xen-blkfront: don't add indirect pages to list when !feature_persistent
[linux-2.6-block.git] / net / batman-adv / translation-table.c
CommitLineData
e19f9759 1/* Copyright (C) 2007-2014 B.A.T.M.A.N. contributors:
c6c8fea2 2 *
35c133a0 3 * Marek Lindner, Simon Wunderlich, Antonio Quartulli
c6c8fea2
SE
4 *
5 * This program is free software; you can redistribute it and/or
6 * modify it under the terms of version 2 of the GNU General Public
7 * License as published by the Free Software Foundation.
8 *
9 * This program is distributed in the hope that it will be useful, but
10 * WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
12 * General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
ebf38fb7 15 * along with this program; if not, see <http://www.gnu.org/licenses/>.
c6c8fea2
SE
16 */
17
18#include "main.h"
19#include "translation-table.h"
20#include "soft-interface.h"
32ae9b22 21#include "hard-interface.h"
a73105b8 22#include "send.h"
c6c8fea2
SE
23#include "hash.h"
24#include "originator.h"
a73105b8 25#include "routing.h"
20ff9d59 26#include "bridge_loop_avoidance.h"
c5caf4ef 27#include "multicast.h"
c6c8fea2 28
ced72933 29#include <linux/crc32c.h>
a73105b8 30
dec05074
AQ
31/* hash class keys */
32static struct lock_class_key batadv_tt_local_hash_lock_class_key;
33static struct lock_class_key batadv_tt_global_hash_lock_class_key;
34
56303d34 35static void batadv_send_roam_adv(struct batadv_priv *bat_priv, uint8_t *client,
c018ad3d 36 unsigned short vid,
56303d34 37 struct batadv_orig_node *orig_node);
a513088d
SE
38static void batadv_tt_purge(struct work_struct *work);
39static void
56303d34 40batadv_tt_global_del_orig_list(struct batadv_tt_global_entry *tt_global_entry);
30cfd02b
AQ
41static void batadv_tt_global_del(struct batadv_priv *bat_priv,
42 struct batadv_orig_node *orig_node,
43 const unsigned char *addr,
c018ad3d
AQ
44 unsigned short vid, const char *message,
45 bool roaming);
c6c8fea2 46
7aadf889 47/* returns 1 if they are the same mac addr */
a513088d 48static int batadv_compare_tt(const struct hlist_node *node, const void *data2)
7aadf889 49{
56303d34 50 const void *data1 = container_of(node, struct batadv_tt_common_entry,
747e4221 51 hash_entry);
7aadf889 52
323813ed 53 return batadv_compare_eth(data1, data2);
7aadf889
ML
54}
55
c018ad3d
AQ
56/**
57 * batadv_choose_tt - return the index of the tt entry in the hash table
58 * @data: pointer to the tt_common_entry object to map
59 * @size: the size of the hash table
60 *
61 * Returns the hash index where the object represented by 'data' should be
62 * stored at.
63 */
64static inline uint32_t batadv_choose_tt(const void *data, uint32_t size)
65{
66 struct batadv_tt_common_entry *tt;
67 uint32_t hash = 0;
68
69 tt = (struct batadv_tt_common_entry *)data;
70 hash = batadv_hash_bytes(hash, &tt->addr, ETH_ALEN);
71 hash = batadv_hash_bytes(hash, &tt->vid, sizeof(tt->vid));
72
73 hash += (hash << 3);
74 hash ^= (hash >> 11);
75 hash += (hash << 15);
76
77 return hash % size;
78}
79
80/**
81 * batadv_tt_hash_find - look for a client in the given hash table
82 * @hash: the hash table to search
83 * @addr: the mac address of the client to look for
84 * @vid: VLAN identifier
85 *
86 * Returns a pointer to the tt_common struct belonging to the searched client if
87 * found, NULL otherwise.
88 */
56303d34 89static struct batadv_tt_common_entry *
c018ad3d
AQ
90batadv_tt_hash_find(struct batadv_hashtable *hash, const uint8_t *addr,
91 unsigned short vid)
7aadf889 92{
7aadf889 93 struct hlist_head *head;
c018ad3d 94 struct batadv_tt_common_entry to_search, *tt, *tt_tmp = NULL;
c90681b8 95 uint32_t index;
7aadf889
ML
96
97 if (!hash)
98 return NULL;
99
8fdd0153 100 ether_addr_copy(to_search.addr, addr);
c018ad3d
AQ
101 to_search.vid = vid;
102
103 index = batadv_choose_tt(&to_search, hash->size);
7aadf889
ML
104 head = &hash->table[index];
105
106 rcu_read_lock();
c018ad3d
AQ
107 hlist_for_each_entry_rcu(tt, head, hash_entry) {
108 if (!batadv_compare_eth(tt, addr))
109 continue;
110
111 if (tt->vid != vid)
7aadf889
ML
112 continue;
113
c018ad3d 114 if (!atomic_inc_not_zero(&tt->refcount))
7683fdc1
AQ
115 continue;
116
c018ad3d 117 tt_tmp = tt;
7aadf889
ML
118 break;
119 }
120 rcu_read_unlock();
121
c018ad3d 122 return tt_tmp;
7aadf889
ML
123}
124
c018ad3d
AQ
125/**
126 * batadv_tt_local_hash_find - search the local table for a given client
127 * @bat_priv: the bat priv with all the soft interface information
128 * @addr: the mac address of the client to look for
129 * @vid: VLAN identifier
130 *
131 * Returns a pointer to the corresponding tt_local_entry struct if the client is
132 * found, NULL otherwise.
133 */
56303d34 134static struct batadv_tt_local_entry *
c018ad3d
AQ
135batadv_tt_local_hash_find(struct batadv_priv *bat_priv, const uint8_t *addr,
136 unsigned short vid)
7aadf889 137{
56303d34
SE
138 struct batadv_tt_common_entry *tt_common_entry;
139 struct batadv_tt_local_entry *tt_local_entry = NULL;
7aadf889 140
c018ad3d
AQ
141 tt_common_entry = batadv_tt_hash_find(bat_priv->tt.local_hash, addr,
142 vid);
48100bac
AQ
143 if (tt_common_entry)
144 tt_local_entry = container_of(tt_common_entry,
56303d34
SE
145 struct batadv_tt_local_entry,
146 common);
48100bac
AQ
147 return tt_local_entry;
148}
7aadf889 149
c018ad3d
AQ
150/**
151 * batadv_tt_global_hash_find - search the global table for a given client
152 * @bat_priv: the bat priv with all the soft interface information
153 * @addr: the mac address of the client to look for
154 * @vid: VLAN identifier
155 *
156 * Returns a pointer to the corresponding tt_global_entry struct if the client
157 * is found, NULL otherwise.
158 */
56303d34 159static struct batadv_tt_global_entry *
c018ad3d
AQ
160batadv_tt_global_hash_find(struct batadv_priv *bat_priv, const uint8_t *addr,
161 unsigned short vid)
48100bac 162{
56303d34
SE
163 struct batadv_tt_common_entry *tt_common_entry;
164 struct batadv_tt_global_entry *tt_global_entry = NULL;
7683fdc1 165
c018ad3d
AQ
166 tt_common_entry = batadv_tt_hash_find(bat_priv->tt.global_hash, addr,
167 vid);
48100bac
AQ
168 if (tt_common_entry)
169 tt_global_entry = container_of(tt_common_entry,
56303d34
SE
170 struct batadv_tt_global_entry,
171 common);
48100bac 172 return tt_global_entry;
7aadf889
ML
173}
174
a513088d 175static void
56303d34 176batadv_tt_local_entry_free_ref(struct batadv_tt_local_entry *tt_local_entry)
7683fdc1 177{
48100bac
AQ
178 if (atomic_dec_and_test(&tt_local_entry->common.refcount))
179 kfree_rcu(tt_local_entry, common.rcu);
7683fdc1
AQ
180}
181
21026059
AQ
182/**
183 * batadv_tt_global_entry_free_ref - decrement the refcounter for a
184 * tt_global_entry and possibly free it
185 * @tt_global_entry: the object to free
186 */
a513088d 187static void
56303d34 188batadv_tt_global_entry_free_ref(struct batadv_tt_global_entry *tt_global_entry)
7683fdc1 189{
db08e6e5 190 if (atomic_dec_and_test(&tt_global_entry->common.refcount)) {
a513088d 191 batadv_tt_global_del_orig_list(tt_global_entry);
21026059 192 kfree_rcu(tt_global_entry, common.rcu);
db08e6e5
SW
193 }
194}
195
1d8ab8d3
LL
196/**
197 * batadv_tt_global_hash_count - count the number of orig entries
198 * @hash: hash table containing the tt entries
199 * @addr: the mac address of the client to count entries for
200 * @vid: VLAN identifier
201 *
202 * Return the number of originators advertising the given address/data
203 * (excluding ourself).
204 */
205int batadv_tt_global_hash_count(struct batadv_priv *bat_priv,
206 const uint8_t *addr, unsigned short vid)
207{
208 struct batadv_tt_global_entry *tt_global_entry;
209 int count;
210
211 tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
212 if (!tt_global_entry)
213 return 0;
214
215 count = atomic_read(&tt_global_entry->orig_list_count);
216 batadv_tt_global_entry_free_ref(tt_global_entry);
217
218 return count;
219}
220
a513088d 221static void batadv_tt_orig_list_entry_free_rcu(struct rcu_head *rcu)
db08e6e5 222{
56303d34 223 struct batadv_tt_orig_list_entry *orig_entry;
db08e6e5 224
56303d34 225 orig_entry = container_of(rcu, struct batadv_tt_orig_list_entry, rcu);
72822225
LL
226
227 /* We are in an rcu callback here, therefore we cannot use
228 * batadv_orig_node_free_ref() and its call_rcu():
229 * An rcu_barrier() wouldn't wait for that to finish
230 */
231 batadv_orig_node_free_ref_now(orig_entry->orig_node);
db08e6e5
SW
232 kfree(orig_entry);
233}
234
7ea7b4a1
AQ
235/**
236 * batadv_tt_local_size_mod - change the size by v of the local table identified
237 * by vid
238 * @bat_priv: the bat priv with all the soft interface information
239 * @vid: the VLAN identifier of the sub-table to change
240 * @v: the amount to sum to the local table size
241 */
242static void batadv_tt_local_size_mod(struct batadv_priv *bat_priv,
243 unsigned short vid, int v)
244{
245 struct batadv_softif_vlan *vlan;
246
247 vlan = batadv_softif_vlan_get(bat_priv, vid);
248 if (!vlan)
249 return;
250
251 atomic_add(v, &vlan->tt.num_entries);
252
253 batadv_softif_vlan_free_ref(vlan);
254}
255
256/**
257 * batadv_tt_local_size_inc - increase by one the local table size for the given
258 * vid
259 * @bat_priv: the bat priv with all the soft interface information
260 * @vid: the VLAN identifier
261 */
262static void batadv_tt_local_size_inc(struct batadv_priv *bat_priv,
263 unsigned short vid)
264{
265 batadv_tt_local_size_mod(bat_priv, vid, 1);
266}
267
268/**
269 * batadv_tt_local_size_dec - decrease by one the local table size for the given
270 * vid
271 * @bat_priv: the bat priv with all the soft interface information
272 * @vid: the VLAN identifier
273 */
274static void batadv_tt_local_size_dec(struct batadv_priv *bat_priv,
275 unsigned short vid)
276{
277 batadv_tt_local_size_mod(bat_priv, vid, -1);
278}
279
280/**
281 * batadv_tt_global_size_mod - change the size by v of the local table
282 * identified by vid
283 * @bat_priv: the bat priv with all the soft interface information
284 * @vid: the VLAN identifier
285 * @v: the amount to sum to the global table size
286 */
287static void batadv_tt_global_size_mod(struct batadv_orig_node *orig_node,
288 unsigned short vid, int v)
289{
290 struct batadv_orig_node_vlan *vlan;
291
292 vlan = batadv_orig_node_vlan_new(orig_node, vid);
293 if (!vlan)
294 return;
295
296 if (atomic_add_return(v, &vlan->tt.num_entries) == 0) {
297 spin_lock_bh(&orig_node->vlan_list_lock);
298 list_del_rcu(&vlan->list);
299 spin_unlock_bh(&orig_node->vlan_list_lock);
300 batadv_orig_node_vlan_free_ref(vlan);
301 }
302
303 batadv_orig_node_vlan_free_ref(vlan);
304}
305
306/**
307 * batadv_tt_global_size_inc - increase by one the global table size for the
308 * given vid
309 * @orig_node: the originator which global table size has to be decreased
310 * @vid: the vlan identifier
311 */
312static void batadv_tt_global_size_inc(struct batadv_orig_node *orig_node,
313 unsigned short vid)
314{
315 batadv_tt_global_size_mod(orig_node, vid, 1);
316}
317
318/**
319 * batadv_tt_global_size_dec - decrease by one the global table size for the
320 * given vid
321 * @orig_node: the originator which global table size has to be decreased
322 * @vid: the vlan identifier
323 */
324static void batadv_tt_global_size_dec(struct batadv_orig_node *orig_node,
325 unsigned short vid)
326{
327 batadv_tt_global_size_mod(orig_node, vid, -1);
328}
329
a513088d 330static void
56303d34 331batadv_tt_orig_list_entry_free_ref(struct batadv_tt_orig_list_entry *orig_entry)
db08e6e5 332{
d657e621
AQ
333 if (!atomic_dec_and_test(&orig_entry->refcount))
334 return;
7ea7b4a1 335
a513088d 336 call_rcu(&orig_entry->rcu, batadv_tt_orig_list_entry_free_rcu);
7683fdc1
AQ
337}
338
3abe4adb
AQ
339/**
340 * batadv_tt_local_event - store a local TT event (ADD/DEL)
341 * @bat_priv: the bat priv with all the soft interface information
342 * @tt_local_entry: the TT entry involved in the event
343 * @event_flags: flags to store in the event structure
344 */
56303d34 345static void batadv_tt_local_event(struct batadv_priv *bat_priv,
3abe4adb
AQ
346 struct batadv_tt_local_entry *tt_local_entry,
347 uint8_t event_flags)
a73105b8 348{
56303d34 349 struct batadv_tt_change_node *tt_change_node, *entry, *safe;
3abe4adb
AQ
350 struct batadv_tt_common_entry *common = &tt_local_entry->common;
351 uint8_t flags = common->flags | event_flags;
3b643de5
AQ
352 bool event_removed = false;
353 bool del_op_requested, del_op_entry;
a73105b8
AQ
354
355 tt_change_node = kmalloc(sizeof(*tt_change_node), GFP_ATOMIC);
a73105b8
AQ
356 if (!tt_change_node)
357 return;
358
ff66c975 359 tt_change_node->change.flags = flags;
ca663046
AQ
360 memset(tt_change_node->change.reserved, 0,
361 sizeof(tt_change_node->change.reserved));
8fdd0153 362 ether_addr_copy(tt_change_node->change.addr, common->addr);
c018ad3d 363 tt_change_node->change.vid = htons(common->vid);
a73105b8 364
acd34afa 365 del_op_requested = flags & BATADV_TT_CLIENT_DEL;
3b643de5
AQ
366
367 /* check for ADD+DEL or DEL+ADD events */
807736f6
SE
368 spin_lock_bh(&bat_priv->tt.changes_list_lock);
369 list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
3b643de5 370 list) {
3abe4adb 371 if (!batadv_compare_eth(entry->change.addr, common->addr))
3b643de5
AQ
372 continue;
373
374 /* DEL+ADD in the same orig interval have no effect and can be
375 * removed to avoid silly behaviour on the receiver side. The
376 * other way around (ADD+DEL) can happen in case of roaming of
377 * a client still in the NEW state. Roaming of NEW clients is
378 * now possible due to automatically recognition of "temporary"
379 * clients
380 */
acd34afa 381 del_op_entry = entry->change.flags & BATADV_TT_CLIENT_DEL;
3b643de5
AQ
382 if (!del_op_requested && del_op_entry)
383 goto del;
384 if (del_op_requested && !del_op_entry)
385 goto del;
3c4f7ab6
AQ
386
387 /* this is a second add in the same originator interval. It
388 * means that flags have been changed: update them!
389 */
390 if (!del_op_requested && !del_op_entry)
391 entry->change.flags = flags;
392
3b643de5
AQ
393 continue;
394del:
395 list_del(&entry->list);
396 kfree(entry);
155e4e12 397 kfree(tt_change_node);
3b643de5
AQ
398 event_removed = true;
399 goto unlock;
400 }
401
a73105b8 402 /* track the change in the OGMinterval list */
807736f6 403 list_add_tail(&tt_change_node->list, &bat_priv->tt.changes_list);
3b643de5
AQ
404
405unlock:
807736f6 406 spin_unlock_bh(&bat_priv->tt.changes_list_lock);
a73105b8 407
3b643de5 408 if (event_removed)
807736f6 409 atomic_dec(&bat_priv->tt.local_changes);
3b643de5 410 else
807736f6 411 atomic_inc(&bat_priv->tt.local_changes);
a73105b8
AQ
412}
413
335fbe0f
ML
414/**
415 * batadv_tt_len - compute length in bytes of given number of tt changes
416 * @changes_num: number of tt changes
417 *
418 * Returns computed length in bytes.
419 */
420static int batadv_tt_len(int changes_num)
a73105b8 421{
335fbe0f 422 return changes_num * sizeof(struct batadv_tvlv_tt_change);
a73105b8
AQ
423}
424
298e6e68
AQ
425/**
426 * batadv_tt_entries - compute the number of entries fitting in tt_len bytes
427 * @tt_len: available space
428 *
429 * Returns the number of entries.
430 */
431static uint16_t batadv_tt_entries(uint16_t tt_len)
432{
433 return tt_len / batadv_tt_len(1);
434}
435
a19d3d85
ML
436/**
437 * batadv_tt_local_table_transmit_size - calculates the local translation table
438 * size when transmitted over the air
439 * @bat_priv: the bat priv with all the soft interface information
440 *
441 * Returns local translation table size in bytes.
442 */
443static int batadv_tt_local_table_transmit_size(struct batadv_priv *bat_priv)
444{
445 uint16_t num_vlan = 0, tt_local_entries = 0;
446 struct batadv_softif_vlan *vlan;
447 int hdr_size;
448
449 rcu_read_lock();
450 hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
451 num_vlan++;
452 tt_local_entries += atomic_read(&vlan->tt.num_entries);
453 }
454 rcu_read_unlock();
455
456 /* header size of tvlv encapsulated tt response payload */
457 hdr_size = sizeof(struct batadv_unicast_tvlv_packet);
458 hdr_size += sizeof(struct batadv_tvlv_hdr);
459 hdr_size += sizeof(struct batadv_tvlv_tt_data);
460 hdr_size += num_vlan * sizeof(struct batadv_tvlv_tt_vlan_data);
461
462 return hdr_size + batadv_tt_len(tt_local_entries);
463}
464
56303d34 465static int batadv_tt_local_init(struct batadv_priv *bat_priv)
c6c8fea2 466{
807736f6 467 if (bat_priv->tt.local_hash)
5346c35e 468 return 0;
c6c8fea2 469
807736f6 470 bat_priv->tt.local_hash = batadv_hash_new(1024);
c6c8fea2 471
807736f6 472 if (!bat_priv->tt.local_hash)
5346c35e 473 return -ENOMEM;
c6c8fea2 474
dec05074
AQ
475 batadv_hash_set_lock_class(bat_priv->tt.local_hash,
476 &batadv_tt_local_hash_lock_class_key);
477
5346c35e 478 return 0;
c6c8fea2
SE
479}
480
068ee6e2
AQ
481static void batadv_tt_global_free(struct batadv_priv *bat_priv,
482 struct batadv_tt_global_entry *tt_global,
483 const char *message)
484{
485 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789
AQ
486 "Deleting global tt entry %pM (vid: %d): %s\n",
487 tt_global->common.addr,
488 BATADV_PRINT_VID(tt_global->common.vid), message);
068ee6e2
AQ
489
490 batadv_hash_remove(bat_priv->tt.global_hash, batadv_compare_tt,
c018ad3d 491 batadv_choose_tt, &tt_global->common);
068ee6e2 492 batadv_tt_global_entry_free_ref(tt_global);
068ee6e2
AQ
493}
494
c018ad3d
AQ
495/**
496 * batadv_tt_local_add - add a new client to the local table or update an
497 * existing client
498 * @soft_iface: netdev struct of the mesh interface
499 * @addr: the mac address of the client to add
500 * @vid: VLAN identifier
501 * @ifindex: index of the interface where the client is connected to (useful to
502 * identify wireless clients)
9464d071
AQ
503 * @mark: the value contained in the skb->mark field of the received packet (if
504 * any)
a19d3d85
ML
505 *
506 * Returns true if the client was successfully added, false otherwise.
