3 * Copyright (C) 2018 Network Device Education Foundation, Inc. ("NetDEF")
5 * FRR is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License as published by the
7 * Free Software Foundation; either version 2, or (at your option) any
10 * FRR is distributed in the hope that it will be useful, but
11 * WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * General Public License for more details.
15 * You should have received a copy of the GNU General Public License
16 * along with FRR; see the file COPYING. If not, write to the Free
17 * Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
23 #include "lib/libfrr.h"
24 #include "lib/queue.h"
25 #include "lib/stream.h"
26 #include "lib/zclient.h"
35 struct ptm_client_notification
{
36 struct bfd_session
*pcn_bs
;
37 struct ptm_client
*pcn_pc
;
39 TAILQ_ENTRY(ptm_client_notification
) pcn_entry
;
41 TAILQ_HEAD(pcnqueue
, ptm_client_notification
);
45 struct pcnqueue pc_pcnqueue
;
47 TAILQ_ENTRY(ptm_client
) pc_entry
;
49 TAILQ_HEAD(pcqueue
, ptm_client
);
51 static struct pcqueue pcqueue
;
52 static struct zclient
*zclient
;
58 static int _ptm_msg_address(struct stream
*msg
, int family
, const void *addr
);
60 static void _ptm_msg_read_address(struct stream
*msg
, struct sockaddr_any
*sa
);
61 static int _ptm_msg_read(struct stream
*msg
, int command
, vrf_id_t vrf_id
,
62 struct bfd_peer_cfg
*bpc
, struct ptm_client
**pc
);
64 static struct ptm_client
*pc_lookup(uint32_t pid
);
65 static struct ptm_client
*pc_new(uint32_t pid
);
66 static void pc_free(struct ptm_client
*pc
);
67 static void pc_free_all(void);
68 static struct ptm_client_notification
*pcn_new(struct ptm_client
*pc
,
69 struct bfd_session
*bs
);
70 static struct ptm_client_notification
*pcn_lookup(struct ptm_client
*pc
,
71 struct bfd_session
*bs
);
72 static void pcn_free(struct ptm_client_notification
*pcn
);
75 static void bfdd_dest_register(struct stream
*msg
, vrf_id_t vrf_id
);
76 static void bfdd_dest_deregister(struct stream
*msg
, vrf_id_t vrf_id
);
77 static void bfdd_client_register(struct stream
*msg
);
78 static void bfdd_client_deregister(struct stream
*msg
);
84 static void debug_printbpc(const char *func
, unsigned int line
,
85 struct bfd_peer_cfg
*bpc
);
87 static void debug_printbpc(const char *func
, unsigned int line
,
88 struct bfd_peer_cfg
*bpc
)
94 addr
[0][0] = addr
[1][0] = addr
[2][0] = timers
[0][0] = timers
[1][0] =
97 snprintf(addr
[0], sizeof(addr
[0]), "peer:%s", satostr(&bpc
->bpc_peer
));
98 if (bpc
->bpc_local
.sa_sin
.sin_family
)
99 snprintf(addr
[1], sizeof(addr
[1]), " local:%s",
100 satostr(&bpc
->bpc_local
));
102 if (bpc
->bpc_has_localif
)
103 snprintf(addr
[2], sizeof(addr
[2]), " ifname:%s",
106 if (bpc
->bpc_has_vrfname
)
107 snprintf(addr
[2], sizeof(addr
[2]), " vrf:%s", bpc
->bpc_vrfname
);
109 if (bpc
->bpc_has_recvinterval
)
110 snprintf(timers
[0], sizeof(timers
[0]), " rx:%lu",
111 bpc
->bpc_recvinterval
);
