]> git.proxmox.com Git - mirror_frr.git/blob - bgpd/bgp_route.c
Merge remote-tracking branch 'origin/stable/3.0'
[mirror_frr.git] / bgpd / bgp_route.c
1 /* BGP routing information
2 * Copyright (C) 1996, 97, 98, 99 Kunihiro Ishiguro
3 * Copyright (C) 2016 Job Snijders <job@instituut.net>
4 *
5 * This file is part of GNU Zebra.
6 *
7 * GNU Zebra is free software; you can redistribute it and/or modify it
8 * under the terms of the GNU General Public License as published by the
9 * Free Software Foundation; either version 2, or (at your option) any
10 * later version.
11 *
12 * GNU Zebra is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License along
18 * with this program; see the file COPYING; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
20 */
21
22 #include <zebra.h>
23
24 #include "prefix.h"
25 #include "linklist.h"
26 #include "memory.h"
27 #include "command.h"
28 #include "stream.h"
29 #include "filter.h"
30 #include "log.h"
31 #include "routemap.h"
32 #include "buffer.h"
33 #include "sockunion.h"
34 #include "plist.h"
35 #include "thread.h"
36 #include "workqueue.h"
37 #include "queue.h"
38 #include "mpls.h"
39 #include "memory.h"
40 #include "lib/json.h"
41
42 #include "bgpd/bgpd.h"
43 #include "bgpd/bgp_table.h"
44 #include "bgpd/bgp_route.h"
45 #include "bgpd/bgp_attr.h"
46 #include "bgpd/bgp_debug.h"
47 #include "bgpd/bgp_aspath.h"
48 #include "bgpd/bgp_regex.h"
49 #include "bgpd/bgp_community.h"
50 #include "bgpd/bgp_ecommunity.h"
51 #include "bgpd/bgp_lcommunity.h"
52 #include "bgpd/bgp_clist.h"
53 #include "bgpd/bgp_packet.h"
54 #include "bgpd/bgp_filter.h"
55 #include "bgpd/bgp_fsm.h"
56 #include "bgpd/bgp_mplsvpn.h"
57 #include "bgpd/bgp_encap.h"
58 #include "bgpd/bgp_nexthop.h"
59 #include "bgpd/bgp_damp.h"
60 #include "bgpd/bgp_advertise.h"
61 #include "bgpd/bgp_zebra.h"
62 #include "bgpd/bgp_vty.h"
63 #include "bgpd/bgp_mpath.h"
64 #include "bgpd/bgp_nht.h"
65 #include "bgpd/bgp_updgrp.h"
66 #include "bgpd/bgp_label.h"
67
68 #if ENABLE_BGP_VNC
69 #include "bgpd/rfapi/rfapi_backend.h"
70 #include "bgpd/rfapi/vnc_import_bgp.h"
71 #include "bgpd/rfapi/vnc_export_bgp.h"
72 #endif
73 #include "bgpd/bgp_encap_types.h"
74 #include "bgpd/bgp_encap_tlv.h"
75 #include "bgpd/bgp_evpn.h"
76 #include "bgpd/bgp_evpn_vty.h"
77
78
79 /* Extern from bgp_dump.c */
80 extern const char *bgp_origin_str[];
81 extern const char *bgp_origin_long_str[];
82
83 struct bgp_node *
84 bgp_afi_node_get (struct bgp_table *table, afi_t afi, safi_t safi, struct prefix *p,
85 struct prefix_rd *prd)
86 {
87 struct bgp_node *rn;
88 struct bgp_node *prn = NULL;
89
90 assert (table);
91 if (!table)
92 return NULL;
93
94 if ((safi == SAFI_MPLS_VPN) || (safi == SAFI_ENCAP) ||
95 (safi == SAFI_EVPN))
96 {
97 prn = bgp_node_get (table, (struct prefix *) prd);
98
99 if (prn->info == NULL)
100 prn->info = bgp_table_init (afi, safi);
101 else
102 bgp_unlock_node (prn);
103 table = prn->info;
104 }
105
106 rn = bgp_node_get (table, p);
107
108 if ((safi == SAFI_MPLS_VPN) || (safi == SAFI_ENCAP) ||
109 (safi == SAFI_EVPN))
110 rn->prn = prn;
111
112 return rn;
113 }
114
115 /* Allocate bgp_info_extra */
116 static struct bgp_info_extra *
117 bgp_info_extra_new (void)
118 {
119 struct bgp_info_extra *new;
120 new = XCALLOC (MTYPE_BGP_ROUTE_EXTRA, sizeof (struct bgp_info_extra));
121 return new;
122 }
123
124 static void
125 bgp_info_extra_free (struct bgp_info_extra **extra)
126 {
127 if (extra && *extra)
128 {
129 if ((*extra)->damp_info)
130 bgp_damp_info_free ((*extra)->damp_info, 0);
131
132 (*extra)->damp_info = NULL;
133
134 XFREE (MTYPE_BGP_ROUTE_EXTRA, *extra);
135
136 *extra = NULL;
137 }
138 }
139
140 /* Get bgp_info extra information for the given bgp_info, lazy allocated
141 * if required.
142 */
143 struct bgp_info_extra *
144 bgp_info_extra_get (struct bgp_info *ri)
145 {
146 if (!ri->extra)
147 ri->extra = bgp_info_extra_new();
148 return ri->extra;
149 }
150
151 /* Allocate new bgp info structure. */
152 struct bgp_info *
153 bgp_info_new (void)
154 {
155 return XCALLOC (MTYPE_BGP_ROUTE, sizeof (struct bgp_info));
156 }
157
158 /* Free bgp route information. */
159 static void
160 bgp_info_free (struct bgp_info *binfo)
161 {
162 if (binfo->attr)
163 bgp_attr_unintern (&binfo->attr);
164
165 bgp_unlink_nexthop(binfo);
166 bgp_info_extra_free (&binfo->extra);
167 bgp_info_mpath_free (&binfo->mpath);
168
169 peer_unlock (binfo->peer); /* bgp_info peer reference */
170
171 XFREE (MTYPE_BGP_ROUTE, binfo);
172 }
173
174 struct bgp_info *
175 bgp_info_lock (struct bgp_info *binfo)
176 {
177 binfo->lock++;
178 return binfo;
179 }
180
181 struct bgp_info *
182 bgp_info_unlock (struct bgp_info *binfo)
183 {
184 assert (binfo && binfo->lock > 0);
185 binfo->lock--;
186
187 if (binfo->lock == 0)
188 {
189 #if 0
190 zlog_debug ("%s: unlocked and freeing", __func__);
191 zlog_backtrace (LOG_DEBUG);
192 #endif
193 bgp_info_free (binfo);
194 return NULL;
195 }
196
197 #if 0
198 if (binfo->lock == 1)
199 {
200 zlog_debug ("%s: unlocked to 1", __func__);
201 zlog_backtrace (LOG_DEBUG);
202 }
203 #endif
204
205 return binfo;
206 }
207
208 void
209 bgp_info_add (struct bgp_node *rn, struct bgp_info *ri)
210 {
211 struct bgp_info *top;
212
213 top = rn->info;
214
215 ri->next = rn->info;
216 ri->prev = NULL;
217 if (top)
218 top->prev = ri;
219 rn->info = ri;
220
221 bgp_info_lock (ri);
222 bgp_lock_node (rn);
223 peer_lock (ri->peer); /* bgp_info peer reference */
224 }
225
226 /* Do the actual removal of info from RIB, for use by bgp_process
227 completion callback *only* */
228 static void
229 bgp_info_reap (struct bgp_node *rn, struct bgp_info *ri)
230 {
231 if (ri->next)
232 ri->next->prev = ri->prev;
233 if (ri->prev)
234 ri->prev->next = ri->next;
235 else
236 rn->info = ri->next;
237
238 bgp_info_mpath_dequeue (ri);
239 bgp_info_unlock (ri);
240 bgp_unlock_node (rn);
241 }
242
243 void
244 bgp_info_delete (struct bgp_node *rn, struct bgp_info *ri)
245 {
246 bgp_info_set_flag (rn, ri, BGP_INFO_REMOVED);
247 /* set of previous already took care of pcount */
248 UNSET_FLAG (ri->flags, BGP_INFO_VALID);
249 }
250
251 /* undo the effects of a previous call to bgp_info_delete; typically
252 called when a route is deleted and then quickly re-added before the
253 deletion has been processed */
254 void
255 bgp_info_restore (struct bgp_node *rn, struct bgp_info *ri)
256 {
257 bgp_info_unset_flag (rn, ri, BGP_INFO_REMOVED);
258 /* unset of previous already took care of pcount */
259 SET_FLAG (ri->flags, BGP_INFO_VALID);
260 }
261
262 /* Adjust pcount as required */
263 static void
264 bgp_pcount_adjust (struct bgp_node *rn, struct bgp_info *ri)
265 {
266 struct bgp_table *table;
267
268 assert (rn && bgp_node_table (rn));
269 assert (ri && ri->peer && ri->peer->bgp);
270
271 table = bgp_node_table (rn);
272
273 if (ri->peer == ri->peer->bgp->peer_self)
274 return;
275
276 if (!BGP_INFO_COUNTABLE (ri)
277 && CHECK_FLAG (ri->flags, BGP_INFO_COUNTED))
278 {
279
280 UNSET_FLAG (ri->flags, BGP_INFO_COUNTED);
281
282 /* slight hack, but more robust against errors. */
283 if (ri->peer->pcount[table->afi][table->safi])
284 ri->peer->pcount[table->afi][table->safi]--;
285 else
286 {
287 zlog_warn ("%s: Asked to decrement 0 prefix count for peer %s",
288 __func__, ri->peer->host);
289 zlog_backtrace (LOG_WARNING);
290 zlog_warn ("%s: Please report to Quagga bugzilla", __func__);
291 }
292 }
293 else if (BGP_INFO_COUNTABLE (ri)
294 && !CHECK_FLAG (ri->flags, BGP_INFO_COUNTED))
295 {
296 SET_FLAG (ri->flags, BGP_INFO_COUNTED);
297 ri->peer->pcount[table->afi][table->safi]++;
298 }
299 }
300
301 static int
302 bgp_label_index_differs (struct bgp_info *ri1, struct bgp_info *ri2)
303 {
304 return (!(ri1->attr->extra->label_index == ri2->attr->extra->label_index));
305 }
306
307 /* Set/unset bgp_info flags, adjusting any other state as needed.
308 * This is here primarily to keep prefix-count in check.
309 */
310 void
311 bgp_info_set_flag (struct bgp_node *rn, struct bgp_info *ri, u_int32_t flag)
312 {
313 SET_FLAG (ri->flags, flag);
314
315 /* early bath if we know it's not a flag that changes countability state */
316 if (!CHECK_FLAG (flag, BGP_INFO_VALID|BGP_INFO_HISTORY|BGP_INFO_REMOVED))
317 return;
318
319 bgp_pcount_adjust (rn, ri);
320 }
321
322 void
323 bgp_info_unset_flag (struct bgp_node *rn, struct bgp_info *ri, u_int32_t flag)
324 {
325 UNSET_FLAG (ri->flags, flag);
326
327 /* early bath if we know it's not a flag that changes countability state */
328 if (!CHECK_FLAG (flag, BGP_INFO_VALID|BGP_INFO_HISTORY|BGP_INFO_REMOVED))
329 return;
330
331 bgp_pcount_adjust (rn, ri);
332 }
333
334 /* Get MED value. If MED value is missing and "bgp bestpath
335 missing-as-worst" is specified, treat it as the worst value. */
336 static u_int32_t
337 bgp_med_value (struct attr *attr, struct bgp *bgp)
338 {
339 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC))
340 return attr->med;
341 else
342 {
343 if (bgp_flag_check (bgp, BGP_FLAG_MED_MISSING_AS_WORST))
344 return BGP_MED_MAX;
345 else
346 return 0;
347 }
348 }
349
350 void
351 bgp_info_path_with_addpath_rx_str (struct bgp_info *ri, char *buf)
352 {
353 if (ri->addpath_rx_id)
354 sprintf(buf, "path %s (addpath rxid %d)", ri->peer->host, ri->addpath_rx_id);
355 else
356 sprintf(buf, "path %s", ri->peer->host);
357 }
358
359 /* Compare two bgp route entity. If 'new' is preferable over 'exist' return 1. */
360 static int
361 bgp_info_cmp (struct bgp *bgp, struct bgp_info *new, struct bgp_info *exist,
362 int *paths_eq, struct bgp_maxpaths_cfg *mpath_cfg, int debug,
363 const char *pfx_buf)
364 {
365 struct attr *newattr, *existattr;
366 struct attr_extra *newattre, *existattre;
367 bgp_peer_sort_t new_sort;
368 bgp_peer_sort_t exist_sort;
369 u_int32_t new_pref;
370 u_int32_t exist_pref;
371 u_int32_t new_med;
372 u_int32_t exist_med;
373 u_int32_t new_weight;
374 u_int32_t exist_weight;
375 uint32_t newm, existm;
376 struct in_addr new_id;
377 struct in_addr exist_id;
378 int new_cluster;
379 int exist_cluster;
380 int internal_as_route;
381 int confed_as_route;
382 int ret;
383 char new_buf[PATH_ADDPATH_STR_BUFFER];
384 char exist_buf[PATH_ADDPATH_STR_BUFFER];
385
386 *paths_eq = 0;
387
388 /* 0. Null check. */
389 if (new == NULL)
390 {
391 if (debug)
392 zlog_debug("%s: new is NULL", pfx_buf);
393 return 0;
394 }
395
396 if (debug)
397 bgp_info_path_with_addpath_rx_str (new, new_buf);
398
399 if (exist == NULL)
400 {
401 if (debug)
402 zlog_debug("%s: %s is the initial bestpath", pfx_buf, new_buf);
403 return 1;
404 }
405
406 if (debug)
407 {
408 bgp_info_path_with_addpath_rx_str (exist, exist_buf);
409 zlog_debug("%s: Comparing %s flags 0x%x with %s flags 0x%x",
410 pfx_buf, new_buf, new->flags, exist_buf, exist->flags);
411 }
412
413 newattr = new->attr;
414 existattr = exist->attr;
415 newattre = newattr->extra;
416 existattre = existattr->extra;
417
418 /* 1. Weight check. */
419 new_weight = exist_weight = 0;
420
421 if (newattre)
422 new_weight = newattre->weight;
423 if (existattre)
424 exist_weight = existattre->weight;
425
426 if (new_weight > exist_weight)
427 {
428 if (debug)
429 zlog_debug("%s: %s wins over %s due to weight %d > %d",
430 pfx_buf, new_buf, exist_buf, new_weight, exist_weight);
431 return 1;
432 }
433
434 if (new_weight < exist_weight)
435 {
436 if (debug)
437 zlog_debug("%s: %s loses to %s due to weight %d < %d",
438 pfx_buf, new_buf, exist_buf, new_weight, exist_weight);
439 return 0;
440 }
441
442 /* 2. Local preference check. */
443 new_pref = exist_pref = bgp->default_local_pref;
444
445 if (newattr->flag & ATTR_FLAG_BIT (BGP_ATTR_LOCAL_PREF))
446 new_pref = newattr->local_pref;
447 if (existattr->flag & ATTR_FLAG_BIT (BGP_ATTR_LOCAL_PREF))
448 exist_pref = existattr->local_pref;
449
450 if (new_pref > exist_pref)
451 {
452 if (debug)
453 zlog_debug("%s: %s wins over %s due to localpref %d > %d",
454 pfx_buf, new_buf, exist_buf, new_pref, exist_pref);
455 return 1;
456 }
457
458 if (new_pref < exist_pref)
459 {
460 if (debug)
461 zlog_debug("%s: %s loses to %s due to localpref %d < %d",
462 pfx_buf, new_buf, exist_buf, new_pref, exist_pref);
463 return 0;
464 }
465
466 /* 3. Local route check. We prefer:
467 * - BGP_ROUTE_STATIC
468 * - BGP_ROUTE_AGGREGATE
469 * - BGP_ROUTE_REDISTRIBUTE
470 */
471 if (! (new->sub_type == BGP_ROUTE_NORMAL))
472 {
473 if (debug)
474 zlog_debug("%s: %s wins over %s due to preferred BGP_ROUTE type",
475 pfx_buf, new_buf, exist_buf);
476 return 1;
477 }
478
479 if (! (exist->sub_type == BGP_ROUTE_NORMAL))
480 {
481 if (debug)
482 zlog_debug("%s: %s loses to %s due to preferred BGP_ROUTE type",
483 pfx_buf, new_buf, exist_buf);
484 return 0;
485 }
486
487 /* 4. AS path length check. */
488 if (! bgp_flag_check (bgp, BGP_FLAG_ASPATH_IGNORE))
489 {
490 int exist_hops = aspath_count_hops (existattr->aspath);
491 int exist_confeds = aspath_count_confeds (existattr->aspath);
492
493 if (bgp_flag_check (bgp, BGP_FLAG_ASPATH_CONFED))
494 {
495 int aspath_hops;
496
497 aspath_hops = aspath_count_hops (newattr->aspath);
498 aspath_hops += aspath_count_confeds (newattr->aspath);
499
500 if ( aspath_hops < (exist_hops + exist_confeds))
501 {
502 if (debug)
503 zlog_debug("%s: %s wins over %s due to aspath (with confeds) hopcount %d < %d",
504 pfx_buf, new_buf, exist_buf,
505 aspath_hops, (exist_hops + exist_confeds));
506 return 1;
507 }
508
509 if ( aspath_hops > (exist_hops + exist_confeds))
510 {
511 if (debug)
512 zlog_debug("%s: %s loses to %s due to aspath (with confeds) hopcount %d > %d",
513 pfx_buf, new_buf, exist_buf,
514 aspath_hops, (exist_hops + exist_confeds));
515 return 0;
516 }
517 }
518 else
519 {
520 int newhops = aspath_count_hops (newattr->aspath);
521
522 if (newhops < exist_hops)
523 {
524 if (debug)
525 zlog_debug("%s: %s wins over %s due to aspath hopcount %d < %d",
526 pfx_buf, new_buf, exist_buf, newhops, exist_hops);
527 return 1;
528 }
529
530 if (newhops > exist_hops)
531 {
532 if (debug)
533 zlog_debug("%s: %s loses to %s due to aspath hopcount %d > %d",
534 pfx_buf, new_buf, exist_buf, newhops, exist_hops);
535 return 0;
536 }
537 }
538 }
539
540 /* 5. Origin check. */
541 if (newattr->origin < existattr->origin)
542 {
543 if (debug)
544 zlog_debug("%s: %s wins over %s due to ORIGIN %s < %s",
545 pfx_buf, new_buf, exist_buf,
546 bgp_origin_long_str[newattr->origin],
547 bgp_origin_long_str[existattr->origin]);
548 return 1;
549 }
550
551 if (newattr->origin > existattr->origin)
552 {
553 if (debug)
554 zlog_debug("%s: %s loses to %s due to ORIGIN %s > %s",
555 pfx_buf, new_buf, exist_buf,
556 bgp_origin_long_str[newattr->origin],
557 bgp_origin_long_str[existattr->origin]);
558 return 0;
559 }
560
561 /* 6. MED check. */
562 internal_as_route = (aspath_count_hops (newattr->aspath) == 0
563 && aspath_count_hops (existattr->aspath) == 0);
564 confed_as_route = (aspath_count_confeds (newattr->aspath) > 0
565 && aspath_count_confeds (existattr->aspath) > 0
566 && aspath_count_hops (newattr->aspath) == 0
567 && aspath_count_hops (existattr->aspath) == 0);
568
569 if (bgp_flag_check (bgp, BGP_FLAG_ALWAYS_COMPARE_MED)
570 || (bgp_flag_check (bgp, BGP_FLAG_MED_CONFED)
571 && confed_as_route)
572 || aspath_cmp_left (newattr->aspath, existattr->aspath)
573 || aspath_cmp_left_confed (newattr->aspath, existattr->aspath)
574 || internal_as_route)
575 {
576 new_med = bgp_med_value (new->attr, bgp);
577 exist_med = bgp_med_value (exist->attr, bgp);
578
579 if (new_med < exist_med)
580 {
581 if (debug)
582 zlog_debug("%s: %s wins over %s due to MED %d < %d",
583 pfx_buf, new_buf, exist_buf, new_med, exist_med);
584 return 1;
585 }
586
587 if (new_med > exist_med)
588 {
589 if (debug)
590 zlog_debug("%s: %s loses to %s due to MED %d > %d",
591 pfx_buf, new_buf, exist_buf, new_med, exist_med);
592 return 0;
593 }
594 }
595
596 /* 7. Peer type check. */
597 new_sort = new->peer->sort;
598 exist_sort = exist->peer->sort;
599
600 if (new_sort == BGP_PEER_EBGP
601 && (exist_sort == BGP_PEER_IBGP || exist_sort == BGP_PEER_CONFED))
602 {
603 if (debug)
604 zlog_debug("%s: %s wins over %s due to eBGP peer > iBGP peer",
605 pfx_buf, new_buf, exist_buf);
606 return 1;
607 }
608
609 if (exist_sort == BGP_PEER_EBGP
610 && (new_sort == BGP_PEER_IBGP || new_sort == BGP_PEER_CONFED))
611 {
612 if (debug)
613 zlog_debug("%s: %s loses to %s due to iBGP peer < eBGP peer",
614 pfx_buf, new_buf, exist_buf);
615 return 0;
616 }
617
618 /* 8. IGP metric check. */
619 newm = existm = 0;
620
621 if (new->extra)
622 newm = new->extra->igpmetric;
623 if (exist->extra)
624 existm = exist->extra->igpmetric;
625
626 if (newm < existm)
627 {
628 if (debug)
629 zlog_debug("%s: %s wins over %s due to IGP metric %d < %d",
630 pfx_buf, new_buf, exist_buf, newm, existm);
631 ret = 1;
632 }
633
634 if (newm > existm)
635 {
636 if (debug)
637 zlog_debug("%s: %s loses to %s due to IGP metric %d > %d",
638 pfx_buf, new_buf, exist_buf, newm, existm);
639 ret = 0;
640 }
641
642 /* 9. Same IGP metric. Compare the cluster list length as
643 representative of IGP hops metric. Rewrite the metric value
644 pair (newm, existm) with the cluster list length. Prefer the
645 path with smaller cluster list length. */
646 if (newm == existm)
647 {
648 if (peer_sort (new->peer) == BGP_PEER_IBGP
649 && peer_sort (exist->peer) == BGP_PEER_IBGP
650 && (mpath_cfg == NULL ||
651 CHECK_FLAG (mpath_cfg->ibgp_flags,
652 BGP_FLAG_IBGP_MULTIPATH_SAME_CLUSTERLEN)))
653 {
654 newm = BGP_CLUSTER_LIST_LENGTH(new->attr);
655 existm = BGP_CLUSTER_LIST_LENGTH(exist->attr);
656
657 if (newm < existm)
658 {
659 if (debug)
660 zlog_debug("%s: %s wins over %s due to CLUSTER_LIST length %d < %d",
661 pfx_buf, new_buf, exist_buf, newm, existm);
662 ret = 1;
663 }
664
665 if (newm > existm)
666 {
667 if (debug)
668 zlog_debug("%s: %s loses to %s due to CLUSTER_LIST length %d > %d",
669 pfx_buf, new_buf, exist_buf, newm, existm);
670 ret = 0;
671 }
672 }
673 }
674
675 /* 10. confed-external vs. confed-internal */
676 if (CHECK_FLAG(bgp->config, BGP_CONFIG_CONFEDERATION))
677 {
678 if (new_sort == BGP_PEER_CONFED && exist_sort == BGP_PEER_IBGP)
679 {
680 if (debug)
681 zlog_debug("%s: %s wins over %s due to confed-external peer > confed-internal peer",
682 pfx_buf, new_buf, exist_buf);
683 return 1;
684 }
685
686 if (exist_sort == BGP_PEER_CONFED && new_sort == BGP_PEER_IBGP)
687 {
688 if (debug)
689 zlog_debug("%s: %s loses to %s due to confed-internal peer < confed-external peer",
690 pfx_buf, new_buf, exist_buf);
691 return 0;
692 }
693 }
694
695 /* 11. Maximum path check. */
696 if (newm == existm)
697 {
698 if (bgp_flag_check(bgp, BGP_FLAG_ASPATH_MULTIPATH_RELAX))
699 {
700
701 /*
702 * For the two paths, all comparison steps till IGP metric
703 * have succeeded - including AS_PATH hop count. Since 'bgp
704 * bestpath as-path multipath-relax' knob is on, we don't need
705 * an exact match of AS_PATH. Thus, mark the paths are equal.
706 * That will trigger both these paths to get into the multipath
707 * array.
708 */
709 *paths_eq = 1;
710
711 if (debug)
712 zlog_debug("%s: %s and %s are equal via multipath-relax",
713 pfx_buf, new_buf, exist_buf);
714 }
715 else if (new->peer->sort == BGP_PEER_IBGP)
716 {
717 if (aspath_cmp (new->attr->aspath, exist->attr->aspath))
718 {
719 *paths_eq = 1;
720
721 if (debug)
722 zlog_debug("%s: %s and %s are equal via matching aspaths",
723 pfx_buf, new_buf, exist_buf);
724 }
725 }
726 else if (new->peer->as == exist->peer->as)
727 {
728 *paths_eq = 1;
729
730 if (debug)
731 zlog_debug("%s: %s and %s are equal via same remote-as",
732 pfx_buf, new_buf, exist_buf);
733 }
734 }
735 else
736 {
737 /*
738 * TODO: If unequal cost ibgp multipath is enabled we can
739 * mark the paths as equal here instead of returning
740 */
741 if (debug)
742 {
743 if (ret == 1)
744 zlog_debug("%s: %s wins over %s after IGP metric comparison",
745 pfx_buf, new_buf, exist_buf);
746 else
747 zlog_debug("%s: %s loses to %s after IGP metric comparison",
748 pfx_buf, new_buf, exist_buf);
749 }
750 return ret;
751 }
752
753 /* 12. If both paths are external, prefer the path that was received
754 first (the oldest one). This step minimizes route-flap, since a
755 newer path won't displace an older one, even if it was the
756 preferred route based on the additional decision criteria below. */
757 if (! bgp_flag_check (bgp, BGP_FLAG_COMPARE_ROUTER_ID)
758 && new_sort == BGP_PEER_EBGP
759 && exist_sort == BGP_PEER_EBGP)
760 {
761 if (CHECK_FLAG (new->flags, BGP_INFO_SELECTED))
762 {
763 if (debug)
764 zlog_debug("%s: %s wins over %s due to oldest external",
765 pfx_buf, new_buf, exist_buf);
766 return 1;
767 }
768
769 if (CHECK_FLAG (exist->flags, BGP_INFO_SELECTED))
770 {
771 if (debug)
772 zlog_debug("%s: %s loses to %s due to oldest external",
773 pfx_buf, new_buf, exist_buf);
774 return 0;
775 }
776 }
777
778 /* 13. Router-ID comparision. */
779 /* If one of the paths is "stale", the corresponding peer router-id will
780 * be 0 and would always win over the other path. If originator id is
781 * used for the comparision, it will decide which path is better.
782 */
783 if (newattr->flag & ATTR_FLAG_BIT(BGP_ATTR_ORIGINATOR_ID))
784 new_id.s_addr = newattre->originator_id.s_addr;
785 else
786 new_id.s_addr = new->peer->remote_id.s_addr;
787 if (existattr->flag & ATTR_FLAG_BIT(BGP_ATTR_ORIGINATOR_ID))
788 exist_id.s_addr = existattre->originator_id.s_addr;
789 else
790 exist_id.s_addr = exist->peer->remote_id.s_addr;
791
792 if (ntohl (new_id.s_addr) < ntohl (exist_id.s_addr))
793 {
794 if (debug)
795 zlog_debug("%s: %s wins over %s due to Router-ID comparison",
796 pfx_buf, new_buf, exist_buf);
797 return 1;
798 }
799
800 if (ntohl (new_id.s_addr) > ntohl (exist_id.s_addr))
801 {
802 if (debug)
803 zlog_debug("%s: %s loses to %s due to Router-ID comparison",
804 pfx_buf, new_buf, exist_buf);
805 return 0;
806 }
807
808 /* 14. Cluster length comparision. */
809 new_cluster = BGP_CLUSTER_LIST_LENGTH(new->attr);
810 exist_cluster = BGP_CLUSTER_LIST_LENGTH(exist->attr);
811
812 if (new_cluster < exist_cluster)
813 {
814 if (debug)
815 zlog_debug("%s: %s wins over %s due to CLUSTER_LIST length %d < %d",
816 pfx_buf, new_buf, exist_buf, new_cluster, exist_cluster);
817 return 1;
818 }
819
820 if (new_cluster > exist_cluster)
821 {
822 if (debug)
823 zlog_debug("%s: %s loses to %s due to CLUSTER_LIST length %d > %d",
824 pfx_buf, new_buf, exist_buf, new_cluster, exist_cluster);
825 return 0;
826 }
827
828 /* 15. Neighbor address comparision. */
829 /* Do this only if neither path is "stale" as stale paths do not have
830 * valid peer information (as the connection may or may not be up).
831 */
832 if (CHECK_FLAG (exist->flags, BGP_INFO_STALE))
833 {
834 if (debug)
835 zlog_debug("%s: %s wins over %s due to latter path being STALE",
836 pfx_buf, new_buf, exist_buf);
837 return 1;
838 }
839
840 if (CHECK_FLAG (new->flags, BGP_INFO_STALE))
841 {
842 if (debug)
843 zlog_debug("%s: %s loses to %s due to former path being STALE",
844 pfx_buf, new_buf, exist_buf);
845 return 0;
846 }
847
848 /* locally configured routes to advertise do not have su_remote */
849 if (new->peer->su_remote == NULL)
850 return 0;
851 if (exist->peer->su_remote == NULL)
852 return 1;
853
854 ret = sockunion_cmp (new->peer->su_remote, exist->peer->su_remote);
855
856 if (ret == 1)
857 {
858 if (debug)
859 zlog_debug("%s: %s loses to %s due to Neighor IP comparison",
860 pfx_buf, new_buf, exist_buf);
861 return 0;
862 }
863
864 if (ret == -1)
865 {
866 if (debug)
867 zlog_debug("%s: %s wins over %s due to Neighor IP comparison",
868 pfx_buf, new_buf, exist_buf);
869 return 1;
870 }
871
872 if (debug)
873 zlog_debug("%s: %s wins over %s due to nothing left to compare",
874 pfx_buf, new_buf, exist_buf);
875
876 return 1;
877 }
878
879 /* Compare two bgp route entity. Return -1 if new is preferred, 1 if exist
880 * is preferred, or 0 if they are the same (usually will only occur if
881 * multipath is enabled
882 * This version is compatible with */
883 int
884 bgp_info_cmp_compatible (struct bgp *bgp, struct bgp_info *new, struct bgp_info *exist,
885 afi_t afi, safi_t safi)
886 {
887 int paths_eq;
888 int ret;
889 ret = bgp_info_cmp (bgp, new, exist, &paths_eq, NULL, 0, __func__);
890
891 if (paths_eq)
892 ret = 0;
893 else
894 {
895 if (ret == 1)
896 ret = -1;
897 else
898 ret = 1;
899 }
900 return ret;
901 }
902
903 static enum filter_type
904 bgp_input_filter (struct peer *peer, struct prefix *p, struct attr *attr,
905 afi_t afi, safi_t safi)
906 {
907 struct bgp_filter *filter;
908
909 filter = &peer->filter[afi][safi];
910
911 #define FILTER_EXIST_WARN(F,f,filter) \
912 if (BGP_DEBUG (update, UPDATE_IN) \
913 && !(F ## _IN (filter))) \
914 zlog_warn ("%s: Could not find configured input %s-list %s!", \
915 peer->host, #f, F ## _IN_NAME(filter));
916
917 if (DISTRIBUTE_IN_NAME (filter)) {
918 FILTER_EXIST_WARN(DISTRIBUTE, distribute, filter);
919
920 if (access_list_apply (DISTRIBUTE_IN (filter), p) == FILTER_DENY)
921 return FILTER_DENY;
922 }
923
924 if (PREFIX_LIST_IN_NAME (filter)) {
925 FILTER_EXIST_WARN(PREFIX_LIST, prefix, filter);
926
927 if (prefix_list_apply (PREFIX_LIST_IN (filter), p) == PREFIX_DENY)
928 return FILTER_DENY;
929 }
930
931 if (FILTER_LIST_IN_NAME (filter)) {
932 FILTER_EXIST_WARN(FILTER_LIST, as, filter);
933
934 if (as_list_apply (FILTER_LIST_IN (filter), attr->aspath)== AS_FILTER_DENY)
935 return FILTER_DENY;
936 }
937
938 return FILTER_PERMIT;
939 #undef FILTER_EXIST_WARN
940 }
941
942 static enum filter_type
943 bgp_output_filter (struct peer *peer, struct prefix *p, struct attr *attr,
944 afi_t afi, safi_t safi)
945 {
946 struct bgp_filter *filter;
947
948 filter = &peer->filter[afi][safi];
949
950 #define FILTER_EXIST_WARN(F,f,filter) \
951 if (BGP_DEBUG (update, UPDATE_OUT) \
952 && !(F ## _OUT (filter))) \
953 zlog_warn ("%s: Could not find configured output %s-list %s!", \
954 peer->host, #f, F ## _OUT_NAME(filter));
955
956 if (DISTRIBUTE_OUT_NAME (filter)) {
957 FILTER_EXIST_WARN(DISTRIBUTE, distribute, filter);
958
959 if (access_list_apply (DISTRIBUTE_OUT (filter), p) == FILTER_DENY)
960 return FILTER_DENY;
961 }
962
963 if (PREFIX_LIST_OUT_NAME (filter)) {
964 FILTER_EXIST_WARN(PREFIX_LIST, prefix, filter);
965
966 if (prefix_list_apply (PREFIX_LIST_OUT (filter), p) == PREFIX_DENY)
967 return FILTER_DENY;
968 }
969
970 if (FILTER_LIST_OUT_NAME (filter)) {
971 FILTER_EXIST_WARN(FILTER_LIST, as, filter);
972
973 if (as_list_apply (FILTER_LIST_OUT (filter), attr->aspath) == AS_FILTER_DENY)
974 return FILTER_DENY;
975 }
976
977 return FILTER_PERMIT;
978 #undef FILTER_EXIST_WARN
979 }
980
981 /* If community attribute includes no_export then return 1. */
982 static int
983 bgp_community_filter (struct peer *peer, struct attr *attr)
984 {
985 if (attr->community)
986 {
987 /* NO_ADVERTISE check. */
988 if (community_include (attr->community, COMMUNITY_NO_ADVERTISE))
989 return 1;
990
991 /* NO_EXPORT check. */
992 if (peer->sort == BGP_PEER_EBGP &&
993 community_include (attr->community, COMMUNITY_NO_EXPORT))
994 return 1;
995
996 /* NO_EXPORT_SUBCONFED check. */
997 if (peer->sort == BGP_PEER_EBGP
998 || peer->sort == BGP_PEER_CONFED)
999 if (community_include (attr->community, COMMUNITY_NO_EXPORT_SUBCONFED))
1000 return 1;
1001 }
1002 return 0;
1003 }
1004
1005 /* Route reflection loop check. */
1006 static int
1007 bgp_cluster_filter (struct peer *peer, struct attr *attr)
1008 {
1009 struct in_addr cluster_id;
1010
1011 if (attr->extra && attr->extra->cluster)
1012 {
1013 if (peer->bgp->config & BGP_CONFIG_CLUSTER_ID)
1014 cluster_id = peer->bgp->cluster_id;
1015 else
1016 cluster_id = peer->bgp->router_id;
1017
1018 if (cluster_loop_check (attr->extra->cluster, cluster_id))
1019 return 1;
1020 }
1021 return 0;
1022 }
1023
1024 static int
1025 bgp_input_modifier (struct peer *peer, struct prefix *p, struct attr *attr,
1026 afi_t afi, safi_t safi, const char *rmap_name)
1027 {
1028 struct bgp_filter *filter;
1029 struct bgp_info info;
1030 route_map_result_t ret;
1031 struct route_map *rmap = NULL;
1032
1033 filter = &peer->filter[afi][safi];
1034
1035 /* Apply default weight value. */
1036 if (peer->weight[afi][safi])
1037 (bgp_attr_extra_get (attr))->weight = peer->weight[afi][safi];
1038
1039 if (rmap_name)
1040 {
1041 rmap = route_map_lookup_by_name(rmap_name);
1042
1043 if (rmap == NULL)
1044 return RMAP_DENY;
1045 }
1046 else
1047 {
1048 if (ROUTE_MAP_IN_NAME(filter))
1049 {
1050 rmap = ROUTE_MAP_IN (filter);
1051
1052 if (rmap == NULL)
1053 return RMAP_DENY;
1054 }
1055 }
1056
1057 /* Route map apply. */
1058 if (rmap)
1059 {
1060 /* Duplicate current value to new strucutre for modification. */
1061 info.peer = peer;
1062 info.attr = attr;
1063
1064 SET_FLAG (peer->rmap_type, PEER_RMAP_TYPE_IN);
1065
1066 /* Apply BGP route map to the attribute. */
1067 ret = route_map_apply (rmap, p, RMAP_BGP, &info);
1068
1069 peer->rmap_type = 0;
1070
1071 if (ret == RMAP_DENYMATCH)
1072 {
1073 /* Free newly generated AS path and community by route-map. */
1074 bgp_attr_flush (attr);
1075 return RMAP_DENY;
1076 }
1077 }
1078 return RMAP_PERMIT;
1079 }
1080
1081 static int
1082 bgp_output_modifier (struct peer *peer, struct prefix *p, struct attr *attr,
1083 afi_t afi, safi_t safi, const char *rmap_name)
1084 {
1085 struct bgp_filter *filter;
1086 struct bgp_info info;
1087 route_map_result_t ret;
1088 struct route_map *rmap = NULL;
1089
1090 filter = &peer->filter[afi][safi];
1091
1092 /* Apply default weight value. */
1093 if (peer->weight[afi][safi])
1094 (bgp_attr_extra_get (attr))->weight = peer->weight[afi][safi];
1095
1096 if (rmap_name)
1097 {
1098 rmap = route_map_lookup_by_name(rmap_name);
1099
1100 if (rmap == NULL)
1101 return RMAP_DENY;
1102 }
1103 else
1104 {
1105 if (ROUTE_MAP_OUT_NAME(filter))
1106 {
1107 rmap = ROUTE_MAP_OUT (filter);
1108
1109 if (rmap == NULL)
1110 return RMAP_DENY;
1111 }
1112 }
1113
1114 /* Route map apply. */
1115 if (rmap)
1116 {
1117 /* Duplicate current value to new strucutre for modification. */
1118 info.peer = peer;
1119 info.attr = attr;
1120
1121 SET_FLAG (peer->rmap_type, PEER_RMAP_TYPE_OUT);
1122
1123 /* Apply BGP route map to the attribute. */
1124 ret = route_map_apply (rmap, p, RMAP_BGP, &info);
1125
1126 peer->rmap_type = 0;
1127
1128 if (ret == RMAP_DENYMATCH)
1129 /* caller has multiple error paths with bgp_attr_flush() */
1130 return RMAP_DENY;
1131 }
1132 return RMAP_PERMIT;
1133 }
1134
1135 /* If this is an EBGP peer with remove-private-AS */
1136 static void
1137 bgp_peer_remove_private_as(struct bgp *bgp, afi_t afi, safi_t safi,
1138 struct peer *peer, struct attr *attr)
1139 {
1140 if (peer->sort == BGP_PEER_EBGP &&
1141 (peer_af_flag_check (peer, afi, safi, PEER_FLAG_REMOVE_PRIVATE_AS_ALL_REPLACE) ||
1142 peer_af_flag_check (peer, afi, safi, PEER_FLAG_REMOVE_PRIVATE_AS_REPLACE) ||
1143 peer_af_flag_check (peer, afi, safi, PEER_FLAG_REMOVE_PRIVATE_AS_ALL) ||
1144 peer_af_flag_check (peer, afi, safi, PEER_FLAG_REMOVE_PRIVATE_AS)))
1145 {
1146 // Take action on the entire aspath
1147 if (peer_af_flag_check (peer, afi, safi, PEER_FLAG_REMOVE_PRIVATE_AS_ALL_REPLACE) ||
1148 peer_af_flag_check (peer, afi, safi, PEER_FLAG_REMOVE_PRIVATE_AS_ALL))
1149 {
1150 if (peer_af_flag_check (peer, afi, safi, PEER_FLAG_REMOVE_PRIVATE_AS_ALL_REPLACE))
1151 attr->aspath = aspath_replace_private_asns (attr->aspath, bgp->as);
1152
1153 // The entire aspath consists of private ASNs so create an empty aspath
1154 else if (aspath_private_as_check (attr->aspath))
1155 attr->aspath = aspath_empty_get ();
1156
1157 // There are some public and some private ASNs, remove the private ASNs
1158 else
1159 attr->aspath = aspath_remove_private_asns (attr->aspath);
1160 }
1161
1162 // 'all' was not specified so the entire aspath must be private ASNs
1163 // for us to do anything
1164 else if (aspath_private_as_check (attr->aspath))
1165 {
1166 if (peer_af_flag_check (peer, afi, safi, PEER_FLAG_REMOVE_PRIVATE_AS_REPLACE))
1167 attr->aspath = aspath_replace_private_asns (attr->aspath, bgp->as);
1168 else
1169 attr->aspath = aspath_empty_get ();
1170 }
1171 }
1172 }
1173
1174 /* If this is an EBGP peer with as-override */
1175 static void
1176 bgp_peer_as_override(struct bgp *bgp, afi_t afi, safi_t safi,
1177 struct peer *peer, struct attr *attr)
1178 {
1179 if (peer->sort == BGP_PEER_EBGP &&
1180 peer_af_flag_check (peer, afi, safi, PEER_FLAG_AS_OVERRIDE))
1181 {
1182 if (aspath_single_asn_check (attr->aspath, peer->as))
1183 attr->aspath = aspath_replace_specific_asn (attr->aspath, peer->as, bgp->as);
1184 }
1185 }
1186
1187 static void
1188 subgroup_announce_reset_nhop (u_char family, struct attr *attr)
1189 {
1190 if (family == AF_INET)
1191 attr->nexthop.s_addr = 0;
1192 if (family == AF_INET6)
1193 memset (&attr->extra->mp_nexthop_global, 0, IPV6_MAX_BYTELEN);
1194 }
1195
1196 int
1197 subgroup_announce_check (struct bgp_node *rn, struct bgp_info *ri,
1198 struct update_subgroup *subgrp,
1199 struct prefix *p, struct attr *attr)
1200 {
1201 struct bgp_filter *filter;
1202 struct peer *from;
1203 struct peer *peer;
1204 struct peer *onlypeer;
1205 struct bgp *bgp;
1206 struct attr *riattr;
1207 struct peer_af *paf;
1208 char buf[PREFIX_STRLEN];
1209 int ret;
1210 int transparent;
1211 int reflect;
1212 afi_t afi;
1213 safi_t safi;
1214 int samepeer_safe = 0; /* for synthetic mplsvpns routes */
1215
1216 if (DISABLE_BGP_ANNOUNCE)
1217 return 0;
1218
1219 afi = SUBGRP_AFI(subgrp);
1220 safi = SUBGRP_SAFI(subgrp);
1221 peer = SUBGRP_PEER(subgrp);
1222 onlypeer = NULL;
1223 if (CHECK_FLAG (peer->flags, PEER_FLAG_LONESOUL))
1224 onlypeer = SUBGRP_PFIRST(subgrp)->peer;
1225
1226 from = ri->peer;
1227 filter = &peer->filter[afi][safi];
1228 bgp = SUBGRP_INST(subgrp);
1229 riattr = bgp_info_mpath_count (ri) ? bgp_info_mpath_attr (ri) : ri->attr;
1230
1231 #if ENABLE_BGP_VNC
1232 if (((afi == AFI_IP) || (afi == AFI_IP6)) && (safi == SAFI_MPLS_VPN) &&
1233 ((ri->type == ZEBRA_ROUTE_BGP_DIRECT) ||
1234 (ri->type == ZEBRA_ROUTE_BGP_DIRECT_EXT))) {
1235
1236 /*
1237 * direct and direct_ext type routes originate internally even
1238 * though they can have peer pointers that reference other systems
1239 */
1240 prefix2str(p, buf, PREFIX_STRLEN);
1241 zlog_debug("%s: pfx %s bgp_direct->vpn route peer safe", __func__, buf);
1242 samepeer_safe = 1;
1243 }
1244 #endif
1245
1246 /* With addpath we may be asked to TX all kinds of paths so make sure
1247 * ri is valid */
1248 if (!CHECK_FLAG (ri->flags, BGP_INFO_VALID) ||
1249 CHECK_FLAG (ri->flags, BGP_INFO_HISTORY) ||
1250 CHECK_FLAG (ri->flags, BGP_INFO_REMOVED))
1251 {
1252 return 0;
1253 }
1254
1255 /* If this is not the bestpath then check to see if there is an enabled addpath
1256 * feature that requires us to advertise it */
1257 if (! CHECK_FLAG (ri->flags, BGP_INFO_SELECTED))
1258 {
1259 if (! bgp_addpath_tx_path(peer, afi, safi, ri))
1260 {
1261 return 0;
1262 }
1263 }
1264
1265 /* Aggregate-address suppress check. */
1266 if (ri->extra && ri->extra->suppress)
1267 if (! UNSUPPRESS_MAP_NAME (filter))
1268 {
1269 return 0;
1270 }
1271
1272 /* If it's labeled safi, make sure the route has a valid label. */
1273 if (safi == SAFI_LABELED_UNICAST)
1274 {
1275 u_char *tag = bgp_adv_label(rn, ri, peer, afi, safi);
1276 if (!bgp_is_valid_label(tag))
1277 {
1278 if (bgp_debug_update(NULL, p, subgrp->update_group, 0))
1279 zlog_debug ("u%" PRIu64 ":s%" PRIu64 " %s/%d is filtered - no label (%p)",
1280 subgrp->update_group->id, subgrp->id,
1281 inet_ntop(p->family, &p->u.prefix, buf, SU_ADDRSTRLEN),
1282 p->prefixlen, tag);
1283 return 0;
1284 }
1285 }
1286
1287 /* Do not send back route to sender. */
1288 if (onlypeer && from == onlypeer)
1289 {
1290 return 0;
1291 }
1292
1293 /* Do not send the default route in the BGP table if the neighbor is
1294 * configured for default-originate */
1295 if (CHECK_FLAG (peer->af_flags[afi][safi], PEER_FLAG_DEFAULT_ORIGINATE))
1296 {
1297 if (p->family == AF_INET && p->u.prefix4.s_addr == INADDR_ANY)
1298 return 0;
1299 else if (p->family == AF_INET6 && p->prefixlen == 0)
1300 return 0;
1301 }
1302
1303 /* Transparency check. */
1304 if (CHECK_FLAG (peer->af_flags[afi][safi], PEER_FLAG_RSERVER_CLIENT)
1305 && CHECK_FLAG (from->af_flags[afi][safi], PEER_FLAG_RSERVER_CLIENT))
1306 transparent = 1;
1307 else
1308 transparent = 0;
1309
1310 /* If community is not disabled check the no-export and local. */
1311 if (! transparent && bgp_community_filter (peer, riattr))
1312 {
1313 if (bgp_debug_update(NULL, p, subgrp->update_group, 0))
1314 zlog_debug ("subgrpannouncecheck: community filter check fail");
1315 return 0;
1316 }
1317
1318 /* If the attribute has originator-id and it is same as remote
1319 peer's id. */
1320 if (onlypeer &&
1321 riattr->flag & ATTR_FLAG_BIT (BGP_ATTR_ORIGINATOR_ID) &&
1322 (IPV4_ADDR_SAME (&onlypeer->remote_id, &riattr->extra->originator_id)))
1323 {
1324 if (bgp_debug_update(NULL, p, subgrp->update_group, 0))
1325 zlog_debug ("%s [Update:SEND] %s originator-id is same as "
1326 "remote router-id",
1327 onlypeer->host, prefix2str (p, buf, sizeof (buf)));
1328 return 0;
1329 }
1330
1331 /* ORF prefix-list filter check */
1332 if (CHECK_FLAG (peer->af_cap[afi][safi], PEER_CAP_ORF_PREFIX_RM_ADV)
1333 && (CHECK_FLAG (peer->af_cap[afi][safi], PEER_CAP_ORF_PREFIX_SM_RCV)
1334 || CHECK_FLAG (peer->af_cap[afi][safi],
1335 PEER_CAP_ORF_PREFIX_SM_OLD_RCV)))
1336 if (peer->orf_plist[afi][safi])
1337 {
1338 if (prefix_list_apply (peer->orf_plist[afi][safi], p) == PREFIX_DENY)
1339 {
1340 if (bgp_debug_update(NULL, p, subgrp->update_group, 0))
1341 zlog_debug ("%s [Update:SEND] %s is filtered via ORF",
1342 peer->host, prefix2str (p, buf, sizeof (buf)));
1343 return 0;
1344 }
1345 }
1346
1347 /* Output filter check. */
1348 if (bgp_output_filter (peer, p, riattr, afi, safi) == FILTER_DENY)
1349 {
1350 if (bgp_debug_update(NULL, p, subgrp->update_group, 0))
1351 zlog_debug ("%s [Update:SEND] %s is filtered",
1352 peer->host, prefix2str (p, buf, sizeof (buf)));
1353 return 0;
1354 }
1355
1356 #ifdef BGP_SEND_ASPATH_CHECK
1357 /* AS path loop check. */
1358 if (onlypeer && aspath_loop_check (riattr->aspath, onlypeer->as))
1359 {
1360 if (bgp_debug_update(NULL, p, subgrp->update_group, 0))
1361 zlog_debug ("%s [Update:SEND] suppress announcement to peer AS %u "
1362 "that is part of AS path.",
1363 onlypeer->host, onlypeer->as);
1364 return 0;
1365 }
1366 #endif /* BGP_SEND_ASPATH_CHECK */
1367
1368 /* If we're a CONFED we need to loop check the CONFED ID too */
1369 if (CHECK_FLAG(bgp->config, BGP_CONFIG_CONFEDERATION))
1370 {
1371 if (aspath_loop_check(riattr->aspath, bgp->confed_id))
1372 {
1373 if (bgp_debug_update(NULL, p, subgrp->update_group, 0))
1374 zlog_debug ("%s [Update:SEND] suppress announcement to peer AS %u"
1375 " is AS path.",
1376 peer->host,
1377 bgp->confed_id);
1378 return 0;
1379 }
1380 }
1381
1382 /* Route-Reflect check. */
1383 if (from->sort == BGP_PEER_IBGP && peer->sort == BGP_PEER_IBGP)
1384 reflect = 1;
1385 else
1386 reflect = 0;
1387
1388 /* IBGP reflection check. */
1389 if (reflect && !samepeer_safe)
1390 {
1391 /* A route from a Client peer. */
1392 if (CHECK_FLAG (from->af_flags[afi][safi], PEER_FLAG_REFLECTOR_CLIENT))
1393 {
1394 /* Reflect to all the Non-Client peers and also to the
1395 Client peers other than the originator. Originator check
1396 is already done. So there is noting to do. */
1397 /* no bgp client-to-client reflection check. */
1398 if (bgp_flag_check (bgp, BGP_FLAG_NO_CLIENT_TO_CLIENT))
1399 if (CHECK_FLAG (peer->af_flags[afi][safi],
1400 PEER_FLAG_REFLECTOR_CLIENT))
1401 return 0;
1402 }
1403 else
1404 {
1405 /* A route from a Non-client peer. Reflect to all other
1406 clients. */
1407 if (! CHECK_FLAG (peer->af_flags[afi][safi],
1408 PEER_FLAG_REFLECTOR_CLIENT))
1409 return 0;
1410 }
1411 }
1412
1413 /* For modify attribute, copy it to temporary structure. */
1414 bgp_attr_dup (attr, riattr);
1415
1416 /* If local-preference is not set. */
1417 if ((peer->sort == BGP_PEER_IBGP
1418 || peer->sort == BGP_PEER_CONFED)
1419 && (! (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_LOCAL_PREF))))
1420 {
1421 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_LOCAL_PREF);
1422 attr->local_pref = bgp->default_local_pref;
1423 }
1424
1425 /* If originator-id is not set and the route is to be reflected,
1426 set the originator id */
1427 if (reflect && (!(attr->flag & ATTR_FLAG_BIT(BGP_ATTR_ORIGINATOR_ID))))
1428 {
1429 attr->extra = bgp_attr_extra_get(attr);
1430 IPV4_ADDR_COPY(&(attr->extra->originator_id), &(from->remote_id));
1431 SET_FLAG(attr->flag, BGP_ATTR_ORIGINATOR_ID);
1432 }
1433
1434 /* Remove MED if its an EBGP peer - will get overwritten by route-maps */
1435 if (peer->sort == BGP_PEER_EBGP
1436 && attr->flag & ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC))
1437 {
1438 if (from != bgp->peer_self && ! transparent
1439 && ! CHECK_FLAG (peer->af_flags[afi][safi], PEER_FLAG_MED_UNCHANGED))
1440 attr->flag &= ~(ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC));
1441 }
1442
1443 /* Since the nexthop attribute can vary per peer, it is not explicitly set
1444 * in announce check, only certain flags and length (or number of nexthops
1445 * -- for IPv6/MP_REACH) are set here in order to guide the update formation
1446 * code in setting the nexthop(s) on a per peer basis in reformat_peer().
1447 * Typically, the source nexthop in the attribute is preserved but in the
1448 * scenarios where we know it will always be overwritten, we reset the
1449 * nexthop to "0" in an attempt to achieve better Update packing. An
1450 * example of this is when a prefix from each of 2 IBGP peers needs to be
1451 * announced to an EBGP peer (and they have the same attributes barring
1452 * their nexthop).
1453 */
1454 if (reflect)
1455 SET_FLAG(attr->rmap_change_flags, BATTR_REFLECTED);
1456
1457 #define NEXTHOP_IS_V6 (\
1458 (safi != SAFI_ENCAP && safi != SAFI_MPLS_VPN &&\
1459 (p->family == AF_INET6 || peer_cap_enhe(peer, AFI_IP6, safi))) || \
1460 ((safi == SAFI_ENCAP || safi == SAFI_MPLS_VPN) &&\
1461 attr->extra->mp_nexthop_len >= IPV6_MAX_BYTELEN))
1462
1463 /* IPv6/MP starts with 1 nexthop. The link-local address is passed only if
1464 * the peer (group) is configured to receive link-local nexthop unchanged
1465 * and it is available in the prefix OR we're not reflecting the route and
1466 * the peer (group) to whom we're going to announce is on a shared network
1467 * and this is either a self-originated route or the peer is EBGP.