c018ad3d 507 */
a19d3d85 508bool batadv_tt_local_add(struct net_device *soft_iface, const uint8_t *addr,
9464d071 509 unsigned short vid, int ifindex, uint32_t mark)
c6c8fea2 510{
56303d34 511 struct batadv_priv *bat_priv = netdev_priv(soft_iface);
170173bf 512 struct batadv_tt_local_entry *tt_local;
c5caf4ef 513 struct batadv_tt_global_entry *tt_global = NULL;
35df3b29 514 struct batadv_softif_vlan *vlan;
0c69aecc 515 struct net_device *in_dev = NULL;
db08e6e5 516 struct hlist_head *head;
56303d34 517 struct batadv_tt_orig_list_entry *orig_entry;
a19d3d85
ML
518 int hash_added, table_size, packet_size_max;
519 bool ret = false, roamed_back = false;
3c4f7ab6 520 uint8_t remote_flags;
9464d071 521 uint32_t match_mark;
c6c8fea2 522
0c69aecc
AQ
523 if (ifindex != BATADV_NULL_IFINDEX)
524 in_dev = dev_get_by_index(&init_net, ifindex);
525
c018ad3d 526 tt_local = batadv_tt_local_hash_find(bat_priv, addr, vid);
c5caf4ef
LL
527
528 if (!is_multicast_ether_addr(addr))
529 tt_global = batadv_tt_global_hash_find(bat_priv, addr, vid);
c6c8fea2 530
47c94655
AQ
531 if (tt_local) {
532 tt_local->last_seen = jiffies;
068ee6e2
AQ
533 if (tt_local->common.flags & BATADV_TT_CLIENT_PENDING) {
534 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789
AQ
535 "Re-adding pending client %pM (vid: %d)\n",
536 addr, BATADV_PRINT_VID(vid));
068ee6e2
AQ
537 /* whatever the reason why the PENDING flag was set,
538 * this is a client which was enqueued to be removed in
539 * this orig_interval. Since it popped up again, the
540 * flag can be reset like it was never enqueued
541 */
542 tt_local->common.flags &= ~BATADV_TT_CLIENT_PENDING;
543 goto add_event;
544 }
545
546 if (tt_local->common.flags & BATADV_TT_CLIENT_ROAM) {
547 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789
AQ
548 "Roaming client %pM (vid: %d) came back to its original location\n",
549 addr, BATADV_PRINT_VID(vid));
068ee6e2
AQ
550 /* the ROAM flag is set because this client roamed away
551 * and the node got a roaming_advertisement message. Now
552 * that the client popped up again at its original
553 * location such flag can be unset
554 */
555 tt_local->common.flags &= ~BATADV_TT_CLIENT_ROAM;
556 roamed_back = true;
557 }
558 goto check_roaming;
c6c8fea2
SE
559 }
560
a19d3d85
ML
561 /* Ignore the client if we cannot send it in a full table response. */
562 table_size = batadv_tt_local_table_transmit_size(bat_priv);
563 table_size += batadv_tt_len(1);
564 packet_size_max = atomic_read(&bat_priv->packet_size_max);
565 if (table_size > packet_size_max) {
566 net_ratelimited_function(batadv_info, soft_iface,
567 "Local translation table size (%i) exceeds maximum packet size (%i); Ignoring new local tt entry: %pM\n",
568 table_size, packet_size_max, addr);
569 goto out;
570 }
571
47c94655
AQ
572 tt_local = kmalloc(sizeof(*tt_local), GFP_ATOMIC);
573 if (!tt_local)
7683fdc1 574 goto out;
a73105b8 575
35df3b29
AQ
576 /* increase the refcounter of the related vlan */
577 vlan = batadv_softif_vlan_get(bat_priv, vid);
578
39c75a51 579 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789
AQ
580 "Creating new local tt entry: %pM (vid: %d, ttvn: %d)\n",
581 addr, BATADV_PRINT_VID(vid),
807736f6 582 (uint8_t)atomic_read(&bat_priv->tt.vn));
c6c8fea2 583
8fdd0153 584 ether_addr_copy(tt_local->common.addr, addr);
8425ec6a
AQ
585 /* The local entry has to be marked as NEW to avoid to send it in
586 * a full table response going out before the next ttvn increment
587 * (consistency check)
588 */
589 tt_local->common.flags = BATADV_TT_CLIENT_NEW;
c018ad3d 590 tt_local->common.vid = vid;
0c69aecc 591 if (batadv_is_wifi_netdev(in_dev))
47c94655
AQ
592 tt_local->common.flags |= BATADV_TT_CLIENT_WIFI;
593 atomic_set(&tt_local->common.refcount, 2);
594 tt_local->last_seen = jiffies;
595 tt_local->common.added_at = tt_local->last_seen;
c6c8fea2 596
c5caf4ef
LL
597 /* the batman interface mac and multicast addresses should never be
598 * purged
599 */
600 if (batadv_compare_eth(addr, soft_iface->dev_addr) ||
601 is_multicast_ether_addr(addr))
47c94655 602 tt_local->common.flags |= BATADV_TT_CLIENT_NOPURGE;
c6c8fea2 603
807736f6 604 hash_added = batadv_hash_add(bat_priv->tt.local_hash, batadv_compare_tt,
c018ad3d 605 batadv_choose_tt, &tt_local->common,
47c94655 606 &tt_local->common.hash_entry);
80b3f58c
SW
607
608 if (unlikely(hash_added != 0)) {
609 /* remove the reference for the hash */
47c94655 610 batadv_tt_local_entry_free_ref(tt_local);
35df3b29 611 batadv_softif_vlan_free_ref(vlan);
80b3f58c
SW
612 goto out;
613 }
614
068ee6e2 615add_event:
3abe4adb 616 batadv_tt_local_event(bat_priv, tt_local, BATADV_NO_FLAGS);
ff66c975 617
068ee6e2
AQ
618check_roaming:
619 /* Check whether it is a roaming, but don't do anything if the roaming
620 * process has already been handled
621 */
622 if (tt_global && !(tt_global->common.flags & BATADV_TT_CLIENT_ROAM)) {
db08e6e5 623 /* These node are probably going to update their tt table */
47c94655 624 head = &tt_global->orig_list;
db08e6e5 625 rcu_read_lock();
b67bfe0d 626 hlist_for_each_entry_rcu(orig_entry, head, list) {
47c94655 627 batadv_send_roam_adv(bat_priv, tt_global->common.addr,
c018ad3d 628 tt_global->common.vid,
a513088d 629 orig_entry->orig_node);
db08e6e5
SW
630 }
631 rcu_read_unlock();
068ee6e2
AQ
632 if (roamed_back) {
633 batadv_tt_global_free(bat_priv, tt_global,
634 "Roaming canceled");
635 tt_global = NULL;
636 } else {
637 /* The global entry has to be marked as ROAMING and
638 * has to be kept for consistency purpose
639 */
640 tt_global->common.flags |= BATADV_TT_CLIENT_ROAM;
641 tt_global->roam_at = jiffies;
642 }
7683fdc1 643 }
068ee6e2 644
3c4f7ab6
AQ
645 /* store the current remote flags before altering them. This helps
646 * understanding is flags are changing or not
647 */
648 remote_flags = tt_local->common.flags & BATADV_TT_REMOTE_MASK;
649
650 if (batadv_is_wifi_netdev(in_dev))
651 tt_local->common.flags |= BATADV_TT_CLIENT_WIFI;
652 else
653 tt_local->common.flags &= ~BATADV_TT_CLIENT_WIFI;
a19d3d85 654
9464d071
AQ
655 /* check the mark in the skb: if it's equal to the configured
656 * isolation_mark, it means the packet is coming from an isolated
657 * non-mesh client
658 */
659 match_mark = (mark & bat_priv->isolation_mark_mask);
660 if (bat_priv->isolation_mark_mask &&
661 match_mark == bat_priv->isolation_mark)
662 tt_local->common.flags |= BATADV_TT_CLIENT_ISOLA;
663 else
664 tt_local->common.flags &= ~BATADV_TT_CLIENT_ISOLA;
665
3c4f7ab6
AQ
666 /* if any "dynamic" flag has been modified, resend an ADD event for this
667 * entry so that all the nodes can get the new flags
668 */
669 if (remote_flags ^ (tt_local->common.flags & BATADV_TT_REMOTE_MASK))
670 batadv_tt_local_event(bat_priv, tt_local, BATADV_NO_FLAGS);
671
672 ret = true;
7683fdc1 673out:
0c69aecc
AQ
674 if (in_dev)
675 dev_put(in_dev);
47c94655
AQ
676 if (tt_local)
677 batadv_tt_local_entry_free_ref(tt_local);
678 if (tt_global)
679 batadv_tt_global_entry_free_ref(tt_global);
a19d3d85 680 return ret;
c6c8fea2
SE
681}
682
7ea7b4a1
AQ
683/**
684 * batadv_tt_prepare_tvlv_global_data - prepare the TVLV TT header to send
685 * within a TT Response directed to another node
686 * @orig_node: originator for which the TT data has to be prepared
687 * @tt_data: uninitialised pointer to the address of the TVLV buffer
688 * @tt_change: uninitialised pointer to the address of the area where the TT
689 * changed can be stored
690 * @tt_len: pointer to the length to reserve to the tt_change. if -1 this
691 * function reserves the amount of space needed to send the entire global TT
692 * table. In case of success the value is updated with the real amount of
693 * reserved bytes
694
695 * Allocate the needed amount of memory for the entire TT TVLV and write its
696 * header made up by one tvlv_tt_data object and a series of tvlv_tt_vlan_data
697 * objects, one per active VLAN served by the originator node.
698 *
699 * Return the size of the allocated buffer or 0 in case of failure.
700 */
701static uint16_t
702batadv_tt_prepare_tvlv_global_data(struct batadv_orig_node *orig_node,
703 struct batadv_tvlv_tt_data **tt_data,
704 struct batadv_tvlv_tt_change **tt_change,
705 int32_t *tt_len)
706{
707 uint16_t num_vlan = 0, num_entries = 0, change_offset, tvlv_len;
708 struct batadv_tvlv_tt_vlan_data *tt_vlan;
709 struct batadv_orig_node_vlan *vlan;
710 uint8_t *tt_change_ptr;
711
712 rcu_read_lock();
713 list_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) {
714 num_vlan++;
715 num_entries += atomic_read(&vlan->tt.num_entries);
716 }
717
718 change_offset = sizeof(**tt_data);
719 change_offset += num_vlan * sizeof(*tt_vlan);
720
721 /* if tt_len is negative, allocate the space needed by the full table */
722 if (*tt_len < 0)
723 *tt_len = batadv_tt_len(num_entries);
724
725 tvlv_len = *tt_len;
726 tvlv_len += change_offset;
727
728 *tt_data = kmalloc(tvlv_len, GFP_ATOMIC);
729 if (!*tt_data) {
730 *tt_len = 0;
731 goto out;
732 }
733
734 (*tt_data)->flags = BATADV_NO_FLAGS;
735 (*tt_data)->ttvn = atomic_read(&orig_node->last_ttvn);
736 (*tt_data)->num_vlan = htons(num_vlan);
737
738 tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(*tt_data + 1);
739 list_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) {
740 tt_vlan->vid = htons(vlan->vid);
741 tt_vlan->crc = htonl(vlan->tt.crc);
742
743 tt_vlan++;
744 }
745
746 tt_change_ptr = (uint8_t *)*tt_data + change_offset;
747 *tt_change = (struct batadv_tvlv_tt_change *)tt_change_ptr;
748
749out:
750 rcu_read_unlock();
751 return tvlv_len;
752}
753
754/**
755 * batadv_tt_prepare_tvlv_local_data - allocate and prepare the TT TVLV for this
756 * node
757 * @bat_priv: the bat priv with all the soft interface information
758 * @tt_data: uninitialised pointer to the address of the TVLV buffer
759 * @tt_change: uninitialised pointer to the address of the area where the TT
760 * changes can be stored
761 * @tt_len: pointer to the length to reserve to the tt_change. if -1 this
762 * function reserves the amount of space needed to send the entire local TT
763 * table. In case of success the value is updated with the real amount of
764 * reserved bytes
765 *
766 * Allocate the needed amount of memory for the entire TT TVLV and write its
767 * header made up by one tvlv_tt_data object and a series of tvlv_tt_vlan_data
768 * objects, one per active VLAN.
769 *
770 * Return the size of the allocated buffer or 0 in case of failure.
771 */
772static uint16_t
773batadv_tt_prepare_tvlv_local_data(struct batadv_priv *bat_priv,
774 struct batadv_tvlv_tt_data **tt_data,
775 struct batadv_tvlv_tt_change **tt_change,
776 int32_t *tt_len)
777{
778 struct batadv_tvlv_tt_vlan_data *tt_vlan;
779 struct batadv_softif_vlan *vlan;
780 uint16_t num_vlan = 0, num_entries = 0, tvlv_len;
781 uint8_t *tt_change_ptr;
782 int change_offset;
783
784 rcu_read_lock();
785 hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
786 num_vlan++;
787 num_entries += atomic_read(&vlan->tt.num_entries);
788 }
789
790 change_offset = sizeof(**tt_data);
791 change_offset += num_vlan * sizeof(*tt_vlan);
792
793 /* if tt_len is negative, allocate the space needed by the full table */
794 if (*tt_len < 0)
795 *tt_len = batadv_tt_len(num_entries);
796
797 tvlv_len = *tt_len;
798 tvlv_len += change_offset;
799
800 *tt_data = kmalloc(tvlv_len, GFP_ATOMIC);
801 if (!*tt_data) {
802 tvlv_len = 0;
803 goto out;
804 }
805
806 (*tt_data)->flags = BATADV_NO_FLAGS;
807 (*tt_data)->ttvn = atomic_read(&bat_priv->tt.vn);
808 (*tt_data)->num_vlan = htons(num_vlan);
809
810 tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(*tt_data + 1);
811 hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
812 tt_vlan->vid = htons(vlan->vid);
813 tt_vlan->crc = htonl(vlan->tt.crc);
814
815 tt_vlan++;
816 }
817
818 tt_change_ptr = (uint8_t *)*tt_data + change_offset;
819 *tt_change = (struct batadv_tvlv_tt_change *)tt_change_ptr;
820
821out:
822 rcu_read_unlock();
823 return tvlv_len;
824}
825
e1bf0c14
ML
826/**
827 * batadv_tt_tvlv_container_update - update the translation table tvlv container
828 * after local tt changes have been committed
829 * @bat_priv: the bat priv with all the soft interface information
830 */
831static void batadv_tt_tvlv_container_update(struct batadv_priv *bat_priv)
be9aa4c1 832{
e1bf0c14
ML
833 struct batadv_tt_change_node *entry, *safe;
834 struct batadv_tvlv_tt_data *tt_data;
835 struct batadv_tvlv_tt_change *tt_change;
7ea7b4a1 836 int tt_diff_len, tt_change_len = 0;
e1bf0c14 837 int tt_diff_entries_num = 0, tt_diff_entries_count = 0;
7ea7b4a1 838 uint16_t tvlv_len;
be9aa4c1 839
7ea7b4a1
AQ
840 tt_diff_entries_num = atomic_read(&bat_priv->tt.local_changes);
841 tt_diff_len = batadv_tt_len(tt_diff_entries_num);
be9aa4c1
ML
842
843 /* if we have too many changes for one packet don't send any
844 * and wait for the tt table request which will be fragmented
845 */
e1bf0c14
ML
846 if (tt_diff_len > bat_priv->soft_iface->mtu)
847 tt_diff_len = 0;
be9aa4c1 848
7ea7b4a1
AQ
849 tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv, &tt_data,
850 &tt_change, &tt_diff_len);
851 if (!tvlv_len)
e1bf0c14 852 return;
be9aa4c1 853
e1bf0c14 854 tt_data->flags = BATADV_TT_OGM_DIFF;
c6c8fea2 855
e1bf0c14
ML
856 if (tt_diff_len == 0)
857 goto container_register;
be9aa4c1 858
807736f6
SE
859 spin_lock_bh(&bat_priv->tt.changes_list_lock);
860 atomic_set(&bat_priv->tt.local_changes, 0);
c6c8fea2 861
807736f6 862 list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
7c64fd98 863 list) {
e1bf0c14
ML
864 if (tt_diff_entries_count < tt_diff_entries_num) {
865 memcpy(tt_change + tt_diff_entries_count,
866 &entry->change,
867 sizeof(struct batadv_tvlv_tt_change));
868 tt_diff_entries_count++;
c6c8fea2 869 }
a73105b8
AQ
870 list_del(&entry->list);
871 kfree(entry);
c6c8fea2 872 }
807736f6 873 spin_unlock_bh(&bat_priv->tt.changes_list_lock);
a73105b8
AQ
874
875 /* Keep the buffer for possible tt_request */
807736f6
SE
876 spin_lock_bh(&bat_priv->tt.last_changeset_lock);
877 kfree(bat_priv->tt.last_changeset);
878 bat_priv->tt.last_changeset_len = 0;
879 bat_priv->tt.last_changeset = NULL;
e1bf0c14 880 tt_change_len = batadv_tt_len(tt_diff_entries_count);
be9aa4c1 881 /* check whether this new OGM has no changes due to size problems */
e1bf0c14 882 if (tt_diff_entries_count > 0) {
be9aa4c1 883 /* if kmalloc() fails we will reply with the full table
a73105b8
AQ
884 * instead of providing the diff
885 */
e1bf0c14 886 bat_priv->tt.last_changeset = kzalloc(tt_diff_len, GFP_ATOMIC);
807736f6 887 if (bat_priv->tt.last_changeset) {
e1bf0c14
ML
888 memcpy(bat_priv->tt.last_changeset,
889 tt_change, tt_change_len);
890 bat_priv->tt.last_changeset_len = tt_diff_len;
a73105b8
AQ
891 }
892 }
807736f6 893 spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
c6c8fea2 894
e1bf0c14
ML
895container_register:
896 batadv_tvlv_container_register(bat_priv, BATADV_TVLV_TT, 1, tt_data,
7ea7b4a1 897 tvlv_len);
e1bf0c14 898 kfree(tt_data);
c6c8fea2
SE
899}
900
08c36d3e 901int batadv_tt_local_seq_print_text(struct seq_file *seq, void *offset)
c6c8fea2
SE
902{
903 struct net_device *net_dev = (struct net_device *)seq->private;
56303d34 904 struct batadv_priv *bat_priv = netdev_priv(net_dev);
807736f6 905 struct batadv_hashtable *hash = bat_priv->tt.local_hash;
56303d34 906 struct batadv_tt_common_entry *tt_common_entry;
85766a82 907 struct batadv_tt_local_entry *tt_local;
56303d34 908 struct batadv_hard_iface *primary_if;
7ea7b4a1 909 struct batadv_softif_vlan *vlan;
c6c8fea2 910 struct hlist_head *head;
7ea7b4a1 911 unsigned short vid;
c90681b8 912 uint32_t i;
85766a82
AQ
913 int last_seen_secs;
914 int last_seen_msecs;
915 unsigned long last_seen_jiffies;
916 bool no_purge;
917 uint16_t np_flag = BATADV_TT_CLIENT_NOPURGE;
c6c8fea2 918
30da63a6
ML
919 primary_if = batadv_seq_print_text_primary_if_get(seq);
920 if (!primary_if)
32ae9b22 921 goto out;
c6c8fea2 922
86ceb360 923 seq_printf(seq,
7ea7b4a1
AQ
924 "Locally retrieved addresses (from %s) announced via TT (TTVN: %u):\n",
925 net_dev->name, (uint8_t)atomic_read(&bat_priv->tt.vn));
dd24ddb2 926 seq_printf(seq, " %-13s %s %-8s %-9s (%-10s)\n", "Client", "VID",
7ea7b4a1 927 "Flags", "Last seen", "CRC");
c6c8fea2 928
c6c8fea2
SE
929 for (i = 0; i < hash->size; i++) {
930 head = &hash->table[i];
931
7aadf889 932 rcu_read_lock();
b67bfe0d 933 hlist_for_each_entry_rcu(tt_common_entry,
7aadf889 934 head, hash_entry) {
85766a82
AQ
935 tt_local = container_of(tt_common_entry,
936 struct batadv_tt_local_entry,
937 common);
7ea7b4a1 938 vid = tt_common_entry->vid;
85766a82
AQ
939 last_seen_jiffies = jiffies - tt_local->last_seen;
940 last_seen_msecs = jiffies_to_msecs(last_seen_jiffies);
941 last_seen_secs = last_seen_msecs / 1000;
942 last_seen_msecs = last_seen_msecs % 1000;
943
944 no_purge = tt_common_entry->flags & np_flag;
945
7ea7b4a1
AQ
946 vlan = batadv_softif_vlan_get(bat_priv, vid);
947 if (!vlan) {
948 seq_printf(seq, "Cannot retrieve VLAN %d\n",
949 BATADV_PRINT_VID(vid));
950 continue;
951 }
952
953 seq_printf(seq,
dd24ddb2 954 " * %pM %4i [%c%c%c%c%c%c] %3u.%03u (%#.8x)\n",
7c64fd98 955 tt_common_entry->addr,
16052789 956 BATADV_PRINT_VID(tt_common_entry->vid),
7c64fd98 957 (tt_common_entry->flags &
acd34afa 958 BATADV_TT_CLIENT_ROAM ? 'R' : '.'),
85766a82 959 no_purge ? 'P' : '.',
7c64fd98 960 (tt_common_entry->flags &
acd34afa 961 BATADV_TT_CLIENT_NEW ? 'N' : '.'),
7c64fd98 962 (tt_common_entry->flags &
acd34afa 963 BATADV_TT_CLIENT_PENDING ? 'X' : '.'),
7c64fd98 964 (tt_common_entry->flags &
85766a82 965 BATADV_TT_CLIENT_WIFI ? 'W' : '.'),
dd24ddb2
AQ
966 (tt_common_entry->flags &
967 BATADV_TT_CLIENT_ISOLA ? 'I' : '.'),
a7966d90 968 no_purge ? 0 : last_seen_secs,
7ea7b4a1
AQ
969 no_purge ? 0 : last_seen_msecs,
970 vlan->tt.crc);
971
972 batadv_softif_vlan_free_ref(vlan);
c6c8fea2 973 }
7aadf889 974 rcu_read_unlock();
c6c8fea2 975 }
32ae9b22
ML
976out:
977 if (primary_if)
e5d89254 978 batadv_hardif_free_ref(primary_if);
30da63a6 979 return 0;
c6c8fea2
SE
980}
981
56303d34
SE
982static void
983batadv_tt_local_set_pending(struct batadv_priv *bat_priv,
984 struct batadv_tt_local_entry *tt_local_entry,
