]> git.proxmox.com Git - mirror_frr.git/blame - nhrpd/nhrp_cache.c
Merge pull request #12728 from opensourcerouting/feature/bgp_neighbor_path-attribute_...
[mirror_frr.git] / nhrpd / nhrp_cache.c
CommitLineData
2fb975da
TT
1/* NHRP cache
2 * Copyright (c) 2014-2015 Timo Teräs
3 *
4 * This file is free software: you may copy, redistribute and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation, either version 2 of the License, or
7 * (at your option) any later version.
8 */
9
10#include "zebra.h"
11#include "memory.h"
12#include "thread.h"
13#include "hash.h"
14#include "nhrpd.h"
15
16#include "netlink.h"
17
bf8d3d6a
DL
18DEFINE_MTYPE_STATIC(NHRPD, NHRP_CACHE, "NHRP cache entry");
19DEFINE_MTYPE_STATIC(NHRPD, NHRP_CACHE_CONFIG, "NHRP cache config entry");
819dc8bb 20
2fb975da
TT
21unsigned long nhrp_cache_counts[NHRP_CACHE_NUM_TYPES];
22
996c9314
LB
23const char *const nhrp_cache_type_str[] = {
24 [NHRP_CACHE_INVALID] = "invalid",
25 [NHRP_CACHE_INCOMPLETE] = "incomplete",
26 [NHRP_CACHE_NEGATIVE] = "negative",
27 [NHRP_CACHE_CACHED] = "cached",
28 [NHRP_CACHE_DYNAMIC] = "dynamic",
29 [NHRP_CACHE_NHS] = "nhs",
30 [NHRP_CACHE_STATIC] = "static",
31 [NHRP_CACHE_LOCAL] = "local",
2fb975da
TT
32};
33
d8b87afe 34static unsigned int nhrp_cache_protocol_key(const void *peer_data)
2fb975da 35{
d8b87afe 36 const struct nhrp_cache *p = peer_data;
2fb975da
TT
37 return sockunion_hash(&p->remote_addr);
38}
39
74df8d6d
DS
40static bool nhrp_cache_protocol_cmp(const void *cache_data,
41 const void *key_data)
2fb975da
TT
42{
43 const struct nhrp_cache *a = cache_data;
44 const struct nhrp_cache *b = key_data;
74df8d6d 45
2fb975da
TT
46 return sockunion_same(&a->remote_addr, &b->remote_addr);
47}
48
49static void *nhrp_cache_alloc(void *data)
50{
51 struct nhrp_cache *p, *key = data;
52
53 p = XMALLOC(MTYPE_NHRP_CACHE, sizeof(struct nhrp_cache));
0ce1ca80
DS
54
55 *p = (struct nhrp_cache){
56 .cur.type = NHRP_CACHE_INVALID,
57 .new.type = NHRP_CACHE_INVALID,
58 .remote_addr = key->remote_addr,
59 .ifp = key->ifp,
60 .notifier_list =
61 NOTIFIER_LIST_INITIALIZER(&p->notifier_list),
62 };
63 nhrp_cache_counts[p->cur.type]++;
2fb975da
TT
64
65 return p;
66}
67
68static void nhrp_cache_free(struct nhrp_cache *c)
69{
70 struct nhrp_interface *nifp = c->ifp->info;
71
ee72f0a0 72 debugf(NHRP_DEBUG_COMMON, "Deleting cache entry");
2fb975da
TT
73 nhrp_cache_counts[c->cur.type]--;
74 notifier_call(&c->notifier_list, NOTIFY_CACHE_DELETE);
642ac49d 75 assert(!notifier_active(&c->notifier_list));
2fb975da 76 hash_release(nifp->cache_hash, c);
ee72f0a0
RD
77 THREAD_OFF(c->t_timeout);
78 THREAD_OFF(c->t_auth);
2fb975da
TT
79 XFREE(MTYPE_NHRP_CACHE, c);
80}
81
fef2ed13
PG
82static unsigned int nhrp_cache_config_protocol_key(const void *peer_data)
83{
84 const struct nhrp_cache_config *p = peer_data;
85 return sockunion_hash(&p->remote_addr);
86}
87
88static bool nhrp_cache_config_protocol_cmp(const void *cache_data,
89 const void *key_data)
90{
91 const struct nhrp_cache_config *a = cache_data;
92 const struct nhrp_cache_config *b = key_data;
93
94 if (!sockunion_same(&a->remote_addr, &b->remote_addr))
95 return false;
96 if (a->ifp != b->ifp)
97 return false;
98 return true;
99}
100
101static void *nhrp_cache_config_alloc(void *data)
102{
103 struct nhrp_cache_config *p, *key = data;
104
105 p = XCALLOC(MTYPE_NHRP_CACHE_CONFIG, sizeof(struct nhrp_cache_config));
106
107 *p = (struct nhrp_cache_config){
108 .remote_addr = key->remote_addr,
