translation-table.c 115.0 KB
Newer Older
1
/* Copyright (C) 2007-2016  B.A.T.M.A.N. contributors:
2
 *
3
 * Marek Lindner, Simon Wunderlich, Antonio Quartulli
4 5 6 7 8 9 10 11 12 13 14
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of version 2 of the GNU General Public
 * License as published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
 * General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
15
 * along with this program; if not, see <http://www.gnu.org/licenses/>.
16 17 18
 */

#include "translation-table.h"
19 20 21
#include "main.h"

#include <linux/atomic.h>
22
#include <linux/bitops.h>
23 24 25 26 27 28 29 30 31 32 33
#include <linux/bug.h>
#include <linux/byteorder/generic.h>
#include <linux/compiler.h>
#include <linux/crc32c.h>
#include <linux/errno.h>
#include <linux/etherdevice.h>
#include <linux/fs.h>
#include <linux/if_ether.h>
#include <linux/jhash.h>
#include <linux/jiffies.h>
#include <linux/kernel.h>
34
#include <linux/kref.h>
35 36 37 38 39 40 41 42 43 44 45 46 47 48
#include <linux/list.h>
#include <linux/lockdep.h>
#include <linux/netdevice.h>
#include <linux/rculist.h>
#include <linux/rcupdate.h>
#include <linux/seq_file.h>
#include <linux/slab.h>
#include <linux/spinlock.h>
#include <linux/stddef.h>
#include <linux/string.h>
#include <linux/workqueue.h>
#include <net/net_namespace.h>

#include "bridge_loop_avoidance.h"
49
#include "hard-interface.h"
50
#include "hash.h"
51
#include "multicast.h"
52 53 54
#include "originator.h"
#include "packet.h"
#include "soft-interface.h"
55

56 57 58 59
/* hash class keys */
static struct lock_class_key batadv_tt_local_hash_lock_class_key;
static struct lock_class_key batadv_tt_global_hash_lock_class_key;

60
static void batadv_send_roam_adv(struct batadv_priv *bat_priv, u8 *client,
61
				 unsigned short vid,
62
				 struct batadv_orig_node *orig_node);
63 64
static void batadv_tt_purge(struct work_struct *work);
static void
65
batadv_tt_global_del_orig_list(struct batadv_tt_global_entry *tt_global_entry);
66 67 68
static void batadv_tt_global_del(struct batadv_priv *bat_priv,
				 struct batadv_orig_node *orig_node,
				 const unsigned char *addr,
69 70
				 unsigned short vid, const char *message,
				 bool roaming);
71

72
/**
73 74 75
 * batadv_compare_tt - check if two TT entries are the same
 * @node: the list element pointer of the first TT entry
 * @data2: pointer to the tt_common_entry of the second TT entry
76
 *
77 78 79
 * Compare the MAC address and the VLAN ID of the two TT entries and check if
 * they are the same TT client.
 * Return: 1 if the two TT clients are the same, 0 otherwise
80
 */
81
static int batadv_compare_tt(const struct hlist_node *node, const void *data2)
82
{
83
	const void *data1 = container_of(node, struct batadv_tt_common_entry,
84
					 hash_entry);
85 86
	const struct batadv_tt_common_entry *tt1 = data1;
	const struct batadv_tt_common_entry *tt2 = data2;
87

88
	return (tt1->vid == tt2->vid) && batadv_compare_eth(data1, data2);
89 90
}

91 92 93 94 95
/**
 * batadv_choose_tt - return the index of the tt entry in the hash table
 * @data: pointer to the tt_common_entry object to map
 * @size: the size of the hash table
 *
96
 * Return: the hash index where the object represented by 'data' should be
97 98
 * stored at.
 */
99
static inline u32 batadv_choose_tt(const void *data, u32 size)
100 101
{
	struct batadv_tt_common_entry *tt;
102
	u32 hash = 0;
103 104

	tt = (struct batadv_tt_common_entry *)data;
105 106
	hash = jhash(&tt->addr, ETH_ALEN, hash);
	hash = jhash(&tt->vid, sizeof(tt->vid), hash);
107 108 109 110 111 112 113 114 115 116

	return hash % size;
}

/**
 * batadv_tt_hash_find - look for a client in the given hash table
 * @hash: the hash table to search
 * @addr: the mac address of the client to look for
 * @vid: VLAN identifier
 *
117
 * Return: a pointer to the tt_common struct belonging to the searched client if
118 119
 * found, NULL otherwise.
 */
120
static struct batadv_tt_common_entry *
121
batadv_tt_hash_find(struct batadv_hashtable *hash, const u8 *addr,
122
		    unsigned short vid)
123 124
{
	struct hlist_head *head;
125
	struct batadv_tt_common_entry to_search, *tt, *tt_tmp = NULL;
126
	u32 index;
127 128 129 130

	if (!hash)
		return NULL;

131
	ether_addr_copy(to_search.addr, addr);
132 133 134
	to_search.vid = vid;

	index = batadv_choose_tt(&to_search, hash->size);
135 136 137
	head = &hash->table[index];

	rcu_read_lock();
138 139 140 141 142
	hlist_for_each_entry_rcu(tt, head, hash_entry) {
		if (!batadv_compare_eth(tt, addr))
			continue;

		if (tt->vid != vid)
143 144
			continue;

145
		if (!kref_get_unless_zero(&tt->refcount))
146 147
			continue;

148
		tt_tmp = tt;
149 150 151 152
		break;
	}
	rcu_read_unlock();

153
	return tt_tmp;
154 155
}

156 157 158 159 160 161
/**
 * batadv_tt_local_hash_find - search the local table for a given client
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the mac address of the client to look for
 * @vid: VLAN identifier
 *
162
 * Return: a pointer to the corresponding tt_local_entry struct if the client is
163 164
 * found, NULL otherwise.
 */
165
static struct batadv_tt_local_entry *
166
batadv_tt_local_hash_find(struct batadv_priv *bat_priv, const u8 *addr,
167
			  unsigned short vid)
168
{
169 170
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_local_entry *tt_local_entry = NULL;
171

172 173
	tt_common_entry = batadv_tt_hash_find(bat_priv->tt.local_hash, addr,
					      vid);
174 175
	if (tt_common_entry)
		tt_local_entry = container_of(tt_common_entry,
176 177
					      struct batadv_tt_local_entry,
					      common);
178 179
	return tt_local_entry;
}
180

181 182 183 184 185 186
/**
 * batadv_tt_global_hash_find - search the global table for a given client
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the mac address of the client to look for
 * @vid: VLAN identifier
 *
187
 * Return: a pointer to the corresponding tt_global_entry struct if the client
188 189
 * is found, NULL otherwise.
 */
190
static struct batadv_tt_global_entry *
191
batadv_tt_global_hash_find(struct batadv_priv *bat_priv, const u8 *addr,
192
			   unsigned short vid)
193
{
194 195
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_global_entry *tt_global_entry = NULL;
196

197 198
	tt_common_entry = batadv_tt_hash_find(bat_priv->tt.global_hash, addr,
					      vid);
199 200
	if (tt_common_entry)
		tt_global_entry = container_of(tt_common_entry,
201 202
					       struct batadv_tt_global_entry,
					       common);
203
	return tt_global_entry;
204 205
}

206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225
/**
 * batadv_tt_local_entry_release - release tt_local_entry from lists and queue
 *  for free after rcu grace period
 * @ref: kref pointer of the nc_node
 */
static void batadv_tt_local_entry_release(struct kref *ref)
{
	struct batadv_tt_local_entry *tt_local_entry;

	tt_local_entry = container_of(ref, struct batadv_tt_local_entry,
				      common.refcount);

	kfree_rcu(tt_local_entry, common.rcu);
}

/**
 * batadv_tt_local_entry_free_ref - decrement the tt_local_entry refcounter and
 *  possibly release it
 * @tt_local_entry: tt_local_entry to be free'd
 */
226
static void
227
batadv_tt_local_entry_free_ref(struct batadv_tt_local_entry *tt_local_entry)
228
{
229 230
	kref_put(&tt_local_entry->common.refcount,
		 batadv_tt_local_entry_release);
231 232
}

233
/**
234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252
 * batadv_tt_global_entry_release - release tt_global_entry from lists and queue
 *  for free after rcu grace period
 * @ref: kref pointer of the nc_node
 */
static void batadv_tt_global_entry_release(struct kref *ref)
{
	struct batadv_tt_global_entry *tt_global_entry;

	tt_global_entry = container_of(ref, struct batadv_tt_global_entry,
				       common.refcount);

	batadv_tt_global_del_orig_list(tt_global_entry);
	kfree_rcu(tt_global_entry, common.rcu);
}

/**
 * batadv_tt_global_entry_free_ref - decrement the tt_global_entry refcounter
 *  and possibly release it
 * @tt_global_entry: tt_global_entry to be free'd
253
 */
254
static void
255
batadv_tt_global_entry_free_ref(struct batadv_tt_global_entry *tt_global_entry)
256
{
257 258
	kref_put(&tt_global_entry->common.refcount,
		 batadv_tt_global_entry_release);
259 260
}

261 262
/**
 * batadv_tt_global_hash_count - count the number of orig entries
263
 * @bat_priv: the bat priv with all the soft interface information
264 265 266
 * @addr: the mac address of the client to count entries for
 * @vid: VLAN identifier
 *
267
 * Return: the number of originators advertising the given address/data
268 269 270
 * (excluding ourself).
 */
int batadv_tt_global_hash_count(struct batadv_priv *bat_priv,
271
				const u8 *addr, unsigned short vid)
272 273 274 275 276 277 278 279 280 281 282 283 284 285
{
	struct batadv_tt_global_entry *tt_global_entry;
	int count;

	tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
	if (!tt_global_entry)
		return 0;

	count = atomic_read(&tt_global_entry->orig_list_count);
	batadv_tt_global_entry_free_ref(tt_global_entry);

	return count;
}

286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331
/**
 * batadv_tt_local_size_mod - change the size by v of the local table identified
 *  by vid
 * @bat_priv: the bat priv with all the soft interface information
 * @vid: the VLAN identifier of the sub-table to change
 * @v: the amount to sum to the local table size
 */
static void batadv_tt_local_size_mod(struct batadv_priv *bat_priv,
				     unsigned short vid, int v)
{
	struct batadv_softif_vlan *vlan;

	vlan = batadv_softif_vlan_get(bat_priv, vid);
	if (!vlan)
		return;

	atomic_add(v, &vlan->tt.num_entries);

	batadv_softif_vlan_free_ref(vlan);
}

/**
 * batadv_tt_local_size_inc - increase by one the local table size for the given
 *  vid
 * @bat_priv: the bat priv with all the soft interface information
 * @vid: the VLAN identifier
 */
static void batadv_tt_local_size_inc(struct batadv_priv *bat_priv,
				     unsigned short vid)
{
	batadv_tt_local_size_mod(bat_priv, vid, 1);
}

/**
 * batadv_tt_local_size_dec - decrease by one the local table size for the given
 *  vid
 * @bat_priv: the bat priv with all the soft interface information
 * @vid: the VLAN identifier
 */
static void batadv_tt_local_size_dec(struct batadv_priv *bat_priv,
				     unsigned short vid)
{
	batadv_tt_local_size_mod(bat_priv, vid, -1);
}

/**
332 333 334
 * batadv_tt_global_size_mod - change the size by v of the global table
 *  for orig_node identified by vid
 * @orig_node: the originator for which the table has to be modified
335 336 337 338 339 340 341 342 343 344 345 346 347 348
 * @vid: the VLAN identifier
 * @v: the amount to sum to the global table size
 */
static void batadv_tt_global_size_mod(struct batadv_orig_node *orig_node,
				      unsigned short vid, int v)
{
	struct batadv_orig_node_vlan *vlan;

	vlan = batadv_orig_node_vlan_new(orig_node, vid);
	if (!vlan)
		return;

	if (atomic_add_return(v, &vlan->tt.num_entries) == 0) {
		spin_lock_bh(&orig_node->vlan_list_lock);
349
		hlist_del_init_rcu(&vlan->list);
350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380
		spin_unlock_bh(&orig_node->vlan_list_lock);
		batadv_orig_node_vlan_free_ref(vlan);
	}

	batadv_orig_node_vlan_free_ref(vlan);
}

/**
 * batadv_tt_global_size_inc - increase by one the global table size for the
 *  given vid
 * @orig_node: the originator which global table size has to be decreased
 * @vid: the vlan identifier
 */
static void batadv_tt_global_size_inc(struct batadv_orig_node *orig_node,
				      unsigned short vid)
{
	batadv_tt_global_size_mod(orig_node, vid, 1);
}

/**
 * batadv_tt_global_size_dec - decrease by one the global table size for the
 *  given vid
 * @orig_node: the originator which global table size has to be decreased
 * @vid: the vlan identifier
 */
static void batadv_tt_global_size_dec(struct batadv_orig_node *orig_node,
				      unsigned short vid)
{
	batadv_tt_global_size_mod(orig_node, vid, -1);
}

381 382 383
/**
 * batadv_tt_orig_list_entry_release - release tt orig entry from lists and
 *  queue for free after rcu grace period
384
 * @ref: kref pointer of the tt orig entry
385
 */
386
static void batadv_tt_orig_list_entry_release(struct kref *ref)
387
{
388 389 390 391 392
	struct batadv_tt_orig_list_entry *orig_entry;

	orig_entry = container_of(ref, struct batadv_tt_orig_list_entry,
				  refcount);

393 394 395 396
	batadv_orig_node_free_ref(orig_entry->orig_node);
	kfree_rcu(orig_entry, rcu);
}

397 398 399 400 401
/**
 * batadv_tt_orig_list_entry_free_ref - decrement the tt orig entry refcounter
 *  and possibly release it
 * @orig_entry: tt orig entry to be free'd
 */
402
static void
403
batadv_tt_orig_list_entry_free_ref(struct batadv_tt_orig_list_entry *orig_entry)
404
{
405
	kref_put(&orig_entry->refcount, batadv_tt_orig_list_entry_release);
406 407
}

408 409 410 411 412 413
/**
 * batadv_tt_local_event - store a local TT event (ADD/DEL)
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_local_entry: the TT entry involved in the event
 * @event_flags: flags to store in the event structure
 */
414
static void batadv_tt_local_event(struct batadv_priv *bat_priv,
415
				  struct batadv_tt_local_entry *tt_local_entry,
416
				  u8 event_flags)
417
{
418
	struct batadv_tt_change_node *tt_change_node, *entry, *safe;
419
	struct batadv_tt_common_entry *common = &tt_local_entry->common;
420
	u8 flags = common->flags | event_flags;
421 422
	bool event_removed = false;
	bool del_op_requested, del_op_entry;
423 424 425 426 427

	tt_change_node = kmalloc(sizeof(*tt_change_node), GFP_ATOMIC);
	if (!tt_change_node)
		return;

428
	tt_change_node->change.flags = flags;
429 430
	memset(tt_change_node->change.reserved, 0,
	       sizeof(tt_change_node->change.reserved));
431
	ether_addr_copy(tt_change_node->change.addr, common->addr);
432
	tt_change_node->change.vid = htons(common->vid);
433

434
	del_op_requested = flags & BATADV_TT_CLIENT_DEL;
435 436

	/* check for ADD+DEL or DEL+ADD events */
437 438
	spin_lock_bh(&bat_priv->tt.changes_list_lock);
	list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
439
				 list) {
440
		if (!batadv_compare_eth(entry->change.addr, common->addr))
441 442 443 444 445 446 447 448 449
			continue;

		/* DEL+ADD in the same orig interval have no effect and can be
		 * removed to avoid silly behaviour on the receiver side. The
		 * other way around (ADD+DEL) can happen in case of roaming of
		 * a client still in the NEW state. Roaming of NEW clients is
		 * now possible due to automatically recognition of "temporary"
		 * clients
		 */
450
		del_op_entry = entry->change.flags & BATADV_TT_CLIENT_DEL;
451 452 453 454
		if (!del_op_requested && del_op_entry)
			goto del;
		if (del_op_requested && !del_op_entry)
			goto del;
455 456 457 458 459 460 461

		/* this is a second add in the same originator interval. It
		 * means that flags have been changed: update them!
		 */
		if (!del_op_requested && !del_op_entry)
			entry->change.flags = flags;

462 463 464 465
		continue;
del:
		list_del(&entry->list);
		kfree(entry);
466
		kfree(tt_change_node);
467 468 469 470
		event_removed = true;
		goto unlock;
	}

471
	/* track the change in the OGMinterval list */
472
	list_add_tail(&tt_change_node->list, &bat_priv->tt.changes_list);
473 474

unlock:
475
	spin_unlock_bh(&bat_priv->tt.changes_list_lock);
476

477
	if (event_removed)
478
		atomic_dec(&bat_priv->tt.local_changes);
479
	else
480
		atomic_inc(&bat_priv->tt.local_changes);
481 482
}

483 484 485 486
/**
 * batadv_tt_len - compute length in bytes of given number of tt changes
 * @changes_num: number of tt changes
 *
487
 * Return: computed length in bytes.
488 489
 */
static int batadv_tt_len(int changes_num)
490
{
491
	return changes_num * sizeof(struct batadv_tvlv_tt_change);
492 493
}

494 495 496 497
/**
 * batadv_tt_entries - compute the number of entries fitting in tt_len bytes
 * @tt_len: available space
 *
498
 * Return: the number of entries.
499
 */
500
static u16 batadv_tt_entries(u16 tt_len)
501 502 503 504
{
	return tt_len / batadv_tt_len(1);
}

505 506 507 508 509
/**
 * batadv_tt_local_table_transmit_size - calculates the local translation table
 *  size when transmitted over the air
 * @bat_priv: the bat priv with all the soft interface information
 *
510
 * Return: local translation table size in bytes.
511 512 513
 */
static int batadv_tt_local_table_transmit_size(struct batadv_priv *bat_priv)
{
514 515
	u16 num_vlan = 0;
	u16 tt_local_entries = 0;
516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534
	struct batadv_softif_vlan *vlan;
	int hdr_size;

	rcu_read_lock();
	hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
		num_vlan++;
		tt_local_entries += atomic_read(&vlan->tt.num_entries);
	}
	rcu_read_unlock();

	/* header size of tvlv encapsulated tt response payload */
	hdr_size = sizeof(struct batadv_unicast_tvlv_packet);
	hdr_size += sizeof(struct batadv_tvlv_hdr);
	hdr_size += sizeof(struct batadv_tvlv_tt_data);
	hdr_size += num_vlan * sizeof(struct batadv_tvlv_tt_vlan_data);

	return hdr_size + batadv_tt_len(tt_local_entries);
}

535
static int batadv_tt_local_init(struct batadv_priv *bat_priv)
536
{
537
	if (bat_priv->tt.local_hash)
538
		return 0;
539

540
	bat_priv->tt.local_hash = batadv_hash_new(1024);
541

542
	if (!bat_priv->tt.local_hash)
543
		return -ENOMEM;
544

545 546 547
	batadv_hash_set_lock_class(bat_priv->tt.local_hash,
				   &batadv_tt_local_hash_lock_class_key);

548
	return 0;
549 550
}

551 552 553 554 555
static void batadv_tt_global_free(struct batadv_priv *bat_priv,
				  struct batadv_tt_global_entry *tt_global,
				  const char *message)
{
	batadv_dbg(BATADV_DBG_TT, bat_priv,
556 557 558
		   "Deleting global tt entry %pM (vid: %d): %s\n",
		   tt_global->common.addr,
		   BATADV_PRINT_VID(tt_global->common.vid), message);
559 560

	batadv_hash_remove(bat_priv->tt.global_hash, batadv_compare_tt,
561
			   batadv_choose_tt, &tt_global->common);
562 563 564
	batadv_tt_global_entry_free_ref(tt_global);
}