1468 */
1469 if (NEXTHOP_IS_V6)
1470 {
1471 attr->extra->mp_nexthop_len = BGP_ATTR_NHLEN_IPV6_GLOBAL;
1472 if ((CHECK_FLAG (peer->af_flags[afi][safi],
1473 PEER_FLAG_NEXTHOP_LOCAL_UNCHANGED) &&
1474 IN6_IS_ADDR_LINKLOCAL (&attr->extra->mp_nexthop_local)) ||
1475 (!reflect && peer->shared_network &&
1476 (from == bgp->peer_self || peer->sort == BGP_PEER_EBGP)))
1477 {
1478 attr->extra->mp_nexthop_len = BGP_ATTR_NHLEN_IPV6_GLOBAL_AND_LL;
1479 }
1480
1481 /* Clear off link-local nexthop in source, whenever it is not needed to
1482 * ensure more prefixes share the same attribute for announcement.
1483 */
1484 if (!(CHECK_FLAG (peer->af_flags[afi][safi],
1485 PEER_FLAG_NEXTHOP_LOCAL_UNCHANGED)))
1486 memset (&attr->extra->mp_nexthop_local, 0, IPV6_MAX_BYTELEN);
1487 }
1488
1489 bgp_peer_remove_private_as(bgp, afi, safi, peer, attr);
1490 bgp_peer_as_override(bgp, afi, safi, peer, attr);
1491
1492 /* Route map & unsuppress-map apply. */
1493 if (ROUTE_MAP_OUT_NAME (filter)
1494 || (ri->extra && ri->extra->suppress) )
1495 {
1496 struct bgp_info info;
1497 struct attr dummy_attr;
1498 struct attr_extra dummy_extra;
1499
1500 dummy_attr.extra = &dummy_extra;
1501
1502 info.peer = peer;
1503 info.attr = attr;
1504 /* don't confuse inbound and outbound setting */
1505 RESET_FLAG(attr->rmap_change_flags);
1506
1507 /*
1508 * The route reflector is not allowed to modify the attributes
1509 * of the reflected IBGP routes unless explicitly allowed.
1510 */
1511 if ((from->sort == BGP_PEER_IBGP && peer->sort == BGP_PEER_IBGP)
1512 && !bgp_flag_check(bgp, BGP_FLAG_RR_ALLOW_OUTBOUND_POLICY))
1513 {
1514 bgp_attr_dup (&dummy_attr, attr);
1515 info.attr = &dummy_attr;
1516 }
1517
1518 SET_FLAG (peer->rmap_type, PEER_RMAP_TYPE_OUT);
1519
1520 if (ri->extra && ri->extra->suppress)
1521 ret = route_map_apply (UNSUPPRESS_MAP (filter), p, RMAP_BGP, &info);
1522 else
1523 ret = route_map_apply (ROUTE_MAP_OUT (filter), p, RMAP_BGP, &info);
1524
1525 peer->rmap_type = 0;
1526
1527 if (ret == RMAP_DENYMATCH)
1528 {
1529 bgp_attr_flush (attr);
1530 return 0;
1531 }
1532 }
1533
1534 /* After route-map has been applied, we check to see if the nexthop to
1535 * be carried in the attribute (that is used for the announcement) can
1536 * be cleared off or not. We do this in all cases where we would be
1537 * setting the nexthop to "ourselves". For IPv6, we only need to consider
1538 * the global nexthop here; the link-local nexthop would have been cleared
1539 * already, and if not, it is required by the update formation code.
1540 * Also see earlier comments in this function.
1541 */
1542 /*
1543 * If route-map has performed some operation on the nexthop or the peer
1544 * configuration says to pass it unchanged, we cannot reset the nexthop
1545 * here, so only attempt to do it if these aren't true. Note that the
1546 * route-map handler itself might have cleared the nexthop, if for example,
1547 * it is configured as 'peer-address'.
1548 */
1549 if (!bgp_rmap_nhop_changed(attr->rmap_change_flags,
1550 riattr->rmap_change_flags) &&
1551 !transparent &&
1552 !CHECK_FLAG (peer->af_flags[afi][safi], PEER_FLAG_NEXTHOP_UNCHANGED))
1553 {
1554 /* We can reset the nexthop, if setting (or forcing) it to 'self' */
1555 if (CHECK_FLAG (peer->af_flags[afi][safi], PEER_FLAG_NEXTHOP_SELF) ||
1556 CHECK_FLAG (peer->af_flags[afi][safi], PEER_FLAG_FORCE_NEXTHOP_SELF))
1557 {
1558 if (!reflect ||
1559 CHECK_FLAG (peer->af_flags[afi][safi],
1560 PEER_FLAG_FORCE_NEXTHOP_SELF))
1561 subgroup_announce_reset_nhop ((peer_cap_enhe(peer, afi, safi) ?
1562 AF_INET6 : p->family), attr);
1563 }
1564 else if (peer->sort == BGP_PEER_EBGP)
1565 {
1566 /* Can also reset the nexthop if announcing to EBGP, but only if
1567 * no peer in the subgroup is on a shared subnet.
1568 * Note: 3rd party nexthop currently implemented for IPv4 only.
1569 */
1570 SUBGRP_FOREACH_PEER (subgrp, paf)
1571 {
1572 if (bgp_multiaccess_check_v4 (riattr->nexthop, paf->peer))
1573 break;
1574 }
1575 if (!paf)
1576 subgroup_announce_reset_nhop ((peer_cap_enhe(peer, afi, safi) ? AF_INET6 : p->family), attr);
1577 }
1578 /* If IPv6/MP and nexthop does not have any override and happens to
1579 * be a link-local address, reset it so that we don't pass along the
1580 * source's link-local IPv6 address to recipients who may not be on
1581 * the same interface.
1582 */
1583 if (p->family == AF_INET6 || peer_cap_enhe(peer, afi, safi))
1584 {
1585 if (IN6_IS_ADDR_LINKLOCAL (&attr->extra->mp_nexthop_global))
1586 subgroup_announce_reset_nhop (AF_INET6, attr);
1587 }
1588 }
1589
1590 return 1;
1591 }
1592
1593 struct bgp_info_pair
1594 {
1595 struct bgp_info *old;
1596 struct bgp_info *new;
1597 };
1598
1599 static void
1600 bgp_best_selection (struct bgp *bgp, struct bgp_node *rn,
1601 struct bgp_maxpaths_cfg *mpath_cfg,
1602 struct bgp_info_pair *result)
1603 {
1604 struct bgp_info *new_select;
1605 struct bgp_info *old_select;
1606 struct bgp_info *ri;
1607 struct bgp_info *ri1;
1608 struct bgp_info *ri2;
1609 struct bgp_info *nextri = NULL;
1610 int paths_eq, do_mpath, debug;
1611 struct list mp_list;
1612 char pfx_buf[PREFIX2STR_BUFFER];
1613 char path_buf[PATH_ADDPATH_STR_BUFFER];
1614
1615 bgp_mp_list_init (&mp_list);
1616 do_mpath = (mpath_cfg->maxpaths_ebgp > 1 || mpath_cfg->maxpaths_ibgp > 1);
1617
1618 debug = bgp_debug_bestpath(&rn->p);
1619
1620 if (debug)
1621 prefix2str (&rn->p, pfx_buf, sizeof (pfx_buf));
1622
1623 /* bgp deterministic-med */
1624 new_select = NULL;
1625 if (bgp_flag_check (bgp, BGP_FLAG_DETERMINISTIC_MED))
1626 {
1627
1628 /* Clear BGP_INFO_DMED_SELECTED for all paths */
1629 for (ri1 = rn->info; ri1; ri1 = ri1->next)
1630 bgp_info_unset_flag (rn, ri1, BGP_INFO_DMED_SELECTED);
1631
1632 for (ri1 = rn->info; ri1; ri1 = ri1->next)
1633 {
1634 if (CHECK_FLAG (ri1->flags, BGP_INFO_DMED_CHECK))
1635 continue;
1636 if (BGP_INFO_HOLDDOWN (ri1))
1637 continue;
1638 if (ri1->peer && ri1->peer != bgp->peer_self)
1639 if (ri1->peer->status != Established)
1640 continue;
1641
1642 new_select = ri1;
1643 if (ri1->next)
1644 {
1645 for (ri2 = ri1->next; ri2; ri2 = ri2->next)
1646 {
1647 if (CHECK_FLAG (ri2->flags, BGP_INFO_DMED_CHECK))
1648 continue;
1649 if (BGP_INFO_HOLDDOWN (ri2))
1650 continue;
1651 if (ri2->peer &&
1652 ri2->peer != bgp->peer_self &&
1653 !CHECK_FLAG (ri2->peer->sflags, PEER_STATUS_NSF_WAIT))
1654 if (ri2->peer->status != Established)
1655 continue;
1656
1657 if (aspath_cmp_left (ri1->attr->aspath, ri2->attr->aspath)
1658 || aspath_cmp_left_confed (ri1->attr->aspath,
1659 ri2->attr->aspath))
1660 {
1661 if (bgp_info_cmp (bgp, ri2, new_select, &paths_eq,
1662 mpath_cfg, debug, pfx_buf))
1663 {
1664 bgp_info_unset_flag (rn, new_select, BGP_INFO_DMED_SELECTED);
1665 new_select = ri2;
1666 }
1667
1668 bgp_info_set_flag (rn, ri2, BGP_INFO_DMED_CHECK);
1669 }
1670 }
1671 }
1672 bgp_info_set_flag (rn, new_select, BGP_INFO_DMED_CHECK);
1673 bgp_info_set_flag (rn, new_select, BGP_INFO_DMED_SELECTED);
1674
1675 if (debug)
1676 {
1677 bgp_info_path_with_addpath_rx_str (new_select, path_buf);
1678 zlog_debug("%s: %s is the bestpath from AS %d",
1679 pfx_buf, path_buf, aspath_get_first_as(new_select->attr->aspath));
1680 }
1681 }
1682 }
1683
1684 /* Check old selected route and new selected route. */
1685 old_select = NULL;
1686 new_select = NULL;
1687 for (ri = rn->info; (ri != NULL) && (nextri = ri->next, 1); ri = nextri)
1688 {
1689 if (CHECK_FLAG (ri->flags, BGP_INFO_SELECTED))
1690 old_select = ri;
1691
1692 if (BGP_INFO_HOLDDOWN (ri))
1693 {
1694 /* reap REMOVED routes, if needs be
1695 * selected route must stay for a while longer though
1696 */
1697 if (CHECK_FLAG (ri->flags, BGP_INFO_REMOVED)
1698 && (ri != old_select))
1699 bgp_info_reap (rn, ri);
1700
1701 continue;
1702 }
1703
1704 if (ri->peer &&
1705 ri->peer != bgp->peer_self &&
1706 !CHECK_FLAG (ri->peer->sflags, PEER_STATUS_NSF_WAIT))
1707 if (ri->peer->status != Established)
1708 continue;
1709
1710 if (bgp_flag_check (bgp, BGP_FLAG_DETERMINISTIC_MED)
1711 && (! CHECK_FLAG (ri->flags, BGP_INFO_DMED_SELECTED)))
1712 {
1713 bgp_info_unset_flag (rn, ri, BGP_INFO_DMED_CHECK);
1714 continue;
1715 }
1716
1717 bgp_info_unset_flag (rn, ri, BGP_INFO_DMED_CHECK);
1718
1719 if (bgp_info_cmp (bgp, ri, new_select, &paths_eq, mpath_cfg, debug, pfx_buf))
1720 {
1721 new_select = ri;
1722 }
1723 }
1724
1725 /* Now that we know which path is the bestpath see if any of the other paths
1726 * qualify as multipaths
1727 */
1728 if (debug)
1729 {
1730 if (new_select)
1731 bgp_info_path_with_addpath_rx_str (new_select, path_buf);
1732 else
1733 sprintf (path_buf, "NONE");
1734 zlog_debug("%s: After path selection, newbest is %s oldbest was %s",
1735 pfx_buf, path_buf,
1736 old_select ? old_select->peer->host : "NONE");
1737 }
1738
1739 if (do_mpath && new_select)
1740 {
1741 for (ri = rn->info; (ri != NULL) && (nextri = ri->next, 1); ri = nextri)
1742 {
1743
1744 if (debug)
1745 bgp_info_path_with_addpath_rx_str (ri, path_buf);
1746
1747 if (ri == new_select)
1748 {
1749 if (debug)
1750 zlog_debug("%s: %s is the bestpath, add to the multipath list",
1751 pfx_buf, path_buf);
1752 bgp_mp_list_add (&mp_list, ri);
1753 continue;
1754 }
1755
1756 if (BGP_INFO_HOLDDOWN (ri))
1757 continue;
1758
1759 if (ri->peer &&
1760 ri->peer != bgp->peer_self &&
1761 !CHECK_FLAG (ri->peer->sflags, PEER_STATUS_NSF_WAIT))
1762 if (ri->peer->status != Established)
1763 continue;
1764
1765 if (!bgp_info_nexthop_cmp (ri, new_select))
1766 {
1767 if (debug)
1768 zlog_debug("%s: %s has the same nexthop as the bestpath, skip it",
1769 pfx_buf, path_buf);
1770 continue;
1771 }
1772
1773 bgp_info_cmp (bgp, ri, new_select, &paths_eq, mpath_cfg, debug, pfx_buf);
1774
1775 if (paths_eq)
1776 {
1777 if (debug)
1778 zlog_debug("%s: %s is equivalent to the bestpath, add to the multipath list",
1779 pfx_buf, path_buf);
1780 bgp_mp_list_add (&mp_list, ri);
1781 }
1782 }
1783 }
1784
1785 bgp_info_mpath_update (rn, new_select, old_select, &mp_list, mpath_cfg);
1786 bgp_info_mpath_aggregate_update (new_select, old_select);
1787 bgp_mp_list_clear (&mp_list);
1788
1789 result->old = old_select;
1790 result->new = new_select;
1791
1792 return;
1793 }
1794
1795 /*
1796 * A new route/change in bestpath of an existing route. Evaluate the path
1797 * for advertisement to the subgroup.
1798 */
1799 int
1800 subgroup_process_announce_selected (struct update_subgroup *subgrp,
1801 struct bgp_info *selected,
1802 struct bgp_node *rn,
1803 u_int32_t addpath_tx_id)
1804 {
1805 struct prefix *p;
1806 struct peer *onlypeer;
1807 struct attr attr;
1808 struct attr_extra extra;
1809 afi_t afi;
1810 safi_t safi;
1811
1812 p = &rn->p;
1813 afi = SUBGRP_AFI(subgrp);
1814 safi = SUBGRP_SAFI(subgrp);
1815 onlypeer = ((SUBGRP_PCOUNT(subgrp) == 1) ?
1816 (SUBGRP_PFIRST(subgrp))->peer : NULL);
1817
1818 /* First update is deferred until ORF or ROUTE-REFRESH is received */
1819 if (onlypeer && CHECK_FLAG (onlypeer->af_sflags[afi][safi],
1820 PEER_STATUS_ORF_WAIT_REFRESH))
1821 return 0;
1822
1823 memset(&extra, 0, sizeof(struct attr_extra));
1824 /* It's initialized in bgp_announce_check() */
1825 attr.extra = &extra;
1826
1827 /* Announcement to the subgroup. If the route is filtered withdraw it. */
1828 if (selected)
1829 {
1830 if (subgroup_announce_check(rn, selected, subgrp, p, &attr))
1831 bgp_adj_out_set_subgroup(rn, subgrp, &attr, selected);
1832 else
1833 bgp_adj_out_unset_subgroup(rn, subgrp, 1, selected->addpath_tx_id);
1834 }
1835
1836 /* If selected is NULL we must withdraw the path using addpath_tx_id */
1837 else
1838 {
1839 bgp_adj_out_unset_subgroup(rn, subgrp, 1, addpath_tx_id);
1840 }
1841
1842 return 0;
1843 }
1844
1845 /*
1846 * Clear IGP changed flag and attribute changed flag for a route (all paths).
1847 * This is called at the end of route processing.
1848 */
1849 static void
1850 bgp_zebra_clear_route_change_flags (struct bgp_node *rn)
1851 {
1852 struct bgp_info *ri;
1853
1854 for (ri = rn->info; ri; ri = ri->next)
1855 {
1856 if (BGP_INFO_HOLDDOWN (ri))
1857 continue;
1858 UNSET_FLAG (ri->flags, BGP_INFO_IGP_CHANGED);
1859 UNSET_FLAG (ri->flags, BGP_INFO_ATTR_CHANGED);
1860 }
1861 }
1862
1863 /*
1864 * Has the route changed from the RIB's perspective? This is invoked only
1865 * if the route selection returns the same best route as earlier - to
1866 * determine if we need to update zebra or not.
1867 */
1868 static int
1869 bgp_zebra_has_route_changed (struct bgp_node *rn, struct bgp_info *selected)
1870 {
1871 struct bgp_info *mpinfo;
1872
1873 /* If this is multipath, check all selected paths for any nexthop change or
1874 * attribute change. Some attribute changes (e.g., community) aren't of
1875 * relevance to the RIB, but we'll update zebra to ensure we handle the
1876 * case of BGP nexthop change. This is the behavior when the best path has
1877 * an attribute change anyway.
1878 */
1879 if (CHECK_FLAG (selected->flags, BGP_INFO_IGP_CHANGED) ||
1880 CHECK_FLAG (selected->flags, BGP_INFO_MULTIPATH_CHG))
1881 return 1;
1882
1883 /* If this is multipath, check all selected paths for any nexthop change */
1884 for (mpinfo = bgp_info_mpath_first (selected); mpinfo;
1885 mpinfo = bgp_info_mpath_next (mpinfo))
1886 {
1887 if (CHECK_FLAG (mpinfo->flags, BGP_INFO_IGP_CHANGED)
1888 || CHECK_FLAG (mpinfo->flags, BGP_INFO_ATTR_CHANGED))
1889 return 1;
1890 }
1891
1892 /* Nothing has changed from the RIB's perspective. */
1893 return 0;
1894 }
1895
1896 struct bgp_process_queue
1897 {
1898 struct bgp *bgp;
1899 struct bgp_node *rn;
1900 afi_t afi;
1901 safi_t safi;
1902 };
1903
1904 static wq_item_status
1905 bgp_process_main (struct work_queue *wq, void *data)
1906 {
1907 struct bgp_process_queue *pq = data;
1908 struct bgp *bgp = pq->bgp;
1909 struct bgp_node *rn = pq->rn;
1910 afi_t afi = pq->afi;
1911 safi_t safi = pq->safi;
1912 struct prefix *p = &rn->p;
1913 struct bgp_info *new_select;
1914 struct bgp_info *old_select;
1915 struct bgp_info_pair old_and_new;
1916
1917 /* Is it end of initial update? (after startup) */
1918 if (!rn)
1919 {
1920 quagga_timestamp(3, bgp->update_delay_zebra_resume_time,
1921 sizeof(bgp->update_delay_zebra_resume_time));
1922
1923 bgp->main_zebra_update_hold = 0;
1924 for (afi = AFI_IP; afi < AFI_MAX; afi++)
1925 for (safi = SAFI_UNICAST; safi < SAFI_MAX; safi++)
1926 {
1927 bgp_zebra_announce_table(bgp, afi, safi);
1928 }
1929 bgp->main_peers_update_hold = 0;
1930
1931 bgp_start_routeadv(bgp);
1932 return WQ_SUCCESS;
1933 }
1934
1935 /* Best path selection. */
1936 bgp_best_selection (bgp, rn, &bgp->maxpaths[afi][safi], &old_and_new);
1937 old_select = old_and_new.old;
1938 new_select = old_and_new.new;
1939
1940 /* Do we need to allocate or free labels?
1941 * Right now, since we only deal with per-prefix labels, it is not necessary
1942 * to do this upon changes to best path except of the label index changes.
1943 */
1944 if (safi == SAFI_LABELED_UNICAST)
1945 {
1946 bgp_table_lock (bgp_node_table (rn));
1947 if (new_select)
1948 {
1949 if (!old_select ||
1950 bgp_label_index_differs (new_select, old_select) ||
1951 new_select->sub_type != old_select->sub_type)
1952 {
1953 if (new_select->sub_type == BGP_ROUTE_STATIC &&
1954 new_select->attr->flag & ATTR_FLAG_BIT (BGP_ATTR_PREFIX_SID) &&
1955 new_select->attr->extra->label_index != BGP_INVALID_LABEL_INDEX)
1956 {
1957 if (CHECK_FLAG (rn->flags, BGP_NODE_REGISTERED_FOR_LABEL))
1958 bgp_unregister_for_label (rn);
1959 label_ntop (MPLS_IMP_NULL_LABEL, 1, rn->local_label);
1960 bgp_set_valid_label(rn->local_label);
1961 }
1962 else
1963 bgp_register_for_label (rn, new_select);
1964 }
1965 }
1966 else if (CHECK_FLAG (rn->flags, BGP_NODE_REGISTERED_FOR_LABEL))
1967 bgp_unregister_for_label (rn);
1968 }
1969
1970 /* If best route remains the same and this is not due to user-initiated
1971 * clear, see exactly what needs to be done.
1972 */
1973
1974 if (old_select && old_select == new_select &&
1975 !CHECK_FLAG(rn->flags, BGP_NODE_USER_CLEAR) &&
1976 !CHECK_FLAG(old_select->flags, BGP_INFO_ATTR_CHANGED) &&
1977 !bgp->addpath_tx_used[afi][safi])
1978 {
1979 if (bgp_zebra_has_route_changed (rn, old_select))
1980 {
1981 #if ENABLE_BGP_VNC
1982 vnc_import_bgp_add_route(bgp, p, old_select);
1983 vnc_import_bgp_exterior_add_route(bgp, p, old_select);
1984 #endif
1985 if (bgp_fibupd_safi(safi) &&
1986 !bgp->name &&
1987 !bgp_option_check (BGP_OPT_NO_FIB) &&
1988 new_select->type == ZEBRA_ROUTE_BGP &&
1989 new_select->sub_type == BGP_ROUTE_NORMAL)
1990 bgp_zebra_announce (rn, p, old_select, bgp, afi, safi);
1991 }
1992 UNSET_FLAG (old_select->flags, BGP_INFO_MULTIPATH_CHG);
1993 bgp_zebra_clear_route_change_flags (rn);
1994
1995 /* If there is a change of interest to peers, reannounce the route. */
1996 if (CHECK_FLAG (old_select->flags, BGP_INFO_ATTR_CHANGED) ||
1997 CHECK_FLAG (rn->flags, BGP_NODE_LABEL_CHANGED))
1998 {
1999 group_announce_route(bgp, afi, safi, rn, new_select);
2000
2001 UNSET_FLAG (old_select->flags, BGP_INFO_ATTR_CHANGED);
2002 UNSET_FLAG (rn->flags, BGP_NODE_LABEL_CHANGED);
2003 }
2004
2005 UNSET_FLAG (rn->flags, BGP_NODE_PROCESS_SCHEDULED);
2006 return WQ_SUCCESS;
2007 }
2008
2009 /* If the user did "clear ip bgp prefix x.x.x.x" this flag will be set */
2010 UNSET_FLAG(rn->flags, BGP_NODE_USER_CLEAR);
2011
2012 /* bestpath has changed; bump version */
2013 if (old_select || new_select)
2014 {
2015 bgp_bump_version(rn);
2016
2017 if (!bgp->t_rmap_def_originate_eval)
2018 {
2019 bgp_lock (bgp);
2020 thread_add_timer(bm->master,
2021 update_group_refresh_default_originate_route_map,
2022 bgp, RMAP_DEFAULT_ORIGINATE_EVAL_TIMER,
2023 &bgp->t_rmap_def_originate_eval);
2024 }
2025 }
2026
2027 if (old_select)
2028 bgp_info_unset_flag (rn, old_select, BGP_INFO_SELECTED);
2029 if (new_select)
2030 {
2031 bgp_info_set_flag (rn, new_select, BGP_INFO_SELECTED);
2032 bgp_info_unset_flag (rn, new_select, BGP_INFO_ATTR_CHANGED);
2033 UNSET_FLAG (new_select->flags, BGP_INFO_MULTIPATH_CHG);
2034 }
2035
2036 #if ENABLE_BGP_VNC
2037 if ((afi == AFI_IP || afi == AFI_IP6) && (safi == SAFI_UNICAST)) {
2038 if (old_select != new_select) {
2039 if (old_select) {
2040 vnc_import_bgp_exterior_del_route(bgp, p, old_select);
2041 vnc_import_bgp_del_route(bgp, p, old_select);
2042 }
2043 if (new_select) {
2044 vnc_import_bgp_exterior_add_route(bgp, p, new_select);
2045 vnc_import_bgp_add_route(bgp, p, new_select);
2046 }
2047 }
2048 }
2049 #endif
2050
2051 group_announce_route(bgp, afi, safi, rn, new_select);
2052
2053 /* FIB update. */
2054 if (bgp_fibupd_safi(safi) &&
2055 (bgp->inst_type != BGP_INSTANCE_TYPE_VIEW) &&
2056 !bgp_option_check (BGP_OPT_NO_FIB))
2057 {
2058 if (new_select
2059 && new_select->type == ZEBRA_ROUTE_BGP
2060 && (new_select->sub_type == BGP_ROUTE_NORMAL ||
2061 new_select->sub_type == BGP_ROUTE_AGGREGATE))
2062 bgp_zebra_announce (rn, p, new_select, bgp, afi, safi);
2063 else
2064 {
2065 /* Withdraw the route from the kernel. */
2066 if (old_select
2067 && old_select->type == ZEBRA_ROUTE_BGP
2068 && (old_select->sub_type == BGP_ROUTE_NORMAL ||
2069 old_select->sub_type == BGP_ROUTE_AGGREGATE))
2070 bgp_zebra_withdraw (p, old_select, safi);
2071 }
2072 }
2073
2074 /* Clear any route change flags. */
2075 bgp_zebra_clear_route_change_flags (rn);
2076
2077 /* Reap old select bgp_info, if it has been removed */
2078 if (old_select && CHECK_FLAG (old_select->flags, BGP_INFO_REMOVED))
2079 bgp_info_reap (rn, old_select);
2080
2081 UNSET_FLAG (rn->flags, BGP_NODE_PROCESS_SCHEDULED);
2082 return WQ_SUCCESS;
2083 }
2084
2085 static void
2086 bgp_processq_del (struct work_queue *wq, void *data)
2087 {
2088 struct bgp_process_queue *pq = data;
2089 struct bgp_table *table;
2090
2091 bgp_unlock (pq->bgp);
2092 if (pq->rn)
2093 {
2094 table = bgp_node_table (pq->rn);
2095 bgp_unlock_node (pq->rn);
2096 bgp_table_unlock (table);
2097 }
2098 XFREE (MTYPE_BGP_PROCESS_QUEUE, pq);
2099 }
2100
2101 void
2102 bgp_process_queue_init (void)
2103 {
2104 if (!bm->process_main_queue)
2105 {
2106 bm->process_main_queue
2107 = work_queue_new (bm->master, "process_main_queue");
2108
2109 if ( !bm->process_main_queue)
2110 {
2111 zlog_err ("%s: Failed to allocate work queue", __func__);
2112 exit (1);
2113 }
2114 }
2115
2116 bm->process_main_queue->spec.workfunc = &bgp_process_main;
2117 bm->process_main_queue->spec.del_item_data = &bgp_processq_del;
2118 bm->process_main_queue->spec.max_retries = 0;
2119 bm->process_main_queue->spec.hold = 50;
2120 /* Use a higher yield value of 50ms for main queue processing */
2121 bm->process_main_queue->spec.yield = 50 * 1000L;
2122 }
2123
2124 void
2125 bgp_process (struct bgp *bgp, struct bgp_node *rn, afi_t afi, safi_t safi)
2126 {
2127 struct bgp_process_queue *pqnode;
2128
2129 /* already scheduled for processing? */
2130 if (CHECK_FLAG (rn->flags, BGP_NODE_PROCESS_SCHEDULED))
2131 return;
2132
2133 if (bm->process_main_queue == NULL)
2134 return;
2135
2136 pqnode = XCALLOC (MTYPE_BGP_PROCESS_QUEUE,
2137 sizeof (struct bgp_process_queue));
2138 if (!pqnode)
2139 return;
2140
2141 /* all unlocked in bgp_processq_del */
2142 bgp_table_lock (bgp_node_table (rn));
2143 pqnode->rn = bgp_lock_node (rn);
2144 pqnode->bgp = bgp;
2145 bgp_lock (bgp);
2146 pqnode->afi = afi;
2147 pqnode->safi = safi;
2148 work_queue_add (bm->process_main_queue, pqnode);
2149 SET_FLAG (rn->flags, BGP_NODE_PROCESS_SCHEDULED);
2150 return;
2151 }
2152
2153 void
2154 bgp_add_eoiu_mark (struct bgp *bgp)
2155 {
2156 struct bgp_process_queue *pqnode;
2157
2158 if (bm->process_main_queue == NULL)
2159 return;
2160
2161 pqnode = XCALLOC (MTYPE_BGP_PROCESS_QUEUE,
2162 sizeof (struct bgp_process_queue));
2163 if (!pqnode)
2164 return;
2165
2166 pqnode->rn = NULL;
2167 pqnode->bgp = bgp;
2168 bgp_lock (bgp);
2169 work_queue_add (bm->process_main_queue, pqnode);
2170 }
2171
2172 static int
2173 bgp_maximum_prefix_restart_timer (struct thread *thread)
2174 {
2175 struct peer *peer;
2176
2177 peer = THREAD_ARG (thread);
2178 peer->t_pmax_restart = NULL;
2179
2180 if (bgp_debug_neighbor_events(peer))
2181 zlog_debug ("%s Maximum-prefix restart timer expired, restore peering",
2182 peer->host);
2183
2184 peer_clear (peer, NULL);
2185
2186 return 0;
2187 }
2188
2189 int
2190 bgp_maximum_prefix_overflow (struct peer *peer, afi_t afi,
2191 safi_t safi, int always)
2192 {
2193 iana_afi_t pkt_afi;
2194 safi_t pkt_safi;
2195
2196 if (!CHECK_FLAG (peer->af_flags[afi][safi], PEER_FLAG_MAX_PREFIX))
2197 return 0;
2198
2199 if (peer->pcount[afi][safi] > peer->pmax[afi][safi])
2200 {
2201 if (CHECK_FLAG (peer->af_sflags[afi][safi], PEER_STATUS_PREFIX_LIMIT)
2202 && ! always)
2203 return 0;
2204
2205 zlog_info ("%%MAXPFXEXCEED: No. of %s prefix received from %s %ld exceed, "
2206 "limit %ld", afi_safi_print (afi, safi), peer->host,
2207 peer->pcount[afi][safi], peer->pmax[afi][safi]);
2208 SET_FLAG (peer->af_sflags[afi][safi], PEER_STATUS_PREFIX_LIMIT);
2209
2210 if (CHECK_FLAG (peer->af_flags[afi][safi], PEER_FLAG_MAX_PREFIX_WARNING))
2211 return 0;
2212
2213 /* Convert AFI, SAFI to values for packet. */
2214 pkt_afi = afi_int2iana (afi);
2215 pkt_safi = safi_int2iana (safi);
2216 {
2217 u_int8_t ndata[7];
2218
2219 ndata[0] = (pkt_afi >> 8);
2220 ndata[1] = pkt_afi;
2221 ndata[2] = pkt_safi;
2222 ndata[3] = (peer->pmax[afi][safi] >> 24);
2223 ndata[4] = (peer->pmax[afi][safi] >> 16);
2224 ndata[5] = (peer->pmax[afi][safi] >> 8);
2225 ndata[6] = (peer->pmax[afi][safi]);
2226
2227 SET_FLAG (peer->sflags, PEER_STATUS_PREFIX_OVERFLOW);
2228 bgp_notify_send_with_data (peer, BGP_NOTIFY_CEASE,
2229 BGP_NOTIFY_CEASE_MAX_PREFIX, ndata, 7);
2230 }
2231
2232 /* Dynamic peers will just close their connection. */
2233 if (peer_dynamic_neighbor (peer))
2234 return 1;
2235
2236 /* restart timer start */
2237 if (peer->pmax_restart[afi][safi])
2238 {
2239 peer->v_pmax_restart = peer->pmax_restart[afi][safi] * 60;
2240
2241 if (bgp_debug_neighbor_events(peer))
2242 zlog_debug ("%s Maximum-prefix restart timer started for %d secs",
2243 peer->host, peer->v_pmax_restart);
2244
2245 BGP_TIMER_ON (peer->t_pmax_restart, bgp_maximum_prefix_restart_timer,
2246 peer->v_pmax_restart);
2247 }
2248
2249 return 1;
2250 }
2251 else
2252 UNSET_FLAG (peer->af_sflags[afi][safi], PEER_STATUS_PREFIX_LIMIT);
2253
2254 if (peer->pcount[afi][safi] > (peer->pmax[afi][safi] * peer->pmax_threshold[afi][safi] / 100))
2255 {
2256 if (CHECK_FLAG (peer->af_sflags[afi][safi], PEER_STATUS_PREFIX_THRESHOLD)
2257 && ! always)
2258 return 0;
2259
2260 zlog_info ("%%MAXPFX: No. of %s prefix received from %s reaches %ld, max %ld",
2261 afi_safi_print (afi, safi), peer->host, peer->pcount[afi][safi],
2262 peer->pmax[afi][safi]);
2263 SET_FLAG (peer->af_sflags[afi][safi], PEER_STATUS_PREFIX_THRESHOLD);
2264 }
2265 else
2266 UNSET_FLAG (peer->af_sflags[afi][safi], PEER_STATUS_PREFIX_THRESHOLD);
2267 return 0;
2268 }
2269
2270 /* Unconditionally remove the route from the RIB, without taking
2271 * damping into consideration (eg, because the session went down)
2272 */
2273 static void
2274 bgp_rib_remove (struct bgp_node *rn, struct bgp_info *ri, struct peer *peer,
2275 afi_t afi, safi_t safi)
2276 {
2277 bgp_aggregate_decrement (peer->bgp, &rn->p, ri, afi, safi);
2278
2279 if (!CHECK_FLAG (ri->flags, BGP_INFO_HISTORY))
2280 bgp_info_delete (rn, ri); /* keep historical info */
2281
2282 bgp_process (peer->bgp, rn, afi, safi);
2283 }
2284
2285 static void
2286 bgp_rib_withdraw (struct bgp_node *rn, struct bgp_info *ri, struct peer *peer,
2287 afi_t afi, safi_t safi, struct prefix_rd *prd)
2288 {
2289 int status = BGP_DAMP_NONE;
2290
2291 /* apply dampening, if result is suppressed, we'll be retaining
2292 * the bgp_info in the RIB for historical reference.
2293 */
2294 if (CHECK_FLAG (peer->bgp->af_flags[afi][safi], BGP_CONFIG_DAMPENING)
2295 && peer->sort == BGP_PEER_EBGP)
2296 if ( (status = bgp_damp_withdraw (ri, rn, afi, safi, 0))
2297 == BGP_DAMP_SUPPRESSED)
2298 {
2299 bgp_aggregate_decrement (peer->bgp, &rn->p, ri, afi, safi);
2300 return;
2301 }
2302
2303 #if ENABLE_BGP_VNC
2304 if (safi == SAFI_MPLS_VPN) {
2305 struct bgp_node *prn = NULL;
2306 struct bgp_table *table = NULL;
2307
2308 prn = bgp_node_get(peer->bgp->rib[afi][safi], (struct prefix *) prd);
2309 if (prn->info) {
2310 table = (struct bgp_table *)(prn->info);
2311
2312 vnc_import_bgp_del_vnc_host_route_mode_resolve_nve(
2313 peer->bgp,
2314 prd,
2315 table,
2316 &rn->p,
2317 ri);
2318 }
2319 bgp_unlock_node(prn);
2320 }
2321 if ((afi == AFI_IP || afi == AFI_IP6) && (safi == SAFI_UNICAST)) {
2322 if (CHECK_FLAG (ri->flags, BGP_INFO_SELECTED)) {
2323
2324 vnc_import_bgp_del_route(peer->bgp, &rn->p, ri);
2325 vnc_import_bgp_exterior_del_route(peer->bgp, &rn->p, ri);
2326 }
2327 }
2328 #endif
2329 bgp_rib_remove (rn, ri, peer, afi, safi);
2330 }
2331
2332 static struct bgp_info *
2333 info_make (int type, int sub_type, u_short instance, struct peer *peer, struct attr *attr,
2334 struct bgp_node *rn)
2335 {
2336 struct bgp_info *new;
2337
2338 /* Make new BGP info. */
2339 new = XCALLOC (MTYPE_BGP_ROUTE, sizeof (struct bgp_info));
2340 new->type = type;
2341 new->instance = instance;
2342 new->sub_type = sub_type;
2343 new->peer = peer;
2344 new->attr = attr;
2345 new->uptime = bgp_clock ();
2346 new->net = rn;
2347 new->addpath_tx_id = ++peer->bgp->addpath_tx_id;
2348 return new;
2349 }
2350
2351 static void
2352 overlay_index_update(struct attr *attr, struct eth_segment_id *eth_s_id, union gw_addr *gw_ip)
2353 {
2354 struct attr_extra *extra;
2355
2356 if(!attr)
2357 return;
2358 extra = bgp_attr_extra_get(attr);
2359
2360 if(eth_s_id == NULL)
2361 {
2362 memset(&(extra->evpn_overlay.eth_s_id),0, sizeof(struct eth_segment_id));
2363 }
2364 else
2365 {
2366 memcpy(&(extra->evpn_overlay.eth_s_id), eth_s_id, sizeof(struct eth_segment_id));
2367 }
2368 if(gw_ip == NULL)
2369 {
2370 memset(&(extra->evpn_overlay.gw_ip), 0, sizeof(union gw_addr));
2371 }
2372 else
2373 {
2374 memcpy(&(extra->evpn_overlay.gw_ip),gw_ip, sizeof(union gw_addr));
2375 }
2376 }
2377
2378 static bool
2379 overlay_index_equal(afi_t afi, struct bgp_info *info, struct eth_segment_id *eth_s_id, union gw_addr *gw_ip)
2380 {
2381 struct eth_segment_id *info_eth_s_id, *info_eth_s_id_remote;
2382 union gw_addr *info_gw_ip, *info_gw_ip_remote;
2383 char temp[16];
2384
2385 if(afi != AFI_L2VPN)
2386 return true;
2387 if (!info->attr || !info->attr->extra)
2388 {
2389 memset(&temp, 0, 16);
2390 info_eth_s_id = (struct eth_segment_id *)&temp;
2391 info_gw_ip = (union gw_addr *)&temp;
2392 if(eth_s_id == NULL && gw_ip == NULL)
2393 return true;
2394 }
2395 else
2396 {
2397 info_eth_s_id = &(info->attr->extra->evpn_overlay.eth_s_id);
2398 info_gw_ip = &(info->attr->extra->evpn_overlay.gw_ip);
2399 }
2400 if(gw_ip == NULL)
2401 info_gw_ip_remote = (union gw_addr *)&temp;
2402 else
2403 info_gw_ip_remote = gw_ip;
2404 if(eth_s_id == NULL)
2405 info_eth_s_id_remote = (struct eth_segment_id *)&temp;
2406 else
2407 info_eth_s_id_remote = eth_s_id;
2408 if(!memcmp(info_gw_ip, info_gw_ip_remote, sizeof(union gw_addr)))
2409 return false;
2410 return !memcmp(info_eth_s_id, info_eth_s_id_remote, sizeof(struct eth_segment_id));
2411 }
2412
2413 /* Check if received nexthop is valid or not. */
2414 static int
2415 bgp_update_martian_nexthop (struct bgp *bgp, afi_t afi, safi_t safi, struct attr *attr)
2416 {
2417 struct attr_extra *attre = attr->extra;
2418 int ret = 0;
2419
2420 /* Only validated for unicast and multicast currently. */
2421 if (safi != SAFI_UNICAST && safi != SAFI_MULTICAST)
2422 return 0;
2423
2424 /* If NEXT_HOP is present, validate it. */
2425 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_NEXT_HOP))
2426 {
2427 if (attr->nexthop.s_addr == 0 ||
2428 IPV4_CLASS_DE (ntohl (attr->nexthop.s_addr)) ||
2429 bgp_nexthop_self (bgp, attr))
2430 ret = 1;
2431 }
2432
2433 /* If MP_NEXTHOP is present, validate it. */
2434 /* Note: For IPv6 nexthops, we only validate the global (1st) nexthop;
2435 * there is code in bgp_attr.c to ignore the link-local (2nd) nexthop if
2436 * it is not an IPv6 link-local address.
2437 */
2438 if (attre && attre->mp_nexthop_len)
2439 {
2440 switch (attre->mp_nexthop_len)
2441 {
2442 case BGP_ATTR_NHLEN_IPV4:
2443 case BGP_ATTR_NHLEN_VPNV4:
2444 ret = (attre->mp_nexthop_global_in.s_addr == 0 ||
2445 IPV4_CLASS_DE (ntohl (attre->mp_nexthop_global_in.s_addr)));
2446 break;
2447
2448 case BGP_ATTR_NHLEN_IPV6_GLOBAL:
2449 case BGP_ATTR_NHLEN_IPV6_GLOBAL_AND_LL:
2450 case BGP_ATTR_NHLEN_VPNV6_GLOBAL:
2451 ret = (IN6_IS_ADDR_UNSPECIFIED(&attre->mp_nexthop_global) ||
2452 IN6_IS_ADDR_LOOPBACK(&attre->mp_nexthop_global) ||
2453 IN6_IS_ADDR_MULTICAST(&attre->mp_nexthop_global));
2454 break;
2455
2456 default:
2457 ret = 1;
2458 break;
2459 }
2460 }
2461
2462 return ret;
2463 }
2464
2465 int
2466 bgp_update (struct peer *peer, struct prefix *p, u_int32_t addpath_id,
2467 struct attr *attr, afi_t afi, safi_t safi, int type,
2468 int sub_type, struct prefix_rd *prd, u_char *tag,
2469 int soft_reconfig, struct bgp_route_evpn* evpn)
2470 {
2471 int ret;
2472 int aspath_loop_count = 0;
2473 struct bgp_node *rn;
2474 struct bgp *bgp;
2475 struct attr new_attr;
2476 struct attr_extra new_extra;
2477 struct attr *attr_new;
2478 struct bgp_info *ri;
2479 struct bgp_info *new;
2480 const char *reason;
2481 char pfx_buf[BGP_PRD_PATH_STRLEN];
2482 char label_buf[20];
2483 int connected = 0;
2484 int do_loop_check = 1;
2485 #if ENABLE_BGP_VNC
2486 int vnc_implicit_withdraw = 0;
2487 #endif
2488
2489 memset (&new_attr, 0, sizeof(struct attr));
2490 memset (&new_extra, 0, sizeof(struct attr_extra));
2491
2492 bgp = peer->bgp;
2493 rn = bgp_afi_node_get (bgp->rib[afi][safi], afi, safi, p, prd);
2494 label_buf[0] = '\0';
2495 if (bgp_labeled_safi(safi))
2496 sprintf (label_buf, "label %u", label_pton(tag));
2497
2498 /* When peer's soft reconfiguration enabled. Record input packet in
2499 Adj-RIBs-In. */
2500 if (! soft_reconfig && CHECK_FLAG (peer->af_flags[afi][safi], PEER_FLAG_SOFT_RECONFIG)
2501 && peer != bgp->peer_self)
2502 bgp_adj_in_set (rn, peer, attr, addpath_id);
2503
2504 /* Check previously received route. */
2505 for (ri = rn->info; ri; ri = ri->next)
2506 if (ri->peer == peer && ri->type == type && ri->sub_type == sub_type &&
2507 ri->addpath_rx_id == addpath_id)
2508 break;
2509
2510 /* AS path local-as loop check. */
2511 if (peer->change_local_as)
2512 {
2513 if (! CHECK_FLAG (peer->flags, PEER_FLAG_LOCAL_AS_NO_PREPEND))
2514 aspath_loop_count = 1;
2515
2516 if (aspath_loop_check (attr->aspath, peer->change_local_as) > aspath_loop_count)
2517 {
2518 reason = "as-path contains our own AS;";
2519 goto filtered;
2520 }
2521 }
2522
2523 /* If the peer is configured for "allowas-in origin" and the last ASN in the
2524 * as-path is our ASN then we do not need to call aspath_loop_check
2525 */
2526 if (CHECK_FLAG (peer->af_flags[afi][safi], PEER_FLAG_ALLOWAS_IN_ORIGIN))
2527 if (aspath_get_last_as(attr->aspath) == bgp->as)
2528 do_loop_check = 0;
2529
2530 /* AS path loop check. */
2531 if (do_loop_check)
2532 {
2533 if (aspath_loop_check (attr->aspath, bgp->as) > peer->allowas_in[afi][safi]
2534 || (CHECK_FLAG(bgp->config, BGP_CONFIG_CONFEDERATION)
2535 && aspath_loop_check(attr->aspath, bgp->confed_id) > peer->allowas_in[afi][safi]))
2536 {
2537 reason = "as-path contains our own AS;";
2538 goto filtered;
2539 }
2540 }
2541
2542 /* Route reflector originator ID check. */
2543 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_ORIGINATOR_ID)
2544 && IPV4_ADDR_SAME (&bgp->router_id, &attr->extra->originator_id))
2545 {
2546 reason = "originator is us;";
2547 goto filtered;
2548 }
2549
2550 /* Route reflector cluster ID check. */
2551 if (bgp_cluster_filter (peer, attr))
2552 {
2553 reason = "reflected from the same cluster;";
2554 goto filtered;
2555 }
2556
2557 /* Apply incoming filter. */
2558 if (bgp_input_filter (peer, p, attr, afi, safi) == FILTER_DENY)
2559 {
2560 reason = "filter;";
2561 goto filtered;
2562 }
2563
2564 new_attr.extra = &new_extra;
2565 bgp_attr_dup (&new_attr, attr);
2566
2567 /* Apply incoming route-map.
2568 * NB: new_attr may now contain newly allocated values from route-map "set"
2569 * commands, so we need bgp_attr_flush in the error paths, until we intern
2570 * the attr (which takes over the memory references) */
2571 if (bgp_input_modifier (peer, p, &new_attr, afi, safi, NULL) == RMAP_DENY)
2572 {
2573 reason = "route-map;";
2574 bgp_attr_flush (&new_attr);
2575 goto filtered;
2576 }
2577
2578 /* next hop check. */
2579 if (bgp_update_martian_nexthop (bgp, afi, safi, &new_attr))
2580 {
2581 reason = "martian or self next-hop;";
2582 bgp_attr_flush (&new_attr);
2583 goto filtered;
2584 }
2585
2586 attr_new = bgp_attr_intern (&new_attr);
2587
2588 /* If the update is implicit withdraw. */
2589 if (ri)
2590 {
2591 ri->uptime = bgp_clock ();
2592
2593 /* Same attribute comes in. */
2594 if (!CHECK_FLAG (ri->flags, BGP_INFO_REMOVED)
2595 && attrhash_cmp (ri->attr, attr_new)
2596 && (!bgp_labeled_safi(safi) ||
2597 memcmp ((bgp_info_extra_get (ri))->tag, tag, 3) == 0)
2598 && (overlay_index_equal(afi, ri, evpn==NULL?NULL:&evpn->eth_s_id,
2599 evpn==NULL?NULL:&evpn->gw_ip)))
2600 {
2601 if (CHECK_FLAG (bgp->af_flags[afi][safi], BGP_CONFIG_DAMPENING)
2602 && peer->sort == BGP_PEER_EBGP
2603 && CHECK_FLAG (ri->flags, BGP_INFO_HISTORY))
2604 {
2605 if (bgp_debug_update(peer, p, NULL, 1))
2606 zlog_debug ("%s rcvd %s %s", peer->host,
2607 bgp_debug_rdpfxpath2str (prd, p, addpath_id ? 1 : 0,
2608 addpath_id, pfx_buf, sizeof (pfx_buf)), label_buf);
2609
2610 if (bgp_damp_update (ri, rn, afi, safi) != BGP_DAMP_SUPPRESSED)
2611 {
2612 bgp_aggregate_increment (bgp, p, ri, afi, safi);
2613 bgp_process (bgp, rn, afi, safi);
2614 }
2615 }
2616 else /* Duplicate - odd */
2617 {
2618 if (bgp_debug_update(peer, p, NULL, 1))
2619 {
2620 if (!peer->rcvd_attr_printed)
2621 {
2622 zlog_debug ("%s rcvd UPDATE w/ attr: %s", peer->host, peer->rcvd_attr_str);
2623 peer->rcvd_attr_printed = 1;
2624 }
2625
2626 zlog_debug ("%s rcvd %s %s...duplicate ignored",
2627 peer->host,
2628 bgp_debug_rdpfxpath2str (prd, p, addpath_id ?
2629 1 : 0, addpath_id, pfx_buf, sizeof (pfx_buf)), label_buf);
2630 }
2631
2632 /* graceful restart STALE flag unset. */
2633 if (CHECK_FLAG (ri->flags, BGP_INFO_STALE))
2634 {
2635 bgp_info_unset_flag (rn, ri, BGP_INFO_STALE);
2636 bgp_process (bgp, rn, afi, safi);
2637 }
2638 }
2639
2640 bgp_unlock_node (rn);
2641 bgp_attr_unintern (&attr_new);
2642
2643 return 0;
2644 }
2645
2646 /* Withdraw/Announce before we fully processed the withdraw */
2647 if (CHECK_FLAG(ri->flags, BGP_INFO_REMOVED))
2648 {
2649 if (bgp_debug_update(peer, p, NULL, 1))
2650 zlog_debug ("%s rcvd %s %s, flapped quicker than processing",
2651 peer->host,
2652 bgp_debug_rdpfxpath2str (prd, p, addpath_id ? 1 : 0,
2653 addpath_id, pfx_buf, sizeof (pfx_buf)), label_buf);
2654 bgp_info_restore (rn, ri);
2655 }
2656
2657 /* Received Logging. */
2658 if (bgp_debug_update(peer, p, NULL, 1))
2659 zlog_debug ("%s rcvd %s %s", peer->host,
2660 bgp_debug_rdpfxpath2str (prd, p, addpath_id ? 1 : 0,
2661 addpath_id, pfx_buf, sizeof (pfx_buf)), label_buf);
2662
2663 /* graceful restart STALE flag unset. */
2664 if (CHECK_FLAG (ri->flags, BGP_INFO_STALE))
2665 bgp_info_unset_flag (rn, ri, BGP_INFO_STALE);
2666
2667 /* The attribute is changed. */
2668 bgp_info_set_flag (rn, ri, BGP_INFO_ATTR_CHANGED);
2669
2670 /* implicit withdraw, decrement aggregate and pcount here.
2671 * only if update is accepted, they'll increment below.
2672 */
2673 bgp_aggregate_decrement (bgp, p, ri, afi, safi);
2674
2675 /* Update bgp route dampening information. */
2676 if (CHECK_FLAG (bgp->af_flags[afi][safi], BGP_CONFIG_DAMPENING)
2677 && peer->sort == BGP_PEER_EBGP)
2678 {
2679 /* This is implicit withdraw so we should update dampening
2680 information. */
2681 if (! CHECK_FLAG (ri->flags, BGP_INFO_HISTORY))
2682 bgp_damp_withdraw (ri, rn, afi, safi, 1);
2683 }
2684 #if ENABLE_BGP_VNC
2685 if (safi == SAFI_MPLS_VPN) {
2686 struct bgp_node *prn = NULL;
2687 struct bgp_table *table = NULL;
2688
2689 prn = bgp_node_get(bgp->rib[afi][safi], (struct prefix *) prd);
2690 if (prn->info) {
2691 table = (struct bgp_table *)(prn->info);
2692
2693 vnc_import_bgp_del_vnc_host_route_mode_resolve_nve(
2694 bgp,
2695 prd,
2696 table,
2697 p,
2698 ri);
2699 }
2700 bgp_unlock_node(prn);
2701 }
2702 if ((afi == AFI_IP || afi == AFI_IP6) && (safi == SAFI_UNICAST)) {
2703 if (CHECK_FLAG (ri->flags, BGP_INFO_SELECTED)) {
2704 /*
2705 * Implicit withdraw case.
2706 */
2707 ++vnc_implicit_withdraw;
2708 vnc_import_bgp_del_route(bgp, p, ri);
2709 vnc_import_bgp_exterior_del_route(bgp, p, ri);
2710 }
2711 }
2712 #endif
2713
2714 /* Update to new attribute. */
2715 bgp_attr_unintern (&ri->attr);
2716 ri->attr = attr_new;
2717
2718 /* Update MPLS tag. */
2719 if (bgp_labeled_safi(safi))
2720 memcpy ((bgp_info_extra_get (ri))->tag, tag, 3);
2721
2722 #if ENABLE_BGP_VNC
2723 if ((afi == AFI_IP || afi == AFI_IP6) && (safi == SAFI_UNICAST))
2724 {
2725 if (vnc_implicit_withdraw)
2726 {
2727 /*
2728 * Add back the route with its new attributes (e.g., nexthop).
2729 * The route is still selected, until the route selection
2730 * queued by bgp_process actually runs. We have to make this
2731 * update to the VNC side immediately to avoid racing against
2732 * configuration changes (e.g., route-map changes) which
2733 * trigger re-importation of the entire RIB.
