1 /* BGP-4, BGP-4+ daemon program
2 * Copyright (C) 1996, 97, 98, 99, 2000 Kunihiro Ishiguro
4 * This file is part of GNU Zebra.
6 * GNU Zebra is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the
8 * Free Software Foundation; either version 2, or (at your option) any
11 * GNU Zebra is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * General Public License for more details.
16 * You should have received a copy of the GNU General Public License along
17 * with this program; see the file COPYING; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
29 #include "sockunion.h"
38 #include "workqueue.h"
46 #include "frr_pthread.h"
49 #include "bgpd/bgpd.h"
50 #include "bgpd/bgp_table.h"
51 #include "bgpd/bgp_aspath.h"
52 #include "bgpd/bgp_route.h"
53 #include "bgpd/bgp_dump.h"
54 #include "bgpd/bgp_debug.h"
55 #include "bgpd/bgp_errors.h"
56 #include "bgpd/bgp_community.h"
57 #include "bgpd/bgp_attr.h"
58 #include "bgpd/bgp_regex.h"
59 #include "bgpd/bgp_clist.h"
60 #include "bgpd/bgp_fsm.h"
61 #include "bgpd/bgp_packet.h"
62 #include "bgpd/bgp_zebra.h"
63 #include "bgpd/bgp_open.h"
64 #include "bgpd/bgp_filter.h"
65 #include "bgpd/bgp_nexthop.h"
66 #include "bgpd/bgp_damp.h"
67 #include "bgpd/bgp_mplsvpn.h"
69 #include "bgpd/rfapi/bgp_rfapi_cfg.h"
70 #include "bgpd/rfapi/rfapi_backend.h"
72 #include "bgpd/bgp_evpn.h"
73 #include "bgpd/bgp_advertise.h"
74 #include "bgpd/bgp_network.h"
75 #include "bgpd/bgp_vty.h"
76 #include "bgpd/bgp_mpath.h"
77 #include "bgpd/bgp_nht.h"
78 #include "bgpd/bgp_updgrp.h"
79 #include "bgpd/bgp_bfd.h"
80 #include "bgpd/bgp_memory.h"
81 #include "bgpd/bgp_evpn_vty.h"
82 #include "bgpd/bgp_keepalives.h"
83 #include "bgpd/bgp_io.h"
84 #include "bgpd/bgp_ecommunity.h"
85 #include "bgpd/bgp_flowspec.h"
86 #include "bgpd/bgp_labelpool.h"
87 #include "bgpd/bgp_pbr.h"
88 #include "bgpd/bgp_addpath.h"
89 #include "bgpd/bgp_evpn_private.h"
90 #include "bgpd/bgp_evpn_mh.h"
91 #include "bgpd/bgp_mac.h"
93 DEFINE_MTYPE_STATIC(BGPD
, PEER_TX_SHUTDOWN_MSG
, "Peer shutdown message (TX)");
94 DEFINE_MTYPE_STATIC(BGPD
, BGP_EVPN_INFO
, "BGP EVPN instance information");
95 DEFINE_QOBJ_TYPE(bgp_master
)
97 DEFINE_QOBJ_TYPE(peer
)
98 DEFINE_HOOK(bgp_inst_delete
, (struct bgp
*bgp
), (bgp
))
100 /* BGP process wide configuration. */
101 static struct bgp_master bgp_master
;
103 /* BGP process wide configuration pointer to export. */
104 struct bgp_master
*bm
;
106 /* BGP community-list. */
107 struct community_list_handler
*bgp_clist
;
109 unsigned int multipath_num
= MULTIPATH_NUM
;
111 static void bgp_if_finish(struct bgp
*bgp
);
112 static void peer_drop_dynamic_neighbor(struct peer
*peer
);
114 extern struct zclient
*zclient
;
116 /* handle main socket creation or deletion */
117 static int bgp_check_main_socket(bool create
, struct bgp
*bgp
)
119 static int bgp_server_main_created
;
122 if (bgp_server_main_created
)
124 if (bgp_socket(bgp
, bm
->port
, bm
->address
) < 0)
125 return BGP_ERR_INVALID_VALUE
;
126 bgp_server_main_created
= 1;
129 if (!bgp_server_main_created
)
132 bgp_server_main_created
= 0;
136 void bgp_session_reset(struct peer
*peer
)
138 if (peer
->doppelganger
&& (peer
->doppelganger
->status
!= Deleted
)
139 && !(CHECK_FLAG(peer
->doppelganger
->flags
, PEER_FLAG_CONFIG_NODE
)))
140 peer_delete(peer
->doppelganger
);
142 BGP_EVENT_ADD(peer
, BGP_Stop
);
146 * During session reset, we may delete the doppelganger peer, which would
147 * be the next node to the current node. If the session reset was invoked
148 * during walk of peer list, we would end up accessing the freed next
149 * node. This function moves the next node along.
151 static void bgp_session_reset_safe(struct peer
*peer
, struct listnode
**nnode
)
156 n
= (nnode
) ? *nnode
: NULL
;
157 npeer
= (n
) ? listgetdata(n
) : NULL
;
159 if (peer
->doppelganger
&& (peer
->doppelganger
->status
!= Deleted
)
160 && !(CHECK_FLAG(peer
->doppelganger
->flags
,
161 PEER_FLAG_CONFIG_NODE
))) {
162 if (peer
->doppelganger
== npeer
)
163 /* nnode and *nnode are confirmed to be non-NULL here */
164 *nnode
= (*nnode
)->next
;
165 peer_delete(peer
->doppelganger
);
168 BGP_EVENT_ADD(peer
, BGP_Stop
);
171 /* BGP global flag manipulation. */
172 int bgp_option_set(int flag
)
176 case BGP_OPT_NO_LISTEN
:
177 case BGP_OPT_NO_ZEBRA
:
178 SET_FLAG(bm
->options
, flag
);
181 return BGP_ERR_INVALID_FLAG
;
186 int bgp_option_unset(int flag
)
190 case BGP_OPT_NO_ZEBRA
:
192 UNSET_FLAG(bm
->options
, flag
);
195 return BGP_ERR_INVALID_FLAG
;
200 int bgp_option_check(int flag
)
202 return CHECK_FLAG(bm
->options
, flag
);
205 /* Internal function to set BGP structure configureation flag. */
206 static void bgp_config_set(struct bgp
*bgp
, int config
)
208 SET_FLAG(bgp
->config
, config
);
211 static void bgp_config_unset(struct bgp
*bgp
, int config
)
213 UNSET_FLAG(bgp
->config
, config
);
216 static int bgp_config_check(struct bgp
*bgp
, int config
)
218 return CHECK_FLAG(bgp
->config
, config
);
221 /* Set BGP router identifier; distinguish between explicit config and other
224 static int bgp_router_id_set(struct bgp
*bgp
, const struct in_addr
*id
,
228 struct listnode
*node
, *nnode
;
230 if (IPV4_ADDR_SAME(&bgp
->router_id
, id
))
233 /* EVPN uses router id in RD, withdraw them */
234 if (is_evpn_enabled())
235 bgp_evpn_handle_router_id_update(bgp
, true);
237 vpn_handle_router_id_update(bgp
, true, is_config
);
239 IPV4_ADDR_COPY(&bgp
->router_id
, id
);
241 /* Set all peer's local identifier with this value. */
242 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
243 IPV4_ADDR_COPY(&peer
->local_id
, id
);
245 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
246 peer
->last_reset
= PEER_DOWN_RID_CHANGE
;
247 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
248 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
252 /* EVPN uses router id in RD, update them */
253 if (is_evpn_enabled())
254 bgp_evpn_handle_router_id_update(bgp
, false);
256 vpn_handle_router_id_update(bgp
, false, is_config
);
261 void bgp_router_id_zebra_bump(vrf_id_t vrf_id
, const struct prefix
*router_id
)
263 struct listnode
*node
, *nnode
;
265 struct in_addr
*addr
= NULL
;
267 if (router_id
!= NULL
)
268 addr
= (struct in_addr
*)&(router_id
->u
.prefix4
);
270 if (vrf_id
== VRF_DEFAULT
) {
271 /* Router-id change for default VRF has to also update all
273 for (ALL_LIST_ELEMENTS(bm
->bgp
, node
, nnode
, bgp
)) {
274 if (bgp
->inst_type
== BGP_INSTANCE_TYPE_VRF
)
278 bgp
->router_id_zebra
= *addr
;
280 addr
= &bgp
->router_id_zebra
;
282 if (!bgp
->router_id_static
.s_addr
) {
283 /* Router ID is updated if there are no active
286 if (bgp
->established_peers
== 0) {
287 if (BGP_DEBUG(zebra
, ZEBRA
))
289 "RID change : vrf %s(%u), RTR ID %s",
293 bgp_router_id_set(bgp
, addr
, false);
298 bgp
= bgp_lookup_by_vrf_id(vrf_id
);
301 bgp
->router_id_zebra
= *addr
;
303 addr
= &bgp
->router_id_zebra
;
305 if (!bgp
->router_id_static
.s_addr
) {
306 /* Router ID is updated if there are no active
309 if (bgp
->established_peers
== 0) {
310 if (BGP_DEBUG(zebra
, ZEBRA
))
312 "RID change : vrf %s(%u), RTR ID %s",
316 bgp_router_id_set(bgp
, addr
, false);
324 void bgp_router_id_static_set(struct bgp
*bgp
, struct in_addr id
)
326 bgp
->router_id_static
= id
;
327 bgp_router_id_set(bgp
,
328 id
.s_addr
!= INADDR_ANY
? &id
: &bgp
->router_id_zebra
,
329 true /* is config */);
332 /* BGP's cluster-id control. */
333 int bgp_cluster_id_set(struct bgp
*bgp
, struct in_addr
*cluster_id
)
336 struct listnode
*node
, *nnode
;
338 if (bgp_config_check(bgp
, BGP_CONFIG_CLUSTER_ID
)
339 && IPV4_ADDR_SAME(&bgp
->cluster_id
, cluster_id
))
342 IPV4_ADDR_COPY(&bgp
->cluster_id
, cluster_id
);
343 bgp_config_set(bgp
, BGP_CONFIG_CLUSTER_ID
);
345 /* Clear all IBGP peer. */
346 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
347 if (peer
->sort
!= BGP_PEER_IBGP
)
350 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
351 peer
->last_reset
= PEER_DOWN_CLID_CHANGE
;
352 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
353 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
359 int bgp_cluster_id_unset(struct bgp
*bgp
)
362 struct listnode
*node
, *nnode
;
364 if (!bgp_config_check(bgp
, BGP_CONFIG_CLUSTER_ID
))
367 bgp
->cluster_id
.s_addr
= 0;
368 bgp_config_unset(bgp
, BGP_CONFIG_CLUSTER_ID
);
370 /* Clear all IBGP peer. */
371 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
372 if (peer
->sort
!= BGP_PEER_IBGP
)
375 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
376 peer
->last_reset
= PEER_DOWN_CLID_CHANGE
;
377 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
378 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
384 /* time_t value that is monotonicly increasing
385 * and uneffected by adjustments to system clock
387 time_t bgp_clock(void)
395 /* BGP timer configuration. */
396 void bgp_timers_set(struct bgp
*bgp
, uint32_t keepalive
, uint32_t holdtime
,
397 uint32_t connect_retry
)
399 bgp
->default_keepalive
=
400 (keepalive
< holdtime
/ 3 ? keepalive
: holdtime
/ 3);
401 bgp
->default_holdtime
= holdtime
;
402 bgp
->default_connect_retry
= connect_retry
;
405 /* mostly for completeness - CLI uses its own defaults */
406 void bgp_timers_unset(struct bgp
*bgp
)
408 bgp
->default_keepalive
= BGP_DEFAULT_KEEPALIVE
;
409 bgp
->default_holdtime
= BGP_DEFAULT_HOLDTIME
;
410 bgp
->default_connect_retry
= BGP_DEFAULT_CONNECT_RETRY
;
413 /* BGP confederation configuration. */
414 int bgp_confederation_id_set(struct bgp
*bgp
, as_t as
)
417 struct listnode
*node
, *nnode
;
421 return BGP_ERR_INVALID_AS
;
423 /* Remember - were we doing confederation before? */
424 already_confed
= bgp_config_check(bgp
, BGP_CONFIG_CONFEDERATION
);
426 bgp_config_set(bgp
, BGP_CONFIG_CONFEDERATION
);
428 /* If we were doing confederation already, this is just an external
429 AS change. Just Reset EBGP sessions, not CONFED sessions. If we
430 were not doing confederation before, reset all EBGP sessions. */
431 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
432 bgp_peer_sort_t ptype
= peer_sort(peer
);
434 /* We're looking for peers who's AS is not local or part of our
436 if (already_confed
) {
437 if (ptype
== BGP_PEER_EBGP
) {
439 if (BGP_IS_VALID_STATE_FOR_NOTIF(
442 PEER_DOWN_CONFED_ID_CHANGE
;
444 peer
, BGP_NOTIFY_CEASE
,
445 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
447 bgp_session_reset_safe(peer
, &nnode
);
450 /* Not doign confederation before, so reset every
453 if (ptype
!= BGP_PEER_IBGP
) {
454 /* Reset the local_as to be our EBGP one */
455 if (ptype
== BGP_PEER_EBGP
)
457 if (BGP_IS_VALID_STATE_FOR_NOTIF(
460 PEER_DOWN_CONFED_ID_CHANGE
;
462 peer
, BGP_NOTIFY_CEASE
,
463 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
465 bgp_session_reset_safe(peer
, &nnode
);
472 int bgp_confederation_id_unset(struct bgp
*bgp
)
475 struct listnode
*node
, *nnode
;
478 bgp_config_unset(bgp
, BGP_CONFIG_CONFEDERATION
);
480 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
481 /* We're looking for peers who's AS is not local */
482 if (peer_sort(peer
) != BGP_PEER_IBGP
) {
483 peer
->local_as
= bgp
->as
;
484 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
485 peer
->last_reset
= PEER_DOWN_CONFED_ID_CHANGE
;
486 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
487 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
491 bgp_session_reset_safe(peer
, &nnode
);
497 /* Is an AS part of the confed or not? */
498 bool bgp_confederation_peers_check(struct bgp
*bgp
, as_t as
)
505 for (i
= 0; i
< bgp
->confed_peers_cnt
; i
++)
506 if (bgp
->confed_peers
[i
] == as
)
512 /* Add an AS to the confederation set. */
513 int bgp_confederation_peers_add(struct bgp
*bgp
, as_t as
)
516 struct listnode
*node
, *nnode
;
519 return BGP_ERR_INVALID_BGP
;
522 return BGP_ERR_INVALID_AS
;
524 if (bgp_confederation_peers_check(bgp
, as
))
527 if (bgp
->confed_peers
)
529 XREALLOC(MTYPE_BGP_CONFED_LIST
, bgp
->confed_peers
,
530 (bgp
->confed_peers_cnt
+ 1) * sizeof(as_t
));
533 XMALLOC(MTYPE_BGP_CONFED_LIST
,
534 (bgp
->confed_peers_cnt
+ 1) * sizeof(as_t
));
536 bgp
->confed_peers
[bgp
->confed_peers_cnt
] = as
;
537 bgp
->confed_peers_cnt
++;
539 if (bgp_config_check(bgp
, BGP_CONFIG_CONFEDERATION
)) {
540 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
541 if (peer
->as
== as
) {
542 peer
->local_as
= bgp
->as
;
543 if (BGP_IS_VALID_STATE_FOR_NOTIF(
546 PEER_DOWN_CONFED_PEER_CHANGE
;
548 peer
, BGP_NOTIFY_CEASE
,
549 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
551 bgp_session_reset_safe(peer
, &nnode
);
558 /* Delete an AS from the confederation set. */
559 int bgp_confederation_peers_remove(struct bgp
*bgp
, as_t as
)
564 struct listnode
*node
, *nnode
;
569 if (!bgp_confederation_peers_check(bgp
, as
))
572 for (i
= 0; i
< bgp
->confed_peers_cnt
; i
++)
573 if (bgp
->confed_peers
[i
] == as
)
574 for (j
= i
+ 1; j
< bgp
->confed_peers_cnt
; j
++)
575 bgp
->confed_peers
[j
- 1] = bgp
->confed_peers
[j
];
577 bgp
->confed_peers_cnt
--;
579 if (bgp
->confed_peers_cnt
== 0) {
580 if (bgp
->confed_peers
)
581 XFREE(MTYPE_BGP_CONFED_LIST
, bgp
->confed_peers
);
582 bgp
->confed_peers
= NULL
;
585 XREALLOC(MTYPE_BGP_CONFED_LIST
, bgp
->confed_peers
,
586 bgp
->confed_peers_cnt
* sizeof(as_t
));
588 /* Now reset any peer who's remote AS has just been removed from the
590 if (bgp_config_check(bgp
, BGP_CONFIG_CONFEDERATION
)) {
591 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
592 if (peer
->as
== as
) {
593 peer
->local_as
= bgp
->confed_id
;
594 if (BGP_IS_VALID_STATE_FOR_NOTIF(
597 PEER_DOWN_CONFED_PEER_CHANGE
;
599 peer
, BGP_NOTIFY_CEASE
,
600 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
602 bgp_session_reset_safe(peer
, &nnode
);
610 /* Local preference configuration. */
611 int bgp_default_local_preference_set(struct bgp
*bgp
, uint32_t local_pref
)
616 bgp
->default_local_pref
= local_pref
;
621 int bgp_default_local_preference_unset(struct bgp
*bgp
)
626 bgp
->default_local_pref
= BGP_DEFAULT_LOCAL_PREF
;
631 /* Local preference configuration. */
632 int bgp_default_subgroup_pkt_queue_max_set(struct bgp
*bgp
, uint32_t queue_size
)
637 bgp
->default_subgroup_pkt_queue_max
= queue_size
;
642 int bgp_default_subgroup_pkt_queue_max_unset(struct bgp
*bgp
)
646 bgp
->default_subgroup_pkt_queue_max
=
647 BGP_DEFAULT_SUBGROUP_PKT_QUEUE_MAX
;
652 /* Listen limit configuration. */
653 int bgp_listen_limit_set(struct bgp
*bgp
, int listen_limit
)
658 bgp
->dynamic_neighbors_limit
= listen_limit
;
663 int bgp_listen_limit_unset(struct bgp
*bgp
)
668 bgp
->dynamic_neighbors_limit
= BGP_DYNAMIC_NEIGHBORS_LIMIT_DEFAULT
;
673 int bgp_map_afi_safi_iana2int(iana_afi_t pkt_afi
, iana_safi_t pkt_safi
,
674 afi_t
*afi
, safi_t
*safi
)
676 /* Map from IANA values to internal values, return error if
677 * values are unrecognized.
679 *afi
= afi_iana2int(pkt_afi
);
680 *safi
= safi_iana2int(pkt_safi
);
681 if (*afi
== AFI_MAX
|| *safi
== SAFI_MAX
)
687 int bgp_map_afi_safi_int2iana(afi_t afi
, safi_t safi
, iana_afi_t
*pkt_afi
,
688 iana_safi_t
*pkt_safi
)
690 /* Map from internal values to IANA values, return error if
691 * internal values are bad (unexpected).
693 if (afi
== AFI_MAX
|| safi
== SAFI_MAX
)
695 *pkt_afi
= afi_int2iana(afi
);
696 *pkt_safi
= safi_int2iana(safi
);
700 struct peer_af
*peer_af_create(struct peer
*peer
, afi_t afi
, safi_t safi
)
709 afid
= afindex(afi
, safi
);
710 if (afid
>= BGP_AF_MAX
)
714 assert(peer
->peer_af_array
[afid
] == NULL
);
716 /* Allocate new peer af */
717 af
= XCALLOC(MTYPE_BGP_PEER_AF
, sizeof(struct peer_af
));
719 peer
->peer_af_array
[afid
] = af
;
724 bgp
->af_peer_count
[afi
][safi
]++;
729 struct peer_af
*peer_af_find(struct peer
*peer
, afi_t afi
, safi_t safi
)
736 afid
= afindex(afi
, safi
);
737 if (afid
>= BGP_AF_MAX
)
740 return peer
->peer_af_array
[afid
];
743 int peer_af_delete(struct peer
*peer
, afi_t afi
, safi_t safi
)
752 afid
= afindex(afi
, safi
);
753 if (afid
>= BGP_AF_MAX
)
756 af
= peer
->peer_af_array
[afid
];
761 bgp_stop_announce_route_timer(af
);
763 if (PAF_SUBGRP(af
)) {
764 if (BGP_DEBUG(update_groups
, UPDATE_GROUPS
))
765 zlog_debug("u%" PRIu64
":s%" PRIu64
" remove peer %s",
766 af
->subgroup
->update_group
->id
,
767 af
->subgroup
->id
, peer
->host
);
771 update_subgroup_remove_peer(af
->subgroup
, af
);
773 if (bgp
->af_peer_count
[afi
][safi
])
774 bgp
->af_peer_count
[afi
][safi
]--;
776 peer
->peer_af_array
[afid
] = NULL
;
777 XFREE(MTYPE_BGP_PEER_AF
, af
);
781 /* Peer comparison function for sorting. */
782 int peer_cmp(struct peer
*p1
, struct peer
*p2
)
784 if (p1
->group
&& !p2
->group
)
787 if (!p1
->group
&& p2
->group
)
790 if (p1
->group
== p2
->group
) {
791 if (p1
->conf_if
&& !p2
->conf_if
)
794 if (!p1
->conf_if
&& p2
->conf_if
)
797 if (p1
->conf_if
&& p2
->conf_if
)
798 return if_cmp_name_func(p1
->conf_if
, p2
->conf_if
);
800 return strcmp(p1
->group
->name
, p2
->group
->name
);
802 return sockunion_cmp(&p1
->su
, &p2
->su
);
805 static unsigned int peer_hash_key_make(const void *p
)
807 const struct peer
*peer
= p
;
808 return sockunion_hash(&peer
->su
);
811 static bool peer_hash_same(const void *p1
, const void *p2
)
813 const struct peer
*peer1
= p1
;
814 const struct peer
*peer2
= p2
;
815 return (sockunion_same(&peer1
->su
, &peer2
->su
)
816 && CHECK_FLAG(peer1
->flags
, PEER_FLAG_CONFIG_NODE
)
817 == CHECK_FLAG(peer2
->flags
, PEER_FLAG_CONFIG_NODE
));
820 void peer_flag_inherit(struct peer
*peer
, uint32_t flag
)
824 /* Skip if peer is not a peer-group member. */
825 if (!peer_group_active(peer
))
828 /* Unset override flag to signal inheritance from peer-group. */
829 UNSET_FLAG(peer
->flags_override
, flag
);
832 * Inherit flag state from peer-group. If the flag of the peer-group is
833 * not being inverted, the peer must inherit the inverse of the current
834 * peer-group flag state.
836 group_val
= CHECK_FLAG(peer
->group
->conf
->flags
, flag
);
837 if (!CHECK_FLAG(peer
->group
->conf
->flags_invert
, flag
)
838 && CHECK_FLAG(peer
->flags_invert
, flag
))
839 COND_FLAG(peer
->flags
, flag
, !group_val
);
841 COND_FLAG(peer
->flags
, flag
, group_val
);
844 int peer_af_flag_check(struct peer
*peer
, afi_t afi
, safi_t safi
, uint32_t flag
)
846 return CHECK_FLAG(peer
->af_flags
[afi
][safi
], flag
);
849 void peer_af_flag_inherit(struct peer
*peer
, afi_t afi
, safi_t safi
,
854 /* Skip if peer is not a peer-group member. */
855 if (!peer_group_active(peer
))
858 /* Unset override flag to signal inheritance from peer-group. */
859 UNSET_FLAG(peer
->af_flags_override
[afi
][safi
], flag
);
862 * Inherit flag state from peer-group. If the flag of the peer-group is
863 * not being inverted, the peer must inherit the inverse of the current
864 * peer-group flag state.
866 group_val
= CHECK_FLAG(peer
->group
->conf
->af_flags
[afi
][safi
], flag
);
867 if (!CHECK_FLAG(peer
->group
->conf
->af_flags_invert
[afi
][safi
], flag
)
868 && CHECK_FLAG(peer
->af_flags_invert
[afi
][safi
], flag
))
869 COND_FLAG(peer
->af_flags
[afi
][safi
], flag
, !group_val
);
871 COND_FLAG(peer
->af_flags
[afi
][safi
], flag
, group_val
);
874 /* Check peer's AS number and determines if this peer is IBGP or EBGP */
875 static inline bgp_peer_sort_t
peer_calc_sort(struct peer
*peer
)
882 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
883 if (peer
->as_type
== AS_INTERNAL
)
884 return BGP_PEER_IBGP
;
886 else if (peer
->as_type
== AS_EXTERNAL
)
887 return BGP_PEER_EBGP
;
889 else if (peer
->as_type
== AS_SPECIFIED
&& peer
->as
) {
891 return (bgp
->as
== peer
->as
? BGP_PEER_IBGP
899 peer1
= listnode_head(peer
->group
->peer
);
904 return BGP_PEER_INTERNAL
;
908 if (bgp
&& CHECK_FLAG(bgp
->config
, BGP_CONFIG_CONFEDERATION
)) {
909 if (peer
->local_as
== 0)
910 return BGP_PEER_INTERNAL
;
912 if (peer
->local_as
== peer
->as
) {
913 if (bgp
->as
== bgp
->confed_id
) {
914 if (peer
->local_as
== bgp
->as
)
915 return BGP_PEER_IBGP
;
917 return BGP_PEER_EBGP
;
919 if (peer
->local_as
== bgp
->confed_id
)
920 return BGP_PEER_EBGP
;
922 return BGP_PEER_IBGP
;
926 if (bgp_confederation_peers_check(bgp
, peer
->as
))
927 return BGP_PEER_CONFED
;
929 return BGP_PEER_EBGP
;
931 if (peer
->as_type
== AS_UNSPECIFIED
) {
932 /* check if in peer-group with AS information */
934 && (peer
->group
->conf
->as_type
!= AS_UNSPECIFIED
)) {
935 if (peer
->group
->conf
->as_type
938 == peer
->group
->conf
->as
)
939 return BGP_PEER_IBGP
;
941 return BGP_PEER_EBGP
;
942 } else if (peer
->group
->conf
->as_type
944 return BGP_PEER_IBGP
;
946 return BGP_PEER_EBGP
;
948 /* no AS information anywhere, let caller know */
949 return BGP_PEER_UNSPECIFIED
;
950 } else if (peer
->as_type
!= AS_SPECIFIED
)
951 return (peer
->as_type
== AS_INTERNAL
? BGP_PEER_IBGP
954 return (peer
->local_as
== 0
956 : peer
->local_as
== peer
->as
? BGP_PEER_IBGP
961 /* Calculate and cache the peer "sort" */
962 bgp_peer_sort_t
peer_sort(struct peer
*peer
)
964 peer
->sort
= peer_calc_sort(peer
);
968 bgp_peer_sort_t
peer_sort_lookup(struct peer
*peer
)
973 static void peer_free(struct peer
*peer
)
978 assert(peer
->status
== Deleted
);
982 /* this /ought/ to have been done already through bgp_stop earlier,
983 * but just to be sure..
