2 * Copyright (c) 2014-2015 Timo Teräs
4 * This file is free software: you may copy, redistribute and/or modify
5 * it under the terms of the GNU General Public License as published by
6 * the Free Software Foundation, either version 2 of the License, or
7 * (at your option) any later version.
18 DEFINE_MTYPE_STATIC(NHRPD
, NHRP_CACHE
, "NHRP cache entry");
19 DEFINE_MTYPE_STATIC(NHRPD
, NHRP_CACHE_CONFIG
, "NHRP cache config entry");
21 unsigned long nhrp_cache_counts
[NHRP_CACHE_NUM_TYPES
];
23 const char *const nhrp_cache_type_str
[] = {
24 [NHRP_CACHE_INVALID
] = "invalid",
25 [NHRP_CACHE_INCOMPLETE
] = "incomplete",
26 [NHRP_CACHE_NEGATIVE
] = "negative",
27 [NHRP_CACHE_CACHED
] = "cached",
28 [NHRP_CACHE_DYNAMIC
] = "dynamic",
29 [NHRP_CACHE_NHS
] = "nhs",
30 [NHRP_CACHE_STATIC
] = "static",
31 [NHRP_CACHE_LOCAL
] = "local",
34 static unsigned int nhrp_cache_protocol_key(const void *peer_data
)
36 const struct nhrp_cache
*p
= peer_data
;
37 return sockunion_hash(&p
->remote_addr
);
40 static bool nhrp_cache_protocol_cmp(const void *cache_data
,
43 const struct nhrp_cache
*a
= cache_data
;
44 const struct nhrp_cache
*b
= key_data
;
46 return sockunion_same(&a
->remote_addr
, &b
->remote_addr
);
49 static void *nhrp_cache_alloc(void *data
)
51 struct nhrp_cache
*p
, *key
= data
;
53 p
= XMALLOC(MTYPE_NHRP_CACHE
, sizeof(struct nhrp_cache
));
55 *p
= (struct nhrp_cache
){
56 .cur
.type
= NHRP_CACHE_INVALID
,
57 .new.type
= NHRP_CACHE_INVALID
,
58 .remote_addr
= key
->remote_addr
,
61 NOTIFIER_LIST_INITIALIZER(&p
->notifier_list
),
63 nhrp_cache_counts
[p
->cur
.type
]++;
68 static void nhrp_cache_free(struct nhrp_cache
*c
)
70 struct nhrp_interface
*nifp
= c
->ifp
->info
;
72 debugf(NHRP_DEBUG_COMMON
, "Deleting cache entry");
73 nhrp_cache_counts
[c
->cur
.type
]--;
74 notifier_call(&c
->notifier_list
, NOTIFY_CACHE_DELETE
);
75 assert(!notifier_active(&c
->notifier_list
));
76 hash_release(nifp
->cache_hash
, c
);
77 THREAD_OFF(c
->t_timeout
);
78 THREAD_OFF(c
->t_auth
);
79 XFREE(MTYPE_NHRP_CACHE
, c
);
82 static unsigned int nhrp_cache_config_protocol_key(const void *peer_data
)
84 const struct nhrp_cache_config
*p
= peer_data
;
85 return sockunion_hash(&p
->remote_addr
);
88 static bool nhrp_cache_config_protocol_cmp(const void *cache_data
,
91 const struct nhrp_cache_config
*a
= cache_data
;
92 const struct nhrp_cache_config
*b
= key_data
;
94 if (!sockunion_same(&a
->remote_addr
, &b
->remote_addr
))
101 static void *nhrp_cache_config_alloc(void *data
)
103 struct nhrp_cache_config
*p
, *key
= data
;
105 p
= XCALLOC(MTYPE_NHRP_CACHE_CONFIG
, sizeof(struct nhrp_cache_config
));
107 *p
= (struct nhrp_cache_config
){
108 .remote_addr
= key
->remote_addr
,
