]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - net/batman-adv/translation-table.c
batman-adv: fix visualization output without neighbors on the primary interface
[mirror_ubuntu-artful-kernel.git] / net / batman-adv / translation-table.c
CommitLineData
c6c8fea2 1/*
567db7b0 2 * Copyright (C) 2007-2012 B.A.T.M.A.N. contributors:
c6c8fea2 3 *
35c133a0 4 * Marek Lindner, Simon Wunderlich, Antonio Quartulli
c6c8fea2
SE
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of version 2 of the GNU General Public
8 * License as published by the Free Software Foundation.
9 *
10 * This program is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * General Public License for more details.
14 *
15 * You should have received a copy of the GNU General Public License
16 * along with this program; if not, write to the Free Software
17 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
18 * 02110-1301, USA
19 *
20 */
21
22#include "main.h"
23#include "translation-table.h"
24#include "soft-interface.h"
32ae9b22 25#include "hard-interface.h"
a73105b8 26#include "send.h"
c6c8fea2
SE
27#include "hash.h"
28#include "originator.h"
a73105b8 29#include "routing.h"
20ff9d59 30#include "bridge_loop_avoidance.h"
c6c8fea2 31
a73105b8
AQ
32#include <linux/crc16.h>
33
de7aae65
SE
34static void send_roam_adv(struct bat_priv *bat_priv, uint8_t *client,
35 struct orig_node *orig_node);
a73105b8 36static void tt_purge(struct work_struct *work);
db08e6e5 37static void tt_global_del_orig_list(struct tt_global_entry *tt_global_entry);
c6c8fea2 38
7aadf889 39/* returns 1 if they are the same mac addr */
48100bac 40static int compare_tt(const struct hlist_node *node, const void *data2)
7aadf889 41{
48100bac 42 const void *data1 = container_of(node, struct tt_common_entry,
747e4221 43 hash_entry);
7aadf889
ML
44
45 return (memcmp(data1, data2, ETH_ALEN) == 0 ? 1 : 0);
46}
47
a73105b8 48static void tt_start_timer(struct bat_priv *bat_priv)
c6c8fea2 49{
a73105b8
AQ
50 INIT_DELAYED_WORK(&bat_priv->tt_work, tt_purge);
51 queue_delayed_work(bat_event_workqueue, &bat_priv->tt_work,
52 msecs_to_jiffies(5000));
c6c8fea2
SE
53}
54
48100bac
AQ
55static struct tt_common_entry *tt_hash_find(struct hashtable_t *hash,
56 const void *data)
7aadf889 57{
7aadf889
ML
58 struct hlist_head *head;
59 struct hlist_node *node;
48100bac 60 struct tt_common_entry *tt_common_entry, *tt_common_entry_tmp = NULL;
c90681b8 61 uint32_t index;
7aadf889
ML
62
63 if (!hash)
64 return NULL;
65
66 index = choose_orig(data, hash->size);
67 head = &hash->table[index];
68
69 rcu_read_lock();
48100bac
AQ
70 hlist_for_each_entry_rcu(tt_common_entry, node, head, hash_entry) {
71 if (!compare_eth(tt_common_entry, data))
7aadf889
ML
72 continue;
73
48100bac 74 if (!atomic_inc_not_zero(&tt_common_entry->refcount))
7683fdc1
AQ
75 continue;
76
48100bac 77 tt_common_entry_tmp = tt_common_entry;
7aadf889
ML
78 break;
79 }
80 rcu_read_unlock();
81
48100bac 82 return tt_common_entry_tmp;
7aadf889
ML
83}
84
48100bac
AQ
85static struct tt_local_entry *tt_local_hash_find(struct bat_priv *bat_priv,
86 const void *data)
7aadf889 87{
48100bac
AQ
88 struct tt_common_entry *tt_common_entry;
89 struct tt_local_entry *tt_local_entry = NULL;
7aadf889 90
48100bac
AQ
91 tt_common_entry = tt_hash_find(bat_priv->tt_local_hash, data);
92 if (tt_common_entry)
93 tt_local_entry = container_of(tt_common_entry,
94 struct tt_local_entry, common);
95 return tt_local_entry;
96}
7aadf889 97
48100bac
AQ
98static struct tt_global_entry *tt_global_hash_find(struct bat_priv *bat_priv,
99 const void *data)
100{
101 struct tt_common_entry *tt_common_entry;
102 struct tt_global_entry *tt_global_entry = NULL;
7683fdc1 103
48100bac
AQ
104 tt_common_entry = tt_hash_find(bat_priv->tt_global_hash, data);
105 if (tt_common_entry)
106 tt_global_entry = container_of(tt_common_entry,
107 struct tt_global_entry, common);
108 return tt_global_entry;
7aadf889 109
7aadf889
ML
110}
111
7683fdc1
AQ
112static void tt_local_entry_free_ref(struct tt_local_entry *tt_local_entry)
113{
48100bac
AQ
114 if (atomic_dec_and_test(&tt_local_entry->common.refcount))
115 kfree_rcu(tt_local_entry, common.rcu);
7683fdc1
AQ
116}
117
531027fc
SW
118static void tt_global_entry_free_rcu(struct rcu_head *rcu)
119{
48100bac 120 struct tt_common_entry *tt_common_entry;
531027fc
SW
121 struct tt_global_entry *tt_global_entry;
122
48100bac
AQ
123 tt_common_entry = container_of(rcu, struct tt_common_entry, rcu);
124 tt_global_entry = container_of(tt_common_entry, struct tt_global_entry,
125 common);
531027fc 126
531027fc
SW
127 kfree(tt_global_entry);
128}
129
7683fdc1
AQ
130static void tt_global_entry_free_ref(struct tt_global_entry *tt_global_entry)
131{
db08e6e5
SW
132 if (atomic_dec_and_test(&tt_global_entry->common.refcount)) {
133 tt_global_del_orig_list(tt_global_entry);
48100bac
AQ
134 call_rcu(&tt_global_entry->common.rcu,
135 tt_global_entry_free_rcu);
db08e6e5
SW
136 }
137}
138
139static void tt_orig_list_entry_free_rcu(struct rcu_head *rcu)
140{
141 struct tt_orig_list_entry *orig_entry;
142
143 orig_entry = container_of(rcu, struct tt_orig_list_entry, rcu);
144 atomic_dec(&orig_entry->orig_node->tt_size);
145 orig_node_free_ref(orig_entry->orig_node);
146 kfree(orig_entry);
147}
148
149static void tt_orig_list_entry_free_ref(struct tt_orig_list_entry *orig_entry)
150{
151 call_rcu(&orig_entry->rcu, tt_orig_list_entry_free_rcu);
7683fdc1
AQ
152}
153
ff66c975
AQ
154static void tt_local_event(struct bat_priv *bat_priv, const uint8_t *addr,
155 uint8_t flags)
a73105b8
AQ
156{
157 struct tt_change_node *tt_change_node;
158
159 tt_change_node = kmalloc(sizeof(*tt_change_node), GFP_ATOMIC);
160
161 if (!tt_change_node)
162 return;
163
ff66c975 164 tt_change_node->change.flags = flags;
a73105b8
AQ
165 memcpy(tt_change_node->change.addr, addr, ETH_ALEN);
166
167 spin_lock_bh(&bat_priv->tt_changes_list_lock);
168 /* track the change in the OGMinterval list */
169 list_add_tail(&tt_change_node->list, &bat_priv->tt_changes_list);
170 atomic_inc(&bat_priv->tt_local_changes);
171 spin_unlock_bh(&bat_priv->tt_changes_list_lock);
172
173 atomic_set(&bat_priv->tt_ogm_append_cnt, 0);
174}
175
176int tt_len(int changes_num)
177{
178 return changes_num * sizeof(struct tt_change);
179}
180
181static int tt_local_init(struct bat_priv *bat_priv)
c6c8fea2 182{
2dafb49d 183 if (bat_priv->tt_local_hash)
5346c35e 184 return 0;
c6c8fea2 185
2dafb49d 186 bat_priv->tt_local_hash = hash_new(1024);
c6c8fea2 187
2dafb49d 188 if (!bat_priv->tt_local_hash)
5346c35e 189 return -ENOMEM;
c6c8fea2 190
5346c35e 191 return 0;
c6c8fea2
SE
192}
193
bc279080
AQ
194void tt_local_add(struct net_device *soft_iface, const uint8_t *addr,
195 int ifindex)
c6c8fea2
SE
196{
197 struct bat_priv *bat_priv = netdev_priv(soft_iface);
7683fdc1
AQ
198 struct tt_local_entry *tt_local_entry = NULL;
199 struct tt_global_entry *tt_global_entry = NULL;
db08e6e5
SW
200 struct hlist_head *head;
201 struct hlist_node *node;
202 struct tt_orig_list_entry *orig_entry;
80b3f58c 203 int hash_added;
c6c8fea2 204
2dafb49d 205 tt_local_entry = tt_local_hash_find(bat_priv, addr);
c6c8fea2 206
2dafb49d
AQ
207 if (tt_local_entry) {
208 tt_local_entry->last_seen = jiffies;
521251f2
AQ
209 /* possibly unset the TT_CLIENT_PENDING flag */
210 tt_local_entry->common.flags &= ~TT_CLIENT_PENDING;
7683fdc1 211 goto out;
c6c8fea2
SE
212 }
213
704509b8 214 tt_local_entry = kmalloc(sizeof(*tt_local_entry), GFP_ATOMIC);
2dafb49d 215 if (!tt_local_entry)
7683fdc1 216 goto out;
a73105b8 217
a73105b8
AQ
218 bat_dbg(DBG_TT, bat_priv,
219 "Creating new local tt entry: %pM (ttvn: %d)\n", addr,
220 (uint8_t)atomic_read(&bat_priv->ttvn));
c6c8fea2 221
48100bac
AQ
222 memcpy(tt_local_entry->common.addr, addr, ETH_ALEN);
223 tt_local_entry->common.flags = NO_FLAGS;
bc279080 224 if (is_wifi_iface(ifindex))
48100bac
AQ
225 tt_local_entry->common.flags |= TT_CLIENT_WIFI;
226 atomic_set(&tt_local_entry->common.refcount, 2);
227 tt_local_entry->last_seen = jiffies;
c6c8fea2
SE
228
229 /* the batman interface mac address should never be purged */
39901e71 230 if (compare_eth(addr, soft_iface->dev_addr))
48100bac 231 tt_local_entry->common.flags |= TT_CLIENT_NOPURGE;
c6c8fea2 232
c40ed2bf
AQ
233 /* The local entry has to be marked as NEW to avoid to send it in
234 * a full table response going out before the next ttvn increment
235 * (consistency check) */
236 tt_local_entry->common.flags |= TT_CLIENT_NEW;
237
80b3f58c
SW
238 hash_added = hash_add(bat_priv->tt_local_hash, compare_tt, choose_orig,
239 &tt_local_entry->common,
240 &tt_local_entry->common.hash_entry);
241
242 if (unlikely(hash_added != 0)) {
243 /* remove the reference for the hash */
244 tt_local_entry_free_ref(tt_local_entry);
245 goto out;
246 }
247
48100bac 248 tt_local_event(bat_priv, addr, tt_local_entry->common.flags);
ff66c975 249
c6c8fea2 250 /* remove address from global hash if present */
2dafb49d 251 tt_global_entry = tt_global_hash_find(bat_priv, addr);
c6c8fea2 252
cc47f66e
AQ
253 /* Check whether it is a roaming! */
254 if (tt_global_entry) {
db08e6e5
SW