987 bgp_writes_off(peer
);
988 assert(!peer
->t_write
);
989 assert(!peer
->t_read
);
990 BGP_EVENT_FLUSH(peer
);
992 pthread_mutex_destroy(&peer
->io_mtx
);
994 /* Free connected nexthop, if present */
995 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
)
996 && !peer_dynamic_neighbor(peer
))
997 bgp_delete_connected_nexthop(family2afi(peer
->su
.sa
.sa_family
),
1000 XFREE(MTYPE_PEER_TX_SHUTDOWN_MSG
, peer
->tx_shutdown_message
);
1002 XFREE(MTYPE_PEER_DESC
, peer
->desc
);
1003 XFREE(MTYPE_BGP_PEER_HOST
, peer
->host
);
1004 XFREE(MTYPE_BGP_PEER_HOST
, peer
->domainname
);
1005 XFREE(MTYPE_BGP_PEER_IFNAME
, peer
->ifname
);
1007 /* Update source configuration. */
1008 if (peer
->update_source
) {
1009 sockunion_free(peer
->update_source
);
1010 peer
->update_source
= NULL
;
1013 XFREE(MTYPE_PEER_UPDATE_SOURCE
, peer
->update_if
);
1015 XFREE(MTYPE_TMP
, peer
->notify
.data
);
1016 memset(&peer
->notify
, 0, sizeof(struct bgp_notify
));
1018 if (peer
->clear_node_queue
)
1019 work_queue_free_and_null(&peer
->clear_node_queue
);
1021 bgp_sync_delete(peer
);
1023 XFREE(MTYPE_PEER_CONF_IF
, peer
->conf_if
);
1025 bfd_info_free(&(peer
->bfd_info
));
1027 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++) {
1028 for (safi
= SAFI_UNICAST
; safi
< SAFI_MAX
; safi
++) {
1029 bgp_addpath_set_peer_type(peer
, afi
, safi
,
1034 bgp_unlock(peer
->bgp
);
1036 memset(peer
, 0, sizeof(struct peer
));
1038 XFREE(MTYPE_BGP_PEER
, peer
);
1041 /* increase reference count on a struct peer */
1042 struct peer
*peer_lock_with_caller(const char *name
, struct peer
*peer
)
1044 assert(peer
&& (peer
->lock
>= 0));
1047 zlog_debug("%s peer_lock %p %d", name
, peer
, peer
->lock
);
1055 /* decrease reference count on a struct peer
1056 * struct peer is freed and NULL returned if last reference
1058 struct peer
*peer_unlock_with_caller(const char *name
, struct peer
*peer
)
1060 assert(peer
&& (peer
->lock
> 0));
1063 zlog_debug("%s peer_unlock %p %d", name
, peer
, peer
->lock
);
1068 if (peer
->lock
== 0) {
1075 /* BGP GR changes */
1077 int bgp_global_gr_init(struct bgp
*bgp
)
1079 if (BGP_DEBUG(graceful_restart
, GRACEFUL_RESTART
))
1080 zlog_debug("%s called ..", __func__
);
1082 int local_GLOBAL_GR_FSM
[BGP_GLOBAL_GR_MODE
][BGP_GLOBAL_GR_EVENT_CMD
] = {
1083 /* GLOBAL_HELPER Mode */
1086 /*GLOBAL_GR_cmd*/ /*no_Global_GR_cmd*/
1087 GLOBAL_GR
, GLOBAL_INVALID
,
1088 /*GLOBAL_DISABLE_cmd*/ /*no_Global_Disable_cmd*/
1089 GLOBAL_DISABLE
, GLOBAL_INVALID
1091 /* GLOBAL_GR Mode */
1094 /*GLOBAL_GR_cmd*/ /*no_Global_GR_cmd*/
1095 GLOBAL_INVALID
, GLOBAL_HELPER
,
1096 /*GLOBAL_DISABLE_cmd*/ /*no_Global_Disable_cmd*/
1097 GLOBAL_DISABLE
, GLOBAL_INVALID
1099 /* GLOBAL_DISABLE Mode */
1102 /*GLOBAL_GR_cmd */ /*no_Global_GR_cmd*/
1103 GLOBAL_GR
, GLOBAL_INVALID
,
1104 /*GLOBAL_DISABLE_cmd*//*no_Global_Disable_cmd*/
1105 GLOBAL_INVALID
, GLOBAL_HELPER
1107 /* GLOBAL_INVALID Mode */
1110 /*GLOBAL_GR_cmd*/ /*no_Global_GR_cmd*/
1111 GLOBAL_INVALID
, GLOBAL_INVALID
,
1112 /*GLOBAL_DISABLE_cmd*/ /*no_Global_Disable_cmd*/
1113 GLOBAL_INVALID
, GLOBAL_INVALID
1116 memcpy(bgp
->GLOBAL_GR_FSM
, local_GLOBAL_GR_FSM
,
1117 sizeof(local_GLOBAL_GR_FSM
));
1119 bgp
->global_gr_present_state
= GLOBAL_HELPER
;
1120 bgp
->present_zebra_gr_state
= ZEBRA_GR_DISABLE
;
1122 return BGP_GR_SUCCESS
;
1125 int bgp_peer_gr_init(struct peer
*peer
)
1127 if (BGP_DEBUG(graceful_restart
, GRACEFUL_RESTART
))
1128 zlog_debug("%s called ..", __func__
);
1130 struct bgp_peer_gr local_Peer_GR_FSM
[BGP_PEER_GR_MODE
]
1131 [BGP_PEER_GR_EVENT_CMD
] = {
1133 /* PEER_HELPER Mode */
1134 /* Event-> */ /* PEER_GR_CMD */ /* NO_PEER_GR_CMD */
1135 { PEER_GR
, bgp_peer_gr_action
}, {PEER_INVALID
, NULL
},
1136 /* Event-> */ /* PEER_DISABLE_CMD */ /* NO_PEER_DISABLE_CMD */
1137 {PEER_DISABLE
, bgp_peer_gr_action
}, {PEER_INVALID
, NULL
},
1138 /* Event-> */ /* PEER_HELPER_cmd */ /* NO_PEER_HELPER_CMD */
1139 { PEER_INVALID
, NULL
}, {PEER_GLOBAL_INHERIT
,
1140 bgp_peer_gr_action
}
1144 /* Event-> */ /* PEER_GR_CMD */ /* NO_PEER_GR_CMD */
1145 { PEER_INVALID
, NULL
}, { PEER_GLOBAL_INHERIT
,
1146 bgp_peer_gr_action
},
1147 /* Event-> */ /* PEER_DISABLE_CMD */ /* NO_PEER_DISABLE_CMD */
1148 {PEER_DISABLE
, bgp_peer_gr_action
}, { PEER_INVALID
, NULL
},
1149 /* Event-> */ /* PEER_HELPER_cmd */ /* NO_PEER_HELPER_CMD */
1150 { PEER_HELPER
, bgp_peer_gr_action
}, { PEER_INVALID
, NULL
}
1153 /* PEER_DISABLE Mode */
1154 /* Event-> */ /* PEER_GR_CMD */ /* NO_PEER_GR_CMD */
1155 { PEER_GR
, bgp_peer_gr_action
}, { PEER_INVALID
, NULL
},
1156 /* Event-> */ /* PEER_DISABLE_CMD */ /* NO_PEER_DISABLE_CMD */
1157 { PEER_INVALID
, NULL
}, { PEER_GLOBAL_INHERIT
,
1158 bgp_peer_gr_action
},
1159 /* Event-> */ /* PEER_HELPER_cmd */ /* NO_PEER_HELPER_CMD */
1160 { PEER_HELPER
, bgp_peer_gr_action
}, { PEER_INVALID
, NULL
}
1163 /* PEER_INVALID Mode */
1164 /* Event-> */ /* PEER_GR_CMD */ /* NO_PEER_GR_CMD */
1165 { PEER_INVALID
, NULL
}, { PEER_INVALID
, NULL
},
1166 /* Event-> */ /* PEER_DISABLE_CMD */ /* NO_PEER_DISABLE_CMD */
1167 { PEER_INVALID
, NULL
}, { PEER_INVALID
, NULL
},
1168 /* Event-> */ /* PEER_HELPER_cmd */ /* NO_PEER_HELPER_CMD */
1169 { PEER_INVALID
, NULL
}, { PEER_INVALID
, NULL
},
1172 /* PEER_GLOBAL_INHERIT Mode */
1173 /* Event-> */ /* PEER_GR_CMD */ /* NO_PEER_GR_CMD */
1174 { PEER_GR
, bgp_peer_gr_action
}, { PEER_INVALID
, NULL
},
1175 /* Event-> */ /* PEER_DISABLE_CMD */ /* NO_PEER_DISABLE_CMD */
1176 { PEER_DISABLE
, bgp_peer_gr_action
}, { PEER_INVALID
, NULL
},
1177 /* Event-> */ /* PEER_HELPER_cmd */ /* NO_PEER_HELPER_CMD */
1178 { PEER_HELPER
, bgp_peer_gr_action
}, { PEER_INVALID
, NULL
}
1181 memcpy(&peer
->PEER_GR_FSM
, local_Peer_GR_FSM
,
1182 sizeof(local_Peer_GR_FSM
));
1183 peer
->peer_gr_present_state
= PEER_GLOBAL_INHERIT
;
1184 bgp_peer_move_to_gr_mode(peer
, PEER_GLOBAL_INHERIT
);
1186 return BGP_GR_SUCCESS
;
1189 /* Allocate new peer object, implicitely locked. */
1190 struct peer
*peer_new(struct bgp
*bgp
)
1197 /* bgp argument is absolutely required */
1200 /* Allocate new peer. */
1201 peer
= XCALLOC(MTYPE_BGP_PEER
, sizeof(struct peer
));
1203 /* Set default value. */
1205 peer
->v_start
= BGP_INIT_START_TIMER
;
1206 peer
->v_connect
= bgp
->default_connect_retry
;
1207 peer
->status
= Idle
;
1208 peer
->ostatus
= Idle
;
1209 peer
->cur_event
= peer
->last_event
= peer
->last_major_event
= 0;
1210 peer
->bgp
= bgp_lock(bgp
);
1211 peer
= peer_lock(peer
); /* initial reference */
1212 peer
->password
= NULL
;
1214 /* Set default flags. */
1215 FOREACH_AFI_SAFI (afi
, safi
) {
1216 SET_FLAG(peer
->af_flags
[afi
][safi
], PEER_FLAG_SEND_COMMUNITY
);
1217 SET_FLAG(peer
->af_flags
[afi
][safi
],
1218 PEER_FLAG_SEND_EXT_COMMUNITY
);
1219 SET_FLAG(peer
->af_flags
[afi
][safi
],
1220 PEER_FLAG_SEND_LARGE_COMMUNITY
);
1222 SET_FLAG(peer
->af_flags_invert
[afi
][safi
],
1223 PEER_FLAG_SEND_COMMUNITY
);
1224 SET_FLAG(peer
->af_flags_invert
[afi
][safi
],
1225 PEER_FLAG_SEND_EXT_COMMUNITY
);
1226 SET_FLAG(peer
->af_flags_invert
[afi
][safi
],
1227 PEER_FLAG_SEND_LARGE_COMMUNITY
);
1228 peer
->addpath_type
[afi
][safi
] = BGP_ADDPATH_NONE
;
1231 /* set nexthop-unchanged for l2vpn evpn by default */
1232 SET_FLAG(peer
->af_flags
[AFI_L2VPN
][SAFI_EVPN
],
1233 PEER_FLAG_NEXTHOP_UNCHANGED
);
1235 SET_FLAG(peer
->sflags
, PEER_STATUS_CAPABILITY_OPEN
);
1237 /* Initialize per peer bgp GR FSM */
1238 bgp_peer_gr_init(peer
);
1240 /* Create buffers. */
1241 peer
->ibuf
= stream_fifo_new();
1242 peer
->obuf
= stream_fifo_new();
1243 pthread_mutex_init(&peer
->io_mtx
, NULL
);
1245 /* We use a larger buffer for peer->obuf_work in the event that:
1246 * - We RX a BGP_UPDATE where the attributes alone are just
1247 * under BGP_MAX_PACKET_SIZE
1248 * - The user configures an outbound route-map that does many as-path
1249 * prepends or adds many communities. At most they can have
1250 * CMD_ARGC_MAX args in a route-map so there is a finite limit on how
1251 * large they can make the attributes.
1253 * Having a buffer with BGP_MAX_PACKET_SIZE_OVERFLOW allows us to avoid
1254 * bounds checking for every single attribute as we construct an
1258 stream_new(BGP_MAX_PACKET_SIZE
+ BGP_MAX_PACKET_SIZE_OVERFLOW
);
1260 ringbuf_new(BGP_MAX_PACKET_SIZE
* BGP_READ_PACKET_MAX
);
1262 peer
->scratch
= stream_new(BGP_MAX_PACKET_SIZE
);
1264 bgp_sync_init(peer
);
1266 /* Get service port number. */
1267 sp
= getservbyname("bgp", "tcp");
1268 peer
->port
= (sp
== NULL
) ? BGP_PORT_DEFAULT
: ntohs(sp
->s_port
);
1270 QOBJ_REG(peer
, peer
);
1275 * This function is invoked when a duplicate peer structure associated with
1276 * a neighbor is being deleted. If this about-to-be-deleted structure is
1277 * the one with all the config, then we have to copy over the info.
1279 void peer_xfer_config(struct peer
*peer_dst
, struct peer
*peer_src
)
1281 struct peer_af
*paf
;
1289 /* The following function is used by both peer group config copy to
1290 * individual peer and when we transfer config
1292 if (peer_src
->change_local_as
)
1293 peer_dst
->change_local_as
= peer_src
->change_local_as
;
1295 /* peer flags apply */
1296 peer_dst
->flags
= peer_src
->flags
;
1297 peer_dst
->cap
= peer_src
->cap
;
1299 peer_dst
->peer_gr_present_state
= peer_src
->peer_gr_present_state
;
1300 peer_dst
->peer_gr_new_status_flag
= peer_src
->peer_gr_new_status_flag
;
1302 peer_dst
->local_as
= peer_src
->local_as
;
1303 peer_dst
->port
= peer_src
->port
;
1304 (void)peer_sort(peer_dst
);
1305 peer_dst
->rmap_type
= peer_src
->rmap_type
;
1308 peer_dst
->holdtime
= peer_src
->holdtime
;
1309 peer_dst
->keepalive
= peer_src
->keepalive
;
1310 peer_dst
->connect
= peer_src
->connect
;
1311 peer_dst
->v_holdtime
= peer_src
->v_holdtime
;
1312 peer_dst
->v_keepalive
= peer_src
->v_keepalive
;
1313 peer_dst
->routeadv
= peer_src
->routeadv
;
1314 peer_dst
->v_routeadv
= peer_src
->v_routeadv
;
1316 /* password apply */
1317 if (peer_src
->password
&& !peer_dst
->password
)
1318 peer_dst
->password
=
1319 XSTRDUP(MTYPE_PEER_PASSWORD
, peer_src
->password
);
1321 FOREACH_AFI_SAFI (afi
, safi
) {
1322 peer_dst
->afc
[afi
][safi
] = peer_src
->afc
[afi
][safi
];
1323 peer_dst
->af_flags
[afi
][safi
] = peer_src
->af_flags
[afi
][safi
];
1324 peer_dst
->allowas_in
[afi
][safi
] =
1325 peer_src
->allowas_in
[afi
][safi
];
1326 peer_dst
->weight
[afi
][safi
] = peer_src
->weight
[afi
][safi
];
1327 peer_dst
->addpath_type
[afi
][safi
] =
1328 peer_src
->addpath_type
[afi
][safi
];
1331 for (afidx
= BGP_AF_START
; afidx
< BGP_AF_MAX
; afidx
++) {
1332 paf
= peer_src
->peer_af_array
[afidx
];
1334 peer_af_create(peer_dst
, paf
->afi
, paf
->safi
);
1337 /* update-source apply */
1338 if (peer_src
->update_source
) {
1339 if (peer_dst
->update_source
)
1340 sockunion_free(peer_dst
->update_source
);
1341 XFREE(MTYPE_PEER_UPDATE_SOURCE
, peer_dst
->update_if
);
1342 peer_dst
->update_source
=
1343 sockunion_dup(peer_src
->update_source
);
1344 } else if (peer_src
->update_if
) {
1345 XFREE(MTYPE_PEER_UPDATE_SOURCE
, peer_dst
->update_if
);
1346 if (peer_dst
->update_source
) {
1347 sockunion_free(peer_dst
->update_source
);
1348 peer_dst
->update_source
= NULL
;
1350 peer_dst
->update_if
=
1351 XSTRDUP(MTYPE_PEER_UPDATE_SOURCE
, peer_src
->update_if
);
1354 if (peer_src
->ifname
) {
1355 XFREE(MTYPE_BGP_PEER_IFNAME
, peer_dst
->ifname
);
1358 XSTRDUP(MTYPE_BGP_PEER_IFNAME
, peer_src
->ifname
);
1362 static int bgp_peer_conf_if_to_su_update_v4(struct peer
*peer
,
1363 struct interface
*ifp
)
1365 struct connected
*ifc
;
1368 struct listnode
*node
;
1370 /* If our IPv4 address on the interface is /30 or /31, we can derive the
1371 * IPv4 address of the other end.
1373 for (ALL_LIST_ELEMENTS_RO(ifp
->connected
, node
, ifc
)) {
1374 if (ifc
->address
&& (ifc
->address
->family
== AF_INET
)) {
1375 PREFIX_COPY_IPV4(&p
, CONNECTED_PREFIX(ifc
));
1376 if (p
.prefixlen
== 30) {
1377 peer
->su
.sa
.sa_family
= AF_INET
;
1378 addr
= ntohl(p
.u
.prefix4
.s_addr
);
1380 peer
->su
.sin
.sin_addr
.s_addr
=
1382 else if (addr
% 4 == 2)
1383 peer
->su
.sin
.sin_addr
.s_addr
=
1385 #ifdef HAVE_STRUCT_SOCKADDR_IN_SIN_LEN
1386 peer
->su
.sin
.sin_len
=
1387 sizeof(struct sockaddr_in
);
1388 #endif /* HAVE_STRUCT_SOCKADDR_IN_SIN_LEN */
1390 } else if (p
.prefixlen
== 31) {
1391 peer
->su
.sa
.sa_family
= AF_INET
;
1392 addr
= ntohl(p
.u
.prefix4
.s_addr
);
1394 peer
->su
.sin
.sin_addr
.s_addr
=
1397 peer
->su
.sin
.sin_addr
.s_addr
=
1399 #ifdef HAVE_STRUCT_SOCKADDR_IN_SIN_LEN
1400 peer
->su
.sin
.sin_len
=
1401 sizeof(struct sockaddr_in
);
1402 #endif /* HAVE_STRUCT_SOCKADDR_IN_SIN_LEN */
1404 } else if (bgp_debug_neighbor_events(peer
))
1406 "%s: IPv4 interface address is not /30 or /31, v4 session not started",
1414 static bool bgp_peer_conf_if_to_su_update_v6(struct peer
*peer
,
1415 struct interface
*ifp
)
1417 struct nbr_connected
*ifc_nbr
;
1419 /* Have we learnt the peer's IPv6 link-local address? */
1420 if (ifp
->nbr_connected
1421 && (ifc_nbr
= listnode_head(ifp
->nbr_connected
))) {
1422 peer
->su
.sa
.sa_family
= AF_INET6
;
1423 memcpy(&peer
->su
.sin6
.sin6_addr
, &ifc_nbr
->address
->u
.prefix
,
1424 sizeof(struct in6_addr
));
1426 peer
->su
.sin6
.sin6_len
= sizeof(struct sockaddr_in6
);
1428 peer
->su
.sin6
.sin6_scope_id
= ifp
->ifindex
;
1436 * Set or reset the peer address socketunion structure based on the
1437 * learnt/derived peer address. If the address has changed, update the
1438 * password on the listen socket, if needed.
1440 void bgp_peer_conf_if_to_su_update(struct peer
*peer
)
1442 struct interface
*ifp
;
1444 int peer_addr_updated
= 0;
1450 * Our peer structure is stored in the bgp->peerhash
1451 * release it before we modify anything.
1453 hash_release(peer
->bgp
->peerhash
, peer
);
1455 prev_family
= peer
->su
.sa
.sa_family
;
1456 if ((ifp
= if_lookup_by_name(peer
->conf_if
, peer
->bgp
->vrf_id
))) {
1458 /* If BGP unnumbered is not "v6only", we first see if we can
1460 * peer's IPv4 address.
1462 if (!CHECK_FLAG(peer
->flags
, PEER_FLAG_IFPEER_V6ONLY
))
1464 bgp_peer_conf_if_to_su_update_v4(peer
, ifp
);
1466 /* If "v6only" or we can't derive peer's IPv4 address, see if
1468 * learnt the peer's IPv6 link-local address. This is from the
1470 * IPv6 address in router advertisement.
1472 if (!peer_addr_updated
)
1474 bgp_peer_conf_if_to_su_update_v6(peer
, ifp
);
1476 /* If we could derive the peer address, we may need to install the
1478 * configured for the peer, if any, on the listen socket. Otherwise,
1480 * that peer's address is not available and uninstall the password, if
1483 if (peer_addr_updated
) {
1484 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_PASSWORD
)
1485 && prev_family
== AF_UNSPEC
)
1488 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_PASSWORD
)
1489 && prev_family
!= AF_UNSPEC
)
1490 bgp_md5_unset(peer
);
1491 peer
->su
.sa
.sa_family
= AF_UNSPEC
;
1492 memset(&peer
->su
.sin6
.sin6_addr
, 0, sizeof(struct in6_addr
));
1496 * Since our su changed we need to del/add peer to the peerhash
1498 hash_get(peer
->bgp
->peerhash
, peer
, hash_alloc_intern
);
1501 static void bgp_recalculate_afi_safi_bestpaths(struct bgp
*bgp
, afi_t afi
,
1504 struct bgp_dest
*dest
, *ndest
;
1505 struct bgp_table
*table
;
1507 for (dest
= bgp_table_top(bgp
->rib
[afi
][safi
]); dest
;
1508 dest
= bgp_route_next(dest
)) {
1509 table
= bgp_dest_get_bgp_table_info(dest
);
1510 if (table
!= NULL
) {
1511 /* Special handling for 2-level routing
1513 if (safi
== SAFI_MPLS_VPN
|| safi
== SAFI_ENCAP
1514 || safi
== SAFI_EVPN
) {
1515 for (ndest
= bgp_table_top(table
); ndest
;
1516 ndest
= bgp_route_next(ndest
))
1517 bgp_process(bgp
, ndest
, afi
, safi
);
1519 bgp_process(bgp
, dest
, afi
, safi
);
1524 /* Force a bestpath recalculation for all prefixes. This is used
1525 * when 'bgp bestpath' commands are entered.
1527 void bgp_recalculate_all_bestpaths(struct bgp
*bgp
)
1532 FOREACH_AFI_SAFI (afi
, safi
) {
1533 bgp_recalculate_afi_safi_bestpaths(bgp
, afi
, safi
);
1538 * Create new BGP peer.
1540 * conf_if and su are mutually exclusive if configuring from the cli.
1541 * If we are handing a doppelganger, then we *must* pass in both
1542 * the original peer's su and conf_if, so that we can appropriately
1543 * track the bgp->peerhash( ie we don't want to remove the current
1544 * one from the config ).
1546 struct peer
*peer_create(union sockunion
*su
, const char *conf_if
,
1547 struct bgp
*bgp
, as_t local_as
, as_t remote_as
,
1548 int as_type
, afi_t afi
, safi_t safi
,
1549 struct peer_group
*group
)
1553 char buf
[SU_ADDRSTRLEN
];
1555 peer
= peer_new(bgp
);
1557 peer
->conf_if
= XSTRDUP(MTYPE_PEER_CONF_IF
, conf_if
);
1561 bgp_peer_conf_if_to_su_update(peer
);
1562 XFREE(MTYPE_BGP_PEER_HOST
, peer
->host
);
1563 peer
->host
= XSTRDUP(MTYPE_BGP_PEER_HOST
, conf_if
);
1566 sockunion2str(su
, buf
, SU_ADDRSTRLEN
);
1567 XFREE(MTYPE_BGP_PEER_HOST
, peer
->host
);
1568 peer
->host
= XSTRDUP(MTYPE_BGP_PEER_HOST
, buf
);
1570 peer
->local_as
= local_as
;
1571 peer
->as
= remote_as
;
1572 peer
->as_type
= as_type
;
1573 peer
->local_id
= bgp
->router_id
;
1574 peer
->v_holdtime
= bgp
->default_holdtime
;
1575 peer
->v_keepalive
= bgp
->default_keepalive
;
1576 peer
->v_routeadv
= (peer_sort(peer
) == BGP_PEER_IBGP
)
1577 ? BGP_DEFAULT_IBGP_ROUTEADV
1578 : BGP_DEFAULT_EBGP_ROUTEADV
;
1580 peer
= peer_lock(peer
); /* bgp peer list reference */
1581 peer
->group
= group
;
1582 listnode_add_sort(bgp
->peer
, peer
);
1583 hash_get(bgp
->peerhash
, peer
, hash_alloc_intern
);
1585 /* Adjust update-group coalesce timer heuristics for # peers. */
1586 if (bgp
->heuristic_coalesce
) {
1587 long ct
= BGP_DEFAULT_SUBGROUP_COALESCE_TIME
1589 * BGP_PEER_ADJUST_SUBGROUP_COALESCE_TIME
);
1590 bgp
->coalesce_time
= MIN(BGP_MAX_SUBGROUP_COALESCE_TIME
, ct
);
1593 active
= peer_active(peer
);
1595 if (peer
->su
.sa
.sa_family
== AF_UNSPEC
)
1596 peer
->last_reset
= PEER_DOWN_NBR_ADDR
;
1598 peer
->last_reset
= PEER_DOWN_NOAFI_ACTIVATED
;
1601 /* Last read and reset time set */
1602 peer
->readtime
= peer
->resettime
= bgp_clock();
1604 /* Default TTL set. */
1605 peer
->ttl
= (peer
->sort
== BGP_PEER_IBGP
) ? MAXTTL
: BGP_DEFAULT_TTL
;
1607 SET_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
);
1610 peer
->afc
[afi
][safi
] = 1;
1611 peer_af_create(peer
, afi
, safi
);
1614 /* auto shutdown if configured */
1615 if (bgp
->autoshutdown
)
1616 peer_flag_set(peer
, PEER_FLAG_SHUTDOWN
);
1617 /* Set up peer's events and timers. */
1618 else if (!active
&& peer_active(peer
))
1619 bgp_timer_set(peer
);
1621 bgp_peer_gr_flags_update(peer
);
1622 BGP_GR_ROUTER_DETECT_AND_SEND_CAPABILITY_TO_ZEBRA(bgp
, bgp
->peer
);
1627 /* Make accept BGP peer. This function is only called from the test code */
1628 struct peer
*peer_create_accept(struct bgp
*bgp
)
1632 peer
= peer_new(bgp
);
1634 peer
= peer_lock(peer
); /* bgp peer list reference */
1635 listnode_add_sort(bgp
->peer
, peer
);
1641 * Return true if we have a peer configured to use this afi/safi
1643 int bgp_afi_safi_peer_exists(struct bgp
*bgp
, afi_t afi
, safi_t safi
)
1645 struct listnode
*node
;
1648 for (ALL_LIST_ELEMENTS_RO(bgp
->peer
, node
, peer
)) {
1649 if (!CHECK_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
))
1652 if (peer
->afc
[afi
][safi
])
1659 /* Change peer's AS number. */
1660 void peer_as_change(struct peer
*peer
, as_t as
, int as_specified
)
1662 bgp_peer_sort_t origtype
, newtype
;
1665 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
1666 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
1667 peer
->last_reset
= PEER_DOWN_REMOTE_AS_CHANGE
;
1668 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
1669 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
1671 bgp_session_reset(peer
);
1673 origtype
= peer_sort_lookup(peer
);
1675 peer
->as_type
= as_specified
;
1677 if (bgp_config_check(peer
->bgp
, BGP_CONFIG_CONFEDERATION
)
1678 && !bgp_confederation_peers_check(peer
->bgp
, as
)
1679 && peer
->bgp
->as
!= as
)
1680 peer
->local_as
= peer
->bgp
->confed_id
;
1682 peer
->local_as
= peer
->bgp
->as
;
1684 newtype
= peer_sort(peer
);
1685 /* Advertisement-interval reset */
1686 if (!CHECK_FLAG(peer
->flags
, PEER_FLAG_ROUTEADV
)) {
1687 peer
->v_routeadv
= (newtype
== BGP_PEER_IBGP
)
1688 ? BGP_DEFAULT_IBGP_ROUTEADV
1689 : BGP_DEFAULT_EBGP_ROUTEADV
;
1693 if (newtype
== BGP_PEER_IBGP
)
1695 else if (origtype
== BGP_PEER_IBGP
)
1696 peer
->ttl
= BGP_DEFAULT_TTL
;
1698 /* reflector-client reset */
1699 if (newtype
!= BGP_PEER_IBGP
) {
1700 UNSET_FLAG(peer
->af_flags
[AFI_IP
][SAFI_UNICAST
],
1701 PEER_FLAG_REFLECTOR_CLIENT
);
1702 UNSET_FLAG(peer
->af_flags
[AFI_IP
][SAFI_MULTICAST
],
1703 PEER_FLAG_REFLECTOR_CLIENT
);
1704 UNSET_FLAG(peer
->af_flags
[AFI_IP
][SAFI_LABELED_UNICAST
],
1705 PEER_FLAG_REFLECTOR_CLIENT
);
1706 UNSET_FLAG(peer
->af_flags
[AFI_IP
][SAFI_MPLS_VPN
],
1707 PEER_FLAG_REFLECTOR_CLIENT
);
1708 UNSET_FLAG(peer
->af_flags
[AFI_IP
][SAFI_ENCAP
],
1709 PEER_FLAG_REFLECTOR_CLIENT
);
1710 UNSET_FLAG(peer
->af_flags
[AFI_IP
][SAFI_FLOWSPEC
],
1711 PEER_FLAG_REFLECTOR_CLIENT
);
1712 UNSET_FLAG(peer
->af_flags
[AFI_IP6
][SAFI_UNICAST
],
1713 PEER_FLAG_REFLECTOR_CLIENT
);
1714 UNSET_FLAG(peer
->af_flags
[AFI_IP6
][SAFI_MULTICAST
],
1715 PEER_FLAG_REFLECTOR_CLIENT
);
1716 UNSET_FLAG(peer
->af_flags
[AFI_IP6
][SAFI_LABELED_UNICAST
],
1717 PEER_FLAG_REFLECTOR_CLIENT
);
1718 UNSET_FLAG(peer
->af_flags
[AFI_IP6
][SAFI_MPLS_VPN
],
1719 PEER_FLAG_REFLECTOR_CLIENT
);
1720 UNSET_FLAG(peer
->af_flags
[AFI_IP6
][SAFI_ENCAP
],
1721 PEER_FLAG_REFLECTOR_CLIENT
);
1722 UNSET_FLAG(peer
->af_flags
[AFI_IP6
][SAFI_FLOWSPEC
],
1723 PEER_FLAG_REFLECTOR_CLIENT
);
1724 UNSET_FLAG(peer
->af_flags
[AFI_L2VPN
][SAFI_EVPN
],
1725 PEER_FLAG_REFLECTOR_CLIENT
);
1728 /* local-as reset */
1729 if (newtype
!= BGP_PEER_EBGP
) {
1730 peer
->change_local_as
= 0;
1731 peer_flag_unset(peer
, PEER_FLAG_LOCAL_AS
);
1732 peer_flag_unset(peer
, PEER_FLAG_LOCAL_AS_NO_PREPEND
);
1733 peer_flag_unset(peer
, PEER_FLAG_LOCAL_AS_REPLACE_AS
);
1737 /* If peer does not exist, create new one. If peer already exists,
1738 set AS number to the peer. */
1739 int peer_remote_as(struct bgp
*bgp
, union sockunion
*su
, const char *conf_if
,
1740 as_t
*as
, int as_type
, afi_t afi
, safi_t safi
)
1746 peer
= peer_lookup_by_conf_if(bgp
, conf_if
);
1748 peer
= peer_lookup(bgp
, su
);
1751 /* Not allowed for a dynamic peer. */
1752 if (peer_dynamic_neighbor(peer
)) {
1754 return BGP_ERR_INVALID_FOR_DYNAMIC_PEER
;
1757 /* When this peer is a member of peer-group. */
1759 /* peer-group already has AS number/internal/external */
1760 if (peer
->group
->conf
->as
1761 || peer
->group
->conf
->as_type
) {
1762 /* Return peer group's AS number. */
1763 *as
= peer
->group
->conf
->as
;
1764 return BGP_ERR_PEER_GROUP_MEMBER
;
1767 bgp_peer_sort_t peer_sort_type
=
1768 peer_sort(peer
->group
->conf
);
1770 /* Explicit AS numbers used, compare AS numbers */
1771 if (as_type
== AS_SPECIFIED
) {
1772 if (((peer_sort_type
== BGP_PEER_IBGP
)
1773 && (bgp
->as
!= *as
))
1774 || ((peer_sort_type
== BGP_PEER_EBGP
)
1775 && (bgp
->as
== *as
))) {
1777 return BGP_ERR_PEER_GROUP_PEER_TYPE_DIFFERENT
;
1780 /* internal/external used, compare as-types */
1781 if (((peer_sort_type
== BGP_PEER_IBGP
)
1782 && (as_type
!= AS_INTERNAL
))
1783 || ((peer_sort_type
== BGP_PEER_EBGP
)
1784 && (as_type
!= AS_EXTERNAL
))) {
1786 return BGP_ERR_PEER_GROUP_PEER_TYPE_DIFFERENT
;
1791 /* Existing peer's AS number change. */
1792 if (((peer
->as_type
== AS_SPECIFIED
) && peer
->as
!= *as
)
1793 || (peer
->as_type
!= as_type
))
1794 peer_as_change(peer
, *as
, as_type
);
1797 return BGP_ERR_NO_INTERFACE_CONFIG
;
1799 /* If the peer is not part of our confederation, and its not an
1800 iBGP peer then spoof the source AS */
1801 if (bgp_config_check(bgp
, BGP_CONFIG_CONFEDERATION
)
1802 && !bgp_confederation_peers_check(bgp
, *as
)
1804 local_as
= bgp
->confed_id
;
1808 /* If this is IPv4 unicast configuration and "no bgp default
1809 ipv4-unicast" is specified. */
1811 if (CHECK_FLAG(bgp
->flags
, BGP_FLAG_NO_DEFAULT_IPV4
)
1812 && afi
== AFI_IP
&& safi
== SAFI_UNICAST
)
1813 peer_create(su
, conf_if
, bgp
, local_as
, *as
, as_type
, 0,
1816 peer_create(su
, conf_if
, bgp
, local_as
, *as
, as_type
,
1823 static void peer_group2peer_config_copy_af(struct peer_group
*group
,
1824 struct peer
*peer
, afi_t afi
,
1828 int out
= FILTER_OUT
;
1830 uint32_t pflags_ovrd
;
1831 uint8_t *pfilter_ovrd
;
1835 pflags_ovrd
= peer
->af_flags_override
[afi
][safi
];
1836 pfilter_ovrd
= &peer
->filter_override
[afi
][safi
][in
];
1838 /* peer af_flags apply */
1839 flags_tmp
= conf
->af_flags
[afi
][safi
] & ~pflags_ovrd
;
1840 flags_tmp
^= conf
->af_flags_invert
[afi
][safi
]
1841 ^ peer
->af_flags_invert
[afi
][safi
];
1842 flags_tmp
&= ~pflags_ovrd
;
1844 UNSET_FLAG(peer
->af_flags
[afi
][safi
], ~pflags_ovrd
);
1845 SET_FLAG(peer
->af_flags
[afi
][safi
], flags_tmp
);
1846 SET_FLAG(peer
->af_flags_invert
[afi
][safi
],
1847 conf
->af_flags_invert
[afi
][safi
]);
1849 /* maximum-prefix */
1850 if (!CHECK_FLAG(pflags_ovrd
, PEER_FLAG_MAX_PREFIX
)) {
1851 PEER_ATTR_INHERIT(peer
, group
, pmax
[afi
][safi
]);
1852 PEER_ATTR_INHERIT(peer
, group
, pmax_threshold
[afi
][safi
]);
1853 PEER_ATTR_INHERIT(peer
, group
, pmax_restart
[afi
][safi
]);
1857 if (!CHECK_FLAG(pflags_ovrd
, PEER_FLAG_ALLOWAS_IN
))
1858 PEER_ATTR_INHERIT(peer
, group
, allowas_in
[afi
][safi
]);
1861 if (!CHECK_FLAG(pflags_ovrd
, PEER_FLAG_WEIGHT
))
1862 PEER_ATTR_INHERIT(peer
, group
, weight
[afi
][safi
]);
1864 /* default-originate route-map */
1865 if (!CHECK_FLAG(pflags_ovrd
, PEER_FLAG_DEFAULT_ORIGINATE
)) {
1866 PEER_STR_ATTR_INHERIT(peer
, group
, default_rmap
[afi
][safi
].name
,
1867 MTYPE_ROUTE_MAP_NAME
);
1868 PEER_ATTR_INHERIT(peer
, group
, default_rmap
[afi
][safi
].map
);
1871 /* inbound filter apply */
1872 if (!CHECK_FLAG(pfilter_ovrd
[in
], PEER_FT_DISTRIBUTE_LIST
)) {
1873 PEER_STR_ATTR_INHERIT(peer
, group
,
1874 filter
[afi
][safi
].dlist
[in
].name
,
1875 MTYPE_BGP_FILTER_NAME
);
1876 PEER_ATTR_INHERIT(peer
, group
,
1877 filter
[afi
][safi
].dlist
[in
].alist
);
1880 if (!CHECK_FLAG(pfilter_ovrd
[in
], PEER_FT_PREFIX_LIST
)) {
1881 PEER_STR_ATTR_INHERIT(peer
, group
,
1882 filter
[afi
][safi
].plist
[in
].name
,
1883 MTYPE_BGP_FILTER_NAME
);
1884 PEER_ATTR_INHERIT(peer
, group
,
1885 filter
[afi
][safi
].plist
[in
].plist
);
1888 if (!CHECK_FLAG(pfilter_ovrd
[in
], PEER_FT_FILTER_LIST
)) {
1889 PEER_STR_ATTR_INHERIT(peer
, group
,
1890 filter
[afi
][safi
].aslist
[in
].name
,
1891 MTYPE_BGP_FILTER_NAME
);
1892 PEER_ATTR_INHERIT(peer
, group
,
1893 filter
[afi
][safi
