batman-adv: add build checks for packet sizes
[deliverable/linux.git] / net / batman-adv / translation-table.c
CommitLineData
0b873931 1/* Copyright (C) 2007-2013 B.A.T.M.A.N. contributors:
c6c8fea2 2 *
35c133a0 3 * Marek Lindner, Simon Wunderlich, Antonio Quartulli
c6c8fea2
SE
4 *
5 * This program is free software; you can redistribute it and/or
6 * modify it under the terms of version 2 of the GNU General Public
7 * License as published by the Free Software Foundation.
8 *
9 * This program is distributed in the hope that it will be useful, but
10 * WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
12 * General Public License for more details.
13 *
14 * You should have received a copy of the GNU General Public License
ebf38fb7 15 * along with this program; if not, see <http://www.gnu.org/licenses/>.
c6c8fea2
SE
16 */
17
18#include "main.h"
19#include "translation-table.h"
20#include "soft-interface.h"
32ae9b22 21#include "hard-interface.h"
a73105b8 22#include "send.h"
c6c8fea2
SE
23#include "hash.h"
24#include "originator.h"
a73105b8 25#include "routing.h"
20ff9d59 26#include "bridge_loop_avoidance.h"
c6c8fea2 27
ced72933 28#include <linux/crc32c.h>
a73105b8 29
dec05074
AQ
30/* hash class keys */
31static struct lock_class_key batadv_tt_local_hash_lock_class_key;
32static struct lock_class_key batadv_tt_global_hash_lock_class_key;
33
56303d34 34static void batadv_send_roam_adv(struct batadv_priv *bat_priv, uint8_t *client,
c018ad3d 35 unsigned short vid,
56303d34 36 struct batadv_orig_node *orig_node);
a513088d
SE
37static void batadv_tt_purge(struct work_struct *work);
38static void
56303d34 39batadv_tt_global_del_orig_list(struct batadv_tt_global_entry *tt_global_entry);
30cfd02b
AQ
40static void batadv_tt_global_del(struct batadv_priv *bat_priv,
41 struct batadv_orig_node *orig_node,
42 const unsigned char *addr,
c018ad3d
AQ
43 unsigned short vid, const char *message,
44 bool roaming);
c6c8fea2 45
7aadf889 46/* returns 1 if they are the same mac addr */
a513088d 47static int batadv_compare_tt(const struct hlist_node *node, const void *data2)
7aadf889 48{
56303d34 49 const void *data1 = container_of(node, struct batadv_tt_common_entry,
747e4221 50 hash_entry);
7aadf889 51
323813ed 52 return batadv_compare_eth(data1, data2);
7aadf889
ML
53}
54
c018ad3d
AQ
55/**
56 * batadv_choose_tt - return the index of the tt entry in the hash table
57 * @data: pointer to the tt_common_entry object to map
58 * @size: the size of the hash table
59 *
60 * Returns the hash index where the object represented by 'data' should be
61 * stored at.
62 */
63static inline uint32_t batadv_choose_tt(const void *data, uint32_t size)
64{
65 struct batadv_tt_common_entry *tt;
66 uint32_t hash = 0;
67
68 tt = (struct batadv_tt_common_entry *)data;
69 hash = batadv_hash_bytes(hash, &tt->addr, ETH_ALEN);
70 hash = batadv_hash_bytes(hash, &tt->vid, sizeof(tt->vid));
71
72 hash += (hash << 3);
73 hash ^= (hash >> 11);
74 hash += (hash << 15);
75
76 return hash % size;
77}
78
79/**
80 * batadv_tt_hash_find - look for a client in the given hash table
81 * @hash: the hash table to search
82 * @addr: the mac address of the client to look for
83 * @vid: VLAN identifier
84 *
85 * Returns a pointer to the tt_common struct belonging to the searched client if
86 * found, NULL otherwise.
87 */
56303d34 88static struct batadv_tt_common_entry *
c018ad3d
AQ
89batadv_tt_hash_find(struct batadv_hashtable *hash, const uint8_t *addr,
90 unsigned short vid)
7aadf889 91{
7aadf889 92 struct hlist_head *head;
c018ad3d 93 struct batadv_tt_common_entry to_search, *tt, *tt_tmp = NULL;
c90681b8 94 uint32_t index;
7aadf889
ML
95
96 if (!hash)
97 return NULL;
98
c018ad3d
AQ
99 memcpy(to_search.addr, addr, ETH_ALEN);
100 to_search.vid = vid;
101
102 index = batadv_choose_tt(&to_search, hash->size);
7aadf889
ML
103 head = &hash->table[index];
104
105 rcu_read_lock();
c018ad3d
AQ
106 hlist_for_each_entry_rcu(tt, head, hash_entry) {
107 if (!batadv_compare_eth(tt, addr))
108 continue;
109
110 if (tt->vid != vid)
7aadf889
ML
111 continue;
112
c018ad3d 113 if (!atomic_inc_not_zero(&tt->refcount))
7683fdc1
AQ
114 continue;
115
c018ad3d 116 tt_tmp = tt;
7aadf889
ML
117 break;
118 }
119 rcu_read_unlock();
120
c018ad3d 121 return tt_tmp;
7aadf889
ML
122}
123
c018ad3d
AQ
124/**
125 * batadv_tt_local_hash_find - search the local table for a given client
126 * @bat_priv: the bat priv with all the soft interface information
127 * @addr: the mac address of the client to look for
128 * @vid: VLAN identifier
129 *
130 * Returns a pointer to the corresponding tt_local_entry struct if the client is
131 * found, NULL otherwise.
132 */
56303d34 133static struct batadv_tt_local_entry *
c018ad3d
AQ
134batadv_tt_local_hash_find(struct batadv_priv *bat_priv, const uint8_t *addr,
135 unsigned short vid)
7aadf889 136{
56303d34
SE
137 struct batadv_tt_common_entry *tt_common_entry;
138 struct batadv_tt_local_entry *tt_local_entry = NULL;
7aadf889 139
c018ad3d
AQ
140 tt_common_entry = batadv_tt_hash_find(bat_priv->tt.local_hash, addr,
141 vid);
48100bac
AQ
142 if (tt_common_entry)
143 tt_local_entry = container_of(tt_common_entry,
56303d34
SE
144 struct batadv_tt_local_entry,
145 common);
48100bac
AQ
146 return tt_local_entry;
147}
7aadf889 148
c018ad3d
AQ
149/**
150 * batadv_tt_global_hash_find - search the global table for a given client
151 * @bat_priv: the bat priv with all the soft interface information
152 * @addr: the mac address of the client to look for
153 * @vid: VLAN identifier
154 *
155 * Returns a pointer to the corresponding tt_global_entry struct if the client
156 * is found, NULL otherwise.
157 */
56303d34 158static struct batadv_tt_global_entry *
c018ad3d
AQ
159batadv_tt_global_hash_find(struct batadv_priv *bat_priv, const uint8_t *addr,
160 unsigned short vid)
48100bac 161{
56303d34
SE
162 struct batadv_tt_common_entry *tt_common_entry;
163 struct batadv_tt_global_entry *tt_global_entry = NULL;
7683fdc1 164
c018ad3d
AQ
165 tt_common_entry = batadv_tt_hash_find(bat_priv->tt.global_hash, addr,
166 vid);
48100bac
AQ
167 if (tt_common_entry)
168 tt_global_entry = container_of(tt_common_entry,
56303d34
SE
169 struct batadv_tt_global_entry,
170 common);
48100bac 171 return tt_global_entry;
7aadf889
ML
172}
173
a513088d 174static void
56303d34 175batadv_tt_local_entry_free_ref(struct batadv_tt_local_entry *tt_local_entry)
7683fdc1 176{
48100bac
AQ
177 if (atomic_dec_and_test(&tt_local_entry->common.refcount))
178 kfree_rcu(tt_local_entry, common.rcu);
7683fdc1
AQ
179}
180
21026059
AQ
181/**
182 * batadv_tt_global_entry_free_ref - decrement the refcounter for a
183 * tt_global_entry and possibly free it
184 * @tt_global_entry: the object to free
185 */
a513088d 186static void
56303d34 187batadv_tt_global_entry_free_ref(struct batadv_tt_global_entry *tt_global_entry)
7683fdc1 188{
db08e6e5 189 if (atomic_dec_and_test(&tt_global_entry->common.refcount)) {
a513088d 190 batadv_tt_global_del_orig_list(tt_global_entry);
21026059 191 kfree_rcu(tt_global_entry, common.rcu);
db08e6e5
SW
192 }
193}
194
a513088d 195static void batadv_tt_orig_list_entry_free_rcu(struct rcu_head *rcu)
db08e6e5 196{
56303d34 197 struct batadv_tt_orig_list_entry *orig_entry;
db08e6e5 198
56303d34 199 orig_entry = container_of(rcu, struct batadv_tt_orig_list_entry, rcu);
72822225
LL
200
201 /* We are in an rcu callback here, therefore we cannot use
202 * batadv_orig_node_free_ref() and its call_rcu():
203 * An rcu_barrier() wouldn't wait for that to finish
204 */
205 batadv_orig_node_free_ref_now(orig_entry->orig_node);
db08e6e5
SW
206 kfree(orig_entry);
207}
208
7ea7b4a1
AQ
209/**
210 * batadv_tt_local_size_mod - change the size by v of the local table identified
211 * by vid
212 * @bat_priv: the bat priv with all the soft interface information
213 * @vid: the VLAN identifier of the sub-table to change
214 * @v: the amount to sum to the local table size
215 */
216static void batadv_tt_local_size_mod(struct batadv_priv *bat_priv,
217 unsigned short vid, int v)
218{
219 struct batadv_softif_vlan *vlan;
220
221 vlan = batadv_softif_vlan_get(bat_priv, vid);
222 if (!vlan)
223 return;
224
225 atomic_add(v, &vlan->tt.num_entries);
226
227 batadv_softif_vlan_free_ref(vlan);
228}
229
230/**
231 * batadv_tt_local_size_inc - increase by one the local table size for the given
232 * vid
233 * @bat_priv: the bat priv with all the soft interface information
234 * @vid: the VLAN identifier
235 */
236static void batadv_tt_local_size_inc(struct batadv_priv *bat_priv,
237 unsigned short vid)
238{
239 batadv_tt_local_size_mod(bat_priv, vid, 1);
240}
241
242/**
243 * batadv_tt_local_size_dec - decrease by one the local table size for the given
244 * vid
245 * @bat_priv: the bat priv with all the soft interface information
246 * @vid: the VLAN identifier
247 */
248static void batadv_tt_local_size_dec(struct batadv_priv *bat_priv,
249 unsigned short vid)
250{
251 batadv_tt_local_size_mod(bat_priv, vid, -1);
252}
253
254/**
255 * batadv_tt_global_size_mod - change the size by v of the local table
256 * identified by vid
257 * @bat_priv: the bat priv with all the soft interface information
258 * @vid: the VLAN identifier
259 * @v: the amount to sum to the global table size
260 */
261static void batadv_tt_global_size_mod(struct batadv_orig_node *orig_node,
262 unsigned short vid, int v)
263{
264 struct batadv_orig_node_vlan *vlan;
265
266 vlan = batadv_orig_node_vlan_new(orig_node, vid);
267 if (!vlan)
268 return;
269
270 if (atomic_add_return(v, &vlan->tt.num_entries) == 0) {
271 spin_lock_bh(&orig_node->vlan_list_lock);
272 list_del_rcu(&vlan->list);
273 spin_unlock_bh(&orig_node->vlan_list_lock);
274 batadv_orig_node_vlan_free_ref(vlan);
275 }
276
277 batadv_orig_node_vlan_free_ref(vlan);
278}
279
280/**
281 * batadv_tt_global_size_inc - increase by one the global table size for the
282 * given vid
283 * @orig_node: the originator which global table size has to be decreased
284 * @vid: the vlan identifier
285 */
286static void batadv_tt_global_size_inc(struct batadv_orig_node *orig_node,
287 unsigned short vid)
288{
289 batadv_tt_global_size_mod(orig_node, vid, 1);
290}
291
292/**
293 * batadv_tt_global_size_dec - decrease by one the global table size for the
294 * given vid
295 * @orig_node: the originator which global table size has to be decreased
296 * @vid: the vlan identifier
297 */
298static void batadv_tt_global_size_dec(struct batadv_orig_node *orig_node,
299 unsigned short vid)
300{
301 batadv_tt_global_size_mod(orig_node, vid, -1);
302}
303
a513088d 304static void
56303d34 305batadv_tt_orig_list_entry_free_ref(struct batadv_tt_orig_list_entry *orig_entry)
db08e6e5 306{
d657e621
AQ
307 if (!atomic_dec_and_test(&orig_entry->refcount))
308 return;
7ea7b4a1 309
a513088d 310 call_rcu(&orig_entry->rcu, batadv_tt_orig_list_entry_free_rcu);
7683fdc1
AQ
311}
312
3abe4adb
AQ
313/**
314 * batadv_tt_local_event - store a local TT event (ADD/DEL)
315 * @bat_priv: the bat priv with all the soft interface information
316 * @tt_local_entry: the TT entry involved in the event
317 * @event_flags: flags to store in the event structure
318 */
56303d34 319static void batadv_tt_local_event(struct batadv_priv *bat_priv,
3abe4adb
AQ
320 struct batadv_tt_local_entry *tt_local_entry,
321 uint8_t event_flags)
a73105b8 322{
56303d34 323 struct batadv_tt_change_node *tt_change_node, *entry, *safe;
3abe4adb
AQ
324 struct batadv_tt_common_entry *common = &tt_local_entry->common;
325 uint8_t flags = common->flags | event_flags;
3b643de5
AQ
326 bool event_removed = false;
327 bool del_op_requested, del_op_entry;
a73105b8
AQ
328
329 tt_change_node = kmalloc(sizeof(*tt_change_node), GFP_ATOMIC);
a73105b8
AQ
330 if (!tt_change_node)
331 return;
332
ff66c975 333 tt_change_node->change.flags = flags;
ca663046
AQ
334 memset(tt_change_node->change.reserved, 0,
335 sizeof(tt_change_node->change.reserved));
3abe4adb 336 memcpy(tt_change_node->change.addr, common->addr, ETH_ALEN);
c018ad3d 337 tt_change_node->change.vid = htons(common->vid);
a73105b8 338
acd34afa 339 del_op_requested = flags & BATADV_TT_CLIENT_DEL;
3b643de5
AQ
340
341 /* check for ADD+DEL or DEL+ADD events */
807736f6
SE
342 spin_lock_bh(&bat_priv->tt.changes_list_lock);
343 list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
3b643de5 344 list) {
3abe4adb 345 if (!batadv_compare_eth(entry->change.addr, common->addr))
3b643de5
AQ
346 continue;
347
348 /* DEL+ADD in the same orig interval have no effect and can be
349 * removed to avoid silly behaviour on the receiver side. The
350 * other way around (ADD+DEL) can happen in case of roaming of
351 * a client still in the NEW state. Roaming of NEW clients is
352 * now possible due to automatically recognition of "temporary"
353 * clients
354 */
acd34afa 355 del_op_entry = entry->change.flags & BATADV_TT_CLIENT_DEL;
3b643de5
AQ
356 if (!del_op_requested && del_op_entry)
357 goto del;
358 if (del_op_requested && !del_op_entry)
359 goto del;
3c4f7ab6
AQ
360
361 /* this is a second add in the same originator interval. It
362 * means that flags have been changed: update them!
363 */
364 if (!del_op_requested && !del_op_entry)
365 entry->change.flags = flags;
366
3b643de5
AQ
367 continue;
368del:
369 list_del(&entry->list);
370 kfree(entry);
155e4e12 371 kfree(tt_change_node);
3b643de5
AQ
372 event_removed = true;
373 goto unlock;
374 }
375
a73105b8 376 /* track the change in the OGMinterval list */
807736f6 377 list_add_tail(&tt_change_node->list, &bat_priv->tt.changes_list);
3b643de5
AQ
378
379unlock:
807736f6 380 spin_unlock_bh(&bat_priv->tt.changes_list_lock);
a73105b8 381
3b643de5 382 if (event_removed)
807736f6 383 atomic_dec(&bat_priv->tt.local_changes);
3b643de5 384 else
807736f6 385 atomic_inc(&bat_priv->tt.local_changes);
a73105b8
AQ
386}
387
335fbe0f
ML
388/**
389 * batadv_tt_len - compute length in bytes of given number of tt changes
390 * @changes_num: number of tt changes
391 *
392 * Returns computed length in bytes.
393 */
394static int batadv_tt_len(int changes_num)
a73105b8 395{
335fbe0f 396 return changes_num * sizeof(struct batadv_tvlv_tt_change);
a73105b8
AQ
397}
398
298e6e68
AQ
399/**
400 * batadv_tt_entries - compute the number of entries fitting in tt_len bytes
401 * @tt_len: available space
402 *
403 * Returns the number of entries.
404 */
405static uint16_t batadv_tt_entries(uint16_t tt_len)
406{
407 return tt_len / batadv_tt_len(1);
408}
409
a19d3d85
ML
410/**
411 * batadv_tt_local_table_transmit_size - calculates the local translation table
412 * size when transmitted over the air
413 * @bat_priv: the bat priv with all the soft interface information
414 *
415 * Returns local translation table size in bytes.
416 */
417static int batadv_tt_local_table_transmit_size(struct batadv_priv *bat_priv)
418{
419 uint16_t num_vlan = 0, tt_local_entries = 0;
420 struct batadv_softif_vlan *vlan;
421 int hdr_size;
422
423 rcu_read_lock();
424 hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
425 num_vlan++;
426 tt_local_entries += atomic_read(&vlan->tt.num_entries);
427 }
428 rcu_read_unlock();
429
430 /* header size of tvlv encapsulated tt response payload */
431 hdr_size = sizeof(struct batadv_unicast_tvlv_packet);
432 hdr_size += sizeof(struct batadv_tvlv_hdr);
433 hdr_size += sizeof(struct batadv_tvlv_tt_data);
434 hdr_size += num_vlan * sizeof(struct batadv_tvlv_tt_vlan_data);
435
436 return hdr_size + batadv_tt_len(tt_local_entries);
437}
438
56303d34 439static int batadv_tt_local_init(struct batadv_priv *bat_priv)
c6c8fea2 440{
807736f6 441 if (bat_priv->tt.local_hash)
5346c35e 442 return 0;
c6c8fea2 443
807736f6 444 bat_priv->tt.local_hash = batadv_hash_new(1024);
c6c8fea2 445
807736f6 446 if (!bat_priv->tt.local_hash)
5346c35e 447 return -ENOMEM;
c6c8fea2 448
dec05074
AQ
449 batadv_hash_set_lock_class(bat_priv->tt.local_hash,
450 &batadv_tt_local_hash_lock_class_key);
451
5346c35e 452 return 0;
c6c8fea2
SE
453}
454
068ee6e2
AQ
455static void batadv_tt_global_free(struct batadv_priv *bat_priv,
456 struct batadv_tt_global_entry *tt_global,
457 const char *message)
458{
459 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789
AQ
460 "Deleting global tt entry %pM (vid: %d): %s\n",
461 tt_global->common.addr,
462 BATADV_PRINT_VID(tt_global->common.vid), message);
068ee6e2
AQ
463
464 batadv_hash_remove(bat_priv->tt.global_hash, batadv_compare_tt,
c018ad3d 465 batadv_choose_tt, &tt_global->common);
068ee6e2 466 batadv_tt_global_entry_free_ref(tt_global);
068ee6e2
AQ
467}
468
c018ad3d
AQ
469/**
470 * batadv_tt_local_add - add a new client to the local table or update an
471 * existing client
472 * @soft_iface: netdev struct of the mesh interface
473 * @addr: the mac address of the client to add
474 * @vid: VLAN identifier
475 * @ifindex: index of the interface where the client is connected to (useful to
476 * identify wireless clients)
9464d071
AQ
477 * @mark: the value contained in the skb->mark field of the received packet (if
478 * any)
a19d3d85
ML
479 *
480 * Returns true if the client was successfully added, false otherwise.
