1 /* BGP routing information
2 * Copyright (C) 1996, 97, 98, 99 Kunihiro Ishiguro
3 * Copyright (C) 2016 Job Snijders <job@instituut.net>
5 * This file is part of GNU Zebra.
7 * GNU Zebra is free software; you can redistribute it and/or modify it
8 * under the terms of the GNU General Public License as published by the
9 * Free Software Foundation; either version 2, or (at your option) any
12 * GNU Zebra is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * General Public License for more details.
17 * You should have received a copy of the GNU General Public License along
18 * with this program; see the file COPYING; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
33 #include "sockunion.h"
36 #include "workqueue.h"
42 #include "bgpd/bgpd.h"
43 #include "bgpd/bgp_table.h"
44 #include "bgpd/bgp_route.h"
45 #include "bgpd/bgp_attr.h"
46 #include "bgpd/bgp_debug.h"
47 #include "bgpd/bgp_aspath.h"
48 #include "bgpd/bgp_regex.h"
49 #include "bgpd/bgp_community.h"
50 #include "bgpd/bgp_ecommunity.h"
51 #include "bgpd/bgp_lcommunity.h"
52 #include "bgpd/bgp_clist.h"
53 #include "bgpd/bgp_packet.h"
54 #include "bgpd/bgp_filter.h"
55 #include "bgpd/bgp_fsm.h"
56 #include "bgpd/bgp_mplsvpn.h"
57 #include "bgpd/bgp_encap.h"
58 #include "bgpd/bgp_nexthop.h"
59 #include "bgpd/bgp_damp.h"
60 #include "bgpd/bgp_advertise.h"
61 #include "bgpd/bgp_zebra.h"
62 #include "bgpd/bgp_vty.h"
63 #include "bgpd/bgp_mpath.h"
64 #include "bgpd/bgp_nht.h"
65 #include "bgpd/bgp_updgrp.h"
66 #include "bgpd/bgp_label.h"
69 #include "bgpd/rfapi/rfapi_backend.h"
70 #include "bgpd/rfapi/vnc_import_bgp.h"
71 #include "bgpd/rfapi/vnc_export_bgp.h"
73 #include "bgpd/bgp_encap_types.h"
74 #include "bgpd/bgp_encap_tlv.h"
75 #include "bgpd/bgp_evpn.h"
76 #include "bgpd/bgp_evpn_vty.h"
79 /* Extern from bgp_dump.c */
80 extern const char *bgp_origin_str
[];
81 extern const char *bgp_origin_long_str
[];
84 bgp_afi_node_get (struct bgp_table
*table
, afi_t afi
, safi_t safi
, struct prefix
*p
,
85 struct prefix_rd
*prd
)
88 struct bgp_node
*prn
= NULL
;
94 if ((safi
== SAFI_MPLS_VPN
) || (safi
== SAFI_ENCAP
) ||
97 prn
= bgp_node_get (table
, (struct prefix
*) prd
);
99 if (prn
->info
== NULL
)
100 prn
->info
= bgp_table_init (afi
, safi
);
102 bgp_unlock_node (prn
);
106 rn
= bgp_node_get (table
, p
);
108 if ((safi
== SAFI_MPLS_VPN
) || (safi
== SAFI_ENCAP
) ||
115 /* Allocate bgp_info_extra */
116 static struct bgp_info_extra
*
117 bgp_info_extra_new (void)
119 struct bgp_info_extra
*new;
120 new = XCALLOC (MTYPE_BGP_ROUTE_EXTRA
, sizeof (struct bgp_info_extra
));
125 bgp_info_extra_free (struct bgp_info_extra
**extra
)
129 if ((*extra
)->damp_info
)
130 bgp_damp_info_free ((*extra
)->damp_info
, 0);
132 (*extra
)->damp_info
= NULL
;
134 XFREE (MTYPE_BGP_ROUTE_EXTRA
, *extra
);
140 /* Get bgp_info extra information for the given bgp_info, lazy allocated
143 struct bgp_info_extra
*
144 bgp_info_extra_get (struct bgp_info
*ri
)
147 ri
->extra
= bgp_info_extra_new();
151 /* Allocate new bgp info structure. */
155 return XCALLOC (MTYPE_BGP_ROUTE
, sizeof (struct bgp_info
));
158 /* Free bgp route information. */
160 bgp_info_free (struct bgp_info
*binfo
)
163 bgp_attr_unintern (&binfo
->attr
);
165 bgp_unlink_nexthop(binfo
);
166 bgp_info_extra_free (&binfo
->extra
);
167 bgp_info_mpath_free (&binfo
->mpath
);
169 peer_unlock (binfo
->peer
); /* bgp_info peer reference */
171 XFREE (MTYPE_BGP_ROUTE
, binfo
);
175 bgp_info_lock (struct bgp_info
*binfo
)
182 bgp_info_unlock (struct bgp_info
*binfo
)
184 assert (binfo
&& binfo
->lock
> 0);
187 if (binfo
->lock
== 0)
190 zlog_debug ("%s: unlocked and freeing", __func__
);
191 zlog_backtrace (LOG_DEBUG
);
193 bgp_info_free (binfo
);
198 if (binfo
->lock
== 1)
200 zlog_debug ("%s: unlocked to 1", __func__
);
201 zlog_backtrace (LOG_DEBUG
);
209 bgp_info_add (struct bgp_node
*rn
, struct bgp_info
*ri
)
211 struct bgp_info
*top
;
223 peer_lock (ri
->peer
); /* bgp_info peer reference */
226 /* Do the actual removal of info from RIB, for use by bgp_process
227 completion callback *only* */
229 bgp_info_reap (struct bgp_node
*rn
, struct bgp_info
*ri
)
232 ri
->next
->prev
= ri
->prev
;
234 ri
->prev
->next
= ri
->next
;
238 bgp_info_mpath_dequeue (ri
);
239 bgp_info_unlock (ri
);
240 bgp_unlock_node (rn
);
244 bgp_info_delete (struct bgp_node
*rn
, struct bgp_info
*ri
)
246 bgp_info_set_flag (rn
, ri
, BGP_INFO_REMOVED
);
247 /* set of previous already took care of pcount */
248 UNSET_FLAG (ri
->flags
, BGP_INFO_VALID
);
251 /* undo the effects of a previous call to bgp_info_delete; typically
252 called when a route is deleted and then quickly re-added before the
253 deletion has been processed */
255 bgp_info_restore (struct bgp_node
*rn
, struct bgp_info
*ri
)
257 bgp_info_unset_flag (rn
, ri
, BGP_INFO_REMOVED
);
258 /* unset of previous already took care of pcount */
259 SET_FLAG (ri
->flags
, BGP_INFO_VALID
);
262 /* Adjust pcount as required */
264 bgp_pcount_adjust (struct bgp_node
*rn
, struct bgp_info
*ri
)
266 struct bgp_table
*table
;
268 assert (rn
&& bgp_node_table (rn
));
269 assert (ri
&& ri
->peer
&& ri
->peer
->bgp
);
271 table
= bgp_node_table (rn
);
273 if (ri
->peer
== ri
->peer
->bgp
->peer_self
)
276 if (!BGP_INFO_COUNTABLE (ri
)
277 && CHECK_FLAG (ri
->flags
, BGP_INFO_COUNTED
))
280 UNSET_FLAG (ri
->flags
, BGP_INFO_COUNTED
);
282 /* slight hack, but more robust against errors. */
283 if (ri
->peer
->pcount
[table
->afi
][table
->safi
])
284 ri
->peer
->pcount
[table
->afi
][table
->safi
]--;
287 zlog_warn ("%s: Asked to decrement 0 prefix count for peer %s",
288 __func__
, ri
->peer
->host
);
289 zlog_backtrace (LOG_WARNING
);
290 zlog_warn ("%s: Please report to Quagga bugzilla", __func__
);
293 else if (BGP_INFO_COUNTABLE (ri
)
294 && !CHECK_FLAG (ri
->flags
, BGP_INFO_COUNTED
))
296 SET_FLAG (ri
->flags
, BGP_INFO_COUNTED
);
297 ri
->peer
->pcount
[table
->afi
][table
->safi
]++;
302 bgp_label_index_differs (struct bgp_info
*ri1
, struct bgp_info
*ri2
)
304 return (!(ri1
->attr
->extra
->label_index
== ri2
->attr
->extra
->label_index
));
307 /* Set/unset bgp_info flags, adjusting any other state as needed.
308 * This is here primarily to keep prefix-count in check.
311 bgp_info_set_flag (struct bgp_node
*rn
, struct bgp_info
*ri
, u_int32_t flag
)
313 SET_FLAG (ri
->flags
, flag
);
315 /* early bath if we know it's not a flag that changes countability state */
316 if (!CHECK_FLAG (flag
, BGP_INFO_VALID
|BGP_INFO_HISTORY
|BGP_INFO_REMOVED
))
319 bgp_pcount_adjust (rn
, ri
);
323 bgp_info_unset_flag (struct bgp_node
*rn
, struct bgp_info
*ri
, u_int32_t flag
)
325 UNSET_FLAG (ri
->flags
, flag
);
327 /* early bath if we know it's not a flag that changes countability state */
328 if (!CHECK_FLAG (flag
, BGP_INFO_VALID
|BGP_INFO_HISTORY
|BGP_INFO_REMOVED
))
331 bgp_pcount_adjust (rn
, ri
);
334 /* Get MED value. If MED value is missing and "bgp bestpath
335 missing-as-worst" is specified, treat it as the worst value. */
337 bgp_med_value (struct attr
*attr
, struct bgp
*bgp
)
339 if (attr
->flag
& ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC
))
343 if (bgp_flag_check (bgp
, BGP_FLAG_MED_MISSING_AS_WORST
))
351 bgp_info_path_with_addpath_rx_str (struct bgp_info
*ri
, char *buf
)
353 if (ri
->addpath_rx_id
)
354 sprintf(buf
, "path %s (addpath rxid %d)", ri
->peer
->host
, ri
->addpath_rx_id
);
356 sprintf(buf
, "path %s", ri
->peer
->host
);
359 /* Compare two bgp route entity. If 'new' is preferable over 'exist' return 1. */
361 bgp_info_cmp (struct bgp
*bgp
, struct bgp_info
*new, struct bgp_info
*exist
,
362 int *paths_eq
, struct bgp_maxpaths_cfg
*mpath_cfg
, int debug
,
365 struct attr
*newattr
, *existattr
;
366 struct attr_extra
*newattre
, *existattre
;
367 bgp_peer_sort_t new_sort
;
368 bgp_peer_sort_t exist_sort
;
370 u_int32_t exist_pref
;
373 u_int32_t new_weight
;
374 u_int32_t exist_weight
;
375 uint32_t newm
, existm
;
376 struct in_addr new_id
;
377 struct in_addr exist_id
;
380 int internal_as_route
;
383 char new_buf
[PATH_ADDPATH_STR_BUFFER
];
384 char exist_buf
[PATH_ADDPATH_STR_BUFFER
];
392 zlog_debug("%s: new is NULL", pfx_buf
);
397 bgp_info_path_with_addpath_rx_str (new, new_buf
);
402 zlog_debug("%s: %s is the initial bestpath", pfx_buf
, new_buf
);
408 bgp_info_path_with_addpath_rx_str (exist
, exist_buf
);
409 zlog_debug("%s: Comparing %s flags 0x%x with %s flags 0x%x",
410 pfx_buf
, new_buf
, new->flags
, exist_buf
, exist
->flags
);
414 existattr
= exist
->attr
;
415 newattre
= newattr
->extra
;
416 existattre
= existattr
->extra
;
418 /* 1. Weight check. */
419 new_weight
= exist_weight
= 0;
422 new_weight
= newattre
->weight
;
424 exist_weight
= existattre
->weight
;
426 if (new_weight
> exist_weight
)
429 zlog_debug("%s: %s wins over %s due to weight %d > %d",
430 pfx_buf
, new_buf
, exist_buf
, new_weight
, exist_weight
);
434 if (new_weight
< exist_weight
)
437 zlog_debug("%s: %s loses to %s due to weight %d < %d",
438 pfx_buf
, new_buf
, exist_buf
, new_weight
, exist_weight
);
442 /* 2. Local preference check. */
443 new_pref
= exist_pref
= bgp
->default_local_pref
;
445 if (newattr
->flag
& ATTR_FLAG_BIT (BGP_ATTR_LOCAL_PREF
))
446 new_pref
= newattr
->local_pref
;
447 if (existattr
->flag
& ATTR_FLAG_BIT (BGP_ATTR_LOCAL_PREF
))
448 exist_pref
= existattr
->local_pref
;
450 if (new_pref
> exist_pref
)
453 zlog_debug("%s: %s wins over %s due to localpref %d > %d",
454 pfx_buf
, new_buf
, exist_buf
, new_pref
, exist_pref
);
458 if (new_pref
< exist_pref
)
461 zlog_debug("%s: %s loses to %s due to localpref %d < %d",
462 pfx_buf
, new_buf
, exist_buf
, new_pref
, exist_pref
);
466 /* 3. Local route check. We prefer:
468 * - BGP_ROUTE_AGGREGATE
469 * - BGP_ROUTE_REDISTRIBUTE
471 if (! (new->sub_type
== BGP_ROUTE_NORMAL
))
474 zlog_debug("%s: %s wins over %s due to preferred BGP_ROUTE type",
475 pfx_buf
, new_buf
, exist_buf
);
479 if (! (exist
->sub_type
== BGP_ROUTE_NORMAL
))
482 zlog_debug("%s: %s loses to %s due to preferred BGP_ROUTE type",
483 pfx_buf
, new_buf
, exist_buf
);
487 /* 4. AS path length check. */
488 if (! bgp_flag_check (bgp
, BGP_FLAG_ASPATH_IGNORE
))
490 int exist_hops
= aspath_count_hops (existattr
->aspath
);
491 int exist_confeds
= aspath_count_confeds (existattr
->aspath
);
493 if (bgp_flag_check (bgp
, BGP_FLAG_ASPATH_CONFED
))
497 aspath_hops
= aspath_count_hops (newattr
->aspath
);
498 aspath_hops
+= aspath_count_confeds (newattr
->aspath
);
500 if ( aspath_hops
< (exist_hops
+ exist_confeds
))
503 zlog_debug("%s: %s wins over %s due to aspath (with confeds) hopcount %d < %d",
504 pfx_buf
, new_buf
, exist_buf
,
505 aspath_hops
, (exist_hops
+ exist_confeds
));
509 if ( aspath_hops
> (exist_hops
+ exist_confeds
))
512 zlog_debug("%s: %s loses to %s due to aspath (with confeds) hopcount %d > %d",
513 pfx_buf
, new_buf
, exist_buf
,
514 aspath_hops
, (exist_hops
+ exist_confeds
));
520 int newhops
= aspath_count_hops (newattr
->aspath
);
522 if (newhops
< exist_hops
)
525 zlog_debug("%s: %s wins over %s due to aspath hopcount %d < %d",
526 pfx_buf
, new_buf
, exist_buf
, newhops
, exist_hops
);
530 if (newhops
> exist_hops
)
533 zlog_debug("%s: %s loses to %s due to aspath hopcount %d > %d",
534 pfx_buf
, new_buf
, exist_buf
, newhops
, exist_hops
);
540 /* 5. Origin check. */
541 if (newattr
->origin
< existattr
->origin
)
544 zlog_debug("%s: %s wins over %s due to ORIGIN %s < %s",
545 pfx_buf
, new_buf
, exist_buf
,
546 bgp_origin_long_str
[newattr
->origin
],
547 bgp_origin_long_str
[existattr
->origin
]);
551 if (newattr
->origin
> existattr
->origin
)
554 zlog_debug("%s: %s loses to %s due to ORIGIN %s > %s",
555 pfx_buf
, new_buf
, exist_buf
,
556 bgp_origin_long_str
[newattr
->origin
],
557 bgp_origin_long_str
[existattr
->origin
]);
562 internal_as_route
= (aspath_count_hops (newattr
->aspath
) == 0
563 && aspath_count_hops (existattr
->aspath
) == 0);
564 confed_as_route
= (aspath_count_confeds (newattr
->aspath
) > 0
565 && aspath_count_confeds (existattr
->aspath
) > 0
566 && aspath_count_hops (newattr
->aspath
) == 0
567 && aspath_count_hops (existattr
->aspath
) == 0);
569 if (bgp_flag_check (bgp
, BGP_FLAG_ALWAYS_COMPARE_MED
)
570 || (bgp_flag_check (bgp
, BGP_FLAG_MED_CONFED
)
572 || aspath_cmp_left (newattr
->aspath
, existattr
->aspath
)
573 || aspath_cmp_left_confed (newattr
->aspath
, existattr
->aspath
)
574 || internal_as_route
)
576 new_med
= bgp_med_value (new->attr
, bgp
);
577 exist_med
= bgp_med_value (exist
->attr
, bgp
);
579 if (new_med
< exist_med
)
582 zlog_debug("%s: %s wins over %s due to MED %d < %d",
583 pfx_buf
, new_buf
, exist_buf
, new_med
, exist_med
);
587 if (new_med
> exist_med
)
590 zlog_debug("%s: %s loses to %s due to MED %d > %d",
591 pfx_buf
, new_buf
, exist_buf
, new_med
, exist_med
);
596 /* 7. Peer type check. */
597 new_sort
= new->peer
->sort
;
598 exist_sort
= exist
->peer
->sort
;
600 if (new_sort
== BGP_PEER_EBGP
601 && (exist_sort
== BGP_PEER_IBGP
|| exist_sort
== BGP_PEER_CONFED
))
604 zlog_debug("%s: %s wins over %s due to eBGP peer > iBGP peer",
605 pfx_buf
, new_buf
, exist_buf
);
609 if (exist_sort
== BGP_PEER_EBGP
610 && (new_sort
== BGP_PEER_IBGP
|| new_sort
== BGP_PEER_CONFED
))
613 zlog_debug("%s: %s loses to %s due to iBGP peer < eBGP peer",
614 pfx_buf
, new_buf
, exist_buf
);
618 /* 8. IGP metric check. */
622 newm
= new->extra
->igpmetric
;
624 existm
= exist
->extra
->igpmetric
;
629 zlog_debug("%s: %s wins over %s due to IGP metric %d < %d",
630 pfx_buf
, new_buf
, exist_buf
, newm
, existm
);
637 zlog_debug("%s: %s loses to %s due to IGP metric %d > %d",
638 pfx_buf
, new_buf
, exist_buf
, newm
, existm
);
642 /* 9. Same IGP metric. Compare the cluster list length as
643 representative of IGP hops metric. Rewrite the metric value
644 pair (newm, existm) with the cluster list length. Prefer the
645 path with smaller cluster list length. */
648 if (peer_sort (new->peer
) == BGP_PEER_IBGP
649 && peer_sort (exist
->peer
) == BGP_PEER_IBGP
650 && (mpath_cfg
== NULL
||
651 CHECK_FLAG (mpath_cfg
->ibgp_flags
,
652 BGP_FLAG_IBGP_MULTIPATH_SAME_CLUSTERLEN
)))
654 newm
= BGP_CLUSTER_LIST_LENGTH(new->attr
);
655 existm
= BGP_CLUSTER_LIST_LENGTH(exist
->attr
);
660 zlog_debug("%s: %s wins over %s due to CLUSTER_LIST length %d < %d",
661 pfx_buf
, new_buf
, exist_buf
, newm
, existm
);
668 zlog_debug("%s: %s loses to %s due to CLUSTER_LIST length %d > %d",
669 pfx_buf
, new_buf
, exist_buf
, newm
, existm
);
675 /* 10. confed-external vs. confed-internal */
676 if (CHECK_FLAG(bgp
->config
, BGP_CONFIG_CONFEDERATION
))
678 if (new_sort
== BGP_PEER_CONFED
&& exist_sort
== BGP_PEER_IBGP
)
681 zlog_debug("%s: %s wins over %s due to confed-external peer > confed-internal peer",
682 pfx_buf
, new_buf
, exist_buf
);
686 if (exist_sort
== BGP_PEER_CONFED
&& new_sort
== BGP_PEER_IBGP
)
689 zlog_debug("%s: %s loses to %s due to confed-internal peer < confed-external peer",
690 pfx_buf
, new_buf
, exist_buf
);
695 /* 11. Maximum path check. */
698 if (bgp_flag_check(bgp
, BGP_FLAG_ASPATH_MULTIPATH_RELAX
))
702 * For the two paths, all comparison steps till IGP metric
703 * have succeeded - including AS_PATH hop count. Since 'bgp
704 * bestpath as-path multipath-relax' knob is on, we don't need
705 * an exact match of AS_PATH. Thus, mark the paths are equal.
706 * That will trigger both these paths to get into the multipath
712 zlog_debug("%s: %s and %s are equal via multipath-relax",
713 pfx_buf
, new_buf
, exist_buf
);
715 else if (new->peer
->sort
== BGP_PEER_IBGP
)
717 if (aspath_cmp (new->attr
->aspath
, exist
->attr
->aspath
))
722 zlog_debug("%s: %s and %s are equal via matching aspaths",
723 pfx_buf
, new_buf
, exist_buf
);
726 else if (new->peer
->as
== exist
->peer
->as
)
731 zlog_debug("%s: %s and %s are equal via same remote-as",
732 pfx_buf
, new_buf
, exist_buf
);
738 * TODO: If unequal cost ibgp multipath is enabled we can
739 * mark the paths as equal here instead of returning
744 zlog_debug("%s: %s wins over %s after IGP metric comparison",
745 pfx_buf
, new_buf
, exist_buf
);
747 zlog_debug("%s: %s loses to %s after IGP metric comparison",
748 pfx_buf
, new_buf
, exist_buf
);
753 /* 12. If both paths are external, prefer the path that was received
754 first (the oldest one). This step minimizes route-flap, since a
755 newer path won't displace an older one, even if it was the
756 preferred route based on the additional decision criteria below. */
757 if (! bgp_flag_check (bgp
, BGP_FLAG_COMPARE_ROUTER_ID
)
758 && new_sort
== BGP_PEER_EBGP
759 && exist_sort
== BGP_PEER_EBGP
)
761 if (CHECK_FLAG (new->flags
, BGP_INFO_SELECTED
))
764 zlog_debug("%s: %s wins over %s due to oldest external",
765 pfx_buf
, new_buf
, exist_buf
);
769 if (CHECK_FLAG (exist
->flags
, BGP_INFO_SELECTED
))
772 zlog_debug("%s: %s loses to %s due to oldest external",
773 pfx_buf
, new_buf
, exist_buf
);
778 /* 13. Router-ID comparision. */
779 /* If one of the paths is "stale", the corresponding peer router-id will
780 * be 0 and would always win over the other path. If originator id is
781 * used for the comparision, it will decide which path is better.
783 if (newattr
->flag
& ATTR_FLAG_BIT(BGP_ATTR_ORIGINATOR_ID
))
784 new_id
.s_addr
= newattre
->originator_id
.s_addr
;
786 new_id
.s_addr
= new->peer
->remote_id
.s_addr
;
787 if (existattr
->flag
& ATTR_FLAG_BIT(BGP_ATTR_ORIGINATOR_ID
))
788 exist_id
.s_addr
= existattre
->originator_id
.s_addr
;
790 exist_id
.s_addr
= exist
->peer
->remote_id
.s_addr
;
792 if (ntohl (new_id
.s_addr
) < ntohl (exist_id
.s_addr
))
795 zlog_debug("%s: %s wins over %s due to Router-ID comparison",
796 pfx_buf
, new_buf
, exist_buf
);
800 if (ntohl (new_id
.s_addr
) > ntohl (exist_id
.s_addr
))
803 zlog_debug("%s: %s loses to %s due to Router-ID comparison",
804 pfx_buf
, new_buf
, exist_buf
);
808 /* 14. Cluster length comparision. */
809 new_cluster
= BGP_CLUSTER_LIST_LENGTH(new->attr
);
810 exist_cluster
= BGP_CLUSTER_LIST_LENGTH(exist
->attr
);
812 if (new_cluster
< exist_cluster
)
815 zlog_debug("%s: %s wins over %s due to CLUSTER_LIST length %d < %d",
816 pfx_buf
, new_buf
, exist_buf
, new_cluster
, exist_cluster
);
820 if (new_cluster
> exist_cluster
)
823 zlog_debug("%s: %s loses to %s due to CLUSTER_LIST length %d > %d",
824 pfx_buf
, new_buf
, exist_buf
, new_cluster
, exist_cluster
);
828 /* 15. Neighbor address comparision. */
829 /* Do this only if neither path is "stale" as stale paths do not have
830 * valid peer information (as the connection may or may not be up).
832 if (CHECK_FLAG (exist
->flags
, BGP_INFO_STALE
))
835 zlog_debug("%s: %s wins over %s due to latter path being STALE",
836 pfx_buf
, new_buf
, exist_buf
);
840 if (CHECK_FLAG (new->flags
, BGP_INFO_STALE
))
843 zlog_debug("%s: %s loses to %s due to former path being STALE",
844 pfx_buf
, new_buf
, exist_buf
);
848 /* locally configured routes to advertise do not have su_remote */
849 if (new->peer
->su_remote
== NULL
)
851 if (exist
->peer
->su_remote
== NULL
)
854 ret
= sockunion_cmp (new->peer
->su_remote
, exist
->peer
->su_remote
);
859 zlog_debug("%s: %s loses to %s due to Neighor IP comparison",
860 pfx_buf
, new_buf
, exist_buf
);
867 zlog_debug("%s: %s wins over %s due to Neighor IP comparison",
868 pfx_buf
, new_buf
, exist_buf
);
873 zlog_debug("%s: %s wins over %s due to nothing left to compare",
874 pfx_buf
, new_buf
, exist_buf
);
879 /* Compare two bgp route entity. Return -1 if new is preferred, 1 if exist
880 * is preferred, or 0 if they are the same (usually will only occur if
881 * multipath is enabled
882 * This version is compatible with */
884 bgp_info_cmp_compatible (struct bgp
*bgp
, struct bgp_info
*new, struct bgp_info
*exist
,
885 afi_t afi
, safi_t safi
)
889 ret
= bgp_info_cmp (bgp
, new, exist
, &paths_eq
, NULL
, 0, __func__
);
903 static enum filter_type
904 bgp_input_filter (struct peer
*peer
, struct prefix
*p
, struct attr
*attr
,
905 afi_t afi
, safi_t safi
)
907 struct bgp_filter
*filter
;
909 filter
= &peer
->filter
[afi
][safi
];
911 #define FILTER_EXIST_WARN(F,f,filter) \
912 if (BGP_DEBUG (update, UPDATE_IN) \
913 && !(F ## _IN (filter))) \
914 zlog_warn ("%s: Could not find configured input %s-list %s!", \
915 peer->host, #f, F ## _IN_NAME(filter));
917 if (DISTRIBUTE_IN_NAME (filter
)) {
918 FILTER_EXIST_WARN(DISTRIBUTE
, distribute
, filter
);
920 if (access_list_apply (DISTRIBUTE_IN (filter
), p
) == FILTER_DENY
)
924 if (PREFIX_LIST_IN_NAME (filter
)) {
925 FILTER_EXIST_WARN(PREFIX_LIST
, prefix
, filter
);
927 if (prefix_list_apply (PREFIX_LIST_IN (filter
), p
) == PREFIX_DENY
)
931 if (FILTER_LIST_IN_NAME (filter
)) {
932 FILTER_EXIST_WARN(FILTER_LIST
, as
, filter
);
934 if (as_list_apply (FILTER_LIST_IN (filter
), attr
->aspath
)== AS_FILTER_DENY
)
938 return FILTER_PERMIT
;
939 #undef FILTER_EXIST_WARN
942 static enum filter_type
943 bgp_output_filter (struct peer
*peer
, struct prefix
*p
, struct attr
*attr
,
944 afi_t afi
, safi_t safi
)
946 struct bgp_filter
*filter
;
948 filter
= &peer
->filter
[afi
][safi
];
950 #define FILTER_EXIST_WARN(F,f,filter) \
951 if (BGP_DEBUG (update, UPDATE_OUT) \
952 && !(F ## _OUT (filter))) \
953 zlog_warn ("%s: Could not find configured output %s-list %s!", \
954 peer->host, #f, F ## _OUT_NAME(filter));
956 if (DISTRIBUTE_OUT_NAME (filter
)) {
957 FILTER_EXIST_WARN(DISTRIBUTE
, distribute
, filter
);
959 if (access_list_apply (DISTRIBUTE_OUT (filter
), p
) == FILTER_DENY
)
963 if (PREFIX_LIST_OUT_NAME (filter
)) {
964 FILTER_EXIST_WARN(PREFIX_LIST
, prefix
, filter
);
966 if (prefix_list_apply (PREFIX_LIST_OUT (filter
), p
) == PREFIX_DENY
)
970 if (FILTER_LIST_OUT_NAME (filter
)) {
971 FILTER_EXIST_WARN(FILTER_LIST
, as
, filter
);
973 if (as_list_apply (FILTER_LIST_OUT (filter
), attr
->aspath
) == AS_FILTER_DENY
)
977 return FILTER_PERMIT
;
978 #undef FILTER_EXIST_WARN
981 /* If community attribute includes no_export then return 1. */
983 bgp_community_filter (struct peer
*peer
, struct attr
*attr
)
987 /* NO_ADVERTISE check. */
988 if (community_include (attr
->community
, COMMUNITY_NO_ADVERTISE
))
991 /* NO_EXPORT check. */
992 if (peer
->sort
== BGP_PEER_EBGP
&&
993 community_include (attr
->community
, COMMUNITY_NO_EXPORT
))
996 /* NO_EXPORT_SUBCONFED check. */
997 if (peer
->sort
== BGP_PEER_EBGP
998 || peer
->sort
== BGP_PEER_CONFED
)
999 if (community_include (attr
->community
, COMMUNITY_NO_EXPORT_SUBCONFED
))
1005 /* Route reflection loop check. */
1007 bgp_cluster_filter (struct peer
*peer
, struct attr
*attr
)
1009 struct in_addr cluster_id
;
1011 if (attr
->extra
&& attr
->extra
->cluster
)
1013 if (peer
->bgp
->config
& BGP_CONFIG_CLUSTER_ID
)
1014 cluster_id
= peer
->bgp
->cluster_id
;
1016 cluster_id
= peer
->bgp
->router_id
;
1018 if (cluster_loop_check (attr
->extra
->cluster
, cluster_id
))
1025 bgp_input_modifier (struct peer
*peer
, struct prefix
*p
, struct attr
*attr
,
1026 afi_t afi
, safi_t safi
, const char *rmap_name
)
1028 struct bgp_filter
*filter
;
1029 struct bgp_info info
;
1030 route_map_result_t ret
;
1031 struct route_map
*rmap
= NULL
;
1033 filter
= &peer
->filter
[afi
][safi
];
1035 /* Apply default weight value. */
1036 if (peer
->weight
[afi
][safi
])
1037 (bgp_attr_extra_get (attr
))->weight
= peer
->weight
[afi
][safi
];
1041 rmap
= route_map_lookup_by_name(rmap_name
);
1048 if (ROUTE_MAP_IN_NAME(filter
))
1050 rmap
= ROUTE_MAP_IN (filter
);
1057 /* Route map apply. */
1060 /* Duplicate current value to new strucutre for modification. */
1064 SET_FLAG (peer
->rmap_type
, PEER_RMAP_TYPE_IN
);
1066 /* Apply BGP route map to the attribute. */
1067 ret
= route_map_apply (rmap
, p
, RMAP_BGP
, &info
);
1069 peer
->rmap_type
= 0;
1071 if (ret
== RMAP_DENYMATCH
)
1073 /* Free newly generated AS path and community by route-map. */
1074 bgp_attr_flush (attr
);
1082 bgp_output_modifier (struct peer
*peer
, struct prefix
*p
, struct attr
*attr
,
1083 afi_t afi
, safi_t safi
, const char *rmap_name
)
1085 struct bgp_filter
*filter
;
1086 struct bgp_info info
;
1087 route_map_result_t ret
;
1088 struct route_map
*rmap
= NULL
;
1090 filter
= &peer
->filter
[afi
][safi
];
1092 /* Apply default weight value. */
1093 if (peer
->weight
[afi
][safi
])
1094 (bgp_attr_extra_get (attr
))->weight
= peer
->weight
[afi
][safi
];
1098 rmap
= route_map_lookup_by_name(rmap_name
);
1105 if (ROUTE_MAP_OUT_NAME(filter
))
1107 rmap
= ROUTE_MAP_OUT (filter
);
1114 /* Route map apply. */
1117 /* Duplicate current value to new strucutre for modification. */
1121 SET_FLAG (peer
->rmap_type
, PEER_RMAP_TYPE_OUT
);
1123 /* Apply BGP route map to the attribute. */
1124 ret
= route_map_apply (rmap
, p
, RMAP_BGP
, &info
);
1126 peer
->rmap_type
= 0;
1128 if (ret
== RMAP_DENYMATCH
)
1129 /* caller has multiple error paths with bgp_attr_flush() */
1135 /* If this is an EBGP peer with remove-private-AS */
1137 bgp_peer_remove_private_as(struct bgp
*bgp
, afi_t afi
, safi_t safi
,
1138 struct peer
*peer
, struct attr
*attr
)
1140 if (peer
->sort
== BGP_PEER_EBGP
&&
1141 (peer_af_flag_check (peer
, afi
, safi
, PEER_FLAG_REMOVE_PRIVATE_AS_ALL_REPLACE
) ||
1142 peer_af_flag_check (peer
, afi
, safi
, PEER_FLAG_REMOVE_PRIVATE_AS_REPLACE
) ||
1143 peer_af_flag_check (peer
, afi
, safi
, PEER_FLAG_REMOVE_PRIVATE_AS_ALL
) ||
1144 peer_af_flag_check (peer
, afi
, safi
, PEER_FLAG_REMOVE_PRIVATE_AS
)))
1146 // Take action on the entire aspath
1147 if (peer_af_flag_check (peer
, afi
, safi
, PEER_FLAG_REMOVE_PRIVATE_AS_ALL_REPLACE
) ||
1148 peer_af_flag_check (peer
, afi
, safi
, PEER_FLAG_REMOVE_PRIVATE_AS_ALL
))
1150 if (peer_af_flag_check (peer
, afi
, safi
, PEER_FLAG_REMOVE_PRIVATE_AS_ALL_REPLACE
))
1151 attr
->aspath
= aspath_replace_private_asns (attr
->aspath
, bgp
->as
);
1153 // The entire aspath consists of private ASNs so create an empty aspath
1154 else if (aspath_private_as_check (attr
->aspath
))
1155 attr
->aspath
= aspath_empty_get ();
1157 // There are some public and some private ASNs, remove the private ASNs
1159 attr
->aspath
= aspath_remove_private_asns (attr
->aspath
);
1162 // 'all' was not specified so the entire aspath must be private ASNs
1163 // for us to do anything
1164 else if (aspath_private_as_check (attr
->aspath
))
1166 if (peer_af_flag_check (peer
, afi
, safi
, PEER_FLAG_REMOVE_PRIVATE_AS_REPLACE
))
1167 attr
->aspath
= aspath_replace_private_asns (attr
->aspath
, bgp
->as
);
1169 attr
->aspath
= aspath_empty_get ();
1174 /* If this is an EBGP peer with as-override */
1176 bgp_peer_as_override(struct bgp
*bgp
, afi_t afi
, safi_t safi
,
1177 struct peer
*peer
, struct attr
*attr
)
1179 if (peer
->sort
== BGP_PEER_EBGP
&&
1180 peer_af_flag_check (peer
, afi
, safi
, PEER_FLAG_AS_OVERRIDE
))
1182 if (aspath_single_asn_check (attr
->aspath
, peer
->as
))
1183 attr
->aspath
= aspath_replace_specific_asn (attr
->aspath
, peer
->as
, bgp
->as
);
1188 subgroup_announce_reset_nhop (u_char family
, struct attr
*attr
)
1190 if (family
== AF_INET
)
1191 attr
->nexthop
.s_addr
= 0;
1192 if (family
== AF_INET6
)
1193 memset (&attr
->extra
->mp_nexthop_global
, 0, IPV6_MAX_BYTELEN
);
1197 subgroup_announce_check (struct bgp_node
*rn
, struct bgp_info
*ri
,
1198 struct update_subgroup
*subgrp
,
1199 struct prefix
*p
, struct attr
*attr
)
1201 struct bgp_filter
*filter
;
1204 struct peer
*onlypeer
;
1206 struct attr
*riattr
;
1207 struct peer_af
*paf
;
1208 char buf
[PREFIX_STRLEN
];
1214 int samepeer_safe
= 0; /* for synthetic mplsvpns routes */
1216 if (DISABLE_BGP_ANNOUNCE
)
1219 afi
= SUBGRP_AFI(subgrp
);
1220 safi
= SUBGRP_SAFI(subgrp
);
1221 peer
= SUBGRP_PEER(subgrp
);
1223 if (CHECK_FLAG (peer
->flags
, PEER_FLAG_LONESOUL
))
1224 onlypeer
= SUBGRP_PFIRST(subgrp
)->peer
;
1227 filter
= &peer
->filter
[afi
][safi
];
1228 bgp
= SUBGRP_INST(subgrp
);
1229 riattr
= bgp_info_mpath_count (ri
) ? bgp_info_mpath_attr (ri
) : ri
->attr
;
1232 if (((afi
== AFI_IP
) || (afi
== AFI_IP6
)) && (safi
== SAFI_MPLS_VPN
) &&
1233 ((ri
->type
== ZEBRA_ROUTE_BGP_DIRECT
) ||
1234 (ri
->type
== ZEBRA_ROUTE_BGP_DIRECT_EXT
))) {
1237 * direct and direct_ext type routes originate internally even
1238 * though they can have peer pointers that reference other systems
1240 prefix2str(p
, buf
, PREFIX_STRLEN
);
1241 zlog_debug("%s: pfx %s bgp_direct->vpn route peer safe", __func__
, buf
);
1246 /* With addpath we may be asked to TX all kinds of paths so make sure
1248 if (!CHECK_FLAG (ri
->flags
, BGP_INFO_VALID
) ||
1249 CHECK_FLAG (ri
->flags
, BGP_INFO_HISTORY
) ||
1250 CHECK_FLAG (ri
->flags
, BGP_INFO_REMOVED
))
1255 /* If this is not the bestpath then check to see if there is an enabled addpath
1256 * feature that requires us to advertise it */
1257 if (! CHECK_FLAG (ri
->flags
, BGP_INFO_SELECTED
))
1259 if (! bgp_addpath_tx_path(peer
, afi
, safi
, ri
))
1265 /* Aggregate-address suppress check. */
1266 if (ri
->extra
&& ri
->extra
->suppress
)
1267 if (! UNSUPPRESS_MAP_NAME (filter
))
1272 /* If it's labeled safi, make sure the route has a valid label. */
1273 if (safi
== SAFI_LABELED_UNICAST
)
1275 u_char
*tag
= bgp_adv_label(rn
, ri
, peer
, afi
, safi
);
1276 if (!bgp_is_valid_label(tag
))
1278 if (bgp_debug_update(NULL
, p
, subgrp
->update_group
, 0))
1279 zlog_debug ("u%" PRIu64
":s%" PRIu64
" %s/%d is filtered - no label (%p)",
1280 subgrp
->update_group
->id
, subgrp
->id
,
1281 inet_ntop(p
->family
, &p
->u
.prefix
, buf
, SU_ADDRSTRLEN
),
1287 /* Do not send back route to sender. */
1288 if (onlypeer
&& from
== onlypeer
)
1293 /* Do not send the default route in the BGP table if the neighbor is
1294 * configured for default-originate */
1295 if (CHECK_FLAG (peer
->af_flags
[afi
][safi
], PEER_FLAG_DEFAULT_ORIGINATE
))
1297 if (p
->family
== AF_INET
&& p
->u
.prefix4
.s_addr
== INADDR_ANY
)
1299 else if (p
->family
== AF_INET6
&& p
->prefixlen
== 0)
1303 /* Transparency check. */
1304 if (CHECK_FLAG (peer
->af_flags
[afi
][safi
], PEER_FLAG_RSERVER_CLIENT
)
1305 && CHECK_FLAG (from
->af_flags
[afi
][safi
], PEER_FLAG_RSERVER_CLIENT
))
1310 /* If community is not disabled check the no-export and local. */
1311 if (! transparent
&& bgp_community_filter (peer
, riattr
))
1313 if (bgp_debug_update(NULL
, p
, subgrp
->update_group
, 0))
1314 zlog_debug ("subgrpannouncecheck: community filter check fail");
1318 /* If the attribute has originator-id and it is same as remote
1321 riattr
->flag
& ATTR_FLAG_BIT (BGP_ATTR_ORIGINATOR_ID
) &&
1322 (IPV4_ADDR_SAME (&onlypeer
->remote_id
, &riattr
->extra
->originator_id
)))
1324 if (bgp_debug_update(NULL
, p
, subgrp
->update_group
, 0))
1325 zlog_debug ("%s [Update:SEND] %s originator-id is same as "
1327 onlypeer
->host
, prefix2str (p
, buf
, sizeof (buf
)));
1331 /* ORF prefix-list filter check */
1332 if (CHECK_FLAG (peer
->af_cap
[afi
][safi
], PEER_CAP_ORF_PREFIX_RM_ADV
)
1333 && (CHECK_FLAG (peer
->af_cap
[afi
][safi
], PEER_CAP_ORF_PREFIX_SM_RCV
)
1334 || CHECK_FLAG (peer
->af_cap
[afi
][safi
],
1335 PEER_CAP_ORF_PREFIX_SM_OLD_RCV
)))
1336 if (peer
->orf_plist
[afi
][safi
])
1338 if (prefix_list_apply (peer
->orf_plist
[afi
][safi
], p
) == PREFIX_DENY
)
1340 if (bgp_debug_update(NULL
, p
, subgrp
->update_group
, 0))
1341 zlog_debug ("%s [Update:SEND] %s is filtered via ORF",
1342 peer
->host
, prefix2str (p
, buf
, sizeof (buf
)));
1347 /* Output filter check. */
1348 if (bgp_output_filter (peer
, p
, riattr
, afi
, safi
) == FILTER_DENY
)
1350 if (bgp_debug_update(NULL
, p
, subgrp
->update_group
, 0))
1351 zlog_debug ("%s [Update:SEND] %s is filtered",
1352 peer
->host
, prefix2str (p
, buf
, sizeof (buf
)));
1356 #ifdef BGP_SEND_ASPATH_CHECK
1357 /* AS path loop check. */
1358 if (onlypeer
&& aspath_loop_check (riattr
->aspath
, onlypeer
->as
))
1360 if (bgp_debug_update(NULL
, p
, subgrp
->update_group
, 0))
1361 zlog_debug ("%s [Update:SEND] suppress announcement to peer AS %u "
1362 "that is part of AS path.",
1363 onlypeer
->host
, onlypeer
->as
);
1366 #endif /* BGP_SEND_ASPATH_CHECK */
1368 /* If we're a CONFED we need to loop check the CONFED ID too */
1369 if (CHECK_FLAG(bgp
->config
, BGP_CONFIG_CONFEDERATION
))
1371 if (aspath_loop_check(riattr
->aspath
, bgp
->confed_id
))
1373 if (bgp_debug_update(NULL
, p
, subgrp
->update_group
, 0))
1374 zlog_debug ("%s [Update:SEND] suppress announcement to peer AS %u"
1382 /* Route-Reflect check. */
1383 if (from
->sort
== BGP_PEER_IBGP
&& peer
->sort
== BGP_PEER_IBGP
)
1388 /* IBGP reflection check. */
1389 if (reflect
&& !samepeer_safe
)
1391 /* A route from a Client peer. */
1392 if (CHECK_FLAG (from
->af_flags
[afi
][safi
], PEER_FLAG_REFLECTOR_CLIENT
))
1394 /* Reflect to all the Non-Client peers and also to the
1395 Client peers other than the originator. Originator check
1396 is already done. So there is noting to do. */
1397 /* no bgp client-to-client reflection check. */
1398 if (bgp_flag_check (bgp
, BGP_FLAG_NO_CLIENT_TO_CLIENT
))
1399 if (CHECK_FLAG (peer
->af_flags
[afi
][safi
],
1400 PEER_FLAG_REFLECTOR_CLIENT
))
1405 /* A route from a Non-client peer. Reflect to all other
1407 if (! CHECK_FLAG (peer
->af_flags
[afi
][safi
],
1408 PEER_FLAG_REFLECTOR_CLIENT
))
1413 /* For modify attribute, copy it to temporary structure. */
1414 bgp_attr_dup (attr
, riattr
);
1416 /* If local-preference is not set. */
1417 if ((peer
->sort
== BGP_PEER_IBGP
1418 || peer
->sort
== BGP_PEER_CONFED
)
1419 && (! (attr
->flag
& ATTR_FLAG_BIT (BGP_ATTR_LOCAL_PREF
))))
1421 attr
->flag
|= ATTR_FLAG_BIT (BGP_ATTR_LOCAL_PREF
);
1422 attr
->local_pref
= bgp
->default_local_pref
;
1425 /* If originator-id is not set and the route is to be reflected,
1426 set the originator id */
1427 if (reflect
&& (!(attr
->flag
& ATTR_FLAG_BIT(BGP_ATTR_ORIGINATOR_ID
))))
1429 attr
->extra
= bgp_attr_extra_get(attr
);
1430 IPV4_ADDR_COPY(&(attr
->extra
->originator_id
), &(from
->remote_id
));
1431 SET_FLAG(attr
->flag
, BGP_ATTR_ORIGINATOR_ID
);
1434 /* Remove MED if its an EBGP peer - will get overwritten by route-maps */
1435 if (peer
->sort
== BGP_PEER_EBGP
1436 && attr
->flag
& ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC
))
1438 if (from
!= bgp
->peer_self
&& ! transparent
1439 && ! CHECK_FLAG (peer
->af_flags
[afi
][safi
], PEER_FLAG_MED_UNCHANGED
))
1440 attr
->flag
&= ~(ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC
));
1443 /* Since the nexthop attribute can vary per peer, it is not explicitly set
1444 * in announce check, only certain flags and length (or number of nexthops
1445 * -- for IPv6/MP_REACH) are set here in order to guide the update formation
1446 * code in setting the nexthop(s) on a per peer basis in reformat_peer().
1447 * Typically, the source nexthop in the attribute is preserved but in the
1448 * scenarios where we know it will always be overwritten, we reset the
1449 * nexthop to "0" in an attempt to achieve better Update packing. An
1450 * example of this is when a prefix from each of 2 IBGP peers needs to be
1451 * announced to an EBGP peer (and they have the same attributes barring
1455 SET_FLAG(attr
->rmap_change_flags
, BATTR_REFLECTED
);
1457 #define NEXTHOP_IS_V6 (\
1458 (safi != SAFI_ENCAP && safi != SAFI_MPLS_VPN &&\
1459 (p->family == AF_INET6 || peer_cap_enhe(peer, AFI_IP6, safi))) || \
1460 ((safi == SAFI_ENCAP || safi == SAFI_MPLS_VPN) &&\
1461 attr->extra->mp_nexthop_len >= IPV6_MAX_BYTELEN))
1463 /* IPv6/MP starts with 1 nexthop. The link-local address is passed only if
1464 * the peer (group) is configured to receive link-local nexthop unchanged
1465 * and it is available in the prefix OR we're not reflecting the route and
1466 * the peer (group) to whom we're going to announce is on a shared network
1467 * and this is either a self-originated route or the peer is EBGP.