].aslist
[in
].aslist
);
1896 if (!CHECK_FLAG(pfilter_ovrd
[RMAP_IN
], PEER_FT_ROUTE_MAP
)) {
1897 PEER_STR_ATTR_INHERIT(peer
, group
,
1898 filter
[afi
][safi
].map
[in
].name
,
1899 MTYPE_BGP_FILTER_NAME
);
1900 PEER_ATTR_INHERIT(peer
, group
,
1901 filter
[afi
][safi
].map
[RMAP_IN
].map
);
1904 /* outbound filter apply */
1905 if (!CHECK_FLAG(pfilter_ovrd
[out
], PEER_FT_DISTRIBUTE_LIST
)) {
1906 PEER_STR_ATTR_INHERIT(peer
, group
,
1907 filter
[afi
][safi
].dlist
[out
].name
,
1908 MTYPE_BGP_FILTER_NAME
);
1909 PEER_ATTR_INHERIT(peer
, group
,
1910 filter
[afi
][safi
].dlist
[out
].alist
);
1913 if (!CHECK_FLAG(pfilter_ovrd
[out
], PEER_FT_PREFIX_LIST
)) {
1914 PEER_STR_ATTR_INHERIT(peer
, group
,
1915 filter
[afi
][safi
].plist
[out
].name
,
1916 MTYPE_BGP_FILTER_NAME
);
1917 PEER_ATTR_INHERIT(peer
, group
,
1918 filter
[afi
][safi
].plist
[out
].plist
);
1921 if (!CHECK_FLAG(pfilter_ovrd
[out
], PEER_FT_FILTER_LIST
)) {
1922 PEER_STR_ATTR_INHERIT(peer
, group
,
1923 filter
[afi
][safi
].aslist
[out
].name
,
1924 MTYPE_BGP_FILTER_NAME
);
1925 PEER_ATTR_INHERIT(peer
, group
,
1926 filter
[afi
][safi
].aslist
[out
].aslist
);
1929 if (!CHECK_FLAG(pfilter_ovrd
[RMAP_OUT
], PEER_FT_ROUTE_MAP
)) {
1930 PEER_STR_ATTR_INHERIT(peer
, group
,
1931 filter
[afi
][safi
].map
[RMAP_OUT
].name
,
1932 MTYPE_BGP_FILTER_NAME
);
1933 PEER_ATTR_INHERIT(peer
, group
,
1934 filter
[afi
][safi
].map
[RMAP_OUT
].map
);
1937 /* nondirectional filter apply */
1938 if (!CHECK_FLAG(pfilter_ovrd
[0], PEER_FT_UNSUPPRESS_MAP
)) {
1939 PEER_STR_ATTR_INHERIT(peer
, group
, filter
[afi
][safi
].usmap
.name
,
1940 MTYPE_BGP_FILTER_NAME
);
1941 PEER_ATTR_INHERIT(peer
, group
, filter
[afi
][safi
].usmap
.map
);
1944 if (peer
->addpath_type
[afi
][safi
] == BGP_ADDPATH_NONE
) {
1945 peer
->addpath_type
[afi
][safi
] = conf
->addpath_type
[afi
][safi
];
1946 bgp_addpath_type_changed(conf
->bgp
);
1950 static int peer_activate_af(struct peer
*peer
, afi_t afi
, safi_t safi
)
1955 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
1956 flog_err(EC_BGP_PEER_GROUP
, "%s was called for peer-group %s",
1957 __func__
, peer
->host
);
1961 /* Do not activate a peer for both SAFI_UNICAST and SAFI_LABELED_UNICAST
1963 if ((safi
== SAFI_UNICAST
&& peer
->afc
[afi
][SAFI_LABELED_UNICAST
])
1964 || (safi
== SAFI_LABELED_UNICAST
&& peer
->afc
[afi
][SAFI_UNICAST
]))
1965 return BGP_ERR_PEER_SAFI_CONFLICT
;
1967 /* Nothing to do if we've already activated this peer */
1968 if (peer
->afc
[afi
][safi
])
1971 if (peer_af_create(peer
, afi
, safi
) == NULL
)
1974 active
= peer_active(peer
);
1975 peer
->afc
[afi
][safi
] = 1;
1978 peer_group2peer_config_copy_af(peer
->group
, peer
, afi
, safi
);
1980 if (!active
&& peer_active(peer
)) {
1981 bgp_timer_set(peer
);
1983 if (peer
->status
== Established
) {
1984 if (CHECK_FLAG(peer
->cap
, PEER_CAP_DYNAMIC_RCV
)) {
1985 peer
->afc_adv
[afi
][safi
] = 1;
1986 bgp_capability_send(peer
, afi
, safi
,
1988 CAPABILITY_ACTION_SET
);
1989 if (peer
->afc_recv
[afi
][safi
]) {
1990 peer
->afc_nego
[afi
][safi
] = 1;
1991 bgp_announce_route(peer
, afi
, safi
);
1994 peer
->last_reset
= PEER_DOWN_AF_ACTIVATE
;
1995 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
1996 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
1999 if (peer
->status
== OpenSent
|| peer
->status
== OpenConfirm
) {
2000 peer
->last_reset
= PEER_DOWN_AF_ACTIVATE
;
2001 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
2002 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
2005 * If we are turning on a AFI/SAFI locally and we've
2006 * started bringing a peer up, we need to tell
2007 * the other peer to restart because we might loose
2008 * configuration here because when the doppelganger
2009 * gets to a established state due to how
2010 * we resolve we could just overwrite the afi/safi
2013 other
= peer
->doppelganger
;
2015 && (other
->status
== OpenSent
2016 || other
->status
== OpenConfirm
)) {
2017 other
->last_reset
= PEER_DOWN_AF_ACTIVATE
;
2018 bgp_notify_send(other
, BGP_NOTIFY_CEASE
,
2019 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
2026 /* Activate the peer or peer group for specified AFI and SAFI. */
2027 int peer_activate(struct peer
*peer
, afi_t afi
, safi_t safi
)
2030 struct peer_group
*group
;
2031 struct listnode
*node
, *nnode
;
2032 struct peer
*tmp_peer
;
2035 /* Nothing to do if we've already activated this peer */
2036 if (peer
->afc
[afi
][safi
])
2041 /* This is a peer-group so activate all of the members of the
2042 * peer-group as well */
2043 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
2045 /* Do not activate a peer for both SAFI_UNICAST and
2046 * SAFI_LABELED_UNICAST */
2047 if ((safi
== SAFI_UNICAST
2048 && peer
->afc
[afi
][SAFI_LABELED_UNICAST
])
2049 || (safi
== SAFI_LABELED_UNICAST
2050 && peer
->afc
[afi
][SAFI_UNICAST
]))
2051 return BGP_ERR_PEER_SAFI_CONFLICT
;
2053 peer
->afc
[afi
][safi
] = 1;
2054 group
= peer
->group
;
2056 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, tmp_peer
)) {
2057 ret
|= peer_activate_af(tmp_peer
, afi
, safi
);
2060 ret
|= peer_activate_af(peer
, afi
, safi
);
2063 /* If this is the first peer to be activated for this
2064 * afi/labeled-unicast recalc bestpaths to trigger label allocation */
2065 if (safi
== SAFI_LABELED_UNICAST
2066 && !bgp
->allocate_mpls_labels
[afi
][SAFI_UNICAST
]) {
2068 if (BGP_DEBUG(zebra
, ZEBRA
))
2070 "peer(s) are now active for labeled-unicast, allocate MPLS labels");
2072 bgp
->allocate_mpls_labels
[afi
][SAFI_UNICAST
] = 1;
2073 bgp_recalculate_afi_safi_bestpaths(bgp
, afi
, SAFI_UNICAST
);
2076 if (safi
== SAFI_FLOWSPEC
) {
2077 /* connect to table manager */
2078 bgp_zebra_init_tm_connect(bgp
);
2083 static bool non_peergroup_deactivate_af(struct peer
*peer
, afi_t afi
,
2086 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
2087 flog_err(EC_BGP_PEER_GROUP
, "%s was called for peer-group %s",
2088 __func__
, peer
->host
);
2092 /* Nothing to do if we've already deactivated this peer */
2093 if (!peer
->afc
[afi
][safi
])
2096 /* De-activate the address family configuration. */
2097 peer
->afc
[afi
][safi
] = 0;
2099 if (peer_af_delete(peer
, afi
, safi
) != 0) {
2100 flog_err(EC_BGP_PEER_DELETE
,
2101 "couldn't delete af structure for peer %s(%s, %s)",
2102 peer
->host
, afi2str(afi
), safi2str(safi
));
2106 if (peer
->status
== Established
) {
2107 if (CHECK_FLAG(peer
->cap
, PEER_CAP_DYNAMIC_RCV
)) {
2108 peer
->afc_adv
[afi
][safi
] = 0;
2109 peer
->afc_nego
[afi
][safi
] = 0;
2111 if (peer_active_nego(peer
)) {
2112 bgp_capability_send(peer
, afi
, safi
,
2114 CAPABILITY_ACTION_UNSET
);
2115 bgp_clear_route(peer
, afi
, safi
);
2116 peer
->pcount
[afi
][safi
] = 0;
2118 peer
->last_reset
= PEER_DOWN_NEIGHBOR_DELETE
;
2119 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
2120 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
2123 peer
->last_reset
= PEER_DOWN_NEIGHBOR_DELETE
;
2124 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
2125 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
2132 int peer_deactivate(struct peer
*peer
, afi_t afi
, safi_t safi
)
2135 struct peer_group
*group
;
2136 struct peer
*tmp_peer
;
2137 struct listnode
*node
, *nnode
;
2140 /* Nothing to do if we've already de-activated this peer */
2141 if (!peer
->afc
[afi
][safi
])
2144 /* This is a peer-group so de-activate all of the members of the
2145 * peer-group as well */
2146 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
2147 peer
->afc
[afi
][safi
] = 0;
2148 group
= peer
->group
;
2150 if (peer_af_delete(peer
, afi
, safi
) != 0) {
2153 "couldn't delete af structure for peer %s(%s, %s)",
2154 peer
->host
, afi2str(afi
), safi2str(safi
));
2157 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, tmp_peer
)) {
2158 ret
|= non_peergroup_deactivate_af(tmp_peer
, afi
, safi
);
2161 ret
|= non_peergroup_deactivate_af(peer
, afi
, safi
);
2166 /* If this is the last peer to be deactivated for this
2167 * afi/labeled-unicast recalc bestpaths to trigger label deallocation */
2168 if (safi
== SAFI_LABELED_UNICAST
2169 && bgp
->allocate_mpls_labels
[afi
][SAFI_UNICAST
]
2170 && !bgp_afi_safi_peer_exists(bgp
, afi
, safi
)) {
2172 if (BGP_DEBUG(zebra
, ZEBRA
))
2174 "peer(s) are no longer active for labeled-unicast, deallocate MPLS labels");
2176 bgp
->allocate_mpls_labels
[afi
][SAFI_UNICAST
] = 0;
2177 bgp_recalculate_afi_safi_bestpaths(bgp
, afi
, SAFI_UNICAST
);
2182 void peer_nsf_stop(struct peer
*peer
)
2187 UNSET_FLAG(peer
->sflags
, PEER_STATUS_NSF_WAIT
);
2188 UNSET_FLAG(peer
->sflags
, PEER_STATUS_NSF_MODE
);
2190 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++)
2191 for (safi
= SAFI_UNICAST
; safi
<= SAFI_MPLS_VPN
; safi
++)
2192 peer
->nsf
[afi
][safi
] = 0;
2194 if (peer
->t_gr_restart
) {
2195 BGP_TIMER_OFF(peer
->t_gr_restart
);
2196 if (bgp_debug_neighbor_events(peer
))
2197 zlog_debug("%s graceful restart timer stopped",
2200 if (peer
->t_gr_stale
) {
2201 BGP_TIMER_OFF(peer
->t_gr_stale
);
2202 if (bgp_debug_neighbor_events(peer
))
2204 "%s graceful restart stalepath timer stopped",
2207 bgp_clear_route_all(peer
);
2210 /* Delete peer from confguration.
2212 * The peer is moved to a dead-end "Deleted" neighbour-state, to allow
2213 * it to "cool off" and refcounts to hit 0, at which state it is freed.
2215 * This function /should/ take care to be idempotent, to guard against
2216 * it being called multiple times through stray events that come in
2217 * that happen to result in this function being called again. That
2218 * said, getting here for a "Deleted" peer is a bug in the neighbour
2221 int peer_delete(struct peer
*peer
)
2227 struct bgp_filter
*filter
;
2228 struct listnode
*pn
;
2231 assert(peer
->status
!= Deleted
);
2234 accept_peer
= CHECK_FLAG(peer
->sflags
, PEER_STATUS_ACCEPT_PEER
);
2236 bgp_keepalives_off(peer
);
2237 bgp_reads_off(peer
);
2238 bgp_writes_off(peer
);
2239 assert(!CHECK_FLAG(peer
->thread_flags
, PEER_THREAD_WRITES_ON
));
2240 assert(!CHECK_FLAG(peer
->thread_flags
, PEER_THREAD_READS_ON
));
2241 assert(!CHECK_FLAG(peer
->thread_flags
, PEER_THREAD_KEEPALIVES_ON
));
2243 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_NSF_WAIT
))
2244 peer_nsf_stop(peer
);
2246 SET_FLAG(peer
->flags
, PEER_FLAG_DELETE
);
2248 bgp_bfd_deregister_peer(peer
);
2250 /* If this peer belongs to peer group, clear up the
2253 if (peer_dynamic_neighbor(peer
))
2254 peer_drop_dynamic_neighbor(peer
);
2256 if ((pn
= listnode_lookup(peer
->group
->peer
, peer
))) {
2258 peer
); /* group->peer list reference */
2259 list_delete_node(peer
->group
->peer
, pn
);
2264 /* Withdraw all information from routing table. We can not use
2265 * BGP_EVENT_ADD (peer, BGP_Stop) at here. Because the event is
2266 * executed after peer structure is deleted.
2268 peer
->last_reset
= PEER_DOWN_NEIGHBOR_DELETE
;
2270 UNSET_FLAG(peer
->flags
, PEER_FLAG_DELETE
);
2272 if (peer
->doppelganger
) {
2273 peer
->doppelganger
->doppelganger
= NULL
;
2274 peer
->doppelganger
= NULL
;
2277 UNSET_FLAG(peer
->sflags
, PEER_STATUS_ACCEPT_PEER
);
2278 bgp_fsm_change_status(peer
, Deleted
);
2280 /* Remove from NHT */
2281 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
))
2282 bgp_unlink_nexthop_by_peer(peer
);
2284 /* Password configuration */
2285 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_PASSWORD
)) {
2286 XFREE(MTYPE_PEER_PASSWORD
, peer
->password
);
2288 if (!accept_peer
&& !BGP_PEER_SU_UNSPEC(peer
)
2289 && !CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
2290 bgp_md5_unset(peer
);
2293 bgp_timer_set(peer
); /* stops all timers for Deleted */
2295 /* Delete from all peer list. */
2296 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)
2297 && (pn
= listnode_lookup(bgp
->peer
, peer
))) {
2298 peer_unlock(peer
); /* bgp peer list reference */
2299 list_delete_node(bgp
->peer
, pn
);
2300 hash_release(bgp
->peerhash
, peer
);
2305 stream_fifo_free(peer
->ibuf
);
2310 stream_fifo_free(peer
->obuf
);
2314 if (peer
->ibuf_work
) {
2315 ringbuf_del(peer
->ibuf_work
);
2316 peer
->ibuf_work
= NULL
;
2319 if (peer
->obuf_work
) {
2320 stream_free(peer
->obuf_work
);
2321 peer
->obuf_work
= NULL
;
2324 if (peer
->scratch
) {
2325 stream_free(peer
->scratch
);
2326 peer
->scratch
= NULL
;
2329 /* Local and remote addresses. */
2330 if (peer
->su_local
) {
2331 sockunion_free(peer
->su_local
);
2332 peer
->su_local
= NULL
;
2335 if (peer
->su_remote
) {
2336 sockunion_free(peer
->su_remote
);
2337 peer
->su_remote
= NULL
;
2340 /* Free filter related memory. */
2341 FOREACH_AFI_SAFI (afi
, safi
) {
2342 filter
= &peer
->filter
[afi
][safi
];
2344 for (i
= FILTER_IN
; i
< FILTER_MAX
; i
++) {
2345 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->dlist
[i
].name
);
2346 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->plist
[i
].name
);
2347 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->aslist
[i
].name
);
2350 for (i
= RMAP_IN
; i
< RMAP_MAX
; i
++) {
2351 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->map
[i
].name
);
2354 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->usmap
.name
);
2355 XFREE(MTYPE_ROUTE_MAP_NAME
, peer
->default_rmap
[afi
][safi
].name
);
2358 FOREACH_AFI_SAFI (afi
, safi
)
2359 peer_af_delete(peer
, afi
, safi
);
2361 XFREE(MTYPE_BGP_PEER_HOST
, peer
->hostname
);
2362 XFREE(MTYPE_BGP_PEER_HOST
, peer
->domainname
);
2364 peer_unlock(peer
); /* initial reference */
2369 static int peer_group_cmp(struct peer_group
*g1
, struct peer_group
*g2
)
2371 return strcmp(g1
->name
, g2
->name
);
2374 /* Peer group cofiguration. */
2375 static struct peer_group
*peer_group_new(void)
2377 return XCALLOC(MTYPE_PEER_GROUP
, sizeof(struct peer_group
));
2380 static void peer_group_free(struct peer_group
*group
)
2382 XFREE(MTYPE_PEER_GROUP
, group
);
2385 struct peer_group
*peer_group_lookup(struct bgp
*bgp
, const char *name
)
2387 struct peer_group
*group
;
2388 struct listnode
*node
, *nnode
;
2390 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, nnode
, group
)) {
2391 if (strcmp(group
->name
, name
) == 0)
2397 struct peer_group
*peer_group_get(struct bgp
*bgp
, const char *name
)
2399 struct peer_group
*group
;
2402 group
= peer_group_lookup(bgp
, name
);
2406 group
= peer_group_new();
2408 XFREE(MTYPE_PEER_GROUP_HOST
, group
->name
);
2409 group
->name
= XSTRDUP(MTYPE_PEER_GROUP_HOST
, name
);
2410 group
->peer
= list_new();
2411 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++)
2412 group
->listen_range
[afi
] = list_new();
2413 group
->conf
= peer_new(bgp
);
2414 if (!CHECK_FLAG(bgp
->flags
, BGP_FLAG_NO_DEFAULT_IPV4
))
2415 group
->conf
->afc
[AFI_IP
][SAFI_UNICAST
] = 1;
2416 XFREE(MTYPE_BGP_PEER_HOST
, group
->conf
->host
);
2417 group
->conf
->host
= XSTRDUP(MTYPE_BGP_PEER_HOST
, name
);
2418 group
->conf
->group
= group
;
2419 group
->conf
->as
= 0;
2420 group
->conf
->ttl
= BGP_DEFAULT_TTL
;
2421 group
->conf
->gtsm_hops
= BGP_GTSM_HOPS_DISABLED
;
2422 group
->conf
->v_routeadv
= BGP_DEFAULT_EBGP_ROUTEADV
;
2423 SET_FLAG(group
->conf
->sflags
, PEER_STATUS_GROUP
);
2424 listnode_add_sort(bgp
->group
, group
);
2429 static void peer_group2peer_config_copy(struct peer_group
*group
,
2439 peer
->as
= conf
->as
;
2442 if (!CHECK_FLAG(peer
->flags_override
, PEER_FLAG_LOCAL_AS
))
2443 peer
->change_local_as
= conf
->change_local_as
;
2445 /* If peer-group has configured TTL then override it */
2446 if (conf
->ttl
!= BGP_DEFAULT_TTL
)
2447 peer
->ttl
= conf
->ttl
;
2450 peer
->gtsm_hops
= conf
->gtsm_hops
;
2452 /* peer flags apply */
2453 flags_tmp
= conf
->flags
& ~peer
->flags_override
;
2454 flags_tmp
^= conf
->flags_invert
^ peer
->flags_invert
;
2455 flags_tmp
&= ~peer
->flags_override
;
2457 UNSET_FLAG(peer
->flags
, ~peer
->flags_override
);
2458 SET_FLAG(peer
->flags
, flags_tmp
);
2459 SET_FLAG(peer
->flags_invert
, conf
->flags_invert
);
2461 /* peer timers apply */
2462 if (!CHECK_FLAG(peer
->flags_override
, PEER_FLAG_TIMER
)) {
2463 PEER_ATTR_INHERIT(peer
, group
, holdtime
);
2464 PEER_ATTR_INHERIT(peer
, group
, keepalive
);
2467 if (!CHECK_FLAG(peer
->flags_override
, PEER_FLAG_TIMER_CONNECT
)) {
2468 PEER_ATTR_INHERIT(peer
, group
, connect
);
2469 if (CHECK_FLAG(conf
->flags
, PEER_FLAG_TIMER_CONNECT
))
2470 peer
->v_connect
= conf
->connect
;
2472 peer
->v_connect
= peer
->bgp
->default_connect_retry
;
2475 /* advertisement-interval apply */
2476 if (!CHECK_FLAG(peer
->flags_override
, PEER_FLAG_ROUTEADV
)) {
2477 PEER_ATTR_INHERIT(peer
, group
, routeadv
);
2478 if (CHECK_FLAG(conf
->flags
, PEER_FLAG_ROUTEADV
))
2479 peer
->v_routeadv
= conf
->routeadv
;
2481 peer
->v_routeadv
= (peer_sort(peer
) == BGP_PEER_IBGP
)
2482 ? BGP_DEFAULT_IBGP_ROUTEADV
2483 : BGP_DEFAULT_EBGP_ROUTEADV
;
2486 /* capability extended-nexthop apply */
2487 if (!CHECK_FLAG(peer
->flags_override
, PEER_FLAG_CAPABILITY_ENHE
))
2488 if (CHECK_FLAG(conf
->flags
, PEER_FLAG_CAPABILITY_ENHE
))
2489 SET_FLAG(peer
->flags
, PEER_FLAG_CAPABILITY_ENHE
);
2491 /* password apply */
2492 if (!CHECK_FLAG(peer
->flags_override
, PEER_FLAG_PASSWORD
))
2493 PEER_STR_ATTR_INHERIT(peer
, group
, password
,
2494 MTYPE_PEER_PASSWORD
);
2496 if (!BGP_PEER_SU_UNSPEC(peer
))
2499 /* update-source apply */
2500 if (!CHECK_FLAG(peer
->flags_override
, PEER_FLAG_UPDATE_SOURCE
)) {
2501 if (conf
->update_source
) {
2502 XFREE(MTYPE_PEER_UPDATE_SOURCE
, peer
->update_if
);
2503 PEER_SU_ATTR_INHERIT(peer
, group
, update_source
);
2504 } else if (conf
->update_if
) {
2505 sockunion_free(peer
->update_source
);
2506 PEER_STR_ATTR_INHERIT(peer
, group
, update_if
,
2507 MTYPE_PEER_UPDATE_SOURCE
);
2511 /* Update GR flags for the peer. */
2512 bgp_peer_gr_flags_update(peer
);
2514 bgp_bfd_peer_group2peer_copy(conf
, peer
);
2517 /* Peer group's remote AS configuration. */
2518 int peer_group_remote_as(struct bgp
*bgp
, const char *group_name
, as_t
*as
,
2521 struct peer_group
*group
;
2523 struct listnode
*node
, *nnode
;
2525 group
= peer_group_lookup(bgp
, group_name
);
2529 if ((as_type
== group
->conf
->as_type
) && (group
->conf
->as
== *as
))
2533 /* When we setup peer-group AS number all peer group member's AS
2534 number must be updated to same number. */
2535 peer_as_change(group
->conf
, *as
, as_type
);
2537 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
2538 if (((peer
->as_type
== AS_SPECIFIED
) && peer
->as
!= *as
)
2539 || (peer
->as_type
!= as_type
))
2540 peer_as_change(peer
, *as
, as_type
);
2546 void peer_notify_unconfig(struct peer
*peer
)
2548 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
2549 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
2550 BGP_NOTIFY_CEASE_PEER_UNCONFIG
);
2553 void peer_group_notify_unconfig(struct peer_group
*group
)
2555 struct peer
*peer
, *other
;
2556 struct listnode
*node
, *nnode
;
2558 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
2559 other
= peer
->doppelganger
;
2560 if (other
&& other
->status
!= Deleted
) {
2561 other
->group
= NULL
;
2562 peer_notify_unconfig(other
);
2564 peer_notify_unconfig(peer
);
2568 int peer_group_delete(struct peer_group
*group
)
2572 struct prefix
*prefix
;
2574 struct listnode
*node
, *nnode
;
2579 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
2580 other
= peer
->doppelganger
;
2582 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_CAPABILITY_ENHE
))
2583 bgp_zebra_terminate_radv(bgp
, peer
);
2586 if (other
&& other
->status
!= Deleted
) {
2587 other
->group
= NULL
;
2591 list_delete(&group
->peer
);
2593 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++) {
2594 for (ALL_LIST_ELEMENTS(group
->listen_range
[afi
], node
, nnode
,
2596 prefix_free(&prefix
);
2598 list_delete(&group
->listen_range
[afi
]);
2601 XFREE(MTYPE_PEER_GROUP_HOST
, group
->name
);
2604 bfd_info_free(&(group
->conf
->bfd_info
));
2606 group
->conf
->group
= NULL
;
2607 peer_delete(group
->conf
);
2609 /* Delete from all peer_group list. */
2610 listnode_delete(bgp
->group
, group
);
2612 peer_group_free(group
);
2617 int peer_group_remote_as_delete(struct peer_group
*group
)
2619 struct peer
*peer
, *other
;
2620 struct listnode
*node
, *nnode
;
2622 if ((group
->conf
->as_type
== AS_UNSPECIFIED
)
2623 || ((!group
->conf
->as
) && (group
->conf
->as_type
== AS_SPECIFIED
)))
2626 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
2627 other
= peer
->doppelganger
;
2629 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_CAPABILITY_ENHE
))
2630 bgp_zebra_terminate_radv(peer
->bgp
, peer
);
2634 if (other
&& other
->status
!= Deleted
) {
2635 other
->group
= NULL
;
2639 list_delete_all_node(group
->peer
);
2641 group
->conf
->as
= 0;
2642 group
->conf
->as_type
= AS_UNSPECIFIED
;
2647 int peer_group_listen_range_add(struct peer_group
*group
, struct prefix
*range
)
2649 struct prefix
*prefix
;
2650 struct listnode
*node
, *nnode
;
2653 afi
= family2afi(range
->family
);
2655 /* Group needs remote AS configured. */
2656 if (group
->conf
->as_type
== AS_UNSPECIFIED
)
2657 return BGP_ERR_PEER_GROUP_NO_REMOTE_AS
;
2659 /* Ensure no duplicates. Currently we don't care about overlaps. */
2660 for (ALL_LIST_ELEMENTS(group
->listen_range
[afi
], node
, nnode
, prefix
)) {
2661 if (prefix_same(range
, prefix
))
2665 prefix
= prefix_new();
2666 prefix_copy(prefix
, range
);
2667 listnode_add(group
->listen_range
[afi
], prefix
);
2669 /* Update passwords for new ranges */
2670 if (group
->conf
->password
)
2671 bgp_md5_set_prefix(prefix
, group
->conf
->password
);
2676 int peer_group_listen_range_del(struct peer_group
*group
, struct prefix
*range
)
2678 struct prefix
*prefix
, prefix2
;
2679 struct listnode
*node
, *nnode
;
2682 char buf
[PREFIX2STR_BUFFER
];
2684 afi
= family2afi(range
->family
);
2686 /* Identify the listen range. */
2687 for (ALL_LIST_ELEMENTS(group
->listen_range
[afi
], node
, nnode
, prefix
)) {
2688 if (prefix_same(range
, prefix
))
2693 return BGP_ERR_DYNAMIC_NEIGHBORS_RANGE_NOT_FOUND
;
2695 prefix2str(prefix
, buf
, sizeof(buf
));
2697 /* Dispose off any dynamic neighbors that exist due to this listen range
2699 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
2700 if (!peer_dynamic_neighbor(peer
))
2703 sockunion2hostprefix(&peer
->su
, &prefix2
);
2704 if (prefix_match(prefix
, &prefix2
)) {
2705 if (bgp_debug_neighbor_events(peer
))
2707 "Deleting dynamic neighbor %s group %s upon delete of listen range %s",
2708 peer
->host
, group
->name
, buf
);
2713 /* Get rid of the listen range */
2714 listnode_delete(group
->listen_range
[afi
], prefix
);
2716 /* Remove passwords for deleted ranges */
2717 if (group
->conf
->password
)
2718 bgp_md5_unset_prefix(prefix
);
2723 /* Bind specified peer to peer group. */
2724 int peer_group_bind(struct bgp
*bgp
, union sockunion
*su
, struct peer
*peer
,
2725 struct peer_group
*group
, as_t
*as
)
2727 int first_member
= 0;
2730 bgp_peer_sort_t ptype
, gtype
;
2732 /* Lookup the peer. */
2734 peer
= peer_lookup(bgp
, su
);
2736 /* The peer exist, bind it to the peer-group */
2738 /* When the peer already belongs to a peer-group, check the
2740 if (peer_group_active(peer
)) {
2742 /* The peer is already bound to the peer-group,
2745 if (strcmp(peer
->group
->name
, group
->name
) == 0)
2748 return BGP_ERR_PEER_GROUP_CANT_CHANGE
;
2751 /* The peer has not specified a remote-as, inherit it from the
2753 if (peer
->as_type
== AS_UNSPECIFIED
) {
2754 peer
->as_type
= group
->conf
->as_type
;
2755 peer
->as
= group
->conf
->as
;
2756 peer
->sort
= group
->conf
->sort
;
2759 ptype
= peer_sort(peer
);
2760 if (!group
->conf
->as
&& ptype
!= BGP_PEER_UNSPECIFIED
) {
2761 gtype
= peer_sort(group
->conf
);
2762 if ((gtype
!= BGP_PEER_INTERNAL
) && (gtype
!= ptype
)) {
2765 return BGP_ERR_PEER_GROUP_PEER_TYPE_DIFFERENT
;
2768 if (gtype
== BGP_PEER_INTERNAL
)
2772 peer_group2peer_config_copy(group
, peer
);
2774 FOREACH_AFI_SAFI (afi
, safi
) {
2775 if (group
->conf
->afc
[afi
][safi
]) {
2776 peer
->afc
[afi
][safi
] = 1;
2778 if (peer_af_find(peer
, afi
, safi
)
2779 || peer_af_create(peer
, afi
, safi
)) {
2780 peer_group2peer_config_copy_af(
2781 group
, peer
, afi
, safi
);
2783 } else if (peer
->afc
[afi
][safi
])
2784 peer_deactivate(peer
, afi
, safi
);
2788 assert(group
&& peer
->group
== group
);
2790 listnode_delete(bgp
->peer
, peer
);
2792 peer
->group
= group
;
2793 listnode_add_sort(bgp
->peer
, peer
);
2795 peer
= peer_lock(peer
); /* group->peer list reference */
2796 listnode_add(group
->peer
, peer
);
2800 gtype
= peer_sort(group
->conf
);
2801 /* Advertisement-interval reset */
2802 if (!CHECK_FLAG(group
->conf
->flags
,
2803 PEER_FLAG_ROUTEADV
)) {
2804 group
->conf
->v_routeadv
=
2805 (gtype
== BGP_PEER_IBGP
)
2806 ? BGP_DEFAULT_IBGP_ROUTEADV
2807 : BGP_DEFAULT_EBGP_ROUTEADV
;
2810 /* ebgp-multihop reset */
2811 if (gtype
== BGP_PEER_IBGP
)
2812 group
->conf
->ttl
= MAXTTL
;
2814 /* local-as reset */
2815 if (gtype
!= BGP_PEER_EBGP
) {
2816 group
->conf
->change_local_as
= 0;
2817 peer_flag_unset(group
->conf
,
2818 PEER_FLAG_LOCAL_AS
);
2819 peer_flag_unset(group
->conf
,
2820 PEER_FLAG_LOCAL_AS_NO_PREPEND
);
2821 peer_flag_unset(group
->conf
,
2822 PEER_FLAG_LOCAL_AS_REPLACE_AS
);
2826 SET_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
);
2828 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
2829 peer
->last_reset
= PEER_DOWN_RMAP_BIND
;
2830 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
2831 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
2833 bgp_session_reset(peer
);
2837 /* Create a new peer. */
2839 if ((group
->conf
->as_type
== AS_SPECIFIED
)
2840 && (!group
->conf
->as
)) {
2841 return BGP_ERR_PEER_GROUP_NO_REMOTE_AS
;
2844 peer
= peer_create(su
, NULL
, bgp
, bgp
->as
, group
->conf
->as
,
2845 group
->conf
->as_type
, 0, 0, group
);
2847 peer
= peer_lock(peer
); /* group->peer list reference */
2848 listnode_add(group
->peer
, peer
);
2850 peer_group2peer_config_copy(group
, peer
);
2852 /* If the peer-group is active for this afi/safi then activate
2854 FOREACH_AFI_SAFI (afi
, safi
) {
2855 if (group
->conf
->afc
[afi
][safi
]) {
2856 peer
->afc
[afi
][safi
] = 1;
2857 peer_af_create(peer
, afi
, safi
);
2858 peer_group2peer_config_copy_af(group
, peer
, afi
,
2860 } else if (peer
->afc
[afi
][safi
])
2861 peer_deactivate(peer
, afi
, safi
);
2864 SET_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
);
2866 /* Set up peer's events and timers. */
2867 if (peer_active(peer
))
2868 bgp_timer_set(peer
);
2874 static int bgp_startup_timer_expire(struct thread
*thread
)
2878 bgp
= THREAD_ARG(thread
);
2879 bgp
->t_startup
= NULL
;
2885 * On shutdown we call the cleanup function which
2886 * does a free of the link list nodes, free up
2887 * the data we are pointing at too.
