]> git.proxmox.com Git - mirror_frr.git/blame - zebra/rt_netlink.c
zebra: Free the nhe dataplane ctx always
[mirror_frr.git] / zebra / rt_netlink.c
CommitLineData
718e3744 1/* Kernel routing table updates using netlink over GNU/Linux system.
2 * Copyright (C) 1997, 98, 99 Kunihiro Ishiguro
3 *
4 * This file is part of GNU Zebra.
5 *
6 * GNU Zebra is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the
8 * Free Software Foundation; either version 2, or (at your option) any
9 * later version.
10 *
11 * GNU Zebra is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * General Public License for more details.
15 *
896014f4
DL
16 * You should have received a copy of the GNU General Public License along
17 * with this program; see the file COPYING; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
718e3744 19 */
20
21#include <zebra.h>
ddfeb486
DL
22
23#ifdef HAVE_NETLINK
24
8ccc7e80 25#include <net/if_arp.h>
ba777396
RW
26#include <linux/lwtunnel.h>
27#include <linux/mpls_iptunnel.h>
28#include <linux/neighbour.h>
29#include <linux/rtnetlink.h>
d9f5b2f5 30#include <linux/nexthop.h>
718e3744 31
32/* Hack for GNU libc version 2. */
33#ifndef MSG_TRUNC
34#define MSG_TRUNC 0x20
35#endif /* MSG_TRUNC */
36
37#include "linklist.h"
38#include "if.h"
39#include "log.h"
40#include "prefix.h"
41#include "connected.h"
42#include "table.h"
26e2ae36 43#include "memory.h"
4a1ab8e4 44#include "zebra_memory.h"
718e3744 45#include "rib.h"
e04ab74d 46#include "thread.h"
edd7c245 47#include "privs.h"
fb018d25 48#include "nexthop.h"
78104b9b 49#include "vrf.h"
5e6a74d8 50#include "vty.h"
40c7bdb0 51#include "mpls.h"
13d60d35 52#include "vxlan.h"
718e3744 53
bf094f69 54#include "zebra/zapi_msg.h"
fe18ee2d 55#include "zebra/zebra_ns.h"
7c551956 56#include "zebra/zebra_vrf.h"
6621ca86 57#include "zebra/rt.h"
718e3744 58#include "zebra/redistribute.h"
59#include "zebra/interface.h"
60#include "zebra/debug.h"
12f6fb97 61#include "zebra/rtadv.h"
567b877d 62#include "zebra/zebra_ptm.h"
40c7bdb0 63#include "zebra/zebra_mpls.h"
1fdc9eae 64#include "zebra/kernel_netlink.h"
65#include "zebra/rt_netlink.h"
d9f5b2f5 66#include "zebra/zebra_nhg.h"
e3be0432 67#include "zebra/zebra_mroute.h"
2232a77c 68#include "zebra/zebra_vxlan.h"
364fed6b 69#include "zebra/zebra_errors.h"
e3be0432 70
40c7bdb0 71#ifndef AF_MPLS
72#define AF_MPLS 28
73#endif
74
2232a77c 75static vlanid_t filter_vlan = 0;
76
d62a17ae 77struct gw_family_t {
d7c0a89a
QY
78 uint16_t filler;
79 uint16_t family;
d62a17ae 80 union g_addr gate;
40c7bdb0 81};
82
8755598a
DS
83char ipv4_ll_buf[16] = "169.254.0.1";
84struct in_addr ipv4_ll;
85
86/*
87 * The ipv4_ll data structure is used for all 5549
88 * additions to the kernel. Let's figure out the
89 * correct value one time instead for every
90 * install/remove of a 5549 type route
91 */
d62a17ae 92void rt_netlink_init(void)
8755598a 93{
d62a17ae 94 inet_pton(AF_INET, ipv4_ll_buf, &ipv4_ll);
8755598a
DS
95}
96
931fa60c
MS
97/*
98 * Mapping from dataplane neighbor flags to netlink flags
99 */
100static uint8_t neigh_flags_to_netlink(uint8_t dplane_flags)
101{
102 uint8_t flags = 0;
103
104 if (dplane_flags & DPLANE_NTF_EXT_LEARNED)
105 flags |= NTF_EXT_LEARNED;
106 if (dplane_flags & DPLANE_NTF_ROUTER)
107 flags |= NTF_ROUTER;
108
109 return flags;
110}
111
112/*
113 * Mapping from dataplane neighbor state to netlink state
114 */
115static uint16_t neigh_state_to_netlink(uint16_t dplane_state)
116{
117 uint16_t state = 0;
118
119 if (dplane_state & DPLANE_NUD_REACHABLE)
120 state |= NUD_REACHABLE;
121 if (dplane_state & DPLANE_NUD_STALE)
122 state |= NUD_STALE;
123 if (dplane_state & DPLANE_NUD_NOARP)
124 state |= NUD_NOARP;
125 if (dplane_state & DPLANE_NUD_PROBE)
126 state |= NUD_PROBE;
127
128 return state;
129}
130
131
23b1f334
DD
132static inline int is_selfroute(int proto)
133{
d62a17ae 134 if ((proto == RTPROT_BGP) || (proto == RTPROT_OSPF)
d4d71f11 135 || (proto == RTPROT_ZSTATIC) || (proto == RTPROT_ZEBRA)
d62a17ae 136 || (proto == RTPROT_ISIS) || (proto == RTPROT_RIPNG)
137 || (proto == RTPROT_NHRP) || (proto == RTPROT_EIGRP)
915902cb 138 || (proto == RTPROT_LDP) || (proto == RTPROT_BABEL)
0761368a 139 || (proto == RTPROT_RIP) || (proto == RTPROT_SHARP)
da82f6b4 140 || (proto == RTPROT_PBR) || (proto == RTPROT_OPENFABRIC)) {
d62a17ae 141 return 1;
142 }
143
144 return 0;
23b1f334
DD
145}
146
915902cb 147static inline int zebra2proto(int proto)
23b1f334 148{
d62a17ae 149 switch (proto) {
150 case ZEBRA_ROUTE_BABEL:
151 proto = RTPROT_BABEL;
152 break;
153 case ZEBRA_ROUTE_BGP:
154 proto = RTPROT_BGP;
155 break;
156 case ZEBRA_ROUTE_OSPF:
157 case ZEBRA_ROUTE_OSPF6:
158 proto = RTPROT_OSPF;
159 break;
160 case ZEBRA_ROUTE_STATIC:
d4d71f11 161 proto = RTPROT_ZSTATIC;
d62a17ae 162 break;
163 case ZEBRA_ROUTE_ISIS:
164 proto = RTPROT_ISIS;
165 break;
166 case ZEBRA_ROUTE_RIP:
167 proto = RTPROT_RIP;
168 break;
169 case ZEBRA_ROUTE_RIPNG:
170 proto = RTPROT_RIPNG;
171 break;
172 case ZEBRA_ROUTE_NHRP:
173 proto = RTPROT_NHRP;
174 break;
175 case ZEBRA_ROUTE_EIGRP:
176 proto = RTPROT_EIGRP;
177 break;
178 case ZEBRA_ROUTE_LDP:
179 proto = RTPROT_LDP;
180 break;
8a71d93d
DS
181 case ZEBRA_ROUTE_SHARP:
182 proto = RTPROT_SHARP;
183 break;
0761368a
DS
184 case ZEBRA_ROUTE_PBR:
185 proto = RTPROT_PBR;
186 break;
da82f6b4
CF
187 case ZEBRA_ROUTE_OPENFABRIC:
188 proto = RTPROT_OPENFABRIC;
189 break;
a56ec5c0
DS
190 case ZEBRA_ROUTE_TABLE:
191 proto = RTPROT_ZEBRA;
192 break;
d62a17ae 193 default:
0761368a
DS
194 /*
195 * When a user adds a new protocol this will show up
196 * to let them know to do something about it. This
197 * is intentionally a warn because we should see
198 * this as part of development of a new protocol
199 */
9df414fe
QY
200 zlog_debug(
201 "%s: Please add this protocol(%d) to proper rt_netlink.c handling",
202 __PRETTY_FUNCTION__, proto);
d62a17ae 203 proto = RTPROT_ZEBRA;
204 break;
205 }
206
207 return proto;
23b1f334
DD
208}
209
915902cb
DS
210static inline int proto2zebra(int proto, int family)
211{
212 switch (proto) {
213 case RTPROT_BABEL:
214 proto = ZEBRA_ROUTE_BABEL;
215 break;
216 case RTPROT_BGP:
217 proto = ZEBRA_ROUTE_BGP;
218 break;
219 case RTPROT_OSPF:
996c9314
LB
220 proto = (family == AFI_IP) ? ZEBRA_ROUTE_OSPF
221 : ZEBRA_ROUTE_OSPF6;
915902cb
DS
222 break;
223 case RTPROT_ISIS:
224 proto = ZEBRA_ROUTE_ISIS;
225 break;
226 case RTPROT_RIP:
227 proto = ZEBRA_ROUTE_RIP;
228 break;
229 case RTPROT_RIPNG:
230 proto = ZEBRA_ROUTE_RIPNG;
231 break;
232 case RTPROT_NHRP:
233 proto = ZEBRA_ROUTE_NHRP;
234 break;
235 case RTPROT_EIGRP:
236 proto = ZEBRA_ROUTE_EIGRP;
237 break;
238 case RTPROT_LDP:
239 proto = ZEBRA_ROUTE_LDP;
240 break;
241 case RTPROT_STATIC:
d4d71f11 242 case RTPROT_ZSTATIC:
915902cb
DS
243 proto = ZEBRA_ROUTE_STATIC;
244 break;
0761368a
DS
245 case RTPROT_SHARP:
246 proto = ZEBRA_ROUTE_SHARP;
247 break;
248 case RTPROT_PBR:
249 proto = ZEBRA_ROUTE_PBR;
250 break;
da82f6b4
CF
251 case RTPROT_OPENFABRIC:
252 proto = ZEBRA_ROUTE_OPENFABRIC;
253 break;
915902cb 254 default:
0761368a
DS
255 /*
256 * When a user adds a new protocol this will show up
257 * to let them know to do something about it. This
258 * is intentionally a warn because we should see
259 * this as part of development of a new protocol
260 */
9df414fe
QY
261 zlog_debug(
262 "%s: Please add this protocol(%d) to proper rt_netlink.c handling",
263 __PRETTY_FUNCTION__, proto);
915902cb
DS
264 proto = ZEBRA_ROUTE_KERNEL;
265 break;
266 }
267 return proto;
268}
269
12f6fb97
DS
270/*
271Pending: create an efficient table_id (in a tree/hash) based lookup)
272 */
d7c0a89a 273static vrf_id_t vrf_lookup_by_table(uint32_t table_id, ns_id_t ns_id)
12f6fb97 274{
d62a17ae 275 struct vrf *vrf;
276 struct zebra_vrf *zvrf;
12f6fb97 277
a2addae8 278 RB_FOREACH (vrf, vrf_id_head, &vrfs_by_id) {
78dd30b2
PG
279 zvrf = vrf->info;
280 if (zvrf == NULL)
d62a17ae 281 continue;
78dd30b2
PG
282 /* case vrf with netns : match the netnsid */
283 if (vrf_is_backend_netns()) {
284 if (ns_id == zvrf_id(zvrf))
285 return zvrf_id(zvrf);
286 } else {
287 /* VRF is VRF_BACKEND_VRF_LITE */
288 if (zvrf->table_id != table_id)
289 continue;
290 return zvrf_id(zvrf);
291 }
d62a17ae 292 }
12f6fb97 293
d62a17ae 294 return VRF_DEFAULT;
12f6fb97
DS
295}
296
87da6a60
SW
297/**
298 * @parse_encap_mpls() - Parses encapsulated mpls attributes
299 * @tb: Pointer to rtattr to look for nested items in.
300 * @labels: Pointer to store labels in.
301 *
302 * Return: Number of mpls labels found.
303 */
304static int parse_encap_mpls(struct rtattr *tb, mpls_label_t *labels)
305{
306 struct rtattr *tb_encap[MPLS_IPTUNNEL_MAX + 1] = {0};
307 mpls_lse_t *lses = NULL;
308 int num_labels = 0;
309 uint32_t ttl = 0;
310 uint32_t bos = 0;
311 uint32_t exp = 0;
312 mpls_label_t label = 0;
313
314 netlink_parse_rtattr_nested(tb_encap, MPLS_IPTUNNEL_MAX, tb);
315 lses = (mpls_lse_t *)RTA_DATA(tb_encap[MPLS_IPTUNNEL_DST]);
316 while (!bos && num_labels < MPLS_MAX_LABELS) {
317 mpls_lse_decode(lses[num_labels], &label, &ttl, &exp, &bos);
318 labels[num_labels++] = label;
319 }
320
321 return num_labels;
322}
323
77a44d94
SW
324static struct nexthop
325parse_nexthop_unicast(ns_id_t ns_id, struct rtmsg *rtm, struct rtattr **tb,
326 enum blackhole_type bh_type, int index, void *prefsrc,
20822f9d 327 void *gate, afi_t afi, vrf_id_t vrf_id)
77a44d94
SW
328{
329 struct interface *ifp = NULL;
330 struct nexthop nh = {0};
331 mpls_label_t labels[MPLS_MAX_LABELS] = {0};
332 int num_labels = 0;
333
20822f9d 334 vrf_id_t nh_vrf_id = vrf_id;
77a44d94
SW
335 size_t sz = (afi == AFI_IP) ? 4 : 16;
336
337 if (bh_type == BLACKHOLE_UNSPEC) {
338 if (index && !gate)
339 nh.type = NEXTHOP_TYPE_IFINDEX;
340 else if (index && gate)
341 nh.type = (afi == AFI_IP) ? NEXTHOP_TYPE_IPV4_IFINDEX
342 : NEXTHOP_TYPE_IPV6_IFINDEX;
343 else if (!index && gate)
344 nh.type = (afi == AFI_IP) ? NEXTHOP_TYPE_IPV4
345 : NEXTHOP_TYPE_IPV6;
346 else {
347 nh.type = NEXTHOP_TYPE_BLACKHOLE;
348 nh.bh_type = bh_type;
349 }
350 } else {
351 nh.type = NEXTHOP_TYPE_BLACKHOLE;
352 nh.bh_type = bh_type;
353 }
354 nh.ifindex = index;
355 if (prefsrc)
356 memcpy(&nh.src, prefsrc, sz);
357 if (gate)
358 memcpy(&nh.gate, gate, sz);
359
360 if (index) {
361 ifp = if_lookup_by_index_per_ns(zebra_ns_lookup(ns_id), index);
362 if (ifp)
363 nh_vrf_id = ifp->vrf_id;
364 }
365 nh.vrf_id = nh_vrf_id;
366
367 if (tb[RTA_ENCAP] && tb[RTA_ENCAP_TYPE]
368 && *(uint16_t *)RTA_DATA(tb[RTA_ENCAP_TYPE])
369 == LWTUNNEL_ENCAP_MPLS) {
370 num_labels = parse_encap_mpls(tb[RTA_ENCAP], labels);
371 }
372
373 if (rtm->rtm_flags & RTNH_F_ONLINK)
374 SET_FLAG(nh.flags, NEXTHOP_FLAG_ONLINK);
375
376 if (num_labels)
377 nexthop_add_labels(&nh, ZEBRA_LSP_STATIC, num_labels, labels);
378
379 return nh;
380}
381
20822f9d
SW
382static uint8_t parse_multipath_nexthops_unicast(ns_id_t ns_id,
383 struct route_entry *re,
384 struct rtmsg *rtm,
385 struct rtnexthop *rtnh,
386 struct rtattr **tb,
387 void *prefsrc, vrf_id_t vrf_id)
388{
389 void *gate = NULL;
390 struct interface *ifp = NULL;
391 int index = 0;
392 /* MPLS labels */
393 mpls_label_t labels[MPLS_MAX_LABELS] = {0};
394 int num_labels = 0;
395 struct rtattr *rtnh_tb[RTA_MAX + 1] = {};
396
397 int len = RTA_PAYLOAD(tb[RTA_MULTIPATH]);
398 vrf_id_t nh_vrf_id = vrf_id;
399
400 re->ng = nexthop_group_new();
401
402 for (;;) {
403 struct nexthop *nh = NULL;
404
405 if (len < (int)sizeof(*rtnh) || rtnh->rtnh_len > len)
406 break;
407
408 index = rtnh->rtnh_ifindex;
409 if (index) {
410 /*
411 * Yes we are looking this up
412 * for every nexthop and just
413 * using the last one looked
414 * up right now
415 */
416 ifp = if_lookup_by_index_per_ns(zebra_ns_lookup(ns_id),
417 index);
418 if (ifp)
419 nh_vrf_id = ifp->vrf_id;
420 else {
421 flog_warn(
422 EC_ZEBRA_UNKNOWN_INTERFACE,
423 "%s: Unknown interface %u specified, defaulting to VRF_DEFAULT",
424 __PRETTY_FUNCTION__, index);
425 nh_vrf_id = VRF_DEFAULT;
426 }
427 } else
428 nh_vrf_id = vrf_id;
429
430 if (rtnh->rtnh_len > sizeof(*rtnh)) {
431 memset(rtnh_tb, 0, sizeof(rtnh_tb));
432
433 netlink_parse_rtattr(rtnh_tb, RTA_MAX, RTNH_DATA(rtnh),
434 rtnh->rtnh_len - sizeof(*rtnh));
435 if (rtnh_tb[RTA_GATEWAY])
436 gate = RTA_DATA(rtnh_tb[RTA_GATEWAY]);
437 if (rtnh_tb[RTA_ENCAP] && rtnh_tb[RTA_ENCAP_TYPE]
438 && *(uint16_t *)RTA_DATA(rtnh_tb[RTA_ENCAP_TYPE])
439 == LWTUNNEL_ENCAP_MPLS) {
440 num_labels = parse_encap_mpls(
441 rtnh_tb[RTA_ENCAP], labels);
442 }
443 }
444
445 if (gate) {
446 if (rtm->rtm_family == AF_INET) {
447 if (index)
448 nh = route_entry_nexthop_ipv4_ifindex_add(
449 re, gate, prefsrc, index,
450 nh_vrf_id);
451 else
452 nh = route_entry_nexthop_ipv4_add(
453 re, gate, prefsrc, nh_vrf_id);
454 } else if (rtm->rtm_family == AF_INET6) {
455 if (index)
456 nh = route_entry_nexthop_ipv6_ifindex_add(
457 re, gate, index, nh_vrf_id);
458 else
459 nh = route_entry_nexthop_ipv6_add(
460 re, gate, nh_vrf_id);
461 }
462 } else
463 nh = route_entry_nexthop_ifindex_add(re, index,
464 nh_vrf_id);
465
466 if (nh) {
467 if (num_labels)
468 nexthop_add_labels(nh, ZEBRA_LSP_STATIC,
469 num_labels, labels);
470
471 if (rtnh->rtnh_flags & RTNH_F_ONLINK)
472 SET_FLAG(nh->flags, NEXTHOP_FLAG_ONLINK);
473 }
474
475 if (rtnh->rtnh_len == 0)
476 break;
477
478 len -= NLMSG_ALIGN(rtnh->rtnh_len);
479 rtnh = RTNH_NEXT(rtnh);
480 }
481
482 uint8_t nhop_num = nexthop_group_nexthop_num(re->ng);
483
484 if (!nhop_num)
485 nexthop_group_delete(&re->ng);
486
487 return nhop_num;
488}
489
718e3744 490/* Looking up routing table by netlink interface. */
2414abd3 491static int netlink_route_change_read_unicast(struct nlmsghdr *h, ns_id_t ns_id,
d62a17ae 492 int startup)
718e3744 493{
d62a17ae 494 int len;
495 struct rtmsg *rtm;
496 struct rtattr *tb[RTA_MAX + 1];
d7c0a89a 497 uint8_t flags = 0;
d62a17ae 498 struct prefix p;
792fa92e 499 struct prefix_ipv6 src_p = {};
78dd30b2 500 vrf_id_t vrf_id;
d62a17ae 501
502 char anyaddr[16] = {0};
503
915902cb 504 int proto = ZEBRA_ROUTE_KERNEL;
d62a17ae 505 int index = 0;
506 int table;
507 int metric = 0;
d7c0a89a 508 uint32_t mtu = 0;
25715c7e 509 uint8_t distance = 0;
4e40b6d6 510 route_tag_t tag = 0;
fcc89a9c 511 uint32_t nhe_id = 0;
d62a17ae 512
513 void *dest = NULL;
514 void *gate = NULL;
515 void *prefsrc = NULL; /* IPv4 preferred source host address */
516 void *src = NULL; /* IPv6 srcdest source prefix */
e655a03c 517 enum blackhole_type bh_type = BLACKHOLE_UNSPEC;
d62a17ae 518
519 rtm = NLMSG_DATA(h);
520
521 if (startup && h->nlmsg_type != RTM_NEWROUTE)
522 return 0;
e655a03c
DL
523 switch (rtm->rtm_type) {
524 case RTN_UNICAST:
525 break;
526 case RTN_BLACKHOLE:
527 bh_type = BLACKHOLE_NULL;
528 break;
529 case RTN_UNREACHABLE:
530 bh_type = BLACKHOLE_REJECT;
531 break;
532 case RTN_PROHIBIT:
533 bh_type = BLACKHOLE_ADMINPROHIB;
534 break;
535 default:
8c8f250b
DS
536 if (IS_ZEBRA_DEBUG_KERNEL)
537 zlog_debug("Route rtm_type: %s(%d) intentionally ignoring",
538 nl_rttype_to_str(rtm->rtm_type),
539 rtm->rtm_type);
d62a17ae 540 return 0;
e655a03c 541 }
d62a17ae 542
543 len = h->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg));
9bdf8618
DS
544 if (len < 0) {
545 zlog_err("%s: Message received from netlink is of a broken size %d %zu",
546 __PRETTY_FUNCTION__, h->nlmsg_len,
547 (size_t)NLMSG_LENGTH(sizeof(struct rtmsg)));
d62a17ae 548 return -1;
9bdf8618 549 }
d62a17ae 550
551 memset(tb, 0, sizeof tb);
552 netlink_parse_rtattr(tb, RTA_MAX, RTM_RTA(rtm), len);
553
554 if (rtm->rtm_flags & RTM_F_CLONED)
555 return 0;
556 if (rtm->rtm_protocol == RTPROT_REDIRECT)
557 return 0;
558 if (rtm->rtm_protocol == RTPROT_KERNEL)
559 return 0;
560
561 if (!startup && is_selfroute(rtm->rtm_protocol)
6ab5222f
DS
562 && h->nlmsg_type == RTM_NEWROUTE) {
563 if (IS_ZEBRA_DEBUG_KERNEL)
