt_global_hash_count(struct batadv_priv *bat_priv,
228
				const u8 *addr, unsigned short vid)
229 230 231 232 233 234 235 236 237 238 239 240 241 242
{
	struct batadv_tt_global_entry *tt_global_entry;
	int count;

	tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
	if (!tt_global_entry)
		return 0;

	count = atomic_read(&tt_global_entry->orig_list_count);
	batadv_tt_global_entry_free_ref(tt_global_entry);

	return count;
}

243
static void batadv_tt_orig_list_entry_free_rcu(struct rcu_head *rcu)
244
{
245
	struct batadv_tt_orig_list_entry *orig_entry;
246

247
	orig_entry = container_of(rcu, struct batadv_tt_orig_list_entry, rcu);
248 249 250 251 252 253

	/* We are in an rcu callback here, therefore we cannot use
	 * batadv_orig_node_free_ref() and its call_rcu():
	 * An rcu_barrier() wouldn't wait for that to finish
	 */
	batadv_orig_node_free_ref_now(orig_entry->orig_node);
254 255 256
	kfree(orig_entry);
}

257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319
/**
 * batadv_tt_local_size_mod - change the size by v of the local table identified
 *  by vid
 * @bat_priv: the bat priv with all the soft interface information
 * @vid: the VLAN identifier of the sub-table to change
 * @v: the amount to sum to the local table size
 */
static void batadv_tt_local_size_mod(struct batadv_priv *bat_priv,
				     unsigned short vid, int v)
{
	struct batadv_softif_vlan *vlan;

	vlan = batadv_softif_vlan_get(bat_priv, vid);
	if (!vlan)
		return;

	atomic_add(v, &vlan->tt.num_entries);

	batadv_softif_vlan_free_ref(vlan);
}

/**
 * batadv_tt_local_size_inc - increase by one the local table size for the given
 *  vid
 * @bat_priv: the bat priv with all the soft interface information
 * @vid: the VLAN identifier
 */
static void batadv_tt_local_size_inc(struct batadv_priv *bat_priv,
				     unsigned short vid)
{
	batadv_tt_local_size_mod(bat_priv, vid, 1);
}

/**
 * batadv_tt_local_size_dec - decrease by one the local table size for the given
 *  vid
 * @bat_priv: the bat priv with all the soft interface information
 * @vid: the VLAN identifier
 */
static void batadv_tt_local_size_dec(struct batadv_priv *bat_priv,
				     unsigned short vid)
{
	batadv_tt_local_size_mod(bat_priv, vid, -1);
}

/**
 * batadv_tt_global_size_mod - change the size by v of the local table
 *  identified by vid
 * @bat_priv: the bat priv with all the soft interface information
 * @vid: the VLAN identifier
 * @v: the amount to sum to the global table size
 */
static void batadv_tt_global_size_mod(struct batadv_orig_node *orig_node,
				      unsigned short vid, int v)
{
	struct batadv_orig_node_vlan *vlan;

	vlan = batadv_orig_node_vlan_new(orig_node, vid);
	if (!vlan)
		return;

	if (atomic_add_return(v, &vlan->tt.num_entries) == 0) {
		spin_lock_bh(&orig_node->vlan_list_lock);
320
		hlist_del_init_rcu(&vlan->list);
321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351
		spin_unlock_bh(&orig_node->vlan_list_lock);
		batadv_orig_node_vlan_free_ref(vlan);
	}

	batadv_orig_node_vlan_free_ref(vlan);
}

/**
 * batadv_tt_global_size_inc - increase by one the global table size for the
 *  given vid
 * @orig_node: the originator which global table size has to be decreased
 * @vid: the vlan identifier
 */
static void batadv_tt_global_size_inc(struct batadv_orig_node *orig_node,
				      unsigned short vid)
{
	batadv_tt_global_size_mod(orig_node, vid, 1);
}

/**
 * batadv_tt_global_size_dec - decrease by one the global table size for the
 *  given vid
 * @orig_node: the originator which global table size has to be decreased
 * @vid: the vlan identifier
 */
static void batadv_tt_global_size_dec(struct batadv_orig_node *orig_node,
				      unsigned short vid)
{
	batadv_tt_global_size_mod(orig_node, vid, -1);
}

352
static void
353
batadv_tt_orig_list_entry_free_ref(struct batadv_tt_orig_list_entry *orig_entry)
354
{
355 356
	if (!atomic_dec_and_test(&orig_entry->refcount))
		return;
357

358
	call_rcu(&orig_entry->rcu, batadv_tt_orig_list_entry_free_rcu);
359 360
}

361 362 363 364 365 366
/**
 * batadv_tt_local_event - store a local TT event (ADD/DEL)
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_local_entry: the TT entry involved in the event
 * @event_flags: flags to store in the event structure
 */
367
static void batadv_tt_local_event(struct batadv_priv *bat_priv,
368
				  struct batadv_tt_local_entry *tt_local_entry,
369
				  u8 event_flags)
370
{
371
	struct batadv_tt_change_node *tt_change_node, *entry, *safe;
372
	struct batadv_tt_common_entry *common = &tt_local_entry->common;
373
	u8 flags = common->flags | event_flags;
374 375
	bool event_removed = false;
	bool del_op_requested, del_op_entry;
376 377 378 379 380

	tt_change_node = kmalloc(sizeof(*tt_change_node), GFP_ATOMIC);
	if (!tt_change_node)
		return;

381
	tt_change_node->change.flags = flags;
382 383
	memset(tt_change_node->change.reserved, 0,
	       sizeof(tt_change_node->change.reserved));
384
	ether_addr_copy(tt_change_node->change.addr, common->addr);
385
	tt_change_node->change.vid = htons(common->vid);
386

387
	del_op_requested = flags & BATADV_TT_CLIENT_DEL;
388 389

	/* check for ADD+DEL or DEL+ADD events */
390 391
	spin_lock_bh(&bat_priv->tt.changes_list_lock);
	list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
392
				 list) {
393
		if (!batadv_compare_eth(entry->change.addr, common->addr))
394 395 396 397 398 399 400 401 402
			continue;

		/* DEL+ADD in the same orig interval have no effect and can be
		 * removed to avoid silly behaviour on the receiver side. The
		 * other way around (ADD+DEL) can happen in case of roaming of
		 * a client still in the NEW state. Roaming of NEW clients is
		 * now possible due to automatically recognition of "temporary"
		 * clients
		 */
403
		del_op_entry = entry->change.flags & BATADV_TT_CLIENT_DEL;
404 405 406 407
		if (!del_op_requested && del_op_entry)
			goto del;
		if (del_op_requested && !del_op_entry)
			goto del;
408 409 410 411 412 413 414

		/* this is a second add in the same originator interval. It
		 * means that flags have been changed: update them!
		 */
		if (!del_op_requested && !del_op_entry)
			entry->change.flags = flags;

415 416 417 418
		continue;
del:
		list_del(&entry->list);
		kfree(entry);
419
		kfree(tt_change_node);
420 421 422 423
		event_removed = true;
		goto unlock;
	}

424
	/* track the change in the OGMinterval list */
425
	list_add_tail(&tt_change_node->list, &bat_priv->tt.changes_list);
426 427

unlock:
428
	spin_unlock_bh(&bat_priv->tt.changes_list_lock);
429

430
	if (event_removed)
431
		atomic_dec(&bat_priv->tt.local_changes);
432
	else
433
		atomic_inc(&bat_priv->tt.local_changes);
434 435
}

436 437 438 439 440 441 442
/**
 * batadv_tt_len - compute length in bytes of given number of tt changes
 * @changes_num: number of tt changes
 *
 * Returns computed length in bytes.
 */
static int batadv_tt_len(int changes_num)
443
{
444
	return changes_num * sizeof(struct batadv_tvlv_tt_change);
445 446
}

447 448 449 450 451 452
/**
 * batadv_tt_entries - compute the number of entries fitting in tt_len bytes
 * @tt_len: available space
 *
 * Returns the number of entries.
 */
453
static u16 batadv_tt_entries(u16 tt_len)
454 455 456 457
{
	return tt_len / batadv_tt_len(1);
}

458 459 460 461 462 463 464 465 466
/**
 * batadv_tt_local_table_transmit_size - calculates the local translation table
 *  size when transmitted over the air
 * @bat_priv: the bat priv with all the soft interface information
 *
 * Returns local translation table size in bytes.
 */
static int batadv_tt_local_table_transmit_size(struct batadv_priv *bat_priv)
{
467 468
	u16 num_vlan = 0;
	u16 tt_local_entries = 0;
469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487
	struct batadv_softif_vlan *vlan;
	int hdr_size;

	rcu_read_lock();
	hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
		num_vlan++;
		tt_local_entries += atomic_read(&vlan->tt.num_entries);
	}
	rcu_read_unlock();

	/* header size of tvlv encapsulated tt response payload */
	hdr_size = sizeof(struct batadv_unicast_tvlv_packet);
	hdr_size += sizeof(struct batadv_tvlv_hdr);
	hdr_size += sizeof(struct batadv_tvlv_tt_data);
	hdr_size += num_vlan * sizeof(struct batadv_tvlv_tt_vlan_data);

	return hdr_size + batadv_tt_len(tt_local_entries);
}

488
static int batadv_tt_local_init(struct batadv_priv *bat_priv)
489
{
490
	if (bat_priv->tt.local_hash)
491
		return 0;
492

493
	bat_priv->tt.local_hash = batadv_hash_new(1024);
494

495
	if (!bat_priv->tt.local_hash)
496
		return -ENOMEM;
497

498 499 500
	batadv_hash_set_lock_class(bat_priv->tt.local_hash,
				   &batadv_tt_local_hash_lock_class_key);

501
	return 0;
502 503
}

504 505 506 507 508
static void batadv_tt_global_free(struct batadv_priv *bat_priv,
				  struct batadv_tt_global_entry *tt_global,
				  const char *message)
{
	batadv_dbg(BATADV_DBG_TT, bat_priv,
509 510 511
		   "Deleting global tt entry %pM (vid: %d): %s\n",
		   tt_global->common.addr,
		   BATADV_PRINT_VID(tt_global->common.vid), message);
512 513

	batadv_hash_remove(bat_priv->tt.global_hash, batadv_compare_tt,
514
			   batadv_choose_tt, &tt_global->common);
515 516 517
	batadv_tt_global_entry_free_ref(tt_global);
}

518 519 520 521 522 523 524 525
/**
 * batadv_tt_local_add - add a new client to the local table or update an
 *  existing client
 * @soft_iface: netdev struct of the mesh interface
 * @addr: the mac address of the client to add
 * @vid: VLAN identifier
 * @ifindex: index of the interface where the client is connected to (useful to
 *  identify wireless clients)
526 527
 * @mark: the value contained in the skb->mark field of the received packet (if
 *  any)
528 529
 *
 * Returns true if the client was successfully added, false otherwise.
530
 */
531 532
bool batadv_tt_local_add(struct net_device *soft_iface, const u8 *addr,
			 unsigned short vid, int ifindex, u32 mark)
533
{
534
	struct batadv_priv *bat_priv = netdev_priv(soft_iface);
535
	struct batadv_tt_local_entry *tt_local;
536
	struct batadv_tt_global_entry *tt_global = NULL;
537
	struct batadv_softif_vlan *vlan;
538
	struct net_device *in_dev = NULL;
539
	struct hlist_head *head;
540
	struct batadv_tt_orig_list_entry *orig_entry;
541
	int hash_added, table_size, packet_size_max;
542 543
	bool ret = false;
	bool roamed_back = false;
544 545
	u8 remote_flags;
	u32 match_mark;
546

547 548 549
	if (ifindex != BATADV_NULL_IFINDEX)
		in_dev = dev_get_by_index(&init_net, ifindex);

550
	tt_local = batadv_tt_local_hash_find(bat_priv, addr, vid);
551 552 553

	if (!is_multicast_ether_addr(addr))
		tt_global = batadv_tt_global_hash_find(bat_priv, addr, vid);
554

555 556
	if (tt_local) {
		tt_local->last_seen = jiffies;
557 558
		if (tt_local->common.flags & BATADV_TT_CLIENT_PENDING) {
			batadv_dbg(BATADV_DBG_TT, bat_priv,
559 560
				   "Re-adding pending client %pM (vid: %d)\n",
				   addr, BATADV_PRINT_VID(vid));
561 562 563 564 565 566 567 568 569 570 571
			/* whatever the reason why the PENDING flag was set,
			 * this is a client which was enqueued to be removed in
			 * this orig_interval. Since it popped up again, the
			 * flag can be reset like it was never enqueued
			 */
			tt_local->common.flags &= ~BATADV_TT_CLIENT_PENDING;
			goto add_event;
		}

		if (tt_local->common.flags & BATADV_TT_CLIENT_ROAM) {
			batadv_dbg(BATADV_DBG_TT, bat_priv,
572 573
				   "Roaming client %pM (vid: %d) came back to its original location\n",
				   addr, BATADV_PRINT_VID(vid));
574 575 576 577 578 579 580 581 582
			/* the ROAM flag is set because this client roamed away
			 * and the node got a roaming_advertisement message. Now
			 * that the client popped up again at its original
			 * location such flag can be unset
			 */
			tt_local->common.flags &= ~BATADV_TT_CLIENT_ROAM;
			roamed_back = true;
		}
		goto check_roaming;
583 584
	}

585 586 587 588 589 590 591 592 593 594 595
	/* Ignore the client if we cannot send it in a full table response. */
	table_size = batadv_tt_local_table_transmit_size(bat_priv);
	table_size += batadv_tt_len(1);
	packet_size_max = atomic_read(&bat_priv->packet_size_max);
	if (table_size > packet_size_max) {
		net_ratelimited_function(batadv_info, soft_iface,
					 "Local translation table size (%i) exceeds maximum packet size (%i); Ignoring new local tt entry: %pM\n",
					 table_size, packet_size_max, addr);
		goto out;
	}

596 597
	tt_local = kmalloc(sizeof(*tt_local), GFP_ATOMIC);
	if (!tt_local)
598
		goto out;
599

600 601
	/* increase the refcounter of the related vlan */
	vlan = batadv_softif_vlan_get(bat_priv, vid);
602
	if (WARN(!vlan, "adding TT local entry %pM to non-existent VLAN %d",
603 604 605
		 addr, BATADV_PRINT_VID(vid))) {
		kfree(tt_local);
		tt_local = NULL;
606
		goto out;
607
	}
608

609
	batadv_dbg(BATADV_DBG_TT, bat_priv,
610 611
		   "Creating new local tt entry: %pM (vid: %d, ttvn: %d)\n",
		   addr, BATADV_PRINT_VID(vid),
612
		   (u8)atomic_read(&bat_priv->tt.vn));
613

614
	ether_addr_copy(tt_local->common.addr, addr);
615 616 617 618 619
	/* The local entry has to be marked as NEW to avoid to send it in
	 * a full table response going out before the next ttvn increment
	 * (consistency check)
	 */
	tt_local->common.flags = BATADV_TT_CLIENT_NEW;
620
	tt_local->common.vid = vid;
621
	if (batadv_is_wifi_netdev(in_dev))
622 623 624 625
		tt_local->common.flags |= BATADV_TT_CLIENT_WIFI;
	atomic_set(&tt_local->common.refcount, 2);
	tt_local->last_seen = jiffies;
	tt_local->common.added_at = tt_local->last_seen;
626

627 628 629 630 631
	/* the batman interface mac and multicast addresses should never be
	 * purged
	 */
	if (batadv_compare_eth(addr, soft_iface->dev_addr) ||
	    is_multicast_ether_addr(addr))
632
		tt_local->common.flags |= BATADV_TT_CLIENT_NOPURGE;
633

634
	hash_added = batadv_hash_add(bat_priv->tt.local_hash, batadv_compare_tt,
635
				     batadv_choose_tt, &tt_local->common,
636
				     &tt_local->common.hash_entry);
637 638 639

	if (unlikely(hash_added != 0)) {
		/* remove the reference for the hash */
640
		batadv_tt_local_entry_free_ref(tt_local);
641
		batadv_softif_vlan_free_ref(vlan);
642 643 644
		goto out;
	}

645
add_event:
646
	batadv_tt_local_event(bat_priv, tt_local, BATADV_NO_FLAGS);
647

648 649 650 651 652
check_roaming:
	/* Check whether it is a roaming, but don't do anything if the roaming
	 * process has already been handled
	 */
	if (tt_global && !(tt_global->common.flags & BATADV_TT_CLIENT_ROAM)) {
653
		/* These node are probably going to update their tt table */
654
		head = &tt_global->orig_list;
655
		rcu_read_lock();
656
		hlist_for_each_entry_rcu(orig_entry, head, list) {
657
			batadv_send_roam_adv(bat_priv, tt_global->common.addr,
658
					     tt_global->common.vid,
659
					     orig_entry->orig_node);
660 661
		}
		rcu_read_unlock();
662 663 664 665 666 667 668 669 670 671 672
		if (roamed_back) {
			batadv_tt_global_free(bat_priv, tt_global,
					      "Roaming canceled");
			tt_global = NULL;
		} else {
			/* The global entry has to be marked as ROAMING and
			 * has to be kept for consistency purpose
			 */
			tt_global->common.flags |= BATADV_TT_CLIENT_ROAM;
			tt_global->roam_at = jiffies;
		}
673
	}
674

675 676 677 678 679 680 681 682 683
	/* store the current remote flags before altering them. This helps
	 * understanding is flags are changing or not
	 */
	remote_flags = tt_local->common.flags & BATADV_TT_REMOTE_MASK;

	if (batadv_is_wifi_netdev(in_dev))
		tt_local->common.flags |= BATADV_TT_CLIENT_WIFI;
	else
		tt_local->common.flags &= ~BATADV_TT_CLIENT_WIFI;
684

685 686 687 688 689 690 691 692 693 694 695
	/* check the mark in the skb: if it's equal to the configured
	 * isolation_mark, it means the packet is coming from an isolated
	 * non-mesh client
	 */
	match_mark = (mark & bat_priv->isolation_mark_mask);
	if (bat_priv->isolation_mark_mask &&
	    match_mark == bat_priv->isolation_mark)
		tt_local->common.flags |= BATADV_TT_CLIENT_ISOLA;
	else
		tt_local->common.flags &= ~BATADV_TT_CLIENT_ISOLA;