565 566 567 568 569 570 571 572
/**
 * batadv_tt_local_add - add a new client to the local table or update an
 *  existing client
 * @soft_iface: netdev struct of the mesh interface
 * @addr: the mac address of the client to add
 * @vid: VLAN identifier
 * @ifindex: index of the interface where the client is connected to (useful to
 *  identify wireless clients)
573 574
 * @mark: the value contained in the skb->mark field of the received packet (if
 *  any)
575
 *
576
 * Return: true if the client was successfully added, false otherwise.
577
 */
578 579
bool batadv_tt_local_add(struct net_device *soft_iface, const u8 *addr,
			 unsigned short vid, int ifindex, u32 mark)
580
{
581
	struct batadv_priv *bat_priv = netdev_priv(soft_iface);
582
	struct batadv_tt_local_entry *tt_local;
583
	struct batadv_tt_global_entry *tt_global = NULL;
584
	struct batadv_softif_vlan *vlan;
585
	struct net_device *in_dev = NULL;
586
	struct hlist_head *head;
587
	struct batadv_tt_orig_list_entry *orig_entry;
588
	int hash_added, table_size, packet_size_max;
589 590
	bool ret = false;
	bool roamed_back = false;
591 592
	u8 remote_flags;
	u32 match_mark;
593

594 595 596
	if (ifindex != BATADV_NULL_IFINDEX)
		in_dev = dev_get_by_index(&init_net, ifindex);

597
	tt_local = batadv_tt_local_hash_find(bat_priv, addr, vid);
598 599 600

	if (!is_multicast_ether_addr(addr))
		tt_global = batadv_tt_global_hash_find(bat_priv, addr, vid);
601

602 603
	if (tt_local) {
		tt_local->last_seen = jiffies;
604 605
		if (tt_local->common.flags & BATADV_TT_CLIENT_PENDING) {
			batadv_dbg(BATADV_DBG_TT, bat_priv,
606 607
				   "Re-adding pending client %pM (vid: %d)\n",
				   addr, BATADV_PRINT_VID(vid));
608 609 610 611 612 613 614 615 616 617 618
			/* whatever the reason why the PENDING flag was set,
			 * this is a client which was enqueued to be removed in
			 * this orig_interval. Since it popped up again, the
			 * flag can be reset like it was never enqueued
			 */
			tt_local->common.flags &= ~BATADV_TT_CLIENT_PENDING;
			goto add_event;
		}

		if (tt_local->common.flags & BATADV_TT_CLIENT_ROAM) {
			batadv_dbg(BATADV_DBG_TT, bat_priv,
619 620
				   "Roaming client %pM (vid: %d) came back to its original location\n",
				   addr, BATADV_PRINT_VID(vid));
621 622 623 624 625 626 627 628 629
			/* the ROAM flag is set because this client roamed away
			 * and the node got a roaming_advertisement message. Now
			 * that the client popped up again at its original
			 * location such flag can be unset
			 */
			tt_local->common.flags &= ~BATADV_TT_CLIENT_ROAM;
			roamed_back = true;
		}
		goto check_roaming;
630 631
	}

632 633 634 635 636 637 638 639 640 641 642
	/* Ignore the client if we cannot send it in a full table response. */
	table_size = batadv_tt_local_table_transmit_size(bat_priv);
	table_size += batadv_tt_len(1);
	packet_size_max = atomic_read(&bat_priv->packet_size_max);
	if (table_size > packet_size_max) {
		net_ratelimited_function(batadv_info, soft_iface,
					 "Local translation table size (%i) exceeds maximum packet size (%i); Ignoring new local tt entry: %pM\n",
					 table_size, packet_size_max, addr);
		goto out;
	}

643 644
	tt_local = kmalloc(sizeof(*tt_local), GFP_ATOMIC);
	if (!tt_local)
645
		goto out;
646

647 648
	/* increase the refcounter of the related vlan */
	vlan = batadv_softif_vlan_get(bat_priv, vid);
649
	if (WARN(!vlan, "adding TT local entry %pM to non-existent VLAN %d",
650 651 652
		 addr, BATADV_PRINT_VID(vid))) {
		kfree(tt_local);
		tt_local = NULL;
653
		goto out;
654
	}
655

656
	batadv_dbg(BATADV_DBG_TT, bat_priv,
657 658
		   "Creating new local tt entry: %pM (vid: %d, ttvn: %d)\n",
		   addr, BATADV_PRINT_VID(vid),
659
		   (u8)atomic_read(&bat_priv->tt.vn));
660

661
	ether_addr_copy(tt_local->common.addr, addr);
662 663 664 665 666
	/* The local entry has to be marked as NEW to avoid to send it in
	 * a full table response going out before the next ttvn increment
	 * (consistency check)
	 */
	tt_local->common.flags = BATADV_TT_CLIENT_NEW;
667
	tt_local->common.vid = vid;
668
	if (batadv_is_wifi_netdev(in_dev))
669
		tt_local->common.flags |= BATADV_TT_CLIENT_WIFI;
670 671
	kref_init(&tt_local->common.refcount);
	kref_get(&tt_local->common.refcount);
672 673
	tt_local->last_seen = jiffies;
	tt_local->common.added_at = tt_local->last_seen;
674

675 676 677 678 679
	/* the batman interface mac and multicast addresses should never be
	 * purged
	 */
	if (batadv_compare_eth(addr, soft_iface->dev_addr) ||
	    is_multicast_ether_addr(addr))
680
		tt_local->common.flags |= BATADV_TT_CLIENT_NOPURGE;
681

682
	hash_added = batadv_hash_add(bat_priv->tt.local_hash, batadv_compare_tt,
683
				     batadv_choose_tt, &tt_local->common,
684
				     &tt_local->common.hash_entry);
685 686 687

	if (unlikely(hash_added != 0)) {
		/* remove the reference for the hash */
688
		batadv_tt_local_entry_free_ref(tt_local);
689
		batadv_softif_vlan_free_ref(vlan);
690 691 692
		goto out;
	}

693
add_event:
694
	batadv_tt_local_event(bat_priv, tt_local, BATADV_NO_FLAGS);
695

696 697 698 699 700
check_roaming:
	/* Check whether it is a roaming, but don't do anything if the roaming
	 * process has already been handled
	 */
	if (tt_global && !(tt_global->common.flags & BATADV_TT_CLIENT_ROAM)) {
701
		/* These node are probably going to update their tt table */
702
		head = &tt_global->orig_list;
703
		rcu_read_lock();
704
		hlist_for_each_entry_rcu(orig_entry, head, list) {
705
			batadv_send_roam_adv(bat_priv, tt_global->common.addr,
706
					     tt_global->common.vid,
707
					     orig_entry->orig_node);
708 709
		}
		rcu_read_unlock();
710 711 712 713 714 715 716 717 718 719 720
		if (roamed_back) {
			batadv_tt_global_free(bat_priv, tt_global,
					      "Roaming canceled");
			tt_global = NULL;
		} else {
			/* The global entry has to be marked as ROAMING and
			 * has to be kept for consistency purpose
			 */
			tt_global->common.flags |= BATADV_TT_CLIENT_ROAM;
			tt_global->roam_at = jiffies;
		}
721
	}
722

723 724 725 726 727 728 729 730 731
	/* store the current remote flags before altering them. This helps
	 * understanding is flags are changing or not
	 */
	remote_flags = tt_local->common.flags & BATADV_TT_REMOTE_MASK;

	if (batadv_is_wifi_netdev(in_dev))
		tt_local->common.flags |= BATADV_TT_CLIENT_WIFI;
	else
		tt_local->common.flags &= ~BATADV_TT_CLIENT_WIFI;
732

733 734 735 736 737 738 739 740 741 742 743
	/* check the mark in the skb: if it's equal to the configured
	 * isolation_mark, it means the packet is coming from an isolated
	 * non-mesh client
	 */
	match_mark = (mark & bat_priv->isolation_mark_mask);
	if (bat_priv->isolation_mark_mask &&
	    match_mark == bat_priv->isolation_mark)
		tt_local->common.flags |= BATADV_TT_CLIENT_ISOLA;
	else
		tt_local->common.flags &= ~BATADV_TT_CLIENT_ISOLA;

744 745 746 747 748 749 750
	/* if any "dynamic" flag has been modified, resend an ADD event for this
	 * entry so that all the nodes can get the new flags
	 */
	if (remote_flags ^ (tt_local->common.flags & BATADV_TT_REMOTE_MASK))
		batadv_tt_local_event(bat_priv, tt_local, BATADV_NO_FLAGS);

	ret = true;
751
out:
752 753
	if (in_dev)
		dev_put(in_dev);
754 755 756 757
	if (tt_local)
		batadv_tt_local_entry_free_ref(tt_local);
	if (tt_global)
		batadv_tt_global_entry_free_ref(tt_global);
758
	return ret;
759 760
}

761 762 763 764 765 766 767 768 769 770 771 772 773 774 775
/**
 * batadv_tt_prepare_tvlv_global_data - prepare the TVLV TT header to send
 *  within a TT Response directed to another node
 * @orig_node: originator for which the TT data has to be prepared
 * @tt_data: uninitialised pointer to the address of the TVLV buffer
 * @tt_change: uninitialised pointer to the address of the area where the TT
 *  changed can be stored
 * @tt_len: pointer to the length to reserve to the tt_change. if -1 this
 *  function reserves the amount of space needed to send the entire global TT
 *  table. In case of success the value is updated with the real amount of
 *  reserved bytes
 * Allocate the needed amount of memory for the entire TT TVLV and write its
 * header made up by one tvlv_tt_data object and a series of tvlv_tt_vlan_data
 * objects, one per active VLAN served by the originator node.
 *
776
 * Return: the size of the allocated buffer or 0 in case of failure.
777
 */
778
static u16
779 780 781
batadv_tt_prepare_tvlv_global_data(struct batadv_orig_node *orig_node,
				   struct batadv_tvlv_tt_data **tt_data,
				   struct batadv_tvlv_tt_change **tt_change,
782
				   s32 *tt_len)
783
{
784 785 786 787
	u16 num_vlan = 0;
	u16 num_entries = 0;
	u16 change_offset;
	u16 tvlv_len;
788 789
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
	struct batadv_orig_node_vlan *vlan;
790
	u8 *tt_change_ptr;
791 792

	rcu_read_lock();
793
	hlist_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) {
794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818
		num_vlan++;
		num_entries += atomic_read(&vlan->tt.num_entries);
	}

	change_offset = sizeof(**tt_data);
	change_offset += num_vlan * sizeof(*tt_vlan);

	/* if tt_len is negative, allocate the space needed by the full table */
	if (*tt_len < 0)
		*tt_len = batadv_tt_len(num_entries);

	tvlv_len = *tt_len;
	tvlv_len += change_offset;

	*tt_data = kmalloc(tvlv_len, GFP_ATOMIC);
	if (!*tt_data) {
		*tt_len = 0;
		goto out;
	}

	(*tt_data)->flags = BATADV_NO_FLAGS;
	(*tt_data)->ttvn = atomic_read(&orig_node->last_ttvn);
	(*tt_data)->num_vlan = htons(num_vlan);

	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(*tt_data + 1);
819
	hlist_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) {
820 821 822 823 824 825
		tt_vlan->vid = htons(vlan->vid);
		tt_vlan->crc = htonl(vlan->tt.crc);

		tt_vlan++;
	}

826
	tt_change_ptr = (u8 *)*tt_data + change_offset;
827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849
	*tt_change = (struct batadv_tvlv_tt_change *)tt_change_ptr;

out:
	rcu_read_unlock();
	return tvlv_len;
}

/**
 * batadv_tt_prepare_tvlv_local_data - allocate and prepare the TT TVLV for this
 *  node
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: uninitialised pointer to the address of the TVLV buffer
 * @tt_change: uninitialised pointer to the address of the area where the TT
 *  changes can be stored
 * @tt_len: pointer to the length to reserve to the tt_change. if -1 this
 *  function reserves the amount of space needed to send the entire local TT
 *  table. In case of success the value is updated with the real amount of
 *  reserved bytes
 *
 * Allocate the needed amount of memory for the entire TT TVLV and write its
 * header made up by one tvlv_tt_data object and a series of tvlv_tt_vlan_data
 * objects, one per active VLAN.
 *
850
 * Return: the size of the allocated buffer or 0 in case of failure.
851
 */
852
static u16
853 854 855
batadv_tt_prepare_tvlv_local_data(struct batadv_priv *bat_priv,
				  struct batadv_tvlv_tt_data **tt_data,
				  struct batadv_tvlv_tt_change **tt_change,
856
				  s32 *tt_len)
857 858 859
{
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
	struct batadv_softif_vlan *vlan;
860 861 862
	u16 num_vlan = 0;
	u16 num_entries = 0;
	u16 tvlv_len;
863
	u8 *tt_change_ptr;
864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899
	int change_offset;

	rcu_read_lock();
	hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
		num_vlan++;
		num_entries += atomic_read(&vlan->tt.num_entries);
	}

	change_offset = sizeof(**tt_data);
	change_offset += num_vlan * sizeof(*tt_vlan);

	/* if tt_len is negative, allocate the space needed by the full table */
	if (*tt_len < 0)
		*tt_len = batadv_tt_len(num_entries);

	tvlv_len = *tt_len;
	tvlv_len += change_offset;

	*tt_data = kmalloc(tvlv_len, GFP_ATOMIC);
	if (!*tt_data) {
		tvlv_len = 0;
		goto out;
	}

	(*tt_data)->flags = BATADV_NO_FLAGS;
	(*tt_data)->ttvn = atomic_read(&bat_priv->tt.vn);
	(*tt_data)->num_vlan = htons(num_vlan);

	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(*tt_data + 1);
	hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
		tt_vlan->vid = htons(vlan->vid);
		tt_vlan->crc = htonl(vlan->tt.crc);

		tt_vlan++;
	}

900
	tt_change_ptr = (u8 *)*tt_data + change_offset;
901 902 903 904 905 906 907
	*tt_change = (struct batadv_tvlv_tt_change *)tt_change_ptr;

out:
	rcu_read_unlock();
	return tvlv_len;
}

908 909 910 911 912 913
/**
 * batadv_tt_tvlv_container_update - update the translation table tvlv container
 *  after local tt changes have been committed
 * @bat_priv: the bat priv with all the soft interface information
 */
static void batadv_tt_tvlv_container_update(struct batadv_priv *bat_priv)
914
{
915 916 917
	struct batadv_tt_change_node *entry, *safe;
	struct batadv_tvlv_tt_data *tt_data;
	struct batadv_tvlv_tt_change *tt_change;
918
	int tt_diff_len, tt_change_len = 0;
919 920
	int tt_diff_entries_num = 0;
	int tt_diff_entries_count = 0;
921
	u16 tvlv_len;
922

923 924
	tt_diff_entries_num = atomic_read(&bat_priv->tt.local_changes);
	tt_diff_len = batadv_tt_len(tt_diff_entries_num);
925 926 927 928

	/* if we have too many changes for one packet don't send any
	 * and wait for the tt table request which will be fragmented
	 */
929 930
	if (tt_diff_len > bat_priv->soft_iface->mtu)
		tt_diff_len = 0;
931

932 933 934
	tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv, &tt_data,
						     &tt_change, &tt_diff_len);
	if (!tvlv_len)
935
		return;
936

937
	tt_data->flags = BATADV_TT_OGM_DIFF;
938

939 940
	if (tt_diff_len == 0)
		goto container_register;
941

942 943
	spin_lock_bh(&bat_priv->tt.changes_list_lock);
	atomic_set(&bat_priv->tt.local_changes, 0);
944

945
	list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
946
				 list) {
947 948 949 950 951
		if (tt_diff_entries_count < tt_diff_entries_num) {
			memcpy(tt_change + tt_diff_entries_count,
			       &entry->change,
			       sizeof(struct batadv_tvlv_tt_change));
			tt_diff_entries_count++;
952
		}
953 954
		list_del(&entry->list);
		kfree(entry);
955
	}
956
	spin_unlock_bh(&bat_priv->tt.changes_list_lock);
957 958

	/* Keep the buffer for possible tt_request */
959 960 961 962
	spin_lock_bh(&bat_priv->tt.last_changeset_lock);
	kfree(bat_priv->tt.last_changeset);
	bat_priv->tt.last_changeset_len = 0;
	bat_priv->tt.last_changeset = NULL;
963
	tt_change_len = batadv_tt_len(tt_diff_entries_count);
964
	/* check whether this new OGM has no changes due to size problems */
965
	if (tt_diff_entries_count > 0) {
966
		/* if kmalloc() fails we will reply with the full table
967 968
		 * instead of providing the diff
		 */
969
		bat_priv->tt.last_changeset = kzalloc(tt_diff_len, GFP_ATOMIC);
970
		if (bat_priv->tt.last_changeset) {
971 972 973
			memcpy(bat_priv->tt.last_changeset,
			       tt_change, tt_change_len);
			bat_priv->tt.last_changeset_len = tt_diff_len;
974 975
		}
	}
976
	spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
977

978 979
container_register:
	batadv_tvlv_container_register(bat_priv, BATADV_TVLV_TT, 1, tt_data,
980
				       tvlv_len);
981
	kfree(tt_data);
982 983
}

984
int batadv_tt_local_seq_print_text(struct seq_file *seq, void *offset)
985 986
{
	struct net_device *net_dev = (struct net_device *)seq->private;
987
	struct batadv_priv *bat_priv = netdev_priv(net_dev);
988
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
989
	struct batadv_tt_common_entry *tt_common_entry;
990
	struct batadv_tt_local_entry *tt_local;
991
	struct batadv_hard_iface *primary_if;
992
	struct batadv_softif_vlan *vlan;
993
	struct hlist_head *head;
994
	unsigned short vid;
995
	u32 i;
996 997 998 999
	int last_seen_secs;
	int last_seen_msecs;
	unsigned long last_seen_jiffies;
	bool no_purge;
1000
	u16 np_flag = BATADV_TT_CLIENT_NOPURGE;
1001

1002 1003
	primary_if = batadv_seq_print_text_primary_if_get(seq);
	if (!primary_if)
1004
		goto out;
1005

1006
	seq_printf(seq,
1007
		   "Locally retrieved addresses (from %s) announced via TT (TTVN: %u):\n",
1008
		   net_dev->name, (u8)atomic_read(&bat_priv->tt.vn));
1009
	seq_printf(seq, "       %-13s  %s %-8s %-9s (%-10s)\n", "Client", "VID",
1010
		   "Flags", "Last seen", "CRC");
1011 1012 1013 1014

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

1015
		rcu_read_lock();
1016
		hlist_for_each_entry_rcu(tt_common_entry,
1017
					 head, hash_entry) {
1018 1019 1020
			tt_local = container_of(tt_common_entry,
						struct batadv_tt_local_entry,
						common);
1021
			vid = tt_common_entry->vid;
1022 1023 1024 1025 1026 1027 1028
			last_seen_jiffies = jiffies - tt_local->last_seen;
			last_seen_msecs = jiffies_to_msecs(last_seen_jiffies);
			last_seen_secs = last_seen_msecs / 1000;
			last_seen_msecs = last_seen_msecs % 1000;

			no_purge = tt_common_entry->flags & np_flag;