564 zlog_debug("Route type: %d Received that we think we have originated, ignoring",
565 rtm->rtm_protocol);
d62a17ae 566 return 0;
6ab5222f 567 }
d62a17ae 568
569 /* We don't care about change notifications for the MPLS table. */
570 /* TODO: Revisit this. */
571 if (rtm->rtm_family == AF_MPLS)
572 return 0;
573
574 /* Table corresponding to route. */
575 if (tb[RTA_TABLE])
576 table = *(int *)RTA_DATA(tb[RTA_TABLE]);
577 else
578 table = rtm->rtm_table;
579
580 /* Map to VRF */
78dd30b2 581 vrf_id = vrf_lookup_by_table(table, ns_id);
d62a17ae 582 if (vrf_id == VRF_DEFAULT) {
583 if (!is_zebra_valid_kernel_table(table)
584 && !is_zebra_main_routing_table(table))
585 return 0;
586 }
587
588 /* Route which inserted by Zebra. */
915902cb 589 if (is_selfroute(rtm->rtm_protocol)) {
d62a17ae 590 flags |= ZEBRA_FLAG_SELFROUTE;
915902cb
DS
591 proto = proto2zebra(rtm->rtm_protocol, rtm->rtm_family);
592 }
d62a17ae 593 if (tb[RTA_OIF])
594 index = *(int *)RTA_DATA(tb[RTA_OIF]);
595
596 if (tb[RTA_DST])
597 dest = RTA_DATA(tb[RTA_DST]);
598 else
599 dest = anyaddr;
600
601 if (tb[RTA_SRC])
602 src = RTA_DATA(tb[RTA_SRC]);
603 else
604 src = anyaddr;
605
606 if (tb[RTA_PREFSRC])
607 prefsrc = RTA_DATA(tb[RTA_PREFSRC]);
608
609 if (tb[RTA_GATEWAY])
610 gate = RTA_DATA(tb[RTA_GATEWAY]);
611
fcc89a9c
SW
612 if (tb[RTA_NH_ID])
613 nhe_id = *(uint32_t *)RTA_DATA(tb[RTA_NH_ID]);
614
f19435a8
DS
615 if (tb[RTA_PRIORITY])
616 metric = *(int *)RTA_DATA(tb[RTA_PRIORITY]);
d62a17ae 617
4e40b6d6
KK
618#if defined(SUPPORT_REALMS)
619 if (tb[RTA_FLOW])
620 tag = *(uint32_t *)RTA_DATA(tb[RTA_FLOW]);
621#endif
622
f19435a8
DS
623 if (tb[RTA_METRICS]) {
624 struct rtattr *mxrta[RTAX_MAX + 1];
d62a17ae 625
f19435a8 626 memset(mxrta, 0, sizeof mxrta);
996c9314 627 netlink_parse_rtattr(mxrta, RTAX_MAX, RTA_DATA(tb[RTA_METRICS]),
f19435a8 628 RTA_PAYLOAD(tb[RTA_METRICS]));
d62a17ae 629
f19435a8 630 if (mxrta[RTAX_MTU])
d7c0a89a 631 mtu = *(uint32_t *)RTA_DATA(mxrta[RTAX_MTU]);
d62a17ae 632 }
633
634 if (rtm->rtm_family == AF_INET) {
635 p.family = AF_INET;
930571d2 636 if (rtm->rtm_dst_len > IPV4_MAX_BITLEN) {
e17d9b2d 637 zlog_err(
75829703 638 "Invalid destination prefix length: %u received from kernel route change",
930571d2 639 rtm->rtm_dst_len);
e17d9b2d 640 return -1;
930571d2 641 }
d62a17ae 642 memcpy(&p.u.prefix4, dest, 4);
643 p.prefixlen = rtm->rtm_dst_len;
644
1f610a1f
CF
645 if (rtm->rtm_src_len != 0) {
646 char buf[PREFIX_STRLEN];
9df414fe 647 flog_warn(
e914ccbe 648 EC_ZEBRA_UNSUPPORTED_V4_SRCDEST,
9df414fe
QY
649 "unsupported IPv4 sourcedest route (dest %s vrf %u)",
650 prefix2str(&p, buf, sizeof(buf)), vrf_id);
1f610a1f
CF
651 return 0;
652 }
930571d2 653
1f610a1f
CF
654 /* Force debug below to not display anything for source */
655 src_p.prefixlen = 0;
d62a17ae 656 } else if (rtm->rtm_family == AF_INET6) {
657 p.family = AF_INET6;
930571d2 658 if (rtm->rtm_dst_len > IPV6_MAX_BITLEN) {
e17d9b2d 659 zlog_err(
75829703 660 "Invalid destination prefix length: %u received from kernel route change",
930571d2 661 rtm->rtm_dst_len);
e17d9b2d 662 return -1;
930571d2 663 }
d62a17ae 664 memcpy(&p.u.prefix6, dest, 16);
665 p.prefixlen = rtm->rtm_dst_len;
666
667 src_p.family = AF_INET6;
930571d2 668 if (rtm->rtm_src_len > IPV6_MAX_BITLEN) {
e17d9b2d 669 zlog_err(
75829703 670 "Invalid source prefix length: %u received from kernel route change",
930571d2 671 rtm->rtm_src_len);
e17d9b2d 672 return -1;
930571d2 673 }
d62a17ae 674 memcpy(&src_p.prefix, src, 16);
675 src_p.prefixlen = rtm->rtm_src_len;
676 }
677
25715c7e
DS
678 /*
679 * For ZEBRA_ROUTE_KERNEL types:
680 *
681 * The metric/priority of the route received from the kernel
682 * is a 32 bit number. We are going to interpret the high
683 * order byte as the Admin Distance and the low order 3 bytes
684 * as the metric.
685 *
686 * This will allow us to do two things:
687 * 1) Allow the creation of kernel routes that can be
688 * overridden by zebra.
689 * 2) Allow the old behavior for 'most' kernel route types
690 * if a user enters 'ip route ...' v4 routes get a metric
691 * of 0 and v6 routes get a metric of 1024. Both of these
692 * values will end up with a admin distance of 0, which
693 * will cause them to win for the purposes of zebra.
694 */
695 if (proto == ZEBRA_ROUTE_KERNEL) {
696 distance = (metric >> 24) & 0xFF;
996c9314 697 metric = (metric & 0x00FFFFFF);
25715c7e
DS
698 }
699
d62a17ae 700 if (IS_ZEBRA_DEBUG_KERNEL) {
701 char buf[PREFIX_STRLEN];
702 char buf2[PREFIX_STRLEN];
45df4e96 703 zlog_debug("%s %s%s%s vrf %u(%u) metric: %d Admin Distance: %d",
996c9314
LB
704 nl_msg_type_to_str(h->nlmsg_type),
705 prefix2str(&p, buf, sizeof(buf)),
706 src_p.prefixlen ? " from " : "",
707 src_p.prefixlen
708 ? prefix2str(&src_p, buf2, sizeof(buf2))
709 : "",
45df4e96 710 vrf_id, table, metric, distance);
d62a17ae 711 }
712
713 afi_t afi = AFI_IP;
714 if (rtm->rtm_family == AF_INET6)
715 afi = AFI_IP6;
716
717 if (h->nlmsg_type == RTM_NEWROUTE) {
8795f904 718
fd36be7e 719 if (!tb[RTA_MULTIPATH]) {
77a44d94 720 struct nexthop nh = {0};
8795f904 721
77a44d94
SW
722 if (!nhe_id) {
723 nh = parse_nexthop_unicast(
724 ns_id, rtm, tb, bh_type, index, prefsrc,
20822f9d 725 gate, afi, vrf_id);
87da6a60 726 }
4a7371e9 727 rib_add(afi, SAFI_UNICAST, vrf_id, proto, 0, flags, &p,
8032b717
SW
728 &src_p, &nh, nhe_id, table, metric, mtu,
729 distance, tag);
fd36be7e 730 } else {
d62a17ae 731 /* This is a multipath route */
d62a17ae 732 struct route_entry *re;
733 struct rtnexthop *rtnh =
734 (struct rtnexthop *)RTA_DATA(tb[RTA_MULTIPATH]);
d62a17ae 735
736 re = XCALLOC(MTYPE_RE, sizeof(struct route_entry));
915902cb 737 re->type = proto;
25715c7e 738 re->distance = distance;
d62a17ae 739 re->flags = flags;
740 re->metric = metric;
741 re->mtu = mtu;
742 re->vrf_id = vrf_id;
743 re->table = table;
98572489 744 re->uptime = monotime(NULL);
4e40b6d6 745 re->tag = tag;
bbb322f2 746 re->nhe_id = nhe_id;
3c04071d 747
20822f9d
SW
748 if (!nhe_id) {
749 uint8_t nhop_num =
750 parse_multipath_nexthops_unicast(
751 ns_id, re, rtm, rtnh, tb,
752 prefsrc, vrf_id);
753
754 zserv_nexthop_num_warn(
755 __func__, (const struct prefix *)&p,
756 nhop_num);
d62a17ae 757 }
758
20822f9d 759 if (nhe_id || re->ng)
1f610a1f
CF
760 rib_add_multipath(afi, SAFI_UNICAST, &p,
761 &src_p, re);
20822f9d
SW
762 else
763 XFREE(MTYPE_RE, re);
d62a17ae 764 }
765 } else {
fe593b78 766 // TODO: Use nhe_id here as well
fd36be7e
DL
767 if (!tb[RTA_MULTIPATH]) {
768 struct nexthop nh;
769 size_t sz = (afi == AFI_IP) ? 4 : 16;
770
771 memset(&nh, 0, sizeof(nh));
8ba5bd58
RW
772 if (bh_type == BLACKHOLE_UNSPEC) {
773 if (index && !gate)
774 nh.type = NEXTHOP_TYPE_IFINDEX;
775 else if (index && gate)
776 nh.type =
777 (afi == AFI_IP)
778 ? NEXTHOP_TYPE_IPV4_IFINDEX
779 : NEXTHOP_TYPE_IPV6_IFINDEX;
780 else if (!index && gate)
781 nh.type = (afi == AFI_IP)
782 ? NEXTHOP_TYPE_IPV4
60466a63 783 : NEXTHOP_TYPE_IPV6;
8ba5bd58
RW
784 else {
785 nh.type = NEXTHOP_TYPE_BLACKHOLE;
786 nh.bh_type = BLACKHOLE_UNSPEC;
787 }
788 } else {
fd36be7e 789 nh.type = NEXTHOP_TYPE_BLACKHOLE;
8ba5bd58
RW
790 nh.bh_type = bh_type;
791 }
fd36be7e
DL
792 nh.ifindex = index;
793 if (gate)
794 memcpy(&nh.gate, gate, sz);
996c9314 795 rib_delete(afi, SAFI_UNICAST, vrf_id, proto, 0, flags,
51c4ed0a
DS
796 &p, &src_p, &nh, table, metric, distance,
797 true);
fd36be7e
DL
798 } else {
799 /* XXX: need to compare the entire list of nexthops
800 * here for NLM_F_APPEND stupidity */
996c9314 801 rib_delete(afi, SAFI_UNICAST, vrf_id, proto, 0, flags,
51c4ed0a
DS
802 &p, &src_p, NULL, table, metric, distance,
803 true);
d62a17ae 804 }
805 }
806
807 return 0;
718e3744 808}
809
e3be0432
DS
810static struct mcast_route_data *mroute = NULL;
811
2414abd3 812static int netlink_route_change_read_multicast(struct nlmsghdr *h,
d62a17ae 813 ns_id_t ns_id, int startup)
565fdc75 814{
d62a17ae 815 int len;
816 struct rtmsg *rtm;
817 struct rtattr *tb[RTA_MAX + 1];
818 struct mcast_route_data *m;
819 struct mcast_route_data mr;
820 int iif = 0;
821 int count;
822 int oif[256];
823 int oif_count = 0;
824 char sbuf[40];
825 char gbuf[40];
826 char oif_list[256] = "\0";
78dd30b2 827 vrf_id_t vrf;
43b5cc5e 828 int table;
d62a17ae 829
830 if (mroute)
831 m = mroute;
832 else {
833 memset(&mr, 0, sizeof(mr));
834 m = &mr;
835 }
836
837 rtm = NLMSG_DATA(h);
838
839 len = h->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg));
840
841 memset(tb, 0, sizeof tb);
842 netlink_parse_rtattr(tb, RTA_MAX, RTM_RTA(rtm), len);
90d82769 843
43b5cc5e
DS
844 if (tb[RTA_TABLE])
845 table = *(int *)RTA_DATA(tb[RTA_TABLE]);
846 else
847 table = rtm->rtm_table;
848
78dd30b2 849 vrf = vrf_lookup_by_table(table, ns_id);
43b5cc5e 850
d62a17ae 851 if (tb[RTA_IIF])
852 iif = *(int *)RTA_DATA(tb[RTA_IIF]);
853
854 if (tb[RTA_SRC])
bd8b9272 855 m->sg.src = *(struct in_addr *)RTA_DATA(tb[RTA_SRC]);
d62a17ae 856
857 if (tb[RTA_DST])
bd8b9272 858 m->sg.grp = *(struct in_addr *)RTA_DATA(tb[RTA_DST]);
d62a17ae 859
62819462 860 if (tb[RTA_EXPIRES])
d62a17ae 861 m->lastused = *(unsigned long long *)RTA_DATA(tb[RTA_EXPIRES]);
862
863 if (tb[RTA_MULTIPATH]) {
864 struct rtnexthop *rtnh =
865 (struct rtnexthop *)RTA_DATA(tb[RTA_MULTIPATH]);
866
867 len = RTA_PAYLOAD(tb[RTA_MULTIPATH]);
868 for (;;) {
869 if (len < (int)sizeof(*rtnh) || rtnh->rtnh_len > len)
870 break;
871
872 oif[oif_count] = rtnh->rtnh_ifindex;
873 oif_count++;
874
3c04071d
SW
875 if (rtnh->rtnh_len == 0)
876 break;
877
d62a17ae 878 len -= NLMSG_ALIGN(rtnh->rtnh_len);
879 rtnh = RTNH_NEXT(rtnh);
880 }
881 }
882
883 if (IS_ZEBRA_DEBUG_KERNEL) {
822c9af2
SW
884 struct interface *ifp = NULL;
885 struct zebra_vrf *zvrf = NULL;
886
0af35d90
RW
887 strlcpy(sbuf, inet_ntoa(m->sg.src), sizeof(sbuf));
888 strlcpy(gbuf, inet_ntoa(m->sg.grp), sizeof(gbuf));
d62a17ae 889 for (count = 0; count < oif_count; count++) {
890 ifp = if_lookup_by_index(oif[count], vrf);
891 char temp[256];
892
5b4256ca
DS
893 sprintf(temp, "%s(%d) ", ifp ? ifp->name : "Unknown",
894 oif[count]);
eab4a5c2 895 strlcat(oif_list, temp, sizeof(oif_list));
d62a17ae 896 }
822c9af2 897 zvrf = zebra_vrf_lookup_by_id(vrf);
d62a17ae 898 ifp = if_lookup_by_index(iif, vrf);
822c9af2
SW
899 zlog_debug(
900 "MCAST VRF: %s(%d) %s (%s,%s) IIF: %s(%d) OIF: %s jiffies: %lld",
901 (zvrf ? zvrf->vrf->name : "Unknown"), vrf,
902 nl_msg_type_to_str(h->nlmsg_type), sbuf, gbuf,
903 ifp ? ifp->name : "Unknown", iif, oif_list,
904 m->lastused);
90d82769 905 }
d62a17ae 906 return 0;
565fdc75
DS
907}
908
2414abd3 909int netlink_route_change(struct nlmsghdr *h, ns_id_t ns_id, int startup)
565fdc75 910{
d62a17ae 911 int len;
d62a17ae 912 struct rtmsg *rtm;
913
914 rtm = NLMSG_DATA(h);
915
916 if (!(h->nlmsg_type == RTM_NEWROUTE || h->nlmsg_type == RTM_DELROUTE)) {
917 /* If this is not route add/delete message print warning. */
9165c5f5 918 zlog_debug("Kernel message: %s NS %u",
87b5d1b0 919 nl_msg_type_to_str(h->nlmsg_type), ns_id);
d62a17ae 920 return 0;
921 }
922
c25e2f1a
DS
923 if (!(rtm->rtm_family == AF_INET ||
924 rtm->rtm_family == AF_INET6 ||
925 rtm->rtm_family == RTNL_FAMILY_IPMR )) {
9df414fe 926 flog_warn(
e914ccbe 927 EC_ZEBRA_UNKNOWN_FAMILY,
87b5d1b0
DS
928 "Invalid address family: %u received from kernel route change: %s",
929 rtm->rtm_family, nl_msg_type_to_str(h->nlmsg_type));
8a1b681c
SW
930 return 0;
931 }
932
d62a17ae 933 /* Connected route. */
934 if (IS_ZEBRA_DEBUG_KERNEL)
78dd30b2 935 zlog_debug("%s %s %s proto %s NS %u",
d62a17ae 936 nl_msg_type_to_str(h->nlmsg_type),
937 nl_family_to_str(rtm->rtm_family),
938 nl_rttype_to_str(rtm->rtm_type),
78dd30b2 939 nl_rtproto_to_str(rtm->rtm_protocol), ns_id);
d62a17ae 940
d62a17ae 941
942 len = h->nlmsg_len - NLMSG_LENGTH(sizeof(struct rtmsg));
9bdf8618
DS
943 if (len < 0) {
944 zlog_err("%s: Message received from netlink is of a broken size: %d %zu",
945 __PRETTY_FUNCTION__,
946 h->nlmsg_len,
947 (size_t)NLMSG_LENGTH(sizeof(struct rtmsg)));
d62a17ae 948 return -1;
9bdf8618 949 }
d62a17ae 950
e655a03c 951 if (rtm->rtm_type == RTN_MULTICAST)
2414abd3 952 netlink_route_change_read_multicast(h, ns_id, startup);
e655a03c 953 else
2414abd3 954 netlink_route_change_read_unicast(h, ns_id, startup);
d62a17ae 955 return 0;
565fdc75
DS
956}
957
289602d7 958/* Request for specific route information from the kernel */
d62a17ae 959static int netlink_request_route(struct zebra_ns *zns, int family, int type)
289602d7 960{
d62a17ae 961 struct {
962 struct nlmsghdr n;
963 struct rtmsg rtm;
964 } req;
965
966 /* Form the request, specifying filter (rtattr) if needed. */
967 memset(&req, 0, sizeof(req));
968 req.n.nlmsg_type = type;
718f9b0f 969 req.n.nlmsg_flags = NLM_F_ROOT | NLM_F_MATCH | NLM_F_REQUEST;
d62a17ae 970 req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct rtmsg));
971 req.rtm.rtm_family = family;
972
973 return netlink_request(&zns->netlink_cmd, &req.n);
289602d7 974}
975
718e3744 976/* Routing table read function using netlink interface. Only called
977 bootstrap time. */
d62a17ae 978int netlink_route_read(struct zebra_ns *zns)
718e3744 979{
d62a17ae 980 int ret;
85a75f1e
MS
981 struct zebra_dplane_info dp_info;
982
983 zebra_dplane_info_from_zns(&dp_info, zns, true /*is_cmd*/);
d62a17ae 984
985 /* Get IPv4 routing table. */
986 ret = netlink_request_route(zns, AF_INET, RTM_GETROUTE);
987 if (ret < 0)
988 return ret;
989 ret = netlink_parse_info(netlink_route_change_read_unicast,
85a75f1e 990 &zns->netlink_cmd, &dp_info, 0, 1);
d62a17ae 991 if (ret < 0)
992 return ret;
993
994 /* Get IPv6 routing table. */
995 ret = netlink_request_route(zns, AF_INET6, RTM_GETROUTE);
996 if (ret < 0)
997 return ret;
998 ret = netlink_parse_info(netlink_route_change_read_unicast,
85a75f1e 999 &zns->netlink_cmd, &dp_info, 0, 1);
d62a17ae 1000 if (ret < 0)
1001 return ret;
1002
1003 return 0;
718e3744 1004}
1005
d7c0a89a
QY
1006static void _netlink_route_nl_add_gateway_info(uint8_t route_family,
1007 uint8_t gw_family,
d62a17ae 1008 struct nlmsghdr *nlmsg,
1009 size_t req_size, int bytelen,
81793ac1 1010 const struct nexthop *nexthop)
40c7bdb0 1011{
d62a17ae 1012 if (route_family == AF_MPLS) {
1013 struct gw_family_t gw_fam;
1014
1015 gw_fam.family = gw_family;
1016 if (gw_family == AF_INET)
1017 memcpy(&gw_fam.gate.ipv4, &nexthop->gate.ipv4, bytelen);
1018 else
1019 memcpy(&gw_fam.gate.ipv6, &nexthop->gate.ipv6, bytelen);
1020 addattr_l(nlmsg, req_size, RTA_VIA, &gw_fam.family,
1021 bytelen + 2);
1022 } else {
1023 if (gw_family == AF_INET)
1024 addattr_l(nlmsg, req_size, RTA_GATEWAY,
1025 &nexthop->gate.ipv4, bytelen);
1026 else
1027 addattr_l(nlmsg, req_size, RTA_GATEWAY,
1028 &nexthop->gate.ipv6, bytelen);
1029 }
40c7bdb0 1030}
1031
d7c0a89a
QY
1032static void _netlink_route_rta_add_gateway_info(uint8_t route_family,
1033 uint8_t gw_family,
d62a17ae 1034 struct rtattr *rta,
1035 struct rtnexthop *rtnh,
1036 size_t req_size, int bytelen,
81793ac1 1037 const struct nexthop *nexthop)
40c7bdb0 1038{
d62a17ae 1039 if (route_family == AF_MPLS) {
1040 struct gw_family_t gw_fam;
1041
1042 gw_fam.family = gw_family;
1043 if (gw_family == AF_INET)
1044 memcpy(&gw_fam.gate.ipv4, &nexthop->gate.ipv4, bytelen);
1045 else
1046 memcpy(&gw_fam.gate.ipv6, &nexthop->gate.ipv6, bytelen);
1047 rta_addattr_l(rta, req_size, RTA_VIA, &gw_fam.family,
1048 bytelen + 2);
1049 rtnh->rtnh_len += RTA_LENGTH(bytelen + 2);
1050 } else {
1051 if (gw_family == AF_INET)
1052 rta_addattr_l(rta, req_size, RTA_GATEWAY,
1053 &nexthop->gate.ipv4, bytelen);
1054 else
1055 rta_addattr_l(rta, req_size, RTA_GATEWAY,
1056 &nexthop->gate.ipv6, bytelen);
1057 rtnh->rtnh_len += sizeof(struct rtattr) + bytelen;
1058 }
40c7bdb0 1059}
1060
fa713d9e
CF
1061/* This function takes a nexthop as argument and adds
1062 * the appropriate netlink attributes to an existing
1063 * netlink message.
