]>
Commit | Line | Data |
---|---|---|
2fb975da TT |
1 | /* NHRP cache |
2 | * Copyright (c) 2014-2015 Timo Teräs | |
3 | * | |
4 | * This file is free software: you may copy, redistribute and/or modify | |
5 | * it under the terms of the GNU General Public License as published by | |
6 | * the Free Software Foundation, either version 2 of the License, or | |
7 | * (at your option) any later version. | |
8 | */ | |
9 | ||
10 | #include "zebra.h" | |
11 | #include "memory.h" | |
12 | #include "thread.h" | |
13 | #include "hash.h" | |
14 | #include "nhrpd.h" | |
15 | ||
16 | #include "netlink.h" | |
17 | ||
bf8d3d6a DL |
18 | DEFINE_MTYPE_STATIC(NHRPD, NHRP_CACHE, "NHRP cache entry"); |
19 | DEFINE_MTYPE_STATIC(NHRPD, NHRP_CACHE_CONFIG, "NHRP cache config entry"); | |
819dc8bb | 20 | |
2fb975da TT |
21 | unsigned long nhrp_cache_counts[NHRP_CACHE_NUM_TYPES]; |
22 | ||
996c9314 LB |
23 | const char *const nhrp_cache_type_str[] = { |
24 | [NHRP_CACHE_INVALID] = "invalid", | |
25 | [NHRP_CACHE_INCOMPLETE] = "incomplete", | |
26 | [NHRP_CACHE_NEGATIVE] = "negative", | |
27 | [NHRP_CACHE_CACHED] = "cached", | |
28 | [NHRP_CACHE_DYNAMIC] = "dynamic", | |
29 | [NHRP_CACHE_NHS] = "nhs", | |
30 | [NHRP_CACHE_STATIC] = "static", | |
31 | [NHRP_CACHE_LOCAL] = "local", | |
2fb975da TT |
32 | }; |
33 | ||
d8b87afe | 34 | static unsigned int nhrp_cache_protocol_key(const void *peer_data) |
2fb975da | 35 | { |
d8b87afe | 36 | const struct nhrp_cache *p = peer_data; |
2fb975da TT |
37 | return sockunion_hash(&p->remote_addr); |
38 | } | |
39 | ||
74df8d6d DS |
40 | static bool nhrp_cache_protocol_cmp(const void *cache_data, |
41 | const void *key_data) | |
2fb975da TT |
42 | { |
43 | const struct nhrp_cache *a = cache_data; | |
44 | const struct nhrp_cache *b = key_data; | |
74df8d6d | 45 | |
2fb975da TT |
46 | return sockunion_same(&a->remote_addr, &b->remote_addr); |
47 | } | |
48 | ||
49 | static void *nhrp_cache_alloc(void *data) | |
50 | { | |
51 | struct nhrp_cache *p, *key = data; | |
52 | ||
53 | p = XMALLOC(MTYPE_NHRP_CACHE, sizeof(struct nhrp_cache)); | |
0ce1ca80 DS |
54 | |
55 | *p = (struct nhrp_cache){ | |
56 | .cur.type = NHRP_CACHE_INVALID, | |
57 | .new.type = NHRP_CACHE_INVALID, | |
58 | .remote_addr = key->remote_addr, | |
59 | .ifp = key->ifp, | |
60 | .notifier_list = | |
61 | NOTIFIER_LIST_INITIALIZER(&p->notifier_list), | |
62 | }; | |
63 | nhrp_cache_counts[p->cur.type]++; | |
2fb975da TT |
64 | |
65 | return p; | |
66 | } | |
67 | ||
68 | static void nhrp_cache_free(struct nhrp_cache *c) | |
69 | { | |
70 | struct nhrp_interface *nifp = c->ifp->info; | |
71 | ||
ee72f0a0 | 72 | debugf(NHRP_DEBUG_COMMON, "Deleting cache entry"); |
2fb975da TT |