c018ad3d 481 */
a19d3d85 482bool batadv_tt_local_add(struct net_device *soft_iface, const uint8_t *addr,
9464d071 483 unsigned short vid, int ifindex, uint32_t mark)
c6c8fea2 484{
56303d34 485 struct batadv_priv *bat_priv = netdev_priv(soft_iface);
170173bf
SE
486 struct batadv_tt_local_entry *tt_local;
487 struct batadv_tt_global_entry *tt_global;
0c69aecc 488 struct net_device *in_dev = NULL;
db08e6e5 489 struct hlist_head *head;
56303d34 490 struct batadv_tt_orig_list_entry *orig_entry;
a19d3d85
ML
491 int hash_added, table_size, packet_size_max;
492 bool ret = false, roamed_back = false;
3c4f7ab6 493 uint8_t remote_flags;
9464d071 494 uint32_t match_mark;
c6c8fea2 495
0c69aecc
AQ
496 if (ifindex != BATADV_NULL_IFINDEX)
497 in_dev = dev_get_by_index(&init_net, ifindex);
498
c018ad3d
AQ
499 tt_local = batadv_tt_local_hash_find(bat_priv, addr, vid);
500 tt_global = batadv_tt_global_hash_find(bat_priv, addr, vid);
c6c8fea2 501
47c94655
AQ
502 if (tt_local) {
503 tt_local->last_seen = jiffies;
068ee6e2
AQ
504 if (tt_local->common.flags & BATADV_TT_CLIENT_PENDING) {
505 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789
AQ
506 "Re-adding pending client %pM (vid: %d)\n",
507 addr, BATADV_PRINT_VID(vid));
068ee6e2
AQ
508 /* whatever the reason why the PENDING flag was set,
509 * this is a client which was enqueued to be removed in
510 * this orig_interval. Since it popped up again, the
511 * flag can be reset like it was never enqueued
512 */
513 tt_local->common.flags &= ~BATADV_TT_CLIENT_PENDING;
514 goto add_event;
515 }
516
517 if (tt_local->common.flags & BATADV_TT_CLIENT_ROAM) {
518 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789
AQ
519 "Roaming client %pM (vid: %d) came back to its original location\n",
520 addr, BATADV_PRINT_VID(vid));
068ee6e2
AQ
521 /* the ROAM flag is set because this client roamed away
522 * and the node got a roaming_advertisement message. Now
523 * that the client popped up again at its original
524 * location such flag can be unset
525 */
526 tt_local->common.flags &= ~BATADV_TT_CLIENT_ROAM;
527 roamed_back = true;
528 }
529 goto check_roaming;
c6c8fea2
SE
530 }
531
a19d3d85
ML
532 /* Ignore the client if we cannot send it in a full table response. */
533 table_size = batadv_tt_local_table_transmit_size(bat_priv);
534 table_size += batadv_tt_len(1);
535 packet_size_max = atomic_read(&bat_priv->packet_size_max);
536 if (table_size > packet_size_max) {
537 net_ratelimited_function(batadv_info, soft_iface,
538 "Local translation table size (%i) exceeds maximum packet size (%i); Ignoring new local tt entry: %pM\n",
539 table_size, packet_size_max, addr);
540 goto out;
541 }
542
47c94655
AQ
543 tt_local = kmalloc(sizeof(*tt_local), GFP_ATOMIC);
544 if (!tt_local)
7683fdc1 545 goto out;
a73105b8 546
39c75a51 547 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789
AQ
548 "Creating new local tt entry: %pM (vid: %d, ttvn: %d)\n",
549 addr, BATADV_PRINT_VID(vid),
807736f6 550 (uint8_t)atomic_read(&bat_priv->tt.vn));
c6c8fea2 551
47c94655 552 memcpy(tt_local->common.addr, addr, ETH_ALEN);
8425ec6a
AQ
553 /* The local entry has to be marked as NEW to avoid to send it in
554 * a full table response going out before the next ttvn increment
555 * (consistency check)
556 */
557 tt_local->common.flags = BATADV_TT_CLIENT_NEW;
c018ad3d 558 tt_local->common.vid = vid;
0c69aecc 559 if (batadv_is_wifi_netdev(in_dev))
47c94655
AQ
560 tt_local->common.flags |= BATADV_TT_CLIENT_WIFI;
561 atomic_set(&tt_local->common.refcount, 2);
562 tt_local->last_seen = jiffies;
563 tt_local->common.added_at = tt_local->last_seen;
c6c8fea2
SE
564
565 /* the batman interface mac address should never be purged */
1eda58bf 566 if (batadv_compare_eth(addr, soft_iface->dev_addr))
47c94655 567 tt_local->common.flags |= BATADV_TT_CLIENT_NOPURGE;
c6c8fea2 568
807736f6 569 hash_added = batadv_hash_add(bat_priv->tt.local_hash, batadv_compare_tt,
c018ad3d 570 batadv_choose_tt, &tt_local->common,
47c94655 571 &tt_local->common.hash_entry);
80b3f58c
SW
572
573 if (unlikely(hash_added != 0)) {
574 /* remove the reference for the hash */
47c94655 575 batadv_tt_local_entry_free_ref(tt_local);
80b3f58c
SW
576 goto out;
577 }
578
068ee6e2 579add_event:
3abe4adb 580 batadv_tt_local_event(bat_priv, tt_local, BATADV_NO_FLAGS);
ff66c975 581
068ee6e2
AQ
582check_roaming:
583 /* Check whether it is a roaming, but don't do anything if the roaming
584 * process has already been handled
585 */
586 if (tt_global && !(tt_global->common.flags & BATADV_TT_CLIENT_ROAM)) {
db08e6e5 587 /* These node are probably going to update their tt table */
47c94655 588 head = &tt_global->orig_list;
db08e6e5 589 rcu_read_lock();
b67bfe0d 590 hlist_for_each_entry_rcu(orig_entry, head, list) {
47c94655 591 batadv_send_roam_adv(bat_priv, tt_global->common.addr,
c018ad3d 592 tt_global->common.vid,
a513088d 593 orig_entry->orig_node);
db08e6e5
SW
594 }
595 rcu_read_unlock();
068ee6e2
AQ
596 if (roamed_back) {
597 batadv_tt_global_free(bat_priv, tt_global,
598 "Roaming canceled");
599 tt_global = NULL;
600 } else {
601 /* The global entry has to be marked as ROAMING and
602 * has to be kept for consistency purpose
603 */
604 tt_global->common.flags |= BATADV_TT_CLIENT_ROAM;
605 tt_global->roam_at = jiffies;
606 }
7683fdc1 607 }
068ee6e2 608
3c4f7ab6
AQ
609 /* store the current remote flags before altering them. This helps
610 * understanding is flags are changing or not
611 */
612 remote_flags = tt_local->common.flags & BATADV_TT_REMOTE_MASK;
613
614 if (batadv_is_wifi_netdev(in_dev))
615 tt_local->common.flags |= BATADV_TT_CLIENT_WIFI;
616 else
617 tt_local->common.flags &= ~BATADV_TT_CLIENT_WIFI;
a19d3d85 618
9464d071
AQ
619 /* check the mark in the skb: if it's equal to the configured
620 * isolation_mark, it means the packet is coming from an isolated
621 * non-mesh client
622 */
623 match_mark = (mark & bat_priv->isolation_mark_mask);
624 if (bat_priv->isolation_mark_mask &&
625 match_mark == bat_priv->isolation_mark)
626 tt_local->common.flags |= BATADV_TT_CLIENT_ISOLA;
627 else
628 tt_local->common.flags &= ~BATADV_TT_CLIENT_ISOLA;
629
3c4f7ab6
AQ
630 /* if any "dynamic" flag has been modified, resend an ADD event for this
631 * entry so that all the nodes can get the new flags
632 */
633 if (remote_flags ^ (tt_local->common.flags & BATADV_TT_REMOTE_MASK))
634 batadv_tt_local_event(bat_priv, tt_local, BATADV_NO_FLAGS);
635
636 ret = true;
7683fdc1 637out:
0c69aecc
AQ
638 if (in_dev)
639 dev_put(in_dev);
47c94655
AQ
640 if (tt_local)
641 batadv_tt_local_entry_free_ref(tt_local);
642 if (tt_global)
643 batadv_tt_global_entry_free_ref(tt_global);
a19d3d85 644 return ret;
c6c8fea2
SE
645}
646
7ea7b4a1
AQ
647/**
648 * batadv_tt_prepare_tvlv_global_data - prepare the TVLV TT header to send
649 * within a TT Response directed to another node
650 * @orig_node: originator for which the TT data has to be prepared
651 * @tt_data: uninitialised pointer to the address of the TVLV buffer
652 * @tt_change: uninitialised pointer to the address of the area where the TT
653 * changed can be stored
654 * @tt_len: pointer to the length to reserve to the tt_change. if -1 this
655 * function reserves the amount of space needed to send the entire global TT
656 * table. In case of success the value is updated with the real amount of
657 * reserved bytes
658
659 * Allocate the needed amount of memory for the entire TT TVLV and write its
660 * header made up by one tvlv_tt_data object and a series of tvlv_tt_vlan_data
661 * objects, one per active VLAN served by the originator node.
662 *
663 * Return the size of the allocated buffer or 0 in case of failure.
664 */
665static uint16_t
666batadv_tt_prepare_tvlv_global_data(struct batadv_orig_node *orig_node,
667 struct batadv_tvlv_tt_data **tt_data,
668 struct batadv_tvlv_tt_change **tt_change,
669 int32_t *tt_len)
670{
671 uint16_t num_vlan = 0, num_entries = 0, change_offset, tvlv_len;
672 struct batadv_tvlv_tt_vlan_data *tt_vlan;
673 struct batadv_orig_node_vlan *vlan;
674 uint8_t *tt_change_ptr;
675
676 rcu_read_lock();
677 list_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) {
678 num_vlan++;
679 num_entries += atomic_read(&vlan->tt.num_entries);
680 }
681
682 change_offset = sizeof(**tt_data);
683 change_offset += num_vlan * sizeof(*tt_vlan);
684
685 /* if tt_len is negative, allocate the space needed by the full table */
686 if (*tt_len < 0)
687 *tt_len = batadv_tt_len(num_entries);
688
689 tvlv_len = *tt_len;
690 tvlv_len += change_offset;
691
692 *tt_data = kmalloc(tvlv_len, GFP_ATOMIC);
693 if (!*tt_data) {
694 *tt_len = 0;
695 goto out;
696 }
697
698 (*tt_data)->flags = BATADV_NO_FLAGS;
699 (*tt_data)->ttvn = atomic_read(&orig_node->last_ttvn);
700 (*tt_data)->num_vlan = htons(num_vlan);
701
702 tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(*tt_data + 1);
703 list_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) {
704 tt_vlan->vid = htons(vlan->vid);
705 tt_vlan->crc = htonl(vlan->tt.crc);
706
707 tt_vlan++;
708 }
709
710 tt_change_ptr = (uint8_t *)*tt_data + change_offset;
711 *tt_change = (struct batadv_tvlv_tt_change *)tt_change_ptr;
712
713out:
714 rcu_read_unlock();
715 return tvlv_len;
716}
717
718/**
719 * batadv_tt_prepare_tvlv_local_data - allocate and prepare the TT TVLV for this
720 * node
721 * @bat_priv: the bat priv with all the soft interface information
722 * @tt_data: uninitialised pointer to the address of the TVLV buffer
723 * @tt_change: uninitialised pointer to the address of the area where the TT
724 * changes can be stored
725 * @tt_len: pointer to the length to reserve to the tt_change. if -1 this
726 * function reserves the amount of space needed to send the entire local TT
727 * table. In case of success the value is updated with the real amount of
728 * reserved bytes
729 *
730 * Allocate the needed amount of memory for the entire TT TVLV and write its
731 * header made up by one tvlv_tt_data object and a series of tvlv_tt_vlan_data
732 * objects, one per active VLAN.
733 *
734 * Return the size of the allocated buffer or 0 in case of failure.
735 */
736static uint16_t
737batadv_tt_prepare_tvlv_local_data(struct batadv_priv *bat_priv,
738 struct batadv_tvlv_tt_data **tt_data,
739 struct batadv_tvlv_tt_change **tt_change,
740 int32_t *tt_len)
741{
742 struct batadv_tvlv_tt_vlan_data *tt_vlan;
743 struct batadv_softif_vlan *vlan;
744 uint16_t num_vlan = 0, num_entries = 0, tvlv_len;
745 uint8_t *tt_change_ptr;
746 int change_offset;
747
748 rcu_read_lock();
749 hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
750 num_vlan++;
751 num_entries += atomic_read(&vlan->tt.num_entries);
752 }
753
754 change_offset = sizeof(**tt_data);
755 change_offset += num_vlan * sizeof(*tt_vlan);
756
757 /* if tt_len is negative, allocate the space needed by the full table */
758 if (*tt_len < 0)
759 *tt_len = batadv_tt_len(num_entries);
760
761 tvlv_len = *tt_len;
762 tvlv_len += change_offset;
763
764 *tt_data = kmalloc(tvlv_len, GFP_ATOMIC);
765 if (!*tt_data) {
766 tvlv_len = 0;
767 goto out;
768 }
769
770 (*tt_data)->flags = BATADV_NO_FLAGS;
771 (*tt_data)->ttvn = atomic_read(&bat_priv->tt.vn);
772 (*tt_data)->num_vlan = htons(num_vlan);
773
774 tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(*tt_data + 1);
775 hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
776 tt_vlan->vid = htons(vlan->vid);
777 tt_vlan->crc = htonl(vlan->tt.crc);
778
779 tt_vlan++;
780 }
781
782 tt_change_ptr = (uint8_t *)*tt_data + change_offset;
783 *tt_change = (struct batadv_tvlv_tt_change *)tt_change_ptr;
784
785out:
786 rcu_read_unlock();
787 return tvlv_len;
788}
789
e1bf0c14
ML
790/**
791 * batadv_tt_tvlv_container_update - update the translation table tvlv container
792 * after local tt changes have been committed
793 * @bat_priv: the bat priv with all the soft interface information
794 */
795static void batadv_tt_tvlv_container_update(struct batadv_priv *bat_priv)
be9aa4c1 796{
e1bf0c14
ML
797 struct batadv_tt_change_node *entry, *safe;
798 struct batadv_tvlv_tt_data *tt_data;
799 struct batadv_tvlv_tt_change *tt_change;
7ea7b4a1 800 int tt_diff_len, tt_change_len = 0;
e1bf0c14 801 int tt_diff_entries_num = 0, tt_diff_entries_count = 0;
7ea7b4a1 802 uint16_t tvlv_len;
be9aa4c1 803
7ea7b4a1
AQ
804 tt_diff_entries_num = atomic_read(&bat_priv->tt.local_changes);
805 tt_diff_len = batadv_tt_len(tt_diff_entries_num);
be9aa4c1
ML
806
807 /* if we have too many changes for one packet don't send any
808 * and wait for the tt table request which will be fragmented
809 */
e1bf0c14
ML
810 if (tt_diff_len > bat_priv->soft_iface->mtu)
811 tt_diff_len = 0;
be9aa4c1 812
7ea7b4a1
AQ
813 tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv, &tt_data,
814 &tt_change, &tt_diff_len);
815 if (!tvlv_len)
e1bf0c14 816 return;
be9aa4c1 817
e1bf0c14 818 tt_data->flags = BATADV_TT_OGM_DIFF;
c6c8fea2 819
e1bf0c14
ML
820 if (tt_diff_len == 0)
821 goto container_register;
be9aa4c1 822
807736f6
SE
823 spin_lock_bh(&bat_priv->tt.changes_list_lock);
824 atomic_set(&bat_priv->tt.local_changes, 0);
c6c8fea2 825
807736f6 826 list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
7c64fd98 827 list) {
e1bf0c14
ML
828 if (tt_diff_entries_count < tt_diff_entries_num) {
829 memcpy(tt_change + tt_diff_entries_count,
830 &entry->change,
831 sizeof(struct batadv_tvlv_tt_change));
832 tt_diff_entries_count++;
c6c8fea2 833 }
a73105b8
AQ
834 list_del(&entry->list);
835 kfree(entry);
c6c8fea2 836 }
807736f6 837 spin_unlock_bh(&bat_priv->tt.changes_list_lock);
a73105b8
AQ
838
839 /* Keep the buffer for possible tt_request */
807736f6
SE
840 spin_lock_bh(&bat_priv->tt.last_changeset_lock);
841 kfree(bat_priv->tt.last_changeset);
842 bat_priv->tt.last_changeset_len = 0;
843 bat_priv->tt.last_changeset = NULL;
e1bf0c14 844 tt_change_len = batadv_tt_len(tt_diff_entries_count);
be9aa4c1 845 /* check whether this new OGM has no changes due to size problems */
e1bf0c14 846 if (tt_diff_entries_count > 0) {
be9aa4c1 847 /* if kmalloc() fails we will reply with the full table
a73105b8
AQ
848 * instead of providing the diff
849 */
e1bf0c14 850 bat_priv->tt.last_changeset = kzalloc(tt_diff_len, GFP_ATOMIC);
807736f6 851 if (bat_priv->tt.last_changeset) {
e1bf0c14
ML
852 memcpy(bat_priv->tt.last_changeset,
853 tt_change, tt_change_len);
854 bat_priv->tt.last_changeset_len = tt_diff_len;
a73105b8
AQ
855 }
856 }
807736f6 857 spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
c6c8fea2 858
e1bf0c14
ML
859container_register:
860 batadv_tvlv_container_register(bat_priv, BATADV_TVLV_TT, 1, tt_data,
7ea7b4a1 861 tvlv_len);
e1bf0c14 862 kfree(tt_data);
c6c8fea2
SE
863}
864
08c36d3e 865int batadv_tt_local_seq_print_text(struct seq_file *seq, void *offset)
c6c8fea2
SE
866{
867 struct net_device *net_dev = (struct net_device *)seq->private;
56303d34 868 struct batadv_priv *bat_priv = netdev_priv(net_dev);
807736f6 869 struct batadv_hashtable *hash = bat_priv->tt.local_hash;
56303d34 870 struct batadv_tt_common_entry *tt_common_entry;
85766a82 871 struct batadv_tt_local_entry *tt_local;
56303d34 872 struct batadv_hard_iface *primary_if;
7ea7b4a1 873 struct batadv_softif_vlan *vlan;
c6c8fea2 874 struct hlist_head *head;
7ea7b4a1 875 unsigned short vid;
c90681b8 876 uint32_t i;
85766a82
AQ
877 int last_seen_secs;
878 int last_seen_msecs;
879 unsigned long last_seen_jiffies;
880 bool no_purge;
881 uint16_t np_flag = BATADV_TT_CLIENT_NOPURGE;
c6c8fea2 882
30da63a6
ML
883 primary_if = batadv_seq_print_text_primary_if_get(seq);
884 if (!primary_if)
32ae9b22 885 goto out;
c6c8fea2 886
86ceb360 887 seq_printf(seq,
7ea7b4a1
AQ
888 "Locally retrieved addresses (from %s) announced via TT (TTVN: %u):\n",
889 net_dev->name, (uint8_t)atomic_read(&bat_priv->tt.vn));
dd24ddb2 890 seq_printf(seq, " %-13s %s %-8s %-9s (%-10s)\n", "Client", "VID",
7ea7b4a1 891 "Flags", "Last seen", "CRC");
c6c8fea2 892
c6c8fea2
SE
893 for (i = 0; i < hash->size; i++) {
894 head = &hash->table[i];
895
7aadf889 896 rcu_read_lock();
b67bfe0d 897 hlist_for_each_entry_rcu(tt_common_entry,
7aadf889 898 head, hash_entry) {
85766a82
AQ
899 tt_local = container_of(tt_common_entry,
900 struct batadv_tt_local_entry,
901 common);
7ea7b4a1 902 vid = tt_common_entry->vid;
85766a82
AQ
903 last_seen_jiffies = jiffies - tt_local->last_seen;
904 last_seen_msecs = jiffies_to_msecs(last_seen_jiffies);
905 last_seen_secs = last_seen_msecs / 1000;
906 last_seen_msecs = last_seen_msecs % 1000;
907
908 no_purge = tt_common_entry->flags & np_flag;
909
7ea7b4a1
AQ
910 vlan = batadv_softif_vlan_get(bat_priv, vid);
911 if (!vlan) {
912 seq_printf(seq, "Cannot retrieve VLAN %d\n",
913 BATADV_PRINT_VID(vid));
914 continue;
915 }
916
917 seq_printf(seq,
dd24ddb2 918 " * %pM %4i [%c%c%c%c%c%c] %3u.%03u (%#.8x)\n",
7c64fd98 919 tt_common_entry->addr,
16052789 920 BATADV_PRINT_VID(tt_common_entry->vid),
7c64fd98 921 (tt_common_entry->flags &
acd34afa 922 BATADV_TT_CLIENT_ROAM ? 'R' : '.'),
85766a82 923 no_purge ? 'P' : '.',
7c64fd98 924 (tt_common_entry->flags &
acd34afa 925 BATADV_TT_CLIENT_NEW ? 'N' : '.'),
7c64fd98 926 (tt_common_entry->flags &
acd34afa 927 BATADV_TT_CLIENT_PENDING ? 'X' : '.'),
7c64fd98 928 (tt_common_entry->flags &
85766a82 929 BATADV_TT_CLIENT_WIFI ? 'W' : '.'),
dd24ddb2
AQ
930 (tt_common_entry->flags &
931 BATADV_TT_CLIENT_ISOLA ? 'I' : '.'),
a7966d90 932 no_purge ? 0 : last_seen_secs,
7ea7b4a1
AQ
933 no_purge ? 0 : last_seen_msecs,
934 vlan->tt.crc);
935
936 batadv_softif_vlan_free_ref(vlan);
c6c8fea2 937 }
7aadf889 938 rcu_read_unlock();
c6c8fea2 939 }