255 /* These node are probably going to update their tt table */
256 head = &tt_global_entry->orig_list;
257 rcu_read_lock();
258 hlist_for_each_entry_rcu(orig_entry, node, head, list) {
259 orig_entry->orig_node->tt_poss_change = true;
260
261 send_roam_adv(bat_priv, tt_global_entry->common.addr,
262 orig_entry->orig_node);
263 }
264 rcu_read_unlock();
265 /* The global entry has to be marked as ROAMING and
266 * has to be kept for consistency purpose
267 */
220b07e9 268 tt_global_entry->common.flags |= TT_CLIENT_ROAM;
03fc3070 269 tt_global_entry->roam_at = jiffies;
7683fdc1
AQ
270 }
271out:
272 if (tt_local_entry)
273 tt_local_entry_free_ref(tt_local_entry);
274 if (tt_global_entry)
275 tt_global_entry_free_ref(tt_global_entry);
c6c8fea2
SE
276}
277
a73105b8
AQ
278int tt_changes_fill_buffer(struct bat_priv *bat_priv,
279 unsigned char *buff, int buff_len)
c6c8fea2 280{
a73105b8
AQ
281 int count = 0, tot_changes = 0;
282 struct tt_change_node *entry, *safe;
c6c8fea2 283
a73105b8
AQ
284 if (buff_len > 0)
285 tot_changes = buff_len / tt_len(1);
c6c8fea2 286
a73105b8
AQ
287 spin_lock_bh(&bat_priv->tt_changes_list_lock);
288 atomic_set(&bat_priv->tt_local_changes, 0);
c6c8fea2 289
a73105b8 290 list_for_each_entry_safe(entry, safe, &bat_priv->tt_changes_list,
7c64fd98 291 list) {
a73105b8
AQ
292 if (count < tot_changes) {
293 memcpy(buff + tt_len(count),
294 &entry->change, sizeof(struct tt_change));
c6c8fea2
SE
295 count++;
296 }
a73105b8
AQ
297 list_del(&entry->list);
298 kfree(entry);
c6c8fea2 299 }
a73105b8
AQ
300 spin_unlock_bh(&bat_priv->tt_changes_list_lock);
301
302 /* Keep the buffer for possible tt_request */
303 spin_lock_bh(&bat_priv->tt_buff_lock);
304 kfree(bat_priv->tt_buff);
305 bat_priv->tt_buff_len = 0;
306 bat_priv->tt_buff = NULL;
307 /* We check whether this new OGM has no changes due to size
308 * problems */
309 if (buff_len > 0) {
310 /**
311 * if kmalloc() fails we will reply with the full table
312 * instead of providing the diff
313 */
314 bat_priv->tt_buff = kmalloc(buff_len, GFP_ATOMIC);
315 if (bat_priv->tt_buff) {
316 memcpy(bat_priv->tt_buff, buff, buff_len);
317 bat_priv->tt_buff_len = buff_len;
318 }
319 }
320 spin_unlock_bh(&bat_priv->tt_buff_lock);
c6c8fea2 321
08ad76ec 322 return count;
c6c8fea2
SE
323}
324
2dafb49d 325int tt_local_seq_print_text(struct seq_file *seq, void *offset)
c6c8fea2
SE
326{
327 struct net_device *net_dev = (struct net_device *)seq->private;
328 struct bat_priv *bat_priv = netdev_priv(net_dev);
2dafb49d 329 struct hashtable_t *hash = bat_priv->tt_local_hash;
48100bac 330 struct tt_common_entry *tt_common_entry;
32ae9b22 331 struct hard_iface *primary_if;
7aadf889 332 struct hlist_node *node;
c6c8fea2 333 struct hlist_head *head;
c90681b8
AQ
334 uint32_t i;
335 int ret = 0;
32ae9b22
ML
336
337 primary_if = primary_if_get_selected(bat_priv);
338 if (!primary_if) {
86ceb360
SE
339 ret = seq_printf(seq,
340 "BATMAN mesh %s disabled - please specify interfaces to enable it\n",
32ae9b22
ML
341 net_dev->name);
342 goto out;
343 }
c6c8fea2 344
32ae9b22 345 if (primary_if->if_status != IF_ACTIVE) {
86ceb360
SE
346 ret = seq_printf(seq,
347 "BATMAN mesh %s disabled - primary interface not active\n",
32ae9b22
ML
348 net_dev->name);
349 goto out;
c6c8fea2
SE
350 }
351
86ceb360
SE
352 seq_printf(seq,
353 "Locally retrieved addresses (from %s) announced via TT (TTVN: %u):\n",
a73105b8 354 net_dev->name, (uint8_t)atomic_read(&bat_priv->ttvn));
c6c8fea2 355
c6c8fea2
SE
356 for (i = 0; i < hash->size; i++) {
357 head = &hash->table[i];
358
7aadf889 359 rcu_read_lock();
48100bac 360 hlist_for_each_entry_rcu(tt_common_entry, node,
7aadf889 361 head, hash_entry) {
d099c2c5 362 seq_printf(seq, " * %pM [%c%c%c%c%c]\n",
7c64fd98
SE
363 tt_common_entry->addr,
364 (tt_common_entry->flags &
365 TT_CLIENT_ROAM ? 'R' : '.'),
366 (tt_common_entry->flags &
367 TT_CLIENT_NOPURGE ? 'P' : '.'),
368 (tt_common_entry->flags &
369 TT_CLIENT_NEW ? 'N' : '.'),
370 (tt_common_entry->flags &
371 TT_CLIENT_PENDING ? 'X' : '.'),
372 (tt_common_entry->flags &
373 TT_CLIENT_WIFI ? 'W' : '.'));
c6c8fea2 374 }
7aadf889 375 rcu_read_unlock();
c6c8fea2 376 }
32ae9b22
ML
377out:
378 if (primary_if)
379 hardif_free_ref(primary_if);
380 return ret;
c6c8fea2
SE
381}
382
058d0e26
AQ
383static void tt_local_set_pending(struct bat_priv *bat_priv,
384 struct tt_local_entry *tt_local_entry,
c566dbbe 385 uint16_t flags, const char *message)
c6c8fea2 386{
48100bac
AQ
387 tt_local_event(bat_priv, tt_local_entry->common.addr,
388 tt_local_entry->common.flags | flags);
a73105b8 389
015758d0
AQ
390 /* The local client has to be marked as "pending to be removed" but has
391 * to be kept in the table in order to send it in a full table
058d0e26 392 * response issued before the net ttvn increment (consistency check) */
48100bac 393 tt_local_entry->common.flags |= TT_CLIENT_PENDING;
c566dbbe 394
86ceb360
SE
395 bat_dbg(DBG_TT, bat_priv,
396 "Local tt entry (%pM) pending to be removed: %s\n",
397 tt_local_entry->common.addr, message);
c6c8fea2
SE
398}
399
a73105b8 400void tt_local_remove(struct bat_priv *bat_priv, const uint8_t *addr,
cc47f66e 401 const char *message, bool roaming)
c6c8fea2 402{
7683fdc1 403 struct tt_local_entry *tt_local_entry = NULL;
c6c8fea2 404
2dafb49d 405 tt_local_entry = tt_local_hash_find(bat_priv, addr);
7683fdc1
AQ
406 if (!tt_local_entry)
407 goto out;
408
058d0e26 409 tt_local_set_pending(bat_priv, tt_local_entry, TT_CLIENT_DEL |
c566dbbe 410 (roaming ? TT_CLIENT_ROAM : NO_FLAGS), message);
7683fdc1
AQ
411out:
412 if (tt_local_entry)
413 tt_local_entry_free_ref(tt_local_entry);
c6c8fea2
SE
414}
415
a73105b8 416static void tt_local_purge(struct bat_priv *bat_priv)
c6c8fea2 417{
2dafb49d
AQ
418 struct hashtable_t *hash = bat_priv->tt_local_hash;
419 struct tt_local_entry *tt_local_entry;
48100bac 420 struct tt_common_entry *tt_common_entry;
7aadf889 421 struct hlist_node *node, *node_tmp;
c6c8fea2 422 struct hlist_head *head;
7683fdc1 423 spinlock_t *list_lock; /* protects write access to the hash lists */
c90681b8 424 uint32_t i;
c6c8fea2 425
c6c8fea2
SE
426 for (i = 0; i < hash->size; i++) {
427 head = &hash->table[i];
7683fdc1 428 list_lock = &hash->list_locks[i];
c6c8fea2 429
7683fdc1 430 spin_lock_bh(list_lock);
48100bac 431 hlist_for_each_entry_safe(tt_common_entry, node, node_tmp,
7aadf889 432 head, hash_entry) {
48100bac
AQ
433 tt_local_entry = container_of(tt_common_entry,
434 struct tt_local_entry,
435 common);
436 if (tt_local_entry->common.flags & TT_CLIENT_NOPURGE)
7aadf889 437 continue;
c6c8fea2 438
058d0e26 439 /* entry already marked for deletion */
48100bac 440 if (tt_local_entry->common.flags & TT_CLIENT_PENDING)
058d0e26
AQ
441 continue;
442
a04ccd59 443 if (!has_timed_out(tt_local_entry->last_seen,
032b7969 444 TT_LOCAL_TIMEOUT))
7aadf889
ML
445 continue;
446
058d0e26 447 tt_local_set_pending(bat_priv, tt_local_entry,
c566dbbe 448 TT_CLIENT_DEL, "timed out");
c6c8fea2 449 }
7683fdc1 450 spin_unlock_bh(list_lock);
c6c8fea2
SE
451 }
452
c6c8fea2
SE
453}
454
a73105b8 455static void tt_local_table_free(struct bat_priv *bat_priv)
c6c8fea2 456{
a73105b8 457 struct hashtable_t *hash;
a73105b8 458 spinlock_t *list_lock; /* protects write access to the hash lists */
48100bac 459 struct tt_common_entry *tt_common_entry;
a73105b8 460 struct tt_local_entry *tt_local_entry;
7683fdc1
AQ
461 struct hlist_node *node, *node_tmp;
462 struct hlist_head *head;
c90681b8 463 uint32_t i;
a73105b8 464
2dafb49d 465 if (!bat_priv->tt_local_hash)
c6c8fea2
SE
466 return;
467
a73105b8
AQ
468 hash = bat_priv->tt_local_hash;
469
470 for (i = 0; i < hash->size; i++) {
471 head = &hash->table[i];
472 list_lock = &hash->list_locks[i];
473
474 spin_lock_bh(list_lock);
48100bac 475 hlist_for_each_entry_safe(tt_common_entry, node, node_tmp,
a73105b8
AQ
476 head, hash_entry) {
477 hlist_del_rcu(node);
48100bac
AQ
478 tt_local_entry = container_of(tt_common_entry,
479 struct tt_local_entry,
480 common);
7683fdc1 481 tt_local_entry_free_ref(tt_local_entry);
a73105b8
AQ
482 }
483 spin_unlock_bh(list_lock);
484 }
485
486 hash_destroy(hash);
487
2dafb49d 488 bat_priv->tt_local_hash = NULL;
c6c8fea2
SE
489}
490
a73105b8 491static int tt_global_init(struct bat_priv *bat_priv)
c6c8fea2 492{
2dafb49d 493 if (bat_priv->tt_global_hash)
5346c35e 494 return 0;
c6c8fea2 495
2dafb49d 496 bat_priv->tt_global_hash = hash_new(1024);
c6c8fea2 497
2dafb49d 498 if (!bat_priv->tt_global_hash)
5346c35e 499 return -ENOMEM;
c6c8fea2 500
5346c35e 501 return 0;
c6c8fea2
SE
502}
503
a73105b8 504static void tt_changes_list_free(struct bat_priv *bat_priv)
c6c8fea2 505{
a73105b8 506 struct tt_change_node *entry, *safe;
c6c8fea2 507
a73105b8 508 spin_lock_bh(&bat_priv->tt_changes_list_lock);
c6c8fea2 509
a73105b8
AQ
510 list_for_each_entry_safe(entry, safe, &bat_priv->tt_changes_list,
511 list) {
512 list_del(&entry->list);
513 kfree(entry);
514 }
c6c8fea2 515
a73105b8
AQ
516 atomic_set(&bat_priv->tt_local_changes, 0);
517 spin_unlock_bh(&bat_priv->tt_changes_list_lock);
518}
c6c8fea2 519
db08e6e5
SW
520/* find out if an orig_node is already in the list of a tt_global_entry.