73 | nhrp_cache_counts[c->cur.type]--; |
74 | notifier_call(&c->notifier_list, NOTIFY_CACHE_DELETE); | |
642ac49d | 75 | assert(!notifier_active(&c->notifier_list)); |
2fb975da | 76 | hash_release(nifp->cache_hash, c); |
ee72f0a0 RD |
77 | THREAD_OFF(c->t_timeout); |
78 | THREAD_OFF(c->t_auth); | |
2fb975da TT |
79 | XFREE(MTYPE_NHRP_CACHE, c); |
80 | } | |
81 | ||
fef2ed13 PG |
82 | static unsigned int nhrp_cache_config_protocol_key(const void *peer_data) |
83 | { | |
84 | const struct nhrp_cache_config *p = peer_data; | |
85 | return sockunion_hash(&p->remote_addr); | |
86 | } | |
87 | ||
88 | static bool nhrp_cache_config_protocol_cmp(const void *cache_data, | |
89 | const void *key_data) | |
90 | { | |
91 | const struct nhrp_cache_config *a = cache_data; | |
92 | const struct nhrp_cache_config *b = key_data; | |
93 | ||
94 | if (!sockunion_same(&a->remote_addr, &b->remote_addr)) | |
95 | return false; | |
96 | if (a->ifp != b->ifp) | |
97 | return false; | |
98 | return true; | |
99 | } | |
100 | ||
101 | static void *nhrp_cache_config_alloc(void *data) | |
102 | { | |
103 | struct nhrp_cache_config *p, *key = data; | |
104 | ||
105 | p = XCALLOC(MTYPE_NHRP_CACHE_CONFIG, sizeof(struct nhrp_cache_config)); | |
106 | ||
107 | *p = (struct nhrp_cache_config){ | |
108 | .remote_addr = key->remote_addr, | |
109 | .ifp = key->ifp, | |
110 | }; | |
111 | return p; | |
112 | } | |
113 | ||
114 | void nhrp_cache_config_free(struct nhrp_cache_config *c) | |
115 | { | |
116 | struct nhrp_interface *nifp = c->ifp->info; | |
117 | ||
118 | hash_release(nifp->cache_config_hash, c); | |
119 | XFREE(MTYPE_NHRP_CACHE_CONFIG, c); | |
120 | } | |
121 | ||
122 | struct nhrp_cache_config *nhrp_cache_config_get(struct interface *ifp, | |
123 | union sockunion *remote_addr, | |
124 | int create) | |
125 | { | |
126 | struct nhrp_interface *nifp = ifp->info; | |
127 | struct nhrp_cache_config key; | |
128 | ||
129 | if (!nifp->cache_config_hash) { | |
130 | nifp->cache_config_hash = | |
131 | hash_create(nhrp_cache_config_protocol_key, | |
132 | nhrp_cache_config_protocol_cmp, | |
133 | "NHRP Config Cache"); | |
134 | if (!nifp->cache_config_hash) | |
135 | return NULL; | |
136 | } | |
137 | key.remote_addr = *remote_addr; | |
138 | key.ifp = ifp; | |
139 | ||
140 | return hash_get(nifp->cache_config_hash, &key, | |
141 | create ? nhrp_cache_config_alloc : NULL); | |
142 | } | |
143 | ||
ee72f0a0 RD |
144 | static void do_nhrp_cache_free(struct hash_bucket *hb, |
145 | void *arg __attribute__((__unused__))) | |
146 | { | |
147 | struct nhrp_cache *c = hb->data; | |
148 | ||
149 | nhrp_cache_free(c); | |
150 | } | |
151 | ||
152 | static void do_nhrp_cache_config_free(struct hash_bucket *hb, | |