113 if (bpc
->bpc_has_txinterval
)
114 snprintf(timers
[1], sizeof(timers
[1]), " tx:%lu",
115 bpc
->bpc_recvinterval
);
117 if (bpc
->bpc_has_detectmultiplier
)
118 snprintf(timers
[2], sizeof(timers
[2]), " detect-multiplier:%d",
119 bpc
->bpc_detectmultiplier
);
121 sprintf(cbit_str
, "CB %x", bpc
->bpc_cbit
);
123 log_debug("%s:%d: %s %s%s%s%s%s%s %s", func
, line
,
124 bpc
->bpc_mhop
? "multi-hop" : "single-hop", addr
[0], addr
[1],
125 addr
[2], timers
[0], timers
[1], timers
[2], cbit_str
);
128 #define DEBUG_PRINTBPC(bpc) debug_printbpc(__FILE__, __LINE__, (bpc))
130 #define DEBUG_PRINTBPC(bpc)
131 #endif /* BFD_DEBUG */
133 static int _ptm_msg_address(struct stream
*msg
, int family
, const void *addr
)
135 stream_putc(msg
, family
);
139 stream_put(msg
, addr
, sizeof(struct in_addr
));
140 stream_putc(msg
, 32);
144 stream_put(msg
, addr
, sizeof(struct in6_addr
));
145 stream_putc(msg
, 128);
156 int ptm_bfd_notify(struct bfd_session
*bs
)
160 bs
->stats
.znotification
++;
164 * - header: command, vrf
165 * - l: interface index
181 * Commands: ZEBRA_BFD_DEST_REPLAY
183 * q(64), l(32), w(16), c(8)
188 /* TODO: VRF handling */
190 zclient_create_header(msg
, ZEBRA_BFD_DEST_REPLAY
, bs
->vrf
->vrf_id
);
192 zclient_create_header(msg
, ZEBRA_BFD_DEST_REPLAY
, VRF_DEFAULT
);
194 /* This header will be handled by `zebra_ptm.c`. */
195 stream_putl(msg
, ZEBRA_INTERFACE_BFD_DEST_UPDATE
);
197 /* NOTE: Interface is a shortcut to avoid comparing source address. */
199 stream_putl(msg
, bs
->ifp
->ifindex
);
201 stream_putl(msg
, IFINDEX_INTERNAL
);
203 /* BFD destination prefix information. */
204 _ptm_msg_address(msg
, bs
->key
.family
, &bs
->key
.peer
);
207 switch (bs
->ses_state
) {
209 stream_putl(msg
, BFD_STATUS_UP
);
212 case PTM_BFD_ADM_DOWN
:
215 stream_putl(msg
, BFD_STATUS_DOWN
);
219 stream_putl(msg
, BFD_STATUS_UNKNOWN
);
223 /* BFD source prefix information. */
224 _ptm_msg_address(msg
, bs
->key
.family
, &bs
->key
.local
);
226 stream_putc(msg
, bs
->remote_cbit
);
228 /* Write packet size. */
229 stream_putw_at(msg
, 0, stream_get_endp(msg
));
231 return zclient_send_message(zclient
);
234 static void _ptm_msg_read_address(struct stream
*msg
, struct sockaddr_any
*sa
)
238 STREAM_GETW(msg
, family
);
242 sa
->sa_sin
.sin_family
= family
;
243 STREAM_GET(&sa
->sa_sin
.sin_addr
, msg
,
244 sizeof(sa
->sa_sin
.sin_addr
));
245 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN
246 sa
->sa_sin
.sin_len
= sizeof(sa
->sa_sin
);
247 #endif /* HAVE_STRUCT_SOCKADDR_SA_LEN */
251 sa
->sa_sin6
.sin6_family
= family
;
252 STREAM_GET(&sa
->sa_sin6
.sin6_addr
, msg
,
253 sizeof(sa
->sa_sin6
.sin6_addr
));
254 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN
255 sa
->sa_sin6
.sin6_len
= sizeof(sa
->sa_sin6
);
256 #endif /* HAVE_STRUCT_SOCKADDR_SA_LEN */
260 log_warning("ptm-read-address: invalid family: %d", family
);
265 memset(sa
, 0, sizeof(*sa
));
268 static int _ptm_msg_read(struct stream