1471 attr
->extra
->mp_nexthop_len
= BGP_ATTR_NHLEN_IPV6_GLOBAL
;
1472 if ((CHECK_FLAG (peer
->af_flags
[afi
][safi
],
1473 PEER_FLAG_NEXTHOP_LOCAL_UNCHANGED
) &&
1474 IN6_IS_ADDR_LINKLOCAL (&attr
->extra
->mp_nexthop_local
)) ||
1475 (!reflect
&& peer
->shared_network
&&
1476 (from
== bgp
->peer_self
|| peer
->sort
== BGP_PEER_EBGP
)))
1478 attr
->extra
->mp_nexthop_len
= BGP_ATTR_NHLEN_IPV6_GLOBAL_AND_LL
;
1481 /* Clear off link-local nexthop in source, whenever it is not needed to
1482 * ensure more prefixes share the same attribute for announcement.
1484 if (!(CHECK_FLAG (peer
->af_flags
[afi
][safi
],
1485 PEER_FLAG_NEXTHOP_LOCAL_UNCHANGED
)))
1486 memset (&attr
->extra
->mp_nexthop_local
, 0, IPV6_MAX_BYTELEN
);
1489 bgp_peer_remove_private_as(bgp
, afi
, safi
, peer
, attr
);
1490 bgp_peer_as_override(bgp
, afi
, safi
, peer
, attr
);
1492 /* Route map & unsuppress-map apply. */
1493 if (ROUTE_MAP_OUT_NAME (filter
)
1494 || (ri
->extra
&& ri
->extra
->suppress
) )
1496 struct bgp_info info
;
1497 struct attr dummy_attr
;
1498 struct attr_extra dummy_extra
;
1500 dummy_attr
.extra
= &dummy_extra
;
1504 /* don't confuse inbound and outbound setting */
1505 RESET_FLAG(attr
->rmap_change_flags
);
1508 * The route reflector is not allowed to modify the attributes
1509 * of the reflected IBGP routes unless explicitly allowed.
1511 if ((from
->sort
== BGP_PEER_IBGP
&& peer
->sort
== BGP_PEER_IBGP
)
1512 && !bgp_flag_check(bgp
, BGP_FLAG_RR_ALLOW_OUTBOUND_POLICY
))
1514 bgp_attr_dup (&dummy_attr
, attr
);
1515 info
.attr
= &dummy_attr
;
1518 SET_FLAG (peer
->rmap_type
, PEER_RMAP_TYPE_OUT
);
1520 if (ri
->extra
&& ri
->extra
->suppress
)
1521 ret
= route_map_apply (UNSUPPRESS_MAP (filter
), p
, RMAP_BGP
, &info
);
1523 ret
= route_map_apply (ROUTE_MAP_OUT (filter
), p
, RMAP_BGP
, &info
);
1525 peer
->rmap_type
= 0;
1527 if (ret
== RMAP_DENYMATCH
)
1529 bgp_attr_flush (attr
);
1534 /* After route-map has been applied, we check to see if the nexthop to
1535 * be carried in the attribute (that is used for the announcement) can
1536 * be cleared off or not. We do this in all cases where we would be
1537 * setting the nexthop to "ourselves". For IPv6, we only need to consider
1538 * the global nexthop here; the link-local nexthop would have been cleared
1539 * already, and if not, it is required by the update formation code.
1540 * Also see earlier comments in this function.
1543 * If route-map has performed some operation on the nexthop or the peer
1544 * configuration says to pass it unchanged, we cannot reset the nexthop
1545 * here, so only attempt to do it if these aren't true. Note that the
1546 * route-map handler itself might have cleared the nexthop, if for example,
1547 * it is configured as 'peer-address'.
1549 if (!bgp_rmap_nhop_changed(attr
->rmap_change_flags
,
1550 riattr
->rmap_change_flags
) &&
1552 !CHECK_FLAG (peer
->af_flags
[afi
][safi
], PEER_FLAG_NEXTHOP_UNCHANGED
))
1554 /* We can reset the nexthop, if setting (or forcing) it to 'self' */
1555 if (CHECK_FLAG (peer
->af_flags
[afi
][safi
], PEER_FLAG_NEXTHOP_SELF
) ||
1556 CHECK_FLAG (peer
->af_flags
[afi
][safi
], PEER_FLAG_FORCE_NEXTHOP_SELF
))
1559 CHECK_FLAG (peer
->af_flags
[afi
][safi
],
1560 PEER_FLAG_FORCE_NEXTHOP_SELF
))
1561 subgroup_announce_reset_nhop ((peer_cap_enhe(peer
, afi
, safi
) ?
1562 AF_INET6
: p
->family
), attr
);
1564 else if (peer
->sort
== BGP_PEER_EBGP
)
1566 /* Can also reset the nexthop if announcing to EBGP, but only if
1567 * no peer in the subgroup is on a shared subnet.
1568 * Note: 3rd party nexthop currently implemented for IPv4 only.
1570 SUBGRP_FOREACH_PEER (subgrp
, paf
)
1572 if (bgp_multiaccess_check_v4 (riattr
->nexthop
, paf
->peer
))
1576 subgroup_announce_reset_nhop ((peer_cap_enhe(peer
, afi
, safi
) ? AF_INET6
: p
->family
), attr
);
1578 /* If IPv6/MP and nexthop does not have any override and happens to
1579 * be a link-local address, reset it so that we don't pass along the
1580 * source's link-local IPv6 address to recipients who may not be on
1581 * the same interface.
1583 if (p
->family
== AF_INET6
|| peer_cap_enhe(peer
, afi
, safi
))
1585 if (IN6_IS_ADDR_LINKLOCAL (&attr
->extra
->mp_nexthop_global
))
1586 subgroup_announce_reset_nhop (AF_INET6
, attr
);
1593 struct bgp_info_pair
1595 struct bgp_info
*old
;
1596 struct bgp_info
*new;
1600 bgp_best_selection (struct bgp
*bgp
, struct bgp_node
*rn
,
1601 struct bgp_maxpaths_cfg
*mpath_cfg
,
1602 struct bgp_info_pair
*result
)
1604 struct bgp_info
*new_select
;
1605 struct bgp_info
*old_select
;
1606 struct bgp_info
*ri
;
1607 struct bgp_info
*ri1
;
1608 struct bgp_info
*ri2
;
1609 struct bgp_info
*nextri
= NULL
;
1610 int paths_eq
, do_mpath
, debug
;
1611 struct list mp_list
;
1612 char pfx_buf
[PREFIX2STR_BUFFER
];
1613 char path_buf
[PATH_ADDPATH_STR_BUFFER
];
1615 bgp_mp_list_init (&mp_list
);
1616 do_mpath
= (mpath_cfg
->maxpaths_ebgp
> 1 || mpath_cfg
->maxpaths_ibgp
> 1);
1618 debug
= bgp_debug_bestpath(&rn
->p
);
1621 prefix2str (&rn
->p
, pfx_buf
, sizeof (pfx_buf
));
1623 /* bgp deterministic-med */
1625 if (bgp_flag_check (bgp
, BGP_FLAG_DETERMINISTIC_MED
))
1628 /* Clear BGP_INFO_DMED_SELECTED for all paths */
1629 for (ri1
= rn
->info
; ri1
; ri1
= ri1
->next
)
1630 bgp_info_unset_flag (rn
, ri1
, BGP_INFO_DMED_SELECTED
);
1632 for (ri1
= rn
->info
; ri1
; ri1
= ri1
->next
)
1634 if (CHECK_FLAG (ri1
->flags
, BGP_INFO_DMED_CHECK
))
1636 if (BGP_INFO_HOLDDOWN (ri1
))
1638 if (ri1
->peer
&& ri1
->peer
!= bgp
->peer_self
)
1639 if (ri1
->peer
->status
!= Established
)
1645 for (ri2
= ri1
->next
; ri2
; ri2
= ri2
->next
)
1647 if (CHECK_FLAG (ri2
->flags
, BGP_INFO_DMED_CHECK
))
1649 if (BGP_INFO_HOLDDOWN (ri2
))
1652 ri2
->peer
!= bgp
->peer_self
&&
1653 !CHECK_FLAG (ri2
->peer
->sflags
, PEER_STATUS_NSF_WAIT
))
1654 if (ri2
->peer
->status
!= Established
)
1657 if (aspath_cmp_left (ri1
->attr
->aspath
, ri2
->attr
->aspath
)
1658 || aspath_cmp_left_confed (ri1
->attr
->aspath
,
1661 if (bgp_info_cmp (bgp
, ri2
, new_select
, &paths_eq
,
1662 mpath_cfg
, debug
, pfx_buf
))
1664 bgp_info_unset_flag (rn
, new_select
, BGP_INFO_DMED_SELECTED
);
1668 bgp_info_set_flag (rn
, ri2
, BGP_INFO_DMED_CHECK
);
1672 bgp_info_set_flag (rn
, new_select
, BGP_INFO_DMED_CHECK
);
1673 bgp_info_set_flag (rn
, new_select
, BGP_INFO_DMED_SELECTED
);
1677 bgp_info_path_with_addpath_rx_str (new_select
, path_buf
);
1678 zlog_debug("%s: %s is the bestpath from AS %d",
1679 pfx_buf
, path_buf
, aspath_get_first_as(new_select
->attr
->aspath
));
1684 /* Check old selected route and new selected route. */
1687 for (ri
= rn
->info
; (ri
!= NULL
) && (nextri
= ri
->next
, 1); ri
= nextri
)
1689 if (CHECK_FLAG (ri
->flags
, BGP_INFO_SELECTED
))
1692 if (BGP_INFO_HOLDDOWN (ri
))
1694 /* reap REMOVED routes, if needs be
1695 * selected route must stay for a while longer though
1697 if (CHECK_FLAG (ri
->flags
, BGP_INFO_REMOVED
)
1698 && (ri
!= old_select
))
1699 bgp_info_reap (rn
, ri
);
1705 ri
->peer
!= bgp
->peer_self
&&
1706 !CHECK_FLAG (ri
->peer
->sflags
, PEER_STATUS_NSF_WAIT
))
1707 if (ri
->peer
->status
!= Established
)
1710 if (bgp_flag_check (bgp
, BGP_FLAG_DETERMINISTIC_MED
)
1711 && (! CHECK_FLAG (ri
->flags
, BGP_INFO_DMED_SELECTED
)))
1713 bgp_info_unset_flag (rn
, ri
, BGP_INFO_DMED_CHECK
);
1717 bgp_info_unset_flag (rn
, ri
, BGP_INFO_DMED_CHECK
);
1719 if (bgp_info_cmp (bgp
, ri
, new_select
, &paths_eq
, mpath_cfg
, debug
, pfx_buf
))
1725 /* Now that we know which path is the bestpath see if any of the other paths
1726 * qualify as multipaths
1731 bgp_info_path_with_addpath_rx_str (new_select
, path_buf
);
1733 sprintf (path_buf
, "NONE");
1734 zlog_debug("%s: After path selection, newbest is %s oldbest was %s",
1736 old_select
? old_select
->peer
->host
: "NONE");
1739 if (do_mpath
&& new_select
)
1741 for (ri
= rn
->info
; (ri
!= NULL
) && (nextri
= ri
->next
, 1); ri
= nextri
)
1745 bgp_info_path_with_addpath_rx_str (ri
, path_buf
);
1747 if (ri
== new_select
)
1750 zlog_debug("%s: %s is the bestpath, add to the multipath list",
1752 bgp_mp_list_add (&mp_list
, ri
);
1756 if (BGP_INFO_HOLDDOWN (ri
))
1760 ri
->peer
!= bgp
->peer_self
&&
1761 !CHECK_FLAG (ri
->peer
->sflags
, PEER_STATUS_NSF_WAIT
))
1762 if (ri
->peer
->status
!= Established
)
1765 if (!bgp_info_nexthop_cmp (ri
, new_select
))
1768 zlog_debug("%s: %s has the same nexthop as the bestpath, skip it",
1773 bgp_info_cmp (bgp
, ri
, new_select
, &paths_eq
, mpath_cfg
, debug
, pfx_buf
);
1778 zlog_debug("%s: %s is equivalent to the bestpath, add to the multipath list",
1780 bgp_mp_list_add (&mp_list
, ri
);
1785 bgp_info_mpath_update (rn
, new_select
, old_select
, &mp_list
, mpath_cfg
);
1786 bgp_info_mpath_aggregate_update (new_select
, old_select
);
1787 bgp_mp_list_clear (&mp_list
);
1789 result
->old
= old_select
;
1790 result
->new = new_select
;
1796 * A new route/change in bestpath of an existing route. Evaluate the path
1797 * for advertisement to the subgroup.
1800 subgroup_process_announce_selected (struct update_subgroup
*subgrp
,
1801 struct bgp_info
*selected
,
1802 struct bgp_node
*rn
,
1803 u_int32_t addpath_tx_id
)
1806 struct peer
*onlypeer
;
1808 struct attr_extra extra
;
1813 afi
= SUBGRP_AFI(subgrp
);
1814 safi
= SUBGRP_SAFI(subgrp
);
1815 onlypeer
= ((SUBGRP_PCOUNT(subgrp
) == 1) ?
1816 (SUBGRP_PFIRST(subgrp
))->peer
: NULL
);
1818 /* First update is deferred until ORF or ROUTE-REFRESH is received */
1819 if (onlypeer
&& CHECK_FLAG (onlypeer
->af_sflags
[afi
][safi
],
1820 PEER_STATUS_ORF_WAIT_REFRESH
))
1823 memset(&extra
, 0, sizeof(struct attr_extra
));
1824 /* It's initialized in bgp_announce_check() */
1825 attr
.extra
= &extra
;
1827 /* Announcement to the subgroup. If the route is filtered withdraw it. */
1830 if (subgroup_announce_check(rn
, selected
, subgrp
, p
, &attr
))
1831 bgp_adj_out_set_subgroup(rn
, subgrp
, &attr
, selected
);
1833 bgp_adj_out_unset_subgroup(rn
, subgrp
, 1, selected
->addpath_tx_id
);
1836 /* If selected is NULL we must withdraw the path using addpath_tx_id */
1839 bgp_adj_out_unset_subgroup(rn
, subgrp
, 1, addpath_tx_id
);
1846 * Clear IGP changed flag and attribute changed flag for a route (all paths).
1847 * This is called at the end of route processing.
1850 bgp_zebra_clear_route_change_flags (struct bgp_node
*rn
)
1852 struct bgp_info
*ri
;
1854 for (ri
= rn
->info
; ri
; ri
= ri
->next
)
1856 if (BGP_INFO_HOLDDOWN (ri
))
1858 UNSET_FLAG (ri
->flags
, BGP_INFO_IGP_CHANGED
);
1859 UNSET_FLAG (ri
->flags
, BGP_INFO_ATTR_CHANGED
);
1864 * Has the route changed from the RIB's perspective? This is invoked only
1865 * if the route selection returns the same best route as earlier - to
1866 * determine if we need to update zebra or not.
1869 bgp_zebra_has_route_changed (struct bgp_node
*rn
, struct bgp_info
*selected
)
1871 struct bgp_info
*mpinfo
;
1873 /* If this is multipath, check all selected paths for any nexthop change or
1874 * attribute change. Some attribute changes (e.g., community) aren't of
1875 * relevance to the RIB, but we'll update zebra to ensure we handle the
1876 * case of BGP nexthop change. This is the behavior when the best path has
1877 * an attribute change anyway.
1879 if (CHECK_FLAG (selected
->flags
, BGP_INFO_IGP_CHANGED
) ||
1880 CHECK_FLAG (selected
->flags
, BGP_INFO_MULTIPATH_CHG
))
1883 /* If this is multipath, check all selected paths for any nexthop change */
1884 for (mpinfo
= bgp_info_mpath_first (selected
); mpinfo
;
1885 mpinfo
= bgp_info_mpath_next (mpinfo
))
1887 if (CHECK_FLAG (mpinfo
->flags
, BGP_INFO_IGP_CHANGED
)
1888 || CHECK_FLAG (mpinfo
->flags
, BGP_INFO_ATTR_CHANGED
))
1892 /* Nothing has changed from the RIB's perspective. */
1896 struct bgp_process_queue
1899 struct bgp_node
*rn
;
1904 static wq_item_status
1905 bgp_process_main (struct work_queue
*wq
, void *data
)
1907 struct bgp_process_queue
*pq
= data
;
1908 struct bgp
*bgp
= pq
->bgp
;
1909 struct bgp_node
*rn
= pq
->rn
;
1910 afi_t afi
= pq
->afi
;
1911 safi_t safi
= pq
->safi
;
1912 struct prefix
*p
= &rn
->p
;
1913 struct bgp_info
*new_select
;
1914 struct bgp_info
*old_select
;
1915 struct bgp_info_pair old_and_new
;
1917 /* Is it end of initial update? (after startup) */
1920 quagga_timestamp(3, bgp
->update_delay_zebra_resume_time
,
1921 sizeof(bgp
->update_delay_zebra_resume_time
));
1923 bgp
->main_zebra_update_hold
= 0;
1924 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++)
1925 for (safi
= SAFI_UNICAST
; safi
< SAFI_MAX
; safi
++)
1927 bgp_zebra_announce_table(bgp
, afi
, safi
);
1929 bgp
->main_peers_update_hold
= 0;
1931 bgp_start_routeadv(bgp
);
1935 /* Best path selection. */
1936 bgp_best_selection (bgp
, rn
, &bgp
->maxpaths
[afi
][safi
], &old_and_new
);
1937 old_select
= old_and_new
.old
;
1938 new_select
= old_and_new
.new;
1940 /* Do we need to allocate or free labels?
1941 * Right now, since we only deal with per-prefix labels, it is not necessary
1942 * to do this upon changes to best path except of the label index changes.
1944 if (safi
== SAFI_LABELED_UNICAST
)
1946 bgp_table_lock (bgp_node_table (rn
));
1950 bgp_label_index_differs (new_select
, old_select
) ||
1951 new_select
->sub_type
!= old_select
->sub_type
)
1953 if (new_select
->sub_type
== BGP_ROUTE_STATIC
&&
1954 new_select
->attr
->flag
& ATTR_FLAG_BIT (BGP_ATTR_PREFIX_SID
) &&
1955 new_select
->attr
->extra
->label_index
!= BGP_INVALID_LABEL_INDEX
)
1957 if (CHECK_FLAG (rn
->flags
, BGP_NODE_REGISTERED_FOR_LABEL
))
1958 bgp_unregister_for_label (rn
);
1959 label_ntop (MPLS_IMP_NULL_LABEL
, 1, rn
->local_label
);
1960 bgp_set_valid_label(rn
->local_label
);
1963 bgp_register_for_label (rn
, new_select
);
1966 else if (CHECK_FLAG (rn
->flags
, BGP_NODE_REGISTERED_FOR_LABEL
))
1967 bgp_unregister_for_label (rn
);
1970 /* If best route remains the same and this is not due to user-initiated
1971 * clear, see exactly what needs to be done.
1974 if (old_select
&& old_select
== new_select
&&
1975 !CHECK_FLAG(rn
->flags
, BGP_NODE_USER_CLEAR
) &&
1976 !CHECK_FLAG(old_select
->flags
, BGP_INFO_ATTR_CHANGED
) &&
1977 !bgp
->addpath_tx_used
[afi
][safi
])
1979 if (bgp_zebra_has_route_changed (rn
, old_select
))
1982 vnc_import_bgp_add_route(bgp
, p
, old_select
);
1983 vnc_import_bgp_exterior_add_route(bgp
, p
, old_select
);
1985 if (bgp_fibupd_safi(safi
) &&
1987 !bgp_option_check (BGP_OPT_NO_FIB
) &&
1988 new_select
->type
== ZEBRA_ROUTE_BGP
&&
1989 new_select
->sub_type
== BGP_ROUTE_NORMAL
)
1990 bgp_zebra_announce (rn
, p
, old_select
, bgp
, afi
, safi
);
1992 UNSET_FLAG (old_select
->flags
, BGP_INFO_MULTIPATH_CHG
);
1993 bgp_zebra_clear_route_change_flags (rn
);
1995 /* If there is a change of interest to peers, reannounce the route. */
1996 if (CHECK_FLAG (old_select
->flags
, BGP_INFO_ATTR_CHANGED
) ||
1997 CHECK_FLAG (rn
->flags
, BGP_NODE_LABEL_CHANGED
))
1999 group_announce_route(bgp
, afi
, safi
, rn
, new_select
);
2001 UNSET_FLAG (old_select
->flags
, BGP_INFO_ATTR_CHANGED
);
2002 UNSET_FLAG (rn
->flags
, BGP_NODE_LABEL_CHANGED
);
2005 UNSET_FLAG (rn
->flags
, BGP_NODE_PROCESS_SCHEDULED
);
2009 /* If the user did "clear ip bgp prefix x.x.x.x" this flag will be set */
2010 UNSET_FLAG(rn
->flags
, BGP_NODE_USER_CLEAR
);
2012 /* bestpath has changed; bump version */
2013 if (old_select
|| new_select
)
2015 bgp_bump_version(rn
);
2017 if (!bgp
->t_rmap_def_originate_eval
)
2020 thread_add_timer(bm
->master
,
2021 update_group_refresh_default_originate_route_map
,
2022 bgp
, RMAP_DEFAULT_ORIGINATE_EVAL_TIMER
,
2023 &bgp
->t_rmap_def_originate_eval
);
2028 bgp_info_unset_flag (rn
, old_select
, BGP_INFO_SELECTED
);
2031 bgp_info_set_flag (rn
, new_select
, BGP_INFO_SELECTED
);
2032 bgp_info_unset_flag (rn
, new_select
, BGP_INFO_ATTR_CHANGED
);
2033 UNSET_FLAG (new_select
->flags
, BGP_INFO_MULTIPATH_CHG
);
2037 if ((afi
== AFI_IP
|| afi
== AFI_IP6
) && (safi
== SAFI_UNICAST
)) {
2038 if (old_select
!= new_select
) {
2040 vnc_import_bgp_exterior_del_route(bgp
, p
, old_select
);
2041 vnc_import_bgp_del_route(bgp
, p
, old_select
);
2044 vnc_import_bgp_exterior_add_route(bgp
, p
, new_select
);
2045 vnc_import_bgp_add_route(bgp
, p
, new_select
);
2051 group_announce_route(bgp
, afi
, safi
, rn
, new_select
);
2054 if (bgp_fibupd_safi(safi
) &&
2055 (bgp
->inst_type
!= BGP_INSTANCE_TYPE_VIEW
) &&
2056 !bgp_option_check (BGP_OPT_NO_FIB
))
2059 && new_select
->type
== ZEBRA_ROUTE_BGP
2060 && (new_select
->sub_type
== BGP_ROUTE_NORMAL
||
2061 new_select
->sub_type
== BGP_ROUTE_AGGREGATE
))
2062 bgp_zebra_announce (rn
, p
, new_select
, bgp
, afi
, safi
);
2065 /* Withdraw the route from the kernel. */
2067 && old_select
->type
== ZEBRA_ROUTE_BGP
2068 && (old_select
->sub_type
== BGP_ROUTE_NORMAL
||
2069 old_select
->sub_type
== BGP_ROUTE_AGGREGATE
))
2070 bgp_zebra_withdraw (p
, old_select
, safi
);
2074 /* Clear any route change flags. */
2075 bgp_zebra_clear_route_change_flags (rn
);
2077 /* Reap old select bgp_info, if it has been removed */
2078 if (old_select
&& CHECK_FLAG (old_select
->flags
, BGP_INFO_REMOVED
))
2079 bgp_info_reap (rn
, old_select
);
2081 UNSET_FLAG (rn
->flags
, BGP_NODE_PROCESS_SCHEDULED
);
2086 bgp_processq_del (struct work_queue
*wq
, void *data
)
2088 struct bgp_process_queue
*pq
= data
;
2089 struct bgp_table
*table
;
2091 bgp_unlock (pq
->bgp
);
2094 table
= bgp_node_table (pq
->rn
);
2095 bgp_unlock_node (pq
->rn
);
2096 bgp_table_unlock (table
);
2098 XFREE (MTYPE_BGP_PROCESS_QUEUE
, pq
);
2102 bgp_process_queue_init (void)
2104 if (!bm
->process_main_queue
)
2106 bm
->process_main_queue
2107 = work_queue_new (bm
->master
, "process_main_queue");
2109 if ( !bm
->process_main_queue
)
2111 zlog_err ("%s: Failed to allocate work queue", __func__
);
2116 bm
->process_main_queue
->spec
.workfunc
= &bgp_process_main
;
2117 bm
->process_main_queue
->spec
.del_item_data
= &bgp_processq_del
;
2118 bm
->process_main_queue
->spec
.max_retries
= 0;
2119 bm
->process_main_queue
->spec
.hold
= 50;
2120 /* Use a higher yield value of 50ms for main queue processing */
2121 bm
->process_main_queue
->spec
.yield
= 50 * 1000L;
2125 bgp_process (struct bgp
*bgp
, struct bgp_node
*rn
, afi_t afi
, safi_t safi
)
2127 struct bgp_process_queue
*pqnode
;
2129 /* already scheduled for processing? */
2130 if (CHECK_FLAG (rn
->flags
, BGP_NODE_PROCESS_SCHEDULED
))
2133 if (bm
->process_main_queue
== NULL
)
2136 pqnode
= XCALLOC (MTYPE_BGP_PROCESS_QUEUE
,
2137 sizeof (struct bgp_process_queue
));
2141 /* all unlocked in bgp_processq_del */
2142 bgp_table_lock (bgp_node_table (rn
));
2143 pqnode
->rn
= bgp_lock_node (rn
);
2147 pqnode
->safi
= safi
;
2148 work_queue_add (bm
->process_main_queue
, pqnode
);
2149 SET_FLAG (rn
->flags
, BGP_NODE_PROCESS_SCHEDULED
);
2154 bgp_add_eoiu_mark (struct bgp
*bgp
)
2156 struct bgp_process_queue
*pqnode
;
2158 if (bm
->process_main_queue
== NULL
)
2161 pqnode
= XCALLOC (MTYPE_BGP_PROCESS_QUEUE
,
2162 sizeof (struct bgp_process_queue
));
2169 work_queue_add (bm
->process_main_queue
, pqnode
);
2173 bgp_maximum_prefix_restart_timer (struct thread
*thread
)
2177 peer
= THREAD_ARG (thread
);
2178 peer
->t_pmax_restart
= NULL
;
2180 if (bgp_debug_neighbor_events(peer
))
2181 zlog_debug ("%s Maximum-prefix restart timer expired, restore peering",
2184 peer_clear (peer
, NULL
);
2190 bgp_maximum_prefix_overflow (struct peer
*peer
, afi_t afi
,
2191 safi_t safi
, int always
)
2196 if (!CHECK_FLAG (peer
->af_flags
[afi
][safi
], PEER_FLAG_MAX_PREFIX
))
2199 if (peer
->pcount
[afi
][safi
] > peer
->pmax
[afi
][safi
])
2201 if (CHECK_FLAG (peer
->af_sflags
[afi
][safi
], PEER_STATUS_PREFIX_LIMIT
)
2205 zlog_info ("%%MAXPFXEXCEED: No. of %s prefix received from %s %ld exceed, "
2206 "limit %ld", afi_safi_print (afi
, safi
), peer
->host
,
2207 peer
->pcount
[afi
][safi
], peer
->pmax
[afi
][safi
]);
2208 SET_FLAG (peer
->af_sflags
[afi
][safi
], PEER_STATUS_PREFIX_LIMIT
);
2210 if (CHECK_FLAG (peer
->af_flags
[afi
][safi
], PEER_FLAG_MAX_PREFIX_WARNING
))
2213 /* Convert AFI, SAFI to values for packet. */
2214 pkt_afi
= afi_int2iana (afi
);
2215 pkt_safi
= safi_int2iana (safi
);
2219 ndata
[0] = (pkt_afi
>> 8);
2221 ndata
[2] = pkt_safi
;
2222 ndata
[3] = (peer
->pmax
[afi
][safi
] >> 24);
2223 ndata
[4] = (peer
->pmax
[afi
][safi
] >> 16);
2224 ndata
[5] = (peer
->pmax
[afi
][safi
] >> 8);
2225 ndata
[6] = (peer
->pmax
[afi
][safi
]);
2227 SET_FLAG (peer
->sflags
, PEER_STATUS_PREFIX_OVERFLOW
);
2228 bgp_notify_send_with_data (peer
, BGP_NOTIFY_CEASE
,
2229 BGP_NOTIFY_CEASE_MAX_PREFIX
, ndata
, 7);
2232 /* Dynamic peers will just close their connection. */
2233 if (peer_dynamic_neighbor (peer
))
2236 /* restart timer start */
2237 if (peer
->pmax_restart
[afi
][safi
])
2239 peer
->v_pmax_restart
= peer
->pmax_restart
[afi
][safi
] * 60;
2241 if (bgp_debug_neighbor_events(peer
))
2242 zlog_debug ("%s Maximum-prefix restart timer started for %d secs",
2243 peer
->host
, peer
->v_pmax_restart
);
2245 BGP_TIMER_ON (peer
->t_pmax_restart
, bgp_maximum_prefix_restart_timer
,
2246 peer
->v_pmax_restart
);
2252 UNSET_FLAG (peer
->af_sflags
[afi
][safi
], PEER_STATUS_PREFIX_LIMIT
);
2254 if (peer
->pcount
[afi
][safi
] > (peer
->pmax
[afi
][safi
] * peer
->pmax_threshold
[afi
][safi
] / 100))
2256 if (CHECK_FLAG (peer
->af_sflags
[afi
][safi
], PEER_STATUS_PREFIX_THRESHOLD
)
2260 zlog_info ("%%MAXPFX: No. of %s prefix received from %s reaches %ld, max %ld",
2261 afi_safi_print (afi
, safi
), peer
->host
, peer
->pcount
[afi
][safi
],
2262 peer
->pmax
[afi
][safi
]);
2263 SET_FLAG (peer
->af_sflags
[afi
][safi
], PEER_STATUS_PREFIX_THRESHOLD
);
2266 UNSET_FLAG (peer
->af_sflags
[afi
][safi
], PEER_STATUS_PREFIX_THRESHOLD
);
2270 /* Unconditionally remove the route from the RIB, without taking
2271 * damping into consideration (eg, because the session went down)
2274 bgp_rib_remove (struct bgp_node
*rn
, struct bgp_info
*ri
, struct peer
*peer
,
2275 afi_t afi
, safi_t safi
)
2277 bgp_aggregate_decrement (peer
->bgp
, &rn
->p
, ri
, afi
, safi
);
2279 if (!CHECK_FLAG (ri
->flags
, BGP_INFO_HISTORY
))
2280 bgp_info_delete (rn
, ri
); /* keep historical info */
2282 bgp_process (peer
->bgp
, rn
, afi
, safi
);
2286 bgp_rib_withdraw (struct bgp_node
*rn
, struct bgp_info
*ri
, struct peer
*peer
,
2287 afi_t afi
, safi_t safi
, struct prefix_rd
*prd
)
2289 int status
= BGP_DAMP_NONE
;
2291 /* apply dampening, if result is suppressed, we'll be retaining
2292 * the bgp_info in the RIB for historical reference.
2294 if (CHECK_FLAG (peer
->bgp
->af_flags
[afi
][safi
], BGP_CONFIG_DAMPENING
)
2295 && peer
->sort
== BGP_PEER_EBGP
)
2296 if ( (status
= bgp_damp_withdraw (ri
, rn
, afi
, safi
, 0))
2297 == BGP_DAMP_SUPPRESSED
)
2299 bgp_aggregate_decrement (peer
->bgp
, &rn
->p
, ri
, afi
, safi
);
2304 if (safi
== SAFI_MPLS_VPN
) {
2305 struct bgp_node
*prn
= NULL
;
2306 struct bgp_table
*table
= NULL
;
2308 prn
= bgp_node_get(peer
->bgp
->rib
[afi
][safi
], (struct prefix
*) prd
);
2310 table
= (struct bgp_table
*)(prn
->info
);
2312 vnc_import_bgp_del_vnc_host_route_mode_resolve_nve(
2319 bgp_unlock_node(prn
);
2321 if ((afi
== AFI_IP
|| afi
== AFI_IP6
) && (safi
== SAFI_UNICAST
)) {
2322 if (CHECK_FLAG (ri
->flags
, BGP_INFO_SELECTED
)) {
2324 vnc_import_bgp_del_route(peer
->bgp
, &rn
->p
, ri
);
2325 vnc_import_bgp_exterior_del_route(peer
->bgp
, &rn
->p
, ri
);
2329 bgp_rib_remove (rn
, ri
, peer
, afi
, safi
);
2332 static struct bgp_info
*
2333 info_make (int type
, int sub_type
, u_short instance
, struct peer
*peer
, struct attr
*attr
,
2334 struct bgp_node
*rn
)
2336 struct bgp_info
*new;
2338 /* Make new BGP info. */
2339 new = XCALLOC (MTYPE_BGP_ROUTE
, sizeof (struct bgp_info
));
2341 new->instance
= instance
;
2342 new->sub_type
= sub_type
;
2345 new->uptime
= bgp_clock ();
2347 new->addpath_tx_id
= ++peer
->bgp
->addpath_tx_id
;
2352 overlay_index_update(struct attr
*attr
, struct eth_segment_id
*eth_s_id
, union gw_addr
*gw_ip
)
2354 struct attr_extra
*extra
;
2358 extra
= bgp_attr_extra_get(attr
);
2360 if(eth_s_id
== NULL
)
2362 memset(&(extra
->evpn_overlay
.eth_s_id
),0, sizeof(struct eth_segment_id
));
2366 memcpy(&(extra
->evpn_overlay
.eth_s_id
), eth_s_id
, sizeof(struct eth_segment_id
));
2370 memset(&(extra
->evpn_overlay
.gw_ip
), 0, sizeof(union gw_addr
));
2374 memcpy(&(extra
->evpn_overlay
.gw_ip
),gw_ip
, sizeof(union gw_addr
));
2379 overlay_index_equal(afi_t afi
, struct bgp_info
*info
, struct eth_segment_id
*eth_s_id
, union gw_addr
*gw_ip
)
2381 struct eth_segment_id
*info_eth_s_id
, *info_eth_s_id_remote
;
2382 union gw_addr
*info_gw_ip
, *info_gw_ip_remote
;
2385 if(afi
!= AFI_L2VPN
)
2387 if (!info
->attr
|| !info
->attr
->extra
)
2389 memset(&temp
, 0, 16);
2390 info_eth_s_id
= (struct eth_segment_id
*)&temp
;
2391 info_gw_ip
= (union gw_addr
*)&temp
;
2392 if(eth_s_id
== NULL
&& gw_ip
== NULL
)
2397 info_eth_s_id
= &(info
->attr
->extra
->evpn_overlay
.eth_s_id
);
2398 info_gw_ip
= &(info
->attr
->extra
->evpn_overlay
.gw_ip
);
2401 info_gw_ip_remote
= (union gw_addr
*)&temp
;
2403 info_gw_ip_remote
= gw_ip
;
2404 if(eth_s_id
== NULL
)
2405 info_eth_s_id_remote
= (struct eth_segment_id
*)&temp
;
2407 info_eth_s_id_remote
= eth_s_id
;
2408 if(!memcmp(info_gw_ip
, info_gw_ip_remote
, sizeof(union gw_addr
)))
2410 return !memcmp(info_eth_s_id
, info_eth_s_id_remote
, sizeof(struct eth_segment_id
));
2413 /* Check if received nexthop is valid or not. */
2415 bgp_update_martian_nexthop (struct bgp
*bgp
, afi_t afi
, safi_t safi
, struct attr
*attr
)
2417 struct attr_extra
*attre
= attr
->extra
;
2420 /* Only validated for unicast and multicast currently. */
2421 if (safi
!= SAFI_UNICAST
&& safi
!= SAFI_MULTICAST
)
2424 /* If NEXT_HOP is present, validate it. */
2425 if (attr
->flag
& ATTR_FLAG_BIT (BGP_ATTR_NEXT_HOP
))
2427 if (attr
->nexthop
.s_addr
== 0 ||
2428 IPV4_CLASS_DE (ntohl (attr
->nexthop
.s_addr
)) ||
2429 bgp_nexthop_self (bgp
, attr
))
2433 /* If MP_NEXTHOP is present, validate it. */
2434 /* Note: For IPv6 nexthops, we only validate the global (1st) nexthop;
2435 * there is code in bgp_attr.c to ignore the link-local (2nd) nexthop if
2436 * it is not an IPv6 link-local address.
2438 if (attre
&& attre
->mp_nexthop_len
)
2440 switch (attre
->mp_nexthop_len
)
2442 case BGP_ATTR_NHLEN_IPV4
:
2443 case BGP_ATTR_NHLEN_VPNV4
:
2444 ret
= (attre
->mp_nexthop_global_in
.s_addr
== 0 ||
2445 IPV4_CLASS_DE (ntohl (attre
->mp_nexthop_global_in
.s_addr
)));
2448 case BGP_ATTR_NHLEN_IPV6_GLOBAL
:
2449 case BGP_ATTR_NHLEN_IPV6_GLOBAL_AND_LL
:
2450 case BGP_ATTR_NHLEN_VPNV6_GLOBAL
:
2451 ret
= (IN6_IS_ADDR_UNSPECIFIED(&attre
->mp_nexthop_global
) ||
2452 IN6_IS_ADDR_LOOPBACK(&attre
->mp_nexthop_global
) ||
2453 IN6_IS_ADDR_MULTICAST(&attre
->mp_nexthop_global
));
2466 bgp_update (struct peer
*peer
, struct prefix
*p
, u_int32_t addpath_id
,
2467 struct attr
*attr
, afi_t afi
, safi_t safi
, int type
,
2468 int sub_type
, struct prefix_rd
*prd
, u_char
*tag
,
2469 int soft_reconfig
, struct bgp_route_evpn
* evpn
)
2472 int aspath_loop_count
= 0;
2473 struct bgp_node
*rn
;
2475 struct attr new_attr
;
2476 struct attr_extra new_extra
;
2477 struct attr
*attr_new
;
2478 struct bgp_info
*ri
;
2479 struct bgp_info
*new;
2481 char pfx_buf
[BGP_PRD_PATH_STRLEN
];
2484 int do_loop_check
= 1;
2486 int vnc_implicit_withdraw
= 0;
2489 memset (&new_attr
, 0, sizeof(struct attr
));
2490 memset (&new_extra
, 0, sizeof(struct attr_extra
));
2493 rn
= bgp_afi_node_get (bgp
->rib
[afi
][safi
], afi
, safi
, p
, prd
);
2494 label_buf
[0] = '\0';
2495 if (bgp_labeled_safi(safi
))
2496 sprintf (label_buf
, "label %u", label_pton(tag
));
2498 /* When peer's soft reconfiguration enabled. Record input packet in
2500 if (! soft_reconfig
&& CHECK_FLAG (peer
->af_flags
[afi
][safi
], PEER_FLAG_SOFT_RECONFIG
)
2501 && peer
!= bgp
->peer_self
)
2502 bgp_adj_in_set (rn
, peer
, attr
, addpath_id
);
2504 /* Check previously received route. */
2505 for (ri
= rn
->info
; ri
; ri
= ri
->next
)
2506 if (ri
->peer
== peer
&& ri
->type
== type
&& ri
->sub_type
== sub_type
&&
2507 ri
->addpath_rx_id
== addpath_id
)
2510 /* AS path local-as loop check. */
2511 if (peer
->change_local_as
)
2513 if (! CHECK_FLAG (peer
->flags
, PEER_FLAG_LOCAL_AS_NO_PREPEND
))
2514 aspath_loop_count
= 1;
2516 if (aspath_loop_check (attr
->aspath
, peer
->change_local_as
) > aspath_loop_count
)
2518 reason
= "as-path contains our own AS;";
2523 /* If the peer is configured for "allowas-in origin" and the last ASN in the
2524 * as-path is our ASN then we do not need to call aspath_loop_check
2526 if (CHECK_FLAG (peer
->af_flags
[afi
][safi
], PEER_FLAG_ALLOWAS_IN_ORIGIN
))
2527 if (aspath_get_last_as(attr
->aspath
) == bgp
->as
)
2530 /* AS path loop check. */
2533 if (aspath_loop_check (attr
->aspath
, bgp
->as
) > peer
->allowas_in
[afi
][safi
]
2534 || (CHECK_FLAG(bgp
->config
, BGP_CONFIG_CONFEDERATION
)
2535 && aspath_loop_check(attr
->aspath
, bgp
->confed_id
) > peer
->allowas_in
[afi
][safi
]))
2537 reason
= "as-path contains our own AS;";
2542 /* Route reflector originator ID check. */
2543 if (attr
->flag
& ATTR_FLAG_BIT (BGP_ATTR_ORIGINATOR_ID
)
2544 && IPV4_ADDR_SAME (&bgp
->router_id
, &attr
->extra
->originator_id
))
2546 reason
= "originator is us;";
2550 /* Route reflector cluster ID check. */
2551 if (bgp_cluster_filter (peer
, attr
))
2553 reason
= "reflected from the same cluster;";
2557 /* Apply incoming filter. */
2558 if (bgp_input_filter (peer
, p
, attr
, afi
, safi
) == FILTER_DENY
)
2564 new_attr
.extra
= &new_extra
;
2565 bgp_attr_dup (&new_attr
, attr
);
2567 /* Apply incoming route-map.
2568 * NB: new_attr may now contain newly allocated values from route-map "set"
2569 * commands, so we need bgp_attr_flush in the error paths, until we intern
2570 * the attr (which takes over the memory references) */
2571 if (bgp_input_modifier (peer
, p
, &new_attr
, afi
, safi
, NULL
) == RMAP_DENY
)
2573 reason
= "route-map;";
2574 bgp_attr_flush (&new_attr
);
2578 /* next hop check. */
2579 if (bgp_update_martian_nexthop (bgp
, afi
, safi
, &new_attr
))
2581 reason
= "martian or self next-hop;";
2582 bgp_attr_flush (&new_attr
);
2586 attr_new
= bgp_attr_intern (&new_attr
);
2588 /* If the update is implicit withdraw. */
2591 ri
->uptime
= bgp_clock ();
2593 /* Same attribute comes in. */
2594 if (!CHECK_FLAG (ri
->flags
, BGP_INFO_REMOVED
)
2595 && attrhash_cmp (ri
->attr
, attr_new
)
2596 && (!bgp_labeled_safi(safi
) ||
2597 memcmp ((bgp_info_extra_get (ri
))->tag
, tag
, 3) == 0)
2598 && (overlay_index_equal(afi
, ri
, evpn
==NULL
?NULL
:&evpn
->eth_s_id
,
2599 evpn
==NULL
?NULL
:&evpn
->gw_ip
)))
2601 if (CHECK_FLAG (bgp
->af_flags
[afi
][safi
], BGP_CONFIG_DAMPENING
)
2602 && peer
->sort
== BGP_PEER_EBGP
2603 && CHECK_FLAG (ri
->flags
, BGP_INFO_HISTORY
))
2605 if (bgp_debug_update(peer
, p
, NULL
, 1))
2606 zlog_debug ("%s rcvd %s %s", peer
->host
,
2607 bgp_debug_rdpfxpath2str (prd
, p
, addpath_id
? 1 : 0,
2608 addpath_id
, pfx_buf
, sizeof (pfx_buf
)), label_buf
);
2610 if (bgp_damp_update (ri
, rn
, afi
, safi
) != BGP_DAMP_SUPPRESSED
)
2612 bgp_aggregate_increment (bgp
, p
, ri
, afi
, safi
);
2613 bgp_process (bgp
, rn
, afi
, safi
);
2616 else /* Duplicate - odd */
2618 if (bgp_debug_update(peer
, p
, NULL
, 1))
2620 if (!peer
->rcvd_attr_printed
)
2622 zlog_debug ("%s rcvd UPDATE w/ attr: %s", peer
->host
, peer
->rcvd_attr_str
);
2623 peer
->rcvd_attr_printed
= 1;
2626 zlog_debug ("%s rcvd %s %s...duplicate ignored",
2628 bgp_debug_rdpfxpath2str (prd
, p
, addpath_id
?
2629 1 : 0, addpath_id
, pfx_buf
, sizeof (pfx_buf
)), label_buf
);
2632 /* graceful restart STALE flag unset. */
2633 if (CHECK_FLAG (ri
->flags
, BGP_INFO_STALE
))
2635 bgp_info_unset_flag (rn
, ri
, BGP_INFO_STALE
);
2636 bgp_process (bgp
, rn
, afi
, safi
);
2640 bgp_unlock_node (rn
);
2641 bgp_attr_unintern (&attr_new
);
2646 /* Withdraw/Announce before we fully processed the withdraw */
2647 if (CHECK_FLAG(ri
->flags
, BGP_INFO_REMOVED
))
2649 if (bgp_debug_update(peer
, p
, NULL
, 1))
2650 zlog_debug ("%s rcvd %s %s, flapped quicker than processing",
2652 bgp_debug_rdpfxpath2str (prd
, p
, addpath_id
? 1 : 0,
2653 addpath_id
, pfx_buf
, sizeof (pfx_buf
)), label_buf
);
2654 bgp_info_restore (rn
, ri
);
2657 /* Received Logging. */
2658 if (bgp_debug_update(peer
, p
, NULL
, 1))
2659 zlog_debug ("%s rcvd %s %s", peer
->host
,
2660 bgp_debug_rdpfxpath2str (prd
, p
, addpath_id
? 1 : 0,
2661 addpath_id
, pfx_buf
, sizeof (pfx_buf
)), label_buf
);
2663 /* graceful restart STALE flag unset. */
2664 if (CHECK_FLAG (ri
->flags
, BGP_INFO_STALE
))
2665 bgp_info_unset_flag (rn
, ri
, BGP_INFO_STALE
);
2667 /* The attribute is changed. */
2668 bgp_info_set_flag (rn
, ri
, BGP_INFO_ATTR_CHANGED
);
2670 /* implicit withdraw, decrement aggregate and pcount here.
2671 * only if update is accepted, they'll increment below.
2673 bgp_aggregate_decrement (bgp
, p
, ri
, afi
, safi
);
2675 /* Update bgp route dampening information. */
2676 if (CHECK_FLAG (bgp
->af_flags
[afi
][safi
], BGP_CONFIG_DAMPENING
)
2677 && peer
->sort
== BGP_PEER_EBGP
)
2679 /* This is implicit withdraw so we should update dampening
2681 if (! CHECK_FLAG (ri
->flags
, BGP_INFO_HISTORY
))
2682 bgp_damp_withdraw (ri
, rn
, afi
, safi
, 1);
2685 if (safi
== SAFI_MPLS_VPN
) {
2686 struct bgp_node
*prn
= NULL
;
2687 struct bgp_table
*table
= NULL
;
2689 prn
= bgp_node_get(bgp
->rib
[afi
][safi
], (struct prefix
*) prd
);
2691 table
= (struct bgp_table
*)(prn
->info
);
2693 vnc_import_bgp_del_vnc_host_route_mode_resolve_nve(
2700 bgp_unlock_node(prn
);
2702 if ((afi
== AFI_IP
|| afi
== AFI_IP6
) && (safi
== SAFI_UNICAST
)) {
2703 if (CHECK_FLAG (ri
->flags
, BGP_INFO_SELECTED
)) {
2705 * Implicit withdraw case.
2707 ++vnc_implicit_withdraw
;
2708 vnc_import_bgp_del_route(bgp
, p
, ri
);
2709 vnc_import_bgp_exterior_del_route(bgp
, p
, ri
);
2714 /* Update to new attribute. */
2715 bgp_attr_unintern (&ri
->attr
);
2716 ri
->attr
= attr_new
;
2718 /* Update MPLS tag. */
2719 if (bgp_labeled_safi(safi
))
2720 memcpy ((bgp_info_extra_get (ri
))->tag
, tag
, 3);
2723 if ((afi
== AFI_IP
|| afi
== AFI_IP6
) && (safi
== SAFI_UNICAST
))
2725 if (vnc_implicit_withdraw
)
2728 * Add back the route with its new attributes (e.g., nexthop).
