2017-11-19 22:05:11 +08:00
|
|
|
// SPDX-License-Identifier: GPL-2.0
|
2021-01-01 07:00:01 +08:00
|
|
|
/* Copyright (C) B.A.T.M.A.N. contributors:
|
2010-12-13 19:19:28 +08:00
|
|
|
*
|
2012-03-14 20:03:01 +08:00
|
|
|
* Marek Lindner, Simon Wunderlich, Antonio Quartulli
|
2010-12-13 19:19:28 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
#include "translation-table.h"
|
2015-04-18 01:40:28 +08:00
|
|
|
#include "main.h"
|
|
|
|
|
|
|
|
#include <linux/atomic.h>
|
2015-06-16 23:10:24 +08:00
|
|
|
#include <linux/bitops.h>
|
2017-11-20 00:12:03 +08:00
|
|
|
#include <linux/build_bug.h>
|
2015-04-18 01:40:28 +08:00
|
|
|
#include <linux/byteorder/generic.h>
|
2016-06-25 22:44:06 +08:00
|
|
|
#include <linux/cache.h>
|
2015-04-18 01:40:28 +08:00
|
|
|
#include <linux/compiler.h>
|
2022-01-22 00:14:44 +08:00
|
|
|
#include <linux/container_of.h>
|
2015-04-18 01:40:28 +08:00
|
|
|
#include <linux/crc32c.h>
|
|
|
|
#include <linux/errno.h>
|
|
|
|
#include <linux/etherdevice.h>
|
2017-11-20 00:12:02 +08:00
|
|
|
#include <linux/gfp.h>
|
2015-04-18 01:40:28 +08:00
|
|
|
#include <linux/if_ether.h>
|
2016-06-25 22:44:06 +08:00
|
|
|
#include <linux/init.h>
|
2015-04-18 01:40:28 +08:00
|
|
|
#include <linux/jhash.h>
|
|
|
|
#include <linux/jiffies.h>
|
2016-01-16 17:29:50 +08:00
|
|
|
#include <linux/kref.h>
|
2015-04-18 01:40:28 +08:00
|
|
|
#include <linux/list.h>
|
|
|
|
#include <linux/lockdep.h>
|
2017-11-20 00:12:04 +08:00
|
|
|
#include <linux/net.h>
|
2015-04-18 01:40:28 +08:00
|
|
|
#include <linux/netdevice.h>
|
2016-07-03 19:31:37 +08:00
|
|
|
#include <linux/netlink.h>
|
2015-04-18 01:40:28 +08:00
|
|
|
#include <linux/rculist.h>
|
|
|
|
#include <linux/rcupdate.h>
|
2016-07-03 19:31:37 +08:00
|
|
|
#include <linux/skbuff.h>
|
2015-04-18 01:40:28 +08:00
|
|
|
#include <linux/slab.h>
|
|
|
|
#include <linux/spinlock.h>
|
|
|
|
#include <linux/stddef.h>
|
|
|
|
#include <linux/string.h>
|
|
|
|
#include <linux/workqueue.h>
|
2016-07-03 19:31:37 +08:00
|
|
|
#include <net/genetlink.h>
|
|
|
|
#include <net/netlink.h>
|
|
|
|
#include <net/sock.h>
|
2017-12-21 17:17:41 +08:00
|
|
|
#include <uapi/linux/batadv_packet.h>
|
2016-07-03 19:31:37 +08:00
|
|
|
#include <uapi/linux/batman_adv.h>
|
2015-04-18 01:40:28 +08:00
|
|
|
|
|
|
|
#include "bridge_loop_avoidance.h"
|
2011-04-20 21:40:58 +08:00
|
|
|
#include "hard-interface.h"
|
2010-12-13 19:19:28 +08:00
|
|
|
#include "hash.h"
|
2016-05-16 05:48:31 +08:00
|
|
|
#include "log.h"
|
2016-07-03 19:31:37 +08:00
|
|
|
#include "netlink.h"
|
2015-04-18 01:40:28 +08:00
|
|
|
#include "originator.h"
|
|
|
|
#include "soft-interface.h"
|
2016-05-15 17:07:43 +08:00
|
|
|
#include "tvlv.h"
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2016-06-25 22:44:06 +08:00
|
|
|
static struct kmem_cache *batadv_tl_cache __read_mostly;
|
|
|
|
static struct kmem_cache *batadv_tg_cache __read_mostly;
|
|
|
|
static struct kmem_cache *batadv_tt_orig_cache __read_mostly;
|
|
|
|
static struct kmem_cache *batadv_tt_change_cache __read_mostly;
|
|
|
|
static struct kmem_cache *batadv_tt_req_cache __read_mostly;
|
|
|
|
static struct kmem_cache *batadv_tt_roam_cache __read_mostly;
|
|
|
|
|
2012-11-10 18:00:32 +08:00
|
|
|
/* hash class keys */
|
|
|
|
static struct lock_class_key batadv_tt_local_hash_lock_class_key;
|
|
|
|
static struct lock_class_key batadv_tt_global_hash_lock_class_key;
|
|
|
|
|
2015-05-27 00:34:26 +08:00
|
|
|
static void batadv_send_roam_adv(struct batadv_priv *bat_priv, u8 *client,
|
2013-06-04 18:11:39 +08:00
|
|
|
unsigned short vid,
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_orig_node *orig_node);
|
2012-05-17 02:23:16 +08:00
|
|
|
static void batadv_tt_purge(struct work_struct *work);
|
|
|
|
static void
|
2012-06-06 04:31:31 +08:00
|
|
|
batadv_tt_global_del_orig_list(struct batadv_tt_global_entry *tt_global_entry);
|
2012-07-06 05:38:29 +08:00
|
|
|
static void batadv_tt_global_del(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_orig_node *orig_node,
|
|
|
|
const unsigned char *addr,
|
2013-06-04 18:11:39 +08:00
|
|
|
unsigned short vid, const char *message,
|
|
|
|
bool roaming);
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2015-09-16 01:00:48 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_compare_tt() - check if two TT entries are the same
|
2015-11-17 16:40:52 +08:00
|
|
|
* @node: the list element pointer of the first TT entry
|
|
|
|
* @data2: pointer to the tt_common_entry of the second TT entry
|
2015-09-16 01:00:48 +08:00
|
|
|
*
|
2015-11-17 16:40:52 +08:00
|
|
|
* Compare the MAC address and the VLAN ID of the two TT entries and check if
|
|
|
|
* they are the same TT client.
|
2016-02-23 04:02:39 +08:00
|
|
|
* Return: true if the two TT clients are the same, false otherwise
|
2015-09-16 01:00:48 +08:00
|
|
|
*/
|
2016-02-23 04:02:39 +08:00
|
|
|
static bool batadv_compare_tt(const struct hlist_node *node, const void *data2)
|
2011-02-18 20:28:09 +08:00
|
|
|
{
|
2012-06-06 04:31:31 +08:00
|
|
|
const void *data1 = container_of(node, struct batadv_tt_common_entry,
|
2011-05-15 05:14:50 +08:00
|
|
|
hash_entry);
|
2015-08-06 16:38:54 +08:00
|
|
|
const struct batadv_tt_common_entry *tt1 = data1;
|
|
|
|
const struct batadv_tt_common_entry *tt2 = data2;
|
2011-02-18 20:28:09 +08:00
|
|
|
|
2015-08-06 16:38:54 +08:00
|
|
|
return (tt1->vid == tt2->vid) && batadv_compare_eth(data1, data2);
|
2011-02-18 20:28:09 +08:00
|
|
|
}
|
|
|
|
|
2013-06-04 18:11:39 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_choose_tt() - return the index of the tt entry in the hash table
|
2013-06-04 18:11:39 +08:00
|
|
|
* @data: pointer to the tt_common_entry object to map
|
|
|
|
* @size: the size of the hash table
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: the hash index where the object represented by 'data' should be
|
2013-06-04 18:11:39 +08:00
|
|
|
* stored at.
|
|
|
|
*/
|
2015-05-27 00:34:26 +08:00
|
|
|
static inline u32 batadv_choose_tt(const void *data, u32 size)
|
2013-06-04 18:11:39 +08:00
|
|
|
{
|
2022-04-21 23:48:29 +08:00
|
|
|
const struct batadv_tt_common_entry *tt;
|
2015-05-27 00:34:26 +08:00
|
|
|
u32 hash = 0;
|
2013-06-04 18:11:39 +08:00
|
|
|
|
2022-04-21 23:48:29 +08:00
|
|
|
tt = data;
|
2015-03-01 16:46:18 +08:00
|
|
|
hash = jhash(&tt->addr, ETH_ALEN, hash);
|
|
|
|
hash = jhash(&tt->vid, sizeof(tt->vid), hash);
|
2013-06-04 18:11:39 +08:00
|
|
|
|
|
|
|
return hash % size;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_hash_find() - look for a client in the given hash table
|
2013-06-04 18:11:39 +08:00
|
|
|
* @hash: the hash table to search
|
|
|
|
* @addr: the mac address of the client to look for
|
|
|
|
* @vid: VLAN identifier
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: a pointer to the tt_common struct belonging to the searched client if
|
2013-06-04 18:11:39 +08:00
|
|
|
* found, NULL otherwise.
|
|
|
|
*/
|
2012-06-06 04:31:31 +08:00
|
|
|
static struct batadv_tt_common_entry *
|
2015-05-27 00:34:26 +08:00
|
|
|
batadv_tt_hash_find(struct batadv_hashtable *hash, const u8 *addr,
|
2013-06-04 18:11:39 +08:00
|
|
|
unsigned short vid)
|
2011-02-18 20:28:09 +08:00
|
|
|
{
|
|
|
|
struct hlist_head *head;
|
2013-06-04 18:11:39 +08:00
|
|
|
struct batadv_tt_common_entry to_search, *tt, *tt_tmp = NULL;
|
2015-05-27 00:34:26 +08:00
|
|
|
u32 index;
|
2011-02-18 20:28:09 +08:00
|
|
|
|
|
|
|
if (!hash)
|
|
|
|
return NULL;
|
|
|
|
|
2014-01-22 07:42:11 +08:00
|
|
|
ether_addr_copy(to_search.addr, addr);
|
2013-06-04 18:11:39 +08:00
|
|
|
to_search.vid = vid;
|
|
|
|
|
|
|
|
index = batadv_choose_tt(&to_search, hash->size);
|
2011-02-18 20:28:09 +08:00
|
|
|
head = &hash->table[index];
|
|
|
|
|
|
|
|
rcu_read_lock();
|
2013-06-04 18:11:39 +08:00
|
|
|
hlist_for_each_entry_rcu(tt, head, hash_entry) {
|
|
|
|
if (!batadv_compare_eth(tt, addr))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (tt->vid != vid)
|
2011-02-18 20:28:09 +08:00
|
|
|
continue;
|
|
|
|
|
2016-01-16 17:29:57 +08:00
|
|
|
if (!kref_get_unless_zero(&tt->refcount))
|
2011-04-27 20:28:07 +08:00
|
|
|
continue;
|
|
|
|
|
2013-06-04 18:11:39 +08:00
|
|
|
tt_tmp = tt;
|
2011-02-18 20:28:09 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
|
|
|
|
2013-06-04 18:11:39 +08:00
|
|
|
return tt_tmp;
|
2011-02-18 20:28:09 +08:00
|
|
|
}
|
|
|
|
|
2013-06-04 18:11:39 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_hash_find() - search the local table for a given client
|
2013-06-04 18:11:39 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @addr: the mac address of the client to look for
|
|
|
|
* @vid: VLAN identifier
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: a pointer to the corresponding tt_local_entry struct if the client is
|
2013-06-04 18:11:39 +08:00
|
|
|
* found, NULL otherwise.
|
|
|
|
*/
|
2012-06-06 04:31:31 +08:00
|
|
|
static struct batadv_tt_local_entry *
|
2015-05-27 00:34:26 +08:00
|
|
|
batadv_tt_local_hash_find(struct batadv_priv *bat_priv, const u8 *addr,
|
2013-06-04 18:11:39 +08:00
|
|
|
unsigned short vid)
|
2011-02-18 20:28:09 +08:00
|
|
|
{
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_common_entry *tt_common_entry;
|
|
|
|
struct batadv_tt_local_entry *tt_local_entry = NULL;
|
2011-02-18 20:28:09 +08:00
|
|
|
|
2013-06-04 18:11:39 +08:00
|
|
|
tt_common_entry = batadv_tt_hash_find(bat_priv->tt.local_hash, addr,
|
|
|
|
vid);
|
2011-10-30 19:17:33 +08:00
|
|
|
if (tt_common_entry)
|
|
|
|
tt_local_entry = container_of(tt_common_entry,
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_local_entry,
|
|
|
|
common);
|
2011-10-30 19:17:33 +08:00
|
|
|
return tt_local_entry;
|
|
|
|
}
|
2011-02-18 20:28:09 +08:00
|
|
|
|
2013-06-04 18:11:39 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_hash_find() - search the global table for a given client
|
2013-06-04 18:11:39 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @addr: the mac address of the client to look for
|
|
|
|
* @vid: VLAN identifier
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: a pointer to the corresponding tt_global_entry struct if the client
|
2013-06-04 18:11:39 +08:00
|
|
|
* is found, NULL otherwise.
|
|
|
|
*/
|
2019-03-23 12:47:41 +08:00
|
|
|
struct batadv_tt_global_entry *
|
2015-05-27 00:34:26 +08:00
|
|
|
batadv_tt_global_hash_find(struct batadv_priv *bat_priv, const u8 *addr,
|
2013-06-04 18:11:39 +08:00
|
|
|
unsigned short vid)
|
2011-10-30 19:17:33 +08:00
|
|
|
{
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_common_entry *tt_common_entry;
|
|
|
|
struct batadv_tt_global_entry *tt_global_entry = NULL;
|
2011-04-27 20:28:07 +08:00
|
|
|
|
2013-06-04 18:11:39 +08:00
|
|
|
tt_common_entry = batadv_tt_hash_find(bat_priv->tt.global_hash, addr,
|
|
|
|
vid);
|
2011-10-30 19:17:33 +08:00
|
|
|
if (tt_common_entry)
|
|
|
|
tt_global_entry = container_of(tt_common_entry,
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_global_entry,
|
|
|
|
common);
|
2011-10-30 19:17:33 +08:00
|
|
|
return tt_global_entry;
|
2011-02-18 20:28:09 +08:00
|
|
|
}
|
|
|
|
|
2016-06-25 22:44:06 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_entry_free_rcu() - free the tt_local_entry
|
2016-06-25 22:44:06 +08:00
|
|
|
* @rcu: rcu pointer of the tt_local_entry
|
|
|
|
*/
|
|
|
|
static void batadv_tt_local_entry_free_rcu(struct rcu_head *rcu)
|
|
|
|
{
|
|
|
|
struct batadv_tt_local_entry *tt_local_entry;
|
|
|
|
|
|
|
|
tt_local_entry = container_of(rcu, struct batadv_tt_local_entry,
|
|
|
|
common.rcu);
|
|
|
|
|
|
|
|
kmem_cache_free(batadv_tl_cache, tt_local_entry);
|
|
|
|
}
|
|
|
|
|
2016-01-16 17:29:57 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_entry_release() - release tt_local_entry from lists and queue
|
2016-01-16 17:29:57 +08:00
|
|
|
* for free after rcu grace period
|
|
|
|
* @ref: kref pointer of the nc_node
|
|
|
|
*/
|
|
|
|
static void batadv_tt_local_entry_release(struct kref *ref)
|
|
|
|
{
|
|
|
|
struct batadv_tt_local_entry *tt_local_entry;
|
|
|
|
|
|
|
|
tt_local_entry = container_of(ref, struct batadv_tt_local_entry,
|
|
|
|
common.refcount);
|
|
|
|
|
2016-03-11 23:44:05 +08:00
|
|
|
batadv_softif_vlan_put(tt_local_entry->vlan);
|
|
|
|
|
2016-06-25 22:44:06 +08:00
|
|
|
call_rcu(&tt_local_entry->common.rcu, batadv_tt_local_entry_free_rcu);
|
2016-01-16 17:29:57 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_entry_put() - decrement the tt_local_entry refcounter and
|
2016-01-16 17:29:57 +08:00
|
|
|
* possibly release it
|
|
|
|
* @tt_local_entry: tt_local_entry to be free'd
|
|
|
|
*/
|
2012-05-17 02:23:16 +08:00
|
|
|
static void
|
2016-01-17 18:01:25 +08:00
|
|
|
batadv_tt_local_entry_put(struct batadv_tt_local_entry *tt_local_entry)
|
2011-04-27 20:28:07 +08:00
|
|
|
{
|
2021-08-09 01:56:17 +08:00
|
|
|
if (!tt_local_entry)
|
|
|
|
return;
|
|
|
|
|
2016-01-16 17:29:57 +08:00
|
|
|
kref_put(&tt_local_entry->common.refcount,
|
|
|
|
batadv_tt_local_entry_release);
|
2011-04-27 20:28:07 +08:00
|
|
|
}
|
|
|
|
|
2016-06-25 22:44:06 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_entry_free_rcu() - free the tt_global_entry
|
2016-06-25 22:44:06 +08:00
|
|
|
* @rcu: rcu pointer of the tt_global_entry
|
|
|
|
*/
|
|
|
|
static void batadv_tt_global_entry_free_rcu(struct rcu_head *rcu)
|
|
|
|
{
|
|
|
|
struct batadv_tt_global_entry *tt_global_entry;
|
|
|
|
|
|
|
|
tt_global_entry = container_of(rcu, struct batadv_tt_global_entry,
|
|
|
|
common.rcu);
|
|
|
|
|
|
|
|
kmem_cache_free(batadv_tg_cache, tt_global_entry);
|
|
|
|
}
|
|
|
|
|
2013-05-07 06:29:22 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_entry_release() - release tt_global_entry from lists and
|
|
|
|
* queue for free after rcu grace period
|
2016-01-16 17:29:57 +08:00
|
|
|
* @ref: kref pointer of the nc_node
|
|
|
|
*/
|
2021-08-09 01:56:17 +08:00
|
|
|
void batadv_tt_global_entry_release(struct kref *ref)
|
2016-01-16 17:29:57 +08:00
|
|
|
{
|
|
|
|
struct batadv_tt_global_entry *tt_global_entry;
|
|
|
|
|
|
|
|
tt_global_entry = container_of(ref, struct batadv_tt_global_entry,
|
|
|
|
common.refcount);
|
|
|
|
|
|
|
|
batadv_tt_global_del_orig_list(tt_global_entry);
|
2016-06-25 22:44:06 +08:00
|
|
|
|
|
|
|
call_rcu(&tt_global_entry->common.rcu, batadv_tt_global_entry_free_rcu);
|
2016-01-16 17:29:57 +08:00
|
|
|
}
|
|
|
|
|
2014-02-16 00:47:52 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_hash_count() - count the number of orig entries
|
2015-11-17 16:40:52 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
2014-02-16 00:47:52 +08:00
|
|
|
* @addr: the mac address of the client to count entries for
|
|
|
|
* @vid: VLAN identifier
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: the number of originators advertising the given address/data
|
2020-06-02 02:13:21 +08:00
|
|
|
* (excluding our self).
|
2014-02-16 00:47:52 +08:00
|
|
|
*/
|
|
|
|
int batadv_tt_global_hash_count(struct batadv_priv *bat_priv,
|
2015-05-27 00:34:26 +08:00
|
|
|
const u8 *addr, unsigned short vid)
|
2014-02-16 00:47:52 +08:00
|
|
|
{
|
|
|
|
struct batadv_tt_global_entry *tt_global_entry;
|
|
|
|
int count;
|
|
|
|
|
|
|
|
tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
|
|
|
|
if (!tt_global_entry)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
count = atomic_read(&tt_global_entry->orig_list_count);
|
2016-01-17 18:01:26 +08:00
|
|
|
batadv_tt_global_entry_put(tt_global_entry);
|
2014-02-16 00:47:52 +08:00
|
|
|
|
|
|
|
return count;
|
|
|
|
}
|
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_size_mod() - change the size by v of the local table
|
|
|
|
* identified by vid
|
2013-07-31 04:16:25 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @vid: the VLAN identifier of the sub-table to change
|
|
|
|
* @v: the amount to sum to the local table size
|
|
|
|
*/
|
|
|
|
static void batadv_tt_local_size_mod(struct batadv_priv *bat_priv,
|
|
|
|
unsigned short vid, int v)
|
|
|
|
{
|
|
|
|
struct batadv_softif_vlan *vlan;
|
|
|
|
|
|
|
|
vlan = batadv_softif_vlan_get(bat_priv, vid);
|
|
|
|
if (!vlan)
|
|
|
|
return;
|
|
|
|
|
|
|
|
atomic_add(v, &vlan->tt.num_entries);
|
|
|
|
|
2016-01-17 18:01:21 +08:00
|
|
|
batadv_softif_vlan_put(vlan);
|
2013-07-31 04:16:25 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_size_inc() - increase by one the local table size for the
|
|
|
|
* given vid
|
2013-07-31 04:16:25 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @vid: the VLAN identifier
|
|
|
|
*/
|
|
|
|
static void batadv_tt_local_size_inc(struct batadv_priv *bat_priv,
|
|
|
|
unsigned short vid)
|
|
|
|
{
|
|
|
|
batadv_tt_local_size_mod(bat_priv, vid, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_size_dec() - decrease by one the local table size for the
|
|
|
|
* given vid
|
2013-07-31 04:16:25 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @vid: the VLAN identifier
|
|
|
|
*/
|
|
|
|
static void batadv_tt_local_size_dec(struct batadv_priv *bat_priv,
|
|
|
|
unsigned short vid)
|
|
|
|
{
|
|
|
|
batadv_tt_local_size_mod(bat_priv, vid, -1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_size_mod() - change the size by v of the global table
|
2015-11-17 16:40:52 +08:00
|
|
|
* for orig_node identified by vid
|
|
|
|
* @orig_node: the originator for which the table has to be modified
|
2013-07-31 04:16:25 +08:00
|
|
|
* @vid: the VLAN identifier
|
|
|
|
* @v: the amount to sum to the global table size
|
|
|
|
*/
|
|
|
|
static void batadv_tt_global_size_mod(struct batadv_orig_node *orig_node,
|
|
|
|
unsigned short vid, int v)
|
|
|
|
{
|
|
|
|
struct batadv_orig_node_vlan *vlan;
|
|
|
|
|
|
|
|
vlan = batadv_orig_node_vlan_new(orig_node, vid);
|
|
|
|
if (!vlan)
|
|
|
|
return;
|
|
|
|
|
|
|
|
if (atomic_add_return(v, &vlan->tt.num_entries) == 0) {
|
|
|
|
spin_lock_bh(&orig_node->vlan_list_lock);
|
2016-01-31 20:28:00 +08:00
|
|
|
if (!hlist_unhashed(&vlan->list)) {
|
|
|
|
hlist_del_init_rcu(&vlan->list);
|
2016-01-17 18:01:24 +08:00
|
|
|
batadv_orig_node_vlan_put(vlan);
|
2016-01-31 20:28:00 +08:00
|
|
|
}
|
2013-07-31 04:16:25 +08:00
|
|
|
spin_unlock_bh(&orig_node->vlan_list_lock);
|
|
|
|
}
|
|
|
|
|
2016-01-17 18:01:24 +08:00
|
|
|
batadv_orig_node_vlan_put(vlan);
|
2013-07-31 04:16:25 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_size_inc() - increase by one the global table size for the
|
2013-07-31 04:16:25 +08:00
|
|
|
* given vid
|
|
|
|
* @orig_node: the originator which global table size has to be decreased
|
|
|
|
* @vid: the vlan identifier
|
|
|
|
*/
|
|
|
|
static void batadv_tt_global_size_inc(struct batadv_orig_node *orig_node,
|
|
|
|
unsigned short vid)
|
|
|
|
{
|
|
|
|
batadv_tt_global_size_mod(orig_node, vid, 1);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_size_dec() - decrease by one the global table size for the
|
2013-07-31 04:16:25 +08:00
|
|
|
* given vid
|
|
|
|
* @orig_node: the originator which global table size has to be decreased
|
|
|
|
* @vid: the vlan identifier
|
|
|
|
*/
|
|
|
|
static void batadv_tt_global_size_dec(struct batadv_orig_node *orig_node,
|
|
|
|
unsigned short vid)
|
|
|
|
{
|
|
|
|
batadv_tt_global_size_mod(orig_node, vid, -1);
|
|
|
|
}
|
|
|
|
|
2016-06-25 22:44:06 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_orig_list_entry_free_rcu() - free the orig_entry
|
2016-06-25 22:44:06 +08:00
|
|
|
* @rcu: rcu pointer of the orig_entry
|
|
|
|
*/
|
|
|
|
static void batadv_tt_orig_list_entry_free_rcu(struct rcu_head *rcu)
|
|
|
|
{
|
|
|
|
struct batadv_tt_orig_list_entry *orig_entry;
|
|
|
|
|
|
|
|
orig_entry = container_of(rcu, struct batadv_tt_orig_list_entry, rcu);
|
|
|
|
|
|
|
|
kmem_cache_free(batadv_tt_orig_cache, orig_entry);
|
|
|
|
}
|
|
|
|
|
2016-01-05 19:06:20 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_orig_list_entry_release() - release tt orig entry from lists and
|
2016-01-05 19:06:20 +08:00
|
|
|
* queue for free after rcu grace period
|
2016-01-16 17:29:50 +08:00
|
|
|
* @ref: kref pointer of the tt orig entry
|
2016-01-05 19:06:20 +08:00
|
|
|
*/
|
2016-01-16 17:29:50 +08:00
|
|
|
static void batadv_tt_orig_list_entry_release(struct kref *ref)
|
2016-01-05 19:06:20 +08:00
|
|
|
{
|
2016-01-16 17:29:50 +08:00
|
|
|
struct batadv_tt_orig_list_entry *orig_entry;
|
|
|
|
|
|
|
|
orig_entry = container_of(ref, struct batadv_tt_orig_list_entry,
|
|
|
|
refcount);
|
|
|
|
|
2016-01-17 18:01:09 +08:00
|
|
|
batadv_orig_node_put(orig_entry->orig_node);
|
2016-06-25 22:44:06 +08:00
|
|
|
call_rcu(&orig_entry->rcu, batadv_tt_orig_list_entry_free_rcu);
|
2016-01-05 19:06:20 +08:00
|
|
|
}
|
|
|
|
|
2016-01-16 17:29:50 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_orig_list_entry_put() - decrement the tt orig entry refcounter and
|
2016-01-17 18:01:27 +08:00
|
|
|
* possibly release it
|
2016-01-16 17:29:50 +08:00
|
|
|
* @orig_entry: tt orig entry to be free'd
|
|
|
|
*/
|
2012-05-17 02:23:16 +08:00
|
|
|
static void
|
2016-01-17 18:01:27 +08:00
|
|
|
batadv_tt_orig_list_entry_put(struct batadv_tt_orig_list_entry *orig_entry)
|
2011-10-23 02:12:51 +08:00
|
|
|
{
|
2021-08-09 01:56:17 +08:00
|
|
|
if (!orig_entry)
|
|
|
|
return;
|
|
|
|
|
2016-01-16 17:29:50 +08:00
|
|
|
kref_put(&orig_entry->refcount, batadv_tt_orig_list_entry_release);
|
2011-04-27 20:28:07 +08:00
|
|
|
}
|
|
|
|
|
2013-04-03 17:15:33 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_event() - store a local TT event (ADD/DEL)
|
2013-04-03 17:15:33 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @tt_local_entry: the TT entry involved in the event
|
|
|
|
* @event_flags: flags to store in the event structure
|
|
|
|
*/
|
2012-06-06 04:31:31 +08:00
|
|
|
static void batadv_tt_local_event(struct batadv_priv *bat_priv,
|
2013-04-03 17:15:33 +08:00
|
|
|
struct batadv_tt_local_entry *tt_local_entry,
|
2015-05-27 00:34:26 +08:00
|
|
|
u8 event_flags)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_change_node *tt_change_node, *entry, *safe;
|
2013-04-03 17:15:33 +08:00
|
|
|
struct batadv_tt_common_entry *common = &tt_local_entry->common;
|
2015-05-27 00:34:26 +08:00
|
|
|
u8 flags = common->flags | event_flags;
|
2012-05-25 06:00:42 +08:00
|
|
|
bool event_removed = false;
|
|
|
|
bool del_op_requested, del_op_entry;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2016-06-25 22:44:06 +08:00
|
|
|
tt_change_node = kmem_cache_alloc(batadv_tt_change_cache, GFP_ATOMIC);
|
2011-04-27 20:27:44 +08:00
|
|
|
if (!tt_change_node)
|
|
|
|
return;
|
|
|
|
|
2011-06-30 07:14:00 +08:00
|
|
|
tt_change_node->change.flags = flags;
|
2013-12-15 20:26:55 +08:00
|
|
|
memset(tt_change_node->change.reserved, 0,
|
|
|
|
sizeof(tt_change_node->change.reserved));
|
2014-01-22 07:42:11 +08:00
|
|
|
ether_addr_copy(tt_change_node->change.addr, common->addr);
|
2013-06-04 18:11:39 +08:00
|
|
|
tt_change_node->change.vid = htons(common->vid);
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2012-06-04 04:19:21 +08:00
|
|
|
del_op_requested = flags & BATADV_TT_CLIENT_DEL;
|
2012-05-25 06:00:42 +08:00
|
|
|
|
|
|
|
/* check for ADD+DEL or DEL+ADD events */
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_lock_bh(&bat_priv->tt.changes_list_lock);
|
|
|
|
list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
|
2012-05-25 06:00:42 +08:00
|
|
|
list) {
|
2013-04-03 17:15:33 +08:00
|
|
|
if (!batadv_compare_eth(entry->change.addr, common->addr))
|
2012-05-25 06:00:42 +08:00
|
|
|
continue;
|
|
|
|
|
|
|
|
/* DEL+ADD in the same orig interval have no effect and can be
|
|
|
|
* removed to avoid silly behaviour on the receiver side. The
|
|
|
|
* other way around (ADD+DEL) can happen in case of roaming of
|
|
|
|
* a client still in the NEW state. Roaming of NEW clients is
|
|
|
|
* now possible due to automatically recognition of "temporary"
|
|
|
|
* clients
|
|
|
|
*/
|
2012-06-04 04:19:21 +08:00
|
|
|
del_op_entry = entry->change.flags & BATADV_TT_CLIENT_DEL;
|
2012-05-25 06:00:42 +08:00
|
|
|
if (!del_op_requested && del_op_entry)
|
|
|
|
goto del;
|
|
|
|
if (del_op_requested && !del_op_entry)
|
|
|
|
goto del;
|
2013-10-13 08:50:19 +08:00
|
|
|
|
|
|
|
/* this is a second add in the same originator interval. It
|
|
|
|
* means that flags have been changed: update them!
|
|
|
|
*/
|
|
|
|
if (!del_op_requested && !del_op_entry)
|
|
|
|
entry->change.flags = flags;
|
|
|
|
|
2012-05-25 06:00:42 +08:00
|
|
|
continue;
|
|
|
|
del:
|
|
|
|
list_del(&entry->list);
|
2016-06-25 22:44:06 +08:00
|
|
|
kmem_cache_free(batadv_tt_change_cache, entry);
|
|
|
|
kmem_cache_free(batadv_tt_change_cache, tt_change_node);
|
2012-05-25 06:00:42 +08:00
|
|
|
event_removed = true;
|
|
|
|
goto unlock;
|
|
|
|
}
|
|
|
|
|
2011-04-27 20:27:44 +08:00
|
|
|
/* track the change in the OGMinterval list */
|
2012-07-16 04:26:51 +08:00
|
|
|
list_add_tail(&tt_change_node->list, &bat_priv->tt.changes_list);
|
2012-05-25 06:00:42 +08:00
|
|
|
|
|
|
|
unlock:
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_unlock_bh(&bat_priv->tt.changes_list_lock);
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2012-05-25 06:00:42 +08:00
|
|
|
if (event_removed)
|
2012-07-16 04:26:51 +08:00
|
|
|
atomic_dec(&bat_priv->tt.local_changes);
|
2012-05-25 06:00:42 +08:00
|
|
|
else
|
2012-07-16 04:26:51 +08:00
|
|
|
atomic_inc(&bat_priv->tt.local_changes);
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_len() - compute length in bytes of given number of tt changes
|
2013-04-23 21:40:02 +08:00
|
|
|
* @changes_num: number of tt changes
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: computed length in bytes.
|
2013-04-23 21:40:02 +08:00
|
|
|
*/
|
|
|
|
static int batadv_tt_len(int changes_num)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
2013-04-23 21:40:02 +08:00
|
|
|
return changes_num * sizeof(struct batadv_tvlv_tt_change);
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
|
2013-05-28 19:14:27 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_entries() - compute the number of entries fitting in tt_len bytes
|
2013-05-28 19:14:27 +08:00
|
|
|
* @tt_len: available space
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: the number of entries.
|
2013-05-28 19:14:27 +08:00
|
|
|
*/
|
2015-05-27 00:34:26 +08:00
|
|
|
static u16 batadv_tt_entries(u16 tt_len)
|
2013-05-28 19:14:27 +08:00
|
|
|
{
|
|
|
|
return tt_len / batadv_tt_len(1);
|
|
|
|
}
|
|
|
|
|
2013-05-27 15:33:25 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_table_transmit_size() - calculates the local translation
|
|
|
|
* table size when transmitted over the air
|
2013-05-27 15:33:25 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: local translation table size in bytes.
