]> git.proxmox.com Git - mirror_frr.git/blame - lib/vrf.c
Merge pull request #13649 from donaldsharp/unlock_the_node_or_else
[mirror_frr.git] / lib / vrf.c
CommitLineData
acddc0ed 1// SPDX-License-Identifier: GPL-2.0-or-later
b72ede27
FL
2/*
3 * VRF functions.
4 * Copyright (C) 2014 6WIND S.A.
b72ede27
FL
5 */
6
7#include <zebra.h>
8
6a69b354 9#include "if.h"
b72ede27 10#include "vrf.h"
7922fc65 11#include "vrf_int.h"
b72ede27
FL
12#include "prefix.h"
13#include "table.h"
14#include "log.h"
15#include "memory.h"
19dc275e 16#include "command.h"
b95c1883 17#include "ns.h"
3bc34908 18#include "privs.h"
98cbbaea 19#include "nexthop_group.h"
b66d022e 20#include "lib_errors.h"
bc867a5d 21#include "northbound.h"
8b4cb7a6 22#include "northbound_cli.h"
19dc275e 23
1eb92f06 24/* default VRF name value used when VRF backend is not NETNS */
dd114702 25#define VRF_DEFAULT_NAME_INTERNAL "default"
ec31f30d 26
bf8d3d6a
DL
27DEFINE_MTYPE_STATIC(LIB, VRF, "VRF");
28DEFINE_MTYPE_STATIC(LIB, VRF_BITMAP, "VRF bit-map");
4a1ab8e4 29
96244aca 30DEFINE_QOBJ_TYPE(vrf);
e80e7cce 31
d62a17ae 32static __inline int vrf_id_compare(const struct vrf *, const struct vrf *);
33static __inline int vrf_name_compare(const struct vrf *, const struct vrf *);
1a1a7065 34
d62a17ae 35RB_GENERATE(vrf_id_head, vrf, id_entry, vrf_id_compare);
36RB_GENERATE(vrf_name_head, vrf, name_entry, vrf_name_compare);
1a1a7065 37
d62a17ae 38struct vrf_id_head vrfs_by_id = RB_INITIALIZER(&vrfs_by_id);
39struct vrf_name_head vrfs_by_name = RB_INITIALIZER(&vrfs_by_name);
1a1a7065 40
78dd30b2 41static int vrf_backend;
72261ecd 42static int vrf_backend_configured;
c200f5e1 43static char vrf_default_name[VRF_NAMSIZ] = VRF_DEFAULT_NAME_INTERNAL;
78dd30b2 44
19dc275e
DS
45/*
46 * Turn on/off debug code
47 * for vrf.
48 */
c17faa4b 49static int debug_vrf = 0;
b72ede27 50
b72ede27 51/* Holding VRF hooks */
1b3e9a21 52static struct vrf_master {
d62a17ae 53 int (*vrf_new_hook)(struct vrf *);
54 int (*vrf_delete_hook)(struct vrf *);
55 int (*vrf_enable_hook)(struct vrf *);
56 int (*vrf_disable_hook)(struct vrf *);
57} vrf_master = {
58 0,
59};
b72ede27 60
d62a17ae 61static int vrf_is_enabled(struct vrf *vrf);
e5bf3e1e 62
216b18ef 63/* VRF list existance check by name. */
d62a17ae 64struct vrf *vrf_lookup_by_name(const char *name)
216b18ef 65{
d62a17ae 66 struct vrf vrf;
67 strlcpy(vrf.name, name, sizeof(vrf.name));
68 return (RB_FIND(vrf_name_head, &vrfs_by_name, &vrf));
216b18ef 69}
216b18ef 70
d62a17ae 71static __inline int vrf_id_compare(const struct vrf *a, const struct vrf *b)
b72ede27 72{
d62a17ae 73 return (a->vrf_id - b->vrf_id);
216b18ef
DS
74}
75
d62a17ae 76static int vrf_name_compare(const struct vrf *a, const struct vrf *b)
b72ede27 77{
d62a17ae 78 return strcmp(a->name, b->name);
b72ede27
FL
79}
80
ce1be369
PG
81int vrf_switch_to_netns(vrf_id_t vrf_id)
82{
83 char *name;
84 struct vrf *vrf = vrf_lookup_by_id(vrf_id);
85
ce1be369 86 /* VRF is default VRF. silently ignore */
e26aedbe 87 if (!vrf || vrf->vrf_id == VRF_DEFAULT)
9dff1132 88 return 1; /* 1 = default */
e26aedbe
PG
89 /* VRF has no NETNS backend. silently ignore */
90 if (vrf->data.l.netns_name[0] == '\0')
9dff1132 91 return 2; /* 2 = no netns */
ce1be369
PG
92 name = ns_netns_pathname(NULL, vrf->data.l.netns_name);
93 if (debug_vrf)
94 zlog_debug("VRF_SWITCH: %s(%u)", name, vrf->vrf_id);
95 return ns_switch_to_netns(name);
96}
97
98int vrf_switchback_to_initial(void)
99{
100 int ret = ns_switchback_to_initial();
101
102 if (ret == 0 && debug_vrf)
103 zlog_debug("VRF_SWITCHBACK");
104 return ret;
105}
106
216b18ef 107/* Get a VRF. If not found, create one.
34f8e6af
DS
108 * Arg:
109 * name - The name of the vrf. May be NULL if unknown.