153 | void *arg __attribute__((__unused__))) | |
154 | { | |
155 | struct nhrp_cache_config *cc = hb->data; | |
156 | ||
157 | nhrp_cache_config_free(cc); | |
158 | } | |
159 | ||
160 | void nhrp_cache_interface_del(struct interface *ifp) | |
161 | { | |
162 | struct nhrp_interface *nifp = ifp->info; | |
163 | ||
164 | debugf(NHRP_DEBUG_COMMON, "Cleaning up undeleted cache entries (%lu)", | |
165 | nifp->cache_hash ? nifp->cache_hash->count : 0); | |
166 | ||
167 | if (nifp->cache_hash) { | |
168 | hash_iterate(nifp->cache_hash, do_nhrp_cache_free, NULL); | |
169 | hash_free(nifp->cache_hash); | |
170 | } | |
171 | ||
172 | if (nifp->cache_config_hash) { | |
173 | hash_iterate(nifp->cache_config_hash, do_nhrp_cache_config_free, | |
174 | NULL); | |
175 | hash_free(nifp->cache_config_hash); | |
176 | } | |
177 | } | |
178 | ||
996c9314 LB |
179 | struct nhrp_cache *nhrp_cache_get(struct interface *ifp, |
180 | union sockunion *remote_addr, int create) | |
2fb975da TT |
181 | { |
182 | struct nhrp_interface *nifp = ifp->info; | |
183 | struct nhrp_cache key; | |
184 | ||
185 | if (!nifp->cache_hash) { | |
996c9314 LB |
186 | nifp->cache_hash = |
187 | hash_create(nhrp_cache_protocol_key, | |
188 | nhrp_cache_protocol_cmp, "NHRP Cache"); | |
2fb975da TT |
189 | if (!nifp->cache_hash) |
190 | return NULL; | |
191 | } | |
192 | ||
193 | key.remote_addr = *remote_addr; | |
194 | key.ifp = ifp; | |
195 | ||
996c9314 LB |
196 | return hash_get(nifp->cache_hash, &key, |
197 | create ? nhrp_cache_alloc : NULL); | |
2fb975da TT |
198 | } |
199 | ||
cc9f21da | 200 | static void nhrp_cache_do_free(struct thread *t) |
2fb975da TT |
201 | { |
202 | struct nhrp_cache *c = THREAD_ARG(t); | |
ee72f0a0 | 203 | |
2fb975da TT |
204 | c->t_timeout = NULL; |
205 | nhrp_cache_free(c); | |
2fb975da TT |
206 | } |
207 | ||
cc9f21da | 208 | static void nhrp_cache_do_timeout(struct thread *t) |
2fb975da TT |
209 | { |
210 | struct nhrp_cache *c = THREAD_ARG(t); | |
ee72f0a0 | 211 | |
2fb975da TT |
212 | c->t_timeout = NULL; |
213 | if (c->cur.type != NHRP_CACHE_INVALID) | |
611915ae AL |
214 | nhrp_cache_update_binding(c, c->cur.type, -1, NULL, 0, NULL, |
215 | NULL); | |
2fb975da TT |
216 | } |
217 | ||
218 | static void nhrp_cache_update_route(struct nhrp_cache *c) | |
219 | { | |
220 | struct prefix pfx; | |
221 | struct nhrp_peer *p = c->cur.peer; | |
912c556b | 222 | struct nhrp_interface *nifp; |
2fb975da | 223 | |
0154d8ce DS |
224 | if (!sockunion2hostprefix(&c->remote_addr, &pfx)) |
225 | return; | |
2fb975da TT |
226 | |
227 | if (p && nhrp_peer_check(p, 1)) { | |
912c556b GN |
228 | if (sockunion_family(&c->cur.remote_nbma_natoa) != AF_UNSPEC) { |
229 | /* remote_nbma_natoa is already set. Therefore, binding | |