|
2013-05-27 15:33:25 +08:00
|
|
|
*/
|
|
|
|
static int batadv_tt_local_table_transmit_size(struct batadv_priv *bat_priv)
|
|
|
|
{
|
2015-06-10 02:50:49 +08:00
|
|
|
u16 num_vlan = 0;
|
|
|
|
u16 tt_local_entries = 0;
|
2013-05-27 15:33:25 +08:00
|
|
|
struct batadv_softif_vlan *vlan;
|
|
|
|
int hdr_size;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
|
|
|
|
num_vlan++;
|
|
|
|
tt_local_entries += atomic_read(&vlan->tt.num_entries);
|
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
|
|
|
|
|
|
|
/* header size of tvlv encapsulated tt response payload */
|
|
|
|
hdr_size = sizeof(struct batadv_unicast_tvlv_packet);
|
|
|
|
hdr_size += sizeof(struct batadv_tvlv_hdr);
|
|
|
|
hdr_size += sizeof(struct batadv_tvlv_tt_data);
|
|
|
|
hdr_size += num_vlan * sizeof(struct batadv_tvlv_tt_vlan_data);
|
|
|
|
|
|
|
|
return hdr_size + batadv_tt_len(tt_local_entries);
|
|
|
|
}
|
|
|
|
|
2012-06-06 04:31:31 +08:00
|
|
|
static int batadv_tt_local_init(struct batadv_priv *bat_priv)
|
2010-12-13 19:19:28 +08:00
|
|
|
{
|
2012-07-16 04:26:51 +08:00
|
|
|
if (bat_priv->tt.local_hash)
|
2012-05-05 19:27:28 +08:00
|
|
|
return 0;
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
bat_priv->tt.local_hash = batadv_hash_new(1024);
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
if (!bat_priv->tt.local_hash)
|
2012-05-05 19:27:28 +08:00
|
|
|
return -ENOMEM;
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2012-11-10 18:00:32 +08:00
|
|
|
batadv_hash_set_lock_class(bat_priv->tt.local_hash,
|
|
|
|
&batadv_tt_local_hash_lock_class_key);
|
|
|
|
|
2012-05-05 19:27:28 +08:00
|
|
|
return 0;
|
2010-12-13 19:19:28 +08:00
|
|
|
}
|
|
|
|
|
2012-09-24 04:38:37 +08:00
|
|
|
static void batadv_tt_global_free(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_tt_global_entry *tt_global,
|
|
|
|
const char *message)
|
|
|
|
{
|
2019-02-23 21:27:10 +08:00
|
|
|
struct batadv_tt_global_entry *tt_removed_entry;
|
|
|
|
struct hlist_node *tt_removed_node;
|
|
|
|
|
2012-09-24 04:38:37 +08:00
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv,
|
2013-06-04 18:11:41 +08:00
|
|
|
"Deleting global tt entry %pM (vid: %d): %s\n",
|
|
|
|
tt_global->common.addr,
|
2017-02-23 00:16:42 +08:00
|
|
|
batadv_print_vid(tt_global->common.vid), message);
|
2012-09-24 04:38:37 +08:00
|
|
|
|
2019-02-23 21:27:10 +08:00
|
|
|
tt_removed_node = batadv_hash_remove(bat_priv->tt.global_hash,
|
|
|
|
batadv_compare_tt,
|
|
|
|
batadv_choose_tt,
|
|
|
|
&tt_global->common);
|
|
|
|
if (!tt_removed_node)
|
|
|
|
return;
|
|
|
|
|
|
|
|
/* drop reference of remove hash entry */
|
|
|
|
tt_removed_entry = hlist_entry(tt_removed_node,
|
|
|
|
struct batadv_tt_global_entry,
|
|
|
|
common.hash_entry);
|
|
|
|
batadv_tt_global_entry_put(tt_removed_entry);
|
2012-09-24 04:38:37 +08:00
|
|
|
}
|
|
|
|
|
2013-06-04 18:11:39 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_add() - add a new client to the local table or update an
|
2013-06-04 18:11:39 +08:00
|
|
|
* existing client
|
|
|
|
* @soft_iface: netdev struct of the mesh interface
|
|
|
|
* @addr: the mac address of the client to add
|
|
|
|
* @vid: VLAN identifier
|
|
|
|
* @ifindex: index of the interface where the client is connected to (useful to
|
|
|
|
* identify wireless clients)
|
2013-11-16 19:03:48 +08:00
|
|
|
* @mark: the value contained in the skb->mark field of the received packet (if
|
|
|
|
* any)
|
2013-05-27 15:33:25 +08:00
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: true if the client was successfully added, false otherwise.
|
2013-06-04 18:11:39 +08:00
|
|
|
*/
|
2015-05-27 00:34:26 +08:00
|
|
|
bool batadv_tt_local_add(struct net_device *soft_iface, const u8 *addr,
|
|
|
|
unsigned short vid, int ifindex, u32 mark)
|
2010-12-13 19:19:28 +08:00
|
|
|
{
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_priv *bat_priv = netdev_priv(soft_iface);
|
2012-10-07 18:02:22 +08:00
|
|
|
struct batadv_tt_local_entry *tt_local;
|
2014-02-16 00:47:49 +08:00
|
|
|
struct batadv_tt_global_entry *tt_global = NULL;
|
2016-04-21 18:57:27 +08:00
|
|
|
struct net *net = dev_net(soft_iface);
|
2014-05-08 23:13:15 +08:00
|
|
|
struct batadv_softif_vlan *vlan;
|
2013-10-13 08:50:18 +08:00
|
|
|
struct net_device *in_dev = NULL;
|
2016-09-30 21:21:03 +08:00
|
|
|
struct batadv_hard_iface *in_hardif = NULL;
|
2011-10-23 02:12:51 +08:00
|
|
|
struct hlist_head *head;
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_orig_list_entry *orig_entry;
|
2013-05-27 15:33:25 +08:00
|
|
|
int hash_added, table_size, packet_size_max;
|
2015-06-10 02:50:49 +08:00
|
|
|
bool ret = false;
|
|
|
|
bool roamed_back = false;
|
2015-05-27 00:34:26 +08:00
|
|
|
u8 remote_flags;
|
|
|
|
u32 match_mark;
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2013-10-13 08:50:18 +08:00
|
|
|
if (ifindex != BATADV_NULL_IFINDEX)
|
2016-04-21 18:57:27 +08:00
|
|
|
in_dev = dev_get_by_index(net, ifindex);
|
2013-10-13 08:50:18 +08:00
|
|
|
|
2016-09-30 21:21:03 +08:00
|
|
|
if (in_dev)
|
|
|
|
in_hardif = batadv_hardif_get_by_netdev(in_dev);
|
|
|
|
|
2013-06-04 18:11:39 +08:00
|
|
|
tt_local = batadv_tt_local_hash_find(bat_priv, addr, vid);
|
2014-02-16 00:47:49 +08:00
|
|
|
|
|
|
|
if (!is_multicast_ether_addr(addr))
|
|
|
|
tt_global = batadv_tt_global_hash_find(bat_priv, addr, vid);
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2012-09-24 04:38:35 +08:00
|
|
|
if (tt_local) {
|
|
|
|
tt_local->last_seen = jiffies;
|
2012-09-24 04:38:37 +08:00
|
|
|
if (tt_local->common.flags & BATADV_TT_CLIENT_PENDING) {
|
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv,
|
2013-06-04 18:11:41 +08:00
|
|
|
"Re-adding pending client %pM (vid: %d)\n",
|
2017-02-23 00:16:42 +08:00
|
|
|
addr, batadv_print_vid(vid));
|
2012-09-24 04:38:37 +08:00
|
|
|
/* whatever the reason why the PENDING flag was set,
|
|
|
|
* this is a client which was enqueued to be removed in
|
|
|
|
* this orig_interval. Since it popped up again, the
|
|
|
|
* flag can be reset like it was never enqueued
|
|
|
|
*/
|
|
|
|
tt_local->common.flags &= ~BATADV_TT_CLIENT_PENDING;
|
|
|
|
goto add_event;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tt_local->common.flags & BATADV_TT_CLIENT_ROAM) {
|
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv,
|
2013-06-04 18:11:41 +08:00
|
|
|
"Roaming client %pM (vid: %d) came back to its original location\n",
|
2017-02-23 00:16:42 +08:00
|
|
|
addr, batadv_print_vid(vid));
|
2012-09-24 04:38:37 +08:00
|
|
|
/* the ROAM flag is set because this client roamed away
|
|
|
|
* and the node got a roaming_advertisement message. Now
|
|
|
|
* that the client popped up again at its original
|
|
|
|
* location such flag can be unset
|
|
|
|
*/
|
|
|
|
tt_local->common.flags &= ~BATADV_TT_CLIENT_ROAM;
|
|
|
|
roamed_back = true;
|
|
|
|
}
|
|
|
|
goto check_roaming;
|
2010-12-13 19:19:28 +08:00
|
|
|
}
|
|
|
|
|
2013-05-27 15:33:25 +08:00
|
|
|
/* Ignore the client if we cannot send it in a full table response. */
|
|
|
|
table_size = batadv_tt_local_table_transmit_size(bat_priv);
|
|
|
|
table_size += batadv_tt_len(1);
|
|
|
|
packet_size_max = atomic_read(&bat_priv->packet_size_max);
|
|
|
|
if (table_size > packet_size_max) {
|
|
|
|
net_ratelimited_function(batadv_info, soft_iface,
|
|
|
|
"Local translation table size (%i) exceeds maximum packet size (%i); Ignoring new local tt entry: %pM\n",
|
|
|
|
table_size, packet_size_max, addr);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2016-06-25 22:44:06 +08:00
|
|
|
tt_local = kmem_cache_alloc(batadv_tl_cache, GFP_ATOMIC);
|
2012-09-24 04:38:35 +08:00
|
|
|
if (!tt_local)
|
2011-04-27 20:28:07 +08:00
|
|
|
goto out;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2014-05-08 23:13:15 +08:00
|
|
|
/* increase the refcounter of the related vlan */
|
|
|
|
vlan = batadv_softif_vlan_get(bat_priv, vid);
|
2016-06-26 17:16:09 +08:00
|
|
|
if (!vlan) {
|
|
|
|
net_ratelimited_function(batadv_info, soft_iface,
|
|
|
|
"adding TT local entry %pM to non-existent VLAN %d\n",
|
2017-02-23 00:16:42 +08:00
|
|
|
addr, batadv_print_vid(vid));
|
2016-06-25 22:44:06 +08:00
|
|
|
kmem_cache_free(batadv_tl_cache, tt_local);
|
2015-08-18 19:37:01 +08:00
|
|
|
tt_local = NULL;
|
2015-06-09 21:24:36 +08:00
|
|
|
goto out;
|
2015-08-18 19:37:01 +08:00
|
|
|
}
|
2014-05-08 23:13:15 +08:00
|
|
|
|
2012-06-04 04:19:22 +08:00
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv,
|
2013-06-04 18:11:41 +08:00
|
|
|
"Creating new local tt entry: %pM (vid: %d, ttvn: %d)\n",
|
2017-02-23 00:16:42 +08:00
|
|
|
addr, batadv_print_vid(vid),
|
2015-05-27 00:34:26 +08:00
|
|
|
(u8)atomic_read(&bat_priv->tt.vn));
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2014-01-22 07:42:11 +08:00
|
|
|
ether_addr_copy(tt_local->common.addr, addr);
|
2012-11-19 16:01:44 +08:00
|
|
|
/* The local entry has to be marked as NEW to avoid to send it in
|
|
|
|
* a full table response going out before the next ttvn increment
|
|
|
|
* (consistency check)
|
|
|
|
*/
|
|
|
|
tt_local->common.flags = BATADV_TT_CLIENT_NEW;
|
2013-06-04 18:11:39 +08:00
|
|
|
tt_local->common.vid = vid;
|
2016-09-30 21:21:03 +08:00
|
|
|
if (batadv_is_wifi_hardif(in_hardif))
|
2012-09-24 04:38:35 +08:00
|
|
|
tt_local->common.flags |= BATADV_TT_CLIENT_WIFI;
|
2016-01-16 17:29:57 +08:00
|
|
|
kref_init(&tt_local->common.refcount);
|
2012-09-24 04:38:35 +08:00
|
|
|
tt_local->last_seen = jiffies;
|
|
|
|
tt_local->common.added_at = tt_local->last_seen;
|
2016-03-11 23:44:05 +08:00
|
|
|
tt_local->vlan = vlan;
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2014-02-16 00:47:49 +08:00
|
|
|
/* the batman interface mac and multicast addresses should never be
|
|
|
|
* purged
|
|
|
|
*/
|
|
|
|
if (batadv_compare_eth(addr, soft_iface->dev_addr) ||
|
|
|
|
is_multicast_ether_addr(addr))
|
2012-09-24 04:38:35 +08:00
|
|
|
tt_local->common.flags |= BATADV_TT_CLIENT_NOPURGE;
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2016-07-15 23:39:22 +08:00
|
|
|
kref_get(&tt_local->common.refcount);
|
2012-07-16 04:26:51 +08:00
|
|
|
hash_added = batadv_hash_add(bat_priv->tt.local_hash, batadv_compare_tt,
|
2013-06-04 18:11:39 +08:00
|
|
|
batadv_choose_tt, &tt_local->common,
|
2012-09-24 04:38:35 +08:00
|
|
|
&tt_local->common.hash_entry);
|
2011-11-03 03:26:45 +08:00
|
|
|
|
|
|
|
if (unlikely(hash_added != 0)) {
|
|
|
|
/* remove the reference for the hash */
|
2016-01-17 18:01:25 +08:00
|
|
|
batadv_tt_local_entry_put(tt_local);
|
2011-11-03 03:26:45 +08:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2012-09-24 04:38:37 +08:00
|
|
|
add_event:
|
2013-04-03 17:15:33 +08:00
|
|
|
batadv_tt_local_event(bat_priv, tt_local, BATADV_NO_FLAGS);
|
2011-06-30 07:14:00 +08:00
|
|
|
|
2012-09-24 04:38:37 +08:00
|
|
|
check_roaming:
|
|
|
|
/* Check whether it is a roaming, but don't do anything if the roaming
|
|
|
|
* process has already been handled
|
|
|
|
*/
|
|
|
|
if (tt_global && !(tt_global->common.flags & BATADV_TT_CLIENT_ROAM)) {
|
2011-10-23 02:12:51 +08:00
|
|
|
/* These node are probably going to update their tt table */
|
2012-09-24 04:38:35 +08:00
|
|
|
head = &tt_global->orig_list;
|
2011-10-23 02:12:51 +08:00
|
|
|
rcu_read_lock();
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_rcu(orig_entry, head, list) {
|
2012-09-24 04:38:35 +08:00
|
|
|
batadv_send_roam_adv(bat_priv, tt_global->common.addr,
|
2013-06-04 18:11:39 +08:00
|
|
|
tt_global->common.vid,
|
2012-05-17 02:23:16 +08:00
|
|
|
orig_entry->orig_node);
|
2011-10-23 02:12:51 +08:00
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
2012-09-24 04:38:37 +08:00
|
|
|
if (roamed_back) {
|
|
|
|
batadv_tt_global_free(bat_priv, tt_global,
|
|
|
|
"Roaming canceled");
|
|
|
|
tt_global = NULL;
|
|
|
|
} else {
|
|
|
|
/* The global entry has to be marked as ROAMING and
|
|
|
|
* has to be kept for consistency purpose
|
|
|
|
*/
|
|
|
|
tt_global->common.flags |= BATADV_TT_CLIENT_ROAM;
|
|
|
|
tt_global->roam_at = jiffies;
|
|
|
|
}
|
2011-04-27 20:28:07 +08:00
|
|
|
}
|
2012-09-24 04:38:37 +08:00
|
|
|
|
2013-10-13 08:50:19 +08:00
|
|
|
/* store the current remote flags before altering them. This helps
|
|
|
|
* understanding is flags are changing or not
|
|
|
|
*/
|
|
|
|
remote_flags = tt_local->common.flags & BATADV_TT_REMOTE_MASK;
|
|
|
|
|
2016-09-30 21:21:03 +08:00
|
|
|
if (batadv_is_wifi_hardif(in_hardif))
|
2013-10-13 08:50:19 +08:00
|
|
|
tt_local->common.flags |= BATADV_TT_CLIENT_WIFI;
|
|
|
|
else
|
|
|
|
tt_local->common.flags &= ~BATADV_TT_CLIENT_WIFI;
|
2013-05-27 15:33:25 +08:00
|
|
|
|
2013-11-16 19:03:48 +08:00
|
|
|
/* check the mark in the skb: if it's equal to the configured
|
|
|
|
* isolation_mark, it means the packet is coming from an isolated
|
|
|
|
* non-mesh client
|
|
|
|
*/
|
|
|
|
match_mark = (mark & bat_priv->isolation_mark_mask);
|
|
|
|
if (bat_priv->isolation_mark_mask &&
|
|
|
|
match_mark == bat_priv->isolation_mark)
|
|
|
|
tt_local->common.flags |= BATADV_TT_CLIENT_ISOLA;
|
|
|
|
else
|
|
|
|
tt_local->common.flags &= ~BATADV_TT_CLIENT_ISOLA;
|
|
|
|
|
2013-10-13 08:50:19 +08:00
|
|
|
/* if any "dynamic" flag has been modified, resend an ADD event for this
|
|
|
|
* entry so that all the nodes can get the new flags
|
|
|
|
*/
|
|
|
|
if (remote_flags ^ (tt_local->common.flags & BATADV_TT_REMOTE_MASK))
|
|
|
|
batadv_tt_local_event(bat_priv, tt_local, BATADV_NO_FLAGS);
|
|
|
|
|
|
|
|
ret = true;
|
2011-04-27 20:28:07 +08:00
|
|
|
out:
|
2021-08-09 01:11:08 +08:00
|
|
|
batadv_hardif_put(in_hardif);
|
2021-08-05 19:55:27 +08:00
|
|
|
dev_put(in_dev);
|
2021-08-09 01:11:08 +08:00
|
|
|
batadv_tt_local_entry_put(tt_local);
|
|
|
|
batadv_tt_global_entry_put(tt_global);
|
2013-05-27 15:33:25 +08:00
|
|
|
return ret;
|
2010-12-13 19:19:28 +08:00
|
|
|
}
|
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_prepare_tvlv_global_data() - prepare the TVLV TT header to send
|
2013-07-31 04:16:25 +08:00
|
|
|
* within a TT Response directed to another node
|
|
|
|
* @orig_node: originator for which the TT data has to be prepared
|
|
|
|
* @tt_data: uninitialised pointer to the address of the TVLV buffer
|
|
|
|
* @tt_change: uninitialised pointer to the address of the area where the TT
|
|
|
|
* changed can be stored
|
|
|
|
* @tt_len: pointer to the length to reserve to the tt_change. if -1 this
|
|
|
|
* function reserves the amount of space needed to send the entire global TT
|
|
|
|
* table. In case of success the value is updated with the real amount of
|
|
|
|
* reserved bytes
|
|
|
|
* Allocate the needed amount of memory for the entire TT TVLV and write its
|
2020-06-02 02:13:21 +08:00
|
|
|
* header made up of one tvlv_tt_data object and a series of tvlv_tt_vlan_data
|
2013-07-31 04:16:25 +08:00
|
|
|
* objects, one per active VLAN served by the originator node.
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: the size of the allocated buffer or 0 in case of failure.
|
2013-07-31 04:16:25 +08:00
|
|
|
*/
|
2015-05-27 00:34:26 +08:00
|
|
|
static u16
|
2013-07-31 04:16:25 +08:00
|
|
|
batadv_tt_prepare_tvlv_global_data(struct batadv_orig_node *orig_node,
|
|
|
|
struct batadv_tvlv_tt_data **tt_data,
|
|
|
|
struct batadv_tvlv_tt_change **tt_change,
|
2015-05-27 00:34:26 +08:00
|
|
|
s32 *tt_len)
|
2013-07-31 04:16:25 +08:00
|
|
|
{
|
2015-06-10 02:50:49 +08:00
|
|
|
u16 num_vlan = 0;
|
|
|
|
u16 num_entries = 0;
|
|
|
|
u16 change_offset;
|
|
|
|
u16 tvlv_len;
|
2013-07-31 04:16:25 +08:00
|
|
|
struct batadv_tvlv_tt_vlan_data *tt_vlan;
|
|
|
|
struct batadv_orig_node_vlan *vlan;
|
2015-05-27 00:34:26 +08:00
|
|
|
u8 *tt_change_ptr;
|
2013-07-31 04:16:25 +08:00
|
|
|
|
2018-05-10 03:07:40 +08:00
|
|
|
spin_lock_bh(&orig_node->vlan_list_lock);
|
2020-02-17 01:30:12 +08:00
|
|
|
hlist_for_each_entry(vlan, &orig_node->vlan_list, list) {
|
2013-07-31 04:16:25 +08:00
|
|
|
num_vlan++;
|
|
|
|
num_entries += atomic_read(&vlan->tt.num_entries);
|
|
|
|
}
|
|
|
|
|
|
|
|
change_offset = sizeof(**tt_data);
|
|
|
|
change_offset += num_vlan * sizeof(*tt_vlan);
|
|
|
|
|
|
|
|
/* if tt_len is negative, allocate the space needed by the full table */
|
|
|
|
if (*tt_len < 0)
|
|
|
|
*tt_len = batadv_tt_len(num_entries);
|
|
|
|
|
|
|
|
tvlv_len = *tt_len;
|
|
|
|
tvlv_len += change_offset;
|
|
|
|
|
|
|
|
*tt_data = kmalloc(tvlv_len, GFP_ATOMIC);
|
|
|
|
if (!*tt_data) {
|
|
|
|
*tt_len = 0;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
(*tt_data)->flags = BATADV_NO_FLAGS;
|
|
|
|
(*tt_data)->ttvn = atomic_read(&orig_node->last_ttvn);
|
|
|
|
(*tt_data)->num_vlan = htons(num_vlan);
|
|
|
|
|
|
|
|
tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(*tt_data + 1);
|
2020-02-17 01:30:12 +08:00
|
|
|
hlist_for_each_entry(vlan, &orig_node->vlan_list, list) {
|
2013-07-31 04:16:25 +08:00
|
|
|
tt_vlan->vid = htons(vlan->vid);
|
|
|
|
tt_vlan->crc = htonl(vlan->tt.crc);
|
2021-04-05 18:16:50 +08:00
|
|
|
tt_vlan->reserved = 0;
|
2013-07-31 04:16:25 +08:00
|
|
|
|
|
|
|
tt_vlan++;
|
|
|
|
}
|
|
|
|
|
2015-05-27 00:34:26 +08:00
|
|
|
tt_change_ptr = (u8 *)*tt_data + change_offset;
|
2013-07-31 04:16:25 +08:00
|
|
|
*tt_change = (struct batadv_tvlv_tt_change *)tt_change_ptr;
|
|
|
|
|
|
|
|
out:
|
2018-05-10 03:07:40 +08:00
|
|
|
spin_unlock_bh(&orig_node->vlan_list_lock);
|
2013-07-31 04:16:25 +08:00
|
|
|
return tvlv_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_prepare_tvlv_local_data() - allocate and prepare the TT TVLV for
|
|
|
|
* this node
|
2013-07-31 04:16:25 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @tt_data: uninitialised pointer to the address of the TVLV buffer
|
|
|
|
* @tt_change: uninitialised pointer to the address of the area where the TT
|
|
|
|
* changes can be stored
|
|
|
|
* @tt_len: pointer to the length to reserve to the tt_change. if -1 this
|
|
|
|
* function reserves the amount of space needed to send the entire local TT
|
|
|
|
* table. In case of success the value is updated with the real amount of
|
|
|
|
* reserved bytes
|
|
|
|
*
|
|
|
|
* Allocate the needed amount of memory for the entire TT TVLV and write its
|
|
|
|
* header made up by one tvlv_tt_data object and a series of tvlv_tt_vlan_data
|
|
|
|
* objects, one per active VLAN.
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: the size of the allocated buffer or 0 in case of failure.