32ae9b22
ML
940out:
941 if (primary_if)
e5d89254 942 batadv_hardif_free_ref(primary_if);
30da63a6 943 return 0;
c6c8fea2
SE
944}
945
56303d34
SE
946static void
947batadv_tt_local_set_pending(struct batadv_priv *bat_priv,
948 struct batadv_tt_local_entry *tt_local_entry,
949 uint16_t flags, const char *message)
c6c8fea2 950{
3abe4adb 951 batadv_tt_local_event(bat_priv, tt_local_entry, flags);
a73105b8 952
015758d0
AQ
953 /* The local client has to be marked as "pending to be removed" but has
954 * to be kept in the table in order to send it in a full table
9cfc7bd6
SE
955 * response issued before the net ttvn increment (consistency check)
956 */
acd34afa 957 tt_local_entry->common.flags |= BATADV_TT_CLIENT_PENDING;
c566dbbe 958
39c75a51 959 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789
AQ
960 "Local tt entry (%pM, vid: %d) pending to be removed: %s\n",
961 tt_local_entry->common.addr,
962 BATADV_PRINT_VID(tt_local_entry->common.vid), message);
c6c8fea2
SE
963}
964
7f91d06c
AQ
965/**
966 * batadv_tt_local_remove - logically remove an entry from the local table
967 * @bat_priv: the bat priv with all the soft interface information
968 * @addr: the MAC address of the client to remove
c018ad3d 969 * @vid: VLAN identifier
7f91d06c
AQ
970 * @message: message to append to the log on deletion
971 * @roaming: true if the deletion is due to a roaming event
972 *
973 * Returns the flags assigned to the local entry before being deleted
974 */
975uint16_t batadv_tt_local_remove(struct batadv_priv *bat_priv,
c018ad3d
AQ
976 const uint8_t *addr, unsigned short vid,
977 const char *message, bool roaming)
c6c8fea2 978{
170173bf 979 struct batadv_tt_local_entry *tt_local_entry;
7f91d06c 980 uint16_t flags, curr_flags = BATADV_NO_FLAGS;
c6c8fea2 981
c018ad3d 982 tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
7683fdc1
AQ
983 if (!tt_local_entry)
984 goto out;
985
7f91d06c
AQ
986 curr_flags = tt_local_entry->common.flags;
987
acd34afa 988 flags = BATADV_TT_CLIENT_DEL;
068ee6e2
AQ
989 /* if this global entry addition is due to a roaming, the node has to
990 * mark the local entry as "roamed" in order to correctly reroute
991 * packets later
992 */
7c1fd91d 993 if (roaming) {
acd34afa 994 flags |= BATADV_TT_CLIENT_ROAM;
7c1fd91d
AQ
995 /* mark the local client as ROAMed */
996 tt_local_entry->common.flags |= BATADV_TT_CLIENT_ROAM;
997 }
42d0b044 998
068ee6e2
AQ
999 if (!(tt_local_entry->common.flags & BATADV_TT_CLIENT_NEW)) {
1000 batadv_tt_local_set_pending(bat_priv, tt_local_entry, flags,
1001 message);
1002 goto out;
1003 }
1004 /* if this client has been added right now, it is possible to
1005 * immediately purge it
1006 */
3abe4adb 1007 batadv_tt_local_event(bat_priv, tt_local_entry, BATADV_TT_CLIENT_DEL);
068ee6e2
AQ
1008 hlist_del_rcu(&tt_local_entry->common.hash_entry);
1009 batadv_tt_local_entry_free_ref(tt_local_entry);
7f91d06c 1010
7683fdc1
AQ
1011out:
1012 if (tt_local_entry)
a513088d 1013 batadv_tt_local_entry_free_ref(tt_local_entry);
7f91d06c
AQ
1014
1015 return curr_flags;
c6c8fea2
SE
1016}
1017
a19d3d85
ML
1018/**
1019 * batadv_tt_local_purge_list - purge inactive tt local entries
1020 * @bat_priv: the bat priv with all the soft interface information
1021 * @head: pointer to the list containing the local tt entries
1022 * @timeout: parameter deciding whether a given tt local entry is considered
1023 * inactive or not
1024 */
56303d34 1025static void batadv_tt_local_purge_list(struct batadv_priv *bat_priv,
a19d3d85
ML
1026 struct hlist_head *head,
1027 int timeout)
c6c8fea2 1028{
56303d34
SE
1029 struct batadv_tt_local_entry *tt_local_entry;
1030 struct batadv_tt_common_entry *tt_common_entry;
b67bfe0d 1031 struct hlist_node *node_tmp;
acd34afa 1032
b67bfe0d 1033 hlist_for_each_entry_safe(tt_common_entry, node_tmp, head,
acd34afa
SE
1034 hash_entry) {
1035 tt_local_entry = container_of(tt_common_entry,
56303d34
SE
1036 struct batadv_tt_local_entry,
1037 common);
acd34afa
SE
1038 if (tt_local_entry->common.flags & BATADV_TT_CLIENT_NOPURGE)
1039 continue;
1040
1041 /* entry already marked for deletion */
1042 if (tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING)
1043 continue;
1044
a19d3d85 1045 if (!batadv_has_timed_out(tt_local_entry->last_seen, timeout))
acd34afa
SE
1046 continue;
1047
1048 batadv_tt_local_set_pending(bat_priv, tt_local_entry,
1049 BATADV_TT_CLIENT_DEL, "timed out");
1050 }
1051}
1052
a19d3d85
ML
1053/**
1054 * batadv_tt_local_purge - purge inactive tt local entries
1055 * @bat_priv: the bat priv with all the soft interface information
1056 * @timeout: parameter deciding whether a given tt local entry is considered
1057 * inactive or not
1058 */
1059static void batadv_tt_local_purge(struct batadv_priv *bat_priv,
1060 int timeout)
acd34afa 1061{
807736f6 1062 struct batadv_hashtable *hash = bat_priv->tt.local_hash;
c6c8fea2 1063 struct hlist_head *head;
7683fdc1 1064 spinlock_t *list_lock; /* protects write access to the hash lists */
c90681b8 1065 uint32_t i;
c6c8fea2 1066
c6c8fea2
SE
1067 for (i = 0; i < hash->size; i++) {
1068 head = &hash->table[i];
7683fdc1 1069 list_lock = &hash->list_locks[i];
c6c8fea2 1070
7683fdc1 1071 spin_lock_bh(list_lock);
a19d3d85 1072 batadv_tt_local_purge_list(bat_priv, head, timeout);
7683fdc1 1073 spin_unlock_bh(list_lock);
c6c8fea2 1074 }
c6c8fea2
SE
1075}
1076
56303d34 1077static void batadv_tt_local_table_free(struct batadv_priv *bat_priv)
c6c8fea2 1078{
5bf74e9c 1079 struct batadv_hashtable *hash;
a73105b8 1080 spinlock_t *list_lock; /* protects write access to the hash lists */
56303d34
SE
1081 struct batadv_tt_common_entry *tt_common_entry;
1082 struct batadv_tt_local_entry *tt_local;
b67bfe0d 1083 struct hlist_node *node_tmp;
7683fdc1 1084 struct hlist_head *head;
c90681b8 1085 uint32_t i;
a73105b8 1086
807736f6 1087 if (!bat_priv->tt.local_hash)
c6c8fea2
SE
1088 return;
1089
807736f6 1090 hash = bat_priv->tt.local_hash;
a73105b8
AQ
1091
1092 for (i = 0; i < hash->size; i++) {
1093 head = &hash->table[i];
1094 list_lock = &hash->list_locks[i];
1095
1096 spin_lock_bh(list_lock);
b67bfe0d 1097 hlist_for_each_entry_safe(tt_common_entry, node_tmp,
a73105b8 1098 head, hash_entry) {
b67bfe0d 1099 hlist_del_rcu(&tt_common_entry->hash_entry);
56303d34
SE
1100 tt_local = container_of(tt_common_entry,
1101 struct batadv_tt_local_entry,
1102 common);
1103 batadv_tt_local_entry_free_ref(tt_local);
a73105b8
AQ
1104 }
1105 spin_unlock_bh(list_lock);
1106 }
1107
1a8eaf07 1108 batadv_hash_destroy(hash);
a73105b8 1109
807736f6 1110 bat_priv->tt.local_hash = NULL;
c6c8fea2
SE
1111}
1112
56303d34 1113static int batadv_tt_global_init(struct batadv_priv *bat_priv)
c6c8fea2 1114{
807736f6 1115 if (bat_priv->tt.global_hash)
5346c35e 1116 return 0;
c6c8fea2 1117
807736f6 1118 bat_priv->tt.global_hash = batadv_hash_new(1024);
c6c8fea2 1119
807736f6 1120 if (!bat_priv->tt.global_hash)
5346c35e 1121 return -ENOMEM;
c6c8fea2 1122
dec05074
AQ
1123 batadv_hash_set_lock_class(bat_priv->tt.global_hash,
1124 &batadv_tt_global_hash_lock_class_key);
1125
5346c35e 1126 return 0;
c6c8fea2
SE
1127}
1128
56303d34 1129static void batadv_tt_changes_list_free(struct batadv_priv *bat_priv)
c6c8fea2 1130{
56303d34 1131 struct batadv_tt_change_node *entry, *safe;
c6c8fea2 1132
807736f6 1133 spin_lock_bh(&bat_priv->tt.changes_list_lock);
c6c8fea2 1134
807736f6 1135 list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
a73105b8
AQ
1136 list) {
1137 list_del(&entry->list);
1138 kfree(entry);
1139 }
c6c8fea2 1140
807736f6
SE
1141 atomic_set(&bat_priv->tt.local_changes, 0);
1142 spin_unlock_bh(&bat_priv->tt.changes_list_lock);
a73105b8 1143}
c6c8fea2 1144
d657e621
AQ
1145/* retrieves the orig_tt_list_entry belonging to orig_node from the
1146 * batadv_tt_global_entry list
1147 *
1148 * returns it with an increased refcounter, NULL if not found
db08e6e5 1149 */
d657e621
AQ
1150static struct batadv_tt_orig_list_entry *
1151batadv_tt_global_orig_entry_find(const struct batadv_tt_global_entry *entry,
1152 const struct batadv_orig_node *orig_node)
db08e6e5 1153{
d657e621 1154 struct batadv_tt_orig_list_entry *tmp_orig_entry, *orig_entry = NULL;
db08e6e5 1155 const struct hlist_head *head;
db08e6e5
SW
1156
1157 rcu_read_lock();
1158 head = &entry->orig_list;
b67bfe0d 1159 hlist_for_each_entry_rcu(tmp_orig_entry, head, list) {
d657e621
AQ
1160 if (tmp_orig_entry->orig_node != orig_node)
1161 continue;
1162 if (!atomic_inc_not_zero(&tmp_orig_entry->refcount))
1163 continue;
1164
1165 orig_entry = tmp_orig_entry;
1166 break;
db08e6e5
SW
1167 }
1168 rcu_read_unlock();
d657e621
AQ
1169
1170 return orig_entry;
1171}
1172
1173/* find out if an orig_node is already in the list of a tt_global_entry.
1174 * returns true if found, false otherwise
1175 */
1176static bool
1177batadv_tt_global_entry_has_orig(const struct batadv_tt_global_entry *entry,
1178 const struct batadv_orig_node *orig_node)
1179{
1180 struct batadv_tt_orig_list_entry *orig_entry;
1181 bool found = false;
1182
1183 orig_entry = batadv_tt_global_orig_entry_find(entry, orig_node);
1184 if (orig_entry) {
1185 found = true;
1186 batadv_tt_orig_list_entry_free_ref(orig_entry);
1187 }
1188
db08e6e5
SW
1189 return found;
1190}
1191
a513088d 1192static void
d657e621 1193batadv_tt_global_orig_entry_add(struct batadv_tt_global_entry *tt_global,
56303d34 1194 struct batadv_orig_node *orig_node, int ttvn)
db08e6e5 1195{
56303d34 1196 struct batadv_tt_orig_list_entry *orig_entry;
db08e6e5 1197
d657e621 1198 orig_entry = batadv_tt_global_orig_entry_find(tt_global, orig_node);
30cfd02b
AQ
1199 if (orig_entry) {
1200 /* refresh the ttvn: the current value could be a bogus one that
1201 * was added during a "temporary client detection"
1202 */
1203 orig_entry->ttvn = ttvn;
d657e621 1204 goto out;
30cfd02b 1205 }
d657e621 1206
db08e6e5
SW
1207 orig_entry = kzalloc(sizeof(*orig_entry), GFP_ATOMIC);
1208 if (!orig_entry)
d657e621 1209 goto out;
db08e6e5
SW
1210
1211 INIT_HLIST_NODE(&orig_entry->list);
1212 atomic_inc(&orig_node->refcount);
7ea7b4a1 1213 batadv_tt_global_size_inc(orig_node, tt_global->common.vid);
db08e6e5
SW
1214 orig_entry->orig_node = orig_node;
1215 orig_entry->ttvn = ttvn;
d657e621 1216 atomic_set(&orig_entry->refcount, 2);
db08e6e5 1217
d657e621 1218 spin_lock_bh(&tt_global->list_lock);
db08e6e5 1219 hlist_add_head_rcu(&orig_entry->list,
d657e621
AQ
1220 &tt_global->orig_list);
1221 spin_unlock_bh(&tt_global->list_lock);
1222out:
1223 if (orig_entry)
1224 batadv_tt_orig_list_entry_free_ref(orig_entry);
db08e6e5
SW
1225}
1226
d4ff40f6
AQ
1227/**
1228 * batadv_tt_global_add - add a new TT global entry or update an existing one
1229 * @bat_priv: the bat priv with all the soft interface information
1230 * @orig_node: the originator announcing the client
1231 * @tt_addr: the mac address of the non-mesh client
c018ad3d 1232 * @vid: VLAN identifier
d4ff40f6
AQ
1233 * @flags: TT flags that have to be set for this non-mesh client
1234 * @ttvn: the tt version number ever announcing this non-mesh client
1235 *
1236 * Add a new TT global entry for the given originator. If the entry already
1237 * exists add a new reference to the given originator (a global entry can have
1238 * references to multiple originators) and adjust the flags attribute to reflect
1239 * the function argument.
1240 * If a TT local entry exists for this non-mesh client remove it.
1241 *
1242 * The caller must hold orig_node refcount.
1e5d49fc
AQ
1243 *
1244 * Return true if the new entry has been added, false otherwise
d4ff40f6 1245 */
1e5d49fc
AQ
1246static bool batadv_tt_global_add(struct batadv_priv *bat_priv,
1247 struct batadv_orig_node *orig_node,
c018ad3d
AQ
1248 const unsigned char *tt_addr,
1249 unsigned short vid, uint16_t flags,
1e5d49fc 1250 uint8_t ttvn)
a73105b8 1251{
170173bf
SE
1252 struct batadv_tt_global_entry *tt_global_entry;
1253 struct batadv_tt_local_entry *tt_local_entry;
1e5d49fc 1254 bool ret = false;
80b3f58c 1255 int hash_added;
56303d34 1256 struct batadv_tt_common_entry *common;
7f91d06c 1257 uint16_t local_flags;
c6c8fea2 1258
cfd4f757
AQ
1259 /* ignore global entries from backbone nodes */
1260 if (batadv_bla_is_backbone_gw_orig(bat_priv, orig_node->orig, vid))
1261 return true;
1262
c018ad3d
AQ
1263 tt_global_entry = batadv_tt_global_hash_find(bat_priv, tt_addr, vid);
1264 tt_local_entry = batadv_tt_local_hash_find(bat_priv, tt_addr, vid);
068ee6e2
AQ
1265
1266 /* if the node already has a local client for this entry, it has to wait
1267 * for a roaming advertisement instead of manually messing up the global
1268 * table
1269 */
1270 if ((flags & BATADV_TT_CLIENT_TEMP) && tt_local_entry &&
1271 !(tt_local_entry->common.flags & BATADV_TT_CLIENT_NEW))
1272 goto out;
a73105b8
AQ
1273
1274 if (!tt_global_entry) {
d4f44692 1275 tt_global_entry = kzalloc(sizeof(*tt_global_entry), GFP_ATOMIC);
a73105b8 1276 if (!tt_global_entry)
7683fdc1
AQ
1277 goto out;
1278
c0a55929
SE
1279 common = &tt_global_entry->common;
1280 memcpy(common->addr, tt_addr, ETH_ALEN);
c018ad3d 1281 common->vid = vid;
db08e6e5 1282
d4f44692 1283 common->flags = flags;
cc47f66e 1284 tt_global_entry->roam_at = 0;
fdf79320
AQ
1285 /* node must store current time in case of roaming. This is
1286 * needed to purge this entry out on timeout (if nobody claims
1287 * it)
1288 */
1289 if (flags & BATADV_TT_CLIENT_ROAM)
1290 tt_global_entry->roam_at = jiffies;
c0a55929 1291 atomic_set(&common->refcount, 2);
30cfd02b 1292 common->added_at = jiffies;
db08e6e5
SW
1293
1294 INIT_HLIST_HEAD(&tt_global_entry->orig_list);
1295 spin_lock_init(&tt_global_entry->list_lock);
7683fdc1 1296
807736f6 1297 hash_added = batadv_hash_add(bat_priv->tt.global_hash,
a513088d 1298 batadv_compare_tt,
c018ad3d 1299 batadv_choose_tt, common,
a513088d 1300 &common->hash_entry);
80b3f58c
SW
1301
1302 if (unlikely(hash_added != 0)) {
1303 /* remove the reference for the hash */
a513088d 1304 batadv_tt_global_entry_free_ref(tt_global_entry);
80b3f58c
SW
1305 goto out_remove;
1306 }
a73105b8 1307 } else {
068ee6e2 1308 common = &tt_global_entry->common;
30cfd02b
AQ
1309 /* If there is already a global entry, we can use this one for
1310 * our processing.
068ee6e2
AQ
1311 * But if we are trying to add a temporary client then here are
1312 * two options at this point:
1313 * 1) the global client is not a temporary client: the global
1314 * client has to be left as it is, temporary information
1315 * should never override any already known client state
1316 * 2) the global client is a temporary client: purge the
1317 * originator list and add the new one orig_entry
30cfd02b 1318 */
068ee6e2
AQ
1319 if (flags & BATADV_TT_CLIENT_TEMP) {
1320 if (!(common->flags & BATADV_TT_CLIENT_TEMP))
1321 goto out;
1322 if (batadv_tt_global_entry_has_orig(tt_global_entry,
1323 orig_node))
1324 goto out_remove;
1325 batadv_tt_global_del_orig_list(tt_global_entry);
1326 goto add_orig_entry;
1327 }
30cfd02b
AQ
1328
1329 /* if the client was temporary added before receiving the first
1330 * OGM announcing it, we have to clear the TEMP flag
1331 */
068ee6e2 1332 common->flags &= ~BATADV_TT_CLIENT_TEMP;
db08e6e5 1333
e9c00136
AQ
1334 /* the change can carry possible "attribute" flags like the
1335 * TT_CLIENT_WIFI, therefore they have to be copied in the
1336 * client entry
1337 */
1338 tt_global_entry->common.flags |= flags;
1339
acd34afa
SE
1340 /* If there is the BATADV_TT_CLIENT_ROAM flag set, there is only
1341 * one originator left in the list and we previously received a
db08e6e5
SW
1342 * delete + roaming change for this originator.
1343 *
1344 * We should first delete the old originator before adding the
1345 * new one.
1346 */
068ee6e2 1347 if (common->flags & BATADV_TT_CLIENT_ROAM) {
a513088d 1348 batadv_tt_global_del_orig_list(tt_global_entry);
068ee6e2 1349 common->flags &= ~BATADV_TT_CLIENT_ROAM;
db08e6e5 1350 tt_global_entry->roam_at = 0;
a73105b8
AQ
1351 }
1352 }
068ee6e2 1353add_orig_entry:
30cfd02b 1354 /* add the new orig_entry (if needed) or update it */
d657e621 1355 batadv_tt_global_orig_entry_add(tt_global_entry, orig_node, ttvn);
c6c8fea2 1356
39c75a51 1357 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789
AQ
1358 "Creating new global tt entry: %pM (vid: %d, via %pM)\n",
1359 common->addr, BATADV_PRINT_VID(common->vid),
1360 orig_node->orig);
1e5d49fc 1361 ret = true;
c6c8fea2 1362
80b3f58c 1363out_remove:
7f91d06c 1364
a73105b8 1365 /* remove address from local hash if present */
c018ad3d 1366 local_flags = batadv_tt_local_remove(bat_priv, tt_addr, vid,
7f91d06c 1367 "global tt received",
c1d07431 1368 flags & BATADV_TT_CLIENT_ROAM);
7f91d06c
AQ
1369 tt_global_entry->common.flags |= local_flags & BATADV_TT_CLIENT_WIFI;
1370
068ee6e2
AQ
1371 if (!(flags & BATADV_TT_CLIENT_ROAM))
1372 /* this is a normal global add. Therefore the client is not in a
1373 * roaming state anymore.
1374 */
1375 tt_global_entry->common.flags &= ~BATADV_TT_CLIENT_ROAM;
1376
7683fdc1
AQ
1377out:
1378 if (tt_global_entry)
a513088d 1379 batadv_tt_global_entry_free_ref(tt_global_entry);
068ee6e2
AQ
1380 if (tt_local_entry)
1381 batadv_tt_local_entry_free_ref(tt_local_entry);
7683fdc1 1382 return ret;
c6c8fea2
SE
1383}
1384
981d8900 1385/* batadv_transtable_best_orig - Get best originator list entry from tt entry
4627456a 1386 * @bat_priv: the bat priv with all the soft interface information
981d8900
SE
1387 * @tt_global_entry: global translation table entry to be analyzed
1388 *
1389 * This functon assumes the caller holds rcu_read_lock().
1390 * Returns best originator list entry or NULL on errors.
