1 /* BGP-4, BGP-4+ daemon program
2 * Copyright (C) 1996, 97, 98, 99, 2000 Kunihiro Ishiguro
4 * This file is part of GNU Zebra.
6 * GNU Zebra is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License as published by the
8 * Free Software Foundation; either version 2, or (at your option) any
11 * GNU Zebra is distributed in the hope that it will be useful, but
12 * WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * General Public License for more details.
16 * You should have received a copy of the GNU General Public License along
17 * with this program; see the file COPYING; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
29 #include "sockunion.h"
38 #include "workqueue.h"
46 #include "frr_pthread.h"
49 #include "bgpd/bgpd.h"
50 #include "bgpd/bgp_table.h"
51 #include "bgpd/bgp_aspath.h"
52 #include "bgpd/bgp_route.h"
53 #include "bgpd/bgp_dump.h"
54 #include "bgpd/bgp_debug.h"
55 #include "bgpd/bgp_errors.h"
56 #include "bgpd/bgp_community.h"
57 #include "bgpd/bgp_attr.h"
58 #include "bgpd/bgp_regex.h"
59 #include "bgpd/bgp_clist.h"
60 #include "bgpd/bgp_fsm.h"
61 #include "bgpd/bgp_packet.h"
62 #include "bgpd/bgp_zebra.h"
63 #include "bgpd/bgp_open.h"
64 #include "bgpd/bgp_filter.h"
65 #include "bgpd/bgp_nexthop.h"
66 #include "bgpd/bgp_damp.h"
67 #include "bgpd/bgp_mplsvpn.h"
69 #include "bgpd/rfapi/bgp_rfapi_cfg.h"
70 #include "bgpd/rfapi/rfapi_backend.h"
72 #include "bgpd/bgp_evpn.h"
73 #include "bgpd/bgp_advertise.h"
74 #include "bgpd/bgp_network.h"
75 #include "bgpd/bgp_vty.h"
76 #include "bgpd/bgp_mpath.h"
77 #include "bgpd/bgp_nht.h"
78 #include "bgpd/bgp_updgrp.h"
79 #include "bgpd/bgp_bfd.h"
80 #include "bgpd/bgp_memory.h"
81 #include "bgpd/bgp_evpn_vty.h"
82 #include "bgpd/bgp_keepalives.h"
83 #include "bgpd/bgp_io.h"
84 #include "bgpd/bgp_ecommunity.h"
85 #include "bgpd/bgp_flowspec.h"
86 #include "bgpd/bgp_labelpool.h"
87 #include "bgpd/bgp_pbr.h"
88 #include "bgpd/bgp_addpath.h"
89 #include "bgpd/bgp_evpn_private.h"
90 #include "bgpd/bgp_mac.h"
92 DEFINE_MTYPE_STATIC(BGPD
, PEER_TX_SHUTDOWN_MSG
, "Peer shutdown message (TX)");
93 DEFINE_MTYPE_STATIC(BGPD
, BGP_EVPN_INFO
, "BGP EVPN instance information");
94 DEFINE_QOBJ_TYPE(bgp_master
)
96 DEFINE_QOBJ_TYPE(peer
)
97 DEFINE_HOOK(bgp_inst_delete
, (struct bgp
*bgp
), (bgp
))
98 DEFINE_HOOK(bgp_inst_config_write
,
99 (struct bgp
*bgp
, struct vty
*vty
),
102 /* BGP process wide configuration. */
103 static struct bgp_master bgp_master
;
105 /* BGP process wide configuration pointer to export. */
106 struct bgp_master
*bm
;
108 /* BGP community-list. */
109 struct community_list_handler
*bgp_clist
;
111 unsigned int multipath_num
= MULTIPATH_NUM
;
113 static void bgp_if_finish(struct bgp
*bgp
);
114 static void peer_drop_dynamic_neighbor(struct peer
*peer
);
116 extern struct zclient
*zclient
;
118 /* handle main socket creation or deletion */
119 static int bgp_check_main_socket(bool create
, struct bgp
*bgp
)
121 static int bgp_server_main_created
;
124 if (bgp_server_main_created
)
126 if (bgp_socket(bgp
, bm
->port
, bm
->address
) < 0)
127 return BGP_ERR_INVALID_VALUE
;
128 bgp_server_main_created
= 1;
131 if (!bgp_server_main_created
)
134 bgp_server_main_created
= 0;
138 void bgp_session_reset(struct peer
*peer
)
140 if (peer
->doppelganger
&& (peer
->doppelganger
->status
!= Deleted
)
141 && !(CHECK_FLAG(peer
->doppelganger
->flags
, PEER_FLAG_CONFIG_NODE
)))
142 peer_delete(peer
->doppelganger
);
144 BGP_EVENT_ADD(peer
, BGP_Stop
);
148 * During session reset, we may delete the doppelganger peer, which would
149 * be the next node to the current node. If the session reset was invoked
150 * during walk of peer list, we would end up accessing the freed next
151 * node. This function moves the next node along.
153 static void bgp_session_reset_safe(struct peer
*peer
, struct listnode
**nnode
)
158 n
= (nnode
) ? *nnode
: NULL
;
159 npeer
= (n
) ? listgetdata(n
) : NULL
;
161 if (peer
->doppelganger
&& (peer
->doppelganger
->status
!= Deleted
)
162 && !(CHECK_FLAG(peer
->doppelganger
->flags
,
163 PEER_FLAG_CONFIG_NODE
))) {
164 if (peer
->doppelganger
== npeer
)
165 /* nnode and *nnode are confirmed to be non-NULL here */
166 *nnode
= (*nnode
)->next
;
167 peer_delete(peer
->doppelganger
);
170 BGP_EVENT_ADD(peer
, BGP_Stop
);
173 /* BGP global flag manipulation. */
174 int bgp_option_set(int flag
)
178 case BGP_OPT_NO_LISTEN
:
179 case BGP_OPT_NO_ZEBRA
:
180 SET_FLAG(bm
->options
, flag
);
183 return BGP_ERR_INVALID_FLAG
;
188 int bgp_option_unset(int flag
)
192 case BGP_OPT_NO_ZEBRA
:
194 UNSET_FLAG(bm
->options
, flag
);
197 return BGP_ERR_INVALID_FLAG
;
202 int bgp_option_check(int flag
)
204 return CHECK_FLAG(bm
->options
, flag
);
207 /* BGP flag manipulation. */
208 int bgp_flag_set(struct bgp
*bgp
, int flag
)
210 SET_FLAG(bgp
->flags
, flag
);
214 int bgp_flag_unset(struct bgp
*bgp
, int flag
)
216 UNSET_FLAG(bgp
->flags
, flag
);
220 int bgp_flag_check(struct bgp
*bgp
, int flag
)
222 return CHECK_FLAG(bgp
->flags
, flag
);
225 /* Internal function to set BGP structure configureation flag. */
226 static void bgp_config_set(struct bgp
*bgp
, int config
)
228 SET_FLAG(bgp
->config
, config
);
231 static void bgp_config_unset(struct bgp
*bgp
, int config
)
233 UNSET_FLAG(bgp
->config
, config
);
236 static int bgp_config_check(struct bgp
*bgp
, int config
)
238 return CHECK_FLAG(bgp
->config
, config
);
241 /* Set BGP router identifier; distinguish between explicit config and other
244 static int bgp_router_id_set(struct bgp
*bgp
, const struct in_addr
*id
,
248 struct listnode
*node
, *nnode
;
250 if (IPV4_ADDR_SAME(&bgp
->router_id
, id
))
253 /* EVPN uses router id in RD, withdraw them */
254 if (is_evpn_enabled())
255 bgp_evpn_handle_router_id_update(bgp
, true);
257 vpn_handle_router_id_update(bgp
, true, is_config
);
259 IPV4_ADDR_COPY(&bgp
->router_id
, id
);
261 /* Set all peer's local identifier with this value. */
262 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
263 IPV4_ADDR_COPY(&peer
->local_id
, id
);
265 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
266 peer
->last_reset
= PEER_DOWN_RID_CHANGE
;
267 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
268 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
272 /* EVPN uses router id in RD, update them */
273 if (is_evpn_enabled())
274 bgp_evpn_handle_router_id_update(bgp
, false);
276 vpn_handle_router_id_update(bgp
, false, is_config
);
281 void bgp_router_id_zebra_bump(vrf_id_t vrf_id
, const struct prefix
*router_id
)
283 struct listnode
*node
, *nnode
;
285 struct in_addr
*addr
= NULL
;
287 if (router_id
!= NULL
)
288 addr
= (struct in_addr
*)&(router_id
->u
.prefix4
);
290 if (vrf_id
== VRF_DEFAULT
) {
291 /* Router-id change for default VRF has to also update all
293 for (ALL_LIST_ELEMENTS(bm
->bgp
, node
, nnode
, bgp
)) {
294 if (bgp
->inst_type
== BGP_INSTANCE_TYPE_VRF
)
298 bgp
->router_id_zebra
= *addr
;
300 addr
= &bgp
->router_id_zebra
;
302 if (!bgp
->router_id_static
.s_addr
) {
303 /* Router ID is updated if there are no active
306 if (bgp
->established_peers
== 0) {
307 if (BGP_DEBUG(zebra
, ZEBRA
))
308 zlog_debug("RID change : vrf %u, RTR ID %s",
309 bgp
->vrf_id
, inet_ntoa(*addr
));
310 bgp_router_id_set(bgp
, addr
, false);
315 bgp
= bgp_lookup_by_vrf_id(vrf_id
);
318 bgp
->router_id_zebra
= *addr
;
320 addr
= &bgp
->router_id_zebra
;
322 if (!bgp
->router_id_static
.s_addr
) {
323 /* Router ID is updated if there are no active
326 if (bgp
->established_peers
== 0) {
327 if (BGP_DEBUG(zebra
, ZEBRA
))
328 zlog_debug("RID change : vrf %u, RTR ID %s",
329 bgp
->vrf_id
, inet_ntoa(*addr
));
330 bgp_router_id_set(bgp
, addr
, false);
338 int bgp_router_id_static_set(struct bgp
*bgp
, struct in_addr id
)
340 bgp
->router_id_static
= id
;
341 bgp_router_id_set(bgp
, id
.s_addr
? &id
: &bgp
->router_id_zebra
,
342 true /* is config */);
346 /* BGP's cluster-id control. */
347 int bgp_cluster_id_set(struct bgp
*bgp
, struct in_addr
*cluster_id
)
350 struct listnode
*node
, *nnode
;
352 if (bgp_config_check(bgp
, BGP_CONFIG_CLUSTER_ID
)
353 && IPV4_ADDR_SAME(&bgp
->cluster_id
, cluster_id
))
356 IPV4_ADDR_COPY(&bgp
->cluster_id
, cluster_id
);
357 bgp_config_set(bgp
, BGP_CONFIG_CLUSTER_ID
);
359 /* Clear all IBGP peer. */
360 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
361 if (peer
->sort
!= BGP_PEER_IBGP
)
364 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
365 peer
->last_reset
= PEER_DOWN_CLID_CHANGE
;
366 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
367 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
373 int bgp_cluster_id_unset(struct bgp
*bgp
)
376 struct listnode
*node
, *nnode
;
378 if (!bgp_config_check(bgp
, BGP_CONFIG_CLUSTER_ID
))
381 bgp
->cluster_id
.s_addr
= 0;
382 bgp_config_unset(bgp
, BGP_CONFIG_CLUSTER_ID
);
384 /* Clear all IBGP peer. */
385 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
386 if (peer
->sort
!= BGP_PEER_IBGP
)
389 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
390 peer
->last_reset
= PEER_DOWN_CLID_CHANGE
;
391 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
392 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
398 /* time_t value that is monotonicly increasing
399 * and uneffected by adjustments to system clock
401 time_t bgp_clock(void)
409 /* BGP timer configuration. */
410 int bgp_timers_set(struct bgp
*bgp
, uint32_t keepalive
, uint32_t holdtime
)
412 bgp
->default_keepalive
=
413 (keepalive
< holdtime
/ 3 ? keepalive
: holdtime
/ 3);
414 bgp
->default_holdtime
= holdtime
;
419 int bgp_timers_unset(struct bgp
*bgp
)
421 bgp
->default_keepalive
= BGP_DEFAULT_KEEPALIVE
;
422 bgp
->default_holdtime
= BGP_DEFAULT_HOLDTIME
;
427 /* BGP confederation configuration. */
428 int bgp_confederation_id_set(struct bgp
*bgp
, as_t as
)
431 struct listnode
*node
, *nnode
;
435 return BGP_ERR_INVALID_AS
;
437 /* Remember - were we doing confederation before? */
438 already_confed
= bgp_config_check(bgp
, BGP_CONFIG_CONFEDERATION
);
440 bgp_config_set(bgp
, BGP_CONFIG_CONFEDERATION
);
442 /* If we were doing confederation already, this is just an external
443 AS change. Just Reset EBGP sessions, not CONFED sessions. If we
444 were not doing confederation before, reset all EBGP sessions. */
445 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
446 /* We're looking for peers who's AS is not local or part of our
448 if (already_confed
) {
449 if (peer_sort(peer
) == BGP_PEER_EBGP
) {
451 if (BGP_IS_VALID_STATE_FOR_NOTIF(
454 PEER_DOWN_CONFED_ID_CHANGE
;
456 peer
, BGP_NOTIFY_CEASE
,
457 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
459 bgp_session_reset_safe(peer
, &nnode
);
462 /* Not doign confederation before, so reset every
465 if (peer_sort(peer
) != BGP_PEER_IBGP
) {
466 /* Reset the local_as to be our EBGP one */
467 if (peer_sort(peer
) == BGP_PEER_EBGP
)
469 if (BGP_IS_VALID_STATE_FOR_NOTIF(
472 PEER_DOWN_CONFED_ID_CHANGE
;
474 peer
, BGP_NOTIFY_CEASE
,
475 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
477 bgp_session_reset_safe(peer
, &nnode
);
484 int bgp_confederation_id_unset(struct bgp
*bgp
)
487 struct listnode
*node
, *nnode
;
490 bgp_config_unset(bgp
, BGP_CONFIG_CONFEDERATION
);
492 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
493 /* We're looking for peers who's AS is not local */
494 if (peer_sort(peer
) != BGP_PEER_IBGP
) {
495 peer
->local_as
= bgp
->as
;
496 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
497 peer
->last_reset
= PEER_DOWN_CONFED_ID_CHANGE
;
498 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
499 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
503 bgp_session_reset_safe(peer
, &nnode
);
509 /* Is an AS part of the confed or not? */
510 int bgp_confederation_peers_check(struct bgp
*bgp
, as_t as
)
517 for (i
= 0; i
< bgp
->confed_peers_cnt
; i
++)
518 if (bgp
->confed_peers
[i
] == as
)
524 /* Add an AS to the confederation set. */
525 int bgp_confederation_peers_add(struct bgp
*bgp
, as_t as
)
528 struct listnode
*node
, *nnode
;
531 return BGP_ERR_INVALID_BGP
;
534 return BGP_ERR_INVALID_AS
;
536 if (bgp_confederation_peers_check(bgp
, as
))
539 if (bgp
->confed_peers
)
541 XREALLOC(MTYPE_BGP_CONFED_LIST
, bgp
->confed_peers
,
542 (bgp
->confed_peers_cnt
+ 1) * sizeof(as_t
));
545 XMALLOC(MTYPE_BGP_CONFED_LIST
,
546 (bgp
->confed_peers_cnt
+ 1) * sizeof(as_t
));
548 bgp
->confed_peers
[bgp
->confed_peers_cnt
] = as
;
549 bgp
->confed_peers_cnt
++;
551 if (bgp_config_check(bgp
, BGP_CONFIG_CONFEDERATION
)) {
552 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
553 if (peer
->as
== as
) {
554 peer
->local_as
= bgp
->as
;
555 if (BGP_IS_VALID_STATE_FOR_NOTIF(
558 PEER_DOWN_CONFED_PEER_CHANGE
;
560 peer
, BGP_NOTIFY_CEASE
,
561 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
563 bgp_session_reset_safe(peer
, &nnode
);
570 /* Delete an AS from the confederation set. */
571 int bgp_confederation_peers_remove(struct bgp
*bgp
, as_t as
)
576 struct listnode
*node
, *nnode
;
581 if (!bgp_confederation_peers_check(bgp
, as
))
584 for (i
= 0; i
< bgp
->confed_peers_cnt
; i
++)
585 if (bgp
->confed_peers
[i
] == as
)
586 for (j
= i
+ 1; j
< bgp
->confed_peers_cnt
; j
++)
587 bgp
->confed_peers
[j
- 1] = bgp
->confed_peers
[j
];
589 bgp
->confed_peers_cnt
--;
591 if (bgp
->confed_peers_cnt
== 0) {
592 if (bgp
->confed_peers
)
593 XFREE(MTYPE_BGP_CONFED_LIST
, bgp
->confed_peers
);
594 bgp
->confed_peers
= NULL
;
597 XREALLOC(MTYPE_BGP_CONFED_LIST
, bgp
->confed_peers
,
598 bgp
->confed_peers_cnt
* sizeof(as_t
));
600 /* Now reset any peer who's remote AS has just been removed from the
602 if (bgp_config_check(bgp
, BGP_CONFIG_CONFEDERATION
)) {
603 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
604 if (peer
->as
== as
) {
605 peer
->local_as
= bgp
->confed_id
;
606 if (BGP_IS_VALID_STATE_FOR_NOTIF(
609 PEER_DOWN_CONFED_PEER_CHANGE
;
611 peer
, BGP_NOTIFY_CEASE
,
612 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
614 bgp_session_reset_safe(peer
, &nnode
);
622 /* Local preference configuration. */
623 int bgp_default_local_preference_set(struct bgp
*bgp
, uint32_t local_pref
)
628 bgp
->default_local_pref
= local_pref
;
633 int bgp_default_local_preference_unset(struct bgp
*bgp
)
638 bgp
->default_local_pref
= BGP_DEFAULT_LOCAL_PREF
;
643 /* Local preference configuration. */
644 int bgp_default_subgroup_pkt_queue_max_set(struct bgp
*bgp
, uint32_t queue_size
)
649 bgp
->default_subgroup_pkt_queue_max
= queue_size
;
654 int bgp_default_subgroup_pkt_queue_max_unset(struct bgp
*bgp
)
658 bgp
->default_subgroup_pkt_queue_max
=
659 BGP_DEFAULT_SUBGROUP_PKT_QUEUE_MAX
;
664 /* Listen limit configuration. */
665 int bgp_listen_limit_set(struct bgp
*bgp
, int listen_limit
)
670 bgp
->dynamic_neighbors_limit
= listen_limit
;
675 int bgp_listen_limit_unset(struct bgp
*bgp
)
680 bgp
->dynamic_neighbors_limit
= BGP_DYNAMIC_NEIGHBORS_LIMIT_DEFAULT
;
685 int bgp_map_afi_safi_iana2int(iana_afi_t pkt_afi
, iana_safi_t pkt_safi
,
686 afi_t
*afi
, safi_t
*safi
)
688 /* Map from IANA values to internal values, return error if
689 * values are unrecognized.
691 *afi
= afi_iana2int(pkt_afi
);
692 *safi
= safi_iana2int(pkt_safi
);
693 if (*afi
== AFI_MAX
|| *safi
== SAFI_MAX
)
699 int bgp_map_afi_safi_int2iana(afi_t afi
, safi_t safi
, iana_afi_t
*pkt_afi
,
700 iana_safi_t
*pkt_safi
)
702 /* Map from internal values to IANA values, return error if
703 * internal values are bad (unexpected).
705 if (afi
== AFI_MAX
|| safi
== SAFI_MAX
)
707 *pkt_afi
= afi_int2iana(afi
);
708 *pkt_safi
= safi_int2iana(safi
);
712 struct peer_af
*peer_af_create(struct peer
*peer
, afi_t afi
, safi_t safi
)
721 afid
= afindex(afi
, safi
);
722 if (afid
>= BGP_AF_MAX
)
726 assert(peer
->peer_af_array
[afid
] == NULL
);
728 /* Allocate new peer af */
729 af
= XCALLOC(MTYPE_BGP_PEER_AF
, sizeof(struct peer_af
));
731 peer
->peer_af_array
[afid
] = af
;
736 bgp
->af_peer_count
[afi
][safi
]++;
741 struct peer_af
*peer_af_find(struct peer
*peer
, afi_t afi
, safi_t safi
)
748 afid
= afindex(afi
, safi
);
749 if (afid
>= BGP_AF_MAX
)
752 return peer
->peer_af_array
[afid
];
755 int peer_af_delete(struct peer
*peer
, afi_t afi
, safi_t safi
)
764 afid
= afindex(afi
, safi
);
765 if (afid
>= BGP_AF_MAX
)
768 af
= peer
->peer_af_array
[afid
];
773 bgp_stop_announce_route_timer(af
);
775 if (PAF_SUBGRP(af
)) {
776 if (BGP_DEBUG(update_groups
, UPDATE_GROUPS
))
777 zlog_debug("u%" PRIu64
":s%" PRIu64
" remove peer %s",
778 af
->subgroup
->update_group
->id
,
779 af
->subgroup
->id
, peer
->host
);
783 update_subgroup_remove_peer(af
->subgroup
, af
);
785 if (bgp
->af_peer_count
[afi
][safi
])
786 bgp
->af_peer_count
[afi
][safi
]--;
788 peer
->peer_af_array
[afid
] = NULL
;
789 XFREE(MTYPE_BGP_PEER_AF
, af
);
793 /* Peer comparison function for sorting. */
794 int peer_cmp(struct peer
*p1
, struct peer
*p2
)
796 if (p1
->group
&& !p2
->group
)
799 if (!p1
->group
&& p2
->group
)
802 if (p1
->group
== p2
->group
) {
803 if (p1
->conf_if
&& !p2
->conf_if
)
806 if (!p1
->conf_if
&& p2
->conf_if
)
809 if (p1
->conf_if
&& p2
->conf_if
)
810 return if_cmp_name_func(p1
->conf_if
, p2
->conf_if
);
812 return strcmp(p1
->group
->name
, p2
->group
->name
);
814 return sockunion_cmp(&p1
->su
, &p2
->su
);
817 static unsigned int peer_hash_key_make(const void *p
)
819 const struct peer
*peer
= p
;
820 return sockunion_hash(&peer
->su
);
823 static bool peer_hash_same(const void *p1
, const void *p2
)
825 const struct peer
*peer1
= p1
;
826 const struct peer
*peer2
= p2
;
827 return (sockunion_same(&peer1
->su
, &peer2
->su
)
828 && CHECK_FLAG(peer1
->flags
, PEER_FLAG_CONFIG_NODE
)
829 == CHECK_FLAG(peer2
->flags
, PEER_FLAG_CONFIG_NODE
));
832 void peer_flag_inherit(struct peer
*peer
, uint32_t flag
)
836 /* Skip if peer is not a peer-group member. */
837 if (!peer_group_active(peer
))
840 /* Unset override flag to signal inheritance from peer-group. */
841 UNSET_FLAG(peer
->flags_override
, flag
);
844 * Inherit flag state from peer-group. If the flag of the peer-group is
845 * not being inverted, the peer must inherit the inverse of the current
846 * peer-group flag state.
848 group_val
= CHECK_FLAG(peer
->group
->conf
->flags
, flag
);
849 if (!CHECK_FLAG(peer
->group
->conf
->flags_invert
, flag
)
850 && CHECK_FLAG(peer
->flags_invert
, flag
))
851 COND_FLAG(peer
->flags
, flag
, !group_val
);
853 COND_FLAG(peer
->flags
, flag
, group_val
);
856 int peer_af_flag_check(struct peer
*peer
, afi_t afi
, safi_t safi
, uint32_t flag
)
858 return CHECK_FLAG(peer
->af_flags
[afi
][safi
], flag
);
861 void peer_af_flag_inherit(struct peer
*peer
, afi_t afi
, safi_t safi
,
866 /* Skip if peer is not a peer-group member. */
867 if (!peer_group_active(peer
))
870 /* Unset override flag to signal inheritance from peer-group. */
871 UNSET_FLAG(peer
->af_flags_override
[afi
][safi
], flag
);
874 * Inherit flag state from peer-group. If the flag of the peer-group is
875 * not being inverted, the peer must inherit the inverse of the current
876 * peer-group flag state.
878 group_val
= CHECK_FLAG(peer
->group
->conf
->af_flags
[afi
][safi
], flag
);
879 if (!CHECK_FLAG(peer
->group
->conf
->af_flags_invert
[afi
][safi
], flag
)
880 && CHECK_FLAG(peer
->af_flags_invert
[afi
][safi
], flag
))
881 COND_FLAG(peer
->af_flags
[afi
][safi
], flag
, !group_val
);
883 COND_FLAG(peer
->af_flags
[afi
][safi
], flag
, group_val
);
886 static bool peergroup_flag_check(struct peer
*peer
, uint32_t flag
)
888 if (!peer_group_active(peer
)) {
889 if (CHECK_FLAG(peer
->flags_invert
, flag
))
890 return !CHECK_FLAG(peer
->flags
, flag
);
892 return !!CHECK_FLAG(peer
->flags
, flag
);
895 return !!CHECK_FLAG(peer
->flags_override
, flag
);
898 static bool peergroup_af_flag_check(struct peer
*peer
, afi_t afi
, safi_t safi
,
901 if (!peer_group_active(peer
)) {
902 if (CHECK_FLAG(peer
->af_flags_invert
[afi
][safi
], flag
))
903 return !peer_af_flag_check(peer
, afi
, safi
, flag
);
905 return !!peer_af_flag_check(peer
, afi
, safi
, flag
);
908 return !!CHECK_FLAG(peer
->af_flags_override
[afi
][safi
], flag
);
911 static bool peergroup_filter_check(struct peer
*peer
, afi_t afi
, safi_t safi
,
912 uint8_t type
, int direct
)
914 struct bgp_filter
*filter
;
916 if (peer_group_active(peer
))
917 return !!CHECK_FLAG(peer
->filter_override
[afi
][safi
][direct
],
920 filter
= &peer
->filter
[afi
][safi
];
922 case PEER_FT_DISTRIBUTE_LIST
:
923 return !!(filter
->dlist
[direct
].name
);
924 case PEER_FT_FILTER_LIST
:
925 return !!(filter
->aslist
[direct
].name
);
926 case PEER_FT_PREFIX_LIST
:
927 return !!(filter
->plist
[direct
].name
);
928 case PEER_FT_ROUTE_MAP
:
929 return !!(filter
->map
[direct
].name
);
930 case PEER_FT_UNSUPPRESS_MAP
:
931 return !!(filter
->usmap
.name
);
937 /* Return true if the addpath type is set for peer and different from
940 static int peergroup_af_addpath_check(struct peer
*peer
, afi_t afi
, safi_t safi
)
942 enum bgp_addpath_strat type
, g_type
;
944 type
= peer
->addpath_type
[afi
][safi
];
946 if (type
!= BGP_ADDPATH_NONE
) {
947 if (peer_group_active(peer
)) {
948 g_type
= peer
->group
->conf
->addpath_type
[afi
][safi
];
962 /* Check peer's AS number and determines if this peer is IBGP or EBGP */
963 static inline bgp_peer_sort_t
peer_calc_sort(struct peer
*peer
)
970 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
971 if (peer
->as_type
== AS_INTERNAL
)
972 return BGP_PEER_IBGP
;
974 else if (peer
->as_type
== AS_EXTERNAL
)
975 return BGP_PEER_EBGP
;
977 else if (peer
->as_type
== AS_SPECIFIED
&& peer
->as
) {
979 return (bgp
->as
== peer
->as
? BGP_PEER_IBGP
987 peer1
= listnode_head(peer
->group
->peer
);
992 return BGP_PEER_INTERNAL
;
996 if (bgp
&& CHECK_FLAG(bgp
->config
, BGP_CONFIG_CONFEDERATION
)) {
997 if (peer
->local_as
== 0)
998 return BGP_PEER_INTERNAL
;
1000 if (peer
->local_as
== peer
->as
) {
1001 if (bgp
->as
== bgp
->confed_id
) {
1002 if (peer
->local_as
== bgp
->as
)
1003 return BGP_PEER_IBGP
;
1005 return BGP_PEER_EBGP
;
1007 if (peer
->local_as
== bgp
->confed_id
)
1008 return BGP_PEER_EBGP
;
1010 return BGP_PEER_IBGP
;
1014 if (bgp_confederation_peers_check(bgp
, peer
->as
))
1015 return BGP_PEER_CONFED
;
1017 return BGP_PEER_EBGP
;
1019 if (peer
->as_type
== AS_UNSPECIFIED
) {
1020 /* check if in peer-group with AS information */
1022 && (peer
->group
->conf
->as_type
!= AS_UNSPECIFIED
)) {
1023 if (peer
->group
->conf
->as_type
1026 == peer
->group
->conf
->as
)
1027 return BGP_PEER_IBGP
;
1029 return BGP_PEER_EBGP
;
1030 } else if (peer
->group
->conf
->as_type
1032 return BGP_PEER_IBGP
;
1034 return BGP_PEER_EBGP
;
1036 /* no AS information anywhere, let caller know */
1037 return BGP_PEER_UNSPECIFIED
;
1038 } else if (peer
->as_type
!= AS_SPECIFIED
)
1039 return (peer
->as_type
== AS_INTERNAL
? BGP_PEER_IBGP
1042 return (peer
->local_as
== 0
1044 : peer
->local_as
== peer
->as
? BGP_PEER_IBGP
1049 /* Calculate and cache the peer "sort" */
1050 bgp_peer_sort_t
peer_sort(struct peer
*peer
)
1052 peer
->sort
= peer_calc_sort(peer
);
1056 static void peer_free(struct peer
*peer
)
1061 assert(peer
->status
== Deleted
);
1065 /* this /ought/ to have been done already through bgp_stop earlier,
1066 * but just to be sure..
1068 bgp_timer_set(peer
);
1069 bgp_reads_off(peer
);
1070 bgp_writes_off(peer
);
1071 assert(!peer
->t_write
);
1072 assert(!peer
->t_read
);
1073 BGP_EVENT_FLUSH(peer
);
1075 pthread_mutex_destroy(&peer
->io_mtx
);
1077 /* Free connected nexthop, if present */
1078 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
)
1079 && !peer_dynamic_neighbor(peer
))
1080 bgp_delete_connected_nexthop(family2afi(peer
->su
.sa
.sa_family
),
1083 XFREE(MTYPE_PEER_TX_SHUTDOWN_MSG
, peer
->tx_shutdown_message
);
1086 XFREE(MTYPE_PEER_DESC
, peer
->desc
);
1090 /* Free allocated host character. */
1092 XFREE(MTYPE_BGP_PEER_HOST
, peer
->host
);
1096 if (peer
->domainname
) {
1097 XFREE(MTYPE_BGP_PEER_HOST
, peer
->domainname
);
1098 peer
->domainname
= NULL
;
1102 XFREE(MTYPE_BGP_PEER_IFNAME
, peer
->ifname
);
1103 peer
->ifname
= NULL
;
1106 /* Update source configuration. */
1107 if (peer
->update_source
) {
1108 sockunion_free(peer
->update_source
);
1109 peer
->update_source
= NULL
;
1112 if (peer
->update_if
) {
1113 XFREE(MTYPE_PEER_UPDATE_SOURCE
, peer
->update_if
);
1114 peer
->update_if
= NULL
;
1117 XFREE(MTYPE_TMP
, peer
->notify
.data
);
1118 memset(&peer
->notify
, 0, sizeof(struct bgp_notify
));
1120 if (peer
->clear_node_queue
)
1121 work_queue_free_and_null(&peer
->clear_node_queue
);
1123 bgp_sync_delete(peer
);
1125 if (peer
->conf_if
) {
1126 XFREE(MTYPE_PEER_CONF_IF
, peer
->conf_if
);
1127 peer
->conf_if
= NULL
;
1130 bfd_info_free(&(peer
->bfd_info
));
1132 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++) {
1133 for (safi
= SAFI_UNICAST
; safi
< SAFI_MAX
; safi
++) {
1134 bgp_addpath_set_peer_type(peer
, afi
, safi
,
1139 bgp_unlock(peer
->bgp
);
1141 memset(peer
, 0, sizeof(struct peer
));
1143 XFREE(MTYPE_BGP_PEER
, peer
);
1146 /* increase reference count on a struct peer */
1147 struct peer
*peer_lock_with_caller(const char *name
, struct peer
*peer
)
1149 assert(peer
&& (peer
->lock
>= 0));
1152 zlog_debug("%s peer_lock %p %d", name
, peer
, peer
->lock
);
1160 /* decrease reference count on a struct peer
1161 * struct peer is freed and NULL returned if last reference
1163 struct peer
*peer_unlock_with_caller(const char *name
, struct peer
*peer
)
1165 assert(peer
&& (peer
->lock
> 0));
1168 zlog_debug("%s peer_unlock %p %d", name
, peer
, peer
->lock
);
1173 if (peer
->lock
== 0) {
1181 /* Allocate new peer object, implicitely locked. */
1182 struct peer
*peer_new(struct bgp
*bgp
)
1189 /* bgp argument is absolutely required */
1194 /* Allocate new peer. */
1195 peer
= XCALLOC(MTYPE_BGP_PEER
, sizeof(struct peer
));
1197 /* Set default value. */
1199 peer
->v_start
= BGP_INIT_START_TIMER
;
1200 peer
->v_connect
= BGP_DEFAULT_CONNECT_RETRY
;
1201 peer
->status
= Idle
;
1202 peer
->ostatus
= Idle
;
1203 peer
->cur_event
= peer
->last_event
= peer
->last_major_event
= 0;
1204 peer
->bgp
= bgp_lock(bgp
);
1205 peer
= peer_lock(peer
); /* initial reference */
1206 peer
->password
= NULL
;
1208 /* Set default flags. */
1209 FOREACH_AFI_SAFI (afi
, safi
) {
1210 SET_FLAG(peer
->af_flags
[afi
][safi
], PEER_FLAG_SEND_COMMUNITY
);
1211 SET_FLAG(peer
->af_flags
[afi
][safi
],
1212 PEER_FLAG_SEND_EXT_COMMUNITY
);
1213 SET_FLAG(peer
->af_flags
[afi
][safi
],
1214 PEER_FLAG_SEND_LARGE_COMMUNITY
);
1216 SET_FLAG(peer
->af_flags_invert
[afi
][safi
],
1217 PEER_FLAG_SEND_COMMUNITY
);
1218 SET_FLAG(peer
->af_flags_invert
[afi
][safi
],
1219 PEER_FLAG_SEND_EXT_COMMUNITY
);
1220 SET_FLAG(peer
->af_flags_invert
[afi
][safi
],
1221 PEER_FLAG_SEND_LARGE_COMMUNITY
);
1222 peer
->addpath_type
[afi
][safi
] = BGP_ADDPATH_NONE
;
1225 /* set nexthop-unchanged for l2vpn evpn by default */
1226 SET_FLAG(peer
->af_flags
[AFI_L2VPN
][SAFI_EVPN
],
1227 PEER_FLAG_NEXTHOP_UNCHANGED
);
1229 SET_FLAG(peer
->sflags
, PEER_STATUS_CAPABILITY_OPEN
);
1231 /* Create buffers. */
1232 peer
->ibuf
= stream_fifo_new();
1233 peer
->obuf
= stream_fifo_new();
1234 pthread_mutex_init(&peer
->io_mtx
, NULL
);
1236 /* We use a larger buffer for peer->obuf_work in the event that:
1237 * - We RX a BGP_UPDATE where the attributes alone are just
1238 * under BGP_MAX_PACKET_SIZE
1239 * - The user configures an outbound route-map that does many as-path
1240 * prepends or adds many communities. At most they can have
1241 * CMD_ARGC_MAX args in a route-map so there is a finite limit on how
1242 * large they can make the attributes.