114 void nhrp_cache_config_free(struct nhrp_cache_config
*c
)
116 struct nhrp_interface
*nifp
= c
->ifp
->info
;
118 hash_release(nifp
->cache_config_hash
, c
);
119 XFREE(MTYPE_NHRP_CACHE_CONFIG
, c
);
122 struct nhrp_cache_config
*nhrp_cache_config_get(struct interface
*ifp
,
123 union sockunion
*remote_addr
,
126 struct nhrp_interface
*nifp
= ifp
->info
;
127 struct nhrp_cache_config key
;
129 if (!nifp
->cache_config_hash
) {
130 nifp
->cache_config_hash
=
131 hash_create(nhrp_cache_config_protocol_key
,
132 nhrp_cache_config_protocol_cmp
,
133 "NHRP Config Cache");
134 if (!nifp
->cache_config_hash
)
137 key
.remote_addr
= *remote_addr
;
140 return hash_get(nifp
->cache_config_hash
, &key
,
141 create
? nhrp_cache_config_alloc
: NULL
);
144 static void do_nhrp_cache_free(struct hash_bucket
*hb
,
145 void *arg
__attribute__((__unused__
)))
147 struct nhrp_cache
*c
= hb
->data
;
152 static void do_nhrp_cache_config_free(struct hash_bucket
*hb
,
153 void *arg
__attribute__((__unused__
)))
155 struct nhrp_cache_config
*cc
= hb
->data
;
157 nhrp_cache_config_free(cc
);
160 void nhrp_cache_interface_del(struct interface
*ifp
)
162 struct nhrp_interface
*nifp
= ifp
->info
;
164 debugf(NHRP_DEBUG_COMMON
, "Cleaning up undeleted cache entries (%lu)",
165 nifp
->cache_hash
? nifp
->cache_hash
->count
: 0);
167 if (nifp
->cache_hash
) {
168 hash_iterate(nifp
->cache_hash
, do_nhrp_cache_free
, NULL
);
169 hash_free(nifp
->cache_hash
);
172 if (nifp
->cache_config_hash
) {
173 hash_iterate(nifp
->cache_config_hash
, do_nhrp_cache_config_free
,
175 hash_free(nifp
->cache_config_hash
);
179 struct nhrp_cache
*nhrp_cache_get(struct interface
*ifp
,
180 union sockunion
*remote_addr
, int create
)
182 struct nhrp_interface
*nifp
= ifp
->info
;
183 struct nhrp_cache key
;
185 if (!nifp
->cache_hash
) {
187 hash_create(nhrp_cache_protocol_key
,
188 nhrp_cache_protocol_cmp
, "NHRP Cache");
189 if (!nifp
->cache_hash
)
193 key
.remote_addr
= *remote_addr
;
196 return hash_get(nifp
->cache_hash
, &key
,
197 create
? nhrp_cache_alloc
: NULL
);
200 static int nhrp_cache_do_free(struct thread
*t
)
202 struct nhrp_cache
*c
= THREAD_ARG(t
);
209 static int nhrp_cache_do_timeout(struct thread
*t
)
211 struct nhrp_cache
*c
= THREAD_ARG(t
);
214 if (c
->cur
.type
!= NHRP_CACHE_INVALID
)
215 nhrp_cache_update_binding(c
, c
->cur
.type
, -1, NULL
, 0, NULL
,
220 static void nhrp_cache_update_route(struct nhrp_cache
*c
)
223 struct nhrp_peer
*p
= c
->cur
.peer
;
224 struct nhrp_interface
*nifp
;
226 if (!sockunion2hostprefix(&c
->remote_addr
, &pfx
))
229 if (p
&& nhrp_peer_check(p
, 1)) {
230 if (sockunion_family(&c
->cur
.remote_nbma_natoa
) != AF_UNSPEC
) {
231 /* remote_nbma_natoa is already set. Therefore, binding
