Merge tag 'v2.0.7' into mq-notif
v2.0.7
This commit is contained in:
commit
28cefe2635
7
.dir-locals.el
Normal file
7
.dir-locals.el
Normal file
@ -0,0 +1,7 @@
|
||||
; BIRD project coding conventions
|
||||
|
||||
((c-mode
|
||||
(c-file-style . "bsd")
|
||||
(c-basic-offset . 2)
|
||||
(fill-column . 80)
|
||||
(show-trailing-whitespace . t)))
|
@ -79,11 +79,6 @@ docker_fedora-26-amd64:
|
||||
IMG_NAME: "fedora-26-amd64"
|
||||
<<: *docker_build
|
||||
|
||||
docker_centos-6-amd64:
|
||||
variables:
|
||||
IMG_NAME: "centos-6-amd64"
|
||||
<<: *docker_build
|
||||
|
||||
docker_centos-7-amd64:
|
||||
variables:
|
||||
IMG_NAME: "centos-7-amd64"
|
||||
@ -174,13 +169,6 @@ docker_ubuntu-16_04-amd64:
|
||||
- linux
|
||||
- amd64
|
||||
|
||||
.centos-6-amd64: ¢os-6-amd64_env
|
||||
image: registry.labs.nic.cz/labs/bird:centos-6-amd64
|
||||
tags:
|
||||
- docker
|
||||
- linux
|
||||
- amd64
|
||||
|
||||
.centos-7-amd64: ¢os-7-amd64_env
|
||||
image: registry.labs.nic.cz/labs/bird:centos-7-amd64
|
||||
tags:
|
||||
@ -264,10 +252,6 @@ build-fedora-26-amd64:
|
||||
<<: *fedora-26-amd64_env
|
||||
<<: *build_job
|
||||
|
||||
build-centos-6-amd64:
|
||||
<<: *centos-6-amd64_env
|
||||
<<: *build_job
|
||||
|
||||
build-centos-7-amd64:
|
||||
<<: *centos-7-amd64_env
|
||||
<<: *build_job
|
||||
|
@ -77,6 +77,8 @@ $(daemon): LIBS += $(DAEMON_LIBS)
|
||||
# Include directories
|
||||
dirs := client conf doc filter lib nest test $(addprefix proto/,$(protocols)) @sysdep_dirs@
|
||||
|
||||
# conf/Makefile declarations needed for all other modules
|
||||
conf-lex-targets := $(addprefix $(objdir)/conf/,cf-lex.o)
|
||||
conf-y-targets := $(addprefix $(objdir)/conf/,cf-parse.y keywords.h commands.h)
|
||||
cf-local = $(conf-y-targets): $(s)config.Y
|
||||
|
||||
@ -100,6 +102,7 @@ endef
|
||||
|
||||
clean = $(eval $(call clean_in,$(1)))
|
||||
|
||||
# Include main Makefiles of the directories
|
||||
include $(addsuffix /Makefile,$(addprefix $(srcdir)/,$(dirs)))
|
||||
|
||||
# Generic rules
|
||||
|
30
NEWS
30
NEWS
@ -1,3 +1,33 @@
|
||||
Version 2.0.7 (2019-10-11)
|
||||
o BGP: Accumulated IGP metric (RFC 7311)
|
||||
o Important filter reconfiguration bugfix
|
||||
o Several other bugfixes
|
||||
|
||||
Version 2.0.6 (2019-09-10)
|
||||
o RAdv: Solicited unicast RAs
|
||||
o BGP: Optional Adj-RIB-Out
|
||||
o BGP: Extended optional parameters length
|
||||
o Filter: Sets and set expressions in path masks
|
||||
o Several important bugfixes
|
||||
|
||||
Version 2.0.5 (2019-08-01)
|
||||
o OSPF Graceful restart (RFC 3623, RFC 5187)
|
||||
o BGP: Dynamic BGP
|
||||
o BGP: Promiscuous ASN mode
|
||||
o BGP: Mandatory option for channels
|
||||
o BFD: Support for VRFs
|
||||
o Graceful restart command
|
||||
o Redesigned filtering code
|
||||
o Many bugfixes
|
||||
|
||||
Notes:
|
||||
|
||||
Previous version introduced an error in handling of OSPF NSSA-LSA, causing
|
||||
compatibility issues with proper implementations. The error is fixed in this
|
||||
version, therefore there are compatibility issues in OSPF NSSA areas between
|
||||
this and previous version.
|
||||
|
||||
|
||||
Version 2.0.4 (2019-02-27)
|
||||
o OSPF: Opaque LSAs (RFC 5250)
|
||||
o OSPF: DN-bit handling (RFC 4576)
|
||||
|
43
aclocal.m4
vendored
43
aclocal.m4
vendored
@ -1,6 +1,25 @@
|
||||
dnl ** Additional Autoconf tests for BIRD configure script
|
||||
dnl ** (c) 1999 Martin Mares <mj@ucw.cz>
|
||||
|
||||
AC_DEFUN([BIRD_CHECK_THREAD_LOCAL],
|
||||
[
|
||||
AC_CACHE_CHECK(
|
||||
[whether _Thread_local is known],
|
||||
[bird_cv_thread_local],
|
||||
AC_COMPILE_IFELSE([
|
||||
AC_LANG_PROGRAM(
|
||||
[
|
||||
_Thread_local static int x = 42;
|
||||
],
|
||||
[]
|
||||
)
|
||||
],
|
||||
[bird_cv_thread_local=yes],
|
||||
[bird_cv_thread_local=no]
|
||||
)
|
||||
)
|
||||
])
|
||||
|
||||
AC_DEFUN([BIRD_CHECK_PTHREADS],
|
||||
[
|
||||
bird_tmp_cflags="$CFLAGS"
|
||||
@ -131,6 +150,30 @@ AC_DEFUN([BIRD_CHECK_ANDROID_LOG],
|
||||
)
|
||||
])
|
||||
|
||||
AC_DEFUN([BIRD_CHECK_LTO],
|
||||
[
|
||||
bird_tmp_cflags="$CFLAGS"
|
||||
bird_tmp_ldflags="$LDFLAGS"
|
||||
CFLAGS="-flto"
|
||||
LDFLAGS="-flto=4"
|
||||
|
||||
AC_CACHE_CHECK(
|
||||
[whether link time optimizer is available],
|
||||
[bird_cv_c_lto],
|
||||
[
|
||||
AC_LINK_IFELSE(
|
||||
[AC_LANG_PROGRAM()],
|
||||
[bird_cv_c_lto=yes],
|
||||
[bird_cv_c_lto=no]
|
||||
)
|
||||
]
|
||||
)
|
||||
|
||||
CFLAGS="$bird_tmp_cflags"
|
||||
LDFLAGS="$bird_tmp_ldflags"
|
||||
])
|
||||
|
||||
|
||||
AC_DEFUN([BIRD_CHECK_GCC_OPTION],
|
||||
[
|
||||
bird_tmp_cflags="$CFLAGS"
|
||||
|
153
bird-gdb.py
Normal file
153
bird-gdb.py
Normal file
@ -0,0 +1,153 @@
|
||||
class BIRDPrinter:
|
||||
def __init__(self, val):
|
||||
self.val = val
|
||||
|
||||
@classmethod
|
||||
def lookup(cls, val):
|
||||
if val.type.code != cls.typeCode:
|
||||
return None
|
||||
if val.type.tag != cls.typeTag:
|
||||
return None
|
||||
|
||||
return cls(val)
|
||||
|
||||
|
||||
class BIRDFValPrinter(BIRDPrinter):
|
||||
"Print BIRD\s struct f_val"
|
||||
typeCode = gdb.TYPE_CODE_STRUCT
|
||||
typeTag = "f_val"
|
||||
|
||||
codemap = {
|
||||
"T_INT": "i",
|
||||
"T_BOOL": "i",
|
||||
"T_PAIR": "i",
|
||||
"T_QUAD": "i",
|
||||
"T_ENUM_RTS": "i",
|
||||
"T_ENUM_BGP_ORIGIN": "i",
|
||||
"T_ENUM_SCOPE": "i",
|
||||
"T_ENUM_RTC": "i",
|
||||
"T_ENUM_RTD": "i",
|
||||
"T_ENUM_ROA": "i",
|
||||
"T_ENUM_NETTYPE": "i",
|
||||
"T_ENUM_RA_PREFERENCE": "i",
|
||||
"T_IP": "ip",
|
||||
"T_NET": "net",
|
||||
"T_STRING": "s",
|
||||
"T_PATH_MASK": "path_mask",
|
||||
"T_PATH": "ad",
|
||||
"T_CLIST": "ad",
|
||||
"T_EC": "ec",
|
||||
"T_ECLIST": "ad",
|
||||
"T_LC": "lc",
|
||||
"T_LCLIST": "ad",
|
||||
"T_RD": "ec",
|
||||
"T_PATH_MASK_ITEM": "pmi",
|
||||
"T_SET": "t",
|
||||
"T_PREFIX_SET": "ti",
|
||||
}
|
||||
|
||||
def to_string(self):
|
||||
code = self.val['type']
|
||||
if code.type.code != gdb.TYPE_CODE_ENUM or code.type.tag != "f_type":
|
||||
raise Exception("Strange 'type' element in f_val")
|
||||
|
||||
if str(code) == "T_VOID":
|
||||
return "T_VOID"
|
||||
else:
|
||||
return "(%(c)s) %(v)s" % { "c": code, "v": self.val['val'][self.codemap[str(code)]] }
|
||||
|
||||
def display_hint(self):
|
||||
return "map"
|
||||
|
||||
class BIRDFValStackPrinter(BIRDPrinter):
|
||||
"Print BIRD's struct f_val_stack"
|
||||
typeCode = gdb.TYPE_CODE_STRUCT
|
||||
typeTag = "f_val_stack"
|
||||
|
||||
def to_string(self):
|
||||
cnt = self.val['cnt']
|
||||
return ("Value stack (%(cnt)d):\n\t" % { "cnt": cnt }) + \
|
||||
"\n\t".join([ (".val[%(n) 3d] = " % { "n": n}) + str(self.val['val'][n]) for n in range(cnt-1, -1, -1) ])
|
||||
|
||||
def display_hint(self):
|
||||
return "map"
|
||||
|
||||
class BIRDFInstPrinter(BIRDPrinter):
|
||||
"Print BIRD's struct f_inst"
|
||||
typeCode = gdb.TYPE_CODE_STRUCT
|
||||
typeTag = "f_inst"
|
||||
|
||||
def to_string(self):
|
||||
code = self.val['fi_code']
|
||||
if str(code) == "FI_NOP":
|
||||
return str(code) + ": " + str(self.val.cast(gdb.lookup_type("const char [%(siz)d]" % { "siz": self.val.type.sizeof })))
|
||||
return "%(code)s:\t%(lineno) 6dL\t%(size)6dS\tnext = %(next)s: .i_%(code)s = %(union)s" % {
|
||||
"code": str(code),
|
||||
"lineno": self.val['lineno'],
|
||||
"size": self.val['size'],
|
||||
"next": str(self.val['next']),
|
||||
"union": str(self.val['i_' + str(code)])
|
||||
}
|
||||
|
||||
# def children(self): # children iterator
|
||||
def display_hint(self):
|
||||
return "map"
|
||||
|
||||
class BIRDFLineItemPrinter(BIRDPrinter):
|
||||
"Print BIRD's struct f_line_item"
|
||||
typeCode = gdb.TYPE_CODE_STRUCT
|
||||
typeTag = "f_line_item"
|
||||
|
||||
def to_string(self):
|
||||
code = self.val['fi_code']
|
||||
if str(code) == "FI_NOP":
|
||||
return str(code) + ": " + str(self.val.cast(gdb.lookup_type("const char [%(siz)d]" % { "siz": self.val.type.sizeof })))
|
||||
return "%(code)s:\t%(lineno) 6dL\t%(flags)2dF: .i_%(code)s = %(union)s" % {
|
||||
"code": str(code),
|
||||
"lineno": self.val['lineno'],
|
||||
"flags": self.val['flags'],
|
||||
"union": str(self.val['i_' + str(code)])
|
||||
}
|
||||
|
||||
class BIRDFLinePrinter(BIRDPrinter):
|
||||
"Print BIRD's struct f_line"
|
||||
typeCode = gdb.TYPE_CODE_STRUCT
|
||||
typeTag = "f_line"
|
||||
|
||||
def to_string(self):
|
||||
cnt = self.val['len']
|
||||
return ("FLine (%(cnt)d, args=%(args)d): " % { "cnt": cnt, "args" : self.val['args'] } + \
|
||||
", ".join([
|
||||
".items[%(n) 3d] = %(code)s" % {
|
||||
"n": n,
|
||||
"code": str(self.val['items'][n]['fi_code']),
|
||||
} if n % 8 == 0 else str(self.val['items'][n]['fi_code']) for n in range(cnt)]))
|
||||
|
||||
|
||||
class BIRDFExecStackPrinter(BIRDPrinter):
|
||||
"Print BIRD's struct f_exec_stack"
|
||||
typeCode = gdb.TYPE_CODE_STRUCT
|
||||
typeTag = "f_exec_stack"
|
||||
|
||||
def to_string(self):
|
||||
cnt = self.val['cnt']
|
||||
return ("Exec stack (%(cnt)d):\n\t" % { "cnt": cnt }) + \
|
||||
"\n\t".join([ ".item[%(n) 3d] = %(retflag)d V%(ventry) 3d P%(pos) 4d %(line)s" % {
|
||||
"retflag": self.val['item'][n]['emask'],
|
||||
"ventry": self.val['item'][n]['ventry'],
|
||||
"pos": self.val['item'][n]['pos'],
|
||||
"line": str(self.val['item'][n]['line'].dereference()),
|
||||
"n": n
|
||||
} for n in range(cnt-1, -1, -1) ])
|
||||
|
||||
def register_printers(objfile):
|
||||
objfile.pretty_printers.append(BIRDFInstPrinter.lookup)
|
||||
objfile.pretty_printers.append(BIRDFValPrinter.lookup)
|
||||
objfile.pretty_printers.append(BIRDFValStackPrinter.lookup)
|
||||
objfile.pretty_printers.append(BIRDFLineItemPrinter.lookup)
|
||||
objfile.pretty_printers.append(BIRDFLinePrinter.lookup)
|
||||
objfile.pretty_printers.append(BIRDFExecStackPrinter.lookup)
|
||||
|
||||
register_printers(gdb.current_objfile())
|
||||
|
||||
print("BIRD pretty printers loaded OK.")
|
@ -2,6 +2,7 @@ src := commands.c util.c client.c
|
||||
obj := $(src-o-files)
|
||||
|
||||
$(all-client)
|
||||
$(conf-y-targets): $(s)cmds.Y
|
||||
|
||||
$(exedir)/birdc: $(o)birdc.o
|
||||
$(exedir)/birdc: LIBS += $(CLIENT_LIBS)
|
||||
|
@ -10,12 +10,12 @@ BISON_DEBUG=-t
|
||||
#FLEX_DEBUG=-d
|
||||
endif
|
||||
|
||||
$(conf-y-targets): $(s)confbase.Y $(s)flowspec.Y
|
||||
$(M4) $(M4FLAGS) -P $| $^ >$@
|
||||
$(o)cf-parse.y: $(s)gen_parser.m4
|
||||
$(o)keywords.h: $(s)gen_keywords.m4
|
||||
$(o)commands.h: $(s)gen_commands.m4
|
||||
|
||||
$(o)cf-parse.y: | $(s)gen_parser.m4
|
||||
$(o)keywords.h: | $(s)gen_keywords.m4
|
||||
$(o)commands.h: | $(s)gen_commands.m4 $(srcdir)/client/cmds.m4
|
||||
$(conf-y-targets): $(s)confbase.Y $(s)flowspec.Y
|
||||
$(M4) $(M4FLAGS) -P $(if $(word 2,$(filter %.m4,$^)),$(error "Too many M4 scripts for one target"),$(filter %.m4,$^)) $(filter %.Y,$^) >$@
|
||||
|
||||
$(o)cf-parse.tab.h: $(o)cf-parse.tab.c
|
||||
|
||||
|
206
conf/cf-lex.l
206
conf/cf-lex.l
@ -45,6 +45,7 @@
|
||||
#include "nest/route.h"
|
||||
#include "nest/protocol.h"
|
||||
#include "filter/filter.h"
|
||||
#include "filter/f-inst.h"
|
||||
#include "conf/conf.h"
|
||||
#include "conf/cf-parse.tab.h"
|
||||
#include "lib/string.h"
|
||||
@ -64,7 +65,7 @@ struct keyword {
|
||||
#endif
|
||||
|
||||
|
||||
static uint cf_hash(byte *c);
|
||||
static uint cf_hash(const byte *c);
|
||||
|
||||
#define KW_KEY(n) n->name
|
||||
#define KW_NEXT(n) n->next
|
||||
@ -87,7 +88,7 @@ HASH_DEFINE_REHASH_FN(SYM, struct symbol)
|
||||
HASH(struct keyword) kw_hash;
|
||||
|
||||
|
||||
static struct sym_scope *conf_this_scope;
|
||||
struct sym_scope *conf_this_scope;
|
||||
|
||||
linpool *cfg_mem;
|
||||
|
||||
@ -95,6 +96,15 @@ int (*cf_read_hook)(byte *buf, unsigned int max, int fd);
|
||||
struct include_file_stack *ifs;
|
||||
static struct include_file_stack *ifs_head;
|
||||
|
||||
#define QUOTED_BUFFER_SIZE 4096
|
||||
static BUFFER_(char) quoted_buffer;
|
||||
static char quoted_buffer_data[QUOTED_BUFFER_SIZE];
|
||||
static inline void quoted_buffer_init(void) {
|
||||
quoted_buffer.used = 0;
|
||||
quoted_buffer.size = QUOTED_BUFFER_SIZE;
|
||||
quoted_buffer.data = quoted_buffer_data;
|
||||
}
|
||||
|
||||
#define MAX_INCLUDE_DEPTH 8
|
||||
|
||||
#define YY_INPUT(buf,result,max) result = cf_read_hook(buf, max, ifs->fd);
|
||||
@ -105,6 +115,8 @@ static struct include_file_stack *ifs_head;
|
||||
static void cf_include(char *arg, int alen);
|
||||
static int check_eof(void);
|
||||
|
||||
static enum yytokentype cf_lex_symbol(const char *data);
|
||||
|
||||
%}
|
||||
|
||||
%option noyywrap
|
||||
@ -112,24 +124,26 @@ static int check_eof(void);
|
||||
%option nounput
|
||||
%option noreject
|
||||
|
||||
%x COMMENT CCOMM CLI
|
||||
%x COMMENT CCOMM CLI QUOTED APOSTROPHED INCLUDE
|
||||
|
||||
ALPHA [a-zA-Z_]
|
||||
DIGIT [0-9]
|
||||
XIGIT [0-9a-fA-F]
|
||||
ALNUM [a-zA-Z_0-9]
|
||||
WHITE [ \t]
|
||||
include ^{WHITE}*include{WHITE}*\".*\"{WHITE}*;
|
||||
|
||||
%%
|
||||
{include} {
|
||||
char *start, *end;
|
||||
|
||||
^{WHITE}*include{WHITE}*\" {
|
||||
if (!ifs->depth)
|
||||
cf_error("Include not allowed in CLI");
|
||||
|
||||
start = strchr(yytext, '"');
|
||||
start++;
|
||||
BEGIN(INCLUDE);
|
||||
}
|
||||
|
||||
<INCLUDE>[^"\n]+["]{WHITE}*; {
|
||||
char *start, *end;
|
||||
|
||||
start = yytext;
|
||||
|
||||
end = strchr(start, '"');
|
||||
*end = 0;
|
||||
@ -138,15 +152,23 @@ include ^{WHITE}*include{WHITE}*\".*\"{WHITE}*;
|
||||
cf_error("Include with empty argument");
|
||||
|
||||
cf_include(start, end-start);
|
||||
|
||||
BEGIN(INITIAL);
|
||||
}
|
||||
|
||||
<INCLUDE>["] cf_error("Include with empty argument");
|
||||
<INCLUDE>. cf_error("Unterminated include");
|
||||
<INCLUDE>\n cf_error("Unterminated include");
|
||||
<INCLUDE><<EOF>> cf_error("Unterminated include");
|
||||
|
||||
|
||||
{DIGIT}+:{DIGIT}+ {
|
||||
uint len1 UNUSED, len2;
|
||||
u64 l;
|
||||
char *e;
|
||||
|
||||
errno = 0;
|
||||
l = strtoul(yytext, &e, 10);
|
||||
l = bstrtoul10(yytext, &e);
|
||||
if (e && (*e != ':') || (errno == ERANGE) || (l >> 32))
|
||||
cf_error("ASN out of range");
|
||||
|
||||
@ -164,7 +186,7 @@ include ^{WHITE}*include{WHITE}*\".*\"{WHITE}*;
|
||||
}
|
||||
|
||||
errno = 0;
|
||||
l = strtoul(e+1, &e, 10);
|
||||
l = bstrtoul10(e+1, &e);
|
||||
if (e && *e || (errno == ERANGE) || (l >> len2))
|
||||
cf_error("Number out of range");
|
||||
cf_lval.i64 |= l;
|
||||
@ -191,13 +213,13 @@ include ^{WHITE}*include{WHITE}*\".*\"{WHITE}*;
|
||||
}
|
||||
|
||||
errno = 0;
|
||||
l = strtoul(yytext+2, &e, 10);
|
||||
l = bstrtoul10(yytext+2, &e);
|
||||
if (e && (*e != ':') || (errno == ERANGE) || (l >> len1))
|
||||
cf_error("ASN out of range");
|
||||
cf_lval.i64 |= ((u64) l) << len2;
|
||||
|
||||
errno = 0;
|
||||
l = strtoul(e+1, &e, 10);
|
||||
l = bstrtoul10(e+1, &e);
|
||||
if (e && *e || (errno == ERANGE) || (l >> len2))
|
||||
cf_error("Number out of range");
|
||||
cf_lval.i64 |= l;
|
||||
@ -219,7 +241,7 @@ include ^{WHITE}*include{WHITE}*\".*\"{WHITE}*;
|
||||
cf_lval.i64 |= ((u64) ip4_to_u32(ip4)) << 16;
|
||||
|
||||
errno = 0;
|
||||
l = strtoul(e, &e, 10);
|
||||
l = bstrtoul10(e, &e);
|
||||
if (e && *e || (errno == ERANGE) || (l >> 16))
|
||||
cf_error("Number out of range");
|
||||
cf_lval.i64 |= l;
|
||||
@ -243,7 +265,7 @@ include ^{WHITE}*include{WHITE}*\".*\"{WHITE}*;
|
||||
char *e;
|
||||
unsigned long int l;
|
||||
errno = 0;
|
||||
l = strtoul(yytext+2, &e, 16);
|
||||
l = bstrtoul16(yytext+2, &e);
|
||||
if (e && *e || errno == ERANGE || (unsigned long int)(unsigned int) l != l)
|
||||
cf_error("Number out of range");
|
||||
cf_lval.i = l;
|
||||
@ -254,7 +276,7 @@ include ^{WHITE}*include{WHITE}*\".*\"{WHITE}*;
|
||||
char *e;
|
||||
unsigned long int l;
|
||||
errno = 0;
|
||||
l = strtoul(yytext, &e, 10);
|
||||
l = bstrtoul10(yytext, &e);
|
||||
if (e && *e || errno == ERANGE || (unsigned long int)(unsigned int) l != l)
|
||||
cf_error("Number out of range");
|
||||
cf_lval.i = l;
|
||||
@ -266,26 +288,23 @@ else: {
|
||||
return ELSECOL;
|
||||
}
|
||||
|
||||
({ALPHA}{ALNUM}*|[']({ALNUM}|[-]|[\.]|[:])*[']) {
|
||||
if(*yytext == '\'') {
|
||||
yytext[yyleng-1] = 0;
|
||||
yytext++;
|
||||
}
|
||||
['] {
|
||||
BEGIN(APOSTROPHED);
|
||||
quoted_buffer_init();
|
||||
}
|
||||
|
||||
struct keyword *k = HASH_FIND(kw_hash, KW, yytext);
|
||||
if (k)
|
||||
{
|
||||
if (k->value > 0)
|
||||
return k->value;
|
||||
else
|
||||
{
|
||||
cf_lval.i = -k->value;
|
||||
return ENUM;
|
||||
}
|
||||
}
|
||||
<APOSTROPHED>{ALNUM}|[-]|[.:] BUFFER_PUSH(quoted_buffer) = yytext[0];
|
||||
<APOSTROPHED>\n cf_error("Unterminated symbol");
|
||||
<APOSTROPHED><<EOF>> cf_error("Unterminated symbol");
|
||||
<APOSTROPHED>['] {
|
||||
BEGIN(INITIAL);
|
||||
BUFFER_PUSH(quoted_buffer) = 0;
|
||||
return cf_lex_symbol(quoted_buffer_data);
|
||||
}
|
||||
<APOSTROPHED>. cf_error("Invalid character in apostrophed symbol");
|
||||
|
||||
cf_lval.s = cf_get_symbol(yytext);
|
||||
return SYM;
|
||||
({ALPHA}{ALNUM}*) {
|
||||
return cf_lex_symbol(yytext);
|
||||
}
|
||||
|
||||
<CLI>(.|\n) {
|
||||
@ -301,14 +320,21 @@ else: {
|
||||
return yytext[0];
|
||||
}
|
||||
|
||||
["][^"\n]*["] {
|
||||
yytext[yyleng-1] = 0;
|
||||
cf_lval.t = cfg_strdup(yytext+1);
|
||||
yytext[yyleng-1] = '"';
|
||||
["] {
|
||||
BEGIN(QUOTED);
|
||||
quoted_buffer_init();
|
||||
}
|
||||
|
||||
<QUOTED>\n cf_error("Unterminated string");
|
||||
<QUOTED><<EOF>> cf_error("Unterminated string");
|
||||
<QUOTED>["] {
|
||||
BEGIN(INITIAL);
|
||||
BUFFER_PUSH(quoted_buffer) = 0;
|
||||
cf_lval.t = cfg_strdup(quoted_buffer_data);
|
||||
return TEXT;
|
||||
}
|
||||
|
||||
["][^"\n]*\n cf_error("Unterminated string");
|
||||
<QUOTED>. BUFFER_PUSH(quoted_buffer) = yytext[0];
|
||||
|
||||
<INITIAL,COMMENT><<EOF>> { if (check_eof()) return END; }
|
||||
|
||||
@ -349,7 +375,7 @@ else: {
|
||||
%%
|
||||
|
||||
static uint
|
||||
cf_hash(byte *c)
|
||||
cf_hash(const byte *c)
|
||||
{
|
||||
uint h = 13 << 24;
|
||||
|
||||
@ -358,7 +384,6 @@ cf_hash(byte *c)
|
||||
return h;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* IFS stack - it contains structures needed for recursive processing
|
||||
* of include in config files. On the top of the stack is a structure
|
||||
@ -519,7 +544,7 @@ check_eof(void)
|
||||
}
|
||||
|
||||
static struct symbol *
|
||||
cf_new_symbol(byte *c)
|
||||
cf_new_symbol(const byte *c)
|
||||
{
|
||||
struct symbol *s;
|
||||
|
||||
@ -527,11 +552,8 @@ cf_new_symbol(byte *c)
|
||||
if (l > SYM_MAX_LEN)
|
||||
cf_error("Symbol too long");
|
||||
|
||||
s = cfg_alloc(sizeof(struct symbol) + l);
|
||||
s->scope = conf_this_scope;
|
||||
s->class = SYM_VOID;
|
||||
s->def = NULL;
|
||||
s->aux = 0;
|
||||
s = cfg_allocz(sizeof(struct symbol) + l + 1);
|
||||
*s = (struct symbol) { .scope = conf_this_scope, .class = SYM_VOID, };
|
||||
strcpy(s->name, c);
|
||||
|
||||
if (!new_config->sym_hash.data)
|
||||
@ -539,6 +561,8 @@ cf_new_symbol(byte *c)
|
||||
|
||||
HASH_INSERT2(new_config->sym_hash, SYM, new_config->pool, s);
|
||||
|
||||
add_tail(&(new_config->symbols), &(s->n));
|
||||
|
||||
return s;
|
||||
}
|
||||
|
||||
@ -554,7 +578,7 @@ cf_new_symbol(byte *c)
|
||||
* signify no match.
|
||||
*/
|
||||
struct symbol *
|
||||
cf_find_symbol(struct config *cfg, byte *c)
|
||||
cf_find_symbol(const struct config *cfg, const byte *c)
|
||||
{
|
||||
struct symbol *s;
|
||||
|
||||
@ -562,6 +586,7 @@ cf_find_symbol(struct config *cfg, byte *c)
|
||||
(s = HASH_FIND(cfg->sym_hash, SYM, c, 1)))
|
||||
return s;
|
||||
|
||||
/* In CLI command parsing, fallback points to the current config, otherwise it is NULL. */
|
||||
if (cfg->fallback &&
|
||||
cfg->fallback->sym_hash.data &&
|
||||
(s = HASH_FIND(cfg->fallback->sym_hash, SYM, c, 1)))
|
||||
@ -580,11 +605,33 @@ cf_find_symbol(struct config *cfg, byte *c)
|
||||
* existing symbol is found.
|
||||
*/
|
||||
struct symbol *
|
||||
cf_get_symbol(byte *c)
|
||||
cf_get_symbol(const byte *c)
|
||||
{
|
||||
return cf_find_symbol(new_config, c) ?: cf_new_symbol(c);
|
||||
}
|
||||
|
||||
/**
|
||||
* cf_localize_symbol - get the local instance of given symbol
|
||||
* @sym: the symbol to localize
|
||||
*
|
||||
* This functions finds the symbol that is local to current scope
|
||||
* for purposes of cf_define_symbol().
|
||||
*/
|
||||
struct symbol *
|
||||
cf_localize_symbol(struct symbol *sym)
|
||||
{
|
||||
/* If the symbol type is void, it has been recently allocated just in this scope. */
|
||||
if (!sym->class)
|
||||
return sym;
|
||||
|
||||
/* If the scope is the current, it is already defined in this scope. */
|
||||
if (sym->scope == conf_this_scope)
|
||||
cf_error("Symbol already defined");
|
||||
|
||||
/* Not allocated here yet, doing it now. */
|
||||
return cf_new_symbol(sym->name);
|
||||
}
|
||||
|
||||
struct symbol *
|
||||
cf_default_name(char *template, int *counter)
|
||||
{
|
||||
@ -604,33 +651,32 @@ cf_default_name(char *template, int *counter)
|
||||
cf_error("Unable to generate default name");
|
||||
}
|
||||
|
||||
/**
|
||||
* cf_define_symbol - define meaning of a symbol
|
||||
* @sym: symbol to be defined
|
||||
* @type: symbol class to assign
|
||||
* @def: class dependent data
|
||||
*
|
||||
* Defines new meaning of a symbol. If the symbol is an undefined
|
||||
* one (%SYM_VOID), it's just re-defined to the new type. If it's defined
|
||||
* in different scope, a new symbol in current scope is created and the
|
||||
* meaning is assigned to it. If it's already defined in the current scope,
|
||||
* an error is reported via cf_error().
|
||||
*
|
||||
* Result: Pointer to the newly defined symbol. If we are in the top-level
|
||||
* scope, it's the same @sym as passed to the function.
|
||||
*/
|
||||
struct symbol *
|
||||
cf_define_symbol(struct symbol *sym, int type, void *def)
|
||||
static enum yytokentype
|
||||
cf_lex_symbol(const char *data)
|
||||
{
|
||||
if (sym->class)
|
||||
/* Have we defined such a symbol? */
|
||||
struct symbol *sym = cf_get_symbol(data);
|
||||
cf_lval.s = sym;
|
||||
|
||||
if (sym->class != SYM_VOID)
|
||||
return CF_SYM_KNOWN;
|
||||
|
||||
/* Is it a keyword? */
|
||||
struct keyword *k = HASH_FIND(kw_hash, KW, data);
|
||||
if (k)
|
||||
{
|
||||
if (k->value > 0)
|
||||
return k->value;
|
||||
else
|
||||
{
|
||||
if (sym->scope == conf_this_scope)
|
||||
cf_error("Symbol already defined");
|
||||
sym = cf_new_symbol(sym->name);
|
||||
cf_lval.i = -k->value;
|
||||
return ENUM;
|
||||
}
|
||||
sym->class = type;
|
||||
sym->def = def;
|
||||
return sym;
|
||||
}
|
||||
|
||||
/* OK, undefined symbol */
|
||||
cf_lval.s = sym;
|
||||
return CF_SYM_UNDEFINED;
|
||||
}
|
||||
|
||||
static void
|
||||
@ -673,7 +719,8 @@ cf_lex_init(int is_cli, struct config *c)
|
||||
else
|
||||
BEGIN(INITIAL);
|
||||
|
||||
conf_this_scope = cfg_allocz(sizeof(struct sym_scope));
|
||||
c->root_scope = cfg_allocz(sizeof(struct sym_scope));
|
||||
conf_this_scope = c->root_scope;
|
||||
conf_this_scope->active = 1;
|
||||
}
|
||||
|
||||
@ -696,6 +743,7 @@ cf_push_scope(struct symbol *sym)
|
||||
conf_this_scope = s;
|
||||
s->active = 1;
|
||||
s->name = sym;
|
||||
s->slots = 0;
|
||||
}
|
||||
|
||||
/**
|
||||
@ -710,6 +758,7 @@ cf_pop_scope(void)
|
||||
{
|
||||
conf_this_scope->active = 0;
|
||||
conf_this_scope = conf_this_scope->next;
|
||||
|
||||
ASSERT(conf_this_scope);
|
||||
}
|
||||
|
||||
@ -723,9 +772,6 @@ cf_pop_scope(void)
|
||||
char *
|
||||
cf_symbol_class_name(struct symbol *sym)
|
||||
{
|
||||
if (cf_symbol_is_constant(sym))
|
||||
return "constant";
|
||||
|
||||
switch (sym->class)
|
||||
{
|
||||
case SYM_VOID:
|
||||
@ -740,6 +786,12 @@ cf_symbol_class_name(struct symbol *sym)
|
||||
return "filter";
|
||||
case SYM_TABLE:
|
||||
return "routing table";
|
||||
case SYM_ATTRIBUTE:
|
||||
return "custom attribute";
|
||||
case SYM_CONSTANT_RANGE:
|
||||
return "constant";
|
||||
case SYM_VARIABLE_RANGE:
|
||||
return "variable";
|
||||
default:
|
||||
return "unknown type";
|
||||
}
|
||||
|
30
conf/conf.c
30
conf/conf.c
@ -98,6 +98,7 @@ config_alloc(const char *name)
|
||||
memcpy(ndup, name, nlen);
|
||||
|
||||
init_list(&c->tests);
|
||||
init_list(&c->symbols);
|
||||
c->mrtdump_file = -1; /* Hack, this should be sysdep-specific */
|
||||
c->pool = p;
|
||||
c->mem = l;
|
||||
@ -258,6 +259,8 @@ config_do_commit(struct config *c, int type)
|
||||
if (old_config)
|
||||
old_config->obstacle_count++;
|
||||
|
||||
DBG("filter_commit\n");
|
||||
filter_commit(c, old_config);
|
||||
DBG("sysdep_commit\n");
|
||||
int force_restart = sysdep_commit(c, old_config);
|
||||
DBG("global_commit\n");
|
||||
@ -444,6 +447,24 @@ config_undo(void)
|
||||
return CONF_PROGRESS;
|
||||
}
|
||||
|
||||
int
|
||||
config_status(void)
|
||||
{
|
||||
if (shutting_down)
|
||||
return CONF_SHUTDOWN;
|
||||
|
||||
if (configuring)
|
||||
return future_cftype ? CONF_QUEUED : CONF_PROGRESS;
|
||||
|
||||
return CONF_DONE;
|
||||
}
|
||||
|
||||
btime
|
||||
config_timer_status(void)
|
||||
{
|
||||
return tm_active(config_timer) ? tm_remains(config_timer) : -1;
|
||||
}
|
||||
|
||||
extern void cmd_reconfig_undo_notify(void);
|
||||
|
||||
static void
|
||||
@ -474,19 +495,24 @@ config_init(void)
|
||||
* for switching to an empty configuration.
|
||||
*/
|
||||
void
|
||||
order_shutdown(void)
|
||||
order_shutdown(int gr)
|
||||
{
|
||||
struct config *c;
|
||||
|
||||
if (shutting_down)
|
||||
return;
|
||||
|
||||
log(L_INFO "Shutting down");
|
||||
if (!gr)
|
||||
log(L_INFO "Shutting down");
|
||||
else
|
||||
log(L_INFO "Shutting down for graceful restart");
|
||||
|
||||
c = lp_alloc(config->mem, sizeof(struct config));
|
||||
memcpy(c, config, sizeof(struct config));
|
||||
init_list(&c->protos);
|
||||
init_list(&c->tables);
|
||||
c->shutdown = 1;
|
||||
c->gr_down = gr;
|
||||
|
||||
config_commit(c, RECONFIG_HARD, 0);
|
||||
shutting_down = 1;
|
||||
|
69
conf/conf.h
69
conf/conf.h
@ -24,6 +24,7 @@ struct config {
|
||||
list tables; /* Configured routing tables (struct rtable_config) */
|
||||
list logfiles; /* Configured log files (sysdep) */
|
||||
list tests; /* Configured unit tests (f_bt_test_suite) */
|
||||
list symbols; /* Configured symbols in config order */
|
||||
|
||||
int mrtdump_file; /* Configured MRTDump file (sysdep, fd in unix) */
|
||||
char *syslog_name; /* Name used for syslog (NULL -> no syslog) */
|
||||
@ -52,8 +53,10 @@ struct config {
|
||||
int file_fd; /* File descriptor of main configuration file */
|
||||
HASH(struct symbol) sym_hash; /* Lexer: symbol hash table */
|
||||
struct config *fallback; /* Link to regular config for CLI parsing */
|
||||
struct sym_scope *root_scope; /* Scope for root symbols */
|
||||
int obstacle_count; /* Number of items blocking freeing of this config */
|
||||
int shutdown; /* This is a pseudo-config for daemon shutdown */
|
||||
int gr_down; /* This is a pseudo-config for graceful restart */
|
||||
btime load_time; /* When we've got this configuration */
|
||||
};
|
||||
|
||||
@ -68,11 +71,13 @@ void config_free(struct config *);
|
||||
int config_commit(struct config *, int type, uint timeout);
|
||||
int config_confirm(void);
|
||||
int config_undo(void);
|
||||
int config_status(void);
|
||||
btime config_timer_status(void);
|
||||
void config_init(void);
|
||||
void cf_error(const char *msg, ...) NORET;
|
||||
void config_add_obstacle(struct config *);
|
||||
void config_del_obstacle(struct config *);
|
||||
void order_shutdown(void);
|
||||
void order_shutdown(int gr);
|
||||
|
||||
#define RECONFIG_NONE 0
|
||||
#define RECONFIG_HARD 1
|
||||
@ -103,18 +108,29 @@ void cfg_copy_list(list *dest, list *src, unsigned node_size);
|
||||
extern int (*cf_read_hook)(byte *buf, uint max, int fd);
|
||||
|
||||
struct symbol {
|
||||
node n; /* In list of symbols in config */
|
||||
struct symbol *next;
|
||||
struct sym_scope *scope;
|
||||
int class;
|
||||
int aux;
|
||||
void *aux2;
|
||||
void *def;
|
||||
char name[1];
|
||||
int class; /* SYM_* */
|
||||
uint flags; /* SYM_FLAG_* */
|
||||
|
||||
union {
|
||||
struct proto_config *proto; /* For SYM_PROTO and SYM_TEMPLATE */
|
||||
const struct f_line *function; /* For SYM_FUNCTION */
|
||||
const struct filter *filter; /* For SYM_FILTER */
|
||||
struct rtable_config *table; /* For SYM_TABLE */
|
||||
struct f_dynamic_attr *attribute; /* For SYM_ATTRIBUTE */
|
||||
struct f_val *val; /* For SYM_CONSTANT */
|
||||
uint offset; /* For SYM_VARIABLE */
|
||||
};
|
||||
|
||||
char name[0];
|
||||
};
|
||||
|
||||
struct sym_scope {
|
||||
struct sym_scope *next; /* Next on scope stack */
|
||||
struct symbol *name; /* Name of this scope */
|
||||
uint slots; /* Variable slots */
|
||||
int active; /* Currently entered */
|
||||
};
|
||||
|
||||
@ -134,8 +150,11 @@ struct sym_scope {
|
||||
#define SYM_CONSTANT 0x200 /* 0x200-0x2ff are variable types */
|
||||
#define SYM_CONSTANT_RANGE SYM_CONSTANT ... (SYM_CONSTANT | 0xff)
|
||||
|
||||
#define SYM_TYPE(s) (((struct f_val *) (s)->def)->type)
|
||||
#define SYM_VAL(s) (((struct f_val *) (s)->def)->val)
|
||||
#define SYM_TYPE(s) ((s)->val->type)
|
||||
#define SYM_VAL(s) ((s)->val->val)
|
||||
|
||||
/* Symbol flags */
|
||||
#define SYM_FLAG_SAME 0x1 /* For SYM_FUNCTION and SYM_FILTER */
|
||||
|
||||
struct include_file_stack {
|
||||
void *buffer; /* Internal lexer state */
|
||||
@ -152,23 +171,43 @@ struct include_file_stack {
|
||||
|
||||
extern struct include_file_stack *ifs;
|
||||
|
||||
extern struct sym_scope *conf_this_scope;
|
||||
|
||||
int cf_lex(void);
|
||||
void cf_lex_init(int is_cli, struct config *c);
|
||||
void cf_lex_unwind(void);
|
||||
|
||||
struct symbol *cf_find_symbol(struct config *cfg, byte *c);
|
||||
struct symbol *cf_find_symbol(const struct config *cfg, const byte *c);
|
||||
|
||||
struct symbol *cf_get_symbol(byte *c);
|
||||
struct symbol *cf_get_symbol(const byte *c);
|
||||
struct symbol *cf_default_name(char *template, int *counter);
|
||||
struct symbol *cf_define_symbol(struct symbol *symbol, int type, void *def);
|
||||
struct symbol *cf_localize_symbol(struct symbol *sym);
|
||||
|
||||
/**
|
||||
* cf_define_symbol - define meaning of a symbol
|
||||
* @sym: symbol to be defined
|
||||
* @type: symbol class to assign
|
||||
* @def: class dependent data
|
||||
*
|
||||
* Defines new meaning of a symbol. If the symbol is an undefined
|
||||
* one (%SYM_VOID), it's just re-defined to the new type. If it's defined
|
||||
* in different scope, a new symbol in current scope is created and the
|
||||
* meaning is assigned to it. If it's already defined in the current scope,
|
||||
* an error is reported via cf_error().
|
||||
*
|
||||
* Result: Pointer to the newly defined symbol. If we are in the top-level
|
||||
* scope, it's the same @sym as passed to the function.
|
||||
*/
|
||||
#define cf_define_symbol(sym_, type_, var_, def_) ({ \
|
||||
struct symbol *sym = cf_localize_symbol(sym_); \
|
||||
sym->class = type_; \
|
||||
sym->var_ = def_; \
|
||||
sym; })
|
||||
|
||||
void cf_push_scope(struct symbol *);
|
||||
void cf_pop_scope(void);
|
||||
char *cf_symbol_class_name(struct symbol *sym);
|
||||
|
||||
static inline int cf_symbol_is_constant(struct symbol *sym)
|
||||
{ return (sym->class & 0xff00) == SYM_CONSTANT; }
|
||||
|
||||
|
||||
/* Parser */
|
||||
|
||||
extern char *cf_text;
|
||||
|
@ -33,6 +33,21 @@ check_u16(uint val)
|
||||
cf_error("Value %u out of range (0-65535)", val);
|
||||
}
|
||||
|
||||
#define cf_assert(cond, ...) do { if (!(cond)) cf_error(__VA_ARGS__); } while (0)
|
||||
static inline void cf_assert_symbol(const struct symbol *sym, uint class) {
|
||||
switch (class) {
|
||||
case SYM_PROTO: cf_assert(sym->class == SYM_PROTO, "Protocol name required"); break;
|
||||
case SYM_TEMPLATE: cf_assert(sym->class == SYM_TEMPLATE, "Protocol template name required"); break;
|
||||
case SYM_FUNCTION: cf_assert(sym->class == SYM_FUNCTION, "Function name required"); break;
|
||||
case SYM_FILTER: cf_assert(sym->class == SYM_FILTER, "Filter name required"); break;
|
||||
case SYM_TABLE: cf_assert(sym->class == SYM_TABLE, "Table name required"); break;
|
||||
case SYM_ATTRIBUTE: cf_assert(sym->class == SYM_ATTRIBUTE, "Custom attribute name required"); break;
|
||||
case SYM_VARIABLE: cf_assert((sym->class & ~0xff) == SYM_VARIABLE, "Variable name required"); break;
|
||||
case SYM_CONSTANT: cf_assert((sym->class & ~0xff) == SYM_CONSTANT, "Constant name required"); break;
|
||||
default: bug("This shall not happen");
|
||||
}
|
||||
}
|
||||
|
||||
CF_DECLS
|
||||
|
||||
%union {
|
||||
@ -49,13 +64,19 @@ CF_DECLS
|
||||
struct rtable_config *r;
|
||||
struct channel_config *cc;
|
||||
struct f_inst *x;
|
||||
struct {
|
||||
struct f_inst *begin, *end;
|
||||
} xp;
|
||||
enum filter_return fret;
|
||||
enum ec_subtype ecs;
|
||||
struct f_dynamic_attr fda;
|
||||
struct f_static_attr fsa;
|
||||
struct filter *f;
|
||||
struct f_lval flv;
|
||||
struct f_line *fl;
|
||||
const struct filter *f;
|
||||
struct f_tree *e;
|
||||
struct f_trie *trie;
|
||||
struct f_val v;
|
||||
struct f_path_mask *h;
|
||||
struct password_item *p;
|
||||
struct rt_show_data *ra;
|
||||
struct sym_show_data *sd;
|
||||
@ -78,7 +99,7 @@ CF_DECLS
|
||||
%token <ip4> IP4
|
||||
%token <ip6> IP6
|
||||
%token <i64> VPN_RD
|
||||
%token <s> SYM
|
||||
%token <s> CF_SYM_KNOWN CF_SYM_UNDEFINED
|
||||
%token <t> TEXT
|
||||
%type <iface> ipa_scope
|
||||
|
||||
@ -90,6 +111,7 @@ CF_DECLS
|
||||
%type <mls> label_stack_start label_stack
|
||||
|
||||
%type <t> text opttext
|
||||
%type <s> symbol
|
||||
|
||||
%nonassoc PREFIX_DUMMY
|
||||
%left AND OR
|
||||
@ -99,6 +121,8 @@ CF_DECLS
|
||||
%left '!'
|
||||
%nonassoc '.'
|
||||
|
||||
%start config
|
||||
|
||||
CF_KEYWORDS(DEFINE, ON, OFF, YES, NO, S, MS, US, PORT, VPN, MPLS, FROM)
|
||||
|
||||
CF_GRAMMAR
|
||||
@ -122,29 +146,29 @@ conf: ';' ;
|
||||
conf: definition ;
|
||||
|
||||
definition:
|
||||
DEFINE SYM '=' term ';' {
|
||||
DEFINE symbol '=' term ';' {
|
||||
struct f_val *val = cfg_alloc(sizeof(struct f_val));
|
||||
*val = f_eval($4, cfg_mem);
|
||||
if (val->type == T_RETURN) cf_error("Runtime error");
|
||||
cf_define_symbol($2, SYM_CONSTANT | val->type, val);
|
||||
if (f_eval(f_linearize($4), cfg_mem, val) > F_RETURN) cf_error("Runtime error");
|
||||
cf_define_symbol($2, SYM_CONSTANT | val->type, val, val);
|
||||
}
|
||||
;
|
||||
|
||||
expr:
|
||||
NUM
|
||||
| '(' term ')' { $$ = f_eval_int($2); }
|
||||
| SYM {
|
||||
if ($1->class != (SYM_CONSTANT | T_INT)) cf_error("Number expected");
|
||||
| '(' term ')' { $$ = f_eval_int(f_linearize($2)); }
|
||||
| CF_SYM_KNOWN {
|
||||
if ($1->class != (SYM_CONSTANT | T_INT)) cf_error("Number constant expected");
|
||||
$$ = SYM_VAL($1).i; }
|
||||
;
|
||||
|
||||
|
||||
expr_us:
|
||||
expr S { $$ = $1 S_; }
|
||||
| expr MS { $$ = $1 MS_; }
|
||||
| expr US { $$ = $1 US_; }
|
||||
;
|
||||
|
||||
symbol: CF_SYM_UNDEFINED | CF_SYM_KNOWN ;
|
||||
|
||||
/* Switches */
|
||||
|
||||
bool:
|
||||
@ -162,15 +186,15 @@ bool:
|
||||
ipa:
|
||||
IP4 { $$ = ipa_from_ip4($1); }
|
||||
| IP6 { $$ = ipa_from_ip6($1); }
|
||||
| SYM {
|
||||
if ($1->class != (SYM_CONSTANT | T_IP)) cf_error("IP address expected");
|
||||
| CF_SYM_KNOWN {
|
||||
if ($1->class != (SYM_CONSTANT | T_IP)) cf_error("IP address constant expected");
|
||||
$$ = SYM_VAL($1).ip;
|
||||
}
|
||||
;
|
||||
|
||||
ipa_scope:
|
||||
/* empty */ { $$ = NULL; }
|
||||
| '%' SYM { $$ = if_get_by_name($2->name); }
|
||||
| '%' symbol { $$ = if_get_by_name($2->name); }
|
||||
;
|
||||
|
||||
|
||||
@ -277,27 +301,27 @@ net_:
|
||||
|
||||
net_ip6:
|
||||
net_ip6_
|
||||
| SYM {
|
||||
| CF_SYM_KNOWN {
|
||||
if (($1->class != (SYM_CONSTANT | T_NET)) || (SYM_VAL($1).net->type != NET_IP6))
|
||||
cf_error("IPv6 network expected");
|
||||
cf_error("IPv6 network constant expected");
|
||||
$$ = * SYM_VAL($1).net;
|
||||
}
|
||||
;
|
||||
|
||||
net_ip:
|
||||
net_ip_
|
||||
| SYM {
|
||||
| CF_SYM_KNOWN {
|
||||
if (($1->class != (SYM_CONSTANT | T_NET)) || !net_is_ip(SYM_VAL($1).net))
|
||||
cf_error("IP network expected");
|
||||
cf_error("IP network constant expected");
|
||||
$$ = * SYM_VAL($1).net;
|
||||
}
|
||||
;
|
||||
|
||||
net_any:
|
||||
net_
|
||||
| SYM {
|
||||
| CF_SYM_KNOWN {
|
||||
if ($1->class != (SYM_CONSTANT | T_NET))
|
||||
cf_error("Network expected");
|
||||
cf_error("Network constant expected");
|
||||
$$ = (net_addr *) SYM_VAL($1).net; /* Avoid const warning */
|
||||
}
|
||||
;
|
||||
@ -307,13 +331,13 @@ net_or_ipa:
|
||||
| net_ip6_
|
||||
| IP4 { net_fill_ip4(&($$), $1, IP4_MAX_PREFIX_LENGTH); }
|
||||
| IP6 { net_fill_ip6(&($$), $1, IP6_MAX_PREFIX_LENGTH); }
|
||||
| SYM {
|
||||
| CF_SYM_KNOWN {
|
||||
if ($1->class == (SYM_CONSTANT | T_IP))
|
||||
net_fill_ip_host(&($$), SYM_VAL($1).ip);
|
||||
else if (($1->class == (SYM_CONSTANT | T_NET)) && net_is_ip(SYM_VAL($1).net))
|
||||
$$ = * SYM_VAL($1).net;
|
||||
else
|
||||
cf_error("IP address or network expected");
|
||||
cf_error("IP address or network constant expected");
|
||||
}
|
||||
;
|
||||
|
||||
@ -344,8 +368,8 @@ time:
|
||||
|
||||
text:
|
||||
TEXT
|
||||
| SYM {
|
||||
if ($1->class != (SYM_CONSTANT | T_STRING)) cf_error("String expected");
|
||||
| CF_SYM_KNOWN {
|
||||
if ($1->class != (SYM_CONSTANT | T_STRING)) cf_error("String constant expected");
|
||||
$$ = SYM_VAL($1).s;
|
||||
}
|
||||
;
|
||||
|
35
configure.ac
35
configure.ac
@ -18,6 +18,12 @@ AC_ARG_ENABLE([debug],
|
||||
[enable_debug=no]
|
||||
)
|
||||
|
||||
AC_ARG_ENABLE([debug-generated],
|
||||
[AS_HELP_STRING([--enable-debug-generated], [enable this to abstain from generating #line @<:@no@:>@])],
|
||||
[],
|
||||
[enable_debug_generated=no]
|
||||
)
|
||||
|
||||
AC_ARG_ENABLE([memcheck],
|
||||
[AS_HELP_STRING([--enable-memcheck], [check memory allocations when debugging @<:@yes@:>@])],
|
||||
[],
|
||||
@ -109,6 +115,11 @@ if test -z "$GCC" ; then
|
||||
AC_MSG_ERROR([This program requires the GNU C Compiler.])
|
||||
fi
|
||||
|
||||
BIRD_CHECK_THREAD_LOCAL
|
||||
if test "$bird_cv_thread_local" = yes ; then
|
||||
AC_DEFINE([HAVE_THREAD_LOCAL], [1], [Define to 1 if _Thread_local is available])
|
||||
fi
|
||||
|
||||
if test "$enable_pthreads" != no ; then
|
||||
BIRD_CHECK_PTHREADS
|
||||
|
||||
@ -126,21 +137,35 @@ if test "$enable_pthreads" != no ; then
|
||||
fi
|
||||
fi
|
||||
|
||||
# This is assumed to be necessary for proper BIRD build
|
||||
CFLAGS="$CFLAGS -fno-strict-aliasing -fno-strict-overflow"
|
||||
|
||||
if test "$bird_cflags_default" = yes ; then
|
||||
BIRD_CHECK_GCC_OPTION([bird_cv_c_option_wno_pointer_sign], [-Wno-pointer-sign], [-Wall])
|
||||
BIRD_CHECK_GCC_OPTION([bird_cv_c_option_wno_missing_init], [-Wno-missing-field-initializers], [-Wall -Wextra])
|
||||
BIRD_CHECK_GCC_OPTION([bird_cv_c_option_fno_strict_aliasing], [-fno-strict-aliasing])
|
||||
BIRD_CHECK_GCC_OPTION([bird_cv_c_option_fno_strict_overflow], [-fno-strict-overflow])
|
||||
|
||||
if test "$enable_debug" = no; then
|
||||
BIRD_CHECK_LTO
|
||||
fi
|
||||
|
||||
if test "$bird_cv_c_lto" = yes; then
|
||||
CFLAGS="$CFLAGS -flto"
|
||||
LDFLAGS="$LDFLAGS -flto=4 -g"
|
||||
else
|
||||
LDFLAGS="$LDFLAGS -g"
|
||||
fi
|
||||
|
||||
CFLAGS="$CFLAGS -Wall -Wextra -Wstrict-prototypes -Wno-parentheses"
|
||||
BIRD_ADD_GCC_OPTION([bird_cv_c_option_wno_pointer_sign], [-Wno-pointer-sign])
|
||||
BIRD_ADD_GCC_OPTION([bird_cv_c_option_wno_missing_init], [-Wno-missing-field-initializers])
|
||||
BIRD_ADD_GCC_OPTION([bird_cv_c_option_fno_strict_aliasing], [-fno-strict-aliasing])
|
||||
BIRD_ADD_GCC_OPTION([bird_cv_c_option_fno_strict_overflow], [-fno-strict-overflow])
|
||||
fi
|
||||
|
||||
|
||||
AC_MSG_CHECKING([CFLAGS])
|
||||
AC_MSG_RESULT([$CFLAGS])
|
||||
|
||||
AC_MSG_CHECKING([LDFLAGS])
|
||||
AC_MSG_RESULT([$LDFLAGS])
|
||||
|
||||
AC_PROG_CPP
|
||||
AC_PROG_INSTALL
|
||||
@ -156,7 +181,7 @@ test -z "$M4" && AC_MSG_ERROR([M4 is missing.])
|
||||
AC_MSG_CHECKING([bison version])
|
||||
BIRD_CHECK_BISON_VERSION(BISON_VERSION)
|
||||
AC_MSG_RESULT([$BISON_VERSION])
|
||||
if test "$bird_bison_synclines" = yes; then
|
||||
if test "$bird_bison_synclines" = yes && test "$enable_debug_generated" = no; then
|
||||
M4FLAGS="$M4FLAGS -s"
|
||||
fi
|
||||
|
||||
|
236
doc/bird.sgml
236
doc/bird.sgml
@ -403,6 +403,14 @@ configured for all relevant protocols and requires protocol-specific support
|
||||
(currently implemented for Kernel and BGP protocols), it is activated for
|
||||
particular boot by option <cf/-R/.
|
||||
|
||||
<p>Some protocols (e.g. BGP) could be restarted gracefully after both
|
||||
intentional outage and crash, while others (e.g. OSPF) after intentional outage
|
||||
only. For planned graceful restart, BIRD must be shut down by
|
||||
<ref id="cli-graceful-restart" name="graceful restart"> command instead of
|
||||
regular <ref id="cli-down" name="down"> command. In this way routing neighbors
|
||||
are notified about planned graceful restart and routes are kept in kernel table
|
||||
after shutdown.
|
||||
|
||||
|
||||
<chapt>Configuration
|
||||
<label id="config">
|
||||
@ -422,11 +430,11 @@ a comment, whitespace characters are treated as a single space. If there's a
|
||||
variable number of options, they are grouped using the <cf/{ }/ brackets. Each
|
||||
option is terminated by a <cf/;/. Configuration is case sensitive. There are two
|
||||
ways how to name symbols (like protocol names, filter names, constants etc.).
|
||||
You can either use a simple string starting with a letter followed by any
|
||||
combination of letters and numbers (e.g. <cf/R123/, <cf/myfilter/, <cf/bgp5/) or
|
||||
you can enclose the name into apostrophes (<cf/'/) and than you can use any
|
||||
combination of numbers, letters. hyphens, dots and colons (e.g.
|
||||
<cf/'1:strange-name'/, <cf/'-NAME-'/, <cf/'cool::name'/).
|
||||
You can either use a simple string starting with a letter (or underscore)
|
||||
followed by any combination of letters, numbers and underscores (e.g. <cf/R123/,
|
||||
<cf/my_filter/, <cf/bgp5/) or you can enclose the name into apostrophes (<cf/'/)
|
||||
and than you can use any combination of numbers, letters, underscores, hyphens,
|
||||
dots and colons (e.g. <cf/'1:strange-name'/, <cf/'-NAME-'/, <cf/'cool::name'/).
|
||||
|
||||
<p>Here is an example of a simple config file. It enables synchronization of
|
||||
routing tables with OS kernel, learns network interfaces and runs RIP on all
|
||||
@ -561,8 +569,8 @@ include "tablename.conf";;
|
||||
can be seen (together with other symbols) using 'show symbols' command.
|
||||
|
||||
<tag><label id="opt-attribute">attribute <m/type/ <m/name/</tag>
|
||||
Define a custom route attribute. You can set and get it in filters like
|
||||
any other route atribute. This feature is intended for marking routes
|
||||
Declare a custom route attribute. You can set and get it in filters like
|
||||
any other route attribute. This feature is intended for marking routes
|
||||
in import filters for export filtering purposes instead of locally
|
||||
assigned BGP communities which have to be deleted in export filters.
|
||||
|
||||
@ -671,14 +679,24 @@ agreement").
|
||||
This is an optional description of the protocol. It is displayed as a
|
||||
part of the output of 'show protocols all' command.
|
||||
|
||||
<tag><label id="proto-vrf">vrf "<m/text/"</tag>
|
||||
<tag><label id="proto-vrf">vrf "<m/text/"|default</tag>
|
||||
Associate the protocol with specific VRF. The protocol will be
|
||||
restricted to interfaces assigned to the VRF and will use sockets bound
|
||||
to the VRF. Appropriate VRF interface must exist on OS level. For kernel
|
||||
protocol, an appropriate table still must be explicitly selected by
|
||||
<cf/table/ option. Note that for proper VRF support it is necessary to
|
||||
use Linux kernel version at least 4.14, older versions have limited VRF
|
||||
implementation.
|
||||
to the VRF. A corresponding VRF interface must exist on OS level. For
|
||||
kernel protocol, an appropriate table still must be explicitly selected
|
||||
by <cf/table/ option.
|
||||
|
||||
By selecting <cf/default/, the protocol is associated with the default
|
||||
VRF; i.e., it will be restricted to interfaces not assigned to any
|
||||
regular VRF. That is different from not specifying <cf/vrf/ at all, in
|
||||
which case the protocol may use any interface regardless of its VRF
|
||||
status.
|
||||
|
||||
Note that for proper VRF support it is necessary to use Linux kernel
|
||||
version at least 4.14, older versions have limited VRF implementation.
|
||||
Before Linux kernel 5.0, a socket bound to a port in default VRF collide
|
||||
with others in regular VRFs. In BGP, this can be avoided by using
|
||||
<ref id="bgp-strict-bind" name="strict bind"> option.
|
||||
|
||||
<tag><label id="proto-channel"><m/channel name/ [{<m/channel config/}]</tag>
|
||||
Every channel must be explicitly stated. See the protocol-specific
|
||||
@ -730,10 +748,6 @@ agreement").
|
||||
on all interfaces that have address from 192.168.0.0/16, but not from
|
||||
192.168.1.0/24.
|
||||
|
||||
<cf>interface -192.168.1.0/24, 192.168.0.0/16;</cf> - start the protocol
|
||||
on all interfaces that have address from 192.168.0.0/16, but not from
|
||||
192.168.1.0/24.
|
||||
|
||||
<cf>interface "eth*" 192.168.1.0/24;</cf> - start the protocol on all
|
||||
ethernet interfaces that have address from 192.168.1.0/24.
|
||||
|
||||
@ -1106,6 +1120,10 @@ This argument can be omitted if there exists only a single instance.
|
||||
<tag><label id="cli-down">down</tag>
|
||||
Shut BIRD down.
|
||||
|
||||
<tag><label id="cli-graceful-restart">graceful restart</tag>
|
||||
Shut BIRD down for graceful restart. See <ref id="graceful-restart"
|
||||
name="graceful restart"> section for details.
|
||||
|
||||
<tag><label id="cli-debug">debug <m/protocol/|<m/pattern/|all all|off|{ states|routes|filters|events|packets [, <m/.../] }</tag>
|
||||
Control protocol debugging.
|
||||
|
||||
@ -1159,7 +1177,7 @@ int var;
|
||||
<p>As you can see, a filter has a header, a list of local variables, and a body.
|
||||
The header consists of the <cf/filter/ keyword followed by a (unique) name of
|
||||
filter. The list of local variables consists of <cf><M>type name</M>;</cf>
|
||||
pairs where each pair defines one local variable. The body consists of <cf>
|
||||
pairs where each pair declares one local variable. The body consists of <cf>
|
||||
{ <M>statements</M> }</cf>. Each <m/statement/ is terminated by a <cf/;/. You
|
||||
can group several statements to a single compound statement by using braces
|
||||
(<cf>{ <M>statements</M> }</cf>) which is useful if you want to make a bigger
|
||||
@ -1188,7 +1206,7 @@ called like in C: <cf>name(); with_parameters(5);</cf>. Function may return
|
||||
values using the <cf>return <m/[expr]/</cf> command. Returning a value exits
|
||||
from current function (this is similar to C).
|
||||
|
||||
<p>Filters are declared in a way similar to functions except they can't have
|
||||
<p>Filters are defined in a way similar to functions except they can't have
|
||||
explicit parameters. They get a route table entry as an implicit parameter, it
|
||||
is also passed automatically to any functions called. The filter must terminate
|
||||
with either <cf/accept/ or <cf/reject/ statement. If there's a runtime error in
|
||||
@ -1216,8 +1234,8 @@ bird>
|
||||
<label id="data-types">
|
||||
|
||||
<p>Each variable and each value has certain type. Booleans, integers and enums
|
||||
are incompatible with each other (that is to prevent you from shooting in the
|
||||
foot).
|
||||
are incompatible with each other (that is to prevent you from shooting oneself
|
||||
in the foot).
|
||||
|
||||
<descrip>
|
||||
<tag><label id="type-bool">bool</tag>
|
||||
@ -1254,7 +1272,7 @@ foot).
|
||||
This type can hold a single IP address. The IPv4 addresses are stored as
|
||||
IPv4-Mapped IPv6 addresses so one data type for both of them is used.
|
||||
Whether the address is IPv4 or not may be checked by <cf>.is_ip4</cf>
|
||||
which returns <cf/bool/. IP addresses are written in the standard
|
||||
which returns a <cf/bool/. IP addresses are written in the standard
|
||||
notation (<cf/10.20.30.40/ or <cf/fec0:3:4::1/). You can apply special
|
||||
operator <cf>.mask(<M>num</M>)</cf> on values of type ip. It masks out
|
||||
all but first <cf><M>num</M></cf> bits from the IP address. So
|
||||
@ -1451,7 +1469,8 @@ foot).
|
||||
but <tt>bgp_path ˜ [= * 4 5 * =]</tt> is false. BGP mask
|
||||
expressions can also contain integer expressions enclosed in parenthesis
|
||||
and integer variables, for example <tt>[= * 4 (1+2) a =]</tt>. You can
|
||||
also use ranges, for example <tt>[= * 3..5 2 100..200 * =]</tt>.
|
||||
also use ranges (e.g. <tt>[= * 3..5 2 100..200 * =]</tt>) and sets
|
||||
(e.g. <tt>[= 1 2 [3, 5, 7] * =]</tt>).
|
||||
|
||||
<tag><label id="type-clist">clist</tag>
|
||||
Clist is similar to a set, except that unlike other sets, it can be
|
||||
@ -1491,7 +1510,7 @@ foot).
|
||||
<cf/!˜/ membership operators) can be used to modify or test
|
||||
eclists, with ECs instead of pairs as arguments.
|
||||
|
||||
<tag><label id="type-lclist">lclist/</tag>
|
||||
<tag><label id="type-lclist">lclist</tag>
|
||||
Lclist is a data type used for BGP large community lists. Like eclists,
|
||||
lclists are very similar to clists, but they are sets of LCs instead of
|
||||
pairs. The same operations (like <cf/add/, <cf/delete/ or <cf/˜/
|
||||
@ -1523,8 +1542,8 @@ the clist that is also a member of the pair/quad set).
|
||||
<p>There is one operator related to ROA infrastructure - <cf/roa_check()/. It
|
||||
examines a ROA table and does <rfc id="6483"> route origin validation for a
|
||||
given network prefix. The basic usage is <cf>roa_check(<m/table/)</cf>, which
|
||||
checks current route (which should be from BGP to have AS_PATH argument) in the
|
||||
specified ROA table and returns ROA_UNKNOWN if there is no relevant ROA,
|
||||
checks the current route (which should be from BGP to have AS_PATH argument) in
|
||||
the specified ROA table and returns ROA_UNKNOWN if there is no relevant ROA,
|
||||
ROA_VALID if there is a matching ROA, or ROA_INVALID if there are some relevant
|
||||
ROAs but none of them match. There is also an extended variant
|
||||
<cf>roa_check(<m/table/, <m/prefix/, <m/asn/)</cf>, which allows to specify a
|
||||
@ -1572,11 +1591,20 @@ if 1234 = i then printn "."; else {
|
||||
<label id="route-attributes">
|
||||
|
||||
<p>A filter is implicitly passed a route, and it can access its attributes just
|
||||
like it accesses variables. Attempts to access undefined attribute result in a
|
||||
runtime error; you can check if an attribute is defined by using the
|
||||
<cf>defined( <m>attribute</m> )</cf> operator. One notable exception to this
|
||||
rule are attributes of bgppath and *clist types, where undefined value is
|
||||
regarded as empty bgppath/*clist for most purposes.