521 * returns 1 if found, 0 otherwise
522 */
523static bool tt_global_entry_has_orig(const struct tt_global_entry *entry,
524 const struct orig_node *orig_node)
525{
526 struct tt_orig_list_entry *tmp_orig_entry;
527 const struct hlist_head *head;
528 struct hlist_node *node;
529 bool found = false;
530
531 rcu_read_lock();
532 head = &entry->orig_list;
533 hlist_for_each_entry_rcu(tmp_orig_entry, node, head, list) {
534 if (tmp_orig_entry->orig_node == orig_node) {
535 found = true;
536 break;
537 }
538 }
539 rcu_read_unlock();
540 return found;
541}
542
543static void tt_global_add_orig_entry(struct tt_global_entry *tt_global_entry,
544 struct orig_node *orig_node,
545 int ttvn)
546{
547 struct tt_orig_list_entry *orig_entry;
548
549 orig_entry = kzalloc(sizeof(*orig_entry), GFP_ATOMIC);
550 if (!orig_entry)
551 return;
552
553 INIT_HLIST_NODE(&orig_entry->list);
554 atomic_inc(&orig_node->refcount);
555 atomic_inc(&orig_node->tt_size);
556 orig_entry->orig_node = orig_node;
557 orig_entry->ttvn = ttvn;
558
559 spin_lock_bh(&tt_global_entry->list_lock);
560 hlist_add_head_rcu(&orig_entry->list,
561 &tt_global_entry->orig_list);
562 spin_unlock_bh(&tt_global_entry->list_lock);
563}
564
a73105b8
AQ
565/* caller must hold orig_node refcount */
566int tt_global_add(struct bat_priv *bat_priv, struct orig_node *orig_node,
bc279080
AQ
567 const unsigned char *tt_addr, uint8_t ttvn, bool roaming,
568 bool wifi)
a73105b8 569{
db08e6e5 570 struct tt_global_entry *tt_global_entry = NULL;
7683fdc1 571 int ret = 0;
80b3f58c 572 int hash_added;
c6c8fea2 573
a73105b8
AQ
574 tt_global_entry = tt_global_hash_find(bat_priv, tt_addr);
575
576 if (!tt_global_entry) {
db08e6e5
SW
577 tt_global_entry = kzalloc(sizeof(*tt_global_entry),
578 GFP_ATOMIC);
a73105b8 579 if (!tt_global_entry)
7683fdc1
AQ
580 goto out;
581
48100bac 582 memcpy(tt_global_entry->common.addr, tt_addr, ETH_ALEN);
db08e6e5 583
48100bac 584 tt_global_entry->common.flags = NO_FLAGS;
cc47f66e 585 tt_global_entry->roam_at = 0;
db08e6e5
SW
586 atomic_set(&tt_global_entry->common.refcount, 2);
587
588 INIT_HLIST_HEAD(&tt_global_entry->orig_list);
589 spin_lock_init(&tt_global_entry->list_lock);
7683fdc1 590
80b3f58c
SW
591 hash_added = hash_add(bat_priv->tt_global_hash, compare_tt,
592 choose_orig, &tt_global_entry->common,
593 &tt_global_entry->common.hash_entry);
594
595 if (unlikely(hash_added != 0)) {
596 /* remove the reference for the hash */
597 tt_global_entry_free_ref(tt_global_entry);
598 goto out_remove;
599 }
db08e6e5
SW
600
601 tt_global_add_orig_entry(tt_global_entry, orig_node, ttvn);
a73105b8 602 } else {
db08e6e5
SW
603 /* there is already a global entry, use this one. */
604
605 /* If there is the TT_CLIENT_ROAM flag set, there is only one
606 * originator left in the list and we previously received a
607 * delete + roaming change for this originator.
608 *
609 * We should first delete the old originator before adding the
610 * new one.
611 */
612 if (tt_global_entry->common.flags & TT_CLIENT_ROAM) {
613 tt_global_del_orig_list(tt_global_entry);
614 tt_global_entry->common.flags &= ~TT_CLIENT_ROAM;
615 tt_global_entry->roam_at = 0;
a73105b8 616 }
db08e6e5
SW
617
618 if (!tt_global_entry_has_orig(tt_global_entry, orig_node))
619 tt_global_add_orig_entry(tt_global_entry, orig_node,
620 ttvn);
a73105b8 621 }
c6c8fea2 622
bc279080 623 if (wifi)
48100bac 624 tt_global_entry->common.flags |= TT_CLIENT_WIFI;
bc279080 625
a73105b8
AQ
626 bat_dbg(DBG_TT, bat_priv,
627 "Creating new global tt entry: %pM (via %pM)\n",
48100bac 628 tt_global_entry->common.addr, orig_node->orig);
c6c8fea2 629
80b3f58c 630out_remove:
a73105b8 631 /* remove address from local hash if present */
48100bac 632 tt_local_remove(bat_priv, tt_global_entry->common.addr,
7683fdc1
AQ
633 "global tt received", roaming);
634 ret = 1;
635out:
636 if (tt_global_entry)
637 tt_global_entry_free_ref(tt_global_entry);
638 return ret;
c6c8fea2
SE
639}
640
db08e6e5
SW
641/* print all orig nodes who announce the address for this global entry.
642 * it is assumed that the caller holds rcu_read_lock();
643 */
644static void tt_global_print_entry(struct tt_global_entry *tt_global_entry,
645 struct seq_file *seq)
646{
647 struct hlist_head *head;
648 struct hlist_node *node;
649 struct tt_orig_list_entry *orig_entry;
650 struct tt_common_entry *tt_common_entry;
651 uint16_t flags;
652 uint8_t last_ttvn;
653
654 tt_common_entry = &tt_global_entry->common;
655
656 head = &tt_global_entry->orig_list;
657
658 hlist_for_each_entry_rcu(orig_entry, node, head, list) {
659 flags = tt_common_entry->flags;
660 last_ttvn = atomic_read(&orig_entry->orig_node->last_ttvn);
661 seq_printf(seq, " * %pM (%3u) via %pM (%3u) [%c%c]\n",
662 tt_global_entry->common.addr, orig_entry->ttvn,
663 orig_entry->orig_node->orig, last_ttvn,
664 (flags & TT_CLIENT_ROAM ? 'R' : '.'),
665 (flags & TT_CLIENT_WIFI ? 'W' : '.'));
666 }
667}
668
2dafb49d 669int tt_global_seq_print_text(struct seq_file *seq, void *offset)
c6c8fea2
SE
670{
671 struct net_device *net_dev = (struct net_device *)seq->private;
672 struct bat_priv *bat_priv = netdev_priv(net_dev);
2dafb49d 673 struct hashtable_t *hash = bat_priv->tt_global_hash;
48100bac 674 struct tt_common_entry *tt_common_entry;
2dafb49d 675 struct tt_global_entry *tt_global_entry;
32ae9b22 676 struct hard_iface *primary_if;
7aadf889 677 struct hlist_node *node;
c6c8fea2 678 struct hlist_head *head;
c90681b8
AQ
679 uint32_t i;
680 int ret = 0;
32ae9b22
ML
681
682 primary_if = primary_if_get_selected(bat_priv);
683 if (!primary_if) {
86ceb360
SE
684 ret = seq_printf(seq,
685 "BATMAN mesh %s disabled - please specify interfaces to enable it\n",
32ae9b22
ML
686 net_dev->name);
687 goto out;
688 }
c6c8fea2 689
32ae9b22 690 if (primary_if->if_status != IF_ACTIVE) {
86ceb360
SE
691 ret = seq_printf(seq,
692 "BATMAN mesh %s disabled - primary interface not active\n",
32ae9b22
ML
693 net_dev->name);
694 goto out;
c6c8fea2
SE
695 }
696
2dafb49d
AQ
697 seq_printf(seq,
698 "Globally announced TT entries received via the mesh %s\n",
c6c8fea2 699 net_dev->name);
df6edb9e
AQ
700 seq_printf(seq, " %-13s %s %-15s %s %s\n",
701 "Client", "(TTVN)", "Originator", "(Curr TTVN)", "Flags");
c6c8fea2 702
c6c8fea2
SE
703 for (i = 0; i < hash->size; i++) {
704 head = &hash->table[i];
705
7aadf889 706 rcu_read_lock();
48100bac 707 hlist_for_each_entry_rcu(tt_common_entry, node,
7aadf889 708 head, hash_entry) {
48100bac
AQ
709 tt_global_entry = container_of(tt_common_entry,
710 struct tt_global_entry,
711 common);
db08e6e5 712 tt_global_print_entry(tt_global_entry, seq);
c6c8fea2 713 }
7aadf889 714 rcu_read_unlock();
c6c8fea2 715 }
32ae9b22
ML
716out:
717 if (primary_if)
718 hardif_free_ref(primary_if);
719 return ret;
c6c8fea2
SE
720}
721
db08e6e5
SW
722/* deletes the orig list of a tt_global_entry */
723static void tt_global_del_orig_list(struct tt_global_entry *tt_global_entry)
c6c8fea2 724{
db08e6e5
SW
725 struct hlist_head *head;
726 struct hlist_node *node, *safe;
727 struct tt_orig_list_entry *orig_entry;
a73105b8 728
db08e6e5
SW
729 spin_lock_bh(&tt_global_entry->list_lock);
730 head = &tt_global_entry->orig_list;
731 hlist_for_each_entry_safe(orig_entry, node, safe, head, list) {
732 hlist_del_rcu(node);
733 tt_orig_list_entry_free_ref(orig_entry);
734 }
735 spin_unlock_bh(&tt_global_entry->list_lock);
c6c8fea2 736
db08e6e5
SW
737}
738
739static void tt_global_del_orig_entry(struct bat_priv *bat_priv,
740 struct tt_global_entry *tt_global_entry,
741 struct orig_node *orig_node,
742 const char *message)
743{
744 struct hlist_head *head;
745 struct hlist_node *node, *safe;
746 struct tt_orig_list_entry *orig_entry;
747
748 spin_lock_bh(&tt_global_entry->list_lock);
749 head = &tt_global_entry->orig_list;
750 hlist_for_each_entry_safe(orig_entry, node, safe, head, list) {
751 if (orig_entry->orig_node == orig_node) {
752 bat_dbg(DBG_TT, bat_priv,
753 "Deleting %pM from global tt entry %pM: %s\n",
754 orig_node->orig, tt_global_entry->common.addr,
755 message);
756 hlist_del_rcu(node);
757 tt_orig_list_entry_free_ref(orig_entry);
758 }
759 }
760 spin_unlock_bh(&tt_global_entry->list_lock);
761}
762
763static void tt_global_del_struct(struct bat_priv *bat_priv,
764 struct tt_global_entry *tt_global_entry,
765 const char *message)
766{
767 bat_dbg(DBG_TT, bat_priv,
768 "Deleting global tt entry %pM: %s\n",
769 tt_global_entry->common.addr, message);
7683fdc1 770
48100bac
AQ
771 hash_remove(bat_priv->tt_global_hash, compare_tt, choose_orig,
772 tt_global_entry->common.addr);
db08e6e5
SW
773 tt_global_entry_free_ref(tt_global_entry);
774
c6c8fea2
SE
775}
776
db08e6e5
SW
777/* If the client is to be deleted, we check if it is the last origantor entry
778 * within tt_global entry. If yes, we set the TT_CLIENT_ROAM flag and the timer,
779 * otherwise we simply remove the originator scheduled for deletion.
780 */
781static void tt_global_del_roaming(struct bat_priv *bat_priv,
782 struct tt_global_entry *tt_global_entry,
783 struct orig_node *orig_node,
784 const char *message)
785{
786 bool last_entry = true;
787 struct hlist_head *head;
788 struct hlist_node *node;
789 struct tt_orig_list_entry *orig_entry;
790
791 /* no local entry exists, case 1:
792 * Check if this is the last one or if other entries exist.