110 * vrf_id - The vrf_id of the vrf. May be VRF_UNKNOWN if unknown
216b18ef 111 * Description: Please note that this routine can be called with just the name
34f8e6af
DS
112 * and 0 vrf-id
113 */
d62a17ae 114struct vrf *vrf_get(vrf_id_t vrf_id, const char *name)
115{
116 struct vrf *vrf = NULL;
117 int new = 0;
118
d62a17ae 119 /* Nothing to see, move along here */
120 if (!name && vrf_id == VRF_UNKNOWN)
121 return NULL;
122
0c2bac38
PG
123 /* attempt to find already available VRF
124 */
125 if (name)
126 vrf = vrf_lookup_by_name(name);
dd114702
PG
127 if (vrf && vrf_id != VRF_UNKNOWN
128 && vrf->vrf_id != VRF_UNKNOWN
129 && vrf->vrf_id != vrf_id) {
130 zlog_debug("VRF_GET: avoid %s creation(%u), same name exists (%u)",
131 name, vrf_id, vrf->vrf_id);
132 return NULL;
133 }
d62a17ae 134 /* Try to find VRF both by ID and name */
0c2bac38 135 if (!vrf && vrf_id != VRF_UNKNOWN)
d62a17ae 136 vrf = vrf_lookup_by_id(vrf_id);
d62a17ae 137
138 if (vrf == NULL) {
139 vrf = XCALLOC(MTYPE_VRF, sizeof(struct vrf));
140 vrf->vrf_id = VRF_UNKNOWN;
d62a17ae 141 QOBJ_REG(vrf, vrf);
142 new = 1;
143
144 if (debug_vrf)
145 zlog_debug("VRF(%u) %s is created.", vrf_id,
146 (name) ? name : "(NULL)");
147 }
148
149 /* Set identifier */
150 if (vrf_id != VRF_UNKNOWN && vrf->vrf_id == VRF_UNKNOWN) {
151 vrf->vrf_id = vrf_id;
152 RB_INSERT(vrf_id_head, &vrfs_by_id, vrf);
153 }
154
155 /* Set name */
156 if (name && vrf->name[0] != '\0' && strcmp(name, vrf->name)) {
87272aff 157 /* update the vrf name */
d62a17ae 158 RB_REMOVE(vrf_name_head, &vrfs_by_name, vrf);
87272aff
PG
159 strlcpy(vrf->data.l.netns_name,
160 name, NS_NAMSIZ);
d62a17ae 161 strlcpy(vrf->name, name, sizeof(vrf->name));
162 RB_INSERT(vrf_name_head, &vrfs_by_name, vrf);
163 } else if (name && vrf->name[0] == '\0') {
164 strlcpy(vrf->name, name, sizeof(vrf->name));
165 RB_INSERT(vrf_name_head, &vrfs_by_name, vrf);
166 }
d62a17ae 167 if (new &&vrf_master.vrf_new_hook)
168 (*vrf_master.vrf_new_hook)(vrf);
169
170 return vrf;
b72ede27
FL
171}
172
75d26fb3 173/* Update a VRF. If not found, create one.
174 * Arg:
175 * name - The name of the vrf.
176 * vrf_id - The vrf_id of the vrf.
177 * Description: This function first finds the vrf using its name. If the vrf is
178 * found and the vrf-id of the existing vrf does not match the new vrf id, it
179 * will disable the existing vrf and update it with new vrf-id. If the vrf is
180 * not found, it will create the vrf with given name and the new vrf id.
181 */
182struct vrf *vrf_update(vrf_id_t new_vrf_id, const char *name)
183{
184 struct vrf *vrf = NULL;
185
186 /*Treat VRF add for existing vrf as update
187 * Update VRF ID and also update in VRF ID table
188 */
189 if (name)
190 vrf = vrf_lookup_by_name(name);
191 if (vrf && new_vrf_id != VRF_UNKNOWN && vrf->vrf_id != VRF_UNKNOWN
192 && vrf->vrf_id != new_vrf_id) {
193 if (debug_vrf) {
194 zlog_debug(
195 "Vrf Update event: %s old id: %u, new id: %u",
196 name, vrf->vrf_id, new_vrf_id);
197 }
198
199 /*Disable the vrf to simulate implicit delete
200 * so that all stale routes are deleted
201 * This vrf will be enabled down the line
202 */
203 vrf_disable(vrf);
204
205
206 RB_REMOVE(vrf_id_head, &vrfs_by_id, vrf);
207 vrf->vrf_id = new_vrf_id;
208 RB_INSERT(vrf_id_head, &vrfs_by_id, vrf);
209
210 } else {
211
212 /*
213 * vrf_get is implied creation if it does not exist
214 */
215 vrf = vrf_get(new_vrf_id, name);
216 }
217 return vrf;
218}
219
84915b0a 220/* Delete a VRF. This is called when the underlying VRF goes away, a
221 * pre-configured VRF is deleted or when shutting down (vrf_terminate()).
222 */
d62a17ae 223void vrf_delete(struct vrf *vrf)
b72ede27 224{
d62a17ae 225 if (debug_vrf)
c7384cf8
DS
226 zlog_debug("VRF %s(%u) is to be deleted.", vrf->name,
227 vrf->vrf_id);
b72ede27 228
d62a17ae 229 if (vrf_is_enabled(vrf))
230 vrf_disable(vrf);
e5bf3e1e 231
f60a1188
IR
232 if (vrf->vrf_id != VRF_UNKNOWN) {
233 RB_REMOVE(vrf_id_head, &vrfs_by_id, vrf);
234 vrf->vrf_id = VRF_UNKNOWN;
235 }
236
84915b0a 237 /* If the VRF is user configured, it'll stick around, just remove
238 * the ID mapping. Interfaces assigned to this VRF should've been
239 * removed already as part of the VRF going down.