1029 1030 1031 1032 1033 1034 1035 1036
			vlan = batadv_softif_vlan_get(bat_priv, vid);
			if (!vlan) {
				seq_printf(seq, "Cannot retrieve VLAN %d\n",
					   BATADV_PRINT_VID(vid));
				continue;
			}

			seq_printf(seq,
1037
				   " * %pM %4i [%c%c%c%c%c%c] %3u.%03u   (%#.8x)\n",
1038
				   tt_common_entry->addr,
1039
				   BATADV_PRINT_VID(tt_common_entry->vid),
1040 1041
				   ((tt_common_entry->flags &
				     BATADV_TT_CLIENT_ROAM) ? 'R' : '.'),
1042
				   no_purge ? 'P' : '.',
1043 1044 1045 1046 1047 1048 1049 1050
				   ((tt_common_entry->flags &
				     BATADV_TT_CLIENT_NEW) ? 'N' : '.'),
				   ((tt_common_entry->flags &
				     BATADV_TT_CLIENT_PENDING) ? 'X' : '.'),
				   ((tt_common_entry->flags &
				     BATADV_TT_CLIENT_WIFI) ? 'W' : '.'),
				   ((tt_common_entry->flags &
				     BATADV_TT_CLIENT_ISOLA) ? 'I' : '.'),
1051
				   no_purge ? 0 : last_seen_secs,
1052 1053 1054 1055
				   no_purge ? 0 : last_seen_msecs,
				   vlan->tt.crc);

			batadv_softif_vlan_free_ref(vlan);
1056
		}
1057
		rcu_read_unlock();
1058
	}
1059 1060
out:
	if (primary_if)
1061
		batadv_hardif_free_ref(primary_if);
1062
	return 0;
1063 1064
}

1065 1066 1067
static void
batadv_tt_local_set_pending(struct batadv_priv *bat_priv,
			    struct batadv_tt_local_entry *tt_local_entry,
1068
			    u16 flags, const char *message)
1069
{
1070
	batadv_tt_local_event(bat_priv, tt_local_entry, flags);
1071

1072 1073
	/* The local client has to be marked as "pending to be removed" but has
	 * to be kept in the table in order to send it in a full table
1074 1075
	 * response issued before the net ttvn increment (consistency check)
	 */
1076
	tt_local_entry->common.flags |= BATADV_TT_CLIENT_PENDING;
1077

1078
	batadv_dbg(BATADV_DBG_TT, bat_priv,
1079 1080 1081
		   "Local tt entry (%pM, vid: %d) pending to be removed: %s\n",
		   tt_local_entry->common.addr,
		   BATADV_PRINT_VID(tt_local_entry->common.vid), message);
1082 1083
}

1084 1085 1086 1087
/**
 * batadv_tt_local_remove - logically remove an entry from the local table
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the MAC address of the client to remove
1088
 * @vid: VLAN identifier
1089 1090 1091
 * @message: message to append to the log on deletion
 * @roaming: true if the deletion is due to a roaming event
 *
1092
 * Return: the flags assigned to the local entry before being deleted
1093
 */
1094 1095 1096
u16 batadv_tt_local_remove(struct batadv_priv *bat_priv, const u8 *addr,
			   unsigned short vid, const char *message,
			   bool roaming)
1097
{
1098
	struct batadv_tt_local_entry *tt_local_entry;
1099
	u16 flags, curr_flags = BATADV_NO_FLAGS;
1100
	struct batadv_softif_vlan *vlan;
1101
	void *tt_entry_exists;
1102

1103
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
1104 1105 1106
	if (!tt_local_entry)
		goto out;

1107 1108
	curr_flags = tt_local_entry->common.flags;

1109
	flags = BATADV_TT_CLIENT_DEL;
1110 1111 1112 1113
	/* if this global entry addition is due to a roaming, the node has to
	 * mark the local entry as "roamed" in order to correctly reroute
	 * packets later
	 */
1114
	if (roaming) {
1115
		flags |= BATADV_TT_CLIENT_ROAM;
1116 1117 1118
		/* mark the local client as ROAMed */
		tt_local_entry->common.flags |= BATADV_TT_CLIENT_ROAM;
	}
1119

1120 1121 1122 1123 1124 1125 1126 1127
	if (!(tt_local_entry->common.flags & BATADV_TT_CLIENT_NEW)) {
		batadv_tt_local_set_pending(bat_priv, tt_local_entry, flags,
					    message);
		goto out;
	}
	/* if this client has been added right now, it is possible to
	 * immediately purge it
	 */
1128
	batadv_tt_local_event(bat_priv, tt_local_entry, BATADV_TT_CLIENT_DEL);
1129 1130 1131 1132 1133 1134 1135 1136 1137

	tt_entry_exists = batadv_hash_remove(bat_priv->tt.local_hash,
					     batadv_compare_tt,
					     batadv_choose_tt,
					     &tt_local_entry->common);
	if (!tt_entry_exists)
		goto out;

	/* extra call to free the local tt entry */
1138
	batadv_tt_local_entry_free_ref(tt_local_entry);
1139

1140 1141
	/* decrease the reference held for this vlan */
	vlan = batadv_softif_vlan_get(bat_priv, vid);
1142 1143 1144
	if (!vlan)
		goto out;

1145 1146 1147
	batadv_softif_vlan_free_ref(vlan);
	batadv_softif_vlan_free_ref(vlan);

1148 1149
out:
	if (tt_local_entry)
1150
		batadv_tt_local_entry_free_ref(tt_local_entry);
1151 1152

	return curr_flags;
1153 1154
}

1155 1156 1157 1158 1159 1160 1161
/**
 * batadv_tt_local_purge_list - purge inactive tt local entries
 * @bat_priv: the bat priv with all the soft interface information
 * @head: pointer to the list containing the local tt entries
 * @timeout: parameter deciding whether a given tt local entry is considered
 *  inactive or not
 */
1162
static void batadv_tt_local_purge_list(struct batadv_priv *bat_priv,
1163 1164
				       struct hlist_head *head,
				       int timeout)
1165
{
1166 1167
	struct batadv_tt_local_entry *tt_local_entry;
	struct batadv_tt_common_entry *tt_common_entry;
1168
	struct hlist_node *node_tmp;
1169

1170
	hlist_for_each_entry_safe(tt_common_entry, node_tmp, head,
1171 1172
				  hash_entry) {
		tt_local_entry = container_of(tt_common_entry,
1173 1174
					      struct batadv_tt_local_entry,
					      common);
1175 1176 1177 1178 1179 1180 1181
		if (tt_local_entry->common.flags & BATADV_TT_CLIENT_NOPURGE)
			continue;

		/* entry already marked for deletion */
		if (tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING)
			continue;

1182
		if (!batadv_has_timed_out(tt_local_entry->last_seen, timeout))
1183 1184 1185 1186 1187 1188 1189
			continue;

		batadv_tt_local_set_pending(bat_priv, tt_local_entry,
					    BATADV_TT_CLIENT_DEL, "timed out");
	}
}

1190 1191 1192 1193 1194 1195 1196 1197
/**
 * batadv_tt_local_purge - purge inactive tt local entries
 * @bat_priv: the bat priv with all the soft interface information
 * @timeout: parameter deciding whether a given tt local entry is considered
 *  inactive or not
 */
static void batadv_tt_local_purge(struct batadv_priv *bat_priv,
				  int timeout)
1198
{
1199
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
1200
	struct hlist_head *head;
1201
	spinlock_t *list_lock; /* protects write access to the hash lists */
1202
	u32 i;
1203 1204 1205

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
1206
		list_lock = &hash->list_locks[i];
1207

1208
		spin_lock_bh(list_lock);
1209
		batadv_tt_local_purge_list(bat_priv, head, timeout);
1210
		spin_unlock_bh(list_lock);
1211 1212 1213
	}
}

1214
static void batadv_tt_local_table_free(struct batadv_priv *bat_priv)
1215
{
1216
	struct batadv_hashtable *hash;
1217
	spinlock_t *list_lock; /* protects write access to the hash lists */
1218 1219
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_local_entry *tt_local;
1220
	struct batadv_softif_vlan *vlan;
1221
	struct hlist_node *node_tmp;
1222
	struct hlist_head *head;
1223
	u32 i;
1224

1225
	if (!bat_priv->tt.local_hash)
1226 1227
		return;

1228
	hash = bat_priv->tt.local_hash;
1229 1230 1231 1232 1233 1234

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
		list_lock = &hash->list_locks[i];

		spin_lock_bh(list_lock);
1235
		hlist_for_each_entry_safe(tt_common_entry, node_tmp,
1236
					  head, hash_entry) {
1237
			hlist_del_rcu(&tt_common_entry->hash_entry);
1238 1239 1240
			tt_local = container_of(tt_common_entry,
						struct batadv_tt_local_entry,
						common);
1241 1242 1243 1244

			/* decrease the reference held for this vlan */
			vlan = batadv_softif_vlan_get(bat_priv,
						      tt_common_entry->vid);
1245 1246 1247 1248
			if (vlan) {
				batadv_softif_vlan_free_ref(vlan);
				batadv_softif_vlan_free_ref(vlan);
			}
1249

1250
			batadv_tt_local_entry_free_ref(tt_local);
1251 1252 1253 1254
		}
		spin_unlock_bh(list_lock);
	}

1255
	batadv_hash_destroy(hash);
1256

1257
	bat_priv->tt.local_hash = NULL;
1258 1259
}

1260
static int batadv_tt_global_init(struct batadv_priv *bat_priv)
1261
{
1262
	if (bat_priv->tt.global_hash)
1263
		return 0;
1264

1265
	bat_priv->tt.global_hash = batadv_hash_new(1024);
1266

1267
	if (!bat_priv->tt.global_hash)
1268
		return -ENOMEM;
1269

1270 1271 1272
	batadv_hash_set_lock_class(bat_priv->tt.global_hash,
				   &batadv_tt_global_hash_lock_class_key);

1273
	return 0;
1274 1275
}

1276
static void batadv_tt_changes_list_free(struct batadv_priv *bat_priv)
1277
{
1278
	struct batadv_tt_change_node *entry, *safe;
1279

1280
	spin_lock_bh(&bat_priv->tt.changes_list_lock);
1281

1282
	list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
1283 1284 1285 1286
				 list) {
		list_del(&entry->list);
		kfree(entry);
	}
1287

1288 1289
	atomic_set(&bat_priv->tt.local_changes, 0);
	spin_unlock_bh(&bat_priv->tt.changes_list_lock);
1290
}
1291

1292
/**
1293 1294 1295 1296
 * batadv_tt_global_orig_entry_find - find a TT orig_list_entry
 * @entry: the TT global entry where the orig_list_entry has to be
 *  extracted from
 * @orig_node: the originator for which the orig_list_entry has to be found
1297
 *
1298
 * retrieve the orig_tt_list_entry belonging to orig_node from the
1299 1300
 * batadv_tt_global_entry list
 *
1301
 * Return: it with an increased refcounter, NULL if not found
1302
 */
1303 1304 1305
static struct batadv_tt_orig_list_entry *
batadv_tt_global_orig_entry_find(const struct batadv_tt_global_entry *entry,
				 const struct batadv_orig_node *orig_node)
1306
{
1307
	struct batadv_tt_orig_list_entry *tmp_orig_entry, *orig_entry = NULL;
1308 1309 1310 1311
	const struct hlist_head *head;

	rcu_read_lock();
	head = &entry->orig_list;
1312
	hlist_for_each_entry_rcu(tmp_orig_entry, head, list) {
1313 1314
		if (tmp_orig_entry->orig_node != orig_node)
			continue;
1315
		if (!kref_get_unless_zero(&tmp_orig_entry->refcount))
1316 1317 1318 1319
			continue;

		orig_entry = tmp_orig_entry;
		break;
1320 1321
	}
	rcu_read_unlock();
1322 1323 1324 1325

	return orig_entry;
}

1326
/**
1327 1328 1329 1330
 * batadv_tt_global_entry_has_orig - check if a TT global entry is also handled
 *  by a given originator
 * @entry: the TT global entry to check
 * @orig_node: the originator to search in the list
1331 1332 1333 1334
 *
 * find out if an orig_node is already in the list of a tt_global_entry.
 *
 * Return: true if found, false otherwise
1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348
 */
static bool
batadv_tt_global_entry_has_orig(const struct batadv_tt_global_entry *entry,
				const struct batadv_orig_node *orig_node)
{
	struct batadv_tt_orig_list_entry *orig_entry;
	bool found = false;

	orig_entry = batadv_tt_global_orig_entry_find(entry, orig_node);
	if (orig_entry) {
		found = true;
		batadv_tt_orig_list_entry_free_ref(orig_entry);
	}

1349 1350 1351
	return found;
}

1352
static void
1353
batadv_tt_global_orig_entry_add(struct batadv_tt_global_entry *tt_global,
1354
				struct batadv_orig_node *orig_node, int ttvn)
1355
{
1356
	struct batadv_tt_orig_list_entry *orig_entry;
1357

1358
	orig_entry = batadv_tt_global_orig_entry_find(tt_global, orig_node);
1359 1360 1361 1362 1363
	if (orig_entry) {
		/* refresh the ttvn: the current value could be a bogus one that
		 * was added during a "temporary client detection"
		 */
		orig_entry->ttvn = ttvn;
1364
		goto out;
1365
	}
1366

1367 1368
	orig_entry = kzalloc(sizeof(*orig_entry), GFP_ATOMIC);
	if (!orig_entry)
1369
		goto out;
1370 1371

	INIT_HLIST_NODE(&orig_entry->list);
1372
	kref_get(&orig_node->refcount);
1373
	batadv_tt_global_size_inc(orig_node, tt_global->common.vid);
1374 1375
	orig_entry->orig_node = orig_node;
	orig_entry->ttvn = ttvn;
1376 1377
	kref_init(&orig_entry->refcount);
	kref_get(&orig_entry->refcount);
1378

1379
	spin_lock_bh(&tt_global->list_lock);
1380
	hlist_add_head_rcu(&orig_entry->list,
1381 1382
			   &tt_global->orig_list);
	spin_unlock_bh(&tt_global->list_lock);
1383 1384
	atomic_inc(&tt_global->orig_list_count);

1385 1386 1387
out:
	if (orig_entry)
		batadv_tt_orig_list_entry_free_ref(orig_entry);
1388 1389
}

1390 1391 1392 1393 1394
/**
 * batadv_tt_global_add - add a new TT global entry or update an existing one
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: the originator announcing the client
 * @tt_addr: the mac address of the non-mesh client
1395
 * @vid: VLAN identifier
1396 1397 1398 1399 1400 1401 1402 1403 1404 1405
 * @flags: TT flags that have to be set for this non-mesh client
 * @ttvn: the tt version number ever announcing this non-mesh client
 *
 * Add a new TT global entry for the given originator. If the entry already
 * exists add a new reference to the given originator (a global entry can have
 * references to multiple originators) and adjust the flags attribute to reflect
 * the function argument.
 * If a TT local entry exists for this non-mesh client remove it.
 *
 * The caller must hold orig_node refcount.
1406
 *
1407
 * Return: true if the new entry has been added, false otherwise
1408
 */
1409 1410
static bool batadv_tt_global_add(struct batadv_priv *bat_priv,
				 struct batadv_orig_node *orig_node,
1411
				 const unsigned char *tt_addr,
1412
				 unsigned short vid, u16 flags, u8 ttvn)
1413
{
1414 1415
	struct batadv_tt_global_entry *tt_global_entry;
	struct batadv_tt_local_entry *tt_local_entry;
1416
	bool ret = false;
1417
	int hash_added;
1418
	struct batadv_tt_common_entry *common;
1419
	u16 local_flags;
1420

1421 1422 1423 1424
	/* ignore global entries from backbone nodes */
	if (batadv_bla_is_backbone_gw_orig(bat_priv, orig_node->orig, vid))
		return true;

1425 1426
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, tt_addr, vid);
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, tt_addr, vid);
1427 1428 1429 1430 1431 1432 1433 1434

	/* if the node already has a local client for this entry, it has to wait
	 * for a roaming advertisement instead of manually messing up the global
	 * table
	 */
	if ((flags & BATADV_TT_CLIENT_TEMP) && tt_local_entry &&
	    !(tt_local_entry->common.flags & BATADV_TT_CLIENT_NEW))
		goto out;
1435 1436

	if (!tt_global_entry) {
1437
		tt_global_entry = kzalloc(sizeof(*tt_global_entry), GFP_ATOMIC);
1438
		if (!tt_global_entry)
1439 1440
			goto out;

1441
		common = &tt_global_entry->common;
1442
		ether_addr_copy(common->addr, tt_addr);
1443
		common->vid = vid;
1444

1445
		common->flags = flags;
1446
		tt_global_entry->roam_at = 0;
1447 1448 1449 1450 1451 1452
		/* node must store current time in case of roaming. This is
		 * needed to purge this entry out on timeout (if nobody claims
		 * it)
		 */
		if (flags & BATADV_TT_CLIENT_ROAM)
			tt_global_entry->roam_at = jiffies;
1453 1454
		kref_init(&common->refcount);
		kref_get(&common->refcount);
1455
		common->added_at = jiffies;
1456 1457

		INIT_HLIST_HEAD(&tt_global_entry->orig_list);
1458
		atomic_set(&tt_global_entry->orig_list_count, 0);
1459
		spin_lock_init(&tt_global_entry->list_lock);
1460

1461
		hash_added = batadv_hash_add(bat_priv->tt.global_hash,
1462
					     batadv_compare_tt,
1463
					     batadv_choose_tt, common,
1464
					     &common->hash_entry);
1465 1466 1467

		if (unlikely(hash_added != 0)) {
			/* remove the reference for the hash */
1468
			batadv_tt_global_entry_free_ref(tt_global_entry);
1469 1470
			goto out_remove;
		}
1471
	} else {
1472
		common = &tt_global_entry->common;
1473 1474
		/* If there is already a global entry, we can use this one for
		 * our processing.
1475 1476 1477 1478 1479 1480 1481
		 * But if we are trying to add a temporary client then here are
		 * two options at this point:
		 * 1) the global client is not a temporary client: the global
		 *    client has to be left as it is, temporary information
		 *    should never override any already known client state
		 * 2) the global client is a temporary client: purge the
		 *    originator list and add the new one orig_entry
1482
		 */
1483 1484 1485 1486 1487 1488 1489 1490 1491
		if (flags & BATADV_TT_CLIENT_TEMP) {
			if (!(common->flags & BATADV_TT_CLIENT_TEMP))
				goto out;
			if (batadv_tt_global_entry_has_orig(tt_global_entry,
							    orig_node))
				goto out_remove;
			batadv_tt_global_del_orig_list(tt_global_entry);
			goto add_orig_entry;
		}
1492 1493

		/* if the client was temporary added before receiving the first
1494 1495 1496 1497
		 * OGM announcing it, we have to clear the TEMP flag. Also,
		 * remove the previous temporary orig node and re-add it
		 * if required. If the orig entry changed, the new one which
		 * is a non-temporary entry is preferred.
1498
		 */
1499 1500 1501 1502
		if (common->flags & BATADV_TT_CLIENT_TEMP) {
			batadv_tt_global_del_orig_list(tt_global_entry);
			common->flags &= ~BATADV_TT_CLIENT_TEMP;
		}
1503

1504 1505 1506 1507
		/* the change can carry possible "attribute" flags like the
		 * TT_CLIENT_WIFI, therefore they have to be copied in the
		 * client entry
		 */
1508
		common->flags |= flags;
1509

1510 1511
		/* If there is the BATADV_TT_CLIENT_ROAM flag set, there is only
		 * one originator left in the list and we previously received a
1512 1513 1514 1515 1516
		 * delete + roaming change for this originator.
		 *
		 * We should first delete the old originator before adding the
		 * new one.
		 */
1517
		if (common->flags & BATADV_TT_CLIENT_ROAM) {
1518
			batadv_tt_global_del_orig_list(tt_global_entry);
1519
			common->flags &= ~BATADV_TT_CLIENT_ROAM;
1520
			tt_global_entry->roam_at = 0;
1521 1522
		}
	}
1523
add_orig_entry:
1524
	/* add the new orig_entry (if needed) or update it */
1525
	batadv_tt_global_orig_entry_add(tt_global_entry, orig_node, ttvn);
1526