1244 * Having a buffer with BGP_MAX_PACKET_SIZE_OVERFLOW allows us to avoid
1245 * bounds checking for every single attribute as we construct an
1249 stream_new(BGP_MAX_PACKET_SIZE
+ BGP_MAX_PACKET_SIZE_OVERFLOW
);
1251 ringbuf_new(BGP_MAX_PACKET_SIZE
* BGP_READ_PACKET_MAX
);
1253 peer
->scratch
= stream_new(BGP_MAX_PACKET_SIZE
);
1255 bgp_sync_init(peer
);
1257 /* Get service port number. */
1258 sp
= getservbyname("bgp", "tcp");
1259 peer
->port
= (sp
== NULL
) ? BGP_PORT_DEFAULT
: ntohs(sp
->s_port
);
1261 QOBJ_REG(peer
, peer
);
1266 * This function is invoked when a duplicate peer structure associated with
1267 * a neighbor is being deleted. If this about-to-be-deleted structure is
1268 * the one with all the config, then we have to copy over the info.
1270 void peer_xfer_config(struct peer
*peer_dst
, struct peer
*peer_src
)
1272 struct peer_af
*paf
;
1280 /* The following function is used by both peer group config copy to
1281 * individual peer and when we transfer config
1283 if (peer_src
->change_local_as
)
1284 peer_dst
->change_local_as
= peer_src
->change_local_as
;
1286 /* peer flags apply */
1287 peer_dst
->flags
= peer_src
->flags
;
1288 peer_dst
->cap
= peer_src
->cap
;
1290 peer_dst
->local_as
= peer_src
->local_as
;
1291 peer_dst
->port
= peer_src
->port
;
1292 (void)peer_sort(peer_dst
);
1293 peer_dst
->rmap_type
= peer_src
->rmap_type
;
1296 peer_dst
->holdtime
= peer_src
->holdtime
;
1297 peer_dst
->keepalive
= peer_src
->keepalive
;
1298 peer_dst
->connect
= peer_src
->connect
;
1299 peer_dst
->v_holdtime
= peer_src
->v_holdtime
;
1300 peer_dst
->v_keepalive
= peer_src
->v_keepalive
;
1301 peer_dst
->routeadv
= peer_src
->routeadv
;
1302 peer_dst
->v_routeadv
= peer_src
->v_routeadv
;
1304 /* password apply */
1305 if (peer_src
->password
&& !peer_dst
->password
)
1306 peer_dst
->password
=
1307 XSTRDUP(MTYPE_PEER_PASSWORD
, peer_src
->password
);
1309 FOREACH_AFI_SAFI (afi
, safi
) {
1310 peer_dst
->afc
[afi
][safi
] = peer_src
->afc
[afi
][safi
];
1311 peer_dst
->af_flags
[afi
][safi
] = peer_src
->af_flags
[afi
][safi
];
1312 peer_dst
->allowas_in
[afi
][safi
] =
1313 peer_src
->allowas_in
[afi
][safi
];
1314 peer_dst
->weight
[afi
][safi
] = peer_src
->weight
[afi
][safi
];
1315 peer_dst
->addpath_type
[afi
][safi
] =
1316 peer_src
->addpath_type
[afi
][safi
];
1319 for (afidx
= BGP_AF_START
; afidx
< BGP_AF_MAX
; afidx
++) {
1320 paf
= peer_src
->peer_af_array
[afidx
];
1322 peer_af_create(peer_dst
, paf
->afi
, paf
->safi
);
1325 /* update-source apply */
1326 if (peer_src
->update_source
) {
1327 if (peer_dst
->update_source
)
1328 sockunion_free(peer_dst
->update_source
);
1329 if (peer_dst
->update_if
) {
1330 XFREE(MTYPE_PEER_UPDATE_SOURCE
, peer_dst
->update_if
);
1331 peer_dst
->update_if
= NULL
;
1333 peer_dst
->update_source
=
1334 sockunion_dup(peer_src
->update_source
);
1335 } else if (peer_src
->update_if
) {
1336 XFREE(MTYPE_PEER_UPDATE_SOURCE
, peer_dst
->update_if
);
1337 if (peer_dst
->update_source
) {
1338 sockunion_free(peer_dst
->update_source
);
1339 peer_dst
->update_source
= NULL
;
1341 peer_dst
->update_if
=
1342 XSTRDUP(MTYPE_PEER_UPDATE_SOURCE
, peer_src
->update_if
);
1345 if (peer_src
->ifname
) {
1346 XFREE(MTYPE_BGP_PEER_IFNAME
, peer_dst
->ifname
);
1349 XSTRDUP(MTYPE_BGP_PEER_IFNAME
, peer_src
->ifname
);
1353 static int bgp_peer_conf_if_to_su_update_v4(struct peer
*peer
,
1354 struct interface
*ifp
)
1356 struct connected
*ifc
;
1359 struct listnode
*node
;
1361 /* If our IPv4 address on the interface is /30 or /31, we can derive the
1362 * IPv4 address of the other end.
1364 for (ALL_LIST_ELEMENTS_RO(ifp
->connected
, node
, ifc
)) {
1365 if (ifc
->address
&& (ifc
->address
->family
== AF_INET
)) {
1366 PREFIX_COPY_IPV4(&p
, CONNECTED_PREFIX(ifc
));
1367 if (p
.prefixlen
== 30) {
1368 peer
->su
.sa
.sa_family
= AF_INET
;
1369 addr
= ntohl(p
.u
.prefix4
.s_addr
);
1371 peer
->su
.sin
.sin_addr
.s_addr
=
1373 else if (addr
% 4 == 2)
1374 peer
->su
.sin
.sin_addr
.s_addr
=
1376 #ifdef HAVE_STRUCT_SOCKADDR_IN_SIN_LEN
1377 peer
->su
.sin
.sin_len
=
1378 sizeof(struct sockaddr_in
);
1379 #endif /* HAVE_STRUCT_SOCKADDR_IN_SIN_LEN */
1381 } else if (p
.prefixlen
== 31) {
1382 peer
->su
.sa
.sa_family
= AF_INET
;
1383 addr
= ntohl(p
.u
.prefix4
.s_addr
);
1385 peer
->su
.sin
.sin_addr
.s_addr
=
1388 peer
->su
.sin
.sin_addr
.s_addr
=
1390 #ifdef HAVE_STRUCT_SOCKADDR_IN_SIN_LEN
1391 peer
->su
.sin
.sin_len
=
1392 sizeof(struct sockaddr_in
);
1393 #endif /* HAVE_STRUCT_SOCKADDR_IN_SIN_LEN */
1395 } else if (bgp_debug_neighbor_events(peer
))
1397 "%s: IPv4 interface address is not /30 or /31, v4 session not started",
1405 static int bgp_peer_conf_if_to_su_update_v6(struct peer
*peer
,
1406 struct interface
*ifp
)
1408 struct nbr_connected
*ifc_nbr
;
1410 /* Have we learnt the peer's IPv6 link-local address? */
1411 if (ifp
->nbr_connected
1412 && (ifc_nbr
= listnode_head(ifp
->nbr_connected
))) {
1413 peer
->su
.sa
.sa_family
= AF_INET6
;
1414 memcpy(&peer
->su
.sin6
.sin6_addr
, &ifc_nbr
->address
->u
.prefix
,
1415 sizeof(struct in6_addr
));
1417 peer
->su
.sin6
.sin6_len
= sizeof(struct sockaddr_in6
);
1419 peer
->su
.sin6
.sin6_scope_id
= ifp
->ifindex
;
1427 * Set or reset the peer address socketunion structure based on the
1428 * learnt/derived peer address. If the address has changed, update the
1429 * password on the listen socket, if needed.
1431 void bgp_peer_conf_if_to_su_update(struct peer
*peer
)
1433 struct interface
*ifp
;
1435 int peer_addr_updated
= 0;
1441 * Our peer structure is stored in the bgp->peerhash
1442 * release it before we modify anything.
1444 hash_release(peer
->bgp
->peerhash
, peer
);
1446 prev_family
= peer
->su
.sa
.sa_family
;
1447 if ((ifp
= if_lookup_by_name(peer
->conf_if
, peer
->bgp
->vrf_id
))) {
1449 /* If BGP unnumbered is not "v6only", we first see if we can
1451 * peer's IPv4 address.
1453 if (!CHECK_FLAG(peer
->flags
, PEER_FLAG_IFPEER_V6ONLY
))
1455 bgp_peer_conf_if_to_su_update_v4(peer
, ifp
);
1457 /* If "v6only" or we can't derive peer's IPv4 address, see if
1459 * learnt the peer's IPv6 link-local address. This is from the
1461 * IPv6 address in router advertisement.
1463 if (!peer_addr_updated
)
1465 bgp_peer_conf_if_to_su_update_v6(peer
, ifp
);
1467 /* If we could derive the peer address, we may need to install the
1469 * configured for the peer, if any, on the listen socket. Otherwise,
1471 * that peer's address is not available and uninstall the password, if
1474 if (peer_addr_updated
) {
1475 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_PASSWORD
)
1476 && prev_family
== AF_UNSPEC
)
1479 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_PASSWORD
)
1480 && prev_family
!= AF_UNSPEC
)
1481 bgp_md5_unset(peer
);
1482 peer
->su
.sa
.sa_family
= AF_UNSPEC
;
1483 memset(&peer
->su
.sin6
.sin6_addr
, 0, sizeof(struct in6_addr
));
1487 * Since our su changed we need to del/add peer to the peerhash
1489 hash_get(peer
->bgp
->peerhash
, peer
, hash_alloc_intern
);
1492 static void bgp_recalculate_afi_safi_bestpaths(struct bgp
*bgp
, afi_t afi
,
1495 struct bgp_node
*rn
, *nrn
;
1496 struct bgp_table
*table
;
1498 for (rn
= bgp_table_top(bgp
->rib
[afi
][safi
]); rn
;
1499 rn
= bgp_route_next(rn
)) {
1500 table
= bgp_node_get_bgp_table_info(rn
);
1501 if (table
!= NULL
) {
1502 /* Special handling for 2-level routing
1504 if (safi
== SAFI_MPLS_VPN
|| safi
== SAFI_ENCAP
1505 || safi
== SAFI_EVPN
) {
1506 for (nrn
= bgp_table_top(table
);
1507 nrn
; nrn
= bgp_route_next(nrn
))
1508 bgp_process(bgp
, nrn
, afi
, safi
);
1510 bgp_process(bgp
, rn
, afi
, safi
);
1515 /* Force a bestpath recalculation for all prefixes. This is used
1516 * when 'bgp bestpath' commands are entered.
1518 void bgp_recalculate_all_bestpaths(struct bgp
*bgp
)
1523 FOREACH_AFI_SAFI (afi
, safi
) {
1524 bgp_recalculate_afi_safi_bestpaths(bgp
, afi
, safi
);
1529 * Create new BGP peer.
1531 * conf_if and su are mutually exclusive if configuring from the cli.
1532 * If we are handing a doppelganger, then we *must* pass in both
1533 * the original peer's su and conf_if, so that we can appropriately
1534 * track the bgp->peerhash( ie we don't want to remove the current
1535 * one from the config ).
1537 struct peer
*peer_create(union sockunion
*su
, const char *conf_if
,
1538 struct bgp
*bgp
, as_t local_as
, as_t remote_as
,
1539 int as_type
, afi_t afi
, safi_t safi
,
1540 struct peer_group
*group
)
1544 char buf
[SU_ADDRSTRLEN
];
1546 peer
= peer_new(bgp
);
1548 peer
->conf_if
= XSTRDUP(MTYPE_PEER_CONF_IF
, conf_if
);
1552 bgp_peer_conf_if_to_su_update(peer
);
1553 XFREE(MTYPE_BGP_PEER_HOST
, peer
->host
);
1554 peer
->host
= XSTRDUP(MTYPE_BGP_PEER_HOST
, conf_if
);
1557 sockunion2str(su
, buf
, SU_ADDRSTRLEN
);
1558 XFREE(MTYPE_BGP_PEER_HOST
, peer
->host
);
1559 peer
->host
= XSTRDUP(MTYPE_BGP_PEER_HOST
, buf
);
1561 peer
->local_as
= local_as
;
1562 peer
->as
= remote_as
;
1563 peer
->as_type
= as_type
;
1564 peer
->local_id
= bgp
->router_id
;
1565 peer
->v_holdtime
= bgp
->default_holdtime
;
1566 peer
->v_keepalive
= bgp
->default_keepalive
;
1567 peer
->v_routeadv
= (peer_sort(peer
) == BGP_PEER_IBGP
)
1568 ? BGP_DEFAULT_IBGP_ROUTEADV
1569 : BGP_DEFAULT_EBGP_ROUTEADV
;
1571 peer
= peer_lock(peer
); /* bgp peer list reference */
1572 peer
->group
= group
;
1573 listnode_add_sort(bgp
->peer
, peer
);
1574 hash_get(bgp
->peerhash
, peer
, hash_alloc_intern
);
1576 /* Adjust update-group coalesce timer heuristics for # peers. */
1577 if (bgp
->heuristic_coalesce
) {
1578 long ct
= BGP_DEFAULT_SUBGROUP_COALESCE_TIME
1580 * BGP_PEER_ADJUST_SUBGROUP_COALESCE_TIME
);
1581 bgp
->coalesce_time
= MIN(BGP_MAX_SUBGROUP_COALESCE_TIME
, ct
);
1584 active
= peer_active(peer
);
1586 if (peer
->su
.sa
.sa_family
== AF_UNSPEC
)
1587 peer
->last_reset
= PEER_DOWN_NBR_ADDR
;
1589 peer
->last_reset
= PEER_DOWN_NOAFI_ACTIVATED
;
1592 /* Last read and reset time set */
1593 peer
->readtime
= peer
->resettime
= bgp_clock();
1595 /* Default TTL set. */
1596 peer
->ttl
= (peer
->sort
== BGP_PEER_IBGP
) ? MAXTTL
: BGP_DEFAULT_TTL
;
1598 SET_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
);
1601 peer
->afc
[afi
][safi
] = 1;
1602 peer_af_create(peer
, afi
, safi
);
1605 /* auto shutdown if configured */
1606 if (bgp
->autoshutdown
)
1607 peer_flag_set(peer
, PEER_FLAG_SHUTDOWN
);
1608 /* Set up peer's events and timers. */
1609 else if (!active
&& peer_active(peer
))
1610 bgp_timer_set(peer
);
1615 /* Make accept BGP peer. This function is only called from the test code */
1616 struct peer
*peer_create_accept(struct bgp
*bgp
)
1620 peer
= peer_new(bgp
);
1622 peer
= peer_lock(peer
); /* bgp peer list reference */
1623 listnode_add_sort(bgp
->peer
, peer
);
1629 * Return true if we have a peer configured to use this afi/safi
1631 int bgp_afi_safi_peer_exists(struct bgp
*bgp
, afi_t afi
, safi_t safi
)
1633 struct listnode
*node
;
1636 for (ALL_LIST_ELEMENTS_RO(bgp
->peer
, node
, peer
)) {
1637 if (!CHECK_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
))
1640 if (peer
->afc
[afi
][safi
])
1647 /* Change peer's AS number. */
1648 void peer_as_change(struct peer
*peer
, as_t as
, int as_specified
)
1650 bgp_peer_sort_t type
;
1653 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
1654 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
1655 peer
->last_reset
= PEER_DOWN_REMOTE_AS_CHANGE
;
1656 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
1657 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
1659 bgp_session_reset(peer
);
1661 type
= peer_sort(peer
);
1663 peer
->as_type
= as_specified
;
1665 if (bgp_config_check(peer
->bgp
, BGP_CONFIG_CONFEDERATION
)
1666 && !bgp_confederation_peers_check(peer
->bgp
, as
)
1667 && peer
->bgp
->as
!= as
)
1668 peer
->local_as
= peer
->bgp
->confed_id
;
1670 peer
->local_as
= peer
->bgp
->as
;
1672 /* Advertisement-interval reset */
1673 if (!CHECK_FLAG(peer
->flags
, PEER_FLAG_ROUTEADV
)) {
1674 peer
->v_routeadv
= (peer_sort(peer
) == BGP_PEER_IBGP
)
1675 ? BGP_DEFAULT_IBGP_ROUTEADV
1676 : BGP_DEFAULT_EBGP_ROUTEADV
;
1680 if (peer_sort(peer
) == BGP_PEER_IBGP
)
1682 else if (type
== BGP_PEER_IBGP
)
1683 peer
->ttl
= BGP_DEFAULT_TTL
;
1685 /* reflector-client reset */
1686 if (peer_sort(peer
) != BGP_PEER_IBGP
) {
1687 UNSET_FLAG(peer
->af_flags
[AFI_IP
][SAFI_UNICAST
],
1688 PEER_FLAG_REFLECTOR_CLIENT
);
1689 UNSET_FLAG(peer
->af_flags
[AFI_IP
][SAFI_MULTICAST
],
1690 PEER_FLAG_REFLECTOR_CLIENT
);
1691 UNSET_FLAG(peer
->af_flags
[AFI_IP
][SAFI_LABELED_UNICAST
],
1692 PEER_FLAG_REFLECTOR_CLIENT
);
1693 UNSET_FLAG(peer
->af_flags
[AFI_IP
][SAFI_MPLS_VPN
],
1694 PEER_FLAG_REFLECTOR_CLIENT
);
1695 UNSET_FLAG(peer
->af_flags
[AFI_IP
][SAFI_ENCAP
],
1696 PEER_FLAG_REFLECTOR_CLIENT
);
1697 UNSET_FLAG(peer
->af_flags
[AFI_IP
][SAFI_FLOWSPEC
],
1698 PEER_FLAG_REFLECTOR_CLIENT
);
1699 UNSET_FLAG(peer
->af_flags
[AFI_IP6
][SAFI_UNICAST
],
1700 PEER_FLAG_REFLECTOR_CLIENT
);
1701 UNSET_FLAG(peer
->af_flags
[AFI_IP6
][SAFI_MULTICAST
],
1702 PEER_FLAG_REFLECTOR_CLIENT
);
1703 UNSET_FLAG(peer
->af_flags
[AFI_IP6
][SAFI_LABELED_UNICAST
],
1704 PEER_FLAG_REFLECTOR_CLIENT
);
1705 UNSET_FLAG(peer
->af_flags
[AFI_IP6
][SAFI_MPLS_VPN
],
1706 PEER_FLAG_REFLECTOR_CLIENT
);
1707 UNSET_FLAG(peer
->af_flags
[AFI_IP6
][SAFI_ENCAP
],
1708 PEER_FLAG_REFLECTOR_CLIENT
);
1709 UNSET_FLAG(peer
->af_flags
[AFI_IP6
][SAFI_FLOWSPEC
],
1710 PEER_FLAG_REFLECTOR_CLIENT
);
1711 UNSET_FLAG(peer
->af_flags
[AFI_L2VPN
][SAFI_EVPN
],
1712 PEER_FLAG_REFLECTOR_CLIENT
);
1715 /* local-as reset */
1716 if (peer_sort(peer
) != BGP_PEER_EBGP
) {
1717 peer
->change_local_as
= 0;
1718 peer_flag_unset(peer
, PEER_FLAG_LOCAL_AS
);
1719 peer_flag_unset(peer
, PEER_FLAG_LOCAL_AS_NO_PREPEND
);
1720 peer_flag_unset(peer
, PEER_FLAG_LOCAL_AS_REPLACE_AS
);
1724 /* If peer does not exist, create new one. If peer already exists,
1725 set AS number to the peer. */
1726 int peer_remote_as(struct bgp
*bgp
, union sockunion
*su
, const char *conf_if
,
1727 as_t
*as
, int as_type
, afi_t afi
, safi_t safi
)
1733 peer
= peer_lookup_by_conf_if(bgp
, conf_if
);
1735 peer
= peer_lookup(bgp
, su
);
1738 /* Not allowed for a dynamic peer. */
1739 if (peer_dynamic_neighbor(peer
)) {
1741 return BGP_ERR_INVALID_FOR_DYNAMIC_PEER
;
1744 /* When this peer is a member of peer-group. */
1746 /* peer-group already has AS number/internal/external */
1747 if (peer
->group
->conf
->as
1748 || peer
->group
->conf
->as_type
) {
1749 /* Return peer group's AS number. */
1750 *as
= peer
->group
->conf
->as
;
1751 return BGP_ERR_PEER_GROUP_MEMBER
;
1754 bgp_peer_sort_t peer_sort_type
=
1755 peer_sort(peer
->group
->conf
);
1757 /* Explicit AS numbers used, compare AS numbers */
1758 if (as_type
== AS_SPECIFIED
) {
1759 if (((peer_sort_type
== BGP_PEER_IBGP
)
1760 && (bgp
->as
!= *as
))
1761 || ((peer_sort_type
== BGP_PEER_EBGP
)
1762 && (bgp
->as
== *as
))) {
1764 return BGP_ERR_PEER_GROUP_PEER_TYPE_DIFFERENT
;
1767 /* internal/external used, compare as-types */
1768 if (((peer_sort_type
== BGP_PEER_IBGP
)
1769 && (as_type
!= AS_INTERNAL
))
1770 || ((peer_sort_type
== BGP_PEER_EBGP
)
1771 && (as_type
!= AS_EXTERNAL
))) {
1773 return BGP_ERR_PEER_GROUP_PEER_TYPE_DIFFERENT
;
1778 /* Existing peer's AS number change. */
1779 if (((peer
->as_type
== AS_SPECIFIED
) && peer
->as
!= *as
)
1780 || (peer
->as_type
!= as_type
))
1781 peer_as_change(peer
, *as
, as_type
);
1784 return BGP_ERR_NO_INTERFACE_CONFIG
;
1786 /* If the peer is not part of our confederation, and its not an
1787 iBGP peer then spoof the source AS */
1788 if (bgp_config_check(bgp
, BGP_CONFIG_CONFEDERATION
)
1789 && !bgp_confederation_peers_check(bgp
, *as
)
1791 local_as
= bgp
->confed_id
;
1795 /* If this is IPv4 unicast configuration and "no bgp default
1796 ipv4-unicast" is specified. */
1798 if (bgp_flag_check(bgp
, BGP_FLAG_NO_DEFAULT_IPV4
)
1799 && afi
== AFI_IP
&& safi
== SAFI_UNICAST
)
1800 peer_create(su
, conf_if
, bgp
, local_as
, *as
, as_type
, 0,
1803 peer_create(su
, conf_if
, bgp
, local_as
, *as
, as_type
,
1810 static void peer_group2peer_config_copy_af(struct peer_group
*group
,
1811 struct peer
*peer
, afi_t afi
,
1815 int out
= FILTER_OUT
;
1817 uint32_t pflags_ovrd
;
1818 uint8_t *pfilter_ovrd
;
1822 pflags_ovrd
= peer
->af_flags_override
[afi
][safi
];
1823 pfilter_ovrd
= &peer
->filter_override
[afi
][safi
][in
];
1825 /* peer af_flags apply */
1826 flags_tmp
= conf
->af_flags
[afi
][safi
] & ~pflags_ovrd
;
1827 flags_tmp
^= conf
->af_flags_invert
[afi
][safi
]
1828 ^ peer
->af_flags_invert
[afi
][safi
];
1829 flags_tmp
&= ~pflags_ovrd
;
1831 UNSET_FLAG(peer
->af_flags
[afi
][safi
], ~pflags_ovrd
);
1832 SET_FLAG(peer
->af_flags
[afi
][safi
], flags_tmp
);
1833 SET_FLAG(peer
->af_flags_invert
[afi
][safi
],
1834 conf
->af_flags_invert
[afi
][safi
]);
1836 /* maximum-prefix */
1837 if (!CHECK_FLAG(pflags_ovrd
, PEER_FLAG_MAX_PREFIX
)) {
1838 PEER_ATTR_INHERIT(peer
, group
, pmax
[afi
][safi
]);
1839 PEER_ATTR_INHERIT(peer
, group
, pmax_threshold
[afi
][safi
]);
1840 PEER_ATTR_INHERIT(peer
, group
, pmax_restart
[afi
][safi
]);
1844 if (!CHECK_FLAG(pflags_ovrd
, PEER_FLAG_ALLOWAS_IN
))
1845 PEER_ATTR_INHERIT(peer
, group
, allowas_in
[afi
][safi
]);
1848 if (!CHECK_FLAG(pflags_ovrd
, PEER_FLAG_WEIGHT
))
1849 PEER_ATTR_INHERIT(peer
, group
, weight
[afi
][safi
]);
1851 /* default-originate route-map */
1852 if (!CHECK_FLAG(pflags_ovrd
, PEER_FLAG_DEFAULT_ORIGINATE
)) {
1853 PEER_STR_ATTR_INHERIT(peer
, group
, default_rmap
[afi
][safi
].name
,
1854 MTYPE_ROUTE_MAP_NAME
);
1855 PEER_ATTR_INHERIT(peer
, group
, default_rmap
[afi
][safi
].map
);
1858 /* inbound filter apply */
1859 if (!CHECK_FLAG(pfilter_ovrd
[in
], PEER_FT_DISTRIBUTE_LIST
)) {
1860 PEER_STR_ATTR_INHERIT(peer
, group
,
1861 filter
[afi
][safi
].dlist
[in
].name
,
1862 MTYPE_BGP_FILTER_NAME
);
1863 PEER_ATTR_INHERIT(peer
, group
,
1864 filter
[afi
][safi
].dlist
[in
].alist
);
1867 if (!CHECK_FLAG(pfilter_ovrd
[in
], PEER_FT_PREFIX_LIST
)) {
1868 PEER_STR_ATTR_INHERIT(peer
, group
,
1869 filter
[afi
][safi
].plist
[in
].name
,
1870 MTYPE_BGP_FILTER_NAME
);
1871 PEER_ATTR_INHERIT(peer
, group
,
1872 filter
[afi
][safi
].plist
[in
].plist
);
1875 if (!CHECK_FLAG(pfilter_ovrd
[in
], PEER_FT_FILTER_LIST
)) {
1876 PEER_STR_ATTR_INHERIT(peer
, group
,
1877 filter
[afi
][safi
].aslist
[in
].name
,
1878 MTYPE_BGP_FILTER_NAME
);
1879 PEER_ATTR_INHERIT(peer
, group
,
1880 filter
[afi
][safi
].aslist
[in
].aslist
);
1883 if (!CHECK_FLAG(pfilter_ovrd
[RMAP_IN
], PEER_FT_ROUTE_MAP
)) {
1884 PEER_STR_ATTR_INHERIT(peer
, group
,
1885 filter
[afi
][safi
].map
[in
].name
,
1886 MTYPE_BGP_FILTER_NAME
);
1887 PEER_ATTR_INHERIT(peer
, group
,
1888 filter
[afi
][safi
].map
[RMAP_IN
].map
);
1891 /* outbound filter apply */
1892 if (!CHECK_FLAG(pfilter_ovrd
[out
], PEER_FT_DISTRIBUTE_LIST
)) {
1893 PEER_STR_ATTR_INHERIT(peer
, group
,
1894 filter
[afi
][safi
].dlist
[out
].name
,
1895 MTYPE_BGP_FILTER_NAME
);
1896 PEER_ATTR_INHERIT(peer
, group
,
1897 filter
[afi
][safi
].dlist
[out
].alist
);
1900 if (!CHECK_FLAG(pfilter_ovrd
[out
], PEER_FT_PREFIX_LIST
)) {
1901 PEER_STR_ATTR_INHERIT(peer
, group
,
1902 filter
[afi
][safi
].plist
[out
].name
,
1903 MTYPE_BGP_FILTER_NAME
);
1904 PEER_ATTR_INHERIT(peer
, group
,
1905 filter
[afi
][safi
].plist
[out
].plist
);
1908 if (!CHECK_FLAG(pfilter_ovrd
[out
], PEER_FT_FILTER_LIST
)) {
1909 PEER_STR_ATTR_INHERIT(peer
, group
,
1910 filter
[afi
][safi
].aslist
[out
].name
,
1911 MTYPE_BGP_FILTER_NAME
);
1912 PEER_ATTR_INHERIT(peer
, group
,
1913 filter
[afi
][safi
].aslist
[out
].aslist
);
1916 if (!CHECK_FLAG(pfilter_ovrd
[RMAP_OUT
], PEER_FT_ROUTE_MAP
)) {
1917 PEER_STR_ATTR_INHERIT(peer
, group
,
1918 filter
[afi
][safi
].map
[RMAP_OUT
].name
,
1919 MTYPE_BGP_FILTER_NAME
);
1920 PEER_ATTR_INHERIT(peer
, group
,
1921 filter
[afi
][safi
].map
[RMAP_OUT
].map
);
1924 /* nondirectional filter apply */
1925 if (!CHECK_FLAG(pfilter_ovrd
[0], PEER_FT_UNSUPPRESS_MAP
)) {
1926 PEER_STR_ATTR_INHERIT(peer
, group
, filter
[afi
][safi
].usmap
.name
,
1927 MTYPE_BGP_FILTER_NAME
);
1928 PEER_ATTR_INHERIT(peer
, group
, filter
[afi
][safi
].usmap
.map
);
1931 if (peer
->addpath_type
[afi
][safi
] == BGP_ADDPATH_NONE
) {
1932 peer
->addpath_type
[afi
][safi
] = conf
->addpath_type
[afi
][safi
];
1933 bgp_addpath_type_changed(conf
->bgp
);
1937 static int peer_activate_af(struct peer
*peer
, afi_t afi
, safi_t safi
)
1942 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
1943 flog_err(EC_BGP_PEER_GROUP
, "%s was called for peer-group %s",
1944 __func__
, peer
->host
);
1948 /* Do not activate a peer for both SAFI_UNICAST and SAFI_LABELED_UNICAST
1950 if ((safi
== SAFI_UNICAST
&& peer
->afc
[afi
][SAFI_LABELED_UNICAST
])
1951 || (safi
== SAFI_LABELED_UNICAST
&& peer
->afc
[afi
][SAFI_UNICAST
]))
1952 return BGP_ERR_PEER_SAFI_CONFLICT
;
1954 /* Nothing to do if we've already activated this peer */
1955 if (peer
->afc
[afi
][safi
])
1958 if (peer_af_create(peer
, afi
, safi
) == NULL
)
1961 active
= peer_active(peer
);
1962 peer
->afc
[afi
][safi
] = 1;
1965 peer_group2peer_config_copy_af(peer
->group
, peer
, afi
, safi
);
1967 if (!active
&& peer_active(peer
)) {
1968 bgp_timer_set(peer
);
1970 if (peer
->status
== Established
) {
1971 if (CHECK_FLAG(peer
->cap
, PEER_CAP_DYNAMIC_RCV
)) {
1972 peer
->afc_adv
[afi
][safi
] = 1;
1973 bgp_capability_send(peer
, afi
, safi
,
1975 CAPABILITY_ACTION_SET
);
1976 if (peer
->afc_recv
[afi
][safi
]) {
1977 peer
->afc_nego
[afi
][safi
] = 1;
1978 bgp_announce_route(peer
, afi
, safi
);
1981 peer
->last_reset
= PEER_DOWN_AF_ACTIVATE
;
1982 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
1983 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
1986 if (peer
->status
== OpenSent
|| peer
->status
== OpenConfirm
) {
1987 peer
->last_reset
= PEER_DOWN_AF_ACTIVATE
;
1988 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
1989 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
1992 * If we are turning on a AFI/SAFI locally and we've
1993 * started bringing a peer up, we need to tell
1994 * the other peer to restart because we might loose
1995 * configuration here because when the doppelganger
1996 * gets to a established state due to how
1997 * we resolve we could just overwrite the afi/safi
2000 other
= peer
->doppelganger
;
2002 && (other
->status
== OpenSent
2003 || other
->status
== OpenConfirm
)) {
2004 other
->last_reset
= PEER_DOWN_AF_ACTIVATE
;
2005 bgp_notify_send(other
, BGP_NOTIFY_CEASE
,
2006 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
2013 /* Activate the peer or peer group for specified AFI and SAFI. */
2014 int peer_activate(struct peer
*peer
, afi_t afi
, safi_t safi
)
2017 struct peer_group
*group
;
2018 struct listnode
*node
, *nnode
;
2019 struct peer
*tmp_peer
;
2022 /* Nothing to do if we've already activated this peer */
2023 if (peer
->afc
[afi
][safi
])
2028 /* This is a peer-group so activate all of the members of the
2029 * peer-group as well */
2030 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
2032 /* Do not activate a peer for both SAFI_UNICAST and
2033 * SAFI_LABELED_UNICAST */
2034 if ((safi
== SAFI_UNICAST
2035 && peer
->afc
[afi
][SAFI_LABELED_UNICAST
])
2036 || (safi
== SAFI_LABELED_UNICAST
2037 && peer
->afc
[afi
][SAFI_UNICAST
]))
2038 return BGP_ERR_PEER_SAFI_CONFLICT
;
2040 peer
->afc
[afi
][safi
] = 1;
2041 group
= peer
->group
;
2043 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, tmp_peer
)) {
2044 ret
|= peer_activate_af(tmp_peer
, afi
, safi
);
2047 ret
|= peer_activate_af(peer
, afi
, safi
);
2050 /* If this is the first peer to be activated for this
2051 * afi/labeled-unicast recalc bestpaths to trigger label allocation */
2052 if (safi
== SAFI_LABELED_UNICAST
2053 && !bgp
->allocate_mpls_labels
[afi
][SAFI_UNICAST
]) {
2055 if (BGP_DEBUG(zebra
, ZEBRA
))
2057 "peer(s) are now active for labeled-unicast, allocate MPLS labels");
2059 bgp
->allocate_mpls_labels
[afi
][SAFI_UNICAST
] = 1;
2060 bgp_recalculate_afi_safi_bestpaths(bgp
, afi
, SAFI_UNICAST
);
2063 if (safi
== SAFI_FLOWSPEC
) {
2064 /* connect to table manager */
2065 bgp_zebra_init_tm_connect(bgp
);
2070 static int non_peergroup_deactivate_af(struct peer
*peer
, afi_t afi
,
2073 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
2074 flog_err(EC_BGP_PEER_GROUP
, "%s was called for peer-group %s",
2075 __func__
, peer
->host
);
2079 /* Nothing to do if we've already deactivated this peer */
2080 if (!peer
->afc
[afi
][safi
])
2083 /* De-activate the address family configuration. */
2084 peer
->afc
[afi
][safi
] = 0;
2086 if (peer_af_delete(peer
, afi
, safi
) != 0) {
2087 flog_err(EC_BGP_PEER_DELETE
,
2088 "couldn't delete af structure for peer %s",
2093 if (peer
->status
== Established
) {
2094 if (CHECK_FLAG(peer
->cap
, PEER_CAP_DYNAMIC_RCV
)) {
2095 peer
->afc_adv
[afi
][safi
] = 0;
2096 peer
->afc_nego
[afi
][safi
] = 0;
2098 if (peer_active_nego(peer
)) {
2099 bgp_capability_send(peer
, afi
, safi
,
2101 CAPABILITY_ACTION_UNSET
);
2102 bgp_clear_route(peer
, afi
, safi
);
2103 peer
->pcount
[afi
][safi
] = 0;
2105 peer
->last_reset
= PEER_DOWN_NEIGHBOR_DELETE
;
2106 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
2107 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
2110 peer
->last_reset
= PEER_DOWN_NEIGHBOR_DELETE
;
2111 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
2112 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
2119 int peer_deactivate(struct peer
*peer
, afi_t afi
, safi_t safi
)
2122 struct peer_group
*group
;
2123 struct peer
*tmp_peer
;
2124 struct listnode
*node
, *nnode
;
2127 /* Nothing to do if we've already de-activated this peer */
2128 if (!peer
->afc
[afi
][safi
])
2131 /* This is a peer-group so de-activate all of the members of the
2132 * peer-group as well */
2133 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
2134 peer
->afc
[afi
][safi
] = 0;
2135 group
= peer
->group
;
2137 if (peer_af_delete(peer
, afi
, safi
) != 0) {
2138 flog_err(EC_BGP_PEER_DELETE
,
2139 "couldn't delete af structure for peer %s",
2143 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, tmp_peer
)) {
2144 ret
|= non_peergroup_deactivate_af(tmp_peer
, afi
, safi
);
2147 ret
|= non_peergroup_deactivate_af(peer
, afi
, safi
);
2152 /* If this is the last peer to be deactivated for this
2153 * afi/labeled-unicast recalc bestpaths to trigger label deallocation */
2154 if (safi
== SAFI_LABELED_UNICAST
2155 && bgp
->allocate_mpls_labels
[afi
][SAFI_UNICAST
]
2156 && !bgp_afi_safi_peer_exists(bgp
, afi
, safi
)) {
2158 if (BGP_DEBUG(zebra
, ZEBRA
))
2160 "peer(s) are no longer active for labeled-unicast, deallocate MPLS labels");
2162 bgp
->allocate_mpls_labels
[afi
][SAFI_UNICAST
] = 0;
2163 bgp_recalculate_afi_safi_bestpaths(bgp
, afi
, SAFI_UNICAST
);
2168 int peer_afc_set(struct peer
*peer
, afi_t afi
, safi_t safi
, int enable
)
2171 return peer_activate(peer
, afi
, safi
);
2173 return peer_deactivate(peer
, afi
, safi
);
2176 static void peer_nsf_stop(struct peer
*peer
)
2181 UNSET_FLAG(peer
->sflags
, PEER_STATUS_NSF_WAIT
);
2182 UNSET_FLAG(peer
->sflags
, PEER_STATUS_NSF_MODE
);
2184 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++)
2185 for (safi
= SAFI_UNICAST
; safi
<= SAFI_MPLS_VPN
; safi
++)
2186 peer
->nsf
[afi
][safi
] = 0;
2188 if (peer
->t_gr_restart
) {
2189 BGP_TIMER_OFF(peer
->t_gr_restart
);
2190 if (bgp_debug_neighbor_events(peer
))
2191 zlog_debug("%s graceful restart timer stopped",
2194 if (peer
->t_gr_stale
) {
2195 BGP_TIMER_OFF(peer
->t_gr_stale
);
2196 if (bgp_debug_neighbor_events(peer
))
2198 "%s graceful restart stalepath timer stopped",
2201 bgp_clear_route_all(peer
);
2204 /* Delete peer from confguration.