|
||||
like it accesses variables. There are common route attributes, protocol-specific
|
||||
route attributes and custom route attributes. Most common attributes are
|
||||
mandatory (always defined), while remaining are optional. Attempts to access
|
||||
undefined attribute result in a runtime error; you can check if an attribute is
|
||||
defined by using the <cf>defined( <m>attribute</m> )</cf> operator. One notable
|
||||
exception to this rule are attributes of bgppath and *clist types, where
|
||||
undefined value is regarded as empty bgppath/*clist for most purposes.
|
||||
|
||||
Attributes can be defined by just setting them in filters. Custom attributes
|
||||
have to be first declared by <ref id="opt-attribute" name="attribute"> global
|
||||
option. You can also undefine optional attribute back to non-existence by using
|
||||
the <cf>unset( <m/attribute/ )</cf> operator.
|
||||
|
||||
Common route attributes are:
|
||||
|
||||
<descrip>
|
||||
<tag><label id="rta-net"><m/prefix/ net</tag>
|
||||
@ -1643,8 +1671,8 @@ regarded as empty bgppath/*clist for most purposes.
|
||||
compare internal distances to boundary routers (see below).
|
||||
</descrip>
|
||||
|
||||
<p>There also exist protocol-specific attributes which are described in the
|
||||
corresponding protocol sections.
|
||||
<p>Protocol-specific route attributes are described in the corresponding
|
||||
protocol sections.
|
||||
|
||||
|
||||
<sect>Other statements
|
||||
@ -1654,7 +1682,7 @@ corresponding protocol sections.
|
||||
|
||||
<descrip>
|
||||
<tag><label id="assignment"><m/variable/ = <m/expr/</tag>
|
||||
Set variable to a given value.
|
||||
Set variable (or route attribute) to a given value.
|
||||
|
||||
<tag><label id="filter-accept-reject">accept|reject [ <m/expr/ ]</tag>
|
||||
Accept or reject the route, possibly printing <cf><m>expr</m></cf>.
|
||||
@ -1888,12 +1916,11 @@ the BFD session went down).
|
||||
advanced features like the echo mode or authentication are not implemented), IP
|
||||
transport for BFD as defined in <rfc id="5881"> and <rfc id="5883"> and
|
||||
interaction with client protocols as defined in <rfc id="5882">.
|
||||
We currently support at most one protocol instance.
|
||||
|
||||
<p>BFD packets are sent with a dynamic source port number. Linux systems use by
|
||||
default a bit different dynamic port range than the IANA approved one
|
||||
(49152-65535). If you experience problems with compatibility, please adjust
|
||||
<cf>/proc/sys/net/ipv4/ip_local_port_range</cf>
|
||||
<cf>/proc/sys/net/ipv4/ip_local_port_range</cf>.
|
||||
|
||||
<sect1>Configuration
|
||||
<label id="bfd-config">
|
||||
@ -1910,6 +1937,14 @@ configuration is often sufficient.
|
||||
<p>Note that to use BFD for other protocols like OSPF or BGP, these protocols
|
||||
also have to be configured to request BFD sessions, usually by <cf/bfd/ option.
|
||||
|
||||
<p>A BFD instance not associated with any VRF handles session requests from all
|
||||
other protocols, even ones associated with a VRF. Such setup would work for
|
||||
single-hop BFD sessions if <cf/net.ipv4.udp_l3mdev_accept/ sysctl is enabled,
|
||||
but does not currently work for multihop sessions. Another approach is to
|
||||
configure multiple BFD instances, one for each VRF (including the default VRF).
|
||||
Each BFD instance associated with a VRF (regular or default) only handles
|
||||
session requests from protocols in the same VRF.
|
||||
|
||||
<p>Some of BFD session options require <m/time/ value, which has to be specified
|
||||
with the appropriate unit: <m/num/ <cf/s/|<cf/ms/|<cf/us/. Although microseconds
|
||||
are allowed as units, practical minimum values are usually in order of tens of
|
||||
@ -2127,6 +2162,7 @@ avoid routing loops.
|
||||
<item> <rfc id="6286"> - AS-Wide Unique BGP Identifier
|
||||
<item> <rfc id="6608"> - Subcodes for BGP Finite State Machine Error
|
||||
<item> <rfc id="6793"> - BGP Support for 4-Octet AS Numbers
|
||||
<item> <rfc id="7311"> - Accumulated IGP Metric Attribute for BGP
|
||||
<item> <rfc id="7313"> - Enhanced Route Refresh Capability for BGP
|
||||
<item> <rfc id="7606"> - Revised Error Handling for BGP UPDATE Messages
|
||||
<item> <rfc id="7911"> - Advertisement of Multiple Paths in BGP
|
||||
@ -2187,12 +2223,23 @@ using the following configuration parameters:
|
||||
<cf/local 10.0.0.1; local as 65000;/ are valid). This parameter is
|
||||
mandatory.
|
||||
|
||||
<tag><label id="bgp-neighbor">neighbor [<m/ip/] [port <m/number/] [as <m/number/]</tag>
|
||||
<tag><label id="bgp-neighbor">neighbor [<m/ip/ | range <m/prefix/] [port <m/number/] [as <m/number/] [internal|external]</tag>
|
||||
Define neighboring router this instance will be talking to and what AS
|
||||
it is located in. In case the neighbor is in the same AS as we are, we
|
||||
automatically switch to iBGP. Optionally, the remote port may also be
|
||||
specified. Like <cf/local/ parameter, this parameter may also be used
|
||||
multiple times with different sub-options. This parameter is mandatory.
|
||||
automatically switch to IBGP. Alternatively, it is possible to specify
|
||||
just <cf/internal/ or <cf/external/ instead of AS number, in that case
|
||||
either local AS number, or any external AS number is accepted.
|
||||
Optionally, the remote port may also be specified. Like <cf/local/
|
||||
parameter, this parameter may also be used multiple times with different
|
||||
sub-options. This parameter is mandatory.
|
||||
|
||||
It is possible to specify network prefix (with <cf/range/ keyword)
|
||||
instead of explicit neighbor IP address. This enables dynamic BGP
|
||||
behavior, where the BGP instance listens on BGP port, but new BGP
|
||||
instances are spawned for incoming BGP connections (if source address
|
||||
matches the network prefix). It is possible to mix regular BGP instances
|
||||
with dynamic BGP instances and have multiple dynamic BGP instances with
|
||||
different ranges.
|
||||
|
||||
<tag><label id="bgp-iface">interface <m/string/</tag>
|
||||
Define interface we should use for link-local BGP IPv6 sessions.
|
||||
@ -2225,6 +2272,16 @@ using the following configuration parameters:
|
||||
session. Default: the address of the local end of the interface our
|
||||
neighbor is connected to.
|
||||
|
||||
<tag><label id="bgp-dynamic-name">dynamic name "<m/text/"</tag>
|
||||
Define common prefix of names used for new BGP instances spawned when
|
||||
dynamic BGP behavior is active. Actual names also contain numeric
|
||||
index to distinguish individual instances. Default: "dynbgp".
|
||||
|
||||
<tag><label id="bgp-dynamic-name-digits">dynamic name digits <m/number/</tag>
|
||||
Define minimum number of digits for index in names of spawned dynamic
|
||||
BGP instances. E.g., if set to 2, then the first name would be
|
||||
"dynbgp01". Default: 0.
|
||||
|
||||
<tag><label id="bgp-strict-bind">strict bind <m/switch/</tag>
|
||||
Specify whether BGP listening socket should be bound to a specific local
|
||||
address (the same as the <cf/source address/) and associated interface,
|
||||
@ -2566,6 +2623,15 @@ be used in explicit configuration.
|
||||
<p>BGP channels have additional config options (together with the common ones):
|
||||
|
||||
<descrip>
|
||||
<tag><label id="bgp-mandatory">mandatory <m/switch/</tag>
|
||||
When local and neighbor sets of configured AFI/SAFI pairs differ,
|
||||
capability negotiation ensures that a common subset is used. For
|
||||
mandatory channels their associated AFI/SAFI must be negotiated
|
||||
(i.e., also announced by the neighbor), otherwise BGP session
|
||||
negotiation fails with <it/'Required capability missing'/ error.
|
||||
Regardless, at least one AFI/SAFI must be negotiated in order to BGP
|
||||
session be successfully established. Default: off.
|
||||
|
||||
<tag><label id="bgp-next-hop-keep">next hop keep <m/switch/|ibgp|ebgp</tag>
|
||||
Do not modify the Next Hop attribute and advertise the current one
|
||||
unchanged even in cases where our own local address should be used
|
||||
@ -2638,6 +2704,16 @@ be used in explicit configuration.
|
||||
be examined later by <cf/show route/, and can be used to reconfigure
|
||||
import filters without full route refresh. Default: off.
|
||||
|
||||
<tag><label id="bgp-export-table">export table <m/switch/</tag>
|
||||
A BGP export table contains all routes sent to given BGP neighbor, after
|
||||
application of export filters. It is also called <em/Adj-RIB-Out/ in BGP
|
||||
terminology. BIRD BGP by default operates without export tables, in
|
||||
which case routes from master table are just processed by export filters
|
||||
and then announced by BGP. Enabling <cf/export table/ allows to store
|
||||
routes after export filter processing, so they can be examined later by
|
||||
<cf/show route/, and can be used to eliminate unnecessary updates or
|
||||
withdraws. Default: off.
|
||||
|
||||
<tag><label id="bgp-secondary">secondary <m/switch/</tag>
|
||||
Usually, if an export filter rejects a selected route, no other route is
|
||||
propagated for that network. This option allows to try the next route in
|
||||
@ -2665,6 +2741,36 @@ be used in explicit configuration.
|
||||
TX direction. When active, all available routes accepted by the export
|
||||
filter are advertised to the neighbor. Default: off.
|
||||
|
||||
<tag><label id="bgp-aigp">aigp <m/switch/|originate</tag>
|
||||
The BGP protocol does not use a common metric like other routing
|
||||
protocols, instead it uses a set of criteria for route selection
|
||||
consisting both overall AS path length and a distance to the nearest AS
|
||||
boundary router. Assuming that metrics of different autonomous systems
|
||||
are incomparable, once a route is propagated from an AS to a next one,
|
||||
the distance in the old AS does not matter.
|
||||
|
||||
The AIGP extension (<rfc id="7311">) allows to propagate accumulated
|
||||
IGP metric (in the AIGP attribute) through both IBGP and EBGP links,
|
||||
computing total distance through multiple autonomous systems (assuming
|
||||
they use comparable IGP metric). The total AIGP metric is compared in
|
||||
the route selection process just after Local Preference comparison (and
|
||||
before AS path length comparison).
|
||||
|
||||
This option controls whether AIGP attribute propagation is allowed on
|
||||
the session. Optionally, it can be set to <cf/originate/, which not only
|
||||
allows AIGP attribute propagation, but also new AIGP attributes are
|
||||
automatically attached to non-BGP routes with valid IGP metric (e.g.
|
||||
<cf/ospf_metric1/) as they are exported to the BGP session. Default:
|
||||
enabled for IBGP (and intra-confederation EBGP), disabled for regular
|
||||
EBGP.
|
||||
|
||||
<tag><label id="bgp-cost">cost <m/number/</tag>
|
||||
When BGP <ref id="bgp-gateway" name="gateway mode"> is <cf/recursive/
|
||||
(mainly multihop IBGP sessions), then the distance to BGP next hop is
|
||||
based on underlying IGP metric. This option specifies the distance to
|
||||
BGP next hop for BGP sessions in direct gateway mode (mainly direct
|
||||
EBGP sessions).
|
||||
|
||||
<tag><label id="bgp-graceful-restart-c">graceful restart <m/switch/</tag>
|
||||
Although BGP graceful restart is configured mainly by protocol-wide
|
||||
<ref id="bgp-graceful-restart" name="options">, it is possible to
|
||||
@ -2733,9 +2839,11 @@ some of them (marked with `<tt/O/') are optional.
|
||||
presence of which indicates that the route has been aggregated from
|
||||
multiple routes by some router on the path from the originator.
|
||||
|
||||
<!-- we don't handle aggregators right since they are of a very obscure type
|
||||
<tag>bgp_aggregator</tag>
|
||||
-->
|
||||
<tag><label id="rta-bgp-aggregator">void bgp_aggregator [O]</tag>
|
||||
This is an optional attribute specifying AS number and IP address of the
|
||||
BGP router that created the route by aggregating multiple BGP routes.
|
||||
Currently, the attribute is not accessible from filters.
|
||||
|
||||
<tag><label id="rta-bgp-community">clist bgp_community [O]</tag>
|
||||
List of community values associated with the route. Each such value is a
|
||||
pair (represented as a <cf/pair/ data type inside the filters) of 16-bit
|
||||
@ -2770,6 +2878,11 @@ some of them (marked with `<tt/O/') are optional.
|
||||
<tag><label id="rta-bgp-cluster-list">clist bgp_cluster_list [I, O]</tag>
|
||||
This attribute contains a list of cluster IDs of route reflectors. Each
|
||||
route reflector prepends its cluster ID when reflecting the route.
|
||||
|
||||
<tag><label id="rta-bgp-aigp">void bgp_aigp [O]</tag>
|
||||
This attribute contains accumulated IGP metric, which is a total
|
||||
distance to the destination through multiple autonomous systems.
|
||||
Currently, the attribute is not accessible from filters.
|
||||
</descrip>
|
||||
|
||||
<sect1>Example
|
||||
@ -3231,6 +3344,8 @@ protocol ospf [v2|v3] <name> {
|
||||
tick <num>;
|
||||
ecmp <switch> [limit <num>];
|
||||
merge external <switch>;
|
||||
graceful restart <switch>|aware;
|
||||
graceful restart time <num>;
|
||||
area <id> {
|
||||
stub;
|
||||
nssa;
|
||||
@ -3374,6 +3489,31 @@ protocol ospf [v2|v3] <name> {
|
||||
from different LSAs are treated as separate even if they represents the
|
||||
same destination. Default value is no.
|
||||
|
||||
<tag><label id="ospf-graceful-restart">graceful restart <m/switch/|aware</tag>
|
||||
When an OSPF instance is restarted, neighbors break adjacencies and
|
||||
recalculate their routing tables, which disrupts packet forwarding even
|
||||
when the forwarding plane of the restarting router remains intact.
|
||||
<rfc id="3623"> specifies a graceful restart mechanism to alleviate this
|
||||
issue. For OSPF graceful restart, restarting router originates
|
||||
Grace-LSAs, announcing intent to do graceful restart. Neighbors
|
||||
receiving these LSAs enter helper mode, in which they ignore breakdown
|
||||
of adjacencies, behave as if nothing is happening and keep old routes.
|
||||
When adjacencies are reestablished, the restarting router flushes
|
||||
Grace-LSAs and graceful restart is ended.
|
||||
|
||||
This option controls the graceful restart mechanism. It has three
|
||||
states: Disabled, when no support is provided. Aware, when graceful
|
||||
restart helper mode is supported, but no local graceful restart is
|
||||
allowed (i.e. helper-only role). Enabled, when the full graceful restart
|
||||
support is provided (i.e. both restarting and helper role). Note that
|
||||
proper support for local graceful restart requires also configuration of
|
||||
other protocols. Default: aware.
|
||||
|
||||
<tag><label id="ospf-graceful-restart-time">graceful restart time <m/num/</tag>
|
||||
The restart time is announced in the Grace-LSA and specifies how long
|
||||
neighbors should wait for proper end of the graceful restart before
|
||||
exiting helper mode prematurely. Default: 120 seconds.
|
||||
|
||||
<tag><label id="ospf-area">area <M>id</M></tag>
|
||||
This defines an OSPF area with given area ID (an integer or an IPv4
|
||||
address, similarly to a router ID). The most important area is the
|
||||
@ -3983,7 +4123,7 @@ definitions, prefix definitions and DNS definitions:
|
||||
RAdv protocol could be configured to change its behavior based on
|
||||
availability of routes. When this option is used, the protocol waits in
|
||||
suppressed state until a <it/trigger route/ (for the specified network)
|
||||
is exported to the protocol, the protocol also returnsd to suppressed
|
||||
is exported to the protocol, the protocol also returns to suppressed
|
||||
state if the <it/trigger route/ disappears. Note that route export
|
||||
depends on specified export filter, as usual. This option could be used,
|
||||
e.g., for handling failover in multihoming scenarios.
|
||||
@ -4027,6 +4167,12 @@ definitions, prefix definitions and DNS definitions:
|
||||
The minimum delay between two consecutive router advertisements, in
|
||||
seconds. Default: 3
|
||||
|
||||
<tag><label id="radv-solicited-ra-unicast">solicited ra unicast <m/switch/</tag>
|
||||
Solicited router advertisements are usually sent to all-nodes multicast
|
||||
group like unsolicited ones, but the router can be configured to send
|
||||
them as unicast directly to soliciting nodes instead. This is especially
|
||||
useful on wireless networks (see <rfc id="7772">). Default: no
|
||||
|
||||
<tag><label id="radv-iface-managed">managed <m/switch/</tag>
|
||||
This option specifies whether hosts should use DHCPv6 for IP address
|
||||
configuration. Default: no
|
||||
@ -4662,7 +4808,7 @@ protocol rpki {
|
||||
filter peer_in_v4 {
|
||||
if (roa_check(r4, net, bgp_path.last) = ROA_INVALID) then
|
||||
{
|
||||
print "Ignore invalid ROA ", net, " for ASN ", bgp_path.last;
|
||||
print "Ignore RPKI invalid ", net, " for ASN ", bgp_path.last;
|
||||
reject;
|
||||
}
|
||||
accept;
|
||||
|
@ -33,6 +33,7 @@ Reply codes of BIRD command-line interface
|
||||
0022 Undo scheduled
|
||||
0023 Evaluation of expression
|
||||
0024 Graceful restart status report
|
||||
0025 Graceful restart ordered
|
||||
|
||||
1000 BIRD version
|
||||
1001 Interface list
|
||||
|
@ -1,8 +1,24 @@
|
||||
src := filter.c f-util.c tree.c trie.c
|
||||
src := filter.c data.c f-util.c tree.c trie.c inst-gen.c
|
||||
obj := $(src-o-files)
|
||||
$(all-daemon)
|
||||
$(cf-local)
|
||||
|
||||
#M4FLAGS_FILTERS=$(filter-out -s,$(M4FLAGS))
|
||||
M4FLAGS_FILTERS=$(M4FLAGS)
|
||||
|
||||
$(o)inst-gen.h: $(s)decl.m4 $(s)f-inst.c $(objdir)/.dir-stamp
|
||||
$(M4) $(M4FLAGS_FILTERS) -DTARGET=H -P $^ >$@
|
||||
|
||||
$(o)inst-gen.c: $(s)decl.m4 $(s)f-inst.c $(objdir)/.dir-stamp
|
||||
$(M4) $(M4FLAGS_FILTERS) -DTARGET=C -P $^ >$@
|
||||
|
||||
$(o)inst-interpret.c: $(s)decl.m4 $(s)f-inst.c $(objdir)/.dir-stamp
|
||||
$(M4) $(M4FLAGS_FILTERS) -DTARGET=I -P $^ >$@
|
||||
|
||||
prepare: $(o)inst-interpret.c $(o)inst-gen.h
|
||||
|
||||
tests_src := tree_test.c filter_test.c trie_test.c
|
||||
tests_targets := $(tests_targets) $(tests-target-files)
|
||||
tests_objs := $(tests_objs) $(src-o-files)
|
||||
|
||||
$(call clean,inst-gen.h inst-gen.c inst-interpret.c)
|
||||
|
764
filter/config.Y
764
filter/config.Y
File diff suppressed because it is too large
Load Diff
537
filter/data.c
Normal file
537
filter/data.c
Normal file
@ -0,0 +1,537 @@
|
||||
/*
|
||||
* Filters: utility functions
|
||||
*
|
||||
* (c) 1998 Pavel Machek <pavel@ucw.cz>
|
||||
* (c) 2019 Maria Matejka <mq@jmq.cz>
|
||||
*
|
||||
* Can be freely distributed and used under the terms of the GNU GPL.
|
||||
*
|
||||
*/
|
||||
|
||||
#include "nest/bird.h"
|
||||
#include "lib/lists.h"
|
||||
#include "lib/resource.h"
|
||||
#include "lib/socket.h"
|
||||
#include "lib/string.h"
|
||||
#include "lib/unaligned.h"
|
||||
#include "lib/net.h"
|
||||
#include "lib/ip.h"
|
||||
#include "nest/route.h"
|
||||
#include "nest/protocol.h"
|
||||
#include "nest/iface.h"
|
||||
#include "nest/attrs.h"
|
||||
#include "conf/conf.h"
|
||||
#include "filter/filter.h"
|
||||
#include "filter/f-inst.h"
|
||||
#include "filter/data.h"
|
||||
|
||||
const struct f_val f_const_empty_path = {
|
||||
.type = T_PATH,
|
||||
.val.ad = &null_adata,
|
||||
}, f_const_empty_clist = {
|
||||
.type = T_CLIST,
|
||||
.val.ad = &null_adata,
|
||||
}, f_const_empty_eclist = {
|
||||
.type = T_ECLIST,
|
||||
.val.ad = &null_adata,
|
||||
}, f_const_empty_lclist = {
|
||||
.type = T_LCLIST,
|
||||
.val.ad = &null_adata,
|
||||
};
|
||||
|
||||
static struct adata *
|
||||
adata_empty(struct linpool *pool, int l)
|
||||
{
|
||||
struct adata *res = lp_alloc(pool, sizeof(struct adata) + l);
|
||||
res->length = l;
|
||||
return res;
|
||||
}
|
||||
|
||||
static void
|
||||
pm_format(const struct f_path_mask *p, buffer *buf)
|
||||
{
|
||||
buffer_puts(buf, "[= ");
|
||||
|
||||
for (uint i=0; i<p->len; i++)
|
||||
{
|
||||
switch(p->item[i].kind)
|
||||
{
|
||||
case PM_ASN:
|
||||
buffer_print(buf, "%u ", p->item[i].asn);
|
||||
break;
|
||||
|
||||
case PM_QUESTION:
|
||||
buffer_puts(buf, "? ");
|
||||
break;
|
||||
|
||||
case PM_ASTERISK:
|
||||
buffer_puts(buf, "* ");
|
||||
break;
|
||||
|
||||
case PM_ASN_RANGE:
|
||||
buffer_print(buf, "%u..%u ", p->item[i].from, p->item[i].to);
|
||||
break;
|
||||
|
||||
case PM_ASN_EXPR:
|
||||
ASSERT(0);
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
buffer_puts(buf, "=]");
|
||||
}
|
||||
|
||||
static inline int
|
||||
lcomm_cmp(lcomm v1, lcomm v2)
|
||||
{
|
||||
if (v1.asn != v2.asn)
|
||||
return (v1.asn > v2.asn) ? 1 : -1;
|
||||
if (v1.ldp1 != v2.ldp1)
|
||||
return (v1.ldp1 > v2.ldp1) ? 1 : -1;
|
||||
if (v1.ldp2 != v2.ldp2)
|
||||
return (v1.ldp2 > v2.ldp2) ? 1 : -1;
|
||||
return 0;
|
||||
}
|
||||
|
||||
/**
|
||||
* val_compare - compare two values
|
||||
* @v1: first value
|
||||
* @v2: second value
|
||||
*
|
||||
* Compares two values and returns -1, 0, 1 on <, =, > or F_CMP_ERROR on
|
||||
* error. Tree module relies on this giving consistent results so
|
||||
* that it can be used for building balanced trees.
|
||||
*/
|
||||
int
|
||||
val_compare(const struct f_val *v1, const struct f_val *v2)
|
||||
{
|
||||
if (v1->type != v2->type) {
|
||||
if (v1->type == T_VOID) /* Hack for else */
|
||||
return -1;
|
||||
if (v2->type == T_VOID)
|
||||
return 1;
|
||||
|
||||
/* IP->Quad implicit conversion */
|
||||
if ((v1->type == T_QUAD) && val_is_ip4(v2))
|
||||
return uint_cmp(v1->val.i, ipa_to_u32(v2->val.ip));
|
||||
if (val_is_ip4(v1) && (v2->type == T_QUAD))
|
||||
return uint_cmp(ipa_to_u32(v1->val.ip), v2->val.i);
|
||||
|
||||
debug( "Types do not match in val_compare\n" );
|
||||
return F_CMP_ERROR;
|
||||
}
|
||||
|
||||
switch (v1->type) {
|
||||
case T_VOID:
|
||||
return 0;
|
||||
case T_ENUM:
|
||||
case T_INT:
|
||||
case T_BOOL:
|
||||
case T_PAIR:
|
||||
case T_QUAD:
|
||||
return uint_cmp(v1->val.i, v2->val.i);
|
||||
case T_EC:
|
||||
case T_RD:
|
||||
return u64_cmp(v1->val.ec, v2->val.ec);
|
||||
case T_LC:
|
||||
return lcomm_cmp(v1->val.lc, v2->val.lc);
|
||||
case T_IP:
|
||||
return ipa_compare(v1->val.ip, v2->val.ip);
|
||||
case T_NET:
|
||||
return net_compare(v1->val.net, v2->val.net);
|
||||
case T_STRING:
|
||||
return strcmp(v1->val.s, v2->val.s);
|
||||
default:
|
||||
return F_CMP_ERROR;
|
||||
}
|
||||
}
|
||||
|
||||
static inline int
|
||||
pmi_same(const struct f_path_mask_item *mi1, const struct f_path_mask_item *mi2)
|
||||
{
|
||||
if (mi1->kind != mi2->kind)
|
||||
return 0;
|
||||
|
||||
switch (mi1->kind) {
|
||||
case PM_ASN:
|
||||
if (mi1->asn != mi2->asn)
|
||||
return 0;
|
||||
break;
|
||||
case PM_ASN_EXPR:
|
||||
if (!f_same(mi1->expr, mi2->expr))
|
||||
return 0;
|
||||
break;
|
||||
case PM_ASN_RANGE:
|
||||
if (mi1->from != mi2->from)
|
||||
return 0;
|
||||
if (mi1->to != mi2->to)
|
||||
return 0;
|
||||
break;
|
||||
}
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
static int
|
||||
pm_same(const struct f_path_mask *m1, const struct f_path_mask *m2)
|
||||
{
|
||||
if (m1->len != m2->len)
|
||||
|
||||
for (uint i=0; i<m1->len; i++)
|
||||
if (!pmi_same(&(m1->item[i]), &(m2->item[i])))
|
||||
return 0;
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
/**
|
||||
* val_same - compare two values
|
||||
* @v1: first value
|
||||
* @v2: second value
|
||||
*
|
||||
* Compares two values and returns 1 if they are same and 0 if not.
|
||||
* Comparison of values of different types is valid and returns 0.
|
||||
*/
|
||||
int
|
||||
val_same(const struct f_val *v1, const struct f_val *v2)
|
||||
{
|
||||
int rc;
|
||||
|
||||
rc = val_compare(v1, v2);
|
||||
if (rc != F_CMP_ERROR)
|
||||
return !rc;
|
||||
|
||||
if (v1->type != v2->type)
|
||||
return 0;
|
||||
|
||||
switch (v1->type) {
|
||||
case T_PATH_MASK:
|
||||
return pm_same(v1->val.path_mask, v2->val.path_mask);
|
||||
case T_PATH_MASK_ITEM:
|
||||
return pmi_same(&(v1->val.pmi), &(v2->val.pmi));
|
||||
case T_PATH:
|
||||
case T_CLIST:
|
||||
case T_ECLIST:
|
||||
case T_LCLIST:
|
||||
return adata_same(v1->val.ad, v2->val.ad);
|
||||
case T_SET:
|
||||
return same_tree(v1->val.t, v2->val.t);
|
||||
case T_PREFIX_SET:
|
||||
return trie_same(v1->val.ti, v2->val.ti);
|
||||
default:
|
||||
bug("Invalid type in val_same(): %x", v1->type);
|
||||
}
|
||||
}
|
||||
|
||||
int
|
||||
clist_set_type(const struct f_tree *set, struct f_val *v)
|
||||
{
|
||||
switch (set->from.type)
|
||||
{
|
||||
case T_PAIR:
|
||||
v->type = T_PAIR;
|
||||
return 1;
|
||||
|
||||
case T_QUAD:
|
||||
v->type = T_QUAD;
|
||||
return 1;
|
||||
|
||||
case T_IP:
|
||||
if (val_is_ip4(&(set->from)) && val_is_ip4(&(set->to)))
|
||||
{
|
||||
v->type = T_QUAD;
|
||||
return 1;
|
||||
}
|
||||
/* Fall through */
|
||||
default:
|
||||
v->type = T_VOID;
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
|
||||
static int
|
||||
clist_match_set(const struct adata *clist, const struct f_tree *set)
|
||||
{
|
||||
if (!clist)
|
||||
return 0;
|
||||
|
||||
struct f_val v;
|
||||
if (!clist_set_type(set, &v))
|
||||
return F_CMP_ERROR;
|
||||
|
||||
u32 *l = (u32 *) clist->data;
|
||||
u32 *end = l + clist->length/4;
|
||||
|
||||
while (l < end) {
|
||||
v.val.i = *l++;
|
||||
if (find_tree(set, &v))
|
||||
return 1;
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int
|
||||
eclist_match_set(const struct adata *list, const struct f_tree *set)
|
||||
{
|
||||
if (!list)
|
||||
return 0;
|
||||
|
||||
if (!eclist_set_type(set))
|
||||
return F_CMP_ERROR;
|
||||
|
||||
struct f_val v;
|
||||
u32 *l = int_set_get_data(list);
|
||||
int len = int_set_get_size(list);
|
||||
int i;
|
||||
|
||||
v.type = T_EC;
|
||||
for (i = 0; i < len; i += 2) {
|
||||
v.val.ec = ec_get(l, i);
|
||||
if (find_tree(set, &v))
|
||||
return 1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int
|
||||
lclist_match_set(const struct adata *list, const struct f_tree *set)
|
||||
{
|
||||
if (!list)
|
||||
return 0;
|
||||
|
||||
if (!lclist_set_type(set))
|
||||
return F_CMP_ERROR;
|
||||
|
||||
struct f_val v;
|
||||
u32 *l = int_set_get_data(list);
|
||||
int len = int_set_get_size(list);
|
||||
int i;
|
||||
|
||||
v.type = T_LC;
|
||||
for (i = 0; i < len; i += 3) {
|
||||
v.val.lc = lc_get(l, i);
|
||||
if (find_tree(set, &v))
|
||||
return 1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
const struct adata *
|
||||
clist_filter(struct linpool *pool, const struct adata *list, const struct f_val *set, int pos)
|
||||
{
|
||||
if (!list)
|
||||
return NULL;
|
||||
|
||||
int tree = (set->type == T_SET); /* 1 -> set is T_SET, 0 -> set is T_CLIST */
|
||||
struct f_val v;
|
||||
if (tree)
|
||||
clist_set_type(set->val.t, &v);
|
||||
else
|
||||
v.type = T_PAIR;
|
||||
|
||||
int len = int_set_get_size(list);
|
||||
u32 *l = int_set_get_data(list);
|
||||
u32 tmp[len];
|
||||
u32 *k = tmp;
|
||||
u32 *end = l + len;
|
||||
|
||||
while (l < end) {
|
||||
v.val.i = *l++;
|
||||
/* pos && member(val, set) || !pos && !member(val, set), member() depends on tree */
|
||||
if ((tree ? !!find_tree(set->val.t, &v) : int_set_contains(set->val.ad, v.val.i)) == pos)
|
||||
*k++ = v.val.i;
|
||||
}
|
||||
|
||||
uint nl = (k - tmp) * sizeof(u32);
|
||||
if (nl == list->length)
|
||||
return list;
|
||||
|
||||
struct adata *res = adata_empty(pool, nl);
|
||||
memcpy(res->data, tmp, nl);
|
||||
return res;
|
||||
}
|
||||
|
||||
const struct adata *
|
||||
eclist_filter(struct linpool *pool, const struct adata *list, const struct f_val *set, int pos)
|
||||
{
|
||||
if (!list)
|
||||
return NULL;
|
||||
|
||||
int tree = (set->type == T_SET); /* 1 -> set is T_SET, 0 -> set is T_CLIST */
|
||||
struct f_val v;
|
||||
|
||||
int len = int_set_get_size(list);
|
||||
u32 *l = int_set_get_data(list);
|
||||
u32 tmp[len];
|
||||
u32 *k = tmp;
|
||||
int i;
|
||||
|
||||
v.type = T_EC;
|
||||
for (i = 0; i < len; i += 2) {
|
||||
v.val.ec = ec_get(l, i);
|
||||
/* pos && member(val, set) || !pos && !member(val, set), member() depends on tree */
|
||||
if ((tree ? !!find_tree(set->val.t, &v) : ec_set_contains(set->val.ad, v.val.ec)) == pos) {
|
||||
*k++ = l[i];
|
||||
*k++ = l[i+1];
|
||||
}
|
||||
}
|
||||
|
||||
uint nl = (k - tmp) * sizeof(u32);
|
||||
if (nl == list->length)
|
||||
return list;
|
||||
|
||||
struct adata *res = adata_empty(pool, nl);
|
||||
memcpy(res->data, tmp, nl);
|
||||
return res;
|
||||
}
|
||||
|
||||
const struct adata *
|
||||
lclist_filter(struct linpool *pool, const struct adata *list, const struct f_val *set, int pos)
|
||||
{
|
||||
if (!list)
|
||||
return NULL;
|
||||
|
||||
int tree = (set->type == T_SET); /* 1 -> set is T_SET, 0 -> set is T_CLIST */
|
||||
struct f_val v;
|
||||
|
||||
int len = int_set_get_size(list);
|
||||
u32 *l = int_set_get_data(list);
|
||||
u32 tmp[len];
|
||||
u32 *k = tmp;
|
||||
int i;
|
||||
|
||||
v.type = T_LC;
|
||||
for (i = 0; i < len; i += 3) {
|
||||
v.val.lc = lc_get(l, i);
|
||||
/* pos && member(val, set) || !pos && !member(val, set), member() depends on tree */
|
||||
if ((tree ? !!find_tree(set->val.t, &v) : lc_set_contains(set->val.ad, v.val.lc)) == pos)
|
||||
k = lc_copy(k, l+i);
|
||||
}
|
||||
|
||||
uint nl = (k - tmp) * sizeof(u32);
|
||||
if (nl == list->length)
|
||||
return list;
|
||||
|
||||
struct adata *res = adata_empty(pool, nl);
|
||||
memcpy(res->data, tmp, nl);
|
||||
return res;
|
||||
}
|
||||
|
||||
/**
|
||||
* val_in_range - implement |~| operator
|
||||
* @v1: element
|
||||
* @v2: set
|
||||
*
|
||||
* Checks if @v1 is element (|~| operator) of @v2.
|
||||
*/
|
||||
int
|
||||
val_in_range(const struct f_val *v1, const struct f_val *v2)
|
||||
{
|
||||
if ((v1->type == T_PATH) && (v2->type == T_PATH_MASK))
|
||||
return as_path_match(v1->val.ad, v2->val.path_mask);
|
||||
|
||||
if ((v1->type == T_INT) && (v2->type == T_PATH))
|
||||
return as_path_contains(v2->val.ad, v1->val.i, 1);
|
||||
|
||||
if (((v1->type == T_PAIR) || (v1->type == T_QUAD)) && (v2->type == T_CLIST))
|
||||
return int_set_contains(v2->val.ad, v1->val.i);
|
||||
/* IP->Quad implicit conversion */
|
||||
if (val_is_ip4(v1) && (v2->type == T_CLIST))
|
||||
return int_set_contains(v2->val.ad, ipa_to_u32(v1->val.ip));
|
||||
|
||||
if ((v1->type == T_EC) && (v2->type == T_ECLIST))
|
||||
return ec_set_contains(v2->val.ad, v1->val.ec);
|
||||
|
||||
if ((v1->type == T_LC) && (v2->type == T_LCLIST))
|
||||
return lc_set_contains(v2->val.ad, v1->val.lc);
|
||||
|
||||
if ((v1->type == T_STRING) && (v2->type == T_STRING))
|
||||
return patmatch(v2->val.s, v1->val.s);
|
||||
|
||||
if ((v1->type == T_IP) && (v2->type == T_NET))
|
||||
return ipa_in_netX(v1->val.ip, v2->val.net);
|
||||
|
||||
if ((v1->type == T_NET) && (v2->type == T_NET))
|
||||
return net_in_netX(v1->val.net, v2->val.net);
|
||||
|
||||
if ((v1->type == T_NET) && (v2->type == T_PREFIX_SET))
|
||||
return trie_match_net(v2->val.ti, v1->val.net);
|
||||
|
||||
if (v2->type != T_SET)
|
||||
return F_CMP_ERROR;
|
||||
|
||||
/* With integrated Quad<->IP implicit conversion */
|
||||
if ((v1->type == v2->val.t->from.type) ||
|
||||
((v1->type == T_QUAD) && val_is_ip4(&(v2->val.t->from)) && val_is_ip4(&(v2->val.t->to))))
|
||||
return !!find_tree(v2->val.t, v1);
|
||||
|
||||
if (v1->type == T_CLIST)
|
||||
return clist_match_set(v1->val.ad, v2->val.t);
|
||||
|
||||
if (v1->type == T_ECLIST)
|
||||
return eclist_match_set(v1->val.ad, v2->val.t);
|
||||
|
||||
if (v1->type == T_LCLIST)
|
||||
return lclist_match_set(v1->val.ad, v2->val.t);
|
||||
|
||||
if (v1->type == T_PATH)
|
||||
return as_path_match_set(v1->val.ad, v2->val.t);
|
||||
|
||||
return F_CMP_ERROR;
|
||||
}
|
||||
|
||||
/*
|
||||
* val_format - format filter value
|
||||
*/
|
||||
void
|
||||
val_format(const struct f_val *v, buffer *buf)
|
||||
{
|
||||
char buf2[1024];
|
||||
switch (v->type)
|
||||
{
|
||||
case T_VOID: buffer_puts(buf, "(void)"); return;
|
||||
case T_BOOL: buffer_puts(buf, v->val.i ? "TRUE" : "FALSE"); return;
|
||||
case T_INT: buffer_print(buf, "%u", v->val.i); return;
|
||||
case T_STRING: buffer_print(buf, "%s", v->val.s); return;
|
||||
case T_IP: buffer_print(buf, "%I", v->val.ip); return;
|
||||
case T_NET: buffer_print(buf, "%N", v->val.net); return;
|
||||
case T_PAIR: buffer_print(buf, "(%u,%u)", v->val.i >> 16, v->val.i & 0xffff); return;
|
||||
case T_QUAD: buffer_print(buf, "%R", v->val.i); return;
|
||||
case T_EC: ec_format(buf2, v->val.ec); buffer_print(buf, "%s", buf2); return;
|
||||
case T_LC: lc_format(buf2, v->val.lc); buffer_print(buf, "%s", buf2); return;
|
||||
case T_RD: rd_format(v->val.ec, buf2, 1024); buffer_print(buf, "%s", buf2); return;
|
||||
case T_PREFIX_SET: trie_format(v->val.ti, buf); return;
|
||||
case T_SET: tree_format(v->val.t, buf); return;
|
||||
case T_ENUM: buffer_print(buf, "(enum %x)%u", v->type, v->val.i); return;
|
||||
case T_PATH: as_path_format(v->val.ad, buf2, 1000); buffer_print(buf, "(path %s)", buf2); return;
|
||||
case T_CLIST: int_set_format(v->val.ad, 1, -1, buf2, 1000); buffer_print(buf, "(clist %s)", buf2); return;
|
||||
case T_ECLIST: ec_set_format(v->val.ad, -1, buf2, 1000); buffer_print(buf, "(eclist %s)", buf2); return;
|
||||
case T_LCLIST: lc_set_format(v->val.ad, -1, buf2, 1000); buffer_print(buf, "(lclist %s)", buf2); return;
|
||||
case T_PATH_MASK: pm_format(v->val.path_mask, buf); return;
|
||||
default: buffer_print(buf, "[unknown type %x]", v->type); return;
|
||||
}
|
||||
}
|
||||
|
||||
char *
|
||||
val_format_str(struct linpool *lp, const struct f_val *v) {
|
||||
buffer b;
|
||||
LOG_BUFFER_INIT(b);
|
||||
val_format(v, &b);
|
||||
return lp_strdup(lp, b.start);
|
||||
}
|
||||
|
||||
|
||||
static char val_dump_buffer[1024];
|
||||
const char *
|
||||
val_dump(const struct f_val *v) {
|
||||
static buffer b = {
|
||||
.start = val_dump_buffer,
|
||||
.end = val_dump_buffer + 1024,
|
||||
};
|
||||
b.pos = b.start;
|
||||
val_format(v, &b);
|
||||
return val_dump_buffer;
|
||||
}
|
||||
|
203
filter/data.h
Normal file
203
filter/data.h
Normal file
@ -0,0 +1,203 @@
|
||||
/*
|
||||
* BIRD Internet Routing Daemon -- Dynamic data structures
|
||||
*
|
||||
* (c) 1999 Pavel Machek <pavel@ucw.cz>
|
||||
* (c) 2018--2019 Maria Matejka <mq@jmq.cz>
|
||||
*
|
||||
* Can be freely distributed and used under the terms of the GNU GPL.
|
||||
*/
|
||||
|
||||
#ifndef _BIRD_FILTER_DATA_H_
|
||||
#define _BIRD_FILTER_DATA_H_
|
||||
|
||||
#include "nest/bird.h"
|
||||
|
||||
/* Type numbers must be in 0..0xff range */
|
||||
#define T_MASK 0xff
|
||||
|
||||
/* Internal types */
|
||||
enum f_type {
|
||||
/* Nothing. Simply nothing. */
|
||||
T_VOID = 0,
|
||||
|
||||
/* User visible types, which fit in int */
|
||||
T_INT = 0x10,
|
||||
T_BOOL = 0x11,
|
||||
T_PAIR = 0x12, /* Notice that pair is stored as integer: first << 16 | second */
|
||||
T_QUAD = 0x13,
|
||||
|
||||
/* Put enumerational types in 0x30..0x3f range */
|
||||
T_ENUM_LO = 0x30,
|
||||
T_ENUM_HI = 0x3f,
|
||||
|
||||
T_ENUM_RTS = 0x30,
|
||||
T_ENUM_BGP_ORIGIN = 0x31,
|
||||
T_ENUM_SCOPE = 0x32,
|
||||
T_ENUM_RTC = 0x33,
|
||||
T_ENUM_RTD = 0x34,
|
||||
T_ENUM_ROA = 0x35,
|
||||
T_ENUM_NETTYPE = 0x36,
|
||||
T_ENUM_RA_PREFERENCE = 0x37,
|
||||
|
||||
/* new enums go here */
|
||||
T_ENUM_EMPTY = 0x3f, /* Special hack for atomic_aggr */
|
||||
|
||||
#define T_ENUM T_ENUM_LO ... T_ENUM_HI
|
||||
|
||||
/* Bigger ones */
|
||||
T_IP = 0x20,
|
||||
T_NET = 0x21,
|
||||
T_STRING = 0x22,
|
||||
T_PATH_MASK = 0x23, /* mask for BGP path */
|
||||
T_PATH = 0x24, /* BGP path */
|
||||
T_CLIST = 0x25, /* Community list */
|
||||
T_EC = 0x26, /* Extended community value, u64 */
|
||||
T_ECLIST = 0x27, /* Extended community list */
|
||||
T_LC = 0x28, /* Large community value, lcomm */
|
||||
T_LCLIST = 0x29, /* Large community list */
|
||||
T_RD = 0x2a, /* Route distinguisher for VPN addresses */
|
||||
T_PATH_MASK_ITEM = 0x2b, /* Path mask item for path mask constructors */
|
||||
|
||||
T_SET = 0x80,
|
||||
T_PREFIX_SET = 0x81,
|
||||
} PACKED;
|
||||
|
||||
/* Filter value; size of this affects filter memory consumption */
|
||||
struct f_val {
|
||||
enum f_type type; /* T_* */
|
||||
union {
|
||||
uint i;
|
||||
u64 ec;
|
||||
lcomm lc;
|
||||
ip_addr ip;
|
||||
const net_addr *net;
|
||||
char *s;
|
||||
const struct f_tree *t;
|
||||
const struct f_trie *ti;
|
||||
const struct adata *ad;
|
||||
const struct f_path_mask *path_mask;
|
||||
struct f_path_mask_item pmi;
|
||||
} val;
|
||||
};
|
||||
|
||||
/* Dynamic attribute definition (eattrs) */
|
||||
struct f_dynamic_attr {
|
||||
u8 type; /* EA type (EAF_*) */
|
||||
u8 bit; /* For bitfield accessors */
|
||||
enum f_type f_type; /* Filter type */
|
||||
uint ea_code; /* EA code */
|
||||
};
|
||||
|
||||
enum f_sa_code {
|
||||
SA_FROM = 1,
|
||||
SA_GW,
|
||||
SA_NET,
|
||||
SA_PROTO,
|
||||
SA_SOURCE,
|
||||
SA_SCOPE,
|
||||
SA_DEST,
|
||||
SA_IFNAME,
|
||||
SA_IFINDEX,
|
||||
} PACKED;
|
||||
|
||||
/* Static attribute definition (members of struct rta) */
|
||||
struct f_static_attr {
|
||||
enum f_type f_type; /* Filter type */
|
||||
enum f_sa_code sa_code; /* Static attribute id */
|
||||
int readonly:1; /* Don't allow writing */
|
||||
};
|
||||
|
||||
/* Filter l-value type */
|
||||
enum f_lval_type {
|
||||
F_LVAL_VARIABLE,
|
||||
F_LVAL_PREFERENCE,
|
||||
F_LVAL_SA,
|
||||
F_LVAL_EA,
|
||||
};
|
||||
|
||||
/* Filter l-value */
|
||||
struct f_lval {
|
||||
enum f_lval_type type;
|
||||
union {
|
||||
struct symbol *sym;
|
||||
struct f_dynamic_attr da;
|
||||
struct f_static_attr sa;
|
||||
};
|
||||
};
|
||||
|
||||
/* IP prefix range structure */
|
||||
struct f_prefix {
|
||||
net_addr net; /* The matching prefix must match this net */
|
||||
u8 lo, hi; /* And its length must fit between lo and hi */
|
||||
};
|
||||
|
||||
struct f_tree {
|
||||
struct f_tree *left, *right;
|
||||
struct f_val from, to;
|
||||
void *data;
|
||||
};
|
||||
|
||||
struct f_trie_node
|
||||
{
|
||||
ip_addr addr, mask, accept;
|
||||
uint plen;
|
||||
struct f_trie_node *c[2];
|
||||
};
|
||||
|
||||
struct f_trie
|
||||
{
|
||||
linpool *lp;
|
||||
int zero;
|
||||
uint node_size;
|
||||
struct f_trie_node root[0]; /* Root trie node follows */
|
||||
};
|
||||
|
||||
struct f_tree *f_new_tree(void);
|
||||
struct f_tree *build_tree(struct f_tree *);
|
||||
const struct f_tree *find_tree(const struct f_tree *t, const struct f_val *val);
|
||||
int same_tree(const struct f_tree *t0, const struct f_tree *t2);
|
||||
void tree_format(const struct f_tree *t, buffer *buf);
|
||||
|
||||
struct f_trie *f_new_trie(linpool *lp, uint node_size);
|
||||
void *trie_add_prefix(struct f_trie *t, const net_addr *n, uint l, uint h);
|
||||
int trie_match_net(const struct f_trie *t, const net_addr *n);
|
||||
int trie_same(const struct f_trie *t1, const struct f_trie *t2);
|
||||
void trie_format(const struct f_trie *t, buffer *buf);
|
||||
|
||||
#define F_CMP_ERROR 999
|
||||
|
||||
int val_same(const struct f_val *v1, const struct f_val *v2);
|
||||
int val_compare(const struct f_val *v1, const struct f_val *v2);
|
||||
void val_format(const struct f_val *v, buffer *buf);
|
||||
char *val_format_str(struct linpool *lp, const struct f_val *v);
|
||||
const char *val_dump(const struct f_val *v);
|
||||
|
||||
static inline int val_is_ip4(const struct f_val *v)
|
||||
{ return (v->type == T_IP) && ipa_is_ip4(v->val.ip); }
|
||||
int val_in_range(const struct f_val *v1, const struct f_val *v2);
|
||||
|
||||
int clist_set_type(const struct f_tree *set, struct f_val *v);
|
||||
static inline int eclist_set_type(const struct f_tree *set)
|
||||
{ return set->from.type == T_EC; }
|
||||
static inline int lclist_set_type(const struct f_tree *set)
|
||||
{ return set->from.type == T_LC; }
|
||||
|
||||
const struct adata *clist_filter(struct linpool *pool, const struct adata *list, const struct f_val *set, int pos);
|
||||
const struct adata *eclist_filter(struct linpool *pool, const struct adata *list, const struct f_val *set, int pos);
|
||||
const struct adata *lclist_filter(struct linpool *pool, const struct adata *list, const struct f_val *set, int pos);
|
||||
|
||||
|
||||
/* Special undef value for paths and clists */
|
||||
static inline int
|
||||
undef_value(struct f_val v)
|
||||
{
|
||||
return ((v.type == T_PATH) || (v.type == T_CLIST) ||
|
||||
(v.type == T_ECLIST) || (v.type == T_LCLIST)) &&
|
||||
(v.val.ad == &null_adata);
|
||||
}
|
||||
|
||||
extern const struct f_val f_const_empty_path, f_const_empty_clist, f_const_empty_eclist, f_const_empty_lclist;
|
||||
|
||||
enum filter_return f_eval(const struct f_line *expr, struct linpool *tmp_pool, struct f_val *pres);
|
||||
|
||||
#endif
|
583
filter/decl.m4
Normal file
583
filter/decl.m4
Normal file
@ -0,0 +1,583 @@
|
||||
m4_divert(-1)m4_dnl
|
||||
#
|
||||
# BIRD -- Construction of per-instruction structures
|
||||
#
|
||||
# (c) 2018 Maria Matejka <mq@jmq.cz>
|
||||
#
|
||||
# Can be freely distributed and used under the terms of the GNU GPL.
|
||||
#
|
||||
# THIS IS A M4 MACRO FILE GENERATING 3 FILES ALTOGETHER.
|
||||
# KEEP YOUR HANDS OFF UNLESS YOU KNOW WHAT YOU'RE DOING.
|
||||
# EDITING AND DEBUGGING THIS FILE MAY DAMAGE YOUR BRAIN SERIOUSLY.
|
||||
#
|
||||
# But you're welcome to read and edit and debug if you aren't scared.
|
||||
#
|
||||
# Uncomment the following line to get exhaustive debug output.
|
||||
# m4_debugmode(aceflqtx)
|
||||
#
|
||||
# How it works:
|
||||
# 1) Instruction to code conversion (uses diversions 100..199)
|
||||
# 2) Code wrapping (uses diversions 1..99)
|
||||
# 3) Final preparation (uses diversions 200..299)
|
||||
# 4) Shipout
|
||||
#
|
||||
# See below for detailed description.
|
||||
#
|
||||
#
|
||||
# 1) Instruction to code conversion
|
||||
# The code provided in f-inst.c between consecutive INST() calls
|
||||
# is interleaved for many different places. It is here processed
|
||||
# and split into separate instances where split-by-instruction
|
||||
# happens. These parts are stored in temporary diversions listed:
|
||||
#
|
||||
# 101 content of per-inst struct
|
||||
# 102 constructor arguments
|
||||
# 103 constructor body
|
||||
# 104 dump line item content
|
||||
# (there may be nothing in dump-line content and
|
||||
# it must be handled specially in phase 2)
|
||||
# 105 linearize body
|
||||
# 106 comparator body
|
||||
# 107 struct f_line_item content
|
||||
# 108 interpreter body
|
||||
#
|
||||
# Here are macros to allow you to _divert to the right directions.
|
||||
m4_define(FID_STRUCT_IN, `m4_divert(101)')
|
||||
m4_define(FID_NEW_ARGS, `m4_divert(102)')
|
||||
m4_define(FID_NEW_BODY, `m4_divert(103)')
|
||||
m4_define(FID_DUMP_BODY, `m4_divert(104)m4_define([[FID_DUMP_BODY_EXISTS]])')
|
||||
m4_define(FID_LINEARIZE_BODY, `m4_divert(105)')
|
||||
m4_define(FID_SAME_BODY, `m4_divert(106)')
|
||||
m4_define(FID_LINE_IN, `m4_divert(107)')
|
||||
m4_define(FID_INTERPRET_BODY, `m4_divert(108)')
|
||||
|
||||
# Sometimes you want slightly different code versions in different
|
||||
# outputs.
|
||||
# Use FID_HIC(code for inst-gen.h, code for inst-gen.c, code for inst-interpret.c)
|
||||
# and put it into [[ ]] quotes if it shall contain commas.
|
||||
m4_define(FID_HIC, `m4_ifelse(TARGET, [[H]], [[$1]], TARGET, [[I]], [[$2]], TARGET, [[C]], [[$3]])')
|
||||
|
||||
# In interpreter code, this is quite common.
|
||||
m4_define(FID_INTERPRET_EXEC, `FID_HIC(,[[FID_INTERPRET_BODY()]],[[m4_divert(-1)]])')
|
||||
m4_define(FID_INTERPRET_NEW, `FID_HIC(,[[m4_divert(-1)]],[[FID_INTERPRET_BODY()]])')
|
||||
|
||||
# If the instruction is never converted to constant, the interpret
|
||||
# code is not produced at all for constructor
|
||||
m4_define(NEVER_CONSTANT, `m4_define([[INST_NEVER_CONSTANT]])')
|
||||
m4_define(FID_IFCONST, `m4_ifdef([[INST_NEVER_CONSTANT]],[[$2]],[[$1]])')
|
||||
|
||||
# If the instruction has some attributes (here called members),
|
||||
# these are typically carried with the instruction from constructor
|
||||
# to interpreter. This yields a line of code everywhere on the path.
|
||||
# FID_MEMBER is a macro to help with this task.
|
||||
m4_define(FID_MEMBER, `m4_dnl
|
||||
FID_LINE_IN()m4_dnl
|
||||
$1 $2;
|
||||
FID_STRUCT_IN()m4_dnl
|
||||
$1 $2;
|
||||
FID_NEW_ARGS()m4_dnl
|
||||
, $1 $2
|
||||
FID_NEW_BODY()m4_dnl
|
||||
whati->$2 = $2;
|
||||
FID_LINEARIZE_BODY()m4_dnl
|
||||
item->$2 = whati->$2;
|
||||
m4_ifelse($3,,,[[
|
||||
FID_SAME_BODY()m4_dnl
|
||||
if ($3) return 0;
|
||||
]])
|
||||
m4_ifelse($4,,,[[
|
||||
FID_DUMP_BODY()m4_dnl
|
||||
debug("%s" $4 "\n", INDENT, $5);
|
||||
]])
|
||||
FID_INTERPRET_EXEC()m4_dnl
|
||||
const $1 $2 = whati->$2
|
||||
FID_INTERPRET_BODY')
|
||||
|
||||
# Instruction arguments are needed only until linearization is done.
|
||||
# This puts the arguments into the filter line to be executed before
|
||||
# the instruction itself.
|
||||
#
|
||||
# To achieve this, ARG_ANY must be called before anything writes into
|
||||
# the instruction line as it moves the instruction pointer forward.
|
||||
m4_define(ARG_ANY, `
|
||||
FID_STRUCT_IN()m4_dnl
|
||||
struct f_inst * f$1;
|
||||
FID_NEW_ARGS()m4_dnl
|
||||
, struct f_inst * f$1
|
||||
FID_NEW_BODY
|
||||
whati->f$1 = f$1;
|
||||
for (const struct f_inst *child = f$1; child; child = child->next) {
|
||||
what->size += child->size;
|
||||
FID_IFCONST([[
|
||||
if (child->fi_code != FI_CONSTANT)
|
||||
constargs = 0;
|
||||
]])
|
||||
}
|
||||
FID_LINEARIZE_BODY
|
||||
pos = linearize(dest, whati->f$1, pos);
|
||||
FID_INTERPRET_BODY()')
|
||||
|
||||
# Some instructions accept variable number of arguments.
|
||||
m4_define(VARARG, `
|
||||
FID_NEW_ARGS()m4_dnl
|
||||
, struct f_inst * fvar
|
||||
FID_STRUCT_IN()m4_dnl
|
||||
struct f_inst * fvar;
|
||||
uint varcount;
|
||||
FID_LINE_IN()m4_dnl
|
||||
uint varcount;
|
||||
FID_NEW_BODY()m4_dnl
|
||||
whati->varcount = 0;
|
||||
whati->fvar = fvar;
|
||||
for (const struct f_inst *child = fvar; child; child = child->next, whati->varcount++) {
|
||||
what->size += child->size;
|
||||
FID_IFCONST([[
|
||||
if (child->fi_code != FI_CONSTANT)
|
||||
constargs = 0;
|
||||
]])
|
||||
}
|
||||
FID_IFCONST([[
|
||||
const struct f_inst **items = NULL;
|
||||
if (constargs) {
|
||||
items = alloca(whati->varcount * sizeof(struct f_inst *));
|
||||
const struct f_inst *child = fvar;
|
||||
for (uint i=0; child; i++)
|
||||
child = (items[i] = child)->next;
|
||||
}
|
||||
]])
|
||||
FID_LINEARIZE_BODY()m4_dnl
|
||||
pos = linearize(dest, whati->fvar, pos);
|
||||
item->varcount = whati->varcount;
|
||||
FID_DUMP_BODY()m4_dnl
|
||||
debug("%snumber of varargs %u\n", INDENT, item->varcount);
|
||||
FID_SAME_BODY()m4_dnl
|
||||
if (f1->varcount != f2->varcount) return 0;
|
||||
FID_INTERPRET_BODY()
|
||||
FID_HIC(,[[
|
||||
if (fstk->vcnt < whati->varcount) runtime("Stack underflow");
|
||||
fstk->vcnt -= whati->varcount;
|
||||
]],)
|
||||
')
|
||||
|
||||
# Some arguments need to check their type. After that, ARG_ANY is called.
|
||||
m4_define(ARG, `ARG_ANY($1)
|
||||
FID_INTERPRET_EXEC()m4_dnl
|
||||
if (v$1.type != $2) runtime("Argument $1 of instruction %s must be of type $2, got 0x%02x", f_instruction_name(what->fi_code), v$1.type)m4_dnl
|
||||
FID_INTERPRET_BODY()')
|
||||
|
||||
# Executing another filter line. This replaces the recursion
|
||||
# that was needed in the former implementation.
|
||||
m4_define(LINEX, `FID_INTERPRET_EXEC()LINEX_($1)FID_INTERPRET_NEW()return $1 FID_INTERPRET_BODY()')
|
||||
m4_define(LINEX_, `do {
|
||||
fstk->estk[fstk->ecnt].pos = 0;
|
||||
fstk->estk[fstk->ecnt].line = $1;
|
||||
fstk->estk[fstk->ecnt].ventry = fstk->vcnt;
|
||||
fstk->estk[fstk->ecnt].vbase = fstk->estk[fstk->ecnt-1].vbase;
|
||||
fstk->estk[fstk->ecnt].emask = 0;
|
||||
fstk->ecnt++;
|
||||
} while (0)')
|
||||
|
||||
m4_define(LINE, `
|
||||
FID_LINE_IN()m4_dnl
|
||||
const struct f_line * fl$1;
|
||||
FID_STRUCT_IN()m4_dnl
|
||||
struct f_inst * f$1;
|
||||
FID_NEW_ARGS()m4_dnl
|
||||
, struct f_inst * f$1
|
||||
FID_NEW_BODY()m4_dnl
|
||||
whati->f$1 = f$1;
|
||||
FID_DUMP_BODY()m4_dnl
|
||||
f_dump_line(item->fl$1, indent + 1);
|
||||
FID_LINEARIZE_BODY()m4_dnl
|
||||
item->fl$1 = f_linearize(whati->f$1);
|
||||
FID_SAME_BODY()m4_dnl
|
||||
if (!f_same(f1->fl$1, f2->fl$1)) return 0;
|
||||
FID_INTERPRET_EXEC()m4_dnl
|
||||
do { if (whati->fl$1) {
|
||||
LINEX_(whati->fl$1);
|
||||
} } while(0)
|
||||
FID_INTERPRET_NEW()m4_dnl
|
||||
return whati->f$1
|
||||
FID_INTERPRET_BODY()')
|
||||
|
||||
# Some of the instructions have a result. These constructions
|
||||
# state the result and put it to the right place.
|
||||
m4_define(RESULT, `RESULT_VAL([[ (struct f_val) { .type = $1, .val.$2 = $3 } ]])')
|
||||
m4_define(RESULT_VAL, `FID_HIC(, [[do { res = $1; fstk->vcnt++; } while (0)]],
|
||||
[[return fi_constant(what, $1)]])')
|
||||
m4_define(RESULT_VOID, `RESULT_VAL([[ (struct f_val) { .type = T_VOID } ]])')
|
||||
|
||||
# Some common filter instruction members
|
||||
m4_define(SYMBOL, `FID_MEMBER(struct symbol *, sym, [[strcmp(f1->sym->name, f2->sym->name) || (f1->sym->class != f2->sym->class)]], "symbol %s", item->sym->name)')
|
||||
m4_define(RTC, `FID_MEMBER(struct rtable_config *, rtc, [[strcmp(f1->rtc->name, f2->rtc->name)]], "route table %s", item->rtc->name)')
|
||||
m4_define(STATIC_ATTR, `FID_MEMBER(struct f_static_attr, sa, f1->sa.sa_code != f2->sa.sa_code,,)')
|
||||
m4_define(DYNAMIC_ATTR, `FID_MEMBER(struct f_dynamic_attr, da, f1->da.ea_code != f2->da.ea_code,,)')
|
||||
m4_define(ACCESS_RTE, `FID_HIC(,[[do { if (!fs->rte) runtime("No route to access"); } while (0)]],NEVER_CONSTANT())')
|
||||
|
||||
# 2) Code wrapping
|
||||
# The code produced in 1xx temporary diversions is a raw code without
|
||||
# any auxiliary commands and syntactical structures around. When the
|
||||
# instruction is done, INST_FLUSH is called. More precisely, it is called
|
||||
# at the beginning of INST() call and at the end of file.
|
||||
#
|
||||
# INST_FLUSH picks all the temporary diversions, wraps their content
|
||||
# into appropriate headers and structures and saves them into global
|
||||
# diversions listed:
|
||||
#
|
||||
# 4 enum fi_code
|
||||
# 5 enum fi_code to string
|
||||
# 6 dump line item
|
||||
# 7 dump line item callers
|
||||
# 8 linearize
|
||||
# 9 same (filter comparator)
|
||||
# 1 union in struct f_inst
|
||||
# 3 constructors + interpreter
|
||||
#
|
||||
# These global diversions contain blocks of code that can be directly
|
||||
# put into the final file, yet it still can't be written out now as
|
||||
# every instruction writes to all of these diversions.
|
||||
|
||||
# Code wrapping diversion names. Here we want an explicit newline
|
||||
# after the C comment.
|
||||
m4_define(FID_ZONE, `m4_divert($1) /* $2 for INST_NAME() */
|
||||
')
|
||||
m4_define(FID_INST, `FID_ZONE(1, Instruction structure for config)')
|
||||
m4_define(FID_LINE, `FID_ZONE(2, Instruction structure for interpreter)')
|
||||
m4_define(FID_NEW, `FID_ZONE(3, Constructor)')
|
||||
m4_define(FID_ENUM, `FID_ZONE(4, Code enum)')
|
||||
m4_define(FID_ENUM_STR, `FID_ZONE(5, Code enum to string)')
|
||||
m4_define(FID_DUMP, `FID_ZONE(6, Dump line)')
|
||||
m4_define(FID_DUMP_CALLER, `FID_ZONE(7, Dump line caller)')
|
||||
m4_define(FID_LINEARIZE, `FID_ZONE(8, Linearize)')
|
||||
m4_define(FID_SAME, `FID_ZONE(9, Comparison)')
|
||||
|
||||
# This macro does all the code wrapping. See inline comments.
|
||||
m4_define(INST_FLUSH, `m4_ifdef([[INST_NAME]], [[
|
||||
FID_ENUM()m4_dnl Contents of enum fi_code { ... }
|
||||
INST_NAME(),
|
||||
FID_ENUM_STR()m4_dnl Contents of const char * indexed by enum fi_code
|
||||
[INST_NAME()] = "INST_NAME()",
|
||||
FID_INST()m4_dnl Anonymous structure inside struct f_inst
|
||||
struct {
|
||||
m4_undivert(101)m4_dnl
|
||||
} i_[[]]INST_NAME();
|
||||
FID_LINE()m4_dnl Anonymous structure inside struct f_line_item
|
||||
struct {
|
||||
m4_undivert(107)m4_dnl
|
||||
} i_[[]]INST_NAME();
|
||||
FID_NEW()m4_dnl Constructor and interpreter code together
|
||||
FID_HIC(
|
||||
[[m4_dnl Public declaration of constructor in H file
|
||||
struct f_inst *f_new_inst_]]INST_NAME()[[(enum f_instruction_code fi_code
|
||||
m4_undivert(102)m4_dnl
|
||||
);]],
|
||||
[[m4_dnl The one case in The Big Switch inside interpreter
|
||||
case INST_NAME():
|
||||
#define whati (&(what->i_]]INST_NAME()[[))
|
||||
m4_ifelse(m4_eval(INST_INVAL() > 0), 1, [[if (fstk->vcnt < INST_INVAL()) runtime("Stack underflow"); fstk->vcnt -= INST_INVAL(); ]])
|
||||
m4_undivert(108)m4_dnl
|
||||
#undef whati
|
||||
break;
|
||||
]],
|
||||
[[m4_dnl Constructor itself
|
||||
struct f_inst *f_new_inst_]]INST_NAME()[[(enum f_instruction_code fi_code
|
||||
m4_undivert(102)m4_dnl
|
||||
)
|
||||
{
|
||||
/* Allocate the structure */
|
||||
struct f_inst *what = fi_new(fi_code);
|
||||
FID_IFCONST([[uint constargs = 1;]])
|
||||
|
||||
/* Initialize all the members */
|
||||
#define whati (&(what->i_]]INST_NAME()[[))
|
||||
m4_undivert(103)m4_dnl
|
||||
|
||||
/* If not constant, return the instruction itself */
|
||||
FID_IFCONST([[if (!constargs)]])
|
||||
return what;
|
||||
|
||||
/* Try to pre-calculate the result */
|
||||
FID_IFCONST([[m4_undivert(108)]])m4_dnl
|
||||
#undef whati
|
||||
}
|
||||
]])
|
||||
|
||||
FID_DUMP_CALLER()m4_dnl Case in another big switch used in instruction dumping (debug)
|
||||
case INST_NAME(): f_dump_line_item_]]INST_NAME()[[(item, indent + 1); break;
|
||||
|
||||
FID_DUMP()m4_dnl The dumper itself
|
||||
m4_ifdef([[FID_DUMP_BODY_EXISTS]],
|
||||
[[static inline void f_dump_line_item_]]INST_NAME()[[(const struct f_line_item *item_, const int indent)]],
|
||||
[[static inline void f_dump_line_item_]]INST_NAME()[[(const struct f_line_item *item UNUSED, const int indent UNUSED)]])
|
||||
m4_undefine([[FID_DUMP_BODY_EXISTS]])
|
||||
{
|
||||
#define item (&(item_->i_]]INST_NAME()[[))
|
||||
m4_undivert(104)m4_dnl
|
||||
#undef item
|
||||
}
|
||||
|
||||
FID_LINEARIZE()m4_dnl The linearizer
|
||||
case INST_NAME(): {
|
||||
#define whati (&(what->i_]]INST_NAME()[[))
|
||||
#define item (&(dest->items[pos].i_]]INST_NAME()[[))
|
||||
m4_undivert(105)m4_dnl
|
||||
#undef whati
|
||||
#undef item
|
||||
dest->items[pos].fi_code = what->fi_code;
|
||||
dest->items[pos].lineno = what->lineno;
|
||||
break;
|
||||
}
|
||||
|
||||
FID_SAME()m4_dnl This code compares two f_line"s while reconfiguring
|
||||
case INST_NAME():
|
||||
#define f1 (&(f1_->i_]]INST_NAME()[[))
|
||||
#define f2 (&(f2_->i_]]INST_NAME()[[))
|
||||
m4_undivert(106)m4_dnl
|
||||
#undef f1
|
||||
#undef f2
|
||||
break;
|
||||
|
||||
m4_divert(-1)FID_FLUSH(101,200)m4_dnl And finally this flushes all the unused diversions
|
||||
]])')
|
||||
|
||||
m4_define(INST, `m4_dnl This macro is called on beginning of each instruction.