2734 */
2735 vnc_import_bgp_add_route(bgp, p, ri);
2736 vnc_import_bgp_exterior_add_route(bgp, p, ri);
2737 }
2738 }
2739 #endif
2740 /* Update Overlay Index */
2741 if(afi == AFI_L2VPN)
2742 {
2743 overlay_index_update(ri->attr, evpn==NULL?NULL:&evpn->eth_s_id,
2744 evpn==NULL?NULL:&evpn->gw_ip);
2745 }
2746
2747 /* Update bgp route dampening information. */
2748 if (CHECK_FLAG (bgp->af_flags[afi][safi], BGP_CONFIG_DAMPENING)
2749 && peer->sort == BGP_PEER_EBGP)
2750 {
2751 /* Now we do normal update dampening. */
2752 ret = bgp_damp_update (ri, rn, afi, safi);
2753 if (ret == BGP_DAMP_SUPPRESSED)
2754 {
2755 bgp_unlock_node (rn);
2756 return 0;
2757 }
2758 }
2759
2760 /* Nexthop reachability check - for unicast and labeled-unicast.. */
2761 if ((afi == AFI_IP || afi == AFI_IP6) &&
2762 (safi == SAFI_UNICAST || safi == SAFI_LABELED_UNICAST))
2763 {
2764 if (peer->sort == BGP_PEER_EBGP && peer->ttl == 1 &&
2765 ! CHECK_FLAG (peer->flags, PEER_FLAG_DISABLE_CONNECTED_CHECK)
2766 && ! bgp_flag_check(bgp, BGP_FLAG_DISABLE_NH_CONNECTED_CHK))
2767 connected = 1;
2768 else
2769 connected = 0;
2770
2771 if (bgp_find_or_add_nexthop (bgp, afi, ri, NULL, connected))
2772 bgp_info_set_flag (rn, ri, BGP_INFO_VALID);
2773 else
2774 {
2775 if (BGP_DEBUG(nht, NHT))
2776 {
2777 char buf1[INET6_ADDRSTRLEN];
2778 inet_ntop(AF_INET, (const void *)&attr_new->nexthop, buf1, INET6_ADDRSTRLEN);
2779 zlog_debug("%s(%s): NH unresolved", __FUNCTION__, buf1);
2780 }
2781 bgp_info_unset_flag (rn, ri, BGP_INFO_VALID);
2782 }
2783 }
2784 else
2785 bgp_info_set_flag (rn, ri, BGP_INFO_VALID);
2786
2787 #if ENABLE_BGP_VNC
2788 if (safi == SAFI_MPLS_VPN)
2789 {
2790 struct bgp_node *prn = NULL;
2791 struct bgp_table *table = NULL;
2792
2793 prn = bgp_node_get(bgp->rib[afi][safi], (struct prefix *) prd);
2794 if (prn->info)
2795 {
2796 table = (struct bgp_table *)(prn->info);
2797
2798 vnc_import_bgp_add_vnc_host_route_mode_resolve_nve(
2799 bgp,
2800 prd,
2801 table,
2802 p,
2803 ri);
2804 }
2805 bgp_unlock_node(prn);
2806 }
2807 #endif
2808
2809 /* Process change. */
2810 bgp_aggregate_increment (bgp, p, ri, afi, safi);
2811
2812 bgp_process (bgp, rn, afi, safi);
2813 bgp_unlock_node (rn);
2814
2815 #if ENABLE_BGP_VNC
2816 if (SAFI_MPLS_VPN == safi)
2817 {
2818 uint32_t label = decode_label(tag);
2819
2820 rfapiProcessUpdate(peer, NULL, p, prd, attr, afi, safi, type, sub_type,
2821 &label);
2822 }
2823 if (SAFI_ENCAP == safi)
2824 {
2825 rfapiProcessUpdate(peer, NULL, p, prd, attr, afi, safi, type, sub_type,
2826 NULL);
2827 }
2828 #endif
2829
2830 return 0;
2831 } // End of implicit withdraw
2832
2833 /* Received Logging. */
2834 if (bgp_debug_update(peer, p, NULL, 1))
2835 {
2836 if (!peer->rcvd_attr_printed)
2837 {
2838 zlog_debug ("%s rcvd UPDATE w/ attr: %s", peer->host, peer->rcvd_attr_str);
2839 peer->rcvd_attr_printed = 1;
2840 }
2841
2842 zlog_debug ("%s rcvd %s%s ", peer->host,
2843 bgp_debug_rdpfxpath2str (prd, p, addpath_id ? 1 : 0,
2844 addpath_id, pfx_buf, sizeof (pfx_buf)), label_buf);
2845 }
2846
2847 /* Make new BGP info. */
2848 new = info_make(type, sub_type, 0, peer, attr_new, rn);
2849
2850 /* Update MPLS tag. */
2851 if (bgp_labeled_safi(safi))
2852 memcpy ((bgp_info_extra_get (new))->tag, tag, 3);
2853
2854 /* Update Overlay Index */
2855 if(afi == AFI_L2VPN)
2856 {
2857 overlay_index_update(new->attr, evpn==NULL?NULL:&evpn->eth_s_id,
2858 evpn==NULL?NULL:&evpn->gw_ip);
2859 }
2860 /* Nexthop reachability check. */
2861 if ((afi == AFI_IP || afi == AFI_IP6) &&
2862 (safi == SAFI_UNICAST || safi == SAFI_LABELED_UNICAST))
2863 {
2864 if (peer->sort == BGP_PEER_EBGP && peer->ttl == 1 &&
2865 ! CHECK_FLAG (peer->flags, PEER_FLAG_DISABLE_CONNECTED_CHECK)
2866 && ! bgp_flag_check(bgp, BGP_FLAG_DISABLE_NH_CONNECTED_CHK))
2867 connected = 1;
2868 else
2869 connected = 0;
2870
2871 if (bgp_find_or_add_nexthop (bgp, afi, new, NULL, connected))
2872 bgp_info_set_flag (rn, new, BGP_INFO_VALID);
2873 else
2874 {
2875 if (BGP_DEBUG(nht, NHT))
2876 {
2877 char buf1[INET6_ADDRSTRLEN];
2878 inet_ntop(AF_INET, (const void *)&attr_new->nexthop, buf1, INET6_ADDRSTRLEN);
2879 zlog_debug("%s(%s): NH unresolved", __FUNCTION__, buf1);
2880 }
2881 bgp_info_unset_flag (rn, new, BGP_INFO_VALID);
2882 }
2883 }
2884 else
2885 bgp_info_set_flag (rn, new, BGP_INFO_VALID);
2886
2887 /* Addpath ID */
2888 new->addpath_rx_id = addpath_id;
2889
2890 /* Increment prefix */
2891 bgp_aggregate_increment (bgp, p, new, afi, safi);
2892
2893 /* Register new BGP information. */
2894 bgp_info_add (rn, new);
2895
2896 /* route_node_get lock */
2897 bgp_unlock_node (rn);
2898
2899 #if ENABLE_BGP_VNC
2900 if (safi == SAFI_MPLS_VPN)
2901 {
2902 struct bgp_node *prn = NULL;
2903 struct bgp_table *table = NULL;
2904
2905 prn = bgp_node_get(bgp->rib[afi][safi], (struct prefix *) prd);
2906 if (prn->info)
2907 {
2908 table = (struct bgp_table *)(prn->info);
2909
2910 vnc_import_bgp_add_vnc_host_route_mode_resolve_nve(
2911 bgp,
2912 prd,
2913 table,
2914 p,
2915 new);
2916 }
2917 bgp_unlock_node(prn);
2918 }
2919 #endif
2920
2921 /* If maximum prefix count is configured and current prefix
2922 count exeed it. */
2923 if (bgp_maximum_prefix_overflow (peer, afi, safi, 0))
2924 return -1;
2925
2926 /* Process change. */
2927 bgp_process (bgp, rn, afi, safi);
2928
2929 #if ENABLE_BGP_VNC
2930 if (SAFI_MPLS_VPN == safi)
2931 {
2932 uint32_t label = decode_label(tag);
2933
2934 rfapiProcessUpdate(peer, NULL, p, prd, attr, afi, safi, type, sub_type,
2935 &label);
2936 }
2937 if (SAFI_ENCAP == safi)
2938 {
2939 rfapiProcessUpdate(peer, NULL, p, prd, attr, afi, safi, type, sub_type,
2940 NULL);
2941 }
2942 #endif
2943
2944 return 0;
2945
2946 /* This BGP update is filtered. Log the reason then update BGP
2947 entry. */
2948 filtered:
2949 if (bgp_debug_update(peer, p, NULL, 1))
2950 {
2951 if (!peer->rcvd_attr_printed)
2952 {
2953 zlog_debug ("%s rcvd UPDATE w/ attr: %s", peer->host, peer->rcvd_attr_str);
2954 peer->rcvd_attr_printed = 1;
2955 }
2956
2957 zlog_debug ("%s rcvd UPDATE about %s %s -- DENIED due to: %s",
2958 peer->host,
2959 bgp_debug_rdpfxpath2str (prd, p, addpath_id ? 1 : 0,
2960 addpath_id, pfx_buf, sizeof (pfx_buf)), label_buf, reason);
2961 }
2962
2963 if (ri)
2964 bgp_rib_remove (rn, ri, peer, afi, safi);
2965
2966 bgp_unlock_node (rn);
2967
2968 #if ENABLE_BGP_VNC
2969 /*
2970 * Filtered update is treated as an implicit withdrawal (see bgp_rib_remove()
2971 * a few lines above)
2972 */
2973 if ((SAFI_MPLS_VPN == safi) || (SAFI_ENCAP == safi))
2974 {
2975 rfapiProcessWithdraw(peer, NULL, p, prd, NULL, afi, safi, type, 0);
2976 }
2977 #endif
2978
2979 return 0;
2980 }
2981
2982 int
2983 bgp_withdraw (struct peer *peer, struct prefix *p, u_int32_t addpath_id,
2984 struct attr *attr, afi_t afi, safi_t safi, int type, int sub_type,
2985 struct prefix_rd *prd, u_char *tag, struct bgp_route_evpn *evpn)
2986 {
2987 struct bgp *bgp;
2988 char pfx_buf[BGP_PRD_PATH_STRLEN];
2989 struct bgp_node *rn;
2990 struct bgp_info *ri;
2991
2992 #if ENABLE_BGP_VNC
2993 if ((SAFI_MPLS_VPN == safi) || (SAFI_ENCAP == safi))
2994 {
2995 rfapiProcessWithdraw(peer, NULL, p, prd, NULL, afi, safi, type, 0);
2996 }
2997 #endif
2998
2999 bgp = peer->bgp;
3000
3001 /* Lookup node. */
3002 rn = bgp_afi_node_get (bgp->rib[afi][safi], afi, safi, p, prd);
3003
3004 /* If peer is soft reconfiguration enabled. Record input packet for
3005 * further calculation.
3006 *
3007 * Cisco IOS 12.4(24)T4 on session establishment sends withdraws for all
3008 * routes that are filtered. This tanks out Quagga RS pretty badly due to
3009 * the iteration over all RS clients.
3010 * Since we need to remove the entry from adj_in anyway, do that first and
3011 * if there was no entry, we don't need to do anything more.
3012 */
3013 if (CHECK_FLAG (peer->af_flags[afi][safi], PEER_FLAG_SOFT_RECONFIG)
3014 && peer != bgp->peer_self)
3015 if (!bgp_adj_in_unset (rn, peer, addpath_id))
3016 {
3017 if (bgp_debug_update (peer, p, NULL, 1))
3018 zlog_debug ("%s withdrawing route %s not in adj-in",
3019 peer->host,
3020 bgp_debug_rdpfxpath2str (prd, p, addpath_id ? 1 : 0,
3021 addpath_id, pfx_buf, sizeof (pfx_buf)));
3022 bgp_unlock_node (rn);
3023 return 0;
3024 }
3025
3026 /* Lookup withdrawn route. */
3027 for (ri = rn->info; ri; ri = ri->next)
3028 if (ri->peer == peer && ri->type == type && ri->sub_type == sub_type &&
3029 ri->addpath_rx_id == addpath_id)
3030 break;
3031
3032 /* Logging. */
3033 if (bgp_debug_update(peer, p, NULL, 1))
3034 {
3035 zlog_debug ("%s rcvd UPDATE about %s -- withdrawn",
3036 peer->host,
3037 bgp_debug_rdpfxpath2str (prd, p, addpath_id ? 1 : 0,
3038 addpath_id, pfx_buf, sizeof (pfx_buf)));
3039 }
3040
3041 /* Withdraw specified route from routing table. */
3042 if (ri && ! CHECK_FLAG (ri->flags, BGP_INFO_HISTORY))
3043 bgp_rib_withdraw (rn, ri, peer, afi, safi, prd);
3044 else if (bgp_debug_update(peer, p, NULL, 1))
3045 zlog_debug ("%s Can't find the route %s",
3046 peer->host,
3047 bgp_debug_rdpfxpath2str (prd, p, addpath_id ? 1 : 0,
3048 addpath_id, pfx_buf, sizeof (pfx_buf)));
3049
3050 /* Unlock bgp_node_get() lock. */
3051 bgp_unlock_node (rn);
3052
3053 return 0;
3054 }
3055
3056 void
3057 bgp_default_originate (struct peer *peer, afi_t afi, safi_t safi, int withdraw)
3058 {
3059 struct update_subgroup *subgrp;
3060 subgrp = peer_subgroup(peer, afi, safi);
3061 subgroup_default_originate(subgrp, withdraw);
3062 }
3063
3064
3065 /*
3066 * bgp_stop_announce_route_timer
3067 */
3068 void
3069 bgp_stop_announce_route_timer (struct peer_af *paf)
3070 {
3071 if (!paf->t_announce_route)
3072 return;
3073
3074 THREAD_TIMER_OFF (paf->t_announce_route);
3075 }
3076
3077 /*
3078 * bgp_announce_route_timer_expired
3079 *
3080 * Callback that is invoked when the route announcement timer for a
3081 * peer_af expires.
3082 */
3083 static int
3084 bgp_announce_route_timer_expired (struct thread *t)
3085 {
3086 struct peer_af *paf;
3087 struct peer *peer;
3088
3089 paf = THREAD_ARG (t);
3090 peer = paf->peer;
3091
3092 if (peer->status != Established)
3093 return 0;
3094
3095 if (!peer->afc_nego[paf->afi][paf->safi])
3096 return 0;
3097
3098 peer_af_announce_route (paf, 1);
3099 return 0;
3100 }
3101
3102 /*
3103 * bgp_announce_route
3104 *
3105 * *Triggers* announcement of routes of a given AFI/SAFI to a peer.
3106 */
3107 void
3108 bgp_announce_route (struct peer *peer, afi_t afi, safi_t safi)
3109 {
3110 struct peer_af *paf;
3111 struct update_subgroup *subgrp;
3112
3113 paf = peer_af_find (peer, afi, safi);
3114 if (!paf)
3115 return;
3116 subgrp = PAF_SUBGRP(paf);
3117
3118 /*
3119 * Ignore if subgroup doesn't exist (implies AF is not negotiated)
3120 * or a refresh has already been triggered.
3121 */
3122 if (!subgrp || paf->t_announce_route)
3123 return;
3124
3125 /*
3126 * Start a timer to stagger/delay the announce. This serves
3127 * two purposes - announcement can potentially be combined for
3128 * multiple peers and the announcement doesn't happen in the
3129 * vty context.
3130 */
3131 thread_add_timer_msec(bm->master, bgp_announce_route_timer_expired, paf,
3132 (subgrp->peer_count == 1) ? BGP_ANNOUNCE_ROUTE_SHORT_DELAY_MS : BGP_ANNOUNCE_ROUTE_DELAY_MS,
3133 &paf->t_announce_route);
3134 }
3135
3136 /*
3137 * Announce routes from all AF tables to a peer.
3138 *
3139 * This should ONLY be called when there is a need to refresh the
3140 * routes to the peer based on a policy change for this peer alone
3141 * or a route refresh request received from the peer.
3142 * The operation will result in splitting the peer from its existing
3143 * subgroups and putting it in new subgroups.
3144 */
3145 void
3146 bgp_announce_route_all (struct peer *peer)
3147 {
3148 afi_t afi;
3149 safi_t safi;
3150
3151 for (afi = AFI_IP; afi < AFI_MAX; afi++)
3152 for (safi = SAFI_UNICAST; safi < SAFI_MAX; safi++)
3153 bgp_announce_route (peer, afi, safi);
3154 }
3155
3156 static void
3157 bgp_soft_reconfig_table (struct peer *peer, afi_t afi, safi_t safi,
3158 struct bgp_table *table, struct prefix_rd *prd)
3159 {
3160 int ret;
3161 struct bgp_node *rn;
3162 struct bgp_adj_in *ain;
3163
3164 if (! table)
3165 table = peer->bgp->rib[afi][safi];
3166
3167 for (rn = bgp_table_top (table); rn; rn = bgp_route_next (rn))
3168 for (ain = rn->adj_in; ain; ain = ain->next)
3169 {
3170 if (ain->peer == peer)
3171 {
3172 struct bgp_info *ri = rn->info;
3173 u_char *tag = (ri && ri->extra) ? ri->extra->tag : NULL;
3174
3175 ret = bgp_update (peer, &rn->p, ain->addpath_rx_id, ain->attr,
3176 afi, safi, ZEBRA_ROUTE_BGP, BGP_ROUTE_NORMAL,
3177 prd, tag, 1, NULL);
3178
3179 if (ret < 0)
3180 {
3181 bgp_unlock_node (rn);
3182 return;
3183 }
3184 }
3185 }
3186 }
3187
3188 void
3189 bgp_soft_reconfig_in (struct peer *peer, afi_t afi, safi_t safi)
3190 {
3191 struct bgp_node *rn;
3192 struct bgp_table *table;
3193
3194 if (peer->status != Established)
3195 return;
3196
3197 if ((safi != SAFI_MPLS_VPN) && (safi != SAFI_ENCAP) && (safi != SAFI_EVPN))
3198 bgp_soft_reconfig_table (peer, afi, safi, NULL, NULL);
3199 else
3200 for (rn = bgp_table_top (peer->bgp->rib[afi][safi]); rn;
3201 rn = bgp_route_next (rn))
3202 if ((table = rn->info) != NULL)
3203 {
3204 struct prefix_rd prd;
3205 prd.family = AF_UNSPEC;
3206 prd.prefixlen = 64;
3207 memcpy(&prd.val, rn->p.u.val, 8);
3208
3209 bgp_soft_reconfig_table (peer, afi, safi, table, &prd);
3210 }
3211 }
3212
3213
3214 struct bgp_clear_node_queue
3215 {
3216 struct bgp_node *rn;
3217 };
3218
3219 static wq_item_status
3220 bgp_clear_route_node (struct work_queue *wq, void *data)
3221 {
3222 struct bgp_clear_node_queue *cnq = data;
3223 struct bgp_node *rn = cnq->rn;
3224 struct peer *peer = wq->spec.data;
3225 struct bgp_info *ri;
3226 afi_t afi = bgp_node_table (rn)->afi;
3227 safi_t safi = bgp_node_table (rn)->safi;
3228
3229 assert (rn && peer);
3230
3231 /* It is possible that we have multiple paths for a prefix from a peer
3232 * if that peer is using AddPath.
3233 */
3234 for (ri = rn->info; ri; ri = ri->next)
3235 if (ri->peer == peer)
3236 {
3237 /* graceful restart STALE flag set. */
3238 if (CHECK_FLAG (peer->sflags, PEER_STATUS_NSF_WAIT)
3239 && peer->nsf[afi][safi]
3240 && ! CHECK_FLAG (ri->flags, BGP_INFO_STALE)
3241 && ! CHECK_FLAG (ri->flags, BGP_INFO_UNUSEABLE))
3242 bgp_info_set_flag (rn, ri, BGP_INFO_STALE);
3243 else
3244 bgp_rib_remove (rn, ri, peer, afi, safi);
3245 }
3246 return WQ_SUCCESS;
3247 }
3248
3249 static void
3250 bgp_clear_node_queue_del (struct work_queue *wq, void *data)
3251 {
3252 struct bgp_clear_node_queue *cnq = data;
3253 struct bgp_node *rn = cnq->rn;
3254 struct bgp_table *table = bgp_node_table (rn);
3255
3256 bgp_unlock_node (rn);
3257 bgp_table_unlock (table);
3258 XFREE (MTYPE_BGP_CLEAR_NODE_QUEUE, cnq);
3259 }
3260
3261 static void
3262 bgp_clear_node_complete (struct work_queue *wq)
3263 {
3264 struct peer *peer = wq->spec.data;
3265
3266 /* Tickle FSM to start moving again */
3267 BGP_EVENT_ADD (peer, Clearing_Completed);
3268
3269 peer_unlock (peer); /* bgp_clear_route */
3270 }
3271
3272 static void
3273 bgp_clear_node_queue_init (struct peer *peer)
3274 {
3275 char wname[sizeof("clear xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx")];
3276
3277 snprintf (wname, sizeof(wname), "clear %s", peer->host);
3278 #undef CLEAR_QUEUE_NAME_LEN
3279
3280 if ( (peer->clear_node_queue = work_queue_new (bm->master, wname)) == NULL)
3281 {
3282 zlog_err ("%s: Failed to allocate work queue", __func__);
3283 exit (1);
3284 }
3285 peer->clear_node_queue->spec.hold = 10;
3286 peer->clear_node_queue->spec.workfunc = &bgp_clear_route_node;
3287 peer->clear_node_queue->spec.del_item_data = &bgp_clear_node_queue_del;
3288 peer->clear_node_queue->spec.completion_func = &bgp_clear_node_complete;
3289 peer->clear_node_queue->spec.max_retries = 0;
3290
3291 /* we only 'lock' this peer reference when the queue is actually active */
3292 peer->clear_node_queue->spec.data = peer;
3293 }
3294
3295 static void
3296 bgp_clear_route_table (struct peer *peer, afi_t afi, safi_t safi,
3297 struct bgp_table *table)
3298 {
3299 struct bgp_node *rn;
3300 int force = bm->process_main_queue ? 0 : 1;
3301
3302 if (! table)
3303 table = peer->bgp->rib[afi][safi];
3304
3305 /* If still no table => afi/safi isn't configured at all or smth. */
3306 if (! table)
3307 return;
3308
3309 for (rn = bgp_table_top (table); rn; rn = bgp_route_next (rn))
3310 {
3311 struct bgp_info *ri, *next;
3312 struct bgp_adj_in *ain;
3313 struct bgp_adj_in *ain_next;
3314
3315 /* XXX:TODO: This is suboptimal, every non-empty route_node is
3316 * queued for every clearing peer, regardless of whether it is
3317 * relevant to the peer at hand.
3318 *
3319 * Overview: There are 3 different indices which need to be
3320 * scrubbed, potentially, when a peer is removed:
3321 *
3322 * 1 peer's routes visible via the RIB (ie accepted routes)
3323 * 2 peer's routes visible by the (optional) peer's adj-in index
3324 * 3 other routes visible by the peer's adj-out index
3325 *
3326 * 3 there is no hurry in scrubbing, once the struct peer is
3327 * removed from bgp->peer, we could just GC such deleted peer's
3328 * adj-outs at our leisure.
3329 *
3330 * 1 and 2 must be 'scrubbed' in some way, at least made
3331 * invisible via RIB index before peer session is allowed to be
3332 * brought back up. So one needs to know when such a 'search' is
3333 * complete.
3334 *
3335 * Ideally:
3336 *
3337 * - there'd be a single global queue or a single RIB walker
3338 * - rather than tracking which route_nodes still need to be
3339 * examined on a peer basis, we'd track which peers still
3340 * aren't cleared
3341 *
3342 * Given that our per-peer prefix-counts now should be reliable,
3343 * this may actually be achievable. It doesn't seem to be a huge
3344 * problem at this time,
3345 *
3346 * It is possible that we have multiple paths for a prefix from a peer
3347 * if that peer is using AddPath.
3348 */
3349 ain = rn->adj_in;
3350 while (ain)
3351 {
3352 ain_next = ain->next;
3353
3354 if (ain->peer == peer)
3355 {
3356 bgp_adj_in_remove (rn, ain);
3357 bgp_unlock_node (rn);
3358 }
3359
3360 ain = ain_next;
3361 }
3362
3363 for (ri = rn->info; ri; ri = next)
3364 {
3365 next = ri->next;
3366 if (ri->peer != peer)
3367 continue;
3368
3369 if (force)
3370 bgp_info_reap (rn, ri);
3371 else
3372 {
3373 struct bgp_clear_node_queue *cnq;
3374
3375 /* both unlocked in bgp_clear_node_queue_del */
3376 bgp_table_lock (bgp_node_table (rn));
3377 bgp_lock_node (rn);
3378 cnq = XCALLOC (MTYPE_BGP_CLEAR_NODE_QUEUE,
3379 sizeof (struct bgp_clear_node_queue));
3380 cnq->rn = rn;
3381 work_queue_add (peer->clear_node_queue, cnq);
3382 break;
3383 }
3384 }
3385 }
3386 return;
3387 }
3388
3389 void
3390 bgp_clear_route (struct peer *peer, afi_t afi, safi_t safi)
3391 {
3392 struct bgp_node *rn;
3393 struct bgp_table *table;
3394
3395 if (peer->clear_node_queue == NULL)
3396 bgp_clear_node_queue_init (peer);
3397
3398 /* bgp_fsm.c keeps sessions in state Clearing, not transitioning to
3399 * Idle until it receives a Clearing_Completed event. This protects
3400 * against peers which flap faster than we can we clear, which could
3401 * lead to:
3402 *
3403 * a) race with routes from the new session being installed before
3404 * clear_route_node visits the node (to delete the route of that
3405 * peer)
3406 * b) resource exhaustion, clear_route_node likely leads to an entry
3407 * on the process_main queue. Fast-flapping could cause that queue
3408 * to grow and grow.
3409 */
3410
3411 /* lock peer in assumption that clear-node-queue will get nodes; if so,
3412 * the unlock will happen upon work-queue completion; other wise, the
3413 * unlock happens at the end of this function.
3414 */
3415 if (!peer->clear_node_queue->thread)
3416 peer_lock (peer);
3417
3418 if (safi != SAFI_MPLS_VPN && safi != SAFI_ENCAP && safi != SAFI_EVPN)
3419 bgp_clear_route_table (peer, afi, safi, NULL);
3420 else
3421 for (rn = bgp_table_top (peer->bgp->rib[afi][safi]); rn;
3422 rn = bgp_route_next (rn))
3423 if ((table = rn->info) != NULL)
3424 bgp_clear_route_table (peer, afi, safi, table);
3425
3426 /* unlock if no nodes got added to the clear-node-queue. */
3427 if (!peer->clear_node_queue->thread)
3428 peer_unlock (peer);
3429
3430 }
3431
3432 void
3433 bgp_clear_route_all (struct peer *peer)
3434 {
3435 afi_t afi;
3436 safi_t safi;
3437
3438 for (afi = AFI_IP; afi < AFI_MAX; afi++)
3439 for (safi = SAFI_UNICAST; safi < SAFI_MAX; safi++)
3440 bgp_clear_route (peer, afi, safi);
3441
3442 #if ENABLE_BGP_VNC
3443 rfapiProcessPeerDown(peer);
3444 #endif
3445 }
3446
3447 void
3448 bgp_clear_adj_in (struct peer *peer, afi_t afi, safi_t safi)
3449 {
3450 struct bgp_table *table;
3451 struct bgp_node *rn;
3452 struct bgp_adj_in *ain;
3453 struct bgp_adj_in *ain_next;
3454
3455 table = peer->bgp->rib[afi][safi];
3456
3457 /* It is possible that we have multiple paths for a prefix from a peer
3458 * if that peer is using AddPath.
3459 */
3460 for (rn = bgp_table_top (table); rn; rn = bgp_route_next (rn))
3461 {
3462 ain = rn->adj_in;
3463
3464 while (ain)
3465 {
3466 ain_next = ain->next;
3467
3468 if (ain->peer == peer)
3469 {
3470 bgp_adj_in_remove (rn, ain);
3471 bgp_unlock_node (rn);
3472 }
3473
3474 ain = ain_next;
3475 }
3476 }
3477 }
3478
3479 void
3480 bgp_clear_stale_route (struct peer *peer, afi_t afi, safi_t safi)
3481 {
3482 struct bgp_node *rn;
3483 struct bgp_info *ri;
3484 struct bgp_table *table;
3485
3486 if ( safi == SAFI_MPLS_VPN)
3487 {
3488 for (rn = bgp_table_top (peer->bgp->rib[afi][safi]); rn; rn = bgp_route_next (rn))
3489 {
3490 struct bgp_node *rm;
3491 struct bgp_info *ri;
3492
3493 /* look for neighbor in tables */
3494 if ((table = rn->info) != NULL)
3495 {
3496 for (rm = bgp_table_top (table); rm; rm = bgp_route_next (rm))
3497 for (ri = rm->info; ri; ri = ri->next)
3498 if (ri->peer == peer)
3499 {
3500 if (CHECK_FLAG (ri->flags, BGP_INFO_STALE))
3501 bgp_rib_remove (rm, ri, peer, afi, safi);
3502 break;
3503 }
3504 }
3505 }
3506 }
3507 else
3508 {
3509 for (rn = bgp_table_top (peer->bgp->rib[afi][safi]); rn; rn = bgp_route_next (rn))
3510 for (ri = rn->info; ri; ri = ri->next)
3511 if (ri->peer == peer)
3512 {
3513 if (CHECK_FLAG (ri->flags, BGP_INFO_STALE))
3514 bgp_rib_remove (rn, ri, peer, afi, safi);
3515 break;
3516 }
3517 }
3518 }
3519
3520 static void
3521 bgp_cleanup_table(struct bgp_table *table, safi_t safi)
3522 {
3523 struct bgp_node *rn;
3524 struct bgp_info *ri;
3525 struct bgp_info *next;
3526
3527 for (rn = bgp_table_top (table); rn; rn = bgp_route_next (rn))
3528 for (ri = rn->info; ri; ri = next)
3529 {
3530 next = ri->next;
3531 if (CHECK_FLAG (ri->flags, BGP_INFO_SELECTED)
3532 && ri->type == ZEBRA_ROUTE_BGP
3533 && (ri->sub_type == BGP_ROUTE_NORMAL ||
3534 ri->sub_type == BGP_ROUTE_AGGREGATE))
3535 {
3536 #if ENABLE_BGP_VNC
3537 if (table->owner && table->owner->bgp)
3538 vnc_import_bgp_del_route(table->owner->bgp, &rn->p, ri);
3539 #endif
3540 bgp_zebra_withdraw (&rn->p, ri, safi);
3541 bgp_info_reap (rn, ri);
3542 }
3543 }
3544 }
3545
3546 /* Delete all kernel routes. */
3547 void
3548 bgp_cleanup_routes (struct bgp *bgp)
3549 {
3550 afi_t afi;
3551 struct bgp_node *rn;
3552
3553 for (afi = AFI_IP; afi < AFI_MAX; ++afi)
3554 {
3555 if (afi == AFI_L2VPN)
3556 continue;
3557 bgp_cleanup_table(bgp->rib[afi][SAFI_UNICAST], SAFI_UNICAST);
3558 /*
3559 * VPN and ENCAP and EVPN tables are two-level (RD is top level)
3560 */
3561 if (afi != AFI_L2VPN)
3562 {
3563 safi_t safi;
3564 safi = SAFI_MPLS_VPN;
3565 for (rn = bgp_table_top(bgp->rib[afi][safi]); rn;
3566 rn = bgp_route_next (rn))
3567 {
3568 if (rn->info)
3569 {
3570 bgp_cleanup_table((struct bgp_table *)(rn->info), safi);
3571 bgp_table_finish ((struct bgp_table **)&(rn->info));
3572 rn->info = NULL;
3573 bgp_unlock_node(rn);
3574 }
3575 }
3576 safi = SAFI_ENCAP;
3577 for (rn = bgp_table_top(bgp->rib[afi][safi]); rn;
3578 rn = bgp_route_next (rn))
3579 {
3580 if (rn->info)
3581 {
3582 bgp_cleanup_table((struct bgp_table *)(rn->info), safi);
3583 bgp_table_finish ((struct bgp_table **)&(rn->info));
3584 rn->info = NULL;
3585 bgp_unlock_node(rn);
3586 }
3587 }
3588 }
3589 }
3590 for (rn = bgp_table_top(bgp->rib[AFI_L2VPN][SAFI_EVPN]); rn;
3591 rn = bgp_route_next (rn))
3592 {
3593 if (rn->info)
3594 {
3595 bgp_cleanup_table((struct bgp_table *)(rn->info), SAFI_EVPN);
3596 bgp_table_finish ((struct bgp_table **)&(rn->info));
3597 rn->info = NULL;
3598 bgp_unlock_node(rn);
3599 }
3600 }
3601 }
3602
3603 void
3604 bgp_reset (void)
3605 {
3606 vty_reset ();
3607 bgp_zclient_reset ();
3608 access_list_reset ();
3609 prefix_list_reset ();
3610 }
3611
3612 static int
3613 bgp_addpath_encode_rx (struct peer *peer, afi_t afi, safi_t safi)
3614 {
3615 return (CHECK_FLAG (peer->af_cap[afi][safi], PEER_CAP_ADDPATH_AF_RX_ADV) &&
3616 CHECK_FLAG (peer->af_cap[afi][safi], PEER_CAP_ADDPATH_AF_TX_RCV));
3617 }
3618
3619 /* Parse NLRI stream. Withdraw NLRI is recognized by NULL attr
3620 value. */
3621 int
3622 bgp_nlri_parse_ip (struct peer *peer, struct attr *attr,
3623 struct bgp_nlri *packet)
3624 {
3625 u_char *pnt;
3626 u_char *lim;
3627 struct prefix p;
3628 int psize;
3629 int ret;
3630 afi_t afi;
3631 safi_t safi;
3632 int addpath_encoded;
3633 u_int32_t addpath_id;
3634
3635 /* Check peer status. */
3636 if (peer->status != Established)
3637 return 0;
3638
3639 pnt = packet->nlri;
3640 lim = pnt + packet->length;
3641 afi = packet->afi;
3642 safi = packet->safi;
3643 addpath_id = 0;
3644 addpath_encoded = bgp_addpath_encode_rx (peer, afi, safi);
3645
3646 /* RFC4771 6.3 The NLRI field in the UPDATE message is checked for
3647 syntactic validity. If the field is syntactically incorrect,
3648 then the Error Subcode is set to Invalid Network Field. */
3649 for (; pnt < lim; pnt += psize)
3650 {
3651 /* Clear prefix structure. */
3652 memset (&p, 0, sizeof (struct prefix));
3653
3654 if (addpath_encoded)
3655 {
3656
3657 /* When packet overflow occurs return immediately. */
3658 if (pnt + BGP_ADDPATH_ID_LEN > lim)
3659 return -1;
3660
3661 addpath_id = ntohl(*((uint32_t*) pnt));
3662 pnt += BGP_ADDPATH_ID_LEN;
3663 }
3664
3665 /* Fetch prefix length. */
3666 p.prefixlen = *pnt++;
3667 /* afi/safi validity already verified by caller, bgp_update_receive */
3668 p.family = afi2family (afi);
3669
3670 /* Prefix length check. */
3671 if (p.prefixlen > prefix_blen (&p) * 8)
3672 {
3673 zlog_err("%s [Error] Update packet error (wrong perfix length %d for afi %u)",
3674 peer->host, p.prefixlen, packet->afi);
3675 return -1;
3676 }
3677
3678 /* Packet size overflow check. */
3679 psize = PSIZE (p.prefixlen);
3680
3681 /* When packet overflow occur return immediately. */
3682 if (pnt + psize > lim)
3683 {
3684 zlog_err("%s [Error] Update packet error (prefix length %d overflows packet)",
3685 peer->host, p.prefixlen);
3686 return -1;
3687 }
3688
3689 /* Defensive coding, double-check the psize fits in a struct prefix */
3690 if (psize > (ssize_t) sizeof(p.u))
3691 {
3692 zlog_err("%s [Error] Update packet error (prefix length %d too large for prefix storage %zu)",
3693 peer->host, p.prefixlen, sizeof(p.u));
3694 return -1;
3695 }
3696
3697 /* Fetch prefix from NLRI packet. */
3698 memcpy (&p.u.prefix, pnt, psize);
3699
3700 /* Check address. */
3701 if (afi == AFI_IP && safi == SAFI_UNICAST)
3702 {
3703 if (IN_CLASSD (ntohl (p.u.prefix4.s_addr)))
3704 {
3705 /* From RFC4271 Section 6.3:
3706 *
3707 * If a prefix in the NLRI field is semantically incorrect
3708 * (e.g., an unexpected multicast IP address), an error SHOULD
3709 * be logged locally, and the prefix SHOULD be ignored.
3710 */
3711 zlog_err ("%s: IPv4 unicast NLRI is multicast address %s, ignoring",
3712 peer->host, inet_ntoa (p.u.prefix4));
3713 continue;
3714 }
3715 }
3716
3717 /* Check address. */
3718 if (afi == AFI_IP6 && safi == SAFI_UNICAST)
3719 {
3720 if (IN6_IS_ADDR_LINKLOCAL (&p.u.prefix6))
3721 {
3722 char buf[BUFSIZ];
3723
3724 zlog_err ("%s: IPv6 unicast NLRI is link-local address %s, ignoring",
3725 peer->host, inet_ntop (AF_INET6, &p.u.prefix6, buf, BUFSIZ));
3726
3727 continue;
3728 }
3729 if (IN6_IS_ADDR_MULTICAST (&p.u.prefix6))
3730 {
3731 char buf[BUFSIZ];
3732
3733 zlog_err ("%s: IPv6 unicast NLRI is multicast address %s, ignoring",
3734 peer->host, inet_ntop (AF_INET6, &p.u.prefix6, buf, BUFSIZ));
3735
3736 continue;
3737 }
3738 }
3739
3740 /* Normal process. */
3741 if (attr)
3742 ret = bgp_update (peer, &p, addpath_id, attr, afi, safi,
3743 ZEBRA_ROUTE_BGP, BGP_ROUTE_NORMAL, NULL, NULL, 0, NULL);
3744 else
3745 ret = bgp_withdraw (peer, &p, addpath_id, attr, afi, safi,
3746 ZEBRA_ROUTE_BGP, BGP_ROUTE_NORMAL, NULL, NULL, NULL);
3747
3748 /* Address family configuration mismatch or maximum-prefix count
3749 overflow. */
3750 if (ret < 0)
3751 return -1;
3752 }
3753
3754 /* Packet length consistency check. */
3755 if (pnt != lim)
3756 {
3757 zlog_err ("%s [Error] Update packet error (prefix length mismatch with total length)",
3758 peer->host);
3759 return -1;
3760 }
3761
3762 return 0;
3763 }
3764
3765 static struct bgp_static *
3766 bgp_static_new (void)
3767 {
3768 return XCALLOC (MTYPE_BGP_STATIC, sizeof (struct bgp_static));
3769 }
3770
3771 static void
3772 bgp_static_free (struct bgp_static *bgp_static)
3773 {
3774 if (bgp_static->rmap.name)
3775 XFREE(MTYPE_ROUTE_MAP_NAME, bgp_static->rmap.name);
3776 if(bgp_static->eth_s_id)
3777 XFREE(MTYPE_ATTR, bgp_static->eth_s_id);
3778 XFREE (MTYPE_BGP_STATIC, bgp_static);
3779 }
3780
3781 void
3782 bgp_static_update (struct bgp *bgp, struct prefix *p,
3783 struct bgp_static *bgp_static, afi_t afi, safi_t safi)
3784 {
3785 struct bgp_node *rn;
3786 struct bgp_info *ri;
3787 struct bgp_info *new;
3788 struct bgp_info info;
3789 struct attr attr;
3790 struct attr *attr_new;
3791 int ret;
3792 #if ENABLE_BGP_VNC
3793 int vnc_implicit_withdraw = 0;
3794 #endif
3795
3796 assert (bgp_static);
3797 if (!bgp_static)
3798 return;
3799
3800 rn = bgp_afi_node_get (bgp->rib[afi][safi], afi, safi, p, NULL);
3801
3802 bgp_attr_default_set (&attr, BGP_ORIGIN_IGP);
3803
3804 attr.nexthop = bgp_static->igpnexthop;
3805 attr.med = bgp_static->igpmetric;
3806 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC);
3807
3808 if (bgp_static->atomic)
3809 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_ATOMIC_AGGREGATE);
3810
3811 /* Store label index, if required. */
3812 if (bgp_static->label_index != BGP_INVALID_LABEL_INDEX)
3813 {
3814 (bgp_attr_extra_get (&attr))->label_index = bgp_static->label_index;
3815 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_PREFIX_SID);
3816 }
3817
3818 /* Apply route-map. */
3819 if (bgp_static->rmap.name)
3820 {
3821 struct attr attr_tmp = attr;
3822 info.peer = bgp->peer_self;
3823 info.attr = &attr_tmp;
3824
3825 SET_FLAG (bgp->peer_self->rmap_type, PEER_RMAP_TYPE_NETWORK);
3826
3827 ret = route_map_apply (bgp_static->rmap.map, p, RMAP_BGP, &info);
3828
3829 bgp->peer_self->rmap_type = 0;
3830
3831 if (ret == RMAP_DENYMATCH)
3832 {
3833 /* Free uninterned attribute. */
3834 bgp_attr_flush (&attr_tmp);
3835
3836 /* Unintern original. */
3837 aspath_unintern (&attr.aspath);
3838 bgp_attr_extra_free (&attr);
3839 bgp_static_withdraw (bgp, p, afi, safi);
3840 return;
3841 }
3842 attr_new = bgp_attr_intern (&attr_tmp);
3843 }
3844 else
3845 attr_new = bgp_attr_intern (&attr);
3846
3847 for (ri = rn->info; ri; ri = ri->next)
3848 if (ri->peer == bgp->peer_self && ri->type == ZEBRA_ROUTE_BGP
3849 && ri->sub_type == BGP_ROUTE_STATIC)
3850 break;
3851
3852 if (ri)
3853 {
3854 if (attrhash_cmp (ri->attr, attr_new) &&
3855 !CHECK_FLAG(ri->flags, BGP_INFO_REMOVED) &&
3856 !bgp_flag_check(bgp, BGP_FLAG_FORCE_STATIC_PROCESS))
3857 {
3858 bgp_unlock_node (rn);
3859 bgp_attr_unintern (&attr_new);
3860 aspath_unintern (&attr.aspath);
3861 bgp_attr_extra_free (&attr);
3862 return;
3863 }
3864 else
3865 {
3866 /* The attribute is changed. */
3867 bgp_info_set_flag (rn, ri, BGP_INFO_ATTR_CHANGED);
3868
3869 /* Rewrite BGP route information. */
3870 if (CHECK_FLAG(ri->flags, BGP_INFO_REMOVED))
3871 bgp_info_restore(rn, ri);
3872 else
3873 bgp_aggregate_decrement (bgp, p, ri, afi, safi);
3874 #if ENABLE_BGP_VNC
3875 if ((afi == AFI_IP || afi == AFI_IP6) && (safi == SAFI_UNICAST))
3876 {
3877 if (CHECK_FLAG (ri->flags, BGP_INFO_SELECTED))
3878 {
3879 /*
3880 * Implicit withdraw case.