2206 * The peer is moved to a dead-end "Deleted" neighbour-state, to allow
2207 * it to "cool off" and refcounts to hit 0, at which state it is freed.
2209 * This function /should/ take care to be idempotent, to guard against
2210 * it being called multiple times through stray events that come in
2211 * that happen to result in this function being called again. That
2212 * said, getting here for a "Deleted" peer is a bug in the neighbour
2215 int peer_delete(struct peer
*peer
)
2221 struct bgp_filter
*filter
;
2222 struct listnode
*pn
;
2225 assert(peer
->status
!= Deleted
);
2228 accept_peer
= CHECK_FLAG(peer
->sflags
, PEER_STATUS_ACCEPT_PEER
);
2230 bgp_keepalives_off(peer
);
2231 bgp_reads_off(peer
);
2232 bgp_writes_off(peer
);
2233 assert(!CHECK_FLAG(peer
->thread_flags
, PEER_THREAD_WRITES_ON
));
2234 assert(!CHECK_FLAG(peer
->thread_flags
, PEER_THREAD_READS_ON
));
2235 assert(!CHECK_FLAG(peer
->thread_flags
, PEER_THREAD_KEEPALIVES_ON
));
2237 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_NSF_WAIT
))
2238 peer_nsf_stop(peer
);
2240 SET_FLAG(peer
->flags
, PEER_FLAG_DELETE
);
2242 bgp_bfd_deregister_peer(peer
);
2244 /* If this peer belongs to peer group, clear up the
2247 if (peer_dynamic_neighbor(peer
))
2248 peer_drop_dynamic_neighbor(peer
);
2250 if ((pn
= listnode_lookup(peer
->group
->peer
, peer
))) {
2252 peer
); /* group->peer list reference */
2253 list_delete_node(peer
->group
->peer
, pn
);
2258 /* Withdraw all information from routing table. We can not use
2259 * BGP_EVENT_ADD (peer, BGP_Stop) at here. Because the event is
2260 * executed after peer structure is deleted.
2262 peer
->last_reset
= PEER_DOWN_NEIGHBOR_DELETE
;
2264 UNSET_FLAG(peer
->flags
, PEER_FLAG_DELETE
);
2266 if (peer
->doppelganger
) {
2267 peer
->doppelganger
->doppelganger
= NULL
;
2268 peer
->doppelganger
= NULL
;
2271 UNSET_FLAG(peer
->sflags
, PEER_STATUS_ACCEPT_PEER
);
2272 bgp_fsm_change_status(peer
, Deleted
);
2274 /* Remove from NHT */
2275 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
))
2276 bgp_unlink_nexthop_by_peer(peer
);
2278 /* Password configuration */
2279 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_PASSWORD
)) {
2280 XFREE(MTYPE_PEER_PASSWORD
, peer
->password
);
2282 if (!accept_peer
&& !BGP_PEER_SU_UNSPEC(peer
)
2283 && !CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
2284 bgp_md5_unset(peer
);
2287 bgp_timer_set(peer
); /* stops all timers for Deleted */
2289 /* Delete from all peer list. */
2290 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)
2291 && (pn
= listnode_lookup(bgp
->peer
, peer
))) {
2292 peer_unlock(peer
); /* bgp peer list reference */
2293 list_delete_node(bgp
->peer
, pn
);
2294 hash_release(bgp
->peerhash
, peer
);
2299 stream_fifo_free(peer
->ibuf
);
2304 stream_fifo_free(peer
->obuf
);
2308 if (peer
->ibuf_work
) {
2309 ringbuf_del(peer
->ibuf_work
);
2310 peer
->ibuf_work
= NULL
;
2313 if (peer
->obuf_work
) {
2314 stream_free(peer
->obuf_work
);
2315 peer
->obuf_work
= NULL
;
2318 if (peer
->scratch
) {
2319 stream_free(peer
->scratch
);
2320 peer
->scratch
= NULL
;
2323 /* Local and remote addresses. */
2324 if (peer
->su_local
) {
2325 sockunion_free(peer
->su_local
);
2326 peer
->su_local
= NULL
;
2329 if (peer
->su_remote
) {
2330 sockunion_free(peer
->su_remote
);
2331 peer
->su_remote
= NULL
;
2334 /* Free filter related memory. */
2335 FOREACH_AFI_SAFI (afi
, safi
) {
2336 filter
= &peer
->filter
[afi
][safi
];
2338 for (i
= FILTER_IN
; i
< FILTER_MAX
; i
++) {
2339 if (filter
->dlist
[i
].name
) {
2340 XFREE(MTYPE_BGP_FILTER_NAME
,
2341 filter
->dlist
[i
].name
);
2342 filter
->dlist
[i
].name
= NULL
;
2345 if (filter
->plist
[i
].name
) {
2346 XFREE(MTYPE_BGP_FILTER_NAME
,
2347 filter
->plist
[i
].name
);
2348 filter
->plist
[i
].name
= NULL
;
2351 if (filter
->aslist
[i
].name
) {
2352 XFREE(MTYPE_BGP_FILTER_NAME
,
2353 filter
->aslist
[i
].name
);
2354 filter
->aslist
[i
].name
= NULL
;
2358 for (i
= RMAP_IN
; i
< RMAP_MAX
; i
++) {
2359 if (filter
->map
[i
].name
) {
2360 XFREE(MTYPE_BGP_FILTER_NAME
,
2361 filter
->map
[i
].name
);
2362 filter
->map
[i
].name
= NULL
;
2366 if (filter
->usmap
.name
) {
2367 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->usmap
.name
);
2368 filter
->usmap
.name
= NULL
;
2371 if (peer
->default_rmap
[afi
][safi
].name
) {
2372 XFREE(MTYPE_ROUTE_MAP_NAME
,
2373 peer
->default_rmap
[afi
][safi
].name
);
2374 peer
->default_rmap
[afi
][safi
].name
= NULL
;
2378 FOREACH_AFI_SAFI (afi
, safi
)
2379 peer_af_delete(peer
, afi
, safi
);
2381 if (peer
->hostname
) {
2382 XFREE(MTYPE_BGP_PEER_HOST
, peer
->hostname
);
2383 peer
->hostname
= NULL
;
2386 if (peer
->domainname
) {
2387 XFREE(MTYPE_BGP_PEER_HOST
, peer
->domainname
);
2388 peer
->domainname
= NULL
;
2391 peer_unlock(peer
); /* initial reference */
2396 static int peer_group_cmp(struct peer_group
*g1
, struct peer_group
*g2
)
2398 return strcmp(g1
->name
, g2
->name
);
2401 /* Peer group cofiguration. */
2402 static struct peer_group
*peer_group_new(void)
2404 return XCALLOC(MTYPE_PEER_GROUP
, sizeof(struct peer_group
));
2407 static void peer_group_free(struct peer_group
*group
)
2409 XFREE(MTYPE_PEER_GROUP
, group
);
2412 struct peer_group
*peer_group_lookup(struct bgp
*bgp
, const char *name
)
2414 struct peer_group
*group
;
2415 struct listnode
*node
, *nnode
;
2417 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, nnode
, group
)) {
2418 if (strcmp(group
->name
, name
) == 0)
2424 struct peer_group
*peer_group_get(struct bgp
*bgp
, const char *name
)
2426 struct peer_group
*group
;
2429 group
= peer_group_lookup(bgp
, name
);
2433 group
= peer_group_new();
2435 XFREE(MTYPE_PEER_GROUP_HOST
, group
->name
);
2436 group
->name
= XSTRDUP(MTYPE_PEER_GROUP_HOST
, name
);
2437 group
->peer
= list_new();
2438 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++)
2439 group
->listen_range
[afi
] = list_new();
2440 group
->conf
= peer_new(bgp
);
2441 if (!bgp_flag_check(bgp
, BGP_FLAG_NO_DEFAULT_IPV4
))
2442 group
->conf
->afc
[AFI_IP
][SAFI_UNICAST
] = 1;
2443 XFREE(MTYPE_BGP_PEER_HOST
, group
->conf
->host
);
2444 group
->conf
->host
= XSTRDUP(MTYPE_BGP_PEER_HOST
, name
);
2445 group
->conf
->group
= group
;
2446 group
->conf
->as
= 0;
2447 group
->conf
->ttl
= BGP_DEFAULT_TTL
;
2448 group
->conf
->gtsm_hops
= 0;
2449 group
->conf
->v_routeadv
= BGP_DEFAULT_EBGP_ROUTEADV
;
2450 SET_FLAG(group
->conf
->sflags
, PEER_STATUS_GROUP
);
2451 listnode_add_sort(bgp
->group
, group
);
2456 static void peer_group2peer_config_copy(struct peer_group
*group
,
2466 peer
->as
= conf
->as
;
2469 if (!CHECK_FLAG(peer
->flags_override
, PEER_FLAG_LOCAL_AS
))
2470 peer
->change_local_as
= conf
->change_local_as
;
2472 /* If peer-group has configured TTL then override it */
2473 if (conf
->ttl
!= BGP_DEFAULT_TTL
)
2474 peer
->ttl
= conf
->ttl
;
2477 peer
->gtsm_hops
= conf
->gtsm_hops
;
2479 /* peer flags apply */
2480 flags_tmp
= conf
->flags
& ~peer
->flags_override
;
2481 flags_tmp
^= conf
->flags_invert
^ peer
->flags_invert
;
2482 flags_tmp
&= ~peer
->flags_override
;
2484 UNSET_FLAG(peer
->flags
, ~peer
->flags_override
);
2485 SET_FLAG(peer
->flags
, flags_tmp
);
2486 SET_FLAG(peer
->flags_invert
, conf
->flags_invert
);
2488 /* peer timers apply */
2489 if (!CHECK_FLAG(peer
->flags_override
, PEER_FLAG_TIMER
)) {
2490 PEER_ATTR_INHERIT(peer
, group
, holdtime
);
2491 PEER_ATTR_INHERIT(peer
, group
, keepalive
);
2494 if (!CHECK_FLAG(peer
->flags_override
, PEER_FLAG_TIMER_CONNECT
)) {
2495 PEER_ATTR_INHERIT(peer
, group
, connect
);
2496 if (CHECK_FLAG(conf
->flags
, PEER_FLAG_TIMER_CONNECT
))
2497 peer
->v_connect
= conf
->connect
;
2499 peer
->v_connect
= BGP_DEFAULT_CONNECT_RETRY
;
2502 /* advertisement-interval apply */
2503 if (!CHECK_FLAG(peer
->flags_override
, PEER_FLAG_ROUTEADV
)) {
2504 PEER_ATTR_INHERIT(peer
, group
, routeadv
);
2505 if (CHECK_FLAG(conf
->flags
, PEER_FLAG_ROUTEADV
))
2506 peer
->v_routeadv
= conf
->routeadv
;
2508 peer
->v_routeadv
= (peer_sort(peer
) == BGP_PEER_IBGP
)
2509 ? BGP_DEFAULT_IBGP_ROUTEADV
2510 : BGP_DEFAULT_EBGP_ROUTEADV
;
2513 /* password apply */
2514 if (!CHECK_FLAG(peer
->flags_override
, PEER_FLAG_PASSWORD
))
2515 PEER_STR_ATTR_INHERIT(peer
, group
, password
,
2516 MTYPE_PEER_PASSWORD
);
2518 if (!BGP_PEER_SU_UNSPEC(peer
))
2521 /* update-source apply */
2522 if (!CHECK_FLAG(peer
->flags_override
, PEER_FLAG_UPDATE_SOURCE
)) {
2523 if (conf
->update_source
) {
2524 XFREE(MTYPE_PEER_UPDATE_SOURCE
, peer
->update_if
);
2525 PEER_SU_ATTR_INHERIT(peer
, group
, update_source
);
2526 } else if (conf
->update_if
) {
2527 sockunion_free(peer
->update_source
);
2528 PEER_STR_ATTR_INHERIT(peer
, group
, update_if
,
2529 MTYPE_PEER_UPDATE_SOURCE
);
2533 bgp_bfd_peer_group2peer_copy(conf
, peer
);
2536 /* Peer group's remote AS configuration. */
2537 int peer_group_remote_as(struct bgp
*bgp
, const char *group_name
, as_t
*as
,
2540 struct peer_group
*group
;
2542 struct listnode
*node
, *nnode
;
2544 group
= peer_group_lookup(bgp
, group_name
);
2548 if ((as_type
== group
->conf
->as_type
) && (group
->conf
->as
== *as
))
2552 /* When we setup peer-group AS number all peer group member's AS
2553 number must be updated to same number. */
2554 peer_as_change(group
->conf
, *as
, as_type
);
2556 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
2557 if (((peer
->as_type
== AS_SPECIFIED
) && peer
->as
!= *as
)
2558 || (peer
->as_type
!= as_type
))
2559 peer_as_change(peer
, *as
, as_type
);
2565 int peer_notify_unconfig(struct peer
*peer
)
2567 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
2568 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
2569 BGP_NOTIFY_CEASE_PEER_UNCONFIG
);
2573 int peer_group_notify_unconfig(struct peer_group
*group
)
2575 struct peer
*peer
, *other
;
2576 struct listnode
*node
, *nnode
;
2578 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
2579 other
= peer
->doppelganger
;
2580 if (other
&& other
->status
!= Deleted
) {
2581 other
->group
= NULL
;
2582 peer_notify_unconfig(other
);
2584 peer_notify_unconfig(peer
);
2589 int peer_group_delete(struct peer_group
*group
)
2593 struct prefix
*prefix
;
2595 struct listnode
*node
, *nnode
;
2600 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
2601 other
= peer
->doppelganger
;
2603 if (other
&& other
->status
!= Deleted
) {
2604 other
->group
= NULL
;
2608 list_delete(&group
->peer
);
2610 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++) {
2611 for (ALL_LIST_ELEMENTS(group
->listen_range
[afi
], node
, nnode
,
2613 prefix_free(&prefix
);
2615 list_delete(&group
->listen_range
[afi
]);
2618 XFREE(MTYPE_PEER_GROUP_HOST
, group
->name
);
2621 bfd_info_free(&(group
->conf
->bfd_info
));
2623 group
->conf
->group
= NULL
;
2624 peer_delete(group
->conf
);
2626 /* Delete from all peer_group list. */
2627 listnode_delete(bgp
->group
, group
);
2629 peer_group_free(group
);
2634 int peer_group_remote_as_delete(struct peer_group
*group
)
2636 struct peer
*peer
, *other
;
2637 struct listnode
*node
, *nnode
;
2639 if ((group
->conf
->as_type
== AS_UNSPECIFIED
)
2640 || ((!group
->conf
->as
) && (group
->conf
->as_type
== AS_SPECIFIED
)))
2643 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
2644 other
= peer
->doppelganger
;
2648 if (other
&& other
->status
!= Deleted
) {
2649 other
->group
= NULL
;
2653 list_delete_all_node(group
->peer
);
2655 group
->conf
->as
= 0;
2656 group
->conf
->as_type
= AS_UNSPECIFIED
;
2661 int peer_group_listen_range_add(struct peer_group
*group
, struct prefix
*range
)
2663 struct prefix
*prefix
;
2664 struct listnode
*node
, *nnode
;
2667 afi
= family2afi(range
->family
);
2669 /* Group needs remote AS configured. */
2670 if (group
->conf
->as_type
== AS_UNSPECIFIED
)
2671 return BGP_ERR_PEER_GROUP_NO_REMOTE_AS
;
2673 /* Ensure no duplicates. Currently we don't care about overlaps. */
2674 for (ALL_LIST_ELEMENTS(group
->listen_range
[afi
], node
, nnode
, prefix
)) {
2675 if (prefix_same(range
, prefix
))
2679 prefix
= prefix_new();
2680 prefix_copy(prefix
, range
);
2681 listnode_add(group
->listen_range
[afi
], prefix
);
2683 /* Update passwords for new ranges */
2684 if (group
->conf
->password
)
2685 bgp_md5_set_prefix(prefix
, group
->conf
->password
);
2690 int peer_group_listen_range_del(struct peer_group
*group
, struct prefix
*range
)
2692 struct prefix
*prefix
, prefix2
;
2693 struct listnode
*node
, *nnode
;
2696 char buf
[PREFIX2STR_BUFFER
];
2698 afi
= family2afi(range
->family
);
2700 /* Identify the listen range. */
2701 for (ALL_LIST_ELEMENTS(group
->listen_range
[afi
], node
, nnode
, prefix
)) {
2702 if (prefix_same(range
, prefix
))
2707 return BGP_ERR_DYNAMIC_NEIGHBORS_RANGE_NOT_FOUND
;
2709 prefix2str(prefix
, buf
, sizeof(buf
));
2711 /* Dispose off any dynamic neighbors that exist due to this listen range
2713 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
2714 if (!peer_dynamic_neighbor(peer
))
2717 sockunion2hostprefix(&peer
->su
, &prefix2
);
2718 if (prefix_match(prefix
, &prefix2
)) {
2719 if (bgp_debug_neighbor_events(peer
))
2721 "Deleting dynamic neighbor %s group %s upon "
2722 "delete of listen range %s",
2723 peer
->host
, group
->name
, buf
);
2728 /* Get rid of the listen range */
2729 listnode_delete(group
->listen_range
[afi
], prefix
);
2731 /* Remove passwords for deleted ranges */
2732 if (group
->conf
->password
)
2733 bgp_md5_unset_prefix(prefix
);
2738 /* Bind specified peer to peer group. */
2739 int peer_group_bind(struct bgp
*bgp
, union sockunion
*su
, struct peer
*peer
,
2740 struct peer_group
*group
, as_t
*as
)
2742 int first_member
= 0;
2746 /* Lookup the peer. */
2748 peer
= peer_lookup(bgp
, su
);
2750 /* The peer exist, bind it to the peer-group */
2752 /* When the peer already belongs to a peer-group, check the
2754 if (peer_group_active(peer
)) {
2756 /* The peer is already bound to the peer-group,
2759 if (strcmp(peer
->group
->name
, group
->name
) == 0)
2762 return BGP_ERR_PEER_GROUP_CANT_CHANGE
;
2765 /* The peer has not specified a remote-as, inherit it from the
2767 if (peer
->as_type
== AS_UNSPECIFIED
) {
2768 peer
->as_type
= group
->conf
->as_type
;
2769 peer
->as
= group
->conf
->as
;
2770 peer
->sort
= group
->conf
->sort
;
2773 if (!group
->conf
->as
&& peer_sort(peer
)) {
2774 if (peer_sort(group
->conf
) != BGP_PEER_INTERNAL
2775 && peer_sort(group
->conf
) != peer_sort(peer
)) {
2778 return BGP_ERR_PEER_GROUP_PEER_TYPE_DIFFERENT
;
2781 if (peer_sort(group
->conf
) == BGP_PEER_INTERNAL
)
2785 peer_group2peer_config_copy(group
, peer
);
2787 FOREACH_AFI_SAFI (afi
, safi
) {
2788 if (group
->conf
->afc
[afi
][safi
]) {
2789 peer
->afc
[afi
][safi
] = 1;
2791 if (peer_af_find(peer
, afi
, safi
)
2792 || peer_af_create(peer
, afi
, safi
)) {
2793 peer_group2peer_config_copy_af(
2794 group
, peer
, afi
, safi
);
2796 } else if (peer
->afc
[afi
][safi
])
2797 peer_deactivate(peer
, afi
, safi
);
2801 assert(group
&& peer
->group
== group
);
2803 listnode_delete(bgp
->peer
, peer
);
2805 peer
->group
= group
;
2806 listnode_add_sort(bgp
->peer
, peer
);
2808 peer
= peer_lock(peer
); /* group->peer list reference */
2809 listnode_add(group
->peer
, peer
);
2813 /* Advertisement-interval reset */
2814 if (!CHECK_FLAG(group
->conf
->flags
,
2815 PEER_FLAG_ROUTEADV
)) {
2816 group
->conf
->v_routeadv
=
2817 (peer_sort(group
->conf
)
2819 ? BGP_DEFAULT_IBGP_ROUTEADV
2820 : BGP_DEFAULT_EBGP_ROUTEADV
;
2823 /* ebgp-multihop reset */
2824 if (peer_sort(group
->conf
) == BGP_PEER_IBGP
)
2825 group
->conf
->ttl
= MAXTTL
;
2827 /* local-as reset */
2828 if (peer_sort(group
->conf
) != BGP_PEER_EBGP
) {
2829 group
->conf
->change_local_as
= 0;
2830 peer_flag_unset(group
->conf
,
2831 PEER_FLAG_LOCAL_AS
);
2832 peer_flag_unset(group
->conf
,
2833 PEER_FLAG_LOCAL_AS_NO_PREPEND
);
2834 peer_flag_unset(group
->conf
,
2835 PEER_FLAG_LOCAL_AS_REPLACE_AS
);
2839 SET_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
);
2841 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
2842 peer
->last_reset
= PEER_DOWN_RMAP_BIND
;
2843 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
2844 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
2846 bgp_session_reset(peer
);
2850 /* Create a new peer. */
2852 if ((group
->conf
->as_type
== AS_SPECIFIED
)
2853 && (!group
->conf
->as
)) {
2854 return BGP_ERR_PEER_GROUP_NO_REMOTE_AS
;
2857 peer
= peer_create(su
, NULL
, bgp
, bgp
->as
, group
->conf
->as
,
2858 group
->conf
->as_type
, 0, 0, group
);
2860 peer
= peer_lock(peer
); /* group->peer list reference */
2861 listnode_add(group
->peer
, peer
);
2863 peer_group2peer_config_copy(group
, peer
);
2865 /* If the peer-group is active for this afi/safi then activate
2867 FOREACH_AFI_SAFI (afi
, safi
) {
2868 if (group
->conf
->afc
[afi
][safi
]) {
2869 peer
->afc
[afi
][safi
] = 1;
2870 peer_af_create(peer
, afi
, safi
);
2871 peer_group2peer_config_copy_af(group
, peer
, afi
,
2873 } else if (peer
->afc
[afi
][safi
])
2874 peer_deactivate(peer
, afi
, safi
);
2877 SET_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
);
2879 /* Set up peer's events and timers. */
2880 if (peer_active(peer
))
2881 bgp_timer_set(peer
);
2887 static int bgp_startup_timer_expire(struct thread
*thread
)
2891 bgp
= THREAD_ARG(thread
);
2892 bgp
->t_startup
= NULL
;
2898 * On shutdown we call the cleanup function which
2899 * does a free of the link list nodes, free up
2900 * the data we are pointing at too.
2902 static void bgp_vrf_string_name_delete(void *data
)
2906 XFREE(MTYPE_TMP
, vname
);
2909 /* BGP instance creation by `router bgp' commands. */
2910 static struct bgp
*bgp_create(as_t
*as
, const char *name
,
2911 enum bgp_instance_type inst_type
)
2917 if ((bgp
= XCALLOC(MTYPE_BGP
, sizeof(struct bgp
))) == NULL
)
2920 if (BGP_DEBUG(zebra
, ZEBRA
)) {
2921 if (inst_type
== BGP_INSTANCE_TYPE_DEFAULT
)
2922 zlog_debug("Creating Default VRF, AS %u", *as
);
2924 zlog_debug("Creating %s %s, AS %u",
2925 (inst_type
== BGP_INSTANCE_TYPE_VRF
)
2931 /* Default the EVPN VRF to the default one */
2932 if (inst_type
== BGP_INSTANCE_TYPE_DEFAULT
&& !bgp_master
.bgp_evpn
) {
2938 bgp
->heuristic_coalesce
= true;
2939 bgp
->inst_type
= inst_type
;
2940 bgp
->vrf_id
= (inst_type
== BGP_INSTANCE_TYPE_DEFAULT
) ? VRF_DEFAULT
2942 bgp
->peer_self
= peer_new(bgp
);
2943 XFREE(MTYPE_BGP_PEER_HOST
, bgp
->peer_self
->host
);
2944 bgp
->peer_self
->host
=
2945 XSTRDUP(MTYPE_BGP_PEER_HOST
, "Static announcement");
2946 if (bgp
->peer_self
->hostname
!= NULL
) {
2947 XFREE(MTYPE_BGP_PEER_HOST
, bgp
->peer_self
->hostname
);
2948 bgp
->peer_self
->hostname
= NULL
;
2950 if (cmd_hostname_get())
2951 bgp
->peer_self
->hostname
=
2952 XSTRDUP(MTYPE_BGP_PEER_HOST
, cmd_hostname_get());
2954 if (bgp
->peer_self
->domainname
!= NULL
) {
2955 XFREE(MTYPE_BGP_PEER_HOST
, bgp
->peer_self
->domainname
);
2956 bgp
->peer_self
->domainname
= NULL
;
2958 if (cmd_domainname_get())
2959 bgp
->peer_self
->domainname
=
2960 XSTRDUP(MTYPE_BGP_PEER_HOST
, cmd_domainname_get());
2961 bgp
->peer
= list_new();
2962 bgp
->peer
->cmp
= (int (*)(void *, void *))peer_cmp
;
2963 bgp
->peerhash
= hash_create(peer_hash_key_make
, peer_hash_same
,
2965 bgp
->peerhash
->max_size
= BGP_PEER_MAX_HASH_SIZE
;
2967 bgp
->group
= list_new();
2968 bgp
->group
->cmp
= (int (*)(void *, void *))peer_group_cmp
;
2970 FOREACH_AFI_SAFI (afi
, safi
) {
2971 bgp
->route
[afi
][safi
] = bgp_table_init(bgp
, afi
, safi
);
2972 bgp
->aggregate
[afi
][safi
] = bgp_table_init(bgp
, afi
, safi
);
2973 bgp
->rib
[afi
][safi
] = bgp_table_init(bgp
, afi
, safi
);
2975 /* Enable maximum-paths */
2976 bgp_maximum_paths_set(bgp
, afi
, safi
, BGP_PEER_EBGP
,
2978 bgp_maximum_paths_set(bgp
, afi
, safi
, BGP_PEER_IBGP
,
2982 bgp
->v_update_delay
= BGP_UPDATE_DELAY_DEF
;
2983 bgp
->default_local_pref
= BGP_DEFAULT_LOCAL_PREF
;
2984 bgp
->default_subgroup_pkt_queue_max
=
2985 BGP_DEFAULT_SUBGROUP_PKT_QUEUE_MAX
;
2986 bgp
->default_holdtime
= BGP_DEFAULT_HOLDTIME
;
2987 bgp
->default_keepalive
= BGP_DEFAULT_KEEPALIVE
;
2988 bgp
->restart_time
= BGP_DEFAULT_RESTART_TIME
;
2989 bgp
->stalepath_time
= BGP_DEFAULT_STALEPATH_TIME
;
2990 bgp
->dynamic_neighbors_limit
= BGP_DYNAMIC_NEIGHBORS_LIMIT_DEFAULT
;
2991 bgp
->dynamic_neighbors_count
= 0;
2992 bgp
->ebgp_requires_policy
= DEFAULT_EBGP_POLICY_DISABLED
;
2993 #if DFLT_BGP_IMPORT_CHECK
2994 bgp_flag_set(bgp
, BGP_FLAG_IMPORT_CHECK
);
2996 #if DFLT_BGP_SHOW_HOSTNAME
2997 bgp_flag_set(bgp
, BGP_FLAG_SHOW_HOSTNAME
);
2999 #if DFLT_BGP_LOG_NEIGHBOR_CHANGES
3000 bgp_flag_set(bgp
, BGP_FLAG_LOG_NEIGHBOR_CHANGES
);
3002 #if DFLT_BGP_DETERMINISTIC_MED
3003 bgp_flag_set(bgp
, BGP_FLAG_DETERMINISTIC_MED
);
3005 bgp_addpath_init_bgp_data(&bgp
->tx_addpath
);
3010 if (inst_type
!= BGP_INSTANCE_TYPE_VRF
) {
3011 bgp
->rfapi
= bgp_rfapi_new(bgp
);
3013 assert(bgp
->rfapi_cfg
);
3015 #endif /* ENABLE_BGP_VNC */
3017 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++) {
3018 bgp
->vpn_policy
[afi
].bgp
= bgp
;
3019 bgp
->vpn_policy
[afi
].afi
= afi
;
3020 bgp
->vpn_policy
[afi
].tovpn_label
= MPLS_LABEL_NONE
;
3021 bgp
->vpn_policy
[afi
].tovpn_zebra_vrf_label_last_sent
=
3024 bgp
->vpn_policy
[afi
].import_vrf
= list_new();
3025 bgp
->vpn_policy
[afi
].import_vrf
->del
=
3026 bgp_vrf_string_name_delete
;
3027 bgp
->vpn_policy
[afi
].export_vrf
= list_new();
3028 bgp
->vpn_policy
[afi
].export_vrf
->del
=
3029 bgp_vrf_string_name_delete
;
3032 bgp
->name
= XSTRDUP(MTYPE_BGP
, name
);
3034 /* TODO - The startup timer needs to be run for the whole of BGP
3036 thread_add_timer(bm
->master
, bgp_startup_timer_expire
, bgp
,
3037 bgp
->restart_time
, &bgp
->t_startup
);
3040 /* printable name we can use in debug messages */
3041 if (inst_type
== BGP_INSTANCE_TYPE_DEFAULT
) {
3042 bgp
->name_pretty
= XSTRDUP(MTYPE_BGP
, "VRF default");
3052 len
= 4 + 1 + strlen(n
) + 1; /* "view foo\0" */
3054 bgp
->name_pretty
= XCALLOC(MTYPE_BGP
, len
);
3055 snprintf(bgp
->name_pretty
, len
, "%s %s",
3056 (bgp
->inst_type
== BGP_INSTANCE_TYPE_VRF
)
3062 atomic_store_explicit(&bgp
->wpkt_quanta
, BGP_WRITE_PACKET_MAX
,
3063 memory_order_relaxed
);
3064 atomic_store_explicit(&bgp
->rpkt_quanta
, BGP_READ_PACKET_MAX
,
3065 memory_order_relaxed
);
3066 bgp
->coalesce_time
= BGP_DEFAULT_SUBGROUP_COALESCE_TIME
;
3070 update_bgp_group_init(bgp
);
3072 /* assign a unique rd id for auto derivation of vrf's RD */
3073 bf_assign_index(bm
->rd_idspace
, bgp
->vrf_rd_id
);
3075 bgp
->evpn_info
= XCALLOC(MTYPE_BGP_EVPN_INFO
,
3076 sizeof(struct bgp_evpn_info
));
3083 /* Return the "default VRF" instance of BGP. */
3084 struct bgp
*bgp_get_default(void)
3087 struct listnode
*node
, *nnode
;
3089 for (ALL_LIST_ELEMENTS(bm
->bgp
, node
, nnode
, bgp
))
3090 if (bgp
->inst_type
== BGP_INSTANCE_TYPE_DEFAULT
)
3095 /* Lookup BGP entry. */
3096 struct bgp
*bgp_lookup(as_t as
, const char *name
)
3099 struct listnode
*node
, *nnode
;
3101 for (ALL_LIST_ELEMENTS(bm
->bgp
, node
, nnode
, bgp
))
3103 && ((bgp
->name
== NULL
&& name
== NULL
)
3104 || (bgp
->name
&& name
&& strcmp(bgp
->name
, name
) == 0)))
3109 /* Lookup BGP structure by view name. */
3110 struct bgp
*bgp_lookup_by_name(const char *name
)
3113 struct listnode
*node
, *nnode
;
3115 for (ALL_LIST_ELEMENTS(bm
->bgp
, node
, nnode
, bgp
))
3116 if ((bgp
->name
== NULL
&& name
== NULL
)
3117 || (bgp
->name
&& name
&& strcmp(bgp
->name
, name
) == 0))
3122 /* Lookup BGP instance based on VRF id. */
3123 /* Note: Only to be used for incoming messages from Zebra. */
3124 struct bgp
*bgp_lookup_by_vrf_id(vrf_id_t vrf_id
)
3128 /* Lookup VRF (in tree) and follow link. */
3129 vrf
= vrf_lookup_by_id(vrf_id
);
3132 return (vrf
->info
) ? (struct bgp
*)vrf
->info
: NULL
;
3135 /* Sets the BGP instance where EVPN is enabled */
3136 void bgp_set_evpn(struct bgp
*bgp
)
3138 if (bm
->bgp_evpn
== bgp
)
3141 /* First, release the reference count we hold on the instance */
3143 bgp_unlock(bm
->bgp_evpn
);
3147 /* Increase the reference count on this new VRF */
3149 bgp_lock(bm
->bgp_evpn
);
3152 /* Returns the BGP instance where EVPN is enabled, if any */
3153 struct bgp
*bgp_get_evpn(void)
3155 return bm
->bgp_evpn
;
3158 /* handle socket creation or deletion, if necessary
3159 * this is called for all new BGP instances
3161 int bgp_handle_socket(struct bgp
*bgp
, struct vrf
*vrf
, vrf_id_t old_vrf_id
,
3166 /* Create BGP server socket, if listen mode not disabled */
3167 if (!bgp
|| bgp_option_check(BGP_OPT_NO_LISTEN
))
3169 if (bgp
->inst_type
== BGP_INSTANCE_TYPE_VRF
) {
3171 * suppress vrf socket
3173 if (create
== false) {
3174 bgp_close_vrf_socket(bgp
);
3178 return BGP_ERR_INVALID_VALUE
;
3180 * if vrf_id did not change
3182 if (vrf
->vrf_id
== old_vrf_id
)
3184 if (old_vrf_id
!= VRF_UNKNOWN
) {
3185 /* look for old socket. close it. */
3186 bgp_close_vrf_socket(bgp
);
3188 /* if backend is not yet identified ( VRF_UNKNOWN) then
3189 * creation will be done later
3191 if (vrf
->vrf_id
== VRF_UNKNOWN
)
3193 ret
= bgp_socket(bgp
, bm
->port
, bm
->address
);
3195 return BGP_ERR_INVALID_VALUE
;
3198 return bgp_check_main_socket(create
, bgp
);
3201 /* Called from VTY commands. */
3202 int bgp_get(struct bgp
**bgp_val
, as_t
*as
, const char *name
,
3203 enum bgp_instance_type inst_type
)
3206 struct vrf
*vrf
= NULL
;
3208 /* Multiple instance check. */
3210 bgp
= bgp_lookup_by_name(name
);
3212 bgp
= bgp_get_default();
3214 /* Already exists. */
3216 if (bgp
->as
!= *as
) {
3218 return BGP_ERR_INSTANCE_MISMATCH
;
3220 if (bgp
->inst_type
!= inst_type
)
3221 return BGP_ERR_INSTANCE_MISMATCH
;
3226 bgp
= bgp_create(as
, name
, inst_type
);
3227 if (bgp_option_check(BGP_OPT_NO_ZEBRA
) && name
)
3228 bgp
->vrf_id
= vrf_generate_id();
3229 bgp_router_id_set(bgp
, &bgp
->router_id_zebra
, true);
3230 bgp_address_init(bgp
);
3231 bgp_tip_hash_init(bgp
);
3235 bgp
->t_rmap_def_originate_eval
= NULL
;
3237 /* If Default instance or VRF, link to the VRF structure, if present. */
3238 if (bgp
->inst_type
== BGP_INSTANCE_TYPE_DEFAULT
3239 || bgp
->inst_type
== BGP_INSTANCE_TYPE_VRF
) {
3240 vrf
= bgp_vrf_lookup_by_instance_type(bgp
);
3242 bgp_vrf_link(bgp
, vrf
);
3244 /* BGP server socket already processed if BGP instance
3245 * already part of the list
3247 bgp_handle_socket(bgp
, vrf
, VRF_UNKNOWN
, true);
3248 listnode_add(bm
->bgp
, bgp
);
3250 if (IS_BGP_INST_KNOWN_TO_ZEBRA(bgp
)) {
3251 if (BGP_DEBUG(zebra
, ZEBRA
))
3252 zlog_debug("%s: Registering BGP instance %s to zebra",
3253 __PRETTY_FUNCTION__
, name
);
3254 bgp_zebra_instance_register(bgp
);
3261 * Make BGP instance "up". Applies only to VRFs (non-default) and
3262 * implies the VRF has been learnt from Zebra.