2889 static void bgp_vrf_string_name_delete(void *data
)
2893 XFREE(MTYPE_TMP
, vname
);
2896 /* BGP instance creation by `router bgp' commands. */
2897 static struct bgp
*bgp_create(as_t
*as
, const char *name
,
2898 enum bgp_instance_type inst_type
)
2904 if ((bgp
= XCALLOC(MTYPE_BGP
, sizeof(struct bgp
))) == NULL
)
2907 if (BGP_DEBUG(zebra
, ZEBRA
)) {
2908 if (inst_type
== BGP_INSTANCE_TYPE_DEFAULT
)
2909 zlog_debug("Creating Default VRF, AS %u", *as
);
2911 zlog_debug("Creating %s %s, AS %u",
2912 (inst_type
== BGP_INSTANCE_TYPE_VRF
)
2918 /* Default the EVPN VRF to the default one */
2919 if (inst_type
== BGP_INSTANCE_TYPE_DEFAULT
&& !bgp_master
.bgp_evpn
) {
2925 bgp
->heuristic_coalesce
= true;
2926 bgp
->inst_type
= inst_type
;
2927 bgp
->vrf_id
= (inst_type
== BGP_INSTANCE_TYPE_DEFAULT
) ? VRF_DEFAULT
2929 bgp
->peer_self
= peer_new(bgp
);
2930 XFREE(MTYPE_BGP_PEER_HOST
, bgp
->peer_self
->host
);
2931 bgp
->peer_self
->host
=
2932 XSTRDUP(MTYPE_BGP_PEER_HOST
, "Static announcement");
2933 XFREE(MTYPE_BGP_PEER_HOST
, bgp
->peer_self
->hostname
);
2934 if (cmd_hostname_get())
2935 bgp
->peer_self
->hostname
=
2936 XSTRDUP(MTYPE_BGP_PEER_HOST
, cmd_hostname_get());
2938 XFREE(MTYPE_BGP_PEER_HOST
, bgp
->peer_self
->domainname
);
2939 if (cmd_domainname_get())
2940 bgp
->peer_self
->domainname
=
2941 XSTRDUP(MTYPE_BGP_PEER_HOST
, cmd_domainname_get());
2942 bgp
->peer
= list_new();
2943 bgp
->peer
->cmp
= (int (*)(void *, void *))peer_cmp
;
2944 bgp
->peerhash
= hash_create(peer_hash_key_make
, peer_hash_same
,
2946 bgp
->peerhash
->max_size
= BGP_PEER_MAX_HASH_SIZE
;
2948 bgp
->group
= list_new();
2949 bgp
->group
->cmp
= (int (*)(void *, void *))peer_group_cmp
;
2951 FOREACH_AFI_SAFI (afi
, safi
) {
2952 bgp
->route
[afi
][safi
] = bgp_table_init(bgp
, afi
, safi
);
2953 bgp
->aggregate
[afi
][safi
] = bgp_table_init(bgp
, afi
, safi
);
2954 bgp
->rib
[afi
][safi
] = bgp_table_init(bgp
, afi
, safi
);
2956 /* Enable maximum-paths */
2957 bgp_maximum_paths_set(bgp
, afi
, safi
, BGP_PEER_EBGP
,
2959 bgp_maximum_paths_set(bgp
, afi
, safi
, BGP_PEER_IBGP
,
2961 /* Initialize graceful restart info */
2962 bgp
->gr_info
[afi
][safi
].eor_required
= 0;
2963 bgp
->gr_info
[afi
][safi
].eor_received
= 0;
2964 bgp
->gr_info
[afi
][safi
].t_select_deferral
= NULL
;
2965 bgp
->gr_info
[afi
][safi
].t_route_select
= NULL
;
2966 bgp
->gr_info
[afi
][safi
].route_list
= list_new();
2969 bgp
->v_update_delay
= BGP_UPDATE_DELAY_DEF
;
2970 bgp
->default_local_pref
= BGP_DEFAULT_LOCAL_PREF
;
2971 bgp
->default_subgroup_pkt_queue_max
=
2972 BGP_DEFAULT_SUBGROUP_PKT_QUEUE_MAX
;
2973 bgp_timers_unset(bgp
);
2974 bgp
->restart_time
= BGP_DEFAULT_RESTART_TIME
;
2975 bgp
->stalepath_time
= BGP_DEFAULT_STALEPATH_TIME
;
2976 bgp
->select_defer_time
= BGP_DEFAULT_SELECT_DEFERRAL_TIME
;
2977 bgp
->rib_stale_time
= BGP_DEFAULT_RIB_STALE_TIME
;
2978 bgp
->dynamic_neighbors_limit
= BGP_DYNAMIC_NEIGHBORS_LIMIT_DEFAULT
;
2979 bgp
->dynamic_neighbors_count
= 0;
2980 bgp
->lb_ref_bw
= BGP_LINK_BW_REF_BW
;
2981 bgp
->lb_handling
= BGP_LINK_BW_ECMP
;
2982 bgp
->reject_as_sets
= false;
2983 bgp_addpath_init_bgp_data(&bgp
->tx_addpath
);
2987 #ifdef ENABLE_BGP_VNC
2988 if (inst_type
!= BGP_INSTANCE_TYPE_VRF
) {
2989 bgp
->rfapi
= bgp_rfapi_new(bgp
);
2991 assert(bgp
->rfapi_cfg
);
2993 #endif /* ENABLE_BGP_VNC */
2995 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++) {
2996 bgp
->vpn_policy
[afi
].bgp
= bgp
;
2997 bgp
->vpn_policy
[afi
].afi
= afi
;
2998 bgp
->vpn_policy
[afi
].tovpn_label
= MPLS_LABEL_NONE
;
2999 bgp
->vpn_policy
[afi
].tovpn_zebra_vrf_label_last_sent
=
3002 bgp
->vpn_policy
[afi
].import_vrf
= list_new();
3003 bgp
->vpn_policy
[afi
].import_vrf
->del
=
3004 bgp_vrf_string_name_delete
;
3005 bgp
->vpn_policy
[afi
].export_vrf
= list_new();
3006 bgp
->vpn_policy
[afi
].export_vrf
->del
=
3007 bgp_vrf_string_name_delete
;
3010 bgp
->name
= XSTRDUP(MTYPE_BGP
, name
);
3012 thread_add_timer(bm
->master
, bgp_startup_timer_expire
, bgp
,
3013 bgp
->restart_time
, &bgp
->t_startup
);
3015 /* printable name we can use in debug messages */
3016 if (inst_type
== BGP_INSTANCE_TYPE_DEFAULT
) {
3017 bgp
->name_pretty
= XSTRDUP(MTYPE_BGP
, "VRF default");
3027 len
= 4 + 1 + strlen(n
) + 1; /* "view foo\0" */
3029 bgp
->name_pretty
= XCALLOC(MTYPE_BGP
, len
);
3030 snprintf(bgp
->name_pretty
, len
, "%s %s",
3031 (bgp
->inst_type
== BGP_INSTANCE_TYPE_VRF
)
3037 atomic_store_explicit(&bgp
->wpkt_quanta
, BGP_WRITE_PACKET_MAX
,
3038 memory_order_relaxed
);
3039 atomic_store_explicit(&bgp
->rpkt_quanta
, BGP_READ_PACKET_MAX
,
3040 memory_order_relaxed
);
3041 bgp
->coalesce_time
= BGP_DEFAULT_SUBGROUP_COALESCE_TIME
;
3045 update_bgp_group_init(bgp
);
3047 /* assign a unique rd id for auto derivation of vrf's RD */
3048 bf_assign_index(bm
->rd_idspace
, bgp
->vrf_rd_id
);
3050 bgp
->evpn_info
= XCALLOC(MTYPE_BGP_EVPN_INFO
,
3051 sizeof(struct bgp_evpn_info
));
3056 /*initilize global GR FSM */
3057 bgp_global_gr_init(bgp
);
3061 /* Return the "default VRF" instance of BGP. */
3062 struct bgp
*bgp_get_default(void)
3065 struct listnode
*node
, *nnode
;
3067 for (ALL_LIST_ELEMENTS(bm
->bgp
, node
, nnode
, bgp
))
3068 if (bgp
->inst_type
== BGP_INSTANCE_TYPE_DEFAULT
)
3073 /* Lookup BGP entry. */
3074 struct bgp
*bgp_lookup(as_t as
, const char *name
)
3077 struct listnode
*node
, *nnode
;
3079 for (ALL_LIST_ELEMENTS(bm
->bgp
, node
, nnode
, bgp
))
3081 && ((bgp
->name
== NULL
&& name
== NULL
)
3082 || (bgp
->name
&& name
&& strcmp(bgp
->name
, name
) == 0)))
3087 /* Lookup BGP structure by view name. */
3088 struct bgp
*bgp_lookup_by_name(const char *name
)
3091 struct listnode
*node
, *nnode
;
3093 for (ALL_LIST_ELEMENTS(bm
->bgp
, node
, nnode
, bgp
))
3094 if ((bgp
->name
== NULL
&& name
== NULL
)
3095 || (bgp
->name
&& name
&& strcmp(bgp
->name
, name
) == 0))
3100 /* Lookup BGP instance based on VRF id. */
3101 /* Note: Only to be used for incoming messages from Zebra. */
3102 struct bgp
*bgp_lookup_by_vrf_id(vrf_id_t vrf_id
)
3106 /* Lookup VRF (in tree) and follow link. */
3107 vrf
= vrf_lookup_by_id(vrf_id
);
3110 return (vrf
->info
) ? (struct bgp
*)vrf
->info
: NULL
;
3113 /* Sets the BGP instance where EVPN is enabled */
3114 void bgp_set_evpn(struct bgp
*bgp
)
3116 if (bm
->bgp_evpn
== bgp
)
3119 /* First, release the reference count we hold on the instance */
3121 bgp_unlock(bm
->bgp_evpn
);
3125 /* Increase the reference count on this new VRF */
3127 bgp_lock(bm
->bgp_evpn
);
3130 /* Returns the BGP instance where EVPN is enabled, if any */
3131 struct bgp
*bgp_get_evpn(void)
3133 return bm
->bgp_evpn
;
3136 /* handle socket creation or deletion, if necessary
3137 * this is called for all new BGP instances
3139 int bgp_handle_socket(struct bgp
*bgp
, struct vrf
*vrf
, vrf_id_t old_vrf_id
,
3144 /* Create BGP server socket, if listen mode not disabled */
3145 if (!bgp
|| bgp_option_check(BGP_OPT_NO_LISTEN
))
3147 if (bgp
->inst_type
== BGP_INSTANCE_TYPE_VRF
) {
3149 * suppress vrf socket
3152 bgp_close_vrf_socket(bgp
);
3156 return BGP_ERR_INVALID_VALUE
;
3158 * if vrf_id did not change
3160 if (vrf
->vrf_id
== old_vrf_id
)
3162 if (old_vrf_id
!= VRF_UNKNOWN
) {
3163 /* look for old socket. close it. */
3164 bgp_close_vrf_socket(bgp
);
3166 /* if backend is not yet identified ( VRF_UNKNOWN) then
3167 * creation will be done later
3169 if (vrf
->vrf_id
== VRF_UNKNOWN
)
3171 ret
= bgp_socket(bgp
, bm
->port
, bm
->address
);
3173 return BGP_ERR_INVALID_VALUE
;
3176 return bgp_check_main_socket(create
, bgp
);
3179 /* Called from VTY commands. */
3180 int bgp_get(struct bgp
**bgp_val
, as_t
*as
, const char *name
,
3181 enum bgp_instance_type inst_type
)
3184 struct vrf
*vrf
= NULL
;
3186 /* Multiple instance check. */
3188 bgp
= bgp_lookup_by_name(name
);
3190 bgp
= bgp_get_default();
3192 /* Already exists. */
3194 if (bgp
->as
!= *as
) {
3196 return BGP_ERR_INSTANCE_MISMATCH
;
3198 if (bgp
->inst_type
!= inst_type
)
3199 return BGP_ERR_INSTANCE_MISMATCH
;
3204 bgp
= bgp_create(as
, name
, inst_type
);
3205 if (bgp_option_check(BGP_OPT_NO_ZEBRA
) && name
)
3206 bgp
->vrf_id
= vrf_generate_id();
3207 bgp_router_id_set(bgp
, &bgp
->router_id_zebra
, true);
3208 bgp_address_init(bgp
);
3209 bgp_tip_hash_init(bgp
);
3213 bgp
->t_rmap_def_originate_eval
= NULL
;
3215 /* If Default instance or VRF, link to the VRF structure, if present. */
3216 if (bgp
->inst_type
== BGP_INSTANCE_TYPE_DEFAULT
3217 || bgp
->inst_type
== BGP_INSTANCE_TYPE_VRF
) {
3218 vrf
= bgp_vrf_lookup_by_instance_type(bgp
);
3220 bgp_vrf_link(bgp
, vrf
);
3222 /* BGP server socket already processed if BGP instance
3223 * already part of the list
3225 bgp_handle_socket(bgp
, vrf
, VRF_UNKNOWN
, true);
3226 listnode_add(bm
->bgp
, bgp
);
3228 if (IS_BGP_INST_KNOWN_TO_ZEBRA(bgp
)) {
3229 if (BGP_DEBUG(zebra
, ZEBRA
))
3230 zlog_debug("%s: Registering BGP instance %s to zebra",
3232 bgp_zebra_instance_register(bgp
);
3239 * Make BGP instance "up". Applies only to VRFs (non-default) and
3240 * implies the VRF has been learnt from Zebra.
3242 void bgp_instance_up(struct bgp
*bgp
)
3245 struct listnode
*node
, *next
;
3247 /* Register with zebra. */
3248 bgp_zebra_instance_register(bgp
);
3250 /* Kick off any peers that may have been configured. */
3251 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, next
, peer
)) {
3252 if (!BGP_PEER_START_SUPPRESSED(peer
))
3253 BGP_EVENT_ADD(peer
, BGP_Start
);
3256 /* Process any networks that have been configured. */
3257 bgp_static_add(bgp
);
3261 * Make BGP instance "down". Applies only to VRFs (non-default) and
3262 * implies the VRF has been deleted by Zebra.
3264 void bgp_instance_down(struct bgp
*bgp
)
3267 struct listnode
*node
;
3268 struct listnode
*next
;
3271 if (bgp
->t_rmap_def_originate_eval
) {
3272 BGP_TIMER_OFF(bgp
->t_rmap_def_originate_eval
);
3273 bgp_unlock(bgp
); /* TODO - This timer is started with a lock -
3277 /* Bring down peers, so corresponding routes are purged. */
3278 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, next
, peer
)) {
3279 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
3280 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
3281 BGP_NOTIFY_CEASE_ADMIN_SHUTDOWN
);
3283 bgp_session_reset(peer
);
3286 /* Purge network and redistributed routes. */
3287 bgp_purge_static_redist_routes(bgp
);
3289 /* Cleanup registered nexthops (flags) */
3290 bgp_cleanup_nexthops(bgp
);
3293 /* Delete BGP instance. */
3294 int bgp_delete(struct bgp
*bgp
)
3297 struct peer_group
*group
;
3298 struct listnode
*node
, *next
;
3303 struct graceful_restart_info
*gr_info
;
3307 hook_call(bgp_inst_delete
, bgp
);
3309 THREAD_OFF(bgp
->t_startup
);
3310 THREAD_OFF(bgp
->t_maxmed_onstartup
);
3311 THREAD_OFF(bgp
->t_update_delay
);
3312 THREAD_OFF(bgp
->t_establish_wait
);
3314 /* Set flag indicating bgp instance delete in progress */
3315 SET_FLAG(bgp
->flags
, BGP_FLAG_DELETE_IN_PROGRESS
);
3317 /* Delete the graceful restart info */
3318 FOREACH_AFI_SAFI (afi
, safi
) {
3319 gr_info
= &bgp
->gr_info
[afi
][safi
];
3323 BGP_TIMER_OFF(gr_info
->t_select_deferral
);
3324 BGP_TIMER_OFF(gr_info
->t_route_select
);
3325 if (gr_info
->route_list
)
3326 list_delete(&gr_info
->route_list
);
3329 if (BGP_DEBUG(zebra
, ZEBRA
)) {
3330 if (bgp
->inst_type
== BGP_INSTANCE_TYPE_DEFAULT
)
3331 zlog_debug("Deleting Default VRF");
3333 zlog_debug("Deleting %s %s",
3334 (bgp
->inst_type
== BGP_INSTANCE_TYPE_VRF
)
3340 /* unmap from RT list */
3341 bgp_evpn_vrf_delete(bgp
);
3343 /* unmap bgp vrf label */
3344 vpn_leak_zebra_vrf_label_withdraw(bgp
, AFI_IP
);
3345 vpn_leak_zebra_vrf_label_withdraw(bgp
, AFI_IP6
);
3348 if (bgp
->t_rmap_def_originate_eval
) {
3349 BGP_TIMER_OFF(bgp
->t_rmap_def_originate_eval
);
3350 bgp_unlock(bgp
); /* TODO - This timer is started with a lock -
3354 /* Inform peers we're going down. */
3355 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, next
, peer
)) {
3356 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
3357 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
3358 BGP_NOTIFY_CEASE_ADMIN_SHUTDOWN
);
3361 /* Delete static routes (networks). */
3362 bgp_static_delete(bgp
);
3364 /* Unset redistribution. */
3365 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++)
3366 for (i
= 0; i
< ZEBRA_ROUTE_MAX
; i
++)
3367 if (i
!= ZEBRA_ROUTE_BGP
)
3368 bgp_redistribute_unset(bgp
, afi
, i
, 0);
3370 /* Free peers and peer-groups. */
3371 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, next
, group
))
3372 peer_group_delete(group
);
3374 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, next
, peer
))
3377 if (bgp
->peer_self
) {
3378 peer_delete(bgp
->peer_self
);
3379 bgp
->peer_self
= NULL
;
3382 update_bgp_group_free(bgp
);
3384 /* TODO - Other memory may need to be freed - e.g., NHT */
3386 #ifdef ENABLE_BGP_VNC
3389 bgp_cleanup_routes(bgp
);
3391 for (afi
= 0; afi
< AFI_MAX
; ++afi
) {
3392 if (!bgp
->vpn_policy
[afi
].import_redirect_rtlist
)
3395 &bgp
->vpn_policy
[afi
]
3396 .import_redirect_rtlist
);
3397 bgp
->vpn_policy
[afi
].import_redirect_rtlist
= NULL
;
3400 /* Deregister from Zebra, if needed */
3401 if (IS_BGP_INST_KNOWN_TO_ZEBRA(bgp
)) {
3402 if (BGP_DEBUG(zebra
, ZEBRA
))
3404 "%s: deregistering this bgp %s instance from zebra",
3405 __func__
, bgp
->name
);
3406 bgp_zebra_instance_deregister(bgp
);
3409 /* Remove visibility via the master list - there may however still be
3410 * routes to be processed still referencing the struct bgp.
