]>
Commit | Line | Data |
---|---|---|
6006414d PR |
1 | /* |
2 | * Zebra EVPN for VxLAN code | |
3 | * Copyright (C) 2016, 2017 Cumulus Networks, Inc. | |
4 | * | |
5 | * This file is part of FRR. | |
6 | * | |
7 | * FRR is free software; you can redistribute it and/or modify it | |
8 | * under the terms of the GNU General Public License as published by the | |
9 | * Free Software Foundation; either version 2, or (at your option) any | |
10 | * later version. | |
11 | * | |
12 | * FRR is distributed in the hope that it will be useful, but | |
13 | * WITHOUT ANY WARRANTY; without even the implied warranty of | |
14 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
15 | * General Public License for more details. | |
16 | * | |
17 | * You should have received a copy of the GNU General Public License | |
18 | * along with FRR; see the file COPYING. If not, write to the Free | |
19 | * Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA | |
20 | * 02111-1307, USA. | |
21 | */ | |
6006414d PR |
22 | #include <zebra.h> |
23 | ||
24 | #include "hash.h" | |
25 | #include "if.h" | |
26 | #include "jhash.h" | |
27 | #include "linklist.h" | |
28 | #include "log.h" | |
29 | #include "memory.h" | |
30 | #include "prefix.h" | |
31 | #include "stream.h" | |
32 | #include "table.h" | |
33 | #include "vlan.h" | |
34 | #include "vxlan.h" | |
35 | #ifdef GNU_LINUX | |
36 | #include <linux/neighbour.h> | |
37 | #endif | |
38 | ||
39 | #include "zebra/zebra_router.h" | |
40 | #include "zebra/debug.h" | |
41 | #include "zebra/interface.h" | |
42 | #include "zebra/rib.h" | |
43 | #include "zebra/rt.h" | |
44 | #include "zebra/rt_netlink.h" | |
45 | #include "zebra/zebra_errors.h" | |
46 | #include "zebra/zebra_l2.h" | |
6006414d PR |
47 | #include "zebra/zebra_ns.h" |
48 | #include "zebra/zebra_vrf.h" | |
49 | #include "zebra/zebra_vxlan.h" | |
50 | #include "zebra/zebra_evpn.h" | |
51 | #include "zebra/zebra_evpn_mac.h" | |
52 | #include "zebra/zebra_evpn_neigh.h" | |
53 | #include "zebra/zebra_vxlan_private.h" | |
54 | #include "zebra/zebra_evpn_mh.h" | |
8b5fdf2e | 55 | #include "zebra/zebra_evpn_vxlan.h" |
6006414d PR |
56 | #include "zebra/zebra_router.h" |
57 | ||
8b5fdf2e PR |
58 | DEFINE_MTYPE_STATIC(ZEBRA, ZEVPN, "VNI hash"); |
59 | DEFINE_MTYPE_STATIC(ZEBRA, ZEVPN_VTEP, "VNI remote VTEP"); | |
6006414d | 60 | |
6006414d PR |
61 | /* PMSI strings. */ |
62 | #define VXLAN_FLOOD_STR_NO_INFO "-" | |
63 | #define VXLAN_FLOOD_STR_DEFAULT VXLAN_FLOOD_STR_NO_INFO | |
64 | static const struct message zvtep_flood_str[] = { | |
65 | {VXLAN_FLOOD_DISABLED, VXLAN_FLOOD_STR_NO_INFO}, | |
66 | {VXLAN_FLOOD_PIM_SM, "PIM-SM"}, | |
67 | {VXLAN_FLOOD_HEAD_END_REPL, "HER"}, | |
68 | {0} | |
69 | }; | |
70 | ||
f6371c34 | 71 | int advertise_gw_macip_enabled(struct zebra_evpn *zevpn) |
6006414d PR |
72 | { |
73 | struct zebra_vrf *zvrf; | |
74 | ||
75 | zvrf = zebra_vrf_get_evpn(); | |
81157cbd | 76 | if (zvrf->advertise_gw_macip) |
6006414d PR |
77 | return 1; |
78 | ||
79 | if (zevpn && zevpn->advertise_gw_macip) | |
80 | return 1; | |
81 | ||
82 | return 0; | |
83 | } | |
84 | ||
f6371c34 | 85 | int advertise_svi_macip_enabled(struct zebra_evpn *zevpn) |
6006414d PR |
86 | { |
87 | struct zebra_vrf *zvrf; | |
88 | ||
89 | zvrf = zebra_vrf_get_evpn(); | |
81157cbd | 90 | if (zvrf->advertise_svi_macip) |
6006414d PR |
91 | return 1; |
92 | ||
93 | if (zevpn && zevpn->advertise_svi_macip) | |
94 | return 1; | |
95 | ||
96 | return 0; | |
97 | } | |
98 | ||
6006414d PR |
99 | /* |
100 | * Print a specific EVPN entry. | |
101 | */ | |
f6371c34 | 102 | void zebra_evpn_print(struct zebra_evpn *zevpn, void **ctxt) |
6006414d PR |
103 | { |
104 | struct vty *vty; | |
c172c032 | 105 | struct zebra_vtep *zvtep; |
6006414d PR |
106 | uint32_t num_macs; |
107 | uint32_t num_neigh; | |
108 | json_object *json = NULL; | |
109 | json_object *json_vtep_list = NULL; | |
110 | json_object *json_ip_str = NULL; | |
9bcef951 | 111 | char buf[PREFIX_STRLEN]; |
6006414d PR |
112 | |
113 | vty = ctxt[0]; | |
114 | json = ctxt[1]; | |
115 | ||
116 | if (json == NULL) { | |
117 | vty_out(vty, "VNI: %u\n", zevpn->vni); | |
118 | vty_out(vty, " Type: %s\n", "L2"); | |
119 | vty_out(vty, " Tenant VRF: %s\n", vrf_id_to_name(zevpn->vrf_id)); | |
120 | } else { | |
121 | json_object_int_add(json, "vni", zevpn->vni); | |
122 | json_object_string_add(json, "type", "L2"); | |
123 | json_object_string_add(json, "vrf", | |
124 | vrf_id_to_name(zevpn->vrf_id)); | |
125 | } | |
126 | ||
127 | if (!zevpn->vxlan_if) { // unexpected | |
128 | if (json == NULL) | |
129 | vty_out(vty, " VxLAN interface: unknown\n"); | |
130 | return; | |
131 | } | |
132 | num_macs = num_valid_macs(zevpn); | |
133 | num_neigh = hashcount(zevpn->neigh_table); | |
134 | if (json == NULL) { | |
135 | vty_out(vty, " VxLAN interface: %s\n", zevpn->vxlan_if->name); | |
136 | vty_out(vty, " VxLAN ifIndex: %u\n", zevpn->vxlan_if->ifindex); | |
9daa5d47 AD |
137 | vty_out(vty, " SVI interface: %s\n", |
138 | (zevpn->svi_if ? zevpn->svi_if->name : "")); | |
139 | vty_out(vty, " SVI ifIndex: %u\n", | |
140 | (zevpn->svi_if ? zevpn->svi_if->ifindex : 0)); | |
9bcef951 MS |
141 | vty_out(vty, " Local VTEP IP: %pI4\n", |
142 | &zevpn->local_vtep_ip); | |
143 | vty_out(vty, " Mcast group: %pI4\n", | |
144 | &zevpn->mcast_grp); | |
6006414d PR |
145 | } else { |
146 | json_object_string_add(json, "vxlanInterface", | |
147 | zevpn->vxlan_if->name); | |
148 | json_object_int_add(json, "ifindex", zevpn->vxlan_if->ifindex); | |
9daa5d47 AD |
149 | if (zevpn->svi_if) { |
150 | json_object_string_add(json, "sviInterface", | |
151 | zevpn->svi_if->name); | |
152 | json_object_int_add(json, "sviIfindex", | |
153 | zevpn->svi_if->ifindex); | |
154 | } | |
08edf9c6 DA |
155 | json_object_string_addf(json, "vtepIp", "%pI4", |
156 | &zevpn->local_vtep_ip); | |
157 | json_object_string_addf(json, "mcastGroup", "%pI4", | |
158 | &zevpn->mcast_grp); | |
6006414d PR |
159 | json_object_string_add(json, "advertiseGatewayMacip", |
160 | zevpn->advertise_gw_macip ? "Yes" : "No"); | |
c0c7707d AK |
161 | json_object_string_add(json, "advertiseSviMacip", |
162 | zevpn->advertise_svi_macip ? "Yes" | |
163 | : "No"); | |
6006414d PR |
164 | json_object_int_add(json, "numMacs", num_macs); |
165 | json_object_int_add(json, "numArpNd", num_neigh); | |
166 | } | |
167 | if (!zevpn->vteps) { | |
168 | if (json == NULL) | |
169 | vty_out(vty, " No remote VTEPs known for this VNI\n"); | |
170 | } else { | |
171 | if (json == NULL) | |
172 | vty_out(vty, " Remote VTEPs for this VNI:\n"); | |
173 | else | |
174 | json_vtep_list = json_object_new_array(); | |
175 | for (zvtep = zevpn->vteps; zvtep; zvtep = zvtep->next) { | |
176 | const char *flood_str = lookup_msg(zvtep_flood_str, | |
177 | zvtep->flood_control, | |
178 | VXLAN_FLOOD_STR_DEFAULT); | |
179 | ||
180 | if (json == NULL) { | |
9bcef951 MS |
181 | vty_out(vty, " %pI4 flood: %s\n", |
182 | &zvtep->vtep_ip, | |
6006414d PR |
183 | flood_str); |
184 | } else { | |
185 | json_ip_str = json_object_new_string( | |
9bcef951 MS |
186 | inet_ntop(AF_INET, |
187 | &zvtep->vtep_ip, buf, | |
188 | sizeof(buf))); | |
6006414d PR |
189 | json_object_array_add(json_vtep_list, |
190 | json_ip_str); | |
191 | } | |
192 | } | |
193 | if (json) | |