3264 void bgp_instance_up(struct bgp
*bgp
)
3267 struct listnode
*node
, *next
;
3269 /* Register with zebra. */
3270 bgp_zebra_instance_register(bgp
);
3272 /* Kick off any peers that may have been configured. */
3273 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, next
, peer
)) {
3274 if (!BGP_PEER_START_SUPPRESSED(peer
))
3275 BGP_EVENT_ADD(peer
, BGP_Start
);
3278 /* Process any networks that have been configured. */
3279 bgp_static_add(bgp
);
3283 * Make BGP instance "down". Applies only to VRFs (non-default) and
3284 * implies the VRF has been deleted by Zebra.
3286 void bgp_instance_down(struct bgp
*bgp
)
3289 struct listnode
*node
;
3290 struct listnode
*next
;
3293 if (bgp
->t_rmap_def_originate_eval
) {
3294 BGP_TIMER_OFF(bgp
->t_rmap_def_originate_eval
);
3295 bgp_unlock(bgp
); /* TODO - This timer is started with a lock -
3299 /* Bring down peers, so corresponding routes are purged. */
3300 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, next
, peer
)) {
3301 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
3302 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
3303 BGP_NOTIFY_CEASE_ADMIN_SHUTDOWN
);
3305 bgp_session_reset(peer
);
3308 /* Purge network and redistributed routes. */
3309 bgp_purge_static_redist_routes(bgp
);
3311 /* Cleanup registered nexthops (flags) */
3312 bgp_cleanup_nexthops(bgp
);
3315 /* Delete BGP instance. */
3316 int bgp_delete(struct bgp
*bgp
)
3319 struct peer_group
*group
;
3320 struct listnode
*node
, *next
;
3327 hook_call(bgp_inst_delete
, bgp
);
3329 THREAD_OFF(bgp
->t_startup
);
3330 THREAD_OFF(bgp
->t_maxmed_onstartup
);
3331 THREAD_OFF(bgp
->t_update_delay
);
3332 THREAD_OFF(bgp
->t_establish_wait
);
3334 /* Set flag indicating bgp instance delete in progress */
3335 bgp_flag_set(bgp
, BGP_FLAG_DELETE_IN_PROGRESS
);
3337 if (BGP_DEBUG(zebra
, ZEBRA
)) {
3338 if (bgp
->inst_type
== BGP_INSTANCE_TYPE_DEFAULT
)
3339 zlog_debug("Deleting Default VRF");
3341 zlog_debug("Deleting %s %s",
3342 (bgp
->inst_type
== BGP_INSTANCE_TYPE_VRF
)
3348 /* unmap from RT list */
3349 bgp_evpn_vrf_delete(bgp
);
3351 /* unmap bgp vrf label */
3352 vpn_leak_zebra_vrf_label_withdraw(bgp
, AFI_IP
);
3353 vpn_leak_zebra_vrf_label_withdraw(bgp
, AFI_IP6
);
3356 if (bgp
->t_rmap_def_originate_eval
) {
3357 BGP_TIMER_OFF(bgp
->t_rmap_def_originate_eval
);
3358 bgp_unlock(bgp
); /* TODO - This timer is started with a lock -
3362 /* Inform peers we're going down. */
3363 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, next
, peer
)) {
3364 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
3365 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
3366 BGP_NOTIFY_CEASE_ADMIN_SHUTDOWN
);
3369 /* Delete static routes (networks). */
3370 bgp_static_delete(bgp
);
3372 /* Unset redistribution. */
3373 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++)
3374 for (i
= 0; i
< ZEBRA_ROUTE_MAX
; i
++)
3375 if (i
!= ZEBRA_ROUTE_BGP
)
3376 bgp_redistribute_unset(bgp
, afi
, i
, 0);
3378 /* Free peers and peer-groups. */
3379 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, next
, group
))
3380 peer_group_delete(group
);
3382 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, next
, peer
))
3385 if (bgp
->peer_self
) {
3386 peer_delete(bgp
->peer_self
);
3387 bgp
->peer_self
= NULL
;
3390 update_bgp_group_free(bgp
);
3392 /* TODO - Other memory may need to be freed - e.g., NHT */
3397 bgp_cleanup_routes(bgp
);
3399 for (afi
= 0; afi
< AFI_MAX
; ++afi
) {
3400 if (!bgp
->vpn_policy
[afi
].import_redirect_rtlist
)
3403 &bgp
->vpn_policy
[afi
]
3404 .import_redirect_rtlist
);
3405 bgp
->vpn_policy
[afi
].import_redirect_rtlist
= NULL
;
3408 /* Deregister from Zebra, if needed */
3409 if (IS_BGP_INST_KNOWN_TO_ZEBRA(bgp
)) {
3410 if (BGP_DEBUG(zebra
, ZEBRA
))
3411 zlog_debug("%s: deregistering this bgp %s instance from zebra",
3412 __PRETTY_FUNCTION__
, bgp
->name
);
3413 bgp_zebra_instance_deregister(bgp
);
3416 /* Remove visibility via the master list - there may however still be
3417 * routes to be processed still referencing the struct bgp.
3419 listnode_delete(bm
->bgp
, bgp
);
3421 /* Free interfaces in this instance. */
3424 vrf
= bgp_vrf_lookup_by_instance_type(bgp
);
3425 bgp_handle_socket(bgp
, vrf
, VRF_UNKNOWN
, false);
3427 bgp_vrf_unlink(bgp
, vrf
);
3429 /* Update EVPN VRF pointer */
3430 if (bm
->bgp_evpn
== bgp
) {
3431 if (bgp
->inst_type
== BGP_INSTANCE_TYPE_DEFAULT
)
3434 bgp_set_evpn(bgp_get_default());
3437 thread_master_free_unused(bm
->master
);
3438 bgp_unlock(bgp
); /* initial reference */
3443 void bgp_free(struct bgp
*bgp
)
3447 struct bgp_table
*table
;
3448 struct bgp_node
*rn
;
3449 struct bgp_rmap
*rmap
;
3453 list_delete(&bgp
->group
);
3454 list_delete(&bgp
->peer
);
3456 if (bgp
->peerhash
) {
3457 hash_free(bgp
->peerhash
);
3458 bgp
->peerhash
= NULL
;
3461 FOREACH_AFI_SAFI (afi
, safi
) {
3462 /* Special handling for 2-level routing tables. */
3463 if (safi
== SAFI_MPLS_VPN
|| safi
== SAFI_ENCAP
3464 || safi
== SAFI_EVPN
) {
3465 for (rn
= bgp_table_top(bgp
->rib
[afi
][safi
]); rn
;
3466 rn
= bgp_route_next(rn
)) {
3467 table
= bgp_node_get_bgp_table_info(rn
);
3468 bgp_table_finish(&table
);
3471 if (bgp
->route
[afi
][safi
])
3472 bgp_table_finish(&bgp
->route
[afi
][safi
]);
3473 if (bgp
->aggregate
[afi
][safi
])
3474 bgp_table_finish(&bgp
->aggregate
[afi
][safi
]);
3475 if (bgp
->rib
[afi
][safi
])
3476 bgp_table_finish(&bgp
->rib
[afi
][safi
]);
3477 rmap
= &bgp
->table_map
[afi
][safi
];
3478 XFREE(MTYPE_ROUTE_MAP_NAME
, rmap
->name
);
3481 bgp_scan_finish(bgp
);
3482 bgp_address_destroy(bgp
);
3483 bgp_tip_hash_destroy(bgp
);
3485 /* release the auto RD id */
3486 bf_release_index(bm
->rd_idspace
, bgp
->vrf_rd_id
);
3488 bgp_evpn_cleanup(bgp
);
3489 bgp_pbr_cleanup(bgp
);
3490 XFREE(MTYPE_BGP_EVPN_INFO
, bgp
->evpn_info
);
3492 for (afi
= AFI_IP
; afi
< AFI_MAX
; afi
++) {
3493 vpn_policy_direction_t dir
;
3495 if (bgp
->vpn_policy
[afi
].import_vrf
)
3496 list_delete(&bgp
->vpn_policy
[afi
].import_vrf
);
3497 if (bgp
->vpn_policy
[afi
].export_vrf
)
3498 list_delete(&bgp
->vpn_policy
[afi
].export_vrf
);
3500 dir
= BGP_VPN_POLICY_DIR_FROMVPN
;
3501 if (bgp
->vpn_policy
[afi
].rtlist
[dir
])
3502 ecommunity_free(&bgp
->vpn_policy
[afi
].rtlist
[dir
]);
3503 dir
= BGP_VPN_POLICY_DIR_TOVPN
;
3504 if (bgp
->vpn_policy
[afi
].rtlist
[dir
])
3505 ecommunity_free(&bgp
->vpn_policy
[afi
].rtlist
[dir
]);
3508 XFREE(MTYPE_BGP
, bgp
->name
);
3509 XFREE(MTYPE_BGP
, bgp
->name_pretty
);
3511 XFREE(MTYPE_BGP
, bgp
);
3514 struct peer
*peer_lookup_by_conf_if(struct bgp
*bgp
, const char *conf_if
)
3517 struct listnode
*node
, *nnode
;
3523 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
))
3524 if (peer
->conf_if
&& !strcmp(peer
->conf_if
, conf_if
)
3525 && !CHECK_FLAG(peer
->sflags
,
3526 PEER_STATUS_ACCEPT_PEER
))
3528 } else if (bm
->bgp
!= NULL
) {
3529 struct listnode
*bgpnode
, *nbgpnode
;
3531 for (ALL_LIST_ELEMENTS(bm
->bgp
, bgpnode
, nbgpnode
, bgp
))
3532 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
))
3534 && !strcmp(peer
->conf_if
, conf_if
)
3535 && !CHECK_FLAG(peer
->sflags
,
3536 PEER_STATUS_ACCEPT_PEER
))
3542 struct peer
*peer_lookup_by_hostname(struct bgp
*bgp
, const char *hostname
)
3545 struct listnode
*node
, *nnode
;
3551 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
))
3552 if (peer
->hostname
&& !strcmp(peer
->hostname
, hostname
)
3553 && !CHECK_FLAG(peer
->sflags
,
3554 PEER_STATUS_ACCEPT_PEER
))
3556 } else if (bm
->bgp
!= NULL
) {
3557 struct listnode
*bgpnode
, *nbgpnode
;
3559 for (ALL_LIST_ELEMENTS(bm
->bgp
, bgpnode
, nbgpnode
, bgp
))
3560 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
))
3562 && !strcmp(peer
->hostname
, hostname
)
3563 && !CHECK_FLAG(peer
->sflags
,
3564 PEER_STATUS_ACCEPT_PEER
))
3570 struct peer
*peer_lookup(struct bgp
*bgp
, union sockunion
*su
)
3572 struct peer
*peer
= NULL
;
3573 struct peer tmp_peer
;
3575 memset(&tmp_peer
, 0, sizeof(struct peer
));
3578 * We do not want to find the doppelganger peer so search for the peer
3580 * the hash that has PEER_FLAG_CONFIG_NODE
3582 SET_FLAG(tmp_peer
.flags
, PEER_FLAG_CONFIG_NODE
);
3587 peer
= hash_lookup(bgp
->peerhash
, &tmp_peer
);
3588 } else if (bm
->bgp
!= NULL
) {
3589 struct listnode
*bgpnode
, *nbgpnode
;
3591 for (ALL_LIST_ELEMENTS(bm
->bgp
, bgpnode
, nbgpnode
, bgp
)) {
3592 peer
= hash_lookup(bgp
->peerhash
, &tmp_peer
);
3601 struct peer
*peer_create_bind_dynamic_neighbor(struct bgp
*bgp
,
3602 union sockunion
*su
,
3603 struct peer_group
*group
)
3609 /* Create peer first; we've already checked group config is valid. */
3610 peer
= peer_create(su
, NULL
, bgp
, bgp
->as
, group
->conf
->as
,
3611 group
->conf
->as_type
, 0, 0, group
);
3616 peer
= peer_lock(peer
);
3617 listnode_add(group
->peer
, peer
);
3619 peer_group2peer_config_copy(group
, peer
);
3622 * Bind peer for all AFs configured for the group. We don't call
3623 * peer_group_bind as that is sub-optimal and does some stuff we don't
3626 FOREACH_AFI_SAFI (afi
, safi
) {
3627 if (!group
->conf
->afc
[afi
][safi
])
3629 peer
->afc
[afi
][safi
] = 1;
3631 if (!peer_af_find(peer
, afi
, safi
))
3632 peer_af_create(peer
, afi
, safi
);
3634 peer_group2peer_config_copy_af(group
, peer
, afi
, safi
);
3637 /* Mark as dynamic, but also as a "config node" for other things to
3639 SET_FLAG(peer
->flags
, PEER_FLAG_DYNAMIC_NEIGHBOR
);
3640 SET_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
);
3646 peer_group_lookup_dynamic_neighbor_range(struct peer_group
*group
,
3647 struct prefix
*prefix
)
3649 struct listnode
*node
, *nnode
;
3650 struct prefix
*range
;
3653 afi
= family2afi(prefix
->family
);
3655 if (group
->listen_range
[afi
])
3656 for (ALL_LIST_ELEMENTS(group
->listen_range
[afi
], node
, nnode
,
3658 if (prefix_match(range
, prefix
))
3665 peer_group_lookup_dynamic_neighbor(struct bgp
*bgp
, struct prefix
*prefix
,
3666 struct prefix
**listen_range
)
3668 struct prefix
*range
= NULL
;
3669 struct peer_group
*group
= NULL
;
3670 struct listnode
*node
, *nnode
;
3672 *listen_range
= NULL
;
3674 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, nnode
, group
))
3675 if ((range
= peer_group_lookup_dynamic_neighbor_range(
3678 } else if (bm
->bgp
!= NULL
) {
3679 struct listnode
*bgpnode
, *nbgpnode
;
3681 for (ALL_LIST_ELEMENTS(bm
->bgp
, bgpnode
, nbgpnode
, bgp
))
3682 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, nnode
, group
))
3683 if ((range
= peer_group_lookup_dynamic_neighbor_range(
3689 *listen_range
= range
;
3690 return (group
&& range
) ? group
: NULL
;
3693 struct peer
*peer_lookup_dynamic_neighbor(struct bgp
*bgp
, union sockunion
*su
)
3695 struct peer_group
*group
;
3698 struct prefix prefix
;
3699 struct prefix
*listen_range
;
3701 char buf
[PREFIX2STR_BUFFER
];
3702 char buf1
[PREFIX2STR_BUFFER
];
3704 sockunion2hostprefix(su
, &prefix
);
3706 /* See if incoming connection matches a configured listen range. */
3707 group
= peer_group_lookup_dynamic_neighbor(bgp
, &prefix
, &listen_range
);
3718 prefix2str(&prefix
, buf
, sizeof(buf
));
3719 prefix2str(listen_range
, buf1
, sizeof(buf1
));
3721 if (bgp_debug_neighbor_events(NULL
))
3723 "Dynamic Neighbor %s matches group %s listen range %s",
3724 buf
, group
->name
, buf1
);
3726 /* Are we within the listen limit? */
3727 dncount
= gbgp
->dynamic_neighbors_count
;
3729 if (dncount
>= gbgp
->dynamic_neighbors_limit
) {
3730 if (bgp_debug_neighbor_events(NULL
))
3731 zlog_debug("Dynamic Neighbor %s rejected - at limit %d",
3732 inet_sutop(su
, buf
),
3733 gbgp
->dynamic_neighbors_limit
);
3737 /* Ensure group is not disabled. */
3738 if (CHECK_FLAG(group
->conf
->flags
, PEER_FLAG_SHUTDOWN
)) {
3739 if (bgp_debug_neighbor_events(NULL
))
3741 "Dynamic Neighbor %s rejected - group %s disabled",
3746 /* Check that at least one AF is activated for the group. */
3747 if (!peer_group_af_configured(group
)) {
3748 if (bgp_debug_neighbor_events(NULL
))
3750 "Dynamic Neighbor %s rejected - no AF activated for group %s",
3755 /* Create dynamic peer and bind to associated group. */
3756 peer
= peer_create_bind_dynamic_neighbor(gbgp
, su
, group
);
3759 gbgp
->dynamic_neighbors_count
= ++dncount
;
3761 if (bgp_debug_neighbor_events(peer
))
3762 zlog_debug("%s Dynamic Neighbor added, group %s count %d",
3763 peer
->host
, group
->name
, dncount
);
3768 static void peer_drop_dynamic_neighbor(struct peer
*peer
)
3771 if (peer
->group
->bgp
) {
3772 dncount
= peer
->group
->bgp
->dynamic_neighbors_count
;
3774 peer
->group
->bgp
->dynamic_neighbors_count
= --dncount
;
3776 if (bgp_debug_neighbor_events(peer
))
3777 zlog_debug("%s dropped from group %s, count %d", peer
->host
,
3778 peer
->group
->name
, dncount
);
3781 /* If peer is configured at least one address family return 1. */
3782 int peer_active(struct peer
*peer
)
3784 if (BGP_PEER_SU_UNSPEC(peer
))
3786 if (peer
->afc
[AFI_IP
][SAFI_UNICAST
] || peer
->afc
[AFI_IP
][SAFI_MULTICAST
]
3787 || peer
->afc
[AFI_IP
][SAFI_LABELED_UNICAST
]
3788 || peer
->afc
[AFI_IP
][SAFI_MPLS_VPN
] || peer
->afc
[AFI_IP
][SAFI_ENCAP
]
3789 || peer
->afc
[AFI_IP
][SAFI_FLOWSPEC
]
3790 || peer
->afc
[AFI_IP6
][SAFI_UNICAST
]
3791 || peer
->afc
[AFI_IP6
][SAFI_MULTICAST
]
3792 || peer
->afc
[AFI_IP6
][SAFI_LABELED_UNICAST
]
3793 || peer
->afc
[AFI_IP6
][SAFI_MPLS_VPN
]
3794 || peer
->afc
[AFI_IP6
][SAFI_ENCAP
]
3795 || peer
->afc
[AFI_IP6
][SAFI_FLOWSPEC
]
3796 || peer
->afc
[AFI_L2VPN
][SAFI_EVPN
])
3801 /* If peer is negotiated at least one address family return 1. */
3802 int peer_active_nego(struct peer
*peer
)
3804 if (peer
->afc_nego
[AFI_IP
][SAFI_UNICAST
]
3805 || peer
->afc_nego
[AFI_IP
][SAFI_MULTICAST
]
3806 || peer
->afc_nego
[AFI_IP
][SAFI_LABELED_UNICAST
]
3807 || peer
->afc_nego
[AFI_IP
][SAFI_MPLS_VPN
]
3808 || peer
->afc_nego
[AFI_IP
][SAFI_ENCAP
]
3809 || peer
->afc_nego
[AFI_IP
][SAFI_FLOWSPEC
]
3810 || peer
->afc_nego
[AFI_IP6
][SAFI_UNICAST
]
3811 || peer
->afc_nego
[AFI_IP6
][SAFI_MULTICAST
]
3812 || peer
->afc_nego
[AFI_IP6
][SAFI_LABELED_UNICAST
]
3813 || peer
->afc_nego
[AFI_IP6
][SAFI_MPLS_VPN
]
3814 || peer
->afc_nego
[AFI_IP6
][SAFI_ENCAP
]
3815 || peer
->afc_nego
[AFI_IP6
][SAFI_FLOWSPEC
]
3816 || peer
->afc_nego
[AFI_L2VPN
][SAFI_EVPN
])
3821 void peer_change_action(struct peer
*peer
, afi_t afi
, safi_t safi
,
3822 enum peer_change_type type
)
3824 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
3827 if (peer
->status
!= Established
)
3830 if (type
== peer_change_reset
) {
3831 /* If we're resetting session, we've to delete both peer struct
3833 if ((peer
->doppelganger
)
3834 && (peer
->doppelganger
->status
!= Deleted
)
3835 && (!CHECK_FLAG(peer
->doppelganger
->flags
,
3836 PEER_FLAG_CONFIG_NODE
)))
3837 peer_delete(peer
->doppelganger
);
3839 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
3840 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
3841 } else if (type
== peer_change_reset_in
) {
3842 if (CHECK_FLAG(peer
->cap
, PEER_CAP_REFRESH_OLD_RCV
)
3843 || CHECK_FLAG(peer
->cap
, PEER_CAP_REFRESH_NEW_RCV
))
3844 bgp_route_refresh_send(peer
, afi
, safi
, 0, 0, 0);
3846 if ((peer
->doppelganger
)
3847 && (peer
->doppelganger
->status
!= Deleted
)
3848 && (!CHECK_FLAG(peer
->doppelganger
->flags
,
3849 PEER_FLAG_CONFIG_NODE
)))
3850 peer_delete(peer
->doppelganger
);
3852 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
3853 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
3855 } else if (type
== peer_change_reset_out
) {
3856 update_group_adjust_peer(peer_af_find(peer
, afi
, safi
));
3857 bgp_announce_route(peer
, afi
, safi
);
3861 struct peer_flag_action
{
3865 /* This flag can be set for peer-group member. */
3866 uint8_t not_for_member
;
3868 /* Action when the flag is changed. */
3869 enum peer_change_type type
;
3872 static const struct peer_flag_action peer_flag_action_list
[] = {
3873 {PEER_FLAG_PASSIVE
, 0, peer_change_reset
},
3874 {PEER_FLAG_SHUTDOWN
, 0, peer_change_reset
},
3875 {PEER_FLAG_DONT_CAPABILITY
, 0, peer_change_none
},
3876 {PEER_FLAG_OVERRIDE_CAPABILITY
, 0, peer_change_none
},
3877 {PEER_FLAG_STRICT_CAP_MATCH
, 0, peer_change_none
},
3878 {PEER_FLAG_DYNAMIC_CAPABILITY
, 0, peer_change_reset
},
3879 {PEER_FLAG_DISABLE_CONNECTED_CHECK
, 0, peer_change_reset
},
3880 {PEER_FLAG_CAPABILITY_ENHE
, 0, peer_change_reset
},
3881 {PEER_FLAG_ENFORCE_FIRST_AS
, 0, peer_change_reset_in
},
3882 {PEER_FLAG_IFPEER_V6ONLY
, 0, peer_change_reset
},
3883 {PEER_FLAG_ROUTEADV
, 0, peer_change_none
},
3884 {PEER_FLAG_TIMER
, 0, peer_change_none
},
3885 {PEER_FLAG_TIMER_CONNECT
, 0, peer_change_none
},
3886 {PEER_FLAG_PASSWORD
, 0, peer_change_none
},
3887 {PEER_FLAG_LOCAL_AS
, 0, peer_change_none
},
3888 {PEER_FLAG_LOCAL_AS_NO_PREPEND
, 0, peer_change_none
},
3889 {PEER_FLAG_LOCAL_AS_REPLACE_AS
, 0, peer_change_none
},
3890 {PEER_FLAG_UPDATE_SOURCE
, 0, peer_change_none
},
3893 static const struct peer_flag_action peer_af_flag_action_list
[] = {
3894 {PEER_FLAG_SEND_COMMUNITY
, 1, peer_change_reset_out
},
3895 {PEER_FLAG_SEND_EXT_COMMUNITY
, 1, peer_change_reset_out
},
3896 {PEER_FLAG_SEND_LARGE_COMMUNITY
, 1, peer_change_reset_out
},
3897 {PEER_FLAG_NEXTHOP_SELF
, 1, peer_change_reset_out
},
3898 {PEER_FLAG_REFLECTOR_CLIENT
, 1, peer_change_reset
},
3899 {PEER_FLAG_RSERVER_CLIENT
, 1, peer_change_reset
},
3900 {PEER_FLAG_SOFT_RECONFIG
, 0, peer_change_reset_in
},
3901 {PEER_FLAG_AS_PATH_UNCHANGED
, 1, peer_change_reset_out
},
3902 {PEER_FLAG_NEXTHOP_UNCHANGED
, 1, peer_change_reset_out
},
3903 {PEER_FLAG_MED_UNCHANGED
, 1, peer_change_reset_out
},
3904 {PEER_FLAG_DEFAULT_ORIGINATE
, 0, peer_change_none
},
3905 {PEER_FLAG_REMOVE_PRIVATE_AS
, 1, peer_change_reset_out
},
3906 {PEER_FLAG_ALLOWAS_IN
, 0, peer_change_reset_in
},
3907 {PEER_FLAG_ALLOWAS_IN_ORIGIN
, 0, peer_change_reset_in
},
3908 {PEER_FLAG_ORF_PREFIX_SM
, 1, peer_change_reset
},
3909 {PEER_FLAG_ORF_PREFIX_RM
, 1, peer_change_reset
},
3910 {PEER_FLAG_MAX_PREFIX
, 0, peer_change_none
},
3911 {PEER_FLAG_MAX_PREFIX_WARNING
, 0, peer_change_none
},
3912 {PEER_FLAG_NEXTHOP_LOCAL_UNCHANGED
, 0, peer_change_reset_out
},
3913 {PEER_FLAG_FORCE_NEXTHOP_SELF
, 1, peer_change_reset_out
},
3914 {PEER_FLAG_REMOVE_PRIVATE_AS_ALL
, 1, peer_change_reset_out
},
3915 {PEER_FLAG_REMOVE_PRIVATE_AS_REPLACE
, 1, peer_change_reset_out
},
3916 {PEER_FLAG_AS_OVERRIDE
, 1, peer_change_reset_out
},
3917 {PEER_FLAG_REMOVE_PRIVATE_AS_ALL_REPLACE
, 1, peer_change_reset_out
},
3918 {PEER_FLAG_WEIGHT
, 0, peer_change_reset_in
},
3921 /* Proper action set. */
3922 static int peer_flag_action_set(const struct peer_flag_action
*action_list
,
3923 int size
, struct peer_flag_action
*action
,
3930 const struct peer_flag_action
*match
= NULL
;
3932 /* Check peer's frag action. */
3933 for (i
= 0; i
< size
; i
++) {
3934 match
= &action_list
[i
];
3936 if (match
->flag
== 0)
3939 if (match
->flag
& flag
) {
3942 if (match
->type
== peer_change_reset_in
)
3944 if (match
->type
== peer_change_reset_out
)
3946 if (match
->type
== peer_change_reset
) {
3950 if (match
->not_for_member
)
3951 action
->not_for_member
= 1;
3955 /* Set peer clear type. */
3956 if (reset_in
&& reset_out
)
3957 action
->type
= peer_change_reset
;
3959 action
->type
= peer_change_reset_in
;
3961 action
->type
= peer_change_reset_out
;
3963 action
->type
= peer_change_none
;
3968 static void peer_flag_modify_action(struct peer
*peer
, uint32_t flag
)
3970 if (flag
== PEER_FLAG_SHUTDOWN
) {
3971 if (CHECK_FLAG(peer
->flags
, flag
)) {
3972 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_NSF_WAIT
))
3973 peer_nsf_stop(peer
);
3975 UNSET_FLAG(peer
->sflags
, PEER_STATUS_PREFIX_OVERFLOW
);
3976 if (peer
->t_pmax_restart
) {
3977 BGP_TIMER_OFF(peer
->t_pmax_restart
);
3978 if (bgp_debug_neighbor_events(peer
))
3980 "%s Maximum-prefix restart timer canceled",
3984 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_NSF_WAIT
))
3985 peer_nsf_stop(peer
);
3987 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
3988 char *msg
= peer
->tx_shutdown_message
;
3991 if (!msg
&& peer_group_active(peer
))
3992 msg
= peer
->group
->conf
3993 ->tx_shutdown_message
;
3994 msglen
= msg
? strlen(msg
) : 0;
3999 uint8_t msgbuf
[129];
4002 memcpy(msgbuf
+ 1, msg
, msglen
);
4004 bgp_notify_send_with_data(
4005 peer
, BGP_NOTIFY_CEASE
,
4006 BGP_NOTIFY_CEASE_ADMIN_SHUTDOWN
,
4007 msgbuf
, msglen
+ 1);
4010 peer
, BGP_NOTIFY_CEASE
,
4011 BGP_NOTIFY_CEASE_ADMIN_SHUTDOWN
);
4013 bgp_session_reset(peer
);
4015 peer
->v_start
= BGP_INIT_START_TIMER
;
4016 BGP_EVENT_ADD(peer
, BGP_Stop
);
4018 } else if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
4019 if (flag
== PEER_FLAG_DYNAMIC_CAPABILITY
)
4020 peer
->last_reset
= PEER_DOWN_CAPABILITY_CHANGE
;
4021 else if (flag
== PEER_FLAG_PASSIVE
)
4022 peer
->last_reset
= PEER_DOWN_PASSIVE_CHANGE
;
4023 else if (flag
== PEER_FLAG_DISABLE_CONNECTED_CHECK
)
4024 peer
->last_reset
= PEER_DOWN_MULTIHOP_CHANGE
;
4026 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
4027 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4029 bgp_session_reset(peer
);
4032 /* Change specified peer flag. */
4033 static int peer_flag_modify(struct peer
*peer
, uint32_t flag
, int set
)
4037 bool invert
, member_invert
;
4038 struct peer
*member
;
4039 struct listnode
*node
, *nnode
;
4040 struct peer_flag_action action
;
4042 memset(&action
, 0, sizeof(struct peer_flag_action
));
4043 size
= sizeof peer_flag_action_list
/ sizeof(struct peer_flag_action
);
4045 invert
= CHECK_FLAG(peer
->flags_invert
, flag
);
4046 found
= peer_flag_action_set(peer_flag_action_list
, size
, &action
,
4049 /* Abort if no flag action exists. */
4051 return BGP_ERR_INVALID_FLAG
;
4053 /* Check for flag conflict: STRICT_CAP_MATCH && OVERRIDE_CAPABILITY */
4054 if (set
&& CHECK_FLAG(peer
->flags
| flag
, PEER_FLAG_STRICT_CAP_MATCH
)
4055 && CHECK_FLAG(peer
->flags
| flag
, PEER_FLAG_OVERRIDE_CAPABILITY
))
4056 return BGP_ERR_PEER_FLAG_CONFLICT
;
4058 /* Handle flag updates where desired state matches current state. */
4059 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4060 if (set
&& CHECK_FLAG(peer
->flags
, flag
)) {
4061 COND_FLAG(peer
->flags_override
, flag
, !invert
);
4065 if (!set
&& !CHECK_FLAG(peer
->flags
, flag
)) {
4066 COND_FLAG(peer
->flags_override
, flag
, invert
);
4071 /* Inherit from peer-group or set/unset flags accordingly. */
4072 if (peer_group_active(peer
) && set
== invert
)
4073 peer_flag_inherit(peer
, flag
);
4075 COND_FLAG(peer
->flags
, flag
, set
);
4077 /* Check if handling a regular peer. */
4078 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4079 /* Update flag override state accordingly. */
4080 COND_FLAG(peer
->flags_override
, flag
, set
!= invert
);
4082 /* Execute flag action on peer. */
4083 if (action
.type
== peer_change_reset
)
4084 peer_flag_modify_action(peer
, flag
);
4086 /* Skip peer-group mechanics for regular peers. */
4090 if (set
&& flag
== PEER_FLAG_CAPABILITY_ENHE
)
4091 bgp_nht_register_enhe_capability_interfaces(peer
);
4094 * Update peer-group members, unless they are explicitely overriding
4095 * peer-group configuration.
4097 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4098 /* Skip peers with overridden configuration. */
4099 if (CHECK_FLAG(member
->flags_override
, flag
))
4102 /* Check if only member without group is inverted. */
4104 CHECK_FLAG(member
->flags_invert
, flag
) && !invert
;
4106 /* Skip peers with equivalent configuration. */
4107 if (set
!= member_invert
&& CHECK_FLAG(member
->flags
, flag
))
4110 if (set
== member_invert
&& !CHECK_FLAG(member
->flags
, flag
))
4113 /* Update flag on peer-group member. */
4114 COND_FLAG(member
->flags
, flag
, set
!= member_invert
);
4116 if (set
&& flag
== PEER_FLAG_CAPABILITY_ENHE
)
4117 bgp_nht_register_enhe_capability_interfaces(member
);
4119 /* Execute flag action on peer-group member. */
4120 if (action
.type
== peer_change_reset
)
4121 peer_flag_modify_action(member
, flag
);
4127 int peer_flag_set(struct peer
*peer
, uint32_t flag
)
4129 return peer_flag_modify(peer
, flag
, 1);
4132 int peer_flag_unset(struct peer
*peer
, uint32_t flag
)
4134 return peer_flag_modify(peer
, flag
, 0);
4137 static int peer_af_flag_modify(struct peer
*peer
, afi_t afi
, safi_t safi
,
4138 uint32_t flag
, bool set
)
4142 bool invert
, member_invert
;
4143 struct peer
*member
;
4144 struct listnode
*node
, *nnode
;
4145 struct peer_flag_action action
;
4147 memset(&action
, 0, sizeof(struct peer_flag_action
));
4148 size
= sizeof peer_af_flag_action_list
4149 / sizeof(struct peer_flag_action
);
4151 invert
= CHECK_FLAG(peer
->af_flags_invert
[afi
][safi
], flag
);
4152 found
= peer_flag_action_set(peer_af_flag_action_list
, size
, &action
,
4155 /* Abort if flag action exists. */
4157 return BGP_ERR_INVALID_FLAG
;
4159 /* Special check for reflector client. */
4160 if (flag
& PEER_FLAG_REFLECTOR_CLIENT
4161 && peer_sort(peer
) != BGP_PEER_IBGP
)
4162 return BGP_ERR_NOT_INTERNAL_PEER
;
4164 /* Special check for remove-private-AS. */
4165 if (flag
& PEER_FLAG_REMOVE_PRIVATE_AS
4166 && peer_sort(peer
) == BGP_PEER_IBGP
)
4167 return BGP_ERR_REMOVE_PRIVATE_AS
;
4169 /* as-override is not allowed for IBGP peers */
4170 if (flag
& PEER_FLAG_AS_OVERRIDE
&& peer_sort(peer
) == BGP_PEER_IBGP
)
4171 return BGP_ERR_AS_OVERRIDE
;
4173 /* Handle flag updates where desired state matches current state. */
4174 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4175 if (set
&& CHECK_FLAG(peer
->af_flags
[afi
][safi
], flag
)) {
4176 COND_FLAG(peer
->af_flags_override
[afi
][safi
], flag
,
4181 if (!set
&& !CHECK_FLAG(peer
->af_flags
[afi
][safi
], flag
)) {
4182 COND_FLAG(peer
->af_flags_override
[afi
][safi
], flag
,
4189 * For EVPN we implicitly set the NEXTHOP_UNCHANGED flag,
4190 * if we are setting/unsetting flags which conflict with this flag
4191 * handle accordingly
4193 if (afi
== AFI_L2VPN
&& safi
== SAFI_EVPN
) {
4197 * if we are setting NEXTHOP_SELF, we need to unset the
4198 * NEXTHOP_UNCHANGED flag
4200 if (CHECK_FLAG(flag
, PEER_FLAG_NEXTHOP_SELF
) ||
4201 CHECK_FLAG(flag
, PEER_FLAG_FORCE_NEXTHOP_SELF
))
4202 UNSET_FLAG(peer
->af_flags
[afi
][safi
],
4203 PEER_FLAG_NEXTHOP_UNCHANGED
);
4207 * if we are unsetting NEXTHOP_SELF, we need to set the
4208 * NEXTHOP_UNCHANGED flag to reset the defaults for EVPN
4210 if (CHECK_FLAG(flag
, PEER_FLAG_NEXTHOP_SELF
) ||
4211 CHECK_FLAG(flag
, PEER_FLAG_FORCE_NEXTHOP_SELF
))
4212 SET_FLAG(peer
->af_flags
[afi
][safi
],
4213 PEER_FLAG_NEXTHOP_UNCHANGED
);
4217 /* Inherit from peer-group or set/unset flags accordingly. */
4218 if (peer_group_active(peer
) && set
== invert
)
4219 peer_af_flag_inherit(peer
, afi
, safi
, flag
);
4221 COND_FLAG(peer
->af_flags
[afi
][safi
], flag
, set
);
4223 /* Execute action when peer is established. */
4224 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)
4225 && peer
->status
== Established
) {
4226 if (!set
&& flag
== PEER_FLAG_SOFT_RECONFIG
)
4227 bgp_clear_adj_in(peer
, afi
, safi
);
4229 if (flag
== PEER_FLAG_REFLECTOR_CLIENT
)
4230 peer
->last_reset
= PEER_DOWN_RR_CLIENT_CHANGE
;
4231 else if (flag
== PEER_FLAG_RSERVER_CLIENT
)
4232 peer
->last_reset
= PEER_DOWN_RS_CLIENT_CHANGE
;
4233 else if (flag
== PEER_FLAG_ORF_PREFIX_SM
)
4234 peer
->last_reset
= PEER_DOWN_CAPABILITY_CHANGE
;
4235 else if (flag
== PEER_FLAG_ORF_PREFIX_RM
)
4236 peer
->last_reset
= PEER_DOWN_CAPABILITY_CHANGE
;
4238 peer_change_action(peer
, afi
, safi
, action
.type
);
4242 /* Check if handling a regular peer. */
4243 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4244 COND_FLAG(peer
->af_flags_override
[afi
][safi
], flag
,
4248 * Update peer-group members, unless they are explicitely
4249 * overriding peer-group configuration.