1064 *
1065 * @param routedesc: Human readable description of route type
1066 * (direct/recursive, single-/multipath)
1067 * @param bytelen: Length of addresses in bytes.
1068 * @param nexthop: Nexthop information
1069 * @param nlmsg: nlmsghdr structure to fill in.
1070 * @param req_size: The size allocated for the message.
1071 */
d62a17ae 1072static void _netlink_route_build_singlepath(const char *routedesc, int bytelen,
81793ac1 1073 const struct nexthop *nexthop,
d62a17ae 1074 struct nlmsghdr *nlmsg,
1075 struct rtmsg *rtmsg,
1076 size_t req_size, int cmd)
fa713d9e 1077{
8ecdb26e 1078 struct mpls_label_stack *nh_label;
d62a17ae 1079 mpls_lse_t out_lse[MPLS_MAX_LABELS];
fa712963 1080 int num_labels = 0;
9a62e84b 1081 char label_buf[256];
d62a17ae 1082
1083 /*
1084 * label_buf is *only* currently used within debugging.
1085 * As such when we assign it we are guarding it inside
1086 * a debug test. If you want to change this make sure
1087 * you fix this assumption
1088 */
1089 label_buf[0] = '\0';
d62a17ae 1090
fa712963 1091 assert(nexthop);
b43434ad 1092 char label_buf1[20];
d62a17ae 1093
b43434ad 1094 nh_label = nexthop->nh_label;
fa712963 1095
b43434ad
SW
1096 for (int i = 0; nh_label && i < nh_label->num_labels; i++) {
1097 if (nh_label->label[i] == MPLS_LABEL_IMPLICIT_NULL)
1098 continue;
fa712963 1099
b43434ad
SW
1100 if (IS_ZEBRA_DEBUG_KERNEL) {
1101 if (!num_labels)
1102 sprintf(label_buf, "label %u",
1103 nh_label->label[i]);
1104 else {
1105 sprintf(label_buf1, "/%u", nh_label->label[i]);
1106 strlcat(label_buf, label_buf1,
1107 sizeof(label_buf));
d62a17ae 1108 }
1109 }
b43434ad
SW
1110
1111 out_lse[num_labels] =
1112 mpls_lse_encode(nh_label->label[i], 0, 0, 0);
1113 num_labels++;
fa712963
RW
1114 }
1115
1116 if (num_labels) {
1117 /* Set the BoS bit */
1118 out_lse[num_labels - 1] |= htonl(1 << MPLS_LS_S_SHIFT);
1119
1120 if (rtmsg->rtm_family == AF_MPLS)
1121 addattr_l(nlmsg, req_size, RTA_NEWDST, &out_lse,
1122 num_labels * sizeof(mpls_lse_t));
1123 else {
1124 struct rtattr *nest;
d7c0a89a 1125 uint16_t encap = LWTUNNEL_ENCAP_MPLS;
fa712963
RW
1126
1127 addattr_l(nlmsg, req_size, RTA_ENCAP_TYPE, &encap,
d7c0a89a 1128 sizeof(uint16_t));
fa712963
RW
1129 nest = addattr_nest(nlmsg, req_size, RTA_ENCAP);
1130 addattr_l(nlmsg, req_size, MPLS_IPTUNNEL_DST, &out_lse,
1131 num_labels * sizeof(mpls_lse_t));
1132 addattr_nest_end(nlmsg, nest);
66d42727 1133 }
0aabccc0 1134 }
fa713d9e 1135
d62a17ae 1136 if (CHECK_FLAG(nexthop->flags, NEXTHOP_FLAG_ONLINK))
1137 rtmsg->rtm_flags |= RTNH_F_ONLINK;
1138
1139 if (rtmsg->rtm_family == AF_INET
1140 && (nexthop->type == NEXTHOP_TYPE_IPV6
1141 || nexthop->type == NEXTHOP_TYPE_IPV6_IFINDEX)) {
1142 rtmsg->rtm_flags |= RTNH_F_ONLINK;
1143 addattr_l(nlmsg, req_size, RTA_GATEWAY, &ipv4_ll, 4);
1144 addattr32(nlmsg, req_size, RTA_OIF, nexthop->ifindex);
1145
1146 if (nexthop->rmap_src.ipv4.s_addr && (cmd == RTM_NEWROUTE))
1147 addattr_l(nlmsg, req_size, RTA_PREFSRC,
1148 &nexthop->rmap_src.ipv4, bytelen);
1149 else if (nexthop->src.ipv4.s_addr && (cmd == RTM_NEWROUTE))
1150 addattr_l(nlmsg, req_size, RTA_PREFSRC,
1151 &nexthop->src.ipv4, bytelen);
1152
1153 if (IS_ZEBRA_DEBUG_KERNEL)
1154 zlog_debug(
1155 " 5549: _netlink_route_build_singlepath() (%s): "
7556c3fd 1156 "nexthop via %s %s if %u(%u)",
d62a17ae 1157 routedesc, ipv4_ll_buf, label_buf,
7556c3fd 1158 nexthop->ifindex, nexthop->vrf_id);
d62a17ae 1159 return;
0aabccc0
DD
1160 }
1161
d62a17ae 1162 if (nexthop->type == NEXTHOP_TYPE_IPV4
1163 || nexthop->type == NEXTHOP_TYPE_IPV4_IFINDEX) {
1164 /* Send deletes to the kernel without specifying the next-hop */
1165 if (cmd != RTM_DELROUTE)
1166 _netlink_route_nl_add_gateway_info(
1167 rtmsg->rtm_family, AF_INET, nlmsg, req_size,
1168 bytelen, nexthop);
1169
1170 if (cmd == RTM_NEWROUTE) {
1171 if (nexthop->rmap_src.ipv4.s_addr)
1172 addattr_l(nlmsg, req_size, RTA_PREFSRC,
1173 &nexthop->rmap_src.ipv4, bytelen);
1174 else if (nexthop->src.ipv4.s_addr)
1175 addattr_l(nlmsg, req_size, RTA_PREFSRC,
1176 &nexthop->src.ipv4, bytelen);
1177 }
1178
1179 if (IS_ZEBRA_DEBUG_KERNEL)
1180 zlog_debug(
1181 "netlink_route_multipath() (%s): "
7556c3fd 1182 "nexthop via %s %s if %u(%u)",
d62a17ae 1183 routedesc, inet_ntoa(nexthop->gate.ipv4),
7556c3fd 1184 label_buf, nexthop->ifindex, nexthop->vrf_id);
0aabccc0 1185 }
fa713d9e 1186
d62a17ae 1187 if (nexthop->type == NEXTHOP_TYPE_IPV6
1188 || nexthop->type == NEXTHOP_TYPE_IPV6_IFINDEX) {
1189 _netlink_route_nl_add_gateway_info(rtmsg->rtm_family, AF_INET6,
1190 nlmsg, req_size, bytelen,
1191 nexthop);
1192
1193 if (cmd == RTM_NEWROUTE) {
1194 if (!IN6_IS_ADDR_UNSPECIFIED(&nexthop->rmap_src.ipv6))
1195 addattr_l(nlmsg, req_size, RTA_PREFSRC,
1196 &nexthop->rmap_src.ipv6, bytelen);
1197 else if (!IN6_IS_ADDR_UNSPECIFIED(&nexthop->src.ipv6))
1198 addattr_l(nlmsg, req_size, RTA_PREFSRC,
1199 &nexthop->src.ipv6, bytelen);
1200 }
fa713d9e 1201
d62a17ae 1202 if (IS_ZEBRA_DEBUG_KERNEL)
1203 zlog_debug(
1204 "netlink_route_multipath() (%s): "
7556c3fd 1205 "nexthop via %s %s if %u(%u)",
d62a17ae 1206 routedesc, inet6_ntoa(nexthop->gate.ipv6),
7556c3fd 1207 label_buf, nexthop->ifindex, nexthop->vrf_id);
d62a17ae 1208 }
5e210522
DS
1209
1210 /*
1211 * We have the ifindex so we should always send it
1212 * This is especially useful if we are doing route
1213 * leaking.
1214 */
1215 if (nexthop->type != NEXTHOP_TYPE_BLACKHOLE)
d62a17ae 1216 addattr32(nlmsg, req_size, RTA_OIF, nexthop->ifindex);
1217
275565fb 1218 if (nexthop->type == NEXTHOP_TYPE_IFINDEX) {
d62a17ae 1219 if (cmd == RTM_NEWROUTE) {
1220 if (nexthop->rmap_src.ipv4.s_addr)
1221 addattr_l(nlmsg, req_size, RTA_PREFSRC,
1222 &nexthop->rmap_src.ipv4, bytelen);
1223 else if (nexthop->src.ipv4.s_addr)
1224 addattr_l(nlmsg, req_size, RTA_PREFSRC,
1225 &nexthop->src.ipv4, bytelen);
1226 }
fa713d9e 1227
d62a17ae 1228 if (IS_ZEBRA_DEBUG_KERNEL)
1229 zlog_debug(
1230 "netlink_route_multipath() (%s): "
7556c3fd
DS
1231 "nexthop via if %u(%u)",
1232 routedesc, nexthop->ifindex, nexthop->vrf_id);
0aabccc0 1233 }
fa713d9e
CF
1234}
1235
1236/* This function takes a nexthop as argument and
1237 * appends to the given rtattr/rtnexthop pair the
1238 * representation of the nexthop. If the nexthop
1239 * defines a preferred source, the src parameter
1240 * will be modified to point to that src, otherwise
1241 * it will be kept unmodified.
1242 *
1243 * @param routedesc: Human readable description of route type
1244 * (direct/recursive, single-/multipath)
1245 * @param bytelen: Length of addresses in bytes.
1246 * @param nexthop: Nexthop information
1247 * @param rta: rtnetlink attribute structure
1248 * @param rtnh: pointer to an rtnetlink nexthop structure
1249 * @param src: pointer pointing to a location where
1250 * the prefsrc should be stored.
1251 */
d62a17ae 1252static void _netlink_route_build_multipath(const char *routedesc, int bytelen,
81793ac1 1253 const struct nexthop *nexthop,
d62a17ae 1254 struct rtattr *rta,
1255 struct rtnexthop *rtnh,
1256 struct rtmsg *rtmsg,
81793ac1 1257 const union g_addr **src)
fa713d9e 1258{
8ecdb26e 1259 struct mpls_label_stack *nh_label;
d62a17ae 1260 mpls_lse_t out_lse[MPLS_MAX_LABELS];
fa712963 1261 int num_labels = 0;
9a62e84b 1262 char label_buf[256];
d62a17ae 1263
1264 rtnh->rtnh_len = sizeof(*rtnh);
1265 rtnh->rtnh_flags = 0;
1266 rtnh->rtnh_hops = 0;
1267 rta->rta_len += rtnh->rtnh_len;
1268
1269 /*
1270 * label_buf is *only* currently used within debugging.
1271 * As such when we assign it we are guarding it inside
1272 * a debug test. If you want to change this make sure
1273 * you fix this assumption
1274 */
1275 label_buf[0] = '\0';
d62a17ae 1276
fa712963 1277 assert(nexthop);
b43434ad 1278 char label_buf1[20];
d62a17ae 1279
b43434ad 1280 nh_label = nexthop->nh_label;
fa712963 1281
b43434ad
SW
1282 for (int i = 0; nh_label && i < nh_label->num_labels; i++) {
1283 if (nh_label->label[i] == MPLS_LABEL_IMPLICIT_NULL)
1284 continue;
fa712963 1285
b43434ad
SW
1286 if (IS_ZEBRA_DEBUG_KERNEL) {
1287 if (!num_labels)
1288 sprintf(label_buf, "label %u",
1289 nh_label->label[i]);
1290 else {
1291 sprintf(label_buf1, "/%u", nh_label->label[i]);
1292 strlcat(label_buf, label_buf1,
1293 sizeof(label_buf));
d62a17ae 1294 }
1295 }
b43434ad
SW
1296
1297 out_lse[num_labels] =
1298 mpls_lse_encode(nh_label->label[i], 0, 0, 0);
1299 num_labels++;
fa712963
RW
1300 }
1301
1302 if (num_labels) {
1303 /* Set the BoS bit */
1304 out_lse[num_labels - 1] |= htonl(1 << MPLS_LS_S_SHIFT);
1305
1306 if (rtmsg->rtm_family == AF_MPLS) {
1307 rta_addattr_l(rta, NL_PKT_BUF_SIZE, RTA_NEWDST,
1308 &out_lse,
1309 num_labels * sizeof(mpls_lse_t));
1310 rtnh->rtnh_len +=
1311 RTA_LENGTH(num_labels * sizeof(mpls_lse_t));
1312 } else {
1313 struct rtattr *nest;
d7c0a89a 1314 uint16_t encap = LWTUNNEL_ENCAP_MPLS;
fa712963
RW
1315 int len = rta->rta_len;
1316
1317 rta_addattr_l(rta, NL_PKT_BUF_SIZE, RTA_ENCAP_TYPE,
d7c0a89a 1318 &encap, sizeof(uint16_t));
fa712963
RW
1319 nest = rta_nest(rta, NL_PKT_BUF_SIZE, RTA_ENCAP);
1320 rta_addattr_l(rta, NL_PKT_BUF_SIZE, MPLS_IPTUNNEL_DST,
1321 &out_lse,
1322 num_labels * sizeof(mpls_lse_t));
1323 rta_nest_end(rta, nest);
1324 rtnh->rtnh_len += rta->rta_len - len;
66d42727 1325 }
d62a17ae 1326 }
1327
1328 if (CHECK_FLAG(nexthop->flags, NEXTHOP_FLAG_ONLINK))
1329 rtnh->rtnh_flags |= RTNH_F_ONLINK;
1330
1331 if (rtmsg->rtm_family == AF_INET
1332 && (nexthop->type == NEXTHOP_TYPE_IPV6
1333 || nexthop->type == NEXTHOP_TYPE_IPV6_IFINDEX)) {
1334 bytelen = 4;
1335 rtnh->rtnh_flags |= RTNH_F_ONLINK;
1336 rta_addattr_l(rta, NL_PKT_BUF_SIZE, RTA_GATEWAY, &ipv4_ll,
1337 bytelen);
1338 rtnh->rtnh_len += sizeof(struct rtattr) + bytelen;
1339 rtnh->rtnh_ifindex = nexthop->ifindex;
1340
1341 if (nexthop->rmap_src.ipv4.s_addr)
1342 *src = &nexthop->rmap_src;
1343 else if (nexthop->src.ipv4.s_addr)
1344 *src = &nexthop->src;
1345
1346 if (IS_ZEBRA_DEBUG_KERNEL)
1347 zlog_debug(
1348 " 5549: netlink_route_build_multipath() (%s): "
1349 "nexthop via %s %s if %u",
1350 routedesc, ipv4_ll_buf, label_buf,
1351 nexthop->ifindex);
1352 return;
1353 }
1354
1355 if (nexthop->type == NEXTHOP_TYPE_IPV4
1356 || nexthop->type == NEXTHOP_TYPE_IPV4_IFINDEX) {
1357 _netlink_route_rta_add_gateway_info(rtmsg->rtm_family, AF_INET,
1358 rta, rtnh, NL_PKT_BUF_SIZE,
1359 bytelen, nexthop);
1360 if (nexthop->rmap_src.ipv4.s_addr)
1361 *src = &nexthop->rmap_src;
1362 else if (nexthop->src.ipv4.s_addr)
1363 *src = &nexthop->src;
1364
1365 if (IS_ZEBRA_DEBUG_KERNEL)
1366 zlog_debug(
1367 "netlink_route_multipath() (%s): "
1368 "nexthop via %s %s if %u",
1369 routedesc, inet_ntoa(nexthop->gate.ipv4),
1370 label_buf, nexthop->ifindex);
1371 }
1372 if (nexthop->type == NEXTHOP_TYPE_IPV6
1373 || nexthop->type == NEXTHOP_TYPE_IPV6_IFINDEX) {
1374 _netlink_route_rta_add_gateway_info(rtmsg->rtm_family, AF_INET6,
1375 rta, rtnh, NL_PKT_BUF_SIZE,
1376 bytelen, nexthop);
1377
1378 if (!IN6_IS_ADDR_UNSPECIFIED(&nexthop->rmap_src.ipv6))
1379 *src = &nexthop->rmap_src;
1380 else if (!IN6_IS_ADDR_UNSPECIFIED(&nexthop->src.ipv6))
1381 *src = &nexthop->src;
1382
1383 if (IS_ZEBRA_DEBUG_KERNEL)
1384 zlog_debug(
1385 "netlink_route_multipath() (%s): "
1386 "nexthop via %s %s if %u",
1387 routedesc, inet6_ntoa(nexthop->gate.ipv6),
1388 label_buf, nexthop->ifindex);
1389 }
5e210522
DS
1390
1391 /*
1392 * We have figured out the ifindex so we should always send it
1393 * This is especially useful if we are doing route
1394 * leaking.