3412 listnode_delete(bm
->bgp
, bgp
);
3414 /* Free interfaces in this instance. */
3417 vrf
= bgp_vrf_lookup_by_instance_type(bgp
);
3418 bgp_handle_socket(bgp
, vrf
, VRF_UNKNOWN
, false);
3420 bgp_vrf_unlink(bgp
, vrf
);
3422 /* Update EVPN VRF pointer */
3423 if (bm
->bgp_evpn
== bgp
) {
3424 if (bgp
->inst_type
== BGP_INSTANCE_TYPE_DEFAULT
)
3427 bgp_set_evpn(bgp_get_default());
3430 thread_master_free_unused(bm
->master
);
3431 bgp_unlock(bgp
); /* initial reference */
3436 void bgp_free(struct bgp
*bgp
)
3440 struct bgp_table
*table
;
3441 struct bgp_dest
*dest
;
3442 struct bgp_rmap
*rmap
;
3446 list_delete(&bgp
->group
);
3447 list_delete(&bgp
->peer
);
3449 if (bgp
->peerhash
) {
3450 hash_free(bgp
->peerhash
);
3451 bgp
->peerhash
= NULL
;
3454 FOREACH_AFI_SAFI (afi
, safi
) {
3455 /* Special handling for 2-level routing tables. */
3456 if (safi
== SAFI_MPLS_VPN
|| safi
== SAFI_ENCAP
3457 || safi
== SAFI_EVPN
) {
3458 for (dest
= bgp_table_top(bgp
->rib
[afi
][safi
]); dest
;
3459 dest
= bgp_route_next(dest
)) {
3460 table
= bgp_dest_get_bgp_table_info(dest
);
3461 bgp_table_finish(&table
);
3464 if (bgp
->route
[afi
][safi
])
3465 bgp_table_finish(&bgp
->route
[afi
][safi
]);
3466 if (bgp
->aggregate
[afi
][safi
])
3467 bgp_table_finish(&bgp
->aggregate
[afi
][safi
]);
3468 if (bgp
->rib
[afi
][safi
])
3469 bgp_table_finish(&bgp
->rib
[afi
][safi
]);
3470 rmap
= &bgp
->table_map
[afi
][safi
];
3471 XFREE(MTYPE_ROUTE_MAP_NAME
, rmap
->name
);
3474 bgp_scan_finish(bgp
);
3475 bgp_address_destroy(bgp
);
3476 bgp_tip_hash_destroy(bgp
);
3478 /* release the auto RD id */
3479 bf_release_index(bm
->rd_idspace
, bgp
->vrf_rd_id
);
3481 bgp_evpn_cleanup(bgp
);
3482 bgp_pbr_cleanup(bgp
);
3483 XFREE(MTYPE_BGP_EVPN_INFO
, bgp
->evpn_info
);
3485 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++) {
3486 vpn_policy_direction_t dir
;
3488 if (bgp
->vpn_policy
[afi
].import_vrf
)
3489 list_delete(&bgp
->vpn_policy
[afi
].import_vrf
);
3490 if (bgp
->vpn_policy
[afi
].export_vrf
)
3491 list_delete(&bgp
->vpn_policy
[afi
].export_vrf
);
3493 dir
= BGP_VPN_POLICY_DIR_FROMVPN
;
3494 if (bgp
->vpn_policy
[afi
].rtlist
[dir
])
3495 ecommunity_free(&bgp
->vpn_policy
[afi
].rtlist
[dir
]);
3496 dir
= BGP_VPN_POLICY_DIR_TOVPN
;
3497 if (bgp
->vpn_policy
[afi
].rtlist
[dir
])
3498 ecommunity_free(&bgp
->vpn_policy
[afi
].rtlist
[dir
]);
3501 XFREE(MTYPE_BGP
, bgp
->name
);
3502 XFREE(MTYPE_BGP
, bgp
->name_pretty
);
3504 XFREE(MTYPE_BGP
, bgp
);
3507 struct peer
*peer_lookup_by_conf_if(struct bgp
*bgp
, const char *conf_if
)
3510 struct listnode
*node
, *nnode
;
3516 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
))
3517 if (peer
->conf_if
&& !strcmp(peer
->conf_if
, conf_if
)
3518 && !CHECK_FLAG(peer
->sflags
,
3519 PEER_STATUS_ACCEPT_PEER
))
3521 } else if (bm
->bgp
!= NULL
) {
3522 struct listnode
*bgpnode
, *nbgpnode
;
3524 for (ALL_LIST_ELEMENTS(bm
->bgp
, bgpnode
, nbgpnode
, bgp
))
3525 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
))
3527 && !strcmp(peer
->conf_if
, conf_if
)
3528 && !CHECK_FLAG(peer
->sflags
,
3529 PEER_STATUS_ACCEPT_PEER
))
3535 struct peer
*peer_lookup_by_hostname(struct bgp
*bgp
, const char *hostname
)
3538 struct listnode
*node
, *nnode
;
3544 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
))
3545 if (peer
->hostname
&& !strcmp(peer
->hostname
, hostname
)
3546 && !CHECK_FLAG(peer
->sflags
,
3547 PEER_STATUS_ACCEPT_PEER
))
3549 } else if (bm
->bgp
!= NULL
) {
3550 struct listnode
*bgpnode
, *nbgpnode
;
3552 for (ALL_LIST_ELEMENTS(bm
->bgp
, bgpnode
, nbgpnode
, bgp
))
3553 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
))
3555 && !strcmp(peer
->hostname
, hostname
)
3556 && !CHECK_FLAG(peer
->sflags
,
3557 PEER_STATUS_ACCEPT_PEER
))
3563 struct peer
*peer_lookup(struct bgp
*bgp
, union sockunion
*su
)
3565 struct peer
*peer
= NULL
;
3566 struct peer tmp_peer
;
3568 memset(&tmp_peer
, 0, sizeof(struct peer
));
3571 * We do not want to find the doppelganger peer so search for the peer
3573 * the hash that has PEER_FLAG_CONFIG_NODE
3575 SET_FLAG(tmp_peer
.flags
, PEER_FLAG_CONFIG_NODE
);
3580 peer
= hash_lookup(bgp
->peerhash
, &tmp_peer
);
3581 } else if (bm
->bgp
!= NULL
) {
3582 struct listnode
*bgpnode
, *nbgpnode
;
3584 for (ALL_LIST_ELEMENTS(bm
->bgp
, bgpnode
, nbgpnode
, bgp
)) {
3585 peer
= hash_lookup(bgp
->peerhash
, &tmp_peer
);
3594 struct peer
*peer_create_bind_dynamic_neighbor(struct bgp
*bgp
,
3595 union sockunion
*su
,
3596 struct peer_group
*group
)
3602 /* Create peer first; we've already checked group config is valid. */
3603 peer
= peer_create(su
, NULL
, bgp
, bgp
->as
, group
->conf
->as
,
3604 group
->conf
->as_type
, 0, 0, group
);
3609 peer
= peer_lock(peer
);
3610 listnode_add(group
->peer
, peer
);
3612 peer_group2peer_config_copy(group
, peer
);
3615 * Bind peer for all AFs configured for the group. We don't call
3616 * peer_group_bind as that is sub-optimal and does some stuff we don't
3619 FOREACH_AFI_SAFI (afi
, safi
) {
3620 if (!group
->conf
->afc
[afi
][safi
])
3622 peer
->afc
[afi
][safi
] = 1;
3624 if (!peer_af_find(peer
, afi
, safi
))
3625 peer_af_create(peer
, afi
, safi
);
3627 peer_group2peer_config_copy_af(group
, peer
, afi
, safi
);
3630 /* Mark as dynamic, but also as a "config node" for other things to
3632 SET_FLAG(peer
->flags
, PEER_FLAG_DYNAMIC_NEIGHBOR
);
3633 SET_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
);
3639 peer_group_lookup_dynamic_neighbor_range(struct peer_group
*group
,
3640 struct prefix
*prefix
)
3642 struct listnode
*node
, *nnode
;
3643 struct prefix
*range
;
3646 afi
= family2afi(prefix
->family
);
3648 if (group
->listen_range
[afi
])
3649 for (ALL_LIST_ELEMENTS(group
->listen_range
[afi
], node
, nnode
,
3651 if (prefix_match(range
, prefix
))
3658 peer_group_lookup_dynamic_neighbor(struct bgp
*bgp
, struct prefix
*prefix
,
3659 struct prefix
**listen_range
)
3661 struct prefix
*range
= NULL
;
3662 struct peer_group
*group
= NULL
;
3663 struct listnode
*node
, *nnode
;
3665 *listen_range
= NULL
;
3667 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, nnode
, group
))
3668 if ((range
= peer_group_lookup_dynamic_neighbor_range(
3671 } else if (bm
->bgp
!= NULL
) {
3672 struct listnode
*bgpnode
, *nbgpnode
;
3674 for (ALL_LIST_ELEMENTS(bm
->bgp
, bgpnode
, nbgpnode
, bgp
))
3675 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, nnode
, group
))
3676 if ((range
= peer_group_lookup_dynamic_neighbor_range(
3682 *listen_range
= range
;
3683 return (group
&& range
) ? group
: NULL
;
3686 struct peer
*peer_lookup_dynamic_neighbor(struct bgp
*bgp
, union sockunion
*su
)
3688 struct peer_group
*group
;
3691 struct prefix prefix
;
3692 struct prefix
*listen_range
;
3694 char buf
[PREFIX2STR_BUFFER
];
3695 char buf1
[PREFIX2STR_BUFFER
];
3697 sockunion2hostprefix(su
, &prefix
);
3699 /* See if incoming connection matches a configured listen range. */
3700 group
= peer_group_lookup_dynamic_neighbor(bgp
, &prefix
, &listen_range
);
3711 prefix2str(&prefix
, buf
, sizeof(buf
));
3712 prefix2str(listen_range
, buf1
, sizeof(buf1
));
3714 if (bgp_debug_neighbor_events(NULL
))
3716 "Dynamic Neighbor %s matches group %s listen range %s",
3717 buf
, group
->name
, buf1
);
3719 /* Are we within the listen limit? */
3720 dncount
= gbgp
->dynamic_neighbors_count
;
3722 if (dncount
>= gbgp
->dynamic_neighbors_limit
) {
3723 if (bgp_debug_neighbor_events(NULL
))
3724 zlog_debug("Dynamic Neighbor %s rejected - at limit %d",
3725 inet_sutop(su
, buf
),
3726 gbgp
->dynamic_neighbors_limit
);
3730 /* Ensure group is not disabled. */
3731 if (CHECK_FLAG(group
->conf
->flags
, PEER_FLAG_SHUTDOWN
)) {
3732 if (bgp_debug_neighbor_events(NULL
))
3734 "Dynamic Neighbor %s rejected - group %s disabled",
3739 /* Check that at least one AF is activated for the group. */
3740 if (!peer_group_af_configured(group
)) {
3741 if (bgp_debug_neighbor_events(NULL
))
3743 "Dynamic Neighbor %s rejected - no AF activated for group %s",
3748 /* Create dynamic peer and bind to associated group. */
3749 peer
= peer_create_bind_dynamic_neighbor(gbgp
, su
, group
);
3752 gbgp
->dynamic_neighbors_count
= ++dncount
;
3754 if (bgp_debug_neighbor_events(peer
))
3755 zlog_debug("%s Dynamic Neighbor added, group %s count %d",
3756 peer
->host
, group
->name
, dncount
);
3761 static void peer_drop_dynamic_neighbor(struct peer
*peer
)
3764 if (peer
->group
->bgp
) {
3765 dncount
= peer
->group
->bgp
->dynamic_neighbors_count
;
3767 peer
->group
->bgp
->dynamic_neighbors_count
= --dncount
;
3769 if (bgp_debug_neighbor_events(peer
))
3770 zlog_debug("%s dropped from group %s, count %d", peer
->host
,
3771 peer
->group
->name
, dncount
);
3774 /* If peer is configured at least one address family return 1. */
3775 bool peer_active(struct peer
*peer
)
3777 if (BGP_PEER_SU_UNSPEC(peer
))
3779 if (peer
->afc
[AFI_IP
][SAFI_UNICAST
] || peer
->afc
[AFI_IP
][SAFI_MULTICAST
]
3780 || peer
->afc
[AFI_IP
][SAFI_LABELED_UNICAST
]
3781 || peer
->afc
[AFI_IP
][SAFI_MPLS_VPN
] || peer
->afc
[AFI_IP
][SAFI_ENCAP
]
3782 || peer
->afc
[AFI_IP
][SAFI_FLOWSPEC
]
3783 || peer
->afc
[AFI_IP6
][SAFI_UNICAST
]
3784 || peer
->afc
[AFI_IP6
][SAFI_MULTICAST
]
3785 || peer
->afc
[AFI_IP6
][SAFI_LABELED_UNICAST
]
3786 || peer
->afc
[AFI_IP6
][SAFI_MPLS_VPN
]
3787 || peer
->afc
[AFI_IP6
][SAFI_ENCAP
]
3788 || peer
->afc
[AFI_IP6
][SAFI_FLOWSPEC
]
3789 || peer
->afc
[AFI_L2VPN
][SAFI_EVPN
])
3794 /* If peer is negotiated at least one address family return 1. */
3795 bool peer_active_nego(struct peer
*peer
)
3797 if (peer
->afc_nego
[AFI_IP
][SAFI_UNICAST
]
3798 || peer
->afc_nego
[AFI_IP
][SAFI_MULTICAST
]
3799 || peer
->afc_nego
[AFI_IP
][SAFI_LABELED_UNICAST
]
3800 || peer
->afc_nego
[AFI_IP
][SAFI_MPLS_VPN
]
3801 || peer
->afc_nego
[AFI_IP
][SAFI_ENCAP
]
3802 || peer
->afc_nego
[AFI_IP
][SAFI_FLOWSPEC
]
3803 || peer
->afc_nego
[AFI_IP6
][SAFI_UNICAST
]
3804 || peer
->afc_nego
[AFI_IP6
][SAFI_MULTICAST
]
3805 || peer
->afc_nego
[AFI_IP6
][SAFI_LABELED_UNICAST
]
3806 || peer
->afc_nego
[AFI_IP6
][SAFI_MPLS_VPN
]
3807 || peer
->afc_nego
[AFI_IP6
][SAFI_ENCAP
]
3808 || peer
->afc_nego
[AFI_IP6
][SAFI_FLOWSPEC
]
3809 || peer
->afc_nego
[AFI_L2VPN
][SAFI_EVPN
])
3814 void peer_change_action(struct peer
*peer
, afi_t afi
, safi_t safi
,
3815 enum peer_change_type type
)
3817 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
3820 if (peer
->status
!= Established
)
3823 if (type
== peer_change_reset
) {
3824 /* If we're resetting session, we've to delete both peer struct
3826 if ((peer
->doppelganger
)
3827 && (peer
->doppelganger
->status
!= Deleted
)
3828 && (!CHECK_FLAG(peer
->doppelganger
->flags
,
3829 PEER_FLAG_CONFIG_NODE
)))
3830 peer_delete(peer
->doppelganger
);
3832 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
3833 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
3834 } else if (type
== peer_change_reset_in
) {
3835 if (CHECK_FLAG(peer
->cap
, PEER_CAP_REFRESH_OLD_RCV
)
3836 || CHECK_FLAG(peer
->cap
, PEER_CAP_REFRESH_NEW_RCV
))
3837 bgp_route_refresh_send(peer
, afi
, safi
, 0, 0, 0);
3839 if ((peer
->doppelganger
)
3840 && (peer
->doppelganger
->status
!= Deleted
)
3841 && (!CHECK_FLAG(peer
->doppelganger
->flags
,
3842 PEER_FLAG_CONFIG_NODE
)))
3843 peer_delete(peer
->doppelganger
);
3845 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
3846 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
3848 } else if (type
== peer_change_reset_out
) {
3849 update_group_adjust_peer(peer_af_find(peer
, afi
, safi
));
3850 bgp_announce_route(peer
, afi
, safi
);
3854 struct peer_flag_action
{
3858 /* This flag can be set for peer-group member. */
3859 uint8_t not_for_member
;
3861 /* Action when the flag is changed. */
3862 enum peer_change_type type
;
3865 static const struct peer_flag_action peer_flag_action_list
[] = {
3866 {PEER_FLAG_PASSIVE
, 0, peer_change_reset
},
3867 {PEER_FLAG_SHUTDOWN
, 0, peer_change_reset
},
3868 {PEER_FLAG_DONT_CAPABILITY
, 0, peer_change_none
},
3869 {PEER_FLAG_OVERRIDE_CAPABILITY
, 0, peer_change_none
},
3870 {PEER_FLAG_STRICT_CAP_MATCH
, 0, peer_change_none
},
3871 {PEER_FLAG_DYNAMIC_CAPABILITY
, 0, peer_change_reset
},
3872 {PEER_FLAG_DISABLE_CONNECTED_CHECK
, 0, peer_change_reset
},
3873 {PEER_FLAG_CAPABILITY_ENHE
, 0, peer_change_reset
},
3874 {PEER_FLAG_ENFORCE_FIRST_AS
, 0, peer_change_reset_in
},
3875 {PEER_FLAG_IFPEER_V6ONLY
, 0, peer_change_reset
},
3876 {PEER_FLAG_ROUTEADV
, 0, peer_change_none
},
3877 {PEER_FLAG_TIMER
, 0, peer_change_none
},
3878 {PEER_FLAG_TIMER_CONNECT
, 0, peer_change_none
},
3879 {PEER_FLAG_PASSWORD
, 0, peer_change_none
},
3880 {PEER_FLAG_LOCAL_AS
, 0, peer_change_none
},
3881 {PEER_FLAG_LOCAL_AS_NO_PREPEND
, 0, peer_change_none
},
3882 {PEER_FLAG_LOCAL_AS_REPLACE_AS
, 0, peer_change_none
},
3883 {PEER_FLAG_UPDATE_SOURCE
, 0, peer_change_none
},
3886 static const struct peer_flag_action peer_af_flag_action_list
[] = {
3887 {PEER_FLAG_SEND_COMMUNITY
, 1, peer_change_reset_out
},
3888 {PEER_FLAG_SEND_EXT_COMMUNITY
, 1, peer_change_reset_out
},
3889 {PEER_FLAG_SEND_LARGE_COMMUNITY
, 1, peer_change_reset_out
},
3890 {PEER_FLAG_NEXTHOP_SELF
, 1, peer_change_reset_out
},
3891 {PEER_FLAG_REFLECTOR_CLIENT
, 1, peer_change_reset
},
3892 {PEER_FLAG_RSERVER_CLIENT
, 1, peer_change_reset
},
3893 {PEER_FLAG_SOFT_RECONFIG
, 0, peer_change_reset_in
},
3894 {PEER_FLAG_AS_PATH_UNCHANGED
, 1, peer_change_reset_out
},
3895 {PEER_FLAG_NEXTHOP_UNCHANGED
, 1, peer_change_reset_out
},
3896 {PEER_FLAG_MED_UNCHANGED
, 1, peer_change_reset_out
},
3897 {PEER_FLAG_DEFAULT_ORIGINATE
, 0, peer_change_none
},
3898 {PEER_FLAG_REMOVE_PRIVATE_AS
, 1, peer_change_reset_out
},
3899 {PEER_FLAG_ALLOWAS_IN
, 0, peer_change_reset_in
},
3900 {PEER_FLAG_ALLOWAS_IN_ORIGIN
, 0, peer_change_reset_in
},
3901 {PEER_FLAG_ORF_PREFIX_SM
, 1, peer_change_reset
},
3902 {PEER_FLAG_ORF_PREFIX_RM
, 1, peer_change_reset
},
3903 {PEER_FLAG_MAX_PREFIX
, 0, peer_change_none
},
3904 {PEER_FLAG_MAX_PREFIX_WARNING
, 0, peer_change_none
},
3905 {PEER_FLAG_MAX_PREFIX_FORCE
, 0, peer_change_none
},
3906 {PEER_FLAG_NEXTHOP_LOCAL_UNCHANGED
, 0, peer_change_reset_out
},
3907 {PEER_FLAG_FORCE_NEXTHOP_SELF
, 1, peer_change_reset_out
},
3908 {PEER_FLAG_REMOVE_PRIVATE_AS_ALL
, 1, peer_change_reset_out
},
3909 {PEER_FLAG_REMOVE_PRIVATE_AS_REPLACE
, 1, peer_change_reset_out
},
3910 {PEER_FLAG_AS_OVERRIDE
, 1, peer_change_reset_out
},
3911 {PEER_FLAG_REMOVE_PRIVATE_AS_ALL_REPLACE
, 1, peer_change_reset_out
},
3912 {PEER_FLAG_WEIGHT
, 0, peer_change_reset_in
},
3915 /* Proper action set. */
3916 static int peer_flag_action_set(const struct peer_flag_action
*action_list
,
3917 int size
, struct peer_flag_action
*action
,
3924 const struct peer_flag_action
*match
= NULL
;
3926 /* Check peer's frag action. */
3927 for (i
= 0; i
< size
; i
++) {
3928 match
= &action_list
[i
];
3930 if (match
->flag
== 0)
3933 if (match
->flag
& flag
) {
3936 if (match
->type
== peer_change_reset_in
)
3938 if (match
->type
== peer_change_reset_out
)
3940 if (match
->type
== peer_change_reset
) {
3944 if (match
->not_for_member
)
3945 action
->not_for_member
= 1;
3949 /* Set peer clear type. */
3950 if (reset_in
&& reset_out
)
3951 action
->type
= peer_change_reset
;
3953 action
->type
= peer_change_reset_in
;
3955 action
->type
= peer_change_reset_out
;
3957 action
->type
= peer_change_none
;
3962 static void peer_flag_modify_action(struct peer
*peer
, uint32_t flag
)
3964 if (flag
== PEER_FLAG_SHUTDOWN
) {
3965 if (CHECK_FLAG(peer
->flags
, flag
)) {
3966 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_NSF_WAIT
))
3967 peer_nsf_stop(peer
);
3969 UNSET_FLAG(peer
->sflags
, PEER_STATUS_PREFIX_OVERFLOW
);
3970 if (peer
->t_pmax_restart
) {
3971 BGP_TIMER_OFF(peer
->t_pmax_restart
);
3972 if (bgp_debug_neighbor_events(peer
))
3974 "%s Maximum-prefix restart timer canceled",
3978 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_NSF_WAIT
))
3979 peer_nsf_stop(peer
);
3981 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
3982 char *msg
= peer
->tx_shutdown_message
;
3985 if (!msg
&& peer_group_active(peer
))
3986 msg
= peer
->group
->conf
3987 ->tx_shutdown_message
;
3988 msglen
= msg
? strlen(msg
) : 0;
3993 uint8_t msgbuf
[129];
3996 memcpy(msgbuf
+ 1, msg
, msglen
);
3998 bgp_notify_send_with_data(
3999 peer
, BGP_NOTIFY_CEASE
,
4000 BGP_NOTIFY_CEASE_ADMIN_SHUTDOWN
,
4001 msgbuf
, msglen
+ 1);
4004 peer
, BGP_NOTIFY_CEASE
,
4005 BGP_NOTIFY_CEASE_ADMIN_SHUTDOWN
);
4007 bgp_session_reset(peer
);
4009 peer
->v_start
= BGP_INIT_START_TIMER
;
4010 BGP_EVENT_ADD(peer
, BGP_Stop
);
4012 } else if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
4013 if (flag
== PEER_FLAG_DYNAMIC_CAPABILITY
)
4014 peer
->last_reset
= PEER_DOWN_CAPABILITY_CHANGE
;
4015 else if (flag
== PEER_FLAG_PASSIVE
)
4016 peer
->last_reset
= PEER_DOWN_PASSIVE_CHANGE
;
4017 else if (flag
== PEER_FLAG_DISABLE_CONNECTED_CHECK
)
4018 peer
->last_reset
= PEER_DOWN_MULTIHOP_CHANGE
;
4020 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
4021 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4023 bgp_session_reset(peer
);
4026 /* Change specified peer flag. */
4027 static int peer_flag_modify(struct peer
*peer
, uint32_t flag
, int set
)
4031 bool invert
, member_invert
;
4032 struct peer
*member
;
4033 struct listnode
*node
, *nnode
;
4034 struct peer_flag_action action
;
4036 memset(&action
, 0, sizeof(struct peer_flag_action
));
4037 size
= sizeof(peer_flag_action_list
) / sizeof(struct peer_flag_action
);
4039 invert
= CHECK_FLAG(peer
->flags_invert
, flag
);
4040 found
= peer_flag_action_set(peer_flag_action_list
, size
, &action
,
4043 /* Abort if no flag action exists. */
4045 return BGP_ERR_INVALID_FLAG
;
4047 /* Check for flag conflict: STRICT_CAP_MATCH && OVERRIDE_CAPABILITY */
4048 if (set
&& CHECK_FLAG(peer
->flags
| flag
, PEER_FLAG_STRICT_CAP_MATCH
)
4049 && CHECK_FLAG(peer
->flags
| flag
, PEER_FLAG_OVERRIDE_CAPABILITY
))
4050 return BGP_ERR_PEER_FLAG_CONFLICT
;
4052 /* Handle flag updates where desired state matches current state. */
4053 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4054 if (set
&& CHECK_FLAG(peer
->flags
, flag
)) {
4055 COND_FLAG(peer
->flags_override
, flag
, !invert
);
4059 if (!set
&& !CHECK_FLAG(peer
->flags
, flag
)) {
4060 COND_FLAG(peer
->flags_override
, flag
, invert
);
4065 /* Inherit from peer-group or set/unset flags accordingly. */
4066 if (peer_group_active(peer
) && set
== invert
)
4067 peer_flag_inherit(peer
, flag
);
4069 COND_FLAG(peer
->flags
, flag
, set
);
4071 /* Check if handling a regular peer. */
4072 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4073 /* Update flag override state accordingly. */
4074 COND_FLAG(peer
->flags_override
, flag
, set
!= invert
);
4077 * For the extended next-hop encoding flag we need to turn RAs
4078 * on if flag is being set, but only turn RAs off if the flag
4079 * is being unset on this peer and if this peer is a member of a
4080 * peer-group, the peer-group also doesn't have the flag set.
4082 if (flag
== PEER_FLAG_CAPABILITY_ENHE
) {
4084 bgp_zebra_initiate_radv(peer
->bgp
, peer
);
4085 } else if (peer_group_active(peer
)) {
4086 if (!CHECK_FLAG(peer
->group
->conf
->flags
, flag
))
4087 bgp_zebra_terminate_radv(peer
->bgp
,
4090 bgp_zebra_terminate_radv(peer
->bgp
, peer
);
4093 /* Execute flag action on peer. */
4094 if (action
.type
== peer_change_reset
)
4095 peer_flag_modify_action(peer
, flag
);
4097 /* Skip peer-group mechanics for regular peers. */
4102 * Update peer-group members, unless they are explicitely overriding
4103 * peer-group configuration.
4105 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4106 /* Skip peers with overridden configuration. */
4107 if (CHECK_FLAG(member
->flags_override
, flag
))
4110 /* Check if only member without group is inverted. */
4112 CHECK_FLAG(member
->flags_invert
, flag
) && !invert
;
4114 /* Skip peers with equivalent configuration. */
4115 if (set
!= member_invert
&& CHECK_FLAG(member
->flags
, flag
))
4118 if (set
== member_invert
&& !CHECK_FLAG(member
->flags
, flag
))
4121 /* Update flag on peer-group member. */
4122 COND_FLAG(member
->flags
, flag
, set
!= member_invert
);
4124 if (flag
== PEER_FLAG_CAPABILITY_ENHE
)
4125 set
? bgp_zebra_initiate_radv(member
->bgp
, member
)
4126 : bgp_zebra_terminate_radv(member
->bgp
, member
);
4128 /* Execute flag action on peer-group member. */
4129 if (action
.type
== peer_change_reset
)
4130 peer_flag_modify_action(member
, flag
);
4136 int peer_flag_set(struct peer
*peer
, uint32_t flag
)
4138 return peer_flag_modify(peer
, flag
, 1);
4141 int peer_flag_unset(struct peer
*peer
, uint32_t flag
)
4143 return peer_flag_modify(peer
, flag
, 0);
4146 static int peer_af_flag_modify(struct peer
*peer
, afi_t afi
, safi_t safi
,
4147 uint32_t flag
, bool set
)
4151 bool invert
, member_invert
;
4152 struct peer
*member
;
4153 struct listnode
*node
, *nnode
;
4154 struct peer_flag_action action
;
4155 bgp_peer_sort_t ptype
;
4157 memset(&action
, 0, sizeof(struct peer_flag_action
));
4158 size
= sizeof(peer_af_flag_action_list
)
4159 / sizeof(struct peer_flag_action
);
4161 invert
= CHECK_FLAG(peer
->af_flags_invert
[afi
][safi
], flag
);
4162 found
= peer_flag_action_set(peer_af_flag_action_list
, size
, &action
,
4165 /* Abort if flag action exists. */
4167 return BGP_ERR_INVALID_FLAG
;
4169 ptype
= peer_sort(peer
);
4170 /* Special check for reflector client. */
4171 if (flag
& PEER_FLAG_REFLECTOR_CLIENT
&& ptype
!= BGP_PEER_IBGP
)
4172 return BGP_ERR_NOT_INTERNAL_PEER
;
4174 /* Special check for remove-private-AS. */
4175 if (flag
& PEER_FLAG_REMOVE_PRIVATE_AS
&& ptype
== BGP_PEER_IBGP
)
4176 return BGP_ERR_REMOVE_PRIVATE_AS
;
4178 /* as-override is not allowed for IBGP peers */
4179 if (flag
& PEER_FLAG_AS_OVERRIDE
&& ptype
== BGP_PEER_IBGP
)
4180 return BGP_ERR_AS_OVERRIDE
;
4182 /* Handle flag updates where desired state matches current state. */
4183 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4184 if (set
&& CHECK_FLAG(peer
->af_flags
[afi
][safi
], flag
)) {
4185 COND_FLAG(peer
->af_flags_override
[afi
][safi
], flag
,
4190 if (!set
&& !CHECK_FLAG(peer
->af_flags
[afi
][safi
], flag
)) {
4191 COND_FLAG(peer
->af_flags_override
[afi
][safi
], flag
,
4198 * For EVPN we implicitly set the NEXTHOP_UNCHANGED flag,
4199 * if we are setting/unsetting flags which conflict with this flag
4200 * handle accordingly
4202 if (afi
== AFI_L2VPN
&& safi
== SAFI_EVPN
) {
4206 * if we are setting NEXTHOP_SELF, we need to unset the
4207 * NEXTHOP_UNCHANGED flag
4209 if (CHECK_FLAG(flag
, PEER_FLAG_NEXTHOP_SELF
) ||
4210 CHECK_FLAG(flag
, PEER_FLAG_FORCE_NEXTHOP_SELF
))
4211 UNSET_FLAG(peer
->af_flags
[afi
][safi
],
4212 PEER_FLAG_NEXTHOP_UNCHANGED
);
4216 * if we are unsetting NEXTHOP_SELF, we need to set the
4217 * NEXTHOP_UNCHANGED flag to reset the defaults for EVPN
4219 if (CHECK_FLAG(flag
, PEER_FLAG_NEXTHOP_SELF
) ||
4220 CHECK_FLAG(flag
, PEER_FLAG_FORCE_NEXTHOP_SELF
))
4221 SET_FLAG(peer
->af_flags
[afi
][safi
],
4222 PEER_FLAG_NEXTHOP_UNCHANGED
);
4227 * If the peer is a route server client let's not
4228 * muck with the nexthop on the way out the door
4230 if (flag
& PEER_FLAG_RSERVER_CLIENT
) {
4232 SET_FLAG(peer
->af_flags
[afi
][safi
],
4233 PEER_FLAG_NEXTHOP_UNCHANGED
);
4235 UNSET_FLAG(peer
->af_flags
[afi
][safi
],
4236 PEER_FLAG_NEXTHOP_UNCHANGED
);
4239 /* Inherit from peer-group or set/unset flags accordingly. */
4240 if (peer_group_active(peer
) && set
== invert
)
4241 peer_af_flag_inherit(peer
, afi
, safi
, flag
);
4243 COND_FLAG(peer
->af_flags
[afi
][safi
], flag
, set
);
4245 /* Execute action when peer is established. */
4246 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)
4247 && peer
->status
== Established
) {
4248 if (!set
&& flag
== PEER_FLAG_SOFT_RECONFIG
)
4249 bgp_clear_adj_in(peer
, afi
, safi
);
4251 if (flag
== PEER_FLAG_REFLECTOR_CLIENT
)
4252 peer
->last_reset
= PEER_DOWN_RR_CLIENT_CHANGE
;
4253 else if (flag
== PEER_FLAG_RSERVER_CLIENT
)
4254 peer
->last_reset
= PEER_DOWN_RS_CLIENT_CHANGE
;
4255 else if (flag
== PEER_FLAG_ORF_PREFIX_SM
)
4256 peer
->last_reset
= PEER_DOWN_CAPABILITY_CHANGE
;
4257 else if (flag
== PEER_FLAG_ORF_PREFIX_RM
)
4258 peer
->last_reset
= PEER_DOWN_CAPABILITY_CHANGE
;
4260 peer_change_action(peer
, afi
, safi
, action
.type
);
4264 /* Check if handling a regular peer. */
4265 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4266 COND_FLAG(peer
->af_flags_override
[afi
][safi
], flag
,
4270 * Update peer-group members, unless they are explicitely
4271 * overriding peer-group configuration.
4273 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
,
4275 /* Skip peers with overridden configuration. */
4276 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
4280 /* Check if only member without group is inverted. */
4282 CHECK_FLAG(member
->af_flags_invert
[afi
][safi
],
4286 /* Skip peers with equivalent configuration. */
4287 if (set
!= member_invert
4288 && CHECK_FLAG(member
->af_flags
[afi
][safi
], flag
))
4291 if (set
== member_invert
4292 && !CHECK_FLAG(member
->af_flags
[afi
][safi
], flag
))
4295 /* Update flag on peer-group member. */
4296 COND_FLAG(member
->af_flags
[afi
][safi
], flag
,
4297 set
!= member_invert
);
4299 /* Execute flag action on peer-group member. */
4300 if (member
->status
== Established
) {
4301 if (!set
&& flag
== PEER_FLAG_SOFT_RECONFIG
)
4302 bgp_clear_adj_in(member
, afi
, safi
);
4304 if (flag
== PEER_FLAG_REFLECTOR_CLIENT
)
4305 member
->last_reset
=
4306 PEER_DOWN_RR_CLIENT_CHANGE
;
4308 == PEER_FLAG_RSERVER_CLIENT
)
4309 member
->last_reset
=
4310 PEER_DOWN_RS_CLIENT_CHANGE
;
4312 == PEER_FLAG_ORF_PREFIX_SM
)
4313 member
->last_reset
=
4314 PEER_DOWN_CAPABILITY_CHANGE
;
4316 == PEER_FLAG_ORF_PREFIX_RM
)
4317 member
->last_reset
=
4318 PEER_DOWN_CAPABILITY_CHANGE
;
4320 peer_change_action(member
, afi
, safi
,
4330 int peer_af_flag_set(struct peer
*peer
, afi_t afi
, safi_t safi
, uint32_t flag
)
4332 return peer_af_flag_modify(peer
, afi
, safi
, flag
, 1);
4335 int peer_af_flag_unset(struct peer
*peer
, afi_t afi
, safi_t safi
, uint32_t flag
)
4337 return peer_af_flag_modify(peer
, afi
, safi
, flag
, 0);
4341 void peer_tx_shutdown_message_set(struct peer
*peer
, const char *msg
)
4343 XFREE(MTYPE_PEER_TX_SHUTDOWN_MSG
, peer
->tx_shutdown_message
);
4344 peer
->tx_shutdown_message
=
4345 msg
? XSTRDUP(MTYPE_PEER_TX_SHUTDOWN_MSG
, msg
) : NULL
;
4348 void peer_tx_shutdown_message_unset(struct peer
*peer
)
4350 XFREE(MTYPE_PEER_TX_SHUTDOWN_MSG
, peer
->tx_shutdown_message
);
4354 /* EBGP multihop configuration. */
4355 int peer_ebgp_multihop_set(struct peer
*peer
, int ttl
)
4357 struct peer_group
*group
;
4358 struct listnode
*node
, *nnode
;
4361 if (peer
->sort
== BGP_PEER_IBGP
|| peer
->conf_if
)
4364 /* see comment in peer_ttl_security_hops_set() */
4365 if (ttl
!= MAXTTL
) {
4366 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4367 group
= peer
->group
;
4368 if (group
->conf
->gtsm_hops
!= BGP_GTSM_HOPS_DISABLED
)
4369 return BGP_ERR_NO_EBGP_MULTIHOP_WITH_TTLHACK
;
4371 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
,
4373 if (peer1
->sort
== BGP_PEER_IBGP
)
4376 if (peer1
->gtsm_hops
!= BGP_GTSM_HOPS_DISABLED
)
4377 return BGP_ERR_NO_EBGP_MULTIHOP_WITH_TTLHACK
;
4380 if (peer
->gtsm_hops
!= BGP_GTSM_HOPS_DISABLED
)
4381 return BGP_ERR_NO_EBGP_MULTIHOP_WITH_TTLHACK
;
4387 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4388 if (peer
->fd
>= 0 && peer
->sort
!= BGP_PEER_IBGP
) {
4389 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
4390 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
4391 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4393 bgp_session_reset(peer
);
4396 group
= peer
->group
;
4397 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
4398 if (peer
->sort
== BGP_PEER_IBGP
)
4401 peer
->ttl
= group
->conf
->ttl
;
4403 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
4404 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
4405 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4407 bgp_session_reset(peer
);
4413 int peer_ebgp_multihop_unset(struct peer
*peer
)
4415 struct peer_group
*group
;
4416 struct listnode
*node
, *nnode
;
4418 if (peer
->sort
== BGP_PEER_IBGP
)
4421 if (peer
->gtsm_hops
!= BGP_GTSM_HOPS_DISABLED
&& peer
->ttl
!= MAXTTL
)
4422 return BGP_ERR_NO_EBGP_MULTIHOP_WITH_TTLHACK
;
4424 if (peer_group_active(peer
))
4425 peer
->ttl
= peer
->group
->conf
->ttl
;
4427 peer
->ttl
= BGP_DEFAULT_TTL
;
4429 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4430 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
4431 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
4432 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4434 bgp_session_reset(peer
);
4436 group
= peer
->group
;
4437 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
4438 if (peer
->sort
== BGP_PEER_IBGP
)
4441 peer
->ttl
= BGP_DEFAULT_TTL
;
4443 if (peer
->fd
>= 0) {
4444 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
4446 peer
, BGP_NOTIFY_CEASE
,
4447 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4449 bgp_session_reset(peer
);
4456 /* Neighbor description. */
4457 void peer_description_set(struct peer
*peer
, const char *desc
)
4459 XFREE(MTYPE_PEER_DESC
, peer
->desc
);
4461 peer
->desc
= XSTRDUP(MTYPE_PEER_DESC
, desc
);
4464 void peer_description_unset(struct peer
*peer
)
4466 XFREE(MTYPE_PEER_DESC
, peer
->desc
);
4469 /* Neighbor update-source. */
4470 int peer_update_source_if_set(struct peer
*peer
, const char *ifname
)
4472 struct peer
*member
;
4473 struct listnode
*node
, *nnode
;
4475 /* Set flag and configuration on peer. */
4476 peer_flag_set(peer
, PEER_FLAG_UPDATE_SOURCE
);
4477 if (peer
->update_if
) {
4478 if (strcmp(peer
->update_if
, ifname
) == 0)
4480 XFREE(MTYPE_PEER_UPDATE_SOURCE
, peer
->update_if
);
4482 peer
->update_if
= XSTRDUP(MTYPE_PEER_UPDATE_SOURCE
, ifname
);
4483 sockunion_free(peer
->update_source
);
4484 peer
->update_source
= NULL
;
4486 /* Check if handling a regular peer. */
4487 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4488 /* Send notification or reset peer depending on state. */
4489 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
4490 peer
->last_reset
= PEER_DOWN_UPDATE_SOURCE_CHANGE
;
4491 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
4492 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4494 bgp_session_reset(peer
);
4496 /* Skip peer-group mechanics for regular peers. */
4501 * Set flag and configuration on all peer-group members, unless they are
4502 * explicitely overriding peer-group configuration.