2729 * The route is still selected, until the route selection
2730 * queued by bgp_process actually runs. We have to make this
2731 * update to the VNC side immediately to avoid racing against
2732 * configuration changes (e.g., route-map changes) which
2733 * trigger re-importation of the entire RIB.
2735 vnc_import_bgp_add_route(bgp
, p
, ri
);
2736 vnc_import_bgp_exterior_add_route(bgp
, p
, ri
);
2740 /* Update Overlay Index */
2741 if(afi
== AFI_L2VPN
)
2743 overlay_index_update(ri
->attr
, evpn
==NULL
?NULL
:&evpn
->eth_s_id
,
2744 evpn
==NULL
?NULL
:&evpn
->gw_ip
);
2747 /* Update bgp route dampening information. */
2748 if (CHECK_FLAG (bgp
->af_flags
[afi
][safi
], BGP_CONFIG_DAMPENING
)
2749 && peer
->sort
== BGP_PEER_EBGP
)
2751 /* Now we do normal update dampening. */
2752 ret
= bgp_damp_update (ri
, rn
, afi
, safi
);
2753 if (ret
== BGP_DAMP_SUPPRESSED
)
2755 bgp_unlock_node (rn
);
2760 /* Nexthop reachability check - for unicast and labeled-unicast.. */
2761 if ((afi
== AFI_IP
|| afi
== AFI_IP6
) &&
2762 (safi
== SAFI_UNICAST
|| safi
== SAFI_LABELED_UNICAST
))
2764 if (peer
->sort
== BGP_PEER_EBGP
&& peer
->ttl
== 1 &&
2765 ! CHECK_FLAG (peer
->flags
, PEER_FLAG_DISABLE_CONNECTED_CHECK
)
2766 && ! bgp_flag_check(bgp
, BGP_FLAG_DISABLE_NH_CONNECTED_CHK
))
2771 if (bgp_find_or_add_nexthop (bgp
, afi
, ri
, NULL
, connected
))
2772 bgp_info_set_flag (rn
, ri
, BGP_INFO_VALID
);
2775 if (BGP_DEBUG(nht
, NHT
))
2777 char buf1
[INET6_ADDRSTRLEN
];
2778 inet_ntop(AF_INET
, (const void *)&attr_new
->nexthop
, buf1
, INET6_ADDRSTRLEN
);
2779 zlog_debug("%s(%s): NH unresolved", __FUNCTION__
, buf1
);
2781 bgp_info_unset_flag (rn
, ri
, BGP_INFO_VALID
);
2785 bgp_info_set_flag (rn
, ri
, BGP_INFO_VALID
);
2788 if (safi
== SAFI_MPLS_VPN
)
2790 struct bgp_node
*prn
= NULL
;
2791 struct bgp_table
*table
= NULL
;
2793 prn
= bgp_node_get(bgp
->rib
[afi
][safi
], (struct prefix
*) prd
);
2796 table
= (struct bgp_table
*)(prn
->info
);
2798 vnc_import_bgp_add_vnc_host_route_mode_resolve_nve(
2805 bgp_unlock_node(prn
);
2809 /* Process change. */
2810 bgp_aggregate_increment (bgp
, p
, ri
, afi
, safi
);
2812 bgp_process (bgp
, rn
, afi
, safi
);
2813 bgp_unlock_node (rn
);
2816 if (SAFI_MPLS_VPN
== safi
)
2818 uint32_t label
= decode_label(tag
);
2820 rfapiProcessUpdate(peer
, NULL
, p
, prd
, attr
, afi
, safi
, type
, sub_type
,
2823 if (SAFI_ENCAP
== safi
)
2825 rfapiProcessUpdate(peer
, NULL
, p
, prd
, attr
, afi
, safi
, type
, sub_type
,
2831 } // End of implicit withdraw
2833 /* Received Logging. */
2834 if (bgp_debug_update(peer
, p
, NULL
, 1))
2836 if (!peer
->rcvd_attr_printed
)
2838 zlog_debug ("%s rcvd UPDATE w/ attr: %s", peer
->host
, peer
->rcvd_attr_str
);
2839 peer
->rcvd_attr_printed
= 1;
2842 zlog_debug ("%s rcvd %s%s ", peer
->host
,
2843 bgp_debug_rdpfxpath2str (prd
, p
, addpath_id
? 1 : 0,
2844 addpath_id
, pfx_buf
, sizeof (pfx_buf
)), label_buf
);
2847 /* Make new BGP info. */
2848 new = info_make(type
, sub_type
, 0, peer
, attr_new
, rn
);
2850 /* Update MPLS tag. */
2851 if (bgp_labeled_safi(safi
))
2852 memcpy ((bgp_info_extra_get (new))->tag
, tag
, 3);
2854 /* Update Overlay Index */
2855 if(afi
== AFI_L2VPN
)
2857 overlay_index_update(new->attr
, evpn
==NULL
?NULL
:&evpn
->eth_s_id
,
2858 evpn
==NULL
?NULL
:&evpn
->gw_ip
);
2860 /* Nexthop reachability check. */
2861 if ((afi
== AFI_IP
|| afi
== AFI_IP6
) &&
2862 (safi
== SAFI_UNICAST
|| safi
== SAFI_LABELED_UNICAST
))
2864 if (peer
->sort
== BGP_PEER_EBGP
&& peer
->ttl
== 1 &&
2865 ! CHECK_FLAG (peer
->flags
, PEER_FLAG_DISABLE_CONNECTED_CHECK
)
2866 && ! bgp_flag_check(bgp
, BGP_FLAG_DISABLE_NH_CONNECTED_CHK
))
2871 if (bgp_find_or_add_nexthop (bgp
, afi
, new, NULL
, connected
))
2872 bgp_info_set_flag (rn
, new, BGP_INFO_VALID
);
2875 if (BGP_DEBUG(nht
, NHT
))
2877 char buf1
[INET6_ADDRSTRLEN
];
2878 inet_ntop(AF_INET
, (const void *)&attr_new
->nexthop
, buf1
, INET6_ADDRSTRLEN
);
2879 zlog_debug("%s(%s): NH unresolved", __FUNCTION__
, buf1
);
2881 bgp_info_unset_flag (rn
, new, BGP_INFO_VALID
);
2885 bgp_info_set_flag (rn
, new, BGP_INFO_VALID
);
2888 new->addpath_rx_id
= addpath_id
;
2890 /* Increment prefix */
2891 bgp_aggregate_increment (bgp
, p
, new, afi
, safi
);
2893 /* Register new BGP information. */
2894 bgp_info_add (rn
, new);
2896 /* route_node_get lock */
2897 bgp_unlock_node (rn
);
2900 if (safi
== SAFI_MPLS_VPN
)
2902 struct bgp_node
*prn
= NULL
;
2903 struct bgp_table
*table
= NULL
;
2905 prn
= bgp_node_get(bgp
->rib
[afi
][safi
], (struct prefix
*) prd
);
2908 table
= (struct bgp_table
*)(prn
->info
);
2910 vnc_import_bgp_add_vnc_host_route_mode_resolve_nve(
2917 bgp_unlock_node(prn
);
2921 /* If maximum prefix count is configured and current prefix
2923 if (bgp_maximum_prefix_overflow (peer
, afi
, safi
, 0))
2926 /* Process change. */
2927 bgp_process (bgp
, rn
, afi
, safi
);
2930 if (SAFI_MPLS_VPN
== safi
)
2932 uint32_t label
= decode_label(tag
);
2934 rfapiProcessUpdate(peer
, NULL
, p
, prd
, attr
, afi
, safi
, type
, sub_type
,
2937 if (SAFI_ENCAP
== safi
)
2939 rfapiProcessUpdate(peer
, NULL
, p
, prd
, attr
, afi
, safi
, type
, sub_type
,
2946 /* This BGP update is filtered. Log the reason then update BGP
2949 if (bgp_debug_update(peer
, p
, NULL
, 1))
2951 if (!peer
->rcvd_attr_printed
)
2953 zlog_debug ("%s rcvd UPDATE w/ attr: %s", peer
->host
, peer
->rcvd_attr_str
);
2954 peer
->rcvd_attr_printed
= 1;
2957 zlog_debug ("%s rcvd UPDATE about %s %s -- DENIED due to: %s",
2959 bgp_debug_rdpfxpath2str (prd
, p
, addpath_id
? 1 : 0,
2960 addpath_id
, pfx_buf
, sizeof (pfx_buf
)), label_buf
, reason
);
2964 bgp_rib_remove (rn
, ri
, peer
, afi
, safi
);
2966 bgp_unlock_node (rn
);
2970 * Filtered update is treated as an implicit withdrawal (see bgp_rib_remove()
2971 * a few lines above)
2973 if ((SAFI_MPLS_VPN
== safi
) || (SAFI_ENCAP
== safi
))
2975 rfapiProcessWithdraw(peer
, NULL
, p
, prd
, NULL
, afi
, safi
, type
, 0);
2983 bgp_withdraw (struct peer
*peer
, struct prefix
*p
, u_int32_t addpath_id
,
2984 struct attr
*attr
, afi_t afi
, safi_t safi
, int type
, int sub_type
,
2985 struct prefix_rd
*prd
, u_char
*tag
, struct bgp_route_evpn
*evpn
)
2988 char pfx_buf
[BGP_PRD_PATH_STRLEN
];
2989 struct bgp_node
*rn
;
2990 struct bgp_info
*ri
;
2993 if ((SAFI_MPLS_VPN
== safi
) || (SAFI_ENCAP
== safi
))
2995 rfapiProcessWithdraw(peer
, NULL
, p
, prd
, NULL
, afi
, safi
, type
, 0);
3002 rn
= bgp_afi_node_get (bgp
->rib
[afi
][safi
], afi
, safi
, p
, prd
);
3004 /* If peer is soft reconfiguration enabled. Record input packet for
3005 * further calculation.
3007 * Cisco IOS 12.4(24)T4 on session establishment sends withdraws for all
3008 * routes that are filtered. This tanks out Quagga RS pretty badly due to
3009 * the iteration over all RS clients.
3010 * Since we need to remove the entry from adj_in anyway, do that first and
3011 * if there was no entry, we don't need to do anything more.
3013 if (CHECK_FLAG (peer
->af_flags
[afi
][safi
], PEER_FLAG_SOFT_RECONFIG
)
3014 && peer
!= bgp
->peer_self
)
3015 if (!bgp_adj_in_unset (rn
, peer
, addpath_id
))
3017 if (bgp_debug_update (peer
, p
, NULL
, 1))
3018 zlog_debug ("%s withdrawing route %s not in adj-in",
3020 bgp_debug_rdpfxpath2str (prd
, p
, addpath_id
? 1 : 0,
3021 addpath_id
, pfx_buf
, sizeof (pfx_buf
)));
3022 bgp_unlock_node (rn
);
3026 /* Lookup withdrawn route. */
3027 for (ri
= rn
->info
; ri
; ri
= ri
->next
)
3028 if (ri
->peer
== peer
&& ri
->type
== type
&& ri
->sub_type
== sub_type
&&
3029 ri
->addpath_rx_id
== addpath_id
)
3033 if (bgp_debug_update(peer
, p
, NULL
, 1))
3035 zlog_debug ("%s rcvd UPDATE about %s -- withdrawn",
3037 bgp_debug_rdpfxpath2str (prd
, p
, addpath_id
? 1 : 0,
3038 addpath_id
, pfx_buf
, sizeof (pfx_buf
)));
3041 /* Withdraw specified route from routing table. */
3042 if (ri
&& ! CHECK_FLAG (ri
->flags
, BGP_INFO_HISTORY
))
3043 bgp_rib_withdraw (rn
, ri
, peer
, afi
, safi
, prd
);
3044 else if (bgp_debug_update(peer
, p
, NULL
, 1))
3045 zlog_debug ("%s Can't find the route %s",
3047 bgp_debug_rdpfxpath2str (prd
, p
, addpath_id
? 1 : 0,
3048 addpath_id
, pfx_buf
, sizeof (pfx_buf
)));
3050 /* Unlock bgp_node_get() lock. */
3051 bgp_unlock_node (rn
);
3057 bgp_default_originate (struct peer
*peer
, afi_t afi
, safi_t safi
, int withdraw
)
3059 struct update_subgroup
*subgrp
;
3060 subgrp
= peer_subgroup(peer
, afi
, safi
);
3061 subgroup_default_originate(subgrp
, withdraw
);
3066 * bgp_stop_announce_route_timer
3069 bgp_stop_announce_route_timer (struct peer_af
*paf
)
3071 if (!paf
->t_announce_route
)
3074 THREAD_TIMER_OFF (paf
->t_announce_route
);
3078 * bgp_announce_route_timer_expired
3080 * Callback that is invoked when the route announcement timer for a
3084 bgp_announce_route_timer_expired (struct thread
*t
)
3086 struct peer_af
*paf
;
3089 paf
= THREAD_ARG (t
);
3092 if (peer
->status
!= Established
)
3095 if (!peer
->afc_nego
[paf
->afi
][paf
->safi
])
3098 peer_af_announce_route (paf
, 1);
3103 * bgp_announce_route
3105 * *Triggers* announcement of routes of a given AFI/SAFI to a peer.
3108 bgp_announce_route (struct peer
*peer
, afi_t afi
, safi_t safi
)
3110 struct peer_af
*paf
;
3111 struct update_subgroup
*subgrp
;
3113 paf
= peer_af_find (peer
, afi
, safi
);
3116 subgrp
= PAF_SUBGRP(paf
);
3119 * Ignore if subgroup doesn't exist (implies AF is not negotiated)
3120 * or a refresh has already been triggered.
3122 if (!subgrp
|| paf
->t_announce_route
)
3126 * Start a timer to stagger/delay the announce. This serves
3127 * two purposes - announcement can potentially be combined for
3128 * multiple peers and the announcement doesn't happen in the
3131 thread_add_timer_msec(bm
->master
, bgp_announce_route_timer_expired
, paf
,
3132 (subgrp
->peer_count
== 1) ? BGP_ANNOUNCE_ROUTE_SHORT_DELAY_MS
: BGP_ANNOUNCE_ROUTE_DELAY_MS
,
3133 &paf
->t_announce_route
);
3137 * Announce routes from all AF tables to a peer.
3139 * This should ONLY be called when there is a need to refresh the
3140 * routes to the peer based on a policy change for this peer alone
3141 * or a route refresh request received from the peer.
3142 * The operation will result in splitting the peer from its existing
3143 * subgroups and putting it in new subgroups.
3146 bgp_announce_route_all (struct peer
*peer
)
3151 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++)
3152 for (safi
= SAFI_UNICAST
; safi
< SAFI_MAX
; safi
++)
3153 bgp_announce_route (peer
, afi
, safi
);
3157 bgp_soft_reconfig_table (struct peer
*peer
, afi_t afi
, safi_t safi
,
3158 struct bgp_table
*table
, struct prefix_rd
*prd
)
3161 struct bgp_node
*rn
;
3162 struct bgp_adj_in
*ain
;
3165 table
= peer
->bgp
->rib
[afi
][safi
];
3167 for (rn
= bgp_table_top (table
); rn
; rn
= bgp_route_next (rn
))
3168 for (ain
= rn
->adj_in
; ain
; ain
= ain
->next
)
3170 if (ain
->peer
== peer
)
3172 struct bgp_info
*ri
= rn
->info
;
3173 u_char
*tag
= (ri
&& ri
->extra
) ? ri
->extra
->tag
: NULL
;
3175 ret
= bgp_update (peer
, &rn
->p
, ain
->addpath_rx_id
, ain
->attr
,
3176 afi
, safi
, ZEBRA_ROUTE_BGP
, BGP_ROUTE_NORMAL
,
3181 bgp_unlock_node (rn
);
3189 bgp_soft_reconfig_in (struct peer
*peer
, afi_t afi
, safi_t safi
)
3191 struct bgp_node
*rn
;
3192 struct bgp_table
*table
;
3194 if (peer
->status
!= Established
)
3197 if ((safi
!= SAFI_MPLS_VPN
) && (safi
!= SAFI_ENCAP
) && (safi
!= SAFI_EVPN
))
3198 bgp_soft_reconfig_table (peer
, afi
, safi
, NULL
, NULL
);
3200 for (rn
= bgp_table_top (peer
->bgp
->rib
[afi
][safi
]); rn
;
3201 rn
= bgp_route_next (rn
))
3202 if ((table
= rn
->info
) != NULL
)
3204 struct prefix_rd prd
;
3205 prd
.family
= AF_UNSPEC
;
3207 memcpy(&prd
.val
, rn
->p
.u
.val
, 8);
3209 bgp_soft_reconfig_table (peer
, afi
, safi
, table
, &prd
);
3214 struct bgp_clear_node_queue
3216 struct bgp_node
*rn
;
3219 static wq_item_status
3220 bgp_clear_route_node (struct work_queue
*wq
, void *data
)
3222 struct bgp_clear_node_queue
*cnq
= data
;
3223 struct bgp_node
*rn
= cnq
->rn
;
3224 struct peer
*peer
= wq
->spec
.data
;
3225 struct bgp_info
*ri
;
3226 afi_t afi
= bgp_node_table (rn
)->afi
;
3227 safi_t safi
= bgp_node_table (rn
)->safi
;
3229 assert (rn
&& peer
);
3231 /* It is possible that we have multiple paths for a prefix from a peer
3232 * if that peer is using AddPath.
3234 for (ri
= rn
->info
; ri
; ri
= ri
->next
)
3235 if (ri
->peer
== peer
)
3237 /* graceful restart STALE flag set. */
3238 if (CHECK_FLAG (peer
->sflags
, PEER_STATUS_NSF_WAIT
)
3239 && peer
->nsf
[afi
][safi
]
3240 && ! CHECK_FLAG (ri
->flags
, BGP_INFO_STALE
)
3241 && ! CHECK_FLAG (ri
->flags
, BGP_INFO_UNUSEABLE
))
3242 bgp_info_set_flag (rn
, ri
, BGP_INFO_STALE
);
3244 bgp_rib_remove (rn
, ri
, peer
, afi
, safi
);
3250 bgp_clear_node_queue_del (struct work_queue
*wq
, void *data
)
3252 struct bgp_clear_node_queue
*cnq
= data
;
3253 struct bgp_node
*rn
= cnq
->rn
;
3254 struct bgp_table
*table
= bgp_node_table (rn
);
3256 bgp_unlock_node (rn
);
3257 bgp_table_unlock (table
);
3258 XFREE (MTYPE_BGP_CLEAR_NODE_QUEUE
, cnq
);
3262 bgp_clear_node_complete (struct work_queue
*wq
)
3264 struct peer
*peer
= wq
->spec
.data
;
3266 /* Tickle FSM to start moving again */
3267 BGP_EVENT_ADD (peer
, Clearing_Completed
);
3269 peer_unlock (peer
); /* bgp_clear_route */
3273 bgp_clear_node_queue_init (struct peer
*peer
)
3275 char wname
[sizeof("clear xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx")];
3277 snprintf (wname
, sizeof(wname
), "clear %s", peer
->host
);
3278 #undef CLEAR_QUEUE_NAME_LEN
3280 if ( (peer
->clear_node_queue
= work_queue_new (bm
->master
, wname
)) == NULL
)
3282 zlog_err ("%s: Failed to allocate work queue", __func__
);
3285 peer
->clear_node_queue
->spec
.hold
= 10;
3286 peer
->clear_node_queue
->spec
.workfunc
= &bgp_clear_route_node
;
3287 peer
->clear_node_queue
->spec
.del_item_data
= &bgp_clear_node_queue_del
;
3288 peer
->clear_node_queue
->spec
.completion_func
= &bgp_clear_node_complete
;
3289 peer
->clear_node_queue
->spec
.max_retries
= 0;
3291 /* we only 'lock' this peer reference when the queue is actually active */
3292 peer
->clear_node_queue
->spec
.data
= peer
;
3296 bgp_clear_route_table (struct peer
*peer
, afi_t afi
, safi_t safi
,
3297 struct bgp_table
*table
)
3299 struct bgp_node
*rn
;
3300 int force
= bm
->process_main_queue
? 0 : 1;
3303 table
= peer
->bgp
->rib
[afi
][safi
];
3305 /* If still no table => afi/safi isn't configured at all or smth. */
3309 for (rn
= bgp_table_top (table
); rn
; rn
= bgp_route_next (rn
))
3311 struct bgp_info
*ri
, *next
;
3312 struct bgp_adj_in
*ain
;
3313 struct bgp_adj_in
*ain_next
;
3315 /* XXX:TODO: This is suboptimal, every non-empty route_node is
3316 * queued for every clearing peer, regardless of whether it is
3317 * relevant to the peer at hand.
3319 * Overview: There are 3 different indices which need to be
3320 * scrubbed, potentially, when a peer is removed:
3322 * 1 peer's routes visible via the RIB (ie accepted routes)
3323 * 2 peer's routes visible by the (optional) peer's adj-in index
3324 * 3 other routes visible by the peer's adj-out index
3326 * 3 there is no hurry in scrubbing, once the struct peer is
3327 * removed from bgp->peer, we could just GC such deleted peer's
3328 * adj-outs at our leisure.
3330 * 1 and 2 must be 'scrubbed' in some way, at least made
3331 * invisible via RIB index before peer session is allowed to be
3332 * brought back up. So one needs to know when such a 'search' is
3337 * - there'd be a single global queue or a single RIB walker
3338 * - rather than tracking which route_nodes still need to be
3339 * examined on a peer basis, we'd track which peers still
3342 * Given that our per-peer prefix-counts now should be reliable,
3343 * this may actually be achievable. It doesn't seem to be a huge
3344 * problem at this time,
3346 * It is possible that we have multiple paths for a prefix from a peer
3347 * if that peer is using AddPath.
3352 ain_next
= ain
->next
;
3354 if (ain
->peer
== peer
)
3356 bgp_adj_in_remove (rn
, ain
);
3357 bgp_unlock_node (rn
);
3363 for (ri
= rn
->info
; ri
; ri
= next
)
3366 if (ri
->peer
!= peer
)
3370 bgp_info_reap (rn
, ri
);
3373 struct bgp_clear_node_queue
*cnq
;
3375 /* both unlocked in bgp_clear_node_queue_del */
3376 bgp_table_lock (bgp_node_table (rn
));
3378 cnq
= XCALLOC (MTYPE_BGP_CLEAR_NODE_QUEUE
,
3379 sizeof (struct bgp_clear_node_queue
));
3381 work_queue_add (peer
->clear_node_queue
, cnq
);
3390 bgp_clear_route (struct peer
*peer
, afi_t afi
, safi_t safi
)
3392 struct bgp_node
*rn
;
3393 struct bgp_table
*table
;
3395 if (peer
->clear_node_queue
== NULL
)
3396 bgp_clear_node_queue_init (peer
);
3398 /* bgp_fsm.c keeps sessions in state Clearing, not transitioning to
3399 * Idle until it receives a Clearing_Completed event. This protects
3400 * against peers which flap faster than we can we clear, which could
3403 * a) race with routes from the new session being installed before
3404 * clear_route_node visits the node (to delete the route of that
3406 * b) resource exhaustion, clear_route_node likely leads to an entry
3407 * on the process_main queue. Fast-flapping could cause that queue
3411 /* lock peer in assumption that clear-node-queue will get nodes; if so,
3412 * the unlock will happen upon work-queue completion; other wise, the
3413 * unlock happens at the end of this function.
3415 if (!peer
->clear_node_queue
->thread
)
3418 if (safi
!= SAFI_MPLS_VPN
&& safi
!= SAFI_ENCAP
&& safi
!= SAFI_EVPN
)
3419 bgp_clear_route_table (peer
, afi
, safi
, NULL
);
3421 for (rn
= bgp_table_top (peer
->bgp
->rib
[afi
][safi
]); rn
;
3422 rn
= bgp_route_next (rn
))
3423 if ((table
= rn
->info
) != NULL
)
3424 bgp_clear_route_table (peer
, afi
, safi
, table
);
3426 /* unlock if no nodes got added to the clear-node-queue. */
3427 if (!peer
->clear_node_queue
->thread
)
3433 bgp_clear_route_all (struct peer
*peer
)
3438 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++)
3439 for (safi
= SAFI_UNICAST
; safi
< SAFI_MAX
; safi
++)
3440 bgp_clear_route (peer
, afi
, safi
);
3443 rfapiProcessPeerDown(peer
);
3448 bgp_clear_adj_in (struct peer
*peer
, afi_t afi
, safi_t safi
)
3450 struct bgp_table
*table
;
3451 struct bgp_node
*rn
;
3452 struct bgp_adj_in
*ain
;
3453 struct bgp_adj_in
*ain_next
;
3455 table
= peer
->bgp
->rib
[afi
][safi
];
3457 /* It is possible that we have multiple paths for a prefix from a peer
3458 * if that peer is using AddPath.
3460 for (rn
= bgp_table_top (table
); rn
; rn
= bgp_route_next (rn
))
3466 ain_next
= ain
->next
;
3468 if (ain
->peer
== peer
)
3470 bgp_adj_in_remove (rn
, ain
);
3471 bgp_unlock_node (rn
);
3480 bgp_clear_stale_route (struct peer
*peer
, afi_t afi
, safi_t safi
)
3482 struct bgp_node
*rn
;
3483 struct bgp_info
*ri
;
3484 struct bgp_table
*table
;
3486 if ( safi
== SAFI_MPLS_VPN
)
3488 for (rn
= bgp_table_top (peer
->bgp
->rib
[afi
][safi
]); rn
; rn
= bgp_route_next (rn
))
3490 struct bgp_node
*rm
;
3491 struct bgp_info
*ri
;
3493 /* look for neighbor in tables */
3494 if ((table
= rn
->info
) != NULL
)
3496 for (rm
= bgp_table_top (table
); rm
; rm
= bgp_route_next (rm
))
3497 for (ri
= rm
->info
; ri
; ri
= ri
->next
)
3498 if (ri
->peer
== peer
)
3500 if (CHECK_FLAG (ri
->flags
, BGP_INFO_STALE
))
3501 bgp_rib_remove (rm
, ri
, peer
, afi
, safi
);
3509 for (rn
= bgp_table_top (peer
->bgp
->rib
[afi
][safi
]); rn
; rn
= bgp_route_next (rn
))
3510 for (ri
= rn
->info
; ri
; ri
= ri
->next
)
3511 if (ri
->peer
== peer
)
3513 if (CHECK_FLAG (ri
->flags
, BGP_INFO_STALE
))
3514 bgp_rib_remove (rn
, ri
, peer
, afi
, safi
);
3521 bgp_cleanup_table(struct bgp_table
*table
, safi_t safi
)
3523 struct bgp_node
*rn
;
3524 struct bgp_info
*ri
;
3525 struct bgp_info
*next
;
3527 for (rn
= bgp_table_top (table
); rn
; rn
= bgp_route_next (rn
))
3528 for (ri
= rn
->info
; ri
; ri
= next
)
3531 if (CHECK_FLAG (ri
->flags
, BGP_INFO_SELECTED
)
3532 && ri
->type
== ZEBRA_ROUTE_BGP
3533 && (ri
->sub_type
== BGP_ROUTE_NORMAL
||
3534 ri
->sub_type
== BGP_ROUTE_AGGREGATE
))
3537 if (table
->owner
&& table
->owner
->bgp
)
3538 vnc_import_bgp_del_route(table
->owner
->bgp
, &rn
->p
, ri
);
3540 bgp_zebra_withdraw (&rn
->p
, ri
, safi
);
3541 bgp_info_reap (rn
, ri
);
3546 /* Delete all kernel routes. */
3548 bgp_cleanup_routes (struct bgp
*bgp
)
3551 struct bgp_node
*rn
;
3553 for (afi
= AFI_IP
; afi
< AFI_MAX
; ++afi
)
3555 if (afi
== AFI_L2VPN
)
3557 bgp_cleanup_table(bgp
->rib
[afi
][SAFI_UNICAST
], SAFI_UNICAST
);
3559 * VPN and ENCAP and EVPN tables are two-level (RD is top level)
3561 if (afi
!= AFI_L2VPN
)
3564 safi
= SAFI_MPLS_VPN
;
3565 for (rn
= bgp_table_top(bgp
->rib
[afi
][safi
]); rn
;
3566 rn
= bgp_route_next (rn
))
3570 bgp_cleanup_table((struct bgp_table
*)(rn
->info
), safi
);
3571 bgp_table_finish ((struct bgp_table
**)&(rn
->info
));
3573 bgp_unlock_node(rn
);
3577 for (rn
= bgp_table_top(bgp
->rib
[afi
][safi
]); rn
;
3578 rn
= bgp_route_next (rn
))
3582 bgp_cleanup_table((struct bgp_table
*)(rn
->info
), safi
);
3583 bgp_table_finish ((struct bgp_table
**)&(rn
->info
));
3585 bgp_unlock_node(rn
);
3590 for (rn
= bgp_table_top(bgp
->rib
[AFI_L2VPN
][SAFI_EVPN
]); rn
;
3591 rn
= bgp_route_next (rn
))
3595 bgp_cleanup_table((struct bgp_table
*)(rn
->info
), SAFI_EVPN
);
3596 bgp_table_finish ((struct bgp_table
**)&(rn
->info
));
3598 bgp_unlock_node(rn
);
3607 bgp_zclient_reset ();
3608 access_list_reset ();
3609 prefix_list_reset ();
3613 bgp_addpath_encode_rx (struct peer
*peer
, afi_t afi
, safi_t safi
)
3615 return (CHECK_FLAG (peer
->af_cap
[afi
][safi
], PEER_CAP_ADDPATH_AF_RX_ADV
) &&
3616 CHECK_FLAG (peer
->af_cap
[afi
][safi
], PEER_CAP_ADDPATH_AF_TX_RCV
));
3619 /* Parse NLRI stream. Withdraw NLRI is recognized by NULL attr
3622 bgp_nlri_parse_ip (struct peer
*peer
, struct attr
*attr
,
3623 struct bgp_nlri
*packet
)
3632 int addpath_encoded
;
3633 u_int32_t addpath_id
;
3635 /* Check peer status. */
3636 if (peer
->status
!= Established
)
3640 lim
= pnt
+ packet
->length
;
3642 safi
= packet
->safi
;
3644 addpath_encoded
= bgp_addpath_encode_rx (peer
, afi
, safi
);
3646 /* RFC4771 6.3 The NLRI field in the UPDATE message is checked for
3647 syntactic validity. If the field is syntactically incorrect,
3648 then the Error Subcode is set to Invalid Network Field. */
3649 for (; pnt
< lim
; pnt
+= psize
)
3651 /* Clear prefix structure. */
3652 memset (&p
, 0, sizeof (struct prefix
));
3654 if (addpath_encoded
)
3657 /* When packet overflow occurs return immediately. */
3658 if (pnt
+ BGP_ADDPATH_ID_LEN
> lim
)
3661 addpath_id
= ntohl(*((uint32_t*) pnt
));
3662 pnt
+= BGP_ADDPATH_ID_LEN
;
3665 /* Fetch prefix length. */
3666 p
.prefixlen
= *pnt
++;
3667 /* afi/safi validity already verified by caller, bgp_update_receive */
3668 p
.family
= afi2family (afi
);
3670 /* Prefix length check. */
3671 if (p
.prefixlen
> prefix_blen (&p
) * 8)
3673 zlog_err("%s [Error] Update packet error (wrong perfix length %d for afi %u)",
3674 peer
->host
, p
.prefixlen
, packet
->afi
);
3678 /* Packet size overflow check. */
3679 psize
= PSIZE (p
.prefixlen
);
3681 /* When packet overflow occur return immediately. */
3682 if (pnt
+ psize
> lim
)
3684 zlog_err("%s [Error] Update packet error (prefix length %d overflows packet)",
3685 peer
->host
, p
.prefixlen
);
3689 /* Defensive coding, double-check the psize fits in a struct prefix */
3690 if (psize
> (ssize_t
) sizeof(p
.u
))
3692 zlog_err("%s [Error] Update packet error (prefix length %d too large for prefix storage %zu)",
3693 peer
->host
, p
.prefixlen
, sizeof(p
.u
));
3697 /* Fetch prefix from NLRI packet. */
3698 memcpy (&p
.u
.prefix
, pnt
, psize
);
3700 /* Check address. */
3701 if (afi
== AFI_IP
&& safi
== SAFI_UNICAST
)
3703 if (IN_CLASSD (ntohl (p
.u
.prefix4
.s_addr
)))
3705 /* From RFC4271 Section 6.3:
3707 * If a prefix in the NLRI field is semantically incorrect
3708 * (e.g., an unexpected multicast IP address), an error SHOULD
3709 * be logged locally, and the prefix SHOULD be ignored.
3711 zlog_err ("%s: IPv4 unicast NLRI is multicast address %s, ignoring",
3712 peer
->host
, inet_ntoa (p
.u
.prefix4
));
3717 /* Check address. */
3718 if (afi
== AFI_IP6
&& safi
== SAFI_UNICAST
)
3720 if (IN6_IS_ADDR_LINKLOCAL (&p
.u
.prefix6
))
3724 zlog_err ("%s: IPv6 unicast NLRI is link-local address %s, ignoring",
3725 peer
->host
, inet_ntop (AF_INET6
, &p
.u
.prefix6
, buf
, BUFSIZ
));
3729 if (IN6_IS_ADDR_MULTICAST (&p
.u
.prefix6
))
3733 zlog_err ("%s: IPv6 unicast NLRI is multicast address %s, ignoring",
3734 peer
->host
, inet_ntop (AF_INET6
, &p
.u
.prefix6
, buf
, BUFSIZ
));
3740 /* Normal process. */
3742 ret
= bgp_update (peer
, &p
, addpath_id
, attr
, afi
, safi
,
3743 ZEBRA_ROUTE_BGP
, BGP_ROUTE_NORMAL
, NULL
, NULL
, 0, NULL
);
3745 ret
= bgp_withdraw (peer
, &p
, addpath_id
, attr
, afi
, safi
,
3746 ZEBRA_ROUTE_BGP
, BGP_ROUTE_NORMAL
, NULL
, NULL
, NULL
);
3748 /* Address family configuration mismatch or maximum-prefix count
3754 /* Packet length consistency check. */
3757 zlog_err ("%s [Error] Update packet error (prefix length mismatch with total length)",
3765 static struct bgp_static
*
3766 bgp_static_new (void)
3768 return XCALLOC (MTYPE_BGP_STATIC
, sizeof (struct bgp_static
));
3772 bgp_static_free (struct bgp_static
*bgp_static
)
3774 if (bgp_static
->rmap
.name
)
3775 XFREE(MTYPE_ROUTE_MAP_NAME
, bgp_static
->rmap
.name
);
3776 if(bgp_static
->eth_s_id
)
3777 XFREE(MTYPE_ATTR
, bgp_static
->eth_s_id
);
3778 XFREE (MTYPE_BGP_STATIC
, bgp_static
);
3782 bgp_static_update (struct bgp
*bgp
, struct prefix
*p
,
3783 struct bgp_static
*bgp_static
, afi_t afi
, safi_t safi
)
3785 struct bgp_node
*rn
;
3786 struct bgp_info
*ri
;
3787 struct bgp_info
*new;
3788 struct bgp_info info
;
3790 struct attr
*attr_new
;
3793 int vnc_implicit_withdraw
= 0;
3796 assert (bgp_static
);
3800 rn
= bgp_afi_node_get (bgp
->rib
[afi
][safi
], afi
, safi
, p
, NULL
);
3802 bgp_attr_default_set (&attr
, BGP_ORIGIN_IGP
);
3804 attr
.nexthop
= bgp_static
->igpnexthop
;
3805 attr
.med
= bgp_static
->igpmetric
;
3806 attr
.flag
|= ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC
);
3808 if (bgp_static
->atomic
)
3809 attr
.flag
|= ATTR_FLAG_BIT (BGP_ATTR_ATOMIC_AGGREGATE
);
3811 /* Store label index, if required. */
3812 if (bgp_static
->label_index
!= BGP_INVALID_LABEL_INDEX
)
3814 (bgp_attr_extra_get (&attr
))->label_index
= bgp_static
->label_index
;
3815 attr
.flag
|= ATTR_FLAG_BIT (BGP_ATTR_PREFIX_SID
);
3818 /* Apply route-map. */
3819 if (bgp_static
->rmap
.name
)
3821 struct attr attr_tmp
= attr
;
3822 info
.peer
= bgp
->peer_self
;
3823 info
.attr
= &attr_tmp
;
3825 SET_FLAG (bgp
->peer_self
->rmap_type
, PEER_RMAP_TYPE_NETWORK
);
3827 ret
= route_map_apply (bgp_static
->rmap
.map
, p
, RMAP_BGP
, &info
);
3829 bgp
->peer_self
->rmap_type
= 0;
3831 if (ret
== RMAP_DENYMATCH
)
3833 /* Free uninterned attribute. */
3834 bgp_attr_flush (&attr_tmp
);
3836 /* Unintern original. */
3837 aspath_unintern (&attr
.aspath
);
3838 bgp_attr_extra_free (&attr
);
3839 bgp_static_withdraw (bgp
, p
, afi
, safi
);
3842 attr_new
= bgp_attr_intern (&attr_tmp
);
3845 attr_new
= bgp_attr_intern (&attr
);
3847 for (ri
= rn
->info
; ri
; ri
= ri
->next
)
3848 if (ri
->peer
== bgp
->peer_self
&& ri
->type
== ZEBRA_ROUTE_BGP
3849 && ri
->sub_type
== BGP_ROUTE_STATIC
)
3854 if (attrhash_cmp (ri
->attr
, attr_new
) &&
3855 !CHECK_FLAG(ri
->flags
, BGP_INFO_REMOVED
) &&
3856 !bgp_flag_check(bgp
, BGP_FLAG_FORCE_STATIC_PROCESS
))
3858 bgp_unlock_node (rn
);
3859 bgp_attr_unintern (&attr_new
);
3860 aspath_unintern (&attr
.aspath
);
3861 bgp_attr_extra_free (&attr
);
3866 /* The attribute is changed. */
3867 bgp_info_set_flag (rn
, ri
, BGP_INFO_ATTR_CHANGED
);
3869 /* Rewrite BGP route information. */
3870 if (CHECK_FLAG(ri
->flags
, BGP_INFO_REMOVED
))
3871 bgp_info_restore(rn
, ri
);
3873 bgp_aggregate_decrement (bgp
, p
, ri
, afi
, safi
);
3875 if ((afi
== AFI_IP
|| afi
== AFI_IP6
) && (safi
== SAFI_UNICAST
))
3877 if (CHECK_FLAG (ri
->flags
, BGP_INFO_SELECTED
))
3880 * Implicit withdraw case.