|
2013-07-31 04:16:25 +08:00
|
|
|
*/
|
2015-05-27 00:34:26 +08:00
|
|
|
static u16
|
2013-07-31 04:16:25 +08:00
|
|
|
batadv_tt_prepare_tvlv_local_data(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_tvlv_tt_data **tt_data,
|
|
|
|
struct batadv_tvlv_tt_change **tt_change,
|
2015-05-27 00:34:26 +08:00
|
|
|
s32 *tt_len)
|
2013-07-31 04:16:25 +08:00
|
|
|
{
|
|
|
|
struct batadv_tvlv_tt_vlan_data *tt_vlan;
|
|
|
|
struct batadv_softif_vlan *vlan;
|
2015-06-10 02:50:49 +08:00
|
|
|
u16 num_vlan = 0;
|
2018-05-12 00:23:07 +08:00
|
|
|
u16 vlan_entries = 0;
|
|
|
|
u16 total_entries = 0;
|
2015-06-10 02:50:49 +08:00
|
|
|
u16 tvlv_len;
|
2015-05-27 00:34:26 +08:00
|
|
|
u8 *tt_change_ptr;
|
2013-07-31 04:16:25 +08:00
|
|
|
int change_offset;
|
|
|
|
|
2018-05-10 03:07:40 +08:00
|
|
|
spin_lock_bh(&bat_priv->softif_vlan_list_lock);
|
2020-02-17 01:30:12 +08:00
|
|
|
hlist_for_each_entry(vlan, &bat_priv->softif_vlan_list, list) {
|
2018-05-12 00:23:07 +08:00
|
|
|
vlan_entries = atomic_read(&vlan->tt.num_entries);
|
|
|
|
if (vlan_entries < 1)
|
|
|
|
continue;
|
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
num_vlan++;
|
2018-05-12 00:23:07 +08:00
|
|
|
total_entries += vlan_entries;
|
2013-07-31 04:16:25 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
change_offset = sizeof(**tt_data);
|
|
|
|
change_offset += num_vlan * sizeof(*tt_vlan);
|
|
|
|
|
|
|
|
/* if tt_len is negative, allocate the space needed by the full table */
|
|
|
|
if (*tt_len < 0)
|
2018-05-12 00:23:07 +08:00
|
|
|
*tt_len = batadv_tt_len(total_entries);
|
2013-07-31 04:16:25 +08:00
|
|
|
|
|
|
|
tvlv_len = *tt_len;
|
|
|
|
tvlv_len += change_offset;
|
|
|
|
|
|
|
|
*tt_data = kmalloc(tvlv_len, GFP_ATOMIC);
|
|
|
|
if (!*tt_data) {
|
|
|
|
tvlv_len = 0;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
(*tt_data)->flags = BATADV_NO_FLAGS;
|
|
|
|
(*tt_data)->ttvn = atomic_read(&bat_priv->tt.vn);
|
|
|
|
(*tt_data)->num_vlan = htons(num_vlan);
|
|
|
|
|
|
|
|
tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(*tt_data + 1);
|
2020-02-17 01:30:12 +08:00
|
|
|
hlist_for_each_entry(vlan, &bat_priv->softif_vlan_list, list) {
|
2018-05-12 00:23:07 +08:00
|
|
|
vlan_entries = atomic_read(&vlan->tt.num_entries);
|
|
|
|
if (vlan_entries < 1)
|
|
|
|
continue;
|
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
tt_vlan->vid = htons(vlan->vid);
|
|
|
|
tt_vlan->crc = htonl(vlan->tt.crc);
|
2021-04-05 18:16:50 +08:00
|
|
|
tt_vlan->reserved = 0;
|
2013-07-31 04:16:25 +08:00
|
|
|
|
|
|
|
tt_vlan++;
|
|
|
|
}
|
|
|
|
|
2015-05-27 00:34:26 +08:00
|
|
|
tt_change_ptr = (u8 *)*tt_data + change_offset;
|
2013-07-31 04:16:25 +08:00
|
|
|
*tt_change = (struct batadv_tvlv_tt_change *)tt_change_ptr;
|
|
|
|
|
|
|
|
out:
|
2018-05-10 03:07:40 +08:00
|
|
|
spin_unlock_bh(&bat_priv->softif_vlan_list_lock);
|
2013-07-31 04:16:25 +08:00
|
|
|
return tvlv_len;
|
|
|
|
}
|
|
|
|
|
2013-04-23 21:40:01 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_tvlv_container_update() - update the translation table tvlv
|
|
|
|
* container after local tt changes have been committed
|
2013-04-23 21:40:01 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
*/
|
|
|
|
static void batadv_tt_tvlv_container_update(struct batadv_priv *bat_priv)
|
2012-05-07 04:22:05 +08:00
|
|
|
{
|
2013-04-23 21:40:01 +08:00
|
|
|
struct batadv_tt_change_node *entry, *safe;
|
|
|
|
struct batadv_tvlv_tt_data *tt_data;
|
|
|
|
struct batadv_tvlv_tt_change *tt_change;
|
2013-07-31 04:16:25 +08:00
|
|
|
int tt_diff_len, tt_change_len = 0;
|
2015-06-10 02:50:49 +08:00
|
|
|
int tt_diff_entries_num = 0;
|
|
|
|
int tt_diff_entries_count = 0;
|
2015-05-27 00:34:26 +08:00
|
|
|
u16 tvlv_len;
|
2012-05-07 04:22:05 +08:00
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
tt_diff_entries_num = atomic_read(&bat_priv->tt.local_changes);
|
|
|
|
tt_diff_len = batadv_tt_len(tt_diff_entries_num);
|
2012-05-07 04:22:05 +08:00
|
|
|
|
|
|
|
/* if we have too many changes for one packet don't send any
|
|
|
|
* and wait for the tt table request which will be fragmented
|
|
|
|
*/
|
2013-04-23 21:40:01 +08:00
|
|
|
if (tt_diff_len > bat_priv->soft_iface->mtu)
|
|
|
|
tt_diff_len = 0;
|
2012-05-07 04:22:05 +08:00
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv, &tt_data,
|
|
|
|
&tt_change, &tt_diff_len);
|
|
|
|
if (!tvlv_len)
|
2013-04-23 21:40:01 +08:00
|
|
|
return;
|
2012-05-07 04:22:05 +08:00
|
|
|
|
2013-04-23 21:40:01 +08:00
|
|
|
tt_data->flags = BATADV_TT_OGM_DIFF;
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2013-04-23 21:40:01 +08:00
|
|
|
if (tt_diff_len == 0)
|
|
|
|
goto container_register;
|
2012-05-07 04:22:05 +08:00
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_lock_bh(&bat_priv->tt.changes_list_lock);
|
|
|
|
atomic_set(&bat_priv->tt.local_changes, 0);
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
|
2012-02-28 17:55:36 +08:00
|
|
|
list) {
|
2013-04-23 21:40:01 +08:00
|
|
|
if (tt_diff_entries_count < tt_diff_entries_num) {
|
|
|
|
memcpy(tt_change + tt_diff_entries_count,
|
|
|
|
&entry->change,
|
|
|
|
sizeof(struct batadv_tvlv_tt_change));
|
|
|
|
tt_diff_entries_count++;
|
2010-12-13 19:19:28 +08:00
|
|
|
}
|
2011-04-27 20:27:44 +08:00
|
|
|
list_del(&entry->list);
|
2016-06-25 22:44:06 +08:00
|
|
|
kmem_cache_free(batadv_tt_change_cache, entry);
|
2010-12-13 19:19:28 +08:00
|
|
|
}
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_unlock_bh(&bat_priv->tt.changes_list_lock);
|
2011-04-27 20:27:44 +08:00
|
|
|
|
|
|
|
/* Keep the buffer for possible tt_request */
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_lock_bh(&bat_priv->tt.last_changeset_lock);
|
|
|
|
kfree(bat_priv->tt.last_changeset);
|
|
|
|
bat_priv->tt.last_changeset_len = 0;
|
|
|
|
bat_priv->tt.last_changeset = NULL;
|
2013-04-23 21:40:01 +08:00
|
|
|
tt_change_len = batadv_tt_len(tt_diff_entries_count);
|
2012-05-07 04:22:05 +08:00
|
|
|
/* check whether this new OGM has no changes due to size problems */
|
2013-04-23 21:40:01 +08:00
|
|
|
if (tt_diff_entries_count > 0) {
|
2012-05-07 04:22:05 +08:00
|
|
|
/* if kmalloc() fails we will reply with the full table
|
2011-04-27 20:27:44 +08:00
|
|
|
* instead of providing the diff
|
|
|
|
*/
|
2013-04-23 21:40:01 +08:00
|
|
|
bat_priv->tt.last_changeset = kzalloc(tt_diff_len, GFP_ATOMIC);
|
2012-07-16 04:26:51 +08:00
|
|
|
if (bat_priv->tt.last_changeset) {
|
2013-04-23 21:40:01 +08:00
|
|
|
memcpy(bat_priv->tt.last_changeset,
|
|
|
|
tt_change, tt_change_len);
|
|
|
|
bat_priv->tt.last_changeset_len = tt_diff_len;
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
}
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2013-04-23 21:40:01 +08:00
|
|
|
container_register:
|
|
|
|
batadv_tvlv_container_register(bat_priv, BATADV_TVLV_TT, 1, tt_data,
|
2013-07-31 04:16:25 +08:00
|
|
|
tvlv_len);
|
2013-04-23 21:40:01 +08:00
|
|
|
kfree(tt_data);
|
2010-12-13 19:19:28 +08:00
|
|
|
}
|
|
|
|
|
2016-07-03 19:31:37 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_dump_entry() - Dump one TT local entry into a message
|
2016-07-03 19:31:37 +08:00
|
|
|
* @msg :Netlink message to dump into
|
|
|
|
* @portid: Port making netlink request
|
2018-10-31 05:01:29 +08:00
|
|
|
* @cb: Control block containing additional options
|
2016-07-03 19:31:37 +08:00
|
|
|
* @bat_priv: The bat priv with all the soft interface information
|
|
|
|
* @common: tt local & tt global common data
|
|
|
|
*
|
|
|
|
* Return: Error code, or 0 on success
|
|
|
|
*/
|
|
|
|
static int
|
2018-10-31 05:01:29 +08:00
|
|
|
batadv_tt_local_dump_entry(struct sk_buff *msg, u32 portid,
|
|
|
|
struct netlink_callback *cb,
|
2016-07-03 19:31:37 +08:00
|
|
|
struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_tt_common_entry *common)
|
|
|
|
{
|
|
|
|
void *hdr;
|
|
|
|
struct batadv_softif_vlan *vlan;
|
|
|
|
struct batadv_tt_local_entry *local;
|
|
|
|
unsigned int last_seen_msecs;
|
|
|
|
u32 crc;
|
|
|
|
|
|
|
|
local = container_of(common, struct batadv_tt_local_entry, common);
|
|
|
|
last_seen_msecs = jiffies_to_msecs(jiffies - local->last_seen);
|
|
|
|
|
|
|
|
vlan = batadv_softif_vlan_get(bat_priv, common->vid);
|
|
|
|
if (!vlan)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
crc = vlan->tt.crc;
|
|
|
|
|
|
|
|
batadv_softif_vlan_put(vlan);
|
|
|
|
|
2018-10-31 05:01:29 +08:00
|
|
|
hdr = genlmsg_put(msg, portid, cb->nlh->nlmsg_seq,
|
|
|
|
&batadv_netlink_family, NLM_F_MULTI,
|
2016-07-03 19:31:37 +08:00
|
|
|
BATADV_CMD_GET_TRANSTABLE_LOCAL);
|
|
|
|
if (!hdr)
|
|
|
|
return -ENOBUFS;
|
|
|
|
|
2018-10-31 05:01:29 +08:00
|
|
|
genl_dump_check_consistent(cb, hdr);
|
|
|
|
|
2016-07-03 19:31:37 +08:00
|
|
|
if (nla_put(msg, BATADV_ATTR_TT_ADDRESS, ETH_ALEN, common->addr) ||
|
|
|
|
nla_put_u32(msg, BATADV_ATTR_TT_CRC32, crc) ||
|
|
|
|
nla_put_u16(msg, BATADV_ATTR_TT_VID, common->vid) ||
|
|
|
|
nla_put_u32(msg, BATADV_ATTR_TT_FLAGS, common->flags))
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
if (!(common->flags & BATADV_TT_CLIENT_NOPURGE) &&
|
|
|
|
nla_put_u32(msg, BATADV_ATTR_LAST_SEEN_MSECS, last_seen_msecs))
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
genlmsg_end(msg, hdr);
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
genlmsg_cancel(msg, hdr);
|
|
|
|
return -EMSGSIZE;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_dump_bucket() - Dump one TT local bucket into a message
|
2016-07-03 19:31:37 +08:00
|
|
|
* @msg: Netlink message to dump into
|
|
|
|
* @portid: Port making netlink request
|
2018-10-31 05:01:29 +08:00
|
|
|
* @cb: Control block containing additional options
|
2016-07-03 19:31:37 +08:00
|
|
|
* @bat_priv: The bat priv with all the soft interface information
|
2018-10-31 05:01:29 +08:00
|
|
|
* @hash: hash to dump
|
|
|
|
* @bucket: bucket index to dump
|
2016-07-03 19:31:37 +08:00
|
|
|
* @idx_s: Number of entries to skip
|
|
|
|
*
|
|
|
|
* Return: Error code, or 0 on success
|
|
|
|
*/
|
|
|
|
static int
|
2018-10-31 05:01:29 +08:00
|
|
|
batadv_tt_local_dump_bucket(struct sk_buff *msg, u32 portid,
|
|
|
|
struct netlink_callback *cb,
|
2016-07-03 19:31:37 +08:00
|
|
|
struct batadv_priv *bat_priv,
|
2018-10-31 05:01:29 +08:00
|
|
|
struct batadv_hashtable *hash, unsigned int bucket,
|
|
|
|
int *idx_s)
|
2016-07-03 19:31:37 +08:00
|
|
|
{
|
|
|
|
struct batadv_tt_common_entry *common;
|
|
|
|
int idx = 0;
|
|
|
|
|
2018-10-31 05:01:29 +08:00
|
|
|
spin_lock_bh(&hash->list_locks[bucket]);
|
|
|
|
cb->seq = atomic_read(&hash->generation) << 1 | 1;
|
|
|
|
|
|
|
|
hlist_for_each_entry(common, &hash->table[bucket], hash_entry) {
|
2016-07-03 19:31:37 +08:00
|
|
|
if (idx++ < *idx_s)
|
|
|
|
continue;
|
|
|
|
|
2018-10-31 05:01:29 +08:00
|
|
|
if (batadv_tt_local_dump_entry(msg, portid, cb, bat_priv,
|
2016-07-03 19:31:37 +08:00
|
|
|
common)) {
|
2018-10-31 05:01:29 +08:00
|
|
|
spin_unlock_bh(&hash->list_locks[bucket]);
|
2016-07-03 19:31:37 +08:00
|
|
|
*idx_s = idx - 1;
|
|
|
|
return -EMSGSIZE;
|
|
|
|
}
|
|
|
|
}
|
2018-10-31 05:01:29 +08:00
|
|
|
spin_unlock_bh(&hash->list_locks[bucket]);
|
2016-07-03 19:31:37 +08:00
|
|
|
|
|
|
|
*idx_s = 0;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_dump() - Dump TT local entries into a message
|
2016-07-03 19:31:37 +08:00
|
|
|
* @msg: Netlink message to dump into
|
|
|
|
* @cb: Parameters from query
|
|
|
|
*
|
|
|
|
* Return: Error code, or 0 on success
|
|
|
|
*/
|
|
|
|
int batadv_tt_local_dump(struct sk_buff *msg, struct netlink_callback *cb)
|
|
|
|
{
|
|
|
|
struct net *net = sock_net(cb->skb->sk);
|
|
|
|
struct net_device *soft_iface;
|
|
|
|
struct batadv_priv *bat_priv;
|
|
|
|
struct batadv_hard_iface *primary_if = NULL;
|
|
|
|
struct batadv_hashtable *hash;
|
|
|
|
int ret;
|
|
|
|
int ifindex;
|
|
|
|
int bucket = cb->args[0];
|
|
|
|
int idx = cb->args[1];
|
|
|
|
int portid = NETLINK_CB(cb->skb).portid;
|
|
|
|
|
|
|
|
ifindex = batadv_netlink_get_ifindex(cb->nlh, BATADV_ATTR_MESH_IFINDEX);
|
|
|
|
if (!ifindex)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
soft_iface = dev_get_by_index(net, ifindex);
|
|
|
|
if (!soft_iface || !batadv_softif_is_valid(soft_iface)) {
|
|
|
|
ret = -ENODEV;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
bat_priv = netdev_priv(soft_iface);
|
|
|
|
|
|
|
|
primary_if = batadv_primary_if_get_selected(bat_priv);
|
|
|
|
if (!primary_if || primary_if->if_status != BATADV_IF_ACTIVE) {
|
|
|
|
ret = -ENOENT;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
hash = bat_priv->tt.local_hash;
|
|
|
|
|
|
|
|
while (bucket < hash->size) {
|
2018-10-31 05:01:29 +08:00
|
|
|
if (batadv_tt_local_dump_bucket(msg, portid, cb, bat_priv,
|
|
|
|
hash, bucket, &idx))
|
2016-07-03 19:31:37 +08:00
|
|
|
break;
|
|
|
|
|
|
|
|
bucket++;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = msg->len;
|
|
|
|
|
|
|
|
out:
|
2021-08-09 01:11:08 +08:00
|
|
|
batadv_hardif_put(primary_if);
|
2021-08-05 19:55:27 +08:00
|
|
|
dev_put(soft_iface);
|
2016-07-03 19:31:37 +08:00
|
|
|
|
|
|
|
cb->args[0] = bucket;
|
|
|
|
cb->args[1] = idx;
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2012-06-06 04:31:31 +08:00
|
|
|
static void
|
|
|
|
batadv_tt_local_set_pending(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_tt_local_entry *tt_local_entry,
|
2015-05-27 00:34:26 +08:00
|
|
|
u16 flags, const char *message)
|
2010-12-13 19:19:28 +08:00
|
|
|
{
|
2013-04-03 17:15:33 +08:00
|
|
|
batadv_tt_local_event(bat_priv, tt_local_entry, flags);
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2011-07-09 23:52:13 +08:00
|
|
|
/* The local client has to be marked as "pending to be removed" but has
|
|
|
|
* to be kept in the table in order to send it in a full table
|
2012-05-12 08:09:43 +08:00
|
|
|
* response issued before the net ttvn increment (consistency check)
|
|
|
|
*/
|
2012-06-04 04:19:21 +08:00
|
|
|
tt_local_entry->common.flags |= BATADV_TT_CLIENT_PENDING;
|
2012-01-07 04:31:34 +08:00
|
|
|
|
2012-06-04 04:19:22 +08:00
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv,
|
2013-06-04 18:11:41 +08:00
|
|
|
"Local tt entry (%pM, vid: %d) pending to be removed: %s\n",
|
|
|
|
tt_local_entry->common.addr,
|
2017-02-23 00:16:42 +08:00
|
|
|
batadv_print_vid(tt_local_entry->common.vid), message);
|
2010-12-13 19:19:28 +08:00
|
|
|
}
|
|
|
|
|
2012-08-27 17:44:43 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_remove() - logically remove an entry from the local table
|
2012-08-27 17:44:43 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @addr: the MAC address of the client to remove
|
2013-06-04 18:11:39 +08:00
|
|
|
* @vid: VLAN identifier
|
2012-08-27 17:44:43 +08:00
|
|
|
* @message: message to append to the log on deletion
|
|
|
|
* @roaming: true if the deletion is due to a roaming event
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: the flags assigned to the local entry before being deleted
|
2012-08-27 17:44:43 +08:00
|
|
|
*/
|
2015-05-27 00:34:26 +08:00
|
|
|
u16 batadv_tt_local_remove(struct batadv_priv *bat_priv, const u8 *addr,
|
|
|
|
unsigned short vid, const char *message,
|
|
|
|
bool roaming)
|
2010-12-13 19:19:28 +08:00
|
|
|
{
|
2019-02-23 21:27:10 +08:00
|
|
|
struct batadv_tt_local_entry *tt_removed_entry;
|
2012-10-07 18:02:22 +08:00
|
|
|
struct batadv_tt_local_entry *tt_local_entry;
|
2015-05-27 00:34:26 +08:00
|
|
|
u16 flags, curr_flags = BATADV_NO_FLAGS;
|
2019-02-23 21:27:10 +08:00
|
|
|
struct hlist_node *tt_removed_node;
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2013-06-04 18:11:39 +08:00
|
|
|
tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
|
2011-04-27 20:28:07 +08:00
|
|
|
if (!tt_local_entry)
|
|
|
|
goto out;
|
|
|
|
|
2012-08-27 17:44:43 +08:00
|
|
|
curr_flags = tt_local_entry->common.flags;
|
|
|
|
|
2012-06-04 04:19:21 +08:00
|
|
|
flags = BATADV_TT_CLIENT_DEL;
|
2012-09-24 04:38:37 +08:00
|
|
|
/* if this global entry addition is due to a roaming, the node has to
|
|
|
|
* mark the local entry as "roamed" in order to correctly reroute
|
|
|
|
* packets later
|
|
|
|
*/
|
2012-09-24 04:38:34 +08:00
|
|
|
if (roaming) {
|
2012-06-04 04:19:21 +08:00
|
|
|
flags |= BATADV_TT_CLIENT_ROAM;
|
2012-09-24 04:38:34 +08:00
|
|
|
/* mark the local client as ROAMed */
|
|
|
|
tt_local_entry->common.flags |= BATADV_TT_CLIENT_ROAM;
|
|
|
|
}
|
2012-06-04 04:19:17 +08:00
|
|
|
|
2012-09-24 04:38:37 +08:00
|
|
|
if (!(tt_local_entry->common.flags & BATADV_TT_CLIENT_NEW)) {
|
|
|
|
batadv_tt_local_set_pending(bat_priv, tt_local_entry, flags,
|
|
|
|
message);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
/* if this client has been added right now, it is possible to
|
|
|
|
* immediately purge it
|
|
|
|
*/
|
2013-04-03 17:15:33 +08:00
|
|
|
batadv_tt_local_event(bat_priv, tt_local_entry, BATADV_TT_CLIENT_DEL);
|
2015-06-17 20:01:36 +08:00
|
|
|
|
2019-02-23 21:27:10 +08:00
|
|
|
tt_removed_node = batadv_hash_remove(bat_priv->tt.local_hash,
|
2015-06-17 20:01:36 +08:00
|
|
|
batadv_compare_tt,
|
|
|
|
batadv_choose_tt,
|
|
|
|
&tt_local_entry->common);
|
2019-02-23 21:27:10 +08:00
|
|
|
if (!tt_removed_node)
|
2015-06-17 20:01:36 +08:00
|
|
|
goto out;
|
|
|
|
|
2019-02-23 21:27:10 +08:00
|
|
|
/* drop reference of remove hash entry */
|
|
|
|
tt_removed_entry = hlist_entry(tt_removed_node,
|
|
|
|
struct batadv_tt_local_entry,
|
|
|
|
common.hash_entry);
|
|
|
|
batadv_tt_local_entry_put(tt_removed_entry);
|
2012-08-27 17:44:43 +08:00
|
|
|
|
2011-04-27 20:28:07 +08:00
|
|
|
out:
|
2021-08-09 01:11:08 +08:00
|
|
|
batadv_tt_local_entry_put(tt_local_entry);
|
2012-08-27 17:44:43 +08:00
|
|
|
|
|
|
|
return curr_flags;
|
2010-12-13 19:19:28 +08:00
|
|
|
}
|
|
|
|
|
2013-05-27 15:33:25 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_purge_list() - purge inactive tt local entries
|
2013-05-27 15:33:25 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @head: pointer to the list containing the local tt entries
|
|
|
|
* @timeout: parameter deciding whether a given tt local entry is considered
|
|
|
|
* inactive or not
|
|
|
|
*/
|
2012-06-06 04:31:31 +08:00
|
|
|
static void batadv_tt_local_purge_list(struct batadv_priv *bat_priv,
|
2013-05-27 15:33:25 +08:00
|
|
|
struct hlist_head *head,
|
|
|
|
int timeout)
|
2010-12-13 19:19:28 +08:00
|
|
|
{
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_local_entry *tt_local_entry;
|
|
|
|
struct batadv_tt_common_entry *tt_common_entry;
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
struct hlist_node *node_tmp;
|
2012-06-04 04:19:21 +08:00
|
|
|
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_safe(tt_common_entry, node_tmp, head,
|
2012-06-04 04:19:21 +08:00
|
|
|
hash_entry) {
|
|
|
|
tt_local_entry = container_of(tt_common_entry,
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_local_entry,
|
|
|
|
common);
|
2012-06-04 04:19:21 +08:00
|
|
|
if (tt_local_entry->common.flags & BATADV_TT_CLIENT_NOPURGE)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
/* entry already marked for deletion */
|
|
|
|
if (tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING)
|
|
|
|
continue;
|
|
|
|
|
2013-05-27 15:33:25 +08:00
|
|
|
if (!batadv_has_timed_out(tt_local_entry->last_seen, timeout))
|
2012-06-04 04:19:21 +08:00
|
|
|
continue;
|
|
|
|
|
|
|
|
batadv_tt_local_set_pending(bat_priv, tt_local_entry,
|
|
|
|
BATADV_TT_CLIENT_DEL, "timed out");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-05-27 15:33:25 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_purge() - purge inactive tt local entries
|
2013-05-27 15:33:25 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @timeout: parameter deciding whether a given tt local entry is considered
|
|
|
|
* inactive or not
|
|
|
|
*/
|
|
|
|
static void batadv_tt_local_purge(struct batadv_priv *bat_priv,
|
|
|
|
int timeout)
|
2012-06-04 04:19:21 +08:00
|
|
|
{
|
2012-07-16 04:26:51 +08:00
|
|
|
struct batadv_hashtable *hash = bat_priv->tt.local_hash;
|
2010-12-13 19:19:28 +08:00
|
|
|
struct hlist_head *head;
|
2011-04-27 20:28:07 +08:00
|
|
|
spinlock_t *list_lock; /* protects write access to the hash lists */
|
2015-05-27 00:34:26 +08:00
|
|
|
u32 i;
|
2010-12-13 19:19:28 +08:00
|
|
|
|
|
|
|
for (i = 0; i < hash->size; i++) {
|
|
|
|
head = &hash->table[i];
|
2011-04-27 20:28:07 +08:00
|
|
|
list_lock = &hash->list_locks[i];
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2011-04-27 20:28:07 +08:00
|
|
|
spin_lock_bh(list_lock);
|
2013-05-27 15:33:25 +08:00
|
|
|
batadv_tt_local_purge_list(bat_priv, head, timeout);
|
2011-04-27 20:28:07 +08:00
|
|
|
spin_unlock_bh(list_lock);
|
2010-12-13 19:19:28 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-06-06 04:31:31 +08:00
|
|
|
static void batadv_tt_local_table_free(struct batadv_priv *bat_priv)
|
2010-12-13 19:19:28 +08:00
|
|
|
{
|
2012-06-06 04:31:28 +08:00
|
|
|
struct batadv_hashtable *hash;
|
2011-04-27 20:27:44 +08:00
|
|
|
spinlock_t *list_lock; /* protects write access to the hash lists */
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_common_entry *tt_common_entry;
|
|
|
|
struct batadv_tt_local_entry *tt_local;
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
struct hlist_node *node_tmp;
|
2011-04-27 20:28:07 +08:00
|
|
|
struct hlist_head *head;
|
2015-05-27 00:34:26 +08:00
|
|
|
u32 i;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
if (!bat_priv->tt.local_hash)
|
2010-12-13 19:19:28 +08:00
|
|
|
return;
|
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
hash = bat_priv->tt.local_hash;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
|
|
|
for (i = 0; i < hash->size; i++) {
|
|
|
|
head = &hash->table[i];
|
|
|
|
list_lock = &hash->list_locks[i];
|
|
|
|
|
|
|
|
spin_lock_bh(list_lock);
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_safe(tt_common_entry, node_tmp,
|
2011-04-27 20:27:44 +08:00
|
|
|
head, hash_entry) {
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_del_rcu(&tt_common_entry->hash_entry);
|
2012-06-06 04:31:31 +08:00
|
|
|
tt_local = container_of(tt_common_entry,
|
|
|
|
struct batadv_tt_local_entry,
|
|
|
|
common);
|
2014-05-08 23:13:15 +08:00
|
|
|
|
2016-01-17 18:01:25 +08:00
|
|
|
batadv_tt_local_entry_put(tt_local);
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
spin_unlock_bh(list_lock);
|
|
|
|
}
|
|
|
|
|
2012-05-12 08:09:32 +08:00
|
|
|
batadv_hash_destroy(hash);
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
bat_priv->tt.local_hash = NULL;
|
2010-12-13 19:19:28 +08:00
|
|
|
}
|
|
|
|
|
2012-06-06 04:31:31 +08:00
|
|
|
static int batadv_tt_global_init(struct batadv_priv *bat_priv)
|
2010-12-13 19:19:28 +08:00
|
|
|
{
|
2012-07-16 04:26:51 +08:00
|
|
|
if (bat_priv->tt.global_hash)
|
2012-05-05 19:27:28 +08:00
|
|
|
return 0;
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
bat_priv->tt.global_hash = batadv_hash_new(1024);
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
if (!bat_priv->tt.global_hash)
|
2012-05-05 19:27:28 +08:00
|
|
|
return -ENOMEM;
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2012-11-10 18:00:32 +08:00
|
|
|
batadv_hash_set_lock_class(bat_priv->tt.global_hash,
|
|
|
|
&batadv_tt_global_hash_lock_class_key);
|
|
|
|
|
2012-05-05 19:27:28 +08:00
|
|
|
return 0;
|
2010-12-13 19:19:28 +08:00
|
|
|
}
|
|
|
|
|
2012-06-06 04:31:31 +08:00
|
|
|
static void batadv_tt_changes_list_free(struct batadv_priv *bat_priv)
|
2010-12-13 19:19:28 +08:00
|
|
|
{
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_change_node *entry, *safe;
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_lock_bh(&bat_priv->tt.changes_list_lock);
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
list_for_each_entry_safe(entry, safe, &bat_priv->tt.changes_list,
|
2011-04-27 20:27:44 +08:00
|
|
|
list) {
|
|
|
|
list_del(&entry->list);
|
2016-06-25 22:44:06 +08:00
|
|
|
kmem_cache_free(batadv_tt_change_cache, entry);
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
atomic_set(&bat_priv->tt.local_changes, 0);
|
|
|
|
spin_unlock_bh(&bat_priv->tt.changes_list_lock);
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2015-09-16 01:00:48 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_orig_entry_find() - find a TT orig_list_entry
|
2015-11-17 16:40:52 +08:00
|
|
|
* @entry: the TT global entry where the orig_list_entry has to be
|
|
|
|
* extracted from
|
|
|
|
* @orig_node: the originator for which the orig_list_entry has to be found
|
2015-09-16 01:00:48 +08:00
|
|
|
*
|
2015-11-17 16:40:52 +08:00
|
|
|
* retrieve the orig_tt_list_entry belonging to orig_node from the
|
2012-07-01 20:09:12 +08:00
|
|
|
* batadv_tt_global_entry list
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: it with an increased refcounter, NULL if not found
|
2011-10-23 02:12:51 +08:00
|
|
|
*/
|
2012-07-01 20:09:12 +08:00
|
|
|
static struct batadv_tt_orig_list_entry *
|
|
|
|
batadv_tt_global_orig_entry_find(const struct batadv_tt_global_entry *entry,
|
|
|
|
const struct batadv_orig_node *orig_node)
|
2011-10-23 02:12:51 +08:00
|
|
|
{
|
2012-07-01 20:09:12 +08:00
|
|
|
struct batadv_tt_orig_list_entry *tmp_orig_entry, *orig_entry = NULL;
|
2011-10-23 02:12:51 +08:00
|
|
|
const struct hlist_head *head;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
head = &entry->orig_list;
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_rcu(tmp_orig_entry, head, list) {
|
2012-07-01 20:09:12 +08:00
|
|
|
if (tmp_orig_entry->orig_node != orig_node)
|
|
|
|
continue;
|
2016-01-16 17:29:50 +08:00
|
|
|
if (!kref_get_unless_zero(&tmp_orig_entry->refcount))
|
2012-07-01 20:09:12 +08:00
|
|
|
continue;
|
|
|
|
|
|
|
|
orig_entry = tmp_orig_entry;
|
|
|
|
break;
|
2011-10-23 02:12:51 +08:00
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
2012-07-01 20:09:12 +08:00
|
|
|
|
|
|
|
return orig_entry;
|
|
|
|
}
|
|
|
|
|
2015-09-16 01:00:48 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_entry_has_orig() - check if a TT global entry is also
|
|
|
|
* handled by a given originator
|
2015-11-17 16:40:52 +08:00
|
|
|
* @entry: the TT global entry to check
|
|
|
|
* @orig_node: the originator to search in the list
|
2018-05-11 01:44:28 +08:00
|
|
|
* @flags: a pointer to store TT flags for the given @entry received
|
|
|
|
* from @orig_node
|
2015-09-16 01:00:48 +08:00
|
|
|
*
|
|
|
|
* find out if an orig_node is already in the list of a tt_global_entry.
|
|
|
|
*
|
|
|
|
* Return: true if found, false otherwise
|
2012-07-01 20:09:12 +08:00
|
|
|
*/
|
|
|
|
static bool
|
|
|
|
batadv_tt_global_entry_has_orig(const struct batadv_tt_global_entry *entry,
|
2018-05-11 01:44:28 +08:00
|
|
|
const struct batadv_orig_node *orig_node,
|
|
|
|
u8 *flags)
|
2012-07-01 20:09:12 +08:00
|
|
|
{
|
|
|
|
struct batadv_tt_orig_list_entry *orig_entry;
|
|
|
|
bool found = false;
|
|
|
|
|
|
|
|
orig_entry = batadv_tt_global_orig_entry_find(entry, orig_node);
|
|
|
|
if (orig_entry) {
|
|
|
|
found = true;
|
2018-05-11 01:44:28 +08:00
|
|
|
|
|
|
|
if (flags)
|
|
|
|
*flags = orig_entry->flags;
|
|
|
|
|
2016-01-17 18:01:27 +08:00
|
|
|
batadv_tt_orig_list_entry_put(orig_entry);
|
2012-07-01 20:09:12 +08:00
|
|
|
}
|
|
|
|
|
2011-10-23 02:12:51 +08:00
|
|
|
return found;
|
|
|
|
}
|
|
|
|
|
2017-07-06 13:02:25 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_sync_flags() - update TT sync flags
|
2017-07-06 13:02:25 +08:00
|
|
|
* @tt_global: the TT global entry to update sync flags in
|
|
|
|
*
|
|
|
|
* Updates the sync flag bits in the tt_global flag attribute with a logical
|
|
|
|
* OR of all sync flags from any of its TT orig entries.
|
|
|
|
*/
|
|
|
|
static void
|
|
|
|
batadv_tt_global_sync_flags(struct batadv_tt_global_entry *tt_global)
|
|
|
|
{
|
|
|
|
struct batadv_tt_orig_list_entry *orig_entry;
|
|
|
|
const struct hlist_head *head;
|
|
|
|
u16 flags = BATADV_NO_FLAGS;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
head = &tt_global->orig_list;
|
|
|
|
hlist_for_each_entry_rcu(orig_entry, head, list)
|
|
|
|
flags |= orig_entry->flags;
|
|
|
|
rcu_read_unlock();
|
|
|
|
|
|
|
|
flags |= tt_global->common.flags & (~BATADV_TT_SYNC_MASK);
|
|
|
|
tt_global->common.flags = flags;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_orig_entry_add() - add or update a TT orig entry
|
2017-07-06 13:02:25 +08:00
|
|
|
* @tt_global: the TT global entry to add an orig entry in
|
|
|
|
* @orig_node: the originator to add an orig entry for
|
|
|
|
* @ttvn: translation table version number of this changeset
|
|
|
|
* @flags: TT sync flags
|
|
|
|
*/
|
2012-05-17 02:23:16 +08:00
|
|
|
static void
|
2012-07-01 20:09:12 +08:00
|
|
|
batadv_tt_global_orig_entry_add(struct batadv_tt_global_entry *tt_global,
|
2017-07-06 13:02:25 +08:00
|
|
|
struct batadv_orig_node *orig_node, int ttvn,
|
|
|
|
u8 flags)
|
2011-10-23 02:12:51 +08:00
|
|
|
{
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_orig_list_entry *orig_entry;
|
2011-10-23 02:12:51 +08:00
|
|
|
|
2018-08-13 03:04:44 +08:00
|
|
|
spin_lock_bh(&tt_global->list_lock);
|
|
|
|
|
2012-07-01 20:09:12 +08:00
|
|
|
orig_entry = batadv_tt_global_orig_entry_find(tt_global, orig_node);
|
2012-07-06 05:38:29 +08:00
|
|
|
if (orig_entry) {
|
|
|
|
/* refresh the ttvn: the current value could be a bogus one that
|
|
|
|
* was added during a "temporary client detection"
|
|
|
|
*/
|
|
|
|
orig_entry->ttvn = ttvn;
|
2017-07-06 13:02:25 +08:00
|
|
|
orig_entry->flags = flags;
|
|
|
|
goto sync_flags;
|
2012-07-06 05:38:29 +08:00
|
|
|
}
|
2012-07-01 20:09:12 +08:00
|
|
|
|
2016-06-25 22:44:06 +08:00
|
|
|
orig_entry = kmem_cache_zalloc(batadv_tt_orig_cache, GFP_ATOMIC);
|
2011-10-23 02:12:51 +08:00
|
|
|
if (!orig_entry)
|
2012-07-01 20:09:12 +08:00
|
|
|
goto out;
|
2011-10-23 02:12:51 +08:00
|
|
|
|
|
|
|
INIT_HLIST_NODE(&orig_entry->list);
|
2016-01-16 17:29:56 +08:00
|
|
|
kref_get(&orig_node->refcount);
|
2013-07-31 04:16:25 +08:00
|
|
|
batadv_tt_global_size_inc(orig_node, tt_global->common.vid);
|
2011-10-23 02:12:51 +08:00
|
|
|
orig_entry->orig_node = orig_node;
|
|
|
|
orig_entry->ttvn = ttvn;
|
2017-07-06 13:02:25 +08:00
|
|
|
orig_entry->flags = flags;
|
2016-01-16 17:29:50 +08:00
|
|
|
kref_init(&orig_entry->refcount);
|
2011-10-23 02:12:51 +08:00
|
|
|
|
2016-07-15 23:39:18 +08:00
|
|
|
kref_get(&orig_entry->refcount);
|
2011-10-23 02:12:51 +08:00
|
|
|
hlist_add_head_rcu(&orig_entry->list,
|
2012-07-01 20:09:12 +08:00
|
|
|
&tt_global->orig_list);
|
2014-02-16 00:47:52 +08:00
|
|
|
atomic_inc(&tt_global->orig_list_count);
|
|
|
|
|
2017-07-06 13:02:25 +08:00
|
|
|
sync_flags:
|
|
|
|
batadv_tt_global_sync_flags(tt_global);
|
2012-07-01 20:09:12 +08:00
|
|
|
out:
|
2021-08-09 01:11:08 +08:00
|
|
|
batadv_tt_orig_list_entry_put(orig_entry);
|
2018-08-13 03:04:44 +08:00
|
|
|
|
|
|
|
spin_unlock_bh(&tt_global->list_lock);
|
2011-10-23 02:12:51 +08:00
|
|
|
}
|
|
|
|
|
2013-04-18 21:13:01 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_add() - add a new TT global entry or update an existing one
|
2013-04-18 21:13:01 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @orig_node: the originator announcing the client
|
|
|
|
* @tt_addr: the mac address of the non-mesh client
|
2013-06-04 18:11:39 +08:00
|
|
|
* @vid: VLAN identifier
|
2013-04-18 21:13:01 +08:00
|
|
|
* @flags: TT flags that have to be set for this non-mesh client
|
|
|
|
* @ttvn: the tt version number ever announcing this non-mesh client
|
|
|
|
*
|
|
|
|
* Add a new TT global entry for the given originator. If the entry already
|
|
|
|
* exists add a new reference to the given originator (a global entry can have
|
|
|
|
* references to multiple originators) and adjust the flags attribute to reflect
|
|
|
|
* the function argument.
|
|
|
|
* If a TT local entry exists for this non-mesh client remove it.
|
|
|
|
*
|
2020-06-02 02:13:21 +08:00
|
|
|
* The caller must hold the orig_node refcount.