3881 * We have to do this before ri is changed
3882 */
3883 ++vnc_implicit_withdraw;
3884 vnc_import_bgp_del_route(bgp, p, ri);
3885 vnc_import_bgp_exterior_del_route(bgp, p, ri);
3886 }
3887 }
3888 #endif
3889 bgp_attr_unintern (&ri->attr);
3890 ri->attr = attr_new;
3891 ri->uptime = bgp_clock ();
3892 #if ENABLE_BGP_VNC
3893 if ((afi == AFI_IP || afi == AFI_IP6) && (safi == SAFI_UNICAST))
3894 {
3895 if (vnc_implicit_withdraw)
3896 {
3897 vnc_import_bgp_add_route(bgp, p, ri);
3898 vnc_import_bgp_exterior_add_route(bgp, p, ri);
3899 }
3900 }
3901 #endif
3902
3903 /* Nexthop reachability check. */
3904 if (bgp_flag_check (bgp, BGP_FLAG_IMPORT_CHECK) &&
3905 safi == SAFI_UNICAST)
3906 {
3907 if (bgp_find_or_add_nexthop (bgp, afi, ri, NULL, 0) &&
3908 safi == SAFI_UNICAST)
3909 bgp_info_set_flag (rn, ri, BGP_INFO_VALID);
3910 else
3911 {
3912 if (BGP_DEBUG(nht, NHT))
3913 {
3914 char buf1[INET6_ADDRSTRLEN];
3915 inet_ntop(p->family, &p->u.prefix, buf1,
3916 INET6_ADDRSTRLEN);
3917 zlog_debug("%s(%s): Route not in table, not advertising",
3918 __FUNCTION__, buf1);
3919 }
3920 bgp_info_unset_flag (rn, ri, BGP_INFO_VALID);
3921 }
3922 }
3923 else
3924 {
3925 /* Delete the NHT structure if any, if we're toggling between
3926 * enabling/disabling import check. We deregister the route
3927 * from NHT to avoid overloading NHT and the process interaction
3928 */
3929 bgp_unlink_nexthop(ri);
3930 bgp_info_set_flag (rn, ri, BGP_INFO_VALID);
3931 }
3932 /* Process change. */
3933 bgp_aggregate_increment (bgp, p, ri, afi, safi);
3934 bgp_process (bgp, rn, afi, safi);
3935 bgp_unlock_node (rn);
3936 aspath_unintern (&attr.aspath);
3937 bgp_attr_extra_free (&attr);
3938 return;
3939 }
3940 }
3941
3942 /* Make new BGP info. */
3943 new = info_make(ZEBRA_ROUTE_BGP, BGP_ROUTE_STATIC, 0, bgp->peer_self, attr_new,
3944 rn);
3945 /* Nexthop reachability check. */
3946 if (bgp_flag_check (bgp, BGP_FLAG_IMPORT_CHECK))
3947 {
3948 if (bgp_find_or_add_nexthop (bgp, afi, new, NULL, 0))
3949 bgp_info_set_flag (rn, new, BGP_INFO_VALID);
3950 else
3951 {
3952 if (BGP_DEBUG(nht, NHT))
3953 {
3954 char buf1[INET6_ADDRSTRLEN];
3955 inet_ntop(p->family, &p->u.prefix, buf1,
3956 INET6_ADDRSTRLEN);
3957 zlog_debug("%s(%s): Route not in table, not advertising",
3958 __FUNCTION__, buf1);
3959 }
3960 bgp_info_unset_flag (rn, new, BGP_INFO_VALID);
3961 }
3962 }
3963 else
3964 {
3965 /* Delete the NHT structure if any, if we're toggling between
3966 * enabling/disabling import check. We deregister the route
3967 * from NHT to avoid overloading NHT and the process interaction
3968 */
3969 bgp_unlink_nexthop(new);
3970
3971 bgp_info_set_flag (rn, new, BGP_INFO_VALID);
3972 }
3973
3974 /* Aggregate address increment. */
3975 bgp_aggregate_increment (bgp, p, new, afi, safi);
3976
3977 /* Register new BGP information. */
3978 bgp_info_add (rn, new);
3979
3980 /* route_node_get lock */
3981 bgp_unlock_node (rn);
3982
3983 /* Process change. */
3984 bgp_process (bgp, rn, afi, safi);
3985
3986 /* Unintern original. */
3987 aspath_unintern (&attr.aspath);
3988 bgp_attr_extra_free (&attr);
3989 }
3990
3991 void
3992 bgp_static_withdraw (struct bgp *bgp, struct prefix *p, afi_t afi,
3993 safi_t safi)
3994 {
3995 struct bgp_node *rn;
3996 struct bgp_info *ri;
3997
3998 rn = bgp_afi_node_get (bgp->rib[afi][safi], afi, safi, p, NULL);
3999
4000 /* Check selected route and self inserted route. */
4001 for (ri = rn->info; ri; ri = ri->next)
4002 if (ri->peer == bgp->peer_self
4003 && ri->type == ZEBRA_ROUTE_BGP
4004 && ri->sub_type == BGP_ROUTE_STATIC)
4005 break;
4006
4007 /* Withdraw static BGP route from routing table. */
4008 if (ri)
4009 {
4010 bgp_aggregate_decrement (bgp, p, ri, afi, safi);
4011 bgp_unlink_nexthop(ri);
4012 bgp_info_delete (rn, ri);
4013 bgp_process (bgp, rn, afi, safi);
4014 }
4015
4016 /* Unlock bgp_node_lookup. */
4017 bgp_unlock_node (rn);
4018 }
4019
4020 /*
4021 * Used for SAFI_MPLS_VPN and SAFI_ENCAP
4022 */
4023 static void
4024 bgp_static_withdraw_safi (struct bgp *bgp, struct prefix *p, afi_t afi,
4025 safi_t safi, struct prefix_rd *prd, u_char *tag)
4026 {
4027 struct bgp_node *rn;
4028 struct bgp_info *ri;
4029
4030 rn = bgp_afi_node_get (bgp->rib[afi][safi], afi, safi, p, prd);
4031
4032 /* Check selected route and self inserted route. */
4033 for (ri = rn->info; ri; ri = ri->next)
4034 if (ri->peer == bgp->peer_self
4035 && ri->type == ZEBRA_ROUTE_BGP
4036 && ri->sub_type == BGP_ROUTE_STATIC)
4037 break;
4038
4039 /* Withdraw static BGP route from routing table. */
4040 if (ri)
4041 {
4042 #if ENABLE_BGP_VNC
4043 rfapiProcessWithdraw(
4044 ri->peer,
4045 NULL,
4046 p,
4047 prd,
4048 ri->attr,
4049 afi,
4050 safi,
4051 ri->type,
4052 1); /* Kill, since it is an administrative change */
4053 #endif
4054 bgp_aggregate_decrement (bgp, p, ri, afi, safi);
4055 bgp_info_delete (rn, ri);
4056 bgp_process (bgp, rn, afi, safi);
4057 }
4058
4059 /* Unlock bgp_node_lookup. */
4060 bgp_unlock_node (rn);
4061 }
4062
4063 static void
4064 bgp_static_update_safi (struct bgp *bgp, struct prefix *p,
4065 struct bgp_static *bgp_static, afi_t afi, safi_t safi)
4066 {
4067 struct bgp_node *rn;
4068 struct bgp_info *new;
4069 struct attr *attr_new;
4070 struct attr attr = { 0 };
4071 struct bgp_info *ri;
4072 #if ENABLE_BGP_VNC
4073 u_int32_t label = 0;
4074 #endif
4075 union gw_addr add;
4076
4077 assert (bgp_static);
4078
4079 rn = bgp_afi_node_get (bgp->rib[afi][safi], afi, safi, p, &bgp_static->prd);
4080
4081 bgp_attr_default_set (&attr, BGP_ORIGIN_IGP);
4082
4083 attr.nexthop = bgp_static->igpnexthop;
4084 attr.med = bgp_static->igpmetric;
4085 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC);
4086
4087 if ((safi == SAFI_EVPN) || (safi == SAFI_MPLS_VPN) || (safi == SAFI_ENCAP))
4088 {
4089 if (afi == AFI_IP)
4090 {
4091 bgp_attr_extra_get (&attr)->mp_nexthop_global_in = bgp_static->igpnexthop;
4092 bgp_attr_extra_get (&attr)->mp_nexthop_len = IPV4_MAX_BYTELEN;
4093 }
4094 }
4095 if(afi == AFI_L2VPN)
4096 {
4097 if (bgp_static->gatewayIp.family == AF_INET)
4098 add.ipv4.s_addr = bgp_static->gatewayIp.u.prefix4.s_addr;
4099 else if (bgp_static->gatewayIp.family == AF_INET6)
4100 memcpy( &(add.ipv6), &(bgp_static->gatewayIp.u.prefix6), sizeof (struct in6_addr));
4101 overlay_index_update(&attr, bgp_static->eth_s_id, &add);
4102 if (bgp_static->encap_tunneltype == BGP_ENCAP_TYPE_VXLAN)
4103 {
4104 struct bgp_encap_type_vxlan bet;
4105 memset(&bet, 0, sizeof(struct bgp_encap_type_vxlan));
4106 bet.vnid = p->u.prefix_evpn.eth_tag;
4107 bgp_encap_type_vxlan_to_tlv(&bet, &attr);
4108 }
4109 if (bgp_static->router_mac)
4110 {
4111 bgp_add_routermac_ecom (&attr, bgp_static->router_mac);
4112 }
4113 }
4114 /* Apply route-map. */
4115 if (bgp_static->rmap.name)
4116 {
4117 struct attr attr_tmp = attr;
4118 struct bgp_info info;
4119 int ret;
4120
4121 info.peer = bgp->peer_self;
4122 info.attr = &attr_tmp;
4123
4124 SET_FLAG (bgp->peer_self->rmap_type, PEER_RMAP_TYPE_NETWORK);
4125
4126 ret = route_map_apply (bgp_static->rmap.map, p, RMAP_BGP, &info);
4127
4128 bgp->peer_self->rmap_type = 0;
4129
4130 if (ret == RMAP_DENYMATCH)
4131 {
4132 /* Free uninterned attribute. */
4133 bgp_attr_flush (&attr_tmp);
4134
4135 /* Unintern original. */
4136 aspath_unintern (&attr.aspath);
4137 bgp_attr_extra_free (&attr);
4138 bgp_static_withdraw_safi (bgp, p, afi, safi, &bgp_static->prd,
4139 bgp_static->tag);
4140 return;
4141 }
4142
4143 attr_new = bgp_attr_intern (&attr_tmp);
4144 }
4145 else
4146 {
4147 attr_new = bgp_attr_intern (&attr);
4148 }
4149
4150 for (ri = rn->info; ri; ri = ri->next)
4151 if (ri->peer == bgp->peer_self && ri->type == ZEBRA_ROUTE_BGP
4152 && ri->sub_type == BGP_ROUTE_STATIC)
4153 break;
4154
4155 if (ri)
4156 {
4157 union gw_addr add;
4158 memset(&add, 0, sizeof(union gw_addr));
4159 if (attrhash_cmp (ri->attr, attr_new) &&
4160 overlay_index_equal(afi, ri, bgp_static->eth_s_id, &add) &&
4161 !CHECK_FLAG(ri->flags, BGP_INFO_REMOVED))
4162 {
4163 bgp_unlock_node (rn);
4164 bgp_attr_unintern (&attr_new);
4165 aspath_unintern (&attr.aspath);
4166 bgp_attr_extra_free (&attr);
4167 return;
4168 }
4169 else
4170 {
4171 /* The attribute is changed. */
4172 bgp_info_set_flag (rn, ri, BGP_INFO_ATTR_CHANGED);
4173
4174 /* Rewrite BGP route information. */
4175 if (CHECK_FLAG(ri->flags, BGP_INFO_REMOVED))
4176 bgp_info_restore(rn, ri);
4177 else
4178 bgp_aggregate_decrement (bgp, p, ri, afi, safi);
4179 bgp_attr_unintern (&ri->attr);
4180 ri->attr = attr_new;
4181 ri->uptime = bgp_clock ();
4182 #if ENABLE_BGP_VNC
4183 if (ri->extra)
4184 label = decode_label (ri->extra->tag);
4185 #endif
4186
4187 /* Process change. */
4188 bgp_aggregate_increment (bgp, p, ri, afi, safi);
4189 bgp_process (bgp, rn, afi, safi);
4190 #if ENABLE_BGP_VNC
4191 rfapiProcessUpdate(ri->peer, NULL, p, &bgp_static->prd,
4192 ri->attr, afi, safi,
4193 ri->type, ri->sub_type, &label);
4194 #endif
4195 bgp_unlock_node (rn);
4196 aspath_unintern (&attr.aspath);
4197 bgp_attr_extra_free (&attr);
4198 return;
4199 }
4200 }
4201
4202
4203 /* Make new BGP info. */
4204 new = info_make(ZEBRA_ROUTE_BGP, BGP_ROUTE_STATIC, 0, bgp->peer_self, attr_new,
4205 rn);
4206 SET_FLAG (new->flags, BGP_INFO_VALID);
4207 new->extra = bgp_info_extra_new();
4208 memcpy (new->extra->tag, bgp_static->tag, 3);
4209 #if ENABLE_BGP_VNC
4210 label = decode_label (bgp_static->tag);
4211 #endif
4212
4213 /* Aggregate address increment. */
4214 bgp_aggregate_increment (bgp, p, new, afi, safi);
4215
4216 /* Register new BGP information. */
4217 bgp_info_add (rn, new);
4218 /* route_node_get lock */
4219 bgp_unlock_node (rn);
4220
4221 /* Process change. */
4222 bgp_process (bgp, rn, afi, safi);
4223
4224 #if ENABLE_BGP_VNC
4225 rfapiProcessUpdate(new->peer, NULL, p, &bgp_static->prd,
4226 new->attr, afi, safi,
4227 new->type, new->sub_type, &label);
4228 #endif
4229
4230 /* Unintern original. */
4231 aspath_unintern (&attr.aspath);
4232 bgp_attr_extra_free (&attr);
4233 }
4234
4235 /* Configure static BGP network. When user don't run zebra, static
4236 route should be installed as valid. */
4237 static int
4238 bgp_static_set (struct vty *vty, const char *ip_str,
4239 afi_t afi, safi_t safi, const char *rmap, int backdoor,
4240 u_int32_t label_index)
4241 {
4242 VTY_DECLVAR_CONTEXT(bgp, bgp);
4243 int ret;
4244 struct prefix p;
4245 struct bgp_static *bgp_static;
4246 struct bgp_node *rn;
4247 u_char need_update = 0;
4248
4249 /* Convert IP prefix string to struct prefix. */
4250 ret = str2prefix (ip_str, &p);
4251 if (! ret)
4252 {
4253 vty_out (vty, "%% Malformed prefix%s", VTY_NEWLINE);
4254 return CMD_WARNING;
4255 }
4256 if (afi == AFI_IP6 && IN6_IS_ADDR_LINKLOCAL (&p.u.prefix6))
4257 {
4258 vty_out (vty, "%% Malformed prefix (link-local address)%s",
4259 VTY_NEWLINE);
4260 return CMD_WARNING;
4261 }
4262
4263 apply_mask (&p);
4264
4265 /* Set BGP static route configuration. */
4266 rn = bgp_node_get (bgp->route[afi][safi], &p);
4267
4268 if (rn->info)
4269 {
4270 /* Configuration change. */
4271 bgp_static = rn->info;
4272
4273 /* Label index cannot be changed. */
4274 if (bgp_static->label_index != label_index)
4275 {
4276 vty_out (vty, "%% Label index cannot be changed%s", VTY_NEWLINE);
4277 return CMD_WARNING;
4278 }
4279
4280 /* Check previous routes are installed into BGP. */
4281 if (bgp_static->valid && bgp_static->backdoor != backdoor)
4282 need_update = 1;
4283
4284 bgp_static->backdoor = backdoor;
4285
4286 if (rmap)
4287 {
4288 if (bgp_static->rmap.name)
4289 XFREE(MTYPE_ROUTE_MAP_NAME, bgp_static->rmap.name);
4290 bgp_static->rmap.name = XSTRDUP(MTYPE_ROUTE_MAP_NAME, rmap);
4291 bgp_static->rmap.map = route_map_lookup_by_name (rmap);
4292 }
4293 else
4294 {
4295 if (bgp_static->rmap.name)
4296 XFREE(MTYPE_ROUTE_MAP_NAME, bgp_static->rmap.name);
4297 bgp_static->rmap.name = NULL;
4298 bgp_static->rmap.map = NULL;
4299 bgp_static->valid = 0;
4300 }
4301 bgp_unlock_node (rn);
4302 }
4303 else
4304 {
4305 /* New configuration. */
4306 bgp_static = bgp_static_new ();
4307 bgp_static->backdoor = backdoor;
4308 bgp_static->valid = 0;
4309 bgp_static->igpmetric = 0;
4310 bgp_static->igpnexthop.s_addr = 0;
4311 bgp_static->label_index = label_index;
4312
4313 if (rmap)
4314 {
4315 if (bgp_static->rmap.name)
4316 XFREE(MTYPE_ROUTE_MAP_NAME, bgp_static->rmap.name);
4317 bgp_static->rmap.name = XSTRDUP(MTYPE_ROUTE_MAP_NAME, rmap);
4318 bgp_static->rmap.map = route_map_lookup_by_name (rmap);
4319 }
4320 rn->info = bgp_static;
4321 }
4322
4323 bgp_static->valid = 1;
4324 if (need_update)
4325 bgp_static_withdraw (bgp, &p, afi, safi);
4326
4327 if (! bgp_static->backdoor)
4328 bgp_static_update (bgp, &p, bgp_static, afi, safi);
4329
4330 return CMD_SUCCESS;
4331 }
4332
4333 /* Configure static BGP network. */
4334 static int
4335 bgp_static_unset (struct vty *vty, const char *ip_str,
4336 afi_t afi, safi_t safi)
4337 {
4338 VTY_DECLVAR_CONTEXT(bgp, bgp);
4339 int ret;
4340 struct prefix p;
4341 struct bgp_static *bgp_static;
4342 struct bgp_node *rn;
4343
4344 /* Convert IP prefix string to struct prefix. */
4345 ret = str2prefix (ip_str, &p);
4346 if (! ret)
4347 {
4348 vty_out (vty, "%% Malformed prefix%s", VTY_NEWLINE);
4349 return CMD_WARNING;
4350 }
4351 if (afi == AFI_IP6 && IN6_IS_ADDR_LINKLOCAL (&p.u.prefix6))
4352 {
4353 vty_out (vty, "%% Malformed prefix (link-local address)%s",
4354 VTY_NEWLINE);
4355 return CMD_WARNING;
4356 }
4357
4358 apply_mask (&p);
4359
4360 rn = bgp_node_lookup (bgp->route[afi][safi], &p);
4361 if (! rn)
4362 {
4363 vty_out (vty, "%% Can't find specified static route configuration.%s",
4364 VTY_NEWLINE);
4365 return CMD_WARNING;
4366 }
4367
4368 bgp_static = rn->info;
4369
4370 /* Update BGP RIB. */
4371 if (! bgp_static->backdoor)
4372 bgp_static_withdraw (bgp, &p, afi, safi);
4373
4374 /* Clear configuration. */
4375 bgp_static_free (bgp_static);
4376 rn->info = NULL;
4377 bgp_unlock_node (rn);
4378 bgp_unlock_node (rn);
4379
4380 return CMD_SUCCESS;
4381 }
4382
4383 void
4384 bgp_static_add (struct bgp *bgp)
4385 {
4386 afi_t afi;
4387 safi_t safi;
4388 struct bgp_node *rn;
4389 struct bgp_node *rm;
4390 struct bgp_table *table;
4391 struct bgp_static *bgp_static;
4392
4393 for (afi = AFI_IP; afi < AFI_MAX; afi++)
4394 for (safi = SAFI_UNICAST; safi < SAFI_MAX; safi++)
4395 for (rn = bgp_table_top (bgp->route[afi][safi]); rn; rn = bgp_route_next (rn))
4396 if (rn->info != NULL)
4397 {
4398 if ((safi == SAFI_MPLS_VPN) || (safi == SAFI_ENCAP) || (safi == SAFI_EVPN))
4399 {
4400 table = rn->info;
4401
4402 for (rm = bgp_table_top (table); rm; rm = bgp_route_next (rm))
4403 {
4404 bgp_static = rm->info;
4405 bgp_static_update_safi (bgp, &rm->p, bgp_static, afi, safi);
4406 }
4407 }
4408 else
4409 {
4410 bgp_static_update (bgp, &rn->p, rn->info, afi, safi);
4411 }
4412 }
4413 }
4414
4415 /* Called from bgp_delete(). Delete all static routes from the BGP
4416 instance. */
4417 void
4418 bgp_static_delete (struct bgp *bgp)
4419 {
4420 afi_t afi;
4421 safi_t safi;
4422 struct bgp_node *rn;
4423 struct bgp_node *rm;
4424 struct bgp_table *table;
4425 struct bgp_static *bgp_static;
4426
4427 for (afi = AFI_IP; afi < AFI_MAX; afi++)
4428 for (safi = SAFI_UNICAST; safi < SAFI_MAX; safi++)
4429 for (rn = bgp_table_top (bgp->route[afi][safi]); rn; rn = bgp_route_next (rn))
4430 if (rn->info != NULL)
4431 {
4432 if ((safi == SAFI_MPLS_VPN) || (safi == SAFI_ENCAP) || (safi == SAFI_EVPN))
4433 {
4434 table = rn->info;
4435
4436 for (rm = bgp_table_top (table); rm; rm = bgp_route_next (rm))
4437 {
4438 bgp_static = rm->info;
4439 bgp_static_withdraw_safi (bgp, &rm->p,
4440 AFI_IP, safi,
4441 (struct prefix_rd *)&rn->p,
4442 bgp_static->tag);
4443 bgp_static_free (bgp_static);
4444 rn->info = NULL;
4445 bgp_unlock_node (rn);
4446 }
4447 }
4448 else
4449 {
4450 bgp_static = rn->info;
4451 bgp_static_withdraw (bgp, &rn->p, afi, safi);
4452 bgp_static_free (bgp_static);
4453 rn->info = NULL;
4454 bgp_unlock_node (rn);
4455 }
4456 }
4457 }
4458
4459 void
4460 bgp_static_redo_import_check (struct bgp *bgp)
4461 {
4462 afi_t afi;
4463 safi_t safi;
4464 struct bgp_node *rn;
4465 struct bgp_node *rm;
4466 struct bgp_table *table;
4467 struct bgp_static *bgp_static;
4468
4469 /* Use this flag to force reprocessing of the route */
4470 bgp_flag_set(bgp, BGP_FLAG_FORCE_STATIC_PROCESS);
4471 for (afi = AFI_IP; afi < AFI_MAX; afi++)
4472 for (safi = SAFI_UNICAST; safi < SAFI_MAX; safi++)
4473 for (rn = bgp_table_top (bgp->route[afi][safi]); rn; rn = bgp_route_next (rn))
4474 if (rn->info != NULL)
4475 {
4476 if ((safi == SAFI_MPLS_VPN) || (safi == SAFI_ENCAP) || (safi == SAFI_EVPN))
4477 {
4478 table = rn->info;
4479
4480 for (rm = bgp_table_top (table); rm; rm = bgp_route_next (rm))
4481 {
4482 bgp_static = rm->info;
4483 bgp_static_update_safi (bgp, &rm->p, bgp_static, afi, safi);
4484 }
4485 }
4486 else
4487 {
4488 bgp_static = rn->info;
4489 bgp_static_update (bgp, &rn->p, bgp_static, afi, safi);
4490 }
4491 }
4492 bgp_flag_unset(bgp, BGP_FLAG_FORCE_STATIC_PROCESS);
4493 }
4494
4495 static void
4496 bgp_purge_af_static_redist_routes (struct bgp *bgp, afi_t afi, safi_t safi)
4497 {
4498 struct bgp_table *table;
4499 struct bgp_node *rn;
4500 struct bgp_info *ri;
4501
4502 table = bgp->rib[afi][safi];
4503 for (rn = bgp_table_top (table); rn; rn = bgp_route_next (rn))
4504 {
4505 for (ri = rn->info; ri; ri = ri->next)
4506 {
4507 if (ri->peer == bgp->peer_self &&
4508 ((ri->type == ZEBRA_ROUTE_BGP &&
4509 ri->sub_type == BGP_ROUTE_STATIC) ||
4510 (ri->type != ZEBRA_ROUTE_BGP &&
4511 ri->sub_type == BGP_ROUTE_REDISTRIBUTE)))
4512 {
4513 bgp_aggregate_decrement (bgp, &rn->p, ri, afi, safi);
4514 bgp_unlink_nexthop(ri);
4515 bgp_info_delete (rn, ri);
4516 bgp_process (bgp, rn, afi, safi);
4517 }
4518 }
4519 }
4520 }
4521
4522 /*
4523 * Purge all networks and redistributed routes from routing table.
4524 * Invoked upon the instance going down.
4525 */
4526 void
4527 bgp_purge_static_redist_routes (struct bgp *bgp)
4528 {
4529 afi_t afi;
4530 safi_t safi;
4531
4532 for (afi = AFI_IP; afi < AFI_MAX; afi++)
4533 for (safi = SAFI_UNICAST; safi < SAFI_MAX; safi++)
4534 bgp_purge_af_static_redist_routes (bgp, afi, safi);
4535 }
4536
4537 /*
4538 * gpz 110624
4539 * Currently this is used to set static routes for VPN and ENCAP.
4540 * I think it can probably be factored with bgp_static_set.
4541 */
4542 int
4543 bgp_static_set_safi (afi_t afi, safi_t safi, struct vty *vty, const char *ip_str,
4544 const char *rd_str, const char *label_str,
4545 const char *rmap_str, int evpn_type, const char *esi, const char *gwip,
4546 const char *ethtag, const char *routermac)
4547 {
4548 VTY_DECLVAR_CONTEXT(bgp, bgp);
4549 int ret;
4550 struct prefix p;
4551 struct prefix_rd prd;
4552 struct bgp_node *prn;
4553 struct bgp_node *rn;
4554 struct bgp_table *table;
4555 struct bgp_static *bgp_static;
4556 u_char tag[3];
4557 struct prefix gw_ip;
4558
4559 /* validate ip prefix */
4560 ret = str2prefix (ip_str, &p);
4561 if (! ret)
4562 {
4563 vty_out (vty, "%% Malformed prefix%s", VTY_NEWLINE);
4564 return CMD_WARNING;
4565 }
4566 apply_mask (&p);
4567 if ( (afi == AFI_L2VPN) &&
4568 (bgp_build_evpn_prefix ( evpn_type, ethtag!=NULL?atol(ethtag):0, &p)))
4569 {
4570 vty_out (vty, "%% L2VPN prefix could not be forged%s", VTY_NEWLINE);
4571 return CMD_WARNING;
4572 }
4573
4574 ret = str2prefix_rd (rd_str, &prd);
4575 if (! ret)
4576 {
4577 vty_out (vty, "%% Malformed rd%s", VTY_NEWLINE);
4578 return CMD_WARNING;
4579 }
4580
4581 if (label_str)
4582 {
4583 unsigned long label_val;
4584 VTY_GET_INTEGER_RANGE("Label/tag", label_val, label_str, 0, 16777215);
4585 encode_label (label_val, tag);
4586 }
4587 else
4588 {
4589 memset (tag, 0, sizeof(tag)); /* empty, not even BoS */
4590 }
4591 if (safi == SAFI_EVPN)
4592 {
4593 if( esi && str2esi (esi, NULL) == 0)
4594 {
4595 vty_out (vty, "%% Malformed ESI%s", VTY_NEWLINE);
4596 return CMD_WARNING;
4597 }
4598 if( routermac && prefix_str2mac (routermac, NULL) == 0)
4599 {
4600 vty_out (vty, "%% Malformed Router MAC%s", VTY_NEWLINE);
4601 return CMD_WARNING;
4602 }
4603 if (gwip)
4604 {
4605 memset (&gw_ip, 0, sizeof (struct prefix));
4606 ret = str2prefix (gwip, &gw_ip);
4607 if (! ret)
4608 {
4609 vty_out (vty, "%% Malformed GatewayIp%s", VTY_NEWLINE);
4610 return CMD_WARNING;
4611 }
4612 if((gw_ip.family == AF_INET && (p.u.prefix_evpn.flags & IP_PREFIX_V6))
4613 || (gw_ip.family == AF_INET6 && (p.u.prefix_evpn.flags & IP_PREFIX_V4)))
4614 {
4615 vty_out (vty, "%% GatewayIp family differs with IP prefix%s", VTY_NEWLINE);
4616 return CMD_WARNING;
4617 }
4618 }
4619 }
4620 prn = bgp_node_get (bgp->route[afi][safi],
4621 (struct prefix *)&prd);
4622 if (prn->info == NULL)
4623 prn->info = bgp_table_init (afi, safi);
4624 else
4625 bgp_unlock_node (prn);
4626 table = prn->info;
4627
4628 rn = bgp_node_get (table, &p);
4629
4630 if (rn->info)
4631 {
4632 vty_out (vty, "%% Same network configuration exists%s", VTY_NEWLINE);
4633 bgp_unlock_node (rn);
4634 }
4635 else
4636 {
4637 /* New configuration. */
4638 bgp_static = bgp_static_new ();
4639 bgp_static->backdoor = 0;
4640 bgp_static->valid = 0;
4641 bgp_static->igpmetric = 0;
4642 bgp_static->igpnexthop.s_addr = 0;
4643 memcpy(bgp_static->tag, tag, 3);
4644 bgp_static->prd = prd;
4645
4646 if (rmap_str)
4647 {
4648 if (bgp_static->rmap.name)
4649 XFREE(MTYPE_ROUTE_MAP_NAME, bgp_static->rmap.name);
4650 bgp_static->rmap.name = XSTRDUP(MTYPE_ROUTE_MAP_NAME, rmap_str);
4651 bgp_static->rmap.map = route_map_lookup_by_name (rmap_str);
4652 }
4653
4654 if (safi == SAFI_EVPN)
4655 {
4656 if(esi)
4657 {
4658 bgp_static->eth_s_id = XCALLOC (MTYPE_ATTR, sizeof(struct eth_segment_id));
4659 str2esi (esi, bgp_static->eth_s_id);
4660 }
4661 if( routermac)
4662 {
4663 bgp_static->router_mac = XCALLOC (MTYPE_ATTR, ETHER_ADDR_LEN+1);
4664 prefix_str2mac (routermac, bgp_static->router_mac);
4665 }
4666 if (gwip)
4667 prefix_copy (&bgp_static->gatewayIp, &gw_ip);
4668 }
4669 rn->info = bgp_static;
4670
4671 bgp_static->valid = 1;
4672 bgp_static_update_safi (bgp, &p, bgp_static, afi, safi);
4673 }
4674
4675 return CMD_SUCCESS;
4676 }
4677
4678 /* Configure static BGP network. */
4679 int
4680 bgp_static_unset_safi(afi_t afi, safi_t safi, struct vty *vty, const char *ip_str,
4681 const char *rd_str, const char *label_str,
4682 int evpn_type, const char *esi, const char *gwip, const char *ethtag)
4683 {
4684 VTY_DECLVAR_CONTEXT(bgp, bgp);
4685 int ret;
4686 struct prefix p;
4687 struct prefix_rd prd;
4688 struct bgp_node *prn;
4689 struct bgp_node *rn;
4690 struct bgp_table *table;
4691 struct bgp_static *bgp_static;
4692 u_char tag[3];
4693
4694 /* Convert IP prefix string to struct prefix. */
4695 ret = str2prefix (ip_str, &p);
4696 if (! ret)
4697 {
4698 vty_out (vty, "%% Malformed prefix%s", VTY_NEWLINE);
4699 return CMD_WARNING;
4700 }
4701 apply_mask (&p);
4702 if ( (afi == AFI_L2VPN) &&
4703 (bgp_build_evpn_prefix ( evpn_type, ethtag!=NULL?atol(ethtag):0, &p)))
4704 {
4705 vty_out (vty, "%% L2VPN prefix could not be forged%s", VTY_NEWLINE);
4706 return CMD_WARNING;
4707 }
4708 ret = str2prefix_rd (rd_str, &prd);
4709 if (! ret)
4710 {
4711 vty_out (vty, "%% Malformed rd%s", VTY_NEWLINE);
4712 return CMD_WARNING;
4713 }
4714
4715 if (label_str)
4716 {
4717 unsigned long label_val;
4718 VTY_GET_INTEGER_RANGE("Label/tag", label_val, label_str, 0, MPLS_LABEL_MAX);
4719 encode_label (label_val, tag);
4720 }
4721 else
4722 {
4723 memset (tag, 0, sizeof(tag)); /* empty, not even BoS */
4724 }
4725
4726 prn = bgp_node_get (bgp->route[afi][safi],
4727 (struct prefix *)&prd);
4728 if (prn->info == NULL)
4729 prn->info = bgp_table_init (afi, safi);
4730 else
4731 bgp_unlock_node (prn);
4732 table = prn->info;
4733
4734 rn = bgp_node_lookup (table, &p);
4735
4736 if (rn)
4737 {
4738 bgp_static_withdraw_safi (bgp, &p, afi, safi, &prd, tag);
4739
4740 bgp_static = rn->info;
4741 bgp_static_free (bgp_static);
4742 rn->info = NULL;
4743 bgp_unlock_node (rn);
4744 bgp_unlock_node (rn);
4745 }
4746 else
4747 vty_out (vty, "%% Can't find the route%s", VTY_NEWLINE);
4748
4749 return CMD_SUCCESS;
4750 }
4751
4752 static int
4753 bgp_table_map_set (struct vty *vty, afi_t afi, safi_t safi,
4754 const char *rmap_name)
4755 {
4756 VTY_DECLVAR_CONTEXT(bgp, bgp);
4757 struct bgp_rmap *rmap;
4758
4759 rmap = &bgp->table_map[afi][safi];
4760 if (rmap_name)
4761 {
4762 if (rmap->name)
4763 XFREE(MTYPE_ROUTE_MAP_NAME, rmap->name);
4764 rmap->name = XSTRDUP(MTYPE_ROUTE_MAP_NAME, rmap_name);
4765 rmap->map = route_map_lookup_by_name (rmap_name);
4766 }
4767 else
4768 {
4769 if (rmap->name)
4770 XFREE(MTYPE_ROUTE_MAP_NAME, rmap->name);
4771 rmap->name = NULL;
4772 rmap->map = NULL;
4773 }
4774
4775 bgp_zebra_announce_table(bgp, afi, safi);
4776
4777 return CMD_SUCCESS;
4778 }
4779
4780 static int
4781 bgp_table_map_unset (struct vty *vty, afi_t afi, safi_t safi,
4782 const char *rmap_name)
4783 {
4784 VTY_DECLVAR_CONTEXT(bgp, bgp);
4785 struct bgp_rmap *rmap;
4786
4787 rmap = &bgp->table_map[afi][safi];
4788 if (rmap->name)
4789 XFREE(MTYPE_ROUTE_MAP_NAME, rmap->name);
4790 rmap->name = NULL;
4791 rmap->map = NULL;
4792
4793 bgp_zebra_announce_table(bgp, afi, safi);
4794
4795 return CMD_SUCCESS;
4796 }
4797
4798 int
4799 bgp_config_write_table_map (struct vty *vty, struct bgp *bgp, afi_t afi,
4800 safi_t safi, int *write)
4801 {
4802 if (bgp->table_map[afi][safi].name)
4803 {
4804 bgp_config_write_family_header (vty, afi, safi, write);
4805 vty_out (vty, " table-map %s%s",
4806 bgp->table_map[afi][safi].name, VTY_NEWLINE);
4807 }
4808
4809 return 0;
4810 }
4811
4812 DEFUN (bgp_table_map,
4813 bgp_table_map_cmd,
4814 "table-map WORD",
4815 "BGP table to RIB route download filter\n"
4816 "Name of the route map\n")
4817 {
4818 int idx_word = 1;
4819 return bgp_table_map_set (vty,
4820 bgp_node_afi (vty), bgp_node_safi (vty), argv[idx_word]->arg);
4821 }
4822 DEFUN (no_bgp_table_map,
4823 no_bgp_table_map_cmd,
4824 "no table-map WORD",
4825 NO_STR
4826 "BGP table to RIB route download filter\n"
4827 "Name of the route map\n")
4828 {
4829 int idx_word = 2;
4830 return bgp_table_map_unset (vty,
4831 bgp_node_afi (vty), bgp_node_safi (vty), argv[idx_word]->arg);
4832 }
4833
4834 DEFUN (bgp_network,
4835 bgp_network_cmd,
4836 "network A.B.C.D/M",
4837 "Specify a network to announce via BGP\n"
4838 "IPv4 prefix\n")
4839 {
4840 int idx_ipv4_prefixlen = 1;
4841 return bgp_static_set (vty, argv[idx_ipv4_prefixlen]->arg,
4842 AFI_IP, bgp_node_safi (vty), NULL, 0,
4843 BGP_INVALID_LABEL_INDEX);
4844 }
4845
4846 DEFUN (bgp_network_route_map,
4847 bgp_network_route_map_cmd,
4848 "network A.B.C.D/M route-map WORD",
4849 "Specify a network to announce via BGP\n"
4850 "IPv4 prefix\n"
4851 "Route-map to modify the attributes\n"
4852 "Name of the route map\n")
4853 {
4854 int idx_ipv4_prefixlen = 1;
4855 int idx_word = 3;
4856 return bgp_static_set (vty, argv[idx_ipv4_prefixlen]->arg,
4857 AFI_IP, bgp_node_safi (vty), argv[idx_word]->arg, 0,
4858 BGP_INVALID_LABEL_INDEX);
4859 }
4860
4861 DEFUN (bgp_network_backdoor,
4862 bgp_network_backdoor_cmd,
4863 "network A.B.C.D/M backdoor",
4864 "Specify a network to announce via BGP\n"
4865 "IPv4 prefix\n"
4866 "Specify a BGP backdoor route\n")
4867 {
4868 int idx_ipv4_prefixlen = 1;
4869 return bgp_static_set (vty, argv[idx_ipv4_prefixlen]->arg, AFI_IP, SAFI_UNICAST,
4870 NULL, 1, BGP_INVALID_LABEL_INDEX);
4871 }
4872
4873 DEFUN (bgp_network_mask,
4874 bgp_network_mask_cmd,
4875 "network A.B.C.D mask A.B.C.D",
4876 "Specify a network to announce via BGP\n"
4877 "Network number\n"
4878 "Network mask\n"
4879 "Network mask\n")
4880 {
4881 int idx_ipv4 = 1;
4882 int idx_ipv4_2 = 3;
4883 int ret;
4884 char prefix_str[BUFSIZ];
4885
4886 ret = netmask_str2prefix_str (argv[idx_ipv4]->arg, argv[idx_ipv4_2]->arg, prefix_str);
4887 if (! ret)
4888 {
4889 vty_out (vty, "%% Inconsistent address and mask%s", VTY_NEWLINE);
4890 return CMD_WARNING;
4891 }
4892
4893 return bgp_static_set (vty, prefix_str,
4894 AFI_IP, bgp_node_safi (vty), NULL, 0, BGP_INVALID_LABEL_INDEX);
4895 }
4896
4897 DEFUN (bgp_network_mask_route_map,
4898 bgp_network_mask_route_map_cmd,
4899 "network A.B.C.D mask A.B.C.D route-map WORD",
4900 "Specify a network to announce via BGP\n"
4901 "Network number\n"
4902 "Network mask\n"
4903 "Network mask\n"
4904 "Route-map to modify the attributes\n"
4905 "Name of the route map\n")
4906 {
4907 int idx_ipv4 = 1;
4908 int idx_ipv4_2 = 3;
4909 int idx_word = 5;
4910 int ret;
4911 char prefix_str[BUFSIZ];
4912
4913 ret = netmask_str2prefix_str (argv[idx_ipv4]->arg, argv[idx_ipv4_2]->arg, prefix_str);
4914 if (! ret)
4915 {
4916 vty_out (vty, "%% Inconsistent address and mask%s", VTY_NEWLINE);
4917 return CMD_WARNING;
4918 }
4919
4920 return bgp_static_set (vty, prefix_str,
4921 AFI_IP, bgp_node_safi (vty), argv[idx_word]->arg, 0, BGP_INVALID_LABEL_INDEX);
4922 }
4923
4924 DEFUN (bgp_network_mask_backdoor,
4925 bgp_network_mask_backdoor_cmd,
4926 "network A.B.C.D mask A.B.C.D backdoor",
4927 "Specify a network to announce via BGP\n"
4928 "Network number\n"
4929 "Network mask\n"
4930 "Network mask\n"
4931 "Specify a BGP backdoor route\n")
4932 {
4933 int idx_ipv4 = 1;
4934 int idx_ipv4_2 = 3;
4935 int ret;
4936 char prefix_str[BUFSIZ];
4937
4938 ret = netmask_str2prefix_str (argv[idx_ipv4]->arg, argv[idx_ipv4_2]->arg, prefix_str);
4939 if (! ret)
4940 {
4941 vty_out (vty, "%% Inconsistent address and mask%s", VTY_NEWLINE);
4942 return CMD_WARNING;
4943 }
4944
4945 return bgp_static_set (vty, prefix_str, AFI_IP, SAFI_UNICAST,
4946 NULL, 1,
4947 BGP_INVALID_LABEL_INDEX);
4948 }
4949
4950 DEFUN (bgp_network_mask_natural,
4951 bgp_network_mask_natural_cmd,
4952 "network A.B.C.D",
4953 "Specify a network to announce via BGP\n"
4954 "Network number\n")
4955 {
4956 int idx_ipv4 = 1;
4957 int ret;
4958 char prefix_str[BUFSIZ];
4959
4960 ret = netmask_str2prefix_str (argv[idx_ipv4]->arg, NULL, prefix_str);
4961 if (! ret)
4962 {
4963 vty_out (vty, "%% Inconsistent address and mask%s", VTY_NEWLINE);
4964 return CMD_WARNING;
4965 }
4966
4967 return bgp_static_set (vty, prefix_str,
4968 AFI_IP, bgp_node_safi (vty), NULL, 0,
4969 BGP_INVALID_LABEL_INDEX);
4970 }
4971
4972 DEFUN (bgp_network_mask_natural_route_map,
4973 bgp_network_mask_natural_route_map_cmd,
4974 "network A.B.C.D route-map WORD",
4975 "Specify a network to announce via BGP\n"
4976 "Network number\n"
4977 "Route-map to modify the attributes\n"
4978 "Name of the route map\n")
4979 {
4980 int idx_ipv4 = 1;
4981 int idx_word = 3;
4982 int ret;
4983 char prefix_str[BUFSIZ];
4984
4985 ret = netmask_str2prefix_str (argv[idx_ipv4]->arg, NULL, prefix_str);
4986 if (! ret)
4987 {
4988 vty_out (vty, "%% Inconsistent address and mask%s", VTY_NEWLINE);
4989 return CMD_WARNING;
4990 }
4991
4992 return bgp_static_set (vty, prefix_str,
4993 AFI_IP, bgp_node_safi (vty), argv[idx_word]->arg, 0,
4994 BGP_INVALID_LABEL_INDEX);
4995 }
4996
4997 DEFUN (bgp_network_mask_natural_backdoor,
4998 bgp_network_mask_natural_backdoor_cmd,
4999 "network A.B.C.D backdoor",
5000 "Specify a network to announce via BGP\n"
5001 "Network number\n"
5002 "Specify a BGP backdoor route\n")
5003 {
5004 int idx_ipv4 = 1;
5005 int ret;
5006 char prefix_str[BUFSIZ];
5007
5008 ret = netmask_str2prefix_str (argv[idx_ipv4]->arg, NULL, prefix_str);
5009 if (! ret)
5010 {
5011 vty_out (vty, "%% Inconsistent address and mask%s", VTY_NEWLINE);
5012 return CMD_WARNING;
5013 }
5014
5015 return bgp_static_set (vty, prefix_str, AFI_IP, SAFI_UNICAST,
5016 NULL, 1, BGP_INVALID_LABEL_INDEX);
5017 }
5018
5019 DEFUN (bgp_network_label_index,
5020 bgp_network_label_index_cmd,
5021 "network A.B.C.D/M label-index (0-4294967294)",
5022 "Specify a network to announce via BGP\n"
5023 "IP prefix <network>/<length>, e.g., 35.0.0.0/8\n"
5024 "Label index to associate with the prefix\n"
5025 "Label index value\n")
5026 {
5027 u_int32_t label_index;
5028
5029 VTY_GET_INTEGER ("label-index", label_index, argv[3]->arg);
5030 return bgp_static_set (vty, argv[1]->arg,
5031 AFI_IP, bgp_node_safi (vty), NULL, 0, label_index);
5032 }
5033
5034 DEFUN (bgp_network_label_index_route_map,
5035 bgp_network_label_index_route_map_cmd,
5036 "network A.B.C.D/M label-index (0-4294967294) route-map WORD",
5037 "Specify a network to announce via BGP\n"
5038 "IP prefix\n"
5039 "Label index to associate with the prefix\n"
5040 "Label index value\n"
5041 "Route-map to modify the attributes\n"
5042 "Name of the route map\n")
5043 {
5044 u_int32_t label_index;
5045
5046 VTY_GET_INTEGER ("label-index", label_index, argv[3]->arg);
5047 return bgp_static_set (vty, argv[1]->arg,
5048 AFI_IP, bgp_node_safi (vty), argv[5]->arg, 0, label_index);
5049 }
5050
5051 DEFUN (no_bgp_network,
5052 no_bgp_network_cmd,
5053 "no network A.B.C.D/M [<backdoor|route-map WORD>]",
5054 NO_STR
5055 "Specify a network to announce via BGP\n"
5056 "IPv4 prefix\n"
5057 "Specify a BGP backdoor route\n"
5058 "Route-map to modify the attributes\n"
5059 "Name of the route map\n")
5060 {
5061 int idx_ipv4_prefixlen = 2;
5062 return bgp_static_unset (vty, argv[idx_ipv4_prefixlen]->arg, AFI_IP,
5063 bgp_node_safi (vty));
5064 }
5065
5066 DEFUN (no_bgp_network_mask,
5067 no_bgp_network_mask_cmd,
5068 "no network A.B.C.D mask A.B.C.D [<backdoor|route-map WORD>]",
5069 NO_STR
5070 "Specify a network to announce via BGP\n"
5071 "Network number\n"
5072 "Network mask\n"
5073 "Network mask\n"
5074 "Specify a BGP backdoor route\n"
5075 "Route-map to modify the attributes\n"
5076 "Name of the route map\n")
5077 {
5078 int idx_ipv4 = 2;
5079 int idx_ipv4_2 = 4;
5080 int ret;
5081 char prefix_str[BUFSIZ];
5082
5083 ret = netmask_str2prefix_str (argv[idx_ipv4]->arg, argv[idx_ipv4_2]->arg, prefix_str);
5084 if (! ret)
5085 {
5086 vty_out (vty, "%% Inconsistent address and mask%s", VTY_NEWLINE);
5087 return CMD_WARNING;
5088 }
5089
5090 return bgp_static_unset (vty, prefix_str, AFI_IP,
5091 bgp_node_safi (vty));
5092 }
5093
5094 DEFUN (no_bgp_network_mask_natural,
5095 no_bgp_network_mask_natural_cmd,
5096 "no network A.B.C.D [<backdoor|route-map WORD>]",
5097 NO_STR
5098 "Specify a network to announce via BGP\n"
5099 "Network number\n"
5100 "Specify a BGP backdoor route\n"
5101 "Route-map to modify the attributes\n"
5102 "Name of the route map\n")
5103 {
5104 int idx_ipv4 = 2;
5105 int ret;
5106 char prefix_str[BUFSIZ];
5107
5108 ret = netmask_str2prefix_str (argv[idx_ipv4]->arg, NULL, prefix_str);
5109 if (! ret)
5110 {
5111 vty_out (vty, "%% Inconsistent address and mask%s", VTY_NEWLINE);
5112 return CMD_WARNING;
5113 }
5114
5115 return bgp_static_unset (vty, prefix_str, AFI_IP,
5116 bgp_node_safi (vty));
5117 }
5118
5119 ALIAS (no_bgp_network,
5120 no_bgp_network_label_index_cmd,
5121 "no network A.B.C.D/M label-index (0-4294967294)",
5122 NO_STR
5123 "Specify a network to announce via BGP\n"
5124 "IP prefix <network>/<length>, e.g., 35.0.0.0/8\n"
5125 "Label index to associate with the prefix\n"
5126 "Label index value\n")
5127
5128 ALIAS (no_bgp_network,
5129 no_bgp_network_label_index_route_map_cmd,
5130 "no network A.B.C.D/M label-index (0-4294967294) route-map WORD",
5131 NO_STR
5132 "Specify a network to announce via BGP\n"
5133 "IP prefix\n"
5134 "Label index to associate with the prefix\n"
5135 "Label index value\n"
5136 "Route-map to modify the attributes\n"
5137 "Name of the route map\n")
5138
5139 DEFUN (ipv6_bgp_network,
5140 ipv6_bgp_network_cmd,
5141 "network X:X::X:X/M",
5142 "Specify a network to announce via BGP\n"
5143 "IPv6 prefix\n")
5144 {
5145 int idx_ipv6_prefixlen = 1;
5146 return bgp_static_set (vty, argv[idx_ipv6_prefixlen]->arg, AFI_IP6, bgp_node_safi(vty),
5147 NULL, 0,
5148 BGP_INVALID_LABEL_INDEX);
5149 }
5150
5151 DEFUN (ipv6_bgp_network_route_map,
5152 ipv6_bgp_network_route_map_cmd,
5153 "network X:X::X:X/M route-map WORD",
5154 "Specify a network to announce via BGP\n"
5155 "IPv6 prefix\n"
5156 "Route-map to modify the attributes\n"
5157 "Name of the route map\n")
5158 {
5159 int idx_ipv6_prefixlen = 1;
5160 int idx_word = 3;
5161 return bgp_static_set (vty, argv[idx_ipv6_prefixlen]->arg, AFI_IP6,
5162 bgp_node_safi (vty), argv[idx_word]->arg, 0,
5163 BGP_INVALID_LABEL_INDEX);
5164 }
5165
5166 DEFUN (ipv6_bgp_network_label_index,
5167 ipv6_bgp_network_label_index_cmd,
5168 "network X:X::X:X/M label-index (0-4294967294)",
5169 "Specify a network to announce via BGP\n"
5170 "IPv6 prefix <network>/<length>\n"
5171 "Label index to associate with the prefix\n"
5172 "Label index value\n")
5173 {
5174 u_int32_t label_index;
5175
5176 VTY_GET_INTEGER ("label-index", label_index, argv[3]->arg);
5177 return bgp_static_set (vty, argv[1]->arg,
5178 AFI_IP6, bgp_node_safi (vty), NULL, 0, label_index);
5179 }
5180
5181 DEFUN (ipv6_bgp_network_label_index_route_map,
5182 ipv6_bgp_network_label_index_route_map_cmd,
5183 "network X:X::X:X/M label-index (0-4294967294) route-map WORD",
5184 "Specify a network to announce via BGP\n"
5185 "IPv6 prefix\n"
5186 "Label index to associate with the prefix\n"
5187 "Label index value\n"
5188 "Route-map to modify the attributes\n"
5189 "Name of the route map\n")
5190 {
5191 u_int32_t label_index;
5192
5193 VTY_GET_INTEGER ("label-index", label_index, argv[3]->arg);
5194 return bgp_static_set (vty, argv[1]->arg,
5195 AFI_IP6, bgp_node_safi (vty), argv[5]->arg, 0, label_index);
5196 }
5197
5198 DEFUN (no_ipv6_bgp_network,
5199 no_ipv6_bgp_network_cmd,
5200 "no network X:X::X:X/M [route-map WORD]",
5201 NO_STR
5202 "Specify a network to announce via BGP\n"
5203 "IPv6 prefix\n"
5204 "Route-map to modify the attributes\n"
5205 "Name of the route map\n")
5206 {
5207 int idx_ipv6_prefixlen = 2;
5208 return bgp_static_unset (vty, argv[idx_ipv6_prefixlen]->arg, AFI_IP6, bgp_node_safi(vty));
5209 }
5210
5211 ALIAS (no_ipv6_bgp_network,
5212 no_ipv6_bgp_network_label_index_cmd,
5213 "no network X:X::X:X/M label-index (0-4294967294)",
5214 NO_STR
5215 "Specify a network to announce via BGP\n"
5216 "IPv6 prefix <network>/<length>\n"
5217 "Label index to associate with the prefix\n"
5218 "Label index value\n")
5219
5220 ALIAS (no_ipv6_bgp_network,
5221 no_ipv6_bgp_network_label_index_route_map_cmd,
5222 "no network X:X::X:X/M label-index (0-4294967294) route-map WORD",
5223 NO_STR
5224 "Specify a network to announce via BGP\n"
5225 "IPv6 prefix\n"
5226 "Label index to associate with the prefix\n"
5227 "Label index value\n"
5228 "Route-map to modify the attributes\n"
5229 "Name of the route map\n")
5230
5231 /* Aggreagete address:
5232
5233 advertise-map Set condition to advertise attribute
5234 as-set Generate AS set path information
5235 attribute-map Set attributes of aggregate
5236 route-map Set parameters of aggregate
5237 summary-only Filter more specific routes from updates
5238 suppress-map Conditionally filter more specific routes from updates
5239 <cr>
5240 */
5241 struct bgp_aggregate
5242 {
5243 /* Summary-only flag. */
5244 u_char summary_only;
5245
5246 /* AS set generation. */
5247 u_char as_set;
5248
5249 /* Route-map for aggregated route. */
5250 struct route_map *map;
5251
5252 /* Suppress-count. */
5253 unsigned long count;
5254
5255 /* SAFI configuration. */
5256 safi_t safi;
5257 };
5258
5259 static struct bgp_aggregate *
5260 bgp_aggregate_new (void)
5261 {
5262 return XCALLOC (MTYPE_BGP_AGGREGATE, sizeof (struct bgp_aggregate));
5263 }
5264
5265 static void
5266 bgp_aggregate_free (struct bgp_aggregate *aggregate)
5267 {
5268 XFREE (MTYPE_BGP_AGGREGATE, aggregate);
5269 }
5270
5271 /* Update an aggregate as routes are added/removed from the BGP table */
5272 static void
5273 bgp_aggregate_route (struct bgp *bgp, struct prefix *p, struct bgp_info *rinew,
5274 afi_t afi, safi_t safi, struct bgp_info *del,
5275 struct bgp_aggregate *aggregate)
5276 {
5277 struct bgp_table *table;
5278 struct bgp_node *top;
5279 struct bgp_node *rn;
5280 u_char origin;
5281 struct aspath *aspath = NULL;
5282 struct aspath *asmerge = NULL;
5283 struct community *community = NULL;
5284 struct community *commerge = NULL;
5285 #if defined(AGGREGATE_NEXTHOP_CHECK)
5286 struct in_addr nexthop;
5287 u_int32_t med = 0;
5288 #endif
5289 struct bgp_info *ri;
5290 struct bgp_info *new;
5291 int first = 1;
5292 unsigned long match = 0;
5293 u_char atomic_aggregate = 0;
5294
5295 /* Record adding route's nexthop and med. */
5296 if (rinew)
5297 {
5298 #if defined(AGGREGATE_NEXTHOP_CHECK)
5299 nexthop = rinew->attr->nexthop;
5300 med = rinew->attr->med;
5301 #endif
5302 }
5303
5304 /* ORIGIN attribute: If at least one route among routes that are
5305 aggregated has ORIGIN with the value INCOMPLETE, then the
5306 aggregated route must have the ORIGIN attribute with the value
5307 INCOMPLETE. Otherwise, if at least one route among routes that
5308 are aggregated has ORIGIN with the value EGP, then the aggregated
5309 route must have the origin attribute with the value EGP. In all
5310 other case the value of the ORIGIN attribute of the aggregated
5311 route is INTERNAL. */
5312 origin = BGP_ORIGIN_IGP;
5313
5314 table = bgp->rib[afi][safi];
5315
5316 top = bgp_node_get (table, p);
5317 for (rn = bgp_node_get (table, p); rn; rn = bgp_route_next_until (rn, top))
5318 if (rn->p.prefixlen > p->prefixlen)
5319 {
5320 match = 0;
5321
5322 for (ri = rn->info; ri; ri = ri->next)
5323 {
5324 if (BGP_INFO_HOLDDOWN (ri))
5325 continue;
5326
5327 if (del && ri == del)
5328 continue;
5329
5330 if (! rinew && first)
5331 {
5332 #if defined(AGGREGATE_NEXTHOP_CHECK)
5333 nexthop = ri->attr->nexthop;
5334 med = ri->attr->med;
5335 #endif
5336 first = 0;
5337 }
5338
5339 #ifdef AGGREGATE_NEXTHOP_CHECK
5340 if (! IPV4_ADDR_SAME (&ri->attr->nexthop, &nexthop)
5341 || ri->attr->med != med)
5342 {
5343 if (aspath)
5344 aspath_free (aspath);
5345 if (community)
5346 community_free (community);
5347 bgp_unlock_node (rn);
5348 bgp_unlock_node (top);
5349 return;
5350 }
5351 #endif /* AGGREGATE_NEXTHOP_CHECK */
5352
5353 if (ri->attr->flag & ATTR_FLAG_BIT(BGP_ATTR_ATOMIC_AGGREGATE))
5354 atomic_aggregate = 1;
5355
5356 if (ri->sub_type != BGP_ROUTE_AGGREGATE)
5357 {
5358 if (aggregate->summary_only)
5359 {
5360 (bgp_info_extra_get (ri))->suppress++;
5361 bgp_info_set_flag (rn, ri, BGP_INFO_ATTR_CHANGED);
5362 match++;
5363 }
5364
5365 aggregate->count++;
5366
5367 if (origin < ri->attr->origin)
5368 origin = ri->attr->origin;
5369
5370 if (aggregate->as_set)
5371 {
5372 if (aspath)
5373 {
5374 asmerge = aspath_aggregate (aspath, ri->attr->aspath);
5375 aspath_free (aspath);
5376 aspath = asmerge;
5377 }
5378 else
5379 aspath = aspath_dup (ri->attr->aspath);
5380
5381 if (ri->attr->community)
5382 {
5383 if (community)
5384 {
5385 commerge = community_merge (community,
5386 ri->attr->community);
5387 community = community_uniq_sort (commerge);
5388 community_free (commerge);
5389 }
5390 else
5391 community = community_dup (ri->attr->community);
5392 }
5393 }
5394 }
5395 }
5396 if (match)
5397 bgp_process (bgp, rn, afi, safi);
5398 }
5399 bgp_unlock_node (top);
5400
5401 if (rinew)
5402 {
5403 aggregate->count++;
5404
5405 if (aggregate->summary_only)
5406 (bgp_info_extra_get (rinew))->suppress++;
5407
5408 if (origin < rinew->attr->origin)
5409 origin = rinew->attr->origin;
5410
5411 if (aggregate->as_set)
5412 {
5413 if (aspath)
5414 {
5415 asmerge = aspath_aggregate (aspath, rinew->attr->aspath);
5416 aspath_free (aspath);
5417 aspath = asmerge;
5418 }
5419 else
5420 aspath = aspath_dup (rinew->attr->aspath);
5421
5422 if (rinew->attr->community)
5423 {
5424 if (community)
5425 {
5426 commerge = community_merge (community,
5427 rinew->attr->community);
5428 community = community_uniq_sort (commerge);
5429 community_free (commerge);
5430 }
5431 else
5432 community = community_dup (rinew->attr->community);
5433 }
5434 }
5435 }
5436
5437 if (aggregate->count > 0)
5438 {
5439 rn = bgp_node_get (table, p);
5440 new = info_make(ZEBRA_ROUTE_BGP, BGP_ROUTE_AGGREGATE, 0, bgp->peer_self,
5441 bgp_attr_aggregate_intern(bgp, origin, aspath, community,
5442 aggregate->as_set,
5443 atomic_aggregate), rn);
5444 SET_FLAG (new->flags, BGP_INFO_VALID);
5445
5446 bgp_info_add (rn, new);
5447 bgp_unlock_node (rn);
5448 bgp_process (bgp, rn, afi, safi);
5449 }
5450 else
5451 {
5452 if (aspath)
5453 aspath_free (aspath);
5454 if (community)
5455 community_free (community);
5456 }
5457 }
5458
5459 void bgp_aggregate_delete (struct bgp *, struct prefix *, afi_t, safi_t,
5460 struct bgp_aggregate *);
5461
5462 void
5463 bgp_aggregate_increment (struct bgp *bgp, struct prefix *p,
5464 struct bgp_info *ri, afi_t afi, safi_t safi)
5465 {
5466 struct bgp_node *child;
5467 struct bgp_node *rn;
5468 struct bgp_aggregate *aggregate;
5469 struct bgp_table *table;
5470
5471 /* MPLS-VPN aggregation is not yet supported. */
5472 if ((safi == SAFI_MPLS_VPN) || (safi == SAFI_ENCAP) || (safi == SAFI_EVPN))
5473 return;
5474
5475 table = bgp->aggregate[afi][safi];
5476
5477 /* No aggregates configured. */
5478 if (bgp_table_top_nolock (table) == NULL)
5479 return;
5480
5481 if (p->prefixlen == 0)
5482 return;
5483
5484 if (BGP_INFO_HOLDDOWN (ri))
5485 return;
5486
5487 child = bgp_node_get (table, p);
5488
5489 /* Aggregate address configuration check. */
5490 for (rn = child; rn; rn = bgp_node_parent_nolock (rn))
5491 if ((aggregate = rn->info) != NULL && rn->p.prefixlen < p->prefixlen)
5492 {
5493 bgp_aggregate_delete (bgp, &rn->p, afi, safi, aggregate);
5494 bgp_aggregate_route (bgp, &rn->p, ri, afi, safi, NULL, aggregate);
5495 }
5496 bgp_unlock_node (child);
5497 }
5498
5499 void
5500 bgp_aggregate_decrement (struct bgp *bgp, struct prefix *p,
5501 struct bgp_info *del, afi_t afi, safi_t safi)
5502 {
5503 struct bgp_node *child;
5504 struct bgp_node *rn;
5505 struct bgp_aggregate *aggregate;
5506 struct bgp_table *table;
5507
5508 /* MPLS-VPN aggregation is not yet supported. */
5509 if ((safi == SAFI_MPLS_VPN) || (safi == SAFI_ENCAP) || (safi == SAFI_EVPN))
5510 return;
5511
5512 table = bgp->aggregate[afi][safi];
5513
5514 /* No aggregates configured. */
5515 if (bgp_table_top_nolock (table) == NULL)
5516 return;
5517
5518 if (p->prefixlen == 0)
5519 return;
5520
5521 child = bgp_node_get (table, p);
5522
5523 /* Aggregate address configuration check. */
5524 for (rn = child; rn; rn = bgp_node_parent_nolock (rn))
5525 if ((aggregate = rn->info) != NULL && rn->p.prefixlen < p->prefixlen)
5526 {
5527 bgp_aggregate_delete (bgp, &rn->p, afi, safi, aggregate);
5528 bgp_aggregate_route (bgp, &rn->p, NULL, afi, safi, del, aggregate);
5529 }
5530 bgp_unlock_node (child);
5531 }
5532
5533 /* Called via bgp_aggregate_set when the user configures aggregate-address */
5534 static void
5535 bgp_aggregate_add (struct bgp *bgp, struct prefix *p, afi_t afi, safi_t safi,
5536 struct bgp_aggregate *aggregate)
5537 {
5538 struct bgp_table *table;
5539 struct bgp_node *top;
5540 struct bgp_node *rn;
5541 struct bgp_info *new;
5542 struct bgp_info *ri;
5543 unsigned long match;
5544 u_char origin = BGP_ORIGIN_IGP;
5545 struct aspath *aspath = NULL;
5546 struct aspath *asmerge = NULL;
5547 struct community *community = NULL;
5548 struct community *commerge = NULL;
5549 u_char atomic_aggregate = 0;
5550
5551 table = bgp->rib[afi][safi];
5552
5553 /* Sanity check. */
5554 if (afi == AFI_IP && p->prefixlen == IPV4_MAX_BITLEN)
5555 return;
5556 if (afi == AFI_IP6 && p->prefixlen == IPV6_MAX_BITLEN)
5557 return;
5558
5559 /* If routes exists below this node, generate aggregate routes. */
5560 top = bgp_node_get (table, p);
5561 for (rn = bgp_node_get (table, p); rn; rn = bgp_route_next_until (rn, top))
5562 if (rn->p.prefixlen > p->prefixlen)
5563 {
5564 match = 0;
5565
5566 for (ri = rn->info; ri; ri = ri->next)
5567 {
5568 if (BGP_INFO_HOLDDOWN (ri))
5569 continue;
5570
5571 if (ri->attr->flag & ATTR_FLAG_BIT(BGP_ATTR_ATOMIC_AGGREGATE))
5572 atomic_aggregate = 1;
5573
5574 if (ri->sub_type != BGP_ROUTE_AGGREGATE)
5575 {
5576 /* summary-only aggregate route suppress aggregated
5577 route announcement. */
5578 if (aggregate->summary_only)
5579 {
5580 (bgp_info_extra_get (ri))->suppress++;
5581 bgp_info_set_flag (rn, ri, BGP_INFO_ATTR_CHANGED);
5582 match++;
5583 }
5584
5585 /* If at least one route among routes that are aggregated has
5586 * ORIGIN with the value INCOMPLETE, then the aggregated route
5587 * MUST have the ORIGIN attribute with the value INCOMPLETE.
5588 * Otherwise, if at least one route among routes that are
5589 * aggregated has ORIGIN with the value EGP, then the aggregated
5590 * route MUST have the ORIGIN attribute with the value EGP.