|
||||
INST_FLUSH()m4_dnl First, old data is flushed
|
||||
m4_define([[INST_NAME]], [[$1]])m4_dnl Then we store instruction name,
|
||||
m4_define([[INST_INVAL]], [[$2]])m4_dnl instruction input value count
|
||||
m4_undefine([[INST_NEVER_CONSTANT]])m4_dnl and reset NEVER_CONSTANT trigger.
|
||||
FID_INTERPRET_BODY()m4_dnl By default, every code is interpreter code.
|
||||
')
|
||||
|
||||
# 3) Final preparation
|
||||
#
|
||||
# Now we prepare all the code around the global diversions.
|
||||
# It must be here, not in m4wrap, as we want M4 to mark the code
|
||||
# by #line directives correctly, not to claim that every single line
|
||||
# is at the beginning of the m4wrap directive.
|
||||
#
|
||||
# This part is split by the final file.
|
||||
# H for inst-gen.h
|
||||
# I for inst-interpret.c
|
||||
# C for inst-gen.c
|
||||
#
|
||||
# So we in cycle:
|
||||
# A. open a diversion
|
||||
# B. send there some code
|
||||
# C. close that diversion
|
||||
# D. flush a global diversion
|
||||
# E. open another diversion and goto B.
|
||||
#
|
||||
# Final diversions
|
||||
# 200+ completed text before it is flushed to output
|
||||
|
||||
# This is a list of output diversions
|
||||
m4_define(FID_WR_PUT_LIST)
|
||||
|
||||
# This macro does the steps C to E, see before.
|
||||
m4_define(FID_WR_PUT_ALSO, `m4_define([[FID_WR_PUT_LIST]],FID_WR_PUT_LIST()[[FID_WR_DPUT(]]FID_WR_DIDX[[)FID_WR_DPUT(]]$1[[)]])m4_define([[FID_WR_DIDX]],m4_eval(FID_WR_DIDX+1))m4_divert(FID_WR_DIDX)')
|
||||
|
||||
# These macros do the splitting between H/I/C
|
||||
m4_define(FID_WR_DIRECT, `m4_ifelse(TARGET,[[$1]],[[FID_WR_INIT()]],[[FID_WR_STOP()]])')
|
||||
m4_define(FID_WR_INIT, `m4_define([[FID_WR_DIDX]],200)m4_define([[FID_WR_PUT]],[[FID_WR_PUT_ALSO($]][[@)]])m4_divert(200)')
|
||||
m4_define(FID_WR_STOP, `m4_define([[FID_WR_PUT]])m4_divert(-1)')
|
||||
|
||||
# Here is the direct code to be put into the output files
|
||||
# together with the undiversions, being hidden under FID_WR_PUT()
|
||||
|
||||
m4_changequote([[,]])
|
||||
FID_WR_DIRECT(I)
|
||||
FID_WR_PUT(3)
|
||||
FID_WR_DIRECT(C)
|
||||
|
||||
#if defined(__GNUC__) && __GNUC__ >= 6
|
||||
#pragma GCC diagnostic push
|
||||
#pragma GCC diagnostic ignored "-Wmisleading-indentation"
|
||||
#endif
|
||||
|
||||
#include "nest/bird.h"
|
||||
#include "filter/filter.h"
|
||||
#include "filter/f-inst.h"
|
||||
|
||||
/* Instruction codes to string */
|
||||
static const char * const f_instruction_name_str[] = {
|
||||
FID_WR_PUT(5)
|
||||
};
|
||||
|
||||
const char *
|
||||
f_instruction_name(enum f_instruction_code fi)
|
||||
{
|
||||
if (fi < (sizeof(f_instruction_name_str) / sizeof(f_instruction_name_str[0])))
|
||||
return f_instruction_name_str[fi];
|
||||
else
|
||||
bug("Got unknown instruction code: %d", fi);
|
||||
}
|
||||
|
||||
static inline struct f_inst *
|
||||
fi_new(enum f_instruction_code fi_code)
|
||||
{
|
||||
struct f_inst *what = cfg_allocz(sizeof(struct f_inst));
|
||||
what->lineno = ifs->lino;
|
||||
what->size = 1;
|
||||
what->fi_code = fi_code;
|
||||
return what;
|
||||
}
|
||||
|
||||
static inline struct f_inst *
|
||||
fi_constant(struct f_inst *what, struct f_val val)
|
||||
{
|
||||
what->fi_code = FI_CONSTANT;
|
||||
what->i_FI_CONSTANT.val = val;
|
||||
return what;
|
||||
}
|
||||
|
||||
#define v1 whati->f1->i_FI_CONSTANT.val
|
||||
#define v2 whati->f2->i_FI_CONSTANT.val
|
||||
#define v3 whati->f3->i_FI_CONSTANT.val
|
||||
#define vv(i) items[i]->i_FI_CONSTANT.val
|
||||
#define runtime(fmt, ...) cf_error("filter preevaluation, line %d: " fmt, ifs->lino, ##__VA_ARGS__)
|
||||
#define fpool cfg_mem
|
||||
#define falloc(size) cfg_alloc(size)
|
||||
/* Instruction constructors */
|
||||
FID_WR_PUT(3)
|
||||
#undef v1
|
||||
#undef v2
|
||||
#undef v3
|
||||
#undef vv
|
||||
|
||||
/* Line dumpers */
|
||||
#define INDENT (((const char *) f_dump_line_indent_str) + sizeof(f_dump_line_indent_str) - (indent) - 1)
|
||||
static const char f_dump_line_indent_str[] = " ";
|
||||
|
||||
FID_WR_PUT(6)
|
||||
|
||||
void f_dump_line(const struct f_line *dest, uint indent)
|
||||
{
|
||||
if (!dest) {
|
||||
debug("%sNo filter line (NULL)\n", INDENT);
|
||||
return;
|
||||
}
|
||||
debug("%sFilter line %p (len=%u)\n", INDENT, dest, dest->len);
|
||||
for (uint i=0; i<dest->len; i++) {
|
||||
const struct f_line_item *item = &dest->items[i];
|
||||
debug("%sInstruction %s at line %u\n", INDENT, f_instruction_name(item->fi_code), item->lineno);
|
||||
switch (item->fi_code) {
|
||||
FID_WR_PUT(7)
|
||||
default: bug("Unknown instruction %x in f_dump_line", item->fi_code);
|
||||
}
|
||||
}
|
||||
debug("%sFilter line %p dump done\n", INDENT, dest);
|
||||
}
|
||||
|
||||
/* Linearize */
|
||||
static uint
|
||||
linearize(struct f_line *dest, const struct f_inst *what, uint pos)
|
||||
{
|
||||
for ( ; what; what = what->next) {
|
||||
switch (what->fi_code) {
|
||||
FID_WR_PUT(8)
|
||||
}
|
||||
pos++;
|
||||
}
|
||||
return pos;
|
||||
}
|
||||
|
||||
struct f_line *
|
||||
f_linearize_concat(const struct f_inst * const inst[], uint count)
|
||||
{
|
||||
uint len = 0;
|
||||
for (uint i=0; i<count; i++)
|
||||
for (const struct f_inst *what = inst[i]; what; what = what->next)
|
||||
len += what->size;
|
||||
|
||||
struct f_line *out = cfg_allocz(sizeof(struct f_line) + sizeof(struct f_line_item)*len);
|
||||
|
||||
for (uint i=0; i<count; i++)
|
||||
out->len = linearize(out, inst[i], out->len);
|
||||
|
||||
#if DEBUGGING
|
||||
f_dump_line(out, 0);
|
||||
#endif
|
||||
return out;
|
||||
}
|
||||
|
||||
/* Filter line comparison */
|
||||
int
|
||||
f_same(const struct f_line *fl1, const struct f_line *fl2)
|
||||
{
|
||||
if ((!fl1) && (!fl2))
|
||||
return 1;
|
||||
if ((!fl1) || (!fl2))
|
||||
return 0;
|
||||
if (fl1->len != fl2->len)
|
||||
return 0;
|
||||
for (uint i=0; i<fl1->len; i++) {
|
||||
#define f1_ (&(fl1->items[i]))
|
||||
#define f2_ (&(fl2->items[i]))
|
||||
if (f1_->fi_code != f2_->fi_code)
|
||||
return 0;
|
||||
if (f1_->flags != f2_->flags)
|
||||
return 0;
|
||||
|
||||
switch(f1_->fi_code) {
|
||||
FID_WR_PUT(9)
|
||||
}
|
||||
}
|
||||
#undef f1_
|
||||
#undef f2_
|
||||
return 1;
|
||||
}
|
||||
|
||||
#if defined(__GNUC__) && __GNUC__ >= 6
|
||||
#pragma GCC diagnostic pop
|
||||
#endif
|
||||
|
||||
FID_WR_DIRECT(H)
|
||||
/* Filter instruction codes */
|
||||
enum f_instruction_code {
|
||||
FID_WR_PUT(4)m4_dnl
|
||||
} PACKED;
|
||||
|
||||
/* Filter instruction structure for config */
|
||||
struct f_inst {
|
||||
struct f_inst *next; /* Next instruction */
|
||||
enum f_instruction_code fi_code; /* Instruction code */
|
||||
int size; /* How many instructions are underneath */
|
||||
int lineno; /* Line number */
|
||||
union {
|
||||
FID_WR_PUT(1)m4_dnl
|
||||
};
|
||||
};
|
||||
|
||||
/* Filter line item */
|
||||
struct f_line_item {
|
||||
enum f_instruction_code fi_code; /* What to do */
|
||||
enum f_instruction_flags flags; /* Flags, instruction-specific */
|
||||
uint lineno; /* Where */
|
||||
union {
|
||||
FID_WR_PUT(2)m4_dnl
|
||||
};
|
||||
};
|
||||
|
||||
/* Instruction constructors */
|
||||
FID_WR_PUT(3)
|
||||
m4_divert(-1)
|
||||
|
||||
# 4) Shipout
|
||||
#
|
||||
# Everything is prepared in FID_WR_PUT_LIST now. Let's go!
|
||||
|
||||
m4_changequote(`,')
|
||||
|
||||
# Flusher auxiliary macro
|
||||
m4_define(FID_FLUSH, `m4_ifelse($1,$2,,[[m4_undivert($1)FID_FLUSH(m4_eval($1+1),$2)]])')
|
||||
|
||||
# Defining the macro used in FID_WR_PUT_LIST
|
||||
m4_define(FID_WR_DPUT, `m4_undivert($1)')
|
||||
|
||||
# After the code is read and parsed, we:
|
||||
m4_m4wrap(`INST_FLUSH()m4_divert(0)FID_WR_PUT_LIST()m4_divert(-1)FID_FLUSH(1,200)')
|
||||
|
||||
m4_changequote([[,]])
|
||||
# And now M4 is going to parse f-inst.c, fill the diversions
|
||||
# and after the file is done, the content of m4_m4wrap (see before)
|
||||
# is executed.
|
1196
filter/f-inst.c
Normal file
1196
filter/f-inst.c
Normal file
File diff suppressed because it is too large
Load Diff
73
filter/f-inst.h
Normal file
73
filter/f-inst.h
Normal file
@ -0,0 +1,73 @@
|
||||
/*
|
||||
* BIRD Internet Routing Daemon -- Filter instructions
|
||||
*
|
||||
* (c) 1999 Pavel Machek <pavel@ucw.cz>
|
||||
* (c) 2018--2019 Maria Matejka <mq@jmq.cz>
|
||||
*
|
||||
* Can be freely distributed and used under the terms of the GNU GPL.
|
||||
*
|
||||
* Filter interpreter data structures and internal API.
|
||||
* See filter/f-inst.c for documentation.
|
||||
*/
|
||||
|
||||
#ifndef _BIRD_F_INST_H_
|
||||
#define _BIRD_F_INST_H_
|
||||
|
||||
#include "nest/bird.h"
|
||||
#include "conf/conf.h"
|
||||
#include "filter/filter.h"
|
||||
#include "filter/data.h"
|
||||
|
||||
/* Flags for instructions */
|
||||
enum f_instruction_flags {
|
||||
FIF_PRINTED = 1, /* FI_PRINT_AND_DIE: message put in buffer */
|
||||
} PACKED;
|
||||
|
||||
/* Include generated filter instruction declarations */
|
||||
#include "filter/inst-gen.h"
|
||||
|
||||
#define f_new_inst(...) MACRO_CONCAT_AFTER(f_new_inst_, MACRO_FIRST(__VA_ARGS__))(__VA_ARGS__)
|
||||
|
||||
/* Convert the instruction back to the enum name */
|
||||
const char *f_instruction_name(enum f_instruction_code fi);
|
||||
|
||||
/* Filter structures for execution */
|
||||
/* Line of instructions to be unconditionally executed one after another */
|
||||
struct f_line {
|
||||
uint len; /* Line length */
|
||||
u8 args; /* Function: Args required */
|
||||
u8 vars;
|
||||
struct f_line_item items[0]; /* The items themselves */
|
||||
};
|
||||
|
||||
/* Convert the f_inst infix tree to the f_line structures */
|
||||
struct f_line *f_linearize_concat(const struct f_inst * const inst[], uint count);
|
||||
static inline struct f_line *f_linearize(const struct f_inst *root)
|
||||
{ return f_linearize_concat(&root, 1); }
|
||||
|
||||
void f_dump_line(const struct f_line *, uint indent);
|
||||
|
||||
struct filter *f_new_where(struct f_inst *);
|
||||
static inline struct f_dynamic_attr f_new_dynamic_attr(u8 type, enum f_type f_type, uint code) /* Type as core knows it, type as filters know it, and code of dynamic attribute */
|
||||
{ return (struct f_dynamic_attr) { .type = type, .f_type = f_type, .ea_code = code }; } /* f_type currently unused; will be handy for static type checking */
|
||||
static inline struct f_dynamic_attr f_new_dynamic_attr_bit(u8 bit, enum f_type f_type, uint code) /* Type as core knows it, type as filters know it, and code of dynamic attribute */
|
||||
{ return (struct f_dynamic_attr) { .type = EAF_TYPE_BITFIELD, .bit = bit, .f_type = f_type, .ea_code = code }; } /* f_type currently unused; will be handy for static type checking */
|
||||
static inline struct f_static_attr f_new_static_attr(int f_type, int code, int readonly)
|
||||
{ return (struct f_static_attr) { .f_type = f_type, .sa_code = code, .readonly = readonly }; }
|
||||
struct f_inst *f_generate_complex(enum f_instruction_code fi_code, struct f_dynamic_attr da, struct f_inst *argument);
|
||||
struct f_inst *f_generate_roa_check(struct rtable_config *table, struct f_inst *prefix, struct f_inst *asn);
|
||||
|
||||
/* Hook for call bt_assert() function in configuration */
|
||||
extern void (*bt_assert_hook)(int result, const struct f_line_item *assert);
|
||||
|
||||
/* Bird Tests */
|
||||
struct f_bt_test_suite {
|
||||
node n; /* Node in config->tests */
|
||||
const struct f_line *fn; /* Root of function */
|
||||
const struct f_line *cmp; /* Compare to this function */
|
||||
const char *fn_name; /* Name of test */
|
||||
const char *dsc; /* Description */
|
||||
int result; /* Desired result */
|
||||
};
|
||||
|
||||
#endif
|
@ -10,103 +10,35 @@
|
||||
#include "nest/bird.h"
|
||||
#include "conf/conf.h"
|
||||
#include "filter/filter.h"
|
||||
#include "filter/f-inst.h"
|
||||
#include "lib/idm.h"
|
||||
#include "nest/protocol.h"
|
||||
#include "nest/route.h"
|
||||
|
||||
#define P(a,b) ((a<<8) | b)
|
||||
|
||||
struct f_inst *
|
||||
f_new_inst(enum f_instruction_code fi_code)
|
||||
{
|
||||
struct f_inst * ret;
|
||||
ret = cfg_allocz(sizeof(struct f_inst));
|
||||
ret->fi_code = fi_code;
|
||||
ret->lineno = ifs->lino;
|
||||
return ret;
|
||||
}
|
||||
|
||||
struct f_inst *
|
||||
f_new_inst_da(enum f_instruction_code fi_code, struct f_dynamic_attr da)
|
||||
{
|
||||
struct f_inst *ret = f_new_inst(fi_code);
|
||||
ret->aux = (da.f_type << 8) | da.type;
|
||||
ret->a2.i = da.ea_code;
|
||||
return ret;
|
||||
}
|
||||
|
||||
struct f_inst *
|
||||
f_new_inst_sa(enum f_instruction_code fi_code, struct f_static_attr sa)
|
||||
{
|
||||
struct f_inst *ret = f_new_inst(fi_code);
|
||||
ret->aux = sa.f_type;
|
||||
ret->a2.i = sa.sa_code;
|
||||
ret->a1.i = sa.readonly;
|
||||
return ret;
|
||||
}
|
||||
|
||||
/*
|
||||
* Generate set_dynamic( operation( get_dynamic(), argument ) )
|
||||
*/
|
||||
struct f_inst *
|
||||
f_generate_complex(int operation, int operation_aux, struct f_dynamic_attr da, struct f_inst *argument)
|
||||
{
|
||||
struct f_inst *set_dyn = f_new_inst_da(FI_EA_SET, da),
|
||||
*oper = f_new_inst(operation),
|
||||
*get_dyn = f_new_inst_da(FI_EA_GET, da);
|
||||
|
||||
oper->aux = operation_aux;
|
||||
oper->a1.p = get_dyn;
|
||||
oper->a2.p = argument;
|
||||
|
||||
set_dyn->a1.p = oper;
|
||||
return set_dyn;
|
||||
}
|
||||
|
||||
struct f_inst *
|
||||
f_generate_roa_check(struct rtable_config *table, struct f_inst *prefix, struct f_inst *asn)
|
||||
{
|
||||
struct f_inst_roa_check *ret = cfg_allocz(sizeof(struct f_inst_roa_check));
|
||||
ret->i.fi_code = FI_ROA_CHECK;
|
||||
ret->i.lineno = ifs->lino;
|
||||
ret->i.arg1 = prefix;
|
||||
ret->i.arg2 = asn;
|
||||
/* prefix == NULL <-> asn == NULL */
|
||||
|
||||
if (table->addr_type != NET_ROA4 && table->addr_type != NET_ROA6)
|
||||
cf_error("%s is not a ROA table", table->name);
|
||||
ret->rtc = table;
|
||||
|
||||
return &ret->i;
|
||||
}
|
||||
|
||||
static const char * const f_instruction_name_str[] = {
|
||||
#define F(c,a,b) \
|
||||
[c] = #c,
|
||||
FI__LIST
|
||||
#undef F
|
||||
};
|
||||
|
||||
const char *
|
||||
f_instruction_name(enum f_instruction_code fi)
|
||||
{
|
||||
if (fi < FI__MAX)
|
||||
return f_instruction_name_str[fi];
|
||||
else
|
||||
bug("Got unknown instruction code: %d", fi);
|
||||
}
|
||||
|
||||
char *
|
||||
filter_name(struct filter *filter)
|
||||
filter_name(const struct filter *filter)
|
||||
{
|
||||
if (!filter)
|
||||
return "ACCEPT";
|
||||
else if (filter == FILTER_REJECT)
|
||||
return "REJECT";
|
||||
else if (!filter->name)
|
||||
else if (!filter->sym)
|
||||
return "(unnamed)";
|
||||
else
|
||||
return filter->name;
|
||||
return filter->sym->name;
|
||||
}
|
||||
|
||||
struct filter *f_new_where(struct f_inst *where)
|
||||
{
|
||||
struct f_inst *cond = f_new_inst(FI_CONDITION, where,
|
||||
f_new_inst(FI_DIE, F_ACCEPT),
|
||||
f_new_inst(FI_DIE, F_REJECT));
|
||||
|
||||
struct filter *f = cfg_allocz(sizeof(struct filter));
|
||||
f->root = f_linearize(cond);
|
||||
return f;
|
||||
}
|
||||
|
||||
#define CA_KEY(n) n->name, n->fda.type
|
||||
|
1979
filter/filter.c
1979
filter/filter.c
File diff suppressed because it is too large
Load Diff
313
filter/filter.h
313
filter/filter.h
@ -2,6 +2,7 @@
|
||||
* BIRD Internet Routing Daemon -- Filters
|
||||
*
|
||||
* (c) 1999 Pavel Machek <pavel@ucw.cz>
|
||||
* (c) 2018--2019 Maria Matejka <mq@jmq.cz>
|
||||
*
|
||||
* Can be freely distributed and used under the terms of the GNU GPL.
|
||||
*/
|
||||
@ -11,142 +12,43 @@
|
||||
|
||||
#include "lib/resource.h"
|
||||
#include "lib/ip.h"
|
||||
#include "lib/macro.h"
|
||||
#include "nest/route.h"
|
||||
#include "nest/attrs.h"
|
||||
|
||||
/* Filter instruction types */
|
||||
|
||||
#define FI__TWOCHAR(a,b) ((a<<8) | b)
|
||||
#define FI__LIST \
|
||||
F(FI_ADD, 0, '+') \
|
||||
F(FI_SUBTRACT, 0, '-') \
|
||||
F(FI_MULTIPLY, 0, '*') \
|
||||
F(FI_DIVIDE, 0, '/') \
|
||||
F(FI_AND, 0, '&') \
|
||||
F(FI_OR, 0, '|') \
|
||||
F(FI_PAIR_CONSTRUCT, 'm', 'p') \
|
||||
F(FI_EC_CONSTRUCT, 'm', 'c') \
|
||||
F(FI_LC_CONSTRUCT, 'm', 'l') \
|
||||
F(FI_PATHMASK_CONSTRUCT, 'm', 'P') \
|
||||
F(FI_NEQ, '!', '=') \
|
||||
F(FI_EQ, '=', '=') \
|
||||
F(FI_LT, 0, '<') \
|
||||
F(FI_LTE, '<', '=') \
|
||||
F(FI_NOT, 0, '!') \
|
||||
F(FI_MATCH, 0, '~') \
|
||||
F(FI_NOT_MATCH, '!', '~') \
|
||||
F(FI_DEFINED, 'd', 'e') \
|
||||
F(FI_TYPE, 0, 'T') \
|
||||
F(FI_IS_V4, 'I', 'i') \
|
||||
F(FI_SET, 0, 's') \
|
||||
F(FI_CONSTANT, 0, 'c') \
|
||||
F(FI_VARIABLE, 0, 'V') \
|
||||
F(FI_CONSTANT_INDIRECT, 0, 'C') \
|
||||
F(FI_PRINT, 0, 'p') \
|
||||
F(FI_CONDITION, 0, '?') \
|
||||
F(FI_NOP, 0, '0') \
|
||||
F(FI_PRINT_AND_DIE, 'p', ',') \
|
||||
F(FI_RTA_GET, 0, 'a') \
|
||||
F(FI_RTA_SET, 'a', 'S') \
|
||||
F(FI_EA_GET, 'e', 'a') \
|
||||
F(FI_EA_SET, 'e', 'S') \
|
||||
F(FI_PREF_GET, 0, 'P') \
|
||||
F(FI_PREF_SET, 'P', 'S') \
|
||||
F(FI_LENGTH, 0, 'L') \
|
||||
F(FI_ROA_MAXLEN, 'R', 'M') \
|
||||
F(FI_ROA_ASN, 'R', 'A') \
|
||||
F(FI_SADR_SRC, 'n', 's') \
|
||||
F(FI_IP, 'c', 'p') \
|
||||
F(FI_ROUTE_DISTINGUISHER, 'R', 'D') \
|
||||
F(FI_AS_PATH_FIRST, 'a', 'f') \
|
||||
F(FI_AS_PATH_LAST, 'a', 'l') \
|
||||
F(FI_AS_PATH_LAST_NAG, 'a', 'L') \
|
||||
F(FI_RETURN, 0, 'r') \
|
||||
F(FI_CALL, 'c', 'a') \
|
||||
F(FI_CLEAR_LOCAL_VARS, 'c', 'V') \
|
||||
F(FI_SWITCH, 'S', 'W') \
|
||||
F(FI_IP_MASK, 'i', 'M') \
|
||||
F(FI_EMPTY, 0, 'E') \
|
||||
F(FI_PATH_PREPEND, 'A', 'p') \
|
||||
F(FI_CLIST_ADD_DEL, 'C', 'a') \
|
||||
F(FI_ROA_CHECK, 'R', 'C') \
|
||||
F(FI_FORMAT, 0, 'F') \
|
||||
F(FI_ASSERT, 'a', 's')
|
||||
|
||||
enum f_instruction_code {
|
||||
#define F(c,a,b) \
|
||||
c,
|
||||
FI__LIST
|
||||
#undef F
|
||||
FI__MAX,
|
||||
} PACKED;
|
||||
|
||||
const char *f_instruction_name(enum f_instruction_code fi);
|
||||
|
||||
struct f_inst { /* Instruction */
|
||||
struct f_inst *next; /* Structure is 16 bytes, anyway */
|
||||
enum f_instruction_code fi_code;
|
||||
u16 aux; /* Extension to instruction code, T_*, EA_*, EAF_* */
|
||||
union {
|
||||
uint i;
|
||||
void *p;
|
||||
} a1; /* The first argument */
|
||||
union {
|
||||
uint i;
|
||||
void *p;
|
||||
} a2; /* The second argument */
|
||||
union {
|
||||
int i;
|
||||
void *p;
|
||||
} a3; /* The third argument */
|
||||
int lineno;
|
||||
/* Possible return values of filter execution */
|
||||
enum filter_return {
|
||||
F_NOP = 0,
|
||||
F_NONL,
|
||||
F_RETURN,
|
||||
F_ACCEPT, /* Need to preserve ordering: accepts < rejects! */
|
||||
F_REJECT,
|
||||
F_ERROR,
|
||||
F_QUITBIRD,
|
||||
};
|
||||
|
||||
#define arg1 a1.p
|
||||
#define arg2 a2.p
|
||||
static inline const char *filter_return_str(const enum filter_return fret) {
|
||||
switch (fret) {
|
||||
#define FRS(x) case x: return #x
|
||||
FRS(F_NOP);
|
||||
FRS(F_NONL);
|
||||
FRS(F_RETURN);
|
||||
FRS(F_ACCEPT);
|
||||
FRS(F_REJECT);
|
||||
FRS(F_ERROR);
|
||||
FRS(F_QUITBIRD);
|
||||
#undef FRS
|
||||
default: bug("This shall not happen");
|
||||
}
|
||||
}
|
||||
|
||||
/* Not enough fields in f_inst for three args used by roa_check() */
|
||||
struct f_inst_roa_check {
|
||||
struct f_inst i;
|
||||
struct rtable_config *rtc;
|
||||
};
|
||||
|
||||
struct f_prefix {
|
||||
net_addr net;
|
||||
u8 lo, hi;
|
||||
};
|
||||
|
||||
struct f_val {
|
||||
int type; /* T_* */
|
||||
union {
|
||||
uint i;
|
||||
u64 ec;
|
||||
lcomm lc;
|
||||
ip_addr ip;
|
||||
const net_addr *net;
|
||||
char *s;
|
||||
struct f_tree *t;
|
||||
struct f_trie *ti;
|
||||
struct adata *ad;
|
||||
struct f_path_mask *path_mask;
|
||||
} val;
|
||||
};
|
||||
|
||||
struct f_dynamic_attr {
|
||||
int type;
|
||||
int f_type;
|
||||
int ea_code;
|
||||
};
|
||||
|
||||
struct f_static_attr {
|
||||
int f_type;
|
||||
int sa_code;
|
||||
int readonly;
|
||||
};
|
||||
struct f_val;
|
||||
|
||||
/* The filter encapsulating structure to be pointed-to from outside */
|
||||
struct f_line;
|
||||
struct filter {
|
||||
char *name;
|
||||
struct f_inst *root;
|
||||
struct symbol *sym;
|
||||
const struct f_line *root;
|
||||
};
|
||||
|
||||
struct filter_slot {
|
||||
@ -156,146 +58,24 @@ struct filter_slot {
|
||||
list notifiers;
|
||||
};
|
||||
|
||||
void filter_slot_init(struct filter_slot *fs, pool *pp, struct filter *filter);
|
||||
void filter_slot_flush(struct filter_slot *fs);
|
||||
void filter_slot_start(struct filter_slot *fs, void (*reloader)(struct filter_slot *));
|
||||
void filter_slot_stop(struct filter_slot *fs);
|
||||
|
||||
struct f_inst *f_new_inst(enum f_instruction_code fi_code);
|
||||
struct f_inst *f_new_inst_da(enum f_instruction_code fi_code, struct f_dynamic_attr da);
|
||||
struct f_inst *f_new_inst_sa(enum f_instruction_code fi_code, struct f_static_attr sa);
|
||||
static inline struct f_dynamic_attr f_new_dynamic_attr(int type, int f_type, int code) /* Type as core knows it, type as filters know it, and code of dynamic attribute */
|
||||
{ return (struct f_dynamic_attr) { .type = type, .f_type = f_type, .ea_code = code }; } /* f_type currently unused; will be handy for static type checking */
|
||||
static inline struct f_static_attr f_new_static_attr(int f_type, int code, int readonly)
|
||||
{ return (struct f_static_attr) { .f_type = f_type, .sa_code = code, .readonly = readonly }; }
|
||||
struct f_tree *f_new_tree(void);
|
||||
struct f_inst *f_generate_complex(int operation, int operation_aux, struct f_dynamic_attr da, struct f_inst *argument);
|
||||
struct f_inst *f_generate_roa_check(struct rtable_config *table, struct f_inst *prefix, struct f_inst *asn);
|
||||
|
||||
|
||||
struct f_tree *build_tree(struct f_tree *);
|
||||
struct f_tree *find_tree(struct f_tree *t, struct f_val val);
|
||||
int same_tree(struct f_tree *t1, struct f_tree *t2);
|
||||
void tree_format(struct f_tree *t, buffer *buf);
|
||||
|
||||
struct f_trie *f_new_trie(linpool *lp, uint node_size);
|
||||
void *trie_add_prefix(struct f_trie *t, const net_addr *n, uint l, uint h);
|
||||
int trie_match_net(struct f_trie *t, const net_addr *n);
|
||||
int trie_same(struct f_trie *t1, struct f_trie *t2);
|
||||
void trie_format(struct f_trie *t, buffer *buf);
|
||||
|
||||
struct ea_list;
|
||||
struct rte;
|
||||
|
||||
int f_run(struct filter_slot *filter_slot, struct rte **rte, struct linpool *tmp_pool, int flags);
|
||||
struct f_val f_eval_rte(struct f_inst *expr, struct rte **rte, struct linpool *tmp_pool);
|
||||
struct f_val f_eval(struct f_inst *expr, struct linpool *tmp_pool);
|
||||
uint f_eval_int(struct f_inst *expr);
|
||||
enum filter_return f_run(struct filter_slot *filter_slot, struct rte **rte, struct linpool *tmp_pool, int flags);
|
||||
enum filter_return f_eval_rte(const struct f_line *expr, struct rte **rte, struct linpool *tmp_pool);
|
||||
uint f_eval_int(const struct f_line *expr);
|
||||
enum filter_return f_eval_buf(const struct f_line *expr, struct linpool *tmp_pool, buffer *buf);
|
||||
|
||||
char *filter_name(struct filter *filter);
|
||||
int filter_same(struct filter *new, struct filter *old);
|
||||
const char *filter_name(const struct filter *filter);
|
||||
int filter_same(const struct filter *new, const struct filter *old);
|
||||
int f_same(const struct f_line *f1, const struct f_line *f2);
|
||||
|
||||
int i_same(struct f_inst *f1, struct f_inst *f2);
|
||||
void filter_commit(struct config *new, struct config *old);
|
||||
|
||||
int val_compare(struct f_val v1, struct f_val v2);
|
||||
int val_same(struct f_val v1, struct f_val v2);
|
||||
|
||||
void val_format(struct f_val v, buffer *buf);
|
||||
|
||||
|
||||
#define F_NOP 0
|
||||
#define F_NONL 1
|
||||
#define F_ACCEPT 2 /* Need to preserve ordering: accepts < rejects! */
|
||||
#define F_REJECT 3
|
||||
#define F_ERROR 4
|
||||
#define F_QUITBIRD 5
|
||||
void filters_dump_all(void);
|
||||
|
||||
#define FILTER_ACCEPT NULL
|
||||
#define FILTER_REJECT ((void *) 1)
|
||||
#define FILTER_UNDEF ((void *) 2) /* Used in BGP */
|
||||
|
||||
/* Type numbers must be in 0..0xff range */
|
||||
#define T_MASK 0xff
|
||||
|
||||
/* Internal types */
|
||||
/* Do not use type of zero, that way we'll see errors easier. */
|
||||
#define T_VOID 1
|
||||
|
||||
/* User visible types, which fit in int */
|
||||
#define T_INT 0x10
|
||||
#define T_BOOL 0x11
|
||||
#define T_PAIR 0x12 /* Notice that pair is stored as integer: first << 16 | second */
|
||||
#define T_QUAD 0x13
|
||||
|
||||
/* Put enumerational types in 0x30..0x3f range */
|
||||
#define T_ENUM_LO 0x30
|
||||
#define T_ENUM_HI 0x3f
|
||||
|
||||
#define T_ENUM_RTS 0x30
|
||||
#define T_ENUM_BGP_ORIGIN 0x31
|
||||
#define T_ENUM_SCOPE 0x32
|
||||
#define T_ENUM_RTC 0x33
|
||||
#define T_ENUM_RTD 0x34
|
||||
#define T_ENUM_ROA 0x35
|
||||
#define T_ENUM_NETTYPE 0x36
|
||||
#define T_ENUM_RA_PREFERENCE 0x37
|
||||
|
||||
/* new enums go here */
|
||||
#define T_ENUM_EMPTY 0x3f /* Special hack for atomic_aggr */
|
||||
|
||||
#define T_ENUM T_ENUM_LO ... T_ENUM_HI
|
||||
|
||||
/* Bigger ones */
|
||||
#define T_IP 0x20
|
||||
#define T_NET 0x21
|
||||
#define T_STRING 0x22
|
||||
#define T_PATH_MASK 0x23 /* mask for BGP path */
|
||||
#define T_PATH 0x24 /* BGP path */
|
||||
#define T_CLIST 0x25 /* Community list */
|
||||
#define T_EC 0x26 /* Extended community value, u64 */
|
||||
#define T_ECLIST 0x27 /* Extended community list */
|
||||
#define T_LC 0x28 /* Large community value, lcomm */
|
||||
#define T_LCLIST 0x29 /* Large community list */
|
||||
#define T_RD 0x2a /* Route distinguisher for VPN addresses */
|
||||
|
||||
#define T_RETURN 0x40
|
||||
#define T_SET 0x80
|
||||
#define T_PREFIX_SET 0x81
|
||||
|
||||
|
||||
#define SA_FROM 1
|
||||
#define SA_GW 2
|
||||
#define SA_NET 3
|
||||
#define SA_PROTO 4
|
||||
#define SA_SOURCE 5
|
||||
#define SA_SCOPE 6
|
||||
#define SA_DEST 7
|
||||
#define SA_IFNAME 8
|
||||
#define SA_IFINDEX 9
|
||||
|
||||
|
||||
struct f_tree {
|
||||
struct f_tree *left, *right;
|
||||
struct f_val from, to;
|
||||
void *data;
|
||||
};
|
||||
|
||||
struct f_trie_node
|
||||
{
|
||||
ip_addr addr, mask, accept;
|
||||
uint plen;
|
||||
struct f_trie_node *c[2];
|
||||
};
|
||||
|
||||
struct f_trie
|
||||
{
|
||||
linpool *lp;
|
||||
int zero;
|
||||
uint node_size;
|
||||
struct f_trie_node root[0]; /* Root trie node follows */
|
||||
};
|
||||
|
||||
#define NEW_F_VAL struct f_val * val; val = cfg_alloc(sizeof(struct f_val));
|
||||
#define FILTER_REJECT ((struct filter *) 1)
|
||||
#define FILTER_UNDEF ((struct filter *) 2) /* Used in BGP */
|
||||
|
||||
#define FF_SILENT 2 /* Silent filter execution */
|
||||
#define FF_TEMP 4 /* Result of this filter is dropped */
|
||||
@ -309,15 +89,4 @@ struct custom_attribute {
|
||||
|
||||
struct custom_attribute *ca_lookup(pool *p, const char *name, int ea_type);
|
||||
|
||||
/* Bird Tests */
|
||||
struct f_bt_test_suite {
|
||||
node n; /* Node in config->tests */
|
||||
struct f_inst *fn; /* Root of function */
|
||||
const char *fn_name; /* Name of test */
|
||||
const char *dsc; /* Description */
|
||||
};
|
||||
|
||||
/* Hook for call bt_assert() function in configuration */
|
||||
extern void (*bt_assert_hook)(int result, struct f_inst *assert);
|
||||
|
||||
#endif
|
||||
|
@ -17,44 +17,53 @@
|
||||
#include "test/bt-utils.h"
|
||||
|
||||
#include "filter/filter.h"
|
||||
#include "filter/data.h"
|
||||
#include "filter/f-inst.h"
|
||||
#include "conf/conf.h"
|
||||
|
||||
#define BT_CONFIG_FILE "filter/test.conf"
|
||||
|
||||
|
||||
static struct config *
|
||||
parse_config_file(const void *filename_void)
|
||||
struct parse_config_file_arg {
|
||||
struct config **cp;
|
||||
const char *filename;
|
||||
};
|
||||
|
||||
static int
|
||||
parse_config_file(const void *argv)
|
||||
{
|
||||
bt_bird_init();
|
||||
|
||||
size_t fn_size = strlen((const char *) filename_void) + 1;
|
||||
const struct parse_config_file_arg *arg = argv;
|
||||
size_t fn_size = strlen(arg->filename) + 1;
|
||||
char *filename = alloca(fn_size);
|
||||
strncpy(filename, filename_void, fn_size);
|
||||
memcpy(filename, arg->filename, fn_size);
|
||||
|
||||
struct config *c = bt_config_file_parse(filename);
|
||||
bt_bird_cleanup();
|
||||
|
||||
return c;
|
||||
*(arg->cp) = bt_config_file_parse(filename);
|
||||
return !!*(arg->cp);
|
||||
}
|
||||
|
||||
static int
|
||||
run_function(const void *parsed_fn_def)
|
||||
run_function(const void *arg)
|
||||
{
|
||||
/* XXX: const -> non-const */
|
||||
struct f_inst *f = (struct f_inst *) parsed_fn_def;
|
||||
const struct f_bt_test_suite *t = arg;
|
||||
|
||||
if (t->cmp)
|
||||
return t->result == f_same(t->fn, t->cmp);
|
||||
|
||||
if (!f_same(t->fn, t->fn)) {
|
||||
bt_result = bt_suite_result = 0;
|
||||
bt_log_suite_case_result(0, "The function doesn't compare to itself as the same");
|
||||
return 0;
|
||||
}
|
||||
|
||||
linpool *tmp = lp_new_default(&root_pool);
|
||||
struct f_val res = f_eval(f, tmp);
|
||||
enum filter_return fret = f_eval(t->fn, tmp, NULL);
|
||||
rfree(tmp);
|
||||
|
||||
if (res.type == T_RETURN && res.val.i >= F_REJECT)
|
||||
return 0;
|
||||
|
||||
return 1;
|
||||
return (fret < F_REJECT);
|
||||
}
|
||||
|
||||
static void
|
||||
bt_assert_filter(int result, struct f_inst *assert)
|
||||
bt_assert_filter(int result, const struct f_line_item *assert)
|
||||
{
|
||||
int bt_suit_case_result = 1;
|
||||
if (!result)
|
||||
@ -64,23 +73,30 @@ bt_assert_filter(int result, struct f_inst *assert)
|
||||
bt_suit_case_result = 0;
|
||||
}
|
||||
|
||||
bt_log_suite_case_result(bt_suit_case_result, "Assertion at line %d (%s)", assert->lineno, (char *) assert->a2.p);
|
||||
bt_log_suite_case_result(bt_suit_case_result, "Assertion at line %d (%s)",
|
||||
assert->lineno, assert->i_FI_ASSERT.s);
|
||||
}
|
||||
|
||||
int
|
||||
main(int argc, char *argv[])
|
||||
{
|
||||
bt_init(argc, argv);
|
||||
bt_bird_init();
|
||||
|
||||
struct config *c = parse_config_file(BT_CONFIG_FILE);
|
||||
bt_assert_hook = bt_assert_filter;
|
||||
|
||||
struct config *c = NULL;
|
||||
struct parse_config_file_arg pcfa = { .cp = &c, .filename = BT_CONFIG_FILE };
|
||||
bt_test_suite_base(parse_config_file, "conf", (const void *) &pcfa, 0, 0, "parse config file");
|
||||
bt_test_suite_base(parse_config_file, "reconf", (const void *) &pcfa, 0, 0, "reconfigure with the same file");
|
||||
|
||||
bt_bird_cleanup();
|
||||
|
||||
if (c)
|
||||
{
|
||||
bt_assert_hook = bt_assert_filter;
|
||||
|
||||
struct f_bt_test_suite *t;
|
||||
WALK_LIST(t, c->tests)
|
||||
bt_test_suite_base(run_function, t->fn_name, t->fn, BT_FORKING, BT_TIMEOUT, "%s", t->dsc);
|
||||
bt_test_suite_base(run_function, t->fn_name, t, BT_FORKING, BT_TIMEOUT, "%s", t->dsc);
|
||||
}
|
||||
|
||||
return bt_exit_value();
|
||||
|
23
filter/test-reconf-begin.conf
Normal file
23
filter/test-reconf-begin.conf
Normal file
@ -0,0 +1,23 @@
|
||||
router id 1.1.1.1;
|
||||
protocol device {}
|
||||
|
||||
function a() {
|
||||
return true;
|
||||
}
|
||||
|
||||
function b() {
|
||||
return a();
|
||||
}
|
||||
|
||||
function c() {
|
||||
return b();
|
||||
}
|
||||
|
||||
filter d {
|
||||
if c() then accept; else reject;
|
||||
}
|
||||
|
||||
protocol static {
|
||||
ipv4 { import filter d; };
|
||||
route 10.0.0.0/24 unreachable;
|
||||
}
|
23
filter/test-reconf-end.conf
Normal file
23
filter/test-reconf-end.conf
Normal file
@ -0,0 +1,23 @@
|
||||
router id 1.1.1.1;
|
||||
protocol device {}
|
||||
|
||||
function a() {
|
||||
return false;
|
||||
}
|
||||
|
||||
function b() {
|
||||
return a();
|
||||
}
|
||||
|
||||
function c() {
|
||||
return b();
|
||||
}
|
||||
|
||||
filter d {
|
||||
if c() then accept; else reject;
|
||||
}
|
||||
|
||||
protocol static {
|
||||
ipv4 { import filter d; };
|
||||
route 10.0.0.0/24 unreachable;
|
||||
}
|
@ -7,8 +7,7 @@
|
||||
router id 62.168.0.1;
|
||||
|
||||
/* We have to setup any protocol */
|
||||
protocol static { ipv4; }
|
||||
|
||||
protocol device { }
|
||||
|
||||
|
||||
|
||||
@ -25,8 +24,19 @@ function onef(int a)
|
||||
return 1;
|
||||
}
|
||||
|
||||
function twof(int a)
|
||||
{
|
||||
return 2;
|
||||
}
|
||||
|
||||
function oneg(int a)
|
||||
{
|
||||
return 1;
|
||||
}
|
||||
|
||||
bt_test_same(onef, onef, 1);
|
||||
bt_test_same(onef, oneg, 1);
|
||||
bt_test_same(onef, twof, 0);
|
||||
|
||||
/*
|
||||
* Testing boolean expressions
|
||||
@ -62,7 +72,6 @@ bt_test_suite(t_bool, "Testing boolean expressions");
|
||||
|
||||
|
||||
|
||||
|
||||
/*
|
||||
* Testing integers
|
||||
* ----------------
|
||||
@ -126,6 +135,7 @@ int set is;
|
||||
bt_assert(2 ~ [ 1, 2, 3 ]);
|
||||
bt_assert(5 ~ [ 4 .. 7 ]);
|
||||
bt_assert(1 !~ [ 2, 3, 4 ]);
|
||||
bt_assert(999 !~ [ 666, 333 ]);
|
||||
|
||||
is = [ 2, 3, 4, 7..11 ];
|
||||
bt_assert(10 ~ is);
|
||||
@ -587,11 +597,15 @@ function mkpath(int a; int b)
|
||||
return [= a b 3 2 1 =];
|
||||
}
|
||||
|
||||
define set35 = [3 .. 5];
|
||||
|
||||
function t_path()
|
||||
bgpmask pm1;
|
||||
bgppath p2;
|
||||
int set set12;
|
||||
{
|
||||
pm1 = [= 4 3 2 1 =];
|
||||
set12 = [1, 2];
|
||||
|
||||
bt_assert(format(pm1) = "[= 4 3 2 1 =]");
|
||||
|
||||
@ -616,6 +630,8 @@ bgppath p2;
|
||||
bt_assert(p2 !~ [8, ten..(2*ten)]);
|
||||
bt_assert(p2 ~ [= * 4 3 * 1 =]);
|
||||
bt_assert(p2 ~ [= (3+2) (2*2) 3 2 1 =]);
|
||||
bt_assert(p2 ~ [= 5 [2, 4, 6] 3 [1..2] 1 =]);
|
||||
bt_assert(p2 ~ [= 5 set35 3 set12 set12 =]);
|
||||
bt_assert(p2 ~ mkpath(5, 4));
|
||||
|
||||
bt_assert(p2.len = 5);
|
||||
@ -1107,6 +1123,11 @@ int i;
|
||||
return 0;
|
||||
}
|
||||
|
||||
function callmeagain(int a; int b; int c)
|
||||
{
|
||||
return a + b + c;
|
||||
}
|
||||
|
||||
function fifteen()
|
||||
{
|
||||
return 15;
|
||||
@ -1123,6 +1144,7 @@ function t_call_function()
|
||||
bt_assert(callme(3, 2) = 6);
|
||||
bt_assert(callme(4, 4) = 16);
|
||||
bt_assert(callme(7, 2) = 14);
|
||||
bt_assert(callmeagain(1, 2, 3) = 6);
|
||||
}
|
||||
|
||||
bt_test_suite(t_call_function, "Testing calling functions");
|
||||
@ -1156,6 +1178,10 @@ bt_test_suite(t_include, "Testing including another config file");
|
||||
function t_if_else()
|
||||
int i;
|
||||
{
|
||||
/* Empty blocks regression test */
|
||||
if true then {}
|
||||
else {}
|
||||
|
||||
if true then
|
||||
bt_assert(true);
|
||||
|
||||
@ -1165,6 +1191,10 @@ int i;
|
||||
bt_assert(true);
|
||||
else
|
||||
bt_assert(false);
|
||||
|
||||
/* Empty blocks regression test */
|
||||
if true then {}
|
||||
else {}
|
||||
}
|
||||
|
||||
bt_test_suite(t_if_else, "Testing if-else statement");
|
||||
@ -1336,7 +1366,7 @@ bt_test_suite(t_mixed_prefix, "Testing mixed net types");
|
||||
|
||||
filter vpn_filter
|
||||
{
|
||||
bt_assert(format(net) = "0:1:2 10.1.10.0/24");
|
||||
bt_assert(format(net) = "1:2 10.1.10.0/24");
|
||||
bt_assert(net.type = NET_VPN4);
|
||||
bt_assert(net.type != NET_IP4);
|
||||
bt_assert(net.type != NET_IP6);
|
||||
@ -1347,6 +1377,13 @@ filter vpn_filter
|
||||
NET_IP6: print "IPV6";
|
||||
}
|
||||
|
||||
bt_check_assign(from, 10.20.30.40);
|
||||
bt_check_assign(gw, 55.55.55.44);
|
||||
|
||||
bgp_community.add((3,5));
|
||||
bgp_ext_community.add((ro, 135, 999));
|
||||
bgp_large_community.add((6464156, 89646354, 8675643));
|
||||
|
||||
accept;
|
||||
}
|
||||
|
||||
@ -1358,3 +1395,9 @@ protocol static
|
||||
vpn4 { table v4; import filter vpn_filter; };
|
||||
route 0:1:2 10.1.10.0/24 unreachable;
|
||||
}
|
||||
|
||||
protocol static
|
||||
{
|
||||
ipv6 { import where false; };
|
||||
route fd01::/48 unreachable;
|
||||
}
|
||||
|
@ -10,6 +10,7 @@
|
||||
#include "nest/bird.h"
|
||||
#include "conf/conf.h"
|
||||
#include "filter/filter.h"
|
||||
#include "filter/data.h"
|
||||
|
||||
/**
|
||||
* find_tree
|
||||
@ -23,15 +24,15 @@
|
||||
* Both set matching and |switch() { }| construction is implemented using this function,
|
||||
* thus both are as fast as they can be.
|
||||
*/
|
||||
struct f_tree *
|
||||
find_tree(struct f_tree *t, struct f_val val)
|
||||
const struct f_tree *
|
||||
find_tree(const struct f_tree *t, const struct f_val *val)
|
||||
{
|
||||
if (!t)
|
||||
return NULL;
|
||||
if ((val_compare(t->from, val) != 1) &&
|
||||
(val_compare(t->to, val) != -1))
|
||||
if ((val_compare(&(t->from), val) != 1) &&
|
||||
(val_compare(&(t->to), val) != -1))
|
||||
return t;
|
||||
if (val_compare(t->from, val) == -1)
|
||||
if (val_compare(&(t->from), val) == -1)
|
||||
return find_tree(t->right, val);
|
||||
else
|
||||
return find_tree(t->left, val);
|
||||
@ -56,7 +57,7 @@ build_tree_rec(struct f_tree **buf, int l, int h)
|
||||
static int
|
||||
tree_compare(const void *p1, const void *p2)
|
||||
{
|
||||
return val_compare((* (struct f_tree **) p1)->from, (* (struct f_tree **) p2)->from);
|
||||
return val_compare(&((* (struct f_tree **) p1)->from), &((* (struct f_tree **) p2)->from));
|
||||
}
|
||||
|
||||
/**
|
||||
@ -119,39 +120,39 @@ f_new_tree(void)
|
||||
* Compares two trees and returns 1 if they are same
|
||||
*/
|
||||
int
|
||||
same_tree(struct f_tree *t1, struct f_tree *t2)
|
||||
same_tree(const struct f_tree *t1, const struct f_tree *t2)
|
||||
{
|
||||
if ((!!t1) != (!!t2))
|
||||
return 0;
|
||||
if (!t1)
|
||||
return 1;
|
||||
if (val_compare(t1->from, t2->from))
|
||||
if (val_compare(&(t1->from), &(t2->from)))
|
||||
return 0;
|
||||
if (val_compare(t1->to, t2->to))
|
||||
if (val_compare(&(t1->to), &(t2->to)))
|
||||
return 0;
|
||||
if (!same_tree(t1->left, t2->left))
|
||||
return 0;
|
||||
if (!same_tree(t1->right, t2->right))
|
||||
return 0;
|
||||
if (!i_same(t1->data, t2->data))
|
||||
if (!f_same(t1->data, t2->data))
|
||||
return 0;
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
static void
|
||||
tree_node_format(struct f_tree *t, buffer *buf)
|
||||
tree_node_format(const struct f_tree *t, buffer *buf)
|
||||
{
|
||||
if (t == NULL)
|
||||
return;
|
||||
|
||||
tree_node_format(t->left, buf);
|
||||
|
||||
val_format(t->from, buf);
|
||||
if (val_compare(t->from, t->to) != 0)
|
||||
val_format(&(t->from), buf);
|
||||
if (val_compare(&(t->from), &(t->to)) != 0)
|
||||
{
|
||||
buffer_puts(buf, "..");
|
||||
val_format(t->to, buf);
|
||||
val_format(&(t->to), buf);
|
||||
}
|
||||
buffer_puts(buf, ", ");
|
||||
|
||||
@ -159,7 +160,7 @@ tree_node_format(struct f_tree *t, buffer *buf)
|
||||
}
|
||||
|
||||
void
|
||||
tree_format(struct f_tree *t, buffer *buf)
|
||||
tree_format(const struct f_tree *t, buffer *buf)
|
||||
{
|
||||
buffer_puts(buf, "[");
|
||||
|
||||
|
@ -10,6 +10,7 @@
|
||||
#include "test/bt-utils.h"
|
||||
|
||||
#include "filter/filter.h"
|
||||
#include "filter/data.h"
|
||||
#include "conf/conf.h"
|
||||
|
||||
#define MAX_TREE_HEIGHT 13
|
||||
@ -226,8 +227,8 @@ t_find(void)
|
||||
};
|
||||
for(looking_up_value.val.i = 0; looking_up_value.val.i < nodes_count; looking_up_value.val.i++)
|
||||
{
|
||||
struct f_tree *found_tree = find_tree(tree, looking_up_value);
|
||||
bt_assert((val_compare(looking_up_value, found_tree->from) == 0) && (val_compare(looking_up_value, found_tree->to) == 0));
|
||||
const struct f_tree *found_tree = find_tree(tree, &looking_up_value);
|
||||
bt_assert((val_compare(&looking_up_value, &(found_tree->from)) == 0) && (val_compare(&looking_up_value, &(found_tree->to)) == 0));
|
||||
}
|
||||
}
|
||||
|
||||
@ -278,11 +279,11 @@ t_find_ranges(void)
|
||||
|
||||
for(*i = 0; *i <= max_value; *i += (uint)bt_random()/nodes_count)
|
||||
{
|
||||
struct f_tree *found_tree = find_tree(tree, needle);
|
||||
const struct f_tree *found_tree = find_tree(tree, &needle);
|
||||
bt_debug("searching: %u \n", *i);
|
||||
bt_assert(
|
||||
(val_compare(needle, found_tree->from) == 0) || (val_compare(needle, found_tree->to) == 0) ||
|
||||
((val_compare(needle, found_tree->from) == 1) && (val_compare(needle, found_tree->to) == -1))
|
||||
(val_compare(&needle, &(found_tree->from)) == 0) || (val_compare(&needle, &(found_tree->to)) == 0) ||
|
||||
((val_compare(&needle, &(found_tree->from)) == 1) && (val_compare(&needle, &(found_tree->to)) == -1))
|
||||
);
|
||||
}
|
||||
}
|
||||
|
@ -73,6 +73,7 @@
|
||||
#include "lib/string.h"
|
||||
#include "conf/conf.h"
|
||||
#include "filter/filter.h"
|
||||
#include "filter/data.h"
|
||||
|
||||
|
||||
/*
|
||||
@ -220,7 +221,7 @@ trie_add_prefix(struct f_trie *t, const net_addr *net, uint l, uint h)
|
||||
}
|
||||
|
||||
static int
|
||||
trie_match_prefix(struct f_trie *t, ip_addr px, uint plen)
|
||||
trie_match_prefix(const struct f_trie *t, ip_addr px, uint plen)
|
||||
{
|
||||
ip_addr pmask = ipa_mkmask(plen);
|
||||
ip_addr paddr = ipa_and(px, pmask);
|
||||
@ -229,7 +230,7 @@ trie_match_prefix(struct f_trie *t, ip_addr px, uint plen)
|
||||
return t->zero;
|
||||
|
||||
int plentest = plen - 1;
|
||||
struct f_trie_node *n = t->root;
|
||||
const struct f_trie_node *n = t->root;
|
||||
|
||||
while(n)
|
||||
{
|
||||
@ -264,7 +265,7 @@ trie_match_prefix(struct f_trie *t, ip_addr px, uint plen)
|
||||
* is such prefix pattern in the trie.
|
||||
*/
|
||||
int
|
||||
trie_match_net(struct f_trie *t, const net_addr *n)
|
||||
trie_match_net(const struct f_trie *t, const net_addr *n)
|
||||
{
|
||||
uint add = 0;
|
||||
|
||||
@ -279,7 +280,7 @@ trie_match_net(struct f_trie *t, const net_addr *n)
|
||||
}
|
||||
|
||||
static int
|
||||
trie_node_same(struct f_trie_node *t1, struct f_trie_node *t2)
|
||||
trie_node_same(const struct f_trie_node *t1, const struct f_trie_node *t2)
|
||||
{
|
||||
if ((t1 == NULL) && (t2 == NULL))
|
||||
return 1;
|
||||
@ -303,13 +304,13 @@ trie_node_same(struct f_trie_node *t1, struct f_trie_node *t2)
|
||||
* Compares two tries and returns 1 if they are same
|
||||
*/
|
||||
int
|
||||
trie_same(struct f_trie *t1, struct f_trie *t2)
|
||||
trie_same(const struct f_trie *t1, const struct f_trie *t2)
|
||||
{
|
||||
return (t1->zero == t2->zero) && trie_node_same(t1->root, t2->root);
|
||||
}
|
||||
|
||||
static void
|
||||
trie_node_format(struct f_trie_node *t, buffer *buf)
|
||||
trie_node_format(const struct f_trie_node *t, buffer *buf)
|
||||
{
|
||||
if (t == NULL)
|
||||
return;
|
||||
@ -329,7 +330,7 @@ trie_node_format(struct f_trie_node *t, buffer *buf)
|
||||
* Prints the trie to the supplied buffer.
|
||||
*/
|
||||
void
|
||||
trie_format(struct f_trie *t, buffer *buf)
|
||||
trie_format(const struct f_trie *t, buffer *buf)
|
||||
{
|
||||
buffer_puts(buf, "[");
|
||||
|
||||
|
@ -10,6 +10,7 @@
|
||||
#include "test/bt-utils.h"
|
||||
|
||||
#include "filter/filter.h"
|
||||
#include "filter/data.h"
|
||||
#include "conf/conf.h"
|
||||
|
||||
#define TESTS_NUM 10
|
||||
|
@ -1,4 +1,4 @@
|
||||
src := bitops.c checksum.c event.c flowspec.c idm.c ip.c lists.c mac.c md5.c mempool.c net.c patmatch.c printf.c resource.c sha1.c sha256.c sha512.c slab.c slists.c tbf.c timer.c xmalloc.c
|
||||
src := bitops.c checksum.c event.c flowspec.c idm.c ip.c lists.c mac.c md5.c mempool.c net.c patmatch.c printf.c resource.c sha1.c sha256.c sha512.c slab.c slists.c strtoul.c tbf.c timer.c xmalloc.c
|
||||
obj := $(src-o-files)
|
||||
$(all-daemon)
|
||||
|
||||
|
@ -38,7 +38,7 @@ struct align_probe { char x; long int y; };
|
||||
#define ARRAY_SIZE(a) (sizeof(a)/sizeof(*(a)))
|
||||
#define BYTES(n) ((((uint) (n)) + 7) / 8)
|
||||
#define CALL(fn, args...) ({ if (fn) fn(args); })
|
||||
#define ADVANCE(w, r, l) ({ r -= l; w += l; })
|
||||
#define ADVANCE(w, r, l) ({ r -= (l); w += (l); })
|
||||
|
||||
static inline int uint_cmp(uint i1, uint i2)
|
||||
{ return (int)(i1 > i2) - (int)(i1 < i2); }
|
||||
@ -73,6 +73,10 @@ static inline int u64_cmp(u64 i1, u64 i2)
|
||||
#define UNUSED __attribute__((unused))
|
||||
#define PACKED __attribute__((packed))
|
||||
|
||||
#ifndef HAVE_THREAD_LOCAL
|
||||
#define _Thread_local
|
||||
#endif
|
||||
|
||||
/* Microsecond time */
|
||||
|
||||
typedef s64 btime;
|
||||
@ -164,6 +168,15 @@ void debug(const char *msg, ...); /* Printf to debug output */
|
||||
#define ASSERT(x) do { if (!(x)) log(L_BUG "Assertion '%s' failed at %s:%d", #x, __FILE__, __LINE__); } while(0)
|
||||
#endif
|
||||
|
||||
#ifdef DEBUGGING
|
||||
asm(
|
||||
".pushsection \".debug_gdb_scripts\", \"MS\",@progbits,1\n"
|
||||
".byte 1\n" /* Python */
|
||||
".asciz \"bird-gdb.py\"\n"
|
||||
".popsection\n"
|
||||
);
|
||||
#endif
|
||||
|
||||
/* Pseudorandom numbers */
|
||||
|
||||
u32 random_u32(void);
|
||||
|
@ -29,4 +29,6 @@ static inline u32 u32_hash(u32 v) { return v * 2902958171u; }
|
||||
|
||||
static inline u8 u32_popcount(u32 v) { return __builtin_popcount(v); }
|
||||
|
||||
static inline int uint_is_pow2(uint n) { return n && !(n & (n-1)); }
|
||||
|
||||
#endif
|
||||
|
2
lib/ip.c
2
lib/ip.c
@ -245,7 +245,7 @@ ip4_pton(const char *a, ip4_addr *o)
|
||||
char *d, *c = strchr(a, '.');
|
||||
if (!c != !i)
|
||||
return 0;
|
||||
l = strtoul(a, &d, 10);
|
||||
l = bstrtoul10(a, &d);
|
||||
if (((d != c) && *d) || (l > 255))
|
||||
return 0;
|
||||
ia = (ia << 8) | l;
|
||||
|
4
lib/ip.h
4
lib/ip.h
@ -354,12 +354,12 @@ mpls_put(char *buf, int len, u32 *stack)
|
||||
* Unaligned data access (in network order)
|
||||
*/
|
||||
|
||||
static inline ip4_addr get_ip4(void *buf)
|
||||
static inline ip4_addr get_ip4(const void *buf)
|
||||
{
|
||||
return _MI4(get_u32(buf));
|
||||
}
|
||||
|
||||
static inline ip6_addr get_ip6(void *buf)
|
||||
static inline ip6_addr get_ip6(const void *buf)
|
||||
{
|
||||
ip6_addr a;
|
||||
memcpy(&a, buf, 16);
|
||||
|
81
lib/printf.c
81
lib/printf.c
@ -34,13 +34,7 @@ static int skip_atoi(const char **s)
|
||||
#define SPECIAL 32 /* 0x */
|
||||
#define LARGE 64 /* use 'ABCDEF' instead of 'abcdef' */
|
||||
|
||||
#define do_div(n,base) ({ \
|
||||
int __res; \
|
||||
__res = ((unsigned long) n) % (unsigned) base; \
|
||||
n = ((unsigned long) n) / (unsigned) base; \
|
||||
__res; })
|
||||
|
||||
static char * number(char * str, long num, int base, int size, int precision,
|
||||
static char * number(char * str, u64 num, uint base, int size, int precision,
|
||||
int type, int remains)
|
||||
{
|
||||
char c,sign,tmp[66];
|
||||
@ -58,7 +52,7 @@ static char * number(char * str, long num, int base, int size, int precision,
|
||||
c = (type & ZEROPAD) ? '0' : ' ';
|
||||
sign = 0;
|
||||
if (type & SIGN) {
|
||||
if (num < 0) {
|
||||
if (num > (u64) INT64_MAX) {
|
||||
sign = '-';
|
||||
num = -num;
|
||||
size--;
|
||||
@ -79,8 +73,11 @@ static char * number(char * str, long num, int base, int size, int precision,
|
||||
i = 0;
|
||||
if (num == 0)
|
||||
tmp[i++]='0';
|
||||
else while (num != 0)
|
||||
tmp[i++] = digits[do_div(num,base)];
|
||||
else while (num != 0) {
|
||||
uint res = num % base;
|
||||
num = num / base;
|
||||
tmp[i++] = digits[res];
|
||||
}
|
||||
if (i > precision)
|
||||
precision = i;
|
||||
size -= precision;
|
||||
@ -128,16 +125,17 @@ static char * number(char * str, long num, int base, int size, int precision,
|
||||
* value printed as eight :-separated octets), |%t| for time values (btime) with
|
||||
* specified subsecond precision, and |%m| resp. |%M| for error messages (uses
|
||||
* strerror() to translate @errno code to message text). On the other hand, it
|
||||
* doesn't support floating point numbers.
|
||||
* doesn't support floating point numbers. The bvsnprintf() supports |%h| and
|
||||
* |%l| qualifiers, but |%l| is used for s64/u64 instead of long/ulong.
|
||||
*
|
||||
* Result: number of characters of the output string or -1 if
|
||||
* the buffer space was insufficient.