4251 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
,
4253 /* Skip peers with overridden configuration. */
4254 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
4258 /* Check if only member without group is inverted. */
4260 CHECK_FLAG(member
->af_flags_invert
[afi
][safi
],
4264 /* Skip peers with equivalent configuration. */
4265 if (set
!= member_invert
4266 && CHECK_FLAG(member
->af_flags
[afi
][safi
], flag
))
4269 if (set
== member_invert
4270 && !CHECK_FLAG(member
->af_flags
[afi
][safi
], flag
))
4273 /* Update flag on peer-group member. */
4274 COND_FLAG(member
->af_flags
[afi
][safi
], flag
,
4275 set
!= member_invert
);
4277 /* Execute flag action on peer-group member. */
4278 if (member
->status
== Established
) {
4279 if (!set
&& flag
== PEER_FLAG_SOFT_RECONFIG
)
4280 bgp_clear_adj_in(member
, afi
, safi
);
4282 if (flag
== PEER_FLAG_REFLECTOR_CLIENT
)
4283 member
->last_reset
=
4284 PEER_DOWN_RR_CLIENT_CHANGE
;
4286 == PEER_FLAG_RSERVER_CLIENT
)
4287 member
->last_reset
=
4288 PEER_DOWN_RS_CLIENT_CHANGE
;
4290 == PEER_FLAG_ORF_PREFIX_SM
)
4291 member
->last_reset
=
4292 PEER_DOWN_CAPABILITY_CHANGE
;
4294 == PEER_FLAG_ORF_PREFIX_RM
)
4295 member
->last_reset
=
4296 PEER_DOWN_CAPABILITY_CHANGE
;
4298 peer_change_action(member
, afi
, safi
,
4308 int peer_af_flag_set(struct peer
*peer
, afi_t afi
, safi_t safi
, uint32_t flag
)
4310 return peer_af_flag_modify(peer
, afi
, safi
, flag
, 1);
4313 int peer_af_flag_unset(struct peer
*peer
, afi_t afi
, safi_t safi
, uint32_t flag
)
4315 return peer_af_flag_modify(peer
, afi
, safi
, flag
, 0);
4319 int peer_tx_shutdown_message_set(struct peer
*peer
, const char *msg
)
4321 XFREE(MTYPE_PEER_TX_SHUTDOWN_MSG
, peer
->tx_shutdown_message
);
4322 peer
->tx_shutdown_message
=
4323 msg
? XSTRDUP(MTYPE_PEER_TX_SHUTDOWN_MSG
, msg
) : NULL
;
4327 int peer_tx_shutdown_message_unset(struct peer
*peer
)
4329 XFREE(MTYPE_PEER_TX_SHUTDOWN_MSG
, peer
->tx_shutdown_message
);
4334 /* EBGP multihop configuration. */
4335 int peer_ebgp_multihop_set(struct peer
*peer
, int ttl
)
4337 struct peer_group
*group
;
4338 struct listnode
*node
, *nnode
;
4341 if (peer
->sort
== BGP_PEER_IBGP
|| peer
->conf_if
)
4344 /* see comment in peer_ttl_security_hops_set() */
4345 if (ttl
!= MAXTTL
) {
4346 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4347 group
= peer
->group
;
4348 if (group
->conf
->gtsm_hops
!= 0)
4349 return BGP_ERR_NO_EBGP_MULTIHOP_WITH_TTLHACK
;
4351 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
,
4353 if (peer1
->sort
== BGP_PEER_IBGP
)
4356 if (peer1
->gtsm_hops
!= 0)
4357 return BGP_ERR_NO_EBGP_MULTIHOP_WITH_TTLHACK
;
4360 if (peer
->gtsm_hops
!= 0)
4361 return BGP_ERR_NO_EBGP_MULTIHOP_WITH_TTLHACK
;
4367 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4368 if (peer
->fd
>= 0 && peer
->sort
!= BGP_PEER_IBGP
) {
4369 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
4370 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
4371 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4373 bgp_session_reset(peer
);
4376 group
= peer
->group
;
4377 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
4378 if (peer
->sort
== BGP_PEER_IBGP
)
4381 peer
->ttl
= group
->conf
->ttl
;
4383 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
4384 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
4385 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4387 bgp_session_reset(peer
);
4393 int peer_ebgp_multihop_unset(struct peer
*peer
)
4395 struct peer_group
*group
;
4396 struct listnode
*node
, *nnode
;
4398 if (peer
->sort
== BGP_PEER_IBGP
)
4401 if (peer
->gtsm_hops
!= 0 && peer
->ttl
!= MAXTTL
)
4402 return BGP_ERR_NO_EBGP_MULTIHOP_WITH_TTLHACK
;
4404 if (peer_group_active(peer
))
4405 peer
->ttl
= peer
->group
->conf
->ttl
;
4407 peer
->ttl
= BGP_DEFAULT_TTL
;
4409 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4410 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
4411 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
4412 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4414 bgp_session_reset(peer
);
4416 group
= peer
->group
;
4417 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
4418 if (peer
->sort
== BGP_PEER_IBGP
)
4421 peer
->ttl
= BGP_DEFAULT_TTL
;
4423 if (peer
->fd
>= 0) {
4424 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
4426 peer
, BGP_NOTIFY_CEASE
,
4427 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4429 bgp_session_reset(peer
);
4436 /* Neighbor description. */
4437 int peer_description_set(struct peer
*peer
, const char *desc
)
4439 XFREE(MTYPE_PEER_DESC
, peer
->desc
);
4441 peer
->desc
= XSTRDUP(MTYPE_PEER_DESC
, desc
);
4446 int peer_description_unset(struct peer
*peer
)
4448 XFREE(MTYPE_PEER_DESC
, peer
->desc
);
4455 /* Neighbor update-source. */
4456 int peer_update_source_if_set(struct peer
*peer
, const char *ifname
)
4458 struct peer
*member
;
4459 struct listnode
*node
, *nnode
;
4461 /* Set flag and configuration on peer. */
4462 peer_flag_set(peer
, PEER_FLAG_UPDATE_SOURCE
);
4463 if (peer
->update_if
) {
4464 if (strcmp(peer
->update_if
, ifname
) == 0)
4466 XFREE(MTYPE_PEER_UPDATE_SOURCE
, peer
->update_if
);
4468 peer
->update_if
= XSTRDUP(MTYPE_PEER_UPDATE_SOURCE
, ifname
);
4469 sockunion_free(peer
->update_source
);
4470 peer
->update_source
= NULL
;
4472 /* Check if handling a regular peer. */
4473 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4474 /* Send notification or reset peer depending on state. */
4475 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
4476 peer
->last_reset
= PEER_DOWN_UPDATE_SOURCE_CHANGE
;
4477 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
4478 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4480 bgp_session_reset(peer
);
4482 /* Skip peer-group mechanics for regular peers. */
4487 * Set flag and configuration on all peer-group members, unless they are
4488 * explicitely overriding peer-group configuration.
4490 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4491 /* Skip peers with overridden configuration. */
4492 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_UPDATE_SOURCE
))
4495 /* Skip peers with the same configuration. */
4496 if (member
->update_if
) {
4497 if (strcmp(member
->update_if
, ifname
) == 0)
4499 XFREE(MTYPE_PEER_UPDATE_SOURCE
, member
->update_if
);
4502 /* Set flag and configuration on peer-group member. */
4503 SET_FLAG(member
->flags
, PEER_FLAG_UPDATE_SOURCE
);
4504 member
->update_if
= XSTRDUP(MTYPE_PEER_UPDATE_SOURCE
, ifname
);
4505 sockunion_free(member
->update_source
);
4506 member
->update_source
= NULL
;
4508 /* Send notification or reset peer depending on state. */
4509 if (BGP_IS_VALID_STATE_FOR_NOTIF(member
->status
)) {
4510 member
->last_reset
= PEER_DOWN_UPDATE_SOURCE_CHANGE
;
4511 bgp_notify_send(member
, BGP_NOTIFY_CEASE
,
4512 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4514 bgp_session_reset(member
);
4520 int peer_update_source_addr_set(struct peer
*peer
, const union sockunion
*su
)
4522 struct peer
*member
;
4523 struct listnode
*node
, *nnode
;
4525 /* Set flag and configuration on peer. */
4526 peer_flag_set(peer
, PEER_FLAG_UPDATE_SOURCE
);
4527 if (peer
->update_source
) {
4528 if (sockunion_cmp(peer
->update_source
, su
) == 0)
4530 sockunion_free(peer
->update_source
);
4532 peer
->update_source
= sockunion_dup(su
);
4533 XFREE(MTYPE_PEER_UPDATE_SOURCE
, peer
->update_if
);
4535 /* Check if handling a regular peer. */
4536 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4537 /* Send notification or reset peer depending on state. */
4538 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
4539 peer
->last_reset
= PEER_DOWN_UPDATE_SOURCE_CHANGE
;
4540 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
4541 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4543 bgp_session_reset(peer
);
4545 /* Skip peer-group mechanics for regular peers. */
4550 * Set flag and configuration on all peer-group members, unless they are
4551 * explicitely overriding peer-group configuration.
4553 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4554 /* Skip peers with overridden configuration. */
4555 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_UPDATE_SOURCE
))
4558 /* Skip peers with the same configuration. */
4559 if (member
->update_source
) {
4560 if (sockunion_cmp(member
->update_source
, su
) == 0)
4562 sockunion_free(member
->update_source
);
4565 /* Set flag and configuration on peer-group member. */
4566 SET_FLAG(member
->flags
, PEER_FLAG_UPDATE_SOURCE
);
4567 member
->update_source
= sockunion_dup(su
);
4568 XFREE(MTYPE_PEER_UPDATE_SOURCE
, member
->update_if
);
4570 /* Send notification or reset peer depending on state. */
4571 if (BGP_IS_VALID_STATE_FOR_NOTIF(member
->status
)) {
4572 member
->last_reset
= PEER_DOWN_UPDATE_SOURCE_CHANGE
;
4573 bgp_notify_send(member
, BGP_NOTIFY_CEASE
,
4574 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4576 bgp_session_reset(member
);
4582 int peer_update_source_unset(struct peer
*peer
)
4584 struct peer
*member
;
4585 struct listnode
*node
, *nnode
;
4587 if (!CHECK_FLAG(peer
->flags
, PEER_FLAG_UPDATE_SOURCE
))
4590 /* Inherit configuration from peer-group if peer is member. */
4591 if (peer_group_active(peer
)) {
4592 peer_flag_inherit(peer
, PEER_FLAG_UPDATE_SOURCE
);
4593 PEER_SU_ATTR_INHERIT(peer
, peer
->group
, update_source
);
4594 PEER_STR_ATTR_INHERIT(peer
, peer
->group
, update_if
,
4595 MTYPE_PEER_UPDATE_SOURCE
);
4597 /* Otherwise remove flag and configuration from peer. */
4598 peer_flag_unset(peer
, PEER_FLAG_UPDATE_SOURCE
);
4599 sockunion_free(peer
->update_source
);
4600 peer
->update_source
= NULL
;
4601 XFREE(MTYPE_PEER_UPDATE_SOURCE
, peer
->update_if
);
4604 /* Check if handling a regular peer. */
4605 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4606 /* Send notification or reset peer depending on state. */
4607 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
4608 peer
->last_reset
= PEER_DOWN_UPDATE_SOURCE_CHANGE
;
4609 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
4610 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4612 bgp_session_reset(peer
);
4614 /* Skip peer-group mechanics for regular peers. */
4619 * Set flag and configuration on all peer-group members, unless they are
4620 * explicitely overriding peer-group configuration.
4622 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4623 /* Skip peers with overridden configuration. */
4624 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_UPDATE_SOURCE
))
4627 /* Skip peers with the same configuration. */
4628 if (!CHECK_FLAG(member
->flags
, PEER_FLAG_UPDATE_SOURCE
)
4629 && !member
->update_source
&& !member
->update_if
)
4632 /* Remove flag and configuration on peer-group member. */
4633 UNSET_FLAG(member
->flags
, PEER_FLAG_UPDATE_SOURCE
);
4634 sockunion_free(member
->update_source
);
4635 member
->update_source
= NULL
;
4636 XFREE(MTYPE_PEER_UPDATE_SOURCE
, member
->update_if
);
4638 /* Send notification or reset peer depending on state. */
4639 if (BGP_IS_VALID_STATE_FOR_NOTIF(member
->status
)) {
4640 member
->last_reset
= PEER_DOWN_UPDATE_SOURCE_CHANGE
;
4641 bgp_notify_send(member
, BGP_NOTIFY_CEASE
,
4642 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
4644 bgp_session_reset(member
);
4650 int peer_default_originate_set(struct peer
*peer
, afi_t afi
, safi_t safi
,
4651 const char *rmap
, struct route_map
*route_map
)
4653 struct peer
*member
;
4654 struct listnode
*node
, *nnode
;
4656 /* Set flag and configuration on peer. */
4657 peer_af_flag_set(peer
, afi
, safi
, PEER_FLAG_DEFAULT_ORIGINATE
);
4659 if (!peer
->default_rmap
[afi
][safi
].name
4660 || strcmp(rmap
, peer
->default_rmap
[afi
][safi
].name
) != 0) {
4661 if (peer
->default_rmap
[afi
][safi
].name
)
4662 XFREE(MTYPE_ROUTE_MAP_NAME
,
4663 peer
->default_rmap
[afi
][safi
].name
);
4665 route_map_counter_decrement(peer
->default_rmap
[afi
][safi
].map
);
4666 peer
->default_rmap
[afi
][safi
].name
=
4667 XSTRDUP(MTYPE_ROUTE_MAP_NAME
, rmap
);
4668 peer
->default_rmap
[afi
][safi
].map
= route_map
;
4669 route_map_counter_increment(route_map
);
4672 if (peer
->default_rmap
[afi
][safi
].name
)
4673 XFREE(MTYPE_ROUTE_MAP_NAME
,
4674 peer
->default_rmap
[afi
][safi
].name
);
4676 route_map_counter_decrement(peer
->default_rmap
[afi
][safi
].map
);
4677 peer
->default_rmap
[afi
][safi
].name
= NULL
;
4678 peer
->default_rmap
[afi
][safi
].map
= NULL
;
4681 /* Check if handling a regular peer. */
4682 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4683 /* Update peer route announcements. */
4684 if (peer
->status
== Established
&& peer
->afc_nego
[afi
][safi
]) {
4685 update_group_adjust_peer(peer_af_find(peer
, afi
, safi
));
4686 bgp_default_originate(peer
, afi
, safi
, 0);
4687 bgp_announce_route(peer
, afi
, safi
);
4690 /* Skip peer-group mechanics for regular peers. */
4695 * Set flag and configuration on all peer-group members, unless they are
4696 * explicitely overriding peer-group configuration.
4698 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4699 /* Skip peers with overridden configuration. */
4700 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
4701 PEER_FLAG_DEFAULT_ORIGINATE
))
4704 /* Set flag and configuration on peer-group member. */
4705 SET_FLAG(member
->af_flags
[afi
][safi
],
4706 PEER_FLAG_DEFAULT_ORIGINATE
);
4708 if (member
->default_rmap
[afi
][safi
].name
)
4709 XFREE(MTYPE_ROUTE_MAP_NAME
,
4710 member
->default_rmap
[afi
][safi
].name
);
4711 route_map_counter_decrement(
4712 member
->default_rmap
[afi
][safi
].map
);
4713 member
->default_rmap
[afi
][safi
].name
=
4714 XSTRDUP(MTYPE_ROUTE_MAP_NAME
, rmap
);
4715 member
->default_rmap
[afi
][safi
].map
= route_map
;
4716 route_map_counter_increment(route_map
);
4719 /* Update peer route announcements. */
4720 if (member
->status
== Established
4721 && member
->afc_nego
[afi
][safi
]) {
4722 update_group_adjust_peer(
4723 peer_af_find(member
, afi
, safi
));
4724 bgp_default_originate(member
, afi
, safi
, 0);
4725 bgp_announce_route(member
, afi
, safi
);
4732 int peer_default_originate_unset(struct peer
*peer
, afi_t afi
, safi_t safi
)
4734 struct peer
*member
;
4735 struct listnode
*node
, *nnode
;
4737 /* Inherit configuration from peer-group if peer is member. */
4738 if (peer_group_active(peer
)) {
4739 peer_af_flag_inherit(peer
, afi
, safi
,
4740 PEER_FLAG_DEFAULT_ORIGINATE
);
4741 PEER_STR_ATTR_INHERIT(peer
, peer
->group
,
4742 default_rmap
[afi
][safi
].name
,
4743 MTYPE_ROUTE_MAP_NAME
);
4744 PEER_ATTR_INHERIT(peer
, peer
->group
,
4745 default_rmap
[afi
][safi
].map
);
4747 /* Otherwise remove flag and configuration from peer. */
4748 peer_af_flag_unset(peer
, afi
, safi
,
4749 PEER_FLAG_DEFAULT_ORIGINATE
);
4750 if (peer
->default_rmap
[afi
][safi
].name
)
4751 XFREE(MTYPE_ROUTE_MAP_NAME
,
4752 peer
->default_rmap
[afi
][safi
].name
);
4753 route_map_counter_decrement(peer
->default_rmap
[afi
][safi
].map
);
4754 peer
->default_rmap
[afi
][safi
].name
= NULL
;
4755 peer
->default_rmap
[afi
][safi
].map
= NULL
;
4758 /* Check if handling a regular peer. */
4759 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
4760 /* Update peer route announcements. */
4761 if (peer
->status
== Established
&& peer
->afc_nego
[afi
][safi
]) {
4762 update_group_adjust_peer(peer_af_find(peer
, afi
, safi
));
4763 bgp_default_originate(peer
, afi
, safi
, 1);
4764 bgp_announce_route(peer
, afi
, safi
);
4767 /* Skip peer-group mechanics for regular peers. */
4772 * Remove flag and configuration from all peer-group members, unless
4773 * they are explicitely overriding peer-group configuration.
4775 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4776 /* Skip peers with overridden configuration. */
4777 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
4778 PEER_FLAG_DEFAULT_ORIGINATE
))
4781 /* Remove flag and configuration on peer-group member. */
4782 UNSET_FLAG(peer
->af_flags
[afi
][safi
],
4783 PEER_FLAG_DEFAULT_ORIGINATE
);
4784 if (peer
->default_rmap
[afi
][safi
].name
)
4785 XFREE(MTYPE_ROUTE_MAP_NAME
,
4786 peer
->default_rmap
[afi
][safi
].name
);
4787 route_map_counter_decrement(peer
->default_rmap
[afi
][safi
].map
);
4788 peer
->default_rmap
[afi
][safi
].name
= NULL
;
4789 peer
->default_rmap
[afi
][safi
].map
= NULL
;
4791 /* Update peer route announcements. */
4792 if (peer
->status
== Established
&& peer
->afc_nego
[afi
][safi
]) {
4793 update_group_adjust_peer(peer_af_find(peer
, afi
, safi
));
4794 bgp_default_originate(peer
, afi
, safi
, 1);
4795 bgp_announce_route(peer
, afi
, safi
);
4802 int peer_port_set(struct peer
*peer
, uint16_t port
)
4808 int peer_port_unset(struct peer
*peer
)
4810 peer
->port
= BGP_PORT_DEFAULT
;
4815 * Helper function that is called after the name of the policy
4816 * being used by a peer has changed (AF specific). Automatically
4817 * initiates inbound or outbound processing as needed.
4819 static void peer_on_policy_change(struct peer
*peer
, afi_t afi
, safi_t safi
,
4823 update_group_adjust_peer(peer_af_find(peer
, afi
, safi
));
4824 if (peer
->status
== Established
)
4825 bgp_announce_route(peer
, afi
, safi
);
4827 if (peer
->status
!= Established
)
4830 if (CHECK_FLAG(peer
->af_flags
[afi
][safi
],
4831 PEER_FLAG_SOFT_RECONFIG
))
4832 bgp_soft_reconfig_in(peer
, afi
, safi
);
4833 else if (CHECK_FLAG(peer
->cap
, PEER_CAP_REFRESH_OLD_RCV
)
4834 || CHECK_FLAG(peer
->cap
, PEER_CAP_REFRESH_NEW_RCV
))
4835 bgp_route_refresh_send(peer
, afi
, safi
, 0, 0, 0);
4840 /* neighbor weight. */
4841 int peer_weight_set(struct peer
*peer
, afi_t afi
, safi_t safi
, uint16_t weight
)
4843 struct peer
*member
;
4844 struct listnode
*node
, *nnode
;
4846 /* Set flag and configuration on peer. */
4847 peer_af_flag_set(peer
, afi
, safi
, PEER_FLAG_WEIGHT
);
4848 if (peer
->weight
[afi
][safi
] != weight
) {
4849 peer
->weight
[afi
][safi
] = weight
;
4850 peer_on_policy_change(peer
, afi
, safi
, 0);
4853 /* Skip peer-group mechanics for regular peers. */
4854 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
4858 * Set flag and configuration on all peer-group members, unless they are
4859 * explicitely overriding peer-group configuration.
4861 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4862 /* Skip peers with overridden configuration. */
4863 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
4867 /* Set flag and configuration on peer-group member. */
4868 SET_FLAG(member
->af_flags
[afi
][safi
], PEER_FLAG_WEIGHT
);
4869 if (member
->weight
[afi
][safi
] != weight
) {
4870 member
->weight
[afi
][safi
] = weight
;
4871 peer_on_policy_change(member
, afi
, safi
, 0);
4878 int peer_weight_unset(struct peer
*peer
, afi_t afi
, safi_t safi
)
4880 struct peer
*member
;
4881 struct listnode
*node
, *nnode
;
4883 if (!CHECK_FLAG(peer
->af_flags
[afi
][safi
], PEER_FLAG_WEIGHT
))
4886 /* Inherit configuration from peer-group if peer is member. */
4887 if (peer_group_active(peer
)) {
4888 peer_af_flag_inherit(peer
, afi
, safi
, PEER_FLAG_WEIGHT
);
4889 PEER_ATTR_INHERIT(peer
, peer
->group
, weight
[afi
][safi
]);
4891 peer_on_policy_change(peer
, afi
, safi
, 0);
4895 /* Remove flag and configuration from peer. */
4896 peer_af_flag_unset(peer
, afi
, safi
, PEER_FLAG_WEIGHT
);
4897 peer
->weight
[afi
][safi
] = 0;
4898 peer_on_policy_change(peer
, afi
, safi
, 0);
4900 /* Skip peer-group mechanics for regular peers. */
4901 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
4905 * Remove flag and configuration from all peer-group members, unless
4906 * they are explicitely overriding peer-group configuration.
4908 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4909 /* Skip peers with overridden configuration. */
4910 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
4914 /* Skip peers where flag is already disabled. */
4915 if (!CHECK_FLAG(member
->af_flags
[afi
][safi
], PEER_FLAG_WEIGHT
))
4918 /* Remove flag and configuration on peer-group member. */
4919 UNSET_FLAG(member
->af_flags
[afi
][safi
], PEER_FLAG_WEIGHT
);
4920 member
->weight
[afi
][safi
] = 0;
4921 peer_on_policy_change(member
, afi
, safi
, 0);
4927 int peer_timers_set(struct peer
*peer
, uint32_t keepalive
, uint32_t holdtime
)
4929 struct peer
*member
;
4930 struct listnode
*node
, *nnode
;
4932 if (keepalive
> 65535)
4933 return BGP_ERR_INVALID_VALUE
;
4935 if (holdtime
> 65535)
4936 return BGP_ERR_INVALID_VALUE
;
4938 if (holdtime
< 3 && holdtime
!= 0)
4939 return BGP_ERR_INVALID_VALUE
;
4941 /* Set flag and configuration on peer. */
4942 peer_flag_set(peer
, PEER_FLAG_TIMER
);
4943 peer
->holdtime
= holdtime
;
4944 peer
->keepalive
= (keepalive
< holdtime
/ 3 ? keepalive
: holdtime
/ 3);
4946 /* Skip peer-group mechanics for regular peers. */
4947 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
4951 * Set flag and configuration on all peer-group members, unless they are
4952 * explicitely overriding peer-group configuration.
4954 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4955 /* Skip peers with overridden configuration. */
4956 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_TIMER
))
4959 /* Set flag and configuration on peer-group member. */
4960 SET_FLAG(member
->flags
, PEER_FLAG_TIMER
);
4961 PEER_ATTR_INHERIT(peer
, peer
->group
, holdtime
);
4962 PEER_ATTR_INHERIT(peer
, peer
->group
, keepalive
);
4968 int peer_timers_unset(struct peer
*peer
)
4970 struct peer
*member
;
4971 struct listnode
*node
, *nnode
;
4973 /* Inherit configuration from peer-group if peer is member. */
4974 if (peer_group_active(peer
)) {
4975 peer_flag_inherit(peer
, PEER_FLAG_TIMER
);
4976 PEER_ATTR_INHERIT(peer
, peer
->group
, holdtime
);
4977 PEER_ATTR_INHERIT(peer
, peer
->group
, keepalive
);
4979 /* Otherwise remove flag and configuration from peer. */
4980 peer_flag_unset(peer
, PEER_FLAG_TIMER
);
4982 peer
->keepalive
= 0;
4985 /* Skip peer-group mechanics for regular peers. */
4986 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
4990 * Remove flag and configuration from all peer-group members, unless
4991 * they are explicitely overriding peer-group configuration.
4993 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
4994 /* Skip peers with overridden configuration. */
4995 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_TIMER
))
4998 /* Remove flag and configuration on peer-group member. */
4999 UNSET_FLAG(member
->flags
, PEER_FLAG_TIMER
);
5000 member
->holdtime
= 0;
5001 member
->keepalive
= 0;
5007 int peer_timers_connect_set(struct peer
*peer
, uint32_t connect
)
5009 struct peer
*member
;
5010 struct listnode
*node
, *nnode
;
5012 if (connect
> 65535)
5013 return BGP_ERR_INVALID_VALUE
;
5015 /* Set flag and configuration on peer. */
5016 peer_flag_set(peer
, PEER_FLAG_TIMER_CONNECT
);
5017 peer
->connect
= connect
;
5018 peer
->v_connect
= connect
;
5020 /* Skip peer-group mechanics for regular peers. */
5021 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
5025 * Set flag and configuration on all peer-group members, unless they are
5026 * explicitely overriding peer-group configuration.
5028 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5029 /* Skip peers with overridden configuration. */
5030 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_TIMER_CONNECT
))
5033 /* Set flag and configuration on peer-group member. */
5034 SET_FLAG(member
->flags
, PEER_FLAG_TIMER_CONNECT
);
5035 member
->connect
= connect
;
5036 member
->v_connect
= connect
;
5042 int peer_timers_connect_unset(struct peer
*peer
)
5044 struct peer
*member
;
5045 struct listnode
*node
, *nnode
;
5047 /* Inherit configuration from peer-group if peer is member. */
5048 if (peer_group_active(peer
)) {
5049 peer_flag_inherit(peer
, PEER_FLAG_TIMER_CONNECT
);
5050 PEER_ATTR_INHERIT(peer
, peer
->group
, connect
);
5052 /* Otherwise remove flag and configuration from peer. */
5053 peer_flag_unset(peer
, PEER_FLAG_TIMER_CONNECT
);
5057 /* Set timer with fallback to default value. */
5059 peer
->v_connect
= peer
->connect
;
5061 peer
->v_connect
= BGP_DEFAULT_CONNECT_RETRY
;
5063 /* Skip peer-group mechanics for regular peers. */
5064 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
5068 * Remove flag and configuration from all peer-group members, unless
5069 * they are explicitely overriding peer-group configuration.
5071 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5072 /* Skip peers with overridden configuration. */
5073 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_TIMER_CONNECT
))
5076 /* Remove flag and configuration on peer-group member. */
5077 UNSET_FLAG(member
->flags
, PEER_FLAG_TIMER_CONNECT
);
5078 member
->connect
= 0;
5079 member
->v_connect
= BGP_DEFAULT_CONNECT_RETRY
;
5085 int peer_advertise_interval_set(struct peer
*peer
, uint32_t routeadv
)
5087 struct peer
*member
;
5088 struct listnode
*node
, *nnode
;
5091 return BGP_ERR_INVALID_VALUE
;
5093 /* Set flag and configuration on peer. */
5094 peer_flag_set(peer
, PEER_FLAG_ROUTEADV
);
5095 peer
->routeadv
= routeadv
;
5096 peer
->v_routeadv
= routeadv
;
5098 /* Check if handling a regular peer. */
5099 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5100 /* Update peer route announcements. */
5101 update_group_adjust_peer_afs(peer
);
5102 if (peer
->status
== Established
)
5103 bgp_announce_route_all(peer
);
5105 /* Skip peer-group mechanics for regular peers. */
5110 * Set flag and configuration on all peer-group members, unless they are
5111 * explicitely overriding peer-group configuration.
5113 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5114 /* Skip peers with overridden configuration. */
5115 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_ROUTEADV
))
5118 /* Set flag and configuration on peer-group member. */
5119 SET_FLAG(member
->flags
, PEER_FLAG_ROUTEADV
);
5120 member
->routeadv
= routeadv
;
5121 member
->v_routeadv
= routeadv
;
5123 /* Update peer route announcements. */
5124 update_group_adjust_peer_afs(member
);
5125 if (member
->status
== Established
)
5126 bgp_announce_route_all(member
);
5132 int peer_advertise_interval_unset(struct peer
*peer
)
5134 struct peer
*member
;
5135 struct listnode
*node
, *nnode
;
5137 /* Inherit configuration from peer-group if peer is member. */
5138 if (peer_group_active(peer
)) {
5139 peer_flag_inherit(peer
, PEER_FLAG_ROUTEADV
);
5140 PEER_ATTR_INHERIT(peer
, peer
->group
, routeadv
);
5142 /* Otherwise remove flag and configuration from peer. */
5143 peer_flag_unset(peer
, PEER_FLAG_ROUTEADV
);
5147 /* Set timer with fallback to default value. */
5149 peer
->v_routeadv
= peer
->routeadv
;
5151 peer
->v_routeadv
= (peer
->sort
== BGP_PEER_IBGP
)
5152 ? BGP_DEFAULT_IBGP_ROUTEADV
5153 : BGP_DEFAULT_EBGP_ROUTEADV
;
5155 /* Check if handling a regular peer. */
5156 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5157 /* Update peer route announcements. */
5158 update_group_adjust_peer_afs(peer
);
5159 if (peer
->status
== Established
)
5160 bgp_announce_route_all(peer
);
5162 /* Skip peer-group mechanics for regular peers. */
5167 * Remove flag and configuration from all peer-group members, unless
5168 * they are explicitely overriding peer-group configuration.
5170 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5171 /* Skip peers with overridden configuration. */
5172 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_ROUTEADV
))
5175 /* Remove flag and configuration on peer-group member. */
5176 UNSET_FLAG(member
->flags
, PEER_FLAG_ROUTEADV
);
5177 member
->routeadv
= 0;
5178 member
->v_routeadv
= (member
->sort
== BGP_PEER_IBGP
)
5179 ? BGP_DEFAULT_IBGP_ROUTEADV
5180 : BGP_DEFAULT_EBGP_ROUTEADV
;
5182 /* Update peer route announcements. */
5183 update_group_adjust_peer_afs(member
);
5184 if (member
->status
== Established
)
5185 bgp_announce_route_all(member
);
5191 /* neighbor interface */
5192 void peer_interface_set(struct peer
*peer
, const char *str
)
5194 XFREE(MTYPE_BGP_PEER_IFNAME
, peer
->ifname
);
5195 peer
->ifname
= XSTRDUP(MTYPE_BGP_PEER_IFNAME
, str
);
5198 void peer_interface_unset(struct peer
*peer
)
5200 XFREE(MTYPE_BGP_PEER_IFNAME
, peer
->ifname
);
5201 peer
->ifname
= NULL
;
5205 int peer_allowas_in_set(struct peer
*peer
, afi_t afi
, safi_t safi
,
5206 int allow_num
, int origin
)
5208 struct peer
*member
;
5209 struct listnode
*node
, *nnode
;
5211 if (!origin
&& (allow_num
< 1 || allow_num
> 10))
5212 return BGP_ERR_INVALID_VALUE
;
5214 /* Set flag and configuration on peer. */
5215 peer_af_flag_set(peer
, afi
, safi
, PEER_FLAG_ALLOWAS_IN
);
5217 if (peer
->allowas_in
[afi
][safi
] != 0
5218 || !CHECK_FLAG(peer
->af_flags
[afi
][safi
],
5219 PEER_FLAG_ALLOWAS_IN_ORIGIN
)) {
5220 peer_af_flag_set(peer
, afi
, safi
,
5221 PEER_FLAG_ALLOWAS_IN_ORIGIN
);
5222 peer
->allowas_in
[afi
][safi
] = 0;
5223 peer_on_policy_change(peer
, afi
, safi
, 0);
5226 if (peer
->allowas_in
[afi
][safi
] != allow_num
5227 || CHECK_FLAG(peer
->af_flags
[afi
][safi
],
5228 PEER_FLAG_ALLOWAS_IN_ORIGIN
)) {
5230 peer_af_flag_unset(peer
, afi
, safi
,
5231 PEER_FLAG_ALLOWAS_IN_ORIGIN
);
5232 peer
->allowas_in
[afi
][safi
] = allow_num
;
5233 peer_on_policy_change(peer
, afi
, safi
, 0);
5237 /* Skip peer-group mechanics for regular peers. */
5238 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
5242 * Set flag and configuration on all peer-group members, unless
5243 * they are explicitely overriding peer-group configuration.