1527
	batadv_dbg(BATADV_DBG_TT, bat_priv,
1528 1529 1530
		   "Creating new global tt entry: %pM (vid: %d, via %pM)\n",
		   common->addr, BATADV_PRINT_VID(common->vid),
		   orig_node->orig);
1531
	ret = true;
1532

1533
out_remove:
1534 1535 1536 1537 1538
	/* Do not remove multicast addresses from the local hash on
	 * global additions
	 */
	if (is_multicast_ether_addr(tt_addr))
		goto out;
1539

1540
	/* remove address from local hash if present */
1541
	local_flags = batadv_tt_local_remove(bat_priv, tt_addr, vid,
1542
					     "global tt received",
1543
					     flags & BATADV_TT_CLIENT_ROAM);
1544 1545
	tt_global_entry->common.flags |= local_flags & BATADV_TT_CLIENT_WIFI;

1546 1547 1548 1549 1550 1551
	if (!(flags & BATADV_TT_CLIENT_ROAM))
		/* this is a normal global add. Therefore the client is not in a
		 * roaming state anymore.
		 */
		tt_global_entry->common.flags &= ~BATADV_TT_CLIENT_ROAM;

1552 1553
out:
	if (tt_global_entry)
1554
		batadv_tt_global_entry_free_ref(tt_global_entry);
1555 1556
	if (tt_local_entry)
		batadv_tt_local_entry_free_ref(tt_local_entry);
1557
	return ret;
1558 1559
}

1560 1561
/**
 * batadv_transtable_best_orig - Get best originator list entry from tt entry
1562
 * @bat_priv: the bat priv with all the soft interface information
1563 1564 1565
 * @tt_global_entry: global translation table entry to be analyzed
 *
 * This functon assumes the caller holds rcu_read_lock().
1566
 * Return: best originator list entry or NULL on errors.
1567 1568
 */
static struct batadv_tt_orig_list_entry *
1569 1570
batadv_transtable_best_orig(struct batadv_priv *bat_priv,
			    struct batadv_tt_global_entry *tt_global_entry)
1571
{
1572 1573
	struct batadv_neigh_node *router, *best_router = NULL;
	struct batadv_algo_ops *bao = bat_priv->bat_algo_ops;
1574 1575 1576 1577
	struct hlist_head *head;
	struct batadv_tt_orig_list_entry *orig_entry, *best_entry = NULL;

	head = &tt_global_entry->orig_list;
1578
	hlist_for_each_entry_rcu(orig_entry, head, list) {
1579 1580
		router = batadv_orig_router_get(orig_entry->orig_node,
						BATADV_IF_DEFAULT);
1581 1582 1583
		if (!router)
			continue;

1584
		if (best_router &&
1585 1586
		    bao->bat_neigh_cmp(router, BATADV_IF_DEFAULT,
				       best_router, BATADV_IF_DEFAULT) <= 0) {
1587 1588
			batadv_neigh_node_free_ref(router);
			continue;
1589 1590
		}

1591 1592 1593 1594 1595 1596
		/* release the refcount for the "old" best */
		if (best_router)
			batadv_neigh_node_free_ref(best_router);

		best_entry = orig_entry;
		best_router = router;
1597 1598
	}

1599 1600 1601
	if (best_router)
		batadv_neigh_node_free_ref(best_router);

1602 1603 1604
	return best_entry;
}

1605 1606 1607
/**
 * batadv_tt_global_print_entry - print all orig nodes who announce the address
 *  for this global entry
1608
 * @bat_priv: the bat priv with all the soft interface information
1609 1610 1611 1612
 * @tt_global_entry: global translation table entry to be printed
 * @seq: debugfs table seq_file struct
 *
 * This functon assumes the caller holds rcu_read_lock().
1613
 */
1614
static void
1615 1616
batadv_tt_global_print_entry(struct batadv_priv *bat_priv,
			     struct batadv_tt_global_entry *tt_global_entry,
1617
			     struct seq_file *seq)
1618
{
1619
	struct batadv_tt_orig_list_entry *orig_entry, *best_entry;
1620
	struct batadv_tt_common_entry *tt_common_entry;
1621 1622
	struct batadv_orig_node_vlan *vlan;
	struct hlist_head *head;
1623 1624
	u8 last_ttvn;
	u16 flags;
1625 1626

	tt_common_entry = &tt_global_entry->common;
1627 1628
	flags = tt_common_entry->flags;

1629
	best_entry = batadv_transtable_best_orig(bat_priv, tt_global_entry);
1630
	if (best_entry) {
1631 1632 1633 1634 1635 1636 1637 1638 1639 1640
		vlan = batadv_orig_node_vlan_get(best_entry->orig_node,
						 tt_common_entry->vid);
		if (!vlan) {
			seq_printf(seq,
				   " * Cannot retrieve VLAN %d for originator %pM\n",
				   BATADV_PRINT_VID(tt_common_entry->vid),
				   best_entry->orig_node->orig);
			goto print_list;
		}

1641
		last_ttvn = atomic_read(&best_entry->orig_node->last_ttvn);
1642
		seq_printf(seq,
1643
			   " %c %pM %4i   (%3u) via %pM     (%3u)   (%#.8x) [%c%c%c%c]\n",
1644
			   '*', tt_global_entry->common.addr,
1645
			   BATADV_PRINT_VID(tt_global_entry->common.vid),
1646
			   best_entry->ttvn, best_entry->orig_node->orig,
1647
			   last_ttvn, vlan->tt.crc,
1648 1649 1650 1651
			   ((flags & BATADV_TT_CLIENT_ROAM) ? 'R' : '.'),
			   ((flags & BATADV_TT_CLIENT_WIFI) ? 'W' : '.'),
			   ((flags & BATADV_TT_CLIENT_ISOLA) ? 'I' : '.'),
			   ((flags & BATADV_TT_CLIENT_TEMP) ? 'T' : '.'));
1652 1653

		batadv_orig_node_vlan_free_ref(vlan);
1654
	}
1655

1656
print_list:
1657 1658
	head = &tt_global_entry->orig_list;

1659
	hlist_for_each_entry_rcu(orig_entry, head, list) {
1660 1661 1662
		if (best_entry == orig_entry)
			continue;

1663 1664 1665 1666 1667 1668 1669 1670 1671 1672
		vlan = batadv_orig_node_vlan_get(orig_entry->orig_node,
						 tt_common_entry->vid);
		if (!vlan) {
			seq_printf(seq,
				   " + Cannot retrieve VLAN %d for originator %pM\n",
				   BATADV_PRINT_VID(tt_common_entry->vid),
				   orig_entry->orig_node->orig);
			continue;
		}

1673
		last_ttvn = atomic_read(&orig_entry->orig_node->last_ttvn);
1674
		seq_printf(seq,
1675
			   " %c %pM %4d   (%3u) via %pM     (%3u)   (%#.8x) [%c%c%c%c]\n",
1676
			   '+', tt_global_entry->common.addr,
1677
			   BATADV_PRINT_VID(tt_global_entry->common.vid),
1678
			   orig_entry->ttvn, orig_entry->orig_node->orig,
1679
			   last_ttvn, vlan->tt.crc,
1680 1681 1682 1683
			   ((flags & BATADV_TT_CLIENT_ROAM) ? 'R' : '.'),
			   ((flags & BATADV_TT_CLIENT_WIFI) ? 'W' : '.'),
			   ((flags & BATADV_TT_CLIENT_ISOLA) ? 'I' : '.'),
			   ((flags & BATADV_TT_CLIENT_TEMP) ? 'T' : '.'));
1684 1685

		batadv_orig_node_vlan_free_ref(vlan);
1686 1687 1688
	}
}

1689
int batadv_tt_global_seq_print_text(struct seq_file *seq, void *offset)
1690 1691
{
	struct net_device *net_dev = (struct net_device *)seq->private;
1692
	struct batadv_priv *bat_priv = netdev_priv(net_dev);
1693
	struct batadv_hashtable *hash = bat_priv->tt.global_hash;
1694 1695 1696
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_global_entry *tt_global;
	struct batadv_hard_iface *primary_if;
1697
	struct hlist_head *head;
1698
	u32 i;
1699

1700 1701
	primary_if = batadv_seq_print_text_primary_if_get(seq);
	if (!primary_if)
1702
		goto out;
1703

1704 1705
	seq_printf(seq,
		   "Globally announced TT entries received via the mesh %s\n",
1706
		   net_dev->name);
1707 1708 1709
	seq_printf(seq, "       %-13s  %s  %s       %-15s %s (%-10s) %s\n",
		   "Client", "VID", "(TTVN)", "Originator", "(Curr TTVN)",
		   "CRC", "Flags");
1710 1711 1712 1713

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

1714
		rcu_read_lock();
1715
		hlist_for_each_entry_rcu(tt_common_entry,
1716
					 head, hash_entry) {
1717 1718 1719
			tt_global = container_of(tt_common_entry,
						 struct batadv_tt_global_entry,
						 common);
1720
			batadv_tt_global_print_entry(bat_priv, tt_global, seq);
1721
		}
1722
		rcu_read_unlock();
1723
	}
1724 1725
out:
	if (primary_if)
1726
		batadv_hardif_free_ref(primary_if);
1727
	return 0;
1728 1729
}

1730
/**
1731
 * _batadv_tt_global_del_orig_entry - remove and free an orig_entry
1732 1733 1734 1735 1736
 * @tt_global_entry: the global entry to remove the orig_entry from
 * @orig_entry: the orig entry to remove and free
 *
 * Remove an orig_entry from its list in the given tt_global_entry and
 * free this orig_entry afterwards.
1737 1738 1739
 *
 * Caller must hold tt_global_entry->list_lock and ensure orig_entry->list is
 * part of a list.
1740 1741
 */
static void
1742 1743
_batadv_tt_global_del_orig_entry(struct batadv_tt_global_entry *tt_global_entry,
				 struct batadv_tt_orig_list_entry *orig_entry)
1744
{
1745 1746
	lockdep_assert_held(&tt_global_entry->list_lock);

1747 1748 1749
	batadv_tt_global_size_dec(orig_entry->orig_node,
				  tt_global_entry->common.vid);
	atomic_dec(&tt_global_entry->orig_list_count);
1750 1751 1752
	/* requires holding tt_global_entry->list_lock and orig_entry->list
	 * being part of a list
	 */
1753 1754 1755 1756
	hlist_del_rcu(&orig_entry->list);
	batadv_tt_orig_list_entry_free_ref(orig_entry);
}

1757
/* deletes the orig list of a tt_global_entry */
1758
static void
1759
batadv_tt_global_del_orig_list(struct batadv_tt_global_entry *tt_global_entry)
1760
{
1761
	struct hlist_head *head;
1762
	struct hlist_node *safe;
1763
	struct batadv_tt_orig_list_entry *orig_entry;
1764

1765 1766
	spin_lock_bh(&tt_global_entry->list_lock);
	head = &tt_global_entry->orig_list;
1767
	hlist_for_each_entry_safe(orig_entry, safe, head, list)
1768
		_batadv_tt_global_del_orig_entry(tt_global_entry, orig_entry);
1769 1770 1771
	spin_unlock_bh(&tt_global_entry->list_lock);
}

1772 1773 1774 1775 1776 1777 1778 1779 1780 1781
/**
 * batadv_tt_global_del_orig_node - remove orig_node from a global tt entry
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_global_entry: the global entry to remove the orig_node from
 * @orig_node: the originator announcing the client
 * @message: message to append to the log on deletion
 *
 * Remove the given orig_node and its according orig_entry from the given
 * global tt entry.
 */
1782
static void
1783 1784 1785 1786
batadv_tt_global_del_orig_node(struct batadv_priv *bat_priv,
			       struct batadv_tt_global_entry *tt_global_entry,
			       struct batadv_orig_node *orig_node,
			       const char *message)
1787 1788
{
	struct hlist_head *head;
1789
	struct hlist_node *safe;
1790
	struct batadv_tt_orig_list_entry *orig_entry;
1791
	unsigned short vid;
1792 1793 1794

	spin_lock_bh(&tt_global_entry->list_lock);
	head = &tt_global_entry->orig_list;
1795
	hlist_for_each_entry_safe(orig_entry, safe, head, list) {
1796
		if (orig_entry->orig_node == orig_node) {
1797
			vid = tt_global_entry->common.vid;
1798
			batadv_dbg(BATADV_DBG_TT, bat_priv,
1799
				   "Deleting %pM from global tt entry %pM (vid: %d): %s\n",
1800
				   orig_node->orig,
1801 1802
				   tt_global_entry->common.addr,
				   BATADV_PRINT_VID(vid), message);
1803 1804
			_batadv_tt_global_del_orig_entry(tt_global_entry,
							 orig_entry);
1805 1806 1807 1808 1809 1810
		}
	}
	spin_unlock_bh(&tt_global_entry->list_lock);
}

/* If the client is to be deleted, we check if it is the last origantor entry
1811 1812
 * within tt_global entry. If yes, we set the BATADV_TT_CLIENT_ROAM flag and the
 * timer, otherwise we simply remove the originator scheduled for deletion.
1813
 */
1814
static void
1815 1816 1817 1818
batadv_tt_global_del_roaming(struct batadv_priv *bat_priv,
			     struct batadv_tt_global_entry *tt_global_entry,
			     struct batadv_orig_node *orig_node,
			     const char *message)
1819 1820 1821
{
	bool last_entry = true;
	struct hlist_head *head;
1822
	struct batadv_tt_orig_list_entry *orig_entry;
1823 1824 1825 1826 1827 1828 1829

	/* no local entry exists, case 1:
	 * Check if this is the last one or if other entries exist.
	 */

	rcu_read_lock();
	head = &tt_global_entry->orig_list;
1830
	hlist_for_each_entry_rcu(orig_entry, head, list) {
1831 1832 1833 1834 1835 1836 1837 1838 1839
		if (orig_entry->orig_node != orig_node) {
			last_entry = false;
			break;
		}
	}
	rcu_read_unlock();

	if (last_entry) {
		/* its the last one, mark for roaming. */
1840
		tt_global_entry->common.flags |= BATADV_TT_CLIENT_ROAM;
1841 1842 1843 1844 1845
		tt_global_entry->roam_at = jiffies;
	} else
		/* there is another entry, we can simply delete this
		 * one and can still use the other one.
		 */
1846 1847
		batadv_tt_global_del_orig_node(bat_priv, tt_global_entry,
					       orig_node, message);
1848 1849
}

1850 1851 1852 1853 1854 1855 1856 1857 1858 1859
/**
 * batadv_tt_global_del - remove a client from the global table
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: an originator serving this client
 * @addr: the mac address of the client
 * @vid: VLAN identifier
 * @message: a message explaining the reason for deleting the client to print
 *  for debugging purpose
 * @roaming: true if the deletion has been triggered by a roaming event
 */
1860 1861
static void batadv_tt_global_del(struct batadv_priv *bat_priv,
				 struct batadv_orig_node *orig_node,
1862
				 const unsigned char *addr, unsigned short vid,
1863
				 const char *message, bool roaming)
1864
{
1865
	struct batadv_tt_global_entry *tt_global_entry;
1866
	struct batadv_tt_local_entry *local_entry = NULL;
1867

1868
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
1869
	if (!tt_global_entry)
1870
		goto out;
1871

1872
	if (!roaming) {
1873 1874
		batadv_tt_global_del_orig_node(bat_priv, tt_global_entry,
					       orig_node, message);
1875 1876

		if (hlist_empty(&tt_global_entry->orig_list))
1877 1878
			batadv_tt_global_free(bat_priv, tt_global_entry,
					      message);
1879 1880 1881

		goto out;
	}
1882 1883 1884

	/* if we are deleting a global entry due to a roam
	 * event, there are two possibilities:
1885 1886
	 * 1) the client roamed from node A to node B => if there
	 *    is only one originator left for this client, we mark
1887
	 *    it with BATADV_TT_CLIENT_ROAM, we start a timer and we
1888 1889
	 *    wait for node B to claim it. In case of timeout
	 *    the entry is purged.
1890 1891 1892
	 *
	 *    If there are other originators left, we directly delete
	 *    the originator.
1893
	 * 2) the client roamed to us => we can directly delete
1894 1895
	 *    the global entry, since it is useless now.
	 */
1896
	local_entry = batadv_tt_local_hash_find(bat_priv,
1897 1898
						tt_global_entry->common.addr,
						vid);
1899
	if (local_entry) {
1900
		/* local entry exists, case 2: client roamed to us. */
1901
		batadv_tt_global_del_orig_list(tt_global_entry);
1902
		batadv_tt_global_free(bat_priv, tt_global_entry, message);
1903 1904
	} else
		/* no local entry exists, case 1: check for roaming */
1905 1906
		batadv_tt_global_del_roaming(bat_priv, tt_global_entry,
					     orig_node, message);
1907

1908
out:
1909
	if (tt_global_entry)
1910 1911 1912
		batadv_tt_global_entry_free_ref(tt_global_entry);
	if (local_entry)
		batadv_tt_local_entry_free_ref(local_entry);
1913 1914
}

1915 1916 1917 1918 1919 1920 1921 1922 1923
/**
 * batadv_tt_global_del_orig - remove all the TT global entries belonging to the
 *  given originator matching the provided vid
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: the originator owning the entries to remove
 * @match_vid: the VLAN identifier to match. If negative all the entries will be
 *  removed
 * @message: debug message to print as "reason"
 */
1924 1925
void batadv_tt_global_del_orig(struct batadv_priv *bat_priv,
			       struct batadv_orig_node *orig_node,
1926
			       s32 match_vid,
1927
			       const char *message)
1928
{
1929 1930
	struct batadv_tt_global_entry *tt_global;
	struct batadv_tt_common_entry *tt_common_entry;
1931
	u32 i;
1932
	struct batadv_hashtable *hash = bat_priv->tt.global_hash;
1933
	struct hlist_node *safe;
1934
	struct hlist_head *head;
1935
	spinlock_t *list_lock; /* protects write access to the hash lists */
1936
	unsigned short vid;
1937

1938 1939 1940
	if (!hash)
		return;

1941 1942
	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
1943
		list_lock = &hash->list_locks[i];
1944

1945
		spin_lock_bh(list_lock);
1946
		hlist_for_each_entry_safe(tt_common_entry, safe,
1947
					  head, hash_entry) {
1948 1949 1950 1951
			/* remove only matching entries */
			if (match_vid >= 0 && tt_common_entry->vid != match_vid)
				continue;

1952 1953 1954
			tt_global = container_of(tt_common_entry,
						 struct batadv_tt_global_entry,
						 common);
1955

1956 1957
			batadv_tt_global_del_orig_node(bat_priv, tt_global,
						       orig_node, message);
1958

1959
			if (hlist_empty(&tt_global->orig_list)) {
1960
				vid = tt_global->common.vid;
1961
				batadv_dbg(BATADV_DBG_TT, bat_priv,
1962 1963 1964
					   "Deleting global tt entry %pM (vid: %d): %s\n",
					   tt_global->common.addr,
					   BATADV_PRINT_VID(vid), message);
1965
				hlist_del_rcu(&tt_common_entry->hash_entry);
1966
				batadv_tt_global_entry_free_ref(tt_global);
1967
			}
1968
		}
1969
		spin_unlock_bh(list_lock);
1970
	}
1971
	clear_bit(BATADV_ORIG_CAPA_HAS_TT, &orig_node->capa_initialized);
1972 1973
}

1974 1975
static bool batadv_tt_global_to_purge(struct batadv_tt_global_entry *tt_global,
				      char **msg)
1976
{
1977 1978 1979
	bool purge = false;
	unsigned long roam_timeout = BATADV_TT_CLIENT_ROAM_TIMEOUT;
	unsigned long temp_timeout = BATADV_TT_CLIENT_TEMP_TIMEOUT;
1980

1981 1982 1983 1984 1985
	if ((tt_global->common.flags & BATADV_TT_CLIENT_ROAM) &&
	    batadv_has_timed_out(tt_global->roam_at, roam_timeout)) {
		purge = true;
		*msg = "Roaming timeout\n";
	}
1986