232 * should be updated to this value and not vc's remote
235 debugf(NHRP_DEBUG_COMMON
,
236 "cache (remote_nbma_natoa set): Update binding for %pSU dev %s from (deleted) peer.vc.nbma %pSU to %pSU",
237 &c
->remote_addr
, p
->ifp
->name
,
238 &p
->vc
->remote
.nbma
, &c
->cur
.remote_nbma_natoa
);
240 netlink_update_binding(p
->ifp
, &c
->remote_addr
,
241 &c
->cur
.remote_nbma_natoa
);
243 /* update binding to peer->vc->remote->nbma */
244 debugf(NHRP_DEBUG_COMMON
,
245 "cache (remote_nbma_natoa unspec): Update binding for %pSU dev %s from (deleted) to peer.vc.nbma %pSU",
246 &c
->remote_addr
, p
->ifp
->name
,
247 &p
->vc
->remote
.nbma
);
249 netlink_update_binding(p
->ifp
, &c
->remote_addr
,
250 &p
->vc
->remote
.nbma
);
253 nhrp_route_announce(1, c
->cur
.type
, &pfx
, c
->ifp
, NULL
,
255 if (c
->cur
.type
>= NHRP_CACHE_DYNAMIC
) {
256 nhrp_route_update_nhrp(&pfx
, c
->ifp
);
257 c
->nhrp_route_installed
= 1;
258 } else if (c
->nhrp_route_installed
) {
259 nhrp_route_update_nhrp(&pfx
, NULL
);
260 c
->nhrp_route_installed
= 0;
262 if (!c
->route_installed
) {
263 notifier_call(&c
->notifier_list
, NOTIFY_CACHE_UP
);
264 c
->route_installed
= 1;
267 /* debug the reason for peer check fail */
270 debugf(NHRP_DEBUG_COMMON
,
271 "cache (peer check failed: online?%d requested?%d ipsec?%d)",
272 p
->online
, p
->requested
,
273 nifp
->ipsec_profile
? 1 : 0);
275 debugf(NHRP_DEBUG_COMMON
,
276 "cache (peer check failed: no p)");
278 if (c
->nhrp_route_installed
) {
279 nhrp_route_update_nhrp(&pfx
, NULL
);
280 c
->nhrp_route_installed
= 0;
282 if (c
->route_installed
) {
283 assert(sockunion2hostprefix(&c
->remote_addr
, &pfx
));
284 notifier_call(&c
->notifier_list
, NOTIFY_CACHE_DOWN
);
285 nhrp_route_announce(0, c
->cur
.type
, &pfx
, NULL
, NULL
,
287 c
->route_installed
= 0;
292 static void nhrp_cache_peer_notifier(struct notifier_block
*n
,
295 struct nhrp_cache
*c
=
296 container_of(n
, struct nhrp_cache
, peer_notifier
);
300 nhrp_cache_update_route(c
);
302 case NOTIFY_PEER_DOWN
:
303 case NOTIFY_PEER_IFCONFIG_CHANGED
:
304 notifier_call(&c
->notifier_list
, NOTIFY_CACHE_DOWN
);
305 nhrp_cache_update_binding(c
, c
->cur
.type
, -1, NULL
, 0, NULL
,
308 case NOTIFY_PEER_NBMA_CHANGING
:
309 if (c
->cur
.type
== NHRP_CACHE_DYNAMIC
)
310 c
->cur
.peer
->vc
->abort_migration
= 1;
315 static void nhrp_cache_reset_new(struct nhrp_cache
*c
)
317 THREAD_OFF(c
->t_auth
);
318 if (notifier_list_anywhere(&c
->newpeer_notifier
))
319 nhrp_peer_notify_del(c
->new.peer
, &c
->newpeer_notifier
);
320 nhrp_peer_unref(c
->new.peer
);
321 memset(&c
->new, 0, sizeof(c
->new));
322 c
->new.type
= NHRP_CACHE_INVALID
;
325 static void nhrp_cache_update_timers(struct nhrp_cache
*c
)
327 THREAD_OFF(c
->t_timeout
);