3881 * We have to do this before ri is changed
3883 ++vnc_implicit_withdraw
;
3884 vnc_import_bgp_del_route(bgp
, p
, ri
);
3885 vnc_import_bgp_exterior_del_route(bgp
, p
, ri
);
3889 bgp_attr_unintern (&ri
->attr
);
3890 ri
->attr
= attr_new
;
3891 ri
->uptime
= bgp_clock ();
3893 if ((afi
== AFI_IP
|| afi
== AFI_IP6
) && (safi
== SAFI_UNICAST
))
3895 if (vnc_implicit_withdraw
)
3897 vnc_import_bgp_add_route(bgp
, p
, ri
);
3898 vnc_import_bgp_exterior_add_route(bgp
, p
, ri
);
3903 /* Nexthop reachability check. */
3904 if (bgp_flag_check (bgp
, BGP_FLAG_IMPORT_CHECK
) &&
3905 safi
== SAFI_UNICAST
)
3907 if (bgp_find_or_add_nexthop (bgp
, afi
, ri
, NULL
, 0) &&
3908 safi
== SAFI_UNICAST
)
3909 bgp_info_set_flag (rn
, ri
, BGP_INFO_VALID
);
3912 if (BGP_DEBUG(nht
, NHT
))
3914 char buf1
[INET6_ADDRSTRLEN
];
3915 inet_ntop(p
->family
, &p
->u
.prefix
, buf1
,
3917 zlog_debug("%s(%s): Route not in table, not advertising",
3918 __FUNCTION__
, buf1
);
3920 bgp_info_unset_flag (rn
, ri
, BGP_INFO_VALID
);
3925 /* Delete the NHT structure if any, if we're toggling between
3926 * enabling/disabling import check. We deregister the route
3927 * from NHT to avoid overloading NHT and the process interaction
3929 bgp_unlink_nexthop(ri
);
3930 bgp_info_set_flag (rn
, ri
, BGP_INFO_VALID
);
3932 /* Process change. */
3933 bgp_aggregate_increment (bgp
, p
, ri
, afi
, safi
);
3934 bgp_process (bgp
, rn
, afi
, safi
);
3935 bgp_unlock_node (rn
);
3936 aspath_unintern (&attr
.aspath
);
3937 bgp_attr_extra_free (&attr
);
3942 /* Make new BGP info. */
3943 new = info_make(ZEBRA_ROUTE_BGP
, BGP_ROUTE_STATIC
, 0, bgp
->peer_self
, attr_new
,
3945 /* Nexthop reachability check. */
3946 if (bgp_flag_check (bgp
, BGP_FLAG_IMPORT_CHECK
))
3948 if (bgp_find_or_add_nexthop (bgp
, afi
, new, NULL
, 0))
3949 bgp_info_set_flag (rn
, new, BGP_INFO_VALID
);
3952 if (BGP_DEBUG(nht
, NHT
))
3954 char buf1
[INET6_ADDRSTRLEN
];
3955 inet_ntop(p
->family
, &p
->u
.prefix
, buf1
,
3957 zlog_debug("%s(%s): Route not in table, not advertising",
3958 __FUNCTION__
, buf1
);
3960 bgp_info_unset_flag (rn
, new, BGP_INFO_VALID
);
3965 /* Delete the NHT structure if any, if we're toggling between
3966 * enabling/disabling import check. We deregister the route
3967 * from NHT to avoid overloading NHT and the process interaction
3969 bgp_unlink_nexthop(new);
3971 bgp_info_set_flag (rn
, new, BGP_INFO_VALID
);
3974 /* Aggregate address increment. */
3975 bgp_aggregate_increment (bgp
, p
, new, afi
, safi
);
3977 /* Register new BGP information. */
3978 bgp_info_add (rn
, new);
3980 /* route_node_get lock */
3981 bgp_unlock_node (rn
);
3983 /* Process change. */
3984 bgp_process (bgp
, rn
, afi
, safi
);
3986 /* Unintern original. */
3987 aspath_unintern (&attr
.aspath
);
3988 bgp_attr_extra_free (&attr
);
3992 bgp_static_withdraw (struct bgp
*bgp
, struct prefix
*p
, afi_t afi
,
3995 struct bgp_node
*rn
;
3996 struct bgp_info
*ri
;
3998 rn
= bgp_afi_node_get (bgp
->rib
[afi
][safi
], afi
, safi
, p
, NULL
);
4000 /* Check selected route and self inserted route. */
4001 for (ri
= rn
->info
; ri
; ri
= ri
->next
)
4002 if (ri
->peer
== bgp
->peer_self
4003 && ri
->type
== ZEBRA_ROUTE_BGP
4004 && ri
->sub_type
== BGP_ROUTE_STATIC
)
4007 /* Withdraw static BGP route from routing table. */
4010 bgp_aggregate_decrement (bgp
, p
, ri
, afi
, safi
);
4011 bgp_unlink_nexthop(ri
);
4012 bgp_info_delete (rn
, ri
);
4013 bgp_process (bgp
, rn
, afi
, safi
);
4016 /* Unlock bgp_node_lookup. */
4017 bgp_unlock_node (rn
);
4021 * Used for SAFI_MPLS_VPN and SAFI_ENCAP
4024 bgp_static_withdraw_safi (struct bgp
*bgp
, struct prefix
*p
, afi_t afi
,
4025 safi_t safi
, struct prefix_rd
*prd
, u_char
*tag
)
4027 struct bgp_node
*rn
;
4028 struct bgp_info
*ri
;
4030 rn
= bgp_afi_node_get (bgp
->rib
[afi
][safi
], afi
, safi
, p
, prd
);
4032 /* Check selected route and self inserted route. */
4033 for (ri
= rn
->info
; ri
; ri
= ri
->next
)
4034 if (ri
->peer
== bgp
->peer_self
4035 && ri
->type
== ZEBRA_ROUTE_BGP
4036 && ri
->sub_type
== BGP_ROUTE_STATIC
)
4039 /* Withdraw static BGP route from routing table. */
4043 rfapiProcessWithdraw(
4052 1); /* Kill, since it is an administrative change */
4054 bgp_aggregate_decrement (bgp
, p
, ri
, afi
, safi
);
4055 bgp_info_delete (rn
, ri
);
4056 bgp_process (bgp
, rn
, afi
, safi
);
4059 /* Unlock bgp_node_lookup. */
4060 bgp_unlock_node (rn
);
4064 bgp_static_update_safi (struct bgp
*bgp
, struct prefix
*p
,
4065 struct bgp_static
*bgp_static
, afi_t afi
, safi_t safi
)
4067 struct bgp_node
*rn
;
4068 struct bgp_info
*new;
4069 struct attr
*attr_new
;
4070 struct attr attr
= { 0 };
4071 struct bgp_info
*ri
;
4073 u_int32_t label
= 0;
4077 assert (bgp_static
);
4079 rn
= bgp_afi_node_get (bgp
->rib
[afi
][safi
], afi
, safi
, p
, &bgp_static
->prd
);
4081 bgp_attr_default_set (&attr
, BGP_ORIGIN_IGP
);
4083 attr
.nexthop
= bgp_static
->igpnexthop
;
4084 attr
.med
= bgp_static
->igpmetric
;
4085 attr
.flag
|= ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC
);
4087 if ((safi
== SAFI_EVPN
) || (safi
== SAFI_MPLS_VPN
) || (safi
== SAFI_ENCAP
))
4091 bgp_attr_extra_get (&attr
)->mp_nexthop_global_in
= bgp_static
->igpnexthop
;
4092 bgp_attr_extra_get (&attr
)->mp_nexthop_len
= IPV4_MAX_BYTELEN
;
4095 if(afi
== AFI_L2VPN
)
4097 if (bgp_static
->gatewayIp
.family
== AF_INET
)
4098 add
.ipv4
.s_addr
= bgp_static
->gatewayIp
.u
.prefix4
.s_addr
;
4099 else if (bgp_static
->gatewayIp
.family
== AF_INET6
)
4100 memcpy( &(add
.ipv6
), &(bgp_static
->gatewayIp
.u
.prefix6
), sizeof (struct in6_addr
));
4101 overlay_index_update(&attr
, bgp_static
->eth_s_id
, &add
);
4102 if (bgp_static
->encap_tunneltype
== BGP_ENCAP_TYPE_VXLAN
)
4104 struct bgp_encap_type_vxlan bet
;
4105 memset(&bet
, 0, sizeof(struct bgp_encap_type_vxlan
));
4106 bet
.vnid
= p
->u
.prefix_evpn
.eth_tag
;
4107 bgp_encap_type_vxlan_to_tlv(&bet
, &attr
);
4109 if (bgp_static
->router_mac
)
4111 bgp_add_routermac_ecom (&attr
, bgp_static
->router_mac
);
4114 /* Apply route-map. */
4115 if (bgp_static
->rmap
.name
)
4117 struct attr attr_tmp
= attr
;
4118 struct bgp_info info
;
4121 info
.peer
= bgp
->peer_self
;
4122 info
.attr
= &attr_tmp
;
4124 SET_FLAG (bgp
->peer_self
->rmap_type
, PEER_RMAP_TYPE_NETWORK
);
4126 ret
= route_map_apply (bgp_static
->rmap
.map
, p
, RMAP_BGP
, &info
);
4128 bgp
->peer_self
->rmap_type
= 0;
4130 if (ret
== RMAP_DENYMATCH
)
4132 /* Free uninterned attribute. */
4133 bgp_attr_flush (&attr_tmp
);
4135 /* Unintern original. */
4136 aspath_unintern (&attr
.aspath
);
4137 bgp_attr_extra_free (&attr
);
4138 bgp_static_withdraw_safi (bgp
, p
, afi
, safi
, &bgp_static
->prd
,
4143 attr_new
= bgp_attr_intern (&attr_tmp
);
4147 attr_new
= bgp_attr_intern (&attr
);
4150 for (ri
= rn
->info
; ri
; ri
= ri
->next
)
4151 if (ri
->peer
== bgp
->peer_self
&& ri
->type
== ZEBRA_ROUTE_BGP
4152 && ri
->sub_type
== BGP_ROUTE_STATIC
)
4158 memset(&add
, 0, sizeof(union gw_addr
));
4159 if (attrhash_cmp (ri
->attr
, attr_new
) &&
4160 overlay_index_equal(afi
, ri
, bgp_static
->eth_s_id
, &add
) &&
4161 !CHECK_FLAG(ri
->flags
, BGP_INFO_REMOVED
))
4163 bgp_unlock_node (rn
);
4164 bgp_attr_unintern (&attr_new
);
4165 aspath_unintern (&attr
.aspath
);
4166 bgp_attr_extra_free (&attr
);
4171 /* The attribute is changed. */
4172 bgp_info_set_flag (rn
, ri
, BGP_INFO_ATTR_CHANGED
);
4174 /* Rewrite BGP route information. */
4175 if (CHECK_FLAG(ri
->flags
, BGP_INFO_REMOVED
))
4176 bgp_info_restore(rn
, ri
);
4178 bgp_aggregate_decrement (bgp
, p
, ri
, afi
, safi
);
4179 bgp_attr_unintern (&ri
->attr
);
4180 ri
->attr
= attr_new
;
4181 ri
->uptime
= bgp_clock ();
4184 label
= decode_label (ri
->extra
->tag
);
4187 /* Process change. */
4188 bgp_aggregate_increment (bgp
, p
, ri
, afi
, safi
);
4189 bgp_process (bgp
, rn
, afi
, safi
);
4191 rfapiProcessUpdate(ri
->peer
, NULL
, p
, &bgp_static
->prd
,
4192 ri
->attr
, afi
, safi
,
4193 ri
->type
, ri
->sub_type
, &label
);
4195 bgp_unlock_node (rn
);
4196 aspath_unintern (&attr
.aspath
);
4197 bgp_attr_extra_free (&attr
);
4203 /* Make new BGP info. */
4204 new = info_make(ZEBRA_ROUTE_BGP
, BGP_ROUTE_STATIC
, 0, bgp
->peer_self
, attr_new
,
4206 SET_FLAG (new->flags
, BGP_INFO_VALID
);
4207 new->extra
= bgp_info_extra_new();
4208 memcpy (new->extra
->tag
, bgp_static
->tag
, 3);
4210 label
= decode_label (bgp_static
->tag
);
4213 /* Aggregate address increment. */
4214 bgp_aggregate_increment (bgp
, p
, new, afi
, safi
);
4216 /* Register new BGP information. */
4217 bgp_info_add (rn
, new);
4218 /* route_node_get lock */
4219 bgp_unlock_node (rn
);
4221 /* Process change. */
4222 bgp_process (bgp
, rn
, afi
, safi
);
4225 rfapiProcessUpdate(new->peer
, NULL
, p
, &bgp_static
->prd
,
4226 new->attr
, afi
, safi
,
4227 new->type
, new->sub_type
, &label
);
4230 /* Unintern original. */
4231 aspath_unintern (&attr
.aspath
);
4232 bgp_attr_extra_free (&attr
);
4235 /* Configure static BGP network. When user don't run zebra, static
4236 route should be installed as valid. */
4238 bgp_static_set (struct vty
*vty
, const char *ip_str
,
4239 afi_t afi
, safi_t safi
, const char *rmap
, int backdoor
,
4240 u_int32_t label_index
)
4242 VTY_DECLVAR_CONTEXT(bgp
, bgp
);
4245 struct bgp_static
*bgp_static
;
4246 struct bgp_node
*rn
;
4247 u_char need_update
= 0;
4249 /* Convert IP prefix string to struct prefix. */
4250 ret
= str2prefix (ip_str
, &p
);
4253 vty_out (vty
, "%% Malformed prefix%s", VTY_NEWLINE
);
4256 if (afi
== AFI_IP6
&& IN6_IS_ADDR_LINKLOCAL (&p
.u
.prefix6
))
4258 vty_out (vty
, "%% Malformed prefix (link-local address)%s",
4265 /* Set BGP static route configuration. */
4266 rn
= bgp_node_get (bgp
->route
[afi
][safi
], &p
);
4270 /* Configuration change. */
4271 bgp_static
= rn
->info
;
4273 /* Label index cannot be changed. */
4274 if (bgp_static
->label_index
!= label_index
)
4276 vty_out (vty
, "%% Label index cannot be changed%s", VTY_NEWLINE
);
4280 /* Check previous routes are installed into BGP. */
4281 if (bgp_static
->valid
&& bgp_static
->backdoor
!= backdoor
)
4284 bgp_static
->backdoor
= backdoor
;
4288 if (bgp_static
->rmap
.name
)
4289 XFREE(MTYPE_ROUTE_MAP_NAME
, bgp_static
->rmap
.name
);
4290 bgp_static
->rmap
.name
= XSTRDUP(MTYPE_ROUTE_MAP_NAME
, rmap
);
4291 bgp_static
->rmap
.map
= route_map_lookup_by_name (rmap
);
4295 if (bgp_static
->rmap
.name
)
4296 XFREE(MTYPE_ROUTE_MAP_NAME
, bgp_static
->rmap
.name
);
4297 bgp_static
->rmap
.name
= NULL
;
4298 bgp_static
->rmap
.map
= NULL
;
4299 bgp_static
->valid
= 0;
4301 bgp_unlock_node (rn
);
4305 /* New configuration. */
4306 bgp_static
= bgp_static_new ();
4307 bgp_static
->backdoor
= backdoor
;
4308 bgp_static
->valid
= 0;
4309 bgp_static
->igpmetric
= 0;
4310 bgp_static
->igpnexthop
.s_addr
= 0;
4311 bgp_static
->label_index
= label_index
;
4315 if (bgp_static
->rmap
.name
)
4316 XFREE(MTYPE_ROUTE_MAP_NAME
, bgp_static
->rmap
.name
);
4317 bgp_static
->rmap
.name
= XSTRDUP(MTYPE_ROUTE_MAP_NAME
, rmap
);
4318 bgp_static
->rmap
.map
= route_map_lookup_by_name (rmap
);
4320 rn
->info
= bgp_static
;
4323 bgp_static
->valid
= 1;
4325 bgp_static_withdraw (bgp
, &p
, afi
, safi
);
4327 if (! bgp_static
->backdoor
)
4328 bgp_static_update (bgp
, &p
, bgp_static
, afi
, safi
);
4333 /* Configure static BGP network. */
4335 bgp_static_unset (struct vty
*vty
, const char *ip_str
,
4336 afi_t afi
, safi_t safi
)
4338 VTY_DECLVAR_CONTEXT(bgp
, bgp
);
4341 struct bgp_static
*bgp_static
;
4342 struct bgp_node
*rn
;
4344 /* Convert IP prefix string to struct prefix. */
4345 ret
= str2prefix (ip_str
, &p
);
4348 vty_out (vty
, "%% Malformed prefix%s", VTY_NEWLINE
);
4351 if (afi
== AFI_IP6
&& IN6_IS_ADDR_LINKLOCAL (&p
.u
.prefix6
))
4353 vty_out (vty
, "%% Malformed prefix (link-local address)%s",
4360 rn
= bgp_node_lookup (bgp
->route
[afi
][safi
], &p
);
4363 vty_out (vty
, "%% Can't find specified static route configuration.%s",
4368 bgp_static
= rn
->info
;
4370 /* Update BGP RIB. */
4371 if (! bgp_static
->backdoor
)
4372 bgp_static_withdraw (bgp
, &p
, afi
, safi
);
4374 /* Clear configuration. */
4375 bgp_static_free (bgp_static
);
4377 bgp_unlock_node (rn
);
4378 bgp_unlock_node (rn
);
4384 bgp_static_add (struct bgp
*bgp
)
4388 struct bgp_node
*rn
;
4389 struct bgp_node
*rm
;
4390 struct bgp_table
*table
;
4391 struct bgp_static
*bgp_static
;
4393 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++)
4394 for (safi
= SAFI_UNICAST
; safi
< SAFI_MAX
; safi
++)
4395 for (rn
= bgp_table_top (bgp
->route
[afi
][safi
]); rn
; rn
= bgp_route_next (rn
))
4396 if (rn
->info
!= NULL
)
4398 if ((safi
== SAFI_MPLS_VPN
) || (safi
== SAFI_ENCAP
) || (safi
== SAFI_EVPN
))
4402 for (rm
= bgp_table_top (table
); rm
; rm
= bgp_route_next (rm
))
4404 bgp_static
= rm
->info
;
4405 bgp_static_update_safi (bgp
, &rm
->p
, bgp_static
, afi
, safi
);
4410 bgp_static_update (bgp
, &rn
->p
, rn
->info
, afi
, safi
);
4415 /* Called from bgp_delete(). Delete all static routes from the BGP
4418 bgp_static_delete (struct bgp
*bgp
)
4422 struct bgp_node
*rn
;
4423 struct bgp_node
*rm
;
4424 struct bgp_table
*table
;
4425 struct bgp_static
*bgp_static
;
4427 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++)
4428 for (safi
= SAFI_UNICAST
; safi
< SAFI_MAX
; safi
++)
4429 for (rn
= bgp_table_top (bgp
->route
[afi
][safi
]); rn
; rn
= bgp_route_next (rn
))
4430 if (rn
->info
!= NULL
)
4432 if ((safi
== SAFI_MPLS_VPN
) || (safi
== SAFI_ENCAP
) || (safi
== SAFI_EVPN
))
4436 for (rm
= bgp_table_top (table
); rm
; rm
= bgp_route_next (rm
))
4438 bgp_static
= rm
->info
;
4439 bgp_static_withdraw_safi (bgp
, &rm
->p
,
4441 (struct prefix_rd
*)&rn
->p
,
4443 bgp_static_free (bgp_static
);
4445 bgp_unlock_node (rn
);
4450 bgp_static
= rn
->info
;
4451 bgp_static_withdraw (bgp
, &rn
->p
, afi
, safi
);
4452 bgp_static_free (bgp_static
);
4454 bgp_unlock_node (rn
);
4460 bgp_static_redo_import_check (struct bgp
*bgp
)
4464 struct bgp_node
*rn
;
4465 struct bgp_node
*rm
;
4466 struct bgp_table
*table
;
4467 struct bgp_static
*bgp_static
;
4469 /* Use this flag to force reprocessing of the route */
4470 bgp_flag_set(bgp
, BGP_FLAG_FORCE_STATIC_PROCESS
);
4471 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++)
4472 for (safi
= SAFI_UNICAST
; safi
< SAFI_MAX
; safi
++)
4473 for (rn
= bgp_table_top (bgp
->route
[afi
][safi
]); rn
; rn
= bgp_route_next (rn
))
4474 if (rn
->info
!= NULL
)
4476 if ((safi
== SAFI_MPLS_VPN
) || (safi
== SAFI_ENCAP
) || (safi
== SAFI_EVPN
))
4480 for (rm
= bgp_table_top (table
); rm
; rm
= bgp_route_next (rm
))
4482 bgp_static
= rm
->info
;
4483 bgp_static_update_safi (bgp
, &rm
->p
, bgp_static
, afi
, safi
);
4488 bgp_static
= rn
->info
;
4489 bgp_static_update (bgp
, &rn
->p
, bgp_static
, afi
, safi
);
4492 bgp_flag_unset(bgp
, BGP_FLAG_FORCE_STATIC_PROCESS
);
4496 bgp_purge_af_static_redist_routes (struct bgp
*bgp
, afi_t afi
, safi_t safi
)
4498 struct bgp_table
*table
;
4499 struct bgp_node
*rn
;
4500 struct bgp_info
*ri
;
4502 table
= bgp
->rib
[afi
][safi
];
4503 for (rn
= bgp_table_top (table
); rn
; rn
= bgp_route_next (rn
))
4505 for (ri
= rn
->info
; ri
; ri
= ri
->next
)
4507 if (ri
->peer
== bgp
->peer_self
&&
4508 ((ri
->type
== ZEBRA_ROUTE_BGP
&&
4509 ri
->sub_type
== BGP_ROUTE_STATIC
) ||
4510 (ri
->type
!= ZEBRA_ROUTE_BGP
&&
4511 ri
->sub_type
== BGP_ROUTE_REDISTRIBUTE
)))
4513 bgp_aggregate_decrement (bgp
, &rn
->p
, ri
, afi
, safi
);
4514 bgp_unlink_nexthop(ri
);
4515 bgp_info_delete (rn
, ri
);
4516 bgp_process (bgp
, rn
, afi
, safi
);
4523 * Purge all networks and redistributed routes from routing table.
4524 * Invoked upon the instance going down.
4527 bgp_purge_static_redist_routes (struct bgp
*bgp
)
4532 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++)
4533 for (safi
= SAFI_UNICAST
; safi
< SAFI_MAX
; safi
++)
4534 bgp_purge_af_static_redist_routes (bgp
, afi
, safi
);
4539 * Currently this is used to set static routes for VPN and ENCAP.
4540 * I think it can probably be factored with bgp_static_set.
4543 bgp_static_set_safi (afi_t afi
, safi_t safi
, struct vty
*vty
, const char *ip_str
,
4544 const char *rd_str
, const char *label_str
,
4545 const char *rmap_str
, int evpn_type
, const char *esi
, const char *gwip
,
4546 const char *ethtag
, const char *routermac
)
4548 VTY_DECLVAR_CONTEXT(bgp
, bgp
);
4551 struct prefix_rd prd
;
4552 struct bgp_node
*prn
;
4553 struct bgp_node
*rn
;
4554 struct bgp_table
*table
;
4555 struct bgp_static
*bgp_static
;
4557 struct prefix gw_ip
;
4559 /* validate ip prefix */
4560 ret
= str2prefix (ip_str
, &p
);
4563 vty_out (vty
, "%% Malformed prefix%s", VTY_NEWLINE
);
4567 if ( (afi
== AFI_L2VPN
) &&
4568 (bgp_build_evpn_prefix ( evpn_type
, ethtag
!=NULL
?atol(ethtag
):0, &p
)))
4570 vty_out (vty
, "%% L2VPN prefix could not be forged%s", VTY_NEWLINE
);
4574 ret
= str2prefix_rd (rd_str
, &prd
);
4577 vty_out (vty
, "%% Malformed rd%s", VTY_NEWLINE
);
4583 unsigned long label_val
;
4584 VTY_GET_INTEGER_RANGE("Label/tag", label_val
, label_str
, 0, 16777215);
4585 encode_label (label_val
, tag
);
4589 memset (tag
, 0, sizeof(tag
)); /* empty, not even BoS */
4591 if (safi
== SAFI_EVPN
)
4593 if( esi
&& str2esi (esi
, NULL
) == 0)
4595 vty_out (vty
, "%% Malformed ESI%s", VTY_NEWLINE
);
4598 if( routermac
&& prefix_str2mac (routermac
, NULL
) == 0)
4600 vty_out (vty
, "%% Malformed Router MAC%s", VTY_NEWLINE
);
4605 memset (&gw_ip
, 0, sizeof (struct prefix
));
4606 ret
= str2prefix (gwip
, &gw_ip
);
4609 vty_out (vty
, "%% Malformed GatewayIp%s", VTY_NEWLINE
);
4612 if((gw_ip
.family
== AF_INET
&& (p
.u
.prefix_evpn
.flags
& IP_PREFIX_V6
))
4613 || (gw_ip
.family
== AF_INET6
&& (p
.u
.prefix_evpn
.flags
& IP_PREFIX_V4
)))
4615 vty_out (vty
, "%% GatewayIp family differs with IP prefix%s", VTY_NEWLINE
);
4620 prn
= bgp_node_get (bgp
->route
[afi
][safi
],
4621 (struct prefix
*)&prd
);
4622 if (prn
->info
== NULL
)
4623 prn
->info
= bgp_table_init (afi
, safi
);
4625 bgp_unlock_node (prn
);
4628 rn
= bgp_node_get (table
, &p
);
4632 vty_out (vty
, "%% Same network configuration exists%s", VTY_NEWLINE
);
4633 bgp_unlock_node (rn
);
4637 /* New configuration. */
4638 bgp_static
= bgp_static_new ();
4639 bgp_static
->backdoor
= 0;
4640 bgp_static
->valid
= 0;
4641 bgp_static
->igpmetric
= 0;
4642 bgp_static
->igpnexthop
.s_addr
= 0;
4643 memcpy(bgp_static
->tag
, tag
, 3);
4644 bgp_static
->prd
= prd
;
4648 if (bgp_static
->rmap
.name
)
4649 XFREE(MTYPE_ROUTE_MAP_NAME
, bgp_static
->rmap
.name
);
4650 bgp_static
->rmap
.name
= XSTRDUP(MTYPE_ROUTE_MAP_NAME
, rmap_str
);
4651 bgp_static
->rmap
.map
= route_map_lookup_by_name (rmap_str
);
4654 if (safi
== SAFI_EVPN
)
4658 bgp_static
->eth_s_id
= XCALLOC (MTYPE_ATTR
, sizeof(struct eth_segment_id
));
4659 str2esi (esi
, bgp_static
->eth_s_id
);
4663 bgp_static
->router_mac
= XCALLOC (MTYPE_ATTR
, ETHER_ADDR_LEN
+1);
4664 prefix_str2mac (routermac
, bgp_static
->router_mac
);
4667 prefix_copy (&bgp_static
->gatewayIp
, &gw_ip
);
4669 rn
->info
= bgp_static
;
4671 bgp_static
->valid
= 1;
4672 bgp_static_update_safi (bgp
, &p
, bgp_static
, afi
, safi
);
4678 /* Configure static BGP network. */
4680 bgp_static_unset_safi(afi_t afi
, safi_t safi
, struct vty
*vty
, const char *ip_str
,
4681 const char *rd_str
, const char *label_str
,
4682 int evpn_type
, const char *esi
, const char *gwip
, const char *ethtag
)
4684 VTY_DECLVAR_CONTEXT(bgp
, bgp
);
4687 struct prefix_rd prd
;
4688 struct bgp_node
*prn
;
4689 struct bgp_node
*rn
;
4690 struct bgp_table
*table
;
4691 struct bgp_static
*bgp_static
;
4694 /* Convert IP prefix string to struct prefix. */
4695 ret
= str2prefix (ip_str
, &p
);
4698 vty_out (vty
, "%% Malformed prefix%s", VTY_NEWLINE
);
4702 if ( (afi
== AFI_L2VPN
) &&
4703 (bgp_build_evpn_prefix ( evpn_type
, ethtag
!=NULL
?atol(ethtag
):0, &p
)))
4705 vty_out (vty
, "%% L2VPN prefix could not be forged%s", VTY_NEWLINE
);
4708 ret
= str2prefix_rd (rd_str
, &prd
);
4711 vty_out (vty
, "%% Malformed rd%s", VTY_NEWLINE
);
4717 unsigned long label_val
;
4718 VTY_GET_INTEGER_RANGE("Label/tag", label_val
, label_str
, 0, MPLS_LABEL_MAX
);
4719 encode_label (label_val
, tag
);
4723 memset (tag
, 0, sizeof(tag
)); /* empty, not even BoS */
4726 prn
= bgp_node_get (bgp
->route
[afi
][safi
],
4727 (struct prefix
*)&prd
);
4728 if (prn
->info
== NULL
)
4729 prn
->info
= bgp_table_init (afi
, safi
);
4731 bgp_unlock_node (prn
);
4734 rn
= bgp_node_lookup (table
, &p
);
4738 bgp_static_withdraw_safi (bgp
, &p
, afi
, safi
, &prd
, tag
);
4740 bgp_static
= rn
->info
;
4741 bgp_static_free (bgp_static
);
4743 bgp_unlock_node (rn
);
4744 bgp_unlock_node (rn
);
4747 vty_out (vty
, "%% Can't find the route%s", VTY_NEWLINE
);
4753 bgp_table_map_set (struct vty
*vty
, afi_t afi
, safi_t safi
,
4754 const char *rmap_name
)
4756 VTY_DECLVAR_CONTEXT(bgp
, bgp
);
4757 struct bgp_rmap
*rmap
;
4759 rmap
= &bgp
->table_map
[afi
][safi
];
4763 XFREE(MTYPE_ROUTE_MAP_NAME
, rmap
->name
);
4764 rmap
->name
= XSTRDUP(MTYPE_ROUTE_MAP_NAME
, rmap_name
);
4765 rmap
->map
= route_map_lookup_by_name (rmap_name
);
4770 XFREE(MTYPE_ROUTE_MAP_NAME
, rmap
->name
);
4775 bgp_zebra_announce_table(bgp
, afi
, safi
);
4781 bgp_table_map_unset (struct vty
*vty
, afi_t afi
, safi_t safi
,
4782 const char *rmap_name
)
4784 VTY_DECLVAR_CONTEXT(bgp
, bgp
);
4785 struct bgp_rmap
*rmap
;
4787 rmap
= &bgp
->table_map
[afi
][safi
];
4789 XFREE(MTYPE_ROUTE_MAP_NAME
, rmap
->name
);
4793 bgp_zebra_announce_table(bgp
, afi
, safi
);
4799 bgp_config_write_table_map (struct vty
*vty
, struct bgp
*bgp
, afi_t afi
,
4800 safi_t safi
, int *write
)
4802 if (bgp
->table_map
[afi
][safi
].name
)
4804 bgp_config_write_family_header (vty
, afi
, safi
, write
);
4805 vty_out (vty
, " table-map %s%s",
4806 bgp
->table_map
[afi
][safi
].name
, VTY_NEWLINE
);
4812 DEFUN (bgp_table_map
,
4815 "BGP table to RIB route download filter\n"
4816 "Name of the route map\n")
4819 return bgp_table_map_set (vty
,
4820 bgp_node_afi (vty
), bgp_node_safi (vty
), argv
[idx_word
]->arg
);
4822 DEFUN (no_bgp_table_map
,
4823 no_bgp_table_map_cmd
,
4824 "no table-map WORD",
4826 "BGP table to RIB route download filter\n"
4827 "Name of the route map\n")
4830 return bgp_table_map_unset (vty
,
4831 bgp_node_afi (vty
), bgp_node_safi (vty
), argv
[idx_word
]->arg
);
4836 "network A.B.C.D/M",
4837 "Specify a network to announce via BGP\n"
4840 int idx_ipv4_prefixlen
= 1;
4841 return bgp_static_set (vty
, argv
[idx_ipv4_prefixlen
]->arg
,
4842 AFI_IP
, bgp_node_safi (vty
), NULL
, 0,
4843 BGP_INVALID_LABEL_INDEX
);
4846 DEFUN (bgp_network_route_map
,
4847 bgp_network_route_map_cmd
,
4848 "network A.B.C.D/M route-map WORD",
4849 "Specify a network to announce via BGP\n"
4851 "Route-map to modify the attributes\n"
4852 "Name of the route map\n")
4854 int idx_ipv4_prefixlen
= 1;
4856 return bgp_static_set (vty
, argv
[idx_ipv4_prefixlen
]->arg
,
4857 AFI_IP
, bgp_node_safi (vty
), argv
[idx_word
]->arg
, 0,
4858 BGP_INVALID_LABEL_INDEX
);
4861 DEFUN (bgp_network_backdoor
,
4862 bgp_network_backdoor_cmd
,
4863 "network A.B.C.D/M backdoor",
4864 "Specify a network to announce via BGP\n"
4866 "Specify a BGP backdoor route\n")
4868 int idx_ipv4_prefixlen
= 1;
4869 return bgp_static_set (vty
, argv
[idx_ipv4_prefixlen
]->arg
, AFI_IP
, SAFI_UNICAST
,
4870 NULL
, 1, BGP_INVALID_LABEL_INDEX
);
4873 DEFUN (bgp_network_mask
,
4874 bgp_network_mask_cmd
,
4875 "network A.B.C.D mask A.B.C.D",
4876 "Specify a network to announce via BGP\n"
4884 char prefix_str
[BUFSIZ
];
4886 ret
= netmask_str2prefix_str (argv
[idx_ipv4
]->arg
, argv
[idx_ipv4_2
]->arg
, prefix_str
);
4889 vty_out (vty
, "%% Inconsistent address and mask%s", VTY_NEWLINE
);
4893 return bgp_static_set (vty
, prefix_str
,
4894 AFI_IP
, bgp_node_safi (vty
), NULL
, 0, BGP_INVALID_LABEL_INDEX
);
4897 DEFUN (bgp_network_mask_route_map
,
4898 bgp_network_mask_route_map_cmd
,
4899 "network A.B.C.D mask A.B.C.D route-map WORD",
4900 "Specify a network to announce via BGP\n"
4904 "Route-map to modify the attributes\n"
4905 "Name of the route map\n")
4911 char prefix_str
[BUFSIZ
];
4913 ret
= netmask_str2prefix_str (argv
[idx_ipv4
]->arg
, argv
[idx_ipv4_2
]->arg
, prefix_str
);
4916 vty_out (vty
, "%% Inconsistent address and mask%s", VTY_NEWLINE
);
4920 return bgp_static_set (vty
, prefix_str
,
4921 AFI_IP
, bgp_node_safi (vty
), argv
[idx_word
]->arg
, 0, BGP_INVALID_LABEL_INDEX
);
4924 DEFUN (bgp_network_mask_backdoor
,
4925 bgp_network_mask_backdoor_cmd
,
4926 "network A.B.C.D mask A.B.C.D backdoor",
4927 "Specify a network to announce via BGP\n"
4931 "Specify a BGP backdoor route\n")
4936 char prefix_str
[BUFSIZ
];
4938 ret
= netmask_str2prefix_str (argv
[idx_ipv4
]->arg
, argv
[idx_ipv4_2
]->arg
, prefix_str
);
4941 vty_out (vty
, "%% Inconsistent address and mask%s", VTY_NEWLINE
);
4945 return bgp_static_set (vty
, prefix_str
, AFI_IP
, SAFI_UNICAST
,
4947 BGP_INVALID_LABEL_INDEX
);
4950 DEFUN (bgp_network_mask_natural
,
4951 bgp_network_mask_natural_cmd
,
4953 "Specify a network to announce via BGP\n"
4958 char prefix_str
[BUFSIZ
];
4960 ret
= netmask_str2prefix_str (argv
[idx_ipv4
]->arg
, NULL
, prefix_str
);
4963 vty_out (vty
, "%% Inconsistent address and mask%s", VTY_NEWLINE
);
4967 return bgp_static_set (vty
, prefix_str
,
4968 AFI_IP
, bgp_node_safi (vty
), NULL
, 0,
4969 BGP_INVALID_LABEL_INDEX
);
4972 DEFUN (bgp_network_mask_natural_route_map
,
4973 bgp_network_mask_natural_route_map_cmd
,
4974 "network A.B.C.D route-map WORD",
4975 "Specify a network to announce via BGP\n"
4977 "Route-map to modify the attributes\n"
4978 "Name of the route map\n")
4983 char prefix_str
[BUFSIZ
];
4985 ret
= netmask_str2prefix_str (argv
[idx_ipv4
]->arg
, NULL
, prefix_str
);
4988 vty_out (vty
, "%% Inconsistent address and mask%s", VTY_NEWLINE
);
4992 return bgp_static_set (vty
, prefix_str
,
4993 AFI_IP
, bgp_node_safi (vty
), argv
[idx_word
]->arg
, 0,
4994 BGP_INVALID_LABEL_INDEX
);
4997 DEFUN (bgp_network_mask_natural_backdoor
,
4998 bgp_network_mask_natural_backdoor_cmd
,
4999 "network A.B.C.D backdoor",
5000 "Specify a network to announce via BGP\n"
5002 "Specify a BGP backdoor route\n")
5006 char prefix_str
[BUFSIZ
];
5008 ret
= netmask_str2prefix_str (argv
[idx_ipv4
]->arg
, NULL
, prefix_str
);
5011 vty_out (vty
, "%% Inconsistent address and mask%s", VTY_NEWLINE
);
5015 return bgp_static_set (vty
, prefix_str
, AFI_IP
, SAFI_UNICAST
,
5016 NULL
, 1, BGP_INVALID_LABEL_INDEX
);
5019 DEFUN (bgp_network_label_index
,
5020 bgp_network_label_index_cmd
,
5021 "network A.B.C.D/M label-index (0-4294967294)",
5022 "Specify a network to announce via BGP\n"
5023 "IP prefix <network>/<length>, e.g., 35.0.0.0/8\n"
5024 "Label index to associate with the prefix\n"
5025 "Label index value\n")
5027 u_int32_t label_index
;
5029 VTY_GET_INTEGER ("label-index", label_index
, argv
[3]->arg
);
5030 return bgp_static_set (vty
, argv
[1]->arg
,
5031 AFI_IP
, bgp_node_safi (vty
), NULL
, 0, label_index
);
5034 DEFUN (bgp_network_label_index_route_map
,
5035 bgp_network_label_index_route_map_cmd
,
5036 "network A.B.C.D/M label-index (0-4294967294) route-map WORD",
5037 "Specify a network to announce via BGP\n"
5039 "Label index to associate with the prefix\n"
5040 "Label index value\n"
5041 "Route-map to modify the attributes\n"
5042 "Name of the route map\n")
5044 u_int32_t label_index
;
5046 VTY_GET_INTEGER ("label-index", label_index
, argv
[3]->arg
);
5047 return bgp_static_set (vty
, argv
[1]->arg
,
5048 AFI_IP
, bgp_node_safi (vty
), argv
[5]->arg
, 0, label_index
);
5051 DEFUN (no_bgp_network
,
5053 "no network A.B.C.D/M [<backdoor|route-map WORD>]",
5055 "Specify a network to announce via BGP\n"
5057 "Specify a BGP backdoor route\n"
5058 "Route-map to modify the attributes\n"
5059 "Name of the route map\n")
5061 int idx_ipv4_prefixlen
= 2;
5062 return bgp_static_unset (vty
, argv
[idx_ipv4_prefixlen
]->arg
, AFI_IP
,
5063 bgp_node_safi (vty
));
5066 DEFUN (no_bgp_network_mask
,
5067 no_bgp_network_mask_cmd
,
5068 "no network A.B.C.D mask A.B.C.D [<backdoor|route-map WORD>]",
5070 "Specify a network to announce via BGP\n"
5074 "Specify a BGP backdoor route\n"
5075 "Route-map to modify the attributes\n"
5076 "Name of the route map\n")
5081 char prefix_str
[BUFSIZ
];
5083 ret
= netmask_str2prefix_str (argv
[idx_ipv4
]->arg
, argv
[idx_ipv4_2
]->arg
, prefix_str
);
5086 vty_out (vty
, "%% Inconsistent address and mask%s", VTY_NEWLINE
);
5090 return bgp_static_unset (vty
, prefix_str
, AFI_IP
,
5091 bgp_node_safi (vty
));
5094 DEFUN (no_bgp_network_mask_natural
,
5095 no_bgp_network_mask_natural_cmd
,
5096 "no network A.B.C.D [<backdoor|route-map WORD>]",
5098 "Specify a network to announce via BGP\n"
5100 "Specify a BGP backdoor route\n"
5101 "Route-map to modify the attributes\n"
5102 "Name of the route map\n")
5106 char prefix_str
[BUFSIZ
];
5108 ret
= netmask_str2prefix_str (argv
[idx_ipv4
]->arg
, NULL
, prefix_str
);
5111 vty_out (vty
, "%% Inconsistent address and mask%s", VTY_NEWLINE
);
5115 return bgp_static_unset (vty
, prefix_str
, AFI_IP
,
5116 bgp_node_safi (vty
));
5119 ALIAS (no_bgp_network
,
5120 no_bgp_network_label_index_cmd
,
5121 "no network A.B.C.D/M label-index (0-4294967294)",
5123 "Specify a network to announce via BGP\n"
5124 "IP prefix <network>/<length>, e.g., 35.0.0.0/8\n"
5125 "Label index to associate with the prefix\n"
5126 "Label index value\n")
5128 ALIAS (no_bgp_network
,
5129 no_bgp_network_label_index_route_map_cmd
,
5130 "no network A.B.C.D/M label-index (0-4294967294) route-map WORD",
5132 "Specify a network to announce via BGP\n"
5134 "Label index to associate with the prefix\n"
5135 "Label index value\n"
5136 "Route-map to modify the attributes\n"
5137 "Name of the route map\n")
5139 DEFUN (ipv6_bgp_network
,
5140 ipv6_bgp_network_cmd
,
5141 "network X:X::X:X/M",
5142 "Specify a network to announce via BGP\n"
5145 int idx_ipv6_prefixlen
= 1;
5146 return bgp_static_set (vty
, argv
[idx_ipv6_prefixlen
]->arg
, AFI_IP6
, bgp_node_safi(vty
),
5148 BGP_INVALID_LABEL_INDEX
);
5151 DEFUN (ipv6_bgp_network_route_map
,
5152 ipv6_bgp_network_route_map_cmd
,
5153 "network X:X::X:X/M route-map WORD",
5154 "Specify a network to announce via BGP\n"
5156 "Route-map to modify the attributes\n"
5157 "Name of the route map\n")
5159 int idx_ipv6_prefixlen
= 1;
5161 return bgp_static_set (vty
, argv
[idx_ipv6_prefixlen
]->arg
, AFI_IP6
,
5162 bgp_node_safi (vty
), argv
[idx_word
]->arg
, 0,
5163 BGP_INVALID_LABEL_INDEX
);
5166 DEFUN (ipv6_bgp_network_label_index
,
5167 ipv6_bgp_network_label_index_cmd
,
5168 "network X:X::X:X/M label-index (0-4294967294)",
5169 "Specify a network to announce via BGP\n"
5170 "IPv6 prefix <network>/<length>\n"
5171 "Label index to associate with the prefix\n"
5172 "Label index value\n")
5174 u_int32_t label_index
;
5176 VTY_GET_INTEGER ("label-index", label_index
, argv
[3]->arg
);
5177 return bgp_static_set (vty
, argv
[1]->arg
,
5178 AFI_IP6
, bgp_node_safi (vty
), NULL
, 0, label_index
);
5181 DEFUN (ipv6_bgp_network_label_index_route_map
,
5182 ipv6_bgp_network_label_index_route_map_cmd
,
5183 "network X:X::X:X/M label-index (0-4294967294) route-map WORD",
5184 "Specify a network to announce via BGP\n"
5186 "Label index to associate with the prefix\n"
5187 "Label index value\n"
5188 "Route-map to modify the attributes\n"
5189 "Name of the route map\n")
5191 u_int32_t label_index
;
5193 VTY_GET_INTEGER ("label-index", label_index
, argv
[3]->arg
);
5194 return bgp_static_set (vty
, argv
[1]->arg
,
5195 AFI_IP6
, bgp_node_safi (vty
), argv
[5]->arg
, 0, label_index
);
5198 DEFUN (no_ipv6_bgp_network
,
5199 no_ipv6_bgp_network_cmd
,
5200 "no network X:X::X:X/M [route-map WORD]",
5202 "Specify a network to announce via BGP\n"
5204 "Route-map to modify the attributes\n"
5205 "Name of the route map\n")
5207 int idx_ipv6_prefixlen
= 2;
5208 return bgp_static_unset (vty
, argv
[idx_ipv6_prefixlen
]->arg
, AFI_IP6
, bgp_node_safi(vty
));
5211 ALIAS (no_ipv6_bgp_network
,
5212 no_ipv6_bgp_network_label_index_cmd
,
5213 "no network X:X::X:X/M label-index (0-4294967294)",
5215 "Specify a network to announce via BGP\n"
5216 "IPv6 prefix <network>/<length>\n"
5217 "Label index to associate with the prefix\n"
5218 "Label index value\n")
5220 ALIAS (no_ipv6_bgp_network
,
5221 no_ipv6_bgp_network_label_index_route_map_cmd
,
5222 "no network X:X::X:X/M label-index (0-4294967294) route-map WORD",
5224 "Specify a network to announce via BGP\n"
5226 "Label index to associate with the prefix\n"
5227 "Label index value\n"
5228 "Route-map to modify the attributes\n"
5229 "Name of the route map\n")
5231 /* Aggreagete address:
5233 advertise-map Set condition to advertise attribute
5234 as-set Generate AS set path information
5235 attribute-map Set attributes of aggregate
5236 route-map Set parameters of aggregate
5237 summary-only Filter more specific routes from updates
5238 suppress-map Conditionally filter more specific routes from updates
5241 struct bgp_aggregate
5243 /* Summary-only flag. */
5244 u_char summary_only
;
5246 /* AS set generation. */
5249 /* Route-map for aggregated route. */
5250 struct route_map
*map
;
5252 /* Suppress-count. */
5253 unsigned long count
;
5255 /* SAFI configuration. */
5259 static struct bgp_aggregate
*
5260 bgp_aggregate_new (void)
5262 return XCALLOC (MTYPE_BGP_AGGREGATE
, sizeof (struct bgp_aggregate
));
5266 bgp_aggregate_free (struct bgp_aggregate
*aggregate
)
5268 XFREE (MTYPE_BGP_AGGREGATE
, aggregate
);
5271 /* Update an aggregate as routes are added/removed from the BGP table */
5273 bgp_aggregate_route (struct bgp
*bgp
, struct prefix
*p
, struct bgp_info
*rinew
,
5274 afi_t afi
, safi_t safi
, struct bgp_info
*del
,
5275 struct bgp_aggregate
*aggregate
)
5277 struct bgp_table
*table
;
5278 struct bgp_node
*top
;
5279 struct bgp_node
*rn
;
5281 struct aspath
*aspath
= NULL
;
5282 struct aspath
*asmerge
= NULL
;
5283 struct community
*community
= NULL
;
5284 struct community
*commerge
= NULL
;
5285 #if defined(AGGREGATE_NEXTHOP_CHECK)
5286 struct in_addr nexthop
;
5289 struct bgp_info
*ri
;
5290 struct bgp_info
*new;
5292 unsigned long match
= 0;
5293 u_char atomic_aggregate
= 0;
5295 /* Record adding route's nexthop and med. */
5298 #if defined(AGGREGATE_NEXTHOP_CHECK)
5299 nexthop
= rinew
->attr
->nexthop
;
5300 med
= rinew
->attr
->med
;
5304 /* ORIGIN attribute: If at least one route among routes that are
5305 aggregated has ORIGIN with the value INCOMPLETE, then the
5306 aggregated route must have the ORIGIN attribute with the value
5307 INCOMPLETE. Otherwise, if at least one route among routes that
5308 are aggregated has ORIGIN with the value EGP, then the aggregated
5309 route must have the origin attribute with the value EGP. In all
5310 other case the value of the ORIGIN attribute of the aggregated
5311 route is INTERNAL. */
5312 origin
= BGP_ORIGIN_IGP
;
5314 table
= bgp
->rib
[afi
][safi
];
5316 top
= bgp_node_get (table
, p
);
5317 for (rn
= bgp_node_get (table
, p
); rn
; rn
= bgp_route_next_until (rn
, top
))
5318 if (rn
->p
.prefixlen
> p
->prefixlen
)
5322 for (ri
= rn
->info
; ri
; ri
= ri
->next
)
5324 if (BGP_INFO_HOLDDOWN (ri
))
5327 if (del
&& ri
== del
)
5330 if (! rinew
&& first
)
5332 #if defined(AGGREGATE_NEXTHOP_CHECK)
5333 nexthop
= ri
->attr
->nexthop
;
5334 med
= ri
->attr
->med
;
5339 #ifdef AGGREGATE_NEXTHOP_CHECK
5340 if (! IPV4_ADDR_SAME (&ri
->attr
->nexthop
, &nexthop
)
5341 || ri
->attr
->med
!= med
)
5344 aspath_free (aspath
);
5346 community_free (community
);
5347 bgp_unlock_node (rn
);
5348 bgp_unlock_node (top
);
5351 #endif /* AGGREGATE_NEXTHOP_CHECK */
5353 if (ri
->attr
->flag
& ATTR_FLAG_BIT(BGP_ATTR_ATOMIC_AGGREGATE
))
5354 atomic_aggregate
= 1;
5356 if (ri
->sub_type
!= BGP_ROUTE_AGGREGATE
)
5358 if (aggregate
->summary_only
)
5360 (bgp_info_extra_get (ri
))->suppress
++;
5361 bgp_info_set_flag (rn
, ri
, BGP_INFO_ATTR_CHANGED
);
5367 if (origin
< ri
->attr
->origin
)
5368 origin
= ri
->attr
->origin
;
5370 if (aggregate
->as_set
)
5374 asmerge
= aspath_aggregate (aspath
, ri
->attr
->aspath
);
5375 aspath_free (aspath
);
5379 aspath
= aspath_dup (ri
->attr
->aspath
);
5381 if (ri
->attr
->community
)
5385 commerge
= community_merge (community
,
5386 ri
->attr
->community
);
5387 community
= community_uniq_sort (commerge
);
5388 community_free (commerge
);
5391 community
= community_dup (ri
->attr
->community
);
5397 bgp_process (bgp
, rn
, afi
, safi
);
5399 bgp_unlock_node (top
);
5405 if (aggregate
->summary_only
)
5406 (bgp_info_extra_get (rinew
))->suppress
++;
5408 if (origin
< rinew
->attr
->origin
)
5409 origin
= rinew
->attr
->origin
;
5411 if (aggregate
->as_set
)
5415 asmerge
= aspath_aggregate (aspath
, rinew
->attr
->aspath
);
5416 aspath_free (aspath
);
5420 aspath
= aspath_dup (rinew
->attr
->aspath
);
5422 if (rinew
->attr
->community
)
5426 commerge
= community_merge (community
,
5427 rinew
->attr
->community
);
5428 community
= community_uniq_sort (commerge
);
5429 community_free (commerge
);
5432 community
= community_dup (rinew
->attr
->community
);
5437 if (aggregate
->count
> 0)
5439 rn
= bgp_node_get (table
, p
);
5440 new = info_make(ZEBRA_ROUTE_BGP
, BGP_ROUTE_AGGREGATE
, 0, bgp
->peer_self
,
5441 bgp_attr_aggregate_intern(bgp
, origin
, aspath
, community
,
5443 atomic_aggregate
), rn
);
5444 SET_FLAG (new->flags
, BGP_INFO_VALID
);
5446 bgp_info_add (rn
, new);
5447 bgp_unlock_node (rn
);
5448 bgp_process (bgp
, rn
, afi
, safi
);
5453 aspath_free (aspath
);
5455 community_free (community
);
5459 void bgp_aggregate_delete (struct bgp
*, struct prefix
*, afi_t
, safi_t
,
5460 struct bgp_aggregate
*);
5463 bgp_aggregate_increment (struct bgp
*bgp
, struct prefix
*p
,
5464 struct bgp_info
*ri
, afi_t afi
, safi_t safi
)
5466 struct bgp_node
*child
;
5467 struct bgp_node
*rn
;
5468 struct bgp_aggregate
*aggregate
;
5469 struct bgp_table
*table
;
5471 /* MPLS-VPN aggregation is not yet supported. */
5472 if ((safi
== SAFI_MPLS_VPN
) || (safi
== SAFI_ENCAP
) || (safi
== SAFI_EVPN
))
5475 table
= bgp
->aggregate
[afi
][safi
];
5477 /* No aggregates configured. */
5478 if (bgp_table_top_nolock (table
) == NULL
)
5481 if (p
->prefixlen
== 0)
5484 if (BGP_INFO_HOLDDOWN (ri
))
5487 child
= bgp_node_get (table
, p
);
5489 /* Aggregate address configuration check. */
5490 for (rn
= child
; rn
; rn
= bgp_node_parent_nolock (rn
))
5491 if ((aggregate
= rn
->info
) != NULL
&& rn
->p
.prefixlen
< p
->prefixlen
)
5493 bgp_aggregate_delete (bgp
, &rn
->p
, afi
, safi
, aggregate
);
5494 bgp_aggregate_route (bgp
, &rn
->p
, ri
, afi
, safi
, NULL
, aggregate
);
5496 bgp_unlock_node (child
);
5500 bgp_aggregate_decrement (struct bgp
*bgp
, struct prefix
*p
,
5501 struct bgp_info
*del
, afi_t afi
, safi_t safi
)
5503 struct bgp_node
*child
;
5504 struct bgp_node
*rn
;
5505 struct bgp_aggregate
*aggregate
;
5506 struct bgp_table
*table
;
5508 /* MPLS-VPN aggregation is not yet supported. */
5509 if ((safi
== SAFI_MPLS_VPN
) || (safi
== SAFI_ENCAP
) || (safi
== SAFI_EVPN
))
5512 table
= bgp
->aggregate
[afi
][safi
];
5514 /* No aggregates configured. */
5515 if (bgp_table_top_nolock (table
) == NULL
)
5518 if (p
->prefixlen
== 0)
5521 child
= bgp_node_get (table
, p
);
5523 /* Aggregate address configuration check. */
5524 for (rn
= child
; rn
; rn
= bgp_node_parent_nolock (rn
))
5525 if ((aggregate
= rn
->info
) != NULL
&& rn
->p
.prefixlen
< p
->prefixlen
)
5527 bgp_aggregate_delete (bgp
, &rn
->p
, afi
, safi
, aggregate
);
5528 bgp_aggregate_route (bgp
, &rn
->p
, NULL
, afi
, safi
, del
, aggregate
);
5530 bgp_unlock_node (child
);
5533 /* Called via bgp_aggregate_set when the user configures aggregate-address */
5535 bgp_aggregate_add (struct bgp
*bgp
, struct prefix
*p
, afi_t afi
, safi_t safi
,
5536 struct bgp_aggregate
*aggregate
)
5538 struct bgp_table
*table
;
5539 struct bgp_node
*top
;
5540 struct bgp_node
*rn
;
5541 struct bgp_info
*new;
5542 struct bgp_info
*ri
;
5543 unsigned long match
;
5544 u_char origin
= BGP_ORIGIN_IGP
;
5545 struct aspath
*aspath
= NULL
;
5546 struct aspath
*asmerge
= NULL
;
5547 struct community
*community
= NULL
;
5548 struct community
*commerge
= NULL
;
5549 u_char atomic_aggregate
= 0;
5551 table
= bgp
->rib
[afi
][safi
];
5554 if (afi
== AFI_IP
&& p
->prefixlen
== IPV4_MAX_BITLEN
)
5556 if (afi
== AFI_IP6
&& p
->prefixlen
== IPV6_MAX_BITLEN
)
5559 /* If routes exists below this node, generate aggregate routes. */
5560 top
= bgp_node_get (table
, p
);
5561 for (rn
= bgp_node_get (table
, p
); rn
; rn
= bgp_route_next_until (rn
, top
))
5562 if (rn
->p
.prefixlen
> p
->prefixlen
)
5566 for (ri
= rn
->info
; ri
; ri
= ri
->next
)
5568 if (BGP_INFO_HOLDDOWN (ri
))
5571 if (ri
->attr
->flag
& ATTR_FLAG_BIT(BGP_ATTR_ATOMIC_AGGREGATE
))
5572 atomic_aggregate
= 1;
5574 if (ri
->sub_type
!= BGP_ROUTE_AGGREGATE
)
5576 /* summary-only aggregate route suppress aggregated
5577 route announcement. */
5578 if (aggregate
->summary_only
)
5580 (bgp_info_extra_get (ri
))->suppress
++;
5581 bgp_info_set_flag (rn
, ri
, BGP_INFO_ATTR_CHANGED
);
5585 /* If at least one route among routes that are aggregated has
5586 * ORIGIN with the value INCOMPLETE, then the aggregated route
5587 * MUST have the ORIGIN attribute with the value INCOMPLETE.