*msg
, int command
, vrf_id_t vrf_id
,
269 struct bfd_peer_cfg
*bpc
, struct ptm_client
**pc
)
272 uint8_t ttl
__attribute__((unused
));
276 * Register/Deregister/Update Message format:
277 * - header: Command, VRF
281 * - l: destination ipv4
283 * - 16 bytes: destination IPv6
284 * - command != ZEBRA_BFD_DEST_DEREGISTER
287 * - c: detect multiplier
292 * - l: destination ipv4
294 * - 16 bytes: destination IPv6
299 * - 16 bytes: ipv6 address
301 * - X bytes: interface name
304 * q(64), l(32), w(16), c(8)
307 /* Initialize parameters return values. */
308 memset(bpc
, 0, sizeof(*bpc
));
311 /* Find or allocate process context data. */
312 STREAM_GETL(msg
, pid
);
316 log_debug("ptm-read: failed to allocate memory");
320 /* Register/update peer information. */
321 _ptm_msg_read_address(msg
, &bpc
->bpc_peer
);
323 /* Determine IP type from peer destination. */
324 bpc
->bpc_ipv4
= (bpc
->bpc_peer
.sa_sin
.sin_family
== AF_INET
);
326 /* Get peer configuration. */
327 if (command
!= ZEBRA_BFD_DEST_DEREGISTER
) {
328 STREAM_GETL(msg
, bpc
->bpc_recvinterval
);
329 bpc
->bpc_has_recvinterval
=
330 (bpc
->bpc_recvinterval
!= BPC_DEF_RECEIVEINTERVAL
);
332 STREAM_GETL(msg
, bpc
->bpc_txinterval
);
333 bpc
->bpc_has_txinterval
=
334 (bpc
->bpc_txinterval
!= BPC_DEF_TRANSMITINTERVAL
);
336 STREAM_GETC(msg
, bpc
->bpc_detectmultiplier
);
337 bpc
->bpc_has_detectmultiplier
=
338 (bpc
->bpc_detectmultiplier
!= BPC_DEF_DETECTMULTIPLIER
);
341 /* Read (single|multi)hop and its options. */
342 STREAM_GETC(msg
, bpc
->bpc_mhop
);
344 /* Read multihop source address and TTL. */
345 _ptm_msg_read_address(msg
, &bpc
->bpc_local
);
346 STREAM_GETC(msg
, ttl
);
348 /* If target is IPv6, then we must obtain local address. */
349 if (bpc
->bpc_ipv4
== false)
350 _ptm_msg_read_address(msg
, &bpc
->bpc_local
);
353 * Read interface name and make sure it fits our data
354 * structure, otherwise fail.
356 STREAM_GETC(msg
, ifnamelen
);
357 if (ifnamelen
>= sizeof(bpc
->bpc_localif
)) {
358 log_error("ptm-read: interface name is too big");
362 bpc
->bpc_has_localif
= ifnamelen
> 0;
363 if (bpc
->bpc_has_localif
) {
364 STREAM_GET(bpc
->bpc_localif
, msg
, ifnamelen
);
365 bpc
->bpc_localif
[ifnamelen
] = 0;
368 if (vrf_id
!= VRF_DEFAULT
) {
371 vrf
= vrf_lookup_by_id(vrf_id
);
373 bpc
->bpc_has_vrfname
= true;
374 strlcpy(bpc
->bpc_vrfname
, vrf
->name
, sizeof(bpc
->bpc_vrfname
));
376 log_error("ptm-read: vrf id %u could not be identified", vrf_id
);
380 bpc
->bpc_has_vrfname
= true;
381 strlcpy(bpc
->bpc_vrfname
, VRF_DEFAULT_NAME
, sizeof(bpc
->bpc_vrfname
));
384 STREAM_GETC(msg
, bpc
->bpc_cbit
);
386 /* Sanity check: peer and local address must match IP types. */
387 if (bpc
->bpc_local
.sa_sin
.sin_family
!= 0
388 && (bpc
->bpc_local
.sa_sin
.sin_family
389 != bpc
->bpc_peer
.sa_sin
.sin_family
)) {
390 log_warning("ptm-read: peer family doesn't match local type");