696 697 698 699 700 701 702
	/* if any "dynamic" flag has been modified, resend an ADD event for this
	 * entry so that all the nodes can get the new flags
	 */
	if (remote_flags ^ (tt_local->common.flags & BATADV_TT_REMOTE_MASK))
		batadv_tt_local_event(bat_priv, tt_local, BATADV_NO_FLAGS);

	ret = true;
703
out:
704 705
	if (in_dev)
		dev_put(in_dev);
706 707 708 709
	if (tt_local)
		batadv_tt_local_entry_free_ref(tt_local);
	if (tt_global)
		batadv_tt_global_entry_free_ref(tt_global);
710
	return ret;
711 712
}

713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730
/**
 * batadv_tt_prepare_tvlv_global_data - prepare the TVLV TT header to send
 *  within a TT Response directed to another node
 * @orig_node: originator for which the TT data has to be prepared
 * @tt_data: uninitialised pointer to the address of the TVLV buffer
 * @tt_change: uninitialised pointer to the address of the area where the TT
 *  changed can be stored
 * @tt_len: pointer to the length to reserve to the tt_change. if -1 this
 *  function reserves the amount of space needed to send the entire global TT
 *  table. In case of success the value is updated with the real amount of
 *  reserved bytes

 * Allocate the needed amount of memory for the entire TT TVLV and write its
 * header made up by one tvlv_tt_data object and a series of tvlv_tt_vlan_data
 * objects, one per active VLAN served by the originator node.
 *
 * Return the size of the allocated buffer or 0 in case of failure.
 */
731
static u16
732 733 734
batadv_tt_prepare_tvlv_global_data(struct batadv_orig_node *orig_node,
				   struct batadv_tvlv_tt_data **tt_data,
				   struct batadv_tvlv_tt_change **tt_change,
735
				   s32 *tt_len)
736
{
737 738 739 740
	u16 num_vlan = 0;
	u16 num_entries = 0;
	u16 change_offset;
	u16 tvlv_len;
741 742
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
	struct batadv_orig_node_vlan *vlan;
743
	u8 *tt_change_ptr;
744 745

	rcu_read_lock();
746
	hlist_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) {
747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771
		num_vlan++;
		num_entries += atomic_read(&vlan->tt.num_entries);
	}

	change_offset = sizeof(**tt_data);
	change_offset += num_vlan * sizeof(*tt_vlan);

	/* if tt_len is negative, allocate the space needed by the full table */
	if (*tt_len < 0)
		*tt_len = batadv_tt_len(num_entries);

	tvlv_len = *tt_len;
	tvlv_len += change_offset;

	*tt_data = kmalloc(tvlv_len, GFP_ATOMIC);
	if (!*tt_data) {
		*tt_len = 0;
		goto out;
	}

	(*tt_data)->flags = BATADV_NO_FLAGS;
	(*tt_data)->ttvn = atomic_read(&orig_node->last_ttvn);
	(*tt_data)->num_vlan = htons(num_vlan);

	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(*tt_data + 1);
772
	hlist_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) {
773 774 775 776 777 778
		tt_vlan->vid = htons(vlan->vid);
		tt_vlan->crc = htonl(vlan->tt.crc);

		tt_vlan++;
	}

779
	tt_change_ptr = (u8 *)*tt_data + change_offset;
780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804
	*tt_change = (struct batadv_tvlv_tt_change *)tt_change_ptr;

out:
	rcu_read_unlock();
	return tvlv_len;
}

/**
 * batadv_tt_prepare_tvlv_local_data - allocate and prepare the TT TVLV for this
 *  node
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: uninitialised pointer to the address of the TVLV buffer
 * @tt_change: uninitialised pointer to the address of the area where the TT
 *  changes can be stored
 * @tt_len: pointer to the length to reserve to the tt_change. if -1 this
 *  function reserves the amount of space needed to send the entire local TT
 *  table. In case of success the value is updated with the real amount of
 *  reserved bytes
 *
 * Allocate the needed amount of memory for the entire TT TVLV and write its
 * header made up by one tvlv_tt_data object and a series of tvlv_tt_vlan_data
 * objects, one per active VLAN.
 *
 * Return the size of the allocated buffer or 0 in case of failure.
 */
805
static u16
806 807 808
batadv_tt_prepare_tvlv_local_data(struct batadv_priv *bat_priv,
				  struct batadv_tvlv_tt_data **tt_data,
				  struct batadv_tvlv_tt_change **tt_change,
809
				  s32 *tt_len)
810 811 812
{
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
	struct batadv_softif_vlan *vlan;
813 814 815
	u16 num_vlan = 0;
	u16 num_entries = 0;
	u16 tvlv_len;
816
	u8 *tt_change_ptr;
817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852
	int change_offset;

	rcu_read_lock();
	hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
		num_vlan++;
		num_entries += atomic_read(&vlan->tt.num_entries);
	}

	change_offset = sizeof(**tt_data);
	change_offset += num_vlan * sizeof(*tt_vlan);

	/* if tt_len is negative, allocate the space needed by the full table */
	if (*tt_len < 0)
		*tt_len = batadv_tt_len(num_entries);

	tvlv_len = *tt_len;
	tvlv_len += change_offset;

	*tt_data = kmalloc(tvlv_len, GFP_ATOMIC);
	if (!*tt_data) {
		tvlv_len = 0;
		goto out;
	}

	(*tt_data)->flags = BATADV_NO_FLAGS;
	(*tt_data)->ttvn = atomic_read(&bat_priv->tt.vn);
	(*tt_data)->num_vlan = htons(num_vlan);

	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(*tt_data + 1);
	hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
		tt_vlan->vid = htons(vlan->vid);
		tt_vlan->crc = htonl(vlan->tt.crc);

		tt_vlan++;
	}

853
	tt_change_ptr = (u8 *)*tt_data + change_offset;
854 855 856 857 858 859 860
	*tt_change = (struct batadv_tvlv_tt_change *)tt_change_ptr;

out:
	rcu_read_unlock();
	return tvlv_len;
}

861 862 863 864 865 866
/**
 * batadv_tt_tvlv_container_update - update the translation table tvlv container
 *  after local tt changes have been committed
 * @bat_priv: the bat priv with all the soft interface information
 */
static void batadv_tt_tvlv_container_update(struct batadv_priv *bat_priv)
867
{
868 869 870
	struct batadv_tt_change_node *entry, *safe;
	struct batadv_tvlv_tt_data *tt_data;
	struct batadv_tvlv_tt_change *tt_change;
871
	int tt_diff_len, tt_change_len = 0;
872 873
	int tt_diff_entries_num = 0;
	int tt_diff_entries_count = 0;
874
	u16 tvlv_len;
875

876 877
	tt_diff_entries_num = atomic_read(&bat_priv->tt.local_changes);
	tt_diff_len = batadv_tt_len(tt_diff_entries_num);
878 879 880 881

	/* if we have too many changes for one packet don't send any
	 * and wait for the tt table request which will be fragmented
	 */
882 883
	if (tt_diff_len > bat_priv->soft_iface->mtu)
		tt_diff_len = 0;
884

885 886 887
	tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv, &tt_data,
						     &tt_change, &tt_diff_len);
	if (!tvlv_len)
888
		return;
889

890
	tt_data->flags = BATADV_TT_OGM_DIFF;
891

892 893
	if (tt_diff_len == 0)
		goto container_register;
894

895 896
	spin_lock_bh(&bat_priv->tt.changes_list_lock);
	atomic_set(&bat_priv->tt.local_changes, 0);
897

898
	list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
899
				 list) {
900 901 902 903 904
		if (tt_diff_entries_count < tt_diff_entries_num) {
			memcpy(tt_change + tt_diff_entries_count,
			       &entry->change,
			       sizeof(struct batadv_tvlv_tt_change));
			tt_diff_entries_count++;
905
		}
906 907
		list_del(&entry->list);
		kfree(entry);
908
	}
909
	spin_unlock_bh(&bat_priv->tt.changes_list_lock);
910 911

	/* Keep the buffer for possible tt_request */
912 913 914 915
	spin_lock_bh(&bat_priv->tt.last_changeset_lock);
	kfree(bat_priv->tt.last_changeset);
	bat_priv->tt.last_changeset_len = 0;
	bat_priv->tt.last_changeset = NULL;
916
	tt_change_len = batadv_tt_len(tt_diff_entries_count);
917
	/* check whether this new OGM has no changes due to size problems */
918
	if (tt_diff_entries_count > 0) {
919
		/* if kmalloc() fails we will reply with the full table
920 921
		 * instead of providing the diff
		 */
922
		bat_priv->tt.last_changeset = kzalloc(tt_diff_len, GFP_ATOMIC);
923
		if (bat_priv->tt.last_changeset) {
924 925 926
			memcpy(bat_priv->tt.last_changeset,
			       tt_change, tt_change_len);
			bat_priv->tt.last_changeset_len = tt_diff_len;
927 928
		}
	}
929
	spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
930

931 932
container_register:
	batadv_tvlv_container_register(bat_priv, BATADV_TVLV_TT, 1, tt_data,
933
				       tvlv_len);
934
	kfree(tt_data);
935 936
}

937
int batadv_tt_local_seq_print_text(struct seq_file *seq, void *offset)
938 939
{
	struct net_device *net_dev = (struct net_device *)seq->private;
940
	struct batadv_priv *bat_priv = netdev_priv(net_dev);
941
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
942
	struct batadv_tt_common_entry *tt_common_entry;
943
	struct batadv_tt_local_entry *tt_local;
944
	struct batadv_hard_iface *primary_if;
945
	struct batadv_softif_vlan *vlan;
946
	struct hlist_head *head;
947
	unsigned short vid;
948
	u32 i;
949 950 951 952
	int last_seen_secs;
	int last_seen_msecs;
	unsigned long last_seen_jiffies;
	bool no_purge;
953
	u16 np_flag = BATADV_TT_CLIENT_NOPURGE;
954

955 956
	primary_if = batadv_seq_print_text_primary_if_get(seq);
	if (!primary_if)
957
		goto out;
958

959
	seq_printf(seq,
960
		   "Locally retrieved addresses (from %s) announced via TT (TTVN: %u):\n",
961
		   net_dev->name, (u8)atomic_read(&bat_priv->tt.vn));
962
	seq_printf(seq, "       %-13s  %s %-8s %-9s (%-10s)\n", "Client", "VID",
963
		   "Flags", "Last seen", "CRC");
964 965 966 967

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

968
		rcu_read_lock();
969
		hlist_for_each_entry_rcu(tt_common_entry,
970
					 head, hash_entry) {
971 972 973
			tt_local = container_of(tt_common_entry,
						struct batadv_tt_local_entry,
						common);
974
			vid = tt_common_entry->vid;
975 976 977 978 979 980 981
			last_seen_jiffies = jiffies - tt_local->last_seen;
			last_seen_msecs = jiffies_to_msecs(last_seen_jiffies);
			last_seen_secs = last_seen_msecs / 1000;
			last_seen_msecs = last_seen_msecs % 1000;

			no_purge = tt_common_entry->flags & np_flag;

982 983 984 985 986 987 988 989
			vlan = batadv_softif_vlan_get(bat_priv, vid);
			if (!vlan) {
				seq_printf(seq, "Cannot retrieve VLAN %d\n",
					   BATADV_PRINT_VID(vid));
				continue;
			}

			seq_printf(seq,
990
				   " * %pM %4i [%c%c%c%c%c%c] %3u.%03u   (%#.8x)\n",
991
				   tt_common_entry->addr,
992
				   BATADV_PRINT_VID(tt_common_entry->vid),
993 994
				   ((tt_common_entry->flags &
				     BATADV_TT_CLIENT_ROAM) ? 'R' : '.'),
995
				   no_purge ? 'P' : '.',
996 997 998 999 1000 1001 1002 1003
				   ((tt_common_entry->flags &
				     BATADV_TT_CLIENT_NEW) ? 'N' : '.'),
				   ((tt_common_entry->flags &
				     BATADV_TT_CLIENT_PENDING) ? 'X' : '.'),
				   ((tt_common_entry->flags &
				     BATADV_TT_CLIENT_WIFI) ? 'W' : '.'),
				   ((tt_common_entry->flags &
				     BATADV_TT_CLIENT_ISOLA) ? 'I' : '.'),
1004
				   no_purge ? 0 : last_seen_secs,
1005 1006 1007 1008
				   no_purge ? 0 : last_seen_msecs,
				   vlan->tt.crc);

			batadv_softif_vlan_free_ref(vlan);
1009
		}
1010
		rcu_read_unlock();
1011
	}
1012 1013
out:
	if (primary_if)
1014
		batadv_hardif_free_ref(primary_if);
1015
	return 0;
1016 1017
}

1018 1019 1020
static void
batadv_tt_local_set_pending(struct batadv_priv *bat_priv,
			    struct batadv_tt_local_entry *tt_local_entry,
1021
			    u16 flags, const char *message)
1022
{
1023
	batadv_tt_local_event(bat_priv, tt_local_entry, flags);
1024

1025 1026
	/* The local client has to be marked as "pending to be removed" but has
	 * to be kept in the table in order to send it in a full table
1027 1028
	 * response issued before the net ttvn increment (consistency check)
	 */
1029
	tt_local_entry->common.flags |= BATADV_TT_CLIENT_PENDING;
1030

1031
	batadv_dbg(BATADV_DBG_TT, bat_priv,
1032 1033 1034
		   "Local tt entry (%pM, vid: %d) pending to be removed: %s\n",
		   tt_local_entry->common.addr,
		   BATADV_PRINT_VID(tt_local_entry->common.vid), message);
1035 1036
}

1037 1038 1039 1040
/**
 * batadv_tt_local_remove - logically remove an entry from the local table
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the MAC address of the client to remove
1041
 * @vid: VLAN identifier
1042 1043 1044 1045 1046
 * @message: message to append to the log on deletion
 * @roaming: true if the deletion is due to a roaming event
 *
 * Returns the flags assigned to the local entry before being deleted
 */
1047 1048 1049
u16 batadv_tt_local_remove(struct batadv_priv *bat_priv, const u8 *addr,
			   unsigned short vid, const char *message,
			   bool roaming)
1050
{
1051
	struct batadv_tt_local_entry *tt_local_entry;
1052
	u16 flags, curr_flags = BATADV_NO_FLAGS;
1053
	struct batadv_softif_vlan *vlan;
1054
	void *tt_entry_exists;
1055

1056
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
1057 1058 1059
	if (!tt_local_entry)
		goto out;

1060 1061
	curr_flags = tt_local_entry->common.flags;

1062
	flags = BATADV_TT_CLIENT_DEL;
1063 1064 1065 1066
	/* if this global entry addition is due to a roaming, the node has to
	 * mark the local entry as "roamed" in order to correctly reroute
	 * packets later
	 */
1067
	if (roaming) {
1068
		flags |= BATADV_TT_CLIENT_ROAM;
1069 1070 1071
		/* mark the local client as ROAMed */
		tt_local_entry->common.flags |= BATADV_TT_CLIENT_ROAM;
	}
1072

1073 1074 1075 1076 1077 1078 1079 1080
	if (!(tt_local_entry->common.flags & BATADV_TT_CLIENT_NEW)) {
		batadv_tt_local_set_pending(bat_priv, tt_local_entry, flags,
					    message);
		goto out;
	}
	/* if this client has been added right now, it is possible to
	 * immediately purge it
	 */
1081
	batadv_tt_local_event(bat_priv, tt_local_entry, BATADV_TT_CLIENT_DEL);
1082 1083 1084 1085 1086 1087 1088 1089 1090

	tt_entry_exists = batadv_hash_remove(bat_priv->tt.local_hash,
					     batadv_compare_tt,
					     batadv_choose_tt,
					     &tt_local_entry->common);
	if (!tt_entry_exists)
		goto out;

	/* extra call to free the local tt entry */
1091
	batadv_tt_local_entry_free_ref(tt_local_entry);
1092

1093 1094
	/* decrease the reference held for this vlan */
	vlan = batadv_softif_vlan_get(bat_priv, vid);
1095 1096 1097
	if (!vlan)
		goto out;

1098 1099 1100
	batadv_softif_vlan_free_ref(vlan);
	batadv_softif_vlan_free_ref(vlan);

1101 1102
out:
	if (tt_local_entry)
1103
		batadv_tt_local_entry_free_ref(tt_local_entry);
1104 1105

	return curr_flags;
1106 1107
}

1108 1109 1110 1111 1112 1113 1114
/**
 * batadv_tt_local_purge_list - purge inactive tt local entries
 * @bat_priv: the bat priv with all the soft interface information
 * @head: pointer to the list containing the local tt entries
 * @timeout: parameter deciding whether a given tt local entry is considered
 *  inactive or not
 */
1115
static void batadv_tt_local_purge_list(struct batadv_priv *bat_priv,
1116 1117
				       struct hlist_head *head,
				       int timeout)
1118
{
1119 1120
	struct batadv_tt_local_entry *tt_local_entry;
	struct batadv_tt_common_entry *tt_common_entry;
1121
	struct hlist_node *node_tmp;
1122

1123
	hlist_for_each_entry_safe(tt_common_entry, node_tmp, head,
1124 1125
				  hash_entry) {
		tt_local_entry = container_of(tt_common_entry,
1126 1127
					      struct batadv_tt_local_entry,
					      common);
1128 1129 1130 1131 1132 1133 1134
		if (tt_local_entry->common.flags & BATADV_TT_CLIENT_NOPURGE)
			continue;

		/* entry already marked for deletion */
		if (tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING)
			continue;

1135
		if (!batadv_has_timed_out(tt_local_entry->last_seen, timeout))
1136 1137 1138 1139 1140 1141 1142
			continue;

		batadv_tt_local_set_pending(bat_priv, tt_local_entry,
					    BATADV_TT_CLIENT_DEL, "timed out");
	}
}

1143 1144 1145 1146 1147 1148 1149 1150
/**
 * batadv_tt_local_purge - purge inactive tt local entries
 * @bat_priv: the bat priv with all the soft interface information
 * @timeout: parameter deciding whether a given tt local entry is considered
 *  inactive or not
 */
static void batadv_tt_local_purge(struct batadv_priv *bat_priv,
				  int timeout)
1151
{
1152
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
1153
	struct hlist_head *head;
1154
	spinlock_t *list_lock; /* protects write access to the hash lists */
1155
	u32 i;
1156 1157 1158

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
1159
		list_lock = &hash->list_locks[i];
1160

1161
		spin_lock_bh(list_lock);
1162
		batadv_tt_local_purge_list(bat_priv, head, timeout);
1163
		spin_unlock_bh(list_lock);
1164 1165 1166
	}
}