|
2013-05-06 01:32:38 +08:00
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: true if the new entry has been added, false otherwise
|
2013-04-18 21:13:01 +08:00
|
|
|
*/
|
2013-05-06 01:32:38 +08:00
|
|
|
static bool batadv_tt_global_add(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_orig_node *orig_node,
|
2013-06-04 18:11:39 +08:00
|
|
|
const unsigned char *tt_addr,
|
2015-05-27 00:34:26 +08:00
|
|
|
unsigned short vid, u16 flags, u8 ttvn)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
2012-10-07 18:02:22 +08:00
|
|
|
struct batadv_tt_global_entry *tt_global_entry;
|
|
|
|
struct batadv_tt_local_entry *tt_local_entry;
|
2013-05-06 01:32:38 +08:00
|
|
|
bool ret = false;
|
2011-11-03 03:26:45 +08:00
|
|
|
int hash_added;
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_common_entry *common;
|
2015-05-27 00:34:26 +08:00
|
|
|
u16 local_flags;
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2013-08-08 00:28:56 +08:00
|
|
|
/* ignore global entries from backbone nodes */
|
|
|
|
if (batadv_bla_is_backbone_gw_orig(bat_priv, orig_node->orig, vid))
|
|
|
|
return true;
|
|
|
|
|
2013-06-04 18:11:39 +08:00
|
|
|
tt_global_entry = batadv_tt_global_hash_find(bat_priv, tt_addr, vid);
|
|
|
|
tt_local_entry = batadv_tt_local_hash_find(bat_priv, tt_addr, vid);
|
2012-09-24 04:38:37 +08:00
|
|
|
|
|
|
|
/* if the node already has a local client for this entry, it has to wait
|
|
|
|
* for a roaming advertisement instead of manually messing up the global
|
|
|
|
* table
|
|
|
|
*/
|
|
|
|
if ((flags & BATADV_TT_CLIENT_TEMP) && tt_local_entry &&
|
|
|
|
!(tt_local_entry->common.flags & BATADV_TT_CLIENT_NEW))
|
|
|
|
goto out;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
|
|
|
if (!tt_global_entry) {
|
2016-06-25 22:44:06 +08:00
|
|
|
tt_global_entry = kmem_cache_zalloc(batadv_tg_cache,
|
|
|
|
GFP_ATOMIC);
|
2011-04-27 20:27:44 +08:00
|
|
|
if (!tt_global_entry)
|
2011-04-27 20:28:07 +08:00
|
|
|
goto out;
|
|
|
|
|
2012-05-12 19:48:55 +08:00
|
|
|
common = &tt_global_entry->common;
|
2014-01-22 07:42:11 +08:00
|
|
|
ether_addr_copy(common->addr, tt_addr);
|
2013-06-04 18:11:39 +08:00
|
|
|
common->vid = vid;
|
2011-10-23 02:12:51 +08:00
|
|
|
|
2018-06-07 06:46:24 +08:00
|
|
|
if (!is_multicast_ether_addr(common->addr))
|
|
|
|
common->flags = flags & (~BATADV_TT_SYNC_MASK);
|
2018-06-07 06:46:23 +08:00
|
|
|
|
2011-04-27 20:27:57 +08:00
|
|
|
tt_global_entry->roam_at = 0;
|
2012-08-24 23:54:07 +08:00
|
|
|
/* node must store current time in case of roaming. This is
|
|
|
|
* needed to purge this entry out on timeout (if nobody claims
|
|
|
|
* it)
|
|
|
|
*/
|
|
|
|
if (flags & BATADV_TT_CLIENT_ROAM)
|
|
|
|
tt_global_entry->roam_at = jiffies;
|
2016-01-16 17:29:57 +08:00
|
|
|
kref_init(&common->refcount);
|
2012-07-06 05:38:29 +08:00
|
|
|
common->added_at = jiffies;
|
2011-10-23 02:12:51 +08:00
|
|
|
|
|
|
|
INIT_HLIST_HEAD(&tt_global_entry->orig_list);
|
2014-02-16 00:47:52 +08:00
|
|
|
atomic_set(&tt_global_entry->orig_list_count, 0);
|
2011-10-23 02:12:51 +08:00
|
|
|
spin_lock_init(&tt_global_entry->list_lock);
|
2011-04-27 20:28:07 +08:00
|
|
|
|
2016-07-15 23:39:23 +08:00
|
|
|
kref_get(&common->refcount);
|
2012-07-16 04:26:51 +08:00
|
|
|
hash_added = batadv_hash_add(bat_priv->tt.global_hash,
|
2012-05-17 02:23:16 +08:00
|
|
|
batadv_compare_tt,
|
2013-06-04 18:11:39 +08:00
|
|
|
batadv_choose_tt, common,
|
2012-05-17 02:23:16 +08:00
|
|
|
&common->hash_entry);
|
2011-11-03 03:26:45 +08:00
|
|
|
|
|
|
|
if (unlikely(hash_added != 0)) {
|
|
|
|
/* remove the reference for the hash */
|
2016-01-17 18:01:26 +08:00
|
|
|
batadv_tt_global_entry_put(tt_global_entry);
|
2011-11-03 03:26:45 +08:00
|
|
|
goto out_remove;
|
|
|
|
}
|
2011-04-27 20:27:44 +08:00
|
|
|
} else {
|
2012-09-24 04:38:37 +08:00
|
|
|
common = &tt_global_entry->common;
|
2012-07-06 05:38:29 +08:00
|
|
|
/* If there is already a global entry, we can use this one for
|
|
|
|
* our processing.
|
2012-09-24 04:38:37 +08:00
|
|
|
* But if we are trying to add a temporary client then here are
|
|
|
|
* two options at this point:
|
|
|
|
* 1) the global client is not a temporary client: the global
|
|
|
|
* client has to be left as it is, temporary information
|
|
|
|
* should never override any already known client state
|
|
|
|
* 2) the global client is a temporary client: purge the
|
|
|
|
* originator list and add the new one orig_entry
|
2012-07-06 05:38:29 +08:00
|
|
|
*/
|
2012-09-24 04:38:37 +08:00
|
|
|
if (flags & BATADV_TT_CLIENT_TEMP) {
|
|
|
|
if (!(common->flags & BATADV_TT_CLIENT_TEMP))
|
|
|
|
goto out;
|
|
|
|
if (batadv_tt_global_entry_has_orig(tt_global_entry,
|
2018-05-11 01:44:28 +08:00
|
|
|
orig_node, NULL))
|
2012-09-24 04:38:37 +08:00
|
|
|
goto out_remove;
|
|
|
|
batadv_tt_global_del_orig_list(tt_global_entry);
|
|
|
|
goto add_orig_entry;
|
|
|
|
}
|
2012-07-06 05:38:29 +08:00
|
|
|
|
|
|
|
/* if the client was temporary added before receiving the first
|
2015-09-03 02:09:55 +08:00
|
|
|
* OGM announcing it, we have to clear the TEMP flag. Also,
|
|
|
|
* remove the previous temporary orig node and re-add it
|
|
|
|
* if required. If the orig entry changed, the new one which
|
|
|
|
* is a non-temporary entry is preferred.
|
2012-07-06 05:38:29 +08:00
|
|
|
*/
|
2015-09-03 02:09:55 +08:00
|
|
|
if (common->flags & BATADV_TT_CLIENT_TEMP) {
|
|
|
|
batadv_tt_global_del_orig_list(tt_global_entry);
|
|
|
|
common->flags &= ~BATADV_TT_CLIENT_TEMP;
|
|
|
|
}
|
2011-10-23 02:12:51 +08:00
|
|
|
|
2012-11-07 22:05:33 +08:00
|
|
|
/* the change can carry possible "attribute" flags like the
|
2017-07-06 13:02:25 +08:00
|
|
|
* TT_CLIENT_TEMP, therefore they have to be copied in the
|
2012-11-07 22:05:33 +08:00
|
|
|
* client entry
|
|
|
|
*/
|
2018-06-07 06:46:24 +08:00
|
|
|
if (!is_multicast_ether_addr(common->addr))
|
|
|
|
common->flags |= flags & (~BATADV_TT_SYNC_MASK);
|
2012-11-07 22:05:33 +08:00
|
|
|
|
2012-06-04 04:19:21 +08:00
|
|
|
/* If there is the BATADV_TT_CLIENT_ROAM flag set, there is only
|
|
|
|
* one originator left in the list and we previously received a
|
2011-10-23 02:12:51 +08:00
|
|
|
* delete + roaming change for this originator.
|
|
|
|
*
|
|
|
|
* We should first delete the old originator before adding the
|
|
|
|
* new one.
|
|
|
|
*/
|
2012-09-24 04:38:37 +08:00
|
|
|
if (common->flags & BATADV_TT_CLIENT_ROAM) {
|
2012-05-17 02:23:16 +08:00
|
|
|
batadv_tt_global_del_orig_list(tt_global_entry);
|
2012-09-24 04:38:37 +08:00
|
|
|
common->flags &= ~BATADV_TT_CLIENT_ROAM;
|
2011-10-23 02:12:51 +08:00
|
|
|
tt_global_entry->roam_at = 0;
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
}
|
2012-09-24 04:38:37 +08:00
|
|
|
add_orig_entry:
|
2012-07-06 05:38:29 +08:00
|
|
|
/* add the new orig_entry (if needed) or update it */
|
2017-07-06 13:02:25 +08:00
|
|
|
batadv_tt_global_orig_entry_add(tt_global_entry, orig_node, ttvn,
|
|
|
|
flags & BATADV_TT_SYNC_MASK);
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2012-06-04 04:19:22 +08:00
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv,
|
2013-06-04 18:11:41 +08:00
|
|
|
"Creating new global tt entry: %pM (vid: %d, via %pM)\n",
|
2017-02-23 00:16:42 +08:00
|
|
|
common->addr, batadv_print_vid(common->vid),
|
2013-06-04 18:11:41 +08:00
|
|
|
orig_node->orig);
|
2013-05-06 01:32:38 +08:00
|
|
|
ret = true;
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2011-11-03 03:26:45 +08:00
|
|
|
out_remove:
|
2014-02-16 00:47:49 +08:00
|
|
|
/* Do not remove multicast addresses from the local hash on
|
|
|
|
* global additions
|
|
|
|
*/
|
|
|
|
if (is_multicast_ether_addr(tt_addr))
|
|
|
|
goto out;
|
2012-08-27 17:44:43 +08:00
|
|
|
|
2011-04-27 20:27:44 +08:00
|
|
|
/* remove address from local hash if present */
|
2013-06-04 18:11:39 +08:00
|
|
|
local_flags = batadv_tt_local_remove(bat_priv, tt_addr, vid,
|
2012-08-27 17:44:43 +08:00
|
|
|
"global tt received",
|
2013-01-15 20:17:19 +08:00
|
|
|
flags & BATADV_TT_CLIENT_ROAM);
|
2012-08-27 17:44:43 +08:00
|
|
|
tt_global_entry->common.flags |= local_flags & BATADV_TT_CLIENT_WIFI;
|
|
|
|
|
2012-09-24 04:38:37 +08:00
|
|
|
if (!(flags & BATADV_TT_CLIENT_ROAM))
|
|
|
|
/* this is a normal global add. Therefore the client is not in a
|
|
|
|
* roaming state anymore.
|
|
|
|
*/
|
|
|
|
tt_global_entry->common.flags &= ~BATADV_TT_CLIENT_ROAM;
|
|
|
|
|
2011-04-27 20:28:07 +08:00
|
|
|
out:
|
2021-08-09 01:11:08 +08:00
|
|
|
batadv_tt_global_entry_put(tt_global_entry);
|
|
|
|
batadv_tt_local_entry_put(tt_local_entry);
|
2011-04-27 20:28:07 +08:00
|
|
|
return ret;
|
2010-12-13 19:19:28 +08:00
|
|
|
}
|
|
|
|
|
2014-01-16 04:17:54 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_transtable_best_orig() - Get best originator list entry from tt entry
|
2013-09-03 17:10:24 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
2012-10-07 19:34:15 +08:00
|
|
|
* @tt_global_entry: global translation table entry to be analyzed
|
|
|
|
*
|
2020-06-02 02:13:21 +08:00
|
|
|
* This function assumes the caller holds rcu_read_lock().
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: best originator list entry or NULL on errors.
|
2012-10-07 19:34:15 +08:00
|
|
|
*/
|
|
|
|
static struct batadv_tt_orig_list_entry *
|
2013-09-03 17:10:24 +08:00
|
|
|
batadv_transtable_best_orig(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_tt_global_entry *tt_global_entry)
|
2012-10-07 19:34:15 +08:00
|
|
|
{
|
2013-09-03 17:10:24 +08:00
|
|
|
struct batadv_neigh_node *router, *best_router = NULL;
|
2016-05-25 23:27:31 +08:00
|
|
|
struct batadv_algo_ops *bao = bat_priv->algo_ops;
|
2012-10-07 19:34:15 +08:00
|
|
|
struct hlist_head *head;
|
|
|
|
struct batadv_tt_orig_list_entry *orig_entry, *best_entry = NULL;
|
|
|
|
|
|
|
|
head = &tt_global_entry->orig_list;
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_rcu(orig_entry, head, list) {
|
2013-11-14 02:14:47 +08:00
|
|
|
router = batadv_orig_router_get(orig_entry->orig_node,
|
|
|
|
BATADV_IF_DEFAULT);
|
2012-10-07 19:34:15 +08:00
|
|
|
if (!router)
|
|
|
|
continue;
|
|
|
|
|
2013-09-03 17:10:24 +08:00
|
|
|
if (best_router &&
|
2016-05-25 23:27:31 +08:00
|
|
|
bao->neigh.cmp(router, BATADV_IF_DEFAULT, best_router,
|
|
|
|
BATADV_IF_DEFAULT) <= 0) {
|
2016-01-17 18:01:11 +08:00
|
|
|
batadv_neigh_node_put(router);
|
2013-09-03 17:10:24 +08:00
|
|
|
continue;
|
2012-10-07 19:34:15 +08:00
|
|
|
}
|
|
|
|
|
2013-09-03 17:10:24 +08:00
|
|
|
/* release the refcount for the "old" best */
|
2021-08-09 01:11:08 +08:00
|
|
|
batadv_neigh_node_put(best_router);
|
2013-09-03 17:10:24 +08:00
|
|
|
|
|
|
|
best_entry = orig_entry;
|
|
|
|
best_router = router;
|
2012-10-07 19:34:15 +08:00
|
|
|
}
|
|
|
|
|
2021-08-09 01:11:08 +08:00
|
|
|
batadv_neigh_node_put(best_router);
|
2013-09-03 17:10:24 +08:00
|
|
|
|
2012-10-07 19:34:15 +08:00
|
|
|
return best_entry;
|
|
|
|
}
|
|
|
|
|
2016-07-03 19:31:37 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_dump_subentry() - Dump all TT local entries into a message
|
2016-07-03 19:31:37 +08:00
|
|
|
* @msg: Netlink message to dump into
|
|
|
|
* @portid: Port making netlink request
|
|
|
|
* @seq: Sequence number of netlink message
|
|
|
|
* @common: tt local & tt global common data
|
|
|
|
* @orig: Originator node announcing a non-mesh client
|
|
|
|
* @best: Is the best originator for the TT entry
|
|
|
|
*
|
|
|
|
* Return: Error code, or 0 on success
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
batadv_tt_global_dump_subentry(struct sk_buff *msg, u32 portid, u32 seq,
|
|
|
|
struct batadv_tt_common_entry *common,
|
|
|
|
struct batadv_tt_orig_list_entry *orig,
|
|
|
|
bool best)
|
|
|
|
{
|
2017-07-06 13:02:25 +08:00
|
|
|
u16 flags = (common->flags & (~BATADV_TT_SYNC_MASK)) | orig->flags;
|
2016-07-03 19:31:37 +08:00
|
|
|
void *hdr;
|
|
|
|
struct batadv_orig_node_vlan *vlan;
|
|
|
|
u8 last_ttvn;
|
|
|
|
u32 crc;
|
|
|
|
|
|
|
|
vlan = batadv_orig_node_vlan_get(orig->orig_node,
|
|
|
|
common->vid);
|
|
|
|
if (!vlan)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
crc = vlan->tt.crc;
|
|
|
|
|
|
|
|
batadv_orig_node_vlan_put(vlan);
|
|
|
|
|
|
|
|
hdr = genlmsg_put(msg, portid, seq, &batadv_netlink_family,
|
|
|
|
NLM_F_MULTI,
|
|
|
|
BATADV_CMD_GET_TRANSTABLE_GLOBAL);
|
|
|
|
if (!hdr)
|
|
|
|
return -ENOBUFS;
|
|
|
|
|
|
|
|
last_ttvn = atomic_read(&orig->orig_node->last_ttvn);
|
|
|
|
|
|
|
|
if (nla_put(msg, BATADV_ATTR_TT_ADDRESS, ETH_ALEN, common->addr) ||
|
|
|
|
nla_put(msg, BATADV_ATTR_ORIG_ADDRESS, ETH_ALEN,
|
|
|
|
orig->orig_node->orig) ||
|
|
|
|
nla_put_u8(msg, BATADV_ATTR_TT_TTVN, orig->ttvn) ||
|
|
|
|
nla_put_u8(msg, BATADV_ATTR_TT_LAST_TTVN, last_ttvn) ||
|
|
|
|
nla_put_u32(msg, BATADV_ATTR_TT_CRC32, crc) ||
|
|
|
|
nla_put_u16(msg, BATADV_ATTR_TT_VID, common->vid) ||
|
2017-07-06 13:02:25 +08:00
|
|
|
nla_put_u32(msg, BATADV_ATTR_TT_FLAGS, flags))
|
2016-07-03 19:31:37 +08:00
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
if (best && nla_put_flag(msg, BATADV_ATTR_FLAG_BEST))
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
genlmsg_end(msg, hdr);
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
genlmsg_cancel(msg, hdr);
|
|
|
|
return -EMSGSIZE;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_dump_entry() - Dump one TT global entry into a message
|
2016-07-03 19:31:37 +08:00
|
|
|
* @msg: Netlink message to dump into
|
|
|
|
* @portid: Port making netlink request
|
|
|
|
* @seq: Sequence number of netlink message
|
|
|
|
* @bat_priv: The bat priv with all the soft interface information
|
|
|
|
* @common: tt local & tt global common data
|
|
|
|
* @sub_s: Number of entries to skip
|
|
|
|
*
|
|
|
|
* This function assumes the caller holds rcu_read_lock().
|
|
|
|
*
|
|
|
|
* Return: Error code, or 0 on success
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
batadv_tt_global_dump_entry(struct sk_buff *msg, u32 portid, u32 seq,
|
|
|
|
struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_tt_common_entry *common, int *sub_s)
|
|
|
|
{
|
|
|
|
struct batadv_tt_orig_list_entry *orig_entry, *best_entry;
|
|
|
|
struct batadv_tt_global_entry *global;
|
|
|
|
struct hlist_head *head;
|
|
|
|
int sub = 0;
|
|
|
|
bool best;
|
|
|
|
|
|
|
|
global = container_of(common, struct batadv_tt_global_entry, common);
|
|
|
|
best_entry = batadv_transtable_best_orig(bat_priv, global);
|
|
|
|
head = &global->orig_list;
|
|
|
|
|
|
|
|
hlist_for_each_entry_rcu(orig_entry, head, list) {
|
|
|
|
if (sub++ < *sub_s)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
best = (orig_entry == best_entry);
|
|
|
|
|
|
|
|
if (batadv_tt_global_dump_subentry(msg, portid, seq, common,
|
|
|
|
orig_entry, best)) {
|
|
|
|
*sub_s = sub - 1;
|
|
|
|
return -EMSGSIZE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
*sub_s = 0;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_dump_bucket() - Dump one TT local bucket into a message
|
2016-07-03 19:31:37 +08:00
|
|
|
* @msg: Netlink message to dump into
|
|
|
|
* @portid: Port making netlink request
|
|
|
|
* @seq: Sequence number of netlink message
|
|
|
|
* @bat_priv: The bat priv with all the soft interface information
|
|
|
|
* @head: Pointer to the list containing the global tt entries
|
|
|
|
* @idx_s: Number of entries to skip
|
|
|
|
* @sub: Number of entries to skip
|
|
|
|
*
|
|
|
|
* Return: Error code, or 0 on success
|
|
|
|
*/
|
|
|
|
static int
|
|
|
|
batadv_tt_global_dump_bucket(struct sk_buff *msg, u32 portid, u32 seq,
|
|
|
|
struct batadv_priv *bat_priv,
|
|
|
|
struct hlist_head *head, int *idx_s, int *sub)
|
|
|
|
{
|
|
|
|
struct batadv_tt_common_entry *common;
|
|
|
|
int idx = 0;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
hlist_for_each_entry_rcu(common, head, hash_entry) {
|
|
|
|
if (idx++ < *idx_s)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (batadv_tt_global_dump_entry(msg, portid, seq, bat_priv,
|
|
|
|
common, sub)) {
|
|
|
|
rcu_read_unlock();
|
|
|
|
*idx_s = idx - 1;
|
|
|
|
return -EMSGSIZE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
|
|
|
|
|
|
|
*idx_s = 0;
|
|
|
|
*sub = 0;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_dump() - Dump TT global entries into a message
|
2016-07-03 19:31:37 +08:00
|
|
|
* @msg: Netlink message to dump into
|
|
|
|
* @cb: Parameters from query
|
|
|
|
*
|
|
|
|
* Return: Error code, or length of message on success
|
|
|
|
*/
|
|
|
|
int batadv_tt_global_dump(struct sk_buff *msg, struct netlink_callback *cb)
|
|
|
|
{
|
|
|
|
struct net *net = sock_net(cb->skb->sk);
|
|
|
|
struct net_device *soft_iface;
|
|
|
|
struct batadv_priv *bat_priv;
|
|
|
|
struct batadv_hard_iface *primary_if = NULL;
|
|
|
|
struct batadv_hashtable *hash;
|
|
|
|
struct hlist_head *head;
|
|
|
|
int ret;
|
|
|
|
int ifindex;
|
|
|
|
int bucket = cb->args[0];
|
|
|
|
int idx = cb->args[1];
|
|
|
|
int sub = cb->args[2];
|
|
|
|
int portid = NETLINK_CB(cb->skb).portid;
|
|
|
|
|
|
|
|
ifindex = batadv_netlink_get_ifindex(cb->nlh, BATADV_ATTR_MESH_IFINDEX);
|
|
|
|
if (!ifindex)
|
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
soft_iface = dev_get_by_index(net, ifindex);
|
|
|
|
if (!soft_iface || !batadv_softif_is_valid(soft_iface)) {
|
|
|
|
ret = -ENODEV;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
bat_priv = netdev_priv(soft_iface);
|
|
|
|
|
|
|
|
primary_if = batadv_primary_if_get_selected(bat_priv);
|
|
|
|
if (!primary_if || primary_if->if_status != BATADV_IF_ACTIVE) {
|
|
|
|
ret = -ENOENT;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
hash = bat_priv->tt.global_hash;
|
|
|
|
|
|
|
|
while (bucket < hash->size) {
|
|
|
|
head = &hash->table[bucket];
|
|
|
|
|
|
|
|
if (batadv_tt_global_dump_bucket(msg, portid,
|
|
|
|
cb->nlh->nlmsg_seq, bat_priv,
|
|
|
|
head, &idx, &sub))
|
|
|
|
break;
|
|
|
|
|
|
|
|
bucket++;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = msg->len;
|
|
|
|
|
|
|
|
out:
|
2021-08-09 01:11:08 +08:00
|
|
|
batadv_hardif_put(primary_if);
|
2021-08-05 19:55:27 +08:00
|
|
|
dev_put(soft_iface);
|
2016-07-03 19:31:37 +08:00
|
|
|
|
|
|
|
cb->args[0] = bucket;
|
|
|
|
cb->args[1] = idx;
|
|
|
|
cb->args[2] = sub;
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2014-02-16 00:47:52 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* _batadv_tt_global_del_orig_entry() - remove and free an orig_entry
|
2014-02-16 00:47:52 +08:00
|
|
|
* @tt_global_entry: the global entry to remove the orig_entry from
|
|
|
|
* @orig_entry: the orig entry to remove and free
|
|
|
|
*
|
|
|
|
* Remove an orig_entry from its list in the given tt_global_entry and
|
|
|
|
* free this orig_entry afterwards.
|
2015-06-18 16:11:07 +08:00
|
|
|
*
|
|
|
|
* Caller must hold tt_global_entry->list_lock and ensure orig_entry->list is
|
|
|
|
* part of a list.
|
2014-02-16 00:47:52 +08:00
|
|
|
*/
|
|
|
|
static void
|
2015-06-18 16:11:07 +08:00
|
|
|
_batadv_tt_global_del_orig_entry(struct batadv_tt_global_entry *tt_global_entry,
|
|
|
|
struct batadv_tt_orig_list_entry *orig_entry)
|
2014-02-16 00:47:52 +08:00
|
|
|
{
|
2015-06-21 20:45:14 +08:00
|
|
|
lockdep_assert_held(&tt_global_entry->list_lock);
|
|
|
|
|
2014-02-16 00:47:52 +08:00
|
|
|
batadv_tt_global_size_dec(orig_entry->orig_node,
|
|
|
|
tt_global_entry->common.vid);
|
|
|
|
atomic_dec(&tt_global_entry->orig_list_count);
|
2015-06-18 16:11:07 +08:00
|
|
|
/* requires holding tt_global_entry->list_lock and orig_entry->list
|
|
|
|
* being part of a list
|
|
|
|
*/
|
2014-02-16 00:47:52 +08:00
|
|
|
hlist_del_rcu(&orig_entry->list);
|
2016-01-17 18:01:27 +08:00
|
|
|
batadv_tt_orig_list_entry_put(orig_entry);
|
2014-02-16 00:47:52 +08:00
|
|
|
}
|
|
|
|
|
2011-10-23 02:12:51 +08:00
|
|
|
/* deletes the orig list of a tt_global_entry */
|
2012-05-17 02:23:16 +08:00
|
|
|
static void
|
2012-06-06 04:31:31 +08:00
|
|
|
batadv_tt_global_del_orig_list(struct batadv_tt_global_entry *tt_global_entry)
|
2010-12-13 19:19:28 +08:00
|
|
|
{
|
2011-10-23 02:12:51 +08:00
|
|
|
struct hlist_head *head;
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
struct hlist_node *safe;
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_orig_list_entry *orig_entry;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2011-10-23 02:12:51 +08:00
|
|
|
spin_lock_bh(&tt_global_entry->list_lock);
|
|
|
|
head = &tt_global_entry->orig_list;
|
2014-02-16 00:47:52 +08:00
|
|
|
hlist_for_each_entry_safe(orig_entry, safe, head, list)
|
2015-06-18 16:11:07 +08:00
|
|
|
_batadv_tt_global_del_orig_entry(tt_global_entry, orig_entry);
|
2011-10-23 02:12:51 +08:00
|
|
|
spin_unlock_bh(&tt_global_entry->list_lock);
|
|
|
|
}
|
|
|
|
|
2014-02-16 00:47:52 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_del_orig_node() - remove orig_node from a global tt entry
|
2014-02-16 00:47:52 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @tt_global_entry: the global entry to remove the orig_node from
|
|
|
|
* @orig_node: the originator announcing the client
|
|
|
|
* @message: message to append to the log on deletion
|
|
|
|
*
|
|
|
|
* Remove the given orig_node and its according orig_entry from the given
|
|
|
|
* global tt entry.
|
|
|
|
*/
|
2012-05-17 02:23:16 +08:00
|
|
|
static void
|
2014-02-16 00:47:52 +08:00
|
|
|
batadv_tt_global_del_orig_node(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_tt_global_entry *tt_global_entry,
|
|
|
|
struct batadv_orig_node *orig_node,
|
|
|
|
const char *message)
|
2011-10-23 02:12:51 +08:00
|
|
|
{
|
|
|
|
struct hlist_head *head;
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
struct hlist_node *safe;
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_orig_list_entry *orig_entry;
|
2013-06-04 18:11:41 +08:00
|
|
|
unsigned short vid;
|
2011-10-23 02:12:51 +08:00
|
|
|
|
|
|
|
spin_lock_bh(&tt_global_entry->list_lock);
|
|
|
|
head = &tt_global_entry->orig_list;
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_safe(orig_entry, safe, head, list) {
|
2011-10-23 02:12:51 +08:00
|
|
|
if (orig_entry->orig_node == orig_node) {
|
2013-06-04 18:11:41 +08:00
|
|
|
vid = tt_global_entry->common.vid;
|
2012-06-04 04:19:22 +08:00
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv,
|
2013-06-04 18:11:41 +08:00
|
|
|
"Deleting %pM from global tt entry %pM (vid: %d): %s\n",
|
2012-05-12 19:48:58 +08:00
|
|
|
orig_node->orig,
|
2013-06-04 18:11:41 +08:00
|
|
|
tt_global_entry->common.addr,
|
2017-02-23 00:16:42 +08:00
|
|
|
batadv_print_vid(vid), message);
|
2015-06-18 16:11:07 +08:00
|
|
|
_batadv_tt_global_del_orig_entry(tt_global_entry,
|
|
|
|
orig_entry);
|
2011-10-23 02:12:51 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
spin_unlock_bh(&tt_global_entry->list_lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* If the client is to be deleted, we check if it is the last origantor entry
|
2012-06-04 04:19:21 +08:00
|
|
|
* within tt_global entry. If yes, we set the BATADV_TT_CLIENT_ROAM flag and the
|
|
|
|
* timer, otherwise we simply remove the originator scheduled for deletion.
|
2011-10-23 02:12:51 +08:00
|
|
|
*/
|
2012-05-17 02:23:16 +08:00
|
|
|
static void
|
2012-06-06 04:31:31 +08:00
|
|
|
batadv_tt_global_del_roaming(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_tt_global_entry *tt_global_entry,
|
|
|
|
struct batadv_orig_node *orig_node,
|
|
|
|
const char *message)
|
2011-10-23 02:12:51 +08:00
|
|
|
{
|
|
|
|
bool last_entry = true;
|
|
|
|
struct hlist_head *head;
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_orig_list_entry *orig_entry;
|
2011-10-23 02:12:51 +08:00
|
|
|
|
|
|
|
/* no local entry exists, case 1:
|
|
|
|
* Check if this is the last one or if other entries exist.
|
|
|
|
*/
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
head = &tt_global_entry->orig_list;
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_rcu(orig_entry, head, list) {
|
2011-10-23 02:12:51 +08:00
|
|
|
if (orig_entry->orig_node != orig_node) {
|
|
|
|
last_entry = false;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
|
|
|
|
|
|
|
if (last_entry) {
|
|
|
|
/* its the last one, mark for roaming. */
|
2012-06-04 04:19:21 +08:00
|
|
|
tt_global_entry->common.flags |= BATADV_TT_CLIENT_ROAM;
|
2011-10-23 02:12:51 +08:00
|
|
|
tt_global_entry->roam_at = jiffies;
|
2017-02-23 00:16:40 +08:00
|
|
|
} else {
|
2011-10-23 02:12:51 +08:00
|
|
|
/* there is another entry, we can simply delete this
|
|
|
|
* one and can still use the other one.
|
|
|
|
*/
|
2014-02-16 00:47:52 +08:00
|
|
|
batadv_tt_global_del_orig_node(bat_priv, tt_global_entry,
|
|
|
|
orig_node, message);
|
2017-02-23 00:16:40 +08:00
|
|
|
}
|
2011-10-23 02:12:51 +08:00
|
|
|
}
|
|
|
|
|
2013-06-04 18:11:39 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_del() - remove a client from the global table
|
2013-06-04 18:11:39 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @orig_node: an originator serving this client
|
|
|
|
* @addr: the mac address of the client
|
|
|
|
* @vid: VLAN identifier
|
|
|
|
* @message: a message explaining the reason for deleting the client to print
|
|
|
|
* for debugging purpose
|
|
|
|
* @roaming: true if the deletion has been triggered by a roaming event
|
|
|
|
*/
|
2012-06-06 04:31:31 +08:00
|
|
|
static void batadv_tt_global_del(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_orig_node *orig_node,
|
2013-06-04 18:11:39 +08:00
|
|
|
const unsigned char *addr, unsigned short vid,
|
2012-05-17 02:23:16 +08:00
|
|
|
const char *message, bool roaming)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
2012-10-07 18:02:22 +08:00
|
|
|
struct batadv_tt_global_entry *tt_global_entry;
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_local_entry *local_entry = NULL;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2013-06-04 18:11:39 +08:00
|
|
|
tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
|
2011-10-23 02:12:51 +08:00
|
|
|
if (!tt_global_entry)
|
2011-04-27 20:28:07 +08:00
|
|
|
goto out;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2011-10-23 02:12:51 +08:00
|
|
|
if (!roaming) {
|
2014-02-16 00:47:52 +08:00
|
|
|
batadv_tt_global_del_orig_node(bat_priv, tt_global_entry,
|
|
|
|
orig_node, message);
|
2011-10-23 02:12:51 +08:00
|
|
|
|
|
|
|
if (hlist_empty(&tt_global_entry->orig_list))
|
2012-09-24 04:38:36 +08:00
|
|
|
batadv_tt_global_free(bat_priv, tt_global_entry,
|
|
|
|
message);
|
2011-10-23 02:12:51 +08:00
|
|
|
|
|
|
|
goto out;
|
|
|
|
}
|
2011-12-22 20:31:12 +08:00
|
|
|
|
|
|
|
/* if we are deleting a global entry due to a roam
|
|
|
|
* event, there are two possibilities:
|
2011-10-23 02:12:51 +08:00
|
|
|
* 1) the client roamed from node A to node B => if there
|
|
|
|
* is only one originator left for this client, we mark
|
2012-06-04 04:19:21 +08:00
|
|
|
* it with BATADV_TT_CLIENT_ROAM, we start a timer and we
|
2011-12-22 20:31:12 +08:00
|
|
|
* wait for node B to claim it. In case of timeout
|
|
|
|
* the entry is purged.
|
2011-10-23 02:12:51 +08:00
|
|
|
*
|
|
|
|
* If there are other originators left, we directly delete
|
|
|
|
* the originator.
|
2011-12-22 20:31:12 +08:00
|
|
|
* 2) the client roamed to us => we can directly delete
|
2012-05-12 08:09:43 +08:00
|
|
|
* the global entry, since it is useless now.