5245 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5246 /* Skip peers with overridden configuration. */
5247 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
5248 PEER_FLAG_ALLOWAS_IN
))
5251 /* Set flag and configuration on peer-group member. */
5252 SET_FLAG(member
->af_flags
[afi
][safi
], PEER_FLAG_ALLOWAS_IN
);
5254 if (member
->allowas_in
[afi
][safi
] != 0
5255 || !CHECK_FLAG(member
->af_flags
[afi
][safi
],
5256 PEER_FLAG_ALLOWAS_IN_ORIGIN
)) {
5257 SET_FLAG(member
->af_flags
[afi
][safi
],
5258 PEER_FLAG_ALLOWAS_IN_ORIGIN
);
5259 member
->allowas_in
[afi
][safi
] = 0;
5260 peer_on_policy_change(peer
, afi
, safi
, 0);
5263 if (member
->allowas_in
[afi
][safi
] != allow_num
5264 || CHECK_FLAG(member
->af_flags
[afi
][safi
],
5265 PEER_FLAG_ALLOWAS_IN_ORIGIN
)) {
5266 UNSET_FLAG(member
->af_flags
[afi
][safi
],
5267 PEER_FLAG_ALLOWAS_IN_ORIGIN
);
5268 member
->allowas_in
[afi
][safi
] = allow_num
;
5269 peer_on_policy_change(peer
, afi
, safi
, 0);
5277 int peer_allowas_in_unset(struct peer
*peer
, afi_t afi
, safi_t safi
)
5279 struct peer
*member
;
5280 struct listnode
*node
, *nnode
;
5282 /* Skip peer if flag is already disabled. */
5283 if (!CHECK_FLAG(peer
->af_flags
[afi
][safi
], PEER_FLAG_ALLOWAS_IN
))
5286 /* Inherit configuration from peer-group if peer is member. */
5287 if (peer_group_active(peer
)) {
5288 peer_af_flag_inherit(peer
, afi
, safi
, PEER_FLAG_ALLOWAS_IN
);
5289 peer_af_flag_inherit(peer
, afi
, safi
,
5290 PEER_FLAG_ALLOWAS_IN_ORIGIN
);
5291 PEER_ATTR_INHERIT(peer
, peer
->group
, allowas_in
[afi
][safi
]);
5292 peer_on_policy_change(peer
, afi
, safi
, 0);
5297 /* Remove flag and configuration from peer. */
5298 peer_af_flag_unset(peer
, afi
, safi
, PEER_FLAG_ALLOWAS_IN
);
5299 peer_af_flag_unset(peer
, afi
, safi
, PEER_FLAG_ALLOWAS_IN_ORIGIN
);
5300 peer
->allowas_in
[afi
][safi
] = 0;
5301 peer_on_policy_change(peer
, afi
, safi
, 0);
5303 /* Skip peer-group mechanics if handling a regular peer. */
5304 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
))
5308 * Remove flags and configuration from all peer-group members, unless
5309 * they are explicitely overriding peer-group configuration.
5311 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5312 /* Skip peers with overridden configuration. */
5313 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
5314 PEER_FLAG_ALLOWAS_IN
))
5317 /* Skip peers where flag is already disabled. */
5318 if (!CHECK_FLAG(member
->af_flags
[afi
][safi
],
5319 PEER_FLAG_ALLOWAS_IN
))
5322 /* Remove flags and configuration on peer-group member. */
5323 UNSET_FLAG(member
->af_flags
[afi
][safi
], PEER_FLAG_ALLOWAS_IN
);
5324 UNSET_FLAG(member
->af_flags
[afi
][safi
],
5325 PEER_FLAG_ALLOWAS_IN_ORIGIN
);
5326 member
->allowas_in
[afi
][safi
] = 0;
5327 peer_on_policy_change(member
, afi
, safi
, 0);
5333 int peer_local_as_set(struct peer
*peer
, as_t as
, int no_prepend
,
5336 bool old_no_prepend
, old_replace_as
;
5337 struct bgp
*bgp
= peer
->bgp
;
5338 struct peer
*member
;
5339 struct listnode
*node
, *nnode
;
5341 if (peer_sort(peer
) != BGP_PEER_EBGP
5342 && peer_sort(peer
) != BGP_PEER_INTERNAL
)
5343 return BGP_ERR_LOCAL_AS_ALLOWED_ONLY_FOR_EBGP
;
5346 return BGP_ERR_CANNOT_HAVE_LOCAL_AS_SAME_AS
;
5349 return BGP_ERR_CANNOT_HAVE_LOCAL_AS_SAME_AS_REMOTE_AS
;
5351 /* Save previous flag states. */
5353 !!CHECK_FLAG(peer
->flags
, PEER_FLAG_LOCAL_AS_NO_PREPEND
);
5355 !!CHECK_FLAG(peer
->flags
, PEER_FLAG_LOCAL_AS_REPLACE_AS
);
5357 /* Set flag and configuration on peer. */
5358 peer_flag_set(peer
, PEER_FLAG_LOCAL_AS
);
5359 peer_flag_modify(peer
, PEER_FLAG_LOCAL_AS_NO_PREPEND
, no_prepend
);
5360 peer_flag_modify(peer
, PEER_FLAG_LOCAL_AS_REPLACE_AS
, replace_as
);
5362 if (peer
->change_local_as
== as
&& old_no_prepend
== no_prepend
5363 && old_replace_as
== replace_as
)
5365 peer
->change_local_as
= as
;
5367 /* Check if handling a regular peer. */
5368 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5369 /* Send notification or reset peer depending on state. */
5370 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
5371 peer
->last_reset
= PEER_DOWN_LOCAL_AS_CHANGE
;
5372 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
5373 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5375 bgp_session_reset(peer
);
5377 /* Skip peer-group mechanics for regular peers. */
5382 * Set flag and configuration on all peer-group members, unless they are
5383 * explicitely overriding peer-group configuration.
5385 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5386 /* Skip peers with overridden configuration. */
5387 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_LOCAL_AS
))
5390 /* Skip peers with the same configuration. */
5391 old_no_prepend
= CHECK_FLAG(member
->flags
,
5392 PEER_FLAG_LOCAL_AS_NO_PREPEND
);
5393 old_replace_as
= CHECK_FLAG(member
->flags
,
5394 PEER_FLAG_LOCAL_AS_REPLACE_AS
);
5395 if (member
->change_local_as
== as
5396 && CHECK_FLAG(member
->flags
, PEER_FLAG_LOCAL_AS
)
5397 && old_no_prepend
== no_prepend
5398 && old_replace_as
== replace_as
)
5401 /* Set flag and configuration on peer-group member. */
5402 SET_FLAG(member
->flags
, PEER_FLAG_LOCAL_AS
);
5403 COND_FLAG(member
->flags
, PEER_FLAG_LOCAL_AS_NO_PREPEND
,
5405 COND_FLAG(member
->flags
, PEER_FLAG_LOCAL_AS_REPLACE_AS
,
5407 member
->change_local_as
= as
;
5409 /* Send notification or stop peer depending on state. */
5410 if (BGP_IS_VALID_STATE_FOR_NOTIF(member
->status
)) {
5411 member
->last_reset
= PEER_DOWN_LOCAL_AS_CHANGE
;
5412 bgp_notify_send(member
, BGP_NOTIFY_CEASE
,
5413 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5415 BGP_EVENT_ADD(member
, BGP_Stop
);
5421 int peer_local_as_unset(struct peer
*peer
)
5423 struct peer
*member
;
5424 struct listnode
*node
, *nnode
;
5426 if (!CHECK_FLAG(peer
->flags
, PEER_FLAG_LOCAL_AS
))
5429 /* Inherit configuration from peer-group if peer is member. */
5430 if (peer_group_active(peer
)) {
5431 peer_flag_inherit(peer
, PEER_FLAG_LOCAL_AS
);
5432 peer_flag_inherit(peer
, PEER_FLAG_LOCAL_AS_NO_PREPEND
);
5433 peer_flag_inherit(peer
, PEER_FLAG_LOCAL_AS_REPLACE_AS
);
5434 PEER_ATTR_INHERIT(peer
, peer
->group
, change_local_as
);
5436 /* Otherwise remove flag and configuration from peer. */
5437 peer_flag_unset(peer
, PEER_FLAG_LOCAL_AS
);
5438 peer_flag_unset(peer
, PEER_FLAG_LOCAL_AS_NO_PREPEND
);
5439 peer_flag_unset(peer
, PEER_FLAG_LOCAL_AS_REPLACE_AS
);
5440 peer
->change_local_as
= 0;
5443 /* Check if handling a regular peer. */
5444 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5445 /* Send notification or stop peer depending on state. */
5446 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
)) {
5447 peer
->last_reset
= PEER_DOWN_LOCAL_AS_CHANGE
;
5448 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
5449 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5451 BGP_EVENT_ADD(peer
, BGP_Stop
);
5453 /* Skip peer-group mechanics for regular peers. */
5458 * Remove flag and configuration from all peer-group members, unless
5459 * they are explicitely overriding peer-group configuration.
5461 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5462 /* Skip peers with overridden configuration. */
5463 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_LOCAL_AS
))
5466 /* Remove flag and configuration on peer-group member. */
5467 UNSET_FLAG(member
->flags
, PEER_FLAG_LOCAL_AS
);
5468 UNSET_FLAG(member
->flags
, PEER_FLAG_LOCAL_AS_NO_PREPEND
);
5469 UNSET_FLAG(member
->flags
, PEER_FLAG_LOCAL_AS_REPLACE_AS
);
5470 member
->change_local_as
= 0;
5472 /* Send notification or stop peer depending on state. */
5473 if (BGP_IS_VALID_STATE_FOR_NOTIF(member
->status
)) {
5474 member
->last_reset
= PEER_DOWN_LOCAL_AS_CHANGE
;
5475 bgp_notify_send(member
, BGP_NOTIFY_CEASE
,
5476 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5478 bgp_session_reset(member
);
5484 /* Set password for authenticating with the peer. */
5485 int peer_password_set(struct peer
*peer
, const char *password
)
5487 struct peer
*member
;
5488 struct listnode
*node
, *nnode
;
5489 int len
= password
? strlen(password
) : 0;
5490 int ret
= BGP_SUCCESS
;
5492 if ((len
< PEER_PASSWORD_MINLEN
) || (len
> PEER_PASSWORD_MAXLEN
))
5493 return BGP_ERR_INVALID_VALUE
;
5495 /* Set flag and configuration on peer. */
5496 peer_flag_set(peer
, PEER_FLAG_PASSWORD
);
5497 if (peer
->password
&& strcmp(peer
->password
, password
) == 0)
5499 XFREE(MTYPE_PEER_PASSWORD
, peer
->password
);
5500 peer
->password
= XSTRDUP(MTYPE_PEER_PASSWORD
, password
);
5502 /* Check if handling a regular peer. */
5503 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5504 /* Send notification or reset peer depending on state. */
5505 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
5506 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
5507 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5509 bgp_session_reset(peer
);
5512 * Attempt to install password on socket and skip peer-group
5515 if (BGP_PEER_SU_UNSPEC(peer
))
5517 return (bgp_md5_set(peer
) >= 0) ? BGP_SUCCESS
5518 : BGP_ERR_TCPSIG_FAILED
;
5522 * Set flag and configuration on all peer-group members, unless they are
5523 * explicitely overriding peer-group configuration.
5525 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5526 /* Skip peers with overridden configuration. */
5527 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_PASSWORD
))
5530 /* Skip peers with the same password. */
5531 if (member
->password
&& strcmp(member
->password
, password
) == 0)
5534 /* Set flag and configuration on peer-group member. */
5535 SET_FLAG(member
->flags
, PEER_FLAG_PASSWORD
);
5536 if (member
->password
)
5537 XFREE(MTYPE_PEER_PASSWORD
, member
->password
);
5538 member
->password
= XSTRDUP(MTYPE_PEER_PASSWORD
, password
);
5540 /* Send notification or reset peer depending on state. */
5541 if (BGP_IS_VALID_STATE_FOR_NOTIF(member
->status
))
5542 bgp_notify_send(member
, BGP_NOTIFY_CEASE
,
5543 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5545 bgp_session_reset(member
);
5547 /* Attempt to install password on socket. */
5548 if (!BGP_PEER_SU_UNSPEC(member
) && bgp_md5_set(member
) < 0)
5549 ret
= BGP_ERR_TCPSIG_FAILED
;
5552 /* Set flag and configuration on all peer-group listen ranges */
5553 struct listnode
*ln
;
5556 for (ALL_LIST_ELEMENTS_RO(peer
->group
->listen_range
[AFI_IP
], ln
, lr
))
5557 bgp_md5_set_prefix(lr
, password
);
5558 for (ALL_LIST_ELEMENTS_RO(peer
->group
->listen_range
[AFI_IP6
], ln
, lr
))
5559 bgp_md5_set_prefix(lr
, password
);
5564 int peer_password_unset(struct peer
*peer
)
5566 struct peer
*member
;
5567 struct listnode
*node
, *nnode
;
5569 if (!CHECK_FLAG(peer
->flags
, PEER_FLAG_PASSWORD
))
5572 /* Inherit configuration from peer-group if peer is member. */
5573 if (peer_group_active(peer
)) {
5574 peer_flag_inherit(peer
, PEER_FLAG_PASSWORD
);
5575 PEER_STR_ATTR_INHERIT(peer
, peer
->group
, password
,
5576 MTYPE_PEER_PASSWORD
);
5578 /* Otherwise remove flag and configuration from peer. */
5579 peer_flag_unset(peer
, PEER_FLAG_PASSWORD
);
5580 XFREE(MTYPE_PEER_PASSWORD
, peer
->password
);
5583 /* Check if handling a regular peer. */
5584 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5585 /* Send notification or reset peer depending on state. */
5586 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
5587 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
5588 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5590 bgp_session_reset(peer
);
5592 /* Attempt to uninstall password on socket. */
5593 if (!BGP_PEER_SU_UNSPEC(peer
))
5594 bgp_md5_unset(peer
);
5596 /* Skip peer-group mechanics for regular peers. */
5601 * Remove flag and configuration from all peer-group members, unless
5602 * they are explicitely overriding peer-group configuration.
5604 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5605 /* Skip peers with overridden configuration. */
5606 if (CHECK_FLAG(member
->flags_override
, PEER_FLAG_PASSWORD
))
5609 /* Remove flag and configuration on peer-group member. */
5610 UNSET_FLAG(member
->flags
, PEER_FLAG_PASSWORD
);
5611 XFREE(MTYPE_PEER_PASSWORD
, member
->password
);
5613 /* Send notification or reset peer depending on state. */
5614 if (BGP_IS_VALID_STATE_FOR_NOTIF(member
->status
))
5615 bgp_notify_send(member
, BGP_NOTIFY_CEASE
,
5616 BGP_NOTIFY_CEASE_CONFIG_CHANGE
);
5618 bgp_session_reset(member
);
5620 /* Attempt to uninstall password on socket. */
5621 if (!BGP_PEER_SU_UNSPEC(member
))
5622 bgp_md5_unset(member
);
5625 /* Set flag and configuration on all peer-group listen ranges */
5626 struct listnode
*ln
;
5629 for (ALL_LIST_ELEMENTS_RO(peer
->group
->listen_range
[AFI_IP
], ln
, lr
))
5630 bgp_md5_unset_prefix(lr
);
5631 for (ALL_LIST_ELEMENTS_RO(peer
->group
->listen_range
[AFI_IP6
], ln
, lr
))
5632 bgp_md5_unset_prefix(lr
);
5638 /* Set distribute list to the peer. */
5639 int peer_distribute_set(struct peer
*peer
, afi_t afi
, safi_t safi
, int direct
,
5642 struct peer
*member
;
5643 struct bgp_filter
*filter
;
5644 struct listnode
*node
, *nnode
;
5646 if (direct
!= FILTER_IN
&& direct
!= FILTER_OUT
)
5647 return BGP_ERR_INVALID_VALUE
;
5649 /* Set configuration on peer. */
5650 filter
= &peer
->filter
[afi
][safi
];
5651 if (filter
->plist
[direct
].name
)
5652 return BGP_ERR_PEER_FILTER_CONFLICT
;
5653 if (filter
->dlist
[direct
].name
)
5654 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->dlist
[direct
].name
);
5655 filter
->dlist
[direct
].name
= XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
5656 filter
->dlist
[direct
].alist
= access_list_lookup(afi
, name
);
5658 /* Check if handling a regular peer. */
5659 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5660 /* Set override-flag and process peer route updates. */
5661 SET_FLAG(peer
->filter_override
[afi
][safi
][direct
],
5662 PEER_FT_DISTRIBUTE_LIST
);
5663 peer_on_policy_change(peer
, afi
, safi
,
5664 (direct
== FILTER_OUT
) ? 1 : 0);
5666 /* Skip peer-group mechanics for regular peers. */
5671 * Set configuration on all peer-group members, un less they are
5672 * explicitely overriding peer-group configuration.
5674 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5675 /* Skip peers with overridden configuration. */
5676 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
5677 PEER_FT_DISTRIBUTE_LIST
))
5680 /* Set configuration on peer-group member. */
5681 filter
= &member
->filter
[afi
][safi
];
5682 if (filter
->dlist
[direct
].name
)
5683 XFREE(MTYPE_BGP_FILTER_NAME
,
5684 filter
->dlist
[direct
].name
);
5685 filter
->dlist
[direct
].name
=
5686 XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
5687 filter
->dlist
[direct
].alist
= access_list_lookup(afi
, name
);
5689 /* Process peer route updates. */
5690 peer_on_policy_change(member
, afi
, safi
,
5691 (direct
== FILTER_OUT
) ? 1 : 0);
5697 int peer_distribute_unset(struct peer
*peer
, afi_t afi
, safi_t safi
, int direct
)
5699 struct peer
*member
;
5700 struct bgp_filter
*filter
;
5701 struct listnode
*node
, *nnode
;
5703 if (direct
!= FILTER_IN
&& direct
!= FILTER_OUT
)
5704 return BGP_ERR_INVALID_VALUE
;
5706 /* Unset override-flag unconditionally. */
5707 UNSET_FLAG(peer
->filter_override
[afi
][safi
][direct
],
5708 PEER_FT_DISTRIBUTE_LIST
);
5710 /* Inherit configuration from peer-group if peer is member. */
5711 if (peer_group_active(peer
)) {
5712 PEER_STR_ATTR_INHERIT(peer
, peer
->group
,
5713 filter
[afi
][safi
].dlist
[direct
].name
,
5714 MTYPE_BGP_FILTER_NAME
);
5715 PEER_ATTR_INHERIT(peer
, peer
->group
,
5716 filter
[afi
][safi
].dlist
[direct
].alist
);
5718 /* Otherwise remove configuration from peer. */
5719 filter
= &peer
->filter
[afi
][safi
];
5720 if (filter
->dlist
[direct
].name
)
5721 XFREE(MTYPE_BGP_FILTER_NAME
,
5722 filter
->dlist
[direct
].name
);
5723 filter
->dlist
[direct
].name
= NULL
;
5724 filter
->dlist
[direct
].alist
= NULL
;
5727 /* Check if handling a regular peer. */
5728 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5729 /* Process peer route updates. */
5730 peer_on_policy_change(peer
, afi
, safi
,
5731 (direct
== FILTER_OUT
) ? 1 : 0);
5733 /* Skip peer-group mechanics for regular peers. */
5738 * Remove configuration on all peer-group members, unless they are
5739 * explicitely overriding peer-group configuration.
5741 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5742 /* Skip peers with overridden configuration. */
5743 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
5744 PEER_FT_DISTRIBUTE_LIST
))
5747 /* Remove configuration on peer-group member. */
5748 filter
= &member
->filter
[afi
][safi
];
5749 if (filter
->dlist
[direct
].name
)
5750 XFREE(MTYPE_BGP_FILTER_NAME
,
5751 filter
->dlist
[direct
].name
);
5752 filter
->dlist
[direct
].name
= NULL
;
5753 filter
->dlist
[direct
].alist
= NULL
;
5755 /* Process peer route updates. */
5756 peer_on_policy_change(member
, afi
, safi
,
5757 (direct
== FILTER_OUT
) ? 1 : 0);
5763 /* Update distribute list. */
5764 static void peer_distribute_update(struct access_list
*access
)
5769 struct listnode
*mnode
, *mnnode
;
5770 struct listnode
*node
, *nnode
;
5773 struct peer_group
*group
;
5774 struct bgp_filter
*filter
;
5776 for (ALL_LIST_ELEMENTS(bm
->bgp
, mnode
, mnnode
, bgp
)) {
5778 update_group_policy_update(bgp
, BGP_POLICY_FILTER_LIST
,
5779 access
->name
, 0, 0);
5780 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
5781 FOREACH_AFI_SAFI (afi
, safi
) {
5782 filter
= &peer
->filter
[afi
][safi
];
5784 for (direct
= FILTER_IN
; direct
< FILTER_MAX
;
5786 if (filter
->dlist
[direct
].name
)
5787 filter
->dlist
[direct
]
5788 .alist
= access_list_lookup(
5790 filter
->dlist
[direct
]
5793 filter
->dlist
[direct
].alist
=
5798 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, nnode
, group
)) {
5799 FOREACH_AFI_SAFI (afi
, safi
) {
5800 filter
= &group
->conf
->filter
[afi
][safi
];
5802 for (direct
= FILTER_IN
; direct
< FILTER_MAX
;
5804 if (filter
->dlist
[direct
].name
)
5805 filter
->dlist
[direct
]
5806 .alist
= access_list_lookup(
5808 filter
->dlist
[direct
]
5811 filter
->dlist
[direct
].alist
=
5817 vnc_prefix_list_update(bgp
);
5822 /* Set prefix list to the peer. */
5823 int peer_prefix_list_set(struct peer
*peer
, afi_t afi
, safi_t safi
, int direct
,
5826 struct peer
*member
;
5827 struct bgp_filter
*filter
;
5828 struct listnode
*node
, *nnode
;
5830 if (direct
!= FILTER_IN
&& direct
!= FILTER_OUT
)
5831 return BGP_ERR_INVALID_VALUE
;
5833 /* Set configuration on peer. */
5834 filter
= &peer
->filter
[afi
][safi
];
5835 if (filter
->dlist
[direct
].name
)
5836 return BGP_ERR_PEER_FILTER_CONFLICT
;
5837 if (filter
->plist
[direct
].name
)
5838 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->plist
[direct
].name
);
5839 filter
->plist
[direct
].name
= XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
5840 filter
->plist
[direct
].plist
= prefix_list_lookup(afi
, name
);
5842 /* Check if handling a regular peer. */
5843 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5844 /* Set override-flag and process peer route updates. */
5845 SET_FLAG(peer
->filter_override
[afi
][safi
][direct
],
5846 PEER_FT_PREFIX_LIST
);
5847 peer_on_policy_change(peer
, afi
, safi
,
5848 (direct
== FILTER_OUT
) ? 1 : 0);
5850 /* Skip peer-group mechanics for regular peers. */
5855 * Set configuration on all peer-group members, unless they are
5856 * explicitely overriding peer-group configuration.
5858 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5859 /* Skip peers with overridden configuration. */
5860 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
5861 PEER_FT_PREFIX_LIST
))
5864 /* Set configuration on peer-group member. */
5865 filter
= &member
->filter
[afi
][safi
];
5866 if (filter
->plist
[direct
].name
)
5867 XFREE(MTYPE_BGP_FILTER_NAME
,
5868 filter
->plist
[direct
].name
);
5869 filter
->plist
[direct
].name
=
5870 XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
5871 filter
->plist
[direct
].plist
= prefix_list_lookup(afi
, name
);
5873 /* Process peer route updates. */
5874 peer_on_policy_change(member
, afi
, safi
,
5875 (direct
== FILTER_OUT
) ? 1 : 0);
5881 int peer_prefix_list_unset(struct peer
*peer
, afi_t afi
, safi_t safi
,
5884 struct peer
*member
;
5885 struct bgp_filter
*filter
;
5886 struct listnode
*node
, *nnode
;
5888 if (direct
!= FILTER_IN
&& direct
!= FILTER_OUT
)
5889 return BGP_ERR_INVALID_VALUE
;
5891 /* Unset override-flag unconditionally. */
5892 UNSET_FLAG(peer
->filter_override
[afi
][safi
][direct
],
5893 PEER_FT_PREFIX_LIST
);
5895 /* Inherit configuration from peer-group if peer is member. */
5896 if (peer_group_active(peer
)) {
5897 PEER_STR_ATTR_INHERIT(peer
, peer
->group
,
5898 filter
[afi
][safi
].plist
[direct
].name
,
5899 MTYPE_BGP_FILTER_NAME
);
5900 PEER_ATTR_INHERIT(peer
, peer
->group
,
5901 filter
[afi
][safi
].plist
[direct
].plist
);
5903 /* Otherwise remove configuration from peer. */
5904 filter
= &peer
->filter
[afi
][safi
];
5905 if (filter
->plist
[direct
].name
)
5906 XFREE(MTYPE_BGP_FILTER_NAME
,
5907 filter
->plist
[direct
].name
);
5908 filter
->plist
[direct
].name
= NULL
;
5909 filter
->plist
[direct
].plist
= NULL
;
5912 /* Check if handling a regular peer. */
5913 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
5914 /* Process peer route updates. */
5915 peer_on_policy_change(peer
, afi
, safi
,
5916 (direct
== FILTER_OUT
) ? 1 : 0);
5918 /* Skip peer-group mechanics for regular peers. */
5923 * Remove configuration on all peer-group members, unless they are
5924 * explicitely overriding peer-group configuration.
5926 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
5927 /* Skip peers with overridden configuration. */
5928 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
5929 PEER_FT_PREFIX_LIST
))
5932 /* Remove configuration on peer-group member. */
5933 filter
= &member
->filter
[afi
][safi
];
5934 if (filter
->plist
[direct
].name
)
5935 XFREE(MTYPE_BGP_FILTER_NAME
,
5936 filter
->plist
[direct
].name
);
5937 filter
->plist
[direct
].name
= NULL
;
5938 filter
->plist
[direct
].plist
= NULL
;
5940 /* Process peer route updates. */
5941 peer_on_policy_change(member
, afi
, safi
,
5942 (direct
== FILTER_OUT
) ? 1 : 0);
5948 /* Update prefix-list list. */
5949 static void peer_prefix_list_update(struct prefix_list
*plist
)
5951 struct listnode
*mnode
, *mnnode
;
5952 struct listnode
*node
, *nnode
;
5955 struct peer_group
*group
;
5956 struct bgp_filter
*filter
;
5961 for (ALL_LIST_ELEMENTS(bm
->bgp
, mnode
, mnnode
, bgp
)) {
5964 * Update the prefix-list on update groups.
5966 update_group_policy_update(
5967 bgp
, BGP_POLICY_PREFIX_LIST
,
5968 plist
? prefix_list_name(plist
) : NULL
, 0, 0);
5970 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
5971 FOREACH_AFI_SAFI (afi
, safi
) {
5972 filter
= &peer
->filter
[afi
][safi
];
5974 for (direct
= FILTER_IN
; direct
< FILTER_MAX
;
5976 if (filter
->plist
[direct
].name
)
5977 filter
->plist
[direct
]
5978 .plist
= prefix_list_lookup(
5980 filter
->plist
[direct
]
5983 filter
->plist
[direct
].plist
=
5988 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, nnode
, group
)) {
5989 FOREACH_AFI_SAFI (afi
, safi
) {
5990 filter
= &group
->conf
->filter
[afi
][safi
];
5992 for (direct
= FILTER_IN
; direct
< FILTER_MAX
;
5994 if (filter
->plist
[direct
].name
)
5995 filter
->plist
[direct
]
5996 .plist
= prefix_list_lookup(
5998 filter
->plist
[direct
]
6001 filter
->plist
[direct
].plist
=
6009 int peer_aslist_set(struct peer
*peer
, afi_t afi
, safi_t safi
, int direct
,
6012 struct peer
*member
;
6013 struct bgp_filter
*filter
;
6014 struct listnode
*node
, *nnode
;
6016 if (direct
!= FILTER_IN
&& direct
!= FILTER_OUT
)
6017 return BGP_ERR_INVALID_VALUE
;
6019 /* Set configuration on peer. */
6020 filter
= &peer
->filter
[afi
][safi
];
6021 if (filter
->aslist
[direct
].name
)
6022 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->aslist
[direct
].name
);
6023 filter
->aslist
[direct
].name
= XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
6024 filter
->aslist
[direct
].aslist
= as_list_lookup(name
);
6026 /* Check if handling a regular peer. */
6027 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6028 /* Set override-flag and process peer route updates. */
6029 SET_FLAG(peer
->filter_override
[afi
][safi
][direct
],
6030 PEER_FT_FILTER_LIST
);
6031 peer_on_policy_change(peer
, afi
, safi
,
6032 (direct
== FILTER_OUT
) ? 1 : 0);
6034 /* Skip peer-group mechanics for regular peers. */
6039 * Set configuration on all peer-group members, unless they are
6040 * explicitely overriding peer-group configuration.
6042 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
6043 /* Skip peers with overridden configuration. */
6044 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
6045 PEER_FT_FILTER_LIST
))
6048 /* Set configuration on peer-group member. */
6049 filter
= &member
->filter
[afi
][safi
];
6050 if (filter
->aslist
[direct
].name
)
6051 XFREE(MTYPE_BGP_FILTER_NAME
,
6052 filter
->aslist
[direct
].name
);
6053 filter
->aslist
[direct
].name
=
6054 XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
6055 filter
->aslist
[direct
].aslist
= as_list_lookup(name
);
6057 /* Process peer route updates. */
6058 peer_on_policy_change(member
, afi
, safi
,
6059 (direct
== FILTER_OUT
) ? 1 : 0);
6065 int peer_aslist_unset(struct peer
*peer
, afi_t afi
, safi_t safi
, int direct
)
6067 struct peer
*member
;
6068 struct bgp_filter
*filter
;
6069 struct listnode
*node
, *nnode
;
6071 if (direct
!= FILTER_IN
&& direct
!= FILTER_OUT
)
6072 return BGP_ERR_INVALID_VALUE
;
6074 /* Unset override-flag unconditionally. */
6075 UNSET_FLAG(peer
->filter_override
[afi
][safi
][direct
],
6076 PEER_FT_FILTER_LIST
);
6078 /* Inherit configuration from peer-group if peer is member. */
6079 if (peer_group_active(peer
)) {
6080 PEER_STR_ATTR_INHERIT(peer
, peer
->group
,
6081 filter
[afi
][safi
].aslist
[direct
].name
,
6082 MTYPE_BGP_FILTER_NAME
);
6083 PEER_ATTR_INHERIT(peer
, peer
->group
,
6084 filter
[afi
][safi
].aslist
[direct
].aslist
);
6086 /* Otherwise remove configuration from peer. */
6087 filter
= &peer
->filter
[afi
][safi
];
6088 if (filter
->aslist
[direct
].name
)
6089 XFREE(MTYPE_BGP_FILTER_NAME
,
6090 filter
->aslist
[direct
].name
);
6091 filter
->aslist
[direct
].name
= NULL
;
6092 filter
->aslist
[direct
].aslist
= NULL
;
6095 /* Check if handling a regular peer. */
6096 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6097 /* Process peer route updates. */
6098 peer_on_policy_change(peer
, afi
, safi
,
6099 (direct
== FILTER_OUT
) ? 1 : 0);
6101 /* Skip peer-group mechanics for regular peers. */
6106 * Remove configuration on all peer-group members, unless they are
6107 * explicitely overriding peer-group configuration.
6109 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
6110 /* Skip peers with overridden configuration. */
6111 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
6112 PEER_FT_FILTER_LIST
))
6115 /* Remove configuration on peer-group member. */
6116 filter
= &member
->filter
[afi
][safi
];
6117 if (filter
->aslist
[direct
].name
)
6118 XFREE(MTYPE_BGP_FILTER_NAME
,
6119 filter
->aslist
[direct
].name
);
6120 filter
->aslist
[direct
].name
= NULL
;
6121 filter
->aslist
[direct
].aslist
= NULL
;
6123 /* Process peer route updates. */
6124 peer_on_policy_change(member
, afi
, safi
,
6125 (direct
== FILTER_OUT
) ? 1 : 0);
6131 static void peer_aslist_update(const char *aslist_name
)
6136 struct listnode
*mnode
, *mnnode
;
6137 struct listnode
*node
, *nnode
;
6140 struct peer_group
*group
;
6141 struct bgp_filter
*filter
;
6143 for (ALL_LIST_ELEMENTS(bm
->bgp
, mnode
, mnnode
, bgp
)) {
6144 update_group_policy_update(bgp
, BGP_POLICY_FILTER_LIST
,
6147 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
6148 FOREACH_AFI_SAFI (afi
, safi
) {
6149 filter
= &peer
->filter
[afi
][safi
];
6151 for (direct
= FILTER_IN
; direct
< FILTER_MAX
;
6153 if (filter
->aslist
[direct
].name
)
6154 filter
->aslist
[direct
]
6155 .aslist
= as_list_lookup(
6156 filter
->aslist
[direct
]
6159 filter
->aslist
[direct
].aslist
=
6164 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, nnode
, group
)) {
6165 FOREACH_AFI_SAFI (afi
, safi
) {
6166 filter
= &group
->conf
->filter
[afi
][safi
];
6168 for (direct
= FILTER_IN
; direct
< FILTER_MAX
;
6170 if (filter
->aslist
[direct
].name
)
6171 filter
->aslist
[direct
]
6172 .aslist
= as_list_lookup(
6173 filter
->aslist
[direct
]
6176 filter
->aslist
[direct
].aslist
=
6184 static void peer_aslist_add(char *aslist_name
)
6186 peer_aslist_update(aslist_name
);
6187 route_map_notify_dependencies((char *)aslist_name
,
6188 RMAP_EVENT_ASLIST_ADDED
);
6191 static void peer_aslist_del(const char *aslist_name
)
6193 peer_aslist_update(aslist_name
);
6194 route_map_notify_dependencies(aslist_name
, RMAP_EVENT_ASLIST_DELETED
);
6198 int peer_route_map_set(struct peer
*peer
, afi_t afi
, safi_t safi
, int direct
,
6199 const char *name
, struct route_map
*route_map
)
6201 struct peer
*member
;
6202 struct bgp_filter
*filter
;
6203 struct listnode
*node
, *nnode
;
6205 if (direct
!= RMAP_IN
&& direct
!= RMAP_OUT
)
6206 return BGP_ERR_INVALID_VALUE
;
6208 /* Set configuration on peer. */
6209 filter
= &peer
->filter
[afi
][safi
];
6210 if (filter
->map
[direct
].name
) {
6211 /* If the neighbor is configured with the same route-map
6212 * again then, ignore the duplicate configuration.
6214 if (strcmp(filter
->map
[direct
].name
, name
) == 0)
6217 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->map
[direct
].name
);
6219 route_map_counter_decrement(filter
->map
[direct
].map
);
6220 filter
->map
[direct
].name
= XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
6221 filter
->map
[direct
].map
= route_map
;
6222 route_map_counter_increment(route_map
);
6224 /* Check if handling a regular peer. */
6225 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6226 /* Set override-flag and process peer route updates. */
6227 SET_FLAG(peer
->filter_override
[afi
][safi
][direct
],
6229 peer_on_policy_change(peer
, afi
, safi
,
6230 (direct
== RMAP_OUT
) ? 1 : 0);
6232 /* Skip peer-group mechanics for regular peers. */
6237 * Set configuration on all peer-group members, unless they are
6238 * explicitely overriding peer-group configuration.