1987 1988 1989 1990
	if ((tt_global->common.flags & BATADV_TT_CLIENT_TEMP) &&
	    batadv_has_timed_out(tt_global->common.added_at, temp_timeout)) {
		purge = true;
		*msg = "Temporary client timeout\n";
1991
	}
1992 1993

	return purge;
1994 1995
}

1996
static void batadv_tt_global_purge(struct batadv_priv *bat_priv)
1997
{
1998
	struct batadv_hashtable *hash = bat_priv->tt.global_hash;
1999
	struct hlist_head *head;
2000
	struct hlist_node *node_tmp;
2001
	spinlock_t *list_lock; /* protects write access to the hash lists */
2002
	u32 i;
2003 2004 2005
	char *msg = NULL;
	struct batadv_tt_common_entry *tt_common;
	struct batadv_tt_global_entry *tt_global;
2006 2007 2008

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
2009
		list_lock = &hash->list_locks[i];
2010

2011
		spin_lock_bh(list_lock);
2012
		hlist_for_each_entry_safe(tt_common, node_tmp, head,
2013 2014 2015 2016 2017 2018 2019 2020 2021
					  hash_entry) {
			tt_global = container_of(tt_common,
						 struct batadv_tt_global_entry,
						 common);

			if (!batadv_tt_global_to_purge(tt_global, &msg))
				continue;

			batadv_dbg(BATADV_DBG_TT, bat_priv,
2022 2023 2024 2025
				   "Deleting global tt entry %pM (vid: %d): %s\n",
				   tt_global->common.addr,
				   BATADV_PRINT_VID(tt_global->common.vid),
				   msg);
2026

2027
			hlist_del_rcu(&tt_common->hash_entry);
2028 2029 2030

			batadv_tt_global_entry_free_ref(tt_global);
		}
2031
		spin_unlock_bh(list_lock);
2032 2033 2034
	}
}

2035
static void batadv_tt_global_table_free(struct batadv_priv *bat_priv)
2036
{
2037
	struct batadv_hashtable *hash;
2038
	spinlock_t *list_lock; /* protects write access to the hash lists */
2039 2040
	struct batadv_tt_common_entry *tt_common_entry;
	struct batadv_tt_global_entry *tt_global;
2041
	struct hlist_node *node_tmp;
2042
	struct hlist_head *head;
2043
	u32 i;
2044

2045
	if (!bat_priv->tt.global_hash)
2046 2047
		return;

2048
	hash = bat_priv->tt.global_hash;
2049 2050 2051 2052 2053 2054

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
		list_lock = &hash->list_locks[i];

		spin_lock_bh(list_lock);
2055
		hlist_for_each_entry_safe(tt_common_entry, node_tmp,
2056
					  head, hash_entry) {
2057
			hlist_del_rcu(&tt_common_entry->hash_entry);
2058 2059 2060 2061
			tt_global = container_of(tt_common_entry,
						 struct batadv_tt_global_entry,
						 common);
			batadv_tt_global_entry_free_ref(tt_global);
2062 2063 2064 2065
		}
		spin_unlock_bh(list_lock);
	}

2066
	batadv_hash_destroy(hash);
2067

2068
	bat_priv->tt.global_hash = NULL;
2069 2070
}

2071 2072 2073
static bool
_batadv_is_ap_isolated(struct batadv_tt_local_entry *tt_local_entry,
		       struct batadv_tt_global_entry *tt_global_entry)
2074 2075 2076
{
	bool ret = false;

2077 2078
	if (tt_local_entry->common.flags & BATADV_TT_CLIENT_WIFI &&
	    tt_global_entry->common.flags & BATADV_TT_CLIENT_WIFI)
2079 2080
		ret = true;

2081 2082 2083 2084 2085
	/* check if the two clients are marked as isolated */
	if (tt_local_entry->common.flags & BATADV_TT_CLIENT_ISOLA &&
	    tt_global_entry->common.flags & BATADV_TT_CLIENT_ISOLA)
		ret = true;

2086 2087 2088
	return ret;
}

2089 2090 2091 2092 2093 2094 2095
/**
 * batadv_transtable_search - get the mesh destination for a given client
 * @bat_priv: the bat priv with all the soft interface information
 * @src: mac address of the source client
 * @addr: mac address of the destination client
 * @vid: VLAN identifier
 *
2096
 * Return: a pointer to the originator that was selected as destination in the
2097 2098 2099 2100 2101 2102
 * mesh for contacting the client 'addr', NULL otherwise.
 * In case of multiple originators serving the same client, the function returns
 * the best one (best in terms of metric towards the destination node).
 *
 * If the two clients are AP isolated the function returns NULL.
 */
2103
struct batadv_orig_node *batadv_transtable_search(struct batadv_priv *bat_priv,
2104 2105
						  const u8 *src,
						  const u8 *addr,
2106
						  unsigned short vid)
2107
{
2108 2109 2110
	struct batadv_tt_local_entry *tt_local_entry = NULL;
	struct batadv_tt_global_entry *tt_global_entry = NULL;
	struct batadv_orig_node *orig_node = NULL;
2111
	struct batadv_tt_orig_list_entry *best_entry;
2112

2113
	if (src && batadv_vlan_ap_isola_get(bat_priv, vid)) {
2114
		tt_local_entry = batadv_tt_local_hash_find(bat_priv, src, vid);
2115 2116
		if (!tt_local_entry ||
		    (tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING))
2117 2118
			goto out;
	}
2119

2120
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
2121
	if (!tt_global_entry)
2122
		goto out;
2123

2124
	/* check whether the clients should not communicate due to AP
2125 2126
	 * isolation
	 */
2127 2128
	if (tt_local_entry &&
	    _batadv_is_ap_isolated(tt_local_entry, tt_global_entry))
2129 2130
		goto out;

2131
	rcu_read_lock();
2132
	best_entry = batadv_transtable_best_orig(bat_priv, tt_global_entry);
2133
	/* found anything? */
2134 2135
	if (best_entry)
		orig_node = best_entry->orig_node;
2136
	if (orig_node && !kref_get_unless_zero(&orig_node->refcount))
2137 2138
		orig_node = NULL;
	rcu_read_unlock();
2139

2140
out:
2141
	if (tt_global_entry)
2142
		batadv_tt_global_entry_free_ref(tt_global_entry);
2143
	if (tt_local_entry)
2144
		batadv_tt_local_entry_free_ref(tt_local_entry);
2145

2146
	return orig_node;
2147
}
2148

2149 2150 2151 2152
/**
 * batadv_tt_global_crc - calculates the checksum of the local table belonging
 *  to the given orig_node
 * @bat_priv: the bat priv with all the soft interface information
2153
 * @orig_node: originator for which the CRC should be computed
2154
 * @vid: VLAN identifier for which the CRC32 has to be computed
2155 2156 2157 2158 2159 2160 2161 2162 2163 2164 2165 2166 2167 2168 2169 2170
 *
 * This function computes the checksum for the global table corresponding to a
 * specific originator. In particular, the checksum is computed as follows: For
 * each client connected to the originator the CRC32C of the MAC address and the
 * VID is computed and then all the CRC32Cs of the various clients are xor'ed
 * together.
 *
 * The idea behind is that CRC32C should be used as much as possible in order to
 * produce a unique hash of the table, but since the order which is used to feed
 * the CRC32C function affects the result and since every node in the network
 * probably sorts the clients differently, the hash function cannot be directly
 * computed over the entire table. Hence the CRC32C is used only on
 * the single client entry, while all the results are then xor'ed together
 * because the XOR operation can combine them all while trying to reduce the
 * noise as much as possible.
 *
2171
 * Return: the checksum of the global table of a given originator.
2172
 */
2173 2174 2175
static u32 batadv_tt_global_crc(struct batadv_priv *bat_priv,
				struct batadv_orig_node *orig_node,
				unsigned short vid)
2176
{
2177
	struct batadv_hashtable *hash = bat_priv->tt.global_hash;
2178 2179
	struct batadv_tt_common_entry *tt_common;
	struct batadv_tt_global_entry *tt_global;
2180
	struct hlist_head *head;
2181 2182
	u32 i, crc_tmp, crc = 0;
	u8 flags;
2183
	__be16 tmp_vid;
2184 2185 2186 2187 2188

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

		rcu_read_lock();
2189
		hlist_for_each_entry_rcu(tt_common, head, hash_entry) {
2190 2191 2192
			tt_global = container_of(tt_common,
						 struct batadv_tt_global_entry,
						 common);
2193 2194 2195 2196 2197 2198
			/* compute the CRC only for entries belonging to the
			 * VLAN identified by the vid passed as parameter
			 */
			if (tt_common->vid != vid)
				continue;

2199 2200 2201 2202 2203
			/* Roaming clients are in the global table for
			 * consistency only. They don't have to be
			 * taken into account while computing the
			 * global crc
			 */
2204
			if (tt_common->flags & BATADV_TT_CLIENT_ROAM)
2205
				continue;
2206 2207 2208 2209 2210 2211
			/* Temporary clients have not been announced yet, so
			 * they have to be skipped while computing the global
			 * crc
			 */
			if (tt_common->flags & BATADV_TT_CLIENT_TEMP)
				continue;
2212 2213 2214 2215

			/* find out if this global entry is announced by this
			 * originator
			 */
2216
			if (!batadv_tt_global_entry_has_orig(tt_global,
2217
							     orig_node))
2218 2219
				continue;

2220 2221 2222 2223 2224
			/* use network order to read the VID: this ensures that
			 * every node reads the bytes in the same order.
			 */
			tmp_vid = htons(tt_common->vid);
			crc_tmp = crc32c(0, &tmp_vid, sizeof(tmp_vid));
2225 2226 2227 2228 2229 2230 2231

			/* compute the CRC on flags that have to be kept in sync
			 * among nodes
			 */
			flags = tt_common->flags & BATADV_TT_SYNC_MASK;
			crc_tmp = crc32c(crc_tmp, &flags, sizeof(flags));

2232
			crc ^= crc32c(crc_tmp, tt_common->addr, ETH_ALEN);
2233 2234 2235 2236
		}
		rcu_read_unlock();
	}

2237
	return crc;
2238 2239
}

2240 2241 2242
/**
 * batadv_tt_local_crc - calculates the checksum of the local table
 * @bat_priv: the bat priv with all the soft interface information
2243
 * @vid: VLAN identifier for which the CRC32 has to be computed
2244 2245 2246 2247
 *
 * For details about the computation, please refer to the documentation for
 * batadv_tt_global_crc().
 *
2248
 * Return: the checksum of the local table
2249
 */
2250 2251
static u32 batadv_tt_local_crc(struct batadv_priv *bat_priv,
			       unsigned short vid)
2252
{
2253
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
2254
	struct batadv_tt_common_entry *tt_common;
2255
	struct hlist_head *head;
2256 2257
	u32 i, crc_tmp, crc = 0;
	u8 flags;
2258
	__be16 tmp_vid;
2259 2260 2261 2262 2263

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

		rcu_read_lock();
2264
		hlist_for_each_entry_rcu(tt_common, head, hash_entry) {
2265 2266 2267 2268 2269 2270
			/* compute the CRC only for entries belonging to the
			 * VLAN identified by vid
			 */
			if (tt_common->vid != vid)
				continue;

2271
			/* not yet committed clients have not to be taken into
2272 2273
			 * account while computing the CRC
			 */
2274
			if (tt_common->flags & BATADV_TT_CLIENT_NEW)
2275
				continue;
2276

2277 2278 2279 2280 2281
			/* use network order to read the VID: this ensures that
			 * every node reads the bytes in the same order.
			 */
			tmp_vid = htons(tt_common->vid);
			crc_tmp = crc32c(0, &tmp_vid, sizeof(tmp_vid));
2282 2283 2284 2285 2286 2287 2288

			/* compute the CRC on flags that have to be kept in sync
			 * among nodes
			 */
			flags = tt_common->flags & BATADV_TT_SYNC_MASK;
			crc_tmp = crc32c(crc_tmp, &flags, sizeof(flags));

2289
			crc ^= crc32c(crc_tmp, tt_common->addr, ETH_ALEN);
2290 2291 2292 2293
		}
		rcu_read_unlock();
	}

2294
	return crc;
2295 2296
}

2297
static void batadv_tt_req_list_free(struct batadv_priv *bat_priv)
2298
{
2299 2300
	struct batadv_tt_req_node *node;
	struct hlist_node *safe;
2301

2302
	spin_lock_bh(&bat_priv->tt.req_list_lock);
2303

2304 2305
	hlist_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
		hlist_del_init(&node->list);
2306 2307 2308
		kfree(node);
	}

2309
	spin_unlock_bh(&bat_priv->tt.req_list_lock);
2310 2311
}

2312 2313
static void batadv_tt_save_orig_buffer(struct batadv_priv *bat_priv,
				       struct batadv_orig_node *orig_node,
2314
				       const void *tt_buff,
2315
				       u16 tt_buff_len)
2316 2317
{
	/* Replace the old buffer only if I received something in the
2318 2319
	 * last OGM (the OGM could carry no changes)
	 */
2320 2321 2322 2323 2324 2325 2326 2327 2328 2329 2330 2331 2332
	spin_lock_bh(&orig_node->tt_buff_lock);
	if (tt_buff_len > 0) {
		kfree(orig_node->tt_buff);
		orig_node->tt_buff_len = 0;
		orig_node->tt_buff = kmalloc(tt_buff_len, GFP_ATOMIC);
		if (orig_node->tt_buff) {
			memcpy(orig_node->tt_buff, tt_buff, tt_buff_len);
			orig_node->tt_buff_len = tt_buff_len;
		}
	}
	spin_unlock_bh(&orig_node->tt_buff_lock);
}

2333
static void batadv_tt_req_purge(struct batadv_priv *bat_priv)
2334
{
2335 2336
	struct batadv_tt_req_node *node;
	struct hlist_node *safe;
2337

2338
	spin_lock_bh(&bat_priv->tt.req_list_lock);
2339
	hlist_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
2340 2341
		if (batadv_has_timed_out(node->issued_at,
					 BATADV_TT_REQUEST_TIMEOUT)) {
2342
			hlist_del_init(&node->list);
2343 2344 2345
			kfree(node);
		}
	}
2346
	spin_unlock_bh(&bat_priv->tt.req_list_lock);
2347 2348
}

2349 2350 2351 2352 2353
/**
 * batadv_tt_req_node_new - search and possibly create a tt_req_node object
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: orig node this request is being issued for
 *
2354
 * Return: the pointer to the new tt_req_node struct if no request
2355
 * has already been issued for this orig_node, NULL otherwise.
2356
 */
2357
static struct batadv_tt_req_node *
2358
batadv_tt_req_node_new(struct batadv_priv *bat_priv,
2359
		       struct batadv_orig_node *orig_node)
2360
{
2361
	struct batadv_tt_req_node *tt_req_node_tmp, *tt_req_node = NULL;
2362

2363
	spin_lock_bh(&bat_priv->tt.req_list_lock);
2364
	hlist_for_each_entry(tt_req_node_tmp, &bat_priv->tt.req_list, list) {
2365 2366
		if (batadv_compare_eth(tt_req_node_tmp, orig_node) &&
		    !batadv_has_timed_out(tt_req_node_tmp->issued_at,
2367
					  BATADV_TT_REQUEST_TIMEOUT))
2368 2369 2370 2371 2372 2373 2374
			goto unlock;
	}

	tt_req_node = kmalloc(sizeof(*tt_req_node), GFP_ATOMIC);
	if (!tt_req_node)
		goto unlock;

2375
	ether_addr_copy(tt_req_node->addr, orig_node->orig);
2376 2377
	tt_req_node->issued_at = jiffies;

2378
	hlist_add_head(&tt_req_node->list, &bat_priv->tt.req_list);
2379
unlock:
2380
	spin_unlock_bh(&bat_priv->tt.req_list_lock);
2381 2382 2383
	return tt_req_node;
}

2384 2385 2386 2387 2388
/**
 * batadv_tt_local_valid - verify that given tt entry is a valid one
 * @entry_ptr: to be checked local tt entry
 * @data_ptr: not used but definition required to satisfy the callback prototype
 *
2389
 * Return: 1 if the entry is a valid, 0 otherwise.
2390 2391
 */
static int batadv_tt_local_valid(const void *entry_ptr, const void *data_ptr)
2392
{
2393
	const struct batadv_tt_common_entry *tt_common_entry = entry_ptr;
2394

2395
	if (tt_common_entry->flags & BATADV_TT_CLIENT_NEW)
2396 2397 2398 2399
		return 0;
	return 1;
}

2400 2401
static int batadv_tt_global_valid(const void *entry_ptr,
				  const void *data_ptr)
2402
{
2403 2404 2405
	const struct batadv_tt_common_entry *tt_common_entry = entry_ptr;
	const struct batadv_tt_global_entry *tt_global_entry;
	const struct batadv_orig_node *orig_node = data_ptr;
2406

2407 2408
	if (tt_common_entry->flags & BATADV_TT_CLIENT_ROAM ||
	    tt_common_entry->flags & BATADV_TT_CLIENT_TEMP)
2409 2410
		return 0;

2411 2412
	tt_global_entry = container_of(tt_common_entry,
				       struct batadv_tt_global_entry,
2413 2414
				       common);

2415
	return batadv_tt_global_entry_has_orig(tt_global_entry, orig_node);
2416 2417
}

2418
/**
2419 2420
 * batadv_tt_tvlv_generate - fill the tvlv buff with the tt entries from the
 *  specified tt hash
2421 2422 2423
 * @bat_priv: the bat priv with all the soft interface information
 * @hash: hash table containing the tt entries
 * @tt_len: expected tvlv tt data buffer length in number of bytes
2424
 * @tvlv_buff: pointer to the buffer to fill with the TT data
2425 2426 2427
 * @valid_cb: function to filter tt change entries
 * @cb_data: data passed to the filter function as argument
 */
2428 2429
static void batadv_tt_tvlv_generate(struct batadv_priv *bat_priv,
				    struct batadv_hashtable *hash,
2430
				    void *tvlv_buff, u16 tt_len,
2431 2432
				    int (*valid_cb)(const void *, const void *),
				    void *cb_data)
2433
{
2434
	struct batadv_tt_common_entry *tt_common_entry;
2435
	struct batadv_tvlv_tt_change *tt_change;
2436
	struct hlist_head *head;
2437 2438
	u16 tt_tot, tt_num_entries = 0;
	u32 i;
2439

2440
	tt_tot = batadv_tt_entries(tt_len);
2441
	tt_change = (struct batadv_tvlv_tt_change *)tvlv_buff;
2442 2443 2444 2445 2446

	rcu_read_lock();
	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

2447
		hlist_for_each_entry_rcu(tt_common_entry,
2448
					 head, hash_entry) {
2449
			if (tt_tot == tt_num_entries)
2450 2451
				break;

2452
			if ((valid_cb) && (!valid_cb(tt_common_entry, cb_data)))
2453 2454
				continue;

2455
			ether_addr_copy(tt_change->addr, tt_common_entry->addr);
2456
			tt_change->flags = tt_common_entry->flags;
2457
			tt_change->vid = htons(tt_common_entry->vid);
2458 2459
			memset(tt_change->reserved, 0,
			       sizeof(tt_change->reserved));
2460

2461
			tt_num_entries++;
2462 2463 2464 2465
			tt_change++;
		}
	}
	rcu_read_unlock();
2466
}
2467