5588 * Otherwise, if at least one route among routes that are
5589 * aggregated has ORIGIN with the value EGP, then the aggregated
5590 * route MUST have the ORIGIN attribute with the value EGP.
5592 if (origin
< ri
->attr
->origin
)
5593 origin
= ri
->attr
->origin
;
5595 /* as-set aggregate route generate origin, as path,
5596 community aggregation. */
5597 if (aggregate
->as_set
)
5601 asmerge
= aspath_aggregate (aspath
, ri
->attr
->aspath
);
5602 aspath_free (aspath
);
5606 aspath
= aspath_dup (ri
->attr
->aspath
);
5608 if (ri
->attr
->community
)
5612 commerge
= community_merge (community
,
5613 ri
->attr
->community
);
5614 community
= community_uniq_sort (commerge
);
5615 community_free (commerge
);
5618 community
= community_dup (ri
->attr
->community
);
5625 /* If this node is suppressed, process the change. */
5627 bgp_process (bgp
, rn
, afi
, safi
);
5629 bgp_unlock_node (top
);
5631 /* Add aggregate route to BGP table. */
5632 if (aggregate
->count
)
5634 rn
= bgp_node_get (table
, p
);
5635 new = info_make(ZEBRA_ROUTE_BGP
, BGP_ROUTE_AGGREGATE
, 0, bgp
->peer_self
,
5636 bgp_attr_aggregate_intern(bgp
, origin
, aspath
, community
,
5638 atomic_aggregate
), rn
);
5639 SET_FLAG (new->flags
, BGP_INFO_VALID
);
5641 bgp_info_add (rn
, new);
5642 bgp_unlock_node (rn
);
5644 /* Process change. */
5645 bgp_process (bgp
, rn
, afi
, safi
);
5650 aspath_free (aspath
);
5652 community_free (community
);
5657 bgp_aggregate_delete (struct bgp
*bgp
, struct prefix
*p
, afi_t afi
,
5658 safi_t safi
, struct bgp_aggregate
*aggregate
)
5660 struct bgp_table
*table
;
5661 struct bgp_node
*top
;
5662 struct bgp_node
*rn
;
5663 struct bgp_info
*ri
;
5664 unsigned long match
;
5666 table
= bgp
->rib
[afi
][safi
];
5668 if (afi
== AFI_IP
&& p
->prefixlen
== IPV4_MAX_BITLEN
)
5670 if (afi
== AFI_IP6
&& p
->prefixlen
== IPV6_MAX_BITLEN
)
5673 /* If routes exists below this node, generate aggregate routes. */
5674 top
= bgp_node_get (table
, p
);
5675 for (rn
= bgp_node_get (table
, p
); rn
; rn
= bgp_route_next_until (rn
, top
))
5676 if (rn
->p
.prefixlen
> p
->prefixlen
)
5680 for (ri
= rn
->info
; ri
; ri
= ri
->next
)
5682 if (BGP_INFO_HOLDDOWN (ri
))
5685 if (ri
->sub_type
!= BGP_ROUTE_AGGREGATE
)
5687 if (aggregate
->summary_only
&& ri
->extra
)
5689 ri
->extra
->suppress
--;
5691 if (ri
->extra
->suppress
== 0)
5693 bgp_info_set_flag (rn
, ri
, BGP_INFO_ATTR_CHANGED
);
5701 /* If this node was suppressed, process the change. */
5703 bgp_process (bgp
, rn
, afi
, safi
);
5705 bgp_unlock_node (top
);
5707 /* Delete aggregate route from BGP table. */
5708 rn
= bgp_node_get (table
, p
);
5710 for (ri
= rn
->info
; ri
; ri
= ri
->next
)
5711 if (ri
->peer
== bgp
->peer_self
5712 && ri
->type
== ZEBRA_ROUTE_BGP
5713 && ri
->sub_type
== BGP_ROUTE_AGGREGATE
)
5716 /* Withdraw static BGP route from routing table. */
5719 bgp_info_delete (rn
, ri
);
5720 bgp_process (bgp
, rn
, afi
, safi
);
5723 /* Unlock bgp_node_lookup. */
5724 bgp_unlock_node (rn
);
5727 /* Aggregate route attribute. */
5728 #define AGGREGATE_SUMMARY_ONLY 1
5729 #define AGGREGATE_AS_SET 1
5732 bgp_aggregate_unset (struct vty
*vty
, const char *prefix_str
,
5733 afi_t afi
, safi_t safi
)
5735 VTY_DECLVAR_CONTEXT(bgp
, bgp
);
5738 struct bgp_node
*rn
;
5739 struct bgp_aggregate
*aggregate
;
5741 /* Convert string to prefix structure. */
5742 ret
= str2prefix (prefix_str
, &p
);
5745 vty_out (vty
, "Malformed prefix%s", VTY_NEWLINE
);
5750 /* Old configuration check. */
5751 rn
= bgp_node_lookup (bgp
->aggregate
[afi
][safi
], &p
);
5754 vty_out (vty
, "%% There is no aggregate-address configuration.%s",
5759 aggregate
= rn
->info
;
5760 if (aggregate
->safi
== SAFI_UNICAST
)
5761 bgp_aggregate_delete (bgp
, &p
, afi
, SAFI_UNICAST
, aggregate
);
5762 if (aggregate
->safi
== SAFI_LABELED_UNICAST
)
5763 bgp_aggregate_delete (bgp
, &p
, afi
, SAFI_LABELED_UNICAST
, aggregate
);
5764 if (aggregate
->safi
== SAFI_MULTICAST
)
5765 bgp_aggregate_delete (bgp
, &p
, afi
, SAFI_MULTICAST
, aggregate
);
5767 /* Unlock aggregate address configuration. */
5769 bgp_aggregate_free (aggregate
);
5770 bgp_unlock_node (rn
);
5771 bgp_unlock_node (rn
);
5777 bgp_aggregate_set (struct vty
*vty
, const char *prefix_str
,
5778 afi_t afi
, safi_t safi
,
5779 u_char summary_only
, u_char as_set
)
5781 VTY_DECLVAR_CONTEXT(bgp
, bgp
);
5784 struct bgp_node
*rn
;
5785 struct bgp_aggregate
*aggregate
;
5787 /* Convert string to prefix structure. */
5788 ret
= str2prefix (prefix_str
, &p
);
5791 vty_out (vty
, "Malformed prefix%s", VTY_NEWLINE
);
5796 /* Old configuration check. */
5797 rn
= bgp_node_get (bgp
->aggregate
[afi
][safi
], &p
);
5801 vty_out (vty
, "There is already same aggregate network.%s", VTY_NEWLINE
);
5802 /* try to remove the old entry */
5803 ret
= bgp_aggregate_unset (vty
, prefix_str
, afi
, safi
);
5806 vty_out (vty
, "Error deleting aggregate.%s", VTY_NEWLINE
);
5807 bgp_unlock_node (rn
);
5812 /* Make aggregate address structure. */
5813 aggregate
= bgp_aggregate_new ();
5814 aggregate
->summary_only
= summary_only
;
5815 aggregate
->as_set
= as_set
;
5816 aggregate
->safi
= safi
;
5817 rn
->info
= aggregate
;
5819 /* Aggregate address insert into BGP routing table. */
5820 if (safi
== SAFI_UNICAST
)
5821 bgp_aggregate_add (bgp
, &p
, afi
, SAFI_UNICAST
, aggregate
);
5822 if (safi
== SAFI_LABELED_UNICAST
)
5823 bgp_aggregate_add (bgp
, &p
, afi
, SAFI_LABELED_UNICAST
, aggregate
);
5824 if (safi
== SAFI_MULTICAST
)
5825 bgp_aggregate_add (bgp
, &p
, afi
, SAFI_MULTICAST
, aggregate
);
5830 DEFUN (aggregate_address
,
5831 aggregate_address_cmd
,
5832 "aggregate-address A.B.C.D/M [<as-set [summary-only]|summary-only [as-set]>]",
5833 "Configure BGP aggregate entries\n"
5834 "Aggregate prefix\n"
5835 "Generate AS set path information\n"
5836 "Filter more specific routes from updates\n"
5837 "Filter more specific routes from updates\n"
5838 "Generate AS set path information\n")
5841 argv_find (argv
, argc
, "A.B.C.D/M", &idx
);
5842 char *prefix
= argv
[idx
]->arg
;
5843 int as_set
= argv_find (argv
, argc
, "as-set", &idx
) ? AGGREGATE_AS_SET
: 0;
5845 int summary_only
= argv_find (argv
, argc
, "summary-only", &idx
) ? AGGREGATE_SUMMARY_ONLY
: 0;
5847 return bgp_aggregate_set (vty
, prefix
, AFI_IP
, bgp_node_safi (vty
), summary_only
, as_set
);
5850 DEFUN (aggregate_address_mask
,
5851 aggregate_address_mask_cmd
,
5852 "aggregate-address A.B.C.D A.B.C.D [<as-set [summary-only]|summary-only [as-set]>]",
5853 "Configure BGP aggregate entries\n"
5854 "Aggregate address\n"
5856 "Generate AS set path information\n"
5857 "Filter more specific routes from updates\n"
5858 "Filter more specific routes from updates\n"
5859 "Generate AS set path information\n")
5862 argv_find (argv
, argc
, "A.B.C.D", &idx
);
5863 char *prefix
= argv
[idx
]->arg
;
5864 char *mask
= argv
[idx
+1]->arg
;
5865 int as_set
= argv_find (argv
, argc
, "as-set", &idx
) ? AGGREGATE_AS_SET
: 0;
5867 int summary_only
= argv_find (argv
, argc
, "summary-only", &idx
) ? AGGREGATE_SUMMARY_ONLY
: 0;
5869 char prefix_str
[BUFSIZ
];
5870 int ret
= netmask_str2prefix_str (prefix
, mask
, prefix_str
);
5874 vty_out (vty
, "%% Inconsistent address and mask%s", VTY_NEWLINE
);
5878 return bgp_aggregate_set (vty
, prefix_str
, AFI_IP
, bgp_node_safi (vty
), summary_only
, as_set
);
5881 DEFUN (no_aggregate_address
,
5882 no_aggregate_address_cmd
,
5883 "no aggregate-address A.B.C.D/M [<as-set [summary-only]|summary-only [as-set]>]",
5885 "Configure BGP aggregate entries\n"
5886 "Aggregate prefix\n"
5887 "Generate AS set path information\n"
5888 "Filter more specific routes from updates\n"
5889 "Filter more specific routes from updates\n"
5890 "Generate AS set path information\n")
5893 argv_find (argv
, argc
, "A.B.C.D/M", &idx
);
5894 char *prefix
= argv
[idx
]->arg
;
5895 return bgp_aggregate_unset (vty
, prefix
, AFI_IP
, bgp_node_safi (vty
));
5898 DEFUN (no_aggregate_address_mask
,
5899 no_aggregate_address_mask_cmd
,
5900 "no aggregate-address A.B.C.D A.B.C.D [<as-set [summary-only]|summary-only [as-set]>]",
5902 "Configure BGP aggregate entries\n"
5903 "Aggregate address\n"
5905 "Generate AS set path information\n"
5906 "Filter more specific routes from updates\n"
5907 "Filter more specific routes from updates\n"
5908 "Generate AS set path information\n")
5911 argv_find (argv
, argc
, "A.B.C.D", &idx
);
5912 char *prefix
= argv
[idx
]->arg
;
5913 char *mask
= argv
[idx
+1]->arg
;
5915 char prefix_str
[BUFSIZ
];
5916 int ret
= netmask_str2prefix_str (prefix
, mask
, prefix_str
);
5920 vty_out (vty
, "%% Inconsistent address and mask%s", VTY_NEWLINE
);
5924 return bgp_aggregate_unset (vty
, prefix_str
, AFI_IP
, bgp_node_safi (vty
));
5927 DEFUN (ipv6_aggregate_address
,
5928 ipv6_aggregate_address_cmd
,
5929 "aggregate-address X:X::X:X/M [summary-only]",
5930 "Configure BGP aggregate entries\n"
5931 "Aggregate prefix\n"
5932 "Filter more specific routes from updates\n")
5935 argv_find (argv
, argc
, "X:X::X:X/M", &idx
);
5936 char *prefix
= argv
[idx
]->arg
;
5937 int sum_only
= argv_find (argv
, argc
, "summary-only", &idx
) ? AGGREGATE_SUMMARY_ONLY
: 0;
5938 return bgp_aggregate_set (vty
, prefix
, AFI_IP6
, SAFI_UNICAST
, sum_only
, 0);
5941 DEFUN (no_ipv6_aggregate_address
,
5942 no_ipv6_aggregate_address_cmd
,
5943 "no aggregate-address X:X::X:X/M [summary-only]",
5945 "Configure BGP aggregate entries\n"
5946 "Aggregate prefix\n"
5947 "Filter more specific routes from updates\n")
5950 argv_find (argv
, argc
, "X:X::X:X/M", &idx
);
5951 char *prefix
= argv
[idx
]->arg
;
5952 return bgp_aggregate_unset (vty
, prefix
, AFI_IP6
, SAFI_UNICAST
);
5955 /* Redistribute route treatment. */
5957 bgp_redistribute_add (struct bgp
*bgp
, struct prefix
*p
, const struct in_addr
*nexthop
,
5958 const struct in6_addr
*nexthop6
, unsigned int ifindex
,
5959 u_int32_t metric
, u_char type
, u_short instance
, route_tag_t tag
)
5961 struct bgp_info
*new;
5962 struct bgp_info
*bi
;
5963 struct bgp_info info
;
5964 struct bgp_node
*bn
;
5966 struct attr
*new_attr
;
5969 struct bgp_redist
*red
;
5971 /* Make default attribute. */
5972 bgp_attr_default_set (&attr
, BGP_ORIGIN_INCOMPLETE
);
5974 attr
.nexthop
= *nexthop
;
5975 attr
.nh_ifindex
= ifindex
;
5979 struct attr_extra
*extra
= bgp_attr_extra_get(&attr
);
5980 extra
->mp_nexthop_global
= *nexthop6
;
5981 extra
->mp_nexthop_len
= BGP_ATTR_NHLEN_IPV6_GLOBAL
;
5985 attr
.flag
|= ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC
);
5986 attr
.extra
->tag
= tag
;
5988 afi
= family2afi (p
->family
);
5990 red
= bgp_redist_lookup(bgp
, afi
, type
, instance
);
5993 struct attr attr_new
;
5994 struct attr_extra extra_new
;
5996 /* Copy attribute for modification. */
5997 attr_new
.extra
= &extra_new
;
5998 bgp_attr_dup (&attr_new
, &attr
);
6000 if (red
->redist_metric_flag
)
6001 attr_new
.med
= red
->redist_metric
;
6003 /* Apply route-map. */
6006 info
.peer
= bgp
->peer_self
;
6007 info
.attr
= &attr_new
;
6009 SET_FLAG (bgp
->peer_self
->rmap_type
, PEER_RMAP_TYPE_REDISTRIBUTE
);
6011 ret
= route_map_apply (red
->rmap
.map
, p
, RMAP_BGP
, &info
);
6013 bgp
->peer_self
->rmap_type
= 0;
6015 if (ret
== RMAP_DENYMATCH
)
6017 /* Free uninterned attribute. */
6018 bgp_attr_flush (&attr_new
);
6020 /* Unintern original. */
6021 aspath_unintern (&attr
.aspath
);
6022 bgp_attr_extra_free (&attr
);
6023 bgp_redistribute_delete (bgp
, p
, type
, instance
);
6028 bn
= bgp_afi_node_get (bgp
->rib
[afi
][SAFI_UNICAST
],
6029 afi
, SAFI_UNICAST
, p
, NULL
);
6031 new_attr
= bgp_attr_intern (&attr_new
);
6033 for (bi
= bn
->info
; bi
; bi
= bi
->next
)
6034 if (bi
->peer
== bgp
->peer_self
6035 && bi
->sub_type
== BGP_ROUTE_REDISTRIBUTE
)
6040 /* Ensure the (source route) type is updated. */
6042 if (attrhash_cmp (bi
->attr
, new_attr
) &&
6043 !CHECK_FLAG(bi
->flags
, BGP_INFO_REMOVED
))
6045 bgp_attr_unintern (&new_attr
);
6046 aspath_unintern (&attr
.aspath
);
6047 bgp_attr_extra_free (&attr
);
6048 bgp_unlock_node (bn
);
6053 /* The attribute is changed. */
6054 bgp_info_set_flag (bn
, bi
, BGP_INFO_ATTR_CHANGED
);
6056 /* Rewrite BGP route information. */
6057 if (CHECK_FLAG(bi
->flags
, BGP_INFO_REMOVED
))
6058 bgp_info_restore(bn
, bi
);
6060 bgp_aggregate_decrement (bgp
, p
, bi
, afi
, SAFI_UNICAST
);
6061 bgp_attr_unintern (&bi
->attr
);
6062 bi
->attr
= new_attr
;
6063 bi
->uptime
= bgp_clock ();
6065 /* Process change. */
6066 bgp_aggregate_increment (bgp
, p
, bi
, afi
, SAFI_UNICAST
);
6067 bgp_process (bgp
, bn
, afi
, SAFI_UNICAST
);
6068 bgp_unlock_node (bn
);
6069 aspath_unintern (&attr
.aspath
);
6070 bgp_attr_extra_free (&attr
);
6075 new = info_make(type
, BGP_ROUTE_REDISTRIBUTE
, instance
, bgp
->peer_self
,
6077 SET_FLAG (new->flags
, BGP_INFO_VALID
);
6079 bgp_aggregate_increment (bgp
, p
, new, afi
, SAFI_UNICAST
);
6080 bgp_info_add (bn
, new);
6081 bgp_unlock_node (bn
);
6082 bgp_process (bgp
, bn
, afi
, SAFI_UNICAST
);
6085 /* Unintern original. */
6086 aspath_unintern (&attr
.aspath
);
6087 bgp_attr_extra_free (&attr
);
6091 bgp_redistribute_delete (struct bgp
*bgp
, struct prefix
*p
, u_char type
, u_short instance
)
6094 struct bgp_node
*rn
;
6095 struct bgp_info
*ri
;
6096 struct bgp_redist
*red
;
6098 afi
= family2afi (p
->family
);
6100 red
= bgp_redist_lookup(bgp
, afi
, type
, instance
);
6103 rn
= bgp_afi_node_get (bgp
->rib
[afi
][SAFI_UNICAST
], afi
, SAFI_UNICAST
, p
, NULL
);
6105 for (ri
= rn
->info
; ri
; ri
= ri
->next
)
6106 if (ri
->peer
== bgp
->peer_self
6107 && ri
->type
== type
)
6112 bgp_aggregate_decrement (bgp
, p
, ri
, afi
, SAFI_UNICAST
);
6113 bgp_info_delete (rn
, ri
);
6114 bgp_process (bgp
, rn
, afi
, SAFI_UNICAST
);
6116 bgp_unlock_node (rn
);
6120 /* Withdraw specified route type's route. */
6122 bgp_redistribute_withdraw (struct bgp
*bgp
, afi_t afi
, int type
, u_short instance
)
6124 struct bgp_node
*rn
;
6125 struct bgp_info
*ri
;
6126 struct bgp_table
*table
;
6128 table
= bgp
->rib
[afi
][SAFI_UNICAST
];
6130 for (rn
= bgp_table_top (table
); rn
; rn
= bgp_route_next (rn
))
6132 for (ri
= rn
->info
; ri
; ri
= ri
->next
)
6133 if (ri
->peer
== bgp
->peer_self
6135 && ri
->instance
== instance
)
6140 bgp_aggregate_decrement (bgp
, &rn
->p
, ri
, afi
, SAFI_UNICAST
);
6141 bgp_info_delete (rn
, ri
);
6142 bgp_process (bgp
, rn
, afi
, SAFI_UNICAST
);
6147 /* Static function to display route. */
6149 route_vty_out_route (struct prefix
*p
, struct vty
*vty
)
6152 u_int32_t destination
;
6155 if (p
->family
== AF_INET
)
6157 len
= vty_out (vty
, "%s", inet_ntop (p
->family
, &p
->u
.prefix
, buf
, BUFSIZ
));
6158 destination
= ntohl (p
->u
.prefix4
.s_addr
);
6160 if ((IN_CLASSC (destination
) && p
->prefixlen
== 24)
6161 || (IN_CLASSB (destination
) && p
->prefixlen
== 16)
6162 || (IN_CLASSA (destination
) && p
->prefixlen
== 8)
6163 || p
->u
.prefix4
.s_addr
== 0)
6165 /* When mask is natural, mask is not displayed. */
6168 len
+= vty_out (vty
, "/%d", p
->prefixlen
);
6170 else if (p
->family
== AF_ETHERNET
)
6172 prefix2str(p
, buf
, PREFIX_STRLEN
);
6173 len
= vty_out (vty
, "%s", buf
);
6176 len
= vty_out (vty
, "%s/%d", inet_ntop (p
->family
, &p
->u
.prefix
, buf
, BUFSIZ
),
6181 vty_out (vty
, "%s%*s", VTY_NEWLINE
, 20, " ");
6183 vty_out (vty
, "%*s", len
, " ");
6186 enum bgp_display_type
6191 /* Print the short form route status for a bgp_info */
6193 route_vty_short_status_out (struct vty
*vty
, struct bgp_info
*binfo
,
6194 json_object
*json_path
)
6199 /* Route status display. */
6200 if (CHECK_FLAG (binfo
->flags
, BGP_INFO_REMOVED
))
6201 json_object_boolean_true_add(json_path
, "removed");
6203 if (CHECK_FLAG (binfo
->flags
, BGP_INFO_STALE
))
6204 json_object_boolean_true_add(json_path
, "stale");
6206 if (binfo
->extra
&& binfo
->extra
->suppress
)
6207 json_object_boolean_true_add(json_path
, "suppressed");
6209 if (CHECK_FLAG (binfo
->flags
, BGP_INFO_VALID
) &&
6210 ! CHECK_FLAG (binfo
->flags
, BGP_INFO_HISTORY
))
6211 json_object_boolean_true_add(json_path
, "valid");
6214 if (CHECK_FLAG (binfo
->flags
, BGP_INFO_HISTORY
))
6215 json_object_boolean_true_add(json_path
, "history");
6217 if (CHECK_FLAG (binfo
->flags
, BGP_INFO_DAMPED
))
6218 json_object_boolean_true_add(json_path
, "damped");
6220 if (CHECK_FLAG (binfo
->flags
, BGP_INFO_SELECTED
))
6221 json_object_boolean_true_add(json_path
, "bestpath");
6223 if (CHECK_FLAG (binfo
->flags
, BGP_INFO_MULTIPATH
))
6224 json_object_boolean_true_add(json_path
, "multipath");
6226 /* Internal route. */
6227 if ((binfo
->peer
->as
) && (binfo
->peer
->as
== binfo
->peer
->local_as
))
6228 json_object_string_add(json_path
, "pathFrom", "internal");
6230 json_object_string_add(json_path
, "pathFrom", "external");
6235 /* Route status display. */
6236 if (CHECK_FLAG (binfo
->flags
, BGP_INFO_REMOVED
))
6238 else if (CHECK_FLAG (binfo
->flags
, BGP_INFO_STALE
))
6240 else if (binfo
->extra
&& binfo
->extra
->suppress
)
6242 else if (CHECK_FLAG (binfo
->flags
, BGP_INFO_VALID
) &&
6243 ! CHECK_FLAG (binfo
->flags
, BGP_INFO_HISTORY
))
6249 if (CHECK_FLAG (binfo
->flags
, BGP_INFO_HISTORY
))
6251 else if (CHECK_FLAG (binfo
->flags
, BGP_INFO_DAMPED
))
6253 else if (CHECK_FLAG (binfo
->flags
, BGP_INFO_SELECTED
))
6255 else if (CHECK_FLAG (binfo
->flags
, BGP_INFO_MULTIPATH
))
6260 /* Internal route. */
6262 (binfo
->peer
->as
) && (binfo
->peer
->as
== binfo
->peer
->local_as
))
6268 /* called from terminal list command */
6270 route_vty_out (struct vty
*vty
, struct prefix
*p
,
6271 struct bgp_info
*binfo
, int display
, safi_t safi
,
6272 json_object
*json_paths
)
6275 json_object
*json_path
= NULL
;
6276 json_object
*json_nexthops
= NULL
;
6277 json_object
*json_nexthop_global
= NULL
;
6278 json_object
*json_nexthop_ll
= NULL
;
6281 json_path
= json_object_new_object();
6283 /* short status lead text */
6284 route_vty_short_status_out (vty
, binfo
, json_path
);
6288 /* print prefix and mask */
6290 route_vty_out_route (p
, vty
);
6292 vty_out (vty
, "%*s", 17, " ");
6295 /* Print attribute */
6300 * For ENCAP routes, nexthop address family is not
6301 * neccessarily the same as the prefix address family.
6302 * Both SAFI_MPLS_VPN and SAFI_ENCAP use the MP nexthop field
6304 if ((safi
== SAFI_ENCAP
) || (safi
== SAFI_MPLS_VPN
) || (safi
== SAFI_EVPN
))
6309 int af
= NEXTHOP_FAMILY(attr
->extra
->mp_nexthop_len
);
6314 vty_out (vty
, "%s", inet_ntop(af
,
6315 &attr
->extra
->mp_nexthop_global_in
, buf
, BUFSIZ
));
6318 vty_out (vty
, "%s", inet_ntop(af
,
6319 &attr
->extra
->mp_nexthop_global
, buf
, BUFSIZ
));
6330 else if (p
->family
== AF_INET
&& !BGP_ATTR_NEXTHOP_AFI_IP6(attr
))
6334 json_nexthop_global
= json_object_new_object();
6336 if ((safi
== SAFI_MPLS_VPN
) || (safi
== SAFI_EVPN
))
6337 json_object_string_add(json_nexthop_global
, "ip", inet_ntoa (attr
->extra
->mp_nexthop_global_in
));
6339 json_object_string_add(json_nexthop_global
, "ip", inet_ntoa (attr
->nexthop
));
6341 json_object_string_add(json_nexthop_global
, "afi", "ipv4");
6342 json_object_boolean_true_add(json_nexthop_global
, "used");
6346 if ((safi
== SAFI_MPLS_VPN
) || (safi
== SAFI_EVPN
))
6347 vty_out (vty
, "%-16s",
6348 inet_ntoa (attr
->extra
->mp_nexthop_global_in
));
6350 vty_out (vty
, "%-16s", inet_ntoa (attr
->nexthop
));
6355 else if (p
->family
== AF_INET6
|| BGP_ATTR_NEXTHOP_AFI_IP6(attr
))
6362 json_nexthop_global
= json_object_new_object();
6363 json_object_string_add(json_nexthop_global
, "ip",
6364 inet_ntop (AF_INET6
,
6365 &attr
->extra
->mp_nexthop_global
,
6367 json_object_string_add(json_nexthop_global
, "afi", "ipv6");
6368 json_object_string_add(json_nexthop_global
, "scope", "global");
6370 /* We display both LL & GL if both have been received */
6371 if ((attr
->extra
->mp_nexthop_len
== 32) || (binfo
->peer
->conf_if
))
6373 json_nexthop_ll
= json_object_new_object();
6374 json_object_string_add(json_nexthop_ll
, "ip",
6375 inet_ntop (AF_INET6
,
6376 &attr
->extra
->mp_nexthop_local
,
6378 json_object_string_add(json_nexthop_ll
, "afi", "ipv6");
6379 json_object_string_add(json_nexthop_ll
, "scope", "link-local");
6381 if ((IPV6_ADDR_CMP (&attr
->extra
->mp_nexthop_global
,
6382 &attr
->extra
->mp_nexthop_local
) != 0) &&
6383 !attr
->extra
->mp_nexthop_prefer_global
)
6384 json_object_boolean_true_add(json_nexthop_ll
, "used");
6386 json_object_boolean_true_add(json_nexthop_global
, "used");
6389 json_object_boolean_true_add(json_nexthop_global
, "used");
6393 /* Display LL if LL/Global both in table unless prefer-global is set */
6394 if (((attr
->extra
->mp_nexthop_len
== 32) &&
6395 !attr
->extra
->mp_nexthop_prefer_global
) ||
6396 (binfo
->peer
->conf_if
))
6398 if (binfo
->peer
->conf_if
)
6400 len
= vty_out (vty
, "%s",
6401 binfo
->peer
->conf_if
);
6402 len
= 7 - len
; /* len of IPv6 addr + max len of def ifname */
6405 vty_out (vty
, "%s%*s", VTY_NEWLINE
, 45, " ");
6407 vty_out (vty
, "%*s", len
, " ");
6411 len
= vty_out (vty
, "%s",
6412 inet_ntop (AF_INET6
,
6413 &attr
->extra
->mp_nexthop_local
,
6418 vty_out (vty
, "%s%*s", VTY_NEWLINE
, 36, " ");
6420 vty_out (vty
, "%*s", len
, " ");
6425 len
= vty_out (vty
, "%s",
6426 inet_ntop (AF_INET6
,
6427 &attr
->extra
->mp_nexthop_global
,
6432 vty_out (vty
, "%s%*s", VTY_NEWLINE
, 36, " ");
6434 vty_out (vty
, "%*s", len
, " ");
6440 if (attr
->flag
& ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC
))
6442 json_object_int_add(json_path
, "med", attr
->med
);
6444 vty_out (vty
, "%10u", attr
->med
);
6450 if (attr
->flag
& ATTR_FLAG_BIT (BGP_ATTR_LOCAL_PREF
))
6452 json_object_int_add(json_path
, "localpref", attr
->local_pref
);
6454 vty_out (vty
, "%7u", attr
->local_pref
);
6462 json_object_int_add(json_path
, "weight", attr
->extra
->weight
);
6464 json_object_int_add(json_path
, "weight", 0);
6467 vty_out (vty
, "%7u ", (attr
->extra
? attr
->extra
->weight
: 0));
6471 json_object_string_add(json_path
, "peerId", sockunion2str (&binfo
->peer
->su
, buf
, SU_ADDRSTRLEN
));
6478 json_object_string_add(json_path
, "aspath", attr
->aspath
->str
);
6480 aspath_print_vty (vty
, "%s", attr
->aspath
, " ");
6485 json_object_string_add(json_path
, "origin", bgp_origin_long_str
[attr
->origin
]);
6487 vty_out (vty
, "%s", bgp_origin_str
[attr
->origin
]);
6492 json_object_string_add(json_path
, "alert", "No attributes");
6494 vty_out (vty
, "No attributes to print%s", VTY_NEWLINE
);
6499 if (json_nexthop_global
|| json_nexthop_ll
)
6501 json_nexthops
= json_object_new_array();
6503 if (json_nexthop_global
)
6504 json_object_array_add(json_nexthops
, json_nexthop_global
);
6506 if (json_nexthop_ll
)
6507 json_object_array_add(json_nexthops
, json_nexthop_ll
);
6509 json_object_object_add(json_path
, "nexthops", json_nexthops
);
6512 json_object_array_add(json_paths
, json_path
);
6516 vty_out (vty
, "%s", VTY_NEWLINE
);
6518 /* prints an additional line, indented, with VNC info, if present */
6519 if ((safi
== SAFI_MPLS_VPN
) || (safi
== SAFI_ENCAP
))
6520 rfapi_vty_out_vncinfo(vty
, p
, binfo
, safi
);
6525 /* called from terminal list command */
6527 route_vty_out_tmp (struct vty
*vty
, struct prefix
*p
, struct attr
*attr
, safi_t safi
,
6528 u_char use_json
, json_object
*json_ar
)
6530 json_object
*json_status
= NULL
;
6531 json_object
*json_net
= NULL
;
6533 /* Route status display. */
6536 json_status
= json_object_new_object();
6537 json_net
= json_object_new_object();
6546 /* print prefix and mask */
6548 json_object_string_add(json_net
, "addrPrefix", inet_ntop (p
->family
, &p
->u
.prefix
, buff
, BUFSIZ
));
6550 route_vty_out_route (p
, vty
);
6552 /* Print attribute */
6557 if (p
->family
== AF_INET
&&
6558 (safi
== SAFI_MPLS_VPN
||
6559 safi
== SAFI_ENCAP
||
6560 safi
== SAFI_EVPN
||
6561 !BGP_ATTR_NEXTHOP_AFI_IP6(attr
)))
6563 if (safi
== SAFI_MPLS_VPN
|| safi
== SAFI_ENCAP
|| safi
== SAFI_EVPN
)
6564 json_object_string_add(json_net
, "nextHop", inet_ntoa (attr
->extra
->mp_nexthop_global_in
));
6566 json_object_string_add(json_net
, "nextHop", inet_ntoa (attr
->nexthop
));
6568 else if (p
->family
== AF_INET6
|| BGP_ATTR_NEXTHOP_AFI_IP6(attr
))
6572 json_object_string_add(json_net
, "netHopGloabal", inet_ntop (AF_INET6
, &attr
->extra
->mp_nexthop_global
,
6576 if (attr
->flag
& ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC
))
6577 json_object_int_add(json_net
, "metric", attr
->med
);
6579 if (attr
->flag
& ATTR_FLAG_BIT (BGP_ATTR_LOCAL_PREF
))
6580 json_object_int_add(json_net
, "localPref", attr
->local_pref
);
6583 json_object_int_add(json_net
, "weight", attr
->extra
->weight
);
6585 json_object_int_add(json_net
, "weight", 0);
6589 json_object_string_add(json_net
, "asPath", attr
->aspath
->str
);
6592 json_object_string_add(json_net
, "bgpOriginCode", bgp_origin_str
[attr
->origin
]);
6596 if (p
->family
== AF_INET
&&
6597 (safi
== SAFI_MPLS_VPN
||
6598 safi
== SAFI_ENCAP
||
6599 safi
== SAFI_EVPN
||
6600 !BGP_ATTR_NEXTHOP_AFI_IP6(attr
)))
6602 if (safi
== SAFI_MPLS_VPN
|| safi
== SAFI_ENCAP
|| safi
== SAFI_EVPN
)
6603 vty_out (vty
, "%-16s",
6604 inet_ntoa (attr
->extra
->mp_nexthop_global_in
));
6606 vty_out (vty
, "%-16s", inet_ntoa (attr
->nexthop
));
6608 else if (p
->family
== AF_INET6
|| BGP_ATTR_NEXTHOP_AFI_IP6(attr
))
6613 assert (attr
->extra
);
6615 len
= vty_out (vty
, "%s",
6616 inet_ntop (AF_INET6
, &attr
->extra
->mp_nexthop_global
,
6620 vty_out (vty
, "%s%*s", VTY_NEWLINE
, 36, " ");
6622 vty_out (vty
, "%*s", len
, " ");
6624 if (attr
->flag
& ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC
))
6625 vty_out (vty
, "%10u", attr
->med
);
6629 if (attr
->flag
& ATTR_FLAG_BIT (BGP_ATTR_LOCAL_PREF
))
6630 vty_out (vty
, "%7u", attr
->local_pref
);
6634 vty_out (vty
, "%7u ", (attr
->extra
? attr
->extra
->weight
: 0));
6638 aspath_print_vty (vty
, "%s", attr
->aspath
, " ");
6641 vty_out (vty
, "%s", bgp_origin_str
[attr
->origin
]);
6646 json_object_boolean_true_add(json_status
, "*");
6647 json_object_boolean_true_add(json_status
, ">");
6648 json_object_object_add(json_net
, "appliedStatusSymbols", json_status
);
6649 char buf_cut
[BUFSIZ
];
6650 json_object_object_add(json_ar
, inet_ntop (p
->family
, &p
->u
.prefix
, buf_cut
, BUFSIZ
), json_net
);
6653 vty_out (vty
, "%s", VTY_NEWLINE
);
6657 route_vty_out_tag (struct vty
*vty
, struct prefix
*p
,
6658 struct bgp_info
*binfo
, int display
, safi_t safi
, json_object
*json
)
6660 json_object
*json_out
= NULL
;
6662 u_int32_t label
= 0;
6668 json_out
= json_object_new_object();
6670 /* short status lead text */
6671 route_vty_short_status_out (vty
, binfo
, json_out
);
6673 /* print prefix and mask */
6677 route_vty_out_route (p
, vty
);
6679 vty_out (vty
, "%*s", 17, " ");
6682 /* Print attribute */
6686 if (((p
->family
== AF_INET
) && ((safi
== SAFI_MPLS_VPN
|| safi
== SAFI_ENCAP
)))
6687 || (safi
== SAFI_EVPN
&& p
->family
== AF_ETHERNET
&& !BGP_ATTR_NEXTHOP_AFI_IP6(attr
))
6688 || (!BGP_ATTR_NEXTHOP_AFI_IP6(attr
)))
6690 if (safi
== SAFI_MPLS_VPN
|| safi
== SAFI_ENCAP
|| safi
== SAFI_EVPN
)
6693 json_object_string_add(json_out
, "mpNexthopGlobalIn", inet_ntoa (attr
->extra
->mp_nexthop_global_in
));
6695 vty_out (vty
, "%-16s", inet_ntoa (attr
->extra
->mp_nexthop_global_in
));
6700 json_object_string_add(json_out
, "nexthop", inet_ntoa (attr
->nexthop
));
6702 vty_out (vty
, "%-16s", inet_ntoa (attr
->nexthop
));
6705 else if (((p
->family
== AF_INET6
) && ((safi
== SAFI_MPLS_VPN
|| safi
== SAFI_ENCAP
)))
6706 || (safi
== SAFI_EVPN
&& p
->family
== AF_ETHERNET
&& BGP_ATTR_NEXTHOP_AFI_IP6(attr
))
6707 || (BGP_ATTR_NEXTHOP_AFI_IP6(attr
)))
6709 assert (attr
->extra
);
6713 if (attr
->extra
->mp_nexthop_len
== BGP_ATTR_NHLEN_IPV6_GLOBAL
)
6716 json_object_string_add(json_out
, "mpNexthopGlobalIn",
6717 inet_ntop (AF_INET6
, &attr
->extra
->mp_nexthop_global
, buf_a
, BUFSIZ
));
6720 inet_ntop (AF_INET6
, &attr
->extra
->mp_nexthop_global
,
6723 else if (attr
->extra
->mp_nexthop_len
== BGP_ATTR_NHLEN_IPV6_GLOBAL_AND_LL
)
6727 inet_ntop (AF_INET6
, &attr
->extra
->mp_nexthop_global
,
6729 inet_ntop (AF_INET6
, &attr
->extra
->mp_nexthop_local
,
6731 sprintf(buf_c
, "%s(%s)", buf_a
, buf_b
);
6732 json_object_string_add(json_out
, "mpNexthopGlobalLocal", buf_c
);
6735 vty_out (vty
, "%s(%s)",
6736 inet_ntop (AF_INET6
, &attr
->extra
->mp_nexthop_global
,
6738 inet_ntop (AF_INET6
, &attr
->extra
->mp_nexthop_local
,
6745 label
= decode_label (binfo
->extra
->tag
);
6750 json_object_int_add(json_out
, "notag", label
);
6751 json_object_array_add(json
, json_out
);
6755 vty_out (vty
, "notag/%d", label
);
6757 vty_out (vty
, "%s", VTY_NEWLINE
);
6762 route_vty_out_overlay (struct vty
*vty
, struct prefix
*p
,
6763 struct bgp_info
*binfo
, int display
, json_object
*json_paths
)
6767 json_object
*json_path
= NULL
;
6770 json_path
= json_object_new_object();
6775 /* short status lead text */
6776 route_vty_short_status_out (vty
, binfo
, json_path
);
6778 /* print prefix and mask */
6780 route_vty_out_route (p
, vty
);
6782 vty_out (vty
, "%*s", 17, " ");
6784 /* Print attribute */
6791 int af
= NEXTHOP_FAMILY(attr
->extra
->mp_nexthop_len
);
6795 vty_out (vty
, "%-16s", inet_ntop(af
,
6796 &attr
->extra
->mp_nexthop_global_in
, buf
, BUFSIZ
));
6799 vty_out (vty
, "%s(%s)",
6801 &attr
->extra
->mp_nexthop_global
, buf
, BUFSIZ
),
6803 &attr
->extra
->mp_nexthop_local
, buf1
, BUFSIZ
));
6815 struct eth_segment_id
*id
= &(attr
->extra
->evpn_overlay
.eth_s_id
);
6816 char *str
= esi2str(id
);
6817 vty_out (vty
, "%s", str
);
6818 XFREE (MTYPE_TMP
, str
);
6819 if (p
->u
.prefix_evpn
.flags
& IP_PREFIX_V4
)
6821 vty_out (vty
, "/%s", inet_ntoa (attr
->extra
->evpn_overlay
.gw_ip
.ipv4
));
6823 else if (p
->u
.prefix_evpn
.flags
& IP_PREFIX_V6
)
6825 vty_out (vty
, "/%s",
6826 inet_ntop (AF_INET6
, &(attr
->extra
->evpn_overlay
.gw_ip
.ipv6
),
6829 if(attr
->extra
->ecommunity
)
6832 struct ecommunity_val
*routermac
= ecommunity_lookup (attr
->extra
->ecommunity
,
6833 ECOMMUNITY_ENCODE_EVPN
,
6834 ECOMMUNITY_EVPN_SUBTYPE_ROUTERMAC
);
6836 mac
= ecom_mac2str((char *)routermac
->val
);
6839 vty_out (vty
, "/%s",(char *)mac
);
6840 XFREE(MTYPE_TMP
, mac
);
6844 vty_out (vty
, "%s", VTY_NEWLINE
);
6847 /* dampening route */
6849 damp_route_vty_out (struct vty
*vty
, struct prefix
*p
, struct bgp_info
*binfo
,
6850 int display
, safi_t safi
, u_char use_json
, json_object
*json
)
6854 char timebuf
[BGP_UPTIME_LEN
];
6856 /* short status lead text */
6857 route_vty_short_status_out (vty
, binfo
, json
);
6859 /* print prefix and mask */
6863 route_vty_out_route (p
, vty
);
6865 vty_out (vty
, "%*s", 17, " ");
6868 len
= vty_out (vty
, "%s", binfo
->peer
->host
);
6873 vty_out (vty
, "%s%*s", VTY_NEWLINE
, 34, " ");
6878 json_object_int_add(json
, "peerHost", len
);
6880 vty_out (vty
, "%*s", len
, " ");
6884 bgp_damp_reuse_time_vty (vty
, binfo
, timebuf
, BGP_UPTIME_LEN
, use_json
, json
);
6886 vty_out (vty
, "%s ", bgp_damp_reuse_time_vty (vty
, binfo
, timebuf
, BGP_UPTIME_LEN
, use_json
, json
));
6888 /* Print attribute */
6896 json_object_string_add(json
, "asPath", attr
->aspath
->str
);
6898 aspath_print_vty (vty
, "%s", attr
->aspath
, " ");
6903 json_object_string_add(json
, "origin", bgp_origin_str
[attr
->origin
]);
6905 vty_out (vty
, "%s", bgp_origin_str
[attr
->origin
]);
6908 vty_out (vty
, "%s", VTY_NEWLINE
);
6913 flap_route_vty_out (struct vty
*vty
, struct prefix
*p
, struct bgp_info
*binfo
,
6914 int display
, safi_t safi
, u_char use_json
, json_object
*json
)
6917 struct bgp_damp_info
*bdi
;
6918 char timebuf
[BGP_UPTIME_LEN
];
6924 bdi
= binfo
->extra
->damp_info
;
6926 /* short status lead text */
6927 route_vty_short_status_out (vty
, binfo
, json
);
6929 /* print prefix and mask */
6933 route_vty_out_route (p
, vty
);
6935 vty_out (vty
, "%*s", 17, " ");
6938 len
= vty_out (vty
, "%s", binfo
->peer
->host
);
6943 vty_out (vty
, "%s%*s", VTY_NEWLINE
, 33, " ");
6948 json_object_int_add(json
, "peerHost", len
);
6950 vty_out (vty
, "%*s", len
, " ");
6953 len
= vty_out (vty
, "%d", bdi
->flap
);
6963 json_object_int_add(json
, "bdiFlap", len
);
6965 vty_out (vty
, "%*s", len
, " ");
6969 peer_uptime (bdi
->start_time
, timebuf
, BGP_UPTIME_LEN
, use_json
, json
);
6971 vty_out (vty
, "%s ", peer_uptime (bdi
->start_time
,
6972 timebuf
, BGP_UPTIME_LEN
, 0, NULL
));
6974 if (CHECK_FLAG (binfo
->flags
, BGP_INFO_DAMPED
)
6975 && ! CHECK_FLAG (binfo
->flags
, BGP_INFO_HISTORY
))
6978 bgp_damp_reuse_time_vty (vty
, binfo
, timebuf
, BGP_UPTIME_LEN
, use_json
, json
);
6980 vty_out (vty
, "%s ", bgp_damp_reuse_time_vty (vty
, binfo
, timebuf
, BGP_UPTIME_LEN
, use_json
, json
));
6985 vty_out (vty
, "%*s ", 8, " ");
6988 /* Print attribute */
6996 json_object_string_add(json
, "asPath", attr
->aspath
->str
);
6998 aspath_print_vty (vty
, "%s", attr
->aspath
, " ");
7003 json_object_string_add(json
, "origin", bgp_origin_str
[attr
->origin
]);
7005 vty_out (vty
, "%s", bgp_origin_str
[attr
->origin
]);
7008 vty_out (vty
, "%s", VTY_NEWLINE
);
7012 route_vty_out_advertised_to (struct vty
*vty
, struct peer
*peer
, int *first
,
7013 const char *header
, json_object
*json_adv_to
)
7015 char buf1
[INET6_ADDRSTRLEN
];
7016 json_object
*json_peer
= NULL
;
7020 /* 'advertised-to' is a dictionary of peers we have advertised this
7021 * prefix too. The key is the peer's IP or swpX, the value is the
7022 * hostname if we know it and "" if not.