230 | * should be updated to this value and not vc's remote | |
231 | * nbma. | |
232 | */ | |
233 | debugf(NHRP_DEBUG_COMMON, | |
b6c48481 DS |
234 | "cache (remote_nbma_natoa set): Update binding for %pSU dev %s from (deleted) peer.vc.nbma %pSU to %pSU", |
235 | &c->remote_addr, p->ifp->name, | |
236 | &p->vc->remote.nbma, &c->cur.remote_nbma_natoa); | |
912c556b GN |
237 | |
238 | netlink_update_binding(p->ifp, &c->remote_addr, | |
239 | &c->cur.remote_nbma_natoa); | |
240 | } else { | |
5f36c26c | 241 | /* update binding to peer->vc->remote->nbma */ |
912c556b | 242 | debugf(NHRP_DEBUG_COMMON, |
b6c48481 DS |
243 | "cache (remote_nbma_natoa unspec): Update binding for %pSU dev %s from (deleted) to peer.vc.nbma %pSU", |
244 | &c->remote_addr, p->ifp->name, | |
245 | &p->vc->remote.nbma); | |
912c556b GN |
246 | |
247 | netlink_update_binding(p->ifp, &c->remote_addr, | |
248 | &p->vc->remote.nbma); | |
249 | } | |
250 | ||
996c9314 LB |
251 | nhrp_route_announce(1, c->cur.type, &pfx, c->ifp, NULL, |
252 | c->cur.mtu); | |
2fb975da TT |
253 | if (c->cur.type >= NHRP_CACHE_DYNAMIC) { |
254 | nhrp_route_update_nhrp(&pfx, c->ifp); | |
255 | c->nhrp_route_installed = 1; | |
256 | } else if (c->nhrp_route_installed) { | |
257 | nhrp_route_update_nhrp(&pfx, NULL); | |
258 | c->nhrp_route_installed = 0; | |
259 | } | |
260 | if (!c->route_installed) { | |
261 | notifier_call(&c->notifier_list, NOTIFY_CACHE_UP); | |
262 | c->route_installed = 1; | |
263 | } | |
264 | } else { | |
5f36c26c | 265 | /* debug the reason for peer check fail */ |
912c556b GN |
266 | if (p) { |
267 | nifp = p->ifp->info; | |
268 | debugf(NHRP_DEBUG_COMMON, | |
5f36c26c | 269 | "cache (peer check failed: online?%d requested?%d ipsec?%d)", |
912c556b GN |
270 | p->online, p->requested, |
271 | nifp->ipsec_profile ? 1 : 0); | |
272 | } else | |
273 | debugf(NHRP_DEBUG_COMMON, | |
274 | "cache (peer check failed: no p)"); | |
275 | ||
2fb975da TT |
276 | if (c->nhrp_route_installed) { |
277 | nhrp_route_update_nhrp(&pfx, NULL); | |
278 | c->nhrp_route_installed = 0; | |
279 | } | |
280 | if (c->route_installed) { | |
0154d8ce | 281 | assert(sockunion2hostprefix(&c->remote_addr, &pfx)); |
2fb975da | 282 | notifier_call(&c->notifier_list, NOTIFY_CACHE_DOWN); |
996c9314 LB |
283 | nhrp_route_announce(0, c->cur.type, &pfx, NULL, NULL, |
284 | 0); | |
2fb975da TT |
285 | c->route_installed = 0; |
286 | } | |
287 | } | |
288 | } | |
289 | ||
996c9314 LB |
290 | static void nhrp_cache_peer_notifier(struct notifier_block *n, |
291 | unsigned long cmd) | |
2fb975da | 292 | { |
996c9314 LB |
293 | struct nhrp_cache *c = |
294 | container_of(n, struct nhrp_cache, peer_notifier); | |