793 */
794
795 rcu_read_lock();
796 head = &tt_global_entry->orig_list;
797 hlist_for_each_entry_rcu(orig_entry, node, head, list) {
798 if (orig_entry->orig_node != orig_node) {
799 last_entry = false;
800 break;
801 }
802 }
803 rcu_read_unlock();
804
805 if (last_entry) {
806 /* its the last one, mark for roaming. */
807 tt_global_entry->common.flags |= TT_CLIENT_ROAM;
808 tt_global_entry->roam_at = jiffies;
809 } else
810 /* there is another entry, we can simply delete this
811 * one and can still use the other one.
812 */
813 tt_global_del_orig_entry(bat_priv, tt_global_entry,
814 orig_node, message);
815}
816
817
818
de7aae65
SE
819static void tt_global_del(struct bat_priv *bat_priv,
820 struct orig_node *orig_node,
821 const unsigned char *addr,
822 const char *message, bool roaming)
a73105b8 823{
7683fdc1 824 struct tt_global_entry *tt_global_entry = NULL;
797399b4 825 struct tt_local_entry *tt_local_entry = NULL;
a73105b8 826
a73105b8 827 tt_global_entry = tt_global_hash_find(bat_priv, addr);
db08e6e5 828 if (!tt_global_entry)
7683fdc1 829 goto out;
a73105b8 830
db08e6e5
SW
831 if (!roaming) {
832 tt_global_del_orig_entry(bat_priv, tt_global_entry, orig_node,
833 message);
834
835 if (hlist_empty(&tt_global_entry->orig_list))
836 tt_global_del_struct(bat_priv, tt_global_entry,
837 message);
838
839 goto out;
840 }
92f90f56
SE
841
842 /* if we are deleting a global entry due to a roam
843 * event, there are two possibilities:
db08e6e5
SW
844 * 1) the client roamed from node A to node B => if there
845 * is only one originator left for this client, we mark
92f90f56
SE
846 * it with TT_CLIENT_ROAM, we start a timer and we
847 * wait for node B to claim it. In case of timeout
848 * the entry is purged.
db08e6e5
SW
849 *
850 * If there are other originators left, we directly delete
851 * the originator.
92f90f56
SE
852 * 2) the client roamed to us => we can directly delete
853 * the global entry, since it is useless now. */
db08e6e5 854
92f90f56
SE
855 tt_local_entry = tt_local_hash_find(bat_priv,
856 tt_global_entry->common.addr);
db08e6e5
SW
857 if (tt_local_entry) {
858 /* local entry exists, case 2: client roamed to us. */
859 tt_global_del_orig_list(tt_global_entry);
860 tt_global_del_struct(bat_priv, tt_global_entry, message);
861 } else
862 /* no local entry exists, case 1: check for roaming */
863 tt_global_del_roaming(bat_priv, tt_global_entry, orig_node,
864 message);
92f90f56 865
92f90f56 866
cc47f66e 867out:
7683fdc1
AQ
868 if (tt_global_entry)
869 tt_global_entry_free_ref(tt_global_entry);
797399b4
AQ
870 if (tt_local_entry)
871 tt_local_entry_free_ref(tt_local_entry);
a73105b8
AQ
872}
873
2dafb49d 874void tt_global_del_orig(struct bat_priv *bat_priv,
a73105b8 875 struct orig_node *orig_node, const char *message)
c6c8fea2 876{
2dafb49d 877 struct tt_global_entry *tt_global_entry;
48100bac 878 struct tt_common_entry *tt_common_entry;
c90681b8 879 uint32_t i;
a73105b8
AQ
880 struct hashtable_t *hash = bat_priv->tt_global_hash;
881 struct hlist_node *node, *safe;
882 struct hlist_head *head;
7683fdc1 883 spinlock_t *list_lock; /* protects write access to the hash lists */
c6c8fea2 884
6e801494
SW
885 if (!hash)
886 return;
887
a73105b8
AQ
888 for (i = 0; i < hash->size; i++) {
889 head = &hash->table[i];
7683fdc1 890 list_lock = &hash->list_locks[i];
c6c8fea2 891
7683fdc1 892 spin_lock_bh(list_lock);
48100bac 893 hlist_for_each_entry_safe(tt_common_entry, node, safe,
7c64fd98 894 head, hash_entry) {
48100bac
AQ
895 tt_global_entry = container_of(tt_common_entry,
896 struct tt_global_entry,
897 common);
db08e6e5
SW
898
899 tt_global_del_orig_entry(bat_priv, tt_global_entry,
900 orig_node, message);
901
902 if (hlist_empty(&tt_global_entry->orig_list)) {
7683fdc1 903 bat_dbg(DBG_TT, bat_priv,
db08e6e5 904 "Deleting global tt entry %pM: %s\n",
48100bac 905 tt_global_entry->common.addr,
87944973 906 message);
7683fdc1
AQ
907 hlist_del_rcu(node);
908 tt_global_entry_free_ref(tt_global_entry);
909 }
a73105b8 910 }
7683fdc1 911 spin_unlock_bh(list_lock);
c6c8fea2 912 }
a73105b8 913 atomic_set(&orig_node->tt_size, 0);
17071578 914 orig_node->tt_initialised = false;
c6c8fea2
SE
915}
916
cc47f66e
AQ
917static void tt_global_roam_purge(struct bat_priv *bat_priv)
918{
919 struct hashtable_t *hash = bat_priv->tt_global_hash;
48100bac 920 struct tt_common_entry *tt_common_entry;
cc47f66e
AQ
921 struct tt_global_entry *tt_global_entry;
922 struct hlist_node *node, *node_tmp;
923 struct hlist_head *head;
7683fdc1 924 spinlock_t *list_lock; /* protects write access to the hash lists */
c90681b8 925 uint32_t i;
cc47f66e 926
cc47f66e
AQ
927 for (i = 0; i < hash->size; i++) {
928 head = &hash->table[i];
7683fdc1 929 list_lock = &hash->list_locks[i];
cc47f66e 930
7683fdc1 931 spin_lock_bh(list_lock);
48100bac 932 hlist_for_each_entry_safe(tt_common_entry, node, node_tmp,
cc47f66e 933 head, hash_entry) {
48100bac
AQ
934 tt_global_entry = container_of(tt_common_entry,
935 struct tt_global_entry,
936 common);
937 if (!(tt_global_entry->common.flags & TT_CLIENT_ROAM))
cc47f66e 938 continue;
a04ccd59 939 if (!has_timed_out(tt_global_entry->roam_at,
032b7969 940 TT_CLIENT_ROAM_TIMEOUT))
cc47f66e
AQ
941 continue;
942
86ceb360
SE
943 bat_dbg(DBG_TT, bat_priv,
944 "Deleting global tt entry (%pM): Roaming timeout\n",
48100bac 945 tt_global_entry->common.addr);
db08e6e5 946
7683fdc1
AQ
947 hlist_del_rcu(node);
948 tt_global_entry_free_ref(tt_global_entry);
cc47f66e 949 }
7683fdc1 950 spin_unlock_bh(list_lock);
cc47f66e
AQ
951 }
952
cc47f66e
AQ
953}
954
a73105b8 955static void tt_global_table_free(struct bat_priv *bat_priv)
c6c8fea2 956{
7683fdc1
AQ
957 struct hashtable_t *hash;
958 spinlock_t *list_lock; /* protects write access to the hash lists */
48100bac 959 struct tt_common_entry *tt_common_entry;
7683fdc1
AQ
960 struct tt_global_entry *tt_global_entry;
961 struct hlist_node *node, *node_tmp;
962 struct hlist_head *head;
c90681b8 963 uint32_t i;
7683fdc1 964
2dafb49d 965 if (!bat_priv->tt_global_hash)
c6c8fea2
SE
966 return;
967
7683fdc1
AQ
968 hash = bat_priv->tt_global_hash;
969
970 for (i = 0; i < hash->size; i++) {
971 head = &hash->table[i];
972 list_lock = &hash->list_locks[i];
973
974 spin_lock_bh(list_lock);
48100bac 975 hlist_for_each_entry_safe(tt_common_entry, node, node_tmp,
7683fdc1
AQ
976 head, hash_entry) {
977 hlist_del_rcu(node);
48100bac
AQ
978 tt_global_entry = container_of(tt_common_entry,
979 struct tt_global_entry,
980 common);
7683fdc1
AQ
981 tt_global_entry_free_ref(tt_global_entry);
982 }
983 spin_unlock_bh(list_lock);
984 }
985
986 hash_destroy(hash);
987
2dafb49d 988 bat_priv->tt_global_hash = NULL;
c6c8fea2
SE
989}
990
59b699cd
AQ
991static bool _is_ap_isolated(struct tt_local_entry *tt_local_entry,
992 struct tt_global_entry *tt_global_entry)
993{
994 bool ret = false;
995
48100bac
AQ
996 if (tt_local_entry->common.flags & TT_CLIENT_WIFI &&
997 tt_global_entry->common.flags & TT_CLIENT_WIFI)
59b699cd
AQ
998 ret = true;
999
1000 return ret;
1001}
1002
747e4221 1003struct orig_node *transtable_search(struct bat_priv *bat_priv,
3d393e47 1004 const uint8_t *src, const uint8_t *addr)
c6c8fea2 1005{
3d393e47
AQ
1006 struct tt_local_entry *tt_local_entry = NULL;
1007 struct tt_global_entry *tt_global_entry = NULL;
7b36e8ee 1008 struct orig_node *orig_node = NULL;
db08e6e5
SW
1009 struct neigh_node *router = NULL;
1010 struct hlist_head *head;
1011 struct hlist_node *node;
1012 struct tt_orig_list_entry *orig_entry;
1013 int best_tq;
c6c8fea2 1014
3d393e47
AQ
1015 if (src && atomic_read(&bat_priv->ap_isolation)) {
1016 tt_local_entry = tt_local_hash_find(bat_priv, src);
1017 if (!tt_local_entry)
1018 goto out;
1019 }
7aadf889 1020
3d393e47 1021 tt_global_entry = tt_global_hash_find(bat_priv, addr);
2dafb49d 1022 if (!tt_global_entry)
7b36e8ee 1023 goto out;
7aadf889 1024
3d393e47
AQ
1025 /* check whether the clients should not communicate due to AP
1026 * isolation */
1027 if (tt_local_entry && _is_ap_isolated(tt_local_entry, tt_global_entry))
1028 goto out;
1029
db08e6e5 1030 best_tq = 0;
c6c8fea2 1031
db08e6e5
SW
1032 rcu_read_lock();
1033 head = &tt_global_entry->orig_list;
1034 hlist_for_each_entry_rcu(orig_entry, node, head, list) {
1035 router = orig_node_get_router(orig_entry->orig_node);
1036 if (!router)
1037 continue;
c6c8fea2 1038
db08e6e5
SW
1039 if (router->tq_avg > best_tq) {
1040 orig_node = orig_entry->orig_node;
1041 best_tq = router->tq_avg;
1042 }
