1 /* Copyright (C) 2007-2015 B.A.T.M.A.N. contributors: 2 * 3 * Marek Lindner, Simon Wunderlich, Antonio Quartulli 4 * 5 * This program is free software; you can redistribute it and/or 6 * modify it under the terms of version 2 of the GNU General Public 7 * License as published by the Free Software Foundation. 8 * 9 * This program is distributed in the hope that it will be useful, but 10 * WITHOUT ANY WARRANTY; without even the implied warranty of 11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 12 * General Public License for more details. 13 * 14 * You should have received a copy of the GNU General Public License 15 * along with this program; if not, see <http://www.gnu.org/licenses/>. 16 */ 17 18 #include "translation-table.h" 19 #include "main.h" 20 21 #include <linux/atomic.h> 22 #include <linux/bug.h> 23 #include <linux/byteorder/generic.h> 24 #include <linux/compiler.h> 25 #include <linux/crc32c.h> 26 #include <linux/errno.h> 27 #include <linux/etherdevice.h> 28 #include <linux/fs.h> 29 #include <linux/if_ether.h> 30 #include <linux/jhash.h> 31 #include <linux/jiffies.h> 32 #include <linux/kernel.h> 33 #include <linux/list.h> 34 #include <linux/lockdep.h> 35 #include <linux/netdevice.h> 36 #include <linux/rculist.h> 37 #include <linux/rcupdate.h> 38 #include <linux/seq_file.h> 39 #include <linux/slab.h> 40 #include <linux/spinlock.h> 41 #include <linux/stddef.h> 42 #include <linux/string.h> 43 #include <linux/workqueue.h> 44 #include <net/net_namespace.h> 45 46 #include "bridge_loop_avoidance.h" 47 #include "hard-interface.h" 48 #include "hash.h" 49 #include "multicast.h" 50 #include "originator.h" 51 #include "packet.h" 52 #include "soft-interface.h" 53 54 /* hash class keys */ 55 static struct lock_class_key batadv_tt_local_hash_lock_class_key; 56 static struct lock_class_key batadv_tt_global_hash_lock_class_key; 57 58 static void batadv_send_roam_adv(struct batadv_priv *bat_priv, uint8_t *client, 59 unsigned short vid, 60 struct batadv_orig_node *orig_node); 61 static void batadv_tt_purge(struct work_struct *work); 62 static void 63 batadv_tt_global_del_orig_list(struct batadv_tt_global_entry *tt_global_entry); 64 static void batadv_tt_global_del(struct batadv_priv *bat_priv, 65 struct batadv_orig_node *orig_node, 66 const unsigned char *addr, 67 unsigned short vid, const char *message, 68 bool roaming); 69 70 /* returns 1 if they are the same mac addr */ 71 static int batadv_compare_tt(const struct hlist_node *node, const void *data2) 72 { 73 const void *data1 = container_of(node, struct batadv_tt_common_entry, 74 hash_entry); 75 76 return batadv_compare_eth(data1, data2); 77 } 78 79 /** 80 * batadv_choose_tt - return the index of the tt entry in the hash table 81 * @data: pointer to the tt_common_entry object to map 82 * @size: the size of the hash table 83 * 84 * Returns the hash index where the object represented by 'data' should be 85 * stored at. 86 */ 87 static inline uint32_t batadv_choose_tt(const void *data, uint32_t size) 88 { 89 struct batadv_tt_common_entry *tt; 90 uint32_t hash = 0; 91 92 tt = (struct batadv_tt_common_entry *)data; 93 hash = jhash(&tt->addr, ETH_ALEN, hash); 94 hash = jhash(&tt->vid, sizeof(tt->vid), hash); 95 96 return hash % size; 97 } 98 99 /** 100 * batadv_tt_hash_find - look for a client in the given hash table 101 * @hash: the hash table to search 102 * @addr: the mac address of the client to look for 103 * @vid: VLAN identifier 104 * 105 * Returns a pointer to the tt_common struct belonging to the searched client if 106 * found, NULL otherwise. 107 */ 108 static struct batadv_tt_common_entry * 109 batadv_tt_hash_find(struct batadv_hashtable *hash, const uint8_t *addr, 110 unsigned short vid) 111 { 112 struct hlist_head *head; 113 struct batadv_tt_common_entry to_search, *tt, *tt_tmp = NULL; 114 uint32_t index; 115 116 if (!hash) 117 return NULL; 118 119 ether_addr_copy(to_search.addr, addr); 120 to_search.vid = vid; 121 122 index = batadv_choose_tt(&to_search, hash->size); 123 head = &hash->table[index]; 124 125 rcu_read_lock(); 126 hlist_for_each_entry_rcu(tt, head, hash_entry) { 127 if (!batadv_compare_eth(tt, addr)) 128 continue; 129 130 if (tt->vid != vid) 131 continue; 132 133 if (!atomic_inc_not_zero(&tt->refcount)) 134 continue; 135 136 tt_tmp = tt; 137 break; 138 } 139 rcu_read_unlock(); 140 141 return tt_tmp; 142 } 143 144 /** 145 * batadv_tt_local_hash_find - search the local table for a given client 146 * @bat_priv: the bat priv with all the soft interface information 147 * @addr: the mac address of the client to look for 148 * @vid: VLAN identifier 149 * 150 * Returns a pointer to the corresponding tt_local_entry struct if the client is 151 * found, NULL otherwise. 152 */ 153 static struct batadv_tt_local_entry * 154 batadv_tt_local_hash_find(struct batadv_priv *bat_priv, const uint8_t *addr, 155 unsigned short vid) 156 { 157 struct batadv_tt_common_entry *tt_common_entry; 158 struct batadv_tt_local_entry *tt_local_entry = NULL; 159 160 tt_common_entry = batadv_tt_hash_find(bat_priv->tt.local_hash, addr, 161 vid); 162 if (tt_common_entry) 163 tt_local_entry = container_of(tt_common_entry, 164 struct batadv_tt_local_entry, 165 common); 166 return tt_local_entry; 167 } 168 169 /** 170 * batadv_tt_global_hash_find - search the global table for a given client 171 * @bat_priv: the bat priv with all the soft interface information 172 * @addr: the mac address of the client to look for 173 * @vid: VLAN identifier 174 * 175 * Returns a pointer to the corresponding tt_global_entry struct if the client 176 * is found, NULL otherwise. 177 */ 178 static struct batadv_tt_global_entry * 179 batadv_tt_global_hash_find(struct batadv_priv *bat_priv, const uint8_t *addr, 180 unsigned short vid) 181 { 182 struct batadv_tt_common_entry *tt_common_entry; 183 struct batadv_tt_global_entry *tt_global_entry = NULL; 184 185 tt_common_entry = batadv_tt_hash_find(bat_priv->tt.global_hash, addr, 186 vid); 187 if (tt_common_entry) 188 tt_global_entry = container_of(tt_common_entry, 189 struct batadv_tt_global_entry, 190 common); 191 return tt_global_entry; 192 } 193 194 static void 195 batadv_tt_local_entry_free_ref(struct batadv_tt_local_entry *tt_local_entry) 196 { 197 if (atomic_dec_and_test(&tt_local_entry->common.refcount)) 198 kfree_rcu(tt_local_entry, common.rcu); 199 } 200 201 /** 202 * batadv_tt_global_entry_free_ref - decrement the refcounter for a 203 * tt_global_entry and possibly free it 204 * @tt_global_entry: the object to free 205 */ 206 static void 207 batadv_tt_global_entry_free_ref(struct batadv_tt_global_entry *tt_global_entry) 208 { 209 if (atomic_dec_and_test(&tt_global_entry->common.refcount)) { 210 batadv_tt_global_del_orig_list(tt_global_entry); 211 kfree_rcu(tt_global_entry, common.rcu); 212 } 213 } 214 215 /** 216 * batadv_tt_global_hash_count - count the number of orig entries 217 * @hash: hash table containing the tt entries 218 * @addr: the mac address of the client to count entries for 219 * @vid: VLAN identifier 220 * 221 * Return the number of originators advertising the given address/data 222 * (excluding ourself). 223 */ 224 int batadv_tt_global_hash_count(struct batadv_priv *bat_priv, 225 const uint8_t *addr, unsigned short vid) 226 { 227 struct batadv_tt_global_entry *tt_global_entry; 228 int count; 229 230 tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid); 231 if (!tt_global_entry) 232 return 0; 233 234 count = atomic_read(&tt_global_entry->orig_list_count); 235 batadv_tt_global_entry_free_ref(tt_global_entry); 236 237 return count; 238 } 239 240 static void batadv_tt_orig_list_entry_free_rcu(struct rcu_head *rcu) 241 { 242 struct batadv_tt_orig_list_entry *orig_entry; 243 244 orig_entry = container_of(rcu, struct batadv_tt_orig_list_entry, rcu); 245 246 /* We are in an rcu callback here, therefore we cannot use 247 * batadv_orig_node_free_ref() and its call_rcu(): 248 * An rcu_barrier() wouldn't wait for that to finish 249 */ 250 batadv_orig_node_free_ref_now(orig_entry->orig_node); 251 kfree(orig_entry); 252 } 253 254 /** 255 * batadv_tt_local_size_mod - change the size by v of the local table identified 256 * by vid 257 * @bat_priv: the bat priv with all the soft interface information 258 * @vid: the VLAN identifier of the sub-table to change 259 * @v: the amount to sum to the local table size 260 */ 261 static void batadv_tt_local_size_mod(struct batadv_priv *bat_priv, 262 unsigned short vid, int v) 263 { 264 struct batadv_softif_vlan *vlan; 265 266 vlan = batadv_softif_vlan_get(bat_priv, vid); 267 if (!vlan) 268 return; 269 270 atomic_add(v, &vlan->tt.num_entries); 271 272 batadv_softif_vlan_free_ref(vlan); 273 } 274 275 /** 276 * batadv_tt_local_size_inc - increase by one the local table size for the given 277 * vid 278 * @bat_priv: the bat priv with all the soft interface information 279 * @vid: the VLAN identifier 280 */ 281 static void batadv_tt_local_size_inc(struct batadv_priv *bat_priv, 282 unsigned short vid) 283 { 284 batadv_tt_local_size_mod(bat_priv, vid, 1); 285 } 286 287 /** 288 * batadv_tt_local_size_dec - decrease by one the local table size for the given 289 * vid 290 * @bat_priv: the bat priv with all the soft interface information 291 * @vid: the VLAN identifier 292 */ 293 static void batadv_tt_local_size_dec(struct batadv_priv *bat_priv, 294 unsigned short vid) 295 { 296 batadv_tt_local_size_mod(bat_priv, vid, -1); 297 } 298 299 /** 300 * batadv_tt_global_size_mod - change the size by v of the local table 301 * identified by vid 302 * @bat_priv: the bat priv with all the soft interface information 303 * @vid: the VLAN identifier 304 * @v: the amount to sum to the global table size 305 */ 306 static void batadv_tt_global_size_mod(struct batadv_orig_node *orig_node, 307 unsigned short vid, int v) 308 { 309 struct batadv_orig_node_vlan *vlan; 310 311 vlan = batadv_orig_node_vlan_new(orig_node, vid); 312 if (!vlan) 313 return; 314 315 if (atomic_add_return(v, &vlan->tt.num_entries) == 0) { 316 spin_lock_bh(&orig_node->vlan_list_lock); 317 list_del_rcu(&vlan->list); 318 spin_unlock_bh(&orig_node->vlan_list_lock); 319 batadv_orig_node_vlan_free_ref(vlan); 320 } 321 322 batadv_orig_node_vlan_free_ref(vlan); 323 } 324 325 /** 326 * batadv_tt_global_size_inc - increase by one the global table size for the 327 * given vid 328 * @orig_node: the originator which global table size has to be decreased 329 * @vid: the vlan identifier 330 */ 331 static void batadv_tt_global_size_inc(struct batadv_orig_node *orig_node, 332 unsigned short vid) 333 { 334 batadv_tt_global_size_mod(orig_node, vid, 1); 335 } 336 337 /** 338 * batadv_tt_global_size_dec - decrease by one the global table size for the 339 * given vid 340 * @orig_node: the originator which global table size has to be decreased 341 * @vid: the vlan identifier 342 */ 343 static void batadv_tt_global_size_dec(struct batadv_orig_node *orig_node, 344 unsigned short vid) 345 { 346 batadv_tt_global_size_mod(orig_node, vid, -1); 347 } 348 349 static void 350 batadv_tt_orig_list_entry_free_ref(struct batadv_tt_orig_list_entry *orig_entry) 351 { 352 if (!atomic_dec_and_test(&orig_entry->refcount)) 353 return; 354 355 call_rcu(&orig_entry->rcu, batadv_tt_orig_list_entry_free_rcu); 356 } 357 358 /** 359 * batadv_tt_local_event - store a local TT event (ADD/DEL) 360 * @bat_priv: the bat priv with all the soft interface information 361 * @tt_local_entry: the TT entry involved in the event 362 * @event_flags: flags to store in the event structure 363 */ 364 static void batadv_tt_local_event(struct batadv_priv *bat_priv, 365 struct batadv_tt_local_entry *tt_local_entry, 366 uint8_t event_flags) 367 { 368 struct batadv_tt_change_node *tt_change_node, *entry, *safe; 369 struct batadv_tt_common_entry *common = &tt_local_entry->common; 370 uint8_t flags = common->flags | event_flags; 371 bool event_removed = false; 372 bool del_op_requested, del_op_entry; 373 374 tt_change_node = kmalloc(sizeof(*tt_change_node), GFP_ATOMIC); 375 if (!tt_change_node) 376 return; 377 378 tt_change_node->change.flags = flags; 379 memset(tt_change_node->change.reserved, 0, 380 sizeof(tt_change_node->change.reserved)); 381 ether_addr_copy(tt_change_node->change.addr, common->addr); 382 tt_change_node->change.vid = htons(common->vid); 383 384 del_op_requested = flags & BATADV_TT_CLIENT_DEL; 385 386 /* check for ADD+DEL or DEL+ADD events */ 387 spin_lock_bh(&bat_priv->tt.changes_list_lock); 388 list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list, 389 list) { 390 if (!batadv_compare_eth(entry->change.addr, common->addr)) 391 continue; 392 393 /* DEL+ADD in the same orig interval have no effect and can be 394 * removed to avoid silly behaviour on the receiver side. The 395 * other way around (ADD+DEL) can happen in case of roaming of 396 * a client still in the NEW state. Roaming of NEW clients is 397 * now possible due to automatically recognition of "temporary" 398 * clients 399 */ 400 del_op_entry = entry->change.flags & BATADV_TT_CLIENT_DEL; 401 if (!del_op_requested && del_op_entry) 402 goto del; 403 if (del_op_requested && !del_op_entry) 404 goto del; 405 406 /* this is a second add in the same originator interval. It 407 * means that flags have been changed: update them! 408 */ 409 if (!del_op_requested && !del_op_entry) 410 entry->change.flags = flags; 411 412 continue; 413 del: 414 list_del(&entry->list); 415 kfree(entry); 416 kfree(tt_change_node); 417 event_removed = true; 418 goto unlock; 419 } 420 421 /* track the change in the OGMinterval list */ 422 list_add_tail(&tt_change_node->list, &bat_priv->tt.changes_list); 423 424 unlock: 425 spin_unlock_bh(&bat_priv->tt.changes_list_lock); 426 427 if (event_removed) 428 atomic_dec(&bat_priv->tt.local_changes); 429 else 430 atomic_inc(&bat_priv->tt.local_changes); 431 } 432 433 /** 434 * batadv_tt_len - compute length in bytes of given number of tt changes 435 * @changes_num: number of tt changes 436 * 437 * Returns computed length in bytes. 438 */ 439 static int batadv_tt_len(int changes_num) 440 { 441 return changes_num * sizeof(struct batadv_tvlv_tt_change); 442 } 443 444 /** 445 * batadv_tt_entries - compute the number of entries fitting in tt_len bytes 446 * @tt_len: available space 447 * 448 * Returns the number of entries. 449 */ 450 static uint16_t batadv_tt_entries(uint16_t tt_len) 451 { 452 return tt_len / batadv_tt_len(1); 453 } 454 455 /** 456 * batadv_tt_local_table_transmit_size - calculates the local translation table 457 * size when transmitted over the air 458 * @bat_priv: the bat priv with all the soft interface information 459 * 460 * Returns local translation table size in bytes. 