985 uint16_t flags, const char *message)
c6c8fea2 986{
3abe4adb 987 batadv_tt_local_event(bat_priv, tt_local_entry, flags);
a73105b8 988
015758d0
AQ
989 /* The local client has to be marked as "pending to be removed" but has
990 * to be kept in the table in order to send it in a full table
9cfc7bd6
SE
991 * response issued before the net ttvn increment (consistency check)
992 */
acd34afa 993 tt_local_entry->common.flags |= BATADV_TT_CLIENT_PENDING;
c566dbbe 994
39c75a51 995 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789
AQ
996 "Local tt entry (%pM, vid: %d) pending to be removed: %s\n",
997 tt_local_entry->common.addr,
998 BATADV_PRINT_VID(tt_local_entry->common.vid), message);
c6c8fea2
SE
999}
1000
7f91d06c
AQ
1001/**
1002 * batadv_tt_local_remove - logically remove an entry from the local table
1003 * @bat_priv: the bat priv with all the soft interface information
1004 * @addr: the MAC address of the client to remove
c018ad3d 1005 * @vid: VLAN identifier
7f91d06c
AQ
1006 * @message: message to append to the log on deletion
1007 * @roaming: true if the deletion is due to a roaming event
1008 *
1009 * Returns the flags assigned to the local entry before being deleted
1010 */
1011uint16_t batadv_tt_local_remove(struct batadv_priv *bat_priv,
c018ad3d
AQ
1012 const uint8_t *addr, unsigned short vid,
1013 const char *message, bool roaming)
c6c8fea2 1014{
170173bf 1015 struct batadv_tt_local_entry *tt_local_entry;
7f91d06c 1016 uint16_t flags, curr_flags = BATADV_NO_FLAGS;
35df3b29 1017 struct batadv_softif_vlan *vlan;
c6c8fea2 1018
c018ad3d 1019 tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
7683fdc1
AQ
1020 if (!tt_local_entry)
1021 goto out;
1022
7f91d06c
AQ
1023 curr_flags = tt_local_entry->common.flags;
1024
acd34afa 1025 flags = BATADV_TT_CLIENT_DEL;
068ee6e2
AQ
1026 /* if this global entry addition is due to a roaming, the node has to
1027 * mark the local entry as "roamed" in order to correctly reroute
1028 * packets later
1029 */
7c1fd91d 1030 if (roaming) {
acd34afa 1031 flags |= BATADV_TT_CLIENT_ROAM;
7c1fd91d
AQ
1032 /* mark the local client as ROAMed */
1033 tt_local_entry->common.flags |= BATADV_TT_CLIENT_ROAM;
1034 }
42d0b044 1035
068ee6e2
AQ
1036 if (!(tt_local_entry->common.flags & BATADV_TT_CLIENT_NEW)) {
1037 batadv_tt_local_set_pending(bat_priv, tt_local_entry, flags,
1038 message);
1039 goto out;
1040 }
1041 /* if this client has been added right now, it is possible to
1042 * immediately purge it
1043 */
3abe4adb 1044 batadv_tt_local_event(bat_priv, tt_local_entry, BATADV_TT_CLIENT_DEL);
068ee6e2
AQ
1045 hlist_del_rcu(&tt_local_entry->common.hash_entry);
1046 batadv_tt_local_entry_free_ref(tt_local_entry);
7f91d06c 1047
35df3b29
AQ
1048 /* decrease the reference held for this vlan */
1049 vlan = batadv_softif_vlan_get(bat_priv, vid);
1050 batadv_softif_vlan_free_ref(vlan);
1051 batadv_softif_vlan_free_ref(vlan);
1052
7683fdc1
AQ
1053out:
1054 if (tt_local_entry)
a513088d 1055 batadv_tt_local_entry_free_ref(tt_local_entry);
7f91d06c
AQ
1056
1057 return curr_flags;
c6c8fea2
SE
1058}
1059
a19d3d85
ML
1060/**
1061 * batadv_tt_local_purge_list - purge inactive tt local entries
1062 * @bat_priv: the bat priv with all the soft interface information
1063 * @head: pointer to the list containing the local tt entries
1064 * @timeout: parameter deciding whether a given tt local entry is considered
1065 * inactive or not
1066 */
56303d34 1067static void batadv_tt_local_purge_list(struct batadv_priv *bat_priv,
a19d3d85
ML
1068 struct hlist_head *head,
1069 int timeout)
c6c8fea2 1070{
56303d34
SE
1071 struct batadv_tt_local_entry *tt_local_entry;
1072 struct batadv_tt_common_entry *tt_common_entry;
b67bfe0d 1073 struct hlist_node *node_tmp;
acd34afa 1074
b67bfe0d 1075 hlist_for_each_entry_safe(tt_common_entry, node_tmp, head,
acd34afa
SE
1076 hash_entry) {
1077 tt_local_entry = container_of(tt_common_entry,
56303d34
SE
1078 struct batadv_tt_local_entry,
1079 common);
acd34afa
SE
1080 if (tt_local_entry->common.flags & BATADV_TT_CLIENT_NOPURGE)
1081 continue;
1082
1083 /* entry already marked for deletion */
1084 if (tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING)
1085 continue;
1086
a19d3d85 1087 if (!batadv_has_timed_out(tt_local_entry->last_seen, timeout))
acd34afa
SE
1088 continue;
1089
1090 batadv_tt_local_set_pending(bat_priv, tt_local_entry,
1091 BATADV_TT_CLIENT_DEL, "timed out");
1092 }
1093}
1094
a19d3d85
ML
1095/**
1096 * batadv_tt_local_purge - purge inactive tt local entries
1097 * @bat_priv: the bat priv with all the soft interface information
1098 * @timeout: parameter deciding whether a given tt local entry is considered
1099 * inactive or not
1100 */
1101static void batadv_tt_local_purge(struct batadv_priv *bat_priv,
1102 int timeout)
acd34afa 1103{
807736f6 1104 struct batadv_hashtable *hash = bat_priv->tt.local_hash;
c6c8fea2 1105 struct hlist_head *head;
7683fdc1 1106 spinlock_t *list_lock; /* protects write access to the hash lists */
c90681b8 1107 uint32_t i;
c6c8fea2 1108
c6c8fea2
SE
1109 for (i = 0; i < hash->size; i++) {
1110 head = &hash->table[i];
7683fdc1 1111 list_lock = &hash->list_locks[i];
c6c8fea2 1112
7683fdc1 1113 spin_lock_bh(list_lock);
a19d3d85 1114 batadv_tt_local_purge_list(bat_priv, head, timeout);
7683fdc1 1115 spin_unlock_bh(list_lock);
c6c8fea2 1116 }
c6c8fea2
SE
1117}
1118
56303d34 1119static void batadv_tt_local_table_free(struct batadv_priv *bat_priv)
c6c8fea2 1120{
5bf74e9c 1121 struct batadv_hashtable *hash;
a73105b8 1122 spinlock_t *list_lock; /* protects write access to the hash lists */
56303d34
SE
1123 struct batadv_tt_common_entry *tt_common_entry;
1124 struct batadv_tt_local_entry *tt_local;
35df3b29 1125 struct batadv_softif_vlan *vlan;
b67bfe0d 1126 struct hlist_node *node_tmp;
7683fdc1 1127 struct hlist_head *head;
c90681b8 1128 uint32_t i;
a73105b8 1129
807736f6 1130 if (!bat_priv->tt.local_hash)
c6c8fea2
SE
1131 return;
1132
807736f6 1133 hash = bat_priv->tt.local_hash;
a73105b8
AQ
1134
1135 for (i = 0; i < hash->size; i++) {
1136 head = &hash->table[i];
1137 list_lock = &hash->list_locks[i];
1138
1139 spin_lock_bh(list_lock);
b67bfe0d 1140 hlist_for_each_entry_safe(tt_common_entry, node_tmp,
a73105b8 1141 head, hash_entry) {
b67bfe0d 1142 hlist_del_rcu(&tt_common_entry->hash_entry);
56303d34
SE
1143 tt_local = container_of(tt_common_entry,
1144 struct batadv_tt_local_entry,
1145 common);
35df3b29
AQ
1146
1147 /* decrease the reference held for this vlan */
1148 vlan = batadv_softif_vlan_get(bat_priv,
1149 tt_common_entry->vid);
1150 batadv_softif_vlan_free_ref(vlan);
1151 batadv_softif_vlan_free_ref(vlan);
1152
56303d34 1153 batadv_tt_local_entry_free_ref(tt_local);
a73105b8
AQ
1154 }
1155 spin_unlock_bh(list_lock);
1156 }
1157
1a8eaf07 1158 batadv_hash_destroy(hash);
a73105b8 1159
807736f6 1160 bat_priv->tt.local_hash = NULL;
c6c8fea2
SE
1161}
1162
56303d34 1163static int batadv_tt_global_init(struct batadv_priv *bat_priv)
c6c8fea2 1164{
807736f6 1165 if (bat_priv->tt.global_hash)
5346c35e 1166 return 0;
c6c8fea2 1167
807736f6 1168 bat_priv->tt.global_hash = batadv_hash_new(1024);
c6c8fea2 1169
807736f6 1170 if (!bat_priv->tt.global_hash)
5346c35e 1171 return -ENOMEM;
c6c8fea2 1172
dec05074
AQ
1173 batadv_hash_set_lock_class(bat_priv->tt.global_hash,
1174 &batadv_tt_global_hash_lock_class_key);
1175
5346c35e 1176 return 0;
c6c8fea2
SE
1177}
1178
56303d34 1179static void batadv_tt_changes_list_free(struct batadv_priv *bat_priv)
c6c8fea2 1180{
56303d34 1181 struct batadv_tt_change_node *entry, *safe;
c6c8fea2 1182
807736f6 1183 spin_lock_bh(&bat_priv->tt.changes_list_lock);
c6c8fea2 1184
807736f6 1185 list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
a73105b8
AQ
1186 list) {
1187 list_del(&entry->list);
1188 kfree(entry);
1189 }
c6c8fea2 1190
807736f6
SE
1191 atomic_set(&bat_priv->tt.local_changes, 0);
1192 spin_unlock_bh(&bat_priv->tt.changes_list_lock);
a73105b8 1193}
c6c8fea2 1194
d657e621
AQ
1195/* retrieves the orig_tt_list_entry belonging to orig_node from the
1196 * batadv_tt_global_entry list
1197 *
1198 * returns it with an increased refcounter, NULL if not found
db08e6e5 1199 */
d657e621
AQ
1200static struct batadv_tt_orig_list_entry *
1201batadv_tt_global_orig_entry_find(const struct batadv_tt_global_entry *entry,
1202 const struct batadv_orig_node *orig_node)
db08e6e5 1203{
d657e621 1204 struct batadv_tt_orig_list_entry *tmp_orig_entry, *orig_entry = NULL;
db08e6e5 1205 const struct hlist_head *head;
db08e6e5
SW
1206
1207 rcu_read_lock();
1208 head = &entry->orig_list;
b67bfe0d 1209 hlist_for_each_entry_rcu(tmp_orig_entry, head, list) {
d657e621
AQ
1210 if (tmp_orig_entry->orig_node != orig_node)
1211 continue;
1212 if (!atomic_inc_not_zero(&tmp_orig_entry->refcount))
1213 continue;
1214
1215 orig_entry = tmp_orig_entry;
1216 break;
db08e6e5
SW
1217 }
1218 rcu_read_unlock();
d657e621
AQ
1219
1220 return orig_entry;
1221}
1222
1223/* find out if an orig_node is already in the list of a tt_global_entry.
1224 * returns true if found, false otherwise
1225 */
1226static bool
1227batadv_tt_global_entry_has_orig(const struct batadv_tt_global_entry *entry,
1228 const struct batadv_orig_node *orig_node)
1229{
1230 struct batadv_tt_orig_list_entry *orig_entry;
1231 bool found = false;
1232
1233 orig_entry = batadv_tt_global_orig_entry_find(entry, orig_node);
1234 if (orig_entry) {
1235 found = true;
1236 batadv_tt_orig_list_entry_free_ref(orig_entry);
1237 }
1238
db08e6e5
SW
1239 return found;
1240}
1241
a513088d 1242static void
d657e621 1243batadv_tt_global_orig_entry_add(struct batadv_tt_global_entry *tt_global,
56303d34 1244 struct batadv_orig_node *orig_node, int ttvn)
db08e6e5 1245{
56303d34 1246 struct batadv_tt_orig_list_entry *orig_entry;
db08e6e5 1247
d657e621 1248 orig_entry = batadv_tt_global_orig_entry_find(tt_global, orig_node);
30cfd02b
AQ
1249 if (orig_entry) {
1250 /* refresh the ttvn: the current value could be a bogus one that
1251 * was added during a "temporary client detection"
1252 */
1253 orig_entry->ttvn = ttvn;
d657e621 1254 goto out;
30cfd02b 1255 }
d657e621 1256
db08e6e5
SW
1257 orig_entry = kzalloc(sizeof(*orig_entry), GFP_ATOMIC);
1258 if (!orig_entry)
d657e621 1259 goto out;
db08e6e5
SW
1260
1261 INIT_HLIST_NODE(&orig_entry->list);
1262 atomic_inc(&orig_node->refcount);
7ea7b4a1 1263 batadv_tt_global_size_inc(orig_node, tt_global->common.vid);
db08e6e5
SW
1264 orig_entry->orig_node = orig_node;
1265 orig_entry->ttvn = ttvn;
d657e621 1266 atomic_set(&orig_entry->refcount, 2);
db08e6e5 1267
d657e621 1268 spin_lock_bh(&tt_global->list_lock);
db08e6e5 1269 hlist_add_head_rcu(&orig_entry->list,
d657e621
AQ
1270 &tt_global->orig_list);
1271 spin_unlock_bh(&tt_global->list_lock);
1d8ab8d3
LL
1272 atomic_inc(&tt_global->orig_list_count);
1273
d657e621
AQ
1274out:
1275 if (orig_entry)
1276 batadv_tt_orig_list_entry_free_ref(orig_entry);
db08e6e5
SW
1277}
1278
d4ff40f6
AQ
1279/**
1280 * batadv_tt_global_add - add a new TT global entry or update an existing one
1281 * @bat_priv: the bat priv with all the soft interface information
1282 * @orig_node: the originator announcing the client
1283 * @tt_addr: the mac address of the non-mesh client
c018ad3d 1284 * @vid: VLAN identifier
d4ff40f6
AQ
1285 * @flags: TT flags that have to be set for this non-mesh client
1286 * @ttvn: the tt version number ever announcing this non-mesh client
1287 *
1288 * Add a new TT global entry for the given originator. If the entry already
1289 * exists add a new reference to the given originator (a global entry can have
1290 * references to multiple originators) and adjust the flags attribute to reflect
1291 * the function argument.
1292 * If a TT local entry exists for this non-mesh client remove it.
1293 *
1294 * The caller must hold orig_node refcount.
1e5d49fc
AQ
1295 *
1296 * Return true if the new entry has been added, false otherwise
d4ff40f6 1297 */
1e5d49fc
AQ
1298static bool batadv_tt_global_add(struct batadv_priv *bat_priv,
1299 struct batadv_orig_node *orig_node,
c018ad3d
AQ
1300 const unsigned char *tt_addr,
1301 unsigned short vid, uint16_t flags,
1e5d49fc 1302 uint8_t ttvn)
a73105b8 1303{
170173bf
SE
1304 struct batadv_tt_global_entry *tt_global_entry;
1305 struct batadv_tt_local_entry *tt_local_entry;
1e5d49fc 1306 bool ret = false;
80b3f58c 1307 int hash_added;
56303d34 1308 struct batadv_tt_common_entry *common;
7f91d06c 1309 uint16_t local_flags;
c6c8fea2 1310
cfd4f757
AQ
1311 /* ignore global entries from backbone nodes */
1312 if (batadv_bla_is_backbone_gw_orig(bat_priv, orig_node->orig, vid))
1313 return true;
1314
c018ad3d
AQ
1315 tt_global_entry = batadv_tt_global_hash_find(bat_priv, tt_addr, vid);
1316 tt_local_entry = batadv_tt_local_hash_find(bat_priv, tt_addr, vid);
068ee6e2
AQ
1317
1318 /* if the node already has a local client for this entry, it has to wait
1319 * for a roaming advertisement instead of manually messing up the global
1320 * table
1321 */
1322 if ((flags & BATADV_TT_CLIENT_TEMP) && tt_local_entry &&
1323 !(tt_local_entry->common.flags & BATADV_TT_CLIENT_NEW))
1324 goto out;
a73105b8
AQ
1325
1326 if (!tt_global_entry) {
d4f44692 1327 tt_global_entry = kzalloc(sizeof(*tt_global_entry), GFP_ATOMIC);
a73105b8 1328 if (!tt_global_entry)
7683fdc1
AQ
1329 goto out;
1330
c0a55929 1331 common = &tt_global_entry->common;
8fdd0153 1332 ether_addr_copy(common->addr, tt_addr);
c018ad3d 1333 common->vid = vid;
db08e6e5 1334
d4f44692 1335 common->flags = flags;
cc47f66e 1336 tt_global_entry->roam_at = 0;
fdf79320
AQ
1337 /* node must store current time in case of roaming. This is
1338 * needed to purge this entry out on timeout (if nobody claims
1339 * it)
1340 */
1341 if (flags & BATADV_TT_CLIENT_ROAM)
1342 tt_global_entry->roam_at = jiffies;
c0a55929 1343 atomic_set(&common->refcount, 2);
30cfd02b 1344 common->added_at = jiffies;
db08e6e5
SW
1345
1346 INIT_HLIST_HEAD(&tt_global_entry->orig_list);
1d8ab8d3 1347 atomic_set(&tt_global_entry->orig_list_count, 0);
db08e6e5 1348 spin_lock_init(&tt_global_entry->list_lock);
7683fdc1 1349
807736f6 1350 hash_added = batadv_hash_add(bat_priv->tt.global_hash,
a513088d 1351 batadv_compare_tt,
c018ad3d 1352 batadv_choose_tt, common,
a513088d 1353 &common->hash_entry);
80b3f58c
SW
1354
1355 if (unlikely(hash_added != 0)) {
1356 /* remove the reference for the hash */
a513088d 1357 batadv_tt_global_entry_free_ref(tt_global_entry);
80b3f58c
SW
1358 goto out_remove;
1359 }
a73105b8 1360 } else {
068ee6e2 1361 common = &tt_global_entry->common;
30cfd02b
AQ
1362 /* If there is already a global entry, we can use this one for
1363 * our processing.
068ee6e2
AQ
1364 * But if we are trying to add a temporary client then here are
1365 * two options at this point:
1366 * 1) the global client is not a temporary client: the global
1367 * client has to be left as it is, temporary information
1368 * should never override any already known client state
1369 * 2) the global client is a temporary client: purge the
1370 * originator list and add the new one orig_entry
30cfd02b 1371 */
068ee6e2
AQ
1372 if (flags & BATADV_TT_CLIENT_TEMP) {
1373 if (!(common->flags & BATADV_TT_CLIENT_TEMP))
1374 goto out;
1375 if (batadv_tt_global_entry_has_orig(tt_global_entry,
1376 orig_node))
1377 goto out_remove;
1378 batadv_tt_global_del_orig_list(tt_global_entry);
1379 goto add_orig_entry;
1380 }
30cfd02b
AQ
1381
1382 /* if the client was temporary added before receiving the first
1383 * OGM announcing it, we have to clear the TEMP flag
1384 */
068ee6e2 1385 common->flags &= ~BATADV_TT_CLIENT_TEMP;
db08e6e5 1386
e9c00136
AQ
1387 /* the change can carry possible "attribute" flags like the
1388 * TT_CLIENT_WIFI, therefore they have to be copied in the
1389 * client entry
1390 */
1391 tt_global_entry->common.flags |= flags;
1392
acd34afa
SE
1393 /* If there is the BATADV_TT_CLIENT_ROAM flag set, there is only
1394 * one originator left in the list and we previously received a
db08e6e5
SW
1395 * delete + roaming change for this originator.
1396 *
1397 * We should first delete the old originator before adding the
1398 * new one.
1399 */
068ee6e2 1400 if (common->flags & BATADV_TT_CLIENT_ROAM) {
a513088d 1401 batadv_tt_global_del_orig_list(tt_global_entry);
068ee6e2 1402 common->flags &= ~BATADV_TT_CLIENT_ROAM;
db08e6e5 1403 tt_global_entry->roam_at = 0;
a73105b8
AQ
1404 }
1405 }
068ee6e2 1406add_orig_entry:
30cfd02b 1407 /* add the new orig_entry (if needed) or update it */
d657e621 1408 batadv_tt_global_orig_entry_add(tt_global_entry, orig_node, ttvn);
c6c8fea2 1409
39c75a51 1410 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789
AQ
1411 "Creating new global tt entry: %pM (vid: %d, via %pM)\n",
1412 common->addr, BATADV_PRINT_VID(common->vid),
1413 orig_node->orig);
1e5d49fc 1414 ret = true;
c6c8fea2 1415
80b3f58c 1416out_remove:
c5caf4ef
LL
1417 /* Do not remove multicast addresses from the local hash on
1418 * global additions
1419 */
1420 if (is_multicast_ether_addr(tt_addr))
1421 goto out;
7f91d06c 1422
a73105b8 1423 /* remove address from local hash if present */
c018ad3d 1424 local_flags = batadv_tt_local_remove(bat_priv, tt_addr, vid,
7f91d06c 1425 "global tt received",
c1d07431 1426 flags & BATADV_TT_CLIENT_ROAM);
7f91d06c
AQ
1427 tt_global_entry->common.flags |= local_flags & BATADV_TT_CLIENT_WIFI;
1428
068ee6e2
AQ
1429 if (!(flags & BATADV_TT_CLIENT_ROAM))
1430 /* this is a normal global add. Therefore the client is not in a
1431 * roaming state anymore.
1432 */
1433 tt_global_entry->common.flags &= ~BATADV_TT_CLIENT_ROAM;
1434
7683fdc1
AQ
1435out:
1436 if (tt_global_entry)
a513088d 1437 batadv_tt_global_entry_free_ref(tt_global_entry);
068ee6e2
AQ
1438 if (tt_local_entry)
1439 batadv_tt_local_entry_free_ref(tt_local_entry);
7683fdc1 1440 return ret;
c6c8fea2
SE
1441}
1442
1b371d13
SW
1443/**
1444 * batadv_transtable_best_orig - Get best originator list entry from tt entry
4627456a 1445 * @bat_priv: the bat priv with all the soft interface information
981d8900
SE
1446 * @tt_global_entry: global translation table entry to be analyzed
1447 *
1448 * This functon assumes the caller holds rcu_read_lock().
1449 * Returns best originator list entry or NULL on errors.