1391 */
1392static struct batadv_tt_orig_list_entry *
4627456a
AQ
1393batadv_transtable_best_orig(struct batadv_priv *bat_priv,
1394 struct batadv_tt_global_entry *tt_global_entry)
981d8900 1395{
4627456a
AQ
1396 struct batadv_neigh_node *router, *best_router = NULL;
1397 struct batadv_algo_ops *bao = bat_priv->bat_algo_ops;
981d8900 1398 struct hlist_head *head;
981d8900 1399 struct batadv_tt_orig_list_entry *orig_entry, *best_entry = NULL;
981d8900
SE
1400
1401 head = &tt_global_entry->orig_list;
b67bfe0d 1402 hlist_for_each_entry_rcu(orig_entry, head, list) {
7351a482
SW
1403 router = batadv_orig_router_get(orig_entry->orig_node,
1404 BATADV_IF_DEFAULT);
981d8900
SE
1405 if (!router)
1406 continue;
1407
4627456a 1408 if (best_router &&
89652331
SW
1409 bao->bat_neigh_cmp(router, BATADV_IF_DEFAULT,
1410 best_router, BATADV_IF_DEFAULT) <= 0) {
4627456a
AQ
1411 batadv_neigh_node_free_ref(router);
1412 continue;
981d8900
SE
1413 }
1414
4627456a
AQ
1415 /* release the refcount for the "old" best */
1416 if (best_router)
1417 batadv_neigh_node_free_ref(best_router);
1418
1419 best_entry = orig_entry;
1420 best_router = router;
981d8900
SE
1421 }
1422
4627456a
AQ
1423 if (best_router)
1424 batadv_neigh_node_free_ref(best_router);
1425
981d8900
SE
1426 return best_entry;
1427}
1428
1429/* batadv_tt_global_print_entry - print all orig nodes who announce the address
1430 * for this global entry
4627456a 1431 * @bat_priv: the bat priv with all the soft interface information
981d8900
SE
1432 * @tt_global_entry: global translation table entry to be printed
1433 * @seq: debugfs table seq_file struct
1434 *
1435 * This functon assumes the caller holds rcu_read_lock().
db08e6e5 1436 */
a513088d 1437static void
4627456a
AQ
1438batadv_tt_global_print_entry(struct batadv_priv *bat_priv,
1439 struct batadv_tt_global_entry *tt_global_entry,
a513088d 1440 struct seq_file *seq)
db08e6e5 1441{
981d8900 1442 struct batadv_tt_orig_list_entry *orig_entry, *best_entry;
56303d34 1443 struct batadv_tt_common_entry *tt_common_entry;
7ea7b4a1
AQ
1444 struct batadv_orig_node_vlan *vlan;
1445 struct hlist_head *head;
db08e6e5 1446 uint8_t last_ttvn;
7ea7b4a1 1447 uint16_t flags;
db08e6e5
SW
1448
1449 tt_common_entry = &tt_global_entry->common;
981d8900
SE
1450 flags = tt_common_entry->flags;
1451
4627456a 1452 best_entry = batadv_transtable_best_orig(bat_priv, tt_global_entry);
981d8900 1453 if (best_entry) {
7ea7b4a1
AQ
1454 vlan = batadv_orig_node_vlan_get(best_entry->orig_node,
1455 tt_common_entry->vid);
1456 if (!vlan) {
1457 seq_printf(seq,
1458 " * Cannot retrieve VLAN %d for originator %pM\n",
1459 BATADV_PRINT_VID(tt_common_entry->vid),
1460 best_entry->orig_node->orig);
1461 goto print_list;
1462 }
1463
981d8900 1464 last_ttvn = atomic_read(&best_entry->orig_node->last_ttvn);
f9d8a537 1465 seq_printf(seq,
dd24ddb2 1466 " %c %pM %4i (%3u) via %pM (%3u) (%#.8x) [%c%c%c%c]\n",
981d8900 1467 '*', tt_global_entry->common.addr,
16052789 1468 BATADV_PRINT_VID(tt_global_entry->common.vid),
981d8900 1469 best_entry->ttvn, best_entry->orig_node->orig,
7ea7b4a1 1470 last_ttvn, vlan->tt.crc,
981d8900
SE
1471 (flags & BATADV_TT_CLIENT_ROAM ? 'R' : '.'),
1472 (flags & BATADV_TT_CLIENT_WIFI ? 'W' : '.'),
dd24ddb2 1473 (flags & BATADV_TT_CLIENT_ISOLA ? 'I' : '.'),
981d8900 1474 (flags & BATADV_TT_CLIENT_TEMP ? 'T' : '.'));
7ea7b4a1
AQ
1475
1476 batadv_orig_node_vlan_free_ref(vlan);
981d8900 1477 }
db08e6e5 1478
7ea7b4a1 1479print_list:
db08e6e5
SW
1480 head = &tt_global_entry->orig_list;
1481
b67bfe0d 1482 hlist_for_each_entry_rcu(orig_entry, head, list) {
981d8900
SE
1483 if (best_entry == orig_entry)
1484 continue;
1485
7ea7b4a1
AQ
1486 vlan = batadv_orig_node_vlan_get(orig_entry->orig_node,
1487 tt_common_entry->vid);
1488 if (!vlan) {
1489 seq_printf(seq,
1490 " + Cannot retrieve VLAN %d for originator %pM\n",
1491 BATADV_PRINT_VID(tt_common_entry->vid),
1492 orig_entry->orig_node->orig);
1493 continue;
1494 }
1495
db08e6e5 1496 last_ttvn = atomic_read(&orig_entry->orig_node->last_ttvn);
16052789 1497 seq_printf(seq,
dd24ddb2 1498 " %c %pM %4d (%3u) via %pM (%3u) (%#.8x) [%c%c%c%c]\n",
981d8900 1499 '+', tt_global_entry->common.addr,
16052789 1500 BATADV_PRINT_VID(tt_global_entry->common.vid),
981d8900 1501 orig_entry->ttvn, orig_entry->orig_node->orig,
7ea7b4a1 1502 last_ttvn, vlan->tt.crc,
acd34afa 1503 (flags & BATADV_TT_CLIENT_ROAM ? 'R' : '.'),
30cfd02b 1504 (flags & BATADV_TT_CLIENT_WIFI ? 'W' : '.'),
dd24ddb2 1505 (flags & BATADV_TT_CLIENT_ISOLA ? 'I' : '.'),
30cfd02b 1506 (flags & BATADV_TT_CLIENT_TEMP ? 'T' : '.'));
7ea7b4a1
AQ
1507
1508 batadv_orig_node_vlan_free_ref(vlan);
db08e6e5
SW
1509 }
1510}
1511
08c36d3e 1512int batadv_tt_global_seq_print_text(struct seq_file *seq, void *offset)
c6c8fea2
SE
1513{
1514 struct net_device *net_dev = (struct net_device *)seq->private;
56303d34 1515 struct batadv_priv *bat_priv = netdev_priv(net_dev);
807736f6 1516 struct batadv_hashtable *hash = bat_priv->tt.global_hash;
56303d34
SE
1517 struct batadv_tt_common_entry *tt_common_entry;
1518 struct batadv_tt_global_entry *tt_global;
1519 struct batadv_hard_iface *primary_if;
c6c8fea2 1520 struct hlist_head *head;
c90681b8 1521 uint32_t i;
c6c8fea2 1522
30da63a6
ML
1523 primary_if = batadv_seq_print_text_primary_if_get(seq);
1524 if (!primary_if)
32ae9b22 1525 goto out;
c6c8fea2 1526
2dafb49d
AQ
1527 seq_printf(seq,
1528 "Globally announced TT entries received via the mesh %s\n",
c6c8fea2 1529 net_dev->name);
16052789
AQ
1530 seq_printf(seq, " %-13s %s %s %-15s %s (%-10s) %s\n",
1531 "Client", "VID", "(TTVN)", "Originator", "(Curr TTVN)",
1532 "CRC", "Flags");
c6c8fea2 1533
c6c8fea2
SE
1534 for (i = 0; i < hash->size; i++) {
1535 head = &hash->table[i];
1536
7aadf889 1537 rcu_read_lock();
b67bfe0d 1538 hlist_for_each_entry_rcu(tt_common_entry,
7aadf889 1539 head, hash_entry) {
56303d34
SE
1540 tt_global = container_of(tt_common_entry,
1541 struct batadv_tt_global_entry,
1542 common);
4627456a 1543 batadv_tt_global_print_entry(bat_priv, tt_global, seq);
c6c8fea2 1544 }
7aadf889 1545 rcu_read_unlock();
c6c8fea2 1546 }
32ae9b22
ML
1547out:
1548 if (primary_if)
e5d89254 1549 batadv_hardif_free_ref(primary_if);
30da63a6 1550 return 0;
c6c8fea2
SE
1551}
1552
db08e6e5 1553/* deletes the orig list of a tt_global_entry */
a513088d 1554static void
56303d34 1555batadv_tt_global_del_orig_list(struct batadv_tt_global_entry *tt_global_entry)
c6c8fea2 1556{
db08e6e5 1557 struct hlist_head *head;
b67bfe0d 1558 struct hlist_node *safe;
56303d34 1559 struct batadv_tt_orig_list_entry *orig_entry;
a73105b8 1560
db08e6e5
SW
1561 spin_lock_bh(&tt_global_entry->list_lock);
1562 head = &tt_global_entry->orig_list;
b67bfe0d
SL
1563 hlist_for_each_entry_safe(orig_entry, safe, head, list) {
1564 hlist_del_rcu(&orig_entry->list);
7ea7b4a1
AQ
1565 batadv_tt_global_size_dec(orig_entry->orig_node,
1566 tt_global_entry->common.vid);
a513088d 1567 batadv_tt_orig_list_entry_free_ref(orig_entry);
db08e6e5
SW
1568 }
1569 spin_unlock_bh(&tt_global_entry->list_lock);
db08e6e5
SW
1570}
1571
a513088d 1572static void
56303d34
SE
1573batadv_tt_global_del_orig_entry(struct batadv_priv *bat_priv,
1574 struct batadv_tt_global_entry *tt_global_entry,
1575 struct batadv_orig_node *orig_node,
a513088d 1576 const char *message)
db08e6e5
SW
1577{
1578 struct hlist_head *head;
b67bfe0d 1579 struct hlist_node *safe;
56303d34 1580 struct batadv_tt_orig_list_entry *orig_entry;
16052789 1581 unsigned short vid;
db08e6e5
SW
1582
1583 spin_lock_bh(&tt_global_entry->list_lock);
1584 head = &tt_global_entry->orig_list;
b67bfe0d 1585 hlist_for_each_entry_safe(orig_entry, safe, head, list) {
db08e6e5 1586 if (orig_entry->orig_node == orig_node) {
16052789 1587 vid = tt_global_entry->common.vid;
39c75a51 1588 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789 1589 "Deleting %pM from global tt entry %pM (vid: %d): %s\n",
1eda58bf 1590 orig_node->orig,
16052789
AQ
1591 tt_global_entry->common.addr,
1592 BATADV_PRINT_VID(vid), message);
b67bfe0d 1593 hlist_del_rcu(&orig_entry->list);
7ea7b4a1
AQ
1594 batadv_tt_global_size_dec(orig_node,
1595 tt_global_entry->common.vid);
a513088d 1596 batadv_tt_orig_list_entry_free_ref(orig_entry);
db08e6e5
SW
1597 }
1598 }
1599 spin_unlock_bh(&tt_global_entry->list_lock);
1600}
1601
db08e6e5 1602/* If the client is to be deleted, we check if it is the last origantor entry
acd34afa
SE
1603 * within tt_global entry. If yes, we set the BATADV_TT_CLIENT_ROAM flag and the
1604 * timer, otherwise we simply remove the originator scheduled for deletion.
db08e6e5 1605 */
a513088d 1606static void
56303d34
SE
1607batadv_tt_global_del_roaming(struct batadv_priv *bat_priv,
1608 struct batadv_tt_global_entry *tt_global_entry,
1609 struct batadv_orig_node *orig_node,
1610 const char *message)
db08e6e5
SW
1611{
1612 bool last_entry = true;
1613 struct hlist_head *head;
56303d34 1614 struct batadv_tt_orig_list_entry *orig_entry;
db08e6e5
SW
1615
1616 /* no local entry exists, case 1:
1617 * Check if this is the last one or if other entries exist.
1618 */
1619
1620 rcu_read_lock();
1621 head = &tt_global_entry->orig_list;
b67bfe0d 1622 hlist_for_each_entry_rcu(orig_entry, head, list) {
db08e6e5
SW
1623 if (orig_entry->orig_node != orig_node) {
1624 last_entry = false;
1625 break;
1626 }
1627 }
1628 rcu_read_unlock();
1629
1630 if (last_entry) {
1631 /* its the last one, mark for roaming. */
acd34afa 1632 tt_global_entry->common.flags |= BATADV_TT_CLIENT_ROAM;
db08e6e5
SW
1633 tt_global_entry->roam_at = jiffies;
1634 } else
1635 /* there is another entry, we can simply delete this
1636 * one and can still use the other one.
1637 */
a513088d
SE
1638 batadv_tt_global_del_orig_entry(bat_priv, tt_global_entry,
1639 orig_node, message);
db08e6e5
SW
1640}
1641
c018ad3d
AQ
1642/**
1643 * batadv_tt_global_del - remove a client from the global table
1644 * @bat_priv: the bat priv with all the soft interface information
1645 * @orig_node: an originator serving this client
1646 * @addr: the mac address of the client
1647 * @vid: VLAN identifier
1648 * @message: a message explaining the reason for deleting the client to print
1649 * for debugging purpose
1650 * @roaming: true if the deletion has been triggered by a roaming event
1651 */
56303d34
SE
1652static void batadv_tt_global_del(struct batadv_priv *bat_priv,
1653 struct batadv_orig_node *orig_node,
c018ad3d 1654 const unsigned char *addr, unsigned short vid,
a513088d 1655 const char *message, bool roaming)
a73105b8 1656{
170173bf 1657 struct batadv_tt_global_entry *tt_global_entry;
56303d34 1658 struct batadv_tt_local_entry *local_entry = NULL;
a73105b8 1659
c018ad3d 1660 tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
db08e6e5 1661 if (!tt_global_entry)
7683fdc1 1662 goto out;
a73105b8 1663
db08e6e5 1664 if (!roaming) {
a513088d
SE
1665 batadv_tt_global_del_orig_entry(bat_priv, tt_global_entry,
1666 orig_node, message);
db08e6e5
SW
1667
1668 if (hlist_empty(&tt_global_entry->orig_list))
be73b488
AQ
1669 batadv_tt_global_free(bat_priv, tt_global_entry,
1670 message);
db08e6e5
SW
1671
1672 goto out;
1673 }
92f90f56
SE
1674
1675 /* if we are deleting a global entry due to a roam
1676 * event, there are two possibilities:
db08e6e5
SW
1677 * 1) the client roamed from node A to node B => if there
1678 * is only one originator left for this client, we mark
acd34afa 1679 * it with BATADV_TT_CLIENT_ROAM, we start a timer and we
92f90f56
SE
1680 * wait for node B to claim it. In case of timeout
1681 * the entry is purged.
db08e6e5
SW
1682 *
1683 * If there are other originators left, we directly delete
1684 * the originator.
92f90f56 1685 * 2) the client roamed to us => we can directly delete
9cfc7bd6
SE
1686 * the global entry, since it is useless now.
1687 */
a513088d 1688 local_entry = batadv_tt_local_hash_find(bat_priv,
c018ad3d
AQ
1689 tt_global_entry->common.addr,
1690 vid);
a513088d 1691 if (local_entry) {
db08e6e5 1692 /* local entry exists, case 2: client roamed to us. */
a513088d 1693 batadv_tt_global_del_orig_list(tt_global_entry);
be73b488 1694 batadv_tt_global_free(bat_priv, tt_global_entry, message);
db08e6e5
SW
1695 } else
1696 /* no local entry exists, case 1: check for roaming */
a513088d
SE
1697 batadv_tt_global_del_roaming(bat_priv, tt_global_entry,
1698 orig_node, message);
92f90f56 1699
92f90f56 1700
cc47f66e 1701out:
7683fdc1 1702 if (tt_global_entry)
a513088d
SE
1703 batadv_tt_global_entry_free_ref(tt_global_entry);
1704 if (local_entry)
1705 batadv_tt_local_entry_free_ref(local_entry);
a73105b8
AQ
1706}
1707
95fb130d
AQ
1708/**
1709 * batadv_tt_global_del_orig - remove all the TT global entries belonging to the
1710 * given originator matching the provided vid
1711 * @bat_priv: the bat priv with all the soft interface information
1712 * @orig_node: the originator owning the entries to remove
1713 * @match_vid: the VLAN identifier to match. If negative all the entries will be
1714 * removed
1715 * @message: debug message to print as "reason"
1716 */
56303d34
SE
1717void batadv_tt_global_del_orig(struct batadv_priv *bat_priv,
1718 struct batadv_orig_node *orig_node,
95fb130d 1719 int32_t match_vid,
56303d34 1720 const char *message)
c6c8fea2 1721{
56303d34
SE
1722 struct batadv_tt_global_entry *tt_global;
1723 struct batadv_tt_common_entry *tt_common_entry;
c90681b8 1724 uint32_t i;
807736f6 1725 struct batadv_hashtable *hash = bat_priv->tt.global_hash;
b67bfe0d 1726 struct hlist_node *safe;
a73105b8 1727 struct hlist_head *head;
7683fdc1 1728 spinlock_t *list_lock; /* protects write access to the hash lists */
16052789 1729 unsigned short vid;
c6c8fea2 1730
6e801494
SW
1731 if (!hash)
1732 return;
1733
a73105b8
AQ
1734 for (i = 0; i < hash->size; i++) {
1735 head = &hash->table[i];
7683fdc1 1736 list_lock = &hash->list_locks[i];
c6c8fea2 1737
7683fdc1 1738 spin_lock_bh(list_lock);
b67bfe0d 1739 hlist_for_each_entry_safe(tt_common_entry, safe,
7c64fd98 1740 head, hash_entry) {
95fb130d
AQ
1741 /* remove only matching entries */
1742 if (match_vid >= 0 && tt_common_entry->vid != match_vid)
1743 continue;
1744
56303d34
SE
1745 tt_global = container_of(tt_common_entry,
1746 struct batadv_tt_global_entry,
1747 common);
db08e6e5 1748
56303d34 1749 batadv_tt_global_del_orig_entry(bat_priv, tt_global,
a513088d 1750 orig_node, message);
db08e6e5 1751
56303d34 1752 if (hlist_empty(&tt_global->orig_list)) {
16052789 1753 vid = tt_global->common.vid;
39c75a51 1754 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789
AQ
1755 "Deleting global tt entry %pM (vid: %d): %s\n",
1756 tt_global->common.addr,
1757 BATADV_PRINT_VID(vid), message);
b67bfe0d 1758 hlist_del_rcu(&tt_common_entry->hash_entry);
56303d34 1759 batadv_tt_global_entry_free_ref(tt_global);
7683fdc1 1760 }
a73105b8 1761 }
7683fdc1 1762 spin_unlock_bh(list_lock);
c6c8fea2 1763 }
17071578 1764 orig_node->tt_initialised = false;
c6c8fea2
SE
1765}
1766
30cfd02b
AQ
1767static bool batadv_tt_global_to_purge(struct batadv_tt_global_entry *tt_global,
1768 char **msg)
cc47f66e 1769{
30cfd02b
AQ
1770 bool purge = false;
1771 unsigned long roam_timeout = BATADV_TT_CLIENT_ROAM_TIMEOUT;
1772 unsigned long temp_timeout = BATADV_TT_CLIENT_TEMP_TIMEOUT;
42d0b044 1773
30cfd02b
AQ
1774 if ((tt_global->common.flags & BATADV_TT_CLIENT_ROAM) &&
1775 batadv_has_timed_out(tt_global->roam_at, roam_timeout)) {
1776 purge = true;
1777 *msg = "Roaming timeout\n";
1778 }
42d0b044 1779
30cfd02b
AQ
1780 if ((tt_global->common.flags & BATADV_TT_CLIENT_TEMP) &&
1781 batadv_has_timed_out(tt_global->common.added_at, temp_timeout)) {
1782 purge = true;
1783 *msg = "Temporary client timeout\n";
42d0b044 1784 }
30cfd02b
AQ
1785
1786 return purge;
42d0b044
SE
1787}
1788
30cfd02b 1789static void batadv_tt_global_purge(struct batadv_priv *bat_priv)
42d0b044 1790{
807736f6 1791 struct batadv_hashtable *hash = bat_priv->tt.global_hash;
cc47f66e 1792 struct hlist_head *head;
b67bfe0d 1793 struct hlist_node *node_tmp;
7683fdc1 1794 spinlock_t *list_lock; /* protects write access to the hash lists */
c90681b8 1795 uint32_t i;
30cfd02b
AQ
1796 char *msg = NULL;
1797 struct batadv_tt_common_entry *tt_common;
1798 struct batadv_tt_global_entry *tt_global;
cc47f66e 1799
cc47f66e
AQ
1800 for (i = 0; i < hash->size; i++) {
1801 head = &hash->table[i];
7683fdc1 1802 list_lock = &hash->list_locks[i];
cc47f66e 1803
7683fdc1 1804 spin_lock_bh(list_lock);
b67bfe0d 1805 hlist_for_each_entry_safe(tt_common, node_tmp, head,
30cfd02b
AQ
1806 hash_entry) {
1807 tt_global = container_of(tt_common,
1808 struct batadv_tt_global_entry,
1809 common);
1810
1811 if (!batadv_tt_global_to_purge(tt_global, &msg))
1812 continue;
1813
1814 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789
AQ
1815 "Deleting global tt entry %pM (vid: %d): %s\n",
1816 tt_global->common.addr,
1817 BATADV_PRINT_VID(tt_global->common.vid),
1818 msg);
30cfd02b 1819
b67bfe0d 1820 hlist_del_rcu(&tt_common->hash_entry);
30cfd02b
AQ
1821
1822 batadv_tt_global_entry_free_ref(tt_global);
1823 }
7683fdc1 1824 spin_unlock_bh(list_lock);
cc47f66e 1825 }
cc47f66e
AQ
1826}
1827
56303d34 1828static void batadv_tt_global_table_free(struct batadv_priv *bat_priv)
c6c8fea2 1829{
5bf74e9c 1830 struct batadv_hashtable *hash;
7683fdc1 1831 spinlock_t *list_lock; /* protects write access to the hash lists */
56303d34
SE
1832 struct batadv_tt_common_entry *tt_common_entry;
1833 struct batadv_tt_global_entry *tt_global;
b67bfe0d 1834 struct hlist_node *node_tmp;
7683fdc1 1835 struct hlist_head *head;
c90681b8 1836 uint32_t i;
7683fdc1 1837
807736f6 1838 if (!bat_priv->tt.global_hash)
c6c8fea2
SE
1839 return;
1840
807736f6 1841 hash = bat_priv->tt.global_hash;
7683fdc1
AQ
1842
1843 for (i = 0; i < hash->size; i++) {
1844 head = &hash->table[i];
1845 list_lock = &hash->list_locks[i];
1846
1847 spin_lock_bh(list_lock);
b67bfe0d 1848 hlist_for_each_entry_safe(tt_common_entry, node_tmp,
7683fdc1 1849 head, hash_entry) {
b67bfe0d 1850 hlist_del_rcu(&tt_common_entry->hash_entry);
56303d34
SE
1851 tt_global = container_of(tt_common_entry,
1852 struct batadv_tt_global_entry,
1853 common);
1854 batadv_tt_global_entry_free_ref(tt_global);
7683fdc1
AQ
1855 }
1856 spin_unlock_bh(list_lock);
1857 }
1858
1a8eaf07 1859 batadv_hash_destroy(hash);
7683fdc1 1860
807736f6 1861 bat_priv->tt.global_hash = NULL;
c6c8fea2
SE
1862}
1863
56303d34
SE
1864static bool
1865_batadv_is_ap_isolated(struct batadv_tt_local_entry *tt_local_entry,
1866 struct batadv_tt_global_entry *tt_global_entry)
59b699cd
AQ
1867{
1868 bool ret = false;
1869
acd34afa
SE
1870 if (tt_local_entry->common.flags & BATADV_TT_CLIENT_WIFI &&
1871 tt_global_entry->common.flags & BATADV_TT_CLIENT_WIFI)
59b699cd
AQ
1872 ret = true;
1873
2d2fcc2a
AQ
1874 /* check if the two clients are marked as isolated */
1875 if (tt_local_entry->common.flags & BATADV_TT_CLIENT_ISOLA &&
1876 tt_global_entry->common.flags & BATADV_TT_CLIENT_ISOLA)
1877 ret = true;
1878
59b699cd
AQ
1879 return ret;
1880}
1881
c018ad3d
AQ
1882/**
1883 * batadv_transtable_search - get the mesh destination for a given client
1884 * @bat_priv: the bat priv with all the soft interface information
1885 * @src: mac address of the source client
1886 * @addr: mac address of the destination client
1887 * @vid: VLAN identifier
1888 *
1889 * Returns a pointer to the originator that was selected as destination in the
1890 * mesh for contacting the client 'addr', NULL otherwise.