194 | json_object_object_add(json, "numRemoteVteps", | |
195 | json_vtep_list); | |
196 | } | |
197 | if (json == NULL) { | |
198 | vty_out(vty, | |
199 | " Number of MACs (local and remote) known for this VNI: %u\n", | |
200 | num_macs); | |
201 | vty_out(vty, | |
202 | " Number of ARPs (IPv4 and IPv6, local and remote) " | |
203 | "known for this VNI: %u\n", | |
204 | num_neigh); | |
205 | vty_out(vty, " Advertise-gw-macip: %s\n", | |
206 | zevpn->advertise_gw_macip ? "Yes" : "No"); | |
c0c7707d AK |
207 | vty_out(vty, " Advertise-svi-macip: %s\n", |
208 | zevpn->advertise_svi_macip ? "Yes" : "No"); | |
6006414d PR |
209 | } |
210 | } | |
211 | ||
8b5fdf2e PR |
212 | /* |
213 | * Print an EVPN hash entry - called for display of all VNIs. | |
214 | */ | |
215 | void zebra_evpn_print_hash(struct hash_bucket *bucket, void *ctxt[]) | |
6006414d | 216 | { |
8b5fdf2e | 217 | struct vty *vty; |
f6371c34 | 218 | struct zebra_evpn *zevpn; |
c172c032 | 219 | struct zebra_vtep *zvtep; |
8b5fdf2e PR |
220 | uint32_t num_vteps = 0; |
221 | uint32_t num_macs = 0; | |
222 | uint32_t num_neigh = 0; | |
6006414d PR |
223 | json_object *json = NULL; |
224 | json_object *json_evpn = NULL; | |
8b5fdf2e PR |
225 | json_object *json_ip_str = NULL; |
226 | json_object *json_vtep_list = NULL; | |
9bcef951 | 227 | char buf[PREFIX_STRLEN]; |
6006414d | 228 | |
8b5fdf2e PR |
229 | vty = ctxt[0]; |
230 | json = ctxt[1]; | |
6006414d | 231 | |
f6371c34 | 232 | zevpn = (struct zebra_evpn *)bucket->data; |
6006414d | 233 | |
8b5fdf2e PR |
234 | zvtep = zevpn->vteps; |
235 | while (zvtep) { | |
236 | num_vteps++; | |
237 | zvtep = zvtep->next; | |
6006414d PR |
238 | } |
239 | ||
240 | num_macs = num_valid_macs(zevpn); | |
241 | num_neigh = hashcount(zevpn->neigh_table); | |
242 | if (json == NULL) | |
243 | vty_out(vty, "%-10u %-4s %-21s %-8u %-8u %-15u %-37s\n", | |
244 | zevpn->vni, "L2", | |
245 | zevpn->vxlan_if ? zevpn->vxlan_if->name : "unknown", | |
246 | num_macs, num_neigh, num_vteps, | |
247 | vrf_id_to_name(zevpn->vrf_id)); | |
248 | else { | |
249 | char vni_str[VNI_STR_LEN]; | |
250 | snprintf(vni_str, VNI_STR_LEN, "%u", zevpn->vni); | |
251 | json_evpn = json_object_new_object(); | |
252 | json_object_int_add(json_evpn, "vni", zevpn->vni); | |
253 | json_object_string_add(json_evpn, "type", "L2"); | |
254 | json_object_string_add(json_evpn, "vxlanIf", | |
255 | zevpn->vxlan_if ? zevpn->vxlan_if->name | |
256 | : "unknown"); | |
257 | json_object_int_add(json_evpn, "numMacs", num_macs); | |
258 | json_object_int_add(json_evpn, "numArpNd", num_neigh); | |
259 | json_object_int_add(json_evpn, "numRemoteVteps", num_vteps); | |
260 | json_object_string_add(json_evpn, "tenantVrf", | |
261 | vrf_id_to_name(zevpn->vrf_id)); | |
262 | if (num_vteps) { | |
263 | json_vtep_list = json_object_new_array(); | |
264 | for (zvtep = zevpn->vteps; zvtep; zvtep = zvtep->next) { | |
265 | json_ip_str = json_object_new_string( | |
9bcef951 MS |
266 | inet_ntop(AF_INET, &zvtep->vtep_ip, buf, |
267 | sizeof(buf))); | |
6006414d PR |
268 | json_object_array_add(json_vtep_list, |
269 | json_ip_str); | |
270 | } | |
271 | json_object_object_add(json_evpn, "remoteVteps", | |
272 | json_vtep_list); | |
273 | } | |
274 | json_object_object_add(json, vni_str, json_evpn); | |
275 | } | |
276 | } | |
277 | ||
278 | /* | |
279 | * Print an EVPN hash entry in detail - called for display of all EVPNs. | |
280 | */ | |
8b5fdf2e | 281 | void zebra_evpn_print_hash_detail(struct hash_bucket *bucket, void *data) |
6006414d PR |
282 | { |
283 | struct vty *vty; | |
f6371c34 | 284 | struct zebra_evpn *zevpn; |
6006414d PR |
285 | json_object *json_array = NULL; |
286 | bool use_json = false; | |
8b5fdf2e | 287 | struct zebra_evpn_show *zes = data; |
6006414d PR |
288 | |
289 | vty = zes->vty; | |
290 | json_array = zes->json; | |
291 | use_json = zes->use_json; | |
292 | ||
f6371c34 | 293 | zevpn = (struct zebra_evpn *)bucket->data; |
6006414d PR |
294 | |
295 | zebra_vxlan_print_vni(vty, zes->zvrf, zevpn->vni, use_json, json_array); | |
296 | ||
297 | if (!use_json) | |
298 | vty_out(vty, "\n"); | |
299 | } | |
300 | ||
f6371c34 DS |
301 | int zebra_evpn_del_macip_for_intf(struct interface *ifp, |
302 | struct zebra_evpn *zevpn) | |
6006414d PR |
303 | { |
304 | struct listnode *cnode = NULL, *cnnode = NULL; | |
305 | struct connected *c = NULL; | |
306 | struct ethaddr macaddr; | |
307 | ||
308 | memcpy(&macaddr.octet, ifp->hw_addr, ETH_ALEN); | |
309 | ||
310 | for (ALL_LIST_ELEMENTS(ifp->connected, cnode, cnnode, c)) { | |
311 | struct ipaddr ip; | |
312 | ||
313 | memset(&ip, 0, sizeof(struct ipaddr)); | |
314 | if (!CHECK_FLAG(c->conf, ZEBRA_IFC_REAL)) | |
315 | continue; | |
316 | ||
317 | if (c->address->family == AF_INET) { | |
318 | ip.ipa_type = IPADDR_V4; | |
319 | memcpy(&(ip.ipaddr_v4), &(c->address->u.prefix4), | |
320 | sizeof(struct in_addr)); | |
321 | } else if (c->address->family == AF_INET6) { | |
322 | ip.ipa_type = IPADDR_V6; | |
323 | memcpy(&(ip.ipaddr_v6), &(c->address->u.prefix6), | |
324 | sizeof(struct in6_addr)); | |
325 | } else { | |
326 | continue; | |
327 | } | |
328 | ||
8b5fdf2e | 329 | zebra_evpn_gw_macip_del(ifp, zevpn, &ip); |
6006414d PR |
330 | } |
331 | ||
332 | return 0; | |
333 | } | |
334 | ||
f6371c34 DS |
335 | int zebra_evpn_add_macip_for_intf(struct interface *ifp, |
336 | struct zebra_evpn *zevpn) | |
6006414d PR |
337 | { |
338 | struct listnode *cnode = NULL, *cnnode = NULL; | |
339 | struct connected *c = NULL; | |
340 | struct ethaddr macaddr; | |
341 | ||
342 | memcpy(&macaddr.octet, ifp->hw_addr, ETH_ALEN); | |
343 | ||
344 | for (ALL_LIST_ELEMENTS(ifp->connected, cnode, cnnode, c)) { | |
345 | struct ipaddr ip; | |
346 | ||
6006414d PR |
347 | if (!CHECK_FLAG(c->conf, ZEBRA_IFC_REAL)) |
348 | continue; | |
349 | ||
38eda16a | 350 | memset(&ip, 0, sizeof(struct ipaddr)); |
6006414d PR |
351 | if (c->address->family == AF_INET) { |
352 | ip.ipa_type = IPADDR_V4; | |
353 | memcpy(&(ip.ipaddr_v4), &(c->address->u.prefix4), | |
354 | sizeof(struct in_addr)); | |
355 | } else if (c->address->family == AF_INET6) { | |
356 | ip.ipa_type = IPADDR_V6; | |
357 | memcpy(&(ip.ipaddr_v6), &(c->address->u.prefix6), | |
358 | sizeof(struct in6_addr)); | |
359 | } else { | |
360 | continue; | |
361 | } | |
362 | ||
8b5fdf2e | 363 | zebra_evpn_gw_macip_add(ifp, zevpn, &macaddr, &ip); |
6006414d PR |
364 | } |
365 | return 0; | |
366 | } | |
367 | ||
8b5fdf2e PR |
368 | static int ip_prefix_send_to_client(vrf_id_t vrf_id, struct prefix *p, |
369 | uint16_t cmd) | |
370 | { | |
371 | struct zserv *client = NULL; | |
372 | struct stream *s = NULL; | |
8b5fdf2e PR |
373 | |
374 | client = zserv_find_client(ZEBRA_ROUTE_BGP, 0); | |
375 | /* BGP may not be running. */ | |
376 | if (!client) | |
377 | return 0; | |
378 | ||
379 | s = stream_new(ZEBRA_MAX_PACKET_SIZ); | |
380 | ||
381 | zclient_create_header(s, cmd, vrf_id); | |
382 | stream_put(s, p, sizeof(struct prefix)); | |
383 | ||
384 | /* Write packet size. */ | |
385 | stream_putw_at(s, 0, stream_get_endp(s)); | |
386 | ||
387 | if (IS_ZEBRA_DEBUG_VXLAN) | |
2dbe669b | 388 | zlog_debug("Send ip prefix %pFX %s on vrf %s", p, |
8b5fdf2e PR |
389 | (cmd == ZEBRA_IP_PREFIX_ROUTE_ADD) ? "ADD" : "DEL", |
390 | vrf_id_to_name(vrf_id)); | |