6240 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
6241 /* Skip peers with overridden configuration. */
6242 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
6246 /* Set configuration on peer-group member. */
6247 filter
= &member
->filter
[afi
][safi
];
6248 if (filter
->map
[direct
].name
)
6249 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->map
[direct
].name
);
6250 route_map_counter_decrement(filter
->map
[direct
].map
);
6251 filter
->map
[direct
].name
= XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
6252 filter
->map
[direct
].map
= route_map
;
6253 route_map_counter_increment(route_map
);
6255 /* Process peer route updates. */
6256 peer_on_policy_change(member
, afi
, safi
,
6257 (direct
== RMAP_OUT
) ? 1 : 0);
6262 /* Unset route-map from the peer. */
6263 int peer_route_map_unset(struct peer
*peer
, afi_t afi
, safi_t safi
, int direct
)
6265 struct peer
*member
;
6266 struct bgp_filter
*filter
;
6267 struct listnode
*node
, *nnode
;
6269 if (direct
!= RMAP_IN
&& direct
!= RMAP_OUT
)
6270 return BGP_ERR_INVALID_VALUE
;
6272 /* Unset override-flag unconditionally. */
6273 UNSET_FLAG(peer
->filter_override
[afi
][safi
][direct
], PEER_FT_ROUTE_MAP
);
6275 /* Inherit configuration from peer-group if peer is member. */
6276 if (peer_group_active(peer
)) {
6277 PEER_STR_ATTR_INHERIT(peer
, peer
->group
,
6278 filter
[afi
][safi
].map
[direct
].name
,
6279 MTYPE_BGP_FILTER_NAME
);
6280 PEER_ATTR_INHERIT(peer
, peer
->group
,
6281 filter
[afi
][safi
].map
[direct
].map
);
6283 /* Otherwise remove configuration from peer. */
6284 filter
= &peer
->filter
[afi
][safi
];
6285 if (filter
->map
[direct
].name
)
6286 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->map
[direct
].name
);
6287 route_map_counter_decrement(filter
->map
[direct
].map
);
6288 filter
->map
[direct
].name
= NULL
;
6289 filter
->map
[direct
].map
= NULL
;
6292 /* Check if handling a regular peer. */
6293 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6294 /* Process peer route updates. */
6295 peer_on_policy_change(peer
, afi
, safi
,
6296 (direct
== RMAP_OUT
) ? 1 : 0);
6298 /* Skip peer-group mechanics for regular peers. */
6303 * Remove configuration on all peer-group members, unless they are
6304 * explicitely overriding peer-group configuration.
6306 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
6307 /* Skip peers with overridden configuration. */
6308 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][direct
],
6312 /* Remove configuration on peer-group member. */
6313 filter
= &member
->filter
[afi
][safi
];
6314 if (filter
->map
[direct
].name
)
6315 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->map
[direct
].name
);
6316 route_map_counter_decrement(filter
->map
[direct
].map
);
6317 filter
->map
[direct
].name
= NULL
;
6318 filter
->map
[direct
].map
= NULL
;
6320 /* Process peer route updates. */
6321 peer_on_policy_change(member
, afi
, safi
,
6322 (direct
== RMAP_OUT
) ? 1 : 0);
6328 /* Set unsuppress-map to the peer. */
6329 int peer_unsuppress_map_set(struct peer
*peer
, afi_t afi
, safi_t safi
,
6330 const char *name
, struct route_map
*route_map
)
6332 struct peer
*member
;
6333 struct bgp_filter
*filter
;
6334 struct listnode
*node
, *nnode
;
6336 /* Set configuration on peer. */
6337 filter
= &peer
->filter
[afi
][safi
];
6338 if (filter
->usmap
.name
)
6339 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->usmap
.name
);
6340 route_map_counter_decrement(filter
->usmap
.map
);
6341 filter
->usmap
.name
= XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
6342 filter
->usmap
.map
= route_map
;
6343 route_map_counter_increment(route_map
);
6345 /* Check if handling a regular peer. */
6346 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6347 /* Set override-flag and process peer route updates. */
6348 SET_FLAG(peer
->filter_override
[afi
][safi
][0],
6349 PEER_FT_UNSUPPRESS_MAP
);
6350 peer_on_policy_change(peer
, afi
, safi
, 1);
6352 /* Skip peer-group mechanics for regular peers. */
6357 * Set configuration on all peer-group members, unless they are
6358 * explicitely overriding peer-group configuration.
6360 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
6361 /* Skip peers with overridden configuration. */
6362 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][0],
6363 PEER_FT_UNSUPPRESS_MAP
))
6366 /* Set configuration on peer-group member. */
6367 filter
= &member
->filter
[afi
][safi
];
6368 if (filter
->usmap
.name
)
6369 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->usmap
.name
);
6370 route_map_counter_decrement(filter
->usmap
.map
);
6371 filter
->usmap
.name
= XSTRDUP(MTYPE_BGP_FILTER_NAME
, name
);
6372 filter
->usmap
.map
= route_map
;
6373 route_map_counter_increment(route_map
);
6375 /* Process peer route updates. */
6376 peer_on_policy_change(member
, afi
, safi
, 1);
6382 /* Unset route-map from the peer. */
6383 int peer_unsuppress_map_unset(struct peer
*peer
, afi_t afi
, safi_t safi
)
6385 struct peer
*member
;
6386 struct bgp_filter
*filter
;
6387 struct listnode
*node
, *nnode
;
6389 /* Unset override-flag unconditionally. */
6390 UNSET_FLAG(peer
->filter_override
[afi
][safi
][0], PEER_FT_UNSUPPRESS_MAP
);
6392 /* Inherit configuration from peer-group if peer is member. */
6393 if (peer_group_active(peer
)) {
6394 PEER_STR_ATTR_INHERIT(peer
, peer
->group
,
6395 filter
[afi
][safi
].usmap
.name
,
6396 MTYPE_BGP_FILTER_NAME
);
6397 PEER_ATTR_INHERIT(peer
, peer
->group
,
6398 filter
[afi
][safi
].usmap
.map
);
6400 /* Otherwise remove configuration from peer. */
6401 filter
= &peer
->filter
[afi
][safi
];
6402 if (filter
->usmap
.name
)
6403 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->usmap
.name
);
6404 route_map_counter_decrement(filter
->usmap
.map
);
6405 filter
->usmap
.name
= NULL
;
6406 filter
->usmap
.map
= NULL
;
6409 /* Check if handling a regular peer. */
6410 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6411 /* Process peer route updates. */
6412 peer_on_policy_change(peer
, afi
, safi
, 1);
6414 /* Skip peer-group mechanics for regular peers. */
6419 * Remove configuration on all peer-group members, unless they are
6420 * explicitely overriding peer-group configuration.
6422 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
6423 /* Skip peers with overridden configuration. */
6424 if (CHECK_FLAG(member
->filter_override
[afi
][safi
][0],
6425 PEER_FT_UNSUPPRESS_MAP
))
6428 /* Remove configuration on peer-group member. */
6429 filter
= &member
->filter
[afi
][safi
];
6430 if (filter
->usmap
.name
)
6431 XFREE(MTYPE_BGP_FILTER_NAME
, filter
->usmap
.name
);
6432 route_map_counter_decrement(filter
->usmap
.map
);
6433 filter
->usmap
.name
= NULL
;
6434 filter
->usmap
.map
= NULL
;
6436 /* Process peer route updates. */
6437 peer_on_policy_change(member
, afi
, safi
, 1);
6443 int peer_maximum_prefix_set(struct peer
*peer
, afi_t afi
, safi_t safi
,
6444 uint32_t max
, uint8_t threshold
, int warning
,
6447 struct peer
*member
;
6448 struct listnode
*node
, *nnode
;
6450 /* Set flags and configuration on peer. */
6451 peer_af_flag_set(peer
, afi
, safi
, PEER_FLAG_MAX_PREFIX
);
6453 peer_af_flag_set(peer
, afi
, safi
, PEER_FLAG_MAX_PREFIX_WARNING
);
6455 peer_af_flag_unset(peer
, afi
, safi
,
6456 PEER_FLAG_MAX_PREFIX_WARNING
);
6458 peer
->pmax
[afi
][safi
] = max
;
6459 peer
->pmax_threshold
[afi
][safi
] = threshold
;
6460 peer
->pmax_restart
[afi
][safi
] = restart
;
6462 /* Check if handling a regular peer. */
6463 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6464 /* Re-check if peer violates maximum-prefix. */
6465 if ((peer
->status
== Established
) && (peer
->afc
[afi
][safi
]))
6466 bgp_maximum_prefix_overflow(peer
, afi
, safi
, 1);
6468 /* Skip peer-group mechanics for regular peers. */
6473 * Set flags and configuration on all peer-group members, unless they
6474 * are explicitely overriding peer-group configuration.
6476 for (ALL_LIST_ELEMENTS(peer
->group
->peer
, node
, nnode
, member
)) {
6477 /* Skip peers with overridden configuration. */
6478 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
6479 PEER_FLAG_MAX_PREFIX
))
6482 /* Set flag and configuration on peer-group member. */
6483 member
->pmax
[afi
][safi
] = max
;
6484 member
->pmax_threshold
[afi
][safi
] = threshold
;
6485 member
->pmax_restart
[afi
][safi
] = restart
;
6487 SET_FLAG(member
->af_flags
[afi
][safi
],
6488 PEER_FLAG_MAX_PREFIX_WARNING
);
6490 UNSET_FLAG(member
->af_flags
[afi
][safi
],
6491 PEER_FLAG_MAX_PREFIX_WARNING
);
6493 /* Re-check if peer violates maximum-prefix. */
6494 if ((member
->status
== Established
) && (member
->afc
[afi
][safi
]))
6495 bgp_maximum_prefix_overflow(member
, afi
, safi
, 1);
6501 int peer_maximum_prefix_unset(struct peer
*peer
, afi_t afi
, safi_t safi
)
6503 /* Inherit configuration from peer-group if peer is member. */
6504 if (peer_group_active(peer
)) {
6505 peer_af_flag_inherit(peer
, afi
, safi
, PEER_FLAG_MAX_PREFIX
);
6506 peer_af_flag_inherit(peer
, afi
, safi
,
6507 PEER_FLAG_MAX_PREFIX_WARNING
);
6508 PEER_ATTR_INHERIT(peer
, peer
->group
, pmax
[afi
][safi
]);
6509 PEER_ATTR_INHERIT(peer
, peer
->group
, pmax_threshold
[afi
][safi
]);
6510 PEER_ATTR_INHERIT(peer
, peer
->group
, pmax_restart
[afi
][safi
]);
6515 /* Remove flags and configuration from peer. */
6516 peer_af_flag_unset(peer
, afi
, safi
, PEER_FLAG_MAX_PREFIX
);
6517 peer_af_flag_unset(peer
, afi
, safi
, PEER_FLAG_MAX_PREFIX_WARNING
);
6518 peer
->pmax
[afi
][safi
] = 0;
6519 peer
->pmax_threshold
[afi
][safi
] = 0;
6520 peer
->pmax_restart
[afi
][safi
] = 0;
6523 * Remove flags and configuration from all peer-group members, unless
6524 * they are explicitely overriding peer-group configuration.
6526 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6527 struct peer
*member
;
6528 struct listnode
*node
;
6530 for (ALL_LIST_ELEMENTS_RO(peer
->group
->peer
, node
, member
)) {
6531 /* Skip peers with overridden configuration. */
6532 if (CHECK_FLAG(member
->af_flags_override
[afi
][safi
],
6533 PEER_FLAG_MAX_PREFIX
))
6536 /* Remove flag and configuration on peer-group member.
6538 UNSET_FLAG(member
->af_flags
[afi
][safi
],
6539 PEER_FLAG_MAX_PREFIX
);
6540 UNSET_FLAG(member
->af_flags
[afi
][safi
],
6541 PEER_FLAG_MAX_PREFIX_WARNING
);
6542 member
->pmax
[afi
][safi
] = 0;
6543 member
->pmax_threshold
[afi
][safi
] = 0;
6544 member
->pmax_restart
[afi
][safi
] = 0;
6551 int is_ebgp_multihop_configured(struct peer
*peer
)
6553 struct peer_group
*group
;
6554 struct listnode
*node
, *nnode
;
6557 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6558 group
= peer
->group
;
6559 if ((peer_sort(peer
) != BGP_PEER_IBGP
)
6560 && (group
->conf
->ttl
!= BGP_DEFAULT_TTL
))
6563 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer1
)) {
6564 if ((peer_sort(peer1
) != BGP_PEER_IBGP
)
6565 && (peer1
->ttl
!= BGP_DEFAULT_TTL
))
6569 if ((peer_sort(peer
) != BGP_PEER_IBGP
)
6570 && (peer
->ttl
!= BGP_DEFAULT_TTL
))
6576 /* Set # of hops between us and BGP peer. */
6577 int peer_ttl_security_hops_set(struct peer
*peer
, int gtsm_hops
)
6579 struct peer_group
*group
;
6580 struct listnode
*node
, *nnode
;
6583 zlog_debug("peer_ttl_security_hops_set: set gtsm_hops to %d for %s",
6584 gtsm_hops
, peer
->host
);
6586 /* We cannot configure ttl-security hops when ebgp-multihop is already
6587 set. For non peer-groups, the check is simple. For peer-groups,
6589 slightly messy, because we need to check both the peer-group
6591 and all peer-group members for any trace of ebgp-multihop
6593 before actually applying the ttl-security rules. Cisco really made a
6594 mess of this configuration parameter, and OpenBGPD got it right.
6597 if ((peer
->gtsm_hops
== 0) && (peer
->sort
!= BGP_PEER_IBGP
)) {
6598 if (is_ebgp_multihop_configured(peer
))
6599 return BGP_ERR_NO_EBGP_MULTIHOP_WITH_TTLHACK
;
6601 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6602 peer
->gtsm_hops
= gtsm_hops
;
6604 /* Calling ebgp multihop also resets the session.
6605 * On restart, NHT will get setup correctly as will the
6606 * min & max ttls on the socket. The return value is
6609 ret
= peer_ebgp_multihop_set(peer
, MAXTTL
);
6614 group
= peer
->group
;
6615 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
,
6617 peer
->gtsm_hops
= group
->conf
->gtsm_hops
;
6619 /* Calling ebgp multihop also resets the
6621 * On restart, NHT will get setup correctly as
6623 * min & max ttls on the socket. The return
6627 peer_ebgp_multihop_set(peer
, MAXTTL
);
6631 /* Post the first gtsm setup or if its ibgp, maxttl setting
6633 * necessary, just set the minttl.
6635 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6636 peer
->gtsm_hops
= gtsm_hops
;
6639 sockopt_minttl(peer
->su
.sa
.sa_family
, peer
->fd
,
6640 MAXTTL
+ 1 - gtsm_hops
);
6641 if ((peer
->status
< Established
) && peer
->doppelganger
6642 && (peer
->doppelganger
->fd
>= 0))
6643 sockopt_minttl(peer
->su
.sa
.sa_family
,
6644 peer
->doppelganger
->fd
,
6645 MAXTTL
+ 1 - gtsm_hops
);
6647 group
= peer
->group
;
6648 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
,
6650 peer
->gtsm_hops
= group
->conf
->gtsm_hops
;
6652 /* Change setting of existing peer
6653 * established then change value (may break
6655 * not established yet (teardown session and
6657 * no session then do nothing (will get
6658 * handled by next connection)
6660 if (peer
->fd
>= 0 && peer
->gtsm_hops
!= 0)
6662 peer
->su
.sa
.sa_family
, peer
->fd
,
6663 MAXTTL
+ 1 - peer
->gtsm_hops
);
6664 if ((peer
->status
< Established
)
6665 && peer
->doppelganger
6666 && (peer
->doppelganger
->fd
>= 0))
6667 sockopt_minttl(peer
->su
.sa
.sa_family
,
6668 peer
->doppelganger
->fd
,
6669 MAXTTL
+ 1 - gtsm_hops
);
6677 int peer_ttl_security_hops_unset(struct peer
*peer
)
6679 struct peer_group
*group
;
6680 struct listnode
*node
, *nnode
;
6683 zlog_debug("peer_ttl_security_hops_unset: set gtsm_hops to zero for %s",
6686 /* if a peer-group member, then reset to peer-group default rather than
6688 if (peer_group_active(peer
))
6689 peer
->gtsm_hops
= peer
->group
->conf
->gtsm_hops
;
6691 peer
->gtsm_hops
= 0;
6693 if (!CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
6694 /* Invoking ebgp_multihop_set will set the TTL back to the
6696 * value as well as restting the NHT and such. The session is
6699 if (peer
->sort
== BGP_PEER_EBGP
)
6700 ret
= peer_ebgp_multihop_unset(peer
);
6703 sockopt_minttl(peer
->su
.sa
.sa_family
, peer
->fd
,
6706 if ((peer
->status
< Established
) && peer
->doppelganger
6707 && (peer
->doppelganger
->fd
>= 0))
6708 sockopt_minttl(peer
->su
.sa
.sa_family
,
6709 peer
->doppelganger
->fd
, 0);
6712 group
= peer
->group
;
6713 for (ALL_LIST_ELEMENTS(group
->peer
, node
, nnode
, peer
)) {
6714 peer
->gtsm_hops
= 0;
6715 if (peer
->sort
== BGP_PEER_EBGP
)
6716 ret
= peer_ebgp_multihop_unset(peer
);
6719 sockopt_minttl(peer
->su
.sa
.sa_family
,
6722 if ((peer
->status
< Established
)
6723 && peer
->doppelganger
6724 && (peer
->doppelganger
->fd
>= 0))
6725 sockopt_minttl(peer
->su
.sa
.sa_family
,
6726 peer
->doppelganger
->fd
,
6736 * If peer clear is invoked in a loop for all peers on the BGP instance,
6737 * it may end up freeing the doppelganger, and if this was the next node
6738 * to the current node, we would end up accessing the freed next node.
6739 * Pass along additional parameter which can be updated if next node
6740 * is freed; only required when walking the peer list on BGP instance.
6742 int peer_clear(struct peer
*peer
, struct listnode
**nnode
)
6744 if (!CHECK_FLAG(peer
->flags
, PEER_FLAG_SHUTDOWN
)) {
6745 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_PREFIX_OVERFLOW
)) {
6746 UNSET_FLAG(peer
->sflags
, PEER_STATUS_PREFIX_OVERFLOW
);
6747 if (peer
->t_pmax_restart
) {
6748 BGP_TIMER_OFF(peer
->t_pmax_restart
);
6749 if (bgp_debug_neighbor_events(peer
))
6751 "%s Maximum-prefix restart timer canceled",
6754 BGP_EVENT_ADD(peer
, BGP_Start
);
6758 peer
->v_start
= BGP_INIT_START_TIMER
;
6759 if (BGP_IS_VALID_STATE_FOR_NOTIF(peer
->status
))
6760 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
6761 BGP_NOTIFY_CEASE_ADMIN_RESET
);
6763 bgp_session_reset_safe(peer
, nnode
);
6768 int peer_clear_soft(struct peer
*peer
, afi_t afi
, safi_t safi
,
6769 enum bgp_clear_type stype
)
6771 struct peer_af
*paf
;
6773 if (peer
->status
!= Established
)
6776 if (!peer
->afc
[afi
][safi
])
6777 return BGP_ERR_AF_UNCONFIGURED
;
6779 peer
->rtt
= sockopt_tcp_rtt(peer
->fd
);
6781 if (stype
== BGP_CLEAR_SOFT_OUT
|| stype
== BGP_CLEAR_SOFT_BOTH
) {
6782 /* Clear the "neighbor x.x.x.x default-originate" flag */
6783 paf
= peer_af_find(peer
, afi
, safi
);
6784 if (paf
&& paf
->subgroup
6785 && CHECK_FLAG(paf
->subgroup
->sflags
,
6786 SUBGRP_STATUS_DEFAULT_ORIGINATE
))
6787 UNSET_FLAG(paf
->subgroup
->sflags
,
6788 SUBGRP_STATUS_DEFAULT_ORIGINATE
);
6790 bgp_announce_route(peer
, afi
, safi
);
6793 if (stype
== BGP_CLEAR_SOFT_IN_ORF_PREFIX
) {
6794 if (CHECK_FLAG(peer
->af_cap
[afi
][safi
],
6795 PEER_CAP_ORF_PREFIX_SM_ADV
)
6796 && (CHECK_FLAG(peer
->af_cap
[afi
][safi
],
6797 PEER_CAP_ORF_PREFIX_RM_RCV
)
6798 || CHECK_FLAG(peer
->af_cap
[afi
][safi
],
6799 PEER_CAP_ORF_PREFIX_RM_OLD_RCV
))) {
6800 struct bgp_filter
*filter
= &peer
->filter
[afi
][safi
];
6801 uint8_t prefix_type
;
6803 if (CHECK_FLAG(peer
->af_cap
[afi
][safi
],
6804 PEER_CAP_ORF_PREFIX_RM_RCV
))
6805 prefix_type
= ORF_TYPE_PREFIX
;
6807 prefix_type
= ORF_TYPE_PREFIX_OLD
;
6809 if (filter
->plist
[FILTER_IN
].plist
) {
6810 if (CHECK_FLAG(peer
->af_sflags
[afi
][safi
],
6811 PEER_STATUS_ORF_PREFIX_SEND
))
6812 bgp_route_refresh_send(
6813 peer
, afi
, safi
, prefix_type
,
6815 bgp_route_refresh_send(peer
, afi
, safi
,
6817 REFRESH_IMMEDIATE
, 0);
6819 if (CHECK_FLAG(peer
->af_sflags
[afi
][safi
],
6820 PEER_STATUS_ORF_PREFIX_SEND
))
6821 bgp_route_refresh_send(
6822 peer
, afi
, safi
, prefix_type
,
6823 REFRESH_IMMEDIATE
, 1);
6825 bgp_route_refresh_send(peer
, afi
, safi
,
6832 if (stype
== BGP_CLEAR_SOFT_IN
|| stype
== BGP_CLEAR_SOFT_BOTH
6833 || stype
== BGP_CLEAR_SOFT_IN_ORF_PREFIX
) {
6834 /* If neighbor has soft reconfiguration inbound flag.
6835 Use Adj-RIB-In database. */
6836 if (CHECK_FLAG(peer
->af_flags
[afi
][safi
],
6837 PEER_FLAG_SOFT_RECONFIG
))
6838 bgp_soft_reconfig_in(peer
, afi
, safi
);
6840 /* If neighbor has route refresh capability, send route
6842 message to the peer. */
6843 if (CHECK_FLAG(peer
->cap
, PEER_CAP_REFRESH_OLD_RCV
)
6844 || CHECK_FLAG(peer
->cap
, PEER_CAP_REFRESH_NEW_RCV
))
6845 bgp_route_refresh_send(peer
, afi
, safi
, 0, 0,
6848 return BGP_ERR_SOFT_RECONFIG_UNCONFIGURED
;
6854 /* Display peer uptime.*/
6855 char *peer_uptime(time_t uptime2
, char *buf
, size_t len
, bool use_json
,
6858 time_t uptime1
, epoch_tbuf
;
6861 /* If there is no connection has been done before print `never'. */
6864 json_object_string_add(json
, "peerUptime", "never");
6865 json_object_int_add(json
, "peerUptimeMsec", 0);
6867 snprintf(buf
, len
, "never");
6871 /* Get current time. */
6872 uptime1
= bgp_clock();
6874 tm
= gmtime(&uptime1
);
6876 if (uptime1
< ONE_DAY_SECOND
)
6877 snprintf(buf
, len
, "%02d:%02d:%02d", tm
->tm_hour
, tm
->tm_min
,
6879 else if (uptime1
< ONE_WEEK_SECOND
)
6880 snprintf(buf
, len
, "%dd%02dh%02dm", tm
->tm_yday
, tm
->tm_hour
,
6882 else if (uptime1
< ONE_YEAR_SECOND
)
6883 snprintf(buf
, len
, "%02dw%dd%02dh", tm
->tm_yday
/ 7,
6884 tm
->tm_yday
- ((tm
->tm_yday
/ 7) * 7), tm
->tm_hour
);
6886 snprintf(buf
, len
, "%02dy%02dw%dd", tm
->tm_year
- 70,
6888 tm
->tm_yday
- ((tm
->tm_yday
/ 7) * 7));
6891 epoch_tbuf
= time(NULL
) - uptime1
;
6892 json_object_string_add(json
, "peerUptime", buf
);
6893 json_object_int_add(json
, "peerUptimeMsec", uptime1
* 1000);
6894 json_object_int_add(json
, "peerUptimeEstablishedEpoch",
6901 static void bgp_config_write_filter(struct vty
*vty
, struct peer
*peer
,
6902 afi_t afi
, safi_t safi
)
6904 struct bgp_filter
*filter
;
6908 filter
= &peer
->filter
[afi
][safi
];
6910 /* distribute-list. */
6911 if (peergroup_filter_check(peer
, afi
, safi
, PEER_FT_DISTRIBUTE_LIST
,
6913 vty_out(vty
, " neighbor %s distribute-list %s in\n", addr
,
6914 filter
->dlist
[FILTER_IN
].name
);
6916 if (peergroup_filter_check(peer
, afi
, safi
, PEER_FT_DISTRIBUTE_LIST
,
6918 vty_out(vty
, " neighbor %s distribute-list %s out\n", addr
,
6919 filter
->dlist
[FILTER_OUT
].name
);
6922 if (peergroup_filter_check(peer
, afi
, safi
, PEER_FT_PREFIX_LIST
,
6924 vty_out(vty
, " neighbor %s prefix-list %s in\n", addr
,
6925 filter
->plist
[FILTER_IN
].name
);
6927 if (peergroup_filter_check(peer
, afi
, safi
, PEER_FT_PREFIX_LIST
,
6929 vty_out(vty
, " neighbor %s prefix-list %s out\n", addr
,
6930 filter
->plist
[FILTER_OUT
].name
);
6933 if (peergroup_filter_check(peer
, afi
, safi
, PEER_FT_ROUTE_MAP
, RMAP_IN
))
6934 vty_out(vty
, " neighbor %s route-map %s in\n", addr
,
6935 filter
->map
[RMAP_IN
].name
);
6937 if (peergroup_filter_check(peer
, afi
, safi
, PEER_FT_ROUTE_MAP
,
6939 vty_out(vty
, " neighbor %s route-map %s out\n", addr
,
6940 filter
->map
[RMAP_OUT
].name
);
6942 /* unsuppress-map */
6943 if (peergroup_filter_check(peer
, afi
, safi
, PEER_FT_UNSUPPRESS_MAP
, 0))
6944 vty_out(vty
, " neighbor %s unsuppress-map %s\n", addr
,
6945 filter
->usmap
.name
);
6948 if (peergroup_filter_check(peer
, afi
, safi
, PEER_FT_FILTER_LIST
,
6950 vty_out(vty
, " neighbor %s filter-list %s in\n", addr
,
6951 filter
->aslist
[FILTER_IN
].name
);
6953 if (peergroup_filter_check(peer
, afi
, safi
, PEER_FT_FILTER_LIST
,
6955 vty_out(vty
, " neighbor %s filter-list %s out\n", addr
,
6956 filter
->aslist
[FILTER_OUT
].name
);
6959 /* BGP peer configuration display function. */
6960 static void bgp_config_write_peer_global(struct vty
*vty
, struct bgp
*bgp
,
6963 struct peer
*g_peer
= NULL
;
6964 char buf
[SU_ADDRSTRLEN
];
6966 int if_pg_printed
= false;
6967 int if_ras_printed
= false;
6969 /* Skip dynamic neighbors. */
6970 if (peer_dynamic_neighbor(peer
))
6974 addr
= peer
->conf_if
;
6978 /************************************
6979 ****** Global to the neighbor ******
6980 ************************************/
6981 if (peer
->conf_if
) {
6982 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_IFPEER_V6ONLY
))
6983 vty_out(vty
, " neighbor %s interface v6only", addr
);
6985 vty_out(vty
, " neighbor %s interface", addr
);
6987 if (peer_group_active(peer
)) {
6988 vty_out(vty
, " peer-group %s", peer
->group
->name
);
6989 if_pg_printed
= true;
6990 } else if (peer
->as_type
== AS_SPECIFIED
) {
6991 vty_out(vty
, " remote-as %u", peer
->as
);
6992 if_ras_printed
= true;
6993 } else if (peer
->as_type
== AS_INTERNAL
) {
6994 vty_out(vty
, " remote-as internal");
6995 if_ras_printed
= true;
6996 } else if (peer
->as_type
== AS_EXTERNAL
) {
6997 vty_out(vty
, " remote-as external");
6998 if_ras_printed
= true;
7004 /* remote-as and peer-group */
7005 /* peer is a member of a peer-group */
7006 if (peer_group_active(peer
)) {
7007 g_peer
= peer
->group
->conf
;
7009 if (g_peer
->as_type
== AS_UNSPECIFIED
&& !if_ras_printed
) {
7010 if (peer
->as_type
== AS_SPECIFIED
) {
7011 vty_out(vty
, " neighbor %s remote-as %u\n",
7013 } else if (peer
->as_type
== AS_INTERNAL
) {
7015 " neighbor %s remote-as internal\n",
7017 } else if (peer
->as_type
== AS_EXTERNAL
) {
7019 " neighbor %s remote-as external\n",
7024 /* For swpX peers we displayed the peer-group
7025 * via 'neighbor swpX interface peer-group PGNAME' */
7027 vty_out(vty
, " neighbor %s peer-group %s\n", addr
,
7031 /* peer is NOT a member of a peer-group */
7033 /* peer is a peer-group, declare the peer-group */
7034 if (CHECK_FLAG(peer
->sflags
, PEER_STATUS_GROUP
)) {
7035 vty_out(vty
, " neighbor %s peer-group\n", addr
);
7038 if (!if_ras_printed
) {
7039 if (peer
->as_type
== AS_SPECIFIED
) {
7040 vty_out(vty
, " neighbor %s remote-as %u\n",
7042 } else if (peer
->as_type
== AS_INTERNAL
) {
7044 " neighbor %s remote-as internal\n",
7046 } else if (peer
->as_type
== AS_EXTERNAL
) {
7048 " neighbor %s remote-as external\n",
7055 if (peergroup_flag_check(peer
, PEER_FLAG_LOCAL_AS
)) {
7056 vty_out(vty
, " neighbor %s local-as %u", addr
,
7057 peer
->change_local_as
);
7058 if (peergroup_flag_check(peer
, PEER_FLAG_LOCAL_AS_NO_PREPEND
))
7059 vty_out(vty
, " no-prepend");
7060 if (peergroup_flag_check(peer
, PEER_FLAG_LOCAL_AS_REPLACE_AS
))
7061 vty_out(vty
, " replace-as");
7067 vty_out(vty
, " neighbor %s description %s\n", addr
, peer
->desc
);
7071 if (peergroup_flag_check(peer
, PEER_FLAG_SHUTDOWN
)) {
7072 if (peer
->tx_shutdown_message
)
7073 vty_out(vty
, " neighbor %s shutdown message %s\n", addr
,
7074 peer
->tx_shutdown_message
);
7076 vty_out(vty
, " neighbor %s shutdown\n", addr
);
7080 if (peer
->bfd_info
) {
7081 if (!peer_group_active(peer
) || !g_peer
->bfd_info
) {
7082 bgp_bfd_peer_config_write(vty
, peer
, addr
);
7087 if (peergroup_flag_check(peer
, PEER_FLAG_PASSWORD
))
7088 vty_out(vty
, " neighbor %s password %s\n", addr
,
7092 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_LONESOUL
)) {
7093 if (!peer_group_active(peer
)) {
7094 vty_out(vty
, " neighbor %s solo\n", addr
);
7099 if (peer
->port
!= BGP_PORT_DEFAULT
) {
7100 vty_out(vty
, " neighbor %s port %d\n", addr
, peer
->port
);
7103 /* Local interface name */
7105 vty_out(vty
, " neighbor %s interface %s\n", addr
, peer
->ifname
);
7109 if (peergroup_flag_check(peer
, PEER_FLAG_PASSIVE
))
7110 vty_out(vty
, " neighbor %s passive\n", addr
);
7113 if (peer
->sort
!= BGP_PEER_IBGP
&& peer
->ttl
!= BGP_DEFAULT_TTL
7114 && !(peer
->gtsm_hops
!= 0 && peer
->ttl
== MAXTTL
)) {
7115 if (!peer_group_active(peer
) || g_peer
->ttl
!= peer
->ttl
) {
7116 vty_out(vty
, " neighbor %s ebgp-multihop %d\n", addr
,
7121 /* ttl-security hops */
7122 if (peer
->gtsm_hops
!= 0) {
7123 if (!peer_group_active(peer
)
7124 || g_peer
->gtsm_hops
!= peer
->gtsm_hops
) {
7125 vty_out(vty
, " neighbor %s ttl-security hops %d\n",
7126 addr
, peer
->gtsm_hops
);
7130 /* disable-connected-check */
7131 if (peergroup_flag_check(peer
, PEER_FLAG_DISABLE_CONNECTED_CHECK
))
7132 vty_out(vty
, " neighbor %s disable-connected-check\n", addr
);
7134 /* enforce-first-as */
7135 if (peergroup_flag_check(peer
, PEER_FLAG_ENFORCE_FIRST_AS
))
7136 vty_out(vty
, " neighbor %s enforce-first-as\n", addr
);
7139 if (peergroup_flag_check(peer
, PEER_FLAG_UPDATE_SOURCE
)) {
7140 if (peer
->update_source
)
7141 vty_out(vty
, " neighbor %s update-source %s\n", addr
,
7142 sockunion2str(peer
->update_source
, buf
,
7144 else if (peer
->update_if
)
7145 vty_out(vty
, " neighbor %s update-source %s\n", addr
,
7149 /* advertisement-interval */
7150 if (peergroup_flag_check(peer
, PEER_FLAG_ROUTEADV
))
7151 vty_out(vty
, " neighbor %s advertisement-interval %u\n", addr
,
7155 if (peergroup_flag_check(peer
, PEER_FLAG_TIMER
))
7156 vty_out(vty