1395 */
1396 if (nexthop->type != NEXTHOP_TYPE_BLACKHOLE)
1397 rtnh->rtnh_ifindex = nexthop->ifindex;
1398
d62a17ae 1399 /* ifindex */
275565fb 1400 if (nexthop->type == NEXTHOP_TYPE_IFINDEX) {
d62a17ae 1401 if (nexthop->rmap_src.ipv4.s_addr)
1402 *src = &nexthop->rmap_src;
1403 else if (nexthop->src.ipv4.s_addr)
1404 *src = &nexthop->src;
1405
1406 if (IS_ZEBRA_DEBUG_KERNEL)
1407 zlog_debug(
1408 "netlink_route_multipath() (%s): "
1409 "nexthop via if %u",
1410 routedesc, nexthop->ifindex);
d62a17ae 1411 }
fa713d9e
CF
1412}
1413
d62a17ae 1414static inline void _netlink_mpls_build_singlepath(const char *routedesc,
81793ac1 1415 const zebra_nhlfe_t *nhlfe,
d62a17ae 1416 struct nlmsghdr *nlmsg,
1417 struct rtmsg *rtmsg,
1418 size_t req_size, int cmd)
40c7bdb0 1419{
d62a17ae 1420 int bytelen;
d7c0a89a 1421 uint8_t family;
40c7bdb0 1422
d62a17ae 1423 family = NHLFE_FAMILY(nhlfe);
1424 bytelen = (family == AF_INET ? 4 : 16);
1425 _netlink_route_build_singlepath(routedesc, bytelen, nhlfe->nexthop,
1426 nlmsg, rtmsg, req_size, cmd);
40c7bdb0 1427}
1428
1429
1430static inline void
81793ac1 1431_netlink_mpls_build_multipath(const char *routedesc, const zebra_nhlfe_t *nhlfe,
d62a17ae 1432 struct rtattr *rta, struct rtnexthop *rtnh,
81793ac1 1433 struct rtmsg *rtmsg, const union g_addr **src)
40c7bdb0 1434{
d62a17ae 1435 int bytelen;
d7c0a89a 1436 uint8_t family;
40c7bdb0 1437
d62a17ae 1438 family = NHLFE_FAMILY(nhlfe);
1439 bytelen = (family == AF_INET ? 4 : 16);
1440 _netlink_route_build_multipath(routedesc, bytelen, nhlfe->nexthop, rta,
1441 rtnh, rtmsg, src);
40c7bdb0 1442}
1443
1444
fa713d9e
CF
1445/* Log debug information for netlink_route_multipath
1446 * if debug logging is enabled.
1447 *
1448 * @param cmd: Netlink command which is to be processed
1449 * @param p: Prefix for which the change is due
fa713d9e 1450 * @param family: Address family which the change concerns
45df4e96
DS
1451 * @param zvrf: The vrf we are in
1452 * @param tableid: The table we are working on
fa713d9e 1453 */
86391e56
MS
1454static void _netlink_route_debug(int cmd, const struct prefix *p,
1455 int family, vrf_id_t vrfid,
7556c3fd 1456 uint32_t tableid)
fa713d9e 1457{
d62a17ae 1458 if (IS_ZEBRA_DEBUG_KERNEL) {
1459 char buf[PREFIX_STRLEN];
1460 zlog_debug(
45df4e96
DS
1461 "netlink_route_multipath(): %s %s vrf %u(%u)",
1462 nl_msg_type_to_str(cmd),
1463 prefix2str(p, buf, sizeof(buf)),
86391e56 1464 vrfid, tableid);
d62a17ae 1465 }
1466}
1467
e8968ccb
SW
1468static void _netlink_nexthop_debug(int cmd, uint32_t id)
1469{
1470 if (IS_ZEBRA_DEBUG_KERNEL)
1471 zlog_debug("netlink_nexthop(): %s, id=%u",
1472 nl_msg_type_to_str(cmd), id);
1473}
1474
d7c0a89a 1475static void _netlink_mpls_debug(int cmd, uint32_t label, const char *routedesc)
40c7bdb0 1476{
d62a17ae 1477 if (IS_ZEBRA_DEBUG_KERNEL)
1478 zlog_debug("netlink_mpls_multipath() (%s): %s %u/20", routedesc,
1479 nl_msg_type_to_str(cmd), label);
fa713d9e
CF
1480}
1481
d62a17ae 1482static int netlink_neigh_update(int cmd, int ifindex, uint32_t addr, char *lla,
5895d33f 1483 int llalen, ns_id_t ns_id)
5c610faf 1484{
f3dbec60 1485 uint8_t protocol = RTPROT_ZEBRA;
d62a17ae 1486 struct {
1487 struct nlmsghdr n;
1488 struct ndmsg ndm;
1489 char buf[256];
1490 } req;
5c610faf 1491
5895d33f 1492 struct zebra_ns *zns = zebra_ns_lookup(ns_id);
8f7d9fc0 1493
5605ecfc 1494 memset(&req, 0, sizeof(req));
5c610faf 1495
d62a17ae 1496 req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ndmsg));
1497 req.n.nlmsg_flags = NLM_F_CREATE | NLM_F_REQUEST;
1498 req.n.nlmsg_type = cmd; // RTM_NEWNEIGH or RTM_DELNEIGH
1499 req.n.nlmsg_pid = zns->netlink_cmd.snl.nl_pid;
a55ba23f 1500
d62a17ae 1501 req.ndm.ndm_family = AF_INET;
1502 req.ndm.ndm_state = NUD_PERMANENT;
1503 req.ndm.ndm_ifindex = ifindex;
1504 req.ndm.ndm_type = RTN_UNICAST;
5c610faf 1505
f3dbec60
DS
1506 addattr_l(&req.n, sizeof(req),
1507 NDA_PROTOCOL, &protocol, sizeof(protocol));
d62a17ae 1508 addattr_l(&req.n, sizeof(req), NDA_DST, &addr, 4);
1509 addattr_l(&req.n, sizeof(req), NDA_LLADDR, lla, llalen);
5c610faf 1510
d62a17ae 1511 return netlink_talk(netlink_talk_filter, &req.n, &zns->netlink_cmd, zns,
1512 0);
5c610faf
DS
1513}
1514
7cdb1a84
MS
1515/*
1516 * Routing table change via netlink interface, using a dataplane context object
1517 */
25779064 1518static int netlink_route_multipath(int cmd, struct zebra_dplane_ctx *ctx)
7cdb1a84
MS
1519{
1520 int bytelen;
7cdb1a84
MS
1521 struct nexthop *nexthop = NULL;
1522 unsigned int nexthop_num;
1523 int family;
1524 const char *routedesc;
1525 int setsrc = 0;
1526 union g_addr src;
1527 const struct prefix *p, *src_p;
1528 uint32_t table_id;
1529
1530 struct {
1531 struct nlmsghdr n;
1532 struct rtmsg r;
1533 char buf[NL_PKT_BUF_SIZE];
1534 } req;
1535
1536 p = dplane_ctx_get_dest(ctx);
1537 src_p = dplane_ctx_get_src(ctx);
1538
1539 family = PREFIX_FAMILY(p);
1540
5709131c 1541 memset(&req, 0, sizeof(req) - NL_PKT_BUF_SIZE);
7cdb1a84
MS
1542
1543 bytelen = (family == AF_INET ? 4 : 16);
1544
1545 req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct rtmsg));
1546 req.n.nlmsg_flags = NLM_F_CREATE | NLM_F_REQUEST;
1547
334734a8
DS
1548 if ((cmd == RTM_NEWROUTE) &&
1549 ((p->family == AF_INET) || v6_rr_semantics))
1550 req.n.nlmsg_flags |= NLM_F_REPLACE;
7cdb1a84
MS
1551
1552 req.n.nlmsg_type = cmd;
1553
1554 req.n.nlmsg_pid = dplane_ctx_get_ns(ctx)->nls.snl.nl_pid;
1555
1556 req.r.rtm_family = family;
1557 req.r.rtm_dst_len = p->prefixlen;
1558 req.r.rtm_src_len = src_p ? src_p->prefixlen : 0;
1559 req.r.rtm_scope = RT_SCOPE_UNIVERSE;
1560
5709131c 1561 if (cmd == RTM_DELROUTE)
7cdb1a84 1562 req.r.rtm_protocol = zebra2proto(dplane_ctx_get_old_type(ctx));
5709131c 1563 else
7cdb1a84 1564 req.r.rtm_protocol = zebra2proto(dplane_ctx_get_type(ctx));
7cdb1a84
MS
1565
1566 /*
1567 * blackhole routes are not RTN_UNICAST, they are
1568 * RTN_ BLACKHOLE|UNREACHABLE|PROHIBIT
1569 * so setting this value as a RTN_UNICAST would
1570 * cause the route lookup of just the prefix
1571 * to fail. So no need to specify this for
1572 * the RTM_DELROUTE case
1573 */
1574 if (cmd != RTM_DELROUTE)
1575 req.r.rtm_type = RTN_UNICAST;
1576
5709131c 1577 addattr_l(&req.n, sizeof(req), RTA_DST, &p->u.prefix, bytelen);
7cdb1a84 1578 if (src_p)
5709131c 1579 addattr_l(&req.n, sizeof(req), RTA_SRC, &src_p->u.prefix,
7cdb1a84
MS
1580 bytelen);
1581
1582 /* Metric. */
1583 /* Hardcode the metric for all routes coming from zebra. Metric isn't
1584 * used
1585 * either by the kernel or by zebra. Its purely for calculating best
1586 * path(s)
1587 * by the routing protocol and for communicating with protocol peers.
1588 */
5709131c 1589 addattr32(&req.n, sizeof(req), RTA_PRIORITY, NL_DEFAULT_ROUTE_METRIC);
7cdb1a84
MS
1590
1591#if defined(SUPPORT_REALMS)
1592 {
1593 route_tag_t tag;
1594
5709131c 1595 if (cmd == RTM_DELROUTE)
7cdb1a84 1596 tag = dplane_ctx_get_old_tag(ctx);
5709131c 1597 else
7cdb1a84 1598 tag = dplane_ctx_get_tag(ctx);
7cdb1a84
MS
1599
1600 if (tag > 0 && tag <= 255)
5709131c 1601 addattr32(&req.n, sizeof(req), RTA_FLOW, tag);
7cdb1a84
MS
1602 }
1603#endif
1604 /* Table corresponding to this route. */
1605 table_id = dplane_ctx_get_table(ctx);
1606 if (table_id < 256)
1607 req.r.rtm_table = table_id;
1608 else {
1609 req.r.rtm_table = RT_TABLE_UNSPEC;
5709131c 1610 addattr32(&req.n, sizeof(req), RTA_TABLE, table_id);
7cdb1a84
MS
1611 }
1612
1613 _netlink_route_debug(cmd, p, family, dplane_ctx_get_vrf(ctx), table_id);
1614
1615 /*
1616 * If we are not updating the route and we have received
1617 * a route delete, then all we need to fill in is the
1618 * prefix information to tell the kernel to schwack
1619 * it.
1620 */
1621 if (cmd == RTM_DELROUTE)
1622 goto skip;
1623
1624 if (dplane_ctx_get_mtu(ctx) || dplane_ctx_get_nh_mtu(ctx)) {
1625 char buf[NL_PKT_BUF_SIZE];
1626 struct rtattr *rta = (void *)buf;
1627 uint32_t mtu = dplane_ctx_get_mtu(ctx);
1628 uint32_t nexthop_mtu = dplane_ctx_get_nh_mtu(ctx);
5709131c 1629
7cdb1a84
MS
1630 if (!mtu || (nexthop_mtu && nexthop_mtu < mtu))
1631 mtu = nexthop_mtu;
1632 rta->rta_type = RTA_METRICS;
1633 rta->rta_len = RTA_LENGTH(0);
5709131c
MS
1634 rta_addattr_l(rta, NL_PKT_BUF_SIZE,
1635 RTAX_MTU, &mtu, sizeof(mtu));
7cdb1a84
MS
1636 addattr_l(&req.n, NL_PKT_BUF_SIZE, RTA_METRICS, RTA_DATA(rta),
1637 RTA_PAYLOAD(rta));
1638 }
1639
1640 /* Count overall nexthops so we can decide whether to use singlepath
5709131c
MS
1641 * or multipath case.
1642 */
7cdb1a84
MS
1643 nexthop_num = 0;
1644 for (ALL_NEXTHOPS_PTR(dplane_ctx_get_ng(ctx), nexthop)) {
1645 if (CHECK_FLAG(nexthop->flags, NEXTHOP_FLAG_RECURSIVE))
1646 continue;
1647 if (cmd == RTM_NEWROUTE && !NEXTHOP_IS_ACTIVE(nexthop->flags))
1648 continue;
1649
1650 nexthop_num++;
1651 }
1652
1653 /* Singlepath case. */
220f0f42 1654 if (nexthop_num == 1) {
7cdb1a84
MS
1655 nexthop_num = 0;
1656 for (ALL_NEXTHOPS_PTR(dplane_ctx_get_ng(ctx), nexthop)) {
1657 /*
1658 * So we want to cover 2 types of blackhole
1659 * routes here:
1660 * 1) A normal blackhole route( ala from a static
1661 * install.
1662 * 2) A recursively resolved blackhole route
1663 */
1664 if (nexthop->type == NEXTHOP_TYPE_BLACKHOLE) {
1665 switch (nexthop->bh_type) {
1666 case BLACKHOLE_ADMINPROHIB:
1667 req.r.rtm_type = RTN_PROHIBIT;
1668 break;
1669 case BLACKHOLE_REJECT:
1670 req.r.rtm_type = RTN_UNREACHABLE;
1671 break;
1672 default:
1673 req.r.rtm_type = RTN_BLACKHOLE;
1674 break;
1675 }
1676 goto skip;
1677 }
1678 if (CHECK_FLAG(nexthop->flags,
1679 NEXTHOP_FLAG_RECURSIVE)) {
5709131c
MS
1680
1681 if (setsrc)
1682 continue;
1683
1684 if (family == AF_INET) {
1685 if (nexthop->rmap_src.ipv4.s_addr
1686 != 0) {
1687 src.ipv4 =
1688 nexthop->rmap_src.ipv4;
1689 setsrc = 1;
1690 } else if (nexthop->src.ipv4.s_addr
1691 != 0) {
1692 src.ipv4 =
1693 nexthop->src.ipv4;
1694 setsrc = 1;
1695 }
1696 } else if (family == AF_INET6) {
1697 if (!IN6_IS_ADDR_UNSPECIFIED(
1698 &nexthop->rmap_src.ipv6)) {
1699 src.ipv6 =
1700 nexthop->rmap_src.ipv6;
1701 setsrc = 1;
1702 } else if (
1703 !IN6_IS_ADDR_UNSPECIFIED(
1704 &nexthop->src.ipv6)) {
1705 src.ipv6 =
1706 nexthop->src.ipv6;
1707 setsrc = 1;
7cdb1a84
MS
1708 }
1709 }
f183e380 1710 continue;
7cdb1a84
MS
1711 }
1712
1713 if ((cmd == RTM_NEWROUTE
1714 && NEXTHOP_IS_ACTIVE(nexthop->flags))) {
1715 routedesc = nexthop->rparent
1716 ? "recursive, single-path"
1717 : "single-path";
1718
1719 _netlink_route_build_singlepath(
1720 routedesc, bytelen, nexthop, &req.n,
5709131c 1721 &req.r, sizeof(req), cmd);
7cdb1a84
MS
1722 nexthop_num++;
1723 break;
1724 }
1725 }
1726 if (setsrc && (cmd == RTM_NEWROUTE)) {
1727 if (family == AF_INET)
5709131c 1728 addattr_l(&req.n, sizeof(req), RTA_PREFSRC,
7cdb1a84
MS
1729 &src.ipv4, bytelen);
1730 else if (family == AF_INET6)
5709131c 1731 addattr_l(&req.n, sizeof(req), RTA_PREFSRC,
7cdb1a84
MS
1732 &src.ipv6, bytelen);
1733 }
1734 } else { /* Multipath case */
1735 char buf[NL_PKT_BUF_SIZE];
1736 struct rtattr *rta = (void *)buf;
1737 struct rtnexthop *rtnh;
81793ac1 1738 const union g_addr *src1 = NULL;
7cdb1a84
MS
1739
1740 rta->rta_type = RTA_MULTIPATH;
1741 rta->rta_len = RTA_LENGTH(0);
1742 rtnh = RTA_DATA(rta);
1743
1744 nexthop_num = 0;
1745 for (ALL_NEXTHOPS_PTR(dplane_ctx_get_ng(ctx), nexthop)) {
7cdb1a84
MS
1746 if (CHECK_FLAG(nexthop->flags,
1747 NEXTHOP_FLAG_RECURSIVE)) {
1748 /* This only works for IPv4 now */
5709131c
MS
1749 if (setsrc)
1750 continue;
1751
1752 if (family == AF_INET) {
1753 if (nexthop->rmap_src.ipv4.s_addr
1754 != 0) {
1755 src.ipv4 =
1756 nexthop->rmap_src.ipv4;
1757 setsrc = 1;
1758 } else if (nexthop->src.ipv4.s_addr
1759 != 0) {
1760 src.ipv4 =
1761 nexthop->src.ipv4;
1762 setsrc = 1;
1763 }
1764 } else if (family == AF_INET6) {
1765 if (!IN6_IS_ADDR_UNSPECIFIED(
1766 &nexthop->rmap_src.ipv6)) {
1767 src.ipv6 =
1768 nexthop->rmap_src.ipv6;
1769 setsrc = 1;
1770 } else if (
1771 !IN6_IS_ADDR_UNSPECIFIED(
1772 &nexthop->src.ipv6)) {
1773 src.ipv6 =
1774 nexthop->src.ipv6;
1775 setsrc = 1;
7cdb1a84
MS
1776 }
1777 }
78e54ded
MS
1778
1779 continue;
7cdb1a84
MS
1780 }
1781
1782 if ((cmd == RTM_NEWROUTE
1783 && NEXTHOP_IS_ACTIVE(nexthop->flags))) {
1784 routedesc = nexthop->rparent
1785 ? "recursive, multipath"
1786 : "multipath";
1787 nexthop_num++;
1788
1789 _netlink_route_build_multipath(
1790 routedesc, bytelen, nexthop, rta, rtnh,
1791 &req.r, &src1);
1792 rtnh = RTNH_NEXT(rtnh);
1793
1794 if (!setsrc && src1) {
1795 if (family == AF_INET)
1796 src.ipv4 = src1->ipv4;
1797 else if (family == AF_INET6)
1798 src.ipv6 = src1->ipv6;
1799
1800 setsrc = 1;
1801 }
1802 }
1803 }
1804 if (setsrc && (cmd == RTM_NEWROUTE)) {
1805 if (family == AF_INET)
5709131c 1806 addattr_l(&req.n, sizeof(req), RTA_PREFSRC,
7cdb1a84
MS
1807 &src.ipv4, bytelen);
1808 else if (family == AF_INET6)
5709131c 1809 addattr_l(&req.n, sizeof(req), RTA_PREFSRC,
7cdb1a84
MS
1810 &src.ipv6, bytelen);
1811 if (IS_ZEBRA_DEBUG_KERNEL)
1812 zlog_debug("Setting source");
1813 }
1814
1815 if (rta->rta_len > RTA_LENGTH(0))
1816 addattr_l(&req.n, NL_PKT_BUF_SIZE, RTA_MULTIPATH,
1817 RTA_DATA(rta), RTA_PAYLOAD(rta));
1818 }
1819
1820 /* If there is no useful nexthop then return. */
1821 if (nexthop_num == 0) {
1822 if (IS_ZEBRA_DEBUG_KERNEL)
1823 zlog_debug(
1824 "netlink_route_multipath(): No useful nexthop.");
1825 return 0;
1826 }
1827
1828skip:
7cdb1a84
MS
1829 /* Talk to netlink socket. */
1830 return netlink_talk_info(netlink_talk_filter, &req.n,
1831 dplane_ctx_get_ns(ctx), 0);
1832}
1833
43b5cc5e 1834int kernel_get_ipmr_sg_stats(struct zebra_vrf *zvrf, void *in)
e3be0432 1835{
5523c156 1836 uint32_t actual_table;
d62a17ae 1837 int suc = 0;
1838 struct mcast_route_data *mr = (struct mcast_route_data *)in;
bd8b9272
DS
1839 struct {
1840 struct nlmsghdr n;
1841 struct ndmsg ndm;
1842 char buf[256];
1843 } req;
e3be0432 1844
d62a17ae 1845 mroute = mr;
5895d33f 1846 struct zebra_ns *zns;
bd8b9272 1847
009f8ad5 1848 zns = zvrf->zns;
5605ecfc 1849 memset(&req, 0, sizeof(req));
bd8b9272
DS
1850
1851 req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ndmsg));
1852 req.n.nlmsg_flags = NLM_F_REQUEST;
1853 req.n.nlmsg_pid = zns->netlink_cmd.snl.nl_pid;
1854
1855 req.ndm.ndm_family = RTNL_FAMILY_IPMR;
1856 req.n.nlmsg_type = RTM_GETROUTE;
1857
1858 addattr_l(&req.n, sizeof(req), RTA_IIF, &mroute->ifindex, 4);
1859 addattr_l(&req.n, sizeof(req), RTA_OIF, &mroute->ifindex, 4);
1860 addattr_l(&req.n, sizeof(req), RTA_SRC, &mroute->sg.src.s_addr, 4);
1861 addattr_l(&req.n, sizeof(req), RTA_DST, &mroute->sg.grp.s_addr, 4);
5523c156
DS
1862 /*
1863 * What?