461 */ 462 static int batadv_tt_local_table_transmit_size(struct batadv_priv *bat_priv) 463 { 464 uint16_t num_vlan = 0, tt_local_entries = 0; 465 struct batadv_softif_vlan *vlan; 466 int hdr_size; 467 468 rcu_read_lock(); 469 hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) { 470 num_vlan++; 471 tt_local_entries += atomic_read(&vlan->tt.num_entries); 472 } 473 rcu_read_unlock(); 474 475 /* header size of tvlv encapsulated tt response payload */ 476 hdr_size = sizeof(struct batadv_unicast_tvlv_packet); 477 hdr_size += sizeof(struct batadv_tvlv_hdr); 478 hdr_size += sizeof(struct batadv_tvlv_tt_data); 479 hdr_size += num_vlan * sizeof(struct batadv_tvlv_tt_vlan_data); 480 481 return hdr_size + batadv_tt_len(tt_local_entries); 482 } 483 484 static int batadv_tt_local_init(struct batadv_priv *bat_priv) 485 { 486 if (bat_priv->tt.local_hash) 487 return 0; 488 489 bat_priv->tt.local_hash = batadv_hash_new(1024); 490 491 if (!bat_priv->tt.local_hash) 492 return -ENOMEM; 493 494 batadv_hash_set_lock_class(bat_priv->tt.local_hash, 495 &batadv_tt_local_hash_lock_class_key); 496 497 return 0; 498 } 499 500 static void batadv_tt_global_free(struct batadv_priv *bat_priv, 501 struct batadv_tt_global_entry *tt_global, 502 const char *message) 503 { 504 batadv_dbg(BATADV_DBG_TT, bat_priv, 505 "Deleting global tt entry %pM (vid: %d): %s\n", 506 tt_global->common.addr, 507 BATADV_PRINT_VID(tt_global->common.vid), message); 508 509 batadv_hash_remove(bat_priv->tt.global_hash, batadv_compare_tt, 510 batadv_choose_tt, &tt_global->common); 511 batadv_tt_global_entry_free_ref(tt_global); 512 } 513 514 /** 515 * batadv_tt_local_add - add a new client to the local table or update an 516 * existing client 517 * @soft_iface: netdev struct of the mesh interface 518 * @addr: the mac address of the client to add 519 * @vid: VLAN identifier 520 * @ifindex: index of the interface where the client is connected to (useful to 521 * identify wireless clients) 522 * @mark: the value contained in the skb->mark field of the received packet (if 523 * any) 524 * 525 * Returns true if the client was successfully added, false otherwise. 526 */ 527 bool batadv_tt_local_add(struct net_device *soft_iface, const uint8_t *addr, 528 unsigned short vid, int ifindex, uint32_t mark) 529 { 530 struct batadv_priv *bat_priv = netdev_priv(soft_iface); 531 struct batadv_tt_local_entry *tt_local; 532 struct batadv_tt_global_entry *tt_global = NULL; 533 struct batadv_softif_vlan *vlan; 534 struct net_device *in_dev = NULL; 535 struct hlist_head *head; 536 struct batadv_tt_orig_list_entry *orig_entry; 537 int hash_added, table_size, packet_size_max; 538 bool ret = false, roamed_back = false; 539 uint8_t remote_flags; 540 uint32_t match_mark; 541 542 if (ifindex != BATADV_NULL_IFINDEX) 543 in_dev = dev_get_by_index(&init_net, ifindex); 544 545 tt_local = batadv_tt_local_hash_find(bat_priv, addr, vid); 546 547 if (!is_multicast_ether_addr(addr)) 548 tt_global = batadv_tt_global_hash_find(bat_priv, addr, vid); 549 550 if (tt_local) { 551 tt_local->last_seen = jiffies; 552 if (tt_local->common.flags & BATADV_TT_CLIENT_PENDING) { 553 batadv_dbg(BATADV_DBG_TT, bat_priv, 554 "Re-adding pending client %pM (vid: %d)\n", 555 addr, BATADV_PRINT_VID(vid)); 556 /* whatever the reason why the PENDING flag was set, 557 * this is a client which was enqueued to be removed in 558 * this orig_interval. Since it popped up again, the 559 * flag can be reset like it was never enqueued 560 */ 561 tt_local->common.flags &= ~BATADV_TT_CLIENT_PENDING; 562 goto add_event; 563 } 564 565 if (tt_local->common.flags & BATADV_TT_CLIENT_ROAM) { 566 batadv_dbg(BATADV_DBG_TT, bat_priv, 567 "Roaming client %pM (vid: %d) came back to its original location\n", 568 addr, BATADV_PRINT_VID(vid)); 569 /* the ROAM flag is set because this client roamed away 570 * and the node got a roaming_advertisement message. Now 571 * that the client popped up again at its original 572 * location such flag can be unset 573 */ 574 tt_local->common.flags &= ~BATADV_TT_CLIENT_ROAM; 575 roamed_back = true; 576 } 577 goto check_roaming; 578 } 579 580 /* Ignore the client if we cannot send it in a full table response. */ 581 table_size = batadv_tt_local_table_transmit_size(bat_priv); 582 table_size += batadv_tt_len(1); 583 packet_size_max = atomic_read(&bat_priv->packet_size_max); 584 if (table_size > packet_size_max) { 585 net_ratelimited_function(batadv_info, soft_iface, 586 "Local translation table size (%i) exceeds maximum packet size (%i); Ignoring new local tt entry: %pM\n", 587 table_size, packet_size_max, addr); 588 goto out; 589 } 590 591 tt_local = kmalloc(sizeof(*tt_local), GFP_ATOMIC); 592 if (!tt_local) 593 goto out; 594 595 /* increase the refcounter of the related vlan */ 596 vlan = batadv_softif_vlan_get(bat_priv, vid); 597 if (WARN(!vlan, "adding TT local entry %pM to non-existent VLAN %d", 598 addr, BATADV_PRINT_VID(vid))) { 599 kfree(tt_local); 600 tt_local = NULL; 601 goto out; 602 } 603 604 batadv_dbg(BATADV_DBG_TT, bat_priv, 605 "Creating new local tt entry: %pM (vid: %d, ttvn: %d)\n", 606 addr, BATADV_PRINT_VID(vid), 607 (uint8_t)atomic_read(&bat_priv->tt.vn)); 608 609 ether_addr_copy(tt_local->common.addr, addr); 610 /* The local entry has to be marked as NEW to avoid to send it in 611 * a full table response going out before the next ttvn increment 612 * (consistency check) 613 */ 614 tt_local->common.flags = BATADV_TT_CLIENT_NEW; 615 tt_local->common.vid = vid; 616 if (batadv_is_wifi_netdev(in_dev)) 617 tt_local->common.flags |= BATADV_TT_CLIENT_WIFI; 618 atomic_set(&tt_local->common.refcount, 2); 619 tt_local->last_seen = jiffies; 620 tt_local->common.added_at = tt_local->last_seen; 621 622 /* the batman interface mac and multicast addresses should never be 623 * purged 624 */ 625 if (batadv_compare_eth(addr, soft_iface->dev_addr) || 626 is_multicast_ether_addr(addr)) 627 tt_local->common.flags |= BATADV_TT_CLIENT_NOPURGE; 628 629 hash_added = batadv_hash_add(bat_priv->tt.local_hash, batadv_compare_tt, 630 batadv_choose_tt, &tt_local->common, 631 &tt_local->common.hash_entry); 632 633 if (unlikely(hash_added != 0)) { 634 /* remove the reference for the hash */ 635 batadv_tt_local_entry_free_ref(tt_local); 636 batadv_softif_vlan_free_ref(vlan); 637 goto out; 638 } 639 640 add_event: 641 batadv_tt_local_event(bat_priv, tt_local, BATADV_NO_FLAGS); 642 643 check_roaming: 644 /* Check whether it is a roaming, but don't do anything if the roaming 645 * process has already been handled 646 */ 647 if (tt_global && !(tt_global->common.flags & BATADV_TT_CLIENT_ROAM)) { 648 /* These node are probably going to update their tt table */ 649 head = &tt_global->orig_list; 650 rcu_read_lock(); 651 hlist_for_each_entry_rcu(orig_entry, head, list) { 652 batadv_send_roam_adv(bat_priv, tt_global->common.addr, 653 tt_global->common.vid, 654 orig_entry->orig_node); 655 } 656 rcu_read_unlock(); 657 if (roamed_back) { 658 batadv_tt_global_free(bat_priv, tt_global, 659 "Roaming canceled"); 660 tt_global = NULL; 661 } else { 662 /* The global entry has to be marked as ROAMING and 663 * has to be kept for consistency purpose 664 */ 665 tt_global->common.flags |= BATADV_TT_CLIENT_ROAM; 666 tt_global->roam_at = jiffies; 667 } 668 } 669 670 /* store the current remote flags before altering them. This helps 671 * understanding is flags are changing or not 672 */ 673 remote_flags = tt_local->common.flags & BATADV_TT_REMOTE_MASK; 674 675 if (batadv_is_wifi_netdev(in_dev)) 676 tt_local->common.flags |= BATADV_TT_CLIENT_WIFI; 677 else 678 tt_local->common.flags &= ~BATADV_TT_CLIENT_WIFI; 679 680 /* check the mark in the skb: if it's equal to the configured 681 * isolation_mark, it means the packet is coming from an isolated 682 * non-mesh client 683 */ 684 match_mark = (mark & bat_priv->isolation_mark_mask); 685 if (bat_priv->isolation_mark_mask && 686 match_mark == bat_priv->isolation_mark) 687 tt_local->common.flags |= BATADV_TT_CLIENT_ISOLA; 688 else 689 tt_local->common.flags &= ~BATADV_TT_CLIENT_ISOLA; 690 691 /* if any "dynamic" flag has been modified, resend an ADD event for this 692 * entry so that all the nodes can get the new flags 693 */ 694 if (remote_flags ^ (tt_local->common.flags & BATADV_TT_REMOTE_MASK)) 695 batadv_tt_local_event(bat_priv, tt_local, BATADV_NO_FLAGS); 696 697 ret = true; 698 out: 699 if (in_dev) 700 dev_put(in_dev); 701 if (tt_local) 702 batadv_tt_local_entry_free_ref(tt_local); 703 if (tt_global) 704 batadv_tt_global_entry_free_ref(tt_global); 705 return ret; 706 } 707 708 /** 709 * batadv_tt_prepare_tvlv_global_data - prepare the TVLV TT header to send 710 * within a TT Response directed to another node 711 * @orig_node: originator for which the TT data has to be prepared 712 * @tt_data: uninitialised pointer to the address of the TVLV buffer 713 * @tt_change: uninitialised pointer to the address of the area where the TT 714 * changed can be stored 715 * @tt_len: pointer to the length to reserve to the tt_change. if -1 this 716 * function reserves the amount of space needed to send the entire global TT 717 * table. In case of success the value is updated with the real amount of 718 * reserved bytes 719 720 * Allocate the needed amount of memory for the entire TT TVLV and write its 721 * header made up by one tvlv_tt_data object and a series of tvlv_tt_vlan_data 722 * objects, one per active VLAN served by the originator node. 723 * 724 * Return the size of the allocated buffer or 0 in case of failure. 725 */ 726 static uint16_t 727 batadv_tt_prepare_tvlv_global_data(struct batadv_orig_node *orig_node, 728 struct batadv_tvlv_tt_data **tt_data, 729 struct batadv_tvlv_tt_change **tt_change, 730 int32_t *tt_len) 731 { 732 uint16_t num_vlan = 0, num_entries = 0, change_offset, tvlv_len; 733 struct batadv_tvlv_tt_vlan_data *tt_vlan; 734 struct batadv_orig_node_vlan *vlan; 735 uint8_t *tt_change_ptr; 736 737 rcu_read_lock(); 738 list_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) { 739 num_vlan++; 740 num_entries += atomic_read(&vlan->tt.num_entries); 741 } 742 743 change_offset = sizeof(**tt_data); 744 change_offset += num_vlan * sizeof(*tt_vlan); 745 746 /* if tt_len is negative, allocate the space needed by the full table */ 747 if (*tt_len < 0) 748 *tt_len = batadv_tt_len(num_entries); 749 750 tvlv_len = *tt_len; 751 tvlv_len += change_offset; 752 753 *tt_data = kmalloc(tvlv_len, GFP_ATOMIC); 754 if (!*tt_data) { 755 *tt_len = 0; 756 goto out; 757 } 758 759 (*tt_data)->flags = BATADV_NO_FLAGS; 760 (*tt_data)->ttvn = atomic_read(&orig_node->last_ttvn); 761 (*tt_data)->num_vlan = htons(num_vlan); 762 763 tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(*tt_data + 1); 764 list_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) { 765 tt_vlan->vid = htons(vlan->vid); 766 tt_vlan->crc = htonl(vlan->tt.crc); 767 768 tt_vlan++; 769 } 770 771 tt_change_ptr = (uint8_t *)*tt_data + change_offset; 772 *tt_change = (struct batadv_tvlv_tt_change *)tt_change_ptr; 773 774 out: 775 rcu_read_unlock(); 776 return tvlv_len; 777 } 778 779 /** 780 * batadv_tt_prepare_tvlv_local_data - allocate and prepare the TT TVLV for this 781 * node 782 * @bat_priv: the bat priv with all the soft interface information 783 * @tt_data: uninitialised pointer to the address of the TVLV buffer 784 * @tt_change: uninitialised pointer to the address of the area where the TT 785 * changes can be stored 786 * @tt_len: pointer to the length to reserve to the tt_change. if -1 this 787 * function reserves the amount of space needed to send the entire local TT 788 * table. In case of success the value is updated with the real amount of 789 * reserved bytes 790 * 791 * Allocate the needed amount of memory for the entire TT TVLV and write its 792 * header made up by one tvlv_tt_data object and a series of tvlv_tt_vlan_data 793 * objects, one per active VLAN. 794 * 795 * Return the size of the allocated buffer or 0 in case of failure. 796 */ 797 static uint16_t 798 batadv_tt_prepare_tvlv_local_data(struct batadv_priv *bat_priv, 799 struct batadv_tvlv_tt_data **tt_data, 800 struct batadv_tvlv_tt_change **tt_change, 801 int32_t *tt_len) 802 { 803 struct batadv_tvlv_tt_vlan_data *tt_vlan; 804 struct batadv_softif_vlan *vlan; 805 uint16_t num_vlan = 0, num_entries = 0, tvlv_len; 806 uint8_t *tt_change_ptr; 807 int change_offset; 808 809 rcu_read_lock(); 810 hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) { 811 num_vlan++; 812 num_entries += atomic_read(&vlan->tt.num_entries); 813 } 814 815 change_offset = sizeof(**tt_data); 816 change_offset += num_vlan * sizeof(*tt_vlan); 817 818 /* if tt_len is negative, allocate the space needed by the full table */ 819 if (*tt_len < 0) 820 *tt_len = batadv_tt_len(num_entries); 821 822 tvlv_len = *tt_len; 823 tvlv_len += change_offset; 824 825 *tt_data = kmalloc(tvlv_len, GFP_ATOMIC); 826 if (!*tt_data) { 827 tvlv_len = 0; 828 goto out; 829 } 830 831 (*tt_data)->flags = BATADV_NO_FLAGS; 832 (*tt_data)->ttvn = atomic_read(&bat_priv->tt.vn); 833 (*tt_data)->num_vlan = htons(num_vlan); 834 835 tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(*tt_data + 1); 836 hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) { 837 tt_vlan->vid = htons(vlan->vid); 838 tt_vlan->crc = htonl(vlan->tt.crc); 839 840 tt_vlan++; 841 } 842 843 tt_change_ptr = (uint8_t *)*tt_data + change_offset; 844 *tt_change = (struct batadv_tvlv_tt_change *)tt_change_ptr; 845 846 out: 847 rcu_read_unlock(); 848 return tvlv_len; 849 } 850 851 /** 852 * batadv_tt_tvlv_container_update - update the translation table tvlv container 853 * after local tt changes have been committed 854 * @bat_priv: the bat priv with all the soft interface information 855 */ 856 static void batadv_tt_tvlv_container_update(struct batadv_priv *bat_priv) 857 { 858 struct batadv_tt_change_node *entry, *safe; 859 struct batadv_tvlv_tt_data *tt_data; 860 struct batadv_tvlv_tt_change *tt_change; 861 int tt_diff_len, tt_change_len = 0; 862 int tt_diff_entries_num = 0, tt_diff_entries_count = 0; 863 uint16_t tvlv_len; 864 865 tt_diff_entries_num = atomic_read(&bat_priv->tt.local_changes); 866 tt_diff_len = batadv_tt_len(tt_diff_entries_num); 867 868 /* if we have too many changes for one packet don't send any 869 * and wait for the tt table request which will be fragmented 870 */ 871 if (tt_diff_len > bat_priv->soft_iface->mtu) 872 tt_diff_len = 0; 873 874 tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv, &tt_data, 875 &tt_change, &tt_diff_len); 876 if (!tvlv_len) 877 return; 878 879 tt_data->flags = BATADV_TT_OGM_DIFF; 880 881 if (tt_diff_len == 0) 882 goto container_register; 883 884 spin_lock_bh(&bat_priv->tt.changes_list_lock); 885 atomic_set(&bat_priv->tt.local_changes, 0); 886 887 list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list, 888 list) { 889 if (tt_diff_entries_count < tt_diff_entries_num) { 890 memcpy(tt_change + tt_diff_entries_count, 891 &entry->change, 892 sizeof(struct batadv_tvlv_tt_change)); 893 tt_diff_entries_count++; 894 } 895 list_del(&entry->list); 896 kfree(entry); 897 } 898 spin_unlock_bh(&bat_priv->tt.changes_list_lock); 899 900 /* Keep the buffer for possible tt_request */ 901 spin_lock_bh(&bat_priv->tt.last_changeset_lock); 902 kfree(bat_priv->tt.last_changeset); 903 bat_priv->tt.last_changeset_len = 0; 904 bat_priv->tt.last_changeset = NULL; 905 tt_change_len = batadv_tt_len(tt_diff_entries_count); 906 /* check whether this new OGM has no changes due to size problems */ 907 if (tt_diff_entries_count > 0) { 908 /* if kmalloc() fails we will reply with the full table 909 * instead of providing the diff 910 */ 911 bat_priv->tt.last_changeset = kzalloc(tt_diff_len, GFP_ATOMIC); 912 if (bat_priv->tt.last_changeset) { 913 memcpy(bat_priv->tt.last_changeset, 914 tt_change, tt_change_len); 915 bat_priv->tt.last_changeset_len = tt_diff_len; 916 } 917 } 918 spin_unlock_bh(&bat_priv->tt.last_changeset_lock); 919 920 container_register: 921 batadv_tvlv_container_register(bat_priv, BATADV_TVLV_TT, 1, tt_data, 922 tvlv_len); 923 kfree(tt_data); 924 } 925 926 int batadv_tt_local_seq_print_text(struct seq_file *seq, void *offset) 927 { 928 struct net_device *net_dev = (struct net_device *)seq->private; 929 struct batadv_priv *bat_priv = netdev_priv(net_dev); 930 struct batadv_hashtable *hash = bat_priv->tt.local_hash; 931 struct batadv_tt_common_entry *tt_common_entry; 932 struct batadv_tt_local_entry *tt_local; 933 struct batadv_hard_iface *primary_if; 934 struct batadv_softif_vlan *vlan; 935 struct hlist_head *head; 936 unsigned short vid; 937 uint32_t i; 938 int last_seen_secs; 939 int last_seen_msecs; 940 unsigned long last_seen_jiffies; 941 bool no_purge; 942 uint16_t np_flag = BATADV_TT_CLIENT_NOPURGE; 943 944 primary_if = batadv_seq_print_text_primary_if_get(seq); 945 if (!primary_if) 946 goto out; 947 948 seq_printf(seq, 949 "Locally retrieved addresses (from %s) announced via TT (TTVN: %u):\n", 950 net_dev->name, (uint8_t)atomic_read(&bat_priv->tt.vn)); 951 seq_printf(seq, " %-13s %s %-8s %-9s (%-10s)\n", "Client", "VID", 952 "Flags", "Last seen", "CRC"); 953 954 for (i = 0; i < hash->size; i++) { 955 head = &hash->table[i]; 956 957 rcu_read_lock(); 958 hlist_for_each_entry_rcu(tt_common_entry, 959 head, hash_entry) { 960 tt_local = container_of(tt_common_entry, 961 struct batadv_tt_local_entry, 962 common); 963 vid = tt_common_entry->vid; 964 last_seen_jiffies = jiffies - tt_local->last_seen; 965 last_seen_msecs = jiffies_to_msecs(last_seen_jiffies); 966 last_seen_secs = last_seen_msecs / 1000; 967 last_seen_msecs = last_seen_msecs % 1000; 968 969 no_purge = tt_common_entry->flags & np_flag; 970 971 vlan = batadv_softif_vlan_get(bat_priv, vid); 972 if (!vlan) { 973 seq_printf(seq, "Cannot retrieve VLAN %d\n", 974 BATADV_PRINT_VID(vid)); 975 continue; 976 } 977 978 seq_printf(seq, 979 " * %pM %4i [%c%c%c%c%c%c] %3u.