1450 */
1451static struct batadv_tt_orig_list_entry *
4627456a
AQ
1452batadv_transtable_best_orig(struct batadv_priv *bat_priv,
1453 struct batadv_tt_global_entry *tt_global_entry)
981d8900 1454{
4627456a
AQ
1455 struct batadv_neigh_node *router, *best_router = NULL;
1456 struct batadv_algo_ops *bao = bat_priv->bat_algo_ops;
981d8900 1457 struct hlist_head *head;
981d8900 1458 struct batadv_tt_orig_list_entry *orig_entry, *best_entry = NULL;
981d8900
SE
1459
1460 head = &tt_global_entry->orig_list;
b67bfe0d 1461 hlist_for_each_entry_rcu(orig_entry, head, list) {
7351a482
SW
1462 router = batadv_orig_router_get(orig_entry->orig_node,
1463 BATADV_IF_DEFAULT);
981d8900
SE
1464 if (!router)
1465 continue;
1466
4627456a 1467 if (best_router &&
89652331
SW
1468 bao->bat_neigh_cmp(router, BATADV_IF_DEFAULT,
1469 best_router, BATADV_IF_DEFAULT) <= 0) {
4627456a
AQ
1470 batadv_neigh_node_free_ref(router);
1471 continue;
981d8900
SE
1472 }
1473
4627456a
AQ
1474 /* release the refcount for the "old" best */
1475 if (best_router)
1476 batadv_neigh_node_free_ref(best_router);
1477
1478 best_entry = orig_entry;
1479 best_router = router;
981d8900
SE
1480 }
1481
4627456a
AQ
1482 if (best_router)
1483 batadv_neigh_node_free_ref(best_router);
1484
981d8900
SE
1485 return best_entry;
1486}
1487
1b371d13
SW
1488/**
1489 * batadv_tt_global_print_entry - print all orig nodes who announce the address
1490 * for this global entry
4627456a 1491 * @bat_priv: the bat priv with all the soft interface information
981d8900
SE
1492 * @tt_global_entry: global translation table entry to be printed
1493 * @seq: debugfs table seq_file struct
1494 *
1495 * This functon assumes the caller holds rcu_read_lock().
db08e6e5 1496 */
a513088d 1497static void
4627456a
AQ
1498batadv_tt_global_print_entry(struct batadv_priv *bat_priv,
1499 struct batadv_tt_global_entry *tt_global_entry,
a513088d 1500 struct seq_file *seq)
db08e6e5 1501{
981d8900 1502 struct batadv_tt_orig_list_entry *orig_entry, *best_entry;
56303d34 1503 struct batadv_tt_common_entry *tt_common_entry;
7ea7b4a1
AQ
1504 struct batadv_orig_node_vlan *vlan;
1505 struct hlist_head *head;
db08e6e5 1506 uint8_t last_ttvn;
7ea7b4a1 1507 uint16_t flags;
db08e6e5
SW
1508
1509 tt_common_entry = &tt_global_entry->common;
981d8900
SE
1510 flags = tt_common_entry->flags;
1511
4627456a 1512 best_entry = batadv_transtable_best_orig(bat_priv, tt_global_entry);
981d8900 1513 if (best_entry) {
7ea7b4a1
AQ
1514 vlan = batadv_orig_node_vlan_get(best_entry->orig_node,
1515 tt_common_entry->vid);
1516 if (!vlan) {
1517 seq_printf(seq,
1518 " * Cannot retrieve VLAN %d for originator %pM\n",
1519 BATADV_PRINT_VID(tt_common_entry->vid),
1520 best_entry->orig_node->orig);
1521 goto print_list;
1522 }
1523
981d8900 1524 last_ttvn = atomic_read(&best_entry->orig_node->last_ttvn);
f9d8a537 1525 seq_printf(seq,
dd24ddb2 1526 " %c %pM %4i (%3u) via %pM (%3u) (%#.8x) [%c%c%c%c]\n",
981d8900 1527 '*', tt_global_entry->common.addr,
16052789 1528 BATADV_PRINT_VID(tt_global_entry->common.vid),
981d8900 1529 best_entry->ttvn, best_entry->orig_node->orig,
7ea7b4a1 1530 last_ttvn, vlan->tt.crc,
981d8900
SE
1531 (flags & BATADV_TT_CLIENT_ROAM ? 'R' : '.'),
1532 (flags & BATADV_TT_CLIENT_WIFI ? 'W' : '.'),
dd24ddb2 1533 (flags & BATADV_TT_CLIENT_ISOLA ? 'I' : '.'),
981d8900 1534 (flags & BATADV_TT_CLIENT_TEMP ? 'T' : '.'));
7ea7b4a1
AQ
1535
1536 batadv_orig_node_vlan_free_ref(vlan);
981d8900 1537 }
db08e6e5 1538
7ea7b4a1 1539print_list:
db08e6e5
SW
1540 head = &tt_global_entry->orig_list;
1541
b67bfe0d 1542 hlist_for_each_entry_rcu(orig_entry, head, list) {
981d8900
SE
1543 if (best_entry == orig_entry)
1544 continue;
1545
7ea7b4a1
AQ
1546 vlan = batadv_orig_node_vlan_get(orig_entry->orig_node,
1547 tt_common_entry->vid);
1548 if (!vlan) {
1549 seq_printf(seq,
1550 " + Cannot retrieve VLAN %d for originator %pM\n",
1551 BATADV_PRINT_VID(tt_common_entry->vid),
1552 orig_entry->orig_node->orig);
1553 continue;
1554 }
1555
db08e6e5 1556 last_ttvn = atomic_read(&orig_entry->orig_node->last_ttvn);
16052789 1557 seq_printf(seq,
dd24ddb2 1558 " %c %pM %4d (%3u) via %pM (%3u) (%#.8x) [%c%c%c%c]\n",
981d8900 1559 '+', tt_global_entry->common.addr,
16052789 1560 BATADV_PRINT_VID(tt_global_entry->common.vid),
981d8900 1561 orig_entry->ttvn, orig_entry->orig_node->orig,
7ea7b4a1 1562 last_ttvn, vlan->tt.crc,
acd34afa 1563 (flags & BATADV_TT_CLIENT_ROAM ? 'R' : '.'),
30cfd02b 1564 (flags & BATADV_TT_CLIENT_WIFI ? 'W' : '.'),
dd24ddb2 1565 (flags & BATADV_TT_CLIENT_ISOLA ? 'I' : '.'),
30cfd02b 1566 (flags & BATADV_TT_CLIENT_TEMP ? 'T' : '.'));
7ea7b4a1
AQ
1567
1568 batadv_orig_node_vlan_free_ref(vlan);
db08e6e5
SW
1569 }
1570}
1571
08c36d3e 1572int batadv_tt_global_seq_print_text(struct seq_file *seq, void *offset)
c6c8fea2
SE
1573{
1574 struct net_device *net_dev = (struct net_device *)seq->private;
56303d34 1575 struct batadv_priv *bat_priv = netdev_priv(net_dev);
807736f6 1576 struct batadv_hashtable *hash = bat_priv->tt.global_hash;
56303d34
SE
1577 struct batadv_tt_common_entry *tt_common_entry;
1578 struct batadv_tt_global_entry *tt_global;
1579 struct batadv_hard_iface *primary_if;
c6c8fea2 1580 struct hlist_head *head;
c90681b8 1581 uint32_t i;
c6c8fea2 1582
30da63a6
ML
1583 primary_if = batadv_seq_print_text_primary_if_get(seq);
1584 if (!primary_if)
32ae9b22 1585 goto out;
c6c8fea2 1586
2dafb49d
AQ
1587 seq_printf(seq,
1588 "Globally announced TT entries received via the mesh %s\n",
c6c8fea2 1589 net_dev->name);
16052789
AQ
1590 seq_printf(seq, " %-13s %s %s %-15s %s (%-10s) %s\n",
1591 "Client", "VID", "(TTVN)", "Originator", "(Curr TTVN)",
1592 "CRC", "Flags");
c6c8fea2 1593
c6c8fea2
SE
1594 for (i = 0; i < hash->size; i++) {
1595 head = &hash->table[i];
1596
7aadf889 1597 rcu_read_lock();
b67bfe0d 1598 hlist_for_each_entry_rcu(tt_common_entry,
7aadf889 1599 head, hash_entry) {
56303d34
SE
1600 tt_global = container_of(tt_common_entry,
1601 struct batadv_tt_global_entry,
1602 common);
4627456a 1603 batadv_tt_global_print_entry(bat_priv, tt_global, seq);
c6c8fea2 1604 }
7aadf889 1605 rcu_read_unlock();
c6c8fea2 1606 }
32ae9b22
ML
1607out:
1608 if (primary_if)
e5d89254 1609 batadv_hardif_free_ref(primary_if);
30da63a6 1610 return 0;
c6c8fea2
SE
1611}
1612
1d8ab8d3
LL
1613/**
1614 * batadv_tt_global_del_orig_entry - remove and free an orig_entry
1615 * @tt_global_entry: the global entry to remove the orig_entry from
1616 * @orig_entry: the orig entry to remove and free
1617 *
1618 * Remove an orig_entry from its list in the given tt_global_entry and
1619 * free this orig_entry afterwards.
1620 */
1621static void
1622batadv_tt_global_del_orig_entry(struct batadv_tt_global_entry *tt_global_entry,
1623 struct batadv_tt_orig_list_entry *orig_entry)
1624{
1625 batadv_tt_global_size_dec(orig_entry->orig_node,
1626 tt_global_entry->common.vid);
1627 atomic_dec(&tt_global_entry->orig_list_count);
1628 hlist_del_rcu(&orig_entry->list);
1629 batadv_tt_orig_list_entry_free_ref(orig_entry);
1630}
1631
db08e6e5 1632/* deletes the orig list of a tt_global_entry */
a513088d 1633static void
56303d34 1634batadv_tt_global_del_orig_list(struct batadv_tt_global_entry *tt_global_entry)
c6c8fea2 1635{
db08e6e5 1636 struct hlist_head *head;
b67bfe0d 1637 struct hlist_node *safe;
56303d34 1638 struct batadv_tt_orig_list_entry *orig_entry;
a73105b8 1639
db08e6e5
SW
1640 spin_lock_bh(&tt_global_entry->list_lock);
1641 head = &tt_global_entry->orig_list;
1d8ab8d3
LL
1642 hlist_for_each_entry_safe(orig_entry, safe, head, list)
1643 batadv_tt_global_del_orig_entry(tt_global_entry, orig_entry);
db08e6e5 1644 spin_unlock_bh(&tt_global_entry->list_lock);
db08e6e5
SW
1645}
1646
1d8ab8d3
LL
1647/**
1648 * batadv_tt_global_del_orig_node - remove orig_node from a global tt entry
1649 * @bat_priv: the bat priv with all the soft interface information
1650 * @tt_global_entry: the global entry to remove the orig_node from
1651 * @orig_node: the originator announcing the client
1652 * @message: message to append to the log on deletion
1653 *
1654 * Remove the given orig_node and its according orig_entry from the given
1655 * global tt entry.
1656 */
a513088d 1657static void
1d8ab8d3
LL
1658batadv_tt_global_del_orig_node(struct batadv_priv *bat_priv,
1659 struct batadv_tt_global_entry *tt_global_entry,
1660 struct batadv_orig_node *orig_node,
1661 const char *message)
db08e6e5
SW
1662{
1663 struct hlist_head *head;
b67bfe0d 1664 struct hlist_node *safe;
56303d34 1665 struct batadv_tt_orig_list_entry *orig_entry;
16052789 1666 unsigned short vid;
db08e6e5
SW
1667
1668 spin_lock_bh(&tt_global_entry->list_lock);
1669 head = &tt_global_entry->orig_list;
b67bfe0d 1670 hlist_for_each_entry_safe(orig_entry, safe, head, list) {
db08e6e5 1671 if (orig_entry->orig_node == orig_node) {
16052789 1672 vid = tt_global_entry->common.vid;
39c75a51 1673 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789 1674 "Deleting %pM from global tt entry %pM (vid: %d): %s\n",
1eda58bf 1675 orig_node->orig,
16052789
AQ
1676 tt_global_entry->common.addr,
1677 BATADV_PRINT_VID(vid), message);
1d8ab8d3
LL
1678 batadv_tt_global_del_orig_entry(tt_global_entry,
1679 orig_entry);
db08e6e5
SW
1680 }
1681 }
1682 spin_unlock_bh(&tt_global_entry->list_lock);
1683}
1684
db08e6e5 1685/* If the client is to be deleted, we check if it is the last origantor entry
acd34afa
SE
1686 * within tt_global entry. If yes, we set the BATADV_TT_CLIENT_ROAM flag and the
1687 * timer, otherwise we simply remove the originator scheduled for deletion.
db08e6e5 1688 */
a513088d 1689static void
56303d34
SE
1690batadv_tt_global_del_roaming(struct batadv_priv *bat_priv,
1691 struct batadv_tt_global_entry *tt_global_entry,
1692 struct batadv_orig_node *orig_node,
1693 const char *message)
db08e6e5
SW
1694{
1695 bool last_entry = true;
1696 struct hlist_head *head;
56303d34 1697 struct batadv_tt_orig_list_entry *orig_entry;
db08e6e5
SW
1698
1699 /* no local entry exists, case 1:
1700 * Check if this is the last one or if other entries exist.
1701 */
1702
1703 rcu_read_lock();
1704 head = &tt_global_entry->orig_list;
b67bfe0d 1705 hlist_for_each_entry_rcu(orig_entry, head, list) {
db08e6e5
SW
1706 if (orig_entry->orig_node != orig_node) {
1707 last_entry = false;
1708 break;
1709 }
1710 }
1711 rcu_read_unlock();
1712
1713 if (last_entry) {
1714 /* its the last one, mark for roaming. */
acd34afa 1715 tt_global_entry->common.flags |= BATADV_TT_CLIENT_ROAM;
db08e6e5
SW
1716 tt_global_entry->roam_at = jiffies;
1717 } else
1718 /* there is another entry, we can simply delete this
1719 * one and can still use the other one.
1720 */
1d8ab8d3
LL
1721 batadv_tt_global_del_orig_node(bat_priv, tt_global_entry,
1722 orig_node, message);
db08e6e5
SW
1723}
1724
c018ad3d
AQ
1725/**
1726 * batadv_tt_global_del - remove a client from the global table
1727 * @bat_priv: the bat priv with all the soft interface information
1728 * @orig_node: an originator serving this client
1729 * @addr: the mac address of the client
1730 * @vid: VLAN identifier
1731 * @message: a message explaining the reason for deleting the client to print
1732 * for debugging purpose
1733 * @roaming: true if the deletion has been triggered by a roaming event
1734 */
56303d34
SE
1735static void batadv_tt_global_del(struct batadv_priv *bat_priv,
1736 struct batadv_orig_node *orig_node,
c018ad3d 1737 const unsigned char *addr, unsigned short vid,
a513088d 1738 const char *message, bool roaming)
a73105b8 1739{
170173bf 1740 struct batadv_tt_global_entry *tt_global_entry;
56303d34 1741 struct batadv_tt_local_entry *local_entry = NULL;
a73105b8 1742
c018ad3d 1743 tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
db08e6e5 1744 if (!tt_global_entry)
7683fdc1 1745 goto out;
a73105b8 1746
db08e6e5 1747 if (!roaming) {
1d8ab8d3
LL
1748 batadv_tt_global_del_orig_node(bat_priv, tt_global_entry,
1749 orig_node, message);
db08e6e5
SW
1750
1751 if (hlist_empty(&tt_global_entry->orig_list))
be73b488
AQ
1752 batadv_tt_global_free(bat_priv, tt_global_entry,
1753 message);
db08e6e5
SW
1754
1755 goto out;
1756 }
92f90f56
SE
1757
1758 /* if we are deleting a global entry due to a roam
1759 * event, there are two possibilities:
db08e6e5
SW
1760 * 1) the client roamed from node A to node B => if there
1761 * is only one originator left for this client, we mark
acd34afa 1762 * it with BATADV_TT_CLIENT_ROAM, we start a timer and we
92f90f56
SE
1763 * wait for node B to claim it. In case of timeout
1764 * the entry is purged.
db08e6e5
SW
1765 *
1766 * If there are other originators left, we directly delete
1767 * the originator.
92f90f56 1768 * 2) the client roamed to us => we can directly delete
9cfc7bd6
SE
1769 * the global entry, since it is useless now.
1770 */
a513088d 1771 local_entry = batadv_tt_local_hash_find(bat_priv,
c018ad3d
AQ
1772 tt_global_entry->common.addr,
1773 vid);
a513088d 1774 if (local_entry) {
db08e6e5 1775 /* local entry exists, case 2: client roamed to us. */
a513088d 1776 batadv_tt_global_del_orig_list(tt_global_entry);
be73b488 1777 batadv_tt_global_free(bat_priv, tt_global_entry, message);
db08e6e5
SW
1778 } else
1779 /* no local entry exists, case 1: check for roaming */
a513088d
SE
1780 batadv_tt_global_del_roaming(bat_priv, tt_global_entry,
1781 orig_node, message);
92f90f56 1782
cc47f66e 1783out:
7683fdc1 1784 if (tt_global_entry)
a513088d
SE
1785 batadv_tt_global_entry_free_ref(tt_global_entry);
1786 if (local_entry)
1787 batadv_tt_local_entry_free_ref(local_entry);
a73105b8
AQ
1788}
1789
95fb130d
AQ
1790/**
1791 * batadv_tt_global_del_orig - remove all the TT global entries belonging to the
1792 * given originator matching the provided vid
1793 * @bat_priv: the bat priv with all the soft interface information
1794 * @orig_node: the originator owning the entries to remove
1795 * @match_vid: the VLAN identifier to match. If negative all the entries will be
1796 * removed
1797 * @message: debug message to print as "reason"
1798 */
56303d34
SE
1799void batadv_tt_global_del_orig(struct batadv_priv *bat_priv,
1800 struct batadv_orig_node *orig_node,
95fb130d 1801 int32_t match_vid,
56303d34 1802 const char *message)
c6c8fea2 1803{
56303d34
SE
1804 struct batadv_tt_global_entry *tt_global;
1805 struct batadv_tt_common_entry *tt_common_entry;
c90681b8 1806 uint32_t i;
807736f6 1807 struct batadv_hashtable *hash = bat_priv->tt.global_hash;
b67bfe0d 1808 struct hlist_node *safe;
a73105b8 1809 struct hlist_head *head;
7683fdc1 1810 spinlock_t *list_lock; /* protects write access to the hash lists */
16052789 1811 unsigned short vid;
c6c8fea2 1812
6e801494
SW
1813 if (!hash)
1814 return;
1815
a73105b8
AQ
1816 for (i = 0; i < hash->size; i++) {
1817 head = &hash->table[i];
7683fdc1 1818 list_lock = &hash->list_locks[i];
c6c8fea2 1819
7683fdc1 1820 spin_lock_bh(list_lock);
b67bfe0d 1821 hlist_for_each_entry_safe(tt_common_entry, safe,
7c64fd98 1822 head, hash_entry) {
95fb130d
AQ
1823 /* remove only matching entries */
1824 if (match_vid >= 0 && tt_common_entry->vid != match_vid)
1825 continue;
1826
56303d34
SE
1827 tt_global = container_of(tt_common_entry,
1828 struct batadv_tt_global_entry,
1829 common);
db08e6e5 1830
1d8ab8d3
LL
1831 batadv_tt_global_del_orig_node(bat_priv, tt_global,
1832 orig_node, message);
db08e6e5 1833
56303d34 1834 if (hlist_empty(&tt_global->orig_list)) {
16052789 1835 vid = tt_global->common.vid;
39c75a51 1836 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789
AQ
1837 "Deleting global tt entry %pM (vid: %d): %s\n",
1838 tt_global->common.addr,
1839 BATADV_PRINT_VID(vid), message);
b67bfe0d 1840 hlist_del_rcu(&tt_common_entry->hash_entry);
56303d34 1841 batadv_tt_global_entry_free_ref(tt_global);
7683fdc1 1842 }
a73105b8 1843 }
7683fdc1 1844 spin_unlock_bh(list_lock);
c6c8fea2 1845 }
e17931d1 1846 orig_node->capa_initialized &= ~BATADV_ORIG_CAPA_HAS_TT;
c6c8fea2
SE
1847}
1848
30cfd02b
AQ
1849static bool batadv_tt_global_to_purge(struct batadv_tt_global_entry *tt_global,
1850 char **msg)
cc47f66e 1851{
30cfd02b
AQ
1852 bool purge = false;
1853 unsigned long roam_timeout = BATADV_TT_CLIENT_ROAM_TIMEOUT;
1854 unsigned long temp_timeout = BATADV_TT_CLIENT_TEMP_TIMEOUT;
42d0b044 1855
30cfd02b
AQ
1856 if ((tt_global->common.flags & BATADV_TT_CLIENT_ROAM) &&
1857 batadv_has_timed_out(tt_global->roam_at, roam_timeout)) {
1858 purge = true;
1859 *msg = "Roaming timeout\n";
1860 }
42d0b044 1861
30cfd02b
AQ
1862 if ((tt_global->common.flags & BATADV_TT_CLIENT_TEMP) &&
1863 batadv_has_timed_out(tt_global->common.added_at, temp_timeout)) {
1864 purge = true;
1865 *msg = "Temporary client timeout\n";
42d0b044 1866 }
30cfd02b
AQ
1867
1868 return purge;
42d0b044
SE
1869}
1870
30cfd02b 1871static void batadv_tt_global_purge(struct batadv_priv *bat_priv)
42d0b044 1872{
807736f6 1873 struct batadv_hashtable *hash = bat_priv->tt.global_hash;
cc47f66e 1874 struct hlist_head *head;
b67bfe0d 1875 struct hlist_node *node_tmp;
7683fdc1 1876 spinlock_t *list_lock; /* protects write access to the hash lists */
c90681b8 1877 uint32_t i;
30cfd02b
AQ
1878 char *msg = NULL;
1879 struct batadv_tt_common_entry *tt_common;
1880 struct batadv_tt_global_entry *tt_global;
cc47f66e 1881
cc47f66e
AQ
1882 for (i = 0; i < hash->size; i++) {
1883 head = &hash->table[i];
7683fdc1 1884 list_lock = &hash->list_locks[i];
cc47f66e 1885
7683fdc1 1886 spin_lock_bh(list_lock);
b67bfe0d 1887 hlist_for_each_entry_safe(tt_common, node_tmp, head,
30cfd02b
AQ
1888 hash_entry) {
1889 tt_global = container_of(tt_common,
1890 struct batadv_tt_global_entry,
1891 common);
1892
1893 if (!batadv_tt_global_to_purge(tt_global, &msg))
1894 continue;
1895
1896 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789
AQ
1897 "Deleting global tt entry %pM (vid: %d): %s\n",
1898 tt_global->common.addr,
1899 BATADV_PRINT_VID(tt_global->common.vid),
1900 msg);
30cfd02b 1901
b67bfe0d 1902 hlist_del_rcu(&tt_common->hash_entry);
30cfd02b
AQ
1903
1904 batadv_tt_global_entry_free_ref(tt_global);
1905 }
7683fdc1 1906 spin_unlock_bh(list_lock);
cc47f66e 1907 }
cc47f66e
AQ
1908}
1909
56303d34 1910static void batadv_tt_global_table_free(struct batadv_priv *bat_priv)
c6c8fea2 1911{
5bf74e9c 1912 struct batadv_hashtable *hash;
7683fdc1 1913 spinlock_t *list_lock; /* protects write access to the hash lists */
56303d34
SE
1914 struct batadv_tt_common_entry *tt_common_entry;
1915 struct batadv_tt_global_entry *tt_global;
b67bfe0d 1916 struct hlist_node *node_tmp;
7683fdc1 1917 struct hlist_head *head;
c90681b8 1918 uint32_t i;
7683fdc1 1919
807736f6 1920 if (!bat_priv->tt.global_hash)
c6c8fea2
SE
1921 return;
1922
807736f6 1923 hash = bat_priv->tt.global_hash;
7683fdc1
AQ
1924
1925 for (i = 0; i < hash->size; i++) {
1926 head = &hash->table[i];
1927 list_lock = &hash->list_locks[i];
1928
1929 spin_lock_bh(list_lock);
b67bfe0d 1930 hlist_for_each_entry_safe(tt_common_entry, node_tmp,
7683fdc1 1931 head, hash_entry) {
b67bfe0d 1932 hlist_del_rcu(&tt_common_entry->hash_entry);
56303d34
SE
1933 tt_global = container_of(tt_common_entry,
1934 struct batadv_tt_global_entry,
1935 common);
1936 batadv_tt_global_entry_free_ref(tt_global);
7683fdc1
AQ
1937 }
1938 spin_unlock_bh(list_lock);
1939 }
1940
1a8eaf07 1941 batadv_hash_destroy(hash);
7683fdc1 1942
807736f6 1943 bat_priv->tt.global_hash = NULL;
c6c8fea2
SE
1944}
1945
56303d34
SE
1946static bool
1947_batadv_is_ap_isolated(struct batadv_tt_local_entry *tt_local_entry,
1948 struct batadv_tt_global_entry *tt_global_entry)
59b699cd
AQ
1949{
1950 bool ret = false;
1951
acd34afa
SE
1952 if (tt_local_entry->common.flags & BATADV_TT_CLIENT_WIFI &&
1953 tt_global_entry->common.flags & BATADV_TT_CLIENT_WIFI)
59b699cd
AQ
1954 ret = true;
1955
2d2fcc2a
AQ
1956 /* check if the two clients are marked as isolated */
1957 if (tt_local_entry->common.flags & BATADV_TT_CLIENT_ISOLA &&
1958 tt_global_entry->common.flags & BATADV_TT_CLIENT_ISOLA)
1959 ret = true;
1960
59b699cd
AQ
1961 return ret;
1962}
1963
c018ad3d
AQ
1964/**
1965 * batadv_transtable_search - get the mesh destination for a given client
1966 * @bat_priv: the bat priv with all the soft interface information
1967 * @src: mac address of the source client
1968 * @addr: mac address of the destination client
1969 * @vid: VLAN identifier
1970 *
1971 * Returns a pointer to the originator that was selected as destination in the
1972 * mesh for contacting the client 'addr', NULL otherwise.