329 switch (c
->cur
.type
) {
330 case NHRP_CACHE_INVALID
:
332 thread_add_timer_msec(master
, nhrp_cache_do_free
, c
, 10,
337 thread_add_timer(master
, nhrp_cache_do_timeout
, c
,
338 c
->cur
.expires
- monotime(NULL
),
344 static void nhrp_cache_authorize_binding(struct nhrp_reqid
*r
, void *arg
)
346 struct nhrp_cache
*c
= container_of(r
, struct nhrp_cache
, eventid
);
347 char buf
[3][SU_ADDRSTRLEN
];
349 debugf(NHRP_DEBUG_COMMON
, "cache: %s %pSU: %s", c
->ifp
->name
,
350 &c
->remote_addr
, (const char *)arg
);
352 nhrp_reqid_free(&nhrp_event_reqid
, r
);
354 if (arg
&& strcmp(arg
, "accept") == 0) {
356 netlink_update_binding(c
->cur
.peer
->ifp
,
357 &c
->remote_addr
, NULL
);
358 nhrp_peer_notify_del(c
->cur
.peer
, &c
->peer_notifier
);
359 nhrp_peer_unref(c
->cur
.peer
);
361 nhrp_cache_counts
[c
->cur
.type
]--;
362 nhrp_cache_counts
[c
->new.type
]++;
364 c
->cur
.peer
= nhrp_peer_ref(c
->cur
.peer
);
365 nhrp_cache_reset_new(c
);
367 nhrp_peer_notify_add(c
->cur
.peer
, &c
->peer_notifier
,
368 nhrp_cache_peer_notifier
);
370 if (sockunion_family(&c
->cur
.remote_nbma_natoa
) != AF_UNSPEC
) {
371 debugf(NHRP_DEBUG_COMMON
,
372 "cache: update binding for %pSU dev %s from (deleted) peer.vc.nbma %s to %pSU",
373 &c
->remote_addr
, c
->ifp
->name
,
374 (c
->cur
.peer
? sockunion2str(
375 &c
->cur
.peer
->vc
->remote
.nbma
, buf
[1],
378 &c
->cur
.remote_nbma_natoa
);
381 netlink_update_binding(
382 c
->cur
.peer
->ifp
, &c
->remote_addr
,
383 &c
->cur
.remote_nbma_natoa
);
386 nhrp_cache_update_route(c
);
387 notifier_call(&c
->notifier_list
, NOTIFY_CACHE_BINDING_CHANGE
);
389 nhrp_cache_reset_new(c
);
392 nhrp_cache_update_timers(c
);
395 static int nhrp_cache_do_auth_timeout(struct thread
*t
)
397 struct nhrp_cache
*c
= THREAD_ARG(t
);
399 nhrp_cache_authorize_binding(&c
->eventid
, (void *)"timeout");
403 static void nhrp_cache_newpeer_notifier(struct notifier_block
*n
,
406 struct nhrp_cache
*c
=
407 container_of(n
, struct nhrp_cache
, newpeer_notifier
);
411 if (nhrp_peer_check(c
->new.peer
, 1)) {
412 evmgr_notify("authorize-binding", c
,
413 nhrp_cache_authorize_binding
);
414 thread_add_timer(master
, nhrp_cache_do_auth_timeout
, c
,
418 case NOTIFY_PEER_DOWN
:
419 case NOTIFY_PEER_IFCONFIG_CHANGED
:
420 nhrp_cache_reset_new(c
);
425 int nhrp_cache_update_binding(struct nhrp_cache
*c
, enum nhrp_cache_type type
,
426 int holding_time
, struct nhrp_peer
*p
,
427 uint32_t mtu
, union sockunion
*nbma_oa
,
428 union sockunion
*nbma_claimed
)
430 char buf
[2][SU_ADDRSTRLEN
];
432 if (c
->cur
.type
> type
|| c
->new.type
> type
) {
438 switch (sockunion_family(&c
->remote_addr
)) {
440 if (mtu
< 576 || mtu
>= 1500)
442 /* Opennhrp announces nbma mtu, but we use protocol mtu.