7024 json_peer
= json_object_new_object();
7027 json_object_string_add(json_peer
, "hostname", peer
->hostname
);
7030 json_object_object_add(json_adv_to
, peer
->conf_if
, json_peer
);
7032 json_object_object_add(json_adv_to
,
7033 sockunion2str (&peer
->su
, buf1
, SU_ADDRSTRLEN
),
7040 vty_out (vty
, "%s", header
);
7044 if (peer
->hostname
&& bgp_flag_check(peer
->bgp
, BGP_FLAG_SHOW_HOSTNAME
))
7047 vty_out (vty
, " %s(%s)", peer
->hostname
, peer
->conf_if
);
7049 vty_out (vty
, " %s(%s)", peer
->hostname
,
7050 sockunion2str (&peer
->su
, buf1
, SU_ADDRSTRLEN
));
7055 vty_out (vty
, " %s", peer
->conf_if
);
7057 vty_out (vty
, " %s", sockunion2str (&peer
->su
, buf1
, SU_ADDRSTRLEN
));
7063 route_vty_out_detail (struct vty
*vty
, struct bgp
*bgp
, struct prefix
*p
,
7064 struct bgp_info
*binfo
, afi_t afi
, safi_t safi
,
7065 json_object
*json_paths
)
7067 char buf
[INET6_ADDRSTRLEN
];
7070 int sockunion_vty_out (struct vty
*, union sockunion
*);
7072 json_object
*json_bestpath
= NULL
;
7073 json_object
*json_cluster_list
= NULL
;
7074 json_object
*json_cluster_list_list
= NULL
;
7075 json_object
*json_ext_community
= NULL
;
7076 json_object
*json_last_update
= NULL
;
7077 json_object
*json_nexthop_global
= NULL
;
7078 json_object
*json_nexthop_ll
= NULL
;
7079 json_object
*json_nexthops
= NULL
;
7080 json_object
*json_path
= NULL
;
7081 json_object
*json_peer
= NULL
;
7082 json_object
*json_string
= NULL
;
7083 json_object
*json_adv_to
= NULL
;
7085 struct listnode
*node
, *nnode
;
7087 int addpath_capable
;
7089 unsigned int first_as
;
7093 json_path
= json_object_new_object();
7094 json_peer
= json_object_new_object();
7095 json_nexthop_global
= json_object_new_object();
7102 /* Line1 display AS-path, Aggregator */
7107 json_object_lock(attr
->aspath
->json
);
7108 json_object_object_add(json_path
, "aspath", attr
->aspath
->json
);
7112 if (attr
->aspath
->segments
)
7113 aspath_print_vty (vty
, " %s", attr
->aspath
, "");
7115 vty_out (vty
, " Local");
7119 if (CHECK_FLAG (binfo
->flags
, BGP_INFO_REMOVED
))
7122 json_object_boolean_true_add(json_path
, "removed");
7124 vty_out (vty
, ", (removed)");
7127 if (CHECK_FLAG (binfo
->flags
, BGP_INFO_STALE
))
7130 json_object_boolean_true_add(json_path
, "stale");
7132 vty_out (vty
, ", (stale)");
7135 if (CHECK_FLAG (attr
->flag
, ATTR_FLAG_BIT (BGP_ATTR_AGGREGATOR
)))
7139 json_object_int_add(json_path
, "aggregatorAs", attr
->extra
->aggregator_as
);
7140 json_object_string_add(json_path
, "aggregatorId", inet_ntoa (attr
->extra
->aggregator_addr
));
7144 vty_out (vty
, ", (aggregated by %u %s)",
7145 attr
->extra
->aggregator_as
,
7146 inet_ntoa (attr
->extra
->aggregator_addr
));
7150 if (CHECK_FLAG (binfo
->peer
->af_flags
[afi
][safi
], PEER_FLAG_REFLECTOR_CLIENT
))
7153 json_object_boolean_true_add(json_path
, "rxedFromRrClient");
7155 vty_out (vty
, ", (Received from a RR-client)");
7158 if (CHECK_FLAG (binfo
->peer
->af_flags
[afi
][safi
], PEER_FLAG_RSERVER_CLIENT
))
7161 json_object_boolean_true_add(json_path
, "rxedFromRsClient");
7163 vty_out (vty
, ", (Received from a RS-client)");
7166 if (CHECK_FLAG (binfo
->flags
, BGP_INFO_HISTORY
))
7169 json_object_boolean_true_add(json_path
, "dampeningHistoryEntry");
7171 vty_out (vty
, ", (history entry)");
7173 else if (CHECK_FLAG (binfo
->flags
, BGP_INFO_DAMPED
))
7176 json_object_boolean_true_add(json_path
, "dampeningSuppressed");
7178 vty_out (vty
, ", (suppressed due to dampening)");
7182 vty_out (vty
, "%s", VTY_NEWLINE
);
7184 /* Line2 display Next-hop, Neighbor, Router-id */
7185 /* Display the nexthop */
7186 if (p
->family
== AF_INET
&&
7187 (safi
== SAFI_MPLS_VPN
||
7188 safi
== SAFI_ENCAP
||
7189 safi
== SAFI_EVPN
||
7190 !BGP_ATTR_NEXTHOP_AFI_IP6(attr
)))
7192 if (safi
== SAFI_MPLS_VPN
|| safi
== SAFI_ENCAP
|| safi
== SAFI_EVPN
)
7195 json_object_string_add(json_nexthop_global
, "ip", inet_ntoa (attr
->extra
->mp_nexthop_global_in
));
7197 vty_out (vty
, " %s", inet_ntoa (attr
->extra
->mp_nexthop_global_in
));
7202 json_object_string_add(json_nexthop_global
, "ip", inet_ntoa (attr
->nexthop
));
7204 vty_out (vty
, " %s", inet_ntoa (attr
->nexthop
));
7208 json_object_string_add(json_nexthop_global
, "afi", "ipv4");
7212 assert (attr
->extra
);
7215 json_object_string_add(json_nexthop_global
, "ip",
7216 inet_ntop (AF_INET6
, &attr
->extra
->mp_nexthop_global
,
7217 buf
, INET6_ADDRSTRLEN
));
7218 json_object_string_add(json_nexthop_global
, "afi", "ipv6");
7219 json_object_string_add(json_nexthop_global
, "scope", "global");
7223 vty_out (vty
, " %s",
7224 inet_ntop (AF_INET6
, &attr
->extra
->mp_nexthop_global
,
7225 buf
, INET6_ADDRSTRLEN
));
7229 /* Display the IGP cost or 'inaccessible' */
7230 if (! CHECK_FLAG (binfo
->flags
, BGP_INFO_VALID
))
7233 json_object_boolean_false_add(json_nexthop_global
, "accessible");
7235 vty_out (vty
, " (inaccessible)");
7239 if (binfo
->extra
&& binfo
->extra
->igpmetric
)
7242 json_object_int_add(json_nexthop_global
, "metric", binfo
->extra
->igpmetric
);
7244 vty_out (vty
, " (metric %u)", binfo
->extra
->igpmetric
);
7247 /* IGP cost is 0, display this only for json */
7251 json_object_int_add(json_nexthop_global
, "metric", 0);
7255 json_object_boolean_true_add(json_nexthop_global
, "accessible");
7258 /* Display peer "from" output */
7259 /* This path was originated locally */
7260 if (binfo
->peer
== bgp
->peer_self
)
7263 if (p
->family
== AF_INET
&& !BGP_ATTR_NEXTHOP_AFI_IP6(attr
))
7266 json_object_string_add(json_peer
, "peerId", "0.0.0.0");
7268 vty_out (vty
, " from 0.0.0.0 ");
7273 json_object_string_add(json_peer
, "peerId", "::");
7275 vty_out (vty
, " from :: ");
7279 json_object_string_add(json_peer
, "routerId", inet_ntoa(bgp
->router_id
));
7281 vty_out (vty
, "(%s)", inet_ntoa(bgp
->router_id
));
7284 /* We RXed this path from one of our peers */
7290 json_object_string_add(json_peer
, "peerId", sockunion2str (&binfo
->peer
->su
, buf
, SU_ADDRSTRLEN
));
7291 json_object_string_add(json_peer
, "routerId", inet_ntop (AF_INET
, &binfo
->peer
->remote_id
, buf1
, BUFSIZ
));
7293 if (binfo
->peer
->hostname
)
7294 json_object_string_add(json_peer
, "hostname", binfo
->peer
->hostname
);
7296 if (binfo
->peer
->domainname
)
7297 json_object_string_add(json_peer
, "domainname", binfo
->peer
->domainname
);
7299 if (binfo
->peer
->conf_if
)
7300 json_object_string_add(json_peer
, "interface", binfo
->peer
->conf_if
);
7304 if (binfo
->peer
->conf_if
)
7306 if (binfo
->peer
->hostname
&&
7307 bgp_flag_check(binfo
->peer
->bgp
, BGP_FLAG_SHOW_HOSTNAME
))
7308 vty_out (vty
, " from %s(%s)", binfo
->peer
->hostname
,
7309 binfo
->peer
->conf_if
);
7311 vty_out (vty
, " from %s", binfo
->peer
->conf_if
);
7315 if (binfo
->peer
->hostname
&&
7316 bgp_flag_check(binfo
->peer
->bgp
, BGP_FLAG_SHOW_HOSTNAME
))
7317 vty_out (vty
, " from %s(%s)", binfo
->peer
->hostname
,
7320 vty_out (vty
, " from %s", sockunion2str (&binfo
->peer
->su
, buf
, SU_ADDRSTRLEN
));
7323 if (attr
->flag
& ATTR_FLAG_BIT(BGP_ATTR_ORIGINATOR_ID
))
7324 vty_out (vty
, " (%s)", inet_ntoa (attr
->extra
->originator_id
));
7326 vty_out (vty
, " (%s)", inet_ntop (AF_INET
, &binfo
->peer
->remote_id
, buf1
, BUFSIZ
));
7331 vty_out (vty
, "%s", VTY_NEWLINE
);
7333 /* display the link-local nexthop */
7334 if (attr
->extra
&& attr
->extra
->mp_nexthop_len
== BGP_ATTR_NHLEN_IPV6_GLOBAL_AND_LL
)
7338 json_nexthop_ll
= json_object_new_object();
7339 json_object_string_add(json_nexthop_ll
, "ip",
7340 inet_ntop (AF_INET6
, &attr
->extra
->mp_nexthop_local
,
7341 buf
, INET6_ADDRSTRLEN
));
7342 json_object_string_add(json_nexthop_ll
, "afi", "ipv6");
7343 json_object_string_add(json_nexthop_ll
, "scope", "link-local");
7345 json_object_boolean_true_add(json_nexthop_ll
, "accessible");
7347 if (!attr
->extra
->mp_nexthop_prefer_global
)
7348 json_object_boolean_true_add(json_nexthop_ll
, "used");
7350 json_object_boolean_true_add(json_nexthop_global
, "used");
7354 vty_out (vty
, " (%s) %s%s",
7355 inet_ntop (AF_INET6
, &attr
->extra
->mp_nexthop_local
,
7356 buf
, INET6_ADDRSTRLEN
),
7357 attr
->extra
->mp_nexthop_prefer_global
?
7358 "(prefer-global)" : "(used)",
7362 /* If we do not have a link-local nexthop then we must flag the global as "used" */
7366 json_object_boolean_true_add(json_nexthop_global
, "used");
7369 /* Line 3 display Origin, Med, Locpref, Weight, Tag, valid, Int/Ext/Local, Atomic, best */
7371 json_object_string_add(json_path
, "origin", bgp_origin_long_str
[attr
->origin
]);
7373 vty_out (vty
, " Origin %s", bgp_origin_long_str
[attr
->origin
]);
7375 if (attr
->flag
& ATTR_FLAG_BIT(BGP_ATTR_MULTI_EXIT_DISC
))
7378 json_object_int_add(json_path
, "med", attr
->med
);
7380 vty_out (vty
, ", metric %u", attr
->med
);
7383 if (attr
->flag
& ATTR_FLAG_BIT(BGP_ATTR_LOCAL_PREF
))
7386 json_object_int_add(json_path
, "localpref", attr
->local_pref
);
7388 vty_out (vty
, ", localpref %u", attr
->local_pref
);
7393 json_object_int_add(json_path
, "localpref", bgp
->default_local_pref
);
7395 vty_out (vty
, ", localpref %u", bgp
->default_local_pref
);
7398 if (attr
->extra
&& attr
->extra
->weight
!= 0)
7401 json_object_int_add(json_path
, "weight", attr
->extra
->weight
);
7403 vty_out (vty
, ", weight %u", attr
->extra
->weight
);
7406 if (attr
->extra
&& attr
->extra
->tag
!= 0)
7409 json_object_int_add(json_path
, "tag", attr
->extra
->tag
);
7411 vty_out (vty
, ", tag %"ROUTE_TAG_PRI
, attr
->extra
->tag
);
7414 if (! CHECK_FLAG (binfo
->flags
, BGP_INFO_VALID
))
7417 json_object_boolean_false_add(json_path
, "valid");
7419 vty_out (vty
, ", invalid");
7421 else if (! CHECK_FLAG (binfo
->flags
, BGP_INFO_HISTORY
))
7424 json_object_boolean_true_add(json_path
, "valid");
7426 vty_out (vty
, ", valid");
7429 if (binfo
->peer
!= bgp
->peer_self
)
7431 if (binfo
->peer
->as
== binfo
->peer
->local_as
)
7433 if (CHECK_FLAG(bgp
->config
, BGP_CONFIG_CONFEDERATION
))
7436 json_object_string_add(json_peer
, "type", "confed-internal");
7438 vty_out (vty
, ", confed-internal");
7443 json_object_string_add(json_peer
, "type", "internal");
7445 vty_out (vty
, ", internal");
7450 if (bgp_confederation_peers_check(bgp
, binfo
->peer
->as
))
7453 json_object_string_add(json_peer
, "type", "confed-external");
7455 vty_out (vty
, ", confed-external");
7460 json_object_string_add(json_peer
, "type", "external");
7462 vty_out (vty
, ", external");
7466 else if (binfo
->sub_type
== BGP_ROUTE_AGGREGATE
)
7470 json_object_boolean_true_add(json_path
, "aggregated");
7471 json_object_boolean_true_add(json_path
, "local");
7475 vty_out (vty
, ", aggregated, local");
7478 else if (binfo
->type
!= ZEBRA_ROUTE_BGP
)
7481 json_object_boolean_true_add(json_path
, "sourced");
7483 vty_out (vty
, ", sourced");
7489 json_object_boolean_true_add(json_path
, "sourced");
7490 json_object_boolean_true_add(json_path
, "local");
7494 vty_out (vty
, ", sourced, local");
7498 if (attr
->flag
& ATTR_FLAG_BIT(BGP_ATTR_ATOMIC_AGGREGATE
))
7501 json_object_boolean_true_add(json_path
, "atomicAggregate");
7503 vty_out (vty
, ", atomic-aggregate");
7506 if (CHECK_FLAG (binfo
->flags
, BGP_INFO_MULTIPATH
) ||
7507 (CHECK_FLAG (binfo
->flags
, BGP_INFO_SELECTED
) &&
7508 bgp_info_mpath_count (binfo
)))
7511 json_object_boolean_true_add(json_path
, "multipath");
7513 vty_out (vty
, ", multipath");
7516 // Mark the bestpath(s)
7517 if (CHECK_FLAG (binfo
->flags
, BGP_INFO_DMED_SELECTED
))
7519 first_as
= aspath_get_first_as(attr
->aspath
);
7524 json_bestpath
= json_object_new_object();
7525 json_object_int_add(json_bestpath
, "bestpathFromAs", first_as
);
7530 vty_out (vty
, ", bestpath-from-AS %d", first_as
);
7532 vty_out (vty
, ", bestpath-from-AS Local");
7536 if (CHECK_FLAG (binfo
->flags
, BGP_INFO_SELECTED
))
7541 json_bestpath
= json_object_new_object();
7542 json_object_boolean_true_add(json_bestpath
, "overall");
7545 vty_out (vty
, ", best");
7549 json_object_object_add(json_path
, "bestpath", json_bestpath
);
7552 vty_out (vty
, "%s", VTY_NEWLINE
);
7554 /* Line 4 display Community */
7555 if (attr
->community
)
7559 json_object_lock(attr
->community
->json
);
7560 json_object_object_add(json_path
, "community", attr
->community
->json
);
7564 vty_out (vty
, " Community: %s%s", attr
->community
->str
,
7569 /* Line 5 display Extended-community */
7570 if (attr
->flag
& ATTR_FLAG_BIT(BGP_ATTR_EXT_COMMUNITIES
))
7574 json_ext_community
= json_object_new_object();
7575 json_object_string_add(json_ext_community
, "string", attr
->extra
->ecommunity
->str
);
7576 json_object_object_add(json_path
, "extendedCommunity", json_ext_community
);
7580 vty_out (vty
, " Extended Community: %s%s",
7581 attr
->extra
->ecommunity
->str
, VTY_NEWLINE
);
7585 /* Line 6 display Large community */
7586 if (attr
->flag
& ATTR_FLAG_BIT(BGP_ATTR_LARGE_COMMUNITIES
))
7587 vty_out (vty
, " Large Community: %s%s",
7588 attr
->extra
->lcommunity
->str
, VTY_NEWLINE
);
7590 /* Line 7 display Originator, Cluster-id */
7591 if ((attr
->flag
& ATTR_FLAG_BIT(BGP_ATTR_ORIGINATOR_ID
)) ||
7592 (attr
->flag
& ATTR_FLAG_BIT(BGP_ATTR_CLUSTER_LIST
)))
7594 assert (attr
->extra
);
7595 if (attr
->flag
& ATTR_FLAG_BIT(BGP_ATTR_ORIGINATOR_ID
))
7598 json_object_string_add(json_path
, "originatorId", inet_ntoa (attr
->extra
->originator_id
));
7600 vty_out (vty
, " Originator: %s",
7601 inet_ntoa (attr
->extra
->originator_id
));
7604 if (attr
->flag
& ATTR_FLAG_BIT(BGP_ATTR_CLUSTER_LIST
))
7610 json_cluster_list
= json_object_new_object();
7611 json_cluster_list_list
= json_object_new_array();
7613 for (i
= 0; i
< attr
->extra
->cluster
->length
/ 4; i
++)
7615 json_string
= json_object_new_string(inet_ntoa (attr
->extra
->cluster
->list
[i
]));
7616 json_object_array_add(json_cluster_list_list
, json_string
);
7619 /* struct cluster_list does not have "str" variable like
7620 * aspath and community do. Add this someday if someone
7622 json_object_string_add(json_cluster_list, "string", attr->extra->cluster->str);
7624 json_object_object_add(json_cluster_list
, "list", json_cluster_list_list
);
7625 json_object_object_add(json_path
, "clusterList", json_cluster_list
);
7629 vty_out (vty
, ", Cluster list: ");
7631 for (i
= 0; i
< attr
->extra
->cluster
->length
/ 4; i
++)
7633 vty_out (vty
, "%s ",
7634 inet_ntoa (attr
->extra
->cluster
->list
[i
]));
7640 vty_out (vty
, "%s", VTY_NEWLINE
);
7643 if (binfo
->extra
&& binfo
->extra
->damp_info
)
7644 bgp_damp_info_vty (vty
, binfo
, json_path
);
7647 if (bgp_labeled_safi(safi
) && binfo
->extra
)
7649 uint32_t label
= label_pton(binfo
->extra
->tag
);
7651 json_object_int_add(json_path
, "remoteLabel", label
);
7653 vty_out(vty
, " Remote label: %d%s", label
, VTY_NEWLINE
);
7657 if (attr
->extra
->label_index
!= BGP_INVALID_LABEL_INDEX
)
7660 json_object_int_add(json_path
, "labelIndex", attr
->extra
->label_index
);
7662 vty_out(vty
, " Label Index: %d%s", attr
->extra
->label_index
, VTY_NEWLINE
);
7665 /* Line 8 display Addpath IDs */
7666 if (binfo
->addpath_rx_id
|| binfo
->addpath_tx_id
)
7670 json_object_int_add(json_path
, "addpathRxId", binfo
->addpath_rx_id
);
7671 json_object_int_add(json_path
, "addpathTxId", binfo
->addpath_tx_id
);
7675 vty_out (vty
, " AddPath ID: RX %u, TX %u%s",
7676 binfo
->addpath_rx_id
, binfo
->addpath_tx_id
,
7681 /* If we used addpath to TX a non-bestpath we need to display
7682 * "Advertised to" on a path-by-path basis */
7683 if (bgp
->addpath_tx_used
[afi
][safi
])
7687 for (ALL_LIST_ELEMENTS (bgp
->peer
, node
, nnode
, peer
))
7689 addpath_capable
= bgp_addpath_encode_tx (peer
, afi
, safi
);
7690 has_adj
= bgp_adj_out_lookup (peer
, binfo
->net
, binfo
->addpath_tx_id
);
7692 if ((addpath_capable
&& has_adj
) ||
7693 (!addpath_capable
&& has_adj
&& CHECK_FLAG (binfo
->flags
, BGP_INFO_SELECTED
)))
7695 if (json_path
&& !json_adv_to
)
7696 json_adv_to
= json_object_new_object();
7698 route_vty_out_advertised_to(vty
, peer
, &first
,
7708 json_object_object_add(json_path
, "advertisedTo", json_adv_to
);
7715 vty_out (vty
, "%s", VTY_NEWLINE
);
7720 /* Line 9 display Uptime */
7721 tbuf
= time(NULL
) - (bgp_clock() - binfo
->uptime
);
7724 json_last_update
= json_object_new_object();
7725 json_object_int_add(json_last_update
, "epoch", tbuf
);
7726 json_object_string_add(json_last_update
, "string", ctime(&tbuf
));
7727 json_object_object_add(json_path
, "lastUpdate", json_last_update
);
7730 vty_out (vty
, " Last update: %s", ctime(&tbuf
));
7733 /* We've constructed the json object for this path, add it to the json
7738 if (json_nexthop_global
|| json_nexthop_ll
)
7740 json_nexthops
= json_object_new_array();
7742 if (json_nexthop_global
)
7743 json_object_array_add(json_nexthops
, json_nexthop_global
);
7745 if (json_nexthop_ll
)
7746 json_object_array_add(json_nexthops
, json_nexthop_ll
);
7748 json_object_object_add(json_path
, "nexthops", json_nexthops
);
7751 json_object_object_add(json_path
, "peer", json_peer
);
7752 json_object_array_add(json_paths
, json_path
);
7755 vty_out (vty
, "%s", VTY_NEWLINE
);
7758 #define BGP_SHOW_HEADER_CSV "Flags, Network, Next Hop, Metric, LocPrf, Weight, Path%s"
7759 #define BGP_SHOW_DAMP_HEADER " Network From Reuse Path%s"
7760 #define BGP_SHOW_FLAP_HEADER " Network From Flaps Duration Reuse Path%s"
7763 bgp_show_prefix_list (struct vty
*vty
, struct bgp
*bgp
,
7764 const char *prefix_list_str
, afi_t afi
,
7765 safi_t safi
, enum bgp_show_type type
);
7767 bgp_show_filter_list (struct vty
*vty
, struct bgp
*bgp
,
7768 const char *filter
, afi_t afi
,
7769 safi_t safi
, enum bgp_show_type type
);
7771 bgp_show_route_map (struct vty
*vty
, struct bgp
*bgp
,
7772 const char *rmap_str
, afi_t afi
,
7773 safi_t safi
, enum bgp_show_type type
);
7775 bgp_show_community_list (struct vty
*vty
, struct bgp
*bgp
,
7776 const char *com
, int exact
,
7777 afi_t afi
, safi_t safi
);
7779 bgp_show_prefix_longer (struct vty
*vty
, struct bgp
*bgp
,
7780 const char *prefix
, afi_t afi
,
7781 safi_t safi
, enum bgp_show_type type
);
7783 bgp_show_regexp (struct vty
*vty
, const char *regstr
, afi_t afi
,
7784 safi_t safi
, enum bgp_show_type type
);
7786 bgp_show_community (struct vty
*vty
, struct bgp
*bgp
, int argc
,
7787 struct cmd_token
**argv
, int exact
, afi_t afi
, safi_t safi
);
7790 bgp_show_table (struct vty
*vty
, struct bgp
*bgp
, struct bgp_table
*table
,
7791 enum bgp_show_type type
, void *output_arg
, u_char use_json
)
7793 struct bgp_info
*ri
;
7794 struct bgp_node
*rn
;
7797 unsigned long output_count
;
7798 unsigned long total_count
;
7802 json_object
*json_paths
= NULL
;
7807 vty_out (vty
, "{ \"vrfId\": %d, \"vrfName\": \"%s\", \"tableVersion\": %" PRId64
", \"routerId\": \"%s\", \"routes\": { ",
7808 bgp
->vrf_id
== VRF_UNKNOWN
? -1 : bgp
->vrf_id
,
7809 bgp
->inst_type
== BGP_INSTANCE_TYPE_DEFAULT
? "Default" : bgp
->name
,
7810 table
->version
, inet_ntoa (bgp
->router_id
));
7811 json_paths
= json_object_new_object();
7814 /* This is first entry point, so reset total line. */
7818 /* Start processing of routes. */
7819 for (rn
= bgp_table_top (table
); rn
; rn
= bgp_route_next (rn
))
7820 if (rn
->info
!= NULL
)
7823 if (!first
&& use_json
)
7828 json_paths
= json_object_new_array();
7832 for (ri
= rn
->info
; ri
; ri
= ri
->next
)
7835 if (type
== bgp_show_type_flap_statistics
7836 || type
== bgp_show_type_flap_neighbor
7837 || type
== bgp_show_type_dampend_paths
7838 || type
== bgp_show_type_damp_neighbor
)
7840 if (!(ri
->extra
&& ri
->extra
->damp_info
))
7843 if (type
== bgp_show_type_regexp
)
7845 regex_t
*regex
= output_arg
;
7847 if (bgp_regexec (regex
, ri
->attr
->aspath
) == REG_NOMATCH
)
7850 if (type
== bgp_show_type_prefix_list
)
7852 struct prefix_list
*plist
= output_arg
;
7854 if (prefix_list_apply (plist
, &rn
->p
) != PREFIX_PERMIT
)
7857 if (type
== bgp_show_type_filter_list
)
7859 struct as_list
*as_list
= output_arg
;
7861 if (as_list_apply (as_list
, ri
->attr
->aspath
) != AS_FILTER_PERMIT
)
7864 if (type
== bgp_show_type_route_map
)
7866 struct route_map
*rmap
= output_arg
;
7867 struct bgp_info binfo
;
7868 struct attr dummy_attr
;
7869 struct attr_extra dummy_extra
;
7872 dummy_attr
.extra
= &dummy_extra
;
7873 bgp_attr_dup (&dummy_attr
, ri
->attr
);
7875 binfo
.peer
= ri
->peer
;
7876 binfo
.attr
= &dummy_attr
;
7878 ret
= route_map_apply (rmap
, &rn
->p
, RMAP_BGP
, &binfo
);
7879 if (ret
== RMAP_DENYMATCH
)
7882 if (type
== bgp_show_type_neighbor
7883 || type
== bgp_show_type_flap_neighbor
7884 || type
== bgp_show_type_damp_neighbor
)
7886 union sockunion
*su
= output_arg
;
7888 if (ri
->peer
== NULL
||
7889 ri
->peer
->su_remote
== NULL
|| ! sockunion_same(ri
->peer
->su_remote
, su
))
7892 if (type
== bgp_show_type_cidr_only
)
7894 u_int32_t destination
;
7896 destination
= ntohl (rn
->p
.u
.prefix4
.s_addr
);
7897 if (IN_CLASSC (destination
) && rn
->p
.prefixlen
== 24)
7899 if (IN_CLASSB (destination
) && rn
->p
.prefixlen
== 16)
7901 if (IN_CLASSA (destination
) && rn
->p
.prefixlen
== 8)
7904 if (type
== bgp_show_type_prefix_longer
)
7906 struct prefix
*p
= output_arg
;
7908 if (! prefix_match (p
, &rn
->p
))
7911 if (type
== bgp_show_type_community_all
)
7913 if (! ri
->attr
->community
)
7916 if (type
== bgp_show_type_community
)
7918 struct community
*com
= output_arg
;
7920 if (! ri
->attr
->community
||
7921 ! community_match (ri
->attr
->community
, com
))
7924 if (type
== bgp_show_type_community_exact
)
7926 struct community
*com
= output_arg
;
7928 if (! ri
->attr
->community
||
7929 ! community_cmp (ri
->attr
->community
, com
))
7932 if (type
== bgp_show_type_community_list
)
7934 struct community_list
*list
= output_arg
;
7936 if (! community_list_match (ri
->attr
->community
, list
))
7939 if (type
== bgp_show_type_community_list_exact
)
7941 struct community_list
*list
= output_arg
;
7943 if (! community_list_exact_match (ri
->attr
->community
, list
))
7946 if (type
== bgp_show_type_lcommunity
)
7948 struct lcommunity
*lcom
= output_arg
;
7950 if (! ri
->attr
->extra
|| ! ri
->attr
->extra
->lcommunity
||
7951 ! lcommunity_match (ri
->attr
->extra
->lcommunity
, lcom
))
7954 if (type
== bgp_show_type_lcommunity_list
)
7956 struct community_list
*list
= output_arg
;
7958 if (! ri
->attr
->extra
||
7959 ! lcommunity_list_match (ri
->attr
->extra
->lcommunity
, list
))
7962 if (type
== bgp_show_type_lcommunity_all
)
7964 if (! ri
->attr
->extra
|| ! ri
->attr
->extra
->lcommunity
)
7967 if (type
== bgp_show_type_dampend_paths
7968 || type
== bgp_show_type_damp_neighbor
)
7970 if (! CHECK_FLAG (ri
->flags
, BGP_INFO_DAMPED
)
7971 || CHECK_FLAG (ri
->flags
, BGP_INFO_HISTORY
))
7975 if (!use_json
&& header
)
7977 vty_out (vty
, "BGP table version is %" PRIu64
", local router ID is %s%s", table
->version
, inet_ntoa (bgp
->router_id
), VTY_NEWLINE
);
7978 vty_out (vty
, BGP_SHOW_SCODE_HEADER
, VTY_NEWLINE
, VTY_NEWLINE
);
7979 vty_out (vty
, BGP_SHOW_OCODE_HEADER
, VTY_NEWLINE
, VTY_NEWLINE
);
7980 if (type
== bgp_show_type_dampend_paths
7981 || type
== bgp_show_type_damp_neighbor
)
7982 vty_out (vty
, BGP_SHOW_DAMP_HEADER
, VTY_NEWLINE
);
7983 else if (type
== bgp_show_type_flap_statistics
7984 || type
== bgp_show_type_flap_neighbor
)
7985 vty_out (vty
, BGP_SHOW_FLAP_HEADER
, VTY_NEWLINE
);
7987 vty_out (vty
, BGP_SHOW_HEADER
, VTY_NEWLINE
);
7991 if (type
== bgp_show_type_dampend_paths
7992 || type
== bgp_show_type_damp_neighbor
)
7993 damp_route_vty_out (vty
, &rn
->p
, ri
, display
, SAFI_UNICAST
, use_json
, json_paths
);
7994 else if (type
== bgp_show_type_flap_statistics
7995 || type
== bgp_show_type_flap_neighbor
)
7996 flap_route_vty_out (vty
, &rn
->p
, ri
, display
, SAFI_UNICAST
, use_json
, json_paths
);
7998 route_vty_out (vty
, &rn
->p
, ri
, display
, SAFI_UNICAST
, json_paths
);
8008 sprintf(buf2
, "%s/%d", inet_ntop (p
->family
, &p
->u
.prefix
, buf
, BUFSIZ
), p
->prefixlen
);
8009 vty_out (vty
, "\"%s\": ", buf2
);
8010 vty_out (vty
, "%s", json_object_to_json_string (json_paths
));
8011 json_object_free (json_paths
);
8020 json_object_free (json_paths
);
8021 vty_out (vty
, " } }%s", VTY_NEWLINE
);
8025 /* No route is displayed */
8026 if (output_count
== 0)
8028 if (type
== bgp_show_type_normal
)
8029 vty_out (vty
, "No BGP prefixes displayed, %ld exist%s", total_count
, VTY_NEWLINE
);
8032 vty_out (vty
, "%sDisplayed %ld routes and %ld total paths%s",
8033 VTY_NEWLINE
, output_count
, total_count
, VTY_NEWLINE
);
8040 bgp_show (struct vty
*vty
, struct bgp
*bgp
, afi_t afi
, safi_t safi
,
8041 enum bgp_show_type type
, void *output_arg
, u_char use_json
)
8043 struct bgp_table
*table
;
8047 bgp
= bgp_get_default ();
8053 vty_out (vty
, "No BGP process is configured%s", VTY_NEWLINE
);
8056 /* use MPLS and ENCAP specific shows until they are merged */
8057 if (safi
== SAFI_MPLS_VPN
)
8059 return bgp_show_mpls_vpn(vty
, afi
, NULL
, type
, output_arg
,
8062 if (safi
== SAFI_ENCAP
)
8064 return bgp_show_encap(vty
, afi
, NULL
, type
, output_arg
,
8069 table
= bgp
->rib
[afi
][safi
];
8071 return bgp_show_table (vty
, bgp
, table
, type
, output_arg
,
8076 bgp_show_all_instances_routes_vty (struct vty
*vty
, afi_t afi
, safi_t safi
,
8079 struct listnode
*node
, *nnode
;
8081 struct bgp_table
*table
;
8085 vty_out (vty
, "{%s", VTY_NEWLINE
);
8087 for (ALL_LIST_ELEMENTS (bm
->bgp
, node
, nnode
, bgp
))
8092 vty_out (vty
, ",%s", VTY_NEWLINE
);
8096 vty_out(vty
, "\"%s\":", (bgp
->inst_type
== BGP_INSTANCE_TYPE_DEFAULT
)
8097 ? "Default" : bgp
->name
);
8101 vty_out (vty
, "%sInstance %s:%s",
8103 (bgp
->inst_type
== BGP_INSTANCE_TYPE_DEFAULT
)
8104 ? "Default" : bgp
->name
,
8107 table
= bgp
->rib
[afi
][safi
];
8108 bgp_show_table (vty
, bgp
, table
,
8109 bgp_show_type_normal
, NULL
, use_json
);
8114 vty_out (vty
, "}%s", VTY_NEWLINE
);
8117 /* Header of detailed BGP route information */
8119 route_vty_out_detail_header (struct vty
*vty
, struct bgp
*bgp
,
8120 struct bgp_node
*rn
,
8121 struct prefix_rd
*prd
, afi_t afi
, safi_t safi
,
8124 struct bgp_info
*ri
;
8127 struct listnode
*node
, *nnode
;
8128 char buf1
[INET6_ADDRSTRLEN
];
8129 char buf2
[INET6_ADDRSTRLEN
];
8134 int no_advertise
= 0;
8137 json_object
*json_adv_to
= NULL
;
8143 json_object_string_add(json
, "prefix", inet_ntop (p
->family
, &p
->u
.prefix
, buf2
, INET6_ADDRSTRLEN
));
8144 json_object_int_add(json
, "prefixlen", p
->prefixlen
);
8148 if (p
->family
== AF_ETHERNET
)
8149 prefix2str (p
, buf2
, INET6_ADDRSTRLEN
);
8151 inet_ntop (p
->family
, &p
->u
.prefix
, buf2
, INET6_ADDRSTRLEN
);
8152 vty_out (vty
, "BGP routing table entry for %s%s%s/%d%s",
8153 ((safi
== SAFI_MPLS_VPN
|| safi
== SAFI_ENCAP
|| safi
== SAFI_EVPN
) ?