1043 neigh_node_free_ref(router);
1044 }
1045 /* found anything? */
1046 if (orig_node && !atomic_inc_not_zero(&orig_node->refcount))
1047 orig_node = NULL;
1048 rcu_read_unlock();
7b36e8ee 1049out:
3d393e47
AQ
1050 if (tt_global_entry)
1051 tt_global_entry_free_ref(tt_global_entry);
1052 if (tt_local_entry)
1053 tt_local_entry_free_ref(tt_local_entry);
1054
7b36e8ee 1055 return orig_node;
c6c8fea2 1056}
a73105b8
AQ
1057
1058/* Calculates the checksum of the local table of a given orig_node */
de7aae65
SE
1059static uint16_t tt_global_crc(struct bat_priv *bat_priv,
1060 struct orig_node *orig_node)
a73105b8
AQ
1061{
1062 uint16_t total = 0, total_one;
1063 struct hashtable_t *hash = bat_priv->tt_global_hash;
48100bac 1064 struct tt_common_entry *tt_common_entry;
a73105b8
AQ
1065 struct tt_global_entry *tt_global_entry;
1066 struct hlist_node *node;
1067 struct hlist_head *head;
c90681b8
AQ
1068 uint32_t i;
1069 int j;
a73105b8
AQ
1070
1071 for (i = 0; i < hash->size; i++) {
1072 head = &hash->table[i];
1073
1074 rcu_read_lock();
48100bac 1075 hlist_for_each_entry_rcu(tt_common_entry, node,
a73105b8 1076 head, hash_entry) {
48100bac
AQ
1077 tt_global_entry = container_of(tt_common_entry,
1078 struct tt_global_entry,
1079 common);
db08e6e5
SW
1080 /* Roaming clients are in the global table for
1081 * consistency only. They don't have to be
1082 * taken into account while computing the
1083 * global crc
1084 */
1085 if (tt_global_entry->common.flags & TT_CLIENT_ROAM)
1086 continue;
1087
1088 /* find out if this global entry is announced by this
1089 * originator
1090 */
1091 if (!tt_global_entry_has_orig(tt_global_entry,
1092 orig_node))
1093 continue;
1094
1095 total_one = 0;
1096 for (j = 0; j < ETH_ALEN; j++)
1097 total_one = crc16_byte(total_one,
1098 tt_global_entry->common.addr[j]);
1099 total ^= total_one;
a73105b8
AQ
1100 }
1101 rcu_read_unlock();
1102 }
1103
1104 return total;
1105}
1106
1107/* Calculates the checksum of the local table */
1108uint16_t tt_local_crc(struct bat_priv *bat_priv)
1109{
1110 uint16_t total = 0, total_one;
1111 struct hashtable_t *hash = bat_priv->tt_local_hash;
48100bac 1112 struct tt_common_entry *tt_common_entry;
a73105b8
AQ
1113 struct hlist_node *node;
1114 struct hlist_head *head;
c90681b8
AQ
1115 uint32_t i;
1116 int j;
a73105b8
AQ
1117
1118 for (i = 0; i < hash->size; i++) {
1119 head = &hash->table[i];
1120
1121 rcu_read_lock();
48100bac 1122 hlist_for_each_entry_rcu(tt_common_entry, node,
a73105b8 1123 head, hash_entry) {
058d0e26
AQ
1124 /* not yet committed clients have not to be taken into
1125 * account while computing the CRC */
48100bac 1126 if (tt_common_entry->flags & TT_CLIENT_NEW)
058d0e26 1127 continue;
a73105b8
AQ
1128 total_one = 0;
1129 for (j = 0; j < ETH_ALEN; j++)
1130 total_one = crc16_byte(total_one,
48100bac 1131 tt_common_entry->addr[j]);
a73105b8
AQ
1132 total ^= total_one;
1133 }
a73105b8
AQ
1134 rcu_read_unlock();
1135 }
1136
1137 return total;
1138}
1139
1140static void tt_req_list_free(struct bat_priv *bat_priv)
1141{
1142 struct tt_req_node *node, *safe;
1143
1144 spin_lock_bh(&bat_priv->tt_req_list_lock);
1145
1146 list_for_each_entry_safe(node, safe, &bat_priv->tt_req_list, list) {
1147 list_del(&node->list);
1148 kfree(node);
1149 }
1150
1151 spin_unlock_bh(&bat_priv->tt_req_list_lock);
1152}
1153
de7aae65
SE
1154static void tt_save_orig_buffer(struct bat_priv *bat_priv,
1155 struct orig_node *orig_node,
1156 const unsigned char *tt_buff,
1157 uint8_t tt_num_changes)
a73105b8
AQ
1158{
1159 uint16_t tt_buff_len = tt_len(tt_num_changes);
1160
1161 /* Replace the old buffer only if I received something in the
1162 * last OGM (the OGM could carry no changes) */
1163 spin_lock_bh(&orig_node->tt_buff_lock);
1164 if (tt_buff_len > 0) {
1165 kfree(orig_node->tt_buff);
1166 orig_node->tt_buff_len = 0;
1167 orig_node->tt_buff = kmalloc(tt_buff_len, GFP_ATOMIC);
1168 if (orig_node->tt_buff) {
1169 memcpy(orig_node->tt_buff, tt_buff, tt_buff_len);
1170 orig_node->tt_buff_len = tt_buff_len;
1171 }
1172 }
1173 spin_unlock_bh(&orig_node->tt_buff_lock);
1174}
1175
1176static void tt_req_purge(struct bat_priv *bat_priv)
1177{
1178 struct tt_req_node *node, *safe;
1179
1180 spin_lock_bh(&bat_priv->tt_req_list_lock);
1181 list_for_each_entry_safe(node, safe, &bat_priv->tt_req_list, list) {
032b7969 1182 if (has_timed_out(node->issued_at, TT_REQUEST_TIMEOUT)) {
a73105b8
AQ
1183 list_del(&node->list);
1184 kfree(node);
1185 }
1186 }
1187 spin_unlock_bh(&bat_priv->tt_req_list_lock);
1188}
1189
1190/* returns the pointer to the new tt_req_node struct if no request
1191 * has already been issued for this orig_node, NULL otherwise */
1192static struct tt_req_node *new_tt_req_node(struct bat_priv *bat_priv,
1193 struct orig_node *orig_node)
1194{
1195 struct tt_req_node *tt_req_node_tmp, *tt_req_node = NULL;
1196
1197 spin_lock_bh(&bat_priv->tt_req_list_lock);
1198 list_for_each_entry(tt_req_node_tmp, &bat_priv->tt_req_list, list) {
1199 if (compare_eth(tt_req_node_tmp, orig_node) &&
a04ccd59 1200 !has_timed_out(tt_req_node_tmp->issued_at,
032b7969 1201 TT_REQUEST_TIMEOUT))
a73105b8
AQ
1202 goto unlock;
1203 }
1204
1205 tt_req_node = kmalloc(sizeof(*tt_req_node), GFP_ATOMIC);
1206 if (!tt_req_node)
1207 goto unlock;
1208
1209 memcpy(tt_req_node->addr, orig_node->orig, ETH_ALEN);
1210 tt_req_node->issued_at = jiffies;
1211
1212 list_add(&tt_req_node->list, &bat_priv->tt_req_list);
1213unlock:
1214 spin_unlock_bh(&bat_priv->tt_req_list_lock);
1215 return tt_req_node;
1216}
1217
058d0e26
AQ
1218/* data_ptr is useless here, but has to be kept to respect the prototype */
1219static int tt_local_valid_entry(const void *entry_ptr, const void *data_ptr)
1220{
48100bac 1221 const struct tt_common_entry *tt_common_entry = entry_ptr;
058d0e26 1222
48100bac 1223 if (tt_common_entry->flags & TT_CLIENT_NEW)
058d0e26
AQ
1224 return 0;
1225 return 1;
1226}
1227
a73105b8
AQ
1228static int tt_global_valid_entry(const void *entry_ptr, const void *data_ptr)
1229{
48100bac
AQ
1230 const struct tt_common_entry *tt_common_entry = entry_ptr;
1231 const struct tt_global_entry *tt_global_entry;
a73105b8
AQ
1232 const struct orig_node *orig_node = data_ptr;
1233
48100bac 1234 if (tt_common_entry->flags & TT_CLIENT_ROAM)
cc47f66e
AQ
1235 return 0;
1236
48100bac
AQ
1237 tt_global_entry = container_of(tt_common_entry, struct tt_global_entry,
1238 common);
1239
db08e6e5 1240 return tt_global_entry_has_orig(tt_global_entry, orig_node);
a73105b8
AQ
1241}
1242
1243static struct sk_buff *tt_response_fill_table(uint16_t tt_len, uint8_t ttvn,
1244 struct hashtable_t *hash,
1245 struct hard_iface *primary_if,
1246 int (*valid_cb)(const void *,
1247 const void *),
1248 void *cb_data)
1249{
48100bac 1250 struct tt_common_entry *tt_common_entry;
a73105b8
AQ
1251 struct tt_query_packet *tt_response;
1252 struct tt_change *tt_change;
1253 struct hlist_node *node;
1254 struct hlist_head *head;
1255 struct sk_buff *skb = NULL;
1256 uint16_t tt_tot, tt_count;
1257 ssize_t tt_query_size = sizeof(struct tt_query_packet);
c90681b8 1258 uint32_t i;
a73105b8
AQ
1259
1260 if (tt_query_size + tt_len > primary_if->soft_iface->mtu) {
1261 tt_len = primary_if->soft_iface->mtu - tt_query_size;
1262 tt_len -= tt_len % sizeof(struct tt_change);
1263 }
1264 tt_tot = tt_len / sizeof(struct tt_change);
1265
1266 skb = dev_alloc_skb(tt_query_size + tt_len + ETH_HLEN);
1267 if (!skb)
1268 goto out;
1269
1270 skb_reserve(skb, ETH_HLEN);
1271 tt_response = (struct tt_query_packet *)skb_put(skb,
1272 tt_query_size + tt_len);
1273 tt_response->ttvn = ttvn;
a73105b8
AQ
1274
1275 tt_change = (struct tt_change *)(skb->data + tt_query_size);
1276 tt_count = 0;
1277
1278 rcu_read_lock();
1279 for (i = 0; i < hash->size; i++) {
1280 head = &hash->table[i];
1281
48100bac 1282 hlist_for_each_entry_rcu(tt_common_entry, node,
a73105b8
AQ
1283 head, hash_entry) {
1284 if (tt_count == tt_tot)
1285 break;
1286
48100bac 1287 if ((valid_cb) && (!valid_cb(tt_common_entry, cb_data)))
a73105b8
AQ
1288 continue;
1289
48100bac
AQ
1290 memcpy(tt_change->addr, tt_common_entry->addr,
1291 ETH_ALEN);
a73105b8
AQ
1292 tt_change->flags = NO_FLAGS;
1293
1294 tt_count++;
1295 tt_change++;
1296 }
1297 }
1298 rcu_read_unlock();
1299
9d852393
AQ
1300 /* store in the message the number of entries we have successfully
1301 * copied */
1302 tt_response->tt_data = htons(tt_count);
1303
a73105b8
AQ
1304out:
1305 return skb;
1306}