%03u (%#.8x)\n", 980 tt_common_entry->addr, 981 BATADV_PRINT_VID(tt_common_entry->vid), 982 ((tt_common_entry->flags & 983 BATADV_TT_CLIENT_ROAM) ? 'R' : '.'), 984 no_purge ? 'P' : '.', 985 ((tt_common_entry->flags & 986 BATADV_TT_CLIENT_NEW) ? 'N' : '.'), 987 ((tt_common_entry->flags & 988 BATADV_TT_CLIENT_PENDING) ? 'X' : '.'), 989 ((tt_common_entry->flags & 990 BATADV_TT_CLIENT_WIFI) ? 'W' : '.'), 991 ((tt_common_entry->flags & 992 BATADV_TT_CLIENT_ISOLA) ? 'I' : '.'), 993 no_purge ? 0 : last_seen_secs, 994 no_purge ? 0 : last_seen_msecs, 995 vlan->tt.crc); 996 997 batadv_softif_vlan_free_ref(vlan); 998 } 999 rcu_read_unlock(); 1000 } 1001 out: 1002 if (primary_if) 1003 batadv_hardif_free_ref(primary_if); 1004 return 0; 1005 } 1006 1007 static void 1008 batadv_tt_local_set_pending(struct batadv_priv *bat_priv, 1009 struct batadv_tt_local_entry *tt_local_entry, 1010 uint16_t flags, const char *message) 1011 { 1012 batadv_tt_local_event(bat_priv, tt_local_entry, flags); 1013 1014 /* The local client has to be marked as "pending to be removed" but has 1015 * to be kept in the table in order to send it in a full table 1016 * response issued before the net ttvn increment (consistency check) 1017 */ 1018 tt_local_entry->common.flags |= BATADV_TT_CLIENT_PENDING; 1019 1020 batadv_dbg(BATADV_DBG_TT, bat_priv, 1021 "Local tt entry (%pM, vid: %d) pending to be removed: %s\n", 1022 tt_local_entry->common.addr, 1023 BATADV_PRINT_VID(tt_local_entry->common.vid), message); 1024 } 1025 1026 /** 1027 * batadv_tt_local_remove - logically remove an entry from the local table 1028 * @bat_priv: the bat priv with all the soft interface information 1029 * @addr: the MAC address of the client to remove 1030 * @vid: VLAN identifier 1031 * @message: message to append to the log on deletion 1032 * @roaming: true if the deletion is due to a roaming event 1033 * 1034 * Returns the flags assigned to the local entry before being deleted 1035 */ 1036 uint16_t batadv_tt_local_remove(struct batadv_priv *bat_priv, 1037 const uint8_t *addr, unsigned short vid, 1038 const char *message, bool roaming) 1039 { 1040 struct batadv_tt_local_entry *tt_local_entry; 1041 uint16_t flags, curr_flags = BATADV_NO_FLAGS; 1042 struct batadv_softif_vlan *vlan; 1043 void *tt_entry_exists; 1044 1045 tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid); 1046 if (!tt_local_entry) 1047 goto out; 1048 1049 curr_flags = tt_local_entry->common.flags; 1050 1051 flags = BATADV_TT_CLIENT_DEL; 1052 /* if this global entry addition is due to a roaming, the node has to 1053 * mark the local entry as "roamed" in order to correctly reroute 1054 * packets later 1055 */ 1056 if (roaming) { 1057 flags |= BATADV_TT_CLIENT_ROAM; 1058 /* mark the local client as ROAMed */ 1059 tt_local_entry->common.flags |= BATADV_TT_CLIENT_ROAM; 1060 } 1061 1062 if (!(tt_local_entry->common.flags & BATADV_TT_CLIENT_NEW)) { 1063 batadv_tt_local_set_pending(bat_priv, tt_local_entry, flags, 1064 message); 1065 goto out; 1066 } 1067 /* if this client has been added right now, it is possible to 1068 * immediately purge it 1069 */ 1070 batadv_tt_local_event(bat_priv, tt_local_entry, BATADV_TT_CLIENT_DEL); 1071 1072 tt_entry_exists = batadv_hash_remove(bat_priv->tt.local_hash, 1073 batadv_compare_tt, 1074 batadv_choose_tt, 1075 &tt_local_entry->common); 1076 if (!tt_entry_exists) 1077 goto out; 1078 1079 /* extra call to free the local tt entry */ 1080 batadv_tt_local_entry_free_ref(tt_local_entry); 1081 1082 /* decrease the reference held for this vlan */ 1083 vlan = batadv_softif_vlan_get(bat_priv, vid); 1084 if (!vlan) 1085 goto out; 1086 1087 batadv_softif_vlan_free_ref(vlan); 1088 batadv_softif_vlan_free_ref(vlan); 1089 1090 out: 1091 if (tt_local_entry) 1092 batadv_tt_local_entry_free_ref(tt_local_entry); 1093 1094 return curr_flags; 1095 } 1096 1097 /** 1098 * batadv_tt_local_purge_list - purge inactive tt local entries 1099 * @bat_priv: the bat priv with all the soft interface information 1100 * @head: pointer to the list containing the local tt entries 1101 * @timeout: parameter deciding whether a given tt local entry is considered 1102 * inactive or not 1103 */ 1104 static void batadv_tt_local_purge_list(struct batadv_priv *bat_priv, 1105 struct hlist_head *head, 1106 int timeout) 1107 { 1108 struct batadv_tt_local_entry *tt_local_entry; 1109 struct batadv_tt_common_entry *tt_common_entry; 1110 struct hlist_node *node_tmp; 1111 1112 hlist_for_each_entry_safe(tt_common_entry, node_tmp, head, 1113 hash_entry) { 1114 tt_local_entry = container_of(tt_common_entry, 1115 struct batadv_tt_local_entry, 1116 common); 1117 if (tt_local_entry->common.flags & BATADV_TT_CLIENT_NOPURGE) 1118 continue; 1119 1120 /* entry already marked for deletion */ 1121 if (tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING) 1122 continue; 1123 1124 if (!batadv_has_timed_out(tt_local_entry->last_seen, timeout)) 1125 continue; 1126 1127 batadv_tt_local_set_pending(bat_priv, tt_local_entry, 1128 BATADV_TT_CLIENT_DEL, "timed out"); 1129 } 1130 } 1131 1132 /** 1133 * batadv_tt_local_purge - purge inactive tt local entries 1134 * @bat_priv: the bat priv with all the soft interface information 1135 * @timeout: parameter deciding whether a given tt local entry is considered 1136 * inactive or not 1137 */ 1138 static void batadv_tt_local_purge(struct batadv_priv *bat_priv, 1139 int timeout) 1140 { 1141 struct batadv_hashtable *hash = bat_priv->tt.local_hash; 1142 struct hlist_head *head; 1143 spinlock_t *list_lock; /* protects write access to the hash lists */ 1144 uint32_t i; 1145 1146 for (i = 0; i < hash->size; i++) { 1147 head = &hash->table[i]; 1148 list_lock = &hash->list_locks[i]; 1149 1150 spin_lock_bh(list_lock); 1151 batadv_tt_local_purge_list(bat_priv, head, timeout); 1152 spin_unlock_bh(list_lock); 1153 } 1154 } 1155 1156 static void batadv_tt_local_table_free(struct batadv_priv *bat_priv) 1157 { 1158 struct batadv_hashtable *hash; 1159 spinlock_t *list_lock; /* protects write access to the hash lists */ 1160 struct batadv_tt_common_entry *tt_common_entry; 1161 struct batadv_tt_local_entry *tt_local; 1162 struct batadv_softif_vlan *vlan; 1163 struct hlist_node *node_tmp; 1164 struct hlist_head *head; 1165 uint32_t i; 1166 1167 if (!bat_priv->tt.local_hash) 1168 return; 1169 1170 hash = bat_priv->tt.local_hash; 1171 1172 for (i = 0; i < hash->size; i++) { 1173 head = &hash->table[i]; 1174 list_lock = &hash->list_locks[i]; 1175 1176 spin_lock_bh(list_lock); 1177 hlist_for_each_entry_safe(tt_common_entry, node_tmp, 1178 head, hash_entry) { 1179 hlist_del_rcu(&tt_common_entry->hash_entry); 1180 tt_local = container_of(tt_common_entry, 1181 struct batadv_tt_local_entry, 1182 common); 1183 1184 /* decrease the reference held for this vlan */ 1185 vlan = batadv_softif_vlan_get(bat_priv, 1186 tt_common_entry->vid); 1187 if (vlan) { 1188 batadv_softif_vlan_free_ref(vlan); 1189 batadv_softif_vlan_free_ref(vlan); 1190 } 1191 1192 batadv_tt_local_entry_free_ref(tt_local); 1193 } 1194 spin_unlock_bh(list_lock); 1195 } 1196 1197 batadv_hash_destroy(hash); 1198 1199 bat_priv->tt.local_hash = NULL; 1200 } 1201 1202 static int batadv_tt_global_init(struct batadv_priv *bat_priv) 1203 { 1204 if (bat_priv->tt.global_hash) 1205 return 0; 1206 1207 bat_priv->tt.global_hash = batadv_hash_new(1024); 1208 1209 if (!bat_priv->tt.global_hash) 1210 return -ENOMEM; 1211 1212 batadv_hash_set_lock_class(bat_priv->tt.global_hash, 1213 &batadv_tt_global_hash_lock_class_key); 1214 1215 return 0; 1216 } 1217 1218 static void batadv_tt_changes_list_free(struct batadv_priv *bat_priv) 1219 { 1220 struct batadv_tt_change_node *entry, *safe; 1221 1222 spin_lock_bh(&bat_priv->tt.changes_list_lock); 1223 1224 list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list, 1225 list) { 1226 list_del(&entry->list); 1227 kfree(entry); 1228 } 1229 1230 atomic_set(&bat_priv->tt.local_changes, 0); 1231 spin_unlock_bh(&bat_priv->tt.changes_list_lock); 1232 } 1233 1234 /* retrieves the orig_tt_list_entry belonging to orig_node from the 1235 * batadv_tt_global_entry list 1236 * 1237 * returns it with an increased refcounter, NULL if not found 1238 */ 1239 static struct batadv_tt_orig_list_entry * 1240 batadv_tt_global_orig_entry_find(const struct batadv_tt_global_entry *entry, 1241 const struct batadv_orig_node *orig_node) 1242 { 1243 struct batadv_tt_orig_list_entry *tmp_orig_entry, *orig_entry = NULL; 1244 const struct hlist_head *head; 1245 1246 rcu_read_lock(); 1247 head = &entry->orig_list; 1248 hlist_for_each_entry_rcu(tmp_orig_entry, head, list) { 1249 if (tmp_orig_entry->orig_node != orig_node) 1250 continue; 1251 if (!atomic_inc_not_zero(&tmp_orig_entry->refcount)) 1252 continue; 1253 1254 orig_entry = tmp_orig_entry; 1255 break; 1256 } 1257 rcu_read_unlock(); 1258 1259 return orig_entry; 1260 } 1261 1262 /* find out if an orig_node is already in the list of a tt_global_entry. 1263 * returns true if found, false otherwise 1264 */ 1265 static bool 1266 batadv_tt_global_entry_has_orig(const struct batadv_tt_global_entry *entry, 1267 const struct batadv_orig_node *orig_node) 1268 { 1269 struct batadv_tt_orig_list_entry *orig_entry; 1270 bool found = false; 1271 1272 orig_entry = batadv_tt_global_orig_entry_find(entry, orig_node); 1273 if (orig_entry) { 1274 found = true; 1275 batadv_tt_orig_list_entry_free_ref(orig_entry); 1276 } 1277 1278 return found; 1279 } 1280 1281 static void 1282 batadv_tt_global_orig_entry_add(struct batadv_tt_global_entry *tt_global, 1283 struct batadv_orig_node *orig_node, int ttvn) 1284 { 1285 struct batadv_tt_orig_list_entry *orig_entry; 1286 1287 orig_entry = batadv_tt_global_orig_entry_find(tt_global, orig_node); 1288 if (orig_entry) { 1289 /* refresh the ttvn: the current value could be a bogus one that 1290 * was added during a "temporary client detection" 1291 */ 1292 orig_entry->ttvn = ttvn; 1293 goto out; 1294 } 1295 1296 orig_entry = kzalloc(sizeof(*orig_entry), GFP_ATOMIC); 1297 if (!orig_entry) 1298 goto out; 1299 1300 INIT_HLIST_NODE(&orig_entry->list); 1301 atomic_inc(&orig_node->refcount); 1302 batadv_tt_global_size_inc(orig_node, tt_global->common.vid); 1303 orig_entry->orig_node = orig_node; 1304 orig_entry->ttvn = ttvn; 1305 atomic_set(&orig_entry->refcount, 2); 1306 1307 spin_lock_bh(&tt_global->list_lock); 1308 hlist_add_head_rcu(&orig_entry->list, 1309 &tt_global->orig_list); 1310 spin_unlock_bh(&tt_global->list_lock); 1311 atomic_inc(&tt_global->orig_list_count); 1312 1313 out: 1314 if (orig_entry) 1315 batadv_tt_orig_list_entry_free_ref(orig_entry); 1316 } 1317 1318 /** 1319 * batadv_tt_global_add - add a new TT global entry or update an existing one 1320 * @bat_priv: the bat priv with all the soft interface information 1321 * @orig_node: the originator announcing the client 1322 * @tt_addr: the mac address of the non-mesh client 1323 * @vid: VLAN identifier 1324 * @flags: TT flags that have to be set for this non-mesh client 1325 * @ttvn: the tt version number ever announcing this non-mesh client 1326 * 1327 * Add a new TT global entry for the given originator. If the entry already 1328 * exists add a new reference to the given originator (a global entry can have 1329 * references to multiple originators) and adjust the flags attribute to reflect 1330 * the function argument. 1331 * If a TT local entry exists for this non-mesh client remove it. 1332 * 1333 * The caller must hold orig_node refcount. 1334 * 1335 * Return true if the new entry has been added, false otherwise 1336 */ 1337 static bool batadv_tt_global_add(struct batadv_priv *bat_priv, 1338 struct batadv_orig_node *orig_node, 1339 const unsigned char *tt_addr, 1340 unsigned short vid, uint16_t flags, 1341 uint8_t ttvn) 1342 { 1343 struct batadv_tt_global_entry *tt_global_entry; 1344 struct batadv_tt_local_entry *tt_local_entry; 1345 bool ret = false; 1346 int hash_added; 1347 struct batadv_tt_common_entry *common; 1348 uint16_t local_flags; 1349 1350 /* ignore global entries from backbone nodes */ 1351 if (batadv_bla_is_backbone_gw_orig(bat_priv, orig_node->orig, vid)) 1352 return true; 1353 1354 tt_global_entry = batadv_tt_global_hash_find(bat_priv, tt_addr, vid); 1355 tt_local_entry = batadv_tt_local_hash_find(bat_priv, tt_addr, vid); 1356 1357 /* if the node already has a local client for this entry, it has to wait 1358 * for a roaming advertisement instead of manually messing up the global 1359 * table 1360 */ 1361 if ((flags & BATADV_TT_CLIENT_TEMP) && tt_local_entry && 1362 !(tt_local_entry->common.flags & BATADV_TT_CLIENT_NEW)) 1363 goto out; 1364 1365 if (!tt_global_entry) { 1366 tt_global_entry = kzalloc(sizeof(*tt_global_entry), GFP_ATOMIC); 1367 if (!tt_global_entry) 1368 goto out; 1369 1370 common = &tt_global_entry->common; 1371 ether_addr_copy(common->addr, tt_addr); 1372 common->vid = vid; 1373 1374 common->flags = flags; 1375 tt_global_entry->roam_at = 0; 1376 /* node must store current time in case of roaming. This is 1377 * needed to purge this entry out on timeout (if nobody claims 1378 * it) 1379 */ 1380 if (flags & BATADV_TT_CLIENT_ROAM) 1381 tt_global_entry->roam_at = jiffies; 1382 atomic_set(&common->refcount, 2); 1383 common->added_at = jiffies; 1384 1385 INIT_HLIST_HEAD(&tt_global_entry->orig_list); 1386 atomic_set(&tt_global_entry->orig_list_count, 0); 1387 spin_lock_init(&tt_global_entry->list_lock); 1388 1389 hash_added = batadv_hash_add(bat_priv->tt.global_hash, 1390 batadv_compare_tt, 1391 batadv_choose_tt, common, 1392 &common->hash_entry); 1393 1394 if (unlikely(hash_added != 0)) { 1395 /* remove the reference for the hash */ 1396 batadv_tt_global_entry_free_ref(tt_global_entry); 1397 goto out_remove; 1398 } 1399 } else { 1400 common = &tt_global_entry->common; 1401 /* If there is already a global entry, we can use this one for 1402 * our processing. 1403 * But if we are trying to add a temporary client then here are 1404 * two options at this point: 1405 * 1) the global client is not a temporary client: the global 1406 * client has to be left as it is, temporary information 1407 * should never override any already known client state 1408 * 2) the global client is a temporary client: purge the 1409 * originator list and add the new one orig_entry 1410 */ 1411 if (flags & BATADV_TT_CLIENT_TEMP) { 1412 if (!