391 | ||
392 | if (cmd == ZEBRA_IP_PREFIX_ROUTE_ADD) | |
393 | client->prefixadd_cnt++; | |
394 | else | |
395 | client->prefixdel_cnt++; | |
396 | ||
397 | return zserv_send_message(client, s); | |
398 | } | |
6006414d | 399 | |
f6371c34 | 400 | int zebra_evpn_advertise_subnet(struct zebra_evpn *zevpn, struct interface *ifp, |
8b5fdf2e | 401 | int advertise) |
6006414d PR |
402 | { |
403 | struct listnode *cnode = NULL, *cnnode = NULL; | |
404 | struct connected *c = NULL; | |
405 | struct ethaddr macaddr; | |
406 | ||
407 | memcpy(&macaddr.octet, ifp->hw_addr, ETH_ALEN); | |
408 | ||
409 | for (ALL_LIST_ELEMENTS(ifp->connected, cnode, cnnode, c)) { | |
410 | struct prefix p; | |
411 | ||
412 | memcpy(&p, c->address, sizeof(struct prefix)); | |
413 | ||
414 | /* skip link local address */ | |
415 | if (IN6_IS_ADDR_LINKLOCAL(&p.u.prefix6)) | |
416 | continue; | |
417 | ||
418 | apply_mask(&p); | |
419 | if (advertise) | |
096f7609 | 420 | ip_prefix_send_to_client(ifp->vrf->vrf_id, &p, |
6006414d PR |
421 | ZEBRA_IP_PREFIX_ROUTE_ADD); |
422 | else | |
096f7609 | 423 | ip_prefix_send_to_client(ifp->vrf->vrf_id, &p, |
6006414d PR |
424 | ZEBRA_IP_PREFIX_ROUTE_DEL); |
425 | } | |
426 | return 0; | |
427 | } | |
428 | ||
429 | /* | |
8b5fdf2e | 430 | * zebra_evpn_gw_macip_add_to_client |
6006414d | 431 | */ |
f6371c34 | 432 | int zebra_evpn_gw_macip_add(struct interface *ifp, struct zebra_evpn *zevpn, |
8b5fdf2e | 433 | struct ethaddr *macaddr, struct ipaddr *ip) |
6006414d | 434 | { |
3198b2b3 | 435 | struct zebra_mac *mac = NULL; |
6006414d PR |
436 | struct zebra_if *zif = NULL; |
437 | struct zebra_l2info_vxlan *vxl = NULL; | |
438 | ||
439 | zif = zevpn->vxlan_if->info; | |
440 | if (!zif) | |
441 | return -1; | |
442 | ||
443 | vxl = &zif->l2info.vxl; | |
444 | ||
5ff58d0a | 445 | zebra_evpn_mac_gw_macip_add(ifp, zevpn, ip, &mac, macaddr, |
446 | vxl->access_vlan, true); | |
6006414d PR |
447 | |
448 | return zebra_evpn_neigh_gw_macip_add(ifp, zevpn, ip, mac); | |
449 | } | |
450 | ||
451 | /* | |
8b5fdf2e | 452 | * zebra_evpn_gw_macip_del_from_client |
6006414d | 453 | */ |
f6371c34 | 454 | int zebra_evpn_gw_macip_del(struct interface *ifp, struct zebra_evpn *zevpn, |
8b5fdf2e | 455 | struct ipaddr *ip) |
6006414d | 456 | { |
72de4110 | 457 | struct zebra_neigh *n = NULL; |
3198b2b3 | 458 | struct zebra_mac *mac = NULL; |
6006414d PR |
459 | |
460 | /* If the neigh entry is not present nothing to do*/ | |
461 | n = zebra_evpn_neigh_lookup(zevpn, ip); | |
462 | if (!n) | |
463 | return 0; | |
464 | ||
465 | /* mac entry should be present */ | |
466 | mac = zebra_evpn_mac_lookup(zevpn, &n->emac); | |
467 | if (!mac) { | |
468 | if (IS_ZEBRA_DEBUG_VXLAN) | |
ef7b8be4 DL |
469 | zlog_debug("MAC %pEA doesn't exist for neigh %pIA on VNI %u", |
470 | &n->emac, ip, zevpn->vni); | |
6006414d PR |
471 | return -1; |
472 | } | |
473 | ||
474 | /* If the entry is not local nothing to do*/ | |
475 | if (!CHECK_FLAG(n->flags, ZEBRA_NEIGH_LOCAL)) | |
476 | return -1; | |
477 | ||
478 | /* only need to delete the entry from bgp if we sent it before */ | |
479 | if (IS_ZEBRA_DEBUG_VXLAN) | |
480 | zlog_debug( | |
ef7b8be4 | 481 | "%u:SVI %s(%u) VNI %u, sending GW MAC %pEA IP %pIA del to BGP", |
096f7609 | 482 | ifp->vrf->vrf_id, ifp->name, ifp->ifindex, zevpn->vni, |
ef7b8be4 | 483 | &n->emac, ip); |
6006414d PR |
484 | |
485 | /* Remove neighbor from BGP. */ | |
486 | zebra_evpn_neigh_send_del_to_client(zevpn->vni, &n->ip, &n->emac, | |
487 | n->flags, ZEBRA_NEIGH_ACTIVE, | |
488 | false /*force*/); | |
489 | ||
490 | /* Delete this neighbor entry. */ | |
491 | zebra_evpn_neigh_del(zevpn, n); | |
492 | ||
493 | /* see if the mac needs to be deleted as well*/ | |
494 | if (mac) | |
495 | zebra_evpn_deref_ip2mac(zevpn, mac); | |
496 | ||
497 | return 0; | |
498 | } | |
499 | ||
8b5fdf2e | 500 | void zebra_evpn_gw_macip_del_for_evpn_hash(struct hash_bucket *bucket, |
6006414d PR |
501 | void *ctxt) |
502 | { | |
f6371c34 | 503 | struct zebra_evpn *zevpn = NULL; |
6006414d PR |
504 | struct zebra_if *zif = NULL; |
505 | struct zebra_l2info_vxlan zl2_info; | |
506 | struct interface *vlan_if = NULL; | |
507 | struct interface *vrr_if = NULL; | |
508 | struct interface *ifp; | |
509 | ||
510 | /* Add primary SVI MAC*/ | |
f6371c34 | 511 | zevpn = (struct zebra_evpn *)bucket->data; |
6006414d PR |
512 | |
513 | /* Global (Zvrf) advertise-default-gw is disabled, | |
514 | * but zevpn advertise-default-gw is enabled | |
515 | */ | |
516 | if (zevpn->advertise_gw_macip) { | |
517 | if (IS_ZEBRA_DEBUG_VXLAN) | |
518 | zlog_debug("VNI: %u GW-MACIP enabled, retain gw-macip", | |
519 | zevpn->vni); | |
520 | return; | |
521 | } | |
522 | ||
523 | ifp = zevpn->vxlan_if; | |
524 | if (!ifp) | |
525 | return; | |
526 | zif = ifp->info; | |
527 | ||
528 | /* If down or not mapped to a bridge, we're done. */ | |
529 | if (!if_is_operative(ifp) || !zif->brslave_info.br_if) | |
530 | return; | |
531 | ||
532 | zl2_info = zif->l2info.vxl; | |
533 | ||
534 | vlan_if = | |
535 | zvni_map_to_svi(zl2_info.access_vlan, zif->brslave_info.br_if); | |
536 | if (!vlan_if) | |
537 | return; | |
538 | ||
539 | /* Del primary MAC-IP */ | |
8b5fdf2e | 540 | zebra_evpn_del_macip_for_intf(vlan_if, zevpn); |
6006414d PR |
541 | |
542 | /* Del VRR MAC-IP - if any*/ | |
543 | vrr_if = zebra_get_vrr_intf_for_svi(vlan_if); | |
544 | if (vrr_if) | |
8b5fdf2e | 545 | zebra_evpn_del_macip_for_intf(vrr_if, zevpn); |
6006414d PR |
546 | |
547 | return; | |
548 | } | |
549 | ||
8b5fdf2e | 550 | void zebra_evpn_gw_macip_add_for_evpn_hash(struct hash_bucket *bucket, |
6006414d PR |
551 | void *ctxt) |
552 | { | |
f6371c34 | 553 | struct zebra_evpn *zevpn = NULL; |
6006414d PR |
554 | struct zebra_if *zif = NULL; |
555 | struct zebra_l2info_vxlan zl2_info; | |
556 | struct interface *vlan_if = NULL; | |
557 | struct interface *vrr_if = NULL; | |
558 | struct interface *ifp = NULL; | |
559 | ||
f6371c34 | 560 | zevpn = (struct zebra_evpn *)bucket->data; |
6006414d PR |
561 | |
562 | ifp = zevpn->vxlan_if; | |
563 | if (!ifp) | |
564 | return; | |
565 | zif = ifp->info; | |
566 | ||
567 | /* If down or not mapped to a bridge, we're done. */ | |
568 | if (!if_is_operative(ifp) || !zif->brslave_info.br_if) | |
569 | return; | |
570 | zl2_info = zif->l2info.vxl; | |
571 | ||
572 | vlan_if = | |
573 | zvni_map_to_svi(zl2_info.access_vlan, zif->brslave_info.br_if); | |
574 | if (!vlan_if) | |
575 | return; | |
576 | ||
577 | /* Add primary SVI MAC-IP */ | |
c0c7707d AK |
578 | if (advertise_svi_macip_enabled(zevpn) |
579 | || advertise_gw_macip_enabled(zevpn)) | |
580 | zebra_evpn_add_macip_for_intf(vlan_if, zevpn); | |
6006414d PR |
581 | |
582 | if (advertise_gw_macip_enabled(zevpn)) { | |
583 | /* Add VRR MAC-IP - if any*/ | |
584 | vrr_if = zebra_get_vrr_intf_for_svi(vlan_if); | |
585 | if (vrr_if) | |
8b5fdf2e | 586 | zebra_evpn_add_macip_for_intf(vrr_if, zevpn); |
6006414d PR |
587 | } |
588 | ||
589 | return; | |
590 | } | |
591 | ||
8b5fdf2e PR |
592 | void zebra_evpn_svi_macip_del_for_evpn_hash(struct hash_bucket *bucket, |
593 | void *ctxt) | |
6006414d | 594 | { |
f6371c34 | 595 | struct zebra_evpn *zevpn = NULL; |
6006414d PR |
596 | struct zebra_if *zif = NULL; |
597 | struct zebra_l2info_vxlan zl2_info; | |