109 .ifp = key->ifp,
110 };
111 return p;
112}
113
114void nhrp_cache_config_free(struct nhrp_cache_config *c)
115{
116 struct nhrp_interface *nifp = c->ifp->info;
117
118 hash_release(nifp->cache_config_hash, c);
119 XFREE(MTYPE_NHRP_CACHE_CONFIG, c);
120}
121
122struct nhrp_cache_config *nhrp_cache_config_get(struct interface *ifp,
123 union sockunion *remote_addr,
124 int create)
125{
126 struct nhrp_interface *nifp = ifp->info;
127 struct nhrp_cache_config key;
128
129 if (!nifp->cache_config_hash) {
130 nifp->cache_config_hash =
131 hash_create(nhrp_cache_config_protocol_key,
132 nhrp_cache_config_protocol_cmp,
133 "NHRP Config Cache");
134 if (!nifp->cache_config_hash)
135 return NULL;
136 }
137 key.remote_addr = *remote_addr;
138 key.ifp = ifp;
139
140 return hash_get(nifp->cache_config_hash, &key,
141 create ? nhrp_cache_config_alloc : NULL);
142}
143
ee72f0a0
RD
144static void do_nhrp_cache_free(struct hash_bucket *hb,
145 void *arg __attribute__((__unused__)))
146{
147 struct nhrp_cache *c = hb->data;
148
149 nhrp_cache_free(c);
150}
151
152static void do_nhrp_cache_config_free(struct hash_bucket *hb,
153 void *arg __attribute__((__unused__)))
154{
155 struct nhrp_cache_config *cc = hb->data;
156
157 nhrp_cache_config_free(cc);
158}
159
160void nhrp_cache_interface_del(struct interface *ifp)
161{
162 struct nhrp_interface *nifp = ifp->info;
163
164 debugf(NHRP_DEBUG_COMMON, "Cleaning up undeleted cache entries (%lu)",
165 nifp->cache_hash ? nifp->cache_hash->count : 0);
166
167 if (nifp->cache_hash) {
168 hash_iterate(nifp->cache_hash, do_nhrp_cache_free, NULL);
169 hash_free(nifp->cache_hash);
170 }
171
172 if (nifp->cache_config_hash) {
173 hash_iterate(nifp->cache_config_hash, do_nhrp_cache_config_free,
174 NULL);
175 hash_free(nifp->cache_config_hash);
176 }
177}
178
996c9314
LB
179struct nhrp_cache *nhrp_cache_get(struct interface *ifp,
180 union sockunion *remote_addr, int create)
2fb975da
TT
181{
182 struct nhrp_interface *nifp = ifp->info;
183 struct nhrp_cache key;
184
185 if (!nifp->cache_hash) {
996c9314
LB
186 nifp->cache_hash =
187 hash_create(nhrp_cache_protocol_key,
188 nhrp_cache_protocol_cmp, "NHRP Cache");
2fb975da
TT
189 if (!nifp->cache_hash)
190 return NULL;
191 }
192
193 key.remote_addr = *remote_addr;
194 key.ifp = ifp;
195
996c9314
LB
196 return hash_get(nifp->cache_hash, &key,
197 create ? nhrp_cache_alloc : NULL);
2fb975da
TT
198}
199
cc9f21da 200static void nhrp_cache_do_free(struct thread *t)
2fb975da
TT
201{
202 struct nhrp_cache *c = THREAD_ARG(t);
ee72f0a0 203
2fb975da
TT
204 c->t_timeout = NULL;
205 nhrp_cache_free(c);
2fb975da
TT
206}
207
cc9f21da 208static void nhrp_cache_do_timeout(struct thread *t)
2fb975da
TT
209{
210 struct nhrp_cache *c = THREAD_ARG(t);
ee72f0a0 211
2fb975da
TT
212 c->t_timeout = NULL;
213 if (c->cur.type != NHRP_CACHE_INVALID)
611915ae
AL
214 nhrp_cache_update_binding(c, c->cur.type, -1, NULL, 0, NULL,
215 NULL);
2fb975da
TT
216}
217
218static void nhrp_cache_update_route(struct nhrp_cache *c)
219{
220 struct prefix pfx;
221 struct nhrp_peer *p = c->cur.peer;
912c556b 222 struct nhrp_interface *nifp;
2fb975da 223
0154d8ce
DS
224 if (!sockunion2hostprefix(&c->remote_addr, &pfx))
225 return;
2fb975da
TT
226
227 if (p && nhrp_peer_check(p, 1)) {
912c556b
GN
228 if (sockunion_family(&c->cur.remote_nbma_natoa) != AF_UNSPEC) {
229 /* remote_nbma_natoa is already set. Therefore, binding
230 * should be updated to this value and not vc's remote
231 * nbma.