1864 *
1865 * So during the namespace cleanup we started storing
1866 * the zvrf table_id for the default table as RT_TABLE_MAIN
1867 * which is what the normal routing table for ip routing is.
1868 * This change caused this to break our lookups of sg data
1869 * because prior to this change the zvrf->table_id was 0
1870 * and when the pim multicast kernel code saw a 0,
1871 * it was auto-translated to RT_TABLE_DEFAULT. But since
1872 * we are now passing in RT_TABLE_MAIN there is no auto-translation
1873 * and the kernel goes screw you and the delicious cookies you
1874 * are trying to give me. So now we have this little hack.
1875 */
1876 actual_table = (zvrf->table_id == RT_TABLE_MAIN) ? RT_TABLE_DEFAULT :
1877 zvrf->table_id;
1878 addattr_l(&req.n, sizeof(req), RTA_TABLE, &actual_table, 4);
e3be0432 1879
bd8b9272
DS
1880 suc = netlink_talk(netlink_route_change_read_multicast, &req.n,
1881 &zns->netlink_cmd, zns, 0);
e3be0432 1882
bd8b9272 1883 mroute = NULL;
d62a17ae 1884 return suc;
e3be0432
DS
1885}
1886
565ce0d3
SW
1887/**
1888 * _netlink_nexthop_build_group() - Build a nexthop_grp struct for a nlmsg
1889 *
1890 * @n: Netlink message header struct
1891 * @req_size: Size allocated for this message
0c8215cb
SW
1892 * @depends_info: Array of depend_info structs
1893 * @count: How many depencies there are
565ce0d3
SW
1894 */
1895static void _netlink_nexthop_build_group(struct nlmsghdr *n, size_t req_size,
0c8215cb
SW
1896 const struct depend_info *depends_info,
1897 const uint8_t count)
565ce0d3 1898{
565ce0d3 1899 struct nexthop_grp grp[count];
565ce0d3
SW
1900
1901 memset(grp, 0, sizeof(grp));
1902
1903 if (count) {
0c8215cb
SW
1904 for (int i = 0; i < count; i++) {
1905 grp[i].id = depends_info[i].id;
1906 grp[i].weight = depends_info[i].weight;
565ce0d3 1907 }
0c8215cb 1908 addattr_l(n, req_size, NHA_GROUP, grp, count * sizeof(*grp));
565ce0d3 1909 }
565ce0d3
SW
1910}
1911
f820d025
SW
1912/**
1913 * netlink_nexthop() - Nexthop change via the netlink interface
1914 *
1915 * @ctx: Dataplane ctx
1916 *
1917 * Return: Result status
1918 */
1919static int netlink_nexthop(int cmd, struct zebra_dplane_ctx *ctx)
1920{
f820d025
SW
1921 struct {
1922 struct nlmsghdr n;
1923 struct nhmsg nhm;
1924 char buf[NL_PKT_BUF_SIZE];
1925 } req;
1926
1927 memset(&req, 0, sizeof(req));
1928
f820d025
SW
1929 req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct nhmsg));
1930 req.n.nlmsg_flags = NLM_F_CREATE | NLM_F_REQUEST;
1931 req.n.nlmsg_type = cmd;
4f096395 1932 req.n.nlmsg_pid = dplane_ctx_get_ns(ctx)->nls.snl.nl_pid;
f820d025
SW
1933
1934 req.nhm.nh_family = AF_UNSPEC;
1935 // TODO: Scope?
1936
0c8215cb
SW
1937 uint32_t id = dplane_ctx_get_nhe_id(ctx);
1938
1939 if (!id) {
f820d025
SW
1940 flog_err(
1941 EC_ZEBRA_NHG_FIB_UPDATE,
1942 "Failed trying to update a nexthop group in the kernel that does not have an ID");
1943 return -1;
1944 }
1945
0c8215cb 1946 addattr32(&req.n, sizeof(req), NHA_ID, id);
f820d025
SW
1947
1948 if (cmd == RTM_NEWNEXTHOP) {
0c8215cb
SW
1949 if (dplane_ctx_get_nhe_depends_count(ctx))
1950 _netlink_nexthop_build_group(
1951 &req.n, sizeof(req),
1952 dplane_ctx_get_nhe_depends_info(ctx),
1953 dplane_ctx_get_nhe_depends_count(ctx));
1954 else {
1955 const struct nexthop *nh =
1956 dplane_ctx_get_nhe_ng(ctx)->nexthop;
1957 afi_t afi = dplane_ctx_get_nhe_afi(ctx);
e8b0e420 1958
0c8215cb 1959 if (afi == AFI_IP)
565ce0d3 1960 req.nhm.nh_family = AF_INET;
0c8215cb 1961 else if (afi == AFI_IP6)
565ce0d3 1962 req.nhm.nh_family = AF_INET6;
f820d025 1963
565ce0d3
SW
1964 switch (nh->type) {
1965 case NEXTHOP_TYPE_IPV4_IFINDEX:
1966 addattr_l(&req.n, sizeof(req), NHA_GATEWAY,
1967 &nh->gate.ipv4, IPV4_MAX_BYTELEN);
1968 break;
1969 case NEXTHOP_TYPE_IPV6_IFINDEX:
1970 addattr_l(&req.n, sizeof(req), NHA_GATEWAY,
1971 &nh->gate.ipv6, IPV6_MAX_BYTELEN);
1972 break;
1973 case NEXTHOP_TYPE_BLACKHOLE:
1974 // TODO: Handle this
1975 addattr_l(&req.n, sizeof(req), NHA_BLACKHOLE,
1976 NULL, 0);
1977 break;
1978 case NEXTHOP_TYPE_IFINDEX:
1979 /* Don't need anymore info for this */
1980 break;
1981 case NEXTHOP_TYPE_IPV4:
1982 case NEXTHOP_TYPE_IPV6:
1983 flog_err(
1984 EC_ZEBRA_NHG_FIB_UPDATE,
1985 "Context received for kernel nexthop update without an interface");
1986 return -1;
1987 break;
1988 }
1989
1990 addattr32(&req.n, sizeof(req), NHA_OIF, nh->ifindex);
1991 // TODO: Handle Encap
f820d025
SW
1992 }
1993
f820d025
SW
1994 req.nhm.nh_protocol = zebra2proto(dplane_ctx_get_type(ctx));
1995
f820d025
SW
1996 } else if (cmd != RTM_DELNEXTHOP) {
1997 flog_err(
1998 EC_ZEBRA_NHG_FIB_UPDATE,
1999 "Nexthop group kernel update command (%d) does not exist",
2000 cmd);
2001 return -1;
2002 }
2003
0c8215cb 2004 _netlink_nexthop_debug(cmd, id);
f820d025
SW
2005
2006 return netlink_talk_info(netlink_talk_filter, &req.n,
2007 dplane_ctx_get_ns(ctx), 0);
2008}
2009
2010/**
2011 * kernel_nexthop_update() - Update/delete a nexthop from the kernel
2012 *
2013 * @ctx: Dataplane context
2014 *
2015 * Return: Dataplane result flag
2016 */
2017enum zebra_dplane_result kernel_nexthop_update(struct zebra_dplane_ctx *ctx)
2018{
2019 int cmd, ret = 0;
2020
2021 switch (dplane_ctx_get_op(ctx)) {
2022 case DPLANE_OP_NH_DELETE:
2023 cmd = RTM_DELNEXTHOP;
2024 break;
2025 case DPLANE_OP_NH_INSTALL:
2026 case DPLANE_OP_NH_UPDATE:
2027 cmd = RTM_NEWNEXTHOP;
2028 break;
2029 case DPLANE_OP_ROUTE_INSTALL:
2030 case DPLANE_OP_ROUTE_UPDATE:
2031 case DPLANE_OP_ROUTE_DELETE:
2032 case DPLANE_OP_ROUTE_NOTIFY:
2033 case DPLANE_OP_LSP_INSTALL:
2034 case DPLANE_OP_LSP_UPDATE:
2035 case DPLANE_OP_LSP_DELETE:
2036 case DPLANE_OP_LSP_NOTIFY:
2037 case DPLANE_OP_PW_INSTALL:
2038 case DPLANE_OP_PW_UNINSTALL:
2039 case DPLANE_OP_SYS_ROUTE_ADD:
2040 case DPLANE_OP_SYS_ROUTE_DELETE:
2041 case DPLANE_OP_ADDR_INSTALL:
2042 case DPLANE_OP_ADDR_UNINSTALL:
2043 case DPLANE_OP_MAC_INSTALL:
2044 case DPLANE_OP_MAC_DELETE:
2045 case DPLANE_OP_NONE:
2046 flog_err(
2047 EC_ZEBRA_NHG_FIB_UPDATE,
2048 "Context received for kernel nexthop update with incorrect OP code (%u)",
2049 dplane_ctx_get_op(ctx));
2050 return ZEBRA_DPLANE_REQUEST_FAILURE;
2051 break;
2052 }
2053
2054 ret = netlink_nexthop(cmd, ctx);
2055
2056 return (ret == 0 ? ZEBRA_DPLANE_REQUEST_SUCCESS
2057 : ZEBRA_DPLANE_REQUEST_FAILURE);
2058}
2059
7cdb1a84
MS
2060/*
2061 * Update or delete a prefix from the kernel,
2062 * using info from a dataplane context.
2063 */
25779064 2064enum zebra_dplane_result kernel_route_update(struct zebra_dplane_ctx *ctx)
7cdb1a84
MS
2065{
2066 int cmd, ret;
2067 const struct prefix *p = dplane_ctx_get_dest(ctx);
f183e380 2068 struct nexthop *nexthop;
7cdb1a84
MS
2069
2070 if (dplane_ctx_get_op(ctx) == DPLANE_OP_ROUTE_DELETE) {
2071 cmd = RTM_DELROUTE;
2072 } else if (dplane_ctx_get_op(ctx) == DPLANE_OP_ROUTE_INSTALL) {
2073 cmd = RTM_NEWROUTE;
2074 } else if (dplane_ctx_get_op(ctx) == DPLANE_OP_ROUTE_UPDATE) {
2075
2076 if (p->family == AF_INET || v6_rr_semantics) {
2077 /* Single 'replace' operation */
2078 cmd = RTM_NEWROUTE;
fe5f21af
DS
2079
2080 /*
2081 * With route replace semantics in place
2082 * for v4 routes and the new route is a system
2083 * route we do not install anything.
2084 * The problem here is that the new system
2085 * route should cause us to withdraw from
2086 * the kernel the old non-system route
2087 */
2088 if (RSYSTEM_ROUTE(dplane_ctx_get_type(ctx)) &&
2089 !RSYSTEM_ROUTE(dplane_ctx_get_old_type(ctx)))
2090 (void)netlink_route_multipath(RTM_DELROUTE,
2091 ctx);
7cdb1a84
MS
2092 } else {
2093 /*
2094 * So v6 route replace semantics are not in
2095 * the kernel at this point as I understand it.
2096 * so let's do a delete then an add.
2097 * In the future once v6 route replace semantics
2098 * are in we can figure out what to do here to
2099 * allow working with old and new kernels.
2100 *
2101 * I'm also intentionally ignoring the failure case
2102 * of the route delete. If that happens yeah we're
2103 * screwed.
2104 */
3cdba47a
DS
2105 if (!RSYSTEM_ROUTE(dplane_ctx_get_old_type(ctx)))
2106 (void)netlink_route_multipath(RTM_DELROUTE,
2107 ctx);
7cdb1a84
MS
2108 cmd = RTM_NEWROUTE;
2109 }
2110
2111 } else {
2112 return ZEBRA_DPLANE_REQUEST_FAILURE;
2113 }
2114
3cdba47a
DS
2115 if (!RSYSTEM_ROUTE(dplane_ctx_get_type(ctx)))
2116 ret = netlink_route_multipath(cmd, ctx);
2117 else
2118 ret = 0;
f183e380
MS
2119 if ((cmd == RTM_NEWROUTE) && (ret == 0)) {
2120 /* Update installed nexthops to signal which have been
2121 * installed.
2122 */
2123 for (ALL_NEXTHOPS_PTR(dplane_ctx_get_ng(ctx), nexthop)) {
2124 if (CHECK_FLAG(nexthop->flags, NEXTHOP_FLAG_RECURSIVE))
2125 continue;
2126
2127 if (CHECK_FLAG(nexthop->flags, NEXTHOP_FLAG_ACTIVE)) {
2128 SET_FLAG(nexthop->flags, NEXTHOP_FLAG_FIB);
f183e380
MS
2129 }
2130 }
2131 }
7cdb1a84
MS
2132
2133 return (ret == 0 ?
2134 ZEBRA_DPLANE_REQUEST_SUCCESS : ZEBRA_DPLANE_REQUEST_FAILURE);
2135}
2136
d9f5b2f5
SW
2137/**
2138 * netlink_nexthop_process_nh() - Parse the gatway/if info from a new nexthop
2139 *
2140 * @tb: Netlink RTA data
2141 * @family: Address family in the nhmsg
8c0a24c1 2142 * @ifp: Interface connected - this should be NULL, we fill it in
d9f5b2f5
SW
2143 * @ns_id: Namspace id
2144 *
2145 * Return: New nexthop
2146 */
8e401b25
SW
2147static struct nexthop *netlink_nexthop_process_nh(struct rtattr **tb,
2148 unsigned char family,
2149 struct interface **ifp,
2150 ns_id_t ns_id)
d9f5b2f5 2151{
8e401b25 2152 struct nexthop *nh = NULL;
d9f5b2f5 2153 void *gate = NULL;
8e401b25 2154 enum nexthop_types_t type = 0;
d9f5b2f5
SW
2155 int if_index;
2156 size_t sz;
2157
2158 if_index = *(int *)RTA_DATA(tb[NHA_OIF]);
2159
8e401b25 2160
d9f5b2f5
SW
2161 if (tb[NHA_GATEWAY]) {
2162 switch (family) {
2163 case AF_INET:
8e401b25 2164 type = NEXTHOP_TYPE_IPV4_IFINDEX;
d9f5b2f5
SW
2165 sz = 4;
2166 break;
2167 case AF_INET6:
8e401b25 2168 type = NEXTHOP_TYPE_IPV6_IFINDEX;
d9f5b2f5
SW
2169 sz = 16;
2170 break;
2171 default:
2172 flog_warn(
2173 EC_ZEBRA_BAD_NHG_MESSAGE,
c4239c05 2174 "Nexthop gateway with bad address family (%d) received from kernel",
d9f5b2f5 2175 family);
8e401b25 2176 return NULL;
d9f5b2f5
SW
2177 }
2178 gate = RTA_DATA(tb[NHA_GATEWAY]);
d9f5b2f5 2179 } else {
8e401b25 2180 type = NEXTHOP_TYPE_IFINDEX;
d9f5b2f5
SW
2181 }
2182
8e401b25
SW
2183 /* Allocate the new nexthop */
2184 nh = nexthop_new();
d9f5b2f5 2185
8e401b25
SW
2186 if (type)
2187 nh->type = type;
2188
2189 if (gate)
2190 memcpy(&(nh->gate), gate, sz);
2191
2192 if (if_index)
2193 nh->ifindex = if_index;
2194
2195 *ifp = if_lookup_by_index_per_ns(zebra_ns_lookup(ns_id), nh->ifindex);
d9f5b2f5 2196 if (ifp) {
8e401b25 2197 nh->vrf_id = (*ifp)->vrf_id;
d9f5b2f5
SW
2198 } else {
2199 flog_warn(
2200 EC_ZEBRA_UNKNOWN_INTERFACE,
2201 "%s: Unknown nexthop interface %u received, defaulting to VRF_DEFAULT",
8e401b25 2202 __PRETTY_FUNCTION__, nh->ifindex);
d9f5b2f5 2203
8e401b25 2204 nh->vrf_id = VRF_DEFAULT;
d9f5b2f5
SW
2205 }
2206
2207 if (tb[NHA_ENCAP] && tb[NHA_ENCAP_TYPE]) {
2208 uint16_t encap_type = *(uint16_t *)RTA_DATA(tb[NHA_ENCAP_TYPE]);
2209 int num_labels = 0;
2210 mpls_label_t labels[MPLS_MAX_LABELS] = {0};
2211
2212 if (encap_type == LWTUNNEL_ENCAP_MPLS) {
2213 num_labels = parse_encap_mpls(tb[NHA_ENCAP], labels);
2214 }
2215
2216 if (num_labels) {
8e401b25 2217 nexthop_add_labels(nh, ZEBRA_LSP_STATIC, num_labels,
d9f5b2f5
SW
2218 labels);
2219 }
2220 }
2221
2222 return nh;
2223}
2224
2225/**
2226 * netlink_nexthop_process_group() - Iterate over nhmsg nexthop group
2227 *
85f5e761 2228 * @tb: Netlink RTA data
a15d4c00 2229 * @nhg_depends: Tree head of nexthops in the group
85f5e761 2230 * @nhg: Nexthop group struct
d9f5b2f5 2231 *
85f5e761 2232 * Return: Count of nexthops in the group
d9f5b2f5 2233 */
85f5e761
SW
2234static int netlink_nexthop_process_group(struct rtattr **tb,
2235 struct nexthop_group *nhg,
a15d4c00 2236 struct nhg_connected_head *nhg_depends)
d9f5b2f5 2237{
85f5e761 2238 int count = 0;
d9f5b2f5 2239 struct nexthop_grp *n_grp = NULL;
85f5e761 2240 struct nhg_hash_entry *depend = NULL;
d9f5b2f5 2241
85f5e761 2242 n_grp = (struct nexthop_grp *)RTA_DATA(tb[NHA_GROUP]);
d9f5b2f5
SW
2243 count = (RTA_PAYLOAD(tb[NHA_GROUP]) / sizeof(*n_grp));
2244
2245 if (!count || (count * sizeof(*n_grp)) != RTA_PAYLOAD(tb[NHA_GROUP])) {
2246 flog_warn(EC_ZEBRA_BAD_NHG_MESSAGE,
2247 "Invalid nexthop group received from the kernel");
85f5e761 2248 return count;
d9f5b2f5
SW
2249 }
2250
2251 // TODO: Need type for something?
85f5e761
SW
2252 zlog_debug("Nexthop group type: %d",
2253 *((uint16_t *)RTA_DATA(tb[NHA_GROUP_TYPE])));
d9f5b2f5 2254
fe593b78 2255 nhg_connected_head_init(nhg_depends);
d9f5b2f5
SW
2256
2257 for (int i = 0; i < count; i++) {
d9f5b2f5
SW
2258 /* We do not care about nexthop_grp.weight at
2259 * this time. But we should figure out
2260 * how to adapt this to our code in
2261 * the future.
2262 */
85f5e761
SW
2263 depend = zebra_nhg_lookup_id(n_grp[i].id);
2264 if (depend) {
fe593b78 2265 nhg_connected_head_add(nhg_depends, depend);
85f5e761
SW
2266 /*
2267 * If this is a nexthop with its own group
2268 * dependencies, add them as well. Not sure its
2269 * even possible to have a group within a group
2270 * in the kernel.
2271 */
d9f5b2f5 2272
8e401b25
SW
2273 copy_nexthops(&nhg->nexthop, depend->nhg->nexthop,
2274 NULL);
85f5e761
SW
2275 } else {
2276 flog_err(
2277 EC_ZEBRA_NHG_SYNC,
2278 "Received Nexthop Group from the kernel with a dependent Nexthop ID (%u) which we do not have in our table",
2279 n_grp[i].id);
2280 }
2281 }
d9f5b2f5
SW
2282 return count;
2283}
2284
2285/**
2286 * netlink_nexthop_change() - Read in change about nexthops from the kernel
2287 *
2288 * @h: Netlink message header
2289 * @ns_id: Namspace id
2290 * @startup: Are we reading under startup conditions?