(common->flags & BATADV_TT_CLIENT_TEMP)) 1413 goto out; 1414 if (batadv_tt_global_entry_has_orig(tt_global_entry, 1415 orig_node)) 1416 goto out_remove; 1417 batadv_tt_global_del_orig_list(tt_global_entry); 1418 goto add_orig_entry; 1419 } 1420 1421 /* if the client was temporary added before receiving the first 1422 * OGM announcing it, we have to clear the TEMP flag 1423 */ 1424 common->flags &= ~BATADV_TT_CLIENT_TEMP; 1425 1426 /* the change can carry possible "attribute" flags like the 1427 * TT_CLIENT_WIFI, therefore they have to be copied in the 1428 * client entry 1429 */ 1430 tt_global_entry->common.flags |= flags; 1431 1432 /* If there is the BATADV_TT_CLIENT_ROAM flag set, there is only 1433 * one originator left in the list and we previously received a 1434 * delete + roaming change for this originator. 1435 * 1436 * We should first delete the old originator before adding the 1437 * new one. 1438 */ 1439 if (common->flags & BATADV_TT_CLIENT_ROAM) { 1440 batadv_tt_global_del_orig_list(tt_global_entry); 1441 common->flags &= ~BATADV_TT_CLIENT_ROAM; 1442 tt_global_entry->roam_at = 0; 1443 } 1444 } 1445 add_orig_entry: 1446 /* add the new orig_entry (if needed) or update it */ 1447 batadv_tt_global_orig_entry_add(tt_global_entry, orig_node, ttvn); 1448 1449 batadv_dbg(BATADV_DBG_TT, bat_priv, 1450 "Creating new global tt entry: %pM (vid: %d, via %pM)\n", 1451 common->addr, BATADV_PRINT_VID(common->vid), 1452 orig_node->orig); 1453 ret = true; 1454 1455 out_remove: 1456 /* Do not remove multicast addresses from the local hash on 1457 * global additions 1458 */ 1459 if (is_multicast_ether_addr(tt_addr)) 1460 goto out; 1461 1462 /* remove address from local hash if present */ 1463 local_flags = batadv_tt_local_remove(bat_priv, tt_addr, vid, 1464 "global tt received", 1465 flags & BATADV_TT_CLIENT_ROAM); 1466 tt_global_entry->common.flags |= local_flags & BATADV_TT_CLIENT_WIFI; 1467 1468 if (!(flags & BATADV_TT_CLIENT_ROAM)) 1469 /* this is a normal global add. Therefore the client is not in a 1470 * roaming state anymore. 1471 */ 1472 tt_global_entry->common.flags &= ~BATADV_TT_CLIENT_ROAM; 1473 1474 out: 1475 if (tt_global_entry) 1476 batadv_tt_global_entry_free_ref(tt_global_entry); 1477 if (tt_local_entry) 1478 batadv_tt_local_entry_free_ref(tt_local_entry); 1479 return ret; 1480 } 1481 1482 /** 1483 * batadv_transtable_best_orig - Get best originator list entry from tt entry 1484 * @bat_priv: the bat priv with all the soft interface information 1485 * @tt_global_entry: global translation table entry to be analyzed 1486 * 1487 * This functon assumes the caller holds rcu_read_lock(). 1488 * Returns best originator list entry or NULL on errors. 1489 */ 1490 static struct batadv_tt_orig_list_entry * 1491 batadv_transtable_best_orig(struct batadv_priv *bat_priv, 1492 struct batadv_tt_global_entry *tt_global_entry) 1493 { 1494 struct batadv_neigh_node *router, *best_router = NULL; 1495 struct batadv_algo_ops *bao = bat_priv->bat_algo_ops; 1496 struct hlist_head *head; 1497 struct batadv_tt_orig_list_entry *orig_entry, *best_entry = NULL; 1498 1499 head = &tt_global_entry->orig_list; 1500 hlist_for_each_entry_rcu(orig_entry, head, list) { 1501 router = batadv_orig_router_get(orig_entry->orig_node, 1502 BATADV_IF_DEFAULT); 1503 if (!router) 1504 continue; 1505 1506 if (best_router && 1507 bao->bat_neigh_cmp(router, BATADV_IF_DEFAULT, 1508 best_router, BATADV_IF_DEFAULT) <= 0) { 1509 batadv_neigh_node_free_ref(router); 1510 continue; 1511 } 1512 1513 /* release the refcount for the "old" best */ 1514 if (best_router) 1515 batadv_neigh_node_free_ref(best_router); 1516 1517 best_entry = orig_entry; 1518 best_router = router; 1519 } 1520 1521 if (best_router) 1522 batadv_neigh_node_free_ref(best_router); 1523 1524 return best_entry; 1525 } 1526 1527 /** 1528 * batadv_tt_global_print_entry - print all orig nodes who announce the address 1529 * for this global entry 1530 * @bat_priv: the bat priv with all the soft interface information 1531 * @tt_global_entry: global translation table entry to be printed 1532 * @seq: debugfs table seq_file struct 1533 * 1534 * This functon assumes the caller holds rcu_read_lock(). 1535 */ 1536 static void 1537 batadv_tt_global_print_entry(struct batadv_priv *bat_priv, 1538 struct batadv_tt_global_entry *tt_global_entry, 1539 struct seq_file *seq) 1540 { 1541 struct batadv_tt_orig_list_entry *orig_entry, *best_entry; 1542 struct batadv_tt_common_entry *tt_common_entry; 1543 struct batadv_orig_node_vlan *vlan; 1544 struct hlist_head *head; 1545 uint8_t last_ttvn; 1546 uint16_t flags; 1547 1548 tt_common_entry = &tt_global_entry->common; 1549 flags = tt_common_entry->flags; 1550 1551 best_entry = batadv_transtable_best_orig(bat_priv, tt_global_entry); 1552 if (best_entry) { 1553 vlan = batadv_orig_node_vlan_get(best_entry->orig_node, 1554 tt_common_entry->vid); 1555 if (!vlan) { 1556 seq_printf(seq, 1557 " * Cannot retrieve VLAN %d for originator %pM\n", 1558 BATADV_PRINT_VID(tt_common_entry->vid), 1559 best_entry->orig_node->orig); 1560 goto print_list; 1561 } 1562 1563 last_ttvn = atomic_read(&best_entry->orig_node->last_ttvn); 1564 seq_printf(seq, 1565 " %c %pM %4i (%3u) via %pM (%3u) (%#.8x) [%c%c%c%c]\n", 1566 '*', tt_global_entry->common.addr, 1567 BATADV_PRINT_VID(tt_global_entry->common.vid), 1568 best_entry->ttvn, best_entry->orig_node->orig, 1569 last_ttvn, vlan->tt.crc, 1570 ((flags & BATADV_TT_CLIENT_ROAM) ? 'R' : '.'), 1571 ((flags & BATADV_TT_CLIENT_WIFI) ? 'W' : '.'), 1572 ((flags & BATADV_TT_CLIENT_ISOLA) ? 'I' : '.'), 1573 ((flags & BATADV_TT_CLIENT_TEMP) ? 'T' : '.')); 1574 1575 batadv_orig_node_vlan_free_ref(vlan); 1576 } 1577 1578 print_list: 1579 head = &tt_global_entry->orig_list; 1580 1581 hlist_for_each_entry_rcu(orig_entry, head, list) { 1582 if (best_entry == orig_entry) 1583 continue; 1584 1585 vlan = batadv_orig_node_vlan_get(orig_entry->orig_node, 1586 tt_common_entry->vid); 1587 if (!vlan) { 1588 seq_printf(seq, 1589 " + Cannot retrieve VLAN %d for originator %pM\n", 1590 BATADV_PRINT_VID(tt_common_entry->vid), 1591 orig_entry->orig_node->orig); 1592 continue; 1593 } 1594 1595 last_ttvn = atomic_read(&orig_entry->orig_node->last_ttvn); 1596 seq_printf(seq, 1597 " %c %pM %4d (%3u) via %pM (%3u) (%#.8x) [%c%c%c%c]\n", 1598 '+', tt_global_entry->common.addr, 1599 BATADV_PRINT_VID(tt_global_entry->common.vid), 1600 orig_entry->ttvn, orig_entry->orig_node->orig, 1601 last_ttvn, vlan->tt.crc, 1602 ((flags & BATADV_TT_CLIENT_ROAM) ? 'R' : '.'), 1603 ((flags & BATADV_TT_CLIENT_WIFI) ? 'W' : '.'), 1604 ((flags & BATADV_TT_CLIENT_ISOLA) ? 'I' : '.'), 1605 ((flags & BATADV_TT_CLIENT_TEMP) ? 'T' : '.')); 1606 1607 batadv_orig_node_vlan_free_ref(vlan); 1608 } 1609 } 1610 1611 int batadv_tt_global_seq_print_text(struct seq_file *seq, void *offset) 1612 { 1613 struct net_device *net_dev = (struct net_device *)seq->private; 1614 struct batadv_priv *bat_priv = netdev_priv(net_dev); 1615 struct batadv_hashtable *hash = bat_priv->tt.global_hash; 1616 struct batadv_tt_common_entry *tt_common_entry; 1617 struct batadv_tt_global_entry *tt_global; 1618 struct batadv_hard_iface *primary_if; 1619 struct hlist_head *head; 1620 uint32_t i; 1621 1622 primary_if = batadv_seq_print_text_primary_if_get(seq); 1623 if (!primary_if) 1624 goto out; 1625 1626 seq_printf(seq, 1627 "Globally announced TT entries received via the mesh %s\n", 1628 net_dev->name); 1629 seq_printf(seq, " %-13s %s %s %-15s %s (%-10s) %s\n", 1630 "Client", "VID", "(TTVN)", "Originator", "(Curr TTVN)", 1631 "CRC", "Flags"); 1632 1633 for (i = 0; i < hash->size; i++) { 1634 head = &hash->table[i]; 1635 1636 rcu_read_lock(); 1637 hlist_for_each_entry_rcu(tt_common_entry, 1638 head, hash_entry) { 1639 tt_global = container_of(tt_common_entry, 1640 struct batadv_tt_global_entry, 1641 common); 1642 batadv_tt_global_print_entry(bat_priv, tt_global, seq); 1643 } 1644 rcu_read_unlock(); 1645 } 1646 out: 1647 if (primary_if) 1648 batadv_hardif_free_ref(primary_if); 1649 return 0; 1650 } 1651 1652 /** 1653 * batadv_tt_global_del_orig_entry - remove and free an orig_entry 1654 * @tt_global_entry: the global entry to remove the orig_entry from 1655 * @orig_entry: the orig entry to remove and free 1656 * 1657 * Remove an orig_entry from its list in the given tt_global_entry and 1658 * free this orig_entry afterwards. 1659 */ 1660 static void 1661 batadv_tt_global_del_orig_entry(struct batadv_tt_global_entry *tt_global_entry, 1662 struct batadv_tt_orig_list_entry *orig_entry) 1663 { 1664 batadv_tt_global_size_dec(orig_entry->orig_node, 1665 tt_global_entry->common.vid); 1666 atomic_dec(&tt_global_entry->orig_list_count); 1667 hlist_del_rcu(&orig_entry->list); 1668 batadv_tt_orig_list_entry_free_ref(orig_entry); 1669 } 1670 1671 /* deletes the orig list of a tt_global_entry */ 1672 static void 1673 batadv_tt_global_del_orig_list(struct batadv_tt_global_entry *tt_global_entry) 1674 { 1675 struct hlist_head *head; 1676 struct hlist_node *safe; 1677 struct batadv_tt_orig_list_entry *orig_entry; 1678 1679 spin_lock_bh(&tt_global_entry->list_lock); 1680 head = &tt_global_entry->orig_list; 1681 hlist_for_each_entry_safe(orig_entry, safe, head, list) 1682 batadv_tt_global_del_orig_entry(tt_global_entry, orig_entry); 1683 spin_unlock_bh(&tt_global_entry->list_lock); 1684 } 1685 1686 /** 1687 * batadv_tt_global_del_orig_node - remove orig_node from a global tt entry 1688 * @bat_priv: the bat priv with all the soft interface information 1689 * @tt_global_entry: the global entry to remove the orig_node from 1690 * @orig_node: the originator announcing the client 1691 * @message: message to append to the log on deletion 1692 * 1693 * Remove the given orig_node and its according orig_entry from the given 1694 * global tt entry. 1695 */ 1696 static void 1697 batadv_tt_global_del_orig_node(struct batadv_priv *bat_priv, 1698 struct batadv_tt_global_entry *tt_global_entry, 1699 struct batadv_orig_node *orig_node, 1700 const char *message) 1701 { 1702 struct hlist_head *head; 1703 struct hlist_node *safe; 1704 struct batadv_tt_orig_list_entry *orig_entry; 1705 unsigned short vid; 1706 1707 spin_lock_bh(&tt_global_entry->list_lock); 1708 head = &tt_global_entry->orig_list; 1709 hlist_for_each_entry_safe(orig_entry, safe, head, list) { 1710 if (orig_entry->orig_node == orig_node) { 1711 vid = tt_global_entry->common.vid; 1712 batadv_dbg(BATADV_DBG_TT, bat_priv, 1713 "Deleting %pM from global tt entry %pM (vid: %d): %s\n", 1714 orig_node->orig, 1715 tt_global_entry->common.addr, 1716 BATADV_PRINT_VID(vid), message); 1717 batadv_tt_global_del_orig_entry(tt_global_entry, 1718 orig_entry); 1719 } 1720 } 1721 spin_unlock_bh(&tt_global_entry->list_lock); 1722 } 1723 1724 /* If the client is to be deleted, we check if it is the last origantor entry 1725 * within tt_global entry. If yes, we set the BATADV_TT_CLIENT_ROAM flag and the 1726 * timer, otherwise we simply remove the originator scheduled for deletion. 1727 */ 1728 static void 1729 batadv_tt_global_del_roaming(struct batadv_priv *bat_priv, 1730 struct batadv_tt_global_entry *tt_global_entry, 1731 struct batadv_orig_node *orig_node, 1732 const char *message) 1733 { 1734 bool last_entry = true; 1735 struct hlist_head *head; 1736 struct batadv_tt_orig_list_entry *orig_entry; 1737 1738 /* no local entry exists, case 1: 1739 * Check if this is the last one or if other entries exist. 1740 */ 1741 1742 rcu_read_lock(); 1743 head = &tt_global_entry->orig_list; 1744 hlist_for_each_entry_rcu(orig_entry, head, list) { 1745 if (orig_entry->orig_node != orig_node) { 1746 last_entry = false; 1747 break; 1748 } 1749 } 1750 rcu_read_unlock(); 1751 1752 if (last_entry) { 1753 /* its the last one, mark for roaming. */ 1754 tt_global_entry->common.flags |= BATADV_TT_CLIENT_ROAM; 1755 tt_global_entry->roam_at = jiffies; 1756 } else 1757 /* there is another entry, we can simply delete this 1758 * one and can still use the other one. 1759 */ 1760 batadv_tt_global_del_orig_node(bat_priv, tt_global_entry, 1761 orig_node, message); 1762 } 1763 1764 /** 1765 * batadv_tt_global_del - remove a client from the global table 1766 * @bat_priv: the bat priv with all the soft interface information 1767 * @orig_node: an originator serving this client 1768 * @addr: the mac address of the client 1769 * @vid: VLAN identifier 1770 * @message: a message explaining the reason for deleting the client to print 1771 * for debugging purpose 1772 * @roaming: true if the deletion has been triggered by a roaming event 1773 */ 1774 static void batadv_tt_global_del(struct batadv_priv *bat_priv, 1775 struct batadv_orig_node *orig_node, 1776 const unsigned char *addr, unsigned short vid, 1777 const char *message, bool roaming) 1778 { 1779 struct batadv_tt_global_entry *tt_global_entry; 1780 struct batadv_tt_local_entry *local_entry = NULL; 1781 1782 tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid); 1783 if (!tt_global_entry) 1784 goto out; 1785 1786 if (!roaming) { 1787 batadv_tt_global_del_orig_node(bat_priv, tt_global_entry, 1788 orig_node, message); 1789 1790 if (hlist_empty(&tt_global_entry->orig_list)) 1791 batadv_tt_global_free(bat_priv, tt_global_entry, 1792 message); 1793 1794 goto out; 1795 } 1796 1797 /* if we are deleting a global entry due to a roam 1798 * event, there are two possibilities: 1799 * 1) the client roamed from node A to node B => if there 1800 * is only one originator left for this client, we mark 1801 * it with BATADV_TT_CLIENT_ROAM, we start a timer and we 1802 * wait for node B to claim it. In case of timeout 1803 * the entry is purged. 1804 * 1805 * If there are other originators left, we directly delete 1806 * the originator. 