1167
static void batadv_tt_local_table_free(struct batadv_priv *bat_priv)
1168
{
1169
	struct batadv_hashtable *hash;
1170
	spinlock_t *list_lock; /* protects write access to the hash lists */
1171 1172
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_local_entry *tt_local;
1173
	struct batadv_softif_vlan *vlan;
1174
	struct hlist_node *node_tmp;
1175
	struct hlist_head *head;
1176
	u32 i;
1177

1178
	if (!bat_priv->tt.local_hash)
1179 1180
		return;

1181
	hash = bat_priv->tt.local_hash;
1182 1183 1184 1185 1186 1187

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
		list_lock = &hash->list_locks[i];

		spin_lock_bh(list_lock);
1188
		hlist_for_each_entry_safe(tt_common_entry, node_tmp,
1189
					  head, hash_entry) {
1190
			hlist_del_rcu(&tt_common_entry->hash_entry);
1191 1192 1193
			tt_local = container_of(tt_common_entry,
						struct batadv_tt_local_entry,
						common);
1194 1195 1196 1197

			/* decrease the reference held for this vlan */
			vlan = batadv_softif_vlan_get(bat_priv,
						      tt_common_entry->vid);
1198 1199 1200 1201
			if (vlan) {
				batadv_softif_vlan_free_ref(vlan);
				batadv_softif_vlan_free_ref(vlan);
			}
1202

1203
			batadv_tt_local_entry_free_ref(tt_local);
1204 1205 1206 1207
		}
		spin_unlock_bh(list_lock);
	}

1208
	batadv_hash_destroy(hash);
1209

1210
	bat_priv->tt.local_hash = NULL;
1211 1212
}

1213
static int batadv_tt_global_init(struct batadv_priv *bat_priv)
1214
{
1215
	if (bat_priv->tt.global_hash)
1216
		return 0;
1217

1218
	bat_priv->tt.global_hash = batadv_hash_new(1024);
1219

1220
	if (!bat_priv->tt.global_hash)
1221
		return -ENOMEM;
1222

1223 1224 1225
	batadv_hash_set_lock_class(bat_priv->tt.global_hash,
				   &batadv_tt_global_hash_lock_class_key);

1226
	return 0;
1227 1228
}

1229
static void batadv_tt_changes_list_free(struct batadv_priv *bat_priv)
1230
{
1231
	struct batadv_tt_change_node *entry, *safe;
1232

1233
	spin_lock_bh(&bat_priv->tt.changes_list_lock);
1234

1235
	list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
1236 1237 1238 1239
				 list) {
		list_del(&entry->list);
		kfree(entry);
	}
1240

1241 1242
	atomic_set(&bat_priv->tt.local_changes, 0);
	spin_unlock_bh(&bat_priv->tt.changes_list_lock);
1243
}
1244

1245 1246 1247 1248
/* retrieves the orig_tt_list_entry belonging to orig_node from the
 * batadv_tt_global_entry list
 *
 * returns it with an increased refcounter, NULL if not found
1249
 */
1250 1251 1252
static struct batadv_tt_orig_list_entry *
batadv_tt_global_orig_entry_find(const struct batadv_tt_global_entry *entry,
				 const struct batadv_orig_node *orig_node)
1253
{
1254
	struct batadv_tt_orig_list_entry *tmp_orig_entry, *orig_entry = NULL;
1255 1256 1257 1258
	const struct hlist_head *head;

	rcu_read_lock();
	head = &entry->orig_list;
1259
	hlist_for_each_entry_rcu(tmp_orig_entry, head, list) {
1260 1261 1262 1263 1264 1265 1266
		if (tmp_orig_entry->orig_node != orig_node)
			continue;
		if (!atomic_inc_not_zero(&tmp_orig_entry->refcount))
			continue;

		orig_entry = tmp_orig_entry;
		break;
1267 1268
	}
	rcu_read_unlock();
1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288

	return orig_entry;
}

/* find out if an orig_node is already in the list of a tt_global_entry.
 * returns true if found, false otherwise
 */
static bool
batadv_tt_global_entry_has_orig(const struct batadv_tt_global_entry *entry,
				const struct batadv_orig_node *orig_node)
{
	struct batadv_tt_orig_list_entry *orig_entry;
	bool found = false;

	orig_entry = batadv_tt_global_orig_entry_find(entry, orig_node);
	if (orig_entry) {
		found = true;
		batadv_tt_orig_list_entry_free_ref(orig_entry);
	}

1289 1290 1291
	return found;
}

1292
static void
1293
batadv_tt_global_orig_entry_add(struct batadv_tt_global_entry *tt_global,
1294
				struct batadv_orig_node *orig_node, int ttvn)
1295
{
1296
	struct batadv_tt_orig_list_entry *orig_entry;
1297

1298
	orig_entry = batadv_tt_global_orig_entry_find(tt_global, orig_node);
1299 1300 1301 1302 1303
	if (orig_entry) {
		/* refresh the ttvn: the current value could be a bogus one that
		 * was added during a "temporary client detection"
		 */
		orig_entry->ttvn = ttvn;
1304
		goto out;
1305
	}
1306

1307 1308
	orig_entry = kzalloc(sizeof(*orig_entry), GFP_ATOMIC);
	if (!orig_entry)
1309
		goto out;
1310 1311 1312

	INIT_HLIST_NODE(&orig_entry->list);
	atomic_inc(&orig_node->refcount);
1313
	batadv_tt_global_size_inc(orig_node, tt_global->common.vid);
1314 1315
	orig_entry->orig_node = orig_node;
	orig_entry->ttvn = ttvn;
1316
	atomic_set(&orig_entry->refcount, 2);
1317

1318
	spin_lock_bh(&tt_global->list_lock);
1319
	hlist_add_head_rcu(&orig_entry->list,
1320 1321
			   &tt_global->orig_list);
	spin_unlock_bh(&tt_global->list_lock);
1322 1323
	atomic_inc(&tt_global->orig_list_count);

1324 1325 1326
out:
	if (orig_entry)
		batadv_tt_orig_list_entry_free_ref(orig_entry);
1327 1328
}

1329 1330 1331 1332 1333
/**
 * batadv_tt_global_add - add a new TT global entry or update an existing one
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: the originator announcing the client
 * @tt_addr: the mac address of the non-mesh client
1334
 * @vid: VLAN identifier
1335 1336 1337 1338 1339 1340 1341 1342 1343 1344
 * @flags: TT flags that have to be set for this non-mesh client
 * @ttvn: the tt version number ever announcing this non-mesh client
 *
 * Add a new TT global entry for the given originator. If the entry already
 * exists add a new reference to the given originator (a global entry can have
 * references to multiple originators) and adjust the flags attribute to reflect
 * the function argument.
 * If a TT local entry exists for this non-mesh client remove it.
 *
 * The caller must hold orig_node refcount.
1345 1346
 *
 * Return true if the new entry has been added, false otherwise
1347
 */
1348 1349
static bool batadv_tt_global_add(struct batadv_priv *bat_priv,
				 struct batadv_orig_node *orig_node,
1350
				 const unsigned char *tt_addr,
1351
				 unsigned short vid, u16 flags, u8 ttvn)
1352
{
1353 1354
	struct batadv_tt_global_entry *tt_global_entry;
	struct batadv_tt_local_entry *tt_local_entry;
1355
	bool ret = false;
1356
	int hash_added;
1357
	struct batadv_tt_common_entry *common;
1358
	u16 local_flags;
1359

1360 1361 1362 1363
	/* ignore global entries from backbone nodes */
	if (batadv_bla_is_backbone_gw_orig(bat_priv, orig_node->orig, vid))
		return true;

1364 1365
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, tt_addr, vid);
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, tt_addr, vid);
1366 1367 1368 1369 1370 1371 1372 1373

	/* if the node already has a local client for this entry, it has to wait
	 * for a roaming advertisement instead of manually messing up the global
	 * table
	 */
	if ((flags & BATADV_TT_CLIENT_TEMP) && tt_local_entry &&
	    !(tt_local_entry->common.flags & BATADV_TT_CLIENT_NEW))
		goto out;
1374 1375

	if (!tt_global_entry) {
1376
		tt_global_entry = kzalloc(sizeof(*tt_global_entry), GFP_ATOMIC);
1377
		if (!tt_global_entry)
1378 1379
			goto out;

1380
		common = &tt_global_entry->common;
1381
		ether_addr_copy(common->addr, tt_addr);
1382
		common->vid = vid;
1383

1384
		common->flags = flags;
1385
		tt_global_entry->roam_at = 0;
1386 1387 1388 1389 1390 1391
		/* node must store current time in case of roaming. This is
		 * needed to purge this entry out on timeout (if nobody claims
		 * it)
		 */
		if (flags & BATADV_TT_CLIENT_ROAM)
			tt_global_entry->roam_at = jiffies;
1392
		atomic_set(&common->refcount, 2);
1393
		common->added_at = jiffies;
1394 1395

		INIT_HLIST_HEAD(&tt_global_entry->orig_list);
1396
		atomic_set(&tt_global_entry->orig_list_count, 0);
1397
		spin_lock_init(&tt_global_entry->list_lock);
1398

1399
		hash_added = batadv_hash_add(bat_priv->tt.global_hash,
1400
					     batadv_compare_tt,
1401
					     batadv_choose_tt, common,
1402
					     &common->hash_entry);
1403 1404 1405

		if (unlikely(hash_added != 0)) {
			/* remove the reference for the hash */
1406
			batadv_tt_global_entry_free_ref(tt_global_entry);
1407 1408
			goto out_remove;
		}
1409
	} else {
1410
		common = &tt_global_entry->common;
1411 1412
		/* If there is already a global entry, we can use this one for
		 * our processing.
1413 1414 1415 1416 1417 1418 1419
		 * But if we are trying to add a temporary client then here are
		 * two options at this point:
		 * 1) the global client is not a temporary client: the global
		 *    client has to be left as it is, temporary information
		 *    should never override any already known client state
		 * 2) the global client is a temporary client: purge the
		 *    originator list and add the new one orig_entry
1420
		 */
1421 1422 1423 1424 1425 1426 1427 1428 1429
		if (flags & BATADV_TT_CLIENT_TEMP) {
			if (!(common->flags & BATADV_TT_CLIENT_TEMP))
				goto out;
			if (batadv_tt_global_entry_has_orig(tt_global_entry,
							    orig_node))
				goto out_remove;
			batadv_tt_global_del_orig_list(tt_global_entry);
			goto add_orig_entry;
		}
1430 1431

		/* if the client was temporary added before receiving the first
1432 1433 1434 1435
		 * OGM announcing it, we have to clear the TEMP flag. Also,
		 * remove the previous temporary orig node and re-add it
		 * if required. If the orig entry changed, the new one which
		 * is a non-temporary entry is preferred.
1436
		 */
1437 1438 1439 1440
		if (common->flags & BATADV_TT_CLIENT_TEMP) {
			batadv_tt_global_del_orig_list(tt_global_entry);
			common->flags &= ~BATADV_TT_CLIENT_TEMP;
		}
1441

1442 1443 1444 1445
		/* the change can carry possible "attribute" flags like the
		 * TT_CLIENT_WIFI, therefore they have to be copied in the
		 * client entry
		 */
1446
		common->flags |= flags;
1447

1448 1449
		/* If there is the BATADV_TT_CLIENT_ROAM flag set, there is only
		 * one originator left in the list and we previously received a
1450 1451 1452 1453 1454
		 * delete + roaming change for this originator.
		 *
		 * We should first delete the old originator before adding the
		 * new one.
		 */
1455
		if (common->flags & BATADV_TT_CLIENT_ROAM) {
1456
			batadv_tt_global_del_orig_list(tt_global_entry);
1457
			common->flags &= ~BATADV_TT_CLIENT_ROAM;
1458
			tt_global_entry->roam_at = 0;
1459 1460
		}
	}
1461
add_orig_entry:
1462
	/* add the new orig_entry (if needed) or update it */
1463
	batadv_tt_global_orig_entry_add(tt_global_entry, orig_node, ttvn);
1464

1465
	batadv_dbg(BATADV_DBG_TT, bat_priv,
1466 1467 1468
		   "Creating new global tt entry: %pM (vid: %d, via %pM)\n",
		   common->addr, BATADV_PRINT_VID(common->vid),
		   orig_node->orig);
1469
	ret = true;
1470

1471
out_remove:
1472 1473 1474 1475 1476
	/* Do not remove multicast addresses from the local hash on
	 * global additions
	 */
	if (is_multicast_ether_addr(tt_addr))
		goto out;
1477

1478
	/* remove address from local hash if present */
1479
	local_flags = batadv_tt_local_remove(bat_priv, tt_addr, vid,
1480
					     "global tt received",
1481
					     flags & BATADV_TT_CLIENT_ROAM);
1482 1483
	tt_global_entry->common.flags |= local_flags & BATADV_TT_CLIENT_WIFI;

1484 1485 1486 1487 1488 1489
	if (!(flags & BATADV_TT_CLIENT_ROAM))
		/* this is a normal global add. Therefore the client is not in a
		 * roaming state anymore.
		 */
		tt_global_entry->common.flags &= ~BATADV_TT_CLIENT_ROAM;

1490 1491
out:
	if (tt_global_entry)
1492
		batadv_tt_global_entry_free_ref(tt_global_entry);
1493 1494
	if (tt_local_entry)
		batadv_tt_local_entry_free_ref(tt_local_entry);
1495
	return ret;
1496 1497
}

1498 1499
/**
 * batadv_transtable_best_orig - Get best originator list entry from tt entry
1500
 * @bat_priv: the bat priv with all the soft interface information
1501 1502 1503 1504 1505 1506
 * @tt_global_entry: global translation table entry to be analyzed
 *
 * This functon assumes the caller holds rcu_read_lock().
 * Returns best originator list entry or NULL on errors.
 */
static struct batadv_tt_orig_list_entry *
1507 1508
batadv_transtable_best_orig(struct batadv_priv *bat_priv,
			    struct batadv_tt_global_entry *tt_global_entry)
1509
{
1510 1511
	struct batadv_neigh_node *router, *best_router = NULL;
	struct batadv_algo_ops *bao = bat_priv->bat_algo_ops;
1512 1513 1514 1515
	struct hlist_head *head;
	struct batadv_tt_orig_list_entry *orig_entry, *best_entry = NULL;

	head = &tt_global_entry->orig_list;
1516
	hlist_for_each_entry_rcu(orig_entry, head, list) {
1517 1518
		router = batadv_orig_router_get(orig_entry->orig_node,
						BATADV_IF_DEFAULT);
1519 1520 1521
		if (!router)
			continue;

1522
		if (best_router &&
1523 1524
		    bao->bat_neigh_cmp(router, BATADV_IF_DEFAULT,
				       best_router, BATADV_IF_DEFAULT) <= 0) {
1525 1526
			batadv_neigh_node_free_ref(router);
			continue;
1527 1528
		}

1529 1530 1531 1532 1533 1534
		/* release the refcount for the "old" best */
		if (best_router)
			batadv_neigh_node_free_ref(best_router);

		best_entry = orig_entry;
		best_router = router;
1535 1536
	}

1537 1538 1539
	if (best_router)
		batadv_neigh_node_free_ref(best_router);

1540 1541 1542
	return best_entry;
}

1543 1544 1545
/**
 * batadv_tt_global_print_entry - print all orig nodes who announce the address
 *  for this global entry
1546
 * @bat_priv: the bat priv with all the soft interface information
1547 1548 1549 1550
 * @tt_global_entry: global translation table entry to be printed
 * @seq: debugfs table seq_file struct
 *
 * This functon assumes the caller holds rcu_read_lock().
1551
 */
1552
static void
1553 1554
batadv_tt_global_print_entry(struct batadv_priv *bat_priv,
			     struct batadv_tt_global_entry *tt_global_entry,
1555
			     struct seq_file *seq)
1556
{
1557
	struct batadv_tt_orig_list_entry *orig_entry, *best_entry;
1558
	struct batadv_tt_common_entry *tt_common_entry;
1559 1560
	struct batadv_orig_node_vlan *vlan;
	struct hlist_head *head;
1561 1562
	u8 last_ttvn;
	u16 flags;
1563 1564

	tt_common_entry = &tt_global_entry->common;
1565 1566
	flags = tt_common_entry->flags;

1567
	best_entry = batadv_transtable_best_orig(bat_priv, tt_global_entry);
1568
	if (best_entry) {
1569 1570 1571 1572 1573 1574 1575 1576 1577 1578
		vlan = batadv_orig_node_vlan_get(best_entry->orig_node,
						 tt_common_entry->vid);
		if (!vlan) {
			seq_printf(seq,
				   " * Cannot retrieve VLAN %d for originator %pM\n",
				   BATADV_PRINT_VID(tt_common_entry->vid),
				   best_entry->orig_node->orig);
			goto print_list;
		}

1579
		last_ttvn = atomic_read(&best_entry->orig_node->last_ttvn);
1580
		seq_printf(seq,
1581
			   " %c %pM %4i   (%3u) via %pM     (%3u)   (%#.8x) [%c%c%c%c]\n",
1582
			   '*', tt_global_entry->common.addr,
1583
			   BATADV_PRINT_VID(tt_global_entry->common.vid),
1584
			   best_entry->ttvn, best_entry->orig_node->orig,
1585
			   last_ttvn, vlan->tt.crc,
1586 1587 1588 1589
			   ((flags & BATADV_TT_CLIENT_ROAM) ? 'R' : '.'),
			   ((flags & BATADV_TT_CLIENT_WIFI) ? 'W' : '.'),
			   ((flags & BATADV_TT_CLIENT_ISOLA) ? 'I' : '.'),
			   ((flags & BATADV_TT_CLIENT_TEMP) ? 'T' : '.'));
1590 1591

		batadv_orig_node_vlan_free_ref(vlan);
1592
	}
1593

1594
print_list:
1595 1596
	head = &tt_global_entry->orig_list;

1597
	hlist_for_each_entry_rcu(orig_entry, head, list) {
1598 1599 1600
		if (best_entry == orig_entry)
			continue;

1601 1602 1603 1604 1605 1606 1607 1608 1609 1610
		vlan = batadv_orig_node_vlan_get(orig_entry->orig_node,
						 tt_common_entry->vid);
		if (!vlan) {
			seq_printf(seq,
				   " + Cannot retrieve VLAN %d for originator %pM\n",
				   BATADV_PRINT_VID(tt_common_entry->vid),
				   orig_entry->orig_node->orig);
			continue;
		}