400 static void bfdd_dest_register(struct stream
*msg
, vrf_id_t vrf_id
)
402 struct ptm_client
*pc
;
403 struct ptm_client_notification
*pcn
;
404 struct bfd_session
*bs
;
405 struct bfd_peer_cfg bpc
;
407 /* Read the client context and peer data. */
408 if (_ptm_msg_read(msg
, ZEBRA_BFD_DEST_REGISTER
, vrf_id
, &bpc
, &pc
) == -1)
411 DEBUG_PRINTBPC(&bpc
);
413 /* Find or start new BFD session. */
414 bs
= bs_peer_find(&bpc
);
416 bs
= ptm_bfd_sess_new(&bpc
);
418 log_debug("ptm-add-dest: failed to create BFD session");
422 /* Don't try to change echo/shutdown state. */
423 bpc
.bpc_echo
= BFD_CHECK_FLAG(bs
->flags
, BFD_SESS_FLAG_ECHO
);
425 BFD_CHECK_FLAG(bs
->flags
, BFD_SESS_FLAG_SHUTDOWN
);
428 /* Create client peer notification register. */
429 pcn
= pcn_new(pc
, bs
);
431 log_error("ptm-add-dest: failed to registrate notifications");
438 static void bfdd_dest_deregister(struct stream
*msg
, vrf_id_t vrf_id
)
440 struct ptm_client
*pc
;
441 struct ptm_client_notification
*pcn
;
442 struct bfd_session
*bs
;
443 struct bfd_peer_cfg bpc
;
445 /* Read the client context and peer data. */
446 if (_ptm_msg_read(msg
, ZEBRA_BFD_DEST_DEREGISTER
, vrf_id
, &bpc
, &pc
) == -1)
449 DEBUG_PRINTBPC(&bpc
);
451 /* Find or start new BFD session. */
452 bs
= bs_peer_find(&bpc
);
454 log_debug("ptm-del-dest: failed to find BFD session");
458 /* Unregister client peer notification. */
459 pcn
= pcn_lookup(pc
, bs
);
462 BFD_CHECK_FLAG(bs
->flags
, BFD_SESS_FLAG_CONFIG
))
464 ptm_bfd_sess_del(&bpc
);
468 * header: command, VRF
471 static void bfdd_client_register(struct stream
*msg
)
473 struct ptm_client
*pc
;
476 /* Find or allocate process context data. */
477 STREAM_GETL(msg
, pid
);
481 log_error("ptm-add-client: failed to register client: %u", pid
);
488 log_error("ptm-add-client: failed to register client");
492 * header: command, VRF
495 static void bfdd_client_deregister(struct stream
*msg
)
497 struct ptm_client
*pc
;
500 /* Find or allocate process context data. */
501 STREAM_GETL(msg
, pid
);
505 log_debug("ptm-del-client: failed to find client: %u", pid
);
514 log_error("ptm-del-client: failed to deregister client");
517 static int bfdd_replay(ZAPI_CALLBACK_ARGS
)
519 struct stream
*msg
= zclient
->ibuf
;
522 STREAM_GETL(msg
, rcmd
);
525 case ZEBRA_BFD_DEST_REGISTER
:
526 case ZEBRA_BFD_DEST_UPDATE
:
527 bfdd_dest_register(msg
, vrf_id
);
529 case ZEBRA_BFD_DEST_DEREGISTER
:
530 bfdd_dest_deregister(msg
, vrf_id
);
532 case ZEBRA_BFD_CLIENT_REGISTER
:
533 bfdd_client_register(msg
);
535 case ZEBRA_BFD_CLIENT_DEREGISTER
:
536 bfdd_client_deregister(msg
);
540 log_debug("ptm-replay: invalid message type %u", rcmd
);
547 log_error("ptm-replay: failed to find command");
551 static void bfdd_zebra_connected(struct zclient
*zc
)
553 struct stream
*msg
= zc
->obuf
;
555 /* Clean-up and free ptm clients data memory. */
559 * The replay is an empty message just to trigger client daemons
560 * configuration replay.