2468 2469 2470 2471 2472 2473
/**
 * batadv_tt_global_check_crc - check if all the CRCs are correct
 * @orig_node: originator for which the CRCs have to be checked
 * @tt_vlan: pointer to the first tvlv VLAN entry
 * @num_vlan: number of tvlv VLAN entries
 *
2474
 * Return: true if all the received CRCs match the locally stored ones, false
2475 2476 2477 2478
 * otherwise
 */
static bool batadv_tt_global_check_crc(struct batadv_orig_node *orig_node,
				       struct batadv_tvlv_tt_vlan_data *tt_vlan,
2479
				       u16 num_vlan)
2480 2481 2482
{
	struct batadv_tvlv_tt_vlan_data *tt_vlan_tmp;
	struct batadv_orig_node_vlan *vlan;
2483
	int i, orig_num_vlan;
2484
	u32 crc;
2485 2486 2487 2488 2489 2490 2491 2492 2493

	/* check if each received CRC matches the locally stored one */
	for (i = 0; i < num_vlan; i++) {
		tt_vlan_tmp = tt_vlan + i;

		/* if orig_node is a backbone node for this VLAN, don't check
		 * the CRC as we ignore all the global entries over it
		 */
		if (batadv_bla_is_backbone_gw_orig(orig_node->bat_priv,
2494 2495
						   orig_node->orig,
						   ntohs(tt_vlan_tmp->vid)))
2496 2497 2498 2499 2500 2501 2502
			continue;

		vlan = batadv_orig_node_vlan_get(orig_node,
						 ntohs(tt_vlan_tmp->vid));
		if (!vlan)
			return false;

2503 2504 2505 2506
		crc = vlan->tt.crc;
		batadv_orig_node_vlan_free_ref(vlan);

		if (crc != ntohl(tt_vlan_tmp->crc))
2507 2508 2509
			return false;
	}

2510 2511 2512 2513 2514 2515 2516 2517 2518 2519 2520 2521
	/* check if any excess VLANs exist locally for the originator
	 * which are not mentioned in the TVLV from the originator.
	 */
	rcu_read_lock();
	orig_num_vlan = 0;
	hlist_for_each_entry_rcu(vlan, &orig_node->vlan_list, list)
		orig_num_vlan++;
	rcu_read_unlock();

	if (orig_num_vlan > num_vlan)
		return false;

2522 2523 2524 2525 2526 2527 2528 2529 2530 2531 2532 2533 2534 2535 2536 2537 2538 2539 2540 2541 2542 2543 2544 2545 2546 2547 2548 2549
	return true;
}

/**
 * batadv_tt_local_update_crc - update all the local CRCs
 * @bat_priv: the bat priv with all the soft interface information
 */
static void batadv_tt_local_update_crc(struct batadv_priv *bat_priv)
{
	struct batadv_softif_vlan *vlan;

	/* recompute the global CRC for each VLAN */
	rcu_read_lock();
	hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
		vlan->tt.crc = batadv_tt_local_crc(bat_priv, vlan->vid);
	}
	rcu_read_unlock();
}

/**
 * batadv_tt_global_update_crc - update all the global CRCs for this orig_node
 * @bat_priv: the bat priv with all the soft interface information
 * @orig_node: the orig_node for which the CRCs have to be updated
 */
static void batadv_tt_global_update_crc(struct batadv_priv *bat_priv,
					struct batadv_orig_node *orig_node)
{
	struct batadv_orig_node_vlan *vlan;
2550
	u32 crc;
2551 2552 2553

	/* recompute the global CRC for each VLAN */
	rcu_read_lock();
2554
	hlist_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) {
2555 2556 2557
		/* if orig_node is a backbone node for this VLAN, don't compute
		 * the CRC as we ignore all the global entries over it
		 */
2558 2559
		if (batadv_bla_is_backbone_gw_orig(bat_priv, orig_node->orig,
						   vlan->vid))
2560 2561 2562 2563 2564 2565
			continue;

		crc = batadv_tt_global_crc(bat_priv, orig_node, vlan->vid);
		vlan->tt.crc = crc;
	}
	rcu_read_unlock();
2566 2567
}

2568 2569 2570 2571 2572
/**
 * batadv_send_tt_request - send a TT Request message to a given node
 * @bat_priv: the bat priv with all the soft interface information
 * @dst_orig_node: the destination of the message
 * @ttvn: the version number that the source of the message is looking for
2573 2574
 * @tt_vlan: pointer to the first tvlv VLAN object to request
 * @num_vlan: number of tvlv VLAN entries
2575 2576
 * @full_table: ask for the entire translation table if true, while only for the
 *  last TT diff otherwise
2577 2578
 *
 * Return: true if the TT Request was sent, false otherwise
2579
 */
2580 2581
static int batadv_send_tt_request(struct batadv_priv *bat_priv,
				  struct batadv_orig_node *dst_orig_node,
2582
				  u8 ttvn,
2583
				  struct batadv_tvlv_tt_vlan_data *tt_vlan,
2584
				  u16 num_vlan, bool full_table)
2585
{
2586
	struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
2587
	struct batadv_tt_req_node *tt_req_node = NULL;
2588 2589
	struct batadv_tvlv_tt_vlan_data *tt_vlan_req;
	struct batadv_hard_iface *primary_if;
2590
	bool ret = false;
2591
	int i, size;
2592

2593
	primary_if = batadv_primary_if_get_selected(bat_priv);
2594 2595 2596 2597
	if (!primary_if)
		goto out;

	/* The new tt_req will be issued only if I'm not waiting for a
2598 2599
	 * reply from the same orig_node yet
	 */
2600
	tt_req_node = batadv_tt_req_node_new(bat_priv, dst_orig_node);
2601 2602 2603
	if (!tt_req_node)
		goto out;

2604 2605
	size = sizeof(*tvlv_tt_data) + sizeof(*tt_vlan_req) * num_vlan;
	tvlv_tt_data = kzalloc(size, GFP_ATOMIC);
2606
	if (!tvlv_tt_data)
2607 2608
		goto out;

2609 2610
	tvlv_tt_data->flags = BATADV_TT_REQUEST;
	tvlv_tt_data->ttvn = ttvn;
2611 2612 2613 2614 2615 2616 2617 2618 2619 2620 2621 2622 2623
	tvlv_tt_data->num_vlan = htons(num_vlan);

	/* send all the CRCs within the request. This is needed by intermediate
	 * nodes to ensure they have the correct table before replying
	 */
	tt_vlan_req = (struct batadv_tvlv_tt_vlan_data *)(tvlv_tt_data + 1);
	for (i = 0; i < num_vlan; i++) {
		tt_vlan_req->vid = tt_vlan->vid;
		tt_vlan_req->crc = tt_vlan->crc;

		tt_vlan_req++;
		tt_vlan++;
	}
2624 2625

	if (full_table)
2626
		tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
2627

2628
	batadv_dbg(BATADV_DBG_TT, bat_priv, "Sending TT_REQUEST to %pM [%c]\n",
2629
		   dst_orig_node->orig, full_table ? 'F' : '.');
2630

2631
	batadv_inc_counter(bat_priv, BATADV_CNT_TT_REQUEST_TX);
2632 2633
	batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
				 dst_orig_node->orig, BATADV_TVLV_TT, 1,
2634
				 tvlv_tt_data, size);
2635
	ret = true;
2636 2637 2638

out:
	if (primary_if)
2639
		batadv_hardif_free_ref(primary_if);
2640
	if (ret && tt_req_node) {
2641
		spin_lock_bh(&bat_priv->tt.req_list_lock);
2642 2643
		/* hlist_del_init() verifies tt_req_node still is in the list */
		hlist_del_init(&tt_req_node->list);
2644
		spin_unlock_bh(&bat_priv->tt.req_list_lock);
2645 2646
		kfree(tt_req_node);
	}
2647
	kfree(tvlv_tt_data);
2648 2649 2650
	return ret;
}

2651 2652 2653 2654 2655 2656 2657 2658
/**
 * batadv_send_other_tt_response - send reply to tt request concerning another
 *  node's translation table
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: tt data containing the tt request information
 * @req_src: mac address of tt request sender
 * @req_dst: mac address of tt request recipient
 *
2659
 * Return: true if tt request reply was sent, false otherwise.
2660 2661 2662
 */
static bool batadv_send_other_tt_response(struct batadv_priv *bat_priv,
					  struct batadv_tvlv_tt_data *tt_data,
2663
					  u8 *req_src, u8 *req_dst)
2664
{
2665
	struct batadv_orig_node *req_dst_orig_node;
2666
	struct batadv_orig_node *res_dst_orig_node = NULL;
2667
	struct batadv_tvlv_tt_change *tt_change;
2668
	struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
2669
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
2670
	bool ret = false, full_table;
2671 2672 2673
	u8 orig_ttvn, req_ttvn;
	u16 tvlv_len;
	s32 tt_len;
2674

2675
	batadv_dbg(BATADV_DBG_TT, bat_priv,
2676
		   "Received TT_REQUEST from %pM for ttvn: %u (%pM) [%c]\n",
2677
		   req_src, tt_data->ttvn, req_dst,
2678
		   ((tt_data->flags & BATADV_TT_FULL_TABLE) ? 'F' : '.'));
2679 2680

	/* Let's get the orig node of the REAL destination */
2681
	req_dst_orig_node = batadv_orig_hash_find(bat_priv, req_dst);
2682 2683 2684
	if (!req_dst_orig_node)
		goto out;

2685
	res_dst_orig_node = batadv_orig_hash_find(bat_priv, req_src);
2686 2687 2688
	if (!res_dst_orig_node)
		goto out;

2689
	orig_ttvn = (u8)atomic_read(&req_dst_orig_node->last_ttvn);
2690
	req_ttvn = tt_data->ttvn;
2691

2692
	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(tt_data + 1);
2693
	/* this node doesn't have the requested data */
2694
	if (orig_ttvn != req_ttvn ||
2695 2696
	    !batadv_tt_global_check_crc(req_dst_orig_node, tt_vlan,
					ntohs(tt_data->num_vlan)))
2697 2698
		goto out;

2699
	/* If the full table has been explicitly requested */
2700
	if (tt_data->flags & BATADV_TT_FULL_TABLE ||
2701 2702 2703 2704 2705
	    !req_dst_orig_node->tt_buff)
		full_table = true;
	else
		full_table = false;

2706 2707
	/* TT fragmentation hasn't been implemented yet, so send as many
	 * TT entries fit a single packet as possible only
2708
	 */
2709 2710 2711 2712
	if (!full_table) {
		spin_lock_bh(&req_dst_orig_node->tt_buff_lock);
		tt_len = req_dst_orig_node->tt_buff_len;

2713 2714 2715 2716 2717
		tvlv_len = batadv_tt_prepare_tvlv_global_data(req_dst_orig_node,
							      &tvlv_tt_data,
							      &tt_change,
							      &tt_len);
		if (!tt_len)
2718 2719 2720
			goto unlock;

		/* Copy the last orig_node's OGM buffer */
2721
		memcpy(tt_change, req_dst_orig_node->tt_buff,
2722 2723 2724
		       req_dst_orig_node->tt_buff_len);
		spin_unlock_bh(&req_dst_orig_node->tt_buff_lock);
	} else {
2725 2726 2727 2728 2729 2730 2731 2732 2733
		/* allocate the tvlv, put the tt_data and all the tt_vlan_data
		 * in the initial part
		 */
		tt_len = -1;
		tvlv_len = batadv_tt_prepare_tvlv_global_data(req_dst_orig_node,
							      &tvlv_tt_data,
							      &tt_change,
							      &tt_len);
		if (!tt_len)
2734
			goto out;
2735 2736 2737 2738 2739 2740

		/* fill the rest of the tvlv with the real TT entries */
		batadv_tt_tvlv_generate(bat_priv, bat_priv->tt.global_hash,
					tt_change, tt_len,
					batadv_tt_global_valid,
					req_dst_orig_node);
2741 2742
	}

2743 2744 2745 2746 2747 2748 2749 2750 2751
	/* Don't send the response, if larger than fragmented packet. */
	tt_len = sizeof(struct batadv_unicast_tvlv_packet) + tvlv_len;
	if (tt_len > atomic_read(&bat_priv->packet_size_max)) {
		net_ratelimited_function(batadv_info, bat_priv->soft_iface,
					 "Ignoring TT_REQUEST from %pM; Response size exceeds max packet size.\n",
					 res_dst_orig_node->orig);
		goto out;
	}

2752 2753
	tvlv_tt_data->flags = BATADV_TT_RESPONSE;
	tvlv_tt_data->ttvn = req_ttvn;
2754 2755

	if (full_table)
2756
		tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
2757

2758
	batadv_dbg(BATADV_DBG_TT, bat_priv,
2759 2760 2761
		   "Sending TT_RESPONSE %pM for %pM [%c] (ttvn: %u)\n",
		   res_dst_orig_node->orig, req_dst_orig_node->orig,
		   full_table ? 'F' : '.', req_ttvn);
2762

2763
	batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_TX);
2764

2765
	batadv_tvlv_unicast_send(bat_priv, req_dst_orig_node->orig,
2766 2767
				 req_src, BATADV_TVLV_TT, 1, tvlv_tt_data,
				 tvlv_len);
2768

2769
	ret = true;
2770 2771 2772 2773 2774 2775 2776
	goto out;

unlock:
	spin_unlock_bh(&req_dst_orig_node->tt_buff_lock);

out:
	if (res_dst_orig_node)
2777
		batadv_orig_node_free_ref(res_dst_orig_node);
2778
	if (req_dst_orig_node)
2779
		batadv_orig_node_free_ref(req_dst_orig_node);
2780
	kfree(tvlv_tt_data);
2781 2782
	return ret;
}
2783

2784 2785 2786 2787 2788 2789 2790
/**
 * batadv_send_my_tt_response - send reply to tt request concerning this node's
 *  translation table
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: tt data containing the tt request information
 * @req_src: mac address of tt request sender
 *
2791
 * Return: true if tt request reply was sent, false otherwise.
2792 2793 2794
 */
static bool batadv_send_my_tt_response(struct batadv_priv *bat_priv,
				       struct batadv_tvlv_tt_data *tt_data,
2795
				       u8 *req_src)
2796
{
2797
	struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
2798
	struct batadv_hard_iface *primary_if = NULL;
2799 2800
	struct batadv_tvlv_tt_change *tt_change;
	struct batadv_orig_node *orig_node;
2801 2802
	u8 my_ttvn, req_ttvn;
	u16 tvlv_len;
2803
	bool full_table;
2804
	s32 tt_len;
2805

2806
	batadv_dbg(BATADV_DBG_TT, bat_priv,
2807
		   "Received TT_REQUEST from %pM for ttvn: %u (me) [%c]\n",
2808
		   req_src, tt_data->ttvn,
2809
		   ((tt_data->flags & BATADV_TT_FULL_TABLE) ? 'F' : '.'));
2810

2811
	spin_lock_bh(&bat_priv->tt.commit_lock);
2812

2813
	my_ttvn = (u8)atomic_read(&bat_priv->tt.vn);
2814
	req_ttvn = tt_data->ttvn;
2815

2816
	orig_node = batadv_orig_hash_find(bat_priv, req_src);
2817 2818 2819
	if (!orig_node)
		goto out;

2820
	primary_if = batadv_primary_if_get_selected(bat_priv);
2821 2822 2823 2824
	if (!primary_if)
		goto out;

	/* If the full table has been explicitly requested or the gap
2825 2826
	 * is too big send the whole local translation table
	 */
2827
	if (tt_data->flags & BATADV_TT_FULL_TABLE || my_ttvn != req_ttvn ||
2828
	    !bat_priv->tt.last_changeset)
2829 2830 2831 2832
		full_table = true;
	else
		full_table = false;

2833 2834
	/* TT fragmentation hasn't been implemented yet, so send as many
	 * TT entries fit a single packet as possible only
2835
	 */
2836
	if (!full_table) {
2837
		spin_lock_bh(&bat_priv->tt.last_changeset_lock);
2838

2839 2840 2841 2842 2843 2844
		tt_len = bat_priv->tt.last_changeset_len;
		tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv,
							     &tvlv_tt_data,
							     &tt_change,
							     &tt_len);
		if (!tt_len)
2845 2846
			goto unlock;

2847
		/* Copy the last orig_node's OGM buffer */
2848
		memcpy(tt_change, bat_priv->tt.last_changeset,
2849 2850
		       bat_priv->tt.last_changeset_len);
		spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
2851
	} else {
2852
		req_ttvn = (u8)atomic_read(&bat_priv->tt.vn);
2853

2854 2855 2856 2857 2858 2859 2860 2861 2862
		/* allocate the tvlv, put the tt_data and all the tt_vlan_data
		 * in the initial part
		 */
		tt_len = -1;
		tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv,
							     &tvlv_tt_data,
							     &tt_change,
							     &tt_len);
		if (!tt_len)
2863
			goto out;
2864 2865 2866 2867 2868

		/* fill the rest of the tvlv with the real TT entries */
		batadv_tt_tvlv_generate(bat_priv, bat_priv->tt.local_hash,
					tt_change, tt_len,
					batadv_tt_local_valid, NULL);
2869 2870
	}

2871 2872
	tvlv_tt_data->flags = BATADV_TT_RESPONSE;
	tvlv_tt_data->ttvn = req_ttvn;
2873 2874

	if (full_table)
2875
		tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
2876

2877
	batadv_dbg(BATADV_DBG_TT, bat_priv,
2878 2879
		   "Sending TT_RESPONSE to %pM [%c] (ttvn: %u)\n",
		   orig_node->orig, full_table ? 'F' : '.', req_ttvn);
2880

2881
	batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_TX);
2882

2883
	batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
2884 2885
				 req_src, BATADV_TVLV_TT, 1, tvlv_tt_data,
				 tvlv_len);
2886

2887 2888 2889
	goto out;

unlock:
2890
	spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
2891
out:
2892
	spin_unlock_bh(&bat_priv->tt.commit_lock);
2893
	if (orig_node)
2894
		batadv_orig_node_free_ref(orig_node);
2895
	if (primary_if)
2896
		batadv_hardif_free_ref(primary_if);
2897 2898
	kfree(tvlv_tt_data);
	/* The packet was for this host, so it doesn't need to be re-routed */
2899 2900 2901
	return true;
}

2902 2903 2904 2905 2906 2907 2908
/**
 * batadv_send_tt_response - send reply to tt request
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: tt data containing the tt request information
 * @req_src: mac address of tt request sender
 * @req_dst: mac address of tt request recipient
 *
2909
 * Return: true if tt request reply was sent, false otherwise.
2910 2911 2912
 */
static bool batadv_send_tt_response(struct batadv_priv *bat_priv,
				    struct batadv_tvlv_tt_data *tt_data,
2913
				    u8 *req_src, u8 *req_dst)
2914
{
2915
	if (batadv_is_my_mac(bat_priv, req_dst))
2916
		return batadv_send_my_tt_response(bat_priv, tt_data, req_src);
2917 2918
	return batadv_send_other_tt_response(bat_priv, tt_data, req_src,
					     req_dst);
2919 2920
}

2921 2922
static void _batadv_tt_update_changes(struct batadv_priv *bat_priv,
				      struct batadv_orig_node *orig_node,
2923
				      struct batadv_tvlv_tt_change *tt_change,
2924
				      u16 tt_num_changes, u8 ttvn)
2925 2926
{
	int i;
2927
	int roams;
2928 2929

	for (i = 0; i < tt_num_changes; i++) {
2930 2931
		if ((tt_change + i)->flags & BATADV_TT_CLIENT_DEL) {
			roams = (tt_change + i)->flags & BATADV_TT_CLIENT_ROAM;
2932 2933
			batadv_tt_global_del(bat_priv, orig_node,
					     (tt_change + i)->addr,
2934
					     ntohs((tt_change + i)->vid),
2935 2936
					     "tt removed by changes",
					     roams);
2937 2938
		} else {
			if (!batadv_tt_global_add(bat_priv, orig_node,
2939
						  (tt_change + i)->addr,
2940
						  ntohs((tt_change + i)->vid),
2941
						  (tt_change + i)->flags, ttvn))
2942 2943 2944 2945 2946 2947 2948
				/* In case of problem while storing a
				 * global_entry, we stop the updating
				 * procedure without committing the
				 * ttvn change. This will avoid to send
				 * corrupted data on tt_request
				 */
				return;
2949
		}
2950
	}
2951
	set_bit(BATADV_ORIG_CAPA_HAS_TT, &orig_node->capa_initialized);
2952 2953
}