|
||||
*/
|
||||
int bvsnprintf(char *buf, int size, const char *fmt, va_list args)
|
||||
{
|
||||
int len;
|
||||
unsigned long num;
|
||||
int i, base;
|
||||
int len, i;
|
||||
u64 num;
|
||||
uint base;
|
||||
u32 x;
|
||||
u64 X;
|
||||
btime t;
|
||||
@ -152,7 +150,7 @@ int bvsnprintf(char *buf, int size, const char *fmt, va_list args)
|
||||
int field_width; /* width of output field */
|
||||
int precision; /* min. # of digits for integers; max
|
||||
number of chars for from string */
|
||||
int qualifier; /* 'h', 'l', or 'L' for integer fields */
|
||||
int qualifier; /* 'h' or 'l' for integer fields */
|
||||
|
||||
for (start=str=buf ; *fmt ; ++fmt, size-=(str-start), start=str) {
|
||||
if (*fmt != '%') {
|
||||
@ -286,16 +284,15 @@ int bvsnprintf(char *buf, int size, const char *fmt, va_list args)
|
||||
field_width = 2*sizeof(void *);
|
||||
flags |= ZEROPAD;
|
||||
}
|
||||
str = number(str,
|
||||
(unsigned long) va_arg(args, void *), 16,
|
||||
field_width, precision, flags, size);
|
||||
str = number(str, (uintptr_t) va_arg(args, void *), 16,
|
||||
field_width, precision, flags, size);
|
||||
if (!str)
|
||||
return -1;
|
||||
continue;
|
||||
|
||||
case 'n':
|
||||
if (qualifier == 'l') {
|
||||
long * ip = va_arg(args, long *);
|
||||
s64 * ip = va_arg(args, s64 *);
|
||||
*ip = (str - buf);
|
||||
} else {
|
||||
int * ip = va_arg(args, int *);
|
||||
@ -356,14 +353,14 @@ int bvsnprintf(char *buf, int size, const char *fmt, va_list args)
|
||||
if (qualifier == 'l') {
|
||||
X = va_arg(args, u64);
|
||||
bsprintf(ipbuf, "%02x:%02x:%02x:%02x:%02x:%02x:%02x:%02x",
|
||||
((X >> 56) & 0xff),
|
||||
((X >> 48) & 0xff),
|
||||
((X >> 40) & 0xff),
|
||||
((X >> 32) & 0xff),
|
||||
((X >> 24) & 0xff),
|
||||
((X >> 16) & 0xff),
|
||||
((X >> 8) & 0xff),
|
||||
(X & 0xff));
|
||||
(uint) ((X >> 56) & 0xff),
|
||||
(uint) ((X >> 48) & 0xff),
|
||||
(uint) ((X >> 40) & 0xff),
|
||||
(uint) ((X >> 32) & 0xff),
|
||||
(uint) ((X >> 24) & 0xff),
|
||||
(uint) ((X >> 16) & 0xff),
|
||||
(uint) ((X >> 8) & 0xff),
|
||||
(uint) (X & 0xff));
|
||||
}
|
||||
else
|
||||
{
|
||||
@ -393,7 +390,7 @@ int bvsnprintf(char *buf, int size, const char *fmt, va_list args)
|
||||
|
||||
/* Print seconds */
|
||||
flags |= SIGN;
|
||||
str = number(str, t1, 10, field_width, 0, flags, size);
|
||||
str = number(str, (u64) t1, 10, field_width, 0, flags, size);
|
||||
if (!str)
|
||||
return -1;
|
||||
|
||||
@ -411,7 +408,7 @@ int bvsnprintf(char *buf, int size, const char *fmt, va_list args)
|
||||
|
||||
/* Print sub-seconds */
|
||||
*str++ = '.';
|
||||
str = number(str, t2, 10, precision, 0, ZEROPAD, size - 1);
|
||||
str = number(str, (u64) t2, 10, precision, 0, ZEROPAD, size - 1);
|
||||
if (!str)
|
||||
return -1;
|
||||
}
|
||||
@ -446,16 +443,22 @@ int bvsnprintf(char *buf, int size, const char *fmt, va_list args)
|
||||
--fmt;
|
||||
continue;
|
||||
}
|
||||
if (qualifier == 'l')
|
||||
num = va_arg(args, unsigned long);
|
||||
else if (qualifier == 'h') {
|
||||
num = (unsigned short) va_arg(args, int);
|
||||
if (flags & SIGN)
|
||||
num = (short) num;
|
||||
} else if (flags & SIGN)
|
||||
num = va_arg(args, int);
|
||||
else
|
||||
num = va_arg(args, uint);
|
||||
if (flags & SIGN) {
|
||||
/* Conversions valid per ISO C99 6.3.1.3 (2) */
|
||||
if (qualifier == 'l')
|
||||
num = (u64) va_arg(args, s64);
|
||||
else if (qualifier == 'h')
|
||||
num = (u64) (short) va_arg(args, int);
|
||||
else
|
||||
num = (u64) va_arg(args, int);
|
||||
} else {
|
||||
if (qualifier == 'l')
|
||||
num = va_arg(args, u64);
|
||||
else if (qualifier == 'h')
|
||||
num = (unsigned short) va_arg(args, int);
|
||||
else
|
||||
num = va_arg(args, uint);
|
||||
}
|
||||
str = number(str, num, base, field_width, precision, flags, size);
|
||||
if (!str)
|
||||
return -1;
|
||||
|
@ -45,7 +45,7 @@ t_simple(void)
|
||||
else
|
||||
BSPRINTF(16, "00000fee1a15600d", buf, "%p", (void *) 0xfee1a15600d);
|
||||
|
||||
long ln = 0;
|
||||
s64 ln = 0;
|
||||
BSPRINTF(10, "TeStStRiNg", buf, "TeStS%lntRiNg", &ln);
|
||||
bt_assert_msg(ln == 5, "fmt=\"TeStS%%lntRiNg\", &ln makes ln=%ld, want 5", ln);
|
||||
|
||||
@ -54,7 +54,40 @@ t_simple(void)
|
||||
BSPRINTF(2, "+1", buf, "%+d", 1);
|
||||
BSPRINTF(2, " 1", buf, "% d", 1);
|
||||
BSPRINTF(2, "-1", buf, "%d", -1);
|
||||
BSPRINTF(11, "-2147483648", buf, "%d", -2147483648);
|
||||
BSPRINTF(11, "-2147483648", buf, "%d", INT32_MIN);
|
||||
BSPRINTF(10, "2147483647", buf, "%d", INT32_MAX);
|
||||
|
||||
BSPRINTF(1, "0", buf, "%u", 0x0);
|
||||
BSPRINTF(10, "4294967295", buf, "%u", 0xFFFFFFFF);
|
||||
|
||||
BSPRINTF(4, "-100", buf, "%ld", (s64) -100);
|
||||
BSPRINTF(3, "100", buf, "%ld", (s64) 100);
|
||||
BSPRINTF(20, "-9223372036854775808", buf, "%ld", INT64_MIN);
|
||||
BSPRINTF(19, "9223372036854775807", buf, "%ld", INT64_MAX);
|
||||
|
||||
BSPRINTF(3, "0 8", buf, "%lu %lu", U64(0), U64(8));
|
||||
BSPRINTF(20, "18446744073709551615", buf, "%lu", UINT64_MAX);
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
static int
|
||||
t_router_id(void)
|
||||
{
|
||||
char buf[256];
|
||||
|
||||
BSPRINTF(7, "1.2.3.4", buf, "%R", (u32) 0x01020304);
|
||||
BSPRINTF(15, "240.224.208.192", buf, "%R", (u32) 0xF0E0D0C0);
|
||||
BSPRINTF(23, "01:02:03:04:05:06:07:08", buf, "%lR", (u64) 0x0102030405060708);
|
||||
BSPRINTF(23, "f0:e0:d0:c0:b0:a0:90:80", buf, "%lR", (u64) 0xF0E0D0C0B0A09080);
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
static int
|
||||
t_time(void)
|
||||
{
|
||||
char buf[256];
|
||||
|
||||
BSPRINTF(7, "123.456", buf, "%t", (btime) 123456789);
|
||||
BSPRINTF(7, "123.456", buf, "%2t", (btime) 123456789);
|
||||
@ -68,12 +101,28 @@ t_simple(void)
|
||||
return 1;
|
||||
}
|
||||
|
||||
static int
|
||||
t_bstrcmp(void)
|
||||
{
|
||||
bt_assert(bstrcmp("aa", "aa") == 0);
|
||||
bt_assert(bstrcmp("aa", "bb") == -1);
|
||||
bt_assert(bstrcmp("bb", "aa") == 1);
|
||||
bt_assert(bstrcmp(NULL, NULL) == 0);
|
||||
bt_assert(bstrcmp(NULL, "bb") == -1);
|
||||
bt_assert(bstrcmp("bb", NULL) == 1);
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
int
|
||||
main(int argc, char *argv[])
|
||||
{
|
||||
bt_init(argc, argv);
|
||||
|
||||
bt_test_suite(t_simple, "printf without varargs");
|
||||
bt_test_suite(t_router_id, "print router id");
|
||||
bt_test_suite(t_time, "print time");
|
||||
bt_test_suite(t_bstrcmp, "bstrcmp");
|
||||
|
||||
return bt_exit_value();
|
||||
}
|
||||
|
@ -101,9 +101,13 @@ void buffer_realloc(void **buf, unsigned *size, unsigned need, unsigned item_siz
|
||||
*/
|
||||
#define DMALLOC_DISABLE
|
||||
#include <dmalloc.h>
|
||||
#define xmalloc(size) _xmalloc_leap(__FILE__, __LINE__, size)
|
||||
#define xrealloc(size) _xrealloc_leap(__FILE__, __LINE__, size)
|
||||
#define xfree(ptr) _xfree_leap(__FILE__, __LINE__, ptr)
|
||||
#define xmalloc(size) \
|
||||
dmalloc_malloc(__FILE__, __LINE__, (size), DMALLOC_FUNC_MALLOC, 0, 1)
|
||||
#define xrealloc(ptr, size) \
|
||||
dmalloc_realloc(__FILE__, __LINE__, (ptr), (size), DMALLOC_FUNC_REALLOC, 1)
|
||||
#define xfree(ptr) \
|
||||
dmalloc_free(__FILE__, __LINE__, (ptr), DMALLOC_FUNC_FREE)
|
||||
|
||||
#else
|
||||
/*
|
||||
* Unfortunately, several libraries we might want to link to define
|
||||
|
@ -97,7 +97,7 @@ void sk_dump_all(void);
|
||||
int sk_is_ipv4(sock *s); /* True if socket is IPv4 */
|
||||
int sk_is_ipv6(sock *s); /* True if socket is IPv6 */
|
||||
|
||||
static inline int sk_send_buffer_empty(sock *sk)
|
||||
static inline int sk_tx_buffer_empty(sock *sk)
|
||||
{ return sk->tbuf == sk->tpos; }
|
||||
|
||||
int sk_setup_multicast(sock *s); /* Prepare UDP or IP socket for multicasting */
|
||||
|
12
lib/string.h
12
lib/string.h
@ -24,6 +24,9 @@ int buffer_vprint(buffer *buf, const char *fmt, va_list args);
|
||||
int buffer_print(buffer *buf, const char *fmt, ...);
|
||||
void buffer_puts(buffer *buf, const char *str);
|
||||
|
||||
u64 bstrtoul10(const char *str, char **end);
|
||||
u64 bstrtoul16(const char *str, char **end);
|
||||
|
||||
int patmatch(const byte *pat, const byte *str);
|
||||
|
||||
static inline char *xbasename(const char *str)
|
||||
@ -60,6 +63,15 @@ memset32(void *D, u32 val, uint n)
|
||||
dst[i] = val;
|
||||
}
|
||||
|
||||
static inline int
|
||||
bstrcmp(const char *s1, const char *s2)
|
||||
{
|
||||
if (s1 && s2)
|
||||
return strcmp(s1, s2);
|
||||
else
|
||||
return !s2 - !s1;
|
||||
}
|
||||
|
||||
#define ROUTER_ID_64_LENGTH 23
|
||||
|
||||
#endif
|
||||
|
61
lib/strtoul.c
Normal file
61
lib/strtoul.c
Normal file
@ -0,0 +1,61 @@
|
||||
/*
|
||||
* BIRD Library -- Parse numbers
|
||||
*
|
||||
* (c) 2019 Maria Matejka <mq@jmq.cz>
|
||||
*
|
||||
* Can be freely distributed and used under the terms of the GNU GPL.
|
||||
*/
|
||||
|
||||
#include "nest/bird.h"
|
||||
#include "lib/string.h"
|
||||
|
||||
#include <errno.h>
|
||||
|
||||
#define ULI_MAX_DIV10 (UINT64_MAX / 10)
|
||||
#define ULI_MAX_MOD10 (UINT64_MAX % 10)
|
||||
|
||||
u64
|
||||
bstrtoul10(const char *str, char **end)
|
||||
{
|
||||
u64 out = 0;
|
||||
for (*end = (char *) str; (**end >= '0') && (**end <= '9'); (*end)++) {
|
||||
u64 digit = **end - '0';
|
||||
if ((out > ULI_MAX_DIV10) ||
|
||||
(out == ULI_MAX_DIV10) && (digit > ULI_MAX_MOD10)) {
|
||||
errno = ERANGE;
|
||||
return UINT64_MAX;
|
||||
}
|
||||
|
||||
out *= 10;
|
||||
out += (**end) - '0';
|
||||
}
|
||||
return out;
|
||||
}
|
||||
|
||||
u64
|
||||
bstrtoul16(const char *str, char **end)
|
||||
{
|
||||
u64 out = 0;
|
||||
for (int i=0; i<=(64/4); i++) {
|
||||
switch (str[i]) {
|
||||
case '0' ... '9':
|
||||
out *= 16;
|
||||
out += str[i] - '0';
|
||||
break;
|
||||
case 'a' ... 'f':
|
||||
out *= 16;
|
||||
out += str[i] + 10 - 'a';
|
||||
break;
|
||||
case 'A' ... 'F':
|
||||
out *= 16;
|
||||
out += str[i] + 10 - 'A';
|
||||
break;
|
||||
default:
|
||||
*end = (char *) &(str[i]);
|
||||
return out;
|
||||
}
|
||||
}
|
||||
|
||||
errno = ERANGE;
|
||||
return UINT64_MAX;
|
||||
}
|
@ -1,6 +1,6 @@
|
||||
Summary: BIRD Internet Routing Daemon
|
||||
Name: bird
|
||||
Version: 2.0.4
|
||||
Version: 2.0.7
|
||||
Release: 1
|
||||
Copyright: GPL
|
||||
Group: Networking/Daemons
|
||||
|
100
nest/a-path.c
100
nest/a-path.c
@ -13,7 +13,7 @@
|
||||
#include "lib/resource.h"
|
||||
#include "lib/unaligned.h"
|
||||
#include "lib/string.h"
|
||||
#include "filter/filter.h"
|
||||
#include "filter/data.h"
|
||||
|
||||
// static inline void put_as(byte *data, u32 as) { put_u32(data, as); }
|
||||
// static inline u32 get_as(byte *data) { return get_u32(data); }
|
||||
@ -77,10 +77,10 @@ bad:
|
||||
}
|
||||
|
||||
int
|
||||
as_path_16to32(byte *dst, byte *src, uint len)
|
||||
as_path_16to32(byte *dst, const byte *src, uint len)
|
||||
{
|
||||
byte *dst0 = dst;
|
||||
byte *end = src + len;
|
||||
const byte *end = src + len;
|
||||
uint i, n;
|
||||
|
||||
while (src < end)
|
||||
@ -101,10 +101,10 @@ as_path_16to32(byte *dst, byte *src, uint len)
|
||||
}
|
||||
|
||||
int
|
||||
as_path_32to16(byte *dst, byte *src, uint len)
|
||||
as_path_32to16(byte *dst, const byte *src, uint len)
|
||||
{
|
||||
byte *dst0 = dst;
|
||||
byte *end = src + len;
|
||||
const byte *end = src + len;
|
||||
uint i, n;
|
||||
|
||||
while (src < end)
|
||||
@ -271,13 +271,12 @@ as_path_to_old(struct linpool *pool, const struct adata *path)
|
||||
/*
|
||||
* Cut the path to the length @num, measured to the usual path metric. Note that
|
||||
* AS_CONFED_* segments have zero length and must be added if they are on edge.
|
||||
* In contrast to other as_path_* functions, @path is modified in place.
|
||||
*/
|
||||
void
|
||||
as_path_cut(struct adata *path, uint num)
|
||||
struct adata *
|
||||
as_path_cut(struct linpool *pool, const struct adata *path, uint num)
|
||||
{
|
||||
byte *pos = path->data;
|
||||
byte *end = pos + path->length;
|
||||
const byte *pos = path->data;
|
||||
const byte *end = pos + path->length;
|
||||
|
||||
while (pos < end)
|
||||
{
|
||||
@ -297,28 +296,39 @@ as_path_cut(struct adata *path, uint num)
|
||||
/* Cannot add whole segment, so try partial one and finish */
|
||||
if (num < n)
|
||||
{
|
||||
const byte *nend = pos;
|
||||
if (num)
|
||||
nend += 2 + BS * num;
|
||||
|
||||
struct adata *res = lp_alloc_adata(pool, path->length);
|
||||
res->length = nend - (const byte *) path->data;
|
||||
memcpy(res->data, path->data, res->length);
|
||||
|
||||
if (num)
|
||||
{
|
||||
pos[1] = num;
|
||||
pos += 2 + BS * num;
|
||||
byte *dpos = ((byte *) res->data) + (pos - (const byte *) path->data);
|
||||
dpos[1] = num;
|
||||
}
|
||||
|
||||
break;
|
||||
return res;
|
||||
}
|
||||
|
||||
num -= n;
|
||||
pos += 2 + BS * l;
|
||||
}
|
||||
|
||||
path->length = pos - path->data;
|
||||
struct adata *res = lp_alloc_adata(pool, path->length);
|
||||
res->length = path->length;
|
||||
memcpy(res->data, path->data, res->length);
|
||||
return res;
|
||||
}
|
||||
|
||||
/*
|
||||
* Merge (concatenate) paths @p1 and @p2 and return the result.
|
||||
* In contrast to other as_path_* functions, @p1 and @p2 may be reused.
|
||||
*/
|
||||
struct adata *
|
||||
as_path_merge(struct linpool *pool, struct adata *p1, struct adata *p2)
|
||||
const struct adata *
|
||||
as_path_merge(struct linpool *pool, const struct adata *p1, const struct adata *p2)
|
||||
{
|
||||
if (p1->length == 0)
|
||||
return p2;
|
||||
@ -561,7 +571,7 @@ as_path_contains(const struct adata *path, u32 as, int min)
|
||||
}
|
||||
|
||||
int
|
||||
as_path_match_set(const struct adata *path, struct f_tree *set)
|
||||
as_path_match_set(const struct adata *path, const struct f_tree *set)
|
||||
{
|
||||
const u8 *p = path->data;
|
||||
const u8 *q = p+path->length;
|
||||
@ -574,7 +584,7 @@ as_path_match_set(const struct adata *path, struct f_tree *set)
|
||||
for (i=0; i<n; i++)
|
||||
{
|
||||
struct f_val v = {T_INT, .val.i = get_as(p)};
|
||||
if (find_tree(set, v))
|
||||
if (find_tree(set, &v))
|
||||
return 1;
|
||||
p += BS;
|
||||
}
|
||||
@ -583,8 +593,8 @@ as_path_match_set(const struct adata *path, struct f_tree *set)
|
||||
return 0;
|
||||
}
|
||||
|
||||
struct adata *
|
||||
as_path_filter(struct linpool *pool, struct adata *path, struct f_tree *set, u32 key, int pos)
|
||||
const struct adata *
|
||||
as_path_filter(struct linpool *pool, const struct adata *path, const struct f_tree *set, u32 key, int pos)
|
||||
{
|
||||
if (!path)
|
||||
return NULL;
|
||||
@ -612,7 +622,10 @@ as_path_filter(struct linpool *pool, struct adata *path, struct f_tree *set, u32
|
||||
int match;
|
||||
|
||||
if (set)
|
||||
match = !!find_tree(set, (struct f_val){T_INT, .val.i = as});
|
||||
{
|
||||
struct f_val v = {T_INT, .val.i = as};
|
||||
match = !!find_tree(set, &v);
|
||||
}
|
||||
else
|
||||
match = (as == key);
|
||||
|
||||
@ -727,6 +740,31 @@ pm_match(struct pm_pos *pos, u32 asn, u32 asn2)
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int
|
||||
pm_match_set(struct pm_pos *pos, const struct f_tree *set)
|
||||
{
|
||||
struct f_val asn = { .type = T_INT };
|
||||
|
||||
if (! pos->set)
|
||||
{
|
||||
asn.val.i = pos->val.asn;
|
||||
return !!find_tree(set, &asn);
|
||||
}
|
||||
|
||||
const u8 *p = pos->val.sp;
|
||||
int len = *p++;
|
||||
int i;
|
||||
|
||||
for (i = 0; i < len; i++)
|
||||
{
|
||||
asn.val.i = get_as(p + i * BS);
|
||||
if (find_tree(set, &asn))
|
||||
return 1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static void
|
||||
pm_mark(struct pm_pos *pos, int i, int plen, int *nl, int *nh)
|
||||
{
|
||||
@ -771,7 +809,7 @@ pm_mark(struct pm_pos *pos, int i, int plen, int *nl, int *nh)
|
||||
* is marked.
|
||||
*/
|
||||
int
|
||||
as_path_match(const struct adata *path, struct f_path_mask *mask)
|
||||
as_path_match(const struct adata *path, const struct f_path_mask *mask)
|
||||
{
|
||||
struct pm_pos pos[2048 + 1];
|
||||
int plen = parse_path(path, pos);
|
||||
@ -788,12 +826,12 @@ as_path_match(const struct adata *path, struct f_path_mask *mask)
|
||||
l = h = 0;
|
||||
pos[0].mark = 1;
|
||||
|
||||
while (mask)
|
||||
for (uint m=0; m < mask->len; m++)
|
||||
{
|
||||
/* We remove this mark to not step after pos[plen] */
|
||||
pos[plen].mark = 0;
|
||||
|
||||
switch (mask->kind)
|
||||
switch (mask->item[m].kind)
|
||||
{
|
||||
case PM_ASTERISK:
|
||||
for (i = l; i <= plen; i++)
|
||||
@ -802,22 +840,26 @@ as_path_match(const struct adata *path, struct f_path_mask *mask)
|
||||
break;
|
||||
|
||||
case PM_ASN: /* Define single ASN as ASN..ASN - very narrow interval */
|
||||
val2 = val = mask->val;
|
||||
val2 = val = mask->item[m].asn;
|
||||
goto step;
|
||||
case PM_ASN_EXPR:
|
||||
bug("Expressions should be evaluated on AS path mask construction.");
|
||||
case PM_ASN_RANGE:
|
||||
val = mask->val;
|
||||
val2 = mask->val2;
|
||||
val = mask->item[m].from;
|
||||
val2 = mask->item[m].to;
|
||||
goto step;
|
||||
case PM_QUESTION:
|
||||
case PM_ASN_SET:
|
||||
step:
|
||||
nh = nl = -1;
|
||||
for (i = h; i >= l; i--)
|
||||
if (pos[i].mark)
|
||||
{
|
||||
pos[i].mark = 0;
|
||||
if ((mask->kind == PM_QUESTION) || pm_match(pos + i, val, val2))
|
||||
if ((mask->item[m].kind == PM_QUESTION) ||
|
||||
((mask->item[m].kind != PM_ASN_SET) ?
|
||||
pm_match(pos + i, val, val2) :
|
||||
pm_match_set(pos + i, mask->item[m].set)))
|
||||
pm_mark(pos, i, plen, &nl, &nh);
|
||||
}
|
||||
|
||||
@ -828,8 +870,6 @@ as_path_match(const struct adata *path, struct f_path_mask *mask)
|
||||
l = nl;
|
||||
break;
|
||||
}
|
||||
|
||||
mask = mask->next;
|
||||
}
|
||||
|
||||
return pos[plen].mark;
|
||||
|
@ -34,26 +34,24 @@ t_as_path_match(void)
|
||||
first_prepended = last_prepended = 0;
|
||||
struct linpool *lp = lp_new_default(&root_pool);
|
||||
|
||||
struct f_path_mask mask[AS_PATH_LENGTH] = {};
|
||||
int i;
|
||||
for (i = 0; i < AS_PATH_LENGTH; i++)
|
||||
struct f_path_mask *mask = alloca(sizeof(struct f_path_mask) + AS_PATH_LENGTH * sizeof(struct f_path_mask_item));
|
||||
mask->len = AS_PATH_LENGTH;
|
||||
for (int i = AS_PATH_LENGTH - 1; i >= 0; i--)
|
||||
{
|
||||
u32 val = bt_random();
|
||||
as_path = as_path_prepend(lp, as_path, val);
|
||||
bt_debug("Prepending ASN: %10u \n", val);
|
||||
|
||||
if (i == 0)
|
||||
first_prepended = val;
|
||||
if (i == AS_PATH_LENGTH-1)
|
||||
last_prepended = val;
|
||||
if (i == AS_PATH_LENGTH-1)
|
||||
first_prepended = val;
|
||||
|
||||
mask[i].kind = PM_ASN;
|
||||
mask[i].val = val;
|
||||
if (i)
|
||||
mask[i].next = &mask[i-1];
|
||||
mask->item[i].kind = PM_ASN;
|
||||
mask->item[i].asn = val;
|
||||
}
|
||||
|
||||
bt_assert_msg(as_path_match(as_path, &mask[AS_PATH_LENGTH-1]), "Mask should match with AS path");
|
||||
bt_assert_msg(as_path_match(as_path, mask), "Mask should match with AS path");
|
||||
|
||||
u32 asn;
|
||||
|
||||
|
76
nest/a-set.c
76
nest/a-set.c
@ -34,7 +34,7 @@
|
||||
* the buffer to indicate truncation.
|
||||
*/
|
||||
int
|
||||
int_set_format(struct adata *set, int way, int from, byte *buf, uint size)
|
||||
int_set_format(const struct adata *set, int way, int from, byte *buf, uint size)
|
||||
{
|
||||
u32 *z = (u32 *) set->data;
|
||||
byte *end = buf + size - 24;
|
||||
@ -69,18 +69,16 @@ int
|
||||
ec_format(byte *buf, u64 ec)
|
||||
{
|
||||
u32 type, key, val;
|
||||
char tbuf[16], *kind;
|
||||
char tbuf[16];
|
||||
const char *kind;
|
||||
|
||||
type = ec >> 48;
|
||||
switch (type & 0xf0ff)
|
||||
{
|
||||
case EC_RT: kind = "rt"; break;
|
||||
case EC_RO: kind = "ro"; break;
|
||||
kind = ec_subtype_str(type & 0xf0ff);
|
||||
|
||||
default:
|
||||
kind = tbuf;
|
||||
bsprintf(kind, "unknown 0x%x", type);
|
||||
}
|
||||
if (!kind) {
|
||||
bsprintf(tbuf, "unknown 0x%x", type);
|
||||
kind = tbuf;
|
||||
}
|
||||
|
||||
switch (ec >> 56)
|
||||
{
|
||||
@ -115,7 +113,7 @@ ec_format(byte *buf, u64 ec)
|
||||
}
|
||||
|
||||
int
|
||||
ec_set_format(struct adata *set, int from, byte *buf, uint size)
|
||||
ec_set_format(const struct adata *set, int from, byte *buf, uint size)
|
||||
{
|
||||
u32 *z = int_set_get_data(set);
|
||||
byte *end = buf + size - 64;
|
||||
@ -150,7 +148,7 @@ lc_format(byte *buf, lcomm lc)
|
||||
}
|
||||
|
||||
int
|
||||
lc_set_format(struct adata *set, int from, byte *buf, uint bufsize)
|
||||
lc_set_format(const struct adata *set, int from, byte *buf, uint bufsize)
|
||||
{
|
||||
u32 *d = (u32 *) set->data;
|
||||
byte *end = buf + bufsize - 64;
|
||||
@ -181,7 +179,7 @@ lc_set_format(struct adata *set, int from, byte *buf, uint bufsize)
|
||||
}
|
||||
|
||||
int
|
||||
int_set_contains(struct adata *list, u32 val)
|
||||
int_set_contains(const struct adata *list, u32 val)
|
||||
{
|
||||
if (!list)
|
||||
return 0;
|
||||
@ -198,7 +196,7 @@ int_set_contains(struct adata *list, u32 val)
|
||||
}
|
||||
|
||||
int
|
||||
ec_set_contains(struct adata *list, u64 val)
|
||||
ec_set_contains(const struct adata *list, u64 val)
|
||||
{
|
||||
if (!list)
|
||||
return 0;
|
||||
@ -217,7 +215,7 @@ ec_set_contains(struct adata *list, u64 val)
|
||||
}
|
||||
|
||||
int
|
||||
lc_set_contains(struct adata *list, lcomm val)
|
||||
lc_set_contains(const struct adata *list, lcomm val)
|
||||
{
|
||||
if (!list)
|
||||
return 0;
|
||||
@ -233,8 +231,8 @@ lc_set_contains(struct adata *list, lcomm val)
|
||||
return 0;
|
||||
}
|
||||
|
||||
struct adata *
|
||||
int_set_prepend(struct linpool *pool, struct adata *list, u32 val)
|
||||
const struct adata *
|
||||
int_set_prepend(struct linpool *pool, const struct adata *list, u32 val)
|
||||
{
|
||||
struct adata *res;
|
||||
int len;
|
||||
@ -254,8 +252,8 @@ int_set_prepend(struct linpool *pool, struct adata *list, u32 val)
|
||||
return res;
|
||||
}
|
||||
|
||||
struct adata *
|
||||
int_set_add(struct linpool *pool, struct adata *list, u32 val)
|
||||
const struct adata *
|
||||
int_set_add(struct linpool *pool, const struct adata *list, u32 val)
|
||||
{
|
||||
struct adata *res;
|
||||
int len;
|
||||
@ -275,8 +273,8 @@ int_set_add(struct linpool *pool, struct adata *list, u32 val)
|
||||
return res;
|
||||
}
|
||||
|
||||
struct adata *
|
||||
ec_set_add(struct linpool *pool, struct adata *list, u64 val)
|
||||
const struct adata *
|
||||
ec_set_add(struct linpool *pool, const struct adata *list, u64 val)
|
||||
{
|
||||
if (ec_set_contains(list, val))
|
||||
return list;
|
||||
@ -295,8 +293,8 @@ ec_set_add(struct linpool *pool, struct adata *list, u64 val)
|
||||
return res;
|
||||
}
|
||||
|
||||
struct adata *
|
||||
lc_set_add(struct linpool *pool, struct adata *list, lcomm val)
|
||||
const struct adata *
|
||||
lc_set_add(struct linpool *pool, const struct adata *list, lcomm val)
|
||||
{
|
||||
if (lc_set_contains(list, val))
|
||||
return list;
|
||||
@ -313,8 +311,8 @@ lc_set_add(struct linpool *pool, struct adata *list, lcomm val)
|
||||
return res;
|
||||
}
|
||||
|
||||
struct adata *
|
||||
int_set_del(struct linpool *pool, struct adata *list, u32 val)
|
||||
const struct adata *
|
||||
int_set_del(struct linpool *pool, const struct adata *list, u32 val)
|
||||
{
|
||||
if (!int_set_contains(list, val))
|
||||
return list;
|
||||
@ -335,8 +333,8 @@ int_set_del(struct linpool *pool, struct adata *list, u32 val)
|
||||
return res;
|
||||
}
|
||||
|
||||
struct adata *
|
||||
ec_set_del(struct linpool *pool, struct adata *list, u64 val)
|
||||
const struct adata *
|
||||
ec_set_del(struct linpool *pool, const struct adata *list, u64 val)
|
||||
{
|
||||
if (!ec_set_contains(list, val))
|
||||
return list;
|
||||
@ -362,8 +360,8 @@ ec_set_del(struct linpool *pool, struct adata *list, u64 val)
|
||||
return res;
|
||||
}
|
||||
|
||||
struct adata *
|
||||
lc_set_del(struct linpool *pool, struct adata *list, lcomm val)
|
||||
const struct adata *
|
||||
lc_set_del(struct linpool *pool, const struct adata *list, lcomm val)
|
||||
{
|
||||
if (!lc_set_contains(list, val))
|
||||
return list;
|
||||
@ -384,8 +382,8 @@ lc_set_del(struct linpool *pool, struct adata *list, lcomm val)
|
||||
return res;
|
||||
}
|
||||
|
||||
struct adata *
|
||||
int_set_union(struct linpool *pool, struct adata *l1, struct adata *l2)
|
||||
const struct adata *
|
||||
int_set_union(struct linpool *pool, const struct adata *l1, const struct adata *l2)
|
||||
{
|
||||
if (!l1)
|
||||
return l2;
|
||||
@ -414,8 +412,8 @@ int_set_union(struct linpool *pool, struct adata *l1, struct adata *l2)
|
||||
return res;
|
||||
}
|
||||
|
||||
struct adata *
|
||||
ec_set_union(struct linpool *pool, struct adata *l1, struct adata *l2)
|
||||
const struct adata *
|
||||
ec_set_union(struct linpool *pool, const struct adata *l1, const struct adata *l2)
|
||||
{
|
||||
if (!l1)
|
||||
return l2;
|
||||
@ -447,8 +445,8 @@ ec_set_union(struct linpool *pool, struct adata *l1, struct adata *l2)
|
||||
return res;
|
||||
}
|
||||
|
||||
struct adata *
|
||||
lc_set_union(struct linpool *pool, struct adata *l1, struct adata *l2)
|
||||
const struct adata *
|
||||
lc_set_union(struct linpool *pool, const struct adata *l1, const struct adata *l2)
|
||||
{
|
||||
if (!l1)
|
||||
return l2;
|
||||
@ -479,7 +477,7 @@ lc_set_union(struct linpool *pool, struct adata *l1, struct adata *l2)
|
||||
|
||||
|
||||
struct adata *
|
||||
ec_set_del_nontrans(struct linpool *pool, struct adata *set)
|
||||
ec_set_del_nontrans(struct linpool *pool, const struct adata *set)
|
||||
{
|
||||
adata *res = lp_alloc_adata(pool, set->length);
|
||||
u32 *src = int_set_get_data(set);
|
||||
@ -510,7 +508,7 @@ int_set_cmp(const void *X, const void *Y)
|
||||
}
|
||||
|
||||
struct adata *
|
||||
int_set_sort(struct linpool *pool, struct adata *src)
|
||||
int_set_sort(struct linpool *pool, const struct adata *src)
|
||||
{
|
||||
struct adata *dst = lp_alloc_adata(pool, src->length);
|
||||
memcpy(dst->data, src->data, src->length);
|
||||
@ -528,7 +526,7 @@ ec_set_cmp(const void *X, const void *Y)
|
||||
}
|
||||
|
||||
struct adata *
|
||||
ec_set_sort(struct linpool *pool, struct adata *src)
|
||||
ec_set_sort(struct linpool *pool, const struct adata *src)
|
||||
{
|
||||
struct adata *dst = lp_alloc_adata(pool, src->length);
|
||||
memcpy(dst->data, src->data, src->length);
|
||||
@ -558,7 +556,7 @@ lc_set_cmp(const void *X, const void *Y)
|
||||
}
|
||||
|
||||
struct adata *
|
||||
lc_set_sort(struct linpool *pool, struct adata *src)
|
||||
lc_set_sort(struct linpool *pool, const struct adata *src)
|
||||
{
|
||||
struct adata *dst = lp_alloc_adata(pool, src->length);
|
||||
memcpy(dst->data, src->data, src->length);
|
||||
|
@ -15,10 +15,10 @@
|
||||
#include "lib/resource.h"
|
||||
|
||||
#define SET_SIZE 10
|
||||
static struct adata *set_sequence; /* <0; SET_SIZE) */
|
||||
static struct adata *set_sequence_same; /* <0; SET_SIZE) */
|
||||
static struct adata *set_sequence_higher; /* <SET_SIZE; 2*SET_SIZE) */
|
||||
static struct adata *set_random;
|
||||
static const struct adata *set_sequence; /* <0; SET_SIZE) */
|
||||
static const struct adata *set_sequence_same; /* <0; SET_SIZE) */
|
||||
static const struct adata *set_sequence_higher; /* <SET_SIZE; 2*SET_SIZE) */
|
||||
static const struct adata *set_random;
|
||||
|
||||
#define BUFFER_SIZE 1000
|
||||
static byte buf[BUFFER_SIZE] = {};
|
||||
@ -34,14 +34,14 @@ enum set_type
|
||||
};
|
||||
|
||||
static void
|
||||
generate_set_sequence(enum set_type type)
|
||||
generate_set_sequence(enum set_type type, int len)
|
||||
{
|
||||
struct adata empty_as_path = {};
|
||||
set_sequence = set_sequence_same = set_sequence_higher = set_random = &empty_as_path;
|
||||
lp = lp_new_default(&root_pool);
|
||||
|
||||
int i;
|
||||
for (i = 0; i < SET_SIZE; i++)
|
||||
for (i = 0; i < len; i++)
|
||||
{
|
||||
if (type == SET_TYPE_INT)
|
||||
{
|
||||
@ -72,7 +72,7 @@ t_set_int_contains(void)
|
||||
int i;
|
||||
|
||||
resource_init();
|
||||
generate_set_sequence(SET_TYPE_INT);
|
||||
generate_set_sequence(SET_TYPE_INT, SET_SIZE);
|
||||
|
||||
bt_assert(int_set_get_size(set_sequence) == SET_SIZE);
|
||||
|
||||
@ -93,9 +93,9 @@ static int
|
||||
t_set_int_union(void)
|
||||
{
|
||||
resource_init();
|
||||
generate_set_sequence(SET_TYPE_INT);
|
||||
generate_set_sequence(SET_TYPE_INT, SET_SIZE);
|
||||
|
||||
struct adata *set_union;
|
||||
const struct adata *set_union;
|
||||
set_union = int_set_union(lp, set_sequence, set_sequence_same);
|
||||
bt_assert(int_set_get_size(set_union) == SET_SIZE);
|
||||
bt_assert(int_set_format(set_union, 0, 2, buf, BUFFER_SIZE) == 0);
|
||||
@ -112,9 +112,8 @@ static int
|
||||
t_set_int_format(void)
|
||||
{
|
||||
resource_init();
|
||||
generate_set_sequence(SET_TYPE_INT);
|
||||
generate_set_sequence(SET_TYPE_INT, SET_SIZE_FOR_FORMAT_OUTPUT);
|
||||
|
||||
set_sequence->length = 4 * SET_SIZE_FOR_FORMAT_OUTPUT; /* dirty */
|
||||
bt_assert(int_set_format(set_sequence, 0, 0, buf, BUFFER_SIZE) == 0);
|
||||
bt_assert(strcmp(buf, "0.0.0.0 0.0.0.1 0.0.0.2 0.0.0.3 0.0.0.4 0.0.0.5 0.0.0.6 0.0.0.7 0.0.0.8 0.0.0.9") == 0);
|
||||
|
||||
@ -134,9 +133,9 @@ static int
|
||||
t_set_int_delete(void)
|
||||
{
|
||||
resource_init();
|
||||
generate_set_sequence(SET_TYPE_INT);
|
||||
generate_set_sequence(SET_TYPE_INT, SET_SIZE);
|
||||
|
||||
struct adata *deleting_sequence = set_sequence;
|
||||
const struct adata *deleting_sequence = set_sequence;
|
||||
u32 i;
|
||||
for (i = 0; i < SET_SIZE; i++)
|
||||
{
|
||||
@ -162,7 +161,7 @@ t_set_ec_contains(void)
|
||||
u32 i;
|
||||
|
||||
resource_init();
|
||||
generate_set_sequence(SET_TYPE_EC);
|
||||
generate_set_sequence(SET_TYPE_EC, SET_SIZE);
|
||||
|
||||
bt_assert(ec_set_get_size(set_sequence) == SET_SIZE);
|
||||
|
||||
@ -183,9 +182,9 @@ static int
|
||||
t_set_ec_union(void)
|
||||
{
|
||||
resource_init();
|
||||
generate_set_sequence(SET_TYPE_EC);
|
||||
generate_set_sequence(SET_TYPE_EC, SET_SIZE);
|
||||
|
||||
struct adata *set_union;
|
||||
const struct adata *set_union;
|
||||
set_union = ec_set_union(lp, set_sequence, set_sequence_same);
|
||||
bt_assert(ec_set_get_size(set_union) == SET_SIZE);
|
||||
bt_assert(ec_set_format(set_union, 0, buf, BUFFER_SIZE) == 0);
|
||||
@ -203,7 +202,7 @@ t_set_ec_format(void)
|
||||
{
|
||||
resource_init();
|
||||
|
||||
struct adata empty_as_path = {};
|
||||
const struct adata empty_as_path = {};
|
||||
set_sequence = set_sequence_same = set_sequence_higher = set_random = &empty_as_path;
|
||||
lp = lp_new_default(&root_pool);
|
||||
|
||||
@ -224,9 +223,9 @@ static int
|
||||
t_set_ec_delete(void)
|
||||
{
|
||||
resource_init();
|
||||
generate_set_sequence(SET_TYPE_EC);
|
||||
generate_set_sequence(SET_TYPE_EC, SET_SIZE);
|
||||
|
||||
struct adata *deleting_sequence = set_sequence;
|
||||
const struct adata *deleting_sequence = set_sequence;
|
||||
u32 i;
|
||||
for (i = 0; i < SET_SIZE; i++)
|
||||
{
|
||||
|
117
nest/attrs.h
117
nest/attrs.h
@ -31,15 +31,15 @@
|
||||
struct f_tree;
|
||||
|
||||
int as_path_valid(byte *data, uint len, int bs, int confed, char *err, uint elen);
|
||||
int as_path_16to32(byte *dst, byte *src, uint len);
|
||||
int as_path_32to16(byte *dst, byte *src, uint len);
|
||||
int as_path_16to32(byte *dst, const byte *src, uint len);
|
||||
int as_path_32to16(byte *dst, const byte *src, uint len);
|
||||
int as_path_contains_as4(const struct adata *path);
|
||||
int as_path_contains_confed(const struct adata *path);
|
||||
struct adata *as_path_strip_confed(struct linpool *pool, const struct adata *op);
|
||||
struct adata *as_path_prepend2(struct linpool *pool, const struct adata *op, int seq, u32 as);
|
||||
struct adata *as_path_to_old(struct linpool *pool, const struct adata *path);
|
||||
void as_path_cut(struct adata *path, uint num);
|
||||
struct adata *as_path_merge(struct linpool *pool, struct adata *p1, struct adata *p2);
|
||||
struct adata *as_path_cut(struct linpool *pool, const struct adata *path, uint num);
|
||||
const struct adata *as_path_merge(struct linpool *pool, const struct adata *p1, const struct adata *p2);
|
||||
void as_path_format(const struct adata *path, byte *buf, uint size);
|
||||
int as_path_getlen(const struct adata *path);
|
||||
int as_path_getlen_int(const struct adata *path, int bs);
|
||||
@ -48,8 +48,8 @@ int as_path_get_first_regular(const struct adata *path, u32 *last_as);
|
||||
int as_path_get_last(const struct adata *path, u32 *last_as);
|
||||
u32 as_path_get_last_nonaggregated(const struct adata *path);
|
||||
int as_path_contains(const struct adata *path, u32 as, int min);
|
||||
int as_path_match_set(const struct adata *path, struct f_tree *set);
|
||||
struct adata *as_path_filter(struct linpool *pool, struct adata *path, struct f_tree *set, u32 key, int pos);
|
||||
int as_path_match_set(const struct adata *path, const struct f_tree *set);
|
||||
const struct adata *as_path_filter(struct linpool *pool, const struct adata *path, const struct f_tree *set, u32 key, int pos);
|
||||
|
||||
static inline struct adata *as_path_prepend(struct linpool *pool, const struct adata *path, u32 as)
|
||||
{ return as_path_prepend2(pool, path, AS_PATH_SEQUENCE, as); }
|
||||
@ -60,21 +60,33 @@ static inline struct adata *as_path_prepend(struct linpool *pool, const struct a
|
||||
#define PM_ASTERISK 2
|
||||
#define PM_ASN_EXPR 3
|
||||
#define PM_ASN_RANGE 4
|
||||
#define PM_ASN_SET 5
|
||||
|
||||
struct f_path_mask {
|
||||
struct f_path_mask *next;
|
||||
struct f_path_mask_item {
|
||||
union {
|
||||
u32 asn; /* PM_ASN */
|
||||
const struct f_line *expr; /* PM_ASN_EXPR */
|
||||
const struct f_tree *set; /* PM_ASN_SET */
|
||||
struct { /* PM_ASN_RANGE */
|
||||
u32 from;
|
||||
u32 to;
|
||||
};
|
||||
};
|
||||
int kind;
|
||||
uintptr_t val;
|
||||
uintptr_t val2;
|
||||
};
|
||||
|
||||
int as_path_match(const struct adata *path, struct f_path_mask *mask);
|
||||
struct f_path_mask {
|
||||
uint len;
|
||||
struct f_path_mask_item item[0];
|
||||
};
|
||||
|
||||
int as_path_match(const struct adata *path, const struct f_path_mask *mask);
|
||||
|
||||
|
||||
/* Counterparts to appropriate as_path_* functions */
|
||||
|
||||
static inline int
|
||||
aggregator_16to32(byte *dst, byte *src)
|
||||
aggregator_16to32(byte *dst, const byte *src)
|
||||
{
|
||||
put_u32(dst, get_u16(src));
|
||||
memcpy(dst+4, src+2, 4);
|
||||
@ -82,7 +94,7 @@ aggregator_16to32(byte *dst, byte *src)
|
||||
}
|
||||
|
||||
static inline int
|
||||
aggregator_32to16(byte *dst, byte *src)
|
||||
aggregator_32to16(byte *dst, const byte *src)
|
||||
{
|
||||
put_u16(dst, get_u32(src));
|
||||
memcpy(dst+2, src+4, 4);
|
||||
@ -90,13 +102,13 @@ aggregator_32to16(byte *dst, byte *src)
|
||||
}
|
||||
|
||||
static inline int
|
||||
aggregator_contains_as4(struct adata *a)
|
||||
aggregator_contains_as4(const struct adata *a)
|
||||
{
|
||||
return get_u32(a->data) > 0xFFFF;
|
||||
}
|
||||
|
||||
static inline struct adata *
|
||||
aggregator_to_old(struct linpool *pool, struct adata *a)
|
||||
aggregator_to_old(struct linpool *pool, const struct adata *a)
|
||||
{
|
||||
struct adata *d = lp_alloc_adata(pool, 8);
|
||||
put_u32(d->data, 0xFFFF);
|
||||
@ -109,26 +121,35 @@ aggregator_to_old(struct linpool *pool, struct adata *a)
|
||||
|
||||
|
||||
/* Extended Community subtypes (kinds) */
|
||||
#define EC_RT 0x0002
|
||||
#define EC_RO 0x0003
|
||||
enum ec_subtype {
|
||||
EC_RT = 0x0002,
|
||||
EC_RO = 0x0003,
|
||||
EC_GENERIC = 0xFFFF,
|
||||
};
|
||||
|
||||
#define EC_GENERIC 0xFFFF
|
||||
static inline const char *ec_subtype_str(const enum ec_subtype ecs) {
|
||||
switch (ecs) {
|
||||
case EC_RT: return "rt";
|
||||
case EC_RO: return "ro";
|
||||
default: return NULL;
|
||||
}
|
||||
}
|
||||
|
||||
/* Transitive bit (for first u32 half of EC) */
|
||||
#define EC_TBIT 0x40000000
|
||||
|
||||
#define ECOMM_LENGTH 8
|
||||
|
||||
static inline int int_set_get_size(struct adata *list)
|
||||
static inline int int_set_get_size(const struct adata *list)
|
||||
{ return list->length / 4; }
|
||||
|
||||
static inline int ec_set_get_size(struct adata *list)
|
||||
static inline int ec_set_get_size(const struct adata *list)
|
||||
{ return list->length / 8; }
|
||||
|
||||
static inline int lc_set_get_size(struct adata *list)
|
||||
static inline int lc_set_get_size(const struct adata *list)
|
||||
{ return list->length / 12; }
|
||||
|
||||
static inline u32 *int_set_get_data(struct adata *list)
|
||||
static inline u32 *int_set_get_data(const struct adata *list)
|
||||
{ return (u32 *) list->data; }
|
||||
|
||||
static inline u32 ec_hi(u64 ec) { return ec >> 32; }
|
||||
@ -137,16 +158,16 @@ static inline u64 ec_get(const u32 *l, int i)
|
||||
{ return (((u64) l[i]) << 32) | l[i+1]; }
|
||||
|
||||
/* RFC 4360 3.1. Two-Octet AS Specific Extended Community */
|
||||
static inline u64 ec_as2(u64 kind, u64 key, u64 val)
|
||||
{ return ((kind | 0x0000) << 48) | (key << 32) | val; }
|
||||
static inline u64 ec_as2(enum ec_subtype kind, u64 key, u64 val)
|
||||
{ return (((u64) kind | 0x0000) << 48) | (key << 32) | val; }
|
||||
|
||||
/* RFC 5668 4-Octet AS Specific BGP Extended Community */
|
||||
static inline u64 ec_as4(u64 kind, u64 key, u64 val)
|
||||
{ return ((kind | 0x0200) << 48) | (key << 16) | val; }
|
||||
static inline u64 ec_as4(enum ec_subtype kind, u64 key, u64 val)
|
||||
{ return (((u64) kind | 0x0200) << 48) | (key << 16) | val; }
|
||||
|
||||
/* RFC 4360 3.2. IPv4 Address Specific Extended Community */
|
||||
static inline u64 ec_ip4(u64 kind, u64 key, u64 val)
|
||||
{ return ((kind | 0x0100) << 48) | (key << 16) | val; }
|
||||
static inline u64 ec_ip4(enum ec_subtype kind, u64 key, u64 val)
|
||||
{ return (((u64) kind | 0x0100) << 48) | (key << 16) | val; }
|
||||
|
||||
static inline u64 ec_generic(u64 key, u64 val)
|
||||
{ return (key << 32) | val; }
|
||||
@ -173,29 +194,29 @@ static inline u32 *lc_copy(u32 *dst, const u32 *src)
|
||||
{ memcpy(dst, src, LCOMM_LENGTH); return dst + 3; }
|
||||
|
||||
|
||||
int int_set_format(struct adata *set, int way, int from, byte *buf, uint size);
|
||||
int int_set_format(const struct adata *set, int way, int from, byte *buf, uint size);
|
||||
int ec_format(byte *buf, u64 ec);
|
||||
int ec_set_format(struct adata *set, int from, byte *buf, uint size);
|
||||
int ec_set_format(const struct adata *set, int from, byte *buf, uint size);
|
||||
int lc_format(byte *buf, lcomm lc);
|
||||
int lc_set_format(struct adata *set, int from, byte *buf, uint size);
|
||||
int int_set_contains(struct adata *list, u32 val);
|
||||
int ec_set_contains(struct adata *list, u64 val);
|
||||
int lc_set_contains(struct adata *list, lcomm val);
|
||||
struct adata *int_set_prepend(struct linpool *pool, struct adata *list, u32 val);
|
||||
struct adata *int_set_add(struct linpool *pool, struct adata *list, u32 val);
|
||||
struct adata *ec_set_add(struct linpool *pool, struct adata *list, u64 val);
|
||||
struct adata *lc_set_add(struct linpool *pool, struct adata *list, lcomm val);
|
||||
struct adata *int_set_del(struct linpool *pool, struct adata *list, u32 val);
|
||||
struct adata *ec_set_del(struct linpool *pool, struct adata *list, u64 val);
|
||||
struct adata *lc_set_del(struct linpool *pool, struct adata *list, lcomm val);
|
||||
struct adata *int_set_union(struct linpool *pool, struct adata *l1, struct adata *l2);
|
||||
struct adata *ec_set_union(struct linpool *pool, struct adata *l1, struct adata *l2);
|
||||
struct adata *lc_set_union(struct linpool *pool, struct adata *l1, struct adata *l2);
|
||||
int lc_set_format(const struct adata *set, int from, byte *buf, uint size);
|
||||
int int_set_contains(const struct adata *list, u32 val);
|
||||
int ec_set_contains(const struct adata *list, u64 val);
|
||||
int lc_set_contains(const struct adata *list, lcomm val);
|
||||
const struct adata *int_set_prepend(struct linpool *pool, const struct adata *list, u32 val);
|
||||
const struct adata *int_set_add(struct linpool *pool, const struct adata *list, u32 val);
|
||||
const struct adata *ec_set_add(struct linpool *pool, const struct adata *list, u64 val);
|
||||
const struct adata *lc_set_add(struct linpool *pool, const struct adata *list, lcomm val);
|
||||
const struct adata *int_set_del(struct linpool *pool, const struct adata *list, u32 val);
|
||||
const struct adata *ec_set_del(struct linpool *pool, const struct adata *list, u64 val);
|
||||
const struct adata *lc_set_del(struct linpool *pool, const struct adata *list, lcomm val);
|
||||
const struct adata *int_set_union(struct linpool *pool, const struct adata *l1, const struct adata *l2);
|
||||
const struct adata *ec_set_union(struct linpool *pool, const struct adata *l1, const struct adata *l2);
|
||||
const struct adata *lc_set_union(struct linpool *pool, const struct adata *l1, const struct adata *l2);
|
||||
|
||||
struct adata *ec_set_del_nontrans(struct linpool *pool, struct adata *set);
|
||||
struct adata *int_set_sort(struct linpool *pool, struct adata *src);
|
||||
struct adata *ec_set_sort(struct linpool *pool, struct adata *src);
|
||||
struct adata *lc_set_sort(struct linpool *pool, struct adata *src);
|
||||
struct adata *ec_set_del_nontrans(struct linpool *pool, const struct adata *set);
|
||||
struct adata *int_set_sort(struct linpool *pool, const struct adata *src);
|
||||
struct adata *ec_set_sort(struct linpool *pool, const struct adata *src);
|
||||
struct adata *lc_set_sort(struct linpool *pool, const struct adata *src);
|
||||
|
||||
void ec_set_sort_x(struct adata *set); /* Sort in place */
|
||||
|
||||
|
@ -19,6 +19,7 @@ struct bfd_request {
|
||||
ip_addr addr;
|
||||
ip_addr local;
|
||||
struct iface *iface;
|
||||
struct iface *vrf;
|
||||
|
||||
void (*hook)(struct bfd_request *);
|
||||
void *data;
|
||||
@ -40,13 +41,13 @@ struct bfd_request {
|
||||
|
||||
#ifdef CONFIG_BFD
|
||||
|
||||
struct bfd_request * bfd_request_session(pool *p, ip_addr addr, ip_addr local, struct iface *iface, void (*hook)(struct bfd_request *), void *data);
|
||||
struct bfd_request * bfd_request_session(pool *p, ip_addr addr, ip_addr local, struct iface *iface, struct iface *vrf, void (*hook)(struct bfd_request *), void *data);
|
||||
|
||||
static inline void cf_check_bfd(int use UNUSED) { }
|
||||
|
||||
#else
|
||||
|
||||
static inline struct bfd_request * bfd_request_session(pool *p UNUSED, ip_addr addr UNUSED, ip_addr local UNUSED, struct iface *iface UNUSED, void (*hook)(struct bfd_request *) UNUSED, void *data UNUSED) { return NULL; }
|
||||
static inline struct bfd_request * bfd_request_session(pool *p UNUSED, ip_addr addr UNUSED, ip_addr local UNUSED, struct iface *iface UNUSED, struct iface *vrf UNUSED, void (*hook)(struct bfd_request *) UNUSED, void *data UNUSED) { return NULL; }
|
||||
|
||||
static inline void cf_check_bfd(int use) { if (use) cf_error("BFD not available"); }
|
||||
|
||||
|
@ -262,6 +262,7 @@ cli_command(struct cli *c)
|
||||
bzero(&f, sizeof(f));
|
||||
f.mem = c->parser_pool;
|
||||
f.pool = rp_new(c->pool, "Config");
|
||||
init_list(&f.symbols);
|
||||
cf_read_hook = cli_cmd_read_hook;
|
||||
cli_rh_pos = c->rx_buf;
|
||||
cli_rh_len = strlen(c->rx_buf);
|
||||
|
10
nest/cmds.c
10
nest/cmds.c
@ -95,18 +95,16 @@ cmd_show_memory(void)
|
||||
}
|
||||
|
||||
void
|
||||
cmd_eval(struct f_inst *expr)
|
||||
cmd_eval(const struct f_line *expr)
|
||||
{
|
||||
struct f_val v = f_eval(expr, this_cli->parser_pool);
|
||||
buffer buf;
|
||||
LOG_BUFFER_INIT(buf);
|
||||
|
||||
if (v.type == T_RETURN)
|
||||
if (f_eval_buf(expr, this_cli->parser_pool, &buf) > F_RETURN)
|
||||
{
|
||||
cli_msg(8008, "runtime error");
|
||||
return;
|
||||
}
|
||||
|
||||
buffer buf;
|
||||
LOG_BUFFER_INIT(buf);
|
||||
val_format(v, &buf);
|
||||
cli_msg(23, "%s", buf.start);
|
||||
}
|
||||
|
@ -16,4 +16,6 @@ struct f_inst;
|
||||
void cmd_show_status(void);
|
||||
void cmd_show_symbols(struct sym_show_data *sym);
|
||||
void cmd_show_memory(void);
|
||||
void cmd_eval(struct f_inst *expr);
|
||||
|
||||
struct f_line;
|
||||
void cmd_eval(const struct f_line *expr);
|
||||
|
107
nest/config.Y
107
nest/config.Y
@ -65,7 +65,7 @@ proto_postconfig(void)
|
||||
CF_DECLS
|
||||
|
||||
CF_KEYWORDS(ROUTER, ID, PROTOCOL, TEMPLATE, PREFERENCE, DISABLED, DEBUG, ALL, OFF, DIRECT)
|
||||
CF_KEYWORDS(INTERFACE, IMPORT, EXPORT, FILTER, NONE, VRF, TABLE, STATES, ROUTES, FILTERS)
|
||||
CF_KEYWORDS(INTERFACE, IMPORT, EXPORT, FILTER, NONE, VRF, DEFAULT, TABLE, STATES, ROUTES, FILTERS)
|
||||
CF_KEYWORDS(IPV4, IPV6, VPN4, VPN6, ROA4, ROA6, FLOW4, FLOW6, SADR, MPLS)
|
||||
CF_KEYWORDS(RECEIVE, LIMIT, ACTION, WARN, BLOCK, RESTART, DISABLE, KEEP, FILTERED)
|
||||
CF_KEYWORDS(PASSWORD, FROM, PASSIVE, TO, ID, EVENTS, PACKETS, PROTOCOLS, INTERFACES)
|
||||
@ -88,7 +88,7 @@ CF_ENUM(T_ENUM_ROA, ROA_, UNKNOWN, VALID, INVALID)
|
||||
%type <i32> idval
|
||||
%type <f> imexport
|
||||
%type <r> rtable
|
||||
%type <s> optsym
|
||||
%type <s> optproto
|
||||
%type <ra> r_args
|
||||
%type <sd> sym_args
|
||||
%type <i> proto_start echo_mask echo_size debug_mask debug_list debug_flag mrtdump_mask mrtdump_list mrtdump_flag export_mode limit_action net_type table_sorted tos password_algorithm
|
||||
@ -112,9 +112,9 @@ rtrid:
|
||||
|
||||
idval:
|
||||
NUM { $$ = $1; }
|
||||
| '(' term ')' { $$ = f_eval_int($2); }
|
||||
| '(' term ')' { $$ = f_eval_int(f_linearize($2)); }
|
||||
| IP4 { $$ = ip4_to_u32($1); }
|
||||
| SYM {
|
||||
| CF_SYM_KNOWN {
|
||||
if ($1->class == (SYM_CONSTANT | T_INT) || $1->class == (SYM_CONSTANT | T_QUAD))
|
||||
$$ = SYM_VAL($1).i;
|
||||
else if (($1->class == (SYM_CONSTANT | T_IP)) && ipa_is_ip4(SYM_VAL($1).ip))
|
||||
@ -156,7 +156,7 @@ table_sorted:
|
||||
| SORTED { $$ = 1; }
|
||||
;
|
||||
|
||||
table: net_type TABLE SYM table_sorted {
|
||||
table: net_type TABLE symbol table_sorted {
|
||||
struct rtable_config *cf;
|
||||
cf = rt_new_table($3, $1);
|
||||
cf->sorted = $4;
|
||||
@ -177,28 +177,30 @@ proto_name:
|
||||
/* EMPTY */ {
|
||||
struct symbol *s = cf_default_name(this_proto->protocol->template, &this_proto->protocol->name_counter);
|
||||
s->class = this_proto->class;
|
||||
s->def = this_proto;
|
||||
s->proto = this_proto;
|
||||
this_proto->name = s->name;
|
||||
}
|
||||
| SYM {
|
||||
cf_define_symbol($1, this_proto->class, this_proto);
|
||||
| symbol {
|
||||
cf_define_symbol($1, this_proto->class, proto, this_proto);
|
||||
this_proto->name = $1->name;
|
||||
}
|
||||
| FROM SYM {
|
||||
| FROM CF_SYM_KNOWN {
|
||||
if (($2->class != SYM_TEMPLATE) && ($2->class != SYM_PROTO)) cf_error("Template or protocol name expected");
|
||||
|
||||
struct symbol *s = cf_default_name(this_proto->protocol->template, &this_proto->protocol->name_counter);
|
||||
s->class = this_proto->class;
|
||||
s->def = this_proto;
|
||||
s->proto = this_proto;
|
||||
this_proto->name = s->name;
|
||||
|
||||
if (($2->class != SYM_TEMPLATE) && ($2->class != SYM_PROTO)) cf_error("Template or protocol name expected");
|
||||
proto_copy_config(this_proto, $2->def);
|
||||
proto_copy_config(this_proto, $2->proto);
|
||||
}
|
||||
| SYM FROM SYM {
|
||||
cf_define_symbol($1, this_proto->class, this_proto);
|
||||
| symbol FROM CF_SYM_KNOWN {
|
||||
if (($3->class != SYM_TEMPLATE) && ($3->class != SYM_PROTO)) cf_error("Template or protocol name expected");
|
||||
|
||||
cf_define_symbol($1, this_proto->class, proto, this_proto);
|
||||
this_proto->name = $1->name;
|
||||
|
||||
if (($3->class != SYM_TEMPLATE) && ($3->class != SYM_PROTO)) cf_error("Template or protocol name expected");
|
||||
proto_copy_config(this_proto, $3->def);
|
||||
proto_copy_config(this_proto, $3->proto);
|
||||
}
|
||||
;
|
||||
|
||||
@ -209,7 +211,8 @@ proto_item:
|
||||
| MRTDUMP mrtdump_mask { this_proto->mrtdump = $2; }
|
||||
| ROUTER ID idval { this_proto->router_id = $3; }
|
||||
| DESCRIPTION text { this_proto->dsc = $2; }
|
||||
| VRF text { this_proto->vrf = if_get_by_name($2); }
|
||||
| VRF text { this_proto->vrf = if_get_by_name($2); this_proto->vrf_set = 1; }
|
||||
| VRF DEFAULT { this_proto->vrf = NULL; this_proto->vrf_set = 1; }
|
||||
;
|
||||
|
||||
|
||||
@ -254,12 +257,7 @@ channel_end:
|
||||
proto_channel: channel_start channel_opt_list channel_end;
|
||||
|
||||
|
||||
rtable:
|
||||
SYM {
|
||||
if ($1->class != SYM_TABLE) cf_error("Table expected");
|
||||
$$ = $1->def;
|
||||
}
|
||||
;
|
||||
rtable: CF_SYM_KNOWN { cf_assert_symbol($1, SYM_TABLE); $$ = $1->table; } ;
|
||||
|
||||
imexport:
|
||||
FILTER filter { $$ = $2; }
|
||||
@ -512,8 +510,8 @@ CF_CLI(SHOW PROTOCOLS, proto_patt2, [<protocol> | \"<pattern>\"], [[Show routing
|
||||
CF_CLI(SHOW PROTOCOLS ALL, proto_patt2, [<protocol> | \"<pattern>\"], [[Show routing protocol details]])
|
||||
{ proto_apply_cmd($4, proto_cmd_show, 0, 1); } ;
|
||||
|
||||
optsym:
|
||||
SYM
|
||||
optproto:
|
||||
CF_SYM_KNOWN { cf_assert_symbol($1, SYM_PROTO); $$ = $1; }
|
||||
| /* empty */ { $$ = NULL; }
|
||||
;
|
||||
|
||||
@ -545,10 +543,10 @@ r_args:
|
||||
$$->show_for = 1;
|
||||
$$->addr = $3;
|
||||
}
|
||||
| r_args TABLE SYM {
|
||||
| r_args TABLE CF_SYM_KNOWN {
|
||||
cf_assert_symbol($3, SYM_TABLE);
|
||||
$$ = $1;
|
||||
if ($3->class != SYM_TABLE) cf_error("%s is not a table", $3->name);
|
||||
rt_show_add_table($$, ((struct rtable_config *)$3->def)->table);
|
||||
rt_show_add_table($$, $3->table->table);
|
||||
$$->tables_defined_by = RSD_TDB_DIRECT;
|
||||
}
|
||||
| r_args TABLE ALL {
|
||||
@ -558,16 +556,28 @@ r_args:
|
||||
rt_show_add_table($$, t->table);
|
||||
$$->tables_defined_by = RSD_TDB_ALL;
|
||||
}
|
||||
| r_args IMPORT TABLE SYM '.' r_args_channel {
|
||||
| r_args IMPORT TABLE CF_SYM_KNOWN '.' r_args_channel {
|
||||
cf_assert_symbol($4, SYM_PROTO);
|
||||
$$ = $1;
|
||||
struct proto_config *cf = (void *) $4->def;
|
||||
if ($4->class != SYM_PROTO || !cf->proto) cf_error("%s is not a protocol", $4->name);
|
||||
struct proto_config *cf = $4->proto;
|
||||
if (!cf->proto) cf_error("%s is not a protocol", $4->name);
|
||||
struct channel *c = proto_find_channel_by_name(cf->proto, $6);
|
||||
if (!c) cf_error("Channel %s.%s not found", $4->name, $6);
|
||||
if (!c->in_table) cf_error("No import table in channel %s.%s", $4->name, $6);
|
||||
rt_show_add_table($$, c->in_table);
|
||||
$$->tables_defined_by = RSD_TDB_DIRECT;
|
||||
}
|
||||
| r_args EXPORT TABLE CF_SYM_KNOWN '.' r_args_channel {
|
||||
cf_assert_symbol($4, SYM_PROTO);
|
||||
$$ = $1;
|
||||
struct proto_config *cf = $4->proto;
|
||||
if (!cf->proto) cf_error("%s is not a protocol", $4->name);
|
||||
struct channel *c = proto_find_channel_by_name(cf->proto, $6);
|
||||
if (!c) cf_error("Channel %s.%s not found", $4->name, $6);
|
||||
if (!c->out_table) cf_error("No export table in channel %s.%s", $4->name, $6);
|
||||
rt_show_add_table($$, c->out_table);
|
||||
$$->tables_defined_by = RSD_TDB_DIRECT;
|
||||
}
|
||||
| r_args FILTER filter {
|
||||
$$ = $1;
|
||||
if ($$->filter != FILTER_ACCEPT) cf_error("Filter specified twice");
|
||||
@ -590,30 +600,33 @@ r_args:
|
||||
$$ = $1;
|
||||
$$->filtered = 1;
|
||||
}
|
||||
| r_args export_mode SYM {
|
||||
struct proto_config *c = (struct proto_config *) $3->def;
|
||||
| r_args export_mode CF_SYM_KNOWN {
|
||||
cf_assert_symbol($3, SYM_PROTO);
|
||||
struct proto_config *c = (struct proto_config *) $3->proto;
|
||||
$$ = $1;
|
||||
if ($$->export_mode) cf_error("Export specified twice");
|
||||
if ($3->class != SYM_PROTO || !c->proto) cf_error("%s is not a protocol", $3->name);
|
||||
if (!c->proto) cf_error("%s is not a protocol", $3->name);
|
||||
$$->export_mode = $2;
|
||||
$$->export_protocol = c->proto;
|
||||
$$->tables_defined_by = RSD_TDB_INDIRECT;
|
||||
}
|
||||
| r_args export_mode SYM '.' r_args_channel {
|
||||
struct proto_config *c = (struct proto_config *) $3->def;
|
||||
| r_args export_mode CF_SYM_KNOWN '.' r_args_channel {
|
||||
cf_assert_symbol($3, SYM_PROTO);
|
||||
struct proto_config *c = (struct proto_config *) $3->proto;
|
||||
$$ = $1;
|
||||
if ($$->export_mode) cf_error("Export specified twice");
|
||||
if ($3->class != SYM_PROTO || !c->proto) cf_error("%s is not a protocol", $3->name);
|
||||
if (!c->proto) cf_error("%s is not a protocol", $3->name);
|
||||
$$->export_mode = $2;
|
||||
$$->export_channel = proto_find_channel_by_name(c->proto, $5);
|
||||
if (!$$->export_channel) cf_error("Export channel not found");
|
||||
$$->tables_defined_by = RSD_TDB_INDIRECT;
|
||||
}
|
||||
| r_args PROTOCOL SYM {
|
||||
struct proto_config *c = (struct proto_config *) $3->def;
|
||||
| r_args PROTOCOL CF_SYM_KNOWN {
|
||||
cf_assert_symbol($3, SYM_PROTO);
|
||||
struct proto_config *c = (struct proto_config *) $3->proto;
|
||||
$$ = $1;
|
||||
if ($$->show_protocol) cf_error("Protocol specified twice");
|
||||
if ($3->class != SYM_PROTO || !c->proto) cf_error("%s is not a protocol", $3->name);
|
||||
if (!c->proto) cf_error("%s is not a protocol", $3->name);
|
||||
$$->show_protocol = c->proto;
|
||||
$$->tables_defined_by = RSD_TDB_INDIRECT;
|
||||
}
|
||||
@ -647,7 +660,7 @@ r_args_for:
|
||||
$$ = cfg_alloc(sizeof(net_addr_ip6_sadr));
|
||||
net_fill_ip6_sadr($$, $1, IP6_MAX_PREFIX_LENGTH, $3, IP6_MAX_PREFIX_LENGTH);
|
||||
}
|
||||
| SYM {
|
||||
| CF_SYM_KNOWN {
|
||||
if ($1->class == (SYM_CONSTANT | T_IP))
|
||||
{
|
||||
$$ = cfg_alloc(ipa_is_ip4(SYM_VAL($1).ip) ? sizeof(net_addr_ip4) : sizeof(net_addr_ip6));
|
||||
@ -656,7 +669,7 @@ r_args_for:
|
||||
else if (($1->class == (SYM_CONSTANT | T_NET)) && net_type_match(SYM_VAL($1).net, NB_IP | NB_VPN))
|
||||
$$ = (net_addr *) SYM_VAL($1).net; /* Avoid const warning */
|
||||
else
|
||||
cf_error("IP address or network expected");
|
||||
cf_error("IP address or network constant expected");
|
||||
}
|
||||
;
|
||||
|
||||
@ -709,7 +722,7 @@ sym_args:
|
||||
| sym_args FILTER { $$ = $1; $$->type = SYM_FILTER; }
|
||||
| sym_args PROTOCOL { $$ = $1; $$->type = SYM_PROTO; }
|
||||
| sym_args TEMPLATE { $$ = $1; $$->type = SYM_TEMPLATE; }
|
||||
| sym_args SYM { $$ = $1; $$->sym = $2; }
|
||||
| sym_args symbol { $$ = $1; $$->sym = $2; }
|
||||
;
|
||||
|
||||
|
||||
@ -730,9 +743,11 @@ CF_CLI(DUMP ROUTES,,, [[Dump routing table]])
|
||||
{ rt_dump_all(); cli_msg(0, ""); } ;
|
||||
CF_CLI(DUMP PROTOCOLS,,, [[Dump protocol information]])
|
||||
{ protos_dump_all(); cli_msg(0, ""); } ;
|
||||
CF_CLI(DUMP FILTER ALL,,, [[Dump all filters in linearized form]])
|
||||
{ filters_dump_all(); cli_msg(0, ""); } ;
|
||||
|
||||
CF_CLI(EVAL, term, <expr>, [[Evaluate an expression]])
|
||||
{ cmd_eval($2); } ;
|
||||
{ cmd_eval(f_linearize($2)); } ;
|
||||
|
||||
CF_CLI_HELP(ECHO, ..., [[Control echoing of log messages]])
|
||||
CF_CLI(ECHO, echo_mask echo_size, (all | off | { debug|trace|info|remote|warning|error|auth [, ...] }) [<buffer-size>], [[Control echoing of log messages]]) {
|
||||
@ -779,13 +794,13 @@ CF_CLI(RESTRICT,,,[[Restrict current CLI session to safe commands]])
|
||||