8154 prefix_rd2str (prd
, buf1
, RD_ADDRSTRLEN
) : ""),
8155 ((safi
== SAFI_MPLS_VPN
) || (safi
== SAFI_EVPN
)) ? ":" : "",
8157 p
->prefixlen
, VTY_NEWLINE
);
8159 if (bgp_labeled_safi(safi
))
8161 vty_out(vty
, "Local label: ");
8162 if (!bgp_is_valid_label(rn
->local_label
))
8163 vty_out(vty
, "not allocated%s", VTY_NEWLINE
);
8166 uint32_t label
= label_pton(rn
->local_label
);
8167 vty_out(vty
, "%d%s", label
, VTY_NEWLINE
);
8172 for (ri
= rn
->info
; ri
; ri
= ri
->next
)
8175 if (CHECK_FLAG (ri
->flags
, BGP_INFO_SELECTED
))
8178 if (ri
->extra
&& ri
->extra
->suppress
)
8180 if (ri
->attr
->community
!= NULL
)
8182 if (community_include (ri
->attr
->community
, COMMUNITY_NO_ADVERTISE
))
8184 if (community_include (ri
->attr
->community
, COMMUNITY_NO_EXPORT
))
8186 if (community_include (ri
->attr
->community
, COMMUNITY_LOCAL_AS
))
8194 vty_out (vty
, "Paths: (%d available", count
);
8197 vty_out (vty
, ", best #%d", best
);
8198 if (safi
== SAFI_UNICAST
)
8199 vty_out (vty
, ", table %s",
8200 (bgp
->inst_type
== BGP_INSTANCE_TYPE_DEFAULT
)
8201 ? "Default-IP-Routing-Table" : bgp
->name
);
8204 vty_out (vty
, ", no best path");
8207 vty_out (vty
, ", not advertised to any peer");
8209 vty_out (vty
, ", not advertised to EBGP peer");
8211 vty_out (vty
, ", not advertised outside local AS");
8214 vty_out (vty
, ", Advertisements suppressed by an aggregate.");
8215 vty_out (vty
, ")%s", VTY_NEWLINE
);
8218 /* If we are not using addpath then we can display Advertised to and that will
8219 * show what peers we advertised the bestpath to. If we are using addpath
8220 * though then we must display Advertised to on a path-by-path basis. */
8221 if (!bgp
->addpath_tx_used
[afi
][safi
])
8223 for (ALL_LIST_ELEMENTS (bgp
->peer
, node
, nnode
, peer
))
8225 if (bgp_adj_out_lookup (peer
, rn
, 0))
8227 if (json
&& !json_adv_to
)
8228 json_adv_to
= json_object_new_object();
8230 route_vty_out_advertised_to(vty
, peer
, &first
,
8231 " Advertised to non peer-group peers:\n ",
8240 json_object_object_add(json
, "advertisedTo", json_adv_to
);
8246 vty_out (vty
, " Not advertised to any peer");
8247 vty_out (vty
, "%s", VTY_NEWLINE
);
8252 /* Display specified route of BGP table. */
8254 bgp_show_route_in_table (struct vty
*vty
, struct bgp
*bgp
,
8255 struct bgp_table
*rib
, const char *ip_str
,
8256 afi_t afi
, safi_t safi
, struct prefix_rd
*prd
,
8257 int prefix_check
, enum bgp_path_type pathtype
,
8263 struct prefix match
;
8264 struct bgp_node
*rn
;
8265 struct bgp_node
*rm
;
8266 struct bgp_info
*ri
;
8267 struct bgp_table
*table
;
8268 json_object
*json
= NULL
;
8269 json_object
*json_paths
= NULL
;
8271 /* Check IP address argument. */
8272 ret
= str2prefix (ip_str
, &match
);
8275 vty_out (vty
, "address is malformed%s", VTY_NEWLINE
);
8279 match
.family
= afi2family (afi
);
8283 json
= json_object_new_object();
8284 json_paths
= json_object_new_array();
8287 if (safi
== SAFI_MPLS_VPN
|| safi
== SAFI_ENCAP
|| safi
== SAFI_EVPN
)
8289 for (rn
= bgp_table_top (rib
); rn
; rn
= bgp_route_next (rn
))
8291 if (prd
&& memcmp (rn
->p
.u
.val
, prd
->val
, 8) != 0)
8294 if ((table
= rn
->info
) != NULL
)
8298 if ((rm
= bgp_node_match (table
, &match
)) != NULL
)
8300 if (prefix_check
&& rm
->p
.prefixlen
!= match
.prefixlen
)
8302 bgp_unlock_node (rm
);
8306 for (ri
= rm
->info
; ri
; ri
= ri
->next
)
8310 route_vty_out_detail_header (vty
, bgp
, rm
, (struct prefix_rd
*)&rn
->p
,
8311 AFI_IP
, safi
, json
);
8316 if (pathtype
== BGP_PATH_ALL
||
8317 (pathtype
== BGP_PATH_BESTPATH
&& CHECK_FLAG (ri
->flags
, BGP_INFO_SELECTED
)) ||
8318 (pathtype
== BGP_PATH_MULTIPATH
&&
8319 (CHECK_FLAG (ri
->flags
, BGP_INFO_MULTIPATH
) || CHECK_FLAG (ri
->flags
, BGP_INFO_SELECTED
))))
8320 route_vty_out_detail (vty
, bgp
, &rm
->p
, ri
, AFI_IP
, safi
, json_paths
);
8323 bgp_unlock_node (rm
);
8332 if ((rn
= bgp_node_match (rib
, &match
)) != NULL
)
8334 if (! prefix_check
|| rn
->p
.prefixlen
== match
.prefixlen
)
8336 for (ri
= rn
->info
; ri
; ri
= ri
->next
)
8340 route_vty_out_detail_header (vty
, bgp
, rn
, NULL
, afi
, safi
, json
);
8345 if (pathtype
== BGP_PATH_ALL
||
8346 (pathtype
== BGP_PATH_BESTPATH
&& CHECK_FLAG (ri
->flags
, BGP_INFO_SELECTED
)) ||
8347 (pathtype
== BGP_PATH_MULTIPATH
&&
8348 (CHECK_FLAG (ri
->flags
, BGP_INFO_MULTIPATH
) || CHECK_FLAG (ri
->flags
, BGP_INFO_SELECTED
))))
8349 route_vty_out_detail (vty
, bgp
, &rn
->p
, ri
, afi
, safi
, json_paths
);
8353 bgp_unlock_node (rn
);
8360 json_object_object_add(json
, "paths", json_paths
);
8362 vty_out (vty
, "%s%s", json_object_to_json_string_ext(json
, JSON_C_TO_STRING_PRETTY
), VTY_NEWLINE
);
8363 json_object_free(json
);
8369 vty_out (vty
, "%% Network not in table%s", VTY_NEWLINE
);
8377 /* Display specified route of Main RIB */
8379 bgp_show_route (struct vty
*vty
, struct bgp
*bgp
, const char *ip_str
,
8380 afi_t afi
, safi_t safi
, struct prefix_rd
*prd
,
8381 int prefix_check
, enum bgp_path_type pathtype
,
8385 bgp
= bgp_get_default ();
8387 return bgp_show_route_in_table (vty
, bgp
, bgp
->rib
[afi
][safi
], ip_str
,
8388 afi
, safi
, prd
, prefix_check
, pathtype
,
8393 bgp_show_lcommunity (struct vty
*vty
, struct bgp
*bgp
, int argc
,
8394 struct cmd_token
**argv
, afi_t afi
, safi_t safi
, u_char uj
)
8396 struct lcommunity
*lcom
;
8402 b
= buffer_new (1024);
8403 for (i
= 0; i
< argc
; i
++)
8406 buffer_putc (b
, ' ');
8409 if (strmatch (argv
[i
]->text
, "AA:BB:CC"))
8412 buffer_putstr (b
, argv
[i
]->arg
);
8416 buffer_putc (b
, '\0');
8418 str
= buffer_getstr (b
);
8421 lcom
= lcommunity_str2com (str
);
8422 XFREE (MTYPE_TMP
, str
);
8425 vty_out (vty
, "%% Large-community malformed%s", VTY_NEWLINE
);
8429 return bgp_show (vty
, bgp
, afi
, safi
, bgp_show_type_lcommunity
, lcom
, uj
);
8433 bgp_show_lcommunity_list (struct vty
*vty
, struct bgp
*bgp
, const char *lcom
,
8434 afi_t afi
, safi_t safi
, u_char uj
)
8436 struct community_list
*list
;
8438 list
= community_list_lookup (bgp_clist
, lcom
, LARGE_COMMUNITY_LIST_MASTER
);
8441 vty_out (vty
, "%% %s is not a valid large-community-list name%s", lcom
,
8446 return bgp_show (vty
, bgp
, afi
, safi
, bgp_show_type_lcommunity_list
, list
, uj
);
8449 DEFUN (show_ip_bgp_large_community_list
,
8450 show_ip_bgp_large_community_list_cmd
,
8451 "show [ip] bgp [<view|vrf> WORD] [<ipv4|ipv6> [<unicast|multicast|vpn|encap|labeled-unicast>]] large-community-list <(1-500)|WORD> [json]",
8455 BGP_INSTANCE_HELP_STR
8458 "Address Family modifier\n"
8459 "Address Family modifier\n"
8460 "Address Family modifier\n"
8461 "Address Family modifier\n"
8462 "Address Family modifier\n"
8463 "Display routes matching the large-community-list\n"
8464 "large-community-list number\n"
8465 "large-community-list name\n"
8469 afi_t afi
= AFI_IP6
;
8470 safi_t safi
= SAFI_UNICAST
;
8473 if (argv_find (argv
, argc
, "ip", &idx
))
8475 if (argv_find (argv
, argc
, "view", &idx
) || argv_find (argv
, argc
, "vrf", &idx
))
8476 vrf
= argv
[++idx
]->arg
;
8477 if (argv_find (argv
, argc
, "ipv4", &idx
) || argv_find (argv
, argc
, "ipv6", &idx
))
8479 afi
= strmatch(argv
[idx
]->text
, "ipv6") ? AFI_IP6
: AFI_IP
;
8480 if (argv_find (argv
, argc
, "unicast", &idx
) || argv_find (argv
, argc
, "multicast", &idx
))
8481 safi
= bgp_vty_safi_from_arg (argv
[idx
]->text
);
8484 int uj
= use_json (argc
, argv
);
8486 struct bgp
*bgp
= bgp_lookup_by_name (vrf
);
8489 vty_out (vty
, "Can't find BGP instance %s%s", vrf
, VTY_NEWLINE
);
8493 argv_find (argv
, argc
, "large-community-list", &idx
);
8494 return bgp_show_lcommunity_list (vty
, bgp
, argv
[idx
+1]->arg
, afi
, safi
, uj
);
8496 DEFUN (show_ip_bgp_large_community
,
8497 show_ip_bgp_large_community_cmd
,
8498 "show [ip] bgp [<view|vrf> WORD] [<ipv4|ipv6> [<unicast|multicast|vpn|encap|labeled-unicast>]] large-community [AA:BB:CC] [json]",
8502 BGP_INSTANCE_HELP_STR
8505 "Address Family modifier\n"
8506 "Address Family modifier\n"
8507 "Address Family modifier\n"
8508 "Address Family modifier\n"
8509 "Address Family modifier\n"
8510 "Display routes matching the large-communities\n"
8511 "List of large-community numbers\n"
8515 afi_t afi
= AFI_IP6
;
8516 safi_t safi
= SAFI_UNICAST
;
8519 if (argv_find (argv
, argc
, "ip", &idx
))
8521 if (argv_find (argv
, argc
, "view", &idx
) || argv_find (argv
, argc
, "vrf", &idx
))
8522 vrf
= argv
[++idx
]->arg
;
8523 if (argv_find (argv
, argc
, "ipv4", &idx
) || argv_find (argv
, argc
, "ipv6", &idx
))
8525 afi
= strmatch(argv
[idx
]->text
, "ipv6") ? AFI_IP6
: AFI_IP
;
8526 if (argv_find (argv
, argc
, "unicast", &idx
) || argv_find (argv
, argc
, "multicast", &idx
))
8527 safi
= bgp_vty_safi_from_arg (argv
[idx
]->text
);
8530 int uj
= use_json (argc
, argv
);
8532 struct bgp
*bgp
= bgp_lookup_by_name (vrf
);
8535 vty_out (vty
, "Can't find BGP instance %s%s", vrf
, VTY_NEWLINE
);
8539 if (argv_find (argv
, argc
, "AA:BB:CC", &idx
))
8540 return bgp_show_lcommunity (vty
, bgp
, argc
, argv
, afi
, safi
, uj
);
8542 return bgp_show (vty
, bgp
, afi
, safi
, bgp_show_type_lcommunity_all
, NULL
, uj
);
8545 static int bgp_table_stats (struct vty
*vty
, struct bgp
*bgp
, afi_t afi
, safi_t safi
);
8547 /* BGP route print out function. */
8550 "show [ip] bgp [<view|vrf> WORD] ["BGP_AFI_CMD_STR
" ["BGP_SAFI_CMD_STR
"]]\
8553 |dampening <flap-statistics|dampened-paths|parameters>\
8558 |community [<AA:NN|local-AS|no-advertise|no-export> [exact-match]]\
8559 |community-list <(1-500)|WORD> [exact-match]\
8560 |A.B.C.D/M longer-prefixes\
8561 |X:X::X:X/M longer-prefixes>\
8566 BGP_INSTANCE_HELP_STR
8569 "Display only routes with non-natural netmasks\n"
8570 "Display detailed information about dampening\n"
8571 "Display flap statistics of routes\n"
8572 "Display paths suppressed due to dampening\n"
8573 "Display detail of configured dampening parameters\n"
8574 "Display routes matching the route-map\n"
8575 "A route-map to match on\n"
8576 "Display routes conforming to the prefix-list\n"
8577 "Prefix-list name\n"
8578 "Display routes conforming to the filter-list\n"
8579 "Regular expression access list name\n"
8580 "BGP RIB advertisement statistics\n"
8581 "Display routes matching the communities\n"
8583 "Do not send outside local AS (well-known community)\n"
8584 "Do not advertise to any peer (well-known community)\n"
8585 "Do not export to next AS (well-known community)\n"
8586 "Exact match of the communities\n"
8587 "Display routes matching the community-list\n"
8588 "community-list number\n"
8589 "community-list name\n"
8590 "Exact match of the communities\n"
8592 "Display route and more specific routes\n"
8594 "Display route and more specific routes\n"
8597 afi_t afi
= AFI_IP6
;
8598 safi_t safi
= SAFI_UNICAST
;
8599 int exact_match
= 0;
8600 enum bgp_show_type sh_type
= bgp_show_type_normal
;
8601 struct bgp
*bgp
= NULL
;
8604 bgp_vty_find_and_parse_afi_safi_bgp (vty
, argv
, argc
, &idx
, &afi
, &safi
, &bgp
);
8608 int uj
= use_json (argc
, argv
);
8611 if (argv_find(argv
, argc
, "cidr-only", &idx
))
8612 return bgp_show (vty
, bgp
, afi
, safi
, bgp_show_type_cidr_only
, NULL
, uj
);
8614 if (argv_find(argv
, argc
, "dampening", &idx
))
8616 if (argv_find (argv
, argc
, "dampened-paths", &idx
))
8617 return bgp_show (vty
, bgp
, afi
, safi
, bgp_show_type_dampend_paths
, NULL
, uj
);
8618 else if (argv_find (argv
, argc
, "flap-statistics", &idx
))
8619 return bgp_show (vty
, bgp
, afi
, safi
, bgp_show_type_flap_statistics
, NULL
, uj
);
8620 else if (argv_find (argv
, argc
, "parameters", &idx
))
8621 return bgp_show_dampening_parameters (vty
, afi
, safi
);
8624 if (argv_find(argv
, argc
, "prefix-list", &idx
))
8625 return bgp_show_prefix_list (vty
, bgp
, argv
[idx
+ 1]->arg
, afi
, safi
, bgp_show_type_prefix_list
);
8627 if (argv_find(argv
, argc
, "filter-list", &idx
))
8628 return bgp_show_filter_list (vty
, bgp
, argv
[idx
+ 1]->arg
, afi
, safi
, bgp_show_type_filter_list
);
8630 if (argv_find(argv
, argc
, "statistics", &idx
))
8631 return bgp_table_stats (vty
, bgp
, afi
, safi
);
8633 if (argv_find(argv
, argc
, "route-map", &idx
))
8634 return bgp_show_route_map (vty
, bgp
, argv
[idx
+ 1]->arg
, afi
, safi
, bgp_show_type_route_map
);
8636 if (argv_find(argv
, argc
, "community", &idx
))
8638 /* show a specific community */
8639 if (argv_find (argv
, argc
, "local-AS", &idx
) ||
8640 argv_find (argv
, argc
, "no-advertise", &idx
) ||
8641 argv_find (argv
, argc
, "no-export", &idx
))
8643 if (argv_find (argv
, argc
, "exact_match", &idx
))
8645 return bgp_show_community (vty
, bgp
, argc
, argv
, exact_match
, afi
, safi
);
8647 /* show all communities */
8649 return bgp_show (vty
, bgp
, afi
, safi
, bgp_show_type_community_all
, NULL
, uj
);
8652 if (argv_find(argv
, argc
, "community-list", &idx
))
8654 const char *clist_number_or_name
= argv
[++idx
]->arg
;
8655 if (++idx
< argc
&& strmatch (argv
[idx
]->text
, "exact-match"))
8657 return bgp_show_community_list (vty
, bgp
, clist_number_or_name
, exact_match
, afi
, safi
);
8660 if (argv_find(argv
, argc
, "A.B.C.D/M", &idx
) || argv_find(argv
, argc
, "X:X::X:X/M", &idx
))
8661 return bgp_show_prefix_longer (vty
, bgp
, argv
[idx
]->arg
, afi
, safi
, bgp_show_type_prefix_longer
);
8663 if (safi
== SAFI_MPLS_VPN
)
8664 return bgp_show_mpls_vpn (vty
, afi
, NULL
, bgp_show_type_normal
, NULL
, 0, uj
);
8665 else if (safi
== SAFI_ENCAP
)
8666 return bgp_show_encap (vty
, afi
, NULL
, bgp_show_type_normal
, NULL
, 0);
8668 return bgp_show (vty
, bgp
, afi
, safi
, sh_type
, NULL
, uj
);
8671 DEFUN (show_ip_bgp_route
,
8672 show_ip_bgp_route_cmd
,
8673 "show [ip] bgp [<view|vrf> WORD] ["BGP_AFI_CMD_STR
" ["BGP_SAFI_CMD_STR
"]]"
8674 "<A.B.C.D|A.B.C.D/M|X:X::X:X|X:X::X:X/M> [<bestpath|multipath>] [json]",
8678 BGP_INSTANCE_HELP_STR
8681 "Network in the BGP routing table to display\n"
8683 "Network in the BGP routing table to display\n"
8685 "Display only the bestpath\n"
8686 "Display only multipaths\n"
8689 int prefix_check
= 0;
8691 afi_t afi
= AFI_IP6
;
8692 safi_t safi
= SAFI_UNICAST
;
8693 char *prefix
= NULL
;
8694 struct bgp
*bgp
= NULL
;
8695 enum bgp_path_type path_type
;
8696 u_char uj
= use_json(argc
, argv
);
8700 bgp_vty_find_and_parse_afi_safi_bgp (vty
, argv
, argc
, &idx
, &afi
, &safi
, &bgp
);
8706 vty_out (vty
, "Specified 'all' vrf's but this command currently only works per view/vrf%s", VTY_NEWLINE
);
8710 /* <A.B.C.D|A.B.C.D/M|X:X::X:X|X:X::X:X/M> */
8711 if (argv_find (argv
, argc
, "A.B.C.D", &idx
) || argv_find (argv
, argc
, "X:X::X:X", &idx
))
8713 else if (argv_find (argv
, argc
, "A.B.C.D/M", &idx
) || argv_find (argv
, argc
, "X:X::X:X/M", &idx
))
8716 if ((argv
[idx
]->type
== IPV6_TKN
|| argv
[idx
]->type
== IPV6_PREFIX_TKN
) && afi
!= AFI_IP6
)
8718 vty_out (vty
, "%% Cannot specify IPv6 address or prefix with IPv4 AFI%s", VTY_NEWLINE
);
8721 if ((argv
[idx
]->type
== IPV4_TKN
|| argv
[idx
]->type
== IPV4_PREFIX_TKN
) && afi
!= AFI_IP
)
8723 vty_out (vty
, "%% Cannot specify IPv4 address or prefix with IPv6 AFI%s", VTY_NEWLINE
);
8727 prefix
= argv
[idx
]->arg
;
8729 /* [<bestpath|multipath>] */
8730 if (argv_find (argv
, argc
, "bestpath", &idx
))
8731 path_type
= BGP_PATH_BESTPATH
;
8732 else if (argv_find (argv
, argc
, "multipath", &idx
))
8733 path_type
= BGP_PATH_MULTIPATH
;
8735 path_type
= BGP_PATH_ALL
;
8737 return bgp_show_route (vty
, bgp
, prefix
, afi
, safi
, NULL
, prefix_check
, path_type
, uj
);
8740 DEFUN (show_ip_bgp_regexp
,
8741 show_ip_bgp_regexp_cmd
,
8742 "show [ip] bgp [<view|vrf> WORD] ["BGP_AFI_CMD_STR
" ["BGP_SAFI_CMD_STR
"]] regexp REGEX...",
8746 BGP_INSTANCE_HELP_STR
8749 "Display routes matching the AS path regular expression\n"
8750 "A regular-expression to match the BGP AS paths\n")
8752 afi_t afi
= AFI_IP6
;
8753 safi_t safi
= SAFI_UNICAST
;
8754 struct bgp
*bgp
= NULL
;
8757 bgp_vty_find_and_parse_afi_safi_bgp (vty
, argv
, argc
, &idx
, &afi
, &safi
, &bgp
);
8761 // get index of regex
8762 argv_find (argv
, argc
, "regexp", &idx
);
8765 char *regstr
= argv_concat (argv
, argc
, idx
);
8766 int rc
= bgp_show_regexp (vty
, (const char *) regstr
, afi
, safi
, bgp_show_type_regexp
);
8767 XFREE (MTYPE_TMP
, regstr
);
8771 DEFUN (show_ip_bgp_instance_all
,
8772 show_ip_bgp_instance_all_cmd
,
8773 "show [ip] bgp <view|vrf> all ["BGP_AFI_CMD_STR
" ["BGP_SAFI_CMD_STR
"]] [json]",
8777 BGP_INSTANCE_ALL_HELP_STR
8783 safi_t safi
= SAFI_UNICAST
;
8784 struct bgp
*bgp
= NULL
;
8787 bgp_vty_find_and_parse_afi_safi_bgp (vty
, argv
, argc
, &idx
, &afi
, &safi
, &bgp
);
8791 int uj
= use_json (argc
, argv
);
8794 bgp_show_all_instances_routes_vty (vty
, afi
, safi
, uj
);
8799 bgp_show_regexp (struct vty
*vty
, const char *regstr
, afi_t afi
,
8800 safi_t safi
, enum bgp_show_type type
)
8805 regex
= bgp_regcomp (regstr
);
8808 vty_out (vty
, "Can't compile regexp %s%s", regstr
, VTY_NEWLINE
);
8812 rc
= bgp_show (vty
, NULL
, afi
, safi
, type
, regex
, 0);
8813 bgp_regex_free (regex
);
8818 bgp_show_prefix_list (struct vty
*vty
, struct bgp
*bgp
,
8819 const char *prefix_list_str
, afi_t afi
,
8820 safi_t safi
, enum bgp_show_type type
)
8822 struct prefix_list
*plist
;
8824 plist
= prefix_list_lookup (afi
, prefix_list_str
);
8827 vty_out (vty
, "%% %s is not a valid prefix-list name%s",
8828 prefix_list_str
, VTY_NEWLINE
);
8832 return bgp_show (vty
, bgp
, afi
, safi
, type
, plist
, 0);
8836 bgp_show_filter_list (struct vty
*vty
, struct bgp
*bgp
,
8837 const char *filter
, afi_t afi
,
8838 safi_t safi
, enum bgp_show_type type
)
8840 struct as_list
*as_list
;
8842 as_list
= as_list_lookup (filter
);
8843 if (as_list
== NULL
)
8845 vty_out (vty
, "%% %s is not a valid AS-path access-list name%s", filter
, VTY_NEWLINE
);
8849 return bgp_show (vty
, bgp
, afi
, safi
, type
, as_list
, 0);
8853 bgp_show_route_map (struct vty
*vty
, struct bgp
*bgp
,
8854 const char *rmap_str
, afi_t afi
,
8855 safi_t safi
, enum bgp_show_type type
)
8857 struct route_map
*rmap
;
8859 rmap
= route_map_lookup_by_name (rmap_str
);
8862 vty_out (vty
, "%% %s is not a valid route-map name%s",
8863 rmap_str
, VTY_NEWLINE
);
8867 return bgp_show (vty
, bgp
, afi
, safi
, type
, rmap
, 0);
8871 bgp_show_community (struct vty
*vty
, struct bgp
*bgp
, int argc
,
8872 struct cmd_token
**argv
, int exact
, afi_t afi
, safi_t safi
)
8874 struct community
*com
;
8881 b
= buffer_new (1024);
8882 for (i
= 0; i
< argc
; i
++)
8885 buffer_putc (b
, ' ');
8888 if ((strcmp (argv
[i
]->arg
, "unicast") == 0) || (strcmp (argv
[i
]->arg
, "multicast") == 0))
8893 buffer_putstr (b
, argv
[i
]->arg
);
8895 buffer_putc (b
, '\0');
8897 str
= buffer_getstr (b
);
8900 com
= community_str2com (str
);
8901 XFREE (MTYPE_TMP
, str
);
8904 vty_out (vty
, "%% Community malformed: %s", VTY_NEWLINE
);
8908 ret
= bgp_show (vty
, bgp
, afi
, safi
,
8909 (exact
? bgp_show_type_community_exact
:
8910 bgp_show_type_community
), com
, 0);
8911 community_free (com
);
8917 bgp_show_community_list (struct vty
*vty
, struct bgp
*bgp
,
8918 const char *com
, int exact
,
8919 afi_t afi
, safi_t safi
)
8921 struct community_list
*list
;
8923 list
= community_list_lookup (bgp_clist
, com
, COMMUNITY_LIST_MASTER
);
8926 vty_out (vty
, "%% %s is not a valid community-list name%s", com
,
8931 return bgp_show (vty
, bgp
, afi
, safi
,
8932 (exact
? bgp_show_type_community_list_exact
:
8933 bgp_show_type_community_list
), list
, 0);
8937 bgp_show_prefix_longer (struct vty
*vty
, struct bgp
*bgp
,
8938 const char *prefix
, afi_t afi
,
8939 safi_t safi
, enum bgp_show_type type
)
8946 ret
= str2prefix (prefix
, p
);
8949 vty_out (vty
, "%% Malformed Prefix%s", VTY_NEWLINE
);
8953 ret
= bgp_show (vty
, bgp
, afi
, safi
, type
, p
, 0);
8958 static struct peer
*
8959 peer_lookup_in_view (struct vty
*vty
, struct bgp
*bgp
,
8960 const char *ip_str
, u_char use_json
)
8966 /* Get peer sockunion. */
8967 ret
= str2sockunion (ip_str
, &su
);
8970 peer
= peer_lookup_by_conf_if (bgp
, ip_str
);
8973 peer
= peer_lookup_by_hostname(bgp
, ip_str
);
8979 json_object
*json_no
= NULL
;
8980 json_no
= json_object_new_object();
8981 json_object_string_add(json_no
, "malformedAddressOrName", ip_str
);
8982 vty_out (vty
, "%s%s", json_object_to_json_string(json_no
), VTY_NEWLINE
);
8983 json_object_free(json_no
);
8986 vty_out (vty
, "%% Malformed address or name: %s%s", ip_str
, VTY_NEWLINE
);
8993 /* Peer structure lookup. */
8994 peer
= peer_lookup (bgp
, &su
);
8999 json_object
*json_no
= NULL
;
9000 json_no
= json_object_new_object();
9001 json_object_string_add(json_no
, "warning","No such neighbor");
9002 vty_out (vty
, "%s%s", json_object_to_json_string(json_no
), VTY_NEWLINE
);
9003 json_object_free(json_no
);
9006 vty_out (vty
, "No such neighbor%s", VTY_NEWLINE
);
9015 BGP_STATS_MAXBITLEN
= 0,
9019 BGP_STATS_UNAGGREGATEABLE
,
9020 BGP_STATS_MAX_AGGREGATEABLE
,
9021 BGP_STATS_AGGREGATES
,
9023 BGP_STATS_ASPATH_COUNT
,
9024 BGP_STATS_ASPATH_MAXHOPS
,
9025 BGP_STATS_ASPATH_TOTHOPS
,
9026 BGP_STATS_ASPATH_MAXSIZE
,
9027 BGP_STATS_ASPATH_TOTSIZE
,
9028 BGP_STATS_ASN_HIGHEST
,
9032 static const char *table_stats_strs
[] =
9034 [BGP_STATS_PREFIXES
] = "Total Prefixes",
9035 [BGP_STATS_TOTPLEN
] = "Average prefix length",
9036 [BGP_STATS_RIB
] = "Total Advertisements",
9037 [BGP_STATS_UNAGGREGATEABLE
] = "Unaggregateable prefixes",
9038 [BGP_STATS_MAX_AGGREGATEABLE
] = "Maximum aggregateable prefixes",
9039 [BGP_STATS_AGGREGATES
] = "BGP Aggregate advertisements",
9040 [BGP_STATS_SPACE
] = "Address space advertised",
9041 [BGP_STATS_ASPATH_COUNT
] = "Advertisements with paths",
9042 [BGP_STATS_ASPATH_MAXHOPS
] = "Longest AS-Path (hops)",
9043 [BGP_STATS_ASPATH_MAXSIZE
] = "Largest AS-Path (bytes)",
9044 [BGP_STATS_ASPATH_TOTHOPS
] = "Average AS-Path length (hops)",
9045 [BGP_STATS_ASPATH_TOTSIZE
] = "Average AS-Path size (bytes)",
9046 [BGP_STATS_ASN_HIGHEST
] = "Highest public ASN",
9047 [BGP_STATS_MAX
] = NULL
,
9050 struct bgp_table_stats
9052 struct bgp_table
*table
;
9053 unsigned long long counts
[BGP_STATS_MAX
];
9057 #define TALLY_SIGFIG 100000
9058 static unsigned long
9059 ravg_tally (unsigned long count
, unsigned long oldavg
, unsigned long newval
)
9061 unsigned long newtot
= (count
-1) * oldavg
+ (newval
* TALLY_SIGFIG
);
9062 unsigned long res
= (newtot
* TALLY_SIGFIG
) / count
;
9063 unsigned long ret
= newtot
/ count
;
9065 if ((res
% TALLY_SIGFIG
) > (TALLY_SIGFIG
/2))
9073 bgp_table_stats_walker (struct thread
*t
)
9075 struct bgp_node
*rn
;
9076 struct bgp_node
*top
;
9077 struct bgp_table_stats
*ts
= THREAD_ARG (t
);
9078 unsigned int space
= 0;
9080 if (!(top
= bgp_table_top (ts
->table
)))
9083 switch (top
->p
.family
)
9086 space
= IPV4_MAX_BITLEN
;
9089 space
= IPV6_MAX_BITLEN
;
9093 ts
->counts
[BGP_STATS_MAXBITLEN
] = space
;
9095 for (rn
= top
; rn
; rn
= bgp_route_next (rn
))
9097 struct bgp_info
*ri
;
9098 struct bgp_node
*prn
= bgp_node_parent_nolock (rn
);
9099 unsigned int rinum
= 0;
9107 ts
->counts
[BGP_STATS_PREFIXES
]++;
9108 ts
->counts
[BGP_STATS_TOTPLEN
] += rn
->p
.prefixlen
;
9111 ts
->counts
[BGP_STATS_AVGPLEN
]
9112 = ravg_tally (ts
->counts
[BGP_STATS_PREFIXES
],
9113 ts
->counts
[BGP_STATS_AVGPLEN
],
9117 /* check if the prefix is included by any other announcements */
9118 while (prn
&& !prn
->info
)
9119 prn
= bgp_node_parent_nolock (prn
);
9121 if (prn
== NULL
|| prn
== top
)
9123 ts
->counts
[BGP_STATS_UNAGGREGATEABLE
]++;
9124 /* announced address space */
9126 ts
->counts
[BGP_STATS_SPACE
] += 1 << (space
- rn
->p
.prefixlen
);
9129 ts
->counts
[BGP_STATS_MAX_AGGREGATEABLE
]++;
9131 for (ri
= rn
->info
; ri
; ri
= ri
->next
)
9134 ts
->counts
[BGP_STATS_RIB
]++;
9137 (CHECK_FLAG (ri
->attr
->flag
,
9138 ATTR_FLAG_BIT (BGP_ATTR_ATOMIC_AGGREGATE
))))
9139 ts
->counts
[BGP_STATS_AGGREGATES
]++;
9142 if (ri
->attr
&& ri
->attr
->aspath
)
9144 unsigned int hops
= aspath_count_hops (ri
->attr
->aspath
);
9145 unsigned int size
= aspath_size (ri
->attr
->aspath
);
9146 as_t highest
= aspath_highest (ri
->attr
->aspath
);
9148 ts
->counts
[BGP_STATS_ASPATH_COUNT
]++;
9150 if (hops
> ts
->counts
[BGP_STATS_ASPATH_MAXHOPS
])
9151 ts
->counts
[BGP_STATS_ASPATH_MAXHOPS
] = hops
;
9153 if (size
> ts
->counts
[BGP_STATS_ASPATH_MAXSIZE
])
9154 ts
->counts
[BGP_STATS_ASPATH_MAXSIZE
] = size
;
9156 ts
->counts
[BGP_STATS_ASPATH_TOTHOPS
] += hops
;
9157 ts
->counts
[BGP_STATS_ASPATH_TOTSIZE
] += size
;
9159 ts
->counts
[BGP_STATS_ASPATH_AVGHOPS
]
9160 = ravg_tally (ts
->counts
[BGP_STATS_ASPATH_COUNT
],
9161 ts
->counts
[BGP_STATS_ASPATH_AVGHOPS
],
9163 ts
->counts
[BGP_STATS_ASPATH_AVGSIZE
]
9164 = ravg_tally (ts
->counts
[BGP_STATS_ASPATH_COUNT
],
9165 ts
->counts
[BGP_STATS_ASPATH_AVGSIZE
],
9168 if (highest
> ts
->counts
[BGP_STATS_ASN_HIGHEST
])
9169 ts
->counts
[BGP_STATS_ASN_HIGHEST
] = highest
;
9177 bgp_table_stats (struct vty
*vty
, struct bgp
*bgp
, afi_t afi
, safi_t safi
)
9179 struct bgp_table_stats ts
;
9182 if (!bgp
->rib
[afi
][safi
])
9184 vty_out (vty
, "%% No RIB exist's for the AFI(%d)/SAFI(%d)%s",
9185 afi
, safi
, VTY_NEWLINE
);
9189 memset (&ts
, 0, sizeof (ts
));
9190 ts
.table
= bgp
->rib
[afi
][safi
];
9191 thread_execute (bm
->master
, bgp_table_stats_walker
, &ts
, 0);
9193 vty_out (vty
, "BGP %s RIB statistics%s%s",
9194 afi_safi_print (afi
, safi
), VTY_NEWLINE
, VTY_NEWLINE
);
9196 for (i
= 0; i
< BGP_STATS_MAX
; i
++)
9198 if (!table_stats_strs
[i
])
9204 case BGP_STATS_ASPATH_AVGHOPS
:
9205 case BGP_STATS_ASPATH_AVGSIZE
:
9206 case BGP_STATS_AVGPLEN
:
9207 vty_out (vty
, "%-30s: ", table_stats_strs
[i
]);
9208 vty_out (vty
, "%12.2f",
9209 (float)ts
.counts
[i
] / (float)TALLY_SIGFIG
);
9212 case BGP_STATS_ASPATH_TOTHOPS
:
9213 case BGP_STATS_ASPATH_TOTSIZE
:
9214 vty_out (vty
, "%-30s: ", table_stats_strs
[i
]);
9215 vty_out (vty
, "%12.2f",
9217 (float)ts
.counts
[i
] /
9218 (float)ts
.counts
[BGP_STATS_ASPATH_COUNT
]
9221 case BGP_STATS_TOTPLEN
:
9222 vty_out (vty
, "%-30s: ", table_stats_strs
[i
]);
9223 vty_out (vty
, "%12.2f",
9225 (float)ts
.counts
[i
] /
9226 (float)ts
.counts
[BGP_STATS_PREFIXES
]
9229 case BGP_STATS_SPACE
:
9230 vty_out (vty
, "%-30s: ", table_stats_strs
[i
]);
9231 vty_out (vty
, "%12llu%s", ts
.counts
[i
], VTY_NEWLINE
);
9232 if (ts
.counts
[BGP_STATS_MAXBITLEN
] < 9)
9234 vty_out (vty
, "%30s: ", "%% announced ");
9235 vty_out (vty
, "%12.2f%s",
9236 100 * (float)ts
.counts
[BGP_STATS_SPACE
] /
9237 (float)((uint64_t)1UL << ts
.counts
[BGP_STATS_MAXBITLEN
]),
9239 vty_out (vty
, "%30s: ", "/8 equivalent ");
9240 vty_out (vty
, "%12.2f%s",
9241 (float)ts
.counts
[BGP_STATS_SPACE
] /
9242 (float)(1UL << (ts
.counts
[BGP_STATS_MAXBITLEN
] - 8)),
9244 if (ts
.counts
[BGP_STATS_MAXBITLEN
] < 25)
9246 vty_out (vty
, "%30s: ", "/24 equivalent ");
9247 vty_out (vty
, "%12.2f",
9248 (float)ts
.counts
[BGP_STATS_SPACE
] /
9249 (float)(1UL << (ts
.counts
[BGP_STATS_MAXBITLEN
] - 24)));
9252 vty_out (vty
, "%-30s: ", table_stats_strs
[i
]);
9253 vty_out (vty
, "%12llu", ts
.counts
[i
]);
9256 vty_out (vty
, "%s", VTY_NEWLINE
);
9271 PCOUNT_PFCNT
, /* the figure we display to users */
9275 static const char *pcount_strs
[] =
9277 [PCOUNT_ADJ_IN
] = "Adj-in",
9278 [PCOUNT_DAMPED
] = "Damped",
9279 [PCOUNT_REMOVED
] = "Removed",
9280 [PCOUNT_HISTORY
] = "History",
9281 [PCOUNT_STALE
] = "Stale",
9282 [PCOUNT_VALID
] = "Valid",
9283 [PCOUNT_ALL
] = "All RIB",
9284 [PCOUNT_COUNTED
] = "PfxCt counted",
9285 [PCOUNT_PFCNT
] = "Useable",
9286 [PCOUNT_MAX
] = NULL
,
9291 unsigned int count
[PCOUNT_MAX
];
9292 const struct peer
*peer
;
9293 const struct bgp_table
*table
;
9297 bgp_peer_count_walker (struct thread
*t
)
9299 struct bgp_node
*rn
;
9300 struct peer_pcounts
*pc
= THREAD_ARG (t
);
9301 const struct peer
*peer
= pc
->peer
;
9303 for (rn
= bgp_table_top (pc
->table
); rn
; rn
= bgp_route_next (rn
))
9305 struct bgp_adj_in
*ain
;
9306 struct bgp_info
*ri
;
9308 for (ain
= rn
->adj_in
; ain
; ain
= ain
->next
)
9309 if (ain
->peer
== peer
)
9310 pc
->count
[PCOUNT_ADJ_IN
]++;
9312 for (ri
= rn
->info
; ri
; ri
= ri
->next
)
9314 char buf
[SU_ADDRSTRLEN
];
9316 if (ri
->peer
!= peer
)
9319 pc
->count
[PCOUNT_ALL
]++;
9321 if (CHECK_FLAG (ri
->flags
, BGP_INFO_DAMPED
))
9322 pc
->count
[PCOUNT_DAMPED
]++;
9323 if (CHECK_FLAG (ri
->flags
, BGP_INFO_HISTORY
))
9324 pc
->count
[PCOUNT_HISTORY
]++;
9325 if (CHECK_FLAG (ri
->flags
, BGP_INFO_REMOVED
))
9326 pc
->count
[PCOUNT_REMOVED
]++;
9327 if (CHECK_FLAG (ri
->flags
, BGP_INFO_STALE
))
9328 pc
->count
[PCOUNT_STALE
]++;
9329 if (CHECK_FLAG (ri
->flags
, BGP_INFO_VALID
))
9330 pc
->count
[PCOUNT_VALID
]++;
9331 if (!CHECK_FLAG (ri
->flags
, BGP_INFO_UNUSEABLE
))
9332 pc
->count
[PCOUNT_PFCNT
]++;
9334 if (CHECK_FLAG (ri
->flags
, BGP_INFO_COUNTED
))
9336 pc
->count
[PCOUNT_COUNTED
]++;
9337 if (CHECK_FLAG (ri
->flags
, BGP_INFO_UNUSEABLE
))
9338 zlog_warn ("%s [pcount] %s/%d is counted but flags 0x%x",
9340 inet_ntop(rn
->p
.family
, &rn
->p
.u
.prefix
,
9341 buf
, SU_ADDRSTRLEN
),
9347 if (!CHECK_FLAG (ri
->flags
, BGP_INFO_UNUSEABLE
))
9348 zlog_warn ("%s [pcount] %s/%d not counted but flags 0x%x",
9350 inet_ntop(rn
->p
.family
, &rn
->p
.u
.prefix
,
9351 buf
, SU_ADDRSTRLEN
),
9361 bgp_peer_counts (struct vty
*vty
, struct peer
*peer
, afi_t afi
, safi_t safi
, u_char use_json
)
9363 struct peer_pcounts pcounts
= { .peer
= peer
};
9365 json_object
*json
= NULL
;
9366 json_object
*json_loop
= NULL
;
9370 json
= json_object_new_object();
9371 json_loop
= json_object_new_object();
9374 if (!peer
|| !peer
->bgp
|| !peer
->afc
[afi
][safi
]
9375 || !peer
->bgp
->rib
[afi
][safi
])
9379 json_object_string_add(json
, "warning", "No such neighbor or address family");
9380 vty_out (vty
, "%s%s", json_object_to_json_string(json
), VTY_NEWLINE
);
9381 json_object_free(json
);
9384 vty_out (vty
, "%% No such neighbor or address family%s", VTY_NEWLINE
);
9389 memset (&pcounts
, 0, sizeof(pcounts
));
9390 pcounts
.peer
= peer
;
9391 pcounts
.table
= peer
->bgp
->rib
[afi
][safi
];
9393 /* in-place call via thread subsystem so as to record execution time
9394 * * stats for the thread-walk (i.e. ensure this can't be blamed on
9395 * * on just vty_read()).
9397 thread_execute (bm
->master
, bgp_peer_count_walker
, &pcounts
, 0);
9401 json_object_string_add(json
, "prefixCountsFor", peer
->host
);
9402 json_object_string_add(json
, "multiProtocol", afi_safi_print (afi
, safi
));
9403 json_object_int_add(json
, "pfxCounter", peer
->pcount
[afi
][safi
]);
9405 for (i
= 0; i
< PCOUNT_MAX
; i
++)
9406 json_object_int_add(json_loop
, pcount_strs
[i
], pcounts
.count
[i
]);
9408 json_object_object_add(json
, "ribTableWalkCounters", json_loop
);
9410 if (pcounts
.count
[PCOUNT_PFCNT
] != peer
->pcount
[afi
][safi
])
9412 json_object_string_add(json
, "pfxctDriftFor", peer
->host
);
9413 json_object_string_add(json
, "recommended", "Please report this bug, with the above command output");
9415 vty_out (vty
, "%s%s", json_object_to_json_string(json
), VTY_NEWLINE
);
9416 json_object_free(json
);
9421 if (peer
->hostname
&& bgp_flag_check(peer
->bgp
, BGP_FLAG_SHOW_HOSTNAME
))
9423 vty_out (vty
, "Prefix counts for %s/%s, %s%s",
9424 peer
->hostname
, peer
->host
, afi_safi_print (afi
, safi
),
9429 vty_out (vty
, "Prefix counts for %s, %s%s",
9430 peer
->host
, afi_safi_print (afi
, safi
), VTY_NEWLINE
);
9433 vty_out (vty
, "PfxCt: %ld%s", peer
->pcount
[afi
][safi
], VTY_NEWLINE
);
9434 vty_out (vty
, "%sCounts from RIB table walk:%s%s",
9435 VTY_NEWLINE
, VTY_NEWLINE
, VTY_NEWLINE
);
9437 for (i
= 0; i
< PCOUNT_MAX
; i
++)
9438 vty_out (vty
, "%20s: %-10d%s", pcount_strs
[i
], pcounts
.count
[i
], VTY_NEWLINE
);
9440 if (pcounts
.count
[PCOUNT_PFCNT
] != peer
->pcount
[afi
][safi
])
9442 vty_out (vty
, "%s [pcount] PfxCt drift!%s",
9443 peer
->host
, VTY_NEWLINE
);
9444 vty_out (vty
, "Please report this bug, with the above command output%s",
9452 DEFUN (show_ip_bgp_instance_neighbor_prefix_counts
,
9453 show_ip_bgp_instance_neighbor_prefix_counts_cmd
,
9454 "show [ip] bgp [<view|vrf> WORD] [<ipv4|ipv6> [<unicast|multicast|vpn|encap|labeled-unicast>]] "
9455 "neighbors <A.B.C.D|X:X::X:X|WORD> prefix-counts [json]",
9459 BGP_INSTANCE_HELP_STR
9462 "Address Family modifier\n"
9463 "Address Family modifier\n"
9464 "Address Family modifier\n"
9465 "Address Family modifier\n"
9466 "Address Family modifier\n"
9467 "Detailed information on TCP and BGP neighbor connections\n"
9468 "Neighbor to display information about\n"
9469 "Neighbor to display information about\n"
9470 "Neighbor on BGP configured interface\n"
9471 "Display detailed prefix count information\n"
9474 afi_t afi
= AFI_IP6
;
9475 safi_t safi
= SAFI_UNICAST
;
9478 struct bgp
*bgp
= NULL
;
9480 bgp_vty_find_and_parse_afi_safi_bgp (vty
, argv
, argc
, &idx
, &afi
, &safi
, &bgp
);
9484 int uj
= use_json (argc
, argv
);
9487 argv_find (argv
, argc
, "neighbors", &idx
);
9488 peer
= peer_lookup_in_view (vty
, bgp
, argv
[idx
+1]->arg
, uj
);
9492 return bgp_peer_counts (vty
, peer
, AFI_IP
, SAFI_UNICAST
, uj
);
9495 #ifdef KEEP_OLD_VPN_COMMANDS
9496 DEFUN (show_ip_bgp_vpn_neighbor_prefix_counts
,
9497 show_ip_bgp_vpn_neighbor_prefix_counts_cmd
,
9498 "show [ip] bgp <vpnv4|vpnv6> all neighbors <A.B.C.D|X:X::X:X|WORD> prefix-counts [json]",
9503 "Display information about all VPNv4 NLRIs\n"
9504 "Detailed information on TCP and BGP neighbor connections\n"
9505 "Neighbor to display information about\n"
9506 "Neighbor to display information about\n"
9507 "Neighbor on BGP configured interface\n"
9508 "Display detailed prefix count information\n"
9513 u_char uj
= use_json(argc
, argv
);
9515 peer
= peer_lookup_in_view (vty
, NULL
, argv
[idx_peer
]->arg
, uj
);
9519 return bgp_peer_counts (vty
, peer
, AFI_IP
, SAFI_MPLS_VPN
, uj
);
9522 DEFUN (show_ip_bgp_vpn_all_route_prefix
,
9523 show_ip_bgp_vpn_all_route_prefix_cmd
,
9524 "show [ip] bgp <vpnv4|vpnv6> all <A.B.C.D|A.B.C.D/M> [json]",
9529 "Display information about all VPNv4 NLRIs\n"
9530 "Network in the BGP routing table to display\n"
9531 "Network in the BGP routing table to display\n"
9535 char *network
= NULL
;
9536 struct bgp
*bgp
= bgp_get_default();
9539 vty_out (vty
, "Can't find default instance%s", VTY_NEWLINE
);
9543 if (argv_find (argv
, argc
, "A.B.C.D", &idx
))
9544 network
= argv
[idx
]->arg
;
9545 else if (argv_find (argv
, argc
, "A.B.C.D/M", &idx
))
9546 network
= argv
[idx
]->arg
;
9549 vty_out (vty
, "Unable to figure out Network%s", VTY_NEWLINE
);
9553 return bgp_show_route (vty
, bgp
, network
, AFI_IP
, SAFI_MPLS_VPN
, NULL
, 0, BGP_PATH_ALL
, use_json(argc
, argv
));
9555 #endif /* KEEP_OLD_VPN_COMMANDS */
9557 DEFUN (show_ip_bgp_l2vpn_evpn_all_route_prefix
,
9558 show_ip_bgp_l2vpn_evpn_all_route_prefix_cmd
,
9559 "show [ip] bgp l2vpn evpn all <A.B.C.D|A.B.C.D/M> [json]",
9565 "Display information about all EVPN NLRIs\n"
9566 "Network in the BGP routing table to display\n"
9567 "Network in the BGP routing table to display\n"
9571 char *network
= NULL
;
9573 if (argv_find (argv
, argc
, "A.B.C.D", &idx
))
9574 network
= argv
[idx
]->arg
;
9575 else if (argv_find (argv
, argc
, "A.B.C.D/M", &idx
))
9576 network
= argv
[idx
]->arg
;
9579 vty_out (vty
, "Unable to figure out Network%s", VTY_NEWLINE
);
9582 return bgp_show_route (vty
, NULL
, network
, AFI_L2VPN
, SAFI_EVPN
, NULL
, 0, BGP_PATH_ALL
, use_json(argc
, argv
));
9586 show_adj_route (struct vty
*vty
, struct peer
*peer
, afi_t afi
, safi_t safi
,
9587 int in
, const char *rmap_name
, u_char use_json
, json_object
*json
)
9589 struct bgp_table
*table
;
9590 struct bgp_adj_in
*ain
;
9591 struct bgp_adj_out
*adj
;
9592 unsigned long output_count
;
9593 unsigned long filtered_count
;
9594 struct bgp_node
*rn
;
9599 struct attr_extra extra
;
9601 struct update_subgroup
*subgrp
;
9602 json_object
*json_scode
= NULL
;
9603 json_object
*json_ocode
= NULL
;
9604 json_object
*json_ar
= NULL
;
9605 struct peer_af
*paf
;
9609 json_scode
= json_object_new_object();
9610 json_ocode
= json_object_new_object();
9611 json_ar
= json_object_new_object();
9613 json_object_string_add(json_scode
, "suppressed", "s");
9614 json_object_string_add(json_scode
, "damped", "d");
9615 json_object_string_add(json_scode
, "history", "h");
9616 json_object_string_add(json_scode
, "valid", "*");
9617 json_object_string_add(json_scode
, "best", ">");
9618 json_object_string_add(json_scode
, "multipath", "=");
9619 json_object_string_add(json_scode
, "internal", "i");
9620 json_object_string_add(json_scode
, "ribFailure", "r");
9621 json_object_string_add(json_scode
, "stale", "S");
9622 json_object_string_add(json_scode
, "removed", "R");
9624 json_object_string_add(json_ocode
, "igp", "i");
9625 json_object_string_add(json_ocode
, "egp", "e");
9626 json_object_string_add(json_ocode
, "incomplete", "?");
9635 json_object_string_add(json
, "alert", "no BGP");
9636 vty_out (vty
, "%s%s", json_object_to_json_string(json
), VTY_NEWLINE
);
9637 json_object_free(json
);
9640 vty_out (vty
, "%% No bgp%s", VTY_NEWLINE
);
9644 table
= bgp
->rib
[afi
][safi
];
9646 output_count
= filtered_count
= 0;
9647 subgrp
= peer_subgroup(peer
, afi
, safi
);
9649 if (!in
&& subgrp
&& CHECK_FLAG (subgrp
->sflags
, SUBGRP_STATUS_DEFAULT_ORIGINATE
))
9653 json_object_int_add(json
, "bgpTableVersion", table
->version
);
9654 json_object_string_add(json
, "bgpLocalRouterId", inet_ntoa (bgp
->router_id
));
9655 json_object_object_add(json
, "bgpStatusCodes", json_scode
);
9656 json_object_object_add(json
, "bgpOriginCodes", json_ocode
);
9657 json_object_string_add(json
, "bgpOriginatingDefaultNetwork", "0.0.0.0");
9661 vty_out (vty
, "BGP table version is %" PRIu64
", local router ID is %s%s", table
->version
, inet_ntoa (bgp
->router_id
), VTY_NEWLINE
);
9662 vty_out (vty
, BGP_SHOW_SCODE_HEADER
, VTY_NEWLINE
, VTY_NEWLINE
);
9663 vty_out (vty
, BGP_SHOW_OCODE_HEADER
, VTY_NEWLINE
, VTY_NEWLINE
);
9665 vty_out (vty
, "Originating default network 0.0.0.0%s%s",
9666 VTY_NEWLINE
, VTY_NEWLINE
);
9671 attr
.extra
= &extra
;
9672 for (rn
= bgp_table_top (table
); rn
; rn
= bgp_route_next (rn
))
9676 for (ain
= rn
->adj_in
; ain
; ain
= ain
->next
)
9678 if (ain
->peer
== peer
)
9684 json_object_int_add(json
, "bgpTableVersion", 0);
9685 json_object_string_add(json
, "bgpLocalRouterId", inet_ntoa (bgp
->router_id
));
9686 json_object_object_add(json
, "bgpStatusCodes", json_scode
);
9687 json_object_object_add(json
, "bgpOriginCodes", json_ocode
);
9691 vty_out (vty
, "BGP table version is 0, local router ID is %s%s", inet_ntoa (bgp
->router_id
), VTY_NEWLINE
);
9692 vty_out (vty
, BGP_SHOW_SCODE_HEADER
, VTY_NEWLINE
, VTY_NEWLINE
);
9693 vty_out (vty
, BGP_SHOW_OCODE_HEADER
, VTY_NEWLINE
, VTY_NEWLINE
);
9700 vty_out (vty
, BGP_SHOW_HEADER
, VTY_NEWLINE
);
9705 bgp_attr_dup(&attr
, ain
->attr
);
9706 if (bgp_input_modifier(peer
, &rn
->p
, &attr
, afi
, safi
, rmap_name
) != RMAP_DENY
)
9708 route_vty_out_tmp (vty
, &rn
->p
, &attr
, safi
, use_json
, json_ar
);
9719 for (adj
= rn
->adj_out
; adj
; adj
= adj
->next
)
9720 SUBGRP_FOREACH_PEER(adj
->subgroup
, paf
)
9721 if (paf
->peer
== peer
)
9727 json_object_int_add(json
, "bgpTableVersion", table
->version
);
9728 json_object_string_add(json
, "bgpLocalRouterId", inet_ntoa (bgp
->router_id