2291 *
2292 * Return: Result status
2293 */
2294int netlink_nexthop_change(struct nlmsghdr *h, ns_id_t ns_id, int startup)
2295{
2296 int len;
2297 /* nexthop group id */
2298 uint32_t id;
2299 unsigned char family;
e8b0e420 2300 afi_t afi = AFI_UNSPEC;
bbb3940e 2301 vrf_id_t vrf_id = 0;
8c0a24c1 2302 struct interface *ifp = NULL;
d9f5b2f5
SW
2303 struct nhmsg *nhm = NULL;
2304 /* struct for nexthop group abstraction */
8e401b25
SW
2305 struct nexthop_group *nhg = NULL;
2306 struct nexthop *nh = NULL;
0c8215cb 2307 /* If its a group, tree head of nexthops */
a15d4c00 2308 struct nhg_connected_head nhg_depends = {0};
85f5e761
SW
2309 /* Count of nexthops in group array */
2310 int dep_count = 0;
d9f5b2f5
SW
2311 /* struct that goes into our tables */
2312 struct nhg_hash_entry *nhe = NULL;
2313 struct rtattr *tb[NHA_MAX + 1];
2314
2315
2316 nhm = NLMSG_DATA(h);
2317
2318 if (startup && h->nlmsg_type != RTM_NEWNEXTHOP)
2319 return 0;
2320
2321 len = h->nlmsg_len - NLMSG_LENGTH(sizeof(struct nhmsg));
2322 if (len < 0) {
2323 zlog_warn(
2324 "%s: Message received from netlink is of a broken size %d %zu",
2325 __PRETTY_FUNCTION__, h->nlmsg_len,
2326 (size_t)NLMSG_LENGTH(sizeof(struct nhmsg)));
2327 return -1;
2328 }
2329
2330 memset(tb, 0, sizeof(tb));
2331 netlink_parse_rtattr(tb, NHA_MAX, RTM_NHA(nhm), len);
2332
2333
2334 if (!tb[NHA_ID]) {
2335 flog_warn(
2336 EC_ZEBRA_BAD_NHG_MESSAGE,
2337 "Nexthop group without an ID received from the kernel");
2338 return -1;
2339 }
2340
2341 /* We use the ID key'd nhg table for kernel updates */
2342 id = *((uint32_t *)RTA_DATA(tb[NHA_ID]));
d9f5b2f5 2343
e8b0e420
SW
2344 family = nhm->nh_family;
2345
2346 afi = family2afi(family);
2347
fdee485a
SW
2348 if (IS_ZEBRA_DEBUG_KERNEL)
2349 zlog_debug("%s ID (%u) %s NS %u",
2350 nl_msg_type_to_str(h->nlmsg_type), id,
2351 nl_family_to_str(family), ns_id);
2352
2353
d9f5b2f5
SW
2354 nhe = zebra_nhg_lookup_id(id);
2355
2356 if (h->nlmsg_type == RTM_NEWNEXTHOP) {
8e401b25
SW
2357 nhg = nexthop_group_new();
2358
d9f5b2f5
SW
2359 if (tb[NHA_GROUP]) {
2360 /**
2361 * If this is a group message its only going to have
2362 * an array of nexthop IDs associated with it
2363 */
8e401b25 2364 dep_count = netlink_nexthop_process_group(tb, nhg,
85f5e761
SW
2365 &nhg_depends);
2366 } else {
2367 if (tb[NHA_BLACKHOLE]) {
2368 /**
2369 * This nexthop is just for blackhole-ing
2370 * traffic, it should not have an OIF, GATEWAY,
2371 * or ENCAP
2372 */
8e401b25
SW
2373 nh = nexthop_new();
2374 nh->type = NEXTHOP_TYPE_BLACKHOLE;
2375 nh->bh_type = BLACKHOLE_UNSPEC;
85f5e761
SW
2376 } else if (tb[NHA_OIF]) {
2377 /**
2378 * This is a true new nexthop, so we need
2379 * to parse the gateway and device info
2380 */
2381 nh = netlink_nexthop_process_nh(tb, family,
2382 &ifp, ns_id);
2383 }
8e401b25
SW
2384 if (nh) {
2385 SET_FLAG(nh->flags, NEXTHOP_FLAG_ACTIVE);
2386 if (nhm->nh_flags & RTNH_F_ONLINK)
2387 SET_FLAG(nh->flags,
2388 NEXTHOP_FLAG_ONLINK);
55eeb2ae 2389 vrf_id = nh->vrf_id;
8e401b25
SW
2390 nexthop_group_add_sorted(nhg, nh);
2391 } else {
2392 flog_warn(
2393 EC_ZEBRA_BAD_NHG_MESSAGE,
2394 "Invalid Nexthop message received from the kernel with ID (%u)",
2395 id);
2396 return -1;
2397 }
d9f5b2f5
SW
2398 }
2399
8e401b25
SW
2400 if (!nhg->nexthop) {
2401 /* Nothing to lookup */
ddaee0c7
SW
2402 nexthop_group_free_delete(&nhg);
2403 nhg_connected_head_free(&nhg_depends);
a3267f8b 2404 return -1;
8e401b25 2405 }
d9f5b2f5
SW
2406
2407 if (nhe) {
0c8215cb
SW
2408 // TODO: Apparently we don't want changes
2409 // to already created one in our table.
2410 // They should be immutable...
2411 // Gotta figure that one out.
2412
85f5e761
SW
2413 /* This is a change to a group we already have
2414 */
8e401b25 2415
fe593b78 2416 zebra_nhg_set_invalid(nhe);
ddaee0c7
SW
2417 nexthop_group_free_delete(&nhg);
2418 nhg_connected_head_free(&nhg_depends);
8e401b25 2419
d9f5b2f5
SW
2420 } else {
2421 /* This is a new nexthop group */
0c8215cb 2422 nhe = zebra_nhg_find(nhg, vrf_id, afi, id, &nhg_depends,
20822f9d 2423 true);
ddaee0c7 2424 /* The group was copied over, so free it */
0c8215cb 2425 nexthop_group_free_delete(&nhg);
2d6cd1f0 2426
8e401b25
SW
2427 if (!nhe) {
2428 flog_err(
2429 EC_ZEBRA_TABLE_LOOKUP_FAILED,
2430 "Zebra failed to find or create a nexthop hash entry for ID (%u) from the kernel",
2431 id);
d9f5b2f5
SW
2432 return -1;
2433 }
8e401b25
SW
2434
2435 nhe->is_kernel_nh = true;
fe593b78 2436
8e401b25
SW
2437 if (id != nhe->id) {
2438 /* Duplicate but with different ID from
2439 * the kernel */
2440
2441 /* The kernel allows duplicate nexthops
2442 * as long as they have different IDs.
2443 * We are ignoring those to prevent
2444 * syncing problems with the kernel
2445 * changes.
2446 */
2447 flog_warn(
2448 EC_ZEBRA_DUPLICATE_NHG_MESSAGE,
2449 "Nexthop Group from kernel with ID (%d) is a duplicate, ignoring",
2450 id);
fe593b78
SW
2451 nhg_connected_head_free(&nhg_depends);
2452 } else {
fe593b78
SW
2453 SET_FLAG(nhe->flags, NEXTHOP_GROUP_INSTALLED);
2454 SET_FLAG(nhe->flags, NEXTHOP_GROUP_VALID);
8e401b25 2455 }
d9f5b2f5 2456 }
044e54d1 2457
d9f5b2f5
SW
2458 } else if (h->nlmsg_type == RTM_DELNEXTHOP) {
2459 if (!nhe) {
2460 flog_warn(
2461 EC_ZEBRA_BAD_NHG_MESSAGE,
2462 "Kernel delete message received for nexthop group ID (%u) that we do not have in our ID table",
2463 id);
2464 return -1;
2465 }
2466
fe593b78 2467 zebra_nhg_set_invalid(nhe);
044e54d1 2468
fe593b78
SW
2469 // TODO: Probably won't need this if we expect
2470 // upper level protocol to fix it.
75f8505d
SW
2471 if (nhe->refcnt) {
2472 flog_err(
2473 EC_ZEBRA_NHG_SYNC,
2474 "Kernel deleted a nexthop group with ID (%u) that we are still using for a route, sending it back down",
2475 nhe->id);
2476 zebra_nhg_install_kernel(nhe);
2477 } else {
2478 zebra_nhg_release(nhe);
2479 }
d9f5b2f5
SW
2480 }
2481
d9f5b2f5
SW
2482 return 0;
2483}
2484
2485/**
2486 * netlink_request_nexthop() - Request nextop information from the kernel
2487 * @zns: Zebra namespace
2488 * @family: AF_* netlink family
2489 * @type: RTM_* route type
2490 *
2491 * Return: Result status
2492 */
2493static int netlink_request_nexthop(struct zebra_ns *zns, int family, int type)
2494{
2495 struct {
2496 struct nlmsghdr n;
2497 struct nhmsg nhm;
2498 } req;
2499
2500 /* Form the request, specifying filter (rtattr) if needed. */
2501 memset(&req, 0, sizeof(req));
2502 req.n.nlmsg_type = type;
2503 req.n.nlmsg_flags = NLM_F_ROOT | NLM_F_MATCH | NLM_F_REQUEST;
2504 req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct nhmsg));
2505 req.nhm.nh_family = family;
2506
2507 return netlink_request(&zns->netlink_cmd, &req.n);
2508}
2509
2510/**
2511 * netlink_nexthop_read() - Nexthop read function using netlink interface
2512 *
2513 * @zns: Zebra name space
2514 *
2515 * Return: Result status
2516 * Only called at bootstrap time.
2517 */
2518int netlink_nexthop_read(struct zebra_ns *zns)
2519{
2520 int ret;
2521 struct zebra_dplane_info dp_info;
2522
2523 zebra_dplane_info_from_zns(&dp_info, zns, true /*is_cmd*/);
2524
2525 /* Get nexthop objects */
2526 ret = netlink_request_nexthop(zns, AF_UNSPEC, RTM_GETNEXTHOP);
2527 if (ret < 0)
2528 return ret;
2529 ret = netlink_parse_info(netlink_nexthop_change, &zns->netlink_cmd,
2530 &dp_info, 0, 1);
60e0eaee 2531 return ret;
d9f5b2f5
SW
2532}
2533
2534
d62a17ae 2535int kernel_neigh_update(int add, int ifindex, uint32_t addr, char *lla,
5895d33f 2536 int llalen, ns_id_t ns_id)
6b8a5694 2537{
d62a17ae 2538 return netlink_neigh_update(add ? RTM_NEWNEIGH : RTM_DELNEIGH, ifindex,
5895d33f 2539 addr, lla, llalen, ns_id);
6b8a5694 2540}
718e3744 2541
13d60d35 2542/*
2543 * Add remote VTEP to the flood list for this VxLAN interface (VNI). This
2544 * is done by adding an FDB entry with a MAC of 00:00:00:00:00:00.
2545 */
0bbd4ff4
MS
2546static int netlink_vxlan_flood_update_ctx(const struct zebra_dplane_ctx *ctx,
2547 int cmd)
13d60d35 2548{
f3dbec60 2549 uint8_t protocol = RTPROT_ZEBRA;
d62a17ae 2550 struct {
2551 struct nlmsghdr n;
2552 struct ndmsg ndm;
2553 char buf[256];
2554 } req;
d7c0a89a 2555 uint8_t dst_mac[6] = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0};
0bbd4ff4 2556 const struct ipaddr *addr;
d62a17ae 2557
5605ecfc 2558 memset(&req, 0, sizeof(req));
d62a17ae 2559
2560 req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ndmsg));
2561 req.n.nlmsg_flags = NLM_F_REQUEST;
2562 if (cmd == RTM_NEWNEIGH)
2563 req.n.nlmsg_flags |= (NLM_F_CREATE | NLM_F_APPEND);
2564 req.n.nlmsg_type = cmd;
2565 req.ndm.ndm_family = PF_BRIDGE;
2566 req.ndm.ndm_state = NUD_NOARP | NUD_PERMANENT;
2567 req.ndm.ndm_flags |= NTF_SELF; // Handle by "self", not "master"
2568
2569
f3dbec60
DS
2570 addattr_l(&req.n, sizeof(req),
2571 NDA_PROTOCOL, &protocol, sizeof(protocol));
d62a17ae 2572 addattr_l(&req.n, sizeof(req), NDA_LLADDR, &dst_mac, 6);
0bbd4ff4 2573 req.ndm.ndm_ifindex = dplane_ctx_get_ifindex(ctx);
13d60d35 2574
0bbd4ff4 2575 addr = dplane_ctx_neigh_get_ipaddr(ctx);
13d60d35 2576
0bbd4ff4 2577 addattr_l(&req.n, sizeof(req), NDA_DST, &(addr->ipaddr_v4), 4);
13d60d35 2578
0bbd4ff4
MS
2579 return netlink_talk_info(netlink_talk_filter, &req.n,
2580 dplane_ctx_get_ns(ctx), 0);
13d60d35 2581}
2582
2232a77c 2583#ifndef NDA_RTA
d62a17ae 2584#define NDA_RTA(r) \
2585 ((struct rtattr *)(((char *)(r)) + NLMSG_ALIGN(sizeof(struct ndmsg))))
2232a77c 2586#endif
2587
2414abd3 2588static int netlink_macfdb_change(struct nlmsghdr *h, int len, ns_id_t ns_id)
2232a77c 2589{
d62a17ae 2590 struct ndmsg *ndm;
2591 struct interface *ifp;
2592 struct zebra_if *zif;
d62a17ae 2593 struct rtattr *tb[NDA_MAX + 1];
2594 struct interface *br_if;
2595 struct ethaddr mac;
2596 vlanid_t vid = 0;
2597 struct prefix vtep_ip;
2598 int vid_present = 0, dst_present = 0;
2599 char buf[ETHER_ADDR_STRLEN];
2600 char vid_buf[20];
2601 char dst_buf[30];
a37f4598 2602 bool sticky;
d62a17ae 2603
2604 ndm = NLMSG_DATA(h);
2605
2853fed6 2606 /* We only process macfdb notifications if EVPN is enabled */
2607 if (!is_evpn_enabled())
2608 return 0;
2609
d62a17ae 2610 /* The interface should exist. */
5895d33f 2611 ifp = if_lookup_by_index_per_ns(zebra_ns_lookup(ns_id),
d62a17ae 2612 ndm->ndm_ifindex);
28bd0652
DS
2613 if (!ifp || !ifp->info) {
2614 if (IS_ZEBRA_DEBUG_KERNEL)
2615 zlog_debug("\t%s without associated interface: %u",
2616 __PRETTY_FUNCTION__, ndm->ndm_ifindex);
d62a17ae 2617 return 0;
28bd0652 2618 }
d62a17ae 2619
2620 /* The interface should be something we're interested in. */
28bd0652
DS
2621 if (!IS_ZEBRA_IF_BRIDGE_SLAVE(ifp)) {
2622 if (IS_ZEBRA_DEBUG_KERNEL)
2623 zlog_debug("\t%s Not interested in %s, not a slave",
2624 __PRETTY_FUNCTION__, ifp->name);
d62a17ae 2625 return 0;
28bd0652 2626 }
d62a17ae 2627
2628 /* Drop "permanent" entries. */
28bd0652
DS
2629 if (ndm->ndm_state & NUD_PERMANENT) {
2630 if (IS_ZEBRA_DEBUG_KERNEL)
2631 zlog_debug("\t%s Entry is PERMANENT, dropping",
2632 __PRETTY_FUNCTION__);
d62a17ae 2633 return 0;
28bd0652 2634 }
d62a17ae 2635
2636 zif = (struct zebra_if *)ifp->info;
2637 if ((br_if = zif->brslave_info.br_if) == NULL) {
28bd0652
DS
2638 if (IS_ZEBRA_DEBUG_KERNEL)
2639 zlog_debug(
2640 "%s family %s IF %s(%u) brIF %u - no bridge master",
2641 nl_msg_type_to_str(h->nlmsg_type),
2642 nl_family_to_str(ndm->ndm_family), ifp->name,
2643 ndm->ndm_ifindex,
2644 zif->brslave_info.bridge_ifindex);
d62a17ae 2645 return 0;
2646 }
2647
2648 /* Parse attributes and extract fields of interest. */
2649 memset(tb, 0, sizeof tb);
2650 netlink_parse_rtattr(tb, NDA_MAX, NDA_RTA(ndm), len);
2651
2652 if (!tb[NDA_LLADDR]) {
28bd0652
DS
2653 if (IS_ZEBRA_DEBUG_KERNEL)
2654 zlog_debug("%s family %s IF %s(%u) brIF %u - no LLADDR",
2655 nl_msg_type_to_str(h->nlmsg_type),
2656 nl_family_to_str(ndm->ndm_family), ifp->name,
2657 ndm->ndm_ifindex,
2658 zif->brslave_info.bridge_ifindex);
d62a17ae 2659 return 0;
2660 }
2661
ff8b7eb8 2662 if (RTA_PAYLOAD(tb[NDA_LLADDR]) != ETH_ALEN) {
28bd0652
DS
2663 if (IS_ZEBRA_DEBUG_KERNEL)
2664 zlog_debug(
2665 "%s family %s IF %s(%u) brIF %u - LLADDR is not MAC, len %lu",
2666 nl_msg_type_to_str(h->nlmsg_type),
2667 nl_family_to_str(ndm->ndm_family), ifp->name,
2668 ndm->ndm_ifindex,
2669 zif->brslave_info.bridge_ifindex,
2670 (unsigned long)RTA_PAYLOAD(tb[NDA_LLADDR]));
d62a17ae 2671 return 0;
2672 }
2673
ff8b7eb8 2674 memcpy(&mac, RTA_DATA(tb[NDA_LLADDR]), ETH_ALEN);
d62a17ae 2675
2676 if ((NDA_VLAN <= NDA_MAX) && tb[NDA_VLAN]) {
2677 vid_present = 1;
d7c0a89a 2678 vid = *(uint16_t *)RTA_DATA(tb[NDA_VLAN]);
d62a17ae 2679 sprintf(vid_buf, " VLAN %u", vid);
2680 }
2681
2682 if (tb[NDA_DST]) {
2683 /* TODO: Only IPv4 supported now. */
2684 dst_present = 1;
2685 vtep_ip.family = AF_INET;
2686 vtep_ip.prefixlen = IPV4_MAX_BITLEN;
2687 memcpy(&(vtep_ip.u.prefix4.s_addr), RTA_DATA(tb[NDA_DST]),
2688 IPV4_MAX_BYTELEN);
2689 sprintf(dst_buf, " dst %s", inet_ntoa(vtep_ip.u.prefix4));
2690 }
2691
a37f4598 2692 sticky = !!(ndm->ndm_state & NUD_NOARP);
d62a17ae 2693
2694 if (IS_ZEBRA_DEBUG_KERNEL)
2695 zlog_debug("Rx %s family %s IF %s(%u)%s %sMAC %s%s",
2696 nl_msg_type_to_str(h->nlmsg_type),
2697 nl_family_to_str(ndm->ndm_family), ifp->name,
2698 ndm->ndm_ifindex, vid_present ? vid_buf : "",
2699 sticky ? "sticky " : "",
2700 prefix_mac2str(&mac, buf, sizeof(buf)),
2701 dst_present ? dst_buf : "");
2702
28bd0652
DS
2703 if (filter_vlan && vid != filter_vlan) {
2704 if (IS_ZEBRA_DEBUG_KERNEL)
2705 zlog_debug("\tFiltered due to filter vlan: %d",
2706 filter_vlan);
d62a17ae 2707 return 0;
28bd0652 2708 }
d62a17ae 2709
2710 /* If add or update, do accordingly if learnt on a "local" interface; if
2711 * the notification is over VxLAN, this has to be related to
2712 * multi-homing,
2713 * so perform an implicit delete of any local entry (if it exists).
2714 */
2715 if (h->nlmsg_type == RTM_NEWNEIGH) {
d62a17ae 2716 if (IS_ZEBRA_IF_VXLAN(ifp))
2717 return zebra_vxlan_check_del_local_mac(ifp, br_if, &mac,
2718 vid);
2719
2720 return zebra_vxlan_local_mac_add_update(ifp, br_if, &mac, vid,
2721 sticky);
2722 }
2723
2724 /* This is a delete notification.
2725 * 1. For a MAC over VxLan, check if it needs to be refreshed(readded)
2726 * 2. For a MAC over "local" interface, delete the mac
2727 * Note: We will get notifications from both bridge driver and VxLAN
2728 * driver.
2729 * Ignore the notification from VxLan driver as it is also generated
2730 * when mac moves from remote to local.