240 */
9acc98c8 241 if (vrf_is_user_cfged(vrf))
84915b0a 242 return;
84915b0a 243
f60a1188
IR
244 /* Do not delete the VRF if it has interfaces configured in it. */
245 if (!RB_EMPTY(if_name_head, &vrf->ifaces_by_name))
246 return;
247
d62a17ae 248 if (vrf_master.vrf_delete_hook)
249 (*vrf_master.vrf_delete_hook)(vrf);
216b18ef 250
d62a17ae 251 QOBJ_UNREG(vrf);
b72ede27 252
d62a17ae 253 if (vrf->name[0] != '\0')
254 RB_REMOVE(vrf_name_head, &vrfs_by_name, vrf);
b72ede27 255
d62a17ae 256 XFREE(MTYPE_VRF, vrf);
b72ede27
FL
257}
258
259/* Look up a VRF by identifier. */
d62a17ae 260struct vrf *vrf_lookup_by_id(vrf_id_t vrf_id)
b72ede27 261{
d62a17ae 262 struct vrf vrf;
263 vrf.vrf_id = vrf_id;
264 return (RB_FIND(vrf_id_head, &vrfs_by_id, &vrf));
b72ede27
FL
265}
266
e5bf3e1e
FL
267/*
268 * Enable a VRF - that is, let the VRF be ready to use.
269 * The VRF_ENABLE_HOOK callback will be called to inform
270 * that they can allocate resources in this VRF.
271 *
272 * RETURN: 1 - enabled successfully; otherwise, 0.
273 */
d62a17ae 274int vrf_enable(struct vrf *vrf)
e5bf3e1e 275{
d62a17ae 276 if (vrf_is_enabled(vrf))
277 return 1;
05e8e11e 278
d62a17ae 279 if (debug_vrf)
c7384cf8 280 zlog_debug("VRF %s(%u) is enabled.", vrf->name, vrf->vrf_id);
e5bf3e1e 281
d62a17ae 282 SET_FLAG(vrf->status, VRF_ACTIVE);
e5bf3e1e 283
d62a17ae 284 if (vrf_master.vrf_enable_hook)
285 (*vrf_master.vrf_enable_hook)(vrf);
e5bf3e1e 286
98cbbaea
DS
287 /*
288 * If we have any nexthop group entries that
289 * are awaiting vrf initialization then
290 * let's let people know about it
291 */
292 nexthop_group_enable_vrf(vrf);
293
d62a17ae 294 return 1;
e5bf3e1e
FL
295}
296
297/*
298 * Disable a VRF - that is, let the VRF be unusable.
299 * The VRF_DELETE_HOOK callback will be called to inform
300 * that they must release the resources in the VRF.
301 */
697d3ec7 302void vrf_disable(struct vrf *vrf)
e5bf3e1e 303{
d62a17ae 304 if (!vrf_is_enabled(vrf))
305 return;
a647bfa8 306
d62a17ae 307 UNSET_FLAG(vrf->status, VRF_ACTIVE);
e5bf3e1e 308
d62a17ae 309 if (debug_vrf)
c7384cf8
DS
310 zlog_debug("VRF %s(%u) is to be disabled.", vrf->name,
311 vrf->vrf_id);
e5bf3e1e 312
d62a17ae 313 /* Till now, nothing to be done for the default VRF. */
314 // Pending: see why this statement.
e74f14fc 315
0cbee799
DS
316
317 /*
318 * When the vrf is disabled let's
319 * handle all nexthop-groups associated
320 * with this vrf
321 */
322 nexthop_group_disable_vrf(vrf);
323
d62a17ae 324 if (vrf_master.vrf_disable_hook)
325 (*vrf_master.vrf_disable_hook)(vrf);
e5bf3e1e
FL
326}
327
b7cfce93
MK
328const char *vrf_id_to_name(vrf_id_t vrf_id)
329{
330 struct vrf *vrf;
331
7c1119cb
CG
332 if (vrf_id == VRF_DEFAULT)
333 return VRF_DEFAULT_NAME;
334
b7cfce93 335 vrf = vrf_lookup_by_id(vrf_id);
bd47f3a3 336 return VRF_LOGNAME(vrf);
b7cfce93
MK
337}
338
b72ede27 339/* Look up the data pointer of the specified VRF. */
d62a17ae 340void *vrf_info_lookup(vrf_id_t vrf_id)
b72ede27 341{
d62a17ae 342 struct vrf *vrf = vrf_lookup_by_id(vrf_id);
343 return vrf ? vrf->info : NULL;
b72ede27
FL
344}
345
7076bb2f 346/*
4a8bf858 347 * VRF hash for storing set or not.