1807 * 2) the client roamed to us => we can directly delete 1808 * the global entry, since it is useless now. 1809 */ 1810 local_entry = batadv_tt_local_hash_find(bat_priv, 1811 tt_global_entry->common.addr, 1812 vid); 1813 if (local_entry) { 1814 /* local entry exists, case 2: client roamed to us. */ 1815 batadv_tt_global_del_orig_list(tt_global_entry); 1816 batadv_tt_global_free(bat_priv, tt_global_entry, message); 1817 } else 1818 /* no local entry exists, case 1: check for roaming */ 1819 batadv_tt_global_del_roaming(bat_priv, tt_global_entry, 1820 orig_node, message); 1821 1822 out: 1823 if (tt_global_entry) 1824 batadv_tt_global_entry_free_ref(tt_global_entry); 1825 if (local_entry) 1826 batadv_tt_local_entry_free_ref(local_entry); 1827 } 1828 1829 /** 1830 * batadv_tt_global_del_orig - remove all the TT global entries belonging to the 1831 * given originator matching the provided vid 1832 * @bat_priv: the bat priv with all the soft interface information 1833 * @orig_node: the originator owning the entries to remove 1834 * @match_vid: the VLAN identifier to match. If negative all the entries will be 1835 * removed 1836 * @message: debug message to print as "reason" 1837 */ 1838 void batadv_tt_global_del_orig(struct batadv_priv *bat_priv, 1839 struct batadv_orig_node *orig_node, 1840 int32_t match_vid, 1841 const char *message) 1842 { 1843 struct batadv_tt_global_entry *tt_global; 1844 struct batadv_tt_common_entry *tt_common_entry; 1845 uint32_t i; 1846 struct batadv_hashtable *hash = bat_priv->tt.global_hash; 1847 struct hlist_node *safe; 1848 struct hlist_head *head; 1849 spinlock_t *list_lock; /* protects write access to the hash lists */ 1850 unsigned short vid; 1851 1852 if (!hash) 1853 return; 1854 1855 for (i = 0; i < hash->size; i++) { 1856 head = &hash->table[i]; 1857 list_lock = &hash->list_locks[i]; 1858 1859 spin_lock_bh(list_lock); 1860 hlist_for_each_entry_safe(tt_common_entry, safe, 1861 head, hash_entry) { 1862 /* remove only matching entries */ 1863 if (match_vid >= 0 && tt_common_entry->vid != match_vid) 1864 continue; 1865 1866 tt_global = container_of(tt_common_entry, 1867 struct batadv_tt_global_entry, 1868 common); 1869 1870 batadv_tt_global_del_orig_node(bat_priv, tt_global, 1871 orig_node, message); 1872 1873 if (hlist_empty(&tt_global->orig_list)) { 1874 vid = tt_global->common.vid; 1875 batadv_dbg(BATADV_DBG_TT, bat_priv, 1876 "Deleting global tt entry %pM (vid: %d): %s\n", 1877 tt_global->common.addr, 1878 BATADV_PRINT_VID(vid), message); 1879 hlist_del_rcu(&tt_common_entry->hash_entry); 1880 batadv_tt_global_entry_free_ref(tt_global); 1881 } 1882 } 1883 spin_unlock_bh(list_lock); 1884 } 1885 orig_node->capa_initialized &= ~BATADV_ORIG_CAPA_HAS_TT; 1886 } 1887 1888 static bool batadv_tt_global_to_purge(struct batadv_tt_global_entry *tt_global, 1889 char **msg) 1890 { 1891 bool purge = false; 1892 unsigned long roam_timeout = BATADV_TT_CLIENT_ROAM_TIMEOUT; 1893 unsigned long temp_timeout = BATADV_TT_CLIENT_TEMP_TIMEOUT; 1894 1895 if ((tt_global->common.flags & BATADV_TT_CLIENT_ROAM) && 1896 batadv_has_timed_out(tt_global->roam_at, roam_timeout)) { 1897 purge = true; 1898 *msg = "Roaming timeout\n"; 1899 } 1900 1901 if ((tt_global->common.flags & BATADV_TT_CLIENT_TEMP) && 1902 batadv_has_timed_out(tt_global->common.added_at, temp_timeout)) { 1903 purge = true; 1904 *msg = "Temporary client timeout\n"; 1905 } 1906 1907 return purge; 1908 } 1909 1910 static void batadv_tt_global_purge(struct batadv_priv *bat_priv) 1911 { 1912 struct batadv_hashtable *hash = bat_priv->tt.global_hash; 1913 struct hlist_head *head; 1914 struct hlist_node *node_tmp; 1915 spinlock_t *list_lock; /* protects write access to the hash lists */ 1916 uint32_t i; 1917 char *msg = NULL; 1918 struct batadv_tt_common_entry *tt_common; 1919 struct batadv_tt_global_entry *tt_global; 1920 1921 for (i = 0; i < hash->size; i++) { 1922 head = &hash->table[i]; 1923 list_lock = &hash->list_locks[i]; 1924 1925 spin_lock_bh(list_lock); 1926 hlist_for_each_entry_safe(tt_common, node_tmp, head, 1927 hash_entry) { 1928 tt_global = container_of(tt_common, 1929 struct batadv_tt_global_entry, 1930 common); 1931 1932 if (!batadv_tt_global_to_purge(tt_global, &msg)) 1933 continue; 1934 1935 batadv_dbg(BATADV_DBG_TT, bat_priv, 1936 "Deleting global tt entry %pM (vid: %d): %s\n", 1937 tt_global->common.addr, 1938 BATADV_PRINT_VID(tt_global->common.vid), 1939 msg); 1940 1941 hlist_del_rcu(&tt_common->hash_entry); 1942 1943 batadv_tt_global_entry_free_ref(tt_global); 1944 } 1945 spin_unlock_bh(list_lock); 1946 } 1947 } 1948 1949 static void batadv_tt_global_table_free(struct batadv_priv *bat_priv) 1950 { 1951 struct batadv_hashtable *hash; 1952 spinlock_t *list_lock; /* protects write access to the hash lists */ 1953 struct batadv_tt_common_entry *tt_common_entry; 1954 struct batadv_tt_global_entry *tt_global; 1955 struct hlist_node *node_tmp; 1956 struct hlist_head *head; 1957 uint32_t i; 1958 1959 if (!bat_priv->tt.global_hash) 1960 return; 1961 1962 hash = bat_priv->tt.global_hash; 1963 1964 for (i = 0; i < hash->size; i++) { 1965 head = &hash->table[i]; 1966 list_lock = &hash->list_locks[i]; 1967 1968 spin_lock_bh(list_lock); 1969 hlist_for_each_entry_safe(tt_common_entry, node_tmp, 1970 head, hash_entry) { 1971 hlist_del_rcu(&tt_common_entry->hash_entry); 1972 tt_global = container_of(tt_common_entry, 1973 struct batadv_tt_global_entry, 1974 common); 1975 batadv_tt_global_entry_free_ref(tt_global); 1976 } 1977 spin_unlock_bh(list_lock); 1978 } 1979 1980 batadv_hash_destroy(hash); 1981 1982 bat_priv->tt.global_hash = NULL; 1983 } 1984 1985 static bool 1986 _batadv_is_ap_isolated(struct batadv_tt_local_entry *tt_local_entry, 1987 struct batadv_tt_global_entry *tt_global_entry) 1988 { 1989 bool ret = false; 1990 1991 if (tt_local_entry->common.flags & BATADV_TT_CLIENT_WIFI && 1992 tt_global_entry->common.flags & BATADV_TT_CLIENT_WIFI) 1993 ret = true; 1994 1995 /* check if the two clients are marked as isolated */ 1996 if (tt_local_entry->common.flags & BATADV_TT_CLIENT_ISOLA && 1997 tt_global_entry->common.flags & BATADV_TT_CLIENT_ISOLA) 1998 ret = true; 1999 2000 return ret; 2001 } 2002 2003 /** 2004 * batadv_transtable_search - get the mesh destination for a given client 2005 * @bat_priv: the bat priv with all the soft interface information 2006 * @src: mac address of the source client 2007 * @addr: mac address of the destination client 2008 * @vid: VLAN identifier 2009 * 2010 * Returns a pointer to the originator that was selected as destination in the 2011 * mesh for contacting the client 'addr', NULL otherwise. 2012 * In case of multiple originators serving the same client, the function returns 2013 * the best one (best in terms of metric towards the destination node). 2014 * 2015 * If the two clients are AP isolated the function returns NULL. 2016 */ 2017 struct batadv_orig_node *batadv_transtable_search(struct batadv_priv *bat_priv, 2018 const uint8_t *src, 2019 const uint8_t *addr, 2020 unsigned short vid) 2021 { 2022 struct batadv_tt_local_entry *tt_local_entry = NULL; 2023 struct batadv_tt_global_entry *tt_global_entry = NULL; 2024 struct batadv_orig_node *orig_node = NULL; 2025 struct batadv_tt_orig_list_entry *best_entry; 2026 2027 if (src && batadv_vlan_ap_isola_get(bat_priv, vid)) { 2028 tt_local_entry = batadv_tt_local_hash_find(bat_priv, src, vid); 2029 if (!tt_local_entry || 2030 (tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING)) 2031 goto out; 2032 } 2033 2034 tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid); 2035 if (!tt_global_entry) 2036 goto out; 2037 2038 /* check whether the clients should not communicate due to AP 2039 * isolation 2040 */ 2041 if (tt_local_entry && 2042 _batadv_is_ap_isolated(tt_local_entry, tt_global_entry)) 2043 goto out; 2044 2045 rcu_read_lock(); 2046 best_entry = batadv_transtable_best_orig(bat_priv, tt_global_entry); 2047 /* found anything? */ 2048 if (best_entry) 2049 orig_node = best_entry->orig_node; 2050 if (orig_node && !atomic_inc_not_zero(&orig_node->refcount)) 2051 orig_node = NULL; 2052 rcu_read_unlock(); 2053 2054 out: 2055 if (tt_global_entry) 2056 batadv_tt_global_entry_free_ref(tt_global_entry); 2057 if (tt_local_entry) 2058 batadv_tt_local_entry_free_ref(tt_local_entry); 2059 2060 return orig_node; 2061 } 2062 2063 /** 2064 * batadv_tt_global_crc - calculates the checksum of the local table belonging 2065 * to the given orig_node 2066 * @bat_priv: the bat priv with all the soft interface information 2067 * @orig_node: originator for which the CRC should be computed 2068 * @vid: VLAN identifier for which the CRC32 has to be computed 2069 * 2070 * This function computes the checksum for the global table corresponding to a 2071 * specific originator. In particular, the checksum is computed as follows: For 2072 * each client connected to the originator the CRC32C of the MAC address and the 2073 * VID is computed and then all the CRC32Cs of the various clients are xor'ed 2074 * together. 2075 * 2076 * The idea behind is that CRC32C should be used as much as possible in order to 2077 * produce a unique hash of the table, but since the order which is used to feed 2078 * the CRC32C function affects the result and since every node in the network 2079 * probably sorts the clients differently, the hash function cannot be directly 2080 * computed over the entire table. Hence the CRC32C is used only on 2081 * the single client entry, while all the results are then xor'ed together 2082 * because the XOR operation can combine them all while trying to reduce the 2083 * noise as much as possible. 2084 * 2085 * Returns the checksum of the global table of a given originator. 2086 */ 2087 static uint32_t batadv_tt_global_crc(struct batadv_priv *bat_priv, 2088 struct batadv_orig_node *orig_node, 2089 unsigned short vid) 2090 { 2091 struct batadv_hashtable *hash = bat_priv->tt.global_hash; 2092 struct batadv_tt_common_entry *tt_common; 2093 struct batadv_tt_global_entry *tt_global; 2094 struct hlist_head *head; 2095 uint32_t i, crc_tmp, crc = 0; 2096 uint8_t flags; 2097 __be16 tmp_vid; 2098 2099 for (i = 0; i < hash->size; i++) { 2100 head = &hash->table[i]; 2101 2102 rcu_read_lock(); 2103 hlist_for_each_entry_rcu(tt_common, head, hash_entry) { 2104 tt_global = container_of(tt_common, 2105 struct batadv_tt_global_entry, 2106 common); 2107 /* compute the CRC only for entries belonging to the 2108 * VLAN identified by the vid passed as parameter 2109 */ 2110 if (tt_common->vid != vid) 2111 continue; 2112 2113 /* Roaming clients are in the global table for 2114 * consistency only. They don't have to be 2115 * taken into account while computing the 2116 * global crc 2117 */ 2118 if (tt_common->flags & BATADV_TT_CLIENT_ROAM) 2119 continue; 2120 /* Temporary clients have not been announced yet, so 2121 * they have to be skipped while computing the global 2122 * crc 2123 */ 2124 if (tt_common->flags & BATADV_TT_CLIENT_TEMP) 2125 continue; 2126 2127 /* find out if this global entry is announced by this 2128 * originator 2129 */ 2130 if (!batadv_tt_global_entry_has_orig(tt_global, 2131 orig_node)) 2132 continue; 2133 2134 /* use network order to read the VID: this ensures that 2135 * every node reads the bytes in the same order. 2136 */ 2137 tmp_vid = htons(tt_common->vid); 2138 crc_tmp = crc32c(0, &tmp_vid, sizeof(tmp_vid)); 2139 2140 /* compute the CRC on flags that have to be kept in sync 2141 * among nodes 2142 */ 2143 flags = tt_common->flags & BATADV_TT_SYNC_MASK; 2144 crc_tmp = crc32c(crc_tmp, &flags, sizeof(flags)); 2145 2146 crc ^= crc32c(crc_tmp, tt_common->addr, ETH_ALEN); 2147 } 2148 rcu_read_unlock(); 2149 } 2150 2151 return crc; 2152 } 2153 2154 /** 2155 * batadv_tt_local_crc - calculates the checksum of the local table 2156 * @bat_priv: the bat priv with all the soft interface information 2157 * @vid: VLAN identifier for which the CRC32 has to be computed 2158 * 2159 * For details about the computation, please refer to the documentation for 2160 * batadv_tt_global_crc(). 2161 * 2162 * Returns the checksum of the local table 2163 */ 2164 static uint32_t batadv_tt_local_crc(struct batadv_priv *bat_priv, 2165 unsigned short vid) 2166 { 2167 struct batadv_hashtable *hash = bat_priv->tt.local_hash; 2168 struct batadv_tt_common_entry *tt_common; 2169 struct hlist_head *head; 2170 uint32_t i, crc_tmp, crc = 0; 2171 uint8_t flags; 2172 __be16 tmp_vid; 2173 2174 for (i = 0; i < hash->size; i++) { 2175 head = &hash->table[i]; 2176 2177 rcu_read_lock(); 2178 hlist_for_each_entry_rcu(tt_common, head, hash_entry) { 2179 /* compute the CRC only for entries belonging to the 2180 * VLAN identified by vid 2181 */ 2182 if (tt_common->vid != vid) 2183 continue; 2184 2185 /* not yet committed clients have not to be taken into 2186 * account while computing the CRC 2187 */ 2188 if (tt_common->flags & BATADV_TT_CLIENT_NEW) 2189 continue; 2190 2191 /* use network order to read the VID: this ensures that 2192 * every node reads the bytes in the same order. 2193 */ 2194 tmp_vid = htons(tt_common->vid); 2195 crc_tmp = crc32c(0, &tmp_vid, sizeof(tmp_vid)); 2196 2197 /* compute the CRC on flags that have to be kept in sync 2198 * among nodes 2199 */ 2200 flags = tt_common->flags & BATADV_TT_SYNC_MASK; 2201 crc_tmp = crc32c(crc_tmp, &flags, sizeof(flags)); 2202 2203 crc ^= crc32c(crc_tmp, tt_common->addr, ETH_ALEN); 2204 } 2205 rcu_read_unlock(); 2206 } 2207 2208 return crc; 2209 } 2210 2211 static void batadv_tt_req_list_free(struct batadv_priv *bat_priv) 2212 { 2213 struct batadv_tt_req_node *node, *safe; 2214 2215 spin_lock_bh(&bat_priv->tt.req_list_lock); 2216 2217 list_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) { 2218 list_del(&node->list); 2219 kfree(node); 2220 } 2221 2222 spin_unlock_bh(&bat_priv->tt.req_list_lock); 2223 } 2224 2225 static void batadv_tt_save_orig_buffer(struct batadv_priv *bat_priv, 2226 struct batadv_orig_node *orig_node, 2227 const void *tt_buff, 2228 uint16_t tt_buff_len) 2229 { 2230 /* Replace the old buffer only if I received something in the 2231 * last OGM (the OGM could carry no changes) 2232 */ 2233 spin_lock_bh(&orig_node->tt_buff_lock); 2234 if (tt_buff_len > 0) { 2235 kfree(orig_node->tt_buff); 2236 orig_node->tt_buff_len = 0; 2237 orig_node->tt_buff = kmalloc(tt_buff_len, GFP_ATOMIC); 2238 if (orig_node->tt_buff) { 2239 memcpy(orig_node->tt_buff, tt_buff, tt_buff_len); 2240 orig_node->tt_buff_len = tt_buff_len; 2241 } 2242 } 2243 spin_unlock_bh(&orig_node->tt_buff_lock); 2244 } 2245 2246 static void batadv_tt_req_purge(struct batadv_priv *bat_priv) 2247 { 2248 struct batadv_tt_req_node *node, *safe; 2249 2250 spin_lock_bh(&bat_priv->tt.req_list_lock); 2251 list_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) { 2252 if (batadv_has_timed_out(node->issued_at, 2253 BATADV_TT_REQUEST_TIMEOUT)) { 2254 list_del(&node->list); 2255 kfree(node); 2256 } 2257 } 2258 spin_unlock_bh(&bat_priv->tt.req_list_lock); 2259 } 2260 2261 /* returns the pointer to the new tt_req_node struct if no request 2262 * has already been issued for this orig_node, NULL otherwise 2263 */ 2264 static struct batadv_tt_req_node * 2265 batadv_new_tt_req_node(struct batadv_priv *bat_priv, 2266 struct batadv_orig_node *orig_node) 2267 { 2268 struct batadv_tt_req_node *tt_req_node_tmp, *tt_req_node = NULL; 2269 2270 spin_lock_bh(&bat_priv->tt.req_list_lock); 2271 list_for_each_entry(tt_req_node_tmp, &bat_priv->tt.req_list, list) { 2272 if (batadv_compare_eth(tt_req_node_tmp, orig_node) && 2273 !batadv_has_timed_out(tt_req_node_tmp->issued_at, 2274 BATADV_TT_REQUEST_TIMEOUT)) 2275 goto unlock; 2276 } 2277 2278 tt_req_node = kmalloc(sizeof(*tt_req_node), GFP_ATOMIC); 2279 if (!tt_req_node) 2280 goto unlock; 2281 2282 ether_addr_copy(tt_req_node->addr, orig_node->orig); 2283 tt_req_node->issued_at = jiffies; 2284 2285 list_add(&tt_req_node->list, &bat_priv->tt.req_list); 2286 unlock: 2287 spin_unlock_bh(&bat_priv->tt.req_list_lock); 2288 return tt_req_node; 2289 } 2290 2291 /** 2292 * batadv_tt_local_valid - verify that given tt entry is a valid one 2293 * @entry_ptr: to be checked local tt entry 2294 * @data_ptr: not used but definition required to satisfy the callback prototype 2295 * 2296 * Returns 1 if the entry is a valid, 0 otherwise. 