1611
		last_ttvn = atomic_read(&orig_entry->orig_node->last_ttvn);
1612
		seq_printf(seq,
1613
			   " %c %pM %4d   (%3u) via %pM     (%3u)   (%#.8x) [%c%c%c%c]\n",
1614
			   '+', tt_global_entry->common.addr,
1615
			   BATADV_PRINT_VID(tt_global_entry->common.vid),
1616
			   orig_entry->ttvn, orig_entry->orig_node->orig,
1617
			   last_ttvn, vlan->tt.crc,
1618 1619 1620 1621
			   ((flags & BATADV_TT_CLIENT_ROAM) ? 'R' : '.'),
			   ((flags & BATADV_TT_CLIENT_WIFI) ? 'W' : '.'),
			   ((flags & BATADV_TT_CLIENT_ISOLA) ? 'I' : '.'),
			   ((flags & BATADV_TT_CLIENT_TEMP) ? 'T' : '.'));
1622 1623

		batadv_orig_node_vlan_free_ref(vlan);
1624 1625 1626
	}
}

1627
int batadv_tt_global_seq_print_text(struct seq_file *seq, void *offset)
1628 1629
{
	struct net_device *net_dev = (struct net_device *)seq->private;
1630
	struct batadv_priv *bat_priv = netdev_priv(net_dev);
1631
	struct batadv_hashtable *hash = bat_priv->tt.global_hash;
1632 1633 1634
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_global_entry *tt_global;
	struct batadv_hard_iface *primary_if;
1635
	struct hlist_head *head;
1636
	u32 i;
1637

1638 1639
	primary_if = batadv_seq_print_text_primary_if_get(seq);
	if (!primary_if)
1640
		goto out;
1641

1642 1643
	seq_printf(seq,
		   "Globally announced TT entries received via the mesh %s\n",
1644
		   net_dev->name);
1645 1646 1647
	seq_printf(seq, "       %-13s  %s  %s       %-15s %s (%-10s) %s\n",
		   "Client", "VID", "(TTVN)", "Originator", "(Curr TTVN)",
		   "CRC", "Flags");
1648 1649 1650 1651

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

1652
		rcu_read_lock();
1653
		hlist_for_each_entry_rcu(tt_common_entry,
1654
					 head, hash_entry) {
1655 1656 1657
			tt_global = container_of(tt_common_entry,
						 struct batadv_tt_global_entry,
						 common);
1658
			batadv_tt_global_print_entry(bat_priv, tt_global, seq);
1659
		}
1660
		rcu_read_unlock();
1661
	}
1662 1663
out:
	if (primary_if)
1664
		batadv_hardif_free_ref(primary_if);
1665
	return 0;
1666 1667
}

1668
/**
1669
 * _batadv_tt_global_del_orig_entry - remove and free an orig_entry
1670 1671 1672 1673 1674
 * @tt_global_entry: the global entry to remove the orig_entry from
 * @orig_entry: the orig entry to remove and free
 *
 * Remove an orig_entry from its list in the given tt_global_entry and
 * free this orig_entry afterwards.
1675 1676 1677
 *
 * Caller must hold tt_global_entry->list_lock and ensure orig_entry->list is
 * part of a list.
1678 1679
 */
static void
1680 1681
_batadv_tt_global_del_orig_entry(struct batadv_tt_global_entry *tt_global_entry,
				 struct batadv_tt_orig_list_entry *orig_entry)
1682
{
1683 1684
	lockdep_assert_held(&tt_global_entry->list_lock);

1685 1686 1687
	batadv_tt_global_size_dec(orig_entry->orig_node,
				  tt_global_entry->common.vid);
	atomic_dec(&tt_global_entry->orig_list_count);
1688 1689 1690
	/* requires holding tt_global_entry->list_lock and orig_entry->list
	 * being part of a list
	 */
1691 1692 1693 1694
	hlist_del_rcu(&orig_entry->list);
	batadv_tt_orig_list_entry_free_ref(orig_entry);
}

1695
/* deletes the orig list of a tt_global_entry */
1696
static void
1697
batadv_tt_global_del_orig_list(struct batadv_tt_global_entry *tt_global_entry)
1698
{
1699
	struct hlist_head *head;
1700
	struct hlist_node *safe;
1701
	struct batadv_tt_orig_list_entry *orig_entry;
1702

1703 1704
	spin_lock_bh(&tt_global_entry->list_lock);
	head = &tt_global_entry->orig_list;
1705
	hlist_for_each_entry_safe(orig_entry, safe, head, list)
1706
		_batadv_tt_global_del_orig_entry(tt_global_entry, orig_entry);
1707 1708 1709
	spin_unlock_bh(&tt_global_entry->list_lock);
}

1710 1711 1712 1713 1714 1715 1716 1717 1718 1719
/**
 * batadv_tt_global_del_orig_node - remove orig_node from a global tt entry
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_global_entry: the global entry to remove the orig_node from
 * @orig_node: the originator announcing the client
 * @message: message to append to the log on deletion
 *
 * Remove the given orig_node and its according orig_entry from the given
 * global tt entry.
 */
1720
static void
1721 1722 1723 1724
batadv_tt_global_del_orig_node(struct batadv_priv *bat_priv,
			       struct batadv_tt_global_entry *tt_global_entry,
			       struct batadv_orig_node *orig_node,
			       const char *message)
1725 1726
{
	struct hlist_head *head;
1727
	struct hlist_node *safe;
1728
	struct batadv_tt_orig_list_entry *orig_entry;
1729
	unsigned short vid;
1730 1731 1732

	spin_lock_bh(&tt_global_entry->list_lock);
	head = &tt_global_entry->orig_list;
1733
	hlist_for_each_entry_safe(orig_entry, safe, head, list) {
1734
		if (orig_entry->orig_node == orig_node) {
1735
			vid = tt_global_entry->common.vid;
1736
			batadv_dbg(BATADV_DBG_TT, bat_priv,
1737
				   "Deleting %pM from global tt entry %pM (vid: %d): %s\n",
1738
				   orig_node->orig,
1739 1740
				   tt_global_entry->common.addr,
				   BATADV_PRINT_VID(vid), message);
1741 1742
			_batadv_tt_global_del_orig_entry(tt_global_entry,
							 orig_entry);
1743 1744 1745 1746 1747 1748
		}
	}
	spin_unlock_bh(&tt_global_entry->list_lock);
}

/* If the client is to be deleted, we check if it is the last origantor entry
1749 1750
 * within tt_global entry. If yes, we set the BATADV_TT_CLIENT_ROAM flag and the
 * timer, otherwise we simply remove the originator scheduled for deletion.
1751
 */
1752
static void
1753 1754 1755 1756
batadv_tt_global_del_roaming(struct batadv_priv *bat_priv,
			     struct batadv_tt_global_entry *tt_global_entry,
			     struct batadv_orig_node *orig_node,
			     const char *message)
1757 1758 1759
{
	bool last_entry = true;
	struct hlist_head *head;
1760
	struct batadv_tt_orig_list_entry *orig_entry;
1761 1762 1763 1764 1765 1766 1767

	/* no local entry exists, case 1:
	 * Check if this is the last one or if other entries exist.
	 */

	rcu_read_lock();
	head = &tt_global_entry->orig_list;
1768
	hlist_for_each_entry_rcu(orig_entry, head, list) {
1769 1770 1771 1772 1773 1774 1775 1776 1777
		if (orig_entry->orig_node != orig_node) {
			last_entry = false;
			break;
		}
	}
	rcu_read_unlock();

	if (last_entry) {
		/* its the last one, mark for roaming. */
1778
		tt_global_entry->common.flags |= BATADV_TT_CLIENT_ROAM;
1779 1780 1781 1782 1783
		tt_global_entry->roam_at = jiffies;
	} else
		/* there is another entry, we can simply delete this
		 * one and can still use the other one.
		 */
1784 1785
		batadv_tt_global_del_orig_node(bat_priv, tt_global_entry,
					       orig_node, message);
1786 1787
}

1788 1789 1790 1791 1792 1793 1794 1795 1796 1797
/**
 * batadv_tt_global_del - remove a client from the global table
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: an originator serving this client
 * @addr: the mac address of the client
 * @vid: VLAN identifier
 * @message: a message explaining the reason for deleting the client to print
 *  for debugging purpose
 * @roaming: true if the deletion has been triggered by a roaming event
 */
1798 1799
static void batadv_tt_global_del(struct batadv_priv *bat_priv,
				 struct batadv_orig_node *orig_node,
1800
				 const unsigned char *addr, unsigned short vid,
1801
				 const char *message, bool roaming)
1802
{
1803
	struct batadv_tt_global_entry *tt_global_entry;
1804
	struct batadv_tt_local_entry *local_entry = NULL;
1805

1806
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
1807
	if (!tt_global_entry)
1808
		goto out;
1809

1810
	if (!roaming) {
1811 1812
		batadv_tt_global_del_orig_node(bat_priv, tt_global_entry,
					       orig_node, message);
1813 1814

		if (hlist_empty(&tt_global_entry->orig_list))
1815 1816
			batadv_tt_global_free(bat_priv, tt_global_entry,
					      message);
1817 1818 1819

		goto out;
	}
1820 1821 1822

	/* if we are deleting a global entry due to a roam
	 * event, there are two possibilities:
1823 1824
	 * 1) the client roamed from node A to node B => if there
	 *    is only one originator left for this client, we mark
1825
	 *    it with BATADV_TT_CLIENT_ROAM, we start a timer and we
1826 1827
	 *    wait for node B to claim it. In case of timeout
	 *    the entry is purged.
1828 1829 1830
	 *
	 *    If there are other originators left, we directly delete
	 *    the originator.
1831
	 * 2) the client roamed to us => we can directly delete
1832 1833
	 *    the global entry, since it is useless now.
	 */
1834
	local_entry = batadv_tt_local_hash_find(bat_priv,
1835 1836
						tt_global_entry->common.addr,
						vid);
1837
	if (local_entry) {
1838
		/* local entry exists, case 2: client roamed to us. */
1839
		batadv_tt_global_del_orig_list(tt_global_entry);
1840
		batadv_tt_global_free(bat_priv, tt_global_entry, message);
1841 1842
	} else
		/* no local entry exists, case 1: check for roaming */
1843 1844
		batadv_tt_global_del_roaming(bat_priv, tt_global_entry,
					     orig_node, message);
1845

1846
out:
1847
	if (tt_global_entry)
1848 1849 1850
		batadv_tt_global_entry_free_ref(tt_global_entry);
	if (local_entry)
		batadv_tt_local_entry_free_ref(local_entry);
1851 1852
}

1853 1854 1855 1856 1857 1858 1859 1860 1861
/**
 * batadv_tt_global_del_orig - remove all the TT global entries belonging to the
 *  given originator matching the provided vid
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: the originator owning the entries to remove
 * @match_vid: the VLAN identifier to match. If negative all the entries will be
 *  removed
 * @message: debug message to print as "reason"
 */
1862 1863
void batadv_tt_global_del_orig(struct batadv_priv *bat_priv,
			       struct batadv_orig_node *orig_node,
1864
			       s32 match_vid,
1865
			       const char *message)
1866
{
1867 1868
	struct batadv_tt_global_entry *tt_global;
	struct batadv_tt_common_entry *tt_common_entry;
1869
	u32 i;
1870
	struct batadv_hashtable *hash = bat_priv->tt.global_hash;
1871
	struct hlist_node *safe;
1872
	struct hlist_head *head;
1873
	spinlock_t *list_lock; /* protects write access to the hash lists */
1874
	unsigned short vid;
1875

1876 1877 1878
	if (!hash)
		return;

1879 1880
	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
1881
		list_lock = &hash->list_locks[i];
1882

1883
		spin_lock_bh(list_lock);
1884
		hlist_for_each_entry_safe(tt_common_entry, safe,
1885
					  head, hash_entry) {
1886 1887 1888 1889
			/* remove only matching entries */
			if (match_vid >= 0 && tt_common_entry->vid != match_vid)
				continue;

1890 1891 1892
			tt_global = container_of(tt_common_entry,
						 struct batadv_tt_global_entry,
						 common);
1893

1894 1895
			batadv_tt_global_del_orig_node(bat_priv, tt_global,
						       orig_node, message);
1896

1897
			if (hlist_empty(&tt_global->orig_list)) {
1898
				vid = tt_global->common.vid;
1899
				batadv_dbg(BATADV_DBG_TT, bat_priv,
1900 1901 1902
					   "Deleting global tt entry %pM (vid: %d): %s\n",
					   tt_global->common.addr,
					   BATADV_PRINT_VID(vid), message);
1903
				hlist_del_rcu(&tt_common_entry->hash_entry);
1904
				batadv_tt_global_entry_free_ref(tt_global);
1905
			}
1906
		}
1907
		spin_unlock_bh(list_lock);
1908
	}
1909
	clear_bit(BATADV_ORIG_CAPA_HAS_TT, &orig_node->capa_initialized);
1910 1911
}

1912 1913
static bool batadv_tt_global_to_purge(struct batadv_tt_global_entry *tt_global,
				      char **msg)
1914
{
1915 1916 1917
	bool purge = false;
	unsigned long roam_timeout = BATADV_TT_CLIENT_ROAM_TIMEOUT;
	unsigned long temp_timeout = BATADV_TT_CLIENT_TEMP_TIMEOUT;
1918

1919 1920 1921 1922 1923
	if ((tt_global->common.flags & BATADV_TT_CLIENT_ROAM) &&
	    batadv_has_timed_out(tt_global->roam_at, roam_timeout)) {
		purge = true;
		*msg = "Roaming timeout\n";
	}
1924

1925 1926 1927 1928
	if ((tt_global->common.flags & BATADV_TT_CLIENT_TEMP) &&
	    batadv_has_timed_out(tt_global->common.added_at, temp_timeout)) {
		purge = true;
		*msg = "Temporary client timeout\n";
1929
	}
1930 1931

	return purge;
1932 1933
}

1934
static void batadv_tt_global_purge(struct batadv_priv *bat_priv)
1935
{
1936
	struct batadv_hashtable *hash = bat_priv->tt.global_hash;
1937
	struct hlist_head *head;
1938
	struct hlist_node *node_tmp;
1939
	spinlock_t *list_lock; /* protects write access to the hash lists */
1940
	u32 i;
1941 1942 1943
	char *msg = NULL;
	struct batadv_tt_common_entry *tt_common;
	struct batadv_tt_global_entry *tt_global;
1944 1945 1946

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
1947
		list_lock = &hash->list_locks[i];
1948

1949
		spin_lock_bh(list_lock);
1950
		hlist_for_each_entry_safe(tt_common, node_tmp, head,
1951 1952 1953 1954 1955 1956 1957 1958 1959
					  hash_entry) {
			tt_global = container_of(tt_common,
						 struct batadv_tt_global_entry,
						 common);

			if (!batadv_tt_global_to_purge(tt_global, &msg))
				continue;

			batadv_dbg(BATADV_DBG_TT, bat_priv,
1960 1961 1962 1963
				   "Deleting global tt entry %pM (vid: %d): %s\n",
				   tt_global->common.addr,
				   BATADV_PRINT_VID(tt_global->common.vid),
				   msg);
1964

1965
			hlist_del_rcu(&tt_common->hash_entry);
1966 1967 1968

			batadv_tt_global_entry_free_ref(tt_global);
		}
1969
		spin_unlock_bh(list_lock);
1970 1971 1972
	}
}

1973
static void batadv_tt_global_table_free(struct batadv_priv *bat_priv)
1974
{
1975
	struct batadv_hashtable *hash;
1976
	spinlock_t *list_lock; /* protects write access to the hash lists */
1977 1978
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_global_entry *tt_global;
1979
	struct hlist_node *node_tmp;
1980
	struct hlist_head *head;
1981
	u32 i;
1982

1983
	if (!bat_priv->tt.global_hash)
1984 1985
		return;

1986
	hash = bat_priv->tt.global_hash;
1987 1988 1989 1990 1991 1992

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
		list_lock = &hash->list_locks[i];

		spin_lock_bh(list_lock);
1993
		hlist_for_each_entry_safe(tt_common_entry, node_tmp,
1994
					  head, hash_entry) {
1995
			hlist_del_rcu(&tt_common_entry->hash_entry);
1996 1997 1998 1999
			tt_global = container_of(tt_common_entry,
						 struct batadv_tt_global_entry,
						 common);
			batadv_tt_global_entry_free_ref(tt_global);
2000 2001 2002 2003
		}
		spin_unlock_bh(list_lock);
	}

2004
	batadv_hash_destroy(hash);
2005

2006
	bat_priv->tt.global_hash = NULL;
2007 2008
}

2009 2010 2011
static bool
_batadv_is_ap_isolated(struct batadv_tt_local_entry *tt_local_entry,
		       struct batadv_tt_global_entry *tt_global_entry)
2012 2013 2014
{
	bool ret = false;

2015 2016
	if (tt_local_entry->common.flags & BATADV_TT_CLIENT_WIFI &&
	    tt_global_entry->common.flags & BATADV_TT_CLIENT_WIFI)
2017 2018
		ret = true;

2019 2020 2021 2022 2023
	/* check if the two clients are marked as isolated */
	if (tt_local_entry->common.flags & BATADV_TT_CLIENT_ISOLA &&
	    tt_global_entry->common.flags & BATADV_TT_CLIENT_ISOLA)
		ret = true;

2024 2025 2026
	return ret;
}

2027 2028 2029 2030 2031 2032 2033 2034 2035 2036 2037 2038 2039 2040
/**
 * batadv_transtable_search - get the mesh destination for a given client
 * @bat_priv: the bat priv with all the soft interface information
 * @src: mac address of the source client
 * @addr: mac address of the destination client
 * @vid: VLAN identifier
 *
 * Returns a pointer to the originator that was selected as destination in the
 * mesh for contacting the client 'addr', NULL otherwise.
 * In case of multiple originators serving the same client, the function returns
 * the best one (best in terms of metric towards the destination node).
 *
 * If the two clients are AP isolated the function returns NULL.
 */
2041
struct batadv_orig_node *batadv_transtable_search(struct batadv_priv *bat_priv,
2042 2043
						  const u8 *src,
						  const u8 *addr,
2044
						  unsigned short vid)
2045
{
2046 2047 2048
	struct batadv_tt_local_entry *tt_local_entry = NULL;
	struct batadv_tt_global_entry *tt_global_entry = NULL;
	struct batadv_orig_node *orig_node = NULL;
2049
	struct batadv_tt_orig_list_entry *best_entry;
2050