1973 * In case of multiple originators serving the same client, the function returns
1974 * the best one (best in terms of metric towards the destination node).
1975 *
1976 * If the two clients are AP isolated the function returns NULL.
1977 */
56303d34
SE
1978struct batadv_orig_node *batadv_transtable_search(struct batadv_priv *bat_priv,
1979 const uint8_t *src,
c018ad3d
AQ
1980 const uint8_t *addr,
1981 unsigned short vid)
c6c8fea2 1982{
56303d34
SE
1983 struct batadv_tt_local_entry *tt_local_entry = NULL;
1984 struct batadv_tt_global_entry *tt_global_entry = NULL;
1985 struct batadv_orig_node *orig_node = NULL;
981d8900 1986 struct batadv_tt_orig_list_entry *best_entry;
b8cbd81d 1987
eceb22ae 1988 if (src && batadv_vlan_ap_isola_get(bat_priv, vid)) {
c018ad3d 1989 tt_local_entry = batadv_tt_local_hash_find(bat_priv, src, vid);
068ee6e2
AQ
1990 if (!tt_local_entry ||
1991 (tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING))
3d393e47
AQ
1992 goto out;
1993 }
7aadf889 1994
c018ad3d 1995 tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
2dafb49d 1996 if (!tt_global_entry)
7b36e8ee 1997 goto out;
7aadf889 1998
3d393e47 1999 /* check whether the clients should not communicate due to AP
9cfc7bd6
SE
2000 * isolation
2001 */
a513088d
SE
2002 if (tt_local_entry &&
2003 _batadv_is_ap_isolated(tt_local_entry, tt_global_entry))
3d393e47
AQ
2004 goto out;
2005
db08e6e5 2006 rcu_read_lock();
4627456a 2007 best_entry = batadv_transtable_best_orig(bat_priv, tt_global_entry);
db08e6e5 2008 /* found anything? */
981d8900
SE
2009 if (best_entry)
2010 orig_node = best_entry->orig_node;
db08e6e5
SW
2011 if (orig_node && !atomic_inc_not_zero(&orig_node->refcount))
2012 orig_node = NULL;
2013 rcu_read_unlock();
981d8900 2014
7b36e8ee 2015out:
3d393e47 2016 if (tt_global_entry)
a513088d 2017 batadv_tt_global_entry_free_ref(tt_global_entry);
3d393e47 2018 if (tt_local_entry)
a513088d 2019 batadv_tt_local_entry_free_ref(tt_local_entry);
3d393e47 2020
7b36e8ee 2021 return orig_node;
c6c8fea2 2022}
a73105b8 2023
ced72933
AQ
2024/**
2025 * batadv_tt_global_crc - calculates the checksum of the local table belonging
2026 * to the given orig_node
2027 * @bat_priv: the bat priv with all the soft interface information
0ffa9e8d 2028 * @orig_node: originator for which the CRC should be computed
7ea7b4a1 2029 * @vid: VLAN identifier for which the CRC32 has to be computed
0ffa9e8d
AQ
2030 *
2031 * This function computes the checksum for the global table corresponding to a
2032 * specific originator. In particular, the checksum is computed as follows: For
2033 * each client connected to the originator the CRC32C of the MAC address and the
2034 * VID is computed and then all the CRC32Cs of the various clients are xor'ed
2035 * together.
2036 *
2037 * The idea behind is that CRC32C should be used as much as possible in order to
2038 * produce a unique hash of the table, but since the order which is used to feed
2039 * the CRC32C function affects the result and since every node in the network
2040 * probably sorts the clients differently, the hash function cannot be directly
2041 * computed over the entire table. Hence the CRC32C is used only on
2042 * the single client entry, while all the results are then xor'ed together
2043 * because the XOR operation can combine them all while trying to reduce the
2044 * noise as much as possible.
2045 *
2046 * Returns the checksum of the global table of a given originator.
ced72933
AQ
2047 */
2048static uint32_t batadv_tt_global_crc(struct batadv_priv *bat_priv,
7ea7b4a1
AQ
2049 struct batadv_orig_node *orig_node,
2050 unsigned short vid)
a73105b8 2051{
807736f6 2052 struct batadv_hashtable *hash = bat_priv->tt.global_hash;
56303d34
SE
2053 struct batadv_tt_common_entry *tt_common;
2054 struct batadv_tt_global_entry *tt_global;
a73105b8 2055 struct hlist_head *head;
0ffa9e8d 2056 uint32_t i, crc_tmp, crc = 0;
0eb01568 2057 uint8_t flags;
a30e22ca 2058 __be16 tmp_vid;
a73105b8
AQ
2059
2060 for (i = 0; i < hash->size; i++) {
2061 head = &hash->table[i];
2062
2063 rcu_read_lock();
b67bfe0d 2064 hlist_for_each_entry_rcu(tt_common, head, hash_entry) {
56303d34
SE
2065 tt_global = container_of(tt_common,
2066 struct batadv_tt_global_entry,
2067 common);
7ea7b4a1
AQ
2068 /* compute the CRC only for entries belonging to the
2069 * VLAN identified by the vid passed as parameter
2070 */
2071 if (tt_common->vid != vid)
2072 continue;
2073
db08e6e5
SW
2074 /* Roaming clients are in the global table for
2075 * consistency only. They don't have to be
2076 * taken into account while computing the
2077 * global crc
2078 */
acd34afa 2079 if (tt_common->flags & BATADV_TT_CLIENT_ROAM)
db08e6e5 2080 continue;
30cfd02b
AQ
2081 /* Temporary clients have not been announced yet, so
2082 * they have to be skipped while computing the global
2083 * crc
2084 */
2085 if (tt_common->flags & BATADV_TT_CLIENT_TEMP)
2086 continue;
db08e6e5
SW
2087
2088 /* find out if this global entry is announced by this
2089 * originator
2090 */
56303d34 2091 if (!batadv_tt_global_entry_has_orig(tt_global,
a513088d 2092 orig_node))
db08e6e5
SW
2093 continue;
2094
a30e22ca
AQ
2095 /* use network order to read the VID: this ensures that
2096 * every node reads the bytes in the same order.
2097 */
2098 tmp_vid = htons(tt_common->vid);
2099 crc_tmp = crc32c(0, &tmp_vid, sizeof(tmp_vid));
0eb01568
AQ
2100
2101 /* compute the CRC on flags that have to be kept in sync
2102 * among nodes
2103 */
2104 flags = tt_common->flags & BATADV_TT_SYNC_MASK;
2105 crc_tmp = crc32c(crc_tmp, &flags, sizeof(flags));
2106
0ffa9e8d 2107 crc ^= crc32c(crc_tmp, tt_common->addr, ETH_ALEN);
a73105b8
AQ
2108 }
2109 rcu_read_unlock();
2110 }
2111
ced72933 2112 return crc;
a73105b8
AQ
2113}
2114
ced72933
AQ
2115/**
2116 * batadv_tt_local_crc - calculates the checksum of the local table
2117 * @bat_priv: the bat priv with all the soft interface information
7ea7b4a1 2118 * @vid: VLAN identifier for which the CRC32 has to be computed
0ffa9e8d
AQ
2119 *
2120 * For details about the computation, please refer to the documentation for
2121 * batadv_tt_global_crc().
2122 *
2123 * Returns the checksum of the local table
ced72933 2124 */
7ea7b4a1
AQ
2125static uint32_t batadv_tt_local_crc(struct batadv_priv *bat_priv,
2126 unsigned short vid)
a73105b8 2127{
807736f6 2128 struct batadv_hashtable *hash = bat_priv->tt.local_hash;
56303d34 2129 struct batadv_tt_common_entry *tt_common;
a73105b8 2130 struct hlist_head *head;
0ffa9e8d 2131 uint32_t i, crc_tmp, crc = 0;
0eb01568 2132 uint8_t flags;
a30e22ca 2133 __be16 tmp_vid;
a73105b8
AQ
2134
2135 for (i = 0; i < hash->size; i++) {
2136 head = &hash->table[i];
2137
2138 rcu_read_lock();
b67bfe0d 2139 hlist_for_each_entry_rcu(tt_common, head, hash_entry) {
7ea7b4a1
AQ
2140 /* compute the CRC only for entries belonging to the
2141 * VLAN identified by vid
2142 */
2143 if (tt_common->vid != vid)
2144 continue;
2145
058d0e26 2146 /* not yet committed clients have not to be taken into
9cfc7bd6
SE
2147 * account while computing the CRC
2148 */
acd34afa 2149 if (tt_common->flags & BATADV_TT_CLIENT_NEW)
058d0e26 2150 continue;
ced72933 2151
a30e22ca
AQ
2152 /* use network order to read the VID: this ensures that
2153 * every node reads the bytes in the same order.
2154 */
2155 tmp_vid = htons(tt_common->vid);
2156 crc_tmp = crc32c(0, &tmp_vid, sizeof(tmp_vid));
0eb01568
AQ
2157
2158 /* compute the CRC on flags that have to be kept in sync
2159 * among nodes
2160 */
2161 flags = tt_common->flags & BATADV_TT_SYNC_MASK;
2162 crc_tmp = crc32c(crc_tmp, &flags, sizeof(flags));
2163
0ffa9e8d 2164 crc ^= crc32c(crc_tmp, tt_common->addr, ETH_ALEN);
a73105b8 2165 }
a73105b8
AQ
2166 rcu_read_unlock();
2167 }
2168
ced72933 2169 return crc;
a73105b8
AQ
2170}
2171
56303d34 2172static void batadv_tt_req_list_free(struct batadv_priv *bat_priv)
a73105b8 2173{
56303d34 2174 struct batadv_tt_req_node *node, *safe;
a73105b8 2175
807736f6 2176 spin_lock_bh(&bat_priv->tt.req_list_lock);
a73105b8 2177
807736f6 2178 list_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
a73105b8
AQ
2179 list_del(&node->list);
2180 kfree(node);
2181 }
2182
807736f6 2183 spin_unlock_bh(&bat_priv->tt.req_list_lock);
a73105b8
AQ
2184}
2185
56303d34
SE
2186static void batadv_tt_save_orig_buffer(struct batadv_priv *bat_priv,
2187 struct batadv_orig_node *orig_node,
e8cf234a
AQ
2188 const void *tt_buff,
2189 uint16_t tt_buff_len)
a73105b8 2190{
a73105b8 2191 /* Replace the old buffer only if I received something in the
9cfc7bd6
SE
2192 * last OGM (the OGM could carry no changes)
2193 */
a73105b8
AQ
2194 spin_lock_bh(&orig_node->tt_buff_lock);
2195 if (tt_buff_len > 0) {
2196 kfree(orig_node->tt_buff);
2197 orig_node->tt_buff_len = 0;
2198 orig_node->tt_buff = kmalloc(tt_buff_len, GFP_ATOMIC);
2199 if (orig_node->tt_buff) {
2200 memcpy(orig_node->tt_buff, tt_buff, tt_buff_len);
2201 orig_node->tt_buff_len = tt_buff_len;
2202 }
2203 }
2204 spin_unlock_bh(&orig_node->tt_buff_lock);
2205}
2206
56303d34 2207static void batadv_tt_req_purge(struct batadv_priv *bat_priv)
a73105b8 2208{
56303d34 2209 struct batadv_tt_req_node *node, *safe;
a73105b8 2210
807736f6
SE
2211 spin_lock_bh(&bat_priv->tt.req_list_lock);
2212 list_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
42d0b044
SE
2213 if (batadv_has_timed_out(node->issued_at,
2214 BATADV_TT_REQUEST_TIMEOUT)) {
a73105b8
AQ
2215 list_del(&node->list);
2216 kfree(node);
2217 }
2218 }
807736f6 2219 spin_unlock_bh(&bat_priv->tt.req_list_lock);
a73105b8
AQ
2220}
2221
2222/* returns the pointer to the new tt_req_node struct if no request
9cfc7bd6
SE
2223 * has already been issued for this orig_node, NULL otherwise
2224 */
56303d34
SE
2225static struct batadv_tt_req_node *
2226batadv_new_tt_req_node(struct batadv_priv *bat_priv,
2227 struct batadv_orig_node *orig_node)
a73105b8 2228{
56303d34 2229 struct batadv_tt_req_node *tt_req_node_tmp, *tt_req_node = NULL;
a73105b8 2230
807736f6
SE
2231 spin_lock_bh(&bat_priv->tt.req_list_lock);
2232 list_for_each_entry(tt_req_node_tmp, &bat_priv->tt.req_list, list) {
1eda58bf
SE
2233 if (batadv_compare_eth(tt_req_node_tmp, orig_node) &&
2234 !batadv_has_timed_out(tt_req_node_tmp->issued_at,
42d0b044 2235 BATADV_TT_REQUEST_TIMEOUT))
a73105b8
AQ
2236 goto unlock;
2237 }
2238
2239 tt_req_node = kmalloc(sizeof(*tt_req_node), GFP_ATOMIC);
2240 if (!tt_req_node)
2241 goto unlock;
2242
8fdd0153 2243 ether_addr_copy(tt_req_node->addr, orig_node->orig);
a73105b8
AQ
2244 tt_req_node->issued_at = jiffies;
2245
807736f6 2246 list_add(&tt_req_node->list, &bat_priv->tt.req_list);
a73105b8 2247unlock:
807736f6 2248 spin_unlock_bh(&bat_priv->tt.req_list_lock);
a73105b8
AQ
2249 return tt_req_node;
2250}
2251
335fbe0f
ML
2252/**
2253 * batadv_tt_local_valid - verify that given tt entry is a valid one
2254 * @entry_ptr: to be checked local tt entry
2255 * @data_ptr: not used but definition required to satisfy the callback prototype
2256 *
2257 * Returns 1 if the entry is a valid, 0 otherwise.