4504 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4505 /* Skip peers with overridden configuration. */
4506 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_UPDATE_SOURCE
))
4509 /* Skip peers with the same configuration. */
4510 if (member
->update_if
) {
4511 if (strcmp(member
->update_if
, ifname
) == 0)
4513 XFREE(MTYPE_PEER_UPDATE_SOURCE
, member
->update_if
);
4516 /* Set flag and configuration on peer-group member. */
4517 SET_FLAG(member
->flags
, PEER_FLAG_UPDATE_SOURCE
);
4518 member
->update_if
= XSTRDUP(MTYPE_PEER_UPDATE_SOURCE
, ifname
);
4519 sockunion_free(member
->update_source
);
4520 member
->update_source
= NULL
;
4522 /* Send notification or reset peer depending on state. */
4523 if (BGP_IS_VALID_STATE_FOR_NOTIF(member
->status
)) {
4524 member
->last_reset
= PEER_DOWN_UPDATE_SOURCE_CHANGE
;
4525 bgp_notify_send(member
, BGP_NOTIFY_CEASE
,
4526 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4528 bgp_session_reset(member
);
4534 int peer_update_source_addr_set(struct peer
*peer
, const union sockunion
*su
)
4536 struct peer
*member
;
4537 struct listnode
*node
, *nnode
;
4539 /* Set flag and configuration on peer. */
4540 peer_flag_set(peer
, PEER_FLAG_UPDATE_SOURCE
);
4541 if (peer
->update_source
) {
4542 if (sockunion_cmp(peer
->update_source
, su
) == 0)
4544 sockunion_free(peer
->update_source
);
4546 peer
->update_source
= sockunion_dup(su
);
4547 XFREE(MTYPE_PEER_UPDATE_SOURCE
, peer
->update_if
);
4549 /* Check if handling a regular peer. */
4550 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4551 /* Send notification or reset peer depending on state. */
4552 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
4553 peer
->last_reset
= PEER_DOWN_UPDATE_SOURCE_CHANGE
;
4554 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
4555 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4557 bgp_session_reset(peer
);
4559 /* Skip peer-group mechanics for regular peers. */
4564 * Set flag and configuration on all peer-group members, unless they are
4565 * explicitely overriding peer-group configuration.
4567 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4568 /* Skip peers with overridden configuration. */
4569 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_UPDATE_SOURCE
))
4572 /* Skip peers with the same configuration. */
4573 if (member
->update_source
) {
4574 if (sockunion_cmp(member
->update_source
, su
) == 0)
4576 sockunion_free(member
->update_source
);
4579 /* Set flag and configuration on peer-group member. */
4580 SET_FLAG(member
->flags
, PEER_FLAG_UPDATE_SOURCE
);
4581 member
->update_source
= sockunion_dup(su
);
4582 XFREE(MTYPE_PEER_UPDATE_SOURCE
, member
->update_if
);
4584 /* Send notification or reset peer depending on state. */
4585 if (BGP_IS_VALID_STATE_FOR_NOTIF(member
->status
)) {
4586 member
->last_reset
= PEER_DOWN_UPDATE_SOURCE_CHANGE
;
4587 bgp_notify_send(member
, BGP_NOTIFY_CEASE
,
4588 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4590 bgp_session_reset(member
);
4596 int peer_update_source_unset(struct peer
*peer
)
4598 struct peer
*member
;
4599 struct listnode
*node
, *nnode
;
4601 if (!CHECK_FLAG(peer
->flags
, PEER_FLAG_UPDATE_SOURCE
))
4604 /* Inherit configuration from peer-group if peer is member. */
4605 if (peer_group_active(peer
)) {
4606 peer_flag_inherit(peer
, PEER_FLAG_UPDATE_SOURCE
);
4607 PEER_SU_ATTR_INHERIT(peer
, peer
->group
, update_source
);
4608 PEER_STR_ATTR_INHERIT(peer
, peer
->group
, update_if
,
4609 MTYPE_PEER_UPDATE_SOURCE
);
4611 /* Otherwise remove flag and configuration from peer. */
4612 peer_flag_unset(peer
, PEER_FLAG_UPDATE_SOURCE
);
4613 sockunion_free(peer
->update_source
);
4614 peer
->update_source
= NULL
;
4615 XFREE(MTYPE_PEER_UPDATE_SOURCE
, peer
->update_if
);
4618 /* Check if handling a regular peer. */
4619 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4620 /* Send notification or reset peer depending on state. */
4621 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
4622 peer
->last_reset
= PEER_DOWN_UPDATE_SOURCE_CHANGE
;
4623 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
4624 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4626 bgp_session_reset(peer
);
4628 /* Skip peer-group mechanics for regular peers. */
4633 * Set flag and configuration on all peer-group members, unless they are
4634 * explicitely overriding peer-group configuration.
4636 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4637 /* Skip peers with overridden configuration. */
4638 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_UPDATE_SOURCE
))
4641 /* Skip peers with the same configuration. */
4642 if (!CHECK_FLAG(member
->flags
, PEER_FLAG_UPDATE_SOURCE
)
4643 && !member
->update_source
&& !member
->update_if
)
4646 /* Remove flag and configuration on peer-group member. */
4647 UNSET_FLAG(member
->flags
, PEER_FLAG_UPDATE_SOURCE
);
4648 sockunion_free(member
->update_source
);
4649 member
->update_source
= NULL
;
4650 XFREE(MTYPE_PEER_UPDATE_SOURCE
, member
->update_if
);
4652 /* Send notification or reset peer depending on state. */
4653 if (BGP_IS_VALID_STATE_FOR_NOTIF(member
->status
)) {
4654 member
->last_reset
= PEER_DOWN_UPDATE_SOURCE_CHANGE
;
4655 bgp_notify_send(member
, BGP_NOTIFY_CEASE
,
4656 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4658 bgp_session_reset(member
);
4664 int peer_default_originate_set(struct peer
*peer
, afi_t afi
, safi_t safi
,
4665 const char *rmap
, struct route_map
*route_map
)
4667 struct peer
*member
;
4668 struct listnode
*node
, *nnode
;
4670 /* Set flag and configuration on peer. */
4671 peer_af_flag_set(peer
, afi
, safi
, PEER_FLAG_DEFAULT_ORIGINATE
);
4673 if (!peer
->default_rmap
[afi
][safi
].name
4674 || strcmp(rmap
, peer
->default_rmap
[afi
][safi
].name
) != 0) {
4675 if (peer
->default_rmap
[afi
][safi
].name
)
4676 XFREE(MTYPE_ROUTE_MAP_NAME
,
4677 peer
->default_rmap
[afi
][safi
].name
);
4679 route_map_counter_decrement(peer
->default_rmap
[afi
][safi
].map
);
4680 peer
->default_rmap
[afi
][safi
].name
=
4681 XSTRDUP(MTYPE_ROUTE_MAP_NAME
, rmap
);
4682 peer
->default_rmap
[afi
][safi
].map
= route_map
;
4683 route_map_counter_increment(route_map
);
4686 if (peer
->default_rmap
[afi
][safi
].name
)
4687 XFREE(MTYPE_ROUTE_MAP_NAME
,
4688 peer
->default_rmap
[afi
][safi
].name
);
4690 route_map_counter_decrement(peer
->default_rmap
[afi
][safi
].map
);
4691 peer
->default_rmap
[afi
][safi
].name
= NULL
;
4692 peer
->default_rmap
[afi
][safi
].map
= NULL
;
4695 /* Check if handling a regular peer. */
4696 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4697 /* Update peer route announcements. */
4698 if (peer
->status
== Established
&& peer
->afc_nego
[afi
][safi
]) {
4699 update_group_adjust_peer(peer_af_find(peer
, afi
, safi
));
4700 bgp_default_originate(peer
, afi
, safi
, 0);
4701 bgp_announce_route(peer
, afi
, safi
);
4704 /* Skip peer-group mechanics for regular peers. */
4709 * Set flag and configuration on all peer-group members, unless they are
4710 * explicitely overriding peer-group configuration.
4712 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4713 /* Skip peers with overridden configuration. */
4714 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
4715 PEER_FLAG_DEFAULT_ORIGINATE
))
4718 /* Set flag and configuration on peer-group member. */
4719 SET_FLAG(member
->af_flags
[afi
][safi
],
4720 PEER_FLAG_DEFAULT_ORIGINATE
);
4722 if (member
->default_rmap
[afi
][safi
].name
)
4723 XFREE(MTYPE_ROUTE_MAP_NAME
,
4724 member
->default_rmap
[afi
][safi
].name
);
4725 route_map_counter_decrement(
4726 member
->default_rmap
[afi
][safi
].map
);
4727 member
->default_rmap
[afi
][safi
].name
=
4728 XSTRDUP(MTYPE_ROUTE_MAP_NAME
, rmap
);
4729 member
->default_rmap
[afi
][safi
].map
= route_map
;
4730 route_map_counter_increment(route_map
);
4733 /* Update peer route announcements. */
4734 if (member
->status
== Established
4735 && member
->afc_nego
[afi
][safi
]) {
4736 update_group_adjust_peer(
4737 peer_af_find(member
, afi
, safi
));
4738 bgp_default_originate(member
, afi
, safi
, 0);
4739 bgp_announce_route(member
, afi
, safi
);
4746 int peer_default_originate_unset(struct peer
*peer
, afi_t afi
, safi_t safi
)
4748 struct peer
*member
;
4749 struct listnode
*node
, *nnode
;
4751 /* Inherit configuration from peer-group if peer is member. */
4752 if (peer_group_active(peer
)) {
4753 peer_af_flag_inherit(peer
, afi
, safi
,
4754 PEER_FLAG_DEFAULT_ORIGINATE
);
4755 PEER_STR_ATTR_INHERIT(peer
, peer
->group
,
4756 default_rmap
[afi
][safi
].name
,
4757 MTYPE_ROUTE_MAP_NAME
);
4758 PEER_ATTR_INHERIT(peer
, peer
->group
,
4759 default_rmap
[afi
][safi
].map
);
4761 /* Otherwise remove flag and configuration from peer. */
4762 peer_af_flag_unset(peer
, afi
, safi
,
4763 PEER_FLAG_DEFAULT_ORIGINATE
);
4764 if (peer
->default_rmap
[afi
][safi
].name
)
4765 XFREE(MTYPE_ROUTE_MAP_NAME
,
4766 peer
->default_rmap
[afi
][safi
].name
);
4767 route_map_counter_decrement(peer
->default_rmap
[afi
][safi
].map
);
4768 peer
->default_rmap
[afi
][safi
].name
= NULL
;
4769 peer
->default_rmap
[afi
][safi
].map
= NULL
;
4772 /* Check if handling a regular peer. */
4773 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4774 /* Update peer route announcements. */
4775 if (peer
->status
== Established
&& peer
->afc_nego
[afi
][safi
]) {
4776 update_group_adjust_peer(peer_af_find(peer
, afi
, safi
));
4777 bgp_default_originate(peer
, afi
, safi
, 1);
4778 bgp_announce_route(peer
, afi
, safi
);
4781 /* Skip peer-group mechanics for regular peers. */
4786 * Remove flag and configuration from all peer-group members, unless
4787 * they are explicitely overriding peer-group configuration.
4789 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4790 /* Skip peers with overridden configuration. */
4791 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
4792 PEER_FLAG_DEFAULT_ORIGINATE
))
4795 /* Remove flag and configuration on peer-group member. */
4796 UNSET_FLAG(peer
->af_flags
[afi
][safi
],
4797 PEER_FLAG_DEFAULT_ORIGINATE
);
4798 if (peer
->default_rmap
[afi
][safi
].name
)
4799 XFREE(MTYPE_ROUTE_MAP_NAME
,
4800 peer
->default_rmap
[afi
][safi
].name
);
4801 route_map_counter_decrement(peer
->default_rmap
[afi
][safi
].map
);
4802 peer
->default_rmap
[afi
][safi
].name
= NULL
;
4803 peer
->default_rmap
[afi
][safi
].map
= NULL
;
4805 /* Update peer route announcements. */
4806 if (peer
->status
== Established
&& peer
->afc_nego
[afi
][safi
]) {
4807 update_group_adjust_peer(peer_af_find(peer
, afi
, safi
));
4808 bgp_default_originate(peer
, afi
, safi
, 1);
4809 bgp_announce_route(peer
, afi
, safi
);
4816 void peer_port_set(struct peer
*peer
, uint16_t port
)
4821 void peer_port_unset(struct peer
*peer
)
4823 peer
->port
= BGP_PORT_DEFAULT
;
4827 * Helper function that is called after the name of the policy
4828 * being used by a peer has changed (AF specific). Automatically
4829 * initiates inbound or outbound processing as needed.
4831 static void peer_on_policy_change(struct peer
*peer
, afi_t afi
, safi_t safi
,
4835 update_group_adjust_peer(peer_af_find(peer
, afi
, safi
));
4836 if (peer
->status
== Established
)
4837 bgp_announce_route(peer
, afi
, safi
);
4839 if (peer
->status
!= Established
)
4842 if (CHECK_FLAG(peer
->af_flags
[afi
][safi
],
4843 PEER_FLAG_SOFT_RECONFIG
))
4844 bgp_soft_reconfig_in(peer
, afi
, safi
);
4845 else if (CHECK_FLAG(peer
->cap
, PEER_CAP_REFRESH_OLD_RCV
)
4846 || CHECK_FLAG(peer
->cap
, PEER_CAP_REFRESH_NEW_RCV
))
4847 bgp_route_refresh_send(peer
, afi
, safi
, 0, 0, 0);
4852 /* neighbor weight. */
4853 int peer_weight_set(struct peer
*peer
, afi_t afi
, safi_t safi
, uint16_t weight
)
4855 struct peer
*member
;
4856 struct listnode
*node
, *nnode
;
4858 /* Set flag and configuration on peer. */
4859 peer_af_flag_set(peer
, afi
, safi
, PEER_FLAG_WEIGHT
);
4860 if (peer
->weight
[afi
][safi
] != weight
) {
4861 peer
->weight
[afi
][safi
] = weight
;
4862 peer_on_policy_change(peer
, afi
, safi
, 0);
4865 /* Skip peer-group mechanics for regular peers. */
4866 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
4870 * Set flag and configuration on all peer-group members, unless they are
4871 * explicitely overriding peer-group configuration.
4873 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4874 /* Skip peers with overridden configuration. */
4875 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
4879 /* Set flag and configuration on peer-group member. */
4880 SET_FLAG(member
->af_flags
[afi
][safi
], PEER_FLAG_WEIGHT
);
4881 if (member
->weight
[afi
][safi
] != weight
) {
4882 member
->weight
[afi
][safi
] = weight
;
4883 peer_on_policy_change(member
, afi
, safi
, 0);
4890 int peer_weight_unset(struct peer
*peer
, afi_t afi
, safi_t safi
)
4892 struct peer
*member
;
4893 struct listnode
*node
, *nnode
;
4895 if (!CHECK_FLAG(peer
->af_flags
[afi
][safi
], PEER_FLAG_WEIGHT
))
4898 /* Inherit configuration from peer-group if peer is member. */
4899 if (peer_group_active(peer
)) {
4900 peer_af_flag_inherit(peer
, afi
, safi
, PEER_FLAG_WEIGHT
);
4901 PEER_ATTR_INHERIT(peer
, peer
->group
, weight
[afi
][safi
]);
4903 peer_on_policy_change(peer
, afi
, safi
, 0);
4907 /* Remove flag and configuration from peer. */
4908 peer_af_flag_unset(peer
, afi
, safi
, PEER_FLAG_WEIGHT
);
4909 peer
->weight
[afi
][safi
] = 0;
4910 peer_on_policy_change(peer
, afi
, safi
, 0);
4912 /* Skip peer-group mechanics for regular peers. */
4913 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
4917 * Remove flag and configuration from all peer-group members, unless
4918 * they are explicitely overriding peer-group configuration.
4920 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4921 /* Skip peers with overridden configuration. */
4922 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
4926 /* Skip peers where flag is already disabled. */
4927 if (!CHECK_FLAG(member
->af_flags
[afi
][safi
], PEER_FLAG_WEIGHT
))
4930 /* Remove flag and configuration on peer-group member. */
4931 UNSET_FLAG(member
->af_flags
[afi
][safi
], PEER_FLAG_WEIGHT
);
4932 member
->weight
[afi
][safi
] = 0;
4933 peer_on_policy_change(member
, afi
, safi
, 0);
4939 int peer_timers_set(struct peer
*peer
, uint32_t keepalive
, uint32_t holdtime
)
4941 struct peer
*member
;
4942 struct listnode
*node
, *nnode
;
4944 if (keepalive
> 65535)
4945 return BGP_ERR_INVALID_VALUE
;
4947 if (holdtime
> 65535)
4948 return BGP_ERR_INVALID_VALUE
;
4950 if (holdtime
< 3 && holdtime
!= 0)
4951 return BGP_ERR_INVALID_VALUE
;
4953 /* Set flag and configuration on peer. */
4954 peer_flag_set(peer
, PEER_FLAG_TIMER
);
4955 peer
->holdtime
= holdtime
;
4956 peer
->keepalive
= (keepalive
< holdtime
/ 3 ? keepalive
: holdtime
/ 3);
4958 /* Skip peer-group mechanics for regular peers. */
4959 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
4963 * Set flag and configuration on all peer-group members, unless they are
4964 * explicitely overriding peer-group configuration.
4966 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4967 /* Skip peers with overridden configuration. */
4968 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_TIMER
))
4971 /* Set flag and configuration on peer-group member. */
4972 SET_FLAG(member
->flags
, PEER_FLAG_TIMER
);
4973 PEER_ATTR_INHERIT(peer
, peer
->group
, holdtime
);
4974 PEER_ATTR_INHERIT(peer
, peer
->group
, keepalive
);
4980 int peer_timers_unset(struct peer
*peer
)
4982 struct peer
*member
;
4983 struct listnode
*node
, *nnode
;
4985 /* Inherit configuration from peer-group if peer is member. */
4986 if (peer_group_active(peer
)) {
4987 peer_flag_inherit(peer
, PEER_FLAG_TIMER
);
4988 PEER_ATTR_INHERIT(peer
, peer
->group
, holdtime
);
4989 PEER_ATTR_INHERIT(peer
, peer
->group
, keepalive
);
4991 /* Otherwise remove flag and configuration from peer. */
4992 peer_flag_unset(peer
, PEER_FLAG_TIMER
);
4994 peer
->keepalive
= 0;
4997 /* Skip peer-group mechanics for regular peers. */
4998 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
5002 * Remove flag and configuration from all peer-group members, unless
5003 * they are explicitely overriding peer-group configuration.
5005 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5006 /* Skip peers with overridden configuration. */
5007 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_TIMER
))
5010 /* Remove flag and configuration on peer-group member. */
5011 UNSET_FLAG(member
->flags
, PEER_FLAG_TIMER
);
5012 member
->holdtime
= 0;
5013 member
->keepalive
= 0;
5019 int peer_timers_connect_set(struct peer
*peer
, uint32_t connect
)
5021 struct peer
*member
;
5022 struct listnode
*node
, *nnode
;
5024 if (connect
> 65535)
5025 return BGP_ERR_INVALID_VALUE
;
5027 /* Set flag and configuration on peer. */
5028 peer_flag_set(peer
, PEER_FLAG_TIMER_CONNECT
);
5029 peer
->connect
= connect
;
5030 peer
->v_connect
= connect
;
5032 /* Skip peer-group mechanics for regular peers. */
5033 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
5037 * Set flag and configuration on all peer-group members, unless they are
5038 * explicitely overriding peer-group configuration.
5040 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5041 /* Skip peers with overridden configuration. */
5042 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_TIMER_CONNECT
))
5045 /* Set flag and configuration on peer-group member. */
5046 SET_FLAG(member
->flags
, PEER_FLAG_TIMER_CONNECT
);
5047 member
->connect
= connect
;
5048 member
->v_connect
= connect
;
5054 int peer_timers_connect_unset(struct peer
*peer
)
5056 struct peer
*member
;
5057 struct listnode
*node
, *nnode
;
5059 /* Inherit configuration from peer-group if peer is member. */
5060 if (peer_group_active(peer
)) {
5061 peer_flag_inherit(peer
, PEER_FLAG_TIMER_CONNECT
);
5062 PEER_ATTR_INHERIT(peer
, peer
->group
, connect
);
5064 /* Otherwise remove flag and configuration from peer. */
5065 peer_flag_unset(peer
, PEER_FLAG_TIMER_CONNECT
);
5069 /* Set timer with fallback to default value. */
5071 peer
->v_connect
= peer
->connect
;
5073 peer
->v_connect
= peer
->bgp
->default_connect_retry
;
5075 /* Skip peer-group mechanics for regular peers. */
5076 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
5080 * Remove flag and configuration from all peer-group members, unless
5081 * they are explicitely overriding peer-group configuration.
5083 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5084 /* Skip peers with overridden configuration. */
5085 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_TIMER_CONNECT
))
5088 /* Remove flag and configuration on peer-group member. */
5089 UNSET_FLAG(member
->flags
, PEER_FLAG_TIMER_CONNECT
);
5090 member
->connect
= 0;
5091 member
->v_connect
= peer
->bgp
->default_connect_retry
;
5097 int peer_advertise_interval_set(struct peer
*peer
, uint32_t routeadv
)
5099 struct peer
*member
;
5100 struct listnode
*node
, *nnode
;
5103 return BGP_ERR_INVALID_VALUE
;
5105 /* Set flag and configuration on peer. */
5106 peer_flag_set(peer
, PEER_FLAG_ROUTEADV
);
5107 peer
->routeadv
= routeadv
;
5108 peer
->v_routeadv
= routeadv
;
5110 /* Check if handling a regular peer. */
5111 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5112 /* Update peer route announcements. */
5113 update_group_adjust_peer_afs(peer
);
5114 if (peer
->status
== Established
)
5115 bgp_announce_route_all(peer
);
5117 /* Skip peer-group mechanics for regular peers. */
5122 * Set flag and configuration on all peer-group members, unless they are
5123 * explicitely overriding peer-group configuration.
5125 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5126 /* Skip peers with overridden configuration. */
5127 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_ROUTEADV
))
5130 /* Set flag and configuration on peer-group member. */
5131 SET_FLAG(member
->flags
, PEER_FLAG_ROUTEADV
);
5132 member
->routeadv
= routeadv
;
5133 member
->v_routeadv
= routeadv
;
5135 /* Update peer route announcements. */
5136 update_group_adjust_peer_afs(member
);
5137 if (member
->status
== Established
)
5138 bgp_announce_route_all(member
);
5144 int peer_advertise_interval_unset(struct peer
*peer
)
5146 struct peer
*member
;
5147 struct listnode
*node
, *nnode
;
5149 /* Inherit configuration from peer-group if peer is member. */
5150 if (peer_group_active(peer
)) {
5151 peer_flag_inherit(peer
, PEER_FLAG_ROUTEADV
);
5152 PEER_ATTR_INHERIT(peer
, peer
->group
, routeadv
);
5154 /* Otherwise remove flag and configuration from peer. */
5155 peer_flag_unset(peer
, PEER_FLAG_ROUTEADV
);
5159 /* Set timer with fallback to default value. */
5161 peer
->v_routeadv
= peer
->routeadv
;
5163 peer
->v_routeadv
= (peer
->sort
== BGP_PEER_IBGP
)
5164 ? BGP_DEFAULT_IBGP_ROUTEADV
5165 : BGP_DEFAULT_EBGP_ROUTEADV
;
5167 /* Check if handling a regular peer. */
5168 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5169 /* Update peer route announcements. */
5170 update_group_adjust_peer_afs(peer
);
5171 if (peer
->status
== Established
)
5172 bgp_announce_route_all(peer
);
5174 /* Skip peer-group mechanics for regular peers. */
5179 * Remove flag and configuration from all peer-group members, unless
5180 * they are explicitely overriding peer-group configuration.
5182 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5183 /* Skip peers with overridden configuration. */
5184 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_ROUTEADV
))
5187 /* Remove flag and configuration on peer-group member. */
5188 UNSET_FLAG(member
->flags
, PEER_FLAG_ROUTEADV
);
5189 member
->routeadv
= 0;
5190 member
->v_routeadv
= (member
->sort
== BGP_PEER_IBGP
)
5191 ? BGP_DEFAULT_IBGP_ROUTEADV
5192 : BGP_DEFAULT_EBGP_ROUTEADV
;
5194 /* Update peer route announcements. */
5195 update_group_adjust_peer_afs(member
);
5196 if (member
->status
== Established
)
5197 bgp_announce_route_all(member
);
5203 /* neighbor interface */
5204 void peer_interface_set(struct peer
*peer
, const char *str
)
5206 XFREE(MTYPE_BGP_PEER_IFNAME
, peer
->ifname
);
5207 peer
->ifname
= XSTRDUP(MTYPE_BGP_PEER_IFNAME
, str
);
5210 void peer_interface_unset(struct peer
*peer
)
5212 XFREE(MTYPE_BGP_PEER_IFNAME
, peer
->ifname
);
5216 int peer_allowas_in_set(struct peer
*peer
, afi_t afi
, safi_t safi
,
5217 int allow_num
, int origin
)
5219 struct peer
*member
;
5220 struct listnode
*node
, *nnode
;
5222 if (!origin
&& (allow_num
< 1 || allow_num
> 10))
5223 return BGP_ERR_INVALID_VALUE
;
5225 /* Set flag and configuration on peer. */
5226 peer_af_flag_set(peer
, afi
, safi
, PEER_FLAG_ALLOWAS_IN
);
5228 if (peer
->allowas_in
[afi
][safi
] != 0
5229 || !CHECK_FLAG(peer
->af_flags
[afi
][safi
],
5230 PEER_FLAG_ALLOWAS_IN_ORIGIN
)) {
5231 peer_af_flag_set(peer
, afi
, safi
,
5232 PEER_FLAG_ALLOWAS_IN_ORIGIN
);
5233 peer
->allowas_in
[afi
][safi
] = 0;
5234 peer_on_policy_change(peer
, afi
, safi
, 0);
5237 if (peer
->allowas_in
[afi
][safi
] != allow_num
5238 || CHECK_FLAG(peer
->af_flags
[afi
][safi
],
5239 PEER_FLAG_ALLOWAS_IN_ORIGIN
)) {
5241 peer_af_flag_unset(peer
, afi
, safi
,
5242 PEER_FLAG_ALLOWAS_IN_ORIGIN
);
5243 peer
->allowas_in
[afi
][safi
] = allow_num
;
5244 peer_on_policy_change(peer
, afi
, safi
, 0);
5248 /* Skip peer-group mechanics for regular peers. */
5249 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
5253 * Set flag and configuration on all peer-group members, unless
5254 * they are explicitely overriding peer-group configuration.
5256 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5257 /* Skip peers with overridden configuration. */
5258 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
5259 PEER_FLAG_ALLOWAS_IN
))
5262 /* Set flag and configuration on peer-group member. */
5263 SET_FLAG(member
->af_flags
[afi
][safi
], PEER_FLAG_ALLOWAS_IN
);
5265 if (member
->allowas_in
[afi
][safi
] != 0
5266 || !CHECK_FLAG(member
->af_flags
[afi
][safi
],
5267 PEER_FLAG_ALLOWAS_IN_ORIGIN
)) {
5268 SET_FLAG(member
->af_flags
[afi
][safi
],
5269 PEER_FLAG_ALLOWAS_IN_ORIGIN
);
5270 member
->allowas_in
[afi
][safi
] = 0;
5271 peer_on_policy_change(peer
, afi
, safi
, 0);
5274 if (member
->allowas_in
[afi
][safi
] != allow_num
5275 || CHECK_FLAG(member
->af_flags
[afi
][safi
],
5276 PEER_FLAG_ALLOWAS_IN_ORIGIN
)) {
5277 UNSET_FLAG(member
->af_flags
[afi
][safi
],
5278 PEER_FLAG_ALLOWAS_IN_ORIGIN
);
5279 member
->allowas_in
[afi
][safi
] = allow_num
;
5280 peer_on_policy_change(peer
, afi
, safi
, 0);
5288 int peer_allowas_in_unset(struct peer
*peer
, afi_t afi
, safi_t safi
)
5290 struct peer
*member
;
5291 struct listnode
*node
, *nnode
;
5293 /* Skip peer if flag is already disabled. */
5294 if (!CHECK_FLAG(peer
->af_flags
[afi
][safi
], PEER_FLAG_ALLOWAS_IN
))
5297 /* Inherit configuration from peer-group if peer is member. */
5298 if (peer_group_active(peer
)) {
5299 peer_af_flag_inherit(peer
, afi
, safi
, PEER_FLAG_ALLOWAS_IN
);
5300 peer_af_flag_inherit(peer
, afi
, safi
,
5301 PEER_FLAG_ALLOWAS_IN_ORIGIN
);
5302 PEER_ATTR_INHERIT(peer
, peer
->group
, allowas_in
[afi
][safi
]);
5303 peer_on_policy_change(peer
, afi
, safi
, 0);
5308 /* Remove flag and configuration from peer. */
5309 peer_af_flag_unset(peer
, afi
, safi
, PEER_FLAG_ALLOWAS_IN
);
5310 peer_af_flag_unset(peer
, afi
, safi
, PEER_FLAG_ALLOWAS_IN_ORIGIN
);
5311 peer
->allowas_in
[afi
][safi
] = 0;
5312 peer_on_policy_change(peer
, afi
, safi
, 0);
5314 /* Skip peer-group mechanics if handling a regular peer. */
5315 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
5319 * Remove flags and configuration from all peer-group members, unless
5320 * they are explicitely overriding peer-group configuration.
5322 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5323 /* Skip peers with overridden configuration. */
5324 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
5325 PEER_FLAG_ALLOWAS_IN
))
5328 /* Skip peers where flag is already disabled. */
5329 if (!CHECK_FLAG(member
->af_flags
[afi
][safi
],
5330 PEER_FLAG_ALLOWAS_IN
))
5333 /* Remove flags and configuration on peer-group member. */
5334 UNSET_FLAG(member
->af_flags
[afi
][safi
], PEER_FLAG_ALLOWAS_IN
);
5335 UNSET_FLAG(member
->af_flags
[afi
][safi
],
5336 PEER_FLAG_ALLOWAS_IN_ORIGIN
);
5337 member
->allowas_in
[afi
][safi
] = 0;
5338 peer_on_policy_change(member
, afi
, safi
, 0);
5344 int peer_local_as_set(struct peer
*peer
, as_t as
, int no_prepend
,
5347 bool old_no_prepend
, old_replace_as
;
5348 struct bgp
*bgp
= peer
->bgp
;
5349 struct peer
*member
;
5350 struct listnode
*node
, *nnode
;
5351 bgp_peer_sort_t ptype
= peer_sort(peer
);
5353 if (ptype
!= BGP_PEER_EBGP
&& ptype
!= BGP_PEER_INTERNAL
)
5354 return BGP_ERR_LOCAL_AS_ALLOWED_ONLY_FOR_EBGP
;
5357 return BGP_ERR_CANNOT_HAVE_LOCAL_AS_SAME_AS
;
5360 return BGP_ERR_CANNOT_HAVE_LOCAL_AS_SAME_AS_REMOTE_AS
;
5362 /* Save previous flag states. */
5364 !!CHECK_FLAG(peer
->flags
, PEER_FLAG_LOCAL_AS_NO_PREPEND
);
5366 !!CHECK_FLAG(peer
->flags
, PEER_FLAG_LOCAL_AS_REPLACE_AS
);
5368 /* Set flag and configuration on peer. */
5369 peer_flag_set(peer
, PEER_FLAG_LOCAL_AS
);
5370 peer_flag_modify(peer
, PEER_FLAG_LOCAL_AS_NO_PREPEND
, no_prepend
);
5371 peer_flag_modify(peer
, PEER_FLAG_LOCAL_AS_REPLACE_AS
, replace_as
);
5373 if (peer
->change_local_as
== as
&& old_no_prepend
== no_prepend
5374 && old_replace_as
== replace_as
)
5376 peer
->change_local_as
= as
;
5378 /* Check if handling a regular peer. */
5379 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5380 /* Send notification or reset peer depending on state. */
5381 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
5382 peer
->last_reset
= PEER_DOWN_LOCAL_AS_CHANGE
;
5383 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
5384 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5386 bgp_session_reset(peer
);
5388 /* Skip peer-group mechanics for regular peers. */
5393 * Set flag and configuration on all peer-group members, unless they are
5394 * explicitely overriding peer-group configuration.