5591 */
5592 if (origin < ri->attr->origin)
5593 origin = ri->attr->origin;
5594
5595 /* as-set aggregate route generate origin, as path,
5596 community aggregation. */
5597 if (aggregate->as_set)
5598 {
5599 if (aspath)
5600 {
5601 asmerge = aspath_aggregate (aspath, ri->attr->aspath);
5602 aspath_free (aspath);
5603 aspath = asmerge;
5604 }
5605 else
5606 aspath = aspath_dup (ri->attr->aspath);
5607
5608 if (ri->attr->community)
5609 {
5610 if (community)
5611 {
5612 commerge = community_merge (community,
5613 ri->attr->community);
5614 community = community_uniq_sort (commerge);
5615 community_free (commerge);
5616 }
5617 else
5618 community = community_dup (ri->attr->community);
5619 }
5620 }
5621 aggregate->count++;
5622 }
5623 }
5624
5625 /* If this node is suppressed, process the change. */
5626 if (match)
5627 bgp_process (bgp, rn, afi, safi);
5628 }
5629 bgp_unlock_node (top);
5630
5631 /* Add aggregate route to BGP table. */
5632 if (aggregate->count)
5633 {
5634 rn = bgp_node_get (table, p);
5635 new = info_make(ZEBRA_ROUTE_BGP, BGP_ROUTE_AGGREGATE, 0, bgp->peer_self,
5636 bgp_attr_aggregate_intern(bgp, origin, aspath, community,
5637 aggregate->as_set,
5638 atomic_aggregate), rn);
5639 SET_FLAG (new->flags, BGP_INFO_VALID);
5640
5641 bgp_info_add (rn, new);
5642 bgp_unlock_node (rn);
5643
5644 /* Process change. */
5645 bgp_process (bgp, rn, afi, safi);
5646 }
5647 else
5648 {
5649 if (aspath)
5650 aspath_free (aspath);
5651 if (community)
5652 community_free (community);
5653 }
5654 }
5655
5656 void
5657 bgp_aggregate_delete (struct bgp *bgp, struct prefix *p, afi_t afi,
5658 safi_t safi, struct bgp_aggregate *aggregate)
5659 {
5660 struct bgp_table *table;
5661 struct bgp_node *top;
5662 struct bgp_node *rn;
5663 struct bgp_info *ri;
5664 unsigned long match;
5665
5666 table = bgp->rib[afi][safi];
5667
5668 if (afi == AFI_IP && p->prefixlen == IPV4_MAX_BITLEN)
5669 return;
5670 if (afi == AFI_IP6 && p->prefixlen == IPV6_MAX_BITLEN)
5671 return;
5672
5673 /* If routes exists below this node, generate aggregate routes. */
5674 top = bgp_node_get (table, p);
5675 for (rn = bgp_node_get (table, p); rn; rn = bgp_route_next_until (rn, top))
5676 if (rn->p.prefixlen > p->prefixlen)
5677 {
5678 match = 0;
5679
5680 for (ri = rn->info; ri; ri = ri->next)
5681 {
5682 if (BGP_INFO_HOLDDOWN (ri))
5683 continue;
5684
5685 if (ri->sub_type != BGP_ROUTE_AGGREGATE)
5686 {
5687 if (aggregate->summary_only && ri->extra)
5688 {
5689 ri->extra->suppress--;
5690
5691 if (ri->extra->suppress == 0)
5692 {
5693 bgp_info_set_flag (rn, ri, BGP_INFO_ATTR_CHANGED);
5694 match++;
5695 }
5696 }
5697 aggregate->count--;
5698 }
5699 }
5700
5701 /* If this node was suppressed, process the change. */
5702 if (match)
5703 bgp_process (bgp, rn, afi, safi);
5704 }
5705 bgp_unlock_node (top);
5706
5707 /* Delete aggregate route from BGP table. */
5708 rn = bgp_node_get (table, p);
5709
5710 for (ri = rn->info; ri; ri = ri->next)
5711 if (ri->peer == bgp->peer_self
5712 && ri->type == ZEBRA_ROUTE_BGP
5713 && ri->sub_type == BGP_ROUTE_AGGREGATE)
5714 break;
5715
5716 /* Withdraw static BGP route from routing table. */
5717 if (ri)
5718 {
5719 bgp_info_delete (rn, ri);
5720 bgp_process (bgp, rn, afi, safi);
5721 }
5722
5723 /* Unlock bgp_node_lookup. */
5724 bgp_unlock_node (rn);
5725 }
5726
5727 /* Aggregate route attribute. */
5728 #define AGGREGATE_SUMMARY_ONLY 1
5729 #define AGGREGATE_AS_SET 1
5730
5731 static int
5732 bgp_aggregate_unset (struct vty *vty, const char *prefix_str,
5733 afi_t afi, safi_t safi)
5734 {
5735 VTY_DECLVAR_CONTEXT(bgp, bgp);
5736 int ret;
5737 struct prefix p;
5738 struct bgp_node *rn;
5739 struct bgp_aggregate *aggregate;
5740
5741 /* Convert string to prefix structure. */
5742 ret = str2prefix (prefix_str, &p);
5743 if (!ret)
5744 {
5745 vty_out (vty, "Malformed prefix%s", VTY_NEWLINE);
5746 return CMD_WARNING;
5747 }
5748 apply_mask (&p);
5749
5750 /* Old configuration check. */
5751 rn = bgp_node_lookup (bgp->aggregate[afi][safi], &p);
5752 if (! rn)
5753 {
5754 vty_out (vty, "%% There is no aggregate-address configuration.%s",
5755 VTY_NEWLINE);
5756 return CMD_WARNING;
5757 }
5758
5759 aggregate = rn->info;
5760 if (aggregate->safi == SAFI_UNICAST)
5761 bgp_aggregate_delete (bgp, &p, afi, SAFI_UNICAST, aggregate);
5762 if (aggregate->safi == SAFI_LABELED_UNICAST)
5763 bgp_aggregate_delete (bgp, &p, afi, SAFI_LABELED_UNICAST, aggregate);
5764 if (aggregate->safi == SAFI_MULTICAST)
5765 bgp_aggregate_delete (bgp, &p, afi, SAFI_MULTICAST, aggregate);
5766
5767 /* Unlock aggregate address configuration. */
5768 rn->info = NULL;
5769 bgp_aggregate_free (aggregate);
5770 bgp_unlock_node (rn);
5771 bgp_unlock_node (rn);
5772
5773 return CMD_SUCCESS;
5774 }
5775
5776 static int
5777 bgp_aggregate_set (struct vty *vty, const char *prefix_str,
5778 afi_t afi, safi_t safi,
5779 u_char summary_only, u_char as_set)
5780 {
5781 VTY_DECLVAR_CONTEXT(bgp, bgp);
5782 int ret;
5783 struct prefix p;
5784 struct bgp_node *rn;
5785 struct bgp_aggregate *aggregate;
5786
5787 /* Convert string to prefix structure. */
5788 ret = str2prefix (prefix_str, &p);
5789 if (!ret)
5790 {
5791 vty_out (vty, "Malformed prefix%s", VTY_NEWLINE);
5792 return CMD_WARNING;
5793 }
5794 apply_mask (&p);
5795
5796 /* Old configuration check. */
5797 rn = bgp_node_get (bgp->aggregate[afi][safi], &p);
5798
5799 if (rn->info)
5800 {
5801 vty_out (vty, "There is already same aggregate network.%s", VTY_NEWLINE);
5802 /* try to remove the old entry */
5803 ret = bgp_aggregate_unset (vty, prefix_str, afi, safi);
5804 if (ret)
5805 {
5806 vty_out (vty, "Error deleting aggregate.%s", VTY_NEWLINE);
5807 bgp_unlock_node (rn);
5808 return CMD_WARNING;
5809 }
5810 }
5811
5812 /* Make aggregate address structure. */
5813 aggregate = bgp_aggregate_new ();
5814 aggregate->summary_only = summary_only;
5815 aggregate->as_set = as_set;
5816 aggregate->safi = safi;
5817 rn->info = aggregate;
5818
5819 /* Aggregate address insert into BGP routing table. */
5820 if (safi == SAFI_UNICAST)
5821 bgp_aggregate_add (bgp, &p, afi, SAFI_UNICAST, aggregate);
5822 if (safi == SAFI_LABELED_UNICAST)
5823 bgp_aggregate_add (bgp, &p, afi, SAFI_LABELED_UNICAST, aggregate);
5824 if (safi == SAFI_MULTICAST)
5825 bgp_aggregate_add (bgp, &p, afi, SAFI_MULTICAST, aggregate);
5826
5827 return CMD_SUCCESS;
5828 }
5829
5830 DEFUN (aggregate_address,
5831 aggregate_address_cmd,
5832 "aggregate-address A.B.C.D/M [<as-set [summary-only]|summary-only [as-set]>]",
5833 "Configure BGP aggregate entries\n"
5834 "Aggregate prefix\n"
5835 "Generate AS set path information\n"
5836 "Filter more specific routes from updates\n"
5837 "Filter more specific routes from updates\n"
5838 "Generate AS set path information\n")
5839 {
5840 int idx = 0;
5841 argv_find (argv, argc, "A.B.C.D/M", &idx);
5842 char *prefix = argv[idx]->arg;
5843 int as_set = argv_find (argv, argc, "as-set", &idx) ? AGGREGATE_AS_SET : 0;
5844 idx = 0;
5845 int summary_only = argv_find (argv, argc, "summary-only", &idx) ? AGGREGATE_SUMMARY_ONLY : 0;
5846
5847 return bgp_aggregate_set (vty, prefix, AFI_IP, bgp_node_safi (vty), summary_only, as_set);
5848 }
5849
5850 DEFUN (aggregate_address_mask,
5851 aggregate_address_mask_cmd,
5852 "aggregate-address A.B.C.D A.B.C.D [<as-set [summary-only]|summary-only [as-set]>]",
5853 "Configure BGP aggregate entries\n"
5854 "Aggregate address\n"
5855 "Aggregate mask\n"
5856 "Generate AS set path information\n"
5857 "Filter more specific routes from updates\n"
5858 "Filter more specific routes from updates\n"
5859 "Generate AS set path information\n")
5860 {
5861 int idx = 0;
5862 argv_find (argv, argc, "A.B.C.D", &idx);
5863 char *prefix = argv[idx]->arg;
5864 char *mask = argv[idx+1]->arg;
5865 int as_set = argv_find (argv, argc, "as-set", &idx) ? AGGREGATE_AS_SET : 0;
5866 idx = 0;
5867 int summary_only = argv_find (argv, argc, "summary-only", &idx) ? AGGREGATE_SUMMARY_ONLY : 0;
5868
5869 char prefix_str[BUFSIZ];
5870 int ret = netmask_str2prefix_str (prefix, mask, prefix_str);
5871
5872 if (! ret)
5873 {
5874 vty_out (vty, "%% Inconsistent address and mask%s", VTY_NEWLINE);
5875 return CMD_WARNING;
5876 }
5877
5878 return bgp_aggregate_set (vty, prefix_str, AFI_IP, bgp_node_safi (vty), summary_only, as_set);
5879 }
5880
5881 DEFUN (no_aggregate_address,
5882 no_aggregate_address_cmd,
5883 "no aggregate-address A.B.C.D/M [<as-set [summary-only]|summary-only [as-set]>]",
5884 NO_STR
5885 "Configure BGP aggregate entries\n"
5886 "Aggregate prefix\n"
5887 "Generate AS set path information\n"
5888 "Filter more specific routes from updates\n"
5889 "Filter more specific routes from updates\n"
5890 "Generate AS set path information\n")
5891 {
5892 int idx = 0;
5893 argv_find (argv, argc, "A.B.C.D/M", &idx);
5894 char *prefix = argv[idx]->arg;
5895 return bgp_aggregate_unset (vty, prefix, AFI_IP, bgp_node_safi (vty));
5896 }
5897
5898 DEFUN (no_aggregate_address_mask,
5899 no_aggregate_address_mask_cmd,
5900 "no aggregate-address A.B.C.D A.B.C.D [<as-set [summary-only]|summary-only [as-set]>]",
5901 NO_STR
5902 "Configure BGP aggregate entries\n"
5903 "Aggregate address\n"
5904 "Aggregate mask\n"
5905 "Generate AS set path information\n"
5906 "Filter more specific routes from updates\n"
5907 "Filter more specific routes from updates\n"
5908 "Generate AS set path information\n")
5909 {
5910 int idx = 0;
5911 argv_find (argv, argc, "A.B.C.D", &idx);
5912 char *prefix = argv[idx]->arg;
5913 char *mask = argv[idx+1]->arg;
5914
5915 char prefix_str[BUFSIZ];
5916 int ret = netmask_str2prefix_str (prefix, mask, prefix_str);
5917
5918 if (! ret)
5919 {
5920 vty_out (vty, "%% Inconsistent address and mask%s", VTY_NEWLINE);
5921 return CMD_WARNING;
5922 }
5923
5924 return bgp_aggregate_unset (vty, prefix_str, AFI_IP, bgp_node_safi (vty));
5925 }
5926
5927 DEFUN (ipv6_aggregate_address,
5928 ipv6_aggregate_address_cmd,
5929 "aggregate-address X:X::X:X/M [summary-only]",
5930 "Configure BGP aggregate entries\n"
5931 "Aggregate prefix\n"
5932 "Filter more specific routes from updates\n")
5933 {
5934 int idx = 0;
5935 argv_find (argv, argc, "X:X::X:X/M", &idx);
5936 char *prefix = argv[idx]->arg;
5937 int sum_only = argv_find (argv, argc, "summary-only", &idx) ? AGGREGATE_SUMMARY_ONLY : 0;
5938 return bgp_aggregate_set (vty, prefix, AFI_IP6, SAFI_UNICAST, sum_only, 0);
5939 }
5940
5941 DEFUN (no_ipv6_aggregate_address,
5942 no_ipv6_aggregate_address_cmd,
5943 "no aggregate-address X:X::X:X/M [summary-only]",
5944 NO_STR
5945 "Configure BGP aggregate entries\n"
5946 "Aggregate prefix\n"
5947 "Filter more specific routes from updates\n")
5948 {
5949 int idx = 0;
5950 argv_find (argv, argc, "X:X::X:X/M", &idx);
5951 char *prefix = argv[idx]->arg;
5952 return bgp_aggregate_unset (vty, prefix, AFI_IP6, SAFI_UNICAST);
5953 }
5954
5955 /* Redistribute route treatment. */
5956 void
5957 bgp_redistribute_add (struct bgp *bgp, struct prefix *p, const struct in_addr *nexthop,
5958 const struct in6_addr *nexthop6, unsigned int ifindex,
5959 u_int32_t metric, u_char type, u_short instance, route_tag_t tag)
5960 {
5961 struct bgp_info *new;
5962 struct bgp_info *bi;
5963 struct bgp_info info;
5964 struct bgp_node *bn;
5965 struct attr attr;
5966 struct attr *new_attr;
5967 afi_t afi;
5968 int ret;
5969 struct bgp_redist *red;
5970
5971 /* Make default attribute. */
5972 bgp_attr_default_set (&attr, BGP_ORIGIN_INCOMPLETE);
5973 if (nexthop)
5974 attr.nexthop = *nexthop;
5975 attr.nh_ifindex = ifindex;
5976
5977 if (nexthop6)
5978 {
5979 struct attr_extra *extra = bgp_attr_extra_get(&attr);
5980 extra->mp_nexthop_global = *nexthop6;
5981 extra->mp_nexthop_len = BGP_ATTR_NHLEN_IPV6_GLOBAL;
5982 }
5983
5984 attr.med = metric;
5985 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC);
5986 attr.extra->tag = tag;
5987
5988 afi = family2afi (p->family);
5989
5990 red = bgp_redist_lookup(bgp, afi, type, instance);
5991 if (red)
5992 {
5993 struct attr attr_new;
5994 struct attr_extra extra_new;
5995
5996 /* Copy attribute for modification. */
5997 attr_new.extra = &extra_new;
5998 bgp_attr_dup (&attr_new, &attr);
5999
6000 if (red->redist_metric_flag)
6001 attr_new.med = red->redist_metric;
6002
6003 /* Apply route-map. */
6004 if (red->rmap.name)
6005 {
6006 info.peer = bgp->peer_self;
6007 info.attr = &attr_new;
6008
6009 SET_FLAG (bgp->peer_self->rmap_type, PEER_RMAP_TYPE_REDISTRIBUTE);
6010
6011 ret = route_map_apply (red->rmap.map, p, RMAP_BGP, &info);
6012
6013 bgp->peer_self->rmap_type = 0;
6014
6015 if (ret == RMAP_DENYMATCH)
6016 {
6017 /* Free uninterned attribute. */
6018 bgp_attr_flush (&attr_new);
6019
6020 /* Unintern original. */
6021 aspath_unintern (&attr.aspath);
6022 bgp_attr_extra_free (&attr);
6023 bgp_redistribute_delete (bgp, p, type, instance);
6024 return;
6025 }
6026 }
6027
6028 bn = bgp_afi_node_get (bgp->rib[afi][SAFI_UNICAST],
6029 afi, SAFI_UNICAST, p, NULL);
6030
6031 new_attr = bgp_attr_intern (&attr_new);
6032
6033 for (bi = bn->info; bi; bi = bi->next)
6034 if (bi->peer == bgp->peer_self
6035 && bi->sub_type == BGP_ROUTE_REDISTRIBUTE)
6036 break;
6037
6038 if (bi)
6039 {
6040 /* Ensure the (source route) type is updated. */
6041 bi->type = type;
6042 if (attrhash_cmp (bi->attr, new_attr) &&
6043 !CHECK_FLAG(bi->flags, BGP_INFO_REMOVED))
6044 {
6045 bgp_attr_unintern (&new_attr);
6046 aspath_unintern (&attr.aspath);
6047 bgp_attr_extra_free (&attr);
6048 bgp_unlock_node (bn);
6049 return;
6050 }
6051 else
6052 {
6053 /* The attribute is changed. */
6054 bgp_info_set_flag (bn, bi, BGP_INFO_ATTR_CHANGED);
6055
6056 /* Rewrite BGP route information. */
6057 if (CHECK_FLAG(bi->flags, BGP_INFO_REMOVED))
6058 bgp_info_restore(bn, bi);
6059 else
6060 bgp_aggregate_decrement (bgp, p, bi, afi, SAFI_UNICAST);
6061 bgp_attr_unintern (&bi->attr);
6062 bi->attr = new_attr;
6063 bi->uptime = bgp_clock ();
6064
6065 /* Process change. */
6066 bgp_aggregate_increment (bgp, p, bi, afi, SAFI_UNICAST);
6067 bgp_process (bgp, bn, afi, SAFI_UNICAST);
6068 bgp_unlock_node (bn);
6069 aspath_unintern (&attr.aspath);
6070 bgp_attr_extra_free (&attr);
6071 return;
6072 }
6073 }
6074
6075 new = info_make(type, BGP_ROUTE_REDISTRIBUTE, instance, bgp->peer_self,
6076 new_attr, bn);
6077 SET_FLAG (new->flags, BGP_INFO_VALID);
6078
6079 bgp_aggregate_increment (bgp, p, new, afi, SAFI_UNICAST);
6080 bgp_info_add (bn, new);
6081 bgp_unlock_node (bn);
6082 bgp_process (bgp, bn, afi, SAFI_UNICAST);
6083 }
6084
6085 /* Unintern original. */
6086 aspath_unintern (&attr.aspath);
6087 bgp_attr_extra_free (&attr);
6088 }
6089
6090 void
6091 bgp_redistribute_delete (struct bgp *bgp, struct prefix *p, u_char type, u_short instance)
6092 {
6093 afi_t afi;
6094 struct bgp_node *rn;
6095 struct bgp_info *ri;
6096 struct bgp_redist *red;
6097
6098 afi = family2afi (p->family);
6099
6100 red = bgp_redist_lookup(bgp, afi, type, instance);
6101 if (red)
6102 {
6103 rn = bgp_afi_node_get (bgp->rib[afi][SAFI_UNICAST], afi, SAFI_UNICAST, p, NULL);
6104
6105 for (ri = rn->info; ri; ri = ri->next)
6106 if (ri->peer == bgp->peer_self
6107 && ri->type == type)
6108 break;
6109
6110 if (ri)
6111 {
6112 bgp_aggregate_decrement (bgp, p, ri, afi, SAFI_UNICAST);
6113 bgp_info_delete (rn, ri);
6114 bgp_process (bgp, rn, afi, SAFI_UNICAST);
6115 }
6116 bgp_unlock_node (rn);
6117 }
6118 }
6119
6120 /* Withdraw specified route type's route. */
6121 void
6122 bgp_redistribute_withdraw (struct bgp *bgp, afi_t afi, int type, u_short instance)
6123 {
6124 struct bgp_node *rn;
6125 struct bgp_info *ri;
6126 struct bgp_table *table;
6127
6128 table = bgp->rib[afi][SAFI_UNICAST];
6129
6130 for (rn = bgp_table_top (table); rn; rn = bgp_route_next (rn))
6131 {
6132 for (ri = rn->info; ri; ri = ri->next)
6133 if (ri->peer == bgp->peer_self
6134 && ri->type == type
6135 && ri->instance == instance)
6136 break;
6137
6138 if (ri)
6139 {
6140 bgp_aggregate_decrement (bgp, &rn->p, ri, afi, SAFI_UNICAST);
6141 bgp_info_delete (rn, ri);
6142 bgp_process (bgp, rn, afi, SAFI_UNICAST);
6143 }
6144 }
6145 }
6146
6147 /* Static function to display route. */
6148 static void
6149 route_vty_out_route (struct prefix *p, struct vty *vty)
6150 {
6151 int len;
6152 u_int32_t destination;
6153 char buf[BUFSIZ];
6154
6155 if (p->family == AF_INET)
6156 {
6157 len = vty_out (vty, "%s", inet_ntop (p->family, &p->u.prefix, buf, BUFSIZ));
6158 destination = ntohl (p->u.prefix4.s_addr);
6159
6160 if ((IN_CLASSC (destination) && p->prefixlen == 24)
6161 || (IN_CLASSB (destination) && p->prefixlen == 16)
6162 || (IN_CLASSA (destination) && p->prefixlen == 8)
6163 || p->u.prefix4.s_addr == 0)
6164 {
6165 /* When mask is natural, mask is not displayed. */
6166 }
6167 else
6168 len += vty_out (vty, "/%d", p->prefixlen);
6169 }
6170 else if (p->family == AF_ETHERNET)
6171 {
6172 prefix2str(p, buf, PREFIX_STRLEN);
6173 len = vty_out (vty, "%s", buf);
6174 }
6175 else
6176 len = vty_out (vty, "%s/%d", inet_ntop (p->family, &p->u.prefix, buf, BUFSIZ),
6177 p->prefixlen);
6178
6179 len = 17 - len;
6180 if (len < 1)
6181 vty_out (vty, "%s%*s", VTY_NEWLINE, 20, " ");
6182 else
6183 vty_out (vty, "%*s", len, " ");
6184 }
6185
6186 enum bgp_display_type
6187 {
6188 normal_list,
6189 };
6190
6191 /* Print the short form route status for a bgp_info */
6192 static void
6193 route_vty_short_status_out (struct vty *vty, struct bgp_info *binfo,
6194 json_object *json_path)
6195 {
6196 if (json_path)
6197 {
6198
6199 /* Route status display. */
6200 if (CHECK_FLAG (binfo->flags, BGP_INFO_REMOVED))
6201 json_object_boolean_true_add(json_path, "removed");
6202
6203 if (CHECK_FLAG (binfo->flags, BGP_INFO_STALE))
6204 json_object_boolean_true_add(json_path, "stale");
6205
6206 if (binfo->extra && binfo->extra->suppress)
6207 json_object_boolean_true_add(json_path, "suppressed");
6208
6209 if (CHECK_FLAG (binfo->flags, BGP_INFO_VALID) &&
6210 ! CHECK_FLAG (binfo->flags, BGP_INFO_HISTORY))
6211 json_object_boolean_true_add(json_path, "valid");
6212
6213 /* Selected */
6214 if (CHECK_FLAG (binfo->flags, BGP_INFO_HISTORY))
6215 json_object_boolean_true_add(json_path, "history");
6216
6217 if (CHECK_FLAG (binfo->flags, BGP_INFO_DAMPED))
6218 json_object_boolean_true_add(json_path, "damped");
6219
6220 if (CHECK_FLAG (binfo->flags, BGP_INFO_SELECTED))
6221 json_object_boolean_true_add(json_path, "bestpath");
6222
6223 if (CHECK_FLAG (binfo->flags, BGP_INFO_MULTIPATH))
6224 json_object_boolean_true_add(json_path, "multipath");
6225
6226 /* Internal route. */
6227 if ((binfo->peer->as) && (binfo->peer->as == binfo->peer->local_as))
6228 json_object_string_add(json_path, "pathFrom", "internal");
6229 else
6230 json_object_string_add(json_path, "pathFrom", "external");
6231
6232 return;
6233 }
6234
6235 /* Route status display. */
6236 if (CHECK_FLAG (binfo->flags, BGP_INFO_REMOVED))
6237 vty_out (vty, "R");
6238 else if (CHECK_FLAG (binfo->flags, BGP_INFO_STALE))
6239 vty_out (vty, "S");
6240 else if (binfo->extra && binfo->extra->suppress)
6241 vty_out (vty, "s");
6242 else if (CHECK_FLAG (binfo->flags, BGP_INFO_VALID) &&
6243 ! CHECK_FLAG (binfo->flags, BGP_INFO_HISTORY))
6244 vty_out (vty, "*");
6245 else
6246 vty_out (vty, " ");
6247
6248 /* Selected */
6249 if (CHECK_FLAG (binfo->flags, BGP_INFO_HISTORY))
6250 vty_out (vty, "h");
6251 else if (CHECK_FLAG (binfo->flags, BGP_INFO_DAMPED))
6252 vty_out (vty, "d");
6253 else if (CHECK_FLAG (binfo->flags, BGP_INFO_SELECTED))
6254 vty_out (vty, ">");
6255 else if (CHECK_FLAG (binfo->flags, BGP_INFO_MULTIPATH))
6256 vty_out (vty, "=");
6257 else
6258 vty_out (vty, " ");
6259
6260 /* Internal route. */
6261 if (binfo->peer &&
6262 (binfo->peer->as) && (binfo->peer->as == binfo->peer->local_as))
6263 vty_out (vty, "i");
6264 else
6265 vty_out (vty, " ");
6266 }
6267
6268 /* called from terminal list command */
6269 void
6270 route_vty_out (struct vty *vty, struct prefix *p,
6271 struct bgp_info *binfo, int display, safi_t safi,
6272 json_object *json_paths)
6273 {
6274 struct attr *attr;
6275 json_object *json_path = NULL;
6276 json_object *json_nexthops = NULL;
6277 json_object *json_nexthop_global = NULL;
6278 json_object *json_nexthop_ll = NULL;
6279
6280 if (json_paths)
6281 json_path = json_object_new_object();
6282
6283 /* short status lead text */
6284 route_vty_short_status_out (vty, binfo, json_path);
6285
6286 if (!json_paths)
6287 {
6288 /* print prefix and mask */
6289 if (! display)
6290 route_vty_out_route (p, vty);
6291 else
6292 vty_out (vty, "%*s", 17, " ");
6293 }
6294
6295 /* Print attribute */
6296 attr = binfo->attr;
6297 if (attr)
6298 {
6299 /*
6300 * For ENCAP routes, nexthop address family is not
6301 * neccessarily the same as the prefix address family.
6302 * Both SAFI_MPLS_VPN and SAFI_ENCAP use the MP nexthop field
6303 */
6304 if ((safi == SAFI_ENCAP) || (safi == SAFI_MPLS_VPN) || (safi == SAFI_EVPN))
6305 {
6306 if (attr->extra)
6307 {
6308 char buf[BUFSIZ];
6309 int af = NEXTHOP_FAMILY(attr->extra->mp_nexthop_len);
6310
6311 switch (af)
6312 {
6313 case AF_INET:
6314 vty_out (vty, "%s", inet_ntop(af,
6315 &attr->extra->mp_nexthop_global_in, buf, BUFSIZ));
6316 break;
6317 case AF_INET6:
6318 vty_out (vty, "%s", inet_ntop(af,
6319 &attr->extra->mp_nexthop_global, buf, BUFSIZ));
6320 break;
6321 default:
6322 vty_out(vty, "?");
6323 break;
6324 }
6325 }
6326 else
6327 vty_out(vty, "?");
6328 }
6329 /* IPv4 Next Hop */
6330 else if (p->family == AF_INET && !BGP_ATTR_NEXTHOP_AFI_IP6(attr))
6331 {
6332 if (json_paths)
6333 {
6334 json_nexthop_global = json_object_new_object();
6335
6336 if ((safi == SAFI_MPLS_VPN) || (safi == SAFI_EVPN))
6337 json_object_string_add(json_nexthop_global, "ip", inet_ntoa (attr->extra->mp_nexthop_global_in));
6338 else
6339 json_object_string_add(json_nexthop_global, "ip", inet_ntoa (attr->nexthop));
6340
6341 json_object_string_add(json_nexthop_global, "afi", "ipv4");
6342 json_object_boolean_true_add(json_nexthop_global, "used");
6343 }
6344 else
6345 {
6346 if ((safi == SAFI_MPLS_VPN) || (safi == SAFI_EVPN))
6347 vty_out (vty, "%-16s",
6348 inet_ntoa (attr->extra->mp_nexthop_global_in));
6349 else
6350 vty_out (vty, "%-16s", inet_ntoa (attr->nexthop));
6351 }
6352 }
6353
6354 /* IPv6 Next Hop */
6355 else if (p->family == AF_INET6 || BGP_ATTR_NEXTHOP_AFI_IP6(attr))
6356 {
6357 int len;
6358 char buf[BUFSIZ];
6359
6360 if (json_paths)
6361 {
6362 json_nexthop_global = json_object_new_object();
6363 json_object_string_add(json_nexthop_global, "ip",
6364 inet_ntop (AF_INET6,
6365 &attr->extra->mp_nexthop_global,
6366 buf, BUFSIZ));
6367 json_object_string_add(json_nexthop_global, "afi", "ipv6");
6368 json_object_string_add(json_nexthop_global, "scope", "global");
6369
6370 /* We display both LL & GL if both have been received */
6371 if ((attr->extra->mp_nexthop_len == 32) || (binfo->peer->conf_if))
6372 {
6373 json_nexthop_ll = json_object_new_object();
6374 json_object_string_add(json_nexthop_ll, "ip",
6375 inet_ntop (AF_INET6,
6376 &attr->extra->mp_nexthop_local,
6377 buf, BUFSIZ));
6378 json_object_string_add(json_nexthop_ll, "afi", "ipv6");
6379 json_object_string_add(json_nexthop_ll, "scope", "link-local");
6380
6381 if ((IPV6_ADDR_CMP (&attr->extra->mp_nexthop_global,
6382 &attr->extra->mp_nexthop_local) != 0) &&
6383 !attr->extra->mp_nexthop_prefer_global)
6384 json_object_boolean_true_add(json_nexthop_ll, "used");
6385 else
6386 json_object_boolean_true_add(json_nexthop_global, "used");
6387 }
6388 else
6389 json_object_boolean_true_add(json_nexthop_global, "used");
6390 }
6391 else
6392 {
6393 /* Display LL if LL/Global both in table unless prefer-global is set */
6394 if (((attr->extra->mp_nexthop_len == 32) &&
6395 !attr->extra->mp_nexthop_prefer_global) ||
6396 (binfo->peer->conf_if))
6397 {
6398 if (binfo->peer->conf_if)
6399 {
6400 len = vty_out (vty, "%s",
6401 binfo->peer->conf_if);
6402 len = 7 - len; /* len of IPv6 addr + max len of def ifname */
6403
6404 if (len < 1)
6405 vty_out (vty, "%s%*s", VTY_NEWLINE, 45, " ");
6406 else
6407 vty_out (vty, "%*s", len, " ");
6408 }
6409 else
6410 {
6411 len = vty_out (vty, "%s",
6412 inet_ntop (AF_INET6,
6413 &attr->extra->mp_nexthop_local,
6414 buf, BUFSIZ));
6415 len = 16 - len;
6416
6417 if (len < 1)
6418 vty_out (vty, "%s%*s", VTY_NEWLINE, 36, " ");
6419 else
6420 vty_out (vty, "%*s", len, " ");
6421 }
6422 }
6423 else
6424 {
6425 len = vty_out (vty, "%s",
6426 inet_ntop (AF_INET6,
6427 &attr->extra->mp_nexthop_global,
6428 buf, BUFSIZ));
6429 len = 16 - len;
6430
6431 if (len < 1)
6432 vty_out (vty, "%s%*s", VTY_NEWLINE, 36, " ");
6433 else
6434 vty_out (vty, "%*s", len, " ");
6435 }
6436 }
6437 }
6438
6439 /* MED/Metric */
6440 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC))
6441 if (json_paths)
6442 json_object_int_add(json_path, "med", attr->med);
6443 else
6444 vty_out (vty, "%10u", attr->med);
6445 else
6446 if (!json_paths)
6447 vty_out (vty, " ");
6448
6449 /* Local Pref */
6450 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_LOCAL_PREF))
6451 if (json_paths)
6452 json_object_int_add(json_path, "localpref", attr->local_pref);
6453 else
6454 vty_out (vty, "%7u", attr->local_pref);
6455 else
6456 if (!json_paths)
6457 vty_out (vty, " ");
6458
6459 if (json_paths)
6460 {
6461 if (attr->extra)
6462 json_object_int_add(json_path, "weight", attr->extra->weight);
6463 else
6464 json_object_int_add(json_path, "weight", 0);
6465 }
6466 else
6467 vty_out (vty, "%7u ", (attr->extra ? attr->extra->weight : 0));
6468
6469 if (json_paths) {
6470 char buf[BUFSIZ];
6471 json_object_string_add(json_path, "peerId", sockunion2str (&binfo->peer->su, buf, SU_ADDRSTRLEN));
6472 }
6473
6474 /* Print aspath */
6475 if (attr->aspath)
6476 {
6477 if (json_paths)
6478 json_object_string_add(json_path, "aspath", attr->aspath->str);
6479 else
6480 aspath_print_vty (vty, "%s", attr->aspath, " ");
6481 }
6482
6483 /* Print origin */
6484 if (json_paths)
6485 json_object_string_add(json_path, "origin", bgp_origin_long_str[attr->origin]);
6486 else
6487 vty_out (vty, "%s", bgp_origin_str[attr->origin]);
6488 }
6489 else
6490 {
6491 if (json_paths)
6492 json_object_string_add(json_path, "alert", "No attributes");
6493 else
6494 vty_out (vty, "No attributes to print%s", VTY_NEWLINE);
6495 }
6496
6497 if (json_paths)
6498 {
6499 if (json_nexthop_global || json_nexthop_ll)
6500 {
6501 json_nexthops = json_object_new_array();
6502
6503 if (json_nexthop_global)
6504 json_object_array_add(json_nexthops, json_nexthop_global);
6505
6506 if (json_nexthop_ll)
6507 json_object_array_add(json_nexthops, json_nexthop_ll);
6508
6509 json_object_object_add(json_path, "nexthops", json_nexthops);
6510 }
6511
6512 json_object_array_add(json_paths, json_path);
6513 }
6514 else
6515 {
6516 vty_out (vty, "%s", VTY_NEWLINE);
6517 #if ENABLE_BGP_VNC
6518 /* prints an additional line, indented, with VNC info, if present */
6519 if ((safi == SAFI_MPLS_VPN) || (safi == SAFI_ENCAP))
6520 rfapi_vty_out_vncinfo(vty, p, binfo, safi);
6521 #endif
6522 }
6523 }
6524
6525 /* called from terminal list command */
6526 void
6527 route_vty_out_tmp (struct vty *vty, struct prefix *p, struct attr *attr, safi_t safi,
6528 u_char use_json, json_object *json_ar)
6529 {
6530 json_object *json_status = NULL;
6531 json_object *json_net = NULL;
6532 char buff[BUFSIZ];
6533 /* Route status display. */
6534 if (use_json)
6535 {
6536 json_status = json_object_new_object();
6537 json_net = json_object_new_object();
6538 }
6539 else
6540 {
6541 vty_out (vty, "*");
6542 vty_out (vty, ">");
6543 vty_out (vty, " ");
6544 }
6545
6546 /* print prefix and mask */
6547 if (use_json)
6548 json_object_string_add(json_net, "addrPrefix", inet_ntop (p->family, &p->u.prefix, buff, BUFSIZ));
6549 else
6550 route_vty_out_route (p, vty);
6551
6552 /* Print attribute */
6553 if (attr)
6554 {
6555 if (use_json)
6556 {
6557 if (p->family == AF_INET &&
6558 (safi == SAFI_MPLS_VPN ||
6559 safi == SAFI_ENCAP ||
6560 safi == SAFI_EVPN ||
6561 !BGP_ATTR_NEXTHOP_AFI_IP6(attr)))
6562 {
6563 if (safi == SAFI_MPLS_VPN || safi == SAFI_ENCAP || safi == SAFI_EVPN)
6564 json_object_string_add(json_net, "nextHop", inet_ntoa (attr->extra->mp_nexthop_global_in));
6565 else
6566 json_object_string_add(json_net, "nextHop", inet_ntoa (attr->nexthop));
6567 }
6568 else if (p->family == AF_INET6 || BGP_ATTR_NEXTHOP_AFI_IP6(attr))
6569 {
6570 char buf[BUFSIZ];
6571
6572 json_object_string_add(json_net, "netHopGloabal", inet_ntop (AF_INET6, &attr->extra->mp_nexthop_global,
6573 buf, BUFSIZ));
6574 }
6575
6576 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC))
6577 json_object_int_add(json_net, "metric", attr->med);
6578
6579 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_LOCAL_PREF))
6580 json_object_int_add(json_net, "localPref", attr->local_pref);
6581
6582 if (attr->extra)
6583 json_object_int_add(json_net, "weight", attr->extra->weight);
6584 else
6585 json_object_int_add(json_net, "weight", 0);
6586
6587 /* Print aspath */
6588 if (attr->aspath)
6589 json_object_string_add(json_net, "asPath", attr->aspath->str);
6590
6591 /* Print origin */
6592 json_object_string_add(json_net, "bgpOriginCode", bgp_origin_str[attr->origin]);
6593 }
6594 else
6595 {
6596 if (p->family == AF_INET &&
6597 (safi == SAFI_MPLS_VPN ||
6598 safi == SAFI_ENCAP ||
6599 safi == SAFI_EVPN ||
6600 !BGP_ATTR_NEXTHOP_AFI_IP6(attr)))
6601 {
6602 if (safi == SAFI_MPLS_VPN || safi == SAFI_ENCAP || safi == SAFI_EVPN)
6603 vty_out (vty, "%-16s",
6604 inet_ntoa (attr->extra->mp_nexthop_global_in));
6605 else
6606 vty_out (vty, "%-16s", inet_ntoa (attr->nexthop));
6607 }
6608 else if (p->family == AF_INET6 || BGP_ATTR_NEXTHOP_AFI_IP6(attr))
6609 {
6610 int len;
6611 char buf[BUFSIZ];
6612
6613 assert (attr->extra);
6614
6615 len = vty_out (vty, "%s",
6616 inet_ntop (AF_INET6, &attr->extra->mp_nexthop_global,
6617 buf, BUFSIZ));
6618 len = 16 - len;
6619 if (len < 1)
6620 vty_out (vty, "%s%*s", VTY_NEWLINE, 36, " ");
6621 else
6622 vty_out (vty, "%*s", len, " ");
6623 }
6624 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC))
6625 vty_out (vty, "%10u", attr->med);
6626 else
6627 vty_out (vty, " ");
6628
6629 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_LOCAL_PREF))
6630 vty_out (vty, "%7u", attr->local_pref);
6631 else
6632 vty_out (vty, " ");
6633
6634 vty_out (vty, "%7u ", (attr->extra ? attr->extra->weight : 0));
6635
6636 /* Print aspath */
6637 if (attr->aspath)
6638 aspath_print_vty (vty, "%s", attr->aspath, " ");
6639
6640 /* Print origin */
6641 vty_out (vty, "%s", bgp_origin_str[attr->origin]);
6642 }
6643 }
6644 if (use_json)
6645 {
6646 json_object_boolean_true_add(json_status, "*");
6647 json_object_boolean_true_add(json_status, ">");
6648 json_object_object_add(json_net, "appliedStatusSymbols", json_status);
6649 char buf_cut[BUFSIZ];
6650 json_object_object_add(json_ar, inet_ntop (p->family, &p->u.prefix, buf_cut, BUFSIZ), json_net);
6651 }
6652 else
6653 vty_out (vty, "%s", VTY_NEWLINE);
6654 }
6655
6656 void
6657 route_vty_out_tag (struct vty *vty, struct prefix *p,
6658 struct bgp_info *binfo, int display, safi_t safi, json_object *json)
6659 {
6660 json_object *json_out = NULL;
6661 struct attr *attr;
6662 u_int32_t label = 0;
6663
6664 if (!binfo->extra)
6665 return;
6666
6667 if (json)
6668 json_out = json_object_new_object();
6669
6670 /* short status lead text */
6671 route_vty_short_status_out (vty, binfo, json_out);
6672
6673 /* print prefix and mask */
6674 if (json == NULL)
6675 {
6676 if (! display)
6677 route_vty_out_route (p, vty);
6678 else
6679 vty_out (vty, "%*s", 17, " ");
6680 }
6681
6682 /* Print attribute */
6683 attr = binfo->attr;
6684 if (attr)
6685 {
6686 if (((p->family == AF_INET) && ((safi == SAFI_MPLS_VPN || safi == SAFI_ENCAP)))
6687 || (safi == SAFI_EVPN && p->family == AF_ETHERNET && !BGP_ATTR_NEXTHOP_AFI_IP6(attr))
6688 || (!BGP_ATTR_NEXTHOP_AFI_IP6(attr)))
6689 {
6690 if (safi == SAFI_MPLS_VPN || safi == SAFI_ENCAP || safi == SAFI_EVPN)
6691 {
6692 if (json)
6693 json_object_string_add(json_out, "mpNexthopGlobalIn", inet_ntoa (attr->extra->mp_nexthop_global_in));
6694 else
6695 vty_out (vty, "%-16s", inet_ntoa (attr->extra->mp_nexthop_global_in));
6696 }
6697 else
6698 {
6699 if (json)
6700 json_object_string_add(json_out, "nexthop", inet_ntoa (attr->nexthop));
6701 else
6702 vty_out (vty, "%-16s", inet_ntoa (attr->nexthop));
6703 }
6704 }
6705 else if (((p->family == AF_INET6) && ((safi == SAFI_MPLS_VPN || safi == SAFI_ENCAP)))
6706 || (safi == SAFI_EVPN && p->family == AF_ETHERNET && BGP_ATTR_NEXTHOP_AFI_IP6(attr))
6707 || (BGP_ATTR_NEXTHOP_AFI_IP6(attr)))
6708 {
6709 assert (attr->extra);
6710 char buf_a[BUFSIZ];
6711 char buf_b[BUFSIZ];
6712 char buf_c[BUFSIZ];
6713 if (attr->extra->mp_nexthop_len == BGP_ATTR_NHLEN_IPV6_GLOBAL)
6714 {
6715 if (json)
6716 json_object_string_add(json_out, "mpNexthopGlobalIn",
6717 inet_ntop (AF_INET6, &attr->extra->mp_nexthop_global, buf_a, BUFSIZ));
6718 else
6719 vty_out (vty, "%s",
6720 inet_ntop (AF_INET6, &attr->extra->mp_nexthop_global,
6721 buf_a, BUFSIZ));
6722 }
6723 else if (attr->extra->mp_nexthop_len == BGP_ATTR_NHLEN_IPV6_GLOBAL_AND_LL)
6724 {
6725 if (json)
6726 {
6727 inet_ntop (AF_INET6, &attr->extra->mp_nexthop_global,
6728 buf_a, BUFSIZ);
6729 inet_ntop (AF_INET6, &attr->extra->mp_nexthop_local,
6730 buf_b, BUFSIZ);
6731 sprintf(buf_c, "%s(%s)", buf_a, buf_b);
6732 json_object_string_add(json_out, "mpNexthopGlobalLocal", buf_c);
6733 }
6734 else
6735 vty_out (vty, "%s(%s)",
6736 inet_ntop (AF_INET6, &attr->extra->mp_nexthop_global,
6737 buf_a, BUFSIZ),
6738 inet_ntop (AF_INET6, &attr->extra->mp_nexthop_local,
6739 buf_b, BUFSIZ));
6740 }
6741
6742 }
6743 }
6744
6745 label = decode_label (binfo->extra->tag);
6746
6747 if (json)
6748 {
6749 if (label)
6750 json_object_int_add(json_out, "notag", label);
6751 json_object_array_add(json, json_out);
6752 }
6753 else
6754 {
6755 vty_out (vty, "notag/%d", label);
6756
6757 vty_out (vty, "%s", VTY_NEWLINE);
6758 }
6759 }
6760
6761 void
6762 route_vty_out_overlay (struct vty *vty, struct prefix *p,
6763 struct bgp_info *binfo, int display, json_object *json_paths)
6764 {
6765 struct attr *attr;
6766 char buf[BUFSIZ];
6767 json_object *json_path = NULL;
6768
6769 if (json_paths)
6770 json_path = json_object_new_object();
6771
6772 if (!binfo->extra)
6773 return;
6774
6775 /* short status lead text */
6776 route_vty_short_status_out (vty, binfo, json_path);
6777
6778 /* print prefix and mask */
6779 if (! display)
6780 route_vty_out_route (p, vty);
6781 else
6782 vty_out (vty, "%*s", 17, " ");
6783
6784 /* Print attribute */
6785 attr = binfo->attr;
6786 if (attr)
6787 {
6788 if (attr->extra)
6789 {
6790 char buf1[BUFSIZ];
6791 int af = NEXTHOP_FAMILY(attr->extra->mp_nexthop_len);
6792
6793 switch (af) {
6794 case AF_INET:
6795 vty_out (vty, "%-16s", inet_ntop(af,
6796 &attr->extra->mp_nexthop_global_in, buf, BUFSIZ));
6797 break;
6798 case AF_INET6:
6799 vty_out (vty, "%s(%s)",
6800 inet_ntop (af,
6801 &attr->extra->mp_nexthop_global, buf, BUFSIZ),
6802 inet_ntop (af,
6803 &attr->extra->mp_nexthop_local, buf1, BUFSIZ));
6804 break;
6805 default:
6806 vty_out(vty, "?");
6807 }
6808 } else {
6809 vty_out(vty, "?");
6810 }
6811 }
6812
6813 if(attr->extra)
6814 {
6815 struct eth_segment_id *id = &(attr->extra->evpn_overlay.eth_s_id);
6816 char *str = esi2str(id);
6817 vty_out (vty, "%s", str);
6818 XFREE (MTYPE_TMP, str);
6819 if (p->u.prefix_evpn.flags & IP_PREFIX_V4)
6820 {
6821 vty_out (vty, "/%s", inet_ntoa (attr->extra->evpn_overlay.gw_ip.ipv4));
6822 }
6823 else if (p->u.prefix_evpn.flags & IP_PREFIX_V6)
6824 {
6825 vty_out (vty, "/%s",
6826 inet_ntop (AF_INET6, &(attr->extra->evpn_overlay.gw_ip.ipv6),
6827 buf, BUFSIZ));
6828 }
6829 if(attr->extra->ecommunity)
6830 {
6831 char *mac = NULL;
6832 struct ecommunity_val *routermac = ecommunity_lookup (attr->extra->ecommunity,
6833 ECOMMUNITY_ENCODE_EVPN,
6834 ECOMMUNITY_EVPN_SUBTYPE_ROUTERMAC);
6835 if(routermac)
6836 mac = ecom_mac2str((char *)routermac->val);
6837 if(mac)
6838 {
6839 vty_out (vty, "/%s",(char *)mac);
6840 XFREE(MTYPE_TMP, mac);
6841 }
6842 }
6843 }
6844 vty_out (vty, "%s", VTY_NEWLINE);
6845 }
6846
6847 /* dampening route */
6848 static void
6849 damp_route_vty_out (struct vty *vty, struct prefix *p, struct bgp_info *binfo,
6850 int display, safi_t safi, u_char use_json, json_object *json)
6851 {
6852 struct attr *attr;
6853 int len;
6854 char timebuf[BGP_UPTIME_LEN];
6855
6856 /* short status lead text */
6857 route_vty_short_status_out (vty, binfo, json);
6858
6859 /* print prefix and mask */
6860 if (!use_json)
6861 {
6862 if (! display)
6863 route_vty_out_route (p, vty);
6864 else
6865 vty_out (vty, "%*s", 17, " ");
6866 }
6867
6868 len = vty_out (vty, "%s", binfo->peer->host);
6869 len = 17 - len;
6870 if (len < 1)
6871 {
6872 if (!use_json)
6873 vty_out (vty, "%s%*s", VTY_NEWLINE, 34, " ");
6874 }
6875 else
6876 {
6877 if (use_json)
6878 json_object_int_add(json, "peerHost", len);
6879 else
6880 vty_out (vty, "%*s", len, " ");
6881 }
6882
6883 if (use_json)
6884 bgp_damp_reuse_time_vty (vty, binfo, timebuf, BGP_UPTIME_LEN, use_json, json);
6885 else
6886 vty_out (vty, "%s ", bgp_damp_reuse_time_vty (vty, binfo, timebuf, BGP_UPTIME_LEN, use_json, json));
6887
6888 /* Print attribute */
6889 attr = binfo->attr;
6890 if (attr)
6891 {
6892 /* Print aspath */
6893 if (attr->aspath)
6894 {
6895 if (use_json)
6896 json_object_string_add(json, "asPath", attr->aspath->str);
6897 else
6898 aspath_print_vty (vty, "%s", attr->aspath, " ");
6899 }
6900
6901 /* Print origin */
6902 if (use_json)
6903 json_object_string_add(json, "origin", bgp_origin_str[attr->origin]);
6904 else
6905 vty_out (vty, "%s", bgp_origin_str[attr->origin]);
6906 }
6907 if (!use_json)
6908 vty_out (vty, "%s", VTY_NEWLINE);
6909 }
6910
6911 /* flap route */
6912 static void
6913 flap_route_vty_out (struct vty *vty, struct prefix *p, struct bgp_info *binfo,
6914 int display, safi_t safi, u_char use_json, json_object *json)
6915 {
6916 struct attr *attr;
6917 struct bgp_damp_info *bdi;
6918 char timebuf[BGP_UPTIME_LEN];
6919 int len;
6920
6921 if (!binfo->extra)
6922 return;
6923
6924 bdi = binfo->extra->damp_info;
6925
6926 /* short status lead text */
6927 route_vty_short_status_out (vty, binfo, json);
6928
6929 /* print prefix and mask */
6930 if (!use_json)
6931 {
6932 if (! display)
6933 route_vty_out_route (p, vty);
6934 else
6935 vty_out (vty, "%*s", 17, " ");
6936 }
6937
6938 len = vty_out (vty, "%s", binfo->peer->host);
6939 len = 16 - len;
6940 if (len < 1)
6941 {
6942 if (!use_json)
6943 vty_out (vty, "%s%*s", VTY_NEWLINE, 33, " ");
6944 }
6945 else
6946 {
6947 if (use_json)
6948 json_object_int_add(json, "peerHost", len);
6949 else
6950 vty_out (vty, "%*s", len, " ");
6951 }
6952
6953 len = vty_out (vty, "%d", bdi->flap);
6954 len = 5 - len;
6955 if (len < 1)
6956 {
6957 if (!use_json)
6958 vty_out (vty, " ");
6959 }
6960 else
6961 {
6962 if (use_json)
6963 json_object_int_add(json, "bdiFlap", len);
6964 else
6965 vty_out (vty, "%*s", len, " ");
6966 }
6967
6968 if (use_json)
6969 peer_uptime (bdi->start_time, timebuf, BGP_UPTIME_LEN, use_json, json);
6970 else
6971 vty_out (vty, "%s ", peer_uptime (bdi->start_time,
6972 timebuf, BGP_UPTIME_LEN, 0, NULL));
6973
6974 if (CHECK_FLAG (binfo->flags, BGP_INFO_DAMPED)
6975 && ! CHECK_FLAG (binfo->flags, BGP_INFO_HISTORY))
6976 {
6977 if (use_json)
6978 bgp_damp_reuse_time_vty (vty, binfo, timebuf, BGP_UPTIME_LEN, use_json, json);
6979 else
6980 vty_out (vty, "%s ", bgp_damp_reuse_time_vty (vty, binfo, timebuf, BGP_UPTIME_LEN, use_json, json));
6981 }
6982 else
6983 {
6984 if (!use_json)
6985 vty_out (vty, "%*s ", 8, " ");
6986 }
6987
6988 /* Print attribute */
6989 attr = binfo->attr;
6990 if (attr)
6991 {
6992 /* Print aspath */
6993 if (attr->aspath)
6994 {
6995 if (use_json)
6996 json_object_string_add(json, "asPath", attr->aspath->str);
6997 else
6998 aspath_print_vty (vty, "%s", attr->aspath, " ");
6999 }
7000
7001 /* Print origin */
7002 if (use_json)
7003 json_object_string_add(json, "origin", bgp_origin_str[attr->origin]);
7004 else
7005 vty_out (vty, "%s", bgp_origin_str[attr->origin]);
7006 }
7007 if (!use_json)
7008 vty_out (vty, "%s", VTY_NEWLINE);
7009 }
7010
7011 static void
7012 route_vty_out_advertised_to (struct vty *vty, struct peer *peer, int *first,
7013 const char *header, json_object *json_adv_to)
7014 {
7015 char buf1[INET6_ADDRSTRLEN];
7016 json_object *json_peer = NULL;
7017
7018 if (json_adv_to)
7019 {
7020 /* 'advertised-to' is a dictionary of peers we have advertised this
7021 * prefix too. The key is the peer's IP or swpX, the value is the
7022 * hostname if we know it and "" if not.