2954
static void batadv_tt_fill_gtable(struct batadv_priv *bat_priv,
2955
				  struct batadv_tvlv_tt_change *tt_change,
2956 2957
				  u8 ttvn, u8 *resp_src,
				  u16 num_entries)
2958
{
2959
	struct batadv_orig_node *orig_node;
2960

2961
	orig_node = batadv_orig_hash_find(bat_priv, resp_src);
2962 2963 2964 2965
	if (!orig_node)
		goto out;

	/* Purge the old table first.. */
2966 2967
	batadv_tt_global_del_orig(bat_priv, orig_node, -1,
				  "Received full table");
2968

2969 2970
	_batadv_tt_update_changes(bat_priv, orig_node, tt_change, num_entries,
				  ttvn);
2971 2972 2973 2974 2975 2976 2977

	spin_lock_bh(&orig_node->tt_buff_lock);
	kfree(orig_node->tt_buff);
	orig_node->tt_buff_len = 0;
	orig_node->tt_buff = NULL;
	spin_unlock_bh(&orig_node->tt_buff_lock);

2978
	atomic_set(&orig_node->last_ttvn, ttvn);
2979 2980 2981

out:
	if (orig_node)
2982
		batadv_orig_node_free_ref(orig_node);
2983 2984
}

2985 2986
static void batadv_tt_update_changes(struct batadv_priv *bat_priv,
				     struct batadv_orig_node *orig_node,
2987
				     u16 tt_num_changes, u8 ttvn,
2988
				     struct batadv_tvlv_tt_change *tt_change)
2989
{
2990 2991
	_batadv_tt_update_changes(bat_priv, orig_node, tt_change,
				  tt_num_changes, ttvn);
2992

2993 2994
	batadv_tt_save_orig_buffer(bat_priv, orig_node, tt_change,
				   batadv_tt_len(tt_num_changes));
2995 2996 2997
	atomic_set(&orig_node->last_ttvn, ttvn);
}

2998 2999 3000
/**
 * batadv_is_my_client - check if a client is served by the local node
 * @bat_priv: the bat priv with all the soft interface information
3001
 * @addr: the mac address of the client to check
3002 3003
 * @vid: VLAN identifier
 *
3004
 * Return: true if the client is served by this node, false otherwise.
3005
 */
3006
bool batadv_is_my_client(struct batadv_priv *bat_priv, const u8 *addr,
3007
			 unsigned short vid)
3008
{
3009
	struct batadv_tt_local_entry *tt_local_entry;
3010
	bool ret = false;
3011

3012
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
3013 3014
	if (!tt_local_entry)
		goto out;
3015
	/* Check if the client has been logically deleted (but is kept for
3016 3017
	 * consistency purpose)
	 */
3018 3019
	if ((tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING) ||
	    (tt_local_entry->common.flags & BATADV_TT_CLIENT_ROAM))
3020
		goto out;
3021 3022
	ret = true;
out:
3023
	if (tt_local_entry)
3024
		batadv_tt_local_entry_free_ref(tt_local_entry);
3025
	return ret;
3026 3027
}

3028 3029 3030 3031 3032 3033 3034 3035 3036
/**
 * batadv_handle_tt_response - process incoming tt reply
 * @bat_priv: the bat priv with all the soft interface information
 * @tt_data: tt data containing the tt request information
 * @resp_src: mac address of tt reply sender
 * @num_entries: number of tt change entries appended to the tt data
 */
static void batadv_handle_tt_response(struct batadv_priv *bat_priv,
				      struct batadv_tvlv_tt_data *tt_data,
3037
				      u8 *resp_src, u16 num_entries)
3038
{
3039 3040
	struct batadv_tt_req_node *node;
	struct hlist_node *safe;
3041
	struct batadv_orig_node *orig_node = NULL;
3042
	struct batadv_tvlv_tt_change *tt_change;
3043 3044
	u8 *tvlv_ptr = (u8 *)tt_data;
	u16 change_offset;
3045

3046
	batadv_dbg(BATADV_DBG_TT, bat_priv,
3047
		   "Received TT_RESPONSE from %pM for ttvn %d t_size: %d [%c]\n",
3048
		   resp_src, tt_data->ttvn, num_entries,
3049
		   ((tt_data->flags & BATADV_TT_FULL_TABLE) ? 'F' : '.'));
3050

3051
	orig_node = batadv_orig_hash_find(bat_priv, resp_src);
3052 3053 3054
	if (!orig_node)
		goto out;

3055 3056
	spin_lock_bh(&orig_node->tt_lock);

3057 3058 3059 3060 3061 3062
	change_offset = sizeof(struct batadv_tvlv_tt_vlan_data);
	change_offset *= ntohs(tt_data->num_vlan);
	change_offset += sizeof(*tt_data);
	tvlv_ptr += change_offset;

	tt_change = (struct batadv_tvlv_tt_change *)tvlv_ptr;
3063
	if (tt_data->flags & BATADV_TT_FULL_TABLE) {
3064 3065
		batadv_tt_fill_gtable(bat_priv, tt_change, tt_data->ttvn,
				      resp_src, num_entries);
3066
	} else {
3067 3068
		batadv_tt_update_changes(bat_priv, orig_node, num_entries,
					 tt_data->ttvn, tt_change);
3069
	}
3070

3071
	/* Recalculate the CRC for this orig_node and store it */
3072
	batadv_tt_global_update_crc(bat_priv, orig_node);
3073 3074 3075

	spin_unlock_bh(&orig_node->tt_lock);

3076
	/* Delete the tt_req_node from pending tt_requests list */
3077
	spin_lock_bh(&bat_priv->tt.req_list_lock);
3078
	hlist_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
3079
		if (!batadv_compare_eth(node->addr, resp_src))
3080
			continue;
3081
		hlist_del_init(&node->list);
3082 3083
		kfree(node);
	}
3084

3085
	spin_unlock_bh(&bat_priv->tt.req_list_lock);
3086 3087
out:
	if (orig_node)
3088
		batadv_orig_node_free_ref(orig_node);
3089 3090
}

3091
static void batadv_tt_roam_list_free(struct batadv_priv *bat_priv)
3092
{
3093
	struct batadv_tt_roam_node *node, *safe;
3094

3095
	spin_lock_bh(&bat_priv->tt.roam_list_lock);
3096

3097
	list_for_each_entry_safe(node, safe, &bat_priv->tt.roam_list, list) {
3098 3099 3100 3101
		list_del(&node->list);
		kfree(node);
	}

3102
	spin_unlock_bh(&bat_priv->tt.roam_list_lock);
3103 3104
}

3105
static void batadv_tt_roam_purge(struct batadv_priv *bat_priv)
3106
{
3107
	struct batadv_tt_roam_node *node, *safe;
3108

3109 3110
	spin_lock_bh(&bat_priv->tt.roam_list_lock);
	list_for_each_entry_safe(node, safe, &bat_priv->tt.roam_list, list) {
3111 3112
		if (!batadv_has_timed_out(node->first_time,
					  BATADV_ROAMING_MAX_TIME))
3113 3114 3115 3116 3117
			continue;

		list_del(&node->list);
		kfree(node);
	}
3118
	spin_unlock_bh(&bat_priv->tt.roam_list_lock);
3119 3120
}

3121
/**
3122 3123 3124
 * batadv_tt_check_roam_count - check if a client has roamed too frequently
 * @bat_priv: the bat priv with all the soft interface information
 * @client: mac address of the roaming client
3125 3126
 *
 * This function checks whether the client already reached the
3127 3128 3129
 * maximum number of possible roaming phases. In this case the ROAMING_ADV
 * will not be sent.
 *
3130
 * Return: true if the ROAMING_ADV can be sent, false otherwise
3131
 */
3132
static bool batadv_tt_check_roam_count(struct batadv_priv *bat_priv, u8 *client)
3133
{
3134
	struct batadv_tt_roam_node *tt_roam_node;
3135 3136
	bool ret = false;

3137
	spin_lock_bh(&bat_priv->tt.roam_list_lock);
3138
	/* The new tt_req will be issued only if I'm not waiting for a
3139 3140
	 * reply from the same orig_node yet
	 */
3141
	list_for_each_entry(tt_roam_node, &bat_priv->tt.roam_list, list) {
3142
		if (!batadv_compare_eth(tt_roam_node->addr, client))
3143 3144
			continue;

3145
		if (batadv_has_timed_out(tt_roam_node->first_time,
3146
					 BATADV_ROAMING_MAX_TIME))
3147 3148
			continue;

3149
		if (!batadv_atomic_dec_not_zero(&tt_roam_node->counter))
3150 3151 3152 3153 3154 3155 3156 3157 3158 3159 3160 3161
			/* Sorry, you roamed too many times! */
			goto unlock;
		ret = true;
		break;
	}

	if (!ret) {
		tt_roam_node = kmalloc(sizeof(*tt_roam_node), GFP_ATOMIC);
		if (!tt_roam_node)
			goto unlock;

		tt_roam_node->first_time = jiffies;
3162 3163
		atomic_set(&tt_roam_node->counter,
			   BATADV_ROAMING_MAX_COUNT - 1);
3164
		ether_addr_copy(tt_roam_node->addr, client);
3165

3166
		list_add(&tt_roam_node->list, &bat_priv->tt.roam_list);
3167 3168 3169 3170
		ret = true;
	}

unlock:
3171
	spin_unlock_bh(&bat_priv->tt.roam_list_lock);
3172 3173 3174
	return ret;
}

3175 3176 3177 3178 3179 3180 3181 3182 3183 3184 3185 3186
/**
 * batadv_send_roam_adv - send a roaming advertisement message
 * @bat_priv: the bat priv with all the soft interface information
 * @client: mac address of the roaming client
 * @vid: VLAN identifier
 * @orig_node: message destination
 *
 * Send a ROAMING_ADV message to the node which was previously serving this
 * client. This is done to inform the node that from now on all traffic destined
 * for this particular roamed client has to be forwarded to the sender of the
 * roaming message.
 */
3187
static void batadv_send_roam_adv(struct batadv_priv *bat_priv, u8 *client,
3188
				 unsigned short vid,
3189
				 struct batadv_orig_node *orig_node)
3190
{
3191
	struct batadv_hard_iface *primary_if;
3192 3193 3194 3195 3196
	struct batadv_tvlv_roam_adv tvlv_roam;

	primary_if = batadv_primary_if_get_selected(bat_priv);
	if (!primary_if)
		goto out;
3197 3198

	/* before going on we have to check whether the client has
3199 3200
	 * already roamed to us too many times
	 */
3201
	if (!batadv_tt_check_roam_count(bat_priv, client))
3202 3203
		goto out;

3204
	batadv_dbg(BATADV_DBG_TT, bat_priv,
3205 3206
		   "Sending ROAMING_ADV to %pM (client %pM, vid: %d)\n",
		   orig_node->orig, client, BATADV_PRINT_VID(vid));
3207

3208
	batadv_inc_counter(bat_priv, BATADV_CNT_TT_ROAM_ADV_TX);
3209

3210
	memcpy(tvlv_roam.client, client, sizeof(tvlv_roam.client));
3211
	tvlv_roam.vid = htons(vid);
3212 3213 3214 3215

	batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
				 orig_node->orig, BATADV_TVLV_ROAM, 1,
				 &tvlv_roam, sizeof(tvlv_roam));
3216 3217

out:
3218 3219
	if (primary_if)
		batadv_hardif_free_ref(primary_if);
3220 3221
}

3222
static void batadv_tt_purge(struct work_struct *work)
3223
{
3224
	struct delayed_work *delayed_work;
3225
	struct batadv_priv_tt *priv_tt;
3226 3227 3228
	struct batadv_priv *bat_priv;

	delayed_work = container_of(work, struct delayed_work, work);
3229 3230
	priv_tt = container_of(delayed_work, struct batadv_priv_tt, work);
	bat_priv = container_of(priv_tt, struct batadv_priv, tt);
3231

3232
	batadv_tt_local_purge(bat_priv, BATADV_TT_LOCAL_TIMEOUT);
3233
	batadv_tt_global_purge(bat_priv);
3234 3235
	batadv_tt_req_purge(bat_priv);
	batadv_tt_roam_purge(bat_priv);
3236

3237 3238
	queue_delayed_work(batadv_event_workqueue, &bat_priv->tt.work,
			   msecs_to_jiffies(BATADV_TT_WORK_PERIOD));
3239
}
3240

3241
void batadv_tt_free(struct batadv_priv *bat_priv)
3242
{
3243 3244 3245
	batadv_tvlv_container_unregister(bat_priv, BATADV_TVLV_TT, 1);
	batadv_tvlv_handler_unregister(bat_priv, BATADV_TVLV_TT, 1);

3246
	cancel_delayed_work_sync(&bat_priv->tt.work);
3247

3248 3249 3250 3251 3252
	batadv_tt_local_table_free(bat_priv);
	batadv_tt_global_table_free(bat_priv);
	batadv_tt_req_list_free(bat_priv);
	batadv_tt_changes_list_free(bat_priv);
	batadv_tt_roam_list_free(bat_priv);
3253

3254
	kfree(bat_priv->tt.last_changeset);
3255
}
3256

3257 3258 3259 3260 3261 3262 3263
/**
 * batadv_tt_local_set_flags - set or unset the specified flags on the local
 *  table and possibly count them in the TT size
 * @bat_priv: the bat priv with all the soft interface information
 * @flags: the flag to switch
 * @enable: whether to set or unset the flag
 * @count: whether to increase the TT size by the number of changed entries
3264
 */
3265 3266
static void batadv_tt_local_set_flags(struct batadv_priv *bat_priv, u16 flags,
				      bool enable, bool count)
3267
{
3268 3269
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
	struct batadv_tt_common_entry *tt_common_entry;
3270
	u16 changed_num = 0;
3271
	struct hlist_head *head;
3272
	u32 i;
3273 3274

	if (!hash)
3275
		return;
3276 3277 3278 3279 3280

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];

		rcu_read_lock();
3281
		hlist_for_each_entry_rcu(tt_common_entry,
3282
					 head, hash_entry) {
3283 3284 3285 3286 3287 3288 3289 3290 3291 3292
			if (enable) {
				if ((tt_common_entry->flags & flags) == flags)
					continue;
				tt_common_entry->flags |= flags;
			} else {
				if (!(tt_common_entry->flags & flags))
					continue;
				tt_common_entry->flags &= ~flags;
			}
			changed_num++;
3293 3294 3295 3296 3297 3298

			if (!count)
				continue;

			batadv_tt_local_size_inc(bat_priv,
						 tt_common_entry->vid);
3299 3300 3301 3302 3303
		}
		rcu_read_unlock();
	}
}

3304
/* Purge out all the tt local entries marked with BATADV_TT_CLIENT_PENDING */
3305
static void batadv_tt_local_purge_pending_clients(struct batadv_priv *bat_priv)
3306
{
3307
	struct batadv_hashtable *hash = bat_priv->tt.local_hash;
3308 3309
	struct batadv_tt_common_entry *tt_common;
	struct batadv_tt_local_entry *tt_local;
3310
	struct batadv_softif_vlan *vlan;
3311
	struct hlist_node *node_tmp;
3312 3313
	struct hlist_head *head;
	spinlock_t *list_lock; /* protects write access to the hash lists */
3314
	u32 i;
3315 3316 3317 3318 3319 3320 3321 3322 3323

	if (!hash)
		return;

	for (i = 0; i < hash->size; i++) {
		head = &hash->table[i];
		list_lock = &hash->list_locks[i];

		spin_lock_bh(list_lock);
3324
		hlist_for_each_entry_safe(tt_common, node_tmp, head,
3325 3326
					  hash_entry) {
			if (!(tt_common->flags & BATADV_TT_CLIENT_PENDING))
3327 3328
				continue;

3329
			batadv_dbg(BATADV_DBG_TT, bat_priv,
3330 3331 3332
				   "Deleting local tt entry (%pM, vid: %d): pending\n",
				   tt_common->addr,
				   BATADV_PRINT_VID(tt_common->vid));
3333

3334
			batadv_tt_local_size_dec(bat_priv, tt_common->vid);
3335
			hlist_del_rcu(&tt_common->hash_entry);
3336 3337 3338
			tt_local = container_of(tt_common,
						struct batadv_tt_local_entry,
						common);
3339 3340 3341

			/* decrease the reference held for this vlan */
			vlan = batadv_softif_vlan_get(bat_priv, tt_common->vid);
3342 3343 3344 3345
			if (vlan) {
				batadv_softif_vlan_free_ref(vlan);
				batadv_softif_vlan_free_ref(vlan);
			}
3346

3347
			batadv_tt_local_entry_free_ref(tt_local);
3348 3349 3350 3351 3352
		}
		spin_unlock_bh(list_lock);
	}
}

3353
/**
3354 3355
 * batadv_tt_local_commit_changes_nolock - commit all pending local tt changes
 *  which have been queued in the time since the last commit
3356
 * @bat_priv: the bat priv with all the soft interface information
3357 3358
 *
 * Caller must hold tt->commit_lock.
3359
 */
3360
static void batadv_tt_local_commit_changes_nolock(struct batadv_priv *bat_priv)
3361
{
3362 3363
	lockdep_assert_held(&bat_priv->tt.commit_lock);

3364 3365 3366
	/* Update multicast addresses in local translation table */
	batadv_mcast_mla_update(bat_priv);

3367 3368 3369
	if (atomic_read(&bat_priv->tt.local_changes) < 1) {
		if (!batadv_atomic_dec_not_zero(&bat_priv->tt.ogm_append_cnt))
			batadv_tt_tvlv_container_update(bat_priv);
3370
		return;
3371
	}
3372

3373
	batadv_tt_local_set_flags(bat_priv, BATADV_TT_CLIENT_NEW, false, true);
3374

3375
	batadv_tt_local_purge_pending_clients(bat_priv);
3376
	batadv_tt_local_update_crc(bat_priv);
3377 3378

	/* Increment the TTVN only once per OGM interval */
3379
	atomic_inc(&bat_priv->tt.vn);
3380
	batadv_dbg(BATADV_DBG_TT, bat_priv,
3381
		   "Local changes committed, updating to ttvn %u\n",
3382
		   (u8)atomic_read(&bat_priv->tt.vn));
3383 3384

	/* reset the sending counter */
3385
	atomic_set(&bat_priv->tt.ogm_append_cnt, BATADV_TT_OGM_APPEND_MAX);
3386
	batadv_tt_tvlv_container_update(bat_priv);
3387
}
3388

3389 3390 3391 3392 3393 3394 3395 3396 3397
/**
 * batadv_tt_local_commit_changes - commit all pending local tt changes which
 *  have been queued in the time since the last commit
 * @bat_priv: the bat priv with all the soft interface information
 */
void batadv_tt_local_commit_changes(struct batadv_priv *bat_priv)
{
	spin_lock_bh(&bat_priv->tt.commit_lock);
	batadv_tt_local_commit_changes_nolock(bat_priv);
3398
	spin_unlock_bh(&bat_priv->tt.commit_lock);
3399
}
3400

3401 3402
bool batadv_is_ap_isolated(struct batadv_priv *bat_priv, u8 *src, u8 *dst,
			   unsigned short vid)
3403
{
3404 3405
	struct batadv_tt_local_entry *tt_local_entry = NULL;
	struct batadv_tt_global_entry *tt_global_entry = NULL;
3406
	struct batadv_softif_vlan *vlan;
3407
	bool ret = false;
3408