2731 */
28bd0652
DS
2732 if (dst_present) {
2733 if (IS_ZEBRA_DEBUG_KERNEL)
2734 zlog_debug("\tNo Destination Present");
d62a17ae 2735 return 0;
28bd0652 2736 }
d62a17ae 2737
2738 if (IS_ZEBRA_IF_VXLAN(ifp))
2739 return zebra_vxlan_check_readd_remote_mac(ifp, br_if, &mac,
2740 vid);
2741
2742 return zebra_vxlan_local_mac_del(ifp, br_if, &mac, vid);
2232a77c 2743}
2744
2414abd3 2745static int netlink_macfdb_table(struct nlmsghdr *h, ns_id_t ns_id, int startup)
2232a77c 2746{
d62a17ae 2747 int len;
2748 struct ndmsg *ndm;
2232a77c 2749
d62a17ae 2750 if (h->nlmsg_type != RTM_NEWNEIGH)
2751 return 0;
2232a77c 2752
d62a17ae 2753 /* Length validity. */
2754 len = h->nlmsg_len - NLMSG_LENGTH(sizeof(struct ndmsg));
2755 if (len < 0)
2756 return -1;
2232a77c 2757
d62a17ae 2758 /* We are interested only in AF_BRIDGE notifications. */
2759 ndm = NLMSG_DATA(h);
2760 if (ndm->ndm_family != AF_BRIDGE)
2761 return 0;
2232a77c 2762
2414abd3 2763 return netlink_macfdb_change(h, len, ns_id);
2232a77c 2764}
2765
2766/* Request for MAC FDB information from the kernel */
85a75f1e
MS
2767static int netlink_request_macs(struct nlsock *netlink_cmd, int family,
2768 int type, ifindex_t master_ifindex)
2232a77c 2769{
d62a17ae 2770 struct {
2771 struct nlmsghdr n;
2772 struct ifinfomsg ifm;
2773 char buf[256];
2774 } req;
2775
2776 /* Form the request, specifying filter (rtattr) if needed. */
2777 memset(&req, 0, sizeof(req));
2778 req.n.nlmsg_type = type;
718f9b0f 2779 req.n.nlmsg_flags = NLM_F_ROOT | NLM_F_MATCH | NLM_F_REQUEST;
d62a17ae 2780 req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifinfomsg));
2781 req.ifm.ifi_family = family;
2782 if (master_ifindex)
2783 addattr32(&req.n, sizeof(req), IFLA_MASTER, master_ifindex);
2784
85a75f1e 2785 return netlink_request(netlink_cmd, &req.n);
2232a77c 2786}
2787
2788/*
2789 * MAC forwarding database read using netlink interface. This is invoked
2790 * at startup.
2791 */
d62a17ae 2792int netlink_macfdb_read(struct zebra_ns *zns)
2232a77c 2793{
d62a17ae 2794 int ret;
85a75f1e
MS
2795 struct zebra_dplane_info dp_info;
2796
2797 zebra_dplane_info_from_zns(&dp_info, zns, true /*is_cmd*/);
d62a17ae 2798
2799 /* Get bridge FDB table. */
85a75f1e
MS
2800 ret = netlink_request_macs(&zns->netlink_cmd, AF_BRIDGE, RTM_GETNEIGH,
2801 0);
d62a17ae 2802 if (ret < 0)
2803 return ret;
2804 /* We are reading entire table. */
2805 filter_vlan = 0;
85a75f1e
MS
2806 ret = netlink_parse_info(netlink_macfdb_table, &zns->netlink_cmd,
2807 &dp_info, 0, 1);
d62a17ae 2808
2809 return ret;
2232a77c 2810}
2811
2812/*
2813 * MAC forwarding database read using netlink interface. This is for a
2814 * specific bridge and matching specific access VLAN (if VLAN-aware bridge).
2815 */
d62a17ae 2816int netlink_macfdb_read_for_bridge(struct zebra_ns *zns, struct interface *ifp,
2817 struct interface *br_if)
2232a77c 2818{
d62a17ae 2819 struct zebra_if *br_zif;
2820 struct zebra_if *zif;
2821 struct zebra_l2info_vxlan *vxl;
85a75f1e 2822 struct zebra_dplane_info dp_info;
d62a17ae 2823 int ret = 0;
2824
85a75f1e 2825 zebra_dplane_info_from_zns(&dp_info, zns, true /*is_cmd*/);
d62a17ae 2826
2827 /* Save VLAN we're filtering on, if needed. */
2828 br_zif = (struct zebra_if *)br_if->info;
2829 zif = (struct zebra_if *)ifp->info;
2830 vxl = &zif->l2info.vxl;
2831 if (IS_ZEBRA_IF_BRIDGE_VLAN_AWARE(br_zif))
2832 filter_vlan = vxl->access_vlan;
2833
2834 /* Get bridge FDB table for specific bridge - we do the VLAN filtering.
2835 */
85a75f1e 2836 ret = netlink_request_macs(&zns->netlink_cmd, AF_BRIDGE, RTM_GETNEIGH,
d62a17ae 2837 br_if->ifindex);
2838 if (ret < 0)
2839 return ret;
85a75f1e
MS
2840 ret = netlink_parse_info(netlink_macfdb_table, &zns->netlink_cmd,
2841 &dp_info, 0, 0);
d62a17ae 2842
2843 /* Reset VLAN filter. */
2844 filter_vlan = 0;
2845 return ret;
2232a77c 2846}
2847
67fb9374
CS
2848
2849/* Request for MAC FDB for a specific MAC address in VLAN from the kernel */
2850static int netlink_request_specific_mac_in_bridge(struct zebra_ns *zns,
2851 int family,
2852 int type,
2853 struct interface *br_if,
2854 struct ethaddr *mac,
2855 vlanid_t vid)
2856{
2857 struct {
2858 struct nlmsghdr n;
2859 struct ndmsg ndm;
2860 char buf[256];
2861 } req;
2862 struct zebra_if *br_zif;
2863 char buf[ETHER_ADDR_STRLEN];
2864
2865 memset(&req, 0, sizeof(req));
2866 req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ndmsg));
2867 req.n.nlmsg_type = type; /* RTM_GETNEIGH */
2868 req.n.nlmsg_flags = NLM_F_REQUEST;
2869 req.ndm.ndm_family = family; /* AF_BRIDGE */
2870 /* req.ndm.ndm_state = NUD_REACHABLE; */
2871
2872 addattr_l(&req.n, sizeof(req), NDA_LLADDR, mac, 6);
2873
2874 br_zif = (struct zebra_if *)br_if->info;
2875 if (IS_ZEBRA_IF_BRIDGE_VLAN_AWARE(br_zif) && vid > 0)
2876 addattr16(&req.n, sizeof(req), NDA_VLAN, vid);
2877
2878 addattr32(&req.n, sizeof(req), NDA_MASTER, br_if->ifindex);
2879
2880 if (IS_ZEBRA_DEBUG_KERNEL)
2881 zlog_debug("%s: Tx family %s IF %s(%u) MAC %s vid %u",
2882 __PRETTY_FUNCTION__,
2883 nl_family_to_str(req.ndm.ndm_family), br_if->name,
2884 br_if->ifindex,
2885 prefix_mac2str(mac, buf, sizeof(buf)), vid);
2886
2887 return netlink_request(&zns->netlink_cmd, &req.n);
2888}
2889
2890int netlink_macfdb_read_specific_mac(struct zebra_ns *zns,
2891 struct interface *br_if,
2892 struct ethaddr *mac, vlanid_t vid)
2893{
2894 int ret = 0;
2895 struct zebra_dplane_info dp_info;
2896
2897 zebra_dplane_info_from_zns(&dp_info, zns, true /*is_cmd*/);
2898
2899 /* Get bridge FDB table for specific bridge - we do the VLAN filtering.
2900 */
2901 ret = netlink_request_specific_mac_in_bridge(zns, AF_BRIDGE,
2902 RTM_GETNEIGH,
2903 br_if, mac, vid);
2904 if (ret < 0)
2905 return ret;
2906
2907 ret = netlink_parse_info(netlink_macfdb_table, &zns->netlink_cmd,
2908 &dp_info, 1, 0);
2909
2910 return ret;
2911}
036d93c0
MS
2912
2913/*
2914 * Netlink-specific handler for MAC updates using dataplane context object.
2915 */
2916static enum zebra_dplane_result
2917netlink_macfdb_update_ctx(struct zebra_dplane_ctx *ctx)
2232a77c 2918{
f3dbec60 2919 uint8_t protocol = RTPROT_ZEBRA;
d62a17ae 2920 struct {
2921 struct nlmsghdr n;
2922 struct ndmsg ndm;
2923 char buf[256];
2924 } req;
036d93c0 2925 int ret;
d62a17ae 2926 int dst_alen;
36590076 2927 int vid_present = 0;
036d93c0
MS
2928 int cmd;
2929 struct in_addr vtep_ip;
2930 vlanid_t vid;
2931
2932 if (dplane_ctx_get_op(ctx) == DPLANE_OP_MAC_INSTALL)
2933 cmd = RTM_NEWNEIGH;
2934 else
2935 cmd = RTM_DELNEIGH;
2936
5605ecfc 2937 memset(&req, 0, sizeof(req));
d62a17ae 2938
2939 req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ndmsg));
2940 req.n.nlmsg_flags = NLM_F_REQUEST;
2941 if (cmd == RTM_NEWNEIGH)
2942 req.n.nlmsg_flags |= (NLM_F_CREATE | NLM_F_REPLACE);
2943 req.n.nlmsg_type = cmd;
2944 req.ndm.ndm_family = AF_BRIDGE;
2945 req.ndm.ndm_flags |= NTF_SELF | NTF_MASTER;
2946 req.ndm.ndm_state = NUD_REACHABLE;
2947
036d93c0 2948 if (dplane_ctx_mac_is_sticky(ctx))
d62a17ae 2949 req.ndm.ndm_state |= NUD_NOARP;
2950 else
2951 req.ndm.ndm_flags |= NTF_EXT_LEARNED;
2952
f3dbec60
DS
2953 addattr_l(&req.n, sizeof(req),
2954 NDA_PROTOCOL, &protocol, sizeof(protocol));
036d93c0
MS
2955 addattr_l(&req.n, sizeof(req), NDA_LLADDR,
2956 dplane_ctx_mac_get_addr(ctx), 6);
478566d6 2957 req.ndm.ndm_ifindex = dplane_ctx_get_ifindex(ctx);
036d93c0 2958
d63c1b18 2959 dst_alen = 4; // TODO: hardcoded
036d93c0 2960 vtep_ip = *(dplane_ctx_mac_get_vtep_ip(ctx));
d63c1b18 2961 addattr_l(&req.n, sizeof(req), NDA_DST, &vtep_ip, dst_alen);
036d93c0 2962
478566d6
MS
2963 vid = dplane_ctx_mac_get_vlan(ctx);
2964
2965 if (vid > 0) {
d62a17ae 2966 addattr16(&req.n, sizeof(req), NDA_VLAN, vid);
2967 vid_present = 1;
d62a17ae 2968 }
478566d6
MS
2969 addattr32(&req.n, sizeof(req), NDA_MASTER,
2970 dplane_ctx_mac_get_br_ifindex(ctx));
d62a17ae 2971
036d93c0
MS
2972 if (IS_ZEBRA_DEBUG_KERNEL) {
2973 char ipbuf[PREFIX_STRLEN];
2974 char buf[ETHER_ADDR_STRLEN];
2975 char dst_buf[PREFIX_STRLEN + 10];
478566d6
MS
2976 char vid_buf[20];
2977
2978 if (vid_present)
2979 snprintf(vid_buf, sizeof(vid_buf), " VLAN %u", vid);
2980 else
2981 vid_buf[0] = '\0';
036d93c0
MS
2982
2983 inet_ntop(AF_INET, &vtep_ip, ipbuf, sizeof(ipbuf));
2984 snprintf(dst_buf, sizeof(dst_buf), " dst %s", ipbuf);
2985 prefix_mac2str(dplane_ctx_mac_get_addr(ctx), buf, sizeof(buf));
2986
d62a17ae 2987 zlog_debug("Tx %s family %s IF %s(%u)%s %sMAC %s%s",
2988 nl_msg_type_to_str(cmd),
478566d6
MS
2989 nl_family_to_str(req.ndm.ndm_family),
2990 dplane_ctx_get_ifname(ctx),
2991 dplane_ctx_get_ifindex(ctx), vid_buf,
036d93c0
MS
2992 dplane_ctx_mac_is_sticky(ctx) ? "sticky " : "",
2993 buf, dst_buf);
2994 }
d62a17ae 2995
036d93c0
MS
2996 ret = netlink_talk_info(netlink_talk_filter, &req.n,
2997 dplane_ctx_get_ns(ctx), 0);
2998 if (ret == 0)
2999 return ZEBRA_DPLANE_REQUEST_SUCCESS;
3000 else
3001 return ZEBRA_DPLANE_REQUEST_FAILURE;
2232a77c 3002}
3003
f17b99ed
DS
3004/*
3005 * In the event the kernel deletes ipv4 link-local neighbor entries created for
3006 * 5549 support, re-install them.
3007 */
3008static void netlink_handle_5549(struct ndmsg *ndm, struct zebra_if *zif,
9b036974
DS
3009 struct interface *ifp, struct ipaddr *ip,
3010 bool handle_failed)
f17b99ed
DS
3011{
3012 if (ndm->ndm_family != AF_INET)
3013 return;
3014
3015 if (!zif->v6_2_v4_ll_neigh_entry)
3016 return;
3017
3018 if (ipv4_ll.s_addr != ip->ip._v4_addr.s_addr)
3019 return;
3020
9b036974
DS
3021 if (handle_failed && ndm->ndm_state & NUD_FAILED) {
3022 zlog_info("Neighbor Entry for %s has entered a failed state, not reinstalling",
3023 ifp->name);
3024 return;
3025 }
3026
f17b99ed
DS
3027 if_nbr_ipv6ll_to_ipv4ll_neigh_update(ifp, &zif->v6_2_v4_ll_addr6, true);
3028}
3029
d62a17ae 3030#define NUD_VALID \
3031 (NUD_PERMANENT | NUD_NOARP | NUD_REACHABLE | NUD_PROBE | NUD_STALE \
3032 | NUD_DELAY)
2232a77c 3033
2414abd3 3034static int netlink_ipneigh_change(struct nlmsghdr *h, int len, ns_id_t ns_id)
2232a77c 3035{
d62a17ae 3036 struct ndmsg *ndm;
3037 struct interface *ifp;
3038 struct zebra_if *zif;
d62a17ae 3039 struct rtattr *tb[NDA_MAX + 1];
3040 struct interface *link_if;
3041 struct ethaddr mac;
3042 struct ipaddr ip;
3043 char buf[ETHER_ADDR_STRLEN];
3044 char buf2[INET6_ADDRSTRLEN];
3045 int mac_present = 0;
a37f4598 3046 bool is_ext;
3047 bool is_router;
d62a17ae 3048
3049 ndm = NLMSG_DATA(h);
3050
3051 /* The interface should exist. */
5895d33f 3052 ifp = if_lookup_by_index_per_ns(zebra_ns_lookup(ns_id),
d62a17ae 3053 ndm->ndm_ifindex);
2853fed6 3054 if (!ifp || !ifp->info)
d62a17ae 3055 return 0;
3056
20089ae2
DS
3057 zif = (struct zebra_if *)ifp->info;
3058
3059 /* Parse attributes and extract fields of interest. */
3060 memset(tb, 0, sizeof tb);
3061 netlink_parse_rtattr(tb, NDA_MAX, NDA_RTA(ndm), len);
3062
3063 if (!tb[NDA_DST]) {
9df414fe
QY
3064 zlog_debug("%s family %s IF %s(%u) - no DST",
3065 nl_msg_type_to_str(h->nlmsg_type),
3066 nl_family_to_str(ndm->ndm_family), ifp->name,
3067 ndm->ndm_ifindex);
d62a17ae 3068 return 0;
20089ae2
DS
3069 }
3070
3071 memset(&ip, 0, sizeof(struct ipaddr));
3072 ip.ipa_type = (ndm->ndm_family == AF_INET) ? IPADDR_V4 : IPADDR_V6;
3073 memcpy(&ip.ip.addr, RTA_DATA(tb[NDA_DST]), RTA_PAYLOAD(tb[NDA_DST]));
3074
f17b99ed
DS
3075 /* if kernel deletes our rfc5549 neighbor entry, re-install it */
3076 if (h->nlmsg_type == RTM_DELNEIGH && (ndm->ndm_state & NUD_PERMANENT)) {
9b036974 3077 netlink_handle_5549(ndm, zif, ifp, &ip, false);
28bd0652
DS
3078 if (IS_ZEBRA_DEBUG_KERNEL)
3079 zlog_debug(
3080 "\tNeighbor Entry Received is a 5549 entry, finished");
20089ae2
DS
3081 return 0;
3082 }
d62a17ae 3083
f17b99ed 3084 /* if kernel marks our rfc5549 neighbor entry invalid, re-install it */
9b036974
DS
3085 if (h->nlmsg_type == RTM_NEWNEIGH && !(ndm->ndm_state & NUD_VALID))
3086 netlink_handle_5549(ndm, zif, ifp, &ip, true);
f17b99ed 3087
d62a17ae 3088 /* The neighbor is present on an SVI. From this, we locate the
3089 * underlying
3090 * bridge because we're only interested in neighbors on a VxLAN bridge.
3091 * The bridge is located based on the nature of the SVI:
3092 * (a) In the case of a VLAN-aware bridge, the SVI is a L3 VLAN
3093 * interface
3094 * and is linked to the bridge
3095 * (b) In the case of a VLAN-unaware bridge, the SVI is the bridge
3096 * inteface
3097 * itself
3098 */
3099 if (IS_ZEBRA_IF_VLAN(ifp)) {
5895d33f 3100 link_if = if_lookup_by_index_per_ns(zebra_ns_lookup(ns_id),
71349e03 3101 zif->link_ifindex);
d62a17ae 3102 if (!link_if)
3103 return 0;
3104 } else if (IS_ZEBRA_IF_BRIDGE(ifp))
3105 link_if = ifp;
28bd0652
DS
3106 else {
3107 if (IS_ZEBRA_DEBUG_KERNEL)
3108 zlog_debug(
3109 "\tNeighbor Entry received is not on a VLAN or a BRIDGE, ignoring");
d62a17ae 3110 return 0;
28bd0652 3111 }
d62a17ae 3112
d62a17ae 3113 memset(&mac, 0, sizeof(struct ethaddr));
d62a17ae 3114 if (h->nlmsg_type == RTM_NEWNEIGH) {
3115 if (tb[NDA_LLADDR]) {
ff8b7eb8 3116 if (RTA_PAYLOAD(tb[NDA_LLADDR]) != ETH_ALEN) {
28bd0652
DS
3117 if (IS_ZEBRA_DEBUG_KERNEL)
3118 zlog_debug(
3119 "%s family %s IF %s(%u) - LLADDR is not MAC, len %lu",
3120 nl_msg_type_to_str(
3121 h->nlmsg_type),
3122 nl_family_to_str(
3123 ndm->ndm_family),
3124 ifp->name, ndm->ndm_ifindex,
3125 (unsigned long)RTA_PAYLOAD(
3126 tb[NDA_LLADDR]));
d62a17ae 3127 return 0;
3128 }
3129
3130 mac_present = 1;
ff8b7eb8 3131 memcpy(&mac, RTA_DATA(tb[NDA_LLADDR]), ETH_ALEN);
d62a17ae 3132 }
3133
a37f4598 3134 is_ext = !!(ndm->ndm_flags & NTF_EXT_LEARNED);
3135 is_router = !!(ndm->ndm_flags & NTF_ROUTER);
d62a17ae 3136
3137 if (IS_ZEBRA_DEBUG_KERNEL)
3138 zlog_debug(
3139 "Rx %s family %s IF %s(%u) IP %s MAC %s state 0x%x flags 0x%x",
3140 nl_msg_type_to_str(h->nlmsg_type),
3141 nl_family_to_str(ndm->ndm_family), ifp->name,
3142 ndm->ndm_ifindex,
3143 ipaddr2str(&ip, buf2, sizeof(buf2)),
3144 mac_present
3145 ? prefix_mac2str(&mac, buf, sizeof(buf))
3146 : "",
3147 ndm->ndm_state, ndm->ndm_flags);
3148
3149 /* If the neighbor state is valid for use, process as an add or
3150 * update
3151 * else process as a delete. Note that the delete handling may
3152 * result
3153 * in re-adding the neighbor if it is a valid "remote" neighbor.
3154 */
3155 if (ndm->ndm_state & NUD_VALID)
ee69da27 3156 return zebra_vxlan_handle_kernel_neigh_update(
d62a17ae 3157 ifp, link_if, &ip, &mac, ndm->ndm_state,
a37f4598 3158 is_ext, is_router);
d62a17ae 3159
ee69da27 3160 return zebra_vxlan_handle_kernel_neigh_del(ifp, link_if, &ip);
d62a17ae 3161 }
3162
3163 if (IS_ZEBRA_DEBUG_KERNEL)
3164 zlog_debug("Rx %s family %s IF %s(%u) IP %s",
3165 nl_msg_type_to_str(h->nlmsg_type),
3166 nl_family_to_str(ndm->ndm_family), ifp->name,
3167 ndm->ndm_ifindex,
3168 ipaddr2str(&ip, buf2, sizeof(buf2)));
3169
3170 /* Process the delete - it may result in re-adding the neighbor if it is
3171 * a valid "remote" neighbor.