2051
	if (src && batadv_vlan_ap_isola_get(bat_priv, vid)) {
2052
		tt_local_entry = batadv_tt_local_hash_find(bat_priv, src, vid);
2053 2054
		if (!tt_local_entry ||
		    (tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING))
2055 2056
			goto out;
	}
2057

2058
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
2059
	if (!tt_global_entry)
2060
		goto out;
2061

2062
	/* check whether the clients should not communicate due to AP
2063 2064
	 * isolation
	 */
2065 2066
	if (tt_local_entry &&
	    _batadv_is_ap_isolated(tt_local_entry, tt_global_entry))
2067 2068
		goto out;

2069
	rcu_read_lock();
2070
	best_entry = batadv_transtable_best_orig(bat_priv, tt_global_entry);
2071
	/* found anything? */
2072 2073
	if (best_entry)
		orig_node = best_entry->orig_node;
2074 2075 2076
	if (orig_node && !atomic_inc_not_zero(&orig_node->refcount))
		orig_node = NULL;
	rcu_read_unlock();
2077

2078
out:
2079
	if (tt_global_entry)
2080
		batadv_tt_global_entry_free_ref(tt_global_entry);
2081
	if (tt_local_entry)
2082
		batadv_tt_local_entry_free_ref(tt_local_entry);
2083

2084
	return orig_node;
2085
}
2086

2087 2088 2089 2090
/**
 * batadv_tt_global_crc - calculates the checksum of the local table belonging
 *  to the given orig_node
 * @bat_priv: the bat priv with all the soft interface information
2091
 * @orig_node: originator for which the CRC should be computed
2092
 * @vid: VLAN identifier for which the CRC32 has to be computed
2093 2094 2095 2096 2097 2098 2099 2100 2101 2102 2103 2104 2105 2106 2107 2108 2109
 *
 * This function computes the checksum for the global table corresponding to a
 * specific originator. In particular, the checksum is computed as follows: For
 * each client connected to the originator the CRC32C of the MAC address and the
 * VID is computed and then all the CRC32Cs of the various clients are xor'ed
 * together.
 *
 * The idea behind is that CRC32C should be used as much as possible in order to
 * produce a unique hash of the table, but since the order which is used to feed
 * the CRC32C function affects the result and since every node in the network
 * probably sorts the clients differently, the hash function cannot be directly
 * computed over the entire table. Hence the CRC32C is used only on
 * the single client entry, while all the results are then xor'ed together
 * because the XOR operation can combine them all while trying to reduce the
 * noise as much as possible.
 *
 * Returns the checksum of the global table of a given originator.
2110
 */
2111 2112 2113
static u32 batadv_tt_global_crc(struct batadv_priv *bat_priv,
				struct batadv_orig_node *orig_node,
				unsigned short vid)
2114
{
2115
	struct batadv_hashtable *hash = bat_priv->tt.global_hash;
2116 2117
	struct batadv_tt_common_entry *tt_common;
	struct batadv_tt_global_entry *tt_global;
2118
	struct hlist_head *head;
2119 2120
	u32 i, crc_tmp, crc = 0;
	u8 flags;
2121
	__be16 tmp_vid;
2122 2123 2124 2125 2126

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

		rcu_read_lock();
2127
		hlist_for_each_entry_rcu(tt_common, head, hash_entry) {
2128 2129 2130
			tt_global = container_of(tt_common,
						 struct batadv_tt_global_entry,
						 common);
2131 2132 2133 2134 2135 2136
			/* compute the CRC only for entries belonging to the
			 * VLAN identified by the vid passed as parameter
			 */
			if (tt_common->vid != vid)
				continue;

2137 2138 2139 2140 2141
			/* Roaming clients are in the global table for
			 * consistency only. They don't have to be
			 * taken into account while computing the
			 * global crc
			 */
2142
			if (tt_common->flags & BATADV_TT_CLIENT_ROAM)
2143
				continue;
2144 2145 2146 2147 2148 2149
			/* Temporary clients have not been announced yet, so
			 * they have to be skipped while computing the global
			 * crc
			 */
			if (tt_common->flags & BATADV_TT_CLIENT_TEMP)
				continue;
2150 2151 2152 2153

			/* find out if this global entry is announced by this
			 * originator
			 */
2154
			if (!batadv_tt_global_entry_has_orig(tt_global,
2155
							     orig_node))
2156 2157
				continue;

2158 2159 2160 2161 2162
			/* use network order to read the VID: this ensures that
			 * every node reads the bytes in the same order.
			 */
			tmp_vid = htons(tt_common->vid);
			crc_tmp = crc32c(0, &tmp_vid, sizeof(tmp_vid));
2163 2164 2165 2166 2167 2168 2169

			/* compute the CRC on flags that have to be kept in sync
			 * among nodes
			 */
			flags = tt_common->flags & BATADV_TT_SYNC_MASK;
			crc_tmp = crc32c(crc_tmp, &flags, sizeof(flags));

2170
			crc ^= crc32c(crc_tmp, tt_common->addr, ETH_ALEN);
2171 2172 2173 2174
		}
		rcu_read_unlock();
	}

2175
	return crc;
2176 2177
}

2178 2179 2180
/**
 * batadv_tt_local_crc - calculates the checksum of the local table
 * @bat_priv: the bat priv with all the soft interface information
2181
 * @vid: VLAN identifier for which the CRC32 has to be computed
2182 2183 2184 2185 2186
 *
 * For details about the computation, please refer to the documentation for
 * batadv_tt_global_crc().
 *
 * Returns the checksum of the local table
2187
 */
2188 2189
static u32 batadv_tt_local_crc(struct batadv_priv *bat_priv,
			       unsigned short vid)
2190
{
2191
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
2192
	struct batadv_tt_common_entry *tt_common;
2193
	struct hlist_head *head;
2194 2195
	u32 i, crc_tmp, crc = 0;
	u8 flags;
2196
	__be16 tmp_vid;
2197 2198 2199 2200 2201

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

		rcu_read_lock();
2202
		hlist_for_each_entry_rcu(tt_common, head, hash_entry) {
2203 2204 2205 2206 2207 2208
			/* compute the CRC only for entries belonging to the
			 * VLAN identified by vid
			 */
			if (tt_common->vid != vid)
				continue;

2209
			/* not yet committed clients have not to be taken into
2210 2211
			 * account while computing the CRC
			 */
2212
			if (tt_common->flags & BATADV_TT_CLIENT_NEW)
2213
				continue;
2214

2215 2216 2217 2218 2219
			/* use network order to read the VID: this ensures that
			 * every node reads the bytes in the same order.
			 */
			tmp_vid = htons(tt_common->vid);
			crc_tmp = crc32c(0, &tmp_vid, sizeof(tmp_vid));
2220 2221 2222 2223 2224 2225 2226

			/* compute the CRC on flags that have to be kept in sync
			 * among nodes
			 */
			flags = tt_common->flags & BATADV_TT_SYNC_MASK;
			crc_tmp = crc32c(crc_tmp, &flags, sizeof(flags));

2227
			crc ^= crc32c(crc_tmp, tt_common->addr, ETH_ALEN);
2228 2229 2230 2231
		}
		rcu_read_unlock();
	}

2232
	return crc;
2233 2234
}

2235
static void batadv_tt_req_list_free(struct batadv_priv *bat_priv)
2236
{
2237 2238
	struct batadv_tt_req_node *node;
	struct hlist_node *safe;
2239

2240
	spin_lock_bh(&bat_priv->tt.req_list_lock);
2241

2242 2243
	hlist_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
		hlist_del_init(&node->list);
2244 2245 2246
		kfree(node);
	}

2247
	spin_unlock_bh(&bat_priv->tt.req_list_lock);
2248 2249
}

2250 2251
static void batadv_tt_save_orig_buffer(struct batadv_priv *bat_priv,
				       struct batadv_orig_node *orig_node,
2252
				       const void *tt_buff,
2253
				       u16 tt_buff_len)
2254 2255
{
	/* Replace the old buffer only if I received something in the
2256 2257
	 * last OGM (the OGM could carry no changes)
	 */
2258 2259 2260 2261 2262 2263 2264 2265 2266 2267 2268 2269 2270
	spin_lock_bh(&orig_node->tt_buff_lock);
	if (tt_buff_len > 0) {
		kfree(orig_node->tt_buff);
		orig_node->tt_buff_len = 0;
		orig_node->tt_buff = kmalloc(tt_buff_len, GFP_ATOMIC);
		if (orig_node->tt_buff) {
			memcpy(orig_node->tt_buff, tt_buff, tt_buff_len);
			orig_node->tt_buff_len = tt_buff_len;
		}
	}
	spin_unlock_bh(&orig_node->tt_buff_lock);
}

2271
static void batadv_tt_req_purge(struct batadv_priv *bat_priv)
2272
{
2273 2274
	struct batadv_tt_req_node *node;
	struct hlist_node *safe;
2275

2276
	spin_lock_bh(&bat_priv->tt.req_list_lock);
2277
	hlist_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
2278 2279
		if (batadv_has_timed_out(node->issued_at,
					 BATADV_TT_REQUEST_TIMEOUT)) {
2280
			hlist_del_init(&node->list);
2281 2282 2283
			kfree(node);
		}
	}
2284
	spin_unlock_bh(&bat_priv->tt.req_list_lock);
2285 2286
}

2287 2288 2289 2290 2291 2292 2293
/**
 * batadv_tt_req_node_new - search and possibly create a tt_req_node object
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: orig node this request is being issued for
 *
 * Returns the pointer to the new tt_req_node struct if no request
 * has already been issued for this orig_node, NULL otherwise.
2294
 */
2295
static struct batadv_tt_req_node *
2296
batadv_tt_req_node_new(struct batadv_priv *bat_priv,
2297
		       struct batadv_orig_node *orig_node)
2298
{
2299
	struct batadv_tt_req_node *tt_req_node_tmp, *tt_req_node = NULL;
2300

2301
	spin_lock_bh(&bat_priv->tt.req_list_lock);
2302
	hlist_for_each_entry(tt_req_node_tmp, &bat_priv->tt.req_list, list) {
2303 2304
		if (batadv_compare_eth(tt_req_node_tmp, orig_node) &&
		    !batadv_has_timed_out(tt_req_node_tmp->issued_at,
2305
					  BATADV_TT_REQUEST_TIMEOUT))
2306 2307 2308 2309 2310 2311 2312
			goto unlock;
	}

	tt_req_node = kmalloc(sizeof(*tt_req_node), GFP_ATOMIC);
	if (!tt_req_node)
		goto unlock;

2313
	ether_addr_copy(tt_req_node->addr, orig_node->orig);
2314 2315
	tt_req_node->issued_at = jiffies;

2316
	hlist_add_head(&tt_req_node->list, &bat_priv->tt.req_list);
2317
unlock:
2318
	spin_unlock_bh(&bat_priv->tt.req_list_lock);
2319 2320 2321
	return tt_req_node;
}

2322 2323 2324 2325 2326 2327 2328 2329
/**
 * batadv_tt_local_valid - verify that given tt entry is a valid one
 * @entry_ptr: to be checked local tt entry
 * @data_ptr: not used but definition required to satisfy the callback prototype
 *
 * Returns 1 if the entry is a valid, 0 otherwise.
 */
static int batadv_tt_local_valid(const void *entry_ptr, const void *data_ptr)
2330
{
2331
	const struct batadv_tt_common_entry *tt_common_entry = entry_ptr;
2332

2333
	if (tt_common_entry->flags & BATADV_TT_CLIENT_NEW)
2334 2335 2336 2337
		return 0;
	return 1;
}

2338 2339
static int batadv_tt_global_valid(const void *entry_ptr,
				  const void *data_ptr)
2340
{
2341 2342 2343
	const struct batadv_tt_common_entry *tt_common_entry = entry_ptr;
	const struct batadv_tt_global_entry *tt_global_entry;
	const struct batadv_orig_node *orig_node = data_ptr;
2344

2345 2346
	if (tt_common_entry->flags & BATADV_TT_CLIENT_ROAM ||
	    tt_common_entry->flags & BATADV_TT_CLIENT_TEMP)
2347 2348
		return 0;

2349 2350
	tt_global_entry = container_of(tt_common_entry,
				       struct batadv_tt_global_entry,
2351 2352
				       common);

2353
	return batadv_tt_global_entry_has_orig(tt_global_entry, orig_node);
2354 2355
}

2356
/**
2357 2358
 * batadv_tt_tvlv_generate - fill the tvlv buff with the tt entries from the
 *  specified tt hash
2359 2360 2361
 * @bat_priv: the bat priv with all the soft interface information
 * @hash: hash table containing the tt entries
 * @tt_len: expected tvlv tt data buffer length in number of bytes
2362
 * @tvlv_buff: pointer to the buffer to fill with the TT data
2363 2364 2365
 * @valid_cb: function to filter tt change entries
 * @cb_data: data passed to the filter function as argument
 */
2366 2367
static void batadv_tt_tvlv_generate(struct batadv_priv *bat_priv,
				    struct batadv_hashtable *hash,
2368
				    void *tvlv_buff, u16 tt_len,
2369 2370
				    int (*valid_cb)(const void *, const void *),
				    void *cb_data)
2371
{
2372
	struct batadv_tt_common_entry *tt_common_entry;
2373
	struct batadv_tvlv_tt_change *tt_change;
2374
	struct hlist_head *head;
2375 2376
	u16 tt_tot, tt_num_entries = 0;
	u32 i;
2377

2378
	tt_tot = batadv_tt_entries(tt_len);
2379
	tt_change = (struct batadv_tvlv_tt_change *)tvlv_buff;
2380 2381 2382 2383 2384

	rcu_read_lock();
	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

2385
		hlist_for_each_entry_rcu(tt_common_entry,
2386
					 head, hash_entry) {
2387
			if (tt_tot == tt_num_entries)
2388 2389
				break;

2390
			if ((valid_cb) && (!valid_cb(tt_common_entry, cb_data)))
2391 2392
				continue;

2393
			ether_addr_copy(tt_change->addr, tt_common_entry->addr);
2394
			tt_change->flags = tt_common_entry->flags;
2395
			tt_change->vid = htons(tt_common_entry->vid);
2396 2397
			memset(tt_change->reserved, 0,
			       sizeof(tt_change->reserved));
2398

2399
			tt_num_entries++;
2400 2401 2402 2403
			tt_change++;
		}
	}
	rcu_read_unlock();
2404
}
2405

2406 2407 2408 2409 2410 2411 2412 2413 2414 2415 2416 2417
/**
 * batadv_tt_global_check_crc - check if all the CRCs are correct
 * @orig_node: originator for which the CRCs have to be checked
 * @tt_vlan: pointer to the first tvlv VLAN entry
 * @num_vlan: number of tvlv VLAN entries
 * @create: if true, create VLAN objects if not found
 *
 * Return true if all the received CRCs match the locally stored ones, false
 * otherwise
 */
static bool batadv_tt_global_check_crc(struct batadv_orig_node *orig_node,
				       struct batadv_tvlv_tt_vlan_data *tt_vlan,
2418
				       u16 num_vlan)
2419 2420 2421
{
	struct batadv_tvlv_tt_vlan_data *tt_vlan_tmp;
	struct batadv_orig_node_vlan *vlan;
2422
	int i, orig_num_vlan;
2423
	u32 crc;
2424 2425 2426 2427 2428 2429 2430 2431 2432

	/* check if each received CRC matches the locally stored one */
	for (i = 0; i < num_vlan; i++) {
		tt_vlan_tmp = tt_vlan + i;

		/* if orig_node is a backbone node for this VLAN, don't check
		 * the CRC as we ignore all the global entries over it
		 */
		if (batadv_bla_is_backbone_gw_orig(orig_node->bat_priv,
2433 2434
						   orig_node->orig,
						   ntohs(tt_vlan_tmp->vid)))
2435 2436 2437 2438 2439 2440 2441
			continue;

		vlan = batadv_orig_node_vlan_get(orig_node,
						 ntohs(tt_vlan_tmp->vid));
		if (!vlan)
			return false;

2442 2443 2444 2445
		crc = vlan->tt.crc;
		batadv_orig_node_vlan_free_ref(vlan);

		if (crc != ntohl(tt_vlan_tmp->crc))
2446 2447 2448
			return false;
	}

2449 2450 2451 2452 2453 2454 2455 2456 2457 2458 2459 2460
	/* check if any excess VLANs exist locally for the originator
	 * which are not mentioned in the TVLV from the originator.
	 */
	rcu_read_lock();
	orig_num_vlan = 0;
	hlist_for_each_entry_rcu(vlan, &orig_node->vlan_list, list)
		orig_num_vlan++;
	rcu_read_unlock();

	if (orig_num_vlan > num_vlan)
		return false;

2461 2462 2463 2464 2465 2466 2467 2468 2469 2470 2471 2472 2473 2474 2475 2476 2477 2478 2479 2480 2481 2482 2483 2484 2485 2486 2487 2488
	return true;
}

/**
 * batadv_tt_local_update_crc - update all the local CRCs
 * @bat_priv: the bat priv with all the soft interface information
 */
static void batadv_tt_local_update_crc(struct batadv_priv *bat_priv)
{
	struct batadv_softif_vlan *vlan;

	/* recompute the global CRC for each VLAN */
	rcu_read_lock();
	hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
		vlan->tt.crc = batadv_tt_local_crc(bat_priv, vlan->vid);
	}
	rcu_read_unlock();
}

/**
 * batadv_tt_global_update_crc - update all the global CRCs for this orig_node
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: the orig_node for which the CRCs have to be updated
 */
static void batadv_tt_global_update_crc(struct batadv_priv *bat_priv,
					struct batadv_orig_node *orig_node)
{
	struct batadv_orig_node_vlan *vlan;
2489
	u32 crc;
2490 2491 2492

	/* recompute the global CRC for each VLAN */
	rcu_read_lock();
2493
	hlist_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) {
2494 2495 2496
		/* if orig_node is a backbone node for this VLAN, don't compute
		 * the CRC as we ignore all the global entries over it
		 */
2497 2498
		if (batadv_bla_is_backbone_gw_orig(bat_priv, orig_node->orig,
						   vlan->vid))
2499 2500 2501 2502 2503 2504
			continue;

		crc = batadv_tt_global_crc(bat_priv, orig_node, vlan->vid);
		vlan->tt.crc = crc;
	}
	rcu_read_unlock();
2505 2506
}