|
|
|
|
*/
|
2012-05-17 02:23:16 +08:00
|
|
|
local_entry = batadv_tt_local_hash_find(bat_priv,
|
2013-06-04 18:11:39 +08:00
|
|
|
tt_global_entry->common.addr,
|
|
|
|
vid);
|
2012-05-17 02:23:16 +08:00
|
|
|
if (local_entry) {
|
2011-10-23 02:12:51 +08:00
|
|
|
/* local entry exists, case 2: client roamed to us. */
|
2012-05-17 02:23:16 +08:00
|
|
|
batadv_tt_global_del_orig_list(tt_global_entry);
|
2012-09-24 04:38:36 +08:00
|
|
|
batadv_tt_global_free(bat_priv, tt_global_entry, message);
|
2017-02-23 00:16:40 +08:00
|
|
|
} else {
|
2011-10-23 02:12:51 +08:00
|
|
|
/* no local entry exists, case 1: check for roaming */
|
2012-05-17 02:23:16 +08:00
|
|
|
batadv_tt_global_del_roaming(bat_priv, tt_global_entry,
|
|
|
|
orig_node, message);
|
2017-02-23 00:16:40 +08:00
|
|
|
}
|
2011-12-22 20:31:12 +08:00
|
|
|
|
2011-04-27 20:27:57 +08:00
|
|
|
out:
|
2021-08-09 01:11:08 +08:00
|
|
|
batadv_tt_global_entry_put(tt_global_entry);
|
|
|
|
batadv_tt_local_entry_put(local_entry);
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
|
2013-08-08 00:28:55 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_del_orig() - remove all the TT global entries belonging to
|
|
|
|
* the given originator matching the provided vid
|
2013-08-08 00:28:55 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @orig_node: the originator owning the entries to remove
|
|
|
|
* @match_vid: the VLAN identifier to match. If negative all the entries will be
|
|
|
|
* removed
|
|
|
|
* @message: debug message to print as "reason"
|
|
|
|
*/
|
2012-06-06 04:31:31 +08:00
|
|
|
void batadv_tt_global_del_orig(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_orig_node *orig_node,
|
2015-05-27 00:34:26 +08:00
|
|
|
s32 match_vid,
|
2012-06-06 04:31:31 +08:00
|
|
|
const char *message)
|
2010-12-13 19:19:28 +08:00
|
|
|
{
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_global_entry *tt_global;
|
|
|
|
struct batadv_tt_common_entry *tt_common_entry;
|
2015-05-27 00:34:26 +08:00
|
|
|
u32 i;
|
2012-07-16 04:26:51 +08:00
|
|
|
struct batadv_hashtable *hash = bat_priv->tt.global_hash;
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
struct hlist_node *safe;
|
2011-04-27 20:27:44 +08:00
|
|
|
struct hlist_head *head;
|
2011-04-27 20:28:07 +08:00
|
|
|
spinlock_t *list_lock; /* protects write access to the hash lists */
|
2013-06-04 18:11:41 +08:00
|
|
|
unsigned short vid;
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2011-10-19 16:28:26 +08:00
|
|
|
if (!hash)
|
|
|
|
return;
|
|
|
|
|
2011-04-27 20:27:44 +08:00
|
|
|
for (i = 0; i < hash->size; i++) {
|
|
|
|
head = &hash->table[i];
|
2011-04-27 20:28:07 +08:00
|
|
|
list_lock = &hash->list_locks[i];
|
2010-12-13 19:19:28 +08:00
|
|
|
|
2011-04-27 20:28:07 +08:00
|
|
|
spin_lock_bh(list_lock);
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_safe(tt_common_entry, safe,
|
2012-02-28 17:55:36 +08:00
|
|
|
head, hash_entry) {
|
2013-08-08 00:28:55 +08:00
|
|
|
/* remove only matching entries */
|
|
|
|
if (match_vid >= 0 && tt_common_entry->vid != match_vid)
|
|
|
|
continue;
|
|
|
|
|
2012-06-06 04:31:31 +08:00
|
|
|
tt_global = container_of(tt_common_entry,
|
|
|
|
struct batadv_tt_global_entry,
|
|
|
|
common);
|
2011-10-23 02:12:51 +08:00
|
|
|
|
2014-02-16 00:47:52 +08:00
|
|
|
batadv_tt_global_del_orig_node(bat_priv, tt_global,
|
|
|
|
orig_node, message);
|
2011-10-23 02:12:51 +08:00
|
|
|
|
2012-06-06 04:31:31 +08:00
|
|
|
if (hlist_empty(&tt_global->orig_list)) {
|
2013-06-04 18:11:41 +08:00
|
|
|
vid = tt_global->common.vid;
|
2012-06-04 04:19:22 +08:00
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv,
|
2013-06-04 18:11:41 +08:00
|
|
|
"Deleting global tt entry %pM (vid: %d): %s\n",
|
|
|
|
tt_global->common.addr,
|
2017-02-23 00:16:42 +08:00
|
|
|
batadv_print_vid(vid), message);
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_del_rcu(&tt_common_entry->hash_entry);
|
2016-01-17 18:01:26 +08:00
|
|
|
batadv_tt_global_entry_put(tt_global);
|
2011-04-27 20:28:07 +08:00
|
|
|
}
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
2011-04-27 20:28:07 +08:00
|
|
|
spin_unlock_bh(list_lock);
|
2010-12-13 19:19:28 +08:00
|
|
|
}
|
2015-06-16 23:10:24 +08:00
|
|
|
clear_bit(BATADV_ORIG_CAPA_HAS_TT, &orig_node->capa_initialized);
|
2010-12-13 19:19:28 +08:00
|
|
|
}
|
|
|
|
|
2012-07-06 05:38:29 +08:00
|
|
|
static bool batadv_tt_global_to_purge(struct batadv_tt_global_entry *tt_global,
|
|
|
|
char **msg)
|
2011-04-27 20:27:57 +08:00
|
|
|
{
|
2012-07-06 05:38:29 +08:00
|
|
|
bool purge = false;
|
|
|
|
unsigned long roam_timeout = BATADV_TT_CLIENT_ROAM_TIMEOUT;
|
|
|
|
unsigned long temp_timeout = BATADV_TT_CLIENT_TEMP_TIMEOUT;
|
2012-06-04 04:19:17 +08:00
|
|
|
|
2012-07-06 05:38:29 +08:00
|
|
|
if ((tt_global->common.flags & BATADV_TT_CLIENT_ROAM) &&
|
|
|
|
batadv_has_timed_out(tt_global->roam_at, roam_timeout)) {
|
|
|
|
purge = true;
|
|
|
|
*msg = "Roaming timeout\n";
|
|
|
|
}
|
2012-06-04 04:19:17 +08:00
|
|
|
|
2012-07-06 05:38:29 +08:00
|
|
|
if ((tt_global->common.flags & BATADV_TT_CLIENT_TEMP) &&
|
|
|
|
batadv_has_timed_out(tt_global->common.added_at, temp_timeout)) {
|
|
|
|
purge = true;
|
|
|
|
*msg = "Temporary client timeout\n";
|
2012-06-04 04:19:17 +08:00
|
|
|
}
|
2012-07-06 05:38:29 +08:00
|
|
|
|
|
|
|
return purge;
|
2012-06-04 04:19:17 +08:00
|
|
|
}
|
|
|
|
|
2012-07-06 05:38:29 +08:00
|
|
|
static void batadv_tt_global_purge(struct batadv_priv *bat_priv)
|
2012-06-04 04:19:17 +08:00
|
|
|
{
|
2012-07-16 04:26:51 +08:00
|
|
|
struct batadv_hashtable *hash = bat_priv->tt.global_hash;
|
2011-04-27 20:27:57 +08:00
|
|
|
struct hlist_head *head;
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
struct hlist_node *node_tmp;
|
2011-04-27 20:28:07 +08:00
|
|
|
spinlock_t *list_lock; /* protects write access to the hash lists */
|
2015-05-27 00:34:26 +08:00
|
|
|
u32 i;
|
2012-07-06 05:38:29 +08:00
|
|
|
char *msg = NULL;
|
|
|
|
struct batadv_tt_common_entry *tt_common;
|
|
|
|
struct batadv_tt_global_entry *tt_global;
|
2011-04-27 20:27:57 +08:00
|
|
|
|
|
|
|
for (i = 0; i < hash->size; i++) {
|
|
|
|
head = &hash->table[i];
|
2011-04-27 20:28:07 +08:00
|
|
|
list_lock = &hash->list_locks[i];
|
2011-04-27 20:27:57 +08:00
|
|
|
|
2011-04-27 20:28:07 +08:00
|
|
|
spin_lock_bh(list_lock);
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_safe(tt_common, node_tmp, head,
|
2012-07-06 05:38:29 +08:00
|
|
|
hash_entry) {
|
|
|
|
tt_global = container_of(tt_common,
|
|
|
|
struct batadv_tt_global_entry,
|
|
|
|
common);
|
|
|
|
|
|
|
|
if (!batadv_tt_global_to_purge(tt_global, &msg))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv,
|
2013-06-04 18:11:41 +08:00
|
|
|
"Deleting global tt entry %pM (vid: %d): %s\n",
|
|
|
|
tt_global->common.addr,
|
2017-02-23 00:16:42 +08:00
|
|
|
batadv_print_vid(tt_global->common.vid),
|
2013-06-04 18:11:41 +08:00
|
|
|
msg);
|
2012-07-06 05:38:29 +08:00
|
|
|
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_del_rcu(&tt_common->hash_entry);
|
2012-07-06 05:38:29 +08:00
|
|
|
|
2016-01-17 18:01:26 +08:00
|
|
|
batadv_tt_global_entry_put(tt_global);
|
2012-07-06 05:38:29 +08:00
|
|
|
}
|
2011-04-27 20:28:07 +08:00
|
|
|
spin_unlock_bh(list_lock);
|
2011-04-27 20:27:57 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-06-06 04:31:31 +08:00
|
|
|
static void batadv_tt_global_table_free(struct batadv_priv *bat_priv)
|
2010-12-13 19:19:28 +08:00
|
|
|
{
|
2012-06-06 04:31:28 +08:00
|
|
|
struct batadv_hashtable *hash;
|
2011-04-27 20:28:07 +08:00
|
|
|
spinlock_t *list_lock; /* protects write access to the hash lists */
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_common_entry *tt_common_entry;
|
|
|
|
struct batadv_tt_global_entry *tt_global;
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
struct hlist_node *node_tmp;
|
2011-04-27 20:28:07 +08:00
|
|
|
struct hlist_head *head;
|
2015-05-27 00:34:26 +08:00
|
|
|
u32 i;
|
2011-04-27 20:28:07 +08:00
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
if (!bat_priv->tt.global_hash)
|
2010-12-13 19:19:28 +08:00
|
|
|
return;
|
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
hash = bat_priv->tt.global_hash;
|
2011-04-27 20:28:07 +08:00
|
|
|
|
|
|
|
for (i = 0; i < hash->size; i++) {
|
|
|
|
head = &hash->table[i];
|
|
|
|
list_lock = &hash->list_locks[i];
|
|
|
|
|
|
|
|
spin_lock_bh(list_lock);
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_safe(tt_common_entry, node_tmp,
|
2011-04-27 20:28:07 +08:00
|
|
|
head, hash_entry) {
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_del_rcu(&tt_common_entry->hash_entry);
|
2012-06-06 04:31:31 +08:00
|
|
|
tt_global = container_of(tt_common_entry,
|
|
|
|
struct batadv_tt_global_entry,
|
|
|
|
common);
|
2016-01-17 18:01:26 +08:00
|
|
|
batadv_tt_global_entry_put(tt_global);
|
2011-04-27 20:28:07 +08:00
|
|
|
}
|
|
|
|
spin_unlock_bh(list_lock);
|
|
|
|
}
|
|
|
|
|
2012-05-12 08:09:32 +08:00
|
|
|
batadv_hash_destroy(hash);
|
2011-04-27 20:28:07 +08:00
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
bat_priv->tt.global_hash = NULL;
|
2010-12-13 19:19:28 +08:00
|
|
|
}
|
|
|
|
|
2012-06-06 04:31:31 +08:00
|
|
|
static bool
|
|
|
|
_batadv_is_ap_isolated(struct batadv_tt_local_entry *tt_local_entry,
|
|
|
|
struct batadv_tt_global_entry *tt_global_entry)
|
2011-07-07 21:35:36 +08:00
|
|
|
{
|
2012-06-04 04:19:21 +08:00
|
|
|
if (tt_local_entry->common.flags & BATADV_TT_CLIENT_WIFI &&
|
|
|
|
tt_global_entry->common.flags & BATADV_TT_CLIENT_WIFI)
|
2017-06-01 23:11:26 +08:00
|
|
|
return true;
|
2011-07-07 21:35:36 +08:00
|
|
|
|
2013-11-16 19:03:50 +08:00
|
|
|
/* check if the two clients are marked as isolated */
|
|
|
|
if (tt_local_entry->common.flags & BATADV_TT_CLIENT_ISOLA &&
|
|
|
|
tt_global_entry->common.flags & BATADV_TT_CLIENT_ISOLA)
|
2017-06-01 23:11:26 +08:00
|
|
|
return true;
|
2013-11-16 19:03:50 +08:00
|
|
|
|
2017-06-01 23:11:26 +08:00
|
|
|
return false;
|
2011-07-07 21:35:36 +08:00
|
|
|
}
|
|
|
|
|
2013-06-04 18:11:39 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_transtable_search() - get the mesh destination for a given client
|
2013-06-04 18:11:39 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @src: mac address of the source client
|
|
|
|
* @addr: mac address of the destination client
|
|
|
|
* @vid: VLAN identifier
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: a pointer to the originator that was selected as destination in the
|
2013-06-04 18:11:39 +08:00
|
|
|
* mesh for contacting the client 'addr', NULL otherwise.
|
|
|
|
* In case of multiple originators serving the same client, the function returns
|
|
|
|
* the best one (best in terms of metric towards the destination node).
|
|
|
|
*
|
|
|
|
* If the two clients are AP isolated the function returns NULL.
|
|
|
|
*/
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_orig_node *batadv_transtable_search(struct batadv_priv *bat_priv,
|
2015-05-27 00:34:26 +08:00
|
|
|
const u8 *src,
|
|
|
|
const u8 *addr,
|
2013-06-04 18:11:39 +08:00
|
|
|
unsigned short vid)
|
2010-12-13 19:19:28 +08:00
|
|
|
{
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_local_entry *tt_local_entry = NULL;
|
|
|
|
struct batadv_tt_global_entry *tt_global_entry = NULL;
|
|
|
|
struct batadv_orig_node *orig_node = NULL;
|
2012-10-07 19:34:15 +08:00
|
|
|
struct batadv_tt_orig_list_entry *best_entry;
|
2013-07-02 17:04:36 +08:00
|
|
|
|
2013-11-16 19:03:51 +08:00
|
|
|
if (src && batadv_vlan_ap_isola_get(bat_priv, vid)) {
|
2013-06-04 18:11:39 +08:00
|
|
|
tt_local_entry = batadv_tt_local_hash_find(bat_priv, src, vid);
|
2012-09-24 04:38:37 +08:00
|
|
|
if (!tt_local_entry ||
|
|
|
|
(tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING))
|
2011-07-07 21:35:37 +08:00
|
|
|
goto out;
|
|
|
|
}
|
2011-02-18 20:28:09 +08:00
|
|
|
|
2013-06-04 18:11:39 +08:00
|
|
|
tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
|
2011-05-05 14:42:45 +08:00
|
|
|
if (!tt_global_entry)
|
2011-02-18 20:28:10 +08:00
|
|
|
goto out;
|
2011-02-18 20:28:09 +08:00
|
|
|
|
2011-07-07 21:35:37 +08:00
|
|
|
/* check whether the clients should not communicate due to AP
|
2012-05-12 08:09:43 +08:00
|
|
|
* isolation
|
|
|
|
*/
|
2012-05-17 02:23:16 +08:00
|
|
|
if (tt_local_entry &&
|
|
|
|
_batadv_is_ap_isolated(tt_local_entry, tt_global_entry))
|
2011-07-07 21:35:37 +08:00
|
|
|
goto out;
|
|
|
|
|
2011-10-23 02:12:51 +08:00
|
|
|
rcu_read_lock();
|
2013-09-03 17:10:24 +08:00
|
|
|
best_entry = batadv_transtable_best_orig(bat_priv, tt_global_entry);
|
2011-10-23 02:12:51 +08:00
|
|
|
/* found anything? */
|
2012-10-07 19:34:15 +08:00
|
|
|
if (best_entry)
|
|
|
|
orig_node = best_entry->orig_node;
|
2016-01-16 17:29:56 +08:00
|
|
|
if (orig_node && !kref_get_unless_zero(&orig_node->refcount))
|
2011-10-23 02:12:51 +08:00
|
|
|
orig_node = NULL;
|
|
|
|
rcu_read_unlock();
|
2012-10-07 19:34:15 +08:00
|
|
|
|
2011-02-18 20:28:10 +08:00
|
|
|
out:
|
2021-08-09 01:11:08 +08:00
|
|
|
batadv_tt_global_entry_put(tt_global_entry);
|
|
|
|
batadv_tt_local_entry_put(tt_local_entry);
|
2011-07-07 21:35:37 +08:00
|
|
|
|
2011-02-18 20:28:10 +08:00
|
|
|
return orig_node;
|
2010-12-13 19:19:28 +08:00
|
|
|
}
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2013-04-24 22:37:51 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_crc() - calculates the checksum of the local table belonging
|
2013-04-24 22:37:51 +08:00
|
|
|
* to the given orig_node
|
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
2013-06-04 18:11:40 +08:00
|
|
|
* @orig_node: originator for which the CRC should be computed
|
2013-07-31 04:16:25 +08:00
|
|
|
* @vid: VLAN identifier for which the CRC32 has to be computed
|
2013-06-04 18:11:40 +08:00
|
|
|
*
|
|
|
|
* This function computes the checksum for the global table corresponding to a
|
|
|
|
* specific originator. In particular, the checksum is computed as follows: For
|
|
|
|
* each client connected to the originator the CRC32C of the MAC address and the
|
|
|
|
* VID is computed and then all the CRC32Cs of the various clients are xor'ed
|
|
|
|
* together.
|
|
|
|
*
|
|
|
|
* The idea behind is that CRC32C should be used as much as possible in order to
|
|
|
|
* produce a unique hash of the table, but since the order which is used to feed
|
|
|
|
* the CRC32C function affects the result and since every node in the network
|
|
|
|
* probably sorts the clients differently, the hash function cannot be directly
|
|
|
|
* computed over the entire table. Hence the CRC32C is used only on
|
|
|
|
* the single client entry, while all the results are then xor'ed together
|
|
|
|
* because the XOR operation can combine them all while trying to reduce the
|
|
|
|
* noise as much as possible.
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: the checksum of the global table of a given originator.
|
2013-04-24 22:37:51 +08:00
|
|
|
*/
|
2015-05-27 00:34:26 +08:00
|
|
|
static u32 batadv_tt_global_crc(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_orig_node *orig_node,
|
|
|
|
unsigned short vid)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
2012-07-16 04:26:51 +08:00
|
|
|
struct batadv_hashtable *hash = bat_priv->tt.global_hash;
|
2017-07-06 13:02:25 +08:00
|
|
|
struct batadv_tt_orig_list_entry *tt_orig;
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_common_entry *tt_common;
|
|
|
|
struct batadv_tt_global_entry *tt_global;
|
2011-04-27 20:27:44 +08:00
|
|
|
struct hlist_head *head;
|
2015-05-27 00:34:26 +08:00
|
|
|
u32 i, crc_tmp, crc = 0;
|
|
|
|
u8 flags;
|
2014-02-12 00:05:06 +08:00
|
|
|
__be16 tmp_vid;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
|
|
|
for (i = 0; i < hash->size; i++) {
|
|
|
|
head = &hash->table[i];
|
|
|
|
|
|
|
|
rcu_read_lock();
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_rcu(tt_common, head, hash_entry) {
|
2012-06-06 04:31:31 +08:00
|
|
|
tt_global = container_of(tt_common,
|
|
|
|
struct batadv_tt_global_entry,
|
|
|
|
common);
|
2013-07-31 04:16:25 +08:00
|
|
|
/* compute the CRC only for entries belonging to the
|
|
|
|
* VLAN identified by the vid passed as parameter
|
|
|
|
*/
|
|
|
|
if (tt_common->vid != vid)
|
|
|
|
continue;
|
|
|
|
|
2011-10-23 02:12:51 +08:00
|
|
|
/* Roaming clients are in the global table for
|
|
|
|
* consistency only. They don't have to be
|
|
|
|
* taken into account while computing the
|
|
|
|
* global crc
|
|
|
|
*/
|
2012-06-04 04:19:21 +08:00
|
|
|
if (tt_common->flags & BATADV_TT_CLIENT_ROAM)
|
2011-10-23 02:12:51 +08:00
|
|
|
continue;
|
2012-07-06 05:38:29 +08:00
|
|
|
/* Temporary clients have not been announced yet, so
|
|
|
|
* they have to be skipped while computing the global
|
|
|
|
* crc
|
|
|
|
*/
|
|
|
|
if (tt_common->flags & BATADV_TT_CLIENT_TEMP)
|
|
|
|
continue;
|
2011-10-23 02:12:51 +08:00
|
|
|
|
|
|
|
/* find out if this global entry is announced by this
|
|
|
|
* originator
|
|
|
|
*/
|
2017-07-06 13:02:25 +08:00
|
|
|
tt_orig = batadv_tt_global_orig_entry_find(tt_global,
|
|
|
|
orig_node);
|
|
|
|
if (!tt_orig)
|
2011-10-23 02:12:51 +08:00
|
|
|
continue;
|
|
|
|
|
2014-02-12 00:05:06 +08:00
|
|
|
/* use network order to read the VID: this ensures that
|
|
|
|
* every node reads the bytes in the same order.
|
|
|
|
*/
|
|
|
|
tmp_vid = htons(tt_common->vid);
|
|
|
|
crc_tmp = crc32c(0, &tmp_vid, sizeof(tmp_vid));
|
2013-10-13 08:50:20 +08:00
|
|
|
|
|
|
|
/* compute the CRC on flags that have to be kept in sync
|
|
|
|
* among nodes
|
|
|
|
*/
|
2017-07-06 13:02:25 +08:00
|
|
|
flags = tt_orig->flags;
|
2013-10-13 08:50:20 +08:00
|
|
|
crc_tmp = crc32c(crc_tmp, &flags, sizeof(flags));
|
|
|
|
|
2013-06-04 18:11:40 +08:00
|
|
|
crc ^= crc32c(crc_tmp, tt_common->addr, ETH_ALEN);
|
2017-07-06 13:02:25 +08:00
|
|
|
|
|
|
|
batadv_tt_orig_list_entry_put(tt_orig);
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
|
|
|
}
|
|
|
|
|
2013-04-24 22:37:51 +08:00
|
|
|
return crc;
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
|
2013-04-24 22:37:51 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_crc() - calculates the checksum of the local table
|
2013-04-24 22:37:51 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
2013-07-31 04:16:25 +08:00
|
|
|
* @vid: VLAN identifier for which the CRC32 has to be computed
|
2013-06-04 18:11:40 +08:00
|
|
|
*
|
|
|
|
* For details about the computation, please refer to the documentation for
|
|
|
|
* batadv_tt_global_crc().
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: the checksum of the local table
|
2013-04-24 22:37:51 +08:00
|
|
|
*/
|
2015-05-27 00:34:26 +08:00
|
|
|
static u32 batadv_tt_local_crc(struct batadv_priv *bat_priv,
|
|
|
|
unsigned short vid)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
2012-07-16 04:26:51 +08:00
|
|
|
struct batadv_hashtable *hash = bat_priv->tt.local_hash;
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_common_entry *tt_common;
|
2011-04-27 20:27:44 +08:00
|
|
|
struct hlist_head *head;
|
2015-05-27 00:34:26 +08:00
|
|
|
u32 i, crc_tmp, crc = 0;
|
|
|
|
u8 flags;
|
2014-02-12 00:05:06 +08:00
|
|
|
__be16 tmp_vid;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
|
|
|
for (i = 0; i < hash->size; i++) {
|
|
|
|
head = &hash->table[i];
|
|
|
|
|
|
|
|
rcu_read_lock();
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_rcu(tt_common, head, hash_entry) {
|
2013-07-31 04:16:25 +08:00
|
|
|
/* compute the CRC only for entries belonging to the
|
|
|
|
* VLAN identified by vid
|
|
|
|
*/
|
|
|
|
if (tt_common->vid != vid)
|
|
|
|
continue;
|
|
|
|
|
2011-07-07 07:40:58 +08:00
|
|
|
/* not yet committed clients have not to be taken into
|
2012-05-12 08:09:43 +08:00
|
|
|
* account while computing the CRC
|
|
|
|
*/
|
2012-06-04 04:19:21 +08:00
|
|
|
if (tt_common->flags & BATADV_TT_CLIENT_NEW)
|
2011-07-07 07:40:58 +08:00
|
|
|
continue;
|
2013-04-24 22:37:51 +08:00
|
|
|
|
2014-02-12 00:05:06 +08:00
|
|
|
/* use network order to read the VID: this ensures that
|
|
|
|
* every node reads the bytes in the same order.
|
|
|
|
*/
|
|
|
|
tmp_vid = htons(tt_common->vid);
|
|
|
|
crc_tmp = crc32c(0, &tmp_vid, sizeof(tmp_vid));
|
2013-10-13 08:50:20 +08:00
|
|
|
|
|
|
|
/* compute the CRC on flags that have to be kept in sync
|
|
|
|
* among nodes
|
|
|
|
*/
|
|
|
|
flags = tt_common->flags & BATADV_TT_SYNC_MASK;
|
|
|
|
crc_tmp = crc32c(crc_tmp, &flags, sizeof(flags));
|
|
|
|
|
2013-06-04 18:11:40 +08:00
|
|
|
crc ^= crc32c(crc_tmp, tt_common->addr, ETH_ALEN);
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
|
|
|
}
|
|
|
|
|
2013-04-24 22:37:51 +08:00
|
|
|
return crc;
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
|
2016-06-26 17:16:10 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_req_node_release() - free tt_req node entry
|
2016-06-26 17:16:10 +08:00
|
|
|
* @ref: kref pointer of the tt req_node entry
|
|
|
|
*/
|
|
|
|
static void batadv_tt_req_node_release(struct kref *ref)
|
|
|
|
{
|
|
|
|
struct batadv_tt_req_node *tt_req_node;
|
|
|
|
|
|
|
|
tt_req_node = container_of(ref, struct batadv_tt_req_node, refcount);
|
|
|
|
|
2016-06-25 22:44:06 +08:00
|
|
|
kmem_cache_free(batadv_tt_req_cache, tt_req_node);
|
2016-06-26 17:16:10 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_req_node_put() - decrement the tt_req_node refcounter and
|
2016-06-26 17:16:10 +08:00
|
|
|
* possibly release it
|
|
|
|
* @tt_req_node: tt_req_node to be free'd
|
|
|
|
*/
|
|
|
|
static void batadv_tt_req_node_put(struct batadv_tt_req_node *tt_req_node)
|
|
|
|
{
|
2021-08-09 01:56:17 +08:00
|
|
|
if (!tt_req_node)
|
|
|
|
return;
|
|
|
|
|
2016-06-26 17:16:10 +08:00
|
|
|
kref_put(&tt_req_node->refcount, batadv_tt_req_node_release);
|
|
|
|
}
|
|
|
|
|
2012-06-06 04:31:31 +08:00
|
|
|
static void batadv_tt_req_list_free(struct batadv_priv *bat_priv)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
2015-06-28 22:16:06 +08:00
|
|
|
struct batadv_tt_req_node *node;
|
|
|
|
struct hlist_node *safe;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_lock_bh(&bat_priv->tt.req_list_lock);
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2015-06-28 22:16:06 +08:00
|
|
|
hlist_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
|
|
|
|
hlist_del_init(&node->list);
|
2016-06-26 17:16:10 +08:00
|
|
|
batadv_tt_req_node_put(node);
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_unlock_bh(&bat_priv->tt.req_list_lock);
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
|
2012-06-06 04:31:31 +08:00
|
|
|
static void batadv_tt_save_orig_buffer(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_orig_node *orig_node,
|
2013-05-28 19:14:28 +08:00
|
|
|
const void *tt_buff,
|
2015-05-27 00:34:26 +08:00
|
|
|
u16 tt_buff_len)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
|
|
|
/* Replace the old buffer only if I received something in the
|
2012-05-12 08:09:43 +08:00
|
|
|
* last OGM (the OGM could carry no changes)
|
|
|
|
*/
|
2011-04-27 20:27:44 +08:00
|
|
|
spin_lock_bh(&orig_node->tt_buff_lock);
|
|
|
|
if (tt_buff_len > 0) {
|
|
|
|
kfree(orig_node->tt_buff);
|
|
|
|
orig_node->tt_buff_len = 0;
|
|
|
|
orig_node->tt_buff = kmalloc(tt_buff_len, GFP_ATOMIC);
|
|
|
|
if (orig_node->tt_buff) {
|
|
|
|
memcpy(orig_node->tt_buff, tt_buff, tt_buff_len);
|
|
|
|
orig_node->tt_buff_len = tt_buff_len;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
spin_unlock_bh(&orig_node->tt_buff_lock);
|
|
|
|
}
|
|
|
|
|
2012-06-06 04:31:31 +08:00
|
|
|
static void batadv_tt_req_purge(struct batadv_priv *bat_priv)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
2015-06-28 22:16:06 +08:00
|
|
|
struct batadv_tt_req_node *node;
|
|
|
|
struct hlist_node *safe;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_lock_bh(&bat_priv->tt.req_list_lock);
|
2015-06-28 22:16:06 +08:00
|
|
|
hlist_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
|
2012-06-04 04:19:17 +08:00
|
|
|
if (batadv_has_timed_out(node->issued_at,
|
|
|
|
BATADV_TT_REQUEST_TIMEOUT)) {
|
2015-06-28 22:16:06 +08:00
|
|
|
hlist_del_init(&node->list);
|
2016-06-26 17:16:10 +08:00
|
|
|
batadv_tt_req_node_put(node);
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
}
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_unlock_bh(&bat_priv->tt.req_list_lock);
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
|
2015-06-18 16:24:24 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_req_node_new() - search and possibly create a tt_req_node object
|
2015-06-18 16:24:24 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @orig_node: orig node this request is being issued for
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: the pointer to the new tt_req_node struct if no request
|
2015-06-18 16:24:24 +08:00
|
|
|
* has already been issued for this orig_node, NULL otherwise.
|
2012-05-12 08:09:43 +08:00
|
|
|
*/
|
2012-06-06 04:31:31 +08:00
|
|
|
static struct batadv_tt_req_node *
|
2015-06-18 16:24:24 +08:00
|
|
|
batadv_tt_req_node_new(struct batadv_priv *bat_priv,
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_orig_node *orig_node)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_req_node *tt_req_node_tmp, *tt_req_node = NULL;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_lock_bh(&bat_priv->tt.req_list_lock);
|
2015-06-28 22:16:06 +08:00
|
|
|
hlist_for_each_entry(tt_req_node_tmp, &bat_priv->tt.req_list, list) {
|
2012-05-12 19:48:58 +08:00
|
|
|
if (batadv_compare_eth(tt_req_node_tmp, orig_node) &&
|
|
|
|
!batadv_has_timed_out(tt_req_node_tmp->issued_at,
|
2012-06-04 04:19:17 +08:00
|
|
|
BATADV_TT_REQUEST_TIMEOUT))
|
2011-04-27 20:27:44 +08:00
|
|
|
goto unlock;
|
|
|
|
}
|
|
|
|
|
2016-06-25 22:44:06 +08:00
|
|
|
tt_req_node = kmem_cache_alloc(batadv_tt_req_cache, GFP_ATOMIC);
|
2011-04-27 20:27:44 +08:00
|
|
|
if (!tt_req_node)
|
|
|
|
goto unlock;
|
|
|
|
|
2016-06-26 17:16:10 +08:00
|
|
|
kref_init(&tt_req_node->refcount);
|
2014-01-22 07:42:11 +08:00
|
|
|
ether_addr_copy(tt_req_node->addr, orig_node->orig);
|
2011-04-27 20:27:44 +08:00
|
|
|
tt_req_node->issued_at = jiffies;
|
|
|
|
|
2016-06-26 17:16:10 +08:00
|
|
|
kref_get(&tt_req_node->refcount);
|
2015-06-28 22:16:06 +08:00
|
|
|
hlist_add_head(&tt_req_node->list, &bat_priv->tt.req_list);
|
2011-04-27 20:27:44 +08:00
|
|
|
unlock:
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_unlock_bh(&bat_priv->tt.req_list_lock);
|
2011-04-27 20:27:44 +08:00
|
|
|
return tt_req_node;
|
|
|
|
}
|
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
/**
|
2018-05-11 01:44:28 +08:00
|
|
|
* batadv_tt_local_valid() - verify local tt entry and get flags
|
2013-04-23 21:40:02 +08:00
|
|
|
* @entry_ptr: to be checked local tt entry
|
|
|
|
* @data_ptr: not used but definition required to satisfy the callback prototype
|
2018-05-11 01:44:28 +08:00
|
|
|
* @flags: a pointer to store TT flags for this client to
|
|
|
|
*
|
|
|
|
* Checks the validity of the given local TT entry. If it is, then the provided
|
|
|
|
* flags pointer is updated.
|
2013-04-23 21:40:02 +08:00
|
|
|
*
|
2016-02-23 04:02:39 +08:00
|
|
|
* Return: true if the entry is a valid, false otherwise.