1891 * In case of multiple originators serving the same client, the function returns
1892 * the best one (best in terms of metric towards the destination node).
1893 *
1894 * If the two clients are AP isolated the function returns NULL.
1895 */
56303d34
SE
1896struct batadv_orig_node *batadv_transtable_search(struct batadv_priv *bat_priv,
1897 const uint8_t *src,
c018ad3d
AQ
1898 const uint8_t *addr,
1899 unsigned short vid)
c6c8fea2 1900{
56303d34
SE
1901 struct batadv_tt_local_entry *tt_local_entry = NULL;
1902 struct batadv_tt_global_entry *tt_global_entry = NULL;
1903 struct batadv_orig_node *orig_node = NULL;
981d8900 1904 struct batadv_tt_orig_list_entry *best_entry;
b8cbd81d 1905
eceb22ae 1906 if (src && batadv_vlan_ap_isola_get(bat_priv, vid)) {
c018ad3d 1907 tt_local_entry = batadv_tt_local_hash_find(bat_priv, src, vid);
068ee6e2
AQ
1908 if (!tt_local_entry ||
1909 (tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING))
3d393e47
AQ
1910 goto out;
1911 }
7aadf889 1912
c018ad3d 1913 tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
2dafb49d 1914 if (!tt_global_entry)
7b36e8ee 1915 goto out;
7aadf889 1916
3d393e47 1917 /* check whether the clients should not communicate due to AP
9cfc7bd6
SE
1918 * isolation
1919 */
a513088d
SE
1920 if (tt_local_entry &&
1921 _batadv_is_ap_isolated(tt_local_entry, tt_global_entry))
3d393e47
AQ
1922 goto out;
1923
db08e6e5 1924 rcu_read_lock();
4627456a 1925 best_entry = batadv_transtable_best_orig(bat_priv, tt_global_entry);
db08e6e5 1926 /* found anything? */
981d8900
SE
1927 if (best_entry)
1928 orig_node = best_entry->orig_node;
db08e6e5
SW
1929 if (orig_node && !atomic_inc_not_zero(&orig_node->refcount))
1930 orig_node = NULL;
1931 rcu_read_unlock();
981d8900 1932
7b36e8ee 1933out:
3d393e47 1934 if (tt_global_entry)
a513088d 1935 batadv_tt_global_entry_free_ref(tt_global_entry);
3d393e47 1936 if (tt_local_entry)
a513088d 1937 batadv_tt_local_entry_free_ref(tt_local_entry);
3d393e47 1938
7b36e8ee 1939 return orig_node;
c6c8fea2 1940}
a73105b8 1941
ced72933
AQ
1942/**
1943 * batadv_tt_global_crc - calculates the checksum of the local table belonging
1944 * to the given orig_node
1945 * @bat_priv: the bat priv with all the soft interface information
0ffa9e8d 1946 * @orig_node: originator for which the CRC should be computed
7ea7b4a1 1947 * @vid: VLAN identifier for which the CRC32 has to be computed
0ffa9e8d
AQ
1948 *
1949 * This function computes the checksum for the global table corresponding to a
1950 * specific originator. In particular, the checksum is computed as follows: For
1951 * each client connected to the originator the CRC32C of the MAC address and the
1952 * VID is computed and then all the CRC32Cs of the various clients are xor'ed
1953 * together.
1954 *
1955 * The idea behind is that CRC32C should be used as much as possible in order to
1956 * produce a unique hash of the table, but since the order which is used to feed
1957 * the CRC32C function affects the result and since every node in the network
1958 * probably sorts the clients differently, the hash function cannot be directly
1959 * computed over the entire table. Hence the CRC32C is used only on
1960 * the single client entry, while all the results are then xor'ed together
1961 * because the XOR operation can combine them all while trying to reduce the
1962 * noise as much as possible.
1963 *
1964 * Returns the checksum of the global table of a given originator.
ced72933
AQ
1965 */
1966static uint32_t batadv_tt_global_crc(struct batadv_priv *bat_priv,
7ea7b4a1
AQ
1967 struct batadv_orig_node *orig_node,
1968 unsigned short vid)
a73105b8 1969{
807736f6 1970 struct batadv_hashtable *hash = bat_priv->tt.global_hash;
56303d34
SE
1971 struct batadv_tt_common_entry *tt_common;
1972 struct batadv_tt_global_entry *tt_global;
a73105b8 1973 struct hlist_head *head;
0ffa9e8d 1974 uint32_t i, crc_tmp, crc = 0;
0eb01568 1975 uint8_t flags;
a73105b8
AQ
1976
1977 for (i = 0; i < hash->size; i++) {
1978 head = &hash->table[i];
1979
1980 rcu_read_lock();
b67bfe0d 1981 hlist_for_each_entry_rcu(tt_common, head, hash_entry) {
56303d34
SE
1982 tt_global = container_of(tt_common,
1983 struct batadv_tt_global_entry,
1984 common);
7ea7b4a1
AQ
1985 /* compute the CRC only for entries belonging to the
1986 * VLAN identified by the vid passed as parameter
1987 */
1988 if (tt_common->vid != vid)
1989 continue;
1990
db08e6e5
SW
1991 /* Roaming clients are in the global table for
1992 * consistency only. They don't have to be
1993 * taken into account while computing the
1994 * global crc
1995 */
acd34afa 1996 if (tt_common->flags & BATADV_TT_CLIENT_ROAM)
db08e6e5 1997 continue;
30cfd02b
AQ
1998 /* Temporary clients have not been announced yet, so
1999 * they have to be skipped while computing the global
2000 * crc
2001 */
2002 if (tt_common->flags & BATADV_TT_CLIENT_TEMP)
2003 continue;
db08e6e5
SW
2004
2005 /* find out if this global entry is announced by this
2006 * originator
2007 */
56303d34 2008 if (!batadv_tt_global_entry_has_orig(tt_global,
a513088d 2009 orig_node))
db08e6e5
SW
2010 continue;
2011
0ffa9e8d
AQ
2012 crc_tmp = crc32c(0, &tt_common->vid,
2013 sizeof(tt_common->vid));
0eb01568
AQ
2014
2015 /* compute the CRC on flags that have to be kept in sync
2016 * among nodes
2017 */
2018 flags = tt_common->flags & BATADV_TT_SYNC_MASK;
2019 crc_tmp = crc32c(crc_tmp, &flags, sizeof(flags));
2020
0ffa9e8d 2021 crc ^= crc32c(crc_tmp, tt_common->addr, ETH_ALEN);
a73105b8
AQ
2022 }
2023 rcu_read_unlock();
2024 }
2025
ced72933 2026 return crc;
a73105b8
AQ
2027}
2028
ced72933
AQ
2029/**
2030 * batadv_tt_local_crc - calculates the checksum of the local table
2031 * @bat_priv: the bat priv with all the soft interface information
7ea7b4a1 2032 * @vid: VLAN identifier for which the CRC32 has to be computed
0ffa9e8d
AQ
2033 *
2034 * For details about the computation, please refer to the documentation for
2035 * batadv_tt_global_crc().
2036 *
2037 * Returns the checksum of the local table
ced72933 2038 */
7ea7b4a1
AQ
2039static uint32_t batadv_tt_local_crc(struct batadv_priv *bat_priv,
2040 unsigned short vid)
a73105b8 2041{
807736f6 2042 struct batadv_hashtable *hash = bat_priv->tt.local_hash;
56303d34 2043 struct batadv_tt_common_entry *tt_common;
a73105b8 2044 struct hlist_head *head;
0ffa9e8d 2045 uint32_t i, crc_tmp, crc = 0;
0eb01568 2046 uint8_t flags;
a73105b8
AQ
2047
2048 for (i = 0; i < hash->size; i++) {
2049 head = &hash->table[i];
2050
2051 rcu_read_lock();
b67bfe0d 2052 hlist_for_each_entry_rcu(tt_common, head, hash_entry) {
7ea7b4a1
AQ
2053 /* compute the CRC only for entries belonging to the
2054 * VLAN identified by vid
2055 */
2056 if (tt_common->vid != vid)
2057 continue;
2058
058d0e26 2059 /* not yet committed clients have not to be taken into
9cfc7bd6
SE
2060 * account while computing the CRC
2061 */
acd34afa 2062 if (tt_common->flags & BATADV_TT_CLIENT_NEW)
058d0e26 2063 continue;
ced72933 2064
0ffa9e8d
AQ
2065 crc_tmp = crc32c(0, &tt_common->vid,
2066 sizeof(tt_common->vid));
0eb01568
AQ
2067
2068 /* compute the CRC on flags that have to be kept in sync
2069 * among nodes
2070 */
2071 flags = tt_common->flags & BATADV_TT_SYNC_MASK;
2072 crc_tmp = crc32c(crc_tmp, &flags, sizeof(flags));
2073
0ffa9e8d 2074 crc ^= crc32c(crc_tmp, tt_common->addr, ETH_ALEN);
a73105b8 2075 }
a73105b8
AQ
2076 rcu_read_unlock();
2077 }
2078
ced72933 2079 return crc;
a73105b8
AQ
2080}
2081
56303d34 2082static void batadv_tt_req_list_free(struct batadv_priv *bat_priv)
a73105b8 2083{
56303d34 2084 struct batadv_tt_req_node *node, *safe;
a73105b8 2085
807736f6 2086 spin_lock_bh(&bat_priv->tt.req_list_lock);
a73105b8 2087
807736f6 2088 list_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
a73105b8
AQ
2089 list_del(&node->list);
2090 kfree(node);
2091 }
2092
807736f6 2093 spin_unlock_bh(&bat_priv->tt.req_list_lock);
a73105b8
AQ
2094}
2095
56303d34
SE
2096static void batadv_tt_save_orig_buffer(struct batadv_priv *bat_priv,
2097 struct batadv_orig_node *orig_node,
e8cf234a
AQ
2098 const void *tt_buff,
2099 uint16_t tt_buff_len)
a73105b8 2100{
a73105b8 2101 /* Replace the old buffer only if I received something in the
9cfc7bd6
SE
2102 * last OGM (the OGM could carry no changes)
2103 */
a73105b8
AQ
2104 spin_lock_bh(&orig_node->tt_buff_lock);
2105 if (tt_buff_len > 0) {
2106 kfree(orig_node->tt_buff);
2107 orig_node->tt_buff_len = 0;
2108 orig_node->tt_buff = kmalloc(tt_buff_len, GFP_ATOMIC);
2109 if (orig_node->tt_buff) {
2110 memcpy(orig_node->tt_buff, tt_buff, tt_buff_len);
2111 orig_node->tt_buff_len = tt_buff_len;
2112 }
2113 }
2114 spin_unlock_bh(&orig_node->tt_buff_lock);
2115}
2116
56303d34 2117static void batadv_tt_req_purge(struct batadv_priv *bat_priv)
a73105b8 2118{
56303d34 2119 struct batadv_tt_req_node *node, *safe;
a73105b8 2120
807736f6
SE
2121 spin_lock_bh(&bat_priv->tt.req_list_lock);
2122 list_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
42d0b044
SE
2123 if (batadv_has_timed_out(node->issued_at,
2124 BATADV_TT_REQUEST_TIMEOUT)) {
a73105b8
AQ
2125 list_del(&node->list);
2126 kfree(node);
2127 }
2128 }
807736f6 2129 spin_unlock_bh(&bat_priv->tt.req_list_lock);
a73105b8
AQ
2130}
2131
2132/* returns the pointer to the new tt_req_node struct if no request
9cfc7bd6
SE
2133 * has already been issued for this orig_node, NULL otherwise
2134 */
56303d34
SE
2135static struct batadv_tt_req_node *
2136batadv_new_tt_req_node(struct batadv_priv *bat_priv,
2137 struct batadv_orig_node *orig_node)
a73105b8 2138{
56303d34 2139 struct batadv_tt_req_node *tt_req_node_tmp, *tt_req_node = NULL;
a73105b8 2140
807736f6
SE
2141 spin_lock_bh(&bat_priv->tt.req_list_lock);
2142 list_for_each_entry(tt_req_node_tmp, &bat_priv->tt.req_list, list) {
1eda58bf
SE
2143 if (batadv_compare_eth(tt_req_node_tmp, orig_node) &&
2144 !batadv_has_timed_out(tt_req_node_tmp->issued_at,
42d0b044 2145 BATADV_TT_REQUEST_TIMEOUT))
a73105b8
AQ
2146 goto unlock;
2147 }
2148
2149 tt_req_node = kmalloc(sizeof(*tt_req_node), GFP_ATOMIC);
2150 if (!tt_req_node)
2151 goto unlock;
2152
2153 memcpy(tt_req_node->addr, orig_node->orig, ETH_ALEN);
2154 tt_req_node->issued_at = jiffies;
2155
807736f6 2156 list_add(&tt_req_node->list, &bat_priv->tt.req_list);
a73105b8 2157unlock:
807736f6 2158 spin_unlock_bh(&bat_priv->tt.req_list_lock);
a73105b8
AQ
2159 return tt_req_node;
2160}
2161
335fbe0f
ML
2162/**
2163 * batadv_tt_local_valid - verify that given tt entry is a valid one
2164 * @entry_ptr: to be checked local tt entry
2165 * @data_ptr: not used but definition required to satisfy the callback prototype
2166 *
2167 * Returns 1 if the entry is a valid, 0 otherwise.