598 | struct interface *vlan_if = NULL; | |
599 | struct interface *ifp; | |
600 | ||
601 | /* Add primary SVI MAC*/ | |
f6371c34 | 602 | zevpn = (struct zebra_evpn *)bucket->data; |
6006414d PR |
603 | if (!zevpn) |
604 | return; | |
605 | ||
606 | /* Global(vrf) advertise-svi-ip disabled, but zevpn advertise-svi-ip | |
607 | * enabled | |
608 | */ | |
609 | if (zevpn->advertise_svi_macip) { | |
610 | if (IS_ZEBRA_DEBUG_VXLAN) | |
611 | zlog_debug("VNI: %u SVI-MACIP enabled, retain svi-macip", | |
612 | zevpn->vni); | |
613 | return; | |
614 | } | |
615 | ||
616 | ifp = zevpn->vxlan_if; | |
617 | if (!ifp) | |
618 | return; | |
619 | zif = ifp->info; | |
620 | ||
621 | /* If down or not mapped to a bridge, we're done. */ | |
622 | if (!if_is_operative(ifp) || !zif->brslave_info.br_if) | |
623 | return; | |
624 | ||
625 | zl2_info = zif->l2info.vxl; | |
626 | ||
627 | vlan_if = | |
628 | zvni_map_to_svi(zl2_info.access_vlan, zif->brslave_info.br_if); | |
629 | if (!vlan_if) | |
630 | return; | |
631 | ||
632 | /* Del primary MAC-IP */ | |
8b5fdf2e | 633 | zebra_evpn_del_macip_for_intf(vlan_if, zevpn); |
6006414d PR |
634 | |
635 | return; | |
636 | } | |
637 | ||
2961d060 PG |
638 | static int zebra_evpn_map_vlan_ns(struct ns *ns, |
639 | void *_in_param, | |
640 | void **_p_zevpn) | |
6006414d | 641 | { |
2961d060 | 642 | struct zebra_ns *zns = ns->info; |
6006414d | 643 | struct route_node *rn; |
9609fab7 | 644 | struct interface *br_if; |
f6371c34 DS |
645 | struct zebra_evpn **p_zevpn = (struct zebra_evpn **)_p_zevpn; |
646 | struct zebra_evpn *zevpn; | |
6006414d PR |
647 | struct interface *tmp_if = NULL; |
648 | struct zebra_if *zif; | |
6006414d | 649 | struct zebra_l2info_vxlan *vxl = NULL; |
9609fab7 PG |
650 | struct zebra_from_svi_param *in_param = |
651 | (struct zebra_from_svi_param *)_in_param; | |
6006414d | 652 | |
44a84850 | 653 | assert(p_zevpn && in_param); |
654 | ||
9609fab7 PG |
655 | br_if = in_param->br_if; |
656 | zif = in_param->zif; | |
6006414d | 657 | assert(zif); |
9609fab7 | 658 | assert(br_if); |
6006414d PR |
659 | |
660 | /* See if this interface (or interface plus VLAN Id) maps to a VxLAN */ | |
661 | /* TODO: Optimize with a hash. */ | |
6006414d PR |
662 | for (rn = route_top(zns->if_table); rn; rn = route_next(rn)) { |
663 | tmp_if = (struct interface *)rn->info; | |
664 | if (!tmp_if) | |
665 | continue; | |
666 | zif = tmp_if->info; | |
667 | if (!zif || zif->zif_type != ZEBRA_IF_VXLAN) | |
668 | continue; | |
669 | if (!if_is_operative(tmp_if)) | |
670 | continue; | |
671 | vxl = &zif->l2info.vxl; | |
672 | ||
673 | if (zif->brslave_info.br_if != br_if) | |
674 | continue; | |
675 | ||
9609fab7 PG |
676 | if (!in_param->bridge_vlan_aware |
677 | || vxl->access_vlan == in_param->vid) { | |
44a84850 | 678 | zevpn = zebra_evpn_lookup(vxl->vni); |
679 | *p_zevpn = zevpn; | |
680 | return NS_WALK_STOP; | |
6006414d PR |
681 | } |
682 | } | |
6006414d | 683 | |
44a84850 | 684 | return NS_WALK_CONTINUE; |
9609fab7 PG |
685 | } |
686 | ||
6006414d PR |
687 | /* |
688 | * Map port or (port, VLAN) to an EVPN. This is invoked upon getting MAC | |
689 | * notifications, to see if they are of interest. | |
690 | */ | |
f6371c34 DS |
691 | struct zebra_evpn *zebra_evpn_map_vlan(struct interface *ifp, |
692 | struct interface *br_if, vlanid_t vid) | |
6006414d | 693 | { |
6006414d PR |
694 | struct zebra_if *zif; |
695 | struct zebra_l2info_bridge *br; | |
f6371c34 DS |
696 | struct zebra_evpn **p_zevpn; |
697 | struct zebra_evpn *zevpn = NULL; | |
9609fab7 | 698 | struct zebra_from_svi_param in_param; |
6006414d PR |
699 | |
700 | /* Determine if bridge is VLAN-aware or not */ | |
701 | zif = br_if->info; | |
702 | assert(zif); | |
703 | br = &zif->l2info.br; | |
9609fab7 PG |
704 | in_param.bridge_vlan_aware = br->vlan_aware; |
705 | in_param.vid = vid; | |
706 | in_param.br_if = br_if; | |
707 | in_param.zif = zif; | |
708 | p_zevpn = &zevpn; | |
709 | ||
2961d060 PG |
710 | ns_walk_func(zebra_evpn_map_vlan_ns, |
711 | (void *)&in_param, | |
712 | (void **)p_zevpn); | |
6006414d PR |
713 | return zevpn; |
714 | } | |
715 | ||
2961d060 PG |
716 | static int zebra_evpn_from_svi_ns(struct ns *ns, |
717 | void *_in_param, | |
718 | void **_p_zevpn) | |
6006414d | 719 | { |
2961d060 | 720 | struct zebra_ns *zns = ns->info; |
6006414d | 721 | struct route_node *rn; |
9d277b8c | 722 | struct interface *br_if; |
f6371c34 DS |
723 | struct zebra_evpn **p_zevpn = (struct zebra_evpn **)_p_zevpn; |
724 | struct zebra_evpn *zevpn; | |
6006414d PR |
725 | struct interface *tmp_if = NULL; |
726 | struct zebra_if *zif; | |
6006414d | 727 | struct zebra_l2info_vxlan *vxl = NULL; |
a237058f PG |
728 | struct zebra_from_svi_param *in_param = |
729 | (struct zebra_from_svi_param *)_in_param; | |
6006414d PR |
730 | int found = 0; |
731 | ||
9d277b8c | 732 | if (!in_param) |
2961d060 | 733 | return NS_WALK_STOP; |
9d277b8c PG |
734 | br_if = in_param->br_if; |
735 | zif = in_param->zif; | |
6006414d | 736 | assert(zif); |
6006414d | 737 | |
6006414d | 738 | /* TODO: Optimize with a hash. */ |
6006414d PR |
739 | for (rn = route_top(zns->if_table); rn; rn = route_next(rn)) { |
740 | tmp_if = (struct interface *)rn->info; | |
741 | if (!tmp_if) | |
742 | continue; | |
743 | zif = tmp_if->info; | |
744 | if (!zif || zif->zif_type != ZEBRA_IF_VXLAN) | |
745 | continue; | |
746 | if (!if_is_operative(tmp_if)) | |
747 | continue; | |
748 | vxl = &zif->l2info.vxl; | |
749 | ||
750 | if (zif->brslave_info.br_if != br_if) | |
751 | continue; | |
752 | ||
9d277b8c PG |
753 | if (!in_param->bridge_vlan_aware |
754 | || vxl->access_vlan == in_param->vid) { | |
6006414d PR |
755 | found = 1; |
756 | break; | |
757 | } | |
758 | } | |
759 | ||
760 | if (!found) | |
2961d060 | 761 | return NS_WALK_CONTINUE; |
6006414d | 762 | |
8b5fdf2e | 763 | zevpn = zebra_evpn_lookup(vxl->vni); |
9d277b8c PG |
764 | if (p_zevpn) |
765 | *p_zevpn = zevpn; | |
2961d060 | 766 | return NS_WALK_STOP; |
6006414d PR |
767 | } |
768 | ||
769 | /* | |
8b5fdf2e | 770 | * Map SVI and associated bridge to an EVPN. This is invoked upon getting |
6006414d PR |
771 | * neighbor notifications, to see if they are of interest. |
772 | */ | |
f6371c34 DS |
773 | struct zebra_evpn *zebra_evpn_from_svi(struct interface *ifp, |
774 | struct interface *br_if) | |
6006414d | 775 | { |
6006414d | 776 | struct zebra_l2info_bridge *br; |
f6371c34 DS |
777 | struct zebra_evpn *zevpn = NULL; |
778 | struct zebra_evpn **p_zevpn; | |
9d277b8c | 779 | struct zebra_if *zif; |
a237058f | 780 | struct zebra_from_svi_param in_param; |
6006414d PR |
781 | |
782 | if (!br_if) | |
783 | return NULL; | |
784 | ||
785 | /* Make sure the linked interface is a bridge. */ | |
786 | if (!IS_ZEBRA_IF_BRIDGE(br_if)) | |
787 | return NULL; | |
788 | ||
789 | /* Determine if bridge is VLAN-aware or not */ | |
790 | zif = br_if->info; | |
791 | assert(zif); | |
792 | br = &zif->l2info.br; | |
9d277b8c PG |
793 | in_param.bridge_vlan_aware = br->vlan_aware; |
794 | in_param.vid = 0; | |
795 | ||
796 | if (in_param.bridge_vlan_aware) { | |
6006414d PR |
797 | struct zebra_l2info_vlan *vl; |
798 | ||
799 | if (!IS_ZEBRA_IF_VLAN(ifp)) | |
800 | return NULL; | |
801 | ||
802 | zif = ifp->info; | |
803 | assert(zif); | |