{ this_cli->restricted = 1; cli_msg(16, "Access restricted"); } ;
|
||||
|
||||
proto_patt:
|
||||
SYM { $$.ptr = $1; $$.patt = 0; }
|
||||
CF_SYM_KNOWN { cf_assert_symbol($1, SYM_PROTO); $$.ptr = $1; $$.patt = 0; }
|
||||
| ALL { $$.ptr = NULL; $$.patt = 1; }
|
||||
| TEXT { $$.ptr = $1; $$.patt = 1; }
|
||||
;
|
||||
|
||||
proto_patt2:
|
||||
SYM { $$.ptr = $1; $$.patt = 0; }
|
||||
CF_SYM_KNOWN { cf_assert_symbol($1, SYM_PROTO); $$.ptr = $1; $$.patt = 0; }
|
||||
| { $$.ptr = NULL; $$.patt = 1; }
|
||||
| TEXT { $$.ptr = $1; $$.patt = 1; }
|
||||
;
|
||||
|
@ -147,7 +147,7 @@ ifa_send_notify(struct proto *p, unsigned c, struct ifa *a)
|
||||
{
|
||||
if (p->ifa_notify &&
|
||||
(p->proto_state != PS_DOWN) &&
|
||||
(!p->vrf || p->vrf == a->iface->master))
|
||||
(!p->vrf_set || p->vrf == a->iface->master))
|
||||
{
|
||||
if (p->debug & D_IFACES)
|
||||
log(L_TRACE "%s < address %N on interface %s %s",
|
||||
@ -185,7 +185,7 @@ if_send_notify(struct proto *p, unsigned c, struct iface *i)
|
||||
{
|
||||
if (p->if_notify &&
|
||||
(p->proto_state != PS_DOWN) &&
|
||||
(!p->vrf || p->vrf == i->master))
|
||||
(!p->vrf_set || p->vrf == i->master))
|
||||
{
|
||||
if (p->debug & D_IFACES)
|
||||
log(L_TRACE "%s < interface %s %s", p->name, i->name,
|
||||
|
@ -116,7 +116,7 @@ if_connected(ip_addr a, struct iface *i, struct ifa **ap, uint flags)
|
||||
}
|
||||
|
||||
static inline int
|
||||
if_connected_any(ip_addr a, struct iface *vrf, struct iface **iface, struct ifa **addr, uint flags)
|
||||
if_connected_any(ip_addr a, struct iface *vrf, uint vrf_set, struct iface **iface, struct ifa **addr, uint flags)
|
||||
{
|
||||
struct iface *i;
|
||||
struct ifa *b;
|
||||
@ -127,7 +127,7 @@ if_connected_any(ip_addr a, struct iface *vrf, struct iface **iface, struct ifa
|
||||
|
||||
/* Get first match, but prefer SCOPE_HOST to other matches */
|
||||
WALK_LIST(i, iface_list)
|
||||
if ((!vrf || vrf == i->master) && ((s = if_connected(a, i, &b, flags)) >= 0))
|
||||
if ((!vrf_set || vrf == i->master) && ((s = if_connected(a, i, &b, flags)) >= 0))
|
||||
if ((scope < 0) || ((scope > SCOPE_HOST) && (s == SCOPE_HOST)))
|
||||
{
|
||||
*iface = i;
|
||||
@ -192,7 +192,7 @@ neigh_find(struct proto *p, ip_addr a, struct iface *iface, uint flags)
|
||||
iface = (scope < 0) ? NULL : iface;
|
||||
}
|
||||
else
|
||||
scope = if_connected_any(a, p->vrf, &iface, &addr, flags);
|
||||
scope = if_connected_any(a, p->vrf, p->vrf_set, &iface, &addr, flags);
|
||||
|
||||
/* scope < 0 means i don't know neighbor */
|
||||
/* scope >= 0 <=> iface != NULL */
|
||||
@ -309,6 +309,7 @@ neigh_free(neighbor *n)
|
||||
void
|
||||
neigh_update(neighbor *n, struct iface *iface)
|
||||
{
|
||||
struct proto *p = n->proto;
|
||||
struct ifa *ifa = NULL;
|
||||
int scope = -1;
|
||||
|
||||
@ -317,14 +318,14 @@ neigh_update(neighbor *n, struct iface *iface)
|
||||
return;
|
||||
|
||||
/* VRF-bound neighbors ignore changes in other VRFs */
|
||||
if (n->proto->vrf && (n->proto->vrf != iface->master))
|
||||
if (p->vrf_set && (p->vrf != iface->master))
|
||||
return;
|
||||
|
||||
scope = if_connected(n->addr, iface, &ifa, n->flags);
|
||||
|
||||
/* When neighbor is going down, try to respawn it on other ifaces */
|
||||
if ((scope < 0) && (n->scope >= 0) && !n->ifreq && (n->flags & NEF_STICKY))
|
||||
scope = if_connected_any(n->addr, n->proto->vrf, &iface, &ifa, n->flags);
|
||||
scope = if_connected_any(n->addr, p->vrf, p->vrf_set, &iface, &ifa, n->flags);
|
||||
|
||||
/* No change or minor change - ignore or notify */
|
||||
if ((scope == n->scope) && (iface == n->iface))
|
||||
|
111
nest/proto.c
111
nest/proto.c
@ -328,6 +328,13 @@ channel_reset_import(struct channel *c)
|
||||
rt_prune_sync(c->in_table, 1);
|
||||
}
|
||||
|
||||
static void
|
||||
channel_reset_export(struct channel *c)
|
||||
{
|
||||
/* Just free the routes */
|
||||
rt_prune_sync(c->out_table, 1);
|
||||
}
|
||||
|
||||
/* Called by protocol to activate in_table */
|
||||
void
|
||||
channel_setup_in_table(struct channel *c)
|
||||
@ -342,6 +349,18 @@ channel_setup_in_table(struct channel *c)
|
||||
c->reload_event = ev_new_init(c->proto->pool, channel_reload_loop, c);
|
||||
}
|
||||
|
||||
/* Called by protocol to activate out_table */
|
||||
void
|
||||
channel_setup_out_table(struct channel *c)
|
||||
{
|
||||
struct rtable_config *cf = mb_allocz(c->proto->pool, sizeof(struct rtable_config));
|
||||
cf->name = "export";
|
||||
cf->addr_type = c->net_type;
|
||||
|
||||
c->out_table = mb_allocz(c->proto->pool, sizeof(struct rtable));
|
||||
rt_setup(c->proto->pool, c->out_table, cf);
|
||||
}
|
||||
|
||||
|
||||
static void
|
||||
channel_do_start(struct channel *c)
|
||||
@ -387,6 +406,7 @@ channel_do_down(struct channel *c)
|
||||
|
||||
c->in_table = NULL;
|
||||
c->reload_event = NULL;
|
||||
c->out_table = NULL;
|
||||
|
||||
CALL(c->channel->cleanup, c);
|
||||
|
||||
@ -429,6 +449,9 @@ channel_set_state(struct channel *c, uint state)
|
||||
if (c->in_table && (cs == CS_UP))
|
||||
channel_reset_import(c);
|
||||
|
||||
if (c->out_table && (cs == CS_UP))
|
||||
channel_reset_export(c);
|
||||
|
||||
break;
|
||||
|
||||
case CS_UP:
|
||||
@ -454,6 +477,9 @@ channel_set_state(struct channel *c, uint state)
|
||||
if (c->in_table && (cs == CS_UP))
|
||||
channel_reset_import(c);
|
||||
|
||||
if (c->out_table && (cs == CS_UP))
|
||||
channel_reset_export(c);
|
||||
|
||||
channel_do_flush(c);
|
||||
break;
|
||||
|
||||
@ -651,7 +677,7 @@ channel_reconfigure(struct channel *c, struct channel_config *cf)
|
||||
c->last_tx_filter_change = current_time();
|
||||
|
||||
/* Execute channel-specific reconfigure hook */
|
||||
if (c->channel->reconfigure && !c->channel->reconfigure(c, cf))
|
||||
if (c->channel->reconfigure && !c->channel->reconfigure(c, cf, &import_changed, &export_changed))
|
||||
return 0;
|
||||
|
||||
/* If the channel is not open, it has no routes and we cannot reload it anyways */
|
||||
@ -797,6 +823,7 @@ proto_init(struct proto_config *c, node *n)
|
||||
p->proto_state = PS_DOWN;
|
||||
p->last_state_change = current_time();
|
||||
p->vrf = c->vrf;
|
||||
p->vrf_set = c->vrf_set;
|
||||
insert_node(&p->n, n);
|
||||
|
||||
p->event = ev_new_init(proto_pool, proto_event, p);
|
||||
@ -906,6 +933,28 @@ proto_copy_config(struct proto_config *dest, struct proto_config *src)
|
||||
dest->protocol->copy_config(dest, src);
|
||||
}
|
||||
|
||||
void
|
||||
proto_clone_config(struct symbol *sym, struct proto_config *parent)
|
||||
{
|
||||
struct proto_config *cf = proto_config_new(parent->protocol, SYM_PROTO);
|
||||
proto_copy_config(cf, parent);
|
||||
cf->name = sym->name;
|
||||
cf->proto = NULL;
|
||||
cf->parent = parent;
|
||||
|
||||
sym->class = cf->class;
|
||||
sym->proto = cf;
|
||||
}
|
||||
|
||||
static void
|
||||
proto_undef_clone(struct symbol *sym, struct proto_config *cf)
|
||||
{
|
||||
rem_node(&cf->n);
|
||||
|
||||
sym->class = SYM_VOID;
|
||||
sym->proto = NULL;
|
||||
}
|
||||
|
||||
/**
|
||||
* protos_preconfig - pre-configuration processing
|
||||
* @c: new configuration
|
||||
@ -942,7 +991,8 @@ proto_reconfigure(struct proto *p, struct proto_config *oc, struct proto_config
|
||||
if ((nc->protocol != oc->protocol) ||
|
||||
(nc->net_type != oc->net_type) ||
|
||||
(nc->disabled != p->disabled) ||
|
||||
(nc->vrf != oc->vrf))
|
||||
(nc->vrf != oc->vrf) ||
|
||||
(nc->vrf_set != oc->vrf_set))
|
||||
return 0;
|
||||
|
||||
p->name = nc->name;
|
||||
@ -1005,17 +1055,41 @@ protos_commit(struct config *new, struct config *old, int force_reconfig, int ty
|
||||
{
|
||||
p = oc->proto;
|
||||
sym = cf_find_symbol(new, oc->name);
|
||||
|
||||
/* Handle dynamic protocols */
|
||||
if (!sym && oc->parent && !new->shutdown)
|
||||
{
|
||||
struct symbol *parsym = cf_find_symbol(new, oc->parent->name);
|
||||
if (parsym && parsym->class == SYM_PROTO)
|
||||
{
|
||||
/* This is hack, we would like to share config, but we need to copy it now */
|
||||
new_config = new;
|
||||
cfg_mem = new->mem;
|
||||
conf_this_scope = new->root_scope;
|
||||
sym = cf_get_symbol(oc->name);
|
||||
proto_clone_config(sym, parsym->proto);
|
||||
new_config = NULL;
|
||||
cfg_mem = NULL;
|
||||
}
|
||||
}
|
||||
|
||||
if (sym && sym->class == SYM_PROTO && !new->shutdown)
|
||||
{
|
||||
/* Found match, let's check if we can smoothly switch to new configuration */
|
||||
/* No need to check description */
|
||||
nc = sym->def;
|
||||
nc = sym->proto;
|
||||
nc->proto = p;
|
||||
|
||||
/* We will try to reconfigure protocol p */
|
||||
if (! force_reconfig && proto_reconfigure(p, oc, nc, type))
|
||||
continue;
|
||||
|
||||
if (nc->parent)
|
||||
{
|
||||
proto_undef_clone(sym, nc);
|
||||
goto remove;
|
||||
}
|
||||
|
||||
/* Unsuccessful, we will restart it */
|
||||
if (!p->disabled && !nc->disabled)
|
||||
log(L_INFO "Restarting protocol %s", p->name);
|
||||
@ -1029,10 +1103,16 @@ protos_commit(struct config *new, struct config *old, int force_reconfig, int ty
|
||||
}
|
||||
else if (!new->shutdown)
|
||||
{
|
||||
remove:
|
||||
log(L_INFO "Removing protocol %s", p->name);
|
||||
p->down_code = PDC_CF_REMOVE;
|
||||
p->cf_new = NULL;
|
||||
}
|
||||
else if (new->gr_down)
|
||||
{
|
||||
p->down_code = PDC_CMD_GR_DOWN;
|
||||
p->cf_new = NULL;
|
||||
}
|
||||
else /* global shutdown */
|
||||
{
|
||||
p->down_code = PDC_CMD_SHUTDOWN;
|
||||
@ -1137,6 +1217,15 @@ proto_rethink_goal(struct proto *p)
|
||||
}
|
||||
}
|
||||
|
||||
struct proto *
|
||||
proto_spawn(struct proto_config *cf, uint disabled)
|
||||
{
|
||||
struct proto *p = proto_init(cf, TAIL(proto_list));
|
||||
p->disabled = disabled;
|
||||
proto_rethink_goal(p);
|
||||
return p;
|
||||
}
|
||||
|
||||
|
||||
/**
|
||||
* DOC: Graceful restart recovery
|
||||
@ -1809,8 +1898,8 @@ proto_cmd_show(struct proto *p, uintptr_t verbose, int cnt)
|
||||
cli_msg(-1006, " Message: %s", p->message);
|
||||
if (p->cf->router_id)
|
||||
cli_msg(-1006, " Router ID: %R", p->cf->router_id);
|
||||
if (p->vrf)
|
||||
cli_msg(-1006, " VRF: %s", p->vrf->name);
|
||||
if (p->vrf_set)
|
||||
cli_msg(-1006, " VRF: %s", p->vrf ? p->vrf->name : "default");
|
||||
|
||||
if (p->proto->show_proto_info)
|
||||
p->proto->show_proto_info(p);
|
||||
@ -1895,7 +1984,7 @@ proto_cmd_reload(struct proto *p, uintptr_t dir, int cnt UNUSED)
|
||||
/* All channels must support reload */
|
||||
if (dir != CMD_RELOAD_OUT)
|
||||
WALK_LIST(c, p->channels)
|
||||
if (!channel_reloadable(c))
|
||||
if ((c->channel_state == CS_UP) && !channel_reloadable(c))
|
||||
{
|
||||
cli_msg(-8006, "%s: reload failed", p->name);
|
||||
return;
|
||||
@ -1906,12 +1995,14 @@ proto_cmd_reload(struct proto *p, uintptr_t dir, int cnt UNUSED)
|
||||
/* re-importing routes */
|
||||
if (dir != CMD_RELOAD_OUT)
|
||||
WALK_LIST(c, p->channels)
|
||||
channel_request_reload(c);
|
||||
if (c->channel_state == CS_UP)
|
||||
channel_request_reload(c);
|
||||
|
||||
/* re-exporting routes */
|
||||
if (dir != CMD_RELOAD_IN)
|
||||
WALK_LIST(c, p->channels)
|
||||
channel_request_feeding(c);
|
||||
if (c->channel_state == CS_UP)
|
||||
channel_request_feeding(c);
|
||||
|
||||
cli_msg(-15, "%s: reloading", p->name);
|
||||
}
|
||||
@ -1937,7 +2028,7 @@ proto_apply_cmd_symbol(struct symbol *s, void (* cmd)(struct proto *, uintptr_t,
|
||||
return;
|
||||
}
|
||||
|
||||
cmd(((struct proto_config *)s->def)->proto, arg, 0);
|
||||
cmd(s->proto->proto, arg, 0);
|
||||
cli_msg(0, "");
|
||||
}
|
||||
|
||||
@ -1980,7 +2071,7 @@ proto_get_named(struct symbol *sym, struct protocol *pr)
|
||||
if (sym->class != SYM_PROTO)
|
||||
cf_error("%s: Not a protocol", sym->name);
|
||||
|
||||
p = ((struct proto_config *) sym->def)->proto;
|
||||
p = sym->proto->proto;
|
||||
if (!p || p->proto != pr)
|
||||
cf_error("%s: Not a %s protocol", sym->name, pr->name);
|
||||
}
|
||||
|
@ -91,6 +91,7 @@ void protos_build(void);
|
||||
void proto_build(struct protocol *);
|
||||
void protos_preconfig(struct config *);
|
||||
void protos_commit(struct config *new, struct config *old, int force_restart, int type);
|
||||
struct proto * proto_spawn(struct proto_config *cf, uint disabled);
|
||||
void protos_dump_all(void);
|
||||
|
||||
#define GA_UNKNOWN 0 /* Attribute not recognized */
|
||||
@ -115,11 +116,13 @@ struct proto_config {
|
||||
struct config *global; /* Global configuration data */
|
||||
struct protocol *protocol; /* Protocol */
|
||||
struct proto *proto; /* Instance we've created */
|
||||
struct proto_config *parent; /* Parent proto_config for dynamic protocols */
|
||||
char *name;
|
||||
char *dsc;
|
||||
int class; /* SYM_PROTO or SYM_TEMPLATE */
|
||||
u8 net_type; /* Protocol network type (NET_*), 0 for undefined */
|
||||
u8 disabled; /* Protocol enabled/disabled by default */
|
||||
u8 vrf_set; /* Related VRF instance (below) is defined */
|
||||
u32 debug, mrtdump; /* Debugging bitfields, both use D_* constants */
|
||||
u32 router_id; /* Protocol specific router ID */
|
||||
|
||||
@ -176,6 +179,7 @@ struct proto {
|
||||
uint active_channels; /* Number of active channels */
|
||||
byte net_type; /* Protocol network type (NET_*), 0 for undefined */
|
||||
byte disabled; /* Manually disabled */
|
||||
byte vrf_set; /* Related VRF instance (above) is defined */
|
||||
byte proto_state; /* Protocol state machine (PS_*, see below) */
|
||||
byte active; /* From PS_START to cleanup after PS_STOP */
|
||||
byte do_start; /* Start actions are scheduled */
|
||||
@ -257,6 +261,7 @@ struct proto_spec {
|
||||
#define PDC_CMD_DISABLE 0x11 /* Result of disable command */
|
||||
#define PDC_CMD_RESTART 0x12 /* Result of restart command */
|
||||
#define PDC_CMD_SHUTDOWN 0x13 /* Result of global shutdown */
|
||||
#define PDC_CMD_GR_DOWN 0x14 /* Result of global graceful restart */
|
||||
#define PDC_RX_LIMIT_HIT 0x21 /* Route receive limit reached */
|
||||
#define PDC_IN_LIMIT_HIT 0x22 /* Route import limit reached */
|
||||
#define PDC_OUT_LIMIT_HIT 0x23 /* Route export limit reached */
|
||||
@ -265,6 +270,7 @@ struct proto_spec {
|
||||
void *proto_new(struct proto_config *);
|
||||
void *proto_config_new(struct protocol *, int class);
|
||||
void proto_copy_config(struct proto_config *dest, struct proto_config *src);
|
||||
void proto_clone_config(struct symbol *sym, struct proto_config *parent);
|
||||
void proto_set_message(struct proto *p, char *msg, int len);
|
||||
|
||||
void graceful_restart_recovery(void);
|
||||
@ -447,7 +453,7 @@ struct channel_class {
|
||||
uint config_size; /* Size of channel config data structure */
|
||||
|
||||
void (*init)(struct channel *, struct channel_config *); /* Create new instance */
|
||||
int (*reconfigure)(struct channel *, struct channel_config *); /* Try to reconfigure instance, returns success */
|
||||
int (*reconfigure)(struct channel *, struct channel_config *, int *import_changed, int *export_changed); /* Try to reconfigure instance, returns success */
|
||||
int (*start)(struct channel *); /* Start the instance */
|
||||
void (*shutdown)(struct channel *); /* Stop the instance */
|
||||
void (*cleanup)(struct channel *); /* Channel finished flush */
|
||||
@ -479,7 +485,7 @@ struct channel_config {
|
||||
|
||||
struct proto_config *parent; /* Where channel is defined (proto or template) */
|
||||
struct rtable_config *table; /* Table we're attached to */
|
||||
struct filter *in_filter, *out_filter; /* Attached filters */
|
||||
const struct filter *in_filter, *out_filter; /* Attached filters */
|
||||
struct channel_limit rx_limit; /* Limit for receiving routes from protocol
|
||||
(relevant when in_keep_filtered is active) */
|
||||
struct channel_limit in_limit; /* Limit for importing routes from protocol */
|
||||
@ -501,8 +507,8 @@ struct channel {
|
||||
struct proto *proto;
|
||||
|
||||
struct rtable *table;
|
||||
struct filter_slot in_filter; /* Input filter */
|
||||
struct filter_slot out_filter; /* Output filter */
|
||||
struct filter_slot in_filter; /* Input filter */
|
||||
struct filter_slot out_filter; /* Output filter */
|
||||
struct channel_limit rx_limit; /* Receive limit (for in_keep_filtered) */
|
||||
struct channel_limit in_limit; /* Input limit */
|
||||
struct channel_limit out_limit; /* Output limit */
|
||||
@ -533,8 +539,11 @@ struct channel {
|
||||
|
||||
struct rtable *in_table; /* Internal table for received routes */
|
||||
struct event *reload_event; /* Event responsible for reloading from in_table */
|
||||
struct fib_iterator reload_fit; /* Iterator in in_table used during reloading */
|
||||
struct fib_iterator reload_fit; /* FIB iterator in in_table used during reloading */
|
||||
struct rte *reload_next_rte; /* Route iterator in in_table used during reloading */
|
||||
u8 reload_active; /* Iterator reload_fit is linked */
|
||||
|
||||
struct rtable *out_table; /* Internal table for exported routes */
|
||||
};
|
||||
|
||||
|
||||
@ -603,6 +612,7 @@ int proto_configure_channel(struct proto *p, struct channel **c, struct channel_
|
||||
|
||||
void channel_set_state(struct channel *c, uint state);
|
||||
void channel_setup_in_table(struct channel *c);
|
||||
void channel_setup_out_table(struct channel *c);
|
||||
void channel_schedule_reload(struct channel *c);
|
||||
|
||||
static inline void channel_init(struct channel *c) { channel_set_state(c, CS_START); }
|
||||
|
12
nest/route.h
12
nest/route.h
@ -327,6 +327,7 @@ int rte_update_in(struct channel *c, const net_addr *n, rte *new, struct rte_src
|
||||
int rt_reload_channel(struct channel *c);
|
||||
void rt_reload_channel_abort(struct channel *c);
|
||||
void rt_prune_sync(rtable *t, int all);
|
||||
int rte_update_out(struct channel *c, const net_addr *n, rte *new, rte *old0, int refeed);
|
||||
struct rtable_config *rt_new_table(struct symbol *s, uint addr_type);
|
||||
|
||||
typedef struct rt_notify {
|
||||
@ -350,7 +351,7 @@ struct rt_show_data {
|
||||
struct rt_show_data_rtable *last_table; /* Last table in output */
|
||||
struct fib_iterator fit; /* Iterator over networks in table */
|
||||
int verbose, tables_defined_by;
|
||||
struct filter *filter;
|
||||
const struct filter *filter;
|
||||
struct proto *show_protocol;
|
||||
struct proto *export_protocol;
|
||||
struct channel *export_channel;
|
||||
@ -488,7 +489,7 @@ typedef struct eattr {
|
||||
byte type; /* Attribute type and several flags (EAF_...) */
|
||||
union {
|
||||
u32 data;
|
||||
struct adata *ptr; /* Attribute data elsewhere */
|
||||
const struct adata *ptr; /* Attribute data elsewhere */
|
||||
} u;
|
||||
} eattr;
|
||||
|
||||
@ -509,6 +510,7 @@ const char *ea_custom_name(uint ea);
|
||||
#define EA_CUSTOM_BIT 0x8000
|
||||
#define EA_ALLOW_UNDEF 0x10000 /* ea_find: allow EAF_TYPE_UNDEF */
|
||||
#define EA_BIT(n) ((n) << 24) /* Used in bitfield accessors */
|
||||
#define EA_BIT_GET(ea) ((ea) >> 24)
|
||||
|
||||
#define EAF_TYPE_MASK 0x1f /* Mask with this to get type */
|
||||
#define EAF_TYPE_INT 0x01 /* 32-bit unsigned integer number */
|
||||
@ -531,6 +533,8 @@ typedef struct adata {
|
||||
byte data[0];
|
||||
} adata;
|
||||
|
||||
extern const adata null_adata; /* adata of length 0 */
|
||||
|
||||
static inline struct adata *
|
||||
lp_alloc_adata(struct linpool *pool, uint len)
|
||||
{
|
||||
@ -539,7 +543,7 @@ lp_alloc_adata(struct linpool *pool, uint len)
|
||||
return ad;
|
||||
}
|
||||
|
||||
static inline int adata_same(struct adata *a, struct adata *b)
|
||||
static inline int adata_same(const struct adata *a, const struct adata *b)
|
||||
{ return (a->length == b->length && !memcmp(a->data, b->data, a->length)); }
|
||||
|
||||
|
||||
@ -639,6 +643,7 @@ int nexthop__same(struct nexthop *x, struct nexthop *y); /* Compare multipath ne
|
||||
static inline int nexthop_same(struct nexthop *x, struct nexthop *y)
|
||||
{ return (x == y) || nexthop__same(x, y); }
|
||||
struct nexthop *nexthop_merge(struct nexthop *x, struct nexthop *y, int rx, int ry, int max, linpool *lp);
|
||||
struct nexthop *nexthop_sort(struct nexthop *x);
|
||||
static inline void nexthop_link(struct rta *a, struct nexthop *from)
|
||||
{ memcpy(&a->nh, from, nexthop_size(from)); }
|
||||
void nexthop_insert(struct nexthop **n, struct nexthop *y);
|
||||
@ -658,6 +663,7 @@ void rta_dump(rta *);
|
||||
void rta_dump_all(void);
|
||||
void rta_show(struct cli *, rta *);
|
||||
|
||||
u32 rt_get_igp_metric(rte *rt);
|
||||
struct hostentry * rt_get_hostentry(rtable *tab, ip_addr a, ip_addr ll, rtable *dep);
|
||||
void rta_apply_hostentry(rta *a, struct hostentry *he, mpls_label_stack *mls);
|
||||
|
||||
|
@ -58,6 +58,8 @@
|
||||
|
||||
#include <stddef.h>
|
||||
|
||||
const adata null_adata; /* adata of length 0 */
|
||||
|
||||
const char * const rta_src_names[RTS_MAX] = {
|
||||
[RTS_DUMMY] = "",
|
||||
[RTS_STATIC] = "static",
|
||||
@ -200,7 +202,7 @@ nexthop__same(struct nexthop *x, struct nexthop *y)
|
||||
}
|
||||
|
||||
static int
|
||||
nexthop_compare_node(struct nexthop *x, struct nexthop *y)
|
||||
nexthop_compare_node(const struct nexthop *x, const struct nexthop *y)
|
||||
{
|
||||
int r;
|
||||
|
||||
@ -318,6 +320,24 @@ nexthop_insert(struct nexthop **n, struct nexthop *x)
|
||||
*n = x;
|
||||
}
|
||||
|
||||
struct nexthop *
|
||||
nexthop_sort(struct nexthop *x)
|
||||
{
|
||||
struct nexthop *s = NULL;
|
||||
|
||||
/* Simple insert-sort */
|
||||
while (x)
|
||||
{
|
||||
struct nexthop *n = x;
|
||||
x = n->next;
|
||||
n->next = NULL;
|
||||
|
||||
nexthop_insert(&s, n);
|
||||
}
|
||||
|
||||
return s;
|
||||
}
|
||||
|
||||
int
|
||||
nexthop_is_sorted(struct nexthop *x)
|
||||
{
|
||||
@ -759,7 +779,7 @@ ea_free(ea_list *o)
|
||||
{
|
||||
eattr *a = &o->attrs[i];
|
||||
if (!(a->type & EAF_EMBEDDED))
|
||||
mb_free(a->u.ptr);
|
||||
mb_free((void *) a->u.ptr);
|
||||
}
|
||||
mb_free(o);
|
||||
}
|
||||
@ -804,7 +824,7 @@ ea_format_bitfield(struct eattr *a, byte *buf, int bufsize, const char **names,
|
||||
}
|
||||
|
||||
static inline void
|
||||
opaque_format(struct adata *ad, byte *buf, uint size)
|
||||
opaque_format(const struct adata *ad, byte *buf, uint size)
|
||||
{
|
||||
byte *bound = buf + size - 10;
|
||||
uint i;
|
||||
@ -827,7 +847,7 @@ opaque_format(struct adata *ad, byte *buf, uint size)
|
||||
}
|
||||
|
||||
static inline void
|
||||
ea_show_int_set(struct cli *c, struct adata *ad, int way, byte *pos, byte *buf, byte *end)
|
||||
ea_show_int_set(struct cli *c, const struct adata *ad, int way, byte *pos, byte *buf, byte *end)
|
||||
{
|
||||
int i = int_set_format(ad, way, 0, pos, end - pos);
|
||||
cli_printf(c, -1012, "\t%s", buf);
|
||||
@ -839,7 +859,7 @@ ea_show_int_set(struct cli *c, struct adata *ad, int way, byte *pos, byte *buf,
|
||||
}
|
||||
|
||||
static inline void
|
||||
ea_show_ec_set(struct cli *c, struct adata *ad, byte *pos, byte *buf, byte *end)
|
||||
ea_show_ec_set(struct cli *c, const struct adata *ad, byte *pos, byte *buf, byte *end)
|
||||
{
|
||||
int i = ec_set_format(ad, 0, pos, end - pos);
|
||||
cli_printf(c, -1012, "\t%s", buf);
|
||||
@ -851,7 +871,7 @@ ea_show_ec_set(struct cli *c, struct adata *ad, byte *pos, byte *buf, byte *end)
|
||||
}
|
||||
|
||||
static inline void
|
||||
ea_show_lc_set(struct cli *c, struct adata *ad, byte *pos, byte *buf, byte *end)
|
||||
ea_show_lc_set(struct cli *c, const struct adata *ad, byte *pos, byte *buf, byte *end)
|
||||
{
|
||||
int i = lc_set_format(ad, 0, pos, end - pos);
|
||||
cli_printf(c, -1012, "\t%s", buf);
|
||||
@ -878,7 +898,7 @@ ea_show(struct cli *c, eattr *e)
|
||||
{
|
||||
struct protocol *p;
|
||||
int status = GA_UNKNOWN;
|
||||
struct adata *ad = (e->type & EAF_EMBEDDED) ? NULL : e->u.ptr;
|
||||
const struct adata *ad = (e->type & EAF_EMBEDDED) ? NULL : e->u.ptr;
|
||||
byte buf[CLI_MSG_SIZE];
|
||||
byte *pos = buf, *end = buf + sizeof(buf);
|
||||
|
||||
@ -1017,7 +1037,7 @@ ea_hash(ea_list *e)
|
||||
h ^= a->u.data;
|
||||
else
|
||||
{
|
||||
struct adata *d = a->u.ptr;
|
||||
const struct adata *d = a->u.ptr;
|
||||
h ^= mem_hash(d->data, d->length);
|
||||
}
|
||||
h *= mul;
|
||||
|
171
nest/rt-table.c
171
nest/rt-table.c
@ -39,10 +39,15 @@
|
||||
#include "lib/string.h"
|
||||
#include "conf/conf.h"
|
||||
#include "filter/filter.h"
|
||||
#include "filter/data.h"
|
||||
#include "lib/hash.h"
|
||||
#include "lib/string.h"
|
||||
#include "lib/alloca.h"
|
||||
|
||||
#ifdef CONFIG_BGP
|
||||
#include "proto/bgp/bgp.h"
|
||||
#endif
|
||||
|
||||
pool *rt_table_pool;
|
||||
|
||||
static slab *rte_slab;
|
||||
@ -567,7 +572,7 @@ static rte *
|
||||
export_filter_(struct channel *c, rte *rt0, rte **rt_free, linpool *pool, int silent)
|
||||
{
|
||||
struct proto *p = c->proto;
|
||||
struct filter *filter = c->out_filter.filter;
|
||||
const struct filter *filter = c->out_filter.filter;
|
||||
struct proto_stats *stats = &c->stats;
|
||||
rte *rt;
|
||||
int v;
|
||||
@ -632,7 +637,6 @@ do_rt_notify(struct channel *c, net *net, rte *new, rte *old, int refeed)
|
||||
struct proto *p = c->proto;
|
||||
struct proto_stats *stats = &c->stats;
|
||||
|
||||
|
||||
/*
|
||||
* First, apply export limit.
|
||||
*
|
||||
@ -678,6 +682,8 @@ do_rt_notify(struct channel *c, net *net, rte *new, rte *old, int refeed)
|
||||
}
|
||||
}
|
||||
|
||||
if (c->out_table && !rte_update_out(c, net->n.addr, new, old, refeed))
|
||||
return;
|
||||
|
||||
if (new)
|
||||
stats->exp_updates_accepted++;
|
||||
@ -1546,7 +1552,7 @@ rte_update2(struct channel *c, const net_addr *n, rte *new, struct rte_src *src)
|
||||
{
|
||||
struct proto *p = c->proto;
|
||||
struct proto_stats *stats = &c->stats;
|
||||
struct filter *filter = c->in_filter.filter;
|
||||
const struct filter *filter = c->in_filter.filter;
|
||||
rte *dummy = NULL;
|
||||
net *nn;
|
||||
|
||||
@ -1587,7 +1593,7 @@ rte_update2(struct channel *c, const net_addr *n, rte *new, struct rte_src *src)
|
||||
}
|
||||
else if (filter)
|
||||
{
|
||||
rta *old_attrs;
|
||||
rta *old_attrs = NULL;
|
||||
rte_make_tmp_attrs(&new, rte_update_pool, &old_attrs);
|
||||
|
||||
int fr = f_run(&(c->in_filter), &new, rte_update_pool, 0);
|
||||
@ -2116,11 +2122,13 @@ no_nexthop:
|
||||
else
|
||||
{
|
||||
nhr = nhp;
|
||||
nhp = (nhp ? (nhp->next = lp_allocz(rte_update_pool, NEXTHOP_MAX_SIZE)) : &(a->nh));
|
||||
nhp = (nhp ? (nhp->next = lp_alloc(rte_update_pool, NEXTHOP_MAX_SIZE)) : &(a->nh));
|
||||
}
|
||||
|
||||
memset(nhp, 0, NEXTHOP_MAX_SIZE);
|
||||
nhp->iface = nh->iface;
|
||||
nhp->weight = nh->weight;
|
||||
|
||||
if (mls)
|
||||
{
|
||||
nhp->labels = nh->labels + mls->len;
|
||||
@ -2138,11 +2146,20 @@ no_nexthop:
|
||||
continue;
|
||||
}
|
||||
}
|
||||
else if (nh->labels)
|
||||
{
|
||||
nhp->labels = nh->labels;
|
||||
nhp->labels_orig = 0;
|
||||
memcpy(nhp->label, nh->label, nh->labels * sizeof(u32));
|
||||
}
|
||||
|
||||
if (ipa_nonzero(nh->gw))
|
||||
{
|
||||
nhp->gw = nh->gw; /* Router nexthop */
|
||||
nhp->flags |= (nh->flags & RNF_ONLINK);
|
||||
}
|
||||
else if (!(nh->iface->flags & IF_MULTIACCESS) || (nh->iface->flags & IF_LOOPBACK))
|
||||
nhp->gw = IPA_NONE; /* PtP link - no need for nexthop */
|
||||
else if (ipa_nonzero(he->link))
|
||||
nhp->gw = he->link; /* Device nexthop with link-local address known */
|
||||
else
|
||||
@ -2292,13 +2309,13 @@ rt_new_table(struct symbol *s, uint addr_type)
|
||||
{
|
||||
/* Hack that allows to 'redefine' the master table */
|
||||
if ((s->class == SYM_TABLE) &&
|
||||
(s->def == new_config->def_tables[addr_type]) &&
|
||||
(s->table == new_config->def_tables[addr_type]) &&
|
||||
((addr_type == NET_IP4) || (addr_type == NET_IP6)))
|
||||
return s->def;
|
||||
return s->table;
|
||||
|
||||
struct rtable_config *c = cfg_allocz(sizeof(struct rtable_config));
|
||||
|
||||
cf_define_symbol(s, SYM_TABLE, c);
|
||||
cf_define_symbol(s, SYM_TABLE, table, c);
|
||||
c->name = s->name;
|
||||
c->addr_type = addr_type;
|
||||
c->gc_max_ops = 1000;
|
||||
@ -2358,7 +2375,7 @@ static struct rtable_config *
|
||||
rt_find_table_config(struct config *cf, char *name)
|
||||
{
|
||||
struct symbol *sym = cf_find_symbol(cf, name);
|
||||
return (sym && (sym->class == SYM_TABLE)) ? sym->def : NULL;
|
||||
return (sym && (sym->class == SYM_TABLE)) ? sym->table : NULL;
|
||||
}
|
||||
|
||||
/**
|
||||
@ -2520,6 +2537,10 @@ rt_feed_channel_abort(struct channel *c)
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Import table
|
||||
*/
|
||||
|
||||
int
|
||||
rte_update_in(struct channel *c, const net_addr *n, rte *new, struct rte_src *src)
|
||||
{
|
||||
@ -2561,6 +2582,10 @@ rte_update_in(struct channel *c, const net_addr *n, rte *new, struct rte_src *sr
|
||||
goto drop_update;
|
||||
}
|
||||
|
||||
/* Move iterator if needed */
|
||||
if (old == c->reload_next_rte)
|
||||
c->reload_next_rte = old->next;
|
||||
|
||||
/* Remove the old rte */
|
||||
*pos = old->next;
|
||||
rte_free_quick(old);
|
||||
@ -2628,21 +2653,32 @@ rt_reload_channel(struct channel *c)
|
||||
c->reload_active = 1;
|
||||
}
|
||||
|
||||
FIB_ITERATE_START(&tab->fib, fit, net, n)
|
||||
{
|
||||
if (max_feed <= 0)
|
||||
do {
|
||||
for (rte *e = c->reload_next_rte; e; e = e->next)
|
||||
{
|
||||
FIB_ITERATE_PUT(fit);
|
||||
return 0;
|
||||
if (max_feed-- <= 0)
|
||||
{
|
||||
c->reload_next_rte = e;
|
||||
debug("%s channel reload burst split (max_feed=%d)", c->proto->name, max_feed);
|
||||
return 0;
|
||||
}
|
||||
|
||||
rte_update2(c, e->net->n.addr, rte_do_cow(e), e->attrs->src);
|
||||
}
|
||||
|
||||
for (rte *e = n->routes; e; e = e->next)
|
||||
c->reload_next_rte = NULL;
|
||||
|
||||
FIB_ITERATE_START(&tab->fib, fit, net, n)
|
||||
{
|
||||
rte_update2(c, n->n.addr, rte_do_cow(e), e->attrs->src);
|
||||
max_feed--;
|
||||
if (c->reload_next_rte = n->routes)
|
||||
{
|
||||
FIB_ITERATE_PUT_NEXT(fit, &tab->fib);
|
||||
break;
|
||||
}
|
||||
}
|
||||
FIB_ITERATE_END;
|
||||
}
|
||||
FIB_ITERATE_END;
|
||||
while (c->reload_next_rte);
|
||||
|
||||
c->reload_active = 0;
|
||||
return 1;
|
||||
@ -2655,6 +2691,7 @@ rt_reload_channel_abort(struct channel *c)
|
||||
{
|
||||
/* Unlink the iterator */
|
||||
fit_get(&c->in_table->fib, &c->reload_fit);
|
||||
c->reload_next_rte = NULL;
|
||||
c->reload_active = 0;
|
||||
}
|
||||
}
|
||||
@ -2681,6 +2718,94 @@ rt_prune_sync(rtable *t, int all)
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Export table
|
||||
*/
|
||||
|
||||
int
|
||||
rte_update_out(struct channel *c, const net_addr *n, rte *new, rte *old0, int refeed)
|
||||
{
|
||||
struct rtable *tab = c->out_table;
|
||||
struct rte_src *src;
|
||||
rte *old, **pos;
|
||||
net *net;
|
||||
|
||||
if (new)
|
||||
{
|
||||
net = net_get(tab, n);
|
||||
src = new->attrs->src;
|
||||
|
||||
rte_store_tmp_attrs(new, rte_update_pool, NULL);
|
||||
|
||||
if (!rta_is_cached(new->attrs))
|
||||
new->attrs = rta_lookup(new->attrs);
|
||||
}
|
||||
else
|
||||
{
|
||||
net = net_find(tab, n);
|
||||
src = old0->attrs->src;
|
||||
|
||||
if (!net)
|
||||
goto drop_withdraw;
|
||||
}
|
||||
|
||||
/* Find the old rte */
|
||||
for (pos = &net->routes; old = *pos; pos = &old->next)
|
||||
if (old->attrs->src == src)
|
||||
{
|
||||
if (new && rte_same(old, new))
|
||||
{
|
||||
/* REF_STALE / REF_DISCARD not used in export table */
|
||||
/*
|
||||
if (old->flags & (REF_STALE | REF_DISCARD | REF_MODIFY))
|
||||
{
|
||||
old->flags &= ~(REF_STALE | REF_DISCARD | REF_MODIFY);
|
||||
return 1;
|
||||
}
|
||||
*/
|
||||
|
||||
goto drop_update;
|
||||
}
|
||||
|
||||
/* Remove the old rte */
|
||||
*pos = old->next;
|
||||
rte_free_quick(old);
|
||||
tab->rt_count--;
|
||||
|
||||
break;
|
||||
}
|
||||
|
||||
if (!new)
|
||||
{
|
||||
if (!old)
|
||||
goto drop_withdraw;
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
/* Insert the new rte */
|
||||
rte *e = rte_do_cow(new);
|
||||
e->flags |= REF_COW;
|
||||
e->net = net;
|
||||
e->sender = c;
|
||||
e->lastmod = current_time();
|
||||
e->next = *pos;
|
||||
*pos = e;
|
||||
tab->rt_count++;
|
||||
return 1;
|
||||
|
||||
drop_update:
|
||||
return refeed;
|
||||
|
||||
drop_withdraw:
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Hostcache
|
||||
*/
|
||||
|
||||
static inline u32
|
||||
hc_hash(ip_addr a, rtable *dep)
|
||||
{
|
||||
@ -2838,7 +2963,7 @@ if_local_addr(ip_addr a, struct iface *i)
|
||||
return 0;
|
||||
}
|
||||
|
||||
static u32
|
||||
u32
|
||||
rt_get_igp_metric(rte *rt)
|
||||
{
|
||||
eattr *ea = ea_find(rt->attrs->eattrs, EA_GEN_IGP_METRIC);
|
||||
@ -2860,6 +2985,14 @@ rt_get_igp_metric(rte *rt)
|
||||
return rt->u.rip.metric;
|
||||
#endif
|
||||
|
||||
#ifdef CONFIG_BGP
|
||||
if (a->source == RTS_BGP)
|
||||
{
|
||||
u64 metric = bgp_total_aigp_metric(rt);
|
||||
return (u32) MIN(metric, (u64) IGP_METRIC_UNKNOWN);
|
||||
}
|
||||
#endif
|
||||
|
||||
if (a->source == RTS_DEVICE)
|
||||
return 0;
|
||||
|
||||
|
@ -129,16 +129,16 @@ dynamic_attr: BABEL_METRIC { $$ = f_new_dynamic_attr(EAF_TYPE_INT, T_INT, EA_BAB
|
||||
|
||||
CF_CLI_HELP(SHOW BABEL, ..., [[Show information about Babel protocol]]);
|
||||
|
||||
CF_CLI(SHOW BABEL INTERFACES, optsym opttext, [<name>] [\"<interface>\"], [[Show information about Babel interfaces]])
|
||||
CF_CLI(SHOW BABEL INTERFACES, optproto opttext, [<name>] [\"<interface>\"], [[Show information about Babel interfaces]])
|
||||
{ babel_show_interfaces(proto_get_named($4, &proto_babel), $5); };
|
||||
|
||||
CF_CLI(SHOW BABEL NEIGHBORS, optsym opttext, [<name>] [\"<interface>\"], [[Show information about Babel neighbors]])
|
||||
CF_CLI(SHOW BABEL NEIGHBORS, optproto opttext, [<name>] [\"<interface>\"], [[Show information about Babel neighbors]])
|
||||
{ babel_show_neighbors(proto_get_named($4, &proto_babel), $5); };
|
||||
|
||||
CF_CLI(SHOW BABEL ENTRIES, optsym opttext, [<name>], [[Show information about Babel prefix entries]])
|
||||
CF_CLI(SHOW BABEL ENTRIES, optproto opttext, [<name>], [[Show information about Babel prefix entries]])
|
||||
{ babel_show_entries(proto_get_named($4, &proto_babel)); };
|
||||
|
||||
CF_CLI(SHOW BABEL ROUTES, optsym opttext, [<name>], [[Show information about Babel route entries]])
|
||||
CF_CLI(SHOW BABEL ROUTES, optproto opttext, [<name>], [[Show information about Babel route entries]])
|
||||
{ babel_show_routes(proto_get_named($4, &proto_babel)); };
|
||||
|
||||
CF_CODE
|
||||
|
@ -624,6 +624,9 @@ bfd_request_notify(struct bfd_request *req, u8 state, u8 diag)
|
||||
static int
|
||||
bfd_add_request(struct bfd_proto *p, struct bfd_request *req)
|
||||
{
|
||||
if (p->p.vrf_set && (p->p.vrf != req->vrf))
|
||||
return 0;
|
||||
|
||||
struct bfd_session *s = bfd_find_session_by_addr(p, req->addr);
|
||||
u8 state, diag;
|
||||
|
||||
@ -685,7 +688,8 @@ bfd_drop_requests(struct bfd_proto *p)
|
||||
static struct resclass bfd_request_class;
|
||||
|
||||
struct bfd_request *
|
||||
bfd_request_session(pool *p, ip_addr addr, ip_addr local, struct iface *iface,
|
||||
bfd_request_session(pool *p, ip_addr addr, ip_addr local,
|
||||
struct iface *iface, struct iface *vrf,
|
||||
void (*hook)(struct bfd_request *), void *data)
|
||||
{
|
||||
struct bfd_request *req = ralloc(p, &bfd_request_class);
|
||||
@ -696,6 +700,7 @@ bfd_request_session(pool *p, ip_addr addr, ip_addr local, struct iface *iface,
|
||||
req->addr = addr;
|
||||
req->local = local;
|
||||
req->iface = iface;
|
||||
req->vrf = vrf;
|
||||
|
||||
bfd_submit_request(req);
|
||||
|
||||
@ -754,7 +759,7 @@ bfd_neigh_notify(struct neighbor *nb)
|
||||
if ((nb->scope > 0) && !n->req)
|
||||
{
|
||||
ip_addr local = ipa_nonzero(n->local) ? n->local : nb->ifa->ip;
|
||||
n->req = bfd_request_session(p->p.pool, n->addr, local, nb->iface, NULL, NULL);
|
||||
n->req = bfd_request_session(p->p.pool, n->addr, local, nb->iface, p->p.vrf, NULL, NULL);
|
||||
}
|
||||
|
||||
if ((nb->scope <= 0) && n->req)
|
||||
@ -771,7 +776,7 @@ bfd_start_neighbor(struct bfd_proto *p, struct bfd_neighbor *n)
|
||||
|
||||
if (n->multihop)
|
||||
{
|
||||
n->req = bfd_request_session(p->p.pool, n->addr, n->local, NULL, NULL, NULL);
|
||||
n->req = bfd_request_session(p->p.pool, n->addr, n->local, NULL, p->p.vrf, NULL, NULL);
|
||||
return;
|
||||
}
|
||||
|
||||
@ -832,10 +837,11 @@ bfd_reconfigure_neighbors(struct bfd_proto *p, struct bfd_config *new)
|
||||
|
||||
nn->req = on->req;
|
||||
nn->active = 1;
|
||||
return;
|
||||
goto next;
|
||||
}
|
||||
|
||||
bfd_stop_neighbor(p, on);
|
||||
next:;
|
||||
}
|
||||
|
||||
WALK_LIST(nn, new->neigh_list)
|
||||
@ -1051,15 +1057,6 @@ bfd_reconfigure(struct proto *P, struct proto_config *c)
|
||||
return 1;
|
||||
}
|
||||
|
||||
/* Ensure one instance */
|
||||
struct bfd_config *bfd_cf;
|
||||
|
||||
static void
|
||||
bfd_preconfig(struct protocol *P UNUSED, struct config *c UNUSED)
|
||||
{
|
||||
bfd_cf = NULL;
|
||||
}
|
||||
|
||||
static void
|
||||
bfd_copy_config(struct proto_config *dest, struct proto_config *src UNUSED)
|
||||
{
|
||||
@ -1088,7 +1085,7 @@ bfd_show_sessions(struct proto *P)
|
||||
}
|
||||
|
||||
cli_msg(-1020, "%s:", p->p.name);
|
||||
cli_msg(-1020, "%-25s %-10s %-10s %-10s %8s %8s",
|
||||
cli_msg(-1020, "%-25s %-10s %-10s %-12s %8s %8s",
|
||||
"IP address", "Interface", "State", "Since", "Interval", "Timeout");
|
||||
|
||||
|
||||
@ -1104,7 +1101,7 @@ bfd_show_sessions(struct proto *P)
|
||||
state = (state < 4) ? state : 0;
|
||||
tm_format_time(tbuf, &config->tf_proto, s->last_state_change);
|
||||
|
||||
cli_msg(-1020, "%-25I %-10s %-10s %-10s %7t %7t",
|
||||
cli_msg(-1020, "%-25I %-10s %-10s %-12s %7t %7t",
|
||||
s->addr, ifname, bfd_state_names[state], tbuf, tx_int, timeout);
|
||||
}
|
||||
HASH_WALK_END;
|
||||
@ -1123,6 +1120,5 @@ struct protocol proto_bfd = {
|
||||
.start = bfd_start,
|
||||
.shutdown = bfd_shutdown,
|
||||
.reconfigure = bfd_reconfigure,
|
||||
.preconfig = bfd_preconfig,
|
||||
.copy_config = bfd_copy_config,
|
||||
};
|
||||
|
@ -38,10 +38,6 @@ bfd_proto_start: proto_start BFD
|
||||
this_proto = proto_config_new(&proto_bfd, $1);
|
||||
init_list(&BFD_CFG->patt_list);
|
||||
init_list(&BFD_CFG->neigh_list);
|
||||
|
||||
if (bfd_cf)
|
||||
cf_error("Only one BFD instance allowed");
|
||||
bfd_cf = BFD_CFG;
|
||||
};
|
||||
|
||||
bfd_proto_item:
|
||||
@ -134,7 +130,7 @@ bfd_multihop:
|
||||
|
||||
bfd_neigh_iface:
|
||||
/* empty */ { $$ = NULL; }
|
||||
| '%' SYM { $$ = if_get_by_name($2->name); }
|
||||
| '%' symbol { $$ = if_get_by_name($2->name); }
|
||||
| DEV text { $$ = if_get_by_name($2); }
|
||||
;
|
||||
|
||||
@ -167,7 +163,7 @@ bfd_neighbor: ipa bfd_neigh_iface bfd_neigh_local bfd_neigh_multihop
|
||||
|
||||
|
||||
CF_CLI_HELP(SHOW BFD, ..., [[Show information about BFD protocol]]);
|
||||
CF_CLI(SHOW BFD SESSIONS, optsym, [<name>], [[Show information about BFD sessions]])
|
||||
CF_CLI(SHOW BFD SESSIONS, optproto, [<name>], [[Show information about BFD sessions]])
|
||||
{ bfd_show_sessions(proto_get_named($4, &proto_bfd)); };
|
||||
|
||||
CF_CODE
|
||||
|
@ -413,6 +413,7 @@ bfd_open_rx_sk(struct bfd_proto *p, int multihop, int af)
|
||||
sk->type = SK_UDP;
|
||||
sk->subtype = af;
|
||||
sk->sport = !multihop ? BFD_CONTROL_PORT : BFD_MULTI_CTL_PORT;
|
||||
sk->vrf = p->p.vrf;
|
||||
sk->data = p;
|
||||
|
||||
sk->rbsize = BFD_MAX_LEN;
|
||||
@ -444,6 +445,7 @@ bfd_open_tx_sk(struct bfd_proto *p, ip_addr local, struct iface *ifa)
|
||||
sk->saddr = local;
|
||||
sk->dport = ifa ? BFD_CONTROL_PORT : BFD_MULTI_CTL_PORT;
|
||||
sk->iface = ifa;
|
||||
sk->vrf = p->p.vrf;
|
||||
sk->data = p;
|
||||
|
||||
sk->tbsize = BFD_MAX_LEN;
|
||||
|
@ -34,7 +34,7 @@
|
||||
* are probably inadequate.
|
||||
*
|
||||
* Loop detection based on AS_PATH causes updates to be withdrawn. RFC
|
||||
* 4271 does not explicitly specifiy the behavior in that case.
|
||||
* 4271 does not explicitly specify the behavior in that case.
|
||||
*
|
||||
* Loop detection related to route reflection (based on ORIGINATOR_ID
|
||||
* and CLUSTER_LIST) causes updates to be withdrawn. RFC 4456 8
|
||||
@ -181,7 +181,7 @@ bgp_encode_u32s(struct bgp_write_state *s UNUSED, eattr *a, byte *buf, uint size
|
||||
}
|
||||
|
||||
static int
|
||||
bgp_put_attr(byte *buf, uint size, uint code, uint flags, byte *data, uint len)
|
||||
bgp_put_attr(byte *buf, uint size, uint code, uint flags, const byte *data, uint len)
|
||||
{
|
||||
if (size < (4+len))
|
||||
return -1;
|
||||
@ -199,6 +199,179 @@ bgp_encode_raw(struct bgp_write_state *s UNUSED, eattr *a, byte *buf, uint size)
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* AIGP handling
|
||||
*/
|
||||
|
||||
static int
|
||||
bgp_aigp_valid(byte *data, uint len, char *err, uint elen)
|
||||
{
|
||||
byte *pos = data;
|
||||
char *err_dsc = NULL;
|
||||
uint err_val = 0;
|
||||
|
||||
#define BAD(DSC,VAL) ({ err_dsc = DSC; err_val = VAL; goto bad; })
|
||||
while (len)
|
||||
{
|
||||
if (len < 3)
|
||||
BAD("TLV framing error", len);
|
||||
|
||||
/* Process one TLV */
|
||||
uint ptype = pos[0];
|
||||
uint plen = get_u16(pos + 1);
|
||||
|
||||
if (len < plen)
|
||||
BAD("TLV framing error", plen);
|
||||
|
||||
if (plen < 3)
|
||||
BAD("Bad TLV length", plen);
|
||||
|
||||
if ((ptype == BGP_AIGP_METRIC) && (plen != 11))
|
||||
BAD("Bad AIGP TLV length", plen);
|
||||
|
||||
ADVANCE(pos, len, plen);
|
||||
}
|
||||
#undef BAD
|
||||
|
||||
return 1;
|
||||
|
||||
bad:
|
||||
if (err)
|
||||
if (bsnprintf(err, elen, "%s (%u) at %d", err_dsc, err_val, (int) (pos - data)) < 0)
|
||||
err[0] = 0;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static const byte *
|
||||
bgp_aigp_get_tlv(const struct adata *ad, uint type)
|
||||
{
|
||||
if (!ad)
|
||||
return NULL;
|
||||
|
||||
uint len = ad->length;
|
||||
const byte *pos = ad->data;
|
||||
|
||||
while (len)
|
||||
{
|
||||
uint ptype = pos[0];
|
||||
uint plen = get_u16(pos + 1);
|
||||
|
||||
if (ptype == type)
|
||||
return pos;
|
||||
|
||||
ADVANCE(pos, len, plen);
|
||||
}
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
static const struct adata *
|
||||
bgp_aigp_set_tlv(struct linpool *pool, const struct adata *ad, uint type, byte *data, uint dlen)
|
||||
{
|
||||
uint len = ad ? ad->length : 0;
|
||||
const byte *pos = ad ? ad->data : NULL;
|
||||
struct adata *res = lp_alloc_adata(pool, len + 3 + dlen);
|
||||
byte *dst = res->data;
|
||||
byte *tlv = NULL;
|
||||
int del = 0;
|
||||
|
||||
while (len)
|
||||
{
|
||||
uint ptype = pos[0];
|
||||
uint plen = get_u16(pos + 1);
|
||||
|
||||
/* Find position for new TLV */
|
||||
if ((ptype >= type) && !tlv)
|
||||
{
|
||||
tlv = dst;
|
||||
dst += 3 + dlen;
|
||||
}
|
||||
|
||||
/* Skip first matching TLV, copy others */
|
||||
if ((ptype == type) && !del)
|
||||
del = 1;
|
||||
else
|
||||
{
|
||||
memcpy(dst, pos, plen);
|
||||
dst += plen;
|
||||
}
|
||||
|
||||
ADVANCE(pos, len, plen);
|
||||
}
|
||||
|
||||
if (!tlv)
|
||||
{
|
||||
tlv = dst;
|
||||
dst += 3 + dlen;
|
||||
}
|
||||
|
||||
/* Store the TLD */
|
||||
put_u8(tlv + 0, type);
|
||||
put_u16(tlv + 1, 3 + dlen);
|
||||
memcpy(tlv + 3, data, dlen);
|
||||
|
||||
/* Update length */
|
||||
res->length = dst - res->data;
|
||||
|
||||
return res;
|
||||
}
|
||||
|
||||
static u64 UNUSED
|
||||
bgp_aigp_get_metric(const struct adata *ad, u64 def)
|
||||
{
|
||||
const byte *b = bgp_aigp_get_tlv(ad, BGP_AIGP_METRIC);
|
||||
return b ? get_u64(b + 3) : def;
|
||||
}
|
||||
|
||||
static const struct adata *
|
||||
bgp_aigp_set_metric(struct linpool *pool, const struct adata *ad, u64 metric)
|
||||
{
|
||||
byte data[8];
|
||||
put_u64(data, metric);
|
||||
return bgp_aigp_set_tlv(pool, ad, BGP_AIGP_METRIC, data, 8);
|
||||
}
|
||||
|
||||
int
|
||||
bgp_total_aigp_metric_(rte *e, u64 *metric, const struct adata **ad)
|
||||
{
|
||||
eattr *a = ea_find(e->attrs->eattrs, EA_CODE(PROTOCOL_BGP, BA_AIGP));
|
||||
if (!a)
|
||||
return 0;
|
||||
|
||||
const byte *b = bgp_aigp_get_tlv(a->u.ptr, BGP_AIGP_METRIC);
|
||||
if (!b)
|
||||
return 0;
|
||||
|
||||
u64 aigp = get_u64(b + 3);
|
||||
u64 step = e->attrs->igp_metric;
|
||||
|
||||
if (!rte_resolvable(e) || (step >= IGP_METRIC_UNKNOWN))
|
||||
step = BGP_AIGP_MAX;
|
||||
|
||||
if (!step)
|
||||
step = 1;
|
||||
|
||||
*ad = a->u.ptr;
|
||||
*metric = aigp + step;
|
||||
if (*metric < aigp)
|
||||
*metric = BGP_AIGP_MAX;
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
static inline int
|
||||
bgp_init_aigp_metric(rte *e, u64 *metric, const struct adata **ad)
|
||||
{
|
||||
if (e->attrs->source == RTS_BGP)
|
||||
return 0;
|
||||
|
||||
*metric = rt_get_igp_metric(e);
|
||||
*ad = NULL;
|
||||
return *metric < IGP_METRIC_UNKNOWN;
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Attribute hooks
|
||||
*/
|
||||
@ -234,15 +407,15 @@ bgp_format_origin(eattr *a, byte *buf, uint size UNUSED)
|
||||
static int
|
||||
bgp_encode_as_path(struct bgp_write_state *s, eattr *a, byte *buf, uint size)
|
||||
{
|
||||
byte *data = a->u.ptr->data;
|
||||
const byte *data = a->u.ptr->data;
|
||||
uint len = a->u.ptr->length;
|
||||
|
||||
if (!s->as4_session)
|
||||
{
|
||||
/* Prepare 16-bit AS_PATH (from 32-bit one) in a temporary buffer */
|
||||
byte *src = data;
|
||||
data = alloca(len);
|
||||
len = as_path_32to16(data, src, len);
|
||||
byte *dst = alloca(len);
|
||||
len = as_path_32to16(dst, data, len);
|
||||
data = dst;
|
||||
}
|
||||
|
||||
return bgp_put_attr(buf, size, BA_AS_PATH, a->flags, data, len);
|
||||
@ -381,15 +554,14 @@ bgp_decode_atomic_aggr(struct bgp_parse_state *s, uint code UNUSED, uint flags,
|
||||
static int
|
||||
bgp_encode_aggregator(struct bgp_write_state *s, eattr *a, byte *buf, uint size)
|
||||
{
|
||||
byte *data = a->u.ptr->data;
|
||||
const byte *data = a->u.ptr->data;
|
||||
uint len = a->u.ptr->length;
|
||||
|
||||
if (!s->as4_session)
|
||||
{
|
||||
/* Prepare 16-bit AGGREGATOR (from 32-bit one) in a temporary buffer */
|
||||
byte *src = data;
|
||||
data = alloca(6);
|
||||
len = aggregator_32to16(data, src);
|
||||
byte *dst = alloca(6);
|
||||
len = aggregator_32to16(dst, data);
|
||||
}
|
||||
|
||||
return bgp_put_attr(buf, size, BA_AGGREGATOR, a->flags, data, len);
|
||||
@ -415,7 +587,7 @@ bgp_decode_aggregator(struct bgp_parse_state *s, uint code UNUSED, uint flags, b
|
||||
static void
|
||||
bgp_format_aggregator(eattr *a, byte *buf, uint size UNUSED)
|
||||
{
|
||||
byte *data = a->u.ptr->data;
|
||||
const byte *data = a->u.ptr->data;
|
||||
|
||||
bsprintf(buf, "%I4 AS%u", get_ip4(data+4), get_u32(data+0));
|
||||
}
|
||||
@ -545,12 +717,13 @@ bgp_decode_mp_unreach_nlri(struct bgp_parse_state *s, uint code UNUSED, uint fla
|
||||
static void
|
||||
bgp_export_ext_community(struct bgp_export_state *s, eattr *a)
|
||||
{
|
||||
a->u.ptr = ec_set_del_nontrans(s->pool, a->u.ptr);
|
||||
struct adata *ad = ec_set_del_nontrans(s->pool, a->u.ptr);
|
||||
|
||||
if (a->u.ptr->length == 0)
|
||||
if (ad->length == 0)
|
||||
UNSET(a);
|
||||
|
||||
ec_set_sort_x(a->u.ptr);
|
||||
ec_set_sort_x(ad);
|
||||
a->u.ptr = ad;
|
||||
}
|
||||
|
||||
static void
|
||||
@ -604,6 +777,42 @@ bgp_decode_as4_path(struct bgp_parse_state *s, uint code UNUSED, uint flags, byt
|
||||
bgp_set_attr_ptr(to, s->pool, BA_AS4_PATH, flags, a);
|
||||
}
|
||||
|
||||
|
||||
static void
|
||||
bgp_export_aigp(struct bgp_export_state *s, eattr *a)
|
||||
{
|
||||
if (!s->channel->cf->aigp)
|
||||
UNSET(a);
|
||||
}
|
||||
|
||||
static void
|
||||
bgp_decode_aigp(struct bgp_parse_state *s, uint code UNUSED, uint flags, byte *data, uint len, ea_list **to)
|
||||
{
|
||||
char err[128];
|
||||
|
||||
/* Acceptability test postponed to bgp_finish_attrs() */
|
||||
|
||||
if ((flags ^ bgp_attr_table[BA_AIGP].flags) & (BAF_OPTIONAL | BAF_TRANSITIVE))
|
||||
DISCARD("Malformed AIGP attribute - conflicting flags (%02x)", flags);
|
||||
|
||||
if (!bgp_aigp_valid(data, len, err, sizeof(err)))
|
||||
DISCARD("Malformed AIGP attribute - %s", err);
|
||||
|
||||
bgp_set_attr_data(to, s->pool, BA_AIGP, flags, data, len);
|
||||
}
|
||||
|
||||
static void
|
||||
bgp_format_aigp(eattr *a, byte *buf, uint size UNUSED)
|
||||
{
|
||||
const byte *b = bgp_aigp_get_tlv(a->u.ptr, BGP_AIGP_METRIC);
|
||||
|
||||
if (!b)
|
||||
bsprintf(buf, "?");
|
||||
else
|
||||
bsprintf(buf, "%lu", get_u64(b + 3));
|
||||
}
|
||||
|
||||
|
||||
static void
|
||||
bgp_export_large_community(struct bgp_export_state *s, eattr *a)
|
||||
{
|
||||
@ -820,6 +1029,15 @@ static const struct bgp_attr_desc bgp_attr_table[] = {
|
||||
.decode = bgp_decode_as4_aggregator,
|
||||
.format = bgp_format_aggregator,
|
||||
},
|
||||
[BA_AIGP] = {
|
||||
.name = "aigp",
|
||||
.type = EAF_TYPE_OPAQUE,
|
||||
.flags = BAF_OPTIONAL | BAF_DECODE_FLAGS,
|
||||
.export = bgp_export_aigp,
|
||||
.encode = bgp_encode_raw,
|
||||
.decode = bgp_decode_aigp,
|
||||
.format = bgp_format_aigp,
|
||||
},
|
||||
[BA_LARGE_COMMUNITY] = {
|
||||
.name = "large_community",
|
||||
.type = EAF_TYPE_LC_SET,
|
||||
@ -1021,7 +1239,8 @@ bgp_decode_attr(struct bgp_parse_state *s, uint code, uint flags, byte *data, ui
|
||||
const struct bgp_attr_desc *desc = &bgp_attr_table[code];
|
||||
|
||||
/* Handle conflicting flags; RFC 7606 3 (c) */
|
||||
if ((flags ^ desc->flags) & (BAF_OPTIONAL | BAF_TRANSITIVE))
|
||||
if (((flags ^ desc->flags) & (BAF_OPTIONAL | BAF_TRANSITIVE)) &&
|
||||
!(desc->flags & BAF_DECODE_FLAGS))
|
||||
WITHDRAW("Malformed %s attribute - conflicting flags (%02x)", desc->name, flags);
|
||||
|
||||
desc->decode(s, code, flags, data, len, to);
|
||||
@ -1150,6 +1369,17 @@ withdraw:
|
||||
return NULL;
|
||||
}
|
||||
|
||||
void
|
||||
bgp_finish_attrs(struct bgp_parse_state *s, rta *a)
|
||||
{
|
||||
/* AIGP test here instead of in bgp_decode_aigp() - we need to know channel */
|
||||
if (BIT32_TEST(s->attrs_seen, BA_AIGP) && !s->channel->cf->aigp)
|
||||
{
|
||||
REPORT("Discarding AIGP attribute received on non-AIGP session");
|
||||
bgp_unset_attr(&a->eattrs, s->pool, BA_AIGP);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Route bucket hash table
|
||||
@ -1232,7 +1462,7 @@ bgp_get_bucket(struct bgp_channel *c, ea_list *new)
|
||||
|
||||
if (!(a->type & EAF_EMBEDDED))
|
||||
{
|
||||
struct adata *oa = a->u.ptr;
|
||||
const struct adata *oa = a->u.ptr;
|
||||
struct adata *na = (struct adata *) dest;
|
||||
memcpy(na, oa, sizeof(struct adata) + oa->length);
|
||||
a->u.ptr = na;
|
||||
@ -1302,7 +1532,7 @@ bgp_withdraw_bucket(struct bgp_channel *c, struct bgp_bucket *b)
|
||||
#define PXH_FN(n,i,h) h
|
||||
|
||||
#define PXH_REHASH bgp_pxh_rehash
|
||||
#define PXH_PARAMS /8, *2, 2, 2, 8, 20
|
||||
#define PXH_PARAMS /8, *2, 2, 2, 8, 24
|
||||
|
||||
|
||||
HASH_DEFINE_REHASH_FN(PXH, struct bgp_prefix)
|
||||
@ -1404,7 +1634,7 @@ bgp_preexport(struct proto *P, rte **new, struct linpool *pool UNUSED)
|
||||
if (p->cf->interpret_communities &&
|
||||
(c = ea_find(e->attrs->eattrs, EA_CODE(PROTOCOL_BGP, BA_COMMUNITY))))
|
||||
{
|
||||
struct adata *d = c->u.ptr;
|
||||
const struct adata *d = c->u.ptr;
|
||||
|
||||
/* Do not export anywhere */
|
||||
if (int_set_contains(d, BGP_COMM_NO_ADVERTISE))
|
||||
@ -1426,9 +1656,6 @@ bgp_preexport(struct proto *P, rte **new, struct linpool *pool UNUSED)
|
||||
return 0;
|
||||
}
|
||||
|
||||
|
||||
static adata null_adata; /* adata of length 0 */
|
||||
|
||||
static ea_list *
|
||||
bgp_update_attrs(struct bgp_proto *p, struct bgp_channel *c, rte *e, ea_list *attrs0, struct linpool *pool)
|
||||
{
|
||||
@ -1437,7 +1664,7 @@ bgp_update_attrs(struct bgp_proto *p, struct bgp_channel *c, rte *e, ea_list *at
|
||||
struct bgp_export_state s = { .proto = p, .channel = c, .pool = pool, .src = src, .route = e, .mpls = c->desc->mpls };
|
||||
ea_list *attrs = attrs0;
|
||||
eattr *a;
|
||||
adata *ad;
|
||||
const adata *ad;
|
||||
|
||||
/* ORIGIN attribute - mandatory, attach if missing */
|
||||
if (! bgp_find_attr(attrs0, BA_ORIGIN))
|
||||
@ -1484,6 +1711,16 @@ bgp_update_attrs(struct bgp_proto *p, struct bgp_channel *c, rte *e, ea_list *at
|
||||
if (p->is_interior && ! bgp_find_attr(attrs0, BA_LOCAL_PREF))
|
||||
bgp_set_attr_u32(&attrs, pool, BA_LOCAL_PREF, 0, p->cf->default_local_pref);
|
||||
|
||||
/* AIGP attribute - accumulate local metric or originate new one */
|
||||
u64 metric;
|
||||
if (s.local_next_hop &&
|
||||
(bgp_total_aigp_metric_(e, &metric, &ad) ||
|
||||
(c->cf->aigp_originate && bgp_init_aigp_metric(e, &metric, &ad))))
|
||||
{
|
||||
ad = bgp_aigp_set_metric(pool, ad, metric);
|
||||
bgp_set_attr_ptr(&attrs, pool, BA_AIGP, 0, ad);
|
||||
}
|
||||
|
||||
/* IBGP route reflection, RFC 4456 */
|
||||
if (src && src->is_internal && p->is_internal && (src->local_as == p->local_as))
|
||||
{
|
||||
@ -1581,12 +1818,6 @@ bgp_get_neighbor(rte *r)
|
||||
return p->cf->confederation ?: p->local_as;
|
||||
}
|
||||
|
||||
static inline int
|
||||
rte_resolvable(rte *rt)
|
||||
{
|
||||
return rt->attrs->dest == RTD_UNICAST;
|
||||
}
|
||||
|
||||
static inline int
|
||||
rte_stale(rte *r)
|
||||
{
|
||||
@ -1642,6 +1873,14 @@ bgp_rte_better(rte *new, rte *old)
|
||||
if (n < o)
|
||||
return 0;
|
||||
|
||||
/* RFC 7311 4.1 - Apply AIGP metric */
|
||||
u64 n2 = bgp_total_aigp_metric(new);
|
||||
u64 o2 = bgp_total_aigp_metric(old);
|
||||
if (n2 < o2)
|
||||
return 1;
|
||||
if (n2 > o2)
|
||||
return 0;
|
||||
|
||||
/* RFC 4271 9.1.2.2. a) Use AS path lengths */
|
||||
if (new_bgp->cf->compare_path_lengths || old_bgp->cf->compare_path_lengths)
|
||||
{
|
||||
@ -1733,7 +1972,7 @@ bgp_rte_better(rte *new, rte *old)
|
||||
return 0;
|
||||
|
||||
/* RFC 4271 9.1.2.2. g) Compare peer IP adresses */
|
||||
return (ipa_compare(new_bgp->cf->remote_ip, old_bgp->cf->remote_ip) < 0);
|
||||
return ipa_compare(new_bgp->remote_ip, old_bgp->remote_ip) < 0;
|
||||
}
|
||||
|
||||
|
||||
@ -1750,7 +1989,7 @@ bgp_rte_mergable(rte *pri, rte *sec)
|
||||
return 0;
|
||||
|
||||
/* RFC 4271 9.1.2.1. Route resolvability test */
|
||||
if (!rte_resolvable(sec))
|
||||
if (rte_resolvable(pri) != rte_resolvable(sec))
|
||||
return 0;
|
||||
|
||||
/* LLGR draft - depreference stale routes */
|
||||
@ -1836,7 +2075,7 @@ bgp_rte_recalculate(rtable *table, net *net, rte *new, rte *old, rte *old_best)
|
||||
rte *key = new ? new : old;
|
||||
u32 lpref = key->pref;
|
||||
u32 lasn = bgp_get_neighbor(key);
|
||||
int old_is_group_best = 0;
|
||||
int old_suppressed = old ? old->u.bgp.suppressed : 0;
|
||||
|
||||
/*
|
||||
* Proper RFC 4271 path selection is a bit complicated, it cannot be
|
||||
@ -1883,7 +2122,7 @@ bgp_rte_recalculate(rtable *table, net *net, rte *new, rte *old, rte *old_best)
|
||||
* We could find the best-in-group and then make some shortcuts like
|
||||
* in rte_recalculate, but as we would have to walk through all
|
||||
* net->routes just to find it, it is probably not worth. So we
|
||||
* just have two simpler fast cases that use just the old route.