2507 2508 2509 2510 2511
/**
 * batadv_send_tt_request - send a TT Request message to a given node
 * @bat_priv: the bat priv with all the soft interface information
 * @dst_orig_node: the destination of the message
 * @ttvn: the version number that the source of the message is looking for
2512 2513
 * @tt_vlan: pointer to the first tvlv VLAN object to request
 * @num_vlan: number of tvlv VLAN entries
2514 2515 2516
 * @full_table: ask for the entire translation table if true, while only for the
 *  last TT diff otherwise
 */
2517 2518
static int batadv_send_tt_request(struct batadv_priv *bat_priv,
				  struct batadv_orig_node *dst_orig_node,
2519
				  u8 ttvn,
2520
				  struct batadv_tvlv_tt_vlan_data *tt_vlan,
2521
				  u16 num_vlan, bool full_table)
2522
{
2523
	struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
2524
	struct batadv_tt_req_node *tt_req_node = NULL;
2525 2526
	struct batadv_tvlv_tt_vlan_data *tt_vlan_req;
	struct batadv_hard_iface *primary_if;
2527
	bool ret = false;
2528
	int i, size;
2529

2530
	primary_if = batadv_primary_if_get_selected(bat_priv);
2531 2532 2533 2534
	if (!primary_if)
		goto out;

	/* The new tt_req will be issued only if I'm not waiting for a
2535 2536
	 * reply from the same orig_node yet
	 */
2537
	tt_req_node = batadv_tt_req_node_new(bat_priv, dst_orig_node);
2538 2539 2540
	if (!tt_req_node)
		goto out;

2541 2542
	size = sizeof(*tvlv_tt_data) + sizeof(*tt_vlan_req) * num_vlan;
	tvlv_tt_data = kzalloc(size, GFP_ATOMIC);
2543
	if (!tvlv_tt_data)
2544 2545
		goto out;

2546 2547
	tvlv_tt_data->flags = BATADV_TT_REQUEST;
	tvlv_tt_data->ttvn = ttvn;
2548 2549 2550 2551 2552 2553 2554 2555 2556 2557 2558 2559 2560
	tvlv_tt_data->num_vlan = htons(num_vlan);

	/* send all the CRCs within the request. This is needed by intermediate
	 * nodes to ensure they have the correct table before replying
	 */
	tt_vlan_req = (struct batadv_tvlv_tt_vlan_data *)(tvlv_tt_data + 1);
	for (i = 0; i < num_vlan; i++) {
		tt_vlan_req->vid = tt_vlan->vid;
		tt_vlan_req->crc = tt_vlan->crc;

		tt_vlan_req++;
		tt_vlan++;
	}
2561 2562

	if (full_table)
2563
		tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
2564

2565
	batadv_dbg(BATADV_DBG_TT, bat_priv, "Sending TT_REQUEST to %pM [%c]\n",
2566
		   dst_orig_node->orig, full_table ? 'F' : '.');
2567

2568
	batadv_inc_counter(bat_priv, BATADV_CNT_TT_REQUEST_TX);
2569 2570
	batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
				 dst_orig_node->orig, BATADV_TVLV_TT, 1,
2571
				 tvlv_tt_data, size);
2572
	ret = true;
2573 2574 2575

out:
	if (primary_if)
2576
		batadv_hardif_free_ref(primary_if);
2577
	if (ret && tt_req_node) {
2578
		spin_lock_bh(&bat_priv->tt.req_list_lock);
2579 2580
		/* hlist_del_init() verifies tt_req_node still is in the list */
		hlist_del_init(&tt_req_node->list);
2581
		spin_unlock_bh(&bat_priv->tt.req_list_lock);
2582 2583
		kfree(tt_req_node);
	}
2584
	kfree(tvlv_tt_data);
2585 2586 2587
	return ret;
}

2588 2589 2590 2591 2592 2593 2594 2595 2596 2597 2598 2599
/**
 * batadv_send_other_tt_response - send reply to tt request concerning another
 *  node's translation table
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: tt data containing the tt request information
 * @req_src: mac address of tt request sender
 * @req_dst: mac address of tt request recipient
 *
 * Returns true if tt request reply was sent, false otherwise.
 */
static bool batadv_send_other_tt_response(struct batadv_priv *bat_priv,
					  struct batadv_tvlv_tt_data *tt_data,
2600
					  u8 *req_src, u8 *req_dst)
2601
{
2602
	struct batadv_orig_node *req_dst_orig_node;
2603
	struct batadv_orig_node *res_dst_orig_node = NULL;
2604
	struct batadv_tvlv_tt_change *tt_change;
2605
	struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
2606
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
2607
	bool ret = false, full_table;
2608 2609 2610
	u8 orig_ttvn, req_ttvn;
	u16 tvlv_len;
	s32 tt_len;
2611

2612
	batadv_dbg(BATADV_DBG_TT, bat_priv,
2613
		   "Received TT_REQUEST from %pM for ttvn: %u (%pM) [%c]\n",
2614
		   req_src, tt_data->ttvn, req_dst,
2615
		   ((tt_data->flags & BATADV_TT_FULL_TABLE) ? 'F' : '.'));
2616 2617

	/* Let's get the orig node of the REAL destination */
2618
	req_dst_orig_node = batadv_orig_hash_find(bat_priv, req_dst);
2619 2620 2621
	if (!req_dst_orig_node)
		goto out;

2622
	res_dst_orig_node = batadv_orig_hash_find(bat_priv, req_src);
2623 2624 2625
	if (!res_dst_orig_node)
		goto out;

2626
	orig_ttvn = (u8)atomic_read(&req_dst_orig_node->last_ttvn);
2627
	req_ttvn = tt_data->ttvn;
2628

2629
	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(tt_data + 1);
2630
	/* this node doesn't have the requested data */
2631
	if (orig_ttvn != req_ttvn ||
2632 2633
	    !batadv_tt_global_check_crc(req_dst_orig_node, tt_vlan,
					ntohs(tt_data->num_vlan)))
2634 2635
		goto out;

2636
	/* If the full table has been explicitly requested */
2637
	if (tt_data->flags & BATADV_TT_FULL_TABLE ||
2638 2639 2640 2641 2642
	    !req_dst_orig_node->tt_buff)
		full_table = true;
	else
		full_table = false;

2643 2644
	/* TT fragmentation hasn't been implemented yet, so send as many
	 * TT entries fit a single packet as possible only
2645
	 */
2646 2647 2648 2649
	if (!full_table) {
		spin_lock_bh(&req_dst_orig_node->tt_buff_lock);
		tt_len = req_dst_orig_node->tt_buff_len;

2650 2651 2652 2653 2654
		tvlv_len = batadv_tt_prepare_tvlv_global_data(req_dst_orig_node,
							      &tvlv_tt_data,
							      &tt_change,
							      &tt_len);
		if (!tt_len)
2655 2656 2657
			goto unlock;

		/* Copy the last orig_node's OGM buffer */
2658
		memcpy(tt_change, req_dst_orig_node->tt_buff,
2659 2660 2661
		       req_dst_orig_node->tt_buff_len);
		spin_unlock_bh(&req_dst_orig_node->tt_buff_lock);
	} else {
2662 2663 2664 2665 2666 2667 2668 2669 2670
		/* allocate the tvlv, put the tt_data and all the tt_vlan_data
		 * in the initial part
		 */
		tt_len = -1;
		tvlv_len = batadv_tt_prepare_tvlv_global_data(req_dst_orig_node,
							      &tvlv_tt_data,
							      &tt_change,
							      &tt_len);
		if (!tt_len)
2671
			goto out;
2672 2673 2674 2675 2676 2677

		/* fill the rest of the tvlv with the real TT entries */
		batadv_tt_tvlv_generate(bat_priv, bat_priv->tt.global_hash,
					tt_change, tt_len,
					batadv_tt_global_valid,
					req_dst_orig_node);
2678 2679
	}

2680 2681 2682 2683 2684 2685 2686 2687 2688
	/* Don't send the response, if larger than fragmented packet. */
	tt_len = sizeof(struct batadv_unicast_tvlv_packet) + tvlv_len;
	if (tt_len > atomic_read(&bat_priv->packet_size_max)) {
		net_ratelimited_function(batadv_info, bat_priv->soft_iface,
					 "Ignoring TT_REQUEST from %pM; Response size exceeds max packet size.\n",
					 res_dst_orig_node->orig);
		goto out;
	}

2689 2690
	tvlv_tt_data->flags = BATADV_TT_RESPONSE;
	tvlv_tt_data->ttvn = req_ttvn;
2691 2692

	if (full_table)
2693
		tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
2694

2695
	batadv_dbg(BATADV_DBG_TT, bat_priv,
2696 2697 2698
		   "Sending TT_RESPONSE %pM for %pM [%c] (ttvn: %u)\n",
		   res_dst_orig_node->orig, req_dst_orig_node->orig,
		   full_table ? 'F' : '.', req_ttvn);
2699

2700
	batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_TX);
2701

2702
	batadv_tvlv_unicast_send(bat_priv, req_dst_orig_node->orig,
2703 2704
				 req_src, BATADV_TVLV_TT, 1, tvlv_tt_data,
				 tvlv_len);
2705

2706
	ret = true;
2707 2708 2709 2710 2711 2712 2713
	goto out;

unlock:
	spin_unlock_bh(&req_dst_orig_node->tt_buff_lock);

out:
	if (res_dst_orig_node)
2714
		batadv_orig_node_free_ref(res_dst_orig_node);
2715
	if (req_dst_orig_node)
2716
		batadv_orig_node_free_ref(req_dst_orig_node);
2717
	kfree(tvlv_tt_data);
2718 2719
	return ret;
}
2720

2721 2722 2723 2724 2725 2726 2727 2728 2729 2730 2731
/**
 * batadv_send_my_tt_response - send reply to tt request concerning this node's
 *  translation table
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: tt data containing the tt request information
 * @req_src: mac address of tt request sender
 *
 * Returns true if tt request reply was sent, false otherwise.
 */
static bool batadv_send_my_tt_response(struct batadv_priv *bat_priv,
				       struct batadv_tvlv_tt_data *tt_data,
2732
				       u8 *req_src)
2733
{
2734
	struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
2735
	struct batadv_hard_iface *primary_if = NULL;
2736 2737
	struct batadv_tvlv_tt_change *tt_change;
	struct batadv_orig_node *orig_node;
2738 2739
	u8 my_ttvn, req_ttvn;
	u16 tvlv_len;
2740
	bool full_table;
2741
	s32 tt_len;
2742

2743
	batadv_dbg(BATADV_DBG_TT, bat_priv,
2744
		   "Received TT_REQUEST from %pM for ttvn: %u (me) [%c]\n",
2745
		   req_src, tt_data->ttvn,
2746
		   ((tt_data->flags & BATADV_TT_FULL_TABLE) ? 'F' : '.'));
2747

2748
	spin_lock_bh(&bat_priv->tt.commit_lock);
2749

2750
	my_ttvn = (u8)atomic_read(&bat_priv->tt.vn);
2751
	req_ttvn = tt_data->ttvn;
2752

2753
	orig_node = batadv_orig_hash_find(bat_priv, req_src);
2754 2755 2756
	if (!orig_node)
		goto out;

2757
	primary_if = batadv_primary_if_get_selected(bat_priv);
2758 2759 2760 2761
	if (!primary_if)
		goto out;

	/* If the full table has been explicitly requested or the gap
2762 2763
	 * is too big send the whole local translation table
	 */
2764
	if (tt_data->flags & BATADV_TT_FULL_TABLE || my_ttvn != req_ttvn ||
2765
	    !bat_priv->tt.last_changeset)
2766 2767 2768 2769
		full_table = true;
	else
		full_table = false;

2770 2771
	/* TT fragmentation hasn't been implemented yet, so send as many
	 * TT entries fit a single packet as possible only
2772
	 */
2773
	if (!full_table) {
2774
		spin_lock_bh(&bat_priv->tt.last_changeset_lock);
2775

2776 2777 2778 2779 2780 2781
		tt_len = bat_priv->tt.last_changeset_len;
		tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv,
							     &tvlv_tt_data,
							     &tt_change,
							     &tt_len);
		if (!tt_len)
2782 2783
			goto unlock;

2784
		/* Copy the last orig_node's OGM buffer */
2785
		memcpy(tt_change, bat_priv->tt.last_changeset,
2786 2787
		       bat_priv->tt.last_changeset_len);
		spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
2788
	} else {
2789
		req_ttvn = (u8)atomic_read(&bat_priv->tt.vn);
2790

2791 2792 2793 2794 2795 2796 2797 2798 2799
		/* allocate the tvlv, put the tt_data and all the tt_vlan_data
		 * in the initial part
		 */
		tt_len = -1;
		tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv,
							     &tvlv_tt_data,
							     &tt_change,
							     &tt_len);
		if (!tt_len)
2800
			goto out;
2801 2802 2803 2804 2805

		/* fill the rest of the tvlv with the real TT entries */
		batadv_tt_tvlv_generate(bat_priv, bat_priv->tt.local_hash,
					tt_change, tt_len,
					batadv_tt_local_valid, NULL);
2806 2807
	}

2808 2809
	tvlv_tt_data->flags = BATADV_TT_RESPONSE;
	tvlv_tt_data->ttvn = req_ttvn;
2810 2811

	if (full_table)
2812
		tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
2813

2814
	batadv_dbg(BATADV_DBG_TT, bat_priv,
2815 2816
		   "Sending TT_RESPONSE to %pM [%c] (ttvn: %u)\n",
		   orig_node->orig, full_table ? 'F' : '.', req_ttvn);
2817

2818
	batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_TX);
2819

2820
	batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
2821 2822
				 req_src, BATADV_TVLV_TT, 1, tvlv_tt_data,
				 tvlv_len);
2823

2824 2825 2826
	goto out;

unlock:
2827
	spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
2828
out:
2829
	spin_unlock_bh(&bat_priv->tt.commit_lock);
2830
	if (orig_node)
2831
		batadv_orig_node_free_ref(orig_node);
2832
	if (primary_if)
2833
		batadv_hardif_free_ref(primary_if);
2834 2835
	kfree(tvlv_tt_data);
	/* The packet was for this host, so it doesn't need to be re-routed */
2836 2837 2838
	return true;
}

2839 2840 2841 2842 2843 2844 2845 2846 2847 2848 2849
/**
 * batadv_send_tt_response - send reply to tt request
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: tt data containing the tt request information
 * @req_src: mac address of tt request sender
 * @req_dst: mac address of tt request recipient
 *
 * Returns true if tt request reply was sent, false otherwise.
 */
static bool batadv_send_tt_response(struct batadv_priv *bat_priv,
				    struct batadv_tvlv_tt_data *tt_data,
2850
				    u8 *req_src, u8 *req_dst)
2851
{
2852
	if (batadv_is_my_mac(bat_priv, req_dst))
2853
		return batadv_send_my_tt_response(bat_priv, tt_data, req_src);
2854 2855
	return batadv_send_other_tt_response(bat_priv, tt_data, req_src,
					     req_dst);
2856 2857
}

2858 2859
static void _batadv_tt_update_changes(struct batadv_priv *bat_priv,
				      struct batadv_orig_node *orig_node,
2860
				      struct batadv_tvlv_tt_change *tt_change,
2861
				      u16 tt_num_changes, u8 ttvn)
2862 2863
{
	int i;
2864
	int roams;
2865 2866

	for (i = 0; i < tt_num_changes; i++) {
2867 2868
		if ((tt_change + i)->flags & BATADV_TT_CLIENT_DEL) {
			roams = (tt_change + i)->flags & BATADV_TT_CLIENT_ROAM;
2869 2870
			batadv_tt_global_del(bat_priv, orig_node,
					     (tt_change + i)->addr,
2871
					     ntohs((tt_change + i)->vid),
2872 2873
					     "tt removed by changes",
					     roams);
2874 2875
		} else {
			if (!batadv_tt_global_add(bat_priv, orig_node,
2876
						  (tt_change + i)->addr,
2877
						  ntohs((tt_change + i)->vid),
2878
						  (tt_change + i)->flags, ttvn))
2879 2880 2881 2882 2883 2884 2885
				/* In case of problem while storing a
				 * global_entry, we stop the updating
				 * procedure without committing the
				 * ttvn change. This will avoid to send
				 * corrupted data on tt_request
				 */
				return;
2886
		}
2887
	}
2888
	set_bit(BATADV_ORIG_CAPA_HAS_TT, &orig_node->capa_initialized);
2889 2890
}

2891
static void batadv_tt_fill_gtable(struct batadv_priv *bat_priv,
2892
				  struct batadv_tvlv_tt_change *tt_change,
2893 2894
				  u8 ttvn, u8 *resp_src,
				  u16 num_entries)
2895
{
2896
	struct batadv_orig_node *orig_node;
2897

2898
	orig_node = batadv_orig_hash_find(bat_priv, resp_src);
2899 2900 2901 2902
	if (!orig_node)
		goto out;

	/* Purge the old table first.. */
2903 2904
	batadv_tt_global_del_orig(bat_priv, orig_node, -1,
				  "Received full table");
2905

2906 2907
	_batadv_tt_update_changes(bat_priv, orig_node, tt_change, num_entries,
				  ttvn);
2908 2909 2910 2911 2912 2913 2914

	spin_lock_bh(&orig_node->tt_buff_lock);
	kfree(orig_node->tt_buff);
	orig_node->tt_buff_len = 0;
	orig_node->tt_buff = NULL;
	spin_unlock_bh(&orig_node->tt_buff_lock);

2915
	atomic_set(&orig_node->last_ttvn, ttvn);
2916 2917 2918

out:
	if (orig_node)
2919
		batadv_orig_node_free_ref(orig_node);
2920 2921
}

2922 2923
static void batadv_tt_update_changes(struct batadv_priv *bat_priv,
				     struct batadv_orig_node *orig_node,
2924
				     u16 tt_num_changes, u8 ttvn,
2925
				     struct batadv_tvlv_tt_change *tt_change)
2926
{
2927 2928
	_batadv_tt_update_changes(bat_priv, orig_node, tt_change,
				  tt_num_changes, ttvn);
2929