3172 */
ee69da27 3173 return zebra_vxlan_handle_kernel_neigh_del(ifp, link_if, &ip);
2232a77c 3174}
3175
2414abd3 3176static int netlink_neigh_table(struct nlmsghdr *h, ns_id_t ns_id, int startup)
2232a77c 3177{
d62a17ae 3178 int len;
3179 struct ndmsg *ndm;
2232a77c 3180
d62a17ae 3181 if (h->nlmsg_type != RTM_NEWNEIGH)
3182 return 0;
2232a77c 3183
d62a17ae 3184 /* Length validity. */
3185 len = h->nlmsg_len - NLMSG_LENGTH(sizeof(struct ndmsg));
3186 if (len < 0)
3187 return -1;
2232a77c 3188
d62a17ae 3189 /* We are interested only in AF_INET or AF_INET6 notifications. */
3190 ndm = NLMSG_DATA(h);
3191 if (ndm->ndm_family != AF_INET && ndm->ndm_family != AF_INET6)
3192 return 0;
2232a77c 3193
2414abd3 3194 return netlink_neigh_change(h, len);
2232a77c 3195}
3196
3197/* Request for IP neighbor information from the kernel */
85a75f1e
MS
3198static int netlink_request_neigh(struct nlsock *netlink_cmd, int family,
3199 int type, ifindex_t ifindex)
2232a77c 3200{
d62a17ae 3201 struct {
3202 struct nlmsghdr n;
3203 struct ndmsg ndm;
3204 char buf[256];
3205 } req;
3206
3207 /* Form the request, specifying filter (rtattr) if needed. */
3208 memset(&req, 0, sizeof(req));
3209 req.n.nlmsg_type = type;
718f9b0f 3210 req.n.nlmsg_flags = NLM_F_ROOT | NLM_F_MATCH | NLM_F_REQUEST;
d62a17ae 3211 req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ndmsg));
3212 req.ndm.ndm_family = family;
3213 if (ifindex)
3214 addattr32(&req.n, sizeof(req), NDA_IFINDEX, ifindex);
3215
85a75f1e 3216 return netlink_request(netlink_cmd, &req.n);
2232a77c 3217}
3218
3219/*
3220 * IP Neighbor table read using netlink interface. This is invoked
3221 * at startup.
3222 */
d62a17ae 3223int netlink_neigh_read(struct zebra_ns *zns)
2232a77c 3224{
d62a17ae 3225 int ret;
85a75f1e
MS
3226 struct zebra_dplane_info dp_info;
3227
3228 zebra_dplane_info_from_zns(&dp_info, zns, true /*is_cmd*/);
2232a77c 3229
d62a17ae 3230 /* Get IP neighbor table. */
85a75f1e
MS
3231 ret = netlink_request_neigh(&zns->netlink_cmd, AF_UNSPEC, RTM_GETNEIGH,
3232 0);
d62a17ae 3233 if (ret < 0)
3234 return ret;
85a75f1e
MS
3235 ret = netlink_parse_info(netlink_neigh_table, &zns->netlink_cmd,
3236 &dp_info, 0, 1);
2232a77c 3237
d62a17ae 3238 return ret;
2232a77c 3239}
3240
3241/*
3242 * IP Neighbor table read using netlink interface. This is for a specific
3243 * VLAN device.
3244 */
d62a17ae 3245int netlink_neigh_read_for_vlan(struct zebra_ns *zns, struct interface *vlan_if)
2232a77c 3246{
d62a17ae 3247 int ret = 0;
85a75f1e
MS
3248 struct zebra_dplane_info dp_info;
3249
3250 zebra_dplane_info_from_zns(&dp_info, zns, true /*is_cmd*/);
2232a77c 3251
85a75f1e 3252 ret = netlink_request_neigh(&zns->netlink_cmd, AF_UNSPEC, RTM_GETNEIGH,
d62a17ae 3253 vlan_if->ifindex);
3254 if (ret < 0)
3255 return ret;
85a75f1e
MS
3256 ret = netlink_parse_info(netlink_neigh_table, &zns->netlink_cmd,
3257 &dp_info, 0, 0);
2232a77c 3258
d62a17ae 3259 return ret;
2232a77c 3260}
3261
67fb9374
CS
3262/*
3263 * Request for a specific IP in VLAN (SVI) device from IP Neighbor table,
3264 * read using netlink interface.
3265 */
3266static int netlink_request_specific_neigh_in_vlan(struct zebra_ns *zns,
3267 int type, struct ipaddr *ip,
3268 ifindex_t ifindex)
3269{
3270 struct {
3271 struct nlmsghdr n;
3272 struct ndmsg ndm;
3273 char buf[256];
3274 } req;
3275 int ipa_len;
3276
3277 /* Form the request, specifying filter (rtattr) if needed. */
3278 memset(&req, 0, sizeof(req));
3279 req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ndmsg));
3280 req.n.nlmsg_flags = NLM_F_REQUEST;
3281 req.n.nlmsg_type = type; /* RTM_GETNEIGH */
3282 req.ndm.ndm_ifindex = ifindex;
3283
3284 if (IS_IPADDR_V4(ip)) {
3285 ipa_len = IPV4_MAX_BYTELEN;
3286 req.ndm.ndm_family = AF_INET;
3287
3288 } else {
3289 ipa_len = IPV6_MAX_BYTELEN;
3290 req.ndm.ndm_family = AF_INET6;
3291 }
3292
3293 addattr_l(&req.n, sizeof(req), NDA_DST, &ip->ip.addr, ipa_len);
3294
3295 return netlink_request(&zns->netlink_cmd, &req.n);
3296}
3297
3298int netlink_neigh_read_specific_ip(struct ipaddr *ip,
3299 struct interface *vlan_if)
3300{
3301 int ret = 0;
3302 struct zebra_ns *zns;
3303 struct zebra_vrf *zvrf = zebra_vrf_lookup_by_id(vlan_if->vrf_id);
3304 char buf[INET6_ADDRSTRLEN];
3305 struct zebra_dplane_info dp_info;
3306
3307 zns = zvrf->zns;
3308
3309 zebra_dplane_info_from_zns(&dp_info, zns, true /*is_cmd*/);
3310
3311 if (IS_ZEBRA_DEBUG_KERNEL)
3312 zlog_debug("%s: neigh request IF %s(%u) IP %s vrf_id %u",
3313 __PRETTY_FUNCTION__, vlan_if->name,
3314 vlan_if->ifindex,
3315 ipaddr2str(ip, buf, sizeof(buf)),
3316 vlan_if->vrf_id);
3317
3318 ret = netlink_request_specific_neigh_in_vlan(zns, RTM_GETNEIGH, ip,
3319 vlan_if->ifindex);
3320 if (ret < 0)
3321 return ret;
3322
3323 ret = netlink_parse_info(netlink_neigh_table, &zns->netlink_cmd,
3324 &dp_info, 1, 0);
3325
3326 return ret;
3327}
3328
2414abd3 3329int netlink_neigh_change(struct nlmsghdr *h, ns_id_t ns_id)
2232a77c 3330{
d62a17ae 3331 int len;
3332 struct ndmsg *ndm;
2232a77c 3333
d62a17ae 3334 if (!(h->nlmsg_type == RTM_NEWNEIGH || h->nlmsg_type == RTM_DELNEIGH))
3335 return 0;
2232a77c 3336
d62a17ae 3337 /* Length validity. */
3338 len = h->nlmsg_len - NLMSG_LENGTH(sizeof(struct ndmsg));
9bdf8618
DS
3339 if (len < 0) {
3340 zlog_err("%s: Message received from netlink is of a broken size %d %zu",
3341 __PRETTY_FUNCTION__, h->nlmsg_len,
3342 (size_t)NLMSG_LENGTH(sizeof(struct ndmsg)));
d62a17ae 3343 return -1;
9bdf8618 3344 }
2232a77c 3345
d62a17ae 3346 /* Is this a notification for the MAC FDB or IP neighbor table? */
3347 ndm = NLMSG_DATA(h);
3348 if (ndm->ndm_family == AF_BRIDGE)
2414abd3 3349 return netlink_macfdb_change(h, len, ns_id);
2232a77c 3350
d62a17ae 3351 if (ndm->ndm_type != RTN_UNICAST)
3352 return 0;
2232a77c 3353
d62a17ae 3354 if (ndm->ndm_family == AF_INET || ndm->ndm_family == AF_INET6)
2414abd3 3355 return netlink_ipneigh_change(h, len, ns_id);
8a1b681c 3356 else {
9df414fe 3357 flog_warn(
e914ccbe 3358 EC_ZEBRA_UNKNOWN_FAMILY,
87b5d1b0
DS
3359 "Invalid address family: %u received from kernel neighbor change: %s",
3360 ndm->ndm_family, nl_msg_type_to_str(h->nlmsg_type));
8a1b681c
SW
3361 return 0;
3362 }
2232a77c 3363
d62a17ae 3364 return 0;
2232a77c 3365}
3366
931fa60c
MS
3367/*
3368 * Utility neighbor-update function, using info from dplane context.
3369 */
3370static int netlink_neigh_update_ctx(const struct zebra_dplane_ctx *ctx,
3371 int cmd)
2232a77c 3372{
f3dbec60 3373 uint8_t protocol = RTPROT_ZEBRA;
d62a17ae 3374 struct {
3375 struct nlmsghdr n;
3376 struct ndmsg ndm;
3377 char buf[256];
3378 } req;
3379 int ipa_len;
d62a17ae 3380 char buf[INET6_ADDRSTRLEN];
3381 char buf2[ETHER_ADDR_STRLEN];
931fa60c
MS
3382 const struct ipaddr *ip;
3383 const struct ethaddr *mac;
3384 uint8_t flags;
3385 uint16_t state;
d62a17ae 3386
5605ecfc 3387 memset(&req, 0, sizeof(req));
d62a17ae 3388
931fa60c
MS
3389 ip = dplane_ctx_neigh_get_ipaddr(ctx);
3390 mac = dplane_ctx_neigh_get_mac(ctx);
3391 if (is_zero_mac(mac))
3392 mac = NULL;
3393
3394 flags = neigh_flags_to_netlink(dplane_ctx_neigh_get_flags(ctx));
3395 state = neigh_state_to_netlink(dplane_ctx_neigh_get_state(ctx));
3396
d62a17ae 3397 req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ndmsg));
3398 req.n.nlmsg_flags = NLM_F_REQUEST;
3399 if (cmd == RTM_NEWNEIGH)
3400 req.n.nlmsg_flags |= (NLM_F_CREATE | NLM_F_REPLACE);
3401 req.n.nlmsg_type = cmd; // RTM_NEWNEIGH or RTM_DELNEIGH
3402 req.ndm.ndm_family = IS_IPADDR_V4(ip) ? AF_INET : AF_INET6;
68e33151 3403 req.ndm.ndm_state = state;
931fa60c 3404 req.ndm.ndm_ifindex = dplane_ctx_get_ifindex(ctx);
d62a17ae 3405 req.ndm.ndm_type = RTN_UNICAST;
68e33151 3406 req.ndm.ndm_flags = flags;
d62a17ae 3407
f3dbec60
DS
3408 addattr_l(&req.n, sizeof(req),
3409 NDA_PROTOCOL, &protocol, sizeof(protocol));
d62a17ae 3410 ipa_len = IS_IPADDR_V4(ip) ? IPV4_MAX_BYTELEN : IPV6_MAX_BYTELEN;
3411 addattr_l(&req.n, sizeof(req), NDA_DST, &ip->ip.addr, ipa_len);
3412 if (mac)
3413 addattr_l(&req.n, sizeof(req), NDA_LLADDR, mac, 6);
3414
3415 if (IS_ZEBRA_DEBUG_KERNEL)
6fe2b0e6 3416 zlog_debug("Tx %s family %s IF %s(%u) Neigh %s MAC %s flags 0x%x state 0x%x",
d62a17ae 3417 nl_msg_type_to_str(cmd),
931fa60c
MS
3418 nl_family_to_str(req.ndm.ndm_family),
3419 dplane_ctx_get_ifname(ctx),
3420 dplane_ctx_get_ifindex(ctx),
3421 ipaddr2str(ip, buf, sizeof(buf)),
d62a17ae 3422 mac ? prefix_mac2str(mac, buf2, sizeof(buf2))
931fa60c
MS
3423 : "null",
3424 flags, state);
d62a17ae 3425
931fa60c
MS
3426 return netlink_talk_info(netlink_talk_filter, &req.n,
3427 dplane_ctx_get_ns(ctx), 0);
2232a77c 3428}
3429
036d93c0
MS
3430/*
3431 * Update MAC, using dataplane context object.
3432 */
3433enum zebra_dplane_result kernel_mac_update_ctx(struct zebra_dplane_ctx *ctx)
2232a77c 3434{
036d93c0 3435 return netlink_macfdb_update_ctx(ctx);
2232a77c 3436}
3437
931fa60c 3438enum zebra_dplane_result kernel_neigh_update_ctx(struct zebra_dplane_ctx *ctx)
2232a77c 3439{
931fa60c 3440 int ret = -1;
2232a77c 3441
931fa60c
MS
3442 switch (dplane_ctx_get_op(ctx)) {
3443 case DPLANE_OP_NEIGH_INSTALL:
3444 case DPLANE_OP_NEIGH_UPDATE:
3445 ret = netlink_neigh_update_ctx(ctx, RTM_NEWNEIGH);
3446 break;
3447 case DPLANE_OP_NEIGH_DELETE:
3448 ret = netlink_neigh_update_ctx(ctx, RTM_DELNEIGH);
3449 break;
0bbd4ff4
MS
3450 case DPLANE_OP_VTEP_ADD:
3451 ret = netlink_vxlan_flood_update_ctx(ctx, RTM_NEWNEIGH);
3452 break;
3453 case DPLANE_OP_VTEP_DELETE:
3454 ret = netlink_vxlan_flood_update_ctx(ctx, RTM_DELNEIGH);
3455 break;
931fa60c
MS
3456 default:
3457 break;
3458 }
2232a77c 3459
931fa60c
MS
3460 return (ret == 0 ?
3461 ZEBRA_DPLANE_REQUEST_SUCCESS : ZEBRA_DPLANE_REQUEST_FAILURE);
6fe2b0e6
CS
3462}
3463
16c628de
MS
3464/*
3465 * MPLS label forwarding table change via netlink interface, using dataplane
3466 * context information.
3467 */
fc608372 3468int netlink_mpls_multipath(int cmd, struct zebra_dplane_ctx *ctx)
16c628de
MS
3469{
3470 mpls_lse_t lse;
81793ac1 3471 const zebra_nhlfe_t *nhlfe;
16c628de
MS
3472 struct nexthop *nexthop = NULL;
3473 unsigned int nexthop_num;
3474 const char *routedesc;
3475 int route_type;
3476
3477 struct {
3478 struct nlmsghdr n;
3479 struct rtmsg r;
3480 char buf[NL_PKT_BUF_SIZE];
3481 } req;
3482
3483 memset(&req, 0, sizeof(req) - NL_PKT_BUF_SIZE);
3484
3485 /*
3486 * Count # nexthops so we can decide whether to use singlepath
3487 * or multipath case.
3488 */
3489 nexthop_num = 0;
3490 for (nhlfe = dplane_ctx_get_nhlfe(ctx); nhlfe; nhlfe = nhlfe->next) {
3491 nexthop = nhlfe->nexthop;
3492 if (!nexthop)
3493 continue;
3494 if (cmd == RTM_NEWROUTE) {
3495 /* Count all selected NHLFEs */
3496 if (CHECK_FLAG(nhlfe->flags, NHLFE_FLAG_SELECTED)
3497 && CHECK_FLAG(nexthop->flags, NEXTHOP_FLAG_ACTIVE))
3498 nexthop_num++;
3499 } else { /* DEL */
3500 /* Count all installed NHLFEs */
3501 if (CHECK_FLAG(nhlfe->flags, NHLFE_FLAG_INSTALLED)
3502 && CHECK_FLAG(nexthop->flags, NEXTHOP_FLAG_FIB))
3503 nexthop_num++;
3504 }
3505 }
3506
3507 if ((nexthop_num == 0) ||
3508 (!dplane_ctx_get_best_nhlfe(ctx) && (cmd != RTM_DELROUTE)))
3509 return 0;
3510
3511 req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct rtmsg));
3512 req.n.nlmsg_flags = NLM_F_CREATE | NLM_F_REQUEST;
3513 req.n.nlmsg_type = cmd;
3514 req.n.nlmsg_pid = dplane_ctx_get_ns(ctx)->nls.snl.nl_pid;
3515
3516 req.r.rtm_family = AF_MPLS;
3517 req.r.rtm_table = RT_TABLE_MAIN;
3518 req.r.rtm_dst_len = MPLS_LABEL_LEN_BITS;
3519 req.r.rtm_scope = RT_SCOPE_UNIVERSE;
3520 req.r.rtm_type = RTN_UNICAST;
3521
3522 if (cmd == RTM_NEWROUTE) {
3523 /* We do a replace to handle update. */
3524 req.n.nlmsg_flags |= NLM_F_REPLACE;
3525
3526 /* set the protocol value if installing */
3527 route_type = re_type_from_lsp_type(
3528 dplane_ctx_get_best_nhlfe(ctx)->type);
3529 req.r.rtm_protocol = zebra2proto(route_type);
3530 }
3531
3532 /* Fill destination */
3533 lse = mpls_lse_encode(dplane_ctx_get_in_label(ctx), 0, 0, 1);
3534 addattr_l(&req.n, sizeof(req), RTA_DST, &lse, sizeof(mpls_lse_t));
3535
3536 /* Fill nexthops (paths) based on single-path or multipath. The paths
3537 * chosen depend on the operation.
3538 */
fc608372 3539 if (nexthop_num == 1) {
16c628de
MS
3540 routedesc = "single-path";
3541 _netlink_mpls_debug(cmd, dplane_ctx_get_in_label(ctx),
3542 routedesc);
3543
3544 nexthop_num = 0;
3545 for (nhlfe = dplane_ctx_get_nhlfe(ctx);
3546 nhlfe; nhlfe = nhlfe->next) {
3547 nexthop = nhlfe->nexthop;
3548 if (!nexthop)
3549 continue;
3550
3551 if ((cmd == RTM_NEWROUTE
3552 && (CHECK_FLAG(nhlfe->flags, NHLFE_FLAG_SELECTED)
3553 && CHECK_FLAG(nexthop->flags,
3554 NEXTHOP_FLAG_ACTIVE)))
3555 || (cmd == RTM_DELROUTE
3556 && (CHECK_FLAG(nhlfe->flags,
3557 NHLFE_FLAG_INSTALLED)
3558 && CHECK_FLAG(nexthop->flags,
3559 NEXTHOP_FLAG_FIB)))) {
3560 /* Add the gateway */
3561 _netlink_mpls_build_singlepath(
3562 routedesc, nhlfe,
3563 &req.n, &req.r,
3564 sizeof(req), cmd);
3565
3566 nexthop_num++;
3567 break;
3568 }
3569 }
3570 } else { /* Multipath case */
3571 char buf[NL_PKT_BUF_SIZE];
3572 struct rtattr *rta = (void *)buf;
3573 struct rtnexthop *rtnh;
81793ac1 3574 const union g_addr *src1 = NULL;
16c628de
MS
3575
3576 rta->rta_type = RTA_MULTIPATH;
3577 rta->rta_len = RTA_LENGTH(0);
3578 rtnh = RTA_DATA(rta);
3579
3580 routedesc = "multipath";
3581 _netlink_mpls_debug(cmd, dplane_ctx_get_in_label(ctx),
3582 routedesc);
3583
3584 nexthop_num = 0;
3585 for (nhlfe = dplane_ctx_get_nhlfe(ctx);
3586 nhlfe; nhlfe = nhlfe->next) {
3587 nexthop = nhlfe->nexthop;
3588 if (!nexthop)
3589 continue;
3590
16c628de
MS
3591 if ((cmd == RTM_NEWROUTE
3592 && (CHECK_FLAG(nhlfe->flags, NHLFE_FLAG_SELECTED)
3593 && CHECK_FLAG(nexthop->flags,
3594 NEXTHOP_FLAG_ACTIVE)))
3595 || (cmd == RTM_DELROUTE
3596 && (CHECK_FLAG(nhlfe->flags,
3597 NHLFE_FLAG_INSTALLED)
3598 && CHECK_FLAG(nexthop->flags,
3599 NEXTHOP_FLAG_FIB)))) {
3600 nexthop_num++;
3601
3602 /* Build the multipath */
3603 _netlink_mpls_build_multipath(routedesc, nhlfe,
3604 rta, rtnh, &req.r,
3605 &src1);
3606 rtnh = RTNH_NEXT(rtnh);
3607 }
3608 }
3609
3610 /* Add the multipath */
3611 if (rta->rta_len > RTA_LENGTH(0))
3612 addattr_l(&req.n, NL_PKT_BUF_SIZE, RTA_MULTIPATH,
3613 RTA_DATA(rta), RTA_PAYLOAD(rta));
3614 }
3615
3616 /* Talk to netlink socket. */
3617 return netlink_talk_info(netlink_talk_filter, &req.n,
3618 dplane_ctx_get_ns(ctx), 0);
3619}
ddfeb486 3620#endif /* HAVE_NETLINK */