2258 */
2259static int batadv_tt_local_valid(const void *entry_ptr, const void *data_ptr)
058d0e26 2260{
56303d34 2261 const struct batadv_tt_common_entry *tt_common_entry = entry_ptr;
058d0e26 2262
acd34afa 2263 if (tt_common_entry->flags & BATADV_TT_CLIENT_NEW)
058d0e26
AQ
2264 return 0;
2265 return 1;
2266}
2267
a513088d
SE
2268static int batadv_tt_global_valid(const void *entry_ptr,
2269 const void *data_ptr)
a73105b8 2270{
56303d34
SE
2271 const struct batadv_tt_common_entry *tt_common_entry = entry_ptr;
2272 const struct batadv_tt_global_entry *tt_global_entry;
2273 const struct batadv_orig_node *orig_node = data_ptr;
a73105b8 2274
30cfd02b
AQ
2275 if (tt_common_entry->flags & BATADV_TT_CLIENT_ROAM ||
2276 tt_common_entry->flags & BATADV_TT_CLIENT_TEMP)
cc47f66e
AQ
2277 return 0;
2278
56303d34
SE
2279 tt_global_entry = container_of(tt_common_entry,
2280 struct batadv_tt_global_entry,
48100bac
AQ
2281 common);
2282
a513088d 2283 return batadv_tt_global_entry_has_orig(tt_global_entry, orig_node);
a73105b8
AQ
2284}
2285
335fbe0f 2286/**
7ea7b4a1
AQ
2287 * batadv_tt_tvlv_generate - fill the tvlv buff with the tt entries from the
2288 * specified tt hash
335fbe0f
ML
2289 * @bat_priv: the bat priv with all the soft interface information
2290 * @hash: hash table containing the tt entries
2291 * @tt_len: expected tvlv tt data buffer length in number of bytes
7ea7b4a1 2292 * @tvlv_buff: pointer to the buffer to fill with the TT data
335fbe0f
ML
2293 * @valid_cb: function to filter tt change entries
2294 * @cb_data: data passed to the filter function as argument
335fbe0f 2295 */
7ea7b4a1
AQ
2296static void batadv_tt_tvlv_generate(struct batadv_priv *bat_priv,
2297 struct batadv_hashtable *hash,
2298 void *tvlv_buff, uint16_t tt_len,
2299 int (*valid_cb)(const void *, const void *),
2300 void *cb_data)
a73105b8 2301{
56303d34 2302 struct batadv_tt_common_entry *tt_common_entry;
335fbe0f 2303 struct batadv_tvlv_tt_change *tt_change;
a73105b8 2304 struct hlist_head *head;
335fbe0f 2305 uint16_t tt_tot, tt_num_entries = 0;
c90681b8 2306 uint32_t i;
a73105b8 2307
298e6e68 2308 tt_tot = batadv_tt_entries(tt_len);
7ea7b4a1 2309 tt_change = (struct batadv_tvlv_tt_change *)tvlv_buff;
a73105b8
AQ
2310
2311 rcu_read_lock();
2312 for (i = 0; i < hash->size; i++) {
2313 head = &hash->table[i];
2314
b67bfe0d 2315 hlist_for_each_entry_rcu(tt_common_entry,
a73105b8 2316 head, hash_entry) {
335fbe0f 2317 if (tt_tot == tt_num_entries)
a73105b8
AQ
2318 break;
2319
48100bac 2320 if ((valid_cb) && (!valid_cb(tt_common_entry, cb_data)))
a73105b8
AQ
2321 continue;
2322
8fdd0153 2323 ether_addr_copy(tt_change->addr, tt_common_entry->addr);
27b37ebf 2324 tt_change->flags = tt_common_entry->flags;
c018ad3d 2325 tt_change->vid = htons(tt_common_entry->vid);
ca663046
AQ
2326 memset(tt_change->reserved, 0,
2327 sizeof(tt_change->reserved));
a73105b8 2328
335fbe0f 2329 tt_num_entries++;
a73105b8
AQ
2330 tt_change++;
2331 }
2332 }
2333 rcu_read_unlock();
7ea7b4a1 2334}
a73105b8 2335
7ea7b4a1
AQ
2336/**
2337 * batadv_tt_global_check_crc - check if all the CRCs are correct
2338 * @orig_node: originator for which the CRCs have to be checked
2339 * @tt_vlan: pointer to the first tvlv VLAN entry
2340 * @num_vlan: number of tvlv VLAN entries
2341 * @create: if true, create VLAN objects if not found
2342 *
2343 * Return true if all the received CRCs match the locally stored ones, false
2344 * otherwise
2345 */
2346static bool batadv_tt_global_check_crc(struct batadv_orig_node *orig_node,
2347 struct batadv_tvlv_tt_vlan_data *tt_vlan,
2348 uint16_t num_vlan)
2349{
2350 struct batadv_tvlv_tt_vlan_data *tt_vlan_tmp;
2351 struct batadv_orig_node_vlan *vlan;
91c2b1a9 2352 uint32_t crc;
7ea7b4a1
AQ
2353 int i;
2354
2355 /* check if each received CRC matches the locally stored one */
2356 for (i = 0; i < num_vlan; i++) {
2357 tt_vlan_tmp = tt_vlan + i;
2358
2359 /* if orig_node is a backbone node for this VLAN, don't check
2360 * the CRC as we ignore all the global entries over it
2361 */
2362 if (batadv_bla_is_backbone_gw_orig(orig_node->bat_priv,
cfd4f757
AQ
2363 orig_node->orig,
2364 ntohs(tt_vlan_tmp->vid)))
7ea7b4a1
AQ
2365 continue;
2366
2367 vlan = batadv_orig_node_vlan_get(orig_node,
2368 ntohs(tt_vlan_tmp->vid));
2369 if (!vlan)
2370 return false;
2371
91c2b1a9
AQ
2372 crc = vlan->tt.crc;
2373 batadv_orig_node_vlan_free_ref(vlan);
2374
2375 if (crc != ntohl(tt_vlan_tmp->crc))
7ea7b4a1
AQ
2376 return false;
2377 }
2378
2379 return true;
2380}
2381
2382/**
2383 * batadv_tt_local_update_crc - update all the local CRCs
2384 * @bat_priv: the bat priv with all the soft interface information
2385 */
2386static void batadv_tt_local_update_crc(struct batadv_priv *bat_priv)
2387{
2388 struct batadv_softif_vlan *vlan;
2389
2390 /* recompute the global CRC for each VLAN */
2391 rcu_read_lock();
2392 hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
2393 vlan->tt.crc = batadv_tt_local_crc(bat_priv, vlan->vid);
2394 }
2395 rcu_read_unlock();
2396}
2397
2398/**
2399 * batadv_tt_global_update_crc - update all the global CRCs for this orig_node
2400 * @bat_priv: the bat priv with all the soft interface information
2401 * @orig_node: the orig_node for which the CRCs have to be updated
2402 */
2403static void batadv_tt_global_update_crc(struct batadv_priv *bat_priv,
2404 struct batadv_orig_node *orig_node)
2405{
2406 struct batadv_orig_node_vlan *vlan;
2407 uint32_t crc;
2408
2409 /* recompute the global CRC for each VLAN */
2410 rcu_read_lock();
2411 list_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) {
2412 /* if orig_node is a backbone node for this VLAN, don't compute
2413 * the CRC as we ignore all the global entries over it
2414 */
cfd4f757
AQ
2415 if (batadv_bla_is_backbone_gw_orig(bat_priv, orig_node->orig,
2416 vlan->vid))
7ea7b4a1
AQ
2417 continue;
2418
2419 crc = batadv_tt_global_crc(bat_priv, orig_node, vlan->vid);
2420 vlan->tt.crc = crc;
2421 }
2422 rcu_read_unlock();
a73105b8
AQ
2423}
2424
ced72933
AQ
2425/**
2426 * batadv_send_tt_request - send a TT Request message to a given node
2427 * @bat_priv: the bat priv with all the soft interface information
2428 * @dst_orig_node: the destination of the message
2429 * @ttvn: the version number that the source of the message is looking for
7ea7b4a1
AQ
2430 * @tt_vlan: pointer to the first tvlv VLAN object to request
2431 * @num_vlan: number of tvlv VLAN entries
ced72933
AQ
2432 * @full_table: ask for the entire translation table if true, while only for the
2433 * last TT diff otherwise
2434 */
56303d34
SE
2435static int batadv_send_tt_request(struct batadv_priv *bat_priv,
2436 struct batadv_orig_node *dst_orig_node,
7ea7b4a1
AQ
2437 uint8_t ttvn,
2438 struct batadv_tvlv_tt_vlan_data *tt_vlan,
2439 uint16_t num_vlan, bool full_table)
a73105b8 2440{
335fbe0f 2441 struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
56303d34 2442 struct batadv_tt_req_node *tt_req_node = NULL;
7ea7b4a1
AQ
2443 struct batadv_tvlv_tt_vlan_data *tt_vlan_req;
2444 struct batadv_hard_iface *primary_if;
335fbe0f 2445 bool ret = false;
7ea7b4a1 2446 int i, size;
a73105b8 2447
e5d89254 2448 primary_if = batadv_primary_if_get_selected(bat_priv);
a73105b8
AQ
2449 if (!primary_if)
2450 goto out;
2451
2452 /* The new tt_req will be issued only if I'm not waiting for a
9cfc7bd6
SE
2453 * reply from the same orig_node yet
2454 */
a513088d 2455 tt_req_node = batadv_new_tt_req_node(bat_priv, dst_orig_node);
a73105b8
AQ
2456 if (!tt_req_node)
2457 goto out;
2458
7ea7b4a1
AQ
2459 size = sizeof(*tvlv_tt_data) + sizeof(*tt_vlan_req) * num_vlan;
2460 tvlv_tt_data = kzalloc(size, GFP_ATOMIC);
335fbe0f 2461 if (!tvlv_tt_data)
a73105b8
AQ
2462 goto out;
2463
335fbe0f
ML
2464 tvlv_tt_data->flags = BATADV_TT_REQUEST;
2465 tvlv_tt_data->ttvn = ttvn;
7ea7b4a1
AQ
2466 tvlv_tt_data->num_vlan = htons(num_vlan);
2467
2468 /* send all the CRCs within the request. This is needed by intermediate
2469 * nodes to ensure they have the correct table before replying
2470 */
2471 tt_vlan_req = (struct batadv_tvlv_tt_vlan_data *)(tvlv_tt_data + 1);
2472 for (i = 0; i < num_vlan; i++) {
2473 tt_vlan_req->vid = tt_vlan->vid;
2474 tt_vlan_req->crc = tt_vlan->crc;
2475
2476 tt_vlan_req++;
2477 tt_vlan++;
2478 }
a73105b8
AQ
2479
2480 if (full_table)
335fbe0f 2481 tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
a73105b8 2482
bb351ba0 2483 batadv_dbg(BATADV_DBG_TT, bat_priv, "Sending TT_REQUEST to %pM [%c]\n",
335fbe0f 2484 dst_orig_node->orig, full_table ? 'F' : '.');
a73105b8 2485
d69909d2 2486 batadv_inc_counter(bat_priv, BATADV_CNT_TT_REQUEST_TX);
335fbe0f
ML
2487 batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
2488 dst_orig_node->orig, BATADV_TVLV_TT, 1,
7ea7b4a1 2489 tvlv_tt_data, size);
335fbe0f 2490 ret = true;
a73105b8
AQ
2491
2492out:
a73105b8 2493 if (primary_if)
e5d89254 2494 batadv_hardif_free_ref(primary_if);
a73105b8 2495 if (ret && tt_req_node) {
807736f6 2496 spin_lock_bh(&bat_priv->tt.req_list_lock);
a73105b8 2497 list_del(&tt_req_node->list);
807736f6 2498 spin_unlock_bh(&bat_priv->tt.req_list_lock);
a73105b8
AQ
2499 kfree(tt_req_node);
2500 }
335fbe0f 2501 kfree(tvlv_tt_data);
a73105b8
AQ
2502 return ret;
2503}
2504
335fbe0f
ML
2505/**
2506 * batadv_send_other_tt_response - send reply to tt request concerning another
2507 * node's translation table
2508 * @bat_priv: the bat priv with all the soft interface information
2509 * @tt_data: tt data containing the tt request information
2510 * @req_src: mac address of tt request sender
2511 * @req_dst: mac address of tt request recipient
2512 *
2513 * Returns true if tt request reply was sent, false otherwise.
2514 */
2515static bool batadv_send_other_tt_response(struct batadv_priv *bat_priv,
2516 struct batadv_tvlv_tt_data *tt_data,
2517 uint8_t *req_src, uint8_t *req_dst)
a73105b8 2518{
170173bf 2519 struct batadv_orig_node *req_dst_orig_node;
56303d34 2520 struct batadv_orig_node *res_dst_orig_node = NULL;
7ea7b4a1 2521 struct batadv_tvlv_tt_change *tt_change;
335fbe0f 2522 struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
7ea7b4a1 2523 struct batadv_tvlv_tt_vlan_data *tt_vlan;
335fbe0f 2524 bool ret = false, full_table;
7ea7b4a1
AQ
2525 uint8_t orig_ttvn, req_ttvn;
2526 uint16_t tvlv_len;
2527 int32_t tt_len;
a73105b8 2528
39c75a51 2529 batadv_dbg(BATADV_DBG_TT, bat_priv,
1eda58bf 2530 "Received TT_REQUEST from %pM for ttvn: %u (%pM) [%c]\n",
335fbe0f
ML
2531 req_src, tt_data->ttvn, req_dst,
2532 (tt_data->flags & BATADV_TT_FULL_TABLE ? 'F' : '.'));
a73105b8
AQ
2533
2534 /* Let's get the orig node of the REAL destination */
335fbe0f 2535 req_dst_orig_node = batadv_orig_hash_find(bat_priv, req_dst);
a73105b8
AQ
2536 if (!req_dst_orig_node)
2537 goto out;
2538
335fbe0f 2539 res_dst_orig_node = batadv_orig_hash_find(bat_priv, req_src);
a73105b8
AQ
2540 if (!res_dst_orig_node)
2541 goto out;
2542
a73105b8 2543 orig_ttvn = (uint8_t)atomic_read(&req_dst_orig_node->last_ttvn);
335fbe0f 2544 req_ttvn = tt_data->ttvn;
a73105b8 2545
7ea7b4a1 2546 tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(tt_data + 1);
335fbe0f 2547 /* this node doesn't have the requested data */
a73105b8 2548 if (orig_ttvn != req_ttvn ||
7ea7b4a1
AQ
2549 !batadv_tt_global_check_crc(req_dst_orig_node, tt_vlan,
2550 ntohs(tt_data->num_vlan)))
a73105b8
AQ
2551 goto out;
2552
015758d0 2553 /* If the full table has been explicitly requested */
335fbe0f 2554 if (tt_data->flags & BATADV_TT_FULL_TABLE ||
a73105b8
AQ
2555 !req_dst_orig_node->tt_buff)
2556 full_table = true;
2557 else
2558 full_table = false;
2559
335fbe0f
ML
2560 /* TT fragmentation hasn't been implemented yet, so send as many
2561 * TT entries fit a single packet as possible only
9cfc7bd6 2562 */
a73105b8
AQ
2563 if (!full_table) {
2564 spin_lock_bh(&req_dst_orig_node->tt_buff_lock);
2565 tt_len = req_dst_orig_node->tt_buff_len;
a73105b8 2566
7ea7b4a1
AQ
2567 tvlv_len = batadv_tt_prepare_tvlv_global_data(req_dst_orig_node,
2568 &tvlv_tt_data,
2569 &tt_change,
2570 &tt_len);
2571 if (!tt_len)
a73105b8
AQ
2572 goto unlock;
2573
a73105b8 2574 /* Copy the last orig_node's OGM buffer */
7ea7b4a1 2575 memcpy(tt_change, req_dst_orig_node->tt_buff,
a73105b8 2576 req_dst_orig_node->tt_buff_len);
a73105b8
AQ
2577 spin_unlock_bh(&req_dst_orig_node->tt_buff_lock);
2578 } else {
7ea7b4a1
AQ
2579 /* allocate the tvlv, put the tt_data and all the tt_vlan_data
2580 * in the initial part
2581 */
2582 tt_len = -1;
2583 tvlv_len = batadv_tt_prepare_tvlv_global_data(req_dst_orig_node,
2584 &tvlv_tt_data,
2585 &tt_change,
2586 &tt_len);
2587 if (!tt_len)
a73105b8 2588 goto out;
7ea7b4a1
AQ
2589
2590 /* fill the rest of the tvlv with the real TT entries */
2591 batadv_tt_tvlv_generate(bat_priv, bat_priv->tt.global_hash,
2592 tt_change, tt_len,
2593 batadv_tt_global_valid,
2594 req_dst_orig_node);
a73105b8
AQ
2595 }
2596
a19d3d85
ML
2597 /* Don't send the response, if larger than fragmented packet. */
2598 tt_len = sizeof(struct batadv_unicast_tvlv_packet) + tvlv_len;
2599 if (tt_len > atomic_read(&bat_priv->packet_size_max)) {
2600 net_ratelimited_function(batadv_info, bat_priv->soft_iface,
2601 "Ignoring TT_REQUEST from %pM; Response size exceeds max packet size.\n",
2602 res_dst_orig_node->orig);
2603 goto out;
2604 }
2605
335fbe0f
ML
2606 tvlv_tt_data->flags = BATADV_TT_RESPONSE;
2607 tvlv_tt_data->ttvn = req_ttvn;
a73105b8
AQ
2608
2609 if (full_table)
335fbe0f 2610 tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
a73105b8 2611
39c75a51 2612 batadv_dbg(BATADV_DBG_TT, bat_priv,
335fbe0f
ML
2613 "Sending TT_RESPONSE %pM for %pM [%c] (ttvn: %u)\n",
2614 res_dst_orig_node->orig, req_dst_orig_node->orig,
2615 full_table ? 'F' : '.', req_ttvn);
a73105b8 2616
d69909d2 2617 batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_TX);
f8214865 2618
335fbe0f 2619 batadv_tvlv_unicast_send(bat_priv, req_dst_orig_node->orig,
7ea7b4a1
AQ
2620 req_src, BATADV_TVLV_TT, 1, tvlv_tt_data,
2621 tvlv_len);
e91ecfc6 2622
335fbe0f 2623 ret = true;
a73105b8
AQ
2624 goto out;
2625
2626unlock:
2627 spin_unlock_bh(&req_dst_orig_node->tt_buff_lock);
2628
2629out:
2630 if (res_dst_orig_node)
7d211efc 2631 batadv_orig_node_free_ref(res_dst_orig_node);
a73105b8 2632 if (req_dst_orig_node)
7d211efc 2633 batadv_orig_node_free_ref(req_dst_orig_node);
335fbe0f 2634 kfree(tvlv_tt_data);
a73105b8 2635 return ret;
a73105b8 2636}
96412690 2637
335fbe0f
ML
2638/**
2639 * batadv_send_my_tt_response - send reply to tt request concerning this node's
2640 * translation table
2641 * @bat_priv: the bat priv with all the soft interface information
2642 * @tt_data: tt data containing the tt request information
2643 * @req_src: mac address of tt request sender
2644 *
2645 * Returns true if tt request reply was sent, false otherwise.
2646 */
2647static bool batadv_send_my_tt_response(struct batadv_priv *bat_priv,
2648 struct batadv_tvlv_tt_data *tt_data,
2649 uint8_t *req_src)
a73105b8 2650{
335fbe0f 2651 struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
56303d34 2652 struct batadv_hard_iface *primary_if = NULL;
7ea7b4a1
AQ
2653 struct batadv_tvlv_tt_change *tt_change;
2654 struct batadv_orig_node *orig_node;
335fbe0f 2655 uint8_t my_ttvn, req_ttvn;
7ea7b4a1 2656 uint16_t tvlv_len;
a73105b8 2657 bool full_table;
7ea7b4a1 2658 int32_t tt_len;
a73105b8 2659
39c75a51 2660 batadv_dbg(BATADV_DBG_TT, bat_priv,
1eda58bf 2661 "Received TT_REQUEST from %pM for ttvn: %u (me) [%c]\n",
335fbe0f
ML
2662 req_src, tt_data->ttvn,
2663 (tt_data->flags & BATADV_TT_FULL_TABLE ? 'F' : '.'));
a73105b8 2664
a70a9aa9 2665 spin_lock_bh(&bat_priv->tt.commit_lock);
a73105b8 2666
807736f6 2667 my_ttvn = (uint8_t)atomic_read(&bat_priv->tt.vn);
335fbe0f 2668 req_ttvn = tt_data->ttvn;
a73105b8 2669
335fbe0f 2670 orig_node = batadv_orig_hash_find(bat_priv, req_src);
a73105b8
AQ
2671 if (!orig_node)
2672 goto out;
2673
e5d89254 2674 primary_if = batadv_primary_if_get_selected(bat_priv);
a73105b8
AQ
2675 if (!primary_if)
2676 goto out;
2677
2678 /* If the full table has been explicitly requested or the gap
9cfc7bd6
SE
2679 * is too big send the whole local translation table
2680 */
335fbe0f 2681 if (tt_data->flags & BATADV_TT_FULL_TABLE || my_ttvn != req_ttvn ||
807736f6 2682 !bat_priv->tt.last_changeset)
a73105b8
AQ
2683 full_table = true;
2684 else
2685 full_table = false;
2686
335fbe0f
ML
2687 /* TT fragmentation hasn't been implemented yet, so send as many
2688 * TT entries fit a single packet as possible only
9cfc7bd6 2689 */
a73105b8 2690 if (!full_table) {
807736f6 2691 spin_lock_bh(&bat_priv->tt.last_changeset_lock);
a73105b8 2692
7ea7b4a1
AQ
2693 tt_len = bat_priv->tt.last_changeset_len;
2694 tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv,
2695 &tvlv_tt_data,
2696 &tt_change,
2697 &tt_len);
2698 if (!tt_len)
a73105b8
AQ
2699 goto unlock;
2700
335fbe0f 2701 /* Copy the last orig_node's OGM buffer */
7ea7b4a1 2702 memcpy(tt_change, bat_priv->tt.last_changeset,
807736f6
SE
2703 bat_priv->tt.last_changeset_len);
2704 spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
a73105b8 2705 } else {
335fbe0f
ML
2706 req_ttvn = (uint8_t)atomic_read(&bat_priv->tt.vn);
2707
7ea7b4a1
AQ
2708 /* allocate the tvlv, put the tt_data and all the tt_vlan_data
2709 * in the initial part
2710 */
2711 tt_len = -1;
2712 tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv,
2713 &tvlv_tt_data,
2714 &tt_change,
2715 &tt_len);
2716 if (!tt_len)
a73105b8 2717 goto out;
7ea7b4a1
AQ
2718
2719 /* fill the rest of the tvlv with the real TT entries */
2720 batadv_tt_tvlv_generate(bat_priv, bat_priv->tt.local_hash,
2721 tt_change, tt_len,
2722 batadv_tt_local_valid, NULL);
a73105b8
AQ
2723 }
2724
335fbe0f
ML
2725 tvlv_tt_data->flags = BATADV_TT_RESPONSE;
2726 tvlv_tt_data->ttvn = req_ttvn;
a73105b8
AQ
2727
2728 if (full_table)
335fbe0f 2729 tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
a73105b8 2730
39c75a51 2731 batadv_dbg(BATADV_DBG_TT, bat_priv,
335fbe0f
ML
2732 "Sending TT_RESPONSE to %pM [%c] (ttvn: %u)\n",
2733 orig_node->orig, full_table ? 'F' : '.', req_ttvn);
a73105b8 2734
d69909d2 2735 batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_TX);
f8214865 2736
335fbe0f 2737 batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
7ea7b4a1
AQ
2738 req_src, BATADV_TVLV_TT, 1, tvlv_tt_data,
2739 tvlv_len);
335fbe0f 2740
a73105b8
AQ
2741 goto out;
2742
2743unlock:
807736f6 2744 spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
a73105b8 2745out:
a70a9aa9 2746 spin_unlock_bh(&bat_priv->tt.commit_lock);
a73105b8 2747 if (orig_node)
7d211efc 2748 batadv_orig_node_free_ref(orig_node);
a73105b8 2749 if (primary_if)
e5d89254 2750 batadv_hardif_free_ref(primary_if);
335fbe0f
ML
2751 kfree(tvlv_tt_data);
2752 /* The packet was for this host, so it doesn't need to be re-routed */
a73105b8
AQ
2753 return true;
2754}
2755
335fbe0f
ML
2756/**
2757 * batadv_send_tt_response - send reply to tt request
2758 * @bat_priv: the bat priv with all the soft interface information
2759 * @tt_data: tt data containing the tt request information
2760 * @req_src: mac address of tt request sender
2761 * @req_dst: mac address of tt request recipient
2762 *
2763 * Returns true if tt request reply was sent, false otherwise.