2168 */
2169static int batadv_tt_local_valid(const void *entry_ptr, const void *data_ptr)
058d0e26 2170{
56303d34 2171 const struct batadv_tt_common_entry *tt_common_entry = entry_ptr;
058d0e26 2172
acd34afa 2173 if (tt_common_entry->flags & BATADV_TT_CLIENT_NEW)
058d0e26
AQ
2174 return 0;
2175 return 1;
2176}
2177
a513088d
SE
2178static int batadv_tt_global_valid(const void *entry_ptr,
2179 const void *data_ptr)
a73105b8 2180{
56303d34
SE
2181 const struct batadv_tt_common_entry *tt_common_entry = entry_ptr;
2182 const struct batadv_tt_global_entry *tt_global_entry;
2183 const struct batadv_orig_node *orig_node = data_ptr;
a73105b8 2184
30cfd02b
AQ
2185 if (tt_common_entry->flags & BATADV_TT_CLIENT_ROAM ||
2186 tt_common_entry->flags & BATADV_TT_CLIENT_TEMP)
cc47f66e
AQ
2187 return 0;
2188
56303d34
SE
2189 tt_global_entry = container_of(tt_common_entry,
2190 struct batadv_tt_global_entry,
48100bac
AQ
2191 common);
2192
a513088d 2193 return batadv_tt_global_entry_has_orig(tt_global_entry, orig_node);
a73105b8
AQ
2194}
2195
335fbe0f 2196/**
7ea7b4a1
AQ
2197 * batadv_tt_tvlv_generate - fill the tvlv buff with the tt entries from the
2198 * specified tt hash
335fbe0f
ML
2199 * @bat_priv: the bat priv with all the soft interface information
2200 * @hash: hash table containing the tt entries
2201 * @tt_len: expected tvlv tt data buffer length in number of bytes
7ea7b4a1 2202 * @tvlv_buff: pointer to the buffer to fill with the TT data
335fbe0f
ML
2203 * @valid_cb: function to filter tt change entries
2204 * @cb_data: data passed to the filter function as argument
335fbe0f 2205 */
7ea7b4a1
AQ
2206static void batadv_tt_tvlv_generate(struct batadv_priv *bat_priv,
2207 struct batadv_hashtable *hash,
2208 void *tvlv_buff, uint16_t tt_len,
2209 int (*valid_cb)(const void *, const void *),
2210 void *cb_data)
a73105b8 2211{
56303d34 2212 struct batadv_tt_common_entry *tt_common_entry;
335fbe0f 2213 struct batadv_tvlv_tt_change *tt_change;
a73105b8 2214 struct hlist_head *head;
335fbe0f 2215 uint16_t tt_tot, tt_num_entries = 0;
c90681b8 2216 uint32_t i;
a73105b8 2217
298e6e68 2218 tt_tot = batadv_tt_entries(tt_len);
7ea7b4a1 2219 tt_change = (struct batadv_tvlv_tt_change *)tvlv_buff;
a73105b8
AQ
2220
2221 rcu_read_lock();
2222 for (i = 0; i < hash->size; i++) {
2223 head = &hash->table[i];
2224
b67bfe0d 2225 hlist_for_each_entry_rcu(tt_common_entry,
a73105b8 2226 head, hash_entry) {
335fbe0f 2227 if (tt_tot == tt_num_entries)
a73105b8
AQ
2228 break;
2229
48100bac 2230 if ((valid_cb) && (!valid_cb(tt_common_entry, cb_data)))
a73105b8
AQ
2231 continue;
2232
48100bac
AQ
2233 memcpy(tt_change->addr, tt_common_entry->addr,
2234 ETH_ALEN);
27b37ebf 2235 tt_change->flags = tt_common_entry->flags;
c018ad3d 2236 tt_change->vid = htons(tt_common_entry->vid);
ca663046
AQ
2237 memset(tt_change->reserved, 0,
2238 sizeof(tt_change->reserved));
a73105b8 2239
335fbe0f 2240 tt_num_entries++;
a73105b8
AQ
2241 tt_change++;
2242 }
2243 }
2244 rcu_read_unlock();
7ea7b4a1 2245}
a73105b8 2246
7ea7b4a1
AQ
2247/**
2248 * batadv_tt_global_check_crc - check if all the CRCs are correct
2249 * @orig_node: originator for which the CRCs have to be checked
2250 * @tt_vlan: pointer to the first tvlv VLAN entry
2251 * @num_vlan: number of tvlv VLAN entries
2252 * @create: if true, create VLAN objects if not found
2253 *
2254 * Return true if all the received CRCs match the locally stored ones, false
2255 * otherwise
2256 */
2257static bool batadv_tt_global_check_crc(struct batadv_orig_node *orig_node,
2258 struct batadv_tvlv_tt_vlan_data *tt_vlan,
2259 uint16_t num_vlan)
2260{
2261 struct batadv_tvlv_tt_vlan_data *tt_vlan_tmp;
2262 struct batadv_orig_node_vlan *vlan;
2263 int i;
2264
2265 /* check if each received CRC matches the locally stored one */
2266 for (i = 0; i < num_vlan; i++) {
2267 tt_vlan_tmp = tt_vlan + i;
2268
2269 /* if orig_node is a backbone node for this VLAN, don't check
2270 * the CRC as we ignore all the global entries over it
2271 */
2272 if (batadv_bla_is_backbone_gw_orig(orig_node->bat_priv,
cfd4f757
AQ
2273 orig_node->orig,
2274 ntohs(tt_vlan_tmp->vid)))
7ea7b4a1
AQ
2275 continue;
2276
2277 vlan = batadv_orig_node_vlan_get(orig_node,
2278 ntohs(tt_vlan_tmp->vid));
2279 if (!vlan)
2280 return false;
2281
2282 if (vlan->tt.crc != ntohl(tt_vlan_tmp->crc))
2283 return false;
2284 }
2285
2286 return true;
2287}
2288
2289/**
2290 * batadv_tt_local_update_crc - update all the local CRCs
2291 * @bat_priv: the bat priv with all the soft interface information
2292 */
2293static void batadv_tt_local_update_crc(struct batadv_priv *bat_priv)
2294{
2295 struct batadv_softif_vlan *vlan;
2296
2297 /* recompute the global CRC for each VLAN */
2298 rcu_read_lock();
2299 hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
2300 vlan->tt.crc = batadv_tt_local_crc(bat_priv, vlan->vid);
2301 }
2302 rcu_read_unlock();
2303}
2304
2305/**
2306 * batadv_tt_global_update_crc - update all the global CRCs for this orig_node
2307 * @bat_priv: the bat priv with all the soft interface information
2308 * @orig_node: the orig_node for which the CRCs have to be updated
2309 */
2310static void batadv_tt_global_update_crc(struct batadv_priv *bat_priv,
2311 struct batadv_orig_node *orig_node)
2312{
2313 struct batadv_orig_node_vlan *vlan;
2314 uint32_t crc;
2315
2316 /* recompute the global CRC for each VLAN */
2317 rcu_read_lock();
2318 list_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) {
2319 /* if orig_node is a backbone node for this VLAN, don't compute
2320 * the CRC as we ignore all the global entries over it
2321 */
cfd4f757
AQ
2322 if (batadv_bla_is_backbone_gw_orig(bat_priv, orig_node->orig,
2323 vlan->vid))
7ea7b4a1
AQ
2324 continue;
2325
2326 crc = batadv_tt_global_crc(bat_priv, orig_node, vlan->vid);
2327 vlan->tt.crc = crc;
2328 }
2329 rcu_read_unlock();
a73105b8
AQ
2330}
2331
ced72933
AQ
2332/**
2333 * batadv_send_tt_request - send a TT Request message to a given node
2334 * @bat_priv: the bat priv with all the soft interface information
2335 * @dst_orig_node: the destination of the message
2336 * @ttvn: the version number that the source of the message is looking for
7ea7b4a1
AQ
2337 * @tt_vlan: pointer to the first tvlv VLAN object to request
2338 * @num_vlan: number of tvlv VLAN entries
ced72933
AQ
2339 * @full_table: ask for the entire translation table if true, while only for the
2340 * last TT diff otherwise
2341 */
56303d34
SE
2342static int batadv_send_tt_request(struct batadv_priv *bat_priv,
2343 struct batadv_orig_node *dst_orig_node,
7ea7b4a1
AQ
2344 uint8_t ttvn,
2345 struct batadv_tvlv_tt_vlan_data *tt_vlan,
2346 uint16_t num_vlan, bool full_table)
a73105b8 2347{
335fbe0f 2348 struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
56303d34 2349 struct batadv_tt_req_node *tt_req_node = NULL;
7ea7b4a1
AQ
2350 struct batadv_tvlv_tt_vlan_data *tt_vlan_req;
2351 struct batadv_hard_iface *primary_if;
335fbe0f 2352 bool ret = false;
7ea7b4a1 2353 int i, size;
a73105b8 2354
e5d89254 2355 primary_if = batadv_primary_if_get_selected(bat_priv);
a73105b8
AQ
2356 if (!primary_if)
2357 goto out;
2358
2359 /* The new tt_req will be issued only if I'm not waiting for a
9cfc7bd6
SE
2360 * reply from the same orig_node yet
2361 */
a513088d 2362 tt_req_node = batadv_new_tt_req_node(bat_priv, dst_orig_node);
a73105b8
AQ
2363 if (!tt_req_node)
2364 goto out;
2365
7ea7b4a1
AQ
2366 size = sizeof(*tvlv_tt_data) + sizeof(*tt_vlan_req) * num_vlan;
2367 tvlv_tt_data = kzalloc(size, GFP_ATOMIC);
335fbe0f 2368 if (!tvlv_tt_data)
a73105b8
AQ
2369 goto out;
2370
335fbe0f
ML
2371 tvlv_tt_data->flags = BATADV_TT_REQUEST;
2372 tvlv_tt_data->ttvn = ttvn;
7ea7b4a1
AQ
2373 tvlv_tt_data->num_vlan = htons(num_vlan);
2374
2375 /* send all the CRCs within the request. This is needed by intermediate
2376 * nodes to ensure they have the correct table before replying
2377 */
2378 tt_vlan_req = (struct batadv_tvlv_tt_vlan_data *)(tvlv_tt_data + 1);
2379 for (i = 0; i < num_vlan; i++) {
2380 tt_vlan_req->vid = tt_vlan->vid;
2381 tt_vlan_req->crc = tt_vlan->crc;
2382
2383 tt_vlan_req++;
2384 tt_vlan++;
2385 }
a73105b8
AQ
2386
2387 if (full_table)
335fbe0f 2388 tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
a73105b8 2389
bb351ba0 2390 batadv_dbg(BATADV_DBG_TT, bat_priv, "Sending TT_REQUEST to %pM [%c]\n",
335fbe0f 2391 dst_orig_node->orig, full_table ? 'F' : '.');
a73105b8 2392
d69909d2 2393 batadv_inc_counter(bat_priv, BATADV_CNT_TT_REQUEST_TX);
335fbe0f
ML
2394 batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
2395 dst_orig_node->orig, BATADV_TVLV_TT, 1,
7ea7b4a1 2396 tvlv_tt_data, size);
335fbe0f 2397 ret = true;
a73105b8
AQ
2398
2399out:
a73105b8 2400 if (primary_if)
e5d89254 2401 batadv_hardif_free_ref(primary_if);
a73105b8 2402 if (ret && tt_req_node) {
807736f6 2403 spin_lock_bh(&bat_priv->tt.req_list_lock);
a73105b8 2404 list_del(&tt_req_node->list);
807736f6 2405 spin_unlock_bh(&bat_priv->tt.req_list_lock);
a73105b8
AQ
2406 kfree(tt_req_node);
2407 }
335fbe0f 2408 kfree(tvlv_tt_data);
a73105b8
AQ
2409 return ret;
2410}
2411
335fbe0f
ML
2412/**
2413 * batadv_send_other_tt_response - send reply to tt request concerning another
2414 * node's translation table
2415 * @bat_priv: the bat priv with all the soft interface information
2416 * @tt_data: tt data containing the tt request information
2417 * @req_src: mac address of tt request sender
2418 * @req_dst: mac address of tt request recipient
2419 *
2420 * Returns true if tt request reply was sent, false otherwise.
2421 */
2422static bool batadv_send_other_tt_response(struct batadv_priv *bat_priv,
2423 struct batadv_tvlv_tt_data *tt_data,
2424 uint8_t *req_src, uint8_t *req_dst)
a73105b8 2425{
170173bf 2426 struct batadv_orig_node *req_dst_orig_node;
56303d34 2427 struct batadv_orig_node *res_dst_orig_node = NULL;
7ea7b4a1 2428 struct batadv_tvlv_tt_change *tt_change;
335fbe0f 2429 struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
7ea7b4a1 2430 struct batadv_tvlv_tt_vlan_data *tt_vlan;
335fbe0f 2431 bool ret = false, full_table;
7ea7b4a1
AQ
2432 uint8_t orig_ttvn, req_ttvn;
2433 uint16_t tvlv_len;
2434 int32_t tt_len;
a73105b8 2435
39c75a51 2436 batadv_dbg(BATADV_DBG_TT, bat_priv,
1eda58bf 2437 "Received TT_REQUEST from %pM for ttvn: %u (%pM) [%c]\n",
335fbe0f
ML
2438 req_src, tt_data->ttvn, req_dst,
2439 (tt_data->flags & BATADV_TT_FULL_TABLE ? 'F' : '.'));
a73105b8
AQ
2440
2441 /* Let's get the orig node of the REAL destination */
335fbe0f 2442 req_dst_orig_node = batadv_orig_hash_find(bat_priv, req_dst);
a73105b8
AQ
2443 if (!req_dst_orig_node)
2444 goto out;
2445
335fbe0f 2446 res_dst_orig_node = batadv_orig_hash_find(bat_priv, req_src);
a73105b8
AQ
2447 if (!res_dst_orig_node)
2448 goto out;
2449
a73105b8 2450 orig_ttvn = (uint8_t)atomic_read(&req_dst_orig_node->last_ttvn);
335fbe0f 2451 req_ttvn = tt_data->ttvn;
a73105b8 2452
7ea7b4a1 2453 tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(tt_data + 1);
335fbe0f 2454 /* this node doesn't have the requested data */
a73105b8 2455 if (orig_ttvn != req_ttvn ||
7ea7b4a1
AQ
2456 !batadv_tt_global_check_crc(req_dst_orig_node, tt_vlan,
2457 ntohs(tt_data->num_vlan)))
a73105b8
AQ
2458 goto out;
2459
015758d0 2460 /* If the full table has been explicitly requested */
335fbe0f 2461 if (tt_data->flags & BATADV_TT_FULL_TABLE ||
a73105b8
AQ
2462 !req_dst_orig_node->tt_buff)
2463 full_table = true;
2464 else
2465 full_table = false;
2466
335fbe0f
ML
2467 /* TT fragmentation hasn't been implemented yet, so send as many
2468 * TT entries fit a single packet as possible only
9cfc7bd6 2469 */
a73105b8
AQ
2470 if (!full_table) {
2471 spin_lock_bh(&req_dst_orig_node->tt_buff_lock);
2472 tt_len = req_dst_orig_node->tt_buff_len;
a73105b8 2473
7ea7b4a1
AQ
2474 tvlv_len = batadv_tt_prepare_tvlv_global_data(req_dst_orig_node,
2475 &tvlv_tt_data,
2476 &tt_change,
2477 &tt_len);
2478 if (!tt_len)
a73105b8
AQ
2479 goto unlock;
2480
a73105b8 2481 /* Copy the last orig_node's OGM buffer */
7ea7b4a1 2482 memcpy(tt_change, req_dst_orig_node->tt_buff,
a73105b8 2483 req_dst_orig_node->tt_buff_len);
a73105b8
AQ
2484 spin_unlock_bh(&req_dst_orig_node->tt_buff_lock);
2485 } else {
7ea7b4a1
AQ
2486 /* allocate the tvlv, put the tt_data and all the tt_vlan_data
2487 * in the initial part
2488 */
2489 tt_len = -1;
2490 tvlv_len = batadv_tt_prepare_tvlv_global_data(req_dst_orig_node,
2491 &tvlv_tt_data,
2492 &tt_change,
2493 &tt_len);
2494 if (!tt_len)
a73105b8 2495 goto out;
7ea7b4a1
AQ
2496
2497 /* fill the rest of the tvlv with the real TT entries */
2498 batadv_tt_tvlv_generate(bat_priv, bat_priv->tt.global_hash,
2499 tt_change, tt_len,
2500 batadv_tt_global_valid,
2501 req_dst_orig_node);
a73105b8
AQ
2502 }
2503
a19d3d85
ML
2504 /* Don't send the response, if larger than fragmented packet. */
2505 tt_len = sizeof(struct batadv_unicast_tvlv_packet) + tvlv_len;
2506 if (tt_len > atomic_read(&bat_priv->packet_size_max)) {
2507 net_ratelimited_function(batadv_info, bat_priv->soft_iface,
2508 "Ignoring TT_REQUEST from %pM; Response size exceeds max packet size.\n",
2509 res_dst_orig_node->orig);
2510 goto out;
2511 }
2512
335fbe0f
ML
2513 tvlv_tt_data->flags = BATADV_TT_RESPONSE;
2514 tvlv_tt_data->ttvn = req_ttvn;
a73105b8
AQ
2515
2516 if (full_table)
335fbe0f 2517 tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
a73105b8 2518
39c75a51 2519 batadv_dbg(BATADV_DBG_TT, bat_priv,
335fbe0f
ML
2520 "Sending TT_RESPONSE %pM for %pM [%c] (ttvn: %u)\n",
2521 res_dst_orig_node->orig, req_dst_orig_node->orig,
2522 full_table ? 'F' : '.', req_ttvn);
a73105b8 2523
d69909d2 2524 batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_TX);
f8214865 2525
335fbe0f 2526 batadv_tvlv_unicast_send(bat_priv, req_dst_orig_node->orig,
7ea7b4a1
AQ
2527 req_src, BATADV_TVLV_TT, 1, tvlv_tt_data,
2528 tvlv_len);
e91ecfc6 2529
335fbe0f 2530 ret = true;
a73105b8
AQ
2531 goto out;
2532
2533unlock:
2534 spin_unlock_bh(&req_dst_orig_node->tt_buff_lock);
2535
2536out:
2537 if (res_dst_orig_node)
7d211efc 2538 batadv_orig_node_free_ref(res_dst_orig_node);
a73105b8 2539 if (req_dst_orig_node)
7d211efc 2540 batadv_orig_node_free_ref(req_dst_orig_node);
335fbe0f 2541 kfree(tvlv_tt_data);
a73105b8 2542 return ret;
a73105b8 2543}
96412690 2544
335fbe0f
ML
2545/**
2546 * batadv_send_my_tt_response - send reply to tt request concerning this node's
2547 * translation table
2548 * @bat_priv: the bat priv with all the soft interface information
2549 * @tt_data: tt data containing the tt request information
2550 * @req_src: mac address of tt request sender
2551 *
2552 * Returns true if tt request reply was sent, false otherwise.
2553 */
2554static bool batadv_send_my_tt_response(struct batadv_priv *bat_priv,
2555 struct batadv_tvlv_tt_data *tt_data,
2556 uint8_t *req_src)
a73105b8 2557{
335fbe0f 2558 struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
56303d34 2559 struct batadv_hard_iface *primary_if = NULL;
7ea7b4a1
AQ
2560 struct batadv_tvlv_tt_change *tt_change;
2561 struct batadv_orig_node *orig_node;
335fbe0f 2562 uint8_t my_ttvn, req_ttvn;
7ea7b4a1 2563 uint16_t tvlv_len;
a73105b8 2564 bool full_table;
7ea7b4a1 2565 int32_t tt_len;
a73105b8 2566
39c75a51 2567 batadv_dbg(BATADV_DBG_TT, bat_priv,
1eda58bf 2568 "Received TT_REQUEST from %pM for ttvn: %u (me) [%c]\n",
335fbe0f
ML
2569 req_src, tt_data->ttvn,
2570 (tt_data->flags & BATADV_TT_FULL_TABLE ? 'F' : '.'));
a73105b8 2571
a70a9aa9 2572 spin_lock_bh(&bat_priv->tt.commit_lock);
a73105b8 2573
807736f6 2574 my_ttvn = (uint8_t)atomic_read(&bat_priv->tt.vn);
335fbe0f 2575 req_ttvn = tt_data->ttvn;
a73105b8 2576
335fbe0f 2577 orig_node = batadv_orig_hash_find(bat_priv, req_src);
a73105b8
AQ
2578 if (!orig_node)
2579 goto out;
2580
e5d89254 2581 primary_if = batadv_primary_if_get_selected(bat_priv);
a73105b8
AQ
2582 if (!primary_if)
2583 goto out;
2584
2585 /* If the full table has been explicitly requested or the gap
9cfc7bd6
SE
2586 * is too big send the whole local translation table
2587 */
335fbe0f 2588 if (tt_data->flags & BATADV_TT_FULL_TABLE || my_ttvn != req_ttvn ||
807736f6 2589 !bat_priv->tt.last_changeset)
a73105b8
AQ
2590 full_table = true;
2591 else
2592 full_table = false;
2593
335fbe0f
ML
2594 /* TT fragmentation hasn't been implemented yet, so send as many
2595 * TT entries fit a single packet as possible only
9cfc7bd6 2596 */
a73105b8 2597 if (!full_table) {
807736f6 2598 spin_lock_bh(&bat_priv->tt.last_changeset_lock);
a73105b8 2599
7ea7b4a1
AQ
2600 tt_len = bat_priv->tt.last_changeset_len;
2601 tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv,
2602 &tvlv_tt_data,
2603 &tt_change,
2604 &tt_len);
2605 if (!tt_len)
a73105b8
AQ
2606 goto unlock;
2607
335fbe0f 2608 /* Copy the last orig_node's OGM buffer */
7ea7b4a1 2609 memcpy(tt_change, bat_priv->tt.last_changeset,
807736f6
SE
2610 bat_priv->tt.last_changeset_len);
2611 spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
a73105b8 2612 } else {
335fbe0f
ML
2613 req_ttvn = (uint8_t)atomic_read(&bat_priv->tt.vn);
2614
7ea7b4a1
AQ
2615 /* allocate the tvlv, put the tt_data and all the tt_vlan_data
2616 * in the initial part
2617 */
2618 tt_len = -1;
2619 tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv,
2620 &tvlv_tt_data,
2621 &tt_change,
2622 &tt_len);
2623 if (!tt_len)
a73105b8 2624 goto out;
7ea7b4a1
AQ
2625
2626 /* fill the rest of the tvlv with the real TT entries */
2627 batadv_tt_tvlv_generate(bat_priv, bat_priv->tt.local_hash,
2628 tt_change, tt_len,
2629 batadv_tt_local_valid, NULL);
a73105b8
AQ
2630 }
2631
335fbe0f
ML
2632 tvlv_tt_data->flags = BATADV_TT_RESPONSE;
2633 tvlv_tt_data->ttvn = req_ttvn;
a73105b8
AQ
2634
2635 if (full_table)
335fbe0f 2636 tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
a73105b8 2637
39c75a51 2638 batadv_dbg(BATADV_DBG_TT, bat_priv,
335fbe0f
ML
2639 "Sending TT_RESPONSE to %pM [%c] (ttvn: %u)\n",
2640 orig_node->orig, full_table ? 'F' : '.', req_ttvn);
a73105b8 2641
d69909d2 2642 batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_TX);
f8214865 2643
335fbe0f 2644 batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
7ea7b4a1
AQ
2645 req_src, BATADV_TVLV_TT, 1, tvlv_tt_data,
2646 tvlv_len);
335fbe0f 2647
a73105b8
AQ
2648 goto out;
2649
2650unlock:
807736f6 2651 spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
a73105b8 2652out:
a70a9aa9 2653 spin_unlock_bh(&bat_priv->tt.commit_lock);
a73105b8 2654 if (orig_node)
7d211efc 2655 batadv_orig_node_free_ref(orig_node);
a73105b8 2656 if (primary_if)
e5d89254 2657 batadv_hardif_free_ref(primary_if);
335fbe0f
ML
2658 kfree(tvlv_tt_data);
2659 /* The packet was for this host, so it doesn't need to be re-routed */
a73105b8
AQ
2660 return true;
2661}
2662
335fbe0f
ML
2663/**
2664 * batadv_send_tt_response - send reply to tt request
2665 * @bat_priv: the bat priv with all the soft interface information
2666 * @tt_data: tt data containing the tt request information
2667 * @req_src: mac address of tt request sender
2668 * @req_dst: mac address of tt request recipient
2669 *
2670 * Returns true if tt request reply was sent, false otherwise.
2671 */
2672static bool batadv_send_tt_response(struct batadv_priv *bat_priv,
2673 struct batadv_tvlv_tt_data *tt_data,
2674 uint8_t *req_src, uint8_t *req_dst)
a73105b8 2675{
cfd4f757 2676 if (batadv_is_my_mac(bat_priv, req_dst))
335fbe0f 2677 return batadv_send_my_tt_response(bat_priv, tt_data, req_src);
cfd4f757 2678 else
335fbe0f
ML
2679 return batadv_send_other_tt_response(bat_priv, tt_data,
2680 req_src, req_dst);
a73105b8
AQ
2681}
2682
56303d34
SE
2683static void _batadv_tt_update_changes(struct batadv_priv *bat_priv,
2684 struct batadv_orig_node *orig_node,
335fbe0f 2685 struct batadv_tvlv_tt_change *tt_change,
a513088d 2686 uint16_t tt_num_changes, uint8_t ttvn)
a73105b8
AQ
2687{
2688 int i;
a513088d 2689 int roams;
a73105b8
AQ
2690
2691 for (i = 0; i < tt_num_changes; i++) {
acd34afa
SE
2692 if ((tt_change + i)->flags & BATADV_TT_CLIENT_DEL) {
2693 roams = (tt_change + i)->flags & BATADV_TT_CLIENT_ROAM;
a513088d
SE
2694 batadv_tt_global_del(bat_priv, orig_node,
2695 (tt_change + i)->addr,
c018ad3d 2696 ntohs((tt_change + i)->vid),
d4f44692
AQ
2697 "tt removed by changes",
2698 roams);
08c36d3e 2699 } else {
08c36d3e 2700 if (!batadv_tt_global_add(bat_priv, orig_node,
d4f44692 2701 (tt_change + i)->addr,
c018ad3d 2702 ntohs((tt_change + i)->vid),
d4f44692 2703 (tt_change + i)->flags, ttvn))
a73105b8
AQ
2704 /* In case of problem while storing a
2705 * global_entry, we stop the updating
2706 * procedure without committing the
2707 * ttvn change. This will avoid to send
2708 * corrupted data on tt_request
2709 */
2710 return;
08c36d3e 2711 }
a73105b8 2712 }
17071578 2713 orig_node->tt_initialised = true;
a73105b8
AQ
2714}
2715
56303d34 2716static void batadv_tt_fill_gtable(struct batadv_priv *bat_priv,
7ea7b4a1
AQ
2717 struct batadv_tvlv_tt_change *tt_change,
2718 uint8_t ttvn, uint8_t *resp_src,
2719 uint16_t num_entries)
a73105b8 2720{
170173bf 2721 struct batadv_orig_node *orig_node;
a73105b8 2722
335fbe0f 2723 orig_node = batadv_orig_hash_find(bat_priv, resp_src);
a73105b8
AQ
2724 if (!orig_node)
2725 goto out;
2726
2727 /* Purge the old table first.. */
95fb130d
AQ
2728 batadv_tt_global_del_orig(bat_priv, orig_node, -1,
2729 "Received full table");
a73105b8 2730
7ea7b4a1
AQ
2731 _batadv_tt_update_changes(bat_priv, orig_node, tt_change, num_entries,
2732 ttvn);
a73105b8
AQ
2733
2734 spin_lock_bh(&orig_node->tt_buff_lock);
2735 kfree(orig_node->tt_buff);
2736 orig_node->tt_buff_len = 0;
2737 orig_node->tt_buff = NULL;
2738 spin_unlock_bh(&orig_node->tt_buff_lock);
2739
7ea7b4a1 2740 atomic_set(&orig_node->last_ttvn, ttvn);
a73105b8
AQ
2741
2742out:
2743 if (orig_node)
7d211efc 2744 batadv_orig_node_free_ref(orig_node);
a73105b8
AQ
2745}
2746
56303d34
SE
2747static void batadv_tt_update_changes(struct batadv_priv *bat_priv,
2748 struct batadv_orig_node *orig_node,
a513088d 2749 uint16_t tt_num_changes, uint8_t ttvn,
335fbe0f 2750 struct batadv_tvlv_tt_change *tt_change)
a73105b8 2751{
a513088d
SE
2752 _batadv_tt_update_changes(bat_priv, orig_node, tt_change,
2753 tt_num_changes, ttvn);
a73105b8 2754
e8cf234a
AQ
2755 batadv_tt_save_orig_buffer(bat_priv, orig_node, tt_change,
2756 batadv_tt_len(tt_num_changes));
a73105b8
AQ
2757 atomic_set(&orig_node->last_ttvn, ttvn);
2758}
2759
c018ad3d
AQ
2760/**
2761 * batadv_is_my_client - check if a client is served by the local node
2762 * @bat_priv: the bat priv with all the soft interface information
2763 * @addr: the mac adress of the client to check
2764 * @vid: VLAN identifier
2765 *
2766 * Returns true if the client is served by this node, false otherwise.