7023 */
7024 json_peer = json_object_new_object();
7025
7026 if (peer->hostname)
7027 json_object_string_add(json_peer, "hostname", peer->hostname);
7028
7029 if (peer->conf_if)
7030 json_object_object_add(json_adv_to, peer->conf_if, json_peer);
7031 else
7032 json_object_object_add(json_adv_to,
7033 sockunion2str (&peer->su, buf1, SU_ADDRSTRLEN),
7034 json_peer);
7035 }
7036 else
7037 {
7038 if (*first)
7039 {
7040 vty_out (vty, "%s", header);
7041 *first = 0;
7042 }
7043
7044 if (peer->hostname && bgp_flag_check(peer->bgp, BGP_FLAG_SHOW_HOSTNAME))
7045 {
7046 if (peer->conf_if)
7047 vty_out (vty, " %s(%s)", peer->hostname, peer->conf_if);
7048 else
7049 vty_out (vty, " %s(%s)", peer->hostname,
7050 sockunion2str (&peer->su, buf1, SU_ADDRSTRLEN));
7051 }
7052 else
7053 {
7054 if (peer->conf_if)
7055 vty_out (vty, " %s", peer->conf_if);
7056 else
7057 vty_out (vty, " %s", sockunion2str (&peer->su, buf1, SU_ADDRSTRLEN));
7058 }
7059 }
7060 }
7061
7062 static void
7063 route_vty_out_detail (struct vty *vty, struct bgp *bgp, struct prefix *p,
7064 struct bgp_info *binfo, afi_t afi, safi_t safi,
7065 json_object *json_paths)
7066 {
7067 char buf[INET6_ADDRSTRLEN];
7068 char buf1[BUFSIZ];
7069 struct attr *attr;
7070 int sockunion_vty_out (struct vty *, union sockunion *);
7071 time_t tbuf;
7072 json_object *json_bestpath = NULL;
7073 json_object *json_cluster_list = NULL;
7074 json_object *json_cluster_list_list = NULL;
7075 json_object *json_ext_community = NULL;
7076 json_object *json_last_update = NULL;
7077 json_object *json_nexthop_global = NULL;
7078 json_object *json_nexthop_ll = NULL;
7079 json_object *json_nexthops = NULL;
7080 json_object *json_path = NULL;
7081 json_object *json_peer = NULL;
7082 json_object *json_string = NULL;
7083 json_object *json_adv_to = NULL;
7084 int first = 0;
7085 struct listnode *node, *nnode;
7086 struct peer *peer;
7087 int addpath_capable;
7088 int has_adj;
7089 unsigned int first_as;
7090
7091 if (json_paths)
7092 {
7093 json_path = json_object_new_object();
7094 json_peer = json_object_new_object();
7095 json_nexthop_global = json_object_new_object();
7096 }
7097
7098 attr = binfo->attr;
7099
7100 if (attr)
7101 {
7102 /* Line1 display AS-path, Aggregator */
7103 if (attr->aspath)
7104 {
7105 if (json_paths)
7106 {
7107 json_object_lock(attr->aspath->json);
7108 json_object_object_add(json_path, "aspath", attr->aspath->json);
7109 }
7110 else
7111 {
7112 if (attr->aspath->segments)
7113 aspath_print_vty (vty, " %s", attr->aspath, "");
7114 else
7115 vty_out (vty, " Local");
7116 }
7117 }
7118
7119 if (CHECK_FLAG (binfo->flags, BGP_INFO_REMOVED))
7120 {
7121 if (json_paths)
7122 json_object_boolean_true_add(json_path, "removed");
7123 else
7124 vty_out (vty, ", (removed)");
7125 }
7126
7127 if (CHECK_FLAG (binfo->flags, BGP_INFO_STALE))
7128 {
7129 if (json_paths)
7130 json_object_boolean_true_add(json_path, "stale");
7131 else
7132 vty_out (vty, ", (stale)");
7133 }
7134
7135 if (CHECK_FLAG (attr->flag, ATTR_FLAG_BIT (BGP_ATTR_AGGREGATOR)))
7136 {
7137 if (json_paths)
7138 {
7139 json_object_int_add(json_path, "aggregatorAs", attr->extra->aggregator_as);
7140 json_object_string_add(json_path, "aggregatorId", inet_ntoa (attr->extra->aggregator_addr));
7141 }
7142 else
7143 {
7144 vty_out (vty, ", (aggregated by %u %s)",
7145 attr->extra->aggregator_as,
7146 inet_ntoa (attr->extra->aggregator_addr));
7147 }
7148 }
7149
7150 if (CHECK_FLAG (binfo->peer->af_flags[afi][safi], PEER_FLAG_REFLECTOR_CLIENT))
7151 {
7152 if (json_paths)
7153 json_object_boolean_true_add(json_path, "rxedFromRrClient");
7154 else
7155 vty_out (vty, ", (Received from a RR-client)");
7156 }
7157
7158 if (CHECK_FLAG (binfo->peer->af_flags[afi][safi], PEER_FLAG_RSERVER_CLIENT))
7159 {
7160 if (json_paths)
7161 json_object_boolean_true_add(json_path, "rxedFromRsClient");
7162 else
7163 vty_out (vty, ", (Received from a RS-client)");
7164 }
7165
7166 if (CHECK_FLAG (binfo->flags, BGP_INFO_HISTORY))
7167 {
7168 if (json_paths)
7169 json_object_boolean_true_add(json_path, "dampeningHistoryEntry");
7170 else
7171 vty_out (vty, ", (history entry)");
7172 }
7173 else if (CHECK_FLAG (binfo->flags, BGP_INFO_DAMPED))
7174 {
7175 if (json_paths)
7176 json_object_boolean_true_add(json_path, "dampeningSuppressed");
7177 else
7178 vty_out (vty, ", (suppressed due to dampening)");
7179 }
7180
7181 if (!json_paths)
7182 vty_out (vty, "%s", VTY_NEWLINE);
7183
7184 /* Line2 display Next-hop, Neighbor, Router-id */
7185 /* Display the nexthop */
7186 if (p->family == AF_INET &&
7187 (safi == SAFI_MPLS_VPN ||
7188 safi == SAFI_ENCAP ||
7189 safi == SAFI_EVPN ||
7190 !BGP_ATTR_NEXTHOP_AFI_IP6(attr)))
7191 {
7192 if (safi == SAFI_MPLS_VPN || safi == SAFI_ENCAP || safi == SAFI_EVPN)
7193 {
7194 if (json_paths)
7195 json_object_string_add(json_nexthop_global, "ip", inet_ntoa (attr->extra->mp_nexthop_global_in));
7196 else
7197 vty_out (vty, " %s", inet_ntoa (attr->extra->mp_nexthop_global_in));
7198 }
7199 else
7200 {
7201 if (json_paths)
7202 json_object_string_add(json_nexthop_global, "ip", inet_ntoa (attr->nexthop));
7203 else
7204 vty_out (vty, " %s", inet_ntoa (attr->nexthop));
7205 }
7206
7207 if (json_paths)
7208 json_object_string_add(json_nexthop_global, "afi", "ipv4");
7209 }
7210 else
7211 {
7212 assert (attr->extra);
7213 if (json_paths)
7214 {
7215 json_object_string_add(json_nexthop_global, "ip",
7216 inet_ntop (AF_INET6, &attr->extra->mp_nexthop_global,
7217 buf, INET6_ADDRSTRLEN));
7218 json_object_string_add(json_nexthop_global, "afi", "ipv6");
7219 json_object_string_add(json_nexthop_global, "scope", "global");
7220 }
7221 else
7222 {
7223 vty_out (vty, " %s",
7224 inet_ntop (AF_INET6, &attr->extra->mp_nexthop_global,
7225 buf, INET6_ADDRSTRLEN));
7226 }
7227 }
7228
7229 /* Display the IGP cost or 'inaccessible' */
7230 if (! CHECK_FLAG (binfo->flags, BGP_INFO_VALID))
7231 {
7232 if (json_paths)
7233 json_object_boolean_false_add(json_nexthop_global, "accessible");
7234 else
7235 vty_out (vty, " (inaccessible)");
7236 }
7237 else
7238 {
7239 if (binfo->extra && binfo->extra->igpmetric)
7240 {
7241 if (json_paths)
7242 json_object_int_add(json_nexthop_global, "metric", binfo->extra->igpmetric);
7243 else
7244 vty_out (vty, " (metric %u)", binfo->extra->igpmetric);
7245 }
7246
7247 /* IGP cost is 0, display this only for json */
7248 else
7249 {
7250 if (json_paths)
7251 json_object_int_add(json_nexthop_global, "metric", 0);
7252 }
7253
7254 if (json_paths)
7255 json_object_boolean_true_add(json_nexthop_global, "accessible");
7256 }
7257
7258 /* Display peer "from" output */
7259 /* This path was originated locally */
7260 if (binfo->peer == bgp->peer_self)
7261 {
7262
7263 if (p->family == AF_INET && !BGP_ATTR_NEXTHOP_AFI_IP6(attr))
7264 {
7265 if (json_paths)
7266 json_object_string_add(json_peer, "peerId", "0.0.0.0");
7267 else
7268 vty_out (vty, " from 0.0.0.0 ");
7269 }
7270 else
7271 {
7272 if (json_paths)
7273 json_object_string_add(json_peer, "peerId", "::");
7274 else
7275 vty_out (vty, " from :: ");
7276 }
7277
7278 if (json_paths)
7279 json_object_string_add(json_peer, "routerId", inet_ntoa(bgp->router_id));
7280 else
7281 vty_out (vty, "(%s)", inet_ntoa(bgp->router_id));
7282 }
7283
7284 /* We RXed this path from one of our peers */
7285 else
7286 {
7287
7288 if (json_paths)
7289 {
7290 json_object_string_add(json_peer, "peerId", sockunion2str (&binfo->peer->su, buf, SU_ADDRSTRLEN));
7291 json_object_string_add(json_peer, "routerId", inet_ntop (AF_INET, &binfo->peer->remote_id, buf1, BUFSIZ));
7292
7293 if (binfo->peer->hostname)
7294 json_object_string_add(json_peer, "hostname", binfo->peer->hostname);
7295
7296 if (binfo->peer->domainname)
7297 json_object_string_add(json_peer, "domainname", binfo->peer->domainname);
7298
7299 if (binfo->peer->conf_if)
7300 json_object_string_add(json_peer, "interface", binfo->peer->conf_if);
7301 }
7302 else
7303 {
7304 if (binfo->peer->conf_if)
7305 {
7306 if (binfo->peer->hostname &&
7307 bgp_flag_check(binfo->peer->bgp, BGP_FLAG_SHOW_HOSTNAME))
7308 vty_out (vty, " from %s(%s)", binfo->peer->hostname,
7309 binfo->peer->conf_if);
7310 else
7311 vty_out (vty, " from %s", binfo->peer->conf_if);
7312 }
7313 else
7314 {
7315 if (binfo->peer->hostname &&
7316 bgp_flag_check(binfo->peer->bgp, BGP_FLAG_SHOW_HOSTNAME))
7317 vty_out (vty, " from %s(%s)", binfo->peer->hostname,
7318 binfo->peer->host);
7319 else
7320 vty_out (vty, " from %s", sockunion2str (&binfo->peer->su, buf, SU_ADDRSTRLEN));
7321 }
7322
7323 if (attr->flag & ATTR_FLAG_BIT(BGP_ATTR_ORIGINATOR_ID))
7324 vty_out (vty, " (%s)", inet_ntoa (attr->extra->originator_id));
7325 else
7326 vty_out (vty, " (%s)", inet_ntop (AF_INET, &binfo->peer->remote_id, buf1, BUFSIZ));
7327 }
7328 }
7329
7330 if (!json_paths)
7331 vty_out (vty, "%s", VTY_NEWLINE);
7332
7333 /* display the link-local nexthop */
7334 if (attr->extra && attr->extra->mp_nexthop_len == BGP_ATTR_NHLEN_IPV6_GLOBAL_AND_LL)
7335 {
7336 if (json_paths)
7337 {
7338 json_nexthop_ll = json_object_new_object();
7339 json_object_string_add(json_nexthop_ll, "ip",
7340 inet_ntop (AF_INET6, &attr->extra->mp_nexthop_local,
7341 buf, INET6_ADDRSTRLEN));
7342 json_object_string_add(json_nexthop_ll, "afi", "ipv6");
7343 json_object_string_add(json_nexthop_ll, "scope", "link-local");
7344
7345 json_object_boolean_true_add(json_nexthop_ll, "accessible");
7346
7347 if (!attr->extra->mp_nexthop_prefer_global)
7348 json_object_boolean_true_add(json_nexthop_ll, "used");
7349 else
7350 json_object_boolean_true_add(json_nexthop_global, "used");
7351 }
7352 else
7353 {
7354 vty_out (vty, " (%s) %s%s",
7355 inet_ntop (AF_INET6, &attr->extra->mp_nexthop_local,
7356 buf, INET6_ADDRSTRLEN),
7357 attr->extra->mp_nexthop_prefer_global ?
7358 "(prefer-global)" : "(used)",
7359 VTY_NEWLINE);
7360 }
7361 }
7362 /* If we do not have a link-local nexthop then we must flag the global as "used" */
7363 else
7364 {
7365 if (json_paths)
7366 json_object_boolean_true_add(json_nexthop_global, "used");
7367 }
7368
7369 /* Line 3 display Origin, Med, Locpref, Weight, Tag, valid, Int/Ext/Local, Atomic, best */
7370 if (json_paths)
7371 json_object_string_add(json_path, "origin", bgp_origin_long_str[attr->origin]);
7372 else
7373 vty_out (vty, " Origin %s", bgp_origin_long_str[attr->origin]);
7374
7375 if (attr->flag & ATTR_FLAG_BIT(BGP_ATTR_MULTI_EXIT_DISC))
7376 {
7377 if (json_paths)
7378 json_object_int_add(json_path, "med", attr->med);
7379 else
7380 vty_out (vty, ", metric %u", attr->med);
7381 }
7382
7383 if (attr->flag & ATTR_FLAG_BIT(BGP_ATTR_LOCAL_PREF))
7384 {
7385 if (json_paths)
7386 json_object_int_add(json_path, "localpref", attr->local_pref);
7387 else
7388 vty_out (vty, ", localpref %u", attr->local_pref);
7389 }
7390 else
7391 {
7392 if (json_paths)
7393 json_object_int_add(json_path, "localpref", bgp->default_local_pref);
7394 else
7395 vty_out (vty, ", localpref %u", bgp->default_local_pref);
7396 }
7397
7398 if (attr->extra && attr->extra->weight != 0)
7399 {
7400 if (json_paths)
7401 json_object_int_add(json_path, "weight", attr->extra->weight);
7402 else
7403 vty_out (vty, ", weight %u", attr->extra->weight);
7404 }
7405
7406 if (attr->extra && attr->extra->tag != 0)
7407 {
7408 if (json_paths)
7409 json_object_int_add(json_path, "tag", attr->extra->tag);
7410 else
7411 vty_out (vty, ", tag %"ROUTE_TAG_PRI, attr->extra->tag);
7412 }
7413
7414 if (! CHECK_FLAG (binfo->flags, BGP_INFO_VALID))
7415 {
7416 if (json_paths)
7417 json_object_boolean_false_add(json_path, "valid");
7418 else
7419 vty_out (vty, ", invalid");
7420 }
7421 else if (! CHECK_FLAG (binfo->flags, BGP_INFO_HISTORY))
7422 {
7423 if (json_paths)
7424 json_object_boolean_true_add(json_path, "valid");
7425 else
7426 vty_out (vty, ", valid");
7427 }
7428
7429 if (binfo->peer != bgp->peer_self)
7430 {
7431 if (binfo->peer->as == binfo->peer->local_as)
7432 {
7433 if (CHECK_FLAG(bgp->config, BGP_CONFIG_CONFEDERATION))
7434 {
7435 if (json_paths)
7436 json_object_string_add(json_peer, "type", "confed-internal");
7437 else
7438 vty_out (vty, ", confed-internal");
7439 }
7440 else
7441 {
7442 if (json_paths)
7443 json_object_string_add(json_peer, "type", "internal");
7444 else
7445 vty_out (vty, ", internal");
7446 }
7447 }
7448 else
7449 {
7450 if (bgp_confederation_peers_check(bgp, binfo->peer->as))
7451 {
7452 if (json_paths)
7453 json_object_string_add(json_peer, "type", "confed-external");
7454 else
7455 vty_out (vty, ", confed-external");
7456 }
7457 else
7458 {
7459 if (json_paths)
7460 json_object_string_add(json_peer, "type", "external");
7461 else
7462 vty_out (vty, ", external");
7463 }
7464 }
7465 }
7466 else if (binfo->sub_type == BGP_ROUTE_AGGREGATE)
7467 {
7468 if (json_paths)
7469 {
7470 json_object_boolean_true_add(json_path, "aggregated");
7471 json_object_boolean_true_add(json_path, "local");
7472 }
7473 else
7474 {
7475 vty_out (vty, ", aggregated, local");
7476 }
7477 }
7478 else if (binfo->type != ZEBRA_ROUTE_BGP)
7479 {
7480 if (json_paths)
7481 json_object_boolean_true_add(json_path, "sourced");
7482 else
7483 vty_out (vty, ", sourced");
7484 }
7485 else
7486 {
7487 if (json_paths)
7488 {
7489 json_object_boolean_true_add(json_path, "sourced");
7490 json_object_boolean_true_add(json_path, "local");
7491 }
7492 else
7493 {
7494 vty_out (vty, ", sourced, local");
7495 }
7496 }
7497
7498 if (attr->flag & ATTR_FLAG_BIT(BGP_ATTR_ATOMIC_AGGREGATE))
7499 {
7500 if (json_paths)
7501 json_object_boolean_true_add(json_path, "atomicAggregate");
7502 else
7503 vty_out (vty, ", atomic-aggregate");
7504 }
7505
7506 if (CHECK_FLAG (binfo->flags, BGP_INFO_MULTIPATH) ||
7507 (CHECK_FLAG (binfo->flags, BGP_INFO_SELECTED) &&
7508 bgp_info_mpath_count (binfo)))
7509 {
7510 if (json_paths)
7511 json_object_boolean_true_add(json_path, "multipath");
7512 else
7513 vty_out (vty, ", multipath");
7514 }
7515
7516 // Mark the bestpath(s)
7517 if (CHECK_FLAG (binfo->flags, BGP_INFO_DMED_SELECTED))
7518 {
7519 first_as = aspath_get_first_as(attr->aspath);
7520
7521 if (json_paths)
7522 {
7523 if (!json_bestpath)
7524 json_bestpath = json_object_new_object();
7525 json_object_int_add(json_bestpath, "bestpathFromAs", first_as);
7526 }
7527 else
7528 {
7529 if (first_as)
7530 vty_out (vty, ", bestpath-from-AS %d", first_as);
7531 else
7532 vty_out (vty, ", bestpath-from-AS Local");
7533 }
7534 }
7535
7536 if (CHECK_FLAG (binfo->flags, BGP_INFO_SELECTED))
7537 {
7538 if (json_paths)
7539 {
7540 if (!json_bestpath)
7541 json_bestpath = json_object_new_object();
7542 json_object_boolean_true_add(json_bestpath, "overall");
7543 }
7544 else
7545 vty_out (vty, ", best");
7546 }
7547
7548 if (json_bestpath)
7549 json_object_object_add(json_path, "bestpath", json_bestpath);
7550
7551 if (!json_paths)
7552 vty_out (vty, "%s", VTY_NEWLINE);
7553
7554 /* Line 4 display Community */
7555 if (attr->community)
7556 {
7557 if (json_paths)
7558 {
7559 json_object_lock(attr->community->json);
7560 json_object_object_add(json_path, "community", attr->community->json);
7561 }
7562 else
7563 {
7564 vty_out (vty, " Community: %s%s", attr->community->str,
7565 VTY_NEWLINE);
7566 }
7567 }
7568
7569 /* Line 5 display Extended-community */
7570 if (attr->flag & ATTR_FLAG_BIT(BGP_ATTR_EXT_COMMUNITIES))
7571 {
7572 if (json_paths)
7573 {
7574 json_ext_community = json_object_new_object();
7575 json_object_string_add(json_ext_community, "string", attr->extra->ecommunity->str);
7576 json_object_object_add(json_path, "extendedCommunity", json_ext_community);
7577 }
7578 else
7579 {
7580 vty_out (vty, " Extended Community: %s%s",
7581 attr->extra->ecommunity->str, VTY_NEWLINE);
7582 }
7583 }
7584
7585 /* Line 6 display Large community */
7586 if (attr->flag & ATTR_FLAG_BIT(BGP_ATTR_LARGE_COMMUNITIES))
7587 vty_out (vty, " Large Community: %s%s",
7588 attr->extra->lcommunity->str, VTY_NEWLINE);
7589
7590 /* Line 7 display Originator, Cluster-id */
7591 if ((attr->flag & ATTR_FLAG_BIT(BGP_ATTR_ORIGINATOR_ID)) ||
7592 (attr->flag & ATTR_FLAG_BIT(BGP_ATTR_CLUSTER_LIST)))
7593 {
7594 assert (attr->extra);
7595 if (attr->flag & ATTR_FLAG_BIT(BGP_ATTR_ORIGINATOR_ID))
7596 {
7597 if (json_paths)
7598 json_object_string_add(json_path, "originatorId", inet_ntoa (attr->extra->originator_id));
7599 else
7600 vty_out (vty, " Originator: %s",
7601 inet_ntoa (attr->extra->originator_id));
7602 }
7603
7604 if (attr->flag & ATTR_FLAG_BIT(BGP_ATTR_CLUSTER_LIST))
7605 {
7606 int i;
7607
7608 if (json_paths)
7609 {
7610 json_cluster_list = json_object_new_object();
7611 json_cluster_list_list = json_object_new_array();
7612
7613 for (i = 0; i < attr->extra->cluster->length / 4; i++)
7614 {
7615 json_string = json_object_new_string(inet_ntoa (attr->extra->cluster->list[i]));
7616 json_object_array_add(json_cluster_list_list, json_string);
7617 }
7618
7619 /* struct cluster_list does not have "str" variable like
7620 * aspath and community do. Add this someday if someone
7621 * asks for it.
7622 json_object_string_add(json_cluster_list, "string", attr->extra->cluster->str);
7623 */
7624 json_object_object_add(json_cluster_list, "list", json_cluster_list_list);
7625 json_object_object_add(json_path, "clusterList", json_cluster_list);
7626 }
7627 else
7628 {
7629 vty_out (vty, ", Cluster list: ");
7630
7631 for (i = 0; i < attr->extra->cluster->length / 4; i++)
7632 {
7633 vty_out (vty, "%s ",
7634 inet_ntoa (attr->extra->cluster->list[i]));
7635 }
7636 }
7637 }
7638
7639 if (!json_paths)
7640 vty_out (vty, "%s", VTY_NEWLINE);
7641 }
7642
7643 if (binfo->extra && binfo->extra->damp_info)
7644 bgp_damp_info_vty (vty, binfo, json_path);
7645
7646 /* Remove Label */
7647 if (bgp_labeled_safi(safi) && binfo->extra)
7648 {
7649 uint32_t label = label_pton(binfo->extra->tag);
7650 if (json_paths)
7651 json_object_int_add(json_path, "remoteLabel", label);
7652 else
7653 vty_out(vty, " Remote label: %d%s", label, VTY_NEWLINE);
7654 }
7655
7656 /* Label Index */
7657 if (attr->extra->label_index != BGP_INVALID_LABEL_INDEX)
7658 {
7659 if (json_paths)
7660 json_object_int_add(json_path, "labelIndex", attr->extra->label_index);
7661 else
7662 vty_out(vty, " Label Index: %d%s", attr->extra->label_index, VTY_NEWLINE);
7663 }
7664
7665 /* Line 8 display Addpath IDs */
7666 if (binfo->addpath_rx_id || binfo->addpath_tx_id)
7667 {
7668 if (json_paths)
7669 {
7670 json_object_int_add(json_path, "addpathRxId", binfo->addpath_rx_id);
7671 json_object_int_add(json_path, "addpathTxId", binfo->addpath_tx_id);
7672 }
7673 else
7674 {
7675 vty_out (vty, " AddPath ID: RX %u, TX %u%s",
7676 binfo->addpath_rx_id, binfo->addpath_tx_id,
7677 VTY_NEWLINE);
7678 }
7679 }
7680
7681 /* If we used addpath to TX a non-bestpath we need to display
7682 * "Advertised to" on a path-by-path basis */
7683 if (bgp->addpath_tx_used[afi][safi])
7684 {
7685 first = 1;
7686
7687 for (ALL_LIST_ELEMENTS (bgp->peer, node, nnode, peer))
7688 {
7689 addpath_capable = bgp_addpath_encode_tx (peer, afi, safi);
7690 has_adj = bgp_adj_out_lookup (peer, binfo->net, binfo->addpath_tx_id);
7691
7692 if ((addpath_capable && has_adj) ||
7693 (!addpath_capable && has_adj && CHECK_FLAG (binfo->flags, BGP_INFO_SELECTED)))
7694 {
7695 if (json_path && !json_adv_to)
7696 json_adv_to = json_object_new_object();
7697
7698 route_vty_out_advertised_to(vty, peer, &first,
7699 " Advertised to:",
7700 json_adv_to);
7701 }
7702 }
7703
7704 if (json_path)
7705 {
7706 if (json_adv_to)
7707 {
7708 json_object_object_add(json_path, "advertisedTo", json_adv_to);
7709 }
7710 }
7711 else
7712 {
7713 if (!first)
7714 {
7715 vty_out (vty, "%s", VTY_NEWLINE);
7716 }
7717 }
7718 }
7719
7720 /* Line 9 display Uptime */
7721 tbuf = time(NULL) - (bgp_clock() - binfo->uptime);
7722 if (json_paths)
7723 {
7724 json_last_update = json_object_new_object();
7725 json_object_int_add(json_last_update, "epoch", tbuf);
7726 json_object_string_add(json_last_update, "string", ctime(&tbuf));
7727 json_object_object_add(json_path, "lastUpdate", json_last_update);
7728 }
7729 else
7730 vty_out (vty, " Last update: %s", ctime(&tbuf));
7731 }
7732
7733 /* We've constructed the json object for this path, add it to the json
7734 * array of paths
7735 */
7736 if (json_paths)
7737 {
7738 if (json_nexthop_global || json_nexthop_ll)
7739 {
7740 json_nexthops = json_object_new_array();
7741
7742 if (json_nexthop_global)
7743 json_object_array_add(json_nexthops, json_nexthop_global);
7744
7745 if (json_nexthop_ll)
7746 json_object_array_add(json_nexthops, json_nexthop_ll);
7747
7748 json_object_object_add(json_path, "nexthops", json_nexthops);
7749 }
7750
7751 json_object_object_add(json_path, "peer", json_peer);
7752 json_object_array_add(json_paths, json_path);
7753 }
7754 else
7755 vty_out (vty, "%s", VTY_NEWLINE);
7756 }
7757
7758 #define BGP_SHOW_HEADER_CSV "Flags, Network, Next Hop, Metric, LocPrf, Weight, Path%s"
7759 #define BGP_SHOW_DAMP_HEADER " Network From Reuse Path%s"
7760 #define BGP_SHOW_FLAP_HEADER " Network From Flaps Duration Reuse Path%s"
7761
7762 static int
7763 bgp_show_prefix_list (struct vty *vty, struct bgp *bgp,
7764 const char *prefix_list_str, afi_t afi,
7765 safi_t safi, enum bgp_show_type type);
7766 static int
7767 bgp_show_filter_list (struct vty *vty, struct bgp *bgp,
7768 const char *filter, afi_t afi,
7769 safi_t safi, enum bgp_show_type type);
7770 static int
7771 bgp_show_route_map (struct vty *vty, struct bgp *bgp,
7772 const char *rmap_str, afi_t afi,
7773 safi_t safi, enum bgp_show_type type);
7774 static int
7775 bgp_show_community_list (struct vty *vty, struct bgp *bgp,
7776 const char *com, int exact,
7777 afi_t afi, safi_t safi);
7778 static int
7779 bgp_show_prefix_longer (struct vty *vty, struct bgp *bgp,
7780 const char *prefix, afi_t afi,
7781 safi_t safi, enum bgp_show_type type);
7782 static int
7783 bgp_show_regexp (struct vty *vty, const char *regstr, afi_t afi,
7784 safi_t safi, enum bgp_show_type type);
7785 static int
7786 bgp_show_community (struct vty *vty, struct bgp *bgp, int argc,
7787 struct cmd_token **argv, int exact, afi_t afi, safi_t safi);
7788
7789 static int
7790 bgp_show_table (struct vty *vty, struct bgp *bgp, struct bgp_table *table,
7791 enum bgp_show_type type, void *output_arg, u_char use_json)
7792 {
7793 struct bgp_info *ri;
7794 struct bgp_node *rn;
7795 int header = 1;
7796 int display;
7797 unsigned long output_count;
7798 unsigned long total_count;
7799 struct prefix *p;
7800 char buf[BUFSIZ];
7801 char buf2[BUFSIZ];
7802 json_object *json_paths = NULL;
7803 int first = 1;
7804
7805 if (use_json)
7806 {
7807 vty_out (vty, "{ \"vrfId\": %d, \"vrfName\": \"%s\", \"tableVersion\": %" PRId64 ", \"routerId\": \"%s\", \"routes\": { ",
7808 bgp->vrf_id == VRF_UNKNOWN ? -1 : bgp->vrf_id,
7809 bgp->inst_type == BGP_INSTANCE_TYPE_DEFAULT ? "Default" : bgp->name,
7810 table->version, inet_ntoa (bgp->router_id));
7811 json_paths = json_object_new_object();
7812 }
7813
7814 /* This is first entry point, so reset total line. */
7815 output_count = 0;
7816 total_count = 0;
7817
7818 /* Start processing of routes. */
7819 for (rn = bgp_table_top (table); rn; rn = bgp_route_next (rn))
7820 if (rn->info != NULL)
7821 {
7822 display = 0;
7823 if (!first && use_json)
7824 {
7825 vty_out (vty, ",");
7826 }
7827 if (use_json)
7828 json_paths = json_object_new_array();
7829 else
7830 json_paths = NULL;
7831
7832 for (ri = rn->info; ri; ri = ri->next)
7833 {
7834 total_count++;
7835 if (type == bgp_show_type_flap_statistics
7836 || type == bgp_show_type_flap_neighbor
7837 || type == bgp_show_type_dampend_paths
7838 || type == bgp_show_type_damp_neighbor)
7839 {
7840 if (!(ri->extra && ri->extra->damp_info))
7841 continue;
7842 }
7843 if (type == bgp_show_type_regexp)
7844 {
7845 regex_t *regex = output_arg;
7846
7847 if (bgp_regexec (regex, ri->attr->aspath) == REG_NOMATCH)
7848 continue;
7849 }
7850 if (type == bgp_show_type_prefix_list)
7851 {
7852 struct prefix_list *plist = output_arg;
7853
7854 if (prefix_list_apply (plist, &rn->p) != PREFIX_PERMIT)
7855 continue;
7856 }
7857 if (type == bgp_show_type_filter_list)
7858 {
7859 struct as_list *as_list = output_arg;
7860
7861 if (as_list_apply (as_list, ri->attr->aspath) != AS_FILTER_PERMIT)
7862 continue;
7863 }
7864 if (type == bgp_show_type_route_map)
7865 {
7866 struct route_map *rmap = output_arg;
7867 struct bgp_info binfo;
7868 struct attr dummy_attr;
7869 struct attr_extra dummy_extra;
7870 int ret;
7871
7872 dummy_attr.extra = &dummy_extra;
7873 bgp_attr_dup (&dummy_attr, ri->attr);
7874
7875 binfo.peer = ri->peer;
7876 binfo.attr = &dummy_attr;
7877
7878 ret = route_map_apply (rmap, &rn->p, RMAP_BGP, &binfo);
7879 if (ret == RMAP_DENYMATCH)
7880 continue;
7881 }
7882 if (type == bgp_show_type_neighbor
7883 || type == bgp_show_type_flap_neighbor
7884 || type == bgp_show_type_damp_neighbor)
7885 {
7886 union sockunion *su = output_arg;
7887
7888 if (ri->peer == NULL ||
7889 ri->peer->su_remote == NULL || ! sockunion_same(ri->peer->su_remote, su))
7890 continue;
7891 }
7892 if (type == bgp_show_type_cidr_only)
7893 {
7894 u_int32_t destination;
7895
7896 destination = ntohl (rn->p.u.prefix4.s_addr);
7897 if (IN_CLASSC (destination) && rn->p.prefixlen == 24)
7898 continue;
7899 if (IN_CLASSB (destination) && rn->p.prefixlen == 16)
7900 continue;
7901 if (IN_CLASSA (destination) && rn->p.prefixlen == 8)
7902 continue;
7903 }
7904 if (type == bgp_show_type_prefix_longer)
7905 {
7906 struct prefix *p = output_arg;
7907
7908 if (! prefix_match (p, &rn->p))
7909 continue;
7910 }
7911 if (type == bgp_show_type_community_all)
7912 {
7913 if (! ri->attr->community)
7914 continue;
7915 }
7916 if (type == bgp_show_type_community)
7917 {
7918 struct community *com = output_arg;
7919
7920 if (! ri->attr->community ||
7921 ! community_match (ri->attr->community, com))
7922 continue;
7923 }
7924 if (type == bgp_show_type_community_exact)
7925 {
7926 struct community *com = output_arg;
7927
7928 if (! ri->attr->community ||
7929 ! community_cmp (ri->attr->community, com))
7930 continue;
7931 }
7932 if (type == bgp_show_type_community_list)
7933 {
7934 struct community_list *list = output_arg;
7935
7936 if (! community_list_match (ri->attr->community, list))
7937 continue;
7938 }
7939 if (type == bgp_show_type_community_list_exact)
7940 {
7941 struct community_list *list = output_arg;
7942
7943 if (! community_list_exact_match (ri->attr->community, list))
7944 continue;
7945 }
7946 if (type == bgp_show_type_lcommunity)
7947 {
7948 struct lcommunity *lcom = output_arg;
7949
7950 if (! ri->attr->extra || ! ri->attr->extra->lcommunity ||
7951 ! lcommunity_match (ri->attr->extra->lcommunity, lcom))
7952 continue;
7953 }
7954 if (type == bgp_show_type_lcommunity_list)
7955 {
7956 struct community_list *list = output_arg;
7957
7958 if (! ri->attr->extra ||
7959 ! lcommunity_list_match (ri->attr->extra->lcommunity, list))
7960 continue;
7961 }
7962 if (type == bgp_show_type_lcommunity_all)
7963 {
7964 if (! ri->attr->extra || ! ri->attr->extra->lcommunity)
7965 continue;
7966 }
7967 if (type == bgp_show_type_dampend_paths
7968 || type == bgp_show_type_damp_neighbor)
7969 {
7970 if (! CHECK_FLAG (ri->flags, BGP_INFO_DAMPED)
7971 || CHECK_FLAG (ri->flags, BGP_INFO_HISTORY))
7972 continue;
7973 }
7974
7975 if (!use_json && header)
7976 {
7977 vty_out (vty, "BGP table version is %" PRIu64 ", local router ID is %s%s", table->version, inet_ntoa (bgp->router_id), VTY_NEWLINE);
7978 vty_out (vty, BGP_SHOW_SCODE_HEADER, VTY_NEWLINE, VTY_NEWLINE);
7979 vty_out (vty, BGP_SHOW_OCODE_HEADER, VTY_NEWLINE, VTY_NEWLINE);
7980 if (type == bgp_show_type_dampend_paths
7981 || type == bgp_show_type_damp_neighbor)
7982 vty_out (vty, BGP_SHOW_DAMP_HEADER, VTY_NEWLINE);
7983 else if (type == bgp_show_type_flap_statistics
7984 || type == bgp_show_type_flap_neighbor)
7985 vty_out (vty, BGP_SHOW_FLAP_HEADER, VTY_NEWLINE);
7986 else
7987 vty_out (vty, BGP_SHOW_HEADER, VTY_NEWLINE);
7988 header = 0;
7989 }
7990
7991 if (type == bgp_show_type_dampend_paths
7992 || type == bgp_show_type_damp_neighbor)
7993 damp_route_vty_out (vty, &rn->p, ri, display, SAFI_UNICAST, use_json, json_paths);
7994 else if (type == bgp_show_type_flap_statistics
7995 || type == bgp_show_type_flap_neighbor)
7996 flap_route_vty_out (vty, &rn->p, ri, display, SAFI_UNICAST, use_json, json_paths);
7997 else
7998 route_vty_out (vty, &rn->p, ri, display, SAFI_UNICAST, json_paths);
7999 display++;
8000 }
8001
8002 if (display)
8003 {
8004 output_count++;
8005 if (use_json)
8006 {
8007 p = &rn->p;
8008 sprintf(buf2, "%s/%d", inet_ntop (p->family, &p->u.prefix, buf, BUFSIZ), p->prefixlen);
8009 vty_out (vty, "\"%s\": ", buf2);
8010 vty_out (vty, "%s", json_object_to_json_string (json_paths));
8011 json_object_free (json_paths);
8012 first = 0;
8013
8014 }
8015 }
8016 }
8017
8018 if (use_json)
8019 {
8020 json_object_free (json_paths);
8021 vty_out (vty, " } }%s", VTY_NEWLINE);
8022 }
8023 else
8024 {
8025 /* No route is displayed */
8026 if (output_count == 0)
8027 {
8028 if (type == bgp_show_type_normal)
8029 vty_out (vty, "No BGP prefixes displayed, %ld exist%s", total_count, VTY_NEWLINE);
8030 }
8031 else
8032 vty_out (vty, "%sDisplayed %ld routes and %ld total paths%s",
8033 VTY_NEWLINE, output_count, total_count, VTY_NEWLINE);
8034 }
8035
8036 return CMD_SUCCESS;
8037 }
8038
8039 static int
8040 bgp_show (struct vty *vty, struct bgp *bgp, afi_t afi, safi_t safi,
8041 enum bgp_show_type type, void *output_arg, u_char use_json)
8042 {
8043 struct bgp_table *table;
8044
8045 if (bgp == NULL)
8046 {
8047 bgp = bgp_get_default ();
8048 }
8049
8050 if (bgp == NULL)
8051 {
8052 if (!use_json)
8053 vty_out (vty, "No BGP process is configured%s", VTY_NEWLINE);
8054 return CMD_WARNING;
8055 }
8056 /* use MPLS and ENCAP specific shows until they are merged */
8057 if (safi == SAFI_MPLS_VPN)
8058 {
8059 return bgp_show_mpls_vpn(vty, afi, NULL, type, output_arg,
8060 0, use_json);
8061 }
8062 if (safi == SAFI_ENCAP)
8063 {
8064 return bgp_show_encap(vty, afi, NULL, type, output_arg,
8065 0);
8066 }
8067
8068
8069 table = bgp->rib[afi][safi];
8070
8071 return bgp_show_table (vty, bgp, table, type, output_arg,
8072 use_json);
8073 }
8074
8075 static void
8076 bgp_show_all_instances_routes_vty (struct vty *vty, afi_t afi, safi_t safi,
8077 u_char use_json)
8078 {
8079 struct listnode *node, *nnode;
8080 struct bgp *bgp;
8081 struct bgp_table *table;
8082 int is_first = 1;
8083
8084 if (use_json)
8085 vty_out (vty, "{%s", VTY_NEWLINE);
8086
8087 for (ALL_LIST_ELEMENTS (bm->bgp, node, nnode, bgp))
8088 {
8089 if (use_json)
8090 {
8091 if (! is_first)
8092 vty_out (vty, ",%s", VTY_NEWLINE);
8093 else
8094 is_first = 0;
8095
8096 vty_out(vty, "\"%s\":", (bgp->inst_type == BGP_INSTANCE_TYPE_DEFAULT)
8097 ? "Default" : bgp->name);
8098 }
8099 else
8100 {
8101 vty_out (vty, "%sInstance %s:%s",
8102 VTY_NEWLINE,
8103 (bgp->inst_type == BGP_INSTANCE_TYPE_DEFAULT)
8104 ? "Default" : bgp->name,
8105 VTY_NEWLINE);
8106 }
8107 table = bgp->rib[afi][safi];
8108 bgp_show_table (vty, bgp, table,
8109 bgp_show_type_normal, NULL, use_json);
8110
8111 }
8112
8113 if (use_json)
8114 vty_out (vty, "}%s", VTY_NEWLINE);
8115 }
8116
8117 /* Header of detailed BGP route information */
8118 static void
8119 route_vty_out_detail_header (struct vty *vty, struct bgp *bgp,
8120 struct bgp_node *rn,
8121 struct prefix_rd *prd, afi_t afi, safi_t safi,
8122 json_object *json)
8123 {
8124 struct bgp_info *ri;
8125 struct prefix *p;
8126 struct peer *peer;
8127 struct listnode *node, *nnode;
8128 char buf1[INET6_ADDRSTRLEN];
8129 char buf2[INET6_ADDRSTRLEN];
8130 int count = 0;
8131 int best = 0;
8132 int suppress = 0;
8133 int no_export = 0;
8134 int no_advertise = 0;
8135 int local_as = 0;
8136 int first = 1;
8137 json_object *json_adv_to = NULL;
8138
8139 p = &rn->p;
8140
8141 if (json)
8142 {
8143 json_object_string_add(json, "prefix", inet_ntop (p->family, &p->u.prefix, buf2, INET6_ADDRSTRLEN));
8144 json_object_int_add(json, "prefixlen", p->prefixlen);
8145 }
8146 else
8147 {
8148 if (p->family == AF_ETHERNET)
8149 prefix2str (p, buf2, INET6_ADDRSTRLEN);
8150 else
8151 inet_ntop (p->family, &p->u.prefix, buf2, INET6_ADDRSTRLEN);
8152 vty_out (vty, "BGP routing table entry for %s%s%s/%d%s",
8153 ((safi == SAFI_MPLS_VPN || safi == SAFI_ENCAP || safi == SAFI_EVPN) ?