2764 */
2765static bool batadv_send_tt_response(struct batadv_priv *bat_priv,
2766 struct batadv_tvlv_tt_data *tt_data,
2767 uint8_t *req_src, uint8_t *req_dst)
a73105b8 2768{
cfd4f757 2769 if (batadv_is_my_mac(bat_priv, req_dst))
335fbe0f 2770 return batadv_send_my_tt_response(bat_priv, tt_data, req_src);
24820df1
AQ
2771 return batadv_send_other_tt_response(bat_priv, tt_data, req_src,
2772 req_dst);
a73105b8
AQ
2773}
2774
56303d34
SE
2775static void _batadv_tt_update_changes(struct batadv_priv *bat_priv,
2776 struct batadv_orig_node *orig_node,
335fbe0f 2777 struct batadv_tvlv_tt_change *tt_change,
a513088d 2778 uint16_t tt_num_changes, uint8_t ttvn)
a73105b8
AQ
2779{
2780 int i;
a513088d 2781 int roams;
a73105b8
AQ
2782
2783 for (i = 0; i < tt_num_changes; i++) {
acd34afa
SE
2784 if ((tt_change + i)->flags & BATADV_TT_CLIENT_DEL) {
2785 roams = (tt_change + i)->flags & BATADV_TT_CLIENT_ROAM;
a513088d
SE
2786 batadv_tt_global_del(bat_priv, orig_node,
2787 (tt_change + i)->addr,
c018ad3d 2788 ntohs((tt_change + i)->vid),
d4f44692
AQ
2789 "tt removed by changes",
2790 roams);
08c36d3e 2791 } else {
08c36d3e 2792 if (!batadv_tt_global_add(bat_priv, orig_node,
d4f44692 2793 (tt_change + i)->addr,
c018ad3d 2794 ntohs((tt_change + i)->vid),
d4f44692 2795 (tt_change + i)->flags, ttvn))
a73105b8
AQ
2796 /* In case of problem while storing a
2797 * global_entry, we stop the updating
2798 * procedure without committing the
2799 * ttvn change. This will avoid to send
2800 * corrupted data on tt_request
2801 */
2802 return;
08c36d3e 2803 }
a73105b8 2804 }
e17931d1 2805 orig_node->capa_initialized |= BATADV_ORIG_CAPA_HAS_TT;
a73105b8
AQ
2806}
2807
56303d34 2808static void batadv_tt_fill_gtable(struct batadv_priv *bat_priv,
7ea7b4a1
AQ
2809 struct batadv_tvlv_tt_change *tt_change,
2810 uint8_t ttvn, uint8_t *resp_src,
2811 uint16_t num_entries)
a73105b8 2812{
170173bf 2813 struct batadv_orig_node *orig_node;
a73105b8 2814
335fbe0f 2815 orig_node = batadv_orig_hash_find(bat_priv, resp_src);
a73105b8
AQ
2816 if (!orig_node)
2817 goto out;
2818
2819 /* Purge the old table first.. */
95fb130d
AQ
2820 batadv_tt_global_del_orig(bat_priv, orig_node, -1,
2821 "Received full table");
a73105b8 2822
7ea7b4a1
AQ
2823 _batadv_tt_update_changes(bat_priv, orig_node, tt_change, num_entries,
2824 ttvn);
a73105b8
AQ
2825
2826 spin_lock_bh(&orig_node->tt_buff_lock);
2827 kfree(orig_node->tt_buff);
2828 orig_node->tt_buff_len = 0;
2829 orig_node->tt_buff = NULL;
2830 spin_unlock_bh(&orig_node->tt_buff_lock);
2831
7ea7b4a1 2832 atomic_set(&orig_node->last_ttvn, ttvn);
a73105b8
AQ
2833
2834out:
2835 if (orig_node)
7d211efc 2836 batadv_orig_node_free_ref(orig_node);
a73105b8
AQ
2837}
2838
56303d34
SE
2839static void batadv_tt_update_changes(struct batadv_priv *bat_priv,
2840 struct batadv_orig_node *orig_node,
a513088d 2841 uint16_t tt_num_changes, uint8_t ttvn,
335fbe0f 2842 struct batadv_tvlv_tt_change *tt_change)
a73105b8 2843{
a513088d
SE
2844 _batadv_tt_update_changes(bat_priv, orig_node, tt_change,
2845 tt_num_changes, ttvn);
a73105b8 2846
e8cf234a
AQ
2847 batadv_tt_save_orig_buffer(bat_priv, orig_node, tt_change,
2848 batadv_tt_len(tt_num_changes));
a73105b8
AQ
2849 atomic_set(&orig_node->last_ttvn, ttvn);
2850}
2851
c018ad3d
AQ
2852/**
2853 * batadv_is_my_client - check if a client is served by the local node
2854 * @bat_priv: the bat priv with all the soft interface information
3f68785e 2855 * @addr: the mac address of the client to check
c018ad3d
AQ
2856 * @vid: VLAN identifier
2857 *
2858 * Returns true if the client is served by this node, false otherwise.
2859 */
2860bool batadv_is_my_client(struct batadv_priv *bat_priv, const uint8_t *addr,
2861 unsigned short vid)
a73105b8 2862{
170173bf 2863 struct batadv_tt_local_entry *tt_local_entry;
7683fdc1 2864 bool ret = false;
a73105b8 2865
c018ad3d 2866 tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
7683fdc1
AQ
2867 if (!tt_local_entry)
2868 goto out;
058d0e26 2869 /* Check if the client has been logically deleted (but is kept for
9cfc7bd6
SE
2870 * consistency purpose)
2871 */
7c1fd91d
AQ
2872 if ((tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING) ||
2873 (tt_local_entry->common.flags & BATADV_TT_CLIENT_ROAM))
058d0e26 2874 goto out;
7683fdc1
AQ
2875 ret = true;
2876out:
a73105b8 2877 if (tt_local_entry)
a513088d 2878 batadv_tt_local_entry_free_ref(tt_local_entry);
7683fdc1 2879 return ret;
a73105b8
AQ
2880}
2881
335fbe0f
ML
2882/**
2883 * batadv_handle_tt_response - process incoming tt reply
2884 * @bat_priv: the bat priv with all the soft interface information
2885 * @tt_data: tt data containing the tt request information
2886 * @resp_src: mac address of tt reply sender
2887 * @num_entries: number of tt change entries appended to the tt data
2888 */
2889static void batadv_handle_tt_response(struct batadv_priv *bat_priv,
2890 struct batadv_tvlv_tt_data *tt_data,
2891 uint8_t *resp_src, uint16_t num_entries)
a73105b8 2892{
56303d34
SE
2893 struct batadv_tt_req_node *node, *safe;
2894 struct batadv_orig_node *orig_node = NULL;
335fbe0f 2895 struct batadv_tvlv_tt_change *tt_change;
7ea7b4a1
AQ
2896 uint8_t *tvlv_ptr = (uint8_t *)tt_data;
2897 uint16_t change_offset;
a73105b8 2898
39c75a51 2899 batadv_dbg(BATADV_DBG_TT, bat_priv,
1eda58bf 2900 "Received TT_RESPONSE from %pM for ttvn %d t_size: %d [%c]\n",
335fbe0f
ML
2901 resp_src, tt_data->ttvn, num_entries,
2902 (tt_data->flags & BATADV_TT_FULL_TABLE ? 'F' : '.'));
a73105b8 2903
335fbe0f 2904 orig_node = batadv_orig_hash_find(bat_priv, resp_src);
a73105b8
AQ
2905 if (!orig_node)
2906 goto out;
2907
a70a9aa9
AQ
2908 spin_lock_bh(&orig_node->tt_lock);
2909
7ea7b4a1
AQ
2910 change_offset = sizeof(struct batadv_tvlv_tt_vlan_data);
2911 change_offset *= ntohs(tt_data->num_vlan);
2912 change_offset += sizeof(*tt_data);
2913 tvlv_ptr += change_offset;
2914
2915 tt_change = (struct batadv_tvlv_tt_change *)tvlv_ptr;
335fbe0f 2916 if (tt_data->flags & BATADV_TT_FULL_TABLE) {
7ea7b4a1
AQ
2917 batadv_tt_fill_gtable(bat_priv, tt_change, tt_data->ttvn,
2918 resp_src, num_entries);
96412690 2919 } else {
335fbe0f
ML
2920 batadv_tt_update_changes(bat_priv, orig_node, num_entries,
2921 tt_data->ttvn, tt_change);
96412690 2922 }
a73105b8 2923
a70a9aa9 2924 /* Recalculate the CRC for this orig_node and store it */
7ea7b4a1 2925 batadv_tt_global_update_crc(bat_priv, orig_node);
a70a9aa9
AQ
2926
2927 spin_unlock_bh(&orig_node->tt_lock);
2928
a73105b8 2929 /* Delete the tt_req_node from pending tt_requests list */
807736f6
SE
2930 spin_lock_bh(&bat_priv->tt.req_list_lock);
2931 list_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
335fbe0f 2932 if (!batadv_compare_eth(node->addr, resp_src))
a73105b8
AQ
2933 continue;
2934 list_del(&node->list);
2935 kfree(node);
2936 }
7ea7b4a1 2937
807736f6 2938 spin_unlock_bh(&bat_priv->tt.req_list_lock);
a73105b8
AQ
2939out:
2940 if (orig_node)
7d211efc 2941 batadv_orig_node_free_ref(orig_node);
a73105b8
AQ
2942}
2943
56303d34 2944static void batadv_tt_roam_list_free(struct batadv_priv *bat_priv)
a73105b8 2945{
56303d34 2946 struct batadv_tt_roam_node *node, *safe;
a73105b8 2947
807736f6 2948 spin_lock_bh(&bat_priv->tt.roam_list_lock);
a73105b8 2949
807736f6 2950 list_for_each_entry_safe(node, safe, &bat_priv->tt.roam_list, list) {
cc47f66e
AQ
2951 list_del(&node->list);
2952 kfree(node);
2953 }
2954
807736f6 2955 spin_unlock_bh(&bat_priv->tt.roam_list_lock);
cc47f66e
AQ
2956}
2957
56303d34 2958static void batadv_tt_roam_purge(struct batadv_priv *bat_priv)
cc47f66e 2959{
56303d34 2960 struct batadv_tt_roam_node *node, *safe;
cc47f66e 2961
807736f6
SE
2962 spin_lock_bh(&bat_priv->tt.roam_list_lock);
2963 list_for_each_entry_safe(node, safe, &bat_priv->tt.roam_list, list) {
42d0b044
SE
2964 if (!batadv_has_timed_out(node->first_time,
2965 BATADV_ROAMING_MAX_TIME))
cc47f66e
AQ
2966 continue;
2967
2968 list_del(&node->list);
2969 kfree(node);
2970 }
807736f6 2971 spin_unlock_bh(&bat_priv->tt.roam_list_lock);
cc47f66e
AQ
2972}
2973
2974/* This function checks whether the client already reached the
2975 * maximum number of possible roaming phases. In this case the ROAMING_ADV
2976 * will not be sent.
2977 *
9cfc7bd6
SE
2978 * returns true if the ROAMING_ADV can be sent, false otherwise
2979 */
56303d34 2980static bool batadv_tt_check_roam_count(struct batadv_priv *bat_priv,
a513088d 2981 uint8_t *client)
cc47f66e 2982{
56303d34 2983 struct batadv_tt_roam_node *tt_roam_node;
cc47f66e
AQ
2984 bool ret = false;
2985
807736f6 2986 spin_lock_bh(&bat_priv->tt.roam_list_lock);
cc47f66e 2987 /* The new tt_req will be issued only if I'm not waiting for a
9cfc7bd6
SE
2988 * reply from the same orig_node yet
2989 */
807736f6 2990 list_for_each_entry(tt_roam_node, &bat_priv->tt.roam_list, list) {
1eda58bf 2991 if (!batadv_compare_eth(tt_roam_node->addr, client))
cc47f66e
AQ
2992 continue;
2993
1eda58bf 2994 if (batadv_has_timed_out(tt_roam_node->first_time,
42d0b044 2995 BATADV_ROAMING_MAX_TIME))
cc47f66e
AQ
2996 continue;
2997
3e34819e 2998 if (!batadv_atomic_dec_not_zero(&tt_roam_node->counter))
cc47f66e
AQ
2999 /* Sorry, you roamed too many times! */
3000 goto unlock;
3001 ret = true;
3002 break;
3003 }
3004
3005 if (!ret) {
3006 tt_roam_node = kmalloc(sizeof(*tt_roam_node), GFP_ATOMIC);
3007 if (!tt_roam_node)
3008 goto unlock;
3009
3010 tt_roam_node->first_time = jiffies;
42d0b044
SE
3011 atomic_set(&tt_roam_node->counter,
3012 BATADV_ROAMING_MAX_COUNT - 1);
8fdd0153 3013 ether_addr_copy(tt_roam_node->addr, client);
cc47f66e 3014
807736f6 3015 list_add(&tt_roam_node->list, &bat_priv->tt.roam_list);
cc47f66e
AQ
3016 ret = true;
3017 }
3018
3019unlock:
807736f6 3020 spin_unlock_bh(&bat_priv->tt.roam_list_lock);
cc47f66e
AQ
3021 return ret;
3022}
3023
c018ad3d
AQ
3024/**
3025 * batadv_send_roam_adv - send a roaming advertisement message
3026 * @bat_priv: the bat priv with all the soft interface information
3027 * @client: mac address of the roaming client
3028 * @vid: VLAN identifier
3029 * @orig_node: message destination
3030 *
3031 * Send a ROAMING_ADV message to the node which was previously serving this
3032 * client. This is done to inform the node that from now on all traffic destined
3033 * for this particular roamed client has to be forwarded to the sender of the
3034 * roaming message.
3035 */
56303d34 3036static void batadv_send_roam_adv(struct batadv_priv *bat_priv, uint8_t *client,
c018ad3d 3037 unsigned short vid,
56303d34 3038 struct batadv_orig_node *orig_node)
cc47f66e 3039{
56303d34 3040 struct batadv_hard_iface *primary_if;
122edaa0
ML
3041 struct batadv_tvlv_roam_adv tvlv_roam;
3042
3043 primary_if = batadv_primary_if_get_selected(bat_priv);
3044 if (!primary_if)
3045 goto out;
cc47f66e
AQ
3046
3047 /* before going on we have to check whether the client has
9cfc7bd6
SE
3048 * already roamed to us too many times
3049 */
a513088d 3050 if (!batadv_tt_check_roam_count(bat_priv, client))
cc47f66e
AQ
3051 goto out;
3052
39c75a51 3053 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789
AQ
3054 "Sending ROAMING_ADV to %pM (client %pM, vid: %d)\n",
3055 orig_node->orig, client, BATADV_PRINT_VID(vid));
cc47f66e 3056
d69909d2 3057 batadv_inc_counter(bat_priv, BATADV_CNT_TT_ROAM_ADV_TX);
f8214865 3058
122edaa0 3059 memcpy(tvlv_roam.client, client, sizeof(tvlv_roam.client));
c018ad3d 3060 tvlv_roam.vid = htons(vid);
122edaa0
ML
3061
3062 batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
3063 orig_node->orig, BATADV_TVLV_ROAM, 1,
3064 &tvlv_roam, sizeof(tvlv_roam));
cc47f66e
AQ
3065
3066out:
122edaa0
ML
3067 if (primary_if)
3068 batadv_hardif_free_ref(primary_if);
a73105b8
AQ
3069}
3070
a513088d 3071static void batadv_tt_purge(struct work_struct *work)
a73105b8 3072{
56303d34 3073 struct delayed_work *delayed_work;
807736f6 3074 struct batadv_priv_tt *priv_tt;
56303d34
SE
3075 struct batadv_priv *bat_priv;
3076
3077 delayed_work = container_of(work, struct delayed_work, work);
807736f6
SE
3078 priv_tt = container_of(delayed_work, struct batadv_priv_tt, work);
3079 bat_priv = container_of(priv_tt, struct batadv_priv, tt);
a73105b8 3080
a19d3d85 3081 batadv_tt_local_purge(bat_priv, BATADV_TT_LOCAL_TIMEOUT);
30cfd02b 3082 batadv_tt_global_purge(bat_priv);
a513088d
SE
3083 batadv_tt_req_purge(bat_priv);
3084 batadv_tt_roam_purge(bat_priv);
a73105b8 3085
72414442
AQ
3086 queue_delayed_work(batadv_event_workqueue, &bat_priv->tt.work,
3087 msecs_to_jiffies(BATADV_TT_WORK_PERIOD));
a73105b8 3088}
cc47f66e 3089
56303d34 3090void batadv_tt_free(struct batadv_priv *bat_priv)
cc47f66e 3091{
e1bf0c14
ML
3092 batadv_tvlv_container_unregister(bat_priv, BATADV_TVLV_TT, 1);
3093 batadv_tvlv_handler_unregister(bat_priv, BATADV_TVLV_TT, 1);
3094
807736f6 3095 cancel_delayed_work_sync(&bat_priv->tt.work);
cc47f66e 3096
a513088d
SE
3097 batadv_tt_local_table_free(bat_priv);
3098 batadv_tt_global_table_free(bat_priv);
3099 batadv_tt_req_list_free(bat_priv);
3100 batadv_tt_changes_list_free(bat_priv);
3101 batadv_tt_roam_list_free(bat_priv);
cc47f66e 3102
807736f6 3103 kfree(bat_priv->tt.last_changeset);
cc47f66e 3104}
058d0e26 3105
7ea7b4a1
AQ
3106/**
3107 * batadv_tt_local_set_flags - set or unset the specified flags on the local
3108 * table and possibly count them in the TT size
3109 * @bat_priv: the bat priv with all the soft interface information
3110 * @flags: the flag to switch
3111 * @enable: whether to set or unset the flag
3112 * @count: whether to increase the TT size by the number of changed entries
9cfc7bd6 3113 */
7ea7b4a1
AQ
3114static void batadv_tt_local_set_flags(struct batadv_priv *bat_priv,
3115 uint16_t flags, bool enable, bool count)
058d0e26 3116{
7ea7b4a1
AQ
3117 struct batadv_hashtable *hash = bat_priv->tt.local_hash;
3118 struct batadv_tt_common_entry *tt_common_entry;
697f2531 3119 uint16_t changed_num = 0;
058d0e26 3120 struct hlist_head *head;
7ea7b4a1 3121 uint32_t i;
058d0e26
AQ
3122
3123 if (!hash)
7ea7b4a1 3124 return;
058d0e26
AQ
3125
3126 for (i = 0; i < hash->size; i++) {
3127 head = &hash->table[i];
3128
3129 rcu_read_lock();
b67bfe0d 3130 hlist_for_each_entry_rcu(tt_common_entry,
058d0e26 3131 head, hash_entry) {
697f2531
AQ
3132 if (enable) {
3133 if ((tt_common_entry->flags & flags) == flags)
3134 continue;
3135 tt_common_entry->flags |= flags;
3136 } else {
3137 if (!(tt_common_entry->flags & flags))
3138 continue;
3139 tt_common_entry->flags &= ~flags;
3140 }
3141 changed_num++;
7ea7b4a1
AQ
3142
3143 if (!count)
3144 continue;
3145
3146 batadv_tt_local_size_inc(bat_priv,
3147 tt_common_entry->vid);
058d0e26
AQ
3148 }
3149 rcu_read_unlock();
3150 }
058d0e26
AQ
3151}
3152
acd34afa 3153/* Purge out all the tt local entries marked with BATADV_TT_CLIENT_PENDING */
56303d34 3154static void batadv_tt_local_purge_pending_clients(struct batadv_priv *bat_priv)
058d0e26 3155{
807736f6 3156 struct batadv_hashtable *hash = bat_priv->tt.local_hash;
56303d34
SE
3157 struct batadv_tt_common_entry *tt_common;
3158 struct batadv_tt_local_entry *tt_local;
35df3b29 3159 struct batadv_softif_vlan *vlan;
b67bfe0d 3160 struct hlist_node *node_tmp;
058d0e26
AQ
3161 struct hlist_head *head;
3162 spinlock_t *list_lock; /* protects write access to the hash lists */
c90681b8 3163 uint32_t i;
058d0e26
AQ
3164
3165 if (!hash)
3166 return;
3167
3168 for (i = 0; i < hash->size; i++) {
3169 head = &hash->table[i];
3170 list_lock = &hash->list_locks[i];
3171
3172 spin_lock_bh(list_lock);
b67bfe0d 3173 hlist_for_each_entry_safe(tt_common, node_tmp, head,
acd34afa
SE
3174 hash_entry) {
3175 if (!(tt_common->flags & BATADV_TT_CLIENT_PENDING))
058d0e26
AQ
3176 continue;
3177
39c75a51 3178 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789
AQ
3179 "Deleting local tt entry (%pM, vid: %d): pending\n",
3180 tt_common->addr,
3181 BATADV_PRINT_VID(tt_common->vid));
058d0e26 3182
7ea7b4a1 3183 batadv_tt_local_size_dec(bat_priv, tt_common->vid);
b67bfe0d 3184 hlist_del_rcu(&tt_common->hash_entry);
56303d34
SE
3185 tt_local = container_of(tt_common,
3186 struct batadv_tt_local_entry,
3187 common);
35df3b29
AQ
3188
3189 /* decrease the reference held for this vlan */
3190 vlan = batadv_softif_vlan_get(bat_priv, tt_common->vid);
3191 batadv_softif_vlan_free_ref(vlan);
3192 batadv_softif_vlan_free_ref(vlan);
3193
56303d34 3194 batadv_tt_local_entry_free_ref(tt_local);
058d0e26
AQ
3195 }
3196 spin_unlock_bh(list_lock);
3197 }
058d0e26
AQ
3198}
3199
e1bf0c14 3200/**
a19d3d85
ML
3201 * batadv_tt_local_commit_changes_nolock - commit all pending local tt changes
3202 * which have been queued in the time since the last commit
e1bf0c14 3203 * @bat_priv: the bat priv with all the soft interface information
a19d3d85
ML
3204 *
3205 * Caller must hold tt->commit_lock.