|
2013-04-23 21:40:02 +08:00
|
|
|
*/
|
2018-05-11 01:44:28 +08:00
|
|
|
static bool batadv_tt_local_valid(const void *entry_ptr,
|
|
|
|
const void *data_ptr,
|
|
|
|
u8 *flags)
|
2011-07-07 07:40:58 +08:00
|
|
|
{
|
2012-06-06 04:31:31 +08:00
|
|
|
const struct batadv_tt_common_entry *tt_common_entry = entry_ptr;
|
2011-07-07 07:40:58 +08:00
|
|
|
|
2012-06-04 04:19:21 +08:00
|
|
|
if (tt_common_entry->flags & BATADV_TT_CLIENT_NEW)
|
2016-02-23 04:02:39 +08:00
|
|
|
return false;
|
2018-05-11 01:44:28 +08:00
|
|
|
|
|
|
|
if (flags)
|
|
|
|
*flags = tt_common_entry->flags;
|
|
|
|
|
2016-02-23 04:02:39 +08:00
|
|
|
return true;
|
2011-07-07 07:40:58 +08:00
|
|
|
}
|
|
|
|
|
2018-05-11 01:44:28 +08:00
|
|
|
/**
|
|
|
|
* batadv_tt_global_valid() - verify global tt entry and get flags
|
|
|
|
* @entry_ptr: to be checked global tt entry
|
|
|
|
* @data_ptr: an orig_node object (may be NULL)
|
|
|
|
* @flags: a pointer to store TT flags for this client to
|
|
|
|
*
|
|
|
|
* Checks the validity of the given global TT entry. If it is, then the provided
|
|
|
|
* flags pointer is updated either with the common (summed) TT flags if data_ptr
|
|
|
|
* is NULL or the specific, per originator TT flags otherwise.
|
|
|
|
*
|
|
|
|
* Return: true if the entry is a valid, false otherwise.
|
|
|
|
*/
|
2016-02-23 04:02:39 +08:00
|
|
|
static bool batadv_tt_global_valid(const void *entry_ptr,
|
2018-05-11 01:44:28 +08:00
|
|
|
const void *data_ptr,
|
|
|
|
u8 *flags)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
2012-06-06 04:31:31 +08:00
|
|
|
const struct batadv_tt_common_entry *tt_common_entry = entry_ptr;
|
|
|
|
const struct batadv_tt_global_entry *tt_global_entry;
|
|
|
|
const struct batadv_orig_node *orig_node = data_ptr;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2012-07-06 05:38:29 +08:00
|
|
|
if (tt_common_entry->flags & BATADV_TT_CLIENT_ROAM ||
|
|
|
|
tt_common_entry->flags & BATADV_TT_CLIENT_TEMP)
|
2016-02-23 04:02:39 +08:00
|
|
|
return false;
|
2011-04-27 20:27:57 +08:00
|
|
|
|
2012-06-06 04:31:31 +08:00
|
|
|
tt_global_entry = container_of(tt_common_entry,
|
|
|
|
struct batadv_tt_global_entry,
|
2011-10-30 19:17:33 +08:00
|
|
|
common);
|
|
|
|
|
2018-05-11 01:44:28 +08:00
|
|
|
return batadv_tt_global_entry_has_orig(tt_global_entry, orig_node,
|
|
|
|
flags);
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_tvlv_generate() - fill the tvlv buff with the tt entries from the
|
2013-07-31 04:16:25 +08:00
|
|
|
* specified tt hash
|
2013-04-23 21:40:02 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @hash: hash table containing the tt entries
|
|
|
|
* @tt_len: expected tvlv tt data buffer length in number of bytes
|
2013-07-31 04:16:25 +08:00
|
|
|
* @tvlv_buff: pointer to the buffer to fill with the TT data
|
2018-05-11 01:44:28 +08:00
|
|
|
* @valid_cb: function to filter tt change entries and to return TT flags
|
2013-04-23 21:40:02 +08:00
|
|
|
* @cb_data: data passed to the filter function as argument
|
2018-05-11 01:44:28 +08:00
|
|
|
*
|
|
|
|
* Fills the tvlv buff with the tt entries from the specified hash. If valid_cb
|
|
|
|
* is not provided then this becomes a no-op.
|
2013-04-23 21:40:02 +08:00
|
|
|
*/
|
2013-07-31 04:16:25 +08:00
|
|
|
static void batadv_tt_tvlv_generate(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_hashtable *hash,
|
2015-05-27 00:34:26 +08:00
|
|
|
void *tvlv_buff, u16 tt_len,
|
2016-02-23 04:02:39 +08:00
|
|
|
bool (*valid_cb)(const void *,
|
2018-05-11 01:44:28 +08:00
|
|
|
const void *,
|
|
|
|
u8 *flags),
|
2013-07-31 04:16:25 +08:00
|
|
|
void *cb_data)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_common_entry *tt_common_entry;
|
2013-04-23 21:40:02 +08:00
|
|
|
struct batadv_tvlv_tt_change *tt_change;
|
2011-04-27 20:27:44 +08:00
|
|
|
struct hlist_head *head;
|
2015-05-27 00:34:26 +08:00
|
|
|
u16 tt_tot, tt_num_entries = 0;
|
2018-05-11 01:44:28 +08:00
|
|
|
u8 flags;
|
|
|
|
bool ret;
|
2015-05-27 00:34:26 +08:00
|
|
|
u32 i;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2013-05-28 19:14:27 +08:00
|
|
|
tt_tot = batadv_tt_entries(tt_len);
|
2022-04-21 23:48:29 +08:00
|
|
|
tt_change = tvlv_buff;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2018-05-11 01:44:28 +08:00
|
|
|
if (!valid_cb)
|
|
|
|
return;
|
|
|
|
|
2011-04-27 20:27:44 +08:00
|
|
|
rcu_read_lock();
|
|
|
|
for (i = 0; i < hash->size; i++) {
|
|
|
|
head = &hash->table[i];
|
|
|
|
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_rcu(tt_common_entry,
|
2011-04-27 20:27:44 +08:00
|
|
|
head, hash_entry) {
|
2013-04-23 21:40:02 +08:00
|
|
|
if (tt_tot == tt_num_entries)
|
2011-04-27 20:27:44 +08:00
|
|
|
break;
|
|
|
|
|
2018-05-11 01:44:28 +08:00
|
|
|
ret = valid_cb(tt_common_entry, cb_data, &flags);
|
|
|
|
if (!ret)
|
2011-04-27 20:27:44 +08:00
|
|
|
continue;
|
|
|
|
|
2014-01-22 07:42:11 +08:00
|
|
|
ether_addr_copy(tt_change->addr, tt_common_entry->addr);
|
2018-05-11 01:44:28 +08:00
|
|
|
tt_change->flags = flags;
|
2013-06-04 18:11:39 +08:00
|
|
|
tt_change->vid = htons(tt_common_entry->vid);
|
2013-12-15 20:26:55 +08:00
|
|
|
memset(tt_change->reserved, 0,
|
|
|
|
sizeof(tt_change->reserved));
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
tt_num_entries++;
|
2011-04-27 20:27:44 +08:00
|
|
|
tt_change++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
2013-07-31 04:16:25 +08:00
|
|
|
}
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_check_crc() - check if all the CRCs are correct
|
2013-07-31 04:16:25 +08:00
|
|
|
* @orig_node: originator for which the CRCs have to be checked
|
|
|
|
* @tt_vlan: pointer to the first tvlv VLAN entry
|
|
|
|
* @num_vlan: number of tvlv VLAN entries
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: true if all the received CRCs match the locally stored ones, false
|
2013-07-31 04:16:25 +08:00
|
|
|
* otherwise
|
|
|
|
*/
|
|
|
|
static bool batadv_tt_global_check_crc(struct batadv_orig_node *orig_node,
|
|
|
|
struct batadv_tvlv_tt_vlan_data *tt_vlan,
|
2015-05-27 00:34:26 +08:00
|
|
|
u16 num_vlan)
|
2013-07-31 04:16:25 +08:00
|
|
|
{
|
|
|
|
struct batadv_tvlv_tt_vlan_data *tt_vlan_tmp;
|
|
|
|
struct batadv_orig_node_vlan *vlan;
|
2015-09-03 02:09:56 +08:00
|
|
|
int i, orig_num_vlan;
|
2015-05-27 00:34:26 +08:00
|
|
|
u32 crc;
|
2013-07-31 04:16:25 +08:00
|
|
|
|
|
|
|
/* check if each received CRC matches the locally stored one */
|
|
|
|
for (i = 0; i < num_vlan; i++) {
|
|
|
|
tt_vlan_tmp = tt_vlan + i;
|
|
|
|
|
|
|
|
/* if orig_node is a backbone node for this VLAN, don't check
|
|
|
|
* the CRC as we ignore all the global entries over it
|
|
|
|
*/
|
|
|
|
if (batadv_bla_is_backbone_gw_orig(orig_node->bat_priv,
|
2013-08-08 00:28:56 +08:00
|
|
|
orig_node->orig,
|
|
|
|
ntohs(tt_vlan_tmp->vid)))
|
2013-07-31 04:16:25 +08:00
|
|
|
continue;
|
|
|
|
|
|
|
|
vlan = batadv_orig_node_vlan_get(orig_node,
|
|
|
|
ntohs(tt_vlan_tmp->vid));
|
|
|
|
if (!vlan)
|
|
|
|
return false;
|
|
|
|
|
2014-01-28 09:06:47 +08:00
|
|
|
crc = vlan->tt.crc;
|
2016-01-17 18:01:24 +08:00
|
|
|
batadv_orig_node_vlan_put(vlan);
|
2014-01-28 09:06:47 +08:00
|
|
|
|
|
|
|
if (crc != ntohl(tt_vlan_tmp->crc))
|
2013-07-31 04:16:25 +08:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2015-09-03 02:09:56 +08:00
|
|
|
/* check if any excess VLANs exist locally for the originator
|
|
|
|
* which are not mentioned in the TVLV from the originator.
|
|
|
|
*/
|
|
|
|
rcu_read_lock();
|
|
|
|
orig_num_vlan = 0;
|
|
|
|
hlist_for_each_entry_rcu(vlan, &orig_node->vlan_list, list)
|
|
|
|
orig_num_vlan++;
|
|
|
|
rcu_read_unlock();
|
|
|
|
|
|
|
|
if (orig_num_vlan > num_vlan)
|
|
|
|
return false;
|
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_update_crc() - update all the local CRCs
|
2013-07-31 04:16:25 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
*/
|
|
|
|
static void batadv_tt_local_update_crc(struct batadv_priv *bat_priv)
|
|
|
|
{
|
|
|
|
struct batadv_softif_vlan *vlan;
|
|
|
|
|
|
|
|
/* recompute the global CRC for each VLAN */
|
|
|
|
rcu_read_lock();
|
|
|
|
hlist_for_each_entry_rcu(vlan, &bat_priv->softif_vlan_list, list) {
|
|
|
|
vlan->tt.crc = batadv_tt_local_crc(bat_priv, vlan->vid);
|
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_update_crc() - update all the global CRCs for this orig_node
|
2013-07-31 04:16:25 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @orig_node: the orig_node for which the CRCs have to be updated
|
|
|
|
*/
|
|
|
|
static void batadv_tt_global_update_crc(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_orig_node *orig_node)
|
|
|
|
{
|
|
|
|
struct batadv_orig_node_vlan *vlan;
|
2015-05-27 00:34:26 +08:00
|
|
|
u32 crc;
|
2013-07-31 04:16:25 +08:00
|
|
|
|
|
|
|
/* recompute the global CRC for each VLAN */
|
|
|
|
rcu_read_lock();
|
2015-06-22 00:30:22 +08:00
|
|
|
hlist_for_each_entry_rcu(vlan, &orig_node->vlan_list, list) {
|
2013-07-31 04:16:25 +08:00
|
|
|
/* if orig_node is a backbone node for this VLAN, don't compute
|
|
|
|
* the CRC as we ignore all the global entries over it
|
|
|
|
*/
|
2013-08-08 00:28:56 +08:00
|
|
|
if (batadv_bla_is_backbone_gw_orig(bat_priv, orig_node->orig,
|
|
|
|
vlan->vid))
|
2013-07-31 04:16:25 +08:00
|
|
|
continue;
|
|
|
|
|
|
|
|
crc = batadv_tt_global_crc(bat_priv, orig_node, vlan->vid);
|
|
|
|
vlan->tt.crc = crc;
|
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
|
2013-04-24 22:37:51 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_send_tt_request() - send a TT Request message to a given node
|
2013-04-24 22:37:51 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @dst_orig_node: the destination of the message
|
|
|
|
* @ttvn: the version number that the source of the message is looking for
|
2013-07-31 04:16:25 +08:00
|
|
|
* @tt_vlan: pointer to the first tvlv VLAN object to request
|
|
|
|
* @num_vlan: number of tvlv VLAN entries
|
2013-04-24 22:37:51 +08:00
|
|
|
* @full_table: ask for the entire translation table if true, while only for the
|
|
|
|
* last TT diff otherwise
|
2015-11-17 16:40:52 +08:00
|
|
|
*
|
|
|
|
* Return: true if the TT Request was sent, false otherwise
|
2013-04-24 22:37:51 +08:00
|
|
|
*/
|
2016-02-23 04:02:39 +08:00
|
|
|
static bool batadv_send_tt_request(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_orig_node *dst_orig_node,
|
|
|
|
u8 ttvn,
|
|
|
|
struct batadv_tvlv_tt_vlan_data *tt_vlan,
|
|
|
|
u16 num_vlan, bool full_table)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
2013-04-23 21:40:02 +08:00
|
|
|
struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_req_node *tt_req_node = NULL;
|
2013-07-31 04:16:25 +08:00
|
|
|
struct batadv_tvlv_tt_vlan_data *tt_vlan_req;
|
|
|
|
struct batadv_hard_iface *primary_if;
|
2013-04-23 21:40:02 +08:00
|
|
|
bool ret = false;
|
2013-07-31 04:16:25 +08:00
|
|
|
int i, size;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2012-05-12 19:48:54 +08:00
|
|
|
primary_if = batadv_primary_if_get_selected(bat_priv);
|
2011-04-27 20:27:44 +08:00
|
|
|
if (!primary_if)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
/* The new tt_req will be issued only if I'm not waiting for a
|
2012-05-12 08:09:43 +08:00
|
|
|
* reply from the same orig_node yet
|
|
|
|
*/
|
2015-06-18 16:24:24 +08:00
|
|
|
tt_req_node = batadv_tt_req_node_new(bat_priv, dst_orig_node);
|
2011-04-27 20:27:44 +08:00
|
|
|
if (!tt_req_node)
|
|
|
|
goto out;
|
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
size = sizeof(*tvlv_tt_data) + sizeof(*tt_vlan_req) * num_vlan;
|
|
|
|
tvlv_tt_data = kzalloc(size, GFP_ATOMIC);
|
2013-04-23 21:40:02 +08:00
|
|
|
if (!tvlv_tt_data)
|
2011-04-27 20:27:44 +08:00
|
|
|
goto out;
|
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
tvlv_tt_data->flags = BATADV_TT_REQUEST;
|
|
|
|
tvlv_tt_data->ttvn = ttvn;
|
2013-07-31 04:16:25 +08:00
|
|
|
tvlv_tt_data->num_vlan = htons(num_vlan);
|
|
|
|
|
|
|
|
/* send all the CRCs within the request. This is needed by intermediate
|
|
|
|
* nodes to ensure they have the correct table before replying
|
|
|
|
*/
|
|
|
|
tt_vlan_req = (struct batadv_tvlv_tt_vlan_data *)(tvlv_tt_data + 1);
|
|
|
|
for (i = 0; i < num_vlan; i++) {
|
|
|
|
tt_vlan_req->vid = tt_vlan->vid;
|
|
|
|
tt_vlan_req->crc = tt_vlan->crc;
|
|
|
|
|
|
|
|
tt_vlan_req++;
|
|
|
|
tt_vlan++;
|
|
|
|
}
|
2011-04-27 20:27:44 +08:00
|
|
|
|
|
|
|
if (full_table)
|
2013-04-23 21:40:02 +08:00
|
|
|
tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2012-10-16 22:13:48 +08:00
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv, "Sending TT_REQUEST to %pM [%c]\n",
|
2013-04-23 21:40:02 +08:00
|
|
|
dst_orig_node->orig, full_table ? 'F' : '.');
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2012-06-04 04:19:20 +08:00
|
|
|
batadv_inc_counter(bat_priv, BATADV_CNT_TT_REQUEST_TX);
|
2013-04-23 21:40:02 +08:00
|
|
|
batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
|
|
|
|
dst_orig_node->orig, BATADV_TVLV_TT, 1,
|
2013-07-31 04:16:25 +08:00
|
|
|
tvlv_tt_data, size);
|
2013-04-23 21:40:02 +08:00
|
|
|
ret = true;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
|
|
|
out:
|
2021-08-09 01:11:08 +08:00
|
|
|
batadv_hardif_put(primary_if);
|
2016-06-26 17:16:10 +08:00
|
|
|
|
2011-04-27 20:27:44 +08:00
|
|
|
if (ret && tt_req_node) {
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_lock_bh(&bat_priv->tt.req_list_lock);
|
2016-06-26 17:16:10 +08:00
|
|
|
if (!hlist_unhashed(&tt_req_node->list)) {
|
|
|
|
hlist_del_init(&tt_req_node->list);
|
|
|
|
batadv_tt_req_node_put(tt_req_node);
|
|
|
|
}
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_unlock_bh(&bat_priv->tt.req_list_lock);
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
2016-06-26 17:16:10 +08:00
|
|
|
|
2021-08-09 01:11:08 +08:00
|
|
|
batadv_tt_req_node_put(tt_req_node);
|
2016-06-26 17:16:10 +08:00
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
kfree(tvlv_tt_data);
|
2011-04-27 20:27:44 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_send_other_tt_response() - send reply to tt request concerning another
|
2013-04-23 21:40:02 +08:00
|
|
|
* node's translation table
|
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @tt_data: tt data containing the tt request information
|
|
|
|
* @req_src: mac address of tt request sender
|
|
|
|
* @req_dst: mac address of tt request recipient
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: true if tt request reply was sent, false otherwise.
|
2013-04-23 21:40:02 +08:00
|
|
|
*/
|
|
|
|
static bool batadv_send_other_tt_response(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_tvlv_tt_data *tt_data,
|
2015-05-27 00:34:26 +08:00
|
|
|
u8 *req_src, u8 *req_dst)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
2012-10-07 18:02:22 +08:00
|
|
|
struct batadv_orig_node *req_dst_orig_node;
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_orig_node *res_dst_orig_node = NULL;
|
2013-07-31 04:16:25 +08:00
|
|
|
struct batadv_tvlv_tt_change *tt_change;
|
2013-04-23 21:40:02 +08:00
|
|
|
struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
|
2013-07-31 04:16:25 +08:00
|
|
|
struct batadv_tvlv_tt_vlan_data *tt_vlan;
|
2013-04-23 21:40:02 +08:00
|
|
|
bool ret = false, full_table;
|
2015-05-27 00:34:26 +08:00
|
|
|
u8 orig_ttvn, req_ttvn;
|
|
|
|
u16 tvlv_len;
|
|
|
|
s32 tt_len;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2012-06-04 04:19:22 +08:00
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv,
|
2012-05-12 19:48:58 +08:00
|
|
|
"Received TT_REQUEST from %pM for ttvn: %u (%pM) [%c]\n",
|
2013-04-23 21:40:02 +08:00
|
|
|
req_src, tt_data->ttvn, req_dst,
|
2015-04-24 00:22:24 +08:00
|
|
|
((tt_data->flags & BATADV_TT_FULL_TABLE) ? 'F' : '.'));
|
2011-04-27 20:27:44 +08:00
|
|
|
|
|
|
|
/* Let's get the orig node of the REAL destination */
|
2013-04-23 21:40:02 +08:00
|
|
|
req_dst_orig_node = batadv_orig_hash_find(bat_priv, req_dst);
|
2011-04-27 20:27:44 +08:00
|
|
|
if (!req_dst_orig_node)
|
|
|
|
goto out;
|
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
res_dst_orig_node = batadv_orig_hash_find(bat_priv, req_src);
|
2011-04-27 20:27:44 +08:00
|
|
|
if (!res_dst_orig_node)
|
|
|
|
goto out;
|
|
|
|
|
2015-05-27 00:34:26 +08:00
|
|
|
orig_ttvn = (u8)atomic_read(&req_dst_orig_node->last_ttvn);
|
2013-04-23 21:40:02 +08:00
|
|
|
req_ttvn = tt_data->ttvn;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(tt_data + 1);
|
2013-04-23 21:40:02 +08:00
|
|
|
/* this node doesn't have the requested data */
|
2011-04-27 20:27:44 +08:00
|
|
|
if (orig_ttvn != req_ttvn ||
|
2013-07-31 04:16:25 +08:00
|
|
|
!batadv_tt_global_check_crc(req_dst_orig_node, tt_vlan,
|
|
|
|
ntohs(tt_data->num_vlan)))
|
2011-04-27 20:27:44 +08:00
|
|
|
goto out;
|
|
|
|
|
2011-07-09 23:52:13 +08:00
|
|
|
/* If the full table has been explicitly requested */
|
2013-04-23 21:40:02 +08:00
|
|
|
if (tt_data->flags & BATADV_TT_FULL_TABLE ||
|
2011-04-27 20:27:44 +08:00
|
|
|
!req_dst_orig_node->tt_buff)
|
|
|
|
full_table = true;
|
|
|
|
else
|
|
|
|
full_table = false;
|
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
/* TT fragmentation hasn't been implemented yet, so send as many
|
|
|
|
* TT entries fit a single packet as possible only
|
2012-05-12 08:09:43 +08:00
|
|
|
*/
|
2011-04-27 20:27:44 +08:00
|
|
|
if (!full_table) {
|
|
|
|
spin_lock_bh(&req_dst_orig_node->tt_buff_lock);
|
|
|
|
tt_len = req_dst_orig_node->tt_buff_len;
|
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
tvlv_len = batadv_tt_prepare_tvlv_global_data(req_dst_orig_node,
|
|
|
|
&tvlv_tt_data,
|
|
|
|
&tt_change,
|
|
|
|
&tt_len);
|
|
|
|
if (!tt_len)
|
2011-04-27 20:27:44 +08:00
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
/* Copy the last orig_node's OGM buffer */
|
2013-07-31 04:16:25 +08:00
|
|
|
memcpy(tt_change, req_dst_orig_node->tt_buff,
|
2011-04-27 20:27:44 +08:00
|
|
|
req_dst_orig_node->tt_buff_len);
|
|
|
|
spin_unlock_bh(&req_dst_orig_node->tt_buff_lock);
|
|
|
|
} else {
|
2013-07-31 04:16:25 +08:00
|
|
|
/* allocate the tvlv, put the tt_data and all the tt_vlan_data
|
|
|
|
* in the initial part
|
|
|
|
*/
|
|
|
|
tt_len = -1;
|
|
|
|
tvlv_len = batadv_tt_prepare_tvlv_global_data(req_dst_orig_node,
|
|
|
|
&tvlv_tt_data,
|
|
|
|
&tt_change,
|
|
|
|
&tt_len);
|
|
|
|
if (!tt_len)
|
2011-04-27 20:27:44 +08:00
|
|
|
goto out;
|
2013-07-31 04:16:25 +08:00
|
|
|
|
|
|
|
/* fill the rest of the tvlv with the real TT entries */
|
|
|
|
batadv_tt_tvlv_generate(bat_priv, bat_priv->tt.global_hash,
|
|
|
|
tt_change, tt_len,
|
|
|
|
batadv_tt_global_valid,
|
|
|
|
req_dst_orig_node);
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
|
2013-05-27 15:33:25 +08:00
|
|
|
/* Don't send the response, if larger than fragmented packet. */
|
|
|
|
tt_len = sizeof(struct batadv_unicast_tvlv_packet) + tvlv_len;
|
|
|
|
if (tt_len > atomic_read(&bat_priv->packet_size_max)) {
|
|
|
|
net_ratelimited_function(batadv_info, bat_priv->soft_iface,
|
|
|
|
"Ignoring TT_REQUEST from %pM; Response size exceeds max packet size.\n",
|
|
|
|
res_dst_orig_node->orig);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
tvlv_tt_data->flags = BATADV_TT_RESPONSE;
|
|
|
|
tvlv_tt_data->ttvn = req_ttvn;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
|
|
|
if (full_table)
|
2013-04-23 21:40:02 +08:00
|
|
|
tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2012-06-04 04:19:22 +08:00
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv,
|
2013-04-23 21:40:02 +08:00
|
|
|
"Sending TT_RESPONSE %pM for %pM [%c] (ttvn: %u)\n",
|
|
|
|
res_dst_orig_node->orig, req_dst_orig_node->orig,
|
|
|
|
full_table ? 'F' : '.', req_ttvn);
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2012-06-04 04:19:20 +08:00
|
|
|
batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_TX);
|
2012-04-20 23:02:45 +08:00
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
batadv_tvlv_unicast_send(bat_priv, req_dst_orig_node->orig,
|
2013-07-31 04:16:25 +08:00
|
|
|
req_src, BATADV_TVLV_TT, 1, tvlv_tt_data,
|
|
|
|
tvlv_len);
|
2013-04-20 19:54:39 +08:00
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
ret = true;
|
2011-04-27 20:27:44 +08:00
|
|
|
goto out;
|
|
|
|
|
|
|
|
unlock:
|
|
|
|
spin_unlock_bh(&req_dst_orig_node->tt_buff_lock);
|
|
|
|
|
|
|
|
out:
|
2021-08-09 01:11:08 +08:00
|
|
|
batadv_orig_node_put(res_dst_orig_node);
|
|
|
|
batadv_orig_node_put(req_dst_orig_node);
|
2013-04-23 21:40:02 +08:00
|
|
|
kfree(tvlv_tt_data);
|
2011-04-27 20:27:44 +08:00
|
|
|
return ret;
|
|
|
|
}
|
2012-06-06 04:31:30 +08:00
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_send_my_tt_response() - send reply to tt request concerning this
|
|
|
|
* node's translation table
|
2013-04-23 21:40:02 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @tt_data: tt data containing the tt request information
|
|
|
|
* @req_src: mac address of tt request sender
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: true if tt request reply was sent, false otherwise.
|
2013-04-23 21:40:02 +08:00
|
|
|
*/
|
|
|
|
static bool batadv_send_my_tt_response(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_tvlv_tt_data *tt_data,
|
2015-05-27 00:34:26 +08:00
|
|
|
u8 *req_src)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
2013-04-23 21:40:02 +08:00
|
|
|
struct batadv_tvlv_tt_data *tvlv_tt_data = NULL;
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_hard_iface *primary_if = NULL;
|
2013-07-31 04:16:25 +08:00
|
|
|
struct batadv_tvlv_tt_change *tt_change;
|
|
|
|
struct batadv_orig_node *orig_node;
|
2015-05-27 00:34:26 +08:00
|
|
|
u8 my_ttvn, req_ttvn;
|
|
|
|
u16 tvlv_len;
|
2011-04-27 20:27:44 +08:00
|
|
|
bool full_table;
|
2015-05-27 00:34:26 +08:00
|
|
|
s32 tt_len;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2012-06-04 04:19:22 +08:00
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv,
|
2012-05-12 19:48:58 +08:00
|
|
|
"Received TT_REQUEST from %pM for ttvn: %u (me) [%c]\n",
|
2013-04-23 21:40:02 +08:00
|
|
|
req_src, tt_data->ttvn,
|
2015-04-24 00:22:24 +08:00
|
|
|
((tt_data->flags & BATADV_TT_FULL_TABLE) ? 'F' : '.'));
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2013-07-31 04:16:24 +08:00
|
|
|
spin_lock_bh(&bat_priv->tt.commit_lock);
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2015-05-27 00:34:26 +08:00
|
|
|
my_ttvn = (u8)atomic_read(&bat_priv->tt.vn);
|
2013-04-23 21:40:02 +08:00
|
|
|
req_ttvn = tt_data->ttvn;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
orig_node = batadv_orig_hash_find(bat_priv, req_src);
|
2011-04-27 20:27:44 +08:00
|
|
|
if (!orig_node)
|
|
|
|
goto out;
|
|
|
|
|
2012-05-12 19:48:54 +08:00
|
|
|
primary_if = batadv_primary_if_get_selected(bat_priv);
|
2011-04-27 20:27:44 +08:00
|
|
|
if (!primary_if)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
/* If the full table has been explicitly requested or the gap
|
2012-05-12 08:09:43 +08:00
|
|
|
* is too big send the whole local translation table
|
|
|
|
*/
|
2013-04-23 21:40:02 +08:00
|
|
|
if (tt_data->flags & BATADV_TT_FULL_TABLE || my_ttvn != req_ttvn ||
|
2012-07-16 04:26:51 +08:00
|
|
|
!bat_priv->tt.last_changeset)
|
2011-04-27 20:27:44 +08:00
|
|
|
full_table = true;
|
|
|
|
else
|
|
|
|
full_table = false;
|
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
/* TT fragmentation hasn't been implemented yet, so send as many
|
|
|
|
* TT entries fit a single packet as possible only
|
2012-05-12 08:09:43 +08:00
|
|
|
*/
|
2011-04-27 20:27:44 +08:00
|
|
|
if (!full_table) {
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_lock_bh(&bat_priv->tt.last_changeset_lock);
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
tt_len = bat_priv->tt.last_changeset_len;
|
|
|
|
tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv,
|
|
|
|
&tvlv_tt_data,
|
|
|
|
&tt_change,
|
|
|
|
&tt_len);
|
2016-12-01 04:47:09 +08:00
|
|
|
if (!tt_len || !tvlv_len)
|
2011-04-27 20:27:44 +08:00
|
|
|
goto unlock;
|
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
/* Copy the last orig_node's OGM buffer */
|
2013-07-31 04:16:25 +08:00
|
|
|
memcpy(tt_change, bat_priv->tt.last_changeset,
|
2012-07-16 04:26:51 +08:00
|
|
|
bat_priv->tt.last_changeset_len);
|
|
|
|
spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
|
2011-04-27 20:27:44 +08:00
|
|
|
} else {
|
2015-05-27 00:34:26 +08:00
|
|
|
req_ttvn = (u8)atomic_read(&bat_priv->tt.vn);
|
2013-04-23 21:40:02 +08:00
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
/* allocate the tvlv, put the tt_data and all the tt_vlan_data
|
|
|
|
* in the initial part
|
|
|
|
*/
|
|
|
|
tt_len = -1;
|
|
|
|
tvlv_len = batadv_tt_prepare_tvlv_local_data(bat_priv,
|
|
|
|
&tvlv_tt_data,
|
|
|
|
&tt_change,
|
|
|
|
&tt_len);
|
2016-12-01 04:47:09 +08:00
|
|
|
if (!tt_len || !tvlv_len)
|
2011-04-27 20:27:44 +08:00
|
|
|
goto out;
|
2013-07-31 04:16:25 +08:00
|
|
|
|
|
|
|
/* fill the rest of the tvlv with the real TT entries */
|
|
|
|
batadv_tt_tvlv_generate(bat_priv, bat_priv->tt.local_hash,
|
|
|
|
tt_change, tt_len,
|
|
|
|
batadv_tt_local_valid, NULL);
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
tvlv_tt_data->flags = BATADV_TT_RESPONSE;
|
|
|
|
tvlv_tt_data->ttvn = req_ttvn;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
|
|
|
if (full_table)
|
2013-04-23 21:40:02 +08:00
|
|
|
tvlv_tt_data->flags |= BATADV_TT_FULL_TABLE;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2012-06-04 04:19:22 +08:00
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv,
|
2013-04-23 21:40:02 +08:00
|
|
|
"Sending TT_RESPONSE to %pM [%c] (ttvn: %u)\n",
|
|
|
|
orig_node->orig, full_table ? 'F' : '.', req_ttvn);
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2012-06-04 04:19:20 +08:00
|
|
|
batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_TX);
|
2012-04-20 23:02:45 +08:00
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
|
2013-07-31 04:16:25 +08:00
|
|
|
req_src, BATADV_TVLV_TT, 1, tvlv_tt_data,
|
|
|
|
tvlv_len);
|
2013-04-23 21:40:02 +08:00
|
|
|
|
2011-04-27 20:27:44 +08:00
|
|
|
goto out;
|
|
|
|
|
|
|
|
unlock:
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_unlock_bh(&bat_priv->tt.last_changeset_lock);
|
2011-04-27 20:27:44 +08:00
|
|
|
out:
|
2013-07-31 04:16:24 +08:00
|
|
|
spin_unlock_bh(&bat_priv->tt.commit_lock);
|
2021-08-09 01:11:08 +08:00
|
|
|
batadv_orig_node_put(orig_node);
|
|
|
|
batadv_hardif_put(primary_if);
|
2013-04-23 21:40:02 +08:00
|
|
|
kfree(tvlv_tt_data);
|
|
|
|
/* The packet was for this host, so it doesn't need to be re-routed */
|
2011-04-27 20:27:44 +08:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_send_tt_response() - send reply to tt request
|
2013-04-23 21:40:02 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @tt_data: tt data containing the tt request information
|
|
|
|
* @req_src: mac address of tt request sender
|
|
|
|
* @req_dst: mac address of tt request recipient
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: true if tt request reply was sent, false otherwise.