2297 */ 2298 static int batadv_tt_local_valid(const void *entry_ptr, const void *data_ptr) 2299 { 2300 const struct batadv_tt_common_entry *tt_common_entry = entry_ptr; 2301 2302 if (tt_common_entry->flags & BATADV_TT_CLIENT_NEW) 2303 return 0; 2304 return 1; 2305 } 2306 2307 static int batadv_tt_global_valid(const void *entry_ptr, 2308 const void *data_ptr) 2309 { 2310 const struct batadv_tt_common_entry *tt_common_entry = entry_ptr; 2311 const struct batadv_tt_global_entry *tt_global_entry; 2312 const struct batadv_orig_node *orig_node = data_ptr; 2313 2314 if (tt_common_entry->flags & BATADV_TT_CLIENT_ROAM || 2315 tt_common_entry->flags & BATADV_TT_CLIENT_TEMP) 2316 return 0; 2317 2318 tt_global_entry = container_of(tt_common_entry, 2319 struct batadv_tt_global_entry, 2320 common); 2321 2322 return batadv_tt_global_entry_has_orig(tt_global_entry, orig_node); 2323 } 2324 2325 /** 2326 * batadv_tt_tvlv_generate - fill the tvlv buff with the tt entries from the 2327 * specified tt hash 2328 * @bat_priv: the bat priv with all the soft interface information 2329 * @hash: hash table containing the tt entries 2330 * @tt_len: expected tvlv tt data buffer length in number of bytes 2331 * @tvlv_buff: pointer to the buffer to fill with the TT data 2332 * @valid_cb: function to filter tt change entries 2333 * @cb_data: data passed to the filter function as argument 2334 */ 2335 static void batadv_tt_tvlv_generate(struct batadv_priv *bat_priv, 2336 struct batadv_hashtable *hash, 2337 void *tvlv_buff, uint16_t tt_len, 2338 int (*valid_cb)(const void *, const void *), 2339 void *cb_data) 2340 { 2341 struct batadv_tt_common_entry *tt_common_entry; 2342 struct batadv_tvlv_tt_change *tt_change; 2343 struct hlist_head *head; 2344 uint16_t tt_tot, tt_num_entries = 0; 2345 uint32_t i; 2346 2347 tt_tot = batadv_tt_entries(tt_len); 2348 tt_change = (struct batadv_tvlv_tt_change *)tvlv_buff; 2349 2350 rcu_read_lock(); 2351 for (i = 0; i < hash->size; i++) { 2352 head = &hash->table[i]; 2353 2354 hlist_for_each_entry_rcu(tt_common_entry, 2355 head, hash_entry) { 2356 if (tt_tot == tt_num_entries) 2357 break; 2358 2359 if ((valid_cb) && (!valid_cb(tt_common_entry, cb_data))) 2360 continue; 2361 2362 ether_addr_copy(tt_change->addr, tt_common_entry->addr); 2363 tt_change->flags = tt_common_entry->flags; 2364 tt_change->vid = htons(tt_common_entry->vid); 2365 memset(tt_change->reserved, 0, 2366 sizeof(tt_change->reserved)); 2367 2368 tt_num_entries++; 2369 tt_change++; 2370 } 2371 } 2372 rcu_read_unlock(); 2373 } 2374 2375 /** 2376 * batadv_tt_global_check_crc - check if all the CRCs are correct 2377 * @orig_node: originator for which the CRCs have to be checked 2378 * @tt_vlan: pointer to the first tvlv VLAN entry 2379 * @num_vlan: number of tvlv VLAN entries 2380 * @create: if true, create VLAN objects if not found 2381 * 2382 * Return true if all the received CRCs match the locally stored ones, false 2383 * otherwise 2384 */ 2385 static bool batadv_tt_global_check_crc(struct batadv_orig_node *orig_node, 2386 struct batadv_tvlv_tt_vlan_data *tt_vlan, 2387 uint16_t num_vlan) 2388 { 2389 struct batadv_tvlv_tt_vlan_data *tt_vlan_tmp; 2390 struct batadv_orig_node_vlan *vlan; 2391 uint32_t crc; 2392 int i; 2393 2394 /* check if each received CRC matches the locally stored one */ 2395 for (i = 0; i < num_vlan; i++) { 2396 tt_vlan_tmp = tt_vlan + i; 2397 2398 /* if orig_node is a backbone node for this VLAN, don't check 2399 * the CRC as we ignore all the global entries over it 2400 */ 2401 if (batadv_bla_is_backbone_gw_orig(orig_node->bat_priv, 2402 orig_node->orig, 2403 ntohs(tt_vlan_tmp->vid))) 2404 continue; 2405 2406 vlan = batadv_orig_node_vlan_get(orig_node, 2407 ntohs(tt_vlan_tmp->vid)); 2408 if (!vlan) 2409 return false; 2410 2411 crc = vlan->tt.crc; 2412 batadv_orig_node_vlan_free_ref(vlan); 2413 2414 if (crc != ntohl(tt_vlan_tmp->crc)) 2415 return false; 2416 } 2417 2418 return true; 2419 } 2420 2421 /** 2422 * batadv_tt_local_update_crc - update all the local CRCs 2423 * @bat_priv: the bat priv with all the soft interface information 2424 */ 2425 static void batadv_tt_local_update_crc(struct batadv_priv *bat_priv) 2426 { 2427 struct batadv_softif_vlan *vlan; 2428 2429 /* recompute the global CRC for each VLAN */ 2430 rcu_read_lock(); 2431 hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) { 2432 vlan->tt.crc = batadv_tt_local_crc(bat_priv, vlan->vid); 2433 } 2434 rcu_read_unlock(); 2435 } 2436 2437 /** 2438 * batadv_tt_global_update_crc - update all the global CRCs for this orig_node 2439 * @bat_priv: the bat priv with all the soft interface information 2440 * @orig_node: the orig_node for which the CRCs have to be updated 2441 */ 2442 static void batadv_tt_global_update_crc(struct batadv_priv *bat_priv, 2443 struct batadv_orig_node *orig_node) 2444 { 2445 struct batadv_orig_node_vlan *vlan; 2446 uint32_t crc; 2447 2448 /* recompute the global CRC for each VLAN */ 2449 rcu_read_lock(); 2450 list_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) { 2451 /* if orig_node is a backbone node for this VLAN, don't compute 2452 * the CRC as we ignore all the global entries over it 2453 */ 2454 if (batadv_bla_is_backbone_gw_orig(bat_priv, orig_node->orig, 2455 vlan->vid)) 2456 continue; 2457 2458 crc = batadv_tt_global_crc(bat_priv, orig_node, vlan->vid); 2459 vlan->tt.crc = crc; 2460 } 2461 rcu_read_unlock(); 2462 } 2463 2464 /** 2465 * batadv_send_tt_request - send a TT Request message to a given node 2466 * @bat_priv: the bat priv with all the soft interface information 2467 * @dst_orig_node: the destination of the message 2468 * @ttvn: the version number that the source of the message is looking for 2469 * @tt_vlan: pointer to the first tvlv VLAN object to request 2470 * @num_vlan: number of tvlv VLAN entries 2471 * @full_table: ask for the entire translation table if true, while only for the 2472 * last TT diff otherwise 2473 */ 2474 static int batadv_send_tt_request(struct batadv_priv *bat_priv, 2475 struct batadv_orig_node *dst_orig_node, 2476 uint8_t ttvn, 2477 struct batadv_tvlv_tt_vlan_data *tt_vlan, 2478 uint16_t num_vlan, bool full_table) 2479 { 2480 struct batadv_tvlv_tt_data *tvlv_tt_data = NULL; 2481 struct batadv_tt_req_node *tt_req_node = NULL; 2482 struct batadv_tvlv_tt_vlan_data *tt_vlan_req; 2483 struct batadv_hard_iface *primary_if; 2484 bool ret = false; 2485 int i, size; 2486 2487 primary_if = batadv_primary_if_get_selected(bat_priv); 2488 if (!primary_if) 2489 goto out; 2490 2491 /* The new tt_req will be issued only if I'm not waiting for a 2492 * reply from the same orig_node yet 2493 */ 2494 tt_req_node = batadv_new_tt_req_node(bat_priv, dst_orig_node); 2495 if (!tt_req_node) 2496 goto out; 2497 2498 size = sizeof(*tvlv_tt_data) + sizeof(*tt_vlan_req) * num_vlan; 2499 tvlv_tt_data = kzalloc(size, GFP_ATOMIC); 2500 if (!tvlv_tt_data) 2501 goto out; 2502 2503 tvlv_tt_data->flags = BATADV_TT_REQUEST; 2504 tvlv_tt_data->ttvn = ttvn; 2505 tvlv_tt_data->num_vlan = htons(num_vlan); 2506 2507 /* send all the CRCs within the request. This is needed by intermediate 2508 * nodes to ensure they have the correct table before replying 2509 */ 2510 tt_vlan_req = (struct batadv_tvlv_tt_vlan_data *)(tvlv_tt_data + 1); 2511 for (i = 0; i < num_vlan; i++) { 2512 tt_vlan_req->vid = tt_vlan->vid; 2513 tt_vlan_req->crc = tt_vlan->crc; 2514 2515 tt_vlan_req++; 2516 tt_vlan++; 2517 } 2518 2519 if (full_table) 2520 tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE; 2521 2522 batadv_dbg(BATADV_DBG_TT, bat_priv, "Sending TT_REQUEST to %pM [%c]\n", 2523 dst_orig_node->orig, full_table ? 'F' : '.'); 2524 2525 batadv_inc_counter(bat_priv, BATADV_CNT_TT_REQUEST_TX); 2526 batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr, 2527 dst_orig_node->orig, BATADV_TVLV_TT, 1, 2528 tvlv_tt_data, size); 2529 ret = true; 2530 2531 out: 2532 if (primary_if) 2533 batadv_hardif_free_ref(primary_if); 2534 if (ret && tt_req_node) { 2535 spin_lock_bh(&bat_priv->tt.req_list_lock); 2536 list_del(&tt_req_node->list); 2537 spin_unlock_bh(&bat_priv->tt.req_list_lock); 2538 kfree(tt_req_node); 2539 } 2540 kfree(tvlv_tt_data); 2541 return ret; 2542 } 2543 2544 /** 2545 * batadv_send_other_tt_response - send reply to tt request concerning another 2546 * node's translation table 2547 * @bat_priv: the bat priv with all the soft interface information 2548 * @tt_data: tt data containing the tt request information 2549 * @req_src: mac address of tt request sender 2550 * @req_dst: mac address of tt request recipient 2551 * 2552 * Returns true if tt request reply was sent, false otherwise. 2553 */ 2554 static bool batadv_send_other_tt_response(struct batadv_priv *bat_priv, 2555 struct batadv_tvlv_tt_data *tt_data, 2556 uint8_t *req_src, uint8_t *req_dst) 2557 { 2558 struct batadv_orig_node *req_dst_orig_node; 2559 struct batadv_orig_node *res_dst_orig_node = NULL; 2560 struct batadv_tvlv_tt_change *tt_change; 2561 struct batadv_tvlv_tt_data *tvlv_tt_data = NULL; 2562 struct batadv_tvlv_tt_vlan_data *tt_vlan; 2563 bool ret = false, full_table; 2564 uint8_t orig_ttvn, req_ttvn; 2565 uint16_t tvlv_len; 2566 int32_t tt_len; 2567 2568 batadv_dbg(BATADV_DBG_TT, bat_priv, 2569 "Received TT_REQUEST from %pM for ttvn: %u (%pM) [%c]\n", 2570 req_src, tt_data->ttvn, req_dst, 2571 ((tt_data->flags & BATADV_TT_FULL_TABLE) ? 'F' : '.')); 2572 2573 /* Let's get the orig node of the REAL destination */ 2574 req_dst_orig_node = batadv_orig_hash_find(bat_priv, req_dst); 2575 if (!req_dst_orig_node) 2576 goto out; 2577 2578 res_dst_orig_node = batadv_orig_hash_find(bat_priv, req_src); 2579 if (!res_dst_orig_node) 2580 goto out; 2581 2582 orig_ttvn = (uint8_t)atomic_read(&req_dst_orig_node->last_ttvn); 2583 req_ttvn = tt_data->ttvn; 2584 2585 tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(tt_data + 1); 2586 /* this node doesn't have the requested data */ 2587 if (orig_ttvn != req_ttvn || 2588 !batadv_tt_global_check_crc(req_dst_orig_node, tt_vlan, 2589 ntohs(tt_data->num_vlan))) 2590 goto out; 2591 2592 /* If the full table has been explicitly requested */ 2593 if (tt_data->flags & BATADV_TT_FULL_TABLE || 2594 !req_dst_orig_node->tt_buff) 2595 full_table = true; 2596 else 2597 full_table = false; 2598 2599 /* TT fragmentation hasn't been implemented yet, so send as many 2600 * TT entries fit a single packet as possible only 2601 */ 2602 if (!full_table) { 2603 spin_lock_bh(&req_dst_orig_node->tt_buff_lock); 2604 tt_len = req_dst_orig_node->tt_buff_len; 2605 2606 tvlv_len = batadv_tt_prepare_tvlv_global_data(req_dst_orig_node, 2607 &tvlv_tt_data, 2608 &tt_change, 2609 &tt_len); 2610 if (!tt_len) 2611 goto unlock; 2612 2613 /* Copy the last orig_node's OGM buffer */ 2614 memcpy(tt_change, req_dst_orig_node->tt_buff, 2615 req_dst_orig_node->tt_buff_len); 2616 spin_unlock_bh(&req_dst_orig_node->tt_buff_lock); 2617 } else { 2618 /* allocate the tvlv, put the tt_data and all the tt_vlan_data 2619 * in the initial part 2620 */ 2621 tt_len = -1; 2622 tvlv_len = batadv_tt_prepare_tvlv_global_data(req_dst_orig_node, 2623 &tvlv_tt_data, 2624 &tt_change, 2625 &tt_len); 2626 if (!tt_len) 2627 goto out; 2628 2629 /* fill the rest of the tvlv with the real TT entries */ 2630 batadv_tt_tvlv_generate(bat_priv, bat_priv->tt.global_hash, 2631 tt_change, tt_len, 2632 batadv_tt_global_valid, 2633 req_dst_orig_node); 2634 } 2635 2636 /* Don't send the response, if larger than fragmented packet. */ 2637 tt_len = sizeof(struct batadv_unicast_tvlv_packet) + tvlv_len; 2638 if (tt_len > atomic_read(&bat_priv->packet_size_max)) { 2639 net_ratelimited_function(batadv_info, bat_priv->soft_iface, 2640 "Ignoring TT_REQUEST from %pM; Response size exceeds max packet size.\n", 2641 res_dst_orig_node->orig); 2642 goto out; 2643 } 2644 2645 tvlv_tt_data->flags = BATADV_TT_RESPONSE; 2646 tvlv_tt_data->ttvn = req_ttvn; 2647 2648 if (full_table) 2649 tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE; 2650 2651 batadv_dbg(BATADV_DBG_TT, bat_priv, 2652 "Sending TT_RESPONSE %pM for %pM [%c] (ttvn: %u)\n", 2653 res_dst_orig_node->orig, req_dst_orig_node->orig, 2654 full_table ? 'F' : '.', req_ttvn); 2655 2656 batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_TX); 2657 2658 batadv_tvlv_unicast_send(bat_priv, req_dst_orig_node->orig, 2659 req_src, BATADV_TVLV_TT, 1, tvlv_tt_data, 2660 tvlv_len); 2661 2662 ret = true; 2663 goto out; 2664 2665 unlock: 2666 spin_unlock_bh(&req_dst_orig_node->tt_buff_lock); 2667 2668 out: 2669 if (res_dst_orig_node) 2670 batadv_orig_node_free_ref(res_dst_orig_node); 2671 if (req_dst_orig_node) 2672 batadv_orig_node_free_ref(req_dst_orig_node); 2673 kfree(tvlv_tt_data); 2674 return ret; 2675 } 2676 2677 /** 2678 * batadv_send_my_tt_response - send reply to tt request concerning this node's 2679 * translation table 2680 * @bat_priv: the bat priv with all the soft interface information 2681 * @tt_data: tt data containing the tt request information 2682 * @req_src: mac address of tt request sender 2683 * 2684 * Returns true if tt request reply was sent, false otherwise. 2685 */ 2686 static bool batadv_send_my_tt_response(struct batadv_priv *bat_priv, 2687 struct batadv_tvlv_tt_data *tt_data, 2688 uint8_t *req_src) 2689 { 2690 struct batadv_tvlv_tt_data *tvlv_tt_data = NULL; 2691 struct batadv_hard_iface *primary_if = NULL; 2692 struct batadv_tvlv_tt_change *tt_change; 2693 struct batadv_orig_node *orig_node; 2694 uint8_t my_ttvn, req_ttvn; 2695 uint16_t tvlv_len; 2696 bool full_table; 2697 int32_t tt_len; 2698 2699 batadv_dbg(BATADV_DBG_TT, bat_priv, 2700 "Received TT_REQUEST from %pM for ttvn: %u (me) [%c]\n", 2701 req_src, tt_data->ttvn, 2702 ((tt_data->flags & BATADV_TT_FULL_TABLE) ? 'F' : '.')); 2703 2704 spin_lock_bh(&bat_priv->tt.commit_lock); 2705 2706 my_ttvn = (uint8_t)atomic_read(&bat_priv->tt.vn); 2707 req_ttvn = tt_data->ttvn; 2708 2709 orig_node = batadv_orig_hash_find(bat_priv, req_src); 2710 if (!orig_node) 2711 goto out; 2712 2713 primary_if = batadv_primary_if_get_selected(bat_priv); 2714 if (!primary_if) 2715 goto out; 2716 2717 /* If the full table has been explicitly requested or the gap 2718 * is too big send the whole local translation table 2719 */ 2720 if (tt_data->flags & BATADV_TT_FULL_TABLE || my_ttvn != req_ttvn || 2721 !bat_priv->tt.last_changeset) 2722 full_table = true; 2723 else 2724 full_table = false; 2725 2726 /* TT fragmentation hasn't been implemented yet, so send as many 2727 * TT entries fit a single packet as possible only 2728 */ 2729 if (!full_table) { 2730 spin_lock_bh(&bat_priv->tt.last_changeset_lock); 2731 2732 tt_len = bat_priv->tt.last_changeset_len; 2733 tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv, 2734 &tvlv_tt_data, 2735 &tt_change, 2736 &tt_len); 2737 if (!tt_len) 2738 goto unlock; 2739 2740 /* Copy the last orig_node's OGM buffer */ 2741 memcpy(tt_change, bat_priv->tt.last_changeset, 2742 bat_priv->tt.last_changeset_len); 2743 spin_unlock_bh(&bat_priv->tt.last_changeset_lock); 2744 } else { 2745 req_ttvn = (uint8_t)atomic_read(&bat_priv->tt.vn); 2746 2747 /* allocate the tvlv, put the tt_data and all the tt_vlan_data 2748 * in the initial part 2749 */ 2750 tt_len = -1; 2751 tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv, 2752 &tvlv_tt_data, 2753 &tt_change, 2754 &tt_len); 2755 if (!tt_len) 2756 goto out; 2757 2758 /* fill the rest of the tvlv with the real TT entries */ 2759 batadv_tt_tvlv_generate(bat_priv, bat_priv->tt.local_hash, 2760 tt_change, tt_len, 2761 batadv_tt_local_valid, NULL); 2762 } 2763 2764 tvlv_tt_data->flags = BATADV_TT_RESPONSE; 2765 tvlv_tt_data->ttvn = req_ttvn; 2766 2767 if (full_table) 2768 tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE; 2769 2770 batadv_dbg(BATADV_DBG_TT, bat_priv, 2771 "Sending TT_RESPONSE to %pM [%c] (ttvn: %u)\n", 2772 orig_node->orig, full_table ? 'F' : '.', req_ttvn); 2773 2774 batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_TX); 2775 2776 batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr, 2777 req_src, BATADV_TVLV_TT, 1, tvlv_tt_data, 2778 tvlv_len); 2779 2780 goto out; 2781 2782 unlock: 2783 spin_unlock_bh(&bat_priv->tt.last_changeset_lock); 2784 out: 2785 spin_unlock_bh(&bat_priv->tt.commit_lock); 2786 if (orig_node) 2787 batadv_orig_node_free_ref(orig_node); 2788 if (primary_if) 2789 batadv_hardif_free_ref(primary_if); 2790 kfree(tvlv_tt_data); 2791 /* The packet was for this host, so it doesn't need to be re-routed */ 2792 return true; 2793 } 2794 2795 /** 2796 * batadv_send_tt_response - send reply to tt request 2797 * @bat_priv: the bat priv with all the soft interface information 2798 * @tt_data: tt data containing the tt request information 2799 * @req_src: mac address of tt request sender 2800 * @req_dst: mac address of tt request recipient 2801 * 2802 * Returns true if tt request reply was sent, false otherwise. 