1307
a943cac1
ML
1308static int send_tt_request(struct bat_priv *bat_priv,
1309 struct orig_node *dst_orig_node,
1310 uint8_t ttvn, uint16_t tt_crc, bool full_table)
a73105b8
AQ
1311{
1312 struct sk_buff *skb = NULL;
1313 struct tt_query_packet *tt_request;
1314 struct neigh_node *neigh_node = NULL;
1315 struct hard_iface *primary_if;
1316 struct tt_req_node *tt_req_node = NULL;
1317 int ret = 1;
1318
1319 primary_if = primary_if_get_selected(bat_priv);
1320 if (!primary_if)
1321 goto out;
1322
1323 /* The new tt_req will be issued only if I'm not waiting for a
1324 * reply from the same orig_node yet */
1325 tt_req_node = new_tt_req_node(bat_priv, dst_orig_node);
1326 if (!tt_req_node)
1327 goto out;
1328
1329 skb = dev_alloc_skb(sizeof(struct tt_query_packet) + ETH_HLEN);
1330 if (!skb)
1331 goto out;
1332
1333 skb_reserve(skb, ETH_HLEN);
1334
1335 tt_request = (struct tt_query_packet *)skb_put(skb,
1336 sizeof(struct tt_query_packet));
1337
76543d14
SE
1338 tt_request->header.packet_type = BAT_TT_QUERY;
1339 tt_request->header.version = COMPAT_VERSION;
a73105b8
AQ
1340 memcpy(tt_request->src, primary_if->net_dev->dev_addr, ETH_ALEN);
1341 memcpy(tt_request->dst, dst_orig_node->orig, ETH_ALEN);
76543d14 1342 tt_request->header.ttl = TTL;
a73105b8 1343 tt_request->ttvn = ttvn;
6d2003fc 1344 tt_request->tt_data = htons(tt_crc);
a73105b8
AQ
1345 tt_request->flags = TT_REQUEST;
1346
1347 if (full_table)
1348 tt_request->flags |= TT_FULL_TABLE;
1349
1350 neigh_node = orig_node_get_router(dst_orig_node);
1351 if (!neigh_node)
1352 goto out;
1353
86ceb360
SE
1354 bat_dbg(DBG_TT, bat_priv,
1355 "Sending TT_REQUEST to %pM via %pM [%c]\n",
1356 dst_orig_node->orig, neigh_node->addr,
a73105b8
AQ
1357 (full_table ? 'F' : '.'));
1358
f8214865
MH
1359 batadv_inc_counter(bat_priv, BAT_CNT_TT_REQUEST_TX);
1360
a73105b8
AQ
1361 send_skb_packet(skb, neigh_node->if_incoming, neigh_node->addr);
1362 ret = 0;
1363
1364out:
1365 if (neigh_node)
1366 neigh_node_free_ref(neigh_node);
1367 if (primary_if)
1368 hardif_free_ref(primary_if);
1369 if (ret)
1370 kfree_skb(skb);
1371 if (ret && tt_req_node) {
1372 spin_lock_bh(&bat_priv->tt_req_list_lock);
1373 list_del(&tt_req_node->list);
1374 spin_unlock_bh(&bat_priv->tt_req_list_lock);
1375 kfree(tt_req_node);
1376 }
1377 return ret;
1378}
1379
1380static bool send_other_tt_response(struct bat_priv *bat_priv,
1381 struct tt_query_packet *tt_request)
1382{
1383 struct orig_node *req_dst_orig_node = NULL, *res_dst_orig_node = NULL;
1384 struct neigh_node *neigh_node = NULL;
1385 struct hard_iface *primary_if = NULL;
1386 uint8_t orig_ttvn, req_ttvn, ttvn;
1387 int ret = false;
1388 unsigned char *tt_buff;
1389 bool full_table;
1390 uint16_t tt_len, tt_tot;
1391 struct sk_buff *skb = NULL;
1392 struct tt_query_packet *tt_response;
1393
1394 bat_dbg(DBG_TT, bat_priv,
86ceb360
SE
1395 "Received TT_REQUEST from %pM for ttvn: %u (%pM) [%c]\n",
1396 tt_request->src, tt_request->ttvn, tt_request->dst,
a73105b8
AQ
1397 (tt_request->flags & TT_FULL_TABLE ? 'F' : '.'));
1398
1399 /* Let's get the orig node of the REAL destination */
eb7e2a1e 1400 req_dst_orig_node = orig_hash_find(bat_priv, tt_request->dst);
a73105b8
AQ
1401 if (!req_dst_orig_node)
1402 goto out;
1403
eb7e2a1e 1404 res_dst_orig_node = orig_hash_find(bat_priv, tt_request->src);
a73105b8
AQ
1405 if (!res_dst_orig_node)
1406 goto out;
1407
1408 neigh_node = orig_node_get_router(res_dst_orig_node);
1409 if (!neigh_node)
1410 goto out;
1411
1412 primary_if = primary_if_get_selected(bat_priv);
1413 if (!primary_if)
1414 goto out;
1415
1416 orig_ttvn = (uint8_t)atomic_read(&req_dst_orig_node->last_ttvn);
1417 req_ttvn = tt_request->ttvn;
1418
015758d0 1419 /* I don't have the requested data */
a73105b8 1420 if (orig_ttvn != req_ttvn ||
f25bd58a 1421 tt_request->tt_data != htons(req_dst_orig_node->tt_crc))
a73105b8
AQ
1422 goto out;
1423
015758d0 1424 /* If the full table has been explicitly requested */
a73105b8
AQ
1425 if (tt_request->flags & TT_FULL_TABLE ||
1426 !req_dst_orig_node->tt_buff)
1427 full_table = true;
1428 else
1429 full_table = false;
1430
1431 /* In this version, fragmentation is not implemented, then
1432 * I'll send only one packet with as much TT entries as I can */
1433 if (!full_table) {
1434 spin_lock_bh(&req_dst_orig_node->tt_buff_lock);
1435 tt_len = req_dst_orig_node->tt_buff_len;
1436 tt_tot = tt_len / sizeof(struct tt_change);
1437
1438 skb = dev_alloc_skb(sizeof(struct tt_query_packet) +
1439 tt_len + ETH_HLEN);
1440 if (!skb)
1441 goto unlock;
1442
1443 skb_reserve(skb, ETH_HLEN);
1444 tt_response = (struct tt_query_packet *)skb_put(skb,
1445 sizeof(struct tt_query_packet) + tt_len);
1446 tt_response->ttvn = req_ttvn;
1447 tt_response->tt_data = htons(tt_tot);
1448
1449 tt_buff = skb->data + sizeof(struct tt_query_packet);
1450 /* Copy the last orig_node's OGM buffer */
1451 memcpy(tt_buff, req_dst_orig_node->tt_buff,
1452 req_dst_orig_node->tt_buff_len);
1453
1454 spin_unlock_bh(&req_dst_orig_node->tt_buff_lock);
1455 } else {
1456 tt_len = (uint16_t)atomic_read(&req_dst_orig_node->tt_size) *
1457 sizeof(struct tt_change);
1458 ttvn = (uint8_t)atomic_read(&req_dst_orig_node->last_ttvn);
1459
1460 skb = tt_response_fill_table(tt_len, ttvn,
1461 bat_priv->tt_global_hash,
1462 primary_if, tt_global_valid_entry,
1463 req_dst_orig_node);
1464 if (!skb)
1465 goto out;
1466
1467 tt_response = (struct tt_query_packet *)skb->data;
1468 }
1469
76543d14
SE
1470 tt_response->header.packet_type = BAT_TT_QUERY;
1471 tt_response->header.version = COMPAT_VERSION;
1472 tt_response->header.ttl = TTL;
a73105b8
AQ
1473 memcpy(tt_response->src, req_dst_orig_node->orig, ETH_ALEN);
1474 memcpy(tt_response->dst, tt_request->src, ETH_ALEN);
1475 tt_response->flags = TT_RESPONSE;
1476
1477 if (full_table)
1478 tt_response->flags |= TT_FULL_TABLE;
1479
1480 bat_dbg(DBG_TT, bat_priv,
1481 "Sending TT_RESPONSE %pM via %pM for %pM (ttvn: %u)\n",
1482 res_dst_orig_node->orig, neigh_node->addr,
1483 req_dst_orig_node->orig, req_ttvn);
1484
f8214865
MH
1485 batadv_inc_counter(bat_priv, BAT_CNT_TT_RESPONSE_TX);
1486
a73105b8
AQ
1487 send_skb_packet(skb, neigh_node->if_incoming, neigh_node->addr);
1488 ret = true;
1489 goto out;
1490
1491unlock:
1492 spin_unlock_bh(&req_dst_orig_node->tt_buff_lock);
1493
1494out:
1495 if (res_dst_orig_node)
1496 orig_node_free_ref(res_dst_orig_node);
1497 if (req_dst_orig_node)
1498 orig_node_free_ref(req_dst_orig_node);
1499 if (neigh_node)
1500 neigh_node_free_ref(neigh_node);
1501 if (primary_if)
1502 hardif_free_ref(primary_if);
1503 if (!ret)
1504 kfree_skb(skb);
1505 return ret;
1506
1507}
1508static bool send_my_tt_response(struct bat_priv *bat_priv,
1509 struct tt_query_packet *tt_request)
1510{
1511 struct orig_node *orig_node = NULL;
1512 struct neigh_node *neigh_node = NULL;
1513 struct hard_iface *primary_if = NULL;
1514 uint8_t my_ttvn, req_ttvn, ttvn;
1515 int ret = false;
1516 unsigned char *tt_buff;
1517 bool full_table;
1518 uint16_t tt_len, tt_tot;
1519 struct sk_buff *skb = NULL;
1520 struct tt_query_packet *tt_response;
1521
1522 bat_dbg(DBG_TT, bat_priv,
86ceb360
SE
1523 "Received TT_REQUEST from %pM for ttvn: %u (me) [%c]\n",
1524 tt_request->src, tt_request->ttvn,
a73105b8
AQ
1525 (tt_request->flags & TT_FULL_TABLE ? 'F' : '.'));
1526
1527
1528 my_ttvn = (uint8_t)atomic_read(&bat_priv->ttvn);
1529 req_ttvn = tt_request->ttvn;
1530
eb7e2a1e 1531 orig_node = orig_hash_find(bat_priv, tt_request->src);
a73105b8
AQ
1532 if (!orig_node)
1533 goto out;
1534
1535 neigh_node = orig_node_get_router(orig_node);
1536 if (!neigh_node)
1537 goto out;
1538
1539 primary_if = primary_if_get_selected(bat_priv);
1540 if (!primary_if)
1541 goto out;
1542
1543 /* If the full table has been explicitly requested or the gap
1544 * is too big send the whole local translation table */
1545 if (tt_request->flags & TT_FULL_TABLE || my_ttvn != req_ttvn ||
1546 !bat_priv->tt_buff)
1547 full_table = true;
1548 else
1549 full_table = false;
1550
1551 /* In this version, fragmentation is not implemented, then
1552 * I'll send only one packet with as much TT entries as I can */
1553 if (!full_table) {
1554 spin_lock_bh(&bat_priv->tt_buff_lock);
1555 tt_len = bat_priv->tt_buff_len;
1556 tt_tot = tt_len / sizeof(struct tt_change);
1557
1558 skb = dev_alloc_skb(sizeof(struct tt_query_packet) +
1559 tt_len + ETH_HLEN);
1560 if (!skb)
1561 goto unlock;
1562
1563 skb_reserve(skb, ETH_HLEN);