7076bb2f 348 */
4a8bf858
DS
349struct vrf_bit_set {
350 vrf_id_t vrf_id;
351 bool set;
352};
7076bb2f 353
d8b87afe 354static unsigned int vrf_hash_bitmap_key(const void *data)
4a8bf858 355{
d8b87afe 356 const struct vrf_bit_set *bit = data;
d62a17ae 357
4a8bf858
DS
358 return bit->vrf_id;
359}
d62a17ae 360
74df8d6d 361static bool vrf_hash_bitmap_cmp(const void *a, const void *b)
4a8bf858
DS
362{
363 const struct vrf_bit_set *bit1 = a;
364 const struct vrf_bit_set *bit2 = b;
d62a17ae 365
4a8bf858
DS
366 return bit1->vrf_id == bit2->vrf_id;
367}
368
369static void *vrf_hash_bitmap_alloc(void *data)
370{
371 struct vrf_bit_set *copy = data;
372 struct vrf_bit_set *bit;
373
374 bit = XMALLOC(MTYPE_VRF_BITMAP, sizeof(*bit));
375 bit->vrf_id = copy->vrf_id;
376
377 return bit;
378}
379
380static void vrf_hash_bitmap_free(void *data)
381{
382 struct vrf_bit_set *bit = data;
383
384 XFREE(MTYPE_VRF_BITMAP, bit);
385}
7076bb2f 386
d62a17ae 387vrf_bitmap_t vrf_bitmap_init(void)
7076bb2f 388{
4a8bf858
DS
389 return hash_create_size(32, vrf_hash_bitmap_key, vrf_hash_bitmap_cmp,
390 "VRF BIT HASH");
7076bb2f
FL
391}
392
d62a17ae 393void vrf_bitmap_free(vrf_bitmap_t bmap)
7076bb2f 394{
4a8bf858 395 struct hash *vrf_hash = bmap;
7076bb2f 396
d8bc11a5 397 hash_clean_and_free(&vrf_hash, vrf_hash_bitmap_free);
7076bb2f
FL
398}
399
d62a17ae 400void vrf_bitmap_set(vrf_bitmap_t bmap, vrf_id_t vrf_id)
7076bb2f 401{
4a8bf858
DS
402 struct vrf_bit_set lookup = { .vrf_id = vrf_id };
403 struct hash *vrf_hash = bmap;
404 struct vrf_bit_set *bit;
7076bb2f 405
4a8bf858 406 if (vrf_hash == NULL || vrf_id == VRF_UNKNOWN)
d62a17ae 407 return;
7076bb2f 408
4a8bf858
DS
409 bit = hash_get(vrf_hash, &lookup, vrf_hash_bitmap_alloc);
410 bit->set = true;
7076bb2f
FL
411}
412
d62a17ae 413void vrf_bitmap_unset(vrf_bitmap_t bmap, vrf_id_t vrf_id)
7076bb2f 414{
4a8bf858
DS
415 struct vrf_bit_set lookup = { .vrf_id = vrf_id };
416 struct hash *vrf_hash = bmap;
417 struct vrf_bit_set *bit;
7076bb2f 418
4a8bf858 419 if (vrf_hash == NULL || vrf_id == VRF_UNKNOWN)
d62a17ae 420 return;
7076bb2f 421
4a8bf858
DS
422 bit = hash_get(vrf_hash, &lookup, vrf_hash_bitmap_alloc);
423 bit->set = false;
7076bb2f
FL
424}
425
d62a17ae 426int vrf_bitmap_check(vrf_bitmap_t bmap, vrf_id_t vrf_id)
7076bb2f 427{
4a8bf858
DS
428 struct vrf_bit_set lookup = { .vrf_id = vrf_id };
429 struct hash *vrf_hash = bmap;
430 struct vrf_bit_set *bit;
7076bb2f 431
4a8bf858 432 if (vrf_hash == NULL || vrf_id == VRF_UNKNOWN)
d62a17ae 433 return 0;
7076bb2f 434
4a8bf858
DS
435 bit = hash_lookup(vrf_hash, &lookup);
436 if (bit)
437 return bit->set;
438
439 return 0;
7076bb2f
FL
440}
441
d62a17ae 442static void vrf_autocomplete(vector comps, struct cmd_token *token)
d617d5fe 443{
d62a17ae 444 struct vrf *vrf = NULL;
d617d5fe 445
723001fc
PG
446 RB_FOREACH (vrf, vrf_name_head, &vrfs_by_name)
447 vector_set(comps, XSTRDUP(MTYPE_COMPLETION, vrf->name));
d617d5fe
DS
448}
449
450static const struct cmd_variable_handler vrf_var_handlers[] = {
d62a17ae 451 {
452 .varname = "vrf",
453 .completions = vrf_autocomplete,
454 },
e429a2a0
IR
455 {
456 .varname = "vrf_name",
457 .completions = vrf_autocomplete,
458 },
459 {
460 .varname = "nexthop_vrf",
461 .completions = vrf_autocomplete,
462 },
d62a17ae 463 {.completions = NULL},
d617d5fe
DS
464};
465
b72ede27 466/* Initialize VRF module. */
d62a17ae 467void vrf_init(int (*create)(struct vrf *), int (*enable)(struct vrf *),
ac2cb9bf 468 int (*disable)(struct vrf *), int (*destroy)(struct vrf *))
d62a17ae 469{
470 struct vrf *default_vrf;
471
e26aedbe
PG
472 /* initialise NS, in case VRF backend if NETNS */
473 ns_init();
d62a17ae 474 if (debug_vrf)
15569c58 475 zlog_debug("%s: Initializing VRF subsystem", __func__);
d62a17ae 476
477 vrf_master.vrf_new_hook = create;
478 vrf_master.vrf_enable_hook = enable;
479 vrf_master.vrf_disable_hook = disable;