2930 2931
	batadv_tt_save_orig_buffer(bat_priv, orig_node, tt_change,
				   batadv_tt_len(tt_num_changes));
2932 2933 2934
	atomic_set(&orig_node->last_ttvn, ttvn);
}

2935 2936 2937
/**
 * batadv_is_my_client - check if a client is served by the local node
 * @bat_priv: the bat priv with all the soft interface information
2938
 * @addr: the mac address of the client to check
2939 2940 2941 2942
 * @vid: VLAN identifier
 *
 * Returns true if the client is served by this node, false otherwise.
 */
2943
bool batadv_is_my_client(struct batadv_priv *bat_priv, const u8 *addr,
2944
			 unsigned short vid)
2945
{
2946
	struct batadv_tt_local_entry *tt_local_entry;
2947
	bool ret = false;
2948

2949
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
2950 2951
	if (!tt_local_entry)
		goto out;
2952
	/* Check if the client has been logically deleted (but is kept for
2953 2954
	 * consistency purpose)
	 */
2955 2956
	if ((tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING) ||
	    (tt_local_entry->common.flags & BATADV_TT_CLIENT_ROAM))
2957
		goto out;
2958 2959
	ret = true;
out:
2960
	if (tt_local_entry)
2961
		batadv_tt_local_entry_free_ref(tt_local_entry);
2962
	return ret;
2963 2964
}

2965 2966 2967 2968 2969 2970 2971 2972 2973
/**
 * batadv_handle_tt_response - process incoming tt reply
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: tt data containing the tt request information
 * @resp_src: mac address of tt reply sender
 * @num_entries: number of tt change entries appended to the tt data
 */
static void batadv_handle_tt_response(struct batadv_priv *bat_priv,
				      struct batadv_tvlv_tt_data *tt_data,
2974
				      u8 *resp_src, u16 num_entries)
2975
{
2976 2977
	struct batadv_tt_req_node *node;
	struct hlist_node *safe;
2978
	struct batadv_orig_node *orig_node = NULL;
2979
	struct batadv_tvlv_tt_change *tt_change;
2980 2981
	u8 *tvlv_ptr = (u8 *)tt_data;
	u16 change_offset;
2982

2983
	batadv_dbg(BATADV_DBG_TT, bat_priv,
2984
		   "Received TT_RESPONSE from %pM for ttvn %d t_size: %d [%c]\n",
2985
		   resp_src, tt_data->ttvn, num_entries,
2986
		   ((tt_data->flags & BATADV_TT_FULL_TABLE) ? 'F' : '.'));
2987

2988
	orig_node = batadv_orig_hash_find(bat_priv, resp_src);
2989 2990 2991
	if (!orig_node)
		goto out;

2992 2993
	spin_lock_bh(&orig_node->tt_lock);

2994 2995 2996 2997 2998 2999
	change_offset = sizeof(struct batadv_tvlv_tt_vlan_data);
	change_offset *= ntohs(tt_data->num_vlan);
	change_offset += sizeof(*tt_data);
	tvlv_ptr += change_offset;

	tt_change = (struct batadv_tvlv_tt_change *)tvlv_ptr;
3000
	if (tt_data->flags & BATADV_TT_FULL_TABLE) {
3001 3002
		batadv_tt_fill_gtable(bat_priv, tt_change, tt_data->ttvn,
				      resp_src, num_entries);
3003
	} else {
3004 3005
		batadv_tt_update_changes(bat_priv, orig_node, num_entries,
					 tt_data->ttvn, tt_change);
3006
	}
3007

3008
	/* Recalculate the CRC for this orig_node and store it */
3009
	batadv_tt_global_update_crc(bat_priv, orig_node);
3010 3011 3012

	spin_unlock_bh(&orig_node->tt_lock);

3013
	/* Delete the tt_req_node from pending tt_requests list */
3014
	spin_lock_bh(&bat_priv->tt.req_list_lock);
3015
	hlist_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
3016
		if (!batadv_compare_eth(node->addr, resp_src))
3017
			continue;
3018
		hlist_del_init(&node->list);
3019 3020
		kfree(node);
	}
3021

3022
	spin_unlock_bh(&bat_priv->tt.req_list_lock);
3023 3024
out:
	if (orig_node)
3025
		batadv_orig_node_free_ref(orig_node);
3026 3027
}

3028
static void batadv_tt_roam_list_free(struct batadv_priv *bat_priv)
3029
{
3030
	struct batadv_tt_roam_node *node, *safe;
3031

3032
	spin_lock_bh(&bat_priv->tt.roam_list_lock);
3033

3034
	list_for_each_entry_safe(node, safe, &bat_priv->tt.roam_list, list) {
3035 3036 3037 3038
		list_del(&node->list);
		kfree(node);
	}

3039
	spin_unlock_bh(&bat_priv->tt.roam_list_lock);
3040 3041
}

3042
static void batadv_tt_roam_purge(struct batadv_priv *bat_priv)
3043
{
3044
	struct batadv_tt_roam_node *node, *safe;
3045

3046 3047
	spin_lock_bh(&bat_priv->tt.roam_list_lock);
	list_for_each_entry_safe(node, safe, &bat_priv->tt.roam_list, list) {
3048 3049
		if (!batadv_has_timed_out(node->first_time,
					  BATADV_ROAMING_MAX_TIME))
3050 3051 3052 3053 3054
			continue;

		list_del(&node->list);
		kfree(node);
	}
3055
	spin_unlock_bh(&bat_priv->tt.roam_list_lock);
3056 3057 3058 3059 3060 3061
}

/* This function checks whether the client already reached the
 * maximum number of possible roaming phases. In this case the ROAMING_ADV
 * will not be sent.
 *
3062 3063
 * returns true if the ROAMING_ADV can be sent, false otherwise
 */
3064
static bool batadv_tt_check_roam_count(struct batadv_priv *bat_priv, u8 *client)
3065
{
3066
	struct batadv_tt_roam_node *tt_roam_node;
3067 3068
	bool ret = false;

3069
	spin_lock_bh(&bat_priv->tt.roam_list_lock);
3070
	/* The new tt_req will be issued only if I'm not waiting for a
3071 3072
	 * reply from the same orig_node yet
	 */
3073
	list_for_each_entry(tt_roam_node, &bat_priv->tt.roam_list, list) {
3074
		if (!batadv_compare_eth(tt_roam_node->addr, client))
3075 3076
			continue;

3077
		if (batadv_has_timed_out(tt_roam_node->first_time,
3078
					 BATADV_ROAMING_MAX_TIME))
3079 3080
			continue;

3081
		if (!batadv_atomic_dec_not_zero(&tt_roam_node->counter))
3082 3083 3084 3085 3086 3087 3088 3089 3090 3091 3092 3093
			/* Sorry, you roamed too many times! */
			goto unlock;
		ret = true;
		break;
	}

	if (!ret) {
		tt_roam_node = kmalloc(sizeof(*tt_roam_node), GFP_ATOMIC);
		if (!tt_roam_node)
			goto unlock;

		tt_roam_node->first_time = jiffies;
3094 3095
		atomic_set(&tt_roam_node->counter,
			   BATADV_ROAMING_MAX_COUNT - 1);
3096
		ether_addr_copy(tt_roam_node->addr, client);
3097

3098
		list_add(&tt_roam_node->list, &bat_priv->tt.roam_list);
3099 3100 3101 3102
		ret = true;
	}

unlock:
3103
	spin_unlock_bh(&bat_priv->tt.roam_list_lock);
3104 3105 3106
	return ret;
}

3107 3108 3109 3110 3111 3112 3113 3114 3115 3116 3117 3118
/**
 * batadv_send_roam_adv - send a roaming advertisement message
 * @bat_priv: the bat priv with all the soft interface information
 * @client: mac address of the roaming client
 * @vid: VLAN identifier
 * @orig_node: message destination
 *
 * Send a ROAMING_ADV message to the node which was previously serving this
 * client. This is done to inform the node that from now on all traffic destined
 * for this particular roamed client has to be forwarded to the sender of the
 * roaming message.
 */
3119
static void batadv_send_roam_adv(struct batadv_priv *bat_priv, u8 *client,
3120
				 unsigned short vid,
3121
				 struct batadv_orig_node *orig_node)
3122
{
3123
	struct batadv_hard_iface *primary_if;
3124 3125 3126 3127 3128
	struct batadv_tvlv_roam_adv tvlv_roam;

	primary_if = batadv_primary_if_get_selected(bat_priv);
	if (!primary_if)
		goto out;
3129 3130

	/* before going on we have to check whether the client has
3131 3132
	 * already roamed to us too many times
	 */
3133
	if (!batadv_tt_check_roam_count(bat_priv, client))
3134 3135
		goto out;

3136
	batadv_dbg(BATADV_DBG_TT, bat_priv,
3137 3138
		   "Sending ROAMING_ADV to %pM (client %pM, vid: %d)\n",
		   orig_node->orig, client, BATADV_PRINT_VID(vid));
3139

3140
	batadv_inc_counter(bat_priv, BATADV_CNT_TT_ROAM_ADV_TX);
3141

3142
	memcpy(tvlv_roam.client, client, sizeof(tvlv_roam.client));
3143
	tvlv_roam.vid = htons(vid);
3144 3145 3146 3147

	batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
				 orig_node->orig, BATADV_TVLV_ROAM, 1,
				 &tvlv_roam, sizeof(tvlv_roam));
3148 3149

out:
3150 3151
	if (primary_if)
		batadv_hardif_free_ref(primary_if);
3152 3153
}

3154
static void batadv_tt_purge(struct work_struct *work)
3155
{
3156
	struct delayed_work *delayed_work;
3157
	struct batadv_priv_tt *priv_tt;
3158 3159 3160
	struct batadv_priv *bat_priv;

	delayed_work = container_of(work, struct delayed_work, work);
3161 3162
	priv_tt = container_of(delayed_work, struct batadv_priv_tt, work);
	bat_priv = container_of(priv_tt, struct batadv_priv, tt);
3163

3164
	batadv_tt_local_purge(bat_priv, BATADV_TT_LOCAL_TIMEOUT);
3165
	batadv_tt_global_purge(bat_priv);
3166 3167
	batadv_tt_req_purge(bat_priv);
	batadv_tt_roam_purge(bat_priv);
3168

3169 3170
	queue_delayed_work(batadv_event_workqueue, &bat_priv->tt.work,
			   msecs_to_jiffies(BATADV_TT_WORK_PERIOD));
3171
}
3172

3173
void batadv_tt_free(struct batadv_priv *bat_priv)
3174
{
3175 3176 3177
	batadv_tvlv_container_unregister(bat_priv, BATADV_TVLV_TT, 1);
	batadv_tvlv_handler_unregister(bat_priv, BATADV_TVLV_TT, 1);

3178
	cancel_delayed_work_sync(&bat_priv->tt.work);
3179

3180 3181 3182 3183 3184
	batadv_tt_local_table_free(bat_priv);
	batadv_tt_global_table_free(bat_priv);
	batadv_tt_req_list_free(bat_priv);
	batadv_tt_changes_list_free(bat_priv);
	batadv_tt_roam_list_free(bat_priv);
3185

3186
	kfree(bat_priv->tt.last_changeset);
3187
}
3188

3189 3190 3191 3192 3193 3194 3195
/**
 * batadv_tt_local_set_flags - set or unset the specified flags on the local
 *  table and possibly count them in the TT size
 * @bat_priv: the bat priv with all the soft interface information
 * @flags: the flag to switch
 * @enable: whether to set or unset the flag
 * @count: whether to increase the TT size by the number of changed entries
3196
 */
3197 3198
static void batadv_tt_local_set_flags(struct batadv_priv *bat_priv, u16 flags,
				      bool enable, bool count)
3199
{
3200 3201
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
	struct batadv_tt_common_entry *tt_common_entry;
3202
	u16 changed_num = 0;
3203
	struct hlist_head *head;
3204
	u32 i;
3205 3206

	if (!hash)
3207
		return;
3208 3209 3210 3211 3212

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

		rcu_read_lock();
3213
		hlist_for_each_entry_rcu(tt_common_entry,
3214
					 head, hash_entry) {
3215 3216 3217 3218 3219 3220 3221 3222 3223 3224
			if (enable) {
				if ((tt_common_entry->flags & flags) == flags)
					continue;
				tt_common_entry->flags |= flags;
			} else {
				if (!(tt_common_entry->flags & flags))
					continue;
				tt_common_entry->flags &= ~flags;
			}
			changed_num++;
3225 3226 3227 3228 3229 3230

			if (!count)
				continue;

			batadv_tt_local_size_inc(bat_priv,
						 tt_common_entry->vid);
3231 3232 3233 3234 3235
		}
		rcu_read_unlock();
	}
}

3236
/* Purge out all the tt local entries marked with BATADV_TT_CLIENT_PENDING */
3237
static void batadv_tt_local_purge_pending_clients(struct batadv_priv *bat_priv)
3238
{
3239
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
3240 3241
	struct batadv_tt_common_entry *tt_common;
	struct batadv_tt_local_entry *tt_local;
3242
	struct batadv_softif_vlan *vlan;
3243
	struct hlist_node *node_tmp;
3244 3245
	struct hlist_head *head;
	spinlock_t *list_lock; /* protects write access to the hash lists */
3246
	u32 i;
3247 3248 3249 3250 3251 3252 3253 3254 3255

	if (!hash)
		return;

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
		list_lock = &hash->list_locks[i];

		spin_lock_bh(list_lock);
3256
		hlist_for_each_entry_safe(tt_common, node_tmp, head,
3257 3258
					  hash_entry) {
			if (!(tt_common->flags & BATADV_TT_CLIENT_PENDING))
3259 3260
				continue;

3261
			batadv_dbg(BATADV_DBG_TT, bat_priv,
3262 3263 3264
				   "Deleting local tt entry (%pM, vid: %d): pending\n",
				   tt_common->addr,
				   BATADV_PRINT_VID(tt_common->vid));
3265

3266
			batadv_tt_local_size_dec(bat_priv, tt_common->vid);
3267
			hlist_del_rcu(&tt_common->hash_entry);
3268 3269 3270
			tt_local = container_of(tt_common,
						struct batadv_tt_local_entry,
						common);
3271 3272 3273

			/* decrease the reference held for this vlan */
			vlan = batadv_softif_vlan_get(bat_priv, tt_common->vid);
3274 3275 3276 3277
			if (vlan) {
				batadv_softif_vlan_free_ref(vlan);
				batadv_softif_vlan_free_ref(vlan);
			}
3278

3279
			batadv_tt_local_entry_free_ref(tt_local);
3280 3281 3282 3283 3284
		}
		spin_unlock_bh(list_lock);
	}
}

3285
/**
3286 3287
 * batadv_tt_local_commit_changes_nolock - commit all pending local tt changes
 *  which have been queued in the time since the last commit
3288
 * @bat_priv: the bat priv with all the soft interface information
3289 3290
 *
 * Caller must hold tt->commit_lock.
3291
 */
3292
static void batadv_tt_local_commit_changes_nolock(struct batadv_priv *bat_priv)
3293
{
3294 3295
	lockdep_assert_held(&bat_priv->tt.commit_lock);

3296 3297 3298
	/* Update multicast addresses in local translation table */
	batadv_mcast_mla_update(bat_priv);

3299 3300 3301
	if (atomic_read(&bat_priv->tt.local_changes) < 1) {
		if (!batadv_atomic_dec_not_zero(&bat_priv->tt.ogm_append_cnt))
			batadv_tt_tvlv_container_update(bat_priv);
3302
		return;
3303
	}
3304

3305
	batadv_tt_local_set_flags(bat_priv, BATADV_TT_CLIENT_NEW, false, true);
3306

3307
	batadv_tt_local_purge_pending_clients(bat_priv);
3308
	batadv_tt_local_update_crc(bat_priv);
3309 3310

	/* Increment the TTVN only once per OGM interval */
3311
	atomic_inc(&bat_priv->tt.vn);
3312
	batadv_dbg(BATADV_DBG_TT, bat_priv,
3313
		   "Local changes committed, updating to ttvn %u\n",
3314
		   (u8)atomic_read(&bat_priv->tt.vn));
3315 3316

	/* reset the sending counter */
3317
	atomic_set(&bat_priv->tt.ogm_append_cnt, BATADV_TT_OGM_APPEND_MAX);
3318
	batadv_tt_tvlv_container_update(bat_priv);
3319
}
3320

3321 3322 3323 3324 3325 3326 3327 3328 3329
/**
 * batadv_tt_local_commit_changes - commit all pending local tt changes which
 *  have been queued in the time since the last commit
 * @bat_priv: the bat priv with all the soft interface information
 */
void batadv_tt_local_commit_changes(struct batadv_priv *bat_priv)
{
	spin_lock_bh(&bat_priv->tt.commit_lock);
	batadv_tt_local_commit_changes_nolock(bat_priv);
3330
	spin_unlock_bh(&bat_priv->tt.commit_lock);
3331
}
3332

3333 3334
bool batadv_is_ap_isolated(struct batadv_priv *bat_priv, u8 *src, u8 *dst,
			   unsigned short vid)
3335
{
3336 3337
	struct batadv_tt_local_entry *tt_local_entry = NULL;
	struct batadv_tt_global_entry *tt_global_entry = NULL;
3338
	struct batadv_softif_vlan *vlan;
3339
	bool ret = false;
3340

3341 3342
	vlan = batadv_softif_vlan_get(bat_priv, vid);
	if (!vlan || !atomic_read(&vlan->ap_isolation))
3343
		goto out;
3344

3345
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, dst, vid);
3346 3347 3348
	if (!tt_local_entry)
		goto out;

3349
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, src, vid);
3350 3351 3352
	if (!tt_global_entry)
		goto out;

3353
	if (!_batadv_is_ap_isolated(tt_local_entry, tt_global_entry))
3354 3355
		goto out;

3356
	ret = true;
3357 3358

out:
3359
	batadv_softif_vlan_free_ref(vlan);
3360
	if (tt_global_entry)
3361
		batadv_tt_global_entry_free_ref(tt_global_entry);
3362
	if (tt_local_entry)
3363
		batadv_tt_local_entry_free_ref(tt_local_entry);
3364 3365
	return ret;
}
3366