804 | vl = &zif->l2info.vl; | |
9d277b8c | 805 | in_param.vid = vl->vid; |
6006414d PR |
806 | } |
807 | ||
9d277b8c PG |
808 | in_param.br_if = br_if; |
809 | in_param.zif = zif; | |
810 | p_zevpn = &zevpn; | |
6006414d | 811 | /* See if this interface (or interface plus VLAN Id) maps to a VxLAN */ |
2961d060 PG |
812 | ns_walk_func(zebra_evpn_from_svi_ns, (void *)&in_param, |
813 | (void **)p_zevpn); | |
6006414d PR |
814 | return zevpn; |
815 | } | |
816 | ||
a1ce03e1 PG |
817 | static int zvni_map_to_macvlan_ns(struct ns *ns, |
818 | void *_in_param, | |
819 | void **_p_ifp) | |
820 | { | |
821 | struct zebra_ns *zns = ns->info; | |
822 | struct zebra_from_svi_param *in_param = | |
823 | (struct zebra_from_svi_param *)_in_param; | |
824 | struct interface **p_ifp = (struct interface **)_p_ifp; | |
825 | struct route_node *rn; | |
826 | struct interface *tmp_if = NULL; | |
827 | struct zebra_if *zif; | |
828 | ||
44a84850 | 829 | assert(in_param && p_ifp); |
a1ce03e1 PG |
830 | |
831 | /* Identify corresponding VLAN interface. */ | |
6006414d PR |
832 | for (rn = route_top(zns->if_table); rn; rn = route_next(rn)) { |
833 | tmp_if = (struct interface *)rn->info; | |
a1ce03e1 PG |
834 | /* Check oper status of the SVI. */ |
835 | if (!tmp_if || !if_is_operative(tmp_if)) | |
6006414d PR |
836 | continue; |
837 | zif = tmp_if->info; | |
6006414d | 838 | |
a1ce03e1 | 839 | if (!zif || zif->zif_type != ZEBRA_IF_MACVLAN) |
6006414d PR |
840 | continue; |
841 | ||
a1ce03e1 | 842 | if (zif->link == in_param->svi_if) { |
44a84850 | 843 | *p_ifp = tmp_if; |
a1ce03e1 | 844 | return NS_WALK_STOP; |
6006414d PR |
845 | } |
846 | } | |
847 | ||
a1ce03e1 | 848 | return NS_WALK_CONTINUE; |
6006414d PR |
849 | } |
850 | ||
6006414d PR |
851 | /* Map to MAC-VLAN interface corresponding to specified SVI interface. |
852 | */ | |
8b5fdf2e PR |
853 | struct interface *zebra_evpn_map_to_macvlan(struct interface *br_if, |
854 | struct interface *svi_if) | |
6006414d | 855 | { |
6006414d PR |
856 | struct interface *tmp_if = NULL; |
857 | struct zebra_if *zif; | |
a1ce03e1 PG |
858 | struct interface **p_ifp; |
859 | struct zebra_from_svi_param in_param; | |
6006414d PR |
860 | |
861 | /* Defensive check, caller expected to invoke only with valid bridge. */ | |
862 | if (!br_if) | |
863 | return NULL; | |
864 | ||
865 | if (!svi_if) { | |
866 | zlog_debug("svi_if is not passed."); | |
867 | return NULL; | |
868 | } | |
869 | ||
870 | /* Determine if bridge is VLAN-aware or not */ | |
871 | zif = br_if->info; | |
872 | assert(zif); | |
873 | ||
a1ce03e1 PG |
874 | in_param.vid = 0; |
875 | in_param.br_if = br_if; | |
876 | in_param.zif = NULL; | |
877 | in_param.svi_if = svi_if; | |
878 | p_ifp = &tmp_if; | |
6006414d | 879 | |
a1ce03e1 PG |
880 | /* Identify corresponding VLAN interface. */ |
881 | ns_walk_func(zvni_map_to_macvlan_ns, | |
882 | (void *)&in_param, | |
883 | (void **)p_ifp); | |
884 | return tmp_if; | |
6006414d PR |
885 | } |
886 | ||
887 | /* | |
888 | * Install MAC hash entry - called upon access VLAN change. | |
889 | */ | |
8b5fdf2e | 890 | void zebra_evpn_install_mac_hash(struct hash_bucket *bucket, void *ctxt) |
6006414d | 891 | { |
3198b2b3 | 892 | struct zebra_mac *mac; |
6006414d PR |
893 | struct mac_walk_ctx *wctx = ctxt; |
894 | ||
3198b2b3 | 895 | mac = (struct zebra_mac *)bucket->data; |
6006414d PR |
896 | |
897 | if (CHECK_FLAG(mac->flags, ZEBRA_MAC_REMOTE)) | |
898 | zebra_evpn_rem_mac_install(wctx->zevpn, mac, false); | |
899 | } | |
900 | ||
901 | /* | |
902 | * Read and populate local MACs and neighbors corresponding to this EVPN. | |
903 | */ | |
f6371c34 | 904 | void zebra_evpn_read_mac_neigh(struct zebra_evpn *zevpn, struct interface *ifp) |
6006414d PR |
905 | { |
906 | struct zebra_ns *zns; | |
b5fde6fd | 907 | struct zebra_vrf *zvrf; |
6006414d PR |
908 | struct zebra_if *zif; |
909 | struct interface *vlan_if; | |
910 | struct zebra_l2info_vxlan *vxl; | |
911 | struct interface *vrr_if; | |
912 | ||
913 | zif = ifp->info; | |
914 | vxl = &zif->l2info.vxl; | |
b5fde6fd PG |
915 | zvrf = zebra_vrf_lookup_by_id(zevpn->vrf_id); |
916 | if (!zvrf || !zvrf->zns) | |
917 | return; | |
918 | zns = zvrf->zns; | |
6006414d PR |
919 | |
920 | if (IS_ZEBRA_DEBUG_VXLAN) | |
921 | zlog_debug( | |
922 | "Reading MAC FDB and Neighbors for intf %s(%u) VNI %u master %u", | |
923 | ifp->name, ifp->ifindex, zevpn->vni, | |
924 | zif->brslave_info.bridge_ifindex); | |
925 | ||
926 | macfdb_read_for_bridge(zns, ifp, zif->brslave_info.br_if); | |
927 | vlan_if = zvni_map_to_svi(vxl->access_vlan, zif->brslave_info.br_if); | |
928 | if (vlan_if) { | |
243b74ed AK |
929 | /* Add SVI MAC */ |
930 | zebra_evpn_acc_bd_svi_mac_add(vlan_if); | |
6006414d PR |
931 | |
932 | /* Add SVI MAC-IP */ | |
c0c7707d AK |
933 | if (advertise_svi_macip_enabled(zevpn) |
934 | || advertise_gw_macip_enabled(zevpn)) | |
935 | zebra_evpn_add_macip_for_intf(vlan_if, zevpn); | |
6006414d PR |
936 | |
937 | /* Add VRR MAC-IP - if any*/ | |
c0c7707d AK |
938 | if (advertise_gw_macip_enabled(zevpn)) { |
939 | vrr_if = zebra_get_vrr_intf_for_svi(vlan_if); | |
940 | if (vrr_if) | |
941 | zebra_evpn_add_macip_for_intf(vrr_if, zevpn); | |
942 | } | |
6006414d PR |
943 | |
944 | neigh_read_for_vlan(zns, vlan_if); | |
945 | } | |
946 | } | |
947 | ||
948 | /* | |
8b5fdf2e | 949 | * Hash function for EVPN. |
6006414d | 950 | */ |
8b5fdf2e | 951 | unsigned int zebra_evpn_hash_keymake(const void *p) |
6006414d | 952 | { |
f6371c34 | 953 | const struct zebra_evpn *zevpn = p; |
6006414d PR |
954 | |
955 | return (jhash_1word(zevpn->vni, 0)); | |
956 | } | |
957 | ||
958 | /* | |
8b5fdf2e | 959 | * Compare 2 evpn hash entries. |
6006414d | 960 | */ |
8b5fdf2e | 961 | bool zebra_evpn_hash_cmp(const void *p1, const void *p2) |
6006414d | 962 | { |
f6371c34 DS |
963 | const struct zebra_evpn *zevpn1 = p1; |
964 | const struct zebra_evpn *zevpn2 = p2; | |
6006414d PR |
965 | |
966 | return (zevpn1->vni == zevpn2->vni); | |
967 | } | |
968 | ||
8b5fdf2e | 969 | int zebra_evpn_list_cmp(void *p1, void *p2) |
6006414d | 970 | { |
f6371c34 DS |
971 | const struct zebra_evpn *zevpn1 = p1; |
972 | const struct zebra_evpn *zevpn2 = p2; | |
6006414d PR |
973 | |
974 | if (zevpn1->vni == zevpn2->vni) | |
975 | return 0; | |
976 | return (zevpn1->vni < zevpn2->vni) ? -1 : 1; | |
977 | } | |
978 | ||
979 | /* | |
980 | * Callback to allocate VNI hash entry. | |
981 | */ | |
8b5fdf2e | 982 | void *zebra_evpn_alloc(void *p) |
6006414d | 983 | { |
f6371c34 DS |
984 | const struct zebra_evpn *tmp_vni = p; |
985 | struct zebra_evpn *zevpn; | |
6006414d | 986 | |
f6371c34 | 987 | zevpn = XCALLOC(MTYPE_ZEVPN, sizeof(struct zebra_evpn)); |
6006414d PR |
988 | zevpn->vni = tmp_vni->vni; |
989 | return ((void *)zevpn); | |
990 | } | |
991 | ||
992 | /* | |
993 | * Look up EVPN hash entry. | |
994 | */ | |
f6371c34 | 995 | struct zebra_evpn *zebra_evpn_lookup(vni_t vni) |
6006414d PR |
996 | { |
997 | struct zebra_vrf *zvrf; | |
f6371c34 DS |
998 | struct zebra_evpn tmp_vni; |
999 | struct zebra_evpn *zevpn = NULL; | |
6006414d PR |
1000 | |
1001 | zvrf = zebra_vrf_get_evpn(); | |
6006b807 | 1002 | memset(&tmp_vni, 0, sizeof(tmp_vni)); |
6006414d PR |
1003 | tmp_vni.vni = vni; |
1004 | zevpn = hash_lookup(zvrf->evpn_table, &tmp_vni); | |