563 zclient_create_header(msg
, ZEBRA_BFD_DEST_REPLAY
, VRF_DEFAULT
);
564 stream_putl(msg
, ZEBRA_BFD_DEST_REPLAY
);
565 stream_putw_at(msg
, 0, stream_get_endp(msg
));
567 /* Ask for interfaces information. */
568 zclient_create_header(msg
, ZEBRA_INTERFACE_ADD
, VRF_DEFAULT
);
571 zclient_send_message(zclient
);
574 static void bfdd_sessions_enable_interface(struct interface
*ifp
)
576 struct bfd_session_observer
*bso
;
577 struct bfd_session
*bs
;
580 TAILQ_FOREACH(bso
, &bglobal
.bg_obslist
, bso_entry
) {
582 /* Interface name mismatch. */
583 if (strcmp(ifp
->name
, bs
->key
.ifname
))
585 vrf
= vrf_lookup_by_id(ifp
->vrf_id
);
588 if (bs
->key
.vrfname
[0] &&
589 strcmp(vrf
->name
, bs
->key
.vrfname
))
591 /* Skip enabled sessions. */
595 /* Try to enable it. */
596 bfd_session_enable(bs
);
600 static void bfdd_sessions_disable_interface(struct interface
*ifp
)
602 struct bfd_session_observer
*bso
;
603 struct bfd_session
*bs
;
605 TAILQ_FOREACH(bso
, &bglobal
.bg_obslist
, bso_entry
) {
607 if (strcmp(ifp
->name
, bs
->key
.ifname
))
609 /* Skip disabled sessions. */
613 bfd_session_disable(bs
);
618 void bfdd_sessions_enable_vrf(struct vrf
*vrf
)
620 struct bfd_session_observer
*bso
;
621 struct bfd_session
*bs
;
623 /* it may affect configs without interfaces */
624 TAILQ_FOREACH(bso
, &bglobal
.bg_obslist
, bso_entry
) {
627 if (bs
->vrf
&& bs
->vrf
== vrf
) {
628 if (!strmatch(bs
->key
.vrfname
, vrf
->name
))
629 bfd_session_update_vrf_name(bs
, vrf
);
633 if (bs
->key
.vrfname
[0] &&
634 strcmp(vrf
->name
, bs
->key
.vrfname
))
636 /* need to update the vrf information on
637 * bs so that callbacks are handled
640 /* Skip enabled sessions. */
643 /* Try to enable it. */
644 bfd_session_enable(bs
);
648 void bfdd_sessions_disable_vrf(struct vrf
*vrf
)
650 struct bfd_session_observer
*bso
;
651 struct bfd_session
*bs
;
653 TAILQ_FOREACH(bso
, &bglobal
.bg_obslist
, bso_entry
) {
655 if (bs
->key
.vrfname
[0] &&
656 strcmp(vrf
->name
, bs
->key
.vrfname
))
658 /* Skip disabled sessions. */
662 bfd_session_disable(bs
);
666 static int bfd_ifp_destroy(struct interface
*ifp
)
668 bfdd_sessions_disable_interface(ifp
);
673 static int bfdd_interface_vrf_update(ZAPI_CALLBACK_ARGS
)
675 struct interface
*ifp
;
678 ifp
= zebra_interface_vrf_update_read(zclient
->ibuf
, vrf_id
, &nvrfid
);
682 if_update_to_new_vrf(ifp
, nvrfid
);
687 static void bfdd_sessions_enable_address(struct connected
*ifc
)
689 struct bfd_session_observer
*bso
;
690 struct bfd_session
*bs
;
691 struct prefix prefix
;
693 TAILQ_FOREACH(bso
, &bglobal
.bg_obslist
, bso_entry
) {
694 /* Skip enabled sessions. */
700 prefix
= bso
->bso_addr
;
701 prefix
.prefixlen
= ifc
->address
->prefixlen
;
702 if (prefix_cmp(&prefix
, ifc
->address
))
705 /* Try to enable it. */
706 bfd_session_enable(bs
);
710 static int bfdd_interface_address_update(ZAPI_CALLBACK_ARGS
)
712 struct connected
*ifc
;
714 ifc
= zebra_interface_address_read(cmd
, zclient
->ibuf
, vrf_id
);
718 bfdd_sessions_enable_address(ifc
);
723 static int bfd_ifp_create(struct interface
*ifp
)
725 bfdd_sessions_enable_interface(ifp
);
730 void bfdd_zclient_init(struct zebra_privs_t
*bfdd_priv
)
732 if_zapi_callbacks(bfd_ifp_create
, NULL
, NULL
, bfd_ifp_destroy
);
733 zclient
= zclient_new(master
, &zclient_options_default
);
734 assert(zclient
!= NULL
);
735 zclient_init(zclient
, ZEBRA_ROUTE_BFD
, 0, bfdd_priv
);
738 * We'll receive all messages through replay, however it will
739 * contain a special field with the real command inside so we
740 * avoid having to create too many handlers.