d01b92fd 480 vrf_master.vrf_delete_hook = destroy;
d62a17ae 481
482 /* The default VRF always exists. */
eb6934d5 483 default_vrf = vrf_get(VRF_DEFAULT, VRF_DEFAULT_NAME);
d62a17ae 484 if (!default_vrf) {
450971aa 485 flog_err(EC_LIB_VRF_START,
1c50c1c0 486 "vrf_init: failed to create the default VRF!");
d62a17ae 487 exit(1);
488 }
20c87e98
TC
489 if (vrf_is_backend_netns()) {
490 struct ns *ns;
491
fdafe17e 492 strlcpy(default_vrf->data.l.netns_name,
eb6934d5 493 VRF_DEFAULT_NAME, NS_NAMSIZ);
1eb92f06 494 ns = ns_lookup(NS_DEFAULT);
c3568c4d
TC
495 ns->vrf_ctxt = default_vrf;
496 default_vrf->ns_ctxt = ns;
20c87e98 497 }
d62a17ae 498
499 /* Enable the default VRF. */
500 if (!vrf_enable(default_vrf)) {
450971aa 501 flog_err(EC_LIB_VRF_START,
1c50c1c0 502 "vrf_init: failed to enable the default VRF!");
d62a17ae 503 exit(1);
504 }
505
506 cmd_variable_handler_register(vrf_var_handlers);
b72ede27
FL
507}
508
ea0d70b1
SW
509static void vrf_terminate_single(struct vrf *vrf)
510{
511 /* Clear configured flag and invoke delete. */
b14fa9c4 512 vrf_disable(vrf);
ea0d70b1 513 UNSET_FLAG(vrf->status, VRF_CONFIGURED);
f60a1188 514 if_terminate(vrf);
ce27a13e 515 vrf_delete(vrf);
ea0d70b1
SW
516}
517
b72ede27 518/* Terminate VRF module. */
d62a17ae 519void vrf_terminate(void)
b72ede27 520{
ea0d70b1 521 struct vrf *vrf, *tmp;
b72ede27 522
d62a17ae 523 if (debug_vrf)
15569c58 524 zlog_debug("%s: Shutting down vrf subsystem", __func__);
19dc275e 525
ea0d70b1
SW
526 RB_FOREACH_SAFE (vrf, vrf_id_head, &vrfs_by_id, tmp) {
527 if (vrf->vrf_id == VRF_DEFAULT)
528 continue;
55cd0f61 529
ea0d70b1 530 vrf_terminate_single(vrf);
65c3a7c4 531 }
55cd0f61 532
ea0d70b1
SW
533 RB_FOREACH_SAFE (vrf, vrf_name_head, &vrfs_by_name, tmp) {
534 if (vrf->vrf_id == VRF_DEFAULT)
535 continue;
55cd0f61 536
ea0d70b1 537 vrf_terminate_single(vrf);
65c3a7c4 538 }
ea0d70b1
SW
539
540 /* Finally terminate default VRF */
541 vrf = vrf_lookup_by_id(VRF_DEFAULT);
b8984d4e
DL
542 if (vrf)
543 vrf_terminate_single(vrf);
b72ede27
FL
544}
545
0f4977c6 546int vrf_socket(int domain, int type, int protocol, vrf_id_t vrf_id,
02fe07c7 547 const char *interfacename)
e5bf3e1e 548{
2e0d2b3d 549 int ret, save_errno, ret2;
e5bf3e1e 550
2e0d2b3d
PG
551 ret = vrf_switch_to_netns(vrf_id);
552 if (ret < 0)
450971aa 553 flog_err_sys(EC_LIB_SOCKET, "%s: Can't switch to VRF %u (%s)",
09c866e3 554 __func__, vrf_id, safe_strerror(errno));
b66d022e 555
d62a17ae 556 ret = socket(domain, type, protocol);
2e0d2b3d
PG
557 save_errno = errno;
558 ret2 = vrf_switchback_to_initial();
559 if (ret2 < 0)
450971aa 560 flog_err_sys(EC_LIB_SOCKET,
09c866e3
QY
561 "%s: Can't switchback from VRF %u (%s)", __func__,
562 vrf_id, safe_strerror(errno));
2e0d2b3d 563 errno = save_errno;
0f4977c6
PG
564 if (ret <= 0)
565 return ret;
566 ret2 = vrf_bind(vrf_id, ret, interfacename);
567 if (ret2 < 0) {
568 close(ret);
569 ret = ret2;
570 }
d62a17ae 571 return ret;
e5bf3e1e
FL
572}
573
78dd30b2
PG
574int vrf_is_backend_netns(void)
575{
576 return (vrf_backend == VRF_BACKEND_NETNS);
577}
578
579int vrf_get_backend(void)
580{
72261ecd
PG
581 if (!vrf_backend_configured)
582 return VRF_BACKEND_UNKNOWN;
78dd30b2
PG
583 return vrf_backend;
584}
585
7239d3d9 586int vrf_configure_backend(enum vrf_backend_type backend)
78dd30b2 587{
f7d45925
QY
588 /* Work around issue in old gcc */
589 switch (backend) {
590 case VRF_BACKEND_UNKNOWN:
591 case VRF_BACKEND_NETNS:
592 case VRF_BACKEND_VRF_LITE:
593 break;
bde30e78 594 case VRF_BACKEND_MAX:
7239d3d9 595 return -1;
f7d45925 596 }
7239d3d9
QY
597
598 vrf_backend = backend;
72261ecd 599 vrf_backend_configured = 1;
7239d3d9
QY
600
601 return 0;
78dd30b2
PG
602}
603
697d3ec7 604/* vrf CLI commands */
16d6ea59
QY
605DEFUN_NOSH(vrf_exit,
606 vrf_exit_cmd,
607 "exit-vrf",
608 "Exit current mode and down to previous mode\n")
609{
799a81df 610 cmd_exit(vty);
16d6ea59