));
9729 json_object_object_add(json
, "bgpStatusCodes", json_scode
);
9730 json_object_object_add(json
, "bgpOriginCodes", json_ocode
);
9734 vty_out (vty
, "BGP table version is %" PRIu64
", local router ID is %s%s", table
->version
,
9735 inet_ntoa (bgp
->router_id
), VTY_NEWLINE
);
9736 vty_out (vty
, BGP_SHOW_SCODE_HEADER
, VTY_NEWLINE
, VTY_NEWLINE
);
9737 vty_out (vty
, BGP_SHOW_OCODE_HEADER
, VTY_NEWLINE
, VTY_NEWLINE
);
9745 vty_out (vty
, BGP_SHOW_HEADER
, VTY_NEWLINE
);
9751 bgp_attr_dup(&attr
, adj
->attr
);
9752 ret
= bgp_output_modifier(peer
, &rn
->p
, &attr
, afi
, safi
, rmap_name
);
9753 if (ret
!= RMAP_DENY
)
9755 route_vty_out_tmp (vty
, &rn
->p
, &attr
, safi
, use_json
, json_ar
);
9765 json_object_object_add(json
, "advertisedRoutes", json_ar
);
9767 if (output_count
!= 0)
9770 json_object_int_add(json
, "totalPrefixCounter", output_count
);
9772 vty_out (vty
, "%sTotal number of prefixes %ld%s",
9773 VTY_NEWLINE
, output_count
, VTY_NEWLINE
);
9777 vty_out (vty
, "%s%s", json_object_to_json_string(json
), VTY_NEWLINE
);
9778 json_object_free(json
);
9784 peer_adj_routes (struct vty
*vty
, struct peer
*peer
, afi_t afi
, safi_t safi
,
9785 int in
, const char *rmap_name
, u_char use_json
)
9787 json_object
*json
= NULL
;
9790 json
= json_object_new_object();
9792 if (!peer
|| !peer
->afc
[afi
][safi
])
9796 json_object_string_add(json
, "warning", "No such neighbor or address family");
9797 vty_out (vty
, "%s%s", json_object_to_json_string(json
), VTY_NEWLINE
);
9798 json_object_free(json
);
9801 vty_out (vty
, "%% No such neighbor or address family%s", VTY_NEWLINE
);
9806 if (in
&& !CHECK_FLAG(peer
->af_flags
[afi
][safi
], PEER_FLAG_SOFT_RECONFIG
))
9810 json_object_string_add(json
, "warning", "Inbound soft reconfiguration not enabled");
9811 vty_out (vty
, "%s%s", json_object_to_json_string(json
), VTY_NEWLINE
);
9812 json_object_free(json
);
9815 vty_out (vty
, "%% Inbound soft reconfiguration not enabled%s", VTY_NEWLINE
);
9820 show_adj_route (vty
, peer
, afi
, safi
, in
, rmap_name
, use_json
, json
);
9825 DEFUN (show_ip_bgp_instance_neighbor_advertised_route
,
9826 show_ip_bgp_instance_neighbor_advertised_route_cmd
,
9827 "show [ip] bgp [<view|vrf> WORD] ["BGP_AFI_CMD_STR
" ["BGP_SAFI_CMD_STR
"]] "
9828 "neighbors <A.B.C.D|X:X::X:X|WORD> <received-routes|advertised-routes> [route-map WORD] [json]",
9832 BGP_INSTANCE_HELP_STR
9835 "Detailed information on TCP and BGP neighbor connections\n"
9836 "Neighbor to display information about\n"
9837 "Neighbor to display information about\n"
9838 "Neighbor on BGP configured interface\n"
9839 "Display the received routes from neighbor\n"
9840 "Display the routes advertised to a BGP neighbor\n"
9841 "Route-map to modify the attributes\n"
9842 "Name of the route map\n"
9845 afi_t afi
= AFI_IP6
;
9846 safi_t safi
= SAFI_UNICAST
;
9847 char *rmap_name
= NULL
;
9848 char *peerstr
= NULL
;
9850 struct bgp
*bgp
= NULL
;
9855 bgp_vty_find_and_parse_afi_safi_bgp (vty
, argv
, argc
, &idx
, &afi
, &safi
, &bgp
);
9859 int uj
= use_json (argc
, argv
);
9862 /* neighbors <A.B.C.D|X:X::X:X|WORD> */
9863 argv_find (argv
, argc
, "neighbors", &idx
);
9864 peerstr
= argv
[++idx
]->arg
;
9866 peer
= peer_lookup_in_view (vty
, bgp
, peerstr
, uj
);
9870 if (argv_find (argv
, argc
, "received-routes", &idx
))
9872 if (argv_find (argv
, argc
, "advertised-routes", &idx
))
9874 if (argv_find (argv
, argc
, "route-map", &idx
))
9875 rmap_name
= argv
[++idx
]->arg
;
9877 return peer_adj_routes (vty
, peer
, afi
, safi
, rcvd
, rmap_name
, uj
);
9880 DEFUN (show_ip_bgp_neighbor_received_prefix_filter
,
9881 show_ip_bgp_neighbor_received_prefix_filter_cmd
,
9882 "show [ip] bgp [<ipv4|ipv6> [unicast]] neighbors <A.B.C.D|X:X::X:X|WORD> received prefix-filter [json]",
9888 "Address Family modifier\n"
9889 "Detailed information on TCP and BGP neighbor connections\n"
9890 "Neighbor to display information about\n"
9891 "Neighbor to display information about\n"
9892 "Neighbor on BGP configured interface\n"
9893 "Display information received from a BGP neighbor\n"
9894 "Display the prefixlist filter\n"
9897 afi_t afi
= AFI_IP6
;
9898 safi_t safi
= SAFI_UNICAST
;
9899 char *peerstr
= NULL
;
9909 if (argv_find (argv
, argc
, "ip", &idx
))
9911 /* [<ipv4|ipv6> [unicast]] */
9912 if (argv_find (argv
, argc
, "ipv4", &idx
))
9914 if (argv_find (argv
, argc
, "ipv6", &idx
))
9916 /* neighbors <A.B.C.D|X:X::X:X|WORD> */
9917 argv_find (argv
, argc
, "neighbors", &idx
);
9918 peerstr
= argv
[++idx
]->arg
;
9920 u_char uj
= use_json(argc
, argv
);
9922 ret
= str2sockunion (peerstr
, &su
);
9925 peer
= peer_lookup_by_conf_if (NULL
, peerstr
);
9929 vty_out (vty
, "{}%s", VTY_NEWLINE
);
9931 vty_out (vty
, "%% Malformed address or name: %s%s", peerstr
, VTY_NEWLINE
);
9937 peer
= peer_lookup (NULL
, &su
);
9941 vty_out (vty
, "{}%s", VTY_NEWLINE
);
9943 vty_out (vty
, "No peer%s", VTY_NEWLINE
);
9948 sprintf (name
, "%s.%d.%d", peer
->host
, afi
, safi
);
9949 count
= prefix_bgp_show_prefix_list (NULL
, afi
, name
, uj
);
9953 vty_out (vty
, "Address Family: %s%s", afi_safi_print(afi
, safi
), VTY_NEWLINE
);
9954 prefix_bgp_show_prefix_list (vty
, afi
, name
, uj
);
9959 vty_out (vty
, "{}%s", VTY_NEWLINE
);
9961 vty_out (vty
, "No functional output%s", VTY_NEWLINE
);
9968 bgp_show_neighbor_route (struct vty
*vty
, struct peer
*peer
, afi_t afi
,
9969 safi_t safi
, enum bgp_show_type type
, u_char use_json
)
9971 if (! peer
|| ! peer
->afc
[afi
][safi
])
9975 json_object
*json_no
= NULL
;
9976 json_no
= json_object_new_object();
9977 json_object_string_add(json_no
, "warning", "No such neighbor or address family");
9978 vty_out (vty
, "%s%s", json_object_to_json_string(json_no
), VTY_NEWLINE
);
9979 json_object_free(json_no
);
9982 vty_out (vty
, "%% No such neighbor or address family%s", VTY_NEWLINE
);
9986 return bgp_show (vty
, peer
->bgp
, afi
, safi
, type
, &peer
->su
, use_json
);
9989 DEFUN (show_ip_bgp_neighbor_routes
,
9990 show_ip_bgp_neighbor_routes_cmd
,
9991 "show [ip] bgp [<view|vrf> WORD] ["BGP_AFI_CMD_STR
" ["BGP_SAFI_CMD_STR
"]] "
9992 "neighbors <A.B.C.D|X:X::X:X|WORD> <flap-statistics|dampened-routes|routes> [json]",
9996 BGP_INSTANCE_HELP_STR
9999 "Detailed information on TCP and BGP neighbor connections\n"
10000 "Neighbor to display information about\n"
10001 "Neighbor to display information about\n"
10002 "Neighbor on BGP configured interface\n"
10003 "Display flap statistics of the routes learned from neighbor\n"
10004 "Display the dampened routes received from neighbor\n"
10005 "Display routes learned from neighbor\n"
10008 char *peerstr
= NULL
;
10009 struct bgp
*bgp
= NULL
;
10010 afi_t afi
= AFI_IP6
;
10011 safi_t safi
= SAFI_UNICAST
;
10013 enum bgp_show_type sh_type
= bgp_show_type_neighbor
;
10017 bgp_vty_find_and_parse_afi_safi_bgp (vty
, argv
, argc
, &idx
, &afi
, &safi
, &bgp
);
10019 return CMD_WARNING
;
10021 int uj
= use_json (argc
, argv
);
10024 /* neighbors <A.B.C.D|X:X::X:X|WORD> */
10025 argv_find (argv
, argc
, "neighbors", &idx
);
10026 peerstr
= argv
[++idx
]->arg
;
10028 peer
= peer_lookup_in_view (vty
, bgp
, peerstr
, uj
);
10031 vty_out (vty
, "No such neighbor%s", VTY_NEWLINE
);
10032 return CMD_WARNING
;
10035 if (argv_find (argv
, argc
, "flap-statistics", &idx
))
10036 sh_type
= bgp_show_type_flap_neighbor
;
10037 else if (argv_find (argv
, argc
, "dampened-routes", &idx
))
10038 sh_type
= bgp_show_type_damp_neighbor
;
10039 else if (argv_find (argv
, argc
, "routes", &idx
))
10040 sh_type
= bgp_show_type_neighbor
;
10042 return bgp_show_neighbor_route (vty
, peer
, afi
, safi
, sh_type
, uj
);
10045 struct bgp_table
*bgp_distance_table
[AFI_MAX
][SAFI_MAX
];
10047 struct bgp_distance
10049 /* Distance value for the IP source prefix. */
10052 /* Name of the access-list to be matched. */
10056 DEFUN (show_bgp_afi_vpn_rd_route
,
10057 show_bgp_afi_vpn_rd_route_cmd
,
10058 "show bgp "BGP_AFI_CMD_STR
" vpn rd ASN:nn_or_IP-address:nn <A.B.C.D/M|X:X::X:X/M> [json]",
10062 "Address Family modifier\n"
10063 "Display information for a route distinguisher\n"
10064 "Route Distinguisher\n"
10065 "Network in the BGP routing table to display\n"
10066 "Network in the BGP routing table to display\n"
10070 struct prefix_rd prd
;
10071 afi_t afi
= AFI_MAX
;
10074 argv_find_and_parse_afi (argv
, argc
, &idx
, &afi
);
10075 ret
= str2prefix_rd (argv
[5]->arg
, &prd
);
10078 vty_out (vty
, "%% Malformed Route Distinguisher%s", VTY_NEWLINE
);
10079 return CMD_WARNING
;
10081 return bgp_show_route (vty
, NULL
, argv
[6]->arg
, afi
, SAFI_MPLS_VPN
, &prd
, 0, BGP_PATH_ALL
, use_json (argc
, argv
));
10084 static struct bgp_distance
*
10085 bgp_distance_new (void)
10087 return XCALLOC (MTYPE_BGP_DISTANCE
, sizeof (struct bgp_distance
));
10091 bgp_distance_free (struct bgp_distance
*bdistance
)
10093 XFREE (MTYPE_BGP_DISTANCE
, bdistance
);
10097 bgp_distance_set (struct vty
*vty
, const char *distance_str
,
10098 const char *ip_str
, const char *access_list_str
)
10105 struct bgp_node
*rn
;
10106 struct bgp_distance
*bdistance
;
10108 afi
= bgp_node_afi (vty
);
10109 safi
= bgp_node_safi (vty
);
10111 ret
= str2prefix (ip_str
, &p
);
10114 vty_out (vty
, "Malformed prefix%s", VTY_NEWLINE
);
10115 return CMD_WARNING
;
10118 distance
= atoi (distance_str
);
10120 /* Get BGP distance node. */
10121 rn
= bgp_node_get (bgp_distance_table
[afi
][safi
], (struct prefix
*) &p
);
10124 bdistance
= rn
->info
;
10125 bgp_unlock_node (rn
);
10129 bdistance
= bgp_distance_new ();
10130 rn
->info
= bdistance
;
10133 /* Set distance value. */
10134 bdistance
->distance
= distance
;
10136 /* Reset access-list configuration. */
10137 if (bdistance
->access_list
)
10139 XFREE(MTYPE_AS_LIST
, bdistance
->access_list
);
10140 bdistance
->access_list
= NULL
;
10142 if (access_list_str
)
10143 bdistance
->access_list
= XSTRDUP(MTYPE_AS_LIST
, access_list_str
);
10145 return CMD_SUCCESS
;
10149 bgp_distance_unset (struct vty
*vty
, const char *distance_str
,
10150 const char *ip_str
, const char *access_list_str
)
10157 struct bgp_node
*rn
;
10158 struct bgp_distance
*bdistance
;
10160 afi
= bgp_node_afi (vty
);
10161 safi
= bgp_node_safi (vty
);
10163 ret
= str2prefix (ip_str
, &p
);
10166 vty_out (vty
, "Malformed prefix%s", VTY_NEWLINE
);
10167 return CMD_WARNING
;
10170 rn
= bgp_node_lookup (bgp_distance_table
[afi
][safi
], (struct prefix
*)&p
);
10173 vty_out (vty
, "Can't find specified prefix%s", VTY_NEWLINE
);
10174 return CMD_WARNING
;
10177 bdistance
= rn
->info
;
10178 distance
= atoi(distance_str
);
10180 if (bdistance
->distance
!= distance
)
10182 vty_out (vty
, "Distance does not match configured%s", VTY_NEWLINE
);
10183 return CMD_WARNING
;
10186 if (bdistance
->access_list
)
10187 XFREE(MTYPE_AS_LIST
, bdistance
->access_list
);
10188 bgp_distance_free (bdistance
);
10191 bgp_unlock_node (rn
);
10192 bgp_unlock_node (rn
);
10194 return CMD_SUCCESS
;
10197 /* Apply BGP information to distance method. */
10199 bgp_distance_apply (struct prefix
*p
, struct bgp_info
*rinfo
, afi_t afi
,
10200 safi_t safi
, struct bgp
*bgp
)
10202 struct bgp_node
*rn
;
10205 struct bgp_distance
*bdistance
;
10206 struct access_list
*alist
;
10207 struct bgp_static
*bgp_static
;
10212 peer
= rinfo
->peer
;
10214 /* Check source address. */
10215 sockunion2hostprefix (&peer
->su
, &q
);
10216 rn
= bgp_node_match (bgp_distance_table
[afi
][safi
], &q
);
10219 bdistance
= rn
->info
;
10220 bgp_unlock_node (rn
);
10222 if (bdistance
->access_list
)
10224 alist
= access_list_lookup (afi
, bdistance
->access_list
);
10225 if (alist
&& access_list_apply (alist
, p
) == FILTER_PERMIT
)
10226 return bdistance
->distance
;
10229 return bdistance
->distance
;
10232 /* Backdoor check. */
10233 rn
= bgp_node_lookup (bgp
->route
[afi
][safi
], p
);
10236 bgp_static
= rn
->info
;
10237 bgp_unlock_node (rn
);
10239 if (bgp_static
->backdoor
)
10241 if (bgp
->distance_local
[afi
][safi
])
10242 return bgp
->distance_local
[afi
][safi
];
10244 return ZEBRA_IBGP_DISTANCE_DEFAULT
;
10248 if (peer
->sort
== BGP_PEER_EBGP
)
10250 if (bgp
->distance_ebgp
[afi
][safi
])
10251 return bgp
->distance_ebgp
[afi
][safi
];
10252 return ZEBRA_EBGP_DISTANCE_DEFAULT
;
10256 if (bgp
->distance_ibgp
[afi
][safi
])
10257 return bgp
->distance_ibgp
[afi
][safi
];
10258 return ZEBRA_IBGP_DISTANCE_DEFAULT
;
10262 DEFUN (bgp_distance
,
10264 "distance bgp (1-255) (1-255) (1-255)",
10265 "Define an administrative distance\n"
10267 "Distance for routes external to the AS\n"
10268 "Distance for routes internal to the AS\n"
10269 "Distance for local routes\n")
10271 VTY_DECLVAR_CONTEXT(bgp
, bgp
);
10272 int idx_number
= 2;
10273 int idx_number_2
= 3;
10274 int idx_number_3
= 4;
10278 afi
= bgp_node_afi (vty
);
10279 safi
= bgp_node_safi (vty
);
10281 bgp
->distance_ebgp
[afi
][safi
] = atoi (argv
[idx_number
]->arg
);
10282 bgp
->distance_ibgp
[afi
][safi
] = atoi (argv
[idx_number_2
]->arg
);
10283 bgp
->distance_local
[afi
][safi
] = atoi (argv
[idx_number_3
]->arg
);
10284 return CMD_SUCCESS
;
10287 DEFUN (no_bgp_distance
,
10288 no_bgp_distance_cmd
,
10289 "no distance bgp [(1-255) (1-255) (1-255)]",
10291 "Define an administrative distance\n"
10293 "Distance for routes external to the AS\n"
10294 "Distance for routes internal to the AS\n"
10295 "Distance for local routes\n")
10297 VTY_DECLVAR_CONTEXT(bgp
, bgp
);
10301 afi
= bgp_node_afi (vty
);
10302 safi
= bgp_node_safi (vty
);
10304 bgp
->distance_ebgp
[afi
][safi
] = 0;
10305 bgp
->distance_ibgp
[afi
][safi
] = 0;
10306 bgp
->distance_local
[afi
][safi
] = 0;
10307 return CMD_SUCCESS
;
10311 DEFUN (bgp_distance_source
,
10312 bgp_distance_source_cmd
,
10313 "distance (1-255) A.B.C.D/M",
10314 "Define an administrative distance\n"
10315 "Administrative distance\n"
10316 "IP source prefix\n")
10318 int idx_number
= 1;
10319 int idx_ipv4_prefixlen
= 2;
10320 bgp_distance_set (vty
, argv
[idx_number
]->arg
, argv
[idx_ipv4_prefixlen
]->arg
, NULL
);
10321 return CMD_SUCCESS
;
10324 DEFUN (no_bgp_distance_source
,
10325 no_bgp_distance_source_cmd
,
10326 "no distance (1-255) A.B.C.D/M",
10328 "Define an administrative distance\n"
10329 "Administrative distance\n"
10330 "IP source prefix\n")
10332 int idx_number
= 2;
10333 int idx_ipv4_prefixlen
= 3;
10334 bgp_distance_unset (vty
, argv
[idx_number
]->arg
, argv
[idx_ipv4_prefixlen
]->arg
, NULL
);
10335 return CMD_SUCCESS
;
10338 DEFUN (bgp_distance_source_access_list
,
10339 bgp_distance_source_access_list_cmd
,
10340 "distance (1-255) A.B.C.D/M WORD",
10341 "Define an administrative distance\n"
10342 "Administrative distance\n"
10343 "IP source prefix\n"
10344 "Access list name\n")
10346 int idx_number
= 1;
10347 int idx_ipv4_prefixlen
= 2;
10349 bgp_distance_set (vty
, argv
[idx_number
]->arg
, argv
[idx_ipv4_prefixlen
]->arg
, argv
[idx_word
]->arg
);
10350 return CMD_SUCCESS
;
10353 DEFUN (no_bgp_distance_source_access_list
,
10354 no_bgp_distance_source_access_list_cmd
,
10355 "no distance (1-255) A.B.C.D/M WORD",
10357 "Define an administrative distance\n"
10358 "Administrative distance\n"
10359 "IP source prefix\n"
10360 "Access list name\n")
10362 int idx_number
= 2;
10363 int idx_ipv4_prefixlen
= 3;
10365 bgp_distance_unset (vty
, argv
[idx_number
]->arg
, argv
[idx_ipv4_prefixlen
]->arg
, argv
[idx_word
]->arg
);
10366 return CMD_SUCCESS
;
10369 DEFUN (ipv6_bgp_distance_source
,
10370 ipv6_bgp_distance_source_cmd
,
10371 "distance (1-255) X:X::X:X/M",
10372 "Define an administrative distance\n"
10373 "Administrative distance\n"
10374 "IP source prefix\n")
10376 bgp_distance_set (vty
, argv
[1]->arg
, argv
[2]->arg
, NULL
);
10377 return CMD_SUCCESS
;
10380 DEFUN (no_ipv6_bgp_distance_source
,
10381 no_ipv6_bgp_distance_source_cmd
,
10382 "no distance (1-255) X:X::X:X/M",
10384 "Define an administrative distance\n"
10385 "Administrative distance\n"
10386 "IP source prefix\n")
10388 bgp_distance_unset (vty
, argv
[2]->arg
, argv
[3]->arg
, NULL
);
10389 return CMD_SUCCESS
;
10392 DEFUN (ipv6_bgp_distance_source_access_list
,
10393 ipv6_bgp_distance_source_access_list_cmd
,
10394 "distance (1-255) X:X::X:X/M WORD",
10395 "Define an administrative distance\n"
10396 "Administrative distance\n"
10397 "IP source prefix\n"
10398 "Access list name\n")
10400 bgp_distance_set (vty
, argv
[1]->arg
, argv
[2]->arg
, argv
[3]->arg
);
10401 return CMD_SUCCESS
;
10404 DEFUN (no_ipv6_bgp_distance_source_access_list
,
10405 no_ipv6_bgp_distance_source_access_list_cmd
,
10406 "no distance (1-255) X:X::X:X/M WORD",
10408 "Define an administrative distance\n"
10409 "Administrative distance\n"
10410 "IP source prefix\n"
10411 "Access list name\n")
10413 bgp_distance_unset (vty
, argv
[2]->arg
, argv
[3]->arg
, argv
[4]->arg
);
10414 return CMD_SUCCESS
;
10417 DEFUN (bgp_damp_set
,
10419 "bgp dampening [(1-45) [(1-20000) (1-20000) (1-255)]]",
10420 "BGP Specific commands\n"
10421 "Enable route-flap dampening\n"
10422 "Half-life time for the penalty\n"
10423 "Value to start reusing a route\n"
10424 "Value to start suppressing a route\n"
10425 "Maximum duration to suppress a stable route\n")
10427 VTY_DECLVAR_CONTEXT(bgp
, bgp
);
10428 int idx_half_life
= 2;
10430 int idx_suppress
= 4;
10431 int idx_max_suppress
= 5;
10432 int half
= DEFAULT_HALF_LIFE
* 60;
10433 int reuse
= DEFAULT_REUSE
;
10434 int suppress
= DEFAULT_SUPPRESS
;
10435 int max
= 4 * half
;
10439 half
= atoi (argv
[idx_half_life
]->arg
) * 60;
10440 reuse
= atoi (argv
[idx_reuse
]->arg
);
10441 suppress
= atoi (argv
[idx_suppress
]->arg
);
10442 max
= atoi (argv
[idx_max_suppress
]->arg
) * 60;
10444 else if (argc
== 3)
10446 half
= atoi (argv
[idx_half_life
]->arg
) * 60;
10450 if (suppress
< reuse
)
10452 vty_out (vty
, "Suppress value cannot be less than reuse value %s",
10457 return bgp_damp_enable (bgp
, bgp_node_afi (vty
), bgp_node_safi (vty
),
10458 half
, reuse
, suppress
, max
);
10461 DEFUN (bgp_damp_unset
,
10462 bgp_damp_unset_cmd
,
10463 "no bgp dampening [(1-45) [(1-20000) (1-20000) (1-255)]]",
10465 "BGP Specific commands\n"
10466 "Enable route-flap dampening\n"
10467 "Half-life time for the penalty\n"
10468 "Value to start reusing a route\n"
10469 "Value to start suppressing a route\n"
10470 "Maximum duration to suppress a stable route\n")
10472 VTY_DECLVAR_CONTEXT(bgp
, bgp
);
10473 return bgp_damp_disable (bgp
, bgp_node_afi (vty
), bgp_node_safi (vty
));
10476 /* Display specified route of BGP table. */
10478 bgp_clear_damp_route (struct vty
*vty
, const char *view_name
,
10479 const char *ip_str
, afi_t afi
, safi_t safi
,
10480 struct prefix_rd
*prd
, int prefix_check
)
10483 struct prefix match
;
10484 struct bgp_node
*rn
;
10485 struct bgp_node
*rm
;
10486 struct bgp_info
*ri
;
10487 struct bgp_info
*ri_temp
;
10489 struct bgp_table
*table
;
10491 /* BGP structure lookup. */
10494 bgp
= bgp_lookup_by_name (view_name
);
10497 vty_out (vty
, "%% Can't find BGP instance %s%s", view_name
, VTY_NEWLINE
);
10498 return CMD_WARNING
;
10503 bgp
= bgp_get_default ();
10506 vty_out (vty
, "%% No BGP process is configured%s", VTY_NEWLINE
);
10507 return CMD_WARNING
;
10511 /* Check IP address argument. */
10512 ret
= str2prefix (ip_str
, &match
);
10515 vty_out (vty
, "%% address is malformed%s", VTY_NEWLINE
);
10516 return CMD_WARNING
;
10519 match
.family
= afi2family (afi
);
10521 if ((safi
== SAFI_MPLS_VPN
) || (safi
== SAFI_ENCAP
) || (safi
== SAFI_EVPN
))
10523 for (rn
= bgp_table_top (bgp
->rib
[AFI_IP
][safi
]); rn
; rn
= bgp_route_next (rn
))
10525 if (prd
&& memcmp (rn
->p
.u
.val
, prd
->val
, 8) != 0)
10528 if ((table
= rn
->info
) != NULL
)
10529 if ((rm
= bgp_node_match (table
, &match
)) != NULL
)
10531 if (! prefix_check
|| rm
->p
.prefixlen
== match
.prefixlen
)
10536 if (ri
->extra
&& ri
->extra
->damp_info
)
10538 ri_temp
= ri
->next
;
10539 bgp_damp_info_free (ri
->extra
->damp_info
, 1);
10547 bgp_unlock_node (rm
);
10553 if ((rn
= bgp_node_match (bgp
->rib
[afi
][safi
], &match
)) != NULL
)
10555 if (! prefix_check
|| rn
->p
.prefixlen
== match
.prefixlen
)
10560 if (ri
->extra
&& ri
->extra
->damp_info
)
10562 ri_temp
= ri
->next
;
10563 bgp_damp_info_free (ri
->extra
->damp_info
, 1);
10571 bgp_unlock_node (rn
);
10575 return CMD_SUCCESS
;
10578 DEFUN (clear_ip_bgp_dampening
,
10579 clear_ip_bgp_dampening_cmd
,
10580 "clear ip bgp dampening",
10584 "Clear route flap dampening information\n")
10586 bgp_damp_info_clean ();
10587 return CMD_SUCCESS
;
10590 DEFUN (clear_ip_bgp_dampening_prefix
,
10591 clear_ip_bgp_dampening_prefix_cmd
,
10592 "clear ip bgp dampening A.B.C.D/M",
10596 "Clear route flap dampening information\n"
10599 int idx_ipv4_prefixlen
= 4;
10600 return bgp_clear_damp_route (vty
, NULL
, argv
[idx_ipv4_prefixlen
]->arg
, AFI_IP
,
10601 SAFI_UNICAST
, NULL
, 1);
10604 DEFUN (clear_ip_bgp_dampening_address
,
10605 clear_ip_bgp_dampening_address_cmd
,
10606 "clear ip bgp dampening A.B.C.D",
10610 "Clear route flap dampening information\n"
10611 "Network to clear damping information\n")
10614 return bgp_clear_damp_route (vty
, NULL
, argv
[idx_ipv4
]->arg
, AFI_IP
,
10615 SAFI_UNICAST
, NULL
, 0);
10618 DEFUN (clear_ip_bgp_dampening_address_mask
,
10619 clear_ip_bgp_dampening_address_mask_cmd
,
10620 "clear ip bgp dampening A.B.C.D A.B.C.D",
10624 "Clear route flap dampening information\n"
10625 "Network to clear damping information\n"
10629 int idx_ipv4_2
= 5;
10631 char prefix_str
[BUFSIZ
];
10633 ret
= netmask_str2prefix_str (argv
[idx_ipv4
]->arg
, argv
[idx_ipv4_2
]->arg
, prefix_str
);
10636 vty_out (vty
, "%% Inconsistent address and mask%s", VTY_NEWLINE
);
10637 return CMD_WARNING
;
10640 return bgp_clear_damp_route (vty
, NULL
, prefix_str
, AFI_IP
,
10641 SAFI_UNICAST
, NULL
, 0);
10644 /* also used for encap safi */
10646 bgp_config_write_network_vpn (struct vty
*vty
, struct bgp
*bgp
,
10647 afi_t afi
, safi_t safi
, int *write
)
10649 struct bgp_node
*prn
;
10650 struct bgp_node
*rn
;
10651 struct bgp_table
*table
;
10653 struct prefix_rd
*prd
;
10654 struct bgp_static
*bgp_static
;
10656 char buf
[SU_ADDRSTRLEN
];
10657 char rdbuf
[RD_ADDRSTRLEN
];
10659 /* Network configuration. */
10660 for (prn
= bgp_table_top (bgp
->route
[afi
][safi
]); prn
; prn
= bgp_route_next (prn
))
10661 if ((table
= prn
->info
) != NULL
)
10662 for (rn
= bgp_table_top (table
); rn
; rn
= bgp_route_next (rn
))
10663 if ((bgp_static
= rn
->info
) != NULL
)
10666 prd
= (struct prefix_rd
*) &prn
->p
;
10668 /* "address-family" display. */
10669 bgp_config_write_family_header (vty
, afi
, safi
, write
);
10671 /* "network" configuration display. */
10672 prefix_rd2str (prd
, rdbuf
, RD_ADDRSTRLEN
);
10673 label
= decode_label (bgp_static
->tag
);
10675 vty_out (vty
, " network %s/%d rd %s label %d",
10676 inet_ntop (p
->family
, &p
->u
.prefix
, buf
, SU_ADDRSTRLEN
),
10679 if (bgp_static
->rmap
.name
)
10680 vty_out (vty
, " route-map %s", bgp_static
->rmap
.name
);
10683 if (bgp_static
->backdoor
)
10684 vty_out (vty
, " backdoor");
10686 vty_out (vty
, "%s", VTY_NEWLINE
);
10692 bgp_config_write_network_evpn (struct vty
*vty
, struct bgp
*bgp
,
10693 afi_t afi
, safi_t safi
, int *write
)
10695 struct bgp_node
*prn
;
10696 struct bgp_node
*rn
;
10697 struct bgp_table
*table
;
10699 struct prefix_rd
*prd
;
10700 struct bgp_static
*bgp_static
;
10701 char buf
[PREFIX_STRLEN
];
10702 char buf2
[SU_ADDRSTRLEN
];
10703 char rdbuf
[RD_ADDRSTRLEN
];
10705 /* Network configuration. */
10706 for (prn
= bgp_table_top (bgp
->route
[afi
][safi
]); prn
; prn
= bgp_route_next (prn
))
10707 if ((table
= prn
->info
) != NULL
)
10708 for (rn
= bgp_table_top (table
); rn
; rn
= bgp_route_next (rn
))
10709 if ((bgp_static
= rn
->info
) != NULL
)
10711 char *macrouter
= NULL
;
10714 if(bgp_static
->router_mac
)
10715 macrouter
= prefix_mac2str(bgp_static
->router_mac
, NULL
, 0);
10716 if(bgp_static
->eth_s_id
)
10717 esi
= esi2str(bgp_static
->eth_s_id
);
10719 prd
= (struct prefix_rd
*) &prn
->p
;
10721 /* "address-family" display. */
10722 bgp_config_write_family_header (vty
, afi
, safi
, write
);
10724 /* "network" configuration display. */
10725 prefix_rd2str (prd
, rdbuf
, RD_ADDRSTRLEN
);
10727 inet_ntop (AF_INET
, &bgp_static
->igpnexthop
, buf2
, SU_ADDRSTRLEN
);
10729 prefix2str (p
, buf
, sizeof (buf
)),
10730 vty_out (vty
, " network %s rd %s ethtag %u tag %u esi %s gwip %s routermac %s",
10731 buf
, rdbuf
, p
->u
.prefix_evpn
.eth_tag
,
10732 decode_label (bgp_static
->tag
), esi
, buf2
, macrouter
);
10733 vty_out (vty
, "%s", VTY_NEWLINE
);
10735 XFREE (MTYPE_TMP
, macrouter
);
10737 XFREE (MTYPE_TMP
, esi
);
10742 /* Configuration of static route announcement and aggregate
10745 bgp_config_write_network (struct vty
*vty
, struct bgp
*bgp
,
10746 afi_t afi
, safi_t safi
, int *write
)
10748 struct bgp_node
*rn
;
10750 struct bgp_static
*bgp_static
;
10751 struct bgp_aggregate
*bgp_aggregate
;
10752 char buf
[SU_ADDRSTRLEN
];
10754 if ((safi
== SAFI_MPLS_VPN
) || (safi
== SAFI_ENCAP
))
10755 return bgp_config_write_network_vpn (vty
, bgp
, afi
, safi
, write
);
10757 if (afi
== AFI_L2VPN
&& safi
== SAFI_EVPN
)
10758 return bgp_config_write_network_evpn (vty
, bgp
, afi
, safi
, write
);
10760 /* Network configuration. */
10761 for (rn
= bgp_table_top (bgp
->route
[afi
][safi
]); rn
; rn
= bgp_route_next (rn
))
10762 if ((bgp_static
= rn
->info
) != NULL
)
10766 /* "address-family" display. */
10767 bgp_config_write_family_header (vty
, afi
, safi
, write
);
10769 /* "network" configuration display. */
10770 if (bgp_option_check (BGP_OPT_CONFIG_CISCO
) && afi
== AFI_IP
)
10772 u_int32_t destination
;
10773 struct in_addr netmask
;
10775 destination
= ntohl (p
->u
.prefix4
.s_addr
);
10776 masklen2ip (p
->prefixlen
, &netmask
);
10777 vty_out (vty
, " network %s",
10778 inet_ntop (p
->family
, &p
->u
.prefix
, buf
, SU_ADDRSTRLEN
));
10780 if ((IN_CLASSC (destination
) && p
->prefixlen
== 24)
10781 || (IN_CLASSB (destination
) && p
->prefixlen
== 16)
10782 || (IN_CLASSA (destination
) && p
->prefixlen
== 8)
10783 || p
->u
.prefix4
.s_addr
== 0)
10785 /* Natural mask is not display. */
10788 vty_out (vty
, " mask %s", inet_ntoa (netmask
));
10792 vty_out (vty
, " network %s/%d",
10793 inet_ntop (p
->family
, &p
->u
.prefix
, buf
, SU_ADDRSTRLEN
),
10797 if (bgp_static
->label_index
!= BGP_INVALID_LABEL_INDEX
)
10798 vty_out (vty
, " label-index %u", bgp_static
->label_index
);
10800 if (bgp_static
->rmap
.name
)
10801 vty_out (vty
, " route-map %s", bgp_static
->rmap
.name
);
10804 if (bgp_static
->backdoor
)
10805 vty_out (vty
, " backdoor");
10808 vty_out (vty
, "%s", VTY_NEWLINE
);
10811 /* Aggregate-address configuration. */
10812 for (rn
= bgp_table_top (bgp
->aggregate
[afi
][safi
]); rn
; rn
= bgp_route_next (rn
))
10813 if ((bgp_aggregate
= rn
->info
) != NULL
)
10817 /* "address-family" display. */
10818 bgp_config_write_family_header (vty
, afi
, safi
, write
);
10820 if (bgp_option_check (BGP_OPT_CONFIG_CISCO
) && afi
== AFI_IP
)
10822 struct in_addr netmask
;
10824 masklen2ip (p
->prefixlen
, &netmask
);
10825 vty_out (vty
, " aggregate-address %s %s",
10826 inet_ntop (p
->family
, &p
->u
.prefix
, buf
, SU_ADDRSTRLEN
),
10827 inet_ntoa (netmask
));
10831 vty_out (vty
, " aggregate-address %s/%d",
10832 inet_ntop (p
->family
, &p
->u
.prefix
, buf
, SU_ADDRSTRLEN
),
10836 if (bgp_aggregate
->as_set
)
10837 vty_out (vty
, " as-set");
10839 if (bgp_aggregate
->summary_only
)
10840 vty_out (vty
, " summary-only");
10842 vty_out (vty
, "%s", VTY_NEWLINE
);
10849 bgp_config_write_distance (struct vty
*vty
, struct bgp
*bgp
, afi_t afi
,
10850 safi_t safi
, int *write
)
10852 struct bgp_node
*rn
;
10853 struct bgp_distance
*bdistance
;
10855 /* Distance configuration. */
10856 if (bgp
->distance_ebgp
[afi
][safi
]
10857 && bgp
->distance_ibgp
[afi
][safi
]
10858 && bgp
->distance_local
[afi
][safi
]
10859 && (bgp
->distance_ebgp
[afi
][safi
] != ZEBRA_EBGP_DISTANCE_DEFAULT
10860 || bgp
->distance_ibgp
[afi
][safi
] != ZEBRA_IBGP_DISTANCE_DEFAULT
10861 || bgp
->distance_local
[afi
][safi
] != ZEBRA_IBGP_DISTANCE_DEFAULT
))
10863 bgp_config_write_family_header (vty
, afi
, safi
, write
);
10864 vty_out (vty
, " distance bgp %d %d %d%s",
10865 bgp
->distance_ebgp
[afi
][safi
], bgp
->distance_ibgp
[afi
][safi
],
10866 bgp
->distance_local
[afi
][safi
], VTY_NEWLINE
);
10869 for (rn
= bgp_table_top (bgp_distance_table
[afi
][safi
]); rn
;
10870 rn
= bgp_route_next (rn
))
10871 if ((bdistance
= rn
->info
) != NULL
)
10873 char buf
[PREFIX_STRLEN
];
10875 bgp_config_write_family_header (vty
, afi
, safi
, write
);
10876 vty_out (vty
, " distance %d %s %s%s", bdistance
->distance
,
10877 prefix2str (&rn
->p
, buf
, sizeof (buf
)),
10878 bdistance
->access_list
? bdistance
->access_list
: "",
10885 /* Allocate routing table structure and install commands. */
10887 bgp_route_init (void)
10892 /* Init BGP distance table. */
10893 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++)
10894 for (safi
= SAFI_UNICAST
; safi
< SAFI_MAX
; safi
++)
10895 bgp_distance_table
[afi
][safi
] = bgp_table_init (afi
, safi
);
10897 /* IPv4 BGP commands. */
10898 install_element (BGP_NODE
, &bgp_table_map_cmd
);
10899 install_element (BGP_NODE
, &bgp_network_cmd
);
10900 install_element (BGP_NODE
, &bgp_network_mask_cmd
);
10901 install_element (BGP_NODE
, &bgp_network_mask_natural_cmd
);
10902 install_element (BGP_NODE
, &bgp_network_route_map_cmd
);
10903 install_element (BGP_NODE
, &bgp_network_mask_route_map_cmd
);
10904 install_element (BGP_NODE
, &bgp_network_mask_natural_route_map_cmd
);
10905 install_element (BGP_NODE
, &bgp_network_backdoor_cmd
);
10906 install_element (BGP_NODE
, &bgp_network_mask_backdoor_cmd
);
10907 install_element (BGP_NODE
, &bgp_network_mask_natural_backdoor_cmd
);
10908 install_element (BGP_NODE
, &no_bgp_table_map_cmd
);
10909 install_element (BGP_NODE
, &no_bgp_network_cmd
);
10910 install_element (BGP_NODE
, &no_bgp_network_mask_cmd
);
10911 install_element (BGP_NODE
, &no_bgp_network_mask_natural_cmd
);
10913 install_element (BGP_NODE
, &aggregate_address_cmd
);
10914 install_element (BGP_NODE
, &aggregate_address_mask_cmd
);
10915 install_element (BGP_NODE
, &no_aggregate_address_cmd
);
10916 install_element (BGP_NODE
, &no_aggregate_address_mask_cmd
);
10918 /* IPv4 unicast configuration. */
10919 install_element (BGP_IPV4_NODE
, &bgp_table_map_cmd
);
10920 install_element (BGP_IPV4_NODE
, &bgp_network_cmd
);
10921 install_element (BGP_IPV4_NODE
, &bgp_network_mask_cmd
);
10922 install_element (BGP_IPV4_NODE
, &bgp_network_mask_natural_cmd
);
10923 install_element (BGP_IPV4_NODE
, &bgp_network_route_map_cmd
);
10924 install_element (BGP_IPV4_NODE
, &bgp_network_mask_route_map_cmd
);
10925 install_element (BGP_IPV4_NODE
, &bgp_network_mask_natural_route_map_cmd
);
10926 install_element (BGP_IPV4L_NODE
, &no_bgp_network_label_index_cmd
);
10927 install_element (BGP_IPV4L_NODE
, &no_bgp_network_label_index_route_map_cmd
);
10928 install_element (BGP_IPV4_NODE
, &no_bgp_table_map_cmd
);
10929 install_element (BGP_IPV4_NODE
, &no_bgp_network_cmd
);
10930 install_element (BGP_IPV4_NODE
, &no_bgp_network_mask_cmd
);
10931 install_element (BGP_IPV4_NODE
, &no_bgp_network_mask_natural_cmd
);
10933 install_element (BGP_IPV4_NODE
, &aggregate_address_cmd
);
10934 install_element (BGP_IPV4_NODE
, &aggregate_address_mask_cmd
);
10935 install_element (BGP_IPV4_NODE
, &no_aggregate_address_cmd
);
10936 install_element (BGP_IPV4_NODE
, &no_aggregate_address_mask_cmd
);
10938 /* IPv4 multicast configuration. */
10939 install_element (BGP_IPV4M_NODE
, &bgp_table_map_cmd
);
10940 install_element (BGP_IPV4M_NODE
, &bgp_network_cmd
);
10941 install_element (BGP_IPV4M_NODE
, &bgp_network_mask_cmd
);
10942 install_element (BGP_IPV4M_NODE
, &bgp_network_mask_natural_cmd
);
10943 install_element (BGP_IPV4M_NODE
, &bgp_network_route_map_cmd
);
10944 install_element (BGP_IPV4M_NODE
, &bgp_network_mask_route_map_cmd
);
10945 install_element (BGP_IPV4M_NODE
, &bgp_network_mask_natural_route_map_cmd
);
10946 install_element (BGP_IPV4M_NODE
, &no_bgp_table_map_cmd
);
10947 install_element (BGP_IPV4M_NODE
, &no_bgp_network_cmd
);
10948 install_element (BGP_IPV4M_NODE
, &no_bgp_network_mask_cmd
);
10949 install_element (BGP_IPV4M_NODE
, &no_bgp_network_mask_natural_cmd
);
10950 install_element (BGP_IPV4M_NODE
, &aggregate_address_cmd
);
10951 install_element (BGP_IPV4M_NODE
, &aggregate_address_mask_cmd
);
10952 install_element (BGP_IPV4M_NODE
, &no_aggregate_address_cmd
);
10953 install_element (BGP_IPV4M_NODE
, &no_aggregate_address_mask_cmd
);
10955 /* IPv4 labeled-unicast configuration. */
10956 install_element (BGP_IPV4L_NODE
, &bgp_table_map_cmd
);
10957 install_element (BGP_IPV4L_NODE
, &bgp_network_cmd
);
10958 install_element (BGP_IPV4L_NODE
, &bgp_network_mask_cmd
);
10959 install_element (BGP_IPV4L_NODE
, &bgp_network_mask_natural_cmd
);
10960 install_element (BGP_IPV4L_NODE
, &bgp_network_route_map_cmd
);
10961 install_element (BGP_IPV4L_NODE
, &bgp_network_mask_route_map_cmd
);
10962 install_element (BGP_IPV4L_NODE
, &bgp_network_mask_natural_route_map_cmd
);
10963 install_element (BGP_IPV4L_NODE
, &bgp_network_label_index_cmd
);
10964 install_element (BGP_IPV4L_NODE
, &bgp_network_label_index_route_map_cmd
);
10965 install_element (BGP_IPV4L_NODE
, &no_bgp_table_map_cmd
);
10966 install_element (BGP_IPV4L_NODE
, &no_bgp_network_cmd
);
10967 install_element (BGP_IPV4L_NODE
, &no_bgp_network_mask_cmd
);
10968 install_element (BGP_IPV4L_NODE
, &no_bgp_network_mask_natural_cmd
);
10970 install_element (VIEW_NODE
, &show_ip_bgp_instance_all_cmd
);
10971 install_element (VIEW_NODE
, &show_ip_bgp_cmd
);
10972 install_element (VIEW_NODE
, &show_ip_bgp_route_cmd
);
10973 install_element (VIEW_NODE
, &show_ip_bgp_regexp_cmd
);
10975 install_element (VIEW_NODE
, &show_ip_bgp_instance_neighbor_advertised_route_cmd
);
10976 install_element (VIEW_NODE
, &show_ip_bgp_neighbor_routes_cmd
);
10977 install_element (VIEW_NODE
, &show_ip_bgp_neighbor_received_prefix_filter_cmd
);
10978 #ifdef KEEP_OLD_VPN_COMMANDS
10979 install_element (VIEW_NODE
, &show_ip_bgp_vpn_all_route_prefix_cmd
);
10980 #endif /* KEEP_OLD_VPN_COMMANDS */
10981 install_element (VIEW_NODE
, &show_bgp_afi_vpn_rd_route_cmd
);
10982 install_element (VIEW_NODE
, &show_ip_bgp_l2vpn_evpn_all_route_prefix_cmd
);
10984 /* BGP dampening clear commands */
10985 install_element (ENABLE_NODE
, &clear_ip_bgp_dampening_cmd
);
10986 install_element (ENABLE_NODE
, &clear_ip_bgp_dampening_prefix_cmd
);
10988 install_element (ENABLE_NODE
, &clear_ip_bgp_dampening_address_cmd
);
10989 install_element (ENABLE_NODE
, &clear_ip_bgp_dampening_address_mask_cmd
);
10992 install_element (ENABLE_NODE
, &show_ip_bgp_instance_neighbor_prefix_counts_cmd
);
10993 #ifdef KEEP_OLD_VPN_COMMANDS
10994 install_element (ENABLE_NODE
, &show_ip_bgp_vpn_neighbor_prefix_counts_cmd
);
10995 #endif /* KEEP_OLD_VPN_COMMANDS */
10997 /* New config IPv6 BGP commands. */
10998 install_element (BGP_IPV6_NODE
, &bgp_table_map_cmd
);
10999 install_element (BGP_IPV6_NODE
, &ipv6_bgp_network_cmd
);
11000 install_element (BGP_IPV6_NODE
, &ipv6_bgp_network_route_map_cmd
);
11001 install_element (BGP_IPV6_NODE
, &no_bgp_table_map_cmd
);
11002 install_element (BGP_IPV6_NODE
, &no_ipv6_bgp_network_cmd
);
11003 install_element (BGP_IPV6_NODE
, &ipv6_bgp_network_label_index_cmd
);
11004 install_element (BGP_IPV6_NODE
, &no_ipv6_bgp_network_label_index_cmd
);
11005 install_element (BGP_IPV6_NODE
, &ipv6_bgp_network_label_index_route_map_cmd
);
11006 install_element (BGP_IPV6_NODE
, &no_ipv6_bgp_network_label_index_route_map_cmd
);
11008 install_element (BGP_IPV6_NODE
, &ipv6_aggregate_address_cmd
);
11009 install_element (BGP_IPV6_NODE
, &no_ipv6_aggregate_address_cmd
);
11011 install_element (BGP_IPV6M_NODE
, &ipv6_bgp_network_cmd
);
11012 install_element (BGP_IPV6M_NODE
, &no_ipv6_bgp_network_cmd
);
11014 install_element (BGP_IPV6L_NODE
, &bgp_table_map_cmd
);
11015 install_element (BGP_IPV6L_NODE
, &ipv6_bgp_network_cmd
);
11016 install_element (BGP_IPV6L_NODE
, &ipv6_bgp_network_route_map_cmd
);
11017 install_element (BGP_IPV6L_NODE
, &no_bgp_table_map_cmd
);
11018 install_element (BGP_IPV6L_NODE
, &no_ipv6_bgp_network_cmd
);
11020 install_element (BGP_NODE
, &bgp_distance_cmd
);
11021 install_element (BGP_NODE
, &no_bgp_distance_cmd
);
11022 install_element (BGP_NODE
, &bgp_distance_source_cmd
);
11023 install_element (BGP_NODE
, &no_bgp_distance_source_cmd
);
11024 install_element (BGP_NODE
, &bgp_distance_source_access_list_cmd
);
11025 install_element (BGP_NODE
, &no_bgp_distance_source_access_list_cmd
);
11026 install_element (BGP_IPV4_NODE
, &bgp_distance_cmd
);
11027 install_element (BGP_IPV4_NODE
, &no_bgp_distance_cmd
);
11028 install_element (BGP_IPV4_NODE
, &bgp_distance_source_cmd
);
11029 install_element (BGP_IPV4_NODE
, &no_bgp_distance_source_cmd
);
11030 install_element (BGP_IPV4_NODE
, &bgp_distance_source_access_list_cmd
);
11031 install_element (BGP_IPV4_NODE
, &no_bgp_distance_source_access_list_cmd
);
11032 install_element (BGP_IPV4M_NODE
, &bgp_distance_cmd
);
11033 install_element (BGP_IPV4M_NODE
, &no_bgp_distance_cmd
);
11034 install_element (BGP_IPV4M_NODE
, &bgp_distance_source_cmd
);
11035 install_element (BGP_IPV4M_NODE
, &no_bgp_distance_source_cmd
);
11036 install_element (BGP_IPV4M_NODE
, &bgp_distance_source_access_list_cmd
);
11037 install_element (BGP_IPV4M_NODE
, &no_bgp_distance_source_access_list_cmd
);
11038 install_element (BGP_IPV6_NODE
, &bgp_distance_cmd
);
11039 install_element (BGP_IPV6_NODE
, &no_bgp_distance_cmd
);
11040 install_element (BGP_IPV6_NODE
, &ipv6_bgp_distance_source_cmd
);
11041 install_element (BGP_IPV6_NODE
, &no_ipv6_bgp_distance_source_cmd
);
11042 install_element (BGP_IPV6_NODE
, &ipv6_bgp_distance_source_access_list_cmd
);
11043 install_element (BGP_IPV6_NODE
, &no_ipv6_bgp_distance_source_access_list_cmd
);
11044 install_element (BGP_IPV6M_NODE
, &bgp_distance_cmd
);
11045 install_element (BGP_IPV6M_NODE
, &no_bgp_distance_cmd
);
11046 install_element (BGP_IPV6M_NODE
, &ipv6_bgp_distance_source_cmd
);
11047 install_element (BGP_IPV6M_NODE
, &no_ipv6_bgp_distance_source_cmd
);
11048 install_element (BGP_IPV6M_NODE
, &ipv6_bgp_distance_source_access_list_cmd
);
11049 install_element (BGP_IPV6M_NODE
, &no_ipv6_bgp_distance_source_access_list_cmd
);
11051 install_element (BGP_NODE
, &bgp_damp_set_cmd
);
11052 install_element (BGP_NODE
, &bgp_damp_unset_cmd
);
11053 install_element (BGP_IPV4_NODE
, &bgp_damp_set_cmd
);
11054 install_element (BGP_IPV4_NODE
, &bgp_damp_unset_cmd
);
11056 /* IPv4 Multicast Mode */
11057 install_element (BGP_IPV4M_NODE
, &bgp_damp_set_cmd
);
11058 install_element (BGP_IPV4M_NODE
, &bgp_damp_unset_cmd
);
11060 /* Large Communities */
11061 install_element (VIEW_NODE
, &show_ip_bgp_large_community_list_cmd
);
11062 install_element (VIEW_NODE
, &show_ip_bgp_large_community_cmd
);
11066 bgp_route_finish (void)
11071 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++)
11072 for (safi
= SAFI_UNICAST
; safi
< SAFI_MAX
; safi
++)
11074 bgp_table_unlock (bgp_distance_table
[afi
][safi
]);
11075 bgp_distance_table
[afi
][safi
] = NULL
;