, " neighbor %s timers %u %u\n", addr
,
7157 peer
->keepalive
, peer
->holdtime
);
7159 /* timers connect */
7160 if (peergroup_flag_check(peer
, PEER_FLAG_TIMER_CONNECT
))
7161 vty_out(vty
, " neighbor %s timers connect %u\n", addr
,
7164 /* capability dynamic */
7165 if (peergroup_flag_check(peer
, PEER_FLAG_DYNAMIC_CAPABILITY
))
7166 vty_out(vty
, " neighbor %s capability dynamic\n", addr
);
7168 /* capability extended-nexthop */
7169 if (peergroup_flag_check(peer
, PEER_FLAG_CAPABILITY_ENHE
)) {
7170 if (!peer
->conf_if
) {
7171 if (CHECK_FLAG(peer
->flags_invert
,
7172 PEER_FLAG_CAPABILITY_ENHE
))
7174 " no neighbor %s capability extended-nexthop\n",
7178 " neighbor %s capability extended-nexthop\n",
7183 /* dont-capability-negotiation */
7184 if (peergroup_flag_check(peer
, PEER_FLAG_DONT_CAPABILITY
))
7185 vty_out(vty
, " neighbor %s dont-capability-negotiate\n", addr
);
7187 /* override-capability */
7188 if (peergroup_flag_check(peer
, PEER_FLAG_OVERRIDE_CAPABILITY
))
7189 vty_out(vty
, " neighbor %s override-capability\n", addr
);
7191 /* strict-capability-match */
7192 if (peergroup_flag_check(peer
, PEER_FLAG_STRICT_CAP_MATCH
))
7193 vty_out(vty
, " neighbor %s strict-capability-match\n", addr
);
7195 /* Sender side AS path loop detection. */
7196 if (peer
->as_path_loop_detection
)
7197 vty_out(vty
, " neighbor %s sender-as-path-loop-detection\n",
7201 /* BGP peer configuration display function. */
7202 static void bgp_config_write_peer_af(struct vty
*vty
, struct bgp
*bgp
,
7203 struct peer
*peer
, afi_t afi
, safi_t safi
)
7205 struct peer
*g_peer
= NULL
;
7207 bool flag_scomm
, flag_secomm
, flag_slcomm
;
7209 /* Skip dynamic neighbors. */
7210 if (peer_dynamic_neighbor(peer
))
7214 addr
= peer
->conf_if
;
7218 /************************************
7219 ****** Per AF to the neighbor ******
7220 ************************************/
7221 if (peer_group_active(peer
)) {
7222 g_peer
= peer
->group
->conf
;
7224 /* If the peer-group is active but peer is not, print a 'no
7226 if (g_peer
->afc
[afi
][safi
] && !peer
->afc
[afi
][safi
]) {
7227 vty_out(vty
, " no neighbor %s activate\n", addr
);
7230 /* If the peer-group is not active but peer is, print an
7232 else if (!g_peer
->afc
[afi
][safi
] && peer
->afc
[afi
][safi
]) {
7233 vty_out(vty
, " neighbor %s activate\n", addr
);
7236 if (peer
->afc
[afi
][safi
]) {
7237 if ((afi
== AFI_IP
) && (safi
== SAFI_UNICAST
)) {
7238 if (bgp_flag_check(bgp
,
7239 BGP_FLAG_NO_DEFAULT_IPV4
)) {
7240 vty_out(vty
, " neighbor %s activate\n",
7244 vty_out(vty
, " neighbor %s activate\n", addr
);
7246 if ((afi
== AFI_IP
) && (safi
== SAFI_UNICAST
)) {
7247 if (!bgp_flag_check(bgp
,
7248 BGP_FLAG_NO_DEFAULT_IPV4
)) {
7250 " no neighbor %s activate\n",
7257 /* addpath TX knobs */
7258 if (peergroup_af_addpath_check(peer
, afi
, safi
)) {
7259 switch (peer
->addpath_type
[afi
][safi
]) {
7260 case BGP_ADDPATH_ALL
:
7261 vty_out(vty
, " neighbor %s addpath-tx-all-paths\n",
7264 case BGP_ADDPATH_BEST_PER_AS
:
7266 " neighbor %s addpath-tx-bestpath-per-AS\n",
7269 case BGP_ADDPATH_MAX
:
7270 case BGP_ADDPATH_NONE
:
7275 /* ORF capability. */
7276 if (peergroup_af_flag_check(peer
, afi
, safi
, PEER_FLAG_ORF_PREFIX_SM
)
7277 || peergroup_af_flag_check(peer
, afi
, safi
,
7278 PEER_FLAG_ORF_PREFIX_RM
)) {
7279 vty_out(vty
, " neighbor %s capability orf prefix-list", addr
);
7281 if (peergroup_af_flag_check(peer
, afi
, safi
,
7282 PEER_FLAG_ORF_PREFIX_SM
)
7283 && peergroup_af_flag_check(peer
, afi
, safi
,
7284 PEER_FLAG_ORF_PREFIX_RM
))
7285 vty_out(vty
, " both");
7286 else if (peergroup_af_flag_check(peer
, afi
, safi
,
7287 PEER_FLAG_ORF_PREFIX_SM
))
7288 vty_out(vty
, " send");
7290 vty_out(vty
, " receive");
7294 /* BGP flag dampening. */
7295 if (CHECK_FLAG(bgp
->af_flags
[afi
][safi
],
7296 BGP_CONFIG_DAMPENING
))
7297 bgp_config_write_damp(vty
, afi
, safi
);
7299 /* Route reflector client. */
7300 if (peergroup_af_flag_check(peer
, afi
, safi
,
7301 PEER_FLAG_REFLECTOR_CLIENT
)) {
7302 vty_out(vty
, " neighbor %s route-reflector-client\n", addr
);
7305 /* next-hop-self force */
7306 if (peergroup_af_flag_check(peer
, afi
, safi
,
7307 PEER_FLAG_FORCE_NEXTHOP_SELF
)) {
7308 vty_out(vty
, " neighbor %s next-hop-self force\n", addr
);
7312 if (peergroup_af_flag_check(peer
, afi
, safi
, PEER_FLAG_NEXTHOP_SELF
)) {
7313 vty_out(vty
, " neighbor %s next-hop-self\n", addr
);
7316 /* remove-private-AS */
7317 if (peergroup_af_flag_check(peer
, afi
, safi
,
7318 PEER_FLAG_REMOVE_PRIVATE_AS_ALL_REPLACE
)) {
7319 vty_out(vty
, " neighbor %s remove-private-AS all replace-AS\n",
7323 else if (peergroup_af_flag_check(peer
, afi
, safi
,
7324 PEER_FLAG_REMOVE_PRIVATE_AS_REPLACE
)) {
7325 vty_out(vty
, " neighbor %s remove-private-AS replace-AS\n",
7329 else if (peergroup_af_flag_check(peer
, afi
, safi
,
7330 PEER_FLAG_REMOVE_PRIVATE_AS_ALL
)) {
7331 vty_out(vty
, " neighbor %s remove-private-AS all\n", addr
);
7334 else if (peergroup_af_flag_check(peer
, afi
, safi
,
7335 PEER_FLAG_REMOVE_PRIVATE_AS
)) {
7336 vty_out(vty
, " neighbor %s remove-private-AS\n", addr
);
7340 if (peergroup_af_flag_check(peer
, afi
, safi
, PEER_FLAG_AS_OVERRIDE
)) {
7341 vty_out(vty
, " neighbor %s as-override\n", addr
);
7344 /* send-community print. */
7345 flag_scomm
= peergroup_af_flag_check(peer
, afi
, safi
,
7346 PEER_FLAG_SEND_COMMUNITY
);
7347 flag_secomm
= peergroup_af_flag_check(peer
, afi
, safi
,
7348 PEER_FLAG_SEND_EXT_COMMUNITY
);
7349 flag_slcomm
= peergroup_af_flag_check(peer
, afi
, safi
,
7350 PEER_FLAG_SEND_LARGE_COMMUNITY
);
7352 if (flag_scomm
&& flag_secomm
&& flag_slcomm
) {
7353 vty_out(vty
, " no neighbor %s send-community all\n", addr
);
7356 vty_out(vty
, " no neighbor %s send-community\n", addr
);
7359 " no neighbor %s send-community extended\n",
7363 vty_out(vty
, " no neighbor %s send-community large\n",
7367 /* Default information */
7368 if (peergroup_af_flag_check(peer
, afi
, safi
,
7369 PEER_FLAG_DEFAULT_ORIGINATE
)) {
7370 vty_out(vty
, " neighbor %s default-originate", addr
);
7372 if (peer
->default_rmap
[afi
][safi
].name
)
7373 vty_out(vty
, " route-map %s",
7374 peer
->default_rmap
[afi
][safi
].name
);
7379 /* Soft reconfiguration inbound. */
7380 if (peergroup_af_flag_check(peer
, afi
, safi
, PEER_FLAG_SOFT_RECONFIG
)) {
7381 vty_out(vty
, " neighbor %s soft-reconfiguration inbound\n",
7385 /* maximum-prefix. */
7386 if (peergroup_af_flag_check(peer
, afi
, safi
, PEER_FLAG_MAX_PREFIX
)) {
7387 vty_out(vty
, " neighbor %s maximum-prefix %" PRIu32
, addr
,
7388 peer
->pmax
[afi
][safi
]);
7390 if (peer
->pmax_threshold
[afi
][safi
]
7391 != MAXIMUM_PREFIX_THRESHOLD_DEFAULT
)
7392 vty_out(vty
, " %u", peer
->pmax_threshold
[afi
][safi
]);
7393 if (peer_af_flag_check(peer
, afi
, safi
,
7394 PEER_FLAG_MAX_PREFIX_WARNING
))
7395 vty_out(vty
, " warning-only");
7396 if (peer
->pmax_restart
[afi
][safi
])
7397 vty_out(vty
, " restart %u",
7398 peer
->pmax_restart
[afi
][safi
]);
7403 /* Route server client. */
7404 if (peergroup_af_flag_check(peer
, afi
, safi
,
7405 PEER_FLAG_RSERVER_CLIENT
)) {
7406 vty_out(vty
, " neighbor %s route-server-client\n", addr
);
7409 /* Nexthop-local unchanged. */
7410 if (peergroup_af_flag_check(peer
, afi
, safi
,
7411 PEER_FLAG_NEXTHOP_LOCAL_UNCHANGED
)) {
7412 vty_out(vty
, " neighbor %s nexthop-local unchanged\n", addr
);
7415 /* allowas-in <1-10> */
7416 if (peergroup_af_flag_check(peer
, afi
, safi
, PEER_FLAG_ALLOWAS_IN
)) {
7417 if (peer_af_flag_check(peer
, afi
, safi
,
7418 PEER_FLAG_ALLOWAS_IN_ORIGIN
)) {
7419 vty_out(vty
, " neighbor %s allowas-in origin\n", addr
);
7420 } else if (peer
->allowas_in
[afi
][safi
] == 3) {
7421 vty_out(vty
, " neighbor %s allowas-in\n", addr
);
7423 vty_out(vty
, " neighbor %s allowas-in %d\n", addr
,
7424 peer
->allowas_in
[afi
][safi
]);
7429 if (peergroup_af_flag_check(peer
, afi
, safi
, PEER_FLAG_WEIGHT
))
7430 vty_out(vty
, " neighbor %s weight %lu\n", addr
,
7431 peer
->weight
[afi
][safi
]);
7434 bgp_config_write_filter(vty
, peer
, afi
, safi
);
7436 /* atribute-unchanged. */
7437 if (peer_af_flag_check(peer
, afi
, safi
, PEER_FLAG_AS_PATH_UNCHANGED
)
7438 || (safi
!= SAFI_EVPN
7439 && peer_af_flag_check(peer
, afi
, safi
,
7440 PEER_FLAG_NEXTHOP_UNCHANGED
))
7441 || peer_af_flag_check(peer
, afi
, safi
, PEER_FLAG_MED_UNCHANGED
)) {
7443 if (!peer_group_active(peer
)
7444 || peergroup_af_flag_check(peer
, afi
, safi
,
7445 PEER_FLAG_AS_PATH_UNCHANGED
)
7446 || peergroup_af_flag_check(peer
, afi
, safi
,
7447 PEER_FLAG_NEXTHOP_UNCHANGED
)
7448 || peergroup_af_flag_check(peer
, afi
, safi
,
7449 PEER_FLAG_MED_UNCHANGED
)) {
7452 " neighbor %s attribute-unchanged%s%s%s\n",
7454 peer_af_flag_check(peer
, afi
, safi
,
7455 PEER_FLAG_AS_PATH_UNCHANGED
)
7458 peer_af_flag_check(peer
, afi
, safi
,
7459 PEER_FLAG_NEXTHOP_UNCHANGED
)
7462 peer_af_flag_check(peer
, afi
, safi
,
7463 PEER_FLAG_MED_UNCHANGED
)
7470 /* Address family based peer configuration display. */
7471 static void bgp_config_write_family(struct vty
*vty
, struct bgp
*bgp
, afi_t afi
,
7475 struct peer_group
*group
;
7476 struct listnode
*node
, *nnode
;
7479 vty_frame(vty
, " !\n address-family ");
7480 if (afi
== AFI_IP
) {
7481 if (safi
== SAFI_UNICAST
)
7482 vty_frame(vty
, "ipv4 unicast");
7483 else if (safi
== SAFI_LABELED_UNICAST
)
7484 vty_frame(vty
, "ipv4 labeled-unicast");
7485 else if (safi
== SAFI_MULTICAST
)
7486 vty_frame(vty
, "ipv4 multicast");
7487 else if (safi
== SAFI_MPLS_VPN
)
7488 vty_frame(vty
, "ipv4 vpn");
7489 else if (safi
== SAFI_ENCAP
)
7490 vty_frame(vty
, "ipv4 encap");
7491 else if (safi
== SAFI_FLOWSPEC
)
7492 vty_frame(vty
, "ipv4 flowspec");
7493 } else if (afi
== AFI_IP6
) {
7494 if (safi
== SAFI_UNICAST
)
7495 vty_frame(vty
, "ipv6 unicast");
7496 else if (safi
== SAFI_LABELED_UNICAST
)
7497 vty_frame(vty
, "ipv6 labeled-unicast");
7498 else if (safi
== SAFI_MULTICAST
)
7499 vty_frame(vty
, "ipv6 multicast");
7500 else if (safi
== SAFI_MPLS_VPN
)
7501 vty_frame(vty
, "ipv6 vpn");
7502 else if (safi
== SAFI_ENCAP
)
7503 vty_frame(vty
, "ipv6 encap");
7504 else if (safi
== SAFI_FLOWSPEC
)
7505 vty_frame(vty
, "ipv6 flowspec");
7506 } else if (afi
== AFI_L2VPN
) {
7507 if (safi
== SAFI_EVPN
)
7508 vty_frame(vty
, "l2vpn evpn");
7510 vty_frame(vty
, "\n");
7512 bgp_config_write_distance(vty
, bgp
, afi
, safi
);
7514 bgp_config_write_network(vty
, bgp
, afi
, safi
);
7516 bgp_config_write_redistribute(vty
, bgp
, afi
, safi
);
7518 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, nnode
, group
))
7519 bgp_config_write_peer_af(vty
, bgp
, group
->conf
, afi
, safi
);
7521 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
7522 /* Skip dynamic neighbors. */
7523 if (peer_dynamic_neighbor(peer
))
7526 /* Do not display doppelganger peers */
7527 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
))
7528 bgp_config_write_peer_af(vty
, bgp
, peer
, afi
, safi
);
7531 bgp_config_write_maxpaths(vty
, bgp
, afi
, safi
);
7532 bgp_config_write_table_map(vty
, bgp
, afi
, safi
);
7534 if (safi
== SAFI_EVPN
)
7535 bgp_config_write_evpn_info(vty
, bgp
, afi
, safi
);
7537 if (safi
== SAFI_FLOWSPEC
)
7538 bgp_fs_config_write_pbr(vty
, bgp
, afi
, safi
);
7540 if (safi
== SAFI_UNICAST
) {
7541 bgp_vpn_policy_config_write_afi(vty
, bgp
, afi
);
7542 if (CHECK_FLAG(bgp
->af_flags
[afi
][safi
],
7543 BGP_CONFIG_VRF_TO_MPLSVPN_EXPORT
)) {
7545 vty_out(vty
, " export vpn\n");
7547 if (CHECK_FLAG(bgp
->af_flags
[afi
][safi
],
7548 BGP_CONFIG_MPLSVPN_TO_VRF_IMPORT
)) {
7550 vty_out(vty
, " import vpn\n");
7552 if (CHECK_FLAG(bgp
->af_flags
[afi
][safi
],
7553 BGP_CONFIG_VRF_TO_VRF_IMPORT
)) {
7556 for (ALL_LIST_ELEMENTS_RO(
7557 bgp
->vpn_policy
[afi
].import_vrf
, node
,
7559 vty_out(vty
, " import vrf %s\n", name
);
7563 vty_endframe(vty
, " exit-address-family\n");
7566 int bgp_config_write(struct vty
*vty
)
7569 struct peer_group
*group
;
7571 struct listnode
*node
, *nnode
;
7572 struct listnode
*mnode
, *mnnode
;
7574 if (bm
->rmap_update_timer
!= RMAP_DEFAULT_UPDATE_TIMER
)
7575 vty_out(vty
, "bgp route-map delay-timer %u\n",
7576 bm
->rmap_update_timer
);
7578 /* BGP configuration. */
7579 for (ALL_LIST_ELEMENTS(bm
->bgp
, mnode
, mnnode
, bgp
)) {
7581 /* skip all auto created vrf as they dont have user config */
7582 if (CHECK_FLAG(bgp
->vrf_flags
, BGP_VRF_AUTO
))
7585 /* Router bgp ASN */
7586 vty_out(vty
, "router bgp %u", bgp
->as
);
7589 vty_out(vty
, " %s %s",
7590 (bgp
->inst_type
== BGP_INSTANCE_TYPE_VIEW
)
7591 ? "view" : "vrf", bgp
->name
);
7594 /* BGP fast-external-failover. */
7595 if (CHECK_FLAG(bgp
->flags
, BGP_FLAG_NO_FAST_EXT_FAILOVER
))
7596 vty_out(vty
, " no bgp fast-external-failover\n");
7598 /* BGP router ID. */
7599 if (bgp
->router_id_static
.s_addr
!= 0)
7600 vty_out(vty
, " bgp router-id %s\n",
7601 inet_ntoa(bgp
->router_id_static
));
7603 /* BGP log-neighbor-changes. */
7604 if (!!bgp_flag_check(bgp
, BGP_FLAG_LOG_NEIGHBOR_CHANGES
)
7605 != DFLT_BGP_LOG_NEIGHBOR_CHANGES
)
7606 vty_out(vty
, " %sbgp log-neighbor-changes\n",
7608 BGP_FLAG_LOG_NEIGHBOR_CHANGES
)
7612 /* BGP configuration. */
7613 if (bgp_flag_check(bgp
, BGP_FLAG_ALWAYS_COMPARE_MED
))
7614 vty_out(vty
, " bgp always-compare-med\n");
7616 /* RFC8212 default eBGP policy. */
7617 if (bgp
->ebgp_requires_policy
7618 == DEFAULT_EBGP_POLICY_ENABLED
)
7619 vty_out(vty
, " bgp ebgp-requires-policy\n");
7621 /* BGP default ipv4-unicast. */
7622 if (bgp_flag_check(bgp
, BGP_FLAG_NO_DEFAULT_IPV4
))
7623 vty_out(vty
, " no bgp default ipv4-unicast\n");
7625 /* BGP default local-preference. */
7626 if (bgp
->default_local_pref
!= BGP_DEFAULT_LOCAL_PREF
)
7627 vty_out(vty
, " bgp default local-preference %u\n",
7628 bgp
->default_local_pref
);
7630 /* BGP default show-hostname */
7631 if (!!bgp_flag_check(bgp
, BGP_FLAG_SHOW_HOSTNAME
)
7632 != DFLT_BGP_SHOW_HOSTNAME
)
7633 vty_out(vty
, " %sbgp default show-hostname\n",
7634 bgp_flag_check(bgp
, BGP_FLAG_SHOW_HOSTNAME
)
7638 /* BGP default subgroup-pkt-queue-max. */
7639 if (bgp
->default_subgroup_pkt_queue_max
7640 != BGP_DEFAULT_SUBGROUP_PKT_QUEUE_MAX
)
7641 vty_out(vty
, " bgp default subgroup-pkt-queue-max %u\n",
7642 bgp
->default_subgroup_pkt_queue_max
);
7644 /* BGP client-to-client reflection. */
7645 if (bgp_flag_check(bgp
, BGP_FLAG_NO_CLIENT_TO_CLIENT
))
7646 vty_out(vty
, " no bgp client-to-client reflection\n");
7648 /* BGP cluster ID. */
7649 if (CHECK_FLAG(bgp
->config
, BGP_CONFIG_CLUSTER_ID
))
7650 vty_out(vty
, " bgp cluster-id %s\n",
7651 inet_ntoa(bgp
->cluster_id
));
7653 /* Disable ebgp connected nexthop check */
7654 if (bgp_flag_check(bgp
, BGP_FLAG_DISABLE_NH_CONNECTED_CHK
))
7656 " bgp disable-ebgp-connected-route-check\n");
7658 /* Confederation identifier*/
7659 if (CHECK_FLAG(bgp
->config
, BGP_CONFIG_CONFEDERATION
))
7660 vty_out(vty
, " bgp confederation identifier %u\n",
7663 /* Confederation peer */
7664 if (bgp
->confed_peers_cnt
> 0) {
7667 vty_out(vty
, " bgp confederation peers");
7669 for (i
= 0; i
< bgp
->confed_peers_cnt
; i
++)
7670 vty_out(vty
, " %u", bgp
->confed_peers
[i
]);
7675 /* BGP deterministic-med. */
7676 if (!!bgp_flag_check(bgp
, BGP_FLAG_DETERMINISTIC_MED
)
7677 != DFLT_BGP_DETERMINISTIC_MED
)
7678 vty_out(vty
, " %sbgp deterministic-med\n",
7679 bgp_flag_check(bgp
, BGP_FLAG_DETERMINISTIC_MED
)
7683 /* BGP update-delay. */
7684 bgp_config_write_update_delay(vty
, bgp
);
7686 if (bgp
->v_maxmed_onstartup
7687 != BGP_MAXMED_ONSTARTUP_UNCONFIGURED
) {
7688 vty_out(vty
, " bgp max-med on-startup %u",
7689 bgp
->v_maxmed_onstartup
);
7690 if (bgp
->maxmed_onstartup_value
7691 != BGP_MAXMED_VALUE_DEFAULT
)
7693 bgp
->maxmed_onstartup_value
);
7696 if (bgp
->v_maxmed_admin
!= BGP_MAXMED_ADMIN_UNCONFIGURED
) {
7697 vty_out(vty
, " bgp max-med administrative");
7698 if (bgp
->maxmed_admin_value
!= BGP_MAXMED_VALUE_DEFAULT
)
7699 vty_out(vty
, " %u", bgp
->maxmed_admin_value
);
7704 bgp_config_write_wpkt_quanta(vty
, bgp
);
7706 bgp_config_write_rpkt_quanta(vty
, bgp
);
7709 bgp_config_write_coalesce_time(vty
, bgp
);
7711 /* BGP graceful-restart. */
7712 if (bgp
->stalepath_time
!= BGP_DEFAULT_STALEPATH_TIME
)
7714 " bgp graceful-restart stalepath-time %u\n",
7715 bgp
->stalepath_time
);
7716 if (bgp
->restart_time
!= BGP_DEFAULT_RESTART_TIME
)
7717 vty_out(vty
, " bgp graceful-restart restart-time %u\n",
7719 if (bgp_flag_check(bgp
, BGP_FLAG_GRACEFUL_RESTART
))
7720 vty_out(vty
, " bgp graceful-restart\n");
7722 /* BGP graceful-shutdown */
7723 if (bgp_flag_check(bgp
, BGP_FLAG_GRACEFUL_SHUTDOWN
))
7724 vty_out(vty
, " bgp graceful-shutdown\n");
7726 /* BGP graceful-restart Preserve State F bit. */
7727 if (bgp_flag_check(bgp
, BGP_FLAG_GR_PRESERVE_FWD
))
7729 " bgp graceful-restart preserve-fw-state\n");
7731 /* BGP bestpath method. */
7732 if (bgp_flag_check(bgp
, BGP_FLAG_ASPATH_IGNORE
))
7733 vty_out(vty
, " bgp bestpath as-path ignore\n");
7734 if (bgp_flag_check(bgp
, BGP_FLAG_ASPATH_CONFED
))
7735 vty_out(vty
, " bgp bestpath as-path confed\n");
7737 if (bgp_flag_check(bgp
, BGP_FLAG_ASPATH_MULTIPATH_RELAX
)) {
7738 if (bgp_flag_check(bgp
,
7739 BGP_FLAG_MULTIPATH_RELAX_AS_SET
)) {
7741 " bgp bestpath as-path multipath-relax as-set\n");
7744 " bgp bestpath as-path multipath-relax\n");
7748 if (bgp_flag_check(bgp
, BGP_FLAG_RR_ALLOW_OUTBOUND_POLICY
)) {
7750 " bgp route-reflector allow-outbound-policy\n");
7752 if (bgp_flag_check(bgp
, BGP_FLAG_COMPARE_ROUTER_ID
))
7753 vty_out(vty
, " bgp bestpath compare-routerid\n");
7754 if (bgp_flag_check(bgp
, BGP_FLAG_MED_CONFED
)
7755 || bgp_flag_check(bgp
, BGP_FLAG_MED_MISSING_AS_WORST
)) {
7756 vty_out(vty
, " bgp bestpath med");
7757 if (bgp_flag_check(bgp
, BGP_FLAG_MED_CONFED
))
7758 vty_out(vty
, " confed");
7759 if (bgp_flag_check(bgp
, BGP_FLAG_MED_MISSING_AS_WORST
))
7760 vty_out(vty
, " missing-as-worst");
7764 /* BGP network import check. */
7765 if (!!bgp_flag_check(bgp
, BGP_FLAG_IMPORT_CHECK
)
7766 != DFLT_BGP_IMPORT_CHECK
)
7767 vty_out(vty
, " %sbgp network import-check\n",
7768 bgp_flag_check(bgp
, BGP_FLAG_IMPORT_CHECK
)
7772 /* BGP timers configuration. */
7773 if (bgp
->default_keepalive
!= BGP_DEFAULT_KEEPALIVE
7774 && bgp
->default_holdtime
!= BGP_DEFAULT_HOLDTIME
)
7775 vty_out(vty
, " timers bgp %u %u\n",
7776 bgp
->default_keepalive
, bgp
->default_holdtime
);
7779 for (ALL_LIST_ELEMENTS(bgp
->group
, node
, nnode
, group
)) {
7780 bgp_config_write_peer_global(vty
, bgp
, group
->conf
);
7783 /* Normal neighbor configuration. */
7784 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
)) {
7785 if (CHECK_FLAG(peer
->flags
, PEER_FLAG_CONFIG_NODE
))
7786 bgp_config_write_peer_global(vty
, bgp
, peer
);
7789 /* listen range and limit for dynamic BGP neighbors */
7790 bgp_config_write_listen(vty
, bgp
);
7793 * BGP default autoshutdown neighbors
7795 * This must be placed after any peer and peer-group
7796 * configuration, to avoid setting all peers to shutdown after
7797 * a daemon restart, which is undesired behavior. (see #2286)
7799 if (bgp
->autoshutdown
)
7800 vty_out(vty
, " bgp default shutdown\n");
7802 /* IPv4 unicast configuration. */
7803 bgp_config_write_family(vty
, bgp
, AFI_IP
, SAFI_UNICAST
);
7805 /* IPv4 multicast configuration. */
7806 bgp_config_write_family(vty
, bgp
, AFI_IP
, SAFI_MULTICAST
);
7808 /* IPv4 labeled-unicast configuration. */
7809 bgp_config_write_family(vty
, bgp
, AFI_IP
, SAFI_LABELED_UNICAST
);
7811 /* IPv4 VPN configuration. */
7812 bgp_config_write_family(vty
, bgp
, AFI_IP
, SAFI_MPLS_VPN
);
7814 /* ENCAPv4 configuration. */
7815 bgp_config_write_family(vty
, bgp
, AFI_IP
, SAFI_ENCAP
);
7817 /* FLOWSPEC v4 configuration. */
7818 bgp_config_write_family(vty
, bgp
, AFI_IP
, SAFI_FLOWSPEC
);
7820 /* IPv6 unicast configuration. */
7821 bgp_config_write_family(vty
, bgp
, AFI_IP6
, SAFI_UNICAST
);
7823 /* IPv6 multicast configuration. */
7824 bgp_config_write_family(vty
, bgp
, AFI_IP6
, SAFI_MULTICAST
);
7826 /* IPv6 labeled-unicast configuration. */
7827 bgp_config_write_family(vty
, bgp
, AFI_IP6
,
7828 SAFI_LABELED_UNICAST
);
7830 /* IPv6 VPN configuration. */
7831 bgp_config_write_family(vty
, bgp
, AFI_IP6
, SAFI_MPLS_VPN
);
7833 /* ENCAPv6 configuration. */
7834 bgp_config_write_family(vty
, bgp
, AFI_IP6
, SAFI_ENCAP
);
7836 /* FLOWSPEC v6 configuration. */
7837 bgp_config_write_family(vty
, bgp
, AFI_IP6
, SAFI_FLOWSPEC
);
7839 /* EVPN configuration. */
7840 bgp_config_write_family(vty
, bgp
, AFI_L2VPN
, SAFI_EVPN
);
7842 hook_call(bgp_inst_config_write
, bgp
, vty
);
7845 bgp_rfapi_cfg_write(vty
, bgp
);
7848 vty_out(vty
, "!\n");
7853 void bgp_master_init(struct thread_master
*master
, const int buffer_size
)
7857 memset(&bgp_master
, 0, sizeof(struct bgp_master
));
7860 bm
->bgp
= list_new();
7861 bm
->listen_sockets
= list_new();
7862 bm
->port
= BGP_PORT_DEFAULT
;
7863 bm
->master
= master
;
7864 bm
->start_time
= bgp_clock();
7865 bm
->t_rmap_update
= NULL
;
7866 bm
->rmap_update_timer
= RMAP_DEFAULT_UPDATE_TIMER
;
7867 bm
->terminating
= false;
7868 bm
->socket_buffer
= buffer_size
;
7870 bgp_process_queue_init();
7873 /* init the rd id space.
7874 assign 0th index in the bitfield,
7875 so that we start with id 1
7877 bf_init(bm
->rd_idspace
, UINT16_MAX
);
7878 bf_assign_zero_index(bm
->rd_idspace
);
7880 /* mpls label dynamic allocation pool */
7881 bgp_lp_init(bm
->master
, &bm
->labelpool
);
7883 QOBJ_REG(bm
, bgp_master
);
7887 * Free up connected routes and interfaces for a BGP instance. Invoked upon
7888 * instance delete (non-default only) or BGP exit.
7890 static void bgp_if_finish(struct bgp
*bgp
)
7893 struct interface
*ifp
;
7895 vrf
= bgp_vrf_lookup_by_instance_type(bgp
);
7897 if (bgp
->inst_type
== BGP_INSTANCE_TYPE_VIEW
|| !vrf
)
7900 FOR_ALL_INTERFACES (vrf
, ifp
) {
7901 struct listnode
*c_node
, *c_nnode
;
7902 struct connected
*c
;
7904 for (ALL_LIST_ELEMENTS(ifp
->connected
, c_node
, c_nnode
, c
))
7905 bgp_connected_delete(bgp
, c
);
7909 static void bgp_viewvrf_autocomplete(vector comps
, struct cmd_token
*token
)
7911 struct vrf
*vrf
= NULL
;
7912 struct listnode
*next
;
7915 RB_FOREACH (vrf
, vrf_name_head
, &vrfs_by_name
)
7916 vector_set(comps
, XSTRDUP(MTYPE_COMPLETION
, vrf
->name
));
7918 for (ALL_LIST_ELEMENTS_RO(bm
->bgp
, next
, bgp
)) {
7919 if (bgp
->inst_type
!= BGP_INSTANCE_TYPE_VIEW
)
7922 vector_set(comps
, XSTRDUP(MTYPE_COMPLETION
, bgp
->name
));
7926 static void bgp_instasn_autocomplete(vector comps
, struct cmd_token
*token
)
7928 struct listnode
*next
, *next2
;
7929 struct bgp
*bgp
, *bgp2
;
7932 for (ALL_LIST_ELEMENTS_RO(bm
->bgp
, next
, bgp
)) {
7934 for (ALL_LIST_ELEMENTS_RO(bm
->bgp
, next2
, bgp2
)) {
7935 if (bgp2
->as
== bgp
->as
)
7943 snprintf(buf
, sizeof(buf
), "%u", bgp
->as
);
7944 vector_set(comps
, XSTRDUP(MTYPE_COMPLETION
, buf
));
7948 static const struct cmd_variable_handler bgp_viewvrf_var_handlers
[] = {
7949 {.tokenname
= "VIEWVRFNAME", .completions
= bgp_viewvrf_autocomplete
},
7950 {.varname
= "instasn", .completions
= bgp_instasn_autocomplete
},
7951 {.completions
= NULL
},
7954 struct frr_pthread
*bgp_pth_io
;
7955 struct frr_pthread
*bgp_pth_ka
;
7957 static void bgp_pthreads_init(void)
7959 assert(!bgp_pth_io
);
7960 assert(!bgp_pth_ka
);
7962 struct frr_pthread_attr io
= {
7963 .start
= frr_pthread_attr_default
.start
,
7964 .stop
= frr_pthread_attr_default
.stop
,
7966 struct frr_pthread_attr ka
= {
7967 .start
= bgp_keepalives_start
,
7968 .stop
= bgp_keepalives_stop
,
7970 bgp_pth_io
= frr_pthread_new(&io
, "BGP I/O thread", "bgpd_io");
7971 bgp_pth_ka
= frr_pthread_new(&ka
, "BGP Keepalives thread", "bgpd_ka");
7974 void bgp_pthreads_run(void)
7976 frr_pthread_run(bgp_pth_io
, NULL
);
7977 frr_pthread_run(bgp_pth_ka
, NULL
);
7979 /* Wait until threads are ready. */
7980 frr_pthread_wait_running(bgp_pth_io
);
7981 frr_pthread_wait_running(bgp_pth_ka
);
7984 void bgp_pthreads_finish(void)
7986 frr_pthread_stop_all();
7989 void bgp_init(unsigned short instance
)
7992 /* allocates some vital data structures used by peer commands in
7995 /* pre-init pthreads */
7996 bgp_pthreads_init();
7999 bgp_zebra_init(bm
->master
, instance
);
8002 vnc_zebra_init(bm
->master
);
8005 /* BGP VTY commands installation. */
8013 bgp_route_map_init();
8014 bgp_scan_vty_init();
8019 bgp_ethernetvpn_init();
8020 bgp_flowspec_vty_init();
8022 /* Access list initialize. */
8024 access_list_add_hook(peer_distribute_update
);
8025 access_list_delete_hook(peer_distribute_update
);
8027 /* Filter list initialize. */
8029 as_list_add_hook(peer_aslist_add
);
8030 as_list_delete_hook(peer_aslist_del
);
8032 /* Prefix list initialize.*/
8034 prefix_list_add_hook(peer_prefix_list_update
);
8035 prefix_list_delete_hook(peer_prefix_list_update
);
8037 /* Community list initialize. */
8038 bgp_clist
= community_list_init();
8043 cmd_variable_handler_register(bgp_viewvrf_var_handlers
);
8046 void bgp_terminate(void)
8050 struct listnode
*node
, *nnode
;
8051 struct listnode
*mnode
, *mnnode
;
8055 /* Close the listener sockets first as this prevents peers from
8057 * to reconnect on receiving the peer unconfig message. In the presence
8058 * of a large number of peers this will ensure that no peer is left with
8059 * a dangling connection
8061 /* reverse bgp_master_init */
8064 if (bm
->listen_sockets
)
8065 list_delete(&bm
->listen_sockets
);
8067 for (ALL_LIST_ELEMENTS(bm
->bgp
, mnode
, mnnode
, bgp
))
8068 for (ALL_LIST_ELEMENTS(bgp
->peer
, node
, nnode
, peer
))
8069 if (peer
->status
== Established
8070 || peer
->status
== OpenSent
8071 || peer
->status
== OpenConfirm
)
8072 bgp_notify_send(peer
, BGP_NOTIFY_CEASE
,
8073 BGP_NOTIFY_CEASE_PEER_UNCONFIG
);
8075 if (bm
->process_main_queue
)
8076 work_queue_free_and_null(&bm
->process_main_queue
);
8078 if (bm
->t_rmap_update
)
8079 BGP_TIMER_OFF(bm
->t_rmap_update
);
8084 struct peer
*peer_lookup_in_view(struct vty
*vty
, struct bgp
*bgp
,
8085 const char *ip_str
, bool use_json
)
8091 /* Get peer sockunion. */
8092 ret
= str2sockunion(ip_str
, &su
);
8094 peer
= peer_lookup_by_conf_if(bgp
, ip_str
);
8096 peer
= peer_lookup_by_hostname(bgp
, ip_str
);
8100 json_object
*json_no
= NULL
;
8101 json_no
= json_object_new_object();
8102 json_object_string_add(
8104 "malformedAddressOrName",
8106 vty_out(vty
, "%s\n",
8107 json_object_to_json_string_ext(
8109 JSON_C_TO_STRING_PRETTY
));
8110 json_object_free(json_no
);
8113 "%% Malformed address or name: %s\n",
8121 /* Peer structure lookup. */
8122 peer
= peer_lookup(bgp
, &su
);
8125 json_object
*json_no
= NULL
;
8126 json_no
= json_object_new_object();
8127 json_object_string_add(json_no
, "warning",
8128 "No such neighbor in this view/vrf");
8129 vty_out(vty
, "%s\n",
8130 json_object_to_json_string_ext(
8131 json_no
, JSON_C_TO_STRING_PRETTY
));
8132 json_object_free(json_no
);
8134 vty_out(vty
, "No such neighbor in this view/vrf\n");