2803 */ 2804 static bool batadv_send_tt_response(struct batadv_priv *bat_priv, 2805 struct batadv_tvlv_tt_data *tt_data, 2806 uint8_t *req_src, uint8_t *req_dst) 2807 { 2808 if (batadv_is_my_mac(bat_priv, req_dst)) 2809 return batadv_send_my_tt_response(bat_priv, tt_data, req_src); 2810 return batadv_send_other_tt_response(bat_priv, tt_data, req_src, 2811 req_dst); 2812 } 2813 2814 static void _batadv_tt_update_changes(struct batadv_priv *bat_priv, 2815 struct batadv_orig_node *orig_node, 2816 struct batadv_tvlv_tt_change *tt_change, 2817 uint16_t tt_num_changes, uint8_t ttvn) 2818 { 2819 int i; 2820 int roams; 2821 2822 for (i = 0; i < tt_num_changes; i++) { 2823 if ((tt_change + i)->flags & BATADV_TT_CLIENT_DEL) { 2824 roams = (tt_change + i)->flags & BATADV_TT_CLIENT_ROAM; 2825 batadv_tt_global_del(bat_priv, orig_node, 2826 (tt_change + i)->addr, 2827 ntohs((tt_change + i)->vid), 2828 "tt removed by changes", 2829 roams); 2830 } else { 2831 if (!batadv_tt_global_add(bat_priv, orig_node, 2832 (tt_change + i)->addr, 2833 ntohs((tt_change + i)->vid), 2834 (tt_change + i)->flags, ttvn)) 2835 /* In case of problem while storing a 2836 * global_entry, we stop the updating 2837 * procedure without committing the 2838 * ttvn change. This will avoid to send 2839 * corrupted data on tt_request 2840 */ 2841 return; 2842 } 2843 } 2844 orig_node->capa_initialized |= BATADV_ORIG_CAPA_HAS_TT; 2845 } 2846 2847 static void batadv_tt_fill_gtable(struct batadv_priv *bat_priv, 2848 struct batadv_tvlv_tt_change *tt_change, 2849 uint8_t ttvn, uint8_t *resp_src, 2850 uint16_t num_entries) 2851 { 2852 struct batadv_orig_node *orig_node; 2853 2854 orig_node = batadv_orig_hash_find(bat_priv, resp_src); 2855 if (!orig_node) 2856 goto out; 2857 2858 /* Purge the old table first.. */ 2859 batadv_tt_global_del_orig(bat_priv, orig_node, -1, 2860 "Received full table"); 2861 2862 _batadv_tt_update_changes(bat_priv, orig_node, tt_change, num_entries, 2863 ttvn); 2864 2865 spin_lock_bh(&orig_node->tt_buff_lock); 2866 kfree(orig_node->tt_buff); 2867 orig_node->tt_buff_len = 0; 2868 orig_node->tt_buff = NULL; 2869 spin_unlock_bh(&orig_node->tt_buff_lock); 2870 2871 atomic_set(&orig_node->last_ttvn, ttvn); 2872 2873 out: 2874 if (orig_node) 2875 batadv_orig_node_free_ref(orig_node); 2876 } 2877 2878 static void batadv_tt_update_changes(struct batadv_priv *bat_priv, 2879 struct batadv_orig_node *orig_node, 2880 uint16_t tt_num_changes, uint8_t ttvn, 2881 struct batadv_tvlv_tt_change *tt_change) 2882 { 2883 _batadv_tt_update_changes(bat_priv, orig_node, tt_change, 2884 tt_num_changes, ttvn); 2885 2886 batadv_tt_save_orig_buffer(bat_priv, orig_node, tt_change, 2887 batadv_tt_len(tt_num_changes)); 2888 atomic_set(&orig_node->last_ttvn, ttvn); 2889 } 2890 2891 /** 2892 * batadv_is_my_client - check if a client is served by the local node 2893 * @bat_priv: the bat priv with all the soft interface information 2894 * @addr: the mac address of the client to check 2895 * @vid: VLAN identifier 2896 * 2897 * Returns true if the client is served by this node, false otherwise. 2898 */ 2899 bool batadv_is_my_client(struct batadv_priv *bat_priv, const uint8_t *addr, 2900 unsigned short vid) 2901 { 2902 struct batadv_tt_local_entry *tt_local_entry; 2903 bool ret = false; 2904 2905 tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid); 2906 if (!tt_local_entry) 2907 goto out; 2908 /* Check if the client has been logically deleted (but is kept for 2909 * consistency purpose) 2910 */ 2911 if ((tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING) || 2912 (tt_local_entry->common.flags & BATADV_TT_CLIENT_ROAM)) 2913 goto out; 2914 ret = true; 2915 out: 2916 if (tt_local_entry) 2917 batadv_tt_local_entry_free_ref(tt_local_entry); 2918 return ret; 2919 } 2920 2921 /** 2922 * batadv_handle_tt_response - process incoming tt reply 2923 * @bat_priv: the bat priv with all the soft interface information 2924 * @tt_data: tt data containing the tt request information 2925 * @resp_src: mac address of tt reply sender 2926 * @num_entries: number of tt change entries appended to the tt data 2927 */ 2928 static void batadv_handle_tt_response(struct batadv_priv *bat_priv, 2929 struct batadv_tvlv_tt_data *tt_data, 2930 uint8_t *resp_src, uint16_t num_entries) 2931 { 2932 struct batadv_tt_req_node *node, *safe; 2933 struct batadv_orig_node *orig_node = NULL; 2934 struct batadv_tvlv_tt_change *tt_change; 2935 uint8_t *tvlv_ptr = (uint8_t *)tt_data; 2936 uint16_t change_offset; 2937 2938 batadv_dbg(BATADV_DBG_TT, bat_priv, 2939 "Received TT_RESPONSE from %pM for ttvn %d t_size: %d [%c]\n", 2940 resp_src, tt_data->ttvn, num_entries, 2941 ((tt_data->flags & BATADV_TT_FULL_TABLE) ? 'F' : '.')); 2942 2943 orig_node = batadv_orig_hash_find(bat_priv, resp_src); 2944 if (!orig_node) 2945 goto out; 2946 2947 spin_lock_bh(&orig_node->tt_lock); 2948 2949 change_offset = sizeof(struct batadv_tvlv_tt_vlan_data); 2950 change_offset *= ntohs(tt_data->num_vlan); 2951 change_offset += sizeof(*tt_data); 2952 tvlv_ptr += change_offset; 2953 2954 tt_change = (struct batadv_tvlv_tt_change *)tvlv_ptr; 2955 if (tt_data->flags & BATADV_TT_FULL_TABLE) { 2956 batadv_tt_fill_gtable(bat_priv, tt_change, tt_data->ttvn, 2957 resp_src, num_entries); 2958 } else { 2959 batadv_tt_update_changes(bat_priv, orig_node, num_entries, 2960 tt_data->ttvn, tt_change); 2961 } 2962 2963 /* Recalculate the CRC for this orig_node and store it */ 2964 batadv_tt_global_update_crc(bat_priv, orig_node); 2965 2966 spin_unlock_bh(&orig_node->tt_lock); 2967 2968 /* Delete the tt_req_node from pending tt_requests list */ 2969 spin_lock_bh(&bat_priv->tt.req_list_lock); 2970 list_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) { 2971 if (!batadv_compare_eth(node->addr, resp_src)) 2972 continue; 2973 list_del(&node->list); 2974 kfree(node); 2975 } 2976 2977 spin_unlock_bh(&bat_priv->tt.req_list_lock); 2978 out: 2979 if (orig_node) 2980 batadv_orig_node_free_ref(orig_node); 2981 } 2982 2983 static void batadv_tt_roam_list_free(struct batadv_priv *bat_priv) 2984 { 2985 struct batadv_tt_roam_node *node, *safe; 2986 2987 spin_lock_bh(&bat_priv->tt.roam_list_lock); 2988 2989 list_for_each_entry_safe(node, safe, &bat_priv->tt.roam_list, list) { 2990 list_del(&node->list); 2991 kfree(node); 2992 } 2993 2994 spin_unlock_bh(&bat_priv->tt.roam_list_lock); 2995 } 2996 2997 static void batadv_tt_roam_purge(struct batadv_priv *bat_priv) 2998 { 2999 struct batadv_tt_roam_node *node, *safe; 3000 3001 spin_lock_bh(&bat_priv->tt.roam_list_lock); 3002 list_for_each_entry_safe(node, safe, &bat_priv->tt.roam_list, list) { 3003 if (!batadv_has_timed_out(node->first_time, 3004 BATADV_ROAMING_MAX_TIME)) 3005 continue; 3006 3007 list_del(&node->list); 3008 kfree(node); 3009 } 3010 spin_unlock_bh(&bat_priv->tt.roam_list_lock); 3011 } 3012 3013 /* This function checks whether the client already reached the 3014 * maximum number of possible roaming phases. In this case the ROAMING_ADV 3015 * will not be sent. 3016 * 3017 * returns true if the ROAMING_ADV can be sent, false otherwise 3018 */ 3019 static bool batadv_tt_check_roam_count(struct batadv_priv *bat_priv, 3020 uint8_t *client) 3021 { 3022 struct batadv_tt_roam_node *tt_roam_node; 3023 bool ret = false; 3024 3025 spin_lock_bh(&bat_priv->tt.roam_list_lock); 3026 /* The new tt_req will be issued only if I'm not waiting for a 3027 * reply from the same orig_node yet 3028 */ 3029 list_for_each_entry(tt_roam_node, &bat_priv->tt.roam_list, list) { 3030 if (!batadv_compare_eth(tt_roam_node->addr, client)) 3031 continue; 3032 3033 if (batadv_has_timed_out(tt_roam_node->first_time, 3034 BATADV_ROAMING_MAX_TIME)) 3035 continue; 3036 3037 if (!batadv_atomic_dec_not_zero(&tt_roam_node->counter)) 3038 /* Sorry, you roamed too many times! */ 3039 goto unlock; 3040 ret = true; 3041 break; 3042 } 3043 3044 if (!ret) { 3045 tt_roam_node = kmalloc(sizeof(*tt_roam_node), GFP_ATOMIC); 3046 if (!tt_roam_node) 3047 goto unlock; 3048 3049 tt_roam_node->first_time = jiffies; 3050 atomic_set(&tt_roam_node->counter, 3051 BATADV_ROAMING_MAX_COUNT - 1); 3052 ether_addr_copy(tt_roam_node->addr, client); 3053 3054 list_add(&tt_roam_node->list, &bat_priv->tt.roam_list); 3055 ret = true; 3056 } 3057 3058 unlock: 3059 spin_unlock_bh(&bat_priv->tt.roam_list_lock); 3060 return ret; 3061 } 3062 3063 /** 3064 * batadv_send_roam_adv - send a roaming advertisement message 3065 * @bat_priv: the bat priv with all the soft interface information 3066 * @client: mac address of the roaming client 3067 * @vid: VLAN identifier 3068 * @orig_node: message destination 3069 * 3070 * Send a ROAMING_ADV message to the node which was previously serving this 3071 * client. This is done to inform the node that from now on all traffic destined 3072 * for this particular roamed client has to be forwarded to the sender of the 3073 * roaming message. 3074 */ 3075 static void batadv_send_roam_adv(struct batadv_priv *bat_priv, uint8_t *client, 3076 unsigned short vid, 3077 struct batadv_orig_node *orig_node) 3078 { 3079 struct batadv_hard_iface *primary_if; 3080 struct batadv_tvlv_roam_adv tvlv_roam; 3081 3082 primary_if = batadv_primary_if_get_selected(bat_priv); 3083 if (!primary_if) 3084 goto out; 3085 3086 /* before going on we have to check whether the client has 3087 * already roamed to us too many times 3088 */ 3089 if (!batadv_tt_check_roam_count(bat_priv, client)) 3090 goto out; 3091 3092 batadv_dbg(BATADV_DBG_TT, bat_priv, 3093 "Sending ROAMING_ADV to %pM (client %pM, vid: %d)\n", 3094 orig_node->orig, client, BATADV_PRINT_VID(vid)); 3095 3096 batadv_inc_counter(bat_priv, BATADV_CNT_TT_ROAM_ADV_TX); 3097 3098 memcpy(tvlv_roam.client, client, sizeof(tvlv_roam.client)); 3099 tvlv_roam.vid = htons(vid); 3100 3101 batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr, 3102 orig_node->orig, BATADV_TVLV_ROAM, 1, 3103 &tvlv_roam, sizeof(tvlv_roam)); 3104 3105 out: 3106 if (primary_if) 3107 batadv_hardif_free_ref(primary_if); 3108 } 3109 3110 static void batadv_tt_purge(struct work_struct *work) 3111 { 3112 struct delayed_work *delayed_work; 3113 struct batadv_priv_tt *priv_tt; 3114 struct batadv_priv *bat_priv; 3115 3116 delayed_work = container_of(work, struct delayed_work, work); 3117 priv_tt = container_of(delayed_work, struct batadv_priv_tt, work); 3118 bat_priv = container_of(priv_tt, struct batadv_priv, tt); 3119 3120 batadv_tt_local_purge(bat_priv, BATADV_TT_LOCAL_TIMEOUT); 3121 batadv_tt_global_purge(bat_priv); 3122 batadv_tt_req_purge(bat_priv); 3123 batadv_tt_roam_purge(bat_priv); 3124 3125 queue_delayed_work(batadv_event_workqueue, &bat_priv->tt.work, 3126 msecs_to_jiffies(BATADV_TT_WORK_PERIOD)); 3127 } 3128 3129 void batadv_tt_free(struct batadv_priv *bat_priv) 3130 { 3131 batadv_tvlv_container_unregister(bat_priv, BATADV_TVLV_TT, 1); 3132 batadv_tvlv_handler_unregister(bat_priv, BATADV_TVLV_TT, 1); 3133 3134 cancel_delayed_work_sync(&bat_priv->tt.work); 3135 3136 batadv_tt_local_table_free(bat_priv); 3137 batadv_tt_global_table_free(bat_priv); 3138 batadv_tt_req_list_free(bat_priv); 3139 batadv_tt_changes_list_free(bat_priv); 3140 batadv_tt_roam_list_free(bat_priv); 3141 3142 kfree(bat_priv->tt.last_changeset); 3143 } 3144 3145 /** 3146 * batadv_tt_local_set_flags - set or unset the specified flags on the local 3147 * table and possibly count them in the TT size 3148 * @bat_priv: the bat priv with all the soft interface information 3149 * @flags: the flag to switch 3150 * @enable: whether to set or unset the flag 3151 * @count: whether to increase the TT size by the number of changed entries 3152 */ 3153 static void batadv_tt_local_set_flags(struct batadv_priv *bat_priv, 3154 uint16_t flags, bool enable, bool count) 3155 { 3156 struct batadv_hashtable *hash = bat_priv->tt.local_hash; 3157 struct batadv_tt_common_entry *tt_common_entry; 3158 uint16_t changed_num = 0; 3159 struct hlist_head *head; 3160 uint32_t i; 3161 3162 if (!hash) 3163 return; 3164 3165 for (i = 0; i < hash->size; i++) { 3166 head = &hash->table[i]; 3167 3168 rcu_read_lock(); 3169 hlist_for_each_entry_rcu(tt_common_entry, 3170 head, hash_entry) { 3171 if (enable) { 3172 if ((tt_common_entry->flags & flags) == flags) 3173 continue; 3174 tt_common_entry->flags |= flags; 3175 } else { 3176 if (!(tt_common_entry->flags & flags)) 3177 continue; 3178 tt_common_entry->flags &= ~flags; 3179 } 3180 changed_num++; 3181 3182 if (!count) 3183 continue; 3184 3185 batadv_tt_local_size_inc(bat_priv, 3186 tt_common_entry->vid); 3187 } 3188 rcu_read_unlock(); 3189 } 3190 } 3191 3192 /* Purge out all the tt local entries marked with BATADV_TT_CLIENT_PENDING */ 3193 static void batadv_tt_local_purge_pending_clients(struct batadv_priv *bat_priv) 3194 { 3195 struct batadv_hashtable *hash = bat_priv->tt.local_hash; 3196 struct batadv_tt_common_entry *tt_common; 3197 struct batadv_tt_local_entry *tt_local; 3198 struct batadv_softif_vlan *vlan; 3199 struct hlist_node *node_tmp; 3200 struct hlist_head *head; 3201 spinlock_t *list_lock; /* protects write access to the hash lists */ 3202 uint32_t i; 3203 3204 if (!hash) 3205 return; 3206 3207 for (i = 0; i < hash->size; i++) { 3208 head = &hash->table[i]; 3209 list_lock = &hash->list_locks[i]; 3210 3211 spin_lock_bh(list_lock); 3212 hlist_for_each_entry_safe(tt_common, node_tmp, head, 3213 hash_entry) { 3214 if (!(tt_common->flags & BATADV_TT_CLIENT_PENDING)) 3215 continue; 3216 3217 batadv_dbg(BATADV_DBG_TT, bat_priv, 3218 "Deleting local tt entry (%pM, vid: %d): pending\n", 3219 tt_common->addr, 3220 BATADV_PRINT_VID(tt_common->vid)); 3221 3222 batadv_tt_local_size_dec(bat_priv, tt_common->vid); 3223 hlist_del_rcu(&tt_common->hash_entry); 3224 tt_local = container_of(tt_common, 3225 struct batadv_tt_local_entry, 3226 common); 3227 3228 /* decrease the reference held for this vlan */ 3229 vlan = batadv_softif_vlan_get(bat_priv, tt_common->vid); 3230 if (vlan) { 3231 batadv_softif_vlan_free_ref(vlan); 3232 batadv_softif_vlan_free_ref(vlan); 3233 } 3234 3235 batadv_tt_local_entry_free_ref(tt_local); 3236 } 3237 spin_unlock_bh(list_lock); 3238 } 3239 } 3240 3241 /** 3242 * batadv_tt_local_commit_changes_nolock - commit all pending local tt changes 3243 * which have been queued in the time since the last commit 3244 * @bat_priv: the bat priv with all the soft interface information 3245 * 3246 * Caller must hold tt->commit_lock. 3247 */ 3248 static void batadv_tt_local_commit_changes_nolock(struct batadv_priv *bat_priv) 3249 { 3250 /* Update multicast addresses in local translation table */ 3251 batadv_mcast_mla_update(bat_priv); 3252 3253 if (atomic_read(&bat_priv->tt.local_changes) < 1) { 3254 if (!batadv_atomic_dec_not_zero(&bat_priv->tt.ogm_append_cnt)) 3255 batadv_tt_tvlv_container_update(bat_priv); 3256 return; 3257 } 3258 3259 batadv_tt_local_set_flags(bat_priv, BATADV_TT_CLIENT_NEW, false, true); 3260 3261 batadv_tt_local_purge_pending_clients(bat_priv); 3262 batadv_tt_local_update_crc(bat_priv); 3263 3264 /* Increment the TTVN only once per OGM interval */ 3265 atomic_inc(&bat_priv->tt.vn); 3266 batadv_dbg(BATADV_DBG_TT, bat_priv, 3267 "Local changes committed, updating to ttvn %u\n", 3268 (uint8_t)atomic_read(&bat_priv->tt.vn)); 3269 3270 /* reset the sending counter */ 3271 atomic_set(&bat_priv->tt.ogm_append_cnt, BATADV_TT_OGM_APPEND_MAX); 3272 batadv_tt_tvlv_container_update(bat_priv); 3273 } 3274 3275 /** 3276 * batadv_tt_local_commit_changes - commit all pending local tt changes which 3277 * have been queued in the time since the last commit 3278 * @bat_priv: the bat priv with all the soft interface information 3279 */ 3280 void batadv_tt_local_commit_changes(struct batadv_priv *bat_priv) 3281 { 3282 spin_lock_bh(&bat_priv->tt.commit_lock); 3283 batadv_tt_local_commit_changes_nolock(bat_priv); 3284 spin_unlock_bh(&bat_priv->tt.commit_lock); 3285 } 3286 3287 bool batadv_is_ap_isolated(struct batadv_priv *bat_priv, uint8_t *src, 3288 uint8_t *dst, unsigned short vid) 3289 { 3290 struct batadv_tt_local_entry *tt_local_entry = NULL; 3291 struct batadv_tt_global_entry *tt_global_entry = NULL; 3292 struct batadv_softif_vlan *vlan; 3293 bool ret = false; 3294 3295 vlan = batadv_softif_vlan_get(bat_priv, vid); 3296 if (!vlan || !atomic_read(&vlan->ap_isolation)) 3297 goto out; 3298 3299 tt_local_entry = batadv_tt_local_hash_find(bat_priv, dst, vid); 3300 if (!tt_local_entry) 3301 goto out; 3302 3303 tt_global_entry = batadv_tt_global_hash_find(bat_priv, src, vid); 3304 if (!tt_global_entry) 3305 goto out; 3306 3307 if (!