2fb975da TT |
295 | |
296 | switch (cmd) { | |
297 | case NOTIFY_PEER_UP: | |
298 | nhrp_cache_update_route(c); | |
299 | break; | |
300 | case NOTIFY_PEER_DOWN: | |
301 | case NOTIFY_PEER_IFCONFIG_CHANGED: | |
302 | notifier_call(&c->notifier_list, NOTIFY_CACHE_DOWN); | |
611915ae AL |
303 | nhrp_cache_update_binding(c, c->cur.type, -1, NULL, 0, NULL, |
304 | NULL); | |
2fb975da TT |
305 | break; |
306 | case NOTIFY_PEER_NBMA_CHANGING: | |
307 | if (c->cur.type == NHRP_CACHE_DYNAMIC) | |
308 | c->cur.peer->vc->abort_migration = 1; | |
309 | break; | |
310 | } | |
311 | } | |
312 | ||
313 | static void nhrp_cache_reset_new(struct nhrp_cache *c) | |
314 | { | |
315 | THREAD_OFF(c->t_auth); | |
865bf787 | 316 | if (notifier_list_anywhere(&c->newpeer_notifier)) |
2fb975da TT |
317 | nhrp_peer_notify_del(c->new.peer, &c->newpeer_notifier); |
318 | nhrp_peer_unref(c->new.peer); | |
319 | memset(&c->new, 0, sizeof(c->new)); | |
320 | c->new.type = NHRP_CACHE_INVALID; | |
321 | } | |
322 | ||
323 | static void nhrp_cache_update_timers(struct nhrp_cache *c) | |
324 | { | |
325 | THREAD_OFF(c->t_timeout); | |
326 | ||
327 | switch (c->cur.type) { | |
328 | case NHRP_CACHE_INVALID: | |
329 | if (!c->t_auth) | |
996c9314 LB |
330 | thread_add_timer_msec(master, nhrp_cache_do_free, c, 10, |
331 | &c->t_timeout); | |
2fb975da | 332 | break; |
d0038397 DS |
333 | case NHRP_CACHE_INCOMPLETE: |
334 | case NHRP_CACHE_NEGATIVE: | |
335 | case NHRP_CACHE_CACHED: | |
336 | case NHRP_CACHE_DYNAMIC: | |
337 | case NHRP_CACHE_NHS: | |
338 | case NHRP_CACHE_STATIC: | |
339 | case NHRP_CACHE_LOCAL: | |
340 | case NHRP_CACHE_NUM_TYPES: | |
2fb975da | 341 | if (c->cur.expires) |
ffa2c898 QY |
342 | thread_add_timer(master, nhrp_cache_do_timeout, c, |
343 | c->cur.expires - monotime(NULL), | |
344 | &c->t_timeout); | |
2fb975da TT |
345 | break; |
346 | } | |
347 | } | |
348 | ||
349 | static void nhrp_cache_authorize_binding(struct nhrp_reqid *r, void *arg) | |
350 | { | |
351 | struct nhrp_cache *c = container_of(r, struct nhrp_cache, eventid); | |
912c556b | 352 | char buf[3][SU_ADDRSTRLEN]; |
2fb975da | 353 | |
b6c48481 DS |
354 | debugf(NHRP_DEBUG_COMMON, "cache: %s %pSU: %s", c->ifp->name, |
355 | &c->remote_addr, (const char *)arg); | |
2fb975da TT |
356 | |
357 | nhrp_reqid_free(&nhrp_event_reqid, r); | |
358 | ||
359 | if (arg && strcmp(arg, "accept") == 0) { | |
360 | if (c->cur.peer) { | |
996c9314 LB |
361 | netlink_update_binding(c->cur.peer->ifp, |
362 | &c->remote_addr, NULL); | |
2fb975da TT |
363 | nhrp_peer_notify_del(c->cur.peer, &c->peer_notifier); |
364 | nhrp_peer_unref(c->cur.peer); | |
365 | } | |
366 | nhrp_cache_counts[c->cur.type]--; | |
367 | nhrp_cache_counts[c->new.type]++; | |