1564 tt_response = (struct tt_query_packet *)skb_put(skb,
1565 sizeof(struct tt_query_packet) + tt_len);
1566 tt_response->ttvn = req_ttvn;
1567 tt_response->tt_data = htons(tt_tot);
1568
1569 tt_buff = skb->data + sizeof(struct tt_query_packet);
1570 memcpy(tt_buff, bat_priv->tt_buff,
1571 bat_priv->tt_buff_len);
1572 spin_unlock_bh(&bat_priv->tt_buff_lock);
1573 } else {
1574 tt_len = (uint16_t)atomic_read(&bat_priv->num_local_tt) *
1575 sizeof(struct tt_change);
1576 ttvn = (uint8_t)atomic_read(&bat_priv->ttvn);
1577
1578 skb = tt_response_fill_table(tt_len, ttvn,
1579 bat_priv->tt_local_hash,
058d0e26
AQ
1580 primary_if, tt_local_valid_entry,
1581 NULL);
a73105b8
AQ
1582 if (!skb)
1583 goto out;
1584
1585 tt_response = (struct tt_query_packet *)skb->data;
1586 }
1587
76543d14
SE
1588 tt_response->header.packet_type = BAT_TT_QUERY;
1589 tt_response->header.version = COMPAT_VERSION;
1590 tt_response->header.ttl = TTL;
a73105b8
AQ
1591 memcpy(tt_response->src, primary_if->net_dev->dev_addr, ETH_ALEN);
1592 memcpy(tt_response->dst, tt_request->src, ETH_ALEN);
1593 tt_response->flags = TT_RESPONSE;
1594
1595 if (full_table)
1596 tt_response->flags |= TT_FULL_TABLE;
1597
1598 bat_dbg(DBG_TT, bat_priv,
1599 "Sending TT_RESPONSE to %pM via %pM [%c]\n",
1600 orig_node->orig, neigh_node->addr,
1601 (tt_response->flags & TT_FULL_TABLE ? 'F' : '.'));
1602
f8214865
MH
1603 batadv_inc_counter(bat_priv, BAT_CNT_TT_RESPONSE_TX);
1604
a73105b8
AQ
1605 send_skb_packet(skb, neigh_node->if_incoming, neigh_node->addr);
1606 ret = true;
1607 goto out;
1608
1609unlock:
1610 spin_unlock_bh(&bat_priv->tt_buff_lock);
1611out:
1612 if (orig_node)
1613 orig_node_free_ref(orig_node);
1614 if (neigh_node)
1615 neigh_node_free_ref(neigh_node);
1616 if (primary_if)
1617 hardif_free_ref(primary_if);
1618 if (!ret)
1619 kfree_skb(skb);
1620 /* This packet was for me, so it doesn't need to be re-routed */
1621 return true;
1622}
1623
1624bool send_tt_response(struct bat_priv *bat_priv,
1625 struct tt_query_packet *tt_request)
1626{
20ff9d59
SW
1627 if (is_my_mac(tt_request->dst)) {
1628 /* don't answer backbone gws! */
1629 if (bla_is_backbone_gw_orig(bat_priv, tt_request->src))
1630 return true;
1631
a73105b8 1632 return send_my_tt_response(bat_priv, tt_request);
20ff9d59 1633 } else {
a73105b8 1634 return send_other_tt_response(bat_priv, tt_request);
20ff9d59 1635 }
a73105b8
AQ
1636}
1637
1638static void _tt_update_changes(struct bat_priv *bat_priv,
1639 struct orig_node *orig_node,
1640 struct tt_change *tt_change,
1641 uint16_t tt_num_changes, uint8_t ttvn)
1642{
1643 int i;
1644
1645 for (i = 0; i < tt_num_changes; i++) {
5fbc1598 1646 if ((tt_change + i)->flags & TT_CLIENT_DEL)
a73105b8
AQ
1647 tt_global_del(bat_priv, orig_node,
1648 (tt_change + i)->addr,
cc47f66e
AQ
1649 "tt removed by changes",
1650 (tt_change + i)->flags & TT_CLIENT_ROAM);
a73105b8
AQ
1651 else
1652 if (!tt_global_add(bat_priv, orig_node,
bc279080
AQ
1653 (tt_change + i)->addr, ttvn, false,
1654 (tt_change + i)->flags &
1655 TT_CLIENT_WIFI))
a73105b8
AQ
1656 /* In case of problem while storing a
1657 * global_entry, we stop the updating
1658 * procedure without committing the
1659 * ttvn change. This will avoid to send
1660 * corrupted data on tt_request
1661 */
1662 return;
1663 }
17071578 1664 orig_node->tt_initialised = true;
a73105b8
AQ
1665}
1666
1667static void tt_fill_gtable(struct bat_priv *bat_priv,
1668 struct tt_query_packet *tt_response)
1669{
1670 struct orig_node *orig_node = NULL;
1671
1672 orig_node = orig_hash_find(bat_priv, tt_response->src);
1673 if (!orig_node)
1674 goto out;
1675
1676 /* Purge the old table first.. */
1677 tt_global_del_orig(bat_priv, orig_node, "Received full table");
1678
1679 _tt_update_changes(bat_priv, orig_node,
1680 (struct tt_change *)(tt_response + 1),
f25bd58a 1681 ntohs(tt_response->tt_data), tt_response->ttvn);
a73105b8
AQ
1682
1683 spin_lock_bh(&orig_node->tt_buff_lock);
1684 kfree(orig_node->tt_buff);
1685 orig_node->tt_buff_len = 0;
1686 orig_node->tt_buff = NULL;
1687 spin_unlock_bh(&orig_node->tt_buff_lock);
1688
1689 atomic_set(&orig_node->last_ttvn, tt_response->ttvn);
1690
1691out:
1692 if (orig_node)
1693 orig_node_free_ref(orig_node);
1694}
1695
a943cac1
ML
1696static void tt_update_changes(struct bat_priv *bat_priv,
1697 struct orig_node *orig_node,
1698 uint16_t tt_num_changes, uint8_t ttvn,
1699 struct tt_change *tt_change)
a73105b8
AQ
1700{
1701 _tt_update_changes(bat_priv, orig_node, tt_change, tt_num_changes,
1702 ttvn);
1703
1704 tt_save_orig_buffer(bat_priv, orig_node, (unsigned char *)tt_change,
1705 tt_num_changes);
1706 atomic_set(&orig_node->last_ttvn, ttvn);
1707}
1708
1709bool is_my_client(struct bat_priv *bat_priv, const uint8_t *addr)
1710{
7683fdc1
AQ
1711 struct tt_local_entry *tt_local_entry = NULL;
1712 bool ret = false;
a73105b8 1713
a73105b8 1714 tt_local_entry = tt_local_hash_find(bat_priv, addr);
7683fdc1
AQ
1715 if (!tt_local_entry)
1716 goto out;
058d0e26
AQ
1717 /* Check if the client has been logically deleted (but is kept for
1718 * consistency purpose) */
48100bac 1719 if (tt_local_entry->common.flags & TT_CLIENT_PENDING)
058d0e26 1720 goto out;
7683fdc1
AQ
1721 ret = true;
1722out:
a73105b8 1723 if (tt_local_entry)
7683fdc1
AQ
1724 tt_local_entry_free_ref(tt_local_entry);
1725 return ret;
a73105b8
AQ
1726}
1727
1728void handle_tt_response(struct bat_priv *bat_priv,
1729 struct tt_query_packet *tt_response)
1730{
1731 struct tt_req_node *node, *safe;
1732 struct orig_node *orig_node = NULL;
1733
86ceb360
SE
1734 bat_dbg(DBG_TT, bat_priv,
1735 "Received TT_RESPONSE from %pM for ttvn %d t_size: %d [%c]\n",
f25bd58a
AV
1736 tt_response->src, tt_response->ttvn,
1737 ntohs(tt_response->tt_data),
a73105b8
AQ
1738 (tt_response->flags & TT_FULL_TABLE ? 'F' : '.'));
1739
20ff9d59
SW
1740 /* we should have never asked a backbone gw */
1741 if (bla_is_backbone_gw_orig(bat_priv, tt_response->src))
1742 goto out;
1743
a73105b8
AQ
1744 orig_node = orig_hash_find(bat_priv, tt_response->src);
1745 if (!orig_node)
1746 goto out;
1747
1748 if (tt_response->flags & TT_FULL_TABLE)
1749 tt_fill_gtable(bat_priv, tt_response);
1750 else
f25bd58a
AV
1751 tt_update_changes(bat_priv, orig_node,
1752 ntohs(tt_response->tt_data),
a73105b8
AQ
1753 tt_response->ttvn,
1754 (struct tt_change *)(tt_response + 1));
1755
1756 /* Delete the tt_req_node from pending tt_requests list */
1757 spin_lock_bh(&bat_priv->tt_req_list_lock);
1758 list_for_each_entry_safe(node, safe, &bat_priv->tt_req_list, list) {
1759 if (!compare_eth(node->addr, tt_response->src))
1760 continue;
1761 list_del(&node->list);
1762 kfree(node);
1763 }
1764 spin_unlock_bh(&bat_priv->tt_req_list_lock);
1765
1766 /* Recalculate the CRC for this orig_node and store it */
a73105b8 1767 orig_node->tt_crc = tt_global_crc(bat_priv, orig_node);
cc47f66e
AQ
1768 /* Roaming phase is over: tables are in sync again. I can
1769 * unset the flag */
1770 orig_node->tt_poss_change = false;
a73105b8
AQ
1771out:
1772 if (orig_node)
1773 orig_node_free_ref(orig_node);
1774}
1775
1776int tt_init(struct bat_priv *bat_priv)
1777{
5346c35e 1778 int ret;
a73105b8 1779
5346c35e
SE
1780 ret = tt_local_init(bat_priv);
1781 if (ret < 0)
1782 return ret;
1783
1784 ret = tt_global_init(bat_priv);
1785 if (ret < 0)
1786 return ret;
a73105b8
AQ
1787
1788 tt_start_timer(bat_priv);
1789
1790 return 1;
1791}
1792
cc47f66e 1793static void tt_roam_list_free(struct bat_priv *bat_priv)
a73105b8 1794{
cc47f66e 1795 struct tt_roam_node *node, *safe;
a73105b8 1796
cc47f66e 1797 spin_lock_bh(&bat_priv->tt_roam_list_lock);
a73105b8 1798
cc47f66e
AQ
1799 list_for_each_entry_safe(node, safe, &bat_priv->tt_roam_list, list) {
1800 list_del(&node->list);
1801 kfree(node);
1802 }
1803
1804 spin_unlock_bh(&bat_priv->tt_roam_list_lock);
1805}
1806
1807static void tt_roam_purge(struct bat_priv *bat_priv)
1808{
1809 struct tt_roam_node *node, *safe;
1810
1811 spin_lock_bh(&bat_priv->tt_roam_list_lock);
1812 list_for_each_entry_safe(node, safe, &bat_priv->tt_roam_list, list) {
032b7969 1813 if (!has_timed_out(node->first_time, ROAMING_MAX_TIME))
cc47f66e
AQ
1814 continue;
1815
1816 list_del(&node->list);
1817 kfree(node);
1818 }
1819 spin_unlock_bh(&bat_priv->tt_roam_list_lock);
1820}
1821
1822/* This function checks whether the client already reached the
1823 * maximum number of possible roaming phases. In this case the ROAMING_ADV
1824 * will not be sent.