3409
	vlan = batadv_softif_vlan_get(bat_priv, vid);
3410 3411 3412 3413
	if (!vlan)
		return false;

	if (!atomic_read(&vlan->ap_isolation))
3414
		goto out;
3415

3416
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, dst, vid);
3417 3418 3419
	if (!tt_local_entry)
		goto out;

3420
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, src, vid);
3421 3422 3423
	if (!tt_global_entry)
		goto out;

3424
	if (!_batadv_is_ap_isolated(tt_local_entry, tt_global_entry))
3425 3426
		goto out;

3427
	ret = true;
3428 3429

out:
3430
	batadv_softif_vlan_free_ref(vlan);
3431
	if (tt_global_entry)
3432
		batadv_tt_global_entry_free_ref(tt_global_entry);
3433
	if (tt_local_entry)
3434
		batadv_tt_local_entry_free_ref(tt_local_entry);
3435 3436
	return ret;
}
3437

3438 3439 3440 3441
/**
 * batadv_tt_update_orig - update global translation table with new tt
 *  information received via ogms
 * @bat_priv: the bat priv with all the soft interface information
3442 3443
 * @orig_node: the orig_node of the ogm
 * @tt_buff: pointer to the first tvlv VLAN entry
3444 3445
 * @tt_num_vlan: number of tvlv VLAN entries
 * @tt_change: pointer to the first entry in the TT buffer
3446 3447 3448 3449 3450
 * @tt_num_changes: number of tt changes inside the tt buffer
 * @ttvn: translation table version number of this changeset
 */
static void batadv_tt_update_orig(struct batadv_priv *bat_priv,
				  struct batadv_orig_node *orig_node,
3451
				  const void *tt_buff, u16 tt_num_vlan,
3452
				  struct batadv_tvlv_tt_change *tt_change,
3453
				  u16 tt_num_changes, u8 ttvn)
3454
{
3455
	u8 orig_ttvn = (u8)atomic_read(&orig_node->last_ttvn);
3456
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
3457
	bool full_table = true;
3458
	bool has_tt_init;
3459

3460
	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)tt_buff;
3461 3462
	has_tt_init = test_bit(BATADV_ORIG_CAPA_HAS_TT,
			       &orig_node->capa_initialized);
3463

3464
	/* orig table not initialised AND first diff is in the OGM OR the ttvn
3465 3466
	 * increased by one -> we can apply the attached changes
	 */
3467
	if ((!has_tt_init && ttvn == 1) || ttvn - orig_ttvn == 1) {
3468
		/* the OGM could not contain the changes due to their size or
3469 3470
		 * because they have already been sent BATADV_TT_OGM_APPEND_MAX
		 * times.
3471 3472
		 * In this case send a tt request
		 */
3473 3474 3475 3476 3477
		if (!tt_num_changes) {
			full_table = false;
			goto request_table;
		}

3478 3479
		spin_lock_bh(&orig_node->tt_lock);

3480
		batadv_tt_update_changes(bat_priv, orig_node, tt_num_changes,
3481
					 ttvn, tt_change);
3482 3483 3484

		/* Even if we received the precomputed crc with the OGM, we
		 * prefer to recompute it to spot any possible inconsistency
3485 3486
		 * in the global table
		 */
3487
		batadv_tt_global_update_crc(bat_priv, orig_node);
3488

3489 3490
		spin_unlock_bh(&orig_node->tt_lock);

3491 3492 3493 3494 3495 3496 3497
		/* The ttvn alone is not enough to guarantee consistency
		 * because a single value could represent different states
		 * (due to the wrap around). Thus a node has to check whether
		 * the resulting table (after applying the changes) is still
		 * consistent or not. E.g. a node could disconnect while its
		 * ttvn is X and reconnect on ttvn = X + TTVN_MAX: in this case
		 * checking the CRC value is mandatory to detect the
3498 3499
		 * inconsistency
		 */
3500 3501
		if (!batadv_tt_global_check_crc(orig_node, tt_vlan,
						tt_num_vlan))
3502 3503 3504
			goto request_table;
	} else {
		/* if we missed more than one change or our tables are not
3505 3506
		 * in sync anymore -> request fresh tt data
		 */
3507
		if (!has_tt_init || ttvn != orig_ttvn ||
3508 3509
		    !batadv_tt_global_check_crc(orig_node, tt_vlan,
						tt_num_vlan)) {
3510
request_table:
3511
			batadv_dbg(BATADV_DBG_TT, bat_priv,
3512 3513 3514
				   "TT inconsistency for %pM. Need to retrieve the correct information (ttvn: %u last_ttvn: %u num_changes: %u)\n",
				   orig_node->orig, ttvn, orig_ttvn,
				   tt_num_changes);
3515
			batadv_send_tt_request(bat_priv, orig_node, ttvn,
3516 3517
					       tt_vlan, tt_num_vlan,
					       full_table);
3518 3519 3520 3521
			return;
		}
	}
}
3522

3523 3524 3525 3526 3527 3528
/**
 * batadv_tt_global_client_is_roaming - check if a client is marked as roaming
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the mac address of the client to check
 * @vid: VLAN identifier
 *
3529
 * Return: true if we know that the client has moved from its old originator
3530 3531
 * to another one. This entry is still kept for consistency purposes and will be
 * deleted later by a DEL or because of timeout
3532
 */
3533
bool batadv_tt_global_client_is_roaming(struct batadv_priv *bat_priv,
3534
					u8 *addr, unsigned short vid)
3535
{
3536
	struct batadv_tt_global_entry *tt_global_entry;
3537 3538
	bool ret = false;

3539
	tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
3540 3541 3542
	if (!tt_global_entry)
		goto out;

3543
	ret = tt_global_entry->common.flags & BATADV_TT_CLIENT_ROAM;
3544
	batadv_tt_global_entry_free_ref(tt_global_entry);
3545 3546 3547
out:
	return ret;
}
3548

3549 3550 3551
/**
 * batadv_tt_local_client_is_roaming - tells whether the client is roaming
 * @bat_priv: the bat priv with all the soft interface information
3552 3553
 * @addr: the mac address of the local client to query
 * @vid: VLAN identifier
3554
 *
3555
 * Return: true if the local client is known to be roaming (it is not served by
3556 3557 3558 3559
 * this node anymore) or not. If yes, the client is still present in the table
 * to keep the latter consistent with the node TTVN
 */
bool batadv_tt_local_client_is_roaming(struct batadv_priv *bat_priv,
3560
				       u8 *addr, unsigned short vid)
3561 3562 3563 3564
{
	struct batadv_tt_local_entry *tt_local_entry;
	bool ret = false;

3565
	tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
3566 3567 3568 3569 3570 3571 3572 3573 3574
	if (!tt_local_entry)
		goto out;

	ret = tt_local_entry->common.flags & BATADV_TT_CLIENT_ROAM;
	batadv_tt_local_entry_free_ref(tt_local_entry);
out:
	return ret;
}

3575 3576
bool batadv_tt_add_temporary_global_entry(struct batadv_priv *bat_priv,
					  struct batadv_orig_node *orig_node,
3577
					  const unsigned char *addr,
3578
					  unsigned short vid)
3579 3580 3581
{
	bool ret = false;

3582
	if (!batadv_tt_global_add(bat_priv, orig_node, addr, vid,
3583 3584 3585 3586 3587
				  BATADV_TT_CLIENT_TEMP,
				  atomic_read(&orig_node->last_ttvn)))
		goto out;

	batadv_dbg(BATADV_DBG_TT, bat_priv,
3588 3589
		   "Added temporary global client (addr: %pM, vid: %d, orig: %pM)\n",
		   addr, BATADV_PRINT_VID(vid), orig_node->orig);
3590 3591 3592 3593
	ret = true;
out:
	return ret;
}
3594

3595 3596 3597 3598 3599 3600 3601 3602 3603 3604 3605 3606 3607 3608 3609 3610 3611 3612 3613 3614 3615 3616 3617 3618 3619 3620 3621 3622 3623 3624 3625 3626 3627 3628 3629 3630 3631 3632 3633 3634 3635
/**
 * batadv_tt_local_resize_to_mtu - resize the local translation table fit the
 *  maximum packet size that can be transported through the mesh
 * @soft_iface: netdev struct of the mesh interface
 *
 * Remove entries older than 'timeout' and half timeout if more entries need
 * to be removed.
 */
void batadv_tt_local_resize_to_mtu(struct net_device *soft_iface)
{
	struct batadv_priv *bat_priv = netdev_priv(soft_iface);
	int packet_size_max = atomic_read(&bat_priv->packet_size_max);
	int table_size, timeout = BATADV_TT_LOCAL_TIMEOUT / 2;
	bool reduced = false;

	spin_lock_bh(&bat_priv->tt.commit_lock);

	while (true) {
		table_size = batadv_tt_local_table_transmit_size(bat_priv);
		if (packet_size_max >= table_size)
			break;

		batadv_tt_local_purge(bat_priv, timeout);
		batadv_tt_local_purge_pending_clients(bat_priv);

		timeout /= 2;
		reduced = true;
		net_ratelimited_function(batadv_info, soft_iface,
					 "Forced to purge local tt entries to fit new maximum fragment MTU (%i)\n",
					 packet_size_max);
	}

	/* commit these changes immediately, to avoid synchronization problem
	 * with the TTVN
	 */
	if (reduced)
		batadv_tt_local_commit_changes_nolock(bat_priv);

	spin_unlock_bh(&bat_priv->tt.commit_lock);
}

3636 3637 3638 3639 3640 3641 3642 3643 3644 3645
/**
 * batadv_tt_tvlv_ogm_handler_v1 - process incoming tt tvlv container
 * @bat_priv: the bat priv with all the soft interface information
 * @orig: the orig_node of the ogm
 * @flags: flags indicating the tvlv state (see batadv_tvlv_handler_flags)
 * @tvlv_value: tvlv buffer containing the gateway data
 * @tvlv_value_len: tvlv buffer length
 */
static void batadv_tt_tvlv_ogm_handler_v1(struct batadv_priv *bat_priv,
					  struct batadv_orig_node *orig,
3646 3647
					  u8 flags, void *tvlv_value,
					  u16 tvlv_value_len)
3648
{
3649 3650
	struct batadv_tvlv_tt_vlan_data *tt_vlan;
	struct batadv_tvlv_tt_change *tt_change;
3651
	struct batadv_tvlv_tt_data *tt_data;
3652
	u16 num_entries, num_vlan;
3653 3654 3655 3656 3657 3658 3659

	if (tvlv_value_len < sizeof(*tt_data))
		return;

	tt_data = (struct batadv_tvlv_tt_data *)tvlv_value;
	tvlv_value_len -= sizeof(*tt_data);

3660 3661 3662 3663 3664 3665 3666 3667 3668
	num_vlan = ntohs(tt_data->num_vlan);

	if (tvlv_value_len < sizeof(*tt_vlan) * num_vlan)
		return;

	tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(tt_data + 1);
	tt_change = (struct batadv_tvlv_tt_change *)(tt_vlan + num_vlan);
	tvlv_value_len -= sizeof(*tt_vlan) * num_vlan;

3669
	num_entries = batadv_tt_entries(tvlv_value_len);
3670

3671 3672
	batadv_tt_update_orig(bat_priv, orig, tt_vlan, num_vlan, tt_change,
			      num_entries, tt_data->ttvn);
3673 3674
}

3675 3676 3677 3678 3679 3680 3681 3682 3683
/**
 * batadv_tt_tvlv_unicast_handler_v1 - process incoming (unicast) tt tvlv
 *  container
 * @bat_priv: the bat priv with all the soft interface information
 * @src: mac address of tt tvlv sender
 * @dst: mac address of tt tvlv recipient
 * @tvlv_value: tvlv buffer containing the tt data
 * @tvlv_value_len: tvlv buffer length
 *
3684
 * Return: NET_RX_DROP if the tt tvlv is to be re-routed, NET_RX_SUCCESS
3685 3686 3687
 * otherwise.
 */
static int batadv_tt_tvlv_unicast_handler_v1(struct batadv_priv *bat_priv,
3688
					     u8 *src, u8 *dst,
3689
					     void *tvlv_value,
3690
					     u16 tvlv_value_len)
3691 3692
{
	struct batadv_tvlv_tt_data *tt_data;
3693
	u16 tt_vlan_len, tt_num_entries;
3694 3695 3696 3697 3698 3699 3700 3701 3702
	char tt_flag;
	bool ret;

	if (tvlv_value_len < sizeof(*tt_data))
		return NET_RX_SUCCESS;

	tt_data = (struct batadv_tvlv_tt_data *)tvlv_value;
	tvlv_value_len -= sizeof(*tt_data);

3703 3704 3705 3706 3707 3708 3709 3710
	tt_vlan_len = sizeof(struct batadv_tvlv_tt_vlan_data);
	tt_vlan_len *= ntohs(tt_data->num_vlan);

	if (tvlv_value_len < tt_vlan_len)
		return NET_RX_SUCCESS;

	tvlv_value_len -= tt_vlan_len;
	tt_num_entries = batadv_tt_entries(tvlv_value_len);
3711 3712 3713 3714 3715 3716 3717 3718 3719 3720 3721 3722 3723 3724 3725 3726 3727 3728 3729 3730 3731 3732 3733 3734 3735 3736 3737

	switch (tt_data->flags & BATADV_TT_DATA_TYPE_MASK) {
	case BATADV_TT_REQUEST:
		batadv_inc_counter(bat_priv, BATADV_CNT_TT_REQUEST_RX);

		/* If this node cannot provide a TT response the tt_request is
		 * forwarded
		 */
		ret = batadv_send_tt_response(bat_priv, tt_data, src, dst);
		if (!ret) {
			if (tt_data->flags & BATADV_TT_FULL_TABLE)
				tt_flag = 'F';
			else
				tt_flag = '.';

			batadv_dbg(BATADV_DBG_TT, bat_priv,
				   "Routing TT_REQUEST to %pM [%c]\n",
				   dst, tt_flag);
			/* tvlv API will re-route the packet */
			return NET_RX_DROP;
		}
		break;
	case BATADV_TT_RESPONSE:
		batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_RX);

		if (batadv_is_my_mac(bat_priv, dst)) {
			batadv_handle_tt_response(bat_priv, tt_data,
3738
						  src, tt_num_entries);
3739 3740 3741 3742 3743 3744 3745 3746 3747 3748 3749 3750 3751 3752 3753 3754 3755 3756
			return NET_RX_SUCCESS;
		}

		if (tt_data->flags & BATADV_TT_FULL_TABLE)
			tt_flag =  'F';
		else
			tt_flag = '.';

		batadv_dbg(BATADV_DBG_TT, bat_priv,
			   "Routing TT_RESPONSE to %pM [%c]\n", dst, tt_flag);

		/* tvlv API will re-route the packet */
		return NET_RX_DROP;
	}

	return NET_RX_SUCCESS;
}

3757 3758 3759 3760 3761 3762 3763 3764
/**
 * batadv_roam_tvlv_unicast_handler_v1 - process incoming tt roam tvlv container
 * @bat_priv: the bat priv with all the soft interface information
 * @src: mac address of tt tvlv sender
 * @dst: mac address of tt tvlv recipient
 * @tvlv_value: tvlv buffer containing the tt data
 * @tvlv_value_len: tvlv buffer length
 *
3765
 * Return: NET_RX_DROP if the tt roam tvlv is to be re-routed, NET_RX_SUCCESS
3766 3767 3768
 * otherwise.
 */
static int batadv_roam_tvlv_unicast_handler_v1(struct batadv_priv *bat_priv,
3769
					       u8 *src, u8 *dst,
3770
					       void *tvlv_value,
3771
					       u16 tvlv_value_len)
3772 3773 3774 3775 3776 3777 3778 3779 3780 3781 3782 3783 3784 3785 3786 3787 3788 3789 3790 3791 3792 3793 3794 3795 3796 3797
{
	struct batadv_tvlv_roam_adv *roaming_adv;
	struct batadv_orig_node *orig_node = NULL;

	/* If this node is not the intended recipient of the
	 * roaming advertisement the packet is forwarded
	 * (the tvlv API will re-route the packet).
	 */
	if (!batadv_is_my_mac(bat_priv, dst))
		return NET_RX_DROP;

	if (tvlv_value_len < sizeof(*roaming_adv))
		goto out;

	orig_node = batadv_orig_hash_find(bat_priv, src);
	if (!orig_node)
		goto out;

	batadv_inc_counter(bat_priv, BATADV_CNT_TT_ROAM_ADV_RX);
	roaming_adv = (struct batadv_tvlv_roam_adv *)tvlv_value;

	batadv_dbg(BATADV_DBG_TT, bat_priv,
		   "Received ROAMING_ADV from %pM (client %pM)\n",
		   src, roaming_adv->client);

	batadv_tt_global_add(bat_priv, orig_node, roaming_adv->client,
3798
			     ntohs(roaming_adv->vid), BATADV_TT_CLIENT_ROAM,
3799 3800 3801 3802 3803 3804 3805 3806
			     atomic_read(&orig_node->last_ttvn) + 1);

out:
	if (orig_node)
		batadv_orig_node_free_ref(orig_node);
	return NET_RX_SUCCESS;
}

3807 3808 3809 3810
/**
 * batadv_tt_init - initialise the translation table internals
 * @bat_priv: the bat priv with all the soft interface information
 *
3811
 * Return: 0 on success or negative error number in case of failure.
3812 3813 3814 3815 3816
 */
int batadv_tt_init(struct batadv_priv *bat_priv)
{
	int ret;

3817 3818 3819
	/* synchronized flags must be remote */
	BUILD_BUG_ON(!(BATADV_TT_SYNC_MASK & BATADV_TT_REMOTE_MASK));

3820 3821 3822 3823 3824 3825 3826 3827 3828
	ret = batadv_tt_local_init(bat_priv);
	if (ret < 0)
		return ret;

	ret = batadv_tt_global_init(bat_priv);
	if (ret < 0)
		return ret;

	batadv_tvlv_handler_register(bat_priv, batadv_tt_tvlv_ogm_handler_v1,
3829 3830
				     batadv_tt_tvlv_unicast_handler_v1,
				     BATADV_TVLV_TT, 1, BATADV_NO_FLAGS);
3831

3832 3833 3834 3835
	batadv_tvlv_handler_register(bat_priv, NULL,
				     batadv_roam_tvlv_unicast_handler_v1,
				     BATADV_TVLV_ROAM, 1, BATADV_NO_FLAGS);

3836 3837 3838 3839 3840 3841
	INIT_DELAYED_WORK(&bat_priv->tt.work, batadv_tt_purge);
	queue_delayed_work(batadv_event_workqueue, &bat_priv->tt.work,
			   msecs_to_jiffies(BATADV_TT_WORK_PERIOD));

	return 1;
}
3842 3843 3844 3845 3846 3847 3848

/**
 * batadv_tt_global_is_isolated - check if a client is marked as isolated
 * @bat_priv: the bat priv with all the soft interface information
 * @addr: the mac address of the client
 * @vid: the identifier of the VLAN where this client is connected
 *
3849
 * Return: true if the client is marked with the TT_CLIENT_ISOLA flag, false
3850 3851 3852
 * otherwise
 */
bool batadv_tt_global_is_isolated(struct batadv_priv *bat_priv,
3853
				  const u8 *addr, unsigned short vid)
3854 3855 3856 3857 3858 3859 3860 3861 3862 3863 3864 3865 3866 3867
{
	struct batadv_tt_global_entry *tt;
	bool ret;

	tt = batadv_tt_global_hash_find(bat_priv, addr, vid);
	if (!tt)
		return false;

	ret = tt->common.flags & BATADV_TT_CLIENT_ISOLA;

	batadv_tt_global_entry_free_ref(tt);

	return ret;
}