1005 | ||
1006 | return zevpn; | |
1007 | } | |
1008 | ||
1009 | /* | |
1010 | * Add EVPN hash entry. | |
1011 | */ | |
f6371c34 | 1012 | struct zebra_evpn *zebra_evpn_add(vni_t vni) |
6006414d | 1013 | { |
38078b1d | 1014 | char buffer[80]; |
6006414d | 1015 | struct zebra_vrf *zvrf; |
f6371c34 DS |
1016 | struct zebra_evpn tmp_zevpn; |
1017 | struct zebra_evpn *zevpn = NULL; | |
6006414d PR |
1018 | |
1019 | zvrf = zebra_vrf_get_evpn(); | |
6006b807 | 1020 | memset(&tmp_zevpn, 0, sizeof(tmp_zevpn)); |
6006414d | 1021 | tmp_zevpn.vni = vni; |
8b5fdf2e | 1022 | zevpn = hash_get(zvrf->evpn_table, &tmp_zevpn, zebra_evpn_alloc); |
6006414d | 1023 | |
945ee7b2 | 1024 | zebra_evpn_es_evi_init(zevpn); |
6006414d | 1025 | |
38078b1d | 1026 | snprintf(buffer, sizeof(buffer), "Zebra EVPN MAC Table vni: %u", vni); |
6006414d | 1027 | /* Create hash table for MAC */ |
38078b1d | 1028 | zevpn->mac_table = zebra_mac_db_create(buffer); |
6006414d | 1029 | |
e2071325 DL |
1030 | snprintf(buffer, sizeof(buffer), "Zebra EVPN Neighbor Table vni: %u", |
1031 | vni); | |
6006414d | 1032 | /* Create hash table for neighbors */ |
38078b1d | 1033 | zevpn->neigh_table = zebra_neigh_db_create(buffer); |
6006414d PR |
1034 | |
1035 | return zevpn; | |
1036 | } | |
1037 | ||
6006414d PR |
1038 | /* |
1039 | * Delete EVPN hash entry. | |
1040 | */ | |
f6371c34 | 1041 | int zebra_evpn_del(struct zebra_evpn *zevpn) |
6006414d PR |
1042 | { |
1043 | struct zebra_vrf *zvrf; | |
f6371c34 | 1044 | struct zebra_evpn *tmp_zevpn; |
6006414d PR |
1045 | |
1046 | zvrf = zebra_vrf_get_evpn(); | |
6006414d | 1047 | |
9daa5d47 AD |
1048 | zevpn->svi_if = NULL; |
1049 | ||
6006414d PR |
1050 | /* Free the neighbor hash table. */ |
1051 | hash_free(zevpn->neigh_table); | |
1052 | zevpn->neigh_table = NULL; | |
1053 | ||
1054 | /* Free the MAC hash table. */ | |
1055 | hash_free(zevpn->mac_table); | |
1056 | zevpn->mac_table = NULL; | |
1057 | ||
963b0c55 AK |
1058 | /* Remove references to the zevpn in the MH databases */ |
1059 | if (zevpn->vxlan_if) | |
1060 | zebra_evpn_vxl_evpn_set(zevpn->vxlan_if->info, zevpn, false); | |
945ee7b2 | 1061 | zebra_evpn_es_evi_cleanup(zevpn); |
6006414d PR |
1062 | |
1063 | /* Free the EVPN hash entry and allocated memory. */ | |
1064 | tmp_zevpn = hash_release(zvrf->evpn_table, zevpn); | |
1065 | XFREE(MTYPE_ZEVPN, tmp_zevpn); | |
1066 | ||
1067 | return 0; | |
1068 | } | |
1069 | ||
1070 | /* | |
1071 | * Inform BGP about local EVPN addition. | |
1072 | */ | |
f6371c34 | 1073 | int zebra_evpn_send_add_to_client(struct zebra_evpn *zevpn) |
6006414d PR |
1074 | { |
1075 | struct zserv *client; | |
1076 | struct stream *s; | |
9daa5d47 | 1077 | ifindex_t svi_index; |
6006414d PR |
1078 | int rc; |
1079 | ||
1080 | client = zserv_find_client(ZEBRA_ROUTE_BGP, 0); | |
1081 | /* BGP may not be running. */ | |
1082 | if (!client) | |
1083 | return 0; | |
1084 | ||
9daa5d47 AD |
1085 | svi_index = zevpn->svi_if ? zevpn->svi_if->ifindex : 0; |
1086 | ||
6006414d PR |
1087 | s = stream_new(ZEBRA_MAX_PACKET_SIZ); |
1088 | ||
1089 | zclient_create_header(s, ZEBRA_VNI_ADD, zebra_vrf_get_evpn_id()); | |
1090 | stream_putl(s, zevpn->vni); | |
1091 | stream_put_in_addr(s, &zevpn->local_vtep_ip); | |
1092 | stream_put(s, &zevpn->vrf_id, sizeof(vrf_id_t)); /* tenant vrf */ | |
1093 | stream_put_in_addr(s, &zevpn->mcast_grp); | |
9daa5d47 | 1094 | stream_put(s, &svi_index, sizeof(ifindex_t)); |
6006414d PR |
1095 | |
1096 | /* Write packet size. */ | |
1097 | stream_putw_at(s, 0, stream_get_endp(s)); | |
1098 | ||
1099 | if (IS_ZEBRA_DEBUG_VXLAN) | |
9daa5d47 AD |
1100 | zlog_debug( |
1101 | "Send EVPN_ADD %u %pI4 tenant vrf %s(%u) SVI index %u to %s", | |
1102 | zevpn->vni, &zevpn->local_vtep_ip, | |
1103 | vrf_id_to_name(zevpn->vrf_id), zevpn->vrf_id, | |
1104 | (zevpn->svi_if ? zevpn->svi_if->ifindex : 0), | |
1105 | zebra_route_string(client->proto)); | |
6006414d PR |
1106 | |
1107 | client->vniadd_cnt++; | |
1108 | rc = zserv_send_message(client, s); | |
1109 | ||
1110 | if (!(zevpn->flags & ZEVPN_READY_FOR_BGP)) { | |
1111 | zevpn->flags |= ZEVPN_READY_FOR_BGP; | |
1112 | /* once the EVPN is sent the ES-EVIs can also be replayed | |
1113 | * to BGP | |
1114 | */ | |
1115 | zebra_evpn_update_all_es(zevpn); | |
1116 | } | |
1117 | return rc; | |
1118 | } | |
1119 | ||
1120 | /* | |
1121 | * Inform BGP about local EVPN deletion. | |
1122 | */ | |
f6371c34 | 1123 | int zebra_evpn_send_del_to_client(struct zebra_evpn *zevpn) |
6006414d PR |
1124 | { |
1125 | struct zserv *client; | |
1126 | struct stream *s; | |
1127 | ||
1128 | client = zserv_find_client(ZEBRA_ROUTE_BGP, 0); | |
1129 | /* BGP may not be running. */ | |
1130 | if (!client) | |
1131 | return 0; | |
1132 | ||
1133 | if (zevpn->flags & ZEVPN_READY_FOR_BGP) { | |
1134 | zevpn->flags &= ~ZEVPN_READY_FOR_BGP; | |
1135 | /* the ES-EVIs must be removed from BGP before the EVPN is */ | |
1136 | zebra_evpn_update_all_es(zevpn); | |
1137 | } | |
1138 | ||
1139 | s = stream_new(ZEBRA_MAX_PACKET_SIZ); | |
1140 | stream_reset(s); | |
1141 | ||
1142 | zclient_create_header(s, ZEBRA_VNI_DEL, zebra_vrf_get_evpn_id()); | |
1143 | stream_putl(s, zevpn->vni); | |
1144 | ||
1145 | /* Write packet size. */ | |
1146 | stream_putw_at(s, 0, stream_get_endp(s)); | |
1147 | ||
1148 | if (IS_ZEBRA_DEBUG_VXLAN) | |
1149 | zlog_debug("Send EVPN_DEL %u to %s", zevpn->vni, | |
1150 | zebra_route_string(client->proto)); | |
1151 | ||
1152 | client->vnidel_cnt++; | |
1153 | return zserv_send_message(client, s); | |
1154 | } | |
1155 | ||
6006414d PR |
1156 | /* |
1157 | * See if remote VTEP matches with prefix. | |
1158 | */ | |
c172c032 DS |
1159 | static int zebra_evpn_vtep_match(struct in_addr *vtep_ip, |
1160 | struct zebra_vtep *zvtep) | |
6006414d PR |
1161 | { |
1162 | return (IPV4_ADDR_SAME(vtep_ip, &zvtep->vtep_ip)); | |
1163 | } | |
1164 | ||
1165 | /* | |
1166 | * Locate remote VTEP in EVPN hash table. | |
1167 | */ | |
c172c032 DS |
1168 | struct zebra_vtep *zebra_evpn_vtep_find(struct zebra_evpn *zevpn, |
1169 | struct in_addr *vtep_ip) | |
6006414d | 1170 | { |
c172c032 | 1171 | struct zebra_vtep *zvtep; |
6006414d PR |
1172 | |
1173 | if (!zevpn) | |
1174 | return NULL; | |
1175 | ||
1176 | for (zvtep = zevpn->vteps; zvtep; zvtep = zvtep->next) { | |
8b5fdf2e | 1177 | if (zebra_evpn_vtep_match(vtep_ip, zvtep)) |
6006414d PR |
1178 | break; |
1179 | } | |
1180 | ||
1181 | return zvtep; | |
1182 | } | |
1183 | ||
1184 | /* | |
1185 | * Add remote VTEP to EVPN hash table. | |
1186 | */ | |
c172c032 DS |
1187 | struct zebra_vtep *zebra_evpn_vtep_add(struct zebra_evpn *zevpn, |
1188 | struct in_addr *vtep_ip, | |
1189 | int flood_control) | |
6006414d PR |
1190 | |
1191 | { | |
c172c032 | 1192 | struct zebra_vtep *zvtep; |
6006414d | 1193 | |
c172c032 | 1194 | zvtep = XCALLOC(MTYPE_ZEVPN_VTEP, sizeof(struct zebra_vtep)); |
6006414d PR |
1195 | |
1196 | zvtep->vtep_ip = *vtep_ip; | |
1197 | zvtep->flood_control = flood_control; | |
1198 | ||
1199 | if (zevpn->vteps) | |
1200 | zevpn->vteps->prev = zvtep; | |
1201 | zvtep->next = zevpn->vteps; | |
1202 | zevpn->vteps = zvtep; | |
1203 | ||
1204 | return zvtep; | |
1205 | } | |
1206 | ||
1207 | /* | |
1208 | * Remove remote VTEP from EVPN hash table. | |
1209 | */ | |