2767 */
2768bool batadv_is_my_client(struct batadv_priv *bat_priv, const uint8_t *addr,
2769 unsigned short vid)
a73105b8 2770{
170173bf 2771 struct batadv_tt_local_entry *tt_local_entry;
7683fdc1 2772 bool ret = false;
a73105b8 2773
c018ad3d 2774 tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
7683fdc1
AQ
2775 if (!tt_local_entry)
2776 goto out;
058d0e26 2777 /* Check if the client has been logically deleted (but is kept for
9cfc7bd6
SE
2778 * consistency purpose)
2779 */
7c1fd91d
AQ
2780 if ((tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING) ||
2781 (tt_local_entry->common.flags & BATADV_TT_CLIENT_ROAM))
058d0e26 2782 goto out;
7683fdc1
AQ
2783 ret = true;
2784out:
a73105b8 2785 if (tt_local_entry)
a513088d 2786 batadv_tt_local_entry_free_ref(tt_local_entry);
7683fdc1 2787 return ret;
a73105b8
AQ
2788}
2789
335fbe0f
ML
2790/**
2791 * batadv_handle_tt_response - process incoming tt reply
2792 * @bat_priv: the bat priv with all the soft interface information
2793 * @tt_data: tt data containing the tt request information
2794 * @resp_src: mac address of tt reply sender
2795 * @num_entries: number of tt change entries appended to the tt data
2796 */
2797static void batadv_handle_tt_response(struct batadv_priv *bat_priv,
2798 struct batadv_tvlv_tt_data *tt_data,
2799 uint8_t *resp_src, uint16_t num_entries)
a73105b8 2800{
56303d34
SE
2801 struct batadv_tt_req_node *node, *safe;
2802 struct batadv_orig_node *orig_node = NULL;
335fbe0f 2803 struct batadv_tvlv_tt_change *tt_change;
7ea7b4a1
AQ
2804 uint8_t *tvlv_ptr = (uint8_t *)tt_data;
2805 uint16_t change_offset;
a73105b8 2806
39c75a51 2807 batadv_dbg(BATADV_DBG_TT, bat_priv,
1eda58bf 2808 "Received TT_RESPONSE from %pM for ttvn %d t_size: %d [%c]\n",
335fbe0f
ML
2809 resp_src, tt_data->ttvn, num_entries,
2810 (tt_data->flags & BATADV_TT_FULL_TABLE ? 'F' : '.'));
a73105b8 2811
335fbe0f 2812 orig_node = batadv_orig_hash_find(bat_priv, resp_src);
a73105b8
AQ
2813 if (!orig_node)
2814 goto out;
2815
a70a9aa9
AQ
2816 spin_lock_bh(&orig_node->tt_lock);
2817
7ea7b4a1
AQ
2818 change_offset = sizeof(struct batadv_tvlv_tt_vlan_data);
2819 change_offset *= ntohs(tt_data->num_vlan);
2820 change_offset += sizeof(*tt_data);
2821 tvlv_ptr += change_offset;
2822
2823 tt_change = (struct batadv_tvlv_tt_change *)tvlv_ptr;
335fbe0f 2824 if (tt_data->flags & BATADV_TT_FULL_TABLE) {
7ea7b4a1
AQ
2825 batadv_tt_fill_gtable(bat_priv, tt_change, tt_data->ttvn,
2826 resp_src, num_entries);
96412690 2827 } else {
335fbe0f
ML
2828 batadv_tt_update_changes(bat_priv, orig_node, num_entries,
2829 tt_data->ttvn, tt_change);
96412690 2830 }
a73105b8 2831
a70a9aa9 2832 /* Recalculate the CRC for this orig_node and store it */
7ea7b4a1 2833 batadv_tt_global_update_crc(bat_priv, orig_node);
a70a9aa9
AQ
2834
2835 spin_unlock_bh(&orig_node->tt_lock);
2836
a73105b8 2837 /* Delete the tt_req_node from pending tt_requests list */
807736f6
SE
2838 spin_lock_bh(&bat_priv->tt.req_list_lock);
2839 list_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
335fbe0f 2840 if (!batadv_compare_eth(node->addr, resp_src))
a73105b8
AQ
2841 continue;
2842 list_del(&node->list);
2843 kfree(node);
2844 }
7ea7b4a1 2845
807736f6 2846 spin_unlock_bh(&bat_priv->tt.req_list_lock);
a73105b8
AQ
2847out:
2848 if (orig_node)
7d211efc 2849 batadv_orig_node_free_ref(orig_node);
a73105b8
AQ
2850}
2851
56303d34 2852static void batadv_tt_roam_list_free(struct batadv_priv *bat_priv)
a73105b8 2853{
56303d34 2854 struct batadv_tt_roam_node *node, *safe;
a73105b8 2855
807736f6 2856 spin_lock_bh(&bat_priv->tt.roam_list_lock);
a73105b8 2857
807736f6 2858 list_for_each_entry_safe(node, safe, &bat_priv->tt.roam_list, list) {
cc47f66e
AQ
2859 list_del(&node->list);
2860 kfree(node);
2861 }
2862
807736f6 2863 spin_unlock_bh(&bat_priv->tt.roam_list_lock);
cc47f66e
AQ
2864}
2865
56303d34 2866static void batadv_tt_roam_purge(struct batadv_priv *bat_priv)
cc47f66e 2867{
56303d34 2868 struct batadv_tt_roam_node *node, *safe;
cc47f66e 2869
807736f6
SE
2870 spin_lock_bh(&bat_priv->tt.roam_list_lock);
2871 list_for_each_entry_safe(node, safe, &bat_priv->tt.roam_list, list) {
42d0b044
SE
2872 if (!batadv_has_timed_out(node->first_time,
2873 BATADV_ROAMING_MAX_TIME))
cc47f66e
AQ
2874 continue;
2875
2876 list_del(&node->list);
2877 kfree(node);
2878 }
807736f6 2879 spin_unlock_bh(&bat_priv->tt.roam_list_lock);
cc47f66e
AQ
2880}
2881
2882/* This function checks whether the client already reached the
2883 * maximum number of possible roaming phases. In this case the ROAMING_ADV
2884 * will not be sent.
2885 *
9cfc7bd6
SE
2886 * returns true if the ROAMING_ADV can be sent, false otherwise
2887 */
56303d34 2888static bool batadv_tt_check_roam_count(struct batadv_priv *bat_priv,
a513088d 2889 uint8_t *client)
cc47f66e 2890{
56303d34 2891 struct batadv_tt_roam_node *tt_roam_node;
cc47f66e
AQ
2892 bool ret = false;
2893
807736f6 2894 spin_lock_bh(&bat_priv->tt.roam_list_lock);
cc47f66e 2895 /* The new tt_req will be issued only if I'm not waiting for a
9cfc7bd6
SE
2896 * reply from the same orig_node yet
2897 */
807736f6 2898 list_for_each_entry(tt_roam_node, &bat_priv->tt.roam_list, list) {
1eda58bf 2899 if (!batadv_compare_eth(tt_roam_node->addr, client))
cc47f66e
AQ
2900 continue;
2901
1eda58bf 2902 if (batadv_has_timed_out(tt_roam_node->first_time,
42d0b044 2903 BATADV_ROAMING_MAX_TIME))
cc47f66e
AQ
2904 continue;
2905
3e34819e 2906 if (!batadv_atomic_dec_not_zero(&tt_roam_node->counter))
cc47f66e
AQ
2907 /* Sorry, you roamed too many times! */
2908 goto unlock;
2909 ret = true;
2910 break;
2911 }
2912
2913 if (!ret) {
2914 tt_roam_node = kmalloc(sizeof(*tt_roam_node), GFP_ATOMIC);
2915 if (!tt_roam_node)
2916 goto unlock;
2917
2918 tt_roam_node->first_time = jiffies;
42d0b044
SE
2919 atomic_set(&tt_roam_node->counter,
2920 BATADV_ROAMING_MAX_COUNT - 1);
cc47f66e
AQ
2921 memcpy(tt_roam_node->addr, client, ETH_ALEN);
2922
807736f6 2923 list_add(&tt_roam_node->list, &bat_priv->tt.roam_list);
cc47f66e
AQ
2924 ret = true;
2925 }
2926
2927unlock:
807736f6 2928 spin_unlock_bh(&bat_priv->tt.roam_list_lock);
cc47f66e
AQ
2929 return ret;
2930}
2931
c018ad3d
AQ
2932/**
2933 * batadv_send_roam_adv - send a roaming advertisement message
2934 * @bat_priv: the bat priv with all the soft interface information
2935 * @client: mac address of the roaming client
2936 * @vid: VLAN identifier
2937 * @orig_node: message destination
2938 *
2939 * Send a ROAMING_ADV message to the node which was previously serving this
2940 * client. This is done to inform the node that from now on all traffic destined
2941 * for this particular roamed client has to be forwarded to the sender of the
2942 * roaming message.
2943 */
56303d34 2944static void batadv_send_roam_adv(struct batadv_priv *bat_priv, uint8_t *client,
c018ad3d 2945 unsigned short vid,
56303d34 2946 struct batadv_orig_node *orig_node)
cc47f66e 2947{
56303d34 2948 struct batadv_hard_iface *primary_if;
122edaa0
ML
2949 struct batadv_tvlv_roam_adv tvlv_roam;
2950
2951 primary_if = batadv_primary_if_get_selected(bat_priv);
2952 if (!primary_if)
2953 goto out;
cc47f66e
AQ
2954
2955 /* before going on we have to check whether the client has
9cfc7bd6
SE
2956 * already roamed to us too many times
2957 */
a513088d 2958 if (!batadv_tt_check_roam_count(bat_priv, client))
cc47f66e
AQ
2959 goto out;
2960
39c75a51 2961 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789
AQ
2962 "Sending ROAMING_ADV to %pM (client %pM, vid: %d)\n",
2963 orig_node->orig, client, BATADV_PRINT_VID(vid));
cc47f66e 2964
d69909d2 2965 batadv_inc_counter(bat_priv, BATADV_CNT_TT_ROAM_ADV_TX);
f8214865 2966
122edaa0 2967 memcpy(tvlv_roam.client, client, sizeof(tvlv_roam.client));
c018ad3d 2968 tvlv_roam.vid = htons(vid);
122edaa0
ML
2969
2970 batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
2971 orig_node->orig, BATADV_TVLV_ROAM, 1,
2972 &tvlv_roam, sizeof(tvlv_roam));
cc47f66e
AQ
2973
2974out:
122edaa0
ML
2975 if (primary_if)
2976 batadv_hardif_free_ref(primary_if);
a73105b8
AQ
2977}
2978
a513088d 2979static void batadv_tt_purge(struct work_struct *work)
a73105b8 2980{
56303d34 2981 struct delayed_work *delayed_work;
807736f6 2982 struct batadv_priv_tt *priv_tt;
56303d34
SE
2983 struct batadv_priv *bat_priv;
2984
2985 delayed_work = container_of(work, struct delayed_work, work);
807736f6
SE
2986 priv_tt = container_of(delayed_work, struct batadv_priv_tt, work);
2987 bat_priv = container_of(priv_tt, struct batadv_priv, tt);
a73105b8 2988
a19d3d85 2989 batadv_tt_local_purge(bat_priv, BATADV_TT_LOCAL_TIMEOUT);
30cfd02b 2990 batadv_tt_global_purge(bat_priv);
a513088d
SE
2991 batadv_tt_req_purge(bat_priv);
2992 batadv_tt_roam_purge(bat_priv);
a73105b8 2993
72414442
AQ
2994 queue_delayed_work(batadv_event_workqueue, &bat_priv->tt.work,
2995 msecs_to_jiffies(BATADV_TT_WORK_PERIOD));
a73105b8 2996}
cc47f66e 2997
56303d34 2998void batadv_tt_free(struct batadv_priv *bat_priv)
cc47f66e 2999{
e1bf0c14
ML
3000 batadv_tvlv_container_unregister(bat_priv, BATADV_TVLV_TT, 1);
3001 batadv_tvlv_handler_unregister(bat_priv, BATADV_TVLV_TT, 1);
3002
807736f6 3003 cancel_delayed_work_sync(&bat_priv->tt.work);
cc47f66e 3004
a513088d
SE
3005 batadv_tt_local_table_free(bat_priv);
3006 batadv_tt_global_table_free(bat_priv);
3007 batadv_tt_req_list_free(bat_priv);
3008 batadv_tt_changes_list_free(bat_priv);
3009 batadv_tt_roam_list_free(bat_priv);
cc47f66e 3010
807736f6 3011 kfree(bat_priv->tt.last_changeset);
cc47f66e 3012}
058d0e26 3013
7ea7b4a1
AQ
3014/**
3015 * batadv_tt_local_set_flags - set or unset the specified flags on the local
3016 * table and possibly count them in the TT size
3017 * @bat_priv: the bat priv with all the soft interface information
3018 * @flags: the flag to switch
3019 * @enable: whether to set or unset the flag
3020 * @count: whether to increase the TT size by the number of changed entries
9cfc7bd6 3021 */
7ea7b4a1
AQ
3022static void batadv_tt_local_set_flags(struct batadv_priv *bat_priv,
3023 uint16_t flags, bool enable, bool count)
058d0e26 3024{
7ea7b4a1
AQ
3025 struct batadv_hashtable *hash = bat_priv->tt.local_hash;
3026 struct batadv_tt_common_entry *tt_common_entry;
697f2531 3027 uint16_t changed_num = 0;
058d0e26 3028 struct hlist_head *head;
7ea7b4a1 3029 uint32_t i;
058d0e26
AQ
3030
3031 if (!hash)
7ea7b4a1 3032 return;
058d0e26
AQ
3033
3034 for (i = 0; i < hash->size; i++) {
3035 head = &hash->table[i];
3036
3037 rcu_read_lock();
b67bfe0d 3038 hlist_for_each_entry_rcu(tt_common_entry,
058d0e26 3039 head, hash_entry) {
697f2531
AQ
3040 if (enable) {
3041 if ((tt_common_entry->flags & flags) == flags)
3042 continue;
3043 tt_common_entry->flags |= flags;
3044 } else {
3045 if (!(tt_common_entry->flags & flags))
3046 continue;
3047 tt_common_entry->flags &= ~flags;
3048 }
3049 changed_num++;
7ea7b4a1
AQ
3050
3051 if (!count)
3052 continue;
3053
3054 batadv_tt_local_size_inc(bat_priv,
3055 tt_common_entry->vid);
058d0e26
AQ
3056 }
3057 rcu_read_unlock();
3058 }
058d0e26
AQ
3059}
3060
acd34afa 3061/* Purge out all the tt local entries marked with BATADV_TT_CLIENT_PENDING */
56303d34 3062static void batadv_tt_local_purge_pending_clients(struct batadv_priv *bat_priv)
058d0e26 3063{
807736f6 3064 struct batadv_hashtable *hash = bat_priv->tt.local_hash;
56303d34
SE
3065 struct batadv_tt_common_entry *tt_common;
3066 struct batadv_tt_local_entry *tt_local;
b67bfe0d 3067 struct hlist_node *node_tmp;
058d0e26
AQ
3068 struct hlist_head *head;
3069 spinlock_t *list_lock; /* protects write access to the hash lists */
c90681b8 3070 uint32_t i;
058d0e26
AQ
3071
3072 if (!hash)
3073 return;
3074
3075 for (i = 0; i < hash->size; i++) {
3076 head = &hash->table[i];
3077 list_lock = &hash->list_locks[i];
3078
3079 spin_lock_bh(list_lock);
b67bfe0d 3080 hlist_for_each_entry_safe(tt_common, node_tmp, head,
acd34afa
SE
3081 hash_entry) {
3082 if (!(tt_common->flags & BATADV_TT_CLIENT_PENDING))
058d0e26
AQ
3083 continue;
3084
39c75a51 3085 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789
AQ
3086 "Deleting local tt entry (%pM, vid: %d): pending\n",
3087 tt_common->addr,
3088 BATADV_PRINT_VID(tt_common->vid));
058d0e26 3089
7ea7b4a1 3090 batadv_tt_local_size_dec(bat_priv, tt_common->vid);
b67bfe0d 3091 hlist_del_rcu(&tt_common->hash_entry);
56303d34
SE
3092 tt_local = container_of(tt_common,
3093 struct batadv_tt_local_entry,
3094 common);
3095 batadv_tt_local_entry_free_ref(tt_local);
058d0e26
AQ
3096 }
3097 spin_unlock_bh(list_lock);
3098 }
058d0e26
AQ
3099}
3100
e1bf0c14 3101/**
a19d3d85
ML
3102 * batadv_tt_local_commit_changes_nolock - commit all pending local tt changes
3103 * which have been queued in the time since the last commit
e1bf0c14 3104 * @bat_priv: the bat priv with all the soft interface information
a19d3d85
ML
3105 *
3106 * Caller must hold tt->commit_lock.
e1bf0c14 3107 */
a19d3d85 3108static void batadv_tt_local_commit_changes_nolock(struct batadv_priv *bat_priv)
058d0e26 3109{
e1bf0c14
ML
3110 if (atomic_read(&bat_priv->tt.local_changes) < 1) {
3111 if (!batadv_atomic_dec_not_zero(&bat_priv->tt.ogm_append_cnt))
3112 batadv_tt_tvlv_container_update(bat_priv);
a19d3d85 3113 return;
e1bf0c14 3114 }
be9aa4c1 3115
7ea7b4a1 3116 batadv_tt_local_set_flags(bat_priv, BATADV_TT_CLIENT_NEW, false, true);
be9aa4c1 3117
a513088d 3118 batadv_tt_local_purge_pending_clients(bat_priv);
7ea7b4a1 3119 batadv_tt_local_update_crc(bat_priv);
058d0e26
AQ
3120
3121 /* Increment the TTVN only once per OGM interval */
807736f6 3122 atomic_inc(&bat_priv->tt.vn);
39c75a51 3123 batadv_dbg(BATADV_DBG_TT, bat_priv,
1eda58bf 3124 "Local changes committed, updating to ttvn %u\n",
807736f6 3125 (uint8_t)atomic_read(&bat_priv->tt.vn));
be9aa4c1
ML
3126
3127 /* reset the sending counter */
807736f6 3128 atomic_set(&bat_priv->tt.ogm_append_cnt, BATADV_TT_OGM_APPEND_MAX);
e1bf0c14 3129 batadv_tt_tvlv_container_update(bat_priv);
a19d3d85 3130}
a70a9aa9 3131
a19d3d85
ML
3132/**
3133 * batadv_tt_local_commit_changes - commit all pending local tt changes which
3134 * have been queued in the time since the last commit
3135 * @bat_priv: the bat priv with all the soft interface information
3136 */
3137void batadv_tt_local_commit_changes(struct batadv_priv *bat_priv)
3138{
3139 spin_lock_bh(&bat_priv->tt.commit_lock);
3140 batadv_tt_local_commit_changes_nolock(bat_priv);
a70a9aa9 3141 spin_unlock_bh(&bat_priv->tt.commit_lock);
058d0e26 3142}
59b699cd 3143
56303d34 3144bool batadv_is_ap_isolated(struct batadv_priv *bat_priv, uint8_t *src,
b8cbd81d 3145 uint8_t *dst, unsigned short vid)
59b699cd 3146{
56303d34
SE
3147 struct batadv_tt_local_entry *tt_local_entry = NULL;
3148 struct batadv_tt_global_entry *tt_global_entry = NULL;
b8cbd81d 3149 struct batadv_softif_vlan *vlan;
5870adc6 3150 bool ret = false;
59b699cd 3151
b8cbd81d
AQ
3152 vlan = batadv_softif_vlan_get(bat_priv, vid);
3153 if (!vlan || !atomic_read(&vlan->ap_isolation))
5870adc6 3154 goto out;
59b699cd 3155
b8cbd81d 3156 tt_local_entry = batadv_tt_local_hash_find(bat_priv, dst, vid);
59b699cd
AQ
3157 if (!tt_local_entry)
3158 goto out;
3159
b8cbd81d 3160 tt_global_entry = batadv_tt_global_hash_find(bat_priv, src, vid);
59b699cd
AQ
3161 if (!tt_global_entry)
3162 goto out;
3163
1f129fef 3164 if (!_batadv_is_ap_isolated(tt_local_entry, tt_global_entry))
59b699cd
AQ
3165 goto out;
3166
5870adc6 3167 ret = true;
59b699cd
AQ
3168
3169out:
b8cbd81d
AQ
3170 if (vlan)
3171 batadv_softif_vlan_free_ref(vlan);
59b699cd 3172 if (tt_global_entry)
a513088d 3173 batadv_tt_global_entry_free_ref(tt_global_entry);
59b699cd 3174 if (tt_local_entry)
a513088d 3175 batadv_tt_local_entry_free_ref(tt_local_entry);
59b699cd
AQ
3176 return ret;
3177}
a943cac1 3178
e1bf0c14
ML
3179/**
3180 * batadv_tt_update_orig - update global translation table with new tt
3181 * information received via ogms
3182 * @bat_priv: the bat priv with all the soft interface information
3183 * @orig: the orig_node of the ogm
7ea7b4a1
AQ
3184 * @tt_vlan: pointer to the first tvlv VLAN entry
3185 * @tt_num_vlan: number of tvlv VLAN entries
3186 * @tt_change: pointer to the first entry in the TT buffer
e1bf0c14
ML
3187 * @tt_num_changes: number of tt changes inside the tt buffer
3188 * @ttvn: translation table version number of this changeset
ced72933 3189 * @tt_crc: crc32 checksum of orig node's translation table
e1bf0c14
ML
3190 */
3191static void batadv_tt_update_orig(struct batadv_priv *bat_priv,
3192 struct batadv_orig_node *orig_node,
7ea7b4a1
AQ
3193 const void *tt_buff, uint16_t tt_num_vlan,
3194 struct batadv_tvlv_tt_change *tt_change,
3195 uint16_t tt_num_changes, uint8_t ttvn)
a943cac1
ML
3196{
3197 uint8_t orig_ttvn = (uint8_t)atomic_read(&orig_node->last_ttvn);
7ea7b4a1 3198 struct batadv_tvlv_tt_vlan_data *tt_vlan;
a943cac1
ML
3199 bool full_table = true;
3200
7ea7b4a1 3201 tt_vlan = (struct batadv_tvlv_tt_vlan_data *)tt_buff;
17071578 3202 /* orig table not initialised AND first diff is in the OGM OR the ttvn
9cfc7bd6
SE
3203 * increased by one -> we can apply the attached changes
3204 */
17071578
AQ
3205 if ((!orig_node->tt_initialised && ttvn == 1) ||
3206 ttvn - orig_ttvn == 1) {
a943cac1 3207 /* the OGM could not contain the changes due to their size or
42d0b044
SE
3208 * because they have already been sent BATADV_TT_OGM_APPEND_MAX
3209 * times.