232 */
233 debugf(NHRP_DEBUG_COMMON,
b6c48481
DS
234 "cache (remote_nbma_natoa set): Update binding for %pSU dev %s from (deleted) peer.vc.nbma %pSU to %pSU",
235 &c->remote_addr, p->ifp->name,
236 &p->vc->remote.nbma, &c->cur.remote_nbma_natoa);
912c556b
GN
237
238 netlink_update_binding(p->ifp, &c->remote_addr,
239 &c->cur.remote_nbma_natoa);
240 } else {
5f36c26c 241 /* update binding to peer->vc->remote->nbma */
912c556b 242 debugf(NHRP_DEBUG_COMMON,
b6c48481
DS
243 "cache (remote_nbma_natoa unspec): Update binding for %pSU dev %s from (deleted) to peer.vc.nbma %pSU",
244 &c->remote_addr, p->ifp->name,
245 &p->vc->remote.nbma);
912c556b
GN
246
247 netlink_update_binding(p->ifp, &c->remote_addr,
248 &p->vc->remote.nbma);
249 }
250
996c9314
LB
251 nhrp_route_announce(1, c->cur.type, &pfx, c->ifp, NULL,
252 c->cur.mtu);
2fb975da
TT
253 if (c->cur.type >= NHRP_CACHE_DYNAMIC) {
254 nhrp_route_update_nhrp(&pfx, c->ifp);
255 c->nhrp_route_installed = 1;
256 } else if (c->nhrp_route_installed) {
257 nhrp_route_update_nhrp(&pfx, NULL);
258 c->nhrp_route_installed = 0;
259 }
260 if (!c->route_installed) {
261 notifier_call(&c->notifier_list, NOTIFY_CACHE_UP);
262 c->route_installed = 1;
263 }
264 } else {
5f36c26c 265 /* debug the reason for peer check fail */
912c556b
GN
266 if (p) {
267 nifp = p->ifp->info;
268 debugf(NHRP_DEBUG_COMMON,
5f36c26c 269 "cache (peer check failed: online?%d requested?%d ipsec?%d)",
912c556b
GN
270 p->online, p->requested,
271 nifp->ipsec_profile ? 1 : 0);
272 } else
273 debugf(NHRP_DEBUG_COMMON,
274 "cache (peer check failed: no p)");
275
2fb975da
TT
276 if (c->nhrp_route_installed) {
277 nhrp_route_update_nhrp(&pfx, NULL);
278 c->nhrp_route_installed = 0;
279 }
280 if (c->route_installed) {
0154d8ce 281 assert(sockunion2hostprefix(&c->remote_addr, &pfx));
2fb975da 282 notifier_call(&c->notifier_list, NOTIFY_CACHE_DOWN);
996c9314
LB
283 nhrp_route_announce(0, c->cur.type, &pfx, NULL, NULL,
284 0);
2fb975da
TT
285 c->route_installed = 0;
286 }
287 }
288}
289
996c9314
LB
290static void nhrp_cache_peer_notifier(struct notifier_block *n,
291 unsigned long cmd)
2fb975da 292{
996c9314
LB
293 struct nhrp_cache *c =
294 container_of(n, struct nhrp_cache, peer_notifier);
2fb975da
TT
295
296 switch (cmd) {
297 case NOTIFY_PEER_UP:
298 nhrp_cache_update_route(c);
299 break;
300 case NOTIFY_PEER_DOWN:
301 case NOTIFY_PEER_IFCONFIG_CHANGED:
302 notifier_call(&c->notifier_list, NOTIFY_CACHE_DOWN);
611915ae
AL
303 nhrp_cache_update_binding(c, c->cur.type, -1, NULL, 0, NULL,
304 NULL);
2fb975da
TT
305 break;
306 case NOTIFY_PEER_NBMA_CHANGING:
307 if (c->cur.type == NHRP_CACHE_DYNAMIC)
308 c->cur.peer->vc->abort_migration = 1;
309 break;
310 }
311}
312
313static void nhrp_cache_reset_new(struct nhrp_cache *c)
314{
315 THREAD_OFF(c->t_auth);