c172c032 | 1210 | int zebra_evpn_vtep_del(struct zebra_evpn *zevpn, struct zebra_vtep *zvtep) |
6006414d PR |
1211 | { |
1212 | if (zvtep->next) | |
1213 | zvtep->next->prev = zvtep->prev; | |
1214 | if (zvtep->prev) | |
1215 | zvtep->prev->next = zvtep->next; | |
1216 | else | |
1217 | zevpn->vteps = zvtep->next; | |
1218 | ||
1219 | zvtep->prev = zvtep->next = NULL; | |
1220 | XFREE(MTYPE_ZEVPN_VTEP, zvtep); | |
1221 | ||
1222 | return 0; | |
1223 | } | |
1224 | ||
1225 | /* | |
1226 | * Delete all remote VTEPs for this EVPN (upon VNI delete). Also | |
1227 | * uninstall from kernel if asked to. | |
1228 | */ | |
f6371c34 | 1229 | int zebra_evpn_vtep_del_all(struct zebra_evpn *zevpn, int uninstall) |
6006414d | 1230 | { |
c172c032 | 1231 | struct zebra_vtep *zvtep, *zvtep_next; |
6006414d PR |
1232 | |
1233 | if (!zevpn) | |
1234 | return -1; | |
1235 | ||
1236 | for (zvtep = zevpn->vteps; zvtep; zvtep = zvtep_next) { | |
1237 | zvtep_next = zvtep->next; | |
1238 | if (uninstall) | |
8b5fdf2e PR |
1239 | zebra_evpn_vtep_uninstall(zevpn, &zvtep->vtep_ip); |
1240 | zebra_evpn_vtep_del(zevpn, zvtep); | |
6006414d PR |
1241 | } |
1242 | ||
1243 | return 0; | |
1244 | } | |
1245 | ||
1246 | /* | |
1247 | * Install remote VTEP into the kernel if the remote VTEP has asked | |
1248 | * for head-end-replication. | |
1249 | */ | |
c172c032 | 1250 | int zebra_evpn_vtep_install(struct zebra_evpn *zevpn, struct zebra_vtep *zvtep) |
6006414d PR |
1251 | { |
1252 | if (is_vxlan_flooding_head_end() && | |
1253 | (zvtep->flood_control == VXLAN_FLOOD_HEAD_END_REPL)) { | |
1254 | if (ZEBRA_DPLANE_REQUEST_FAILURE == | |
1255 | dplane_vtep_add(zevpn->vxlan_if, | |
1256 | &zvtep->vtep_ip, zevpn->vni)) | |
1257 | return -1; | |
1258 | } | |
1259 | ||
1260 | return 0; | |
1261 | } | |
1262 | ||
1263 | /* | |
1264 | * Uninstall remote VTEP from the kernel. | |
1265 | */ | |
f6371c34 | 1266 | int zebra_evpn_vtep_uninstall(struct zebra_evpn *zevpn, struct in_addr *vtep_ip) |
6006414d PR |
1267 | { |
1268 | if (!zevpn->vxlan_if) { | |
1269 | zlog_debug("VNI %u hash %p couldn't be uninstalled - no intf", | |
1270 | zevpn->vni, zevpn); | |
1271 | return -1; | |
1272 | } | |
1273 | ||
1274 | if (ZEBRA_DPLANE_REQUEST_FAILURE == | |
1275 | dplane_vtep_delete(zevpn->vxlan_if, vtep_ip, zevpn->vni)) | |
1276 | return -1; | |
1277 | ||
1278 | return 0; | |
1279 | } | |
1280 | ||
1281 | /* | |
1282 | * Install or uninstall flood entries in the kernel corresponding to | |
1283 | * remote VTEPs. This is invoked upon change to BUM handling. | |
1284 | */ | |
8b5fdf2e PR |
1285 | void zebra_evpn_handle_flooding_remote_vteps(struct hash_bucket *bucket, |
1286 | void *zvrf) | |
6006414d | 1287 | { |
f6371c34 | 1288 | struct zebra_evpn *zevpn; |
c172c032 | 1289 | struct zebra_vtep *zvtep; |
6006414d | 1290 | |
f6371c34 | 1291 | zevpn = (struct zebra_evpn *)bucket->data; |
6006414d PR |
1292 | if (!zevpn) |
1293 | return; | |
1294 | ||
1295 | for (zvtep = zevpn->vteps; zvtep; zvtep = zvtep->next) { | |
1296 | if (is_vxlan_flooding_head_end()) | |
8b5fdf2e | 1297 | zebra_evpn_vtep_install(zevpn, zvtep); |
6006414d | 1298 | else |
8b5fdf2e | 1299 | zebra_evpn_vtep_uninstall(zevpn, &zvtep->vtep_ip); |
6006414d PR |
1300 | } |
1301 | } | |
1302 | ||
1303 | /* | |
1304 | * Cleanup EVPN/VTEP and update kernel | |
1305 | */ | |
8b5fdf2e | 1306 | void zebra_evpn_cleanup_all(struct hash_bucket *bucket, void *arg) |
6006414d | 1307 | { |
f6371c34 | 1308 | struct zebra_evpn *zevpn = NULL; |
6006414d | 1309 | |
f6371c34 | 1310 | zevpn = (struct zebra_evpn *)bucket->data; |
6006414d | 1311 | |
6006414d PR |
1312 | /* Free up all neighbors and MACs, if any. */ |
1313 | zebra_evpn_neigh_del_all(zevpn, 1, 0, DEL_ALL_NEIGH); | |
1314 | zebra_evpn_mac_del_all(zevpn, 1, 0, DEL_ALL_MAC); | |
1315 | ||
1316 | /* Free up all remote VTEPs, if any. */ | |
8b5fdf2e | 1317 | zebra_evpn_vtep_del_all(zevpn, 1); |
6006414d PR |
1318 | |
1319 | /* Delete the hash entry. */ | |
8b5fdf2e | 1320 | zebra_evpn_del(zevpn); |
6006414d PR |
1321 | } |
1322 | ||
f6371c34 | 1323 | static void zebra_evpn_process_sync_macip_add(struct zebra_evpn *zevpn, |
1a3bd37f MS |
1324 | const struct ethaddr *macaddr, |
1325 | uint16_t ipa_len, | |
1326 | const struct ipaddr *ipaddr, | |
1327 | uint8_t flags, uint32_t seq, | |
1328 | const esi_t *esi) | |
6006414d | 1329 | { |
8b5fdf2e | 1330 | struct sync_mac_ip_ctx ctx; |
8b5fdf2e PR |
1331 | char ipbuf[INET6_ADDRSTRLEN]; |
1332 | bool sticky; | |
1333 | bool remote_gw; | |
72de4110 | 1334 | struct zebra_neigh *n = NULL; |
6006414d | 1335 | |
8b5fdf2e PR |
1336 | sticky = !!CHECK_FLAG(flags, ZEBRA_MACIP_TYPE_STICKY); |
1337 | remote_gw = !!CHECK_FLAG(flags, ZEBRA_MACIP_TYPE_GW); | |
1338 | /* if sticky or remote-gw ignore updates from the peer */ | |
1339 | if (sticky || remote_gw) { | |
1340 | if (IS_ZEBRA_DEBUG_VXLAN || IS_ZEBRA_DEBUG_EVPN_MH_NEIGH | |
1341 | || IS_ZEBRA_DEBUG_EVPN_MH_MAC) | |
1342 | zlog_debug( | |
ef7b8be4 | 1343 | "Ignore sync-macip vni %u mac %pEA%s%s%s%s", |
8b5fdf2e | 1344 | zevpn->vni, |
ef7b8be4 | 1345 | macaddr, |
8b5fdf2e PR |
1346 | ipa_len ? " IP " : "", |
1347 | ipa_len ? ipaddr2str(ipaddr, ipbuf, | |
1348 | sizeof(ipbuf)) | |
1349 | : "", | |
1350 | sticky ? " sticky" : "", | |
1351 | remote_gw ? " remote_gw" : ""); | |
1352 | return; | |
1353 | } | |
6006414d | 1354 | |
8b5fdf2e PR |
1355 | if (ipa_len) { |
1356 | n = zebra_evpn_neigh_lookup(zevpn, ipaddr); | |
1357 | if (n | |
16de1338 AK |
1358 | && !zebra_evpn_neigh_is_bgp_seq_ok(zevpn, n, macaddr, seq, |
1359 | true)) | |
8b5fdf2e PR |
1360 | return; |
1361 | } | |
6006414d | 1362 | |
8b5fdf2e PR |
1363 | memset(&ctx, 0, sizeof(ctx)); |
1364 | ctx.mac = zebra_evpn_proc_sync_mac_update( | |
1365 | zevpn, macaddr, ipa_len, ipaddr, flags, seq, esi, &ctx); | |
1366 | if (ctx.ignore_macip || !ctx.mac || !ipa_len) | |
6006414d PR |
1367 | return; |
1368 | ||
8b5fdf2e PR |
1369 | zebra_evpn_proc_sync_neigh_update(zevpn, n, ipa_len, ipaddr, flags, seq, |
1370 | esi, &ctx); | |
6006414d PR |
1371 | } |
1372 | ||
8b5fdf2e PR |
1373 | /************************** remote mac-ip handling **************************/ |
1374 | /* Process a remote MACIP add from BGP. */ | |
1a3bd37f MS |
1375 | void zebra_evpn_rem_macip_add(vni_t vni, const struct ethaddr *macaddr, |
1376 | uint16_t ipa_len, const struct ipaddr *ipaddr, | |
8b5fdf2e | 1377 | uint8_t flags, uint32_t seq, |
1a3bd37f | 1378 | struct in_addr vtep_ip, const esi_t *esi) |
6006414d | 1379 | { |
f6371c34 | 1380 | struct zebra_evpn *zevpn; |
c172c032 | 1381 | struct zebra_vtep *zvtep; |
3198b2b3 | 1382 | struct zebra_mac *mac = NULL; |
8b5fdf2e PR |
1383 | struct interface *ifp = NULL; |
1384 | struct zebra_if *zif = NULL; | |
1385 | struct zebra_vrf *zvrf; | |
6006414d | 1386 | |
8b5fdf2e PR |
1387 | /* Locate EVPN hash entry - expected to exist. */ |
1388 | zevpn = zebra_evpn_lookup(vni); | |
1389 | if (!zevpn) { | |
34c9b28b DS |
1390 | if (IS_ZEBRA_DEBUG_VXLAN) |
1391 | zlog_debug("Unknown VNI %u upon remote MACIP ADD", vni); | |
8b5fdf2e | 1392 | return; |
6006414d PR |
1393 | } |
1394 | ||
8b5fdf2e PR |
1395 | ifp = zevpn->vxlan_if; |
1396 | if (ifp) | |
1397 | zif = ifp->info; | |
1398 | if (!ifp || !if_is_operative(ifp) || !zif || !zif->brslave_info.br_if) { | |