8154 prefix_rd2str (prd, buf1, RD_ADDRSTRLEN) : ""),
8155 ((safi == SAFI_MPLS_VPN) || (safi == SAFI_EVPN)) ? ":" : "",
8156 buf2,
8157 p->prefixlen, VTY_NEWLINE);
8158
8159 if (bgp_labeled_safi(safi))
8160 {
8161 vty_out(vty, "Local label: ");
8162 if (!bgp_is_valid_label(rn->local_label))
8163 vty_out(vty, "not allocated%s", VTY_NEWLINE);
8164 else
8165 {
8166 uint32_t label = label_pton(rn->local_label);
8167 vty_out(vty, "%d%s", label, VTY_NEWLINE);
8168 }
8169 }
8170 }
8171
8172 for (ri = rn->info; ri; ri = ri->next)
8173 {
8174 count++;
8175 if (CHECK_FLAG (ri->flags, BGP_INFO_SELECTED))
8176 {
8177 best = count;
8178 if (ri->extra && ri->extra->suppress)
8179 suppress = 1;
8180 if (ri->attr->community != NULL)
8181 {
8182 if (community_include (ri->attr->community, COMMUNITY_NO_ADVERTISE))
8183 no_advertise = 1;
8184 if (community_include (ri->attr->community, COMMUNITY_NO_EXPORT))
8185 no_export = 1;
8186 if (community_include (ri->attr->community, COMMUNITY_LOCAL_AS))
8187 local_as = 1;
8188 }
8189 }
8190 }
8191
8192 if (!json)
8193 {
8194 vty_out (vty, "Paths: (%d available", count);
8195 if (best)
8196 {
8197 vty_out (vty, ", best #%d", best);
8198 if (safi == SAFI_UNICAST)
8199 vty_out (vty, ", table %s",
8200 (bgp->inst_type == BGP_INSTANCE_TYPE_DEFAULT)
8201 ? "Default-IP-Routing-Table" : bgp->name);
8202 }
8203 else
8204 vty_out (vty, ", no best path");
8205
8206 if (no_advertise)
8207 vty_out (vty, ", not advertised to any peer");
8208 else if (no_export)
8209 vty_out (vty, ", not advertised to EBGP peer");
8210 else if (local_as)
8211 vty_out (vty, ", not advertised outside local AS");
8212
8213 if (suppress)
8214 vty_out (vty, ", Advertisements suppressed by an aggregate.");
8215 vty_out (vty, ")%s", VTY_NEWLINE);
8216 }
8217
8218 /* If we are not using addpath then we can display Advertised to and that will
8219 * show what peers we advertised the bestpath to. If we are using addpath
8220 * though then we must display Advertised to on a path-by-path basis. */
8221 if (!bgp->addpath_tx_used[afi][safi])
8222 {
8223 for (ALL_LIST_ELEMENTS (bgp->peer, node, nnode, peer))
8224 {
8225 if (bgp_adj_out_lookup (peer, rn, 0))
8226 {
8227 if (json && !json_adv_to)
8228 json_adv_to = json_object_new_object();
8229
8230 route_vty_out_advertised_to(vty, peer, &first,
8231 " Advertised to non peer-group peers:\n ",
8232 json_adv_to);
8233 }
8234 }
8235
8236 if (json)
8237 {
8238 if (json_adv_to)
8239 {
8240 json_object_object_add(json, "advertisedTo", json_adv_to);
8241 }
8242 }
8243 else
8244 {
8245 if (first)
8246 vty_out (vty, " Not advertised to any peer");
8247 vty_out (vty, "%s", VTY_NEWLINE);
8248 }
8249 }
8250 }
8251
8252 /* Display specified route of BGP table. */
8253 static int
8254 bgp_show_route_in_table (struct vty *vty, struct bgp *bgp,
8255 struct bgp_table *rib, const char *ip_str,
8256 afi_t afi, safi_t safi, struct prefix_rd *prd,
8257 int prefix_check, enum bgp_path_type pathtype,
8258 u_char use_json)
8259 {
8260 int ret;
8261 int header;
8262 int display = 0;
8263 struct prefix match;
8264 struct bgp_node *rn;
8265 struct bgp_node *rm;
8266 struct bgp_info *ri;
8267 struct bgp_table *table;
8268 json_object *json = NULL;
8269 json_object *json_paths = NULL;
8270
8271 /* Check IP address argument. */
8272 ret = str2prefix (ip_str, &match);
8273 if (! ret)
8274 {
8275 vty_out (vty, "address is malformed%s", VTY_NEWLINE);
8276 return CMD_WARNING;
8277 }
8278
8279 match.family = afi2family (afi);
8280
8281 if (use_json)
8282 {
8283 json = json_object_new_object();
8284 json_paths = json_object_new_array();
8285 }
8286
8287 if (safi == SAFI_MPLS_VPN || safi == SAFI_ENCAP || safi == SAFI_EVPN)
8288 {
8289 for (rn = bgp_table_top (rib); rn; rn = bgp_route_next (rn))
8290 {
8291 if (prd && memcmp (rn->p.u.val, prd->val, 8) != 0)
8292 continue;
8293
8294 if ((table = rn->info) != NULL)
8295 {
8296 header = 1;
8297
8298 if ((rm = bgp_node_match (table, &match)) != NULL)
8299 {
8300 if (prefix_check && rm->p.prefixlen != match.prefixlen)
8301 {
8302 bgp_unlock_node (rm);
8303 continue;
8304 }
8305
8306 for (ri = rm->info; ri; ri = ri->next)
8307 {
8308 if (header)
8309 {
8310 route_vty_out_detail_header (vty, bgp, rm, (struct prefix_rd *)&rn->p,
8311 AFI_IP, safi, json);
8312 header = 0;
8313 }
8314 display++;
8315
8316 if (pathtype == BGP_PATH_ALL ||
8317 (pathtype == BGP_PATH_BESTPATH && CHECK_FLAG (ri->flags, BGP_INFO_SELECTED)) ||
8318 (pathtype == BGP_PATH_MULTIPATH &&
8319 (CHECK_FLAG (ri->flags, BGP_INFO_MULTIPATH) || CHECK_FLAG (ri->flags, BGP_INFO_SELECTED))))
8320 route_vty_out_detail (vty, bgp, &rm->p, ri, AFI_IP, safi, json_paths);
8321 }
8322
8323 bgp_unlock_node (rm);
8324 }
8325 }
8326 }
8327 }
8328 else
8329 {
8330 header = 1;
8331
8332 if ((rn = bgp_node_match (rib, &match)) != NULL)
8333 {
8334 if (! prefix_check || rn->p.prefixlen == match.prefixlen)
8335 {
8336 for (ri = rn->info; ri; ri = ri->next)
8337 {
8338 if (header)
8339 {
8340 route_vty_out_detail_header (vty, bgp, rn, NULL, afi, safi, json);
8341 header = 0;
8342 }
8343 display++;
8344
8345 if (pathtype == BGP_PATH_ALL ||
8346 (pathtype == BGP_PATH_BESTPATH && CHECK_FLAG (ri->flags, BGP_INFO_SELECTED)) ||
8347 (pathtype == BGP_PATH_MULTIPATH &&
8348 (CHECK_FLAG (ri->flags, BGP_INFO_MULTIPATH) || CHECK_FLAG (ri->flags, BGP_INFO_SELECTED))))
8349 route_vty_out_detail (vty, bgp, &rn->p, ri, afi, safi, json_paths);
8350 }
8351 }
8352
8353 bgp_unlock_node (rn);
8354 }
8355 }
8356
8357 if (use_json)
8358 {
8359 if (display)
8360 json_object_object_add(json, "paths", json_paths);
8361
8362 vty_out (vty, "%s%s", json_object_to_json_string_ext(json, JSON_C_TO_STRING_PRETTY), VTY_NEWLINE);
8363 json_object_free(json);
8364 }
8365 else
8366 {
8367 if (!display)
8368 {
8369 vty_out (vty, "%% Network not in table%s", VTY_NEWLINE);
8370 return CMD_WARNING;
8371 }
8372 }
8373
8374 return CMD_SUCCESS;
8375 }
8376
8377 /* Display specified route of Main RIB */
8378 static int
8379 bgp_show_route (struct vty *vty, struct bgp *bgp, const char *ip_str,
8380 afi_t afi, safi_t safi, struct prefix_rd *prd,
8381 int prefix_check, enum bgp_path_type pathtype,
8382 u_char use_json)
8383 {
8384 if (!bgp)
8385 bgp = bgp_get_default ();
8386
8387 return bgp_show_route_in_table (vty, bgp, bgp->rib[afi][safi], ip_str,
8388 afi, safi, prd, prefix_check, pathtype,
8389 use_json);
8390 }
8391
8392 static int
8393 bgp_show_lcommunity (struct vty *vty, struct bgp *bgp, int argc,
8394 struct cmd_token **argv, afi_t afi, safi_t safi, u_char uj)
8395 {
8396 struct lcommunity *lcom;
8397 struct buffer *b;
8398 int i;
8399 char *str;
8400 int first = 0;
8401
8402 b = buffer_new (1024);
8403 for (i = 0; i < argc; i++)
8404 {
8405 if (first)
8406 buffer_putc (b, ' ');
8407 else
8408 {
8409 if (strmatch (argv[i]->text, "AA:BB:CC"))
8410 {
8411 first = 1;
8412 buffer_putstr (b, argv[i]->arg);
8413 }
8414 }
8415 }
8416 buffer_putc (b, '\0');
8417
8418 str = buffer_getstr (b);
8419 buffer_free (b);
8420
8421 lcom = lcommunity_str2com (str);
8422 XFREE (MTYPE_TMP, str);
8423 if (! lcom)
8424 {
8425 vty_out (vty, "%% Large-community malformed%s", VTY_NEWLINE);
8426 return CMD_WARNING;
8427 }
8428
8429 return bgp_show (vty, bgp, afi, safi, bgp_show_type_lcommunity, lcom, uj);
8430 }
8431
8432 static int
8433 bgp_show_lcommunity_list (struct vty *vty, struct bgp *bgp, const char *lcom,
8434 afi_t afi, safi_t safi, u_char uj)
8435 {
8436 struct community_list *list;
8437
8438 list = community_list_lookup (bgp_clist, lcom, LARGE_COMMUNITY_LIST_MASTER);
8439 if (list == NULL)
8440 {
8441 vty_out (vty, "%% %s is not a valid large-community-list name%s", lcom,
8442 VTY_NEWLINE);
8443 return CMD_WARNING;
8444 }
8445
8446 return bgp_show (vty, bgp, afi, safi, bgp_show_type_lcommunity_list, list, uj);
8447 }
8448
8449 DEFUN (show_ip_bgp_large_community_list,
8450 show_ip_bgp_large_community_list_cmd,
8451 "show [ip] bgp [<view|vrf> WORD] [<ipv4|ipv6> [<unicast|multicast|vpn|encap|labeled-unicast>]] large-community-list <(1-500)|WORD> [json]",
8452 SHOW_STR
8453 IP_STR
8454 BGP_STR
8455 BGP_INSTANCE_HELP_STR
8456 "Address Family\n"
8457 "Address Family\n"
8458 "Address Family modifier\n"
8459 "Address Family modifier\n"
8460 "Address Family modifier\n"
8461 "Address Family modifier\n"
8462 "Address Family modifier\n"
8463 "Display routes matching the large-community-list\n"
8464 "large-community-list number\n"
8465 "large-community-list name\n"
8466 JSON_STR)
8467 {
8468 char *vrf = NULL;
8469 afi_t afi = AFI_IP6;
8470 safi_t safi = SAFI_UNICAST;
8471 int idx = 0;
8472
8473 if (argv_find (argv, argc, "ip", &idx))
8474 afi = AFI_IP;
8475 if (argv_find (argv, argc, "view", &idx) || argv_find (argv, argc, "vrf", &idx))
8476 vrf = argv[++idx]->arg;
8477 if (argv_find (argv, argc, "ipv4", &idx) || argv_find (argv, argc, "ipv6", &idx))
8478 {
8479 afi = strmatch(argv[idx]->text, "ipv6") ? AFI_IP6 : AFI_IP;
8480 if (argv_find (argv, argc, "unicast", &idx) || argv_find (argv, argc, "multicast", &idx))
8481 safi = bgp_vty_safi_from_arg (argv[idx]->text);
8482 }
8483
8484 int uj = use_json (argc, argv);
8485
8486 struct bgp *bgp = bgp_lookup_by_name (vrf);
8487 if (bgp == NULL)
8488 {
8489 vty_out (vty, "Can't find BGP instance %s%s", vrf, VTY_NEWLINE);
8490 return CMD_WARNING;
8491 }
8492
8493 argv_find (argv, argc, "large-community-list", &idx);
8494 return bgp_show_lcommunity_list (vty, bgp, argv[idx+1]->arg, afi, safi, uj);
8495 }
8496 DEFUN (show_ip_bgp_large_community,
8497 show_ip_bgp_large_community_cmd,
8498 "show [ip] bgp [<view|vrf> WORD] [<ipv4|ipv6> [<unicast|multicast|vpn|encap|labeled-unicast>]] large-community [AA:BB:CC] [json]",
8499 SHOW_STR
8500 IP_STR
8501 BGP_STR
8502 BGP_INSTANCE_HELP_STR
8503 "Address Family\n"
8504 "Address Family\n"
8505 "Address Family modifier\n"
8506 "Address Family modifier\n"
8507 "Address Family modifier\n"
8508 "Address Family modifier\n"
8509 "Address Family modifier\n"
8510 "Display routes matching the large-communities\n"
8511 "List of large-community numbers\n"
8512 JSON_STR)
8513 {
8514 char *vrf = NULL;
8515 afi_t afi = AFI_IP6;
8516 safi_t safi = SAFI_UNICAST;
8517 int idx = 0;
8518
8519 if (argv_find (argv, argc, "ip", &idx))
8520 afi = AFI_IP;
8521 if (argv_find (argv, argc, "view", &idx) || argv_find (argv, argc, "vrf", &idx))
8522 vrf = argv[++idx]->arg;
8523 if (argv_find (argv, argc, "ipv4", &idx) || argv_find (argv, argc, "ipv6", &idx))
8524 {
8525 afi = strmatch(argv[idx]->text, "ipv6") ? AFI_IP6 : AFI_IP;
8526 if (argv_find (argv, argc, "unicast", &idx) || argv_find (argv, argc, "multicast", &idx))
8527 safi = bgp_vty_safi_from_arg (argv[idx]->text);
8528 }
8529
8530 int uj = use_json (argc, argv);
8531
8532 struct bgp *bgp = bgp_lookup_by_name (vrf);
8533 if (bgp == NULL)
8534 {
8535 vty_out (vty, "Can't find BGP instance %s%s", vrf, VTY_NEWLINE);
8536 return CMD_WARNING;
8537 }
8538
8539 if (argv_find (argv, argc, "AA:BB:CC", &idx))
8540 return bgp_show_lcommunity (vty, bgp, argc, argv, afi, safi, uj);
8541 else
8542 return bgp_show (vty, bgp, afi, safi, bgp_show_type_lcommunity_all, NULL, uj);
8543 }
8544
8545 static int bgp_table_stats (struct vty *vty, struct bgp *bgp, afi_t afi, safi_t safi);
8546
8547 /* BGP route print out function. */
8548 DEFUN (show_ip_bgp,
8549 show_ip_bgp_cmd,
8550 "show [ip] bgp [<view|vrf> WORD] ["BGP_AFI_CMD_STR" ["BGP_SAFI_CMD_STR"]]\
8551 [<\
8552 cidr-only\
8553 |dampening <flap-statistics|dampened-paths|parameters>\
8554 |route-map WORD\
8555 |prefix-list WORD\
8556 |filter-list WORD\
8557 |statistics\
8558 |community [<AA:NN|local-AS|no-advertise|no-export> [exact-match]]\
8559 |community-list <(1-500)|WORD> [exact-match]\
8560 |A.B.C.D/M longer-prefixes\
8561 |X:X::X:X/M longer-prefixes>\
8562 ] [json]",
8563 SHOW_STR
8564 IP_STR
8565 BGP_STR
8566 BGP_INSTANCE_HELP_STR
8567 BGP_AFI_HELP_STR
8568 BGP_SAFI_HELP_STR
8569 "Display only routes with non-natural netmasks\n"
8570 "Display detailed information about dampening\n"
8571 "Display flap statistics of routes\n"
8572 "Display paths suppressed due to dampening\n"
8573 "Display detail of configured dampening parameters\n"
8574 "Display routes matching the route-map\n"
8575 "A route-map to match on\n"
8576 "Display routes conforming to the prefix-list\n"
8577 "Prefix-list name\n"
8578 "Display routes conforming to the filter-list\n"
8579 "Regular expression access list name\n"
8580 "BGP RIB advertisement statistics\n"
8581 "Display routes matching the communities\n"
8582 COMMUNITY_AANN_STR
8583 "Do not send outside local AS (well-known community)\n"
8584 "Do not advertise to any peer (well-known community)\n"
8585 "Do not export to next AS (well-known community)\n"
8586 "Exact match of the communities\n"
8587 "Display routes matching the community-list\n"
8588 "community-list number\n"
8589 "community-list name\n"
8590 "Exact match of the communities\n"
8591 "IPv4 prefix\n"
8592 "Display route and more specific routes\n"
8593 "IPv6 prefix\n"
8594 "Display route and more specific routes\n"
8595 JSON_STR)
8596 {
8597 afi_t afi = AFI_IP6;
8598 safi_t safi = SAFI_UNICAST;
8599 int exact_match = 0;
8600 enum bgp_show_type sh_type = bgp_show_type_normal;
8601 struct bgp *bgp = NULL;
8602 int idx = 0;
8603
8604 bgp_vty_find_and_parse_afi_safi_bgp (vty, argv, argc, &idx, &afi, &safi, &bgp);
8605 if (!idx)
8606 return CMD_WARNING;
8607
8608 int uj = use_json (argc, argv);
8609 if (uj) argc--;
8610
8611 if (argv_find(argv, argc, "cidr-only", &idx))
8612 return bgp_show (vty, bgp, afi, safi, bgp_show_type_cidr_only, NULL, uj);
8613
8614 if (argv_find(argv, argc, "dampening", &idx))
8615 {
8616 if (argv_find (argv, argc, "dampened-paths", &idx))
8617 return bgp_show (vty, bgp, afi, safi, bgp_show_type_dampend_paths, NULL, uj);
8618 else if (argv_find (argv, argc, "flap-statistics", &idx))
8619 return bgp_show (vty, bgp, afi, safi, bgp_show_type_flap_statistics, NULL, uj);
8620 else if (argv_find (argv, argc, "parameters", &idx))
8621 return bgp_show_dampening_parameters (vty, afi, safi);
8622 }
8623
8624 if (argv_find(argv, argc, "prefix-list", &idx))
8625 return bgp_show_prefix_list (vty, bgp, argv[idx + 1]->arg, afi, safi, bgp_show_type_prefix_list);
8626
8627 if (argv_find(argv, argc, "filter-list", &idx))
8628 return bgp_show_filter_list (vty, bgp, argv[idx + 1]->arg, afi, safi, bgp_show_type_filter_list);
8629
8630 if (argv_find(argv, argc, "statistics", &idx))
8631 return bgp_table_stats (vty, bgp, afi, safi);
8632
8633 if (argv_find(argv, argc, "route-map", &idx))
8634 return bgp_show_route_map (vty, bgp, argv[idx + 1]->arg, afi, safi, bgp_show_type_route_map);
8635
8636 if (argv_find(argv, argc, "community", &idx))
8637 {
8638 /* show a specific community */
8639 if (argv_find (argv, argc, "local-AS", &idx) ||
8640 argv_find (argv, argc, "no-advertise", &idx) ||
8641 argv_find (argv, argc, "no-export", &idx))
8642 {
8643 if (argv_find (argv, argc, "exact_match", &idx))
8644 exact_match = 1;
8645 return bgp_show_community (vty, bgp, argc, argv, exact_match, afi, safi);
8646 }
8647 /* show all communities */
8648 else
8649 return bgp_show (vty, bgp, afi, safi, bgp_show_type_community_all, NULL, uj);
8650 }
8651
8652 if (argv_find(argv, argc, "community-list", &idx))
8653 {
8654 const char *clist_number_or_name = argv[++idx]->arg;
8655 if (++idx < argc && strmatch (argv[idx]->text, "exact-match"))
8656 exact_match = 1;
8657 return bgp_show_community_list (vty, bgp, clist_number_or_name, exact_match, afi, safi);
8658 }
8659 /* prefix-longer */
8660 if (argv_find(argv, argc, "A.B.C.D/M", &idx) || argv_find(argv, argc, "X:X::X:X/M", &idx))
8661 return bgp_show_prefix_longer (vty, bgp, argv[idx]->arg, afi, safi, bgp_show_type_prefix_longer);
8662
8663 if (safi == SAFI_MPLS_VPN)
8664 return bgp_show_mpls_vpn (vty, afi, NULL, bgp_show_type_normal, NULL, 0, uj);
8665 else if (safi == SAFI_ENCAP)
8666 return bgp_show_encap (vty, afi, NULL, bgp_show_type_normal, NULL, 0);
8667 else
8668 return bgp_show (vty, bgp, afi, safi, sh_type, NULL, uj);
8669 }
8670
8671 DEFUN (show_ip_bgp_route,
8672 show_ip_bgp_route_cmd,
8673 "show [ip] bgp [<view|vrf> WORD] ["BGP_AFI_CMD_STR" ["BGP_SAFI_CMD_STR"]]"
8674 "<A.B.C.D|A.B.C.D/M|X:X::X:X|X:X::X:X/M> [<bestpath|multipath>] [json]",
8675 SHOW_STR
8676 IP_STR
8677 BGP_STR
8678 BGP_INSTANCE_HELP_STR
8679 BGP_AFI_HELP_STR
8680 BGP_SAFI_HELP_STR
8681 "Network in the BGP routing table to display\n"
8682 "IPv4 prefix\n"
8683 "Network in the BGP routing table to display\n"
8684 "IPv6 prefix\n"
8685 "Display only the bestpath\n"
8686 "Display only multipaths\n"
8687 JSON_STR)
8688 {
8689 int prefix_check = 0;
8690
8691 afi_t afi = AFI_IP6;
8692 safi_t safi = SAFI_UNICAST;
8693 char *prefix = NULL;
8694 struct bgp *bgp = NULL;
8695 enum bgp_path_type path_type;
8696 u_char uj = use_json(argc, argv);
8697
8698 int idx = 0;
8699
8700 bgp_vty_find_and_parse_afi_safi_bgp (vty, argv, argc, &idx, &afi, &safi, &bgp);
8701 if (!idx)
8702 return CMD_WARNING;
8703
8704 if (!bgp)
8705 {
8706 vty_out (vty, "Specified 'all' vrf's but this command currently only works per view/vrf%s", VTY_NEWLINE);
8707 return CMD_WARNING;
8708 }
8709
8710 /* <A.B.C.D|A.B.C.D/M|X:X::X:X|X:X::X:X/M> */
8711 if (argv_find (argv, argc, "A.B.C.D", &idx) || argv_find (argv, argc, "X:X::X:X", &idx))
8712 prefix_check = 0;
8713 else if (argv_find (argv, argc, "A.B.C.D/M", &idx) || argv_find (argv, argc, "X:X::X:X/M", &idx))
8714 prefix_check = 1;
8715
8716 if ((argv[idx]->type == IPV6_TKN || argv[idx]->type == IPV6_PREFIX_TKN) && afi != AFI_IP6)
8717 {
8718 vty_out (vty, "%% Cannot specify IPv6 address or prefix with IPv4 AFI%s", VTY_NEWLINE);
8719 return CMD_WARNING;
8720 }
8721 if ((argv[idx]->type == IPV4_TKN || argv[idx]->type == IPV4_PREFIX_TKN) && afi != AFI_IP)
8722 {
8723 vty_out (vty, "%% Cannot specify IPv4 address or prefix with IPv6 AFI%s", VTY_NEWLINE);
8724 return CMD_WARNING;
8725 }
8726
8727 prefix = argv[idx]->arg;
8728
8729 /* [<bestpath|multipath>] */
8730 if (argv_find (argv, argc, "bestpath", &idx))
8731 path_type = BGP_PATH_BESTPATH;
8732 else if (argv_find (argv, argc, "multipath", &idx))
8733 path_type = BGP_PATH_MULTIPATH;
8734 else
8735 path_type = BGP_PATH_ALL;
8736
8737 return bgp_show_route (vty, bgp, prefix, afi, safi, NULL, prefix_check, path_type, uj);
8738 }
8739
8740 DEFUN (show_ip_bgp_regexp,
8741 show_ip_bgp_regexp_cmd,
8742 "show [ip] bgp [<view|vrf> WORD] ["BGP_AFI_CMD_STR" ["BGP_SAFI_CMD_STR"]] regexp REGEX...",
8743 SHOW_STR
8744 IP_STR
8745 BGP_STR
8746 BGP_INSTANCE_HELP_STR
8747 BGP_AFI_HELP_STR
8748 BGP_SAFI_HELP_STR
8749 "Display routes matching the AS path regular expression\n"
8750 "A regular-expression to match the BGP AS paths\n")
8751 {
8752 afi_t afi = AFI_IP6;
8753 safi_t safi = SAFI_UNICAST;
8754 struct bgp *bgp = NULL;
8755
8756 int idx = 0;
8757 bgp_vty_find_and_parse_afi_safi_bgp (vty, argv, argc, &idx, &afi, &safi, &bgp);
8758 if (!idx)
8759 return CMD_WARNING;
8760
8761 // get index of regex
8762 argv_find (argv, argc, "regexp", &idx);
8763 idx++;
8764
8765 char *regstr = argv_concat (argv, argc, idx);
8766 int rc = bgp_show_regexp (vty, (const char *) regstr, afi, safi, bgp_show_type_regexp);
8767 XFREE (MTYPE_TMP, regstr);
8768 return rc;
8769 }
8770
8771 DEFUN (show_ip_bgp_instance_all,
8772 show_ip_bgp_instance_all_cmd,
8773 "show [ip] bgp <view|vrf> all ["BGP_AFI_CMD_STR" ["BGP_SAFI_CMD_STR"]] [json]",
8774 SHOW_STR
8775 IP_STR
8776 BGP_STR
8777 BGP_INSTANCE_ALL_HELP_STR
8778 BGP_AFI_HELP_STR
8779 BGP_SAFI_HELP_STR
8780 JSON_STR)
8781 {
8782 afi_t afi = AFI_IP;
8783 safi_t safi = SAFI_UNICAST;
8784 struct bgp *bgp = NULL;
8785
8786 int idx = 0;
8787 bgp_vty_find_and_parse_afi_safi_bgp (vty, argv, argc, &idx, &afi, &safi, &bgp);
8788 if (!idx)
8789 return CMD_WARNING;
8790
8791 int uj = use_json (argc, argv);
8792 if (uj) argc--;
8793
8794 bgp_show_all_instances_routes_vty (vty, afi, safi, uj);
8795 return CMD_SUCCESS;
8796 }
8797
8798 static int
8799 bgp_show_regexp (struct vty *vty, const char *regstr, afi_t afi,
8800 safi_t safi, enum bgp_show_type type)
8801 {
8802 regex_t *regex;
8803 int rc;
8804
8805 regex = bgp_regcomp (regstr);
8806 if (! regex)
8807 {
8808 vty_out (vty, "Can't compile regexp %s%s", regstr, VTY_NEWLINE);
8809 return CMD_WARNING;
8810 }
8811
8812 rc = bgp_show (vty, NULL, afi, safi, type, regex, 0);
8813 bgp_regex_free (regex);
8814 return rc;
8815 }
8816
8817 static int
8818 bgp_show_prefix_list (struct vty *vty, struct bgp *bgp,
8819 const char *prefix_list_str, afi_t afi,
8820 safi_t safi, enum bgp_show_type type)
8821 {
8822 struct prefix_list *plist;
8823
8824 plist = prefix_list_lookup (afi, prefix_list_str);
8825 if (plist == NULL)
8826 {
8827 vty_out (vty, "%% %s is not a valid prefix-list name%s",
8828 prefix_list_str, VTY_NEWLINE);
8829 return CMD_WARNING;
8830 }
8831
8832 return bgp_show (vty, bgp, afi, safi, type, plist, 0);
8833 }
8834
8835 static int
8836 bgp_show_filter_list (struct vty *vty, struct bgp *bgp,
8837 const char *filter, afi_t afi,
8838 safi_t safi, enum bgp_show_type type)
8839 {
8840 struct as_list *as_list;
8841
8842 as_list = as_list_lookup (filter);
8843 if (as_list == NULL)
8844 {
8845 vty_out (vty, "%% %s is not a valid AS-path access-list name%s", filter, VTY_NEWLINE);
8846 return CMD_WARNING;
8847 }
8848
8849 return bgp_show (vty, bgp, afi, safi, type, as_list, 0);
8850 }
8851
8852 static int
8853 bgp_show_route_map (struct vty *vty, struct bgp *bgp,
8854 const char *rmap_str, afi_t afi,
8855 safi_t safi, enum bgp_show_type type)
8856 {
8857 struct route_map *rmap;
8858
8859 rmap = route_map_lookup_by_name (rmap_str);
8860 if (! rmap)
8861 {
8862 vty_out (vty, "%% %s is not a valid route-map name%s",
8863 rmap_str, VTY_NEWLINE);
8864 return CMD_WARNING;
8865 }
8866
8867 return bgp_show (vty, bgp, afi, safi, type, rmap, 0);
8868 }
8869
8870 static int
8871 bgp_show_community (struct vty *vty, struct bgp *bgp, int argc,
8872 struct cmd_token **argv, int exact, afi_t afi, safi_t safi)
8873 {
8874 struct community *com;
8875 struct buffer *b;
8876 int i;
8877 char *str;
8878 int first = 0;
8879 int ret = 0;
8880
8881 b = buffer_new (1024);
8882 for (i = 0; i < argc; i++)
8883 {
8884 if (first)
8885 buffer_putc (b, ' ');
8886 else
8887 {
8888 if ((strcmp (argv[i]->arg, "unicast") == 0) || (strcmp (argv[i]->arg, "multicast") == 0))
8889 continue;
8890 first = 1;
8891 }
8892
8893 buffer_putstr (b, argv[i]->arg);
8894 }
8895 buffer_putc (b, '\0');
8896
8897 str = buffer_getstr (b);
8898 buffer_free (b);
8899
8900 com = community_str2com (str);
8901 XFREE (MTYPE_TMP, str);
8902 if (! com)
8903 {
8904 vty_out (vty, "%% Community malformed: %s", VTY_NEWLINE);
8905 return CMD_WARNING;
8906 }
8907
8908 ret = bgp_show (vty, bgp, afi, safi,
8909 (exact ? bgp_show_type_community_exact :
8910 bgp_show_type_community), com, 0);
8911 community_free (com);
8912
8913 return ret;
8914 }
8915
8916 static int
8917 bgp_show_community_list (struct vty *vty, struct bgp *bgp,
8918 const char *com, int exact,
8919 afi_t afi, safi_t safi)
8920 {
8921 struct community_list *list;
8922
8923 list = community_list_lookup (bgp_clist, com, COMMUNITY_LIST_MASTER);
8924 if (list == NULL)
8925 {
8926 vty_out (vty, "%% %s is not a valid community-list name%s", com,
8927 VTY_NEWLINE);
8928 return CMD_WARNING;
8929 }
8930
8931 return bgp_show (vty, bgp, afi, safi,
8932 (exact ? bgp_show_type_community_list_exact :
8933 bgp_show_type_community_list), list, 0);
8934 }
8935
8936 static int
8937 bgp_show_prefix_longer (struct vty *vty, struct bgp *bgp,
8938 const char *prefix, afi_t afi,
8939 safi_t safi, enum bgp_show_type type)
8940 {
8941 int ret;
8942 struct prefix *p;
8943
8944 p = prefix_new();
8945
8946 ret = str2prefix (prefix, p);
8947 if (! ret)
8948 {
8949 vty_out (vty, "%% Malformed Prefix%s", VTY_NEWLINE);
8950 return CMD_WARNING;
8951 }
8952
8953 ret = bgp_show (vty, bgp, afi, safi, type, p, 0);
8954 prefix_free(p);
8955 return ret;
8956 }
8957
8958 static struct peer *
8959 peer_lookup_in_view (struct vty *vty, struct bgp *bgp,
8960 const char *ip_str, u_char use_json)
8961 {
8962 int ret;
8963 struct peer *peer;
8964 union sockunion su;
8965
8966 /* Get peer sockunion. */
8967 ret = str2sockunion (ip_str, &su);
8968 if (ret < 0)
8969 {
8970 peer = peer_lookup_by_conf_if (bgp, ip_str);
8971 if (!peer)
8972 {
8973 peer = peer_lookup_by_hostname(bgp, ip_str);
8974
8975 if (!peer)
8976 {
8977 if (use_json)
8978 {
8979 json_object *json_no = NULL;
8980 json_no = json_object_new_object();
8981 json_object_string_add(json_no, "malformedAddressOrName", ip_str);
8982 vty_out (vty, "%s%s", json_object_to_json_string(json_no), VTY_NEWLINE);
8983 json_object_free(json_no);
8984 }
8985 else
8986 vty_out (vty, "%% Malformed address or name: %s%s", ip_str, VTY_NEWLINE);
8987 return NULL;
8988 }
8989 }
8990 return peer;
8991 }
8992
8993 /* Peer structure lookup. */
8994 peer = peer_lookup (bgp, &su);
8995 if (! peer)
8996 {
8997 if (use_json)
8998 {
8999 json_object *json_no = NULL;
9000 json_no = json_object_new_object();
9001 json_object_string_add(json_no, "warning","No such neighbor");
9002 vty_out (vty, "%s%s", json_object_to_json_string(json_no), VTY_NEWLINE);
9003 json_object_free(json_no);
9004 }
9005 else
9006 vty_out (vty, "No such neighbor%s", VTY_NEWLINE);
9007 return NULL;
9008 }
9009
9010 return peer;
9011 }
9012
9013 enum bgp_stats
9014 {
9015 BGP_STATS_MAXBITLEN = 0,
9016 BGP_STATS_RIB,
9017 BGP_STATS_PREFIXES,
9018 BGP_STATS_TOTPLEN,
9019 BGP_STATS_UNAGGREGATEABLE,
9020 BGP_STATS_MAX_AGGREGATEABLE,
9021 BGP_STATS_AGGREGATES,
9022 BGP_STATS_SPACE,
9023 BGP_STATS_ASPATH_COUNT,
9024 BGP_STATS_ASPATH_MAXHOPS,
9025 BGP_STATS_ASPATH_TOTHOPS,
9026 BGP_STATS_ASPATH_MAXSIZE,
9027 BGP_STATS_ASPATH_TOTSIZE,
9028 BGP_STATS_ASN_HIGHEST,
9029 BGP_STATS_MAX,
9030 };
9031
9032 static const char *table_stats_strs[] =
9033 {
9034 [BGP_STATS_PREFIXES] = "Total Prefixes",
9035 [BGP_STATS_TOTPLEN] = "Average prefix length",
9036 [BGP_STATS_RIB] = "Total Advertisements",
9037 [BGP_STATS_UNAGGREGATEABLE] = "Unaggregateable prefixes",
9038 [BGP_STATS_MAX_AGGREGATEABLE] = "Maximum aggregateable prefixes",
9039 [BGP_STATS_AGGREGATES] = "BGP Aggregate advertisements",
9040 [BGP_STATS_SPACE] = "Address space advertised",
9041 [BGP_STATS_ASPATH_COUNT] = "Advertisements with paths",
9042 [BGP_STATS_ASPATH_MAXHOPS] = "Longest AS-Path (hops)",
9043 [BGP_STATS_ASPATH_MAXSIZE] = "Largest AS-Path (bytes)",
9044 [BGP_STATS_ASPATH_TOTHOPS] = "Average AS-Path length (hops)",
9045 [BGP_STATS_ASPATH_TOTSIZE] = "Average AS-Path size (bytes)",
9046 [BGP_STATS_ASN_HIGHEST] = "Highest public ASN",
9047 [BGP_STATS_MAX] = NULL,
9048 };
9049
9050 struct bgp_table_stats
9051 {
9052 struct bgp_table *table;
9053 unsigned long long counts[BGP_STATS_MAX];
9054 };
9055
9056 #if 0
9057 #define TALLY_SIGFIG 100000
9058 static unsigned long
9059 ravg_tally (unsigned long count, unsigned long oldavg, unsigned long newval)
9060 {
9061 unsigned long newtot = (count-1) * oldavg + (newval * TALLY_SIGFIG);
9062 unsigned long res = (newtot * TALLY_SIGFIG) / count;
9063 unsigned long ret = newtot / count;
9064
9065 if ((res % TALLY_SIGFIG) > (TALLY_SIGFIG/2))
9066 return ret + 1;
9067 else
9068 return ret;
9069 }
9070 #endif
9071
9072 static int
9073 bgp_table_stats_walker (struct thread *t)
9074 {
9075 struct bgp_node *rn;
9076 struct bgp_node *top;
9077 struct bgp_table_stats *ts = THREAD_ARG (t);
9078 unsigned int space = 0;
9079
9080 if (!(top = bgp_table_top (ts->table)))
9081 return 0;
9082
9083 switch (top->p.family)
9084 {
9085 case AF_INET:
9086 space = IPV4_MAX_BITLEN;
9087 break;
9088 case AF_INET6:
9089 space = IPV6_MAX_BITLEN;
9090 break;
9091 }
9092
9093 ts->counts[BGP_STATS_MAXBITLEN] = space;
9094
9095 for (rn = top; rn; rn = bgp_route_next (rn))
9096 {
9097 struct bgp_info *ri;
9098 struct bgp_node *prn = bgp_node_parent_nolock (rn);
9099 unsigned int rinum = 0;
9100
9101 if (rn == top)
9102 continue;
9103
9104 if (!rn->info)
9105 continue;
9106
9107 ts->counts[BGP_STATS_PREFIXES]++;
9108 ts->counts[BGP_STATS_TOTPLEN] += rn->p.prefixlen;
9109
9110 #if 0
9111 ts->counts[BGP_STATS_AVGPLEN]
9112 = ravg_tally (ts->counts[BGP_STATS_PREFIXES],
9113 ts->counts[BGP_STATS_AVGPLEN],
9114 rn->p.prefixlen);
9115 #endif
9116
9117 /* check if the prefix is included by any other announcements */
9118 while (prn && !prn->info)
9119 prn = bgp_node_parent_nolock (prn);
9120
9121 if (prn == NULL || prn == top)
9122 {
9123 ts->counts[BGP_STATS_UNAGGREGATEABLE]++;
9124 /* announced address space */
9125 if (space)
9126 ts->counts[BGP_STATS_SPACE] += 1 << (space - rn->p.prefixlen);
9127 }
9128 else if (prn->info)
9129 ts->counts[BGP_STATS_MAX_AGGREGATEABLE]++;
9130
9131 for (ri = rn->info; ri; ri = ri->next)
9132 {
9133 rinum++;
9134 ts->counts[BGP_STATS_RIB]++;
9135
9136 if (ri->attr &&
9137 (CHECK_FLAG (ri->attr->flag,
9138 ATTR_FLAG_BIT (BGP_ATTR_ATOMIC_AGGREGATE))))
9139 ts->counts[BGP_STATS_AGGREGATES]++;
9140
9141 /* as-path stats */
9142 if (ri->attr && ri->attr->aspath)
9143 {
9144 unsigned int hops = aspath_count_hops (ri->attr->aspath);
9145 unsigned int size = aspath_size (ri->attr->aspath);
9146 as_t highest = aspath_highest (ri->attr->aspath);
9147
9148 ts->counts[BGP_STATS_ASPATH_COUNT]++;
9149
9150 if (hops > ts->counts[BGP_STATS_ASPATH_MAXHOPS])
9151 ts->counts[BGP_STATS_ASPATH_MAXHOPS] = hops;
9152
9153 if (size > ts->counts[BGP_STATS_ASPATH_MAXSIZE])
9154 ts->counts[BGP_STATS_ASPATH_MAXSIZE] = size;
9155
9156 ts->counts[BGP_STATS_ASPATH_TOTHOPS] += hops;
9157 ts->counts[BGP_STATS_ASPATH_TOTSIZE] += size;
9158 #if 0
9159 ts->counts[BGP_STATS_ASPATH_AVGHOPS]
9160 = ravg_tally (ts->counts[BGP_STATS_ASPATH_COUNT],
9161 ts->counts[BGP_STATS_ASPATH_AVGHOPS],
9162 hops);
9163 ts->counts[BGP_STATS_ASPATH_AVGSIZE]
9164 = ravg_tally (ts->counts[BGP_STATS_ASPATH_COUNT],
9165 ts->counts[BGP_STATS_ASPATH_AVGSIZE],
9166 size);
9167 #endif
9168 if (highest > ts->counts[BGP_STATS_ASN_HIGHEST])
9169 ts->counts[BGP_STATS_ASN_HIGHEST] = highest;
9170 }
9171 }
9172 }
9173 return 0;
9174 }
9175
9176 static int
9177 bgp_table_stats (struct vty *vty, struct bgp *bgp, afi_t afi, safi_t safi)
9178 {
9179 struct bgp_table_stats ts;
9180 unsigned int i;
9181
9182 if (!bgp->rib[afi][safi])
9183 {
9184 vty_out (vty, "%% No RIB exist's for the AFI(%d)/SAFI(%d)%s",
9185 afi, safi, VTY_NEWLINE);
9186 return CMD_WARNING;
9187 }
9188
9189 memset (&ts, 0, sizeof (ts));
9190 ts.table = bgp->rib[afi][safi];
9191 thread_execute (bm->master, bgp_table_stats_walker, &ts, 0);
9192
9193 vty_out (vty, "BGP %s RIB statistics%s%s",
9194 afi_safi_print (afi, safi), VTY_NEWLINE, VTY_NEWLINE);
9195
9196 for (i = 0; i < BGP_STATS_MAX; i++)
9197 {
9198 if (!table_stats_strs[i])
9199 continue;
9200
9201 switch (i)
9202 {
9203 #if 0
9204 case BGP_STATS_ASPATH_AVGHOPS:
9205 case BGP_STATS_ASPATH_AVGSIZE:
9206 case BGP_STATS_AVGPLEN:
9207 vty_out (vty, "%-30s: ", table_stats_strs[i]);
9208 vty_out (vty, "%12.2f",
9209 (float)ts.counts[i] / (float)TALLY_SIGFIG);
9210 break;
9211 #endif
9212 case BGP_STATS_ASPATH_TOTHOPS:
9213 case BGP_STATS_ASPATH_TOTSIZE:
9214 vty_out (vty, "%-30s: ", table_stats_strs[i]);
9215 vty_out (vty, "%12.2f",
9216 ts.counts[i] ?
9217 (float)ts.counts[i] /
9218 (float)ts.counts[BGP_STATS_ASPATH_COUNT]
9219 : 0);
9220 break;
9221 case BGP_STATS_TOTPLEN:
9222 vty_out (vty, "%-30s: ", table_stats_strs[i]);
9223 vty_out (vty, "%12.2f",
9224 ts.counts[i] ?
9225 (float)ts.counts[i] /
9226 (float)ts.counts[BGP_STATS_PREFIXES]
9227 : 0);
9228 break;
9229 case BGP_STATS_SPACE:
9230 vty_out (vty, "%-30s: ", table_stats_strs[i]);
9231 vty_out (vty, "%12llu%s", ts.counts[i], VTY_NEWLINE);
9232 if (ts.counts[BGP_STATS_MAXBITLEN] < 9)
9233 break;
9234 vty_out (vty, "%30s: ", "%% announced ");
9235 vty_out (vty, "%12.2f%s",
9236 100 * (float)ts.counts[BGP_STATS_SPACE] /
9237 (float)((uint64_t)1UL << ts.counts[BGP_STATS_MAXBITLEN]),
9238 VTY_NEWLINE);
9239 vty_out (vty, "%30s: ", "/8 equivalent ");
9240 vty_out (vty, "%12.2f%s",
9241 (float)ts.counts[BGP_STATS_SPACE] /
9242 (float)(1UL << (ts.counts[BGP_STATS_MAXBITLEN] - 8)),
9243 VTY_NEWLINE);
9244 if (ts.counts[BGP_STATS_MAXBITLEN] < 25)
9245 break;
9246 vty_out (vty, "%30s: ", "/24 equivalent ");
9247 vty_out (vty, "%12.2f",
9248 (float)ts.counts[BGP_STATS_SPACE] /
9249 (float)(1UL << (ts.counts[BGP_STATS_MAXBITLEN] - 24)));
9250 break;
9251 default:
9252 vty_out (vty, "%-30s: ", table_stats_strs[i]);
9253 vty_out (vty, "%12llu", ts.counts[i]);
9254 }
9255
9256 vty_out (vty, "%s", VTY_NEWLINE);
9257 }
9258 return CMD_SUCCESS;
9259 }
9260
9261 enum bgp_pcounts
9262 {
9263 PCOUNT_ADJ_IN = 0,
9264 PCOUNT_DAMPED,
9265 PCOUNT_REMOVED,
9266 PCOUNT_HISTORY,
9267 PCOUNT_STALE,
9268 PCOUNT_VALID,
9269 PCOUNT_ALL,
9270 PCOUNT_COUNTED,
9271 PCOUNT_PFCNT, /* the figure we display to users */
9272 PCOUNT_MAX,
9273 };
9274
9275 static const char *pcount_strs[] =
9276 {
9277 [PCOUNT_ADJ_IN] = "Adj-in",
9278 [PCOUNT_DAMPED] = "Damped",
9279 [PCOUNT_REMOVED] = "Removed",
9280 [PCOUNT_HISTORY] = "History",
9281 [PCOUNT_STALE] = "Stale",
9282 [PCOUNT_VALID] = "Valid",
9283 [PCOUNT_ALL] = "All RIB",
9284 [PCOUNT_COUNTED] = "PfxCt counted",
9285 [PCOUNT_PFCNT] = "Useable",
9286 [PCOUNT_MAX] = NULL,
9287 };
9288
9289 struct peer_pcounts
9290 {
9291 unsigned int count[PCOUNT_MAX];
9292 const struct peer *peer;
9293 const struct bgp_table *table;
9294 };
9295
9296 static int
9297 bgp_peer_count_walker (struct thread *t)
9298 {
9299 struct bgp_node *rn;
9300 struct peer_pcounts *pc = THREAD_ARG (t);
9301 const struct peer *peer = pc->peer;
9302
9303 for (rn = bgp_table_top (pc->table); rn; rn = bgp_route_next (rn))
9304 {
9305 struct bgp_adj_in *ain;
9306 struct bgp_info *ri;
9307
9308 for (ain = rn->adj_in; ain; ain = ain->next)
9309 if (ain->peer == peer)
9310 pc->count[PCOUNT_ADJ_IN]++;
9311
9312 for (ri = rn->info; ri; ri = ri->next)
9313 {
9314 char buf[SU_ADDRSTRLEN];
9315
9316 if (ri->peer != peer)
9317 continue;
9318
9319 pc->count[PCOUNT_ALL]++;
9320
9321 if (CHECK_FLAG (ri->flags, BGP_INFO_DAMPED))
9322 pc->count[PCOUNT_DAMPED]++;
9323 if (CHECK_FLAG (ri->flags, BGP_INFO_HISTORY))
9324 pc->count[PCOUNT_HISTORY]++;
9325 if (CHECK_FLAG (ri->flags, BGP_INFO_REMOVED))
9326 pc->count[PCOUNT_REMOVED]++;
9327 if (CHECK_FLAG (ri->flags, BGP_INFO_STALE))
9328 pc->count[PCOUNT_STALE]++;
9329 if (CHECK_FLAG (ri->flags, BGP_INFO_VALID))
9330 pc->count[PCOUNT_VALID]++;
9331 if (!CHECK_FLAG (ri->flags, BGP_INFO_UNUSEABLE))
9332 pc->count[PCOUNT_PFCNT]++;
9333
9334 if (CHECK_FLAG (ri->flags, BGP_INFO_COUNTED))
9335 {
9336 pc->count[PCOUNT_COUNTED]++;
9337 if (CHECK_FLAG (ri->flags, BGP_INFO_UNUSEABLE))
9338 zlog_warn ("%s [pcount] %s/%d is counted but flags 0x%x",
9339 peer->host,
9340 inet_ntop(rn->p.family, &rn->p.u.prefix,
9341 buf, SU_ADDRSTRLEN),
9342 rn->p.prefixlen,
9343 ri->flags);
9344 }
9345 else
9346 {
9347 if (!CHECK_FLAG (ri->flags, BGP_INFO_UNUSEABLE))
9348 zlog_warn ("%s [pcount] %s/%d not counted but flags 0x%x",
9349 peer->host,
9350 inet_ntop(rn->p.family, &rn->p.u.prefix,
9351 buf, SU_ADDRSTRLEN),
9352 rn->p.prefixlen,
9353 ri->flags);
9354 }
9355 }
9356 }
9357 return 0;
9358 }
9359
9360 static int
9361 bgp_peer_counts (struct vty *vty, struct peer *peer, afi_t afi, safi_t safi, u_char use_json)
9362 {
9363 struct peer_pcounts pcounts = { .peer = peer };
9364 unsigned int i;
9365 json_object *json = NULL;
9366 json_object *json_loop = NULL;
9367
9368 if (use_json)
9369 {
9370 json = json_object_new_object();
9371 json_loop = json_object_new_object();
9372 }
9373
9374 if (!peer || !peer->bgp || !peer->afc[afi][safi]
9375 || !peer->bgp->rib[afi][safi])
9376 {
9377 if (use_json)
9378 {
9379 json_object_string_add(json, "warning", "No such neighbor or address family");
9380 vty_out (vty, "%s%s", json_object_to_json_string(json), VTY_NEWLINE);
9381 json_object_free(json);
9382 }
9383 else
9384 vty_out (vty, "%% No such neighbor or address family%s", VTY_NEWLINE);
9385
9386 return CMD_WARNING;
9387 }
9388
9389 memset (&pcounts, 0, sizeof(pcounts));
9390 pcounts.peer = peer;
9391 pcounts.table = peer->bgp->rib[afi][safi];
9392
9393 /* in-place call via thread subsystem so as to record execution time
9394 * * stats for the thread-walk (i.e. ensure this can't be blamed on
9395 * * on just vty_read()).
9396 * */
9397 thread_execute (bm->master, bgp_peer_count_walker, &pcounts, 0);
9398
9399 if (use_json)
9400 {
9401 json_object_string_add(json, "prefixCountsFor", peer->host);
9402 json_object_string_add(json, "multiProtocol", afi_safi_print (afi, safi));
9403 json_object_int_add(json, "pfxCounter", peer->pcount[afi][safi]);
9404
9405 for (i = 0; i < PCOUNT_MAX; i++)
9406 json_object_int_add(json_loop, pcount_strs[i], pcounts.count[i]);
9407
9408 json_object_object_add(json, "ribTableWalkCounters", json_loop);
9409
9410 if (pcounts.count[PCOUNT_PFCNT] != peer->pcount[afi][safi])
9411 {
9412 json_object_string_add(json, "pfxctDriftFor", peer->host);
9413 json_object_string_add(json, "recommended", "Please report this bug, with the above command output");
9414 }
9415 vty_out (vty, "%s%s", json_object_to_json_string(json), VTY_NEWLINE);
9416 json_object_free(json);
9417 }
9418 else
9419 {
9420
9421 if (peer->hostname && bgp_flag_check(peer->bgp, BGP_FLAG_SHOW_HOSTNAME))
9422 {
9423 vty_out (vty, "Prefix counts for %s/%s, %s%s",
9424 peer->hostname, peer->host, afi_safi_print (afi, safi),
9425 VTY_NEWLINE);
9426 }
9427 else
9428 {
9429 vty_out (vty, "Prefix counts for %s, %s%s",
9430 peer->host, afi_safi_print (afi, safi), VTY_NEWLINE);
9431 }
9432
9433 vty_out (vty, "PfxCt: %ld%s", peer->pcount[afi][safi], VTY_NEWLINE);
9434 vty_out (vty, "%sCounts from RIB table walk:%s%s",
9435 VTY_NEWLINE, VTY_NEWLINE, VTY_NEWLINE);
9436
9437 for (i = 0; i < PCOUNT_MAX; i++)
9438 vty_out (vty, "%20s: %-10d%s", pcount_strs[i], pcounts.count[i], VTY_NEWLINE);
9439
9440 if (pcounts.count[PCOUNT_PFCNT] != peer->pcount[afi][safi])
9441 {
9442 vty_out (vty, "%s [pcount] PfxCt drift!%s",
9443 peer->host, VTY_NEWLINE);
9444 vty_out (vty, "Please report this bug, with the above command output%s",
9445 VTY_NEWLINE);
9446 }
9447 }
9448
9449 return CMD_SUCCESS;
9450 }
9451
9452 DEFUN (show_ip_bgp_instance_neighbor_prefix_counts,
9453 show_ip_bgp_instance_neighbor_prefix_counts_cmd,
9454 "show [ip] bgp [<view|vrf> WORD] [<ipv4|ipv6> [<unicast|multicast|vpn|encap|labeled-unicast>]] "
9455 "neighbors <A.B.C.D|X:X::X:X|WORD> prefix-counts [json]",
9456 SHOW_STR
9457 IP_STR
9458 BGP_STR
9459 BGP_INSTANCE_HELP_STR
9460 "Address Family\n"
9461 "Address Family\n"
9462 "Address Family modifier\n"
9463 "Address Family modifier\n"
9464 "Address Family modifier\n"
9465 "Address Family modifier\n"
9466 "Address Family modifier\n"
9467 "Detailed information on TCP and BGP neighbor connections\n"
9468 "Neighbor to display information about\n"
9469 "Neighbor to display information about\n"
9470 "Neighbor on BGP configured interface\n"
9471 "Display detailed prefix count information\n"
9472 JSON_STR)
9473 {
9474 afi_t afi = AFI_IP6;
9475 safi_t safi = SAFI_UNICAST;
9476 struct peer *peer;
9477 int idx = 0;
9478 struct bgp *bgp = NULL;
9479
9480 bgp_vty_find_and_parse_afi_safi_bgp (vty, argv, argc, &idx, &afi, &safi, &bgp);
9481 if (!idx)
9482 return CMD_WARNING;
9483
9484 int uj = use_json (argc, argv);
9485 if (uj) argc--;
9486
9487 argv_find (argv, argc, "neighbors", &idx);
9488 peer = peer_lookup_in_view (vty, bgp, argv[idx+1]->arg, uj);
9489 if (! peer)
9490 return CMD_WARNING;
9491
9492 return bgp_peer_counts (vty, peer, AFI_IP, SAFI_UNICAST, uj);
9493 }
9494
9495 #ifdef KEEP_OLD_VPN_COMMANDS
9496 DEFUN (show_ip_bgp_vpn_neighbor_prefix_counts,
9497 show_ip_bgp_vpn_neighbor_prefix_counts_cmd,
9498 "show [ip] bgp <vpnv4|vpnv6> all neighbors <A.B.C.D|X:X::X:X|WORD> prefix-counts [json]",
9499 SHOW_STR
9500 IP_STR
9501 BGP_STR
9502 BGP_VPNVX_HELP_STR
9503 "Display information about all VPNv4 NLRIs\n"
9504 "Detailed information on TCP and BGP neighbor connections\n"
9505 "Neighbor to display information about\n"
9506 "Neighbor to display information about\n"
9507 "Neighbor on BGP configured interface\n"
9508 "Display detailed prefix count information\n"
9509 JSON_STR)
9510 {
9511 int idx_peer = 6;
9512 struct peer *peer;
9513 u_char uj = use_json(argc, argv);
9514
9515 peer = peer_lookup_in_view (vty, NULL, argv[idx_peer]->arg, uj);
9516 if (! peer)
9517 return CMD_WARNING;
9518
9519 return bgp_peer_counts (vty, peer, AFI_IP, SAFI_MPLS_VPN, uj);
9520 }
9521
9522 DEFUN (show_ip_bgp_vpn_all_route_prefix,
9523 show_ip_bgp_vpn_all_route_prefix_cmd,
9524 "show [ip] bgp <vpnv4|vpnv6> all <A.B.C.D|A.B.C.D/M> [json]",
9525 SHOW_STR
9526 IP_STR
9527 BGP_STR
9528 BGP_VPNVX_HELP_STR
9529 "Display information about all VPNv4 NLRIs\n"
9530 "Network in the BGP routing table to display\n"
9531 "Network in the BGP routing table to display\n"
9532 JSON_STR)
9533 {
9534 int idx = 0;
9535 char *network = NULL;
9536 struct bgp *bgp = bgp_get_default();
9537 if (!bgp)
9538 {
9539 vty_out (vty, "Can't find default instance%s", VTY_NEWLINE);
9540 return CMD_WARNING;
9541 }
9542
9543 if (argv_find (argv, argc, "A.B.C.D", &idx))
9544 network = argv[idx]->arg;
9545 else if (argv_find (argv, argc, "A.B.C.D/M", &idx))
9546 network = argv[idx]->arg;
9547 else
9548 {
9549 vty_out (vty, "Unable to figure out Network%s", VTY_NEWLINE);
9550 return CMD_WARNING;
9551 }
9552
9553 return bgp_show_route (vty, bgp, network, AFI_IP, SAFI_MPLS_VPN, NULL, 0, BGP_PATH_ALL, use_json(argc, argv));
9554 }
9555 #endif /* KEEP_OLD_VPN_COMMANDS */
9556
9557 DEFUN (show_ip_bgp_l2vpn_evpn_all_route_prefix,
9558 show_ip_bgp_l2vpn_evpn_all_route_prefix_cmd,
9559 "show [ip] bgp l2vpn evpn all <A.B.C.D|A.B.C.D/M> [json]",
9560 SHOW_STR
9561 IP_STR
9562 BGP_STR
9563 L2VPN_HELP_STR
9564 EVPN_HELP_STR
9565 "Display information about all EVPN NLRIs\n"
9566 "Network in the BGP routing table to display\n"
9567 "Network in the BGP routing table to display\n"
9568 JSON_STR)
9569 {
9570 int idx = 0;
9571 char *network = NULL;
9572
9573 if (argv_find (argv, argc, "A.B.C.D", &idx))
9574 network = argv[idx]->arg;
9575 else if (argv_find (argv, argc, "A.B.C.D/M", &idx))
9576 network = argv[idx]->arg;
9577 else
9578 {
9579 vty_out (vty, "Unable to figure out Network%s", VTY_NEWLINE);
9580 return CMD_WARNING;
9581 }
9582 return bgp_show_route (vty, NULL, network, AFI_L2VPN, SAFI_EVPN, NULL, 0, BGP_PATH_ALL, use_json(argc, argv));
9583 }
9584
9585 static void
9586 show_adj_route (struct vty *vty, struct peer *peer, afi_t afi, safi_t safi,
9587 int in, const char *rmap_name, u_char use_json, json_object *json)
9588 {
9589 struct bgp_table *table;
9590 struct bgp_adj_in *ain;
9591 struct bgp_adj_out *adj;
9592 unsigned long output_count;
9593 unsigned long filtered_count;
9594 struct bgp_node *rn;
9595 int header1 = 1;
9596 struct bgp *bgp;
9597 int header2 = 1;
9598 struct attr attr;
9599 struct attr_extra extra;
9600 int ret;
9601 struct update_subgroup *subgrp;
9602 json_object *json_scode = NULL;
9603 json_object *json_ocode = NULL;
9604 json_object *json_ar = NULL;
9605 struct peer_af *paf;
9606
9607 if (use_json)
9608 {
9609 json_scode = json_object_new_object();
9610 json_ocode = json_object_new_object();
9611 json_ar = json_object_new_object();
9612
9613 json_object_string_add(json_scode, "suppressed", "s");
9614 json_object_string_add(json_scode, "damped", "d");
9615 json_object_string_add(json_scode, "history", "h");
9616 json_object_string_add(json_scode, "valid", "*");
9617 json_object_string_add(json_scode, "best", ">");
9618 json_object_string_add(json_scode, "multipath", "=");
9619 json_object_string_add(json_scode, "internal", "i");
9620 json_object_string_add(json_scode, "ribFailure", "r");
9621 json_object_string_add(json_scode, "stale", "S");
9622 json_object_string_add(json_scode, "removed", "R");
9623
9624 json_object_string_add(json_ocode, "igp", "i");
9625 json_object_string_add(json_ocode, "egp", "e");
9626 json_object_string_add(json_ocode, "incomplete", "?");
9627 }
9628
9629 bgp = peer->bgp;
9630
9631 if (! bgp)
9632 {
9633 if (use_json)
9634 {
9635 json_object_string_add(json, "alert", "no BGP");
9636 vty_out (vty, "%s%s", json_object_to_json_string(json), VTY_NEWLINE);
9637 json_object_free(json);
9638 }
9639 else
9640 vty_out (vty, "%% No bgp%s", VTY_NEWLINE);
9641 return;
9642 }
9643
9644 table = bgp->rib[afi][safi];
9645
9646 output_count = filtered_count = 0;
9647 subgrp = peer_subgroup(peer, afi, safi);
9648
9649 if (!in && subgrp && CHECK_FLAG (subgrp->sflags, SUBGRP_STATUS_DEFAULT_ORIGINATE))
9650 {
9651 if (use_json)
9652 {
9653 json_object_int_add(json, "bgpTableVersion", table->version);
9654 json_object_string_add(json, "bgpLocalRouterId", inet_ntoa (bgp->router_id));
9655 json_object_object_add(json, "bgpStatusCodes", json_scode);
9656 json_object_object_add(json, "bgpOriginCodes", json_ocode);
9657 json_object_string_add(json, "bgpOriginatingDefaultNetwork", "0.0.0.0");
9658 }
9659 else
9660 {
9661 vty_out (vty, "BGP table version is %" PRIu64 ", local router ID is %s%s", table->version, inet_ntoa (bgp->router_id), VTY_NEWLINE);
9662 vty_out (vty, BGP_SHOW_SCODE_HEADER, VTY_NEWLINE, VTY_NEWLINE);
9663 vty_out (vty, BGP_SHOW_OCODE_HEADER, VTY_NEWLINE, VTY_NEWLINE);
9664
9665 vty_out (vty, "Originating default network 0.0.0.0%s%s",
9666 VTY_NEWLINE, VTY_NEWLINE);
9667 }
9668 header1 = 0;
9669 }
9670
9671 attr.extra = &extra;
9672 for (rn = bgp_table_top (table); rn; rn = bgp_route_next (rn))
9673 {
9674 if (in)
9675 {
9676 for (ain = rn->adj_in; ain; ain = ain->next)
9677 {
9678 if (ain->peer == peer)
9679 {