e1bf0c14 3206 */
a19d3d85 3207static void batadv_tt_local_commit_changes_nolock(struct batadv_priv *bat_priv)
058d0e26 3208{
c5caf4ef
LL
3209 /* Update multicast addresses in local translation table */
3210 batadv_mcast_mla_update(bat_priv);
3211
e1bf0c14
ML
3212 if (atomic_read(&bat_priv->tt.local_changes) < 1) {
3213 if (!batadv_atomic_dec_not_zero(&bat_priv->tt.ogm_append_cnt))
3214 batadv_tt_tvlv_container_update(bat_priv);
a19d3d85 3215 return;
e1bf0c14 3216 }
be9aa4c1 3217
7ea7b4a1 3218 batadv_tt_local_set_flags(bat_priv, BATADV_TT_CLIENT_NEW, false, true);
be9aa4c1 3219
a513088d 3220 batadv_tt_local_purge_pending_clients(bat_priv);
7ea7b4a1 3221 batadv_tt_local_update_crc(bat_priv);
058d0e26
AQ
3222
3223 /* Increment the TTVN only once per OGM interval */
807736f6 3224 atomic_inc(&bat_priv->tt.vn);
39c75a51 3225 batadv_dbg(BATADV_DBG_TT, bat_priv,
1eda58bf 3226 "Local changes committed, updating to ttvn %u\n",
807736f6 3227 (uint8_t)atomic_read(&bat_priv->tt.vn));
be9aa4c1
ML
3228
3229 /* reset the sending counter */
807736f6 3230 atomic_set(&bat_priv->tt.ogm_append_cnt, BATADV_TT_OGM_APPEND_MAX);
e1bf0c14 3231 batadv_tt_tvlv_container_update(bat_priv);
a19d3d85 3232}
a70a9aa9 3233
a19d3d85
ML
3234/**
3235 * batadv_tt_local_commit_changes - commit all pending local tt changes which
3236 * have been queued in the time since the last commit
3237 * @bat_priv: the bat priv with all the soft interface information
3238 */
3239void batadv_tt_local_commit_changes(struct batadv_priv *bat_priv)
3240{
3241 spin_lock_bh(&bat_priv->tt.commit_lock);
3242 batadv_tt_local_commit_changes_nolock(bat_priv);
a70a9aa9 3243 spin_unlock_bh(&bat_priv->tt.commit_lock);
058d0e26 3244}
59b699cd 3245
56303d34 3246bool batadv_is_ap_isolated(struct batadv_priv *bat_priv, uint8_t *src,
b8cbd81d 3247 uint8_t *dst, unsigned short vid)
59b699cd 3248{
56303d34
SE
3249 struct batadv_tt_local_entry *tt_local_entry = NULL;
3250 struct batadv_tt_global_entry *tt_global_entry = NULL;
b8cbd81d 3251 struct batadv_softif_vlan *vlan;
5870adc6 3252 bool ret = false;
59b699cd 3253
b8cbd81d
AQ
3254 vlan = batadv_softif_vlan_get(bat_priv, vid);
3255 if (!vlan || !atomic_read(&vlan->ap_isolation))
5870adc6 3256 goto out;
59b699cd 3257
b8cbd81d 3258 tt_local_entry = batadv_tt_local_hash_find(bat_priv, dst, vid);
59b699cd
AQ
3259 if (!tt_local_entry)
3260 goto out;
3261
b8cbd81d 3262 tt_global_entry = batadv_tt_global_hash_find(bat_priv, src, vid);
59b699cd
AQ
3263 if (!tt_global_entry)
3264 goto out;
3265
1f129fef 3266 if (!_batadv_is_ap_isolated(tt_local_entry, tt_global_entry))
59b699cd
AQ
3267 goto out;
3268
5870adc6 3269 ret = true;
59b699cd
AQ
3270
3271out:
b8cbd81d
AQ
3272 if (vlan)
3273 batadv_softif_vlan_free_ref(vlan);
59b699cd 3274 if (tt_global_entry)
a513088d 3275 batadv_tt_global_entry_free_ref(tt_global_entry);
59b699cd 3276 if (tt_local_entry)
a513088d 3277 batadv_tt_local_entry_free_ref(tt_local_entry);
59b699cd
AQ
3278 return ret;
3279}
a943cac1 3280
e1bf0c14
ML
3281/**
3282 * batadv_tt_update_orig - update global translation table with new tt
3283 * information received via ogms
3284 * @bat_priv: the bat priv with all the soft interface information
3285 * @orig: the orig_node of the ogm
7ea7b4a1
AQ
3286 * @tt_vlan: pointer to the first tvlv VLAN entry
3287 * @tt_num_vlan: number of tvlv VLAN entries
3288 * @tt_change: pointer to the first entry in the TT buffer
e1bf0c14
ML
3289 * @tt_num_changes: number of tt changes inside the tt buffer
3290 * @ttvn: translation table version number of this changeset
ced72933 3291 * @tt_crc: crc32 checksum of orig node's translation table
e1bf0c14
ML
3292 */
3293static void batadv_tt_update_orig(struct batadv_priv *bat_priv,
3294 struct batadv_orig_node *orig_node,
7ea7b4a1
AQ
3295 const void *tt_buff, uint16_t tt_num_vlan,
3296 struct batadv_tvlv_tt_change *tt_change,
3297 uint16_t tt_num_changes, uint8_t ttvn)
a943cac1
ML
3298{
3299 uint8_t orig_ttvn = (uint8_t)atomic_read(&orig_node->last_ttvn);
7ea7b4a1 3300 struct batadv_tvlv_tt_vlan_data *tt_vlan;
a943cac1 3301 bool full_table = true;
e17931d1 3302 bool has_tt_init;
a943cac1 3303
7ea7b4a1 3304 tt_vlan = (struct batadv_tvlv_tt_vlan_data *)tt_buff;
e17931d1
LL
3305 has_tt_init = orig_node->capa_initialized & BATADV_ORIG_CAPA_HAS_TT;
3306
17071578 3307 /* orig table not initialised AND first diff is in the OGM OR the ttvn
9cfc7bd6
SE
3308 * increased by one -> we can apply the attached changes
3309 */
e17931d1 3310 if ((!has_tt_init && ttvn == 1) || ttvn - orig_ttvn == 1) {
a943cac1 3311 /* the OGM could not contain the changes due to their size or
42d0b044
SE
3312 * because they have already been sent BATADV_TT_OGM_APPEND_MAX
3313 * times.
9cfc7bd6
SE
3314 * In this case send a tt request
3315 */
a943cac1
ML
3316 if (!tt_num_changes) {
3317 full_table = false;
3318 goto request_table;
3319 }
3320
a70a9aa9
AQ
3321 spin_lock_bh(&orig_node->tt_lock);
3322
a513088d 3323 batadv_tt_update_changes(bat_priv, orig_node, tt_num_changes,
96412690 3324 ttvn, tt_change);
a943cac1
ML
3325
3326 /* Even if we received the precomputed crc with the OGM, we
3327 * prefer to recompute it to spot any possible inconsistency
9cfc7bd6
SE
3328 * in the global table
3329 */
7ea7b4a1 3330 batadv_tt_global_update_crc(bat_priv, orig_node);
a943cac1 3331
a70a9aa9
AQ
3332 spin_unlock_bh(&orig_node->tt_lock);
3333
a943cac1
ML
3334 /* The ttvn alone is not enough to guarantee consistency
3335 * because a single value could represent different states
3336 * (due to the wrap around). Thus a node has to check whether
3337 * the resulting table (after applying the changes) is still
3338 * consistent or not. E.g. a node could disconnect while its
3339 * ttvn is X and reconnect on ttvn = X + TTVN_MAX: in this case
3340 * checking the CRC value is mandatory to detect the
9cfc7bd6
SE
3341 * inconsistency
3342 */
7ea7b4a1
AQ
3343 if (!batadv_tt_global_check_crc(orig_node, tt_vlan,
3344 tt_num_vlan))
a943cac1 3345 goto request_table;
a943cac1
ML
3346 } else {
3347 /* if we missed more than one change or our tables are not
9cfc7bd6
SE
3348 * in sync anymore -> request fresh tt data
3349 */
e17931d1 3350 if (!has_tt_init || ttvn != orig_ttvn ||
7ea7b4a1
AQ
3351 !batadv_tt_global_check_crc(orig_node, tt_vlan,
3352 tt_num_vlan)) {
a943cac1 3353request_table:
39c75a51 3354 batadv_dbg(BATADV_DBG_TT, bat_priv,
7ea7b4a1
AQ
3355 "TT inconsistency for %pM. Need to retrieve the correct information (ttvn: %u last_ttvn: %u num_changes: %u)\n",
3356 orig_node->orig, ttvn, orig_ttvn,
3357 tt_num_changes);
a513088d 3358 batadv_send_tt_request(bat_priv, orig_node, ttvn,
7ea7b4a1
AQ
3359 tt_vlan, tt_num_vlan,
3360 full_table);
a943cac1
ML
3361 return;
3362 }
3363 }
3364}
3275e7cc 3365
c018ad3d
AQ
3366/**
3367 * batadv_tt_global_client_is_roaming - check if a client is marked as roaming
3368 * @bat_priv: the bat priv with all the soft interface information
3369 * @addr: the mac address of the client to check
3370 * @vid: VLAN identifier
3371 *
3372 * Returns true if we know that the client has moved from its old originator
3373 * to another one. This entry is still kept for consistency purposes and will be
3374 * deleted later by a DEL or because of timeout
3275e7cc 3375 */
56303d34 3376bool batadv_tt_global_client_is_roaming(struct batadv_priv *bat_priv,
c018ad3d 3377 uint8_t *addr, unsigned short vid)
3275e7cc 3378{
56303d34 3379 struct batadv_tt_global_entry *tt_global_entry;
3275e7cc
AQ
3380 bool ret = false;
3381
c018ad3d 3382 tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
3275e7cc
AQ
3383 if (!tt_global_entry)
3384 goto out;
3385
c1d07431 3386 ret = tt_global_entry->common.flags & BATADV_TT_CLIENT_ROAM;
a513088d 3387 batadv_tt_global_entry_free_ref(tt_global_entry);
3275e7cc
AQ
3388out:
3389 return ret;
3390}
30cfd02b 3391
7c1fd91d
AQ
3392/**
3393 * batadv_tt_local_client_is_roaming - tells whether the client is roaming
3394 * @bat_priv: the bat priv with all the soft interface information
c018ad3d
AQ
3395 * @addr: the mac address of the local client to query
3396 * @vid: VLAN identifier
7c1fd91d
AQ
3397 *
3398 * Returns true if the local client is known to be roaming (it is not served by
3399 * this node anymore) or not. If yes, the client is still present in the table
3400 * to keep the latter consistent with the node TTVN
3401 */
3402bool batadv_tt_local_client_is_roaming(struct batadv_priv *bat_priv,
c018ad3d 3403 uint8_t *addr, unsigned short vid)
7c1fd91d
AQ
3404{
3405 struct batadv_tt_local_entry *tt_local_entry;
3406 bool ret = false;
3407
c018ad3d 3408 tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
7c1fd91d
AQ
3409 if (!tt_local_entry)
3410 goto out;
3411
3412 ret = tt_local_entry->common.flags & BATADV_TT_CLIENT_ROAM;
3413 batadv_tt_local_entry_free_ref(tt_local_entry);
3414out:
3415 return ret;
7c1fd91d
AQ
3416}
3417
30cfd02b
AQ
3418bool batadv_tt_add_temporary_global_entry(struct batadv_priv *bat_priv,
3419 struct batadv_orig_node *orig_node,
c018ad3d 3420 const unsigned char *addr,
16052789 3421 unsigned short vid)
30cfd02b
AQ
3422{
3423 bool ret = false;
3424
16052789 3425 if (!batadv_tt_global_add(bat_priv, orig_node, addr, vid,
30cfd02b
AQ
3426 BATADV_TT_CLIENT_TEMP,
3427 atomic_read(&orig_node->last_ttvn)))
3428 goto out;
3429
3430 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789
AQ
3431 "Added temporary global client (addr: %pM, vid: %d, orig: %pM)\n",
3432 addr, BATADV_PRINT_VID(vid), orig_node->orig);
30cfd02b
AQ
3433 ret = true;
3434out:
3435 return ret;
3436}
e1bf0c14 3437
a19d3d85
ML
3438/**
3439 * batadv_tt_local_resize_to_mtu - resize the local translation table fit the
3440 * maximum packet size that can be transported through the mesh
3441 * @soft_iface: netdev struct of the mesh interface
3442 *
3443 * Remove entries older than 'timeout' and half timeout if more entries need
3444 * to be removed.
3445 */
3446void batadv_tt_local_resize_to_mtu(struct net_device *soft_iface)
3447{
3448 struct batadv_priv *bat_priv = netdev_priv(soft_iface);
3449 int packet_size_max = atomic_read(&bat_priv->packet_size_max);
3450 int table_size, timeout = BATADV_TT_LOCAL_TIMEOUT / 2;
3451 bool reduced = false;
3452
3453 spin_lock_bh(&bat_priv->tt.commit_lock);
3454
3455 while (true) {
3456 table_size = batadv_tt_local_table_transmit_size(bat_priv);
3457 if (packet_size_max >= table_size)
3458 break;
3459
3460 batadv_tt_local_purge(bat_priv, timeout);
3461 batadv_tt_local_purge_pending_clients(bat_priv);
3462
3463 timeout /= 2;
3464 reduced = true;
3465 net_ratelimited_function(batadv_info, soft_iface,
3466 "Forced to purge local tt entries to fit new maximum fragment MTU (%i)\n",
3467 packet_size_max);
3468 }
3469
3470 /* commit these changes immediately, to avoid synchronization problem
3471 * with the TTVN
3472 */
3473 if (reduced)
3474 batadv_tt_local_commit_changes_nolock(bat_priv);
3475
3476 spin_unlock_bh(&bat_priv->tt.commit_lock);
3477}
3478
e1bf0c14
ML
3479/**
3480 * batadv_tt_tvlv_ogm_handler_v1 - process incoming tt tvlv container
3481 * @bat_priv: the bat priv with all the soft interface information
3482 * @orig: the orig_node of the ogm
3483 * @flags: flags indicating the tvlv state (see batadv_tvlv_handler_flags)
3484 * @tvlv_value: tvlv buffer containing the gateway data
3485 * @tvlv_value_len: tvlv buffer length
3486 */
3487static void batadv_tt_tvlv_ogm_handler_v1(struct batadv_priv *bat_priv,
3488 struct batadv_orig_node *orig,
7ea7b4a1 3489 uint8_t flags, void *tvlv_value,
e1bf0c14
ML
3490 uint16_t tvlv_value_len)
3491{
7ea7b4a1
AQ
3492 struct batadv_tvlv_tt_vlan_data *tt_vlan;
3493 struct batadv_tvlv_tt_change *tt_change;
e1bf0c14 3494 struct batadv_tvlv_tt_data *tt_data;
7ea7b4a1 3495 uint16_t num_entries, num_vlan;
e1bf0c14
ML
3496
3497 if (tvlv_value_len < sizeof(*tt_data))
3498 return;
3499
3500 tt_data = (struct batadv_tvlv_tt_data *)tvlv_value;
3501 tvlv_value_len -= sizeof(*tt_data);
3502
7ea7b4a1
AQ
3503 num_vlan = ntohs(tt_data->num_vlan);
3504
3505 if (tvlv_value_len < sizeof(*tt_vlan) * num_vlan)
3506 return;
3507
3508 tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(tt_data + 1);
3509 tt_change = (struct batadv_tvlv_tt_change *)(tt_vlan + num_vlan);
3510 tvlv_value_len -= sizeof(*tt_vlan) * num_vlan;
3511
298e6e68 3512 num_entries = batadv_tt_entries(tvlv_value_len);
e1bf0c14 3513
7ea7b4a1
AQ
3514 batadv_tt_update_orig(bat_priv, orig, tt_vlan, num_vlan, tt_change,
3515 num_entries, tt_data->ttvn);
e1bf0c14
ML
3516}
3517
335fbe0f
ML
3518/**
3519 * batadv_tt_tvlv_unicast_handler_v1 - process incoming (unicast) tt tvlv
3520 * container
3521 * @bat_priv: the bat priv with all the soft interface information
3522 * @src: mac address of tt tvlv sender
3523 * @dst: mac address of tt tvlv recipient
3524 * @tvlv_value: tvlv buffer containing the tt data
3525 * @tvlv_value_len: tvlv buffer length
3526 *
3527 * Returns NET_RX_DROP if the tt tvlv is to be re-routed, NET_RX_SUCCESS
3528 * otherwise.
3529 */
3530static int batadv_tt_tvlv_unicast_handler_v1(struct batadv_priv *bat_priv,
3531 uint8_t *src, uint8_t *dst,
3532 void *tvlv_value,
3533 uint16_t tvlv_value_len)
3534{
3535 struct batadv_tvlv_tt_data *tt_data;
7ea7b4a1 3536 uint16_t tt_vlan_len, tt_num_entries;
335fbe0f
ML
3537 char tt_flag;
3538 bool ret;
3539
3540 if (tvlv_value_len < sizeof(*tt_data))
3541 return NET_RX_SUCCESS;
3542
3543 tt_data = (struct batadv_tvlv_tt_data *)tvlv_value;
3544 tvlv_value_len -= sizeof(*tt_data);
3545
7ea7b4a1
AQ
3546 tt_vlan_len = sizeof(struct batadv_tvlv_tt_vlan_data);
3547 tt_vlan_len *= ntohs(tt_data->num_vlan);
3548
3549 if (tvlv_value_len < tt_vlan_len)
3550 return NET_RX_SUCCESS;
3551
3552 tvlv_value_len -= tt_vlan_len;
3553 tt_num_entries = batadv_tt_entries(tvlv_value_len);
335fbe0f
ML
3554
3555 switch (tt_data->flags & BATADV_TT_DATA_TYPE_MASK) {
3556 case BATADV_TT_REQUEST:
3557 batadv_inc_counter(bat_priv, BATADV_CNT_TT_REQUEST_RX);
3558
3559 /* If this node cannot provide a TT response the tt_request is
3560 * forwarded
3561 */
3562 ret = batadv_send_tt_response(bat_priv, tt_data, src, dst);
3563 if (!ret) {
3564 if (tt_data->flags & BATADV_TT_FULL_TABLE)
3565 tt_flag = 'F';
3566 else
3567 tt_flag = '.';
3568
3569 batadv_dbg(BATADV_DBG_TT, bat_priv,
3570 "Routing TT_REQUEST to %pM [%c]\n",
3571 dst, tt_flag);
3572 /* tvlv API will re-route the packet */
3573 return NET_RX_DROP;
3574 }
3575 break;
3576 case BATADV_TT_RESPONSE:
3577 batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_RX);
3578
3579 if (batadv_is_my_mac(bat_priv, dst)) {
3580 batadv_handle_tt_response(bat_priv, tt_data,
7ea7b4a1 3581 src, tt_num_entries);
335fbe0f
ML
3582 return NET_RX_SUCCESS;
3583 }
3584
3585 if (tt_data->flags & BATADV_TT_FULL_TABLE)
3586 tt_flag = 'F';
3587 else
3588 tt_flag = '.';
3589
3590 batadv_dbg(BATADV_DBG_TT, bat_priv,
3591 "Routing TT_RESPONSE to %pM [%c]\n", dst, tt_flag);
3592
3593 /* tvlv API will re-route the packet */
3594 return NET_RX_DROP;
3595 }
3596
3597 return NET_RX_SUCCESS;
3598}
3599
122edaa0
ML
3600/**
3601 * batadv_roam_tvlv_unicast_handler_v1 - process incoming tt roam tvlv container
3602 * @bat_priv: the bat priv with all the soft interface information
3603 * @src: mac address of tt tvlv sender
3604 * @dst: mac address of tt tvlv recipient
3605 * @tvlv_value: tvlv buffer containing the tt data
3606 * @tvlv_value_len: tvlv buffer length
3607 *
3608 * Returns NET_RX_DROP if the tt roam tvlv is to be re-routed, NET_RX_SUCCESS
3609 * otherwise.
3610 */
3611static int batadv_roam_tvlv_unicast_handler_v1(struct batadv_priv *bat_priv,
3612 uint8_t *src, uint8_t *dst,
3613 void *tvlv_value,
3614 uint16_t tvlv_value_len)
3615{
3616 struct batadv_tvlv_roam_adv *roaming_adv;
3617 struct batadv_orig_node *orig_node = NULL;
3618
3619 /* If this node is not the intended recipient of the
3620 * roaming advertisement the packet is forwarded
3621 * (the tvlv API will re-route the packet).
3622 */
3623 if (!batadv_is_my_mac(bat_priv, dst))
3624 return NET_RX_DROP;
3625
122edaa0
ML
3626 if (tvlv_value_len < sizeof(*roaming_adv))
3627 goto out;
3628
3629 orig_node = batadv_orig_hash_find(bat_priv, src);
3630 if (!orig_node)
3631 goto out;
3632
3633 batadv_inc_counter(bat_priv, BATADV_CNT_TT_ROAM_ADV_RX);
3634 roaming_adv = (struct batadv_tvlv_roam_adv *)tvlv_value;
3635
3636 batadv_dbg(BATADV_DBG_TT, bat_priv,
3637 "Received ROAMING_ADV from %pM (client %pM)\n",
3638 src, roaming_adv->client);
3639
3640 batadv_tt_global_add(bat_priv, orig_node, roaming_adv->client,
c018ad3d 3641 ntohs(roaming_adv->vid), BATADV_TT_CLIENT_ROAM,
122edaa0
ML
3642 atomic_read(&orig_node->last_ttvn) + 1);
3643
3644out:
3645 if (orig_node)
3646 batadv_orig_node_free_ref(orig_node);
3647 return NET_RX_SUCCESS;
3648}
3649
e1bf0c14
ML
3650/**
3651 * batadv_tt_init - initialise the translation table internals
3652 * @bat_priv: the bat priv with all the soft interface information
3653 *
3654 * Return 0 on success or negative error number in case of failure.
3655 */
3656int batadv_tt_init(struct batadv_priv *bat_priv)
3657{
3658 int ret;
3659
0eb01568
AQ
3660 /* synchronized flags must be remote */
3661 BUILD_BUG_ON(!(BATADV_TT_SYNC_MASK & BATADV_TT_REMOTE_MASK));
3662
e1bf0c14
ML
3663 ret = batadv_tt_local_init(bat_priv);
3664 if (ret < 0)
3665 return ret;
3666
3667 ret = batadv_tt_global_init(bat_priv);
3668 if (ret < 0)
3669 return ret;
3670
3671 batadv_tvlv_handler_register(bat_priv, batadv_tt_tvlv_ogm_handler_v1,
335fbe0f
ML
3672 batadv_tt_tvlv_unicast_handler_v1,
3673 BATADV_TVLV_TT, 1, BATADV_NO_FLAGS);
e1bf0c14 3674
122edaa0
ML
3675 batadv_tvlv_handler_register(bat_priv, NULL,
3676 batadv_roam_tvlv_unicast_handler_v1,
3677 BATADV_TVLV_ROAM, 1, BATADV_NO_FLAGS);
3678
e1bf0c14
ML
3679 INIT_DELAYED_WORK(&bat_priv->tt.work, batadv_tt_purge);
3680 queue_delayed_work(batadv_event_workqueue, &bat_priv->tt.work,
3681 msecs_to_jiffies(BATADV_TT_WORK_PERIOD));
3682
3683 return 1;
3684}
42cb0bef
AQ
3685
3686/**
3687 * batadv_tt_global_is_isolated - check if a client is marked as isolated
3688 * @bat_priv: the bat priv with all the soft interface information
3689 * @addr: the mac address of the client
3690 * @vid: the identifier of the VLAN where this client is connected
3691 *
3692 * Returns true if the client is marked with the TT_CLIENT_ISOLA flag, false
3693 * otherwise
3694 */
3695bool batadv_tt_global_is_isolated(struct batadv_priv *bat_priv,
3696 const uint8_t *addr, unsigned short vid)
3697{
3698 struct batadv_tt_global_entry *tt;
3699 bool ret;
3700
3701 tt = batadv_tt_global_hash_find(bat_priv, addr, vid);
3702 if (!tt)
3703 return false;
3704
3705 ret = tt->common.flags & BATADV_TT_CLIENT_ISOLA;
3706
3707 batadv_tt_global_entry_free_ref(tt);
3708
3709 return ret;
3710}