9cfc7bd6
SE
3210 * In this case send a tt request
3211 */
a943cac1
ML
3212 if (!tt_num_changes) {
3213 full_table = false;
3214 goto request_table;
3215 }
3216
a70a9aa9
AQ
3217 spin_lock_bh(&orig_node->tt_lock);
3218
335fbe0f 3219 tt_change = (struct batadv_tvlv_tt_change *)tt_buff;
a513088d 3220 batadv_tt_update_changes(bat_priv, orig_node, tt_num_changes,
96412690 3221 ttvn, tt_change);
a943cac1
ML
3222
3223 /* Even if we received the precomputed crc with the OGM, we
3224 * prefer to recompute it to spot any possible inconsistency
9cfc7bd6
SE
3225 * in the global table
3226 */
7ea7b4a1 3227 batadv_tt_global_update_crc(bat_priv, orig_node);
a943cac1 3228
a70a9aa9
AQ
3229 spin_unlock_bh(&orig_node->tt_lock);
3230
a943cac1
ML
3231 /* The ttvn alone is not enough to guarantee consistency
3232 * because a single value could represent different states
3233 * (due to the wrap around). Thus a node has to check whether
3234 * the resulting table (after applying the changes) is still
3235 * consistent or not. E.g. a node could disconnect while its
3236 * ttvn is X and reconnect on ttvn = X + TTVN_MAX: in this case
3237 * checking the CRC value is mandatory to detect the
9cfc7bd6
SE
3238 * inconsistency
3239 */
7ea7b4a1
AQ
3240 if (!batadv_tt_global_check_crc(orig_node, tt_vlan,
3241 tt_num_vlan))
a943cac1 3242 goto request_table;
a943cac1
ML
3243 } else {
3244 /* if we missed more than one change or our tables are not
9cfc7bd6
SE
3245 * in sync anymore -> request fresh tt data
3246 */
17071578 3247 if (!orig_node->tt_initialised || ttvn != orig_ttvn ||
7ea7b4a1
AQ
3248 !batadv_tt_global_check_crc(orig_node, tt_vlan,
3249 tt_num_vlan)) {
a943cac1 3250request_table:
39c75a51 3251 batadv_dbg(BATADV_DBG_TT, bat_priv,
7ea7b4a1
AQ
3252 "TT inconsistency for %pM. Need to retrieve the correct information (ttvn: %u last_ttvn: %u num_changes: %u)\n",
3253 orig_node->orig, ttvn, orig_ttvn,
3254 tt_num_changes);
a513088d 3255 batadv_send_tt_request(bat_priv, orig_node, ttvn,
7ea7b4a1
AQ
3256 tt_vlan, tt_num_vlan,
3257 full_table);
a943cac1
ML
3258 return;
3259 }
3260 }
3261}
3275e7cc 3262
c018ad3d
AQ
3263/**
3264 * batadv_tt_global_client_is_roaming - check if a client is marked as roaming
3265 * @bat_priv: the bat priv with all the soft interface information
3266 * @addr: the mac address of the client to check
3267 * @vid: VLAN identifier
3268 *
3269 * Returns true if we know that the client has moved from its old originator
3270 * to another one. This entry is still kept for consistency purposes and will be
3271 * deleted later by a DEL or because of timeout
3275e7cc 3272 */
56303d34 3273bool batadv_tt_global_client_is_roaming(struct batadv_priv *bat_priv,
c018ad3d 3274 uint8_t *addr, unsigned short vid)
3275e7cc 3275{
56303d34 3276 struct batadv_tt_global_entry *tt_global_entry;
3275e7cc
AQ
3277 bool ret = false;
3278
c018ad3d 3279 tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
3275e7cc
AQ
3280 if (!tt_global_entry)
3281 goto out;
3282
c1d07431 3283 ret = tt_global_entry->common.flags & BATADV_TT_CLIENT_ROAM;
a513088d 3284 batadv_tt_global_entry_free_ref(tt_global_entry);
3275e7cc
AQ
3285out:
3286 return ret;
3287}
30cfd02b 3288
7c1fd91d
AQ
3289/**
3290 * batadv_tt_local_client_is_roaming - tells whether the client is roaming
3291 * @bat_priv: the bat priv with all the soft interface information
c018ad3d
AQ
3292 * @addr: the mac address of the local client to query
3293 * @vid: VLAN identifier
7c1fd91d
AQ
3294 *
3295 * Returns true if the local client is known to be roaming (it is not served by
3296 * this node anymore) or not. If yes, the client is still present in the table
3297 * to keep the latter consistent with the node TTVN
3298 */
3299bool batadv_tt_local_client_is_roaming(struct batadv_priv *bat_priv,
c018ad3d 3300 uint8_t *addr, unsigned short vid)
7c1fd91d
AQ
3301{
3302 struct batadv_tt_local_entry *tt_local_entry;
3303 bool ret = false;
3304
c018ad3d 3305 tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
7c1fd91d
AQ
3306 if (!tt_local_entry)
3307 goto out;
3308
3309 ret = tt_local_entry->common.flags & BATADV_TT_CLIENT_ROAM;
3310 batadv_tt_local_entry_free_ref(tt_local_entry);
3311out:
3312 return ret;
7c1fd91d
AQ
3313}
3314
30cfd02b
AQ
3315bool batadv_tt_add_temporary_global_entry(struct batadv_priv *bat_priv,
3316 struct batadv_orig_node *orig_node,
c018ad3d 3317 const unsigned char *addr,
16052789 3318 unsigned short vid)
30cfd02b
AQ
3319{
3320 bool ret = false;
3321
16052789 3322 if (!batadv_tt_global_add(bat_priv, orig_node, addr, vid,
30cfd02b
AQ
3323 BATADV_TT_CLIENT_TEMP,
3324 atomic_read(&orig_node->last_ttvn)))
3325 goto out;
3326
3327 batadv_dbg(BATADV_DBG_TT, bat_priv,
16052789
AQ
3328 "Added temporary global client (addr: %pM, vid: %d, orig: %pM)\n",
3329 addr, BATADV_PRINT_VID(vid), orig_node->orig);
30cfd02b
AQ
3330 ret = true;
3331out:
3332 return ret;
3333}
e1bf0c14 3334
a19d3d85
ML
3335/**
3336 * batadv_tt_local_resize_to_mtu - resize the local translation table fit the
3337 * maximum packet size that can be transported through the mesh
3338 * @soft_iface: netdev struct of the mesh interface
3339 *
3340 * Remove entries older than 'timeout' and half timeout if more entries need
3341 * to be removed.
3342 */
3343void batadv_tt_local_resize_to_mtu(struct net_device *soft_iface)
3344{
3345 struct batadv_priv *bat_priv = netdev_priv(soft_iface);
3346 int packet_size_max = atomic_read(&bat_priv->packet_size_max);
3347 int table_size, timeout = BATADV_TT_LOCAL_TIMEOUT / 2;
3348 bool reduced = false;
3349
3350 spin_lock_bh(&bat_priv->tt.commit_lock);
3351
3352 while (true) {
3353 table_size = batadv_tt_local_table_transmit_size(bat_priv);
3354 if (packet_size_max >= table_size)
3355 break;
3356
3357 batadv_tt_local_purge(bat_priv, timeout);
3358 batadv_tt_local_purge_pending_clients(bat_priv);
3359
3360 timeout /= 2;
3361 reduced = true;
3362 net_ratelimited_function(batadv_info, soft_iface,
3363 "Forced to purge local tt entries to fit new maximum fragment MTU (%i)\n",
3364 packet_size_max);
3365 }
3366
3367 /* commit these changes immediately, to avoid synchronization problem
3368 * with the TTVN
3369 */
3370 if (reduced)
3371 batadv_tt_local_commit_changes_nolock(bat_priv);
3372
3373 spin_unlock_bh(&bat_priv->tt.commit_lock);
3374}
3375
e1bf0c14
ML
3376/**
3377 * batadv_tt_tvlv_ogm_handler_v1 - process incoming tt tvlv container
3378 * @bat_priv: the bat priv with all the soft interface information
3379 * @orig: the orig_node of the ogm
3380 * @flags: flags indicating the tvlv state (see batadv_tvlv_handler_flags)
3381 * @tvlv_value: tvlv buffer containing the gateway data
3382 * @tvlv_value_len: tvlv buffer length
3383 */
3384static void batadv_tt_tvlv_ogm_handler_v1(struct batadv_priv *bat_priv,
3385 struct batadv_orig_node *orig,
7ea7b4a1 3386 uint8_t flags, void *tvlv_value,
e1bf0c14
ML
3387 uint16_t tvlv_value_len)
3388{
7ea7b4a1
AQ
3389 struct batadv_tvlv_tt_vlan_data *tt_vlan;
3390 struct batadv_tvlv_tt_change *tt_change;
e1bf0c14 3391 struct batadv_tvlv_tt_data *tt_data;
7ea7b4a1 3392 uint16_t num_entries, num_vlan;
e1bf0c14
ML
3393
3394 if (tvlv_value_len < sizeof(*tt_data))
3395 return;
3396
3397 tt_data = (struct batadv_tvlv_tt_data *)tvlv_value;
3398 tvlv_value_len -= sizeof(*tt_data);
3399
7ea7b4a1
AQ
3400 num_vlan = ntohs(tt_data->num_vlan);
3401
3402 if (tvlv_value_len < sizeof(*tt_vlan) * num_vlan)
3403 return;
3404
3405 tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(tt_data + 1);
3406 tt_change = (struct batadv_tvlv_tt_change *)(tt_vlan + num_vlan);
3407 tvlv_value_len -= sizeof(*tt_vlan) * num_vlan;
3408
298e6e68 3409 num_entries = batadv_tt_entries(tvlv_value_len);
e1bf0c14 3410
7ea7b4a1
AQ
3411 batadv_tt_update_orig(bat_priv, orig, tt_vlan, num_vlan, tt_change,
3412 num_entries, tt_data->ttvn);
e1bf0c14
ML
3413}
3414
335fbe0f
ML
3415/**
3416 * batadv_tt_tvlv_unicast_handler_v1 - process incoming (unicast) tt tvlv
3417 * container
3418 * @bat_priv: the bat priv with all the soft interface information
3419 * @src: mac address of tt tvlv sender
3420 * @dst: mac address of tt tvlv recipient
3421 * @tvlv_value: tvlv buffer containing the tt data
3422 * @tvlv_value_len: tvlv buffer length
3423 *
3424 * Returns NET_RX_DROP if the tt tvlv is to be re-routed, NET_RX_SUCCESS
3425 * otherwise.
3426 */
3427static int batadv_tt_tvlv_unicast_handler_v1(struct batadv_priv *bat_priv,
3428 uint8_t *src, uint8_t *dst,
3429 void *tvlv_value,
3430 uint16_t tvlv_value_len)
3431{
3432 struct batadv_tvlv_tt_data *tt_data;
7ea7b4a1 3433 uint16_t tt_vlan_len, tt_num_entries;
335fbe0f
ML
3434 char tt_flag;
3435 bool ret;
3436
3437 if (tvlv_value_len < sizeof(*tt_data))
3438 return NET_RX_SUCCESS;
3439
3440 tt_data = (struct batadv_tvlv_tt_data *)tvlv_value;
3441 tvlv_value_len -= sizeof(*tt_data);
3442
7ea7b4a1
AQ
3443 tt_vlan_len = sizeof(struct batadv_tvlv_tt_vlan_data);
3444 tt_vlan_len *= ntohs(tt_data->num_vlan);
3445
3446 if (tvlv_value_len < tt_vlan_len)
3447 return NET_RX_SUCCESS;
3448
3449 tvlv_value_len -= tt_vlan_len;
3450 tt_num_entries = batadv_tt_entries(tvlv_value_len);
335fbe0f
ML
3451
3452 switch (tt_data->flags & BATADV_TT_DATA_TYPE_MASK) {
3453 case BATADV_TT_REQUEST:
3454 batadv_inc_counter(bat_priv, BATADV_CNT_TT_REQUEST_RX);
3455
3456 /* If this node cannot provide a TT response the tt_request is
3457 * forwarded
3458 */
3459 ret = batadv_send_tt_response(bat_priv, tt_data, src, dst);
3460 if (!ret) {
3461 if (tt_data->flags & BATADV_TT_FULL_TABLE)
3462 tt_flag = 'F';
3463 else
3464 tt_flag = '.';
3465
3466 batadv_dbg(BATADV_DBG_TT, bat_priv,
3467 "Routing TT_REQUEST to %pM [%c]\n",
3468 dst, tt_flag);
3469 /* tvlv API will re-route the packet */
3470 return NET_RX_DROP;
3471 }
3472 break;
3473 case BATADV_TT_RESPONSE:
3474 batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_RX);
3475
3476 if (batadv_is_my_mac(bat_priv, dst)) {
3477 batadv_handle_tt_response(bat_priv, tt_data,
7ea7b4a1 3478 src, tt_num_entries);
335fbe0f
ML
3479 return NET_RX_SUCCESS;
3480 }
3481
3482 if (tt_data->flags & BATADV_TT_FULL_TABLE)
3483 tt_flag = 'F';
3484 else
3485 tt_flag = '.';
3486
3487 batadv_dbg(BATADV_DBG_TT, bat_priv,
3488 "Routing TT_RESPONSE to %pM [%c]\n", dst, tt_flag);
3489
3490 /* tvlv API will re-route the packet */
3491 return NET_RX_DROP;
3492 }
3493
3494 return NET_RX_SUCCESS;
3495}
3496
122edaa0
ML
3497/**
3498 * batadv_roam_tvlv_unicast_handler_v1 - process incoming tt roam tvlv container
3499 * @bat_priv: the bat priv with all the soft interface information
3500 * @src: mac address of tt tvlv sender
3501 * @dst: mac address of tt tvlv recipient
3502 * @tvlv_value: tvlv buffer containing the tt data
3503 * @tvlv_value_len: tvlv buffer length
3504 *
3505 * Returns NET_RX_DROP if the tt roam tvlv is to be re-routed, NET_RX_SUCCESS
3506 * otherwise.
3507 */
3508static int batadv_roam_tvlv_unicast_handler_v1(struct batadv_priv *bat_priv,
3509 uint8_t *src, uint8_t *dst,
3510 void *tvlv_value,
3511 uint16_t tvlv_value_len)
3512{
3513 struct batadv_tvlv_roam_adv *roaming_adv;
3514 struct batadv_orig_node *orig_node = NULL;
3515
3516 /* If this node is not the intended recipient of the
3517 * roaming advertisement the packet is forwarded
3518 * (the tvlv API will re-route the packet).
3519 */
3520 if (!batadv_is_my_mac(bat_priv, dst))
3521 return NET_RX_DROP;
3522
122edaa0
ML
3523 if (tvlv_value_len < sizeof(*roaming_adv))
3524 goto out;
3525
3526 orig_node = batadv_orig_hash_find(bat_priv, src);
3527 if (!orig_node)
3528 goto out;
3529
3530 batadv_inc_counter(bat_priv, BATADV_CNT_TT_ROAM_ADV_RX);
3531 roaming_adv = (struct batadv_tvlv_roam_adv *)tvlv_value;
3532
3533 batadv_dbg(BATADV_DBG_TT, bat_priv,
3534 "Received ROAMING_ADV from %pM (client %pM)\n",
3535 src, roaming_adv->client);
3536
3537 batadv_tt_global_add(bat_priv, orig_node, roaming_adv->client,
c018ad3d 3538 ntohs(roaming_adv->vid), BATADV_TT_CLIENT_ROAM,
122edaa0
ML
3539 atomic_read(&orig_node->last_ttvn) + 1);
3540
3541out:
3542 if (orig_node)
3543 batadv_orig_node_free_ref(orig_node);
3544 return NET_RX_SUCCESS;
3545}
3546
e1bf0c14
ML
3547/**
3548 * batadv_tt_init - initialise the translation table internals
3549 * @bat_priv: the bat priv with all the soft interface information
3550 *
3551 * Return 0 on success or negative error number in case of failure.
3552 */
3553int batadv_tt_init(struct batadv_priv *bat_priv)
3554{
3555 int ret;
3556
0eb01568
AQ
3557 /* synchronized flags must be remote */
3558 BUILD_BUG_ON(!(BATADV_TT_SYNC_MASK & BATADV_TT_REMOTE_MASK));
3559
e1bf0c14
ML
3560 ret = batadv_tt_local_init(bat_priv);
3561 if (ret < 0)
3562 return ret;
3563
3564 ret = batadv_tt_global_init(bat_priv);
3565 if (ret < 0)
3566 return ret;
3567
3568 batadv_tvlv_handler_register(bat_priv, batadv_tt_tvlv_ogm_handler_v1,
335fbe0f
ML
3569 batadv_tt_tvlv_unicast_handler_v1,
3570 BATADV_TVLV_TT, 1, BATADV_NO_FLAGS);
e1bf0c14 3571
122edaa0
ML
3572 batadv_tvlv_handler_register(bat_priv, NULL,
3573 batadv_roam_tvlv_unicast_handler_v1,
3574 BATADV_TVLV_ROAM, 1, BATADV_NO_FLAGS);
3575
e1bf0c14
ML
3576 INIT_DELAYED_WORK(&bat_priv->tt.work, batadv_tt_purge);
3577 queue_delayed_work(batadv_event_workqueue, &bat_priv->tt.work,
3578 msecs_to_jiffies(BATADV_TT_WORK_PERIOD));
3579
3580 return 1;
3581}
42cb0bef
AQ
3582
3583/**
3584 * batadv_tt_global_is_isolated - check if a client is marked as isolated
3585 * @bat_priv: the bat priv with all the soft interface information
3586 * @addr: the mac address of the client
3587 * @vid: the identifier of the VLAN where this client is connected
3588 *
3589 * Returns true if the client is marked with the TT_CLIENT_ISOLA flag, false
3590 * otherwise
3591 */
3592bool batadv_tt_global_is_isolated(struct batadv_priv *bat_priv,
3593 const uint8_t *addr, unsigned short vid)
3594{
3595 struct batadv_tt_global_entry *tt;
3596 bool ret;
3597
3598 tt = batadv_tt_global_hash_find(bat_priv, addr, vid);
3599 if (!tt)
3600 return false;
3601
3602 ret = tt->common.flags & BATADV_TT_CLIENT_ISOLA;
3603
3604 batadv_tt_global_entry_free_ref(tt);
3605
3606 return ret;
3607}
This page took 0.42414 seconds and 5 git commands to generate.