865bf787 316 if (notifier_list_anywhere(&c->newpeer_notifier))
2fb975da
TT
317 nhrp_peer_notify_del(c->new.peer, &c->newpeer_notifier);
318 nhrp_peer_unref(c->new.peer);
319 memset(&c->new, 0, sizeof(c->new));
320 c->new.type = NHRP_CACHE_INVALID;
321}
322
323static void nhrp_cache_update_timers(struct nhrp_cache *c)
324{
325 THREAD_OFF(c->t_timeout);
326
327 switch (c->cur.type) {
328 case NHRP_CACHE_INVALID:
329 if (!c->t_auth)
996c9314
LB
330 thread_add_timer_msec(master, nhrp_cache_do_free, c, 10,
331 &c->t_timeout);
2fb975da 332 break;
d0038397
DS
333 case NHRP_CACHE_INCOMPLETE:
334 case NHRP_CACHE_NEGATIVE:
335 case NHRP_CACHE_CACHED:
336 case NHRP_CACHE_DYNAMIC:
337 case NHRP_CACHE_NHS:
338 case NHRP_CACHE_STATIC:
339 case NHRP_CACHE_LOCAL:
340 case NHRP_CACHE_NUM_TYPES:
2fb975da 341 if (c->cur.expires)
ffa2c898
QY
342 thread_add_timer(master, nhrp_cache_do_timeout, c,
343 c->cur.expires - monotime(NULL),
344 &c->t_timeout);
2fb975da
TT
345 break;
346 }
347}
348
349static void nhrp_cache_authorize_binding(struct nhrp_reqid *r, void *arg)
350{
351 struct nhrp_cache *c = container_of(r, struct nhrp_cache, eventid);
912c556b 352 char buf[3][SU_ADDRSTRLEN];
2fb975da 353
b6c48481
DS
354 debugf(NHRP_DEBUG_COMMON, "cache: %s %pSU: %s", c->ifp->name,
355 &c->remote_addr, (const char *)arg);
2fb975da
TT
356
357 nhrp_reqid_free(&nhrp_event_reqid, r);
358
359 if (arg && strcmp(arg, "accept") == 0) {
360 if (c->cur.peer) {
996c9314
LB
361 netlink_update_binding(c->cur.peer->ifp,
362 &c->remote_addr, NULL);
2fb975da
TT
363 nhrp_peer_notify_del(c->cur.peer, &c->peer_notifier);
364 nhrp_peer_unref(c->cur.peer);
365 }
366 nhrp_cache_counts[c->cur.type]--;
367 nhrp_cache_counts[c->new.type]++;
368 c->cur = c->new;
369 c->cur.peer = nhrp_peer_ref(c->cur.peer);
370 nhrp_cache_reset_new(c);
371 if (c->cur.peer)
996c9314
LB
372 nhrp_peer_notify_add(c->cur.peer, &c->peer_notifier,
373 nhrp_cache_peer_notifier);
912c556b
GN
374
375 if (sockunion_family(&c->cur.remote_nbma_natoa) != AF_UNSPEC) {
376 debugf(NHRP_DEBUG_COMMON,
b6c48481
DS
377 "cache: update binding for %pSU dev %s from (deleted) peer.vc.nbma %s to %pSU",
378 &c->remote_addr, c->ifp->name,
912c556b
GN
379 (c->cur.peer ? sockunion2str(
380 &c->cur.peer->vc->remote.nbma, buf[1],
5f36c26c 381 sizeof(buf[1]))
912c556b 382 : "(no peer)"),
b6c48481 383 &c->cur.remote_nbma_natoa);
912c556b 384
5f36c26c
GN
385 if (c->cur.peer)
386 netlink_update_binding(
387 c->cur.peer->ifp, &c->remote_addr,
388 &c->cur.remote_nbma_natoa);
912c556b
GN
389 }
390
2fb975da
TT
391 nhrp_cache_update_route(c);
392 notifier_call(&c->notifier_list, NOTIFY_CACHE_BINDING_CHANGE);
393 } else {
394 nhrp_cache_reset_new(c);
395 }
396
397 nhrp_cache_update_timers(c);
398}
399
cc9f21da 400static void nhrp_cache_do_auth_timeout(struct thread *t)
2fb975da
TT
401{
402 struct nhrp_cache *c = THREAD_ARG(t);