742 zclient
->bfd_dest_replay
= bfdd_replay
;
744 /* Send replay request on zebra connect. */
745 zclient
->zebra_connected
= bfdd_zebra_connected
;
747 /* Learn about interface VRF. */
748 zclient
->interface_vrf_update
= bfdd_interface_vrf_update
;
750 /* Learn about new addresses being registered. */
751 zclient
->interface_address_add
= bfdd_interface_address_update
;
752 zclient
->interface_address_delete
= bfdd_interface_address_update
;
755 void bfdd_zclient_register(vrf_id_t vrf_id
)
757 if (!zclient
|| zclient
->sock
< 0)
759 zclient_send_reg_requests(zclient
, vrf_id
);
762 void bfdd_zclient_unregister(vrf_id_t vrf_id
)
764 if (!zclient
|| zclient
->sock
< 0)
766 zclient_send_dereg_requests(zclient
, vrf_id
);
769 void bfdd_zclient_stop(void)
771 zclient_stop(zclient
);
773 /* Clean-up and free ptm clients data memory. */
781 static struct ptm_client
*pc_lookup(uint32_t pid
)
783 struct ptm_client
*pc
;
785 TAILQ_FOREACH (pc
, &pcqueue
, pc_entry
) {
786 if (pc
->pc_pid
!= pid
)
795 static struct ptm_client
*pc_new(uint32_t pid
)
797 struct ptm_client
*pc
;
799 /* Look up first, if not found create the client. */
804 /* Allocate the client data and save it. */
805 pc
= XCALLOC(MTYPE_BFDD_CONTROL
, sizeof(*pc
));
808 TAILQ_INSERT_HEAD(&pcqueue
, pc
, pc_entry
);
812 static void pc_free(struct ptm_client
*pc
)
814 struct ptm_client_notification
*pcn
;
819 TAILQ_REMOVE(&pcqueue
, pc
, pc_entry
);
821 while (!TAILQ_EMPTY(&pc
->pc_pcnqueue
)) {
822 pcn
= TAILQ_FIRST(&pc
->pc_pcnqueue
);
826 XFREE(MTYPE_BFDD_CONTROL
, pc
);
829 static void pc_free_all(void)
831 struct ptm_client
*pc
;
833 while (!TAILQ_EMPTY(&pcqueue
)) {
834 pc
= TAILQ_FIRST(&pcqueue
);
839 static struct ptm_client_notification
*pcn_new(struct ptm_client
*pc
,
840 struct bfd_session
*bs
)
842 struct ptm_client_notification
*pcn
;
844 /* Try to find an existing pcn fist. */
845 pcn
= pcn_lookup(pc
, bs
);
849 /* Save the client notification data. */
850 pcn
= XCALLOC(MTYPE_BFDD_NOTIFICATION
, sizeof(*pcn
));
852 TAILQ_INSERT_HEAD(&pc
->pc_pcnqueue
, pcn
, pcn_entry
);
860 static struct ptm_client_notification
*pcn_lookup(struct ptm_client
*pc
,
861 struct bfd_session
*bs
)
863 struct ptm_client_notification
*pcn
;
865 TAILQ_FOREACH (pcn
, &pc
->pc_pcnqueue
, pcn_entry
) {
866 if (pcn
->pcn_bs
!= bs
)
875 static void pcn_free(struct ptm_client_notification
*pcn
)
877 struct ptm_client
*pc
;
878 struct bfd_session
*bs
;
883 /* Handle session de-registration. */
888 /* Handle ptm_client deregistration. */
891 TAILQ_REMOVE(&pc
->pc_pcnqueue
, pcn
, pcn_entry
);
893 XFREE(MTYPE_BFDD_NOTIFICATION
, pcn
);