QY
611 return CMD_SUCCESS;
612}
613
ca77b518 614DEFUN_YANG_NOSH (vrf,
697d3ec7
PG
615 vrf_cmd,
616 "vrf NAME",
617 "Select a VRF to configure\n"
618 "VRF's name\n")
619{
620 int idx_name = 1;
621 const char *vrfname = argv[idx_name]->arg;
62d89c64
IR
622 char xpath_list[XPATH_MAXLEN];
623 struct vrf *vrf;
624 int ret;
697d3ec7 625
62d89c64
IR
626 if (strlen(vrfname) > VRF_NAMSIZ) {
627 vty_out(vty,
628 "%% VRF name %s invalid: length exceeds %d bytes\n",
629 vrfname, VRF_NAMSIZ);
630 return CMD_WARNING_CONFIG_FAILED;
631 }
632
633 snprintf(xpath_list, sizeof(xpath_list), FRR_VRF_KEY_XPATH, vrfname);
634
635 nb_cli_enqueue_change(vty, xpath_list, NB_OP_CREATE, NULL);
ae08de9f 636 ret = nb_cli_apply_changes_clear_pending(vty, "%s", xpath_list);
62d89c64
IR
637 if (ret == CMD_SUCCESS) {
638 VTY_PUSH_XPATH(VRF_NODE, xpath_list);
639 vrf = vrf_lookup_by_name(vrfname);
640 if (vrf)
641 VTY_PUSH_CONTEXT(VRF_NODE, vrf);
642 }
643
644 return ret;
697d3ec7
PG
645}
646
ca77b518 647DEFUN_YANG (no_vrf,
34c46274
RW
648 no_vrf_cmd,
649 "no vrf NAME",
650 NO_STR
651 "Delete a pseudo VRF's configuration\n"
652 "VRF's name\n")
f30c50b9 653{
d62a17ae 654 const char *vrfname = argv[2]->arg;
8b4cb7a6 655 char xpath_list[XPATH_MAXLEN];
53dc2b05 656
d62a17ae 657 struct vrf *vrfp;
f30c50b9 658
d62a17ae 659 vrfp = vrf_lookup_by_name(vrfname);
f30c50b9 660
cd980d03
IR
661 if (vrfp == NULL)
662 return CMD_SUCCESS;
f30c50b9 663
d62a17ae 664 if (CHECK_FLAG(vrfp->status, VRF_ACTIVE)) {
665 vty_out(vty, "%% Only inactive VRFs can be deleted\n");
666 return CMD_WARNING_CONFIG_FAILED;
667 }
f30c50b9 668
f5eef2d5
IR
669 if (vrf_get_backend() == VRF_BACKEND_VRF_LITE) {
670 /*
574445ec 671 * Remove the VRF interface config when removing the VRF.
f5eef2d5
IR
672 */
673 snprintf(xpath_list, sizeof(xpath_list),
574445ec 674 "/frr-interface:lib/interface[name='%s']", vrfname);
f5eef2d5
IR
675 nb_cli_enqueue_change(vty, xpath_list, NB_OP_DESTROY, NULL);
676 }
677
09b150ef 678 snprintf(xpath_list, sizeof(xpath_list), FRR_VRF_KEY_XPATH, vrfname);
f30c50b9 679
8b4cb7a6 680 nb_cli_enqueue_change(vty, xpath_list, NB_OP_DESTROY, NULL);
f5eef2d5 681 return nb_cli_apply_changes(vty, NULL);
f30c50b9
RW
682}
683
53dc2b05 684
62b346ee 685static struct cmd_node vrf_node = {
f4b8291f 686 .name = "vrf",
62b346ee 687 .node = VRF_NODE,
24389580 688 .parent_node = CONFIG_NODE,
62b346ee 689 .prompt = "%s(config-vrf)# ",
62b346ee 690};
7ddcfca4 691
19dc275e
DS
692/*
693 * Debug CLI for vrf's
694 */
695DEFUN (vrf_debug,
696 vrf_debug_cmd,
697 "debug vrf",
698 DEBUG_STR
699 "VRF Debugging\n")
700{
d62a17ae 701 debug_vrf = 1;
19dc275e 702
d62a17ae 703 return CMD_SUCCESS;
19dc275e
DS
704}
705
706DEFUN (no_vrf_debug,
707 no_vrf_debug_cmd,
708 "no debug vrf",
709 NO_STR
710 DEBUG_STR
711 "VRF Debugging\n")
712{
d62a17ae 713 debug_vrf = 0;
19dc275e 714
d62a17ae 715 return CMD_SUCCESS;
19dc275e
DS
716}
717
d62a17ae 718static int vrf_write_host(struct vty *vty)
19dc275e 719{
d62a17ae 720 if (debug_vrf)
721 vty_out(vty, "debug vrf\n");
19dc275e 722
d62a17ae 723 return 1;
19dc275e
DS
724}
725
612c2c15 726static int vrf_write_host(struct vty *vty);
62b346ee 727static struct cmd_node vrf_debug_node = {
f4b8291f 728 .name = "vrf debug",
62b346ee
DL
729 .node = VRF_DEBUG_NODE,
730 .prompt = "",
612c2c15 731 .config_write = vrf_write_host,
62b346ee 732};
19dc275e 733
d62a17ae 734void vrf_install_commands(void)
19dc275e 735{
612c2c15 736 install_node(&vrf_debug_node);
19dc275e 737
d62a17ae 738 install_element(CONFIG_NODE, &vrf_debug_cmd);
739 install_element(ENABLE_NODE, &vrf_debug_cmd);
740 install_element(CONFIG_NODE, &no_vrf_debug_cmd);
741 install_element(ENABLE_NODE, &no_vrf_debug_cmd);
19dc275e 742}
53dc2b05 743
cfc369c4 744void vrf_cmd_init(int (*writefunc)(struct vty *vty))
7ddcfca4 745{
d62a17ae 746 install_element(CONFIG_NODE, &vrf_cmd);
747 install_element(CONFIG_NODE, &no_vrf_cmd);