5396 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5397 /* Skip peers with overridden configuration. */
5398 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_LOCAL_AS
))
5401 /* Skip peers with the same configuration. */
5402 old_no_prepend
= CHECK_FLAG(member
->flags
,
5403 PEER_FLAG_LOCAL_AS_NO_PREPEND
);
5404 old_replace_as
= CHECK_FLAG(member
->flags
,
5405 PEER_FLAG_LOCAL_AS_REPLACE_AS
);
5406 if (member
->change_local_as
== as
5407 && CHECK_FLAG(member
->flags
, PEER_FLAG_LOCAL_AS
)
5408 && old_no_prepend
== no_prepend
5409 && old_replace_as
== replace_as
)
5412 /* Set flag and configuration on peer-group member. */
5413 SET_FLAG(member
->flags
, PEER_FLAG_LOCAL_AS
);
5414 COND_FLAG(member
->flags
, PEER_FLAG_LOCAL_AS_NO_PREPEND
,
5416 COND_FLAG(member
->flags
, PEER_FLAG_LOCAL_AS_REPLACE_AS
,
5418 member
->change_local_as
= as
;
5420 /* Send notification or stop peer depending on state. */
5421 if (BGP_IS_VALID_STATE_FOR_NOTIF(member
->status
)) {
5422 member
->last_reset
= PEER_DOWN_LOCAL_AS_CHANGE
;
5423 bgp_notify_send(member
, BGP_NOTIFY_CEASE
,
5424 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5426 BGP_EVENT_ADD(member
, BGP_Stop
);
5432 int peer_local_as_unset(struct peer
*peer
)
5434 struct peer
*member
;
5435 struct listnode
*node
, *nnode
;
5437 if (!CHECK_FLAG(peer
->flags
, PEER_FLAG_LOCAL_AS
))
5440 /* Inherit configuration from peer-group if peer is member. */
5441 if (peer_group_active(peer
)) {
5442 peer_flag_inherit(peer
, PEER_FLAG_LOCAL_AS
);
5443 peer_flag_inherit(peer
, PEER_FLAG_LOCAL_AS_NO_PREPEND
);
5444 peer_flag_inherit(peer
, PEER_FLAG_LOCAL_AS_REPLACE_AS
);
5445 PEER_ATTR_INHERIT(peer
, peer
->group
, change_local_as
);
5447 /* Otherwise remove flag and configuration from peer. */
5448 peer_flag_unset(peer
, PEER_FLAG_LOCAL_AS
);
5449 peer_flag_unset(peer
, PEER_FLAG_LOCAL_AS_NO_PREPEND
);
5450 peer_flag_unset(peer
, PEER_FLAG_LOCAL_AS_REPLACE_AS
);
5451 peer
->change_local_as
= 0;
5454 /* Check if handling a regular peer. */
5455 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5456 /* Send notification or stop peer depending on state. */
5457 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
5458 peer
->last_reset
= PEER_DOWN_LOCAL_AS_CHANGE
;
5459 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
5460 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5462 BGP_EVENT_ADD(peer
, BGP_Stop
);
5464 /* Skip peer-group mechanics for regular peers. */
5469 * Remove flag and configuration from all peer-group members, unless
5470 * they are explicitely overriding peer-group configuration.
5472 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5473 /* Skip peers with overridden configuration. */
5474 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_LOCAL_AS
))
5477 /* Remove flag and configuration on peer-group member. */
5478 UNSET_FLAG(member
->flags
, PEER_FLAG_LOCAL_AS
);
5479 UNSET_FLAG(member
->flags
, PEER_FLAG_LOCAL_AS_NO_PREPEND
);
5480 UNSET_FLAG(member
->flags
, PEER_FLAG_LOCAL_AS_REPLACE_AS
);
5481 member
->change_local_as
= 0;
5483 /* Send notification or stop peer depending on state. */
5484 if (BGP_IS_VALID_STATE_FOR_NOTIF(member
->status
)) {
5485 member
->last_reset
= PEER_DOWN_LOCAL_AS_CHANGE
;
5486 bgp_notify_send(member
, BGP_NOTIFY_CEASE
,
5487 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5489 bgp_session_reset(member
);
5495 /* Set password for authenticating with the peer. */
5496 int peer_password_set(struct peer
*peer
, const char *password
)
5498 struct peer
*member
;
5499 struct listnode
*node
, *nnode
;
5500 int len
= password
? strlen(password
) : 0;
5501 int ret
= BGP_SUCCESS
;
5503 if ((len
< PEER_PASSWORD_MINLEN
) || (len
> PEER_PASSWORD_MAXLEN
))
5504 return BGP_ERR_INVALID_VALUE
;
5506 /* Set flag and configuration on peer. */
5507 peer_flag_set(peer
, PEER_FLAG_PASSWORD
);
5508 if (peer
->password
&& strcmp(peer
->password
, password
) == 0)
5510 XFREE(MTYPE_PEER_PASSWORD
, peer
->password
);
5511 peer
->password
= XSTRDUP(MTYPE_PEER_PASSWORD
, password
);
5513 /* Check if handling a regular peer. */
5514 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5515 /* Send notification or reset peer depending on state. */
5516 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
5517 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
5518 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5520 bgp_session_reset(peer
);
5523 * Attempt to install password on socket and skip peer-group
5526 if (BGP_PEER_SU_UNSPEC(peer
))
5528 return (bgp_md5_set(peer
) >= 0) ? BGP_SUCCESS
5529 : BGP_ERR_TCPSIG_FAILED
;
5533 * Set flag and configuration on all peer-group members, unless they are
5534 * explicitely overriding peer-group configuration.
5536 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5537 /* Skip peers with overridden configuration. */
5538 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_PASSWORD
))
5541 /* Skip peers with the same password. */
5542 if (member
->password
&& strcmp(member
->password
, password
) == 0)
5545 /* Set flag and configuration on peer-group member. */
5546 SET_FLAG(member
->flags
, PEER_FLAG_PASSWORD
);
5547 if (member
->password
)
5548 XFREE(MTYPE_PEER_PASSWORD
, member
->password
);
5549 member
->password
= XSTRDUP(MTYPE_PEER_PASSWORD
, password
);
5551 /* Send notification or reset peer depending on state. */
5552 if (BGP_IS_VALID_STATE_FOR_NOTIF(member
->status
))
5553 bgp_notify_send(member
, BGP_NOTIFY_CEASE
,
5554 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5556 bgp_session_reset(member
);
5558 /* Attempt to install password on socket. */
5559 if (!BGP_PEER_SU_UNSPEC(member
) && bgp_md5_set(member
) < 0)
5560 ret
= BGP_ERR_TCPSIG_FAILED
;
5563 /* Set flag and configuration on all peer-group listen ranges */
5564 struct listnode
*ln
;
5567 for (ALL_LIST_ELEMENTS_RO(peer
->group
->listen_range
[AFI_IP
], ln
, lr
))
5568 bgp_md5_set_prefix(lr
, password
);
5569 for (ALL_LIST_ELEMENTS_RO(peer
->group
->listen_range
[AFI_IP6
], ln
, lr
))
5570 bgp_md5_set_prefix(lr
, password
);
5575 int peer_password_unset(struct peer
*peer
)
5577 struct peer
*member
;
5578 struct listnode
*node
, *nnode
;
5580 if (!CHECK_FLAG(peer
->flags
, PEER_FLAG_PASSWORD
))
5583 /* Inherit configuration from peer-group if peer is member. */
5584 if (peer_group_active(peer
)) {
5585 peer_flag_inherit(peer
, PEER_FLAG_PASSWORD
);
5586 PEER_STR_ATTR_INHERIT(peer
, peer
->group
, password
,
5587 MTYPE_PEER_PASSWORD
);
5589 /* Otherwise remove flag and configuration from peer. */
5590 peer_flag_unset(peer
, PEER_FLAG_PASSWORD
);
5591 XFREE(MTYPE_PEER_PASSWORD
, peer
->password
);
5594 /* Check if handling a regular peer. */
5595 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5596 /* Send notification or reset peer depending on state. */
5597 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
5598 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
5599 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5601 bgp_session_reset(peer
);
5603 /* Attempt to uninstall password on socket. */
5604 if (!BGP_PEER_SU_UNSPEC(peer
))
5605 bgp_md5_unset(peer
);
5607 /* Skip peer-group mechanics for regular peers. */
5612 * Remove flag and configuration from all peer-group members, unless
5613 * they are explicitely overriding peer-group configuration.
5615 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5616 /* Skip peers with overridden configuration. */
5617 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_PASSWORD
))
5620 /* Remove flag and configuration on peer-group member. */
5621 UNSET_FLAG(member
->flags
, PEER_FLAG_PASSWORD
);
5622 XFREE(MTYPE_PEER_PASSWORD
, member
->password
);
5624 /* Send notification or reset peer depending on state. */
5625 if (BGP_IS_VALID_STATE_FOR_NOTIF(member
->status
))
5626 bgp_notify_send(member
, BGP_NOTIFY_CEASE
,
5627 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5629 bgp_session_reset(member
);
5631 /* Attempt to uninstall password on socket. */
5632 if (!BGP_PEER_SU_UNSPEC(member
))
5633 bgp_md5_unset(member
);
5636 /* Set flag and configuration on all peer-group listen ranges */
5637 struct listnode
*ln
;
5640 for (ALL_LIST_ELEMENTS_RO(peer
->group
->listen_range
[AFI_IP
], ln
, lr
))
5641 bgp_md5_unset_prefix(lr
);
5642 for (ALL_LIST_ELEMENTS_RO(peer
->group
->listen_range
[AFI_IP6
], ln
, lr
))
5643 bgp_md5_unset_prefix(lr
);
5649 /* Set distribute list to the peer. */
5650 int peer_distribute_set(struct peer
*peer
, afi_t afi
, safi_t safi
, int direct
,
5653 struct peer
*member
;
5654 struct bgp_filter
*filter
;
5655 struct listnode
*node
, *nnode
;
5657 if (direct
!= FILTER_IN
&& direct
!= FILTER_OUT
)
5658 return BGP_ERR_INVALID_VALUE
;
5660 /* Set configuration on peer. */
5661 filter
= &peer
->filter
[afi
][safi
];
5662 if (filter
->plist
[direct
].name
)
5663 return BGP_ERR_PEER_FILTER_CONFLICT
;
5664 if (filter
->dlist
[direct
].name
)
5665 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->dlist
[direct
].name
);
5666 filter
->dlist
[direct
].name
= XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
5667 filter
->dlist
[direct
].alist
= access_list_lookup(afi
, name
);
5669 /* Check if handling a regular peer. */
5670 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5671 /* Set override-flag and process peer route updates. */
5672 SET_FLAG(peer
->filter_override
[afi
][safi
][direct
],
5673 PEER_FT_DISTRIBUTE_LIST
);
5674 peer_on_policy_change(peer
, afi
, safi
,
5675 (direct
== FILTER_OUT
) ? 1 : 0);
5677 /* Skip peer-group mechanics for regular peers. */
5682 * Set configuration on all peer-group members, un less they are
5683 * explicitely overriding peer-group configuration.
5685 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5686 /* Skip peers with overridden configuration. */
5687 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
5688 PEER_FT_DISTRIBUTE_LIST
))
5691 /* Set configuration on peer-group member. */
5692 filter
= &member
->filter
[afi
][safi
];
5693 if (filter
->dlist
[direct
].name
)
5694 XFREE(MTYPE_BGP_FILTER_NAME
,
5695 filter
->dlist
[direct
].name
);
5696 filter
->dlist
[direct
].name
=
5697 XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
5698 filter
->dlist
[direct
].alist
= access_list_lookup(afi
, name
);
5700 /* Process peer route updates. */
5701 peer_on_policy_change(member
, afi
, safi
,
5702 (direct
== FILTER_OUT
) ? 1 : 0);
5708 int peer_distribute_unset(struct peer
*peer
, afi_t afi
, safi_t safi
, int direct
)
5710 struct peer
*member
;
5711 struct bgp_filter
*filter
;
5712 struct listnode
*node
, *nnode
;
5714 if (direct
!= FILTER_IN
&& direct
!= FILTER_OUT
)
5715 return BGP_ERR_INVALID_VALUE
;
5717 /* Unset override-flag unconditionally. */
5718 UNSET_FLAG(peer
->filter_override
[afi
][safi
][direct
],
5719 PEER_FT_DISTRIBUTE_LIST
);
5721 /* Inherit configuration from peer-group if peer is member. */
5722 if (peer_group_active(peer
)) {
5723 PEER_STR_ATTR_INHERIT(peer
, peer
->group
,
5724 filter
[afi
][safi
].dlist
[direct
].name
,
5725 MTYPE_BGP_FILTER_NAME
);
5726 PEER_ATTR_INHERIT(peer
, peer
->group
,
5727 filter
[afi
][safi
].dlist
[direct
].alist
);
5729 /* Otherwise remove configuration from peer. */
5730 filter
= &peer
->filter
[afi
][safi
];
5731 if (filter
->dlist
[direct
].name
)
5732 XFREE(MTYPE_BGP_FILTER_NAME
,
5733 filter
->dlist
[direct
].name
);
5734 filter
->dlist
[direct
].name
= NULL
;
5735 filter
->dlist
[direct
].alist
= NULL
;
5738 /* Check if handling a regular peer. */
5739 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5740 /* Process peer route updates. */
5741 peer_on_policy_change(peer
, afi
, safi
,
5742 (direct
== FILTER_OUT
) ? 1 : 0);
5744 /* Skip peer-group mechanics for regular peers. */
5749 * Remove configuration on all peer-group members, unless they are
5750 * explicitely overriding peer-group configuration.
5752 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5753 /* Skip peers with overridden configuration. */
5754 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
5755 PEER_FT_DISTRIBUTE_LIST
))
5758 /* Remove configuration on peer-group member. */
5759 filter
= &member
->filter
[afi
][safi
];
5760 if (filter
->dlist
[direct
].name
)
5761 XFREE(MTYPE_BGP_FILTER_NAME
,
5762 filter
->dlist
[direct
].name
);
5763 filter
->dlist
[direct
].name
= NULL
;
5764 filter
->dlist
[direct
].alist
= NULL
;
5766 /* Process peer route updates. */
5767 peer_on_policy_change(member
, afi
, safi
,
5768 (direct
== FILTER_OUT
) ? 1 : 0);
5774 /* Update distribute list. */
5775 static void peer_distribute_update(struct access_list
*access
)
5780 struct listnode
*mnode
, *mnnode
;
5781 struct listnode
*node
, *nnode
;
5784 struct peer_group
*group
;
5785 struct bgp_filter
*filter
;
5787 for (ALL_LIST_ELEMENTS(bm
->bgp
, mnode
, mnnode
, bgp
)) {
5789 update_group_policy_update(bgp
, BGP_POLICY_FILTER_LIST
,
5790 access
->name
, 0, 0);
5791 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
5792 FOREACH_AFI_SAFI (afi
, safi
) {
5793 filter
= &peer
->filter
[afi
][safi
];
5795 for (direct
= FILTER_IN
; direct
< FILTER_MAX
;
5797 if (filter
->dlist
[direct
].name
)
5798 filter
->dlist
[direct
]
5799 .alist
= access_list_lookup(
5801 filter
->dlist
[direct
]
5804 filter
->dlist
[direct
].alist
=
5809 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, nnode
, group
)) {
5810 FOREACH_AFI_SAFI (afi
, safi
) {
5811 filter
= &group
->conf
->filter
[afi
][safi
];
5813 for (direct
= FILTER_IN
; direct
< FILTER_MAX
;
5815 if (filter
->dlist
[direct
].name
)
5816 filter
->dlist
[direct
]
5817 .alist
= access_list_lookup(
5819 filter
->dlist
[direct
]
5822 filter
->dlist
[direct
].alist
=
5827 #ifdef ENABLE_BGP_VNC
5828 vnc_prefix_list_update(bgp
);
5833 /* Set prefix list to the peer. */
5834 int peer_prefix_list_set(struct peer
*peer
, afi_t afi
, safi_t safi
, int direct
,
5837 struct peer
*member
;
5838 struct bgp_filter
*filter
;
5839 struct listnode
*node
, *nnode
;
5841 if (direct
!= FILTER_IN
&& direct
!= FILTER_OUT
)
5842 return BGP_ERR_INVALID_VALUE
;
5844 /* Set configuration on peer. */
5845 filter
= &peer
->filter
[afi
][safi
];
5846 if (filter
->dlist
[direct
].name
)
5847 return BGP_ERR_PEER_FILTER_CONFLICT
;
5848 if (filter
->plist
[direct
].name
)
5849 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->plist
[direct
].name
);
5850 filter
->plist
[direct
].name
= XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
5851 filter
->plist
[direct
].plist
= prefix_list_lookup(afi
, name
);
5853 /* Check if handling a regular peer. */
5854 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5855 /* Set override-flag and process peer route updates. */
5856 SET_FLAG(peer
->filter_override
[afi
][safi
][direct
],
5857 PEER_FT_PREFIX_LIST
);
5858 peer_on_policy_change(peer
, afi
, safi
,
5859 (direct
== FILTER_OUT
) ? 1 : 0);
5861 /* Skip peer-group mechanics for regular peers. */
5866 * Set configuration on all peer-group members, unless they are
5867 * explicitely overriding peer-group configuration.
5869 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5870 /* Skip peers with overridden configuration. */
5871 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
5872 PEER_FT_PREFIX_LIST
))
5875 /* Set configuration on peer-group member. */
5876 filter
= &member
->filter
[afi
][safi
];
5877 if (filter
->plist
[direct
].name
)
5878 XFREE(MTYPE_BGP_FILTER_NAME
,
5879 filter
->plist
[direct
].name
);
5880 filter
->plist
[direct
].name
=
5881 XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
5882 filter
->plist
[direct
].plist
= prefix_list_lookup(afi
, name
);
5884 /* Process peer route updates. */
5885 peer_on_policy_change(member
, afi
, safi
,
5886 (direct
== FILTER_OUT
) ? 1 : 0);
5892 int peer_prefix_list_unset(struct peer
*peer
, afi_t afi
, safi_t safi
,
5895 struct peer
*member
;
5896 struct bgp_filter
*filter
;
5897 struct listnode
*node
, *nnode
;
5899 if (direct
!= FILTER_IN
&& direct
!= FILTER_OUT
)
5900 return BGP_ERR_INVALID_VALUE
;
5902 /* Unset override-flag unconditionally. */
5903 UNSET_FLAG(peer
->filter_override
[afi
][safi
][direct
],
5904 PEER_FT_PREFIX_LIST
);
5906 /* Inherit configuration from peer-group if peer is member. */
5907 if (peer_group_active(peer
)) {
5908 PEER_STR_ATTR_INHERIT(peer
, peer
->group
,
5909 filter
[afi
][safi
].plist
[direct
].name
,
5910 MTYPE_BGP_FILTER_NAME
);
5911 PEER_ATTR_INHERIT(peer
, peer
->group
,
5912 filter
[afi
][safi
].plist
[direct
].plist
);
5914 /* Otherwise remove configuration from peer. */
5915 filter
= &peer
->filter
[afi
][safi
];
5916 if (filter
->plist
[direct
].name
)
5917 XFREE(MTYPE_BGP_FILTER_NAME
,
5918 filter
->plist
[direct
].name
);
5919 filter
->plist
[direct
].name
= NULL
;
5920 filter
->plist
[direct
].plist
= NULL
;
5923 /* Check if handling a regular peer. */
5924 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5925 /* Process peer route updates. */
5926 peer_on_policy_change(peer
, afi
, safi
,
5927 (direct
== FILTER_OUT
) ? 1 : 0);
5929 /* Skip peer-group mechanics for regular peers. */
5934 * Remove configuration on all peer-group members, unless they are
5935 * explicitely overriding peer-group configuration.
5937 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5938 /* Skip peers with overridden configuration. */
5939 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
5940 PEER_FT_PREFIX_LIST
))
5943 /* Remove configuration on peer-group member. */
5944 filter
= &member
->filter
[afi
][safi
];
5945 if (filter
->plist
[direct
].name
)
5946 XFREE(MTYPE_BGP_FILTER_NAME
,
5947 filter
->plist
[direct
].name
);
5948 filter
->plist
[direct
].name
= NULL
;
5949 filter
->plist
[direct
].plist
= NULL
;
5951 /* Process peer route updates. */
5952 peer_on_policy_change(member
, afi
, safi
,
5953 (direct
== FILTER_OUT
) ? 1 : 0);
5959 /* Update prefix-list list. */
5960 static void peer_prefix_list_update(struct prefix_list
*plist
)
5962 struct listnode
*mnode
, *mnnode
;
5963 struct listnode
*node
, *nnode
;
5966 struct peer_group
*group
;
5967 struct bgp_filter
*filter
;
5972 for (ALL_LIST_ELEMENTS(bm
->bgp
, mnode
, mnnode
, bgp
)) {
5975 * Update the prefix-list on update groups.
5977 update_group_policy_update(
5978 bgp
, BGP_POLICY_PREFIX_LIST
,
5979 plist
? prefix_list_name(plist
) : NULL
, 0, 0);
5981 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
5982 FOREACH_AFI_SAFI (afi
, safi
) {
5983 filter
= &peer
->filter
[afi
][safi
];
5985 for (direct
= FILTER_IN
; direct
< FILTER_MAX
;
5987 if (filter
->plist
[direct
].name
)
5988 filter
->plist
[direct
]
5989 .plist
= prefix_list_lookup(
5991 filter
->plist
[direct
]
5994 filter
->plist
[direct
].plist
=
5999 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, nnode
, group
)) {
6000 FOREACH_AFI_SAFI (afi
, safi
) {
6001 filter
= &group
->conf
->filter
[afi
][safi
];
6003 for (direct
= FILTER_IN
; direct
< FILTER_MAX
;
6005 if (filter
->plist
[direct
].name
)
6006 filter
->plist
[direct
]
6007 .plist
= prefix_list_lookup(
6009 filter
->plist
[direct
]
6012 filter
->plist
[direct
].plist
=
6020 int peer_aslist_set(struct peer
*peer
, afi_t afi
, safi_t safi
, int direct
,
6023 struct peer
*member
;
6024 struct bgp_filter
*filter
;
6025 struct listnode
*node
, *nnode
;
6027 if (direct
!= FILTER_IN
&& direct
!= FILTER_OUT
)
6028 return BGP_ERR_INVALID_VALUE
;
6030 /* Set configuration on peer. */
6031 filter
= &peer
->filter
[afi
][safi
];
6032 if (filter
->aslist
[direct
].name
)
6033 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->aslist
[direct
].name
);
6034 filter
->aslist
[direct
].name
= XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
6035 filter
->aslist
[direct
].aslist
= as_list_lookup(name
);
6037 /* Check if handling a regular peer. */
6038 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6039 /* Set override-flag and process peer route updates. */
6040 SET_FLAG(peer
->filter_override
[afi
][safi
][direct
],
6041 PEER_FT_FILTER_LIST
);
6042 peer_on_policy_change(peer
, afi
, safi
,
6043 (direct
== FILTER_OUT
) ? 1 : 0);
6045 /* Skip peer-group mechanics for regular peers. */
6050 * Set configuration on all peer-group members, unless they are
6051 * explicitely overriding peer-group configuration.
6053 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
6054 /* Skip peers with overridden configuration. */
6055 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
6056 PEER_FT_FILTER_LIST
))
6059 /* Set configuration on peer-group member. */
6060 filter
= &member
->filter
[afi
][safi
];
6061 if (filter
->aslist
[direct
].name
)
6062 XFREE(MTYPE_BGP_FILTER_NAME
,
6063 filter
->aslist
[direct
].name
);
6064 filter
->aslist
[direct
].name
=
6065 XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
6066 filter
->aslist
[direct
].aslist
= as_list_lookup(name
);
6068 /* Process peer route updates. */
6069 peer_on_policy_change(member
, afi
, safi
,
6070 (direct
== FILTER_OUT
) ? 1 : 0);
6076 int peer_aslist_unset(struct peer
*peer
, afi_t afi
, safi_t safi
, int direct
)
6078 struct peer
*member
;
6079 struct bgp_filter
*filter
;
6080 struct listnode
*node
, *nnode
;
6082 if (direct
!= FILTER_IN
&& direct
!= FILTER_OUT
)
6083 return BGP_ERR_INVALID_VALUE
;
6085 /* Unset override-flag unconditionally. */
6086 UNSET_FLAG(peer
->filter_override
[afi
][safi
][direct
],
6087 PEER_FT_FILTER_LIST
);
6089 /* Inherit configuration from peer-group if peer is member. */
6090 if (peer_group_active(peer
)) {
6091 PEER_STR_ATTR_INHERIT(peer
, peer
->group
,
6092 filter
[afi
][safi
].aslist
[direct
].name
,
6093 MTYPE_BGP_FILTER_NAME
);
6094 PEER_ATTR_INHERIT(peer
, peer
->group
,
6095 filter
[afi
][safi
].aslist
[direct
].aslist
);
6097 /* Otherwise remove configuration from peer. */
6098 filter
= &peer
->filter
[afi
][safi
];
6099 if (filter
->aslist
[direct
].name
)
6100 XFREE(MTYPE_BGP_FILTER_NAME
,
6101 filter
->aslist
[direct
].name
);
6102 filter
->aslist
[direct
].name
= NULL
;
6103 filter
->aslist
[direct
].aslist
= NULL
;
6106 /* Check if handling a regular peer. */
6107 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6108 /* Process peer route updates. */
6109 peer_on_policy_change(peer
, afi
, safi
,
6110 (direct
== FILTER_OUT
) ? 1 : 0);
6112 /* Skip peer-group mechanics for regular peers. */
6117 * Remove configuration on all peer-group members, unless they are
6118 * explicitely overriding peer-group configuration.
6120 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
6121 /* Skip peers with overridden configuration. */
6122 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
6123 PEER_FT_FILTER_LIST
))
6126 /* Remove configuration on peer-group member. */
6127 filter
= &member
->filter
[afi
][safi
];
6128 if (filter
->aslist
[direct
].name
)
6129 XFREE(MTYPE_BGP_FILTER_NAME
,
6130 filter
->aslist
[direct
].name
);
6131 filter
->aslist
[direct
].name
= NULL
;
6132 filter
->aslist
[direct
].aslist
= NULL
;
6134 /* Process peer route updates. */
6135 peer_on_policy_change(member
, afi
, safi
,
6136 (direct
== FILTER_OUT
) ? 1 : 0);
6142 static void peer_aslist_update(const char *aslist_name
)
6147 struct listnode
*mnode
, *mnnode
;
6148 struct listnode
*node
, *nnode
;
6151 struct peer_group
*group
;
6152 struct bgp_filter
*filter
;
6154 for (ALL_LIST_ELEMENTS(bm
->bgp
, mnode
, mnnode
, bgp
)) {
6155 update_group_policy_update(bgp
, BGP_POLICY_FILTER_LIST
,
6158 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
6159 FOREACH_AFI_SAFI (afi
, safi
) {
6160 filter
= &peer
->filter
[afi
][safi
];
6162 for (direct
= FILTER_IN
; direct
< FILTER_MAX
;
6164 if (filter
->aslist
[direct
].name
)
6165 filter
->aslist
[direct
]
6166 .aslist
= as_list_lookup(
6167 filter
->aslist
[direct
]
6170 filter
->aslist
[direct
].aslist
=
6175 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, nnode
, group
)) {
6176 FOREACH_AFI_SAFI (afi
, safi
) {
6177 filter
= &group
->conf
->filter
[afi
][safi
];
6179 for (direct
= FILTER_IN
; direct
< FILTER_MAX
;
6181 if (filter
->aslist
[direct
].name
)
6182 filter
->aslist
[direct
]
6183 .aslist
= as_list_lookup(
6184 filter
->aslist
[direct
]
6187 filter
->aslist
[direct
].aslist
=
6195 static void peer_aslist_add(char *aslist_name
)
6197 peer_aslist_update(aslist_name
);
6198 route_map_notify_dependencies(aslist_name
, RMAP_EVENT_ASLIST_ADDED
);
6201 static void peer_aslist_del(const char *aslist_name
)
6203 peer_aslist_update(aslist_name
);
6204 route_map_notify_dependencies(aslist_name
, RMAP_EVENT_ASLIST_DELETED
);
6208 int peer_route_map_set(struct peer
*peer
, afi_t afi
, safi_t safi
, int direct
,
6209 const char *name
, struct route_map
*route_map
)
6211 struct peer
*member
;
6212 struct bgp_filter
*filter
;
6213 struct listnode
*node
, *nnode
;
6215 if (direct
!= RMAP_IN
&& direct
!= RMAP_OUT
)
6216 return BGP_ERR_INVALID_VALUE
;
6218 /* Set configuration on peer. */
6219 filter
= &peer
->filter
[afi
][safi
];
6220 if (filter
->map
[direct
].name
) {
6221 /* If the neighbor is configured with the same route-map
6222 * again then, ignore the duplicate configuration.
6224 if (strcmp(filter
->map
[direct
].name
, name
) == 0)
6227 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->map
[direct
].name
);
6229 route_map_counter_decrement(filter
->map
[direct
].map
);
6230 filter
->map
[direct
].name
= XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
6231 filter
->map
[direct
].map
= route_map
;
6232 route_map_counter_increment(route_map
);
6234 /* Check if handling a regular peer. */
6235 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6236 /* Set override-flag and process peer route updates. */
6237 SET_FLAG(peer
->filter_override
[afi
][safi
][direct
],
6239 peer_on_policy_change(peer
, afi
, safi
,
6240 (direct
== RMAP_OUT
) ? 1 : 0);
6242 /* Skip peer-group mechanics for regular peers. */
6247 * Set configuration on all peer-group members, unless they are
6248 * explicitely overriding peer-group configuration.
6250 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
6251 /* Skip peers with overridden configuration. */
6252 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
6256 /* Set configuration on peer-group member. */
6257 filter
= &member
->filter
[afi
][safi
];
6258 if (filter
->map
[direct
].name
)
6259 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->map
[direct
].name
);
6260 route_map_counter_decrement(filter
->map
[direct
].map
);
6261 filter
->map
[direct
].name
= XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
6262 filter
->map
[direct
].map
= route_map
;
6263 route_map_counter_increment(route_map
);
6265 /* Process peer route updates. */
6266 peer_on_policy_change(member
, afi
, safi
,
6267 (direct
== RMAP_OUT
) ? 1 : 0);
6272 /* Unset route-map from the peer. */
6273 int peer_route_map_unset(struct peer
*peer
, afi_t afi
, safi_t safi
, int direct
)
6275 struct peer
*member
;
6276 struct bgp_filter
*filter
;
6277 struct listnode
*node
, *nnode
;
6279 if (direct
!= RMAP_IN
&& direct
!= RMAP_OUT
)
6280 return BGP_ERR_INVALID_VALUE
;
6282 /* Unset override-flag unconditionally. */
6283 UNSET_FLAG(peer
->filter_override
[afi
][safi
][direct
], PEER_FT_ROUTE_MAP
);
6285 /* Inherit configuration from peer-group if peer is member. */
6286 if (peer_group_active(peer
)) {
6287 PEER_STR_ATTR_INHERIT(peer
, peer
->group
,
6288 filter
[afi
][safi
].map
[direct
].name
,
6289 MTYPE_BGP_FILTER_NAME
);
6290 PEER_ATTR_INHERIT(peer
, peer
->group
,
6291 filter
[afi
][safi
].map
[direct
].map
);
6293 /* Otherwise remove configuration from peer. */
6294 filter
= &peer
->filter
[afi
][safi
];
6295 if (filter
->map
[direct
].name
)
6296 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->map
[direct
].name
);
6297 route_map_counter_decrement(filter
->map
[direct
].map
);
6298 filter
->map
[direct
].name
= NULL
;
6299 filter
->map
[direct
].map
= NULL
;
6302 /* Check if handling a regular peer. */
6303 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6304 /* Process peer route updates. */
6305 peer_on_policy_change(peer
, afi
, safi
,
6306 (direct
== RMAP_OUT
) ? 1 : 0);
6308 /* Skip peer-group mechanics for regular peers. */
6313 * Remove configuration on all peer-group members, unless they are
6314 * explicitely overriding peer-group configuration.