403 c->t_auth = NULL;
996c9314 404 nhrp_cache_authorize_binding(&c->eventid, (void *)"timeout");
2fb975da
TT
405}
406
996c9314
LB
407static void nhrp_cache_newpeer_notifier(struct notifier_block *n,
408 unsigned long cmd)
2fb975da 409{
996c9314
LB
410 struct nhrp_cache *c =
411 container_of(n, struct nhrp_cache, newpeer_notifier);
2fb975da
TT
412
413 switch (cmd) {
414 case NOTIFY_PEER_UP:
415 if (nhrp_peer_check(c->new.peer, 1)) {
996c9314
LB
416 evmgr_notify("authorize-binding", c,
417 nhrp_cache_authorize_binding);
418 thread_add_timer(master, nhrp_cache_do_auth_timeout, c,
419 10, &c->t_auth);
2fb975da
TT
420 }
421 break;
422 case NOTIFY_PEER_DOWN:
423 case NOTIFY_PEER_IFCONFIG_CHANGED:
424 nhrp_cache_reset_new(c);
425 break;
426 }
427}
428
996c9314
LB
429int nhrp_cache_update_binding(struct nhrp_cache *c, enum nhrp_cache_type type,
430 int holding_time, struct nhrp_peer *p,
611915ae
AL
431 uint32_t mtu, union sockunion *nbma_oa,
432 union sockunion *nbma_claimed)
2fb975da 433{
912c556b 434 char buf[2][SU_ADDRSTRLEN];
5f36c26c 435
2fb975da
TT
436 if (c->cur.type > type || c->new.type > type) {
437 nhrp_peer_unref(p);
438 return 0;
439 }
440
441 /* Sanitize MTU */
442 switch (sockunion_family(&c->remote_addr)) {
443 case AF_INET:
444 if (mtu < 576 || mtu >= 1500)
445 mtu = 0;
446 /* Opennhrp announces nbma mtu, but we use protocol mtu.
447 * This heuristic tries to fix up it. */
996c9314
LB
448 if (mtu > 1420)
449 mtu = (mtu & -16) - 80;
2fb975da
TT
450 break;
451 default:
452 mtu = 0;
453 break;
454 }
455
912c556b
GN
456 sockunion2str(&c->cur.remote_nbma_natoa, buf[0], sizeof(buf[0]));
457 if (nbma_oa)
458 sockunion2str(nbma_oa, buf[1], sizeof(buf[1]));
459
2fb975da
TT
460 nhrp_cache_reset_new(c);
461 if (c->cur.type == type && c->cur.peer == p && c->cur.mtu == mtu) {
912c556b 462 debugf(NHRP_DEBUG_COMMON,
5f36c26c 463 "cache: same type %u, updating expiry and changing nbma addr from %s to %s",
912c556b 464 type, buf[0], nbma_oa ? buf[1] : "(NULL)");
996c9314
LB
465 if (holding_time > 0)
466 c->cur.expires = monotime(NULL) + holding_time;
5f36c26c 467
996c9314
LB
468 if (nbma_oa)
469 c->cur.remote_nbma_natoa = *nbma_oa;
470 else
471 memset(&c->cur.remote_nbma_natoa, 0,
0d6f7fd6 472 sizeof(c->cur.remote_nbma_natoa));
5f36c26c 473
85365e51
AL
474 if (nbma_claimed)
475 c->cur.remote_nbma_claimed = *nbma_claimed;
476 else
477 memset(&c->cur.remote_nbma_claimed, 0,
478 sizeof(c->cur.remote_nbma_claimed));
479
2fb975da
TT
480 nhrp_peer_unref(p);
481 } else {
912c556b 482 debugf(NHRP_DEBUG_COMMON,
5f36c26c 483 "cache: new type %u/%u, or peer %s, or mtu %u/%u, nbma %s --> %s (map %d)",
912c556b
GN
484 c->cur.type, type, (c->cur.peer == p) ? "same" : "diff",
485 c->cur.mtu, mtu, buf[0], nbma_oa ? buf[1] : "(NULL)",
486 c->map);
2fb975da
TT
487 c->new.type = type;
488 c->new.peer = p;