3367 3368 3369 3370 3371
/**
 * batadv_tt_update_orig - update global translation table with new tt
 *  information received via ogms
 * @bat_priv: the bat priv with all the soft interface information
 * @orig: the orig_node of the ogm
3372 3373 3374
 * @tt_vlan: pointer to the first tvlv VLAN entry
 * @tt_num_vlan: number of tvlv VLAN entries
 * @tt_change: pointer to the first entry in the TT buffer
3375 3376
 * @tt_num_changes: number of tt changes inside the tt buffer
 * @ttvn: translation table version number of this changeset
3377
 * @tt_crc: crc32 checksum of orig node's translation table
3378 3379 3380
 */
static void batadv_tt_update_orig(struct batadv_priv *bat_priv,
				  struct batadv_orig_node *orig_node,
3381
				  const void *tt_buff, u16 tt_num_vlan,
3382
				  struct batadv_tvlv_tt_change *tt_change,
3383
				  u16 tt_num_changes, u8 ttvn)
3384
{
3385
	u8 orig_ttvn = (u8)atomic_read(&orig_node->last_ttvn);
3386
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
3387
	bool full_table = true;
3388
	bool has_tt_init;
3389

3390
	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)tt_buff;
3391 3392
	has_tt_init = test_bit(BATADV_ORIG_CAPA_HAS_TT,
			       &orig_node->capa_initialized);
3393

3394
	/* orig table not initialised AND first diff is in the OGM OR the ttvn
3395 3396
	 * increased by one -> we can apply the attached changes
	 */
3397
	if ((!has_tt_init && ttvn == 1) || ttvn - orig_ttvn == 1) {
3398
		/* the OGM could not contain the changes due to their size or
3399 3400
		 * because they have already been sent BATADV_TT_OGM_APPEND_MAX
		 * times.
3401 3402
		 * In this case send a tt request
		 */
3403 3404 3405 3406 3407
		if (!tt_num_changes) {
			full_table = false;
			goto request_table;
		}

3408 3409
		spin_lock_bh(&orig_node->tt_lock);

3410
		batadv_tt_update_changes(bat_priv, orig_node, tt_num_changes,
3411
					 ttvn, tt_change);
3412 3413 3414

		/* Even if we received the precomputed crc with the OGM, we
		 * prefer to recompute it to spot any possible inconsistency
3415 3416
		 * in the global table
		 */
3417
		batadv_tt_global_update_crc(bat_priv, orig_node);
3418

3419 3420
		spin_unlock_bh(&orig_node->tt_lock);

3421 3422 3423 3424 3425 3426 3427
		/* The ttvn alone is not enough to guarantee consistency
		 * because a single value could represent different states
		 * (due to the wrap around). Thus a node has to check whether
		 * the resulting table (after applying the changes) is still
		 * consistent or not. E.g. a node could disconnect while its
		 * ttvn is X and reconnect on ttvn = X + TTVN_MAX: in this case
		 * checking the CRC value is mandatory to detect the
3428 3429
		 * inconsistency
		 */
3430 3431
		if (!batadv_tt_global_check_crc(orig_node, tt_vlan,
						tt_num_vlan))
3432 3433 3434
			goto request_table;
	} else {
		/* if we missed more than one change or our tables are not
3435 3436
		 * in sync anymore -> request fresh tt data
		 */
3437
		if (!has_tt_init || ttvn != orig_ttvn ||
3438 3439
		    !batadv_tt_global_check_crc(orig_node, tt_vlan,
						tt_num_vlan)) {
3440
request_table:
3441
			batadv_dbg(BATADV_DBG_TT, bat_priv,
3442 3443 3444
				   "TT inconsistency for %pM. Need to retrieve the correct information (ttvn: %u last_ttvn: %u num_changes: %u)\n",
				   orig_node->orig, ttvn, orig_ttvn,
				   tt_num_changes);
3445
			batadv_send_tt_request(bat_priv, orig_node, ttvn,
3446 3447
					       tt_vlan, tt_num_vlan,
					       full_table);
3448 3449 3450 3451
			return;
		}
	}
}
3452

3453 3454 3455 3456 3457 3458 3459 3460 3461
/**
 * batadv_tt_global_client_is_roaming - check if a client is marked as roaming
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the mac address of the client to check
 * @vid: VLAN identifier
 *
 * Returns true if we know that the client has moved from its old originator
 * to another one. This entry is still kept for consistency purposes and will be
 * deleted later by a DEL or because of timeout
3462
 */
3463
bool batadv_tt_global_client_is_roaming(struct batadv_priv *bat_priv,
3464
					u8 *addr, unsigned short vid)
3465
{
3466
	struct batadv_tt_global_entry *tt_global_entry;
3467 3468
	bool ret = false;

3469
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
3470 3471 3472
	if (!tt_global_entry)
		goto out;

3473
	ret = tt_global_entry->common.flags & BATADV_TT_CLIENT_ROAM;
3474
	batadv_tt_global_entry_free_ref(tt_global_entry);
3475 3476 3477
out:
	return ret;
}
3478

3479 3480 3481
/**
 * batadv_tt_local_client_is_roaming - tells whether the client is roaming
 * @bat_priv: the bat priv with all the soft interface information
3482 3483
 * @addr: the mac address of the local client to query
 * @vid: VLAN identifier
3484 3485 3486 3487 3488 3489
 *
 * Returns true if the local client is known to be roaming (it is not served by
 * this node anymore) or not. If yes, the client is still present in the table
 * to keep the latter consistent with the node TTVN
 */
bool batadv_tt_local_client_is_roaming(struct batadv_priv *bat_priv,
3490
				       u8 *addr, unsigned short vid)
3491 3492 3493 3494
{
	struct batadv_tt_local_entry *tt_local_entry;
	bool ret = false;

3495
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
3496 3497 3498 3499 3500 3501 3502 3503 3504
	if (!tt_local_entry)
		goto out;

	ret = tt_local_entry->common.flags & BATADV_TT_CLIENT_ROAM;
	batadv_tt_local_entry_free_ref(tt_local_entry);
out:
	return ret;
}

3505 3506
bool batadv_tt_add_temporary_global_entry(struct batadv_priv *bat_priv,
					  struct batadv_orig_node *orig_node,
3507
					  const unsigned char *addr,
3508
					  unsigned short vid)
3509 3510 3511
{
	bool ret = false;

3512
	if (!batadv_tt_global_add(bat_priv, orig_node, addr, vid,
3513 3514 3515 3516 3517
				  BATADV_TT_CLIENT_TEMP,
				  atomic_read(&orig_node->last_ttvn)))
		goto out;

	batadv_dbg(BATADV_DBG_TT, bat_priv,
3518 3519
		   "Added temporary global client (addr: %pM, vid: %d, orig: %pM)\n",
		   addr, BATADV_PRINT_VID(vid), orig_node->orig);
3520 3521 3522 3523
	ret = true;
out:
	return ret;
}
3524

3525 3526 3527 3528 3529 3530 3531 3532 3533 3534 3535 3536 3537 3538 3539 3540 3541 3542 3543 3544 3545 3546 3547 3548 3549 3550 3551 3552 3553 3554 3555 3556 3557 3558 3559 3560 3561 3562 3563 3564 3565
/**
 * batadv_tt_local_resize_to_mtu - resize the local translation table fit the
 *  maximum packet size that can be transported through the mesh
 * @soft_iface: netdev struct of the mesh interface
 *
 * Remove entries older than 'timeout' and half timeout if more entries need
 * to be removed.
 */
void batadv_tt_local_resize_to_mtu(struct net_device *soft_iface)
{
	struct batadv_priv *bat_priv = netdev_priv(soft_iface);
	int packet_size_max = atomic_read(&bat_priv->packet_size_max);
	int table_size, timeout = BATADV_TT_LOCAL_TIMEOUT / 2;
	bool reduced = false;

	spin_lock_bh(&bat_priv->tt.commit_lock);

	while (true) {
		table_size = batadv_tt_local_table_transmit_size(bat_priv);
		if (packet_size_max >= table_size)
			break;

		batadv_tt_local_purge(bat_priv, timeout);
		batadv_tt_local_purge_pending_clients(bat_priv);

		timeout /= 2;
		reduced = true;
		net_ratelimited_function(batadv_info, soft_iface,
					 "Forced to purge local tt entries to fit new maximum fragment MTU (%i)\n",
					 packet_size_max);
	}

	/* commit these changes immediately, to avoid synchronization problem
	 * with the TTVN
	 */
	if (reduced)
		batadv_tt_local_commit_changes_nolock(bat_priv);

	spin_unlock_bh(&bat_priv->tt.commit_lock);
}

3566 3567 3568 3569 3570 3571 3572 3573 3574 3575
/**
 * batadv_tt_tvlv_ogm_handler_v1 - process incoming tt tvlv container
 * @bat_priv: the bat priv with all the soft interface information
 * @orig: the orig_node of the ogm
 * @flags: flags indicating the tvlv state (see batadv_tvlv_handler_flags)
 * @tvlv_value: tvlv buffer containing the gateway data
 * @tvlv_value_len: tvlv buffer length
 */
static void batadv_tt_tvlv_ogm_handler_v1(struct batadv_priv *bat_priv,
					  struct batadv_orig_node *orig,
3576 3577
					  u8 flags, void *tvlv_value,
					  u16 tvlv_value_len)
3578
{
3579 3580
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
	struct batadv_tvlv_tt_change *tt_change;
3581
	struct batadv_tvlv_tt_data *tt_data;
3582
	u16 num_entries, num_vlan;
3583 3584 3585 3586 3587 3588 3589

	if (tvlv_value_len < sizeof(*tt_data))
		return;

	tt_data = (struct batadv_tvlv_tt_data *)tvlv_value;
	tvlv_value_len -= sizeof(*tt_data);

3590 3591 3592 3593 3594 3595 3596 3597 3598
	num_vlan = ntohs(tt_data->num_vlan);

	if (tvlv_value_len < sizeof(*tt_vlan) * num_vlan)
		return;

	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(tt_data + 1);
	tt_change = (struct batadv_tvlv_tt_change *)(tt_vlan + num_vlan);
	tvlv_value_len -= sizeof(*tt_vlan) * num_vlan;

3599
	num_entries = batadv_tt_entries(tvlv_value_len);
3600

3601 3602
	batadv_tt_update_orig(bat_priv, orig, tt_vlan, num_vlan, tt_change,
			      num_entries, tt_data->ttvn);
3603 3604
}

3605 3606 3607 3608 3609 3610 3611 3612 3613 3614 3615 3616 3617
/**
 * batadv_tt_tvlv_unicast_handler_v1 - process incoming (unicast) tt tvlv
 *  container
 * @bat_priv: the bat priv with all the soft interface information
 * @src: mac address of tt tvlv sender
 * @dst: mac address of tt tvlv recipient
 * @tvlv_value: tvlv buffer containing the tt data
 * @tvlv_value_len: tvlv buffer length
 *
 * Returns NET_RX_DROP if the tt tvlv is to be re-routed, NET_RX_SUCCESS
 * otherwise.
 */
static int batadv_tt_tvlv_unicast_handler_v1(struct batadv_priv *bat_priv,
3618
					     u8 *src, u8 *dst,
3619
					     void *tvlv_value,
3620
					     u16 tvlv_value_len)
3621 3622
{
	struct batadv_tvlv_tt_data *tt_data;
3623
	u16 tt_vlan_len, tt_num_entries;
3624 3625 3626 3627 3628 3629 3630 3631 3632
	char tt_flag;
	bool ret;

	if (tvlv_value_len < sizeof(*tt_data))
		return NET_RX_SUCCESS;

	tt_data = (struct batadv_tvlv_tt_data *)tvlv_value;
	tvlv_value_len -= sizeof(*tt_data);

3633 3634 3635 3636 3637 3638 3639 3640
	tt_vlan_len = sizeof(struct batadv_tvlv_tt_vlan_data);
	tt_vlan_len *= ntohs(tt_data->num_vlan);

	if (tvlv_value_len < tt_vlan_len)
		return NET_RX_SUCCESS;

	tvlv_value_len -= tt_vlan_len;
	tt_num_entries = batadv_tt_entries(tvlv_value_len);
3641 3642 3643 3644 3645 3646 3647 3648 3649 3650 3651 3652 3653 3654 3655 3656 3657 3658 3659 3660 3661 3662 3663 3664 3665 3666 3667

	switch (tt_data->flags & BATADV_TT_DATA_TYPE_MASK) {
	case BATADV_TT_REQUEST:
		batadv_inc_counter(bat_priv, BATADV_CNT_TT_REQUEST_RX);

		/* If this node cannot provide a TT response the tt_request is
		 * forwarded
		 */
		ret = batadv_send_tt_response(bat_priv, tt_data, src, dst);
		if (!ret) {
			if (tt_data->flags & BATADV_TT_FULL_TABLE)
				tt_flag = 'F';
			else
				tt_flag = '.';

			batadv_dbg(BATADV_DBG_TT, bat_priv,
				   "Routing TT_REQUEST to %pM [%c]\n",
				   dst, tt_flag);
			/* tvlv API will re-route the packet */
			return NET_RX_DROP;
		}
		break;
	case BATADV_TT_RESPONSE:
		batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_RX);

		if (batadv_is_my_mac(bat_priv, dst)) {
			batadv_handle_tt_response(bat_priv, tt_data,
3668
						  src, tt_num_entries);
3669 3670 3671 3672 3673 3674 3675 3676 3677 3678 3679 3680 3681 3682 3683 3684 3685 3686
			return NET_RX_SUCCESS;
		}

		if (tt_data->flags & BATADV_TT_FULL_TABLE)
			tt_flag =  'F';
		else
			tt_flag = '.';

		batadv_dbg(BATADV_DBG_TT, bat_priv,
			   "Routing TT_RESPONSE to %pM [%c]\n", dst, tt_flag);

		/* tvlv API will re-route the packet */
		return NET_RX_DROP;
	}

	return NET_RX_SUCCESS;
}

3687 3688 3689 3690 3691 3692 3693 3694 3695 3696 3697 3698
/**
 * batadv_roam_tvlv_unicast_handler_v1 - process incoming tt roam tvlv container
 * @bat_priv: the bat priv with all the soft interface information
 * @src: mac address of tt tvlv sender
 * @dst: mac address of tt tvlv recipient
 * @tvlv_value: tvlv buffer containing the tt data
 * @tvlv_value_len: tvlv buffer length
 *
 * Returns NET_RX_DROP if the tt roam tvlv is to be re-routed, NET_RX_SUCCESS
 * otherwise.
 */
static int batadv_roam_tvlv_unicast_handler_v1(struct batadv_priv *bat_priv,
3699
					       u8 *src, u8 *dst,
3700
					       void *tvlv_value,
3701
					       u16 tvlv_value_len)
3702 3703 3704 3705 3706 3707 3708 3709 3710 3711 3712 3713 3714 3715 3716 3717 3718 3719 3720 3721 3722 3723 3724 3725 3726 3727
{
	struct batadv_tvlv_roam_adv *roaming_adv;
	struct batadv_orig_node *orig_node = NULL;

	/* If this node is not the intended recipient of the
	 * roaming advertisement the packet is forwarded
	 * (the tvlv API will re-route the packet).
	 */
	if (!batadv_is_my_mac(bat_priv, dst))
		return NET_RX_DROP;

	if (tvlv_value_len < sizeof(*roaming_adv))
		goto out;

	orig_node = batadv_orig_hash_find(bat_priv, src);
	if (!orig_node)
		goto out;

	batadv_inc_counter(bat_priv, BATADV_CNT_TT_ROAM_ADV_RX);
	roaming_adv = (struct batadv_tvlv_roam_adv *)tvlv_value;

	batadv_dbg(BATADV_DBG_TT, bat_priv,
		   "Received ROAMING_ADV from %pM (client %pM)\n",
		   src, roaming_adv->client);

	batadv_tt_global_add(bat_priv, orig_node, roaming_adv->client,
3728
			     ntohs(roaming_adv->vid), BATADV_TT_CLIENT_ROAM,
3729 3730 3731 3732 3733 3734 3735 3736
			     atomic_read(&orig_node->last_ttvn) + 1);

out:
	if (orig_node)
		batadv_orig_node_free_ref(orig_node);
	return NET_RX_SUCCESS;
}

3737 3738 3739 3740 3741 3742 3743 3744 3745 3746
/**
 * batadv_tt_init - initialise the translation table internals
 * @bat_priv: the bat priv with all the soft interface information
 *
 * Return 0 on success or negative error number in case of failure.
 */
int batadv_tt_init(struct batadv_priv *bat_priv)
{
	int ret;

3747 3748 3749
	/* synchronized flags must be remote */
	BUILD_BUG_ON(!(BATADV_TT_SYNC_MASK & BATADV_TT_REMOTE_MASK));

3750 3751 3752 3753 3754 3755 3756 3757 3758
	ret = batadv_tt_local_init(bat_priv);
	if (ret < 0)
		return ret;

	ret = batadv_tt_global_init(bat_priv);
	if (ret < 0)
		return ret;

	batadv_tvlv_handler_register(bat_priv, batadv_tt_tvlv_ogm_handler_v1,
3759 3760
				     batadv_tt_tvlv_unicast_handler_v1,
				     BATADV_TVLV_TT, 1, BATADV_NO_FLAGS);
3761

3762 3763 3764 3765
	batadv_tvlv_handler_register(bat_priv, NULL,
				     batadv_roam_tvlv_unicast_handler_v1,
				     BATADV_TVLV_ROAM, 1, BATADV_NO_FLAGS);

3766 3767 3768 3769 3770 3771
	INIT_DELAYED_WORK(&bat_priv->tt.work, batadv_tt_purge);
	queue_delayed_work(batadv_event_workqueue, &bat_priv->tt.work,
			   msecs_to_jiffies(BATADV_TT_WORK_PERIOD));

	return 1;
}
3772 3773 3774 3775 3776 3777 3778 3779 3780 3781 3782

/**
 * batadv_tt_global_is_isolated - check if a client is marked as isolated
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the mac address of the client
 * @vid: the identifier of the VLAN where this client is connected
 *
 * Returns true if the client is marked with the TT_CLIENT_ISOLA flag, false
 * otherwise
 */
bool batadv_tt_global_is_isolated(struct batadv_priv *bat_priv,
3783
				  const u8 *addr, unsigned short vid)
3784 3785 3786 3787 3788 3789 3790 3791 3792 3793 3794 3795 3796 3797
{
	struct batadv_tt_global_entry *tt;
	bool ret;

	tt = batadv_tt_global_hash_find(bat_priv, addr, vid);
	if (!tt)
		return false;

	ret = tt->common.flags & BATADV_TT_CLIENT_ISOLA;

	batadv_tt_global_entry_free_ref(tt);

	return ret;
}