|
||||
* just have one simple fast case that use just the old route.
|
||||
* We also set suppressed flag to avoid using it in bgp_rte_better().
|
||||
*/
|
||||
|
||||
@ -1892,23 +2131,11 @@ bgp_rte_recalculate(rtable *table, net *net, rte *new, rte *old, rte *old_best)
|
||||
|
||||
if (old)
|
||||
{
|
||||
old_is_group_best = !old->u.bgp.suppressed;
|
||||
old->u.bgp.suppressed = 1;
|
||||
int new_is_better = new && bgp_rte_better(new, old);
|
||||
|
||||
/* The first case - replace not best with worse (or remove not best) */
|
||||
if (!old_is_group_best && !new_is_better)
|
||||
/* The fast case - replace not best with worse (or remove not best) */
|
||||
if (old_suppressed && !(new && bgp_rte_better(new, old)))
|
||||
return 0;
|
||||
|
||||
/* The second case - replace the best with better */
|
||||
if (old_is_group_best && new_is_better)
|
||||
{
|
||||
/* new is best-in-group, the see discussion below - this is
|
||||
a special variant of NBG && OBG. From OBG we can deduce
|
||||
that same_group(old_best) iff (old == old_best) */
|
||||
new->u.bgp.suppressed = 0;
|
||||
return (old == old_best);
|
||||
}
|
||||
}
|
||||
|
||||
/* The default case - find a new best-in-group route */
|
||||
@ -1925,6 +2152,16 @@ bgp_rte_recalculate(rtable *table, net *net, rte *new, rte *old, rte *old_best)
|
||||
if (!r)
|
||||
return 0;
|
||||
|
||||
/* Found if new is mergable with best-in-group */
|
||||
if (new && (new != r) && bgp_rte_mergable(r, new))
|
||||
new->u.bgp.suppressed = 0;
|
||||
|
||||
/* Found all existing routes mergable with best-in-group */
|
||||
for (s=net->routes; rte_is_valid(s); s=s->next)
|
||||
if (use_deterministic_med(s) && same_group(s, lpref, lasn))
|
||||
if ((s != r) && bgp_rte_mergable(r, s))
|
||||
s->u.bgp.suppressed = 0;
|
||||
|
||||
/* Found best-in-group */
|
||||
r->u.bgp.suppressed = 0;
|
||||
|
||||
@ -1938,9 +2175,9 @@ bgp_rte_recalculate(rtable *table, net *net, rte *new, rte *old, rte *old_best)
|
||||
* rte_recalculate() without ignore that possibility).
|
||||
*
|
||||
* There are three possible cases according to whether the old route
|
||||
* was the best in group (OBG, stored in old_is_group_best) and
|
||||
* whether the new route is the best in group (NBG, tested by r == new).
|
||||
* These cases work even if old or new is NULL.
|
||||
* was the best in group (OBG, i.e. !old_suppressed) and whether the
|
||||
* new route is the best in group (NBG, tested by r == new). These
|
||||
* cases work even if old or new is NULL.
|
||||
*
|
||||
* NBG -> new is a possible candidate for the best route, so we just
|
||||
* check for the first reason using same_group().
|
||||
@ -1955,14 +2192,14 @@ bgp_rte_recalculate(rtable *table, net *net, rte *new, rte *old, rte *old_best)
|
||||
if (r == new)
|
||||
return old_best && same_group(old_best, lpref, lasn);
|
||||
else
|
||||
return old_is_group_best;
|
||||
return !old_suppressed;
|
||||
}
|
||||
|
||||
struct rte *
|
||||
bgp_rte_modify_stale(struct rte *r, struct linpool *pool)
|
||||
{
|
||||
eattr *a = ea_find(r->attrs->eattrs, EA_CODE(PROTOCOL_BGP, BA_COMMUNITY));
|
||||
struct adata *ad = a ? a->u.ptr : NULL;
|
||||
const struct adata *ad = a ? a->u.ptr : NULL;
|
||||
uint flags = a ? a->flags : BAF_PARTIAL;
|
||||
|
||||
if (ad && int_set_contains(ad, BGP_COMM_NO_LLGR))
|
||||
@ -2021,8 +2258,8 @@ bgp_process_as4_attrs(ea_list **attrs, struct linpool *pool)
|
||||
return;
|
||||
|
||||
/* Merge AS_PATH and AS4_PATH */
|
||||
as_path_cut(p2->u.ptr, p2_len - p4_len);
|
||||
p2->u.ptr = as_path_merge(pool, p2->u.ptr, p4->u.ptr);
|
||||
struct adata *apc = as_path_cut(pool, p2->u.ptr, p2_len - p4_len);
|
||||
p2->u.ptr = as_path_merge(pool, apc, p4->u.ptr);
|
||||
}
|
||||
}
|
||||
|
||||
@ -2067,7 +2304,12 @@ bgp_get_route_info(rte *e, byte *buf)
|
||||
if (rte_stale(e))
|
||||
buf += bsprintf(buf, "s");
|
||||
|
||||
if (e->attrs->hostentry)
|
||||
u64 metric = bgp_total_aigp_metric(e);
|
||||
if (metric < BGP_AIGP_MAX)
|
||||
{
|
||||
buf += bsprintf(buf, "/%lu", metric);
|
||||
}
|
||||
else if (e->attrs->igp_metric)
|
||||
{
|
||||
if (!rte_resolvable(e))
|
||||
buf += bsprintf(buf, "/-");
|
||||
|
291
proto/bgp/bgp.c
291
proto/bgp/bgp.c
@ -92,6 +92,7 @@
|
||||
* RFC 6286 - AS-Wide Unique BGP Identifier
|
||||
* RFC 6608 - Subcodes for BGP Finite State Machine Error
|
||||
* RFC 6793 - BGP Support for 4-Octet AS Numbers
|
||||
* RFC 7311 - Accumulated IGP Metric Attribute for BGP
|
||||
* RFC 7313 - Enhanced Route Refresh Capability for BGP
|
||||
* RFC 7606 - Revised Error Handling for BGP UPDATE Messages
|
||||
* RFC 7911 - Advertisement of Multiple Paths in BGP
|
||||
@ -100,6 +101,7 @@
|
||||
* RFC 8203 - BGP Administrative Shutdown Communication
|
||||
* RFC 8212 - Default EBGP Route Propagation Behavior without Policies
|
||||
* draft-ietf-idr-bgp-extended-messages-27
|
||||
* draft-ietf-idr-ext-opt-param-07
|
||||
* draft-uttaro-idr-bgp-persistence-04
|
||||
*/
|
||||
|
||||
@ -129,6 +131,9 @@ static list bgp_sockets; /* Global list of listening sockets */
|
||||
|
||||
static void bgp_connect(struct bgp_proto *p);
|
||||
static void bgp_active(struct bgp_proto *p);
|
||||
static void bgp_setup_conn(struct bgp_proto *p, struct bgp_conn *conn);
|
||||
static void bgp_setup_sk(struct bgp_conn *conn, sock *s);
|
||||
static void bgp_send_open(struct bgp_conn *conn);
|
||||
static void bgp_update_bfd(struct bgp_proto *p, int use_bfd);
|
||||
|
||||
static int bgp_incoming_connection(sock *sk, uint dummy UNUSED);
|
||||
@ -149,7 +154,7 @@ bgp_open(struct bgp_proto *p)
|
||||
struct bgp_socket *bs = NULL;
|
||||
struct iface *ifa = p->cf->strict_bind ? p->cf->iface : NULL;
|
||||
ip_addr addr = p->cf->strict_bind ? p->cf->local_ip :
|
||||
(ipa_is_ip4(p->cf->remote_ip) ? IPA_NONE4 : IPA_NONE6);
|
||||
(p->ipv4 ? IPA_NONE4 : IPA_NONE6);
|
||||
uint port = p->cf->local_port;
|
||||
|
||||
/* FIXME: Add some global init? */
|
||||
@ -272,8 +277,17 @@ bgp_startup(struct bgp_proto *p)
|
||||
BGP_TRACE(D_EVENTS, "Started");
|
||||
p->start_state = BSS_CONNECT;
|
||||
|
||||
if (!p->cf->passive)
|
||||
if (!p->passive)
|
||||
bgp_active(p);
|
||||
|
||||
if (p->postponed_sk)
|
||||
{
|
||||
/* Apply postponed incoming connection */
|
||||
bgp_setup_conn(p, &p->incoming_conn);
|
||||
bgp_setup_sk(&p->incoming_conn, p->postponed_sk);
|
||||
bgp_send_open(&p->incoming_conn);
|
||||
p->postponed_sk = NULL;
|
||||
}
|
||||
}
|
||||
|
||||
static void
|
||||
@ -387,7 +401,7 @@ bgp_close_conn(struct bgp_conn *conn)
|
||||
void
|
||||
bgp_update_startup_delay(struct bgp_proto *p)
|
||||
{
|
||||
struct bgp_config *cf = p->cf;
|
||||
const struct bgp_config *cf = p->cf;
|
||||
|
||||
DBG("BGP: Updating startup delay\n");
|
||||
|
||||
@ -410,7 +424,7 @@ bgp_update_startup_delay(struct bgp_proto *p)
|
||||
}
|
||||
|
||||
static void
|
||||
bgp_graceful_close_conn(struct bgp_conn *conn, uint subcode, byte *data, uint len)
|
||||
bgp_graceful_close_conn(struct bgp_conn *conn, int subcode, byte *data, uint len)
|
||||
{
|
||||
switch (conn->state)
|
||||
{
|
||||
@ -426,7 +440,13 @@ bgp_graceful_close_conn(struct bgp_conn *conn, uint subcode, byte *data, uint le
|
||||
case BS_OPENSENT:
|
||||
case BS_OPENCONFIRM:
|
||||
case BS_ESTABLISHED:
|
||||
bgp_error(conn, 6, subcode, data, len);
|
||||
if (subcode < 0)
|
||||
{
|
||||
bgp_conn_enter_close_state(conn);
|
||||
bgp_schedule_packet(conn, NULL, PKT_SCHEDULE_CLOSE);
|
||||
}
|
||||
else
|
||||
bgp_error(conn, 6, subcode, data, len);
|
||||
return;
|
||||
|
||||
default:
|
||||
@ -456,7 +476,7 @@ bgp_decision(void *vp)
|
||||
if ((p->p.proto_state == PS_START) &&
|
||||
(p->outgoing_conn.state == BS_IDLE) &&
|
||||
(p->incoming_conn.state != BS_OPENCONFIRM) &&
|
||||
!p->cf->passive)
|
||||
!p->passive)
|
||||
bgp_active(p);
|
||||
|
||||
if ((p->p.proto_state == PS_STOP) &&
|
||||
@ -465,8 +485,31 @@ bgp_decision(void *vp)
|
||||
bgp_down(p);
|
||||
}
|
||||
|
||||
static struct bgp_proto *
|
||||
bgp_spawn(struct bgp_proto *pp, ip_addr remote_ip)
|
||||
{
|
||||
struct symbol *sym;
|
||||
char fmt[SYM_MAX_LEN];
|
||||
|
||||
bsprintf(fmt, "%s%%0%dd", pp->cf->dynamic_name, pp->cf->dynamic_name_digits);
|
||||
|
||||
/* This is hack, we would like to share config, but we need to copy it now */
|
||||
new_config = config;
|
||||
cfg_mem = config->mem;
|
||||
conf_this_scope = config->root_scope;
|
||||
sym = cf_default_name(fmt, &(pp->dynamic_name_counter));
|
||||
proto_clone_config(sym, pp->p.cf);
|
||||
new_config = NULL;
|
||||
cfg_mem = NULL;
|
||||
|
||||
/* Just pass remote_ip to bgp_init() */
|
||||
((struct bgp_config *) sym->proto)->remote_ip = remote_ip;
|
||||
|
||||
return (void *) proto_spawn(sym->proto, 0);
|
||||
}
|
||||
|
||||
void
|
||||
bgp_stop(struct bgp_proto *p, uint subcode, byte *data, uint len)
|
||||
bgp_stop(struct bgp_proto *p, int subcode, byte *data, uint len)
|
||||
{
|
||||
proto_notify_state(&p->p, PS_STOP);
|
||||
bgp_graceful_close_conn(&p->outgoing_conn, subcode, data, len);
|
||||
@ -491,6 +534,7 @@ bgp_conn_enter_openconfirm_state(struct bgp_conn *conn)
|
||||
}
|
||||
|
||||
static const struct bgp_af_caps dummy_af_caps = { };
|
||||
static const struct bgp_af_caps basic_af_caps = { .ready = 1 };
|
||||
|
||||
void
|
||||
bgp_conn_enter_established_state(struct bgp_conn *conn)
|
||||
@ -503,8 +547,12 @@ bgp_conn_enter_established_state(struct bgp_conn *conn)
|
||||
BGP_TRACE(D_EVENTS, "BGP session established");
|
||||
|
||||
/* For multi-hop BGP sessions */
|
||||
if (ipa_zero(p->source_addr))
|
||||
p->source_addr = conn->sk->saddr;
|
||||
if (ipa_zero(p->local_ip))
|
||||
p->local_ip = conn->sk->saddr;
|
||||
|
||||
/* For promiscuous sessions */
|
||||
if (!p->remote_as)
|
||||
p->remote_as = conn->received_as;
|
||||
|
||||
/* In case of LLv6 is not valid during BGP start */
|
||||
if (ipa_zero(p->link_addr) && p->neigh && p->neigh->iface && p->neigh->iface->llv6)
|
||||
@ -541,6 +589,13 @@ bgp_conn_enter_established_state(struct bgp_conn *conn)
|
||||
const struct bgp_af_caps *loc = bgp_find_af_caps(local, c->afi);
|
||||
const struct bgp_af_caps *rem = bgp_find_af_caps(peer, c->afi);
|
||||
|
||||
/* Use default if capabilities were not announced */
|
||||
if (!local->length && (c->afi == BGP_AF_IPV4))
|
||||
loc = &basic_af_caps;
|
||||
|
||||
if (!peer->length && (c->afi == BGP_AF_IPV4))
|
||||
rem = &basic_af_caps;
|
||||
|
||||
/* Ignore AFIs that were not announced in multiprotocol capability */
|
||||
if (!loc || !loc->ready)
|
||||
loc = &dummy_af_caps;
|
||||
@ -880,6 +935,7 @@ bgp_send_open(struct bgp_conn *conn)
|
||||
conn->sk->rx_hook = bgp_rx;
|
||||
conn->sk->tx_hook = bgp_tx;
|
||||
tm_stop(conn->connect_timer);
|
||||
bgp_prepare_capabilities(conn);
|
||||
bgp_schedule_packet(conn, NULL, PKT_OPEN);
|
||||
bgp_conn_set_state(conn, BS_OPENSENT);
|
||||
bgp_start_timer(conn->hold_timer, conn->bgp->cf->initial_hold_time);
|
||||
@ -1039,8 +1095,8 @@ bgp_connect(struct bgp_proto *p) /* Enter Connect state and start establishing c
|
||||
DBG("BGP: Connecting\n");
|
||||
sock *s = sk_new(p->p.pool);
|
||||
s->type = SK_TCP_ACTIVE;
|
||||
s->saddr = p->source_addr;
|
||||
s->daddr = p->cf->remote_ip;
|
||||
s->saddr = p->local_ip;
|
||||
s->daddr = p->remote_ip;
|
||||
s->dport = p->cf->remote_port;
|
||||
s->iface = p->neigh ? p->neigh->iface : NULL;
|
||||
s->vrf = p->p.vrf;
|
||||
@ -1075,6 +1131,9 @@ err:
|
||||
return;
|
||||
}
|
||||
|
||||
static inline int bgp_is_dynamic(struct bgp_proto *p)
|
||||
{ return ipa_zero(p->remote_ip); }
|
||||
|
||||
/**
|
||||
* bgp_find_proto - find existing proto for incoming connection
|
||||
* @sk: TCP socket
|
||||
@ -1083,6 +1142,7 @@ err:
|
||||
static struct bgp_proto *
|
||||
bgp_find_proto(sock *sk)
|
||||
{
|
||||
struct bgp_proto *best = NULL;
|
||||
struct bgp_proto *p;
|
||||
|
||||
/* sk->iface is valid only if src or dst address is link-local */
|
||||
@ -1090,13 +1150,20 @@ bgp_find_proto(sock *sk)
|
||||
|
||||
WALK_LIST(p, proto_list)
|
||||
if ((p->p.proto == &proto_bgp) &&
|
||||
(p->sock == sk->data) &&
|
||||
ipa_equal(p->cf->remote_ip, sk->daddr) &&
|
||||
(ipa_equal(p->remote_ip, sk->daddr) || bgp_is_dynamic(p)) &&
|
||||
(!p->cf->remote_range || ipa_in_netX(sk->daddr, p->cf->remote_range)) &&
|
||||
(p->p.vrf == sk->vrf) &&
|
||||
(p->cf->local_port == sk->sport) &&
|
||||
(!link || (p->cf->iface == sk->iface)) &&
|
||||
(ipa_zero(p->cf->local_ip) || ipa_equal(p->cf->local_ip, sk->saddr)))
|
||||
return p;
|
||||
{
|
||||
best = p;
|
||||
|
||||
return NULL;
|
||||
if (!bgp_is_dynamic(p))
|
||||
break;
|
||||
}
|
||||
|
||||
return best;
|
||||
}
|
||||
|
||||
/**
|
||||
@ -1175,6 +1242,16 @@ bgp_incoming_connection(sock *sk, uint dummy UNUSED)
|
||||
sk_reallocate(sk);
|
||||
}
|
||||
|
||||
/* For dynamic BGP, spawn new instance and postpone the socket */
|
||||
if (bgp_is_dynamic(p))
|
||||
{
|
||||
p = bgp_spawn(p, sk->daddr);
|
||||
p->postponed_sk = sk;
|
||||
rmove(sk, p->p.pool);
|
||||
return 0;
|
||||
}
|
||||
|
||||
rmove(sk, p->p.pool);
|
||||
bgp_setup_conn(p, &p->incoming_conn);
|
||||
bgp_setup_sk(&p->incoming_conn, sk);
|
||||
bgp_send_open(&p->incoming_conn);
|
||||
@ -1201,11 +1278,11 @@ bgp_start_neighbor(struct bgp_proto *p)
|
||||
{
|
||||
/* Called only for single-hop BGP sessions */
|
||||
|
||||
if (ipa_zero(p->source_addr))
|
||||
p->source_addr = p->neigh->ifa->ip;
|
||||
if (ipa_zero(p->local_ip))
|
||||
p->local_ip = p->neigh->ifa->ip;
|
||||
|
||||
if (ipa_is_link_local(p->source_addr))
|
||||
p->link_addr = p->source_addr;
|
||||
if (ipa_is_link_local(p->local_ip))
|
||||
p->link_addr = p->local_ip;
|
||||
else if (p->neigh->iface->llv6)
|
||||
p->link_addr = p->neigh->iface->llv6->ip;
|
||||
|
||||
@ -1293,10 +1370,10 @@ bgp_bfd_notify(struct bfd_request *req)
|
||||
static void
|
||||
bgp_update_bfd(struct bgp_proto *p, int use_bfd)
|
||||
{
|
||||
if (use_bfd && !p->bfd_req)
|
||||
p->bfd_req = bfd_request_session(p->p.pool, p->cf->remote_ip, p->source_addr,
|
||||
if (use_bfd && !p->bfd_req && !bgp_is_dynamic(p))
|
||||
p->bfd_req = bfd_request_session(p->p.pool, p->remote_ip, p->local_ip,
|
||||
p->cf->multihop ? NULL : p->neigh->iface,
|
||||
bgp_bfd_notify, p);
|
||||
p->p.vrf, bgp_bfd_notify, p);
|
||||
|
||||
if (!use_bfd && p->bfd_req)
|
||||
{
|
||||
@ -1375,7 +1452,7 @@ static void
|
||||
bgp_start_locked(struct object_lock *lock)
|
||||
{
|
||||
struct bgp_proto *p = lock->data;
|
||||
struct bgp_config *cf = p->cf;
|
||||
const struct bgp_config *cf = p->cf;
|
||||
|
||||
if (p->p.proto_state != PS_START)
|
||||
{
|
||||
@ -1385,17 +1462,17 @@ bgp_start_locked(struct object_lock *lock)
|
||||
|
||||
DBG("BGP: Got lock\n");
|
||||
|
||||
if (cf->multihop)
|
||||
if (cf->multihop || bgp_is_dynamic(p))
|
||||
{
|
||||
/* Multi-hop sessions do not use neighbor entries */
|
||||
bgp_initiate(p);
|
||||
return;
|
||||
}
|
||||
|
||||
neighbor *n = neigh_find(&p->p, cf->remote_ip, cf->iface, NEF_STICKY);
|
||||
neighbor *n = neigh_find(&p->p, p->remote_ip, cf->iface, NEF_STICKY);
|
||||
if (!n)
|
||||
{
|
||||
log(L_ERR "%s: Invalid remote address %I%J", p->p.name, cf->remote_ip, cf->iface);
|
||||
log(L_ERR "%s: Invalid remote address %I%J", p->p.name, p->remote_ip, cf->iface);
|
||||
/* As we do not start yet, we can just disable protocol */
|
||||
p->p.disabled = 1;
|
||||
bgp_store_error(p, NULL, BE_MISC, BEM_INVALID_NEXT_HOP);
|
||||
@ -1406,7 +1483,7 @@ bgp_start_locked(struct object_lock *lock)
|
||||
p->neigh = n;
|
||||
|
||||
if (n->scope <= 0)
|
||||
BGP_TRACE(D_EVENTS, "Waiting for %I%J to become my neighbor", cf->remote_ip, cf->iface);
|
||||
BGP_TRACE(D_EVENTS, "Waiting for %I%J to become my neighbor", p->remote_ip, cf->iface);
|
||||
else if (p->cf->check_link && !(n->iface->flags & IF_LINK_UP))
|
||||
BGP_TRACE(D_EVENTS, "Waiting for link on %s", n->iface->name);
|
||||
else
|
||||
@ -1417,14 +1494,29 @@ static int
|
||||
bgp_start(struct proto *P)
|
||||
{
|
||||
struct bgp_proto *p = (struct bgp_proto *) P;
|
||||
struct object_lock *lock;
|
||||
const struct bgp_config *cf = p->cf;
|
||||
|
||||
p->local_ip = cf->local_ip;
|
||||
p->local_as = cf->local_as;
|
||||
p->remote_as = cf->remote_as;
|
||||
p->public_as = cf->local_as;
|
||||
|
||||
/* For dynamic BGP childs, remote_ip is already set */
|
||||
if (ipa_nonzero(cf->remote_ip))
|
||||
p->remote_ip = cf->remote_ip;
|
||||
|
||||
/* Confederation ID is used for truly external peers */
|
||||
if (p->cf->confederation && !p->is_interior)
|
||||
p->public_as = cf->confederation;
|
||||
|
||||
p->passive = cf->passive || bgp_is_dynamic(p);
|
||||
|
||||
DBG("BGP: Startup.\n");
|
||||
p->start_state = BSS_PREPARE;
|
||||
p->outgoing_conn.state = BS_IDLE;
|
||||
p->incoming_conn.state = BS_IDLE;
|
||||
p->neigh = NULL;
|
||||
p->bfd_req = NULL;
|
||||
p->postponed_sk = NULL;
|
||||
p->gr_ready = 0;
|
||||
p->gr_active_num = 0;
|
||||
|
||||
@ -1437,7 +1529,6 @@ bgp_start(struct proto *P)
|
||||
p->rr_cluster_id = p->cf->rr_cluster_id ? p->cf->rr_cluster_id : p->local_id;
|
||||
|
||||
p->remote_id = 0;
|
||||
p->source_addr = p->cf->local_ip;
|
||||
p->link_addr = IPA_NONE;
|
||||
|
||||
/* Lock all channels when in GR recovery mode */
|
||||
@ -1452,15 +1543,23 @@ bgp_start(struct proto *P)
|
||||
* Before attempting to create the connection, we need to lock the port,
|
||||
* so that we are the only instance attempting to talk with that neighbor.
|
||||
*/
|
||||
|
||||
struct object_lock *lock;
|
||||
lock = p->lock = olock_new(P->pool);
|
||||
lock->addr = p->cf->remote_ip;
|
||||
lock->addr = p->remote_ip;
|
||||
lock->port = p->cf->remote_port;
|
||||
lock->iface = p->cf->iface;
|
||||
lock->vrf = p->cf->iface ? NULL : p->p.vrf;
|
||||
lock->type = OBJLOCK_TCP;
|
||||
lock->hook = bgp_start_locked;
|
||||
lock->data = p;
|
||||
|
||||
/* For dynamic BGP, we use inst 1 to avoid collisions with regular BGP */
|
||||
if (bgp_is_dynamic(p))
|
||||
{
|
||||
lock->addr = net_prefix(p->cf->remote_range);
|
||||
lock->inst = 1;
|
||||
}
|
||||
|
||||
olock_acquire(lock);
|
||||
|
||||
return PS_START;
|
||||
@ -1472,7 +1571,7 @@ static int
|
||||
bgp_shutdown(struct proto *P)
|
||||
{
|
||||
struct bgp_proto *p = (struct bgp_proto *) P;
|
||||
uint subcode = 0;
|
||||
int subcode = 0;
|
||||
|
||||
char *message = NULL;
|
||||
byte *data = NULL;
|
||||
@ -1493,6 +1592,7 @@ bgp_shutdown(struct proto *P)
|
||||
|
||||
case PDC_CMD_DISABLE:
|
||||
case PDC_CMD_SHUTDOWN:
|
||||
shutdown:
|
||||
subcode = 2; // Errcode 6, 2 - administrative shutdown
|
||||
message = P->message;
|
||||
break;
|
||||
@ -1502,6 +1602,14 @@ bgp_shutdown(struct proto *P)
|
||||
message = P->message;
|
||||
break;
|
||||
|
||||
case PDC_CMD_GR_DOWN:
|
||||
if ((p->cf->gr_mode != BGP_GR_ABLE) &&
|
||||
(p->cf->llgr_mode != BGP_LLGR_ABLE))
|
||||
goto shutdown;
|
||||
|
||||
subcode = -1; // Do not send NOTIFICATION, just close the connection
|
||||
break;
|
||||
|
||||
case PDC_RX_LIMIT_HIT:
|
||||
case PDC_IN_LIMIT_HIT:
|
||||
subcode = 1; // Errcode 6, 1 - max number of prefixes reached
|
||||
@ -1528,7 +1636,7 @@ bgp_shutdown(struct proto *P)
|
||||
if (message)
|
||||
{
|
||||
uint msg_len = strlen(message);
|
||||
msg_len = MIN(msg_len, 128);
|
||||
msg_len = MIN(msg_len, 255);
|
||||
|
||||
/* Buffer will be freed automatically by protocol shutdown */
|
||||
data = mb_alloc(p->p.pool, msg_len + 1);
|
||||
@ -1562,17 +1670,21 @@ bgp_init(struct proto_config *CF)
|
||||
P->rte_modify = bgp_rte_modify_stale;
|
||||
|
||||
p->cf = cf;
|
||||
p->local_as = cf->local_as;
|
||||
p->remote_as = cf->remote_as;
|
||||
p->public_as = cf->local_as;
|
||||
p->is_internal = (cf->local_as == cf->remote_as);
|
||||
p->is_interior = p->is_internal || cf->confederation_member;
|
||||
p->rs_client = cf->rs_client;
|
||||
p->rr_client = cf->rr_client;
|
||||
|
||||
/* Confederation ID is used for truly external peers */
|
||||
if (cf->confederation && !p->is_interior)
|
||||
p->public_as = cf->confederation;
|
||||
p->ipv4 = ipa_nonzero(cf->remote_ip) ?
|
||||
ipa_is_ip4(cf->remote_ip) :
|
||||
(cf->remote_range && (cf->remote_range->type == NET_IP4));
|
||||
|
||||
p->remote_ip = cf->remote_ip;
|
||||
p->remote_as = cf->remote_as;
|
||||
|
||||
/* Hack: We use cf->remote_ip just to pass remote_ip from bgp_spawn() */
|
||||
if (cf->c.parent)
|
||||
cf->remote_ip = IPA_NONE;
|
||||
|
||||
/* Add all channels */
|
||||
struct bgp_channel_config *cc;
|
||||
@ -1604,7 +1716,7 @@ bgp_channel_start(struct channel *C)
|
||||
{
|
||||
struct bgp_proto *p = (void *) C->proto;
|
||||
struct bgp_channel *c = (void *) C;
|
||||
ip_addr src = p->source_addr;
|
||||
ip_addr src = p->local_ip;
|
||||
|
||||
if (c->igp_table_ip4)
|
||||
rt_lock_table(c->igp_table_ip4);
|
||||
@ -1619,6 +1731,9 @@ bgp_channel_start(struct channel *C)
|
||||
if (c->cf->import_table)
|
||||
channel_setup_in_table(C);
|
||||
|
||||
if (c->cf->export_table)
|
||||
channel_setup_out_table(C);
|
||||
|
||||
c->stale_timer = tm_new_init(c->pool, bgp_long_lived_stale_timeout, c, 0, 0);
|
||||
|
||||
c->next_hop_addr = c->cf->next_hop_addr;
|
||||
@ -1745,14 +1860,19 @@ void
|
||||
bgp_postconfig(struct proto_config *CF)
|
||||
{
|
||||
struct bgp_config *cf = (void *) CF;
|
||||
int internal = (cf->local_as == cf->remote_as);
|
||||
int interior = internal || cf->confederation_member;
|
||||
|
||||
/* Do not check templates at all */
|
||||
if (cf->c.class == SYM_TEMPLATE)
|
||||
return;
|
||||
|
||||
|
||||
/* Handle undefined remote_as, zero should mean unspecified external */
|
||||
if (!cf->remote_as && (cf->peer_type == BGP_PT_INTERNAL))
|
||||
cf->remote_as = cf->local_as;
|
||||
|
||||
int internal = (cf->local_as == cf->remote_as);
|
||||
int interior = internal || cf->confederation_member;
|
||||
|
||||
/* EBGP direct by default, IBGP multihop by default */
|
||||
if (cf->multihop < 0)
|
||||
cf->multihop = internal ? 64 : 0;
|
||||
@ -1769,11 +1889,20 @@ bgp_postconfig(struct proto_config *CF)
|
||||
if (!cf->local_as)
|
||||
cf_error("Local AS number must be set");
|
||||
|
||||
if (ipa_zero(cf->remote_ip))
|
||||
if (ipa_zero(cf->remote_ip) && !cf->remote_range)
|
||||
cf_error("Neighbor must be configured");
|
||||
|
||||
if (!cf->remote_as)
|
||||
cf_error("Remote AS number must be set");
|
||||
if (ipa_zero(cf->local_ip) && cf->strict_bind)
|
||||
cf_error("Local address must be configured for strict bind");
|
||||
|
||||
if (!cf->remote_as && !cf->peer_type)
|
||||
cf_error("Remote AS number (or peer type) must be set");
|
||||
|
||||
if ((cf->peer_type == BGP_PT_INTERNAL) && !internal)
|
||||
cf_error("IBGP cannot have different ASNs");
|
||||
|
||||
if ((cf->peer_type == BGP_PT_EXTERNAL) && internal)
|
||||
cf_error("EBGP cannot have the same ASNs");
|
||||
|
||||
if (!cf->iface && (ipa_is_link_local(cf->local_ip) ||
|
||||
ipa_is_link_local(cf->remote_ip)))
|
||||
@ -1851,6 +1980,10 @@ bgp_postconfig(struct proto_config *CF)
|
||||
if (cc->llgr_time == ~0U)
|
||||
cc->llgr_time = cf->llgr_time;
|
||||
|
||||
/* AIGP enabled by default on interior sessions */
|
||||
if (cc->aigp == 0xff)
|
||||
cc->aigp = interior;
|
||||
|
||||
/* Default values of IGP tables */
|
||||
if ((cc->gw_mode == GW_RECURSIVE) && !cc->desc->no_igp)
|
||||
{
|
||||
@ -1885,8 +2018,8 @@ static int
|
||||
bgp_reconfigure(struct proto *P, struct proto_config *CF)
|
||||
{
|
||||
struct bgp_proto *p = (void *) P;
|
||||
struct bgp_config *new = (void *) CF;
|
||||
struct bgp_config *old = p->cf;
|
||||
const struct bgp_config *new = (void *) CF;
|
||||
const struct bgp_config *old = p->cf;
|
||||
|
||||
if (proto_get_router_id(CF) != p->local_id)
|
||||
return 0;
|
||||
@ -1895,8 +2028,11 @@ bgp_reconfigure(struct proto *P, struct proto_config *CF)
|
||||
((byte *) new) + sizeof(struct proto_config),
|
||||
// password item is last and must be checked separately
|
||||
OFFSETOF(struct bgp_config, password) - sizeof(struct proto_config))
|
||||
&& ((!old->password && !new->password)
|
||||
|| (old->password && new->password && !strcmp(old->password, new->password)));
|
||||
&& !bstrcmp(old->password, new->password)
|
||||
&& ((!old->remote_range && !new->remote_range)
|
||||
|| (old->remote_range && new->remote_range && net_equal(old->remote_range, new->remote_range)))
|
||||
&& !bstrcmp(old->dynamic_name, new->dynamic_name)
|
||||
&& (old->dynamic_name_digits == new->dynamic_name_digits);
|
||||
|
||||
/* FIXME: Move channel reconfiguration to generic protocol code ? */
|
||||
struct channel *C, *C2;
|
||||
@ -1926,29 +2062,56 @@ bgp_reconfigure(struct proto *P, struct proto_config *CF)
|
||||
if (same)
|
||||
p->cf = new;
|
||||
|
||||
/* Reset name counter */
|
||||
p->dynamic_name_counter = 0;
|
||||
|
||||
return same;
|
||||
}
|
||||
|
||||
#define IGP_TABLE(cf, sym) ((cf)->igp_table_##sym ? (cf)->igp_table_##sym ->table : NULL )
|
||||
|
||||
static int
|
||||
bgp_channel_reconfigure(struct channel *C, struct channel_config *CC)
|
||||
bgp_channel_reconfigure(struct channel *C, struct channel_config *CC, int *import_changed, int *export_changed)
|
||||
{
|
||||
struct bgp_proto *p = (void *) C->proto;
|
||||
struct bgp_channel *c = (void *) C;
|
||||
struct bgp_channel_config *new = (void *) CC;
|
||||
struct bgp_channel_config *old = c->cf;
|
||||
|
||||
if (memcmp(((byte *) old) + sizeof(struct channel_config),
|
||||
((byte *) new) + sizeof(struct channel_config),
|
||||
/* Remaining items must be checked separately */
|
||||
OFFSETOF(struct bgp_channel_config, rest) - sizeof(struct channel_config)))
|
||||
if ((new->secondary != old->secondary) ||
|
||||
(new->gr_able != old->gr_able) ||
|
||||
(new->llgr_able != old->llgr_able) ||
|
||||
(new->llgr_time != old->llgr_time) ||
|
||||
(new->ext_next_hop != old->ext_next_hop) ||
|
||||
(new->add_path != old->add_path) ||
|
||||
(new->import_table != old->import_table) ||
|
||||
(new->export_table != old->export_table) ||
|
||||
(IGP_TABLE(new, ip4) != IGP_TABLE(old, ip4)) ||
|
||||
(IGP_TABLE(new, ip6) != IGP_TABLE(old, ip6)))
|
||||
return 0;
|
||||
|
||||
/* Check change in IGP tables */
|
||||
if ((IGP_TABLE(old, ip4) != IGP_TABLE(new, ip4)) ||
|
||||
(IGP_TABLE(old, ip6) != IGP_TABLE(new, ip6)))
|
||||
if (new->mandatory && !old->mandatory && (C->channel_state != CS_UP))
|
||||
return 0;
|
||||
|
||||
if ((new->gw_mode != old->gw_mode) ||
|
||||
(new->aigp != old->aigp) ||
|
||||
(new->cost != old->cost))
|
||||
{
|
||||
/* import_changed itself does not force ROUTE_REFRESH when import_table is active */
|
||||
if (c->c.in_table && (c->c.channel_state == CS_UP))
|
||||
bgp_schedule_packet(p->conn, c, PKT_ROUTE_REFRESH);
|
||||
|
||||
*import_changed = 1;
|
||||
}
|
||||
|
||||
if (!ipa_equal(new->next_hop_addr, old->next_hop_addr) ||
|
||||
(new->next_hop_self != old->next_hop_self) ||
|
||||
(new->next_hop_keep != old->next_hop_keep) ||
|
||||
(new->missing_lladdr != old->missing_lladdr) ||
|
||||
(new->aigp != old->aigp) ||
|
||||
(new->aigp_originate != old->aigp_originate))
|
||||
*export_changed = 1;
|
||||
|
||||
c->cf = new;
|
||||
return 1;
|
||||
}
|
||||
@ -2056,7 +2219,7 @@ bgp_state_dsc(struct bgp_proto *p)
|
||||
return "Down";
|
||||
|
||||
int state = MAX(p->incoming_conn.state, p->outgoing_conn.state);
|
||||
if ((state == BS_IDLE) && (p->start_state >= BSS_CONNECT) && p->cf->passive)
|
||||
if ((state == BS_IDLE) && (p->start_state >= BSS_CONNECT) && p->passive)
|
||||
return "Passive";
|
||||
|
||||
return bgp_state_names[state];
|
||||
@ -2232,8 +2395,14 @@ bgp_show_proto_info(struct proto *P)
|
||||
struct bgp_proto *p = (struct bgp_proto *) P;
|
||||
|
||||
cli_msg(-1006, " BGP state: %s", bgp_state_dsc(p));
|
||||
cli_msg(-1006, " Neighbor address: %I%J", p->cf->remote_ip, p->cf->iface);
|
||||
|
||||
if (bgp_is_dynamic(p) && p->cf->remote_range)
|
||||
cli_msg(-1006, " Neighbor range: %N", p->cf->remote_range);
|
||||
else
|
||||
cli_msg(-1006, " Neighbor address: %I%J", p->remote_ip, p->cf->iface);
|
||||
|
||||
cli_msg(-1006, " Neighbor AS: %u", p->remote_as);
|
||||
cli_msg(-1006, " Local AS: %u", p->cf->local_as);
|
||||
|
||||
if (p->gr_active_num)
|
||||
cli_msg(-1006, " Neighbor graceful restart active");
|
||||
@ -2269,7 +2438,7 @@ bgp_show_proto_info(struct proto *P)
|
||||
p->rr_client ? " route-reflector" : "",
|
||||
p->rs_client ? " route-server" : "",
|
||||
p->as4_session ? " AS4" : "");
|
||||
cli_msg(-1006, " Source address: %I", p->source_addr);
|
||||
cli_msg(-1006, " Source address: %I", p->local_ip);
|
||||
cli_msg(-1006, " Hold timer: %t/%u",
|
||||
tm_remains(p->conn->hold_timer), p->conn->hold_time);
|
||||
cli_msg(-1006, " Keepalive timer: %t/%u",
|
||||
|
@ -83,6 +83,7 @@ struct bgp_config {
|
||||
struct iface *iface; /* Interface for link-local addresses */
|
||||
u16 local_port; /* Local listening port */
|
||||
u16 remote_port; /* Neighbor destination port */
|
||||
int peer_type; /* Internal or external BGP (BGP_PT_*, optional) */
|
||||
int multihop; /* Number of hops if multihop */
|
||||
int strict_bind; /* Bind listening socket to local address */
|
||||
int ttl_security; /* Enable TTL security [RFC 5082] */
|
||||
@ -123,6 +124,9 @@ struct bgp_config {
|
||||
u32 disable_after_cease; /* Disable it when cease is received, bitfield */
|
||||
|
||||
char *password; /* Password used for MD5 authentication */
|
||||
net_addr *remote_range; /* Allowed neighbor range for dynamic BGP */
|
||||
char *dynamic_name; /* Name pattern for dynamic BGP */
|
||||
int dynamic_name_digits; /* Minimum number of digits for dynamic names */
|
||||
int check_link; /* Use iface link state for liveness detection */
|
||||
int bfd; /* Use BFD for liveness detection */
|
||||
};
|
||||
@ -136,6 +140,7 @@ struct bgp_channel_config {
|
||||
ip_addr next_hop_addr; /* Local address for NEXT_HOP attribute */
|
||||
u8 next_hop_self; /* Always set next hop to local IP address (NH_*) */
|
||||
u8 next_hop_keep; /* Do not modify next hop attribute (NH_*) */
|
||||
u8 mandatory; /* Channel is mandatory in capability negotiation */
|
||||
u8 missing_lladdr; /* What we will do when we don' know link-local addr, see MLL_* */
|
||||
u8 gw_mode; /* How we compute route gateway from next_hop attr, see GW_* */
|
||||
u8 secondary; /* Accept also non-best routes (i.e. RA_ACCEPTED) */
|
||||
@ -144,13 +149,19 @@ struct bgp_channel_config {
|
||||
uint llgr_time; /* Long-lived graceful restart stale time */
|
||||
u8 ext_next_hop; /* Allow both IPv4 and IPv6 next hops */
|
||||
u8 add_path; /* Use ADD-PATH extension [RFC 7911] */
|
||||
u8 aigp; /* AIGP is allowed on this session */
|
||||
u8 aigp_originate; /* AIGP is originated automatically */
|
||||
u32 cost; /* IGP cost for direct next hops */
|
||||
u8 import_table; /* Use c.in_table as Adj-RIB-In */
|
||||
u8 export_table; /* Use c.out_table as Adj-RIB-Out */
|
||||
|
||||
uint rest[0]; /* Remaining items are reconfigured separately */
|
||||
struct rtable_config *igp_table_ip4; /* Table for recursive IPv4 next hop lookups */
|
||||
struct rtable_config *igp_table_ip6; /* Table for recursive IPv6 next hop lookups */
|
||||
};
|
||||
|
||||
#define BGP_PT_INTERNAL 1
|
||||
#define BGP_PT_EXTERNAL 2
|
||||
|
||||
#define NH_NO 0
|
||||
#define NH_ALL 1
|
||||
#define NH_IBGP 2
|
||||
@ -213,8 +224,11 @@ struct bgp_caps {
|
||||
u16 gr_time; /* Graceful restart time in seconds */
|
||||
|
||||
u8 llgr_aware; /* Long-lived GR capability, RFC draft */
|
||||
u8 any_ext_next_hop; /* Bitwise OR of per-AF ext_next_hop */
|
||||
u8 any_add_path; /* Bitwise OR of per-AF add_path */
|
||||
|
||||
u16 af_count; /* Number of af_data items */
|
||||
u16 length; /* Length of capabilities in OPEN msg */
|
||||
|
||||
struct bgp_af_caps af_data[0]; /* Per-AF capability data */
|
||||
};
|
||||
@ -235,6 +249,7 @@ struct bgp_conn {
|
||||
u8 state; /* State of connection state machine */
|
||||
u8 as4_session; /* Session uses 4B AS numbers in AS_PATH (both sides support it) */
|
||||
u8 ext_messages; /* Session uses extended message length */
|
||||
u32 received_as; /* ASN received in OPEN message */
|
||||
|
||||
struct bgp_caps *local_caps;
|
||||
struct bgp_caps *remote_caps;
|
||||
@ -254,18 +269,21 @@ struct bgp_conn {
|
||||
|
||||
struct bgp_proto {
|
||||
struct proto p;
|
||||
struct bgp_config *cf; /* Shortcut to BGP configuration */
|
||||
const struct bgp_config *cf; /* Shortcut to BGP configuration */
|
||||
ip_addr local_ip, remote_ip;
|
||||
u32 local_as, remote_as;
|
||||
u32 public_as; /* Externally visible ASN (local_as or confederation id) */
|
||||
u32 local_id; /* BGP identifier of this router */
|
||||
u32 remote_id; /* BGP identifier of the neighbor */
|
||||
u32 rr_cluster_id; /* Route reflector cluster ID */
|
||||
int start_state; /* Substates that partitions BS_START */
|
||||
u8 start_state; /* Substates that partitions BS_START */
|
||||
u8 is_internal; /* Internal BGP session (local_as == remote_as) */
|
||||
u8 is_interior; /* Internal or intra-confederation BGP session */
|
||||
u8 as4_session; /* Session uses 4B AS numbers in AS_PATH (both sides support it) */
|
||||
u8 rr_client; /* Whether neighbor is RR client of me */
|
||||
u8 rs_client; /* Whether neighbor is RS client of me */
|
||||
u8 ipv4; /* Use IPv4 connection, i.e. remote_ip is IPv4 */
|
||||
u8 passive; /* Do not initiate outgoing connection */
|
||||
u8 route_refresh; /* Route refresh allowed to send [RFC 2918] */
|
||||
u8 enhanced_refresh; /* Enhanced refresh is negotiated [RFC 7313] */
|
||||
u8 gr_ready; /* Neighbor could do graceful restart */
|
||||
@ -282,11 +300,12 @@ struct bgp_proto {
|
||||
struct neighbor *neigh; /* Neighbor entry corresponding to remote ip, NULL if multihop */
|
||||
struct bgp_socket *sock; /* Shared listening socket */
|
||||
struct bfd_request *bfd_req; /* BFD request, if BFD is used */
|
||||
ip_addr source_addr; /* Local address used as an advertised next hop */
|
||||
ip_addr link_addr; /* Link-local version of source_addr */
|
||||
struct birdsock *postponed_sk; /* Postponed incoming socket for dynamic BGP */
|
||||
ip_addr link_addr; /* Link-local version of local_ip */
|
||||
event *event; /* Event for respawning and shutting process */
|
||||
timer *startup_timer; /* Timer used to delay protocol startup due to previous errors (startup_delay) */
|
||||
timer *gr_timer; /* Timer waiting for reestablishment after graceful restart */
|
||||
int dynamic_name_counter; /* Counter for dynamic BGP names */
|
||||
uint startup_delay; /* Delay (in seconds) of protocol startup due to previous errors */
|
||||
btime last_proto_error; /* Time of last error that leads to protocol stop */
|
||||
u8 last_error_class; /* Error class of last error */
|
||||
@ -363,6 +382,7 @@ struct bgp_export_state {
|
||||
|
||||
u32 attrs_seen[1];
|
||||
uint err_withdraw;
|
||||
uint local_next_hop;
|
||||
};
|
||||
|
||||
struct bgp_write_state {
|
||||
@ -376,7 +396,7 @@ struct bgp_write_state {
|
||||
int mpls;
|
||||
|
||||
eattr *mp_next_hop;
|
||||
adata *mpls_labels;
|
||||
const adata *mpls_labels;
|
||||
};
|
||||
|
||||
struct bgp_parse_state {
|
||||
@ -472,11 +492,16 @@ void bgp_graceful_restart_done(struct bgp_channel *c);
|
||||
void bgp_refresh_begin(struct bgp_channel *c);
|
||||
void bgp_refresh_end(struct bgp_channel *c);
|
||||
void bgp_store_error(struct bgp_proto *p, struct bgp_conn *c, u8 class, u32 code);
|
||||
void bgp_stop(struct bgp_proto *p, uint subcode, byte *data, uint len);
|
||||
void bgp_stop(struct bgp_proto *p, int subcode, byte *data, uint len);
|
||||
|
||||
struct rte_source *bgp_find_source(struct bgp_proto *p, u32 path_id);
|
||||
struct rte_source *bgp_get_source(struct bgp_proto *p, u32 path_id);
|
||||
|
||||
static inline int
|
||||
rte_resolvable(rte *rt)
|
||||
{
|
||||
return rt->attrs->dest == RTD_UNICAST;
|
||||
}
|
||||
|
||||
|
||||
#ifdef LOCAL_DEBUG
|
||||
@ -507,7 +532,7 @@ bgp_set_attr_u32(ea_list **to, struct linpool *pool, uint code, uint flags, u32
|
||||
{ bgp_set_attr(to, pool, code, flags, (uintptr_t) val); }
|
||||
|
||||
static inline void
|
||||
bgp_set_attr_ptr(ea_list **to, struct linpool *pool, uint code, uint flags, struct adata *val)
|
||||
bgp_set_attr_ptr(ea_list **to, struct linpool *pool, uint code, uint flags, const struct adata *val)
|
||||
{ bgp_set_attr(to, pool, code, flags, (uintptr_t) val); }
|
||||
|
||||
static inline void
|
||||
@ -525,6 +550,7 @@ bgp_unset_attr(ea_list **to, struct linpool *pool, uint code)
|
||||
|
||||
int bgp_encode_attrs(struct bgp_write_state *s, ea_list *attrs, byte *buf, byte *end);
|
||||
ea_list * bgp_decode_attrs(struct bgp_parse_state *s, byte *data, uint len);
|
||||
void bgp_finish_attrs(struct bgp_parse_state *s, rta *a);
|
||||
|
||||
void bgp_init_bucket_table(struct bgp_channel *c);
|
||||
void bgp_free_bucket_table(struct bgp_channel *c);
|
||||
@ -544,11 +570,26 @@ void bgp_rt_notify(struct proto *P, struct channel *C, net *n, rte *new, rte *ol
|
||||
int bgp_preexport(struct proto *, struct rte **, struct linpool *);
|
||||
int bgp_get_attr(struct eattr *e, byte *buf, int buflen);
|
||||
void bgp_get_route_info(struct rte *, byte *buf);
|
||||
int bgp_total_aigp_metric_(rte *e, u64 *metric, const struct adata **ad);
|
||||
|
||||
#define BGP_AIGP_METRIC 1
|
||||
#define BGP_AIGP_MAX U64(0xffffffffffffffff)
|
||||
|
||||
static inline u64
|
||||
bgp_total_aigp_metric(rte *r)
|
||||
{
|
||||
u64 metric = BGP_AIGP_MAX;
|
||||
const struct adata *ad;
|
||||
|
||||
bgp_total_aigp_metric_(r, &metric, &ad);
|
||||
return metric;
|
||||
}
|
||||
|
||||
|
||||
/* packets.c */
|
||||
|
||||
void bgp_dump_state_change(struct bgp_conn *conn, uint old, uint new);
|
||||
void bgp_prepare_capabilities(struct bgp_conn *conn);
|
||||
const struct bgp_af_desc *bgp_get_af_desc(u32 afi);
|
||||
const struct bgp_af_caps *bgp_find_af_caps(struct bgp_caps *caps, u32 afi);
|
||||
void bgp_schedule_packet(struct bgp_conn *conn, struct bgp_channel *c, int type);
|
||||
@ -578,6 +619,8 @@ void bgp_update_next_hop(struct bgp_export_state *s, eattr *a, ea_list **to);
|
||||
#define BAF_PARTIAL 0x20
|
||||
#define BAF_EXT_LEN 0x10
|
||||
|
||||
#define BAF_DECODE_FLAGS 0x0100 /* Private flag - attribute flags are handled by the decode hook */
|
||||
|
||||
#define BA_ORIGIN 0x01 /* RFC 4271 */ /* WM */
|
||||
#define BA_AS_PATH 0x02 /* WM */
|
||||
#define BA_NEXT_HOP 0x03 /* WM */
|
||||
@ -593,6 +636,7 @@ void bgp_update_next_hop(struct bgp_export_state *s, eattr *a, ea_list **to);
|
||||
#define BA_EXT_COMMUNITY 0x10 /* RFC 4360 */
|
||||
#define BA_AS4_PATH 0x11 /* RFC 6793 */
|
||||
#define BA_AS4_AGGREGATOR 0x12 /* RFC 6793 */
|
||||
#define BA_AIGP 0x1a /* RFC 7311 */
|
||||
#define BA_LARGE_COMMUNITY 0x20 /* RFC 8092 */
|
||||
|
||||
/* Bird's private internal BGP attributes */
|
||||
|
@ -29,7 +29,8 @@ CF_KEYWORDS(BGP, LOCAL, NEIGHBOR, AS, HOLD, TIME, CONNECT, RETRY, KEEPALIVE,
|
||||
SECURITY, DETERMINISTIC, SECONDARY, ALLOW, BFD, ADD, PATHS, RX, TX,
|
||||
GRACEFUL, RESTART, AWARE, CHECK, LINK, PORT, EXTENDED, MESSAGES, SETKEY,
|
||||
STRICT, BIND, CONFEDERATION, MEMBER, MULTICAST, FLOW4, FLOW6, LONG,
|
||||
LIVED, STALE, IMPORT, IBGP, EBGP)
|
||||
LIVED, STALE, IMPORT, IBGP, EBGP, MANDATORY, INTERNAL, EXTERNAL,
|
||||
DYNAMIC, RANGE, NAME, DIGITS, BGP_AIGP, AIGP, ORIGINATE, COST)
|
||||
|
||||
%type <i> bgp_nh
|
||||
%type <i32> bgp_afi
|
||||
@ -68,6 +69,7 @@ bgp_proto_start: proto_start BGP {
|
||||
BGP_CFG->llgr_mode = -1;
|
||||
BGP_CFG->llgr_time = 3600;
|
||||
BGP_CFG->setkey = 1;
|
||||
BGP_CFG->dynamic_name = "dynbgp";
|
||||
BGP_CFG->check_link = -1;
|
||||
}
|
||||
;
|
||||
@ -82,6 +84,8 @@ bgp_nbr_opts:
|
||||
/* empty */
|
||||
| bgp_nbr_opts PORT expr { BGP_CFG->remote_port = $3; if (($3<1) || ($3>65535)) cf_error("Invalid port number"); }
|
||||
| bgp_nbr_opts AS expr { BGP_CFG->remote_as = $3; }
|
||||
| bgp_nbr_opts INTERNAL { BGP_CFG->peer_type = BGP_PT_INTERNAL; }
|
||||
| bgp_nbr_opts EXTERNAL { BGP_CFG->peer_type = BGP_PT_EXTERNAL; }
|
||||
;
|
||||
|
||||
bgp_cease_mask:
|
||||
@ -118,11 +122,18 @@ bgp_proto:
|
||||
}
|
||||
| bgp_proto NEIGHBOR bgp_nbr_opts ';'
|
||||
| bgp_proto NEIGHBOR ipa ipa_scope bgp_nbr_opts ';' {
|
||||
if (ipa_nonzero(BGP_CFG->remote_ip))
|
||||
if (ipa_nonzero(BGP_CFG->remote_ip) || BGP_CFG->remote_range)
|
||||
cf_error("Only one neighbor per BGP instance is allowed");
|
||||
BGP_CFG->remote_ip = $3;
|
||||
if ($4) BGP_CFG->iface = $4;
|
||||
}
|
||||
| bgp_proto NEIGHBOR RANGE net_ip bgp_nbr_opts ';' {
|
||||
if (ipa_nonzero(BGP_CFG->remote_ip) || BGP_CFG->remote_range)
|
||||
cf_error("Only one neighbor per BGP instance is allowed");
|
||||
net_addr *n = cfg_alloc($4.length);
|
||||
net_copy(n, &($4));
|
||||
BGP_CFG->remote_range = n;
|
||||
}
|
||||
| bgp_proto INTERFACE TEXT ';' { BGP_CFG->iface = if_get_by_name($3); }
|
||||
| bgp_proto RR CLUSTER ID idval ';' { BGP_CFG->rr_cluster_id = $5; }
|
||||
| bgp_proto RR CLIENT bool ';' { BGP_CFG->rr_client = $4; }
|
||||
@ -134,6 +145,12 @@ bgp_proto:
|
||||
| bgp_proto DIRECT ';' { BGP_CFG->multihop = 0; }
|
||||
| bgp_proto MULTIHOP ';' { BGP_CFG->multihop = 64; }
|
||||
| bgp_proto MULTIHOP expr ';' { BGP_CFG->multihop = $3; if (($3<1) || ($3>255)) cf_error("Multihop must be in range 1-255"); }
|
||||
| bgp_proto DYNAMIC NAME text ';' {
|
||||
if (strchr($4, '%')) cf_error("Forbidden character '%%' in dynamic name");
|
||||
if (strlen($4) > (SYM_MAX_LEN - 16)) cf_error("Dynamic name too long");
|
||||
BGP_CFG->dynamic_name = $4;
|
||||
}
|
||||
| bgp_proto DYNAMIC NAME DIGITS expr ';' { BGP_CFG->dynamic_name_digits = $5; if ($5>10) cf_error("Dynamic name digits must be at most 10"); }
|
||||
| bgp_proto STRICT BIND bool ';' { BGP_CFG->strict_bind = $4; }
|
||||
| bgp_proto PATH METRIC bool ';' { BGP_CFG->compare_path_lengths = $4; }
|
||||
| bgp_proto MED METRIC bool ';' { BGP_CFG->med_metric = $4; }
|
||||
@ -210,6 +227,7 @@ bgp_channel_start: bgp_afi
|
||||
BGP_CC->gr_able = 0xff; /* undefined */
|
||||
BGP_CC->llgr_able = 0xff; /* undefined */
|
||||
BGP_CC->llgr_time = ~0U; /* undefined */
|
||||
BGP_CC->aigp = 0xff; /* undefined */
|
||||
}
|
||||
};
|
||||
|
||||
@ -223,6 +241,7 @@ bgp_channel_item:
|
||||
| NEXT HOP ADDRESS ipa { BGP_CC->next_hop_addr = $4; }
|
||||
| NEXT HOP SELF bgp_nh { BGP_CC->next_hop_self = $4; }
|
||||
| NEXT HOP KEEP bgp_nh { BGP_CC->next_hop_keep = $4; }
|
||||
| MANDATORY bool { BGP_CC->mandatory = $2; }
|
||||
| MISSING LLADDR SELF { BGP_CC->missing_lladdr = MLL_SELF; }
|
||||
| MISSING LLADDR DROP { BGP_CC->missing_lladdr = MLL_DROP; }
|
||||
| MISSING LLADDR IGNORE { BGP_CC->missing_lladdr = MLL_IGNORE; }
|
||||
@ -237,6 +256,10 @@ bgp_channel_item:
|
||||
| ADD PATHS TX { BGP_CC->add_path = BGP_ADD_PATH_TX; }
|
||||
| ADD PATHS bool { BGP_CC->add_path = $3 ? BGP_ADD_PATH_FULL : 0; }
|
||||
| IMPORT TABLE bool { BGP_CC->import_table = $3; }
|
||||
| EXPORT TABLE bool { BGP_CC->export_table = $3; }
|
||||
| AIGP bool { BGP_CC->aigp = $2; BGP_CC->aigp_originate = 0; }
|
||||
| AIGP ORIGINATE { BGP_CC->aigp = 1; BGP_CC->aigp_originate = 1; }
|
||||
| COST expr { BGP_CC->cost = $2; if ($2 < 1) cf_error("Cost must be positive"); }
|
||||
| IGP TABLE rtable {
|
||||
if (BGP_CC->desc->no_igp)
|
||||
cf_error("IGP table not allowed here");
|
||||
@ -284,7 +307,7 @@ dynamic_attr: BGP_LOCAL_PREF
|
||||
dynamic_attr: BGP_ATOMIC_AGGR
|
||||
{ $$ = f_new_dynamic_attr(EAF_TYPE_OPAQUE, T_ENUM_EMPTY, EA_CODE(PROTOCOL_BGP, BA_ATOMIC_AGGR)); } ;
|
||||
dynamic_attr: BGP_AGGREGATOR
|
||||
{ $$ = f_new_dynamic_attr(EAF_TYPE_INT, T_INT, EA_CODE(PROTOCOL_BGP, BA_AGGREGATOR)); } ;
|
||||
{ $$ = f_new_dynamic_attr(EAF_TYPE_OPAQUE, T_ENUM_EMPTY, EA_CODE(PROTOCOL_BGP, BA_AGGREGATOR)); } ;
|
||||
dynamic_attr: BGP_COMMUNITY
|
||||
{ $$ = f_new_dynamic_attr(EAF_TYPE_INT_SET, T_CLIST, EA_CODE(PROTOCOL_BGP, BA_COMMUNITY)); } ;
|
||||
dynamic_attr: BGP_ORIGINATOR_ID
|
||||
@ -293,6 +316,8 @@ dynamic_attr: BGP_CLUSTER_LIST
|
||||
{ $$ = f_new_dynamic_attr(EAF_TYPE_INT_SET, T_CLIST, EA_CODE(PROTOCOL_BGP, BA_CLUSTER_LIST)); } ;
|
||||
dynamic_attr: BGP_EXT_COMMUNITY
|
||||
{ $$ = f_new_dynamic_attr(EAF_TYPE_EC_SET, T_ECLIST, EA_CODE(PROTOCOL_BGP, BA_EXT_COMMUNITY)); } ;
|
||||
dynamic_attr: BGP_AIGP
|
||||
{ $$ = f_new_dynamic_attr(EAF_TYPE_OPAQUE, T_ENUM_EMPTY, EA_CODE(PROTOCOL_BGP, BA_AIGP)); } ;
|
||||
dynamic_attr: BGP_LARGE_COMMUNITY
|
||||
{ $$ = f_new_dynamic_attr(EAF_TYPE_LC_SET, T_LCLIST, EA_CODE(PROTOCOL_BGP, BA_LARGE_COMMUNITY)); } ;
|
||||
|
||||
|
@ -100,7 +100,7 @@ init_mrt_bgp_data(struct bgp_conn *conn, struct mrt_bgp_data *d)
|
||||
d->peer_as = p->remote_as;
|
||||
d->local_as = p->local_as;
|
||||
d->index = (p->neigh && p->neigh->iface) ? p->neigh->iface->index : 0;
|
||||
d->af = ipa_is_ip4(p->cf->remote_ip) ? BGP_AFI_IPV4 : BGP_AFI_IPV6;
|
||||
d->af = ipa_is_ip4(p->remote_ip) ? BGP_AFI_IPV4 : BGP_AFI_IPV6;
|
||||
d->peer_ip = conn->sk ? conn->sk->daddr : IPA_NONE;
|
||||
d->local_ip = conn->sk ? conn->sk->saddr : IPA_NONE;
|
||||
d->as4 = p_ok ? p->as4_session : 0;
|
||||
@ -185,14 +185,20 @@ bgp_find_af_caps(struct bgp_caps *caps, u32 afi)
|
||||
}
|
||||
|
||||
static struct bgp_af_caps *
|
||||
bgp_get_af_caps(struct bgp_caps *caps, u32 afi)
|
||||
bgp_get_af_caps(struct bgp_caps **pcaps, u32 afi)
|
||||
{
|
||||
struct bgp_caps *caps = *pcaps;
|
||||
struct bgp_af_caps *ac;
|
||||
|
||||
WALK_AF_CAPS(caps, ac)
|
||||
if (ac->afi == afi)
|
||||
return ac;
|
||||
|
||||
uint n = caps->af_count;
|
||||
if (uint_is_pow2(n))
|
||||
*pcaps = caps = mb_realloc(caps, sizeof(struct bgp_caps) +
|
||||
(2 * n) * sizeof(struct bgp_af_caps));
|
||||
|
||||
ac = &caps->af_data[caps->af_count++];
|
||||
memset(ac, 0, sizeof(struct bgp_af_caps));
|
||||
ac->afi = afi;
|
||||
@ -208,19 +214,22 @@ bgp_af_caps_cmp(const void *X, const void *Y)
|
||||
}
|
||||
|
||||
|
||||
static byte *
|
||||
bgp_write_capabilities(struct bgp_conn *conn, byte *buf)
|
||||
void
|
||||
bgp_prepare_capabilities(struct bgp_conn *conn)
|
||||
{
|
||||
struct bgp_proto *p = conn->bgp;
|
||||
struct bgp_channel *c;
|
||||
struct bgp_caps *caps;
|
||||
struct bgp_af_caps *ac;
|
||||
uint any_ext_next_hop = 0;
|
||||
uint any_add_path = 0;
|
||||
byte *data;
|
||||
|
||||
if (!p->cf->capabilities)
|
||||
{
|
||||
/* Just prepare empty local_caps */
|
||||
conn->local_caps = mb_allocz(p->p.pool, sizeof(struct bgp_caps));
|
||||
return;
|
||||
}
|
||||
|
||||
/* Prepare bgp_caps structure */
|
||||
|
||||
int n = list_length(&p->p.channels);
|
||||
caps = mb_allocz(p->p.pool, sizeof(struct bgp_caps) + n * sizeof(struct bgp_af_caps));
|
||||
conn->local_caps = caps;
|
||||
@ -251,10 +260,10 @@ bgp_write_capabilities(struct bgp_conn *conn, byte *buf)
|
||||
ac->ready = 1;
|
||||
|
||||
ac->ext_next_hop = bgp_channel_is_ipv4(c) && c->cf->ext_next_hop;
|
||||
any_ext_next_hop |= ac->ext_next_hop;
|
||||
caps->any_ext_next_hop |= ac->ext_next_hop;
|
||||
|
||||
ac->add_path = c->cf->add_path;
|
||||
any_add_path |= ac->add_path;
|
||||
caps->any_add_path |= ac->add_path;
|
||||
|
||||
if (c->cf->gr_able)
|
||||
{
|
||||
@ -276,14 +285,23 @@ bgp_write_capabilities(struct bgp_conn *conn, byte *buf)
|
||||
|
||||
/* Sort capability fields by AFI/SAFI */
|
||||
qsort(caps->af_data, caps->af_count, sizeof(struct bgp_af_caps), bgp_af_caps_cmp);
|
||||
}
|
||||
|
||||
static byte *
|
||||
bgp_write_capabilities(struct bgp_conn *conn, byte *buf)
|
||||
{
|
||||
struct bgp_proto *p = conn->bgp;
|
||||
struct bgp_caps *caps = conn->local_caps;
|
||||
struct bgp_af_caps *ac;
|
||||
byte *buf_head = buf;
|
||||
byte *data;
|
||||
|
||||
/* Create capability list in buffer */
|
||||
|
||||
/*
|
||||
* Note that max length is ~ 22+21*af_count. With max 12 channels that is
|
||||
* 274. Option limit is 253 and buffer size is 4096, so we cannot overflow
|
||||
* unless we add new capabilities or more AFs. XXXXX
|
||||
* 274. We are limited just by buffer size (4096, minus header), as we support
|
||||
* extended optional parameres. Therefore, we have enough space for expansion.