489 c->new.mtu = mtu;
bb58f442 490 c->new.holding_time = holding_time;
996c9314
LB
491 if (nbma_oa)
492 c->new.remote_nbma_natoa = *nbma_oa;
2fb975da 493
85365e51
AL
494 if (nbma_claimed)
495 c->new.remote_nbma_claimed = *nbma_claimed;
496
2fb975da 497 if (holding_time > 0)
819dc8bb 498 c->new.expires = monotime(NULL) + holding_time;
2fb975da 499 else if (holding_time < 0)
45c8b07a 500 nhrp_cache_reset_new(c);
2fb975da 501
996c9314
LB
502 if (c->new.type == NHRP_CACHE_INVALID
503 || c->new.type >= NHRP_CACHE_STATIC || c->map) {
504 nhrp_cache_authorize_binding(&c->eventid,
505 (void *)"accept");
2fb975da 506 } else {
996c9314
LB
507 nhrp_peer_notify_add(c->new.peer, &c->newpeer_notifier,
508 nhrp_cache_newpeer_notifier);
509 nhrp_cache_newpeer_notifier(&c->newpeer_notifier,
510 NOTIFY_PEER_UP);
511 thread_add_timer(master, nhrp_cache_do_auth_timeout, c,
512 60, &c->t_auth);
2fb975da
TT
513 }
514 }
515 nhrp_cache_update_timers(c);
516
517 return 1;
518}
519
520void nhrp_cache_set_used(struct nhrp_cache *c, int used)
521{
522 c->used = used;
523 if (c->used)
524 notifier_call(&c->notifier_list, NOTIFY_CACHE_USED);
525}
526
527struct nhrp_cache_iterator_ctx {
528 void (*cb)(struct nhrp_cache *, void *);
529 void *ctx;
530};
531
fef2ed13
PG
532struct nhrp_cache_config_iterator_ctx {
533 void (*cb)(struct nhrp_cache_config *, void *);
534 void *ctx;
535};
536
e3b78da8 537static void nhrp_cache_iterator(struct hash_bucket *b, void *ctx)
2fb975da
TT
538{
539 struct nhrp_cache_iterator_ctx *ic = ctx;
540 ic->cb(b->data, ic->ctx);
541}
542
fef2ed13
PG
543static void nhrp_cache_config_iterator(struct hash_bucket *b, void *ctx)
544{
545 struct nhrp_cache_config_iterator_ctx *ic = ctx;
546 ic->cb(b->data, ic->ctx);
547}
548
996c9314
LB
549void nhrp_cache_foreach(struct interface *ifp,
550 void (*cb)(struct nhrp_cache *, void *), void *ctx)
2fb975da
TT
551{
552 struct nhrp_interface *nifp = ifp->info;
553 struct nhrp_cache_iterator_ctx ic = {
996c9314 554 .cb = cb, .ctx = ctx,
2fb975da
TT
555 };
556
557 if (nifp->cache_hash)
558 hash_iterate(nifp->cache_hash, nhrp_cache_iterator, &ic);
559}
560
fef2ed13
PG
561void nhrp_cache_config_foreach(struct interface *ifp,
562 void (*cb)(struct nhrp_cache_config *, void *), void *ctx)
563{
564 struct nhrp_interface *nifp = ifp->info;
565 struct nhrp_cache_config_iterator_ctx ic = {
566 .cb = cb, .ctx = ctx,
567 };
568
569 if (nifp->cache_config_hash)
570 hash_iterate(nifp->cache_config_hash, nhrp_cache_config_iterator, &ic);
571}
572
996c9314
LB
573void nhrp_cache_notify_add(struct nhrp_cache *c, struct notifier_block *n,
574 notifier_fn_t fn)
2fb975da
TT
575{
576 notifier_add(n, &c->notifier_list, fn);
577}
578
579void nhrp_cache_notify_del(struct nhrp_cache *c, struct notifier_block *n)
580{
865bf787 581 notifier_del(n, &c->notifier_list);
2fb975da 582}