368 | c->cur = c->new; | |
369 | c->cur.peer = nhrp_peer_ref(c->cur.peer); | |
370 | nhrp_cache_reset_new(c); | |
371 | if (c->cur.peer) | |
996c9314 LB |
372 | nhrp_peer_notify_add(c->cur.peer, &c->peer_notifier, |
373 | nhrp_cache_peer_notifier); | |
912c556b GN |
374 | |
375 | if (sockunion_family(&c->cur.remote_nbma_natoa) != AF_UNSPEC) { | |
376 | debugf(NHRP_DEBUG_COMMON, | |
b6c48481 DS |
377 | "cache: update binding for %pSU dev %s from (deleted) peer.vc.nbma %s to %pSU", |
378 | &c->remote_addr, c->ifp->name, | |
912c556b GN |
379 | (c->cur.peer ? sockunion2str( |
380 | &c->cur.peer->vc->remote.nbma, buf[1], | |
5f36c26c | 381 | sizeof(buf[1])) |
912c556b | 382 | : "(no peer)"), |
b6c48481 | 383 | &c->cur.remote_nbma_natoa); |
912c556b | 384 | |
5f36c26c GN |
385 | if (c->cur.peer) |
386 | netlink_update_binding( | |
387 | c->cur.peer->ifp, &c->remote_addr, | |
388 | &c->cur.remote_nbma_natoa); | |
912c556b GN |
389 | } |
390 | ||
2fb975da TT |
391 | nhrp_cache_update_route(c); |
392 | notifier_call(&c->notifier_list, NOTIFY_CACHE_BINDING_CHANGE); | |
393 | } else { | |
394 | nhrp_cache_reset_new(c); | |
395 | } | |
396 | ||
397 | nhrp_cache_update_timers(c); | |
398 | } | |
399 | ||
cc9f21da | 400 | static void nhrp_cache_do_auth_timeout(struct thread *t) |
2fb975da TT |
401 | { |
402 | struct nhrp_cache *c = THREAD_ARG(t); | |
403 | c->t_auth = NULL; | |
996c9314 | 404 | nhrp_cache_authorize_binding(&c->eventid, (void *)"timeout"); |
2fb975da TT |
405 | } |
406 | ||
996c9314 LB |
407 | static void nhrp_cache_newpeer_notifier(struct notifier_block *n, |
408 | unsigned long cmd) | |
2fb975da | 409 | { |
996c9314 LB |
410 | struct nhrp_cache *c = |
411 | container_of(n, struct nhrp_cache, newpeer_notifier); | |
2fb975da TT |
412 | |
413 | switch (cmd) { | |
414 | case NOTIFY_PEER_UP: | |
415 | if (nhrp_peer_check(c->new.peer, 1)) { | |
996c9314 LB |
416 | evmgr_notify("authorize-binding", c, |
417 | nhrp_cache_authorize_binding); | |
418 | thread_add_timer(master, nhrp_cache_do_auth_timeout, c, | |
419 | 10, &c->t_auth); | |
2fb975da TT |
420 | } |
421 | break; | |
422 | case NOTIFY_PEER_DOWN: | |
423 | case NOTIFY_PEER_IFCONFIG_CHANGED: | |
424 | nhrp_cache_reset_new(c); | |
425 | break; | |
426 | } | |
427 | } | |
428 | ||
996c9314 LB |
429 | int nhrp_cache_update_binding(struct nhrp_cache *c, enum nhrp_cache_type type, |
430 | int holding_time, struct nhrp_peer *p, | |
611915ae AL |
431 | uint32_t mtu, union sockunion *nbma_oa, |
432 | union sockunion *nbma_claimed) | |
2fb975da | 433 | { |
912c556b | 434 | char buf[2][SU_ADDRSTRLEN]; |
5f36c26c | 435 | |
2fb975da TT |
436 | if (c->cur.type > type || c->new.type > type) { |