443 * This heuristic tries to fix up it. */
445 mtu
= (mtu
& -16) - 80;
452 sockunion2str(&c
->cur
.remote_nbma_natoa
, buf
[0], sizeof(buf
[0]));
454 sockunion2str(nbma_oa
, buf
[1], sizeof(buf
[1]));
456 nhrp_cache_reset_new(c
);
457 if (c
->cur
.type
== type
&& c
->cur
.peer
== p
&& c
->cur
.mtu
== mtu
) {
458 debugf(NHRP_DEBUG_COMMON
,
459 "cache: same type %u, updating expiry and changing nbma addr from %s to %s",
460 type
, buf
[0], nbma_oa
? buf
[1] : "(NULL)");
461 if (holding_time
> 0)
462 c
->cur
.expires
= monotime(NULL
) + holding_time
;
465 c
->cur
.remote_nbma_natoa
= *nbma_oa
;
467 memset(&c
->cur
.remote_nbma_natoa
, 0,
468 sizeof(c
->cur
.remote_nbma_natoa
));
471 c
->cur
.remote_nbma_claimed
= *nbma_claimed
;
473 memset(&c
->cur
.remote_nbma_claimed
, 0,
474 sizeof(c
->cur
.remote_nbma_claimed
));
478 debugf(NHRP_DEBUG_COMMON
,
479 "cache: new type %u/%u, or peer %s, or mtu %u/%u, nbma %s --> %s (map %d)",
480 c
->cur
.type
, type
, (c
->cur
.peer
== p
) ? "same" : "diff",
481 c
->cur
.mtu
, mtu
, buf
[0], nbma_oa
? buf
[1] : "(NULL)",
486 c
->new.holding_time
= holding_time
;
488 c
->new.remote_nbma_natoa
= *nbma_oa
;
491 c
->new.remote_nbma_claimed
= *nbma_claimed
;
493 if (holding_time
> 0)
494 c
->new.expires
= monotime(NULL
) + holding_time
;
495 else if (holding_time
< 0)
496 nhrp_cache_reset_new(c
);
498 if (c
->new.type
== NHRP_CACHE_INVALID
499 || c
->new.type
>= NHRP_CACHE_STATIC
|| c
->map
) {
500 nhrp_cache_authorize_binding(&c
->eventid
,
503 nhrp_peer_notify_add(c
->new.peer
, &c
->newpeer_notifier
,
504 nhrp_cache_newpeer_notifier
);
505 nhrp_cache_newpeer_notifier(&c
->newpeer_notifier
,
507 thread_add_timer(master
, nhrp_cache_do_auth_timeout
, c
,
511 nhrp_cache_update_timers(c
);
516 void nhrp_cache_set_used(struct nhrp_cache
*c
, int used
)
520 notifier_call(&c
->notifier_list
, NOTIFY_CACHE_USED
);
523 struct nhrp_cache_iterator_ctx
{
524 void (*cb
)(struct nhrp_cache
*, void *);
528 struct nhrp_cache_config_iterator_ctx
{
529 void (*cb
)(struct nhrp_cache_config
*, void *);
533 static void nhrp_cache_iterator(struct hash_bucket
*b
, void *ctx
)
535 struct nhrp_cache_iterator_ctx
*ic
= ctx
;
536 ic
->cb(b
->data
, ic
->ctx
);
539 static void nhrp_cache_config_iterator(struct hash_bucket
*b
, void *ctx
)
541 struct nhrp_cache_config_iterator_ctx
*ic
= ctx
;
542 ic
->cb(b
->data
, ic
->ctx
);
545 void nhrp_cache_foreach(struct interface
*ifp
,
546 void (*cb
)(struct nhrp_cache
*, void *), void *ctx
)
548 struct nhrp_interface
*nifp
= ifp
->info
;
549 struct nhrp_cache_iterator_ctx ic
= {
550 .cb
= cb
, .ctx
= ctx
,
553 if (nifp
->cache_hash
)
554 hash_iterate(nifp
->cache_hash
, nhrp_cache_iterator
, &ic
);
557 void nhrp_cache_config_foreach(struct interface
*ifp
,
558 void (*cb
)(struct nhrp_cache_config
*, void *), void *ctx
)
560 struct nhrp_interface
*nifp
= ifp
->info
;
561 struct nhrp_cache_config_iterator_ctx ic
= {
562 .cb
= cb
, .ctx
= ctx
,
565 if (nifp
->cache_config_hash
)
566 hash_iterate(nifp
->cache_config_hash
, nhrp_cache_config_iterator
, &ic
);
569 void nhrp_cache_notify_add(struct nhrp_cache
*c
, struct notifier_block
*n
,
572 notifier_add(n
, &c
->notifier_list
, fn
);
575 void nhrp_cache_notify_del(struct nhrp_cache
*c
, struct notifier_block
*n
)
577 notifier_del(n
, &c
->notifier_list
);