|
||||
*/
|
||||
|
||||
WALK_AF_CAPS(caps, ac)
|
||||
@ -301,7 +319,7 @@ bgp_write_capabilities(struct bgp_conn *conn, byte *buf)
|
||||
*buf++ = 0; /* Capability data length */
|
||||
}
|
||||
|
||||
if (any_ext_next_hop)
|
||||
if (caps->any_ext_next_hop)
|
||||
{
|
||||
*buf++ = 5; /* Capability 5: Support for extended next hop */
|
||||
*buf++ = 0; /* Capability data length, will be fixed later */
|
||||
@ -353,7 +371,7 @@ bgp_write_capabilities(struct bgp_conn *conn, byte *buf)
|
||||
buf += 4;
|
||||
}
|
||||
|
||||
if (any_add_path)
|
||||
if (caps->any_add_path)
|
||||
{
|
||||
*buf++ = 69; /* Capability 69: Support for ADD-PATH */
|
||||
*buf++ = 0; /* Capability data length, will be fixed later */
|
||||
@ -394,17 +412,30 @@ bgp_write_capabilities(struct bgp_conn *conn, byte *buf)
|
||||
data[-1] = buf - data;
|
||||
}
|
||||
|
||||
caps->length = buf - buf_head;
|
||||
|
||||
return buf;
|
||||
}
|
||||
|
||||
static void
|
||||
bgp_read_capabilities(struct bgp_conn *conn, struct bgp_caps *caps, byte *pos, int len)
|
||||
static int
|
||||
bgp_read_capabilities(struct bgp_conn *conn, byte *pos, int len)
|
||||
{
|
||||
struct bgp_proto *p = conn->bgp;
|
||||
struct bgp_caps *caps;
|
||||
struct bgp_af_caps *ac;
|
||||
int i, cl;
|
||||
u32 af;
|
||||
|
||||
if (!conn->remote_caps)
|
||||
caps = mb_allocz(p->p.pool, sizeof(struct bgp_caps) + sizeof(struct bgp_af_caps));
|
||||
else
|
||||
{
|
||||
caps = conn->remote_caps;
|
||||
conn->remote_caps = NULL;
|
||||
}
|
||||
|
||||
caps->length += len;
|
||||
|
||||
while (len > 0)
|
||||
{
|
||||
if (len < 2 || len < (2 + pos[1]))
|
||||
@ -421,7 +452,7 @@ bgp_read_capabilities(struct bgp_conn *conn, struct bgp_caps *caps, byte *pos, i
|
||||
goto err;
|
||||
|
||||
af = get_af4(pos+2);
|
||||
ac = bgp_get_af_caps(caps, af);
|
||||
ac = bgp_get_af_caps(&caps, af);
|
||||
ac->ready = 1;
|
||||
break;
|
||||
|
||||
@ -444,7 +475,7 @@ bgp_read_capabilities(struct bgp_conn *conn, struct bgp_caps *caps, byte *pos, i
|
||||
continue;
|
||||
|
||||
af = get_af4(pos+2+i);
|
||||
ac = bgp_get_af_caps(caps, af);
|
||||
ac = bgp_get_af_caps(&caps, af);
|
||||
ac->ext_next_hop = 1;
|
||||
}
|
||||
break;
|
||||
@ -474,7 +505,7 @@ bgp_read_capabilities(struct bgp_conn *conn, struct bgp_caps *caps, byte *pos, i
|
||||
for (i = 2; i < cl; i += 4)
|
||||
{
|
||||
af = get_af3(pos+2+i);
|
||||
ac = bgp_get_af_caps(caps, af);
|
||||
ac = bgp_get_af_caps(&caps, af);
|
||||
ac->gr_able = 1;
|
||||
ac->gr_af_flags = pos[2+i+3];
|
||||
}
|
||||
@ -506,7 +537,7 @@ bgp_read_capabilities(struct bgp_conn *conn, struct bgp_caps *caps, byte *pos, i
|
||||
for (i = 0; i < cl; i += 4)
|
||||
{
|
||||
af = get_af3(pos+2+i);
|
||||
ac = bgp_get_af_caps(caps, af);
|
||||
ac = bgp_get_af_caps(&caps, af);
|
||||
ac->add_path = pos[2+i+3];
|
||||
}
|
||||
break;
|
||||
@ -535,7 +566,7 @@ bgp_read_capabilities(struct bgp_conn *conn, struct bgp_caps *caps, byte *pos, i
|
||||
for (i = 0; i < cl; i += 7)
|
||||
{
|
||||
af = get_af3(pos+2+i);
|
||||
ac = bgp_get_af_caps(caps, af);
|
||||
ac = bgp_get_af_caps(&caps, af);
|
||||
ac->llgr_able = 1;
|
||||
ac->llgr_flags = pos[2+i+3];
|
||||
ac->llgr_time = get_u24(pos + 2+i+4);
|
||||
@ -561,51 +592,114 @@ bgp_read_capabilities(struct bgp_conn *conn, struct bgp_caps *caps, byte *pos, i
|
||||
}
|
||||
}
|
||||
|
||||
return;
|
||||
conn->remote_caps = caps;
|
||||
return 0;
|
||||
|
||||
err:
|
||||
mb_free(caps);
|
||||
bgp_error(conn, 2, 0, NULL, 0);
|
||||
return;
|
||||
return -1;
|
||||
}
|
||||
|
||||
static int
|
||||
bgp_read_options(struct bgp_conn *conn, byte *pos, int len)
|
||||
bgp_check_capabilities(struct bgp_conn *conn)
|
||||
{
|
||||
struct bgp_proto *p = conn->bgp;
|
||||
struct bgp_caps *caps;
|
||||
int ol;
|
||||
struct bgp_caps *local = conn->local_caps;
|
||||
struct bgp_caps *remote = conn->remote_caps;
|
||||
struct bgp_channel *c;
|
||||
int count = 0;
|
||||
|
||||
/* Max number of announced AFIs is limited by max option length (255) */
|
||||
caps = alloca(sizeof(struct bgp_caps) + 64 * sizeof(struct bgp_af_caps));
|
||||
memset(caps, 0, sizeof(struct bgp_caps));
|
||||
/* This is partially overlapping with bgp_conn_enter_established_state(),
|
||||
but we need to run this just after we receive OPEN message */
|
||||
|
||||
WALK_LIST(c, p->p.channels)
|
||||
{
|
||||
const struct bgp_af_caps *loc = bgp_find_af_caps(local, c->afi);
|
||||
const struct bgp_af_caps *rem = bgp_find_af_caps(remote, c->afi);
|
||||
|
||||
/* Find out whether this channel will be active */
|
||||
int active = loc && loc->ready &&
|
||||
((rem && rem->ready) || (!remote->length && (c->afi == BGP_AF_IPV4)));
|
||||
|
||||
/* Mandatory must be active */
|
||||
if (c->cf->mandatory && !active)
|
||||
return 0;
|
||||
|
||||
if (active)
|
||||
count++;
|
||||
}
|
||||
|
||||
/* We need at least one channel active */
|
||||
if (!count)
|
||||
return 0;
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
static int
|
||||
bgp_read_options(struct bgp_conn *conn, byte *pos, uint len, uint rest)
|
||||
{
|
||||
struct bgp_proto *p = conn->bgp;
|
||||
int ext = 0;
|
||||
|
||||
/* Handle extended length (draft-ietf-idr-ext-opt-param-07) */
|
||||
if ((len > 0) && (rest > 0) && (pos[0] == 255))
|
||||
{
|
||||
if (rest < 3)
|
||||
goto err;
|
||||
|
||||
/* Update pos/len to describe optional data */
|
||||
len = get_u16(pos+1);
|
||||
ext = 1;
|
||||
pos += 3;
|
||||
rest -= 3;
|
||||
}
|
||||
|
||||
/* Verify that optional data fits into OPEN packet */
|
||||
if (len > rest)
|
||||
goto err;
|
||||
|
||||
/* Length of option parameter header */
|
||||
uint hlen = ext ? 3 : 2;
|
||||
|
||||
while (len > 0)
|
||||
{
|
||||
if ((len < 2) || (len < (2 + pos[1])))
|
||||
{ bgp_error(conn, 2, 0, NULL, 0); return -1; }
|
||||
if (len < hlen)
|
||||
goto err;
|
||||
|
||||
ol = pos[1];
|
||||
if (pos[0] == 2)
|
||||
uint otype = get_u8(pos);
|
||||
uint olen = ext ? get_u16(pos+1) : get_u8(pos+1);
|
||||
|
||||
if (len < (hlen + olen))
|
||||
goto err;
|
||||
|
||||
if (otype == 2)
|
||||
{
|
||||
/* BGP capabilities, RFC 5492 */
|
||||
if (p->cf->capabilities)
|
||||
bgp_read_capabilities(conn, caps, pos + 2, ol);
|
||||
if (bgp_read_capabilities(conn, pos + hlen, olen) < 0)
|
||||
return -1;
|
||||
}
|
||||
else
|
||||
{
|
||||
/* Unknown option */
|
||||
bgp_error(conn, 2, 4, pos, ol); /* FIXME: ol or ol+2 ? */
|
||||
bgp_error(conn, 2, 4, pos, hlen + olen);
|
||||
return -1;
|
||||
}
|
||||
|
||||
ADVANCE(pos, len, 2 + ol);
|
||||
ADVANCE(pos, len, hlen + olen);
|
||||
}
|
||||
|
||||
uint n = sizeof(struct bgp_caps) + caps->af_count * sizeof(struct bgp_af_caps);
|
||||
conn->remote_caps = mb_allocz(p->p.pool, n);
|
||||
memcpy(conn->remote_caps, caps, n);
|
||||
/* Prepare empty caps if no capability option was announced */
|
||||
if (!conn->remote_caps)
|
||||
conn->remote_caps = mb_allocz(p->p.pool, sizeof(struct bgp_caps));
|
||||
|
||||
return 0;
|
||||
|
||||
err:
|
||||
bgp_error(conn, 2, 0, NULL, 0);
|
||||
return -1;
|
||||
}
|
||||
|
||||
static byte *
|
||||
@ -624,20 +718,34 @@ bgp_create_open(struct bgp_conn *conn, byte *buf)
|
||||
if (p->cf->capabilities)
|
||||
{
|
||||
/* Prepare local_caps and write capabilities to buffer */
|
||||
byte *end = bgp_write_capabilities(conn, buf+12);
|
||||
uint len = end - (buf+12);
|
||||
byte *pos = buf+12;
|
||||
byte *end = bgp_write_capabilities(conn, pos);
|
||||
uint len = end - pos;
|
||||
|
||||
buf[9] = len + 2; /* Optional parameters length */
|
||||
buf[10] = 2; /* Option 2: Capability list */
|
||||
buf[11] = len; /* Option data length */
|
||||
if (len < 254)
|
||||
{
|
||||
buf[9] = len + 2; /* Optional parameters length */
|
||||
buf[10] = 2; /* Option 2: Capability list */
|
||||
buf[11] = len; /* Option data length */
|
||||
}
|
||||
else /* draft-ietf-idr-ext-opt-param-07 */
|
||||
{
|
||||
/* Move capabilities 4 B forward */
|
||||
memmove(buf + 16, pos, len);
|
||||
pos = buf + 16;
|
||||
end = pos + len;
|
||||
|
||||
buf[9] = 255; /* Non-ext OP length, fake */
|
||||
buf[10] = 255; /* Non-ext OP type, signals extended length */
|
||||
put_u16(buf+11, len + 3); /* Extended optional parameters length */
|
||||
buf[13] = 2; /* Option 2: Capability list */
|
||||
put_u16(buf+14, len); /* Option extended data length */
|
||||
}
|
||||
|
||||
return end;
|
||||
}
|
||||
else
|
||||
{
|
||||
/* Prepare empty local_caps */
|
||||
conn->local_caps = mb_allocz(p->p.pool, sizeof(struct bgp_caps));
|
||||
|
||||
buf[9] = 0; /* No optional parameters */
|
||||
return buf + 10;
|
||||
}
|
||||
@ -656,8 +764,8 @@ bgp_rx_open(struct bgp_conn *conn, byte *pkt, uint len)
|
||||
if (conn->state != BS_OPENSENT)
|
||||
{ bgp_error(conn, 5, fsm_err_subcode[conn->state], NULL, 0); return; }
|
||||
|
||||
/* Check message contents */
|
||||
if (len < 29 || len != 29 + (uint) pkt[28])
|
||||
/* Check message length */
|
||||
if (len < 29)
|
||||
{ bgp_error(conn, 1, 2, pkt+16, 2); return; }
|
||||
|
||||
if (pkt[19] != BGP_VERSION)
|
||||
@ -668,7 +776,7 @@ bgp_rx_open(struct bgp_conn *conn, byte *pkt, uint len)
|
||||
id = get_u32(pkt+24);
|
||||
BGP_TRACE(D_PACKETS, "Got OPEN(as=%d,hold=%d,id=%R)", asn, hold, id);
|
||||
|
||||
if (bgp_read_options(conn, pkt+29, pkt[28]) < 0)
|
||||
if (bgp_read_options(conn, pkt+29, pkt[28], len-29) < 0)
|
||||
return;
|
||||
|
||||
if (hold > 0 && hold < 3)
|
||||
@ -678,6 +786,10 @@ bgp_rx_open(struct bgp_conn *conn, byte *pkt, uint len)
|
||||
if (!id || (p->is_internal && id == p->local_id))
|
||||
{ bgp_error(conn, 2, 3, pkt+24, -4); return; }
|
||||
|
||||
/* RFC 5492 4 - check for required capabilities */
|
||||
if (p->cf->capabilities && !bgp_check_capabilities(conn))
|
||||
{ bgp_error(conn, 2, 7, NULL, 0); return; }
|
||||
|
||||
struct bgp_caps *caps = conn->remote_caps;
|
||||
|
||||
if (caps->as4_support)
|
||||
@ -687,13 +799,18 @@ bgp_rx_open(struct bgp_conn *conn, byte *pkt, uint len)
|
||||
if ((as4 != asn) && (asn != AS_TRANS))
|
||||
log(L_WARN "%s: Peer advertised inconsistent AS numbers", p->p.name);
|
||||
|
||||
if (as4 != p->remote_as)
|
||||
/* When remote ASN is unspecified, it must be external one */
|
||||
if (p->remote_as ? (as4 != p->remote_as) : (as4 == p->local_as))
|
||||
{ as4 = htonl(as4); bgp_error(conn, 2, 2, (byte *) &as4, 4); return; }
|
||||
|
||||
conn->received_as = as4;
|
||||
}
|
||||
else
|
||||
{
|
||||
if (asn != p->remote_as)
|
||||
if (p->remote_as ? (asn != p->remote_as) : (asn == p->local_as))
|
||||
{ bgp_error(conn, 2, 2, pkt+20, 2); return; }
|
||||
|
||||
conn->received_as = asn;
|
||||
}
|
||||
|
||||
/* Check the other connection */
|
||||
@ -802,6 +919,7 @@ bgp_apply_next_hop(struct bgp_parse_state *s, rta *a, ip_addr gw, ip_addr ll)
|
||||
a->dest = RTD_UNICAST;
|
||||
a->nh.gw = nbr->addr;
|
||||
a->nh.iface = nbr->iface;
|
||||
a->igp_metric = c->cf->cost;
|
||||
}
|
||||
else /* GW_RECURSIVE */
|
||||
{
|
||||
@ -946,6 +1064,7 @@ bgp_update_next_hop_ip(struct bgp_export_state *s, eattr *a, ea_list **to)
|
||||
{
|
||||
ip_addr nh[2] = { s->channel->next_hop_addr, s->channel->link_addr };
|
||||
bgp_set_attr_data(to, s->pool, BA_NEXT_HOP, 0, nh, ipa_nonzero(nh[1]) ? 32 : 16);
|
||||
s->local_next_hop = 1;
|
||||
|
||||
/* TODO: Use local MPLS assigned label */
|
||||
if (s->mpls)
|
||||
@ -962,7 +1081,7 @@ bgp_update_next_hop_ip(struct bgp_export_state *s, eattr *a, ea_list **to)
|
||||
WITHDRAW(NO_NEXT_HOP);
|
||||
|
||||
ip_addr *nh = (void *) a->u.ptr->data;
|
||||
ip_addr peer = s->proto->cf->remote_ip;
|
||||
ip_addr peer = s->proto->remote_ip;
|
||||
uint len = a->u.ptr->length;
|
||||
|
||||
/* Forbid zero next hop */
|
||||
@ -1210,10 +1329,10 @@ bgp_rte_update(struct bgp_parse_state *s, net_addr *n, u32 path_id, rta *a0)
|
||||
}
|
||||
|
||||
static void
|
||||
bgp_encode_mpls_labels(struct bgp_write_state *s UNUSED, adata *mpls, byte **pos, uint *size, byte *pxlen)
|
||||
bgp_encode_mpls_labels(struct bgp_write_state *s UNUSED, const adata *mpls, byte **pos, uint *size, byte *pxlen)
|
||||
{
|
||||
u32 dummy = 0;
|
||||
u32 *labels = mpls ? (u32 *) mpls->data : &dummy;
|
||||
const u32 dummy = 0;
|
||||
const u32 *labels = mpls ? (const u32 *) mpls->data : &dummy;
|
||||
uint lnum = mpls ? (mpls->length / 4) : 1;
|
||||
|
||||
for (uint i = 0; i < lnum; i++)
|
||||
@ -2280,10 +2399,11 @@ bgp_decode_nlri(struct bgp_parse_state *s, u32 afi, byte *nlri, uint len, ea_lis
|
||||
|
||||
a->source = RTS_BGP;
|
||||
a->scope = SCOPE_UNIVERSE;
|
||||
a->from = s->proto->cf->remote_ip;
|
||||
a->from = s->proto->remote_ip;
|
||||
a->eattrs = ea;
|
||||
|
||||
c->desc->decode_next_hop(s, nh, nh_len, a);
|
||||
bgp_finish_attrs(s, a);
|
||||
|
||||
/* Handle withdraw during next hop decoding */
|
||||
if (s->err_withdraw)
|
||||
@ -2634,6 +2754,12 @@ bgp_fire_tx(struct bgp_conn *conn)
|
||||
end = bgp_create_notification(conn, pkt);
|
||||
return bgp_send(conn, PKT_NOTIFICATION, end - buf);
|
||||
}
|
||||
else if (s & (1 << PKT_OPEN))
|
||||
{
|
||||
conn->packets_to_send &= ~(1 << PKT_OPEN);
|
||||
end = bgp_create_open(conn, pkt);
|
||||
return bgp_send(conn, PKT_OPEN, end - buf);
|
||||
}
|
||||
else if (s & (1 << PKT_KEEPALIVE))
|
||||
{
|
||||
conn->packets_to_send &= ~(1 << PKT_KEEPALIVE);
|
||||
@ -2641,12 +2767,6 @@ bgp_fire_tx(struct bgp_conn *conn)
|
||||
bgp_start_timer(conn->keepalive_timer, conn->keepalive_time);
|
||||
return bgp_send(conn, PKT_KEEPALIVE, BGP_HEADER_LENGTH);
|
||||
}
|
||||
else if (s & (1 << PKT_OPEN))
|
||||
{
|
||||
conn->packets_to_send &= ~(1 << PKT_OPEN);
|
||||
end = bgp_create_open(conn, pkt);
|
||||
return bgp_send(conn, PKT_OPEN, end - buf);
|
||||
}
|
||||
else while (conn->channels_to_send)
|
||||
{
|
||||
c = bgp_get_channel_to_send(p, conn);
|
||||
@ -2731,15 +2851,18 @@ bgp_schedule_packet(struct bgp_conn *conn, struct bgp_channel *c, int type)
|
||||
if ((conn->sk->tpos == conn->sk->tbuf) && !ev_active(conn->tx_ev))
|
||||
ev_schedule(conn->tx_ev);
|
||||
}
|
||||
|
||||
void
|
||||
bgp_kick_tx(void *vconn)
|
||||
{
|
||||
struct bgp_conn *conn = vconn;
|
||||
|
||||
DBG("BGP: kicking TX\n");
|
||||
while (bgp_fire_tx(conn) > 0)
|
||||
uint max = 1024;
|
||||
while (--max && (bgp_fire_tx(conn) > 0))
|
||||
;
|
||||
|
||||
if (!max && !ev_active(conn->tx_ev))
|
||||
ev_schedule(conn->tx_ev);
|
||||
}
|
||||
|
||||
void
|
||||
@ -2748,8 +2871,12 @@ bgp_tx(sock *sk)
|
||||
struct bgp_conn *conn = sk->data;
|
||||
|
||||
DBG("BGP: TX hook\n");
|
||||
while (bgp_fire_tx(conn) > 0)
|
||||
uint max = 1024;
|
||||
while (--max && (bgp_fire_tx(conn) > 0))
|
||||
;
|
||||
|
||||
if (!max && !ev_active(conn->tx_ev))
|
||||
ev_schedule(conn->tx_ev);
|
||||
}
|
||||
|
||||
|
||||
@ -2835,7 +2962,7 @@ bgp_handle_message(struct bgp_proto *p, byte *data, uint len, byte **bp)
|
||||
return 1;
|
||||
|
||||
/* Handle proper message */
|
||||
if ((msg_len > 128) && (msg_len + 1 > len))
|
||||
if (msg_len + 1 > len)
|
||||
return 0;
|
||||
|
||||
/* Some elementary cleanup */
|
||||
@ -2851,7 +2978,7 @@ bgp_handle_message(struct bgp_proto *p, byte *data, uint len, byte **bp)
|
||||
void
|
||||
bgp_log_error(struct bgp_proto *p, u8 class, char *msg, uint code, uint subcode, byte *data, uint len)
|
||||
{
|
||||
byte argbuf[256], *t = argbuf;
|
||||
byte argbuf[256+16], *t = argbuf;
|
||||
uint i;
|
||||
|
||||
/* Don't report Cease messages generated by myself */
|
||||
|
@ -361,7 +361,7 @@ mrt_peer_table_dump(struct mrt_table_dump_state *s)
|
||||
if ((P->proto == &proto_bgp) && (P->proto_state != PS_DOWN))
|
||||
{
|
||||
struct bgp_proto *p = (void *) P;
|
||||
mrt_peer_table_entry(s, p->remote_id, p->remote_as, p->cf->remote_ip);
|
||||
mrt_peer_table_entry(s, p->remote_id, p->remote_as, p->remote_ip);
|
||||
}
|
||||
#endif
|
||||
|
||||
@ -429,7 +429,7 @@ mrt_rib_table_entry(struct mrt_table_dump_state *s, rte *r)
|
||||
{
|
||||
struct bgp_proto *p = (void *) r->attrs->src->proto;
|
||||
struct mrt_peer_entry *n =
|
||||
HASH_FIND(s->peer_hash, PEER, p->remote_id, p->remote_as, p->cf->remote_ip);
|
||||
HASH_FIND(s->peer_hash, PEER, p->remote_id, p->remote_as, p->remote_ip);
|
||||
|
||||
peer = n ? n->index : 0;
|
||||
}
|
||||
|
@ -23,7 +23,7 @@ struct mrt_config {
|
||||
|
||||
struct rtable_config *table_cf;
|
||||
const char *table_expr;
|
||||
struct filter *filter;
|
||||
const struct filter *filter;
|
||||
const char *filename;
|
||||
uint period;
|
||||
int always_add_path;
|
||||
@ -41,7 +41,7 @@ struct mrt_proto {
|
||||
struct mrt_dump_data {
|
||||
const char *table_expr;
|
||||
struct rtable *table_ptr;
|
||||
struct filter *filter;
|
||||
const struct filter *filter;
|
||||
char *filename;
|
||||
};
|
||||
|
||||
@ -61,7 +61,7 @@ struct mrt_table_dump_state {
|
||||
/* Configuration information */
|
||||
const char *table_expr; /* Wildcard for table name (or NULL) */
|
||||
struct rtable *table_ptr; /* Explicit table (or NULL) */
|
||||
struct filter *filter; /* Optional filter */
|
||||
const struct filter *filter; /* Optional filter */
|
||||
const char *filename; /* Filename pattern */
|
||||
int always_add_path; /* Always use *_ADDPATH message subtypes */
|
||||
|
||||
|
@ -200,6 +200,7 @@ CF_KEYWORDS(RX, BUFFER, LARGE, NORMAL, STUBNET, HIDDEN, SUMMARY, TAG, EXTERNAL)
|
||||
CF_KEYWORDS(WAIT, DELAY, LSADB, ECMP, LIMIT, WEIGHT, NSSA, TRANSLATOR, STABILITY)
|
||||
CF_KEYWORDS(GLOBAL, LSID, ROUTER, SELF, INSTANCE, REAL, NETMASK, TX, PRIORITY, LENGTH)
|
||||
CF_KEYWORDS(MERGE, LSA, SUPPRESSION, MULTICAST, RFC5838, VPN, PE)
|
||||
CF_KEYWORDS(GRACEFUL, RESTART, AWARE, TIME)
|
||||
|
||||
%type <ld> lsadb_args
|
||||
%type <i> ospf_variant ospf_af_mc nbma_eligible
|
||||
@ -226,6 +227,8 @@ ospf_proto_start: proto_start ospf_variant
|
||||
OSPF_CFG->tick = OSPF_DEFAULT_TICK;
|
||||
OSPF_CFG->ospf2 = $2;
|
||||
OSPF_CFG->af_ext = !$2;
|
||||
OSPF_CFG->gr_mode = OSPF_GR_AWARE;
|
||||
OSPF_CFG->gr_time = OSPF_DEFAULT_GR_TIME;
|
||||
};
|
||||
|
||||
ospf_proto:
|
||||
@ -258,6 +261,9 @@ ospf_proto_item:
|
||||
| RFC5838 bool { OSPF_CFG->af_ext = $2; if (!ospf_cfg_is_v3()) cf_error("RFC5838 option requires OSPFv3"); }
|
||||
| VPN PE bool { OSPF_CFG->vpn_pe = $3; }
|
||||
| STUB ROUTER bool { OSPF_CFG->stub_router = $3; }
|
||||
| GRACEFUL RESTART bool { OSPF_CFG->gr_mode = $3; }
|
||||
| GRACEFUL RESTART AWARE { OSPF_CFG->gr_mode = OSPF_GR_AWARE; }
|
||||
| GRACEFUL RESTART TIME expr { OSPF_CFG->gr_time = $4; if (($4 < 1) || ($4 > 1800)) cf_error("Graceful restart time must be in range 1-1800"); }
|
||||
| ECMP bool { OSPF_CFG->ecmp = $2 ? OSPF_DEFAULT_ECMP_LIMIT : 0; }
|
||||
| ECMP bool LIMIT expr { OSPF_CFG->ecmp = $2 ? $4 : 0; }
|
||||
| MERGE EXTERNAL bool { OSPF_CFG->merge_external = $3; }
|
||||
@ -504,34 +510,39 @@ dynamic_attr: OSPF_TAG { $$ = f_new_dynamic_attr(EAF_TYPE_INT, T_INT, EA_OSPF_TA
|
||||
dynamic_attr: OSPF_ROUTER_ID { $$ = f_new_dynamic_attr(EAF_TYPE_ROUTER_ID, T_QUAD, EA_OSPF_ROUTER_ID); } ;
|
||||
|
||||
CF_CLI_HELP(SHOW OSPF, ..., [[Show information about OSPF protocol]]);
|
||||
CF_CLI(SHOW OSPF, optsym, [<name>], [[Show information about OSPF protocol]])
|
||||
CF_CLI(SHOW OSPF, optproto, [<name>], [[Show information about OSPF protocol]])
|
||||
{ ospf_sh(proto_get_named($3, &proto_ospf)); };
|
||||
|
||||
CF_CLI(SHOW OSPF NEIGHBORS, optsym opttext, [<name>] [\"<interface>\"], [[Show information about OSPF neighbors]])
|
||||
CF_CLI(SHOW OSPF NEIGHBORS, optproto opttext, [<name>] [\"<interface>\"], [[Show information about OSPF neighbors]])
|
||||
{ ospf_sh_neigh(proto_get_named($4, &proto_ospf), $5); };
|
||||
|
||||
CF_CLI(SHOW OSPF INTERFACE, optsym opttext, [<name>] [\"<interface>\"], [[Show information about interface]])
|
||||
CF_CLI(SHOW OSPF INTERFACE, optproto opttext, [<name>] [\"<interface>\"], [[Show information about interface]])
|
||||
{ ospf_sh_iface(proto_get_named($4, &proto_ospf), $5); };
|
||||
|
||||
CF_CLI_HELP(SHOW OSPF TOPOLOGY, [all] [<name>], [[Show information about OSPF network topology]])
|
||||
|
||||
CF_CLI(SHOW OSPF TOPOLOGY, optsym opttext, [<name>], [[Show information about reachable OSPF network topology]])
|
||||
CF_CLI(SHOW OSPF TOPOLOGY, optproto opttext, [<name>], [[Show information about reachable OSPF network topology]])
|
||||
{ ospf_sh_state(proto_get_named($4, &proto_ospf), 0, 1); };
|
||||
|
||||
CF_CLI(SHOW OSPF TOPOLOGY ALL, optsym opttext, [<name>], [[Show information about all OSPF network topology]])
|
||||
CF_CLI(SHOW OSPF TOPOLOGY ALL, optproto opttext, [<name>], [[Show information about all OSPF network topology]])
|
||||
{ ospf_sh_state(proto_get_named($5, &proto_ospf), 0, 0); };
|
||||
|
||||
CF_CLI_HELP(SHOW OSPF STATE, [all] [<name>], [[Show information about OSPF network state]])
|
||||
|
||||
CF_CLI(SHOW OSPF STATE, optsym opttext, [<name>], [[Show information about reachable OSPF network state]])
|
||||
CF_CLI(SHOW OSPF STATE, optproto opttext, [<name>], [[Show information about reachable OSPF network state]])
|
||||
{ ospf_sh_state(proto_get_named($4, &proto_ospf), 1, 1); };
|
||||
|
||||
CF_CLI(SHOW OSPF STATE ALL, optsym opttext, [<name>], [[Show information about all OSPF network state]])
|
||||
CF_CLI(SHOW OSPF STATE ALL, optproto opttext, [<name>], [[Show information about all OSPF network state]])
|
||||
{ ospf_sh_state(proto_get_named($5, &proto_ospf), 1, 0); };
|
||||
|
||||
CF_CLI_HELP(SHOW OSPF LSADB, ..., [[Show content of OSPF LSA database]]);
|
||||
CF_CLI(SHOW OSPF LSADB, lsadb_args, [global | area <id> | link] [type <num>] [lsid <id>] [self | router <id>] [<proto>], [[Show content of OSPF LSA database]])
|
||||
{ ospf_sh_lsadb($4); };
|
||||
{
|
||||
if (!$4->proto)
|
||||
$4->proto = (struct ospf_proto *) proto_get_named(NULL, &proto_ospf);
|
||||
|
||||
ospf_sh_lsadb($4);
|
||||
};
|
||||
|
||||
lsadb_args:
|
||||
/* empty */ {
|
||||
@ -544,7 +555,7 @@ lsadb_args:
|
||||
| lsadb_args LSID idval { $$ = $1; $$->lsid = $3; }
|
||||
| lsadb_args SELF { $$ = $1; $$->router = SH_ROUTER_SELF; }
|
||||
| lsadb_args ROUTER idval { $$ = $1; $$->router = $3; }
|
||||
| lsadb_args SYM { $$ = $1; $$->name = $2; }
|
||||
| lsadb_args CF_SYM_KNOWN { cf_assert_symbol($2, SYM_PROTO); $$ = $1; $$->proto = (struct ospf_proto *) proto_get_named($2, &proto_ospf); }
|
||||
;
|
||||
|
||||
CF_CODE
|
||||
|
@ -127,7 +127,7 @@ ospf_prepare_dbdes(struct ospf_proto *p, struct ospf_neighbor *n)
|
||||
{
|
||||
struct ospf_dbdes2_packet *ps = (void *) pkt;
|
||||
ps->iface_mtu = htons(iface_mtu);
|
||||
ps->options = ifa->oa->options | OPT_O;
|
||||
ps->options = ifa->oa->options & DBDES2_OPT_MASK;
|
||||
ps->imms = 0; /* Will be set later */
|
||||
ps->ddseq = htonl(n->dds);
|
||||
length = sizeof(struct ospf_dbdes2_packet);
|
||||
@ -135,7 +135,8 @@ ospf_prepare_dbdes(struct ospf_proto *p, struct ospf_neighbor *n)
|
||||
else /* OSPFv3 */
|
||||
{
|
||||
struct ospf_dbdes3_packet *ps = (void *) pkt;
|
||||
ps->options = htonl(ifa->oa->options | (ifa->autype == OSPF_AUTH_CRYPT ? OPT_AT : 0));
|
||||
u32 options = ifa->oa->options | (ifa->autype == OSPF_AUTH_CRYPT ? OPT_AT : 0);
|
||||
ps->options = htonl(options & DBDES3_OPT_MASK);
|
||||
ps->iface_mtu = htons(iface_mtu);
|
||||
ps->padding = 0;
|
||||
ps->imms = 0; /* Will be set later */
|
||||
@ -215,7 +216,7 @@ ospf_send_dbdes(struct ospf_proto *p, struct ospf_neighbor *n)
|
||||
|
||||
ASSERT((n->state == NEIGHBOR_EXSTART) || (n->state == NEIGHBOR_EXCHANGE));
|
||||
|
||||
if (n->ifa->oa->rt == NULL)
|
||||
if (!n->ifa->oa->rt && !p->gr_recovery)
|
||||
return;
|
||||
|
||||
ospf_prepare_dbdes(p, n);
|
||||
@ -279,6 +280,10 @@ ospf_process_dbdes(struct ospf_proto *p, struct ospf_packet *pkt, struct ospf_ne
|
||||
if (LSA_SCOPE(lsa_type) == LSA_SCOPE_RES)
|
||||
DROP1("LSA with invalid scope");
|
||||
|
||||
/* RFC 3623 2.2 (2) special case - check for my router-LSA (GR recovery) */
|
||||
if ((lsa_type == LSA_T_RT) && (lsa.rt == p->router_id))
|
||||
n->got_my_rt_lsa = 1;
|
||||
|
||||
en = ospf_hash_find(p->gr, lsa_domain, lsa.id, lsa.rt, lsa_type);
|
||||
if (!en || (lsa_comp(&lsa, &(en->lsa)) == CMP_NEWER))
|
||||
{
|
||||
|
@ -81,7 +81,7 @@ ospf_send_hello(struct ospf_iface *ifa, int kind, struct ospf_neighbor *dirn)
|
||||
ps->netmask = htonl(u32_mkmask(ifa->addr->prefix.pxlen));
|
||||
|
||||
ps->helloint = ntohs(ifa->helloint);
|
||||
ps->options = ifa->oa->options;
|
||||
ps->options = ifa->oa->options & HELLO2_OPT_MASK;
|
||||
ps->priority = ifa->priority;
|
||||
ps->deadint = htonl(ifa->deadint);
|
||||
ps->dr = htonl(ipa_to_u32(ifa->drip));
|
||||
@ -96,7 +96,7 @@ ospf_send_hello(struct ospf_iface *ifa, int kind, struct ospf_neighbor *dirn)
|
||||
u32 options = ifa->oa->options | (ifa->autype == OSPF_AUTH_CRYPT ? OPT_AT : 0);
|
||||
|
||||
ps->iface_id = htonl(ifa->iface_id);
|
||||
ps->options = ntohl(options | (ifa->priority << 24));
|
||||
ps->options = ntohl((options & HELLO3_OPT_MASK) | (ifa->priority << 24));
|
||||
ps->helloint = ntohs(ifa->helloint);
|
||||
ps->deadint = htons(ifa->deadint);
|
||||
ps->dr = htonl(ifa->drid);
|
||||
|
@ -772,6 +772,14 @@ ospf_iface_reconfigure(struct ospf_iface *ifa, struct ospf_iface_patt *new)
|
||||
ifa->cf = new;
|
||||
ifa->marked = 0;
|
||||
|
||||
/* Cancel GR peers if GR is disabled */
|
||||
if (!p->gr_mode && p->gr_count)
|
||||
{
|
||||
struct ospf_neighbor *n, *nx;
|
||||
WALK_LIST_DELSAFE(n, nx, ifa->neigh_list)
|
||||
if (n->gr_active)
|
||||
ospf_neigh_cancel_graceful_restart(n);
|
||||
}
|
||||
|
||||
/* HELLO TIMER */
|
||||
if (ifa->helloint != new->helloint)
|
||||
@ -872,6 +880,7 @@ ospf_iface_reconfigure(struct ospf_iface *ifa, struct ospf_iface_patt *new)
|
||||
ifname, ifa->priority, new->priority);
|
||||
|
||||
ifa->priority = new->priority;
|
||||
ospf_iface_sm(ifa, ISM_NEICH);
|
||||
ospf_notify_link_lsa(ifa);
|
||||
}
|
||||
|
||||
|
@ -12,6 +12,9 @@
|
||||
|
||||
#include "lib/fletcher16.h"
|
||||
|
||||
#define HDRLEN sizeof(struct ospf_lsa_header)
|
||||
|
||||
|
||||
#ifndef CPU_BIG_ENDIAN
|
||||
void
|
||||
lsa_hton_hdr(struct ospf_lsa_header *h, struct ospf_lsa_header *n)
|
||||
@ -61,7 +64,6 @@ lsa_ntoh_body(void *n, void *h, u16 len)
|
||||
#endif /* little endian */
|
||||
|
||||
|
||||
|
||||
int
|
||||
lsa_flooding_allowed(u32 type, u32 domain, struct ospf_iface *ifa)
|
||||
{
|
||||
@ -96,8 +98,7 @@ lsa_is_acceptable(u32 type, struct ospf_neighbor *n, struct ospf_proto *p)
|
||||
{
|
||||
if (ospf_is_v2(p))
|
||||
{
|
||||
if (type == LSA_T_NSSA)
|
||||
return !!(n->options & OPT_N);
|
||||
/* Do not check NSSA-LSA here, as OPT_N is only in HELLO packets */
|
||||
|
||||
if (lsa_is_opaque(type))
|
||||
return !!(n->options & OPT_O);
|
||||
@ -147,11 +148,13 @@ static const u16 lsa_v2_types[] = {
|
||||
|
||||
/* Maps OSPFv2 opaque types to OSPFv3 function codes */
|
||||
static const u16 opaque_lsa_types[] = {
|
||||
[LSA_OT_GR] = LSA_T_GR,
|
||||
[LSA_OT_RI] = LSA_T_RI_,
|
||||
};
|
||||
|
||||
/* Maps (subset of) OSPFv3 function codes to OSPFv2 opaque types */
|
||||
static const u8 opaque_lsa_types_inv[] = {
|
||||
[LSA_T_GR] = LSA_OT_GR,
|
||||
[LSA_T_RI_] = LSA_OT_RI,
|
||||
};
|
||||
|
||||
@ -168,7 +171,13 @@ lsa_get_type_domain_(u32 type, u32 id, struct ospf_iface *ifa, u32 *otype, u32 *
|
||||
uint code;
|
||||
if (LSA_FUNCTION(type) == LSA_T_OPAQUE_)
|
||||
if (code = LOOKUP(opaque_lsa_types, id >> 24))
|
||||
{
|
||||
type = code | LSA_UBIT | LSA_SCOPE(type);
|
||||
|
||||
/* Hack for Grace-LSA: It does not use U-bit for link-scoped LSAs */
|
||||
if (type == (LSA_T_GR | LSA_UBIT))
|
||||
type = LSA_T_GR;
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
@ -196,6 +205,13 @@ lsa_get_type_domain_(u32 type, u32 id, struct ospf_iface *ifa, u32 *otype, u32 *
|
||||
}
|
||||
}
|
||||
|
||||
int
|
||||
lsa_is_opaque(u32 type)
|
||||
{
|
||||
u32 fn = LSA_FUNCTION(type);
|
||||
return LOOKUP(opaque_lsa_types_inv, fn) || (fn == LSA_T_OPAQUE_);
|
||||
}
|
||||
|
||||
u32
|
||||
lsa_get_opaque_type(u32 type)
|
||||
{
|
||||
@ -267,6 +283,51 @@ lsa_comp(struct ospf_lsa_header *l1, struct ospf_lsa_header *l2)
|
||||
}
|
||||
|
||||
|
||||
#define LSA_TLV_LENGTH(tlv) \
|
||||
(sizeof(struct ospf_tlv) + BIRD_ALIGN((tlv)->length, 4))
|
||||
|
||||
#define LSA_NEXT_TLV(tlv) \
|
||||
((struct ospf_tlv *) ((byte *) (tlv) + LSA_TLV_LENGTH(tlv)))
|
||||
|
||||
#define LSA_WALK_TLVS(tlv,buf,len) \
|
||||
for(struct ospf_tlv *tlv = (void *) (buf); \
|
||||
(byte *) tlv < (byte *) (buf) + (len); \
|
||||
tlv = LSA_NEXT_TLV(tlv))
|
||||
|
||||
struct ospf_tlv *
|
||||
lsa_get_tlv(struct top_hash_entry *en, uint type)
|
||||
{
|
||||
LSA_WALK_TLVS(tlv, en->lsa_body, en->lsa.length - HDRLEN)
|
||||
if (tlv->type == type)
|
||||
return tlv;
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
int
|
||||
lsa_validate_tlvs(byte *buf, uint len)
|
||||
{
|
||||
byte *pos = buf;
|
||||
byte *end = buf + len;
|
||||
|
||||
while (pos < end)
|
||||
{
|
||||
if ((pos + sizeof(struct ospf_tlv)) > end)
|
||||
return 0;
|
||||
|
||||
struct ospf_tlv *tlv = (void *) pos;
|
||||
uint len = LSA_TLV_LENGTH(tlv);
|
||||
|
||||
if ((pos + len) > end)
|
||||
return 0;
|
||||
|
||||
pos += len;
|
||||
}
|
||||
|
||||
return 1;
|
||||
}
|
||||
|
||||
|
||||
static inline int
|
||||
lsa_walk_rt2(struct ospf_lsa_rt_walk *rt)
|
||||
{
|
||||
@ -408,7 +469,6 @@ lsa_parse_ext(struct top_hash_entry *en, int ospf2, int af, struct ospf_lsa_ext_
|
||||
}
|
||||
}
|
||||
|
||||
#define HDRLEN sizeof(struct ospf_lsa_header)
|
||||
|
||||
static int
|
||||
lsa_validate_rt2(struct ospf_lsa_header *lsa, struct ospf_lsa_rt *body)
|
||||
@ -603,6 +663,12 @@ lsa_validate_prefix(struct ospf_lsa_header *lsa, struct ospf_lsa_prefix *body)
|
||||
return lsa_validate_pxlist(lsa, body->pxcount, sizeof(struct ospf_lsa_prefix), (u8 *) body);
|
||||
}
|
||||
|
||||
static int
|
||||
lsa_validate_gr(struct ospf_lsa_header *lsa, void *body)
|
||||
{
|
||||
return lsa_validate_tlvs(body, lsa->length - HDRLEN);
|
||||
}
|
||||
|
||||
static int
|
||||
lsa_validate_ri(struct ospf_lsa_header *lsa UNUSED, struct ospf_lsa_net *body UNUSED)
|
||||
{
|
||||
@ -643,6 +709,8 @@ lsa_validate(struct ospf_lsa_header *lsa, u32 lsa_type, int ospf2, void *body)
|
||||
case LSA_T_EXT:
|
||||
case LSA_T_NSSA:
|
||||
return lsa_validate_ext2(lsa, body);
|
||||
case LSA_T_GR:
|
||||
return lsa_validate_gr(lsa, body);
|
||||
case LSA_T_RI_LINK:
|
||||
case LSA_T_RI_AREA:
|
||||
case LSA_T_RI_AS:
|
||||
@ -674,6 +742,8 @@ lsa_validate(struct ospf_lsa_header *lsa, u32 lsa_type, int ospf2, void *body)
|
||||
return lsa_validate_link(lsa, body);
|
||||
case LSA_T_PREFIX:
|
||||
return lsa_validate_prefix(lsa, body);
|
||||
case LSA_T_GR:
|
||||
return lsa_validate_gr(lsa, body);
|
||||
case LSA_T_RI_LINK:
|
||||
case LSA_T_RI_AREA:
|
||||
case LSA_T_RI_AS:
|
||||
|
@ -44,10 +44,7 @@ static inline void lsa_get_type_domain(struct ospf_lsa_header *lsa, struct ospf_
|
||||
static inline u32 lsa_get_etype(struct ospf_lsa_header *h, struct ospf_proto *p)
|
||||
{ return ospf_is_v2(p) ? (h->type_raw & LSA_T_V2_MASK) : h->type_raw; }
|
||||
|
||||
/* Assuming OSPFv2 - All U-bit LSAs are mapped to Opaque LSAs */
|
||||
static inline int lsa_is_opaque(u32 type)
|
||||
{ return !!(type & LSA_UBIT); }
|
||||
|
||||
int lsa_is_opaque(u32 type);
|
||||
u32 lsa_get_opaque_type(u32 type);
|
||||
int lsa_flooding_allowed(u32 type, u32 domain, struct ospf_iface *ifa);
|
||||
int lsa_is_acceptable(u32 type, struct ospf_neighbor *n, struct ospf_proto *p);
|
||||
@ -58,6 +55,16 @@ u16 lsa_verify_checksum(const void *lsa_n, int lsa_len);
|
||||
#define CMP_SAME 0
|
||||
#define CMP_OLDER -1
|
||||
int lsa_comp(struct ospf_lsa_header *l1, struct ospf_lsa_header *l2);
|
||||
|
||||
struct ospf_tlv * lsa_get_tlv(struct top_hash_entry *en, uint type);
|
||||
|
||||
static inline u32
|
||||
lsa_get_tlv_u32(struct top_hash_entry *en, uint type)
|
||||
{
|
||||
struct ospf_tlv *tlv = lsa_get_tlv(en, type);
|
||||
return (tlv && (tlv->length == 4)) ? tlv->data[0] : 0;
|
||||
}
|
||||
|
||||
void lsa_walk_rt_init(struct ospf_proto *po, struct top_hash_entry *act, struct ospf_lsa_rt_walk *rt);
|
||||
int lsa_walk_rt(struct ospf_lsa_rt_walk *rt);
|
||||
void lsa_parse_sum_net(struct top_hash_entry *en, int ospf2, int af, net_addr *net, u8 *pxopts, u32 *metric);
|
||||
|
@ -185,6 +185,13 @@ static int ospf_flood_lsupd(struct ospf_proto *p, struct top_hash_entry **lsa_li
|
||||
static void
|
||||
ospf_enqueue_lsa(struct ospf_proto *p, struct top_hash_entry *en, struct ospf_iface *ifa)
|
||||
{
|
||||
/* Exception for local Grace-LSA, they are flooded synchronously */
|
||||
if ((en->lsa_type == LSA_T_GR) && (en->lsa.rt == p->router_id))
|
||||
{
|
||||
ospf_flood_lsupd(p, &en, 1, 1, ifa);
|
||||
return;
|
||||
}
|
||||
|
||||
if (ifa->flood_queue_used == ifa->flood_queue_size)
|
||||
{
|
||||
/* If we already have full queue, we send some packets */
|
||||
@ -591,8 +598,9 @@ ospf_receive_lsupd(struct ospf_packet *pkt, struct ospf_iface *ifa,
|
||||
}
|
||||
|
||||
/* 13. (5f) - handle self-originated LSAs, see also 13.4. */
|
||||
if ((lsa.rt == p->router_id) ||
|
||||
(ospf_is_v2(p) && (lsa_type == LSA_T_NET) && ospf_addr_is_local(p, ifa->oa, ipa_from_u32(lsa.id))))
|
||||
if (!p->gr_recovery &&
|
||||
((lsa.rt == p->router_id) ||
|
||||
(ospf_is_v2(p) && (lsa_type == LSA_T_NET) && ospf_addr_is_local(p, ifa->oa, ipa_from_u32(lsa.id)))))
|
||||
{
|
||||
OSPF_TRACE(D_EVENTS, "Received unexpected self-originated LSA");
|
||||
ospf_advance_lsa(p, en, &lsa, lsa_type, lsa_domain, body);
|
||||
@ -629,6 +637,14 @@ ospf_receive_lsupd(struct ospf_packet *pkt, struct ospf_iface *ifa,
|
||||
if (lsa_type == LSA_T_LINK)
|
||||
ospf_notify_net_lsa(ifa);
|
||||
|
||||
/* RFC 3623 3.1 - entering graceful restart helper mode */
|
||||
if (lsa_type == LSA_T_GR)
|
||||
ospf_neigh_notify_grace_lsa(n, en);
|
||||
|
||||
/* Link received pre-restart router LSA */
|
||||
if (p->gr_recovery && (lsa_type == LSA_T_RT) && (lsa.rt == p->router_id))
|
||||
ifa->oa->rt = en;
|
||||
|
||||
/* 13. (5b) - flood new LSA */
|
||||
int flood_back = ospf_flood_lsa(p, en, n);
|
||||
|
||||
|
@ -28,6 +28,8 @@ static void dbdes_timer_hook(timer *t);
|
||||
static void lsrq_timer_hook(timer *t);
|
||||
static void lsrt_timer_hook(timer *t);
|
||||
static void ackd_timer_hook(timer *t);
|
||||
static void ospf_neigh_stop_graceful_restart_(struct ospf_neighbor *n);
|
||||
static void graceful_restart_timeout(timer *t);
|
||||
|
||||
|
||||
static void
|
||||
@ -163,7 +165,7 @@ ospf_neigh_chstate(struct ospf_neighbor *n, u8 state)
|
||||
if (old_state == NEIGHBOR_FULL)
|
||||
ifa->fadj--;
|
||||
|
||||
if (ifa->fadj != old_fadj)
|
||||
if ((ifa->fadj != old_fadj) && !n->gr_active)
|
||||
{
|
||||
/* RFC 2328 12.4 Event 4 - neighbor enters/leaves Full state */
|
||||
ospf_notify_rt_lsa(ifa->oa);
|
||||
@ -182,6 +184,7 @@ ospf_neigh_chstate(struct ospf_neighbor *n, u8 state)
|
||||
|
||||
n->dds++;
|
||||
n->myimms = DBDES_IMMS;
|
||||
n->got_my_rt_lsa = 0;
|
||||
|
||||
tm_start(n->dbdes_timer, 0);
|
||||
tm_start(n->ackd_timer, ifa->rxmtint S / 2);
|
||||
@ -191,9 +194,9 @@ ospf_neigh_chstate(struct ospf_neighbor *n, u8 state)
|
||||
n->myimms &= ~DBDES_I;
|
||||
|
||||
/* Generate NeighborChange event if needed, see RFC 2328 9.2 */
|
||||
if ((state == NEIGHBOR_2WAY) && (old_state < NEIGHBOR_2WAY))
|
||||
if ((state == NEIGHBOR_2WAY) && (old_state < NEIGHBOR_2WAY) && !n->gr_active)
|
||||
ospf_iface_sm(ifa, ISM_NEICH);
|
||||
if ((state < NEIGHBOR_2WAY) && (old_state >= NEIGHBOR_2WAY))
|
||||
if ((state < NEIGHBOR_2WAY) && (old_state >= NEIGHBOR_2WAY) && !n->gr_active)
|
||||
ospf_iface_sm(ifa, ISM_NEICH);
|
||||
}
|
||||
|
||||
@ -291,6 +294,17 @@ ospf_neigh_sm(struct ospf_neighbor *n, int event)
|
||||
case INM_KILLNBR:
|
||||
case INM_LLDOWN:
|
||||
case INM_INACTTIM:
|
||||
if (n->gr_active && (event == INM_INACTTIM))
|
||||
{
|
||||
/* Just down the neighbor, but do not remove it */
|
||||
reset_lists(p, n);
|
||||
ospf_neigh_chstate(n, NEIGHBOR_DOWN);
|
||||
break;
|
||||
}
|
||||
|
||||
if (n->gr_active)
|
||||
ospf_neigh_stop_graceful_restart_(n);
|
||||
|
||||
/* No need for reset_lists() */
|
||||
ospf_neigh_chstate(n, NEIGHBOR_DOWN);
|
||||
ospf_neigh_down(n);
|
||||
@ -356,6 +370,180 @@ can_do_adj(struct ospf_neighbor *n)
|
||||
return i;
|
||||
}
|
||||
|
||||
static void
|
||||
ospf_neigh_start_graceful_restart(struct ospf_neighbor *n, uint gr_time)
|
||||
{
|
||||
struct ospf_proto *p = n->ifa->oa->po;
|
||||
|
||||
OSPF_TRACE(D_EVENTS, "Neighbor %R on %s started graceful restart",
|
||||
n->rid, n->ifa->ifname);
|
||||
|
||||
n->gr_active = 1;
|
||||
p->gr_count++;
|
||||
|
||||
n->gr_timer = tm_new_init(n->pool, graceful_restart_timeout, n, 0, 0);
|
||||
tm_start(n->gr_timer, gr_time S);
|
||||
}
|
||||
|
||||
static void
|
||||
ospf_neigh_stop_graceful_restart_(struct ospf_neighbor *n)
|
||||
{
|
||||
struct ospf_proto *p = n->ifa->oa->po;
|
||||
struct ospf_iface *ifa = n->ifa;
|
||||
|
||||
n->gr_active = 0;
|
||||
p->gr_count--;
|
||||
|
||||
rfree(n->gr_timer);
|
||||
n->gr_timer = NULL;
|
||||
|
||||
ospf_notify_rt_lsa(ifa->oa);
|
||||
ospf_notify_net_lsa(ifa);
|
||||
|
||||
if (ifa->type == OSPF_IT_VLINK)
|
||||
ospf_notify_rt_lsa(ifa->voa);
|
||||
|
||||
ospf_iface_sm(ifa, ISM_NEICH);
|
||||
}
|
||||
|
||||
static void
|
||||
ospf_neigh_stop_graceful_restart(struct ospf_neighbor *n)
|
||||
{
|
||||
struct ospf_proto *p = n->ifa->oa->po;
|
||||
|
||||
OSPF_TRACE(D_EVENTS, "Neighbor %R on %s finished graceful restart",
|
||||
n->rid, n->ifa->ifname);
|
||||
|
||||
ospf_neigh_stop_graceful_restart_(n);
|
||||
}
|
||||
|
||||
void
|
||||
ospf_neigh_cancel_graceful_restart(struct ospf_neighbor *n)
|
||||
{
|
||||
struct ospf_proto *p = n->ifa->oa->po;
|
||||
|
||||
OSPF_TRACE(D_EVENTS, "Graceful restart canceled for nbr %R on %s",
|
||||
n->rid, n->ifa->ifname);
|
||||
|
||||
ospf_neigh_stop_graceful_restart_(n);
|
||||
|
||||
if (n->state == NEIGHBOR_DOWN)
|
||||
ospf_neigh_down(n);
|
||||
}
|
||||
|
||||
static void
|
||||
graceful_restart_timeout(timer *t)
|
||||
{
|
||||
struct ospf_neighbor *n = t->data;
|
||||
struct ospf_proto *p = n->ifa->oa->po;
|
||||
|
||||
OSPF_TRACE(D_EVENTS, "Graceful restart timer expired for nbr %R on %s",
|
||||
n->rid, n->ifa->ifname);
|
||||
|
||||
ospf_neigh_stop_graceful_restart_(n);
|
||||
|
||||
if (n->state == NEIGHBOR_DOWN)
|
||||
ospf_neigh_down(n);
|
||||
}
|
||||
|
||||
static inline int
|
||||
changes_in_lsrtl(struct ospf_neighbor *n)
|
||||
{
|
||||
/* This could be improved, see RFC 3623 3.1 (2) */
|
||||
|
||||
struct top_hash_entry *en;
|
||||
WALK_SLIST(en, n->lsrtl)
|
||||
if (LSA_FUNCTION(en->lsa_type) <= LSA_FUNCTION(LSA_T_NSSA))
|
||||
return 1;
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
void
|
||||
ospf_neigh_notify_grace_lsa(struct ospf_neighbor *n, struct top_hash_entry *en)
|
||||
{
|
||||
struct ospf_iface *ifa = n->ifa;
|
||||
struct ospf_proto *p = ifa->oa->po;
|
||||
|
||||
/* In OSPFv2, neighbors are identified by either IP or Router ID, based on network type */
|
||||
uint t = ifa->type;
|
||||
if (ospf_is_v2(p) && ((t == OSPF_IT_BCAST) || (t == OSPF_IT_NBMA) || (t == OSPF_IT_PTMP)))
|
||||
{
|
||||
struct ospf_tlv *tlv = lsa_get_tlv(en, LSA_GR_ADDRESS);
|
||||
if (!tlv || tlv->length != 4)
|
||||
return;
|
||||
|
||||
ip_addr addr = ipa_from_u32(tlv->data[0]);
|
||||
if (!ipa_equal(n->ip, addr))
|
||||
n = find_neigh_by_ip(ifa, addr);
|
||||
}
|
||||
else
|
||||
{
|
||||
if (n->rid != en->lsa.rt)
|
||||
n = find_neigh(ifa, en->lsa.rt);
|
||||
}
|
||||
|
||||
if (!n)
|
||||
return;
|
||||
|
||||
if (en->lsa.age < LSA_MAXAGE)
|
||||
{
|
||||
u32 period = lsa_get_tlv_u32(en, LSA_GR_PERIOD);
|
||||
|
||||
/* Exception for updating grace period */
|
||||
if (n->gr_active)
|
||||
{
|
||||
tm_start(n->gr_timer, (period S) - (en->lsa.age S));
|
||||
return;
|
||||
}
|
||||
|
||||
/* RFC 3623 3.1 (1) - full adjacency */
|
||||
if (n->state != NEIGHBOR_FULL)
|
||||
return;
|
||||
|
||||
/* RFC 3623 3.1 (2) - no changes in LSADB */
|
||||
if (changes_in_lsrtl(n))
|
||||
return;
|
||||
|
||||
/* RFC 3623 3.1 (3) - grace period not expired */
|
||||
if (en->lsa.age >= period)
|
||||
return;
|
||||
|
||||
/* RFC 3623 3.1 (4) - helper mode allowed */
|
||||
if (!p->gr_mode)
|
||||
return;
|
||||
|
||||
/* RFC 3623 3.1 (5) - no local graceful restart */
|
||||
if (p->p.gr_recovery)
|
||||
return;
|
||||
|
||||
ospf_neigh_start_graceful_restart(n, period - en->lsa.age);
|
||||
}
|
||||
else /* Grace-LSA is flushed */
|
||||
{
|
||||
if (n->gr_active)
|
||||
ospf_neigh_stop_graceful_restart(n);
|
||||
}
|
||||
}
|
||||
|
||||
void
|
||||
ospf_neigh_lsadb_changed_(struct ospf_proto *p, struct top_hash_entry *en)
|
||||
{
|
||||
struct ospf_iface *ifa;
|
||||
struct ospf_neighbor *n, *nx;
|
||||
|
||||
if (LSA_FUNCTION(en->lsa_type) > LSA_FUNCTION(LSA_T_NSSA))
|
||||
return;
|
||||
|
||||
/* RFC 3623 3.2 (3) - cancel graceful restart when LSdb changed */
|
||||
WALK_LIST(ifa, p->iface_list)
|
||||
if (lsa_flooding_allowed(en->lsa_type, en->domain, ifa))
|
||||
WALK_LIST_DELSAFE(n, nx, ifa->neigh_list)
|
||||
if (n->gr_active)
|
||||
ospf_neigh_cancel_graceful_restart(n);
|
||||
}
|
||||
|
||||
|
||||
|
||||
static inline u32 neigh_get_id(struct ospf_proto *p, struct ospf_neighbor *n)
|
||||
{ return ospf_is_v2(p) ? ipa_to_u32(n->ip) : n->rid; }
|
||||
@ -583,8 +771,11 @@ ospf_neigh_bfd_hook(struct bfd_request *req)
|
||||
void
|
||||
ospf_neigh_update_bfd(struct ospf_neighbor *n, int use_bfd)
|
||||
{
|
||||
struct ospf_proto *p = n->ifa->oa->po;
|
||||
|
||||
if (use_bfd && !n->bfd_req)
|
||||
n->bfd_req = bfd_request_session(n->pool, n->ip, n->ifa->addr->ip, n->ifa->iface,
|
||||
n->bfd_req = bfd_request_session(n->pool, n->ip, n->ifa->addr->ip,
|
||||
n->ifa->iface, p->p.vrf,
|
||||
ospf_neigh_bfd_hook, n);
|
||||
|
||||
if (!use_bfd && n->bfd_req)
|
||||
@ -666,7 +857,7 @@ ospf_sh_neigh_info(struct ospf_neighbor *n)
|
||||
pos = "Other";
|
||||
}
|
||||
|
||||
cli_msg(-1013, "%-1R\t%3u\t%s/%s\t%7t\t%-10s %-1I",
|
||||
cli_msg(-1013, "%-12R\t%3u\t%s/%s\t%6t\t%-10s %I",
|
||||
n->rid, n->priority, ospf_ns_names[n->state], pos,
|
||||
tm_remains(n->inactim), ifa->ifname, n->ip);
|
||||
}
|
||||
|
@ -92,7 +92,9 @@
|
||||
* - RFC 2328 - main OSPFv2 standard
|
||||
* - RFC 5340 - main OSPFv3 standard
|
||||
* - RFC 3101 - OSPFv2 NSSA areas
|
||||
* - RFC 3623 - OSPFv2 Graceful Restart
|
||||
* - RFC 4576 - OSPFv2 VPN loop prevention
|
||||
* - RFC 5187 - OSPFv3 Graceful Restart
|
||||
* - RFC 5250 - OSPFv2 Opaque LSAs
|
||||
* - RFC 5709 - OSPFv2 HMAC-SHA Cryptographic Authentication
|
||||
* - RFC 5838 - OSPFv3 Support of Address Families
|
||||
@ -144,7 +146,7 @@ static inline uint
|
||||
ospf_opts(struct ospf_proto *p)
|
||||
{
|
||||
if (ospf_is_v2(p))
|
||||
return 0;
|
||||
return OPT_O;
|
||||
|
||||
return ((ospf_is_ip6(p) && !p->af_mc) ? OPT_V6 : 0) |
|
||||
(!p->stub_router ? OPT_R : 0) | (p->af_ext ? OPT_AF : 0);
|
||||
@ -207,7 +209,6 @@ ospf_area_remove(struct ospf_area *oa)
|
||||
mb_free(oa);
|
||||
}
|
||||
|
||||
|
||||
struct ospf_area *
|
||||
ospf_find_area(struct ospf_proto *p, u32 aid)
|
||||
{
|
||||
@ -228,6 +229,52 @@ ospf_find_vlink(struct ospf_proto *p, u32 voa, u32 vid)
|
||||
return NULL;
|
||||
}
|
||||
|
||||
static void
|
||||
ospf_start_gr_recovery(struct ospf_proto *p)
|
||||
{
|
||||
OSPF_TRACE(D_EVENTS, "Graceful restart started");
|
||||
|
||||
p->gr_recovery = 1;
|
||||
p->gr_timeout = current_time() + (p->gr_time S);
|
||||
channel_graceful_restart_lock(p->p.main_channel);
|
||||
p->p.main_channel->gr_wait = 1;
|
||||
|
||||
/* NOTE: We should get end of grace period from non-volatile storage */
|
||||
}
|
||||
|
||||
void
|
||||
ospf_stop_gr_recovery(struct ospf_proto *p)
|
||||
{
|
||||
p->gr_recovery = 0;
|
||||
p->gr_cleanup = 1;
|
||||
p->gr_timeout = 0;
|
||||
|
||||
/* Reorigination of router/network LSAs is already scheduled */
|
||||
|
||||
/* Rest is done in ospf_cleanup_gr_recovery() */
|
||||
}
|
||||
|
||||
static void
|
||||
ospf_cleanup_gr_recovery(struct ospf_proto *p)
|
||||
{
|
||||
struct top_hash_entry *en;
|
||||
|
||||
/* Flush dirty LSAa except external ones, these will be handled by feed */
|
||||
WALK_SLIST(en, p->lsal)
|
||||
if (en->gr_dirty)
|
||||
{
|
||||
if ((en->lsa_type == LSA_T_EXT) || (en->lsa_type == LSA_T_NSSA))
|
||||
en->mode = LSA_M_EXPORT;
|
||||
else
|
||||
ospf_flush_lsa(p, en);
|
||||
}
|
||||
|
||||
/* End graceful restart on channel, will also schedule feed */
|
||||
channel_graceful_restart_unlock(p->p.main_channel);
|
||||
|
||||
p->gr_cleanup = 0;
|
||||
}
|
||||
|
||||
static int
|
||||
ospf_start(struct proto *P)
|
||||
{
|
||||
@ -246,6 +293,8 @@ ospf_start(struct proto *P)
|
||||
p->asbr = c->asbr;
|
||||
p->vpn_pe = c->vpn_pe;
|
||||
p->ecmp = c->ecmp;
|
||||
p->gr_mode = c->gr_mode;
|
||||
p->gr_time = c->gr_time;
|
||||
p->tick = c->tick;
|
||||
p->disp_timer = tm_new_init(P->pool, ospf_disp, p, p->tick S, 0);
|
||||
tm_start(p->disp_timer, 100 MS);
|
||||
@ -267,6 +316,10 @@ ospf_start(struct proto *P)
|
||||
p->log_pkt_tbf = (struct tbf){ .rate = 1, .burst = 5 };
|
||||
p->log_lsa_tbf = (struct tbf){ .rate = 4, .burst = 20 };
|
||||
|
||||
/* Lock the channel when in GR recovery mode */
|
||||
if (p->p.gr_recovery && (p->gr_mode == OSPF_GR_ABLE))
|
||||
ospf_start_gr_recovery(p);
|
||||
|
||||
WALK_LIST(ac, c->area_list)
|
||||
ospf_area_add(p, ac);
|
||||
|
||||
@ -323,6 +376,8 @@ ospf_init(struct proto_config *CF)
|
||||
P->ifa_notify = cf->ospf2 ? ospf_ifa_notify2 : ospf_ifa_notify3;
|
||||
P->preexport = ospf_preexport;
|
||||
P->reload_routes = ospf_reload_routes;
|
||||
P->feed_begin = ospf_feed_begin;
|
||||
P->feed_end = ospf_feed_end;
|
||||
P->make_tmp_attrs = ospf_make_tmp_attrs;
|
||||
P->store_tmp_attrs = ospf_store_tmp_attrs;
|
||||
P->rte_better = ospf_rte_better;
|
||||
@ -398,6 +453,10 @@ ospf_disp(timer * timer)
|
||||
{
|
||||
struct ospf_proto *p = timer->data;
|
||||
|
||||
/* Check for end of graceful restart */
|
||||
if (p->gr_recovery)
|
||||
ospf_update_gr_recovery(p);
|
||||
|
||||
/* Originate or flush local topology LSAs */
|
||||
ospf_update_topology(p);
|
||||
|
||||
@ -407,6 +466,10 @@ ospf_disp(timer * timer)
|
||||
/* Calculate routing table */
|
||||
if (p->calcrt)
|