4bf66f43 | 1399 | if (IS_ZEBRA_DEBUG_VXLAN) |
1400 | zlog_debug( | |
1401 | "Ignoring remote MACIP ADD VNI %u, invalid interface state or info", | |
1402 | vni); | |
8b5fdf2e PR |
1403 | return; |
1404 | } | |
6006414d | 1405 | |
8b5fdf2e PR |
1406 | /* Type-2 routes from another PE can be interpreted as remote or |
1407 | * SYNC based on the destination ES - | |
1408 | * SYNC - if ES is local | |
1409 | * REMOTE - if ES is not local | |
1410 | */ | |
1411 | if (flags & ZEBRA_MACIP_TYPE_SYNC_PATH) { | |
38f681e1 AK |
1412 | struct zebra_evpn_es *es; |
1413 | ||
1414 | es = zebra_evpn_es_find(esi); | |
1415 | if (es && (es->flags & ZEBRA_EVPNES_READY_FOR_BGP)) { | |
1416 | zebra_evpn_process_sync_macip_add(zevpn, macaddr, | |
1417 | ipa_len, ipaddr, | |
1418 | flags, seq, esi); | |
1419 | } else { | |
1420 | if (IS_ZEBRA_DEBUG_EVPN_MH_ES) { | |
1421 | char esi_str[ESI_STR_LEN]; | |
1422 | ||
1423 | esi_to_str(esi, esi_str, sizeof(esi_str)); | |
1424 | zlog_debug( | |
1425 | "Ignore sync-macip add; ES %s is not ready", | |
1426 | esi_str); | |
1427 | } | |
1428 | } | |
1429 | ||
8b5fdf2e PR |
1430 | return; |
1431 | } | |
6006414d | 1432 | |
8b5fdf2e PR |
1433 | /* The remote VTEP specified should normally exist, but it is |
1434 | * possible that when peering comes up, peer may advertise MACIP | |
1435 | * routes before advertising type-3 routes. | |
1436 | */ | |
1437 | if (vtep_ip.s_addr) { | |
1438 | zvtep = zebra_evpn_vtep_find(zevpn, &vtep_ip); | |
1439 | if (!zvtep) { | |
1440 | zvtep = zebra_evpn_vtep_add(zevpn, &vtep_ip, | |
1441 | VXLAN_FLOOD_DISABLED); | |
1442 | if (!zvtep) { | |
1443 | flog_err( | |
1444 | EC_ZEBRA_VTEP_ADD_FAILED, | |
1445 | "Failed to add remote VTEP, VNI %u zevpn %p upon remote MACIP ADD", | |
1446 | vni, zevpn); | |
1447 | return; | |
1448 | } | |
6006414d | 1449 | |
8b5fdf2e PR |
1450 | zebra_evpn_vtep_install(zevpn, zvtep); |
1451 | } | |
6006414d PR |
1452 | } |
1453 | ||
d6bf8f13 | 1454 | zvrf = zebra_vrf_get_evpn(); |
272e11bf MS |
1455 | if (zebra_evpn_mac_remote_macip_add(zevpn, zvrf, macaddr, ipa_len, |
1456 | ipaddr, &mac, vtep_ip, flags, seq, | |
1457 | esi) | |
8b5fdf2e | 1458 | != 0) |
6006414d | 1459 | return; |
6006414d | 1460 | |
272e11bf MS |
1461 | zebra_evpn_neigh_remote_macip_add(zevpn, zvrf, ipaddr, mac, vtep_ip, |
1462 | flags, seq); | |
6006414d PR |
1463 | } |
1464 | ||
8b5fdf2e | 1465 | /* Process a remote MACIP delete from BGP. */ |
1a3bd37f MS |
1466 | void zebra_evpn_rem_macip_del(vni_t vni, const struct ethaddr *macaddr, |
1467 | uint16_t ipa_len, const struct ipaddr *ipaddr, | |
8b5fdf2e | 1468 | struct in_addr vtep_ip) |
6006414d | 1469 | { |
f6371c34 | 1470 | struct zebra_evpn *zevpn; |
3198b2b3 | 1471 | struct zebra_mac *mac = NULL; |
72de4110 | 1472 | struct zebra_neigh *n = NULL; |
8b5fdf2e PR |
1473 | struct interface *ifp = NULL; |
1474 | struct zebra_if *zif = NULL; | |
1475 | struct zebra_ns *zns; | |
1476 | struct zebra_l2info_vxlan *vxl; | |
6006414d | 1477 | struct zebra_vrf *zvrf; |
8b5fdf2e | 1478 | char buf1[INET6_ADDRSTRLEN]; |
6006414d | 1479 | |
8b5fdf2e PR |
1480 | /* Locate EVPN hash entry - expected to exist. */ |
1481 | zevpn = zebra_evpn_lookup(vni); | |
1482 | if (!zevpn) { | |
1483 | if (IS_ZEBRA_DEBUG_VXLAN) | |
1484 | zlog_debug("Unknown VNI %u upon remote MACIP DEL", vni); | |
6006414d | 1485 | return; |
6006414d PR |
1486 | } |
1487 | ||
8b5fdf2e PR |
1488 | ifp = zevpn->vxlan_if; |
1489 | if (ifp) | |
1490 | zif = ifp->info; | |
1491 | if (!ifp || !if_is_operative(ifp) || !zif || !zif->brslave_info.br_if) { | |
1492 | if (IS_ZEBRA_DEBUG_VXLAN) | |
1493 | zlog_debug( | |
1494 | "Ignoring remote MACIP DEL VNI %u, invalid interface state or info", | |
1495 | vni); | |
6006414d | 1496 | return; |
8b5fdf2e PR |
1497 | } |
1498 | zns = zebra_ns_lookup(NS_DEFAULT); | |
1499 | vxl = &zif->l2info.vxl; | |
6006414d | 1500 | |
8b5fdf2e PR |
1501 | mac = zebra_evpn_mac_lookup(zevpn, macaddr); |
1502 | if (ipa_len) | |
1503 | n = zebra_evpn_neigh_lookup(zevpn, ipaddr); | |
6006414d | 1504 | |
8b5fdf2e PR |
1505 | if (n && !mac) { |
1506 | zlog_warn( | |
ef7b8be4 DL |
1507 | "Failed to locate MAC %pEA for neigh %pIA VNI %u upon remote MACIP DEL", |
1508 | macaddr, ipaddr, vni); | |
6006414d | 1509 | return; |
8b5fdf2e | 1510 | } |
6006414d | 1511 | |
8b5fdf2e PR |
1512 | /* If the remote mac or neighbor doesn't exist there is nothing |
1513 | * more to do. Otherwise, uninstall the entry and then remove it. | |
1514 | */ | |
1515 | if (!mac && !n) | |
6006414d PR |
1516 | return; |
1517 | ||
096f7609 | 1518 | zvrf = zevpn->vxlan_if->vrf->info; |
6006414d | 1519 | |
8b5fdf2e PR |
1520 | /* Ignore the delete if this mac is a gateway mac-ip */ |
1521 | if (CHECK_FLAG(mac->flags, ZEBRA_MAC_LOCAL) | |
1522 | && CHECK_FLAG(mac->flags, ZEBRA_MAC_DEF_GW)) { | |
1523 | zlog_warn( | |
ef7b8be4 DL |
1524 | "Ignore remote MACIP DEL VNI %u MAC %pEA%s%s as MAC is already configured as gateway MAC", |
1525 | vni, macaddr, | |
8b5fdf2e PR |
1526 | ipa_len ? " IP " : "", |
1527 | ipa_len ? ipaddr2str(ipaddr, buf1, sizeof(buf1)) : ""); | |
6006414d | 1528 | return; |
8b5fdf2e | 1529 | } |
6006414d | 1530 | |
8b5fdf2e PR |
1531 | /* Uninstall remote neighbor or MAC. */ |
1532 | if (n) | |
1533 | zebra_evpn_neigh_remote_uninstall(zevpn, zvrf, n, mac, ipaddr); | |
1534 | else { | |
1535 | /* DAD: when MAC is freeze state as remote learn event, | |
1536 | * remote mac-ip delete event is received will result in freeze | |
1537 | * entry removal, first fetch kernel for the same entry present | |
1538 | * as LOCAL and reachable, avoid deleting this entry instead | |
1539 | * use kerenel local entry to update during unfreeze time. | |
1540 | */ | |
1541 | if (zvrf->dad_freeze | |
1542 | && CHECK_FLAG(mac->flags, ZEBRA_MAC_DUPLICATE) | |
1543 | && CHECK_FLAG(mac->flags, ZEBRA_MAC_REMOTE)) { | |
1544 | if (IS_ZEBRA_DEBUG_VXLAN) | |
1545 | zlog_debug( | |
ef7b8be4 DL |
1546 | "%s: MAC %pEA (flags 0x%x) is remote and duplicate, read kernel for local entry", |
1547 | __func__, macaddr, mac->flags); | |
8b5fdf2e PR |
1548 | macfdb_read_specific_mac(zns, zif->brslave_info.br_if, |
1549 | macaddr, vxl->access_vlan); | |
1550 | } | |
6006414d | 1551 | |
8b5fdf2e PR |
1552 | if (CHECK_FLAG(mac->flags, ZEBRA_MAC_LOCAL)) { |
1553 | if (!ipa_len) | |
1554 | zebra_evpn_sync_mac_del(mac); | |
1555 | } else if (CHECK_FLAG(mac->flags, ZEBRA_NEIGH_REMOTE)) { | |
1556 | zebra_evpn_rem_mac_del(zevpn, mac); | |
1557 | } | |
6006414d | 1558 | } |
6006414d PR |
1559 | } |
1560 | ||
1561 | /************************** EVPN BGP config management ************************/ | |
8b5fdf2e | 1562 | void zebra_evpn_cfg_cleanup(struct hash_bucket *bucket, void *ctxt) |
6006414d | 1563 | { |
f6371c34 | 1564 | struct zebra_evpn *zevpn = NULL; |
6006414d | 1565 | |
f6371c34 | 1566 | zevpn = (struct zebra_evpn *)bucket->data; |
6006414d PR |
1567 | zevpn->advertise_gw_macip = 0; |
1568 | zevpn->advertise_svi_macip = 0; | |
1569 | zevpn->advertise_subnet = 0; | |
1570 | ||
1571 | zebra_evpn_neigh_del_all(zevpn, 1, 0, | |
1572 | DEL_REMOTE_NEIGH | DEL_REMOTE_NEIGH_FROM_VTEP); | |
1573 | zebra_evpn_mac_del_all(zevpn, 1, 0, | |
1574 | DEL_REMOTE_MAC | DEL_REMOTE_MAC_FROM_VTEP); | |
8b5fdf2e | 1575 | zebra_evpn_vtep_del_all(zevpn, 1); |
6006414d | 1576 | } |