9680 if (header1)
9681 {
9682 if (use_json)
9683 {
9684 json_object_int_add(json, "bgpTableVersion", 0);
9685 json_object_string_add(json, "bgpLocalRouterId", inet_ntoa (bgp->router_id));
9686 json_object_object_add(json, "bgpStatusCodes", json_scode);
9687 json_object_object_add(json, "bgpOriginCodes", json_ocode);
9688 }
9689 else
9690 {
9691 vty_out (vty, "BGP table version is 0, local router ID is %s%s", inet_ntoa (bgp->router_id), VTY_NEWLINE);
9692 vty_out (vty, BGP_SHOW_SCODE_HEADER, VTY_NEWLINE, VTY_NEWLINE);
9693 vty_out (vty, BGP_SHOW_OCODE_HEADER, VTY_NEWLINE, VTY_NEWLINE);
9694 }
9695 header1 = 0;
9696 }
9697 if (header2)
9698 {
9699 if (!use_json)
9700 vty_out (vty, BGP_SHOW_HEADER, VTY_NEWLINE);
9701 header2 = 0;
9702 }
9703 if (ain->attr)
9704 {
9705 bgp_attr_dup(&attr, ain->attr);
9706 if (bgp_input_modifier(peer, &rn->p, &attr, afi, safi, rmap_name) != RMAP_DENY)
9707 {
9708 route_vty_out_tmp (vty, &rn->p, &attr, safi, use_json, json_ar);
9709 output_count++;
9710 }
9711 else
9712 filtered_count++;
9713 }
9714 }
9715 }
9716 }
9717 else
9718 {
9719 for (adj = rn->adj_out; adj; adj = adj->next)
9720 SUBGRP_FOREACH_PEER(adj->subgroup, paf)
9721 if (paf->peer == peer)
9722 {
9723 if (header1)
9724 {
9725 if (use_json)
9726 {
9727 json_object_int_add(json, "bgpTableVersion", table->version);
9728 json_object_string_add(json, "bgpLocalRouterId", inet_ntoa (bgp->router_id));
9729 json_object_object_add(json, "bgpStatusCodes", json_scode);
9730 json_object_object_add(json, "bgpOriginCodes", json_ocode);
9731 }
9732 else
9733 {
9734 vty_out (vty, "BGP table version is %" PRIu64 ", local router ID is %s%s", table->version,
9735 inet_ntoa (bgp->router_id), VTY_NEWLINE);
9736 vty_out (vty, BGP_SHOW_SCODE_HEADER, VTY_NEWLINE, VTY_NEWLINE);
9737 vty_out (vty, BGP_SHOW_OCODE_HEADER, VTY_NEWLINE, VTY_NEWLINE);
9738 }
9739 header1 = 0;
9740 }
9741
9742 if (header2)
9743 {
9744 if (!use_json)
9745 vty_out (vty, BGP_SHOW_HEADER, VTY_NEWLINE);
9746 header2 = 0;
9747 }
9748
9749 if (adj->attr)
9750 {
9751 bgp_attr_dup(&attr, adj->attr);
9752 ret = bgp_output_modifier(peer, &rn->p, &attr, afi, safi, rmap_name);
9753 if (ret != RMAP_DENY)
9754 {
9755 route_vty_out_tmp (vty, &rn->p, &attr, safi, use_json, json_ar);
9756 output_count++;
9757 }
9758 else
9759 filtered_count++;
9760 }
9761 }
9762 }
9763 }
9764 if (use_json)
9765 json_object_object_add(json, "advertisedRoutes", json_ar);
9766
9767 if (output_count != 0)
9768 {
9769 if (use_json)
9770 json_object_int_add(json, "totalPrefixCounter", output_count);
9771 else
9772 vty_out (vty, "%sTotal number of prefixes %ld%s",
9773 VTY_NEWLINE, output_count, VTY_NEWLINE);
9774 }
9775 if (use_json)
9776 {
9777 vty_out (vty, "%s%s", json_object_to_json_string(json), VTY_NEWLINE);
9778 json_object_free(json);
9779 }
9780
9781 }
9782
9783 static int
9784 peer_adj_routes (struct vty *vty, struct peer *peer, afi_t afi, safi_t safi,
9785 int in, const char *rmap_name, u_char use_json)
9786 {
9787 json_object *json = NULL;
9788
9789 if (use_json)
9790 json = json_object_new_object();
9791
9792 if (!peer || !peer->afc[afi][safi])
9793 {
9794 if (use_json)
9795 {
9796 json_object_string_add(json, "warning", "No such neighbor or address family");
9797 vty_out (vty, "%s%s", json_object_to_json_string(json), VTY_NEWLINE);
9798 json_object_free(json);
9799 }
9800 else
9801 vty_out (vty, "%% No such neighbor or address family%s", VTY_NEWLINE);
9802
9803 return CMD_WARNING;
9804 }
9805
9806 if (in && !CHECK_FLAG(peer->af_flags[afi][safi], PEER_FLAG_SOFT_RECONFIG))
9807 {
9808 if (use_json)
9809 {
9810 json_object_string_add(json, "warning", "Inbound soft reconfiguration not enabled");
9811 vty_out (vty, "%s%s", json_object_to_json_string(json), VTY_NEWLINE);
9812 json_object_free(json);
9813 }
9814 else
9815 vty_out (vty, "%% Inbound soft reconfiguration not enabled%s", VTY_NEWLINE);
9816
9817 return CMD_WARNING;
9818 }
9819
9820 show_adj_route (vty, peer, afi, safi, in, rmap_name, use_json, json);
9821
9822 return CMD_SUCCESS;
9823 }
9824
9825 DEFUN (show_ip_bgp_instance_neighbor_advertised_route,
9826 show_ip_bgp_instance_neighbor_advertised_route_cmd,
9827 "show [ip] bgp [<view|vrf> WORD] ["BGP_AFI_CMD_STR" ["BGP_SAFI_CMD_STR"]] "
9828 "neighbors <A.B.C.D|X:X::X:X|WORD> <received-routes|advertised-routes> [route-map WORD] [json]",
9829 SHOW_STR
9830 IP_STR
9831 BGP_STR
9832 BGP_INSTANCE_HELP_STR
9833 BGP_AFI_HELP_STR
9834 BGP_SAFI_HELP_STR
9835 "Detailed information on TCP and BGP neighbor connections\n"
9836 "Neighbor to display information about\n"
9837 "Neighbor to display information about\n"
9838 "Neighbor on BGP configured interface\n"
9839 "Display the received routes from neighbor\n"
9840 "Display the routes advertised to a BGP neighbor\n"
9841 "Route-map to modify the attributes\n"
9842 "Name of the route map\n"
9843 JSON_STR)
9844 {
9845 afi_t afi = AFI_IP6;
9846 safi_t safi = SAFI_UNICAST;
9847 char *rmap_name = NULL;
9848 char *peerstr = NULL;
9849 int rcvd = 0;
9850 struct bgp *bgp = NULL;
9851 struct peer *peer;
9852
9853 int idx = 0;
9854
9855 bgp_vty_find_and_parse_afi_safi_bgp (vty, argv, argc, &idx, &afi, &safi, &bgp);
9856 if (!idx)
9857 return CMD_WARNING;
9858
9859 int uj = use_json (argc, argv);
9860 if (uj) argc--;
9861
9862 /* neighbors <A.B.C.D|X:X::X:X|WORD> */
9863 argv_find (argv, argc, "neighbors", &idx);
9864 peerstr = argv[++idx]->arg;
9865
9866 peer = peer_lookup_in_view (vty, bgp, peerstr, uj);
9867 if (! peer)
9868 return CMD_WARNING;
9869
9870 if (argv_find (argv, argc, "received-routes", &idx))
9871 rcvd = 1;
9872 if (argv_find (argv, argc, "advertised-routes", &idx))
9873 rcvd = 0;
9874 if (argv_find (argv, argc, "route-map", &idx))
9875 rmap_name = argv[++idx]->arg;
9876
9877 return peer_adj_routes (vty, peer, afi, safi, rcvd, rmap_name, uj);
9878 }
9879
9880 DEFUN (show_ip_bgp_neighbor_received_prefix_filter,
9881 show_ip_bgp_neighbor_received_prefix_filter_cmd,
9882 "show [ip] bgp [<ipv4|ipv6> [unicast]] neighbors <A.B.C.D|X:X::X:X|WORD> received prefix-filter [json]",
9883 SHOW_STR
9884 IP_STR
9885 BGP_STR
9886 "Address Family\n"
9887 "Address Family\n"
9888 "Address Family modifier\n"
9889 "Detailed information on TCP and BGP neighbor connections\n"
9890 "Neighbor to display information about\n"
9891 "Neighbor to display information about\n"
9892 "Neighbor on BGP configured interface\n"
9893 "Display information received from a BGP neighbor\n"
9894 "Display the prefixlist filter\n"
9895 JSON_STR)
9896 {
9897 afi_t afi = AFI_IP6;
9898 safi_t safi = SAFI_UNICAST;
9899 char *peerstr = NULL;
9900
9901 char name[BUFSIZ];
9902 union sockunion su;
9903 struct peer *peer;
9904 int count, ret;
9905
9906 int idx = 0;
9907
9908 /* show [ip] bgp */
9909 if (argv_find (argv, argc, "ip", &idx))
9910 afi = AFI_IP;
9911 /* [<ipv4|ipv6> [unicast]] */
9912 if (argv_find (argv, argc, "ipv4", &idx))
9913 afi = AFI_IP;
9914 if (argv_find (argv, argc, "ipv6", &idx))
9915 afi = AFI_IP6;
9916 /* neighbors <A.B.C.D|X:X::X:X|WORD> */
9917 argv_find (argv, argc, "neighbors", &idx);
9918 peerstr = argv[++idx]->arg;
9919
9920 u_char uj = use_json(argc, argv);
9921
9922 ret = str2sockunion (peerstr, &su);
9923 if (ret < 0)
9924 {
9925 peer = peer_lookup_by_conf_if (NULL, peerstr);
9926 if (! peer)
9927 {
9928 if (uj)
9929 vty_out (vty, "{}%s", VTY_NEWLINE);
9930 else
9931 vty_out (vty, "%% Malformed address or name: %s%s", peerstr, VTY_NEWLINE);
9932 return CMD_WARNING;
9933 }
9934 }
9935 else
9936 {
9937 peer = peer_lookup (NULL, &su);
9938 if (! peer)
9939 {
9940 if (uj)
9941 vty_out (vty, "{}%s", VTY_NEWLINE);
9942 else
9943 vty_out (vty, "No peer%s", VTY_NEWLINE);
9944 return CMD_WARNING;
9945 }
9946 }
9947
9948 sprintf (name, "%s.%d.%d", peer->host, afi, safi);
9949 count = prefix_bgp_show_prefix_list (NULL, afi, name, uj);
9950 if (count)
9951 {
9952 if (!uj)
9953 vty_out (vty, "Address Family: %s%s", afi_safi_print(afi, safi), VTY_NEWLINE);
9954 prefix_bgp_show_prefix_list (vty, afi, name, uj);
9955 }
9956 else
9957 {
9958 if (uj)
9959 vty_out (vty, "{}%s", VTY_NEWLINE);
9960 else
9961 vty_out (vty, "No functional output%s", VTY_NEWLINE);
9962 }
9963
9964 return CMD_SUCCESS;
9965 }
9966
9967 static int
9968 bgp_show_neighbor_route (struct vty *vty, struct peer *peer, afi_t afi,
9969 safi_t safi, enum bgp_show_type type, u_char use_json)
9970 {
9971 if (! peer || ! peer->afc[afi][safi])
9972 {
9973 if (use_json)
9974 {
9975 json_object *json_no = NULL;
9976 json_no = json_object_new_object();
9977 json_object_string_add(json_no, "warning", "No such neighbor or address family");
9978 vty_out (vty, "%s%s", json_object_to_json_string(json_no), VTY_NEWLINE);
9979 json_object_free(json_no);
9980 }
9981 else
9982 vty_out (vty, "%% No such neighbor or address family%s", VTY_NEWLINE);
9983 return CMD_WARNING;
9984 }
9985
9986 return bgp_show (vty, peer->bgp, afi, safi, type, &peer->su, use_json);
9987 }
9988
9989 DEFUN (show_ip_bgp_neighbor_routes,
9990 show_ip_bgp_neighbor_routes_cmd,
9991 "show [ip] bgp [<view|vrf> WORD] ["BGP_AFI_CMD_STR" ["BGP_SAFI_CMD_STR"]] "
9992 "neighbors <A.B.C.D|X:X::X:X|WORD> <flap-statistics|dampened-routes|routes> [json]",
9993 SHOW_STR
9994 IP_STR
9995 BGP_STR
9996 BGP_INSTANCE_HELP_STR
9997 BGP_AFI_HELP_STR
9998 BGP_SAFI_HELP_STR
9999 "Detailed information on TCP and BGP neighbor connections\n"
10000 "Neighbor to display information about\n"
10001 "Neighbor to display information about\n"
10002 "Neighbor on BGP configured interface\n"
10003 "Display flap statistics of the routes learned from neighbor\n"
10004 "Display the dampened routes received from neighbor\n"
10005 "Display routes learned from neighbor\n"
10006 JSON_STR)
10007 {
10008 char *peerstr = NULL;
10009 struct bgp *bgp = NULL;
10010 afi_t afi = AFI_IP6;
10011 safi_t safi = SAFI_UNICAST;
10012 struct peer *peer;
10013 enum bgp_show_type sh_type = bgp_show_type_neighbor;
10014
10015 int idx = 0;
10016
10017 bgp_vty_find_and_parse_afi_safi_bgp (vty, argv, argc, &idx, &afi, &safi, &bgp);
10018 if (!idx)
10019 return CMD_WARNING;
10020
10021 int uj = use_json (argc, argv);
10022 if (uj) argc--;
10023
10024 /* neighbors <A.B.C.D|X:X::X:X|WORD> */
10025 argv_find (argv, argc, "neighbors", &idx);
10026 peerstr = argv[++idx]->arg;
10027
10028 peer = peer_lookup_in_view (vty, bgp, peerstr, uj);
10029 if (! peer)
10030 {
10031 vty_out (vty, "No such neighbor%s", VTY_NEWLINE);
10032 return CMD_WARNING;
10033 }
10034
10035 if (argv_find (argv, argc, "flap-statistics", &idx))
10036 sh_type = bgp_show_type_flap_neighbor;
10037 else if (argv_find (argv, argc, "dampened-routes", &idx))
10038 sh_type = bgp_show_type_damp_neighbor;
10039 else if (argv_find (argv, argc, "routes", &idx))
10040 sh_type = bgp_show_type_neighbor;
10041
10042 return bgp_show_neighbor_route (vty, peer, afi, safi, sh_type, uj);
10043 }
10044
10045 struct bgp_table *bgp_distance_table[AFI_MAX][SAFI_MAX];
10046
10047 struct bgp_distance
10048 {
10049 /* Distance value for the IP source prefix. */
10050 u_char distance;
10051
10052 /* Name of the access-list to be matched. */
10053 char *access_list;
10054 };
10055
10056 DEFUN (show_bgp_afi_vpn_rd_route,
10057 show_bgp_afi_vpn_rd_route_cmd,
10058 "show bgp "BGP_AFI_CMD_STR" vpn rd ASN:nn_or_IP-address:nn <A.B.C.D/M|X:X::X:X/M> [json]",
10059 SHOW_STR
10060 BGP_STR
10061 BGP_AFI_HELP_STR
10062 "Address Family modifier\n"
10063 "Display information for a route distinguisher\n"
10064 "Route Distinguisher\n"
10065 "Network in the BGP routing table to display\n"
10066 "Network in the BGP routing table to display\n"
10067 JSON_STR)
10068 {
10069 int ret;
10070 struct prefix_rd prd;
10071 afi_t afi = AFI_MAX;
10072 int idx = 0;
10073
10074 argv_find_and_parse_afi (argv, argc, &idx, &afi);
10075 ret = str2prefix_rd (argv[5]->arg, &prd);
10076 if (! ret)
10077 {
10078 vty_out (vty, "%% Malformed Route Distinguisher%s", VTY_NEWLINE);
10079 return CMD_WARNING;
10080 }
10081 return bgp_show_route (vty, NULL, argv[6]->arg, afi, SAFI_MPLS_VPN, &prd, 0, BGP_PATH_ALL, use_json (argc, argv));
10082 }
10083
10084 static struct bgp_distance *
10085 bgp_distance_new (void)
10086 {
10087 return XCALLOC (MTYPE_BGP_DISTANCE, sizeof (struct bgp_distance));
10088 }
10089
10090 static void
10091 bgp_distance_free (struct bgp_distance *bdistance)
10092 {
10093 XFREE (MTYPE_BGP_DISTANCE, bdistance);
10094 }
10095
10096 static int
10097 bgp_distance_set (struct vty *vty, const char *distance_str,
10098 const char *ip_str, const char *access_list_str)
10099 {
10100 int ret;
10101 afi_t afi;
10102 safi_t safi;
10103 struct prefix p;
10104 u_char distance;
10105 struct bgp_node *rn;
10106 struct bgp_distance *bdistance;
10107
10108 afi = bgp_node_afi (vty);
10109 safi = bgp_node_safi (vty);
10110
10111 ret = str2prefix (ip_str, &p);
10112 if (ret == 0)
10113 {
10114 vty_out (vty, "Malformed prefix%s", VTY_NEWLINE);
10115 return CMD_WARNING;
10116 }
10117
10118 distance = atoi (distance_str);
10119
10120 /* Get BGP distance node. */
10121 rn = bgp_node_get (bgp_distance_table[afi][safi], (struct prefix *) &p);
10122 if (rn->info)
10123 {
10124 bdistance = rn->info;
10125 bgp_unlock_node (rn);
10126 }
10127 else
10128 {
10129 bdistance = bgp_distance_new ();
10130 rn->info = bdistance;
10131 }
10132
10133 /* Set distance value. */
10134 bdistance->distance = distance;
10135
10136 /* Reset access-list configuration. */
10137 if (bdistance->access_list)
10138 {
10139 XFREE(MTYPE_AS_LIST, bdistance->access_list);
10140 bdistance->access_list = NULL;
10141 }
10142 if (access_list_str)
10143 bdistance->access_list = XSTRDUP(MTYPE_AS_LIST, access_list_str);
10144
10145 return CMD_SUCCESS;
10146 }
10147
10148 static int
10149 bgp_distance_unset (struct vty *vty, const char *distance_str,
10150 const char *ip_str, const char *access_list_str)
10151 {
10152 int ret;
10153 afi_t afi;
10154 safi_t safi;
10155 struct prefix p;
10156 int distance;
10157 struct bgp_node *rn;
10158 struct bgp_distance *bdistance;
10159
10160 afi = bgp_node_afi (vty);
10161 safi = bgp_node_safi (vty);
10162
10163 ret = str2prefix (ip_str, &p);
10164 if (ret == 0)
10165 {
10166 vty_out (vty, "Malformed prefix%s", VTY_NEWLINE);
10167 return CMD_WARNING;
10168 }
10169
10170 rn = bgp_node_lookup (bgp_distance_table[afi][safi], (struct prefix *)&p);
10171 if (! rn)
10172 {
10173 vty_out (vty, "Can't find specified prefix%s", VTY_NEWLINE);
10174 return CMD_WARNING;
10175 }
10176
10177 bdistance = rn->info;
10178 distance = atoi(distance_str);
10179
10180 if (bdistance->distance != distance)
10181 {
10182 vty_out (vty, "Distance does not match configured%s", VTY_NEWLINE);
10183 return CMD_WARNING;
10184 }
10185
10186 if (bdistance->access_list)
10187 XFREE(MTYPE_AS_LIST, bdistance->access_list);
10188 bgp_distance_free (bdistance);
10189
10190 rn->info = NULL;
10191 bgp_unlock_node (rn);
10192 bgp_unlock_node (rn);
10193
10194 return CMD_SUCCESS;
10195 }
10196
10197 /* Apply BGP information to distance method. */
10198 u_char
10199 bgp_distance_apply (struct prefix *p, struct bgp_info *rinfo, afi_t afi,
10200 safi_t safi, struct bgp *bgp)
10201 {
10202 struct bgp_node *rn;
10203 struct prefix q;
10204 struct peer *peer;
10205 struct bgp_distance *bdistance;
10206 struct access_list *alist;
10207 struct bgp_static *bgp_static;
10208
10209 if (! bgp)
10210 return 0;
10211
10212 peer = rinfo->peer;
10213
10214 /* Check source address. */
10215 sockunion2hostprefix (&peer->su, &q);
10216 rn = bgp_node_match (bgp_distance_table[afi][safi], &q);
10217 if (rn)
10218 {
10219 bdistance = rn->info;
10220 bgp_unlock_node (rn);
10221
10222 if (bdistance->access_list)
10223 {
10224 alist = access_list_lookup (afi, bdistance->access_list);
10225 if (alist && access_list_apply (alist, p) == FILTER_PERMIT)
10226 return bdistance->distance;
10227 }
10228 else
10229 return bdistance->distance;
10230 }
10231
10232 /* Backdoor check. */
10233 rn = bgp_node_lookup (bgp->route[afi][safi], p);
10234 if (rn)
10235 {
10236 bgp_static = rn->info;
10237 bgp_unlock_node (rn);
10238
10239 if (bgp_static->backdoor)
10240 {
10241 if (bgp->distance_local[afi][safi])
10242 return bgp->distance_local[afi][safi];
10243 else
10244 return ZEBRA_IBGP_DISTANCE_DEFAULT;
10245 }
10246 }
10247
10248 if (peer->sort == BGP_PEER_EBGP)
10249 {
10250 if (bgp->distance_ebgp[afi][safi])
10251 return bgp->distance_ebgp[afi][safi];
10252 return ZEBRA_EBGP_DISTANCE_DEFAULT;
10253 }
10254 else
10255 {
10256 if (bgp->distance_ibgp[afi][safi])
10257 return bgp->distance_ibgp[afi][safi];
10258 return ZEBRA_IBGP_DISTANCE_DEFAULT;
10259 }
10260 }
10261
10262 DEFUN (bgp_distance,
10263 bgp_distance_cmd,
10264 "distance bgp (1-255) (1-255) (1-255)",
10265 "Define an administrative distance\n"
10266 "BGP distance\n"
10267 "Distance for routes external to the AS\n"
10268 "Distance for routes internal to the AS\n"
10269 "Distance for local routes\n")
10270 {
10271 VTY_DECLVAR_CONTEXT(bgp, bgp);
10272 int idx_number = 2;
10273 int idx_number_2 = 3;
10274 int idx_number_3 = 4;
10275 afi_t afi;
10276 safi_t safi;
10277
10278 afi = bgp_node_afi (vty);
10279 safi = bgp_node_safi (vty);
10280
10281 bgp->distance_ebgp[afi][safi] = atoi (argv[idx_number]->arg);
10282 bgp->distance_ibgp[afi][safi] = atoi (argv[idx_number_2]->arg);
10283 bgp->distance_local[afi][safi] = atoi (argv[idx_number_3]->arg);
10284 return CMD_SUCCESS;
10285 }
10286
10287 DEFUN (no_bgp_distance,
10288 no_bgp_distance_cmd,
10289 "no distance bgp [(1-255) (1-255) (1-255)]",
10290 NO_STR
10291 "Define an administrative distance\n"
10292 "BGP distance\n"
10293 "Distance for routes external to the AS\n"
10294 "Distance for routes internal to the AS\n"
10295 "Distance for local routes\n")
10296 {
10297 VTY_DECLVAR_CONTEXT(bgp, bgp);
10298 afi_t afi;
10299 safi_t safi;
10300
10301 afi = bgp_node_afi (vty);
10302 safi = bgp_node_safi (vty);
10303
10304 bgp->distance_ebgp[afi][safi] = 0;
10305 bgp->distance_ibgp[afi][safi] = 0;
10306 bgp->distance_local[afi][safi] = 0;
10307 return CMD_SUCCESS;
10308 }
10309
10310
10311 DEFUN (bgp_distance_source,
10312 bgp_distance_source_cmd,
10313 "distance (1-255) A.B.C.D/M",
10314 "Define an administrative distance\n"
10315 "Administrative distance\n"
10316 "IP source prefix\n")
10317 {
10318 int idx_number = 1;
10319 int idx_ipv4_prefixlen = 2;
10320 bgp_distance_set (vty, argv[idx_number]->arg, argv[idx_ipv4_prefixlen]->arg, NULL);
10321 return CMD_SUCCESS;
10322 }
10323
10324 DEFUN (no_bgp_distance_source,
10325 no_bgp_distance_source_cmd,
10326 "no distance (1-255) A.B.C.D/M",
10327 NO_STR
10328 "Define an administrative distance\n"
10329 "Administrative distance\n"
10330 "IP source prefix\n")
10331 {
10332 int idx_number = 2;
10333 int idx_ipv4_prefixlen = 3;
10334 bgp_distance_unset (vty, argv[idx_number]->arg, argv[idx_ipv4_prefixlen]->arg, NULL);
10335 return CMD_SUCCESS;
10336 }
10337
10338 DEFUN (bgp_distance_source_access_list,
10339 bgp_distance_source_access_list_cmd,
10340 "distance (1-255) A.B.C.D/M WORD",
10341 "Define an administrative distance\n"
10342 "Administrative distance\n"
10343 "IP source prefix\n"
10344 "Access list name\n")
10345 {
10346 int idx_number = 1;
10347 int idx_ipv4_prefixlen = 2;
10348 int idx_word = 3;
10349 bgp_distance_set (vty, argv[idx_number]->arg, argv[idx_ipv4_prefixlen]->arg, argv[idx_word]->arg);
10350 return CMD_SUCCESS;
10351 }
10352
10353 DEFUN (no_bgp_distance_source_access_list,
10354 no_bgp_distance_source_access_list_cmd,
10355 "no distance (1-255) A.B.C.D/M WORD",
10356 NO_STR
10357 "Define an administrative distance\n"
10358 "Administrative distance\n"
10359 "IP source prefix\n"
10360 "Access list name\n")
10361 {
10362 int idx_number = 2;
10363 int idx_ipv4_prefixlen = 3;
10364 int idx_word = 4;
10365 bgp_distance_unset (vty, argv[idx_number]->arg, argv[idx_ipv4_prefixlen]->arg, argv[idx_word]->arg);
10366 return CMD_SUCCESS;
10367 }
10368
10369 DEFUN (ipv6_bgp_distance_source,
10370 ipv6_bgp_distance_source_cmd,
10371 "distance (1-255) X:X::X:X/M",
10372 "Define an administrative distance\n"
10373 "Administrative distance\n"
10374 "IP source prefix\n")
10375 {
10376 bgp_distance_set (vty, argv[1]->arg, argv[2]->arg, NULL);
10377 return CMD_SUCCESS;
10378 }
10379
10380 DEFUN (no_ipv6_bgp_distance_source,
10381 no_ipv6_bgp_distance_source_cmd,
10382 "no distance (1-255) X:X::X:X/M",
10383 NO_STR
10384 "Define an administrative distance\n"
10385 "Administrative distance\n"
10386 "IP source prefix\n")
10387 {
10388 bgp_distance_unset (vty, argv[2]->arg, argv[3]->arg, NULL);
10389 return CMD_SUCCESS;
10390 }
10391
10392 DEFUN (ipv6_bgp_distance_source_access_list,
10393 ipv6_bgp_distance_source_access_list_cmd,
10394 "distance (1-255) X:X::X:X/M WORD",
10395 "Define an administrative distance\n"
10396 "Administrative distance\n"
10397 "IP source prefix\n"
10398 "Access list name\n")
10399 {
10400 bgp_distance_set (vty, argv[1]->arg, argv[2]->arg, argv[3]->arg);
10401 return CMD_SUCCESS;
10402 }
10403
10404 DEFUN (no_ipv6_bgp_distance_source_access_list,
10405 no_ipv6_bgp_distance_source_access_list_cmd,
10406 "no distance (1-255) X:X::X:X/M WORD",
10407 NO_STR
10408 "Define an administrative distance\n"
10409 "Administrative distance\n"
10410 "IP source prefix\n"
10411 "Access list name\n")
10412 {
10413 bgp_distance_unset (vty, argv[2]->arg, argv[3]->arg, argv[4]->arg);
10414 return CMD_SUCCESS;
10415 }
10416
10417 DEFUN (bgp_damp_set,
10418 bgp_damp_set_cmd,
10419 "bgp dampening [(1-45) [(1-20000) (1-20000) (1-255)]]",
10420 "BGP Specific commands\n"
10421 "Enable route-flap dampening\n"
10422 "Half-life time for the penalty\n"
10423 "Value to start reusing a route\n"
10424 "Value to start suppressing a route\n"
10425 "Maximum duration to suppress a stable route\n")
10426 {
10427 VTY_DECLVAR_CONTEXT(bgp, bgp);
10428 int idx_half_life = 2;
10429 int idx_reuse = 3;
10430 int idx_suppress = 4;
10431 int idx_max_suppress = 5;
10432 int half = DEFAULT_HALF_LIFE * 60;
10433 int reuse = DEFAULT_REUSE;
10434 int suppress = DEFAULT_SUPPRESS;
10435 int max = 4 * half;
10436
10437 if (argc == 6)
10438 {
10439 half = atoi (argv[idx_half_life]->arg) * 60;
10440 reuse = atoi (argv[idx_reuse]->arg);
10441 suppress = atoi (argv[idx_suppress]->arg);
10442 max = atoi (argv[idx_max_suppress]->arg) * 60;
10443 }
10444 else if (argc == 3)
10445 {
10446 half = atoi (argv[idx_half_life]->arg) * 60;
10447 max = 4 * half;
10448 }
10449
10450 if (suppress < reuse)
10451 {
10452 vty_out (vty, "Suppress value cannot be less than reuse value %s",
10453 VTY_NEWLINE);
10454 return 0;
10455 }
10456
10457 return bgp_damp_enable (bgp, bgp_node_afi (vty), bgp_node_safi (vty),
10458 half, reuse, suppress, max);
10459 }
10460
10461 DEFUN (bgp_damp_unset,
10462 bgp_damp_unset_cmd,
10463 "no bgp dampening [(1-45) [(1-20000) (1-20000) (1-255)]]",
10464 NO_STR
10465 "BGP Specific commands\n"
10466 "Enable route-flap dampening\n"
10467 "Half-life time for the penalty\n"
10468 "Value to start reusing a route\n"
10469 "Value to start suppressing a route\n"
10470 "Maximum duration to suppress a stable route\n")
10471 {
10472 VTY_DECLVAR_CONTEXT(bgp, bgp);
10473 return bgp_damp_disable (bgp, bgp_node_afi (vty), bgp_node_safi (vty));
10474 }
10475
10476 /* Display specified route of BGP table. */
10477 static int
10478 bgp_clear_damp_route (struct vty *vty, const char *view_name,
10479 const char *ip_str, afi_t afi, safi_t safi,
10480 struct prefix_rd *prd, int prefix_check)
10481 {
10482 int ret;
10483 struct prefix match;
10484 struct bgp_node *rn;
10485 struct bgp_node *rm;
10486 struct bgp_info *ri;
10487 struct bgp_info *ri_temp;
10488 struct bgp *bgp;
10489 struct bgp_table *table;
10490
10491 /* BGP structure lookup. */
10492 if (view_name)
10493 {
10494 bgp = bgp_lookup_by_name (view_name);
10495 if (bgp == NULL)
10496 {
10497 vty_out (vty, "%% Can't find BGP instance %s%s", view_name, VTY_NEWLINE);
10498 return CMD_WARNING;
10499 }
10500 }
10501 else
10502 {
10503 bgp = bgp_get_default ();
10504 if (bgp == NULL)
10505 {
10506 vty_out (vty, "%% No BGP process is configured%s", VTY_NEWLINE);
10507 return CMD_WARNING;
10508 }
10509 }
10510
10511 /* Check IP address argument. */
10512 ret = str2prefix (ip_str, &match);
10513 if (! ret)
10514 {
10515 vty_out (vty, "%% address is malformed%s", VTY_NEWLINE);
10516 return CMD_WARNING;
10517 }
10518
10519 match.family = afi2family (afi);
10520
10521 if ((safi == SAFI_MPLS_VPN) || (safi == SAFI_ENCAP) || (safi == SAFI_EVPN))
10522 {
10523 for (rn = bgp_table_top (bgp->rib[AFI_IP][safi]); rn; rn = bgp_route_next (rn))
10524 {
10525 if (prd && memcmp (rn->p.u.val, prd->val, 8) != 0)
10526 continue;
10527
10528 if ((table = rn->info) != NULL)
10529 if ((rm = bgp_node_match (table, &match)) != NULL)
10530 {
10531 if (! prefix_check || rm->p.prefixlen == match.prefixlen)
10532 {
10533 ri = rm->info;
10534 while (ri)
10535 {
10536 if (ri->extra && ri->extra->damp_info)
10537 {
10538 ri_temp = ri->next;
10539 bgp_damp_info_free (ri->extra->damp_info, 1);
10540 ri = ri_temp;
10541 }
10542 else
10543 ri = ri->next;
10544 }
10545 }
10546
10547 bgp_unlock_node (rm);
10548 }
10549 }
10550 }
10551 else
10552 {
10553 if ((rn = bgp_node_match (bgp->rib[afi][safi], &match)) != NULL)
10554 {
10555 if (! prefix_check || rn->p.prefixlen == match.prefixlen)
10556 {
10557 ri = rn->info;
10558 while (ri)
10559 {
10560 if (ri->extra && ri->extra->damp_info)
10561 {
10562 ri_temp = ri->next;
10563 bgp_damp_info_free (ri->extra->damp_info, 1);
10564 ri = ri_temp;
10565 }
10566 else
10567 ri = ri->next;
10568 }
10569 }
10570
10571 bgp_unlock_node (rn);
10572 }
10573 }
10574
10575 return CMD_SUCCESS;
10576 }
10577
10578 DEFUN (clear_ip_bgp_dampening,
10579 clear_ip_bgp_dampening_cmd,
10580 "clear ip bgp dampening",
10581 CLEAR_STR
10582 IP_STR
10583 BGP_STR
10584 "Clear route flap dampening information\n")
10585 {
10586 bgp_damp_info_clean ();
10587 return CMD_SUCCESS;
10588 }
10589
10590 DEFUN (clear_ip_bgp_dampening_prefix,
10591 clear_ip_bgp_dampening_prefix_cmd,
10592 "clear ip bgp dampening A.B.C.D/M",
10593 CLEAR_STR
10594 IP_STR
10595 BGP_STR
10596 "Clear route flap dampening information\n"
10597 "IPv4 prefix\n")
10598 {
10599 int idx_ipv4_prefixlen = 4;
10600 return bgp_clear_damp_route (vty, NULL, argv[idx_ipv4_prefixlen]->arg, AFI_IP,
10601 SAFI_UNICAST, NULL, 1);
10602 }
10603
10604 DEFUN (clear_ip_bgp_dampening_address,
10605 clear_ip_bgp_dampening_address_cmd,
10606 "clear ip bgp dampening A.B.C.D",
10607 CLEAR_STR
10608 IP_STR
10609 BGP_STR
10610 "Clear route flap dampening information\n"
10611 "Network to clear damping information\n")
10612 {
10613 int idx_ipv4 = 4;
10614 return bgp_clear_damp_route (vty, NULL, argv[idx_ipv4]->arg, AFI_IP,
10615 SAFI_UNICAST, NULL, 0);
10616 }
10617
10618 DEFUN (clear_ip_bgp_dampening_address_mask,
10619 clear_ip_bgp_dampening_address_mask_cmd,
10620 "clear ip bgp dampening A.B.C.D A.B.C.D",
10621 CLEAR_STR
10622 IP_STR
10623 BGP_STR
10624 "Clear route flap dampening information\n"
10625 "Network to clear damping information\n"
10626 "Network mask\n")
10627 {
10628 int idx_ipv4 = 4;
10629 int idx_ipv4_2 = 5;
10630 int ret;
10631 char prefix_str[BUFSIZ];
10632
10633 ret = netmask_str2prefix_str (argv[idx_ipv4]->arg, argv[idx_ipv4_2]->arg, prefix_str);
10634 if (! ret)
10635 {
10636 vty_out (vty, "%% Inconsistent address and mask%s", VTY_NEWLINE);
10637 return CMD_WARNING;
10638 }
10639
10640 return bgp_clear_damp_route (vty, NULL, prefix_str, AFI_IP,
10641 SAFI_UNICAST, NULL, 0);
10642 }
10643
10644 /* also used for encap safi */
10645 static int
10646 bgp_config_write_network_vpn (struct vty *vty, struct bgp *bgp,
10647 afi_t afi, safi_t safi, int *write)
10648 {
10649 struct bgp_node *prn;
10650 struct bgp_node *rn;
10651 struct bgp_table *table;
10652 struct prefix *p;
10653 struct prefix_rd *prd;
10654 struct bgp_static *bgp_static;
10655 u_int32_t label;
10656 char buf[SU_ADDRSTRLEN];
10657 char rdbuf[RD_ADDRSTRLEN];
10658
10659 /* Network configuration. */
10660 for (prn = bgp_table_top (bgp->route[afi][safi]); prn; prn = bgp_route_next (prn))
10661 if ((table = prn->info) != NULL)
10662 for (rn = bgp_table_top (table); rn; rn = bgp_route_next (rn))
10663 if ((bgp_static = rn->info) != NULL)
10664 {
10665 p = &rn->p;
10666 prd = (struct prefix_rd *) &prn->p;
10667
10668 /* "address-family" display. */
10669 bgp_config_write_family_header (vty, afi, safi, write);
10670
10671 /* "network" configuration display. */
10672 prefix_rd2str (prd, rdbuf, RD_ADDRSTRLEN);
10673 label = decode_label (bgp_static->tag);
10674
10675 vty_out (vty, " network %s/%d rd %s label %d",
10676 inet_ntop (p->family, &p->u.prefix, buf, SU_ADDRSTRLEN),
10677 p->prefixlen,
10678 rdbuf, label);
10679 if (bgp_static->rmap.name)
10680 vty_out (vty, " route-map %s", bgp_static->rmap.name);
10681 else
10682 {
10683 if (bgp_static->backdoor)
10684 vty_out (vty, " backdoor");
10685 }
10686 vty_out (vty, "%s", VTY_NEWLINE);
10687 }
10688 return 0;
10689 }
10690
10691 static int
10692 bgp_config_write_network_evpn (struct vty *vty, struct bgp *bgp,
10693 afi_t afi, safi_t safi, int *write)
10694 {
10695 struct bgp_node *prn;
10696 struct bgp_node *rn;
10697 struct bgp_table *table;
10698 struct prefix *p;
10699 struct prefix_rd *prd;
10700 struct bgp_static *bgp_static;
10701 char buf[PREFIX_STRLEN];
10702 char buf2[SU_ADDRSTRLEN];
10703 char rdbuf[RD_ADDRSTRLEN];
10704
10705 /* Network configuration. */
10706 for (prn = bgp_table_top (bgp->route[afi][safi]); prn; prn = bgp_route_next (prn))
10707 if ((table = prn->info) != NULL)
10708 for (rn = bgp_table_top (table); rn; rn = bgp_route_next (rn))
10709 if ((bgp_static = rn->info) != NULL)
10710 {
10711 char *macrouter = NULL;
10712 char *esi = NULL;
10713
10714 if(bgp_static->router_mac)
10715 macrouter = prefix_mac2str(bgp_static->router_mac, NULL, 0);
10716 if(bgp_static->eth_s_id)
10717 esi = esi2str(bgp_static->eth_s_id);
10718 p = &rn->p;
10719 prd = (struct prefix_rd *) &prn->p;
10720
10721 /* "address-family" display. */
10722 bgp_config_write_family_header (vty, afi, safi, write);
10723
10724 /* "network" configuration display. */
10725 prefix_rd2str (prd, rdbuf, RD_ADDRSTRLEN);
10726
10727 inet_ntop (AF_INET, &bgp_static->igpnexthop, buf2, SU_ADDRSTRLEN);
10728
10729 prefix2str (p, buf, sizeof (buf)),
10730 vty_out (vty, " network %s rd %s ethtag %u tag %u esi %s gwip %s routermac %s",
10731 buf, rdbuf, p->u.prefix_evpn.eth_tag,
10732 decode_label (bgp_static->tag), esi, buf2 , macrouter);
10733 vty_out (vty, "%s", VTY_NEWLINE);
10734 if (macrouter)
10735 XFREE (MTYPE_TMP, macrouter);
10736 if (esi)
10737 XFREE (MTYPE_TMP, esi);
10738 }
10739 return 0;
10740 }
10741
10742 /* Configuration of static route announcement and aggregate
10743 information. */
10744 int
10745 bgp_config_write_network (struct vty *vty, struct bgp *bgp,
10746 afi_t afi, safi_t safi, int *write)
10747 {
10748 struct bgp_node *rn;
10749 struct prefix *p;
10750 struct bgp_static *bgp_static;
10751 struct bgp_aggregate *bgp_aggregate;
10752 char buf[SU_ADDRSTRLEN];
10753
10754 if ((safi == SAFI_MPLS_VPN) || (safi == SAFI_ENCAP))
10755 return bgp_config_write_network_vpn (vty, bgp, afi, safi, write);
10756
10757 if (afi == AFI_L2VPN && safi == SAFI_EVPN)
10758 return bgp_config_write_network_evpn (vty, bgp, afi, safi, write);
10759
10760 /* Network configuration. */
10761 for (rn = bgp_table_top (bgp->route[afi][safi]); rn; rn = bgp_route_next (rn))
10762 if ((bgp_static = rn->info) != NULL)
10763 {
10764 p = &rn->p;
10765
10766 /* "address-family" display. */
10767 bgp_config_write_family_header (vty, afi, safi, write);
10768
10769 /* "network" configuration display. */
10770 if (bgp_option_check (BGP_OPT_CONFIG_CISCO) && afi == AFI_IP)
10771 {
10772 u_int32_t destination;
10773 struct in_addr netmask;
10774
10775 destination = ntohl (p->u.prefix4.s_addr);
10776 masklen2ip (p->prefixlen, &netmask);
10777 vty_out (vty, " network %s",
10778 inet_ntop (p->family, &p->u.prefix, buf, SU_ADDRSTRLEN));
10779
10780 if ((IN_CLASSC (destination) && p->prefixlen == 24)
10781 || (IN_CLASSB (destination) && p->prefixlen == 16)
10782 || (IN_CLASSA (destination) && p->prefixlen == 8)
10783 || p->u.prefix4.s_addr == 0)
10784 {
10785 /* Natural mask is not display. */
10786 }
10787 else
10788 vty_out (vty, " mask %s", inet_ntoa (netmask));
10789 }
10790 else
10791 {
10792 vty_out (vty, " network %s/%d",
10793 inet_ntop (p->family, &p->u.prefix, buf, SU_ADDRSTRLEN),
10794 p->prefixlen);
10795 }
10796
10797 if (bgp_static->label_index != BGP_INVALID_LABEL_INDEX)
10798 vty_out (vty, " label-index %u", bgp_static->label_index);
10799
10800 if (bgp_static->rmap.name)
10801 vty_out (vty, " route-map %s", bgp_static->rmap.name);
10802 else
10803 {
10804 if (bgp_static->backdoor)
10805 vty_out (vty, " backdoor");
10806 }
10807
10808 vty_out (vty, "%s", VTY_NEWLINE);
10809 }
10810
10811 /* Aggregate-address configuration. */
10812 for (rn = bgp_table_top (bgp->aggregate[afi][safi]); rn; rn = bgp_route_next (rn))
10813 if ((bgp_aggregate = rn->info) != NULL)
10814 {
10815 p = &rn->p;
10816
10817 /* "address-family" display. */
10818 bgp_config_write_family_header (vty, afi, safi, write);
10819
10820 if (bgp_option_check (BGP_OPT_CONFIG_CISCO) && afi == AFI_IP)
10821 {
10822 struct in_addr netmask;
10823
10824 masklen2ip (p->prefixlen, &netmask);
10825 vty_out (vty, " aggregate-address %s %s",
10826 inet_ntop (p->family, &p->u.prefix, buf, SU_ADDRSTRLEN),
10827 inet_ntoa (netmask));
10828 }
10829 else
10830 {
10831 vty_out (vty, " aggregate-address %s/%d",
10832 inet_ntop (p->family, &p->u.prefix, buf, SU_ADDRSTRLEN),
10833 p->prefixlen);
10834 }
10835
10836 if (bgp_aggregate->as_set)
10837 vty_out (vty, " as-set");
10838
10839 if (bgp_aggregate->summary_only)
10840 vty_out (vty, " summary-only");
10841
10842 vty_out (vty, "%s", VTY_NEWLINE);
10843 }
10844
10845 return 0;
10846 }
10847
10848 int
10849 bgp_config_write_distance (struct vty *vty, struct bgp *bgp, afi_t afi,
10850 safi_t safi, int *write)
10851 {
10852 struct bgp_node *rn;
10853 struct bgp_distance *bdistance;
10854
10855 /* Distance configuration. */
10856 if (bgp->distance_ebgp[afi][safi]
10857 && bgp->distance_ibgp[afi][safi]
10858 && bgp->distance_local[afi][safi]
10859 && (bgp->distance_ebgp[afi][safi] != ZEBRA_EBGP_DISTANCE_DEFAULT
10860 || bgp->distance_ibgp[afi][safi] != ZEBRA_IBGP_DISTANCE_DEFAULT
10861 || bgp->distance_local[afi][safi] != ZEBRA_IBGP_DISTANCE_DEFAULT))
10862 {
10863 bgp_config_write_family_header (vty, afi, safi, write);
10864 vty_out (vty, " distance bgp %d %d %d%s",
10865 bgp->distance_ebgp[afi][safi], bgp->distance_ibgp[afi][safi],
10866 bgp->distance_local[afi][safi], VTY_NEWLINE);
10867 }
10868
10869 for (rn = bgp_table_top (bgp_distance_table[afi][safi]); rn;
10870 rn = bgp_route_next (rn))
10871 if ((bdistance = rn->info) != NULL)
10872 {
10873 char buf[PREFIX_STRLEN];
10874
10875 bgp_config_write_family_header (vty, afi, safi, write);
10876 vty_out (vty, " distance %d %s %s%s", bdistance->distance,
10877 prefix2str (&rn->p, buf, sizeof (buf)),
10878 bdistance->access_list ? bdistance->access_list : "",
10879 VTY_NEWLINE);
10880 }
10881
10882 return *write;
10883 }
10884
10885 /* Allocate routing table structure and install commands. */
10886 void
10887 bgp_route_init (void)
10888 {
10889 afi_t afi;
10890 safi_t safi;
10891
10892 /* Init BGP distance table. */
10893 for (afi = AFI_IP; afi < AFI_MAX; afi++)
10894 for (safi = SAFI_UNICAST; safi < SAFI_MAX; safi++)
10895 bgp_distance_table[afi][safi] = bgp_table_init (afi, safi);
10896
10897 /* IPv4 BGP commands. */
10898 install_element (BGP_NODE, &bgp_table_map_cmd);
10899 install_element (BGP_NODE, &bgp_network_cmd);
10900 install_element (BGP_NODE, &bgp_network_mask_cmd);
10901 install_element (BGP_NODE, &bgp_network_mask_natural_cmd);
10902 install_element (BGP_NODE, &bgp_network_route_map_cmd);
10903 install_element (BGP_NODE, &bgp_network_mask_route_map_cmd);
10904 install_element (BGP_NODE, &bgp_network_mask_natural_route_map_cmd);
10905 install_element (BGP_NODE, &bgp_network_backdoor_cmd);
10906 install_element (BGP_NODE, &bgp_network_mask_backdoor_cmd);
10907 install_element (BGP_NODE, &bgp_network_mask_natural_backdoor_cmd);
10908 install_element (BGP_NODE, &no_bgp_table_map_cmd);
10909 install_element (BGP_NODE, &no_bgp_network_cmd);
10910 install_element (BGP_NODE, &no_bgp_network_mask_cmd);
10911 install_element (BGP_NODE, &no_bgp_network_mask_natural_cmd);
10912
10913 install_element (BGP_NODE, &aggregate_address_cmd);
10914 install_element (BGP_NODE, &aggregate_address_mask_cmd);
10915 install_element (BGP_NODE, &no_aggregate_address_cmd);
10916 install_element (BGP_NODE, &no_aggregate_address_mask_cmd);
10917
10918 /* IPv4 unicast configuration. */
10919 install_element (BGP_IPV4_NODE, &bgp_table_map_cmd);
10920 install_element (BGP_IPV4_NODE, &bgp_network_cmd);
10921 install_element (BGP_IPV4_NODE, &bgp_network_mask_cmd);
10922 install_element (BGP_IPV4_NODE, &bgp_network_mask_natural_cmd);
10923 install_element (BGP_IPV4_NODE, &bgp_network_route_map_cmd);
10924 install_element (BGP_IPV4_NODE, &bgp_network_mask_route_map_cmd);
10925 install_element (BGP_IPV4_NODE, &bgp_network_mask_natural_route_map_cmd);
10926 install_element (BGP_IPV4L_NODE, &no_bgp_network_label_index_cmd);
10927 install_element (BGP_IPV4L_NODE, &no_bgp_network_label_index_route_map_cmd);
10928 install_element (BGP_IPV4_NODE, &no_bgp_table_map_cmd);
10929 install_element (BGP_IPV4_NODE, &no_bgp_network_cmd);
10930 install_element (BGP_IPV4_NODE, &no_bgp_network_mask_cmd);
10931 install_element (BGP_IPV4_NODE, &no_bgp_network_mask_natural_cmd);
10932
10933 install_element (BGP_IPV4_NODE, &aggregate_address_cmd);
10934 install_element (BGP_IPV4_NODE, &aggregate_address_mask_cmd);
10935 install_element (BGP_IPV4_NODE, &no_aggregate_address_cmd);
10936 install_element (BGP_IPV4_NODE, &no_aggregate_address_mask_cmd);
10937
10938 /* IPv4 multicast configuration. */
10939 install_element (BGP_IPV4M_NODE, &bgp_table_map_cmd);
10940 install_element (BGP_IPV4M_NODE, &bgp_network_cmd);
10941 install_element (BGP_IPV4M_NODE, &bgp_network_mask_cmd);
10942 install_element (BGP_IPV4M_NODE, &bgp_network_mask_natural_cmd);
10943 install_element (BGP_IPV4M_NODE, &bgp_network_route_map_cmd);
10944 install_element (BGP_IPV4M_NODE, &bgp_network_mask_route_map_cmd);
10945 install_element (BGP_IPV4M_NODE, &bgp_network_mask_natural_route_map_cmd);
10946 install_element (BGP_IPV4M_NODE, &no_bgp_table_map_cmd);
10947 install_element (BGP_IPV4M_NODE, &no_bgp_network_cmd);
10948 install_element (BGP_IPV4M_NODE, &no_bgp_network_mask_cmd);
10949 install_element (BGP_IPV4M_NODE, &no_bgp_network_mask_natural_cmd);
10950 install_element (BGP_IPV4M_NODE, &aggregate_address_cmd);
10951 install_element (BGP_IPV4M_NODE, &aggregate_address_mask_cmd);
10952 install_element (BGP_IPV4M_NODE, &no_aggregate_address_cmd);
10953 install_element (BGP_IPV4M_NODE, &no_aggregate_address_mask_cmd);
10954
10955 /* IPv4 labeled-unicast configuration. */
10956 install_element (BGP_IPV4L_NODE, &bgp_table_map_cmd);
10957 install_element (BGP_IPV4L_NODE, &bgp_network_cmd);
10958 install_element (BGP_IPV4L_NODE, &bgp_network_mask_cmd);
10959 install_element (BGP_IPV4L_NODE, &bgp_network_mask_natural_cmd);
10960 install_element (BGP_IPV4L_NODE, &bgp_network_route_map_cmd);
10961 install_element (BGP_IPV4L_NODE, &bgp_network_mask_route_map_cmd);
10962 install_element (BGP_IPV4L_NODE, &bgp_network_mask_natural_route_map_cmd);
10963 install_element (BGP_IPV4L_NODE, &bgp_network_label_index_cmd);
10964 install_element (BGP_IPV4L_NODE, &bgp_network_label_index_route_map_cmd);
10965 install_element (BGP_IPV4L_NODE, &no_bgp_table_map_cmd);
10966 install_element (BGP_IPV4L_NODE, &no_bgp_network_cmd);
10967 install_element (BGP_IPV4L_NODE, &no_bgp_network_mask_cmd);
10968 install_element (BGP_IPV4L_NODE, &no_bgp_network_mask_natural_cmd);
10969
10970 install_element (VIEW_NODE, &show_ip_bgp_instance_all_cmd);
10971 install_element (VIEW_NODE, &show_ip_bgp_cmd);
10972 install_element (VIEW_NODE, &show_ip_bgp_route_cmd);
10973 install_element (VIEW_NODE, &show_ip_bgp_regexp_cmd);
10974
10975 install_element (VIEW_NODE, &show_ip_bgp_instance_neighbor_advertised_route_cmd);
10976 install_element (VIEW_NODE, &show_ip_bgp_neighbor_routes_cmd);
10977 install_element (VIEW_NODE, &show_ip_bgp_neighbor_received_prefix_filter_cmd);
10978 #ifdef KEEP_OLD_VPN_COMMANDS
10979 install_element (VIEW_NODE, &show_ip_bgp_vpn_all_route_prefix_cmd);
10980 #endif /* KEEP_OLD_VPN_COMMANDS */
10981 install_element (VIEW_NODE, &show_bgp_afi_vpn_rd_route_cmd);
10982 install_element (VIEW_NODE, &show_ip_bgp_l2vpn_evpn_all_route_prefix_cmd);
10983
10984 /* BGP dampening clear commands */
10985 install_element (ENABLE_NODE, &clear_ip_bgp_dampening_cmd);
10986 install_element (ENABLE_NODE, &clear_ip_bgp_dampening_prefix_cmd);
10987
10988 install_element (ENABLE_NODE, &clear_ip_bgp_dampening_address_cmd);
10989 install_element (ENABLE_NODE, &clear_ip_bgp_dampening_address_mask_cmd);
10990
10991 /* prefix count */
10992 install_element (ENABLE_NODE, &show_ip_bgp_instance_neighbor_prefix_counts_cmd);
10993 #ifdef KEEP_OLD_VPN_COMMANDS
10994 install_element (ENABLE_NODE, &show_ip_bgp_vpn_neighbor_prefix_counts_cmd);
10995 #endif /* KEEP_OLD_VPN_COMMANDS */
10996
10997 /* New config IPv6 BGP commands. */
10998 install_element (BGP_IPV6_NODE, &bgp_table_map_cmd);
10999 install_element (BGP_IPV6_NODE, &ipv6_bgp_network_cmd);
11000 install_element (BGP_IPV6_NODE, &ipv6_bgp_network_route_map_cmd);
11001 install_element (BGP_IPV6_NODE, &no_bgp_table_map_cmd);
11002 install_element (BGP_IPV6_NODE, &no_ipv6_bgp_network_cmd);
11003 install_element (BGP_IPV6_NODE, &ipv6_bgp_network_label_index_cmd);
11004 install_element (BGP_IPV6_NODE, &no_ipv6_bgp_network_label_index_cmd);
11005 install_element (BGP_IPV6_NODE, &ipv6_bgp_network_label_index_route_map_cmd);
11006 install_element (BGP_IPV6_NODE, &no_ipv6_bgp_network_label_index_route_map_cmd);
11007
11008 install_element (BGP_IPV6_NODE, &ipv6_aggregate_address_cmd);
11009 install_element (BGP_IPV6_NODE, &no_ipv6_aggregate_address_cmd);
11010
11011 install_element (BGP_IPV6M_NODE, &ipv6_bgp_network_cmd);
11012 install_element (BGP_IPV6M_NODE, &no_ipv6_bgp_network_cmd);
11013
11014 install_element (BGP_IPV6L_NODE, &bgp_table_map_cmd);
11015 install_element (BGP_IPV6L_NODE, &ipv6_bgp_network_cmd);
11016 install_element (BGP_IPV6L_NODE, &ipv6_bgp_network_route_map_cmd);
11017 install_element (BGP_IPV6L_NODE, &no_bgp_table_map_cmd);
11018 install_element (BGP_IPV6L_NODE, &no_ipv6_bgp_network_cmd);
11019
11020 install_element (BGP_NODE, &bgp_distance_cmd);
11021 install_element (BGP_NODE, &no_bgp_distance_cmd);
11022 install_element (BGP_NODE, &bgp_distance_source_cmd);
11023 install_element (BGP_NODE, &no_bgp_distance_source_cmd);
11024 install_element (BGP_NODE, &bgp_distance_source_access_list_cmd);
11025 install_element (BGP_NODE, &no_bgp_distance_source_access_list_cmd);
11026 install_element (BGP_IPV4_NODE, &bgp_distance_cmd);
11027 install_element (BGP_IPV4_NODE, &no_bgp_distance_cmd);
11028 install_element (BGP_IPV4_NODE, &bgp_distance_source_cmd);
11029 install_element (BGP_IPV4_NODE, &no_bgp_distance_source_cmd);
11030 install_element (BGP_IPV4_NODE, &bgp_distance_source_access_list_cmd);
11031 install_element (BGP_IPV4_NODE, &no_bgp_distance_source_access_list_cmd);
11032 install_element (BGP_IPV4M_NODE, &bgp_distance_cmd);
11033 install_element (BGP_IPV4M_NODE, &no_bgp_distance_cmd);
11034 install_element (BGP_IPV4M_NODE, &bgp_distance_source_cmd);
11035 install_element (BGP_IPV4M_NODE, &no_bgp_distance_source_cmd);
11036 install_element (BGP_IPV4M_NODE, &bgp_distance_source_access_list_cmd);
11037 install_element (BGP_IPV4M_NODE, &no_bgp_distance_source_access_list_cmd);
11038 install_element (BGP_IPV6_NODE, &bgp_distance_cmd);
11039 install_element (BGP_IPV6_NODE, &no_bgp_distance_cmd);
11040 install_element (BGP_IPV6_NODE, &ipv6_bgp_distance_source_cmd);
11041 install_element (BGP_IPV6_NODE, &no_ipv6_bgp_distance_source_cmd);
11042 install_element (BGP_IPV6_NODE, &ipv6_bgp_distance_source_access_list_cmd);
11043 install_element (BGP_IPV6_NODE, &no_ipv6_bgp_distance_source_access_list_cmd);
11044 install_element (BGP_IPV6M_NODE, &bgp_distance_cmd);
11045 install_element (BGP_IPV6M_NODE, &no_bgp_distance_cmd);
11046 install_element (BGP_IPV6M_NODE, &ipv6_bgp_distance_source_cmd);
11047 install_element (BGP_IPV6M_NODE, &no_ipv6_bgp_distance_source_cmd);
11048 install_element (BGP_IPV6M_NODE, &ipv6_bgp_distance_source_access_list_cmd);
11049 install_element (BGP_IPV6M_NODE, &no_ipv6_bgp_distance_source_access_list_cmd);
11050
11051 install_element (BGP_NODE, &bgp_damp_set_cmd);
11052 install_element (BGP_NODE, &bgp_damp_unset_cmd);
11053 install_element (BGP_IPV4_NODE, &bgp_damp_set_cmd);
11054 install_element (BGP_IPV4_NODE, &bgp_damp_unset_cmd);
11055
11056 /* IPv4 Multicast Mode */
11057 install_element (BGP_IPV4M_NODE, &bgp_damp_set_cmd);
11058 install_element (BGP_IPV4M_NODE, &bgp_damp_unset_cmd);
11059
11060 /* Large Communities */
11061 install_element (VIEW_NODE, &show_ip_bgp_large_community_list_cmd);
11062 install_element (VIEW_NODE, &show_ip_bgp_large_community_cmd);
11063 }
11064
11065 void
11066 bgp_route_finish (void)
11067 {
11068 afi_t afi;
11069 safi_t safi;
11070
11071 for (afi = AFI_IP; afi < AFI_MAX; afi++)
11072 for (safi = SAFI_UNICAST; safi < SAFI_MAX; safi++)
11073 {
11074 bgp_table_unlock (bgp_distance_table[afi][safi]);
11075 bgp_distance_table[afi][safi] = NULL;
11076 }
11077 }