612c2c15
DL
748 vrf_node.config_write = writefunc;
749 install_node(&vrf_node);
d62a17ae 750 install_default(VRF_NODE);
16d6ea59 751 install_element(VRF_NODE, &vrf_exit_cmd);
19dc275e 752}
ec31f30d 753
ac2cb9bf 754void vrf_set_default_name(const char *default_name)
ec31f30d 755{
c200f5e1 756 snprintf(vrf_default_name, VRF_NAMSIZ, "%s", default_name);
c200f5e1
PG
757}
758
759const char *vrf_get_default_name(void)
760{
761 return vrf_default_name;
762}
763
36eef858 764int vrf_bind(vrf_id_t vrf_id, int fd, const char *ifname)
0f4977c6
PG
765{
766 int ret = 0;
91f854f6 767 struct interface *ifp;
36eef858
IR
768 struct vrf *vrf;
769
770 if (fd < 0)
771 return -1;
772
773 if (vrf_id == VRF_UNKNOWN)
774 return -1;
775
776 /* can't bind to a VRF that doesn't exist */
777 vrf = vrf_lookup_by_id(vrf_id);
778 if (!vrf_is_enabled(vrf))
779 return -1;
780
781 if (ifname && strcmp(ifname, vrf->name)) {
782 /* binding to a regular interface */
783
784 /* can't bind to an interface that doesn't exist */
785 ifp = if_lookup_by_name(ifname, vrf_id);
786 if (!ifp)
787 return -1;
788 } else {
789 /* binding to a VRF device */
790
791 /* nothing to do for netns */
792 if (vrf_is_backend_netns())
793 return 0;
794
795 /* nothing to do for default vrf */
796 if (vrf_id == VRF_DEFAULT)
797 return 0;
798
799 ifname = vrf->name;
800 }
0f4977c6 801
0f4977c6 802#ifdef SO_BINDTODEVICE
36eef858
IR
803 ret = setsockopt(fd, SOL_SOCKET, SO_BINDTODEVICE, ifname,
804 strlen(ifname) + 1);
0f4977c6 805 if (ret < 0)
36eef858
IR
806 zlog_err("bind to interface %s failed, errno=%d", ifname,
807 errno);
0f4977c6
PG
808#endif /* SO_BINDTODEVICE */
809 return ret;
810}
2e0d2b3d 811int vrf_getaddrinfo(const char *node, const char *service,
996c9314
LB
812 const struct addrinfo *hints, struct addrinfo **res,
813 vrf_id_t vrf_id)
2e0d2b3d
PG
814{
815 int ret, ret2, save_errno;
816
817 ret = vrf_switch_to_netns(vrf_id);
818 if (ret < 0)
450971aa 819 flog_err_sys(EC_LIB_SOCKET, "%s: Can't switch to VRF %u (%s)",
09c866e3 820 __func__, vrf_id, safe_strerror(errno));
2e0d2b3d
PG
821 ret = getaddrinfo(node, service, hints, res);
822 save_errno = errno;
823 ret2 = vrf_switchback_to_initial();
824 if (ret2 < 0)
450971aa 825 flog_err_sys(EC_LIB_SOCKET,
09c866e3
QY
826 "%s: Can't switchback from VRF %u (%s)", __func__,
827 vrf_id, safe_strerror(errno));
2e0d2b3d
PG
828 errno = save_errno;
829 return ret;
830}
831
516d7591
PG
832int vrf_ioctl(vrf_id_t vrf_id, int d, unsigned long request, char *params)
833{
834 int ret, saved_errno, rc;
835
836 ret = vrf_switch_to_netns(vrf_id);
837 if (ret < 0) {
450971aa 838 flog_err_sys(EC_LIB_SOCKET, "%s: Can't switch to VRF %u (%s)",
09c866e3 839 __func__, vrf_id, safe_strerror(errno));
516d7591
PG
840 return 0;
841 }
842 rc = ioctl(d, request, params);
843 saved_errno = errno;
844 ret = vrf_switchback_to_initial();
845 if (ret < 0)
450971aa 846 flog_err_sys(EC_LIB_SOCKET,
09c866e3
QY
847 "%s: Can't switchback from VRF %u (%s)", __func__,
848 vrf_id, safe_strerror(errno));
516d7591
PG
849 errno = saved_errno;
850 return rc;
851}
852
0f4977c6 853int vrf_sockunion_socket(const union sockunion *su, vrf_id_t vrf_id,
02fe07c7 854 const char *interfacename)
2e0d2b3d
PG
855{
856 int ret, save_errno, ret2;
857
858 ret = vrf_switch_to_netns(vrf_id);
859 if (ret < 0)
450971aa 860 flog_err_sys(EC_LIB_SOCKET, "%s: Can't switch to VRF %u (%s)",
09c866e3 861 __func__, vrf_id, safe_strerror(errno));
2e0d2b3d
PG
862 ret = sockunion_socket(su);
863 save_errno = errno;
864 ret2 = vrf_switchback_to_initial();
865 if (ret2 < 0)
450971aa 866 flog_err_sys(EC_LIB_SOCKET,
09c866e3
QY
867 "%s: Can't switchback from VRF %u (%s)", __func__,
868 vrf_id, safe_strerror(errno));
2e0d2b3d 869 errno = save_errno;
0f4977c6
PG
870
871 if (ret <= 0)
872 return ret;
873 ret2 = vrf_bind(vrf_id, ret, interfacename);
874 if (ret2 < 0) {
875 close(ret);