|
2013-04-23 21:40:02 +08:00
|
|
|
*/
|
|
|
|
static bool batadv_send_tt_response(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_tvlv_tt_data *tt_data,
|
2015-05-27 00:34:26 +08:00
|
|
|
u8 *req_src, u8 *req_dst)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
2013-08-08 00:28:56 +08:00
|
|
|
if (batadv_is_my_mac(bat_priv, req_dst))
|
2013-04-23 21:40:02 +08:00
|
|
|
return batadv_send_my_tt_response(bat_priv, tt_data, req_src);
|
2014-09-01 20:37:25 +08:00
|
|
|
return batadv_send_other_tt_response(bat_priv, tt_data, req_src,
|
|
|
|
req_dst);
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
|
2012-06-06 04:31:31 +08:00
|
|
|
static void _batadv_tt_update_changes(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_orig_node *orig_node,
|
2013-04-23 21:40:02 +08:00
|
|
|
struct batadv_tvlv_tt_change *tt_change,
|
2015-05-27 00:34:26 +08:00
|
|
|
u16 tt_num_changes, u8 ttvn)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
|
|
|
int i;
|
2012-05-17 02:23:16 +08:00
|
|
|
int roams;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
|
|
|
for (i = 0; i < tt_num_changes; i++) {
|
2012-06-04 04:19:21 +08:00
|
|
|
if ((tt_change + i)->flags & BATADV_TT_CLIENT_DEL) {
|
|
|
|
roams = (tt_change + i)->flags & BATADV_TT_CLIENT_ROAM;
|
2012-05-17 02:23:16 +08:00
|
|
|
batadv_tt_global_del(bat_priv, orig_node,
|
|
|
|
(tt_change + i)->addr,
|
2013-06-04 18:11:39 +08:00
|
|
|
ntohs((tt_change + i)->vid),
|
2012-05-25 06:00:54 +08:00
|
|
|
"tt removed by changes",
|
|
|
|
roams);
|
2012-05-12 08:09:39 +08:00
|
|
|
} else {
|
|
|
|
if (!batadv_tt_global_add(bat_priv, orig_node,
|
2012-05-25 06:00:54 +08:00
|
|
|
(tt_change + i)->addr,
|
2013-06-04 18:11:39 +08:00
|
|
|
ntohs((tt_change + i)->vid),
|
2012-05-25 06:00:54 +08:00
|
|
|
(tt_change + i)->flags, ttvn))
|
2011-04-27 20:27:44 +08:00
|
|
|
/* In case of problem while storing a
|
|
|
|
* global_entry, we stop the updating
|
|
|
|
* procedure without committing the
|
|
|
|
* ttvn change. This will avoid to send
|
|
|
|
* corrupted data on tt_request
|
|
|
|
*/
|
|
|
|
return;
|
2012-05-12 08:09:39 +08:00
|
|
|
}
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
2015-06-16 23:10:24 +08:00
|
|
|
set_bit(BATADV_ORIG_CAPA_HAS_TT, &orig_node->capa_initialized);
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
|
2012-06-06 04:31:31 +08:00
|
|
|
static void batadv_tt_fill_gtable(struct batadv_priv *bat_priv,
|
2013-07-31 04:16:25 +08:00
|
|
|
struct batadv_tvlv_tt_change *tt_change,
|
2015-05-27 00:34:26 +08:00
|
|
|
u8 ttvn, u8 *resp_src,
|
|
|
|
u16 num_entries)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
2012-10-07 18:02:22 +08:00
|
|
|
struct batadv_orig_node *orig_node;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
orig_node = batadv_orig_hash_find(bat_priv, resp_src);
|
2011-04-27 20:27:44 +08:00
|
|
|
if (!orig_node)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
/* Purge the old table first.. */
|
2013-08-08 00:28:55 +08:00
|
|
|
batadv_tt_global_del_orig(bat_priv, orig_node, -1,
|
|
|
|
"Received full table");
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
_batadv_tt_update_changes(bat_priv, orig_node, tt_change, num_entries,
|
|
|
|
ttvn);
|
2011-04-27 20:27:44 +08:00
|
|
|
|
|
|
|
spin_lock_bh(&orig_node->tt_buff_lock);
|
|
|
|
kfree(orig_node->tt_buff);
|
|
|
|
orig_node->tt_buff_len = 0;
|
|
|
|
orig_node->tt_buff = NULL;
|
|
|
|
spin_unlock_bh(&orig_node->tt_buff_lock);
|
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
atomic_set(&orig_node->last_ttvn, ttvn);
|
2011-04-27 20:27:44 +08:00
|
|
|
|
|
|
|
out:
|
2021-08-09 01:11:08 +08:00
|
|
|
batadv_orig_node_put(orig_node);
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
|
2012-06-06 04:31:31 +08:00
|
|
|
static void batadv_tt_update_changes(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_orig_node *orig_node,
|
2015-05-27 00:34:26 +08:00
|
|
|
u16 tt_num_changes, u8 ttvn,
|
2013-04-23 21:40:02 +08:00
|
|
|
struct batadv_tvlv_tt_change *tt_change)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
2012-05-17 02:23:16 +08:00
|
|
|
_batadv_tt_update_changes(bat_priv, orig_node, tt_change,
|
|
|
|
tt_num_changes, ttvn);
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2013-05-28 19:14:28 +08:00
|
|
|
batadv_tt_save_orig_buffer(bat_priv, orig_node, tt_change,
|
|
|
|
batadv_tt_len(tt_num_changes));
|
2011-04-27 20:27:44 +08:00
|
|
|
atomic_set(&orig_node->last_ttvn, ttvn);
|
|
|
|
}
|
|
|
|
|
2013-06-04 18:11:39 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_is_my_client() - check if a client is served by the local node
|
2013-06-04 18:11:39 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
2014-11-02 18:29:56 +08:00
|
|
|
* @addr: the mac address of the client to check
|
2013-06-04 18:11:39 +08:00
|
|
|
* @vid: VLAN identifier
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: true if the client is served by this node, false otherwise.
|
2013-06-04 18:11:39 +08:00
|
|
|
*/
|
2015-05-27 00:34:26 +08:00
|
|
|
bool batadv_is_my_client(struct batadv_priv *bat_priv, const u8 *addr,
|
2013-06-04 18:11:39 +08:00
|
|
|
unsigned short vid)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
2012-10-07 18:02:22 +08:00
|
|
|
struct batadv_tt_local_entry *tt_local_entry;
|
2011-04-27 20:28:07 +08:00
|
|
|
bool ret = false;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2013-06-04 18:11:39 +08:00
|
|
|
tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
|
2011-04-27 20:28:07 +08:00
|
|
|
if (!tt_local_entry)
|
|
|
|
goto out;
|
2011-07-07 07:40:58 +08:00
|
|
|
/* Check if the client has been logically deleted (but is kept for
|
2012-05-12 08:09:43 +08:00
|
|
|
* consistency purpose)
|
|
|
|
*/
|
2012-09-24 04:38:34 +08:00
|
|
|
if ((tt_local_entry->common.flags & BATADV_TT_CLIENT_PENDING) ||
|
|
|
|
(tt_local_entry->common.flags & BATADV_TT_CLIENT_ROAM))
|
2011-07-07 07:40:58 +08:00
|
|
|
goto out;
|
2011-04-27 20:28:07 +08:00
|
|
|
ret = true;
|
|
|
|
out:
|
2021-08-09 01:11:08 +08:00
|
|
|
batadv_tt_local_entry_put(tt_local_entry);
|
2011-04-27 20:28:07 +08:00
|
|
|
return ret;
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_handle_tt_response() - process incoming tt reply
|
2013-04-23 21:40:02 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @tt_data: tt data containing the tt request information
|
|
|
|
* @resp_src: mac address of tt reply sender
|
|
|
|
* @num_entries: number of tt change entries appended to the tt data
|
|
|
|
*/
|
|
|
|
static void batadv_handle_tt_response(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_tvlv_tt_data *tt_data,
|
2015-05-27 00:34:26 +08:00
|
|
|
u8 *resp_src, u16 num_entries)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
2015-06-28 22:16:06 +08:00
|
|
|
struct batadv_tt_req_node *node;
|
|
|
|
struct hlist_node *safe;
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_orig_node *orig_node = NULL;
|
2013-04-23 21:40:02 +08:00
|
|
|
struct batadv_tvlv_tt_change *tt_change;
|
2015-05-27 00:34:26 +08:00
|
|
|
u8 *tvlv_ptr = (u8 *)tt_data;
|
|
|
|
u16 change_offset;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2012-06-04 04:19:22 +08:00
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv,
|
2012-05-12 19:48:58 +08:00
|
|
|
"Received TT_RESPONSE from %pM for ttvn %d t_size: %d [%c]\n",
|
2013-04-23 21:40:02 +08:00
|
|
|
resp_src, tt_data->ttvn, num_entries,
|
2015-04-24 00:22:24 +08:00
|
|
|
((tt_data->flags & BATADV_TT_FULL_TABLE) ? 'F' : '.'));
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
orig_node = batadv_orig_hash_find(bat_priv, resp_src);
|
2011-04-27 20:27:44 +08:00
|
|
|
if (!orig_node)
|
|
|
|
goto out;
|
|
|
|
|
2013-07-31 04:16:24 +08:00
|
|
|
spin_lock_bh(&orig_node->tt_lock);
|
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
change_offset = sizeof(struct batadv_tvlv_tt_vlan_data);
|
|
|
|
change_offset *= ntohs(tt_data->num_vlan);
|
|
|
|
change_offset += sizeof(*tt_data);
|
|
|
|
tvlv_ptr += change_offset;
|
|
|
|
|
|
|
|
tt_change = (struct batadv_tvlv_tt_change *)tvlv_ptr;
|
2013-04-23 21:40:02 +08:00
|
|
|
if (tt_data->flags & BATADV_TT_FULL_TABLE) {
|
2013-07-31 04:16:25 +08:00
|
|
|
batadv_tt_fill_gtable(bat_priv, tt_change, tt_data->ttvn,
|
|
|
|
resp_src, num_entries);
|
2012-06-06 04:31:30 +08:00
|
|
|
} else {
|
2013-04-23 21:40:02 +08:00
|
|
|
batadv_tt_update_changes(bat_priv, orig_node, num_entries,
|
|
|
|
tt_data->ttvn, tt_change);
|
2012-06-06 04:31:30 +08:00
|
|
|
}
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2013-07-31 04:16:24 +08:00
|
|
|
/* Recalculate the CRC for this orig_node and store it */
|
2013-07-31 04:16:25 +08:00
|
|
|
batadv_tt_global_update_crc(bat_priv, orig_node);
|
2013-07-31 04:16:24 +08:00
|
|
|
|
|
|
|
spin_unlock_bh(&orig_node->tt_lock);
|
|
|
|
|
2011-04-27 20:27:44 +08:00
|
|
|
/* Delete the tt_req_node from pending tt_requests list */
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_lock_bh(&bat_priv->tt.req_list_lock);
|
2015-06-28 22:16:06 +08:00
|
|
|
hlist_for_each_entry_safe(node, safe, &bat_priv->tt.req_list, list) {
|
2013-04-23 21:40:02 +08:00
|
|
|
if (!batadv_compare_eth(node->addr, resp_src))
|
2011-04-27 20:27:44 +08:00
|
|
|
continue;
|
2015-06-28 22:16:06 +08:00
|
|
|
hlist_del_init(&node->list);
|
2016-06-26 17:16:10 +08:00
|
|
|
batadv_tt_req_node_put(node);
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
2013-07-31 04:16:25 +08:00
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_unlock_bh(&bat_priv->tt.req_list_lock);
|
2011-04-27 20:27:44 +08:00
|
|
|
out:
|
2021-08-09 01:11:08 +08:00
|
|
|
batadv_orig_node_put(orig_node);
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
|
2012-06-06 04:31:31 +08:00
|
|
|
static void batadv_tt_roam_list_free(struct batadv_priv *bat_priv)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_roam_node *node, *safe;
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_lock_bh(&bat_priv->tt.roam_list_lock);
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
list_for_each_entry_safe(node, safe, &bat_priv->tt.roam_list, list) {
|
2011-04-27 20:27:57 +08:00
|
|
|
list_del(&node->list);
|
2016-06-25 22:44:06 +08:00
|
|
|
kmem_cache_free(batadv_tt_roam_cache, node);
|
2011-04-27 20:27:57 +08:00
|
|
|
}
|
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_unlock_bh(&bat_priv->tt.roam_list_lock);
|
2011-04-27 20:27:57 +08:00
|
|
|
}
|
|
|
|
|
2012-06-06 04:31:31 +08:00
|
|
|
static void batadv_tt_roam_purge(struct batadv_priv *bat_priv)
|
2011-04-27 20:27:57 +08:00
|
|
|
{
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_roam_node *node, *safe;
|
2011-04-27 20:27:57 +08:00
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_lock_bh(&bat_priv->tt.roam_list_lock);
|
|
|
|
list_for_each_entry_safe(node, safe, &bat_priv->tt.roam_list, list) {
|
2012-06-04 04:19:17 +08:00
|
|
|
if (!batadv_has_timed_out(node->first_time,
|
|
|
|
BATADV_ROAMING_MAX_TIME))
|
2011-04-27 20:27:57 +08:00
|
|
|
continue;
|
|
|
|
|
|
|
|
list_del(&node->list);
|
2016-06-25 22:44:06 +08:00
|
|
|
kmem_cache_free(batadv_tt_roam_cache, node);
|
2011-04-27 20:27:57 +08:00
|
|
|
}
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_unlock_bh(&bat_priv->tt.roam_list_lock);
|
2011-04-27 20:27:57 +08:00
|
|
|
}
|
|
|
|
|
2015-09-16 01:00:48 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_check_roam_count() - check if a client has roamed too frequently
|
2015-11-17 16:40:52 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @client: mac address of the roaming client
|
2015-09-16 01:00:48 +08:00
|
|
|
*
|
|
|
|
* This function checks whether the client already reached the
|
2011-04-27 20:27:57 +08:00
|
|
|
* maximum number of possible roaming phases. In this case the ROAMING_ADV
|
|
|
|
* will not be sent.
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: true if the ROAMING_ADV can be sent, false otherwise
|
2012-05-12 08:09:43 +08:00
|
|
|
*/
|
2015-05-27 00:34:26 +08:00
|
|
|
static bool batadv_tt_check_roam_count(struct batadv_priv *bat_priv, u8 *client)
|
2011-04-27 20:27:57 +08:00
|
|
|
{
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_roam_node *tt_roam_node;
|
2011-04-27 20:27:57 +08:00
|
|
|
bool ret = false;
|
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_lock_bh(&bat_priv->tt.roam_list_lock);
|
2011-04-27 20:27:57 +08:00
|
|
|
/* The new tt_req will be issued only if I'm not waiting for a
|
2012-05-12 08:09:43 +08:00
|
|
|
* reply from the same orig_node yet
|
|
|
|
*/
|
2012-07-16 04:26:51 +08:00
|
|
|
list_for_each_entry(tt_roam_node, &bat_priv->tt.roam_list, list) {
|
2012-05-12 19:48:58 +08:00
|
|
|
if (!batadv_compare_eth(tt_roam_node->addr, client))
|
2011-04-27 20:27:57 +08:00
|
|
|
continue;
|
|
|
|
|
2012-05-12 19:48:58 +08:00
|
|
|
if (batadv_has_timed_out(tt_roam_node->first_time,
|
2012-06-04 04:19:17 +08:00
|
|
|
BATADV_ROAMING_MAX_TIME))
|
2011-04-27 20:27:57 +08:00
|
|
|
continue;
|
|
|
|
|
2012-05-17 02:23:22 +08:00
|
|
|
if (!batadv_atomic_dec_not_zero(&tt_roam_node->counter))
|
2011-04-27 20:27:57 +08:00
|
|
|
/* Sorry, you roamed too many times! */
|
|
|
|
goto unlock;
|
|
|
|
ret = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!ret) {
|
2016-06-25 22:44:06 +08:00
|
|
|
tt_roam_node = kmem_cache_alloc(batadv_tt_roam_cache,
|
|
|
|
GFP_ATOMIC);
|
2011-04-27 20:27:57 +08:00
|
|
|
if (!tt_roam_node)
|
|
|
|
goto unlock;
|
|
|
|
|
|
|
|
tt_roam_node->first_time = jiffies;
|
2012-06-04 04:19:17 +08:00
|
|
|
atomic_set(&tt_roam_node->counter,
|
|
|
|
BATADV_ROAMING_MAX_COUNT - 1);
|
2014-01-22 07:42:11 +08:00
|
|
|
ether_addr_copy(tt_roam_node->addr, client);
|
2011-04-27 20:27:57 +08:00
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
list_add(&tt_roam_node->list, &bat_priv->tt.roam_list);
|
2011-04-27 20:27:57 +08:00
|
|
|
ret = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
unlock:
|
2012-07-16 04:26:51 +08:00
|
|
|
spin_unlock_bh(&bat_priv->tt.roam_list_lock);
|
2011-04-27 20:27:57 +08:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2013-06-04 18:11:39 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_send_roam_adv() - send a roaming advertisement message
|
2013-06-04 18:11:39 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @client: mac address of the roaming client
|
|
|
|
* @vid: VLAN identifier
|
|
|
|
* @orig_node: message destination
|
|
|
|
*
|
|
|
|
* Send a ROAMING_ADV message to the node which was previously serving this
|
|
|
|
* client. This is done to inform the node that from now on all traffic destined
|
|
|
|
* for this particular roamed client has to be forwarded to the sender of the
|
|
|
|
* roaming message.
|
|
|
|
*/
|
2015-05-27 00:34:26 +08:00
|
|
|
static void batadv_send_roam_adv(struct batadv_priv *bat_priv, u8 *client,
|
2013-06-04 18:11:39 +08:00
|
|
|
unsigned short vid,
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_orig_node *orig_node)
|
2011-04-27 20:27:57 +08:00
|
|
|
{
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_hard_iface *primary_if;
|
2013-04-23 21:40:03 +08:00
|
|
|
struct batadv_tvlv_roam_adv tvlv_roam;
|
|
|
|
|
|
|
|
primary_if = batadv_primary_if_get_selected(bat_priv);
|
|
|
|
if (!primary_if)
|
|
|
|
goto out;
|
2011-04-27 20:27:57 +08:00
|
|
|
|
|
|
|
/* before going on we have to check whether the client has
|
2012-05-12 08:09:43 +08:00
|
|
|
* already roamed to us too many times
|
|
|
|
*/
|
2012-05-17 02:23:16 +08:00
|
|
|
if (!batadv_tt_check_roam_count(bat_priv, client))
|
2011-04-27 20:27:57 +08:00
|
|
|
goto out;
|
|
|
|
|
2012-06-04 04:19:22 +08:00
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv,
|
2013-06-04 18:11:41 +08:00
|
|
|
"Sending ROAMING_ADV to %pM (client %pM, vid: %d)\n",
|
2017-02-23 00:16:42 +08:00
|
|
|
orig_node->orig, client, batadv_print_vid(vid));
|
2011-04-27 20:27:57 +08:00
|
|
|
|
2012-06-04 04:19:20 +08:00
|
|
|
batadv_inc_counter(bat_priv, BATADV_CNT_TT_ROAM_ADV_TX);
|
2012-04-20 23:02:45 +08:00
|
|
|
|
2013-04-23 21:40:03 +08:00
|
|
|
memcpy(tvlv_roam.client, client, sizeof(tvlv_roam.client));
|
2013-06-04 18:11:39 +08:00
|
|
|
tvlv_roam.vid = htons(vid);
|
2013-04-23 21:40:03 +08:00
|
|
|
|
|
|
|
batadv_tvlv_unicast_send(bat_priv, primary_if->net_dev->dev_addr,
|
|
|
|
orig_node->orig, BATADV_TVLV_ROAM, 1,
|
|
|
|
&tvlv_roam, sizeof(tvlv_roam));
|
2011-04-27 20:27:57 +08:00
|
|
|
|
|
|
|
out:
|
2021-08-09 01:11:08 +08:00
|
|
|
batadv_hardif_put(primary_if);
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
|
|
|
|
2012-05-17 02:23:16 +08:00
|
|
|
static void batadv_tt_purge(struct work_struct *work)
|
2011-04-27 20:27:44 +08:00
|
|
|
{
|
2012-06-06 04:31:31 +08:00
|
|
|
struct delayed_work *delayed_work;
|
2012-07-16 04:26:51 +08:00
|
|
|
struct batadv_priv_tt *priv_tt;
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_priv *bat_priv;
|
|
|
|
|
2015-12-28 23:43:37 +08:00
|
|
|
delayed_work = to_delayed_work(work);
|
2012-07-16 04:26:51 +08:00
|
|
|
priv_tt = container_of(delayed_work, struct batadv_priv_tt, work);
|
|
|
|
bat_priv = container_of(priv_tt, struct batadv_priv, tt);
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2013-05-27 15:33:25 +08:00
|
|
|
batadv_tt_local_purge(bat_priv, BATADV_TT_LOCAL_TIMEOUT);
|
2012-07-06 05:38:29 +08:00
|
|
|
batadv_tt_global_purge(bat_priv);
|
2012-05-17 02:23:16 +08:00
|
|
|
batadv_tt_req_purge(bat_priv);
|
|
|
|
batadv_tt_roam_purge(bat_priv);
|
2011-04-27 20:27:44 +08:00
|
|
|
|
2012-12-25 20:14:37 +08:00
|
|
|
queue_delayed_work(batadv_event_workqueue, &bat_priv->tt.work,
|
|
|
|
msecs_to_jiffies(BATADV_TT_WORK_PERIOD));
|
2011-04-27 20:27:44 +08:00
|
|
|
}
|
2011-04-27 20:27:57 +08:00
|
|
|
|
2017-12-03 02:51:53 +08:00
|
|
|
/**
|
|
|
|
* batadv_tt_free() - Free translation table of soft interface
|
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
*/
|
2012-06-06 04:31:31 +08:00
|
|
|
void batadv_tt_free(struct batadv_priv *bat_priv)
|
2011-04-27 20:27:57 +08:00
|
|
|
{
|
2019-05-22 03:58:57 +08:00
|
|
|
batadv_tvlv_handler_unregister(bat_priv, BATADV_TVLV_ROAM, 1);
|
|
|
|
|
2013-04-23 21:40:01 +08:00
|
|
|
batadv_tvlv_container_unregister(bat_priv, BATADV_TVLV_TT, 1);
|
|
|
|
batadv_tvlv_handler_unregister(bat_priv, BATADV_TVLV_TT, 1);
|
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
cancel_delayed_work_sync(&bat_priv->tt.work);
|
2011-04-27 20:27:57 +08:00
|
|
|
|
2012-05-17 02:23:16 +08:00
|
|
|
batadv_tt_local_table_free(bat_priv);
|
|
|
|
batadv_tt_global_table_free(bat_priv);
|
|
|
|
batadv_tt_req_list_free(bat_priv);
|
|
|
|
batadv_tt_changes_list_free(bat_priv);
|
|
|
|
batadv_tt_roam_list_free(bat_priv);
|
2011-04-27 20:27:57 +08:00
|
|
|
|
2012-07-16 04:26:51 +08:00
|
|
|
kfree(bat_priv->tt.last_changeset);
|
2011-04-27 20:27:57 +08:00
|
|
|
}
|
2011-07-07 07:40:58 +08:00
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_set_flags() - set or unset the specified flags on the local
|
2013-07-31 04:16:25 +08:00
|
|
|
* table and possibly count them in the TT size
|
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @flags: the flag to switch
|
|
|
|
* @enable: whether to set or unset the flag
|
|
|
|
* @count: whether to increase the TT size by the number of changed entries
|
2012-05-12 08:09:43 +08:00
|
|
|
*/
|
2015-05-27 00:34:26 +08:00
|
|
|
static void batadv_tt_local_set_flags(struct batadv_priv *bat_priv, u16 flags,
|
|
|
|
bool enable, bool count)
|
2011-07-07 07:40:58 +08:00
|
|
|
{
|
2013-07-31 04:16:25 +08:00
|
|
|
struct batadv_hashtable *hash = bat_priv->tt.local_hash;
|
|
|
|
struct batadv_tt_common_entry *tt_common_entry;
|
2011-07-07 07:40:58 +08:00
|
|
|
struct hlist_head *head;
|
2015-05-27 00:34:26 +08:00
|
|
|
u32 i;
|
2011-07-07 07:40:58 +08:00
|
|
|
|
|
|
|
if (!hash)
|
2013-07-31 04:16:25 +08:00
|
|
|
return;
|
2011-07-07 07:40:58 +08:00
|
|
|
|
|
|
|
for (i = 0; i < hash->size; i++) {
|
|
|
|
head = &hash->table[i];
|
|
|
|
|
|
|
|
rcu_read_lock();
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_rcu(tt_common_entry,
|
2011-07-07 07:40:58 +08:00
|
|
|
head, hash_entry) {
|
2011-11-07 23:47:01 +08:00
|
|
|
if (enable) {
|
|
|
|
if ((tt_common_entry->flags & flags) == flags)
|
|
|
|
continue;
|
|
|
|
tt_common_entry->flags |= flags;
|
|
|
|
} else {
|
|
|
|
if (!(tt_common_entry->flags & flags))
|
|
|
|
continue;
|
|
|
|
tt_common_entry->flags &= ~flags;
|
|
|
|
}
|
2013-07-31 04:16:25 +08:00
|
|
|
|
|
|
|
if (!count)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
batadv_tt_local_size_inc(bat_priv,
|
|
|
|
tt_common_entry->vid);
|
2011-07-07 07:40:58 +08:00
|
|
|
}
|
|
|
|
rcu_read_unlock();
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-06-04 04:19:21 +08:00
|
|
|
/* Purge out all the tt local entries marked with BATADV_TT_CLIENT_PENDING */
|
2012-06-06 04:31:31 +08:00
|
|
|
static void batadv_tt_local_purge_pending_clients(struct batadv_priv *bat_priv)
|
2011-07-07 07:40:58 +08:00
|
|
|
{
|
2012-07-16 04:26:51 +08:00
|
|
|
struct batadv_hashtable *hash = bat_priv->tt.local_hash;
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_common_entry *tt_common;
|
|
|
|
struct batadv_tt_local_entry *tt_local;
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
struct hlist_node *node_tmp;
|
2011-07-07 07:40:58 +08:00
|
|
|
struct hlist_head *head;
|
|
|
|
spinlock_t *list_lock; /* protects write access to the hash lists */
|
2015-05-27 00:34:26 +08:00
|
|
|
u32 i;
|
2011-07-07 07:40:58 +08:00
|
|
|
|
|
|
|
if (!hash)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (i = 0; i < hash->size; i++) {
|
|
|
|
head = &hash->table[i];
|
|
|
|
list_lock = &hash->list_locks[i];
|
|
|
|
|
|
|
|
spin_lock_bh(list_lock);
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_safe(tt_common, node_tmp, head,
|
2012-06-04 04:19:21 +08:00
|
|
|
hash_entry) {
|
|
|
|
if (!(tt_common->flags & BATADV_TT_CLIENT_PENDING))
|
2011-07-07 07:40:58 +08:00
|
|
|
continue;
|
|
|
|
|
2012-06-04 04:19:22 +08:00
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv,
|
2013-06-04 18:11:41 +08:00
|
|
|
"Deleting local tt entry (%pM, vid: %d): pending\n",
|
|
|
|
tt_common->addr,
|
2017-02-23 00:16:42 +08:00
|
|
|
batadv_print_vid(tt_common->vid));
|
2011-07-07 07:40:58 +08:00
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
batadv_tt_local_size_dec(bat_priv, tt_common->vid);
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_del_rcu(&tt_common->hash_entry);
|
2012-06-06 04:31:31 +08:00
|
|
|
tt_local = container_of(tt_common,
|
|
|
|
struct batadv_tt_local_entry,
|
|
|
|
common);
|
2014-05-08 23:13:15 +08:00
|
|
|
|
2016-01-17 18:01:25 +08:00
|
|
|
batadv_tt_local_entry_put(tt_local);
|
2011-07-07 07:40:58 +08:00
|
|
|
}
|
|
|
|
spin_unlock_bh(list_lock);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-04-23 21:40:01 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_commit_changes_nolock() - commit all pending local tt changes
|
2013-05-27 15:33:25 +08:00
|
|
|
* which have been queued in the time since the last commit
|
2013-04-23 21:40:01 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
2013-05-27 15:33:25 +08:00
|
|
|
*
|
|
|
|
* Caller must hold tt->commit_lock.
|
2013-04-23 21:40:01 +08:00
|
|
|
*/
|
2013-05-27 15:33:25 +08:00
|
|
|
static void batadv_tt_local_commit_changes_nolock(struct batadv_priv *bat_priv)
|
2011-07-07 07:40:58 +08:00
|
|
|
{
|
2015-06-21 20:45:15 +08:00
|
|
|
lockdep_assert_held(&bat_priv->tt.commit_lock);
|
|
|
|
|
2013-04-23 21:40:01 +08:00
|
|
|
if (atomic_read(&bat_priv->tt.local_changes) < 1) {
|
|
|
|
if (!batadv_atomic_dec_not_zero(&bat_priv->tt.ogm_append_cnt))
|
|
|
|
batadv_tt_tvlv_container_update(bat_priv);
|
2013-05-27 15:33:25 +08:00
|
|
|
return;
|
2013-04-23 21:40:01 +08:00
|
|
|
}
|
2012-05-07 04:22:05 +08:00
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
batadv_tt_local_set_flags(bat_priv, BATADV_TT_CLIENT_NEW, false, true);
|
2012-05-07 04:22:05 +08:00
|
|
|
|
2012-05-17 02:23:16 +08:00
|
|
|
batadv_tt_local_purge_pending_clients(bat_priv);
|
2013-07-31 04:16:25 +08:00
|
|
|
batadv_tt_local_update_crc(bat_priv);
|
2011-07-07 07:40:58 +08:00
|
|
|
|
|
|
|
/* Increment the TTVN only once per OGM interval */
|
2012-07-16 04:26:51 +08:00
|
|
|
atomic_inc(&bat_priv->tt.vn);
|
2012-06-04 04:19:22 +08:00
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv,
|
2012-05-12 19:48:58 +08:00
|
|
|
"Local changes committed, updating to ttvn %u\n",
|
2015-05-27 00:34:26 +08:00
|
|
|
(u8)atomic_read(&bat_priv->tt.vn));
|
2012-05-07 04:22:05 +08:00
|
|
|
|
|
|
|
/* reset the sending counter */
|
2012-07-16 04:26:51 +08:00
|
|
|
atomic_set(&bat_priv->tt.ogm_append_cnt, BATADV_TT_OGM_APPEND_MAX);
|
2013-04-23 21:40:01 +08:00
|
|
|
batadv_tt_tvlv_container_update(bat_priv);
|
2013-05-27 15:33:25 +08:00
|
|
|
}
|
2013-07-31 04:16:24 +08:00
|
|
|
|
2013-05-27 15:33:25 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_commit_changes() - commit all pending local tt changes which
|
2013-05-27 15:33:25 +08:00
|
|
|
* have been queued in the time since the last commit
|
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
*/
|
|
|
|
void batadv_tt_local_commit_changes(struct batadv_priv *bat_priv)
|
|
|
|
{
|
|
|
|
spin_lock_bh(&bat_priv->tt.commit_lock);
|
|
|
|
batadv_tt_local_commit_changes_nolock(bat_priv);
|
2013-07-31 04:16:24 +08:00
|
|
|
spin_unlock_bh(&bat_priv->tt.commit_lock);
|
2011-07-07 07:40:58 +08:00
|
|
|
}
|
2011-07-07 21:35:36 +08:00
|
|
|
|
2017-12-03 02:51:53 +08:00
|
|
|
/**
|
|
|
|
* batadv_is_ap_isolated() - Check if packet from upper layer should be dropped
|
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @src: source mac address of packet
|
|
|
|
* @dst: destination mac address of packet
|
|
|
|
* @vid: vlan id of packet
|
|
|
|
*
|
|
|
|
* Return: true when src+dst(+vid) pair should be isolated, false otherwise
|
|
|
|
*/
|
2015-05-27 00:34:26 +08:00
|
|
|
bool batadv_is_ap_isolated(struct batadv_priv *bat_priv, u8 *src, u8 *dst,
|
|
|
|
unsigned short vid)
|
2011-07-07 21:35:36 +08:00
|
|
|
{
|
2016-03-11 20:10:20 +08:00
|
|
|
struct batadv_tt_local_entry *tt_local_entry;
|
|
|
|
struct batadv_tt_global_entry *tt_global_entry;
|
2013-07-02 17:04:36 +08:00
|
|
|
struct batadv_softif_vlan *vlan;
|
2012-06-20 23:16:05 +08:00
|
|
|
bool ret = false;
|
2011-07-07 21:35:36 +08:00
|
|
|
|
2013-07-02 17:04:36 +08:00
|
|
|
vlan = batadv_softif_vlan_get(bat_priv, vid);
|
2015-11-04 02:20:34 +08:00
|
|
|
if (!vlan)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (!atomic_read(&vlan->ap_isolation))
|
2016-03-11 20:10:20 +08:00
|
|
|
goto vlan_put;
|
2011-07-07 21:35:36 +08:00
|
|
|
|
2013-07-02 17:04:36 +08:00
|
|
|
tt_local_entry = batadv_tt_local_hash_find(bat_priv, dst, vid);
|
2011-07-07 21:35:36 +08:00
|
|
|
if (!tt_local_entry)
|
2016-03-11 20:10:20 +08:00
|
|
|
goto vlan_put;
|
2011-07-07 21:35:36 +08:00
|
|
|
|
2013-07-02 17:04:36 +08:00
|
|
|
tt_global_entry = batadv_tt_global_hash_find(bat_priv, src, vid);
|
2011-07-07 21:35:36 +08:00
|
|
|
if (!tt_global_entry)
|
2016-03-11 20:10:20 +08:00
|
|
|
goto local_entry_put;
|
2011-07-07 21:35:36 +08:00
|
|
|
|
2016-03-11 20:10:20 +08:00
|
|
|
if (_batadv_is_ap_isolated(tt_local_entry, tt_global_entry))
|
|
|
|
ret = true;
|
2011-07-07 21:35:36 +08:00
|
|
|
|
2016-03-11 20:10:20 +08:00
|
|
|
batadv_tt_global_entry_put(tt_global_entry);
|
|
|
|
local_entry_put:
|
|
|
|
batadv_tt_local_entry_put(tt_local_entry);
|
|
|
|
vlan_put:
|
2016-01-17 18:01:21 +08:00
|
|
|
batadv_softif_vlan_put(vlan);
|
2011-07-07 21:35:36 +08:00
|
|
|
return ret;
|
|
|
|
}
|
2011-07-30 19:10:18 +08:00
|
|
|
|
2013-04-23 21:40:01 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_update_orig() - update global translation table with new tt
|
2013-04-23 21:40:01 +08:00
|
|
|
* information received via ogms
|
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
2015-09-07 03:38:51 +08:00
|
|
|
* @orig_node: the orig_node of the ogm
|
|
|
|
* @tt_buff: pointer to the first tvlv VLAN entry
|
2013-07-31 04:16:25 +08:00
|
|
|
* @tt_num_vlan: number of tvlv VLAN entries
|
|
|
|
* @tt_change: pointer to the first entry in the TT buffer
|
2013-04-23 21:40:01 +08:00
|
|
|
* @tt_num_changes: number of tt changes inside the tt buffer
|
|
|
|
* @ttvn: translation table version number of this changeset
|
|
|
|
*/
|
|
|
|
static void batadv_tt_update_orig(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_orig_node *orig_node,
|
2015-05-27 00:34:26 +08:00
|
|
|
const void *tt_buff, u16 tt_num_vlan,
|
2013-07-31 04:16:25 +08:00
|
|
|
struct batadv_tvlv_tt_change *tt_change,
|
2015-05-27 00:34:26 +08:00
|
|
|
u16 tt_num_changes, u8 ttvn)
|
2011-07-30 19:10:18 +08:00
|
|
|
{
|
2015-05-27 00:34:26 +08:00
|
|
|
u8 orig_ttvn = (u8)atomic_read(&orig_node->last_ttvn);
|
2013-07-31 04:16:25 +08:00
|
|
|
struct batadv_tvlv_tt_vlan_data *tt_vlan;
|
2011-07-30 19:10:18 +08:00
|
|
|
bool full_table = true;
|
2014-02-16 00:47:50 +08:00
|
|
|
bool has_tt_init;
|
2011-07-30 19:10:18 +08:00
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
tt_vlan = (struct batadv_tvlv_tt_vlan_data *)tt_buff;
|
2015-06-16 23:10:24 +08:00
|
|
|
has_tt_init = test_bit(BATADV_ORIG_CAPA_HAS_TT,
|
|
|
|
&orig_node->capa_initialized);
|
2014-02-16 00:47:50 +08:00
|
|
|
|
2011-11-07 23:36:40 +08:00
|
|
|
/* orig table not initialised AND first diff is in the OGM OR the ttvn
|
2012-05-12 08:09:43 +08:00
|
|
|
* increased by one -> we can apply the attached changes
|
|
|
|
*/
|
2014-02-16 00:47:50 +08:00
|
|
|
if ((!has_tt_init && ttvn == 1) || ttvn - orig_ttvn == 1) {
|
2011-07-30 19:10:18 +08:00
|
|
|
/* the OGM could not contain the changes due to their size or
|
2012-06-04 04:19:17 +08:00
|
|
|
* because they have already been sent BATADV_TT_OGM_APPEND_MAX
|
|
|
|
* times.