437 | nhrp_peer_unref(p); | |
438 | return 0; | |
439 | } | |
440 | ||
441 | /* Sanitize MTU */ | |
442 | switch (sockunion_family(&c->remote_addr)) { | |
443 | case AF_INET: | |
444 | if (mtu < 576 || mtu >= 1500) | |
445 | mtu = 0; | |
446 | /* Opennhrp announces nbma mtu, but we use protocol mtu. | |
447 | * This heuristic tries to fix up it. */ | |
996c9314 LB |
448 | if (mtu > 1420) |
449 | mtu = (mtu & -16) - 80; | |
2fb975da TT |
450 | break; |
451 | default: | |
452 | mtu = 0; | |
453 | break; | |
454 | } | |
455 | ||
912c556b GN |
456 | sockunion2str(&c->cur.remote_nbma_natoa, buf[0], sizeof(buf[0])); |
457 | if (nbma_oa) | |
458 | sockunion2str(nbma_oa, buf[1], sizeof(buf[1])); | |
459 | ||
2fb975da TT |
460 | nhrp_cache_reset_new(c); |
461 | if (c->cur.type == type && c->cur.peer == p && c->cur.mtu == mtu) { | |
912c556b | 462 | debugf(NHRP_DEBUG_COMMON, |
5f36c26c | 463 | "cache: same type %u, updating expiry and changing nbma addr from %s to %s", |
912c556b | 464 | type, buf[0], nbma_oa ? buf[1] : "(NULL)"); |
996c9314 LB |
465 | if (holding_time > 0) |
466 | c->cur.expires = monotime(NULL) + holding_time; | |
5f36c26c | 467 | |
996c9314 LB |
468 | if (nbma_oa) |
469 | c->cur.remote_nbma_natoa = *nbma_oa; | |
470 | else | |
471 | memset(&c->cur.remote_nbma_natoa, 0, | |
0d6f7fd6 | 472 | sizeof(c->cur.remote_nbma_natoa)); |
5f36c26c | 473 | |
85365e51 AL |
474 | if (nbma_claimed) |
475 | c->cur.remote_nbma_claimed = *nbma_claimed; | |
476 | else | |
477 | memset(&c->cur.remote_nbma_claimed, 0, | |
478 | sizeof(c->cur.remote_nbma_claimed)); | |
479 | ||
2fb975da TT |
480 | nhrp_peer_unref(p); |
481 | } else { | |
912c556b | 482 | debugf(NHRP_DEBUG_COMMON, |
5f36c26c | 483 | "cache: new type %u/%u, or peer %s, or mtu %u/%u, nbma %s --> %s (map %d)", |
912c556b GN |
484 | c->cur.type, type, (c->cur.peer == p) ? "same" : "diff", |
485 | c->cur.mtu, mtu, buf[0], nbma_oa ? buf[1] : "(NULL)", | |
486 | c->map); | |
2fb975da TT |
487 | c->new.type = type; |
488 | c->new.peer = p; | |
489 | c->new.mtu = mtu; | |
bb58f442 | 490 | c->new.holding_time = holding_time; |
996c9314 LB |
491 | if (nbma_oa) |
492 | c->new.remote_nbma_natoa = *nbma_oa; | |
2fb975da | 493 | |
85365e51 AL |
494 | if (nbma_claimed) |
495 | c->new.remote_nbma_claimed = *nbma_claimed; | |
496 | ||
2fb975da | 497 | if (holding_time > 0) |
819dc8bb | 498 | c->new.expires = monotime(NULL) + holding_time; |
2fb975da | 499 | else if (holding_time < 0) |
45c8b07a | 500 | nhrp_cache_reset_new(c); |
2fb975da | 501 | |
996c9314 LB |
502 | if (c->new.type == NHRP_CACHE_INVALID |
503 | || c->new.type >= NHRP_CACHE_STATIC || c->map) { | |
504 | nhrp_cache_authorize_binding(&c->eventid, | |
505 | (void *)"accept"); | |