6316 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
6317 /* Skip peers with overridden configuration. */
6318 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
6322 /* Remove configuration on peer-group member. */
6323 filter
= &member
->filter
[afi
][safi
];
6324 if (filter
->map
[direct
].name
)
6325 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->map
[direct
].name
);
6326 route_map_counter_decrement(filter
->map
[direct
].map
);
6327 filter
->map
[direct
].name
= NULL
;
6328 filter
->map
[direct
].map
= NULL
;
6330 /* Process peer route updates. */
6331 peer_on_policy_change(member
, afi
, safi
,
6332 (direct
== RMAP_OUT
) ? 1 : 0);
6338 /* Set unsuppress-map to the peer. */
6339 int peer_unsuppress_map_set(struct peer
*peer
, afi_t afi
, safi_t safi
,
6340 const char *name
, struct route_map
*route_map
)
6342 struct peer
*member
;
6343 struct bgp_filter
*filter
;
6344 struct listnode
*node
, *nnode
;
6346 /* Set configuration on peer. */
6347 filter
= &peer
->filter
[afi
][safi
];
6348 if (filter
->usmap
.name
)
6349 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->usmap
.name
);
6350 route_map_counter_decrement(filter
->usmap
.map
);
6351 filter
->usmap
.name
= XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
6352 filter
->usmap
.map
= route_map
;
6353 route_map_counter_increment(route_map
);
6355 /* Check if handling a regular peer. */
6356 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6357 /* Set override-flag and process peer route updates. */
6358 SET_FLAG(peer
->filter_override
[afi
][safi
][0],
6359 PEER_FT_UNSUPPRESS_MAP
);
6360 peer_on_policy_change(peer
, afi
, safi
, 1);
6362 /* Skip peer-group mechanics for regular peers. */
6367 * Set configuration on all peer-group members, unless they are
6368 * explicitely overriding peer-group configuration.
6370 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
6371 /* Skip peers with overridden configuration. */
6372 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][0],
6373 PEER_FT_UNSUPPRESS_MAP
))
6376 /* Set configuration on peer-group member. */
6377 filter
= &member
->filter
[afi
][safi
];
6378 if (filter
->usmap
.name
)
6379 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->usmap
.name
);
6380 route_map_counter_decrement(filter
->usmap
.map
);
6381 filter
->usmap
.name
= XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
6382 filter
->usmap
.map
= route_map
;
6383 route_map_counter_increment(route_map
);
6385 /* Process peer route updates. */
6386 peer_on_policy_change(member
, afi
, safi
, 1);
6392 /* Unset route-map from the peer. */
6393 int peer_unsuppress_map_unset(struct peer
*peer
, afi_t afi
, safi_t safi
)
6395 struct peer
*member
;
6396 struct bgp_filter
*filter
;
6397 struct listnode
*node
, *nnode
;
6399 /* Unset override-flag unconditionally. */
6400 UNSET_FLAG(peer
->filter_override
[afi
][safi
][0], PEER_FT_UNSUPPRESS_MAP
);
6402 /* Inherit configuration from peer-group if peer is member. */
6403 if (peer_group_active(peer
)) {
6404 PEER_STR_ATTR_INHERIT(peer
, peer
->group
,
6405 filter
[afi
][safi
].usmap
.name
,
6406 MTYPE_BGP_FILTER_NAME
);
6407 PEER_ATTR_INHERIT(peer
, peer
->group
,
6408 filter
[afi
][safi
].usmap
.map
);
6410 /* Otherwise remove configuration from peer. */
6411 filter
= &peer
->filter
[afi
][safi
];
6412 if (filter
->usmap
.name
)
6413 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->usmap
.name
);
6414 route_map_counter_decrement(filter
->usmap
.map
);
6415 filter
->usmap
.name
= NULL
;
6416 filter
->usmap
.map
= NULL
;
6419 /* Check if handling a regular peer. */
6420 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6421 /* Process peer route updates. */
6422 peer_on_policy_change(peer
, afi
, safi
, 1);
6424 /* Skip peer-group mechanics for regular peers. */
6429 * Remove configuration on all peer-group members, unless they are
6430 * explicitely overriding peer-group configuration.
6432 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
6433 /* Skip peers with overridden configuration. */
6434 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][0],
6435 PEER_FT_UNSUPPRESS_MAP
))
6438 /* Remove configuration on peer-group member. */
6439 filter
= &member
->filter
[afi
][safi
];
6440 if (filter
->usmap
.name
)
6441 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->usmap
.name
);
6442 route_map_counter_decrement(filter
->usmap
.map
);
6443 filter
->usmap
.name
= NULL
;
6444 filter
->usmap
.map
= NULL
;
6446 /* Process peer route updates. */
6447 peer_on_policy_change(member
, afi
, safi
, 1);
6453 int peer_maximum_prefix_set(struct peer
*peer
, afi_t afi
, safi_t safi
,
6454 uint32_t max
, uint8_t threshold
, int warning
,
6455 uint16_t restart
, bool force
)
6457 struct peer
*member
;
6458 struct listnode
*node
, *nnode
;
6460 /* Set flags and configuration on peer. */
6461 peer_af_flag_set(peer
, afi
, safi
, PEER_FLAG_MAX_PREFIX
);
6464 peer_af_flag_set(peer
, afi
, safi
, PEER_FLAG_MAX_PREFIX_FORCE
);
6466 peer_af_flag_unset(peer
, afi
, safi
, PEER_FLAG_MAX_PREFIX_FORCE
);
6469 peer_af_flag_set(peer
, afi
, safi
, PEER_FLAG_MAX_PREFIX_WARNING
);
6471 peer_af_flag_unset(peer
, afi
, safi
,
6472 PEER_FLAG_MAX_PREFIX_WARNING
);
6474 peer
->pmax
[afi
][safi
] = max
;
6475 peer
->pmax_threshold
[afi
][safi
] = threshold
;
6476 peer
->pmax_restart
[afi
][safi
] = restart
;
6478 /* Check if handling a regular peer. */
6479 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6480 /* Re-check if peer violates maximum-prefix. */
6481 if ((peer
->status
== Established
) && (peer
->afc
[afi
][safi
]))
6482 bgp_maximum_prefix_overflow(peer
, afi
, safi
, 1);
6484 /* Skip peer-group mechanics for regular peers. */
6489 * Set flags and configuration on all peer-group members, unless they
6490 * are explicitely overriding peer-group configuration.
6492 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
6493 /* Skip peers with overridden configuration. */
6494 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
6495 PEER_FLAG_MAX_PREFIX
))
6498 /* Set flag and configuration on peer-group member. */
6499 member
->pmax
[afi
][safi
] = max
;
6500 member
->pmax_threshold
[afi
][safi
] = threshold
;
6501 member
->pmax_restart
[afi
][safi
] = restart
;
6504 SET_FLAG(member
->af_flags
[afi
][safi
],
6505 PEER_FLAG_MAX_PREFIX_FORCE
);
6507 UNSET_FLAG(member
->af_flags
[afi
][safi
],
6508 PEER_FLAG_MAX_PREFIX_FORCE
);
6511 SET_FLAG(member
->af_flags
[afi
][safi
],
6512 PEER_FLAG_MAX_PREFIX_WARNING
);
6514 UNSET_FLAG(member
->af_flags
[afi
][safi
],
6515 PEER_FLAG_MAX_PREFIX_WARNING
);
6517 /* Re-check if peer violates maximum-prefix. */
6518 if ((member
->status
== Established
) && (member
->afc
[afi
][safi
]))
6519 bgp_maximum_prefix_overflow(member
, afi
, safi
, 1);
6525 int peer_maximum_prefix_unset(struct peer
*peer
, afi_t afi
, safi_t safi
)
6527 /* Inherit configuration from peer-group if peer is member. */
6528 if (peer_group_active(peer
)) {
6529 peer_af_flag_inherit(peer
, afi
, safi
, PEER_FLAG_MAX_PREFIX
);
6530 peer_af_flag_inherit(peer
, afi
, safi
,
6531 PEER_FLAG_MAX_PREFIX_FORCE
);
6532 peer_af_flag_inherit(peer
, afi
, safi
,
6533 PEER_FLAG_MAX_PREFIX_WARNING
);
6534 PEER_ATTR_INHERIT(peer
, peer
->group
, pmax
[afi
][safi
]);
6535 PEER_ATTR_INHERIT(peer
, peer
->group
, pmax_threshold
[afi
][safi
]);
6536 PEER_ATTR_INHERIT(peer
, peer
->group
, pmax_restart
[afi
][safi
]);
6541 /* Remove flags and configuration from peer. */
6542 peer_af_flag_unset(peer
, afi
, safi
, PEER_FLAG_MAX_PREFIX
);
6543 peer_af_flag_unset(peer
, afi
, safi
, PEER_FLAG_MAX_PREFIX_FORCE
);
6544 peer_af_flag_unset(peer
, afi
, safi
, PEER_FLAG_MAX_PREFIX_WARNING
);
6545 peer
->pmax
[afi
][safi
] = 0;
6546 peer
->pmax_threshold
[afi
][safi
] = 0;
6547 peer
->pmax_restart
[afi
][safi
] = 0;
6550 * Remove flags and configuration from all peer-group members, unless
6551 * they are explicitely overriding peer-group configuration.
6553 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6554 struct peer
*member
;
6555 struct listnode
*node
;
6557 for (ALL_LIST_ELEMENTS_RO(peer
->group
->peer
, node
, member
)) {
6558 /* Skip peers with overridden configuration. */
6559 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
6560 PEER_FLAG_MAX_PREFIX
))
6563 /* Remove flag and configuration on peer-group member.
6565 UNSET_FLAG(member
->af_flags
[afi
][safi
],
6566 PEER_FLAG_MAX_PREFIX
);
6567 UNSET_FLAG(member
->af_flags
[afi
][safi
],
6568 PEER_FLAG_MAX_PREFIX_FORCE
);
6569 UNSET_FLAG(member
->af_flags
[afi
][safi
],
6570 PEER_FLAG_MAX_PREFIX_WARNING
);
6571 member
->pmax
[afi
][safi
] = 0;
6572 member
->pmax_threshold
[afi
][safi
] = 0;
6573 member
->pmax_restart
[afi
][safi
] = 0;
6580 int is_ebgp_multihop_configured(struct peer
*peer
)
6582 struct peer_group
*group
;
6583 struct listnode
*node
, *nnode
;
6586 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6587 group
= peer
->group
;
6588 if ((peer_sort(peer
) != BGP_PEER_IBGP
)
6589 && (group
->conf
->ttl
!= BGP_DEFAULT_TTL
))
6592 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer1
)) {
6593 if ((peer_sort(peer1
) != BGP_PEER_IBGP
)
6594 && (peer1
->ttl
!= BGP_DEFAULT_TTL
))
6598 if ((peer_sort(peer
) != BGP_PEER_IBGP
)
6599 && (peer
->ttl
!= BGP_DEFAULT_TTL
))
6605 /* Set # of hops between us and BGP peer. */
6606 int peer_ttl_security_hops_set(struct peer
*peer
, int gtsm_hops
)
6608 struct peer_group
*group
;
6609 struct listnode
*node
, *nnode
;
6612 zlog_debug("peer_ttl_security_hops_set: set gtsm_hops to %d for %s",
6613 gtsm_hops
, peer
->host
);
6615 /* We cannot configure ttl-security hops when ebgp-multihop is already
6616 set. For non peer-groups, the check is simple. For peer-groups,
6618 slightly messy, because we need to check both the peer-group
6620 and all peer-group members for any trace of ebgp-multihop
6622 before actually applying the ttl-security rules. Cisco really made a
6623 mess of this configuration parameter, and OpenBGPD got it right.
6626 if ((peer
->gtsm_hops
== BGP_GTSM_HOPS_DISABLED
)
6627 && (peer
->sort
!= BGP_PEER_IBGP
)) {
6628 if (is_ebgp_multihop_configured(peer
))
6629 return BGP_ERR_NO_EBGP_MULTIHOP_WITH_TTLHACK
;
6631 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6632 peer
->gtsm_hops
= gtsm_hops
;
6634 /* Calling ebgp multihop also resets the session.
6635 * On restart, NHT will get setup correctly as will the
6636 * min & max ttls on the socket. The return value is
6639 ret
= peer_ebgp_multihop_set(peer
, MAXTTL
);
6644 group
= peer
->group
;
6645 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
,
6647 peer
->gtsm_hops
= group
->conf
->gtsm_hops
;
6649 /* Calling ebgp multihop also resets the
6651 * On restart, NHT will get setup correctly as
6653 * min & max ttls on the socket. The return
6657 peer_ebgp_multihop_set(peer
, MAXTTL
);
6661 /* Post the first gtsm setup or if its ibgp, maxttl setting
6663 * necessary, just set the minttl.
6665 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6666 peer
->gtsm_hops
= gtsm_hops
;
6669 sockopt_minttl(peer
->su
.sa
.sa_family
, peer
->fd
,
6670 MAXTTL
+ 1 - gtsm_hops
);
6671 if ((peer
->status
< Established
) && peer
->doppelganger
6672 && (peer
->doppelganger
->fd
>= 0))
6673 sockopt_minttl(peer
->su
.sa
.sa_family
,
6674 peer
->doppelganger
->fd
,
6675 MAXTTL
+ 1 - gtsm_hops
);
6677 group
= peer
->group
;
6678 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
,
6680 peer
->gtsm_hops
= group
->conf
->gtsm_hops
;
6682 /* Change setting of existing peer
6683 * established then change value (may break
6685 * not established yet (teardown session and
6687 * no session then do nothing (will get
6688 * handled by next connection)
6692 != BGP_GTSM_HOPS_DISABLED
)
6694 peer
->su
.sa
.sa_family
, peer
->fd
,
6695 MAXTTL
+ 1 - peer
->gtsm_hops
);
6696 if ((peer
->status
< Established
)
6697 && peer
->doppelganger
6698 && (peer
->doppelganger
->fd
>= 0))
6699 sockopt_minttl(peer
->su
.sa
.sa_family
,
6700 peer
->doppelganger
->fd
,
6701 MAXTTL
+ 1 - gtsm_hops
);
6709 int peer_ttl_security_hops_unset(struct peer
*peer
)
6711 struct peer_group
*group
;
6712 struct listnode
*node
, *nnode
;
6715 zlog_debug("peer_ttl_security_hops_unset: set gtsm_hops to zero for %s",
6718 /* if a peer-group member, then reset to peer-group default rather than
6720 if (peer_group_active(peer
))
6721 peer
->gtsm_hops
= peer
->group
->conf
->gtsm_hops
;
6723 peer
->gtsm_hops
= BGP_GTSM_HOPS_DISABLED
;
6725 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6726 /* Invoking ebgp_multihop_set will set the TTL back to the
6728 * value as well as restting the NHT and such. The session is
6731 if (peer
->sort
== BGP_PEER_EBGP
)
6732 ret
= peer_ebgp_multihop_unset(peer
);
6735 sockopt_minttl(peer
->su
.sa
.sa_family
, peer
->fd
,
6738 if ((peer
->status
< Established
) && peer
->doppelganger
6739 && (peer
->doppelganger
->fd
>= 0))
6740 sockopt_minttl(peer
->su
.sa
.sa_family
,
6741 peer
->doppelganger
->fd
, 0);
6744 group
= peer
->group
;
6745 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
6746 peer
->gtsm_hops
= BGP_GTSM_HOPS_DISABLED
;
6747 if (peer
->sort
== BGP_PEER_EBGP
)
6748 ret
= peer_ebgp_multihop_unset(peer
);
6751 sockopt_minttl(peer
->su
.sa
.sa_family
,
6754 if ((peer
->status
< Established
)
6755 && peer
->doppelganger
6756 && (peer
->doppelganger
->fd
>= 0))
6757 sockopt_minttl(peer
->su
.sa
.sa_family
,
6758 peer
->doppelganger
->fd
,
6768 * If peer clear is invoked in a loop for all peers on the BGP instance,
6769 * it may end up freeing the doppelganger, and if this was the next node
6770 * to the current node, we would end up accessing the freed next node.
6771 * Pass along additional parameter which can be updated if next node
6772 * is freed; only required when walking the peer list on BGP instance.
6774 int peer_clear(struct peer
*peer
, struct listnode
**nnode
)
6776 if (!CHECK_FLAG(peer
->flags
, PEER_FLAG_SHUTDOWN
)) {
6777 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_PREFIX_OVERFLOW
)) {
6778 UNSET_FLAG(peer
->sflags
, PEER_STATUS_PREFIX_OVERFLOW
);
6779 if (peer
->t_pmax_restart
) {
6780 BGP_TIMER_OFF(peer
->t_pmax_restart
);
6781 if (bgp_debug_neighbor_events(peer
))
6783 "%s Maximum-prefix restart timer canceled",
6786 BGP_EVENT_ADD(peer
, BGP_Start
);
6790 peer
->v_start
= BGP_INIT_START_TIMER
;
6791 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
6792 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
6793 BGP_NOTIFY_CEASE_ADMIN_RESET
);
6795 bgp_session_reset_safe(peer
, nnode
);
6800 int peer_clear_soft(struct peer
*peer
, afi_t afi
, safi_t safi
,
6801 enum bgp_clear_type stype
)
6803 struct peer_af
*paf
;
6805 if (peer
->status
!= Established
)
6808 if (!peer
->afc
[afi
][safi
])
6809 return BGP_ERR_AF_UNCONFIGURED
;
6811 peer
->rtt
= sockopt_tcp_rtt(peer
->fd
);
6813 if (stype
== BGP_CLEAR_SOFT_OUT
|| stype
== BGP_CLEAR_SOFT_BOTH
) {
6814 /* Clear the "neighbor x.x.x.x default-originate" flag */
6815 paf
= peer_af_find(peer
, afi
, safi
);
6816 if (paf
&& paf
->subgroup
6817 && CHECK_FLAG(paf
->subgroup
->sflags
,
6818 SUBGRP_STATUS_DEFAULT_ORIGINATE
))
6819 UNSET_FLAG(paf
->subgroup
->sflags
,
6820 SUBGRP_STATUS_DEFAULT_ORIGINATE
);
6822 bgp_announce_route(peer
, afi
, safi
);
6825 if (stype
== BGP_CLEAR_SOFT_IN_ORF_PREFIX
) {
6826 if (CHECK_FLAG(peer
->af_cap
[afi
][safi
],
6827 PEER_CAP_ORF_PREFIX_SM_ADV
)
6828 && (CHECK_FLAG(peer
->af_cap
[afi
][safi
],
6829 PEER_CAP_ORF_PREFIX_RM_RCV
)
6830 || CHECK_FLAG(peer
->af_cap
[afi
][safi
],
6831 PEER_CAP_ORF_PREFIX_RM_OLD_RCV
))) {
6832 struct bgp_filter
*filter
= &peer
->filter
[afi
][safi
];
6833 uint8_t prefix_type
;
6835 if (CHECK_FLAG(peer
->af_cap
[afi
][safi
],
6836 PEER_CAP_ORF_PREFIX_RM_RCV
))
6837 prefix_type
= ORF_TYPE_PREFIX
;
6839 prefix_type
= ORF_TYPE_PREFIX_OLD
;
6841 if (filter
->plist
[FILTER_IN
].plist
) {
6842 if (CHECK_FLAG(peer
->af_sflags
[afi
][safi
],
6843 PEER_STATUS_ORF_PREFIX_SEND
))
6844 bgp_route_refresh_send(
6845 peer
, afi
, safi
, prefix_type
,
6847 bgp_route_refresh_send(peer
, afi
, safi
,
6849 REFRESH_IMMEDIATE
, 0);
6851 if (CHECK_FLAG(peer
->af_sflags
[afi
][safi
],
6852 PEER_STATUS_ORF_PREFIX_SEND
))
6853 bgp_route_refresh_send(
6854 peer
, afi
, safi
, prefix_type
,
6855 REFRESH_IMMEDIATE
, 1);
6857 bgp_route_refresh_send(peer
, afi
, safi
,
6864 if (stype
== BGP_CLEAR_SOFT_IN
|| stype
== BGP_CLEAR_SOFT_BOTH
6865 || stype
== BGP_CLEAR_SOFT_IN_ORF_PREFIX
) {
6866 /* If neighbor has soft reconfiguration inbound flag.
6867 Use Adj-RIB-In database. */
6868 if (CHECK_FLAG(peer
->af_flags
[afi
][safi
],
6869 PEER_FLAG_SOFT_RECONFIG
))
6870 bgp_soft_reconfig_in(peer
, afi
, safi
);
6872 /* If neighbor has route refresh capability, send route
6874 message to the peer. */
6875 if (CHECK_FLAG(peer
->cap
, PEER_CAP_REFRESH_OLD_RCV
)
6876 || CHECK_FLAG(peer
->cap
, PEER_CAP_REFRESH_NEW_RCV
))
6877 bgp_route_refresh_send(peer
, afi
, safi
, 0, 0,
6880 return BGP_ERR_SOFT_RECONFIG_UNCONFIGURED
;
6886 /* Display peer uptime.*/
6887 char *peer_uptime(time_t uptime2
, char *buf
, size_t len
, bool use_json
,
6890 time_t uptime1
, epoch_tbuf
;
6893 /* If there is no connection has been done before print `never'. */
6896 json_object_string_add(json
, "peerUptime", "never");
6897 json_object_int_add(json
, "peerUptimeMsec", 0);
6899 snprintf(buf
, len
, "never");
6903 /* Get current time. */
6904 uptime1
= bgp_clock();
6906 gmtime_r(&uptime1
, &tm
);
6908 if (uptime1
< ONE_DAY_SECOND
)
6909 snprintf(buf
, len
, "%02d:%02d:%02d", tm
.tm_hour
, tm
.tm_min
,
6911 else if (uptime1
< ONE_WEEK_SECOND
)
6912 snprintf(buf
, len
, "%dd%02dh%02dm", tm
.tm_yday
, tm
.tm_hour
,
6914 else if (uptime1
< ONE_YEAR_SECOND
)
6915 snprintf(buf
, len
, "%02dw%dd%02dh", tm
.tm_yday
/ 7,
6916 tm
.tm_yday
- ((tm
.tm_yday
/ 7) * 7), tm
.tm_hour
);
6918 snprintf(buf
, len
, "%02dy%02dw%dd", tm
.tm_year
- 70,
6920 tm
.tm_yday
- ((tm
.tm_yday
/ 7) * 7));
6923 epoch_tbuf
= time(NULL
) - uptime1
;
6924 json_object_string_add(json
, "peerUptime", buf
);
6925 json_object_int_add(json
, "peerUptimeMsec", uptime1
* 1000);
6926 json_object_int_add(json
, "peerUptimeEstablishedEpoch",
6933 void bgp_master_init(struct thread_master
*master
, const int buffer_size
)
6937 memset(&bgp_master
, 0, sizeof(struct bgp_master
));
6940 bm
->bgp
= list_new();
6941 bm
->listen_sockets
= list_new();
6942 bm
->port
= BGP_PORT_DEFAULT
;
6943 bm
->master
= master
;
6944 bm
->start_time
= bgp_clock();
6945 bm
->t_rmap_update
= NULL
;
6946 bm
->rmap_update_timer
= RMAP_DEFAULT_UPDATE_TIMER
;
6947 bm
->terminating
= false;
6948 bm
->socket_buffer
= buffer_size
;
6950 bgp_process_queue_init();
6953 /* init the rd id space.
6954 assign 0th index in the bitfield,
6955 so that we start with id 1
6957 bf_init(bm
->rd_idspace
, UINT16_MAX
);
6958 bf_assign_zero_index(bm
->rd_idspace
);
6960 /* mpls label dynamic allocation pool */
6961 bgp_lp_init(bm
->master
, &bm
->labelpool
);
6964 QOBJ_REG(bm
, bgp_master
);
6968 * Free up connected routes and interfaces for a BGP instance. Invoked upon
6969 * instance delete (non-default only) or BGP exit.
6971 static void bgp_if_finish(struct bgp
*bgp
)
6974 struct interface
*ifp
;
6976 vrf
= bgp_vrf_lookup_by_instance_type(bgp
);
6978 if (bgp
->inst_type
== BGP_INSTANCE_TYPE_VIEW
|| !vrf
)
6981 FOR_ALL_INTERFACES (vrf
, ifp
) {
6982 struct listnode
*c_node
, *c_nnode
;
6983 struct connected
*c
;
6985 for (ALL_LIST_ELEMENTS(ifp
->connected
, c_node
, c_nnode
, c
))
6986 bgp_connected_delete(bgp
, c
);
6990 static void bgp_viewvrf_autocomplete(vector comps
, struct cmd_token
*token
)
6992 struct vrf
*vrf
= NULL
;
6993 struct listnode
*next
;
6996 RB_FOREACH (vrf
, vrf_name_head
, &vrfs_by_name
)
6997 vector_set(comps
, XSTRDUP(MTYPE_COMPLETION
, vrf
->name
));
6999 for (ALL_LIST_ELEMENTS_RO(bm
->bgp
, next
, bgp
)) {
7000 if (bgp
->inst_type
!= BGP_INSTANCE_TYPE_VIEW
)
7003 vector_set(comps
, XSTRDUP(MTYPE_COMPLETION
, bgp
->name
));
7007 static void bgp_instasn_autocomplete(vector comps
, struct cmd_token
*token
)
7009 struct listnode
*next
, *next2
;
7010 struct bgp
*bgp
, *bgp2
;
7013 for (ALL_LIST_ELEMENTS_RO(bm
->bgp
, next
, bgp
)) {
7015 for (ALL_LIST_ELEMENTS_RO(bm
->bgp
, next2
, bgp2
)) {
7016 if (bgp2
->as
== bgp
->as
)
7024 snprintf(buf
, sizeof(buf
), "%u", bgp
->as
);
7025 vector_set(comps
, XSTRDUP(MTYPE_COMPLETION
, buf
));
7029 static const struct cmd_variable_handler bgp_viewvrf_var_handlers
[] = {
7030 {.tokenname
= "VIEWVRFNAME", .completions
= bgp_viewvrf_autocomplete
},
7031 {.varname
= "instasn", .completions
= bgp_instasn_autocomplete
},
7032 {.completions
= NULL
},
7035 struct frr_pthread
*bgp_pth_io
;
7036 struct frr_pthread
*bgp_pth_ka
;
7038 static void bgp_pthreads_init(void)
7040 assert(!bgp_pth_io
);
7041 assert(!bgp_pth_ka
);
7043 struct frr_pthread_attr io
= {
7044 .start
= frr_pthread_attr_default
.start
,
7045 .stop
= frr_pthread_attr_default
.stop
,
7047 struct frr_pthread_attr ka
= {
7048 .start
= bgp_keepalives_start
,
7049 .stop
= bgp_keepalives_stop
,
7051 bgp_pth_io
= frr_pthread_new(&io
, "BGP I/O thread", "bgpd_io");
7052 bgp_pth_ka
= frr_pthread_new(&ka
, "BGP Keepalives thread", "bgpd_ka");
7055 void bgp_pthreads_run(void)
7057 frr_pthread_run(bgp_pth_io
, NULL
);
7058 frr_pthread_run(bgp_pth_ka
, NULL
);
7060 /* Wait until threads are ready. */
7061 frr_pthread_wait_running(bgp_pth_io
);
7062 frr_pthread_wait_running(bgp_pth_ka
);
7065 void bgp_pthreads_finish(void)
7067 frr_pthread_stop_all();
7070 void bgp_init(unsigned short instance
)
7073 /* allocates some vital data structures used by peer commands in
7076 /* pre-init pthreads */
7077 bgp_pthreads_init();
7080 bgp_zebra_init(bm
->master
, instance
);
7082 #ifdef ENABLE_BGP_VNC
7083 vnc_zebra_init(bm
->master
);
7086 /* BGP VTY commands installation. */
7094 bgp_route_map_init();
7095 bgp_scan_vty_init();
7097 #ifdef ENABLE_BGP_VNC
7100 bgp_ethernetvpn_init();
7101 bgp_flowspec_vty_init();
7103 /* Access list initialize. */
7105 access_list_add_hook(peer_distribute_update
);
7106 access_list_delete_hook(peer_distribute_update
);
7108 /* Filter list initialize. */
7110 as_list_add_hook(peer_aslist_add
);
7111 as_list_delete_hook(peer_aslist_del
);
7113 /* Prefix list initialize.*/
7115 prefix_list_add_hook(peer_prefix_list_update
);
7116 prefix_list_delete_hook(peer_prefix_list_update
);
7118 /* Community list initialize. */
7119 bgp_clist
= community_list_init();
7124 cmd_variable_handler_register(bgp_viewvrf_var_handlers
);
7127 void bgp_terminate(void)
7131 struct listnode
*node
, *nnode
;
7132 struct listnode
*mnode
, *mnnode
;
7136 /* Close the listener sockets first as this prevents peers from
7138 * to reconnect on receiving the peer unconfig message. In the presence
7139 * of a large number of peers this will ensure that no peer is left with
7140 * a dangling connection
7142 /* reverse bgp_master_init */
7145 if (bm
->listen_sockets
)
7146 list_delete(&bm
->listen_sockets
);
7148 for (ALL_LIST_ELEMENTS(bm
->bgp
, mnode
, mnnode
, bgp
))
7149 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
))
7150 if (peer
->status
== Established
7151 || peer
->status
== OpenSent
7152 || peer
->status
== OpenConfirm
)
7153 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
7154 BGP_NOTIFY_CEASE_PEER_UNCONFIG
);
7156 if (bm
->process_main_queue
)
7157 work_queue_free_and_null(&bm
->process_main_queue
);
7159 if (bm
->t_rmap_update
)
7160 BGP_TIMER_OFF(bm
->t_rmap_update
);
7163 bgp_evpn_mh_finish();
7166 struct peer
*peer_lookup_in_view(struct vty
*vty
, struct bgp
*bgp
,
7167 const char *ip_str
, bool use_json
)
7173 /* Get peer sockunion. */
7174 ret
= str2sockunion(ip_str
, &su
);
7176 peer
= peer_lookup_by_conf_if(bgp
, ip_str
);
7178 peer
= peer_lookup_by_hostname(bgp
, ip_str
);
7182 json_object
*json_no
= NULL
;
7183 json_no
= json_object_new_object();
7184 json_object_string_add(
7186 "malformedAddressOrName",
7188 vty_out(vty
, "%s\n",
7189 json_object_to_json_string_ext(
7191 JSON_C_TO_STRING_PRETTY
));
7192 json_object_free(json_no
);
7195 "%% Malformed address or name: %s\n",
7203 /* Peer structure lookup. */
7204 peer
= peer_lookup(bgp
, &su
);
7207 json_object
*json_no
= NULL
;
7208 json_no
= json_object_new_object();
7209 json_object_string_add(json_no
, "warning",
7210 "No such neighbor in this view/vrf");
7211 vty_out(vty
, "%s\n",
7212 json_object_to_json_string_ext(
7213 json_no
, JSON_C_TO_STRING_PRETTY
));
7214 json_object_free(json_no
);
7216 vty_out(vty
, "No such neighbor in this view/vrf\n");
7223 void bgp_gr_apply_running_config(void)
7225 struct peer
*peer
= NULL
;
7226 struct bgp
*bgp
= NULL
;
7227 struct listnode
*node
, *nnode
;
7228 bool gr_router_detected
= false;
7230 if (BGP_DEBUG(graceful_restart
, GRACEFUL_RESTART
))
7231 zlog_debug("[BGP_GR] %s called !", __func__
);
7233 for (ALL_LIST_ELEMENTS(bm
->bgp
, node
, nnode
, bgp
)) {
7234 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
7235 bgp_peer_gr_flags_update(peer
);
7236 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_GRACEFUL_RESTART
))
7237 gr_router_detected
= true;
7240 if (gr_router_detected
7241 && bgp
->present_zebra_gr_state
== ZEBRA_GR_DISABLE
) {
7242 bgp_zebra_send_capabilities(bgp
, true);
7243 } else if (!gr_router_detected
7244 && bgp
->present_zebra_gr_state
== ZEBRA_GR_ENABLE
) {
7245 bgp_zebra_send_capabilities(bgp
, false);
7248 gr_router_detected
= false;