|
2012-05-12 08:09:43 +08:00
|
|
|
* In this case send a tt request
|
|
|
|
*/
|
2011-07-30 19:10:18 +08:00
|
|
|
if (!tt_num_changes) {
|
|
|
|
full_table = false;
|
|
|
|
goto request_table;
|
|
|
|
}
|
|
|
|
|
2013-07-31 04:16:24 +08:00
|
|
|
spin_lock_bh(&orig_node->tt_lock);
|
|
|
|
|
2012-05-17 02:23:16 +08:00
|
|
|
batadv_tt_update_changes(bat_priv, orig_node, tt_num_changes,
|
2012-06-06 04:31:30 +08:00
|
|
|
ttvn, tt_change);
|
2011-07-30 19:10:18 +08:00
|
|
|
|
|
|
|
/* Even if we received the precomputed crc with the OGM, we
|
|
|
|
* prefer to recompute it to spot any possible inconsistency
|
2012-05-12 08:09:43 +08:00
|
|
|
* in the global table
|
|
|
|
*/
|
2013-07-31 04:16:25 +08:00
|
|
|
batadv_tt_global_update_crc(bat_priv, orig_node);
|
2011-07-30 19:10:18 +08:00
|
|
|
|
2013-07-31 04:16:24 +08:00
|
|
|
spin_unlock_bh(&orig_node->tt_lock);
|
|
|
|
|
2011-07-30 19:10:18 +08:00
|
|
|
/* The ttvn alone is not enough to guarantee consistency
|
|
|
|
* because a single value could represent different states
|
|
|
|
* (due to the wrap around). Thus a node has to check whether
|
|
|
|
* the resulting table (after applying the changes) is still
|
|
|
|
* consistent or not. E.g. a node could disconnect while its
|
|
|
|
* ttvn is X and reconnect on ttvn = X + TTVN_MAX: in this case
|
|
|
|
* checking the CRC value is mandatory to detect the
|
2012-05-12 08:09:43 +08:00
|
|
|
* inconsistency
|
|
|
|
*/
|
2013-07-31 04:16:25 +08:00
|
|
|
if (!batadv_tt_global_check_crc(orig_node, tt_vlan,
|
|
|
|
tt_num_vlan))
|
2011-07-30 19:10:18 +08:00
|
|
|
goto request_table;
|
|
|
|
} else {
|
|
|
|
/* if we missed more than one change or our tables are not
|
2012-05-12 08:09:43 +08:00
|
|
|
* in sync anymore -> request fresh tt data
|
|
|
|
*/
|
2014-02-16 00:47:50 +08:00
|
|
|
if (!has_tt_init || ttvn != orig_ttvn ||
|
2013-07-31 04:16:25 +08:00
|
|
|
!batadv_tt_global_check_crc(orig_node, tt_vlan,
|
|
|
|
tt_num_vlan)) {
|
2011-07-30 19:10:18 +08:00
|
|
|
request_table:
|
2012-06-04 04:19:22 +08:00
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv,
|
2013-07-31 04:16:25 +08:00
|
|
|
"TT inconsistency for %pM. Need to retrieve the correct information (ttvn: %u last_ttvn: %u num_changes: %u)\n",
|
|
|
|
orig_node->orig, ttvn, orig_ttvn,
|
|
|
|
tt_num_changes);
|
2012-05-17 02:23:16 +08:00
|
|
|
batadv_send_tt_request(bat_priv, orig_node, ttvn,
|
2013-07-31 04:16:25 +08:00
|
|
|
tt_vlan, tt_num_vlan,
|
|
|
|
full_table);
|
2011-07-30 19:10:18 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-03-17 01:03:28 +08:00
|
|
|
|
2013-06-04 18:11:39 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_client_is_roaming() - check if a client is marked as roaming
|
2013-06-04 18:11:39 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @addr: the mac address of the client to check
|
|
|
|
* @vid: VLAN identifier
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: true if we know that the client has moved from its old originator
|
2013-06-04 18:11:39 +08:00
|
|
|
* to another one. This entry is still kept for consistency purposes and will be
|
|
|
|
* deleted later by a DEL or because of timeout
|
2012-03-17 01:03:28 +08:00
|
|
|
*/
|
2012-06-06 04:31:31 +08:00
|
|
|
bool batadv_tt_global_client_is_roaming(struct batadv_priv *bat_priv,
|
2015-05-27 00:34:26 +08:00
|
|
|
u8 *addr, unsigned short vid)
|
2012-03-17 01:03:28 +08:00
|
|
|
{
|
2012-06-06 04:31:31 +08:00
|
|
|
struct batadv_tt_global_entry *tt_global_entry;
|
2012-03-17 01:03:28 +08:00
|
|
|
bool ret = false;
|
|
|
|
|
2013-06-04 18:11:39 +08:00
|
|
|
tt_global_entry = batadv_tt_global_hash_find(bat_priv, addr, vid);
|
2012-03-17 01:03:28 +08:00
|
|
|
if (!tt_global_entry)
|
|
|
|
goto out;
|
|
|
|
|
2013-01-15 20:17:19 +08:00
|
|
|
ret = tt_global_entry->common.flags & BATADV_TT_CLIENT_ROAM;
|
2016-01-17 18:01:26 +08:00
|
|
|
batadv_tt_global_entry_put(tt_global_entry);
|
2012-03-17 01:03:28 +08:00
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
2012-07-06 05:38:29 +08:00
|
|
|
|
2012-09-24 04:38:34 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_client_is_roaming() - tells whether the client is roaming
|
2012-09-24 04:38:34 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
2013-06-04 18:11:39 +08:00
|
|
|
* @addr: the mac address of the local client to query
|
|
|
|
* @vid: VLAN identifier
|
2012-09-24 04:38:34 +08:00
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: true if the local client is known to be roaming (it is not served by
|
2012-09-24 04:38:34 +08:00
|
|
|
* this node anymore) or not. If yes, the client is still present in the table
|
|
|
|
* to keep the latter consistent with the node TTVN
|
|
|
|
*/
|
|
|
|
bool batadv_tt_local_client_is_roaming(struct batadv_priv *bat_priv,
|
2015-05-27 00:34:26 +08:00
|
|
|
u8 *addr, unsigned short vid)
|
2012-09-24 04:38:34 +08:00
|
|
|
{
|
|
|
|
struct batadv_tt_local_entry *tt_local_entry;
|
|
|
|
bool ret = false;
|
|
|
|
|
2013-06-04 18:11:39 +08:00
|
|
|
tt_local_entry = batadv_tt_local_hash_find(bat_priv, addr, vid);
|
2012-09-24 04:38:34 +08:00
|
|
|
if (!tt_local_entry)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
ret = tt_local_entry->common.flags & BATADV_TT_CLIENT_ROAM;
|
2016-01-17 18:01:25 +08:00
|
|
|
batadv_tt_local_entry_put(tt_local_entry);
|
2012-09-24 04:38:34 +08:00
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2017-12-03 02:51:53 +08:00
|
|
|
/**
|
|
|
|
* batadv_tt_add_temporary_global_entry() - Add temporary entry to global TT
|
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @orig_node: orig node which the temporary entry should be associated with
|
|
|
|
* @addr: mac address of the client
|
|
|
|
* @vid: VLAN id of the new temporary global translation table
|
|
|
|
*
|
|
|
|
* Return: true when temporary tt entry could be added, false otherwise
|
|
|
|
*/
|
2012-07-06 05:38:29 +08:00
|
|
|
bool batadv_tt_add_temporary_global_entry(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_orig_node *orig_node,
|
2013-06-04 18:11:39 +08:00
|
|
|
const unsigned char *addr,
|
2013-06-04 18:11:41 +08:00
|
|
|
unsigned short vid)
|
2012-07-06 05:38:29 +08:00
|
|
|
{
|
2017-06-01 23:11:24 +08:00
|
|
|
/* ignore loop detect macs, they are not supposed to be in the tt local
|
|
|
|
* data as well.
|
|
|
|
*/
|
|
|
|
if (batadv_bla_is_loopdetect_mac(addr))
|
|
|
|
return false;
|
|
|
|
|
2013-06-04 18:11:41 +08:00
|
|
|
if (!batadv_tt_global_add(bat_priv, orig_node, addr, vid,
|
2012-07-06 05:38:29 +08:00
|
|
|
BATADV_TT_CLIENT_TEMP,
|
|
|
|
atomic_read(&orig_node->last_ttvn)))
|
2017-06-01 23:11:26 +08:00
|
|
|
return false;
|
2012-07-06 05:38:29 +08:00
|
|
|
|
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv,
|
2013-06-04 18:11:41 +08:00
|
|
|
"Added temporary global client (addr: %pM, vid: %d, orig: %pM)\n",
|
2017-02-23 00:16:42 +08:00
|
|
|
addr, batadv_print_vid(vid), orig_node->orig);
|
2017-06-01 23:11:26 +08:00
|
|
|
|
|
|
|
return true;
|
2012-07-06 05:38:29 +08:00
|
|
|
}
|
2013-04-23 21:40:01 +08:00
|
|
|
|
2013-05-27 15:33:25 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_local_resize_to_mtu() - resize the local translation table fit the
|
2013-05-27 15:33:25 +08:00
|
|
|
* maximum packet size that can be transported through the mesh
|
|
|
|
* @soft_iface: netdev struct of the mesh interface
|
|
|
|
*
|
|
|
|
* Remove entries older than 'timeout' and half timeout if more entries need
|
|
|
|
* to be removed.
|
|
|
|
*/
|
|
|
|
void batadv_tt_local_resize_to_mtu(struct net_device *soft_iface)
|
|
|
|
{
|
|
|
|
struct batadv_priv *bat_priv = netdev_priv(soft_iface);
|
|
|
|
int packet_size_max = atomic_read(&bat_priv->packet_size_max);
|
|
|
|
int table_size, timeout = BATADV_TT_LOCAL_TIMEOUT / 2;
|
|
|
|
bool reduced = false;
|
|
|
|
|
|
|
|
spin_lock_bh(&bat_priv->tt.commit_lock);
|
|
|
|
|
|
|
|
while (true) {
|
|
|
|
table_size = batadv_tt_local_table_transmit_size(bat_priv);
|
|
|
|
if (packet_size_max >= table_size)
|
|
|
|
break;
|
|
|
|
|
|
|
|
batadv_tt_local_purge(bat_priv, timeout);
|
|
|
|
batadv_tt_local_purge_pending_clients(bat_priv);
|
|
|
|
|
|
|
|
timeout /= 2;
|
|
|
|
reduced = true;
|
|
|
|
net_ratelimited_function(batadv_info, soft_iface,
|
|
|
|
"Forced to purge local tt entries to fit new maximum fragment MTU (%i)\n",
|
|
|
|
packet_size_max);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* commit these changes immediately, to avoid synchronization problem
|
|
|
|
* with the TTVN
|
|
|
|
*/
|
|
|
|
if (reduced)
|
|
|
|
batadv_tt_local_commit_changes_nolock(bat_priv);
|
|
|
|
|
|
|
|
spin_unlock_bh(&bat_priv->tt.commit_lock);
|
|
|
|
}
|
|
|
|
|
2013-04-23 21:40:01 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_tvlv_ogm_handler_v1() - process incoming tt tvlv container
|
2013-04-23 21:40:01 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @orig: the orig_node of the ogm
|
|
|
|
* @flags: flags indicating the tvlv state (see batadv_tvlv_handler_flags)
|
|
|
|
* @tvlv_value: tvlv buffer containing the gateway data
|
|
|
|
* @tvlv_value_len: tvlv buffer length
|
|
|
|
*/
|
|
|
|
static void batadv_tt_tvlv_ogm_handler_v1(struct batadv_priv *bat_priv,
|
|
|
|
struct batadv_orig_node *orig,
|
2015-05-27 00:34:26 +08:00
|
|
|
u8 flags, void *tvlv_value,
|
|
|
|
u16 tvlv_value_len)
|
2013-04-23 21:40:01 +08:00
|
|
|
{
|
2013-07-31 04:16:25 +08:00
|
|
|
struct batadv_tvlv_tt_vlan_data *tt_vlan;
|
|
|
|
struct batadv_tvlv_tt_change *tt_change;
|
2013-04-23 21:40:01 +08:00
|
|
|
struct batadv_tvlv_tt_data *tt_data;
|
2015-05-27 00:34:26 +08:00
|
|
|
u16 num_entries, num_vlan;
|
2013-04-23 21:40:01 +08:00
|
|
|
|
|
|
|
if (tvlv_value_len < sizeof(*tt_data))
|
|
|
|
return;
|
|
|
|
|
2022-04-21 23:48:29 +08:00
|
|
|
tt_data = tvlv_value;
|
2013-04-23 21:40:01 +08:00
|
|
|
tvlv_value_len -= sizeof(*tt_data);
|
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
num_vlan = ntohs(tt_data->num_vlan);
|
|
|
|
|
|
|
|
if (tvlv_value_len < sizeof(*tt_vlan) * num_vlan)
|
|
|
|
return;
|
|
|
|
|
|
|
|
tt_vlan = (struct batadv_tvlv_tt_vlan_data *)(tt_data + 1);
|
|
|
|
tt_change = (struct batadv_tvlv_tt_change *)(tt_vlan + num_vlan);
|
|
|
|
tvlv_value_len -= sizeof(*tt_vlan) * num_vlan;
|
|
|
|
|
2013-05-28 19:14:27 +08:00
|
|
|
num_entries = batadv_tt_entries(tvlv_value_len);
|
2013-04-23 21:40:01 +08:00
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
batadv_tt_update_orig(bat_priv, orig, tt_vlan, num_vlan, tt_change,
|
|
|
|
num_entries, tt_data->ttvn);
|
2013-04-23 21:40:01 +08:00
|
|
|
}
|
|
|
|
|
2013-04-23 21:40:02 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_tvlv_unicast_handler_v1() - process incoming (unicast) tt tvlv
|
2013-04-23 21:40:02 +08:00
|
|
|
* container
|
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @src: mac address of tt tvlv sender
|
|
|
|
* @dst: mac address of tt tvlv recipient
|
|
|
|
* @tvlv_value: tvlv buffer containing the tt data
|
|
|
|
* @tvlv_value_len: tvlv buffer length
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: NET_RX_DROP if the tt tvlv is to be re-routed, NET_RX_SUCCESS
|
2013-04-23 21:40:02 +08:00
|
|
|
* otherwise.
|
|
|
|
*/
|
|
|
|
static int batadv_tt_tvlv_unicast_handler_v1(struct batadv_priv *bat_priv,
|
2015-05-27 00:34:26 +08:00
|
|
|
u8 *src, u8 *dst,
|
2013-04-23 21:40:02 +08:00
|
|
|
void *tvlv_value,
|
2015-05-27 00:34:26 +08:00
|
|
|
u16 tvlv_value_len)
|
2013-04-23 21:40:02 +08:00
|
|
|
{
|
|
|
|
struct batadv_tvlv_tt_data *tt_data;
|
2015-05-27 00:34:26 +08:00
|
|
|
u16 tt_vlan_len, tt_num_entries;
|
2013-04-23 21:40:02 +08:00
|
|
|
char tt_flag;
|
|
|
|
bool ret;
|
|
|
|
|
|
|
|
if (tvlv_value_len < sizeof(*tt_data))
|
|
|
|
return NET_RX_SUCCESS;
|
|
|
|
|
2022-04-21 23:48:29 +08:00
|
|
|
tt_data = tvlv_value;
|
2013-04-23 21:40:02 +08:00
|
|
|
tvlv_value_len -= sizeof(*tt_data);
|
|
|
|
|
2013-07-31 04:16:25 +08:00
|
|
|
tt_vlan_len = sizeof(struct batadv_tvlv_tt_vlan_data);
|
|
|
|
tt_vlan_len *= ntohs(tt_data->num_vlan);
|
|
|
|
|
|
|
|
if (tvlv_value_len < tt_vlan_len)
|
|
|
|
return NET_RX_SUCCESS;
|
|
|
|
|
|
|
|
tvlv_value_len -= tt_vlan_len;
|
|
|
|
tt_num_entries = batadv_tt_entries(tvlv_value_len);
|
2013-04-23 21:40:02 +08:00
|
|
|
|
|
|
|
switch (tt_data->flags & BATADV_TT_DATA_TYPE_MASK) {
|
|
|
|
case BATADV_TT_REQUEST:
|
|
|
|
batadv_inc_counter(bat_priv, BATADV_CNT_TT_REQUEST_RX);
|
|
|
|
|
|
|
|
/* If this node cannot provide a TT response the tt_request is
|
|
|
|
* forwarded
|
|
|
|
*/
|
|
|
|
ret = batadv_send_tt_response(bat_priv, tt_data, src, dst);
|
|
|
|
if (!ret) {
|
|
|
|
if (tt_data->flags & BATADV_TT_FULL_TABLE)
|
|
|
|
tt_flag = 'F';
|
|
|
|
else
|
|
|
|
tt_flag = '.';
|
|
|
|
|
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv,
|
|
|
|
"Routing TT_REQUEST to %pM [%c]\n",
|
|
|
|
dst, tt_flag);
|
|
|
|
/* tvlv API will re-route the packet */
|
|
|
|
return NET_RX_DROP;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case BATADV_TT_RESPONSE:
|
|
|
|
batadv_inc_counter(bat_priv, BATADV_CNT_TT_RESPONSE_RX);
|
|
|
|
|
|
|
|
if (batadv_is_my_mac(bat_priv, dst)) {
|
|
|
|
batadv_handle_tt_response(bat_priv, tt_data,
|
2013-07-31 04:16:25 +08:00
|
|
|
src, tt_num_entries);
|
2013-04-23 21:40:02 +08:00
|
|
|
return NET_RX_SUCCESS;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tt_data->flags & BATADV_TT_FULL_TABLE)
|
|
|
|
tt_flag = 'F';
|
|
|
|
else
|
|
|
|
tt_flag = '.';
|
|
|
|
|
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv,
|
|
|
|
"Routing TT_RESPONSE to %pM [%c]\n", dst, tt_flag);
|
|
|
|
|
|
|
|
/* tvlv API will re-route the packet */
|
|
|
|
return NET_RX_DROP;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NET_RX_SUCCESS;
|
|
|
|
}
|
|
|
|
|
2013-04-23 21:40:03 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_roam_tvlv_unicast_handler_v1() - process incoming tt roam tvlv
|
|
|
|
* container
|
2013-04-23 21:40:03 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @src: mac address of tt tvlv sender
|
|
|
|
* @dst: mac address of tt tvlv recipient
|
|
|
|
* @tvlv_value: tvlv buffer containing the tt data
|
|
|
|
* @tvlv_value_len: tvlv buffer length
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: NET_RX_DROP if the tt roam tvlv is to be re-routed, NET_RX_SUCCESS
|
2013-04-23 21:40:03 +08:00
|
|
|
* otherwise.
|
|
|
|
*/
|
|
|
|
static int batadv_roam_tvlv_unicast_handler_v1(struct batadv_priv *bat_priv,
|
2015-05-27 00:34:26 +08:00
|
|
|
u8 *src, u8 *dst,
|
2013-04-23 21:40:03 +08:00
|
|
|
void *tvlv_value,
|
2015-05-27 00:34:26 +08:00
|
|
|
u16 tvlv_value_len)
|
2013-04-23 21:40:03 +08:00
|
|
|
{
|
|
|
|
struct batadv_tvlv_roam_adv *roaming_adv;
|
|
|
|
struct batadv_orig_node *orig_node = NULL;
|
|
|
|
|
|
|
|
/* If this node is not the intended recipient of the
|
|
|
|
* roaming advertisement the packet is forwarded
|
|
|
|
* (the tvlv API will re-route the packet).
|
|
|
|
*/
|
|
|
|
if (!batadv_is_my_mac(bat_priv, dst))
|
|
|
|
return NET_RX_DROP;
|
|
|
|
|
|
|
|
if (tvlv_value_len < sizeof(*roaming_adv))
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
orig_node = batadv_orig_hash_find(bat_priv, src);
|
|
|
|
if (!orig_node)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
batadv_inc_counter(bat_priv, BATADV_CNT_TT_ROAM_ADV_RX);
|
2022-04-21 23:48:29 +08:00
|
|
|
roaming_adv = tvlv_value;
|
2013-04-23 21:40:03 +08:00
|
|
|
|
|
|
|
batadv_dbg(BATADV_DBG_TT, bat_priv,
|
|
|
|
"Received ROAMING_ADV from %pM (client %pM)\n",
|
|
|
|
src, roaming_adv->client);
|
|
|
|
|
|
|
|
batadv_tt_global_add(bat_priv, orig_node, roaming_adv->client,
|
2013-06-04 18:11:39 +08:00
|
|
|
ntohs(roaming_adv->vid), BATADV_TT_CLIENT_ROAM,
|
2013-04-23 21:40:03 +08:00
|
|
|
atomic_read(&orig_node->last_ttvn) + 1);
|
|
|
|
|
|
|
|
out:
|
2021-08-09 01:11:08 +08:00
|
|
|
batadv_orig_node_put(orig_node);
|
2013-04-23 21:40:03 +08:00
|
|
|
return NET_RX_SUCCESS;
|
|
|
|
}
|
|
|
|
|
2013-04-23 21:40:01 +08:00
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_init() - initialise the translation table internals
|
2013-04-23 21:40:01 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: 0 on success or negative error number in case of failure.
|
2013-04-23 21:40:01 +08:00
|
|
|
*/
|
|
|
|
int batadv_tt_init(struct batadv_priv *bat_priv)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
|
2013-10-13 08:50:20 +08:00
|
|
|
/* synchronized flags must be remote */
|
|
|
|
BUILD_BUG_ON(!(BATADV_TT_SYNC_MASK & BATADV_TT_REMOTE_MASK));
|
|
|
|
|
2013-04-23 21:40:01 +08:00
|
|
|
ret = batadv_tt_local_init(bat_priv);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
ret = batadv_tt_global_init(bat_priv);
|
2021-10-24 21:13:56 +08:00
|
|
|
if (ret < 0) {
|
|
|
|
batadv_tt_local_table_free(bat_priv);
|
2013-04-23 21:40:01 +08:00
|
|
|
return ret;
|
2021-10-24 21:13:56 +08:00
|
|
|
}
|
2013-04-23 21:40:01 +08:00
|
|
|
|
|
|
|
batadv_tvlv_handler_register(bat_priv, batadv_tt_tvlv_ogm_handler_v1,
|
2013-04-23 21:40:02 +08:00
|
|
|
batadv_tt_tvlv_unicast_handler_v1,
|
|
|
|
BATADV_TVLV_TT, 1, BATADV_NO_FLAGS);
|
2013-04-23 21:40:01 +08:00
|
|
|
|
2013-04-23 21:40:03 +08:00
|
|
|
batadv_tvlv_handler_register(bat_priv, NULL,
|
|
|
|
batadv_roam_tvlv_unicast_handler_v1,
|
|
|
|
BATADV_TVLV_ROAM, 1, BATADV_NO_FLAGS);
|
|
|
|
|
2013-04-23 21:40:01 +08:00
|
|
|
INIT_DELAYED_WORK(&bat_priv->tt.work, batadv_tt_purge);
|
|
|
|
queue_delayed_work(batadv_event_workqueue, &bat_priv->tt.work,
|
|
|
|
msecs_to_jiffies(BATADV_TT_WORK_PERIOD));
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
}
|
2013-11-16 19:03:52 +08:00
|
|
|
|
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_global_is_isolated() - check if a client is marked as isolated
|
2013-11-16 19:03:52 +08:00
|
|
|
* @bat_priv: the bat priv with all the soft interface information
|
|
|
|
* @addr: the mac address of the client
|
|
|
|
* @vid: the identifier of the VLAN where this client is connected
|
|
|
|
*
|
2015-09-16 01:00:48 +08:00
|
|
|
* Return: true if the client is marked with the TT_CLIENT_ISOLA flag, false
|
2013-11-16 19:03:52 +08:00
|
|
|
* otherwise
|
|
|
|
*/
|
|
|
|
bool batadv_tt_global_is_isolated(struct batadv_priv *bat_priv,
|
2015-05-27 00:34:26 +08:00
|
|
|
const u8 *addr, unsigned short vid)
|
2013-11-16 19:03:52 +08:00
|
|
|
{
|
|
|
|
struct batadv_tt_global_entry *tt;
|
|
|
|
bool ret;
|
|
|
|
|
|
|
|
tt = batadv_tt_global_hash_find(bat_priv, addr, vid);
|
|
|
|
if (!tt)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
ret = tt->common.flags & BATADV_TT_CLIENT_ISOLA;
|
|
|
|
|
2016-01-17 18:01:26 +08:00
|
|
|
batadv_tt_global_entry_put(tt);
|
2013-11-16 19:03:52 +08:00
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
2016-06-25 22:44:06 +08:00
|
|
|
|
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_cache_init() - Initialize tt memory object cache
|
2016-06-25 22:44:06 +08:00
|
|
|
*
|
|
|
|
* Return: 0 on success or negative error number in case of failure.
|
|
|
|
*/
|
|
|
|
int __init batadv_tt_cache_init(void)
|
|
|
|
{
|
|
|
|
size_t tl_size = sizeof(struct batadv_tt_local_entry);
|
|
|
|
size_t tg_size = sizeof(struct batadv_tt_global_entry);
|
|
|
|
size_t tt_orig_size = sizeof(struct batadv_tt_orig_list_entry);
|
|
|
|
size_t tt_change_size = sizeof(struct batadv_tt_change_node);
|
|
|
|
size_t tt_req_size = sizeof(struct batadv_tt_req_node);
|
|
|
|
size_t tt_roam_size = sizeof(struct batadv_tt_roam_node);
|
|
|
|
|
|
|
|
batadv_tl_cache = kmem_cache_create("batadv_tl_cache", tl_size, 0,
|
|
|
|
SLAB_HWCACHE_ALIGN, NULL);
|
|
|
|
if (!batadv_tl_cache)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
batadv_tg_cache = kmem_cache_create("batadv_tg_cache", tg_size, 0,
|
|
|
|
SLAB_HWCACHE_ALIGN, NULL);
|
|
|
|
if (!batadv_tg_cache)
|
|
|
|
goto err_tt_tl_destroy;
|
|
|
|
|
|
|
|
batadv_tt_orig_cache = kmem_cache_create("batadv_tt_orig_cache",
|
|
|
|
tt_orig_size, 0,
|
|
|
|
SLAB_HWCACHE_ALIGN, NULL);
|
|
|
|
if (!batadv_tt_orig_cache)
|
|
|
|
goto err_tt_tg_destroy;
|
|
|
|
|
|
|
|
batadv_tt_change_cache = kmem_cache_create("batadv_tt_change_cache",
|
|
|
|
tt_change_size, 0,
|
|
|
|
SLAB_HWCACHE_ALIGN, NULL);
|
|
|
|
if (!batadv_tt_change_cache)
|
|
|
|
goto err_tt_orig_destroy;
|
|
|
|
|
|
|
|
batadv_tt_req_cache = kmem_cache_create("batadv_tt_req_cache",
|
|
|
|
tt_req_size, 0,
|
|
|
|
SLAB_HWCACHE_ALIGN, NULL);
|
|
|
|
if (!batadv_tt_req_cache)
|
|
|
|
goto err_tt_change_destroy;
|
|
|
|
|
|
|
|
batadv_tt_roam_cache = kmem_cache_create("batadv_tt_roam_cache",
|
|
|
|
tt_roam_size, 0,
|
|
|
|
SLAB_HWCACHE_ALIGN, NULL);
|
|
|
|
if (!batadv_tt_roam_cache)
|
|
|
|
goto err_tt_req_destroy;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
err_tt_req_destroy:
|
|
|
|
kmem_cache_destroy(batadv_tt_req_cache);
|
|
|
|
batadv_tt_req_cache = NULL;
|
|
|
|
err_tt_change_destroy:
|
|
|
|
kmem_cache_destroy(batadv_tt_change_cache);
|
|
|
|
batadv_tt_change_cache = NULL;
|
|
|
|
err_tt_orig_destroy:
|
|
|
|
kmem_cache_destroy(batadv_tt_orig_cache);
|
|
|
|
batadv_tt_orig_cache = NULL;
|
|
|
|
err_tt_tg_destroy:
|
|
|
|
kmem_cache_destroy(batadv_tg_cache);
|
|
|
|
batadv_tg_cache = NULL;
|
|
|
|
err_tt_tl_destroy:
|
|
|
|
kmem_cache_destroy(batadv_tl_cache);
|
|
|
|
batadv_tl_cache = NULL;
|
|
|
|
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2017-12-03 02:51:47 +08:00
|
|
|
* batadv_tt_cache_destroy() - Destroy tt memory object cache
|
2016-06-25 22:44:06 +08:00
|
|
|
*/
|
|
|
|
void batadv_tt_cache_destroy(void)
|
|
|
|
{
|
|
|
|
kmem_cache_destroy(batadv_tl_cache);
|
|
|
|
kmem_cache_destroy(batadv_tg_cache);
|
|
|
|
kmem_cache_destroy(batadv_tt_orig_cache);
|
|
|
|
kmem_cache_destroy(batadv_tt_change_cache);
|
|
|
|
kmem_cache_destroy(batadv_tt_req_cache);
|
|
|
|
kmem_cache_destroy(batadv_tt_roam_cache);
|
|
|
|
}
|