876 ret = ret2;
877 }
2e0d2b3d
PG
878 return ret;
879}
0b014ea6 880
bc867a5d
CS
881/* ------- Northbound callbacks ------- */
882
883/*
884 * XPath: /frr-vrf:lib/vrf
885 */
60ee8be1 886static int lib_vrf_create(struct nb_cb_create_args *args)
bc867a5d
CS
887{
888 const char *vrfname;
889 struct vrf *vrfp;
890
60ee8be1 891 vrfname = yang_dnode_get_string(args->dnode, "./name");
bc867a5d 892
60ee8be1 893 if (args->event != NB_EV_APPLY)
bc867a5d
CS
894 return NB_OK;
895
896 vrfp = vrf_get(VRF_UNKNOWN, vrfname);
897
b9b794db 898 SET_FLAG(vrfp->status, VRF_CONFIGURED);
60ee8be1 899 nb_running_set_entry(args->dnode, vrfp);
bc867a5d
CS
900
901 return NB_OK;
902}
903
60ee8be1 904static int lib_vrf_destroy(struct nb_cb_destroy_args *args)
bc867a5d
CS
905{
906 struct vrf *vrfp;
907
60ee8be1 908 switch (args->event) {
bc867a5d 909 case NB_EV_VALIDATE:
60ee8be1 910 vrfp = nb_running_get_entry(args->dnode, NULL, true);
bc867a5d 911 if (CHECK_FLAG(vrfp->status, VRF_ACTIVE)) {
10bdc68f
RW
912 snprintf(args->errmsg, args->errmsg_len,
913 "Only inactive VRFs can be deleted");
bc867a5d
CS
914 return NB_ERR_VALIDATION;
915 }
916 break;
917 case NB_EV_PREPARE:
918 case NB_EV_ABORT:
919 break;
920 case NB_EV_APPLY:
60ee8be1 921 vrfp = nb_running_unset_entry(args->dnode);
8b4cb7a6 922
bc867a5d 923 /* Clear configured flag and invoke delete. */
b9b794db 924 UNSET_FLAG(vrfp->status, VRF_CONFIGURED);
bc867a5d
CS
925 vrf_delete(vrfp);
926 break;
927 }
928
929 return NB_OK;
930}
931
60ee8be1 932static const void *lib_vrf_get_next(struct nb_cb_get_next_args *args)
bc867a5d 933{
60ee8be1 934 struct vrf *vrfp = (struct vrf *)args->list_entry;
bc867a5d 935
60ee8be1 936 if (args->list_entry == NULL) {
bc867a5d
CS
937 vrfp = RB_MIN(vrf_name_head, &vrfs_by_name);
938 } else {
939 vrfp = RB_NEXT(vrf_name_head, vrfp);
940 }
941
942 return vrfp;
943}
944
60ee8be1 945static int lib_vrf_get_keys(struct nb_cb_get_keys_args *args)
bc867a5d 946{
60ee8be1 947 struct vrf *vrfp = (struct vrf *)args->list_entry;
bc867a5d 948
60ee8be1
RW
949 args->keys->num = 1;
950 strlcpy(args->keys->key[0], vrfp->name, sizeof(args->keys->key[0]));
bc867a5d
CS
951
952 return NB_OK;
953}
954
60ee8be1 955static const void *lib_vrf_lookup_entry(struct nb_cb_lookup_entry_args *args)
bc867a5d 956{
60ee8be1 957 const char *vrfname = args->keys->key[0];
bc867a5d
CS
958
959 struct vrf *vrf = vrf_lookup_by_name(vrfname);
960
961 return vrf;
962}
963
964/*
965 * XPath: /frr-vrf:lib/vrf/id
966 */
60ee8be1
RW
967static struct yang_data *
968lib_vrf_state_id_get_elem(struct nb_cb_get_elem_args *args)
bc867a5d 969{
60ee8be1 970 struct vrf *vrfp = (struct vrf *)args->list_entry;
bc867a5d 971
60ee8be1 972 return yang_data_new_uint32(args->xpath, vrfp->vrf_id);
bc867a5d
CS
973}
974
975/*
976 * XPath: /frr-vrf:lib/vrf/active
977 */
60ee8be1
RW
978static struct yang_data *
979lib_vrf_state_active_get_elem(struct nb_cb_get_elem_args *args)
bc867a5d 980{
60ee8be1 981 struct vrf *vrfp = (struct vrf *)args->list_entry;
bc867a5d
CS
982
983 if (vrfp->status == VRF_ACTIVE)
ff9232c8 984 return yang_data_new_bool(args->xpath, true);
bc867a5d
CS
985
986 return NULL;
987}
988
989/* clang-format off */
990const struct frr_yang_module_info frr_vrf_info = {
991 .name = "frr-vrf",
992 .nodes = {
993 {
994 .xpath = "/frr-vrf:lib/vrf",
995 .cbs = {
996 .create = lib_vrf_create,
997 .destroy = lib_vrf_destroy,
998 .get_next = lib_vrf_get_next,
999 .get_keys = lib_vrf_get_keys,
1000 .lookup_entry = lib_vrf_lookup_entry,
3bb513c3
CH
1001 },
1002 .priority = NB_DFLT_PRIORITY - 2,
bc867a5d
CS
1003 },
1004 {
1005 .xpath = "/frr-vrf:lib/vrf/state/id",
1006 .cbs = {
1007 .get_elem = lib_vrf_state_id_get_elem,
1008 }
1009 },
1010 {
1011 .xpath = "/frr-vrf:lib/vrf/state/active",
1012 .cbs = {
1013 .get_elem = lib_vrf_state_active_get_elem,
1014 }
1015 },
1016 {
1017 .xpath = NULL,
1018 },
1019 }
1020};
1021