||||
ospf_rt_spf(p);
|
||||
|
||||
/* Cleanup after graceful restart */
|
||||
if (p->gr_cleanup)
|
||||
ospf_cleanup_gr_recovery(p);
|
||||
}
|
||||
|
||||
|
||||
@ -475,9 +538,18 @@ ospf_shutdown(struct proto *P)
|
||||
|
||||
OSPF_TRACE(D_EVENTS, "Shutdown requested");
|
||||
|
||||
/* And send to all my neighbors 1WAY */
|
||||
WALK_LIST(ifa, p->iface_list)
|
||||
ospf_iface_shutdown(ifa);
|
||||
if ((P->down_code == PDC_CMD_GR_DOWN) && (p->gr_mode == OSPF_GR_ABLE))
|
||||
{
|
||||
/* Originate Grace LSAs */
|
||||
WALK_LIST(ifa, p->iface_list)
|
||||
ospf_originate_gr_lsa(p, ifa);
|
||||
}
|
||||
else
|
||||
{
|
||||
/* Send to all my neighbors 1WAY */
|
||||
WALK_LIST(ifa, p->iface_list)
|
||||
ospf_iface_shutdown(ifa);
|
||||
}
|
||||
|
||||
/* Cleanup locked rta entries */
|
||||
FIB_WALK(&p->rtf, ort, nf)
|
||||
@ -664,6 +736,8 @@ ospf_reconfigure(struct proto *P, struct proto_config *CF)
|
||||
p->merge_external = new->merge_external;
|
||||
p->asbr = new->asbr;
|
||||
p->ecmp = new->ecmp;
|
||||
p->gr_mode = new->gr_mode;
|
||||
p->gr_time = new->gr_time;
|
||||
p->tick = new->tick;
|
||||
p->disp_timer->recurrent = p->tick S;
|
||||
tm_start(p->disp_timer, 10 MS);
|
||||
@ -731,7 +805,7 @@ ospf_sh_neigh(struct proto *P, char *iff)
|
||||
}
|
||||
|
||||
cli_msg(-1013, "%s:", p->p.name);
|
||||
cli_msg(-1013, "%-12s\t%3s\t%-15s\t%-5s\t%-10s %-12s", "Router ID", "Pri",
|
||||
cli_msg(-1013, "%-12s\t%3s\t%-15s\t%-5s\t%-10s %s", "Router ID", "Pri",
|
||||
" State", "DTime", "Interface", "Router IP");
|
||||
WALK_LIST(ifa, p->iface_list)
|
||||
if ((iff == NULL) || patmatch(iff, ifa->ifname))
|
||||
@ -1377,7 +1451,7 @@ lsa_compare_for_lsadb(const void *p1, const void *p2)
|
||||
void
|
||||
ospf_sh_lsadb(struct lsadb_show_data *ld)
|
||||
{
|
||||
struct ospf_proto *p = (struct ospf_proto *) proto_get_named(ld->name, &proto_ospf);
|
||||
struct ospf_proto *p = ld->proto;
|
||||
uint num = p->gr->hash_entries;
|
||||
uint i, j;
|
||||
int last_dscope = -1;
|
||||
|
@ -75,6 +75,7 @@
|
||||
#define OSPF_DEFAULT_TICK 1
|
||||
#define OSPF_DEFAULT_STUB_COST 1000
|
||||
#define OSPF_DEFAULT_ECMP_LIMIT 16
|
||||
#define OSPF_DEFAULT_GR_TIME 120
|
||||
#define OSPF_DEFAULT_TRANSINT 40
|
||||
|
||||
#define OSPF_MIN_PKT_SIZE 256
|
||||
@ -82,6 +83,9 @@
|
||||
|
||||
#define OSPF_VLINK_ID_OFFSET 0x80000000
|
||||
|
||||
#define OSPF_GR_ABLE 1
|
||||
#define OSPF_GR_AWARE 2
|
||||
|
||||
struct ospf_config
|
||||
{
|
||||
struct proto_config c;
|
||||
@ -97,7 +101,9 @@ struct ospf_config
|
||||
u8 abr;
|
||||
u8 asbr;
|
||||
u8 vpn_pe;
|
||||
int ecmp;
|
||||
u8 gr_mode; /* Graceful restart mode (OSPF_GR_*) */
|
||||
uint gr_time; /* Graceful restart interval */
|
||||
uint ecmp;
|
||||
list area_list; /* list of area configs (struct ospf_area_config) */
|
||||
list vlink_list; /* list of configured vlinks (struct ospf_iface_patt) */
|
||||
};
|
||||
@ -216,6 +222,10 @@ struct ospf_proto
|
||||
list area_list; /* List of OSPF areas (struct ospf_area) */
|
||||
int areano; /* Number of area I belong to */
|
||||
int padj; /* Number of neighbors in Exchange or Loading state */
|
||||
int gr_count; /* Number of neighbors in graceful restart state */
|
||||
u8 gr_recovery; /* Graceful restart recovery is active */
|
||||
u8 gr_cleanup; /* GR cleanup scheduled */
|
||||
btime gr_timeout; /* The end time of grace restart recovery */
|
||||
struct fib rtf; /* Routing table */
|
||||
struct idm idm; /* OSPFv3 LSA ID map */
|
||||
u8 ospf2; /* OSPF v2 or v3 */
|
||||
@ -228,6 +238,8 @@ struct ospf_proto
|
||||
u8 asbr; /* May i originate any ext/NSSA lsa? */
|
||||
u8 vpn_pe; /* Should we do VPN PE specific behavior (RFC 4577)? */
|
||||
u8 ecmp; /* Maximal number of nexthops in ECMP route, or 0 */
|
||||
u8 gr_mode; /* Graceful restart mode (OSPF_GR_*) */
|
||||
uint gr_time; /* Graceful restart interval */
|
||||
u64 csn64; /* Last used cryptographic sequence number */
|
||||
struct ospf_area *backbone; /* If exists */
|
||||
event *flood_event; /* Event for flooding LS updates */
|
||||
@ -346,6 +358,8 @@ struct ospf_neighbor
|
||||
pool *pool;
|
||||
struct ospf_iface *ifa;
|
||||
u8 state;
|
||||
u8 gr_active; /* We act as GR helper for the neighbor */
|
||||
u8 got_my_rt_lsa; /* Received my Rt-LSA in DBDES exchanged */
|
||||
timer *inactim; /* Inactivity timer */
|
||||
u8 imms; /* I, M, Master/slave received */
|
||||
u8 myimms; /* I, M Master/slave */
|
||||
@ -388,6 +402,7 @@ struct ospf_neighbor
|
||||
#define ACKL_DIRECT 0
|
||||
#define ACKL_DELAY 1
|
||||
timer *ackd_timer; /* Delayed ack timer */
|
||||
timer *gr_timer; /* Graceful restart timer, non-NULL only if gr_active */
|
||||
struct bfd_request *bfd_req; /* BFD request, if BFD is used */
|
||||
void *ldd_buffer; /* Last database description packet */
|
||||
u32 ldd_bsize; /* Buffer size for ldd_buffer */
|
||||
@ -469,11 +484,17 @@ struct ospf_neighbor
|
||||
#define OPT_R 0x0010 /* OSPFv3, originator is active router */
|
||||
#define OPT_DC 0x0020 /* Related to demand circuits, not used */
|
||||
#define OPT_O 0x0040 /* OSPFv2 Opaque LSA (RFC 5250) */
|
||||
#define OPT_DN 0x0080 /* OSPFv2 VPN loop prevention (RFC 4576)*/
|
||||
#define OPT_DN 0x0080 /* OSPFv2 VPN loop prevention (RFC 4576) */
|
||||
#define OPT_AF 0x0100 /* OSPFv3 Address Families (RFC 5838) */
|
||||
#define OPT_L_V3 0x0200 /* OSPFv3, link-local signaling */
|
||||
#define OPT_AT 0x0400 /* OSPFv3, authentication trailer */
|
||||
|
||||
#define HELLO2_OPT_MASK (OPT_E | OPT_N | OPT_L_V2)
|
||||
#define DBDES2_OPT_MASK (OPT_E | OPT_L_V2 | OPT_O)
|
||||
|
||||
#define HELLO3_OPT_MASK (OPT_V6 | OPT_E | OPT_N | OPT_R | OPT_AF | OPT_L_V3 | OPT_AT )
|
||||
#define DBDES3_OPT_MASK (OPT_V6 | OPT_E | OPT_R | OPT_AF | OPT_L_V3 | OPT_AT )
|
||||
|
||||
/* Router-LSA VEB flags are are stored together with links (OSPFv2) or options (OSPFv3) */
|
||||
#define OPT_RT_B (0x01 << 24)
|
||||
#define OPT_RT_E (0x02 << 24)
|
||||
@ -555,6 +576,7 @@ struct ospf_auth3
|
||||
#define LSA_T_NSSA 0x2007
|
||||
#define LSA_T_LINK 0x0008
|
||||
#define LSA_T_PREFIX 0x2009
|
||||
#define LSA_T_GR 0x000B
|
||||
#define LSA_T_RI_ 0x000C
|
||||
#define LSA_T_RI_LINK 0x800C
|
||||
#define LSA_T_RI_AREA 0xA00C
|
||||
@ -569,6 +591,7 @@ struct ospf_auth3
|
||||
|
||||
/* OSPFv2 Opaque LSA Types */
|
||||
/* https://www.iana.org/assignments/ospf-opaque-types/ospf-opaque-types.xhtml#ospf-opaque-types-2 */
|
||||
#define LSA_OT_GR 0x03
|
||||
#define LSA_OT_RI 0x04
|
||||
|
||||
#define LSA_FUNCTION_MASK 0x1FFF
|
||||
@ -613,6 +636,12 @@ struct ospf_auth3
|
||||
#define LSA_EXT3_FBIT 0x02000000
|
||||
#define LSA_EXT3_TBIT 0x01000000
|
||||
|
||||
/* OSPF Grace LSA (GR) TLVs */
|
||||
/* https://www.iana.org/assignments/ospfv2-parameters/ospfv2-parameters.xhtml#ospfv2-parameters-13 */
|
||||
#define LSA_GR_PERIOD 1
|
||||
#define LSA_GR_REASON 2
|
||||
#define LSA_GR_ADDRESS 3
|
||||
|
||||
/* OSPF Router Information (RI) TLVs */
|
||||
/* https://www.iana.org/assignments/ospf-parameters/ospf-parameters.xhtml#ri-tlv */
|
||||
#define LSA_RI_RIC 1
|
||||
@ -900,7 +929,7 @@ struct ospf_lsreq_header
|
||||
#define SH_ROUTER_SELF 0xffffffff
|
||||
|
||||
struct lsadb_show_data {
|
||||
struct symbol *name; /* Protocol to request data from */
|
||||
struct ospf_proto *proto; /* Protocol to request data from */
|
||||
u16 type; /* LSA Type, 0 -> all */
|
||||
u16 scope; /* Scope, 0 -> all, hack to handle link scope as 1 */
|
||||
u32 area; /* Specified for area scope */
|
||||
@ -959,6 +988,8 @@ static inline int oa_is_ext(struct ospf_area *oa)
|
||||
static inline int oa_is_nssa(struct ospf_area *oa)
|
||||
{ return oa->options & OPT_N; }
|
||||
|
||||
void ospf_stop_gr_recovery(struct ospf_proto *p);
|
||||
|
||||
void ospf_sh_neigh(struct proto *P, char *iff);
|
||||
void ospf_sh(struct proto *P);
|
||||
void ospf_sh_iface(struct proto *P, char *iff);
|
||||
@ -990,12 +1021,18 @@ static inline struct nbma_node * find_nbma_node(struct ospf_iface *ifa, ip_addr
|
||||
/* neighbor.c */
|
||||
struct ospf_neighbor *ospf_neighbor_new(struct ospf_iface *ifa);
|
||||
void ospf_neigh_sm(struct ospf_neighbor *n, int event);
|
||||
void ospf_neigh_cancel_graceful_restart(struct ospf_neighbor *n);
|
||||
void ospf_neigh_notify_grace_lsa(struct ospf_neighbor *n, struct top_hash_entry *en);
|
||||
void ospf_neigh_lsadb_changed_(struct ospf_proto *p, struct top_hash_entry *en);
|
||||
void ospf_dr_election(struct ospf_iface *ifa);
|
||||
struct ospf_neighbor *find_neigh(struct ospf_iface *ifa, u32 rid);
|
||||
struct ospf_neighbor *find_neigh_by_ip(struct ospf_iface *ifa, ip_addr ip);
|
||||
void ospf_neigh_update_bfd(struct ospf_neighbor *n, int use_bfd);
|
||||
void ospf_sh_neigh_info(struct ospf_neighbor *n);
|
||||
|
||||
static inline void ospf_neigh_lsadb_changed(struct ospf_proto *p, struct top_hash_entry *en)
|
||||
{ if (p->gr_count) ospf_neigh_lsadb_changed_(p, en); }
|
||||
|
||||
/* packet.c */
|
||||
void ospf_pkt_fill_hdr(struct ospf_iface *ifa, void *buf, u8 h_type);
|
||||
int ospf_rx_hook(sock * sk, uint size);
|
||||
|
184
proto/ospf/rt.c
184
proto/ospf/rt.c
@ -10,7 +10,7 @@
|
||||
|
||||
#include "ospf.h"
|
||||
|
||||
static void add_cand(struct ospf_area *oa, struct top_hash_entry *en, struct top_hash_entry *par, u32 dist, int i, uint lif, uint nif);
|
||||
static void add_cand(struct ospf_area *oa, struct top_hash_entry *en, struct top_hash_entry *par, u32 dist, int i, uint data, uint lif, uint nif);
|
||||
static void rt_sync(struct ospf_proto *p);
|
||||
|
||||
|
||||
@ -392,6 +392,40 @@ px_pos_to_ifa(struct ospf_area *oa, int pos)
|
||||
return NULL;
|
||||
}
|
||||
|
||||
static inline struct ospf_iface *
|
||||
rt_find_iface2(struct ospf_area *oa, uint data)
|
||||
{
|
||||
ip_addr addr = ipa_from_u32(data);
|
||||
|
||||
/* We should handle it differently for unnumbered PTP links */
|
||||
struct ospf_iface *ifa;
|
||||
WALK_LIST(ifa, oa->po->iface_list)
|
||||
if ((ifa->oa == oa) && ifa->addr && (ipa_equal(ifa->addr->ip, addr)))
|
||||
return ifa;
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
static inline struct ospf_iface *
|
||||
rt_find_iface3(struct ospf_area *oa, uint lif)
|
||||
{
|
||||
struct ospf_iface *ifa;
|
||||
WALK_LIST(ifa, oa->po->iface_list)
|
||||
if ((ifa->oa == oa) && (ifa->iface_id == lif))
|
||||
return ifa;
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
static struct ospf_iface *
|
||||
rt_find_iface(struct ospf_area *oa, int pos, uint data, uint lif)
|
||||
{
|
||||
if (0)
|
||||
return rt_pos_to_ifa(oa, pos);
|
||||
else
|
||||
return ospf_is_v2(oa->po) ? rt_find_iface2(oa, data) : rt_find_iface3(oa, lif);
|
||||
}
|
||||
|
||||
|
||||
static void
|
||||
add_network(struct ospf_area *oa, net_addr *net, int metric, struct top_hash_entry *en, int pos)
|
||||
@ -503,7 +537,7 @@ spfa_process_rt(struct ospf_proto *p, struct ospf_area *oa, struct top_hash_entr
|
||||
break;
|
||||
}
|
||||
|
||||
add_cand(oa, tmp, act, act->dist + rtl.metric, i, rtl.lif, rtl.nif);
|
||||
add_cand(oa, tmp, act, act->dist + rtl.metric, i, rtl.data, rtl.lif, rtl.nif);
|
||||
}
|
||||
}
|
||||
|
||||
@ -526,7 +560,7 @@ spfa_process_net(struct ospf_proto *p, struct ospf_area *oa, struct top_hash_ent
|
||||
for (i = 0; i < cnt; i++)
|
||||
{
|
||||
tmp = ospf_hash_find_rt(p->gr, oa->areaid, ln->routers[i]);
|
||||
add_cand(oa, tmp, act, act->dist, -1, 0, 0);
|
||||
add_cand(oa, tmp, act, act->dist, -1, 0, 0, 0);
|
||||
}
|
||||
}
|
||||
|
||||
@ -1606,7 +1640,7 @@ ospf_rt_reset(struct ospf_proto *p)
|
||||
en->lb = IPA_NONE;
|
||||
|
||||
if (en->mode == LSA_M_RTCALC)
|
||||
en->mode = LSA_M_STALE;
|
||||
en->mode = LSA_M_RTCALC_STALE;
|
||||
}
|
||||
|
||||
WALK_LIST(oa, p->area_list)
|
||||
@ -1708,7 +1742,7 @@ link_lsa_lladdr(struct ospf_proto *p, struct top_hash_entry *en)
|
||||
|
||||
static struct nexthop *
|
||||
calc_next_hop(struct ospf_area *oa, struct top_hash_entry *en,
|
||||
struct top_hash_entry *par, int pos, uint lif, uint nif)
|
||||
struct top_hash_entry *par, int pos, uint data, uint lif, uint nif)
|
||||
{
|
||||
struct ospf_proto *p = oa->po;
|
||||
struct nexthop *pn = par->nhs;
|
||||
@ -1735,7 +1769,7 @@ calc_next_hop(struct ospf_area *oa, struct top_hash_entry *en,
|
||||
/* The first case - local network */
|
||||
if ((en->lsa_type == LSA_T_NET) && (par == oa->rt))
|
||||
{
|
||||
ifa = rt_pos_to_ifa(oa, pos);
|
||||
ifa = rt_find_iface(oa, pos, data, lif);
|
||||
if (!ifa)
|
||||
return NULL;
|
||||
|
||||
@ -1748,7 +1782,7 @@ calc_next_hop(struct ospf_area *oa, struct top_hash_entry *en,
|
||||
/* The second case - ptp or ptmp neighbor */
|
||||
if ((en->lsa_type == LSA_T_RT) && (par == oa->rt))
|
||||
{
|
||||
ifa = rt_pos_to_ifa(oa, pos);
|
||||
ifa = rt_find_iface(oa, pos, data, lif);
|
||||
if (!ifa)
|
||||
return NULL;
|
||||
|
||||
@ -1838,7 +1872,7 @@ calc_next_hop(struct ospf_area *oa, struct top_hash_entry *en,
|
||||
/* Add LSA into list of candidates in Dijkstra's algorithm */
|
||||
static void
|
||||
add_cand(struct ospf_area *oa, struct top_hash_entry *en, struct top_hash_entry *par,
|
||||
u32 dist, int pos, uint lif, uint nif)
|
||||
u32 dist, int pos, uint data, uint lif, uint nif)
|
||||
{
|
||||
struct ospf_proto *p = oa->po;
|
||||
node *prev, *n;
|
||||
@ -1871,7 +1905,7 @@ add_cand(struct ospf_area *oa, struct top_hash_entry *en, struct top_hash_entry
|
||||
if (!link_back(oa, en, par, lif, nif))
|
||||
return;
|
||||
|
||||
struct nexthop *nhs = calc_next_hop(oa, en, par, pos, lif, nif);
|
||||
struct nexthop *nhs = calc_next_hop(oa, en, par, pos, data, lif, nif);
|
||||
if (!nhs)
|
||||
{
|
||||
log(L_WARN "%s: Cannot find next hop for LSA (Type: %04x, Id: %R, Rt: %R)",
|
||||
@ -2083,6 +2117,136 @@ again2:
|
||||
|
||||
/* Cleanup stale LSAs */
|
||||
WALK_SLIST(en, p->lsal)
|
||||
if (en->mode == LSA_M_STALE)
|
||||
if (en->mode == LSA_M_RTCALC_STALE)
|
||||
ospf_flush_lsa(p, en);
|
||||
}
|
||||
|
||||
|
||||
/* RFC 3623 2.2 - checking for graceful restart termination conditions */
|
||||
void
|
||||
ospf_update_gr_recovery(struct ospf_proto *p)
|
||||
{
|
||||
struct top_hash_entry *rt, *net, *nbr;
|
||||
struct ospf_lsa_rt_walk rtl;
|
||||
struct ospf_neighbor *n;
|
||||
struct ospf_iface *ifa;
|
||||
struct ospf_area *oa;
|
||||
const char *err_dsc = NULL;
|
||||
uint i, j, missing = 0, err_val = 0;
|
||||
|
||||
/*
|
||||
* We check here for three cases:
|
||||
* RFC 3623 2.2 (1) - success when all adjacencies are established
|
||||
* RFC 3623 2.2 (2) - failure when inconsistent LSA was received
|
||||
* RFC 3623 2.2 (3) - grace period timeout
|
||||
*
|
||||
* It is handled by processing pre-restart local router-LSA and adjacent
|
||||
* network-LSAs, checking neighbor association for referenced routers (1)
|
||||
* and checking back links from their router-LSAs (2).
|
||||
*
|
||||
* TODO: Use timer for grace period timeout. We avoided that as function
|
||||
* ospf_stop_gr_recovery() called from ospf_disp() makes ending of graceful
|
||||
* restart uninterrupted by other events.
|
||||
*/
|
||||
|
||||
#define CONTINUE { missing++; continue; }
|
||||
|
||||
if (current_time() > p->gr_timeout)
|
||||
goto timeout;
|
||||
|
||||
WALK_LIST(oa, p->area_list)
|
||||
{
|
||||
/* Get the router-LSA */
|
||||
rt = oa->rt;
|
||||
if (!rt || (rt->lsa.age == LSA_MAXAGE))
|
||||
CONTINUE;
|
||||
|
||||
for (lsa_walk_rt_init(p, rt, &rtl), i = 0; lsa_walk_rt(&rtl); i++)
|
||||
{
|
||||
if (rtl.type == LSART_STUB)
|
||||
continue;
|
||||
|
||||
ifa = rt_find_iface(oa, i, rtl.data, rtl.lif);
|
||||
if (!ifa)
|
||||
DROP("inconsistent interface", ospf_is_v2(p) ? rtl.data : rtl.lif);
|
||||
|
||||
switch (rtl.type)
|
||||
{
|
||||
case LSART_NET:
|
||||
/* Find the network-LSA */
|
||||
net = ospf_hash_find_net(p->gr, oa->areaid, rtl.id, rtl.nif);
|
||||
if (!net)
|
||||
CONTINUE;
|
||||
|
||||
if (!link_back(oa, net, rt, rtl.lif, rtl.nif))
|
||||
DROP("Inconsistent network-LSA", net->lsa.id);
|
||||
|
||||
if (ifa->state == OSPF_IS_DR)
|
||||
{
|
||||
/* Find all neighbors from the network-LSA */
|
||||
struct ospf_lsa_net *net_body = net->lsa_body;
|
||||
uint cnt = lsa_net_count(&net->lsa);
|
||||
for (j = 0; j < cnt; i++)
|
||||
{
|
||||
n = find_neigh(ifa, net_body->routers[j]);
|
||||
if (!n || (n->state != NEIGHBOR_FULL))
|
||||
CONTINUE;
|
||||
|
||||
if (!n->got_my_rt_lsa)
|
||||
DROP("not received my router-LSA", n->rid);
|
||||
|
||||
nbr = ospf_hash_find_rt(p->gr, oa->areaid, n->rid);
|
||||
if (!link_back(oa, nbr, net, 0, 0))
|
||||
DROP("inconsistent router-LSA", n->rid);
|
||||
}
|
||||
}
|
||||
else
|
||||
{
|
||||
/* Find the DR (by IP for OSPFv2) */
|
||||
n = ospf_is_v2(p) ?
|
||||
find_neigh_by_ip(ifa, ipa_from_u32(rtl.id)) :
|
||||
find_neigh(ifa, rtl.id);
|
||||
if (!n || (n->state != NEIGHBOR_FULL))
|
||||
CONTINUE;
|
||||
|
||||
if (!n->got_my_rt_lsa)
|
||||
DROP("not received my router-LSA", n->rid);
|
||||
}
|
||||
break;
|
||||
|
||||
case LSART_VLNK:
|
||||
case LSART_PTP:
|
||||
/* Find the PtP peer */
|
||||
n = find_neigh(ifa, rtl.id);
|
||||
if (!n || (n->state != NEIGHBOR_FULL))
|
||||
CONTINUE;
|
||||
|
||||
if (!n->got_my_rt_lsa)
|
||||
DROP("not received my router-LSA", n->rid);
|
||||
|
||||
nbr = ospf_hash_find_rt(p->gr, oa->areaid, rtl.id);
|
||||
if (!link_back(oa, nbr, rt, rtl.lif, rtl.nif))
|
||||
DROP("inconsistent router-LSA", rtl.id);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
#undef CONTINUE
|
||||
|
||||
if (missing)
|
||||
return;
|
||||
|
||||
OSPF_TRACE(D_EVENTS, "Graceful restart finished");
|
||||
ospf_stop_gr_recovery(p);
|
||||
return;
|
||||
|
||||
drop:
|
||||
log(L_INFO "%s: Graceful restart ended - %s (%R)", p->p.name, err_dsc, err_val);
|
||||
ospf_stop_gr_recovery(p);
|
||||
return;
|
||||
|
||||
timeout:
|
||||
log(L_INFO "%s: Graceful restart ended - grace period expired", p->p.name);
|
||||
ospf_stop_gr_recovery(p);
|
||||
return;
|
||||
}
|
||||
|
@ -130,6 +130,7 @@ static inline int rt_is_nssa(ort *nf)
|
||||
|
||||
void ospf_rt_spf(struct ospf_proto *p);
|
||||
void ospf_rt_initort(struct fib_node *fn);
|
||||
void ospf_update_gr_recovery(struct ospf_proto *p);
|
||||
|
||||
|
||||
#endif /* _BIRD_OSPF_RT_H_ */
|
||||
|
@ -71,6 +71,7 @@ ospf_install_lsa(struct ospf_proto *p, struct ospf_lsa_header *lsa, u32 type, u3
|
||||
en->lsa = *lsa;
|
||||
en->init_age = en->lsa.age;
|
||||
en->inst_time = current_time();
|
||||
en->gr_dirty = p->gr_recovery && (lsa->rt == p->router_id);
|
||||
|
||||
/*
|
||||
* We do not set en->mode. It is either default LSA_M_BASIC, or in a special
|
||||
@ -83,7 +84,10 @@ ospf_install_lsa(struct ospf_proto *p, struct ospf_lsa_header *lsa, u32 type, u3
|
||||
en->lsa_type, en->lsa.id, en->lsa.rt, en->lsa.sn, en->lsa.age);
|
||||
|
||||
if (change)
|
||||
{
|
||||
ospf_neigh_lsadb_changed(p, en);
|
||||
ospf_schedule_rtcalc(p);
|
||||
}
|
||||
|
||||
return en;
|
||||
}
|
||||
@ -243,6 +247,7 @@ ospf_do_originate_lsa(struct ospf_proto *p, struct top_hash_entry *en, void *lsa
|
||||
en->lsa.age = 0;
|
||||
en->init_age = 0;
|
||||
en->inst_time = current_time();
|
||||
en->gr_dirty = 0;
|
||||
lsa_generate_checksum(&en->lsa, en->lsa_body);
|
||||
|
||||
OSPF_TRACE(D_EVENTS, "Originating LSA: Type: %04x, Id: %R, Rt: %R, Seq: %08x",
|
||||
@ -251,7 +256,10 @@ ospf_do_originate_lsa(struct ospf_proto *p, struct top_hash_entry *en, void *lsa
|
||||
ospf_flood_lsa(p, en, NULL);
|
||||
|
||||
if (en->mode == LSA_M_BASIC)
|
||||
{
|
||||
ospf_neigh_lsadb_changed(p, en);
|
||||
ospf_schedule_rtcalc(p);
|
||||
}
|
||||
|
||||
return 1;
|
||||
}
|
||||
@ -273,11 +281,15 @@ ospf_do_originate_lsa(struct ospf_proto *p, struct top_hash_entry *en, void *lsa
|
||||
struct top_hash_entry *
|
||||
ospf_originate_lsa(struct ospf_proto *p, struct ospf_new_lsa *lsa)
|
||||
{
|
||||
struct top_hash_entry *en;
|
||||
struct top_hash_entry *en = NULL;
|
||||
void *lsa_body = p->lsab;
|
||||
u16 lsa_blen = p->lsab_used;
|
||||
u16 lsa_length = sizeof(struct ospf_lsa_header) + lsa_blen;
|
||||
|
||||
/* RFC 3623 2 (1) - do not originate topology LSAs during graceful restart */
|
||||
if (p->gr_recovery && (LSA_FUNCTION(lsa->type) <= LSA_FUNCTION(LSA_T_NSSA)))
|
||||
goto drop;
|
||||
|
||||
/* For OSPFv2 Opaque LSAs, LS ID consists of Opaque Type and Opaque ID */
|
||||
if (ospf_is_v2(p) && lsa_is_opaque(lsa->type))
|
||||
lsa->id |= (u32) lsa_get_opaque_type(lsa->type) << 24;
|
||||
@ -321,7 +333,8 @@ ospf_originate_lsa(struct ospf_proto *p, struct ospf_new_lsa *lsa)
|
||||
if ((en->lsa.age < LSA_MAXAGE) &&
|
||||
(lsa_length == en->lsa.length) &&
|
||||
!memcmp(lsa_body, en->lsa_body, lsa_blen) &&
|
||||
(!ospf_is_v2(p) || (lsa->opts == lsa_get_options(&en->lsa))))
|
||||
(!ospf_is_v2(p) || (lsa->opts == lsa_get_options(&en->lsa))) &&
|
||||
!en->gr_dirty)
|
||||
goto drop;
|
||||
|
||||
lsa_body = lsab_flush(p);
|
||||
@ -414,6 +427,7 @@ void
|
||||
ospf_flush_lsa(struct ospf_proto *p, struct top_hash_entry *en)
|
||||
{
|
||||
en->nf = NULL;
|
||||
en->gr_dirty = 0;
|
||||
|
||||
if (en->next_lsa_body)
|
||||
{
|
||||
@ -433,7 +447,10 @@ ospf_flush_lsa(struct ospf_proto *p, struct top_hash_entry *en)
|
||||
ospf_flood_lsa(p, en, NULL);
|
||||
|
||||
if (en->mode == LSA_M_BASIC)
|
||||
{
|
||||
ospf_neigh_lsadb_changed(p, en);
|
||||
ospf_schedule_rtcalc(p);
|
||||
}
|
||||
|
||||
en->mode = LSA_M_BASIC;
|
||||
}
|
||||
@ -525,6 +542,29 @@ ospf_update_lsadb(struct ospf_proto *p)
|
||||
}
|
||||
}
|
||||
|
||||
void
|
||||
ospf_feed_begin(struct channel *C, int initial UNUSED)
|
||||
{
|
||||
struct ospf_proto *p = (struct ospf_proto *) C->proto;
|
||||
struct top_hash_entry *en;
|
||||
|
||||
/* Mark all external LSAs as stale */
|
||||
WALK_SLIST(en, p->lsal)
|
||||
if (en->mode == LSA_M_EXPORT)
|
||||
en->mode = LSA_M_EXPORT_STALE;
|
||||
}
|
||||
|
||||
void
|
||||
ospf_feed_end(struct channel *C)
|
||||
{
|
||||
struct ospf_proto *p = (struct ospf_proto *) C->proto;
|
||||
struct top_hash_entry *en;
|
||||
|
||||
/* Flush stale LSAs */
|
||||
WALK_SLIST(en, p->lsal)
|
||||
if (en->mode == LSA_M_EXPORT_STALE)
|
||||
ospf_flush_lsa(p, en);
|
||||
}
|
||||
|
||||
static u32
|
||||
ort_to_lsaid(struct ospf_proto *p, ort *nf)
|
||||
@ -1424,6 +1464,7 @@ prepare_prefix_rt_lsa_body(struct ospf_proto *p, struct ospf_area *oa)
|
||||
struct ospf_config *cf = (struct ospf_config *) (p->p.cf);
|
||||
struct ospf_iface *ifa;
|
||||
struct ospf_lsa_prefix *lp;
|
||||
uint max = ospf_is_ip4(p) ? IP4_MAX_PREFIX_LENGTH : IP6_MAX_PREFIX_LENGTH;
|
||||
int host_addr = 0;
|
||||
int net_lsa;
|
||||
int i = 0;
|
||||
@ -1457,7 +1498,7 @@ prepare_prefix_rt_lsa_body(struct ospf_proto *p, struct ospf_area *oa)
|
||||
(a->scope <= SCOPE_LINK))
|
||||
continue;
|
||||
|
||||
if (((a->prefix.pxlen < IP6_MAX_PREFIX_LENGTH) && net_lsa) ||
|
||||
if (((a->prefix.pxlen < max) && net_lsa) ||
|
||||
configured_stubnet(oa, a))
|
||||
continue;
|
||||
|
||||
@ -1465,8 +1506,13 @@ prepare_prefix_rt_lsa_body(struct ospf_proto *p, struct ospf_area *oa)
|
||||
(ifa->state == OSPF_IS_LOOP) ||
|
||||
(ifa->type == OSPF_IT_PTMP))
|
||||
{
|
||||
net_addr_ip6 net = NET_ADDR_IP6(a->ip, IP6_MAX_PREFIX_LENGTH);
|
||||
lsab_put_prefix(p, (net_addr *) &net, 0);
|
||||
net_addr net;
|
||||
if (a->prefix.type == NET_IP4)
|
||||
net_fill_ip4(&net, ipa_to_ip4(a->ip), IP4_MAX_PREFIX_LENGTH);
|
||||
else
|
||||
net_fill_ip6(&net, ipa_to_ip6(a->ip), IP6_MAX_PREFIX_LENGTH);
|
||||
|
||||
lsab_put_prefix(p, &net, 0);
|
||||
host_addr = 1;
|
||||
}
|
||||
else
|
||||
@ -1482,7 +1528,7 @@ prepare_prefix_rt_lsa_body(struct ospf_proto *p, struct ospf_area *oa)
|
||||
if (!sn->hidden)
|
||||
{
|
||||
lsab_put_prefix(p, &sn->prefix, sn->cost);
|
||||
if (sn->prefix.pxlen == IP6_MAX_PREFIX_LENGTH)
|
||||
if (sn->prefix.pxlen == max)
|
||||
host_addr = 1;
|
||||
i++;
|
||||
}
|
||||
@ -1669,6 +1715,59 @@ ospf_originate_prefix_net_lsa(struct ospf_proto *p, struct ospf_iface *ifa)
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Grace LSA handling
|
||||
* Type = LSA_T_GR, opaque type = LSA_OT_GR
|
||||
*/
|
||||
|
||||
static inline void
|
||||
ospf_add_gr_period_tlv(struct ospf_proto *p, uint period)
|
||||
{
|
||||
struct ospf_tlv *tlv = lsab_allocz(p, sizeof(struct ospf_tlv) + sizeof(u32));
|
||||
tlv->type = LSA_GR_PERIOD;
|
||||
tlv->length = 4;
|
||||
tlv->data[0] = period;
|
||||
}
|
||||
|
||||
static inline void
|
||||
ospf_add_gr_reason_tlv(struct ospf_proto *p, uint reason)
|
||||
{
|
||||
struct ospf_tlv *tlv = lsab_allocz(p, sizeof(struct ospf_tlv) + sizeof(u32));
|
||||
tlv->type = LSA_GR_REASON;
|
||||
tlv->length = 1;
|
||||
tlv->data[0] = reason << 24;
|
||||
}
|
||||
|
||||
static inline void
|
||||
ospf_add_gr_address_tlv(struct ospf_proto *p, ip4_addr addr)
|
||||
{
|
||||
struct ospf_tlv *tlv = lsab_allocz(p, sizeof(struct ospf_tlv) + sizeof(u32));
|
||||
tlv->type = LSA_GR_ADDRESS;
|
||||
tlv->length = 4;
|
||||
tlv->data[0] = ip4_to_u32(addr);
|
||||
}
|
||||
|
||||
void
|
||||
ospf_originate_gr_lsa(struct ospf_proto *p, struct ospf_iface *ifa)
|
||||
{
|
||||
struct ospf_new_lsa lsa = {
|
||||
.type = LSA_T_GR,
|
||||
.dom = ifa->iface_id,
|
||||
.id = ospf_is_v2(p) ? 0 : ifa->iface_id,
|
||||
.ifa = ifa
|
||||
};
|
||||
|
||||
ospf_add_gr_period_tlv(p, p->gr_time);
|
||||
ospf_add_gr_reason_tlv(p, 0);
|
||||
|
||||
uint t = ifa->type;
|
||||
if (ospf_is_v2(p) && ((t == OSPF_IT_BCAST) || (t == OSPF_IT_NBMA) || (t == OSPF_IT_PTMP)))
|
||||
ospf_add_gr_address_tlv(p, ipa_to_ip4(ifa->addr->ip));
|
||||
|
||||
ospf_originate_lsa(p, &lsa);
|
||||
}
|
||||
|
||||
|
||||
/*
|
||||
* Router Information LSA handling
|
||||
* Type = LSA_T_RI_AREA, opaque type = LSA_OT_RI
|
||||
@ -1712,6 +1811,10 @@ ospf_update_topology(struct ospf_proto *p)
|
||||
struct ospf_area *oa;
|
||||
struct ospf_iface *ifa;
|
||||
|
||||
/* No LSA reorigination during GR recovery */
|
||||
if (p->gr_recovery)
|
||||
return;
|
||||
|
||||
WALK_LIST(oa, p->area_list)
|
||||
{
|
||||
if (oa->update_rt_lsa)
|
||||
|
@ -33,6 +33,7 @@ struct top_hash_entry
|
||||
u32 lb_id; /* Interface ID of link back iface (for bcast or NBMA networks) */
|
||||
u32 dist; /* Distance from the root */
|
||||
int ret_count; /* Number of retransmission lists referencing the entry */
|
||||
u8 gr_dirty; /* Local LSA received during GR, will be removed unless reoriginated */
|
||||
u8 color;
|
||||
#define OUTSPF 0
|
||||
#define CANDIDATE 1
|
||||
@ -114,10 +115,11 @@ struct top_hash_entry
|
||||
*/
|
||||
|
||||
|
||||
#define LSA_M_BASIC 0
|
||||
#define LSA_M_EXPORT 1
|
||||
#define LSA_M_RTCALC 2
|
||||
#define LSA_M_STALE 3
|
||||
#define LSA_M_BASIC 0
|
||||
#define LSA_M_EXPORT 1
|
||||
#define LSA_M_RTCALC 2
|
||||
#define LSA_M_EXPORT_STALE 3
|
||||
#define LSA_M_RTCALC_STALE 4
|
||||
|
||||
/*
|
||||
* LSA entry modes:
|
||||
@ -127,9 +129,13 @@ struct top_hash_entry
|
||||
* routing table calculation is scheduled. This is also the mode used for LSAs
|
||||
* received from neighbors. Example: Router-LSAs, Network-LSAs.
|
||||
*
|
||||
* LSA_M_EXPORT - like LSA_M_BASIC, but the routing table calculation does not
|
||||
* depend on the LSA. Therefore, the calculation is not scheduled when the LSA
|
||||
* is changed. Example: AS-external-LSAs for exported routes.
|
||||
* LSA_M_EXPORT - The LSA is originated using ospf_originate_lsa() as a
|
||||
* consequence of route export to the OSPF instance. It has to be reoriginated
|
||||
* during each channel feed, otherwise it is flushed automatically at the end of
|
||||
* the feed. May be originated and flushed asynchronously. Also, routing table
|
||||
* calculation does not depend on the LSA. Therefore, the routing table
|
||||
* calculation is not scheduled when the LSA is changed. Example:
|
||||
* AS-external-LSAs for exported routes.
|
||||
*
|
||||
* LSA_M_RTCALC - The LSA has to be requested using ospf_originate_lsa() during
|
||||
* each routing table calculation, otherwise it is flushed automatically at the
|
||||
@ -137,8 +143,11 @@ struct top_hash_entry
|
||||
* source for it. Therefore, the calculation is not scheduled when the LSA is
|
||||
* changed. Example: Summary-LSAs.
|
||||
*
|
||||
* LSA_M_STALE - Temporary state for LSA_M_RTCALC that is not requested during
|
||||
* the current routing table calculation.
|
||||
* LSA_M_EXPORT_STALE - Temporary state for LSA_M_EXPORT that is not requested
|
||||
* during current external route feed.
|
||||
*
|
||||
* LSA_M_RTCALC_STALE - Temporary state for LSA_M_RTCALC that is not requested
|
||||
* during current routing table calculation.
|
||||
*
|
||||
*
|
||||
* Note that we do not schedule the routing table calculation when the age of
|
||||
@ -180,6 +189,8 @@ struct top_hash_entry * ospf_originate_lsa(struct ospf_proto *p, struct ospf_new
|
||||
void ospf_advance_lsa(struct ospf_proto *p, struct top_hash_entry *en, struct ospf_lsa_header *lsa, u32 type, u32 domain, void *body);
|
||||
void ospf_flush_lsa(struct ospf_proto *p, struct top_hash_entry *en);
|
||||
void ospf_update_lsadb(struct ospf_proto *p);
|
||||
void ospf_feed_begin(struct channel *C, int initial);
|
||||
void ospf_feed_end(struct channel *C);
|
||||
|
||||
static inline void ospf_flush2_lsa(struct ospf_proto *p, struct top_hash_entry **en)
|
||||
{ if (*en) { ospf_flush_lsa(p, *en); *en = NULL; } }
|
||||
@ -187,6 +198,7 @@ static inline void ospf_flush2_lsa(struct ospf_proto *p, struct top_hash_entry *
|
||||
void ospf_originate_sum_net_lsa(struct ospf_proto *p, struct ospf_area *oa, ort *nf, int metric);
|
||||
void ospf_originate_sum_rt_lsa(struct ospf_proto *p, struct ospf_area *oa, u32 drid, int metric, u32 options);
|
||||
void ospf_originate_ext_lsa(struct ospf_proto *p, struct ospf_area *oa, ort *nf, u8 mode, u32 metric, u32 ebit, ip_addr fwaddr, u32 tag, int pbit, int dn);
|
||||
void ospf_originate_gr_lsa(struct ospf_proto *p, struct ospf_iface *ifa);
|
||||
|
||||
void ospf_rt_notify(struct proto *P, struct channel *ch, net *n, rte *new, rte *old);
|
||||
void ospf_update_topology(struct ospf_proto *p);
|
||||
|
@ -31,6 +31,7 @@ perf_proto_start: proto_start PERF
|
||||
PERF_CFG->repeat = 4;
|
||||
PERF_CFG->threshold_max = 500 MS_;
|
||||
PERF_CFG->threshold_min = 1 MS_;
|
||||
PERF_CFG->attrs_per_rte = 0;
|
||||
PERF_CFG->keep = 0;
|
||||
PERF_CFG->mode = PERF_MODE_IMPORT;
|
||||
};
|
||||
@ -48,6 +49,7 @@ perf_proto_item:
|
||||
| REPEAT NUM { PERF_CFG->repeat = $2; }
|
||||
| THRESHOLD MIN expr_us { PERF_CFG->threshold_min = $3; }
|
||||
| THRESHOLD MAX expr_us { PERF_CFG->threshold_max = $3; }
|
||||
| ATTRIBUTES NUM { PERF_CFG->attrs_per_rte = $2; }
|
||||
| KEEP bool { PERF_CFG->keep = $2; }
|
||||
| MODE IMPORT { PERF_CFG->mode = PERF_MODE_IMPORT; }
|
||||
| MODE EXPORT { PERF_CFG->mode = PERF_MODE_EXPORT; }
|
||||
|
@ -90,6 +90,8 @@ struct perf_random_routes {
|
||||
struct rta a;
|
||||
};
|
||||
|
||||
static const uint perf_random_routes_size = sizeof(struct perf_random_routes) + (RTA_MAX_SIZE - sizeof(struct rta));
|
||||
|
||||
static inline s64 timediff(struct timespec *begin, struct timespec *end)
|
||||
{ return (end->tv_sec - begin->tv_sec) * (s64) 1000000000 + end->tv_nsec - begin->tv_nsec; }
|
||||
|
||||
@ -124,7 +126,7 @@ perf_loop(void *data)
|
||||
struct perf_proto *p = data;
|
||||
|
||||
const uint N = 1U << p->exp;
|
||||
const uint offset = sizeof(net_addr) + RTA_MAX_SIZE;
|
||||
const uint offset = perf_random_routes_size;
|
||||
|
||||
if (!p->run) {
|
||||
ASSERT(p->data == NULL);
|
||||
@ -135,36 +137,40 @@ perf_loop(void *data)
|
||||
|
||||
ip_addr gw = random_gw(&p->ifa->prefix);
|
||||
|
||||
struct timespec ts_begin, ts_generated, ts_rte, ts_update, ts_withdraw;
|
||||
struct timespec ts_begin, ts_generated, ts_update, ts_withdraw;
|
||||
|
||||
clock_gettime(CLOCK_MONOTONIC, &ts_begin);
|
||||
|
||||
struct rta *a = NULL;
|
||||
|
||||
for (uint i=0; i<N; i++) {
|
||||
struct perf_random_routes *prr = p->data + offset * i;
|
||||
*((net_addr_ip4 *) &prr->net) = random_net_ip4();
|
||||
|
||||
rta *a = &prr->a;
|
||||
bzero(a, RTA_MAX_SIZE);
|
||||
if (!p->attrs_per_rte || !(i % p->attrs_per_rte)) {
|
||||
a = &prr->a;
|
||||
bzero(a, RTA_MAX_SIZE);
|
||||
|
||||
a->src = p->p.main_source;
|
||||
a->source = RTS_PERF;
|
||||
a->scope = SCOPE_UNIVERSE;
|
||||
a->dest = RTD_UNICAST;
|
||||
a->src = p->p.main_source;
|
||||
a->source = RTS_PERF;
|
||||
a->scope = SCOPE_UNIVERSE;
|
||||
a->dest = RTD_UNICAST;
|
||||
|
||||
a->nh.iface = p->ifa->iface;
|
||||
a->nh.gw = gw;
|
||||
a->nh.weight = 1;
|
||||
}
|
||||
a->nh.iface = p->ifa->iface;
|
||||
a->nh.gw = gw;
|
||||
a->nh.weight = 1;
|
||||
|
||||
clock_gettime(CLOCK_MONOTONIC, &ts_generated);
|
||||
if (p->attrs_per_rte)
|
||||
a = rta_lookup(a);
|
||||
}
|
||||
|
||||
for (uint i=0; i<N; i++) {
|
||||
struct perf_random_routes *prr = p->data + offset * i;
|
||||
prr->ep = rte_get_temp(&prr->a);
|
||||
ASSERT(a);
|
||||
|
||||
prr->ep = rte_get_temp(a);
|
||||
prr->ep->pflags = 0;
|
||||
}
|
||||
|
||||
clock_gettime(CLOCK_MONOTONIC, &ts_rte);
|
||||
clock_gettime(CLOCK_MONOTONIC, &ts_generated);
|
||||
|
||||
for (uint i=0; i<N; i++) {
|
||||
struct perf_random_routes *prr = p->data + offset * i;
|
||||
@ -182,13 +188,12 @@ perf_loop(void *data)
|
||||
clock_gettime(CLOCK_MONOTONIC, &ts_withdraw);
|
||||
|
||||
s64 gentime = timediff(&ts_begin, &ts_generated);
|
||||
s64 temptime = timediff(&ts_generated, &ts_rte);
|
||||
s64 updatetime = timediff(&ts_rte, &ts_update);
|
||||
s64 updatetime = timediff(&ts_generated, &ts_update);
|
||||
s64 withdrawtime = timediff(&ts_update, &ts_withdraw);
|
||||
|
||||
if (updatetime NS >= p->threshold_min)
|
||||
PLOG("exp=%u times: gen=%lu temp=%lu update=%lu withdraw=%lu",
|
||||
p->exp, gentime, temptime, updatetime, withdrawtime);
|
||||
PLOG("exp=%u times: gen=%ld update=%ld withdraw=%ld",
|
||||
p->exp, gentime, updatetime, withdrawtime);
|
||||
|
||||
if (updatetime NS < p->threshold_max)
|
||||
p->stop = 0;
|
||||
@ -267,6 +272,7 @@ perf_init(struct proto_config *CF)
|
||||
p->repeat = cf->repeat;
|
||||
p->keep = cf->keep;
|
||||
p->mode = cf->mode;
|
||||
p->attrs_per_rte = cf->attrs_per_rte;
|
||||
|
||||
switch (p->mode) {
|
||||
case PERF_MODE_IMPORT:
|
||||
|
@ -22,6 +22,7 @@ struct perf_config {
|
||||
uint to;
|
||||
uint repeat;
|
||||
uint keep;
|
||||
uint attrs_per_rte;
|
||||
enum perf_mode mode;
|
||||
};
|
||||
|
||||
@ -39,6 +40,7 @@ struct perf_proto {
|
||||
uint exp;
|
||||
uint stop;
|
||||
uint keep;
|
||||
uint attrs_per_rte;
|
||||
enum perf_mode mode;
|
||||
};
|
||||
|
||||
|
@ -1,6 +1,8 @@
|
||||
/*
|
||||
* BIRD -- Router Advertisement Configuration
|
||||
*
|
||||
* (c) 2011--2019 Ondrej Zajicek <santiago@crfreenet.org>
|
||||
* (c) 2011--2019 CZ.NIC z.s.p.o.
|
||||
*
|
||||
* Can be freely distributed and used under the terms of the GNU GPL.
|
||||
*/
|
||||
@ -26,12 +28,12 @@ static u8 radv_mult_val; /* Used by radv_mult for second return value */
|
||||
|
||||
CF_DECLS
|
||||
|
||||
CF_KEYWORDS(RADV, PREFIX, INTERFACE, MIN, MAX, RA, DELAY, INTERVAL,
|
||||
MANAGED, OTHER, CONFIG, LINGER, LINK, MTU, REACHABLE, TIME, RETRANS,
|
||||
TIMER, CURRENT, HOP, LIMIT, DEFAULT, VALID, PREFERRED, MULT,
|
||||
LIFETIME, SKIP, ONLINK, AUTONOMOUS, RDNSS, DNSSL, NS, DOMAIN,
|
||||
LOCAL, TRIGGER, SENSITIVE, PREFERENCE, LOW, MEDIUM, HIGH, PROPAGATE,
|
||||
ROUTE, ROUTES, RA_PREFERENCE, RA_LIFETIME)
|
||||
CF_KEYWORDS(RADV, PREFIX, INTERFACE, MIN, MAX, RA, DELAY, INTERVAL, SOLICITED,
|
||||
UNICAST, MANAGED, OTHER, CONFIG, LINGER, LINK, MTU, REACHABLE, TIME,
|
||||
RETRANS, TIMER, CURRENT, HOP, LIMIT, DEFAULT, VALID, PREFERRED, MULT,
|
||||
LIFETIME, SKIP, ONLINK, AUTONOMOUS, RDNSS, DNSSL, NS, DOMAIN, LOCAL,
|
||||
TRIGGER, SENSITIVE, PREFERENCE, LOW, MEDIUM, HIGH, PROPAGATE, ROUTE,
|
||||
ROUTES, RA_PREFERENCE, RA_LIFETIME)
|
||||
|
||||
CF_ENUM(T_ENUM_RA_PREFERENCE, RA_PREF_, LOW, MEDIUM, HIGH)
|
||||
|
||||
@ -98,6 +100,7 @@ radv_iface_item:
|
||||
MIN RA INTERVAL expr { RADV_IFACE->min_ra_int = $4; if ($4 < 3) cf_error("Min RA interval must be at least 3"); }
|
||||
| MAX RA INTERVAL expr { RADV_IFACE->max_ra_int = $4; if (($4 < 4) || ($4 > 1800)) cf_error("Max RA interval must be in range 4-1800"); }
|
||||
| MIN DELAY expr { RADV_IFACE->min_delay = $3; if ($3 <= 0) cf_error("Min delay must be positive"); }
|
||||
| SOLICITED RA UNICAST bool { RADV_IFACE->solicited_ra_unicast = $4; }
|
||||
| MANAGED bool { RADV_IFACE->managed = $2; }
|
||||
| OTHER CONFIG bool { RADV_IFACE->other_config = $3; }
|
||||
| LINK MTU expr { RADV_IFACE->link_mtu = $3; }
|
||||
|
@ -1,6 +1,8 @@
|
||||
/*
|
||||
* BIRD -- RAdv Packet Processing
|
||||
*
|
||||
* (c) 2011--2019 Ondrej Zajicek <santiago@crfreenet.org>
|
||||
* (c) 2011--2019 CZ.NIC z.s.p.o.
|
||||
*
|
||||
* Can be freely distributed and used under the terms of the GNU GPL.
|
||||
*/
|
||||
@ -370,19 +372,49 @@ radv_prepare_ra(struct radv_iface *ifa)
|
||||
|
||||
|
||||
void
|
||||
radv_send_ra(struct radv_iface *ifa)
|
||||
radv_send_ra(struct radv_iface *ifa, ip_addr to)
|
||||
{
|
||||
struct radv_proto *p = ifa->ra;
|
||||
|
||||
/* TX queue is already full */
|
||||
if (!sk_tx_buffer_empty(ifa->sk))
|
||||
return;
|
||||
|
||||
if (ifa->valid_time <= current_time())
|
||||
radv_invalidate(ifa);
|
||||
|
||||
/* We store prepared RA in tbuf */
|
||||
if (!ifa->plen)
|
||||
radv_prepare_ra(ifa);
|
||||
|
||||
RADV_TRACE(D_PACKETS, "Sending RA via %s", ifa->iface->name);
|
||||
sk_send_to(ifa->sk, ifa->plen, IP6_ALL_NODES, 0);
|
||||
if (ipa_zero(to))
|
||||
{
|
||||
to = IP6_ALL_NODES;
|
||||
RADV_TRACE(D_PACKETS, "Sending RA via %s", ifa->iface->name);
|
||||
}
|
||||
else
|
||||
{
|
||||
RADV_TRACE(D_PACKETS, "Sending RA to %I via %s", to, ifa->iface->name);
|
||||
}
|
||||
|
||||
int done = sk_send_to(ifa->sk, ifa->plen, to, 0);
|
||||
if (!done)
|
||||
log(L_WARN "%s: TX queue full on %s", p->p.name, ifa->iface->name);
|
||||
}
|
||||
|
||||
|
||||
static void
|
||||
radv_receive_rs(struct radv_proto *p, struct radv_iface *ifa, ip_addr from)
|
||||
{
|
||||
RADV_TRACE(D_PACKETS, "Received RS from %I via %s",
|
||||
from, ifa->iface->name);
|
||||
|
||||
if (ifa->cf->solicited_ra_unicast && ipa_nonzero(from))
|
||||
radv_send_ra(ifa, from);
|
||||
else
|
||||
radv_iface_notify(ifa, RA_EV_RS);
|
||||
}
|
||||
|
||||
static int
|
||||
radv_rx_hook(sock *sk, uint size)
|
||||
{
|
||||
@ -410,9 +442,7 @@ radv_rx_hook(sock *sk, uint size)
|
||||
switch (buf[0])
|
||||
{
|
||||
case ICMPV6_RS:
|
||||
RADV_TRACE(D_PACKETS, "Received RS from %I via %s",
|
||||
sk->faddr, ifa->iface->name);
|
||||
radv_iface_notify(ifa, RA_EV_RS);
|
||||
radv_receive_rs(p, ifa, sk->faddr);
|
||||
return 1;
|
||||
|
||||
case ICMPV6_RA:
|
||||
@ -430,7 +460,10 @@ static void
|
||||
radv_tx_hook(sock *sk)
|
||||
{
|
||||
struct radv_iface *ifa = sk->data;
|
||||
log(L_WARN "%s: TX hook called", ifa->ra->p.name);
|
||||
log(L_INFO "%s: TX queue ready on %s", ifa->ra->p.name, ifa->iface->name);
|
||||
|
||||
/* Some RAs may be missed due to full TX queue */
|
||||
radv_iface_notify(ifa, RA_EV_RS);
|
||||
}
|
||||
|
||||
static void
|
||||
|
@ -1,6 +1,8 @@
|
||||
/*
|
||||
* BIRD -- Router Advertisement
|
||||
*
|
||||
* (c) 2011--2019 Ondrej Zajicek <santiago@crfreenet.org>
|
||||
* (c) 2011--2019 CZ.NIC z.s.p.o.
|
||||
*
|
||||
* Can be freely distributed and used under the terms of the GNU GPL.
|
||||
*/
|
||||
@ -35,18 +37,14 @@
|
||||
* case of the specified trigger prefix was changed.
|
||||
*
|
||||
* Supported standards:
|
||||
* - RFC 4861 - main RA standard
|
||||
* - RFC 4191 - Default Router Preferences and More-Specific Routes
|
||||
* - RFC 6106 - DNS extensions (RDDNS, DNSSL)
|
||||
* RFC 4861 - main RA standard
|
||||
* RFC 4191 - Default Router Preferences and More-Specific Routes
|
||||
* RFC 6106 - DNS extensions (RDDNS, DNSSL)
|
||||
*/
|
||||
|
||||
static void radv_prune_prefixes(struct radv_iface *ifa);
|
||||
static void radv_prune_routes(struct radv_proto *p);
|
||||
|
||||
/* Invalidate cached RA packet */
|
||||
static inline void radv_invalidate(struct radv_iface *ifa)
|
||||
{ ifa->plen = 0; }
|
||||
|
||||
static void
|
||||
radv_timer(timer *tm)
|
||||
{
|
||||
@ -56,16 +54,13 @@ radv_timer(timer *tm)
|
||||
|
||||
RADV_TRACE(D_EVENTS, "Timer fired on %s", ifa->iface->name);
|
||||
|
||||
if (ifa->valid_time <= now)
|
||||
radv_invalidate(ifa);
|
||||
|
||||
if (ifa->prune_time <= now)
|
||||
radv_prune_prefixes(ifa);
|
||||
|
||||
if (p->prune_time <= now)
|
||||
radv_prune_routes(p);
|
||||
|
||||
radv_send_ra(ifa);
|
||||
radv_send_ra(ifa, IPA_NONE);
|
||||
|
||||
/* Update timer */
|
||||
ifa->last = now;
|
||||
@ -627,7 +622,7 @@ radv_iface_shutdown(struct radv_iface *ifa)
|
||||
if (ifa->sk)
|
||||
{
|
||||
radv_invalidate(ifa);
|
||||
radv_send_ra(ifa);
|
||||
radv_send_ra(ifa, IPA_NONE);
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -1,6 +1,8 @@
|
||||
/*
|
||||
* BIRD -- Router Advertisement
|
||||
*
|
||||
* (c) 2011--2019 Ondrej Zajicek <santiago@crfreenet.org>
|
||||
* (c) 2011--2019 CZ.NIC z.s.p.o.
|
||||
*
|
||||
* Can be freely distributed and used under the terms of the GNU GPL.
|
||||
*/
|
||||
@ -66,6 +68,8 @@ struct radv_iface_config
|
||||
u32 max_ra_int;
|
||||
u32 min_delay;
|
||||
|
||||
u8 solicited_ra_unicast; /* Send solicited RAs as unicast */
|
||||
|
||||
u32 prefix_linger_time; /* How long we advertise dead prefixes with lifetime 0 */
|
||||
u32 route_linger_time; /* How long we advertise dead routes with lifetime 0 */
|
||||
|
||||
@ -204,12 +208,16 @@ struct radv_iface
|
||||
log(L_TRACE "%s: " msg, p->p.name , ## args ); } while(0)
|
||||
|
||||
|
||||
/* Invalidate cached RA packet */
|
||||
static inline void radv_invalidate(struct radv_iface *ifa)
|
||||
{ ifa->plen = 0; }
|
||||
|
||||
/* radv.c */
|
||||
void radv_iface_notify(struct radv_iface *ifa, int event);
|
||||
|
||||
/* packets.c */
|
||||
int radv_process_domain(struct radv_dnssl_config *cf);
|
||||
void radv_send_ra(struct radv_iface *ifa);
|
||||
void radv_send_ra(struct radv_iface *ifa, ip_addr to);
|
||||
int radv_sk_open(struct radv_iface *ifa);
|
||||
|
||||
|
||||
|
@ -191,10 +191,10 @@ dynamic_attr: RIP_TAG { $$ = f_new_dynamic_attr(EAF_TYPE_INT, T_INT, EA_RIP_TAG)
|
||||
|
||||
CF_CLI_HELP(SHOW RIP, ..., [[Show information about RIP protocol]]);
|
||||
|
||||
CF_CLI(SHOW RIP INTERFACES, optsym opttext, [<name>] [\"<interface>\"], [[Show information about RIP interfaces]])
|
||||
CF_CLI(SHOW RIP INTERFACES, optproto opttext, [<name>] [\"<interface>\"], [[Show information about RIP interfaces]])
|
||||
{ rip_show_interfaces(proto_get_named($4, &proto_rip), $5); };
|
||||
|
||||
CF_CLI(SHOW RIP NEIGHBORS, optsym opttext, [<name>] [\"<interface>\"], [[Show information about RIP neighbors]])
|
||||
CF_CLI(SHOW RIP NEIGHBORS, optproto opttext, [<name>] [\"<interface>\"], [[Show information about RIP neighbors]])
|
||||
{ rip_show_neighbors(proto_get_named($4, &proto_rip), $5); };
|
||||
|
||||
|
||||
|
@ -483,7 +483,8 @@ rip_update_bfd(struct rip_proto *p, struct rip_neighbor *n)
|
||||
*/
|
||||
ip_addr saddr = rip_is_v2(p) ? n->ifa->sk->saddr : n->nbr->ifa->ip;
|
||||
n->bfd_req = bfd_request_session(p->p.pool, n->nbr->addr, saddr,
|
||||
n->nbr->iface, rip_bfd_notify, n);
|
||||
n->nbr->iface, p->p.vrf,
|
||||
rip_bfd_notify, n);
|
||||
}
|
||||
|
||||
if (!use_bfd && n->bfd_req)
|
||||
|
@ -97,7 +97,7 @@ rpki_cache_addr:
|
||||
rpki_check_unused_hostname();
|
||||
RPKI_CFG->ip = $1;
|
||||
/* Ensure hostname is filled */
|
||||
char *hostname = cfg_allocz(sizeof(INET6_ADDRSTRLEN + 1));
|
||||
char *hostname = cfg_allocz(INET6_ADDRSTRLEN + 1);
|
||||
bsnprintf(hostname, INET6_ADDRSTRLEN+1, "%I", RPKI_CFG->ip);
|
||||
RPKI_CFG->hostname = hostname;
|
||||
}
|
||||
|
@ -687,9 +687,9 @@ rpki_reconfigure_cache(struct rpki_proto *p UNUSED, struct rpki_cache *cache, st
|
||||
{
|
||||
struct rpki_tr_ssh_config *ssh_old = (void *) old->tr_config.spec;
|
||||
struct rpki_tr_ssh_config *ssh_new = (void *) new->tr_config.spec;
|
||||
if ((strcmp(ssh_old->bird_private_key, ssh_new->bird_private_key) != 0) ||
|
||||
(strcmp(ssh_old->cache_public_key, ssh_new->cache_public_key) != 0) ||
|
||||
(strcmp(ssh_old->user, ssh_new->user) != 0))
|
||||
if (bstrcmp(ssh_old->bird_private_key, ssh_new->bird_private_key) ||
|
||||
bstrcmp(ssh_old->cache_public_key, ssh_new->cache_public_key) ||
|
||||
bstrcmp(ssh_old->user, ssh_new->user))
|
||||
{
|
||||
CACHE_TRACE(D_EVENTS, cache, "Settings of SSH transport configuration changed");
|
||||
try_fast_reconnect = 1;
|
||||
|
@ -14,7 +14,7 @@ CF_DEFINES
|
||||
|
||||
#define STATIC_CFG ((struct static_config *) this_proto)
|
||||
static struct static_route *this_srt, *this_snh;
|
||||
static struct f_inst **this_srt_last_cmd;
|
||||
static struct f_inst *this_srt_cmds, *this_srt_last_cmd;
|
||||
|
||||
static struct static_route *
|
||||
static_nexthop_new(void)
|
||||
@ -39,6 +39,8 @@ static_route_finish(void)
|
||||
{
|
||||
if (net_type_match(this_srt->net, NB_DEST) == !this_srt->dest)
|
||||
cf_error("Unexpected or missing nexthop/type");
|
||||
|
||||
this_srt->cmds = f_linearize(this_srt_cmds);
|
||||
}
|
||||
|
||||
CF_DECLS
|
||||
@ -108,7 +110,8 @@ stat_route0: ROUTE net_any {
|
||||
this_srt = cfg_allocz(sizeof(struct static_route));
|
||||
add_tail(&STATIC_CFG->routes, &this_srt->n);
|
||||
this_srt->net = $2;
|
||||
this_srt_last_cmd = &(this_srt->cmds);
|
||||
this_srt_cmds = NULL;
|
||||
this_srt_last_cmd = NULL;
|
||||
this_srt->mp_next = NULL;
|
||||
this_snh = NULL;
|
||||
}
|
||||
@ -134,7 +137,13 @@ stat_route:
|
||||
;
|
||||
|
||||
stat_route_item:
|
||||
cmd { *this_srt_last_cmd = $1; this_srt_last_cmd = &($1->next); }
|
||||
cmd {
|
||||
if (this_srt_last_cmd)
|
||||
this_srt_last_cmd->next = $1;
|
||||
else
|
||||
this_srt_cmds = $1;
|
||||
this_srt_last_cmd = $1;
|
||||
}
|
||||
;
|
||||
|
||||
stat_route_opts:
|
||||
@ -148,7 +157,7 @@ stat_route_opt_list:
|
||||
;
|
||||
|
||||
|
||||
CF_CLI(SHOW STATIC, optsym, [<name>], [[Show details of static protocol]])
|
||||
CF_CLI(SHOW STATIC, optproto, [<name>], [[Show details of static protocol]])
|
||||
{ static_show(proto_get_named($3, &proto_static)); } ;
|
||||
|
||||
CF_CODE
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user