1825 *
1826 * returns true if the ROAMING_ADV can be sent, false otherwise */
1827static bool tt_check_roam_count(struct bat_priv *bat_priv,
1828 uint8_t *client)
1829{
1830 struct tt_roam_node *tt_roam_node;
1831 bool ret = false;
1832
1833 spin_lock_bh(&bat_priv->tt_roam_list_lock);
1834 /* The new tt_req will be issued only if I'm not waiting for a
1835 * reply from the same orig_node yet */
1836 list_for_each_entry(tt_roam_node, &bat_priv->tt_roam_list, list) {
1837 if (!compare_eth(tt_roam_node->addr, client))
1838 continue;
1839
032b7969 1840 if (has_timed_out(tt_roam_node->first_time, ROAMING_MAX_TIME))
cc47f66e
AQ
1841 continue;
1842
1843 if (!atomic_dec_not_zero(&tt_roam_node->counter))
1844 /* Sorry, you roamed too many times! */
1845 goto unlock;
1846 ret = true;
1847 break;
1848 }
1849
1850 if (!ret) {
1851 tt_roam_node = kmalloc(sizeof(*tt_roam_node), GFP_ATOMIC);
1852 if (!tt_roam_node)
1853 goto unlock;
1854
1855 tt_roam_node->first_time = jiffies;
1856 atomic_set(&tt_roam_node->counter, ROAMING_MAX_COUNT - 1);
1857 memcpy(tt_roam_node->addr, client, ETH_ALEN);
1858
1859 list_add(&tt_roam_node->list, &bat_priv->tt_roam_list);
1860 ret = true;
1861 }
1862
1863unlock:
1864 spin_unlock_bh(&bat_priv->tt_roam_list_lock);
1865 return ret;
1866}
1867
de7aae65
SE
1868static void send_roam_adv(struct bat_priv *bat_priv, uint8_t *client,
1869 struct orig_node *orig_node)
cc47f66e
AQ
1870{
1871 struct neigh_node *neigh_node = NULL;
1872 struct sk_buff *skb = NULL;
1873 struct roam_adv_packet *roam_adv_packet;
1874 int ret = 1;
1875 struct hard_iface *primary_if;
1876
1877 /* before going on we have to check whether the client has
1878 * already roamed to us too many times */
1879 if (!tt_check_roam_count(bat_priv, client))
1880 goto out;
1881
1882 skb = dev_alloc_skb(sizeof(struct roam_adv_packet) + ETH_HLEN);
1883 if (!skb)
1884 goto out;
1885
1886 skb_reserve(skb, ETH_HLEN);
1887
1888 roam_adv_packet = (struct roam_adv_packet *)skb_put(skb,
1889 sizeof(struct roam_adv_packet));
1890
76543d14
SE
1891 roam_adv_packet->header.packet_type = BAT_ROAM_ADV;
1892 roam_adv_packet->header.version = COMPAT_VERSION;
1893 roam_adv_packet->header.ttl = TTL;
cc47f66e
AQ
1894 primary_if = primary_if_get_selected(bat_priv);
1895 if (!primary_if)
1896 goto out;
1897 memcpy(roam_adv_packet->src, primary_if->net_dev->dev_addr, ETH_ALEN);
1898 hardif_free_ref(primary_if);
1899 memcpy(roam_adv_packet->dst, orig_node->orig, ETH_ALEN);
1900 memcpy(roam_adv_packet->client, client, ETH_ALEN);
1901
1902 neigh_node = orig_node_get_router(orig_node);
1903 if (!neigh_node)
1904 goto out;
1905
1906 bat_dbg(DBG_TT, bat_priv,
1907 "Sending ROAMING_ADV to %pM (client %pM) via %pM\n",
1908 orig_node->orig, client, neigh_node->addr);
1909
f8214865
MH
1910 batadv_inc_counter(bat_priv, BAT_CNT_TT_ROAM_ADV_TX);
1911
cc47f66e
AQ
1912 send_skb_packet(skb, neigh_node->if_incoming, neigh_node->addr);
1913 ret = 0;
1914
1915out:
1916 if (neigh_node)
1917 neigh_node_free_ref(neigh_node);
1918 if (ret)
1919 kfree_skb(skb);
1920 return;
a73105b8
AQ
1921}
1922
1923static void tt_purge(struct work_struct *work)
1924{
1925 struct delayed_work *delayed_work =
1926 container_of(work, struct delayed_work, work);
1927 struct bat_priv *bat_priv =
1928 container_of(delayed_work, struct bat_priv, tt_work);
1929
1930 tt_local_purge(bat_priv);
cc47f66e 1931 tt_global_roam_purge(bat_priv);
a73105b8 1932 tt_req_purge(bat_priv);
cc47f66e 1933 tt_roam_purge(bat_priv);
a73105b8
AQ
1934
1935 tt_start_timer(bat_priv);
1936}
cc47f66e
AQ
1937
1938void tt_free(struct bat_priv *bat_priv)
1939{
1940 cancel_delayed_work_sync(&bat_priv->tt_work);
1941
1942 tt_local_table_free(bat_priv);
1943 tt_global_table_free(bat_priv);
1944 tt_req_list_free(bat_priv);
1945 tt_changes_list_free(bat_priv);
1946 tt_roam_list_free(bat_priv);
1947
1948 kfree(bat_priv->tt_buff);
1949}
058d0e26 1950
697f2531
AQ
1951/* This function will enable or disable the specified flags for all the entries
1952 * in the given hash table and returns the number of modified entries */
1953static uint16_t tt_set_flags(struct hashtable_t *hash, uint16_t flags,
1954 bool enable)
058d0e26 1955{
c90681b8 1956 uint32_t i;
697f2531 1957 uint16_t changed_num = 0;
058d0e26
AQ
1958 struct hlist_head *head;
1959 struct hlist_node *node;
48100bac 1960 struct tt_common_entry *tt_common_entry;
058d0e26
AQ
1961
1962 if (!hash)
697f2531 1963 goto out;
058d0e26
AQ
1964
1965 for (i = 0; i < hash->size; i++) {
1966 head = &hash->table[i];
1967
1968 rcu_read_lock();
48100bac 1969 hlist_for_each_entry_rcu(tt_common_entry, node,
058d0e26 1970 head, hash_entry) {
697f2531
AQ
1971 if (enable) {
1972 if ((tt_common_entry->flags & flags) == flags)
1973 continue;
1974 tt_common_entry->flags |= flags;
1975 } else {
1976 if (!(tt_common_entry->flags & flags))
1977 continue;
1978 tt_common_entry->flags &= ~flags;
1979 }
1980 changed_num++;
058d0e26
AQ
1981 }
1982 rcu_read_unlock();
1983 }
697f2531
AQ
1984out:
1985 return changed_num;
058d0e26
AQ
1986}
1987
1988/* Purge out all the tt local entries marked with TT_CLIENT_PENDING */
1989static void tt_local_purge_pending_clients(struct bat_priv *bat_priv)
1990{
1991 struct hashtable_t *hash = bat_priv->tt_local_hash;
48100bac 1992 struct tt_common_entry *tt_common_entry;
058d0e26
AQ
1993 struct tt_local_entry *tt_local_entry;
1994 struct hlist_node *node, *node_tmp;
1995 struct hlist_head *head;
1996 spinlock_t *list_lock; /* protects write access to the hash lists */
c90681b8 1997 uint32_t i;
058d0e26
AQ
1998
1999 if (!hash)
2000 return;
2001
2002 for (i = 0; i < hash->size; i++) {
2003 head = &hash->table[i];
2004 list_lock = &hash->list_locks[i];
2005
2006 spin_lock_bh(list_lock);
48100bac 2007 hlist_for_each_entry_safe(tt_common_entry, node, node_tmp,
058d0e26 2008 head, hash_entry) {
48100bac 2009 if (!(tt_common_entry->flags & TT_CLIENT_PENDING))
058d0e26
AQ
2010 continue;
2011
86ceb360
SE
2012 bat_dbg(DBG_TT, bat_priv,
2013 "Deleting local tt entry (%pM): pending\n",
2014 tt_common_entry->addr);
058d0e26
AQ
2015
2016 atomic_dec(&bat_priv->num_local_tt);
2017 hlist_del_rcu(node);
48100bac
AQ
2018 tt_local_entry = container_of(tt_common_entry,
2019 struct tt_local_entry,
2020 common);
058d0e26
AQ
2021 tt_local_entry_free_ref(tt_local_entry);
2022 }
2023 spin_unlock_bh(list_lock);
2024 }
2025
2026}
2027
2028void tt_commit_changes(struct bat_priv *bat_priv)
2029{
697f2531
AQ
2030 uint16_t changed_num = tt_set_flags(bat_priv->tt_local_hash,
2031 TT_CLIENT_NEW, false);
2032 /* all the reset entries have now to be effectively counted as local
2033 * entries */
2034 atomic_add(changed_num, &bat_priv->num_local_tt);
058d0e26
AQ
2035 tt_local_purge_pending_clients(bat_priv);
2036
2037 /* Increment the TTVN only once per OGM interval */
2038 atomic_inc(&bat_priv->ttvn);
db08e6e5
SW
2039 bat_dbg(DBG_TT, bat_priv, "Local changes committed, updating to ttvn %u\n",
2040 (uint8_t)atomic_read(&bat_priv->ttvn));
058d0e26
AQ
2041 bat_priv->tt_poss_change = false;
2042}
59b699cd
AQ
2043
2044bool is_ap_isolated(struct bat_priv *bat_priv, uint8_t *src, uint8_t *dst)
2045{
2046 struct tt_local_entry *tt_local_entry = NULL;
2047 struct tt_global_entry *tt_global_entry = NULL;
2048 bool ret = true;
2049
2050 if (!atomic_read(&bat_priv->ap_isolation))
2051 return false;
2052
2053 tt_local_entry = tt_local_hash_find(bat_priv, dst);
2054 if (!tt_local_entry)
2055 goto out;
2056
2057 tt_global_entry = tt_global_hash_find(bat_priv, src);
2058 if (!tt_global_entry)
2059 goto out;
2060
2061 if (_is_ap_isolated(tt_local_entry, tt_global_entry))
2062 goto out;
2063
2064 ret = false;
2065
2066out:
2067 if (tt_global_entry)
2068 tt_global_entry_free_ref(tt_global_entry);
2069 if (tt_local_entry)
2070 tt_local_entry_free_ref(tt_local_entry);
2071 return ret;
2072}
a943cac1
ML
2073
2074void tt_update_orig(struct bat_priv *bat_priv, struct orig_node *orig_node,
2075 const unsigned char *tt_buff, uint8_t tt_num_changes,
2076 uint8_t ttvn, uint16_t tt_crc)
2077{
2078 uint8_t orig_ttvn = (uint8_t)atomic_read(&orig_node->last_ttvn);
2079 bool full_table = true;
2080
20ff9d59
SW
2081 /* don't care about a backbone gateways updates. */
2082 if (bla_is_backbone_gw_orig(bat_priv, orig_node->orig))
2083 return;
2084
17071578
AQ
2085 /* orig table not initialised AND first diff is in the OGM OR the ttvn
2086 * increased by one -> we can apply the attached changes */
2087 if ((!orig_node->tt_initialised && ttvn == 1) ||
2088 ttvn - orig_ttvn == 1) {
a943cac1
ML
2089 /* the OGM could not contain the changes due to their size or
2090 * because they have already been sent TT_OGM_APPEND_MAX times.
2091 * In this case send a tt request */
2092 if (!tt_num_changes) {
2093 full_table = false;
2094 goto request_table;
2095 }
2096
2097 tt_update_changes(bat_priv, orig_node, tt_num_changes, ttvn,
2098 (struct tt_change *)tt_buff);
2099
2100 /* Even if we received the precomputed crc with the OGM, we
2101 * prefer to recompute it to spot any possible inconsistency
2102 * in the global table */
2103 orig_node->tt_crc = tt_global_crc(bat_priv, orig_node);
2104
2105 /* The ttvn alone is not enough to guarantee consistency
2106 * because a single value could represent different states
2107 * (due to the wrap around). Thus a node has to check whether
2108 * the resulting table (after applying the changes) is still
2109 * consistent or not. E.g. a node could disconnect while its
2110 * ttvn is X and reconnect on ttvn = X + TTVN_MAX: in this case
2111 * checking the CRC value is mandatory to detect the
2112 * inconsistency */
2113 if (orig_node->tt_crc != tt_crc)
2114 goto request_table;
2115
2116 /* Roaming phase is over: tables are in sync again. I can
2117 * unset the flag */
2118 orig_node->tt_poss_change = false;
2119 } else {
2120 /* if we missed more than one change or our tables are not
2121 * in sync anymore -> request fresh tt data */
db08e6e5 2122
17071578
AQ
2123 if (!orig_node->tt_initialised || ttvn != orig_ttvn ||
2124 orig_node->tt_crc != tt_crc) {
a943cac1 2125request_table:
86ceb360
SE
2126 bat_dbg(DBG_TT, bat_priv,
2127 "TT inconsistency for %pM. Need to retrieve the correct information (ttvn: %u last_ttvn: %u crc: %u last_crc: %u num_changes: %u)\n",
2128 orig_node->orig, ttvn, orig_ttvn, tt_crc,
2129 orig_node->tt_crc, tt_num_changes);
a943cac1
ML
2130 send_tt_request(bat_priv, orig_node, ttvn, tt_crc,
2131 full_table);
2132 return;
2133 }
2134 }
2135}
3275e7cc
AQ
2136
2137/* returns true whether we know that the client has moved from its old
2138 * originator to another one. This entry is kept is still kept for consistency
2139 * purposes
2140 */
2141bool tt_global_client_is_roaming(struct bat_priv *bat_priv, uint8_t *addr)
2142{
2143 struct tt_global_entry *tt_global_entry;
2144 bool ret = false;
2145
2146 tt_global_entry = tt_global_hash_find(bat_priv, addr);
2147 if (!tt_global_entry)
2148 goto out;
2149
2150 ret = tt_global_entry->common.flags & TT_CLIENT_ROAM;
2151 tt_global_entry_free_ref(tt_global_entry);
2152out:
2153 return ret;
2154}