_batadv_is_ap_isolated(tt_local_entry, tt_global_entry)) 3308 goto out; 3309 3310 ret = true; 3311 3312 out: 3313 if (vlan) 3314 batadv_softif_vlan_free_ref(vlan); 3315 if (tt_global_entry) 3316 batadv_tt_global_entry_free_ref(tt_global_entry); 3317 if (tt_local_entry) 3318 batadv_tt_local_entry_free_ref(tt_local_entry); 3319 return ret; 3320 } 3321 3322 /** 3323 * batadv_tt_update_orig - update global translation table with new tt 3324 * information received via ogms 3325 * @bat_priv: the bat priv with all the soft interface information 3326 * @orig: the orig_node of the ogm 3327 * @tt_vlan: pointer to the first tvlv VLAN entry 3328 * @tt_num_vlan: number of tvlv VLAN entries 3329 * @tt_change: pointer to the first entry in the TT buffer 3330 * @tt_num_changes: number of tt changes inside the tt buffer 3331 * @ttvn: translation table version number of this changeset 3332 * @tt_crc: crc32 checksum of orig node's translation table 3333 */ 3334 static void batadv_tt_update_orig(struct batadv_priv *bat_priv, 3335 struct batadv_orig_node *orig_node, 3336 const void *tt_buff, uint16_t tt_num_vlan, 3337 struct batadv_tvlv_tt_change *tt_change, 3338 uint16_t tt_num_changes, uint8_t ttvn) 3339 { 3340 uint8_t orig_ttvn = (uint8_t)atomic_read(&orig_node->last_ttvn); 3341 struct batadv_tvlv_tt_vlan_data *tt_vlan; 3342 bool full_table = true; 3343 bool has_tt_init; 3344 3345 tt_vlan = (struct batadv_tvlv_tt_vlan_data *)tt_buff; 3346 has_tt_init = orig_node->capa_initialized & BATADV_ORIG_CAPA_HAS_TT; 3347 3348 /* orig table not initialised AND first diff is in the OGM OR the ttvn 3349 * increased by one -> we can apply the attached changes 3350 */ 3351 if ((!has_tt_init && ttvn == 1) || ttvn - orig_ttvn == 1) { 3352 /* the OGM could not contain the changes due to their size or 3353 * because they have already been sent BATADV_TT_OGM_APPEND_MAX 3354 * times. 3355 * In this case send a tt request 3356 */ 3357 if (!tt_num_changes) { 3358 full_table = false; 3359 goto request_table; 3360 } 3361 3362 spin_lock_bh(&orig_node->tt_lock); 3363 3364 batadv_tt_update_changes(bat_priv, orig_node, tt_num_changes, 3365 ttvn, tt_change); 3366 3367 /* Even if we received the precomputed crc with the OGM, we 3368 * prefer to recompute it to spot any possible inconsistency 3369 * in the global table 3370 */ 3371 batadv_tt_global_update_crc(bat_priv, orig_node); 3372 3373 spin_unlock_bh(&orig_node->tt_lock); 3374 3375 /* The ttvn alone is not enough to guarantee consistency 3376 * because a single value could represent different states 3377 * (due to the wrap around). Thus a node has to check whether 3378 * the resulting table (after applying the changes) is still 3379 * consistent or not. E.g. a node could disconnect while its 3380 * ttvn is X and reconnect on ttvn = X + TTVN_MAX: in this case 3381 * checking the CRC value is mandatory to detect the 3382 * inconsistency 3383 */ 3384 if (!batadv_tt_global_check_crc(orig_node, tt_vlan, 3385 tt_num_vlan)) 3386 goto request_table; 3387 } else { 3388 /* if we missed more than one change or our tables are not 3389 * in sync anymore -> request fresh tt data 3390 */ 3391 if (!has_tt_init || ttvn != orig_ttvn || 3392 !batadv_tt_global_check_crc(orig_node, tt_vlan, 3393 tt_num_vlan)) { 3394 request_table: 3395 batadv_dbg(BATADV_DBG_TT, bat_priv, 3396 "TT inconsistency for %pM. Need to retrieve the correct information (ttvn: %u last_ttvn: %u num_changes: %u)\n", 3397 orig_node->orig, ttvn, orig_ttvn, 3398 tt_num_changes); 3399 batadv_send_tt_request(bat_priv, orig_node, ttvn, 3400 tt_vlan, tt_num_vlan, 3401 full_table); 3402 return; 3403 } 3404 } 3405 } 3406 3407 /** 3408 * batadv_tt_global_client_is_roaming - check if a client is marked as roaming 3409 * @bat_priv: the bat priv with all the soft interface information 3410 * @addr: the mac address of the client to check 3411 * @vid: VLAN identifier 3412 * 3413 * Returns true if we know that the client has moved from its old originator 3414 * to another one. This entry is still kept for consistency purposes and will be 3415 * deleted later by a DEL or because of timeout 3416 */ 3417 bool batadv_tt_global_client_is_roaming(struct batadv_priv *bat_priv, 3418 uint8_t *addr, unsigned short vid) 3419 { 3420 struct batadv_tt_global_entry *tt_global_entry; 3421 bool ret = false; 3422 3423 tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid); 3424 if (!tt_global_entry) 3425 goto out; 3426 3427 ret = tt_global_entry->common.flags & BATADV_TT_CLIENT_ROAM; 3428 batadv_tt_global_entry_free_ref(tt_global_entry); 3429 out: 3430 return ret; 3431 } 3432 3433 /** 3434 * batadv_tt_local_client_is_roaming - tells whether the client is roaming 3435 * @bat_priv: the bat priv with all the soft interface information 3436 * @addr: the mac address of the local client to query 3437 * @vid: VLAN identifier 3438 * 3439 * Returns true if the local client is known to be roaming (it is not served by 3440 * this node anymore) or not. If yes, the client is still present in the table 3441 * to keep the latter consistent with the node TTVN 3442 */ 3443 bool batadv_tt_local_client_is_roaming(struct batadv_priv *bat_priv, 3444 uint8_t *addr, unsigned short vid) 3445 { 3446 struct batadv_tt_local_entry *tt_local_entry; 3447 bool ret = false; 3448 3449 tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid); 3450 if (!tt_local_entry) 3451 goto out; 3452 3453 ret = tt_local_entry->common.flags & BATADV_TT_CLIENT_ROAM; 3454 batadv_tt_local_entry_free_ref(tt_local_entry); 3455 out: 3456 return ret; 3457 } 3458 3459 bool batadv_tt_add_temporary_global_entry(struct batadv_priv *bat_priv, 3460 struct batadv_orig_node *orig_node, 3461 const unsigned char *addr, 3462 unsigned short vid) 3463 { 3464 bool ret = false; 3465 3466 if (!batadv_tt_global_add(bat_priv, orig_node, addr, vid, 3467 BATADV_TT_CLIENT_TEMP, 3468 atomic_read(&orig_node->last_ttvn))) 3469 goto out; 3470 3471 batadv_dbg(BATADV_DBG_TT, bat_priv, 3472 "Added temporary global client (addr: %pM, vid: %d, orig: %pM)\n", 3473 addr, BATADV_PRINT_VID(vid), orig_node->orig); 3474 ret = true; 3475 out: 3476 return ret; 3477 } 3478 3479 /** 3480 * batadv_tt_local_resize_to_mtu - resize the local translation table fit the 3481 * maximum packet size that can be transported through the mesh 3482 * @soft_iface: netdev struct of the mesh interface 3483 * 3484 * Remove entries older than 'timeout' and half timeout if more entries need 3485 * to be removed. 3486 */ 3487 void batadv_tt_local_resize_to_mtu(struct net_device *soft_iface) 3488 { 3489 struct batadv_priv *bat_priv = netdev_priv(soft_iface); 3490 int packet_size_max = atomic_read(&bat_priv->packet_size_max); 3491 int table_size, timeout = BATADV_TT_LOCAL_TIMEOUT / 2; 3492 bool reduced = false; 3493 3494 spin_lock_bh(&bat_priv->tt.commit_lock); 3495 3496 while (true) { 3497 table_size = batadv_tt_local_table_transmit_size(bat_priv); 3498 if (packet_size_max >= table_size) 3499 break; 3500 3501 batadv_tt_local_purge(bat_priv, timeout); 3502 batadv_tt_local_purge_pending_clients(bat_priv); 3503 3504 timeout /= 2; 3505 reduced = true; 3506 net_ratelimited_function(batadv_info, soft_iface, 3507 "Forced to purge local tt entries to fit new maximum fragment MTU (%i)\n", 3508 packet_size_max); 3509 } 3510 3511 /* commit these changes immediately, to avoid synchronization problem 3512 * with the TTVN 3513 */ 3514 if (reduced) 3515 batadv_tt_local_commit_changes_nolock(bat_priv); 3516 3517 spin_unlock_bh(&bat_priv->tt.commit_lock); 3518 } 3519 3520 /** 3521 * batadv_tt_tvlv_ogm_handler_v1 - process incoming tt tvlv container 3522 * @bat_priv: the bat priv with all the soft interface information 3523 * @orig: the orig_node of the ogm 3524 * @flags: flags indicating the tvlv state (see batadv_tvlv_handler_flags) 3525 * @tvlv_value: tvlv buffer containing the gateway data 3526 * @tvlv_value_len: tvlv buffer length 3527 */ 3528 static void batadv_tt_tvlv_ogm_handler_v1(struct batadv_priv *bat_priv, 3529 struct batadv_orig_node *orig, 3530 uint8_t flags, void *tvlv_value, 3531 uint16_t tvlv_value_len) 3532 { 3533 struct batadv_tvlv_tt_vlan_data *tt_vlan; 3534 struct batadv_tvlv_tt_change *tt_change; 3535 struct batadv_tvlv_tt_data *tt_data; 3536 uint16_t num_entries, num_vlan; 3537 3538 if (tvlv_value_len < sizeof(*tt_data)) 3539 return; 3540 3541 tt_data = (struct batadv_tvlv_tt_data *)tvlv_value; 3542 tvlv_value_len -= sizeof(*tt_data); 3543 3544 num_vlan = ntohs(tt_data->num_vlan); 3545 3546 if (tvlv_value_len < sizeof(*tt_vlan) * num_vlan) 3547 return; 3548 3549 tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(tt_data + 1); 3550 tt_change = (struct batadv_tvlv_tt_change *)(tt_vlan + num_vlan); 3551 tvlv_value_len -= sizeof(*tt_vlan) * num_vlan; 3552 3553 num_entries = batadv_tt_entries(tvlv_value_len); 3554 3555 batadv_tt_update_orig(bat_priv, orig, tt_vlan, num_vlan, tt_change, 3556 num_entries, tt_data->ttvn); 3557 } 3558 3559 /** 3560 * batadv_tt_tvlv_unicast_handler_v1 - process incoming (unicast) tt tvlv 3561 * container 3562 * @bat_priv: the bat priv with all the soft interface information 3563 * @src: mac address of tt tvlv sender 3564 * @dst: mac address of tt tvlv recipient 3565 * @tvlv_value: tvlv buffer containing the tt data 3566 * @tvlv_value_len: tvlv buffer length 3567 * 3568 * Returns NET_RX_DROP if the tt tvlv is to be re-routed, NET_RX_SUCCESS 3569 * otherwise. 3570 */ 3571 static int batadv_tt_tvlv_unicast_handler_v1(struct batadv_priv *bat_priv, 3572 uint8_t *src, uint8_t *dst, 3573 void *tvlv_value, 3574 uint16_t tvlv_value_len) 3575 { 3576 struct batadv_tvlv_tt_data *tt_data; 3577 uint16_t tt_vlan_len, tt_num_entries; 3578 char tt_flag; 3579 bool ret; 3580 3581 if (tvlv_value_len < sizeof(*tt_data)) 3582 return NET_RX_SUCCESS; 3583 3584 tt_data = (struct batadv_tvlv_tt_data *)tvlv_value; 3585 tvlv_value_len -= sizeof(*tt_data); 3586 3587 tt_vlan_len = sizeof(struct batadv_tvlv_tt_vlan_data); 3588 tt_vlan_len *= ntohs(tt_data->num_vlan); 3589 3590 if (tvlv_value_len < tt_vlan_len) 3591 return NET_RX_SUCCESS; 3592 3593 tvlv_value_len -= tt_vlan_len; 3594 tt_num_entries = batadv_tt_entries(tvlv_value_len); 3595 3596 switch (tt_data->flags & BATADV_TT_DATA_TYPE_MASK) { 3597 case BATADV_TT_REQUEST: 3598 batadv_inc_counter(bat_priv, BATADV_CNT_TT_REQUEST_RX); 3599 3600 /* If this node cannot provide a TT response the tt_request is 3601 * forwarded 3602 */ 3603 ret = batadv_send_tt_response(bat_priv, tt_data, src, dst); 3604 if (!ret) { 3605 if (tt_data->flags & BATADV_TT_FULL_TABLE) 3606 tt_flag = 'F'; 3607 else 3608 tt_flag = '.'; 3609 3610 batadv_dbg(BATADV_DBG_TT, bat_priv, 3611 "Routing TT_REQUEST to %pM [%c]\n", 3612 dst, tt_flag); 3613 /* tvlv API will re-route the packet */ 3614 return NET_RX_DROP; 3615 } 3616 break; 3617 case BATADV_TT_RESPONSE: 3618 batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_RX); 3619 3620 if (batadv_is_my_mac(bat_priv, dst)) { 3621 batadv_handle_tt_response(bat_priv, tt_data, 3622 src, tt_num_entries); 3623 return NET_RX_SUCCESS; 3624 } 3625 3626 if (tt_data->flags & BATADV_TT_FULL_TABLE) 3627 tt_flag = 'F'; 3628 else 3629 tt_flag = '.'; 3630 3631 batadv_dbg(BATADV_DBG_TT, bat_priv, 3632 "Routing TT_RESPONSE to %pM [%c]\n", dst, tt_flag); 3633 3634 /* tvlv API will re-route the packet */ 3635 return NET_RX_DROP; 3636 } 3637 3638 return NET_RX_SUCCESS; 3639 } 3640 3641 /** 3642 * batadv_roam_tvlv_unicast_handler_v1 - process incoming tt roam tvlv container 3643 * @bat_priv: the bat priv with all the soft interface information 3644 * @src: mac address of tt tvlv sender 3645 * @dst: mac address of tt tvlv recipient 3646 * @tvlv_value: tvlv buffer containing the tt data 3647 * @tvlv_value_len: tvlv buffer length 3648 * 3649 * Returns NET_RX_DROP if the tt roam tvlv is to be re-routed, NET_RX_SUCCESS 3650 * otherwise. 3651 */ 3652 static int batadv_roam_tvlv_unicast_handler_v1(struct batadv_priv *bat_priv, 3653 uint8_t *src, uint8_t *dst, 3654 void *tvlv_value, 3655 uint16_t tvlv_value_len) 3656 { 3657 struct batadv_tvlv_roam_adv *roaming_adv; 3658 struct batadv_orig_node *orig_node = NULL; 3659 3660 /* If this node is not the intended recipient of the 3661 * roaming advertisement the packet is forwarded 3662 * (the tvlv API will re-route the packet). 3663 */ 3664 if (!batadv_is_my_mac(bat_priv, dst)) 3665 return NET_RX_DROP; 3666 3667 if (tvlv_value_len < sizeof(*roaming_adv)) 3668 goto out; 3669 3670 orig_node = batadv_orig_hash_find(bat_priv, src); 3671 if (!orig_node) 3672 goto out; 3673 3674 batadv_inc_counter(bat_priv, BATADV_CNT_TT_ROAM_ADV_RX); 3675 roaming_adv = (struct batadv_tvlv_roam_adv *)tvlv_value; 3676 3677 batadv_dbg(BATADV_DBG_TT, bat_priv, 3678 "Received ROAMING_ADV from %pM (client %pM)\n", 3679 src, roaming_adv->client); 3680 3681 batadv_tt_global_add(bat_priv, orig_node, roaming_adv->client, 3682 ntohs(roaming_adv->vid), BATADV_TT_CLIENT_ROAM, 3683 atomic_read(&orig_node->last_ttvn) + 1); 3684 3685 out: 3686 if (orig_node) 3687 batadv_orig_node_free_ref(orig_node); 3688 return NET_RX_SUCCESS; 3689 } 3690 3691 /** 3692 * batadv_tt_init - initialise the translation table internals 3693 * @bat_priv: the bat priv with all the soft interface information 3694 * 3695 * Return 0 on success or negative error number in case of failure. 3696 */ 3697 int batadv_tt_init(struct batadv_priv *bat_priv) 3698 { 3699 int ret; 3700 3701 /* synchronized flags must be remote */ 3702 BUILD_BUG_ON(!(BATADV_TT_SYNC_MASK & BATADV_TT_REMOTE_MASK)); 3703 3704 ret = batadv_tt_local_init(bat_priv); 3705 if (ret < 0) 3706 return ret; 3707 3708 ret = batadv_tt_global_init(bat_priv); 3709 if (ret < 0) 3710 return ret; 3711 3712 batadv_tvlv_handler_register(bat_priv, batadv_tt_tvlv_ogm_handler_v1, 3713 batadv_tt_tvlv_unicast_handler_v1, 3714 BATADV_TVLV_TT, 1, BATADV_NO_FLAGS); 3715 3716 batadv_tvlv_handler_register(bat_priv, NULL, 3717 batadv_roam_tvlv_unicast_handler_v1, 3718 BATADV_TVLV_ROAM, 1, BATADV_NO_FLAGS); 3719 3720 INIT_DELAYED_WORK(&bat_priv->tt.work, batadv_tt_purge); 3721 queue_delayed_work(batadv_event_workqueue, &bat_priv->tt.work, 3722 msecs_to_jiffies(BATADV_TT_WORK_PERIOD)); 3723 3724 return 1; 3725 } 3726 3727 /** 3728 * batadv_tt_global_is_isolated - check if a client is marked as isolated 3729 * @bat_priv: the bat priv with all the soft interface information 3730 * @addr: the mac address of the client 3731 * @vid: the identifier of the VLAN where this client is connected 3732 * 3733 * Returns true if the client is marked with the TT_CLIENT_ISOLA flag, false 3734 * otherwise 3735 */ 3736 bool batadv_tt_global_is_isolated(struct batadv_priv *bat_priv, 3737 const uint8_t *addr, unsigned short vid) 3738 { 3739 struct batadv_tt_global_entry *tt; 3740 bool ret; 3741 3742 tt = batadv_tt_global_hash_find(bat_priv, addr, vid); 3743 if (!tt) 3744 return false; 3745 3746 ret = tt->common.flags & BATADV_TT_CLIENT_ISOLA; 3747 3748 batadv_tt_global_entry_free_ref(tt); 3749 3750 return ret; 3751 } 3752