2fb975da | 506 | } else { |
996c9314 LB |
507 | nhrp_peer_notify_add(c->new.peer, &c->newpeer_notifier, |
508 | nhrp_cache_newpeer_notifier); | |
509 | nhrp_cache_newpeer_notifier(&c->newpeer_notifier, | |
510 | NOTIFY_PEER_UP); | |
511 | thread_add_timer(master, nhrp_cache_do_auth_timeout, c, | |
512 | 60, &c->t_auth); | |
2fb975da TT |
513 | } |
514 | } | |
515 | nhrp_cache_update_timers(c); | |
516 | ||
517 | return 1; | |
518 | } | |
519 | ||
520 | void nhrp_cache_set_used(struct nhrp_cache *c, int used) | |
521 | { | |
522 | c->used = used; | |
523 | if (c->used) | |
524 | notifier_call(&c->notifier_list, NOTIFY_CACHE_USED); | |
525 | } | |
526 | ||
527 | struct nhrp_cache_iterator_ctx { | |
528 | void (*cb)(struct nhrp_cache *, void *); | |
529 | void *ctx; | |
530 | }; | |
531 | ||
fef2ed13 PG |
532 | struct nhrp_cache_config_iterator_ctx { |
533 | void (*cb)(struct nhrp_cache_config *, void *); | |
534 | void *ctx; | |
535 | }; | |
536 | ||
e3b78da8 | 537 | static void nhrp_cache_iterator(struct hash_bucket *b, void *ctx) |
2fb975da TT |
538 | { |
539 | struct nhrp_cache_iterator_ctx *ic = ctx; | |
540 | ic->cb(b->data, ic->ctx); | |
541 | } | |
542 | ||
fef2ed13 PG |
543 | static void nhrp_cache_config_iterator(struct hash_bucket *b, void *ctx) |
544 | { | |
545 | struct nhrp_cache_config_iterator_ctx *ic = ctx; | |
546 | ic->cb(b->data, ic->ctx); | |
547 | } | |
548 | ||
996c9314 LB |
549 | void nhrp_cache_foreach(struct interface *ifp, |
550 | void (*cb)(struct nhrp_cache *, void *), void *ctx) | |
2fb975da TT |
551 | { |
552 | struct nhrp_interface *nifp = ifp->info; | |
553 | struct nhrp_cache_iterator_ctx ic = { | |
996c9314 | 554 | .cb = cb, .ctx = ctx, |
2fb975da TT |
555 | }; |
556 | ||
557 | if (nifp->cache_hash) | |
558 | hash_iterate(nifp->cache_hash, nhrp_cache_iterator, &ic); | |
559 | } | |
560 | ||
fef2ed13 PG |
561 | void nhrp_cache_config_foreach(struct interface *ifp, |
562 | void (*cb)(struct nhrp_cache_config *, void *), void *ctx) | |
563 | { | |
564 | struct nhrp_interface *nifp = ifp->info; | |
565 | struct nhrp_cache_config_iterator_ctx ic = { | |
566 | .cb = cb, .ctx = ctx, | |
567 | }; | |
568 | ||
569 | if (nifp->cache_config_hash) | |
570 | hash_iterate(nifp->cache_config_hash, nhrp_cache_config_iterator, &ic); | |
571 | } | |
572 | ||
996c9314 LB |
573 | void nhrp_cache_notify_add(struct nhrp_cache *c, struct notifier_block *n, |
574 | notifier_fn_t fn) | |
2fb975da TT |
575 | { |
576 | notifier_add(n, &c->notifier_list, fn); | |
577 | } | |
578 | ||
579 | void nhrp_cache_notify_del(struct nhrp_cache *c, struct notifier_block *n) | |
580 | { | |
865bf787 | 581 | notifier_del(n, &c->notifier_list); |
2fb975da | 582 | } |